-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add error messages to test framework when changing user #17827
Add error messages to test framework when changing user #17827
Conversation
/cc @deads2k |
flake #17829 |
flake #17829 again |
@tnozicka This ends up hiding the original error types. That causes some calling code (sometimes multiple levels up) to fail. See comment on error handling for |
@tnozicka agree with David, can we throw there some V(5) glog.Infos instead? |
I'll check it but I don't think that any non direct caller should check those error types for exactly this reason, or am I wrong? |
/retest |
@deads2k would you mind sharing where that is used? I've found possibly only origin/test/integration/oauth_basicauth_test.go Lines 357 to 369 in 1eed81f
|
This is usually an exercise for the reader. First one is free, but the second counts as a favor. :)
|
6193852
to
1243086
Compare
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: tnozicka Assign the PR to them by writing The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these OWNERS Files:
You can indicate your approval by writing |
thanks @deads2k, I didn't want to abuse your time but I though you already knew the place (based on your previous comment) and the path to it from the low level seemed like backtracing all the calls 7 level up with exponential growth. I went with |
1243086
to
1781ee7
Compare
/retest |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This lgtm, but I'll defer to David for final signoff.
The problem with doing it this way is that it's no longer the standard way of dealing with a golang error and our project standard isn't to attempt unwrapping. Having done this in java, you either have to convert the entire code base or you don't do it at all. Mix and match fails unexpectedly in frustrating spots. |
I would look at it from different point. The way it was done was non-standard - checking error type is "allowed" only for the direct caller and this rouge code did it several layers up. The standard Go way is to wrap an error into a string (erasing the type), adding context. This wrapping makes the error look the same way as if it was wrapped normally into a string for any caller not aware of the wrapping - fulfilling the standard we have. In addition it allows unwrapping to fix the places where we were breaking the standard way by checking error type several layers up. Also the package is already vendored. |
@tnozicka PR needs rebase |
Issues go stale after 90d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle stale |
Stale issues rot after 30d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle rotten |
Rotten issues close after 30d of inactivity. Reopen the issue by commenting /close |
Helps uncover #17805 and those error mesages should have been there anyways.