-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enable osin internal error logging #18505
Conversation
/retest |
} | ||
|
||
func (l Logger) Printf(format string, v ...interface{}) { | ||
if glog.V(3) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I feel like we always want to log these. They are rare and point to "stuff is broken". Maybe V(1) in case we are really worried about spam. @sdodson @jupierce @smarterclayton any concerns? What log level do we normally run online at?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What log level do we normally run online at?
It's a loglevel 2 AFAIR.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It's a loglevel 2 AFAIR.
Confirm this with @jupierce
|
||
func (l Logger) Printf(format string, v ...interface{}) { | ||
if glog.V(3) { | ||
glog.InfoDepth(2, fmt.Sprintf("osin: "+format, v...)) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Info depth of 3 so we see the correct caller. Error depth is probably more appropriate (pretty sure every place we log leads to a failed OAuth flow).
@enj I rebased and turned the V level down to 2, and changed InfoDepth to an ErrorDepth of 3. |
/retest |
/lgtm @deads2k can you tag? |
So bumps require determination of whether you should actually bump the packages in question. Separating the repo dependencies into yours, mine and ours buckets, we do not pin "yours" (kube's). We always pin "mine" (but we have identified the set). We sometimes pin "ours" depending on whether we really care what it is and who the other dependant is. We are actively trying to make this better (see #18543), but it isn't going to make 3.9. |
Oh, and syncing out from our vendor folder is currently in progress. Rules merged early this morning and @mfojtik is trying to enable the bot. |
@deads2k I bumped only the osin dependency manually. I'm not sure how the vendor sync-out you mentioned affects this, so let me know if there is something I might need to do different here... |
A manual change just leaves a time bomb for the next guy. I know it's annoying, I know it can be tedious, I know it's not something you'd like to do. I know this far more than the average person on the team. Understanding how our product manages golang dependencies must not remain an arcane skill. Please take the time to learn how to manage dependencies. |
@deads2k after rebasing, this time running update-deps resulted in only updating osin (a "mine" now pinned at 2dc1b431) and k8s.io/kubernetes. PTAL |
/retest |
@deads2k thanks for syncing kube! the dep bump is clean now. PTAL. |
/approve |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: deads2k, enj, mrogers950 The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these OWNERS Files:
You can indicate your approval by writing |
/retest |
/test all [submit-queue is verifying that this PR is safe to merge] |
Automatic merge from submit-queue (batch tested with PRs 18505, 18617, 18604). |
osin now has an interface for internal error logging that provides some additional context on failure.
Example output:
@openshift/sig-security