mirror of
https://github.com/ceph/ceph-csi.git
synced 2025-06-13 02:33:34 +00:00
cleanup: use wrapped static errors instead of dynamic
In Go 1.13, the fmt.Errorf function supports a new %w verb. When this verb is present, the error returned by fmt.Errorf will have an Unwrap method returning the argument of %w, which must be an error. In all other ways, %w is identical to %v. Updates: #1227 Signed-off-by: Yug <yuggupta27@gmail.com>
This commit is contained in:
@ -53,14 +53,14 @@ func getCredentialsForVolume(volOptions *volumeOptions, req *csi.NodeStageVolume
|
||||
|
||||
cr, err = util.NewAdminCredentials(secrets)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("failed to get admin credentials from node stage secrets: %v", err)
|
||||
return nil, fmt.Errorf("failed to get admin credentials from node stage secrets: %w", err)
|
||||
}
|
||||
} else {
|
||||
// The volume is pre-made, credentials are in node stage secrets
|
||||
|
||||
cr, err = util.NewUserCredentials(req.GetSecrets())
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("failed to get user credentials from node stage secrets: %v", err)
|
||||
return nil, fmt.Errorf("failed to get user credentials from node stage secrets: %w", err)
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -47,10 +47,10 @@ func execCommand(ctx context.Context, program string, args ...string) (stdout, s
|
||||
|
||||
if err := cmd.Run(); err != nil {
|
||||
if cmd.Process == nil {
|
||||
return nil, nil, fmt.Errorf("cannot get process pid while running %s %v: %v: %s",
|
||||
return nil, nil, fmt.Errorf("cannot get process pid while running %s %v: %w: %s",
|
||||
program, sanitizedArgs, err, stderrBuf.Bytes())
|
||||
}
|
||||
return nil, nil, fmt.Errorf("an error occurred while running (%d) %s %v: %v: %s",
|
||||
return nil, nil, fmt.Errorf("an error occurred while running (%d) %s %v: %w: %s",
|
||||
cmd.Process.Pid, program, sanitizedArgs, err, stderrBuf.Bytes())
|
||||
}
|
||||
|
||||
@ -70,7 +70,7 @@ func execCommandJSON(ctx context.Context, v interface{}, program string, args ..
|
||||
}
|
||||
|
||||
if err = json.Unmarshal(stdout, v); err != nil {
|
||||
return fmt.Errorf("failed to unmarshal JSON for %s %v: %s: %v", program, util.StripSecretInArgs(args), stdout, err)
|
||||
return fmt.Errorf("failed to unmarshal JSON for %s %v: %s: %w", program, util.StripSecretInArgs(args), stdout, err)
|
||||
}
|
||||
|
||||
return nil
|
||||
@ -79,7 +79,7 @@ func execCommandJSON(ctx context.Context, v interface{}, program string, args ..
|
||||
// Controller service request validation.
|
||||
func (cs *ControllerServer) validateCreateVolumeRequest(req *csi.CreateVolumeRequest) error {
|
||||
if err := cs.Driver.ValidateControllerServiceRequest(csi.ControllerServiceCapability_RPC_CREATE_DELETE_VOLUME); err != nil {
|
||||
return fmt.Errorf("invalid CreateVolumeRequest: %v", err)
|
||||
return fmt.Errorf("invalid CreateVolumeRequest: %w", err)
|
||||
}
|
||||
|
||||
if req.GetName() == "" {
|
||||
@ -102,7 +102,7 @@ func (cs *ControllerServer) validateCreateVolumeRequest(req *csi.CreateVolumeReq
|
||||
|
||||
func (cs *ControllerServer) validateDeleteVolumeRequest() error {
|
||||
if err := cs.Driver.ValidateControllerServiceRequest(csi.ControllerServiceCapability_RPC_CREATE_DELETE_VOLUME); err != nil {
|
||||
return fmt.Errorf("invalid DeleteVolumeRequest: %v", err)
|
||||
return fmt.Errorf("invalid DeleteVolumeRequest: %w", err)
|
||||
}
|
||||
|
||||
return nil
|
||||
@ -111,7 +111,7 @@ func (cs *ControllerServer) validateDeleteVolumeRequest() error {
|
||||
// Controller expand volume request validation.
|
||||
func (cs *ControllerServer) validateExpandVolumeRequest(req *csi.ControllerExpandVolumeRequest) error {
|
||||
if err := cs.Driver.ValidateControllerServiceRequest(csi.ControllerServiceCapability_RPC_EXPAND_VOLUME); err != nil {
|
||||
return fmt.Errorf("invalid ExpandVolumeRequest: %v", err)
|
||||
return fmt.Errorf("invalid ExpandVolumeRequest: %w", err)
|
||||
}
|
||||
|
||||
if req.GetVolumeId() == "" {
|
||||
|
@ -182,7 +182,7 @@ func mountFuse(ctx context.Context, mountPoint string, cr *util.Credentials, vol
|
||||
|
||||
pid, err := strconv.Atoi(string(match[1]))
|
||||
if err != nil {
|
||||
return fmt.Errorf("failed to parse FUSE daemon PID: %v", err)
|
||||
return fmt.Errorf("failed to parse FUSE daemon PID: %w", err)
|
||||
}
|
||||
|
||||
fusePidMapMtx.Lock()
|
||||
|
@ -334,7 +334,7 @@ func newVolumeOptionsFromMonitorList(volID string, options, secrets map[string]s
|
||||
}
|
||||
|
||||
if opts.ProvisionVolume, err = strconv.ParseBool(provisionVolumeBool); err != nil {
|
||||
return nil, nil, fmt.Errorf("failed to parse provisionVolume: %v", err)
|
||||
return nil, nil, fmt.Errorf("failed to parse provisionVolume: %w", err)
|
||||
}
|
||||
|
||||
if opts.ProvisionVolume {
|
||||
@ -376,7 +376,7 @@ func newVolumeOptionsFromStaticVolume(volID string, options map[string]string) (
|
||||
}
|
||||
|
||||
if staticVol, err = strconv.ParseBool(val); err != nil {
|
||||
return nil, nil, fmt.Errorf("failed to parse preProvisionedVolume: %v", err)
|
||||
return nil, nil, fmt.Errorf("failed to parse preProvisionedVolume: %w", err)
|
||||
}
|
||||
|
||||
if !staticVol {
|
||||
|
Reference in New Issue
Block a user