-
Notifications
You must be signed in to change notification settings - Fork 68
Add new flag to use non-zero exit code when checks fail #1316
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Add new flag to use non-zero exit code when checks fail #1316
Conversation
|
from change #1316: |
bcrochet
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Alternative...
9693aed to
f9ebd56
Compare
|
from change #1316: |
bcrochet
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Great direction, but another suggestion.
f9ebd56 to
12db948
Compare
|
from change #1316: |
Code Review by GeminiHere's a review of the provided code changes, focusing on security, best practices, performance, and idiomatic Go. Overall ImpressionThe changes introduce a useful feature for controlling the exit code of the Specific Feedback and Suggestions
|
12db948 to
1250266
Compare
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: acornett21, caxu-rh The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Code Review by GeminiThe changes introduce a new CLI flag to control the exit code behavior of the Here's a review focusing on the requested aspects: 1. Security VulnerabilitiesNo direct security vulnerabilities are introduced by these changes. The modifications are primarily related to command-line flag parsing and error handling, which do not expose new attack surfaces or introduce insecure patterns. 2. Adherence to Best Practices
3. Performance OptimizationsThe changes are in the control flow and error handling paths, which are not performance-critical. The impact on performance is negligible and not a concern. 4. Idiomatic Go
Specific Feedback and Suggestions
Overall, this is a well-implemented and thoughtful change that significantly improves the usability and automation capabilities of the No critical issues or major improvements are needed. |
|
from change #1316: |
|
/test 4.20-e2e |
|
/test 4.20-images |
|
/test 4.13-images |
|
/test 4.20-images |
|
/retest-required |
bcrochet
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A couple of suggestions...
1250266 to
83780fe
Compare
|
from change #1316: |
Signed-off-by: Caleb Xu <[email protected]>
83780fe to
99c208e
Compare
|
from change #1316: |
viperincli; alternatively, we could add the flag into theCheckConfigstruct (but this would require changing howCheckConfigstructs are initialized/created in several places). Similarly, the flag could also be added as an additional parameter inRunPreflight, but this would require changing places which expect the existing function signature.