-
Notifications
You must be signed in to change notification settings - Fork 17.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
proposal: cmd/vet: add check for common error mishandling pattern #20148
Comments
This seems worthwhile doing. I think the proof is in the pudding - let's implement it and see if it can be made to work as advertised. |
Hi, I'm not sure about the full context of those issues, but both these tools would catch the error, with this code https://play.golang.org/p/pkaWAqDUY0 as an example:
Both of them are included in this other tool: https://github.com/alecthomas/gometalinter I wonder if rather than having the effort duplicate, more gophers should be made aware by these tools via the https://golang.org website by adding a (third-party) tooling section (cc @rakyll). Or do you think having this check in the vet tool would bring any advantage over the existing tools in the ecosystem? Thank you. |
This is a refinement of #19727. |
It's worth pointing out that neither staticcheck nor errcheck fulfill Rob's requirements. Staticcheck doesn't actually catch this problem at all (yet), its output for https://play.golang.org/p/pkaWAqDUY0 is complaining about something unrelated. Errcheck does catch the issue – being the canonical tool for finding unchecked errors – but it's also a tool that's too noisy for a lot of people, see Rob's original message that mentions bufio.Writer.Write. |
On a slightly related note: I sometimes try to make it impossible to have this problem by trying to never reuse an error; specifically to never assign to an error value with Sometimes I get caught up though with code like this: val, err := doSomething()
if err != nil {
return err
}
val2, err2 := doSomethingElse()
if err2 != nil {
return err
} And then get confused why I'm returning |
I would go the opposite way. It's the |
Leaving on hold until @robpike has time to further explore a prototype. |
I'm not especially comfortable with the idea of ignoring errors when they are generally expected not to happen. It doesn't sound like a good idea, but perhaps I don't understand just how unlikely these errors are. It seems like the best case scenario is that you save three lines of code to panic on the error, and the worse case is that your program silently fails in a potentially subtle way. Is this something a lot of Gophers do in practice? Has anyone run errcheck against as sizeable amount of Go code to make sure this is the case? |
I have since found out that |
One downside to introducing this into go get, is that while it would introduce less noise than if go vet mimicked errcheck, it would require us to write code that is not consistent. In some cases we may need to explicitly discard an error, in others we won't. Inconsistencies degrade readability because each inconsistency adds noise or calls attention to something that's different for a real reason. In this case the inconsistency would not aid the reader and may raise questions for the reader. Example: If we need to call a function that returns an unimportant error, in between calling a function with an error and handling that error, we'll be required to insert fmt.Println("Welcome") // not required to signal intent to discard
n, err := doThing()
_ = metrics.Track("action", n, err) // required to signal intent to discard
if err != nil {
handleError(err)
return
} But this is one downside and it seems like the benefits would out way it. |
A solution via Go 2 Error Handling: #20803 (comment) |
I've found that nilness and ineffassign end up catching these cases. |
I think these two cases are fairly distinct.
It seems like the checker Rob described should have a low false positive rate already for this case. I would be curious to see a prototype explore this.
Due to things like
Weaker ways of inferring intent I can think of include:
|
|
Unless I'm misunderstanding something, this proposal wouldn't catch an issue I had recently: func (c Client) Close() {
c.Close() // returns type error
} Not realizing that |
Your problem there @yawaramin is that your outer function should be returning an |
Change https://go.dev/cl/590376 mentions this issue: |
Are these necessarily false positives?
Could we not explicitly assign and ignore the result?
Or
|
@yawaramin It's often fine to call the |
People have proposed adding a test to vet to catch certain unused errors. This can be very noisy, and there are many cases where the error is genuinely known to be nil and can be ignored, such as in a call to
bufio.Writer.Write
. Therefore a general "unused error" check will be too noisy and fail the precision criterion described incmd/vet/README
.However, my project has been badly bitten twice recently by a particular problem of unused errors that should be caught. The two looked schematically like these snippets:
I did some experiments to catch calls to functions with the type of
e
that did not catch the error, and found too may false positives for things likeos.Setenv
.However, since the real problem isn't that the error is discarded, but that it is discarded immediately before a check, I think it's worth trying a more targeted approach, one that would catch both of the problems in the snippets above.
The
-unusedresult
flag, on by default, already checks for things like calls tofmt.Sprintf
where the value is not used, which is clearly a bug - there is no other reason to callfmt.Sprintf
. That check works with a whitelist, but the problems in the examples above involved local functions that would never appear on a whitelist unless explicitly added when vet is called, which is error-prone (and not done in general).I therefore propose to add to the
-unusedresult
check a test for the specific case with these three properties:_
);It's point 3 that makes this work, I think, eliminating almost all the noise from calls to things like
os.Setenv
while catching the real bugs. If you just called an error function and then ask about the error, if there's no flow from the call to the check, you almost certainly made a mistake.Regarding the criteria:
Correctness: This is a real bug, and it's bitten our project twice with severe security problems as a result. This is a problem that needs fixing.
Frequency: It's hit our project twice, and our project isn't big. I believe the severity is high enough that even a modest frequency of hits justifies the fix. If I implement this, I predict it will find more.
Precision: I believe that rule 3 in this proposal should make it precise enough.
The text was updated successfully, but these errors were encountered: