Index: vpython/venv/venv_resources_test.go |
diff --git a/vpython/venv/venv_resources_test.go b/vpython/venv/venv_resources_test.go |
index 96e78942076eb4f4265fd7a91f4de305c2c924d6..51d73bebaba55db36f2e48a06425a7b23239c8a2 100644 |
--- a/vpython/venv/venv_resources_test.go |
+++ b/vpython/venv/venv_resources_test.go |
@@ -91,12 +91,12 @@ type testingLoader struct { |
func loadTestEnvironment(ctx context.Context, t *testing.T) (*testingLoader, error) { |
wd, err := os.Getwd() |
if err != nil { |
- return nil, errors.Annotate(err).Reason("failed to get working directory").Err() |
+ return nil, errors.Annotate(err, "failed to get working directory").Err() |
} |
cacheDir := filepath.Join(wd, ".venv_test_cache") |
if err := filesystem.MakeDirs(cacheDir); err != nil { |
- return nil, errors.Annotate(err).Reason("failed to create cache dir").Err() |
+ return nil, errors.Annotate(err, "failed to create cache dir").Err() |
} |
tl := testingLoader{ |
@@ -158,9 +158,7 @@ func (tl *testingLoader) installPackage(name, root string) error { |
return copyFileIntoDir(tl.pantsWheelPath, root) |
default: |
- return errors.Reason("don't know how to install %(package)q"). |
- D("package", name). |
- Err() |
+ return errors.Reason("don't know how to install %q", name).Err() |
} |
} |
@@ -168,9 +166,7 @@ func (tl *testingLoader) buildWheelLocked(t *testing.T, py *python.Interpreter, |
ctx := context.Background() |
w, err := wheel.ParseName(name) |
if err != nil { |
- return "", errors.Annotate(err).Reason("failed to parse wheel name %(name)q"). |
- D("name", name). |
- Err() |
+ return "", errors.Annotate(err, "failed to parse wheel name %q", name).Err() |
} |
outWheelPath := filepath.Join(outDir, w.String()) |
@@ -184,9 +180,7 @@ func (tl *testingLoader) buildWheelLocked(t *testing.T, py *python.Interpreter, |
break |
default: |
- return "", errors.Annotate(err).Reason("failed to stat wheel path [%(path)s]"). |
- D("path", outWheelPath). |
- Err() |
+ return "", errors.Annotate(err, "failed to stat wheel path [%s]", outWheelPath).Err() |
} |
srcDir := filepath.Join(testDataDir, w.Distribution+".src") |
@@ -234,22 +228,22 @@ func (tl *testingLoader) buildWheelLocked(t *testing.T, py *python.Interpreter, |
"--dist-dir", distDir) |
cmd.Dir = srcDir |
if err := cmd.Run(); err != nil { |
- return errors.Annotate(err).Reason("failed to build wheel").Err() |
+ return errors.Annotate(err, "failed to build wheel").Err() |
} |
return nil |
}) |
if err != nil { |
- return errors.Annotate(err).Reason("failed to build wheel").Err() |
+ return errors.Annotate(err, "failed to build wheel").Err() |
} |
// Assert that the expected wheel file was generated, and copy it into |
// outDir. |
wheelPath := filepath.Join(distDir, w.String()) |
if _, err := os.Stat(wheelPath); err != nil { |
- return errors.Annotate(err).Reason("failed to generate wheel").Err() |
+ return errors.Annotate(err, "failed to generate wheel").Err() |
} |
if err := copyFileIntoDir(wheelPath, outDir); err != nil { |
- return errors.Annotate(err).Reason("failed to install wheel").Err() |
+ return errors.Annotate(err, "failed to install wheel").Err() |
} |
return nil |
@@ -298,9 +292,7 @@ MainLoop: |
t.Logf("Failed to load from URL %q: %s", url, err) |
} |
- return errors.Reason("failed to acquire remote file %(name)q"). |
- D("name", rf.name). |
- Err() |
+ return errors.Reason("failed to acquire remote file %q", rf.name).Err() |
} |
return nil |
@@ -313,13 +305,13 @@ func getCachedFileLocked(t *testing.T, cachePath, hash string) error { |
func validateHash(t *testing.T, path, hash string, deleteIfInvalid bool) error { |
fd, err := os.Open(path) |
if err != nil { |
- return errors.Annotate(err).Reason("failed to open file").Err() |
+ return errors.Annotate(err, "failed to open file").Err() |
} |
defer fd.Close() |
h := sha256.New() |
if _, err := io.Copy(h, fd); err != nil { |
- return errors.Annotate(err).Reason("failed to hash file").Err() |
+ return errors.Annotate(err, "failed to hash file").Err() |
} |
if err := hashesEqual(h, hash); err != nil { |
@@ -338,10 +330,7 @@ func validateHash(t *testing.T, path, hash string, deleteIfInvalid bool) error { |
func hashesEqual(h hash.Hash, expected string) error { |
if v := hex.EncodeToString(h.Sum(nil)); v != expected { |
- return errors.Reason("hash %(actual)q doesn't match expected %(expected)q"). |
- D("actual", v). |
- D("expected", expected). |
- Err() |
+ return errors.Reason("hash %q doesn't match expected %q", v, expected).Err() |
} |
return nil |
} |
@@ -358,19 +347,16 @@ func cacheFromCIPDLocked(ctx context.Context, t *testing.T, cachePath, name, has |
client, err := cipd.NewClient(opts) |
if err != nil { |
- return errors.Annotate(err).Reason("failed to create CIPD client").Err() |
+ return errors.Annotate(err, "failed to create CIPD client").Err() |
} |
pin, err := client.ResolveVersion(ctx, pkg, version) |
if err != nil { |
- return errors.Annotate(err).Reason("failed to resolve CIPD version for %(pkg)s @%(version)s"). |
- D("pkg", pkg). |
- D("version", version). |
- Err() |
+ return errors.Annotate(err, "failed to resolve CIPD version for %s @%s", pkg, version).Err() |
} |
if err := client.FetchAndDeployInstance(ctx, "", pin); err != nil { |
- return errors.Annotate(err).Reason("failed to fetch/deploy CIPD package").Err() |
+ return errors.Annotate(err, "failed to fetch/deploy CIPD package").Err() |
} |
path := filepath.Join(opts.Root, name) |
@@ -380,7 +366,7 @@ func cacheFromCIPDLocked(ctx context.Context, t *testing.T, cachePath, name, has |
} |
if err := copyFile(path, cachePath, nil); err != nil { |
- return errors.Annotate(err).Reason("failed to install CIPD package file").Err() |
+ return errors.Annotate(err, "failed to install CIPD package file").Err() |
} |
return nil |
@@ -400,14 +386,14 @@ func cacheFromURLLocked(t *testing.T, cachePath, hash, url string) (err error) { |
} |
defer func() { |
if closeErr := fd.Close(); closeErr != nil && err == nil { |
- err = errors.Annotate(closeErr).Reason("failed to close file").Err() |
+ err = errors.Annotate(closeErr, "failed to close file").Err() |
} |
}() |
h := sha256.New() |
tr := io.TeeReader(resp.Body, h) |
if _, err := io.Copy(fd, tr); err != nil { |
- return errors.Annotate(err).Reason("failed to download").Err() |
+ return errors.Annotate(err, "failed to download").Err() |
} |
if err = hashesEqual(h, hash); err != nil { |
@@ -419,7 +405,7 @@ func cacheFromURLLocked(t *testing.T, cachePath, hash, url string) (err error) { |
func unzip(src, dst string) error { |
fd, err := zip.OpenReader(src) |
if err != nil { |
- return errors.Annotate(err).Reason("failed to open ZIP reader").Err() |
+ return errors.Annotate(err, "failed to open ZIP reader").Err() |
} |
defer fd.Close() |
@@ -430,7 +416,7 @@ func unzip(src, dst string) error { |
// Unzip this entry. |
if fi.IsDir() { |
if err := os.MkdirAll(path, 0755); err != nil { |
- return errors.Annotate(err).Reason("failed to mkdir").Err() |
+ return errors.Annotate(err, "failed to mkdir").Err() |
} |
} else { |
if err := copyFileOpener(f.Open, path, fi); err != nil { |
@@ -453,26 +439,26 @@ func copyFile(src, dst string, fi os.FileInfo) error { |
func copyFileOpener(opener func() (io.ReadCloser, error), dst string, fi os.FileInfo) (err error) { |
sfd, err := opener() |
if err != nil { |
- return errors.Annotate(err).Reason("failed to open source").Err() |
+ return errors.Annotate(err, "failed to open source").Err() |
} |
defer sfd.Close() |
dfd, err := os.Create(dst) |
if err != nil { |
- return errors.Annotate(err).Reason("failed to create destination").Err() |
+ return errors.Annotate(err, "failed to create destination").Err() |
} |
defer func() { |
if closeErr := dfd.Close(); closeErr != nil && err == nil { |
- err = errors.Annotate(closeErr).Reason("failed to close destination").Err() |
+ err = errors.Annotate(closeErr, "failed to close destination").Err() |
} |
}() |
if _, err := io.Copy(dfd, sfd); err != nil { |
- return errors.Annotate(err).Reason("failed to copy file").Err() |
+ return errors.Annotate(err, "failed to copy file").Err() |
} |
if fi != nil { |
if err := os.Chmod(dst, fi.Mode()); err != nil { |
- return errors.Annotate(err).Reason("failed to chmod").Err() |
+ return errors.Annotate(err, "failed to chmod").Err() |
} |
} |
return nil |