-
Notifications
You must be signed in to change notification settings - Fork 40.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Report parsing error in json serializer #63668
Report parsing error in json serializer #63668
Conversation
*(*interface{})(ptr) = f64 | ||
return | ||
} | ||
iter.ReportError("DecodeNumber", err.Error()) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This line is missing in the deleted snippet below. Everything else is exactly the same.
*(*interface{})(ptr) = iter.Read() | ||
} | ||
} | ||
jsoniter.RegisterTypeDecoderFunc("interface {}", decodeNumberAsInt64IfPossible) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This mutates some package level field inside of the library. 😞
/assign @roycaihw |
@kubernetes/sig-api-machinery-bugs PTAL |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sorry I didn't get to this earlier. It lgtm in general. I left one comment.
// Private copy of jsoniter.ConfigCompatibleWithStandardLibrary to try to shield against possible mutations | ||
// from outside. Still does not protect from package level jsoniter.Register*() functions - someone calling them | ||
// in some other library will mess with every usage of the jsoniter library in the whole program. | ||
// See https://github.com/json-iterator/go/issues/265 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the pointer. Is there any thing we can do to prevent misusing package level jsoniter.Register*() functions? Did a quick search in our code base and currently this file seems to be the only place using it.
Since I see your effort changing use of encoding/json
to github.com/json-iterator/go
, does it worth adding some linter/script in CI/makerule that blocks any use of jsoniter.Register*() functions, in case we adopt more and more use of jsoniter?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is there any thing we can do to prevent misusing package level jsoniter.Register*() functions? Did a quick search in our code base and currently this file seems to be the only place using it.
I think the right thing is to fix the library but the maintainer thinks it is not a problem so... We can have a linting script, as you pointed out. However, I just want to fix the bug and I don't have time to add a linter. Can create a ticket to track this work but I doubt anyone will pick it up :)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I agree with you and I see the maintainer's point. It would be great if you could open a ticket to track the linting work.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sure #64010
Thanks @ash2k. /lgtm |
/retest |
/assign deads2k |
/retest |
2 similar comments
/retest |
/retest |
// in some other library will mess with every usage of the jsoniter library in the whole program. | ||
// See https://github.com/json-iterator/go/issues/265 | ||
configCompatibleWithStandardLibrary = jsoniter.Config{ | ||
EscapeHTML: true, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this needs a test to detect drift.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is my biggest concert with this PR. Can we start with their struct and make a deepcopy or something? Can we get them (upstream) to have an immutable baseline object and then a mutable one that derives from that. Then we can skip th emutable one, but stay in sync with the base?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can we start with their struct and make a deepcopy or something?
We cannot make a copy because jsoniter.ConfigCompatibleWithStandardLibrary
is an interface.
Can we get them (upstream) to have an immutable baseline object and then a mutable one that derives from that. Then we can skip th emutable one, but stay in sync with the base?
I have tried to communicate the issue but failed. See json-iterator/go#265.
I don't want to boil the ocean here, just want to fix the bug. I can reduce the scope of this PR to just add the missing error handling line. WDYT?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I mean, it is sad, but... what else can I do?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can we get them to expose the pre-Froze() struct so we can copy that and Froze() it ourself?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Rather than race to get this in 1.11, is it a big deal to try to get good resolution to this issue and then aim for 1.12 ? Is there any real issue being triggered?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this can be delayed until later.
// in some other library will mess with every usage of the jsoniter library in the whole program. | ||
// See https://github.com/json-iterator/go/issues/265 | ||
configCompatibleWithStandardLibrary = jsoniter.Config{ | ||
EscapeHTML: true, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is my biggest concert with this PR. Can we start with their struct and make a deepcopy or something? Can we get them (upstream) to have an immutable baseline object and then a mutable one that derives from that. Then we can skip th emutable one, but stay in sync with the base?
// from outside. Still does not protect from package level jsoniter.Register*() functions - someone calling them | ||
// in some other library will mess with every usage of the jsoniter library in the whole program. | ||
// See https://github.com/json-iterator/go/issues/265 | ||
configCompatibleWithStandardLibrary = jsoniter.Config{ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do we use jsoniter elsewhere? I.e. do we need our ow pkg/util/json that exposes this?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
My plan was to use k8s.io/apimachinery/pkg/util/json
(which uses jsoniter) everywhere in k/k to get performance benefits across the board. See WIP #63284.
I'm going to approve this for now, but I I'm asking you to not drop this topic - I am sure we can get them to do something to make drift less likely. Loop me in if you need, please. /approve |
[MILESTONENOTIFIER] Milestone Pull Request Labels Incomplete @ash2k @deads2k @roycaihw @thockin Action required: This pull request requires label changes. If the required changes are not made within 3 days, the pull request will be moved out of the v1.11 milestone. priority: Must specify exactly one of |
Rather than race to get this in 1.11, is it a big deal to try to get good resolution to this issue and then aim for 1.12 ? Is there any real issue being triggered? |
sounds like a plan @thockin /milestone clear |
180529c
to
b76e512
Compare
@roycaihw lost LGTM due to rebase. Thanks |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: ash2k, roycaihw, thockin The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@dims can you cancel the hold please |
/hold cancel |
/test all [submit-queue is verifying that this PR is safe to merge] |
Automatic merge from submit-queue. If you want to cherry-pick this change to another branch, please follow the instructions here. |
What this PR does / why we need it:
Fixes missing error reporting in json parsing using the json-iterator library. Also introduces a private copy of the library config to partially shield from external mutations. json-iterator/go#265.
Special notes for your reviewer:
Found while working on refactoring in #63284.
Release note:
/kind bug
/sig api-machinery
/cc wojtek-t liggitt