-
Notifications
You must be signed in to change notification settings - Fork 356
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: patch request body parsing for model metadata [DET-3939] #1144
Conversation
the swagger error seems to come from determined/proto/scripts/swagger.py Line 50 in a9d7007
update: yep this is it. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@@ -77,8 +77,6 @@ message PostModelResponse { | |||
message PatchModelRequest { | |||
// The model desired model fields and values. | |||
determined.model.v1.Model model = 1; | |||
// An update mask for the above model. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit: can we remove the fieldmask import as well
This is the case #1144 (review). There is no way to differentiate between a user not sending the field and the user attempting to clear the field. |
I think we could separate the patch requests into multiple endpoints and that'd fix this but I'm not sure that's more ideal especially considering we're waiting on this for release. |
Make an error message for token invalidation more informative. It wraps the `jwt` error so that `errors.Is()` recognizes it down stream. The error message now reads "token is expired since it has been invalidated". (cherry picked from commit 3f80919fe224a6cec7e2fab526f660c888b0413d)
Make an error message for token invalidation more informative. It wraps the `jwt` error so that `errors.Is()` recognizes it down stream. The error message now reads "token is expired since it has been invalidated".
Make an error message for token invalidation more informative. It wraps the `jwt` error so that `errors.Is()` recognizes it down stream. The error message now reads "token is expired since it has been invalidated".
Make an error message for token invalidation more informative. It wraps the `jwt` error so that `errors.Is()` recognizes it down stream. The error message now reads "token is expired since it has been invalidated".
Make an error message for token invalidation more informative. It wraps the `jwt` error so that `errors.Is()` recognizes it down stream. The error message now reads "token is expired since it has been invalidated".
Description
It is unclear why this changed, however patch requests weren't parsing the request body. The update mask was automatically filled in though. I suspect something in the grpc reverse proxy is to blame but wasn't able to root cause this issue. This PR offers the same functionality as before but uses the
body: "*"
request parsing.Test Plan
Adding a better E2E test as a follow on.
Commentary (optional)