Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Tools: Annotate NRTs #24226

Merged
1 commit merged into from
Feb 23, 2021
Merged

Tools: Annotate NRTs #24226

1 commit merged into from
Feb 23, 2021

Conversation

bricelam
Copy link
Contributor

Part of #19007

@bricelam bricelam requested a review from a team February 22, 2021 23:39
Copy link
Member

@roji roji left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Great to see this.

@@ -28,11 +28,11 @@ internal static class Exe
startInfo.WorkingDirectory = workingDirectory;
}

var process = Process.Start(startInfo);
var process = Process.Start(startInfo)!;
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just for kicks, Process.Start can indeed return null in some circumstances (process could not be started? Not sure when you get null and when an exception...)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I noticed that, but decided that a null-ref was just as useful as any message we could throw: "Couldn't start a process. Try FORMAT C:\ then run dotnet-ef again."

src/ef/AnsiTextWriter.cs Show resolved Hide resolved
src/ef/Commands/DbContextListCommand.cs Show resolved Hide resolved
_suppressOnConfiguring.HasValue(),
_noPluralize.HasValue());
if (_json.HasValue())
_provider!.Value!,
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Another strategy is to annotate these as non-nullable and force-initialize to null, encoding the assumption that they will only be accessed after Configure has completed. That restricts the ugliness to the initialization, rather than every time they're accessed. If all accesses to these are always gonna have a bang, might as well...

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I like it this way better. You could, although it's unlikely, add new code that tries to use them before Init (or in this case, Configure) is called.

All of the warnings reinforce how bad the Init pattern is, and will remind me to try even harder avoid it in the future. 😉

@ghost
Copy link

ghost commented Feb 23, 2021

Hello @bricelam!

Because this pull request has the auto-merge label, I will be glad to assist with helping to merge this pull request once all check-in policies pass.

p.s. you can customize the way I help with merging this pull request, such as holding this pull request until a specific person approves. Simply @mention me (@msftbot) and give me an instruction to get started! Learn more here.

@ghost
Copy link

ghost commented Feb 23, 2021

Apologies, while this PR appears ready to be merged, I've been configured to only merge when all checks have explicitly passed. The following integrations have not reported any progress on their checks and are blocking auto-merge:

  1. Azure Pipelines

These integrations are possibly never going to report a check, and unblocking auto-merge likely requires a human being to update my configuration to exempt these integrations from requiring a passing check.

Give feedback on this
From the bot dev team

We've tried to tune the bot such that it posts a comment like this only when auto-merge is blocked for exceptional, non-intuitive reasons. When the bot's auto-merge capability is properly configured, auto-merge should operate as you would intuitively expect and you should not see any spurious comments.

Please reach out to us at [email protected] to provide feedback if you believe you're seeing this comment appear spuriously. Please note that we usually are unable to update your bot configuration on your team's behalf, but we're happy to help you identify your bot admin.

@ghost ghost merged commit 3278828 into dotnet:main Feb 23, 2021
@roji roji linked an issue Feb 25, 2021 that may be closed by this pull request
23 tasks
@bricelam bricelam deleted the nrtt branch February 26, 2021 19:53
This pull request was closed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Annotate EF Core for nullable reference types
2 participants