-
Notifications
You must be signed in to change notification settings - Fork 124
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore: Update slinky version #1768
Changes from 6 commits
3a72cb6
8e9ace0
ae42e73
ce7bfed
2fecfec
14fe18d
eab0745
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -29,12 +29,12 @@ func (g *GrpcClientImpl) NewGrpcConnection( | |
ctx context.Context, | ||
socketAddress string, | ||
) (*grpc.ClientConn, error) { | ||
return grpc.DialContext( | ||
return grpc.DialContext( //nolint:staticcheck | ||
ctx, | ||
socketAddress, | ||
grpc.WithTransportCredentials(insecure.NewCredentials()), | ||
// https://github.com/grpc/grpc-go/blob/master/dialoptions.go#L264 | ||
grpc.WithBlock(), | ||
grpc.WithBlock(), //nolint:staticcheck | ||
Comment on lines
+32
to
+37
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Tip Codebase Verification Lack of justification for The
Please provide documentation or comments explaining why these static analysis warnings are being suppressed. Analysis chainReview of static analysis suppression annotations. The use of Scripts executedThe following scripts were executed for the analysis: Script: #!/bin/bash
# Description: Verify that these suppressions are documented elsewhere in the repository.
# Test: Search for documentation on nolint usage. Expect: Documentation or comments explaining the usage.
rg "//nolint:staticcheck" -C 5
Length of output: 59316 |
||
grpc.WithContextDialer(func(ctx context.Context, addr string) (net.Conn, error) { | ||
// Create a custom `net.Dialer` in order to specify `unix` as the desired network. | ||
var dialer net.Dialer | ||
|
@@ -48,11 +48,11 @@ func (g *GrpcClientImpl) NewTcpConnection( | |
ctx context.Context, | ||
endpoint string, | ||
) (*grpc.ClientConn, error) { | ||
return grpc.DialContext( | ||
return grpc.DialContext( //nolint:staticcheck | ||
ctx, | ||
endpoint, | ||
grpc.WithTransportCredentials(insecure.NewCredentials()), | ||
grpc.WithBlock(), | ||
grpc.WithBlock(), //nolint:staticcheck | ||
Comment on lines
+51
to
+55
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Tip Codebase Verification Documentation for The search results indicate multiple instances of
Please ensure that the usage of Analysis chainReview of static analysis suppression annotations in TCP connection setup. The Scripts executedThe following scripts were executed for the analysis: Script: #!/bin/bash
# Description: Verify that these suppressions are documented elsewhere in the repository.
# Test: Search for documentation on nolint usage. Expect: Documentation or comments explaining the usage.
rg "//nolint:staticcheck" -C 5
Length of output: 59316 |
||
) | ||
} | ||
|
||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ensure proper error handling for Oracle configuration.
The Oracle configuration in
DydxAppConfig
lacks error handling for potential connectivity issues with the Oracle server. Given the critical role of Oracles in blockchain applications, robust error handling and fallback mechanisms are essential.+ // TODO: Add error handling for Oracle connectivity issues.