Fix Gold flake from gsutil fallback#50149
Conversation
| /// animation. | ||
| /// | ||
| /// The new value is clamped to the range set by [lowerBound] and [upperBound]. | ||
| /// The new value is clamped to the range set by [lowerBound] and |
There was a problem hiding this comment.
Trivial >80 character change to trigger framework tests.
| defaultComparator, | ||
| platform, | ||
| suffix: '${math.Random().nextInt(10000)}', | ||
| onCirrus: platform.environment.containsKey('CIRRUS_CI'), |
There was a problem hiding this comment.
This should work but we could run into similar problems on LUCI if we're caching anything there - we're not right now but we might in the future.
Should we just make it opt in to put it in the pkg folder so that local users can do that?
There was a problem hiding this comment.
Oh this will be different when I refactor for Luci. Do you mean we should default to using systemTempDirectory and set the flag for the other way around, to use the pkg folder if we are local?
There was a problem hiding this comment.
Yeah, although if we have to change this anyway for LUCI it's probably not a big deal either way.
|
Ok, I think using the Is there a way that I can invalidate the current pkg cache so it will take out the trash? Or will it eventually clean itself out? |
|
@fkorotkov may know how to kill a cache - I'm not aware of a way. |
|
Cirrus re-uploads cache if it changes. BTW if you want different caches for collaborators vs no you can add |
|
@fkorotkov - we've unintentionally introduced files into our caches that we don't want. Can we just clobber them all? |
|
I can kill |
|
Thanks! |
Thank you! |
|
We could also just update the fingerprint script (e.g. just add some string to the end of the output) in this pull so that future pulls will use a different cache. |
|
nuked it 🙌 |
|
I made a few teaks @dnfield, should be ready to go now. :) |
Description
This fixes the flake in #49917
The flake is caused by the fact that, for some PRs, an empty auth method is used in presubmit testing for contributors that cannot decrypt the service account. This empty auth method still creates an authorization file, although it is empty. This file was cached after the fact in a randomly generated folder. Later on, another PR may randomly choose the same directory and need authentication for tryjobs, but thinks it's already authenticated. 💣 💥
Additional re-factoring is already scheduled here to support Luci testing, with the eventual goal of removing the need for a service account at all. That work is being tracked by #49837 and #49749.
Related Issues
Fixes #49917
Fixes #50148
Tests
Client will re-authorize if gsutil is enabled
Checklist
Before you create this PR confirm that it meets all requirements listed below by checking the relevant checkboxes (
[x]). This will ensure a smooth and quick review process.///).flutter analyze --flutter-repo) does not report any problems on my PR.Breaking Change
Did any tests fail when you ran them? Please read Handling breaking changes.