Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Requests that fail are not detected #1

Open
simon-weber opened this issue Dec 1, 2014 · 4 comments
Open

Requests that fail are not detected #1

simon-weber opened this issue Dec 1, 2014 · 4 comments

Comments

@simon-weber
Copy link
Contributor

...because currently we check for recorded responses and vcr.py will not record a response for requests that fail eg during the dns lookup.

@jayvdb
Copy link
Contributor

jayvdb commented Oct 16, 2015

As the test will almost certainly fail for a different reason, is this really an issue? attempts to start http is caught.
This seems more like a documentation task to me.

@simon-weber
Copy link
Contributor Author

I don't entirely remember the case which led me to open this, but I remember that the test was still passing. Maybe the failure was expected? Or it wasn't under test, so not asserted on?

@jayvdb
Copy link
Contributor

jayvdb commented Oct 16, 2015

expected failures always run that risk of not verifying the desired failure, but instead verifying that some unexpected failure occurred ;-)

Was it definitely a DNS lookup which sparked this issue?
Could it have been an alternative scheme which failed? e.g. irc://... or ftp://..

To play devils advocate again: If it performed a DNS lookup (successful or not), why is that within scope of this plugin whereas other types of failure within a http library (valueerrors, out of memory, disk cache, etc) would not be within scope.

If someones goal is to detect/prevent any network activity, https://github.com/ustudio/nose_connection_report/ looks like a more reliable 'approach'.

@simon-weber
Copy link
Contributor Author

Was it definitely a DNS lookup which sparked this issue?
Could it have been an alternative scheme which failed? e.g. irc://... or ftp://..

Yeah, it was a dns issue. I'd imagine that alternate schemes would cause a similar failure, but I'm not sure.

If someones goal is to detect/prevent any network activity, https://github.com/ustudio/nose_connection_report/ looks like a more reliable 'approach'.

Neat, I wasn't aware of that project. I think our goals are the same, but our solutions have different tradeoffs: detecthttp will give better performance at the cost of potential false negatives.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants