@@ -15,13 +15,12 @@ package events
15
15
16
16
import (
17
17
"encoding/json"
18
+ "errors"
18
19
"fmt"
19
20
"os"
20
21
"path/filepath"
21
22
"strings"
22
23
23
- "github.com/hashicorp/go-multierror"
24
- "github.com/pkg/errors"
25
24
"github.com/runatlantis/atlantis/server/core/config/valid"
26
25
"github.com/runatlantis/atlantis/server/core/runtime"
27
26
"github.com/runatlantis/atlantis/server/events/command"
@@ -347,7 +346,7 @@ func (p *DefaultProjectCommandRunner) doApprovePolicies(ctx command.ProjectConte
347
346
// Acquire Atlantis lock for this repo/dir/workspace.
348
347
lockAttempt , err := p .Locker .TryLock (ctx .Log , ctx .Pull , ctx .User , ctx .Workspace , models .NewProject (ctx .Pull .BaseRepo .FullName , ctx .RepoRelDir , ctx .ProjectName ), ctx .RepoLocksMode == valid .RepoLocksOnPlanMode )
349
348
if err != nil {
350
- return nil , "" , errors . Wrap ( err , "acquiring lock" )
349
+ return nil , "" , fmt . Errorf ( "acquiring lock: %w" , err )
351
350
}
352
351
if ! lockAttempt .LockAcquired {
353
352
return nil , lockAttempt .LockFailureReason , nil
@@ -408,10 +407,10 @@ func (p *DefaultProjectCommandRunner) doApprovePolicies(ctx command.ProjectConte
408
407
}
409
408
// User matches the author and prevent self approve is set to true
410
409
} else if isOwner && ! ignorePolicy && ctx .User .Username == ctx .Pull .Author && policySet .PreventSelfApprove {
411
- prjErr = multierror . Append (prjErr , fmt .Errorf ("policy set: %s the author of pr %s matches the command commenter user %s - please contact another policy owners to approve failing policies" , policySet .Name , ctx .Pull .Author , ctx .User .Username ))
410
+ prjErr = errors . Join (prjErr , fmt .Errorf ("policy set: %s the author of pr %s matches the command commenter user %s - please contact another policy owners to approve failing policies" , policySet .Name , ctx .Pull .Author , ctx .User .Username ))
412
411
// User is not authorized to approve policy set.
413
412
} else if ! ignorePolicy {
414
- prjErr = multierror . Append (prjErr , fmt .Errorf ("policy set: %s user %s is not a policy owner - please contact policy owners to approve failing policies" , policySet .Name , ctx .User .Username ))
413
+ prjErr = errors . Join (prjErr , fmt .Errorf ("policy set: %s user %s is not a policy owner - please contact policy owners to approve failing policies" , policySet .Name , ctx .User .Username ))
415
414
}
416
415
// Still bubble up this failure, even if policy set is not targeted.
417
416
if ! policyStatus .Passed && (prjPolicyStatus [i ].Approvals != policySet .ApproveCount ) {
@@ -449,7 +448,7 @@ func (p *DefaultProjectCommandRunner) doPolicyCheck(ctx command.ProjectContext)
449
448
lockAttempt , err := p .Locker .TryLock (ctx .Log , ctx .Pull , ctx .User , ctx .Workspace , models .NewProject (ctx .Pull .BaseRepo .FullName , ctx .RepoRelDir , ctx .ProjectName ), ctx .RepoLocksMode == valid .RepoLocksOnPlanMode )
450
449
451
450
if err != nil {
452
- return nil , "" , errors . Wrap ( err , "acquiring lock" )
451
+ return nil , "" , fmt . Errorf ( "acquiring lock: %w" , err )
453
452
}
454
453
if ! lockAttempt .LockAcquired {
455
454
return nil , lockAttempt .LockFailureReason , nil
@@ -502,7 +501,7 @@ func (p *DefaultProjectCommandRunner) doPolicyCheck(ctx command.ProjectContext)
502
501
}
503
502
// Exclude errors for failed policies
504
503
if ! strings .Contains (err .Error (), "some policies failed" ) {
505
- errs = multierror . Append (errs , err )
504
+ errs = errors . Join (errs , err )
506
505
}
507
506
}
508
507
@@ -567,7 +566,7 @@ func (p *DefaultProjectCommandRunner) doPlan(ctx command.ProjectContext) (*model
567
566
// Acquire Atlantis lock for this repo/dir/workspace.
568
567
lockAttempt , err := p .Locker .TryLock (ctx .Log , ctx .Pull , ctx .User , ctx .Workspace , models .NewProject (ctx .Pull .BaseRepo .FullName , ctx .RepoRelDir , ctx .ProjectName ), ctx .RepoLocksMode == valid .RepoLocksOnPlanMode )
569
568
if err != nil {
570
- return nil , "" , errors . Wrap ( err , "acquiring lock" )
569
+ return nil , "" , fmt . Errorf ( "acquiring lock: %w" , err )
571
570
}
572
571
if ! lockAttempt .LockAcquired {
573
572
return nil , lockAttempt .LockFailureReason , nil
@@ -644,7 +643,7 @@ func (p *DefaultProjectCommandRunner) doApply(ctx command.ProjectContext) (apply
644
643
// Acquire Atlantis lock for this repo/dir/workspace.
645
644
lockAttempt , err := p .Locker .TryLock (ctx .Log , ctx .Pull , ctx .User , ctx .Workspace , models .NewProject (ctx .Pull .BaseRepo .FullName , ctx .RepoRelDir , ctx .ProjectName ), ctx .RepoLocksMode == valid .RepoLocksOnApplyMode )
646
645
if err != nil {
647
- return "" , "" , errors . Wrap ( err , "acquiring lock" )
646
+ return "" , "" , fmt . Errorf ( "acquiring lock: %w" , err )
648
647
}
649
648
if ! lockAttempt .LockAcquired {
650
649
return "" , lockAttempt .LockFailureReason , nil
@@ -724,7 +723,7 @@ func (p *DefaultProjectCommandRunner) doImport(ctx command.ProjectContext) (out
724
723
// Acquire Atlantis lock for this repo/dir/workspace.
725
724
lockAttempt , err := p .Locker .TryLock (ctx .Log , ctx .Pull , ctx .User , ctx .Workspace , models .NewProject (ctx .Pull .BaseRepo .FullName , ctx .RepoRelDir , ctx .ProjectName ), ctx .RepoLocksMode != valid .RepoLocksDisabledMode )
726
725
if err != nil {
727
- return nil , "" , errors . Wrap ( err , "acquiring lock" )
726
+ return nil , "" , fmt . Errorf ( "acquiring lock: %w" , err )
728
727
}
729
728
if ! lockAttempt .LockAcquired {
730
729
return nil , lockAttempt .LockFailureReason , nil
@@ -765,7 +764,7 @@ func (p *DefaultProjectCommandRunner) doStateRm(ctx command.ProjectContext) (out
765
764
// Acquire Atlantis lock for this repo/dir/workspace.
766
765
lockAttempt , err := p .Locker .TryLock (ctx .Log , ctx .Pull , ctx .User , ctx .Workspace , models .NewProject (ctx .Pull .BaseRepo .FullName , ctx .RepoRelDir , ctx .ProjectName ), ctx .RepoLocksMode != valid .RepoLocksDisabledMode )
767
766
if err != nil {
768
- return nil , "" , errors . Wrap ( err , "acquiring lock" )
767
+ return nil , "" , fmt . Errorf ( "acquiring lock: %w" , err )
769
768
}
770
769
if ! lockAttempt .LockAcquired {
771
770
return nil , lockAttempt .LockFailureReason , nil
0 commit comments