


Is it safe to assume that any errors returned from strconv.Parse* functions must be due to bad input data?
Is it safe to assume that any error returned from the strconv.Parse function must be due to bad input data? This question involves the understanding of error handling of the strconv.Parse function. Typically, the error returned by the strconv.Parse function is indeed caused by the input data not being in the expected format. However, there are some special circumstances that need to be considered. Some errors may be due to the wrong type of input data, such as when converting a string to an integer and the string contains non-numeric characters. Additionally, there are edge cases, such as integer overflow or loss of floating point precision, that can also result in incorrect return values. Therefore, for errors returned from the strconv.Parse function, we cannot completely assume that they are caused by incorrect input data, but need to consider other possible factors.
Question content
During a recent code review, the reviewer raised questions about how I handle errors returned from strconv.ParseUint()
. This function is documented to return the converted uint value and the *strconv.NumError
specific type of error. The documentation mentions two sentinel errors of this type that can be returned (ErrSyntax
and ErrRange
), both of which mean that bad data was supplied to it. Depending on the interface of the function, any other error may also occur.
For my use case, I need to know if the string value I have is worth converting to a uint. If ParseUint
returns an error, and it's one of the sentinel errors, then I have the answer. But if the error returned is none of these, then I return it and stop execution. My reviewer asserted that I should assume that any error returned from
ParseUint means I gave it the wrong data, and that there is no need to check for sentinel errors, there is no reason to check for sentinel errors, Also the error is not returned (in my use case). They link to an example in the go standard library where an error from ParseUint is treated as a check for bad input data and never returned, and say there are many such examples.
Is this just a case of the library documentation missing a sentence? Or is it good to return an error when it is neither of these two errors? How should I reason? SolutionYes, it is safe to assume that the error in the
strconv.ParseXXX function is due to incorrect input data.
The way I read this is "Any errors in strconv.ParseXXX are
NumError and may be due to invalid numbers or bit size range errors". My understanding is that godocs try to outline as completely as possible the expected scope of a function call.
only errors you may see returned from the
strconv.ParseXXX function. If something else comes back, I'd consider it a documentation bug.
The above is the detailed content of Is it safe to assume that any errors returned from strconv.Parse* functions must be due to bad input data?. For more information, please follow other related articles on the PHP Chinese website!

The core features of Go include garbage collection, static linking and concurrency support. 1. The concurrency model of Go language realizes efficient concurrent programming through goroutine and channel. 2. Interfaces and polymorphisms are implemented through interface methods, so that different types can be processed in a unified manner. 3. The basic usage demonstrates the efficiency of function definition and call. 4. In advanced usage, slices provide powerful functions of dynamic resizing. 5. Common errors such as race conditions can be detected and resolved through getest-race. 6. Performance optimization Reuse objects through sync.Pool to reduce garbage collection pressure.

Go language performs well in building efficient and scalable systems. Its advantages include: 1. High performance: compiled into machine code, fast running speed; 2. Concurrent programming: simplify multitasking through goroutines and channels; 3. Simplicity: concise syntax, reducing learning and maintenance costs; 4. Cross-platform: supports cross-platform compilation, easy deployment.

Confused about the sorting of SQL query results. In the process of learning SQL, you often encounter some confusing problems. Recently, the author is reading "MICK-SQL Basics"...

The relationship between technology stack convergence and technology selection In software development, the selection and management of technology stacks are a very critical issue. Recently, some readers have proposed...

Golang ...

How to compare and handle three structures in Go language. In Go programming, it is sometimes necessary to compare the differences between two structures and apply these differences to the...

How to view globally installed packages in Go? In the process of developing with Go language, go often uses...

What should I do if the custom structure labels in GoLand are not displayed? When using GoLand for Go language development, many developers will encounter custom structure tags...


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

SublimeText3 Chinese version
Chinese version, very easy to use

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.