Fix silent error suppression across workflow engine#114
Merged
Conversation
…, distributed lock, integration, http handlers Co-authored-by: intel352 <77607+intel352@users.noreply.github.com>
Copilot
AI
changed the title
[WIP] Audit and fix silent error suppression across repositories
Fix silent error suppression across workflow engine
Feb 23, 2026
Contributor
There was a problem hiding this comment.
Pull request overview
This PR systematically fixes silent error suppression across the workflow engine by adding logging for previously ignored errors in persistence operations, distributed locking, HTTP response writes, and seed data loading. The changes make production failures visible without altering the non-fatal error handling semantics that allow operations to continue.
Changes:
- Added structured logger field to
JWTAuthModuleand logged seed file load failures - Logged persistence save/delete errors in REST API handlers using existing logger
- Logged Redis lock release failures, HTTP body close errors, and response write failures using
log.Printf
Reviewed changes
Copilot reviewed 8 out of 8 changed files in this pull request and generated no comments.
Show a summary per file
| File | Description |
|---|---|
scale/distributed_lock.go |
Added logging for Redis lock release failures in buildRelease function |
module/jwt_auth.go |
Added logger field initialization and logged seed user load failures |
module/integration.go |
Logged HTTP response body close, request body close, and webhook response write errors |
module/http_trigger.go |
Logged HTTP response write errors in workflow trigger handler |
module/http_handlers.go |
Logged JSON encode errors in simple HTTP handler |
module/api_workflow_handler.go |
Logged persistence save errors during workflow state sync |
module/api_v1_handler.go |
Logged workflow stop errors in admin API |
module/api_crud_handler.go |
Logged persistence save and delete errors in POST, PUT, DELETE operations |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Errors captured but never logged or returned, making failures invisible in production. Affects persistence operations, distributed locking, seed loading, and HTTP response writes.
Changes
module/jwt_auth.gologger modular.Loggerfield toJWTAuthModule, initialized viaapp.Logger()inInit()Warninstead of_ = err(comment already said "log but don't prevent startup")module/api_crud_handler.go/module/api_workflow_handler.goSaveResource/DeleteResourceerrors now logged viah.logger.Warn()on POST, PUT, DELETE, and state syncmodule/api_v1_handler.goStopWorkflowfailure now logged vialog.Printf(comment said "Log but don't fail" but didn't)scale/distributed_lock.gobuildReleasenow logged vialog.Printfmodule/integration.goresp.Body.Close(),r.Body.Close(), andw.Write()errors in HTTP/webhook connectors now logged vialog.Printfmodule/http_trigger.go/module/http_handlers.golog.PrintfExample (before/after)
Original prompt
🔒 GitHub Advanced Security automatically protects Copilot coding agent pull requests. You can protect all pull requests by enabling Advanced Security for your repositories. Learn more about Advanced Security.