Skip to content

Commit 8b5ab3a

Browse files
committed
exceptions
1 parent 1e57186 commit 8b5ab3a

File tree

2 files changed

+8
-7
lines changed

2 files changed

+8
-7
lines changed

plugins/core/jetbrains-community/src/software/aws/toolkits/jetbrains/core/credentials/ToolkitAuthManager.kt

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,14 @@
33

44
package software.aws.toolkits.jetbrains.core.credentials
55

6-
import com.intellij.ide.util.PropertiesComponent
76
import com.intellij.openapi.Disposable
87
import com.intellij.openapi.components.service
98
import com.intellij.openapi.extensions.ExtensionPointName
109
import com.intellij.openapi.progress.ProcessCanceledException
1110
import com.intellij.openapi.project.Project
1211
import migration.software.aws.toolkits.jetbrains.services.telemetry.TelemetryService
1312
import org.jetbrains.annotations.VisibleForTesting
13+
import software.amazon.awssdk.core.exception.SdkClientException
1414
import software.amazon.awssdk.services.ssooidc.model.SsoOidcException
1515
import software.aws.toolkits.core.ClientConnectionSettings
1616
import software.aws.toolkits.core.ConnectionSettings
@@ -341,7 +341,7 @@ fun maybeReauthProviderIfNeeded(
341341
onReauthRequired(e)
342342
return true
343343
}
344-
e is UnknownHostException || e is RuntimeException -> {
344+
e is UnknownHostException || e is SdkClientException -> {
345345
getLogger<ToolkitAuthManager>().warn(e) { "Failed to refresh token" }
346346
if (hasSeenFirstNetworkError.compareAndSet(false, true)) {
347347
notifyInfo(
@@ -350,7 +350,7 @@ fun maybeReauthProviderIfNeeded(
350350
project
351351
)
352352
}
353-
return false
353+
return false// throw here?
354354
}
355355
else -> { return false }
356356
}

plugins/core/jetbrains-community/tst/software/aws/toolkits/jetbrains/core/credentials/ToolkitAuthManagerTest.kt

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,7 @@ import software.aws.toolkits.jetbrains.core.credentials.sso.bearer.BearerTokenPr
3131
import software.aws.toolkits.jetbrains.core.credentials.sso.bearer.BearerTokenProviderListener
3232
import software.aws.toolkits.jetbrains.utils.notifyInfo
3333
import software.aws.toolkits.resources.AwsCoreBundle.message
34+
import java.net.UnknownHostException
3435
import java.time.Instant
3536
import java.time.temporal.ChronoUnit
3637

@@ -60,7 +61,7 @@ class ToolkitAuthManagerTest {
6061
@Test
6162
fun `test NEEDS_REFRESH state with network error - first occurrence`() {
6263
whenever(tokenProvider.state()).thenReturn(BearerTokenAuthState.NEEDS_REFRESH)
63-
doThrow(RuntimeException("Unable to execute HTTP request"))
64+
doThrow(UnknownHostException("Unable to execute HTTP request"))
6465
.whenever(tokenProvider)
6566
.resolveToken()
6667

@@ -84,7 +85,7 @@ class ToolkitAuthManagerTest {
8485
@Test
8586
fun `test NEEDS_REFRESH state with network error - subsequent occurrence`() {
8687
whenever(tokenProvider.state()).thenReturn(BearerTokenAuthState.NEEDS_REFRESH)
87-
doThrow(RuntimeException("Unable to execute HTTP request"))
88+
doThrow(UnknownHostException("Unable to execute HTTP request"))
8889
.`when`(tokenProvider)
8990
.resolveToken()
9091

@@ -118,7 +119,7 @@ class ToolkitAuthManagerTest {
118119
whenever(tokenProvider.state()).thenReturn(BearerTokenAuthState.NEEDS_REFRESH)
119120

120121
// First trigger a network error
121-
doThrow(RuntimeException("Unable to execute HTTP request"))
122+
doThrow(UnknownHostException("Unable to execute HTTP request"))
122123
.`when`(tokenProvider)
123124
.resolveToken()
124125

@@ -150,7 +151,7 @@ class ToolkitAuthManagerTest {
150151
reset(tokenProvider)
151152
// Now trigger another network error - should show notification again
152153
whenever(tokenProvider.state()).thenReturn(BearerTokenAuthState.NEEDS_REFRESH)
153-
doThrow(RuntimeException("Unable to execute HTTP request"))
154+
doThrow(UnknownHostException("Unable to execute HTTP request"))
154155
.`when`(tokenProvider)
155156
.resolveToken()
156157
maybeReauthProviderIfNeeded(

0 commit comments

Comments
 (0)