-
Notifications
You must be signed in to change notification settings - Fork 288
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Various cleanups enabled by bumping minimum Java and Error Prone versions #962
Conversation
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## master #962 +/- ##
============================================
+ Coverage 86.11% 86.17% +0.05%
+ Complexity 2040 2037 -3
============================================
Files 81 81
Lines 6707 6691 -16
Branches 1293 1290 -3
============================================
- Hits 5776 5766 -10
+ Misses 518 515 -3
+ Partials 413 410 -3 ☔ View full report in Codecov by Sentry. |
// NOTE: this code only handles the case where the message digest algorithm used when signing | ||
// was SHA-256. Eventually we may need a more robust solution for other digest algorithms. | ||
// E.g., on JDK 21, the default message digest algorithm is SHA-384, and this code does not | ||
// work for that algorithm (the DIGEST_ENTRY_PATTERN regex is hardcoded for SHA-256) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Discovered by switching to the newer API for signing jars, which exposed this issue on JDK 21
These warning suppressions and compatibility code are no longed needed given minimum JDK 11 and Error Prone 2.14.0