Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Various cleanups enabled by bumping minimum Java and Error Prone versions #962

Merged
merged 11 commits into from
Jun 4, 2024

Conversation

msridhar
Copy link
Collaborator

@msridhar msridhar commented May 31, 2024

These warning suppressions and compatibility code are no longed needed given minimum JDK 11 and Error Prone 2.14.0

Copy link

codecov bot commented Jun 1, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 86.17%. Comparing base (0ab6c22) to head (09762dc).

Current head 09762dc differs from pull request most recent head 1b2160b

Please upload reports for the commit 1b2160b to get more accurate results.

Additional details and impacted files
@@             Coverage Diff              @@
##             master     #962      +/-   ##
============================================
+ Coverage     86.11%   86.17%   +0.05%     
+ Complexity     2040     2037       -3     
============================================
  Files            81       81              
  Lines          6707     6691      -16     
  Branches       1293     1290       -3     
============================================
- Hits           5776     5766      -10     
+ Misses          518      515       -3     
+ Partials        413      410       -3     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@msridhar msridhar marked this pull request as ready for review June 1, 2024 15:45
@msridhar msridhar changed the title Cleanups from bumping minimum Java and Error Prone versions Various cleanups enabled by bumping minimum Java and Error Prone versions Jun 1, 2024
Comment on lines +252 to +255
// NOTE: this code only handles the case where the message digest algorithm used when signing
// was SHA-256. Eventually we may need a more robust solution for other digest algorithms.
// E.g., on JDK 21, the default message digest algorithm is SHA-384, and this code does not
// work for that algorithm (the DIGEST_ENTRY_PATTERN regex is hardcoded for SHA-256)
Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Discovered by switching to the newer API for signing jars, which exposed this issue on JDK 21

@msridhar msridhar merged commit 2a1e74b into uber:master Jun 4, 2024
10 checks passed
@msridhar msridhar deleted the java-8-removal-cleanups branch June 4, 2024 16:44
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants