Skip to content

WIP : fork jooby:1.6.9 as new modules in killbill-commons#194

Draft
xsalefter wants to merge 4 commits intokillbill:masterfrom
xsalefter:fork-jooby
Draft

WIP : fork jooby:1.6.9 as new modules in killbill-commons#194
xsalefter wants to merge 4 commits intokillbill:masterfrom
xsalefter:fork-jooby

Conversation

@xsalefter
Copy link
Copy Markdown
Contributor

WIP.

Phase 1.4-1.6 of Jooby fork:
- Update pom.xml with managed dependency versions
- Add spotbugs-exclude.xml to suppress all upstream SpotBugs findings
- Add RAT exclusions for resource files and java-excluded directory
- Configure -Pjooby profile for test compilation and execution
- Disable test-compile by default (76 PowerMock-dependent files)
- Move 76 test files to src/test/java-excluded/
- Keep original MockUnit.java in java-excluded as migration reference
Phase 1.7.1 - Complete MockUnit rewrite:
- Replace EasyMock record-replay with Mockito immediate stubbing
- mock()/powerMock() -> Mockito.mock() (inline mock maker handles finals)
- mockStatic() -> Mockito.mockStatic() with MockedStatic lifecycle
- mockConstructor()/constructor().build() -> pre-mock + deferred mockConstruction
- capture()/captured() -> ArgumentCaptor
- partialMock() -> Mockito.mock(CALLS_REAL_METHODS)
- Add mockito-core test dependency (5.3.1, managed by parent)
//.compile("\\?|/\\*\\*|\\*|\\:((?:[^/]+)+?) |\\{((?:\\{[^/]+?\\}|[^/{}]|\\\\[{}])+?)\\}");
/** ? | **:name | * | :var | */
.compile(
"\\?|/\\*\\*(\\:(?:[^/]+))?|\\*|\\:((?:[^/]+)+?)|\\{((?:\\{[^/]+?\\}|[^/{}]|\\\\[{}])+?)\\}");

Check failure

Code scanning / CodeQL

Inefficient regular expression High

This part of the regular expression may cause exponential backtracking on strings starting with '{{' and containing many repetitions of '.}{'.
Comment on lines +42 to +44
"-+BEGIN\\s+.*CERTIFICATE[^-]*-+(?:\\s|\\r|\\n)+" + // Header
"([a-z0-9+/=\\r\\n]+)" + // Base64 text
"-+END\\s+.*CERTIFICATE[^-]*-+", // Footer

Check failure

Code scanning / CodeQL

Inefficient regular expression High

This part of the regular expression may cause exponential backtracking on strings starting with '-BEGIN CERTIFICATE-' and containing many repetitions of '\n'.
Comment on lines +47 to +49
"-+BEGIN\\s+.*PRIVATE\\s+KEY[^-]*-+(?:\\s|\\r|\\n)+" + // Header
"([a-z0-9+/=\\r\\n]+)" + // Base64 text
"-+END\\s+.*PRIVATE\\s+KEY[^-]*-+", // Footer

Check failure

Code scanning / CodeQL

Inefficient regular expression High

This part of the regular expression may cause exponential backtracking on strings starting with '-BEGIN PRIVATE KEY-' and containing many repetitions of '\n'.
public void send(final byte[] bytes) throws Exception {
rsp.setHeader("Transfer-Encoding", null);
ServletOutputStream output = rsp.getOutputStream();
output.write(bytes);

Check warning

Code scanning / CodeQL

Cross-site scripting Medium

Cross-site scripting vulnerability due to a
user-provided value
.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant