Skip to content

feat: upgrade to Jenkins LTS Core 2.462.3 for Java 11 support#26

Open
gounthar wants to merge 7 commits intojenkinsci:masterfrom
gounthar:plugin-modernizer/upgradetolatestjava11coreversion
Open

feat: upgrade to Jenkins LTS Core 2.462.3 for Java 11 support#26
gounthar wants to merge 7 commits intojenkinsci:masterfrom
gounthar:plugin-modernizer/upgradetolatestjava11coreversion

Conversation

@gounthar
Copy link
Contributor

Hello date-parameter developers! 👋

This is an automated pull request created by the Jenkins Plugin Modernizer tool. The tool has applied the following recipes to modernize the plugin:

Upgrade to latest LTS core version supporting Java 11

io.jenkins.tools.pluginmodernizer.UpgradeToLatestJava11CoreVersion

Upgrade to latest LTS core version supporting Java 11.

Why is this important?

Transitional Step to Java 17

Upgrading to Jenkins LTS Core 2.462.3 is a critical step in our roadmap towards leveraging Java 17. This transition serves as an intermediary phase, ensuring that all systems are optimized for Java 11 before making the leap to Java 17.

Enhancements and Security

By moving to this LTS version, we benefit from the latest performance and security improvements foundational to Java 11. Ensuring our dependencies are up-to-date and secure prepares the groundwork for a smoother transition to Java 17.

Long-Term Support

The LTS version provides the necessary support and stability for Java 11, offering assurance during our gradual migration process. This allows us to take advantage of long-term updates and critical patches.

Embracing these incremental changes aligns our development environment with current standards and strategically positions us for future advancement. We appreciate your feedback and testing as we aim for a seamless adjustment period.

}

public FormValidation doCheckDefaultValue(@QueryParameter String dateFormat, @QueryParameter String defaultValue) {
public FormValidation doCheckDefaultValue(

Check warning

Code scanning / Jenkins Security Scan

Stapler: Missing permission check Warning

Potential missing permission check in DescriptorImpl#doCheckDefaultValue
}

public FormValidation doCheckDefaultValue(@QueryParameter String dateFormat, @QueryParameter String defaultValue) {
public FormValidation doCheckDefaultValue(

Check warning

Code scanning / Jenkins Security Scan

Stapler: Missing POST/RequirePOST annotation Warning

Potential CSRF vulnerability: If DescriptorImpl#doCheckDefaultValue connects to user-specified URLs, modifies state, or is expensive to run, it should be annotated with @POST or @RequirePOST
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant