Skip to content
This repository has been archived by the owner on Nov 14, 2024. It is now read-only.

Remove the conjure-java-jersey-server dependency #6213

Merged
merged 4 commits into from
Sep 9, 2022

Conversation

mglazer
Copy link
Contributor

@mglazer mglazer commented Sep 1, 2022

General

Before this PR:

After this PR:

==COMMIT_MSG==
Remove the conjure-java-jersey-server dependency

This was only needed for WebPreconditions, which wasn't actually
needed since we were not checking any Jersey exceptions.
==COMMIT_MSG==

Priority:

Concerns / possible downsides (what feedback would you like?):

Is documentation needed?:

Compatibility

Does this PR create any API breaks (e.g. at the Java or HTTP layers) - if so, do we have compatibility?:

Does this PR change the persisted format of any data - if so, do we have forward and backward compatibility?:

The code in this PR may be part of a blue-green deploy. Can upgrades from previous versions safely coexist? (Consider restarts of blue or green nodes.):

Does this PR rely on statements being true about other products at a deployment - if so, do we have correct product dependencies on these products (or other ways of verifying that these statements are true)?:

Does this PR need a schema migration?

Testing and Correctness

What, if any, assumptions are made about the current state of the world? If they change over time, how will we find out?:

What was existing testing like? What have you done to improve it?:

If this PR contains complex concurrent or asynchronous code, is it correct? The onus is on the PR writer to demonstrate this.:

If this PR involves acquiring locks or other shared resources, how do we ensure that these are always released?:

Execution

How would I tell this PR works in production? (Metrics, logs, etc.):

Has the safety of all log arguments been decided correctly?:

Will this change significantly affect our spending on metrics or logs?:

How would I tell that this PR does not work in production? (monitors, etc.):

If this PR does not work as expected, how do I fix that state? Would rollback be straightforward?:

If the above plan is more complex than “recall and rollback”, please tag the support PoC here (if it is the end of the week, tag both the current and next PoC):

Scale

Would this PR be expected to pose a risk at scale? Think of the shopping product at our largest stack.:

Would this PR be expected to perform a large number of database calls, and/or expensive database calls (e.g., row range scans, concurrent CAS)?:

Would this PR ever, with time and scale, become the wrong thing to do - and if so, how would we know that we need to do something differently?:

Development Process

Where should we start reviewing?:

If this PR is in excess of 500 lines excluding versions lock-files, why does it not make sense to split it?:

Please tag any other people who should be aware of this PR:
@jeremyk-91
@sverma30
@raiju

This was only needed for WebPreconditions, which wasn't actually
needed since we were not checking any Jersey exceptions.
Preconditions.checkArgument(
TableReference.isFullyQualifiedName(tableName),
"Table name is not fully qualified",
UnsafeArg.of("tableName", tableName));
return TableReference.createFromFullyQualifiedName(tableName);
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: we should clean up TableReference to use the com.palantir.logsafe.Preconditions instead of Guava, then we could get rid of this getTableRef(String) method and just inline the TableReference.createFromFullyQualifiedName(tableName)

    public static TableReference createFromFullyQualifiedName(String fullTableName) {
        int index = fullTableName.indexOf('.');
        Preconditions.checkArgument(
                index > 0, "Table name is not a fully qualified table name.", UnsafeArg.of("tableName", fullTableName));
        return create(
                Namespace.create(fullTableName.substring(0, index), Namespace.UNCHECKED_NAME),
                fullTableName.substring(index + 1));
    }

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we have errorprones which will automatically perform that migration?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Negative Ghostrider. I ran ./gradlew compileJava compileTestJava -PerrorProneApply=PreferSafeLoggingPreconditions against develop but that didn't generate any changes as I imagine since the aren't Args we're hitting the path without suggested fix. Separately we could make that smarter and generate UnsafeArgs, but don't think we should block on this.

https://github.com/palantir/gradle-baseline/blob/828111050da72901a66a676ae517719a9e9d9849/baseline-error-prone/src/main/java/com/palantir/baseline/errorprone/PreferSafeLoggingPreconditions.java#L88-L120

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Draft PR #6223 to migrate more Guava -> logsafe Preconditions

Preconditions.checkArgument(
TableReference.isFullyQualifiedName(tableName),
"Table name is not fully qualified",
UnsafeArg.of("tableName", tableName));
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: you can use LoggingArgs.safeInternalTableName here.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

updated both

"Table requested to sweep %s does not exist",
tableName);
"Table requested to sweep does not exist",
UnsafeArg.of("tableName", tableName));
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LoggingArgs.safeInternalTableName

Copy link
Contributor

@jeremyk-91 jeremyk-91 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍

@gsheasby
Copy link
Contributor

gsheasby commented Sep 9, 2022

@schlosna @mglazer I've added merge-when-ready, and merged the flake-retrying PR. Please feel free to merge develop into this PR, and then it should build and merge.

@bulldozer-bot bulldozer-bot bot merged commit 5581cec into develop Sep 9, 2022
@bulldozer-bot bulldozer-bot bot deleted the feature/remove-conjure-jersey-dependency branch September 9, 2022 16:50
@schlosna
Copy link
Contributor

schlosna commented Sep 9, 2022

Threw some metrics on https://github.com/palantir/atlasdb/compare/ds/flakes?expand=1 to measure whats slow and filed #6226. Locally the test runs for me in ~3 seconds but in circle its ~11 seconds so hopefully the 15 second timeout handles the common flakes and we can look into making it faster as well.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants