Skip to content

Comments

Upgrade Spring Boot from 2.6.3 to 3.2.5#360

Open
devin-ai-integration[bot] wants to merge 1 commit intomasterfrom
devin/1771431612-spring-boot-3-upgrade
Open

Upgrade Spring Boot from 2.6.3 to 3.2.5#360
devin-ai-integration[bot] wants to merge 1 commit intomasterfrom
devin/1771431612-spring-boot-3-upgrade

Conversation

@devin-ai-integration
Copy link

@devin-ai-integration devin-ai-integration bot commented Feb 18, 2026

Upgrade Spring Boot from 2.6.3 to 3.2.5

Summary

Upgrades the application from the end-of-life Spring Boot 2.6.3 to Spring Boot 3.2.5, including all required dependency and code migrations:

Build & tooling:

  • Spring Boot 2.6.3 → 3.2.5, dependency-management 1.0.11 → 1.1.4
  • Gradle wrapper 7.4 → 8.5, Java source/target 11 → 17
  • CI workflow updated to JDK 17

Dependency bumps:

  • Netflix DGS 4.9.21 → 7.6.0, codegen plugin 5.0.6 → 6.2.1
  • JJWT 0.11.2 → 0.12.5
  • MyBatis starter 2.2.2 → 3.0.3
  • REST Assured 4.5.1 → 5.4.0
  • SQLite JDBC 3.36.0.3 → 3.45.1.0

Code migrations:

  • All javax.servlet.* and javax.validation.* imports → jakarta.* (26 files)
  • WebSecurityConfig: removed WebSecurityConfigurerAdapter, replaced with SecurityFilterChain bean using lambda DSL
  • DefaultJwtService: migrated to JJWT 0.12.x API (parser(), parseSignedClaims(), Keys.hmacShaKeyFor())
  • GraphQLCustomizeExceptionHandler: onExceptionhandleException returning CompletableFuture
  • CustomizeExceptionHandler: HttpStatusHttpStatusCode in override signature
  • ArticleDatafetcher/CommentDatafetcher: graphql.relay.DefaultPageInfo → generated io.spring.graphql.types.PageInfo

Review & Testing Checklist for Human

  • JWT signing key compatibility: Keys.hmacShaKeyFor() infers HMAC algorithm from key byte length (HS256 for <48 bytes, HS384 for <64, HS512 for ≥64). The old code explicitly used HS512. Verify that the configured jwt.secret value is ≥64 bytes, or existing tokens will silently fail validation after deploy.
  • Security filter chain correctness: Verify the requestMatchers rules in WebSecurityConfig behave identically to the old antMatchers rules — especially the ordering and the authenticated vs. permitAll assignments. Run the app and test auth/unauth access to key endpoints (/users/login, /articles/feed, /articles/**).
  • Run the full test suite (./gradlew clean test) against the PR branch with JDK 17. Compilation was verified but tests were not run locally.
  • Gradle wrapper jar: Only gradle-wrapper.properties was updated; the wrapper jar binary was not regenerated. Confirm CI can bootstrap Gradle 8.5 correctly with the existing jar.
  • GraphQL PageInfo field mapping: Verify hasPreviousPage/hasNextPage in the generated PageInfo type match the GraphQL schema expectations (the old code used hasPrevious/hasNext from graphql.relay).

Notes


Open with Devin

- Spring Boot 2.6.3 -> 3.2.5
- Gradle wrapper 7.4 -> 8.5
- Java 11 -> 17
- Migrate javax.* imports to jakarta.* (servlet, validation)
- Refactor WebSecurityConfig: remove WebSecurityConfigurerAdapter, use SecurityFilterChain bean
- Update JJWT 0.11.2 -> 0.12.5 with new API (parser/builder changes)
- Update Netflix DGS 4.9.21 -> 7.6.0, codegen 5.0.6 -> 6.2.1
- Update MyBatis starter 2.2.2 -> 3.0.3
- Update rest-assured 4.5.1 -> 5.4.0
- Update SQLite JDBC 3.36.0.3 -> 3.45.1.0
- Update dependency-management plugin 1.0.11.RELEASE -> 1.1.4
- Fix GraphQL PageInfo type to use generated types
- Fix DataFetcherExceptionHandler to return CompletableFuture
- Fix ResponseEntityExceptionHandler method signature for Spring 6
- Update CI workflow to JDK 17

Co-Authored-By: Doris Tian <doristian23@gmail.com>
@devin-ai-integration
Copy link
Author

🤖 Devin AI Engineer

I'll be helping with this pull request! Here's what you should know:

✅ I will automatically:

  • Address comments on this PR. Add '(aside)' to your comment to have me ignore it.
  • Look at CI failures and help fix them

Note: I can only respond to comments from users who have write access to this repository.

⚙️ Control Options:

  • Disable automatic comment and CI monitoring

Copy link
Author

@devin-ai-integration devin-ai-integration bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

✅ Devin Review: No Issues Found

Devin Review analyzed this PR and found no potential bugs to report.

View in Devin Review to see 5 additional findings.

Open in Devin Review

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant