Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove fragment module #6894

Merged
merged 8 commits into from
Aug 24, 2022
Merged

Remove fragment module #6894

merged 8 commits into from
Aug 24, 2022

Conversation

bmarty
Copy link
Member

@bmarty bmarty commented Aug 20, 2022

Type of change

  • Feature
  • Bugfix
  • Technical
  • Other :

Content

Remove Fragment module, using Hilt annotation @AndroidEntryPoint instead. Less boilerplate code (and potentially less conflict in the class FragmentModule).

Could be nice to merge fast, since we may have conflict quite fast.

Motivation and context

Fixes #5420 (see details there)

Screenshots / GIFs

NA

Tests

  • Running sanity test, OK

image

- Smoke test on the app using a real device: OK

Tested devices

  • Physical
  • Emulator
  • OS version(s):

Checklist

@ElementBot
Copy link

ElementBot commented Aug 20, 2022

Warnings
⚠️

vector/src/main/java/im/vector/app/features/home/room/detail/TimelineFragment.kt#L1125 - Prefer "SHOW_AS_ACTION_IF_ROOM" instead of "SHOW_AS_ACTION_ALWAYS"

⚠️

vector/src/main/java/im/vector/app/features/home/room/detail/TimelineFragment.kt#L1125 - Prefer "SHOW_AS_ACTION_IF_ROOM" instead of "SHOW_AS_ACTION_ALWAYS"

⚠️

vector/src/main/java/im/vector/app/features/login/LoginCaptchaFragment.kt#L117 - Permitting connections with SSL-related errors could allow eavesdroppers to intercept data sent by your app, which impacts the privacy of your users. Consider canceling the connections by invoking SslErrorHandler#cancel().

⚠️

vector/src/main/java/im/vector/app/features/login/LoginCaptchaFragment.kt#L117 - Permitting connections with SSL-related errors could allow eavesdroppers to intercept data sent by your app, which impacts the privacy of your users. Consider canceling the connections by invoking SslErrorHandler#cancel().

⚠️

vector/src/main/java/im/vector/app/features/login/LoginCaptchaFragment.kt#L117 - Permitting connections with SSL-related errors could allow eavesdroppers to intercept data sent by your app, which impacts the privacy of your users. Consider canceling the connections by invoking SslErrorHandler#cancel().

⚠️

vector/src/main/java/im/vector/app/features/login/LoginCaptchaFragment.kt#L117 - Permitting connections with SSL-related errors could allow eavesdroppers to intercept data sent by your app, which impacts the privacy of your users. Consider canceling the connections by invoking SslErrorHandler#cancel().

⚠️

vector/src/main/java/im/vector/app/features/login/LoginWebFragment.kt#L135 - Permitting connections with SSL-related errors could allow eavesdroppers to intercept data sent by your app, which impacts the privacy of your users. Consider canceling the connections by invoking SslErrorHandler#cancel().

⚠️

vector/src/main/java/im/vector/app/features/login/LoginWebFragment.kt#L135 - Permitting connections with SSL-related errors could allow eavesdroppers to intercept data sent by your app, which impacts the privacy of your users. Consider canceling the connections by invoking SslErrorHandler#cancel().

⚠️

vector/src/main/java/im/vector/app/features/login/LoginWebFragment.kt#L135 - Permitting connections with SSL-related errors could allow eavesdroppers to intercept data sent by your app, which impacts the privacy of your users. Consider canceling the connections by invoking SslErrorHandler#cancel().

⚠️

vector/src/main/java/im/vector/app/features/login/LoginWebFragment.kt#L135 - Permitting connections with SSL-related errors could allow eavesdroppers to intercept data sent by your app, which impacts the privacy of your users. Consider canceling the connections by invoking SslErrorHandler#cancel().

⚠️

vector/src/main/java/im/vector/app/features/onboarding/ftueauth/FtueAuthWebFragment.kt#L132 - Permitting connections with SSL-related errors could allow eavesdroppers to intercept data sent by your app, which impacts the privacy of your users. Consider canceling the connections by invoking SslErrorHandler#cancel().

⚠️

vector/src/main/java/im/vector/app/features/onboarding/ftueauth/FtueAuthWebFragment.kt#L132 - Permitting connections with SSL-related errors could allow eavesdroppers to intercept data sent by your app, which impacts the privacy of your users. Consider canceling the connections by invoking SslErrorHandler#cancel().

⚠️

vector/src/main/java/im/vector/app/features/onboarding/ftueauth/FtueAuthWebFragment.kt#L132 - Permitting connections with SSL-related errors could allow eavesdroppers to intercept data sent by your app, which impacts the privacy of your users. Consider canceling the connections by invoking SslErrorHandler#cancel().

⚠️

vector/src/main/java/im/vector/app/features/onboarding/ftueauth/FtueAuthWebFragment.kt#L132 - Permitting connections with SSL-related errors could allow eavesdroppers to intercept data sent by your app, which impacts the privacy of your users. Consider canceling the connections by invoking SslErrorHandler#cancel().

⚠️

vector/src/main/java/im/vector/app/features/settings/notifications/VectorSettingsAdvancedNotificationPreferenceFragment.kt#L90 - It will always be more efficient to use more specific change events if you can. Rely on notifyDataSetChanged as a last resort.

⚠️

vector/src/main/java/im/vector/app/features/settings/notifications/VectorSettingsAdvancedNotificationPreferenceFragment.kt#L90 - It will always be more efficient to use more specific change events if you can. Rely on notifyDataSetChanged as a last resort.

⚠️

vector/src/main/java/im/vector/app/features/share/IncomingShareFragment.kt#L83 - Field requires API level 29 (current min is 21): android.content.Intent#EXTRA_SHORTCUT_ID

⚠️

vector/src/main/java/im/vector/app/features/share/IncomingShareFragment.kt#L83 - Field requires API level 29 (current min is 21): android.content.Intent#EXTRA_SHORTCUT_ID

Generated by 🚫 dangerJS against 4c2f853

@bmarty bmarty force-pushed the feature/bma/remove_fragment_module branch from f60a448 to d7b2cc0 Compare August 23, 2022 16:49
@bmarty bmarty marked this pull request as ready for review August 23, 2022 18:37
@sonarcloud
Copy link

sonarcloud bot commented Aug 23, 2022

SonarCloud Quality Gate failed.    Quality Gate failed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 0 Code Smells

23.5% 23.5% Coverage
0.0% 0.0% Duplication

@bmarty bmarty requested review from a team and ouchadam and removed request for a team August 24, 2022 07:32
Copy link
Member

@ganfra ganfra left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Didn't tested, but LGTM, thanks for the changes!

@bmarty bmarty merged commit 2b5920e into develop Aug 24, 2022
@bmarty bmarty deleted the feature/bma/remove_fragment_module branch August 24, 2022 10:30
@ganfra
Copy link
Member

ganfra commented Aug 24, 2022

Just what about the Danger warnings?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Remove FragmentModule
3 participants