Skip to content
This repository was archived by the owner on Oct 15, 2024. It is now read-only.

Commit 247670e

Browse files
committed
chore: refresh Detekt baseline
1 parent 10aa8ed commit 247670e

File tree

3 files changed

+11
-3
lines changed

3 files changed

+11
-3
lines changed

detekt-baselines/app.xml

-1
Original file line numberDiff line numberDiff line change
@@ -96,6 +96,5 @@
9696
<ID>UseCheckOrError:SshKey.kt$SshKey$throw IllegalStateException("SSH key does not exist in Keystore")</ID>
9797
<ID>UseCheckOrError:SshKeyGenActivity.kt$SshKeyGenActivity$throw IllegalStateException("Impossible key type selection")</ID>
9898
<ID>UtilityClassWithPublicConstructor:AutofillMatcher.kt$AutofillMatcher</ID>
99-
<ID>WildcardImport:Application.kt$import androidx.appcompat.app.AppCompatDelegate.*</ID>
10099
</CurrentIssues>
101100
</SmellBaseline>

detekt-baselines/crypto-common.xml

+7
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
<?xml version="1.0" ?>
2+
<SmellBaseline>
3+
<ManuallySuppressedIssues></ManuallySuppressedIssues>
4+
<CurrentIssues>
5+
<ID>LongParameterList:CryptoHandler.kt$CryptoHandler$( keys: List&lt;Key&gt;, passphrase: String, ciphertextStream: InputStream, outputStream: OutputStream, options: DecryptOpts, onDecryptSessionKey: (EncryptedSessionKey) -&gt; DecryptedSessionKey, )</ID>
6+
</CurrentIssues>
7+
</SmellBaseline>
+4-2
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,9 @@
1-
<?xml version='1.0' encoding='UTF-8'?>
1+
<?xml version="1.0" ?>
22
<SmellBaseline>
3-
<ManuallySuppressedIssues/>
3+
<ManuallySuppressedIssues></ManuallySuppressedIssues>
44
<CurrentIssues>
5+
<ID>ForbiddenComment:CachingPublicKeyDataDecryptorFactory.kt$CachingPublicKeyDataDecryptorFactory$* Implementation of the [PublicKeyDataDecryptorFactory] which caches decrypted session keys. That * way, if a message needs to be decrypted multiple times, expensive private key operations can be * omitted. * * This implementation changes the behavior or [.recoverSessionData] to first return any cache hits. * If no hit is found, the method call is delegated to the underlying * [PublicKeyDataDecryptorFactory]. The result of that is then placed in the cache and returned. * * TODO: Do we also cache invalid session keys?</ID>
56
<ID>ForbiddenComment:PGPKeyManager.kt$PGPKeyManager$// TODO: This is a temp hack for now and in future it should check that the GPGKeyManager can</ID>
7+
<ID>MatchingDeclarationName:PGPSessionKey.kt$PGPEncryptedSessionKey</ID>
68
</CurrentIssues>
79
</SmellBaseline>

0 commit comments

Comments
 (0)