This is an automated email from the ASF dual-hosted git repository.
krisden pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/solr.git
The following commit(s) were added to refs/heads/main by this push:
new d31b55ac789 Update dependency
com.google.errorprone:error_prone_annotations to v2.23.0 (#2035)
d31b55ac789 is described below
commit d31b55ac789d71ffa8d067de83b8dd78dcf4e2ad
Author: Solr Bot <[email protected]>
AuthorDate: Tue Oct 24 20:45:45 2023 +0200
Update dependency com.google.errorprone:error_prone_annotations to v2.23.0
(#2035)
* Update dependency com.google.errorprone:error_prone_annotations to v2.23.0
* Use StandardCharsets.UTF_8
---------
Co-authored-by: Kevin Risden <[email protected]>
---
gradle/validation/error-prone.gradle | 5 +++++
solr/core/src/java/org/apache/solr/handler/CatStream.java | 4 +++-
.../java/org/apache/solr/packagemanager/PackageUtils.java | 2 +-
.../org/apache/solr/packagemanager/RepositoryManager.java | 13 ++++++++-----
.../src/java/org/apache/solr/rest/BaseSolrResource.java | 3 ++-
solr/core/src/java/org/apache/solr/rest/RestManager.java | 8 ++------
.../core/src/java/org/apache/solr/servlet/HttpSolrCall.java | 6 +++---
solr/core/src/java/org/apache/solr/update/UpdateLog.java | 3 +--
.../test/org/apache/solr/cloud/CollectionsAPISolrJTest.java | 3 ++-
.../src/test/org/apache/solr/handler/TestRestoreCore.java | 12 +++++++++---
.../org/apache/solr/servlet/DirectSolrConnectionTest.java | 7 ++++++-
solr/licenses/error_prone_annotations-2.22.0.jar.sha1 | 1 -
solr/licenses/error_prone_annotations-2.23.0.jar.sha1 | 1 +
.../hdfs/src/test/org/apache/hadoop/fs/FileUtil.java | 4 ++--
.../hdfs/server/datanode/fsdataset/impl/BlockPoolSlice.java | 3 ++-
.../org/apache/solr/client/solrj/io/sql/DriverImpl.java | 3 ++-
.../solr/client/solrj/impl/SolrClientCloudManager.java | 3 ++-
versions.lock | 2 +-
versions.props | 2 +-
19 files changed, 53 insertions(+), 32 deletions(-)
diff --git a/gradle/validation/error-prone.gradle
b/gradle/validation/error-prone.gradle
index d2800242425..de8ee8d1de0 100644
--- a/gradle/validation/error-prone.gradle
+++ b/gradle/validation/error-prone.gradle
@@ -305,6 +305,7 @@ allprojects { prj ->
// '-Xep:DoNotMockAutoValue:OFF', // we don't use autovalue
// '-Xep:DoNotUseRuleChain:OFF', // todo could be fixed but not
easy
// '-Xep:DoubleCheckedLocking:OFF', // todo check if useful or
comment why not
+ '-Xep:DuplicateDateFormatField:WARN',
'-Xep:EmptyBlockTag:WARN',
// '-Xep:EmptyCatch:OFF', // todo check if useful or comment why
not - might be handled by ECJ?
// '-Xep:EmptySetMultibindingContributions:OFF', // we don't use
this annotation
@@ -420,6 +421,7 @@ allprojects { prj ->
// '-Xep:NonAtomicVolatileUpdate:OFF', // todo check if useful or
comment why not
'-Xep:NonCanonicalType:WARN',
'-Xep:NonOverridingEquals:WARN',
+ //'-Xep:NonFinalStaticField:WARN', // todo there are problems that
should be fixed
'-Xep:NotJavadoc:WARN',
'-Xep:NullOptional:WARN',
// '-Xep:NullableConstructor:OFF', // we don't use this annotation
@@ -464,7 +466,10 @@ allprojects { prj ->
// '-Xep:StreamResourceLeak:OFF', // todo check if useful or
comment why not
'-Xep:StreamToIterable:WARN',
// '-Xep:StringCaseLocaleUsage:OFF', // we have forbiddenapis for
that
+ '-Xep:StringCharset:WARN',
+ '-Xep:StringFormatWithLiteral:WARN',
// '-Xep:StringSplitter:OFF', // todo check if useful or comment
why not - might be able to use forbidden-apis for this?
+ '-Xep:SuperEqualsIsObjectEquals:WARN',
// '-Xep:SwigMemoryLeak:OFF', // we don't use swig
// '-Xep:SynchronizeOnNonFinalField:OFF', // todo check if useful
or comment why not
// '-Xep:ThreadJoinLoop:OFF', // todo check if useful or comment
why not
diff --git a/solr/core/src/java/org/apache/solr/handler/CatStream.java
b/solr/core/src/java/org/apache/solr/handler/CatStream.java
index 9c7bda7bc24..70ee2b65242 100644
--- a/solr/core/src/java/org/apache/solr/handler/CatStream.java
+++ b/solr/core/src/java/org/apache/solr/handler/CatStream.java
@@ -196,7 +196,9 @@ public class CatStream extends TupleStream implements
Expressible {
new
GZIPInputStream(Files.newInputStream(currentFilePath.absolutePath)),
StandardCharsets.UTF_8));
} else {
- currentFileLines =
FileUtils.lineIterator(currentFilePath.absolutePath.toFile(), "UTF-8");
+ currentFileLines =
+ FileUtils.lineIterator(
+ currentFilePath.absolutePath.toFile(),
StandardCharsets.UTF_8.name());
}
if (currentFileLines.hasNext()) return true;
}
diff --git
a/solr/core/src/java/org/apache/solr/packagemanager/PackageUtils.java
b/solr/core/src/java/org/apache/solr/packagemanager/PackageUtils.java
index 9d330b49bb8..c380764a678 100644
--- a/solr/core/src/java/org/apache/solr/packagemanager/PackageUtils.java
+++ b/solr/core/src/java/org/apache/solr/packagemanager/PackageUtils.java
@@ -179,7 +179,7 @@ public class PackageUtils {
NamedList<Object> response = solrClient.request(request);
String manifestJson = (String) response.get("response");
String calculatedSHA512 =
-
BlobRepository.sha512Digest(ByteBuffer.wrap(manifestJson.getBytes("UTF-8")));
+
BlobRepository.sha512Digest(ByteBuffer.wrap(manifestJson.getBytes(StandardCharsets.UTF_8)));
if (expectedSHA512.equals(calculatedSHA512) == false) {
throw new SolrException(
ErrorCode.UNAUTHORIZED,
diff --git
a/solr/core/src/java/org/apache/solr/packagemanager/RepositoryManager.java
b/solr/core/src/java/org/apache/solr/packagemanager/RepositoryManager.java
index 8ef29ba5552..1899d8b4786 100644
--- a/solr/core/src/java/org/apache/solr/packagemanager/RepositoryManager.java
+++ b/solr/core/src/java/org/apache/solr/packagemanager/RepositoryManager.java
@@ -26,6 +26,7 @@ import java.io.UnsupportedEncodingException;
import java.lang.invoke.MethodHandles;
import java.net.URL;
import java.nio.ByteBuffer;
+import java.nio.charset.StandardCharsets;
import java.nio.file.Files;
import java.nio.file.Path;
import java.nio.file.Paths;
@@ -122,13 +123,13 @@ public class RepositoryManager {
if (packageManager.zkClient.exists(PackageUtils.REPOSITORIES_ZK_PATH,
true) == false) {
packageManager.zkClient.create(
PackageUtils.REPOSITORIES_ZK_PATH,
- getMapper().writeValueAsString(repos).getBytes("UTF-8"),
+
getMapper().writeValueAsString(repos).getBytes(StandardCharsets.UTF_8),
CreateMode.PERSISTENT,
true);
} else {
packageManager.zkClient.setData(
PackageUtils.REPOSITORIES_ZK_PATH,
- getMapper().writeValueAsString(repos).getBytes("UTF-8"),
+
getMapper().writeValueAsString(repos).getBytes(StandardCharsets.UTF_8),
true);
}
@@ -155,7 +156,8 @@ public class RepositoryManager {
throws UnsupportedEncodingException, KeeperException,
InterruptedException {
if (zkClient.exists(PackageUtils.REPOSITORIES_ZK_PATH, true)) {
return new String(
- zkClient.getData(PackageUtils.REPOSITORIES_ZK_PATH, null, null,
true), "UTF-8");
+ zkClient.getData(PackageUtils.REPOSITORIES_ZK_PATH, null, null,
true),
+ StandardCharsets.UTF_8);
}
return "[]";
}
@@ -191,10 +193,11 @@ public class RepositoryManager {
}
String manifestJson = getMapper().writeValueAsString(release.manifest);
String manifestSHA512 =
-
BlobRepository.sha512Digest(ByteBuffer.wrap(manifestJson.getBytes("UTF-8")));
+ BlobRepository.sha512Digest(
+ ByteBuffer.wrap(manifestJson.getBytes(StandardCharsets.UTF_8)));
PackageUtils.postFile(
solrClient,
- ByteBuffer.wrap(manifestJson.getBytes("UTF-8")),
+ ByteBuffer.wrap(manifestJson.getBytes(StandardCharsets.UTF_8)),
String.format(Locale.ROOT, "/package/%s/%s/%s", packageName,
version, "manifest.json"),
null);
diff --git a/solr/core/src/java/org/apache/solr/rest/BaseSolrResource.java
b/solr/core/src/java/org/apache/solr/rest/BaseSolrResource.java
index cbfa72993b7..0ecb8b4f101 100644
--- a/solr/core/src/java/org/apache/solr/rest/BaseSolrResource.java
+++ b/solr/core/src/java/org/apache/solr/rest/BaseSolrResource.java
@@ -20,6 +20,7 @@ import static org.apache.solr.common.params.CommonParams.JSON;
import java.io.UnsupportedEncodingException;
import java.net.URLDecoder;
+import java.nio.charset.StandardCharsets;
import org.apache.solr.common.SolrException;
import org.apache.solr.common.params.CommonParams;
import org.apache.solr.common.util.NamedList;
@@ -159,6 +160,6 @@ public abstract class BaseSolrResource {
/** Decode URL-encoded strings as UTF-8, and avoid converting "+" to space */
protected static String urlDecode(String str) throws
UnsupportedEncodingException {
- return URLDecoder.decode(str.replace("+", "%2B"), "UTF-8");
+ return URLDecoder.decode(str.replace("+", "%2B"), StandardCharsets.UTF_8);
}
}
diff --git a/solr/core/src/java/org/apache/solr/rest/RestManager.java
b/solr/core/src/java/org/apache/solr/rest/RestManager.java
index 1078168628b..c7f6c053690 100644
--- a/solr/core/src/java/org/apache/solr/rest/RestManager.java
+++ b/solr/core/src/java/org/apache/solr/rest/RestManager.java
@@ -19,10 +19,10 @@ package org.apache.solr.rest;
import java.io.FileNotFoundException;
import java.io.IOException;
import java.io.Reader;
-import java.io.UnsupportedEncodingException;
import java.lang.invoke.MethodHandles;
import java.lang.reflect.Constructor;
import java.net.URLDecoder;
+import java.nio.charset.StandardCharsets;
import java.util.ArrayList;
import java.util.Collection;
import java.util.Collections;
@@ -253,11 +253,7 @@ public class RestManager {
/** Determines the ManagedResource resourceId from the request path. */
public static String resolveResourceId(final String path) {
String resourceId;
- try {
- resourceId = URLDecoder.decode(path, "UTF-8");
- } catch (UnsupportedEncodingException e) {
- throw new RuntimeException(e); // shouldn't happen
- }
+ resourceId = URLDecoder.decode(path, StandardCharsets.UTF_8);
int at = resourceId.indexOf("/schema");
if (at == -1) {
diff --git a/solr/core/src/java/org/apache/solr/servlet/HttpSolrCall.java
b/solr/core/src/java/org/apache/solr/servlet/HttpSolrCall.java
index a4d647fec0a..e93c412676e 100644
--- a/solr/core/src/java/org/apache/solr/servlet/HttpSolrCall.java
+++ b/solr/core/src/java/org/apache/solr/servlet/HttpSolrCall.java
@@ -37,8 +37,8 @@ import java.io.EOFException;
import java.io.IOException;
import java.io.InputStream;
import java.io.OutputStream;
-import java.io.UnsupportedEncodingException;
import java.lang.invoke.MethodHandles;
+import java.nio.charset.StandardCharsets;
import java.util.ArrayList;
import java.util.Collection;
import java.util.Collections;
@@ -450,7 +450,7 @@ public class HttpSolrCall {
}
protected void extractRemotePath(String collectionName, String origCorename)
- throws UnsupportedEncodingException, KeeperException,
InterruptedException, SolrException {
+ throws KeeperException, InterruptedException, SolrException {
assert core == null;
coreUrl = getRemoteCoreUrl(collectionName, origCorename);
// don't proxy for internal update requests
@@ -461,7 +461,7 @@ public class HttpSolrCall {
// it does not make sense to send the request to a remote node
throw new SolrException(
SolrException.ErrorCode.INVALID_STATE,
- new String(Utils.toJSON(invalidStates),
org.apache.lucene.util.IOUtils.UTF_8));
+ new String(Utils.toJSON(invalidStates), StandardCharsets.UTF_8));
}
action = REMOTEQUERY;
} else {
diff --git a/solr/core/src/java/org/apache/solr/update/UpdateLog.java
b/solr/core/src/java/org/apache/solr/update/UpdateLog.java
index 0b008a43d74..255f0489af4 100644
--- a/solr/core/src/java/org/apache/solr/update/UpdateLog.java
+++ b/solr/core/src/java/org/apache/solr/update/UpdateLog.java
@@ -27,7 +27,6 @@ import java.io.FileNotFoundException;
import java.io.IOException;
import java.io.UncheckedIOException;
import java.lang.invoke.MethodHandles;
-import java.nio.charset.Charset;
import java.nio.charset.StandardCharsets;
import java.nio.file.Files;
import java.nio.file.Path;
@@ -999,7 +998,7 @@ public class UpdateLog implements PluginInfoInitialized,
SolrMetricProducer {
entry
+ " is not a partial doc"
+ ", while looking for id="
- + new String(id.bytes, Charset.forName("UTF-8")));
+ + new String(id.bytes, StandardCharsets.UTF_8));
}
// This update is an inplace update, get the partial doc. The input doc
is always at last
// position.
diff --git
a/solr/core/src/test/org/apache/solr/cloud/CollectionsAPISolrJTest.java
b/solr/core/src/test/org/apache/solr/cloud/CollectionsAPISolrJTest.java
index 4877b27aee6..9eabee8a970 100644
--- a/solr/core/src/test/org/apache/solr/cloud/CollectionsAPISolrJTest.java
+++ b/solr/core/src/test/org/apache/solr/cloud/CollectionsAPISolrJTest.java
@@ -24,6 +24,7 @@ import static
org.apache.solr.common.params.CollectionAdminParams.DEFAULTS;
import java.io.IOException;
import java.lang.invoke.MethodHandles;
+import java.nio.charset.StandardCharsets;
import java.nio.file.Path;
import java.nio.file.Paths;
import java.util.ArrayList;
@@ -585,7 +586,7 @@ public class CollectionsAPISolrJTest extends
SolrCloudTestCase {
cluster.waitForActiveCollection(collectionName, 2, 4);
SolrClient client = cluster.getSolrClient();
- byte[] binData = collectionName.getBytes("UTF-8");
+ byte[] binData = collectionName.getBytes(StandardCharsets.UTF_8);
// index some docs
for (int i = 0; i < 10; i++) {
SolrInputDocument doc = new SolrInputDocument();
diff --git a/solr/core/src/test/org/apache/solr/handler/TestRestoreCore.java
b/solr/core/src/test/org/apache/solr/handler/TestRestoreCore.java
index b46bbfb6ff6..593f0af7bd9 100644
--- a/solr/core/src/test/org/apache/solr/handler/TestRestoreCore.java
+++ b/solr/core/src/test/org/apache/solr/handler/TestRestoreCore.java
@@ -19,6 +19,7 @@ package org.apache.solr.handler;
import java.io.File;
import java.io.IOException;
import java.net.URLEncoder;
+import java.nio.charset.StandardCharsets;
import java.nio.file.DirectoryStream;
import java.nio.file.Files;
import java.nio.file.Path;
@@ -128,7 +129,7 @@ public class TestRestoreCore extends SolrJettyTestBase {
.getCoreContainer()
.getAllowPaths()
.add(Path.of(location)); // Allow core to be created outside
SOLR_HOME
- params += "&location=" + URLEncoder.encode(location, "UTF-8");
+ params += "&location=" + URLEncoder.encode(location,
StandardCharsets.UTF_8);
}
// named snapshot vs default snapshot name
@@ -188,7 +189,8 @@ public class TestRestoreCore extends SolrJettyTestBase {
public void testBackupFailsMissingAllowPaths() throws Exception {
final String params =
- "&location=" +
URLEncoder.encode(createTempDir().toFile().getAbsolutePath(), "UTF-8");
+ "&location="
+ + URLEncoder.encode(createTempDir().toFile().getAbsolutePath(),
StandardCharsets.UTF_8);
Throwable t =
expectThrows(
IOException.class,
@@ -207,7 +209,11 @@ public class TestRestoreCore extends SolrJettyTestBase {
String location = createTempDir().toFile().getAbsolutePath();
leaderJetty.getCoreContainer().getAllowPaths().add(Path.of(location));
String snapshotName = TestUtil.randomSimpleString(random(), 1, 5);
- String params = "&name=" + snapshotName + "&location=" +
URLEncoder.encode(location, "UTF-8");
+ String params =
+ "&name="
+ + snapshotName
+ + "&location="
+ + URLEncoder.encode(location, StandardCharsets.UTF_8);
String baseUrl = leaderJetty.getBaseUrl().toString();
TestReplicationHandlerBackup.runBackupCommand(
diff --git
a/solr/core/src/test/org/apache/solr/servlet/DirectSolrConnectionTest.java
b/solr/core/src/test/org/apache/solr/servlet/DirectSolrConnectionTest.java
index 33c04688009..8166578f8e2 100644
--- a/solr/core/src/test/org/apache/solr/servlet/DirectSolrConnectionTest.java
+++ b/solr/core/src/test/org/apache/solr/servlet/DirectSolrConnectionTest.java
@@ -17,6 +17,7 @@
package org.apache.solr.servlet;
import java.net.URLEncoder;
+import java.nio.charset.StandardCharsets;
import org.apache.solr.SolrTestCaseJ4;
import org.apache.solr.common.params.CommonParams;
import org.junit.BeforeClass;
@@ -65,7 +66,11 @@ public class DirectSolrConnectionTest extends SolrTestCaseJ4
{
// Test using the Stream body parameter
for (String cmd : cmds) {
direct.request(
- "/update?" + CommonParams.STREAM_BODY + "=" + URLEncoder.encode(cmd,
"UTF-8"), null);
+ "/update?"
+ + CommonParams.STREAM_BODY
+ + "="
+ + URLEncoder.encode(cmd, StandardCharsets.UTF_8),
+ null);
}
String got = direct.request(getIt, null);
assertTrue(got.indexOf(value) > 0);
diff --git a/solr/licenses/error_prone_annotations-2.22.0.jar.sha1
b/solr/licenses/error_prone_annotations-2.22.0.jar.sha1
deleted file mode 100644
index a0a78a421a9..00000000000
--- a/solr/licenses/error_prone_annotations-2.22.0.jar.sha1
+++ /dev/null
@@ -1 +0,0 @@
-bfb9e4281a4cea34f0ec85b3acd47621cfab35b4
diff --git a/solr/licenses/error_prone_annotations-2.23.0.jar.sha1
b/solr/licenses/error_prone_annotations-2.23.0.jar.sha1
new file mode 100644
index 00000000000..4e95d96af0c
--- /dev/null
+++ b/solr/licenses/error_prone_annotations-2.23.0.jar.sha1
@@ -0,0 +1 @@
+43a27853b6c7d54893e0b1997c2c778c347179eb
diff --git a/solr/modules/hdfs/src/test/org/apache/hadoop/fs/FileUtil.java
b/solr/modules/hdfs/src/test/org/apache/hadoop/fs/FileUtil.java
index f9a8717c1c7..29c08364fe3 100644
--- a/solr/modules/hdfs/src/test/org/apache/hadoop/fs/FileUtil.java
+++ b/solr/modules/hdfs/src/test/org/apache/hadoop/fs/FileUtil.java
@@ -736,7 +736,7 @@ public class FileUtil {
try (BufferedReader reader =
new BufferedReader(
new InputStreamReader(process.getInputStream(),
- Charset.forName("UTF-8")))) {
+ StandardCharsets.UTF_8))) {
String line;
while((line = reader.readLine()) != null) {
LOG.debug(line);
@@ -759,7 +759,7 @@ public class FileUtil {
try (BufferedReader reader =
new BufferedReader(
new InputStreamReader(process.getErrorStream(),
- Charset.forName("UTF-8")))) {
+ StandardCharsets.UTF_8))) {
String line;
while((line = reader.readLine()) != null) {
LOG.debug(line);
diff --git
a/solr/modules/hdfs/src/test/org/apache/hadoop/hdfs/server/datanode/fsdataset/impl/BlockPoolSlice.java
b/solr/modules/hdfs/src/test/org/apache/hadoop/hdfs/server/datanode/fsdataset/impl/BlockPoolSlice.java
index 3961fc29641..26536002d27 100644
---
a/solr/modules/hdfs/src/test/org/apache/hadoop/hdfs/server/datanode/fsdataset/impl/BlockPoolSlice.java
+++
b/solr/modules/hdfs/src/test/org/apache/hadoop/hdfs/server/datanode/fsdataset/impl/BlockPoolSlice.java
@@ -55,6 +55,7 @@ import java.io.FileOutputStream;
import java.io.IOException;
import java.io.InputStream;
import java.io.RandomAccessFile;
+import java.nio.charset.StandardCharsets;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.Collections;
@@ -497,7 +498,7 @@ public class BlockPoolSlice {
File.pathSeparator + "." + file.getName() + ".restart");
Scanner sc = null;
try {
- sc = new Scanner(restartMeta, "UTF-8");
+ sc = new Scanner(restartMeta, StandardCharsets.UTF_8);
// The restart meta file exists
if (sc.hasNextLong() && (sc.nextLong() > timer.now())) {
// It didn't expire. Load the replica as a RBW.
diff --git
a/solr/solrj-streaming/src/java/org/apache/solr/client/solrj/io/sql/DriverImpl.java
b/solr/solrj-streaming/src/java/org/apache/solr/client/solrj/io/sql/DriverImpl.java
index 47366bb02dc..3509b54abd1 100644
---
a/solr/solrj-streaming/src/java/org/apache/solr/client/solrj/io/sql/DriverImpl.java
+++
b/solr/solrj-streaming/src/java/org/apache/solr/client/solrj/io/sql/DriverImpl.java
@@ -18,6 +18,7 @@ package org.apache.solr.client.solrj.io.sql;
import java.net.URI;
import java.net.URISyntaxException;
+import java.nio.charset.StandardCharsets;
import java.sql.Connection;
import java.sql.Driver;
import java.sql.DriverManager;
@@ -124,7 +125,7 @@ public class DriverImpl implements Driver {
}
private void loadParams(URI uri, Properties props) throws SQLException {
- List<NameValuePair> parsedParams = URLEncodedUtils.parse(uri, "UTF-8");
+ List<NameValuePair> parsedParams = URLEncodedUtils.parse(uri,
StandardCharsets.UTF_8);
for (NameValuePair pair : parsedParams) {
if (pair.getValue() != null) {
props.put(pair.getName(), pair.getValue());
diff --git
a/solr/solrj-zookeeper/src/java/org/apache/solr/client/solrj/impl/SolrClientCloudManager.java
b/solr/solrj-zookeeper/src/java/org/apache/solr/client/solrj/impl/SolrClientCloudManager.java
index b7645a9a671..626a917e7ed 100644
---
a/solr/solrj-zookeeper/src/java/org/apache/solr/client/solrj/impl/SolrClientCloudManager.java
+++
b/solr/solrj-zookeeper/src/java/org/apache/solr/client/solrj/impl/SolrClientCloudManager.java
@@ -19,6 +19,7 @@ package org.apache.solr.client.solrj.impl;
import java.io.IOException;
import java.lang.invoke.MethodHandles;
+import java.nio.charset.StandardCharsets;
import java.util.Map;
import org.apache.http.HttpEntity;
import org.apache.http.HttpResponse;
@@ -139,7 +140,7 @@ public class SolrClientCloudManager implements
SolrCloudManager {
final HttpRequestBase req;
HttpEntity entity = null;
if (payload != null) {
- entity = new StringEntity(payload, "UTF-8");
+ entity = new StringEntity(payload, StandardCharsets.UTF_8);
}
switch (method) {
case GET:
diff --git a/versions.lock b/versions.lock
index 40b972f5339..98e2d7365b7 100644
--- a/versions.lock
+++ b/versions.lock
@@ -42,7 +42,7 @@ com.google.cloud:google-cloud-core-grpc:2.23.0 (1
constraints: 1b1002a6)
com.google.cloud:google-cloud-core-http:2.23.0 (1 constraints: 1b1002a6)
com.google.cloud:google-cloud-storage:2.27.0 (2 constraints: d71c8a27)
com.google.code.gson:gson:2.10.1 (7 constraints: 005f69b0)
-com.google.errorprone:error_prone_annotations:2.22.0 (11 constraints: b286c424)
+com.google.errorprone:error_prone_annotations:2.23.0 (11 constraints: b286c424)
com.google.guava:failureaccess:1.0.1 (2 constraints: f9199e37)
com.google.guava:guava:32.1.3-jre (26 constraints: 417ba570)
com.google.guava:listenablefuture:9999.0-empty-to-avoid-conflict-with-guava (2
constraints: 4b35b0a0)
diff --git a/versions.props b/versions.props
index 88a579658a5..775683e91e3 100644
--- a/versions.props
+++ b/versions.props
@@ -10,7 +10,7 @@ com.github.ben-manes.caffeine:caffeine=3.1.8
com.github.spotbugs:*=4.8.0
com.github.stephenc.jcip:jcip-annotations=1.0-1
com.google.cloud:google-cloud-bom=0.204.0
-com.google.errorprone:*=2.22.0
+com.google.errorprone:*=2.23.0
com.google.guava:guava=32.1.3-jre
com.google.re2j:re2j=1.7
com.jayway.jsonpath:json-path=2.8.0