Skip to content

refactor: relocate all packages from io.streamthoughts.jikkou to io.jikkou#754

Merged
fhussonnois merged 1 commit intomainfrom
refactor/relocate-packages-to-io-jikkou
Apr 9, 2026
Merged

refactor: relocate all packages from io.streamthoughts.jikkou to io.jikkou#754
fhussonnois merged 1 commit intomainfrom
refactor/relocate-packages-to-io-jikkou

Conversation

@fhussonnois
Copy link
Copy Markdown
Member

Summary

Relocate all Java packages from io.streamthoughts.jikkou to io.jikkou to simplify the namespace and better reflect the project identity.

  • Renamed all Java packages across 18 modules (~1,122 files)
  • Changed Maven groupId from io.streamthoughts to io.jikkou
  • Renamed META-INF/services files and native-image metadata directories
  • Updated all configuration files (reference.conf, application.yml, etc.)
  • Updated documentation references

Backward Compatibility

Added DeprecatedClassNameResolver to ensure existing user configurations referencing old io.streamthoughts.jikkou.* FQCNs continue to work:

  • Input boundary: ExtensionConfigEntry.of() rewrites old prefixes with a deprecation warning
  • Alias registration: DefaultExtensionRegistry registers old-prefix FQCNs as aliases
  • Planned for removal in the next major version

Closes #746

Test plan

  • All existing tests pass (./mvnw test — BUILD SUCCESS)
  • Code compiles cleanly (./mvnw clean compile)
  • Formatting applied (./mvnw spotless:apply)
  • No remaining io.streamthoughts.jikkou references except in backward compat classes
  • Verify old FQCNs in user config files still resolve correctly at runtime
  • Verify native image build works with new package structure

…ikkou

Relocate all Java packages from io.streamthoughts.jikkou to io.jikkou
to simplify the namespace and align with project identity.

Changes:
- Rename all Java packages across 18 modules (~1,122 files)
- Update Maven groupId from io.streamthoughts to io.jikkou
- Rename META-INF/services files to use new SPI interface name
- Rename native-image metadata directories
- Update all config files (reference.conf, application.yml, etc.)
- Update documentation references
- Add DeprecatedClassNameResolver for backward compatibility:
  old io.streamthoughts.jikkou FQCNs in user configs resolve
  with a deprecation warning, planned for removal in next major version

Closes #746
@sonarqubecloud
Copy link
Copy Markdown

sonarqubecloud bot commented Apr 9, 2026

Quality Gate Failed Quality Gate failed

Failed conditions
55.8% Coverage on New Code (required ≥ 80%)
3.4% Duplication on New Code (required ≤ 3%)
D Reliability Rating on New Code (required ≥ A)

See analysis details on SonarQube Cloud

Catch issues before they fail your Quality Gate with our IDE extension SonarQube for IDE

@github-actions
Copy link
Copy Markdown
Contributor

github-actions bot commented Apr 9, 2026

Security Scan Results

Vulnerabilities detected:


Report Summary

┌───────────────────────────────────────────────────┬───────┬─────────────────┬─────────┐
│                      Target                       │ Type  │ Vulnerabilities │ Secrets │
├───────────────────────────────────────────────────┼───────┼─────────────────┼─────────┤
│ cli/pom.xml                                       │  pom  │        2        │    -    │
├───────────────────────────────────────────────────┼───────┼─────────────────┼─────────┤
│ core/pom.xml                                      │  pom  │        0        │    -    │
├───────────────────────────────────────────────────┼───────┼─────────────────┼─────────┤
│ docs/go.mod                                       │ gomod │        0        │    -    │
├───────────────────────────────────────────────────┼───────┼─────────────────┼─────────┤
│ extension-rest-client/pom.xml                     │  pom  │        0        │    -    │
├───────────────────────────────────────────────────┼───────┼─────────────────┼─────────┤
│ pom.xml                                           │  pom  │        4        │    -    │
├───────────────────────────────────────────────────┼───────┼─────────────────┼─────────┤
│ processor/pom.xml                                 │  pom  │        0        │    -    │
├───────────────────────────────────────────────────┼───────┼─────────────────┼─────────┤
│ providers/jikkou-provider-aiven/pom.xml           │  pom  │        0        │    -    │
├───────────────────────────────────────────────────┼───────┼─────────────────┼─────────┤
│ providers/jikkou-provider-aws/pom.xml             │  pom  │        0        │    -    │
├───────────────────────────────────────────────────┼───────┼─────────────────┼─────────┤
│ providers/jikkou-provider-confluent/pom.xml       │  pom  │        0        │    -    │
├───────────────────────────────────────────────────┼───────┼─────────────────┼─────────┤
│ providers/jikkou-provider-core/pom.xml            │  pom  │        0        │    -    │
├───────────────────────────────────────────────────┼───────┼─────────────────┼─────────┤
│ providers/jikkou-provider-iceberg/pom.xml         │  pom  │        0        │    -    │
├───────────────────────────────────────────────────┼───────┼─────────────────┼─────────┤
│ providers/jikkou-provider-kafka-connect/pom.xml   │  pom  │        0        │    -    │
├───────────────────────────────────────────────────┼───────┼─────────────────┼─────────┤
│ providers/jikkou-provider-kafka/pom.xml           │  pom  │        0        │    -    │
├───────────────────────────────────────────────────┼───────┼─────────────────┼─────────┤
│ providers/jikkou-provider-schema-registry/pom.xml │  pom  │        0        │    -    │
├───────────────────────────────────────────────────┼───────┼─────────────────┼─────────┤
│ resource-generator/pom.xml                        │  pom  │        0        │    -    │
├───────────────────────────────────────────────────┼───────┼─────────────────┼─────────┤
│ server/jikkou-api-client/pom.xml                  │  pom  │        0        │    -    │
├───────────────────────────────────────────────────┼───────┼─────────────────┼─────────┤
│ server/jikkou-api-data/pom.xml                    │  pom  │        0        │    -    │
├───────────────────────────────────────────────────┼───────┼─────────────────┼─────────┤
│ server/jikkou-api-server/pom.xml                  │  pom  │        2        │    -    │
├───────────────────────────────────────────────────┼───────┼─────────────────┼─────────┤
│ template-jinja/pom.xml                            │  pom  │        0        │    -    │
└───────────────────────────────────────────────────┴───────┴─────────────────┴─────────┘
Legend:
- '-': Not scanned
- '0': Clean (no security findings detected)


For OSS Maintainers: VEX Notice
--------------------------------
If you're an OSS maintainer and Trivy has detected vulnerabilities in your project that you believe are not actually exploitable, consider issuing a VEX (Vulnerability Exploitability eXchange) statement.
VEX allows you to communicate the actual status of vulnerabilities in your project, improving security transparency and reducing false positives for your users.
Learn more and start using VEX: https://trivy.dev/docs/v0.69/guide/supply-chain/vex/repo#publishing-vex-documents

To disable this notice, set the TRIVY_DISABLE_VEX_NOTICE environment variable.


cli/pom.xml (pom)
=================
Total: 2 (HIGH: 2, CRITICAL: 0)

┌────────────────────────────┬────────────────┬──────────┬────────┬───────────────────┬─────────────────────────────┬────────────────────────────────────────────────────────────┐
│          Library           │ Vulnerability  │ Severity │ Status │ Installed Version │        Fixed Version        │                           Title                            │
├────────────────────────────┼────────────────┼──────────┼────────┼───────────────────┼─────────────────────────────┼────────────────────────────────────────────────────────────┤
│ io.netty:netty-codec-http  │ CVE-2026-33870 │ HIGH     │ fixed  │ 4.2.9.Final       │ 4.1.132.Final, 4.2.10.Final │ io.netty/netty-codec-http: Netty: Request smuggling via    │
│                            │                │          │        │                   │                             │ incorrect parsing of HTTP/1.1 chunked transfer encoding... │
│                            │                │          │        │                   │                             │ https://avd.aquasec.com/nvd/cve-2026-33870                 │
├────────────────────────────┼────────────────┤          │        │                   ├─────────────────────────────┼────────────────────────────────────────────────────────────┤
│ io.netty:netty-codec-http2 │ CVE-2026-33871 │          │        │                   │ 4.1.132.Final, 4.2.11.Final │ netty: Netty: Denial of Service via HTTP/2 CONTINUATION    │
│                            │                │          │        │                   │                             │ frame flood                                                │
│                            │                │          │        │                   │                             │ https://avd.aquasec.com/nvd/cve-2026-33871                 │
└────────────────────────────┴────────────────┴──────────┴────────┴───────────────────┴─────────────────────────────┴────────────────────────────────────────────────────────────┘

pom.xml (pom)
=============
Total: 4 (HIGH: 4, CRITICAL: 0)

┌────────────────────────────┬────────────────┬──────────┬────────┬───────────────────┬─────────────────────────────┬────────────────────────────────────────────────────────────┐
│          Library           │ Vulnerability  │ Severity │ Status │ Installed Version │        Fixed Version        │                           Title                            │
├────────────────────────────┼────────────────┼──────────┼────────┼───────────────────┼─────────────────────────────┼────────────────────────────────────────────────────────────┤
│ io.netty:netty-codec-http  │ CVE-2026-33870 │ HIGH     │ fixed  │ 4.2.9.Final       │ 4.1.132.Final, 4.2.10.Final │ io.netty/netty-codec-http: Netty: Request smuggling via    │
│                            │                │          │        │                   │                             │ incorrect parsing of HTTP/1.1 chunked transfer encoding... │
│                            │                │          │        │                   │                             │ https://avd.aquasec.com/nvd/cve-2026-33870                 │
│                            │                │          │        │                   │                             │                                                            │
│                            │                │          │        │                   │                             │                                                            │
│                            │                │          │        │                   │                             │                                                            │
│                            │                │          │        │                   │                             │                                                            │
├────────────────────────────┼────────────────┤          │        │                   ├─────────────────────────────┼────────────────────────────────────────────────────────────┤
│ io.netty:netty-codec-http2 │ CVE-2026-33871 │          │        │                   │ 4.1.132.Final, 4.2.11.Final │ netty: Netty: Denial of Service via HTTP/2 CONTINUATION    │
│                            │                │          │        │                   │                             │ frame flood                                                │
│                            │                │          │        │                   │                             │ https://avd.aquasec.com/nvd/cve-2026-33871                 │
│                            │                │          │        │                   │                             │                                                            │
│                            │                │          │        │                   │                             │                                                            │
│                            │                │          │        │                   │                             │                                                            │
│                            │                │          │        │                   │                             │                                                            │
└────────────────────────────┴────────────────┴──────────┴────────┴───────────────────┴─────────────────────────────┴────────────────────────────────────────────────────────────┘

server/jikkou-api-server/pom.xml (pom)
======================================
Total: 2 (HIGH: 2, CRITICAL: 0)

┌────────────────────────────┬────────────────┬──────────┬────────┬───────────────────┬─────────────────────────────┬────────────────────────────────────────────────────────────┐
│          Library           │ Vulnerability  │ Severity │ Status │ Installed Version │        Fixed Version        │                           Title                            │
├────────────────────────────┼────────────────┼──────────┼────────┼───────────────────┼─────────────────────────────┼────────────────────────────────────────────────────────────┤
│ io.netty:netty-codec-http  │ CVE-2026-33870 │ HIGH     │ fixed  │ 4.2.9.Final       │ 4.1.132.Final, 4.2.10.Final │ io.netty/netty-codec-http: Netty: Request smuggling via    │
│                            │                │          │        │                   │                             │ incorrect parsing of HTTP/1.1 chunked transfer encoding... │
│                            │                │          │        │                   │                             │ https://avd.aquasec.com/nvd/cve-2026-33870                 │
├────────────────────────────┼────────────────┤          │        │                   ├─────────────────────────────┼────────────────────────────────────────────────────────────┤
│ io.netty:netty-codec-http2 │ CVE-2026-33871 │          │        │                   │ 4.1.132.Final, 4.2.11.Final │ netty: Netty: Denial of Service via HTTP/2 CONTINUATION    │
│                            │                │          │        │                   │                             │ frame flood                                                │
│                            │                │          │        │                   │                             │ https://avd.aquasec.com/nvd/cve-2026-33871                 │
└────────────────────────────┴────────────────┴──────────┴────────┴───────────────────┴─────────────────────────────┴────────────────────────────────────────────────────────────┘

Scanned by Trivy

@fhussonnois fhussonnois merged commit c84605d into main Apr 9, 2026
3 of 4 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Relocate all classes from io.streamthoughts.jikkou to io.jikkou

1 participant