This is an automated email from the ASF dual-hosted git repository.

zhangliang pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/shardingsphere.git


The following commit(s) were added to refs/heads/master by this push:
     new 244cfc1b365 Fix sonar issue on EncryptPredicateValueTokenGenerator 
(#37985)
244cfc1b365 is described below

commit 244cfc1b365231c9e52ec265812a3933efb17c3b
Author: Liang Zhang <[email protected]>
AuthorDate: Sun Feb 8 23:26:05 2026 +0800

    Fix sonar issue on EncryptPredicateValueTokenGenerator (#37985)
---
 .../generator/predicate/EncryptPredicateValueTokenGenerator.java      | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git 
a/features/encrypt/core/src/main/java/org/apache/shardingsphere/encrypt/rewrite/token/generator/predicate/EncryptPredicateValueTokenGenerator.java
 
b/features/encrypt/core/src/main/java/org/apache/shardingsphere/encrypt/rewrite/token/generator/predicate/EncryptPredicateValueTokenGenerator.java
index 629e7c6d61e..0a3dec59c6c 100644
--- 
a/features/encrypt/core/src/main/java/org/apache/shardingsphere/encrypt/rewrite/token/generator/predicate/EncryptPredicateValueTokenGenerator.java
+++ 
b/features/encrypt/core/src/main/java/org/apache/shardingsphere/encrypt/rewrite/token/generator/predicate/EncryptPredicateValueTokenGenerator.java
@@ -104,14 +104,14 @@ public final class EncryptPredicateValueTokenGenerator 
implements CollectionSQLT
         String tableName = 
encryptCondition.getColumnSegment().getColumnBoundInfo().getOriginalTable().getValue();
         if (encryptCondition instanceof EncryptBinaryCondition && 
("LIKE".equalsIgnoreCase(((EncryptBinaryCondition) 
encryptCondition).getOperator())
                 || "NOT LIKE".equalsIgnoreCase(((EncryptBinaryCondition) 
encryptCondition).getOperator()))) {
-            return getLikeQueryEncryptedValues(schemaName, encryptTable, 
encryptCondition, originalValues, encryptColumn, tableName, columnName);
+            return getLikeQueryEncryptedValues(schemaName, encryptCondition, 
originalValues, encryptColumn, tableName, columnName);
         }
         return encryptColumn.getAssistedQuery()
                 .map(optional -> optional.encrypt(database.getName(), 
schemaName, tableName, 
encryptCondition.getColumnSegment().getIdentifier().getValue(), originalValues))
                 .orElseGet(() -> 
encryptColumn.getCipher().encrypt(database.getName(), schemaName, tableName, 
encryptCondition.getColumnSegment().getIdentifier().getValue(), 
originalValues));
     }
     
-    private List<Object> getLikeQueryEncryptedValues(final String schemaName, 
final EncryptTable encryptTable, final EncryptCondition encryptCondition,
+    private List<Object> getLikeQueryEncryptedValues(final String schemaName, 
final EncryptCondition encryptCondition,
                                                      final List<Object> 
originalValues, final EncryptColumn encryptColumn, final String tableName, 
final String columnName) {
         
ShardingSpherePreconditions.checkState(encryptColumn.getLikeQuery().isPresent() 
|| encryptColumn.getCipher().getEncryptor().getMetaData().isSupportLike(),
                 () -> new 
MissingMatchedEncryptQueryAlgorithmException(tableName, columnName, "LIKE"));

Reply via email to