upgrade-breaking-change-navigator
Upgrade Breaking Change Navigator
Source mapping: Tier 3 specialized skill derived from Kotlin_Spring_Developer_Pipeline.md (SK-22).
Mission
Turn a risky platform upgrade into a controlled sequence of small, verifiable moves. Optimize for incremental confidence, not for a single giant leap that hides the source of breakage.
Read First
- Current Gradle wrapper, Kotlin plugin, Spring Boot plugin, JDK, and key dependency versions.
- Version catalogs, convention plugins, and BOM ownership.
- Build failures, test failures, runtime startup failures, and deprecation reports.
- The actual libraries and features in use: Security, Data JPA, WebFlux, AOT/native, messaging, serialization, cloud config.
- Official upgrade notes when available.
Upgrade Strategy
- Identify the target version and the last known good current version.
- Identify mandatory intermediate steps. Do not skip major lines casually.
- Separate upgrade layers:
- JDK
- Gradle wrapper
- Kotlin plugin and compiler
- Spring Boot and Spring Framework
- ecosystem libraries
- Upgrade one authority at a time whenever possible.
- After each step, verify:
- dependency resolution
- compile
- tests
- startup smoke
- Record breakages by layer so the root cause stays attributable.
Advanced Upgrade Hotspots
javax.*tojakarta.*is both source migration and dependency compatibility migration.- Spring Security DSL and filter-chain defaults change across major lines. "Compiles" does not mean "same auth behavior."
- Hibernate upgrades can change SQL generation, lazy-loading behavior, sequence handling, and schema expectations.
- Kotlin compiler upgrades can affect KAPT, KSP, compiler plugins, nullability inference, and generated bytecode shape.
- Boot upgrades can change auto-configuration defaults, logging behavior, observability integration, and actuator exposure.
- Native image or AOT support raises a different class of breakages around reflection, proxies, and configuration hints.
- Testcontainers, MockK, bytecode instrumentation, and coverage tooling often lag core platform upgrades.
- JSpecify or other nullability enhancements in upstream libraries may force new Kotlin compile warnings or source changes.
Runtime And Tooling Nuances
- JDK upgrades can tighten module encapsulation, change TLS defaults, alter DNS or timezone behavior, and surface illegal reflective access only in production-like environments.
- Path-matching, error rendering, and Problem Details defaults can shift behavior at the web boundary even when controller code remains unchanged.
- Observability migrations can change metric names, trace propagation, or log correlation behavior, breaking dashboards before the app "breaks."
- Security upgrades frequently change defaults toward stricter behavior. A newly failing request may indicate a safer default, not a broken framework.
- Gradle upgrades can invalidate custom build logic, remote cache assumptions, and plugin internals long before the application code notices.
- Native-image or AOT-capable builds often need separate verification gates because JVM startup passing does not imply native correctness.
Expert Heuristics
- Upgrade the path that gives the highest diagnostic signal first, not merely the path that feels most foundational.
- Upgrade the toolchain that constrains others first only when compatibility docs support that order; otherwise preserve the currently supported matrix as long as possible.
- Let the platform BOM regain control of library families before trying to patch every individual dependency.
- Treat deprecation warnings as migration guidance, not cosmetic noise, when they are in code paths touched by the upgrade.
- If dashboards, alerts, or client contracts are version-sensitive, treat them as part of the upgrade scope, not post-upgrade cleanup.
- If a library is not upgrade-ready, decide whether to pin temporarily, replace it, or postpone the platform target. Do not pretend all paths are equal.
- Maintain a migration log per step: version change, observed failures, compensating fixes, and remaining known risks. This prevents rediscovery loops.
- Prefer canary or staged deployment for behavior-changing upgrades even when compile and test phases are green.
- Preserve a rollback path for deployable upgrades. A technically correct upgrade without operational reversibility is incomplete.
Output Contract
Return these sections:
Current state: the versions and high-risk features in use.Upgrade path: the ordered sequence of upgrades.Breaking-change hotspots: which parts of the codebase are most likely to fail and why.Verification gates: what must pass after each step.Temporary mitigations: acceptable short-lived pins or compatibility shims.Rollback note: how to retreat safely if a step fails in a deployed environment.
Guardrails
- Do not skip major versions without a strong, project-specific reason.
- Do not mix many unrelated upgrade axes into one untraceable patch if avoidable.
- Do not assume compile success equals runtime safety.
- Do not remove compatibility shims without proving callers no longer need them.
Quality Bar
A good run of this skill gives the team an upgrade path with clear checkpoints and known failure hotspots. A bad run is a giant version-bump patch followed by generic advice to "fix whatever breaks."
More from jetbrains/skills
spring-kotlin-code-review
Review Kotlin + Spring changes for behavioral regressions, transaction and proxy bugs, API and serialization mistakes, persistence risks, security issues, configuration drift, and missing tests. Use when reviewing a PR, diff, patch, or design change where generic style-focused review would miss Spring-specific correctness and operational risks.
4dependency-conflict-resolver
Diagnose and resolve Gradle and Spring classpath conflicts, version drift, and binary incompatibilities in Kotlin applications. Use when `NoSuchMethodError`, `ClassNotFoundException`, linkage errors, duplicate logging bindings, Jackson or Hibernate mismatches, or BOM-versus-explicit-version conflicts appear, and the fix must respect the repository's real version authorities.
3doc
Use when the task involves reading, creating, or editing `.docx` documents, especially when formatting or layout fidelity matters; prefer `python-docx` plus the bundled `scripts/render_docx.py` for visual checks.
3kotlin-spring-proxy-compatibility
Diagnose and prevent Kotlin plus Spring proxy failures around `@Transactional`, `@Cacheable`, `@Async`, method security, retry, configuration proxies, and JPA entity requirements. Use when AOP annotations appear to do nothing, transactional or cache behavior is inconsistent, compiler plugins may be missing, self-invocation is suspected, or Kotlin final-by-default semantics may break Spring behavior.
3ci-cd-containerization-advisor
Design reproducible build, image, and deployment pipelines for Kotlin plus Spring applications, including CI verification, layered containers, rollout safety, and deployment-time migration coordination. Use when creating or improving Dockerfiles, CI workflows, image hardening, Kubernetes manifests, release gates, or deployment strategies for Spring Boot services, especially where build reproducibility and operational safety matter.
3kotlin-idiomatic-refactorer-spring-aware
Refactor Kotlin code toward clearer, more idiomatic design without breaking Spring behavior, serialization, persistence, or public contracts. Use when Java-flavored Kotlin needs cleanup, domain modeling should become more expressive, or boilerplate should be reduced, but the refactoring must remain safe for proxies, Jackson, JPA, configuration binding, and existing tests.
3