Skip to content

Commit

Permalink
chore: fix sonar issues (#3781)
Browse files Browse the repository at this point in the history
Signed-off-by: Richard Salac <richard.salac@broadcom.com>
  • Loading branch information
richard-salac committed Sep 19, 2024
1 parent 982ca45 commit ce4bc5c
Show file tree
Hide file tree
Showing 34 changed files with 289 additions and 326 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,6 @@
import java.util.*;
import java.util.concurrent.atomic.AtomicBoolean;

import static java.util.stream.Collectors.toList;
import static org.zowe.apiml.constants.EurekaMetadataDefinition.*;

/**
Expand Down Expand Up @@ -113,7 +112,7 @@ public List<APIContainer> getRecentlyUpdatedContainers() {
" was updated recently");
}
return isRecent;
}).collect(toList());
}).toList();
}

/**
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -399,7 +399,7 @@ private InstanceInfo getInstanceInfo(String serviceId) {
* @deprecated Added to support services which were on-boarded before 'apiml.apiInfo.swaggerUrl' parameter was
* introduced. It will be removed when all services will be using the new configuration style.
*/
@Deprecated
@Deprecated(forRemoval = false)
private String createApiDocUrlFromRouting(InstanceInfo instanceInfo, RoutedServices routes) {
String scheme;
int port;
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,7 @@ export default function GraphQLUIApiml(props) {
try {
const introspectionQuery = getIntrospectionQuery();
const result = await fetcher({ query: introspectionQuery });
if (result && result.data) {
if (result?.data) {
const clientSchema = buildClientSchema(result.data);
setSchema(clientSchema);
} else {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
*
* Copyright Contributors to the Zowe Project.
*/
import { Link, Typography, Tooltip, MenuItem, Select, Button } from '@material-ui/core';
import { Button, Link, MenuItem, Select, Tooltip, Typography } from '@material-ui/core';
import { Component } from 'react';
import PropTypes from 'prop-types';
import Shield from '../ErrorBoundary/Shield/Shield';
Expand Down Expand Up @@ -142,7 +142,7 @@ export default class ServiceTab extends Component {
if (!apis || typeof apis !== 'object') {
return null;
}
const apiKey = Object.keys(apis).find((key) => apis[key] && apis[key].graphqlUrl);
const apiKey = Object.keys(apis).find((key) => apis[key]?.graphqlUrl);
return apiKey ? apis[apiKey].graphqlUrl : null;
};

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -104,8 +104,6 @@ public static class CookieProperties {
private String cookieNamePAT = ApimlConstants.PAT_COOKIE_AUTH_NAME;
private boolean cookieSecure = true;
private String cookiePath = "/";
@Deprecated(since = "Servlet 6.0", forRemoval = true)
private String cookieComment = "API Mediation Layer security token";
private Integer cookieMaxAge = null;
private SameSiteCookies cookieSameSite = SameSiteCookies.STRICT;
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,8 @@

package org.zowe.apiml.security.common.login;

import jakarta.servlet.http.HttpServletRequest;
import jakarta.servlet.http.HttpServletResponse;
import lombok.RequiredArgsConstructor;
import org.springframework.http.HttpStatus;
import org.springframework.security.core.Authentication;
Expand All @@ -19,9 +21,6 @@
import org.zowe.apiml.security.common.token.TokenAuthentication;
import org.zowe.apiml.util.CookieUtil;

import jakarta.servlet.http.HttpServletRequest;
import jakarta.servlet.http.HttpServletResponse;

/**
* Handles the successful login
*/
Expand Down Expand Up @@ -59,7 +58,6 @@ private void setCookie(String token, HttpServletResponse response) {

AuthConfigurationProperties.CookieProperties cp = authConfigurationProperties.getCookieProperties();
String cookieHeader = new CookieUtil.CookieHeaderBuilder(cp.getCookieName(), token)
.comment(cp.getCookieComment())
.path(cp.getCookiePath())
.sameSite(cp.getCookieSameSite().getValue())
.maxAge(cp.getCookieMaxAge())
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,10 +20,7 @@
import java.util.List;

import static org.hamcrest.CoreMatchers.hasItem;
import static org.mockito.Mockito.mock;
import static org.mockito.Mockito.times;
import static org.mockito.Mockito.verify;
import static org.mockito.Mockito.when;
import static org.mockito.Mockito.*;
import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get;
import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.post;
import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.jsonPath;
Expand Down Expand Up @@ -55,7 +52,6 @@ public void setup() {

@Test
void listDefinitions() throws Exception {
String serviceName = "service";
String basicToken = "Basic " + Base64.getEncoder().encodeToString(CREDENTIALS.getBytes());

when(registrationService.getStaticInstances()).thenReturn(instancesInfo);
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -77,9 +77,9 @@ private WebClient createLoadBalanced(WebClient webClient, ReactiveLoadBalancer.F

private WebClient.RequestBodySpec getWebclient(ServerRequest serverRequest, String path) {
var sslInfo = serverRequest.exchange().getRequest().getSslInfo();
var webClient = sslInfo == null ? this.webClient : this.webClientClientCert;
var client = sslInfo == null ? this.webClient : this.webClientClientCert;

var request = webClient
var request = client
.method(serverRequest.method())
.uri("lb://zaas/zaas" + path)
.headers(headers -> headers.addAll(serverRequest.headers().asHttpHeaders()))
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -42,9 +42,9 @@ public List<FilterDefinition> filters() {
}

if (!allowEncodedSlashes) {
var allowEncodedSlashes = new FilterDefinition();
allowEncodedSlashes.setName("ForbidEncodedSlashesFilterFactory");
filters.add(allowEncodedSlashes);
var encodedSlashesFilter = new FilterDefinition();
encodedSlashesFilter.setName("ForbidEncodedSlashesFilterFactory");
filters.add(encodedSlashesFilter);
}

var secureHeaders = new FilterDefinition();
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -134,7 +134,7 @@ void updatePaths(OpenAPI openApi, String pathToMatch) {

String download(URI uri) {
return webClient
.get().uri(zaasUri)
.get().uri(uri)
.retrieve()
.bodyToMono(String.class).share().block();
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -66,7 +66,7 @@ private void update(String id, Registration registration) {

String scope = getSystemEnv(id, REGISTRATION_ENV_TYPE, "scope");
if (scope != null) {
registration.setScope(Arrays.asList(scope.split("[,]")));
registration.setScope(Arrays.asList(scope.split(",")));
}
}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -79,7 +79,7 @@ public Mono<Void> setBodyResponse(ServerWebExchange exchange, int responseCode,
return serverWebExchange.getResponse().writeWith(Flux.just(buffer));
} catch (JsonProcessingException e) {
apimlLog.log("org.zowe.apiml.security.errorWritingResponse", e.getMessage());
throw new RuntimeException(e);
return Mono.error(e);
}
}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -66,6 +66,8 @@ class KeyringFormatAndPasswordUpdate {

ApplicationContext context;

ConnectionsConfig noContextConnectionsConfig = new ConnectionsConfig(null);

@BeforeEach
void setup() {
context = mock(ApplicationContext.class);
Expand All @@ -76,30 +78,28 @@ void setup() {

@Test
void whenKeyringHasWrongFormatAndMissingPasswords_thenFixIt() {
ConnectionsConfig connectionsConfig = new ConnectionsConfig(null);
ReflectionTestUtils.setField(connectionsConfig, "keyStorePath", "safkeyring:///userId/ringId1");
ReflectionTestUtils.setField(connectionsConfig, "trustStorePath", "safkeyring:////userId/ringId2");
ReflectionTestUtils.setField(connectionsConfig, "context", context);
connectionsConfig.updateConfigParameters();

assertThat(ReflectionTestUtils.getField(connectionsConfig, "keyStorePath")).isEqualTo("safkeyring://userId/ringId1");
assertThat(ReflectionTestUtils.getField(connectionsConfig, "trustStorePath")).isEqualTo("safkeyring://userId/ringId2");
assertThat((char[]) ReflectionTestUtils.getField(connectionsConfig, "keyStorePassword")).isEqualTo("password".toCharArray());
assertThat((char[]) ReflectionTestUtils.getField(connectionsConfig, "trustStorePassword")).isEqualTo("password".toCharArray());
ReflectionTestUtils.setField(noContextConnectionsConfig, "keyStorePath", "safkeyring:///userId/ringId1");
ReflectionTestUtils.setField(noContextConnectionsConfig, "trustStorePath", "safkeyring:////userId/ringId2");
ReflectionTestUtils.setField(noContextConnectionsConfig, "context", context);
noContextConnectionsConfig.updateConfigParameters();

assertThat(ReflectionTestUtils.getField(noContextConnectionsConfig, "keyStorePath")).isEqualTo("safkeyring://userId/ringId1");
assertThat(ReflectionTestUtils.getField(noContextConnectionsConfig, "trustStorePath")).isEqualTo("safkeyring://userId/ringId2");
assertThat((char[]) ReflectionTestUtils.getField(noContextConnectionsConfig, "keyStorePassword")).isEqualTo("password".toCharArray());
assertThat((char[]) ReflectionTestUtils.getField(noContextConnectionsConfig, "trustStorePassword")).isEqualTo("password".toCharArray());
}

@Test
void whenKeystore_thenDoNothing() {
ConnectionsConfig connectionsConfig = new ConnectionsConfig(null);
ReflectionTestUtils.setField(connectionsConfig, "keyStorePath", "/path1");
ReflectionTestUtils.setField(connectionsConfig, "trustStorePath", "/path2");
ReflectionTestUtils.setField(connectionsConfig, "context", context);
connectionsConfig.updateConfigParameters();

assertThat(ReflectionTestUtils.getField(connectionsConfig, "keyStorePath")).isEqualTo("/path1");
assertThat(ReflectionTestUtils.getField(connectionsConfig, "trustStorePath")).isEqualTo("/path2");
assertThat(ReflectionTestUtils.getField(connectionsConfig, "keyStorePassword")).isNull();
assertThat(ReflectionTestUtils.getField(connectionsConfig, "trustStorePassword")).isNull();
ReflectionTestUtils.setField(noContextConnectionsConfig, "keyStorePath", "/path1");
ReflectionTestUtils.setField(noContextConnectionsConfig, "trustStorePath", "/path2");
ReflectionTestUtils.setField(noContextConnectionsConfig, "context", context);
noContextConnectionsConfig.updateConfigParameters();

assertThat(ReflectionTestUtils.getField(noContextConnectionsConfig, "keyStorePath")).isEqualTo("/path1");
assertThat(ReflectionTestUtils.getField(noContextConnectionsConfig, "trustStorePath")).isEqualTo("/path2");
assertThat(ReflectionTestUtils.getField(noContextConnectionsConfig, "keyStorePassword")).isNull();
assertThat(ReflectionTestUtils.getField(noContextConnectionsConfig, "trustStorePassword")).isNull();
}
}
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -82,10 +82,10 @@ class GetHttpClient {

NettyRoutingFilterApiml nettyRoutingFilterApiml;
private final Route ROUTE_NO_TIMEOUT = Route.async()
.id("1").uri("http://localhost/").predicate(serverWebExchange -> true)
.id("1").uri("http://localhost/").predicate(__ -> true)
.build();
private final Route ROUTE_TIMEOUT = Route.async()
.id("2").uri("http://localhost/").predicate(serverWebExchange -> true).metadata(CONNECT_TIMEOUT_ATTR, "100")
.id("2").uri("http://localhost/").predicate(__ -> true).metadata(CONNECT_TIMEOUT_ATTR, "100")
.build();
MockServerWebExchange serverWebExchange;

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -28,53 +28,57 @@ class CertificatesRestControllerTest {
private static final String NO_CERTIFICATES = "";

private static final String SINGLE_CERTIFICATE =
"-----BEGIN CERTIFICATE-----\n" +
"MIICUTCCAfugAwIBAgIBADANBgkqhkiG9w0BAQQFADBXMQswCQYDVQQGEwJDTjEL\n" +
"MAkGA1UECBMCUE4xCzAJBgNVBAcTAkNOMQswCQYDVQQKEwJPTjELMAkGA1UECxMC\n" +
"VU4xFDASBgNVBAMTC0hlcm9uZyBZYW5nMB4XDTA1MDcxNTIxMTk0N1oXDTA1MDgx\n" +
"NDIxMTk0N1owVzELMAkGA1UEBhMCQ04xCzAJBgNVBAgTAlBOMQswCQYDVQQHEwJD\n" +
"TjELMAkGA1UEChMCT04xCzAJBgNVBAsTAlVOMRQwEgYDVQQDEwtIZXJvbmcgWWFu\n" +
"ZzBcMA0GCSqGSIb3DQEBAQUAA0sAMEgCQQCp5hnG7ogBhtlynpOS21cBewKE/B7j\n" +
"V14qeyslnr26xZUsSVko36ZnhiaO/zbMOoRcKK9vEcgMtcLFuQTWDl3RAgMBAAGj\n" +
"gbEwga4wHQYDVR0OBBYEFFXI70krXeQDxZgbaCQoR4jUDncEMH8GA1UdIwR4MHaA\n" +
"FFXI70krXeQDxZgbaCQoR4jUDncEoVukWTBXMQswCQYDVQQGEwJDTjELMAkGA1UE\n" +
"CBMCUE4xCzAJBgNVBAcTAkNOMQswCQYDVQQKEwJPTjELMAkGA1UECxMCVU4xFDAS\n" +
"BgNVBAMTC0hlcm9uZyBZYW5nggEAMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEE\n" +
"BQADQQA/ugzBrjjK9jcWnDVfGHlk3icNRq0oV7Ri32z/+HQX67aRfgZu7KWdI+Ju\n" +
"Wm7DCfrPNGVwFWUQOmsPue9rZBgO\n" +
"-----END CERTIFICATE-----";
"""
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
""".stripIndent();

private static final String CERTIFICATE_CHAIN =
"-----BEGIN CERTIFICATE-----\n" +
"MIICUTCCAfugAwIBAgIBADANBgkqhkiG9w0BAQQFADBXMQswCQYDVQQGEwJDTjEL\n" +
"MAkGA1UECBMCUE4xCzAJBgNVBAcTAkNOMQswCQYDVQQKEwJPTjELMAkGA1UECxMC\n" +
"VU4xFDASBgNVBAMTC0hlcm9uZyBZYW5nMB4XDTA1MDcxNTIxMTk0N1oXDTA1MDgx\n" +
"NDIxMTk0N1owVzELMAkGA1UEBhMCQ04xCzAJBgNVBAgTAlBOMQswCQYDVQQHEwJD\n" +
"TjELMAkGA1UEChMCT04xCzAJBgNVBAsTAlVOMRQwEgYDVQQDEwtIZXJvbmcgWWFu\n" +
"ZzBcMA0GCSqGSIb3DQEBAQUAA0sAMEgCQQCp5hnG7ogBhtlynpOS21cBewKE/B7j\n" +
"V14qeyslnr26xZUsSVko36ZnhiaO/zbMOoRcKK9vEcgMtcLFuQTWDl3RAgMBAAGj\n" +
"gbEwga4wHQYDVR0OBBYEFFXI70krXeQDxZgbaCQoR4jUDncEMH8GA1UdIwR4MHaA\n" +
"FFXI70krXeQDxZgbaCQoR4jUDncEoVukWTBXMQswCQYDVQQGEwJDTjELMAkGA1UE\n" +
"CBMCUE4xCzAJBgNVBAcTAkNOMQswCQYDVQQKEwJPTjELMAkGA1UECxMCVU4xFDAS\n" +
"BgNVBAMTC0hlcm9uZyBZYW5nggEAMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEE\n" +
"BQADQQA/ugzBrjjK9jcWnDVfGHlk3icNRq0oV7Ri32z/+HQX67aRfgZu7KWdI+Ju\n" +
"Wm7DCfrPNGVwFWUQOmsPue9rZBgO\n" +
"-----END CERTIFICATE-----\n" +
"-----BEGIN CERTIFICATE-----\n" +
"MIICUTCCAfugAwIBAgIBADANBgkqhkiG9w0BAQQFADBXMQswCQYDVQQGEwJDTjEL\n" +
"MAkGA1UECBMCUE4xCzAJBgNVBAcTAkNOMQswCQYDVQQKEwJPTjELMAkGA1UECxMC\n" +
"VU4xFDASBgNVBAMTC0hlcm9uZyBZYW5nMB4XDTA1MDcxNTIxMTk0N1oXDTA1MDgx\n" +
"NDIxMTk0N1owVzELMAkGA1UEBhMCQ04xCzAJBgNVBAgTAlBOMQswCQYDVQQHEwJD\n" +
"TjELMAkGA1UEChMCT04xCzAJBgNVBAsTAlVOMRQwEgYDVQQDEwtIZXJvbmcgWWFu\n" +
"ZzBcMA0GCSqGSIb3DQEBAQUAA0sAMEgCQQCp5hnG7ogBhtlynpOS21cBewKE/B7j\n" +
"V14qeyslnr26xZUsSVko36ZnhiaO/zbMOoRcKK9vEcgMtcLFuQTWDl3RAgMBAAGj\n" +
"gbEwga4wHQYDVR0OBBYEFFXI70krXeQDxZgbaCQoR4jUDncEMH8GA1UdIwR4MHaA\n" +
"FFXI70krXeQDxZgbaCQoR4jUDncEoVukWTBXMQswCQYDVQQGEwJDTjELMAkGA1UE\n" +
"CBMCUE4xCzAJBgNVBAcTAkNOMQswCQYDVQQKEwJPTjELMAkGA1UECxMCVU4xFDAS\n" +
"BgNVBAMTC0hlcm9uZyBZYW5nggEAMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEE\n" +
"BQADQQA/ugzBrjjK9jcWnDVfGHlk3icNRq0oV7Ri32z/+HQX67aRfgZu7KWdI+Ju\n" +
"Wm7DCfrPNGVwFWUQOmsPue9rZBgO\n" +
"-----END CERTIFICATE-----";
"""
-----BEGIN CERTIFICATE-----
MIICUTCCAfugAwIBAgIBADANBgkqhkiG9w0BAQQFADBXMQswCQYDVQQGEwJDTjEL
MAkGA1UECBMCUE4xCzAJBgNVBAcTAkNOMQswCQYDVQQKEwJPTjELMAkGA1UECxMC
VU4xFDASBgNVBAMTC0hlcm9uZyBZYW5nMB4XDTA1MDcxNTIxMTk0N1oXDTA1MDgx
NDIxMTk0N1owVzELMAkGA1UEBhMCQ04xCzAJBgNVBAgTAlBOMQswCQYDVQQHEwJD
TjELMAkGA1UEChMCT04xCzAJBgNVBAsTAlVOMRQwEgYDVQQDEwtIZXJvbmcgWWFu
ZzBcMA0GCSqGSIb3DQEBAQUAA0sAMEgCQQCp5hnG7ogBhtlynpOS21cBewKE/B7j
V14qeyslnr26xZUsSVko36ZnhiaO/zbMOoRcKK9vEcgMtcLFuQTWDl3RAgMBAAGj
gbEwga4wHQYDVR0OBBYEFFXI70krXeQDxZgbaCQoR4jUDncEMH8GA1UdIwR4MHaA
FFXI70krXeQDxZgbaCQoR4jUDncEoVukWTBXMQswCQYDVQQGEwJDTjELMAkGA1UE
CBMCUE4xCzAJBgNVBAcTAkNOMQswCQYDVQQKEwJPTjELMAkGA1UECxMCVU4xFDAS
BgNVBAMTC0hlcm9uZyBZYW5nggEAMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEE
BQADQQA/ugzBrjjK9jcWnDVfGHlk3icNRq0oV7Ri32z/+HQX67aRfgZu7KWdI+Ju
Wm7DCfrPNGVwFWUQOmsPue9rZBgO
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
""".stripIndent();

@Autowired
WebTestClient webTestClient;
Expand Down
Loading

0 comments on commit ce4bc5c

Please sign in to comment.