]> source.dussan.org Git - sonarqube.git/commitdiff
Fix integer type of user and group ids
authorSimon Brandhof <simon.brandhof@sonarsource.com>
Sat, 11 Feb 2017 14:29:08 +0000 (15:29 +0100)
committerSimon Brandhof <simon.brandhof@sonarsource.com>
Thu, 16 Feb 2017 20:09:41 +0000 (21:09 +0100)
User IDs are INTEGER in database. The java classes are fixed
to replace long by int.

112 files changed:
server/sonar-db-migration/src/main/java/org/sonar/server/platform/db/migration/version/v62/PopulateOrganizationUuidOfGroups.java
server/sonar-db-migration/src/main/java/org/sonar/server/platform/db/migration/version/v62/PopulateOrganizationUuidOfPermissionTemplates.java
server/sonar-db-migration/src/test/java/org/sonar/server/platform/db/migration/version/v61/PopulateTableProperties2Test.java
server/sonar-db-migration/src/test/java/org/sonar/server/platform/db/migration/version/v62/PopulateIsRootColumnOnTableUsersTest.java
server/sonar-server/src/main/java/org/sonar/server/component/ComponentUpdater.java
server/sonar-server/src/main/java/org/sonar/server/component/DefaultRubyComponentService.java
server/sonar-server/src/main/java/org/sonar/server/computation/queue/ReportSubmitter.java
server/sonar-server/src/main/java/org/sonar/server/favorite/FavoriteUpdater.java
server/sonar-server/src/main/java/org/sonar/server/favorite/ws/AddAction.java
server/sonar-server/src/main/java/org/sonar/server/favorite/ws/RemoveAction.java
server/sonar-server/src/main/java/org/sonar/server/notification/NotificationUpdater.java
server/sonar-server/src/main/java/org/sonar/server/organization/OrganizationCreation.java
server/sonar-server/src/main/java/org/sonar/server/organization/OrganizationCreationImpl.java
server/sonar-server/src/main/java/org/sonar/server/organization/ws/CreateAction.java
server/sonar-server/src/main/java/org/sonar/server/permission/PermissionTemplateService.java
server/sonar-server/src/main/java/org/sonar/server/permission/UserId.java
server/sonar-server/src/main/java/org/sonar/server/permission/index/PermissionIndexerDao.java
server/sonar-server/src/main/java/org/sonar/server/permission/ws/GroupsAction.java
server/sonar-server/src/main/java/org/sonar/server/permission/ws/PermissionWsSupport.java
server/sonar-server/src/main/java/org/sonar/server/permission/ws/UsersAction.java
server/sonar-server/src/main/java/org/sonar/server/permission/ws/template/TemplateGroupsAction.java
server/sonar-server/src/main/java/org/sonar/server/permission/ws/template/TemplateUsersAction.java
server/sonar-server/src/main/java/org/sonar/server/project/ws/CreateAction.java
server/sonar-server/src/main/java/org/sonar/server/project/ws/SearchMyProjectsDataLoader.java
server/sonar-server/src/main/java/org/sonar/server/usergroups/ws/GroupId.java
server/sonar-server/src/main/java/org/sonar/server/usergroups/ws/GroupIdOrAnyone.java
server/sonar-server/src/main/java/org/sonar/server/usergroups/ws/GroupWsRef.java
server/sonar-server/src/main/java/org/sonar/server/usergroups/ws/GroupWsSupport.java
server/sonar-server/src/main/java/org/sonar/server/usergroups/ws/SearchAction.java
server/sonar-server/src/main/java/org/sonar/server/usergroups/ws/UpdateAction.java
server/sonar-server/src/test/java/org/sonar/server/authentication/SsoAuthenticatorTest.java
server/sonar-server/src/test/java/org/sonar/server/component/ComponentUpdaterTest.java
server/sonar-server/src/test/java/org/sonar/server/component/ws/SearchProjectsActionTest.java
server/sonar-server/src/test/java/org/sonar/server/computation/queue/ReportSubmitterTest.java
server/sonar-server/src/test/java/org/sonar/server/favorite/FavoriteUpdaterTest.java
server/sonar-server/src/test/java/org/sonar/server/favorite/ws/AddActionTest.java
server/sonar-server/src/test/java/org/sonar/server/favorite/ws/SearchActionTest.java
server/sonar-server/src/test/java/org/sonar/server/organization/OrganizationCreationImplTest.java
server/sonar-server/src/test/java/org/sonar/server/organization/ws/CreateActionTest.java
server/sonar-server/src/test/java/org/sonar/server/permission/PermissionTemplateServiceTest.java
server/sonar-server/src/test/java/org/sonar/server/permission/ws/template/ApplyTemplateActionTest.java
server/sonar-server/src/test/java/org/sonar/server/permission/ws/template/BulkApplyTemplateActionTest.java
server/sonar-server/src/test/java/org/sonar/server/permission/ws/template/RemoveGroupFromTemplateActionTest.java
server/sonar-server/src/test/java/org/sonar/server/permission/ws/template/SearchTemplatesActionTest.java
server/sonar-server/src/test/java/org/sonar/server/permission/ws/template/TemplateGroupsActionTest.java
server/sonar-server/src/test/java/org/sonar/server/project/ws/CreateActionTest.java
server/sonar-server/src/test/java/org/sonar/server/setting/ws/SetActionTest.java
server/sonar-server/src/test/java/org/sonar/server/usergroups/ws/DeleteActionTest.java
server/sonar-server/src/test/java/org/sonar/server/usergroups/ws/GroupWsRefTest.java
sonar-db/src/main/java/org/sonar/db/organization/OrganizationDto.java
sonar-db/src/main/java/org/sonar/db/permission/AuthorizationDao.java
sonar-db/src/main/java/org/sonar/db/permission/AuthorizationMapper.java
sonar-db/src/main/java/org/sonar/db/permission/GroupPermissionDao.java
sonar-db/src/main/java/org/sonar/db/permission/GroupPermissionDto.java
sonar-db/src/main/java/org/sonar/db/permission/GroupPermissionMapper.java
sonar-db/src/main/java/org/sonar/db/permission/UserPermissionDao.java
sonar-db/src/main/java/org/sonar/db/permission/UserPermissionDto.java
sonar-db/src/main/java/org/sonar/db/permission/UserPermissionMapper.java
sonar-db/src/main/java/org/sonar/db/permission/template/PermissionTemplateDao.java
sonar-db/src/main/java/org/sonar/db/permission/template/PermissionTemplateGroupDto.java
sonar-db/src/main/java/org/sonar/db/permission/template/PermissionTemplateMapper.java
sonar-db/src/main/java/org/sonar/db/permission/template/PermissionTemplateUserDto.java
sonar-db/src/main/java/org/sonar/db/property/PropertiesDao.java
sonar-db/src/main/java/org/sonar/db/property/PropertiesMapper.java
sonar-db/src/main/java/org/sonar/db/property/PropertyDto.java
sonar-db/src/main/java/org/sonar/db/property/PropertyTesting.java
sonar-db/src/main/java/org/sonar/db/user/GroupDao.java
sonar-db/src/main/java/org/sonar/db/user/GroupDto.java
sonar-db/src/main/java/org/sonar/db/user/GroupMapper.java
sonar-db/src/main/java/org/sonar/db/user/GroupMembershipDao.java
sonar-db/src/main/java/org/sonar/db/user/GroupMembershipDto.java
sonar-db/src/main/java/org/sonar/db/user/GroupMembershipMapper.java
sonar-db/src/main/java/org/sonar/db/user/RoleDao.java
sonar-db/src/main/java/org/sonar/db/user/RoleMapper.java
sonar-db/src/main/java/org/sonar/db/user/UserDao.java
sonar-db/src/main/java/org/sonar/db/user/UserDto.java
sonar-db/src/main/java/org/sonar/db/user/UserGroupDao.java
sonar-db/src/main/java/org/sonar/db/user/UserGroupDto.java
sonar-db/src/main/java/org/sonar/db/user/UserGroupMapper.java
sonar-db/src/main/java/org/sonar/db/user/UserMapper.java
sonar-db/src/main/java/org/sonar/db/user/UserMembershipDto.java
sonar-db/src/main/java/org/sonar/db/user/UserMembershipQuery.java
sonar-db/src/main/resources/org/sonar/db/permission/AuthorizationMapper.xml
sonar-db/src/main/resources/org/sonar/db/permission/GroupPermissionMapper.xml
sonar-db/src/main/resources/org/sonar/db/permission/UserPermissionMapper.xml
sonar-db/src/main/resources/org/sonar/db/permission/template/PermissionTemplateMapper.xml
sonar-db/src/main/resources/org/sonar/db/property/PropertiesMapper.xml
sonar-db/src/main/resources/org/sonar/db/user/GroupMapper.xml
sonar-db/src/main/resources/org/sonar/db/user/GroupMembershipMapper.xml
sonar-db/src/main/resources/org/sonar/db/user/RoleMapper.xml
sonar-db/src/main/resources/org/sonar/db/user/UserGroupMapper.xml
sonar-db/src/main/resources/org/sonar/db/user/UserMapper.xml
sonar-db/src/test/java/org/sonar/db/favorite/FavoriteDbTester.java
sonar-db/src/test/java/org/sonar/db/notification/NotificationDbTester.java
sonar-db/src/test/java/org/sonar/db/organization/OrganizationDaoTest.java
sonar-db/src/test/java/org/sonar/db/permission/AuthorizationDaoTest.java
sonar-db/src/test/java/org/sonar/db/permission/GroupPermissionDaoTest.java
sonar-db/src/test/java/org/sonar/db/permission/template/GroupWithPermissionTemplateDaoTest.java
sonar-db/src/test/java/org/sonar/db/permission/template/PermissionTemplateDaoTest.java
sonar-db/src/test/java/org/sonar/db/permission/template/PermissionTemplateDbTester.java
sonar-db/src/test/java/org/sonar/db/property/PropertiesDaoTest.java
sonar-db/src/test/java/org/sonar/db/property/PropertiesRow.java
sonar-db/src/test/java/org/sonar/db/property/PropertiesRowAssert.java
sonar-db/src/test/java/org/sonar/db/property/PropertyDtoTest.java
sonar-db/src/test/java/org/sonar/db/user/GroupDaoTest.java
sonar-db/src/test/java/org/sonar/db/user/GroupMembershipDaoTest.java
sonar-db/src/test/java/org/sonar/db/user/GroupTesting.java
sonar-db/src/test/java/org/sonar/db/user/RoleDaoTest.java
sonar-db/src/test/java/org/sonar/db/user/UserDaoTest.java
sonar-db/src/test/java/org/sonar/db/user/UserDbTester.java
sonar-db/src/test/java/org/sonar/db/user/UserGroupDaoTest.java
sonar-db/src/test/java/org/sonar/db/user/UserTesting.java

index e834084c2abf81d14d7add1952ebb3c1136c3e03..3c14db9a7ef466a2ad50e018144d636908761ca5 100644 (file)
@@ -49,10 +49,10 @@ public class PopulateOrganizationUuidOfGroups extends DataChange {
     massUpdate.update("update groups set organization_uuid=?, updated_at=? where id=?");
     massUpdate.rowPluralName("groups");
     massUpdate.execute((row, update) -> {
-      long groupId = row.getLong(1);
+      int groupId = row.getInt(1);
       update.setString(1, organizationUuid);
       update.setDate(2, new Date(system2.now()));
-      update.setLong(3, groupId);
+      update.setInt(3, groupId);
       return true;
     });
   }
index a863f0e1e6f8cfa85f583a3c9641666eb99b0246..74f2208a91da6ddf573519787796824fd8d322bb 100644 (file)
@@ -49,10 +49,10 @@ public class PopulateOrganizationUuidOfPermissionTemplates extends DataChange {
     massUpdate.update("update permission_templates set organization_uuid=?, updated_at=? where id=?");
     massUpdate.rowPluralName("permission_templates");
     massUpdate.execute((row, update) -> {
-      long groupId = row.getLong(1);
+      int groupId = row.getInt(1);
       update.setString(1, organizationUuid);
       update.setDate(2, new Date(system2.now()));
-      update.setLong(3, groupId);
+      update.setInt(3, groupId);
       return true;
     });
   }
index e13fd5f7f3369d267bc4c414aeba3c36b4755037..37b9eb934700ee7342e69a08612dfbe7910c6e4a 100644 (file)
@@ -235,8 +235,9 @@ public class PopulateTableProperties2Test {
           " user_id as \"userId\", resource_id as \"resourceId\", is_empty as \"isEmpty\", text_value as \"textValue\", clob_value as \"clobValue\", created_at as \"createdAt\"" +
           " from properties2" +
           " where prop_key='" + key + "'");
+      Long userId = (Long) row.get("userId");
       return new Property2(
-        (Long) row.get("userId"),
+        userId == null ? null : userId.intValue(),
         (Long) row.get("resourceId"),
         isEmpty(row),
         (String) row.get("textValue"),
@@ -266,7 +267,7 @@ public class PopulateTableProperties2Test {
       return this;
     }
 
-    public Property2Assert hasUserId(long expected) {
+    public Property2Assert hasUserId(int expected) {
       isNotNull();
 
       if (!Objects.equals(actual.getUserId(), expected)) {
@@ -357,14 +358,14 @@ public class PopulateTableProperties2Test {
   }
 
   private static final class Property2 {
-    private final Long userId;
+    private final Integer userId;
     private final Long resourceId;
     private final Boolean empty;
     private final String textValue;
     private final String clobValue;
     private final Long createdAt;
 
-    private Property2(@Nullable Long userId, @Nullable Long resourceId,
+    private Property2(@Nullable Integer userId, @Nullable Long resourceId,
       @Nullable Boolean empty, @Nullable String textValue, @Nullable String clobValue,
       @Nullable Long createdAt) {
       this.userId = userId;
@@ -375,7 +376,7 @@ public class PopulateTableProperties2Test {
       this.createdAt = createdAt;
     }
 
-    public Long getUserId() {
+    public Integer getUserId() {
       return userId;
     }
 
index 6243e4b7c3bad8857da75340e2825c16f98c9217..1e86c29ef4144b39db28b5e8550cfbd9466c4873 100644 (file)
@@ -66,7 +66,7 @@ public class PopulateIsRootColumnOnTableUsersTest {
 
   @Test
   public void execute_sets_active_user_with_admin_role_has_root() throws SQLException {
-    long userId = insertUser("foo", true);
+    int userId = insertUser("foo", true);
     insertRole(userId, ROLE_ADMIN);
 
     underTest.execute();
@@ -76,7 +76,7 @@ public class PopulateIsRootColumnOnTableUsersTest {
 
   @Test
   public void execute_sets_inactive_user_with_admin_role_has_not_root() throws SQLException {
-    long userId = insertUser("bar", false);
+    int userId = insertUser("bar", false);
     insertRole(userId, ROLE_ADMIN);
 
     underTest.execute();
@@ -86,8 +86,8 @@ public class PopulateIsRootColumnOnTableUsersTest {
 
   @Test
   public void execute_sets_active_user_in_group_with_admin_role_has_root() throws SQLException {
-    long userId = insertUser("doo", true);
-    long groupId = insertGroup("admin group");
+    int userId = insertUser("doo", true);
+    int groupId = insertGroup("admin group");
     insertGroupRole(groupId, ROLE_ADMIN);
     addUserToGroup(userId, groupId);
 
@@ -98,8 +98,8 @@ public class PopulateIsRootColumnOnTableUsersTest {
 
   @Test
   public void execute_sets_inactive_user_in_group_with_admin_role_has_not_root() throws SQLException {
-    long userId = insertUser("bar", false);
-    long groupId = insertGroup("admin group");
+    int userId = insertUser("bar", false);
+    int groupId = insertGroup("admin group");
     insertGroupRole(groupId, ROLE_ADMIN);
     addUserToGroup(userId, groupId);
 
@@ -110,10 +110,10 @@ public class PopulateIsRootColumnOnTableUsersTest {
 
   @Test
   public void migration_is_reentrant() throws SQLException {
-    long adminGroupId = insertGroup("admin group");
+    int adminGroupId = insertGroup("admin group");
     insertGroupRole(adminGroupId, ROLE_ADMIN);
-    long groupId = insertGroup("other group");
-    long[] userIds = {
+    int groupId = insertGroup("other group");
+    int[] userIds = {
         insertUser("inactive_direct_admin", false),
         insertUser("active_direct_admin", true),
         insertUser("inactive_group_admin", false),
@@ -158,29 +158,31 @@ public class PopulateIsRootColumnOnTableUsersTest {
     verifyUser("no_perm_user", false);
   }
 
-  private void insertRole(long userId, String role) {
+  private void insertRole(int userId, String role) {
     dbTester.executeInsert("user_roles", "user_id", userId, "role", role);
     dbTester.commit();
   }
 
-  private long insertUser(String login, boolean active) {
+  private int insertUser(String login, boolean active) {
     dbTester.executeInsert(USERS_TABLE, "login", login, "active", active);
     dbTester.commit();
-    return (Long) dbTester.selectFirst("select id as \"id\" from users where login = '" + login + "'").get("id");
+    Long userId = (Long) dbTester.selectFirst("select id as \"id\" from users where login = '" + login + "'").get("id");
+    return userId.intValue();
   }
 
-  private long insertGroup(String groupName) {
+  private int insertGroup(String groupName) {
     dbTester.executeInsert("groups", "name", groupName);
     dbTester.commit();
-    return (Long) dbTester.selectFirst("select id as \"id\" from groups where name = '" + groupName + "'").get("id");
+    Long groupId = (Long) dbTester.selectFirst("select id as \"id\" from groups where name = '" + groupName + "'").get("id");
+    return groupId.intValue();
   }
 
-  private void insertGroupRole(long groupId, String role) {
+  private void insertGroupRole(int groupId, String role) {
     dbTester.executeInsert("group_roles", "group_id", groupId, "role", role);
     dbTester.commit();
   }
 
-  private void addUserToGroup(long userId, long groupId) {
+  private void addUserToGroup(int userId, int groupId) {
     dbTester.executeInsert("groups_users", "user_id", userId, "group_id", groupId);
     dbTester.commit();
   }
index 06a12193f573b99ed2774b0d655463fc8e9d3714..ab7644b0a079e4cdd5573a59003acebafe75044f 100644 (file)
@@ -69,7 +69,7 @@ public class ComponentUpdater {
    * - Add component to favorite if the component has the 'Project Creators' permission
    * - Index component if es indexes
    */
-  public ComponentDto create(DbSession dbSession, NewComponent newComponent, @Nullable Long userId) {
+  public ComponentDto create(DbSession dbSession, NewComponent newComponent, @Nullable Integer userId) {
     checkKeyFormat(newComponent.qualifier(), newComponent.key());
     ComponentDto componentDto = createRootComponent(dbSession, newComponent);
     removeDuplicatedProjects(dbSession, componentDto.getKey());
@@ -119,7 +119,7 @@ public class ComponentUpdater {
     }
   }
 
-  private void handlePermissionTemplate(DbSession dbSession, ComponentDto componentDto, String organizationUuid, @Nullable Long userId) {
+  private void handlePermissionTemplate(DbSession dbSession, ComponentDto componentDto, String organizationUuid, @Nullable Integer userId) {
     permissionTemplateService.applyDefault(dbSession, organizationUuid, componentDto, userId);
     if (componentDto.qualifier().equals(PROJECT)
         && permissionTemplateService.hasDefaultTemplateWithPermissionOnProjectCreator(dbSession, organizationUuid, componentDto)) {
index d60895caf66f98cebf4de0106451c411e172f8ce..6dd19ba92e46e5a012a7f89287a86f994549cf2f 100644 (file)
@@ -48,7 +48,7 @@ public class DefaultRubyComponentService {
 
   // Used in GOV
   /**
-   * @deprecated Use {@link ComponentUpdater#create(DbSession, NewComponent, Long)} instead
+   * @deprecated Use {@link ComponentUpdater#create(DbSession, NewComponent, Integer)} instead
    */
   @Deprecated
   public Long createComponent(String key, String name, String qualifier) {
@@ -62,7 +62,7 @@ public class DefaultRubyComponentService {
       return componentUpdater.create(
         dbSession,
         newComponent,
-        userSession.isLoggedIn() ? userSession.getUserId().longValue() : null).getId();
+        userSession.isLoggedIn() ? userSession.getUserId() : null).getId();
     }
   }
 
index 9f794643c33c4a06bc9f957d27a8e86faa077642..3617da10db1af451067b8f8ba2a16831e7ee24a3 100644 (file)
@@ -109,10 +109,9 @@ public class ReportSubmitter {
   private ComponentDto createProject(DbSession dbSession, String organizationUuid, String projectKey, @Nullable String projectBranch, @Nullable String projectName) {
     userSession.checkOrganizationPermission(organizationUuid, PROVISIONING);
     Integer userId = userSession.getUserId();
-    Long projectCreatorUserId = userId == null ? null : userId.longValue();
 
     boolean wouldCurrentUserHaveScanPermission = permissionTemplateService.wouldUserHavePermissionWithDefaultTemplate(
-      dbSession, organizationUuid, projectCreatorUserId, SCAN_EXECUTION, projectBranch, projectKey, Qualifiers.PROJECT);
+      dbSession, organizationUuid, userId, SCAN_EXECUTION, projectBranch, projectKey, Qualifiers.PROJECT);
     if (!wouldCurrentUserHaveScanPermission) {
       throw insufficientPrivilegesException();
     }
@@ -124,7 +123,7 @@ public class ReportSubmitter {
       .setBranch(projectBranch)
       .setQualifier(Qualifiers.PROJECT)
       .build();
-    return componentUpdater.create(dbSession, newProject, projectCreatorUserId);
+    return componentUpdater.create(dbSession, newProject, userId);
   }
 
   private CeTask submitReport(DbSession dbSession, InputStream reportInput, ComponentDto project) {
index e7708ff3cd1e325e94a3f034479952f5bcdee84d..a4a0dddd8569bf32d9d6f7ba983338ec4737e08e 100644 (file)
@@ -42,14 +42,14 @@ public class FavoriteUpdater {
   /**
    * Set favorite to the logged in user. If no user, no action is done
    */
-  public void add(DbSession dbSession, ComponentDto componentDto, @Nullable Long userId) {
+  public void add(DbSession dbSession, ComponentDto componentDto, @Nullable Integer userId) {
     if (userId == null) {
       return;
     }
 
     List<PropertyDto> existingFavoriteOnComponent = dbClient.propertiesDao().selectByQuery(PropertyQuery.builder()
       .setKey(PROP_FAVORITE_KEY)
-      .setUserId(userId.intValue())
+      .setUserId(userId)
       .setComponentId(componentDto.getId())
       .build(), dbSession);
     checkRequest(existingFavoriteOnComponent.isEmpty(), "Component '%s' is already a favorite", componentDto.getKey());
@@ -63,7 +63,7 @@ public class FavoriteUpdater {
    * Remove a favorite to the user.
    * @throws BadRequestException if the component is not a favorite
    */
-  public void remove(DbSession dbSession, ComponentDto component, @Nullable Long userId) {
+  public void remove(DbSession dbSession, ComponentDto component, @Nullable Integer userId) {
     if (userId == null) {
       return;
     }
index 5c89b44dbaf96fa9c1dc63f2c8b894bd7482f938..8625996ef32ef3ba90968e171eeae34f869fb449 100644 (file)
@@ -75,7 +75,7 @@ public class AddAction implements FavoritesWsAction {
         userSession
           .checkLoggedIn()
           .checkComponentPermission(UserRole.USER, componentDto);
-        favoriteUpdater.add(dbSession, componentDto, userSession.isLoggedIn() ? userSession.getUserId().longValue() : null);
+        favoriteUpdater.add(dbSession, componentDto, userSession.isLoggedIn() ? userSession.getUserId() : null);
         dbSession.commit();
       }
     };
index 38a0865d4c31765474a4ca7154b0afc866ddfe3d..a749e33d64fb26c66d4370468b384854e71f64d9 100644 (file)
@@ -73,7 +73,7 @@ public class RemoveAction implements FavoritesWsAction {
         ComponentDto component = componentFinder.getByKey(dbSession, request.mandatoryParam(PARAM_COMPONENT));
         userSession
           .checkLoggedIn();
-        favoriteUpdater.remove(dbSession, component, userSession.isLoggedIn() ? userSession.getUserId().longValue() : null);
+        favoriteUpdater.remove(dbSession, component, userSession.isLoggedIn() ? userSession.getUserId() : null);
         dbSession.commit();
       }
     };
index 4e5bf2f8e1ffd930bd2dbb222adc42cfe06e616a..377c54a37e74afce3f63403d602a9394fcc0b2c5 100644 (file)
@@ -70,7 +70,7 @@ public class NotificationUpdater {
 
     dbClient.propertiesDao().saveProperty(dbSession, new PropertyDto()
       .setKey(key)
-      .setUserId(Long.valueOf(userSession.getUserId()))
+      .setUserId(userSession.getUserId())
       .setValue(PROP_NOTIFICATION_VALUE)
       .setResourceId(projectId));
   }
@@ -100,7 +100,7 @@ public class NotificationUpdater {
 
     dbClient.propertiesDao().delete(dbSession, new PropertyDto()
       .setKey(key)
-      .setUserId(Long.valueOf(userSession.getUserId()))
+      .setUserId(userSession.getUserId())
       .setValue(PROP_NOTIFICATION_VALUE)
       .setResourceId(projectId));
   }
index 518fc0d31342c574385ea355570158be15befb82..4f542a461e3ef51cdaeaf55bc35b850b07ce5bb9 100644 (file)
@@ -62,7 +62,7 @@ public interface OrganizationCreation {
    * @throws KeyConflictException if an organization with the specified key already exists
    * @throws IllegalArgumentException if any field of {@code newOrganization} is invalid according to {@link OrganizationValidation}
    */
-  OrganizationDto create(DbSession dbSession, long createUserId, NewOrganization newOrganization) throws KeyConflictException;
+  OrganizationDto create(DbSession dbSession, int createUserId, NewOrganization newOrganization) throws KeyConflictException;
 
   /**
    * Create a new guarded organization which details are based on the login of the specified User.
index c5333acf0d0582fabe4b593b4f8e379b0c2ccf4f..e342fa7ea6591b4a601c9c733bbde0109f64cadd 100644 (file)
@@ -62,7 +62,7 @@ public class OrganizationCreationImpl implements OrganizationCreation {
   }
 
   @Override
-  public OrganizationDto create(DbSession dbSession, long creatorUserId, NewOrganization newOrganization) throws KeyConflictException {
+  public OrganizationDto create(DbSession dbSession, int creatorUserId, NewOrganization newOrganization) throws KeyConflictException {
     validate(newOrganization);
     String key = newOrganization.getKey();
     if (organizationKeyIsUsed(dbSession, key)) {
@@ -201,7 +201,7 @@ public class OrganizationCreationImpl implements OrganizationCreation {
         .setRole(permission));
   }
 
-  private void addCurrentUserToGroup(DbSession dbSession, GroupDto group, long createUserId) {
+  private void addCurrentUserToGroup(DbSession dbSession, GroupDto group, int createUserId) {
     dbClient.userGroupDao().insert(
       dbSession,
       new UserGroupDto().setGroupId(group.getId()).setUserId(createUserId));
index ae7e2440dff7ae2c0d819167815131e17c312c60..58fe96f8865cdf1953d6e6f6fe0890fb9afed4eb 100644 (file)
@@ -103,7 +103,7 @@ public class CreateAction implements OrganizationsAction {
       organizationFlags.checkEnabled(dbSession);
       OrganizationDto organization = organizationCreation.create(
         dbSession,
-        userSession.getUserId().longValue(),
+        userSession.getUserId(),
         newOrganizationBuilder()
           .setName(name)
           .setKey(key)
index 19cefb2c7e0a15b39f3563e49b2136b3a2b92d0c..a8c51c35f531af68e99fa68a78e537aa1491b0e1 100644 (file)
@@ -70,7 +70,7 @@ public class PermissionTemplateService {
   }
   
   public boolean wouldUserHavePermissionWithDefaultTemplate(DbSession dbSession,
-    String organizationUuid, @Nullable Long userId, String globalPermission, @Nullable String branch, String projectKey,
+    String organizationUuid, @Nullable Integer userId, String globalPermission, @Nullable String branch, String projectKey,
     String qualifier) {
     if (userSession.hasOrganizationPermission(organizationUuid, globalPermission)) {
       return true;
@@ -109,7 +109,7 @@ public class PermissionTemplateService {
    * can be provisioned (so has no permissions yet).
    * @param projectCreatorUserId id of the user who creates the project, only if project is provisioned. He will
    */
-  public void applyDefault(DbSession dbSession, String organizationUuid, ComponentDto component, @Nullable Long projectCreatorUserId) {
+  public void applyDefault(DbSession dbSession, String organizationUuid, ComponentDto component, @Nullable Integer projectCreatorUserId) {
     PermissionTemplateDto template = findTemplate(dbSession, organizationUuid, component);
     checkArgument(template != null, "Cannot retrieve default permission template");
     copyPermissions(dbSession, template, component, projectCreatorUserId);
@@ -131,7 +131,7 @@ public class PermissionTemplateService {
     permissionIndexer.indexProjectsByUuids(dbSession, projectOrViewUuids);
   }
 
-  private void copyPermissions(DbSession dbSession, PermissionTemplateDto template, ComponentDto project, @Nullable Long projectCreatorUserId) {
+  private void copyPermissions(DbSession dbSession, PermissionTemplateDto template, ComponentDto project, @Nullable Integer projectCreatorUserId) {
     dbClient.resourceDao().updateAuthorizationDate(project.getId(), dbSession);
     dbClient.groupPermissionDao().deleteByRootComponentId(dbSession, project.getId());
     dbClient.userPermissionDao().deleteProjectPermissions(dbSession, project.getId());
index fab7ee941bc87044754d2138ce3d8e0152a14ffe..ee7d3085fb2c87c4275d59079c0b88b09d76ddeb 100644 (file)
@@ -32,15 +32,15 @@ import static java.util.Objects.requireNonNull;
 @Immutable
 public class UserId {
 
-  private final long id;
+  private final int id;
   private final String login;
 
-  public UserId(long userId, String login) {
+  public UserId(int userId, String login) {
     this.id = userId;
     this.login = requireNonNull(login);
   }
 
-  public long getId() {
+  public int getId() {
     return id;
   }
 
index 45898f37d6cd178cc06a9cb43f722367b60bfe3c..a98674b4fba74d0d957e8d4471344d7f062e7171 100644 (file)
@@ -44,8 +44,8 @@ public class PermissionIndexerDao {
     private final String projectUuid;
     private final long updatedAt;
     private final String qualifier;
-    private final List<Long> userIds = new ArrayList<>();
-    private final List<Long> groupIds = new ArrayList<>();
+    private final List<Integer> userIds = new ArrayList<>();
+    private final List<Integer> groupIds = new ArrayList<>();
     private boolean allowAnyone = false;
 
     public Dto(String projectUuid, long updatedAt, String qualifier) {
@@ -66,21 +66,21 @@ public class PermissionIndexerDao {
       return qualifier;
     }
 
-    public List<Long> getUserIds() {
+    public List<Integer> getUserIds() {
       return userIds;
     }
 
-    public Dto addUserId(long l) {
+    public Dto addUserId(int l) {
       userIds.add(l);
       return this;
     }
 
-    public Dto addGroupId(long id) {
+    public Dto addGroupId(int id) {
       groupIds.add(id);
       return this;
     }
 
-    public List<Long> getGroupIds() {
+    public List<Integer> getGroupIds() {
       return groupIds;
     }
 
@@ -222,10 +222,10 @@ public class PermissionIndexerDao {
     }
     switch (rowKind) {
       case USER:
-        dto.addUserId(rs.getLong(3));
+        dto.addUserId(rs.getInt(3));
         break;
       case GROUP:
-        dto.addGroupId(rs.getLong(4));
+        dto.addGroupId(rs.getInt(4));
         break;
       case ANYONE:
         dto.allowAnyone();
index aa6f72a2ced746ae40208a50a6f1deb45df37b9c..77f576ce6d0303911a1500c083ed70bba3b5df39 100644 (file)
@@ -126,14 +126,14 @@ public class GroupsAction implements PermissionsWsAction {
   }
 
   private static WsGroupsResponse buildResponse(List<GroupDto> groups, List<GroupPermissionDto> groupPermissions, Paging paging) {
-    Multimap<Long, String> permissionsByGroupId = TreeMultimap.create();
+    Multimap<Integer, String> permissionsByGroupId = TreeMultimap.create();
     groupPermissions.forEach(groupPermission -> permissionsByGroupId.put(groupPermission.getGroupId(), groupPermission.getRole()));
     WsGroupsResponse.Builder response = WsGroupsResponse.newBuilder();
 
     groups.forEach(group -> {
       Group.Builder wsGroup = response.addGroupsBuilder()
         .setName(group.getName());
-      if (group.getId() != 0L) {
+      if (group.getId() != 0) {
         wsGroup.setId(String.valueOf(group.getId()));
       }
       setNullable(group.getDescription(), wsGroup::setDescription);
@@ -152,7 +152,7 @@ public class GroupsAction implements PermissionsWsAction {
     List<String> orderedNames = dbClient.groupPermissionDao().selectGroupNamesByQuery(dbSession, org.getUuid(), dbQuery);
     List<GroupDto> groups = dbClient.groupDao().selectByNames(dbSession, org.getUuid(), orderedNames);
     if (orderedNames.contains(DefaultGroups.ANYONE)) {
-      groups.add(0, new GroupDto().setId(0L).setName(DefaultGroups.ANYONE).setOrganizationUuid(org.getUuid()));
+      groups.add(0, new GroupDto().setId(0).setName(DefaultGroups.ANYONE).setOrganizationUuid(org.getUuid()));
     }
     return Ordering.explicit(orderedNames).onResultOf(GroupDto::getName).immutableSortedCopy(groups);
   }
@@ -161,7 +161,7 @@ public class GroupsAction implements PermissionsWsAction {
     if (groups.isEmpty()) {
       return emptyList();
     }
-    List<Long> ids = groups.stream().map(GroupDto::getId).collect(Collectors.toList(groups.size()));
+    List<Integer> ids = groups.stream().map(GroupDto::getId).collect(Collectors.toList(groups.size()));
     return dbClient.groupPermissionDao().selectByGroupIds(dbSession, org.getUuid(), ids, project.isPresent() ? project.get().getId() : null);
   }
 }
index b2afcfb4794a5d9332420d6b1b78d0962e13c01c..f5f16d1d08b9c6f1292948c1fc980b971ebc4d71 100644 (file)
@@ -81,7 +81,7 @@ public class PermissionWsSupport {
   }
 
   public GroupIdOrAnyone findGroup(DbSession dbSession, Request request) {
-    Long groupId = request.paramAsLong(PARAM_GROUP_ID);
+    Integer groupId = request.paramAsInt(PARAM_GROUP_ID);
     String orgKey = request.param(PARAM_ORGANIZATION);
     String groupName = request.param(PARAM_GROUP_NAME);
     GroupWsRef groupRef = GroupWsRef.create(groupId, orgKey, groupName);
index 62aa24d3b7ab64558b0bb3f342c74f8ec7bbbb77..57f136db6fa36c5727e535b8ed5a567db9b04d98 100644 (file)
@@ -139,7 +139,7 @@ public class UsersAction implements PermissionsWsAction {
   }
 
   private static UsersWsResponse buildResponse(List<UserDto> users, List<UserPermissionDto> userPermissions, Paging paging) {
-    Multimap<Long, String> permissionsByUserId = TreeMultimap.create();
+    Multimap<Integer, String> permissionsByUserId = TreeMultimap.create();
     userPermissions.forEach(userPermission -> permissionsByUserId.put(userPermission.getUserId(), userPermission.getPermission()));
 
     UsersWsResponse.Builder response = UsersWsResponse.newBuilder();
@@ -161,7 +161,7 @@ public class UsersAction implements PermissionsWsAction {
   }
 
   private List<UserDto> findUsers(DbSession dbSession, OrganizationDto org, PermissionQuery query) {
-    List<Long> orderedIds = dbClient.userPermissionDao().selectUserIds(dbSession, org.getUuid(), query);
+    List<Integer> orderedIds = dbClient.userPermissionDao().selectUserIds(dbSession, org.getUuid(), query);
     return Ordering.explicit(orderedIds).onResultOf(UserDto::getId).immutableSortedCopy(dbClient.userDao().selectByIds(dbSession, orderedIds));
   }
 
index 99bd59fba19607f618c622a81105ec26291b0bec..ca6c180a9f5fc30656e46478c16165fef782da2b 100644 (file)
@@ -80,14 +80,14 @@ public class TemplateGroupsAction implements PermissionsWsAction {
   }
 
   private static WsPermissions.WsGroupsResponse buildResponse(List<GroupDto> groups, List<PermissionTemplateGroupDto> groupPermissions, Paging paging) {
-    Multimap<Long, String> permissionsByGroupId = TreeMultimap.create();
+    Multimap<Integer, String> permissionsByGroupId = TreeMultimap.create();
     groupPermissions.forEach(groupPermission -> permissionsByGroupId.put(groupPermission.getGroupId(), groupPermission.getPermission()));
     WsPermissions.WsGroupsResponse.Builder response = WsPermissions.WsGroupsResponse.newBuilder();
 
     groups.forEach(group -> {
       WsPermissions.Group.Builder wsGroup = response.addGroupsBuilder()
         .setName(group.getName());
-      if (group.getId() != 0L) {
+      if (group.getId() != 0) {
         wsGroup.setId(String.valueOf(group.getId()));
       }
       setNullable(group.getDescription(), wsGroup::setDescription);
@@ -143,7 +143,7 @@ public class TemplateGroupsAction implements PermissionsWsAction {
     List<String> orderedNames = dbClient.permissionTemplateDao().selectGroupNamesByQueryAndTemplate(dbSession, dbQuery, template.getOrganizationUuid(), template.getId());
     List<GroupDto> groups = dbClient.groupDao().selectByNames(dbSession, template.getOrganizationUuid(), orderedNames);
     if (orderedNames.contains(DefaultGroups.ANYONE)) {
-      groups.add(0, new GroupDto().setId(0L).setName(DefaultGroups.ANYONE));
+      groups.add(0, new GroupDto().setId(0).setName(DefaultGroups.ANYONE));
     }
     return Ordering.explicit(orderedNames).onResultOf(GroupDto::getName).immutableSortedCopy(groups);
   }
index 1ef850ba5411c9b20956589aa70def05aea50da2..20afc876451ac3f11b7028d515d2da5d2edb3af9 100644 (file)
@@ -83,7 +83,7 @@ public class TemplateUsersAction implements PermissionsWsAction {
   }
 
   private static WsPermissions.UsersWsResponse buildResponse(List<UserDto> users, List<PermissionTemplateUserDto> permissionTemplateUsers, Paging paging) {
-    Multimap<Long, String> permissionsByUserId = TreeMultimap.create();
+    Multimap<Integer, String> permissionsByUserId = TreeMultimap.create();
     permissionTemplateUsers.forEach(userPermission -> permissionsByUserId.put(userPermission.getUserId(), userPermission.getPermission()));
 
     UsersWsResponse.Builder responseBuilder = UsersWsResponse.newBuilder();
index 07fd764887aaa896531015f2c372bd339aa2cd70..f89f27aa899df323eebe18b018f026f188dc849d 100644 (file)
@@ -112,7 +112,7 @@ public class CreateAction implements ProjectsWsAction {
         .setBranch(request.getBranch())
         .setQualifier(PROJECT)
         .build(),
-        userSession.isLoggedIn() ? userSession.getUserId().longValue() : null);
+        userSession.isLoggedIn() ? userSession.getUserId() : null);
       return toCreateResponse(componentDto);
     }
   }
index f360edeaca6c5475ffd851a9f9f5efeafe0d69b9..be0e6630dda8d1df983306f617f4ea296b265af9 100644 (file)
@@ -76,7 +76,7 @@ public class SearchMyProjectsDataLoader {
 
   @VisibleForTesting
   ProjectsResult searchProjects(DbSession dbSession, SearchMyProjectsRequest request) {
-    long userId = requireNonNull(userSession.getUserId(), "Current user must be authenticated");
+    int userId = requireNonNull(userSession.getUserId(), "Current user must be authenticated");
 
     List<Long> componentIds = dbClient.roleDao().selectComponentIdsByPermissionAndUserId(dbSession, UserRole.ADMIN, userId);
     ComponentQuery dbQuery = ComponentQuery.builder()
index 714b15b30d6c82a055689e2bfae99c43222b4cea..5421c6e92999fa27a379e68ba1b22da5fa7e8288 100644 (file)
@@ -34,15 +34,15 @@ import static java.util.Objects.requireNonNull;
 @Immutable
 public class GroupId {
 
-  private final long id;
+  private final int id;
   private final String organizationUuid;
 
-  public GroupId(String organizationUuid, long id) {
+  public GroupId(String organizationUuid, int id) {
     this.id = id;
     this.organizationUuid = requireNonNull(organizationUuid);
   }
 
-  public long getId() {
+  public int getId() {
     return id;
   }
 
index 0d2094e582bbb78c6bfeb0e7d9dfc6a589efe81d..cf3a6e4ed801dae8603fb9b0d3ac81e919f9f1cd 100644 (file)
@@ -37,10 +37,10 @@ import static java.util.Objects.requireNonNull;
 @Immutable
 public class GroupIdOrAnyone {
 
-  private final Long id;
+  private final Integer id;
   private final String organizationUuid;
 
-  public GroupIdOrAnyone(String organizationUuid, @Nullable Long id) {
+  public GroupIdOrAnyone(String organizationUuid, @Nullable Integer id) {
     this.id = id;
     this.organizationUuid = requireNonNull(organizationUuid);
   }
@@ -55,7 +55,7 @@ public class GroupIdOrAnyone {
   }
 
   @CheckForNull
-  public Long getId() {
+  public Integer getId() {
     return id;
   }
 
index b880ff20505e4b270d68fd8b74a4a4eabe6e4798..a3d4487ee2dd2859bb8e5d27be47e1be3e775b4e 100644 (file)
@@ -44,11 +44,11 @@ public class GroupWsRef {
 
   private static final int NULL_ID = -1;
 
-  private final long id;
+  private final int id;
   private final String organizationKey;
   private final String name;
 
-  private GroupWsRef(long id, @Nullable String organizationKey, @Nullable String name) {
+  private GroupWsRef(int id, @Nullable String organizationKey, @Nullable String name) {
     this.id = id;
     this.organizationKey = organizationKey;
     this.name = name;
@@ -67,7 +67,7 @@ public class GroupWsRef {
    * @return the group id
    * @throws IllegalStateException if {@link #getId()} is {@code false}
    */
-  public long getId() {
+  public int getId() {
     checkState(hasId(), "Id is not present. Please see hasId().");
     return id;
   }
@@ -95,7 +95,7 @@ public class GroupWsRef {
    * Creates a reference to a group by its id. Virtual groups "Anyone" can't be returned
    * as they can't be referenced by an id.
    */
-  static GroupWsRef fromId(long id) {
+  static GroupWsRef fromId(int id) {
     checkArgument(id > -1, "Group id must be positive: %s", id);
     return new GroupWsRef(id, null, null);
   }
@@ -111,7 +111,7 @@ public class GroupWsRef {
     return new GroupWsRef(NULL_ID, organizationKey, requireNonNull(name));
   }
 
-  public static GroupWsRef create(@Nullable Long id, @Nullable String organizationKey, @Nullable String name) {
+  public static GroupWsRef create(@Nullable Integer id, @Nullable String organizationKey, @Nullable String name) {
     if (id != null) {
       checkRequest(organizationKey == null && name == null, "Either group id or couple organization/group name must be set");
       return fromId(id);
@@ -133,19 +133,19 @@ public class GroupWsRef {
     if (o == null || getClass() != o.getClass()) {
       return false;
     }
-    GroupWsRef groupRef = (GroupWsRef) o;
-    if (id != groupRef.id) {
+    GroupWsRef that = (GroupWsRef) o;
+    if (id != that.id) {
       return false;
     }
-    if (organizationKey != null ? !organizationKey.equals(groupRef.organizationKey) : (groupRef.organizationKey != null)) {
+    if (organizationKey != null ? !organizationKey.equals(that.organizationKey) : (that.organizationKey != null)) {
       return false;
     }
-    return name != null ? name.equals(groupRef.name) : (groupRef.name == null);
+    return name != null ? name.equals(that.name) : (that.name == null);
   }
 
   @Override
   public int hashCode() {
-    int result = (int) (id ^ (id >>> 32));
+    int result = id;
     result = 31 * result + (organizationKey != null ? organizationKey.hashCode() : 0);
     result = 31 * result + (name != null ? name.hashCode() : 0);
     return result;
index 5bebf0cfc74d8fcc9708e404a6b41307157aafaf..d44203d0cbb3ee7eb49482aba44e009b4ad628d0 100644 (file)
@@ -72,7 +72,7 @@ public class GroupWsSupport {
    * or if the virtual group "Anyone" is requested.
    */
   public GroupId findGroup(DbSession dbSession, Request request) {
-    Long id = request.paramAsLong(PARAM_GROUP_ID);
+    Integer id = request.paramAsInt(PARAM_GROUP_ID);
     String organizationKey = request.param(PARAM_ORGANIZATION_KEY);
     String name = request.param(PARAM_GROUP_NAME);
     return findGroup(dbSession, GroupWsRef.create(id, organizationKey, name));
index 53a6f7043873a56fffa3d41ae3bea8861b64c49f..061951dff3c96450baabdc67915ffe1be4f0fdf6 100644 (file)
@@ -96,7 +96,7 @@ public class SearchAction implements UserGroupsWsAction {
 
       int limit = dbClient.groupDao().countByQuery(dbSession, organization.getUuid(), query);
       List<GroupDto> groups = dbClient.groupDao().selectByQuery(dbSession, organization.getUuid(), query, options.getOffset(), pageSize);
-      List<Long> groupIds = groups.stream().map(GroupDto::getId).collect(Collectors.toList(groups.size()));
+      List<Integer> groupIds = groups.stream().map(GroupDto::getId).collect(Collectors.toList(groups.size()));
       Map<String, Integer> userCountByGroup = dbClient.groupMembershipDao().countUsersByGroups(dbSession, groupIds);
 
       JsonWriter json = response.newJsonWriter().beginObject();
index fce36e871f56cbed2013e6d8886616e297722fc6..4b0ba22e96c6d69f4dda2f21790011de1408c71e 100644 (file)
@@ -95,7 +95,7 @@ public class UpdateAction implements UserGroupsWsAction {
   @Override
   public void handle(Request request, Response response) throws Exception {
     try (DbSession dbSession = dbClient.openSession(false)) {
-      long groupId = request.mandatoryParamAsLong(PARAM_GROUP_ID);
+      int groupId = request.mandatoryParamAsInt(PARAM_GROUP_ID);
       GroupDto group = dbClient.groupDao().selectById(dbSession, groupId);
       checkFound(group, "Could not find a user group with id '%s'.", groupId);
       Optional<OrganizationDto> org = dbClient.organizationDao().selectByUuid(dbSession, group.getOrganizationUuid());
index d1a7cc0f962629d3b1788168121d976c39c778fe..1aa98293e7a0fabb8d7ffb71cd60f06039837274 100644 (file)
@@ -424,7 +424,7 @@ public class SsoAuthenticatorTest {
     if (expectedGroups.length == 0) {
       assertThat(db.users().selectGroupIdsOfUser(userDto)).isEmpty();
     } else {
-      assertThat(db.users().selectGroupIdsOfUser(userDto)).containsOnly(stream(expectedGroups).map(GroupDto::getId).collect(Collectors.toList()).toArray(new Long[] {}));
+      assertThat(db.users().selectGroupIdsOfUser(userDto)).containsOnly(stream(expectedGroups).map(GroupDto::getId).collect(Collectors.toList()).toArray(new Integer[] {}));
     }
   }
 
index 8ce129bee79ff2e5cda6f5b8a08064e0fb8262b5..dcb18400303bfb8fee78de64432382cac6c4ba89 100644 (file)
@@ -107,7 +107,7 @@ public class ComponentUpdaterTest {
 
   @Test
   public void should_apply_default_permission_template() throws Exception {
-    long userId = 42;
+    int userId = 42;
     NewComponent project = NewComponent.newComponentBuilder()
         .setKey(DEFAULT_PROJECT_KEY)
         .setName(DEFAULT_PROJECT_NAME)
index 8d0d0c852cd218dcc4cdbbac9d09d5edb33b1e10..033306fc89c1c0b233d67ea0f7d98bf8b8e683c8 100644 (file)
@@ -440,6 +440,6 @@ public class SearchProjectsActionTest {
   }
 
   private void addFavourite(ComponentDto project) {
-    dbClient.propertiesDao().saveProperty(dbSession, new PropertyDto().setKey("favourite").setResourceId(project.getId()).setUserId(Long.valueOf(userSession.getUserId())));
+    dbClient.propertiesDao().saveProperty(dbSession, new PropertyDto().setKey("favourite").setResourceId(project.getId()).setUserId(userSession.getUserId()));
   }
 }
index ce79cd446d2e5fab510e67ecc26cb8ebb4f769d9..bc781583e292ed2442630a2c95dff590abacf07d 100644 (file)
@@ -47,7 +47,7 @@ import org.sonar.server.tester.UserSessionRule;
 
 import static org.assertj.core.api.Assertions.assertThat;
 import static org.mockito.Matchers.any;
-import static org.mockito.Matchers.anyLong;
+import static org.mockito.Matchers.anyInt;
 import static org.mockito.Matchers.anyString;
 import static org.mockito.Matchers.argThat;
 import static org.mockito.Matchers.eq;
@@ -142,7 +142,7 @@ public class ReportSubmitterTest {
     mockSuccessfulPrepareSubmitCall();
     ComponentDto createdProject = newProjectDto(organization, PROJECT_UUID).setKey(PROJECT_KEY);
     when(componentUpdater.create(any(DbSession.class), any(NewComponent.class), eq(null))).thenReturn(createdProject);
-    when(permissionTemplateService.wouldUserHavePermissionWithDefaultTemplate(any(DbSession.class), eq(organization.getUuid()), anyLong(), eq(SCAN_EXECUTION), anyString(),
+    when(permissionTemplateService.wouldUserHavePermissionWithDefaultTemplate(any(DbSession.class), eq(organization.getUuid()), anyInt(), eq(SCAN_EXECUTION), anyString(),
       eq(PROJECT_KEY), eq(Qualifiers.PROJECT)))
         .thenReturn(true);
     when(permissionTemplateService.hasDefaultTemplateWithPermissionOnProjectCreator(any(DbSession.class), eq(organization.getUuid()), any(ComponentDto.class))).thenReturn(true);
@@ -174,7 +174,7 @@ public class ReportSubmitterTest {
     mockSuccessfulPrepareSubmitCall();
     ComponentDto createdProject = newProjectDto(db.getDefaultOrganization(), PROJECT_UUID).setKey(PROJECT_KEY);
     when(componentUpdater.create(any(DbSession.class), any(NewComponent.class), eq(null))).thenReturn(createdProject);
-    when(permissionTemplateService.wouldUserHavePermissionWithDefaultTemplate(any(DbSession.class), eq(defaultOrganizationUuid), anyLong(), eq(SCAN_EXECUTION), anyString(),
+    when(permissionTemplateService.wouldUserHavePermissionWithDefaultTemplate(any(DbSession.class), eq(defaultOrganizationUuid), anyInt(), eq(SCAN_EXECUTION), anyString(),
       eq(PROJECT_KEY), eq(Qualifiers.PROJECT)))
         .thenReturn(true);
     when(permissionTemplateService.hasDefaultTemplateWithPermissionOnProjectCreator(any(DbSession.class), eq(defaultOrganizationUuid), any(ComponentDto.class))).thenReturn(false);
@@ -193,7 +193,7 @@ public class ReportSubmitterTest {
     mockSuccessfulPrepareSubmitCall();
     ComponentDto project = newProjectDto(db.getDefaultOrganization(), PROJECT_UUID).setKey(PROJECT_KEY);
     when(componentUpdater.create(any(DbSession.class), any(NewComponent.class), eq(null))).thenReturn(project);
-    when(permissionTemplateService.wouldUserHavePermissionWithDefaultTemplate(any(DbSession.class), eq(defaultOrganizationUuid), anyLong(), eq(SCAN_EXECUTION), anyString(),
+    when(permissionTemplateService.wouldUserHavePermissionWithDefaultTemplate(any(DbSession.class), eq(defaultOrganizationUuid), anyInt(), eq(SCAN_EXECUTION), anyString(),
       eq(PROJECT_KEY), eq(Qualifiers.PROJECT)))
         .thenReturn(true);
 
index 634b1a10d3ba7d972ced75b2ae84ebeebb85fc07..604149dad97b136389f64315c382a0802e1b174f 100644 (file)
@@ -40,7 +40,7 @@ public class FavoriteUpdaterTest {
   private static final ComponentDto COMPONENT = newProjectDto(OrganizationTesting.newOrganizationDto())
     .setId(COMPONENT_ID)
     .setKey(COMPONENT_KEY);
-  private static final long USER_ID = 42L;
+  private static final int USER_ID = 42;
 
   @Rule
   public ExpectedException expectedException = ExpectedException.none();
index ad7aa92a6b3906bb1a942c1be5212c64f238fd82..4ce86209eef31ba5a08640b933cee0df9209ff87 100644 (file)
@@ -81,7 +81,7 @@ public class AddActionTest {
     PropertyDto favorite = favorites.get(0);
     assertThat(favorite)
       .extracting(PropertyDto::getResourceId, PropertyDto::getUserId, PropertyDto::getKey)
-      .containsOnly(project.getId(), (long) USER_ID, "favourite");
+      .containsOnly(project.getId(), USER_ID, "favourite");
   }
 
   @Test
@@ -100,7 +100,7 @@ public class AddActionTest {
     PropertyDto favorite = favorites.get(0);
     assertThat(favorite)
       .extracting(PropertyDto::getResourceId, PropertyDto::getUserId, PropertyDto::getKey)
-      .containsOnly(file.getId(), (long) USER_ID, "favourite");
+      .containsOnly(file.getId(), USER_ID, "favourite");
   }
 
   @Test
index f74f85be8fb454bc27725338c6abc6b38e03f41e..8d33d924d5a6ea199bfd5beb040d4ecb4b00a996 100644 (file)
@@ -134,8 +134,8 @@ public class SearchActionTest {
     addComponent(newProjectDto(organizationDto).setKey("K1"));
     ComponentDto otherUserFavorite = newProjectDto(organizationDto).setKey("K42");
     db.components().insertComponent(otherUserFavorite);
-    db.favorites().add(otherUserFavorite, 42L);
-    dbClient.userPermissionDao().insert(dbSession, new UserPermissionDto(organizationDto.getUuid(), UserRole.USER, 42L, otherUserFavorite.getId()));
+    db.favorites().add(otherUserFavorite, 42);
+    dbClient.userPermissionDao().insert(dbSession, new UserPermissionDto(organizationDto.getUuid(), UserRole.USER, 42, otherUserFavorite.getId()));
     db.commit();
 
     SearchResponse result = call();
index 4ebeec9bb31c098ae3304579b0cf69daa9fa4485..3ca8041583214df5e9bfde444e071748034beb3d 100644 (file)
@@ -50,7 +50,7 @@ import static org.mockito.Mockito.when;
 import static org.sonar.server.organization.OrganizationCreation.NewOrganization.newOrganizationBuilder;
 
 public class OrganizationCreationImplTest {
-  private static final long SOME_USER_ID = 1L;
+  private static final int SOME_USER_ID = 1;
   private static final String SOME_UUID = "org-uuid";
   private static final long SOME_DATE = 12893434L;
   private static final String A_LOGIN = "a-login";
@@ -316,7 +316,7 @@ public class OrganizationCreationImplTest {
       .extracting(PermissionTemplateGroupDto::getGroupId, PermissionTemplateGroupDto::getPermission)
       .containsOnly(
         tuple(ownersGroup.getId(), UserRole.ADMIN), tuple(ownersGroup.getId(), UserRole.ISSUE_ADMIN),
-        tuple(0L, UserRole.USER), tuple(0L, UserRole.CODEVIEWER));
+        tuple(0, UserRole.USER), tuple(0, UserRole.CODEVIEWER));
   }
 
   @Test
index 96f8cb318bdaca1630cd20809a1148cbc4d78006..50ba6976f1942b219b639b0620ba98c738c2be51 100644 (file)
@@ -32,7 +32,6 @@ import org.sonar.api.config.MapSettings;
 import org.sonar.api.config.Settings;
 import org.sonar.api.server.ws.WebService;
 import org.sonar.api.utils.System2;
-import org.sonar.api.utils.internal.AlwaysIncreasingSystem2;
 import org.sonar.api.web.UserRole;
 import org.sonar.core.permission.GlobalPermissions;
 import org.sonar.core.util.UuidFactory;
@@ -488,7 +487,7 @@ public class CreateActionTest {
       .extracting(PermissionTemplateGroupDto::getGroupId, PermissionTemplateGroupDto::getPermission)
       .containsOnly(
         tuple(ownersGroup.getId(), UserRole.ADMIN), tuple(ownersGroup.getId(), UserRole.ISSUE_ADMIN),
-        tuple(0L, UserRole.USER), tuple(0L, UserRole.CODEVIEWER));
+        tuple(0, UserRole.USER), tuple(0, UserRole.CODEVIEWER));
   }
 
   @Test
index 899bfa7ac6ebbc87eed94cae040526cc37dd2724..8878364935d418b6fccf42db954013aae6f91718 100644 (file)
@@ -149,7 +149,7 @@ public class PermissionTemplateServiceTest {
     checkWouldUserHavePermission(dbTester.getDefaultOrganization(), null, UserRole.ADMIN, false);
   }
 
-  private void checkWouldUserHavePermission(OrganizationDto organization, @Nullable Long userId, String permission, boolean expectedResult) {
+  private void checkWouldUserHavePermission(OrganizationDto organization, @Nullable Integer userId, String permission, boolean expectedResult) {
     assertThat(underTest.wouldUserHavePermissionWithDefaultTemplate(session, organization.getUuid(), userId, permission, null, "PROJECT_KEY", Qualifiers.PROJECT))
       .isEqualTo(expectedResult);
   }
index 8d24772fbff6d9d9c3d780bd0da401c393687dab..1c5dd22c75826d4f8859bbf0fdcf84c1c257d36a 100644 (file)
@@ -220,7 +220,7 @@ public class ApplyTemplateActionTest extends BasePermissionWsTest<ApplyTemplateA
     return db.getDbClient().groupPermissionDao().selectGroupNamesByQuery(db.getSession(), db.getDefaultOrganization().getUuid(), query);
   }
 
-  private List<Long> selectProjectPermissionUsers(ComponentDto project, String permission) {
+  private List<Integer> selectProjectPermissionUsers(ComponentDto project, String permission) {
     PermissionQuery query = PermissionQuery.builder().setPermission(permission).setComponentUuid(project.uuid()).build();
     return db.getDbClient().userPermissionDao().selectUserIds(db.getSession(), db.getDefaultOrganization().getUuid(), query);
   }
index 2089cd819568d652fc5ce18b04ce0a901e301bb5..4f98e2e7371fe0d139bfddb1dea0bbb4f2edf483 100644 (file)
@@ -223,7 +223,7 @@ public class BulkApplyTemplateActionTest extends BasePermissionWsTest<BulkApplyT
     return db.getDbClient().groupPermissionDao().selectGroupNamesByQuery(db.getSession(), project.getOrganizationUuid(), query);
   }
 
-  private List<Long> selectProjectPermissionUsers(ComponentDto project, String permission) {
+  private List<Integer> selectProjectPermissionUsers(ComponentDto project, String permission) {
     PermissionQuery query = PermissionQuery.builder().setPermission(permission).setComponentUuid(project.uuid()).build();
     return db.getDbClient().userPermissionDao().selectUserIds(db.getSession(), project.getOrganizationUuid(), query);
   }
index 9d899f06d045dc47af0e2dfdafaabfc3e97c071c..63ce8f422bf815cc8185dbb33404cbebd44e4188 100644 (file)
@@ -187,7 +187,7 @@ public class RemoveGroupFromTemplateActionTest extends BasePermissionWsTest<Remo
     request.execute();
   }
 
-  private void addGroupToTemplate(PermissionTemplateDto template, @Nullable Long groupId, String permission) {
+  private void addGroupToTemplate(PermissionTemplateDto template, @Nullable Integer groupId, String permission) {
     db.getDbClient().permissionTemplateDao().insertGroupPermission(db.getSession(), template.getId(), groupId, permission);
     db.commit();
   }
index 9891df2221587c7be66b8e7eab9c364f16833a6c..e68409f338a4b0a082ed9d4c047ec4af2677d1cd 100644 (file)
@@ -272,12 +272,12 @@ public class SearchTemplatesActionTest extends BasePermissionWsTest<SearchTempla
     return insert;
   }
 
-  private void addGroupToTemplate(long templateId, @Nullable Long groupId, String permission) {
+  private void addGroupToTemplate(long templateId, @Nullable Integer groupId, String permission) {
     dbClient.permissionTemplateDao().insertGroupPermission(db.getSession(), templateId, groupId, permission);
     db.getSession().commit();
   }
 
-  private void addUserToTemplate(long templateId, long userId, String permission) {
+  private void addUserToTemplate(long templateId, int userId, String permission) {
     dbClient.permissionTemplateDao().insertUserPermission(db.getSession(), templateId, userId, permission);
     db.getSession().commit();
   }
index 387821dfe06d3e3601234e51b260ee3e9d8d6d50..5c015137d0befb5e04a42b64c3a49b4f629acddd 100644 (file)
@@ -377,7 +377,7 @@ public class TemplateGroupsActionTest extends BasePermissionWsTest<TemplateGroup
     db.getDbClient().permissionTemplateDao().insertGroupPermission(db.getSession(), permissionTemplateGroup);
   }
 
-  private static PermissionTemplateGroupDto newPermissionTemplateGroup(String permission, long templateId, @Nullable Long groupId) {
+  private static PermissionTemplateGroupDto newPermissionTemplateGroup(String permission, long templateId, @Nullable Integer groupId) {
     return newPermissionTemplateGroupDto()
       .setPermission(permission)
       .setTemplateId(templateId)
index 452b25618d77badaccce085f7e00f86c92cf2f44..b269d3cc1f8c07d41b64253384f098e2bafeb7c2 100644 (file)
@@ -48,7 +48,7 @@ import org.sonarqube.ws.client.project.CreateRequest;
 
 import static org.assertj.core.api.AssertionsForInterfaceTypes.assertThat;
 import static org.mockito.Matchers.any;
-import static org.mockito.Matchers.anyLong;
+import static org.mockito.Matchers.anyInt;
 import static org.mockito.Mockito.mock;
 import static org.mockito.Mockito.verify;
 import static org.mockito.Mockito.when;
@@ -133,7 +133,7 @@ public class CreateActionTest {
   @Test
   public void fail_when_project_already_exists() throws Exception {
     OrganizationDto organization = db.organizations().insert();
-    when(componentUpdater.create(any(DbSession.class), any(NewComponent.class), anyLong())).thenThrow(new BadRequestException("already exists"));
+    when(componentUpdater.create(any(DbSession.class), any(NewComponent.class), anyInt())).thenThrow(new BadRequestException("already exists"));
     userSession.addOrganizationPermission(organization, PROVISIONING);
 
     expectedException.expect(BadRequestException.class);
@@ -216,12 +216,12 @@ public class CreateActionTest {
 
   private NewComponent verifyCallToComponentUpdater() {
     ArgumentCaptor<NewComponent> argument = ArgumentCaptor.forClass(NewComponent.class);
-    verify(componentUpdater).create(any(DbSession.class), argument.capture(), anyLong());
+    verify(componentUpdater).create(any(DbSession.class), argument.capture(), anyInt());
     return argument.getValue();
   }
 
   private void expectSuccessfulCallToComponentUpdater() {
-    when(componentUpdater.create(any(DbSession.class), any(NewComponent.class), anyLong())).thenAnswer(invocation -> {
+    when(componentUpdater.create(any(DbSession.class), any(NewComponent.class), anyInt())).thenAnswer(invocation -> {
       NewComponent newC = invocation.getArgumentAt(1, NewComponent.class);
       return new ComponentDto().setKey(newC.key()).setQualifier(newC.qualifier()).setName(newC.name());
     });
index efb9db0f16a532de3047d9a419f88ccf520aad6b..9c33f5565370860bf853a8210faddcfd2f5f5816 100644 (file)
@@ -355,13 +355,13 @@ public class SetActionTest {
 
   @Test
   public void user_setting_is_not_updated() {
-    propertyDb.insertProperty(newGlobalPropertyDto("my.key", "my user value").setUserId(42L));
+    propertyDb.insertProperty(newGlobalPropertyDto("my.key", "my user value").setUserId(42));
     propertyDb.insertProperty(newGlobalPropertyDto("my.key", "my global value"));
 
     callForGlobalSetting("my.key", "my new global value");
 
     assertGlobalSetting("my.key", "my new global value");
-    assertUserSetting("my.key", "my user value", 42L);
+    assertUserSetting("my.key", "my user value", 42);
   }
 
   @Test
@@ -826,8 +826,8 @@ public class SetActionTest {
       .containsExactly(key, value, null);
   }
 
-  private void assertUserSetting(String key, String value, long userId) {
-    List<PropertyDto> result = dbClient.propertiesDao().selectByQuery(PropertyQuery.builder().setKey(key).setUserId((int) userId).build(), dbSession);
+  private void assertUserSetting(String key, String value, int userId) {
+    List<PropertyDto> result = dbClient.propertiesDao().selectByQuery(PropertyQuery.builder().setKey(key).setUserId(userId).build(), dbSession);
 
     assertThat(result).hasSize(1)
       .extracting(PropertyDto::getKey, PropertyDto::getValue, PropertyDto::getUserId)
index 6893bd8e5103e54895a95f020c826b58461d8eb9..bdfd129a8ebf3e0266c400179220d31740c9ed11 100644 (file)
@@ -187,7 +187,7 @@ public class DeleteActionTest {
   public void fail_if_id_does_not_exist() throws Exception {
     addAdminToDefaultOrganization();
     loginAsAdminOnDefaultOrganization();
-    long groupId = defaultGroup.getId() + 123;
+    int groupId = defaultGroup.getId() + 123;
 
     expectedException.expect(NotFoundException.class);
     expectedException.expectMessage("No group with id '" + groupId + "'");
index be9137105f38e1102a7a75535b7143d950aeb697..acb2368c709f523cfac17509abaee77b71760452 100644 (file)
@@ -33,9 +33,9 @@ public class GroupWsRefTest {
 
   @Test
   public void test_ref_by_id() {
-    GroupWsRef ref = GroupWsRef.fromId(10L);
+    GroupWsRef ref = GroupWsRef.fromId(10);
     assertThat(ref.hasId()).isTrue();
-    assertThat(ref.getId()).isEqualTo(10L);
+    assertThat(ref.getId()).isEqualTo(10);
     assertThat(ref.isAnyone()).isFalse();
   }
 
@@ -50,11 +50,11 @@ public class GroupWsRefTest {
 
   @Test
   public void test_equals_and_hashCode() {
-    GroupWsRef refId1 = GroupWsRef.fromId(10L);
-    GroupWsRef refId2 = GroupWsRef.fromId(11L);
+    GroupWsRef refId1 = GroupWsRef.fromId(10);
+    GroupWsRef refId2 = GroupWsRef.fromId(11);
     assertThat(refId1.equals(refId1)).isTrue();
-    assertThat(refId1.equals(GroupWsRef.fromId(10L))).isTrue();
-    assertThat(refId1.hashCode()).isEqualTo(GroupWsRef.fromId(10L).hashCode());
+    assertThat(refId1.equals(GroupWsRef.fromId(10))).isTrue();
+    assertThat(refId1.hashCode()).isEqualTo(GroupWsRef.fromId(10).hashCode());
     assertThat(refId1.equals(refId2)).isFalse();
 
     GroupWsRef refName1 = fromName("ORG1", "the-group");
@@ -69,7 +69,7 @@ public class GroupWsRefTest {
 
   @Test
   public void test_toString() {
-    GroupWsRef refId = GroupWsRef.fromId(10L);
+    GroupWsRef refId = GroupWsRef.fromId(10);
     assertThat(refId.toString()).isEqualTo("GroupWsRef{id=10, organizationKey='null', name='null'}");
   }
 
index 797050210958b5576b79bcd77866aa50e302f008..7ba488b6c16762525db02c148354e83848040955 100644 (file)
@@ -40,7 +40,7 @@ public class OrganizationDto {
    */
   private boolean guarded = false;
   /** If of the user for whom the organization was created, can be null. */
-  private Long userId;
+  private Integer userId;
   private long createdAt;
   private long updatedAt;
 
@@ -108,11 +108,11 @@ public class OrganizationDto {
   }
 
   @CheckForNull
-  public Long getUserId() {
+  public Integer getUserId() {
     return userId;
   }
 
-  public OrganizationDto setUserId(@Nullable Long userId) {
+  public OrganizationDto setUserId(@Nullable Integer userId) {
     this.userId = userId;
     return this;
   }
index 4a168a5a826d5f108ec4cd9583771d7de566c231..6f843f537ed02343a3a7212444ddd58d0c38591e 100644 (file)
@@ -44,7 +44,7 @@ public class AuthorizationDao implements Dao {
   /**
   * Loads all the permissions granted to logged-in user for the specified organization
   */
-  public Set<String> selectOrganizationPermissions(DbSession dbSession, String organizationUuid, long userId) {
+  public Set<String> selectOrganizationPermissions(DbSession dbSession, String organizationUuid, int userId) {
     return mapper(dbSession).selectOrganizationPermissions(organizationUuid, userId);
   }
 
@@ -60,7 +60,7 @@ public class AuthorizationDao implements Dao {
    * is deleted. The anyone virtual group is not taken into account.
    */
   public int countUsersWithGlobalPermissionExcludingGroup(DbSession dbSession, String organizationUuid,
-    String permission, long excludedGroupId) {
+    String permission, int excludedGroupId) {
     return mapper(dbSession).countUsersWithGlobalPermissionExcludingGroup(organizationUuid, permission, excludedGroupId);
   }
 
@@ -69,29 +69,29 @@ public class AuthorizationDao implements Dao {
    * is deleted. The anyone virtual group is not taken into account.
    */
   public int countUsersWithGlobalPermissionExcludingUser(DbSession dbSession, String organizationUuid,
-    String permission, long excludedUSerId) {
-    return mapper(dbSession).countUsersWithGlobalPermissionExcludingUser(organizationUuid, permission, excludedUSerId);
+    String permission, int excludedUserId) {
+    return mapper(dbSession).countUsersWithGlobalPermissionExcludingUser(organizationUuid, permission, excludedUserId);
   }
 
   /**
    * The number of users who will still have the permission if the user {@code userId}
    * is removed from group {@code groupId}. The anyone virtual group is not taken into account.
-   * Contrary to {@link #countUsersWithGlobalPermissionExcludingUser(DbSession, String, String, long)}, user
+   * Contrary to {@link #countUsersWithGlobalPermissionExcludingUser(DbSession, String, String, int)}, user
    * still exists and may have the permission directly or through other groups.
    */
   public int countUsersWithGlobalPermissionExcludingGroupMember(DbSession dbSession, String organizationUuid,
-    String permission, long groupId, long userId) {
+    String permission, int groupId, int userId) {
     return mapper(dbSession).countUsersWithGlobalPermissionExcludingGroupMember(organizationUuid, permission, groupId, userId);
   }
 
   /**
    * The number of users who will still have the permission if the permission {@code permission}
    * is removed from user {@code userId}. The anyone virtual group is not taken into account.
-   * Contrary to {@link #countUsersWithGlobalPermissionExcludingUser(DbSession, String, String, long)}, user
+   * Contrary to {@link #countUsersWithGlobalPermissionExcludingUser(DbSession, String, String, int)}, user
    * still exists and may have the permission through groups.
    */
   public int countUsersWithGlobalPermissionExcludingUserPermission(DbSession dbSession, String organizationUuid,
-    String permission, long userId) {
+    String permission, int userId) {
     return mapper(dbSession).countUsersWithGlobalPermissionExcludingUserPermission(organizationUuid, permission, userId);
   }
 
@@ -102,7 +102,7 @@ public class AuthorizationDao implements Dao {
    * <br/>
    * Group membership is taken into account. Anonymous privileges are ignored.
    */
-  public Set<String> selectOrganizationUuidsOfUserWithGlobalPermission(DbSession dbSession, long userId, String permission) {
+  public Set<String> selectOrganizationUuidsOfUserWithGlobalPermission(DbSession dbSession, int userId, String permission) {
     return mapper(dbSession).selectOrganizationUuidsOfUserWithGlobalPermission(userId, permission);
   }
 
@@ -131,7 +131,7 @@ public class AuthorizationDao implements Dao {
    * Keep only authorized user that have the given permission on a given project.
    * Please Note that if the permission is 'Anyone' is NOT taking into account by thie method.
    */
-  public Collection<Long> keepAuthorizedUsersForRoleAndProject(DbSession dbSession, Collection<Long> userIds, String role, long projectId) {
+  public Collection<Integer> keepAuthorizedUsersForRoleAndProject(DbSession dbSession, Collection<Integer> userIds, String role, long projectId) {
     return executeLargeInputs(
       userIds,
       partitionOfIds -> mapper(dbSession).keepAuthorizedUsersForRoleAndProject(role, projectId, partitionOfIds));
index f13bbd37f8524f8bf3337f58085c2d84092a660e..cc5f1f7f1fc44930cbc45cd4ed25e094ea73ecf9 100644 (file)
@@ -29,28 +29,28 @@ import org.apache.ibatis.annotations.Param;
  */
 public interface AuthorizationMapper {
 
-  Set<String> selectOrganizationPermissions(@Param("organizationUuid") String organizationUuid, @Param("userId") long userId);
+  Set<String> selectOrganizationPermissions(@Param("organizationUuid") String organizationUuid, @Param("userId") int userId);
 
   Set<String> selectOrganizationPermissionsOfAnonymous(@Param("organizationUuid") String organizationUuid);
 
   int countUsersWithGlobalPermissionExcludingGroup(@Param("organizationUuid") String organizationUuid,
-    @Param("permission") String permission, @Param("excludedGroupId") long excludedGroupId);
+    @Param("permission") String permission, @Param("excludedGroupId") int excludedGroupId);
 
   int countUsersWithGlobalPermissionExcludingUser(@Param("organizationUuid") String organizationUuid, @Param("permission") String permission,
-    @Param("excludedUserId") long excludedUserId);
+    @Param("excludedUserId") int excludedUserId);
 
   int countUsersWithGlobalPermissionExcludingGroupMember(@Param("organizationUuid") String organizationUuid,
-                                                         @Param("permission") String permission, @Param("groupId") long groupId, @Param("userId") long userId);
+                                                         @Param("permission") String permission, @Param("groupId") int groupId, @Param("userId") int userId);
 
   int countUsersWithGlobalPermissionExcludingUserPermission(@Param("organizationUuid") String organizationUuid,
-                                                            @Param("permission") String permission, @Param("userId") long userId);
+                                                            @Param("permission") String permission, @Param("userId") int userId);
 
-  Set<String> selectOrganizationUuidsOfUserWithGlobalPermission(@Param("userId") long userId, @Param("permission") String permission);
+  Set<String> selectOrganizationUuidsOfUserWithGlobalPermission(@Param("userId") int userId, @Param("permission") String permission);
 
   Set<Long> keepAuthorizedProjectIdsForAnonymous(@Param("role") String role, @Param("componentIds") Collection<Long> componentIds);
   
-  Set<Long> keepAuthorizedProjectIdsForUser(@Param("userId") long userId, @Param("role") String role, @Param("componentIds") Collection<Long> componentIds);
+  Set<Long> keepAuthorizedProjectIdsForUser(@Param("userId") int userId, @Param("role") String role, @Param("componentIds") Collection<Long> componentIds);
 
-  List<Long> keepAuthorizedUsersForRoleAndProject(@Param("role") String role, @Param("componentId") long componentId, @Param("userIds") List<Long> userIds);
+  List<Integer> keepAuthorizedUsersForRoleAndProject(@Param("role") String role, @Param("componentId") long componentId, @Param("userIds") List<Integer> userIds);
 
 }
index 4f1680a444d0ffdb9762ac921c29aaa6a344170d..c8fe45a4cd36e0d71f18f9bf579850e181a57716 100644 (file)
@@ -60,7 +60,7 @@ public class GroupPermissionDao implements Dao {
    * Select global or project permission of given groups and organization. Anyone virtual group is supported
    * through the value "zero" (0L) in {@code groupIds}.
    */
-  public List<GroupPermissionDto> selectByGroupIds(DbSession dbSession, String organizationUuid, List<Long> groupIds, @Nullable Long projectId) {
+  public List<GroupPermissionDto> selectByGroupIds(DbSession dbSession, String organizationUuid, List<Integer> groupIds, @Nullable Long projectId) {
     return executeLargeInputs(groupIds, groups -> mapper(dbSession).selectByGroupIds(organizationUuid, groups, projectId));
   }
 
@@ -84,7 +84,7 @@ public class GroupPermissionDao implements Dao {
    * Selects the global permissions granted to group. An empty list is returned if the
    * group does not exist.
    */
-  public List<String> selectGlobalPermissionsOfGroup(DbSession session, String organizationUuid, @Nullable Long groupId) {
+  public List<String> selectGlobalPermissionsOfGroup(DbSession session, String organizationUuid, @Nullable Integer groupId) {
     return mapper(session).selectGlobalPermissionsOfGroup(organizationUuid, groupId);
   }
 
@@ -92,7 +92,7 @@ public class GroupPermissionDao implements Dao {
    * Selects the permissions granted to group and project. An empty list is returned if the
    * group or project do not exist.
    */
-  public List<String> selectProjectPermissionsOfGroup(DbSession session, String organizationUuid, @Nullable Long groupId, long projectId) {
+  public List<String> selectProjectPermissionsOfGroup(DbSession session, String organizationUuid, @Nullable Integer groupId, long projectId) {
     return mapper(session).selectProjectPermissionsOfGroup(organizationUuid, groupId, projectId);
   }
 
@@ -145,7 +145,7 @@ public class GroupPermissionDao implements Dao {
    * @param groupId if null, then anyone, else id of group
    * @param rootComponentId if null, then global permission, else id of root component (project)
    */
-  public void delete(DbSession dbSession, String permission, String organizationUuid, @Nullable Long groupId, @Nullable Long rootComponentId) {
+  public void delete(DbSession dbSession, String permission, String organizationUuid, @Nullable Integer groupId, @Nullable Long rootComponentId) {
     mapper(dbSession).delete(permission, organizationUuid, groupId, rootComponentId);
   }
 
index f84d5c76aa12d19f695a00b05a0c5db8791a6a81..2a1d166b67f228013bd2912a76a73c0dfa7e39e0 100644 (file)
@@ -24,11 +24,11 @@ import javax.annotation.Nullable;
 public class GroupPermissionDto {
 
   private String organizationUuid;
-  private Long groupId;
+  private Integer groupId;
   private Long resourceId;
   private String role;
 
-  public Long getGroupId() {
+  public Integer getGroupId() {
     return groupId;
   }
 
@@ -44,7 +44,7 @@ public class GroupPermissionDto {
   /**
    * Null when Anyone
    */
-  public GroupPermissionDto setGroupId(@Nullable Long groupId) {
+  public GroupPermissionDto setGroupId(@Nullable Integer groupId) {
     this.groupId = groupId;
     return this;
   }
index 9c6ebec558fcde24794ff9a1cb43886771c53df9..10484b173d97d85ce36b8ddaad26ac05e82cbbfa 100644 (file)
@@ -34,7 +34,7 @@ public interface GroupPermissionMapper {
   int countGroupsByQuery(@Param("organizationUuid") String organizationUuid, @Param("query") PermissionQuery query);
 
   List<GroupPermissionDto> selectByGroupIds(@Param("organizationUuid") String organizationUuid,
-    @Param("groupIds") List<Long> groupIds, @Nullable @Param("projectId") Long projectId);
+    @Param("groupIds") List<Integer> groupIds, @Nullable @Param("projectId") Long projectId);
 
   void groupsCountByProjectIdAndPermission(Map<String, Object> parameters, ResultHandler resultHandler);
 
@@ -43,13 +43,13 @@ public interface GroupPermissionMapper {
   void deleteByRootComponentId(@Param("rootComponentId") long componentId);
 
   void delete(@Param("permission") String permission, @Param("organizationUuid") String organizationUuid,
-    @Nullable @Param("groupId") Long groupId, @Nullable @Param("rootComponentId") Long rootComponentId);
+    @Nullable @Param("groupId") Integer groupId, @Nullable @Param("rootComponentId") Long rootComponentId);
 
   List<String> selectGlobalPermissionsOfGroup(@Param("organizationUuid") String organizationUuid,
-    @Nullable @Param("groupId") Long groupId);
+    @Nullable @Param("groupId") Integer groupId);
 
   List<String> selectProjectPermissionsOfGroup(@Param("organizationUuid") String organizationUuid,
-    @Nullable @Param("groupId") Long groupId, @Param("projectId") long projectId);
+    @Nullable @Param("groupId") Integer groupId, @Param("projectId") long projectId);
 
   void deleteByOrganization(@Param("organizationUuid") String organizationUuid);
 
index 765a7ee03f2f9802846951130d44d380de6af5fb..6ae036500f29a40d517d56081fff85ade0865704 100644 (file)
@@ -58,7 +58,7 @@ public class UserPermissionDao implements Dao {
    * Shortcut over {@link #select(DbSession, String, PermissionQuery, Collection)} to return only distinct user
    * ids, keeping the same order.
    */
-  public List<Long> selectUserIds(DbSession dbSession, String organizationUuid, PermissionQuery query) {
+  public List<Integer> selectUserIds(DbSession dbSession, String organizationUuid, PermissionQuery query) {
     List<UserPermissionDto> dtos = select(dbSession, organizationUuid, query, null);
     return dtos.stream()
       .map(UserPermissionDto::getUserId)
@@ -87,7 +87,7 @@ public class UserPermissionDao implements Dao {
    *
    * @return the global permissions. An empty list is returned if user or organization do not exist.
    */
-  public List<String> selectGlobalPermissionsOfUser(DbSession dbSession, long userId, String organizationUuid) {
+  public List<String> selectGlobalPermissionsOfUser(DbSession dbSession, int userId, String organizationUuid) {
     return mapper(dbSession).selectGlobalPermissionsOfUser(userId, organizationUuid);
   }
 
@@ -96,7 +96,7 @@ public class UserPermissionDao implements Dao {
    *
    * @return the project permissions. An empty list is returned if project or user do not exist.
    */
-  public List<String> selectProjectPermissionsOfUser(DbSession dbSession, long userId, long projectId) {
+  public List<String> selectProjectPermissionsOfUser(DbSession dbSession, int userId, long projectId) {
     return mapper(dbSession).selectProjectPermissionsOfUser(userId, projectId);
   }
 
@@ -119,14 +119,14 @@ public class UserPermissionDao implements Dao {
   /**
    * Removes a single global permission from user
    */
-  public void deleteGlobalPermission(DbSession dbSession, long userId, String permission, String organizationUuid) {
+  public void deleteGlobalPermission(DbSession dbSession, int userId, String permission, String organizationUuid) {
     mapper(dbSession).deleteGlobalPermission(userId, permission, organizationUuid);
   }
 
   /**
    * Removes a single project permission from user
    */
-  public void deleteProjectPermission(DbSession dbSession, long userId, String permission, long projectId) {
+  public void deleteProjectPermission(DbSession dbSession, int userId, String permission, long projectId) {
     mapper(dbSession).deleteProjectPermission(userId, permission, projectId);
   }
 
index ae561ffe438229a349457b5b244d199cef186546..6638cd64d16e4c46543fe02ee2874b0ed9bd825e 100644 (file)
@@ -26,14 +26,14 @@ public class UserPermissionDto {
 
   private String organizationUuid;
   private String permission;
-  private long userId;
+  private int userId;
   private Long componentId;
 
   public UserPermissionDto() {
     // used by MyBatis
   }
 
-  public UserPermissionDto(String organizationUuid, String permission, long userId, @Nullable Long componentId) {
+  public UserPermissionDto(String organizationUuid, String permission, int userId, @Nullable Long componentId) {
     this.organizationUuid = organizationUuid;
     this.permission = permission;
     this.userId = userId;
@@ -44,7 +44,7 @@ public class UserPermissionDto {
     return permission;
   }
 
-  public long getUserId() {
+  public int getUserId() {
     return userId;
   }
 
index 2a6c7b32e07950d6f1e69b5a6405d1a8f2086b93..56209760616aad6b6ef60b77e8df3fbd65041af9 100644 (file)
@@ -48,17 +48,17 @@ public interface UserPermissionMapper {
 
   void insert(UserPermissionDto dto);
 
-  void deleteGlobalPermission(@Param("userId") long userId, @Param("permission") String permission,
+  void deleteGlobalPermission(@Param("userId") int userId, @Param("permission") String permission,
     @Param("organizationUuid") String organizationUuid);
 
-  void deleteProjectPermission(@Param("userId") long userId, @Param("permission") String permission,
+  void deleteProjectPermission(@Param("userId") int userId, @Param("permission") String permission,
     @Param("projectId") long projectId);
 
   void deleteProjectPermissions(@Param("projectId") long projectId);
 
-  List<String> selectGlobalPermissionsOfUser(@Param("userId") long userId, @Param("organizationUuid") String organizationUuid);
+  List<String> selectGlobalPermissionsOfUser(@Param("userId") int userId, @Param("organizationUuid") String organizationUuid);
 
-  List<String> selectProjectPermissionsOfUser(@Param("userId") long userId, @Param("projectId") long projectId);
+  List<String> selectProjectPermissionsOfUser(@Param("userId") int userId, @Param("projectId") long projectId);
 
   void deleteByOrganization(@Param("organizationUuid") String organizationUuid);
 }
index 061a547d0953733ac8b792caa9983bb93cda27cc..a2aed9311f40ed5e051ab5f61a56f66b107236f2 100644 (file)
@@ -88,7 +88,7 @@ public class PermissionTemplateDao implements Dao {
   /**
    * @return {@code true} if template contains groups that are granted with {@code permission}, else {@code false}
    */
-  public boolean hasGroupsWithPermission(DbSession dbSession, long templateId, String permission, @Nullable Long groupId) {
+  public boolean hasGroupsWithPermission(DbSession dbSession, long templateId, String permission, @Nullable Integer groupId) {
     return mapper(dbSession).countGroupsWithPermission(templateId, permission, groupId) > 0;
   }
 
@@ -157,7 +157,7 @@ public class PermissionTemplateDao implements Dao {
     return permissionTemplate;
   }
 
-  public void insertUserPermission(DbSession session, Long templateId, Long userId, String permission) {
+  public void insertUserPermission(DbSession session, Long templateId, Integer userId, String permission) {
     PermissionTemplateUserDto permissionTemplateUser = new PermissionTemplateUserDto()
       .setTemplateId(templateId)
       .setUserId(userId)
@@ -169,7 +169,7 @@ public class PermissionTemplateDao implements Dao {
     session.commit();
   }
 
-  public void deleteUserPermission(DbSession session, Long templateId, Long userId, String permission) {
+  public void deleteUserPermission(DbSession session, Long templateId, Integer userId, String permission) {
     PermissionTemplateUserDto permissionTemplateUser = new PermissionTemplateUserDto()
       .setTemplateId(templateId)
       .setPermission(permission)
@@ -178,7 +178,7 @@ public class PermissionTemplateDao implements Dao {
     session.commit();
   }
 
-  public void insertGroupPermission(DbSession session, long templateId, @Nullable Long groupId, String permission) {
+  public void insertGroupPermission(DbSession session, long templateId, @Nullable Integer groupId, String permission) {
     PermissionTemplateGroupDto permissionTemplateGroup = new PermissionTemplateGroupDto()
       .setTemplateId(templateId)
       .setPermission(permission)
@@ -192,7 +192,7 @@ public class PermissionTemplateDao implements Dao {
     mapper(session).insertGroupPermission(permissionTemplateGroup);
   }
 
-  public void deleteGroupPermission(DbSession session, Long templateId, @Nullable Long groupId, String permission) {
+  public void deleteGroupPermission(DbSession session, Long templateId, @Nullable Integer groupId, String permission) {
     PermissionTemplateGroupDto permissionTemplateGroup = new PermissionTemplateGroupDto()
       .setTemplateId(templateId)
       .setPermission(permission)
@@ -205,14 +205,14 @@ public class PermissionTemplateDao implements Dao {
     return mapper(dbSession).selectByName(organizationUuid, name.toUpperCase(Locale.ENGLISH));
   }
 
-  public List<String> selectPotentialPermissionsByUserIdAndTemplateId(DbSession dbSession, @Nullable Long currentUserId, long templateId) {
+  public List<String> selectPotentialPermissionsByUserIdAndTemplateId(DbSession dbSession, @Nullable Integer currentUserId, long templateId) {
     return mapper(dbSession).selectPotentialPermissionsByUserIdAndTemplateId(currentUserId, templateId);
   }
 
   /**
    * Remove a group from all templates (used when removing a group)
    */
-  public void deleteByGroup(DbSession session, long groupId) {
+  public void deleteByGroup(DbSession session, int groupId) {
     session.getMapper(PermissionTemplateMapper.class).deleteByGroupId(groupId);
   }
 
index 06289c90a73d9d8274b29c5353c2174340639518..d37b2a4ebf79b13fc92710206774db58373e1306 100644 (file)
@@ -25,7 +25,7 @@ import javax.annotation.Nullable;
 public class PermissionTemplateGroupDto {
   private Long id;
   private Long templateId;
-  private Long groupId;
+  private Integer groupId;
   private String permission;
   private String groupName;
   private Date createdAt;
@@ -49,11 +49,11 @@ public class PermissionTemplateGroupDto {
     return this;
   }
 
-  public Long getGroupId() {
+  public Integer getGroupId() {
     return groupId;
   }
 
-  public PermissionTemplateGroupDto setGroupId(@Nullable Long groupId) {
+  public PermissionTemplateGroupDto setGroupId(@Nullable Integer groupId) {
     this.groupId = groupId;
     return this;
   }
index 59de7f79d84a3b238c9f5356af5c99a3081bf7b3..ddf2c0a4c0d17a73623302bf02519f19ea13913b 100644 (file)
@@ -62,7 +62,7 @@ public interface PermissionTemplateMapper {
 
   void insertGroupPermission(PermissionTemplateGroupDto permissionTemplateGroup);
 
-  void deleteByGroupId(long groupId);
+  void deleteByGroupId(int groupId);
 
   PermissionTemplateDto selectByName(@Param("organizationUuid") String organizationUuid, @Param("name") String name);
 
@@ -81,9 +81,9 @@ public interface PermissionTemplateMapper {
 
   void groupsCountByTemplateIdAndPermission(Map<String, Object> parameters, ResultHandler resultHandler);
 
-  List<String> selectPotentialPermissionsByUserIdAndTemplateId(@Param("userId") @Nullable Long currentUserId, @Param("templateId") long templateId);
+  List<String> selectPotentialPermissionsByUserIdAndTemplateId(@Param("userId") @Nullable Integer currentUserId, @Param("templateId") long templateId);
 
-  int countGroupsWithPermission(@Param("templateId") long templateId, @Param("permission") String permission, @Nullable @Param("groupId") Long groupId);
+  int countGroupsWithPermission(@Param("templateId") long templateId, @Param("permission") String permission, @Nullable @Param("groupId") Integer groupId);
 
   List<Long> selectTemplateIdsByOrganization(@Param("organizationUuid") String organizationUuid);
 
index 89a0526a68472ff59a32579453d8ba0367bbbe14..3db22ae15603f2b604647bed018da2a588e5546f 100644 (file)
@@ -24,7 +24,7 @@ import java.util.Date;
 public class PermissionTemplateUserDto {
   private Long id;
   private Long templateId;
-  private Long userId;
+  private Integer userId;
   private String permission;
   private String userName;
   private String userLogin;
@@ -49,11 +49,11 @@ public class PermissionTemplateUserDto {
     return this;
   }
 
-  public Long getUserId() {
+  public Integer getUserId() {
     return userId;
   }
 
-  public PermissionTemplateUserDto setUserId(Long userId) {
+  public PermissionTemplateUserDto setUserId(Integer userId) {
     this.userId = userId;
     return this;
   }
index 0f6bfe392af38765ec1c97191f7dc5b721fa3b48..df0d6a383beb3762a6421038f1f876d154311211 100644 (file)
@@ -183,7 +183,7 @@ public class PropertiesDao implements Dao {
   }
 
   private void save(PropertiesMapper mapper,
-    String key, @Nullable Long userId, @Nullable Long componentId,
+    String key, @Nullable Integer userId, @Nullable Long componentId,
     @Nullable String value) {
     checkKey(key);
 
index e7a5b25d5b03e2ffbc9876682076dd0eeb6c25bb..dd8f6c562b8961fdf8cb6176f056ca9287493c37 100644 (file)
@@ -46,16 +46,16 @@ public interface PropertiesMapper {
   List<PropertyDto> selectDescendantModuleProperties(@Param("moduleUuid") String moduleUuid, @Param(value = "scope") String scope,
     @Param(value = "excludeDisabled") boolean excludeDisabled);
 
-  void insertAsEmpty(@Param("key") String key, @Nullable @Param("userId") Long userId, @Nullable @Param("componentId") Long componentId,
+  void insertAsEmpty(@Param("key") String key, @Nullable @Param("userId") Integer userId, @Nullable @Param("componentId") Long componentId,
     @Param("now") long now);
 
-  void insertAsText(@Param("key") String key, @Nullable @Param("userId") Long userId, @Nullable @Param("componentId") Long componentId,
+  void insertAsText(@Param("key") String key, @Nullable @Param("userId") Integer userId, @Nullable @Param("componentId") Long componentId,
     @Param("value") String value, @Param("now") long now);
 
-  void insertAsClob(@Param("key") String key, @Nullable @Param("userId") Long userId, @Nullable @Param("componentId") Long componentId,
+  void insertAsClob(@Param("key") String key, @Nullable @Param("userId") Integer userId, @Nullable @Param("componentId") Long componentId,
     @Param("value") String value, @Param("now") long now);
 
-  int delete(@Param("key") String key, @Nullable @Param("userId") Long userId, @Nullable @Param("componentId") Long componentId);
+  int delete(@Param("key") String key, @Nullable @Param("userId") Integer userId, @Nullable @Param("componentId") Long componentId);
 
   int deleteById(long id);
 
index 6e0ebc12e8ad2807bbb461d7a9ed02e6bd6a9afd..f9cabe4c6e76bcc58fc660a753684f307e62e686 100644 (file)
@@ -32,7 +32,7 @@ public class PropertyDto {
   private String key;
   private String value;
   private Long resourceId;
-  private Long userId;
+  private Integer userId;
 
   public String getKey() {
     return key;
@@ -64,11 +64,11 @@ public class PropertyDto {
   }
 
   @CheckForNull
-  public Long getUserId() {
+  public Integer getUserId() {
     return userId;
   }
 
-  public PropertyDto setUserId(@Nullable Long userId) {
+  public PropertyDto setUserId(@Nullable Integer userId) {
     this.userId = userId;
     return this;
   }
index 14593023ae5474b90b61eb8eb74a59f63dcbc7d9..79d4d6fd7d1e95b2a3344fbe8890c882797f050b 100644 (file)
@@ -74,7 +74,7 @@ public class PropertyTesting {
     return newPropertyDto(component.getId(), user.getId());
   }
 
-  private static PropertyDto newPropertyDto(@Nullable Long componentId, @Nullable Long userId) {
+  private static PropertyDto newPropertyDto(@Nullable Long componentId, @Nullable Integer userId) {
     String key = String.valueOf(cursor);
     cursor++;
     String value = String.valueOf(cursor);
@@ -82,7 +82,7 @@ public class PropertyTesting {
     return newPropertyDto(key, value, componentId, userId);
   }
 
-  private static PropertyDto newPropertyDto(String key, String value, @Nullable Long componentId, @Nullable Long userId) {
+  private static PropertyDto newPropertyDto(String key, String value, @Nullable Long componentId, @Nullable Integer userId) {
     PropertyDto propertyDto = new PropertyDto()
       .setKey(key)
       .setValue(value);
index a046383ecb1a19c0aedaa9170eb7eb1d1d71eda9..22fb347ada532c20a6dc4257015ff355a99df5ba 100644 (file)
@@ -59,15 +59,15 @@ public class GroupDao implements Dao {
   }
 
   @CheckForNull
-  public GroupDto selectById(DbSession dbSession, long groupId) {
+  public GroupDto selectById(DbSession dbSession, int groupId) {
     return mapper(dbSession).selectById(groupId);
   }
 
-  public List<GroupDto> selectByIds(DbSession dbSession, List<Long> ids) {
+  public List<GroupDto> selectByIds(DbSession dbSession, List<Integer> ids) {
     return executeLargeInputs(ids, mapper(dbSession)::selectByIds);
   }
 
-  public void deleteById(DbSession dbSession, long groupId) {
+  public void deleteById(DbSession dbSession, int groupId) {
     mapper(dbSession).deleteById(groupId);
   }
 
index 8077cbd5c23b1ed6c7d9691c479abc97c4b1fb3a..8156414f47a170b40cc0d8f671e08e329ecc303f 100644 (file)
@@ -25,18 +25,18 @@ import javax.annotation.Nullable;
 
 public class GroupDto {
 
-  private Long id;
+  private Integer id;
   private String name;
   private String description;
   private String organizationUuid;
   private Date createdAt;
   private Date updatedAt;
 
-  public Long getId() {
+  public Integer getId() {
     return id;
   }
 
-  public GroupDto setId(Long id) {
+  public GroupDto setId(Integer id) {
     this.id = id;
     return this;
   }
index f6a7164b5b8a4eec952c436f04002ec66bcd68d8..3f70d26a1900ffe93c4ad7562c3141bbd0777d6e 100644 (file)
@@ -28,7 +28,7 @@ import org.apache.ibatis.session.RowBounds;
 public interface GroupMapper {
 
   @CheckForNull
-  GroupDto selectById(long groupId);
+  GroupDto selectById(int groupId);
 
   List<GroupDto> selectByUserLogin(String userLogin);
 
@@ -47,9 +47,9 @@ public interface GroupMapper {
    *
    * @return 1 or 0. Either because the organization uuid is not the one of the group or because the group does not exist
    */
-  int countGroupByOrganizationAndId(@Param("organizationUuid") String organizationUuid, @Param("groupId") long groupId);
+  int countGroupByOrganizationAndId(@Param("organizationUuid") String organizationUuid, @Param("groupId") int groupId);
 
-  void deleteById(long groupId);
+  void deleteById(int groupId);
 
   void deleteByOrganization(@Param("organizationUuid") String organizationUuid);
 
@@ -58,5 +58,5 @@ public interface GroupMapper {
 
   List<GroupDto> selectByOrganizationUuid(@Param("organizationUuid") String organizationUuid);
 
-  List<GroupDto> selectByIds(@Param("ids") List<Long> ids);
+  List<GroupDto> selectByIds(@Param("ids") List<Integer> ids);
 }
index 825413710942a94f449649414c3fbf1bd4cb81cc..bde120c61677ebd2305bbccf8f25ba11116bcad8 100644 (file)
@@ -34,12 +34,12 @@ import static org.sonar.db.DatabaseUtils.executeLargeInputs;
 
 public class GroupMembershipDao implements Dao {
 
-  public List<GroupMembershipDto> selectGroups(DbSession session, GroupMembershipQuery query, Long userId, int offset, int limit) {
+  public List<GroupMembershipDto> selectGroups(DbSession session, GroupMembershipQuery query, Integer userId, int offset, int limit) {
     Map<String, Object> params = ImmutableMap.of("query", query, "userId", userId);
     return mapper(session).selectGroups(params, new RowBounds(offset, limit));
   }
 
-  public int countGroups(DbSession session, GroupMembershipQuery query, Long userId) {
+  public int countGroups(DbSession session, GroupMembershipQuery query, Integer userId) {
     Map<String, Object> params = ImmutableMap.of("query", query, "userId", userId);
     return mapper(session).countGroups(params);
   }
@@ -54,7 +54,7 @@ public class GroupMembershipDao implements Dao {
     return mapper(session).countMembers(params);
   }
 
-  public Map<String, Integer> countUsersByGroups(DbSession session, Collection<Long> groupIds) {
+  public Map<String, Integer> countUsersByGroups(DbSession session, Collection<Integer> groupIds) {
     Map<String, Integer> result = Maps.newHashMap();
     executeLargeInputs(
       groupIds,
@@ -69,7 +69,7 @@ public class GroupMembershipDao implements Dao {
     return result;
   }
 
-  public List<Long> selectGroupIdsByUserId(DbSession dbSession, long userId) {
+  public List<Integer> selectGroupIdsByUserId(DbSession dbSession, int userId) {
     return mapper(dbSession).selectGroupIdsByUserId(userId);
   }
 
index 64de46d6621e9c8d150247e1f785f9022393a5ba..1307352fd60ac6510a9b1f8c012a9b7fa99e62ac 100644 (file)
@@ -30,7 +30,7 @@ public class GroupMembershipDto {
   private Long id;
   private String name;
   private String description;
-  private Long userId;
+  private Integer userId;
 
   public Long getId() {
     return id;
@@ -61,11 +61,11 @@ public class GroupMembershipDto {
   }
 
   @CheckForNull
-  public Long getUserId() {
+  public Integer getUserId() {
     return userId;
   }
 
-  public GroupMembershipDto setUserId(@Nullable Long userId) {
+  public GroupMembershipDto setUserId(@Nullable Integer userId) {
     this.userId = userId;
     return this;
   }
index 37d7d6cbab8d85847d367f023b981ffb06b48603..6bf021b158e99fc69567ca0787f9b482ed2edb49 100644 (file)
@@ -34,10 +34,10 @@ public interface GroupMembershipMapper {
 
   int countMembers(Map<String, Object> params);
 
-  List<GroupUserCount> countUsersByGroup(@Param("groupIds") List<Long> groupIds);
+  List<GroupUserCount> countUsersByGroup(@Param("groupIds") List<Integer> groupIds);
 
   List<LoginGroup> selectGroupsByLogins(@Param("logins") List<String> logins);
 
-  List<Long> selectGroupIdsByUserId(@Param("userId") long userId);
+  List<Integer> selectGroupIdsByUserId(@Param("userId") int userId);
   
 }
index 717ef99e2b61269a62f90bc7385eb2d4507e8611..66e14f432a1fa3bc4e267fbd10154d4287e98e65 100644 (file)
@@ -29,11 +29,11 @@ public class RoleDao implements Dao {
    * All the projects on which the user has {@code permission}, directly or through
    * groups.
    */
-  public List<Long> selectComponentIdsByPermissionAndUserId(DbSession dbSession, String permission, long userId) {
+  public List<Long> selectComponentIdsByPermissionAndUserId(DbSession dbSession, String permission, int userId) {
     return mapper(dbSession).selectComponentIdsByPermissionAndUserId(permission, userId);
   }
 
-  public void deleteGroupRolesByGroupId(DbSession session, long groupId) {
+  public void deleteGroupRolesByGroupId(DbSession session, int groupId) {
     mapper(session).deleteGroupRolesByGroupId(groupId);
   }
 
index 7647ce64934dea44019285137882330e6db610ab..6e9e45a4b03d1629919975e06787ed275b7b2a91 100644 (file)
@@ -24,8 +24,8 @@ import org.apache.ibatis.annotations.Param;
 
 public interface RoleMapper {
 
-  List<Long> selectComponentIdsByPermissionAndUserId(@Param("permission") String permission, @Param("userId") long userId);
+  List<Long> selectComponentIdsByPermissionAndUserId(@Param("permission") String permission, @Param("userId") int userId);
 
-  void deleteGroupRolesByGroupId(long groupId);
+  void deleteGroupRolesByGroupId(int groupId);
 
 }
index 0a87ffddae5493c80dfdec5ffb0d6bbd079a68c9..754cb376ef56aeb1372659ceddc1a623fd7a30a8 100644 (file)
@@ -50,13 +50,13 @@ public class UserDao implements Dao {
     this.system2 = system2;
   }
 
-  public UserDto selectUserById(long userId) {
+  public UserDto selectUserById(int userId) {
     try (DbSession session = mybatis.openSession(false)) {
       return selectUserById(session, userId);
     }
   }
 
-  public UserDto selectUserById(DbSession session, long userId) {
+  public UserDto selectUserById(DbSession session, int userId) {
     return mapper(session).selectUser(userId);
   }
 
@@ -66,7 +66,7 @@ public class UserDao implements Dao {
    *
    * Used by the Governance plugin
    */
-  public List<UserDto> selectByIds(DbSession session, Collection<Long> ids) {
+  public List<UserDto> selectByIds(DbSession session, Collection<Integer> ids) {
     return executeLargeInputs(ids, mapper(session)::selectByIds);
   }
 
index 445990edca77fdcf4ad7c640dfa610f40bd8df37..7f41ce65250db45b96b01ef5cfa53b45f9bc2124 100644 (file)
@@ -37,7 +37,7 @@ import static java.util.Objects.requireNonNull;
 public class UserDto {
   public static final char SCM_ACCOUNTS_SEPARATOR = '\n';
 
-  private Long id;
+  private Integer id;
   private String login;
   private String name;
   private String email;
@@ -52,11 +52,11 @@ public class UserDto {
   private boolean local = true;
   private boolean root = false;
 
-  public Long getId() {
+  public Integer getId() {
     return id;
   }
 
-  public UserDto setId(Long id) {
+  public UserDto setId(Integer id) {
     this.id = id;
     return this;
   }
index edea5484b5c14998fc9cc92c9e642606b0155f51..1e53f6a312e7ae50a7dc8353fcb35910a0c7a03b 100644 (file)
@@ -29,11 +29,11 @@ public class UserGroupDao implements Dao {
     return dto;
   }
 
-  public void delete(DbSession session, long groupId, long userId) {
+  public void delete(DbSession session, int groupId, int userId) {
     mapper(session).delete(groupId, userId);
   }
 
-  public void deleteByGroupId(DbSession session, long groupId) {
+  public void deleteByGroupId(DbSession session, int groupId) {
     mapper(session).deleteByGroupId(groupId);
   }
 
index e60ae970db1e9b282052d6823a6ffb7f7ff2240b..8e8443bf8308264a3ebd74ee4eb25628957fb7c0 100644 (file)
@@ -21,23 +21,23 @@ package org.sonar.db.user;
 
 public class UserGroupDto {
 
-  private Long userId;
-  private Long groupId;
+  private int userId;
+  private int groupId;
 
-  public Long getUserId() {
+  public int getUserId() {
     return userId;
   }
 
-  public UserGroupDto setUserId(Long userId) {
+  public UserGroupDto setUserId(int userId) {
     this.userId = userId;
     return this;
   }
 
-  public Long getGroupId() {
+  public int getGroupId() {
     return groupId;
   }
 
-  public UserGroupDto setGroupId(Long groupId) {
+  public UserGroupDto setGroupId(int groupId) {
     this.groupId = groupId;
     return this;
   }
index 7de52e9e736b3efbaf9b21ae801b9af03fe648c4..ce0d053d701ab51abd1e87ee42cb752f5839496a 100644 (file)
@@ -25,7 +25,7 @@ public interface UserGroupMapper {
 
   void insert(UserGroupDto dto);
 
-  void delete(@Param("groupId") long groupId, @Param("userId") long userId);
+  void delete(@Param("groupId") int groupId, @Param("userId") int userId);
 
-  void deleteByGroupId(@Param("groupId") long groupId);
+  void deleteByGroupId(@Param("groupId") int groupId);
 }
index b7cf25be54e7561153a2bdb778e42f91a4f0aa8b..eac60d442eaa32aece4a568b05c3c50916af25b1 100644 (file)
@@ -37,7 +37,7 @@ public interface UserMapper {
   List<UserDto> selectNullableByScmAccountOrLoginOrEmail(@Param("scmAccount") String scmAccountOrLoginOrEmail, @Param("likeScmAccount") String likeScmAccount);
 
   @CheckForNull
-  UserDto selectUser(long userId);
+  UserDto selectUser(int userId);
 
   /**
    * Select user by login. Note that disabled users are ignored.
@@ -49,7 +49,7 @@ public interface UserMapper {
 
   List<UserDto> selectByLogins(List<String> logins);
 
-  List<UserDto> selectByIds(@Param("ids") List<Long> ids);
+  List<UserDto> selectByIds(@Param("ids") List<Integer> ids);
 
   long countByEmail(String email);
 
@@ -64,14 +64,14 @@ public interface UserMapper {
 
   void setRoot(@Param("login") String login, @Param("root") boolean root, @Param("now") long now);
 
-  void removeUserFromGroups(long userId);
+  void removeUserFromGroups(int userId);
 
-  void deleteUserProperties(long userId);
+  void deleteUserProperties(int userId);
 
-  void deleteUserRoles(long userId);
+  void deleteUserRoles(int userId);
 
   void deletePropertiesMatchingLogin(@Param("propertyKeys") List<String> propertyKeys, @Param("login") String login);
 
-  void deactivateUser(@Param("id") long userId, @Param("now") long now);
+  void deactivateUser(@Param("id") int userId, @Param("now") long now);
 
 }
index 750bc2d2d879e03108bf369ec991a23708189373..a8b5dd6be1dbb57467304234d6dec4df95d3a454 100644 (file)
@@ -25,7 +25,7 @@ import javax.annotation.Nullable;
 public class UserMembershipDto {
 
   private Long id;
-  private Long groupId;
+  private Integer groupId;
   private String login;
   private String name;
 
@@ -58,11 +58,11 @@ public class UserMembershipDto {
   }
 
   @CheckForNull
-  public Long getGroupId() {
+  public Integer getGroupId() {
     return groupId;
   }
 
-  public UserMembershipDto setGroupId(@Nullable Long groupId) {
+  public UserMembershipDto setGroupId(@Nullable Integer groupId) {
     this.groupId = groupId;
     return this;
   }
index 3cc3d6691961770465acca96668ebadf38a99654..e93513c5191bb5c988cbb6c204a4aedbdc45cf1a 100644 (file)
@@ -42,7 +42,7 @@ public class UserMembershipQuery {
   public static final String OUT = "OUT";
   public static final Set<String> AVAILABLE_MEMBERSHIPS = ImmutableSet.of(ANY, IN, OUT);
 
-  private final long groupId;
+  private final int groupId;
   private final String membership;
 
   private final String memberSearch;
@@ -67,7 +67,7 @@ public class UserMembershipQuery {
     this.pageIndex = builder.pageIndex;
   }
 
-  public long groupId() {
+  public int groupId() {
     return groupId;
   }
 
@@ -97,7 +97,7 @@ public class UserMembershipQuery {
   }
 
   public static class Builder {
-    private Long groupId;
+    private Integer groupId;
     private String membership;
     private String memberSearch;
 
@@ -107,7 +107,7 @@ public class UserMembershipQuery {
     private Builder() {
     }
 
-    public Builder groupId(Long groupId) {
+    public Builder groupId(Integer groupId) {
       this.groupId = groupId;
       return this;
     }
index b3f13d570d4297bc19d2564c0ef657239c0c1b08..8df1106fb0231d2360a248581f33d0a211ccebd8 100644 (file)
@@ -10,7 +10,7 @@
     where
     gr.organization_uuid=#{organizationUuid,jdbcType=VARCHAR} and
     gr.resource_id is null and
-    gu.user_id=#{userId,jdbcType=BIGINT}
+    gu.user_id=#{userId,jdbcType=INTEGER}
 
     union
 
@@ -27,7 +27,7 @@
     from user_roles ur
     where
     ur.organization_uuid=#{organizationUuid,jdbcType=VARCHAR} and
-    ur.user_id=#{userId,jdbcType=BIGINT}
+    ur.user_id=#{userId,jdbcType=INTEGER}
     and ur.resource_id is null
   </select>
 
@@ -46,7 +46,7 @@
     inner join groups_users gu on gr.group_id=gu.group_id
     where
     gr.resource_id=#{rootComponentId,jdbcType=BIGINT} and
-    gu.user_id=#{userId,jdbcType=BIGINT}
+    gu.user_id=#{userId,jdbcType=INTEGER}
 
     union
     select gr.role
@@ -61,7 +61,7 @@
     from user_roles ur
     where
     ur.resource_id=#{rootComponentId,jdbcType=BIGINT} and
-    ur.user_id=#{userId,jdbcType=BIGINT}
+    ur.user_id=#{userId,jdbcType=INTEGER}
   </select>
 
   <select id="selectRootComponentPermissionsOfAnonymous" parameterType="map" resultType="string">
@@ -83,7 +83,7 @@
       gr.role = #{permission,jdbcType=VARCHAR} and
       gr.resource_id is null and
       gr.group_id is not null and
-      gr.group_id != #{excludedGroupId,jdbcType=BIGINT}
+      gr.group_id != #{excludedGroupId,jdbcType=INTEGER}
 
       union
 
     gr.role = #{permission,jdbcType=VARCHAR} and
     gr.resource_id is null and
     gr.group_id is not null and
-    gu.user_id != #{excludedUserId,jdbcType=BIGINT}
+    gu.user_id != #{excludedUserId,jdbcType=INTEGER}
 
     union
 
     ur.organization_uuid = #{organizationUuid,jdbcType=VARCHAR} and
     ur.resource_id is null and
     ur.role = #{permission,jdbcType=VARCHAR} and
-    ur.user_id != #{excludedUserId,jdbcType=BIGINT}
+    ur.user_id != #{excludedUserId,jdbcType=INTEGER}
     ) remaining
   </select>
 
     gr.role = #{permission,jdbcType=VARCHAR} and
     gr.resource_id is null and
     gr.group_id is not null and
-    (gu.group_id != #{groupId,jdbcType=BIGINT} or gu.user_id != #{userId,jdbcType=BIGINT})
+    (gu.group_id != #{groupId,jdbcType=INTEGER} or gu.user_id != #{userId,jdbcType=INTEGER})
 
     union
 
     ur.organization_uuid = #{organizationUuid,jdbcType=VARCHAR} and
     ur.resource_id is null and
     ur.role = #{permission,jdbcType=VARCHAR} and
-    ur.user_id != #{userId,jdbcType=BIGINT}
+    ur.user_id != #{userId,jdbcType=INTEGER}
     ) remaining
   </select>
 
     gr.role = #{permission,jdbcType=VARCHAR} and
     gr.resource_id is null and
     gr.group_id is not null and
-    gu.user_id = #{userId,jdbcType=BIGINT}
+    gu.user_id = #{userId,jdbcType=INTEGER}
 
     union
 
     where
     ur.resource_id is null and
     ur.role = #{permission,jdbcType=VARCHAR} and
-    ur.user_id = #{userId,jdbcType=BIGINT}
+    ur.user_id = #{userId,jdbcType=INTEGER}
   </select>
 
   <select id="keepAuthorizedProjectIdsForUser" parameterType="map" resultType="long">
     INNER JOIN projects p on p.id = ur.resource_id
     WHERE
     ur.role=#{role,jdbcType=VARCHAR}
-    and ur.user_id=#{userId,jdbcType=BIGINT} and
+    and ur.user_id=#{userId,jdbcType=INTEGER} and
     <foreach collection="componentIds" open="(" close=")" item="element" index="index" separator=" or ">
       p.id=#{element,jdbcType=BIGINT}
     </foreach>
         where
         gr.role=#{role,jdbcType=VARCHAR}
         and (gr.group_id is null or gr.group_id in (select gu.group_id from groups_users gu where
-        gu.user_id=#{userId,jdbcType=BIGINT}))
+        gu.user_id=#{userId,jdbcType=INTEGER}))
         UNION
         SELECT p.uuid as root_project_uuid
         FROM user_roles ur
         INNER JOIN projects p on p.id = ur.resource_id AND p.module_uuid IS NULL
         where
         ur.role=#{role,jdbcType=VARCHAR}
-        and ur.user_id = #{userId,jdbcType=BIGINT}
+        and ur.user_id = #{userId,jdbcType=INTEGER}
       </when>
       <otherwise>
         SELECT p.uuid as root_project_uuid
     </choose>
   </select>
 
-  <select id="keepAuthorizedUsersForRoleAndProject" parameterType="map" resultType="Long">
+  <select id="keepAuthorizedUsersForRoleAndProject" parameterType="map" resultType="int">
     SELECT gu.user_id
     FROM groups_users gu
     INNER JOIN group_roles gr ON gr.group_id=gu.group_id
index 9d011a5d647e6a098cacfd485f1774ff64901469..9d90ac5213f67239dffd3e134d3722dbbf99d1f5 100644 (file)
@@ -98,7 +98,7 @@
     where
       sub.groupId in
       <foreach collection="groupIds" open="(" close=")" item="groupId" separator=",">
-        #{groupId,jdbcType=BIGINT}
+        #{groupId,jdbcType=INTEGER}
       </foreach>
       <if test="projectId != null">
         and sub.componentId=#{projectId,jdbcType=BIGINT}
     gr.resource_id is null and
     <choose>
       <when test="groupId != null">
-        gr.group_id = #{groupId,jdbcType=BIGINT}
+        gr.group_id = #{groupId,jdbcType=INTEGER}
       </when>
       <otherwise>
         gr.group_id is null
     gr.resource_id = #{projectId,jdbcType=BIGINT} and
     <choose>
       <when test="groupId != null">
-        gr.group_id = #{groupId,jdbcType=BIGINT}
+        gr.group_id = #{groupId,jdbcType=INTEGER}
       </when>
       <otherwise>
         gr.group_id is null
     role
     ) values (
     #{organizationUuid,jdbcType=VARCHAR},
-    #{groupId,jdbcType=BIGINT},
+    #{groupId,jdbcType=INTEGER},
     #{resourceId,jdbcType=BIGINT},
     #{role,jdbcType=VARCHAR}
     )
     and
     <choose>
       <when test="groupId != null">
-        group_id=#{groupId,jdbcType=BIGINT}
+        group_id=#{groupId,jdbcType=INTEGER}
       </when>
       <otherwise>
         group_id is null
index 699ed00d86ec718620d9c78457f0e5a96f243dec..18091c27aa01d6913f6d887e5f440952eb3013c8 100644 (file)
@@ -58,7 +58,7 @@
     from user_roles ur
     where
     ur.organization_uuid = #{organizationUuid,jdbcType=VARCHAR} and
-    ur.user_id = #{userId,jdbcType=BIGINT} and
+    ur.user_id = #{userId,jdbcType=INTEGER} and
     ur.resource_id is null
   </select>
 
@@ -66,7 +66,7 @@
     select ur.role
     from user_roles ur
     where
-    ur.user_id = #{userId,jdbcType=BIGINT} and
+    ur.user_id = #{userId,jdbcType=INTEGER} and
     ur.resource_id = #{projectId,jdbcType=BIGINT}
   </select>
 
@@ -88,7 +88,7 @@
     role
     ) values (
     #{organizationUuid,jdbcType=VARCHAR},
-    #{userId,jdbcType=BIGINT},
+    #{userId,jdbcType=INTEGER},
     #{componentId,jdbcType=BIGINT},
     #{permission,jdbcType=VARCHAR}
     )
@@ -98,7 +98,7 @@
     delete from user_roles
     where
     role = #{permission,jdbcType=VARCHAR} and
-    user_id = #{userId,jdbcType=BIGINT} and
+    user_id = #{userId,jdbcType=INTEGER} and
     organization_uuid = #{organizationUuid,jdbcType=VARCHAR} and
     resource_id is null
   </delete>
     delete from user_roles
     where
     role = #{permission,jdbcType=VARCHAR} and
-    user_id = #{userId,jdbcType=BIGINT} and
+    user_id = #{userId,jdbcType=INTEGER} and
     resource_id = #{projectId,jdbcType=BIGINT}
   </delete>
 
index 769a0f539076d35bfa87528aaf67eb279d122c83..9220cd6befdcfb6f0808416343fdbed6659fe29a 100644 (file)
     INSERT INTO perm_templates_groups (template_id, group_id, permission_reference, created_at, updated_at)
     VALUES (
     #{templateId,jdbcType=BIGINT},
-    #{groupId,jdbcType=BIGINT},
+    #{groupId,jdbcType=INTEGER},
     #{permission,jdbcType=VARCHAR},
     #{createdAt,jdbcType=TIMESTAMP},
     #{updatedAt,jdbcType=TIMESTAMP}
     )
   </insert>
 
-  <delete id="deleteByGroupId" parameterType="long">
+  <delete id="deleteByGroupId" parameterType="int">
     delete from perm_templates_groups
-    where group_id = #{groupId,jdbcType=BIGINT}
+    where group_id = #{groupId,jdbcType=INTEGER}
   </delete>
 
   <select id="selectUserLoginsByQueryAndTemplate" parameterType="map" resultType="string">
index 8feebbb8c7c39d2156c4e30ba687b90acc4685d1..8a8a935997575c65dfefcdf98fab6df919aae4f2 100644 (file)
         and p.resource_id=#{query.componentId}
       </if>
       <if test="query.userId() != null">
-        and p.user_id=#{query.userId}
+        and p.user_id=#{query.userId,jdbcType=INTEGER}
       </if>
     </where>
   </select>
     values (
       #{key},
       #{componentId},
-      #{userId},
+      #{userId,jdbcType=INTEGER},
       ${_true},
       #{now}
     )
     values (
       #{key},
       #{componentId},
-      #{userId},
+      #{userId,jdbcType=INTEGER},
       ${_false},
       #{value},
       #{now}
     values (
       #{key},
       #{componentId},
-      #{userId},
+      #{userId,jdbcType=INTEGER},
       ${_false},
       #{value},
       #{now}
     <choose>
       <when test="componentId != null &amp;&amp; userId != null">
         and resource_id=#{componentId}
-        and user_id=#{userId}
+        and user_id=#{userId,jdbcType=INTEGER}
       </when>
       <when test="componentId != null">
         and resource_id=#{componentId}
       </when>
       <when test="userId != null">
         and resource_id is null
-        and user_id=#{userId}
+        and user_id=#{userId,jdbcType=INTEGER}
       </when>
       <otherwise>
         and resource_id is null
         and resource_id=#{query.componentId}
       </if>
       <if test="query.userId() != null">
-        and user_id=#{query.userId}
+        and user_id=#{query.userId,jdbcType=INTEGER}
       </if>
     </where>
   </delete>
index 4f6928e7b28f01e642b3477409d2b01d49304233..89fcbc40313469b969c38ba0ae477acb8326d788 100644 (file)
@@ -20,7 +20,7 @@
     where g.organization_uuid = #{organizationUuid,jdbcType=VARCHAR} and g.name = #{name,jdbcType=VARCHAR}
   </select>
 
-  <select id="selectByIds" parameterType="long" resultType="Group">
+  <select id="selectByIds" parameterType="int" resultType="Group">
     select
     <include refid="groupColumns"/>
     from groups g
@@ -30,7 +30,7 @@
     </foreach>
   </select>
 
-  <select id="selectById" parameterType="long" resultType="Group">
+  <select id="selectById" parameterType="int" resultType="Group">
     SELECT
     <include refid="groupColumns"/>
     FROM groups g
@@ -39,7 +39,7 @@
     </where>
   </select>
 
-  <delete id="deleteById" parameterType="long">
+  <delete id="deleteById" parameterType="int">
     DELETE FROM groups
     <where>
       id=#{id,jdbcType=BIGINT}
     from groups g
     where
       g.organization_uuid = #{organizationUuid,jdbcType=VARCHAR}
-      and g.id = #{groupId,jdbcType=BIGINT}
+      and g.id = #{groupId,jdbcType=INTEGER}
   </select>
 
   <select id="selectByOrganizationUuid" parameterType="map" resultType="Group">
index 12ba914eeedbcd0c6c7cc961e63374b6d0fb2d3e..7eb8c8353469c906cc7571cf59e65ceb938b0bc2 100644 (file)
@@ -32,7 +32,7 @@
     <include refid="commonClauses"/>
   </select>
 
-  <select id="countUsersByGroup" parameterType="long" resultType="org.sonar.db.user.GroupUserCount">
+  <select id="countUsersByGroup" parameterType="int" resultType="org.sonar.db.user.GroupUserCount">
     SELECT g.name as groupName, count(gu.user_id) as userCount
     FROM groups g
     LEFT JOIN groups_users gu ON gu.group_id=g.id
@@ -92,7 +92,7 @@
     <include refid="userCommonClauses"/>
   </select>
 
-  <select id="selectGroupIdsByUserId" parameterType="map" resultType="long">
+  <select id="selectGroupIdsByUserId" parameterType="map" resultType="int">
     select group_id
     from groups_users
     where user_id = #{userId}
index 98d5c9cc52087a83f2f3dc7d2c5a0b301426a041..545d512be750014fb27a5206dcfca9c1b9e8b5cf 100644 (file)
@@ -7,8 +7,8 @@
     select ur.resource_id
     from user_roles ur
     <where>
-      and ur.user_id = #{userId}
-      and ur.role = #{permission}
+      and ur.user_id = #{userId,jdbcType=INTEGER}
+      and ur.role = #{permission,jdbcType=VARCHAR}
       and ur.resource_id IS NOT NULL
     </where>
     UNION
     from group_roles gr
     inner join groups_users gu on gr.group_id=gu.group_id
     <where>
-      and gr.role = #{permission}
+      and gr.role = #{permission,jdbcType=VARCHAR}
       and gr.resource_id is not null
-      and gu.user_id=#{userId}
+      and gu.user_id=#{userId,jdbcType=INTEGER}
     </where>
     ORDER by resource_id
   </select>
 
-  <delete id="deleteGroupRolesByGroupId" parameterType="long">
-    delete from group_roles where group_id=#{id}
+  <delete id="deleteGroupRolesByGroupId" parameterType="int">
+    delete from group_roles where group_id=#{id,jdbcType=INTEGER}
   </delete>
 </mapper>
index c7aaa37af7519a09e2cf3f0068e03380342e36c5..4ff5a60ffa3205b83a024c2b6e06b52ca5b26323 100644 (file)
@@ -8,20 +8,20 @@
     user_id,
     group_id
     ) values (
-    #{userId,jdbcType=BIGINT},
-    #{groupId,jdbcType=BIGINT}
+    #{userId,jdbcType=INTEGER},
+    #{groupId,jdbcType=INTEGER}
     )
   </insert>
 
   <delete id="delete" parameterType="map">
     delete from groups_users
-    where user_id = #{userId,jdbcType=BIGINT} and
-    group_id = #{groupId,jdbcType=BIGINT}
+    where user_id = #{userId,jdbcType=INTEGER} and
+    group_id = #{groupId,jdbcType=INTEGER}
   </delete>
 
-  <delete id="deleteByGroupId" parameterType="long">
+  <delete id="deleteByGroupId" parameterType="int">
     delete from groups_users
-    where group_id = #{groupId,jdbcType=BIGINT}
+    where group_id = #{groupId,jdbcType=INTEGER}
   </delete>
 
 </mapper>
index 17818753a6ab2a690a225bc0c2dac142d355528c..3989967c5fdbfaf55e68e0d2486f9d015d196a48 100644 (file)
@@ -37,7 +37,7 @@
     OR u.scm_accounts like #{likeScmAccount}
   </select>
 
-  <select id="selectUser" parameterType="long" resultType="User">
+  <select id="selectUser" parameterType="int" resultType="User">
     SELECT
     <include refid="userColumns"/>
     FROM users u
       and u.login &lt;&gt; #{login}
   </select>
 
-  <delete id="removeUserFromGroups" parameterType="long">
+  <delete id="removeUserFromGroups" parameterType="int">
     DELETE FROM groups_users WHERE user_id=#{id}
   </delete>
 
-  <delete id="deleteUserRoles" parameterType="long">
-    DELETE FROM user_roles WHERE user_id=#{id}
+  <delete id="deleteUserRoles" parameterType="int">
+    DELETE FROM user_roles WHERE user_id=#{id,jdbcType=INTEGER}
   </delete>
 
-  <delete id="deleteUserProperties" parameterType="long">
-    DELETE FROM properties WHERE user_id=#{id}
+  <delete id="deleteUserProperties" parameterType="int">
+    DELETE FROM properties WHERE user_id=#{id,jdbcType=BIGINT}
   </delete>
 
   <delete id="deletePropertiesMatchingLogin" parameterType="String">
     DELETE FROM properties
     <where>
-      text_value LIKE #{login}
+      text_value LIKE #{login,jdbcType=VARCHAR}
       AND prop_key IN
       <foreach item="property" index="index" collection="propertyKeys" open="(" separator="," close=")">
-        #{property}
+        #{property,jdbcType=VARCHAR}
       </foreach>
     </where>
   </delete>
 
-  <update id="deactivateUser" parameterType="long">
+  <update id="deactivateUser" parameterType="map">
     UPDATE users SET
       active=${_false},
       email=null,
       crypted_password=null,
       updated_at=#{now,jdbcType=BIGINT}
     WHERE
-      id=#{id}
+      id=#{id,jdbcType=INTEGER}
   </update>
 
   <update id="setRoot">
       crypted_password=#{cryptedPassword,jdbcType=BIGINT},
       updated_at=#{updatedAt,jdbcType=BIGINT}
     WHERE
-      login = #{login}
+      login = #{login,jdbcType=VARCHAR}
   </insert>
 
 </mapper>
index a02dd3058b9ff2f1e56eb9c0b28f80a0e8f5d900..20c59786b65a0d60efc251dc8203e5088662fa6a 100644 (file)
@@ -38,7 +38,7 @@ public class FavoriteDbTester {
     this.dbSession = db.getSession();
   }
 
-  public void add(ComponentDto componentDto, long userId) {
+  public void add(ComponentDto componentDto, int userId) {
     dbClient.propertiesDao().saveProperty(dbSession, new PropertyDto()
       .setKey(PROP_FAVORITE_KEY)
       .setUserId(userId)
@@ -46,7 +46,7 @@ public class FavoriteDbTester {
     dbSession.commit();
   }
 
-  public boolean hasFavorite(ComponentDto componentDto, long userId) {
+  public boolean hasFavorite(ComponentDto componentDto, int userId) {
     List<PropertyDto> result = dbClient.propertiesDao().selectByQuery(PropertyQuery.builder()
       .setKey(PROP_FAVORITE_KEY)
       .setComponentId(componentDto.getId())
index f897d783bf48bb9ba4edda2d3bf5e9a8e2cebbe3..2df3453d9b8142492ad8c9b47d4d28c3507bb3bd 100644 (file)
@@ -44,7 +44,7 @@ public class NotificationDbTester {
     this.dbSession = db.getSession();
   }
 
-  public void assertExists(String channel, String dispatcher, long userId, @Nullable ComponentDto component) {
+  public void assertExists(String channel, String dispatcher, int userId, @Nullable ComponentDto component) {
     List<PropertyDto> result = dbClient.propertiesDao().selectByQuery(PropertyQuery.builder()
       .setKey(String.join(".", PROP_NOTIFICATION_PREFIX, dispatcher, channel))
       .setComponentId(component == null ? null : component.getId())
@@ -56,7 +56,7 @@ public class NotificationDbTester {
     assertThat(result.get(0).getValue()).isEqualTo("true");
   }
 
-  public void assertDoesNotExist(String channel, String dispatcher, long userId, @Nullable ComponentDto component) {
+  public void assertDoesNotExist(String channel, String dispatcher, int userId, @Nullable ComponentDto component) {
     List<PropertyDto> result = dbClient.propertiesDao().selectByQuery(PropertyQuery.builder()
       .setKey(String.join(".", PROP_NOTIFICATION_PREFIX, dispatcher, channel))
       .setComponentId(component == null ? null : component.getId())
index 8a03cb98ad5eb440ae43a85e8bf9313d5d755c29..49195fba4c252b58ebe6203ef75ce36af2916efd 100644 (file)
@@ -66,7 +66,7 @@ public class OrganizationDaoTest {
     .setUrl("the url 1")
     .setAvatarUrl("the avatar url 1")
     .setGuarded(false)
-    .setUserId(1_000L);
+    .setUserId(1_000);
   private static final OrganizationDto ORGANIZATION_DTO_2 = new OrganizationDto()
     .setUuid("uuid 2")
     .setKey("the_key 2")
@@ -75,7 +75,7 @@ public class OrganizationDaoTest {
     .setUrl("the url 2")
     .setAvatarUrl("the avatar url 2")
     .setGuarded(true)
-    .setUserId(2_000L);
+    .setUserId(2_000);
   private static final String PERMISSION_1 = "foo";
   private static final String PERMISSION_2 = "bar";
 
index 3886c179831ca52b5c20ba4d723f35c203a9a8b9..07fbd3988ddc78428431442d7ce38c4dad284346 100644 (file)
@@ -45,7 +45,7 @@ public class AuthorizationDaoTest {
   private static final int USER = 100;
   private static final Long PROJECT_ID = 300L;
   private static final Long PROJECT_ID_WITHOUT_SNAPSHOT = 400L;
-  private static final long MISSING_ID = -1L;
+  private static final int MISSING_ID = -1;
   private static final String A_PERMISSION = "a-permission";
   private static final String DOES_NOT_EXIST = "does-not-exist";
 
@@ -330,14 +330,14 @@ public class AuthorizationDaoTest {
 
     assertThat(underTest.keepAuthorizedUsersForRoleAndProject(dbSession,
       // Only 100 and 101 has 'user' role on project
-      newHashSet(100L, 101L, 102L), "user", PROJECT_ID)).containsOnly(100L, 101L);
+      newHashSet(100, 101, 102), "user", PROJECT_ID)).containsOnly(100, 101);
 
     assertThat(underTest.keepAuthorizedUsersForRoleAndProject(dbSession,
       // Only 100 and 101 has 'user' role on project
-      newHashSet(100L), "user", PROJECT_ID)).containsOnly(100L);
+      newHashSet(100), "user", PROJECT_ID)).containsOnly(100);
 
     // user does not have the role "admin"
-    assertThat(underTest.keepAuthorizedUsersForRoleAndProject(dbSession, newHashSet(100L), "admin", PROJECT_ID)).isEmpty();
+    assertThat(underTest.keepAuthorizedUsersForRoleAndProject(dbSession, newHashSet(100), "admin", PROJECT_ID)).isEmpty();
 
     // Empty list
     assertThat(underTest.keepAuthorizedUsersForRoleAndProject(dbSession, Collections.emptySet(), "user", PROJECT_ID)).isEmpty();
@@ -349,13 +349,13 @@ public class AuthorizationDaoTest {
 
     assertThat(underTest.keepAuthorizedUsersForRoleAndProject(dbSession,
       // Only 100 and 101 has 'user' role on project
-      newHashSet(100L, 101L, 102L), "user", PROJECT_ID)).containsOnly(100L, 101L);
+      newHashSet(100, 101, 102), "user", PROJECT_ID)).containsOnly(100, 101);
 
     assertThat(underTest.keepAuthorizedUsersForRoleAndProject(dbSession,
-      newHashSet(100L), "user", PROJECT_ID)).containsOnly(100L);
+      newHashSet(100), "user", PROJECT_ID)).containsOnly(100);
 
     // user does not have the role "admin"
-    assertThat(underTest.keepAuthorizedUsersForRoleAndProject(dbSession, newHashSet(100L), "admin", PROJECT_ID)).isEmpty();
+    assertThat(underTest.keepAuthorizedUsersForRoleAndProject(dbSession, newHashSet(100), "admin", PROJECT_ID)).isEmpty();
 
     // Empty list
     assertThat(underTest.keepAuthorizedUsersForRoleAndProject(dbSession, Collections.emptySet(), "user", PROJECT_ID)).isEmpty();
@@ -367,7 +367,7 @@ public class AuthorizationDaoTest {
 
     assertThat(underTest.keepAuthorizedUsersForRoleAndProject(dbSession,
       // Only 100 and 101 has 'user' role on project
-      newHashSet(100L, 101L, 102L), "user", PROJECT_ID)).isEmpty();
+      newHashSet(100, 101, 102), "user", PROJECT_ID)).isEmpty();
   }
 
   @Test
index d412c1f594d9ec52abf712b5484801751fb4e336..bb609fa0092cbbe1d0b6da6c6da27fe6907ae10f 100644 (file)
@@ -49,8 +49,8 @@ import static org.sonar.db.component.ComponentTesting.newProjectDto;
 
 public class GroupPermissionDaoTest {
 
-  private static final long ANYONE_ID = 0L;
-  private static final long MISSING_ID = -1L;
+  private static final int ANYONE_ID = 0;
+  private static final int MISSING_ID = -1;
 
   @Rule
   public DbTester db = DbTester.create(System2.INSTANCE);
@@ -202,8 +202,8 @@ public class GroupPermissionDaoTest {
 
     assertThat(underTest.selectGroupNamesByQuery(dbSession,
       defaultOrganizationUuid, PermissionQuery.builder().build()))
-      .doesNotContain(ANYONE)
-      .containsExactly(group.getName());
+        .doesNotContain(ANYONE)
+        .containsExactly(group.getName());
   }
 
   @Test
@@ -237,8 +237,8 @@ public class GroupPermissionDaoTest {
     assertThat(underTest.selectByGroupIds(dbSession, organizationDto.getUuid(), asList(ANYONE_ID), null))
       .extracting(GroupPermissionDto::getGroupId, GroupPermissionDto::getRole, GroupPermissionDto::getResourceId)
       .containsOnly(
-        tuple(0L, SCAN_EXECUTION, null),
-        tuple(0L, PROVISIONING, null));
+        tuple(0, SCAN_EXECUTION, null),
+        tuple(0, PROVISIONING, null));
 
     assertThat(underTest.selectByGroupIds(dbSession, organizationDto.getUuid(), asList(group1.getId(), group2.getId(), ANYONE_ID), null)).hasSize(3);
     assertThat(underTest.selectByGroupIds(dbSession, organizationDto.getUuid(), asList(MISSING_ID), null)).isEmpty();
@@ -274,7 +274,7 @@ public class GroupPermissionDaoTest {
 
     assertThat(underTest.selectByGroupIds(dbSession, org.getUuid(), singletonList(ANYONE_ID), project.getId()))
       .extracting(GroupPermissionDto::getGroupId, GroupPermissionDto::getRole, GroupPermissionDto::getResourceId)
-      .containsOnly(tuple(0L, PROVISIONING, project.getId()));
+      .containsOnly(tuple(0, PROVISIONING, project.getId()));
 
     assertThat(underTest.selectByGroupIds(dbSession, org.getUuid(), asList(group1.getId(), group2.getId(), ANYONE_ID), project.getId())).hasSize(2);
     assertThat(underTest.selectByGroupIds(dbSession, org.getUuid(), singletonList(MISSING_ID), project.getId())).isEmpty();
@@ -464,7 +464,7 @@ public class GroupPermissionDaoTest {
       .containsOnly(organizationUuids);
   }
 
-  private Long insertGroupWithPermissions(OrganizationDto organization1) {
+  private int insertGroupWithPermissions(OrganizationDto organization1) {
     GroupDto group = db.users().insertGroup(organization1);
     db.users().insertPermissionOnGroup(group, "foo");
     db.users().insertPermissionOnGroup(group, "bar");
index a86bcbffd6ba2ae0e594d17f900d64403518d363..3c821f3c8d76b657c473f165eb0e358fc145eb90 100644 (file)
@@ -191,7 +191,7 @@ public class GroupWithPermissionTemplateDaoTest {
     assertThat(underTest.selectGroupPermissionsByTemplateIdAndGroupNames(session, anotherTemplate.getId(), asList("Anyone")))
       .extracting(PermissionTemplateGroupDto::getGroupId, PermissionTemplateGroupDto::getGroupName, PermissionTemplateGroupDto::getPermission)
       .containsOnly(
-        tuple(0L, "Anyone", USER));
+        tuple(0, "Anyone", USER));
 
     assertThat(underTest.selectGroupPermissionsByTemplateIdAndGroupNames(session, template.getId(), asList("Group-1", "Group-2", "Anyone"))).hasSize(3);
     assertThat(underTest.selectGroupPermissionsByTemplateIdAndGroupNames(session, template.getId(), asList("Unknown"))).isEmpty();
@@ -223,7 +223,7 @@ public class GroupWithPermissionTemplateDaoTest {
       .extracting(PermissionTemplateGroupDto::getGroupId, PermissionTemplateGroupDto::getGroupName, PermissionTemplateGroupDto::getPermission)
       .containsOnly(
         tuple(group1.getId(), "Group-1", PROVISIONING),
-        tuple(0L, "Anyone", USER));
+        tuple(0, "Anyone", USER));
 
     assertThat(underTest.selectGroupPermissionsByTemplateId(session, 321L)).isEmpty();
   }
index e1eafd638f332bc57e286d060259ca8c86fe88ec..b656c8371c2fabc6a62303afcc79606f31b9a5ce 100644 (file)
@@ -149,7 +149,7 @@ public class PermissionTemplateDaoTest {
   public void should_add_user_permission_to_template() {
     db.prepareDbUnit(getClass(), "addUserPermissionToTemplate.xml");
 
-    underTest.insertUserPermission(dbSession, 1L, 1L, "new_permission");
+    underTest.insertUserPermission(dbSession, 1L, 1, "new_permission");
 
     checkTemplateTables("addUserPermissionToTemplate-result.xml");
   }
@@ -158,7 +158,7 @@ public class PermissionTemplateDaoTest {
   public void should_remove_user_permission_from_template() {
     db.prepareDbUnit(getClass(), "removeUserPermissionFromTemplate.xml");
 
-    underTest.deleteUserPermission(dbSession, 1L, 2L, "permission_to_remove");
+    underTest.deleteUserPermission(dbSession, 1L, 2, "permission_to_remove");
 
     checkTemplateTables("removeUserPermissionFromTemplate-result.xml");
   }
@@ -167,7 +167,7 @@ public class PermissionTemplateDaoTest {
   public void should_add_group_permission_to_template() {
     db.prepareDbUnit(getClass(), "addGroupPermissionToTemplate.xml");
 
-    underTest.insertGroupPermission(dbSession, 1L, 1L, "new_permission");
+    underTest.insertGroupPermission(dbSession, 1L, 1, "new_permission");
     dbSession.commit();
 
     checkTemplateTables("addGroupPermissionToTemplate-result.xml");
@@ -177,7 +177,7 @@ public class PermissionTemplateDaoTest {
   public void remove_by_group() {
     db.prepareDbUnit(getClass(), "remove_by_group.xml");
 
-    underTest.deleteByGroup(db.getSession(), 2L);
+    underTest.deleteByGroup(db.getSession(), 2);
     db.getSession().commit();
 
     db.assertDbUnitTable(getClass(), "remove_by_group-result.xml", "permission_templates", "id", "name", "kee", "description");
index 8ed57a2bfbaf3aa987645dbef50a9ddfea669e7c..aa4f22b07b6274a1d746cb3fd384e69304b43c2a 100644 (file)
@@ -60,7 +60,7 @@ public class PermissionTemplateDbTester {
     addGroupToTemplate(permissionTemplate.getId(), group.getId(), permission);
   }
 
-  public void addGroupToTemplate(long templateId, @Nullable Long groupId, String permission) {
+  public void addGroupToTemplate(long templateId, @Nullable Integer groupId, String permission) {
     dbClient.permissionTemplateDao().insertGroupPermission(dbSession, templateId, groupId, permission);
     db.commit();
   }
@@ -73,7 +73,7 @@ public class PermissionTemplateDbTester {
     addUserToTemplate(permissionTemplate.getId(), user.getId(), permission);
   }
 
-  public void addUserToTemplate(long templateId, long userId, String permission) {
+  public void addUserToTemplate(long templateId, int userId, String permission) {
     dbClient.permissionTemplateDao().insertUserPermission(dbSession, templateId, userId, permission);
     db.commit();
   }
index 570c7d9636411239aed1d089bbd0df389123a540..00c8552b3816bd28e7888b64463866fd74345867 100644 (file)
@@ -80,9 +80,9 @@ public class PropertiesDaoTest {
   public void shouldFindUsersForNotification() throws SQLException {
     ComponentDto project1 = insertProject("uuid_45");
     ComponentDto project2 = insertProject("uuid_56");
-    long userId1 = insertUser("user1");
-    long userId2 = insertUser("user2");
-    long userId3 = insertUser("user3");
+    int userId1 = insertUser("user1");
+    int userId2 = insertUser("user2");
+    int userId3 = insertUser("user3");
     insertProperty("notification.NewViolations.Email", "true", project1.getId(), userId2);
     insertProperty("notification.NewViolations.Twitter", "true", null, userId3);
     insertProperty("notification.NewViolations.Twitter", "true", project2.getId(), userId1);
@@ -111,8 +111,8 @@ public class PropertiesDaoTest {
 
   @Test
   public void findNotificationSubscribers() throws SQLException {
-    long userId1 = insertUser("user1");
-    long userId2 = insertUser("user2");
+    int userId1 = insertUser("user1");
+    int userId2 = insertUser("user2");
     ComponentDto projectDto = insertProject("PROJECT_A");
     long projectId = projectDto.getId();
     String projectKey = projectDto.key();
@@ -148,8 +148,8 @@ public class PropertiesDaoTest {
 
   @Test
   public void hasNotificationSubscribers() throws SQLException {
-    long userId1 = insertUser("user1");
-    long userId2 = insertUser("user2");
+    int userId1 = insertUser("user1");
+    int userId2 = insertUser("user2");
     Long projectId = insertProject("PROJECT_A").getId();
     // global subscription
     insertProperty("notification.DispatcherWithGlobalSubscribers.Email", "true", null, userId2);
@@ -227,7 +227,7 @@ public class PropertiesDaoTest {
     // project
     insertProperty("project.one", "one", 10L, null);
     // user
-    insertProperty("user.one", "one", null, 100L);
+    insertProperty("user.one", "one", null, 100);
 
     assertThatDto(underTest.selectGlobalProperty("global.one"))
       .hasNoResourceId()
@@ -361,8 +361,8 @@ public class PropertiesDaoTest {
     // commons
     insertProperty("commonslang.one", "one", 11L, null);
     // user
-    insertProperty("user.one", "one", null, 100L);
-    insertProperty("user.two", "two", 10L, 100L);
+    insertProperty("user.one", "one", null, 100);
+    insertProperty("user.two", "two", 10L, 100);
     // other
     insertProperty("other.one", "one", 12L, null);
 
@@ -378,7 +378,7 @@ public class PropertiesDaoTest {
   @Test
   public void select_global_properties_by_keys() throws Exception {
     insertProject("A");
-    long userId = insertUser("B");
+    int userId = insertUser("B");
 
     String key = "key";
     String anotherKey = "anotherKey";
@@ -563,7 +563,7 @@ public class PropertiesDaoTest {
   public void saveProperty_inserts_user_properties_when_they_do_not_exist_in_db() {
     when(system2.now()).thenReturn(DATE_1, DATE_2, DATE_3, DATE_4, DATE_5);
 
-    long userId = 100;
+    int userId = 100;
     underTest.saveProperty(new PropertyDto().setKey("user.null").setUserId(userId).setValue(null));
     underTest.saveProperty(new PropertyDto().setKey("user.empty").setUserId(userId).setValue(""));
     underTest.saveProperty(new PropertyDto().setKey("user.text").setUserId(userId).setValue("some text"));
@@ -649,7 +649,7 @@ public class PropertiesDaoTest {
   @Test
   @UseDataProvider("valueUpdatesDataProvider")
   public void saveProperty_deletes_then_inserts_user_properties_when_they_exist_in_db(@Nullable String oldValue, @Nullable String newValue) throws SQLException {
-    long userId = 90L;
+    int userId = 90;
     long id = insertProperty("global", oldValue, null, userId, DATE_1);
     when(system2.now()).thenReturn(DATE_4);
 
@@ -714,8 +714,8 @@ public class PropertiesDaoTest {
     long id2 = insertProperty("global.two", "two", null, null);
     long id3 = insertProperty("struts.one", "one", projectId1, null);
     long id4 = insertProperty("commonslang.one", "one", projectId2, null);
-    long id5 = insertProperty("user.one", "one", null, 100L);
-    long id6 = insertProperty("user.two", "two", null, 100L);
+    long id5 = insertProperty("user.one", "one", null, 100);
+    long id6 = insertProperty("user.two", "two", null, 100);
     long id7 = insertProperty("other.one", "one", projectId3, null);
 
     underTest.deleteProjectProperty("struts.one", projectId1);
@@ -801,7 +801,7 @@ public class PropertiesDaoTest {
     // project - do not delete this project property that has the same key
     long id3 = insertProperty("to_be_deleted", "new_project", 10L, null);
     // user
-    long id4 = insertProperty("user.key", "new_user", null, 100L);
+    long id4 = insertProperty("user.key", "new_user", null, 100);
 
     underTest.deleteGlobalProperty("to_be_deleted");
 
@@ -898,8 +898,8 @@ public class PropertiesDaoTest {
     long id2 = insertProperty("old_name", "doc1", null, null, DATE_1);
     long id3 = insertProperty("old_name", "doc2", 15L, null, DATE_1);
     long id4 = insertProperty("old_name", "doc3", 16L, null, DATE_1);
-    long id5 = insertProperty("old_name", "doc4", null, 100L, DATE_1);
-    long id6 = insertProperty("old_name", "doc5", null, 101L, DATE_1);
+    long id5 = insertProperty("old_name", "doc4", null, 100, DATE_1);
+    long id6 = insertProperty("old_name", "doc5", null, 101, DATE_1);
 
     underTest.renamePropertyKey("old_name", "new_name");
 
@@ -987,12 +987,12 @@ public class PropertiesDaoTest {
     session.commit();
   }
 
-  private long insertProperty(String key, @Nullable String value, @Nullable Long resourceId, @Nullable Long userId, long createdAt) throws SQLException {
+  private long insertProperty(String key, @Nullable String value, @Nullable Long resourceId, @Nullable Integer userId, long createdAt) throws SQLException {
     when(system2.now()).thenReturn(createdAt);
     return insertProperty(key, value, resourceId, userId);
   }
 
-  private long insertProperty(String key, @Nullable String value, @Nullable Long resourceId, @Nullable Long userId) throws SQLException {
+  private long insertProperty(String key, @Nullable String value, @Nullable Long resourceId, @Nullable Integer userId) throws SQLException {
     DbSession session = dbTester.getSession();
     PropertyDto dto = new PropertyDto().setKey(key)
       .setResourceId(resourceId == null ? null : resourceId.longValue())
@@ -1015,7 +1015,7 @@ public class PropertiesDaoTest {
     return project;
   }
 
-  private long insertUser(String login) {
+  private int insertUser(String login) {
     UserDto dto = new UserDto().setLogin(login);
     DbSession session = dbTester.getSession();
     dbClient.userDao().insert(session, dto);
index a729cf890b672e77c230a5af902db545ca5619ec..51ee161eddc2bbc61135a8e85fc966e593b076f5 100644 (file)
@@ -24,14 +24,14 @@ import javax.annotation.Nullable;
 
 final class PropertiesRow {
   private final String key;
-  private final Long userId;
+  private final Integer userId;
   private final Long resourceId;
   private final Boolean empty;
   private final String textValue;
   private final String clobValue;
   private final Long createdAt;
 
-  public PropertiesRow(String key, @Nullable Long userId, @Nullable Long resourceId,
+  public PropertiesRow(String key, @Nullable Integer userId, @Nullable Long resourceId,
     @Nullable Boolean empty, @Nullable String textValue, @Nullable String clobValue,
     @Nullable Long createdAt) {
     this.key = key;
@@ -47,7 +47,7 @@ final class PropertiesRow {
     return key;
   }
 
-  public Long getUserId() {
+  public Integer getUserId() {
     return userId;
   }
 
index 81febdd8a5caf245644a49151ec54c33af284e3f..048d6d522521266a9fc4900d75619a8d3caf9856 100644 (file)
@@ -67,9 +67,10 @@ final class PropertiesRowAssert extends AbstractAssert<PropertiesRowAssert, Prop
       return null;
     } else {
       Map<String, Object> row = rows.iterator().next();
+      Long userId = (Long) row.get("userId");
       return new PropertiesRow(
         (String) row.get("key"),
-        (Long) row.get("userId"),
+        userId == null ? null : userId.intValue(),
         (Long) row.get("resourceId"),
         toBoolean(row.get("isEmpty")),
         (String) row.get("textValue"),
@@ -113,7 +114,7 @@ final class PropertiesRowAssert extends AbstractAssert<PropertiesRowAssert, Prop
     return this;
   }
 
-  public PropertiesRowAssert hasUserId(long expected) {
+  public PropertiesRowAssert hasUserId(int expected) {
     isNotNull();
 
     if (!Objects.equals(actual.getUserId(), expected)) {
index 2fd28cc116f92abe2333b20db7f092ea616df82d..892f1a7b5bc53a7b0e641ac6ba2510415f43caec 100644 (file)
@@ -49,7 +49,7 @@ public class PropertyDtoTest {
 
   @Test
   public void testToString() {
-    assertThat(new PropertyDto().setKey("foo:bar").setValue("value").setResourceId(123L).setUserId(456L).toString()).isEqualTo("PropertyDto{foo:bar, value, 123, 456}");
+    assertThat(new PropertyDto().setKey("foo:bar").setValue("value").setResourceId(123L).setUserId(456).toString()).isEqualTo("PropertyDto{foo:bar, value, 123, 456}");
   }
 
   @Test
index ca641b39463a96fd092f09785214280e311557a9..869ef70dc13ca58c33e3f97ea0fdb47abad0cc1d 100644 (file)
@@ -40,7 +40,7 @@ import static org.sonar.db.user.GroupTesting.newGroupDto;
 public class GroupDaoTest {
 
   private static final long NOW = 1_500_000L;
-  private static final long MISSING_ID = -1L;
+  private static final int MISSING_ID = -1;
   private static final OrganizationDto AN_ORGANIZATION = new OrganizationDto()
     .setKey("an-org")
     .setName("An Org")
index eba5aa986f0269f6511c5d71cca435b39cd44637..b9f89695ffb6266420f529d68ec393a101037e06 100644 (file)
@@ -42,23 +42,23 @@ public class GroupMembershipDaoTest {
     dbTester.prepareDbUnit(getClass(), "shared.xml");
 
     // 200 is member of 3 groups
-    assertThat(underTest.countGroups(dbTester.getSession(), GroupMembershipQuery.builder().login("arthur").membership(GroupMembershipQuery.IN).build(), 200L)).isEqualTo(3);
-    assertThat(underTest.countGroups(dbTester.getSession(), GroupMembershipQuery.builder().login("arthur").membership(GroupMembershipQuery.OUT).build(), 200L)).isZero();
+    assertThat(underTest.countGroups(dbTester.getSession(), GroupMembershipQuery.builder().login("arthur").membership(GroupMembershipQuery.IN).build(), 200)).isEqualTo(3);
+    assertThat(underTest.countGroups(dbTester.getSession(), GroupMembershipQuery.builder().login("arthur").membership(GroupMembershipQuery.OUT).build(), 200)).isZero();
     // 201 is member of 1 group on 3
-    assertThat(underTest.countGroups(dbTester.getSession(), GroupMembershipQuery.builder().login("arthur").membership(GroupMembershipQuery.IN).build(), 201L)).isEqualTo(1);
-    assertThat(underTest.countGroups(dbTester.getSession(), GroupMembershipQuery.builder().login("arthur").membership(GroupMembershipQuery.OUT).build(), 201L)).isEqualTo(2);
+    assertThat(underTest.countGroups(dbTester.getSession(), GroupMembershipQuery.builder().login("arthur").membership(GroupMembershipQuery.IN).build(), 201)).isEqualTo(1);
+    assertThat(underTest.countGroups(dbTester.getSession(), GroupMembershipQuery.builder().login("arthur").membership(GroupMembershipQuery.OUT).build(), 201)).isEqualTo(2);
     // 999 is member of 0 group
-    assertThat(underTest.countGroups(dbTester.getSession(), GroupMembershipQuery.builder().login("arthur").membership(GroupMembershipQuery.IN).build(), 999L)).isZero();
-    assertThat(underTest.countGroups(dbTester.getSession(), GroupMembershipQuery.builder().login("arthur").membership(GroupMembershipQuery.OUT).build(), 2999L)).isEqualTo(3);
+    assertThat(underTest.countGroups(dbTester.getSession(), GroupMembershipQuery.builder().login("arthur").membership(GroupMembershipQuery.IN).build(), 999)).isZero();
+    assertThat(underTest.countGroups(dbTester.getSession(), GroupMembershipQuery.builder().login("arthur").membership(GroupMembershipQuery.OUT).build(), 2999)).isEqualTo(3);
   }
 
   @Test
   public void count_users_by_group() {
     dbTester.prepareDbUnit(getClass(), "shared_plus_empty_group.xml");
 
-    assertThat(underTest.countUsersByGroups(dbTester.getSession(), Arrays.asList(100L, 101L, 102L, 103L))).containsOnly(
+    assertThat(underTest.countUsersByGroups(dbTester.getSession(), Arrays.asList(100, 101, 102, 103))).containsOnly(
       entry("sonar-users", 2), entry("sonar-reviewers", 1), entry("sonar-administrators", 1), entry("sonar-nobody", 0));
-    assertThat(underTest.countUsersByGroups(dbTester.getSession(), Arrays.asList(100L, 103L))).containsOnly(
+    assertThat(underTest.countUsersByGroups(dbTester.getSession(), Arrays.asList(100, 103))).containsOnly(
       entry("sonar-administrators", 1), entry("sonar-nobody", 0));
   }
 
@@ -78,17 +78,17 @@ public class GroupMembershipDaoTest {
     dbTester.prepareDbUnit(getClass(), "shared_plus_empty_group.xml");
 
     // 100 has 1 member and 1 non member
-    assertThat(underTest.countMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100L).membership(UserMembershipQuery.IN).build())).isEqualTo(1);
-    assertThat(underTest.countMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100L).membership(UserMembershipQuery.OUT).build())).isEqualTo(1);
+    assertThat(underTest.countMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100).membership(UserMembershipQuery.IN).build())).isEqualTo(1);
+    assertThat(underTest.countMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100).membership(UserMembershipQuery.OUT).build())).isEqualTo(1);
     // 101 has 2 members
-    assertThat(underTest.countMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(101L).membership(UserMembershipQuery.IN).build())).isEqualTo(2);
-    assertThat(underTest.countMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(101L).membership(UserMembershipQuery.OUT).build())).isZero();
+    assertThat(underTest.countMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(101).membership(UserMembershipQuery.IN).build())).isEqualTo(2);
+    assertThat(underTest.countMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(101).membership(UserMembershipQuery.OUT).build())).isZero();
     // 102 has 1 member and 1 non member
-    assertThat(underTest.countMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(102L).membership(UserMembershipQuery.IN).build())).isEqualTo(1);
-    assertThat(underTest.countMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(102L).membership(UserMembershipQuery.OUT).build())).isEqualTo(1);
+    assertThat(underTest.countMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(102).membership(UserMembershipQuery.IN).build())).isEqualTo(1);
+    assertThat(underTest.countMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(102).membership(UserMembershipQuery.OUT).build())).isEqualTo(1);
     // 103 has no member
-    assertThat(underTest.countMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(103L).membership(UserMembershipQuery.IN).build())).isZero();
-    assertThat(underTest.countMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(103L).membership(UserMembershipQuery.OUT).build())).isEqualTo(2);
+    assertThat(underTest.countMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(103).membership(UserMembershipQuery.IN).build())).isZero();
+    assertThat(underTest.countMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(103).membership(UserMembershipQuery.OUT).build())).isEqualTo(2);
   }
 
   @Test
@@ -96,13 +96,13 @@ public class GroupMembershipDaoTest {
     dbTester.prepareDbUnit(getClass(), "shared_plus_empty_group.xml");
 
     // 100 has 1 member
-    assertThat(underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100L).membership(UserMembershipQuery.IN).build(), 0, 10)).hasSize(1);
+    assertThat(underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100).membership(UserMembershipQuery.IN).build(), 0, 10)).hasSize(1);
     // 101 has 2 members
-    assertThat(underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(101L).membership(UserMembershipQuery.IN).build(), 0, 10)).hasSize(2);
+    assertThat(underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(101).membership(UserMembershipQuery.IN).build(), 0, 10)).hasSize(2);
     // 102 has 1 member
-    assertThat(underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(102L).membership(UserMembershipQuery.IN).build(), 0, 10)).hasSize(1);
+    assertThat(underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(102).membership(UserMembershipQuery.IN).build(), 0, 10)).hasSize(1);
     // 103 has no member
-    assertThat(underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(103L).membership(UserMembershipQuery.IN).build(), 0, 10)).isEmpty();
+    assertThat(underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(103).membership(UserMembershipQuery.IN).build(), 0, 10)).isEmpty();
   }
 
   @Test
@@ -110,26 +110,26 @@ public class GroupMembershipDaoTest {
     dbTester.prepareDbUnit(getClass(), "shared_plus_empty_group.xml");
 
     // 100 has 1 member
-    assertThat(underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100L).membership(UserMembershipQuery.OUT).build(), 0, 10)).hasSize(1);
+    assertThat(underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100).membership(UserMembershipQuery.OUT).build(), 0, 10)).hasSize(1);
     // 101 has 2 members
-    assertThat(underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(101L).membership(UserMembershipQuery.OUT).build(), 0, 10)).isEmpty();
+    assertThat(underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(101).membership(UserMembershipQuery.OUT).build(), 0, 10)).isEmpty();
     // 102 has 1 member
-    assertThat(underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(102L).membership(UserMembershipQuery.OUT).build(), 0, 10)).hasSize(1);
+    assertThat(underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(102).membership(UserMembershipQuery.OUT).build(), 0, 10)).hasSize(1);
     // 103 has no member
-    assertThat(underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(103L).membership(UserMembershipQuery.OUT).build(), 0, 10)).hasSize(2);
+    assertThat(underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(103).membership(UserMembershipQuery.OUT).build(), 0, 10)).hasSize(2);
   }
 
   @Test
   public void search_by_user_name_or_login() {
     dbTester.prepareDbUnit(getClass(), "shared_plus_empty_group.xml");
 
-    List<UserMembershipDto> result = underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100L).memberSearch("admin").build(), 0, 10);
+    List<UserMembershipDto> result = underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100).memberSearch("admin").build(), 0, 10);
     assertThat(result).hasSize(2);
 
     assertThat(result.get(0).getName()).isEqualTo("Admin name");
     assertThat(result.get(1).getName()).isEqualTo("Not Admin");
 
-    result = underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100L).memberSearch("not").build(), 0, 10);
+    result = underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100).memberSearch("not").build(), 0, 10);
     assertThat(result).hasSize(1);
   }
 
@@ -138,13 +138,13 @@ public class GroupMembershipDaoTest {
     dbTester.prepareDbUnit(getClass(), "shared_plus_empty_group.xml");
 
     // search is case insensitive only on name
-    List<UserMembershipDto> result = underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100L).memberSearch("NaMe").build(), 0, 10);
+    List<UserMembershipDto> result = underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100).memberSearch("NaMe").build(), 0, 10);
     assertThat(result).hasSize(1);
 
-    result = underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100L).memberSearch("login").build(), 0, 10);
+    result = underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100).memberSearch("login").build(), 0, 10);
     assertThat(result).hasSize(1);
 
-    result = underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100L).memberSearch("email").build(), 0, 10);
+    result = underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100).memberSearch("email").build(), 0, 10);
     assertThat(result).hasSize(1);
   }
 
@@ -152,7 +152,7 @@ public class GroupMembershipDaoTest {
   public void should_be_sorted_by_user_name() {
     dbTester.prepareDbUnit(getClass(), "shared_plus_empty_group.xml");
 
-    List<UserMembershipDto> result = underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100L).build(), 0, 10);
+    List<UserMembershipDto> result = underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100).build(), 0, 10);
     assertThat(result).hasSize(2);
     assertThat(result.get(0).getName()).isEqualTo("Admin name");
     assertThat(result.get(1).getName()).isEqualTo("Not Admin");
@@ -162,16 +162,16 @@ public class GroupMembershipDaoTest {
   public void members_should_be_paginated() {
     dbTester.prepareDbUnit(getClass(), "shared_plus_empty_group.xml");
 
-    List<UserMembershipDto> result = underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100L).build(), 0, 2);
+    List<UserMembershipDto> result = underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100).build(), 0, 2);
     assertThat(result).hasSize(2);
     assertThat(result.get(0).getName()).isEqualTo("Admin name");
     assertThat(result.get(1).getName()).isEqualTo("Not Admin");
 
-    result = underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100L).build(), 1, 2);
+    result = underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100).build(), 1, 2);
     assertThat(result).hasSize(1);
     assertThat(result.get(0).getName()).isEqualTo("Not Admin");
 
-    result = underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100L).build(), 2, 1);
+    result = underTest.selectMembers(dbTester.getSession(), UserMembershipQuery.builder().groupId(100).build(), 2, 1);
     assertThat(result).isEmpty();
   }
 }
index 87a695712cda909adc43c84ccd779ba3c81e6082..50af08373f306fd1f601cfcfa668ef7c1fb87515 100644 (file)
@@ -22,6 +22,7 @@ package org.sonar.db.user;
 import java.util.Date;
 
 import static org.apache.commons.lang.RandomStringUtils.randomAlphanumeric;
+import static org.apache.commons.lang.math.RandomUtils.nextInt;
 import static org.apache.commons.lang.math.RandomUtils.nextLong;
 
 public class GroupTesting {
@@ -32,7 +33,7 @@ public class GroupTesting {
 
   public static GroupDto newGroupDto() {
     GroupDto group = new GroupDto()
-      .setId(nextLong())
+      .setId(nextInt())
       .setOrganizationUuid(randomAlphanumeric(40))
       .setName(randomAlphanumeric(255))
       .setDescription(randomAlphanumeric(200))
index 5a9b6ced418a510d4c08e7a63484582eaea98afa..580b26956aa0895e19cdaa60e712db9d15ebb6f9 100644 (file)
@@ -94,7 +94,7 @@ public class RoleDaoTest {
   public void delete_all_group_permissions_by_group_id() {
     db.prepareDbUnit(getClass(), "deleteGroupPermissionsByGroupId.xml");
 
-    underTest.deleteGroupRolesByGroupId(db.getSession(), 100L);
+    underTest.deleteGroupRolesByGroupId(db.getSession(), 100);
     db.getSession().commit();
 
     db.assertDbUnit(getClass(), "deleteGroupPermissionsByGroupId-result.xml", "group_roles");
index cbd7af7558b033c63da8fdea3b503ac35a337b44..c1a8623223c9cf533715e769e6db9bef2fb88bde 100644 (file)
@@ -70,11 +70,11 @@ public class UserDaoTest {
   public void selectUsersIds() {
     db.prepareDbUnit(getClass(), "selectUsersByIds.xml");
 
-    Collection<UserDto> users = underTest.selectByIds(session, asList(100L, 101L, 987L));
+    Collection<UserDto> users = underTest.selectByIds(session, asList(100, 101, 987));
     assertThat(users).hasSize(2);
     assertThat(users).extracting("login").containsOnly("marius", "inactive_user");
 
-    assertThat(underTest.selectByIds(session, Collections.<Long>emptyList())).isEmpty();
+    assertThat(underTest.selectByIds(session, Collections.emptyList())).isEmpty();
   }
 
   @Test
@@ -305,7 +305,7 @@ public class UserDaoTest {
     Long date = DateUtils.parseDate("2014-06-20").getTime();
 
     UserDto userDto = new UserDto()
-      .setId(1L)
+      .setId(1)
       .setLogin("john")
       .setName("John")
       .setEmail("jo@hn.com")
@@ -353,7 +353,7 @@ public class UserDaoTest {
     db.getSession().commit();
 
     UserDto userDto = new UserDto()
-      .setId(1L)
+      .setId(1)
       .setLogin("john")
       .setName("John Doo")
       .setEmail("jodoo@hn.com")
index 6257ac9434a765082dd783bf91dcd9c5d406c7de..4a2c2c48fa915f87d4ba6093378a86e5a48d9706 100644 (file)
@@ -177,7 +177,7 @@ public class UserDbTester {
   }
 
   @CheckForNull
-  public GroupDto selectGroupById(long groupId) {
+  public GroupDto selectGroupById(int groupId) {
     return db.getDbClient().groupDao().selectById(db.getSession(), groupId);
   }
 
@@ -206,7 +206,7 @@ public class UserDbTester {
     db.commit();
   }
 
-  public List<Long> selectGroupIdsOfUser(UserDto user) {
+  public List<Integer> selectGroupIdsOfUser(UserDto user) {
     return db.getDbClient().groupMembershipDao().selectGroupIdsByUserId(db.getSession(), user.getId());
   }
 
index 4e4ee16a5bcbc3ce87f919c11b31ee3e2b7c7a7d..ca36ee4e574171dcb44ec2fb6a56ff0095d0b253 100644 (file)
@@ -33,7 +33,7 @@ public class UserGroupDaoTest {
 
   @Test
   public void insert() {
-    UserGroupDto userGroupDto = new UserGroupDto().setUserId(1L).setGroupId(2L);
+    UserGroupDto userGroupDto = new UserGroupDto().setUserId(1).setGroupId(2);
     underTest.insert(dbTester.getSession(), userGroupDto);
     dbTester.getSession().commit();
 
@@ -43,7 +43,7 @@ public class UserGroupDaoTest {
   @Test
   public void delete_members_by_group_id() {
     dbTester.prepareDbUnit(getClass(), "delete_members_by_group_id.xml");
-    underTest.deleteByGroupId(dbTester.getSession(), 1L);
+    underTest.deleteByGroupId(dbTester.getSession(), 1);
     dbTester.getSession().commit();
     dbTester.assertDbUnit(getClass(), "delete_members_by_group_id-result.xml", "groups_users");
   }
index f3a57b63c2dc61295a605427398d7ff588bd255e..682699ad4d9ac5b5728608acad755324f48a95d2 100644 (file)
@@ -34,7 +34,7 @@ public class UserTesting {
 
   public static UserDto newUserDto(String login, String name, @Nullable String email) {
     return new UserDto()
-      .setId((long)nextInt())
+      .setId(nextInt())
       .setActive(true)
       .setLocal(true)
       .setName(name)
@@ -51,7 +51,7 @@ public class UserTesting {
 
   public static UserDto newLocalUser(String login, String name, @Nullable String email) {
     return new UserDto()
-      .setId((long)nextInt())
+      .setId(nextInt())
       .setActive(true)
       .setLocal(true)
       .setName(name)
@@ -68,7 +68,7 @@ public class UserTesting {
 
   public static UserDto newExternalUser(String login, String name, @Nullable String email) {
     return new UserDto()
-      .setId((long)nextInt())
+      .setId(nextInt())
       .setActive(true)
       .setLocal(false)
       .setName(name)
@@ -83,7 +83,7 @@ public class UserTesting {
 
   public static UserDto newDisabledUser(String login) {
     return new UserDto()
-      .setId((long)nextInt())
+      .setId(nextInt())
       .setLogin(login)
       .setActive(false)
       .setCreatedAt(nextLong())