import java.util.List;
import javax.annotation.Nullable;
import okhttp3.Response;
-import org.apache.commons.io.Charsets;
import org.apache.commons.io.FileUtils;
import org.junit.Before;
import org.junit.ClassRule;
import org.junit.Test;
import util.user.UserRule;
-import static com.google.common.base.Charsets.UTF_8;
+import static java.nio.charset.StandardCharsets.UTF_8;
import static org.assertj.core.api.Assertions.assertThat;
import static util.ItUtils.call;
assertThat(response.code()).isEqualTo(200);
assertThat(response.request().url().toString()).contains("sessions/unauthorized");
- List<String> logsLines = FileUtils.readLines(orchestrator.getServer().getWebLogs(), Charsets.UTF_8);
+ List<String> logsLines = FileUtils.readLines(orchestrator.getServer().getWebLogs(), UTF_8);
assertThat(logsLines).doesNotContain("org.sonar.server.exceptions.BadRequestException: Use only letters, numbers, and .-_@ please.");
USER_RULE.verifyUserDoesNotExist(USER_LOGIN);
}
String expectedError = "You can't sign up because email 'tester@email.com' is already used by an existing user. This means that you probably already registered with another account";
assertThat(response.code()).isEqualTo(200);
assertThat(response.request().url().toString()).contains(URLEncoder.encode(expectedError, UTF_8.name()));
- assertThat(FileUtils.readLines(orchestrator.getServer().getWebLogs(), Charsets.UTF_8)).doesNotContain(expectedError);
+ assertThat(FileUtils.readLines(orchestrator.getServer().getWebLogs(), UTF_8)).doesNotContain(expectedError);
}
private static Response doCall(String login, @Nullable String name, @Nullable String email, @Nullable String groups) {
*/
package org.sonar.server.authentication;
-import com.google.common.base.Charsets;
import java.io.IOException;
import java.io.UnsupportedEncodingException;
import javax.servlet.http.HttpServletResponse;
import static java.lang.String.format;
import static java.net.URLEncoder.encode;
+import static java.nio.charset.StandardCharsets.UTF_8;
final class AuthenticationError {
private static String encodeMessage(String message) {
try {
- return encode(message, Charsets.UTF_8.name());
+ return encode(message, UTF_8.name());
} catch (UnsupportedEncodingException e) {
throw new IllegalStateException(format("Fail to encode %s", message), e);
}
*/
package org.sonar.server.authentication;
-import com.google.common.base.Charsets;
import java.util.Base64;
import java.util.Optional;
import javax.servlet.http.HttpServletRequest;
import org.sonar.server.authentication.event.AuthenticationException;
import org.sonar.server.usertoken.UserTokenAuthenticator;
+import static java.nio.charset.StandardCharsets.UTF_8;
import static java.util.Locale.ENGLISH;
import static org.apache.commons.lang.StringUtils.isEmpty;
import static org.sonar.server.authentication.event.AuthenticationEvent.Method;
private static String getDecodedBasicAuth(String basicAuthEncoded) {
try {
- return new String(BASE64_DECODER.decode(basicAuthEncoded.getBytes(Charsets.UTF_8)), Charsets.UTF_8);
+ return new String(BASE64_DECODER.decode(basicAuthEncoded.getBytes(UTF_8)), UTF_8);
} catch (Exception e) {
throw AuthenticationException.newBuilder()
.setSource(Source.local(Method.BASIC))
*/
package org.sonar.server.authentication;
-import com.google.common.base.Function;
import com.google.common.collect.Sets;
import java.util.ArrayList;
import java.util.Collection;
import java.util.Map;
import java.util.Objects;
import java.util.Set;
-import javax.annotation.Nonnull;
import org.sonar.api.server.authentication.IdentityProvider;
import org.sonar.api.server.authentication.UserIdentity;
import org.sonar.api.utils.log.Logger;
import org.sonar.server.user.UpdateUser;
import org.sonar.server.user.UserUpdater;
-import static com.google.common.collect.FluentIterable.from;
import static java.lang.String.format;
import static java.util.Collections.singletonList;
+import static org.sonar.core.util.stream.Collectors.uniqueIndex;
public class UserIdentityAuthenticator {
}
private UserDto register(UserIdentity user, IdentityProvider provider, AuthenticationEvent.Source source) {
- DbSession dbSession = dbClient.openSession(false);
- try {
+ try (DbSession dbSession = dbClient.openSession(false)) {
String userLogin = user.getLogin();
UserDto userDto = dbClient.userDao().selectByLogin(dbSession, userLogin);
if (userDto != null && userDto.isActive()) {
return userDto;
}
return registerNewUser(dbSession, user, provider, source);
- } finally {
- dbClient.closeSession(dbSession);
}
}
throw AuthenticationException.newBuilder()
.setSource(source)
.setLogin(user.getLogin())
- .setMessage("User signup disabled for provider '" + provider.getKey() + "'")
+ .setMessage(format("User signup disabled for provider '%s'", provider.getKey()))
.setPublicMessage(format("'%s' users are not allowed to sign up", provider.getKey()))
.build();
}
Collection<String> allGroups = new ArrayList<>(groupsToAdd);
allGroups.addAll(groupsToRemove);
DefaultOrganization defaultOrganization = defaultOrganizationProvider.get();
- Map<String, GroupDto> groupsByName = from(dbClient.groupDao().selectByNames(dbSession, defaultOrganization.getUuid(), allGroups)).uniqueIndex(GroupDtoToName.INSTANCE);
+ Map<String, GroupDto> groupsByName = dbClient.groupDao().selectByNames(dbSession, defaultOrganization.getUuid(), allGroups)
+ .stream()
+ .collect(uniqueIndex(GroupDto::getName));
addGroups(dbSession, userDto, groupsToAdd, groupsByName);
removeGroups(dbSession, userDto, groupsToRemove, groupsByName);
dbClient.userGroupDao().delete(dbSession, groupDto.getId(), userDto.getId());
});
}
-
- private enum GroupDtoToName implements Function<GroupDto, String> {
- INSTANCE;
-
- @Override
- public String apply(@Nonnull GroupDto input) {
- return input.getName();
- }
- }
}
@Override
public boolean isEnabled(DbSession dbSession) {
Optional<String> value = dbClient.internalPropertiesDao().selectByKey(dbSession, InternalProperties.ORGANIZATION_ENABLED);
- return value.map(s -> "true".equals(s)).orElse(false);
+ return value.map("true"::equals).orElse(false);
}
@Override
import org.sonar.server.authentication.event.AuthenticationEvent;
import org.sonar.server.usertoken.UserTokenAuthenticator;
-import static com.google.common.base.Charsets.UTF_8;
+import static java.nio.charset.StandardCharsets.UTF_8;
import static org.assertj.core.api.Java6Assertions.assertThat;
import static org.junit.rules.ExpectedException.none;
import static org.mockito.Mockito.mock;
*/
package org.sonar.server.component.ws;
-import com.google.common.base.Charsets;
import com.google.common.base.Throwables;
import com.google.gson.JsonArray;
import com.google.gson.JsonElement;
import org.sonarqube.ws.MediaTypes;
import org.sonarqube.ws.WsComponents.TreeWsResponse;
+import static java.nio.charset.StandardCharsets.UTF_8;
import static org.assertj.core.api.Assertions.assertThat;
import static org.sonar.db.component.ComponentTesting.newDevProjectCopy;
import static org.sonar.db.component.ComponentTesting.newDeveloper;
SnapshotDto projectSnapshot = componentDb.insertProjectAndSnapshot(project);
Date now = new Date();
JsonParser jsonParser = new JsonParser();
- JsonElement jsonTree = jsonParser.parse(IOUtils.toString(getClass().getResource("tree-example.json"), Charsets.UTF_8));
+ JsonElement jsonTree = jsonParser.parse(IOUtils.toString(getClass().getResource("tree-example.json"), UTF_8));
JsonArray components = jsonTree.getAsJsonObject().getAsJsonArray("components");
for (JsonElement componentAsJsonElement : components) {
JsonObject componentAsJsonObject = componentAsJsonElement.getAsJsonObject();
import org.sonar.server.tester.ServerTester;
import org.sonar.server.tester.UserSessionRule;
-import static com.google.common.base.Charsets.UTF_8;
+import static java.nio.charset.StandardCharsets.UTF_8;
import static org.apache.commons.io.IOUtils.toInputStream;
import static org.assertj.core.api.Assertions.assertThat;
import static org.junit.Assert.fail;