]> source.dussan.org Git - sonarqube.git/commitdiff
Deprecate old service classes in WsClient, add replacement methods
authorDaniel Schwarz <daniel.schwarz@sonarsource.com>
Thu, 30 Nov 2017 10:24:21 +0000 (11:24 +0100)
committerDaniel Schwarz <bartfastiel@users.noreply.github.com>
Wed, 6 Dec 2017 13:40:17 +0000 (14:40 +0100)
64 files changed:
server/sonar-qa-util/src/main/java/org/sonarqube/qa/util/OrganizationTester.java
server/sonar-qa-util/src/main/java/org/sonarqube/qa/util/QProfileTester.java
server/sonar-qa-util/src/main/java/org/sonarqube/qa/util/UserTester.java
sonar-ws/src/main/java/org/sonarqube/ws/client/DefaultWsClient.java
sonar-ws/src/main/java/org/sonarqube/ws/client/WsClient.java
tests/src/test/java/org/sonarqube/tests/analysis/AnalysisEsResilienceTest.java
tests/src/test/java/org/sonarqube/tests/analysis/FavoriteTest.java
tests/src/test/java/org/sonarqube/tests/analysis/FileExclusionsTest.java
tests/src/test/java/org/sonarqube/tests/analysis/IssueExclusionsTest.java
tests/src/test/java/org/sonarqube/tests/analysis/PermissionTest.java
tests/src/test/java/org/sonarqube/tests/analysis/ScannerTest.java
tests/src/test/java/org/sonarqube/tests/authorization/ExecuteAnalysisPermissionTest.java
tests/src/test/java/org/sonarqube/tests/authorization/IssuePermissionTest.java
tests/src/test/java/org/sonarqube/tests/authorization/PermissionSearchTest.java
tests/src/test/java/org/sonarqube/tests/authorization/PermissionTemplatePageTest.java
tests/src/test/java/org/sonarqube/tests/authorization/PermissionTemplateTest.java
tests/src/test/java/org/sonarqube/tests/authorization/ProvisioningPermissionTest.java
tests/src/test/java/org/sonarqube/tests/authorization/QualityProfileAdminPermissionTest.java
tests/src/test/java/org/sonarqube/tests/ce/ReportFailureNotificationTest.java
tests/src/test/java/org/sonarqube/tests/component/ComponentsWsTest.java
tests/src/test/java/org/sonarqube/tests/issue/CommonRulesTest.java
tests/src/test/java/org/sonarqube/tests/issue/IssueActionTest.java
tests/src/test/java/org/sonarqube/tests/issue/IssueBulkChangeTest.java
tests/src/test/java/org/sonarqube/tests/issue/IssueChangelogTest.java
tests/src/test/java/org/sonarqube/tests/issue/IssueCreationDateQPChangedTest.java
tests/src/test/java/org/sonarqube/tests/issue/IssueFilterOnCommonRulesTest.java
tests/src/test/java/org/sonarqube/tests/issue/IssueNotificationsTest.java
tests/src/test/java/org/sonarqube/tests/issue/IssueSearchTest.java
tests/src/test/java/org/sonarqube/tests/issue/IssueTagsTest.java
tests/src/test/java/org/sonarqube/tests/issue/IssueTrackingTest.java
tests/src/test/java/org/sonarqube/tests/issue/IssueWorkflowTest.java
tests/src/test/java/org/sonarqube/tests/issue/OrganizationIssueAssignTest.java
tests/src/test/java/org/sonarqube/tests/lite/LiteTest.java
tests/src/test/java/org/sonarqube/tests/measure/MeasuresWsTest.java
tests/src/test/java/org/sonarqube/tests/measure/TimeMachineTest.java
tests/src/test/java/org/sonarqube/tests/organization/BillingTest.java
tests/src/test/java/org/sonarqube/tests/organization/OrganizationMembershipTest.java
tests/src/test/java/org/sonarqube/tests/organization/OrganizationTest.java
tests/src/test/java/org/sonarqube/tests/organization/PersonalOrganizationTest.java
tests/src/test/java/org/sonarqube/tests/performance/scanner/DuplicationTest.java
tests/src/test/java/org/sonarqube/tests/project/ProjectBulkDeletionPageTest.java
tests/src/test/java/org/sonarqube/tests/project/ProjectDeletionTest.java
tests/src/test/java/org/sonarqube/tests/project/ProjectFilterTest.java
tests/src/test/java/org/sonarqube/tests/project/ProjectKeyUpdateTest.java
tests/src/test/java/org/sonarqube/tests/project/ProjectProvisioningTest.java
tests/src/test/java/org/sonarqube/tests/project/ProjectVisibilityPageTest.java
tests/src/test/java/org/sonarqube/tests/qualityGate/OrganizationQualityGateUiTest.java
tests/src/test/java/org/sonarqube/tests/qualityGate/QualityGateTest.java
tests/src/test/java/org/sonarqube/tests/qualityModel/TechnicalDebtInIssueChangelogTest.java
tests/src/test/java/org/sonarqube/tests/qualityModel/TechnicalDebtTest.java
tests/src/test/java/org/sonarqube/tests/qualityProfile/BuiltInQualityProfilesNotificationTest.java
tests/src/test/java/org/sonarqube/tests/qualityProfile/OrganizationQualityProfilesUiTest.java
tests/src/test/java/org/sonarqube/tests/qualityProfile/QualityProfilesEditTest.java
tests/src/test/java/org/sonarqube/tests/qualityProfile/QualityProfilesUiTest.java
tests/src/test/java/org/sonarqube/tests/qualityProfile/QualityProfilesWsTest.java
tests/src/test/java/org/sonarqube/tests/serverSystem/LogsTest.java
tests/src/test/java/org/sonarqube/tests/serverSystem/RestartTest.java
tests/src/test/java/org/sonarqube/tests/settings/SettingsTest.java
tests/src/test/java/org/sonarqube/tests/upgrade/UpgradeTest.java
tests/src/test/java/org/sonarqube/tests/user/OAuth2IdentityProviderTest.java
tests/src/test/java/org/sonarqube/tests/user/OrganizationIdentityProviderTest.java
tests/src/test/java/util/ItUtils.java
tests/src/test/java/util/issue/IssueRule.java
tests/src/test/java/util/user/UserRule.java

index f38dbde22e81e9940c2381933e1bb84939f3ab4c..85a9c8da5aa98be0ffac13b5aaf17234851fb71d 100644 (file)
@@ -136,6 +136,6 @@ public class OrganizationTester {
   }
 
   public OrganizationService service() {
-    return session.wsClient().organizations();
+    return session.wsClient().organizationsOld();
   }
 }
index 38e81ca6769395ffc91d8d5655740d6b4448bbdc..c28530f86de3d71e6248f0e1889a350fe47e0093 100644 (file)
@@ -50,7 +50,7 @@ public class QProfileTester {
   }
 
   public QualityProfilesService service() {
-    return session.wsClient().qualityProfiles();
+    return session.wsClient().qualityProfilesOld();
   }
 
   @SafeVarargs
index 9445767c8f17e58a114dfe3f7799c463781df760..af434c5d2aca145995fa0ff7a2ef89a09d37f67e 100644 (file)
@@ -74,7 +74,7 @@ public class UserTester {
   @SafeVarargs
   public final User generateAdministrator(Consumer<CreateRequest.Builder>... populators) {
     User user = generate(populators);
-    session.wsClient().permissions().addUser(new org.sonarqube.ws.client.permission.AddUserRequest().setLogin(user.getLogin()).setPermission("admin"));
+    session.wsClient().permissionsOld().addUser(new org.sonarqube.ws.client.permission.AddUserRequest().setLogin(user.getLogin()).setPermission("admin"));
     session.wsClient().userGroups().addUser(new AddUserRequest().setLogin(user.getLogin()).setName("sonar-administrators"));
     return user;
   }
@@ -83,7 +83,7 @@ public class UserTester {
   public final User generateAdministrator(Organizations.Organization organization, Consumer<CreateRequest.Builder>... populators) {
     String organizationKey = organization.getKey();
     User user = generate(populators);
-    session.wsClient().organizations().addMember(organizationKey, user.getLogin());
+    session.wsClient().organizationsOld().addMember(organizationKey, user.getLogin());
     session.wsClient().userGroups().addUser(new AddUserRequest()
       .setOrganization(organizationKey)
       .setLogin(user.getLogin())
@@ -94,7 +94,7 @@ public class UserTester {
   @SafeVarargs
   public final User generateAdministratorOnDefaultOrganization(Consumer<CreateRequest.Builder>... populators) {
     User user = generate(populators);
-    session.wsClient().organizations().addMember(DEFAULT_ORGANIZATION_KEY, user.getLogin());
+    session.wsClient().organizationsOld().addMember(DEFAULT_ORGANIZATION_KEY, user.getLogin());
     session.wsClient().userGroups().addUser(new AddUserRequest()
       .setOrganization(DEFAULT_ORGANIZATION_KEY)
       .setLogin(user.getLogin())
@@ -105,14 +105,14 @@ public class UserTester {
   @SafeVarargs
   public final User generateMember(Organizations.Organization organization, Consumer<CreateRequest.Builder>... populators) {
     User user = generate(populators);
-    session.wsClient().organizations().addMember(organization.getKey(), user.getLogin());
+    session.wsClient().organizationsOld().addMember(organization.getKey(), user.getLogin());
     return user;
   }
 
   @SafeVarargs
   public final User generateMemberOfDefaultOrganization(Consumer<CreateRequest.Builder>... populators) {
     User user = generate(populators);
-    session.wsClient().organizations().addMember(DEFAULT_ORGANIZATION_KEY, user.getLogin());
+    session.wsClient().organizationsOld().addMember(DEFAULT_ORGANIZATION_KEY, user.getLogin());
     return user;
   }
 
index 7ae83705d7a611bd16a6229cd30debfd16ef8119..9bf77e9cde01bb95f3634ab611539593861e6b04 100644 (file)
 package org.sonarqube.ws.client;
 
 import org.sonarqube.ws.client.ce.CeService;
-import org.sonarqube.ws.client.component.ComponentsService;
+import org.sonarqube.ws.client.components.ComponentsService;
 import org.sonarqube.ws.client.favorites.FavoritesService;
-import org.sonarqube.ws.client.issue.IssuesService;
-import org.sonarqube.ws.client.measure.MeasuresService;
+import org.sonarqube.ws.client.issues.IssuesService;
+import org.sonarqube.ws.client.measures.MeasuresService;
 import org.sonarqube.ws.client.notifications.NotificationsService;
 import org.sonarqube.ws.client.organization.OrganizationService;
-import org.sonarqube.ws.client.permission.PermissionsService;
+import org.sonarqube.ws.client.organizations.OrganizationsService;
+import org.sonarqube.ws.client.permissions.PermissionsService;
 import org.sonarqube.ws.client.project.ProjectsService;
+import org.sonarqube.ws.client.projectanalyses.ProjectAnalysesService;
 import org.sonarqube.ws.client.projectanalysis.ProjectAnalysisService;
 import org.sonarqube.ws.client.projectbranches.ProjectBranchesService;
 import org.sonarqube.ws.client.projectlinks.ProjectLinksService;
 import org.sonarqube.ws.client.qualitygates.QualitygatesService;
 import org.sonarqube.ws.client.qualityprofile.QualityProfilesService;
+import org.sonarqube.ws.client.qualityprofiles.QualityprofilesService;
 import org.sonarqube.ws.client.roots.RootsService;
 import org.sonarqube.ws.client.rules.RulesService;
 import org.sonarqube.ws.client.settings.SettingsService;
@@ -51,17 +54,23 @@ import org.sonarqube.ws.client.webhooks.WebhooksService;
 class DefaultWsClient implements WsClient {
 
   private final WsConnector wsConnector;
-  private final OrganizationService organizations;
-  private final PermissionsService permissionsService;
-  private final ComponentsService componentsService;
+  private final OrganizationService organizationsOld;
+  private final OrganizationsService organizations;
+  private final org.sonarqube.ws.client.permission.PermissionsService permissionsOld;
+  private final PermissionsService permissions;
+  private final org.sonarqube.ws.client.component.ComponentsService componentsOld;
+  private final ComponentsService components;
   private final FavoritesService favoritesService;
-  private final QualityProfilesService qualityProfilesService;
-  private final IssuesService issuesService;
+  private final QualityProfilesService qualityProfilesOld;
+  private final QualityprofilesService qualityprofiles;
+  private final org.sonarqube.ws.client.issue.IssuesService issuesOld;
+  private final IssuesService issues;
   private final UsersService usersService;
   private final UserGroupsService userGroupsService;
   private final UserTokensService userTokensService;
   private final QualitygatesService qualityGatesService;
-  private final MeasuresService measuresService;
+  private final org.sonarqube.ws.client.measure.MeasuresService measuresOld;
+  private final MeasuresService measures;
   private final SystemService systemService;
   private final CeService ceService;
   private final RulesService rulesService;
@@ -70,23 +79,30 @@ class DefaultWsClient implements WsClient {
   private final SettingsService settingsService;
   private final RootsService rootsService;
   private final WebhooksService webhooksService;
-  private final ProjectAnalysisService projectAnalysisService;
+  private final ProjectAnalysisService projectAnalysisOld;
+  private final ProjectAnalysesService projectAnalyses;
   private final NotificationsService notificationsService;
   private final ProjectBranchesService projectBranchesService;
 
   DefaultWsClient(WsConnector wsConnector) {
     this.wsConnector = wsConnector;
-    this.organizations = new OrganizationService(wsConnector);
-    this.permissionsService = new PermissionsService(wsConnector);
-    this.componentsService = new ComponentsService(wsConnector);
+    this.organizationsOld = new OrganizationService(wsConnector);
+    this.organizations = new OrganizationsService(wsConnector);
+    this.permissionsOld = new org.sonarqube.ws.client.permission.PermissionsService(wsConnector);
+    this.permissions = new PermissionsService(wsConnector);
+    this.componentsOld = new org.sonarqube.ws.client.component.ComponentsService(wsConnector);
+    this.components = new ComponentsService(wsConnector);
     this.favoritesService = new FavoritesService(wsConnector);
-    this.qualityProfilesService = new QualityProfilesService(wsConnector);
-    this.issuesService = new IssuesService(wsConnector);
+    this.qualityProfilesOld = new QualityProfilesService(wsConnector);
+    this.qualityprofiles = new QualityprofilesService(wsConnector);
+    this.issuesOld = new org.sonarqube.ws.client.issue.IssuesService(wsConnector);
+    this.issues = new IssuesService(wsConnector);
     this.usersService = new UsersService(wsConnector);
     this.userGroupsService = new UserGroupsService(wsConnector);
     this.userTokensService = new UserTokensService(wsConnector);
     this.qualityGatesService = new QualitygatesService(wsConnector);
-    this.measuresService = new MeasuresService(wsConnector);
+    this.measuresOld = new org.sonarqube.ws.client.measure.MeasuresService(wsConnector);
+    this.measures = new MeasuresService(wsConnector);
     this.systemService = new SystemService(wsConnector);
     this.ceService = new CeService(wsConnector);
     this.rulesService = new RulesService(wsConnector);
@@ -95,7 +111,8 @@ class DefaultWsClient implements WsClient {
     this.settingsService = new SettingsService(wsConnector);
     this.rootsService = new RootsService(wsConnector);
     this.webhooksService = new WebhooksService(wsConnector);
-    this.projectAnalysisService = new ProjectAnalysisService(wsConnector);
+    this.projectAnalysisOld = new ProjectAnalysisService(wsConnector);
+    this.projectAnalyses = new ProjectAnalysesService(wsConnector);
     this.projectBranchesService = new ProjectBranchesService(wsConnector);
     this.notificationsService = new NotificationsService(wsConnector);
   }
@@ -106,18 +123,33 @@ class DefaultWsClient implements WsClient {
   }
 
   @Override
-  public OrganizationService organizations() {
+  public OrganizationService organizationsOld() {
+    return organizationsOld;
+  }
+
+  @Override
+  public OrganizationsService organizations() {
     return organizations;
   }
 
+  @Override
+  public org.sonarqube.ws.client.permission.PermissionsService permissionsOld() {
+    return this.permissionsOld;
+  }
+
   @Override
   public PermissionsService permissions() {
-    return this.permissionsService;
+    return permissions;
+  }
+
+  @Override
+  public org.sonarqube.ws.client.component.ComponentsService componentsOld() {
+    return componentsOld;
   }
 
   @Override
   public ComponentsService components() {
-    return componentsService;
+    return components;
   }
 
   @Override
@@ -126,13 +158,23 @@ class DefaultWsClient implements WsClient {
   }
 
   @Override
-  public QualityProfilesService qualityProfiles() {
-    return qualityProfilesService;
+  public QualityProfilesService qualityProfilesOld() {
+    return qualityProfilesOld;
+  }
+
+  @Override
+  public QualityprofilesService qualityProfiles() {
+    return qualityprofiles;
+  }
+
+  @Override
+  public org.sonarqube.ws.client.issue.IssuesService issuesOld() {
+    return issuesOld;
   }
 
   @Override
   public IssuesService issues() {
-    return issuesService;
+    return issues;
   }
 
   @Override
@@ -155,9 +197,14 @@ class DefaultWsClient implements WsClient {
     return qualityGatesService;
   }
 
+  @Override
+  public org.sonarqube.ws.client.measure.MeasuresService measuresOld() {
+    return measuresOld;
+  }
+
   @Override
   public MeasuresService measures() {
-    return measuresService;
+    return measures;
   }
 
   @Override
@@ -201,8 +248,13 @@ class DefaultWsClient implements WsClient {
   }
 
   @Override
-  public ProjectAnalysisService projectAnalysis() {
-    return projectAnalysisService;
+  public ProjectAnalysisService projectAnalysisOld() {
+    return projectAnalysisOld;
+  }
+
+  @Override
+  public ProjectAnalysesService projectAnalyses() {
+    return projectAnalyses;
   }
 
   @Override
index 96c20272caf7778525ed5bc7c377203f7fb9b040..c6d200e935dbe577ac9c787431e134864c53dd57 100644 (file)
 package org.sonarqube.ws.client;
 
 import org.sonarqube.ws.client.ce.CeService;
-import org.sonarqube.ws.client.component.ComponentsService;
+import org.sonarqube.ws.client.components.ComponentsService;
 import org.sonarqube.ws.client.favorites.FavoritesService;
-import org.sonarqube.ws.client.issue.IssuesService;
-import org.sonarqube.ws.client.measure.MeasuresService;
+import org.sonarqube.ws.client.issues.IssuesService;
+import org.sonarqube.ws.client.measures.MeasuresService;
 import org.sonarqube.ws.client.notifications.NotificationsService;
 import org.sonarqube.ws.client.organization.OrganizationService;
-import org.sonarqube.ws.client.permission.PermissionsService;
+import org.sonarqube.ws.client.organizations.OrganizationsService;
+import org.sonarqube.ws.client.permissions.PermissionsService;
 import org.sonarqube.ws.client.project.ProjectsService;
+import org.sonarqube.ws.client.projectanalyses.ProjectAnalysesService;
 import org.sonarqube.ws.client.projectanalysis.ProjectAnalysisService;
 import org.sonarqube.ws.client.projectbranches.ProjectBranchesService;
 import org.sonarqube.ws.client.projectlinks.ProjectLinksService;
 import org.sonarqube.ws.client.qualitygates.QualitygatesService;
 import org.sonarqube.ws.client.qualityprofile.QualityProfilesService;
+import org.sonarqube.ws.client.qualityprofiles.QualityprofilesService;
 import org.sonarqube.ws.client.roots.RootsService;
 import org.sonarqube.ws.client.rules.RulesService;
 import org.sonarqube.ws.client.settings.SettingsService;
@@ -61,19 +64,50 @@ import org.sonarqube.ws.client.webhooks.WebhooksService;
  * @since 5.3
  */
 public interface WsClient {
-  OrganizationService organizations();
+
+  /**
+   * @deprecated since 7.0 use {@link #organizations()} instead
+   */
+  @Deprecated
+  OrganizationService organizationsOld();
+
+  OrganizationsService organizations();
+
+  /**
+   * @deprecated since 7.0 use {@link #components()} instead
+   */
+  @Deprecated
+  org.sonarqube.ws.client.component.ComponentsService componentsOld();
 
   ComponentsService components();
 
   FavoritesService favorites();
 
+  /**
+   * @deprecated since 7.0 use {@link #issues()} instead
+   */
+  @Deprecated
+  org.sonarqube.ws.client.issue.IssuesService issuesOld();
+
   IssuesService issues();
 
   NotificationsService notifications();
 
+  /**
+   * @deprecated since 7.0 use {@link #permissions()} instead
+   */
+  @Deprecated
+  org.sonarqube.ws.client.permission.PermissionsService permissionsOld();
+
   PermissionsService permissions();
 
-  QualityProfilesService qualityProfiles();
+  /**
+   * @deprecated since 7.0 use {@link #qualityProfiles()} instead
+   */
+  @Deprecated
+  QualityProfilesService qualityProfilesOld();
+
+  QualityprofilesService qualityProfiles();
 
   UsersService users();
 
@@ -83,6 +117,12 @@ public interface WsClient {
 
   QualitygatesService qualityGates();
 
+  /**
+   * @deprecated since 7.0 use {@link #measures()} instead
+   */
+  @Deprecated
+  org.sonarqube.ws.client.measure.MeasuresService measuresOld();
+
   MeasuresService measures();
 
   SystemService system();
@@ -120,8 +160,12 @@ public interface WsClient {
 
   /**
    * @since 6.3
+   * @deprecated since 7.0 use {@link #projectAnalyses()} instead
    */
-  ProjectAnalysisService projectAnalysis();
+  @Deprecated
+  ProjectAnalysisService projectAnalysisOld();
+
+  ProjectAnalysesService projectAnalyses();
 
   /**
    * @since 6.6>
index a02bb02e8beae5fe18c3935250015ffeff856b1e..46b49e6eb672369357a376c0ff14ebf0a905f74e 100644 (file)
@@ -229,7 +229,7 @@ public class AnalysisEsResilienceTest {
     SearchRequest request = new SearchRequest()
       .setProjectKeys(Collections.singletonList(projectKey))
       .setFacets(Collections.singletonList("statuses"));
-    return tester.wsClient().issues().search(request);
+    return tester.wsClient().issuesOld().search(request);
   }
 
   private List<String> searchFile(String key, Organization organization) {
@@ -237,7 +237,7 @@ public class AnalysisEsResilienceTest {
       .setS(key)
       .build();
     Map<String, Object> response = ItUtils.jsonToMap(
-      tester.wsClient().components().suggestions(query).content()
+      tester.wsClient().componentsOld().suggestions(query).content()
     );
     List results = (List) response.get("results");
     Map trkResult = (Map) results.stream().filter(result -> "FIL".equals(((Map) result).get("q"))).findAny().get();
index 6d291bca43dca80d678ccc654f87a12665577648..02c80ef8f3b855707c7a27d44b03cc5894038ebe 100644 (file)
@@ -105,18 +105,18 @@ public class FavoriteTest {
   }
 
   private void addProjectCreatorPermission() {
-    Permissions.SearchTemplatesWsResponse permissionTemplates = adminWsClient.permissions().searchTemplates(new SearchTemplatesRequest());
+    Permissions.SearchTemplatesWsResponse permissionTemplates = adminWsClient.permissionsOld().searchTemplates(new SearchTemplatesRequest());
     assertThat(permissionTemplates.getDefaultTemplatesCount()).isEqualTo(1);
-    adminWsClient.permissions().addProjectCreatorToTemplate(AddProjectCreatorToTemplateRequest.builder()
+    adminWsClient.permissionsOld().addProjectCreatorToTemplate(AddProjectCreatorToTemplateRequest.builder()
       .setTemplateId(permissionTemplates.getDefaultTemplates(0).getTemplateId())
       .setPermission("admin")
       .build());
   }
 
   private void removeProjectCreatorPermission() {
-    Permissions.SearchTemplatesWsResponse permissionTemplates = adminWsClient.permissions().searchTemplates(new SearchTemplatesRequest());
+    Permissions.SearchTemplatesWsResponse permissionTemplates = adminWsClient.permissionsOld().searchTemplates(new SearchTemplatesRequest());
     assertThat(permissionTemplates.getDefaultTemplatesCount()).isEqualTo(1);
-    adminWsClient.permissions().removeProjectCreatorFromTemplate(RemoveProjectCreatorFromTemplateRequest.builder()
+    adminWsClient.permissionsOld().removeProjectCreatorFromTemplate(RemoveProjectCreatorFromTemplateRequest.builder()
       .setTemplateId(permissionTemplates.getDefaultTemplates(0).getTemplateId())
       .setPermission("admin")
       .build());
index 17c6a7357bb3d199d4fbf7cfc7bf41f0e92fc1d0..75cffdb3e1193dde923ab23e6c759064ca03fe59 100644 (file)
@@ -134,6 +134,6 @@ public class FileExclusionsTest {
   }
 
   public static List<Component> getComponents(String qualifier) {
-    return newWsClient(orchestrator).components().tree(new TreeRequest().setBaseComponentKey(PROJECT).setQualifiers(singletonList(qualifier))).getComponentsList();
+    return newWsClient(orchestrator).componentsOld().tree(new TreeRequest().setBaseComponentKey(PROJECT).setQualifiers(singletonList(qualifier))).getComponentsList();
   }
 }
index 19dc6faba4ca47118c4ebd8ddbac330a8f6b291f..ad68417e7c4ef228961cd2965dea8be93c31a140 100644 (file)
@@ -239,7 +239,7 @@ public class IssueExclusionsTest {
     tester.projects().provision(p -> p
       .setKey("com.sonarsource.it.samples:multi-modules-exclusions")
       .setName("Sonar :: Integration Tests :: Multi-modules With Exclusions"));
-    tester.wsClient().qualityProfiles().addProject(AddProjectRequest.builder().setProjectKey("com.sonarsource.it.samples:multi-modules-exclusions")
+    tester.wsClient().qualityProfilesOld().addProject(AddProjectRequest.builder().setProjectKey("com.sonarsource.it.samples:multi-modules-exclusions")
       .setLanguage("xoo").setQualityProfile("with-many-rules").build());
 
     SonarScanner scan = SonarScanner.create(ItUtils.projectDir(PROJECT_DIR))
index d595e032cadef77578d2976086e774d2bdc7f881..e567234c60af9077f2158ac6ddf48ee325bc51af 100644 (file)
@@ -147,7 +147,7 @@ public class PermissionTest {
   }
 
   private void addUserPermission(String login, String permission, @Nullable String projectKey) {
-    adminWsClient.permissions().addUser(new AddUserRequest()
+    adminWsClient.permissionsOld().addUser(new AddUserRequest()
       .setLogin(login)
       .setPermission(permission)
       .setProjectKey(projectKey));
index bdc330eec29e8c26f48302116e4bb726c21cfd43..fa7261ced8b2e1c4e6d734e77b8e8d53e59cf412 100644 (file)
@@ -68,7 +68,7 @@ public class ScannerTest {
     scan("shared/xoo-multi-modules-sample");
     scan("shared/xoo-multi-modules-sample", "sonar.branch", "branch/0.x");
 
-    assertThat(tester.wsClient().components().search(new SearchRequest().setQualifiers(singletonList("TRK"))).getComponentsList()).hasSize(2);
+    assertThat(tester.wsClient().componentsOld().search(new SearchRequest().setQualifiers(singletonList("TRK"))).getComponentsList()).hasSize(2);
     assertThat(getComponent(orchestrator, "com.sonarsource.it.samples:multi-modules-sample").getName()).isEqualTo("Sonar :: Integration Tests :: Multi-modules Sample");
     assertThat(getComponent(orchestrator, "com.sonarsource.it.samples:multi-modules-sample:branch/0.x").getName())
       .isEqualTo("Sonar :: Integration Tests :: Multi-modules Sample branch/0.x");
index 3f3c0750f75702e0dc20d520348d0a8bcf4e6ead..ad2add0614f4d7cdd3b133c0d7643a89896773b4 100644 (file)
@@ -112,7 +112,7 @@ public class ExecuteAnalysisPermissionTest {
   @Test
   public void execute_analysis_with_scan_on_default_template() {
     removeGlobalPermission("anyone", "scan");
-    tester.wsClient().permissions().addProjectCreatorToTemplate(AddProjectCreatorToTemplateRequest.builder()
+    tester.wsClient().permissionsOld().addProjectCreatorToTemplate(AddProjectCreatorToTemplateRequest.builder()
       .setPermission("scan")
       .setTemplateId("default_template")
       .build());
@@ -121,15 +121,15 @@ public class ExecuteAnalysisPermissionTest {
   }
 
   private void addProjectPermission(String groupName, String projectKey, String permission) {
-    tester.wsClient().permissions().addGroup(new AddGroupRequest().setGroupName(groupName).setProjectKey(projectKey).setPermission(permission));
+    tester.wsClient().permissionsOld().addGroup(new AddGroupRequest().setGroupName(groupName).setProjectKey(projectKey).setPermission(permission));
   }
 
   private void addGlobalPermission(String groupName, String permission) {
-    tester.wsClient().permissions().addGroup(new AddGroupRequest().setGroupName(groupName).setPermission(permission));
+    tester.wsClient().permissionsOld().addGroup(new AddGroupRequest().setGroupName(groupName).setPermission(permission));
   }
 
   private void removeGlobalPermission(String groupName, String permission) {
-    tester.wsClient().permissions().removeGroup(new RemoveGroupRequest().setGroupName(groupName).setPermission(permission));
+    tester.wsClient().permissionsOld().removeGroup(new RemoveGroupRequest().setGroupName(groupName).setPermission(permission));
   }
 
   private static void executeLoggedAnalysis() {
index d3734d24e054024a7abc5b041c2d3232bfa0afea..94cccebeba6d5c6400137a0cb84c8873324a431e 100644 (file)
@@ -256,7 +256,7 @@ public class IssuePermissionTest {
   }
 
   private Issues.BulkChangeWsResponse makeBlockerAndFalsePositive(String user, Issue issueOnPrivateProject, Issue issueOnPublicProject) {
-    return newUserWsClient(orchestrator, user, "password").issues()
+    return newUserWsClient(orchestrator, user, "password").issuesOld()
       .bulkChange(BulkChangeRequest.builder().setIssues(asList(issueOnPrivateProject.key(), issueOnPublicProject.key()))
         .setSetSeverity("BLOCKER")
         .setDoTransition("falsepositive")
@@ -264,7 +264,7 @@ public class IssuePermissionTest {
   }
 
   private void addUserPermission(String login, String projectKey, String permission) {
-    tester.wsClient().permissions().addUser(
+    tester.wsClient().permissionsOld().addUser(
       new AddUserRequest()
         .setLogin(login)
         .setProjectKey(projectKey)
@@ -272,6 +272,6 @@ public class IssuePermissionTest {
   }
 
   private static Issues.ChangelogWsResponse changelog(String issueKey, String login, String password) {
-    return newUserWsClient(orchestrator, login, password).issues().changelog(issueKey);
+    return newUserWsClient(orchestrator, login, password).issuesOld().changelog(issueKey);
   }
 }
index 77a24d8497621dabb8a2a004357b2e747eadc6cf..955605c06dde61afdcb61bfe8f2fa9dd5b99769c 100644 (file)
@@ -78,26 +78,26 @@ public class PermissionSearchTest {
 
   @Test
   public void permission_web_services() {
-    tester.wsClient().permissions().addUser(
+    tester.wsClient().permissionsOld().addUser(
       new AddUserRequest()
         .setPermission("admin")
         .setLogin(LOGIN));
-    tester.wsClient().permissions().addGroup(
+    tester.wsClient().permissionsOld().addGroup(
       new AddGroupRequest()
         .setPermission("admin")
         .setGroupName(GROUP_NAME));
 
-    Permissions.WsSearchGlobalPermissionsResponse searchGlobalPermissionsWsResponse = tester.wsClient().permissions().searchGlobalPermissions();
+    Permissions.WsSearchGlobalPermissionsResponse searchGlobalPermissionsWsResponse = tester.wsClient().permissionsOld().searchGlobalPermissions();
     assertThat(searchGlobalPermissionsWsResponse.getPermissionsList().get(0).getKey()).isEqualTo("admin");
     assertThat(searchGlobalPermissionsWsResponse.getPermissionsList().get(0).getUsersCount()).isEqualTo(1);
     // by default, a group has the global admin permission
     assertThat(searchGlobalPermissionsWsResponse.getPermissionsList().get(0).getGroupsCount()).isEqualTo(2);
 
-    Permissions.UsersWsResponse users = tester.wsClient().permissions()
+    Permissions.UsersWsResponse users = tester.wsClient().permissionsOld()
       .users(new UsersRequest().setPermission("admin"));
     assertThat(users.getUsersList()).extracting("login").contains(LOGIN);
 
-    Permissions.WsGroupsResponse groupsResponse = tester.wsClient().permissions()
+    Permissions.WsGroupsResponse groupsResponse = tester.wsClient().permissionsOld()
       .groups(new GroupsRequest()
         .setPermission("admin"));
     assertThat(groupsResponse.getGroupsList()).extracting("name").contains(GROUP_NAME);
@@ -105,31 +105,31 @@ public class PermissionSearchTest {
 
   @Test
   public void template_permission_web_services() {
-    Permissions.CreateTemplateWsResponse createTemplateWsResponse = tester.wsClient().permissions().createTemplate(
+    Permissions.CreateTemplateWsResponse createTemplateWsResponse = tester.wsClient().permissionsOld().createTemplate(
       new CreateTemplateRequest()
         .setName("my-new-template")
         .setDescription("template-used-in-tests"));
     assertThat(createTemplateWsResponse.getPermissionTemplate().getName()).isEqualTo("my-new-template");
 
-    tester.wsClient().permissions().addUserToTemplate(
+    tester.wsClient().permissionsOld().addUserToTemplate(
       new AddUserToTemplateRequest()
         .setPermission("admin")
         .setTemplateName("my-new-template")
         .setLogin(LOGIN));
 
-    tester.wsClient().permissions().addGroupToTemplate(
+    tester.wsClient().permissionsOld().addGroupToTemplate(
       new AddGroupToTemplateRequest()
         .setPermission("admin")
         .setTemplateName("my-new-template")
         .setGroupName(GROUP_NAME));
 
-    tester.wsClient().permissions().addProjectCreatorToTemplate(
+    tester.wsClient().permissionsOld().addProjectCreatorToTemplate(
       AddProjectCreatorToTemplateRequest.builder()
         .setPermission("admin")
         .setTemplateName("my-new-template")
         .build());
 
-    SearchTemplatesWsResponse searchTemplatesWsResponse = tester.wsClient().permissions().searchTemplates(
+    SearchTemplatesWsResponse searchTemplatesWsResponse = tester.wsClient().permissionsOld().searchTemplates(
       new SearchTemplatesRequest()
         .setQuery("my-new-template"));
     assertThat(searchTemplatesWsResponse.getPermissionTemplates(0).getName()).isEqualTo("my-new-template");
@@ -138,26 +138,26 @@ public class PermissionSearchTest {
     assertThat(searchTemplatesWsResponse.getPermissionTemplates(0).getPermissions(0).getGroupsCount()).isEqualTo(1);
     assertThat(searchTemplatesWsResponse.getPermissionTemplates(0).getPermissions(0).getWithProjectCreator()).isTrue();
 
-    tester.wsClient().permissions().removeGroupFromTemplate(
+    tester.wsClient().permissionsOld().removeGroupFromTemplate(
       new RemoveGroupFromTemplateRequest()
         .setPermission("admin")
         .setTemplateName("my-new-template")
         .setGroupName(GROUP_NAME));
 
-    tester.wsClient().permissions().removeUserFromTemplate(
+    tester.wsClient().permissionsOld().removeUserFromTemplate(
       new RemoveUserFromTemplateRequest()
         .setPermission("admin")
         .setTemplateName("my-new-template")
         .setLogin(LOGIN));
 
-    tester.wsClient().permissions().removeProjectCreatorFromTemplate(
+    tester.wsClient().permissionsOld().removeProjectCreatorFromTemplate(
       RemoveProjectCreatorFromTemplateRequest.builder()
         .setPermission("admin")
         .setTemplateName("my-new-template")
       .build()
     );
 
-    SearchTemplatesWsResponse clearedSearchTemplatesWsResponse = tester.wsClient().permissions().searchTemplates(
+    SearchTemplatesWsResponse clearedSearchTemplatesWsResponse = tester.wsClient().permissionsOld().searchTemplates(
       new SearchTemplatesRequest()
         .setQuery("my-new-template"));
     assertThat(clearedSearchTemplatesWsResponse.getPermissionTemplates(0).getPermissionsList())
index f5149f8c63140ccbbc5b038b2c516d81b15267f0..d88784cd1bed7023c2a54e39893841405d41156a 100644 (file)
@@ -48,8 +48,8 @@ public class PermissionTemplatePageTest {
     String userLogin = tester.users().generateMemberOfDefaultOrganization().getLogin();
     String adminLogin = tester.users().generateAdministratorOnDefaultOrganization().getLogin();
 
-    tester.wsClient().permissions().createTemplate(new CreateTemplateRequest().setName("foo-template"));
-    tester.wsClient().permissions().addUserToTemplate(
+    tester.wsClient().permissionsOld().createTemplate(new CreateTemplateRequest().setName("foo-template"));
+    tester.wsClient().permissionsOld().addUserToTemplate(
       new AddUserToTemplateRequest()
         .setPermission("admin")
         .setTemplateName("foo-template")
@@ -58,7 +58,7 @@ public class PermissionTemplatePageTest {
     ProjectsManagementPage page = tester.openBrowser().logIn().submitCredentials(adminLogin).openProjectsManagement();
     page.shouldHaveProject(project);
     page.bulkApplyPermissionTemplate("foo-template");
-    Permissions.UsersWsResponse usersResponse = tester.wsClient().permissions().users(new UsersRequest()
+    Permissions.UsersWsResponse usersResponse = tester.wsClient().permissionsOld().users(new UsersRequest()
       .setProjectKey(project)
       .setPermission("admin")
     );
index 1f20a5b549a35bfd57071c7c8f6caeef81ed5176..ad7898a3ab754ff2a5e92d07182d7988d6f1c56f 100644 (file)
@@ -90,7 +90,7 @@ public class PermissionTemplateTest {
     CreateWsResponse.User user = tester.users().generateMember(organization);
     CreateWsResponse.User anotherUser = tester.users().generateMember(organization);
     Permissions.PermissionTemplate template = createTemplate(organization).getPermissionTemplate();
-    tester.wsClient().permissions().addUserToTemplate(new AddUserToTemplateRequest()
+    tester.wsClient().permissionsOld().addUserToTemplate(new AddUserToTemplateRequest()
       .setOrganization(organization.getKey())
       .setTemplateId(template.getId())
       .setLogin(user.getLogin())
@@ -99,7 +99,7 @@ public class PermissionTemplateTest {
     Project project2 = createPrivateProject(organization);
     Project untouchedProject = createPrivateProject(organization);
 
-    tester.wsClient().permissions().bulkApplyTemplate(new BulkApplyTemplateRequest()
+    tester.wsClient().permissionsOld().bulkApplyTemplate(new BulkApplyTemplateRequest()
       .setOrganization(organization.getKey())
       .setTemplateId(template.getId())
       .setProjects(Arrays.asList(project1.getKey(), project2.getKey())));
@@ -156,7 +156,7 @@ public class PermissionTemplateTest {
    */
   private void createAndApplyTemplate(Organization organization, Project project, CreateWsResponse.User user) {
     String templateName = "For user";
-    PermissionsService service = tester.wsClient().permissions();
+    PermissionsService service = tester.wsClient().permissionsOld();
     service.createTemplate(new CreateTemplateRequest()
       .setOrganization(organization.getKey())
       .setName(templateName)
@@ -173,7 +173,7 @@ public class PermissionTemplateTest {
   }
 
   private CreateTemplateWsResponse createTemplate(Organization organization) {
-    return tester.wsClient().permissions().createTemplate(new CreateTemplateRequest()
+    return tester.wsClient().permissionsOld().createTemplate(new CreateTemplateRequest()
       .setOrganization(organization.getKey())
       .setName(randomAlphabetic(20)));
   }
@@ -193,7 +193,7 @@ public class PermissionTemplateTest {
   private boolean userHasAccessToIndexedProject(CreateWsResponse.User user, Organization organization, Project project) {
     SearchProjectsRequest request = SearchProjectsRequest.builder().setOrganization(organization.getKey()).build();
     WsClient userSession = tester.as(user.getLogin()).wsClient();
-    return userSession.components().searchProjects(request)
+    return userSession.componentsOld().searchProjects(request)
       .getComponentsList().stream()
       .anyMatch(c -> c.getKey().equals(project.getKey()));
   }
@@ -203,7 +203,7 @@ public class PermissionTemplateTest {
       .setOrganization(organization.getKey())
       .setProjectKey(project.getKey())
       .setPermission("user");
-    Permissions.UsersWsResponse response = tester.wsClient().permissions().users(request);
+    Permissions.UsersWsResponse response = tester.wsClient().permissionsOld().users(request);
     Optional<Permissions.User> found = response.getUsersList().stream()
       .filter(u -> user.getLogin().equals(u.getLogin()))
       .findFirst();
index f2dd1d9a7043c9dbab1bdf11ec0452c4821c96cc..06c86e2947c7fa8972c827d877eb51ea3696b771 100644 (file)
@@ -58,7 +58,7 @@ public class ProvisioningPermissionTest {
   @BeforeClass
   public static void init() {
     // remove default permission "provisioning" from anyone();
-    tester.wsClient().permissions().removeGroup(new RemoveGroupRequest().setGroupName("anyone").setPermission("provisioning"));
+    tester.wsClient().permissionsOld().removeGroup(new RemoveGroupRequest().setGroupName("anyone").setPermission("provisioning"));
 
     tester.users().generate(u -> u.setLogin(ADMIN_WITH_PROVISIONING).setPassword(PASSWORD));
     addUserPermission(ADMIN_WITH_PROVISIONING, "admin");
@@ -77,7 +77,7 @@ public class ProvisioningPermissionTest {
 
   @AfterClass
   public static void restoreData() throws Exception {
-    tester.wsClient().permissions().addGroup(new AddGroupRequest().setGroupName("anyone").setPermission("provisioning"));
+    tester.wsClient().permissionsOld().addGroup(new AddGroupRequest().setGroupName("anyone").setPermission("provisioning"));
   }
 
   /**
@@ -130,10 +130,10 @@ public class ProvisioningPermissionTest {
   }
 
   private static void addUserPermission(String login, String permission) {
-    tester.wsClient().permissions().addUser(new AddUserRequest().setLogin(login).setPermission(permission));
+    tester.wsClient().permissionsOld().addUser(new AddUserRequest().setLogin(login).setPermission(permission));
   }
 
   private static void removeUserPermission(String login, String permission) {
-    tester.wsClient().permissions().removeUser(new RemoveUserRequest().setLogin(login).setPermission(permission));
+    tester.wsClient().permissionsOld().removeUser(new RemoveUserRequest().setLogin(login).setPermission(permission));
   }
 }
index c06e735a0316c91281f779a17b8c97becee4fb03..67dc2382bb98d197374bea3ff20c4b289978c770 100644 (file)
@@ -49,7 +49,7 @@ public class QualityProfileAdminPermissionTest {
 
     tester.users().generate(u -> u.setLogin("not_profileadm").setPassword("userpwd"));
     tester.users().generate(u -> u.setLogin("profileadm").setPassword("papwd"));
-    tester.wsClient().permissions().addUser(new AddUserRequest().setLogin("profileadm").setPermission("profileadmin"));
+    tester.wsClient().permissionsOld().addUser(new AddUserRequest().setLogin("profileadm").setPermission("profileadmin"));
     createProfile("xoo", "foo");
 
     Selenese.runSelenese(orchestrator,
@@ -60,7 +60,7 @@ public class QualityProfileAdminPermissionTest {
   }
 
   private void createProfile(String language, String name) {
-    tester.wsClient().qualityProfiles().create(CreateRequest.builder()
+    tester.wsClient().qualityProfilesOld().create(CreateRequest.builder()
       .setLanguage(language)
       .setName(name)
       .build());
index ccb74e981ec5e9082566bf9d2de40b8b45694b9f..1ba534bf60fe644ff8450508bb7ed0f3dc09f923 100644 (file)
@@ -109,12 +109,12 @@ public class ReportFailureNotificationTest {
     Projects.CreateWsResponse.Project project2 = tester.projects().provision(organization, t -> t.setName("Project2"));
     Projects.CreateWsResponse.Project project3 = tester.projects().provision(organization, t -> t.setName("Project3"));
     // user 1 is admin of project 1 and will subscribe to global notifications
-    tester.wsClient().permissions().addUser(new AddUserRequest()
+    tester.wsClient().permissionsOld().addUser(new AddUserRequest()
       .setLogin(user1.getLogin())
       .setPermission("admin")
       .setProjectKey(project1.getKey()));
     // user 2 is admin of project 2 but won't subscribe to global notifications
-    tester.wsClient().permissions().addUser(new AddUserRequest()
+    tester.wsClient().permissionsOld().addUser(new AddUserRequest()
       .setLogin(user2.getLogin())
       .setPermission("admin")
       .setProjectKey(project2.getKey()));
index a14c73445dfc1644acbc3f52d73e97ed04fb82e1..dbd32671196e6a1fe31d53d03716d0d6bf9f777d 100644 (file)
@@ -53,7 +53,7 @@ public class ComponentsWsTest {
 
   @Test
   public void show() {
-    Components.ShowWsResponse response = tester.wsClient().components().show(new ShowRequest().setKey(FILE_KEY));
+    Components.ShowWsResponse response = tester.wsClient().componentsOld().show(new ShowRequest().setKey(FILE_KEY));
 
     assertThat(response).isNotNull();
     assertThat(response.getComponent().getKey()).isEqualTo(FILE_KEY);
@@ -62,7 +62,7 @@ public class ComponentsWsTest {
 
   @Test
   public void search() {
-    Components.SearchWsResponse response = tester.wsClient().components().search(new SearchRequest()
+    Components.SearchWsResponse response = tester.wsClient().componentsOld().search(new SearchRequest()
       .setQualifiers(singletonList("FIL")));
 
     assertThat(response).isNotNull();
index e5a8aee0e5fbb9fd7ce469ae235e6ec55a7b8bdc..a18c02e679515d680b75de66e667ba21293d31aa 100644 (file)
@@ -86,7 +86,7 @@ public class CommonRulesTest extends AbstractIssueTest {
   }
 
   private List<Issue> findIssues(String componentKey, String ruleKey) {
-    return adminWsClient.issues().search(
+    return adminWsClient.issuesOld().search(
       new SearchRequest()
         .setComponents(singletonList(componentKey))
         .setRules(singletonList(ruleKey)))
index dbb4d6eef173016a0b5c37a64f7563f963ce8a7e..f4a1a4bc3e09aa1eee48b79fb320b2d5eb656c59 100644 (file)
@@ -63,7 +63,7 @@ public class IssueActionTest extends AbstractIssueTest {
 
     this.projectAnalysis = projectAnalysisRule.newProjectAnalysis(projectKey).withQualityProfile(qualityProfileKey);
     this.projectAnalysis.run();
-    this.issuesService = newAdminWsClient(ORCHESTRATOR).issues();
+    this.issuesService = newAdminWsClient(ORCHESTRATOR).issuesOld();
     this.randomIssue = issueRule.getRandomIssue();
   }
 
index 4c4fd88cf2d5f0a5bf508777a7f54768e6492bff..ab9fee0b3f6db0174ae5e6e8595e891aeff86af7 100644 (file)
@@ -69,7 +69,7 @@ public class IssueBulkChangeTest extends AbstractIssueTest {
     String projectKey = projectAnalysisRule.registerProject("shared/xoo-sample");
     this.xooSampleLittleIssuesAnalysis = projectAnalysisRule.newProjectAnalysis(projectKey)
       .withQualityProfile(qualityProfileKey);
-    this.issuesService = newAdminWsClient(ORCHESTRATOR).issues();
+    this.issuesService = newAdminWsClient(ORCHESTRATOR).issuesOld();
   }
 
   @Test
index d96536d1bd1cc18d82c676910e6e7c9fafc88416..cb5a08fd89cdcb69201d5d29aad308e1ab438f0a 100644 (file)
@@ -118,7 +118,7 @@ public class IssueChangelogTest extends AbstractIssueTest {
   }
 
   private static Issues.ChangelogWsResponse changelog(String issueKey) {
-    return adminClient.issues().changelog(issueKey);
+    return adminClient.issuesOld().changelog(issueKey);
   }
 
 }
index c454ab681da28daeb3d456a8559b2a0a46a57ead..c50bd459e953ab9b5446f11c12323fb05a1de85c 100644 (file)
@@ -358,7 +358,7 @@ public class IssueCreationDateQPChangedTest extends AbstractIssueTest {
     private static Date getAnalysisDate(Function<List<ProjectAnalyses.Analysis>, Optional<ProjectAnalyses.Analysis>> chooseItem) {
       return Optional.of(
         ItUtils.newWsClient(ORCHESTRATOR)
-          .projectAnalysis()
+          .projectAnalysisOld()
           .search(SearchRequest.builder().setProject(SAMPLE_PROJECT_KEY).build())
           .getAnalysesList())
         .flatMap(chooseItem)
index a7a8708a382c6df6cb32a760963d6ca5de40d433..88bc4569dbdc0e6b4e3b1cca21775efabfad7610 100644 (file)
@@ -112,7 +112,7 @@ public class IssueFilterOnCommonRulesTest extends AbstractIssueTest {
   }
 
   private List<Issues.Issue> findIssuesByRuleKey(String ruleKey) {
-    return adminWsClient.issues().search(
+    return adminWsClient.issuesOld().search(
       new SearchRequest()
         .setComponents(singletonList(FILE_KEY))
         .setRules(singletonList(ruleKey)))
@@ -120,7 +120,7 @@ public class IssueFilterOnCommonRulesTest extends AbstractIssueTest {
   }
 
   private List<Issues.Issue> findAllIssues() {
-    return adminWsClient.issues().search(new SearchRequest()).getIssuesList();
+    return adminWsClient.issuesOld().search(new SearchRequest()).getIssuesList();
   }
 
 }
index 529191d714593ba64d9ed329c16b3a1354e20629..fc38ee73cefbf85d3673344b45ceb065edc68543 100644 (file)
@@ -174,9 +174,9 @@ public class IssueNotificationsTest {
     clearSmtpMessages();
 
     // Change assignee
-    SearchWsResponse issues = tester.wsClient().issues().search(new SearchRequest().setProjectKeys(singletonList(PROJECT_KEY)));
+    SearchWsResponse issues = tester.wsClient().issuesOld().search(new SearchRequest().setProjectKeys(singletonList(PROJECT_KEY)));
     Issue issue = issues.getIssuesList().get(0);
-    tester.wsClient().issues().assign(new AssignRequest(issue.getKey(), userWithUserRole.getLogin()));
+    tester.wsClient().issuesOld().assign(new AssignRequest(issue.getKey(), userWithUserRole.getLogin()));
 
     // Only the assignee should receive the email
     waitUntilAllNotificationsAreDelivered(1);
@@ -245,18 +245,18 @@ public class IssueNotificationsTest {
     assertThat(smtpServer.getMessages()).hasSize(privateProject ? 2 : 3);
     clearSmtpMessages();
 
-    SearchWsResponse issues = tester.wsClient().issues().search(new SearchRequest().setProjectKeys(singletonList(PROJECT_KEY)));
+    SearchWsResponse issues = tester.wsClient().issuesOld().search(new SearchRequest().setProjectKeys(singletonList(PROJECT_KEY)));
     Issue issue = issues.getIssuesList().get(0);
 
     // bulk change without notification by default
-    tester.wsClient().issues().bulkChange(BulkChangeRequest.builder()
+    tester.wsClient().issuesOld().bulkChange(BulkChangeRequest.builder()
       .setIssues(singletonList(issue.getKey()))
       .setAssign(userWithUserRole.getLogin())
       .setSetSeverity("MINOR")
       .build());
 
     // bulk change with notification
-    tester.wsClient().issues().bulkChange(BulkChangeRequest.builder()
+    tester.wsClient().issuesOld().bulkChange(BulkChangeRequest.builder()
       .setIssues(singletonList(issue.getKey()))
       .setSetSeverity("BLOCKER")
       .setSendNotifications(true)
@@ -306,7 +306,7 @@ public class IssueNotificationsTest {
         .setName("userWithUserRole")
         .setEmail("userWithUserRole@nowhere.com"));
     tester.organizations().addMember(organization, userWithUserRole);
-    tester.wsClient().permissions().addUser(
+    tester.wsClient().permissionsOld().addUser(
       new AddUserRequest()
         .setLogin(userWithUserRole.getLogin())
         .setProjectKey(PROJECT_KEY)
index a6984ddb4eb77a20b5b3fe6876f0c3761c5a1910..0a4e7fbea19a2e88f2580d967815161f2e29b8f9 100644 (file)
@@ -271,7 +271,7 @@ public class IssueSearchTest extends AbstractIssueTest {
   }
 
   private SearchWsResponse searchIssues(SearchRequest request) throws IOException {
-    return newAdminWsClient(ORCHESTRATOR).issues().search(request);
+    return newAdminWsClient(ORCHESTRATOR).issuesOld().search(request);
   }
 
 }
index caf1401cffc9534f1a75659ae40dc837d2aeefcd..571b44399bbdeee6fe63dae4669aed10d2262ca6 100644 (file)
@@ -77,8 +77,8 @@ public class IssueTagsTest {
         .build());
     analyzeProject(organization.getKey(), projectKey);
 
-    String issue = tester.wsClient().issues().search(new SearchRequest()).getIssues(0).getKey();
-    tester.wsClient().issues().setTags(issue, "bla", "blubb");
+    String issue = tester.wsClient().issuesOld().search(new SearchRequest()).getIssues(0).getKey();
+    tester.wsClient().issuesOld().setTags(issue, "bla", "blubb");
 
     String[] publicTags = {"bad-practice", "convention", "pitfall"};
     String[] privateTags = {"bad-practice", "bla", "blubb", "convention", "pitfall"};
@@ -131,7 +131,7 @@ public class IssueTagsTest {
   }
 
   private void grantUserPermission(String projectKey, User member) {
-    tester.wsClient().permissions().addUser(
+    tester.wsClient().permissionsOld().addUser(
       new AddUserRequest()
         .setLogin(member.getLogin())
         .setPermission("user")
@@ -143,7 +143,7 @@ public class IssueTagsTest {
       (List<String>) ItUtils.jsonToMap(
         tester.as(userLogin)
           .wsClient()
-          .issues()
+          .issuesOld()
           .getTags(organization)
           .content())
         .get("tags")).containsExactly(
index 632cfa5d810a0d3240d498aa6945add891a3c117..97e78cff64f17684d815e2103178a0b5194fe7d2 100644 (file)
@@ -214,7 +214,7 @@ public class IssueTrackingTest extends AbstractIssueTest {
   }
 
   private static SearchWsResponse searchIssues(SearchRequest request) {
-    return adminClient.issues().search(request);
+    return adminClient.issuesOld().search(request);
   }
 
 }
index 47db3ad031cee573db259e94b077e730d8cfa3a1..6344124f029d287111b57b380f31ea19376f2cf9 100644 (file)
@@ -54,7 +54,7 @@ public class IssueWorkflowTest extends AbstractIssueTest {
 
   @Before
   public void before() {
-    issuesService = newAdminWsClient(ORCHESTRATOR).issues();
+    issuesService = newAdminWsClient(ORCHESTRATOR).issuesOld();
     String oneIssuePerFileProfileKey = projectAnalysisRule.registerProfile("/issue/IssueWorkflowTest/xoo-one-issue-per-line-profile.xml");
     String analyzedProjectKey = projectAnalysisRule.registerProject("issue/workflow");
     analysisWithIssues = projectAnalysisRule.newProjectAnalysis(analyzedProjectKey).withQualityProfile(oneIssuePerFileProfileKey);
@@ -308,7 +308,7 @@ public class IssueWorkflowTest extends AbstractIssueTest {
   }
 
   private Issues.SearchWsResponse searchIssues(SearchRequest request) {
-    return newAdminWsClient(ORCHESTRATOR).issues().search(request);
+    return newAdminWsClient(ORCHESTRATOR).issuesOld().search(request);
   }
 
 }
index 2f223fe66a1e3cf900dd96b48307bdc3f19ad367..d6a9389ecd813adb9e9593e904fbaf81b510e478 100644 (file)
@@ -127,7 +127,7 @@ public class OrganizationIssueAssignTest {
     provisionAndAnalyseProject("sample2", org2.getKey());
     List<String> issues = issueRule.search(new SearchRequest()).getIssuesList().stream().map(Issue::getKey).collect(Collectors.toList());
 
-    Issues.BulkChangeWsResponse response = tester.wsClient().issues()
+    Issues.BulkChangeWsResponse response = tester.wsClient().issuesOld()
       .bulkChange(BulkChangeRequest.builder().setIssues(issues).setAssign(user.getLogin()).build());
 
     assertThat(response.getIgnored()).isGreaterThan(0);
@@ -204,7 +204,7 @@ public class OrganizationIssueAssignTest {
   }
 
   private void addQualityProfileToProject(String organization, String projectKey) {
-    tester.wsClient().qualityProfiles().addProject(
+    tester.wsClient().qualityProfilesOld().addProject(
       AddProjectRequest.builder()
         .setProjectKey(projectKey)
         .setOrganization(organization)
@@ -214,6 +214,6 @@ public class OrganizationIssueAssignTest {
   }
 
   private Issues.Operation assignIssueTo(Issue issue, User u) {
-    return tester.wsClient().issues().assign(new AssignRequest(issue.getKey(), u.getLogin()));
+    return tester.wsClient().issuesOld().assign(new AssignRequest(issue.getKey(), u.getLogin()));
   }
 }
index 84c4c4c1bf3ca2bf59b8001f99d5a9c15ee731c0..30ace8285e18e24bfad4ae0e32f8bfe718f9ea74 100644 (file)
@@ -63,7 +63,7 @@ public class LiteTest {
   @Test
   public void call_issues_ws() {
     // all issues
-    IssuesService issuesService = tester.wsClient().issues();
+    IssuesService issuesService = tester.wsClient().issuesOld();
     Issues.SearchWsResponse response = issuesService.search(new SearchRequest());
     assertThat(response.getIssuesCount()).isGreaterThan(0);
 
@@ -75,7 +75,7 @@ public class LiteTest {
   @Test
   public void call_components_ws() {
     // files in project
-    Components.TreeWsResponse tree = tester.wsClient().components().tree(new TreeRequest()
+    Components.TreeWsResponse tree = tester.wsClient().componentsOld().tree(new TreeRequest()
       .setBaseComponentKey(PROJECT_KEY)
       .setQualifiers(singletonList("FIL")));
     assertThat(tree.getComponentsCount()).isEqualTo(4);
@@ -88,7 +88,7 @@ public class LiteTest {
   @Test
   public void call_measures_ws() {
     // project measures
-    MeasuresService measuresService = tester.wsClient().measures();
+    MeasuresService measuresService = tester.wsClient().measuresOld();
     Measures.ComponentWsResponse component = measuresService.component(new ComponentRequest()
       .setComponentKey(PROJECT_KEY)
       .setMetricKeys(asList("lines", "ncloc", "files")));
index 71f1460addf4ab21d8abcf220ce3111a9169e549..44a55d60c64851dfeb23a4cb693b42b2b45e02c7 100644 (file)
@@ -59,7 +59,7 @@ public class MeasuresWsTest {
   public void component_tree() {
     scanXooSample();
 
-    ComponentTreeWsResponse response = tester.wsClient().measures().componentTree(new ComponentTreeRequest()
+    ComponentTreeWsResponse response = tester.wsClient().measuresOld().componentTree(new ComponentTreeRequest()
       .setComponent("sample")
       .setMetricKeys(singletonList("ncloc"))
       .setAdditionalFields(asList("metrics", "periods")));
@@ -123,7 +123,7 @@ public class MeasuresWsTest {
   }
 
   private void verifyComponentTreeWithChildren(String baseComponentKey, String... childKeys) {
-    ComponentTreeWsResponse response = tester.wsClient().measures().componentTree(new ComponentTreeRequest()
+    ComponentTreeWsResponse response = tester.wsClient().measuresOld().componentTree(new ComponentTreeRequest()
       .setComponent(baseComponentKey)
       .setMetricKeys(singletonList("ncloc"))
       .setStrategy("children"));
@@ -137,7 +137,7 @@ public class MeasuresWsTest {
   public void component() {
     scanXooSample();
 
-    ComponentWsResponse response = tester.wsClient().measures().component(new ComponentRequest()
+    ComponentWsResponse response = tester.wsClient().measuresOld().component(new ComponentRequest()
       .setComponent("sample")
       .setMetricKeys(singletonList("ncloc"))
       .setAdditionalFields(newArrayList("metrics", "periods")));
index 41ed941920c22d8125bc54cf355cbba82c37d93f..9970b0a8470c76bb2b90d1d2ddaaedbb04770a87 100644 (file)
@@ -102,7 +102,7 @@ public class TimeMachineTest {
   public void noDataForInterval() {
     Date now = new Date();
 
-    SearchHistoryResponse response = tester.wsClient().measures().searchHistory(SearchHistoryRequest.builder()
+    SearchHistoryResponse response = tester.wsClient().measuresOld().searchHistory(SearchHistoryRequest.builder()
       .setComponent(PROJECT_KEY)
       .setMetrics(singletonList("lines"))
       .setFrom(formatDate(now))
@@ -134,7 +134,7 @@ public class TimeMachineTest {
   }
 
   private static SearchHistoryResponse searchHistory(String... metrics) {
-    return tester.wsClient().measures().searchHistory(SearchHistoryRequest.builder()
+    return tester.wsClient().measuresOld().searchHistory(SearchHistoryRequest.builder()
       .setComponent(PROJECT_KEY)
       .setMetrics(Arrays.asList(metrics))
       .build());
index 3ee724c08a4f354834a51096533047c09f94848a..78498fa03a5154d8eb132bbaa13832100cf4a7eb 100644 (file)
@@ -127,7 +127,7 @@ public class BillingTest {
   public void does_not_fail_to_update_default_projects_visibility_to_private() {
     tester.settings().setGlobalSettings("sonar.billing.preventUpdatingProjectsVisibilityToPrivate", "false");
 
-    tester.wsClient().organizations().updateProjectVisibility(UpdateProjectVisibilityRequest.builder()
+    tester.wsClient().organizationsOld().updateProjectVisibility(UpdateProjectVisibilityRequest.builder()
       .setOrganization(organization.getKey())
       .setProjectVisibility("private")
       .build());
@@ -142,7 +142,7 @@ public class BillingTest {
 
     expectHttpError(400,
       format("Organization %s cannot use private project", organization.getKey()),
-      () -> tester.wsClient().organizations()
+      () -> tester.wsClient().organizationsOld()
         .updateProjectVisibility(UpdateProjectVisibilityRequest.builder().setOrganization(organization.getKey()).setProjectVisibility("private").build()));
   }
 
index 27168955514e5c303cf9963b3890142385647dbc..2fcb812f7bf9a152605cd3e99e22fc5d225622d2 100644 (file)
@@ -78,7 +78,7 @@ public class OrganizationMembershipTest {
     User user = tester.users().generate();
     addMembership(organization, user);
 
-    tester.wsClient().permissions().addUser(new AddUserRequest().setLogin(user.getLogin()).setPermission("admin").setOrganization(organization.getKey()));
+    tester.wsClient().permissionsOld().addUser(new AddUserRequest().setLogin(user.getLogin()).setPermission("admin").setOrganization(organization.getKey()));
     tester.organizations().assertThatMemberOf(organization, user);
 
     removeMembership(organization, user);
@@ -91,10 +91,10 @@ public class OrganizationMembershipTest {
     User user = tester.users().generate();
     addMembership(organization, user);
 
-    tester.wsClient().permissions().addUser(new AddUserRequest().setLogin(user.getLogin()).setPermission("admin").setOrganization(organization.getKey()));
+    tester.wsClient().permissionsOld().addUser(new AddUserRequest().setLogin(user.getLogin()).setPermission("admin").setOrganization(organization.getKey()));
     tester.organizations().assertThatMemberOf(organization, user);
     // Admin is the creator of the organization so he was granted with admin permission
-    tester.wsClient().organizations().removeMember(organization.getKey(), "admin");
+    tester.wsClient().organizationsOld().removeMember(organization.getKey(), "admin");
 
     expectedException.expect(HttpException.class);
     expectedException.expectMessage("The last administrator member cannot be removed");
@@ -125,6 +125,6 @@ public class OrganizationMembershipTest {
   }
 
   private void removeMembership(Organization organization, User user) {
-    tester.wsClient().organizations().removeMember(organization.getKey(), user.getLogin());
+    tester.wsClient().organizationsOld().removeMember(organization.getKey(), user.getLogin());
   }
 }
index 8995f90a42d9b26c52c7238d3699f756d2b5a7cb..462e4b2f1eefaec6f5330b4a5c7ca6d5a30c41e2 100644 (file)
@@ -206,7 +206,7 @@ public class OrganizationTest {
       "sonar.organization", organization.getKey(),
       "sonar.login", user.getLogin(),
       "sonar.password", user.getLogin());
-    ComponentsService componentsService = tester.as(user.getLogin()).wsClient().components();
+    ComponentsService componentsService = tester.as(user.getLogin()).wsClient().componentsOld();
     assertThat(searchSampleProject(organization.getKey(), componentsService).getComponentsList()).hasSize(1);
   }
 
@@ -222,7 +222,7 @@ public class OrganizationTest {
       assertThat(e.getResult().getLogs()).contains("Insufficient privileges");
     }
 
-    ComponentsService componentsService = tester.wsClient().components();
+    ComponentsService componentsService = tester.wsClient().componentsOld();
     assertThat(searchSampleProject(organization.getKey(), componentsService).getComponentsCount()).isEqualTo(0);
   }
 
@@ -232,12 +232,12 @@ public class OrganizationTest {
 
     runProjectAnalysis(orchestrator, "shared/xoo-sample", "sonar.organization", organization.getKey(), "sonar.login", "admin", "sonar.password", "admin");
 
-    ComponentsService componentsService = tester.asAnonymous().wsClient().components();
+    ComponentsService componentsService = tester.asAnonymous().wsClient().componentsOld();
     assertThat(searchSampleProject(organization.getKey(), componentsService).getComponentsList()).hasSize(1);
   }
 
   private void addPermissionsToUser(String orgKeyAndName, String login, String permission, String... otherPermissions) {
-    PermissionsService permissionsService = tester.wsClient().permissions();
+    PermissionsService permissionsService = tester.wsClient().permissionsOld();
     permissionsService.addUser(new AddUserRequest().setLogin(login).setOrganization(orgKeyAndName).setPermission(permission));
     for (String otherPermission : otherPermissions) {
       permissionsService.addUser(new AddUserRequest().setLogin(login).setOrganization(orgKeyAndName).setPermission(otherPermission));
@@ -252,7 +252,7 @@ public class OrganizationTest {
       "sonar.organization", organization.getKey(),
       "sonar.login", "admin",
       "sonar.password", "admin");
-    ComponentsService componentsService = tester.wsClient().components();
+    ComponentsService componentsService = tester.wsClient().componentsOld();
     assertThat(searchSampleProject(organization.getKey(), componentsService).getComponentsList()).hasSize(1);
 
     tester.organizations().service().delete(organization.getKey());
@@ -341,7 +341,7 @@ public class OrganizationTest {
   private void assertThatBuiltInQualityProfilesExist(Organization org) {
     org.sonarqube.ws.client.qualityprofile.SearchRequest profilesRequest = new org.sonarqube.ws.client.qualityprofile.SearchRequest()
       .setOrganizationKey(org.getKey());
-    Qualityprofiles.SearchWsResponse response = tester.wsClient().qualityProfiles().search(profilesRequest);
+    Qualityprofiles.SearchWsResponse response = tester.wsClient().qualityProfilesOld().search(profilesRequest);
     assertThat(response.getProfilesCount()).isGreaterThan(0);
 
     response.getProfilesList().forEach(p -> {
@@ -362,7 +362,7 @@ public class OrganizationTest {
   }
 
   private void assertThatQualityProfilesDoNotExist(Organization org) {
-    expectNotFoundError(() -> tester.wsClient().qualityProfiles().search(
+    expectNotFoundError(() -> tester.wsClient().qualityProfilesOld().search(
       new org.sonarqube.ws.client.qualityprofile.SearchRequest().setOrganizationKey(org.getKey())));
   }
 }
index ac98f4e7d423dc86d0d5537a4aeeceb8b03470f3..aeaf297a8445b970cf43a64811611b249e3ae1f5 100644 (file)
@@ -52,7 +52,7 @@ public class PersonalOrganizationTest {
   public void personal_organizations_are_created_for_new_users() {
     Users.CreateWsResponse.User user = tester.users().generate();
 
-    List<Organizations.Organization> existing = tester.wsClient().organizations().search(SearchRequest.builder().build()).getOrganizationsList();
+    List<Organizations.Organization> existing = tester.wsClient().organizationsOld().search(SearchRequest.builder().build()).getOrganizationsList();
     assertThat(existing)
       .filteredOn(Organizations.Organization::getGuarded)
       .filteredOn(o -> o.getKey().equals(user.getLogin()))
index 0ded98c31a33f5e8a5a7d4bca36aa344ae0f1ef5..f0e6590a6e04af9a899d5e37f6bbbcf4a3dfcfd6 100644 (file)
@@ -80,7 +80,7 @@ public class DuplicationTest extends AbstractPerfTest {
   }
 
   private Map<String, Double> getMeasures(String key) {
-    return newWsClient().measures().component(new ComponentRequest()
+    return newWsClient().measuresOld().component(new ComponentRequest()
       .setComponentKey(key)
       .setMetricKeys(asList("duplicated_lines", "duplicated_blocks", "duplicated_files", "duplicated_lines_density")))
       .getComponent().getMeasuresList()
index 770e83b819283997d47bfaa1fc36e24d5c09ba33..6b5a48383a4d431a4eeb0f4e9b6aef05f164a5b2 100644 (file)
@@ -68,7 +68,7 @@ public class ProjectBulkDeletionPageTest {
     $(".modal button").click();
     $("#projects-management-page").shouldNotHave(text(project1.getName())).shouldNotHave(text(project3.getName()));
 
-    assertThat(tester.wsClient().components().searchProjects(SearchProjectsRequest.builder().build())
+    assertThat(tester.wsClient().componentsOld().searchProjects(SearchProjectsRequest.builder().build())
       .getComponentsCount()).isEqualTo(1);
   }
 }
index be1b0b441e67688a180baf060e90735845c436ee..8216d8897da251fca5bad699b330e7bf212d80fd 100644 (file)
@@ -202,7 +202,7 @@ public class ProjectDeletionTest {
    * Projects page - api/components/search_projects - uses ES + DB
    */
   private boolean isInComponentSearchProjects(String name) {
-    Components.SearchProjectsWsResponse response = tester.wsClient().components().searchProjects(
+    Components.SearchProjectsWsResponse response = tester.wsClient().componentsOld().searchProjects(
       SearchProjectsRequest.builder().setFilter("query=\"" + name + "\"").build());
     return response.getComponentsCount() > 0;
   }
index 95f4a73fdbcca073b4c66171ad1ff97988c85e6c..3972f771c7807ac9a2e9dbe74580afb3a3fb641b 100644 (file)
@@ -291,7 +291,7 @@ public class ProjectFilterTest {
   }
 
   private SearchProjectsWsResponse searchProjects(SearchProjectsRequest request) throws IOException {
-    return tester.wsClient().components().searchProjects(request);
+    return tester.wsClient().componentsOld().searchProjects(request);
   }
 
   private void verifyFilterMatches(String projectKey, String filter) throws IOException {
index d209d9154f5ab530db721601f82284d62eb748f5..2ab5e74158d88ad3d206e7df77afcac37e1549a7 100644 (file)
@@ -71,7 +71,7 @@ public class ProjectKeyUpdateTest {
   public void update_key() {
     analyzeXooSample();
     String newProjectKey = "another_project_key";
-    Components.Component project = tester.wsClient().components().show(new ShowRequest().setKey(PROJECT_KEY)).getComponent();
+    Components.Component project = tester.wsClient().componentsOld().show(new ShowRequest().setKey(PROJECT_KEY)).getComponent();
     assertThat(project.getKey()).isEqualTo(PROJECT_KEY);
 
     tester.wsClient().projects().updateKey(UpdateKeyRequest.builder()
@@ -79,14 +79,14 @@ public class ProjectKeyUpdateTest {
       .setNewKey(newProjectKey)
       .build());
 
-    assertThat(tester.wsClient().components().show(new ShowRequest().setId(project.getId())).getComponent().getKey()).isEqualTo(newProjectKey);
+    assertThat(tester.wsClient().componentsOld().show(new ShowRequest().setId(project.getId())).getComponent().getKey()).isEqualTo(newProjectKey);
   }
 
   @Test
   public void bulk_update_key() {
     analyzeXooSample();
     String newProjectKey = "another_project_key";
-    Components.Component project = tester.wsClient().components().show(new ShowRequest().setKey(PROJECT_KEY)).getComponent();
+    Components.Component project = tester.wsClient().componentsOld().show(new ShowRequest().setKey(PROJECT_KEY)).getComponent();
     assertThat(project.getKey()).isEqualTo(PROJECT_KEY);
 
     Projects.BulkUpdateKeyWsResponse result = tester.wsClient().projects().bulkUpdateKey(BulkUpdateKeyRequest.builder()
@@ -95,7 +95,7 @@ public class ProjectKeyUpdateTest {
       .setTo(newProjectKey)
       .build());
 
-    assertThat(tester.wsClient().components().show(new ShowRequest().setId(project.getId())).getComponent().getKey()).isEqualTo(newProjectKey);
+    assertThat(tester.wsClient().componentsOld().show(new ShowRequest().setId(project.getId())).getComponent().getKey()).isEqualTo(newProjectKey);
     assertThat(result.getKeysCount()).isEqualTo(1);
     assertThat(result.getKeys(0))
       .extracting(Projects.BulkUpdateKeyWsResponse.Key::getKey, Projects.BulkUpdateKeyWsResponse.Key::getNewKey, Projects.BulkUpdateKeyWsResponse.Key::getDuplicate)
@@ -254,7 +254,7 @@ public class ProjectKeyUpdateTest {
    */
   @CheckForNull
   private String keyInComponentSearchProjects(String name) {
-    Components.SearchProjectsWsResponse response = tester.wsClient().components().searchProjects(
+    Components.SearchProjectsWsResponse response = tester.wsClient().componentsOld().searchProjects(
       SearchProjectsRequest.builder().setFilter("query=\"" + name + "\"").build());
     if (response.getComponentsCount() > 0) {
       return response.getComponents(0).getKey();
index 4eb51516718a003909ec009faa217e1b1192ff38..1faa8d031e35f2722a69f130a90d89a15bb8cdfb 100644 (file)
@@ -109,7 +109,7 @@ public class ProjectProvisioningTest {
    * Projects page - api/components/search_projects - uses ES + DB
    */
   private boolean isInComponentSearchProjects(String name) {
-    Components.SearchProjectsWsResponse response = tester.wsClient().components().searchProjects(
+    Components.SearchProjectsWsResponse response = tester.wsClient().componentsOld().searchProjects(
       SearchProjectsRequest.builder().setFilter("query=\"" + name + "\"").build());
     return response.getComponentsCount() > 0;
   }
index cc7546065c2633b2081d924fabcafbb145ce6f4b..0f9c90fb04e3533c85f667306f62a2aa6bd21b6f 100644 (file)
@@ -57,7 +57,7 @@ public class ProjectVisibilityPageTest {
     orchestrator.executeBuild(SonarScanner.create(projectDir("shared/xoo-sample")).setProperties("sonar.projectKey", "sample2"));
     tester.wsClient().projects().updateVisibility(UpdateVisibilityRequest.builder().setProject("sample2").setVisibility("private").build());
     // Remove 'Admin' permission for admin group on project 2 -> No one can access or admin this project, expect System Admin
-    tester.wsClient().permissions().removeGroup(new RemoveGroupRequest().setProjectKey("sample2").setGroupName("sonar-administrators").setPermission("admin"));
+    tester.wsClient().permissionsOld().removeGroup(new RemoveGroupRequest().setProjectKey("sample2").setGroupName("sonar-administrators").setPermission("admin"));
 
     tester.openBrowser().logIn().submitCredentials(adminUser)
       .openProjectsManagement("default-organization")
@@ -84,7 +84,7 @@ public class ProjectVisibilityPageTest {
       .createProject("foo", "foo", visibility)
       .shouldHaveProjectsCount(1);
 
-    Components.SearchProjectsWsResponse response = newAdminWsClient(orchestrator).components().searchProjects(
+    Components.SearchProjectsWsResponse response = newAdminWsClient(orchestrator).componentsOld().searchProjects(
       SearchProjectsRequest.builder().build());
     assertThat(response.getComponentsCount()).isEqualTo(1);
     assertThat(response.getComponents(0).getKey()).isEqualTo("foo");
index 30fff3e754559b52b83f28738f1864eec2c910ed..2cf644cfaa1e8189139200dfccad06c9c62a0b04 100644 (file)
@@ -59,7 +59,7 @@ public class OrganizationQualityGateUiTest {
     organization = tester.organizations().generate();
     gateAdmin = tester.users().generate();
     tester.organizations().addMember(tester.organizations().getDefaultOrganization(), gateAdmin);
-    tester.wsClient().permissions().addUser(new AddUserRequest().setLogin(gateAdmin.getLogin()).setPermission("gateadmin"));
+    tester.wsClient().permissionsOld().addUser(new AddUserRequest().setLogin(gateAdmin.getLogin()).setPermission("gateadmin"));
     user = tester.users().generate();
     tester.organizations().addMember(organization, user);
     restoreProfile(orchestrator, getClass().getResource("/issue/with-many-rules.xml"), organization.getKey());
index 718ef39a60197c242bd05a3893c74c485ace2701..708af300823f69fbfd74eb33b6af872e2c4f97bd 100644 (file)
@@ -256,7 +256,7 @@ public class QualityGateTest {
     // user is quality gate admin of default organization
     Organization organization = tester.organizations().getDefaultOrganization();
     Users.CreateWsResponse.User user = tester.users().generateMember(organization);
-    tester.wsClient().permissions().addUser(new AddUserRequest().setLogin(user.getLogin()).setPermission("gateadmin").setOrganization(organization.getKey()));
+    tester.wsClient().permissionsOld().addUser(new AddUserRequest().setLogin(user.getLogin()).setPermission("gateadmin").setOrganization(organization.getKey()));
     TesterSession qGateAdminTester = tester.as(user.getLogin());
     QualitygatesService qGateService = qGateAdminTester.qGates().service();
     // perform administration operations
index 6e2ef0c067459e9c963c7827acd7a6e2a2e86ac7..3ecb8d97e7072a90b95a98099ab4ec8389e9ae51 100644 (file)
@@ -58,7 +58,7 @@ public class TechnicalDebtInIssueChangelogTest {
     orchestrator.executeBuild(SonarScanner.create(projectDir("shared/xoo-sample"))
       .setProperties("sonar.oneIssuePerFile.effortToFix", "10"));
 
-    Issues.Issue firstIssue = tester.wsClient().issues().search(new SearchRequest()).getIssues(0);
+    Issues.Issue firstIssue = tester.wsClient().issuesOld().search(new SearchRequest()).getIssues(0);
 
     List<Issues.ChangelogWsResponse.Changelog> changes = changelog(firstIssue.getKey()).getChangelogList();
     assertThat(changes).hasSize(1);
@@ -68,7 +68,7 @@ public class TechnicalDebtInIssueChangelogTest {
   }
 
   private Issues.ChangelogWsResponse changelog(String issueKey) {
-    return tester.wsClient().issues().changelog(issueKey);
+    return tester.wsClient().issuesOld().changelog(issueKey);
   }
 
 }
index 24d60d3b88a8ebbc69562b3d4f26afe20152c3f1..a941680436ee18798c9b127391e3f2f34e379389 100644 (file)
@@ -54,7 +54,7 @@ public class TechnicalDebtTest {
     orchestrator.executeBuild(SonarScanner.create(projectDir("shared/xoo-sample")));
 
     // All the issues should have a technical debt
-    List<Issues.Issue> issues = tester.wsClient().issues().search(new SearchRequest()).getIssuesList();
+    List<Issues.Issue> issues = tester.wsClient().issuesOld().search(new SearchRequest()).getIssuesList();
     assertThat(issues).isNotEmpty();
     for (Issues.Issue issue : issues) {
       assertThat(issue.getDebt()).isEqualTo("1min");
index ef08e8e8317266f5fc4049ae093eb55c878800ae..c857eab45bd3c499fd70b0a482c6711d40d3b826 100644 (file)
@@ -77,7 +77,7 @@ public class BuiltInQualityProfilesNotificationTest {
     userRule = UserRule.from(orchestrator);
     Users.CreateWsResponse.User profileAdmin1 = userRule.generate();
     WsClient wsClient = ItUtils.newAdminWsClient(orchestrator);
-    wsClient.permissions().addUser(new AddUserRequest().setLogin(profileAdmin1.getLogin()).setPermission("profileadmin"));
+    wsClient.permissionsOld().addUser(new AddUserRequest().setLogin(profileAdmin1.getLogin()).setPermission("profileadmin"));
 
     orchestrator.restartServer();
 
@@ -100,19 +100,19 @@ public class BuiltInQualityProfilesNotificationTest {
     // Create a quality profile administrator (user having direct permission)
     Users.CreateWsResponse.User profileAdmin1 = userRule.generate();
     WsClient wsClient = ItUtils.newAdminWsClient(orchestrator);
-    wsClient.permissions().addUser(new AddUserRequest().setLogin(profileAdmin1.getLogin()).setPermission("profileadmin"));
+    wsClient.permissionsOld().addUser(new AddUserRequest().setLogin(profileAdmin1.getLogin()).setPermission("profileadmin"));
     // Create a quality profile administrator (user having permission from a group)
     Users.CreateWsResponse.User profileAdmin2 = userRule.generate();
     String groupName = randomAlphanumeric(20);
     wsClient.wsConnector().call(new PostRequest("api/user_groups/create").setParam("name", groupName)).failIfNotSuccessful();
-    wsClient.permissions().addGroup(new AddGroupRequest().setPermission("profileadmin").setGroupName(groupName));
+    wsClient.permissionsOld().addGroup(new AddGroupRequest().setPermission("profileadmin").setGroupName(groupName));
     wsClient.wsConnector().call(new PostRequest("api/user_groups/add_user").setParam("name", groupName).setParam("login", profileAdmin2.getLogin())).failIfNotSuccessful();
     // Create a user not being quality profile administrator
     Users.CreateWsResponse.User noProfileAdmin = userRule.generate();
 
     // Create a child profile on the built-in profile => The notification should not take into account updates of this profile
-    wsClient.qualityProfiles().create(CreateRequest.builder().setLanguage("foo").setName("child").build());
-    wsClient.qualityProfiles().changeParent(ChangeParentRequest.builder().setProfileName("child").setParentName("Basic").setLanguage("foo").build());
+    wsClient.qualityProfilesOld().create(CreateRequest.builder().setLanguage("foo").setName("child").build());
+    wsClient.qualityProfilesOld().changeParent(ChangeParentRequest.builder().setProfileName("child").setParentName("Basic").setLanguage("foo").build());
 
     // uninstall plugin V1
     wsClient.wsConnector().call(new PostRequest("api/plugins/uninstall").setParam("key", "foo")).failIfNotSuccessful();
@@ -156,7 +156,7 @@ public class BuiltInQualityProfilesNotificationTest {
     userRule = UserRule.from(orchestrator);
     Users.CreateWsResponse.User profileAdmin1 = userRule.generate();
     WsClient wsClient = ItUtils.newAdminWsClient(orchestrator);
-    wsClient.permissions().addUser(new AddUserRequest().setLogin(profileAdmin1.getLogin()).setPermission("profileadmin"));
+    wsClient.permissionsOld().addUser(new AddUserRequest().setLogin(profileAdmin1.getLogin()).setPermission("profileadmin"));
 
     // uninstall plugin V1
     wsClient.wsConnector().call(new PostRequest("api/plugins/uninstall").setParam("key", "foo")).failIfNotSuccessful();
index d9445e5896d76611944c70e99b3e643aef54c680..83c7f9e7b51a2e2328f01142365d63e37088a873 100644 (file)
@@ -184,7 +184,7 @@ public class OrganizationQualityProfilesUiTest {
   }
 
   private void inheritProfile(String language, String name, String parentName) {
-    tester.wsClient().qualityProfiles().changeParent(ChangeParentRequest.builder()
+    tester.wsClient().qualityProfilesOld().changeParent(ChangeParentRequest.builder()
       .setLanguage(language)
       .setProfileName(name)
       .setParentName(parentName)
@@ -200,7 +200,7 @@ public class OrganizationQualityProfilesUiTest {
   }
 
   private void addProfileToProject(String language, String profileName, String projectKey) {
-    tester.wsClient().qualityProfiles().addProject(AddProjectRequest.builder()
+    tester.wsClient().qualityProfilesOld().addProject(AddProjectRequest.builder()
       .setLanguage(language)
       .setQualityProfile(profileName)
       .setProjectKey(projectKey)
index 9598bb0432fa8992dfd414cfb18cd2ea85c1b35d..4d9b88c18cd6a8b526ae0ad70310568f30cd99e8 100644 (file)
@@ -226,7 +226,7 @@ public class QualityProfilesEditTest {
     Organization organization = tester.organizations().generate();
     User user = tester.users().generateMember(organization);
     CreateWsResponse.QualityProfile xooProfile = tester.qProfiles().createXooProfile(organization);
-    tester.wsClient().permissions().addUser(new AddUserRequest().setOrganization(organization.getKey()).setLogin(user.getLogin()).setPermission("profileadmin"));
+    tester.wsClient().permissionsOld().addUser(new AddUserRequest().setOrganization(organization.getKey()).setLogin(user.getLogin()).setPermission("profileadmin"));
 
     SearchWsResponse result = tester.as(user.getLogin())
       .qProfiles().service().search(new SearchRequest().setOrganizationKey(organization.getKey()));
index 47249a3138cb700e5b6de61bda0de477e75611ca..71ff0ad3755ea3e9a38f472ed0cc5cf21381ad8d 100644 (file)
@@ -154,14 +154,14 @@ public class QualityProfilesUiTest {
   }
 
   private void createProfile(String language, String name) {
-    tester.wsClient().qualityProfiles().create(CreateRequest.builder()
+    tester.wsClient().qualityProfilesOld().create(CreateRequest.builder()
       .setLanguage(language)
       .setName(name)
       .build());
   }
 
   private void inheritProfile(String language, String name, String parentName) {
-    tester.wsClient().qualityProfiles().changeParent(ChangeParentRequest.builder()
+    tester.wsClient().qualityProfilesOld().changeParent(ChangeParentRequest.builder()
       .setLanguage(language)
       .setProfileName(name)
       .setParentName(parentName)
@@ -173,7 +173,7 @@ public class QualityProfilesUiTest {
   }
 
   private void addProfileToProject(String language, String profileName, String projectKey) {
-    tester.wsClient().qualityProfiles().addProject(AddProjectRequest.builder()
+    tester.wsClient().qualityProfilesOld().addProject(AddProjectRequest.builder()
       .setLanguage(language)
       .setQualityProfile(profileName)
       .setProjectKey(projectKey)
index f78378975563fd126f13eab1ac010dc86475b77a..e39af31e2c006bc5279204e967d7b038346dcda8 100644 (file)
@@ -133,7 +133,7 @@ public class QualityProfilesWsTest {
     Organization org = tester.organizations().generate();
     CreateWsResponse.QualityProfile profile = tester.qProfiles().createXooProfile(org);
 
-    String changelog = tester.wsClient().qualityProfiles().changelog(ChangelogRequest.builder()
+    String changelog = tester.wsClient().qualityProfilesOld().changelog(ChangelogRequest.builder()
       .setOrganization(org.getKey())
       .setLanguage(profile.getLanguage())
       .setQualityProfile(profile.getName())
@@ -143,14 +143,14 @@ public class QualityProfilesWsTest {
     tester.qProfiles().activateRule(profile, RULE_ONE_BUG_PER_LINE);
     tester.qProfiles().activateRule(profile, RULE_ONE_ISSUE_PER_LINE);
 
-    String changelog2 = tester.wsClient().qualityProfiles().changelog(ChangelogRequest.builder()
+    String changelog2 = tester.wsClient().qualityProfilesOld().changelog(ChangelogRequest.builder()
       .setOrganization(org.getKey())
       .setLanguage(profile.getLanguage())
       .setQualityProfile(profile.getName())
       .build());
     JSONAssert.assertEquals(EXPECTED_CHANGELOG, changelog2, JSONCompareMode.LENIENT);
 
-    String changelog3 = tester.wsClient().qualityProfiles().changelog(ChangelogRequest.builder()
+    String changelog3 = tester.wsClient().qualityProfilesOld().changelog(ChangelogRequest.builder()
       .setOrganization(org.getKey())
       .setLanguage(profile.getLanguage())
       .setQualityProfile(profile.getName())
index d312aa09a3c69cfafc2cf228f7e7b5e58bce6f31..efea4d8615a144633df47c72c0463586b817b882 100644 (file)
@@ -116,7 +116,7 @@ public class LogsTest {
 
   private void generateSqlAndEsLogsInWebAndCe() {
     orchestrator.executeBuild(SonarScanner.create(projectDir("shared/xoo-sample")));
-    ItUtils.newAdminWsClient(orchestrator).issues().search(new SearchRequest()
+    ItUtils.newAdminWsClient(orchestrator).issuesOld().search(new SearchRequest()
       .setProjectKeys(Collections.singletonList("sample")));
   }
 
index 17bf67767464729b482db0f88a4998ae355a34d5..a3f4c86e5885b3128442272e6a8d31957837b195 100644 (file)
@@ -97,7 +97,7 @@ public class RestartTest {
   private void createSystemAdministrator(String login, String password) {
     WsClient wsClient = newAdminWsClient(orchestrator);
     createNonSystemAdministrator(wsClient, login, password);
-    wsClient.permissions().addUser(new AddUserRequest().setLogin(login).setPermission("admin"));
+    wsClient.permissionsOld().addUser(new AddUserRequest().setLogin(login).setPermission("admin"));
   }
 
   private void createNonSystemAdministrator(String login, String password) {
index 35741444b28bf869e30474c8f2bb0f8f0b6a9513..5cc0d4cee0090b3a70e0c45189dff8e7620f2214 100644 (file)
@@ -81,7 +81,7 @@ public class SettingsTest {
     userRule.createUser("scanner-user", "scanner-user");
     adminWsClient = newAdminWsClient(orchestrator);
     // Remove 'Execute Analysis' permission from anyone
-    adminWsClient.permissions().removeGroup(new RemoveGroupRequest().setGroupName("anyone").setPermission("scan"));
+    adminWsClient.permissionsOld().removeGroup(new RemoveGroupRequest().setGroupName("anyone").setPermission("scan"));
 
     // Anonymous user, without 'Execute Analysis' permission
     anonymousSettingsService = newWsClient(orchestrator).settings();
@@ -90,7 +90,7 @@ public class SettingsTest {
     userSettingsService = newUserWsClient(orchestrator, "setting-user", "setting-user").settings();
 
     // User with 'Execute Analysis' permission
-    adminWsClient.permissions().addUser(new AddUserRequest().setLogin("scanner-user").setPermission("scan"));
+    adminWsClient.permissionsOld().addUser(new AddUserRequest().setLogin("scanner-user").setPermission("scan"));
     scanSettingsService = newUserWsClient(orchestrator, "scanner-user", "scanner-user").settings();
 
     // User with 'Administer System' permission but without 'Execute Analysis' permission
@@ -101,7 +101,7 @@ public class SettingsTest {
   public static void tearDown() throws Exception {
     userRule.deactivateUsers("setting-user", "scanner-user");
     // Restore 'Execute Analysis' permission to anyone
-    adminWsClient.permissions().addGroup(new AddGroupRequest().setGroupName("anyone").setPermission("scan"));
+    adminWsClient.permissionsOld().addGroup(new AddGroupRequest().setGroupName("anyone").setPermission("scan"));
   }
 
   @After
index 9f5f1a87b9facc7a6b4c38a2da2e4b73e6f6af1c..f929798ec846058d56a5c7e953845724376b4581 100644 (file)
@@ -198,7 +198,7 @@ public class UpgradeTest {
   }
 
   private int countFiles(String key) {
-    Measure measure = newWsClient(orchestrator).measures().component(new ComponentRequest().setComponentKey(key).setMetricKeys(Collections.singletonList("files")))
+    Measure measure = newWsClient(orchestrator).measuresOld().component(new ComponentRequest().setComponentKey(key).setMetricKeys(Collections.singletonList("files")))
       .getComponent().getMeasures(0);
     return parseInt(measure.getValue());
   }
index 7e9a294fc49d2b6b9a6ae09547cc9b6a2e243cb2..051483275f1166bab3b43119e0094d0e84dbeba1 100644 (file)
@@ -125,7 +125,7 @@ public class OAuth2IdentityProviderTest {
     enablePlugin();
     tester.users().generate(u -> u.setLogin(USER_LOGIN));
     // Give user global admin permission as we want to go to a page where authentication is required
-    tester.wsClient().permissions().addUser(new AddUserRequest().setLogin(USER_LOGIN).setPermission("admin"));
+    tester.wsClient().permissionsOld().addUser(new AddUserRequest().setLogin(USER_LOGIN).setPermission("admin"));
 
     Navigation nav = tester.openBrowser();
     // Try to go to the settings page
index d3edfa5b92af2f4360ed18452ace560ed0e4c764..0fdfabbdaed21f6e08321d33949a4bf6daf5e509 100644 (file)
@@ -83,7 +83,7 @@ public class OrganizationIdentityProviderTest {
     Group group = tester.groups().generate(null);
     User user = tester.users().generate();
     // Add user as member of default organization
-    tester.wsClient().organizations().addMember("default-organization", user.getLogin());
+    tester.wsClient().organizationsOld().addMember("default-organization", user.getLogin());
     tester.groups().assertThatUserIsMemberOf(null, user.getLogin(), "Members");
     enableUserCreationByAuthPlugin(user.getLogin());
     // No group is returned by the plugin
index 9d09abf7dfb26f50cddfb7266547aa8aeb59d8ad..6ac8775f63587e67bd2ff46df5875fb4fbf52a55 100644 (file)
@@ -334,7 +334,7 @@ public class ItUtils {
   }
 
   private static Stream<Measure> getStreamMeasures(Orchestrator orchestrator, String componentKey, String... metricKeys) {
-    return newWsClient(orchestrator).measures().component(new ComponentRequest()
+    return newWsClient(orchestrator).measuresOld().component(new ComponentRequest()
       .setComponent(componentKey)
       .setMetricKeys(asList(metricKeys)))
       .getComponent().getMeasuresList()
@@ -343,7 +343,7 @@ public class ItUtils {
 
   @CheckForNull
   public static Measure getMeasureWithVariation(Orchestrator orchestrator, String componentKey, String metricKey) {
-    Measures.ComponentWsResponse response = newWsClient(orchestrator).measures().component(new ComponentRequest()
+    Measures.ComponentWsResponse response = newWsClient(orchestrator).measuresOld().component(new ComponentRequest()
       .setComponent(componentKey)
       .setMetricKeys(singletonList(metricKey))
       .setAdditionalFields(singletonList("periods")));
@@ -353,7 +353,7 @@ public class ItUtils {
 
   @CheckForNull
   public static Map<String, Measure> getMeasuresWithVariationsByMetricKey(Orchestrator orchestrator, String componentKey, String... metricKeys) {
-    return newWsClient(orchestrator).measures().component(new ComponentRequest()
+    return newWsClient(orchestrator).measuresOld().component(new ComponentRequest()
       .setComponentKey(componentKey)
       .setMetricKeys(asList(metricKeys))
       .setAdditionalFields(singletonList("periods"))).getComponent().getMeasuresList()
@@ -373,7 +373,7 @@ public class ItUtils {
   @CheckForNull
   public static Component getComponent(Orchestrator orchestrator, String componentKey) {
     try {
-      return newWsClient(orchestrator).components().show(new ShowRequest().setKey((componentKey))).getComponent();
+      return newWsClient(orchestrator).componentsOld().show(new ShowRequest().setKey((componentKey))).getComponent();
     } catch (org.sonarqube.ws.client.HttpException e) {
       if (e.code() == 404) {
         return null;
@@ -403,7 +403,7 @@ public class ItUtils {
       throw new IllegalArgumentException("Cannot find quality profile xml file '" + resource + "' in classpath");
     }
     newAdminWsClient(orchestrator)
-      .qualityProfiles()
+      .qualityProfilesOld()
       .restoreProfile(
         RestoreRequest.builder()
           .setBackup(new File(uri))
index c055a2b43851a6f3ea8674d939488cf41dddebaf..0d1b750b7f3b28836e4b48d1db0ce50458702c15 100644 (file)
@@ -48,7 +48,7 @@ public class IssueRule extends ExternalResource {
   }
 
   public SearchWsResponse search(SearchRequest request) {
-    return adminWsClient().issues().search(request);
+    return adminWsClient().issuesOld().search(request);
   }
 
   public Issue getRandomIssue() {
index 9c2db03e6e7458c1e3bed9bee0a94c114b097107..ed409b211394a52ecbc0d58b4d208287dfeb29f6 100644 (file)
@@ -147,7 +147,7 @@ public class UserRule extends ExternalResource implements GroupManagement {
 
   public String createAdminUser(String login, String password) {
     createUser(login, password);
-    adminWsClient.permissions().addUser(new AddUserRequest().setLogin(login).setPermission("admin"));
+    adminWsClient.permissionsOld().addUser(new AddUserRequest().setLogin(login).setPermission("admin"));
     adminWsClient.userGroups().addUser(new org.sonarqube.ws.client.usergroups.AddUserRequest().setLogin(login).setName("sonar-administrators"));
     return login;
   }