Browse Source

Rename WsPermissionParameters to PermissionsWsParameters

tags/5.2-RC1
Teryk Bellahsene 8 years ago
parent
commit
266d66ca1c
44 changed files with 158 additions and 158 deletions
  1. 1
    1
      server/sonar-server/src/main/java/org/sonar/server/component/ws/SearchAction.java
  2. 4
    4
      server/sonar-server/src/main/java/org/sonar/server/permission/ws/AddGroupAction.java
  3. 3
    3
      server/sonar-server/src/main/java/org/sonar/server/permission/ws/AddUserAction.java
  4. 1
    1
      server/sonar-server/src/main/java/org/sonar/server/permission/ws/DeleteTemplateAction.java
  5. 2
    2
      server/sonar-server/src/main/java/org/sonar/server/permission/ws/GroupsAction.java
  6. 2
    2
      server/sonar-server/src/main/java/org/sonar/server/permission/ws/PermissionRequest.java
  7. 3
    3
      server/sonar-server/src/main/java/org/sonar/server/permission/ws/PermissionRequestValidator.java
  8. 2
    2
      server/sonar-server/src/main/java/org/sonar/server/permission/ws/PermissionsWsParameters.java
  9. 4
    4
      server/sonar-server/src/main/java/org/sonar/server/permission/ws/RemoveGroupAction.java
  10. 3
    3
      server/sonar-server/src/main/java/org/sonar/server/permission/ws/RemoveUserAction.java
  11. 1
    1
      server/sonar-server/src/main/java/org/sonar/server/permission/ws/SearchProjectPermissionsAction.java
  12. 3
    3
      server/sonar-server/src/main/java/org/sonar/server/permission/ws/TemplateGroupsAction.java
  13. 3
    3
      server/sonar-server/src/main/java/org/sonar/server/permission/ws/TemplateUsersAction.java
  14. 2
    2
      server/sonar-server/src/main/java/org/sonar/server/permission/ws/UsersAction.java
  15. 2
    2
      server/sonar-server/src/main/java/org/sonar/server/permission/ws/WsProjectRef.java
  16. 2
    2
      server/sonar-server/src/main/java/org/sonar/server/permission/ws/WsTemplateRef.java
  17. 5
    5
      server/sonar-server/src/main/java/org/sonar/server/permission/ws/template/AddGroupToTemplateAction.java
  18. 5
    5
      server/sonar-server/src/main/java/org/sonar/server/permission/ws/template/AddUserToTemplateAction.java
  19. 2
    2
      server/sonar-server/src/main/java/org/sonar/server/permission/ws/template/ApplyTemplateAction.java
  20. 5
    5
      server/sonar-server/src/main/java/org/sonar/server/permission/ws/template/CreateTemplateAction.java
  21. 5
    5
      server/sonar-server/src/main/java/org/sonar/server/permission/ws/template/RemoveGroupFromTemplateAction.java
  22. 5
    5
      server/sonar-server/src/main/java/org/sonar/server/permission/ws/template/RemoveUserFromTemplateAction.java
  23. 2
    2
      server/sonar-server/src/main/java/org/sonar/server/permission/ws/template/SetDefaultTemplateAction.java
  24. 7
    7
      server/sonar-server/src/main/java/org/sonar/server/permission/ws/template/UpdateTemplateAction.java
  25. 3
    3
      server/sonar-server/src/main/java/org/sonar/server/usergroups/ws/WsGroupRef.java
  26. 5
    5
      server/sonar-server/src/test/java/org/sonar/server/permission/ws/AddGroupActionTest.java
  27. 4
    4
      server/sonar-server/src/test/java/org/sonar/server/permission/ws/AddUserActionTest.java
  28. 3
    3
      server/sonar-server/src/test/java/org/sonar/server/permission/ws/GroupsActionTest.java
  29. 2
    2
      server/sonar-server/src/test/java/org/sonar/server/permission/ws/PermissionsWsTest.java
  30. 5
    5
      server/sonar-server/src/test/java/org/sonar/server/permission/ws/RemoveGroupActionTest.java
  31. 4
    4
      server/sonar-server/src/test/java/org/sonar/server/permission/ws/RemoveUserActionTest.java
  32. 1
    1
      server/sonar-server/src/test/java/org/sonar/server/permission/ws/SearchProjectPermissionsActionTest.java
  33. 3
    3
      server/sonar-server/src/test/java/org/sonar/server/permission/ws/TemplateGroupsActionTest.java
  34. 7
    7
      server/sonar-server/src/test/java/org/sonar/server/permission/ws/TemplateUsersActionTest.java
  35. 3
    3
      server/sonar-server/src/test/java/org/sonar/server/permission/ws/UsersActionTest.java
  36. 8
    8
      server/sonar-server/src/test/java/org/sonar/server/permission/ws/template/AddGroupToTemplateActionTest.java
  37. 6
    6
      server/sonar-server/src/test/java/org/sonar/server/permission/ws/template/AddUserToTemplateActionTest.java
  38. 4
    4
      server/sonar-server/src/test/java/org/sonar/server/permission/ws/template/ApplyTemplateActionTest.java
  39. 3
    3
      server/sonar-server/src/test/java/org/sonar/server/permission/ws/template/CreateTemplateActionTest.java
  40. 2
    2
      server/sonar-server/src/test/java/org/sonar/server/permission/ws/template/DeleteTemplateActionTest.java
  41. 8
    8
      server/sonar-server/src/test/java/org/sonar/server/permission/ws/template/RemoveGroupFromTemplateActionTest.java
  42. 6
    6
      server/sonar-server/src/test/java/org/sonar/server/permission/ws/template/RemoveUserFromTemplateActionTest.java
  43. 3
    3
      server/sonar-server/src/test/java/org/sonar/server/permission/ws/template/SetDefaultTemplateActionTest.java
  44. 4
    4
      server/sonar-server/src/test/java/org/sonar/server/permission/ws/template/UpdateTemplateActionTest.java

+ 1
- 1
server/sonar-server/src/main/java/org/sonar/server/component/ws/SearchAction.java View File

@@ -45,7 +45,7 @@ import static com.google.common.collect.Ordering.natural;
import static java.lang.String.format;
import static org.sonar.server.component.ResourceTypeFunctions.RESOURCE_TYPE_TO_QUALIFIER;
import static org.sonar.server.component.ws.WsComponentsParameters.PARAM_QUALIFIERS;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_QUALIFIER;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_QUALIFIER;
import static org.sonar.server.ws.WsUtils.checkRequest;
import static org.sonar.server.ws.WsUtils.writeProtobuf;


+ 4
- 4
server/sonar-server/src/main/java/org/sonar/server/permission/ws/AddGroupAction.java View File

@@ -29,10 +29,10 @@ import org.sonar.server.permission.PermissionChange;
import org.sonar.server.permission.PermissionUpdater;
import org.sonar.server.permission.ws.PermissionRequest.Builder;

import static org.sonar.server.permission.ws.WsPermissionParameters.createGroupIdParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createGroupNameParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createPermissionParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createProjectParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createGroupIdParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createGroupNameParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createPermissionParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createProjectParameter;

public class AddGroupAction implements PermissionsWsAction {


+ 3
- 3
server/sonar-server/src/main/java/org/sonar/server/permission/ws/AddUserAction.java View File

@@ -29,9 +29,9 @@ import org.sonar.server.permission.PermissionChange;
import org.sonar.server.permission.PermissionUpdater;
import org.sonar.server.permission.ws.PermissionRequest.Builder;

import static org.sonar.server.permission.ws.WsPermissionParameters.createPermissionParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createProjectParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createUserLoginParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createPermissionParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createProjectParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createUserLoginParameter;

public class AddUserAction implements PermissionsWsAction {


+ 1
- 1
server/sonar-server/src/main/java/org/sonar/server/permission/ws/DeleteTemplateAction.java View File

@@ -31,7 +31,7 @@ import org.sonar.server.permission.ws.template.DefaultPermissionTemplateFinder;
import org.sonar.server.user.UserSession;

import static org.sonar.server.permission.PermissionPrivilegeChecker.checkGlobalAdminUser;
import static org.sonar.server.permission.ws.WsPermissionParameters.createTemplateParameters;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createTemplateParameters;
import static org.sonar.server.permission.ws.WsTemplateRef.fromRequest;
import static org.sonar.server.ws.WsUtils.checkRequest;


+ 2
- 2
server/sonar-server/src/main/java/org/sonar/server/permission/ws/GroupsAction.java View File

@@ -43,8 +43,8 @@ import org.sonarqube.ws.WsPermissions.WsGroupsResponse;
import static com.google.common.base.Objects.firstNonNull;
import static org.sonar.server.permission.PermissionPrivilegeChecker.checkProjectAdminUserByComponentDto;
import static org.sonar.server.permission.ws.PermissionQueryParser.fromSelectionModeToMembership;
import static org.sonar.server.permission.ws.WsPermissionParameters.createPermissionParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createProjectParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createPermissionParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createProjectParameter;
import static org.sonar.server.ws.WsUtils.writeProtobuf;

public class GroupsAction implements PermissionsWsAction {

+ 2
- 2
server/sonar-server/src/main/java/org/sonar/server/permission/ws/PermissionRequest.java View File

@@ -31,8 +31,8 @@ import static org.sonar.api.server.ws.WebService.Param.SELECTED;
import static org.sonar.api.server.ws.WebService.Param.TEXT_QUERY;
import static org.sonar.server.permission.ws.PermissionRequestValidator.validateGlobalPermission;
import static org.sonar.server.permission.ws.PermissionRequestValidator.validateProjectPermission;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_USER_LOGIN;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_USER_LOGIN;

class PermissionRequest {
private final String permission;

+ 3
- 3
server/sonar-server/src/main/java/org/sonar/server/permission/ws/PermissionRequestValidator.java View File

@@ -32,9 +32,9 @@ import static com.google.common.base.Strings.isNullOrEmpty;
import static java.lang.String.format;
import static org.apache.commons.lang.StringUtils.isBlank;
import static org.sonar.api.security.DefaultGroups.isAnyone;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_QUALIFIER;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PATTERN;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_QUALIFIER;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PATTERN;
import static org.sonar.server.ws.WsUtils.checkRequest;

public class PermissionRequestValidator {

server/sonar-server/src/main/java/org/sonar/server/permission/ws/WsPermissionParameters.java → server/sonar-server/src/main/java/org/sonar/server/permission/ws/PermissionsWsParameters.java View File

@@ -27,7 +27,7 @@ import org.sonar.core.util.Uuids;

import static java.lang.String.format;

public class WsPermissionParameters {
public class PermissionsWsParameters {

public static final String PARAM_PERMISSION = "permission";
public static final String PARAM_GROUP_NAME = "groupName";
@@ -58,7 +58,7 @@ public class WsPermissionParameters {
"</ul>",
ProjectPermissions.ALL_ON_ONE_LINE);

private WsPermissionParameters() {
private PermissionsWsParameters() {
// static methods only
}


+ 4
- 4
server/sonar-server/src/main/java/org/sonar/server/permission/ws/RemoveGroupAction.java View File

@@ -29,10 +29,10 @@ import org.sonar.server.permission.PermissionChange;
import org.sonar.server.permission.PermissionUpdater;
import org.sonar.server.permission.ws.PermissionRequest.Builder;

import static org.sonar.server.permission.ws.WsPermissionParameters.createGroupIdParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createGroupNameParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createPermissionParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createProjectParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createGroupIdParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createGroupNameParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createPermissionParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createProjectParameter;

public class RemoveGroupAction implements PermissionsWsAction {


+ 3
- 3
server/sonar-server/src/main/java/org/sonar/server/permission/ws/RemoveUserAction.java View File

@@ -29,9 +29,9 @@ import org.sonar.server.permission.PermissionChange;
import org.sonar.server.permission.PermissionUpdater;
import org.sonar.server.permission.ws.PermissionRequest.Builder;

import static org.sonar.server.permission.ws.WsPermissionParameters.createPermissionParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createProjectParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createUserLoginParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createPermissionParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createProjectParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createUserLoginParameter;

public class RemoveUserAction implements PermissionsWsAction {


+ 1
- 1
server/sonar-server/src/main/java/org/sonar/server/permission/ws/SearchProjectPermissionsAction.java View File

@@ -39,7 +39,7 @@ import org.sonarqube.ws.WsPermissions.WsSearchProjectPermissionsResponse.Project
import static org.sonar.server.permission.PermissionPrivilegeChecker.checkGlobalAdminUser;
import static org.sonar.server.permission.PermissionPrivilegeChecker.checkProjectAdminUserByComponentKey;
import static org.sonar.server.permission.PermissionPrivilegeChecker.checkProjectAdminUserByComponentUuid;
import static org.sonar.server.permission.ws.WsPermissionParameters.createProjectParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createProjectParameter;
import static org.sonar.server.ws.WsUtils.writeProtobuf;

public class SearchProjectPermissionsAction implements PermissionsWsAction {

+ 3
- 3
server/sonar-server/src/main/java/org/sonar/server/permission/ws/TemplateGroupsAction.java View File

@@ -38,9 +38,9 @@ import org.sonarqube.ws.WsPermissions.WsGroupsResponse;
import static org.sonar.server.permission.PermissionPrivilegeChecker.checkGlobalAdminUser;
import static org.sonar.server.permission.ws.PermissionQueryParser.fromSelectionModeToMembership;
import static org.sonar.server.permission.ws.PermissionRequestValidator.validateProjectPermission;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.WsPermissionParameters.createProjectPermissionParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createTemplateParameters;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createProjectPermissionParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createTemplateParameters;
import static org.sonar.server.ws.WsUtils.writeProtobuf;

public class TemplateGroupsAction implements PermissionsWsAction {

+ 3
- 3
server/sonar-server/src/main/java/org/sonar/server/permission/ws/TemplateUsersAction.java View File

@@ -39,9 +39,9 @@ import static java.lang.String.format;
import static org.sonar.server.permission.PermissionPrivilegeChecker.checkGlobalAdminUser;
import static org.sonar.server.permission.ws.PermissionQueryParser.fromSelectionModeToMembership;
import static org.sonar.server.permission.ws.PermissionRequestValidator.validateProjectPermission;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.WsPermissionParameters.createProjectPermissionParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createTemplateParameters;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createProjectPermissionParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createTemplateParameters;
import static org.sonar.server.ws.WsUtils.writeProtobuf;

public class TemplateUsersAction implements PermissionsWsAction {

+ 2
- 2
server/sonar-server/src/main/java/org/sonar/server/permission/ws/UsersAction.java View File

@@ -44,8 +44,8 @@ import static com.google.common.base.Strings.nullToEmpty;
import static org.sonar.api.utils.Paging.forPageIndex;
import static org.sonar.server.permission.PermissionPrivilegeChecker.checkProjectAdminUserByComponentDto;
import static org.sonar.server.permission.ws.PermissionQueryParser.fromSelectionModeToMembership;
import static org.sonar.server.permission.ws.WsPermissionParameters.createPermissionParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createProjectParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createPermissionParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createProjectParameter;
import static org.sonar.server.ws.WsUtils.writeProtobuf;

public class UsersAction implements PermissionsWsAction {

+ 2
- 2
server/sonar-server/src/main/java/org/sonar/server/permission/ws/WsProjectRef.java View File

@@ -24,8 +24,8 @@ import com.google.common.base.Optional;
import javax.annotation.CheckForNull;
import org.sonar.api.server.ws.Request;

import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PROJECT_ID;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PROJECT_KEY;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PROJECT_ID;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PROJECT_KEY;
import static org.sonar.server.ws.WsUtils.checkRequest;

/**

+ 2
- 2
server/sonar-server/src/main/java/org/sonar/server/permission/ws/WsTemplateRef.java View File

@@ -24,8 +24,8 @@ import javax.annotation.CheckForNull;
import javax.annotation.Nullable;
import org.sonar.api.server.ws.Request;

import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_TEMPLATE_UUID;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_TEMPLATE_NAME;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_TEMPLATE_UUID;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_TEMPLATE_NAME;
import static org.sonar.server.ws.WsUtils.checkRequest;

/**

+ 5
- 5
server/sonar-server/src/main/java/org/sonar/server/permission/ws/template/AddGroupToTemplateAction.java View File

@@ -40,11 +40,11 @@ import static org.sonar.db.user.GroupMembershipQuery.IN;
import static org.sonar.server.permission.PermissionPrivilegeChecker.checkGlobalAdminUser;
import static org.sonar.server.permission.ws.PermissionRequestValidator.validateNotAnyoneAndAdminPermission;
import static org.sonar.server.permission.ws.PermissionRequestValidator.validateProjectPermission;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.WsPermissionParameters.createGroupIdParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createGroupNameParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createProjectPermissionParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createTemplateParameters;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createGroupIdParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createGroupNameParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createProjectPermissionParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createTemplateParameters;

public class AddGroupToTemplateAction implements PermissionsWsAction {
private final DbClient dbClient;

+ 5
- 5
server/sonar-server/src/main/java/org/sonar/server/permission/ws/template/AddUserToTemplateAction.java View File

@@ -39,11 +39,11 @@ import org.sonar.server.user.UserSession;
import static com.google.common.collect.FluentIterable.from;
import static org.sonar.db.user.GroupMembershipQuery.IN;
import static org.sonar.server.permission.PermissionPrivilegeChecker.checkGlobalAdminUser;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_USER_LOGIN;
import static org.sonar.server.permission.ws.WsPermissionParameters.createProjectPermissionParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createTemplateParameters;
import static org.sonar.server.permission.ws.WsPermissionParameters.createUserLoginParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_USER_LOGIN;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createProjectPermissionParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createTemplateParameters;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createUserLoginParameter;
import static org.sonar.server.permission.ws.PermissionRequestValidator.validateProjectPermission;

public class AddUserToTemplateAction implements PermissionsWsAction {

+ 2
- 2
server/sonar-server/src/main/java/org/sonar/server/permission/ws/template/ApplyTemplateAction.java View File

@@ -35,8 +35,8 @@ import org.sonar.server.permission.ws.WsProjectRef;
import org.sonar.server.permission.ws.WsTemplateRef;

import static java.util.Collections.singletonList;
import static org.sonar.server.permission.ws.WsPermissionParameters.createProjectParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createTemplateParameters;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createProjectParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createTemplateParameters;

public class ApplyTemplateAction implements PermissionsWsAction {
private final DbClient dbClient;

+ 5
- 5
server/sonar-server/src/main/java/org/sonar/server/permission/ws/template/CreateTemplateAction.java View File

@@ -34,11 +34,11 @@ import org.sonarqube.ws.WsPermissions.WsCreatePermissionTemplateResponse;

import static java.lang.String.format;
import static org.sonar.server.permission.PermissionPrivilegeChecker.checkGlobalAdminUser;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_DESCRIPTION;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_NAME;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PATTERN;
import static org.sonar.server.permission.ws.WsPermissionParameters.createTemplateDescriptionParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createTemplateProjectKeyPatternParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_DESCRIPTION;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_NAME;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PATTERN;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createTemplateDescriptionParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createTemplateProjectKeyPatternParameter;
import static org.sonar.server.permission.ws.PermissionRequestValidator.MSG_TEMPLATE_WITH_SAME_NAME;
import static org.sonar.server.permission.ws.PermissionRequestValidator.validateProjectPattern;
import static org.sonar.server.permission.ws.PermissionRequestValidator.validateTemplateNameFormat;

+ 5
- 5
server/sonar-server/src/main/java/org/sonar/server/permission/ws/template/RemoveGroupFromTemplateAction.java View File

@@ -34,11 +34,11 @@ import org.sonar.server.permission.ws.WsTemplateRef;
import org.sonar.server.user.UserSession;

import static org.sonar.server.permission.PermissionPrivilegeChecker.checkGlobalAdminUser;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.WsPermissionParameters.createGroupIdParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createGroupNameParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createProjectPermissionParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createTemplateParameters;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createGroupIdParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createGroupNameParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createProjectPermissionParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createTemplateParameters;
import static org.sonar.server.permission.ws.PermissionRequestValidator.validateProjectPermission;

public class RemoveGroupFromTemplateAction implements PermissionsWsAction {

+ 5
- 5
server/sonar-server/src/main/java/org/sonar/server/permission/ws/template/RemoveUserFromTemplateAction.java View File

@@ -33,11 +33,11 @@ import org.sonar.server.permission.ws.WsTemplateRef;
import org.sonar.server.user.UserSession;

import static org.sonar.server.permission.PermissionPrivilegeChecker.checkGlobalAdminUser;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_USER_LOGIN;
import static org.sonar.server.permission.ws.WsPermissionParameters.createProjectPermissionParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createTemplateParameters;
import static org.sonar.server.permission.ws.WsPermissionParameters.createUserLoginParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_USER_LOGIN;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createProjectPermissionParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createTemplateParameters;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createUserLoginParameter;
import static org.sonar.server.permission.ws.PermissionRequestValidator.validateProjectPermission;

public class RemoveUserFromTemplateAction implements PermissionsWsAction {

+ 2
- 2
server/sonar-server/src/main/java/org/sonar/server/permission/ws/template/SetDefaultTemplateAction.java View File

@@ -41,8 +41,8 @@ import static com.google.common.collect.Ordering.natural;
import static java.lang.String.format;
import static org.sonar.server.permission.DefaultPermissionTemplates.defaultRootQualifierTemplateProperty;
import static org.sonar.server.permission.PermissionPrivilegeChecker.checkGlobalAdminUser;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_QUALIFIER;
import static org.sonar.server.permission.ws.WsPermissionParameters.createTemplateParameters;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_QUALIFIER;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createTemplateParameters;
import static org.sonar.server.permission.ws.PermissionRequestValidator.validateQualifier;
import static org.sonar.server.component.ResourceTypeFunctions.RESOURCE_TYPE_TO_QUALIFIER;


+ 7
- 7
server/sonar-server/src/main/java/org/sonar/server/permission/ws/template/UpdateTemplateAction.java View File

@@ -39,13 +39,13 @@ import org.sonarqube.ws.WsPermissions.WsUpdatePermissionTemplateResponse;
import static com.google.common.base.Objects.firstNonNull;
import static java.lang.String.format;
import static org.sonar.server.permission.PermissionPrivilegeChecker.checkGlobalAdminUser;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_ID;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_DESCRIPTION;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_NAME;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PATTERN;
import static org.sonar.server.permission.ws.WsPermissionParameters.createIdParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createTemplateDescriptionParameter;
import static org.sonar.server.permission.ws.WsPermissionParameters.createTemplateProjectKeyPatternParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_ID;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_DESCRIPTION;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_NAME;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PATTERN;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createIdParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createTemplateDescriptionParameter;
import static org.sonar.server.permission.ws.PermissionsWsParameters.createTemplateProjectKeyPatternParameter;
import static org.sonar.server.permission.ws.PermissionRequestValidator.MSG_TEMPLATE_WITH_SAME_NAME;
import static org.sonar.server.permission.ws.PermissionRequestValidator.validateProjectPattern;
import static org.sonar.server.permission.ws.PermissionRequestValidator.validateTemplateNameFormat;

+ 3
- 3
server/sonar-server/src/main/java/org/sonar/server/usergroups/ws/WsGroupRef.java View File

@@ -23,7 +23,7 @@ package org.sonar.server.usergroups.ws;
import javax.annotation.CheckForNull;
import javax.annotation.Nullable;
import org.sonar.api.server.ws.Request;
import org.sonar.server.permission.ws.WsPermissionParameters;
import org.sonar.server.permission.ws.PermissionsWsParameters;

import static org.sonar.server.ws.WsUtils.checkRequest;

@@ -43,8 +43,8 @@ public class WsGroupRef {
}

public static WsGroupRef fromPermissionRequest(Request wsRequest) {
Long id = wsRequest.paramAsLong(WsPermissionParameters.PARAM_GROUP_ID);
String name = wsRequest.param(WsPermissionParameters.PARAM_GROUP_NAME);
Long id = wsRequest.paramAsLong(PermissionsWsParameters.PARAM_GROUP_ID);
String name = wsRequest.param(PermissionsWsParameters.PARAM_GROUP_NAME);

return new WsGroupRef(id, name);
}

+ 5
- 5
server/sonar-server/src/test/java/org/sonar/server/permission/ws/AddGroupActionTest.java View File

@@ -54,11 +54,11 @@ import static org.sonar.db.component.ComponentTesting.newProjectDto;
import static org.sonar.db.component.ComponentTesting.newView;
import static org.sonar.server.permission.ws.AddGroupAction.ACTION;
import static org.sonar.server.permission.ws.PermissionsWs.ENDPOINT;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_GROUP_ID;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_GROUP_NAME;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PROJECT_ID;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PROJECT_KEY;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_GROUP_ID;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_GROUP_NAME;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PROJECT_ID;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PROJECT_KEY;

@Category(DbTests.class)
public class AddGroupActionTest {

+ 4
- 4
server/sonar-server/src/test/java/org/sonar/server/permission/ws/AddUserActionTest.java View File

@@ -54,10 +54,10 @@ import static org.sonar.db.component.ComponentTesting.newProjectDto;
import static org.sonar.db.component.ComponentTesting.newView;
import static org.sonar.server.permission.ws.AddUserAction.ACTION;
import static org.sonar.server.permission.ws.PermissionsWs.ENDPOINT;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PROJECT_ID;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PROJECT_KEY;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_USER_LOGIN;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PROJECT_ID;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PROJECT_KEY;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_USER_LOGIN;

@Category(DbTests.class)
public class AddUserActionTest {

+ 3
- 3
server/sonar-server/src/test/java/org/sonar/server/permission/ws/GroupsActionTest.java View File

@@ -58,9 +58,9 @@ import static org.sonar.core.permission.GlobalPermissions.SCAN_EXECUTION;
import static org.sonar.core.permission.GlobalPermissions.SYSTEM_ADMIN;
import static org.sonar.db.component.ComponentTesting.newProjectDto;
import static org.sonar.db.component.ComponentTesting.newView;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PROJECT_KEY;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PROJECT_ID;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PROJECT_KEY;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PROJECT_ID;
import static org.sonar.test.JsonAssert.assertJson;

@Category(DbTests.class)

+ 2
- 2
server/sonar-server/src/test/java/org/sonar/server/permission/ws/PermissionsWsTest.java View File

@@ -84,7 +84,7 @@ public class PermissionsWsTest {
assertThat(action.isPost()).isFalse();
assertThat(action.isInternal()).isTrue();
assertThat(action.since()).isEqualTo("5.2");
assertThat(action.param(WsPermissionParameters.PARAM_PERMISSION).isRequired()).isTrue();
assertThat(action.param(PermissionsWsParameters.PARAM_PERMISSION).isRequired()).isTrue();
}

@Test
@@ -95,7 +95,7 @@ public class PermissionsWsTest {
assertThat(action.isPost()).isFalse();
assertThat(action.isInternal()).isTrue();
assertThat(action.since()).isEqualTo("5.2");
assertThat(action.param(WsPermissionParameters.PARAM_PERMISSION).isRequired()).isTrue();
assertThat(action.param(PermissionsWsParameters.PARAM_PERMISSION).isRequired()).isTrue();
}

private WebService.Controller controller() {

+ 5
- 5
server/sonar-server/src/test/java/org/sonar/server/permission/ws/RemoveGroupActionTest.java View File

@@ -53,11 +53,11 @@ import static org.sonar.core.permission.GlobalPermissions.SYSTEM_ADMIN;
import static org.sonar.db.component.ComponentTesting.newFileDto;
import static org.sonar.db.component.ComponentTesting.newProjectDto;
import static org.sonar.db.component.ComponentTesting.newView;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_GROUP_ID;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_GROUP_NAME;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PROJECT_KEY;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PROJECT_ID;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_GROUP_ID;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_GROUP_NAME;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PROJECT_KEY;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PROJECT_ID;
import static org.sonar.server.permission.ws.RemoveGroupAction.ACTION;

@Category(DbTests.class)

+ 4
- 4
server/sonar-server/src/test/java/org/sonar/server/permission/ws/RemoveUserActionTest.java View File

@@ -52,10 +52,10 @@ import static org.sonar.core.permission.GlobalPermissions.SYSTEM_ADMIN;
import static org.sonar.db.component.ComponentTesting.newFileDto;
import static org.sonar.db.component.ComponentTesting.newProjectDto;
import static org.sonar.db.component.ComponentTesting.newView;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PROJECT_KEY;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PROJECT_ID;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_USER_LOGIN;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PROJECT_KEY;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PROJECT_ID;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_USER_LOGIN;
import static org.sonar.server.permission.ws.PermissionsWs.ENDPOINT;
import static org.sonar.server.permission.ws.RemoveUserAction.ACTION;


+ 1
- 1
server/sonar-server/src/test/java/org/sonar/server/permission/ws/SearchProjectPermissionsActionTest.java View File

@@ -61,7 +61,7 @@ import static org.sonar.db.component.ComponentTesting.newProjectDto;
import static org.sonar.db.component.ComponentTesting.newView;
import static org.sonar.db.user.GroupTesting.newGroupDto;
import static org.sonar.db.user.UserTesting.newUserDto;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PROJECT_ID;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PROJECT_ID;
import static org.sonar.test.JsonAssert.assertJson;

public class SearchProjectPermissionsActionTest {

+ 3
- 3
server/sonar-server/src/test/java/org/sonar/server/permission/ws/TemplateGroupsActionTest.java View File

@@ -61,9 +61,9 @@ import static org.sonar.core.permission.GlobalPermissions.SYSTEM_ADMIN;
import static org.sonar.db.permission.PermissionTemplateTesting.newPermissionTemplateDto;
import static org.sonar.db.permission.PermissionTemplateTesting.newPermissionTemplateGroupDto;
import static org.sonar.db.user.GroupTesting.newGroupDto;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_TEMPLATE_NAME;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_TEMPLATE_UUID;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_TEMPLATE_NAME;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_TEMPLATE_UUID;
import static org.sonar.test.JsonAssert.assertJson;

@Category(DbTests.class)

+ 7
- 7
server/sonar-server/src/test/java/org/sonar/server/permission/ws/TemplateUsersActionTest.java View File

@@ -122,7 +122,7 @@ public class TemplateUsersActionTest {
@Test
public void search_for_users_by_template_name() throws IOException {
InputStream responseStream = newRequest(UserRole.USER, null)
.setParam(WsPermissionParameters.PARAM_TEMPLATE_NAME, template1.getName())
.setParam(PermissionsWsParameters.PARAM_TEMPLATE_NAME, template1.getName())
.setMediaType(PROTOBUF)
.execute().getInputStream();

@@ -134,7 +134,7 @@ public class TemplateUsersActionTest {
@Test
public void search_using_text_query() throws IOException {
InputStream responseStream = newRequest(UserRole.USER, null)
.setParam(WsPermissionParameters.PARAM_TEMPLATE_NAME, template1.getName())
.setParam(PermissionsWsParameters.PARAM_TEMPLATE_NAME, template1.getName())
.setParam(WebService.Param.TEXT_QUERY, "ame-1")
.setMediaType(PROTOBUF)
.execute().getInputStream();
@@ -147,7 +147,7 @@ public class TemplateUsersActionTest {
@Test
public void search_using_selected() throws IOException {
InputStream responseStream = newRequest(UserRole.USER, null)
.setParam(WsPermissionParameters.PARAM_TEMPLATE_NAME, template1.getName())
.setParam(PermissionsWsParameters.PARAM_TEMPLATE_NAME, template1.getName())
.setParam(WebService.Param.SELECTED, "all")
.setMediaType(PROTOBUF)
.execute().getInputStream();
@@ -161,7 +161,7 @@ public class TemplateUsersActionTest {
@Test
public void search_with_pagination() throws IOException {
InputStream responseStream = newRequest(UserRole.USER, null)
.setParam(WsPermissionParameters.PARAM_TEMPLATE_NAME, template1.getName())
.setParam(PermissionsWsParameters.PARAM_TEMPLATE_NAME, template1.getName())
.setParam(WebService.Param.SELECTED, "all")
.setParam(WebService.Param.PAGE, "2")
.setParam(WebService.Param.PAGE_SIZE, "1")
@@ -194,7 +194,7 @@ public class TemplateUsersActionTest {
expectedException.expect(BadRequestException.class);

newRequest(UserRole.USER, template1.getUuid())
.setParam(WsPermissionParameters.PARAM_TEMPLATE_NAME, template1.getName())
.setParam(PermissionsWsParameters.PARAM_TEMPLATE_NAME, template1.getName())
.execute();
}

@@ -236,9 +236,9 @@ public class TemplateUsersActionTest {

private TestRequest newRequest(String permission, @Nullable String templateUuid) {
TestRequest request = ws.newRequest();
request.setParam(WsPermissionParameters.PARAM_PERMISSION, permission);
request.setParam(PermissionsWsParameters.PARAM_PERMISSION, permission);
if (templateUuid != null) {
request.setParam(WsPermissionParameters.PARAM_TEMPLATE_UUID, templateUuid);
request.setParam(PermissionsWsParameters.PARAM_TEMPLATE_UUID, templateUuid);
}

return request;

+ 3
- 3
server/sonar-server/src/test/java/org/sonar/server/permission/ws/UsersActionTest.java View File

@@ -53,9 +53,9 @@ import static org.sonar.core.permission.GlobalPermissions.SCAN_EXECUTION;
import static org.sonar.core.permission.GlobalPermissions.SYSTEM_ADMIN;
import static org.sonar.db.component.ComponentTesting.newProjectDto;
import static org.sonar.db.user.UserTesting.newUserDto;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PROJECT_ID;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PROJECT_KEY;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PROJECT_ID;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PROJECT_KEY;
import static org.sonar.test.JsonAssert.assertJson;

@Category(DbTests.class)

+ 8
- 8
server/sonar-server/src/test/java/org/sonar/server/permission/ws/template/AddGroupToTemplateActionTest.java View File

@@ -47,7 +47,7 @@ import org.sonar.server.exceptions.ForbiddenException;
import org.sonar.server.exceptions.NotFoundException;
import org.sonar.server.exceptions.UnauthorizedException;
import org.sonar.server.permission.ws.PermissionDependenciesFinder;
import org.sonar.server.permission.ws.WsPermissionParameters;
import org.sonar.server.permission.ws.PermissionsWsParameters;
import org.sonar.server.tester.UserSessionRule;
import org.sonar.server.usergroups.ws.UserGroupFinder;
import org.sonar.server.ws.TestRequest;
@@ -63,11 +63,11 @@ import static org.sonar.api.web.UserRole.ISSUE_ADMIN;
import static org.sonar.db.permission.PermissionTemplateTesting.newPermissionTemplateDto;
import static org.sonar.db.user.GroupMembershipQuery.IN;
import static org.sonar.db.user.GroupTesting.newGroupDto;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_GROUP_ID;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_GROUP_NAME;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_TEMPLATE_UUID;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_TEMPLATE_NAME;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_GROUP_ID;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_GROUP_NAME;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_TEMPLATE_UUID;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_TEMPLATE_NAME;

@Category(DbTests.class)
public class AddGroupToTemplateActionTest {
@@ -217,13 +217,13 @@ public class AddGroupToTemplateActionTest {
private void newRequest(@Nullable String groupName, @Nullable String templateKey, @Nullable String permission) {
TestRequest request = ws.newRequest();
if (groupName != null) {
request.setParam(WsPermissionParameters.PARAM_GROUP_NAME, groupName);
request.setParam(PermissionsWsParameters.PARAM_GROUP_NAME, groupName);
}
if (templateKey != null) {
request.setParam(PARAM_TEMPLATE_UUID, templateKey);
}
if (permission != null) {
request.setParam(WsPermissionParameters.PARAM_PERMISSION, permission);
request.setParam(PermissionsWsParameters.PARAM_PERMISSION, permission);
}

request.execute();

+ 6
- 6
server/sonar-server/src/test/java/org/sonar/server/permission/ws/template/AddUserToTemplateActionTest.java View File

@@ -46,7 +46,7 @@ import org.sonar.server.exceptions.ForbiddenException;
import org.sonar.server.exceptions.NotFoundException;
import org.sonar.server.exceptions.UnauthorizedException;
import org.sonar.server.permission.ws.PermissionDependenciesFinder;
import org.sonar.server.permission.ws.WsPermissionParameters;
import org.sonar.server.permission.ws.PermissionsWsParameters;
import org.sonar.server.tester.UserSessionRule;
import org.sonar.server.usergroups.ws.UserGroupFinder;
import org.sonar.server.ws.TestRequest;
@@ -60,9 +60,9 @@ import static org.sonar.api.web.UserRole.ISSUE_ADMIN;
import static org.sonar.db.permission.PermissionTemplateTesting.newPermissionTemplateDto;
import static org.sonar.db.user.GroupMembershipQuery.IN;
import static org.sonar.db.user.UserTesting.newUserDto;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_TEMPLATE_NAME;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_USER_LOGIN;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_TEMPLATE_NAME;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_USER_LOGIN;

@Category(DbTests.class)
public class AddUserToTemplateActionTest {
@@ -189,10 +189,10 @@ public class AddUserToTemplateActionTest {
request.setParam(PARAM_USER_LOGIN, userLogin);
}
if (templateKey != null) {
request.setParam(WsPermissionParameters.PARAM_TEMPLATE_UUID, templateKey);
request.setParam(PermissionsWsParameters.PARAM_TEMPLATE_UUID, templateKey);
}
if (permission != null) {
request.setParam(WsPermissionParameters.PARAM_PERMISSION, permission);
request.setParam(PermissionsWsParameters.PARAM_PERMISSION, permission);
}

request.execute();

+ 4
- 4
server/sonar-server/src/test/java/org/sonar/server/permission/ws/template/ApplyTemplateActionTest.java View File

@@ -72,10 +72,10 @@ import static org.sonar.db.permission.PermissionTemplateTesting.newPermissionTem
import static org.sonar.db.user.GroupMembershipQuery.IN;
import static org.sonar.db.user.GroupTesting.newGroupDto;
import static org.sonar.db.user.UserTesting.newUserDto;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PROJECT_ID;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PROJECT_KEY;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_TEMPLATE_UUID;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_TEMPLATE_NAME;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PROJECT_ID;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PROJECT_KEY;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_TEMPLATE_UUID;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_TEMPLATE_NAME;

@Category(DbTests.class)
public class ApplyTemplateActionTest {

+ 3
- 3
server/sonar-server/src/test/java/org/sonar/server/permission/ws/template/CreateTemplateActionTest.java View File

@@ -43,9 +43,9 @@ import static org.assertj.core.api.Assertions.assertThat;
import static org.mockito.Mockito.mock;
import static org.mockito.Mockito.when;
import static org.sonar.db.permission.PermissionTemplateTesting.newPermissionTemplateDto;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_DESCRIPTION;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_NAME;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PATTERN;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_DESCRIPTION;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_NAME;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PATTERN;
import static org.sonar.test.JsonAssert.assertJson;

public class CreateTemplateActionTest {

+ 2
- 2
server/sonar-server/src/test/java/org/sonar/server/permission/ws/template/DeleteTemplateActionTest.java View File

@@ -57,8 +57,8 @@ import static org.mockito.Mockito.mock;
import static org.mockito.Mockito.when;
import static org.mockito.internal.util.collections.Sets.newSet;
import static org.sonar.db.permission.PermissionTemplateTesting.newPermissionTemplateDto;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_TEMPLATE_UUID;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_TEMPLATE_NAME;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_TEMPLATE_UUID;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_TEMPLATE_NAME;

public class DeleteTemplateActionTest {


+ 8
- 8
server/sonar-server/src/test/java/org/sonar/server/permission/ws/template/RemoveGroupFromTemplateActionTest.java View File

@@ -46,7 +46,7 @@ import org.sonar.server.exceptions.ForbiddenException;
import org.sonar.server.exceptions.NotFoundException;
import org.sonar.server.exceptions.UnauthorizedException;
import org.sonar.server.permission.ws.PermissionDependenciesFinder;
import org.sonar.server.permission.ws.WsPermissionParameters;
import org.sonar.server.permission.ws.PermissionsWsParameters;
import org.sonar.server.tester.UserSessionRule;
import org.sonar.server.usergroups.ws.UserGroupFinder;
import org.sonar.server.ws.TestRequest;
@@ -60,11 +60,11 @@ import static org.sonar.api.web.UserRole.CODEVIEWER;
import static org.sonar.db.permission.PermissionTemplateTesting.newPermissionTemplateDto;
import static org.sonar.db.user.GroupMembershipQuery.IN;
import static org.sonar.db.user.GroupTesting.newGroupDto;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_GROUP_ID;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_GROUP_NAME;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_TEMPLATE_NAME;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_TEMPLATE_UUID;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_GROUP_ID;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_GROUP_NAME;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_TEMPLATE_NAME;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_TEMPLATE_UUID;

@Category(DbTests.class)
public class RemoveGroupFromTemplateActionTest {
@@ -220,13 +220,13 @@ public class RemoveGroupFromTemplateActionTest {
private void newRequest(@Nullable String groupName, @Nullable String templateKey, @Nullable String permission) {
TestRequest request = ws.newRequest();
if (groupName != null) {
request.setParam(WsPermissionParameters.PARAM_GROUP_NAME, groupName);
request.setParam(PermissionsWsParameters.PARAM_GROUP_NAME, groupName);
}
if (templateKey != null) {
request.setParam(PARAM_TEMPLATE_UUID, templateKey);
}
if (permission != null) {
request.setParam(WsPermissionParameters.PARAM_PERMISSION, permission);
request.setParam(PermissionsWsParameters.PARAM_PERMISSION, permission);
}

request.execute();

+ 6
- 6
server/sonar-server/src/test/java/org/sonar/server/permission/ws/template/RemoveUserFromTemplateActionTest.java View File

@@ -46,7 +46,7 @@ import org.sonar.server.exceptions.ForbiddenException;
import org.sonar.server.exceptions.NotFoundException;
import org.sonar.server.exceptions.UnauthorizedException;
import org.sonar.server.permission.ws.PermissionDependenciesFinder;
import org.sonar.server.permission.ws.WsPermissionParameters;
import org.sonar.server.permission.ws.PermissionsWsParameters;
import org.sonar.server.tester.UserSessionRule;
import org.sonar.server.usergroups.ws.UserGroupFinder;
import org.sonar.server.ws.TestRequest;
@@ -60,9 +60,9 @@ import static org.sonar.api.web.UserRole.ISSUE_ADMIN;
import static org.sonar.db.permission.PermissionTemplateTesting.newPermissionTemplateDto;
import static org.sonar.db.user.GroupMembershipQuery.IN;
import static org.sonar.db.user.UserTesting.newUserDto;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_TEMPLATE_NAME;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_USER_LOGIN;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PERMISSION;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_TEMPLATE_NAME;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_USER_LOGIN;

@Category(DbTests.class)
public class RemoveUserFromTemplateActionTest {
@@ -213,10 +213,10 @@ public class RemoveUserFromTemplateActionTest {
request.setParam(PARAM_USER_LOGIN, userLogin);
}
if (templateKey != null) {
request.setParam(WsPermissionParameters.PARAM_TEMPLATE_UUID, templateKey);
request.setParam(PermissionsWsParameters.PARAM_TEMPLATE_UUID, templateKey);
}
if (permission != null) {
request.setParam(WsPermissionParameters.PARAM_PERMISSION, permission);
request.setParam(PermissionsWsParameters.PARAM_PERMISSION, permission);
}

request.execute();

+ 3
- 3
server/sonar-server/src/test/java/org/sonar/server/permission/ws/template/SetDefaultTemplateActionTest.java View File

@@ -62,9 +62,9 @@ import static org.sonar.api.resources.Qualifiers.PROJECT;
import static org.sonar.api.resources.Qualifiers.VIEW;
import static org.sonar.server.permission.DefaultPermissionTemplates.DEFAULT_TEMPLATE_PROPERTY;
import static org.sonar.server.permission.DefaultPermissionTemplates.defaultRootQualifierTemplateProperty;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_QUALIFIER;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_TEMPLATE_UUID;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_TEMPLATE_NAME;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_QUALIFIER;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_TEMPLATE_UUID;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_TEMPLATE_NAME;

@Category(DbTests.class)
public class SetDefaultTemplateActionTest {

+ 4
- 4
server/sonar-server/src/test/java/org/sonar/server/permission/ws/template/UpdateTemplateActionTest.java View File

@@ -51,10 +51,10 @@ import static org.assertj.core.api.Assertions.assertThat;
import static org.mockito.Mockito.mock;
import static org.mockito.Mockito.when;
import static org.sonar.db.permission.PermissionTemplateTesting.newPermissionTemplateDto;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_DESCRIPTION;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_ID;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_NAME;
import static org.sonar.server.permission.ws.WsPermissionParameters.PARAM_PATTERN;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_DESCRIPTION;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_ID;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_NAME;
import static org.sonar.server.permission.ws.PermissionsWsParameters.PARAM_PATTERN;
import static org.sonar.test.JsonAssert.assertJson;

public class UpdateTemplateActionTest {

Loading…
Cancel
Save