Skip to content

Commit fb4ad38

Browse files
authored
Remove usage of deprecated 'additionalJdbcProperties (#3055)
1 parent 5c87fd9 commit fb4ad38

File tree

18 files changed

+39
-39
lines changed

18 files changed

+39
-39
lines changed

jetbrains-ultimate/src/software/aws/toolkits/jetbrains/datagrip/DatagripUtils.kt

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,13 +29,13 @@ val RequireSsl = DataSourceSslConfiguration("", "", "", true, SslMode.REQUIRE)
2929

3030
fun ProtoConnection.getAwsConnectionSettings(): ConnectionSettings {
3131
val credentialManager = CredentialManager.getInstance()
32-
val regionId = connectionPoint.additionalJdbcProperties[REGION_ID_PROPERTY]
32+
val regionId = connectionPoint.additionalProperties[REGION_ID_PROPERTY]
3333
?: throw IllegalArgumentException(message("settings.regions.none_selected"))
3434
val region = AwsRegionProvider.getInstance().allRegions()[regionId]
3535
?: throw IllegalArgumentException(
3636
message("datagrip.validation.invalid_region_specified", regionId)
3737
)
38-
val credentialId = connectionPoint.additionalJdbcProperties[CREDENTIAL_ID_PROPERTY]
38+
val credentialId = connectionPoint.additionalProperties[CREDENTIAL_ID_PROPERTY]
3939
?: throw IllegalArgumentException(message("settings.credentials.none_selected"))
4040
val credentials = credentialManager.getCredentialIdentifierById(credentialId)?.let {
4141
credentialManager.getAwsCredentialProvider(it, region)

jetbrains-ultimate/src/software/aws/toolkits/jetbrains/datagrip/auth/SecretsManagerAuth.kt

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ class SecretsManagerAuth : DatabaseAuthProviderCompatabilityAdapter {
6161
val dbSecret = getDbSecret(connectionSettings)
6262
if (
6363
connection.connectionPoint.dataSource.sshConfiguration?.isEnabled != true &&
64-
connection.connectionPoint.additionalJdbcProperties[GET_URL_FROM_SECRET]?.toBoolean() == true
64+
connection.connectionPoint.additionalProperties[GET_URL_FROM_SECRET]?.toBoolean() == true
6565
) {
6666
dbSecret.host ?: throw IllegalArgumentException(message("datagrip.secretsmanager.validation.no_host", connectionSettings.secretId))
6767
dbSecret.port ?: throw IllegalArgumentException(message("datagrip.secretsmanager.validation.no_port", connectionSettings.secretId))
@@ -93,7 +93,7 @@ class SecretsManagerAuth : DatabaseAuthProviderCompatabilityAdapter {
9393

9494
private fun getConfiguration(connection: ProtoConnection): SecretsManagerConfiguration {
9595
val connectionSettings = connection.getAwsConnectionSettings()
96-
val secretId = connection.connectionPoint.additionalJdbcProperties[SECRET_ID_PROPERTY]
96+
val secretId = connection.connectionPoint.additionalProperties[SECRET_ID_PROPERTY]
9797
?: throw IllegalArgumentException(message("datagrip.secretsmanager.validation.no_secret"))
9898
return SecretsManagerConfiguration(
9999
connectionSettings,

jetbrains-ultimate/src/software/aws/toolkits/jetbrains/datagrip/auth/SecretsManagerAuthWidget.kt

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -42,24 +42,24 @@ class SecretsManagerAuthWidget : AwsAuthWidget(userFieldEnabled = false) {
4242
super.save(dataSource, copyCredentials)
4343

4444
DataSourceUiUtil.putOrRemove(
45-
dataSource.additionalJdbcProperties,
45+
dataSource.additionalProperties,
4646
SECRET_ID_PROPERTY,
4747
secretIdSelector.text.nullize()
4848
)
4949

5050
DataSourceUiUtil.putOrRemove(
51-
dataSource.additionalJdbcProperties,
51+
dataSource.additionalProperties,
5252
GET_URL_FROM_SECRET,
5353
urlFromSecret.isSelected.toString()
5454
)
5555
}
5656

5757
override fun reset(dataSource: LocalDataSource, resetCredentials: Boolean) {
5858
super.reset(dataSource, resetCredentials)
59-
dataSource.additionalJdbcProperties[SECRET_ID_PROPERTY]?.nullize()?.let {
59+
dataSource.additionalProperties[SECRET_ID_PROPERTY]?.nullize()?.let {
6060
secretIdSelector.text = it
6161
}
62-
dataSource.additionalJdbcProperties[GET_URL_FROM_SECRET]?.nullize()?.let {
62+
dataSource.additionalProperties[GET_URL_FROM_SECRET]?.nullize()?.let {
6363
urlFromSecret.isSelected = it.toBoolean()
6464
}
6565
}

jetbrains-ultimate/src/software/aws/toolkits/jetbrains/services/rds/auth/IamAuth.kt

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -70,10 +70,10 @@ class IamAuth : DatabaseAuthProviderCompatabilityAdapter {
7070

7171
internal fun getAuthInformation(connection: ProtoConnection): RdsAuth {
7272
validateIamConfiguration(connection)
73-
val signingUrl = connection.connectionPoint.additionalJdbcProperties[RDS_SIGNING_HOST_PROPERTY]
73+
val signingUrl = connection.connectionPoint.additionalProperties[RDS_SIGNING_HOST_PROPERTY]
7474
?: connection.connectionPoint.url.hostFromJdbcString()
7575
?: throw IllegalArgumentException(message("rds.validation.no_instance_host"))
76-
val signingPort = connection.connectionPoint.additionalJdbcProperties[RDS_SIGNING_PORT_PROPERTY]?.toIntOrNull()
76+
val signingPort = connection.connectionPoint.additionalProperties[RDS_SIGNING_PORT_PROPERTY]?.toIntOrNull()
7777
?: connection.connectionPoint.url.portFromJdbcString()?.toIntOrNull()
7878
?: throw IllegalArgumentException(message("rds.validation.no_instance_port"))
7979
val user = connection.connectionPoint.dataSource.username

jetbrains-ultimate/src/software/aws/toolkits/jetbrains/services/rds/auth/IamAuthWidget.kt

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ class IamAuthWidget : AwsAuthWidget() {
4747
rdsSigningHostField.text
4848
}
4949
DataSourceUiUtil.putOrRemove(
50-
dataSource.additionalJdbcProperties,
50+
dataSource.additionalProperties,
5151
RDS_SIGNING_HOST_PROPERTY,
5252
host
5353
)
@@ -58,16 +58,16 @@ class IamAuthWidget : AwsAuthWidget() {
5858
rdsSigningPortField.text
5959
}
6060
DataSourceUiUtil.putOrRemove(
61-
dataSource.additionalJdbcProperties,
61+
dataSource.additionalProperties,
6262
RDS_SIGNING_PORT_PROPERTY,
6363
port
6464
)
6565
}
6666

6767
override fun reset(dataSource: LocalDataSource, resetCredentials: Boolean) {
6868
super.reset(dataSource, resetCredentials)
69-
rdsSigningHostField.text = dataSource.additionalJdbcProperties[RDS_SIGNING_HOST_PROPERTY]
70-
rdsSigningPortField.text = dataSource.additionalJdbcProperties[RDS_SIGNING_PORT_PROPERTY]
69+
rdsSigningHostField.text = dataSource.additionalProperties[RDS_SIGNING_HOST_PROPERTY]
70+
rdsSigningPortField.text = dataSource.additionalProperties[RDS_SIGNING_PORT_PROPERTY]
7171
}
7272

7373
override fun updateFromUrl(holder: ParametersHolder) {

jetbrains-ultimate/src/software/aws/toolkits/jetbrains/services/redshift/auth/IamAuth.kt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ class IamAuth : DatabaseAuthProviderCompatabilityAdapter {
6363

6464
internal fun validateConnection(connection: ProtoConnection): RedshiftSettings {
6565
val auth = connection.getAwsConnectionSettings()
66-
val clusterIdentifier = connection.connectionPoint.additionalJdbcProperties[CLUSTER_ID_PROPERTY]
66+
val clusterIdentifier = connection.connectionPoint.additionalProperties[CLUSTER_ID_PROPERTY]
6767
?: throw IllegalArgumentException(message("redshift.validation.no_cluster_id"))
6868
val username = connection.connectionPoint.dataSource.username
6969
if (username.isEmpty()) {

jetbrains-ultimate/src/software/aws/toolkits/jetbrains/services/redshift/auth/IamAuthWidget.kt

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,15 +38,15 @@ class IamAuthWidget : AwsAuthWidget() {
3838
super.save(dataSource, copyCredentials)
3939

4040
DataSourceUiUtil.putOrRemove(
41-
dataSource.additionalJdbcProperties,
41+
dataSource.additionalProperties,
4242
CLUSTER_ID_PROPERTY,
4343
clusterIdSelector.text
4444
)
4545
}
4646

4747
override fun reset(dataSource: LocalDataSource, resetCredentials: Boolean) {
4848
super.reset(dataSource, resetCredentials)
49-
clusterIdSelector.text = dataSource.additionalJdbcProperties[CLUSTER_ID_PROPERTY]
49+
clusterIdSelector.text = dataSource.additionalProperties[CLUSTER_ID_PROPERTY]
5050
}
5151

5252
override fun updateFromUrl(holder: ParametersHolder) {

jetbrains-ultimate/src/software/aws/toolkits/jetbrains/ui/AwsAuthWidget.kt

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -56,12 +56,12 @@ abstract class AwsAuthWidget(private val userFieldEnabled: Boolean = true) : JBD
5656
super.save(dataSource, copyCredentials)
5757

5858
DataSourceUiUtil.putOrRemove(
59-
dataSource.additionalJdbcProperties,
59+
dataSource.additionalProperties,
6060
CREDENTIAL_ID_PROPERTY,
6161
credentialSelector.getSelectedCredentialsProvider()
6262
)
6363
DataSourceUiUtil.putOrRemove(
64-
dataSource.additionalJdbcProperties,
64+
dataSource.additionalProperties,
6565
REGION_ID_PROPERTY,
6666
regionSelector.selectedRegion?.id
6767
)
@@ -73,7 +73,7 @@ abstract class AwsAuthWidget(private val userFieldEnabled: Boolean = true) : JBD
7373
val regionProvider = AwsRegionProvider.getInstance()
7474
val allRegions = regionProvider.allRegionsForService(serviceId)
7575
regionSelector.setRegions(allRegions.values.toMutableList())
76-
val regionId = dataSource.additionalJdbcProperties[REGION_ID_PROPERTY]?.nullize()
76+
val regionId = dataSource.additionalProperties[REGION_ID_PROPERTY]?.nullize()
7777
regionId?.let {
7878
allRegions[regionId]?.let {
7979
regionSelector.selectedRegion = it
@@ -82,7 +82,7 @@ abstract class AwsAuthWidget(private val userFieldEnabled: Boolean = true) : JBD
8282

8383
val credentialManager = CredentialManager.getInstance()
8484
credentialSelector.setCredentialsProviders(credentialManager.getCredentialIdentifiers())
85-
val credentialId = dataSource.additionalJdbcProperties[CREDENTIAL_ID_PROPERTY]?.nullize()
85+
val credentialId = dataSource.additionalProperties[CREDENTIAL_ID_PROPERTY]?.nullize()
8686
if (credentialId != null) {
8787
val credentialIdentifierById = credentialManager.getCredentialIdentifierById(credentialId)
8888
if (credentialIdentifierById != null) {

jetbrains-ultimate/tst/software/aws/toolkits/jetbrains/datagrip/DatagripUtilsTest.kt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ class DatagripUtilsTest {
8282
): DatabaseConnectionInterceptor.ProtoConnection = mock {
8383
on { connectionPoint } doAnswer {
8484
mock {
85-
on { additionalJdbcProperties } doAnswer {
85+
on { additionalProperties } doAnswer {
8686
val m = mutableMapOf<String, String?>()
8787
m[CREDENTIAL_ID_PROPERTY] = credentials
8888
m[REGION_ID_PROPERTY] = region

jetbrains-ultimate/tst/software/aws/toolkits/jetbrains/datagrip/actions/AddSecretsManagerConnectionTest.kt

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -55,9 +55,9 @@ class AddSecretsManagerConnectionTest {
5555
assertThat(it.isTemporary).isFalse()
5656
assertThat(it.sslCfg?.myEnabled).isTrue()
5757
assertThat(it.url).isEqualTo("jdbc:adapter://$address:$port")
58-
assertThat(it.additionalJdbcProperties[CREDENTIAL_ID_PROPERTY]).isEqualTo(credentialProvider.identifier.id)
59-
assertThat(it.additionalJdbcProperties[REGION_ID_PROPERTY]).isEqualTo(region.id)
60-
assertThat(it.additionalJdbcProperties[SECRET_ID_PROPERTY]).isEqualTo(secretArn)
58+
assertThat(it.additionalProperties[CREDENTIAL_ID_PROPERTY]).isEqualTo(credentialProvider.identifier.id)
59+
assertThat(it.additionalProperties[REGION_ID_PROPERTY]).isEqualTo(region.id)
60+
assertThat(it.additionalProperties[SECRET_ID_PROPERTY]).isEqualTo(secretArn)
6161
assertThat(it.authProviderId).isEqualTo(SecretsManagerAuth.providerId)
6262
}
6363
}

0 commit comments

Comments
 (0)