Skip to content

Commit 966a37f

Browse files
committed
Formatting
1 parent 6f22bcb commit 966a37f

File tree

6 files changed

+20
-16
lines changed

6 files changed

+20
-16
lines changed

spring-cloud-gateway-server-mvc/src/main/java/org/springframework/cloud/gateway/server/mvc/filter/AfterFilterFunctions.java

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -135,17 +135,19 @@ public static BiFunction<ServerRequest, ServerResponse, ServerResponse> rewriteR
135135
return (request, response) -> {
136136
BiFunction<String, List<String>, List<String>> remappingFunction = (key, values) -> {
137137
List<String> rewrittenValues = values.stream()
138-
.map(value -> pattern.matcher(value).replaceAll(replacement))
139-
.toList();
138+
.map(value -> pattern.matcher(value).replaceAll(replacement))
139+
.toList();
140140
return new ArrayList<>(rewrittenValues);
141141
};
142142
if (response.headers().get(name) != null) {
143143
List<String> oldValue = response.headers().get(name);
144144
List<String> newValue = remappingFunction.apply(name, oldValue);
145-
if (newValue != null)
145+
if (newValue != null) {
146146
response.headers().put(name, newValue);
147-
else
147+
}
148+
else {
148149
response.headers().remove(name);
150+
}
149151
}
150152
return response;
151153
};

spring-cloud-gateway-server-mvc/src/main/java/org/springframework/cloud/gateway/server/mvc/filter/BodyFilterFunctions.java

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,6 @@
5050
import org.springframework.http.HttpOutputMessage;
5151
import org.springframework.http.MediaType;
5252
import org.springframework.http.converter.HttpMessageConverter;
53-
import org.springframework.http.server.PathContainer;
5453
import org.springframework.http.server.RequestPath;
5554
import org.springframework.util.MultiValueMap;
5655
import org.springframework.util.StringUtils;

spring-cloud-gateway-server-mvc/src/main/java/org/springframework/cloud/gateway/server/mvc/filter/LoadBalancerFilterFunctions.java

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,6 @@
4040
import org.springframework.cloud.client.loadbalancer.ResponseData;
4141
import org.springframework.cloud.gateway.server.mvc.common.MvcUtils;
4242
import org.springframework.cloud.loadbalancer.support.LoadBalancerClientFactory;
43-
import org.springframework.http.HttpHeaders;
4443
import org.springframework.http.HttpStatus;
4544
import org.springframework.util.LinkedMultiValueMap;
4645
import org.springframework.util.MultiValueMap;

spring-cloud-gateway-server-mvc/src/test/java/org/springframework/cloud/gateway/server/mvc/ServerMvcIntegrationTests.java

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -337,7 +337,8 @@ public void addResponseHeaderWorks() {
337337
Map<String, Object> map = res.getResponseBody();
338338
Map<String, Object> headers = getMap(map, "headers");
339339
assertThat(headers).doesNotContainKey("x-bar");
340-
assertThat(res.getResponseHeaders().asMultiValueMap()).containsEntry("x-bar", Collections.singletonList("val1"));
340+
assertThat(res.getResponseHeaders().asMultiValueMap()).containsEntry("x-bar",
341+
Collections.singletonList("val1"));
341342
});
342343
}
343344

spring-cloud-gateway-server-mvc/src/test/java/org/springframework/cloud/gateway/server/mvc/filter/TransferEncodingNormalizationRequestHeadersFilterTests.java

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,8 @@ public void noTransferEncodingWithContentLength() {
3636
.buildRequest(null);
3737

3838
HttpHeaders headers = testFilter(ServerRequest.create(servletRequest, Collections.emptyList()));
39-
assertThat(headers.headerNames()).contains(HttpHeaders.CONTENT_LENGTH).doesNotContain(HttpHeaders.TRANSFER_ENCODING);
39+
assertThat(headers.headerNames()).contains(HttpHeaders.CONTENT_LENGTH)
40+
.doesNotContain(HttpHeaders.TRANSFER_ENCODING);
4041
}
4142

4243
@Test
@@ -47,7 +48,8 @@ public void transferEncodingWithContentLength() {
4748
.buildRequest(null);
4849

4950
HttpHeaders headers = testFilter(ServerRequest.create(servletRequest, Collections.emptyList()));
50-
assertThat(headers.headerNames()).doesNotContain(HttpHeaders.CONTENT_LENGTH).contains(HttpHeaders.TRANSFER_ENCODING);
51+
assertThat(headers.headerNames()).doesNotContain(HttpHeaders.CONTENT_LENGTH)
52+
.contains(HttpHeaders.TRANSFER_ENCODING);
5153
}
5254

5355
@Test
@@ -58,7 +60,8 @@ public void transferEncodingCaseInsensitiveWithContentLength() {
5860
.buildRequest(null);
5961

6062
HttpHeaders headers = testFilter(ServerRequest.create(servletRequest, Collections.emptyList()));
61-
assertThat(headers.headerNames()).doesNotContain(HttpHeaders.CONTENT_LENGTH).contains(HttpHeaders.TRANSFER_ENCODING);
63+
assertThat(headers.headerNames()).doesNotContain(HttpHeaders.CONTENT_LENGTH)
64+
.contains(HttpHeaders.TRANSFER_ENCODING);
6265
}
6366

6467
private HttpHeaders testFilter(ServerRequest request) {

spring-cloud-gateway-server-mvc/src/test/java/org/springframework/cloud/gateway/server/mvc/filter/XForwardedRequestHeadersFilterTests.java

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -114,8 +114,8 @@ public void xForwardedHeadersNotTrusted() throws Exception {
114114

115115
HttpHeaders headers = filter.apply(request.headers().asHttpHeaders(), request);
116116

117-
assertThat(headers.headerNames()).doesNotContain(X_FORWARDED_FOR_HEADER, X_FORWARDED_HOST_HEADER, X_FORWARDED_PORT_HEADER,
118-
X_FORWARDED_PROTO_HEADER);
117+
assertThat(headers.headerNames()).doesNotContain(X_FORWARDED_FOR_HEADER, X_FORWARDED_HOST_HEADER,
118+
X_FORWARDED_PORT_HEADER, X_FORWARDED_PROTO_HEADER);
119119
}
120120

121121
// verify that existing forwarded header is not forwarded if not trusted
@@ -135,8 +135,8 @@ public void untrustedXForwardedForNotAppended() {
135135

136136
HttpHeaders headers = filter.apply(request.headers().asHttpHeaders(), request);
137137

138-
assertThat(headers.headerNames()).contains(X_FORWARDED_FOR_HEADER, X_FORWARDED_HOST_HEADER, X_FORWARDED_PORT_HEADER,
139-
X_FORWARDED_PROTO_HEADER);
138+
assertThat(headers.headerNames()).contains(X_FORWARDED_FOR_HEADER, X_FORWARDED_HOST_HEADER,
139+
X_FORWARDED_PORT_HEADER, X_FORWARDED_PROTO_HEADER);
140140

141141
assertThat(headers.getFirst(X_FORWARDED_FOR_HEADER)).doesNotContain("127.0.0.1")
142142
.contains("10.0.0.1", "10.0.0.10");
@@ -156,8 +156,8 @@ public void remoteAdddressIsNullUnTrustedProxyNotAppended() {
156156

157157
HttpHeaders headers = filter.apply(request.headers().asHttpHeaders(), request);
158158

159-
assertThat(headers.headerNames()).contains(X_FORWARDED_FOR_HEADER, X_FORWARDED_HOST_HEADER, X_FORWARDED_PORT_HEADER,
160-
X_FORWARDED_PROTO_HEADER);
159+
assertThat(headers.headerNames()).contains(X_FORWARDED_FOR_HEADER, X_FORWARDED_HOST_HEADER,
160+
X_FORWARDED_PORT_HEADER, X_FORWARDED_PROTO_HEADER);
161161

162162
assertThat(headers.getFirst(X_FORWARDED_FOR_HEADER)).doesNotContain("127.0.0.1");
163163
}

0 commit comments

Comments
 (0)