Skip to content

Commit 11ce4b4

Browse files
quaffmarcusdacoregio
authored andcommitted
Polishing
1. fix deprecations 2. fix generics 3. use lambda instead of anonymous class 4. mark some fields as final
1 parent 831d65a commit 11ce4b4

File tree

18 files changed

+96
-98
lines changed

18 files changed

+96
-98
lines changed
Lines changed: 6 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,7 @@
11
package org.springframework.gradle.maven;
22

3-
import org.gradle.api.Action;
43
import org.gradle.api.Plugin;
54
import org.gradle.api.Project;
6-
import org.gradle.api.artifacts.repositories.MavenArtifactRepository;
75
import org.gradle.api.publish.PublishingExtension;
86
import org.gradle.api.publish.maven.plugins.MavenPublishPlugin;
97

@@ -12,18 +10,12 @@
1210
public class PublishLocalPlugin implements Plugin<Project> {
1311
@Override
1412
public void apply(Project project) {
15-
project.getPlugins().withType(MavenPublishPlugin.class).all(new Action<MavenPublishPlugin>() {
16-
@Override
17-
public void execute(MavenPublishPlugin mavenPublish) {
18-
PublishingExtension publishing = project.getExtensions().getByType(PublishingExtension.class);
19-
publishing.getRepositories().maven(new Action<MavenArtifactRepository>() {
20-
@Override
21-
public void execute(MavenArtifactRepository maven) {
22-
maven.setName("local");
23-
maven.setUrl(new File(project.getRootProject().getBuildDir(), "publications/repos"));
24-
}
25-
});
26-
}
13+
project.getPlugins().withType(MavenPublishPlugin.class).all(mavenPublish -> {
14+
PublishingExtension publishing = project.getExtensions().getByType(PublishingExtension.class);
15+
publishing.getRepositories().maven(maven -> {
16+
maven.setName("local");
17+
maven.setUrl(new File(project.getRootProject().getBuildDir(), "publications/repos"));
18+
});
2719
});
2820
}
2921
}

buildSrc/src/test/java/io/spring/gradle/convention/JavadocApiPluginITest.java

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@
99
import org.junit.jupiter.api.io.TempDir;
1010

1111
import java.io.File;
12+
import java.nio.charset.Charset;
1213
import java.nio.file.Path;
1314

1415
import static org.assertj.core.api.Assertions.assertThat;
@@ -30,7 +31,7 @@ public void multiModuleApi() throws Exception {
3031
File allClasses = new File(testKit.getRootDir(), "build/api/allclasses-noframe.html");
3132
File index = new File(testKit.getRootDir(), "build/api/allclasses-index.html");
3233
File listing = allClasses.exists() ? allClasses : index;
33-
String listingText = FileUtils.readFileToString(listing);
34+
String listingText = FileUtils.readFileToString(listing, Charset.defaultCharset());
3435
assertThat(listingText).contains("sample/Api.html");
3536
assertThat(listingText).contains("sample/Impl.html");
3637
assertThat(listingText).doesNotContain("sample/Sample.html");

buildSrc/src/test/java/io/spring/gradle/convention/SpringMavenPluginITest.java

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@
99
import org.junit.jupiter.api.io.TempDir;
1010

1111
import java.io.File;
12+
import java.nio.charset.Charset;
1213
import java.nio.file.Files;
1314
import java.nio.file.Path;
1415
import java.util.LinkedHashMap;
@@ -56,6 +57,6 @@ public void signArchivesWhenInMemory() throws Exception {
5657
}
5758

5859
public String getSigningKey() throws Exception {
59-
return IOUtils.toString(getClass().getResource("/test-private.pgp"));
60+
return IOUtils.toString(getClass().getResource("/test-private.pgp"), Charset.defaultCharset());
6061
}
6162
}

spring-session-core/src/test/java/org/springframework/session/security/SpringSessionBackedSessionRegistryTest.java

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,7 @@
3030
import org.mockito.InjectMocks;
3131
import org.mockito.Mock;
3232
import org.mockito.junit.jupiter.MockitoExtension;
33+
import org.mockito.quality.Strictness;
3334

3435
import org.springframework.security.core.AuthenticatedPrincipal;
3536
import org.springframework.security.core.Authentication;
@@ -154,7 +155,7 @@ void expireNow() {
154155
private Session createSession(String sessionId, String userName, Instant lastAccessed) {
155156
MapSession session = new MapSession(sessionId);
156157
session.setLastAccessedTime(lastAccessed);
157-
Authentication authentication = mock(Authentication.class, withSettings().lenient());
158+
Authentication authentication = mock(Authentication.class, withSettings().strictness(Strictness.LENIENT));
158159
given(authentication.getName()).willReturn(userName);
159160
SecurityContextImpl securityContext = new SecurityContextImpl();
160161
securityContext.setAuthentication(authentication);

spring-session-core/src/test/java/org/springframework/session/web/http/OnCommittedResponseWrapperTests.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ class OnCommittedResponseWrapperTests {
3939

4040
private static final String NL = "\r\n";
4141

42-
@Mock(lenient = true)
42+
@Mock(strictness = Mock.Strictness.LENIENT)
4343
HttpServletResponse delegate;
4444

4545
@Mock

spring-session-core/src/test/java/org/springframework/session/web/server/session/SpringSessionWebSessionStoreTests.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@
4747
@ExtendWith(MockitoExtension.class)
4848
class SpringSessionWebSessionStoreTests<S extends Session> {
4949

50-
@Mock(lenient = true)
50+
@Mock(strictness = Mock.Strictness.LENIENT)
5151
private ReactiveSessionRepository<S> sessionRepository;
5252

5353
@Mock

spring-session-core/src/test/java/org/springframework/session/web/socket/handler/WebSocketRegistryListenerTests.java

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -48,13 +48,13 @@
4848
@ExtendWith(MockitoExtension.class)
4949
class WebSocketRegistryListenerTests {
5050

51-
@Mock(lenient = true)
51+
@Mock(strictness = Mock.Strictness.LENIENT)
5252
private WebSocketSession wsSession;
5353

54-
@Mock(lenient = true)
54+
@Mock(strictness = Mock.Strictness.LENIENT)
5555
private WebSocketSession wsSession2;
5656

57-
@Mock(lenient = true)
57+
@Mock(strictness = Mock.Strictness.LENIENT)
5858
private Message<byte[]> message;
5959

6060
@Mock

spring-session-core/src/test/java/org/springframework/session/web/socket/server/SessionRepositoryMessageInterceptorTests.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@
5555
@ExtendWith(MockitoExtension.class)
5656
class SessionRepositoryMessageInterceptorTests {
5757

58-
@Mock(lenient = true)
58+
@Mock(strictness = Mock.Strictness.LENIENT)
5959
SessionRepository<Session> sessionRepository;
6060

6161
@Mock

spring-session-data-mongodb/src/integration-test/java/org/springframework/session/data/mongo/MongoDbDeleteJacksonSessionVerificationTest.java

Lines changed: 47 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,7 @@
3636
import org.springframework.http.HttpHeaders;
3737
import org.springframework.http.MediaType;
3838
import org.springframework.http.ResponseEntity;
39+
import org.springframework.security.config.Customizer;
3940
import org.springframework.security.config.annotation.web.reactive.EnableWebFluxSecurity;
4041
import org.springframework.security.config.web.server.ServerHttpSecurity;
4142
import org.springframework.security.core.userdetails.MapReactiveUserDetailsService;
@@ -72,57 +73,62 @@ void setUp() {
7273
void logoutShouldDeleteOldSessionFromMongoDB() {
7374

7475
// 1. Login and capture the SESSION cookie value.
75-
76+
// @formatter:off
7677
FluxExchangeResult<String> loginResult = this.client.post().uri("/login")
77-
.contentType(MediaType.APPLICATION_FORM_URLENCODED) //
78-
.body(BodyInserters //
79-
.fromFormData("username", "admin") //
80-
.with("password", "password")) //
81-
.exchange() //
78+
.contentType(MediaType.APPLICATION_FORM_URLENCODED)
79+
.body(BodyInserters
80+
.fromFormData("username", "admin")
81+
.with("password", "password"))
82+
.exchange()
8283
.returnResult(String.class);
84+
// @formatter:on
8385

8486
AssertionsForClassTypes.assertThat(loginResult.getResponseHeaders().getLocation()).isEqualTo(URI.create("/"));
8587

8688
String originalSessionId = loginResult.getResponseCookies().getFirst("SESSION").getValue();
8789

8890
// 2. Fetch a protected resource using the SESSION cookie.
89-
90-
this.client.get().uri("/hello") //
91-
.cookie("SESSION", originalSessionId) //
92-
.exchange() //
93-
.expectStatus().isOk() //
94-
.returnResult(String.class).getResponseBody() //
95-
.as(StepVerifier::create) //
96-
.expectNext("HelloWorld") //
91+
// @formatter:off
92+
this.client.get().uri("/hello")
93+
.cookie("SESSION", originalSessionId)
94+
.exchange()
95+
.expectStatus().isOk()
96+
.returnResult(String.class).getResponseBody()
97+
.as(StepVerifier::create)
98+
.expectNext("HelloWorld")
9799
.verifyComplete();
100+
// @formatter:on
98101

99102
// 3. Logout using the SESSION cookie, and capture the new SESSION cookie.
100-
101-
String newSessionId = this.client.post().uri("/logout") //
102-
.cookie("SESSION", originalSessionId) //
103-
.exchange() //
104-
.expectStatus().isFound() //
103+
// @formatter:off
104+
String newSessionId = this.client.post().uri("/logout")
105+
.cookie("SESSION", originalSessionId)
106+
.exchange()
107+
.expectStatus().isFound()
105108
.returnResult(String.class).getResponseCookies().getFirst("SESSION").getValue();
109+
// @formatter:on
106110

107111
AssertionsForClassTypes.assertThat(newSessionId).isNotEqualTo(originalSessionId);
108112

109113
// 4. Verify the new SESSION cookie is not yet authorized.
110-
111-
this.client.get().uri("/hello") //
112-
.cookie("SESSION", newSessionId) //
113-
.exchange() //
114-
.expectStatus().isFound() //
114+
// @formatter:off
115+
this.client.get().uri("/hello")
116+
.cookie("SESSION", newSessionId)
117+
.exchange()
118+
.expectStatus().isFound()
115119
.expectHeader()
116120
.value(HttpHeaders.LOCATION, (value) -> AssertionsForClassTypes.assertThat(value).isEqualTo("/login"));
121+
// @formatter:on
117122

118123
// 5. Verify the original SESSION cookie no longer works.
119-
120-
this.client.get().uri("/hello") //
121-
.cookie("SESSION", originalSessionId) //
122-
.exchange() //
123-
.expectStatus().isFound() //
124+
// @formatter:off
125+
this.client.get().uri("/hello")
126+
.cookie("SESSION", originalSessionId)
127+
.exchange()
128+
.expectStatus().isFound()
124129
.expectHeader()
125130
.value(HttpHeaders.LOCATION, (value) -> AssertionsForClassTypes.assertThat(value).isEqualTo("/login"));
131+
// @formatter:on
126132
}
127133

128134
@RestController
@@ -141,24 +147,24 @@ static class SecurityConfig {
141147

142148
@Bean
143149
SecurityWebFilterChain securityWebFilterChain(ServerHttpSecurity http) {
144-
return http //
145-
.logout()//
146-
/**/.and() //
147-
.formLogin() //
148-
/**/.and() //
149-
.csrf().disable() //
150-
.authorizeExchange() //
151-
.anyExchange().authenticated() //
152-
/**/.and() //
150+
// @formatter:off
151+
return http
152+
.logout(Customizer.withDefaults())
153+
.formLogin(Customizer.withDefaults())
154+
.csrf((csrf) -> csrf.disable())
155+
.authorizeExchange((ae) -> ae.anyExchange().authenticated())
153156
.build();
157+
// @formatter:on
154158
}
155159

156160
@Bean
157161
MapReactiveUserDetailsService userDetailsService() {
158-
return new MapReactiveUserDetailsService(User.withUsername("admin") //
159-
.password("{noop}password") //
160-
.roles("USER,ADMIN") //
162+
// @formatter:off
163+
return new MapReactiveUserDetailsService(User.withUsername("admin")
164+
.password("{noop}password")
165+
.roles("USER,ADMIN")
161166
.build());
167+
// @formatter:on
162168
}
163169

164170
@Bean

spring-session-data-mongodb/src/integration-test/java/org/springframework/session/data/mongo/MongoDbLogoutVerificationTest.java

Lines changed: 13 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,7 @@
3636
import org.springframework.http.HttpHeaders;
3737
import org.springframework.http.MediaType;
3838
import org.springframework.http.ResponseEntity;
39+
import org.springframework.security.config.Customizer;
3940
import org.springframework.security.config.annotation.web.reactive.EnableWebFluxSecurity;
4041
import org.springframework.security.config.web.server.ServerHttpSecurity;
4142
import org.springframework.security.core.userdetails.MapReactiveUserDetailsService;
@@ -141,26 +142,24 @@ static class SecurityConfig {
141142

142143
@Bean
143144
SecurityWebFilterChain securityWebFilterChain(ServerHttpSecurity http) {
144-
145-
return http //
146-
.logout()//
147-
/**/.and() //
148-
.formLogin() //
149-
/**/.and() //
150-
.csrf().disable() //
151-
.authorizeExchange() //
152-
.anyExchange().authenticated() //
153-
/**/.and() //
145+
// @formatter:off
146+
return http
147+
.logout(Customizer.withDefaults())
148+
.formLogin(Customizer.withDefaults())
149+
.csrf((csrf) -> csrf.disable())
150+
.authorizeExchange((ae) -> ae.anyExchange().authenticated())
154151
.build();
152+
// @formatter:on
155153
}
156154

157155
@Bean
158156
MapReactiveUserDetailsService userDetailsService() {
159-
160-
return new MapReactiveUserDetailsService(User.withUsername("admin") //
161-
.password("{noop}password") //
162-
.roles("USER,ADMIN") //
157+
// @formatter:off
158+
return new MapReactiveUserDetailsService(User.withUsername("admin")
159+
.password("{noop}password")
160+
.roles("USER,ADMIN")
163161
.build());
162+
// @formatter:on
164163
}
165164

166165
}

0 commit comments

Comments
 (0)