From a5389cc3594ee259631163bdebd4bf86cef357aa Mon Sep 17 00:00:00 2001 From: su622b Date: Wed, 11 Mar 2020 11:03:27 -0400 Subject: [PATCH] Sonar Cloud migration changes Issue-ID: DMAAP-1407 Change-Id: I8da1faa13512b16c19862412e76712a30c522a16 Signed-off-by: su622b --- pom.xml | 38 +++++++++++++++------- .../kafka/base/authorization/Cadi3AAFProvider.java | 9 +++-- .../base/authorization/Cadi3AAFProviderTest.java | 2 ++ 3 files changed, 36 insertions(+), 13 deletions(-) diff --git a/pom.xml b/pom.xml index 30cd824..b322d68 100644 --- a/pom.xml +++ b/pom.xml @@ -52,6 +52,28 @@ + + org.jacoco + jacoco-maven-plugin + + + prepare-agent + + prepare-agent + + + + report + + report + + + ${project.build.directory}/code-coverage/jacoco.exec + ${project.reporting.outputDirectory}/jacoco-ut + + + + org.apache.maven.plugins maven-surefire-plugin @@ -63,17 +85,6 @@ - - org.codehaus.mojo - cobertura-maven-plugin - 2.7 - - - html - xml - - - org.apache.maven.plugins maven-site-plugin @@ -223,6 +234,11 @@ https://nexus.onap.org nexus3.onap.org:10003 https://nexus.onap.org + java + false + ${project.build.directory}/surefire-reports + ${project.reporting.outputDirectory}/jacoco-ut/jacoco.xml + ${project.version} diff --git a/src/main/java/org/onap/dmaap/commonauth/kafka/base/authorization/Cadi3AAFProvider.java b/src/main/java/org/onap/dmaap/commonauth/kafka/base/authorization/Cadi3AAFProvider.java index 56fd1bb..b5193cc 100644 --- a/src/main/java/org/onap/dmaap/commonauth/kafka/base/authorization/Cadi3AAFProvider.java +++ b/src/main/java/org/onap/dmaap/commonauth/kafka/base/authorization/Cadi3AAFProvider.java @@ -54,10 +54,16 @@ public class Cadi3AAFProvider implements AuthorizationProvider { private static final Logger logger = LoggerFactory.getLogger(Cadi3AAFProvider.class); static { - + if (System.getProperty("enableCadi") != null) { + if (System.getProperty("enableCadi").equals("true")) { + enableCadi = true; + } + } + else{ if (System.getenv("enableCadi") != null && System.getenv("enableCadi").equals("true")) { enableCadi = true; } + } Configuration config = Configuration.getConfiguration(); try { if (config == null) { @@ -181,7 +187,6 @@ public class Cadi3AAFProvider implements AuthorizationProvider { logger.info("^Event received with username " + userId); - boolean enableCadi = System.getenv("enableCadi") == null ? true : false; if (!enableCadi) { return null; } else { diff --git a/src/test/java/org/onap/dmaap/commonauth/kafka/base/authorization/Cadi3AAFProviderTest.java b/src/test/java/org/onap/dmaap/commonauth/kafka/base/authorization/Cadi3AAFProviderTest.java index 743917d..8bd8486 100644 --- a/src/test/java/org/onap/dmaap/commonauth/kafka/base/authorization/Cadi3AAFProviderTest.java +++ b/src/test/java/org/onap/dmaap/commonauth/kafka/base/authorization/Cadi3AAFProviderTest.java @@ -61,6 +61,7 @@ public class Cadi3AAFProviderTest { @Before public void setUp() throws Exception { MockitoAnnotations.initMocks(this); + System.setProperty("enableCadi", "true"); System.setProperty("CADI_PROPERTIES", "src/test/resources/cadi.properties"); cadi3AAFProvider = new Cadi3AAFProvider(); } @@ -77,6 +78,7 @@ public class Cadi3AAFProviderTest { @Test(expected = NullPointerException.class) public void tesAuthenticate() throws Exception { + System.setProperty("enableCadi", "true"); when(aafAuthn.validate("userId", "password")).thenReturn("valid"); assertEquals(cadi3AAFProvider.authenticate("userId", "password"), "valid"); } -- 2.16.6