Skip to content

Commit 088b463

Browse files
committed
Fix PMD violations
1 parent eb8b1c5 commit 088b463

File tree

7 files changed

+13
-13
lines changed

7 files changed

+13
-13
lines changed

core/src/main/java/org/apache/cxf/interceptor/LoggingOutInterceptor.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -177,7 +177,7 @@ public void write(String str, int off, int len) throws IOException {
177177
public void close() throws IOException {
178178
LoggingMessage buffer = setupBuffer(message);
179179
if (count >= lim) {
180-
buffer.getMessage().append("(message truncated to " + lim + " bytes)\n");
180+
buffer.getMessage().append("(message truncated to ").append(lim).append(" bytes)\n");
181181
}
182182
StringWriter w2 = out2;
183183
if (w2 == null) {

rt/rs/extensions/search/src/main/java/org/apache/cxf/jaxrs/ext/search/fiql/FiqlParser.java

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@
1919
package org.apache.cxf.jaxrs.ext.search.fiql;
2020
import java.util.ArrayList;
2121
import java.util.Collections;
22+
import java.util.EnumMap;
2223
import java.util.HashMap;
2324
import java.util.List;
2425
import java.util.Map;
@@ -79,7 +80,7 @@ public class FiqlParser<T> extends AbstractSearchConditionParser<T> {
7980
OPERATORS_MAP.put(EQ, ConditionType.EQUALS);
8081
OPERATORS_MAP.put(NEQ, ConditionType.NOT_EQUALS);
8182

82-
CONDITION_MAP = new HashMap<>();
83+
CONDITION_MAP = new EnumMap<>(ConditionType.class);
8384
CONDITION_MAP.put(ConditionType.GREATER_THAN, GT);
8485
CONDITION_MAP.put(ConditionType.GREATER_OR_EQUALS, GE);
8586
CONDITION_MAP.put(ConditionType.LESS_THAN, LT);

rt/rs/security/jose-parent/jose/src/main/java/org/apache/cxf/rs/security/jose/jwk/JwkUtils.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@
3636
import java.util.ArrayList;
3737
import java.util.Arrays;
3838
import java.util.Collections;
39-
import java.util.HashMap;
39+
import java.util.EnumMap;
4040
import java.util.Iterator;
4141
import java.util.List;
4242
import java.util.Map;
@@ -79,7 +79,7 @@
7979
public final class JwkUtils {
8080
private static final Map<KeyType, List<String>> JWK_REQUIRED_FIELDS_MAP;
8181
static {
82-
JWK_REQUIRED_FIELDS_MAP = new HashMap<>();
82+
JWK_REQUIRED_FIELDS_MAP = new EnumMap<>(KeyType.class);
8383
JWK_REQUIRED_FIELDS_MAP.put(KeyType.RSA, Arrays.asList(
8484
JsonWebKey.RSA_PUBLIC_EXP, JsonWebKey.KEY_TYPE, JsonWebKey.RSA_MODULUS));
8585
JWK_REQUIRED_FIELDS_MAP.put(KeyType.EC, Arrays.asList(

rt/rs/security/jose-parent/jose/src/main/java/org/apache/cxf/rs/security/jose/jws/JwsUtils.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
import java.security.interfaces.ECPrivateKey;
2626
import java.security.interfaces.RSAKey;
2727
import java.util.ArrayList;
28-
import java.util.HashMap;
28+
import java.util.EnumMap;
2929
import java.util.List;
3030
import java.util.Map;
3131
import java.util.Properties;
@@ -229,7 +229,7 @@ public static JwsSignatureVerifier getHmacSignatureVerifier(byte[] key, Signatur
229229

230230
public static Map<SignatureAlgorithm, List<JwsJsonSignatureEntry>> getJwsJsonSignatureMap(
231231
List<JwsJsonSignatureEntry> signatures) {
232-
Map<SignatureAlgorithm, List<JwsJsonSignatureEntry>> map = new HashMap<>();
232+
Map<SignatureAlgorithm, List<JwsJsonSignatureEntry>> map = new EnumMap<>(SignatureAlgorithm.class);
233233
for (JwsJsonSignatureEntry entry : signatures) {
234234
SignatureAlgorithm sigAlgorithm = entry.getUnionHeader().getSignatureAlgorithm();
235235
List<JwsJsonSignatureEntry> entries = map.get(sigAlgorithm);

rt/rs/security/oauth-parent/oauth2/src/main/java/org/apache/cxf/rs/security/oauth2/services/AbstractTokenService.java

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -138,8 +138,7 @@ protected boolean isConfidenatialClientSecretValid(Client client, String provide
138138
if (clientSecretVerifier != null) {
139139
return clientSecretVerifier.validateClientSecret(client, providedClientSecret);
140140
}
141-
return client.getClientSecret() != null
142-
&& providedClientSecret != null && client.getClientSecret().equals(providedClientSecret);
141+
return client.getClientSecret() != null && client.getClientSecret().equals(providedClientSecret);
143142
}
144143
protected boolean isValidPublicClient(Client client, String clientId) {
145144
return canSupportPublicClients

rt/ws/rm/src/main/java/org/apache/cxf/ws/rm/RMEndpoint.java

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@
2020
package org.apache.cxf.ws.rm;
2121

2222
import java.util.Collection;
23-
import java.util.HashMap;
23+
import java.util.EnumMap;
2424
import java.util.List;
2525
import java.util.Map;
2626
import java.util.concurrent.atomic.AtomicInteger;
@@ -101,8 +101,8 @@ public class RMEndpoint {
101101
private EndpointReferenceType replyTo;
102102
private Source source;
103103
private Destination destination;
104-
private final Map<ProtocolVariation, WrappedService> services = new HashMap<>();
105-
private final Map<ProtocolVariation, Endpoint> endpoints = new HashMap<>();
104+
private final Map<ProtocolVariation, WrappedService> services = new EnumMap<>(ProtocolVariation.class);
105+
private final Map<ProtocolVariation, Endpoint> endpoints = new EnumMap<>(ProtocolVariation.class);
106106
private Object tokenStore;
107107
private Proxy proxy;
108108
private Servant servant;

services/sts/sts-core/src/test/java/org/apache/cxf/sts/token/provider/SAMLClaimsTest.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -403,7 +403,7 @@ public void testSaml2CombinedClaimsMultipleClaimsHandlers() throws Exception {
403403
assertTrue(tokenString.contains(providerResponse.getTokenId()));
404404
assertTrue(tokenString.contains("AttributeStatement"));
405405

406-
String requiredClaim = CustomClaimsHandler.ROLE_CLAIM.toString();
406+
String requiredClaim = CustomClaimsHandler.ROLE_CLAIM;
407407
assertTrue(tokenString.contains(requiredClaim));
408408
assertTrue(tokenString.contains("DUMMY"));
409409
assertTrue(tokenString.contains("CustomRole"));
@@ -447,7 +447,7 @@ public void testSaml2SeparateClaimsMultipleClaimsHandlers() throws Exception {
447447
assertTrue(tokenString.contains(providerResponse.getTokenId()));
448448
assertTrue(tokenString.contains("AttributeStatement"));
449449

450-
String requiredClaim = CustomClaimsHandler.ROLE_CLAIM.toString();
450+
String requiredClaim = CustomClaimsHandler.ROLE_CLAIM;
451451
assertTrue(tokenString.contains(requiredClaim));
452452
assertTrue(tokenString.contains("DUMMY"));
453453
assertTrue(tokenString.contains("CustomRole"));

0 commit comments

Comments
 (0)