You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@ofbiz.apache.org by su...@apache.org on 2020/08/26 16:12:31 UTC
[ofbiz-plugins] branch trunk updated: Improved: Corrected class
names, method names,
data members of class and variables names in plugins component.
(OFBIZ-11926) Also corrected some formatting and line length related
checkstyle issues.
This is an automated email from the ASF dual-hosted git repository.
surajk pushed a commit to branch trunk
in repository https://gitbox.apache.org/repos/asf/ofbiz-plugins.git
The following commit(s) were added to refs/heads/trunk by this push:
new 33d4d6c Improved: Corrected class names, method names, data members of class and variables names in plugins component. (OFBIZ-11926) Also corrected some formatting and line length related checkstyle issues.
33d4d6c is described below
commit 33d4d6c915ddeb876d0ec1830feab228427bbbf6
Author: Suraj Khurana <su...@hotwax.co>
AuthorDate: Wed Aug 26 21:42:06 2020 +0530
Improved: Corrected class names, method names, data members of class and variables names in plugins component.
(OFBIZ-11926)
Also corrected some formatting and line length related checkstyle issues.
---
.../FirstDataPaymentServices.java | 28 ++++----
.../org/apache/ofbiz/content/test/LuceneTests.java | 2 +-
.../apache/ofbiz/passport/event/GitHubEvents.java | 51 +++++++------
.../ofbiz/passport/event/LinkedInEvents.java | 47 ++++++------
.../ofbiz/passport/user/GitHubAuthenticator.java | 23 +++---
.../ofbiz/passport/user/GitHubUserGroupMapper.java | 8 ++-
.../ofbiz/passport/user/LinkedInAuthenticator.java | 28 +++++---
.../passport/user/LinkedInUserGroupMapper.java | 9 ++-
.../apache/ofbiz/passport/util/PassportUtil.java | 83 +++++++--------------
.../ofbiz/htmlreport/sample/SampleHtmlThread.java | 13 ++--
.../java/org/apache/ofbiz/pricat/PricatEvents.java | 16 +++--
.../ofbiz/pricat/sample/SamplePricatEvents.java | 10 +--
.../org/apache/ofbiz/solr/SolrProductSearch.java | 6 +-
.../main/java/org/apache/ofbiz/solr/SolrUtil.java | 84 +++++++++++-----------
.../java/org/apache/ofbiz/solr/test/SolrTests.java | 66 +++++++++++------
15 files changed, 255 insertions(+), 219 deletions(-)
diff --git a/firstdatapaymentgateway/src/main/java/org/apache/ofbiz/firstdatapaymentgateway/FirstDataPaymentServices.java b/firstdatapaymentgateway/src/main/java/org/apache/ofbiz/firstdatapaymentgateway/FirstDataPaymentServices.java
index 3e2467f..dc117a4 100644
--- a/firstdatapaymentgateway/src/main/java/org/apache/ofbiz/firstdatapaymentgateway/FirstDataPaymentServices.java
+++ b/firstdatapaymentgateway/src/main/java/org/apache/ofbiz/firstdatapaymentgateway/FirstDataPaymentServices.java
@@ -60,7 +60,7 @@ import freemarker.template.TemplateException;
public class FirstDataPaymentServices {
private static final String MODULE = FirstDataPaymentServices.class.getName();
- private static Properties FDProperties = null;
+ private static Properties fdProperties = null;
public static Map<String, Object> ccAuth(DispatchContext ctx, Map<String, Object> context) {
Delegator delegator = ctx.getDelegator();
@@ -103,10 +103,10 @@ public class FirstDataPaymentServices {
CloseableHttpClient httpClient = HttpClients.createDefault();
StringEntity stringEntity = new StringEntity(requestBody);
- HttpPost httpPost = new HttpPost(FDProperties.getProperty("transactionUrl") + "/payments");
+ HttpPost httpPost = new HttpPost(fdProperties.getProperty("transactionUrl") + "/payments");
httpPost.setEntity(stringEntity);
httpPost.setHeader("Client-Request-Id", clientRequestId);
- httpPost.setHeader("Api-Key", FDProperties.getProperty("apiKey"));
+ httpPost.setHeader("Api-Key", fdProperties.getProperty("apiKey"));
httpPost.setHeader("Timestamp", epochTime);
httpPost.setHeader("Message-Signature", messageSignature);
httpPost.setHeader("Content-Type", "application/json");
@@ -193,10 +193,10 @@ public class FirstDataPaymentServices {
CloseableHttpClient httpClient = HttpClients.createDefault();
StringEntity stringEntity = new StringEntity(requestBody);
- HttpPost httpPost = new HttpPost(FDProperties.getProperty("transactionUrl") + "/payments/" + authTransactionId);
+ HttpPost httpPost = new HttpPost(fdProperties.getProperty("transactionUrl") + "/payments/" + authTransactionId);
httpPost.setEntity(stringEntity);
httpPost.setHeader("Client-Request-Id", clientRequestId);
- httpPost.setHeader("Api-Key", FDProperties.getProperty("apiKey"));
+ httpPost.setHeader("Api-Key", fdProperties.getProperty("apiKey"));
httpPost.setHeader("Timestamp", epochTime);
httpPost.setHeader("Message-Signature", messageSignature);
httpPost.setHeader("Content-Type", "application/json");
@@ -280,10 +280,10 @@ public class FirstDataPaymentServices {
CloseableHttpClient httpClient = HttpClients.createDefault();
StringEntity stringEntity = new StringEntity(requestBody);
- HttpPost httpPost = new HttpPost(FDProperties.getProperty("transactionUrl") + "/payments/" + captureTransactionId);
+ HttpPost httpPost = new HttpPost(fdProperties.getProperty("transactionUrl") + "/payments/" + captureTransactionId);
httpPost.setEntity(stringEntity);
httpPost.setHeader("Client-Request-Id", clientRequestId);
- httpPost.setHeader("Api-Key", FDProperties.getProperty("apiKey"));
+ httpPost.setHeader("Api-Key", fdProperties.getProperty("apiKey"));
httpPost.setHeader("Timestamp", epochTime);
httpPost.setHeader("Message-Signature", messageSignature);
httpPost.setHeader("Content-Type", "application/json");
@@ -368,10 +368,10 @@ public class FirstDataPaymentServices {
CloseableHttpClient httpClient = HttpClients.createDefault();
StringEntity stringEntity = new StringEntity(requestBody);
- HttpPost httpPost = new HttpPost(FDProperties.getProperty("transactionUrl") + "/payments/" + releaseTransactionId);
+ HttpPost httpPost = new HttpPost(fdProperties.getProperty("transactionUrl") + "/payments/" + releaseTransactionId);
httpPost.setEntity(stringEntity);
httpPost.setHeader("Client-Request-Id", clientRequestId);
- httpPost.setHeader("Api-Key", FDProperties.getProperty("apiKey"));
+ httpPost.setHeader("Api-Key", fdProperties.getProperty("apiKey"));
httpPost.setHeader("Timestamp", epochTime);
httpPost.setHeader("Message-Signature", messageSignature);
httpPost.setHeader("Content-Type", "application/json");
@@ -428,8 +428,8 @@ public class FirstDataPaymentServices {
props.put("apiSecret", apiSecret);
//props.put("enableDataVault", enableDataVault);
- if (FDProperties == null) {
- FDProperties = props;
+ if (fdProperties == null) {
+ fdProperties = props;
}
return props;
@@ -457,12 +457,12 @@ public class FirstDataPaymentServices {
private static String buildMessageSignature(String paymentGatewayConfigId, String requestBody, String clientRequestId, String epochTime,
Delegator delegator) {
String messageSignature = null;
- if (FDProperties == null) {
+ if (fdProperties == null) {
buildFDProperties(paymentGatewayConfigId, delegator);
}
- String apiKey = FDProperties.getProperty("apiKey");
- final HmacUtils hmacHelper = new HmacUtils(HmacAlgorithms.HMAC_SHA_256, FDProperties.getProperty("apiSecret"));
+ String apiKey = fdProperties.getProperty("apiKey");
+ final HmacUtils hmacHelper = new HmacUtils(HmacAlgorithms.HMAC_SHA_256, fdProperties.getProperty("apiSecret"));
final Hex hexHelper = new Hex();
final String msg = apiKey + clientRequestId + epochTime + requestBody;
final byte[] raw = hmacHelper.hmac(msg);
diff --git a/lucene/src/main/java/org/apache/ofbiz/content/test/LuceneTests.java b/lucene/src/main/java/org/apache/ofbiz/content/test/LuceneTests.java
index 253780d..e325e14 100644
--- a/lucene/src/main/java/org/apache/ofbiz/content/test/LuceneTests.java
+++ b/lucene/src/main/java/org/apache/ofbiz/content/test/LuceneTests.java
@@ -55,7 +55,7 @@ public class LuceneTests extends OFBizTestCase {
Map<String, Object> ctx = new HashMap<>();
ctx.put("contentId", "LuceneCONTENT");
ctx.put("userLogin", getUserLogin("system"));
- Map<String, Object> resp = dispatcher.runSync("indexContentTree", ctx);
+ Map<String, Object> resp = getDispatcher().runSync("indexContentTree", ctx);
if (ServiceUtil.isError(resp)) {
String errorMessage = ServiceUtil.getErrorMessage(resp);
throw new Exception(errorMessage);
diff --git a/passport/src/main/java/org/apache/ofbiz/passport/event/GitHubEvents.java b/passport/src/main/java/org/apache/ofbiz/passport/event/GitHubEvents.java
index 84c54f8..f1e6530 100644
--- a/passport/src/main/java/org/apache/ofbiz/passport/event/GitHubEvents.java
+++ b/passport/src/main/java/org/apache/ofbiz/passport/event/GitHubEvents.java
@@ -68,15 +68,23 @@ public class GitHubEvents {
private static final String MODULE = GitHubEvents.class.getName();
private static final String RESOURCE = "PassportUiLabels";
- public static final String AuthorizeUri = "/login/oauth/authorize";
- public static final String TokenServiceUri = "/login/oauth/access_token";
- public static final String UserApiUri = "/user";
- public static final String DEFAULT_SCOPE = "user,gist";
- public static final String ApiEndpoint = "https://api.github.com";
- public static final String TokenEndpoint = "https://github.com";
- public static final String SESSION_GITHUB_STATE = "_GITHUB_STATE_";
+ private static final String AUTHORIZE_URI = "/login/oauth/authorize";
+ private static final String TOKEN_SERVICE_URI = "/login/oauth/access_token";
+ private static final String USER_API_URI = "/user";
+ private static final String DEFAULT_SCOPE = "user,gist";
+ private static final String API_END_POINT = "https://api.github.com";
+ private static final String TOKEN_END_POINT = "https://github.com";
+ private static final String SESSION_GITHUB_STATE = "_GITHUB_STATE_";
- public static final String envPrefix = UtilProperties.getPropertyValue(GitHubAuthenticator.props, "github.env.prefix", "test");
+ public static final String ENV_PREFIX = UtilProperties.getPropertyValue(GitHubAuthenticator.PROPS, "github.env.prefix", "test");
+
+ public static String getApiEndPoint() {
+ return API_END_POINT;
+ }
+
+ public static String getUserApiUri() {
+ return USER_API_URI;
+ }
/**
* Redirect to GitHub login page.
@@ -94,7 +102,7 @@ public class GitHubEvents {
try {
String state = System.currentTimeMillis() + String.valueOf((new Random(10)).nextLong());
request.getSession().setAttribute(SESSION_GITHUB_STATE, state);
- String redirectUrl = TokenEndpoint + AuthorizeUri
+ String redirectUrl = TOKEN_END_POINT + AUTHORIZE_URI
+ "?client_id=" + clientId
+ "&scope=" + DEFAULT_SCOPE
+ "&redirect_uri=" + URLEncoder.encode(returnURI, "UTF-8")
@@ -132,7 +140,8 @@ public class GitHubEvents {
String errorDescpriton = request.getParameter(PassportUtil.COMMON_ERROR_DESCRIPTION);
String errMsg = null;
try {
- errMsg = UtilProperties.getMessage(RESOURCE, "FailedToGetGitHubAuthorizationCode", UtilMisc.toMap(PassportUtil.COMMON_ERROR, error, PassportUtil.COMMON_ERROR_DESCRIPTION, URLDecoder.decode(errorDescpriton, "UTF-8")), UtilHttp.getLocale(request));
+ errMsg = UtilProperties.getMessage(RESOURCE, "FailedToGetGitHubAuthorizationCode", UtilMisc.toMap(PassportUtil.COMMON_ERROR,
+ error, PassportUtil.COMMON_ERROR_DESCRIPTION, URLDecoder.decode(errorDescpriton, "UTF-8")), UtilHttp.getLocale(request));
} catch (UnsupportedEncodingException e) {
errMsg = UtilProperties.getMessage(RESOURCE, "GitHubGetAuthorizationCodeError", UtilHttp.getLocale(request));
}
@@ -158,9 +167,9 @@ public class GitHubEvents {
try {
URI uri = new URIBuilder()
- .setScheme(TokenEndpoint.substring(0, TokenEndpoint.indexOf(":")))
- .setHost(TokenEndpoint.substring(TokenEndpoint.indexOf(":") + 3))
- .setPath(TokenServiceUri)
+ .setScheme(TOKEN_END_POINT.substring(0, TOKEN_END_POINT.indexOf(":")))
+ .setHost(TOKEN_END_POINT.substring(TOKEN_END_POINT.indexOf(":") + 3))
+ .setPath(TOKEN_SERVICE_URI)
.setParameter("client_id", clientId)
.setParameter("client_secret", secret)
.setParameter("code", authorizationCode)
@@ -169,7 +178,7 @@ public class GitHubEvents {
HttpPost postMethod = new HttpPost(uri);
CloseableHttpClient jsonClient = HttpClients.custom().build();
// Debug.logInfo("GitHub get access token query string: " + postMethod.getURI(), MODULE);
- postMethod.setConfig(PassportUtil.StandardRequestConfig);
+ postMethod.setConfig(PassportUtil.STANDARD_REQ_CONFIG);
postMethod.setHeader(PassportUtil.ACCEPT_HEADER, "application/json");
CloseableHttpResponse postResponse = jsonClient.execute(postMethod);
String responseString = new BasicResponseHandler().handleResponse(postResponse);
@@ -185,7 +194,8 @@ public class GitHubEvents {
// Debug.logInfo("Generated Access Token : " + accessToken, MODULE);
// Debug.logInfo("Token Type: " + tokenType, MODULE);
} else {
- String errMsg = UtilProperties.getMessage(RESOURCE, "GitHubGetOAuth2AccessTokenError", UtilMisc.toMap("error", responseString), UtilHttp.getLocale(request));
+ String errMsg = UtilProperties.getMessage(RESOURCE, "GitHubGetOAuth2AccessTokenError",
+ UtilMisc.toMap("error", responseString), UtilHttp.getLocale(request));
request.setAttribute("_ERROR_MESSAGE_", errMsg);
return "error";
}
@@ -195,7 +205,7 @@ public class GitHubEvents {
}
// Get User Profile
- HttpGet getMethod = new HttpGet(ApiEndpoint + UserApiUri);
+ HttpGet getMethod = new HttpGet(API_END_POINT + USER_API_URI);
Map<String, Object> userInfo = null;
try {
userInfo = GitHubAuthenticator.getUserInfo(getMethod, accessToken, tokenType, UtilHttp.getLocale(request));
@@ -229,8 +239,8 @@ public class GitHubEvents {
gitHubUser.set("accessToken", accessToken);
dataChanged = true;
}
- if (!envPrefix.equals(gitHubUser.getString("envPrefix"))) {
- gitHubUser.set("envPrefix", envPrefix);
+ if (!ENV_PREFIX.equals(gitHubUser.getString("ENV_PREFIX"))) {
+ gitHubUser.set("envPrefix", ENV_PREFIX);
dataChanged = true;
}
if (!productStoreId.equals(gitHubUser.getString("productStoreId"))) {
@@ -247,7 +257,7 @@ public class GitHubEvents {
} else {
gitHubUser = delegator.makeValue("GitHubUser", UtilMisc.toMap("accessToken", accessToken,
"productStoreId", productStoreId,
- "envPrefix", envPrefix,
+ "envPrefix", ENV_PREFIX,
"gitHubUserId", gitHubUserId));
try {
gitHubUser.create();
@@ -263,7 +273,8 @@ public class GitHubEvents {
String userLoginId = authn.createUser(userInfo);
userLogin = EntityQuery.use(delegator).from("UserLogin").where("userLoginId", userLoginId).queryOne();
}
- String autoPassword = RandomStringUtils.randomAlphanumeric(EntityUtilProperties.getPropertyAsInteger("security", "password.length.min", 5));
+ String autoPassword = RandomStringUtils.randomAlphanumeric(EntityUtilProperties.getPropertyAsInteger("security",
+ "password.length.min", 5));
boolean useEncryption = "true".equals(UtilProperties.getPropertyValue("security", "password.encrypt"));
userLogin.set("currentPassword", useEncryption ? HashCrypt.digestHash(LoginServices.getHashType(), null, autoPassword) : autoPassword);
userLogin.store();
diff --git a/passport/src/main/java/org/apache/ofbiz/passport/event/LinkedInEvents.java b/passport/src/main/java/org/apache/ofbiz/passport/event/LinkedInEvents.java
index 88ef883..48e6f37 100644
--- a/passport/src/main/java/org/apache/ofbiz/passport/event/LinkedInEvents.java
+++ b/passport/src/main/java/org/apache/ofbiz/passport/event/LinkedInEvents.java
@@ -71,13 +71,13 @@ public class LinkedInEvents {
private static final String MODULE = LinkedInEvents.class.getName();
private static final String RESOURCE = "PassportUiLabels";
- public static final String AuthorizeUri = "/uas/oauth2/authorization";
- public static final String TokenServiceUri = "/uas/oauth2/accessToken";
- public static final String UserApiUri = "/v1/people/~";
+ public static final String AUTHORIZE_URI = "/uas/oauth2/authorization";
+ public static final String TOKEN_SERVICE_URI = "/uas/oauth2/accessToken";
+ public static final String USER_API_URI = "/v1/people/~";
public static final String DEFAULT_SCOPE = "r_basicprofile%20r_emailaddress";
- public static final String TokenEndpoint = "https://www.linkedin.com";
+ public static final String TOKEN_END_POINT = "https://www.linkedin.com";
public static final String SESSION_LINKEDIN_STATE = "_LINKEDIN_STATE_";
- public static final String envPrefix = UtilProperties.getPropertyValue(LinkedInAuthenticator.props, "linkedin.env.prefix", "test");
+ public static final String ENV_PREFIX = UtilProperties.getPropertyValue(LinkedInAuthenticator.getPROPS(), "linkedin.env.prefix", "test");
/**
* Redirect to LinkedIn login page.
@@ -89,14 +89,14 @@ public class LinkedInEvents {
return "error";
}
- String clientId = oauth2LinkedIn.getString(PassportUtil.ApiKeyLabel);
- String returnURI = oauth2LinkedIn.getString(envPrefix + PassportUtil.ReturnUrlLabel);
+ String clientId = oauth2LinkedIn.getString(PassportUtil.API_KEY_LABEL);
+ String returnURI = oauth2LinkedIn.getString(ENV_PREFIX + PassportUtil.RETURN_URL_LABEL);
// Get user authorization code
try {
String state = System.currentTimeMillis() + String.valueOf((new Random(10)).nextLong());
request.getSession().setAttribute(SESSION_LINKEDIN_STATE, state);
- String redirectUrl = TokenEndpoint + AuthorizeUri
+ String redirectUrl = TOKEN_END_POINT + AUTHORIZE_URI
+ "?client_id=" + clientId
+ "&response_type=code"
+ "&scope=" + DEFAULT_SCOPE
@@ -134,7 +134,8 @@ public class LinkedInEvents {
String errorDescpriton = request.getParameter(PassportUtil.COMMON_ERROR_DESCRIPTION);
String errMsg = null;
try {
- errMsg = UtilProperties.getMessage(RESOURCE, "LinkedInFailedToGetAuthorizationCode", UtilMisc.toMap(PassportUtil.COMMON_ERROR, error, PassportUtil.COMMON_ERROR_DESCRIPTION, URLDecoder.decode(errorDescpriton, "UTF-8")), UtilHttp.getLocale(request));
+ errMsg = UtilProperties.getMessage(RESOURCE, "LinkedInFailedToGetAuthorizationCode", UtilMisc.toMap(PassportUtil.COMMON_ERROR,
+ error, PassportUtil.COMMON_ERROR_DESCRIPTION, URLDecoder.decode(errorDescpriton, "UTF-8")), UtilHttp.getLocale(request));
} catch (UnsupportedEncodingException e) {
errMsg = UtilProperties.getMessage(RESOURCE, "LinkedInGetAuthorizationCodeError", UtilHttp.getLocale(request));
}
@@ -149,9 +150,9 @@ public class LinkedInEvents {
request.setAttribute("_ERROR_MESSAGE_", errMsg);
return "error";
}
- String clientId = oauth2LinkedIn.getString(PassportUtil.ApiKeyLabel);
- String secret = oauth2LinkedIn.getString(PassportUtil.SecretKeyLabel);
- String returnURI = oauth2LinkedIn.getString(envPrefix + PassportUtil.ReturnUrlLabel);
+ String clientId = oauth2LinkedIn.getString(PassportUtil.API_KEY_LABEL);
+ String secret = oauth2LinkedIn.getString(PassportUtil.SECRET_KEY_LABEL);
+ String returnURI = oauth2LinkedIn.getString(ENV_PREFIX + PassportUtil.RETURN_URL_LABEL);
// Grant token from authorization code and oauth2 token
// Use the authorization code to obtain an access token
@@ -159,9 +160,9 @@ public class LinkedInEvents {
try {
URI uri = new URIBuilder()
- .setScheme(TokenEndpoint.substring(0, TokenEndpoint.indexOf(":")))
- .setHost(TokenEndpoint.substring(TokenEndpoint.indexOf(":") + 3))
- .setPath(TokenServiceUri)
+ .setScheme(TOKEN_END_POINT.substring(0, TOKEN_END_POINT.indexOf(":")))
+ .setHost(TOKEN_END_POINT.substring(TOKEN_END_POINT.indexOf(":") + 3))
+ .setPath(TOKEN_SERVICE_URI)
.setParameter("client_id", clientId)
.setParameter("client_secret", secret)
.setParameter("grant_type", "authorization_code")
@@ -171,7 +172,7 @@ public class LinkedInEvents {
HttpPost postMethod = new HttpPost(uri);
CloseableHttpClient jsonClient = HttpClients.custom().build();
// Debug.logInfo("LinkedIn get access token query string: " + postMethod.getURI(), MODULE);
- postMethod.setConfig(PassportUtil.StandardRequestConfig);
+ postMethod.setConfig(PassportUtil.STANDARD_REQ_CONFIG);
CloseableHttpResponse postResponse = jsonClient.execute(postMethod);
String responseString = new BasicResponseHandler().handleResponse(postResponse);
// Debug.logInfo("LinkedIn get access token response code: " + postResponse.getStatusLine().getStatusCode(), MODULE);
@@ -184,7 +185,8 @@ public class LinkedInEvents {
accessToken = (String) userMap.get("access_token");
// Debug.logInfo("Generated Access Token : " + accessToken, MODULE);
} else {
- String errMsg = UtilProperties.getMessage(RESOURCE, "LinkedInGetOAuth2AccessTokenError", UtilMisc.toMap("error", responseString), UtilHttp.getLocale(request));
+ String errMsg = UtilProperties.getMessage(RESOURCE, "LinkedInGetOAuth2AccessTokenError", UtilMisc.toMap("error",
+ responseString), UtilHttp.getLocale(request));
request.setAttribute("_ERROR_MESSAGE_", errMsg);
return "error";
}
@@ -194,7 +196,7 @@ public class LinkedInEvents {
}
// Get User Profile
- HttpGet getMethod = new HttpGet(TokenEndpoint + UserApiUri + "?oauth2_access_token=" + accessToken);
+ HttpGet getMethod = new HttpGet(TOKEN_END_POINT + USER_API_URI + "?oauth2_access_token=" + accessToken);
Document userInfo = null;
try {
userInfo = LinkedInAuthenticator.getUserInfo(getMethod, UtilHttp.getLocale(request));
@@ -228,8 +230,8 @@ public class LinkedInEvents {
linkedInUser.set("accessToken", accessToken);
dataChanged = true;
}
- if (!envPrefix.equals(linkedInUser.getString("envPrefix"))) {
- linkedInUser.set("envPrefix", envPrefix);
+ if (!ENV_PREFIX.equals(linkedInUser.getString("ENV_PREFIX"))) {
+ linkedInUser.set("ENV_PREFIX", ENV_PREFIX);
dataChanged = true;
}
if (!productStoreId.equals(linkedInUser.getString("productStoreId"))) {
@@ -246,7 +248,7 @@ public class LinkedInEvents {
} else {
linkedInUser = delegator.makeValue("LinkedInUser", UtilMisc.toMap("accessToken", accessToken,
"productStoreId", productStoreId,
- "envPrefix", envPrefix,
+ "ENV_PREFIX", ENV_PREFIX,
"linkedInUserId", linkedInUserId));
try {
linkedInUser.create();
@@ -262,7 +264,8 @@ public class LinkedInEvents {
String userLoginId = authn.createUser(userInfo);
userLogin = EntityQuery.use(delegator).from("UserLogin").where("userLoginId", userLoginId).queryOne();
}
- String autoPassword = RandomStringUtils.randomAlphanumeric(EntityUtilProperties.getPropertyAsInteger("security", "password.length.min", 5));
+ String autoPassword = RandomStringUtils.randomAlphanumeric(EntityUtilProperties.getPropertyAsInteger("security",
+ "password.length.min", 5));
boolean useEncryption = "true".equals(UtilProperties.getPropertyValue("security", "password.encrypt"));
userLogin.set("currentPassword", useEncryption ? HashCrypt.digestHash(LoginServices.getHashType(), null, autoPassword) : autoPassword);
userLogin.store();
diff --git a/passport/src/main/java/org/apache/ofbiz/passport/user/GitHubAuthenticator.java b/passport/src/main/java/org/apache/ofbiz/passport/user/GitHubAuthenticator.java
index 1467b49..d09cebb 100644
--- a/passport/src/main/java/org/apache/ofbiz/passport/user/GitHubAuthenticator.java
+++ b/passport/src/main/java/org/apache/ofbiz/passport/user/GitHubAuthenticator.java
@@ -63,13 +63,13 @@ public class GitHubAuthenticator implements Authenticator {
private static final String MODULE = GitHubAuthenticator.class.getName();
- public static final String props = "gitHubAuth.properties";
+ public static final String PROPS = "gitHubAuth.properties";
private static final String RESOURCE = "PassportUiLabels";
- protected LocalDispatcher dispatcher;
+ private LocalDispatcher dispatcher;
- protected Delegator delegator;
+ private Delegator delegator;
/**
* Method called when authenticator is first initialized (the delegator
@@ -106,7 +106,7 @@ public class GitHubAuthenticator implements Authenticator {
String accessToken = gitHubUser.getString("accessToken");
String tokenType = gitHubUser.getString("tokenType");
if (UtilValidate.isNotEmpty(accessToken)) {
- getMethod = new HttpGet(GitHubEvents.ApiEndpoint + GitHubEvents.UserApiUri);
+ getMethod = new HttpGet(GitHubEvents.getApiEndPoint() + GitHubEvents.getUserApiUri());
user = GitHubAuthenticator.getUserInfo(getMethod, accessToken, tokenType, Locale.getDefault());
}
}
@@ -212,7 +212,7 @@ public class GitHubAuthenticator implements Authenticator {
String accessToken = gitHubUser.getString("accessToken");
String tokenType = gitHubUser.getString("tokenType");
if (UtilValidate.isNotEmpty(accessToken)) {
- getMethod = new HttpGet(GitHubEvents.ApiEndpoint + GitHubEvents.UserApiUri);
+ getMethod = new HttpGet(GitHubEvents.getApiEndPoint() + GitHubEvents.getUserApiUri());
user = getUserInfo(getMethod, accessToken, tokenType, Locale.getDefault());
}
}
@@ -222,6 +222,12 @@ public class GitHubAuthenticator implements Authenticator {
return user;
}
+ /**
+ * Create user string.
+ * @param userMap the user map
+ * @return the string
+ * @throws AuthenticatorException the authenticator exception
+ */
public String createUser(Map<String, Object> userMap) throws AuthenticatorException {
GenericValue system;
try {
@@ -369,12 +375,13 @@ public class GitHubAuthenticator implements Authenticator {
*/
@Override
public boolean isEnabled() {
- return "true".equalsIgnoreCase(UtilProperties.getPropertyValue(props, "github.authenticator.enabled", "true"));
+ return "true".equalsIgnoreCase(UtilProperties.getPropertyValue(PROPS, "github.authenticator.enabled", "true"));
}
- public static Map<String, Object> getUserInfo(HttpGet httpGet, String accessToken, String tokenType, Locale locale) throws AuthenticatorException {
+ public static Map<String, Object> getUserInfo(HttpGet httpGet, String accessToken, String tokenType, Locale locale)
+ throws AuthenticatorException {
JSON userInfo = null;
- httpGet.setConfig(PassportUtil.StandardRequestConfig);
+ httpGet.setConfig(PassportUtil.STANDARD_REQ_CONFIG);
CloseableHttpClient jsonClient = HttpClients.custom().build();
httpGet.setHeader(PassportUtil.AUTHORIZATION_HEADER, tokenType + " " + accessToken);
httpGet.setHeader(PassportUtil.ACCEPT_HEADER, "application/json");
diff --git a/passport/src/main/java/org/apache/ofbiz/passport/user/GitHubUserGroupMapper.java b/passport/src/main/java/org/apache/ofbiz/passport/user/GitHubUserGroupMapper.java
index 20ab400..7d2b9f1 100644
--- a/passport/src/main/java/org/apache/ofbiz/passport/user/GitHubUserGroupMapper.java
+++ b/passport/src/main/java/org/apache/ofbiz/passport/user/GitHubUserGroupMapper.java
@@ -32,7 +32,7 @@ import org.apache.ofbiz.base.util.UtilProperties;
*/
public class GitHubUserGroupMapper {
- protected List<String> groups;
+ private List<String> groups;
public GitHubUserGroupMapper(String[] groups) {
this.groups = Arrays.asList(groups);
@@ -45,8 +45,12 @@ public class GitHubUserGroupMapper {
groups.add(group);
}
+ /**
+ * Gets security groups.
+ * @return the security groups
+ */
public Set<String> getSecurityGroups() {
- Properties props = UtilProperties.getProperties(GitHubAuthenticator.props);
+ Properties props = UtilProperties.getProperties(GitHubAuthenticator.PROPS);
Set<String> secGroups = new HashSet<>();
boolean running = true;
diff --git a/passport/src/main/java/org/apache/ofbiz/passport/user/LinkedInAuthenticator.java b/passport/src/main/java/org/apache/ofbiz/passport/user/LinkedInAuthenticator.java
index 89ac486..6645cf0 100644
--- a/passport/src/main/java/org/apache/ofbiz/passport/user/LinkedInAuthenticator.java
+++ b/passport/src/main/java/org/apache/ofbiz/passport/user/LinkedInAuthenticator.java
@@ -65,13 +65,14 @@ public class LinkedInAuthenticator implements Authenticator {
private static final String MODULE = LinkedInAuthenticator.class.getName();
- public static final String props = "linkedInAuth.properties";
+ public static String getPROPS() {
+ return PROPS;
+ }
+ private static final String PROPS = "linkedInAuth.properties";
private static final String RESOURCE = "PassportUiLabels";
-
- protected LocalDispatcher dispatcher;
-
- protected Delegator delegator;
+ private LocalDispatcher dispatcher;
+ private Delegator delegator;
/**
* Method called when authenticator is first initialized (the delegator
@@ -107,7 +108,7 @@ public class LinkedInAuthenticator implements Authenticator {
if (linkedInUser != null) {
String accessToken = linkedInUser.getString("accessToken");
if (UtilValidate.isNotEmpty(accessToken)) {
- getMethod = new HttpGet(LinkedInEvents.TokenEndpoint + LinkedInEvents.UserApiUri + "?oauth2_access_token=" + accessToken);
+ getMethod = new HttpGet(LinkedInEvents.TOKEN_END_POINT + LinkedInEvents.USER_API_URI + "?oauth2_access_token=" + accessToken);
user = LinkedInAuthenticator.getUserInfo(getMethod, Locale.getDefault());
}
}
@@ -215,7 +216,7 @@ public class LinkedInAuthenticator implements Authenticator {
if (linkedInUser != null) {
String accessToken = linkedInUser.getString("accessToken");
if (UtilValidate.isNotEmpty(accessToken)) {
- getMethod = new HttpGet(LinkedInEvents.TokenEndpoint + LinkedInEvents.UserApiUri + "?oauth2_access_token=" + accessToken);
+ getMethod = new HttpGet(LinkedInEvents.TOKEN_END_POINT + LinkedInEvents.USER_API_URI + "?oauth2_access_token=" + accessToken);
user = getUserInfo(getMethod, Locale.getDefault());
}
}
@@ -231,6 +232,12 @@ public class LinkedInAuthenticator implements Authenticator {
return user;
}
+ /**
+ * Create user string.
+ * @param user the user
+ * @return the string
+ * @throws AuthenticatorException the authenticator exception
+ */
public String createUser(Document user) throws AuthenticatorException {
GenericValue system;
try {
@@ -382,12 +389,13 @@ public class LinkedInAuthenticator implements Authenticator {
*/
@Override
public boolean isEnabled() {
- return "true".equalsIgnoreCase(UtilProperties.getPropertyValue(props, "linked.authenticator.enabled", "true"));
+ return "true".equalsIgnoreCase(UtilProperties.getPropertyValue(PROPS, "linked.authenticator.enabled", "true"));
}
- public static Document getUserInfo(HttpGet httpGet, Locale locale) throws IOException, AuthenticatorException, SAXException, ParserConfigurationException {
+ public static Document getUserInfo(HttpGet httpGet, Locale locale)
+ throws IOException, AuthenticatorException, SAXException, ParserConfigurationException {
Document userInfo = null;
- httpGet.setConfig(PassportUtil.StandardRequestConfig);
+ httpGet.setConfig(PassportUtil.STANDARD_REQ_CONFIG);
CloseableHttpClient jsonClient = HttpClients.custom().build();
CloseableHttpResponse getResponse = jsonClient.execute(httpGet);
String responseString = new BasicResponseHandler().handleResponse(getResponse);
diff --git a/passport/src/main/java/org/apache/ofbiz/passport/user/LinkedInUserGroupMapper.java b/passport/src/main/java/org/apache/ofbiz/passport/user/LinkedInUserGroupMapper.java
index a2896c5..f19ee48 100644
--- a/passport/src/main/java/org/apache/ofbiz/passport/user/LinkedInUserGroupMapper.java
+++ b/passport/src/main/java/org/apache/ofbiz/passport/user/LinkedInUserGroupMapper.java
@@ -32,8 +32,7 @@ import org.apache.ofbiz.base.util.UtilProperties;
*/
public class LinkedInUserGroupMapper {
- protected List<String> groups;
-
+ private List<String> groups;
public LinkedInUserGroupMapper(String[] groups) {
this.groups = Arrays.asList(groups);
}
@@ -45,8 +44,12 @@ public class LinkedInUserGroupMapper {
groups.add(group);
}
+ /**
+ * Gets security groups.
+ * @return the security groups
+ */
public Set<String> getSecurityGroups() {
- Properties props = UtilProperties.getProperties(LinkedInAuthenticator.props);
+ Properties props = UtilProperties.getProperties(LinkedInAuthenticator.getPROPS());
Set<String> secGroups = new HashSet<>();
boolean running = true;
diff --git a/passport/src/main/java/org/apache/ofbiz/passport/util/PassportUtil.java b/passport/src/main/java/org/apache/ofbiz/passport/util/PassportUtil.java
index 6cd56a2..e0f4f2b 100644
--- a/passport/src/main/java/org/apache/ofbiz/passport/util/PassportUtil.java
+++ b/passport/src/main/java/org/apache/ofbiz/passport/util/PassportUtil.java
@@ -29,68 +29,39 @@ import org.apache.ofbiz.base.util.Debug;
public class PassportUtil {
private static final String MODULE = PassportUtil.class.getName();
-
- public static final String ClientIdLabel = "ClientId";
-
- public static final String SecretLabel = "Secret";
-
- public static final String ReturnUrlLabel = "ReturnUrl";
-
- public static final String TokenEndpointLabel = "TokenEndpoint";
-
- public static final String GrantTypeLabel = "grantType";
-
- public static final String ContentTypeLabel = "contentType";
-
+ private static final String CLIENT_ID_LABEL = "ClientId";
+ private static final String SECRET_LABEL = "Secret";
+ private static final String TOKEN_END_POINT_LABEL = "TokenEndpoint";
+ private static final String GRANT_TYPE_LABEL = "grantType";
+ private static final String CONTENT_TYPE_LABEL = "contentType";
+ private static final String USER_PROFILE_URL_LABEL = "UserProfileUrl";
+ private static final String GRANT_TYPE_PARAM = "grant_type";
+ private static final String CONTENT_TYPE_PARAM = "Content-Type";
+ private static final String APPLICATION_JSON = "application/json";
+ private static final String RESTAPI_END_POINT_LABEL = "RESTApiEndpoint";
+ private static final String COMMON_SCOPE = "scope";
+ private static final String AUTHOR_CODE_GRANT_TYPE = "authorization_code";
+ private static final String API_ID_LABEL = "apiId";
+ private static final String APP_KEY_LABEL = "appKey";
+ private static final String APP_SECRET_LABEL = "appSecret";
+ private static final String APP_ID_LABEL = "appId";
+ private static final String COMMON_APP_KEY = "AppKey";
+ private static final String COMMON_APP_SECRET = "AppSecret";
+
+ // TODO: Following should be made private
+ public static final String COMMON_CLIENT_SECRET = "clientSecret";
+ public static final String COMMON_CODE = "code";
+ public static final String RETURN_URL_LABEL = "ReturnUrl";
public static final String AUTHORIZATION_HEADER = "Authorization";
-
- public static final String UserProfileUrlLabel = "UserProfileUrl";
-
- public static final String GrantTypeParam = "grant_type";
-
- public static final String ContentTypeParam = "Content-Type";
-
public static final String ACCEPT_HEADER = "Accept";
-
- public static final String APPLICATION_JSON = "application/json";
-
- public static final String RESTApiEndpointLabel = "RESTApiEndpoint";
-
- public static final String COMMON_CODE = "code";
-
- public static final String COMMON_SCOPE = "scope";
-
- public static final String AuthorizationCodeGrantType = "authorization_code";
-
public static final String COMMON_STATE = "state";
-
public static final String COMMON_ERROR = "error";
-
public static final String COMMON_ERROR_DESCRIPTION = "error_description";
-
- public static final String ApiKeyLabel = "apiKey";
-
- public static final String SecretKeyLabel = "secretKey";
-
+ public static final String API_KEY_LABEL = "apiKey";
+ public static final String SECRET_KEY_LABEL = "secretKey";
public static final String COMMON_CLIENT_ID = "clientId";
-
public static final String COMMON_RETURN_RUL = "returnUrl";
-
- public static final String COMMON_CLIENT_SECRET = "clientSecret";
-
- public static final String ApiIdLabel = "apiId";
-
- public static final String AppKeyLabel = "appKey";
-
- public static final String AppSecretLabel = "appSecret";
-
- public static final String AppIdLabel = "appId";
-
- public static final String COMMON_APP_KEY = "AppKey";
-
- public static final String COMMON_APP_SECRET = "AppSecret";
-
- public static final RequestConfig StandardRequestConfig = RequestConfig.custom()
+ public static final RequestConfig STANDARD_REQ_CONFIG = RequestConfig.custom()
.setCookieSpec(CookieSpecs.STANDARD)
.build();
@@ -103,7 +74,7 @@ public class PassportUtil {
}
public static String getEnvPrefixByHost(HttpServletRequest request) {
- String prefix ="test";
+ String prefix = "test";
try {
InetAddress[] addresses = InetAddress.getAllByName(request.getServerName());
for (InetAddress address : addresses) {
diff --git a/pricat/src/main/java/org/apache/ofbiz/htmlreport/sample/SampleHtmlThread.java b/pricat/src/main/java/org/apache/ofbiz/htmlreport/sample/SampleHtmlThread.java
index d2f73d0..5528e28 100644
--- a/pricat/src/main/java/org/apache/ofbiz/htmlreport/sample/SampleHtmlThread.java
+++ b/pricat/src/main/java/org/apache/ofbiz/htmlreport/sample/SampleHtmlThread.java
@@ -40,8 +40,9 @@ public class SampleHtmlThread extends AbstractReportThread {
public static final String COUNT_DOWN = "countdown";
public static final String COUNT_UP = "countup";
public static final String CONFIRM = "confirm_action";
- public static final String[] messageLables = new String[] {"FORMAT_DEFAULT", "FORMAT_WARNING", "FORMAT_HEADLINE", "FORMAT_NOTE", "FORMAT_OK", "FORMAT_ERROR", "FORMAT_THROWABLE"};
- public static final List<String> messages = Collections.unmodifiableList(Arrays.asList(messageLables));
+ public static final String[] MESSAGE_LABLES = new String[] {"FORMAT_DEFAULT", "FORMAT_WARNING", "FORMAT_HEADLINE", "FORMAT_NOTE",
+ "FORMAT_OK", "FORMAT_ERROR", "FORMAT_THROWABLE"};
+ public static final List<String> MESSAGES = Collections.unmodifiableList(Arrays.asList(MESSAGE_LABLES));
private static final String RESOURCE = "PricatUiLabels";
/**
* Constructor, creates a new HtmlImportThreat.
@@ -67,9 +68,9 @@ public class SampleHtmlThread extends AbstractReportThread {
sleep(20);
j = random.nextInt(7);
if (j == 6) {
- getReport().println(new Throwable(UtilProperties.getMessage(RESOURCE, messages.get(j), new Object[] {i}, getLocale())));
+ getReport().println(new Throwable(UtilProperties.getMessage(RESOURCE, MESSAGES.get(j), new Object[] {i}, getLocale())));
} else {
- getReport().println(UtilProperties.getMessage(RESOURCE, messages.get(j), new Object[] {i}, getLocale()), j);
+ getReport().println(UtilProperties.getMessage(RESOURCE, MESSAGES.get(j), new Object[] {i}, getLocale()), j);
}
}
getReport().println(UtilProperties.getMessage(RESOURCE, "COUNT_COMPLETED", getLocale()), InterfaceReport.FORMAT_HEADLINE);
@@ -81,9 +82,9 @@ public class SampleHtmlThread extends AbstractReportThread {
sleep(20);
j = random.nextInt(7);
if (j == 6) {
- getReport().println(new Throwable(UtilProperties.getMessage(RESOURCE, messages.get(j), new Object[] {i}, getLocale())));
+ getReport().println(new Throwable(UtilProperties.getMessage(RESOURCE, MESSAGES.get(j), new Object[] {i}, getLocale())));
} else {
- getReport().println(UtilProperties.getMessage(RESOURCE, messages.get(j), new Object[] {i}, getLocale()), j);
+ getReport().println(UtilProperties.getMessage(RESOURCE, MESSAGES.get(j), new Object[] {i}, getLocale()), j);
}
}
getReport().println(UtilProperties.getMessage(RESOURCE, "COUNT_COMPLETED", getLocale()), InterfaceReport.FORMAT_HEADLINE);
diff --git a/pricat/src/main/java/org/apache/ofbiz/pricat/PricatEvents.java b/pricat/src/main/java/org/apache/ofbiz/pricat/PricatEvents.java
index 42b6ebe..b345d07 100644
--- a/pricat/src/main/java/org/apache/ofbiz/pricat/PricatEvents.java
+++ b/pricat/src/main/java/org/apache/ofbiz/pricat/PricatEvents.java
@@ -42,9 +42,9 @@ import org.apache.ofbiz.entity.util.EntityQuery;
public class PricatEvents {
private static final String MODULE = PricatEvents.class.getName();
- public static final String PricatLatestVersion = UtilProperties.getPropertyValue("pricat", "pricat.latest.version", "V1.1");
- public static final String PricatFileName = "PricatTemplate_" + PricatLatestVersion + ".xlsx";
- public static final String PricatPath = "component://pricat/webapp/pricat/downloads/";
+ public static final String PRICAT_LATEST_VERSION = UtilProperties.getPropertyValue("pricat", "pricat.latest.version", "V1.1");
+ public static final String PRICAT_FILE_NAME = "PricatTemplate_" + PRICAT_LATEST_VERSION + ".xlsx";
+ public static final String PRICAT_PATH = "component://pricat/webapp/pricat/downloads/";
/**
* Download excel template.
* @param request
@@ -56,10 +56,10 @@ public class PricatEvents {
return "error";
}
try {
- String path = ComponentLocationResolver.getBaseLocation(PricatPath).toString();
+ String path = ComponentLocationResolver.getBaseLocation(PRICAT_PATH).toString();
String fileName = null;
if ("pricatExcelTemplate".equals(templateType)) {
- fileName = PricatFileName;
+ fileName = PRICAT_FILE_NAME;
}
if (UtilValidate.isEmpty(fileName)) {
return "error";
@@ -104,7 +104,8 @@ public class PricatEvents {
Path path = Paths.get(pricatFileName);
byte[] bytes = Files.readAllBytes(path);
path = Paths.get(originalPricatFileName);
- UtilHttp.streamContentToBrowser(response, bytes, "application/octet-stream", URLEncoder.encode(path.getName(path.getNameCount() - 1).toString(), "UTF-8"));
+ UtilHttp.streamContentToBrowser(response, bytes, "application/octet-stream",
+ URLEncoder.encode(path.getName(path.getNameCount() - 1).toString(), "UTF-8"));
} catch (IOException e) {
Debug.logError(e.getMessage(), MODULE);
return "error";
@@ -134,7 +135,8 @@ public class PricatEvents {
Delegator delegator = (Delegator) request.getAttribute("delegator");
GenericValue historyValue = null;
try {
- historyValue = EntityQuery.use(delegator).from("ExcelImportHistory").where("userLoginId", userLoginId, "sequenceNum", Long.valueOf(sequenceNum)).queryOne();
+ historyValue = EntityQuery.use(delegator).from("ExcelImportHistory").where("userLoginId", userLoginId, "sequenceNum",
+ Long.valueOf(sequenceNum)).queryOne();
} catch (NumberFormatException | GenericEntityException e) {
Debug.logError(e.getMessage(), MODULE);
return "error";
diff --git a/pricat/src/main/java/org/apache/ofbiz/pricat/sample/SamplePricatEvents.java b/pricat/src/main/java/org/apache/ofbiz/pricat/sample/SamplePricatEvents.java
index faef64c..650243f 100644
--- a/pricat/src/main/java/org/apache/ofbiz/pricat/sample/SamplePricatEvents.java
+++ b/pricat/src/main/java/org/apache/ofbiz/pricat/sample/SamplePricatEvents.java
@@ -36,9 +36,9 @@ import org.apache.ofbiz.pricat.PricatEvents;
public class SamplePricatEvents extends PricatEvents {
private static final String MODULE = SamplePricatEvents.class.getName();
- public static final String PricatLatestVersion = UtilProperties.getPropertyValue("pricat", "pricat.latest.version", "V1.1");
- public static final String DemoPricatFileName = "SamplePricatTemplate_" + PricatLatestVersion + ".xlsx";
- public static final String DemoPricatPath = "component://pricat/webapp/pricatdemo/downloads/";
+ public static final String PRICAT_LAT_VERSION = UtilProperties.getPropertyValue("pricat", "pricat.latest.version", "V1.1");
+ public static final String DEMO_PRICATE_FILE_NAME = "SamplePricatTemplate_" + PRICAT_LAT_VERSION + ".xlsx";
+ public static final String DEMO_PRICATE_PATH = "component://pricat/webapp/pricatdemo/downloads/";
/**
* Download excel template.
* @param request
@@ -51,10 +51,10 @@ public class SamplePricatEvents extends PricatEvents {
return "error";
}
try {
- String path = ComponentLocationResolver.getBaseLocation(DemoPricatPath).toString();
+ String path = ComponentLocationResolver.getBaseLocation(DEMO_PRICATE_PATH).toString();
String fileName = null;
if ("pricatExcelTemplate".equals(templateType)) {
- fileName = DemoPricatFileName;
+ fileName = DEMO_PRICATE_FILE_NAME;
}
if (UtilValidate.isEmpty(fileName)) {
return "error";
diff --git a/solr/src/main/java/org/apache/ofbiz/solr/SolrProductSearch.java b/solr/src/main/java/org/apache/ofbiz/solr/SolrProductSearch.java
index 670c879..28dd9e6 100644
--- a/solr/src/main/java/org/apache/ofbiz/solr/SolrProductSearch.java
+++ b/solr/src/main/java/org/apache/ofbiz/solr/SolrProductSearch.java
@@ -488,8 +488,9 @@ public abstract class SolrProductSearch {
Map<String, Long> facetEntry = new HashMap<>();
List<FacetField.Count> facetEntries = facet.getValues();
if (UtilValidate.isNotEmpty(facetEntries)) {
- for (FacetField.Count fcount : facetEntries)
+ for (FacetField.Count fcount : facetEntries) {
facetEntry.put(fcount.getName(), fcount.getCount());
+ }
facetFields.put(facet.getName(), facetEntry);
}
}
@@ -518,8 +519,9 @@ public abstract class SolrProductSearch {
String solrIndexName = (String) context.get("indexName");
try {
boolean displayProducts = false;
- if (UtilValidate.isNotEmpty(context.get("displayProducts")))
+ if (UtilValidate.isNotEmpty(context.get("displayProducts"))) {
displayProducts = (Boolean) context.get("displayProducts");
+ }
int viewIndex = 0;
int viewSize = 9;
diff --git a/solr/src/main/java/org/apache/ofbiz/solr/SolrUtil.java b/solr/src/main/java/org/apache/ofbiz/solr/SolrUtil.java
index 4474471..4c0d234 100644
--- a/solr/src/main/java/org/apache/ofbiz/solr/SolrUtil.java
+++ b/solr/src/main/java/org/apache/ofbiz/solr/SolrUtil.java
@@ -54,47 +54,50 @@ public final class SolrUtil {
private SolrUtil() { }
private static final String MODULE = SolrUtil.class.getName();
- private static final String[] solrProdAttribute = {"productId", "internalName", "manu", "size", "smallImage", "mediumImage", "largeImage", "listPrice", "defaultPrice", "inStock", "isVirtual" };
+ private static final String[] SOLR_PRODUCT_ATTRIBUTE = {"productId", "internalName", "manu", "size", "smallImage", "mediumImage", "largeImage",
+ "listPrice", "defaultPrice", "inStock", "isVirtual" };
- private static final String solrConfigName = "solrconfig.properties";
- private static final String solrUrl = makeSolrWebappUrl();
+ private static final String SOLR_CONFIG_NAME = "solrconfig.properties";
+ private static final String SOLR_URL = makeSolrWebappUrl();
- private static final String socketTimeoutString = UtilProperties.getPropertyValue(solrConfigName, "solr.client.socket.timeout");
+ private static final String SOCKET_TIMEOUT_STRING = UtilProperties.getPropertyValue(SOLR_CONFIG_NAME, "solr.client.socket.timeout");
- private static final String connectionTimeoutString = UtilProperties.getPropertyValue(solrConfigName, "solr.client.connection.timeout");
+ private static final String CON_TIMEOUT_STRING = UtilProperties.getPropertyValue(SOLR_CONFIG_NAME, "solr.client.connection.timeout");
- private static final String clientUsername = UtilProperties.getPropertyValue(solrConfigName, "solr.client.username");
+ private static final String CLIENT_USER_NAME = UtilProperties.getPropertyValue(SOLR_CONFIG_NAME, "solr.client.username");
- private static final String clientPassword = UtilProperties.getPropertyValue(solrConfigName, "solr.client.password");
+ private static final String CLIENT_PASSWORD = UtilProperties.getPropertyValue(SOLR_CONFIG_NAME, "solr.client.password");
- private static final Integer socketTimeout = getSocketTimeout();
+ private static final Integer SOCKET_TIMEOUT = getSocketTimeout();
- private static final Integer connectionTimeout = getConnectionTimeout();
+ private static final Integer CON_TIMEOUT = getConnectionTimeout();
- private static final String trustSelfSignedCertString = UtilProperties.getPropertyValue(solrConfigName, "solr.client.trust.selfsigned.cert", "false");
+ private static final String TRUST_SELF_SIGN_CERT_STRING = UtilProperties.getPropertyValue(SOLR_CONFIG_NAME,
+ "solr.client.trust.selfsigned.cert", "false");
- private static final boolean trustSelfSignedCert = getTrustSelfSignedCert();
+ private static final boolean TRUST_SELF_SIGNED_CERT = getTrustSelfSignedCert();
public static String makeSolrWebappUrl() {
- final String solrWebappProtocol = UtilProperties.getPropertyValue(solrConfigName, "solr.webapp.protocol");
- final String solrWebappDomainName = UtilProperties.getPropertyValue(solrConfigName, "solr.webapp.domainName");
- final String solrWebappPath = UtilProperties.getPropertyValue(solrConfigName, "solr.webapp.path");
- final String solrWebappPortOverride = UtilProperties.getPropertyValue(solrConfigName, "solr.webapp.portOverride");
+ final String solrWebappProtocol = UtilProperties.getPropertyValue(SOLR_CONFIG_NAME, "solr.webapp.protocol");
+ final String solrWebappDomainName = UtilProperties.getPropertyValue(SOLR_CONFIG_NAME, "solr.webapp.domainName");
+ final String solrWebappPath = UtilProperties.getPropertyValue(SOLR_CONFIG_NAME, "solr.webapp.path");
+ final String solrWebappPortOverride = UtilProperties.getPropertyValue(SOLR_CONFIG_NAME, "solr.webapp.portOverride");
String solrPort;
if (UtilValidate.isNotEmpty(solrWebappPortOverride)) {
solrPort = solrWebappPortOverride;
} else {
- solrPort = UtilProperties.getPropertyValue("url", ("https".equals(solrWebappProtocol) ? "port.https" : "port.http"), ("https".equals(solrWebappProtocol) ? "8443" : "8080"));
+ solrPort = UtilProperties.getPropertyValue("url", ("https".equals(solrWebappProtocol)
+ ? "port.https" : "port.http"), ("https".equals(solrWebappProtocol) ? "8443" : "8080"));
}
return solrWebappProtocol + "://" + solrWebappDomainName + ":" + solrPort + solrWebappPath;
}
private static Integer getSocketTimeout() {
- if (UtilValidate.isNotEmpty(socketTimeoutString)) {
+ if (UtilValidate.isNotEmpty(SOCKET_TIMEOUT_STRING)) {
try {
- return Integer.parseInt(socketTimeoutString);
+ return Integer.parseInt(SOCKET_TIMEOUT_STRING);
} catch (Exception e) {
return null;
}
@@ -103,9 +106,9 @@ public final class SolrUtil {
}
private static Integer getConnectionTimeout() {
- if (UtilValidate.isNotEmpty(connectionTimeoutString)) {
+ if (UtilValidate.isNotEmpty(CON_TIMEOUT_STRING)) {
try {
- return Integer.parseInt(connectionTimeoutString);
+ return Integer.parseInt(CON_TIMEOUT_STRING);
} catch (Exception e) {
return null;
}
@@ -114,7 +117,7 @@ public final class SolrUtil {
}
private static boolean getTrustSelfSignedCert() {
- return "true".equals(trustSelfSignedCertString);
+ return "true".equals(TRUST_SELF_SIGN_CERT_STRING);
}
public static boolean isSolrEcaEnabled() {
@@ -123,13 +126,12 @@ public final class SolrUtil {
if (UtilValidate.isNotEmpty(sysProp)) {
if ("true".equalsIgnoreCase(sysProp)) {
ecaEnabled = Boolean.TRUE;
- }
- else if ("false".equalsIgnoreCase(sysProp)) {
+ } else if ("false".equalsIgnoreCase(sysProp)) {
ecaEnabled = Boolean.FALSE;
}
}
if (ecaEnabled == null) {
- ecaEnabled = UtilProperties.getPropertyAsBoolean(SolrUtil.solrConfigName, "solr.eca.enabled", false);
+ ecaEnabled = UtilProperties.getPropertyAsBoolean(SolrUtil.SOLR_CONFIG_NAME, "solr.eca.enabled", false);
}
return Boolean.TRUE.equals(ecaEnabled);
}
@@ -150,16 +152,16 @@ public final class SolrUtil {
return solrApp;
}
public static boolean isEcaTreatConnectErrorNonFatal() {
- Boolean treatConnectErrorNonFatal = UtilProperties.getPropertyAsBoolean(solrConfigName, "solr.eca.treatConnectErrorNonFatal", true);
+ Boolean treatConnectErrorNonFatal = UtilProperties.getPropertyAsBoolean(SOLR_CONFIG_NAME, "solr.eca.treatConnectErrorNonFatal", true);
return Boolean.TRUE.equals(treatConnectErrorNonFatal);
}
public static SolrInputDocument generateSolrDocument(Map<String, Object> context) throws GenericEntityException {
SolrInputDocument doc1 = new SolrInputDocument();
// add defined attributes
- for (int i = 0; i < solrProdAttribute.length; i++) {
- if (context.get(solrProdAttribute[i]) != null) {
- doc1.addField(solrProdAttribute[i], context.get(solrProdAttribute[i]).toString());
+ for (int i = 0; i < SOLR_PRODUCT_ATTRIBUTE.length; i++) {
+ if (context.get(SOLR_PRODUCT_ATTRIBUTE[i]) != null) {
+ doc1.addField(SOLR_PRODUCT_ATTRIBUTE[i], context.get(SOLR_PRODUCT_ATTRIBUTE[i]).toString());
}
}
@@ -227,11 +229,13 @@ public final class SolrUtil {
return doc1;
}
- public static Map<String, Object> categoriesAvailable(String catalogId, String categoryId, String productId, boolean displayproducts, int viewIndex, int viewSize, String solrIndexName) {
+ public static Map<String, Object> categoriesAvailable(String catalogId, String categoryId, String productId,
+ boolean displayproducts, int viewIndex, int viewSize, String solrIndexName) {
return categoriesAvailable(catalogId, categoryId, productId, null, displayproducts, viewIndex, viewSize, solrIndexName);
}
- public static Map<String, Object> categoriesAvailable(String catalogId, String categoryId, String productId, String facetPrefix, boolean displayproducts, int viewIndex, int viewSize, String solrIndexName) {
+ public static Map<String, Object> categoriesAvailable(String catalogId, String categoryId, String productId, String facetPrefix,
+ boolean displayproducts, int viewIndex, int viewSize, String solrIndexName) {
// create the data model
Map<String, Object> result = new HashMap<>();
HttpSolrClient client = null;
@@ -294,27 +298,27 @@ public final class SolrUtil {
HttpClientContext httpContext = HttpClientContext.create();
CloseableHttpClient httpClient = null;
- if (trustSelfSignedCert) {
+ if (TRUST_SELF_SIGNED_CERT) {
httpClient = UtilHttp.getAllowAllHttpClient();
} else {
httpClient = HttpClients.createDefault();
}
RequestConfig requestConfig = null;
- if (UtilValidate.isNotEmpty(socketTimeout) && UtilValidate.isNotEmpty(connectionTimeout)) {
+ if (UtilValidate.isNotEmpty(SOCKET_TIMEOUT) && UtilValidate.isNotEmpty(CON_TIMEOUT)) {
requestConfig = RequestConfig.custom()
- .setSocketTimeout(socketTimeout)
- .setConnectTimeout(connectionTimeout)
+ .setSocketTimeout(SOCKET_TIMEOUT)
+ .setConnectTimeout(CON_TIMEOUT)
.setRedirectsEnabled(true)
.build();
- } else if (UtilValidate.isNotEmpty(socketTimeout)) {
+ } else if (UtilValidate.isNotEmpty(SOCKET_TIMEOUT)) {
requestConfig = RequestConfig.custom()
- .setSocketTimeout(socketTimeout)
+ .setSocketTimeout(SOCKET_TIMEOUT)
.setRedirectsEnabled(true)
.build();
- } else if (UtilValidate.isNotEmpty(connectionTimeout)) {
+ } else if (UtilValidate.isNotEmpty(CON_TIMEOUT)) {
requestConfig = RequestConfig.custom()
- .setConnectTimeout(connectionTimeout)
+ .setConnectTimeout(CON_TIMEOUT)
.setRedirectsEnabled(true)
.build();
} else {
@@ -323,10 +327,10 @@ public final class SolrUtil {
.build();
}
- HttpGet httpLogin = new HttpGet(solrUrl + "/control/login?USERNAME=" + clientUsername + "&PASSWORD=" + clientPassword);
+ HttpGet httpLogin = new HttpGet(SOLR_URL + "/control/login?USERNAME=" + CLIENT_USER_NAME + "&PASSWORD=" + CLIENT_PASSWORD);
httpLogin.setConfig(requestConfig);
CloseableHttpResponse loginResponse = httpClient.execute(httpLogin, httpContext);
loginResponse.close();
- return new HttpSolrClient.Builder(solrUrl + "/" + solrIndexName).withHttpClient(httpClient).build();
+ return new HttpSolrClient.Builder(SOLR_URL + "/" + solrIndexName).withHttpClient(httpClient).build();
}
}
diff --git a/solr/src/main/java/org/apache/ofbiz/solr/test/SolrTests.java b/solr/src/main/java/org/apache/ofbiz/solr/test/SolrTests.java
index 854dd2b..8b626c4 100644
--- a/solr/src/main/java/org/apache/ofbiz/solr/test/SolrTests.java
+++ b/solr/src/main/java/org/apache/ofbiz/solr/test/SolrTests.java
@@ -35,7 +35,7 @@ public class SolrTests extends OFBizTestCase {
private Map<String, Object> context;
private Map<String, Object> response;
private String validTestProductId = "GZ-1006";
- private String validTestProductId_2 = "GZ-1005";
+ private String validTestProductId2 = "GZ-1005";
private String invalidTestProductId = validTestProductId + validTestProductId;
public SolrTests(String name) {
@@ -46,6 +46,10 @@ public class SolrTests extends OFBizTestCase {
protected void tearDown() throws Exception {
}
+ /**
+ * Test add product to index.
+ * @throws Exception the exception
+ */
public void testAddProductToIndex() throws Exception {
GenericValue product = EntityQuery.use(delegator).from("Product").where("productId", validTestProductId).queryOne();
@@ -53,7 +57,7 @@ public class SolrTests extends OFBizTestCase {
Map<String, Object> ctx = new HashMap<>();
ctx.put("instance", product);
- Map<String, Object> resp = dispatcher.runSync("addToSolr", ctx);
+ Map<String, Object> resp = getDispatcher().runSync("addToSolr", ctx);
if (ServiceUtil.isError(resp)) {
String errorMessage = ServiceUtil.getErrorMessage(resp);
throw new Exception(errorMessage);
@@ -63,7 +67,7 @@ public class SolrTests extends OFBizTestCase {
Map<String, Object> sctx = new HashMap<>();
sctx.put("productCategoryId", "102");
- Map<String, Object> sresp = dispatcher.runSync("solrProductsSearch", sctx);
+ Map<String, Object> sresp = getDispatcher().runSync("solrProductsSearch", sctx);
if (ServiceUtil.isError(sresp)) {
String errorMessage = ServiceUtil.getErrorMessage(sresp);
throw new Exception(errorMessage);
@@ -73,10 +77,14 @@ public class SolrTests extends OFBizTestCase {
}
+ /**
+ * Test add to solr index.
+ * @throws Exception the exception
+ */
public void testAddToSolrIndex() throws Exception {
context = new HashMap<>();
context.put("productId", validTestProductId);
- response = dispatcher.runSync("addToSolrIndex", context);
+ response = getDispatcher().runSync("addToSolrIndex", context);
if (ServiceUtil.isError(response)) {
String errorMessage = ServiceUtil.getErrorMessage(response);
throw new Exception(errorMessage);
@@ -85,10 +93,14 @@ public class SolrTests extends OFBizTestCase {
response));
}
- public void testAddToSolrIndex_invalidProduct() throws Exception {
+ /**
+ * Test add to solr index invalid product.
+ * @throws Exception the exception
+ */
+ public void testAddToSolrIndexInvalidProduct() throws Exception {
context = new HashMap<>();
context.put("productId", invalidTestProductId);
- response = dispatcher.runSync("addToSolrIndex", context);
+ response = getDispatcher().runSync("addToSolrIndex", context);
if (ServiceUtil.isError(response)) {
String errorMessage = ServiceUtil.getErrorMessage(response);
throw new Exception(errorMessage);
@@ -97,22 +109,26 @@ public class SolrTests extends OFBizTestCase {
response));
}
+ /**
+ * Test add list to solr index.
+ * @throws Exception the exception
+ */
public void testAddListToSolrIndex() throws Exception {
List<Map<String, Object>> products = new ArrayList<>();
- Map<String, Object> product_1 = new HashMap<>();
- Map<String, Object> product_2 = new HashMap<>();
+ Map<String, Object> product1 = new HashMap<>();
+ Map<String, Object> product2 = new HashMap<>();
GenericValue validTestProduct = EntityQuery.use(delegator).from("Product").where("productId", validTestProductId).queryOne();
- GenericValue validTestProduct_2 = EntityQuery.use(delegator).from("Product").where("productId", validTestProductId_2).queryOne();
+ GenericValue validTestProduct2 = EntityQuery.use(delegator).from("Product").where("productId", validTestProductId2).queryOne();
- product_1.put("productId", validTestProduct);
- product_2.put("productId", validTestProduct_2);
+ product1.put("productId", validTestProduct);
+ product2.put("productId", validTestProduct2);
- products.add(product_1);
- products.add(product_2);
+ products.add(product1);
+ products.add(product2);
context = new HashMap<>();
context.put("fieldList", products);
- response = dispatcher.runSync("addListToSolrIndex", context);
+ response = getDispatcher().runSync("addListToSolrIndex", context);
if (ServiceUtil.isError(response)) {
String errorMessage = ServiceUtil.getErrorMessage(response);
throw new Exception(errorMessage);
@@ -121,25 +137,29 @@ public class SolrTests extends OFBizTestCase {
}
- public void testAddListToSolrIndex_invalidProducts() throws Exception {
+ /**
+ * Test add list to solr index invalid products.
+ * @throws Exception the exception
+ */
+ public void testAddListToSolrIndexInvalidProducts() throws Exception {
List<Map<String, Object>> products = new ArrayList<>();
- Map<String, Object> product_1 = new HashMap<>();
- Map<String, Object> product_2 = new HashMap<>();
+ Map<String, Object> product1 = new HashMap<>();
+ Map<String, Object> product2 = new HashMap<>();
GenericValue testProduct = EntityQuery.use(delegator).from("Product").where("productId", validTestProductId).queryOne();
- GenericValue testProduct_2 = EntityQuery.use(delegator).from("Product").where("productId", validTestProductId_2).queryOne();
+ GenericValue testProduct2 = EntityQuery.use(delegator).from("Product").where("productId", validTestProductId2).queryOne();
testProduct.replace("productId", invalidTestProductId);
testProduct.replace("productId", invalidTestProductId);
- product_1.put("productId", testProduct);
- product_2.put("productId", testProduct_2);
+ product1.put("productId", testProduct);
+ product2.put("productId", testProduct2);
- products.add(product_1);
- products.add(product_2);
+ products.add(product1);
+ products.add(product2);
context = new HashMap<>();
context.put("fieldList", products);
- response = dispatcher.runSync("addListToSolrIndex", context);
+ response = getDispatcher().runSync("addListToSolrIndex", context);
if (ServiceUtil.isError(response)) {
String errorMessage = ServiceUtil.getErrorMessage(response);
throw new Exception(errorMessage);