diff --git a/src/main/java/org/hostsharing/hsadminng/ApplicationWebXml.java b/src/main/java/org/hostsharing/hsadminng/ApplicationWebXml.java
index b33bf680..d6b76fff 100644
--- a/src/main/java/org/hostsharing/hsadminng/ApplicationWebXml.java
+++ b/src/main/java/org/hostsharing/hsadminng/ApplicationWebXml.java
@@ -1,6 +1,8 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng;
import org.hostsharing.hsadminng.config.DefaultProfileUtil;
+
import org.springframework.boot.builder.SpringApplicationBuilder;
import org.springframework.boot.web.servlet.support.SpringBootServletInitializer;
diff --git a/src/main/java/org/hostsharing/hsadminng/HsadminNgApp.java b/src/main/java/org/hostsharing/hsadminng/HsadminNgApp.java
index a0ecca17..d96b3bd5 100644
--- a/src/main/java/org/hostsharing/hsadminng/HsadminNgApp.java
+++ b/src/main/java/org/hostsharing/hsadminng/HsadminNgApp.java
@@ -1,11 +1,14 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng;
-import io.github.jhipster.config.JHipsterConstants;
-import org.apache.commons.lang3.StringUtils;
import org.hostsharing.hsadminng.config.ApplicationProperties;
import org.hostsharing.hsadminng.config.DefaultProfileUtil;
import org.hostsharing.hsadminng.security.SecurityUtils;
import org.hostsharing.hsadminng.service.accessfilter.Role;
+
+import io.github.jhipster.config.JHipsterConstants;
+
+import org.apache.commons.lang3.StringUtils;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.boot.SpringApplication;
@@ -14,14 +17,15 @@ import org.springframework.boot.autoconfigure.liquibase.LiquibaseProperties;
import org.springframework.boot.context.properties.EnableConfigurationProperties;
import org.springframework.core.env.Environment;
-import javax.annotation.PostConstruct;
import java.net.InetAddress;
import java.net.UnknownHostException;
import java.util.Arrays;
import java.util.Collection;
+import javax.annotation.PostConstruct;
+
@SpringBootApplication
-@EnableConfigurationProperties({LiquibaseProperties.class, ApplicationProperties.class})
+@EnableConfigurationProperties({ LiquibaseProperties.class, ApplicationProperties.class })
public class HsadminNgApp {
private static final Logger log = LoggerFactory.getLogger(HsadminNgApp.class);
@@ -37,19 +41,24 @@ public class HsadminNgApp {
*
* Spring profiles can be configured with a program argument --spring.profiles.active=your-active-profile
*
- * You can find more information on how profiles work with JHipster on https://www.jhipster.tech/profiles/ .
+ * You can find more information on how profiles work with JHipster on
+ * https://www.jhipster.tech/profiles/ .
*/
@PostConstruct
public void initApplication() {
Collection activeProfiles = Arrays.asList(env.getActiveProfiles());
- if (activeProfiles.contains(JHipsterConstants.SPRING_PROFILE_DEVELOPMENT) && activeProfiles.contains(JHipsterConstants.SPRING_PROFILE_PRODUCTION)) {
- log.error("You have misconfigured your application! It should not run " +
- "with both the 'dev' and 'prod' profiles at the same time.");
+ if (activeProfiles.contains(JHipsterConstants.SPRING_PROFILE_DEVELOPMENT)
+ && activeProfiles.contains(JHipsterConstants.SPRING_PROFILE_PRODUCTION)) {
+ log.error(
+ "You have misconfigured your application! It should not run " +
+ "with both the 'dev' and 'prod' profiles at the same time.");
}
- if (activeProfiles.contains(JHipsterConstants.SPRING_PROFILE_DEVELOPMENT) && activeProfiles.contains(JHipsterConstants.SPRING_PROFILE_CLOUD)) {
- log.error("You have misconfigured your application! It should not " +
- "run with both the 'dev' and 'cloud' profiles at the same time.");
+ if (activeProfiles.contains(JHipsterConstants.SPRING_PROFILE_DEVELOPMENT)
+ && activeProfiles.contains(JHipsterConstants.SPRING_PROFILE_CLOUD)) {
+ log.error(
+ "You have misconfigured your application! It should not " +
+ "run with both the 'dev' and 'cloud' profiles at the same time.");
}
// TODO: remove this hack once proper user roles are implemented
@@ -89,19 +98,20 @@ public class HsadminNgApp {
} catch (UnknownHostException e) {
log.warn("The host name could not be determined, using `localhost` as fallback");
}
- log.info("\n----------------------------------------------------------\n\t" +
- "Application '{}' is running! Access URLs:\n\t" +
- "Local: \t\t{}://localhost:{}{}\n\t" +
- "External: \t{}://{}:{}{}\n\t" +
- "Profile(s): \t{}\n----------------------------------------------------------",
- env.getProperty("spring.application.name"),
- protocol,
- serverPort,
- contextPath,
- protocol,
- hostAddress,
- serverPort,
- contextPath,
- env.getActiveProfiles());
+ log.info(
+ "\n----------------------------------------------------------\n\t" +
+ "Application '{}' is running! Access URLs:\n\t" +
+ "Local: \t\t{}://localhost:{}{}\n\t" +
+ "External: \t{}://{}:{}{}\n\t" +
+ "Profile(s): \t{}\n----------------------------------------------------------",
+ env.getProperty("spring.application.name"),
+ protocol,
+ serverPort,
+ contextPath,
+ protocol,
+ hostAddress,
+ serverPort,
+ contextPath,
+ env.getActiveProfiles());
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/aop/logging/LoggingAspect.java b/src/main/java/org/hostsharing/hsadminng/aop/logging/LoggingAspect.java
index 9e8b7452..f6574ef4 100644
--- a/src/main/java/org/hostsharing/hsadminng/aop/logging/LoggingAspect.java
+++ b/src/main/java/org/hostsharing/hsadminng/aop/logging/LoggingAspect.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.aop.logging;
import io.github.jhipster.config.JHipsterConstants;
@@ -34,8 +35,8 @@ public class LoggingAspect {
* Pointcut that matches all repositories, services and Web REST endpoints.
*/
@Pointcut("within(@org.springframework.stereotype.Repository *)" +
- " || within(@org.springframework.stereotype.Service *)" +
- " || within(@org.springframework.web.bind.annotation.RestController *)")
+ " || within(@org.springframework.stereotype.Service *)" +
+ " || within(@org.springframework.web.bind.annotation.RestController *)")
public void springBeanPointcut() {
// Method is empty as this is just a Pointcut, the implementations are in the advices.
}
@@ -43,9 +44,9 @@ public class LoggingAspect {
/**
* Pointcut that matches all Spring beans in the application's main packages.
*/
- @Pointcut("within(org.hostsharing.hsadminng.repository..*)"+
- " || within(org.hostsharing.hsadminng.service..*)"+
- " || within(org.hostsharing.hsadminng.web.rest..*)")
+ @Pointcut("within(org.hostsharing.hsadminng.repository..*)" +
+ " || within(org.hostsharing.hsadminng.service..*)" +
+ " || within(org.hostsharing.hsadminng.web.rest..*)")
public void applicationPackagePointcut() {
// Method is empty as this is just a Pointcut, the implementations are in the advices.
}
@@ -59,12 +60,20 @@ public class LoggingAspect {
@AfterThrowing(pointcut = "applicationPackagePointcut() && springBeanPointcut()", throwing = "e")
public void logAfterThrowing(JoinPoint joinPoint, Throwable e) {
if (env.acceptsProfiles(JHipsterConstants.SPRING_PROFILE_DEVELOPMENT)) {
- log.error("Exception in {}.{}() with cause = \'{}\' and exception = \'{}\'", joinPoint.getSignature().getDeclaringTypeName(),
- joinPoint.getSignature().getName(), e.getCause() != null? e.getCause() : "NULL", e.getMessage(), e);
+ log.error(
+ "Exception in {}.{}() with cause = \'{}\' and exception = \'{}\'",
+ joinPoint.getSignature().getDeclaringTypeName(),
+ joinPoint.getSignature().getName(),
+ e.getCause() != null ? e.getCause() : "NULL",
+ e.getMessage(),
+ e);
} else {
- log.error("Exception in {}.{}() with cause = {}", joinPoint.getSignature().getDeclaringTypeName(),
- joinPoint.getSignature().getName(), e.getCause() != null? e.getCause() : "NULL");
+ log.error(
+ "Exception in {}.{}() with cause = {}",
+ joinPoint.getSignature().getDeclaringTypeName(),
+ joinPoint.getSignature().getName(),
+ e.getCause() != null ? e.getCause() : "NULL");
}
}
@@ -78,19 +87,28 @@ public class LoggingAspect {
@Around("applicationPackagePointcut() && springBeanPointcut()")
public Object logAround(ProceedingJoinPoint joinPoint) throws Throwable {
if (log.isDebugEnabled()) {
- log.debug("Enter: {}.{}() with argument[s] = {}", joinPoint.getSignature().getDeclaringTypeName(),
- joinPoint.getSignature().getName(), Arrays.toString(joinPoint.getArgs()));
+ log.debug(
+ "Enter: {}.{}() with argument[s] = {}",
+ joinPoint.getSignature().getDeclaringTypeName(),
+ joinPoint.getSignature().getName(),
+ Arrays.toString(joinPoint.getArgs()));
}
try {
Object result = joinPoint.proceed();
if (log.isDebugEnabled()) {
- log.debug("Exit: {}.{}() with result = {}", joinPoint.getSignature().getDeclaringTypeName(),
- joinPoint.getSignature().getName(), result);
+ log.debug(
+ "Exit: {}.{}() with result = {}",
+ joinPoint.getSignature().getDeclaringTypeName(),
+ joinPoint.getSignature().getName(),
+ result);
}
return result;
} catch (IllegalArgumentException e) {
- log.error("Illegal argument: {} in {}.{}()", Arrays.toString(joinPoint.getArgs()),
- joinPoint.getSignature().getDeclaringTypeName(), joinPoint.getSignature().getName());
+ log.error(
+ "Illegal argument: {} in {}.{}()",
+ Arrays.toString(joinPoint.getArgs()),
+ joinPoint.getSignature().getDeclaringTypeName(),
+ joinPoint.getSignature().getName());
throw e;
}
diff --git a/src/main/java/org/hostsharing/hsadminng/config/ApplicationProperties.java b/src/main/java/org/hostsharing/hsadminng/config/ApplicationProperties.java
index e34fdaa6..19bc4cdb 100644
--- a/src/main/java/org/hostsharing/hsadminng/config/ApplicationProperties.java
+++ b/src/main/java/org/hostsharing/hsadminng/config/ApplicationProperties.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.config;
import org.springframework.boot.context.properties.ConfigurationProperties;
diff --git a/src/main/java/org/hostsharing/hsadminng/config/AsyncConfiguration.java b/src/main/java/org/hostsharing/hsadminng/config/AsyncConfiguration.java
index f4d89ec1..c87c3b44 100644
--- a/src/main/java/org/hostsharing/hsadminng/config/AsyncConfiguration.java
+++ b/src/main/java/org/hostsharing/hsadminng/config/AsyncConfiguration.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.config;
import io.github.jhipster.async.ExceptionHandlingAsyncTaskExecutor;
@@ -10,8 +11,8 @@ import org.springframework.aop.interceptor.SimpleAsyncUncaughtExceptionHandler;
import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
import org.springframework.scheduling.annotation.*;
-import org.springframework.scheduling.concurrent.ThreadPoolTaskExecutor;
import org.springframework.scheduling.annotation.SchedulingConfigurer;
+import org.springframework.scheduling.concurrent.ThreadPoolTaskExecutor;
import org.springframework.scheduling.config.ScheduledTaskRegistrar;
import java.util.concurrent.Executor;
@@ -46,7 +47,7 @@ public class AsyncConfiguration implements AsyncConfigurer, SchedulingConfigurer
public AsyncUncaughtExceptionHandler getAsyncUncaughtExceptionHandler() {
return new SimpleAsyncUncaughtExceptionHandler();
}
-
+
@Override
public void configureTasks(ScheduledTaskRegistrar taskRegistrar) {
taskRegistrar.setScheduler(scheduledTaskExecutor());
diff --git a/src/main/java/org/hostsharing/hsadminng/config/CacheConfiguration.java b/src/main/java/org/hostsharing/hsadminng/config/CacheConfiguration.java
index f0697857..73cf132f 100644
--- a/src/main/java/org/hostsharing/hsadminng/config/CacheConfiguration.java
+++ b/src/main/java/org/hostsharing/hsadminng/config/CacheConfiguration.java
@@ -1,16 +1,16 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.config;
-import java.time.Duration;
-
-import org.ehcache.config.builders.*;
-import org.ehcache.jsr107.Eh107Configuration;
-
import io.github.jhipster.config.JHipsterProperties;
+import org.ehcache.config.builders.*;
+import org.ehcache.jsr107.Eh107Configuration;
import org.springframework.boot.autoconfigure.cache.JCacheManagerCustomizer;
import org.springframework.cache.annotation.EnableCaching;
import org.springframework.context.annotation.*;
+import java.time.Duration;
+
@Configuration
@EnableCaching
public class CacheConfiguration {
@@ -18,14 +18,16 @@ public class CacheConfiguration {
private final javax.cache.configuration.Configuration jcacheConfiguration;
public CacheConfiguration(JHipsterProperties jHipsterProperties) {
- JHipsterProperties.Cache.Ehcache ehcache =
- jHipsterProperties.getCache().getEhcache();
+ JHipsterProperties.Cache.Ehcache ehcache = jHipsterProperties.getCache().getEhcache();
jcacheConfiguration = Eh107Configuration.fromEhcacheCacheConfiguration(
- CacheConfigurationBuilder.newCacheConfigurationBuilder(Object.class, Object.class,
- ResourcePoolsBuilder.heap(ehcache.getMaxEntries()))
- .withExpiry(ExpiryPolicyBuilder.timeToLiveExpiration(Duration.ofSeconds(ehcache.getTimeToLiveSeconds())))
- .build());
+ CacheConfigurationBuilder.newCacheConfigurationBuilder(
+ Object.class,
+ Object.class,
+ ResourcePoolsBuilder.heap(ehcache.getMaxEntries()))
+ .withExpiry(
+ ExpiryPolicyBuilder.timeToLiveExpiration(Duration.ofSeconds(ehcache.getTimeToLiveSeconds())))
+ .build());
}
@Bean
diff --git a/src/main/java/org/hostsharing/hsadminng/config/CloudDatabaseConfiguration.java b/src/main/java/org/hostsharing/hsadminng/config/CloudDatabaseConfiguration.java
index 4422aba3..f28cc4b4 100644
--- a/src/main/java/org/hostsharing/hsadminng/config/CloudDatabaseConfiguration.java
+++ b/src/main/java/org/hostsharing/hsadminng/config/CloudDatabaseConfiguration.java
@@ -1,22 +1,22 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.config;
import io.github.jhipster.config.JHipsterConstants;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
+import org.springframework.boot.context.properties.ConfigurationProperties;
import org.springframework.cloud.config.java.AbstractCloudConfig;
import org.springframework.context.annotation.*;
import javax.sql.DataSource;
-import org.springframework.boot.context.properties.ConfigurationProperties;
-
@Configuration
@Profile(JHipsterConstants.SPRING_PROFILE_CLOUD)
public class CloudDatabaseConfiguration extends AbstractCloudConfig {
private final Logger log = LoggerFactory.getLogger(CloudDatabaseConfiguration.class);
-
+
private static final String CLOUD_CONFIGURATION_HIKARI_PREFIX = "spring.datasource.hikari";
@Bean
diff --git a/src/main/java/org/hostsharing/hsadminng/config/Constants.java b/src/main/java/org/hostsharing/hsadminng/config/Constants.java
index 5cfeea37..82186df3 100644
--- a/src/main/java/org/hostsharing/hsadminng/config/Constants.java
+++ b/src/main/java/org/hostsharing/hsadminng/config/Constants.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.config;
/**
@@ -11,7 +12,7 @@ public final class Constants {
public static final String SYSTEM_ACCOUNT = "system";
public static final String ANONYMOUS_USER = "anonymoususer";
public static final String DEFAULT_LANGUAGE = "de";
-
+
private Constants() {
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/config/DatabaseConfiguration.java b/src/main/java/org/hostsharing/hsadminng/config/DatabaseConfiguration.java
index 519bf7c1..e9a2b893 100644
--- a/src/main/java/org/hostsharing/hsadminng/config/DatabaseConfiguration.java
+++ b/src/main/java/org/hostsharing/hsadminng/config/DatabaseConfiguration.java
@@ -1,13 +1,14 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.config;
import io.github.jhipster.config.JHipsterConstants;
import io.github.jhipster.config.h2.H2ConfigurationHelper;
+
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
import org.springframework.context.annotation.Profile;
-
import org.springframework.core.env.Environment;
import org.springframework.data.jpa.repository.config.EnableJpaAuditing;
import org.springframework.data.jpa.repository.config.EnableJpaRepositories;
@@ -42,7 +43,7 @@ public class DatabaseConfiguration {
log.debug("H2 database is available on port {}", port);
return H2ConfigurationHelper.createServer(port);
}
-
+
private String getValidPortForH2() {
int port = Integer.parseInt(env.getProperty("server.port"));
if (port < 10000) {
diff --git a/src/main/java/org/hostsharing/hsadminng/config/DateTimeFormatConfiguration.java b/src/main/java/org/hostsharing/hsadminng/config/DateTimeFormatConfiguration.java
index a4afa568..fb50c23d 100644
--- a/src/main/java/org/hostsharing/hsadminng/config/DateTimeFormatConfiguration.java
+++ b/src/main/java/org/hostsharing/hsadminng/config/DateTimeFormatConfiguration.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.config;
import org.springframework.context.annotation.Configuration;
diff --git a/src/main/java/org/hostsharing/hsadminng/config/DefaultProfileUtil.java b/src/main/java/org/hostsharing/hsadminng/config/DefaultProfileUtil.java
index fda28af8..234b69cb 100644
--- a/src/main/java/org/hostsharing/hsadminng/config/DefaultProfileUtil.java
+++ b/src/main/java/org/hostsharing/hsadminng/config/DefaultProfileUtil.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.config;
import io.github.jhipster.config.JHipsterConstants;
@@ -27,10 +28,10 @@ public final class DefaultProfileUtil {
public static void addDefaultProfile(SpringApplication app) {
Map defProperties = new HashMap<>();
/*
- * The default profile to use when no other profiles are defined
- * This cannot be set in the application.yml
file.
- * See https://github.com/spring-projects/spring-boot/issues/1219
- */
+ * The default profile to use when no other profiles are defined
+ * This cannot be set in the application.yml
file.
+ * See https://github.com/spring-projects/spring-boot/issues/1219
+ */
defProperties.put(SPRING_PROFILE_DEFAULT, JHipsterConstants.SPRING_PROFILE_DEVELOPMENT);
app.setDefaultProperties(defProperties);
}
diff --git a/src/main/java/org/hostsharing/hsadminng/config/JacksonConfiguration.java b/src/main/java/org/hostsharing/hsadminng/config/JacksonConfiguration.java
index 16a4bcda..0105111b 100644
--- a/src/main/java/org/hostsharing/hsadminng/config/JacksonConfiguration.java
+++ b/src/main/java/org/hostsharing/hsadminng/config/JacksonConfiguration.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.config;
import com.fasterxml.jackson.datatype.hibernate5.Hibernate5Module;
@@ -15,6 +16,7 @@ public class JacksonConfiguration {
/**
* Support for Java date and time API.
+ *
* @return the corresponding Jackson module.
*/
@Bean
@@ -27,7 +29,6 @@ public class JacksonConfiguration {
return new Jdk8Module();
}
-
/*
* Support for Hibernate types in Jackson.
*/
diff --git a/src/main/java/org/hostsharing/hsadminng/config/LiquibaseConfiguration.java b/src/main/java/org/hostsharing/hsadminng/config/LiquibaseConfiguration.java
index 18a7df43..196d907e 100644
--- a/src/main/java/org/hostsharing/hsadminng/config/LiquibaseConfiguration.java
+++ b/src/main/java/org/hostsharing/hsadminng/config/LiquibaseConfiguration.java
@@ -1,6 +1,9 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.config;
-import javax.sql.DataSource;
+import io.github.jhipster.config.JHipsterConstants;
+import io.github.jhipster.config.liquibase.AsyncSpringLiquibase;
+import liquibase.integration.spring.SpringLiquibase;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
@@ -11,9 +14,7 @@ import org.springframework.context.annotation.Configuration;
import org.springframework.core.env.Environment;
import org.springframework.core.task.TaskExecutor;
-import io.github.jhipster.config.JHipsterConstants;
-import io.github.jhipster.config.liquibase.AsyncSpringLiquibase;
-import liquibase.integration.spring.SpringLiquibase;
+import javax.sql.DataSource;
@Configuration
public class LiquibaseConfiguration {
@@ -22,14 +23,15 @@ public class LiquibaseConfiguration {
private final Environment env;
-
public LiquibaseConfiguration(Environment env) {
this.env = env;
}
@Bean
- public SpringLiquibase liquibase(@Qualifier("taskExecutor") TaskExecutor taskExecutor,
- DataSource dataSource, LiquibaseProperties liquibaseProperties) {
+ public SpringLiquibase liquibase(
+ @Qualifier("taskExecutor") TaskExecutor taskExecutor,
+ DataSource dataSource,
+ LiquibaseProperties liquibaseProperties) {
// Use liquibase.integration.spring.SpringLiquibase if you don't want Liquibase to start asynchronously
SpringLiquibase liquibase = new AsyncSpringLiquibase(taskExecutor, env);
diff --git a/src/main/java/org/hostsharing/hsadminng/config/LocaleConfiguration.java b/src/main/java/org/hostsharing/hsadminng/config/LocaleConfiguration.java
index ab3962ba..99386585 100644
--- a/src/main/java/org/hostsharing/hsadminng/config/LocaleConfiguration.java
+++ b/src/main/java/org/hostsharing/hsadminng/config/LocaleConfiguration.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.config;
import io.github.jhipster.config.locale.AngularCookieLocaleResolver;
diff --git a/src/main/java/org/hostsharing/hsadminng/config/LoggingAspectConfiguration.java b/src/main/java/org/hostsharing/hsadminng/config/LoggingAspectConfiguration.java
index e27a5a65..149ea1fa 100644
--- a/src/main/java/org/hostsharing/hsadminng/config/LoggingAspectConfiguration.java
+++ b/src/main/java/org/hostsharing/hsadminng/config/LoggingAspectConfiguration.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.config;
import org.hostsharing.hsadminng.aop.logging.LoggingAspect;
diff --git a/src/main/java/org/hostsharing/hsadminng/config/LoggingConfiguration.java b/src/main/java/org/hostsharing/hsadminng/config/LoggingConfiguration.java
index 57e2f46c..83ecbb1a 100644
--- a/src/main/java/org/hostsharing/hsadminng/config/LoggingConfiguration.java
+++ b/src/main/java/org/hostsharing/hsadminng/config/LoggingConfiguration.java
@@ -1,10 +1,6 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.config;
-import java.net.InetSocketAddress;
-import java.util.Iterator;
-
-import io.github.jhipster.config.JHipsterProperties;
-
import ch.qos.logback.classic.AsyncAppender;
import ch.qos.logback.classic.Level;
import ch.qos.logback.classic.LoggerContext;
@@ -15,14 +11,19 @@ import ch.qos.logback.core.Appender;
import ch.qos.logback.core.filter.EvaluatorFilter;
import ch.qos.logback.core.spi.ContextAwareBase;
import ch.qos.logback.core.spi.FilterReply;
+import io.github.jhipster.config.JHipsterProperties;
import net.logstash.logback.appender.LogstashTcpSocketAppender;
import net.logstash.logback.encoder.LogstashEncoder;
import net.logstash.logback.stacktrace.ShortenedThrowableConverter;
+
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.beans.factory.annotation.Value;
import org.springframework.context.annotation.Configuration;
+import java.net.InetSocketAddress;
+import java.util.Iterator;
+
@Configuration
public class LoggingConfiguration {
@@ -40,8 +41,10 @@ public class LoggingConfiguration {
private final JHipsterProperties jHipsterProperties;
- public LoggingConfiguration(@Value("${spring.application.name}") String appName, @Value("${server.port}") String serverPort,
- JHipsterProperties jHipsterProperties) {
+ public LoggingConfiguration(
+ @Value("${spring.application.name}") String appName,
+ @Value("${server.port}") String serverPort,
+ JHipsterProperties jHipsterProperties) {
this.appName = appName;
this.serverPort = serverPort;
this.jHipsterProperties = jHipsterProperties;
@@ -71,7 +74,10 @@ public class LoggingConfiguration {
// More documentation is available at: https://github.com/logstash/logstash-logback-encoder
LogstashEncoder logstashEncoder = new LogstashEncoder();
// Set the Logstash appender config from JHipster properties
- logstashAppender.addDestinations(new InetSocketAddress(jHipsterProperties.getLogging().getLogstash().getHost(), jHipsterProperties.getLogging().getLogstash().getPort()));
+ logstashAppender.addDestinations(
+ new InetSocketAddress(
+ jHipsterProperties.getLogging().getLogstash().getHost(),
+ jHipsterProperties.getLogging().getLogstash().getPort()));
ShortenedThrowableConverter throwableConverter = new ShortenedThrowableConverter();
throwableConverter.setRootCauseFirst(true);
diff --git a/src/main/java/org/hostsharing/hsadminng/config/SecurityConfiguration.java b/src/main/java/org/hostsharing/hsadminng/config/SecurityConfiguration.java
index 17ec6616..db8a5482 100644
--- a/src/main/java/org/hostsharing/hsadminng/config/SecurityConfiguration.java
+++ b/src/main/java/org/hostsharing/hsadminng/config/SecurityConfiguration.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.config;
import org.hostsharing.hsadminng.security.*;
@@ -41,7 +42,12 @@ public class SecurityConfiguration extends WebSecurityConfigurerAdapter {
private final SecurityProblemSupport problemSupport;
- public SecurityConfiguration(AuthenticationManagerBuilder authenticationManagerBuilder, UserDetailsService userDetailsService, TokenProvider tokenProvider, CorsFilter corsFilter, SecurityProblemSupport problemSupport) {
+ public SecurityConfiguration(
+ AuthenticationManagerBuilder authenticationManagerBuilder,
+ UserDetailsService userDetailsService,
+ TokenProvider tokenProvider,
+ CorsFilter corsFilter,
+ SecurityProblemSupport problemSupport) {
this.authenticationManagerBuilder = authenticationManagerBuilder;
this.userDetailsService = userDetailsService;
this.tokenProvider = tokenProvider;
@@ -53,8 +59,8 @@ public class SecurityConfiguration extends WebSecurityConfigurerAdapter {
public void init() {
try {
authenticationManagerBuilder
- .userDetailsService(userDetailsService)
- .passwordEncoder(passwordEncoder());
+ .userDetailsService(userDetailsService)
+ .passwordEncoder(passwordEncoder());
} catch (Exception e) {
throw new BeanInitializationException("Security configuration failed", e);
}
@@ -74,17 +80,18 @@ public class SecurityConfiguration extends WebSecurityConfigurerAdapter {
@Override
public void configure(WebSecurity web) throws Exception {
web.ignoring()
- .antMatchers(HttpMethod.OPTIONS, "/**")
- .antMatchers("/app/**/*.{js,html}")
- .antMatchers("/i18n/**")
- .antMatchers("/content/**")
- .antMatchers("/h2-console/**")
- .antMatchers("/swagger-ui/index.html")
- .antMatchers("/test/**");
+ .antMatchers(HttpMethod.OPTIONS, "/**")
+ .antMatchers("/app/**/*.{js,html}")
+ .antMatchers("/i18n/**")
+ .antMatchers("/content/**")
+ .antMatchers("/h2-console/**")
+ .antMatchers("/swagger-ui/index.html")
+ .antMatchers("/test/**");
}
@Override
public void configure(HttpSecurity http) throws Exception {
+ // @formatter:off
http
.csrf()
.disable()
@@ -112,7 +119,7 @@ public class SecurityConfiguration extends WebSecurityConfigurerAdapter {
.antMatchers("/management/**").hasAuthority(AuthoritiesConstants.ADMIN)
.and()
.apply(securityConfigurerAdapter());
-
+ // @formatter:on
}
private JWTConfigurer securityConfigurerAdapter() {
diff --git a/src/main/java/org/hostsharing/hsadminng/config/WebConfigurer.java b/src/main/java/org/hostsharing/hsadminng/config/WebConfigurer.java
index 0eea3091..e0265aff 100644
--- a/src/main/java/org/hostsharing/hsadminng/config/WebConfigurer.java
+++ b/src/main/java/org/hostsharing/hsadminng/config/WebConfigurer.java
@@ -1,13 +1,16 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.config;
+import static java.net.URLDecoder.decode;
+
import io.github.jhipster.config.JHipsterConstants;
import io.github.jhipster.config.JHipsterProperties;
import io.github.jhipster.config.h2.H2ConfigurationHelper;
import io.github.jhipster.web.filter.CachingHttpHeadersFilter;
import io.undertow.UndertowOptions;
+
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
-import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.boot.web.embedded.undertow.UndertowServletWebServerFactory;
import org.springframework.boot.web.server.*;
import org.springframework.boot.web.servlet.ServletContextInitializer;
@@ -20,14 +23,13 @@ import org.springframework.web.cors.CorsConfiguration;
import org.springframework.web.cors.UrlBasedCorsConfigurationSource;
import org.springframework.web.filter.CorsFilter;
-import javax.servlet.*;
import java.io.File;
import java.io.UnsupportedEncodingException;
import java.nio.charset.StandardCharsets;
import java.nio.file.Paths;
import java.util.*;
-import static java.net.URLDecoder.decode;
+import javax.servlet.*;
/**
* Configuration of web application with Servlet 3.0 APIs.
@@ -78,11 +80,10 @@ public class WebConfigurer implements ServletContextInitializer, WebServerFactor
* for more information.
*/
if (jHipsterProperties.getHttp().getVersion().equals(JHipsterProperties.Http.Version.V_2_0) &&
- server instanceof UndertowServletWebServerFactory) {
+ server instanceof UndertowServletWebServerFactory) {
((UndertowServletWebServerFactory) server)
- .addBuilderCustomizers(builder ->
- builder.setServerOption(UndertowOptions.ENABLE_HTTP2, true));
+ .addBuilderCustomizers(builder -> builder.setServerOption(UndertowOptions.ENABLE_HTTP2, true));
}
}
@@ -133,11 +134,12 @@ public class WebConfigurer implements ServletContextInitializer, WebServerFactor
/**
* Initializes the caching HTTP Headers Filter.
*/
- private void initCachingHttpHeadersFilter(ServletContext servletContext,
- EnumSet disps) {
+ private void initCachingHttpHeadersFilter(
+ ServletContext servletContext,
+ EnumSet disps) {
log.debug("Registering Caching HTTP Headers Filter");
- FilterRegistration.Dynamic cachingHttpHeadersFilter =
- servletContext.addFilter("cachingHttpHeadersFilter",
+ FilterRegistration.Dynamic cachingHttpHeadersFilter = servletContext.addFilter(
+ "cachingHttpHeadersFilter",
new CachingHttpHeadersFilter(jHipsterProperties));
cachingHttpHeadersFilter.addMappingForUrlPatterns(disps, true, "/i18n/*");
diff --git a/src/main/java/org/hostsharing/hsadminng/config/audit/AuditEventConverter.java b/src/main/java/org/hostsharing/hsadminng/config/audit/AuditEventConverter.java
index e54a06b1..9a591c96 100644
--- a/src/main/java/org/hostsharing/hsadminng/config/audit/AuditEventConverter.java
+++ b/src/main/java/org/hostsharing/hsadminng/config/audit/AuditEventConverter.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.config.audit;
import org.hostsharing.hsadminng.domain.PersistentAuditEvent;
@@ -38,8 +39,11 @@ public class AuditEventConverter {
if (persistentAuditEvent == null) {
return null;
}
- return new AuditEvent(persistentAuditEvent.getAuditEventDate(), persistentAuditEvent.getPrincipal(),
- persistentAuditEvent.getAuditEventType(), convertDataToObjects(persistentAuditEvent.getData()));
+ return new AuditEvent(
+ persistentAuditEvent.getAuditEventDate(),
+ persistentAuditEvent.getPrincipal(),
+ persistentAuditEvent.getAuditEventType(),
+ convertDataToObjects(persistentAuditEvent.getData()));
}
/**
diff --git a/src/main/java/org/hostsharing/hsadminng/domain/AbstractAuditingEntity.java b/src/main/java/org/hostsharing/hsadminng/domain/AbstractAuditingEntity.java
index 40805725..d1f27399 100644
--- a/src/main/java/org/hostsharing/hsadminng/domain/AbstractAuditingEntity.java
+++ b/src/main/java/org/hostsharing/hsadminng/domain/AbstractAuditingEntity.java
@@ -1,6 +1,8 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.domain;
import com.fasterxml.jackson.annotation.JsonIgnore;
+
import org.hibernate.envers.Audited;
import org.springframework.data.annotation.CreatedBy;
import org.springframework.data.annotation.CreatedDate;
@@ -10,6 +12,7 @@ import org.springframework.data.jpa.domain.support.AuditingEntityListener;
import java.io.Serializable;
import java.time.Instant;
+
import javax.persistence.Column;
import javax.persistence.EntityListeners;
import javax.persistence.MappedSuperclass;
diff --git a/src/main/java/org/hostsharing/hsadminng/domain/Asset.java b/src/main/java/org/hostsharing/hsadminng/domain/Asset.java
index ef7fa87e..f0d1cfd1 100644
--- a/src/main/java/org/hostsharing/hsadminng/domain/Asset.java
+++ b/src/main/java/org/hostsharing/hsadminng/domain/Asset.java
@@ -1,17 +1,19 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.domain;
-
-import com.fasterxml.jackson.annotation.JsonIgnoreProperties;
import org.hostsharing.hsadminng.domain.enumeration.AssetAction;
-import javax.persistence.*;
-import javax.validation.constraints.NotNull;
-import javax.validation.constraints.Size;
+import com.fasterxml.jackson.annotation.JsonIgnoreProperties;
+
import java.io.Serializable;
import java.math.BigDecimal;
import java.time.LocalDate;
import java.util.Objects;
+import javax.persistence.*;
+import javax.validation.constraints.NotNull;
+import javax.validation.constraints.Size;
+
/**
* A Asset.
*/
@@ -170,12 +172,12 @@ public class Asset implements Serializable {
@Override
public String toString() {
return "Asset{" +
- "id=" + getId() +
- ", documentDate='" + getDocumentDate() + "'" +
- ", valueDate='" + getValueDate() + "'" +
- ", action='" + getAction() + "'" +
- ", amount=" + getAmount() +
- ", remark='" + getRemark() + "'" +
- "}";
+ "id=" + getId() +
+ ", documentDate='" + getDocumentDate() + "'" +
+ ", valueDate='" + getValueDate() + "'" +
+ ", action='" + getAction() + "'" +
+ ", amount=" + getAmount() +
+ ", remark='" + getRemark() + "'" +
+ "}";
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/domain/Authority.java b/src/main/java/org/hostsharing/hsadminng/domain/Authority.java
index cac1692b..422347c7 100644
--- a/src/main/java/org/hostsharing/hsadminng/domain/Authority.java
+++ b/src/main/java/org/hostsharing/hsadminng/domain/Authority.java
@@ -1,12 +1,14 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.domain;
+import java.io.Serializable;
+
+import javax.persistence.Column;
import javax.persistence.Entity;
import javax.persistence.Id;
import javax.persistence.Table;
-import javax.persistence.Column;
import javax.validation.constraints.NotNull;
import javax.validation.constraints.Size;
-import java.io.Serializable;
/**
* An authority (a security role) used by Spring Security.
@@ -53,7 +55,7 @@ public class Authority implements Serializable {
@Override
public String toString() {
return "Authority{" +
- "name='" + name + '\'' +
- "}";
+ "name='" + name + '\'' +
+ "}";
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/domain/Customer.java b/src/main/java/org/hostsharing/hsadminng/domain/Customer.java
index b1745ea5..55276b75 100644
--- a/src/main/java/org/hostsharing/hsadminng/domain/Customer.java
+++ b/src/main/java/org/hostsharing/hsadminng/domain/Customer.java
@@ -1,17 +1,18 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.domain;
-
import org.hostsharing.hsadminng.domain.enumeration.CustomerKind;
import org.hostsharing.hsadminng.domain.enumeration.VatRegion;
-import javax.persistence.*;
-import javax.validation.constraints.*;
import java.io.Serializable;
import java.time.LocalDate;
import java.util.HashSet;
import java.util.Objects;
import java.util.Set;
+import javax.persistence.*;
+import javax.validation.constraints.*;
+
/**
* A Customer.
*/
@@ -20,7 +21,7 @@ import java.util.Set;
public class Customer implements Serializable {
private static final long serialVersionUID = 1L;
-
+
@Id
@GeneratedValue(strategy = GenerationType.SEQUENCE, generator = "sequenceGenerator")
@SequenceGenerator(name = "sequenceGenerator")
@@ -384,22 +385,22 @@ public class Customer implements Serializable {
@Override
public String toString() {
return "Customer{" +
- "id=" + getId() +
- ", reference=" + getReference() +
- ", prefix='" + getPrefix() + "'" +
- ", name='" + getName() + "'" +
- ", kind='" + getKind() + "'" +
- ", birthDate='" + getBirthDate() + "'" +
- ", birthPlace='" + getBirthPlace() + "'" +
- ", registrationCourt='" + getRegistrationCourt() + "'" +
- ", registrationNumber='" + getRegistrationNumber() + "'" +
- ", vatRegion='" + getVatRegion() + "'" +
- ", vatNumber='" + getVatNumber() + "'" +
- ", contractualSalutation='" + getContractualSalutation() + "'" +
- ", contractualAddress='" + getContractualAddress() + "'" +
- ", billingSalutation='" + getBillingSalutation() + "'" +
- ", billingAddress='" + getBillingAddress() + "'" +
- ", remark='" + getRemark() + "'" +
- "}";
+ "id=" + getId() +
+ ", reference=" + getReference() +
+ ", prefix='" + getPrefix() + "'" +
+ ", name='" + getName() + "'" +
+ ", kind='" + getKind() + "'" +
+ ", birthDate='" + getBirthDate() + "'" +
+ ", birthPlace='" + getBirthPlace() + "'" +
+ ", registrationCourt='" + getRegistrationCourt() + "'" +
+ ", registrationNumber='" + getRegistrationNumber() + "'" +
+ ", vatRegion='" + getVatRegion() + "'" +
+ ", vatNumber='" + getVatNumber() + "'" +
+ ", contractualSalutation='" + getContractualSalutation() + "'" +
+ ", contractualAddress='" + getContractualAddress() + "'" +
+ ", billingSalutation='" + getBillingSalutation() + "'" +
+ ", billingAddress='" + getBillingAddress() + "'" +
+ ", remark='" + getRemark() + "'" +
+ "}";
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/domain/Membership.java b/src/main/java/org/hostsharing/hsadminng/domain/Membership.java
index 0e6f4b0e..f940ab32 100644
--- a/src/main/java/org/hostsharing/hsadminng/domain/Membership.java
+++ b/src/main/java/org/hostsharing/hsadminng/domain/Membership.java
@@ -1,17 +1,18 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.domain;
-
import com.fasterxml.jackson.annotation.JsonIgnoreProperties;
-import javax.persistence.*;
-import javax.validation.constraints.NotNull;
-import javax.validation.constraints.Size;
import java.io.Serializable;
import java.time.LocalDate;
import java.util.HashSet;
import java.util.Objects;
import java.util.Set;
+import javax.persistence.*;
+import javax.validation.constraints.NotNull;
+import javax.validation.constraints.Size;
+
/**
* A Membership.
*/
@@ -225,12 +226,12 @@ public class Membership implements Serializable {
@Override
public String toString() {
return "Membership{" +
- "id=" + getId() +
- ", admissionDocumentDate='" + getAdmissionDocumentDate() + "'" +
- ", cancellationDocumentDate='" + getCancellationDocumentDate() + "'" +
- ", memberFromDate='" + getMemberFromDate() + "'" +
- ", memberUntilDate='" + getMemberUntilDate() + "'" +
- ", remark='" + getRemark() + "'" +
- "}";
+ "id=" + getId() +
+ ", admissionDocumentDate='" + getAdmissionDocumentDate() + "'" +
+ ", cancellationDocumentDate='" + getCancellationDocumentDate() + "'" +
+ ", memberFromDate='" + getMemberFromDate() + "'" +
+ ", memberUntilDate='" + getMemberUntilDate() + "'" +
+ ", remark='" + getRemark() + "'" +
+ "}";
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/domain/PersistentAuditEvent.java b/src/main/java/org/hostsharing/hsadminng/domain/PersistentAuditEvent.java
index 3288e892..d59463c2 100644
--- a/src/main/java/org/hostsharing/hsadminng/domain/PersistentAuditEvent.java
+++ b/src/main/java/org/hostsharing/hsadminng/domain/PersistentAuditEvent.java
@@ -1,12 +1,14 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.domain;
-import javax.persistence.*;
-import javax.validation.constraints.NotNull;
import java.io.Serializable;
import java.time.Instant;
import java.util.HashMap;
-import java.util.Objects;
import java.util.Map;
+import java.util.Objects;
+
+import javax.persistence.*;
+import javax.validation.constraints.NotNull;
/**
* Persist AuditEvent managed by the Spring Boot actuator.
@@ -38,7 +40,7 @@ public class PersistentAuditEvent implements Serializable {
@ElementCollection
@MapKeyColumn(name = "name")
@Column(name = "value")
- @CollectionTable(name = "jhi_persistent_audit_evt_data", joinColumns=@JoinColumn(name="event_id"))
+ @CollectionTable(name = "jhi_persistent_audit_evt_data", joinColumns = @JoinColumn(name = "event_id"))
private Map data = new HashMap<>();
public Long getId() {
@@ -91,7 +93,8 @@ public class PersistentAuditEvent implements Serializable {
}
PersistentAuditEvent persistentAuditEvent = (PersistentAuditEvent) o;
- return !(persistentAuditEvent.getId() == null || getId() == null) && Objects.equals(getId(), persistentAuditEvent.getId());
+ return !(persistentAuditEvent.getId() == null || getId() == null)
+ && Objects.equals(getId(), persistentAuditEvent.getId());
}
@Override
@@ -102,9 +105,9 @@ public class PersistentAuditEvent implements Serializable {
@Override
public String toString() {
return "PersistentAuditEvent{" +
- "principal='" + principal + '\'' +
- ", auditEventDate=" + auditEventDate +
- ", auditEventType='" + auditEventType + '\'' +
- '}';
+ "principal='" + principal + '\'' +
+ ", auditEventDate=" + auditEventDate +
+ ", auditEventType='" + auditEventType + '\'' +
+ '}';
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/domain/SepaMandate.java b/src/main/java/org/hostsharing/hsadminng/domain/SepaMandate.java
index bff9b4bf..bc0ef38c 100644
--- a/src/main/java/org/hostsharing/hsadminng/domain/SepaMandate.java
+++ b/src/main/java/org/hostsharing/hsadminng/domain/SepaMandate.java
@@ -1,14 +1,15 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.domain;
-
import com.fasterxml.jackson.annotation.JsonIgnoreProperties;
+import java.io.Serializable;
+import java.time.LocalDate;
+import java.util.Objects;
+
import javax.persistence.*;
import javax.validation.constraints.NotNull;
import javax.validation.constraints.Size;
-import java.io.Serializable;
-import java.time.LocalDate;
-import java.util.Objects;
/**
* A SepaMandate.
@@ -18,7 +19,7 @@ import java.util.Objects;
public class SepaMandate implements Serializable {
private static final long serialVersionUID = 1L;
-
+
@Id
@GeneratedValue(strategy = GenerationType.SEQUENCE, generator = "sequenceGenerator")
@SequenceGenerator(name = "sequenceGenerator")
@@ -232,16 +233,16 @@ public class SepaMandate implements Serializable {
@Override
public String toString() {
return "SepaMandate{" +
- "id=" + getId() +
- ", reference='" + getReference() + "'" +
- ", iban='" + getIban() + "'" +
- ", bic='" + getBic() + "'" +
- ", grantingDocumentDate='" + getGrantingDocumentDate() + "'" +
- ", revokationDocumentDate='" + getRevokationDocumentDate() + "'" +
- ", validFromDate='" + getValidFromDate() + "'" +
- ", validUntilDate='" + getValidUntilDate() + "'" +
- ", lastUsedDate='" + getLastUsedDate() + "'" +
- ", remark='" + getRemark() + "'" +
- "}";
+ "id=" + getId() +
+ ", reference='" + getReference() + "'" +
+ ", iban='" + getIban() + "'" +
+ ", bic='" + getBic() + "'" +
+ ", grantingDocumentDate='" + getGrantingDocumentDate() + "'" +
+ ", revokationDocumentDate='" + getRevokationDocumentDate() + "'" +
+ ", validFromDate='" + getValidFromDate() + "'" +
+ ", validUntilDate='" + getValidUntilDate() + "'" +
+ ", lastUsedDate='" + getLastUsedDate() + "'" +
+ ", remark='" + getRemark() + "'" +
+ "}";
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/domain/Share.java b/src/main/java/org/hostsharing/hsadminng/domain/Share.java
index 4c3c8ab1..b8032f4d 100644
--- a/src/main/java/org/hostsharing/hsadminng/domain/Share.java
+++ b/src/main/java/org/hostsharing/hsadminng/domain/Share.java
@@ -1,15 +1,17 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.domain;
+import org.hostsharing.hsadminng.domain.enumeration.ShareAction;
import com.fasterxml.jackson.annotation.JsonIgnoreProperties;
-import org.hostsharing.hsadminng.domain.enumeration.ShareAction;
+
+import java.io.Serializable;
+import java.time.LocalDate;
+import java.util.Objects;
import javax.persistence.*;
import javax.validation.constraints.NotNull;
import javax.validation.constraints.Size;
-import java.io.Serializable;
-import java.time.LocalDate;
-import java.util.Objects;
/**
* A Share.
@@ -169,12 +171,12 @@ public class Share implements Serializable {
@Override
public String toString() {
return "Share{" +
- "id=" + getId() +
- ", documentDate='" + getDocumentDate() + "'" +
- ", valueDate='" + getValueDate() + "'" +
- ", action='" + getAction() + "'" +
- ", quantity=" + getQuantity() +
- ", remark='" + getRemark() + "'" +
- "}";
+ "id=" + getId() +
+ ", documentDate='" + getDocumentDate() + "'" +
+ ", valueDate='" + getValueDate() + "'" +
+ ", action='" + getAction() + "'" +
+ ", quantity=" + getQuantity() +
+ ", remark='" + getRemark() + "'" +
+ "}";
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/domain/User.java b/src/main/java/org/hostsharing/hsadminng/domain/User.java
index d8708e45..1f7ffebf 100644
--- a/src/main/java/org/hostsharing/hsadminng/domain/User.java
+++ b/src/main/java/org/hostsharing/hsadminng/domain/User.java
@@ -1,22 +1,25 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.domain;
import org.hostsharing.hsadminng.config.Constants;
import com.fasterxml.jackson.annotation.JsonIgnore;
+
import org.apache.commons.lang3.StringUtils;
import org.hibernate.annotations.BatchSize;
-import javax.validation.constraints.Email;
-import javax.persistence.*;
-import javax.validation.constraints.NotNull;
-import javax.validation.constraints.Pattern;
-import javax.validation.constraints.Size;
import java.io.Serializable;
+import java.time.Instant;
import java.util.HashSet;
import java.util.Locale;
import java.util.Objects;
import java.util.Set;
-import java.time.Instant;
+
+import javax.persistence.*;
+import javax.validation.constraints.Email;
+import javax.validation.constraints.NotNull;
+import javax.validation.constraints.Pattern;
+import javax.validation.constraints.Size;
/**
* A user.
@@ -86,9 +89,9 @@ public class User extends AbstractAuditingEntity implements Serializable {
@JsonIgnore
@ManyToMany
@JoinTable(
- name = "jhi_user_authority",
- joinColumns = {@JoinColumn(name = "user_id", referencedColumnName = "id")},
- inverseJoinColumns = {@JoinColumn(name = "authority_name", referencedColumnName = "name")})
+ name = "jhi_user_authority",
+ joinColumns = { @JoinColumn(name = "user_id", referencedColumnName = "id") },
+ inverseJoinColumns = { @JoinColumn(name = "authority_name", referencedColumnName = "name") })
@BatchSize(size = 20)
private Set authorities = new HashSet<>();
@@ -219,14 +222,14 @@ public class User extends AbstractAuditingEntity implements Serializable {
@Override
public String toString() {
return "User{" +
- "login='" + login + '\'' +
- ", firstName='" + firstName + '\'' +
- ", lastName='" + lastName + '\'' +
- ", email='" + email + '\'' +
- ", imageUrl='" + imageUrl + '\'' +
- ", activated='" + activated + '\'' +
- ", langKey='" + langKey + '\'' +
- ", activationKey='" + activationKey + '\'' +
- "}";
+ "login='" + login + '\'' +
+ ", firstName='" + firstName + '\'' +
+ ", lastName='" + lastName + '\'' +
+ ", email='" + email + '\'' +
+ ", imageUrl='" + imageUrl + '\'' +
+ ", activated='" + activated + '\'' +
+ ", langKey='" + langKey + '\'' +
+ ", activationKey='" + activationKey + '\'' +
+ "}";
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/domain/enumeration/AssetAction.java b/src/main/java/org/hostsharing/hsadminng/domain/enumeration/AssetAction.java
index a42d7a04..c60ee96a 100644
--- a/src/main/java/org/hostsharing/hsadminng/domain/enumeration/AssetAction.java
+++ b/src/main/java/org/hostsharing/hsadminng/domain/enumeration/AssetAction.java
@@ -1,8 +1,14 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.domain.enumeration;
/**
* The AssetAction enumeration.
*/
public enum AssetAction {
- PAYMENT, HANDOVER, ADOPTION, LOSS, CLEARING, PAYBACK
+ PAYMENT,
+ HANDOVER,
+ ADOPTION,
+ LOSS,
+ CLEARING,
+ PAYBACK
}
diff --git a/src/main/java/org/hostsharing/hsadminng/domain/enumeration/CustomerKind.java b/src/main/java/org/hostsharing/hsadminng/domain/enumeration/CustomerKind.java
index 46092119..7e301271 100644
--- a/src/main/java/org/hostsharing/hsadminng/domain/enumeration/CustomerKind.java
+++ b/src/main/java/org/hostsharing/hsadminng/domain/enumeration/CustomerKind.java
@@ -1,8 +1,10 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.domain.enumeration;
/**
* The CustomerKind enumeration.
*/
public enum CustomerKind {
- NATURAL, LEGAL
+ NATURAL,
+ LEGAL
}
diff --git a/src/main/java/org/hostsharing/hsadminng/domain/enumeration/ShareAction.java b/src/main/java/org/hostsharing/hsadminng/domain/enumeration/ShareAction.java
index 032d8638..c8ce2108 100644
--- a/src/main/java/org/hostsharing/hsadminng/domain/enumeration/ShareAction.java
+++ b/src/main/java/org/hostsharing/hsadminng/domain/enumeration/ShareAction.java
@@ -1,8 +1,10 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.domain.enumeration;
/**
* The ShareAction enumeration.
*/
public enum ShareAction {
- SUBSCRIPTION, CANCELLATION
+ SUBSCRIPTION,
+ CANCELLATION
}
diff --git a/src/main/java/org/hostsharing/hsadminng/domain/enumeration/VatRegion.java b/src/main/java/org/hostsharing/hsadminng/domain/enumeration/VatRegion.java
index 22bf49ac..067cd04e 100644
--- a/src/main/java/org/hostsharing/hsadminng/domain/enumeration/VatRegion.java
+++ b/src/main/java/org/hostsharing/hsadminng/domain/enumeration/VatRegion.java
@@ -1,8 +1,11 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.domain.enumeration;
/**
* The VatRegion enumeration.
*/
public enum VatRegion {
- DOMESTIC, EU, OTHER
+ DOMESTIC,
+ EU,
+ OTHER
}
diff --git a/src/main/java/org/hostsharing/hsadminng/repository/AssetRepository.java b/src/main/java/org/hostsharing/hsadminng/repository/AssetRepository.java
index 31c5a947..cb8f92c8 100644
--- a/src/main/java/org/hostsharing/hsadminng/repository/AssetRepository.java
+++ b/src/main/java/org/hostsharing/hsadminng/repository/AssetRepository.java
@@ -1,12 +1,13 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.repository;
import org.hostsharing.hsadminng.domain.Asset;
+
import org.springframework.data.jpa.repository.*;
import org.springframework.stereotype.Repository;
-
/**
- * Spring Data repository for the Asset entity.
+ * Spring Data repository for the Asset entity.
*/
@SuppressWarnings("unused")
@Repository
diff --git a/src/main/java/org/hostsharing/hsadminng/repository/AuthorityRepository.java b/src/main/java/org/hostsharing/hsadminng/repository/AuthorityRepository.java
index 66ea1920..2d7a8c20 100644
--- a/src/main/java/org/hostsharing/hsadminng/repository/AuthorityRepository.java
+++ b/src/main/java/org/hostsharing/hsadminng/repository/AuthorityRepository.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.repository;
import org.hostsharing.hsadminng.domain.Authority;
diff --git a/src/main/java/org/hostsharing/hsadminng/repository/CustomAuditEventRepository.java b/src/main/java/org/hostsharing/hsadminng/repository/CustomAuditEventRepository.java
index 90fe3ade..54eb2165 100644
--- a/src/main/java/org/hostsharing/hsadminng/repository/CustomAuditEventRepository.java
+++ b/src/main/java/org/hostsharing/hsadminng/repository/CustomAuditEventRepository.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.repository;
import org.hostsharing.hsadminng.config.Constants;
@@ -34,7 +35,8 @@ public class CustomAuditEventRepository implements AuditEventRepository {
private final Logger log = LoggerFactory.getLogger(getClass());
- public CustomAuditEventRepository(PersistenceAuditEventRepository persistenceAuditEventRepository,
+ public CustomAuditEventRepository(
+ PersistenceAuditEventRepository persistenceAuditEventRepository,
AuditEventConverter auditEventConverter) {
this.persistenceAuditEventRepository = persistenceAuditEventRepository;
@@ -43,8 +45,8 @@ public class CustomAuditEventRepository implements AuditEventRepository {
@Override
public List find(String principal, Instant after, String type) {
- Iterable persistentAuditEvents =
- persistenceAuditEventRepository.findByPrincipalAndAuditEventDateAfterAndAuditEventType(principal, after, type);
+ Iterable persistentAuditEvents = persistenceAuditEventRepository
+ .findByPrincipalAndAuditEventDateAfterAndAuditEventType(principal, after, type);
return auditEventConverter.convertToAuditEvent(persistentAuditEvents);
}
@@ -52,7 +54,7 @@ public class CustomAuditEventRepository implements AuditEventRepository {
@Transactional(propagation = Propagation.REQUIRES_NEW)
public void add(AuditEvent event) {
if (!AUTHORIZATION_FAILURE.equals(event.getType()) &&
- !Constants.ANONYMOUS_USER.equals(event.getPrincipal())) {
+ !Constants.ANONYMOUS_USER.equals(event.getPrincipal())) {
PersistentAuditEvent persistentAuditEvent = new PersistentAuditEvent();
persistentAuditEvent.setPrincipal(event.getPrincipal());
@@ -77,8 +79,11 @@ public class CustomAuditEventRepository implements AuditEventRepository {
int length = value.length();
if (length > EVENT_DATA_COLUMN_MAX_LENGTH) {
value = value.substring(0, EVENT_DATA_COLUMN_MAX_LENGTH);
- log.warn("Event data for {} too long ({}) has been truncated to {}. Consider increasing column width.",
- entry.getKey(), length, EVENT_DATA_COLUMN_MAX_LENGTH);
+ log.warn(
+ "Event data for {} too long ({}) has been truncated to {}. Consider increasing column width.",
+ entry.getKey(),
+ length,
+ EVENT_DATA_COLUMN_MAX_LENGTH);
}
}
results.put(entry.getKey(), value);
diff --git a/src/main/java/org/hostsharing/hsadminng/repository/CustomerRepository.java b/src/main/java/org/hostsharing/hsadminng/repository/CustomerRepository.java
index 11367351..9c434cb2 100644
--- a/src/main/java/org/hostsharing/hsadminng/repository/CustomerRepository.java
+++ b/src/main/java/org/hostsharing/hsadminng/repository/CustomerRepository.java
@@ -1,12 +1,13 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.repository;
import org.hostsharing.hsadminng.domain.Customer;
+
import org.springframework.data.jpa.repository.*;
import org.springframework.stereotype.Repository;
-
/**
- * Spring Data repository for the Customer entity.
+ * Spring Data repository for the Customer entity.
*/
@SuppressWarnings("unused")
@Repository
diff --git a/src/main/java/org/hostsharing/hsadminng/repository/MembershipRepository.java b/src/main/java/org/hostsharing/hsadminng/repository/MembershipRepository.java
index 95810440..291deca7 100644
--- a/src/main/java/org/hostsharing/hsadminng/repository/MembershipRepository.java
+++ b/src/main/java/org/hostsharing/hsadminng/repository/MembershipRepository.java
@@ -1,21 +1,22 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.repository;
import org.hostsharing.hsadminng.domain.Membership;
+
import org.springframework.data.jpa.repository.JpaRepository;
import org.springframework.data.jpa.repository.JpaSpecificationExecutor;
import org.springframework.data.jpa.repository.Query;
import org.springframework.data.repository.query.Param;
import org.springframework.stereotype.Repository;
-
/**
- * Spring Data repository for the Membership entity.
+ * Spring Data repository for the Membership entity.
*/
@SuppressWarnings("unused")
@Repository
public interface MembershipRepository extends JpaRepository, JpaSpecificationExecutor {
@Query("SELECT CASE WHEN COUNT(m)> 0 THEN TRUE ELSE FALSE END " +
- " FROM Membership m WHERE m.customer.id=:customerId AND m.memberUntilDate IS NULL")
+ " FROM Membership m WHERE m.customer.id=:customerId AND m.memberUntilDate IS NULL")
boolean hasUncancelledMembershipForCustomer(@Param("customerId") final long customerId);
}
diff --git a/src/main/java/org/hostsharing/hsadminng/repository/PersistenceAuditEventRepository.java b/src/main/java/org/hostsharing/hsadminng/repository/PersistenceAuditEventRepository.java
index 39b6946b..18e367cc 100644
--- a/src/main/java/org/hostsharing/hsadminng/repository/PersistenceAuditEventRepository.java
+++ b/src/main/java/org/hostsharing/hsadminng/repository/PersistenceAuditEventRepository.java
@@ -1,6 +1,8 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.repository;
import org.hostsharing.hsadminng.domain.PersistentAuditEvent;
+
import org.springframework.data.domain.Page;
import org.springframework.data.domain.Pageable;
import org.springframework.data.jpa.repository.JpaRepository;
@@ -19,7 +21,10 @@ public interface PersistenceAuditEventRepository extends JpaRepository findByPrincipalAndAuditEventDateAfter(String principal, Instant after);
- List findByPrincipalAndAuditEventDateAfterAndAuditEventType(String principal, Instant after, String type);
+ List findByPrincipalAndAuditEventDateAfterAndAuditEventType(
+ String principal,
+ Instant after,
+ String type);
Page findAllByAuditEventDateBetween(Instant fromDate, Instant toDate, Pageable pageable);
}
diff --git a/src/main/java/org/hostsharing/hsadminng/repository/SepaMandateRepository.java b/src/main/java/org/hostsharing/hsadminng/repository/SepaMandateRepository.java
index 323a7783..d1ad0459 100644
--- a/src/main/java/org/hostsharing/hsadminng/repository/SepaMandateRepository.java
+++ b/src/main/java/org/hostsharing/hsadminng/repository/SepaMandateRepository.java
@@ -1,12 +1,13 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.repository;
import org.hostsharing.hsadminng.domain.SepaMandate;
+
import org.springframework.data.jpa.repository.*;
import org.springframework.stereotype.Repository;
-
/**
- * Spring Data repository for the SepaMandate entity.
+ * Spring Data repository for the SepaMandate entity.
*/
@SuppressWarnings("unused")
@Repository
diff --git a/src/main/java/org/hostsharing/hsadminng/repository/ShareRepository.java b/src/main/java/org/hostsharing/hsadminng/repository/ShareRepository.java
index 660f4d9b..12cd086e 100644
--- a/src/main/java/org/hostsharing/hsadminng/repository/ShareRepository.java
+++ b/src/main/java/org/hostsharing/hsadminng/repository/ShareRepository.java
@@ -1,12 +1,13 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.repository;
import org.hostsharing.hsadminng.domain.Share;
+
import org.springframework.data.jpa.repository.*;
import org.springframework.stereotype.Repository;
-
/**
- * Spring Data repository for the Share entity.
+ * Spring Data repository for the Share entity.
*/
@SuppressWarnings("unused")
@Repository
diff --git a/src/main/java/org/hostsharing/hsadminng/repository/UserRepository.java b/src/main/java/org/hostsharing/hsadminng/repository/UserRepository.java
index d835bbf4..f91ff561 100644
--- a/src/main/java/org/hostsharing/hsadminng/repository/UserRepository.java
+++ b/src/main/java/org/hostsharing/hsadminng/repository/UserRepository.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.repository;
import org.hostsharing.hsadminng.domain.User;
@@ -8,9 +9,10 @@ import org.springframework.data.domain.Pageable;
import org.springframework.data.jpa.repository.EntityGraph;
import org.springframework.data.jpa.repository.JpaRepository;
import org.springframework.stereotype.Repository;
+
+import java.time.Instant;
import java.util.List;
import java.util.Optional;
-import java.time.Instant;
/**
* Spring Data JPA repository for the User entity.
diff --git a/src/main/java/org/hostsharing/hsadminng/security/AuthoritiesConstants.java b/src/main/java/org/hostsharing/hsadminng/security/AuthoritiesConstants.java
index bb1fd344..6df501ec 100644
--- a/src/main/java/org/hostsharing/hsadminng/security/AuthoritiesConstants.java
+++ b/src/main/java/org/hostsharing/hsadminng/security/AuthoritiesConstants.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.security;
/**
diff --git a/src/main/java/org/hostsharing/hsadminng/security/DomainUserDetailsService.java b/src/main/java/org/hostsharing/hsadminng/security/DomainUserDetailsService.java
index 7b20fe3d..570f0449 100644
--- a/src/main/java/org/hostsharing/hsadminng/security/DomainUserDetailsService.java
+++ b/src/main/java/org/hostsharing/hsadminng/security/DomainUserDetailsService.java
@@ -1,7 +1,9 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.security;
import org.hostsharing.hsadminng.domain.User;
import org.hostsharing.hsadminng.repository.UserRepository;
+
import org.hibernate.validator.internal.constraintvalidators.hv.EmailValidator;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
@@ -37,14 +39,15 @@ public class DomainUserDetailsService implements UserDetailsService {
if (new EmailValidator().isValid(login, null)) {
return userRepository.findOneWithAuthoritiesByEmail(login)
- .map(user -> createSpringSecurityUser(login, user))
- .orElseThrow(() -> new UsernameNotFoundException("User with email " + login + " was not found in the database"));
+ .map(user -> createSpringSecurityUser(login, user))
+ .orElseThrow(
+ () -> new UsernameNotFoundException("User with email " + login + " was not found in the database"));
}
String lowercaseLogin = login.toLowerCase(Locale.ENGLISH);
return userRepository.findOneWithAuthoritiesByLogin(lowercaseLogin)
- .map(user -> createSpringSecurityUser(lowercaseLogin, user))
- .orElseThrow(() -> new UsernameNotFoundException("User " + lowercaseLogin + " was not found in the database"));
+ .map(user -> createSpringSecurityUser(lowercaseLogin, user))
+ .orElseThrow(() -> new UsernameNotFoundException("User " + lowercaseLogin + " was not found in the database"));
}
@@ -52,11 +55,13 @@ public class DomainUserDetailsService implements UserDetailsService {
if (!user.getActivated()) {
throw new UserNotActivatedException("User " + lowercaseLogin + " was not activated");
}
- List grantedAuthorities = user.getAuthorities().stream()
- .map(authority -> new SimpleGrantedAuthority(authority.getName()))
- .collect(Collectors.toList());
- return new org.springframework.security.core.userdetails.User(user.getLogin(),
- user.getPassword(),
- grantedAuthorities);
+ List grantedAuthorities = user.getAuthorities()
+ .stream()
+ .map(authority -> new SimpleGrantedAuthority(authority.getName()))
+ .collect(Collectors.toList());
+ return new org.springframework.security.core.userdetails.User(
+ user.getLogin(),
+ user.getPassword(),
+ grantedAuthorities);
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/security/SecurityUtils.java b/src/main/java/org/hostsharing/hsadminng/security/SecurityUtils.java
index 93a40dd8..0145b2f6 100644
--- a/src/main/java/org/hostsharing/hsadminng/security/SecurityUtils.java
+++ b/src/main/java/org/hostsharing/hsadminng/security/SecurityUtils.java
@@ -1,6 +1,8 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.security;
import org.hostsharing.hsadminng.service.accessfilter.Role;
+
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.security.core.context.SecurityContext;
@@ -31,15 +33,15 @@ public final class SecurityUtils {
public static Optional getCurrentUserLogin() {
SecurityContext securityContext = SecurityContextHolder.getContext();
return Optional.ofNullable(securityContext.getAuthentication())
- .map(authentication -> {
- if (authentication.getPrincipal() instanceof UserDetails) {
- UserDetails springSecurityUser = (UserDetails) authentication.getPrincipal();
- return springSecurityUser.getUsername();
- } else if (authentication.getPrincipal() instanceof String) {
- return (String) authentication.getPrincipal();
- }
- return null;
- });
+ .map(authentication -> {
+ if (authentication.getPrincipal() instanceof UserDetails) {
+ UserDetails springSecurityUser = (UserDetails) authentication.getPrincipal();
+ return springSecurityUser.getUsername();
+ } else if (authentication.getPrincipal() instanceof String) {
+ return (String) authentication.getPrincipal();
+ }
+ return null;
+ });
}
/**
@@ -50,8 +52,8 @@ public final class SecurityUtils {
public static Optional getCurrentUserJWT() {
SecurityContext securityContext = SecurityContextHolder.getContext();
return Optional.ofNullable(securityContext.getAuthentication())
- .filter(authentication -> authentication.getCredentials() instanceof String)
- .map(authentication -> (String) authentication.getCredentials());
+ .filter(authentication -> authentication.getCredentials() instanceof String)
+ .map(authentication -> (String) authentication.getCredentials());
}
/**
@@ -62,9 +64,13 @@ public final class SecurityUtils {
public static boolean isAuthenticated() {
SecurityContext securityContext = SecurityContextHolder.getContext();
return Optional.ofNullable(securityContext.getAuthentication())
- .map(authentication -> authentication.getAuthorities().stream()
- .noneMatch(grantedAuthority -> grantedAuthority.getAuthority().equals(AuthoritiesConstants.ANONYMOUS)))
- .orElse(false);
+ .map(
+ authentication -> authentication.getAuthorities()
+ .stream()
+ .noneMatch(
+ grantedAuthority -> grantedAuthority.getAuthority()
+ .equals(AuthoritiesConstants.ANONYMOUS)))
+ .orElse(false);
}
/**
@@ -78,24 +84,27 @@ public final class SecurityUtils {
public static boolean isCurrentUserInRole(String authority) {
SecurityContext securityContext = SecurityContextHolder.getContext();
return Optional.ofNullable(securityContext.getAuthentication())
- .map(authentication -> authentication.getAuthorities().stream()
- .anyMatch(grantedAuthority -> grantedAuthority.getAuthority().equals(authority)))
- .orElse(false);
+ .map(
+ authentication -> authentication.getAuthorities()
+ .stream()
+ .anyMatch(grantedAuthority -> grantedAuthority.getAuthority().equals(authority)))
+ .orElse(false);
}
public static Role getLoginUserRoleFor(final Class> onDtoClass, final Long onId) {
- final Role highestRole = userRoleAssignments.stream().
- map(ura ->
- matches(onDtoClass, onId, ura)
- ? ura.role
- : Role.ANYBODY).
- reduce(Role.ANYBODY, (r1, r2) -> r1.covers(r2) ? r1 : r2);
+ final Role highestRole = userRoleAssignments.stream()
+ .map(
+ ura -> matches(onDtoClass, onId, ura)
+ ? ura.role
+ : Role.ANYBODY)
+ .reduce(Role.ANYBODY, (r1, r2) -> r1.covers(r2) ? r1 : r2);
log.debug("getLoginUserRoleFor({}, {}) returned {}", onDtoClass, onId, highestRole);
return highestRole;
}
private static boolean matches(Class> onDtoClass, Long onId, UserRoleAssignment ura) {
- final boolean matches = (ura.onClass == null || onDtoClass == ura.onClass) && (ura.onId == null || ura.onId.equals(onId));
+ final boolean matches = (ura.onClass == null || onDtoClass == ura.onClass)
+ && (ura.onId == null || ura.onId.equals(onId));
return matches;
}
@@ -111,6 +120,7 @@ public final class SecurityUtils {
}
private static class UserRoleAssignment {
+
final Class> onClass;
final Long onId;
final Role role;
diff --git a/src/main/java/org/hostsharing/hsadminng/security/SpringSecurityAuditorAware.java b/src/main/java/org/hostsharing/hsadminng/security/SpringSecurityAuditorAware.java
index 8813f4b8..f187f01e 100644
--- a/src/main/java/org/hostsharing/hsadminng/security/SpringSecurityAuditorAware.java
+++ b/src/main/java/org/hostsharing/hsadminng/security/SpringSecurityAuditorAware.java
@@ -1,12 +1,13 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.security;
import org.hostsharing.hsadminng.config.Constants;
-import java.util.Optional;
-
import org.springframework.data.domain.AuditorAware;
import org.springframework.stereotype.Component;
+import java.util.Optional;
+
/**
* Implementation of AuditorAware based on Spring Security.
*/
diff --git a/src/main/java/org/hostsharing/hsadminng/security/UserNotActivatedException.java b/src/main/java/org/hostsharing/hsadminng/security/UserNotActivatedException.java
index e919e858..0a94d4e3 100644
--- a/src/main/java/org/hostsharing/hsadminng/security/UserNotActivatedException.java
+++ b/src/main/java/org/hostsharing/hsadminng/security/UserNotActivatedException.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.security;
import org.springframework.security.core.AuthenticationException;
diff --git a/src/main/java/org/hostsharing/hsadminng/security/jwt/JWTConfigurer.java b/src/main/java/org/hostsharing/hsadminng/security/jwt/JWTConfigurer.java
index 166bbfbf..5e4af8c8 100644
--- a/src/main/java/org/hostsharing/hsadminng/security/jwt/JWTConfigurer.java
+++ b/src/main/java/org/hostsharing/hsadminng/security/jwt/JWTConfigurer.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.security.jwt;
import org.springframework.security.config.annotation.SecurityConfigurerAdapter;
diff --git a/src/main/java/org/hostsharing/hsadminng/security/jwt/JWTFilter.java b/src/main/java/org/hostsharing/hsadminng/security/jwt/JWTFilter.java
index 97ea2851..1eed81b8 100644
--- a/src/main/java/org/hostsharing/hsadminng/security/jwt/JWTFilter.java
+++ b/src/main/java/org/hostsharing/hsadminng/security/jwt/JWTFilter.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.security.jwt;
import org.springframework.security.core.Authentication;
@@ -5,12 +6,13 @@ import org.springframework.security.core.context.SecurityContextHolder;
import org.springframework.util.StringUtils;
import org.springframework.web.filter.GenericFilterBean;
+import java.io.IOException;
+
import javax.servlet.FilterChain;
import javax.servlet.ServletException;
import javax.servlet.ServletRequest;
import javax.servlet.ServletResponse;
import javax.servlet.http.HttpServletRequest;
-import java.io.IOException;
/**
* Filters incoming requests and installs a Spring Security principal if a header corresponding to a valid user is
@@ -28,7 +30,7 @@ public class JWTFilter extends GenericFilterBean {
@Override
public void doFilter(ServletRequest servletRequest, ServletResponse servletResponse, FilterChain filterChain)
- throws IOException, ServletException {
+ throws IOException, ServletException {
HttpServletRequest httpServletRequest = (HttpServletRequest) servletRequest;
String jwt = resolveToken(httpServletRequest);
if (StringUtils.hasText(jwt) && this.tokenProvider.validateToken(jwt)) {
@@ -38,7 +40,7 @@ public class JWTFilter extends GenericFilterBean {
filterChain.doFilter(servletRequest, servletResponse);
}
- private String resolveToken(HttpServletRequest request){
+ private String resolveToken(HttpServletRequest request) {
String bearerToken = request.getHeader(AUTHORIZATION_HEADER);
if (StringUtils.hasText(bearerToken) && bearerToken.startsWith("Bearer ")) {
return bearerToken.substring(7);
diff --git a/src/main/java/org/hostsharing/hsadminng/security/jwt/TokenProvider.java b/src/main/java/org/hostsharing/hsadminng/security/jwt/TokenProvider.java
index 71969a7d..ff315141 100644
--- a/src/main/java/org/hostsharing/hsadminng/security/jwt/TokenProvider.java
+++ b/src/main/java/org/hostsharing/hsadminng/security/jwt/TokenProvider.java
@@ -1,10 +1,10 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.security.jwt;
-import java.nio.charset.StandardCharsets;
-import java.security.Key;
-import java.util.*;
-import java.util.stream.Collectors;
-import javax.annotation.PostConstruct;
+import io.github.jhipster.config.JHipsterProperties;
+import io.jsonwebtoken.*;
+import io.jsonwebtoken.io.Decoders;
+import io.jsonwebtoken.security.Keys;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
@@ -16,10 +16,12 @@ import org.springframework.security.core.userdetails.User;
import org.springframework.stereotype.Component;
import org.springframework.util.StringUtils;
-import io.github.jhipster.config.JHipsterProperties;
-import io.jsonwebtoken.*;
-import io.jsonwebtoken.io.Decoders;
-import io.jsonwebtoken.security.Keys;
+import java.nio.charset.StandardCharsets;
+import java.security.Key;
+import java.util.*;
+import java.util.stream.Collectors;
+
+import javax.annotation.PostConstruct;
@Component
public class TokenProvider {
@@ -45,25 +47,28 @@ public class TokenProvider {
byte[] keyBytes;
String secret = jHipsterProperties.getSecurity().getAuthentication().getJwt().getSecret();
if (!StringUtils.isEmpty(secret)) {
- log.warn("Warning: the JWT key used is not Base64-encoded. " +
- "We recommend using the `jhipster.security.authentication.jwt.base64-secret` key for optimum security.");
+ log.warn(
+ "Warning: the JWT key used is not Base64-encoded. " +
+ "We recommend using the `jhipster.security.authentication.jwt.base64-secret` key for optimum security.");
keyBytes = secret.getBytes(StandardCharsets.UTF_8);
} else {
log.debug("Using a Base64-encoded JWT secret key");
keyBytes = Decoders.BASE64.decode(jHipsterProperties.getSecurity().getAuthentication().getJwt().getBase64Secret());
}
this.key = Keys.hmacShaKeyFor(keyBytes);
- this.tokenValidityInMilliseconds =
- 1000 * jHipsterProperties.getSecurity().getAuthentication().getJwt().getTokenValidityInSeconds();
- this.tokenValidityInMillisecondsForRememberMe =
- 1000 * jHipsterProperties.getSecurity().getAuthentication().getJwt()
+ this.tokenValidityInMilliseconds = 1000
+ * jHipsterProperties.getSecurity().getAuthentication().getJwt().getTokenValidityInSeconds();
+ this.tokenValidityInMillisecondsForRememberMe = 1000 * jHipsterProperties.getSecurity()
+ .getAuthentication()
+ .getJwt()
.getTokenValidityInSecondsForRememberMe();
}
public String createToken(Authentication authentication, boolean rememberMe) {
- String authorities = authentication.getAuthorities().stream()
- .map(GrantedAuthority::getAuthority)
- .collect(Collectors.joining(","));
+ String authorities = authentication.getAuthorities()
+ .stream()
+ .map(GrantedAuthority::getAuthority)
+ .collect(Collectors.joining(","));
long now = (new Date()).getTime();
Date validity;
@@ -74,21 +79,20 @@ public class TokenProvider {
}
return Jwts.builder()
- .setSubject(authentication.getName())
- .claim(AUTHORITIES_KEY, authorities)
- .signWith(key, SignatureAlgorithm.HS512)
- .setExpiration(validity)
- .compact();
+ .setSubject(authentication.getName())
+ .claim(AUTHORITIES_KEY, authorities)
+ .signWith(key, SignatureAlgorithm.HS512)
+ .setExpiration(validity)
+ .compact();
}
public Authentication getAuthentication(String token) {
Claims claims = Jwts.parser()
- .setSigningKey(key)
- .parseClaimsJws(token)
- .getBody();
+ .setSigningKey(key)
+ .parseClaimsJws(token)
+ .getBody();
- Collection extends GrantedAuthority> authorities =
- Arrays.stream(claims.get(AUTHORITIES_KEY).toString().split(","))
+ Collection extends GrantedAuthority> authorities = Arrays.stream(claims.get(AUTHORITIES_KEY).toString().split(","))
.map(SimpleGrantedAuthority::new)
.collect(Collectors.toList());
diff --git a/src/main/java/org/hostsharing/hsadminng/service/AssetQueryService.java b/src/main/java/org/hostsharing/hsadminng/service/AssetQueryService.java
index 82137a84..3e869f24 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/AssetQueryService.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/AssetQueryService.java
@@ -1,8 +1,14 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
-import java.util.List;
+import org.hostsharing.hsadminng.domain.*;
+import org.hostsharing.hsadminng.domain.Asset;
+import org.hostsharing.hsadminng.repository.AssetRepository;
+import org.hostsharing.hsadminng.service.dto.AssetCriteria;
+import org.hostsharing.hsadminng.service.dto.AssetDTO;
+import org.hostsharing.hsadminng.service.mapper.AssetMapper;
-import javax.persistence.criteria.JoinType;
+import io.github.jhipster.service.QueryService;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
@@ -12,14 +18,9 @@ import org.springframework.data.jpa.domain.Specification;
import org.springframework.stereotype.Service;
import org.springframework.transaction.annotation.Transactional;
-import io.github.jhipster.service.QueryService;
+import java.util.List;
-import org.hostsharing.hsadminng.domain.Asset;
-import org.hostsharing.hsadminng.domain.*; // for static metamodels
-import org.hostsharing.hsadminng.repository.AssetRepository;
-import org.hostsharing.hsadminng.service.dto.AssetCriteria;
-import org.hostsharing.hsadminng.service.dto.AssetDTO;
-import org.hostsharing.hsadminng.service.mapper.AssetMapper;
+import javax.persistence.criteria.JoinType;
/**
* Service for executing complex queries for Asset entities in the database.
@@ -44,6 +45,7 @@ public class AssetQueryService extends QueryService {
/**
* Return a {@link List} of {@link AssetDTO} which matches the criteria from the database
+ *
* @param criteria The object which holds all the filters, which the entities should match.
* @return the matching entities.
*/
@@ -56,6 +58,7 @@ public class AssetQueryService extends QueryService {
/**
* Return a {@link Page} of {@link AssetDTO} which matches the criteria from the database
+ *
* @param criteria The object which holds all the filters, which the entities should match.
* @param page The page, which should be returned.
* @return the matching entities.
@@ -65,11 +68,12 @@ public class AssetQueryService extends QueryService {
log.debug("find by criteria : {}, page: {}", criteria, page);
final Specification specification = createSpecification(criteria);
return assetRepository.findAll(specification, page)
- .map(assetMapper::toDto);
+ .map(assetMapper::toDto);
}
/**
* Return the number of matching entities in the database
+ *
* @param criteria The object which holds all the filters, which the entities should match.
* @return the number of matching entities.
*/
@@ -105,8 +109,10 @@ public class AssetQueryService extends QueryService {
specification = specification.and(buildStringSpecification(criteria.getRemark(), Asset_.remark));
}
if (criteria.getMembershipId() != null) {
- specification = specification.and(buildSpecification(criteria.getMembershipId(),
- root -> root.join(Asset_.membership, JoinType.LEFT).get(Membership_.id)));
+ specification = specification.and(
+ buildSpecification(
+ criteria.getMembershipId(),
+ root -> root.join(Asset_.membership, JoinType.LEFT).get(Membership_.id)));
}
}
return specification;
diff --git a/src/main/java/org/hostsharing/hsadminng/service/AssetService.java b/src/main/java/org/hostsharing/hsadminng/service/AssetService.java
index dd60f120..f7b71120 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/AssetService.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/AssetService.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
import org.hostsharing.hsadminng.domain.Asset;
@@ -5,6 +6,7 @@ import org.hostsharing.hsadminng.repository.AssetRepository;
import org.hostsharing.hsadminng.service.dto.AssetDTO;
import org.hostsharing.hsadminng.service.mapper.AssetMapper;
import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
+
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.data.domain.Page;
@@ -12,9 +14,10 @@ import org.springframework.data.domain.Pageable;
import org.springframework.stereotype.Service;
import org.springframework.transaction.annotation.Transactional;
-import javax.persistence.EntityManager;
import java.util.Optional;
+import javax.persistence.EntityManager;
+
/**
* Service Implementation for managing Asset.
*/
@@ -31,7 +34,11 @@ public class AssetService implements IdToDtoResolver {
private final AssetMapper assetMapper;
private final AssetValidator assetValidator;
- public AssetService(final EntityManager em, final AssetRepository assetRepository, final AssetMapper assetMapper, final AssetValidator assetValidator) {
+ public AssetService(
+ final EntityManager em,
+ final AssetRepository assetRepository,
+ final AssetMapper assetMapper,
+ final AssetValidator assetValidator) {
this.em = em;
this.assetRepository = assetRepository;
this.assetMapper = assetMapper;
@@ -64,10 +71,9 @@ public class AssetService implements IdToDtoResolver {
public Page findAll(Pageable pageable) {
log.debug("Request to get all Assets");
return assetRepository.findAll(pageable)
- .map(assetMapper::toDto);
+ .map(assetMapper::toDto);
}
-
/**
* Get one asset by id.
*
@@ -78,7 +84,7 @@ public class AssetService implements IdToDtoResolver {
public Optional findOne(Long id) {
log.debug("Request to get Asset : {}", id);
return assetRepository.findById(id)
- .map(assetMapper::toDto);
+ .map(assetMapper::toDto);
}
/**
diff --git a/src/main/java/org/hostsharing/hsadminng/service/AssetValidator.java b/src/main/java/org/hostsharing/hsadminng/service/AssetValidator.java
index 01da9875..1d0f9620 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/AssetValidator.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/AssetValidator.java
@@ -1,42 +1,69 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
import org.hostsharing.hsadminng.domain.Asset;
import org.hostsharing.hsadminng.domain.enumeration.AssetAction;
import org.hostsharing.hsadminng.service.dto.AssetDTO;
import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
+
import org.springframework.stereotype.Service;
import java.math.BigDecimal;
@Service
public class AssetValidator {
+
public void validate(final AssetDTO assetDTO) {
if (assetDTO.getId() != null) {
- throw new BadRequestAlertException("Asset transactions are immutable", Asset.ENTITY_NAME, "assetTransactionImmutable");
+ throw new BadRequestAlertException(
+ "Asset transactions are immutable",
+ Asset.ENTITY_NAME,
+ "assetTransactionImmutable");
}
if (assetDTO.getDocumentDate().isAfter(assetDTO.getValueDate())) {
- throw new BadRequestAlertException("Document date may not be after value date", Asset.ENTITY_NAME, "documentDateMayNotBeAfterValueDate");
+ throw new BadRequestAlertException(
+ "Document date may not be after value date",
+ Asset.ENTITY_NAME,
+ "documentDateMayNotBeAfterValueDate");
}
if ((assetDTO.getAction() == AssetAction.PAYMENT) && (assetDTO.getAmount().compareTo(BigDecimal.valueOf(0)) <= 0)) {
- throw new BadRequestAlertException("Asset payments require a positive amount", Asset.ENTITY_NAME, "assetPaymentsPositiveAmount");
+ throw new BadRequestAlertException(
+ "Asset payments require a positive amount",
+ Asset.ENTITY_NAME,
+ "assetPaymentsPositiveAmount");
}
if ((assetDTO.getAction() == AssetAction.ADOPTION) && (assetDTO.getAmount().compareTo(BigDecimal.valueOf(0)) <= 0)) {
- throw new BadRequestAlertException("Asset adoptions require a positive amount", Asset.ENTITY_NAME, "assetAdoptionsPositiveAmount");
+ throw new BadRequestAlertException(
+ "Asset adoptions require a positive amount",
+ Asset.ENTITY_NAME,
+ "assetAdoptionsPositiveAmount");
}
if ((assetDTO.getAction() == AssetAction.PAYBACK) && (assetDTO.getAmount().compareTo(BigDecimal.valueOf(0)) >= 0)) {
- throw new BadRequestAlertException("Asset paybacks require a negative amount", Asset.ENTITY_NAME, "assetPaybacksNegativeAmount");
+ throw new BadRequestAlertException(
+ "Asset paybacks require a negative amount",
+ Asset.ENTITY_NAME,
+ "assetPaybacksNegativeAmount");
}
if ((assetDTO.getAction() == AssetAction.HANDOVER) && (assetDTO.getAmount().compareTo(BigDecimal.valueOf(0)) >= 0)) {
- throw new BadRequestAlertException("Asset handovers require a negative amount", Asset.ENTITY_NAME, "assetHandoversNegativeAmount");
+ throw new BadRequestAlertException(
+ "Asset handovers require a negative amount",
+ Asset.ENTITY_NAME,
+ "assetHandoversNegativeAmount");
}
if ((assetDTO.getAction() == AssetAction.LOSS) && (assetDTO.getAmount().compareTo(BigDecimal.valueOf(0)) >= 0)) {
- throw new BadRequestAlertException("Asset losses require a negative amount", Asset.ENTITY_NAME, "assetLossesNegativeAmount");
+ throw new BadRequestAlertException(
+ "Asset losses require a negative amount",
+ Asset.ENTITY_NAME,
+ "assetLossesNegativeAmount");
}
if ((assetDTO.getAction() == AssetAction.CLEARING) && (assetDTO.getAmount().compareTo(BigDecimal.valueOf(0)) >= 0)) {
- throw new BadRequestAlertException("Asset clearings require a negative amount", Asset.ENTITY_NAME, "assetClearingsNegativeAmount");
+ throw new BadRequestAlertException(
+ "Asset clearings require a negative amount",
+ Asset.ENTITY_NAME,
+ "assetClearingsNegativeAmount");
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/service/AuditEventService.java b/src/main/java/org/hostsharing/hsadminng/service/AuditEventService.java
index bf19c3c1..b41fb9c2 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/AuditEventService.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/AuditEventService.java
@@ -1,7 +1,9 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
import org.hostsharing.hsadminng.config.audit.AuditEventConverter;
import org.hostsharing.hsadminng.repository.PersistenceAuditEventRepository;
+
import org.springframework.boot.actuate.audit.AuditEvent;
import org.springframework.data.domain.Page;
import org.springframework.data.domain.Pageable;
@@ -25,8 +27,8 @@ public class AuditEventService {
private final AuditEventConverter auditEventConverter;
public AuditEventService(
- PersistenceAuditEventRepository persistenceAuditEventRepository,
- AuditEventConverter auditEventConverter) {
+ PersistenceAuditEventRepository persistenceAuditEventRepository,
+ AuditEventConverter auditEventConverter) {
this.persistenceAuditEventRepository = persistenceAuditEventRepository;
this.auditEventConverter = auditEventConverter;
@@ -34,18 +36,18 @@ public class AuditEventService {
public Page findAll(Pageable pageable) {
return persistenceAuditEventRepository.findAll(pageable)
- .map(auditEventConverter::convertToAuditEvent);
+ .map(auditEventConverter::convertToAuditEvent);
}
public Page findByDates(Instant fromDate, Instant toDate, Pageable pageable) {
return persistenceAuditEventRepository.findAllByAuditEventDateBetween(fromDate, toDate, pageable)
- .map(auditEventConverter::convertToAuditEvent);
+ .map(auditEventConverter::convertToAuditEvent);
}
public Optional find(Long id) {
return Optional.ofNullable(persistenceAuditEventRepository.findById(id))
- .filter(Optional::isPresent)
- .map(Optional::get)
- .map(auditEventConverter::convertToAuditEvent);
+ .filter(Optional::isPresent)
+ .map(Optional::get)
+ .map(auditEventConverter::convertToAuditEvent);
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/service/CustomerQueryService.java b/src/main/java/org/hostsharing/hsadminng/service/CustomerQueryService.java
index 718575f0..b3352819 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/CustomerQueryService.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/CustomerQueryService.java
@@ -1,6 +1,6 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
-import io.github.jhipster.service.QueryService;
import org.hostsharing.hsadminng.domain.Customer;
import org.hostsharing.hsadminng.domain.Customer_;
import org.hostsharing.hsadminng.domain.Membership_;
@@ -9,6 +9,9 @@ import org.hostsharing.hsadminng.repository.CustomerRepository;
import org.hostsharing.hsadminng.service.dto.CustomerCriteria;
import org.hostsharing.hsadminng.service.dto.CustomerDTO;
import org.hostsharing.hsadminng.service.mapper.CustomerMapper;
+
+import io.github.jhipster.service.QueryService;
+
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.data.domain.Page;
@@ -17,9 +20,10 @@ import org.springframework.data.jpa.domain.Specification;
import org.springframework.stereotype.Service;
import org.springframework.transaction.annotation.Transactional;
-import javax.persistence.criteria.JoinType;
import java.util.List;
+import javax.persistence.criteria.JoinType;
+
/**
* Service for executing complex queries for Customer entities in the database.
* The main input is a {@link CustomerCriteria} which gets converted to {@link Specification},
@@ -43,6 +47,7 @@ public class CustomerQueryService extends QueryService {
/**
* Return a {@link List} of {@link CustomerDTO} which matches the criteria from the database
+ *
* @param criteria The object which holds all the filters, which the entities should match.
* @return the matching entities.
*/
@@ -55,6 +60,7 @@ public class CustomerQueryService extends QueryService {
/**
* Return a {@link Page} of {@link CustomerDTO} which matches the criteria from the database
+ *
* @param criteria The object which holds all the filters, which the entities should match.
* @param page The page, which should be returned.
* @return the matching entities.
@@ -64,11 +70,12 @@ public class CustomerQueryService extends QueryService {
log.debug("find by criteria : {}, page: {}", criteria, page);
final Specification specification = createSpecification(criteria);
return customerRepository.findAll(specification, page)
- .map(customerMapper::toDto);
+ .map(customerMapper::toDto);
}
/**
* Return the number of matching entities in the database
+ *
* @param criteria The object which holds all the filters, which the entities should match.
* @return the number of matching entities.
*/
@@ -107,10 +114,12 @@ public class CustomerQueryService extends QueryService {
specification = specification.and(buildStringSpecification(criteria.getBirthPlace(), Customer_.birthPlace));
}
if (criteria.getRegistrationCourt() != null) {
- specification = specification.and(buildStringSpecification(criteria.getRegistrationCourt(), Customer_.registrationCourt));
+ specification = specification
+ .and(buildStringSpecification(criteria.getRegistrationCourt(), Customer_.registrationCourt));
}
if (criteria.getRegistrationNumber() != null) {
- specification = specification.and(buildStringSpecification(criteria.getRegistrationNumber(), Customer_.registrationNumber));
+ specification = specification
+ .and(buildStringSpecification(criteria.getRegistrationNumber(), Customer_.registrationNumber));
}
if (criteria.getVatRegion() != null) {
specification = specification.and(buildSpecification(criteria.getVatRegion(), Customer_.vatRegion));
@@ -119,27 +128,35 @@ public class CustomerQueryService extends QueryService {
specification = specification.and(buildStringSpecification(criteria.getVatNumber(), Customer_.vatNumber));
}
if (criteria.getContractualSalutation() != null) {
- specification = specification.and(buildStringSpecification(criteria.getContractualSalutation(), Customer_.contractualSalutation));
+ specification = specification
+ .and(buildStringSpecification(criteria.getContractualSalutation(), Customer_.contractualSalutation));
}
if (criteria.getContractualAddress() != null) {
- specification = specification.and(buildStringSpecification(criteria.getContractualAddress(), Customer_.contractualAddress));
+ specification = specification
+ .and(buildStringSpecification(criteria.getContractualAddress(), Customer_.contractualAddress));
}
if (criteria.getBillingSalutation() != null) {
- specification = specification.and(buildStringSpecification(criteria.getBillingSalutation(), Customer_.billingSalutation));
+ specification = specification
+ .and(buildStringSpecification(criteria.getBillingSalutation(), Customer_.billingSalutation));
}
if (criteria.getBillingAddress() != null) {
- specification = specification.and(buildStringSpecification(criteria.getBillingAddress(), Customer_.billingAddress));
+ specification = specification
+ .and(buildStringSpecification(criteria.getBillingAddress(), Customer_.billingAddress));
}
if (criteria.getRemark() != null) {
specification = specification.and(buildStringSpecification(criteria.getRemark(), Customer_.remark));
}
if (criteria.getMembershipId() != null) {
- specification = specification.and(buildSpecification(criteria.getMembershipId(),
- root -> root.join(Customer_.memberships, JoinType.LEFT).get(Membership_.id)));
+ specification = specification.and(
+ buildSpecification(
+ criteria.getMembershipId(),
+ root -> root.join(Customer_.memberships, JoinType.LEFT).get(Membership_.id)));
}
if (criteria.getSepamandateId() != null) {
- specification = specification.and(buildSpecification(criteria.getSepamandateId(),
- root -> root.join(Customer_.sepamandates, JoinType.LEFT).get(SepaMandate_.id)));
+ specification = specification.and(
+ buildSpecification(
+ criteria.getSepamandateId(),
+ root -> root.join(Customer_.sepamandates, JoinType.LEFT).get(SepaMandate_.id)));
}
}
return specification;
diff --git a/src/main/java/org/hostsharing/hsadminng/service/CustomerService.java b/src/main/java/org/hostsharing/hsadminng/service/CustomerService.java
index 06d8d978..48ffbc79 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/CustomerService.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/CustomerService.java
@@ -1,9 +1,11 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
import org.hostsharing.hsadminng.domain.Customer;
import org.hostsharing.hsadminng.repository.CustomerRepository;
import org.hostsharing.hsadminng.service.dto.CustomerDTO;
import org.hostsharing.hsadminng.service.mapper.CustomerMapper;
+
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.data.domain.Page;
@@ -54,10 +56,9 @@ public class CustomerService implements IdToDtoResolver {
public Page findAll(Pageable pageable) {
log.debug("Request to get all Customers");
return customerRepository.findAll(pageable)
- .map(customerMapper::toDto);
+ .map(customerMapper::toDto);
}
-
/**
* Get one customer by id.
*
@@ -68,7 +69,7 @@ public class CustomerService implements IdToDtoResolver {
public Optional findOne(Long id) {
log.debug("Request to get Customer : {}", id);
return customerRepository.findById(id)
- .map(customerMapper::toDto);
+ .map(customerMapper::toDto);
}
/**
diff --git a/src/main/java/org/hostsharing/hsadminng/service/IdToDtoResolver.java b/src/main/java/org/hostsharing/hsadminng/service/IdToDtoResolver.java
index 32851fb6..3b19c2ef 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/IdToDtoResolver.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/IdToDtoResolver.java
@@ -1,7 +1,9 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
import java.util.Optional;
public interface IdToDtoResolver {
+
Optional findOne(Long id);
}
diff --git a/src/main/java/org/hostsharing/hsadminng/service/MailService.java b/src/main/java/org/hostsharing/hsadminng/service/MailService.java
index b1e5688c..14575309 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/MailService.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/MailService.java
@@ -1,13 +1,10 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
import org.hostsharing.hsadminng.domain.User;
import io.github.jhipster.config.JHipsterProperties;
-import java.nio.charset.StandardCharsets;
-import java.util.Locale;
-import javax.mail.internet.MimeMessage;
-
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.context.MessageSource;
@@ -18,6 +15,11 @@ import org.springframework.stereotype.Service;
import org.thymeleaf.context.Context;
import org.thymeleaf.spring5.SpringTemplateEngine;
+import java.nio.charset.StandardCharsets;
+import java.util.Locale;
+
+import javax.mail.internet.MimeMessage;
+
/**
* Service for sending emails.
*
@@ -40,8 +42,11 @@ public class MailService {
private final SpringTemplateEngine templateEngine;
- public MailService(JHipsterProperties jHipsterProperties, JavaMailSender javaMailSender,
- MessageSource messageSource, SpringTemplateEngine templateEngine) {
+ public MailService(
+ JHipsterProperties jHipsterProperties,
+ JavaMailSender javaMailSender,
+ MessageSource messageSource,
+ SpringTemplateEngine templateEngine) {
this.jHipsterProperties = jHipsterProperties;
this.javaMailSender = javaMailSender;
@@ -51,8 +56,13 @@ public class MailService {
@Async
public void sendEmail(String to, String subject, String content, boolean isMultipart, boolean isHtml) {
- log.debug("Send email[multipart '{}' and html '{}'] to '{}' with subject '{}' and content={}",
- isMultipart, isHtml, to, subject, content);
+ log.debug(
+ "Send email[multipart '{}' and html '{}'] to '{}' with subject '{}' and content={}",
+ isMultipart,
+ isHtml,
+ to,
+ subject,
+ content);
// Prepare message using a Spring helper
MimeMessage mimeMessage = javaMailSender.createMimeMessage();
diff --git a/src/main/java/org/hostsharing/hsadminng/service/MembershipQueryService.java b/src/main/java/org/hostsharing/hsadminng/service/MembershipQueryService.java
index adb07608..0c42ffd2 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/MembershipQueryService.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/MembershipQueryService.java
@@ -1,11 +1,14 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
-import io.github.jhipster.service.QueryService;
import org.hostsharing.hsadminng.domain.*;
import org.hostsharing.hsadminng.repository.MembershipRepository;
import org.hostsharing.hsadminng.service.dto.MembershipCriteria;
import org.hostsharing.hsadminng.service.dto.MembershipDTO;
import org.hostsharing.hsadminng.service.mapper.MembershipMapper;
+
+import io.github.jhipster.service.QueryService;
+
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.data.domain.Page;
@@ -14,9 +17,10 @@ import org.springframework.data.jpa.domain.Specification;
import org.springframework.stereotype.Service;
import org.springframework.transaction.annotation.Transactional;
-import javax.persistence.criteria.JoinType;
import java.util.List;
+import javax.persistence.criteria.JoinType;
+
/**
* Service for executing complex queries for Membership entities in the database.
* The main input is a {@link MembershipCriteria} which gets converted to {@link Specification},
@@ -40,6 +44,7 @@ public class MembershipQueryService extends QueryService {
/**
* Return a {@link List} of {@link MembershipDTO} which matches the criteria from the database
+ *
* @param criteria The object which holds all the filters, which the entities should match.
* @return the matching entities.
*/
@@ -52,6 +57,7 @@ public class MembershipQueryService extends QueryService {
/**
* Return a {@link Page} of {@link MembershipDTO} which matches the criteria from the database
+ *
* @param criteria The object which holds all the filters, which the entities should match.
* @param page The page, which should be returned.
* @return the matching entities.
@@ -61,11 +67,12 @@ public class MembershipQueryService extends QueryService {
log.debug("find by criteria : {}, page: {}", criteria, page);
final Specification specification = createSpecification(criteria);
return membershipRepository.findAll(specification, page)
- .map(membershipMapper::toDto);
+ .map(membershipMapper::toDto);
}
/**
* Return the number of matching entities in the database
+ *
* @param criteria The object which holds all the filters, which the entities should match.
* @return the number of matching entities.
*/
@@ -86,31 +93,41 @@ public class MembershipQueryService extends QueryService {
specification = specification.and(buildSpecification(criteria.getId(), Membership_.id));
}
if (criteria.getAdmissionDocumentDate() != null) {
- specification = specification.and(buildRangeSpecification(criteria.getAdmissionDocumentDate(), Membership_.admissionDocumentDate));
+ specification = specification
+ .and(buildRangeSpecification(criteria.getAdmissionDocumentDate(), Membership_.admissionDocumentDate));
}
if (criteria.getCancellationDocumentDate() != null) {
- specification = specification.and(buildRangeSpecification(criteria.getCancellationDocumentDate(), Membership_.cancellationDocumentDate));
+ specification = specification.and(
+ buildRangeSpecification(criteria.getCancellationDocumentDate(), Membership_.cancellationDocumentDate));
}
if (criteria.getMemberFromDate() != null) {
- specification = specification.and(buildRangeSpecification(criteria.getMemberFromDate(), Membership_.memberFromDate));
+ specification = specification
+ .and(buildRangeSpecification(criteria.getMemberFromDate(), Membership_.memberFromDate));
}
if (criteria.getMemberUntilDate() != null) {
- specification = specification.and(buildRangeSpecification(criteria.getMemberUntilDate(), Membership_.memberUntilDate));
+ specification = specification
+ .and(buildRangeSpecification(criteria.getMemberUntilDate(), Membership_.memberUntilDate));
}
if (criteria.getRemark() != null) {
specification = specification.and(buildStringSpecification(criteria.getRemark(), Membership_.remark));
}
if (criteria.getShareId() != null) {
- specification = specification.and(buildSpecification(criteria.getShareId(),
- root -> root.join(Membership_.shares, JoinType.LEFT).get(Share_.id)));
+ specification = specification.and(
+ buildSpecification(
+ criteria.getShareId(),
+ root -> root.join(Membership_.shares, JoinType.LEFT).get(Share_.id)));
}
if (criteria.getAssetId() != null) {
- specification = specification.and(buildSpecification(criteria.getAssetId(),
- root -> root.join(Membership_.assets, JoinType.LEFT).get(Asset_.id)));
+ specification = specification.and(
+ buildSpecification(
+ criteria.getAssetId(),
+ root -> root.join(Membership_.assets, JoinType.LEFT).get(Asset_.id)));
}
if (criteria.getCustomerId() != null) {
- specification = specification.and(buildSpecification(criteria.getCustomerId(),
- root -> root.join(Membership_.customer, JoinType.LEFT).get(Customer_.id)));
+ specification = specification.and(
+ buildSpecification(
+ criteria.getCustomerId(),
+ root -> root.join(Membership_.customer, JoinType.LEFT).get(Customer_.id)));
}
}
return specification;
diff --git a/src/main/java/org/hostsharing/hsadminng/service/MembershipService.java b/src/main/java/org/hostsharing/hsadminng/service/MembershipService.java
index 82e365d2..53f7a923 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/MembershipService.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/MembershipService.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
import org.hostsharing.hsadminng.domain.Membership;
@@ -5,6 +6,7 @@ import org.hostsharing.hsadminng.repository.MembershipRepository;
import org.hostsharing.hsadminng.service.dto.MembershipDTO;
import org.hostsharing.hsadminng.service.mapper.MembershipMapper;
import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
+
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.data.domain.Page;
@@ -12,9 +14,10 @@ import org.springframework.data.domain.Pageable;
import org.springframework.stereotype.Service;
import org.springframework.transaction.annotation.Transactional;
-import javax.persistence.EntityManager;
import java.util.Optional;
+import javax.persistence.EntityManager;
+
/**
* Service Implementation for managing Membership.
*/
@@ -32,10 +35,11 @@ public class MembershipService implements IdToDtoResolver {
private final MembershipMapper membershipMapper;
- public MembershipService(final EntityManager em,
- final MembershipValidator membershipValidator,
- final MembershipRepository membershipRepository,
- final MembershipMapper membershipMapper) {
+ public MembershipService(
+ final EntityManager em,
+ final MembershipValidator membershipValidator,
+ final MembershipRepository membershipRepository,
+ final MembershipMapper membershipMapper) {
this.em = em;
this.membershipValidator = membershipValidator;
this.membershipRepository = membershipRepository;
@@ -70,10 +74,9 @@ public class MembershipService implements IdToDtoResolver {
public Page findAll(Pageable pageable) {
log.debug("Request to get all Memberships");
return membershipRepository.findAll(pageable)
- .map(membershipMapper::toDto);
+ .map(membershipMapper::toDto);
}
-
/**
* Get one membership by id.
*
@@ -85,7 +88,7 @@ public class MembershipService implements IdToDtoResolver {
public Optional findOne(Long id) {
log.debug("Request to get Membership : {}", id);
return membershipRepository.findById(id)
- .map(membershipMapper::toDto);
+ .map(membershipMapper::toDto);
}
/**
diff --git a/src/main/java/org/hostsharing/hsadminng/service/MembershipValidator.java b/src/main/java/org/hostsharing/hsadminng/service/MembershipValidator.java
index f14e7dad..9d8a33ad 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/MembershipValidator.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/MembershipValidator.java
@@ -1,9 +1,11 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
import org.hostsharing.hsadminng.domain.Membership;
import org.hostsharing.hsadminng.repository.MembershipRepository;
import org.hostsharing.hsadminng.service.dto.MembershipDTO;
import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
+
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.stereotype.Service;
@@ -14,14 +16,18 @@ public class MembershipValidator {
private MembershipRepository membershipRepository;
public void validate(final MembershipDTO membershipDTO) {
- if (membershipDTO.getMemberUntilDate() != null && !membershipDTO.getMemberUntilDate().isAfter(membershipDTO.getMemberFromDate())) {
+ if (membershipDTO.getMemberUntilDate() != null
+ && !membershipDTO.getMemberUntilDate().isAfter(membershipDTO.getMemberFromDate())) {
throw new BadRequestAlertException("Invalid untilDate", Membership.ENTITY_NAME, "untilDateMustBeAfterSinceDate");
}
// It's known that this validation can cause a race condition if two memberships of the same customer are saved at
// same time (overlapping transactions). This is ignored in this case because it's too unlikely to be worth the effort.
if (membershipRepository.hasUncancelledMembershipForCustomer(membershipDTO.getCustomerId())) {
- throw new BadRequestAlertException("Another uncancelled membership exists", Membership.ENTITY_NAME, "anotherUncancelledMembershipExists");
+ throw new BadRequestAlertException(
+ "Another uncancelled membership exists",
+ Membership.ENTITY_NAME,
+ "anotherUncancelledMembershipExists");
}
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/service/SepaMandateQueryService.java b/src/main/java/org/hostsharing/hsadminng/service/SepaMandateQueryService.java
index 3789d8d1..ba0e34b6 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/SepaMandateQueryService.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/SepaMandateQueryService.java
@@ -1,6 +1,6 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
-import io.github.jhipster.service.QueryService;
import org.hostsharing.hsadminng.domain.Customer_;
import org.hostsharing.hsadminng.domain.SepaMandate;
import org.hostsharing.hsadminng.domain.SepaMandate_;
@@ -8,6 +8,9 @@ import org.hostsharing.hsadminng.repository.SepaMandateRepository;
import org.hostsharing.hsadminng.service.dto.SepaMandateCriteria;
import org.hostsharing.hsadminng.service.dto.SepaMandateDTO;
import org.hostsharing.hsadminng.service.mapper.SepaMandateMapper;
+
+import io.github.jhipster.service.QueryService;
+
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.data.domain.Page;
@@ -16,9 +19,10 @@ import org.springframework.data.jpa.domain.Specification;
import org.springframework.stereotype.Service;
import org.springframework.transaction.annotation.Transactional;
-import javax.persistence.criteria.JoinType;
import java.util.List;
+import javax.persistence.criteria.JoinType;
+
/**
* Service for executing complex queries for SepaMandate entities in the database.
* The main input is a {@link SepaMandateCriteria} which gets converted to {@link Specification},
@@ -42,6 +46,7 @@ public class SepaMandateQueryService extends QueryService {
/**
* Return a {@link List} of {@link SepaMandateDTO} which matches the criteria from the database
+ *
* @param criteria The object which holds all the filters, which the entities should match.
* @return the matching entities.
*/
@@ -54,6 +59,7 @@ public class SepaMandateQueryService extends QueryService {
/**
* Return a {@link Page} of {@link SepaMandateDTO} which matches the criteria from the database
+ *
* @param criteria The object which holds all the filters, which the entities should match.
* @param page The page, which should be returned.
* @return the matching entities.
@@ -63,11 +69,12 @@ public class SepaMandateQueryService extends QueryService {
log.debug("find by criteria : {}, page: {}", criteria, page);
final Specification specification = createSpecification(criteria);
return sepaMandateRepository.findAll(specification, page)
- .map(sepaMandateMapper::toDto);
+ .map(sepaMandateMapper::toDto);
}
/**
* Return the number of matching entities in the database
+ *
* @param criteria The object which holds all the filters, which the entities should match.
* @return the number of matching entities.
*/
@@ -97,26 +104,33 @@ public class SepaMandateQueryService extends QueryService {
specification = specification.and(buildStringSpecification(criteria.getBic(), SepaMandate_.bic));
}
if (criteria.getGrantingDocumentDate() != null) {
- specification = specification.and(buildRangeSpecification(criteria.getGrantingDocumentDate(), SepaMandate_.grantingDocumentDate));
+ specification = specification
+ .and(buildRangeSpecification(criteria.getGrantingDocumentDate(), SepaMandate_.grantingDocumentDate));
}
if (criteria.getRevokationDocumentDate() != null) {
- specification = specification.and(buildRangeSpecification(criteria.getRevokationDocumentDate(), SepaMandate_.revokationDocumentDate));
+ specification = specification.and(
+ buildRangeSpecification(criteria.getRevokationDocumentDate(), SepaMandate_.revokationDocumentDate));
}
if (criteria.getValidFromDate() != null) {
- specification = specification.and(buildRangeSpecification(criteria.getValidFromDate(), SepaMandate_.validFromDate));
+ specification = specification
+ .and(buildRangeSpecification(criteria.getValidFromDate(), SepaMandate_.validFromDate));
}
if (criteria.getValidUntilDate() != null) {
- specification = specification.and(buildRangeSpecification(criteria.getValidUntilDate(), SepaMandate_.validUntilDate));
+ specification = specification
+ .and(buildRangeSpecification(criteria.getValidUntilDate(), SepaMandate_.validUntilDate));
}
if (criteria.getLastUsedDate() != null) {
- specification = specification.and(buildRangeSpecification(criteria.getLastUsedDate(), SepaMandate_.lastUsedDate));
+ specification = specification
+ .and(buildRangeSpecification(criteria.getLastUsedDate(), SepaMandate_.lastUsedDate));
}
if (criteria.getRemark() != null) {
specification = specification.and(buildStringSpecification(criteria.getRemark(), SepaMandate_.remark));
}
if (criteria.getCustomerId() != null) {
- specification = specification.and(buildSpecification(criteria.getCustomerId(),
- root -> root.join(SepaMandate_.customer, JoinType.LEFT).get(Customer_.id)));
+ specification = specification.and(
+ buildSpecification(
+ criteria.getCustomerId(),
+ root -> root.join(SepaMandate_.customer, JoinType.LEFT).get(Customer_.id)));
}
}
return specification;
diff --git a/src/main/java/org/hostsharing/hsadminng/service/SepaMandateService.java b/src/main/java/org/hostsharing/hsadminng/service/SepaMandateService.java
index 0f0f33ae..41900658 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/SepaMandateService.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/SepaMandateService.java
@@ -1,9 +1,11 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
import org.hostsharing.hsadminng.domain.SepaMandate;
import org.hostsharing.hsadminng.repository.SepaMandateRepository;
import org.hostsharing.hsadminng.service.dto.SepaMandateDTO;
import org.hostsharing.hsadminng.service.mapper.SepaMandateMapper;
+
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.data.domain.Page;
@@ -11,9 +13,10 @@ import org.springframework.data.domain.Pageable;
import org.springframework.stereotype.Service;
import org.springframework.transaction.annotation.Transactional;
-import javax.persistence.EntityManager;
import java.util.Optional;
+import javax.persistence.EntityManager;
+
/**
* Service Implementation for managing SepaMandate.
*/
@@ -29,7 +32,10 @@ public class SepaMandateService implements IdToDtoResolver {
private final SepaMandateMapper sepaMandateMapper;
- public SepaMandateService(final EntityManager em, final SepaMandateRepository sepaMandateRepository, final SepaMandateMapper sepaMandateMapper) {
+ public SepaMandateService(
+ final EntityManager em,
+ final SepaMandateRepository sepaMandateRepository,
+ final SepaMandateMapper sepaMandateMapper) {
this.em = em;
this.sepaMandateRepository = sepaMandateRepository;
this.sepaMandateMapper = sepaMandateMapper;
@@ -60,10 +66,9 @@ public class SepaMandateService implements IdToDtoResolver {
public Page findAll(Pageable pageable) {
log.debug("Request to get all SepaMandates");
return sepaMandateRepository.findAll(pageable)
- .map(sepaMandateMapper::toDto);
+ .map(sepaMandateMapper::toDto);
}
-
/**
* Get one sepaMandate by id.
*
@@ -74,7 +79,7 @@ public class SepaMandateService implements IdToDtoResolver {
public Optional findOne(Long id) {
log.debug("Request to get SepaMandate : {}", id);
return sepaMandateRepository.findById(id)
- .map(sepaMandateMapper::toDto);
+ .map(sepaMandateMapper::toDto);
}
/**
diff --git a/src/main/java/org/hostsharing/hsadminng/service/ShareQueryService.java b/src/main/java/org/hostsharing/hsadminng/service/ShareQueryService.java
index 7dcfb36c..55f851e4 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/ShareQueryService.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/ShareQueryService.java
@@ -1,8 +1,14 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
-import java.util.List;
+import org.hostsharing.hsadminng.domain.*;
+import org.hostsharing.hsadminng.domain.Share;
+import org.hostsharing.hsadminng.repository.ShareRepository;
+import org.hostsharing.hsadminng.service.dto.ShareCriteria;
+import org.hostsharing.hsadminng.service.dto.ShareDTO;
+import org.hostsharing.hsadminng.service.mapper.ShareMapper;
-import javax.persistence.criteria.JoinType;
+import io.github.jhipster.service.QueryService;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
@@ -12,14 +18,9 @@ import org.springframework.data.jpa.domain.Specification;
import org.springframework.stereotype.Service;
import org.springframework.transaction.annotation.Transactional;
-import io.github.jhipster.service.QueryService;
+import java.util.List;
-import org.hostsharing.hsadminng.domain.Share;
-import org.hostsharing.hsadminng.domain.*; // for static metamodels
-import org.hostsharing.hsadminng.repository.ShareRepository;
-import org.hostsharing.hsadminng.service.dto.ShareCriteria;
-import org.hostsharing.hsadminng.service.dto.ShareDTO;
-import org.hostsharing.hsadminng.service.mapper.ShareMapper;
+import javax.persistence.criteria.JoinType;
/**
* Service for executing complex queries for Share entities in the database.
@@ -44,6 +45,7 @@ public class ShareQueryService extends QueryService {
/**
* Return a {@link List} of {@link ShareDTO} which matches the criteria from the database
+ *
* @param criteria The object which holds all the filters, which the entities should match.
* @return the matching entities.
*/
@@ -56,6 +58,7 @@ public class ShareQueryService extends QueryService {
/**
* Return a {@link Page} of {@link ShareDTO} which matches the criteria from the database
+ *
* @param criteria The object which holds all the filters, which the entities should match.
* @param page The page, which should be returned.
* @return the matching entities.
@@ -65,11 +68,12 @@ public class ShareQueryService extends QueryService {
log.debug("find by criteria : {}, page: {}", criteria, page);
final Specification specification = createSpecification(criteria);
return shareRepository.findAll(specification, page)
- .map(shareMapper::toDto);
+ .map(shareMapper::toDto);
}
/**
* Return the number of matching entities in the database
+ *
* @param criteria The object which holds all the filters, which the entities should match.
* @return the number of matching entities.
*/
@@ -105,8 +109,10 @@ public class ShareQueryService extends QueryService {
specification = specification.and(buildStringSpecification(criteria.getRemark(), Share_.remark));
}
if (criteria.getMembershipId() != null) {
- specification = specification.and(buildSpecification(criteria.getMembershipId(),
- root -> root.join(Share_.membership, JoinType.LEFT).get(Membership_.id)));
+ specification = specification.and(
+ buildSpecification(
+ criteria.getMembershipId(),
+ root -> root.join(Share_.membership, JoinType.LEFT).get(Membership_.id)));
}
}
return specification;
diff --git a/src/main/java/org/hostsharing/hsadminng/service/ShareService.java b/src/main/java/org/hostsharing/hsadminng/service/ShareService.java
index 4fbc8bec..d7aa137d 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/ShareService.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/ShareService.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
import org.hostsharing.hsadminng.domain.Share;
@@ -5,6 +6,7 @@ import org.hostsharing.hsadminng.repository.ShareRepository;
import org.hostsharing.hsadminng.service.dto.ShareDTO;
import org.hostsharing.hsadminng.service.mapper.ShareMapper;
import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
+
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.data.domain.Page;
@@ -12,9 +14,10 @@ import org.springframework.data.domain.Pageable;
import org.springframework.stereotype.Service;
import org.springframework.transaction.annotation.Transactional;
-import javax.persistence.EntityManager;
import java.util.Optional;
+import javax.persistence.EntityManager;
+
/**
* Service Implementation for managing Share.
*/
@@ -32,7 +35,11 @@ public class ShareService implements IdToDtoResolver {
private final ShareValidator shareValidator;
- public ShareService(final EntityManager em, final ShareRepository shareRepository, final ShareMapper shareMapper, final ShareValidator shareValidator) {
+ public ShareService(
+ final EntityManager em,
+ final ShareRepository shareRepository,
+ final ShareMapper shareMapper,
+ final ShareValidator shareValidator) {
this.em = em;
this.shareRepository = shareRepository;
this.shareMapper = shareMapper;
@@ -67,10 +74,9 @@ public class ShareService implements IdToDtoResolver {
public Page findAll(Pageable pageable) {
log.debug("Request to get all Shares");
return shareRepository.findAll(pageable)
- .map(shareMapper::toDto);
+ .map(shareMapper::toDto);
}
-
/**
* Get one share by id.
*
@@ -81,7 +87,7 @@ public class ShareService implements IdToDtoResolver {
public Optional findOne(Long id) {
log.debug("Request to get Share : {}", id);
return shareRepository.findById(id)
- .map(shareMapper::toDto);
+ .map(shareMapper::toDto);
}
/**
diff --git a/src/main/java/org/hostsharing/hsadminng/service/ShareValidator.java b/src/main/java/org/hostsharing/hsadminng/service/ShareValidator.java
index 44479a86..022ba196 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/ShareValidator.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/ShareValidator.java
@@ -1,9 +1,11 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
import org.hostsharing.hsadminng.domain.Share;
import org.hostsharing.hsadminng.domain.enumeration.ShareAction;
import org.hostsharing.hsadminng.service.dto.ShareDTO;
import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
+
import org.springframework.stereotype.Service;
@Service
@@ -11,19 +13,31 @@ public class ShareValidator {
public void validate(final ShareDTO shareDTO) {
if (shareDTO.getId() != null) {
- throw new BadRequestAlertException("Share transactions are immutable", Share.ENTITY_NAME, "shareTransactionImmutable");
+ throw new BadRequestAlertException(
+ "Share transactions are immutable",
+ Share.ENTITY_NAME,
+ "shareTransactionImmutable");
}
if (shareDTO.getDocumentDate().isAfter(shareDTO.getValueDate())) {
- throw new BadRequestAlertException("Document date may not be after value date", Share.ENTITY_NAME, "documentDateMayNotBeAfterValueDate");
+ throw new BadRequestAlertException(
+ "Document date may not be after value date",
+ Share.ENTITY_NAME,
+ "documentDateMayNotBeAfterValueDate");
}
if ((shareDTO.getAction() == ShareAction.SUBSCRIPTION) && (shareDTO.getQuantity() <= 0)) {
- throw new BadRequestAlertException("Share subscriptions require a positive quantity", Share.ENTITY_NAME, "shareSubscriptionPositiveQuantity");
+ throw new BadRequestAlertException(
+ "Share subscriptions require a positive quantity",
+ Share.ENTITY_NAME,
+ "shareSubscriptionPositiveQuantity");
}
if ((shareDTO.getAction() == ShareAction.CANCELLATION) && (shareDTO.getQuantity() >= 0)) {
- throw new BadRequestAlertException("Share cancellations require a negative quantity", Share.ENTITY_NAME, "shareCancellationNegativeQuantity");
+ throw new BadRequestAlertException(
+ "Share cancellations require a negative quantity",
+ Share.ENTITY_NAME,
+ "shareCancellationNegativeQuantity");
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/service/UserService.java b/src/main/java/org/hostsharing/hsadminng/service/UserService.java
index 6fb76dc5..aab6278a 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/UserService.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/UserService.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
import org.hostsharing.hsadminng.config.Constants;
@@ -43,7 +44,11 @@ public class UserService {
private final CacheManager cacheManager;
- public UserService(UserRepository userRepository, PasswordEncoder passwordEncoder, AuthorityRepository authorityRepository, CacheManager cacheManager) {
+ public UserService(
+ UserRepository userRepository,
+ PasswordEncoder passwordEncoder,
+ AuthorityRepository authorityRepository,
+ CacheManager cacheManager) {
this.userRepository = userRepository;
this.passwordEncoder = passwordEncoder;
this.authorityRepository = authorityRepository;
@@ -53,38 +58,38 @@ public class UserService {
public Optional activateRegistration(String key) {
log.debug("Activating user for activation key {}", key);
return userRepository.findOneByActivationKey(key)
- .map(user -> {
- // activate given user for the registration key.
- user.setActivated(true);
- user.setActivationKey(null);
- this.clearUserCaches(user);
- log.debug("Activated user: {}", user);
- return user;
- });
+ .map(user -> {
+ // activate given user for the registration key.
+ user.setActivated(true);
+ user.setActivationKey(null);
+ this.clearUserCaches(user);
+ log.debug("Activated user: {}", user);
+ return user;
+ });
}
public Optional completePasswordReset(String newPassword, String key) {
log.debug("Reset user password for reset key {}", key);
return userRepository.findOneByResetKey(key)
- .filter(user -> user.getResetDate().isAfter(Instant.now().minusSeconds(86400)))
- .map(user -> {
- user.setPassword(passwordEncoder.encode(newPassword));
- user.setResetKey(null);
- user.setResetDate(null);
- this.clearUserCaches(user);
- return user;
- });
+ .filter(user -> user.getResetDate().isAfter(Instant.now().minusSeconds(86400)))
+ .map(user -> {
+ user.setPassword(passwordEncoder.encode(newPassword));
+ user.setResetKey(null);
+ user.setResetDate(null);
+ this.clearUserCaches(user);
+ return user;
+ });
}
public Optional requestPasswordReset(String mail) {
return userRepository.findOneByEmailIgnoreCase(mail)
- .filter(User::getActivated)
- .map(user -> {
- user.setResetKey(RandomUtil.generateResetKey());
- user.setResetDate(Instant.now());
- this.clearUserCaches(user);
- return user;
- });
+ .filter(User::getActivated)
+ .map(user -> {
+ user.setResetKey(RandomUtil.generateResetKey());
+ user.setResetDate(Instant.now());
+ this.clearUserCaches(user);
+ return user;
+ });
}
public User registerUser(UserDTO userDTO, String password) {
@@ -123,9 +128,9 @@ public class UserService {
return newUser;
}
- private boolean removeNonActivatedUser(User existingUser){
+ private boolean removeNonActivatedUser(User existingUser) {
if (existingUser.getActivated()) {
- return false;
+ return false;
}
userRepository.delete(existingUser);
userRepository.flush();
@@ -151,11 +156,12 @@ public class UserService {
user.setResetDate(Instant.now());
user.setActivated(true);
if (userDTO.getAuthorities() != null) {
- Set authorities = userDTO.getAuthorities().stream()
- .map(authorityRepository::findById)
- .filter(Optional::isPresent)
- .map(Optional::get)
- .collect(Collectors.toSet());
+ Set authorities = userDTO.getAuthorities()
+ .stream()
+ .map(authorityRepository::findById)
+ .filter(Optional::isPresent)
+ .map(Optional::get)
+ .collect(Collectors.toSet());
user.setAuthorities(authorities);
}
userRepository.save(user);
@@ -175,16 +181,16 @@ public class UserService {
*/
public void updateUser(String firstName, String lastName, String email, String langKey, String imageUrl) {
SecurityUtils.getCurrentUserLogin()
- .flatMap(userRepository::findOneByLogin)
- .ifPresent(user -> {
- user.setFirstName(firstName);
- user.setLastName(lastName);
- user.setEmail(email.toLowerCase());
- user.setLangKey(langKey);
- user.setImageUrl(imageUrl);
- this.clearUserCaches(user);
- log.debug("Changed Information for User: {}", user);
- });
+ .flatMap(userRepository::findOneByLogin)
+ .ifPresent(user -> {
+ user.setFirstName(firstName);
+ user.setLastName(lastName);
+ user.setEmail(email.toLowerCase());
+ user.setLangKey(langKey);
+ user.setImageUrl(imageUrl);
+ this.clearUserCaches(user);
+ log.debug("Changed Information for User: {}", user);
+ });
}
/**
@@ -194,31 +200,33 @@ public class UserService {
* @return updated user
*/
public Optional updateUser(UserDTO userDTO) {
- return Optional.of(userRepository
- .findById(userDTO.getId()))
- .filter(Optional::isPresent)
- .map(Optional::get)
- .map(user -> {
- this.clearUserCaches(user);
- user.setLogin(userDTO.getLogin().toLowerCase());
- user.setFirstName(userDTO.getFirstName());
- user.setLastName(userDTO.getLastName());
- user.setEmail(userDTO.getEmail().toLowerCase());
- user.setImageUrl(userDTO.getImageUrl());
- user.setActivated(userDTO.isActivated());
- user.setLangKey(userDTO.getLangKey());
- Set managedAuthorities = user.getAuthorities();
- managedAuthorities.clear();
- userDTO.getAuthorities().stream()
- .map(authorityRepository::findById)
- .filter(Optional::isPresent)
- .map(Optional::get)
- .forEach(managedAuthorities::add);
- this.clearUserCaches(user);
- log.debug("Changed Information for User: {}", user);
- return user;
- })
- .map(UserDTO::new);
+ return Optional.of(
+ userRepository
+ .findById(userDTO.getId()))
+ .filter(Optional::isPresent)
+ .map(Optional::get)
+ .map(user -> {
+ this.clearUserCaches(user);
+ user.setLogin(userDTO.getLogin().toLowerCase());
+ user.setFirstName(userDTO.getFirstName());
+ user.setLastName(userDTO.getLastName());
+ user.setEmail(userDTO.getEmail().toLowerCase());
+ user.setImageUrl(userDTO.getImageUrl());
+ user.setActivated(userDTO.isActivated());
+ user.setLangKey(userDTO.getLangKey());
+ Set managedAuthorities = user.getAuthorities();
+ managedAuthorities.clear();
+ userDTO.getAuthorities()
+ .stream()
+ .map(authorityRepository::findById)
+ .filter(Optional::isPresent)
+ .map(Optional::get)
+ .forEach(managedAuthorities::add);
+ this.clearUserCaches(user);
+ log.debug("Changed Information for User: {}", user);
+ return user;
+ })
+ .map(UserDTO::new);
}
public void deleteUser(String login) {
@@ -231,17 +239,17 @@ public class UserService {
public void changePassword(String currentClearTextPassword, String newPassword) {
SecurityUtils.getCurrentUserLogin()
- .flatMap(userRepository::findOneByLogin)
- .ifPresent(user -> {
- String currentEncryptedPassword = user.getPassword();
- if (!passwordEncoder.matches(currentClearTextPassword, currentEncryptedPassword)) {
- throw new InvalidPasswordException();
- }
- String encryptedPassword = passwordEncoder.encode(newPassword);
- user.setPassword(encryptedPassword);
- this.clearUserCaches(user);
- log.debug("Changed password for User: {}", user);
- });
+ .flatMap(userRepository::findOneByLogin)
+ .ifPresent(user -> {
+ String currentEncryptedPassword = user.getPassword();
+ if (!passwordEncoder.matches(currentClearTextPassword, currentEncryptedPassword)) {
+ throw new InvalidPasswordException();
+ }
+ String encryptedPassword = passwordEncoder.encode(newPassword);
+ user.setPassword(encryptedPassword);
+ this.clearUserCaches(user);
+ log.debug("Changed password for User: {}", user);
+ });
}
@Transactional(readOnly = true)
@@ -272,12 +280,12 @@ public class UserService {
@Scheduled(cron = "0 0 1 * * ?")
public void removeNotActivatedUsers() {
userRepository
- .findAllByActivatedIsFalseAndCreatedDateBefore(Instant.now().minus(3, ChronoUnit.DAYS))
- .forEach(user -> {
- log.debug("Deleting not activated user {}", user.getLogin());
- userRepository.delete(user);
- this.clearUserCaches(user);
- });
+ .findAllByActivatedIsFalseAndCreatedDateBefore(Instant.now().minus(3, ChronoUnit.DAYS))
+ .forEach(user -> {
+ log.debug("Deleting not activated user {}", user.getLogin());
+ userRepository.delete(user);
+ this.clearUserCaches(user);
+ });
}
/**
diff --git a/src/main/java/org/hostsharing/hsadminng/service/accessfilter/AccessFor.java b/src/main/java/org/hostsharing/hsadminng/service/accessfilter/AccessFor.java
index 852f6138..5e76c893 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/accessfilter/AccessFor.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/accessfilter/AccessFor.java
@@ -1,16 +1,16 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.accessfilter;
-
import java.lang.annotation.*;
@Documented
-@Target({ElementType.FIELD, ElementType.TYPE_USE})
+@Target({ ElementType.FIELD, ElementType.TYPE_USE })
@Retention(RetentionPolicy.RUNTIME)
public @interface AccessFor {
+
Role[] init() default Role.NOBODY;
Role[] update() default Role.NOBODY;
Role[] read() default Role.NOBODY;
}
-
diff --git a/src/main/java/org/hostsharing/hsadminng/service/accessfilter/AccessMappings.java b/src/main/java/org/hostsharing/hsadminng/service/accessfilter/AccessMappings.java
index d28d91b3..e3b9252e 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/accessfilter/AccessMappings.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/accessfilter/AccessMappings.java
@@ -1,9 +1,11 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.accessfilter;
import java.io.Serializable;
/**
- * A marker interface for DTO classes which can be used by {@link JsonSerializerWithAccessFilter} and {@link JsonDeserializerWithAccessFilter}.
+ * A marker interface for DTO classes which can be used by {@link JsonSerializerWithAccessFilter} and
+ * {@link JsonDeserializerWithAccessFilter}.
*/
public interface AccessMappings extends Serializable {
}
diff --git a/src/main/java/org/hostsharing/hsadminng/service/accessfilter/JSonAccessFilter.java b/src/main/java/org/hostsharing/hsadminng/service/accessfilter/JSonAccessFilter.java
index 273b64cc..e1aed4bf 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/accessfilter/JSonAccessFilter.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/accessfilter/JSonAccessFilter.java
@@ -1,19 +1,22 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.accessfilter;
+import static com.google.common.base.Verify.verify;
+
import org.hostsharing.hsadminng.security.SecurityUtils;
import org.hostsharing.hsadminng.service.IdToDtoResolver;
import org.hostsharing.hsadminng.service.dto.MembershipDTO;
import org.hostsharing.hsadminng.service.util.ReflectionUtil;
import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
+
import org.springframework.beans.factory.config.AutowireCapableBeanFactory;
import org.springframework.context.ApplicationContext;
import java.lang.annotation.Annotation;
import java.lang.reflect.Field;
-import static com.google.common.base.Verify.verify;
-
abstract class JSonAccessFilter {
+
private final ApplicationContext ctx;
final T dto;
final Field selfIdField;
@@ -67,7 +70,7 @@ abstract class JSonAccessFilter {
final Class extends IdToDtoResolver> parentDtoLoader = parentIdAnnot.resolver();
final Class rawType = IdToDtoResolver.class;
- final Class> parentDtoClass = ReflectionUtil.determineGenericInterfaceParameter(parentDtoLoader, rawType, 0);
+ final Class> parentDtoClass = ReflectionUtil. determineGenericInterfaceParameter(parentDtoLoader, rawType, 0);
final Long parentId = ReflectionUtil.getValue(dto, parentIdField);
final Role roleOnParent = SecurityUtils.getLoginUserRoleFor(parentDtoClass, parentId);
@@ -77,23 +80,37 @@ abstract class JSonAccessFilter {
@SuppressWarnings("unchecked")
protected Object loadDto(final Class extends IdToDtoResolver> resolverClass, final Long id) {
- verify(id != null, "id must not be null for " + resolverClass.getSimpleName());
+ verify(id != null, "id must not be null for " + resolverClass.getSimpleName());
final AutowireCapableBeanFactory beanFactory = ctx.getAutowireCapableBeanFactory();
- verify(beanFactory != null, "no bean factory found, probably missing mock configuration for ApplicationContext, e.g. given(...)");
+ verify(
+ beanFactory != null,
+ "no bean factory found, probably missing mock configuration for ApplicationContext, e.g. given(...)");
final IdToDtoResolver resolverBean = beanFactory.createBean(resolverClass);
- verify(resolverBean != null, "no " + resolverClass.getSimpleName() + " bean created, probably missing mock configuration for AutowireCapableBeanFactory, e.g. given(...)");
+ verify(
+ resolverBean != null,
+ "no " + resolverClass.getSimpleName()
+ + " bean created, probably missing mock configuration for AutowireCapableBeanFactory, e.g. given(...)");
- return resolverBean.findOne(id).orElseThrow(() -> new BadRequestAlertException("Can't resolve entity ID " + id + " via " + resolverClass, resolverClass.getSimpleName(), "isNotFound"));
+ return resolverBean.findOne(id)
+ .orElseThrow(
+ () -> new BadRequestAlertException(
+ "Can't resolve entity ID " + id + " via " + resolverClass,
+ resolverClass.getSimpleName(),
+ "isNotFound"));
}
- private static Field determineFieldWithAnnotation(final Class> dtoClass, final Class extends Annotation> idAnnotationClass) {
+ private static Field determineFieldWithAnnotation(
+ final Class> dtoClass,
+ final Class extends Annotation> idAnnotationClass) {
Field parentIdField = null;
for (Field field : dtoClass.getDeclaredFields()) {
if (field.isAnnotationPresent(idAnnotationClass)) {
if (parentIdField != null) {
- throw new AssertionError("multiple @" + idAnnotationClass.getSimpleName() + " detected in " + field.getDeclaringClass().getSimpleName());
+ throw new AssertionError(
+ "multiple @" + idAnnotationClass.getSimpleName() + " detected in "
+ + field.getDeclaringClass().getSimpleName());
}
parentIdField = field;
}
diff --git a/src/main/java/org/hostsharing/hsadminng/service/accessfilter/JSonDeserializationWithAccessFilter.java b/src/main/java/org/hostsharing/hsadminng/service/accessfilter/JSonDeserializationWithAccessFilter.java
index 0756b69a..c594ebc8 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/accessfilter/JSonDeserializationWithAccessFilter.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/accessfilter/JSonDeserializationWithAccessFilter.java
@@ -1,13 +1,18 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.accessfilter;
+import static org.hostsharing.hsadminng.service.util.ReflectionUtil.unchecked;
+
+import org.hostsharing.hsadminng.service.util.ReflectionUtil;
+import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
+
import com.fasterxml.jackson.core.JsonParser;
import com.fasterxml.jackson.core.TreeNode;
import com.fasterxml.jackson.databind.DeserializationContext;
import com.fasterxml.jackson.databind.node.*;
+
import org.apache.commons.lang3.NotImplementedException;
import org.apache.commons.lang3.ObjectUtils;
-import org.hostsharing.hsadminng.service.util.ReflectionUtil;
-import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
import org.springframework.context.ApplicationContext;
import java.lang.reflect.Field;
@@ -16,9 +21,8 @@ import java.time.LocalDate;
import java.util.HashSet;
import java.util.Set;
-import static org.hostsharing.hsadminng.service.util.ReflectionUtil.unchecked;
-
-/** Actual implementation of JSON deserialization, where {link JSonDeserializerWithAccessFilter}
+/**
+ * Actual implementation of JSON deserialization, where {link JSonDeserializerWithAccessFilter}
* is a stateless bean, {@link JSonDeserializationWithAccessFilter} exists only during the actual
* deserialization and contains a deserialization state.
*
@@ -29,7 +33,11 @@ public class JSonDeserializationWithAccessFilter extends JSonAccessFilter
private final TreeNode treeNode;
private final Set updatingFields = new HashSet<>();
- public JSonDeserializationWithAccessFilter(final ApplicationContext ctx, final JsonParser jsonParser, final DeserializationContext deserializationContext, Class dtoClass) {
+ public JSonDeserializationWithAccessFilter(
+ final ApplicationContext ctx,
+ final JsonParser jsonParser,
+ final DeserializationContext deserializationContext,
+ Class dtoClass) {
super(ctx, unchecked(dtoClass::newInstance));
this.treeNode = unchecked(() -> jsonParser.getCodec().readTree(jsonParser));
}
@@ -68,9 +76,9 @@ public class JSonDeserializationWithAccessFilter extends JSonAccessFilter
return;
}
for (Field field : currentDto.getClass().getDeclaredFields()) {
- if (field.isAnnotationPresent(AccessFor.class) ) {
+ if (field.isAnnotationPresent(AccessFor.class)) {
boolean updatingField = updatingFields.contains(field);
- if (updatingField && !isActuallyUpdated(field, dto, currentDto) ) {
+ if (updatingField && !isActuallyUpdated(field, dto, currentDto)) {
updatingFields.remove(field);
updatingField = false;
}
@@ -106,9 +114,13 @@ public class JSonDeserializationWithAccessFilter extends JSonAccessFilter
return ((DoubleNode) fieldNode).asDouble();
}
if (fieldNode instanceof ArrayNode && LocalDate.class.isAssignableFrom(fieldClass)) {
- return LocalDate.of(((ArrayNode) fieldNode).get(0).asInt(), ((ArrayNode) fieldNode).get(1).asInt(), ((ArrayNode) fieldNode).get(2).asInt());
+ return LocalDate.of(
+ ((ArrayNode) fieldNode).get(0).asInt(),
+ ((ArrayNode) fieldNode).get(1).asInt(),
+ ((ArrayNode) fieldNode).get(2).asInt());
}
- throw new NotImplementedException("JSon node type not implemented: " + fieldNode.getClass() + " -> " + fieldName + ": " + fieldClass);
+ throw new NotImplementedException(
+ "JSon node type not implemented: " + fieldNode.getClass() + " -> " + fieldName + ": " + fieldClass);
}
private void writeValueToDto(final T dto, final Field field, final Object value) {
@@ -135,23 +147,35 @@ public class JSonDeserializationWithAccessFilter extends JSonAccessFilter
}
private void checkAccessToWrittenFields(final T currentDto) {
- updatingFields.forEach(field -> {
- // TODO this ugly code needs cleanup
- if (!field.equals(selfIdField)) {
- final Role role = getLoginUserRole();
- if (isInitAccess()) {
- if (!role.isAllowedToInit(field)) {
- if (!field.equals(parentIdField)) {
- throw new BadRequestAlertException("Initialization of field " + toDisplay(field) + " prohibited for current user role " + role, toDisplay(field), "initializationProhibited");
- } else {
- throw new BadRequestAlertException("Referencing field " + toDisplay(field) + " prohibited for current user role " + role, toDisplay(field), "referencingProhibited");
+ updatingFields.forEach(
+ field -> {
+ // TODO this ugly code needs cleanup
+ if (!field.equals(selfIdField)) {
+ final Role role = getLoginUserRole();
+ if (isInitAccess()) {
+ if (!role.isAllowedToInit(field)) {
+ if (!field.equals(parentIdField)) {
+ throw new BadRequestAlertException(
+ "Initialization of field " + toDisplay(field) + " prohibited for current user role "
+ + role,
+ toDisplay(field),
+ "initializationProhibited");
+ } else {
+ throw new BadRequestAlertException(
+ "Referencing field " + toDisplay(field) + " prohibited for current user role "
+ + role,
+ toDisplay(field),
+ "referencingProhibited");
+ }
+ }
+ } else if (!Role.toBeIgnoredForUpdates(field) && !getLoginUserRole().isAllowedToUpdate(field)) {
+ throw new BadRequestAlertException(
+ "Update of field " + toDisplay(field) + " prohibited for current user role " + role,
+ toDisplay(field),
+ "updateProhibited");
}
}
- } else if ( !Role.toBeIgnoredForUpdates(field) && !getLoginUserRole().isAllowedToUpdate(field)) {
- throw new BadRequestAlertException("Update of field " + toDisplay(field) + " prohibited for current user role " + role, toDisplay(field), "updateProhibited");
- }
- }
- });
+ });
}
private boolean isInitAccess() {
@@ -159,6 +183,6 @@ public class JSonDeserializationWithAccessFilter extends JSonAccessFilter
}
private boolean isActuallyUpdated(final Field field, final T dto, T currentDto) {
- return 0 != ObjectUtils.compare(ReflectionUtil.getValue(dto, field), ReflectionUtil.getValue(currentDto, field));
+ return 0 != ObjectUtils.compare(ReflectionUtil.getValue(dto, field), ReflectionUtil.getValue(currentDto, field));
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/service/accessfilter/JSonSerializationWithAccessFilter.java b/src/main/java/org/hostsharing/hsadminng/service/accessfilter/JSonSerializationWithAccessFilter.java
index d3ac6a10..0b61e0c1 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/accessfilter/JSonSerializationWithAccessFilter.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/accessfilter/JSonSerializationWithAccessFilter.java
@@ -1,10 +1,12 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.accessfilter;
+import org.hostsharing.hsadminng.service.util.ReflectionUtil;
import com.fasterxml.jackson.core.JsonGenerator;
import com.fasterxml.jackson.databind.SerializerProvider;
+
import org.apache.commons.lang3.NotImplementedException;
-import org.hostsharing.hsadminng.service.util.ReflectionUtil;
import org.springframework.context.ApplicationContext;
import java.io.IOException;
@@ -12,20 +14,23 @@ import java.lang.reflect.Field;
import java.math.BigDecimal;
import java.time.LocalDate;
-/** Actual implementation of JSON serialization, where {link JsonSerializerWithAccessFilter}
+/**
+ * Actual implementation of JSON serialization, where {link JsonSerializerWithAccessFilter}
* is a stateless bean, {@link JSonSerializationWithAccessFilter} exists only during the actual
* serialization and contains a serialization state.
*
* @param DTO class to serialize
*/
public class JSonSerializationWithAccessFilter extends JSonAccessFilter {
+
private final JsonGenerator jsonGenerator;
private final SerializerProvider serializerProvider;
- public JSonSerializationWithAccessFilter(final ApplicationContext ctx,
- final JsonGenerator jsonGenerator,
- final SerializerProvider serializerProvider,
- final T dto) {
+ public JSonSerializationWithAccessFilter(
+ final ApplicationContext ctx,
+ final JsonGenerator jsonGenerator,
+ final SerializerProvider serializerProvider,
+ final T dto) {
super(ctx, dto);
this.jsonGenerator = jsonGenerator;
this.serializerProvider = serializerProvider;
@@ -45,10 +50,10 @@ public class JSonSerializationWithAccessFilter extends JSonAccessFilter {
if (getLoginUserRole().isAllowedToRead(field)) {
final String fieldName = field.getName();
// TODO: maybe replace by serializerProvider.defaultSerialize...()?
- // But that makes it difficult for parallel structure with the deserializer (clumsy API).
- // Alternatively extract the supported types to subclasses of some abstract class and
- // here as well as in the deserializer just access the matching implementation through a map.
- // Or even completely switch from Jackson to GSON?
+ // But that makes it difficult for parallel structure with the deserializer (clumsy API).
+ // Alternatively extract the supported types to subclasses of some abstract class and
+ // here as well as in the deserializer just access the matching implementation through a map.
+ // Or even completely switch from Jackson to GSON?
final Object fieldValue = ReflectionUtil.getValue(dto, field);
if (fieldValue == null) {
jsonGenerator.writeNullField(fieldName);
diff --git a/src/main/java/org/hostsharing/hsadminng/service/accessfilter/JsonDeserializerWithAccessFilter.java b/src/main/java/org/hostsharing/hsadminng/service/accessfilter/JsonDeserializerWithAccessFilter.java
index 1b926283..19e8255a 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/accessfilter/JsonDeserializerWithAccessFilter.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/accessfilter/JsonDeserializerWithAccessFilter.java
@@ -1,9 +1,12 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.accessfilter;
+import org.hostsharing.hsadminng.service.util.ReflectionUtil;
+
import com.fasterxml.jackson.core.JsonParser;
import com.fasterxml.jackson.databind.DeserializationContext;
import com.fasterxml.jackson.databind.JsonDeserializer;
-import org.hostsharing.hsadminng.service.util.ReflectionUtil;
+
import org.springframework.context.ApplicationContext;
public abstract class JsonDeserializerWithAccessFilter extends JsonDeserializer {
@@ -15,10 +18,12 @@ public abstract class JsonDeserializerWithAccessFilter
}
@Override
- public T deserialize(final JsonParser jsonParser,
- final DeserializationContext deserializationContext) {
+ public T deserialize(
+ final JsonParser jsonParser,
+ final DeserializationContext deserializationContext) {
- final Class dtoClass = ReflectionUtil.determineGenericClassParameter(this.getClass(), JsonDeserializerWithAccessFilter.class, 0);
+ final Class dtoClass = ReflectionUtil
+ .determineGenericClassParameter(this.getClass(), JsonDeserializerWithAccessFilter.class, 0);
return new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, deserializationContext, dtoClass).deserialize();
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/service/accessfilter/JsonSerializerWithAccessFilter.java b/src/main/java/org/hostsharing/hsadminng/service/accessfilter/JsonSerializerWithAccessFilter.java
index 57a11878..86972af9 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/accessfilter/JsonSerializerWithAccessFilter.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/accessfilter/JsonSerializerWithAccessFilter.java
@@ -1,13 +1,16 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.accessfilter;
import com.fasterxml.jackson.core.JsonGenerator;
import com.fasterxml.jackson.databind.JsonSerializer;
import com.fasterxml.jackson.databind.SerializerProvider;
+
import org.springframework.context.ApplicationContext;
import java.io.IOException;
-/** A base class for a Spring bean for JSON serialization with field-based access filters.
+/**
+ * A base class for a Spring bean for JSON serialization with field-based access filters.
* Where {@link JSonSerializationWithAccessFilter} is the actual stateful implementation and
* it's instances only exist during the process of serialization, this class is a stateless just
* used for service and context injection.
@@ -23,8 +26,10 @@ public abstract class JsonSerializerWithAccessFilter e
}
@Override
- public void serialize(final T dto, final JsonGenerator jsonGenerator,
- final SerializerProvider serializerProvider) throws IOException {
+ public void serialize(
+ final T dto,
+ final JsonGenerator jsonGenerator,
+ final SerializerProvider serializerProvider) throws IOException {
new JSonSerializationWithAccessFilter<>(ctx, jsonGenerator, serializerProvider, dto).serialize();
}
diff --git a/src/main/java/org/hostsharing/hsadminng/service/accessfilter/ParentId.java b/src/main/java/org/hostsharing/hsadminng/service/accessfilter/ParentId.java
index e392374e..9dd46a0a 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/accessfilter/ParentId.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/accessfilter/ParentId.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.accessfilter;
import org.hostsharing.hsadminng.service.IdToDtoResolver;
@@ -11,9 +12,10 @@ import java.lang.annotation.*;
* @see AccessFor
*/
@Documented
-@Target({ElementType.FIELD})
+@Target({ ElementType.FIELD })
@Retention(RetentionPolicy.RUNTIME)
public @interface ParentId {
+
/// The service which can load the referenced DTO.
Class extends IdToDtoResolver>> resolver();
}
diff --git a/src/main/java/org/hostsharing/hsadminng/service/accessfilter/Role.java b/src/main/java/org/hostsharing/hsadminng/service/accessfilter/Role.java
index 46e279f9..768e0d24 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/accessfilter/Role.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/accessfilter/Role.java
@@ -1,9 +1,10 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.accessfilter;
-import java.lang.reflect.Field;
-
import static com.google.common.base.Verify.verify;
+import java.lang.reflect.Field;
+
/**
* These enum values are on the one hand used to define the minimum role required to grant access to resources,
* but on the other hand also for the roles users can be assigned to.
@@ -46,6 +47,7 @@ public enum Role {
* This role is for financial contacts of a customer, e.g. for accessing billing data.
*/
FINANCIAL_CONTACT(22) {
+
@Override
public boolean covers(final Role role) {
if (role == ACTUAL_CUSTOMER_USER) {
@@ -60,7 +62,6 @@ public enum Role {
*/
TECHNICAL_CONTACT(22),
-
/**
* This meta-role is to specify that any kind of customer contact can get access to the resource.
*/
diff --git a/src/main/java/org/hostsharing/hsadminng/service/accessfilter/SelfId.java b/src/main/java/org/hostsharing/hsadminng/service/accessfilter/SelfId.java
index 6c67b9fb..35725a9b 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/accessfilter/SelfId.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/accessfilter/SelfId.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.accessfilter;
import org.hostsharing.hsadminng.service.IdToDtoResolver;
@@ -13,9 +14,10 @@ import java.lang.annotation.*;
* @see AccessFor
*/
@Documented
-@Target({ElementType.FIELD})
+@Target({ ElementType.FIELD })
@Retention(RetentionPolicy.RUNTIME)
public @interface SelfId {
+
/// The service which can load the referenced DTO.
Class extends IdToDtoResolver>> resolver();
}
diff --git a/src/main/java/org/hostsharing/hsadminng/service/dto/AssetCriteria.java b/src/main/java/org/hostsharing/hsadminng/service/dto/AssetCriteria.java
index fe0091fc..0fe2ed74 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/dto/AssetCriteria.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/dto/AssetCriteria.java
@@ -1,17 +1,16 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.dto;
+import org.hostsharing.hsadminng.domain.enumeration.AssetAction;
+
+import io.github.jhipster.service.filter.BigDecimalFilter;
+import io.github.jhipster.service.filter.Filter;
+import io.github.jhipster.service.filter.LocalDateFilter;
+import io.github.jhipster.service.filter.LongFilter;
+import io.github.jhipster.service.filter.StringFilter;
+
import java.io.Serializable;
import java.util.Objects;
-import org.hostsharing.hsadminng.domain.enumeration.AssetAction;
-import io.github.jhipster.service.filter.BooleanFilter;
-import io.github.jhipster.service.filter.DoubleFilter;
-import io.github.jhipster.service.filter.Filter;
-import io.github.jhipster.service.filter.FloatFilter;
-import io.github.jhipster.service.filter.IntegerFilter;
-import io.github.jhipster.service.filter.LongFilter;
-import io.github.jhipster.service.filter.StringFilter;
-import io.github.jhipster.service.filter.BigDecimalFilter;
-import io.github.jhipster.service.filter.LocalDateFilter;
/**
* Criteria class for the Asset entity. This class is used in AssetResource to
@@ -22,6 +21,7 @@ import io.github.jhipster.service.filter.LocalDateFilter;
* fix type specific filters.
*/
public class AssetCriteria implements Serializable {
+
/**
* Class for filtering AssetAction
*/
@@ -100,7 +100,6 @@ public class AssetCriteria implements Serializable {
this.membershipId = membershipId;
}
-
@Override
public boolean equals(Object o) {
if (this == o) {
@@ -110,27 +109,25 @@ public class AssetCriteria implements Serializable {
return false;
}
final AssetCriteria that = (AssetCriteria) o;
- return
- Objects.equals(id, that.id) &&
- Objects.equals(documentDate, that.documentDate) &&
- Objects.equals(valueDate, that.valueDate) &&
- Objects.equals(action, that.action) &&
- Objects.equals(amount, that.amount) &&
- Objects.equals(remark, that.remark) &&
- Objects.equals(membershipId, that.membershipId);
+ return Objects.equals(id, that.id) &&
+ Objects.equals(documentDate, that.documentDate) &&
+ Objects.equals(valueDate, that.valueDate) &&
+ Objects.equals(action, that.action) &&
+ Objects.equals(amount, that.amount) &&
+ Objects.equals(remark, that.remark) &&
+ Objects.equals(membershipId, that.membershipId);
}
@Override
public int hashCode() {
return Objects.hash(
- id,
- documentDate,
- valueDate,
- action,
- amount,
- remark,
- membershipId
- );
+ id,
+ documentDate,
+ valueDate,
+ action,
+ amount,
+ remark,
+ membershipId);
}
@Override
@@ -143,7 +140,7 @@ public class AssetCriteria implements Serializable {
(amount != null ? "amount=" + amount + ", " : "") +
(remark != null ? "remark=" + remark + ", " : "") +
(membershipId != null ? "membershipId=" + membershipId + ", " : "") +
- "}";
+ "}";
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/service/dto/AssetDTO.java b/src/main/java/org/hostsharing/hsadminng/service/dto/AssetDTO.java
index f80e0486..8fb08e80 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/dto/AssetDTO.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/dto/AssetDTO.java
@@ -1,42 +1,45 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.dto;
import org.hostsharing.hsadminng.domain.enumeration.AssetAction;
import org.hostsharing.hsadminng.service.AssetService;
import org.hostsharing.hsadminng.service.MembershipService;
import org.hostsharing.hsadminng.service.accessfilter.*;
+
import org.springframework.boot.jackson.JsonComponent;
import org.springframework.context.ApplicationContext;
-import javax.validation.constraints.NotNull;
-import javax.validation.constraints.Size;
import java.io.Serializable;
import java.math.BigDecimal;
import java.time.LocalDate;
import java.util.Objects;
+import javax.validation.constraints.NotNull;
+import javax.validation.constraints.Size;
+
/**
* A DTO for the Asset entity.
*/
public class AssetDTO implements Serializable, AccessMappings {
@SelfId(resolver = AssetService.class)
- @AccessFor(read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private Long id;
@NotNull
- @AccessFor(init = Role.ADMIN, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(init = Role.ADMIN, read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private LocalDate documentDate;
@NotNull
- @AccessFor(init = Role.ADMIN, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(init = Role.ADMIN, read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private LocalDate valueDate;
@NotNull
- @AccessFor(init = Role.ADMIN, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(init = Role.ADMIN, read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private AssetAction action;
@NotNull
- @AccessFor(init = Role.ADMIN, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(init = Role.ADMIN, read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private BigDecimal amount;
@Size(max = 160)
@@ -44,10 +47,10 @@ public class AssetDTO implements Serializable, AccessMappings {
private String remark;
@ParentId(resolver = MembershipService.class)
- @AccessFor(init = Role.ADMIN, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(init = Role.ADMIN, read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private Long membershipId;
- @AccessFor(update = Role.IGNORED, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(update = Role.IGNORED, read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private String membershipDisplayLabel;
public Long getId() {
@@ -138,15 +141,15 @@ public class AssetDTO implements Serializable, AccessMappings {
@Override
public String toString() {
return "AssetDTO{" +
- "id=" + getId() +
- ", documentDate='" + getDocumentDate() + "'" +
- ", valueDate='" + getValueDate() + "'" +
- ", action='" + getAction() + "'" +
- ", amount=" + getAmount() +
- ", remark='" + getRemark() + "'" +
- ", membership=" + getMembershipId() +
- ", membershipDisplayLabel='" + getMembershipDisplayLabel() + "'" +
- "}";
+ "id=" + getId() +
+ ", documentDate='" + getDocumentDate() + "'" +
+ ", valueDate='" + getValueDate() + "'" +
+ ", action='" + getAction() + "'" +
+ ", amount=" + getAmount() +
+ ", remark='" + getRemark() + "'" +
+ ", membership=" + getMembershipId() +
+ ", membershipDisplayLabel='" + getMembershipDisplayLabel() + "'" +
+ "}";
}
@JsonComponent
diff --git a/src/main/java/org/hostsharing/hsadminng/service/dto/CustomerCriteria.java b/src/main/java/org/hostsharing/hsadminng/service/dto/CustomerCriteria.java
index 50fc2a0e..4638eaa8 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/dto/CustomerCriteria.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/dto/CustomerCriteria.java
@@ -1,9 +1,11 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.dto;
-import io.github.jhipster.service.filter.*;
import org.hostsharing.hsadminng.domain.enumeration.CustomerKind;
import org.hostsharing.hsadminng.domain.enumeration.VatRegion;
+import io.github.jhipster.service.filter.*;
+
import java.io.Serializable;
import java.util.Objects;
@@ -16,11 +18,13 @@ import java.util.Objects;
* fix type specific filters.
*/
public class CustomerCriteria implements Serializable {
+
/**
* Class for filtering CustomerKind
*/
public static class CustomerKindFilter extends Filter {
}
+
/**
* Class for filtering VatRegion
*/
@@ -209,7 +213,6 @@ public class CustomerCriteria implements Serializable {
this.sepamandateId = sepamandateId;
}
-
@Override
public boolean equals(Object o) {
if (this == o) {
@@ -219,49 +222,47 @@ public class CustomerCriteria implements Serializable {
return false;
}
final CustomerCriteria that = (CustomerCriteria) o;
- return
- Objects.equals(id, that.id) &&
- Objects.equals(reference, that.reference) &&
- Objects.equals(prefix, that.prefix) &&
- Objects.equals(name, that.name) &&
- Objects.equals(kind, that.kind) &&
- Objects.equals(birthDate, that.birthDate) &&
- Objects.equals(birthPlace, that.birthPlace) &&
- Objects.equals(registrationCourt, that.registrationCourt) &&
- Objects.equals(registrationNumber, that.registrationNumber) &&
- Objects.equals(vatRegion, that.vatRegion) &&
- Objects.equals(vatNumber, that.vatNumber) &&
- Objects.equals(contractualSalutation, that.contractualSalutation) &&
- Objects.equals(contractualAddress, that.contractualAddress) &&
- Objects.equals(billingSalutation, that.billingSalutation) &&
- Objects.equals(billingAddress, that.billingAddress) &&
- Objects.equals(remark, that.remark) &&
- Objects.equals(membershipId, that.membershipId) &&
- Objects.equals(sepamandateId, that.sepamandateId);
+ return Objects.equals(id, that.id) &&
+ Objects.equals(reference, that.reference) &&
+ Objects.equals(prefix, that.prefix) &&
+ Objects.equals(name, that.name) &&
+ Objects.equals(kind, that.kind) &&
+ Objects.equals(birthDate, that.birthDate) &&
+ Objects.equals(birthPlace, that.birthPlace) &&
+ Objects.equals(registrationCourt, that.registrationCourt) &&
+ Objects.equals(registrationNumber, that.registrationNumber) &&
+ Objects.equals(vatRegion, that.vatRegion) &&
+ Objects.equals(vatNumber, that.vatNumber) &&
+ Objects.equals(contractualSalutation, that.contractualSalutation) &&
+ Objects.equals(contractualAddress, that.contractualAddress) &&
+ Objects.equals(billingSalutation, that.billingSalutation) &&
+ Objects.equals(billingAddress, that.billingAddress) &&
+ Objects.equals(remark, that.remark) &&
+ Objects.equals(membershipId, that.membershipId) &&
+ Objects.equals(sepamandateId, that.sepamandateId);
}
@Override
public int hashCode() {
return Objects.hash(
- id,
- reference,
- prefix,
- name,
- kind,
- birthDate,
- birthPlace,
- registrationCourt,
- registrationNumber,
- vatRegion,
- vatNumber,
- contractualSalutation,
- contractualAddress,
- billingSalutation,
- billingAddress,
- remark,
- membershipId,
- sepamandateId
- );
+ id,
+ reference,
+ prefix,
+ name,
+ kind,
+ birthDate,
+ birthPlace,
+ registrationCourt,
+ registrationNumber,
+ vatRegion,
+ vatNumber,
+ contractualSalutation,
+ contractualAddress,
+ billingSalutation,
+ billingAddress,
+ remark,
+ membershipId,
+ sepamandateId);
}
@Override
@@ -285,7 +286,7 @@ public class CustomerCriteria implements Serializable {
(remark != null ? "remark=" + remark + ", " : "") +
(membershipId != null ? "membershipId=" + membershipId + ", " : "") +
(sepamandateId != null ? "sepamandateId=" + sepamandateId + ", " : "") +
- "}";
+ "}";
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/service/dto/CustomerDTO.java b/src/main/java/org/hostsharing/hsadminng/service/dto/CustomerDTO.java
index 7713569f..e34813b2 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/dto/CustomerDTO.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/dto/CustomerDTO.java
@@ -1,20 +1,23 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.dto;
import org.hostsharing.hsadminng.domain.enumeration.CustomerKind;
import org.hostsharing.hsadminng.domain.enumeration.VatRegion;
import org.hostsharing.hsadminng.service.CustomerService;
import org.hostsharing.hsadminng.service.accessfilter.*;
+
import org.springframework.boot.jackson.JsonComponent;
import org.springframework.context.ApplicationContext;
-import javax.validation.constraints.*;
import java.time.LocalDate;
import java.util.Objects;
+import javax.validation.constraints.*;
+
/**
* A DTO for the Customer entity.
*/
-public class CustomerDTO implements AccessMappings, FluentBuilder {
+public class CustomerDTO implements AccessMappings, FluentBuilder {
@SelfId(resolver = CustomerService.class)
@AccessFor(read = Role.ANY_CUSTOMER_USER)
@@ -41,27 +44,27 @@ public class CustomerDTO implements AccessMappings, FluentBuilder
@AccessFor(init = Role.ADMIN, update = Role.ADMIN, read = Role.CONTRACTUAL_CONTACT)
private CustomerKind kind;
- @AccessFor(init = Role.ADMIN, update = Role.ADMIN, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(init = Role.ADMIN, update = Role.ADMIN, read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private LocalDate birthDate;
@Size(max = 80)
- @AccessFor(init = Role.ADMIN, update = Role.ADMIN, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(init = Role.ADMIN, update = Role.ADMIN, read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private String birthPlace;
@Size(max = 80)
- @AccessFor(init = Role.ADMIN, update = Role.ADMIN, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(init = Role.ADMIN, update = Role.ADMIN, read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private String registrationCourt;
@Size(max = 80)
- @AccessFor(init = Role.ADMIN, update = Role.ADMIN, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(init = Role.ADMIN, update = Role.ADMIN, read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private String registrationNumber;
@NotNull
- @AccessFor(init = Role.ADMIN, update = Role.ADMIN, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(init = Role.ADMIN, update = Role.ADMIN, read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private VatRegion vatRegion;
@Size(max = 40)
- @AccessFor(init = Role.ADMIN, update = Role.ADMIN, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(init = Role.ADMIN, update = Role.ADMIN, read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private String vatNumber;
@Size(max = 80)
@@ -74,18 +77,21 @@ public class CustomerDTO implements AccessMappings, FluentBuilder
private String contractualAddress;
@Size(max = 80)
- @AccessFor(init = Role.ADMIN, update = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT}, read = Role.CONTRACTUAL_CONTACT)
+ @AccessFor(
+ init = Role.ADMIN,
+ update = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT },
+ read = Role.CONTRACTUAL_CONTACT)
private String billingSalutation;
@Size(max = 400)
- @AccessFor(init = Role.ADMIN, update = Role.ADMIN, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(init = Role.ADMIN, update = Role.ADMIN, read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private String billingAddress;
@Size(max = 160)
@AccessFor(init = Role.ADMIN, update = Role.SUPPORTER, read = Role.SUPPORTER)
private String remark;
- @AccessFor(init=Role.ANYBODY, update=Role.ANYBODY, read = Role.ANY_CUSTOMER_USER)
+ @AccessFor(init = Role.ANYBODY, update = Role.ANYBODY, read = Role.ANY_CUSTOMER_USER)
private String displayLabel;
public Long getId() {
@@ -248,23 +254,23 @@ public class CustomerDTO implements AccessMappings, FluentBuilder
@Override
public String toString() {
return "CustomerDTO{" +
- "id=" + getId() +
- ", reference=" + getReference() +
- ", prefix='" + getPrefix() + "'" +
- ", name='" + getName() + "'" +
- ", kind='" + getKind() + "'" +
- ", birthDate='" + getBirthDate() + "'" +
- ", birthPlace='" + getBirthPlace() + "'" +
- ", registrationCourt='" + getRegistrationCourt() + "'" +
- ", registrationNumber='" + getRegistrationNumber() + "'" +
- ", vatRegion='" + getVatRegion() + "'" +
- ", vatNumber='" + getVatNumber() + "'" +
- ", contractualSalutation='" + getContractualSalutation() + "'" +
- ", contractualAddress='" + getContractualAddress() + "'" +
- ", billingSalutation='" + getBillingSalutation() + "'" +
- ", billingAddress='" + getBillingAddress() + "'" +
- ", remark='" + getRemark() + "'" +
- "}";
+ "id=" + getId() +
+ ", reference=" + getReference() +
+ ", prefix='" + getPrefix() + "'" +
+ ", name='" + getName() + "'" +
+ ", kind='" + getKind() + "'" +
+ ", birthDate='" + getBirthDate() + "'" +
+ ", birthPlace='" + getBirthPlace() + "'" +
+ ", registrationCourt='" + getRegistrationCourt() + "'" +
+ ", registrationNumber='" + getRegistrationNumber() + "'" +
+ ", vatRegion='" + getVatRegion() + "'" +
+ ", vatNumber='" + getVatNumber() + "'" +
+ ", contractualSalutation='" + getContractualSalutation() + "'" +
+ ", contractualAddress='" + getContractualAddress() + "'" +
+ ", billingSalutation='" + getBillingSalutation() + "'" +
+ ", billingAddress='" + getBillingAddress() + "'" +
+ ", remark='" + getRemark() + "'" +
+ "}";
}
@JsonComponent
@@ -283,4 +289,3 @@ public class CustomerDTO implements AccessMappings, FluentBuilder
}
}
}
-
diff --git a/src/main/java/org/hostsharing/hsadminng/service/dto/FluentBuilder.java b/src/main/java/org/hostsharing/hsadminng/service/dto/FluentBuilder.java
index 7ae8e26b..55b6e87e 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/dto/FluentBuilder.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/dto/FluentBuilder.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.dto;
import java.util.function.Consumer;
@@ -17,18 +18,18 @@ public interface FluentBuilder {
*
* Example
* {code
- * // adding a fluent builder to your class
- * class YourClass implements FluentBuilder {
- * public int someField;
- * public String anotherField;
- * // ...
- * }
+ * // adding a fluent builder to your class
+ * class YourClass implements FluentBuilder {
+ * public int someField;
+ * public String anotherField;
+ * // ...
+ * }
*
- * // using the fluent builder somewhere else
- * someMethod( new YourClass().with( it -> {
- * it.someField = 5;
- * it.anotherField = "Hello";
- * }));
+ * // using the fluent builder somewhere else
+ * someMethod( new YourClass().with( it -> {
+ * it.someField = 5;
+ * it.anotherField = "Hello";
+ * }));
* }
*
* @param builderFunction statements to apply to 'this'
@@ -37,10 +38,9 @@ public interface FluentBuilder {
*/
@SuppressWarnings("unchecked")
default T with(
- Consumer builderFunction) {
+ Consumer builderFunction) {
builderFunction.accept((T) this);
return (T) this;
}
-
}
diff --git a/src/main/java/org/hostsharing/hsadminng/service/dto/MembershipCriteria.java b/src/main/java/org/hostsharing/hsadminng/service/dto/MembershipCriteria.java
index 14d42ed3..c8ec2bf8 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/dto/MembershipCriteria.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/dto/MembershipCriteria.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.dto;
import io.github.jhipster.service.filter.Filter;
@@ -110,7 +111,6 @@ public class MembershipCriteria implements Serializable {
this.customerId = customerId;
}
-
@Override
public boolean equals(Object o) {
if (this == o) {
@@ -120,31 +120,29 @@ public class MembershipCriteria implements Serializable {
return false;
}
final MembershipCriteria that = (MembershipCriteria) o;
- return
- Objects.equals(id, that.id) &&
- Objects.equals(admissionDocumentDate, that.admissionDocumentDate) &&
- Objects.equals(cancellationDocumentDate, that.cancellationDocumentDate) &&
- Objects.equals(memberFromDate, that.memberFromDate) &&
- Objects.equals(memberUntilDate, that.memberUntilDate) &&
- Objects.equals(remark, that.remark) &&
- Objects.equals(shareId, that.shareId) &&
- Objects.equals(assetId, that.assetId) &&
- Objects.equals(customerId, that.customerId);
+ return Objects.equals(id, that.id) &&
+ Objects.equals(admissionDocumentDate, that.admissionDocumentDate) &&
+ Objects.equals(cancellationDocumentDate, that.cancellationDocumentDate) &&
+ Objects.equals(memberFromDate, that.memberFromDate) &&
+ Objects.equals(memberUntilDate, that.memberUntilDate) &&
+ Objects.equals(remark, that.remark) &&
+ Objects.equals(shareId, that.shareId) &&
+ Objects.equals(assetId, that.assetId) &&
+ Objects.equals(customerId, that.customerId);
}
@Override
public int hashCode() {
return Objects.hash(
- id,
- admissionDocumentDate,
- cancellationDocumentDate,
- memberFromDate,
- memberUntilDate,
- remark,
- shareId,
- assetId,
- customerId
- );
+ id,
+ admissionDocumentDate,
+ cancellationDocumentDate,
+ memberFromDate,
+ memberUntilDate,
+ remark,
+ shareId,
+ assetId,
+ customerId);
}
@Override
@@ -159,7 +157,7 @@ public class MembershipCriteria implements Serializable {
(shareId != null ? "shareId=" + shareId + ", " : "") +
(assetId != null ? "assetId=" + assetId + ", " : "") +
(customerId != null ? "customerId=" + customerId + ", " : "") +
- "}";
+ "}";
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/service/dto/MembershipDTO.java b/src/main/java/org/hostsharing/hsadminng/service/dto/MembershipDTO.java
index c931ce94..389d9ea4 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/dto/MembershipDTO.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/dto/MembershipDTO.java
@@ -1,37 +1,40 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.dto;
import org.hostsharing.hsadminng.service.CustomerService;
import org.hostsharing.hsadminng.service.MembershipService;
import org.hostsharing.hsadminng.service.accessfilter.*;
+
import org.springframework.boot.jackson.JsonComponent;
import org.springframework.context.ApplicationContext;
-import javax.validation.constraints.NotNull;
-import javax.validation.constraints.Size;
import java.time.LocalDate;
import java.util.Objects;
+import javax.validation.constraints.NotNull;
+import javax.validation.constraints.Size;
+
/**
* A DTO for the Membership entity.
*/
-public class MembershipDTO implements AccessMappings, FluentBuilder {
+public class MembershipDTO implements AccessMappings, FluentBuilder {
@SelfId(resolver = MembershipService.class)
- @AccessFor(read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private Long id;
@NotNull
- @AccessFor(init = Role.ADMIN, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(init = Role.ADMIN, read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private LocalDate admissionDocumentDate;
- @AccessFor(init = Role.ADMIN, update = Role.ADMIN, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(init = Role.ADMIN, update = Role.ADMIN, read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private LocalDate cancellationDocumentDate;
@NotNull
- @AccessFor(init = Role.ADMIN, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(init = Role.ADMIN, read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private LocalDate memberFromDate;
- @AccessFor(init = Role.ADMIN, update = Role.ADMIN, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(init = Role.ADMIN, update = Role.ADMIN, read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private LocalDate memberUntilDate;
@Size(max = 160)
@@ -39,10 +42,10 @@ public class MembershipDTO implements AccessMappings, FluentBuilder {
@SelfId(resolver = SepaMandateService.class)
- @AccessFor(read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private Long id;
@NotNull
@Size(max = 40)
- @AccessFor(init = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT}, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(
+ init = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT },
+ read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private String reference;
@Size(max = 34)
- @AccessFor(init = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT}, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(
+ init = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT },
+ read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private String iban;
@Size(max = 11)
- @AccessFor(init = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT}, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(
+ init = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT },
+ read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private String bic;
@NotNull
- @AccessFor(init = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT}, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(
+ init = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT },
+ read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private LocalDate grantingDocumentDate;
- @AccessFor(init = Role.ADMIN, update = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT}, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(
+ init = Role.ADMIN,
+ update = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT },
+ read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private LocalDate revokationDocumentDate;
@NotNull
- @AccessFor(init = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT}, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(
+ init = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT },
+ read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private LocalDate validFromDate;
- @AccessFor(init = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT}, update = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT}, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(
+ init = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT },
+ update = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT },
+ read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private LocalDate validUntilDate;
- @AccessFor(init = Role.ADMIN, update = Role.ADMIN, read = {Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT})
+ @AccessFor(init = Role.ADMIN, update = Role.ADMIN, read = { Role.CONTRACTUAL_CONTACT, Role.FINANCIAL_CONTACT })
private LocalDate lastUsedDate;
@Size(max = 160)
@@ -55,10 +74,12 @@ public class SepaMandateDTO implements AccessMappings, FluentBuilder {
@Mapping(source = "membership.id", target = "membershipId")
diff --git a/src/main/java/org/hostsharing/hsadminng/service/mapper/CustomerMapper.java b/src/main/java/org/hostsharing/hsadminng/service/mapper/CustomerMapper.java
index ced8f394..8664992c 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/mapper/CustomerMapper.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/mapper/CustomerMapper.java
@@ -1,7 +1,9 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.mapper;
import org.hostsharing.hsadminng.domain.Customer;
import org.hostsharing.hsadminng.service.dto.CustomerDTO;
+
import org.mapstruct.AfterMapping;
import org.mapstruct.Mapper;
import org.mapstruct.Mapping;
@@ -14,8 +16,8 @@ import org.mapstruct.MappingTarget;
public interface CustomerMapper extends EntityMapper {
static String displayLabel(Customer customer) {
- return customer.getName()
- + " [" + customer.getReference() + ":" + customer.getPrefix() +"]";
+ return customer.getName()
+ + " [" + customer.getReference() + ":" + customer.getPrefix() + "]";
}
@Mapping(target = "displayLabel", ignore = true)
diff --git a/src/main/java/org/hostsharing/hsadminng/service/mapper/EntityMapper.java b/src/main/java/org/hostsharing/hsadminng/service/mapper/EntityMapper.java
index 65955272..323e6639 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/mapper/EntityMapper.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/mapper/EntityMapper.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.mapper;
import java.util.List;
@@ -9,13 +10,13 @@ import java.util.List;
* @param - Entity type parameter.
*/
-public interface EntityMapper {
+public interface EntityMapper {
E toEntity(D dto);
D toDto(E entity);
- List toEntity(List dtoList);
+ List toEntity(List dtoList);
- List toDto(List entityList);
+ List toDto(List entityList);
}
diff --git a/src/main/java/org/hostsharing/hsadminng/service/mapper/MembershipMapper.java b/src/main/java/org/hostsharing/hsadminng/service/mapper/MembershipMapper.java
index 0ae815e1..36f731f7 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/mapper/MembershipMapper.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/mapper/MembershipMapper.java
@@ -1,8 +1,10 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.mapper;
import org.hostsharing.hsadminng.domain.Customer;
import org.hostsharing.hsadminng.domain.Membership;
import org.hostsharing.hsadminng.service.dto.MembershipDTO;
+
import org.mapstruct.AfterMapping;
import org.mapstruct.Mapper;
import org.mapstruct.Mapping;
@@ -13,14 +15,14 @@ import java.util.Objects;
/**
* Mapper for the entity Membership and its DTO MembershipDTO.
*/
-@Mapper(componentModel = "spring", uses = {CustomerMapper.class})
+@Mapper(componentModel = "spring", uses = { CustomerMapper.class })
public interface MembershipMapper extends EntityMapper {
static String displayLabel(final Membership entity) {
final Customer customer = entity.getCustomer();
return CustomerMapper.displayLabel(customer) + " "
- + Objects.toString(entity.getMemberFromDate(), "") + " - "
- + Objects.toString(entity.getMemberUntilDate(), "...");
+ + Objects.toString(entity.getMemberFromDate(), "") + " - "
+ + Objects.toString(entity.getMemberUntilDate(), "...");
}
@Mapping(source = "customer.id", target = "customerId")
@@ -30,7 +32,7 @@ public interface MembershipMapper extends EntityMapper {
@Mapping(source = "customer.id", target = "customerId")
diff --git a/src/main/java/org/hostsharing/hsadminng/service/mapper/ShareMapper.java b/src/main/java/org/hostsharing/hsadminng/service/mapper/ShareMapper.java
index 80ddc52b..7ec02dca 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/mapper/ShareMapper.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/mapper/ShareMapper.java
@@ -1,7 +1,9 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.mapper;
import org.hostsharing.hsadminng.domain.Share;
import org.hostsharing.hsadminng.service.dto.ShareDTO;
+
import org.mapstruct.AfterMapping;
import org.mapstruct.Mapper;
import org.mapstruct.Mapping;
@@ -10,7 +12,7 @@ import org.mapstruct.MappingTarget;
/**
* Mapper for the entity Share and its DTO ShareDTO.
*/
-@Mapper(componentModel = "spring", uses = {MembershipMapper.class})
+@Mapper(componentModel = "spring", uses = { MembershipMapper.class })
public interface ShareMapper extends EntityMapper {
@Mapping(source = "membership.id", target = "membershipId")
diff --git a/src/main/java/org/hostsharing/hsadminng/service/mapper/UserMapper.java b/src/main/java/org/hostsharing/hsadminng/service/mapper/UserMapper.java
index 6bd4de24..5165f884 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/mapper/UserMapper.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/mapper/UserMapper.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.mapper;
import org.hostsharing.hsadminng.domain.Authority;
@@ -20,9 +21,9 @@ public class UserMapper {
public List usersToUserDTOs(List users) {
return users.stream()
- .filter(Objects::nonNull)
- .map(this::userToUserDTO)
- .collect(Collectors.toList());
+ .filter(Objects::nonNull)
+ .map(this::userToUserDTO)
+ .collect(Collectors.toList());
}
public UserDTO userToUserDTO(User user) {
@@ -31,9 +32,9 @@ public class UserMapper {
public List userDTOsToUsers(List userDTOs) {
return userDTOs.stream()
- .filter(Objects::nonNull)
- .map(this::userDTOToUser)
- .collect(Collectors.toList());
+ .filter(Objects::nonNull)
+ .map(this::userDTOToUser)
+ .collect(Collectors.toList());
}
public User userDTOToUser(UserDTO userDTO) {
@@ -55,11 +56,10 @@ public class UserMapper {
}
}
-
private Set authoritiesFromStrings(Set authoritiesAsString) {
Set authorities = new HashSet<>();
- if(authoritiesAsString != null){
+ if (authoritiesAsString != null) {
authorities = authoritiesAsString.stream().map(string -> {
Authority auth = new Authority();
auth.setName(string);
diff --git a/src/main/java/org/hostsharing/hsadminng/service/util/RandomUtil.java b/src/main/java/org/hostsharing/hsadminng/service/util/RandomUtil.java
index 122a5cd1..c1f914a4 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/util/RandomUtil.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/util/RandomUtil.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.util;
import org.apache.commons.lang3.RandomStringUtils;
@@ -45,8 +46,8 @@ public final class RandomUtil {
*
* @return the generated enum value
*/
- public static > E generateEnumValue(final Class enumType) {
+ public static > E generateEnumValue(final Class enumType) {
final E[] enumValues = enumType.getEnumConstants();
- return enumValues[RandomUtils.nextInt(0, enumValues.length-1)];
+ return enumValues[RandomUtils.nextInt(0, enumValues.length - 1)];
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/service/util/ReflectionUtil.java b/src/main/java/org/hostsharing/hsadminng/service/util/ReflectionUtil.java
index b1cf6e5d..574e098f 100644
--- a/src/main/java/org/hostsharing/hsadminng/service/util/ReflectionUtil.java
+++ b/src/main/java/org/hostsharing/hsadminng/service/util/ReflectionUtil.java
@@ -1,10 +1,10 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.util;
import java.lang.reflect.Field;
import java.lang.reflect.ParameterizedType;
import java.lang.reflect.Type;
-
public class ReflectionUtil {
public static Field getField(final Class> aClass, final String fieldName) {
@@ -38,24 +38,32 @@ public class ReflectionUtil {
}
/**
- * Searches the annotations of 'clazz' for an implemented interface 'rawInterface' and returns the class of the actual generics parameter at the specified index.
+ * Searches the annotations of 'clazz' for an implemented interface 'rawInterface' and returns the class of the actual
+ * generics parameter at the specified index.
*
- * @param clazz a class which implements the generic interface 'rawInterface'
+ * @param clazz a class which implements the generic interface 'rawInterface'
* @param rawInterface a generic interface
- * @param paramIndex the index of the generics parameter within 'rawInterface'
- * @param the expected class of the generics parameter at position 'index' in 'rawInterface'
+ * @param paramIndex the index of the generics parameter within 'rawInterface'
+ * @param the expected class of the generics parameter at position 'index' in 'rawInterface'
* @return the actual generics parameter
*/
- public static Class determineGenericInterfaceParameter(final Class> clazz, final Class> rawInterface, final int paramIndex) {
+ public static Class determineGenericInterfaceParameter(
+ final Class> clazz,
+ final Class> rawInterface,
+ final int paramIndex) {
final Class found = determineGenericInterfaceParameterImpl(clazz, rawInterface, paramIndex);
if (found == null) {
- throw new AssertionError(clazz.getSimpleName() + " expected to implement " + rawInterface.getSimpleName() + "<...>");
+ throw new AssertionError(
+ clazz.getSimpleName() + " expected to implement " + rawInterface.getSimpleName() + "<...>");
}
return found;
}
@SuppressWarnings("unchecked")
- private static Class determineGenericInterfaceParameterImpl(final Class> clazz, final Class> rawInterface, final int paramIndex) {
+ private static Class determineGenericInterfaceParameterImpl(
+ final Class> clazz,
+ final Class> rawInterface,
+ final int paramIndex) {
for (Type genericInterface : clazz.getGenericInterfaces()) {
if (genericInterface instanceof ParameterizedType) {
final ParameterizedType parameterizedType = (ParameterizedType) genericInterface;
@@ -80,15 +88,19 @@ public class ReflectionUtil {
}
/**
- * Searches the annotations of 'clazz' for an extended class 'rawClass' and returns the class of the actual generics parameter at the specified index.
+ * Searches the annotations of 'clazz' for an extended class 'rawClass' and returns the class of the actual generics
+ * parameter at the specified index.
*
- * @param clazz a class which implements the generic interface 'rawClass'
- * @param rawClass a generic class
+ * @param clazz a class which implements the generic interface 'rawClass'
+ * @param rawClass a generic class
* @param paramIndex the index of the generics parameter within 'rawClass'
- * @param the expected class of the generics parameter at position 'index' in 'rawClass'
+ * @param the expected class of the generics parameter at position 'index' in 'rawClass'
* @return the actual generics parameter
*/
- public static Class determineGenericClassParameter(final Class> clazz, final Class> rawClass, final int paramIndex) {
+ public static Class determineGenericClassParameter(
+ final Class> clazz,
+ final Class> rawClass,
+ final int paramIndex) {
final Class found = determineGenericClassParameterImpl(clazz, rawClass, paramIndex);
if (found == null) {
throw new AssertionError(clazz.getSimpleName() + " expected to extend " + rawClass.getSimpleName() + "<...>");
@@ -97,7 +109,10 @@ public class ReflectionUtil {
}
@SuppressWarnings("unchecked")
- private static Class determineGenericClassParameterImpl(final Class> clazz, final Class> rawClass, final int paramIndex) {
+ private static Class determineGenericClassParameterImpl(
+ final Class> clazz,
+ final Class> rawClass,
+ final int paramIndex) {
final Type genericClass = clazz.getGenericSuperclass();
if (genericClass instanceof ParameterizedType) {
final ParameterizedType parameterizedType = (ParameterizedType) genericClass;
@@ -118,6 +133,7 @@ public class ReflectionUtil {
@FunctionalInterface
public interface ThrowingSupplier {
+
T get() throws Exception;
}
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/AccountResource.java b/src/main/java/org/hostsharing/hsadminng/web/rest/AccountResource.java
index f949bd7e..4c0924d2 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/AccountResource.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/AccountResource.java
@@ -1,6 +1,6 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest;
-
import org.hostsharing.hsadminng.domain.User;
import org.hostsharing.hsadminng.repository.UserRepository;
import org.hostsharing.hsadminng.security.SecurityUtils;
@@ -18,9 +18,10 @@ import org.slf4j.LoggerFactory;
import org.springframework.http.HttpStatus;
import org.springframework.web.bind.annotation.*;
+import java.util.*;
+
import javax.servlet.http.HttpServletRequest;
import javax.validation.Valid;
-import java.util.*;
/**
* REST controller for managing the current user's account.
@@ -45,7 +46,7 @@ public class AccountResource {
}
/**
- * POST /register : register the user.
+ * POST /register : register the user.
*
* @param managedUserVM the managed user View Model
* @throws InvalidPasswordException 400 (Bad Request) if the password is incorrect
@@ -63,7 +64,7 @@ public class AccountResource {
}
/**
- * GET /activate : activate the registered user.
+ * GET /activate : activate the registered user.
*
* @param key the activation key
* @throws RuntimeException 500 (Internal Server Error) if the user couldn't be activated
@@ -77,7 +78,7 @@ public class AccountResource {
}
/**
- * GET /authenticate : check if the user is authenticated, and return its login.
+ * GET /authenticate : check if the user is authenticated, and return its login.
*
* @param request the HTTP request
* @return the login if the user is authenticated
@@ -89,7 +90,7 @@ public class AccountResource {
}
/**
- * GET /account : get the current user.
+ * GET /account : get the current user.
*
* @return the current user
* @throws RuntimeException 500 (Internal Server Error) if the user couldn't be returned
@@ -97,12 +98,12 @@ public class AccountResource {
@GetMapping("/account")
public UserDTO getAccount() {
return userService.getUserWithAuthorities()
- .map(UserDTO::new)
- .orElseThrow(() -> new InternalServerErrorException("User could not be found"));
+ .map(UserDTO::new)
+ .orElseThrow(() -> new InternalServerErrorException("User could not be found"));
}
/**
- * POST /account : update the current user information.
+ * POST /account : update the current user information.
*
* @param userDTO the current user information
* @throws EmailAlreadyUsedException 400 (Bad Request) if the email is already used
@@ -110,7 +111,8 @@ public class AccountResource {
*/
@PostMapping("/account")
public void saveAccount(@Valid @RequestBody UserDTO userDTO) {
- String userLogin = SecurityUtils.getCurrentUserLogin().orElseThrow(() -> new InternalServerErrorException("Current user login not found"));
+ String userLogin = SecurityUtils.getCurrentUserLogin()
+ .orElseThrow(() -> new InternalServerErrorException("Current user login not found"));
Optional existingUser = userRepository.findOneByEmailIgnoreCase(userDTO.getEmail());
if (existingUser.isPresent() && (!existingUser.get().getLogin().equalsIgnoreCase(userLogin))) {
throw new EmailAlreadyUsedException();
@@ -119,12 +121,16 @@ public class AccountResource {
if (!user.isPresent()) {
throw new InternalServerErrorException("User could not be found");
}
- userService.updateUser(userDTO.getFirstName(), userDTO.getLastName(), userDTO.getEmail(),
- userDTO.getLangKey(), userDTO.getImageUrl());
+ userService.updateUser(
+ userDTO.getFirstName(),
+ userDTO.getLastName(),
+ userDTO.getEmail(),
+ userDTO.getLangKey(),
+ userDTO.getImageUrl());
}
/**
- * POST /account/change-password : changes the current user's password
+ * POST /account/change-password : changes the current user's password
*
* @param passwordChangeDto current and new password
* @throws InvalidPasswordException 400 (Bad Request) if the new password is incorrect
@@ -138,21 +144,20 @@ public class AccountResource {
}
/**
- * POST /account/reset-password/init : Send an email to reset the password of the user
+ * POST /account/reset-password/init : Send an email to reset the password of the user
*
* @param mail the mail of the user
* @throws EmailNotFoundException 400 (Bad Request) if the email address is not registered
*/
@PostMapping(path = "/account/reset-password/init")
public void requestPasswordReset(@RequestBody String mail) {
- mailService.sendPasswordResetMail(
- userService.requestPasswordReset(mail)
- .orElseThrow(EmailNotFoundException::new)
- );
+ mailService.sendPasswordResetMail(
+ userService.requestPasswordReset(mail)
+ .orElseThrow(EmailNotFoundException::new));
}
/**
- * POST /account/reset-password/finish : Finish to reset the password of the user
+ * POST /account/reset-password/finish : Finish to reset the password of the user
*
* @param keyAndPassword the generated key and the new password
* @throws InvalidPasswordException 400 (Bad Request) if the password is incorrect
@@ -163,8 +168,7 @@ public class AccountResource {
if (!checkPasswordLength(keyAndPassword.getNewPassword())) {
throw new InvalidPasswordException();
}
- Optional user =
- userService.completePasswordReset(keyAndPassword.getNewPassword(), keyAndPassword.getKey());
+ Optional user = userService.completePasswordReset(keyAndPassword.getNewPassword(), keyAndPassword.getKey());
if (!user.isPresent()) {
throw new InternalServerErrorException("No user was found for this reset key");
@@ -173,7 +177,7 @@ public class AccountResource {
private static boolean checkPasswordLength(String password) {
return !StringUtils.isEmpty(password) &&
- password.length() >= ManagedUserVM.PASSWORD_MIN_LENGTH &&
- password.length() <= ManagedUserVM.PASSWORD_MAX_LENGTH;
+ password.length() >= ManagedUserVM.PASSWORD_MIN_LENGTH &&
+ password.length() <= ManagedUserVM.PASSWORD_MAX_LENGTH;
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/AssetResource.java b/src/main/java/org/hostsharing/hsadminng/web/rest/AssetResource.java
index c82ad9a1..ef5ebb17 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/AssetResource.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/AssetResource.java
@@ -1,6 +1,6 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest;
-import io.github.jhipster.web.util.ResponseUtil;
import org.hostsharing.hsadminng.service.AssetQueryService;
import org.hostsharing.hsadminng.service.AssetService;
import org.hostsharing.hsadminng.service.dto.AssetCriteria;
@@ -8,6 +8,9 @@ import org.hostsharing.hsadminng.service.dto.AssetDTO;
import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
import org.hostsharing.hsadminng.web.rest.util.HeaderUtil;
import org.hostsharing.hsadminng.web.rest.util.PaginationUtil;
+
+import io.github.jhipster.web.util.ResponseUtil;
+
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.data.domain.Page;
@@ -16,12 +19,13 @@ import org.springframework.http.HttpHeaders;
import org.springframework.http.ResponseEntity;
import org.springframework.web.bind.annotation.*;
-import javax.validation.Valid;
import java.net.URI;
import java.net.URISyntaxException;
import java.util.List;
import java.util.Optional;
+import javax.validation.Valid;
+
/**
* REST controller for managing Asset.
*/
@@ -43,10 +47,11 @@ public class AssetResource {
}
/**
- * POST /assets : Create a new asset.
+ * POST /assets : Create a new asset.
*
* @param assetDTO the assetDTO to create
- * @return the ResponseEntity with status 201 (Created) and with body the new assetDTO, or with status 400 (Bad Request) if the asset has already an ID
+ * @return the ResponseEntity with status 201 (Created) and with body the new assetDTO, or with status 400 (Bad Request) if
+ * the asset has already an ID
* @throws URISyntaxException if the Location URI syntax is incorrect
*/
@PostMapping("/assets")
@@ -57,17 +62,17 @@ public class AssetResource {
}
AssetDTO result = assetService.save(assetDTO);
return ResponseEntity.created(new URI("/api/assets/" + result.getId()))
- .headers(HeaderUtil.createEntityCreationAlert(ENTITY_NAME, result.getId().toString()))
- .body(result);
+ .headers(HeaderUtil.createEntityCreationAlert(ENTITY_NAME, result.getId().toString()))
+ .body(result);
}
/**
- * PUT /assets : Updates an existing asset.
+ * PUT /assets : Updates an existing asset.
*
* @param assetDTO the assetDTO to update
* @return the ResponseEntity with status 200 (OK) and with body the updated assetDTO,
- * or with status 400 (Bad Request) if the assetDTO is not valid,
- * or with status 500 (Internal Server Error) if the assetDTO couldn't be updated
+ * or with status 400 (Bad Request) if the assetDTO is not valid,
+ * or with status 500 (Internal Server Error) if the assetDTO couldn't be updated
* @throws URISyntaxException if the Location URI syntax is incorrect
*/
@PutMapping("/assets")
@@ -78,7 +83,7 @@ public class AssetResource {
}
/**
- * GET /assets : get all the assets.
+ * GET /assets : get all the assets.
*
* @param pageable the pagination information
* @param criteria the criterias which the requested entities should match
@@ -93,11 +98,11 @@ public class AssetResource {
}
/**
- * GET /assets/count : count all the assets.
- *
- * @param criteria the criterias which the requested entities should match
- * @return the ResponseEntity with status 200 (OK) and the count in body
- */
+ * GET /assets/count : count all the assets.
+ *
+ * @param criteria the criterias which the requested entities should match
+ * @return the ResponseEntity with status 200 (OK) and the count in body
+ */
@GetMapping("/assets/count")
public ResponseEntity countAssets(AssetCriteria criteria) {
log.debug("REST request to count Assets by criteria: {}", criteria);
@@ -105,7 +110,7 @@ public class AssetResource {
}
/**
- * GET /assets/:id : get the "id" asset.
+ * GET /assets/:id : get the "id" asset.
*
* @param id the id of the assetDTO to retrieve
* @return the ResponseEntity with status 200 (OK) and with body the assetDTO, or with status 404 (Not Found)
@@ -118,7 +123,7 @@ public class AssetResource {
}
/**
- * DELETE /assets/:id : delete the "id" asset.
+ * DELETE /assets/:id : delete the "id" asset.
*
* @param id the id of the assetDTO to delete
* @return the ResponseEntity with status 200 (OK)
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/AuditResource.java b/src/main/java/org/hostsharing/hsadminng/web/rest/AuditResource.java
index 91047d1a..e723bf88 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/AuditResource.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/AuditResource.java
@@ -1,9 +1,11 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest;
import org.hostsharing.hsadminng.service.AuditEventService;
import org.hostsharing.hsadminng.web.rest.util.PaginationUtil;
import io.github.jhipster.web.util.ResponseUtil;
+
import org.springframework.boot.actuate.audit.AuditEvent;
import org.springframework.data.domain.Page;
import org.springframework.data.domain.Pageable;
@@ -43,29 +45,29 @@ public class AuditResource {
}
/**
- * GET /audits : get a page of AuditEvents between the fromDate and toDate.
+ * GET /audits : get a page of AuditEvents between the fromDate and toDate.
*
* @param fromDate the start of the time period of AuditEvents to get
* @param toDate the end of the time period of AuditEvents to get
* @param pageable the pagination information
* @return the ResponseEntity with status 200 (OK) and the list of AuditEvents in body
*/
- @GetMapping(params = {"fromDate", "toDate"})
+ @GetMapping(params = { "fromDate", "toDate" })
public ResponseEntity> getByDates(
- @RequestParam(value = "fromDate") LocalDate fromDate,
- @RequestParam(value = "toDate") LocalDate toDate,
- Pageable pageable) {
+ @RequestParam(value = "fromDate") LocalDate fromDate,
+ @RequestParam(value = "toDate") LocalDate toDate,
+ Pageable pageable) {
Page page = auditEventService.findByDates(
- fromDate.atStartOfDay(ZoneId.systemDefault()).toInstant(),
- toDate.atStartOfDay(ZoneId.systemDefault()).plusDays(1).toInstant(),
- pageable);
+ fromDate.atStartOfDay(ZoneId.systemDefault()).toInstant(),
+ toDate.atStartOfDay(ZoneId.systemDefault()).plusDays(1).toInstant(),
+ pageable);
HttpHeaders headers = PaginationUtil.generatePaginationHttpHeaders(page, "/management/audits");
return new ResponseEntity<>(page.getContent(), headers, HttpStatus.OK);
}
/**
- * GET /audits/:id : get an AuditEvent by id.
+ * GET /audits/:id : get an AuditEvent by id.
*
* @param id the id of the entity to get
* @return the ResponseEntity with status 200 (OK) and the AuditEvent in body, or status 404 (Not Found)
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/CustomerResource.java b/src/main/java/org/hostsharing/hsadminng/web/rest/CustomerResource.java
index 6e7e3a81..fe7ee8d7 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/CustomerResource.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/CustomerResource.java
@@ -1,6 +1,6 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest;
-import io.github.jhipster.web.util.ResponseUtil;
import org.hostsharing.hsadminng.service.CustomerQueryService;
import org.hostsharing.hsadminng.service.CustomerService;
import org.hostsharing.hsadminng.service.dto.CustomerCriteria;
@@ -8,6 +8,9 @@ import org.hostsharing.hsadminng.service.dto.CustomerDTO;
import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
import org.hostsharing.hsadminng.web.rest.util.HeaderUtil;
import org.hostsharing.hsadminng.web.rest.util.PaginationUtil;
+
+import io.github.jhipster.web.util.ResponseUtil;
+
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.data.domain.Page;
@@ -16,12 +19,13 @@ import org.springframework.http.HttpHeaders;
import org.springframework.http.ResponseEntity;
import org.springframework.web.bind.annotation.*;
-import javax.validation.Valid;
import java.net.URI;
import java.net.URISyntaxException;
import java.util.List;
import java.util.Optional;
+import javax.validation.Valid;
+
/**
* REST controller for managing Customer.
*/
@@ -43,10 +47,11 @@ public class CustomerResource {
}
/**
- * POST /customers : Create a new customer.
+ * POST /customers : Create a new customer.
*
* @param customerDTO the customerDTO to create
- * @return the ResponseEntity with status 201 (Created) and with body the new customerDTO, or with status 400 (Bad Request) if the customer has already an ID
+ * @return the ResponseEntity with status 201 (Created) and with body the new customerDTO, or with status 400 (Bad Request)
+ * if the customer has already an ID
* @throws URISyntaxException if the Location URI syntax is incorrect
*/
@PostMapping("/customers")
@@ -57,17 +62,17 @@ public class CustomerResource {
}
CustomerDTO result = customerService.save(customerDTO);
return ResponseEntity.created(new URI("/api/customers/" + result.getId()))
- .headers(HeaderUtil.createEntityCreationAlert(ENTITY_NAME, result.getId().toString()))
- .body(result);
+ .headers(HeaderUtil.createEntityCreationAlert(ENTITY_NAME, result.getId().toString()))
+ .body(result);
}
/**
- * PUT /customers : Updates an existing customer.
+ * PUT /customers : Updates an existing customer.
*
* @param customerDTO the customerDTO to update
* @return the ResponseEntity with status 200 (OK) and with body the updated customerDTO,
- * or with status 400 (Bad Request) if the customerDTO is not valid,
- * or with status 500 (Internal Server Error) if the customerDTO couldn't be updated
+ * or with status 400 (Bad Request) if the customerDTO is not valid,
+ * or with status 500 (Internal Server Error) if the customerDTO couldn't be updated
* @throws URISyntaxException if the Location URI syntax is incorrect
*/
@PutMapping("/customers")
@@ -78,12 +83,12 @@ public class CustomerResource {
}
CustomerDTO result = customerService.save(customerDTO);
return ResponseEntity.ok()
- .headers(HeaderUtil.createEntityUpdateAlert(ENTITY_NAME, customerDTO.getId().toString()))
- .body(result);
+ .headers(HeaderUtil.createEntityUpdateAlert(ENTITY_NAME, customerDTO.getId().toString()))
+ .body(result);
}
/**
- * GET /customers : get all the customers.
+ * GET /customers : get all the customers.
*
* @param pageable the pagination information
* @param criteria the criterias which the requested entities should match
@@ -98,11 +103,11 @@ public class CustomerResource {
}
/**
- * GET /customers/count : count all the customers.
- *
- * @param criteria the criterias which the requested entities should match
- * @return the ResponseEntity with status 200 (OK) and the count in body
- */
+ * GET /customers/count : count all the customers.
+ *
+ * @param criteria the criterias which the requested entities should match
+ * @return the ResponseEntity with status 200 (OK) and the count in body
+ */
@GetMapping("/customers/count")
public ResponseEntity countCustomers(CustomerCriteria criteria) {
log.debug("REST request to count Customers by criteria: {}", criteria);
@@ -110,7 +115,7 @@ public class CustomerResource {
}
/**
- * GET /customers/:id : get the "id" customer.
+ * GET /customers/:id : get the "id" customer.
*
* @param id the id of the customerDTO to retrieve
* @return the ResponseEntity with status 200 (OK) and with body the customerDTO, or with status 404 (Not Found)
@@ -123,7 +128,7 @@ public class CustomerResource {
}
/**
- * DELETE /customers/:id : delete the "id" customer.
+ * DELETE /customers/:id : delete the "id" customer.
*
* @param id the id of the customerDTO to delete
* @return the ResponseEntity with status 200 (OK)
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/LogsResource.java b/src/main/java/org/hostsharing/hsadminng/web/rest/LogsResource.java
index 0c2a0d8a..08315c87 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/LogsResource.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/LogsResource.java
@@ -1,9 +1,11 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest;
import org.hostsharing.hsadminng.web.rest.vm.LoggerVM;
import ch.qos.logback.classic.Level;
import ch.qos.logback.classic.LoggerContext;
+
import org.slf4j.LoggerFactory;
import org.springframework.http.HttpStatus;
import org.springframework.web.bind.annotation.*;
@@ -22,9 +24,9 @@ public class LogsResource {
public List getList() {
LoggerContext context = (LoggerContext) LoggerFactory.getILoggerFactory();
return context.getLoggerList()
- .stream()
- .map(LoggerVM::new)
- .collect(Collectors.toList());
+ .stream()
+ .map(LoggerVM::new)
+ .collect(Collectors.toList());
}
@PutMapping("/logs")
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/MembershipResource.java b/src/main/java/org/hostsharing/hsadminng/web/rest/MembershipResource.java
index 795cd59e..ff7d38c2 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/MembershipResource.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/MembershipResource.java
@@ -1,6 +1,6 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest;
-import io.github.jhipster.web.util.ResponseUtil;
import org.hostsharing.hsadminng.service.MembershipQueryService;
import org.hostsharing.hsadminng.service.MembershipService;
import org.hostsharing.hsadminng.service.dto.MembershipCriteria;
@@ -8,6 +8,9 @@ import org.hostsharing.hsadminng.service.dto.MembershipDTO;
import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
import org.hostsharing.hsadminng.web.rest.util.HeaderUtil;
import org.hostsharing.hsadminng.web.rest.util.PaginationUtil;
+
+import io.github.jhipster.web.util.ResponseUtil;
+
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.data.domain.Page;
@@ -16,12 +19,13 @@ import org.springframework.http.HttpHeaders;
import org.springframework.http.ResponseEntity;
import org.springframework.web.bind.annotation.*;
-import javax.validation.Valid;
import java.net.URI;
import java.net.URISyntaxException;
import java.util.List;
import java.util.Optional;
+import javax.validation.Valid;
+
/**
* REST controller for managing Membership.
*/
@@ -43,47 +47,50 @@ public class MembershipResource {
}
/**
- * POST /memberships : Create a new membership.
+ * POST /memberships : Create a new membership.
*
* @param membershipDTO the membershipDTO to create
- * @return the ResponseEntity with status 201 (Created) and with body the new membershipDTO, or with status 400 (Bad Request) if the membership has already an ID
+ * @return the ResponseEntity with status 201 (Created) and with body the new membershipDTO, or with status 400 (Bad
+ * Request) if the membership has already an ID
* @throws URISyntaxException if the Location URI syntax is incorrect
*/
@PostMapping("/memberships")
- public ResponseEntity createMembership(@Valid @RequestBody MembershipDTO membershipDTO) throws URISyntaxException {
+ public ResponseEntity createMembership(@Valid @RequestBody MembershipDTO membershipDTO)
+ throws URISyntaxException {
log.debug("REST request to save Membership : {}", membershipDTO);
if (membershipDTO.getId() != null) {
throw new BadRequestAlertException("A new membership cannot already have an ID", ENTITY_NAME, "idexists");
}
MembershipDTO result = membershipService.save(membershipDTO);
return ResponseEntity.created(new URI("/api/memberships/" + result.getId()))
- .headers(HeaderUtil.createEntityCreationAlert(ENTITY_NAME, result.getId().toString()))
- .body(result);
+ .headers(HeaderUtil.createEntityCreationAlert(ENTITY_NAME, result.getId().toString()))
+ .body(result);
}
/**
- * PUT /memberships : Updates an existing membership.
+ * PUT /memberships : Updates an existing membership.
*
* @param membershipDTO the membershipDTO to update
* @return the ResponseEntity with status 200 (OK) and with body the updated membershipDTO,
- * or with status 400 (Bad Request) if the membershipDTO is not valid,
- * or with status 500 (Internal Server Error) if the membershipDTO couldn't be updated
+ * or with status 400 (Bad Request) if the membershipDTO is not valid,
+ * or with status 500 (Internal Server Error) if the membershipDTO couldn't be updated
* @throws URISyntaxException if the Location URI syntax is incorrect
*/
@PutMapping("/memberships")
- public ResponseEntity updateMembership(@Valid @RequestBody MembershipDTO membershipDTO) throws URISyntaxException {
+ public ResponseEntity updateMembership(@Valid @RequestBody MembershipDTO membershipDTO)
+ throws URISyntaxException {
log.debug("REST request to update Membership : {}", membershipDTO);
if (membershipDTO.getId() == null) {
throw new BadRequestAlertException("Invalid id", ENTITY_NAME, "idnull");
}
MembershipDTO result = membershipService.save(membershipDTO);
return ResponseEntity.ok()
- .headers(HeaderUtil.createEntityUpdateAlert(ENTITY_NAME, membershipDTO.getId().toString()))
- .body(result);
+ .headers(HeaderUtil.createEntityUpdateAlert(ENTITY_NAME, membershipDTO.getId().toString()))
+ .body(result);
}
/**
- * GET /memberships : get all the memberships.
+ * GET /memberships : get all the memberships.
*
* @param pageable the pagination information
* @param criteria the criterias which the requested entities should match
@@ -98,11 +105,11 @@ public class MembershipResource {
}
/**
- * GET /memberships/count : count all the memberships.
- *
- * @param criteria the criterias which the requested entities should match
- * @return the ResponseEntity with status 200 (OK) and the count in body
- */
+ * GET /memberships/count : count all the memberships.
+ *
+ * @param criteria the criterias which the requested entities should match
+ * @return the ResponseEntity with status 200 (OK) and the count in body
+ */
@GetMapping("/memberships/count")
public ResponseEntity countMemberships(MembershipCriteria criteria) {
log.debug("REST request to count Memberships by criteria: {}", criteria);
@@ -110,7 +117,7 @@ public class MembershipResource {
}
/**
- * GET /memberships/:id : get the "id" membership.
+ * GET /memberships/:id : get the "id" membership.
*
* @param id the id of the membershipDTO to retrieve
* @return the ResponseEntity with status 200 (OK) and with body the membershipDTO, or with status 404 (Not Found)
@@ -123,7 +130,7 @@ public class MembershipResource {
}
/**
- * DELETE /memberships/:id : delete the "id" membership.
+ * DELETE /memberships/:id : delete the "id" membership.
*
* @param id the id of the membershipDTO to delete
* @return the ResponseEntity with status 200 (OK)
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/SepaMandateResource.java b/src/main/java/org/hostsharing/hsadminng/web/rest/SepaMandateResource.java
index 246d845e..58a1dd27 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/SepaMandateResource.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/SepaMandateResource.java
@@ -1,28 +1,31 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest;
+
+import org.hostsharing.hsadminng.service.SepaMandateQueryService;
import org.hostsharing.hsadminng.service.SepaMandateService;
+import org.hostsharing.hsadminng.service.dto.SepaMandateCriteria;
+import org.hostsharing.hsadminng.service.dto.SepaMandateDTO;
import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
import org.hostsharing.hsadminng.web.rest.util.HeaderUtil;
import org.hostsharing.hsadminng.web.rest.util.PaginationUtil;
-import org.hostsharing.hsadminng.service.dto.SepaMandateDTO;
-import org.hostsharing.hsadminng.service.dto.SepaMandateCriteria;
-import org.hostsharing.hsadminng.service.SepaMandateQueryService;
+
import io.github.jhipster.web.util.ResponseUtil;
+
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.data.domain.Page;
import org.springframework.data.domain.Pageable;
import org.springframework.http.HttpHeaders;
-import org.springframework.http.HttpStatus;
import org.springframework.http.ResponseEntity;
import org.springframework.web.bind.annotation.*;
-import javax.validation.Valid;
import java.net.URI;
import java.net.URISyntaxException;
-
import java.util.List;
import java.util.Optional;
+import javax.validation.Valid;
+
/**
* REST controller for managing SepaMandate.
*/
@@ -44,47 +47,50 @@ public class SepaMandateResource {
}
/**
- * POST /sepa-mandates : Create a new sepaMandate.
+ * POST /sepa-mandates : Create a new sepaMandate.
*
* @param sepaMandateDTO the sepaMandateDTO to create
- * @return the ResponseEntity with status 201 (Created) and with body the new sepaMandateDTO, or with status 400 (Bad Request) if the sepaMandate has already an ID
+ * @return the ResponseEntity with status 201 (Created) and with body the new sepaMandateDTO, or with status 400 (Bad
+ * Request) if the sepaMandate has already an ID
* @throws URISyntaxException if the Location URI syntax is incorrect
*/
@PostMapping("/sepa-mandates")
- public ResponseEntity createSepaMandate(@Valid @RequestBody SepaMandateDTO sepaMandateDTO) throws URISyntaxException {
+ public ResponseEntity createSepaMandate(@Valid @RequestBody SepaMandateDTO sepaMandateDTO)
+ throws URISyntaxException {
log.debug("REST request to save SepaMandate : {}", sepaMandateDTO);
if (sepaMandateDTO.getId() != null) {
throw new BadRequestAlertException("A new sepaMandate cannot already have an ID", ENTITY_NAME, "idexists");
}
SepaMandateDTO result = sepaMandateService.save(sepaMandateDTO);
return ResponseEntity.created(new URI("/api/sepa-mandates/" + result.getId()))
- .headers(HeaderUtil.createEntityCreationAlert(ENTITY_NAME, result.getId().toString()))
- .body(result);
+ .headers(HeaderUtil.createEntityCreationAlert(ENTITY_NAME, result.getId().toString()))
+ .body(result);
}
/**
- * PUT /sepa-mandates : Updates an existing sepaMandate.
+ * PUT /sepa-mandates : Updates an existing sepaMandate.
*
* @param sepaMandateDTO the sepaMandateDTO to update
* @return the ResponseEntity with status 200 (OK) and with body the updated sepaMandateDTO,
- * or with status 400 (Bad Request) if the sepaMandateDTO is not valid,
- * or with status 500 (Internal Server Error) if the sepaMandateDTO couldn't be updated
+ * or with status 400 (Bad Request) if the sepaMandateDTO is not valid,
+ * or with status 500 (Internal Server Error) if the sepaMandateDTO couldn't be updated
* @throws URISyntaxException if the Location URI syntax is incorrect
*/
@PutMapping("/sepa-mandates")
- public ResponseEntity updateSepaMandate(@Valid @RequestBody SepaMandateDTO sepaMandateDTO) throws URISyntaxException {
+ public ResponseEntity updateSepaMandate(@Valid @RequestBody SepaMandateDTO sepaMandateDTO)
+ throws URISyntaxException {
log.debug("REST request to update SepaMandate : {}", sepaMandateDTO);
if (sepaMandateDTO.getId() == null) {
throw new BadRequestAlertException("Invalid id", ENTITY_NAME, "idnull");
}
SepaMandateDTO result = sepaMandateService.save(sepaMandateDTO);
return ResponseEntity.ok()
- .headers(HeaderUtil.createEntityUpdateAlert(ENTITY_NAME, sepaMandateDTO.getId().toString()))
- .body(result);
+ .headers(HeaderUtil.createEntityUpdateAlert(ENTITY_NAME, sepaMandateDTO.getId().toString()))
+ .body(result);
}
/**
- * GET /sepa-mandates : get all the sepaMandates.
+ * GET /sepa-mandates : get all the sepaMandates.
*
* @param pageable the pagination information
* @param criteria the criterias which the requested entities should match
@@ -99,11 +105,11 @@ public class SepaMandateResource {
}
/**
- * GET /sepa-mandates/count : count all the sepaMandates.
- *
- * @param criteria the criterias which the requested entities should match
- * @return the ResponseEntity with status 200 (OK) and the count in body
- */
+ * GET /sepa-mandates/count : count all the sepaMandates.
+ *
+ * @param criteria the criterias which the requested entities should match
+ * @return the ResponseEntity with status 200 (OK) and the count in body
+ */
@GetMapping("/sepa-mandates/count")
public ResponseEntity countSepaMandates(SepaMandateCriteria criteria) {
log.debug("REST request to count SepaMandates by criteria: {}", criteria);
@@ -111,7 +117,7 @@ public class SepaMandateResource {
}
/**
- * GET /sepa-mandates/:id : get the "id" sepaMandate.
+ * GET /sepa-mandates/:id : get the "id" sepaMandate.
*
* @param id the id of the sepaMandateDTO to retrieve
* @return the ResponseEntity with status 200 (OK) and with body the sepaMandateDTO, or with status 404 (Not Found)
@@ -124,7 +130,7 @@ public class SepaMandateResource {
}
/**
- * DELETE /sepa-mandates/:id : delete the "id" sepaMandate.
+ * DELETE /sepa-mandates/:id : delete the "id" sepaMandate.
*
* @param id the id of the sepaMandateDTO to delete
* @return the ResponseEntity with status 200 (OK)
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/ShareResource.java b/src/main/java/org/hostsharing/hsadminng/web/rest/ShareResource.java
index 64bc8430..f34d0ccb 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/ShareResource.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/ShareResource.java
@@ -1,6 +1,6 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest;
-import io.github.jhipster.web.util.ResponseUtil;
import org.hostsharing.hsadminng.service.ShareQueryService;
import org.hostsharing.hsadminng.service.ShareService;
import org.hostsharing.hsadminng.service.dto.ShareCriteria;
@@ -8,6 +8,9 @@ import org.hostsharing.hsadminng.service.dto.ShareDTO;
import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
import org.hostsharing.hsadminng.web.rest.util.HeaderUtil;
import org.hostsharing.hsadminng.web.rest.util.PaginationUtil;
+
+import io.github.jhipster.web.util.ResponseUtil;
+
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.data.domain.Page;
@@ -16,12 +19,13 @@ import org.springframework.http.HttpHeaders;
import org.springframework.http.ResponseEntity;
import org.springframework.web.bind.annotation.*;
-import javax.validation.Valid;
import java.net.URI;
import java.net.URISyntaxException;
import java.util.List;
import java.util.Optional;
+import javax.validation.Valid;
+
/**
* REST controller for managing Share.
*/
@@ -43,10 +47,11 @@ public class ShareResource {
}
/**
- * POST /shares : Create a new share.
+ * POST /shares : Create a new share.
*
* @param shareDTO the shareDTO to create
- * @return the ResponseEntity with status 201 (Created) and with body the new shareDTO, or with status 400 (Bad Request) if the share has already an ID
+ * @return the ResponseEntity with status 201 (Created) and with body the new shareDTO, or with status 400 (Bad Request) if
+ * the share has already an ID
* @throws URISyntaxException if the Location URI syntax is incorrect
*/
@PostMapping("/shares")
@@ -57,17 +62,17 @@ public class ShareResource {
}
ShareDTO result = shareService.save(shareDTO);
return ResponseEntity.created(new URI("/api/shares/" + result.getId()))
- .headers(HeaderUtil.createEntityCreationAlert(ENTITY_NAME, result.getId().toString()))
- .body(result);
+ .headers(HeaderUtil.createEntityCreationAlert(ENTITY_NAME, result.getId().toString()))
+ .body(result);
}
/**
- * PUT /shares : Updates an existing share.
+ * PUT /shares : Updates an existing share.
*
* @param shareDTO the shareDTO to update
* @return the ResponseEntity with status 200 (OK) and with body the updated shareDTO,
- * or with status 400 (Bad Request) if the shareDTO is not valid,
- * or with status 500 (Internal Server Error) if the shareDTO couldn't be updated
+ * or with status 400 (Bad Request) if the shareDTO is not valid,
+ * or with status 500 (Internal Server Error) if the shareDTO couldn't be updated
* @throws URISyntaxException if the Location URI syntax is incorrect
*/
@PutMapping("/shares")
@@ -78,7 +83,7 @@ public class ShareResource {
}
/**
- * GET /shares : get all the shares.
+ * GET /shares : get all the shares.
*
* @param pageable the pagination information
* @param criteria the criterias which the requested entities should match
@@ -93,11 +98,11 @@ public class ShareResource {
}
/**
- * GET /shares/count : count all the shares.
- *
- * @param criteria the criterias which the requested entities should match
- * @return the ResponseEntity with status 200 (OK) and the count in body
- */
+ * GET /shares/count : count all the shares.
+ *
+ * @param criteria the criterias which the requested entities should match
+ * @return the ResponseEntity with status 200 (OK) and the count in body
+ */
@GetMapping("/shares/count")
public ResponseEntity countShares(ShareCriteria criteria) {
log.debug("REST request to count Shares by criteria: {}", criteria);
@@ -105,7 +110,7 @@ public class ShareResource {
}
/**
- * GET /shares/:id : get the "id" share.
+ * GET /shares/:id : get the "id" share.
*
* @param id the id of the shareDTO to retrieve
* @return the ResponseEntity with status 200 (OK) and with body the shareDTO, or with status 404 (Not Found)
@@ -118,7 +123,7 @@ public class ShareResource {
}
/**
- * DELETE /shares/:id : delete the "id" share.
+ * DELETE /shares/:id : delete the "id" share.
*
* @param id the id of the shareDTO to delete
* @return the ResponseEntity with status 200 (OK)
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/UserJWTController.java b/src/main/java/org/hostsharing/hsadminng/web/rest/UserJWTController.java
index b2d33946..db3ef0ff 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/UserJWTController.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/UserJWTController.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest;
import org.hostsharing.hsadminng.security.jwt.JWTFilter;
@@ -36,8 +37,9 @@ public class UserJWTController {
@PostMapping("/authenticate")
public ResponseEntity authorize(@Valid @RequestBody LoginVM loginVM) {
- UsernamePasswordAuthenticationToken authenticationToken =
- new UsernamePasswordAuthenticationToken(loginVM.getUsername(), loginVM.getPassword());
+ UsernamePasswordAuthenticationToken authenticationToken = new UsernamePasswordAuthenticationToken(
+ loginVM.getUsername(),
+ loginVM.getPassword());
Authentication authentication = this.authenticationManager.authenticate(authenticationToken);
SecurityContextHolder.getContext().setAuthentication(authentication);
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/UserResource.java b/src/main/java/org/hostsharing/hsadminng/web/rest/UserResource.java
index 97edaedd..eaff107e 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/UserResource.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/UserResource.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest;
import org.hostsharing.hsadminng.config.Constants;
@@ -12,6 +13,7 @@ import org.hostsharing.hsadminng.web.rest.errors.EmailAlreadyUsedException;
import org.hostsharing.hsadminng.web.rest.errors.LoginAlreadyUsedException;
import org.hostsharing.hsadminng.web.rest.util.HeaderUtil;
import org.hostsharing.hsadminng.web.rest.util.PaginationUtil;
+
import io.github.jhipster.web.util.ResponseUtil;
import org.slf4j.Logger;
@@ -24,11 +26,12 @@ import org.springframework.http.ResponseEntity;
import org.springframework.security.access.prepost.PreAuthorize;
import org.springframework.web.bind.annotation.*;
-import javax.validation.Valid;
import java.net.URI;
import java.net.URISyntaxException;
import java.util.*;
+import javax.validation.Valid;
+
/**
* REST controller for managing users.
*
@@ -44,11 +47,11 @@ import java.util.*;
* quite often do relationships with the user, and we don't want them to get the authorities all
* the time for nothing (for performance reasons). This is the #1 goal: we should not impact our users'
* application because of this use-case.
- *
Not having an outer join causes n+1 requests to the database. This is not a real issue as
+ * Not having an outer join causes n+1 requests to the database. This is not a real issue as
* we have by default a second-level cache. This means on the first HTTP call we do the n+1 requests,
* but then all authorities come from the cache, so in fact it's much better than doing an outer join
* (which will get lots of data from the database, for each HTTP call).
- * As this manages users, for security reasons, we'd rather have a DTO layer.
+ * As this manages users, for security reasons, we'd rather have a DTO layer.
*
*
* Another option would be to have a specific JPA entity graph to handle this case.
@@ -73,14 +76,15 @@ public class UserResource {
}
/**
- * POST /users : Creates a new user.
+ * POST /users : Creates a new user.
*
* Creates a new user if the login and email are not already used, and sends an
* mail with an activation link.
* The user needs to be activated on creation.
*
* @param userDTO the user to create
- * @return the ResponseEntity with status 201 (Created) and with body the new user, or with status 400 (Bad Request) if the login or email is already in use
+ * @return the ResponseEntity with status 201 (Created) and with body the new user, or with status 400 (Bad Request) if the
+ * login or email is already in use
* @throws URISyntaxException if the Location URI syntax is incorrect
* @throws BadRequestAlertException 400 (Bad Request) if the login or email is already in use
*/
@@ -100,8 +104,8 @@ public class UserResource {
User newUser = userService.createUser(userDTO);
mailService.sendCreationEmail(newUser);
return ResponseEntity.created(new URI("/api/users/" + newUser.getLogin()))
- .headers(HeaderUtil.createAlert( "userManagement.created", newUser.getLogin()))
- .body(newUser);
+ .headers(HeaderUtil.createAlert("userManagement.created", newUser.getLogin()))
+ .body(newUser);
}
}
@@ -127,8 +131,9 @@ public class UserResource {
}
Optional updatedUser = userService.updateUser(userDTO);
- return ResponseUtil.wrapOrNotFound(updatedUser,
- HeaderUtil.createAlert("userManagement.updated", userDTO.getLogin()));
+ return ResponseUtil.wrapOrNotFound(
+ updatedUser,
+ HeaderUtil.createAlert("userManagement.updated", userDTO.getLogin()));
}
/**
@@ -163,8 +168,8 @@ public class UserResource {
public ResponseEntity getUser(@PathVariable String login) {
log.debug("REST request to get User : {}", login);
return ResponseUtil.wrapOrNotFound(
- userService.getUserWithAuthoritiesByLogin(login)
- .map(UserDTO::new));
+ userService.getUserWithAuthoritiesByLogin(login)
+ .map(UserDTO::new));
}
/**
@@ -178,6 +183,6 @@ public class UserResource {
public ResponseEntity deleteUser(@PathVariable String login) {
log.debug("REST request to delete User: {}", login);
userService.deleteUser(login);
- return ResponseEntity.ok().headers(HeaderUtil.createAlert( "userManagement.deleted", login)).build();
+ return ResponseEntity.ok().headers(HeaderUtil.createAlert("userManagement.deleted", login)).build();
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/errors/BadRequestAlertException.java b/src/main/java/org/hostsharing/hsadminng/web/rest/errors/BadRequestAlertException.java
index f395377a..eb87b2ef 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/errors/BadRequestAlertException.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/errors/BadRequestAlertException.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest.errors;
import org.zalando.problem.AbstractThrowableProblem;
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/errors/CustomParameterizedException.java b/src/main/java/org/hostsharing/hsadminng/web/rest/errors/CustomParameterizedException.java
index 8b7fb8e9..359e1d8b 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/errors/CustomParameterizedException.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/errors/CustomParameterizedException.java
@@ -1,12 +1,13 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest.errors;
+import static org.zalando.problem.Status.BAD_REQUEST;
+
import org.zalando.problem.AbstractThrowableProblem;
import java.util.HashMap;
import java.util.Map;
-import static org.zalando.problem.Status.BAD_REQUEST;
-
/**
* Custom, parameterized exception, which can be translated on the client side.
* For example:
@@ -32,7 +33,13 @@ public class CustomParameterizedException extends AbstractThrowableProblem {
}
public CustomParameterizedException(String message, Map paramMap) {
- super(ErrorConstants.PARAMETERIZED_TYPE, "Parameterized Exception", BAD_REQUEST, null, null, null, toProblemParameters(message, paramMap));
+ super(ErrorConstants.PARAMETERIZED_TYPE,
+ "Parameterized Exception",
+ BAD_REQUEST,
+ null,
+ null,
+ null,
+ toProblemParameters(message, paramMap));
}
public static Map toParamMap(String... params) {
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/errors/EmailAlreadyUsedException.java b/src/main/java/org/hostsharing/hsadminng/web/rest/errors/EmailAlreadyUsedException.java
index 1ec0f3c1..473297c1 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/errors/EmailAlreadyUsedException.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/errors/EmailAlreadyUsedException.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest.errors;
public class EmailAlreadyUsedException extends BadRequestAlertException {
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/errors/EmailNotFoundException.java b/src/main/java/org/hostsharing/hsadminng/web/rest/errors/EmailNotFoundException.java
index c4393c60..31ffcade 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/errors/EmailNotFoundException.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/errors/EmailNotFoundException.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest.errors;
import org.zalando.problem.AbstractThrowableProblem;
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/errors/ErrorConstants.java b/src/main/java/org/hostsharing/hsadminng/web/rest/errors/ErrorConstants.java
index 2a9f016f..fff79e48 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/errors/ErrorConstants.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/errors/ErrorConstants.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest.errors;
import java.net.URI;
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/errors/ExceptionTranslator.java b/src/main/java/org/hostsharing/hsadminng/web/rest/errors/ExceptionTranslator.java
index ea414e84..5aa2a5b9 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/errors/ExceptionTranslator.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/errors/ExceptionTranslator.java
@@ -1,5 +1,8 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest.errors;
+import static org.hostsharing.hsadminng.web.rest.errors.ErrorConstants.*;
+
import org.hostsharing.hsadminng.web.rest.util.HeaderUtil;
import org.springframework.dao.ConcurrencyFailureException;
@@ -20,14 +23,13 @@ import org.zalando.problem.Status;
import org.zalando.problem.spring.web.advice.ProblemHandling;
import org.zalando.problem.violations.ConstraintViolationProblem;
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
-import javax.servlet.http.HttpServletRequest;
import java.util.List;
import java.util.NoSuchElementException;
import java.util.stream.Collectors;
-import static org.hostsharing.hsadminng.web.rest.errors.ErrorConstants.*;
+import javax.annotation.Nonnull;
+import javax.annotation.Nullable;
+import javax.servlet.http.HttpServletRequest;
/**
* Controller advice to translate the server side exceptions to client-friendly json structures.
@@ -54,20 +56,20 @@ public class ExceptionTranslator implements ProblemHandling {
return entity;
}
ProblemBuilder builder = Problem.builder()
- .withType(Problem.DEFAULT_TYPE.equals(problem.getType()) ? DEFAULT_TYPE : problem.getType())
- .withStatus(problem.getStatus())
- .withTitle(problem.getTitle())
- .with(PATH_KEY, request.getNativeRequest(HttpServletRequest.class).getRequestURI());
+ .withType(Problem.DEFAULT_TYPE.equals(problem.getType()) ? DEFAULT_TYPE : problem.getType())
+ .withStatus(problem.getStatus())
+ .withTitle(problem.getTitle())
+ .with(PATH_KEY, request.getNativeRequest(HttpServletRequest.class).getRequestURI());
if (problem instanceof ConstraintViolationProblem) {
builder
- .with(VIOLATIONS_KEY, ((ConstraintViolationProblem) problem).getViolations())
- .with(MESSAGE_KEY, ERR_VALIDATION);
+ .with(VIOLATIONS_KEY, ((ConstraintViolationProblem) problem).getViolations())
+ .with(MESSAGE_KEY, ERR_VALIDATION);
} else {
builder
- .withCause(((DefaultProblem) problem).getCause())
- .withDetail(problem.getDetail())
- .withInstance(problem.getInstance());
+ .withCause(((DefaultProblem) problem).getCause())
+ .withDetail(problem.getDetail())
+ .withInstance(problem.getInstance());
problem.getParameters().forEach(builder::with);
if (!problem.getParameters().containsKey(MESSAGE_KEY) && problem.getStatus() != null) {
builder.with(MESSAGE_KEY, "error.http." + problem.getStatus().getStatusCode());
@@ -77,28 +79,31 @@ public class ExceptionTranslator implements ProblemHandling {
}
@Override
- public ResponseEntity handleMethodArgumentNotValid(MethodArgumentNotValidException ex, @Nonnull NativeWebRequest request) {
+ public ResponseEntity handleMethodArgumentNotValid(
+ MethodArgumentNotValidException ex,
+ @Nonnull NativeWebRequest request) {
BindingResult result = ex.getBindingResult();
- List fieldErrors = result.getFieldErrors().stream()
- .map(f -> new FieldErrorVM(f.getObjectName(), f.getField(), f.getCode()))
- .collect(Collectors.toList());
+ List fieldErrors = result.getFieldErrors()
+ .stream()
+ .map(f -> new FieldErrorVM(f.getObjectName(), f.getField(), f.getCode()))
+ .collect(Collectors.toList());
Problem problem = Problem.builder()
- .withType(CONSTRAINT_VIOLATION_TYPE)
- .withTitle("Method argument not valid")
- .withStatus(defaultConstraintViolationStatus())
- .with(MESSAGE_KEY, ERR_VALIDATION)
- .with(FIELD_ERRORS_KEY, fieldErrors)
- .build();
+ .withType(CONSTRAINT_VIOLATION_TYPE)
+ .withTitle("Method argument not valid")
+ .withStatus(defaultConstraintViolationStatus())
+ .with(MESSAGE_KEY, ERR_VALIDATION)
+ .with(FIELD_ERRORS_KEY, fieldErrors)
+ .build();
return create(ex, problem, request);
}
@ExceptionHandler
public ResponseEntity handleNoSuchElementException(NoSuchElementException ex, NativeWebRequest request) {
Problem problem = Problem.builder()
- .withStatus(Status.NOT_FOUND)
- .with(MESSAGE_KEY, ENTITY_NOT_FOUND_TYPE)
- .build();
+ .withStatus(Status.NOT_FOUND)
+ .with(MESSAGE_KEY, ENTITY_NOT_FOUND_TYPE)
+ .build();
return create(ex, problem, request);
}
@@ -110,21 +115,23 @@ public class ExceptionTranslator implements ProblemHandling {
@ExceptionHandler
public ResponseEntity handleConcurrencyFailure(ConcurrencyFailureException ex, NativeWebRequest request) {
Problem problem = Problem.builder()
- .withStatus(Status.CONFLICT)
- .with(MESSAGE_KEY, ERR_CONCURRENCY_FAILURE)
- .build();
+ .withStatus(Status.CONFLICT)
+ .with(MESSAGE_KEY, ERR_CONCURRENCY_FAILURE)
+ .build();
return create(ex, problem, request);
}
@ExceptionHandler(DataIntegrityViolationException.class)
@ResponseBody
@ResponseStatus(HttpStatus.CONFLICT)
- public ResponseEntity processDataIntegrityViolationException(DataIntegrityViolationException exception, NativeWebRequest request) {
+ public ResponseEntity processDataIntegrityViolationException(
+ DataIntegrityViolationException exception,
+ NativeWebRequest request) {
// UX_CUSTOMER_JHI_NUMBER_INDEX_5
Problem problem = Problem.builder()
- .withStatus(Status.CONFLICT)
- .with(MESSAGE_KEY, ERR_VALIDATION_DUPLICATE)
- .build();
+ .withStatus(Status.CONFLICT)
+ .with(MESSAGE_KEY, ERR_VALIDATION_DUPLICATE)
+ .build();
return create(exception, problem, request);
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/errors/FieldErrorVM.java b/src/main/java/org/hostsharing/hsadminng/web/rest/errors/FieldErrorVM.java
index e95700c4..353102ec 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/errors/FieldErrorVM.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/errors/FieldErrorVM.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest.errors;
import java.io.Serializable;
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/errors/InternalServerErrorException.java b/src/main/java/org/hostsharing/hsadminng/web/rest/errors/InternalServerErrorException.java
index f8bb283f..3221fcca 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/errors/InternalServerErrorException.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/errors/InternalServerErrorException.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest.errors;
import org.zalando.problem.AbstractThrowableProblem;
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/errors/InvalidPasswordException.java b/src/main/java/org/hostsharing/hsadminng/web/rest/errors/InvalidPasswordException.java
index 56297f16..e04b0b98 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/errors/InvalidPasswordException.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/errors/InvalidPasswordException.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest.errors;
import org.zalando.problem.AbstractThrowableProblem;
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/errors/LoginAlreadyUsedException.java b/src/main/java/org/hostsharing/hsadminng/web/rest/errors/LoginAlreadyUsedException.java
index e28fc705..44d82faf 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/errors/LoginAlreadyUsedException.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/errors/LoginAlreadyUsedException.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest.errors;
public class LoginAlreadyUsedException extends BadRequestAlertException {
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/util/HeaderUtil.java b/src/main/java/org/hostsharing/hsadminng/web/rest/util/HeaderUtil.java
index 4f977822..3771468d 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/util/HeaderUtil.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/util/HeaderUtil.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest.util;
import org.slf4j.Logger;
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/util/PaginationUtil.java b/src/main/java/org/hostsharing/hsadminng/web/rest/util/PaginationUtil.java
index 2c2c15b3..bcd04789 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/util/PaginationUtil.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/util/PaginationUtil.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest.util;
import org.springframework.data.domain.Page;
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/vm/KeyAndPasswordVM.java b/src/main/java/org/hostsharing/hsadminng/web/rest/vm/KeyAndPasswordVM.java
index c2aad359..8d85d8ef 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/vm/KeyAndPasswordVM.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/vm/KeyAndPasswordVM.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest.vm;
/**
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/vm/LoggerVM.java b/src/main/java/org/hostsharing/hsadminng/web/rest/vm/LoggerVM.java
index cc2ed9eb..edc032c2 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/vm/LoggerVM.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/vm/LoggerVM.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest.vm;
import ch.qos.logback.classic.Logger;
@@ -39,8 +40,8 @@ public class LoggerVM {
@Override
public String toString() {
return "LoggerVM{" +
- "name='" + name + '\'' +
- ", level='" + level + '\'' +
- '}';
+ "name='" + name + '\'' +
+ ", level='" + level + '\'' +
+ '}';
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/vm/LoginVM.java b/src/main/java/org/hostsharing/hsadminng/web/rest/vm/LoginVM.java
index c04410d9..951c7d46 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/vm/LoginVM.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/vm/LoginVM.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest.vm;
import javax.validation.constraints.NotNull;
@@ -45,8 +46,8 @@ public class LoginVM {
@Override
public String toString() {
return "LoginVM{" +
- "username='" + username + '\'' +
- ", rememberMe=" + rememberMe +
- '}';
+ "username='" + username + '\'' +
+ ", rememberMe=" + rememberMe +
+ '}';
}
}
diff --git a/src/main/java/org/hostsharing/hsadminng/web/rest/vm/ManagedUserVM.java b/src/main/java/org/hostsharing/hsadminng/web/rest/vm/ManagedUserVM.java
index 39f7bd25..08005ceb 100644
--- a/src/main/java/org/hostsharing/hsadminng/web/rest/vm/ManagedUserVM.java
+++ b/src/main/java/org/hostsharing/hsadminng/web/rest/vm/ManagedUserVM.java
@@ -1,6 +1,8 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.web.rest.vm;
import org.hostsharing.hsadminng.service.dto.UserDTO;
+
import javax.validation.constraints.Size;
/**
@@ -30,6 +32,6 @@ public class ManagedUserVM extends UserDTO {
@Override
public String toString() {
return "ManagedUserVM{" +
- "} " + super.toString();
+ "} " + super.toString();
}
}
diff --git a/src/test/java/org/hostsharing/hsadminng/config/WebConfigurerTest.java b/src/test/java/org/hostsharing/hsadminng/config/WebConfigurerTest.java
index 0bdc442b..bd2b6447 100644
--- a/src/test/java/org/hostsharing/hsadminng/config/WebConfigurerTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/config/WebConfigurerTest.java
@@ -1,13 +1,23 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.config;
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.mockito.ArgumentMatchers.any;
+import static org.mockito.ArgumentMatchers.anyString;
+import static org.mockito.Mockito.*;
+import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get;
+import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.options;
+import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.header;
+import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.status;
+
import io.github.jhipster.config.JHipsterConstants;
import io.github.jhipster.config.JHipsterProperties;
import io.github.jhipster.web.filter.CachingHttpHeadersFilter;
import io.undertow.Undertow;
import io.undertow.Undertow.Builder;
import io.undertow.UndertowOptions;
-import org.apache.commons.io.FilenameUtils;
+import org.apache.commons.io.FilenameUtils;
import org.h2.server.web.WebServlet;
import org.junit.Before;
import org.junit.Test;
@@ -20,17 +30,9 @@ import org.springframework.test.web.servlet.MockMvc;
import org.springframework.test.web.servlet.setup.MockMvcBuilders;
import org.xnio.OptionMap;
-import javax.servlet.*;
import java.util.*;
-import static org.assertj.core.api.Assertions.assertThat;
-import static org.mockito.ArgumentMatchers.any;
-import static org.mockito.ArgumentMatchers.anyString;
-import static org.mockito.Mockito.*;
-import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get;
-import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.options;
-import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.header;
-import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.status;
+import javax.servlet.*;
/**
* Unit tests for the WebConfigurer class.
@@ -51,9 +53,11 @@ public class WebConfigurerTest {
public void setup() {
servletContext = spy(new MockServletContext());
doReturn(mock(FilterRegistration.Dynamic.class))
- .when(servletContext).addFilter(anyString(), any(Filter.class));
+ .when(servletContext)
+ .addFilter(anyString(), any(Filter.class));
doReturn(mock(ServletRegistration.Dynamic.class))
- .when(servletContext).addServlet(anyString(), any(Servlet.class));
+ .when(servletContext)
+ .addServlet(anyString(), any(Servlet.class));
env = new MockEnvironment();
props = new JHipsterProperties();
@@ -117,25 +121,25 @@ public class WebConfigurerTest {
props.getCors().setAllowCredentials(true);
MockMvc mockMvc = MockMvcBuilders.standaloneSetup(new WebConfigurerTestController())
- .addFilters(webConfigurer.corsFilter())
- .build();
+ .addFilters(webConfigurer.corsFilter())
+ .build();
mockMvc.perform(
- options("/api/test-cors")
- .header(HttpHeaders.ORIGIN, "other.domain.com")
- .header(HttpHeaders.ACCESS_CONTROL_REQUEST_METHOD, "POST"))
- .andExpect(status().isOk())
- .andExpect(header().string(HttpHeaders.ACCESS_CONTROL_ALLOW_ORIGIN, "other.domain.com"))
- .andExpect(header().string(HttpHeaders.VARY, "Origin"))
- .andExpect(header().string(HttpHeaders.ACCESS_CONTROL_ALLOW_METHODS, "GET,POST,PUT,DELETE"))
- .andExpect(header().string(HttpHeaders.ACCESS_CONTROL_ALLOW_CREDENTIALS, "true"))
- .andExpect(header().string(HttpHeaders.ACCESS_CONTROL_MAX_AGE, "1800"));
+ options("/api/test-cors")
+ .header(HttpHeaders.ORIGIN, "other.domain.com")
+ .header(HttpHeaders.ACCESS_CONTROL_REQUEST_METHOD, "POST"))
+ .andExpect(status().isOk())
+ .andExpect(header().string(HttpHeaders.ACCESS_CONTROL_ALLOW_ORIGIN, "other.domain.com"))
+ .andExpect(header().string(HttpHeaders.VARY, "Origin"))
+ .andExpect(header().string(HttpHeaders.ACCESS_CONTROL_ALLOW_METHODS, "GET,POST,PUT,DELETE"))
+ .andExpect(header().string(HttpHeaders.ACCESS_CONTROL_ALLOW_CREDENTIALS, "true"))
+ .andExpect(header().string(HttpHeaders.ACCESS_CONTROL_MAX_AGE, "1800"));
mockMvc.perform(
- get("/api/test-cors")
- .header(HttpHeaders.ORIGIN, "other.domain.com"))
- .andExpect(status().isOk())
- .andExpect(header().string(HttpHeaders.ACCESS_CONTROL_ALLOW_ORIGIN, "other.domain.com"));
+ get("/api/test-cors")
+ .header(HttpHeaders.ORIGIN, "other.domain.com"))
+ .andExpect(status().isOk())
+ .andExpect(header().string(HttpHeaders.ACCESS_CONTROL_ALLOW_ORIGIN, "other.domain.com"));
}
@Test
@@ -147,14 +151,14 @@ public class WebConfigurerTest {
props.getCors().setAllowCredentials(true);
MockMvc mockMvc = MockMvcBuilders.standaloneSetup(new WebConfigurerTestController())
- .addFilters(webConfigurer.corsFilter())
- .build();
+ .addFilters(webConfigurer.corsFilter())
+ .build();
mockMvc.perform(
- get("/test/test-cors")
- .header(HttpHeaders.ORIGIN, "other.domain.com"))
- .andExpect(status().isOk())
- .andExpect(header().doesNotExist(HttpHeaders.ACCESS_CONTROL_ALLOW_ORIGIN));
+ get("/test/test-cors")
+ .header(HttpHeaders.ORIGIN, "other.domain.com"))
+ .andExpect(status().isOk())
+ .andExpect(header().doesNotExist(HttpHeaders.ACCESS_CONTROL_ALLOW_ORIGIN));
}
@Test
@@ -162,14 +166,14 @@ public class WebConfigurerTest {
props.getCors().setAllowedOrigins(null);
MockMvc mockMvc = MockMvcBuilders.standaloneSetup(new WebConfigurerTestController())
- .addFilters(webConfigurer.corsFilter())
- .build();
+ .addFilters(webConfigurer.corsFilter())
+ .build();
mockMvc.perform(
- get("/api/test-cors")
- .header(HttpHeaders.ORIGIN, "other.domain.com"))
- .andExpect(status().isOk())
- .andExpect(header().doesNotExist(HttpHeaders.ACCESS_CONTROL_ALLOW_ORIGIN));
+ get("/api/test-cors")
+ .header(HttpHeaders.ORIGIN, "other.domain.com"))
+ .andExpect(status().isOk())
+ .andExpect(header().doesNotExist(HttpHeaders.ACCESS_CONTROL_ALLOW_ORIGIN));
}
@Test
@@ -177,13 +181,13 @@ public class WebConfigurerTest {
props.getCors().setAllowedOrigins(new ArrayList<>());
MockMvc mockMvc = MockMvcBuilders.standaloneSetup(new WebConfigurerTestController())
- .addFilters(webConfigurer.corsFilter())
- .build();
+ .addFilters(webConfigurer.corsFilter())
+ .build();
mockMvc.perform(
- get("/api/test-cors")
- .header(HttpHeaders.ORIGIN, "other.domain.com"))
- .andExpect(status().isOk())
- .andExpect(header().doesNotExist(HttpHeaders.ACCESS_CONTROL_ALLOW_ORIGIN));
+ get("/api/test-cors")
+ .header(HttpHeaders.ORIGIN, "other.domain.com"))
+ .andExpect(status().isOk())
+ .andExpect(header().doesNotExist(HttpHeaders.ACCESS_CONTROL_ALLOW_ORIGIN));
}
}
diff --git a/src/test/java/org/hostsharing/hsadminng/config/WebConfigurerTestController.java b/src/test/java/org/hostsharing/hsadminng/config/WebConfigurerTestController.java
index 1bd28fba..c866cd51 100644
--- a/src/test/java/org/hostsharing/hsadminng/config/WebConfigurerTestController.java
+++ b/src/test/java/org/hostsharing/hsadminng/config/WebConfigurerTestController.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.config;
import org.springframework.web.bind.annotation.GetMapping;
diff --git a/src/test/java/org/hostsharing/hsadminng/config/timezone/HibernateTimeZoneTest.java b/src/test/java/org/hostsharing/hsadminng/config/timezone/HibernateTimeZoneTest.java
index d25dc34d..bc81adb9 100644
--- a/src/test/java/org/hostsharing/hsadminng/config/timezone/HibernateTimeZoneTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/config/timezone/HibernateTimeZoneTest.java
@@ -1,8 +1,13 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.config.timezone;
+import static java.lang.String.format;
+import static org.assertj.core.api.Assertions.assertThat;
+
import org.hostsharing.hsadminng.HsadminNgApp;
import org.hostsharing.hsadminng.repository.timezone.DateTimeWrapper;
import org.hostsharing.hsadminng.repository.timezone.DateTimeWrapperRepository;
+
import org.junit.Before;
import org.junit.Test;
import org.junit.runner.RunWith;
@@ -16,9 +21,6 @@ import org.springframework.transaction.annotation.Transactional;
import java.time.*;
import java.time.format.DateTimeFormatter;
-import static java.lang.String.format;
-import static org.assertj.core.api.Assertions.assertThat;
-
/**
* Unit tests for the UTC Hibernate configuration.
*/
@@ -48,15 +50,15 @@ public class HibernateTimeZoneTest {
dateTimeWrapper.setLocalDate(LocalDate.parse("2016-09-10"));
dateTimeFormatter = DateTimeFormatter
- .ofPattern("yyyy-MM-dd HH:mm:ss.S")
- .withZone(ZoneId.of("UTC"));
+ .ofPattern("yyyy-MM-dd HH:mm:ss.S")
+ .withZone(ZoneId.of("UTC"));
timeFormatter = DateTimeFormatter
- .ofPattern("HH:mm:ss")
- .withZone(ZoneId.of("UTC"));
+ .ofPattern("HH:mm:ss")
+ .withZone(ZoneId.of("UTC"));
dateFormatter = DateTimeFormatter
- .ofPattern("yyyy-MM-dd");
+ .ofPattern("yyyy-MM-dd");
}
@Test
@@ -79,9 +81,9 @@ public class HibernateTimeZoneTest {
String request = generateSqlRequest("local_date_time", dateTimeWrapper.getId());
SqlRowSet resultSet = jdbcTemplate.queryForRowSet(request);
String expectedValue = dateTimeWrapper
- .getLocalDateTime()
- .atZone(ZoneId.systemDefault())
- .format(dateTimeFormatter);
+ .getLocalDateTime()
+ .atZone(ZoneId.systemDefault())
+ .format(dateTimeFormatter);
assertThatDateStoredValueIsEqualToInsertDateValueOnGMTTimeZone(resultSet, expectedValue);
}
@@ -94,8 +96,8 @@ public class HibernateTimeZoneTest {
String request = generateSqlRequest("offset_date_time", dateTimeWrapper.getId());
SqlRowSet resultSet = jdbcTemplate.queryForRowSet(request);
String expectedValue = dateTimeWrapper
- .getOffsetDateTime()
- .format(dateTimeFormatter);
+ .getOffsetDateTime()
+ .format(dateTimeFormatter);
assertThatDateStoredValueIsEqualToInsertDateValueOnGMTTimeZone(resultSet, expectedValue);
}
@@ -108,8 +110,8 @@ public class HibernateTimeZoneTest {
String request = generateSqlRequest("zoned_date_time", dateTimeWrapper.getId());
SqlRowSet resultSet = jdbcTemplate.queryForRowSet(request);
String expectedValue = dateTimeWrapper
- .getZonedDateTime()
- .format(dateTimeFormatter);
+ .getZonedDateTime()
+ .format(dateTimeFormatter);
assertThatDateStoredValueIsEqualToInsertDateValueOnGMTTimeZone(resultSet, expectedValue);
}
@@ -122,10 +124,10 @@ public class HibernateTimeZoneTest {
String request = generateSqlRequest("local_time", dateTimeWrapper.getId());
SqlRowSet resultSet = jdbcTemplate.queryForRowSet(request);
String expectedValue = dateTimeWrapper
- .getLocalTime()
- .atDate(LocalDate.of(1970, Month.JANUARY, 1))
- .atZone(ZoneId.systemDefault())
- .format(timeFormatter);
+ .getLocalTime()
+ .atDate(LocalDate.of(1970, Month.JANUARY, 1))
+ .atZone(ZoneId.systemDefault())
+ .format(timeFormatter);
assertThatDateStoredValueIsEqualToInsertDateValueOnGMTTimeZone(resultSet, expectedValue);
}
@@ -138,11 +140,11 @@ public class HibernateTimeZoneTest {
String request = generateSqlRequest("offset_time", dateTimeWrapper.getId());
SqlRowSet resultSet = jdbcTemplate.queryForRowSet(request);
String expectedValue = dateTimeWrapper
- .getOffsetTime()
- .toLocalTime()
- .atDate(LocalDate.of(1970, Month.JANUARY, 1))
- .atZone(ZoneId.systemDefault())
- .format(timeFormatter);
+ .getOffsetTime()
+ .toLocalTime()
+ .atDate(LocalDate.of(1970, Month.JANUARY, 1))
+ .atZone(ZoneId.systemDefault())
+ .format(timeFormatter);
assertThatDateStoredValueIsEqualToInsertDateValueOnGMTTimeZone(resultSet, expectedValue);
}
@@ -155,8 +157,8 @@ public class HibernateTimeZoneTest {
String request = generateSqlRequest("local_date", dateTimeWrapper.getId());
SqlRowSet resultSet = jdbcTemplate.queryForRowSet(request);
String expectedValue = dateTimeWrapper
- .getLocalDate()
- .format(dateFormatter);
+ .getLocalDate()
+ .format(dateFormatter);
assertThatDateStoredValueIsEqualToInsertDateValueOnGMTTimeZone(resultSet, expectedValue);
}
diff --git a/src/test/java/org/hostsharing/hsadminng/cucumber/CucumberContextConfiguration.java b/src/test/java/org/hostsharing/hsadminng/cucumber/CucumberContextConfiguration.java
index cf6a0726..09ebc4bc 100644
--- a/src/test/java/org/hostsharing/hsadminng/cucumber/CucumberContextConfiguration.java
+++ b/src/test/java/org/hostsharing/hsadminng/cucumber/CucumberContextConfiguration.java
@@ -1,7 +1,10 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.cucumber;
import org.hostsharing.hsadminng.HsadminNgApp;
+
import cucumber.api.java.Before;
+
import org.springframework.boot.test.context.SpringBootTest;
import org.springframework.test.context.ContextConfiguration;
import org.springframework.test.context.web.WebAppConfiguration;
@@ -12,7 +15,7 @@ import org.springframework.test.context.web.WebAppConfiguration;
public class CucumberContextConfiguration {
@Before
- public void setup_cucumber_spring_context(){
+ public void setup_cucumber_spring_context() {
// Dummy method so cucumber will recognize this class as glue
// and use its context configuration.
}
diff --git a/src/test/java/org/hostsharing/hsadminng/cucumber/CucumberTest.java b/src/test/java/org/hostsharing/hsadminng/cucumber/CucumberTest.java
index c70c13c3..5d292157 100644
--- a/src/test/java/org/hostsharing/hsadminng/cucumber/CucumberTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/cucumber/CucumberTest.java
@@ -1,13 +1,13 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.cucumber;
-import org.junit.runner.RunWith;
-
-
import cucumber.api.CucumberOptions;
import cucumber.api.junit.Cucumber;
+import org.junit.runner.RunWith;
+
@RunWith(Cucumber.class)
@CucumberOptions(plugin = "pretty", features = "src/test/features")
-public class CucumberTest {
+public class CucumberTest {
}
diff --git a/src/test/java/org/hostsharing/hsadminng/cucumber/stepdefs/StepDefs.java b/src/test/java/org/hostsharing/hsadminng/cucumber/stepdefs/StepDefs.java
index 65ee919c..1d0ea7a4 100644
--- a/src/test/java/org/hostsharing/hsadminng/cucumber/stepdefs/StepDefs.java
+++ b/src/test/java/org/hostsharing/hsadminng/cucumber/stepdefs/StepDefs.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.cucumber.stepdefs;
import org.springframework.test.web.servlet.ResultActions;
diff --git a/src/test/java/org/hostsharing/hsadminng/cucumber/stepdefs/UserStepDefs.java b/src/test/java/org/hostsharing/hsadminng/cucumber/stepdefs/UserStepDefs.java
index 2feecffb..fc5f77de 100644
--- a/src/test/java/org/hostsharing/hsadminng/cucumber/stepdefs/UserStepDefs.java
+++ b/src/test/java/org/hostsharing/hsadminng/cucumber/stepdefs/UserStepDefs.java
@@ -1,5 +1,11 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.cucumber.stepdefs;
+import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get;
+import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.*;
+
+import org.hostsharing.hsadminng.web.rest.UserResource;
+
import cucumber.api.java.Before;
import cucumber.api.java.en.Then;
import cucumber.api.java.en.When;
@@ -9,11 +15,6 @@ import org.springframework.http.MediaType;
import org.springframework.test.web.servlet.MockMvc;
import org.springframework.test.web.servlet.setup.MockMvcBuilders;
-import org.hostsharing.hsadminng.web.rest.UserResource;
-
-import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get;
-import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.*;
-
public class UserStepDefs extends StepDefs {
@Autowired
@@ -28,15 +29,16 @@ public class UserStepDefs extends StepDefs {
@When("I search user {string}")
public void i_search_user(String userId) throws Throwable {
- actions = restUserMockMvc.perform(get("/api/users/" + userId)
- .accept(MediaType.APPLICATION_JSON));
+ actions = restUserMockMvc.perform(
+ get("/api/users/" + userId)
+ .accept(MediaType.APPLICATION_JSON));
}
@Then("the user is found")
public void the_user_is_found() throws Throwable {
actions
- .andExpect(status().isOk())
- .andExpect(content().contentType(MediaType.APPLICATION_JSON_UTF8_VALUE));
+ .andExpect(status().isOk())
+ .andExpect(content().contentType(MediaType.APPLICATION_JSON_UTF8_VALUE));
}
@Then("his last name is {string}")
diff --git a/src/test/java/org/hostsharing/hsadminng/repository/CustomAuditEventRepositoryIntTest.java b/src/test/java/org/hostsharing/hsadminng/repository/CustomAuditEventRepositoryIntTest.java
index 73bac548..a66d3a6d 100644
--- a/src/test/java/org/hostsharing/hsadminng/repository/CustomAuditEventRepositoryIntTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/repository/CustomAuditEventRepositoryIntTest.java
@@ -1,9 +1,14 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.repository;
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.hostsharing.hsadminng.repository.CustomAuditEventRepository.EVENT_DATA_COLUMN_MAX_LENGTH;
+
import org.hostsharing.hsadminng.HsadminNgApp;
import org.hostsharing.hsadminng.config.Constants;
import org.hostsharing.hsadminng.config.audit.AuditEventConverter;
import org.hostsharing.hsadminng.domain.PersistentAuditEvent;
+
import org.junit.Before;
import org.junit.Test;
import org.junit.runner.RunWith;
@@ -16,14 +21,12 @@ import org.springframework.security.web.authentication.WebAuthenticationDetails;
import org.springframework.test.context.junit4.SpringRunner;
import org.springframework.transaction.annotation.Transactional;
-import javax.servlet.http.HttpSession;
import java.time.Instant;
import java.util.HashMap;
import java.util.List;
import java.util.Map;
-import static org.assertj.core.api.Assertions.assertThat;
-import static org.hostsharing.hsadminng.repository.CustomAuditEventRepository.EVENT_DATA_COLUMN_MAX_LENGTH;
+import javax.servlet.http.HttpSession;
/**
* Test class for the CustomAuditEventRepository class.
diff --git a/src/test/java/org/hostsharing/hsadminng/repository/MembershipRepositoryIntTest.java b/src/test/java/org/hostsharing/hsadminng/repository/MembershipRepositoryIntTest.java
index d9a09878..4f0c22f6 100644
--- a/src/test/java/org/hostsharing/hsadminng/repository/MembershipRepositoryIntTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/repository/MembershipRepositoryIntTest.java
@@ -1,12 +1,16 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.repository;
-import org.apache.commons.lang3.RandomStringUtils;
-import org.apache.commons.lang3.RandomUtils;
+import static org.assertj.core.api.Assertions.assertThat;
+
import org.hostsharing.hsadminng.HsadminNgApp;
import org.hostsharing.hsadminng.domain.Customer;
import org.hostsharing.hsadminng.domain.Membership;
import org.hostsharing.hsadminng.domain.enumeration.CustomerKind;
import org.hostsharing.hsadminng.domain.enumeration.VatRegion;
+
+import org.apache.commons.lang3.RandomStringUtils;
+import org.apache.commons.lang3.RandomUtils;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.springframework.beans.factory.annotation.Autowired;
@@ -16,13 +20,10 @@ import org.springframework.transaction.annotation.Transactional;
import java.time.LocalDate;
-import static org.assertj.core.api.Assertions.assertThat;
-
-
@RunWith(SpringRunner.class)
@SpringBootTest(classes = HsadminNgApp.class)
@Transactional
-public class MembershipRepositoryIntTest {
+public class MembershipRepositoryIntTest {
@Autowired
private CustomerRepository customerRepository;
@@ -36,7 +37,8 @@ public class MembershipRepositoryIntTest {
final Customer givenCustomerWithUncancelledMembership = createCustomerWithMembership("2011-08-18", null);
// when
- boolean actual = membershipRepository.hasUncancelledMembershipForCustomer(givenCustomerWithUncancelledMembership.getId());
+ boolean actual = membershipRepository
+ .hasUncancelledMembershipForCustomer(givenCustomerWithUncancelledMembership.getId());
// then
assertThat(actual).isTrue();
diff --git a/src/test/java/org/hostsharing/hsadminng/repository/timezone/DateTimeWrapper.java b/src/test/java/org/hostsharing/hsadminng/repository/timezone/DateTimeWrapper.java
index f1804ade..c3d86649 100644
--- a/src/test/java/org/hostsharing/hsadminng/repository/timezone/DateTimeWrapper.java
+++ b/src/test/java/org/hostsharing/hsadminng/repository/timezone/DateTimeWrapper.java
@@ -1,10 +1,12 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.repository.timezone;
-import javax.persistence.*;
import java.io.Serializable;
import java.time.*;
import java.util.Objects;
+import javax.persistence.*;
+
@Entity
@Table(name = "jhi_date_time_wrapper")
public class DateTimeWrapper implements Serializable {
@@ -122,11 +124,11 @@ public class DateTimeWrapper implements Serializable {
@Override
public String toString() {
return "TimeZoneTest{" +
- "id=" + id +
- ", instant=" + instant +
- ", localDateTime=" + localDateTime +
- ", offsetDateTime=" + offsetDateTime +
- ", zonedDateTime=" + zonedDateTime +
- '}';
+ "id=" + id +
+ ", instant=" + instant +
+ ", localDateTime=" + localDateTime +
+ ", offsetDateTime=" + offsetDateTime +
+ ", zonedDateTime=" + zonedDateTime +
+ '}';
}
}
diff --git a/src/test/java/org/hostsharing/hsadminng/repository/timezone/DateTimeWrapperRepository.java b/src/test/java/org/hostsharing/hsadminng/repository/timezone/DateTimeWrapperRepository.java
index 91fff378..1eea9b1d 100644
--- a/src/test/java/org/hostsharing/hsadminng/repository/timezone/DateTimeWrapperRepository.java
+++ b/src/test/java/org/hostsharing/hsadminng/repository/timezone/DateTimeWrapperRepository.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.repository.timezone;
import org.springframework.data.jpa.repository.JpaRepository;
diff --git a/src/test/java/org/hostsharing/hsadminng/security/DomainUserDetailsServiceIntTest.java b/src/test/java/org/hostsharing/hsadminng/security/DomainUserDetailsServiceIntTest.java
index 1d542ef5..78bfa455 100644
--- a/src/test/java/org/hostsharing/hsadminng/security/DomainUserDetailsServiceIntTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/security/DomainUserDetailsServiceIntTest.java
@@ -1,5 +1,8 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.security;
+import static org.assertj.core.api.Assertions.assertThat;
+
import org.hostsharing.hsadminng.HsadminNgApp;
import org.hostsharing.hsadminng.domain.User;
import org.hostsharing.hsadminng.repository.UserRepository;
@@ -18,8 +21,6 @@ import org.springframework.transaction.annotation.Transactional;
import java.util.Locale;
-import static org.assertj.core.api.Assertions.assertThat;
-
/**
* Test class for DomainUserDetailsService.
*
@@ -107,7 +108,7 @@ public class DomainUserDetailsServiceIntTest {
@Test(expected = UsernameNotFoundException.class)
@Transactional
public void assertThatUserCanNotBeFoundByEmailIgnoreCase() {
- domainUserDetailsService.loadUserByUsername(USER_TWO_EMAIL.toUpperCase(Locale.ENGLISH));
+ domainUserDetailsService.loadUserByUsername(USER_TWO_EMAIL.toUpperCase(Locale.ENGLISH));
}
@Test
diff --git a/src/test/java/org/hostsharing/hsadminng/security/SecurityUtilsUnitTest.java b/src/test/java/org/hostsharing/hsadminng/security/SecurityUtilsUnitTest.java
index 8e527851..05769287 100644
--- a/src/test/java/org/hostsharing/hsadminng/security/SecurityUtilsUnitTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/security/SecurityUtilsUnitTest.java
@@ -1,5 +1,8 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.security;
+import static org.assertj.core.api.Assertions.assertThat;
+
import org.junit.Test;
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
import org.springframework.security.core.GrantedAuthority;
@@ -11,8 +14,6 @@ import java.util.ArrayList;
import java.util.Collection;
import java.util.Optional;
-import static org.assertj.core.api.Assertions.assertThat;
-
/**
* Test class for the SecurityUtils utility class.
*
diff --git a/src/test/java/org/hostsharing/hsadminng/security/jwt/JWTFilterTest.java b/src/test/java/org/hostsharing/hsadminng/security/jwt/JWTFilterTest.java
index 35dfb386..ac77496a 100644
--- a/src/test/java/org/hostsharing/hsadminng/security/jwt/JWTFilterTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/security/jwt/JWTFilterTest.java
@@ -1,6 +1,10 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.security.jwt;
+import static org.assertj.core.api.Assertions.assertThat;
+
import org.hostsharing.hsadminng.security.AuthoritiesConstants;
+
import io.github.jhipster.config.JHipsterProperties;
import io.jsonwebtoken.io.Decoders;
import io.jsonwebtoken.security.Keys;
@@ -18,8 +22,6 @@ import org.springframework.test.util.ReflectionTestUtils;
import java.util.Collections;
-import static org.assertj.core.api.Assertions.assertThat;
-
public class JWTFilterTest {
private TokenProvider tokenProvider;
@@ -30,9 +32,13 @@ public class JWTFilterTest {
public void setup() {
JHipsterProperties jHipsterProperties = new JHipsterProperties();
tokenProvider = new TokenProvider(jHipsterProperties);
- ReflectionTestUtils.setField(tokenProvider, "key",
- Keys.hmacShaKeyFor(Decoders.BASE64
- .decode("fd54a45s65fds737b9aafcb3412e07ed99b267f33413274720ddbb7f6c5e64e9f14075f2d7ed041592f0b7657baf8")));
+ ReflectionTestUtils.setField(
+ tokenProvider,
+ "key",
+ Keys.hmacShaKeyFor(
+ Decoders.BASE64
+ .decode(
+ "fd54a45s65fds737b9aafcb3412e07ed99b267f33413274720ddbb7f6c5e64e9f14075f2d7ed041592f0b7657baf8")));
ReflectionTestUtils.setField(tokenProvider, "tokenValidityInMilliseconds", 60000);
jwtFilter = new JWTFilter(tokenProvider);
@@ -42,10 +48,9 @@ public class JWTFilterTest {
@Test
public void testJWTFilter() throws Exception {
UsernamePasswordAuthenticationToken authentication = new UsernamePasswordAuthenticationToken(
- "test-user",
- "test-password",
- Collections.singletonList(new SimpleGrantedAuthority(AuthoritiesConstants.USER))
- );
+ "test-user",
+ "test-password",
+ Collections.singletonList(new SimpleGrantedAuthority(AuthoritiesConstants.USER)));
String jwt = tokenProvider.createToken(authentication, false);
MockHttpServletRequest request = new MockHttpServletRequest();
request.addHeader(JWTFilter.AUTHORIZATION_HEADER, "Bearer " + jwt);
@@ -97,10 +102,9 @@ public class JWTFilterTest {
@Test
public void testJWTFilterWrongScheme() throws Exception {
UsernamePasswordAuthenticationToken authentication = new UsernamePasswordAuthenticationToken(
- "test-user",
- "test-password",
- Collections.singletonList(new SimpleGrantedAuthority(AuthoritiesConstants.USER))
- );
+ "test-user",
+ "test-password",
+ Collections.singletonList(new SimpleGrantedAuthority(AuthoritiesConstants.USER)));
String jwt = tokenProvider.createToken(authentication, false);
MockHttpServletRequest request = new MockHttpServletRequest();
request.addHeader(JWTFilter.AUTHORIZATION_HEADER, "Basic " + jwt);
diff --git a/src/test/java/org/hostsharing/hsadminng/security/jwt/TokenProviderTest.java b/src/test/java/org/hostsharing/hsadminng/security/jwt/TokenProviderTest.java
index 9908b235..d1e6934a 100644
--- a/src/test/java/org/hostsharing/hsadminng/security/jwt/TokenProviderTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/security/jwt/TokenProviderTest.java
@@ -1,9 +1,15 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.security.jwt;
+import static org.assertj.core.api.Assertions.assertThat;
+
import org.hostsharing.hsadminng.security.AuthoritiesConstants;
-import java.security.Key;
-import java.util.*;
+import io.github.jhipster.config.JHipsterProperties;
+import io.jsonwebtoken.Jwts;
+import io.jsonwebtoken.SignatureAlgorithm;
+import io.jsonwebtoken.io.Decoders;
+import io.jsonwebtoken.security.Keys;
import org.junit.Before;
import org.junit.Test;
@@ -14,13 +20,8 @@ import org.springframework.security.core.GrantedAuthority;
import org.springframework.security.core.authority.SimpleGrantedAuthority;
import org.springframework.test.util.ReflectionTestUtils;
-import io.github.jhipster.config.JHipsterProperties;
-import io.jsonwebtoken.Jwts;
-import io.jsonwebtoken.SignatureAlgorithm;
-import io.jsonwebtoken.io.Decoders;
-import io.jsonwebtoken.security.Keys;
-
-import static org.assertj.core.api.Assertions.assertThat;
+import java.security.Key;
+import java.util.*;
public class TokenProviderTest {
@@ -33,8 +34,10 @@ public class TokenProviderTest {
public void setup() {
jHipsterProperties = Mockito.mock(JHipsterProperties.class);
tokenProvider = new TokenProvider(jHipsterProperties);
- key = Keys.hmacShaKeyFor(Decoders.BASE64
- .decode("fd54a45s65fds737b9aafcb3412e07ed99b267f33413274720ddbb7f6c5e64e9f14075f2d7ed041592f0b7657baf8"));
+ key = Keys.hmacShaKeyFor(
+ Decoders.BASE64
+ .decode(
+ "fd54a45s65fds737b9aafcb3412e07ed99b267f33413274720ddbb7f6c5e64e9f14075f2d7ed041592f0b7657baf8"));
ReflectionTestUtils.setField(tokenProvider, "key", key);
ReflectionTestUtils.setField(tokenProvider, "tokenValidityInMilliseconds", ONE_MINUTE);
@@ -93,19 +96,21 @@ public class TokenProviderTest {
private String createUnsupportedToken() {
return Jwts.builder()
- .setPayload("payload")
- .signWith(key, SignatureAlgorithm.HS512)
- .compact();
+ .setPayload("payload")
+ .signWith(key, SignatureAlgorithm.HS512)
+ .compact();
}
private String createTokenWithDifferentSignature() {
- Key otherKey = Keys.hmacShaKeyFor(Decoders.BASE64
- .decode("Xfd54a45s65fds737b9aafcb3412e07ed99b267f33413274720ddbb7f6c5e64e9f14075f2d7ed041592f0b7657baf8"));
+ Key otherKey = Keys.hmacShaKeyFor(
+ Decoders.BASE64
+ .decode(
+ "Xfd54a45s65fds737b9aafcb3412e07ed99b267f33413274720ddbb7f6c5e64e9f14075f2d7ed041592f0b7657baf8"));
return Jwts.builder()
- .setSubject("anonymous")
- .signWith(otherKey, SignatureAlgorithm.HS512)
- .setExpiration(new Date(new Date().getTime() + ONE_MINUTE))
- .compact();
+ .setSubject("anonymous")
+ .signWith(otherKey, SignatureAlgorithm.HS512)
+ .setExpiration(new Date(new Date().getTime() + ONE_MINUTE))
+ .compact();
}
}
diff --git a/src/test/java/org/hostsharing/hsadminng/service/AssetServiceUnitTest.java b/src/test/java/org/hostsharing/hsadminng/service/AssetServiceUnitTest.java
index 02e59b4f..dd7eb4e2 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/AssetServiceUnitTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/AssetServiceUnitTest.java
@@ -1,12 +1,20 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
-import org.apache.commons.lang3.RandomUtils;
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.assertj.core.api.Assertions.catchThrowableOfType;
+import static org.mockito.ArgumentMatchers.same;
+import static org.mockito.BDDMockito.given;
+import static org.mockito.Mockito.*;
+
import org.hostsharing.hsadminng.domain.Asset;
import org.hostsharing.hsadminng.domain.enumeration.AssetAction;
import org.hostsharing.hsadminng.repository.AssetRepository;
import org.hostsharing.hsadminng.service.dto.AssetDTO;
import org.hostsharing.hsadminng.service.mapper.AssetMapper;
import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
+
+import org.apache.commons.lang3.RandomUtils;
import org.junit.Rule;
import org.junit.Test;
import org.mockito.InjectMocks;
@@ -15,15 +23,9 @@ import org.mockito.Mockito;
import org.mockito.junit.MockitoJUnit;
import org.mockito.junit.MockitoRule;
-import javax.persistence.EntityManager;
import java.math.BigDecimal;
-import static org.assertj.core.api.Assertions.assertThat;
-import static org.assertj.core.api.Assertions.catchThrowableOfType;
-import static org.mockito.ArgumentMatchers.same;
-import static org.mockito.BDDMockito.given;
-import static org.mockito.Mockito.*;
-
+import javax.persistence.EntityManager;
// HINT: In IntelliJ IDEA such unit test classes can be created with Shift-Ctrl-T.
// Do not forget to amend the class name (.e.g. ...UnitTest / ...IntTest)!
@@ -55,13 +57,15 @@ public class AssetServiceUnitTest {
@Test
public void deleteIsRejectedForAssetTransactions() {
// when
- final Throwable throwException = catchThrowableOfType(() -> assetService.delete(RandomUtils.nextLong()), BadRequestAlertException.class);
+ final Throwable throwException = catchThrowableOfType(
+ () -> assetService.delete(RandomUtils.nextLong()),
+ BadRequestAlertException.class);
// then
// HINT: When using auto-import for assertions (e.g. via Alt-Enter in IntelliJ IDEA),
// beware to use the correct candidate from org.assertj.core.api.Assertions.
assertThat(throwException).isEqualToComparingFieldByField(
- new BadRequestAlertException("Asset transactions are immutable", "asset", "assetTransactionImmutable"));
+ new BadRequestAlertException("Asset transactions are immutable", "asset", "assetTransactionImmutable"));
}
@Test
@@ -84,14 +88,18 @@ public class AssetServiceUnitTest {
public void saveShouldNotPersistInvalidTransactions() {
// given
final AssetDTO givenAssetDTO = givenAssetDTO(null, AssetAction.PAYMENT, anyNegativeAmount());
- doThrow(new BadRequestAlertException("Some Dummy Test Violation", "asset", "assetInvalidTestDummy")).when(assetValidator).validate(givenAssetDTO);
+ doThrow(new BadRequestAlertException("Some Dummy Test Violation", "asset", "assetInvalidTestDummy"))
+ .when(assetValidator)
+ .validate(givenAssetDTO);
// when
- final Throwable throwException = catchThrowableOfType(() -> assetService.save(givenAssetDTO), BadRequestAlertException.class);
+ final Throwable throwException = catchThrowableOfType(
+ () -> assetService.save(givenAssetDTO),
+ BadRequestAlertException.class);
// then
assertThat(throwException).isEqualToComparingFieldByField(
- new BadRequestAlertException("Some Dummy Test Violation", "asset", "assetInvalidTestDummy"));
+ new BadRequestAlertException("Some Dummy Test Violation", "asset", "assetInvalidTestDummy"));
}
@Test
@@ -114,14 +122,18 @@ public class AssetServiceUnitTest {
// given
final AssetDTO givenAssetDTO = givenAssetDTO(anyNonNullId(), AssetAction.PAYMENT, anyNegativeAmount());
// HINT: given(...) can't be used for void methods, in that case use Mockito's do...() methods
- doThrow(new BadRequestAlertException("Some Dummy Test Violation", "asset", "assetInvalidTestDummy")).when(assetValidator).validate(givenAssetDTO);
+ doThrow(new BadRequestAlertException("Some Dummy Test Violation", "asset", "assetInvalidTestDummy"))
+ .when(assetValidator)
+ .validate(givenAssetDTO);
// when
- final Throwable throwException = catchThrowableOfType(() -> assetService.save(givenAssetDTO), BadRequestAlertException.class);
+ final Throwable throwException = catchThrowableOfType(
+ () -> assetService.save(givenAssetDTO),
+ BadRequestAlertException.class);
// then
assertThat(throwException).isEqualToComparingFieldByField(
- new BadRequestAlertException("Some Dummy Test Violation", "asset", "assetInvalidTestDummy"));
+ new BadRequestAlertException("Some Dummy Test Violation", "asset", "assetInvalidTestDummy"));
}
// --- only test fixture code below ---
@@ -130,7 +142,8 @@ public class AssetServiceUnitTest {
return RandomUtils.nextInt();
}
- // HINT: This rather complicated setup indicates that the method AssetService::save breaks the single responsibility principle.
+ // HINT: This rather complicated setup indicates that the method AssetService::save breaks the single responsibility
+ // principle.
private AssetDTO givenAssetDTO(final Long id, final AssetAction givenAction, final BigDecimal givenQuantity) {
final AssetDTO givenAssetDTO = createAssetDTO(id, givenAction, givenQuantity);
diff --git a/src/test/java/org/hostsharing/hsadminng/service/AssetValidatorUnitTest.java b/src/test/java/org/hostsharing/hsadminng/service/AssetValidatorUnitTest.java
index d3b4c06a..69442072 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/AssetValidatorUnitTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/AssetValidatorUnitTest.java
@@ -1,20 +1,23 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
-import com.google.common.collect.ImmutableList;
-import org.apache.commons.lang3.RandomUtils;
-import org.assertj.core.api.AbstractThrowableAssert;
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.assertj.core.api.Assertions.catchThrowableOfType;
+
import org.hostsharing.hsadminng.domain.enumeration.AssetAction;
import org.hostsharing.hsadminng.service.dto.AssetDTO;
import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
+
+import com.google.common.collect.ImmutableList;
+
+import org.apache.commons.lang3.RandomUtils;
+import org.assertj.core.api.AbstractThrowableAssert;
import org.junit.Test;
import java.math.BigDecimal;
import java.time.LocalDate;
import java.util.function.Consumer;
-import static org.assertj.core.api.Assertions.assertThat;
-import static org.assertj.core.api.Assertions.catchThrowableOfType;
-
public class AssetValidatorUnitTest {
private AssetValidator assetValidator = new AssetValidator();
@@ -23,173 +26,250 @@ public class AssetValidatorUnitTest {
public void shouldAcceptValidIncreasingTransaction() {
for (AssetAction action : ImmutableList.of(AssetAction.PAYMENT, AssetAction.ADOPTION)) {
new GivenAssetValidationTestCase()
- .withAnyValidDateValues()
- .withAction(action).withAmount("64.00")
- .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
- .thenActualException().isNull();
+ .withAnyValidDateValues()
+ .withAction(action)
+ .withAmount("64.00")
+ .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
+ .thenActualException()
+ .isNull();
}
}
@Test
public void shouldAcceptValidDecreasingTransaction() {
- for (AssetAction action : ImmutableList.of(AssetAction.PAYBACK, AssetAction.HANDOVER, AssetAction.CLEARING, AssetAction.LOSS)) {
+ for (AssetAction action : ImmutableList
+ .of(AssetAction.PAYBACK, AssetAction.HANDOVER, AssetAction.CLEARING, AssetAction.LOSS)) {
new GivenAssetValidationTestCase()
- .withAnyValidDateValues()
- .withAction(action).withAmount("-64.00")
- .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
- .thenActualException().isNull();
+ .withAnyValidDateValues()
+ .withAction(action)
+ .withAmount("-64.00")
+ .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
+ .thenActualException()
+ .isNull();
}
}
@Test
public void shouldAcceptIfDocumentDateEqualsValueDate() {
new GivenAssetValidationTestCase()
- .withDocumentDate("2019-04-11").withValueDate("2019-04-11")
- .withAction(AssetAction.PAYMENT).withAmount("64.00")
- .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
- .thenActualException().isNull();
+ .withDocumentDate("2019-04-11")
+ .withValueDate("2019-04-11")
+ .withAction(AssetAction.PAYMENT)
+ .withAmount("64.00")
+ .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
+ .thenActualException()
+ .isNull();
}
@Test
public void shouldRejectUpdates() {
new GivenAssetValidationTestCase()
- .withId(RandomUtils.nextLong())
- .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
- .thenActualException().isEqualToComparingFieldByField(new BadRequestAlertException(
- "Asset transactions are immutable", "asset", "assetTransactionImmutable"));
+ .withId(RandomUtils.nextLong())
+ .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
+ .thenActualException()
+ .isEqualToComparingFieldByField(
+ new BadRequestAlertException(
+ "Asset transactions are immutable",
+ "asset",
+ "assetTransactionImmutable"));
}
@Test
public void shouldRejectIfDocumentDateAfterValueDate() {
new GivenAssetValidationTestCase()
- .withDocumentDate("2019-04-13").withValueDate("2019-04-12")
- .withAction(AssetAction.PAYMENT).withAmount("64.00")
- .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
- .thenActualException().isEqualToComparingFieldByField(new BadRequestAlertException(
- "Document date may not be after value date", "asset", "documentDateMayNotBeAfterValueDate"));
+ .withDocumentDate("2019-04-13")
+ .withValueDate("2019-04-12")
+ .withAction(AssetAction.PAYMENT)
+ .withAmount("64.00")
+ .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
+ .thenActualException()
+ .isEqualToComparingFieldByField(
+ new BadRequestAlertException(
+ "Document date may not be after value date",
+ "asset",
+ "documentDateMayNotBeAfterValueDate"));
}
@Test
public void shouldRejectIfPaymentWithNegativeAmount() {
new GivenAssetValidationTestCase()
- .withAnyValidDateValues()
- .withAction(AssetAction.PAYMENT).withAmount("-64.00")
- .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
- .thenActualException().isEqualToComparingFieldByField(new BadRequestAlertException(
- "Asset payments require a positive amount", "asset", "assetPaymentsPositiveAmount"));
+ .withAnyValidDateValues()
+ .withAction(AssetAction.PAYMENT)
+ .withAmount("-64.00")
+ .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
+ .thenActualException()
+ .isEqualToComparingFieldByField(
+ new BadRequestAlertException(
+ "Asset payments require a positive amount",
+ "asset",
+ "assetPaymentsPositiveAmount"));
}
@Test
public void shouldRejectIfPaymentWithZeroAmount() {
new GivenAssetValidationTestCase()
- .withAnyValidDateValues()
- .withAction(AssetAction.PAYMENT).withAmount("0.00")
- .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
- .thenActualException().isEqualToComparingFieldByField(new BadRequestAlertException(
- "Asset payments require a positive amount", "asset", "assetPaymentsPositiveAmount"));
+ .withAnyValidDateValues()
+ .withAction(AssetAction.PAYMENT)
+ .withAmount("0.00")
+ .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
+ .thenActualException()
+ .isEqualToComparingFieldByField(
+ new BadRequestAlertException(
+ "Asset payments require a positive amount",
+ "asset",
+ "assetPaymentsPositiveAmount"));
}
@Test
public void shouldRejectIfAdoptionWithNegativeAmount() {
new GivenAssetValidationTestCase()
- .withAnyValidDateValues()
- .withAction(AssetAction.ADOPTION).withAmount("-64.00")
- .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
- .thenActualException().isEqualToComparingFieldByField(new BadRequestAlertException(
- "Asset adoptions require a positive amount", "asset", "assetAdoptionsPositiveAmount"));
+ .withAnyValidDateValues()
+ .withAction(AssetAction.ADOPTION)
+ .withAmount("-64.00")
+ .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
+ .thenActualException()
+ .isEqualToComparingFieldByField(
+ new BadRequestAlertException(
+ "Asset adoptions require a positive amount",
+ "asset",
+ "assetAdoptionsPositiveAmount"));
}
@Test
public void shouldRejectIfAdoptionWithZeroAmount() {
new GivenAssetValidationTestCase()
- .withAnyValidDateValues()
- .withAction(AssetAction.ADOPTION).withAmount("0.00")
- .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
- .thenActualException().isEqualToComparingFieldByField(new BadRequestAlertException(
- "Asset adoptions require a positive amount", "asset", "assetAdoptionsPositiveAmount"));
+ .withAnyValidDateValues()
+ .withAction(AssetAction.ADOPTION)
+ .withAmount("0.00")
+ .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
+ .thenActualException()
+ .isEqualToComparingFieldByField(
+ new BadRequestAlertException(
+ "Asset adoptions require a positive amount",
+ "asset",
+ "assetAdoptionsPositiveAmount"));
}
@Test
public void shouldRejectIfPaybackWithPositiveAmount() {
new GivenAssetValidationTestCase()
- .withAnyValidDateValues()
- .withAction(AssetAction.PAYBACK).withAmount("64.00")
- .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
- .thenActualException().isEqualToComparingFieldByField(new BadRequestAlertException(
- "Asset paybacks require a negative amount", "asset", "assetPaybacksNegativeAmount"));
+ .withAnyValidDateValues()
+ .withAction(AssetAction.PAYBACK)
+ .withAmount("64.00")
+ .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
+ .thenActualException()
+ .isEqualToComparingFieldByField(
+ new BadRequestAlertException(
+ "Asset paybacks require a negative amount",
+ "asset",
+ "assetPaybacksNegativeAmount"));
}
@Test
public void shouldRejectIfPaybackWithZeroAmount() {
new GivenAssetValidationTestCase()
- .withAnyValidDateValues()
- .withAction(AssetAction.PAYBACK).withAmount("0.00")
- .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
- .thenActualException().isEqualToComparingFieldByField(new BadRequestAlertException(
- "Asset paybacks require a negative amount", "asset", "assetPaybacksNegativeAmount"));
+ .withAnyValidDateValues()
+ .withAction(AssetAction.PAYBACK)
+ .withAmount("0.00")
+ .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
+ .thenActualException()
+ .isEqualToComparingFieldByField(
+ new BadRequestAlertException(
+ "Asset paybacks require a negative amount",
+ "asset",
+ "assetPaybacksNegativeAmount"));
}
@Test
public void shouldRejectIfHandoverWithPositiveAmount() {
new GivenAssetValidationTestCase()
- .withAnyValidDateValues()
- .withAction(AssetAction.HANDOVER).withAmount("64.00")
- .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
- .thenActualException().isEqualToComparingFieldByField(new BadRequestAlertException(
- "Asset handovers require a negative amount", "asset", "assetHandoversNegativeAmount"));
+ .withAnyValidDateValues()
+ .withAction(AssetAction.HANDOVER)
+ .withAmount("64.00")
+ .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
+ .thenActualException()
+ .isEqualToComparingFieldByField(
+ new BadRequestAlertException(
+ "Asset handovers require a negative amount",
+ "asset",
+ "assetHandoversNegativeAmount"));
}
@Test
public void shouldRejectIfHandoverWithZeroAmount() {
new GivenAssetValidationTestCase()
- .withAnyValidDateValues()
- .withAction(AssetAction.HANDOVER).withAmount("0.00")
- .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
- .thenActualException().isEqualToComparingFieldByField(new BadRequestAlertException(
- "Asset handovers require a negative amount", "asset", "assetHandoversNegativeAmount"));
+ .withAnyValidDateValues()
+ .withAction(AssetAction.HANDOVER)
+ .withAmount("0.00")
+ .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
+ .thenActualException()
+ .isEqualToComparingFieldByField(
+ new BadRequestAlertException(
+ "Asset handovers require a negative amount",
+ "asset",
+ "assetHandoversNegativeAmount"));
}
@Test
public void shouldRejectIfLossWithPositiveAmount() {
new GivenAssetValidationTestCase()
- .withAnyValidDateValues()
- .withAction(AssetAction.LOSS).withAmount("64.00")
- .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
- .thenActualException().isEqualToComparingFieldByField(new BadRequestAlertException(
- "Asset losses require a negative amount", "asset", "assetLossesNegativeAmount"));
+ .withAnyValidDateValues()
+ .withAction(AssetAction.LOSS)
+ .withAmount("64.00")
+ .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
+ .thenActualException()
+ .isEqualToComparingFieldByField(
+ new BadRequestAlertException(
+ "Asset losses require a negative amount",
+ "asset",
+ "assetLossesNegativeAmount"));
}
@Test
public void shouldRejectIfLossWithZeroAmount() {
new GivenAssetValidationTestCase()
- .withAnyValidDateValues()
- .withAction(AssetAction.LOSS).withAmount("0.00")
- .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
- .thenActualException().isEqualToComparingFieldByField(new BadRequestAlertException(
- "Asset losses require a negative amount", "asset", "assetLossesNegativeAmount"));
+ .withAnyValidDateValues()
+ .withAction(AssetAction.LOSS)
+ .withAmount("0.00")
+ .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
+ .thenActualException()
+ .isEqualToComparingFieldByField(
+ new BadRequestAlertException(
+ "Asset losses require a negative amount",
+ "asset",
+ "assetLossesNegativeAmount"));
}
@Test
public void shouldRejectIfClearingWithPositiveAmount() {
new GivenAssetValidationTestCase()
- .withAnyValidDateValues()
- .withAction(AssetAction.CLEARING).withAmount("64.00")
- .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
- .thenActualException().isEqualToComparingFieldByField(new BadRequestAlertException(
- "Asset clearings require a negative amount", "asset", "assetClearingsNegativeAmount"));
+ .withAnyValidDateValues()
+ .withAction(AssetAction.CLEARING)
+ .withAmount("64.00")
+ .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
+ .thenActualException()
+ .isEqualToComparingFieldByField(
+ new BadRequestAlertException(
+ "Asset clearings require a negative amount",
+ "asset",
+ "assetClearingsNegativeAmount"));
}
@Test
public void shouldRejectIfClearingWithZeroAmount() {
new GivenAssetValidationTestCase()
- .withAnyValidDateValues()
- .withAction(AssetAction.CLEARING).withAmount("0.00")
- .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
- .thenActualException().isEqualToComparingFieldByField(new BadRequestAlertException(
- "Asset clearings require a negative amount", "asset", "assetClearingsNegativeAmount"));
+ .withAnyValidDateValues()
+ .withAction(AssetAction.CLEARING)
+ .withAmount("0.00")
+ .when((AssetDTO assetDto) -> assetValidator.validate(assetDto))
+ .thenActualException()
+ .isEqualToComparingFieldByField(
+ new BadRequestAlertException(
+ "Asset clearings require a negative amount",
+ "asset",
+ "assetClearingsNegativeAmount"));
}
-
// -- only test fixture below ---
private class GivenAssetValidationTestCase {
@@ -226,7 +306,7 @@ public class AssetValidatorUnitTest {
return this;
}
- GivenAssetValidationTestCase when(final Consumer statement) {
+ GivenAssetValidationTestCase when(final Consumer statement) {
actualException = catchThrowableOfType(() -> assetValidator.validate(assetDto), BadRequestAlertException.class);
return this;
}
diff --git a/src/test/java/org/hostsharing/hsadminng/service/MailServiceIntTest.java b/src/test/java/org/hostsharing/hsadminng/service/MailServiceIntTest.java
index c7dd8409..70022a1a 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/MailServiceIntTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/MailServiceIntTest.java
@@ -1,9 +1,16 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
-import org.hostsharing.hsadminng.config.Constants;
+
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.mockito.ArgumentMatchers.any;
+import static org.mockito.Mockito.*;
import org.hostsharing.hsadminng.HsadminNgApp;
+import org.hostsharing.hsadminng.config.Constants;
import org.hostsharing.hsadminng.domain.User;
+
import io.github.jhipster.config.JHipsterProperties;
+
import org.junit.Before;
import org.junit.Test;
import org.junit.runner.RunWith;
@@ -19,15 +26,12 @@ import org.springframework.mail.javamail.JavaMailSenderImpl;
import org.springframework.test.context.junit4.SpringRunner;
import org.thymeleaf.spring5.SpringTemplateEngine;
+import java.io.ByteArrayOutputStream;
+
import javax.mail.Multipart;
import javax.mail.internet.MimeBodyPart;
import javax.mail.internet.MimeMessage;
import javax.mail.internet.MimeMultipart;
-import java.io.ByteArrayOutputStream;
-
-import static org.assertj.core.api.Assertions.assertThat;
-import static org.mockito.ArgumentMatchers.any;
-import static org.mockito.Mockito.*;
@RunWith(SpringRunner.class)
@SpringBootTest(classes = HsadminNgApp.class)
@@ -129,7 +133,8 @@ public class MailServiceIntTest {
assertThat(message.getSubject()).isEqualTo("test title");
assertThat(message.getAllRecipients()[0].toString()).isEqualTo(user.getEmail());
assertThat(message.getFrom()[0].toString()).isEqualTo("test@localhost");
- assertThat(message.getContent().toString()).isEqualToNormalizingNewlines("test title, http://127.0.0.1:8080, john\n");
+ assertThat(message.getContent().toString())
+ .isEqualToNormalizingNewlines("test title, http://127.0.0.1:8080, john\n");
assertThat(message.getDataHandler().getContentType()).isEqualTo("text/html;charset=UTF-8");
}
diff --git a/src/test/java/org/hostsharing/hsadminng/service/MembershipServiceUnitTest.java b/src/test/java/org/hostsharing/hsadminng/service/MembershipServiceUnitTest.java
index 2fbabce1..1b5452d6 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/MembershipServiceUnitTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/MembershipServiceUnitTest.java
@@ -1,10 +1,17 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
-import org.apache.commons.lang3.RandomUtils;
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.assertj.core.api.Assertions.catchThrowableOfType;
+import static org.mockito.ArgumentMatchers.any;
+import static org.mockito.Mockito.*;
+
import org.hostsharing.hsadminng.domain.Membership;
import org.hostsharing.hsadminng.repository.MembershipRepository;
import org.hostsharing.hsadminng.service.dto.MembershipDTO;
import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
+
+import org.apache.commons.lang3.RandomUtils;
import org.junit.Rule;
import org.junit.Test;
import org.mockito.InjectMocks;
@@ -12,11 +19,6 @@ import org.mockito.Mock;
import org.mockito.junit.MockitoJUnit;
import org.mockito.junit.MockitoRule;
-import static org.assertj.core.api.Assertions.assertThat;
-import static org.assertj.core.api.Assertions.catchThrowableOfType;
-import static org.mockito.ArgumentMatchers.any;
-import static org.mockito.Mockito.*;
-
public class MembershipServiceUnitTest {
@Rule
@@ -34,22 +36,29 @@ public class MembershipServiceUnitTest {
@Test
public void deleteIsRejectedForMembership() {
// when
- final Throwable throwException = catchThrowableOfType(() -> membershipService.delete(RandomUtils.nextLong()), BadRequestAlertException.class);
+ final Throwable throwException = catchThrowableOfType(
+ () -> membershipService.delete(RandomUtils.nextLong()),
+ BadRequestAlertException.class);
// then
assertThat(throwException).isEqualToComparingFieldByField(
- new BadRequestAlertException("Membership cannot be deleted", "membership", "membershipNotDeletable"));
+ new BadRequestAlertException("Membership cannot be deleted", "membership", "membershipNotDeletable"));
}
@Test
public void saveRejectsInvalidMembershipDTO() {
// given
final MembershipDTO givenMembershipDTO = new MembershipDTO();
- final BadRequestAlertException givenBadRequestAlertException = new BadRequestAlertException("Invalid Membership", Membership.ENTITY_NAME, "invalidMembership");
+ final BadRequestAlertException givenBadRequestAlertException = new BadRequestAlertException(
+ "Invalid Membership",
+ Membership.ENTITY_NAME,
+ "invalidMembership");
doThrow(givenBadRequestAlertException).when(membershipValidator).validate(givenMembershipDTO);
// when
- final Throwable throwException = catchThrowableOfType(() -> membershipService.save(givenMembershipDTO), BadRequestAlertException.class);
+ final Throwable throwException = catchThrowableOfType(
+ () -> membershipService.save(givenMembershipDTO),
+ BadRequestAlertException.class);
// then
assertThat(throwException).isSameAs(givenBadRequestAlertException);
diff --git a/src/test/java/org/hostsharing/hsadminng/service/MembershipValidatorUnitTest.java b/src/test/java/org/hostsharing/hsadminng/service/MembershipValidatorUnitTest.java
index df080721..a1327412 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/MembershipValidatorUnitTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/MembershipValidatorUnitTest.java
@@ -1,9 +1,16 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
-import org.assertj.core.api.AbstractThrowableAssert;
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.assertj.core.api.Assertions.catchThrowableOfType;
+import static org.mockito.ArgumentMatchers.anyLong;
+import static org.mockito.BDDMockito.given;
+
import org.hostsharing.hsadminng.repository.MembershipRepository;
import org.hostsharing.hsadminng.service.dto.MembershipDTO;
import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
+
+import org.assertj.core.api.AbstractThrowableAssert;
import org.junit.Before;
import org.junit.Rule;
import org.junit.Test;
@@ -15,11 +22,6 @@ import org.mockito.junit.MockitoRule;
import java.time.LocalDate;
import java.util.function.Consumer;
-import static org.assertj.core.api.Assertions.assertThat;
-import static org.assertj.core.api.Assertions.catchThrowableOfType;
-import static org.mockito.ArgumentMatchers.anyLong;
-import static org.mockito.BDDMockito.given;
-
public class MembershipValidatorUnitTest {
@Rule
@@ -39,47 +41,69 @@ public class MembershipValidatorUnitTest {
@Test
public void shouldAcceptNewMembershipIfUntilDateAfterSinceDate() {
new GivenMembershipValidationTestCase()
- .withNewMembershipForCustomer(1L).since("2019-04-11").until("2019-04-12")
- .when((MembershipDTO membershipDto) -> membershipValidator.validate(membershipDto))
- .thenActualException().isNull();
+ .withNewMembershipForCustomer(1L)
+ .since("2019-04-11")
+ .until("2019-04-12")
+ .when((MembershipDTO membershipDto) -> membershipValidator.validate(membershipDto))
+ .thenActualException()
+ .isNull();
}
@Test
public void shouldRejectNewMembershipIfUntilDateEqualToSinceDate() {
new GivenMembershipValidationTestCase()
- .withNewMembershipForCustomer(1L).since("2019-04-11").until("2019-04-11")
- .when((MembershipDTO membershipDto) -> membershipValidator.validate(membershipDto))
- .thenActualException().isEqualToComparingFieldByField(new BadRequestAlertException(
- "Invalid untilDate", "membership", "untilDateMustBeAfterSinceDate"));
+ .withNewMembershipForCustomer(1L)
+ .since("2019-04-11")
+ .until("2019-04-11")
+ .when((MembershipDTO membershipDto) -> membershipValidator.validate(membershipDto))
+ .thenActualException()
+ .isEqualToComparingFieldByField(
+ new BadRequestAlertException(
+ "Invalid untilDate",
+ "membership",
+ "untilDateMustBeAfterSinceDate"));
}
@Test
public void shouldRejectNewMembershipIfUntilDateAfterSinceDate() {
new GivenMembershipValidationTestCase()
- .withNewMembershipForCustomer(1L).since("2019-04-12").until("2019-04-11")
- .when((MembershipDTO membershipDto) -> membershipValidator.validate(membershipDto))
- .thenActualException().isEqualToComparingFieldByField(new BadRequestAlertException(
- "Invalid untilDate", "membership", "untilDateMustBeAfterSinceDate"));
+ .withNewMembershipForCustomer(1L)
+ .since("2019-04-12")
+ .until("2019-04-11")
+ .when((MembershipDTO membershipDto) -> membershipValidator.validate(membershipDto))
+ .thenActualException()
+ .isEqualToComparingFieldByField(
+ new BadRequestAlertException(
+ "Invalid untilDate",
+ "membership",
+ "untilDateMustBeAfterSinceDate"));
}
@Test
public void shouldAcceptNewUncancelledMembershipIfNoUncancelledMembershipExistsForSameCustomer() {
new GivenMembershipValidationTestCase()
- .withUncancelledMembershipForCustomer(1L, false)
- .withNewMembershipForCustomer(1L).since("2019-04-12")
- .when((MembershipDTO membershipDto) -> membershipValidator.validate(membershipDto))
- .thenActualException().isNull();
+ .withUncancelledMembershipForCustomer(1L, false)
+ .withNewMembershipForCustomer(1L)
+ .since("2019-04-12")
+ .when((MembershipDTO membershipDto) -> membershipValidator.validate(membershipDto))
+ .thenActualException()
+ .isNull();
}
@Test
public void shouldRejectNewMembershipIfAnyUncancelledMembershipExistsForSameCustomer() {
new GivenMembershipValidationTestCase()
- .withUncancelledMembershipForCustomer(1L, true)
- .withNewMembershipForCustomer(1L).since("2019-04-12")
- .when((MembershipDTO membershipDto) -> membershipValidator.validate(membershipDto))
- .thenActualException().isEqualToComparingFieldByField(new BadRequestAlertException(
- "Another uncancelled membership exists", "membership", "anotherUncancelledMembershipExists"));
+ .withUncancelledMembershipForCustomer(1L, true)
+ .withNewMembershipForCustomer(1L)
+ .since("2019-04-12")
+ .when((MembershipDTO membershipDto) -> membershipValidator.validate(membershipDto))
+ .thenActualException()
+ .isEqualToComparingFieldByField(
+ new BadRequestAlertException(
+ "Another uncancelled membership exists",
+ "membership",
+ "anotherUncancelledMembershipExists"));
}
// -- only test fixture below ---
@@ -89,7 +113,9 @@ public class MembershipValidatorUnitTest {
private final MembershipDTO membershipDto = new MembershipDTO();
private BadRequestAlertException actualException;
- GivenMembershipValidationTestCase withUncancelledMembershipForCustomer(final long customerId, final boolean hasUncancelledMembership) {
+ GivenMembershipValidationTestCase withUncancelledMembershipForCustomer(
+ final long customerId,
+ final boolean hasUncancelledMembership) {
given(membershipRepository.hasUncancelledMembershipForCustomer(customerId)).willReturn(hasUncancelledMembership);
return this;
}
@@ -99,7 +125,6 @@ public class MembershipValidatorUnitTest {
return this;
}
-
GivenMembershipValidationTestCase since(final String sinceDate) {
membershipDto.setMemberFromDate(LocalDate.parse(sinceDate));
return this;
@@ -111,7 +136,9 @@ public class MembershipValidatorUnitTest {
}
GivenMembershipValidationTestCase when(final Consumer statement) {
- actualException = catchThrowableOfType(() -> membershipValidator.validate(membershipDto), BadRequestAlertException.class);
+ actualException = catchThrowableOfType(
+ () -> membershipValidator.validate(membershipDto),
+ BadRequestAlertException.class);
return this;
}
diff --git a/src/test/java/org/hostsharing/hsadminng/service/ShareServiceUnitTest.java b/src/test/java/org/hostsharing/hsadminng/service/ShareServiceUnitTest.java
index 34150e4c..3d44236f 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/ShareServiceUnitTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/ShareServiceUnitTest.java
@@ -1,12 +1,20 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
-import org.apache.commons.lang3.RandomUtils;
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.assertj.core.api.Assertions.catchThrowableOfType;
+import static org.mockito.ArgumentMatchers.same;
+import static org.mockito.BDDMockito.given;
+import static org.mockito.Mockito.*;
+
import org.hostsharing.hsadminng.domain.Share;
import org.hostsharing.hsadminng.domain.enumeration.ShareAction;
import org.hostsharing.hsadminng.repository.ShareRepository;
import org.hostsharing.hsadminng.service.dto.ShareDTO;
import org.hostsharing.hsadminng.service.mapper.ShareMapper;
import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
+
+import org.apache.commons.lang3.RandomUtils;
import org.junit.Rule;
import org.junit.Test;
import org.mockito.InjectMocks;
@@ -17,13 +25,6 @@ import org.mockito.junit.MockitoRule;
import javax.persistence.EntityManager;
-import static org.assertj.core.api.Assertions.assertThat;
-import static org.assertj.core.api.Assertions.catchThrowableOfType;
-import static org.mockito.ArgumentMatchers.same;
-import static org.mockito.BDDMockito.given;
-import static org.mockito.Mockito.*;
-
-
// HINT: In IntelliJ IDEA such unit test classes can be created with Shift-Ctrl-T.
// Do not forget to amend the class name (.e.g. ...UnitTest / ...IntTest)!
public class ShareServiceUnitTest {
@@ -54,13 +55,15 @@ public class ShareServiceUnitTest {
@Test
public void deleteIsRejectedForShareTransactions() {
// when
- final Throwable throwException = catchThrowableOfType(() -> shareService.delete(RandomUtils.nextLong()), BadRequestAlertException.class);
+ final Throwable throwException = catchThrowableOfType(
+ () -> shareService.delete(RandomUtils.nextLong()),
+ BadRequestAlertException.class);
// then
// HINT: When using auto-import for assertions (e.g. via Alt-Enter in IntelliJ IDEA),
// beware to use the correct candidate from org.assertj.core.api.Assertions.
assertThat(throwException).isEqualToComparingFieldByField(
- new BadRequestAlertException("Share transactions are immutable", "share", "shareTransactionImmutable"));
+ new BadRequestAlertException("Share transactions are immutable", "share", "shareTransactionImmutable"));
}
@Test
@@ -83,14 +86,18 @@ public class ShareServiceUnitTest {
public void saveShouldNotPersistInvalidTransactions() {
// given
final ShareDTO givenShareDTO = givenShareDTO(null, ShareAction.SUBSCRIPTION, anyNegativeNumber());
- doThrow(new BadRequestAlertException("Some Dummy Test Violation", "share", "shareInvalidTestDummy")).when(shareValidator).validate(givenShareDTO);
+ doThrow(new BadRequestAlertException("Some Dummy Test Violation", "share", "shareInvalidTestDummy"))
+ .when(shareValidator)
+ .validate(givenShareDTO);
// when
- final Throwable throwException = catchThrowableOfType(() -> shareService.save(givenShareDTO), BadRequestAlertException.class);
+ final Throwable throwException = catchThrowableOfType(
+ () -> shareService.save(givenShareDTO),
+ BadRequestAlertException.class);
// then
assertThat(throwException).isEqualToComparingFieldByField(
- new BadRequestAlertException("Some Dummy Test Violation", "share", "shareInvalidTestDummy"));
+ new BadRequestAlertException("Some Dummy Test Violation", "share", "shareInvalidTestDummy"));
}
@Test
@@ -113,14 +120,18 @@ public class ShareServiceUnitTest {
// given
final ShareDTO givenShareDTO = givenShareDTO(anyNonNullId(), ShareAction.SUBSCRIPTION, anyNegativeNumber());
// HINT: given(...) can't be used for void methods, in that case use Mockito's do...() methods
- doThrow(new BadRequestAlertException("Some Dummy Test Violation", "share", "shareInvalidTestDummy")).when(shareValidator).validate(givenShareDTO);
+ doThrow(new BadRequestAlertException("Some Dummy Test Violation", "share", "shareInvalidTestDummy"))
+ .when(shareValidator)
+ .validate(givenShareDTO);
// when
- final Throwable throwException = catchThrowableOfType(() -> shareService.save(givenShareDTO), BadRequestAlertException.class);
+ final Throwable throwException = catchThrowableOfType(
+ () -> shareService.save(givenShareDTO),
+ BadRequestAlertException.class);
// then
assertThat(throwException).isEqualToComparingFieldByField(
- new BadRequestAlertException("Some Dummy Test Violation", "share", "shareInvalidTestDummy"));
+ new BadRequestAlertException("Some Dummy Test Violation", "share", "shareInvalidTestDummy"));
}
// --- only test fixture code below ---
@@ -129,7 +140,8 @@ public class ShareServiceUnitTest {
return RandomUtils.nextInt();
}
- // HINT: This rather complicated setup indicates that the method ShareService::save breaks the single responsibility principle.
+ // HINT: This rather complicated setup indicates that the method ShareService::save breaks the single responsibility
+ // principle.
private ShareDTO givenShareDTO(final Long id, final ShareAction givenAction, final int givenQuantity) {
final ShareDTO givenShareDTO = createShareDTO(id, givenAction, givenQuantity);
diff --git a/src/test/java/org/hostsharing/hsadminng/service/ShareValidatorUnitTest.java b/src/test/java/org/hostsharing/hsadminng/service/ShareValidatorUnitTest.java
index d521f510..6f8993b7 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/ShareValidatorUnitTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/ShareValidatorUnitTest.java
@@ -1,18 +1,20 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
-import org.apache.commons.lang3.RandomUtils;
-import org.assertj.core.api.AbstractThrowableAssert;
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.assertj.core.api.Assertions.catchThrowableOfType;
+
import org.hostsharing.hsadminng.domain.enumeration.ShareAction;
import org.hostsharing.hsadminng.service.dto.ShareDTO;
import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
+
+import org.apache.commons.lang3.RandomUtils;
+import org.assertj.core.api.AbstractThrowableAssert;
import org.junit.Test;
import java.time.LocalDate;
import java.util.function.Consumer;
-import static org.assertj.core.api.Assertions.assertThat;
-import static org.assertj.core.api.Assertions.catchThrowableOfType;
-
public class ShareValidatorUnitTest {
private ShareValidator shareValidator = new ShareValidator();
@@ -20,90 +22,126 @@ public class ShareValidatorUnitTest {
@Test
public void shouldAcceptValidSubscription() {
new GivenShareValidationTestCase()
- .withAnyValidDateValues()
- .withAction(ShareAction.SUBSCRIPTION).withQuantity(1)
- .when((ShareDTO shareDto) -> shareValidator.validate(shareDto))
- .thenActualException().isNull();
+ .withAnyValidDateValues()
+ .withAction(ShareAction.SUBSCRIPTION)
+ .withQuantity(1)
+ .when((ShareDTO shareDto) -> shareValidator.validate(shareDto))
+ .thenActualException()
+ .isNull();
}
@Test
public void shouldAcceptValidCancellation() {
new GivenShareValidationTestCase()
- .withAnyValidDateValues()
- .withAction(ShareAction.CANCELLATION).withQuantity(-1)
- .when((ShareDTO shareDto) -> shareValidator.validate(shareDto))
- .thenActualException().isNull();
+ .withAnyValidDateValues()
+ .withAction(ShareAction.CANCELLATION)
+ .withQuantity(-1)
+ .when((ShareDTO shareDto) -> shareValidator.validate(shareDto))
+ .thenActualException()
+ .isNull();
}
@Test
public void shouldAcceptIfDocumentDateEqualsValueDate() {
new GivenShareValidationTestCase()
- .withDocumentDate("2019-04-11").withValueDate("2019-04-11")
- .withAction(ShareAction.SUBSCRIPTION).withQuantity(1)
- .when((ShareDTO shareDto) -> shareValidator.validate(shareDto))
- .thenActualException().isNull();
+ .withDocumentDate("2019-04-11")
+ .withValueDate("2019-04-11")
+ .withAction(ShareAction.SUBSCRIPTION)
+ .withQuantity(1)
+ .when((ShareDTO shareDto) -> shareValidator.validate(shareDto))
+ .thenActualException()
+ .isNull();
}
@Test
public void shouldRejectUpdates() {
new GivenShareValidationTestCase()
- .withId(RandomUtils.nextLong())
- .when((ShareDTO shareDto) -> shareValidator.validate(shareDto))
- .thenActualException().isEqualToComparingFieldByField(new BadRequestAlertException(
- "Share transactions are immutable", "share", "shareTransactionImmutable"));
+ .withId(RandomUtils.nextLong())
+ .when((ShareDTO shareDto) -> shareValidator.validate(shareDto))
+ .thenActualException()
+ .isEqualToComparingFieldByField(
+ new BadRequestAlertException(
+ "Share transactions are immutable",
+ "share",
+ "shareTransactionImmutable"));
}
@Test
public void shouldRejectIfDocumentDateAfterValueDate() {
new GivenShareValidationTestCase()
- .withDocumentDate("2019-04-13").withValueDate("2019-04-12")
- .withAction(ShareAction.SUBSCRIPTION).withQuantity(1)
- .when((ShareDTO shareDto) -> shareValidator.validate(shareDto))
- .thenActualException().isEqualToComparingFieldByField(new BadRequestAlertException(
- "Document date may not be after value date", "share", "documentDateMayNotBeAfterValueDate"));
+ .withDocumentDate("2019-04-13")
+ .withValueDate("2019-04-12")
+ .withAction(ShareAction.SUBSCRIPTION)
+ .withQuantity(1)
+ .when((ShareDTO shareDto) -> shareValidator.validate(shareDto))
+ .thenActualException()
+ .isEqualToComparingFieldByField(
+ new BadRequestAlertException(
+ "Document date may not be after value date",
+ "share",
+ "documentDateMayNotBeAfterValueDate"));
}
@Test
public void shouldRejectIfSubscriptionWithNegativeQuantity() {
new GivenShareValidationTestCase()
- .withAnyValidDateValues()
- .withAction(ShareAction.SUBSCRIPTION).withQuantity(-1)
- .when((ShareDTO shareDto) -> shareValidator.validate(shareDto))
- .thenActualException().isEqualToComparingFieldByField(new BadRequestAlertException(
- "Share subscriptions require a positive quantity", "share", "shareSubscriptionPositiveQuantity"));
+ .withAnyValidDateValues()
+ .withAction(ShareAction.SUBSCRIPTION)
+ .withQuantity(-1)
+ .when((ShareDTO shareDto) -> shareValidator.validate(shareDto))
+ .thenActualException()
+ .isEqualToComparingFieldByField(
+ new BadRequestAlertException(
+ "Share subscriptions require a positive quantity",
+ "share",
+ "shareSubscriptionPositiveQuantity"));
}
@Test
public void shouldRejectIfSubscriptionWithZeroQuantity() {
new GivenShareValidationTestCase()
- .withAnyValidDateValues()
- .withAction(ShareAction.SUBSCRIPTION).withQuantity(0)
- .when((ShareDTO shareDto) -> shareValidator.validate(shareDto))
- .thenActualException().isEqualToComparingFieldByField(new BadRequestAlertException(
- "Share subscriptions require a positive quantity", "share", "shareSubscriptionPositiveQuantity"));
+ .withAnyValidDateValues()
+ .withAction(ShareAction.SUBSCRIPTION)
+ .withQuantity(0)
+ .when((ShareDTO shareDto) -> shareValidator.validate(shareDto))
+ .thenActualException()
+ .isEqualToComparingFieldByField(
+ new BadRequestAlertException(
+ "Share subscriptions require a positive quantity",
+ "share",
+ "shareSubscriptionPositiveQuantity"));
}
@Test
public void shouldRejectIfCancellationWithPositiveQuantity() {
new GivenShareValidationTestCase()
- .withAnyValidDateValues()
- .withAction(ShareAction.CANCELLATION).withQuantity(1)
- .when((ShareDTO shareDto) -> shareValidator.validate(shareDto))
- .thenActualException().isEqualToComparingFieldByField(new BadRequestAlertException(
- "Share cancellations require a negative quantity", "share", "shareCancellationNegativeQuantity"));
+ .withAnyValidDateValues()
+ .withAction(ShareAction.CANCELLATION)
+ .withQuantity(1)
+ .when((ShareDTO shareDto) -> shareValidator.validate(shareDto))
+ .thenActualException()
+ .isEqualToComparingFieldByField(
+ new BadRequestAlertException(
+ "Share cancellations require a negative quantity",
+ "share",
+ "shareCancellationNegativeQuantity"));
}
@Test
public void shouldRejectIfCancellationWithZeroQuantity() {
new GivenShareValidationTestCase()
- .withAnyValidDateValues()
- .withAction(ShareAction.CANCELLATION).withQuantity(0)
- .when((ShareDTO shareDto) -> shareValidator.validate(shareDto))
- .thenActualException().isEqualToComparingFieldByField(new BadRequestAlertException(
- "Share cancellations require a negative quantity", "share", "shareCancellationNegativeQuantity"));
+ .withAnyValidDateValues()
+ .withAction(ShareAction.CANCELLATION)
+ .withQuantity(0)
+ .when((ShareDTO shareDto) -> shareValidator.validate(shareDto))
+ .thenActualException()
+ .isEqualToComparingFieldByField(
+ new BadRequestAlertException(
+ "Share cancellations require a negative quantity",
+ "share",
+ "shareCancellationNegativeQuantity"));
}
-
// -- only test fixture below ---
private class GivenShareValidationTestCase {
@@ -140,7 +178,7 @@ public class ShareValidatorUnitTest {
return this;
}
- GivenShareValidationTestCase when(final Consumer statement) {
+ GivenShareValidationTestCase when(final Consumer statement) {
actualException = catchThrowableOfType(() -> shareValidator.validate(shareDto), BadRequestAlertException.class);
return this;
}
@@ -150,5 +188,3 @@ public class ShareValidatorUnitTest {
}
}
}
-
-
diff --git a/src/test/java/org/hostsharing/hsadminng/service/UserServiceIntTest.java b/src/test/java/org/hostsharing/hsadminng/service/UserServiceIntTest.java
index e80fb6c5..d872bf32 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/UserServiceIntTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/UserServiceIntTest.java
@@ -1,5 +1,9 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service;
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.mockito.Mockito.when;
+
import org.hostsharing.hsadminng.HsadminNgApp;
import org.hostsharing.hsadminng.config.Constants;
import org.hostsharing.hsadminng.domain.User;
@@ -22,13 +26,10 @@ import org.springframework.test.context.junit4.SpringRunner;
import org.springframework.transaction.annotation.Transactional;
import java.time.Instant;
-import java.time.temporal.ChronoUnit;
import java.time.LocalDateTime;
-import java.util.Optional;
+import java.time.temporal.ChronoUnit;
import java.util.List;
-
-import static org.assertj.core.api.Assertions.assertThat;
-import static org.mockito.Mockito.when;
+import java.util.Optional;
/**
* Test class for the UserResource REST controller.
@@ -169,12 +170,13 @@ public class UserServiceIntTest {
}
final PageRequest pageable = PageRequest.of(0, (int) userRepository.count());
final Page allManagedUsers = userService.getAllManagedUsers(pageable);
- assertThat(allManagedUsers.getContent().stream()
- .noneMatch(user -> Constants.ANONYMOUS_USER.equals(user.getLogin())))
- .isTrue();
+ assertThat(
+ allManagedUsers.getContent()
+ .stream()
+ .noneMatch(user -> Constants.ANONYMOUS_USER.equals(user.getLogin())))
+ .isTrue();
}
-
@Test
@Transactional
public void testRemoveNotActivatedUsers() {
diff --git a/src/test/java/org/hostsharing/hsadminng/service/accessfilter/JSonAccessFilterTestFixture.java b/src/test/java/org/hostsharing/hsadminng/service/accessfilter/JSonAccessFilterTestFixture.java
index 29501f65..5ecc0368 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/accessfilter/JSonAccessFilterTestFixture.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/accessfilter/JSonAccessFilterTestFixture.java
@@ -1,15 +1,17 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.accessfilter;
-import org.apache.commons.lang3.RandomStringUtils;
-import org.apache.commons.lang3.RandomUtils;
+import static org.hostsharing.hsadminng.service.accessfilter.Role.*;
+
import org.hostsharing.hsadminng.service.IdToDtoResolver;
import org.hostsharing.hsadminng.service.dto.FluentBuilder;
+import org.apache.commons.lang3.RandomStringUtils;
+import org.apache.commons.lang3.RandomUtils;
+
import java.math.BigDecimal;
import java.time.LocalDate;
-import static org.hostsharing.hsadminng.service.accessfilter.Role.*;
-
public class JSonAccessFilterTestFixture {
static GivenDto createSampleDto() {
@@ -32,6 +34,7 @@ public class JSonAccessFilterTestFixture {
}
static class GivenCustomerDto implements FluentBuilder {
+
@SelfId(resolver = GivenService.class)
@AccessFor(read = ANYBODY)
Long id;
@@ -45,6 +48,7 @@ public class JSonAccessFilterTestFixture {
}
static class GivenDto implements FluentBuilder {
+
@SelfId(resolver = GivenService.class)
@AccessFor(read = ANYBODY)
Long id;
@@ -53,7 +57,10 @@ public class JSonAccessFilterTestFixture {
@AccessFor(init = ACTUAL_CUSTOMER_USER, update = ACTUAL_CUSTOMER_USER, read = ACTUAL_CUSTOMER_USER)
Long customerId;
- @AccessFor(init = {TECHNICAL_CONTACT, FINANCIAL_CONTACT}, update = {TECHNICAL_CONTACT, FINANCIAL_CONTACT}, read = {TECHNICAL_CONTACT, FINANCIAL_CONTACT})
+ @AccessFor(
+ init = { TECHNICAL_CONTACT, FINANCIAL_CONTACT },
+ update = { TECHNICAL_CONTACT, FINANCIAL_CONTACT },
+ read = { TECHNICAL_CONTACT, FINANCIAL_CONTACT })
String restrictedField;
@AccessFor(init = ANYBODY, update = ANYBODY, read = ANYBODY)
@@ -103,7 +110,8 @@ public class JSonAccessFilterTestFixture {
}
enum TestEnum {
- BLUE, GREEN
+ BLUE,
+ GREEN
}
static abstract class GivenChildService implements IdToDtoResolver {
@@ -119,7 +127,7 @@ public class JSonAccessFilterTestFixture {
@ParentId(resolver = GivenService.class)
Long parentId;
- @AccessFor(init = {TECHNICAL_CONTACT, FINANCIAL_CONTACT}, update = {TECHNICAL_CONTACT, FINANCIAL_CONTACT})
+ @AccessFor(init = { TECHNICAL_CONTACT, FINANCIAL_CONTACT }, update = { TECHNICAL_CONTACT, FINANCIAL_CONTACT })
String restrictedField;
}
diff --git a/src/test/java/org/hostsharing/hsadminng/service/accessfilter/JSonBuilder.java b/src/test/java/org/hostsharing/hsadminng/service/accessfilter/JSonBuilder.java
index be661d66..4935eaac 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/accessfilter/JSonBuilder.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/accessfilter/JSonBuilder.java
@@ -1,3 +1,4 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.accessfilter;
import org.apache.commons.lang3.StringUtils;
@@ -70,7 +71,6 @@ public class JSonBuilder {
return jsonArray.toString() + "]";
}
-
private static String inQuotes(Object value) {
return value != null ? "\"" + value.toString() + "\"" : "null";
}
diff --git a/src/test/java/org/hostsharing/hsadminng/service/accessfilter/JSonDeserializationWithAccessFilterUnitTest.java b/src/test/java/org/hostsharing/hsadminng/service/accessfilter/JSonDeserializationWithAccessFilterUnitTest.java
index bd97d358..1f894e15 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/accessfilter/JSonDeserializationWithAccessFilterUnitTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/accessfilter/JSonDeserializationWithAccessFilterUnitTest.java
@@ -1,13 +1,25 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.accessfilter;
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.assertj.core.api.Assertions.catchThrowable;
+import static org.assertj.core.api.Assumptions.assumeThat;
+import static org.hostsharing.hsadminng.service.accessfilter.JSonAccessFilterTestFixture.*;
+import static org.hostsharing.hsadminng.service.accessfilter.JSonBuilder.asJSon;
+import static org.hostsharing.hsadminng.service.accessfilter.MockSecurityContext.givenAuthenticatedUser;
+import static org.hostsharing.hsadminng.service.accessfilter.MockSecurityContext.givenUserHavingRole;
+import static org.mockito.BDDMockito.given;
+
+import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
+
import com.fasterxml.jackson.core.JsonParser;
import com.fasterxml.jackson.core.ObjectCodec;
import com.fasterxml.jackson.core.TreeNode;
import com.fasterxml.jackson.databind.DeserializationFeature;
import com.fasterxml.jackson.databind.ObjectMapper;
+
import org.apache.commons.lang3.NotImplementedException;
import org.apache.commons.lang3.tuple.ImmutablePair;
-import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
import org.junit.Before;
import org.junit.Rule;
import org.junit.Test;
@@ -23,21 +35,14 @@ import java.time.LocalDate;
import java.util.Arrays;
import java.util.Optional;
-import static org.assertj.core.api.Assertions.assertThat;
-import static org.assertj.core.api.Assertions.catchThrowable;
-import static org.assertj.core.api.Assumptions.assumeThat;
-import static org.hostsharing.hsadminng.service.accessfilter.JSonAccessFilterTestFixture.*;
-import static org.hostsharing.hsadminng.service.accessfilter.JSonBuilder.asJSon;
-import static org.hostsharing.hsadminng.service.accessfilter.MockSecurityContext.givenAuthenticatedUser;
-import static org.hostsharing.hsadminng.service.accessfilter.MockSecurityContext.givenUserHavingRole;
-import static org.mockito.BDDMockito.given;
-
@SuppressWarnings("ALL")
public class JSonDeserializationWithAccessFilterUnitTest {
public static final String SOME_BIG_DECIMAL_AS_STRING = "5432191234888.1";
- public static final BigDecimal SOME_BIG_DECIMAL = new BigDecimal(SOME_BIG_DECIMAL_AS_STRING).setScale(2, BigDecimal.ROUND_HALF_UP);
- public static final BigDecimal SOME_BIG_DECIMAL_WITH_ANOTHER_SCALE = new BigDecimal(SOME_BIG_DECIMAL_AS_STRING).setScale(5, BigDecimal.ROUND_HALF_UP);
+ public static final BigDecimal SOME_BIG_DECIMAL = new BigDecimal(SOME_BIG_DECIMAL_AS_STRING)
+ .setScale(2, BigDecimal.ROUND_HALF_UP);
+ public static final BigDecimal SOME_BIG_DECIMAL_WITH_ANOTHER_SCALE = new BigDecimal(SOME_BIG_DECIMAL_AS_STRING)
+ .setScale(5, BigDecimal.ROUND_HALF_UP);
@Rule
public MockitoRule mockitoRule = MockitoJUnit.rule();
@@ -72,26 +77,28 @@ public class JSonDeserializationWithAccessFilterUnitTest {
given(ctx.getAutowireCapableBeanFactory()).willReturn(autowireCapableBeanFactory);
given(autowireCapableBeanFactory.createBean(GivenService.class)).willReturn(givenService);
- given(givenService.findOne(1234L)).willReturn(Optional.of(new GivenDto()
- .with( dto -> {
- dto.id = 1234L;
- dto.customerId = 888L;
- dto.openIntegerField = 11111;
- dto.openPrimitiveIntField = 2222;
- dto.openLongField = 33333333333333L;
- dto.openPrimitiveLongField = 44444444L;
- dto.openBooleanField = true;
- dto.openPrimitiveBooleanField = false;
- dto.openBigDecimalField = SOME_BIG_DECIMAL;
- dto.openStringField = "3333";
- dto.restrictedField = "initial value of restricted field";
- dto.restrictedBigDecimalField = SOME_BIG_DECIMAL;
- })
- ));
+ given(givenService.findOne(1234L)).willReturn(
+ Optional.of(
+ new GivenDto()
+ .with(dto -> {
+ dto.id = 1234L;
+ dto.customerId = 888L;
+ dto.openIntegerField = 11111;
+ dto.openPrimitiveIntField = 2222;
+ dto.openLongField = 33333333333333L;
+ dto.openPrimitiveLongField = 44444444L;
+ dto.openBooleanField = true;
+ dto.openPrimitiveBooleanField = false;
+ dto.openBigDecimalField = SOME_BIG_DECIMAL;
+ dto.openStringField = "3333";
+ dto.restrictedField = "initial value of restricted field";
+ dto.restrictedBigDecimalField = SOME_BIG_DECIMAL;
+ })));
given(autowireCapableBeanFactory.createBean(GivenCustomerService.class)).willReturn(givenCustomerService);
- given(givenCustomerService.findOne(888L)).willReturn(Optional.of(new GivenCustomerDto()
- .with(dto -> dto.id = 888L)
- ));
+ given(givenCustomerService.findOne(888L)).willReturn(
+ Optional.of(
+ new GivenCustomerDto()
+ .with(dto -> dto.id = 888L)));
given(jsonParser.getCodec()).willReturn(codec);
}
@@ -99,10 +106,11 @@ public class JSonDeserializationWithAccessFilterUnitTest {
@Test
public void shouldDeserializeNullField() throws IOException {
// given
- givenJSonTree(asJSon(
- ImmutablePair.of("id", 1234L),
- ImmutablePair.of("customerId", 888L),
- ImmutablePair.of("openStringField", null)));
+ givenJSonTree(
+ asJSon(
+ ImmutablePair.of("id", 1234L),
+ ImmutablePair.of("customerId", 888L),
+ ImmutablePair.of("openStringField", null)));
// when
GivenDto actualDto = new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, GivenDto.class).deserialize();
@@ -114,10 +122,11 @@ public class JSonDeserializationWithAccessFilterUnitTest {
@Test
public void shouldDeserializeStringField() throws IOException {
// given
- givenJSonTree(asJSon(
- ImmutablePair.of("id", 1234L),
- ImmutablePair.of("customerId", 888L),
- ImmutablePair.of("openStringField", "String Value")));
+ givenJSonTree(
+ asJSon(
+ ImmutablePair.of("id", 1234L),
+ ImmutablePair.of("customerId", 888L),
+ ImmutablePair.of("openStringField", "String Value")));
// when
GivenDto actualDto = new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, GivenDto.class).deserialize();
@@ -129,10 +138,11 @@ public class JSonDeserializationWithAccessFilterUnitTest {
@Test
public void shouldDeserializeIntegerField() throws IOException {
// given
- givenJSonTree(asJSon(
- ImmutablePair.of("id", 1234L),
- ImmutablePair.of("customerId", 888L),
- ImmutablePair.of("openIntegerField", 1234)));
+ givenJSonTree(
+ asJSon(
+ ImmutablePair.of("id", 1234L),
+ ImmutablePair.of("customerId", 888L),
+ ImmutablePair.of("openIntegerField", 1234)));
// when
GivenDto actualDto = new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, GivenDto.class).deserialize();
@@ -141,15 +151,15 @@ public class JSonDeserializationWithAccessFilterUnitTest {
assertThat(actualDto.openIntegerField).isEqualTo(1234);
}
-
@Test
public void shouldDeserializeRestrictedBigDecimalFieldIfUnchangedByCompareTo() throws IOException {
// given
assumeThat(SOME_BIG_DECIMAL_WITH_ANOTHER_SCALE).isNotEqualTo(SOME_BIG_DECIMAL);
- givenJSonTree(asJSon(
- ImmutablePair.of("id", 1234L),
- ImmutablePair.of("customerId", 888L),
- ImmutablePair.of("restrictedBigDecimalField", SOME_BIG_DECIMAL_WITH_ANOTHER_SCALE)));
+ givenJSonTree(
+ asJSon(
+ ImmutablePair.of("id", 1234L),
+ ImmutablePair.of("customerId", 888L),
+ ImmutablePair.of("restrictedBigDecimalField", SOME_BIG_DECIMAL_WITH_ANOTHER_SCALE)));
// when
GivenDto actualDto = new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, GivenDto.class).deserialize();
@@ -160,26 +170,26 @@ public class JSonDeserializationWithAccessFilterUnitTest {
}
@Test
- // TODO: split in separate tests for each type, you see all errors at once (if any) and it's easier to debug when there are problems
+ // TODO: split in separate tests for each type, you see all errors at once (if any) and it's easier to debug when there are
+ // problems
public void shouldDeserializeAcessibleFieldOfAnyType() throws IOException {
// given
- givenJSonTree(asJSon(
- ImmutablePair.of("id", 1234L),
- ImmutablePair.of("customerId", 888L),
- ImmutablePair.of("openIntegerField", 11),
- ImmutablePair.of("openPrimitiveIntField", 22),
- ImmutablePair.of("openLongField", 333333333333333333L),
- ImmutablePair.of("openPrimitiveLongField", 44444L),
- ImmutablePair.of("openBooleanField", true),
- ImmutablePair.of("openPrimitiveBooleanField", false),
- // TODO: ImmutablePair.of("openBigDecimalField", new BigDecimal("99999999999999999999.1")),
- // check why DeserializationFeature.USE_BIG_DECIMAL_FOR_FLOATS is not working!
- ImmutablePair.of("openBigDecimalField", new BigDecimal("99999999999999.1")),
- ImmutablePair.of("openLocalDateField", LocalDate.parse("2019-04-25")),
- ImmutablePair.of("openLocalDateField2", Arrays.asList(2019, 4, 24)),
- ImmutablePair.of("openEnumField", TestEnum.GREEN)
- )
- );
+ givenJSonTree(
+ asJSon(
+ ImmutablePair.of("id", 1234L),
+ ImmutablePair.of("customerId", 888L),
+ ImmutablePair.of("openIntegerField", 11),
+ ImmutablePair.of("openPrimitiveIntField", 22),
+ ImmutablePair.of("openLongField", 333333333333333333L),
+ ImmutablePair.of("openPrimitiveLongField", 44444L),
+ ImmutablePair.of("openBooleanField", true),
+ ImmutablePair.of("openPrimitiveBooleanField", false),
+ // TODO: ImmutablePair.of("openBigDecimalField", new BigDecimal("99999999999999999999.1")),
+ // check why DeserializationFeature.USE_BIG_DECIMAL_FOR_FLOATS is not working!
+ ImmutablePair.of("openBigDecimalField", new BigDecimal("99999999999999.1")),
+ ImmutablePair.of("openLocalDateField", LocalDate.parse("2019-04-25")),
+ ImmutablePair.of("openLocalDateField2", Arrays.asList(2019, 4, 24)),
+ ImmutablePair.of("openEnumField", TestEnum.GREEN)));
// when
GivenDto actualDto = new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, GivenDto.class).deserialize();
@@ -200,15 +210,15 @@ public class JSonDeserializationWithAccessFilterUnitTest {
@Test
public void shouldNotDeserializeFieldWithUnknownJSonNodeType() throws IOException {
// given
- givenJSonTree(asJSon(
- ImmutablePair.of("id", 1234L),
- ImmutablePair.of("customerId", 888L),
- ImmutablePair.of("openArrayField", Arrays.asList(11, 22, 33))
- )
- );
+ givenJSonTree(
+ asJSon(
+ ImmutablePair.of("id", 1234L),
+ ImmutablePair.of("customerId", 888L),
+ ImmutablePair.of("openArrayField", Arrays.asList(11, 22, 33))));
// when
- Throwable exception = catchThrowable(() -> new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, GivenDto.class).deserialize());
+ Throwable exception = catchThrowable(
+ () -> new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, GivenDto.class).deserialize());
// then
assertThat(exception).isInstanceOf(NotImplementedException.class);
@@ -219,10 +229,11 @@ public class JSonDeserializationWithAccessFilterUnitTest {
// given
givenAuthenticatedUser();
givenUserHavingRole(GivenCustomerDto.class, 888L, Role.FINANCIAL_CONTACT);
- givenJSonTree(asJSon(
- ImmutablePair.of("id", 1234L),
- ImmutablePair.of("customerId", 888L),
- ImmutablePair.of("restrictedField", "update value of restricted field")));
+ givenJSonTree(
+ asJSon(
+ ImmutablePair.of("id", 1234L),
+ ImmutablePair.of("customerId", 888L),
+ ImmutablePair.of("restrictedField", "update value of restricted field")));
// when
GivenDto actualDto = new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, GivenDto.class).deserialize();
@@ -236,10 +247,11 @@ public class JSonDeserializationWithAccessFilterUnitTest {
// given
givenAuthenticatedUser();
givenUserHavingRole(GivenCustomerDto.class, 888L, Role.ACTUAL_CUSTOMER_USER);
- givenJSonTree(asJSon(
- ImmutablePair.of("id", 1234L),
- ImmutablePair.of("customerId", 888L),
- ImmutablePair.of("restrictedField", "initial value of restricted field")));
+ givenJSonTree(
+ asJSon(
+ ImmutablePair.of("id", 1234L),
+ ImmutablePair.of("customerId", 888L),
+ ImmutablePair.of("restrictedField", "initial value of restricted field")));
// when
GivenDto actualDto = new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, GivenDto.class).deserialize();
@@ -253,13 +265,14 @@ public class JSonDeserializationWithAccessFilterUnitTest {
// given
givenAuthenticatedUser();
givenUserHavingRole(GivenCustomerDto.class, 888L, Role.ACTUAL_CUSTOMER_USER);
- givenJSonTree(asJSon(
- ImmutablePair.of("customerId", 888L),
- ImmutablePair.of("restrictedField", "updated value of restricted field"))
- );
+ givenJSonTree(
+ asJSon(
+ ImmutablePair.of("customerId", 888L),
+ ImmutablePair.of("restrictedField", "updated value of restricted field")));
// when
- Throwable exception = catchThrowable(() -> new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, GivenDto.class).deserialize());
+ Throwable exception = catchThrowable(
+ () -> new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, GivenDto.class).deserialize());
// then
assertThat(exception).isInstanceOfSatisfying(BadRequestAlertException.class, badRequestAlertException -> {
@@ -273,13 +286,14 @@ public class JSonDeserializationWithAccessFilterUnitTest {
// given
givenAuthenticatedUser();
givenUserHavingRole(GivenCustomerDto.class, 888L, Role.ACTUAL_CUSTOMER_USER);
- givenJSonTree(asJSon(
- ImmutablePair.of("customerId", 888L),
- ImmutablePair.of("restrictedField", "another value of restricted field"))
- );
+ givenJSonTree(
+ asJSon(
+ ImmutablePair.of("customerId", 888L),
+ ImmutablePair.of("restrictedField", "another value of restricted field")));
// when
- Throwable exception = catchThrowable(() -> new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, GivenDto.class).deserialize());
+ Throwable exception = catchThrowable(
+ () -> new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, GivenDto.class).deserialize());
// then
assertThat(exception).isInstanceOfSatisfying(BadRequestAlertException.class, badRequestAlertException -> {
@@ -293,12 +307,13 @@ public class JSonDeserializationWithAccessFilterUnitTest {
// given
givenAuthenticatedUser();
givenUserHavingRole(GivenDto.class, 9999L, Role.CONTRACTUAL_CONTACT);
- givenJSonTree(asJSon(
- ImmutablePair.of("parentId", 1234L))
- );
+ givenJSonTree(
+ asJSon(
+ ImmutablePair.of("parentId", 1234L)));
// when
- Throwable exception = catchThrowable(() -> new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, GivenChildDto.class).deserialize());
+ Throwable exception = catchThrowable(
+ () -> new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, GivenChildDto.class).deserialize());
// then
assertThat(exception).isInstanceOfSatisfying(BadRequestAlertException.class, badRequestAlertException -> {
@@ -312,12 +327,13 @@ public class JSonDeserializationWithAccessFilterUnitTest {
// given
givenAuthenticatedUser();
givenUserHavingRole(GivenDto.class, 1234L, Role.CONTRACTUAL_CONTACT);
- givenJSonTree(asJSon(
- ImmutablePair.of("parentId", 1234L))
- );
+ givenJSonTree(
+ asJSon(
+ ImmutablePair.of("parentId", 1234L)));
// when
- final GivenChildDto actualDto = new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, GivenChildDto.class).deserialize();
+ final GivenChildDto actualDto = new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, GivenChildDto.class)
+ .deserialize();
// then
assertThat(actualDto.parentId).isEqualTo(1234L);
@@ -328,13 +344,15 @@ public class JSonDeserializationWithAccessFilterUnitTest {
// given
givenAuthenticatedUser();
givenUserHavingRole(GivenCustomerDto.class, 888L, Role.ACTUAL_CUSTOMER_USER);
- givenJSonTree(asJSon(
- ImmutablePair.of("id", 1234L),
- ImmutablePair.of("customerId", 888L),
- ImmutablePair.of("restrictedField", "Restricted String Value")));
+ givenJSonTree(
+ asJSon(
+ ImmutablePair.of("id", 1234L),
+ ImmutablePair.of("customerId", 888L),
+ ImmutablePair.of("restrictedField", "Restricted String Value")));
// when
- Throwable exception = catchThrowable(() -> new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, GivenDto.class).deserialize());
+ Throwable exception = catchThrowable(
+ () -> new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, GivenDto.class).deserialize());
// then
assertThat(exception).isInstanceOfSatisfying(BadRequestAlertException.class, badRequestAlertException -> {
@@ -349,10 +367,13 @@ public class JSonDeserializationWithAccessFilterUnitTest {
givenJSonTree(asJSon(ImmutablePair.of("id", 1111L)));
// when
- Throwable exception = catchThrowable(() -> new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, GivenDtoWithMultipleSelfId.class).deserialize());
+ Throwable exception = catchThrowable(
+ () -> new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, GivenDtoWithMultipleSelfId.class)
+ .deserialize());
// then
- assertThat(exception).isInstanceOf(AssertionError.class).hasMessage("multiple @SelfId detected in GivenDtoWithMultipleSelfId");
+ assertThat(exception).isInstanceOf(AssertionError.class)
+ .hasMessage("multiple @SelfId detected in GivenDtoWithMultipleSelfId");
}
@Test
@@ -363,13 +384,15 @@ public class JSonDeserializationWithAccessFilterUnitTest {
givenJSonTree(asJSon(ImmutablePair.of("unknown", new Arbitrary())));
// when
- Throwable exception = catchThrowable(() -> new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, GivenDtoWithUnknownFieldType.class).deserialize());
+ Throwable exception = catchThrowable(
+ () -> new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, GivenDtoWithUnknownFieldType.class)
+ .deserialize());
// then
assertThat(exception).isInstanceOf(NotImplementedException.class)
- .hasMessageStartingWith("property type not yet implemented: ")
- .hasMessageContaining("Arbitrary")
- .hasMessageContaining("GivenDtoWithUnknownFieldType.unknown");
+ .hasMessageStartingWith("property type not yet implemented: ")
+ .hasMessageContaining("Arbitrary")
+ .hasMessageContaining("GivenDtoWithUnknownFieldType.unknown");
}
// --- only fixture code below ---
diff --git a/src/test/java/org/hostsharing/hsadminng/service/accessfilter/JSonSerializationWithAccessFilterUnitTest.java b/src/test/java/org/hostsharing/hsadminng/service/accessfilter/JSonSerializationWithAccessFilterUnitTest.java
index 4841d729..451c086e 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/accessfilter/JSonSerializationWithAccessFilterUnitTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/accessfilter/JSonSerializationWithAccessFilterUnitTest.java
@@ -1,6 +1,15 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.accessfilter;
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.assertj.core.api.Assertions.catchThrowable;
+import static org.hostsharing.hsadminng.service.accessfilter.JSonAccessFilterTestFixture.*;
+import static org.mockito.BDDMockito.given;
+import static org.mockito.Mockito.never;
+import static org.mockito.Mockito.verify;
+
import com.fasterxml.jackson.core.JsonGenerator;
+
import org.apache.commons.lang3.NotImplementedException;
import org.junit.Before;
import org.junit.Rule;
@@ -14,13 +23,6 @@ import org.springframework.context.ApplicationContext;
import java.io.IOException;
import java.util.Optional;
-import static org.assertj.core.api.Assertions.assertThat;
-import static org.assertj.core.api.Assertions.catchThrowable;
-import static org.hostsharing.hsadminng.service.accessfilter.JSonAccessFilterTestFixture.*;
-import static org.mockito.BDDMockito.given;
-import static org.mockito.Mockito.never;
-import static org.mockito.Mockito.verify;
-
public class JSonSerializationWithAccessFilterUnitTest {
@Rule
@@ -47,9 +49,10 @@ public class JSonSerializationWithAccessFilterUnitTest {
given(ctx.getAutowireCapableBeanFactory()).willReturn(autowireCapableBeanFactory);
given(autowireCapableBeanFactory.createBean(GivenCustomerService.class)).willReturn(givenCustomerService);
- given(givenCustomerService.findOne(888L)).willReturn(Optional.of(new GivenCustomerDto()
- .with(dto -> dto.id = 888L)
- ));
+ given(givenCustomerService.findOne(888L)).willReturn(
+ Optional.of(
+ new GivenCustomerDto()
+ .with(dto -> dto.id = 888L)));
}
@Test
@@ -177,13 +180,16 @@ public class JSonSerializationWithAccessFilterUnitTest {
class Arbitrary {
}
class GivenDtoWithUnimplementedFieldType {
+
@AccessFor(read = Role.ANYBODY)
Arbitrary fieldWithUnimplementedType = new Arbitrary();
}
final GivenDtoWithUnimplementedFieldType givenDtoWithUnimplementedFieldType = new GivenDtoWithUnimplementedFieldType();
// when
- final Throwable actual = catchThrowable(() -> new JSonSerializationWithAccessFilter<>(ctx, jsonGenerator, null, givenDtoWithUnimplementedFieldType).serialize());
+ final Throwable actual = catchThrowable(
+ () -> new JSonSerializationWithAccessFilter<>(ctx, jsonGenerator, null, givenDtoWithUnimplementedFieldType)
+ .serialize());
// then
assertThat(actual).isInstanceOf(NotImplementedException.class);
diff --git a/src/test/java/org/hostsharing/hsadminng/service/accessfilter/MockSecurityContext.java b/src/test/java/org/hostsharing/hsadminng/service/accessfilter/MockSecurityContext.java
index da028ca4..a110627b 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/accessfilter/MockSecurityContext.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/accessfilter/MockSecurityContext.java
@@ -1,12 +1,14 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.accessfilter;
+import static org.assertj.core.api.Assumptions.assumeThat;
+
import org.hostsharing.hsadminng.security.SecurityUtils;
+
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
import org.springframework.security.core.context.SecurityContext;
import org.springframework.security.core.context.SecurityContextHolder;
-import static org.assertj.core.api.Assumptions.assumeThat;
-
public class MockSecurityContext {
public static void givenAuthenticatedUser() {
diff --git a/src/test/java/org/hostsharing/hsadminng/service/accessfilter/RoleUnitTest.java b/src/test/java/org/hostsharing/hsadminng/service/accessfilter/RoleUnitTest.java
index ce6a16f8..54807f98 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/accessfilter/RoleUnitTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/accessfilter/RoleUnitTest.java
@@ -1,13 +1,15 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.accessfilter;
-import com.google.common.base.VerifyException;
-import org.junit.Test;
-
-import java.lang.reflect.Field;
-
import static org.assertj.core.api.Assertions.assertThat;
import static org.assertj.core.api.ThrowableAssert.catchThrowable;
+import com.google.common.base.VerifyException;
+
+import org.junit.Test;
+
+import java.lang.reflect.Field;
+
public class RoleUnitTest {
@Test
@@ -20,7 +22,6 @@ public class RoleUnitTest {
assertThat(Role.FINANCIAL_CONTACT.covers(Role.FINANCIAL_CONTACT)).isTrue();
assertThat(Role.TECHNICAL_CONTACT.covers(Role.TECHNICAL_CONTACT)).isTrue();
-
assertThat(Role.ACTUAL_CUSTOMER_USER.covers((Role.ACTUAL_CUSTOMER_USER))).isTrue();
assertThat(Role.ANY_CUSTOMER_USER.covers((Role.ANY_CUSTOMER_USER))).isTrue();
}
@@ -153,13 +154,14 @@ public class RoleUnitTest {
// --- only test fixture below ---
static class TestDto {
+
@AccessFor(init = Role.ADMIN, update = Role.SUPPORTER, read = Role.ANY_CUSTOMER_CONTACT)
private Integer someFieldWithAccessForAnnotation;
@AccessFor(update = Role.IGNORED, read = Role.ANY_CUSTOMER_CONTACT)
private Integer someFieldWithAccessForAnnotationToBeIgnoredForUpdates;
- @AccessFor(update = {Role.IGNORED, Role.SUPPORTER}, read = Role.ANY_CUSTOMER_CONTACT)
+ @AccessFor(update = { Role.IGNORED, Role.SUPPORTER }, read = Role.ANY_CUSTOMER_CONTACT)
private Integer someFieldWithAccessForAnnotationToBeIgnoredForUpdatesAmongOthers;
private Integer someFieldWithoutAccessForAnnotation;
@@ -173,8 +175,10 @@ public class RoleUnitTest {
static {
try {
someFieldWithoutAccessForAnnotation = TestDto.class.getDeclaredField("someFieldWithoutAccessForAnnotation");
- someFieldWithAccessForAnnotationToBeIgnoredForUpdates = TestDto.class.getDeclaredField("someFieldWithAccessForAnnotationToBeIgnoredForUpdates");
- someFieldWithAccessForAnnotationToBeIgnoredForUpdatesAmongOthers = TestDto.class.getDeclaredField("someFieldWithAccessForAnnotationToBeIgnoredForUpdatesAmongOthers");
+ someFieldWithAccessForAnnotationToBeIgnoredForUpdates = TestDto.class
+ .getDeclaredField("someFieldWithAccessForAnnotationToBeIgnoredForUpdates");
+ someFieldWithAccessForAnnotationToBeIgnoredForUpdatesAmongOthers = TestDto.class
+ .getDeclaredField("someFieldWithAccessForAnnotationToBeIgnoredForUpdatesAmongOthers");
someFieldWithAccessForAnnotation = TestDto.class.getDeclaredField("someFieldWithAccessForAnnotation");
} catch (NoSuchFieldException e) {
throw new AssertionError("precondition failed", e);
diff --git a/src/test/java/org/hostsharing/hsadminng/service/dto/AccessMappingsUnitTestBase.java b/src/test/java/org/hostsharing/hsadminng/service/dto/AccessMappingsUnitTestBase.java
index 3992ea27..a458a839 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/dto/AccessMappingsUnitTestBase.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/dto/AccessMappingsUnitTestBase.java
@@ -1,8 +1,14 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.dto;
-import org.apache.commons.lang3.RandomUtils;
+import static org.apache.commons.lang3.StringUtils.removeEnd;
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.junit.Assert.fail;
+
import org.hostsharing.hsadminng.service.accessfilter.*;
import org.hostsharing.hsadminng.service.util.ReflectionUtil;
+
+import org.apache.commons.lang3.RandomUtils;
import org.junit.Test;
import org.springframework.boot.jackson.JsonComponent;
@@ -15,10 +21,6 @@ import java.util.function.BiFunction;
import java.util.function.Function;
import java.util.stream.Collectors;
-import static org.apache.commons.lang3.StringUtils.removeEnd;
-import static org.assertj.core.api.Assertions.assertThat;
-import static org.junit.Assert.fail;
-
/**
* Usually base classes for unit tests are not a good idea, but because
* DTOs which implement AccessMapping are more like a DSL,
@@ -30,7 +32,10 @@ public abstract class AccessMappingsUnitTestBase {
private final BiFunction createSampleDTO;
private final BiFunction createRandomDTO;
- public AccessMappingsUnitTestBase(Class extends AccessMappings> dtoClass, final BiFunction createSampleDTO, final BiFunction createRandomDTO) {
+ public AccessMappingsUnitTestBase(
+ Class extends AccessMappings> dtoClass,
+ final BiFunction createSampleDTO,
+ final BiFunction createRandomDTO) {
this.dtoClass = dtoClass;
this.createSampleDTO = createSampleDTO;
this.createRandomDTO = createRandomDTO;
@@ -105,6 +110,7 @@ public abstract class AccessMappingsUnitTestBase {
// This class should have the same generics as the outer class, but then the
// method references (AccessFor::*) can't be resolved anymore by the Java compiler.
protected static class AccessRightsMatcher {
+
private final Object dtoClass;
private final Role role;
@@ -117,9 +123,14 @@ public abstract class AccessMappingsUnitTestBase {
final Set fieldsWithAccessForAnnotation = determineFieldsWithAccessForAnnotation(dtoClass);
this.namesOfFieldsWithAccessForAnnotation = fieldsWithAccessForAnnotation.stream()
- .map(Field::getName).collect(Collectors.toList()).toArray(new String[]{});
+ .map(Field::getName)
+ .collect(Collectors.toList())
+ .toArray(new String[] {});
this.namesOfAccessibleFields = fieldsWithAccessForAnnotation.stream()
- .filter(f -> allows(f, access, role)).map(Field::getName).collect(Collectors.toList()).toArray(new String[]{});
+ .filter(f -> allows(f, access, role))
+ .map(Field::getName)
+ .collect(Collectors.toList())
+ .toArray(new String[] {});
}
public void shouldBeExactlyFor(final String... expectedFields) {
@@ -134,7 +145,6 @@ public abstract class AccessMappingsUnitTestBase {
assertThat(namesOfAccessibleFields).containsExactlyInAnyOrder(namesOfFieldsWithAccessForAnnotation);
}
-
private static Set determineFieldsWithAccessForAnnotation(final Class> dtoClass) {
final Set fieldsWithAccessForAnnotation = new HashSet<>();
@@ -205,13 +215,16 @@ public abstract class AccessMappingsUnitTestBase {
for (Class> declaredClass : dtoClass.getDeclaredClasses()) {
if (expectedSuperclass.isAssignableFrom(declaredClass)) {
assertThat(declaredClass.isAnnotationPresent(JsonComponent.class))
- .as(declaredClass + " requires @" + JsonComponent.class.getSimpleName()).isTrue();
+ .as(declaredClass + " requires @" + JsonComponent.class.getSimpleName())
+ .isTrue();
assertThat(ReflectionUtil.determineGenericClassParameter(declaredClass, expectedSuperclass, 0))
- .as(declaredClass + " must resolve generic parameter of " + expectedSuperclass + " to type of DTO").isEqualTo(dtoClass);
+ .as(declaredClass + " must resolve generic parameter of " + expectedSuperclass + " to type of DTO")
+ .isEqualTo(dtoClass);
assertThat(Modifier.isPublic(declaredClass.getModifiers())).as(declaredClass + " must be public").isTrue();
assertThat(Modifier.isStatic(declaredClass.getModifiers())).as(declaredClass + " must be static").isTrue();
assertThat(Modifier.isFinal(declaredClass.getModifiers())).as(declaredClass + " must not be final").isFalse();
- assertThat(Modifier.isAbstract(declaredClass.getModifiers())).as(declaredClass + " must not be abstract").isFalse();
+ assertThat(Modifier.isAbstract(declaredClass.getModifiers())).as(declaredClass + " must not be abstract")
+ .isFalse();
return;
}
}
diff --git a/src/test/java/org/hostsharing/hsadminng/service/dto/AssetDTOIntTest.java b/src/test/java/org/hostsharing/hsadminng/service/dto/AssetDTOIntTest.java
index b0c1f6f9..6f32c382 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/dto/AssetDTOIntTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/dto/AssetDTOIntTest.java
@@ -1,8 +1,13 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.dto;
-import com.fasterxml.jackson.core.JsonProcessingException;
-import com.fasterxml.jackson.databind.ObjectMapper;
-import org.apache.commons.lang3.RandomUtils;
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.assertj.core.api.Assertions.catchThrowable;
+import static org.hostsharing.hsadminng.service.accessfilter.MockSecurityContext.givenAuthenticatedUser;
+import static org.hostsharing.hsadminng.service.accessfilter.MockSecurityContext.givenUserHavingRole;
+import static org.junit.Assert.assertEquals;
+import static org.mockito.BDDMockito.given;
+
import org.hostsharing.hsadminng.domain.Asset;
import org.hostsharing.hsadminng.domain.Customer;
import org.hostsharing.hsadminng.domain.Membership;
@@ -20,6 +25,11 @@ import org.hostsharing.hsadminng.service.mapper.AssetMapperImpl;
import org.hostsharing.hsadminng.service.mapper.CustomerMapperImpl;
import org.hostsharing.hsadminng.service.mapper.MembershipMapperImpl;
import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
+
+import com.fasterxml.jackson.core.JsonProcessingException;
+import com.fasterxml.jackson.databind.ObjectMapper;
+
+import org.apache.commons.lang3.RandomUtils;
import org.junit.Before;
import org.junit.Rule;
import org.junit.Test;
@@ -32,27 +42,22 @@ import org.springframework.boot.test.context.SpringBootTest;
import org.springframework.boot.test.mock.mockito.MockBean;
import org.springframework.test.context.junit4.SpringRunner;
-import javax.persistence.EntityManager;
import java.io.IOException;
import java.math.BigDecimal;
import java.time.LocalDate;
import java.util.Optional;
-import static org.assertj.core.api.Assertions.assertThat;
-import static org.assertj.core.api.Assertions.catchThrowable;
-import static org.hostsharing.hsadminng.service.accessfilter.MockSecurityContext.givenAuthenticatedUser;
-import static org.hostsharing.hsadminng.service.accessfilter.MockSecurityContext.givenUserHavingRole;
-import static org.junit.Assert.assertEquals;
-import static org.mockito.BDDMockito.given;
+import javax.persistence.EntityManager;
@JsonTest
-@SpringBootTest(classes = {
- CustomerMapperImpl.class,
- MembershipMapperImpl.class,
- AssetMapperImpl.class,
- AssetDTO.JsonSerializer.class,
- AssetDTO.JsonDeserializer.class
-})
+@SpringBootTest(
+ classes = {
+ CustomerMapperImpl.class,
+ MembershipMapperImpl.class,
+ AssetMapperImpl.class,
+ AssetDTO.JsonSerializer.class,
+ AssetDTO.JsonDeserializer.class
+ })
@RunWith(SpringRunner.class)
public class AssetDTOIntTest {
@@ -61,12 +66,15 @@ public class AssetDTOIntTest {
private static final String SOME_CUSTOMER_PREFIX = "abc";
private static final String SOME_CUSTOMER_NAME = "Some Customer Name";
private static final Customer SOME_CUSTOMER = new Customer().id(SOME_CUSTOMER_ID)
- .reference(SOME_CUSTOMER_REFERENCE).prefix(SOME_CUSTOMER_PREFIX).name(SOME_CUSTOMER_NAME);
+ .reference(SOME_CUSTOMER_REFERENCE)
+ .prefix(SOME_CUSTOMER_PREFIX)
+ .name(SOME_CUSTOMER_NAME);
private static final Long SOME_MEMBERSHIP_ID = RandomUtils.nextLong(200, 299);
private static final LocalDate SOME_MEMBER_FROM_DATE = LocalDate.parse("2000-12-06");
private static final Membership SOME_MEMBERSHIP = new Membership().id(SOME_MEMBERSHIP_ID)
- .customer(SOME_CUSTOMER).memberFromDate(SOME_MEMBER_FROM_DATE);
+ .customer(SOME_CUSTOMER)
+ .memberFromDate(SOME_MEMBER_FROM_DATE);
private static final String SOME_MEMBERSHIP_DISPLAY_LABEL = "Some Customer Name [10001:abc] 2000-12-06 - ...";
private static final Long SOME_ASSET_ID = RandomUtils.nextLong(300, 399);
@@ -146,17 +154,18 @@ public class AssetDTOIntTest {
givenAuthenticatedUser();
givenUserHavingRole(CustomerDTO.class, SOME_CUSTOMER_ID, Role.CONTRACTUAL_CONTACT);
final String json = new JSonBuilder()
- .withFieldValue("id", SOME_ASSET_ID)
- .withFieldValue("remark", "Updated Remark")
- .toString();
+ .withFieldValue("id", SOME_ASSET_ID)
+ .withFieldValue("remark", "Updated Remark")
+ .toString();
// when
final Throwable actual = catchThrowable(() -> objectMapper.readValue(json, AssetDTO.class));
// then
- assertThat(actual).isInstanceOfSatisfying(BadRequestAlertException.class, bre ->
- assertThat(bre.getMessage()).isEqualTo("Update of field AssetDTO.remark prohibited for current user role CONTRACTUAL_CONTACT")
- );
+ assertThat(actual).isInstanceOfSatisfying(
+ BadRequestAlertException.class,
+ bre -> assertThat(bre.getMessage())
+ .isEqualTo("Update of field AssetDTO.remark prohibited for current user role CONTRACTUAL_CONTACT"));
}
@Test
@@ -165,9 +174,9 @@ public class AssetDTOIntTest {
givenAuthenticatedUser();
givenUserHavingRole(Role.ADMIN);
final String json = new JSonBuilder()
- .withFieldValue("id", SOME_ASSET_ID)
- .withFieldValue("remark", "Updated Remark")
- .toString();
+ .withFieldValue("id", SOME_ASSET_ID)
+ .withFieldValue("remark", "Updated Remark")
+ .toString();
// when
final AssetDTO actual = objectMapper.readValue(json, AssetDTO.class);
@@ -185,18 +194,17 @@ public class AssetDTOIntTest {
private String createExpectedJSon(AssetDTO dto) {
return new JSonBuilder()
- .withFieldValueIfPresent("id", dto.getId())
- .withFieldValueIfPresent("documentDate", dto.getDocumentDate().toString())
- .withFieldValueIfPresent("valueDate", dto.getValueDate().toString())
- .withFieldValueIfPresent("action", dto.getAction().name())
- .withFieldValueIfPresent("amount", dto.getAmount().doubleValue())
- .withFieldValueIfPresent("remark", dto.getRemark())
- .withFieldValueIfPresent("membershipId", dto.getMembershipId())
- .withFieldValue("membershipDisplayLabel", dto.getMembershipDisplayLabel())
- .toString();
+ .withFieldValueIfPresent("id", dto.getId())
+ .withFieldValueIfPresent("documentDate", dto.getDocumentDate().toString())
+ .withFieldValueIfPresent("valueDate", dto.getValueDate().toString())
+ .withFieldValueIfPresent("action", dto.getAction().name())
+ .withFieldValueIfPresent("amount", dto.getAmount().doubleValue())
+ .withFieldValueIfPresent("remark", dto.getRemark())
+ .withFieldValueIfPresent("membershipId", dto.getMembershipId())
+ .withFieldValue("membershipDisplayLabel", dto.getMembershipDisplayLabel())
+ .toString();
}
-
private AssetDTO createSomeAssetDTO(final long id) {
final AssetDTO given = new AssetDTO();
given.setId(id);
diff --git a/src/test/java/org/hostsharing/hsadminng/service/dto/AssetDTOUnitTest.java b/src/test/java/org/hostsharing/hsadminng/service/dto/AssetDTOUnitTest.java
index 5ccea384..578778ab 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/dto/AssetDTOUnitTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/dto/AssetDTOUnitTest.java
@@ -1,10 +1,12 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.dto;
-import org.apache.commons.lang3.RandomStringUtils;
-import org.apache.commons.lang3.RandomUtils;
import org.hostsharing.hsadminng.domain.enumeration.AssetAction;
import org.hostsharing.hsadminng.service.accessfilter.Role;
import org.hostsharing.hsadminng.service.util.RandomUtil;
+
+import org.apache.commons.lang3.RandomStringUtils;
+import org.apache.commons.lang3.RandomUtils;
import org.junit.Test;
import java.math.BigDecimal;
@@ -19,7 +21,12 @@ public class AssetDTOUnitTest extends AccessMappingsUnitTestBase {
@Test
public void shouldHaveProperAccessForAdmin() {
initAccessFor(AssetDTO.class, Role.ADMIN).shouldBeExactlyFor(
- "membershipId", "documentDate", "amount", "action", "valueDate", "remark");
+ "membershipId",
+ "documentDate",
+ "amount",
+ "action",
+ "valueDate",
+ "remark");
updateAccessFor(AssetDTO.class, Role.ADMIN).shouldBeExactlyFor("remark");
readAccessFor(AssetDTO.class, Role.ADMIN).shouldBeForAllFields();
}
@@ -29,7 +36,13 @@ public class AssetDTOUnitTest extends AccessMappingsUnitTestBase {
initAccessFor(AssetDTO.class, Role.CONTRACTUAL_CONTACT).shouldBeForNothing();
updateAccessFor(AssetDTO.class, Role.CONTRACTUAL_CONTACT).shouldBeForNothing();
readAccessFor(AssetDTO.class, Role.CONTRACTUAL_CONTACT).shouldBeExactlyFor(
- "id", "membershipId", "documentDate", "amount", "action", "valueDate", "membershipDisplayLabel");
+ "id",
+ "membershipId",
+ "documentDate",
+ "amount",
+ "action",
+ "valueDate",
+ "membershipDisplayLabel");
}
@Test
diff --git a/src/test/java/org/hostsharing/hsadminng/service/dto/CustomerDTOUnitTest.java b/src/test/java/org/hostsharing/hsadminng/service/dto/CustomerDTOUnitTest.java
index 22368d88..75d8e84d 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/dto/CustomerDTOUnitTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/dto/CustomerDTOUnitTest.java
@@ -1,7 +1,12 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.dto;
-import com.fasterxml.jackson.core.JsonProcessingException;
-import com.fasterxml.jackson.databind.ObjectMapper;
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.hostsharing.hsadminng.service.accessfilter.MockSecurityContext.givenAuthenticatedUser;
+import static org.hostsharing.hsadminng.service.accessfilter.MockSecurityContext.givenUserHavingRole;
+import static org.junit.Assert.assertEquals;
+import static org.mockito.BDDMockito.given;
+
import org.hostsharing.hsadminng.domain.Customer;
import org.hostsharing.hsadminng.domain.enumeration.CustomerKind;
import org.hostsharing.hsadminng.domain.enumeration.VatRegion;
@@ -11,6 +16,10 @@ import org.hostsharing.hsadminng.service.accessfilter.JSonBuilder;
import org.hostsharing.hsadminng.service.accessfilter.Role;
import org.hostsharing.hsadminng.service.mapper.CustomerMapper;
import org.hostsharing.hsadminng.service.mapper.CustomerMapperImpl;
+
+import com.fasterxml.jackson.core.JsonProcessingException;
+import com.fasterxml.jackson.databind.ObjectMapper;
+
import org.junit.Rule;
import org.junit.Test;
import org.junit.runner.RunWith;
@@ -25,14 +34,14 @@ import org.springframework.test.context.junit4.SpringRunner;
import java.io.IOException;
import java.util.Optional;
-import static org.assertj.core.api.Assertions.assertThat;
-import static org.hostsharing.hsadminng.service.accessfilter.MockSecurityContext.givenAuthenticatedUser;
-import static org.hostsharing.hsadminng.service.accessfilter.MockSecurityContext.givenUserHavingRole;
-import static org.junit.Assert.assertEquals;
-import static org.mockito.BDDMockito.given;
-
@JsonTest
-@SpringBootTest(classes = {CustomerMapperImpl.class, CustomerRepository.class, CustomerService.class, CustomerDTO.CustomerJsonSerializer.class, CustomerDTO.CustomerJsonDeserializer.class})
+@SpringBootTest(
+ classes = {
+ CustomerMapperImpl.class,
+ CustomerRepository.class,
+ CustomerService.class,
+ CustomerDTO.CustomerJsonSerializer.class,
+ CustomerDTO.CustomerJsonDeserializer.class })
@RunWith(SpringRunner.class)
public class CustomerDTOUnitTest {
@@ -80,11 +89,12 @@ public class CustomerDTOUnitTest {
// then
final String expectedJSon = new JSonBuilder()
- .withFieldValue("id", given.getId())
- .withFieldValue("reference", given.getReference())
- .withFieldValue("prefix", given.getPrefix())
- .withFieldValue("name", given.getName())
- .withFieldValue("displayLabel", given.getDisplayLabel()).toString();
+ .withFieldValue("id", given.getId())
+ .withFieldValue("reference", given.getReference())
+ .withFieldValue("prefix", given.getPrefix())
+ .withFieldValue("name", given.getName())
+ .withFieldValue("displayLabel", given.getDisplayLabel())
+ .toString();
assertEquals(expectedJSon, actual);
}
@@ -126,23 +136,24 @@ public class CustomerDTOUnitTest {
private String createExpectedJSon(CustomerDTO dto) {
return new JSonBuilder()
- .withFieldValueIfPresent("id", dto.getId())
- .withFieldValueIfPresent("reference", dto.getReference())
- .withFieldValueIfPresent("prefix", dto.getPrefix())
- .withFieldValueIfPresent("name", dto.getName())
- .withFieldValueIfPresent("kind", "LEGAL")
- .toJSonNullFieldDefinition("birthDate")
- .toJSonNullFieldDefinition("birthPlace")
- .withFieldValueIfPresent("registrationCourt", "Registergericht")
- .withFieldValueIfPresent("registrationNumber", "Registernummer")
- .withFieldValueIfPresent("vatRegion", "DOMESTIC")
- .withFieldValueIfPresent("vatNumber", "DE1234")
- .withFieldValueIfPresent("contractualSalutation", dto.getContractualSalutation())
- .withFieldValueIfPresent("contractualAddress", dto.getContractualAddress())
- .withFieldValueIfPresent("billingSalutation", dto.getBillingSalutation())
- .withFieldValueIfPresent("billingAddress", dto.getBillingAddress())
- .withFieldValueIfPresent("remark", dto.getRemark())
- .withFieldValueIfPresent("displayLabel", dto.getDisplayLabel()).toString();
+ .withFieldValueIfPresent("id", dto.getId())
+ .withFieldValueIfPresent("reference", dto.getReference())
+ .withFieldValueIfPresent("prefix", dto.getPrefix())
+ .withFieldValueIfPresent("name", dto.getName())
+ .withFieldValueIfPresent("kind", "LEGAL")
+ .toJSonNullFieldDefinition("birthDate")
+ .toJSonNullFieldDefinition("birthPlace")
+ .withFieldValueIfPresent("registrationCourt", "Registergericht")
+ .withFieldValueIfPresent("registrationNumber", "Registernummer")
+ .withFieldValueIfPresent("vatRegion", "DOMESTIC")
+ .withFieldValueIfPresent("vatNumber", "DE1234")
+ .withFieldValueIfPresent("contractualSalutation", dto.getContractualSalutation())
+ .withFieldValueIfPresent("contractualAddress", dto.getContractualAddress())
+ .withFieldValueIfPresent("billingSalutation", dto.getBillingSalutation())
+ .withFieldValueIfPresent("billingAddress", dto.getBillingAddress())
+ .withFieldValueIfPresent("remark", dto.getRemark())
+ .withFieldValueIfPresent("displayLabel", dto.getDisplayLabel())
+ .toString();
}
private CustomerDTO createSomeCustomerDTO(final long id) {
diff --git a/src/test/java/org/hostsharing/hsadminng/service/dto/MembershipDTOTest.java b/src/test/java/org/hostsharing/hsadminng/service/dto/MembershipDTOTest.java
index ffcec115..2c03c8af 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/dto/MembershipDTOTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/dto/MembershipDTOTest.java
@@ -1,9 +1,10 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.dto;
-import org.junit.Test;
-
import static org.assertj.core.api.Assertions.assertThat;
+import org.junit.Test;
+
public class MembershipDTOTest {
@Test
diff --git a/src/test/java/org/hostsharing/hsadminng/service/dto/MembershipDTOUnitTest.java b/src/test/java/org/hostsharing/hsadminng/service/dto/MembershipDTOUnitTest.java
index da6e4131..db2cb976 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/dto/MembershipDTOUnitTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/dto/MembershipDTOUnitTest.java
@@ -1,15 +1,25 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.dto;
-import com.fasterxml.jackson.core.JsonParser;
-import com.fasterxml.jackson.core.ObjectCodec;
-import com.fasterxml.jackson.core.TreeNode;
-import com.fasterxml.jackson.databind.ObjectMapper;
-import org.apache.commons.lang3.tuple.ImmutablePair;
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.assertj.core.api.Assertions.catchThrowable;
+import static org.hostsharing.hsadminng.service.accessfilter.JSonBuilder.asJSon;
+import static org.hostsharing.hsadminng.service.accessfilter.MockSecurityContext.givenAuthenticatedUser;
+import static org.hostsharing.hsadminng.service.accessfilter.MockSecurityContext.givenUserHavingRole;
+import static org.mockito.BDDMockito.given;
+
import org.hostsharing.hsadminng.service.CustomerService;
import org.hostsharing.hsadminng.service.MembershipService;
import org.hostsharing.hsadminng.service.accessfilter.JSonDeserializationWithAccessFilter;
import org.hostsharing.hsadminng.service.accessfilter.Role;
import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
+
+import com.fasterxml.jackson.core.JsonParser;
+import com.fasterxml.jackson.core.ObjectCodec;
+import com.fasterxml.jackson.core.TreeNode;
+import com.fasterxml.jackson.databind.ObjectMapper;
+
+import org.apache.commons.lang3.tuple.ImmutablePair;
import org.junit.Before;
import org.junit.Rule;
import org.junit.Test;
@@ -22,13 +32,6 @@ import org.springframework.context.ApplicationContext;
import java.io.IOException;
import java.util.Optional;
-import static org.assertj.core.api.Assertions.assertThat;
-import static org.assertj.core.api.Assertions.catchThrowable;
-import static org.hostsharing.hsadminng.service.accessfilter.JSonBuilder.asJSon;
-import static org.hostsharing.hsadminng.service.accessfilter.MockSecurityContext.givenAuthenticatedUser;
-import static org.hostsharing.hsadminng.service.accessfilter.MockSecurityContext.givenUserHavingRole;
-import static org.mockito.BDDMockito.given;
-
public class MembershipDTOUnitTest {
@Rule
@@ -59,12 +62,13 @@ public class MembershipDTOUnitTest {
public void init() {
given(jsonParser.getCodec()).willReturn(codec);
- given (ctx.getAutowireCapableBeanFactory()).willReturn(autowireCapableBeanFactory);
+ given(ctx.getAutowireCapableBeanFactory()).willReturn(autowireCapableBeanFactory);
given(autowireCapableBeanFactory.createBean(MembershipService.class)).willReturn(membershipService);
given(autowireCapableBeanFactory.createBean(CustomerService.class)).willReturn(customerService);
- given(customerService.findOne(1234L)).willReturn(Optional.of(new CustomerDTO()
- .with(dto -> dto.setId(1234L))
- ));
+ given(customerService.findOne(1234L)).willReturn(
+ Optional.of(
+ new CustomerDTO()
+ .with(dto -> dto.setId(1234L))));
}
@Test
@@ -74,7 +78,8 @@ public class MembershipDTOUnitTest {
givenJSonTree(asJSon(ImmutablePair.of("customerId", 1234L)));
// when
- final MembershipDTO actualDto = new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, MembershipDTO.class).deserialize();
+ final MembershipDTO actualDto = new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, MembershipDTO.class)
+ .deserialize();
// then
assertThat(actualDto.getCustomerId()).isEqualTo(1234L);
@@ -87,7 +92,8 @@ public class MembershipDTOUnitTest {
givenJSonTree(asJSon(ImmutablePair.of("customerId", 1234L)));
// when
- Throwable exception = catchThrowable(() -> new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, MembershipDTO.class).deserialize());
+ Throwable exception = catchThrowable(
+ () -> new JSonDeserializationWithAccessFilter<>(ctx, jsonParser, null, MembershipDTO.class).deserialize());
// then
assertThat(exception).isInstanceOfSatisfying(BadRequestAlertException.class, badRequestAlertException -> {
diff --git a/src/test/java/org/hostsharing/hsadminng/service/dto/SepaMandateDTOIntTest.java b/src/test/java/org/hostsharing/hsadminng/service/dto/SepaMandateDTOIntTest.java
index 648ff43b..46ac0a26 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/dto/SepaMandateDTOIntTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/dto/SepaMandateDTOIntTest.java
@@ -1,8 +1,14 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.dto;
-import com.fasterxml.jackson.core.JsonProcessingException;
-import com.fasterxml.jackson.databind.ObjectMapper;
-import org.apache.commons.lang3.RandomUtils;
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.assertj.core.api.Assertions.catchThrowable;
+import static org.hostsharing.hsadminng.service.accessfilter.MockSecurityContext.givenAuthenticatedUser;
+import static org.hostsharing.hsadminng.service.accessfilter.MockSecurityContext.givenUserHavingRole;
+import static org.hostsharing.hsadminng.service.dto.SepaMandateDTOUnitTest.createSampleDTO;
+import static org.junit.Assert.assertEquals;
+import static org.mockito.BDDMockito.given;
+
import org.hostsharing.hsadminng.domain.Customer;
import org.hostsharing.hsadminng.domain.SepaMandate;
import org.hostsharing.hsadminng.repository.CustomerRepository;
@@ -17,6 +23,11 @@ import org.hostsharing.hsadminng.service.mapper.MembershipMapperImpl;
import org.hostsharing.hsadminng.service.mapper.SepaMandateMapper;
import org.hostsharing.hsadminng.service.mapper.SepaMandateMapperImpl;
import org.hostsharing.hsadminng.web.rest.errors.BadRequestAlertException;
+
+import com.fasterxml.jackson.core.JsonProcessingException;
+import com.fasterxml.jackson.databind.ObjectMapper;
+
+import org.apache.commons.lang3.RandomUtils;
import org.junit.Before;
import org.junit.Rule;
import org.junit.Test;
@@ -29,27 +40,21 @@ import org.springframework.boot.test.context.SpringBootTest;
import org.springframework.boot.test.mock.mockito.MockBean;
import org.springframework.test.context.junit4.SpringRunner;
-import javax.persistence.EntityManager;
import java.io.IOException;
import java.util.Objects;
import java.util.Optional;
-import static org.assertj.core.api.Assertions.assertThat;
-import static org.assertj.core.api.Assertions.catchThrowable;
-import static org.hostsharing.hsadminng.service.accessfilter.MockSecurityContext.givenAuthenticatedUser;
-import static org.hostsharing.hsadminng.service.accessfilter.MockSecurityContext.givenUserHavingRole;
-import static org.hostsharing.hsadminng.service.dto.SepaMandateDTOUnitTest.createSampleDTO;
-import static org.junit.Assert.assertEquals;
-import static org.mockito.BDDMockito.given;
+import javax.persistence.EntityManager;
@JsonTest
-@SpringBootTest(classes = {
- CustomerMapperImpl.class,
- MembershipMapperImpl.class,
- SepaMandateMapperImpl.class,
- SepaMandateDTO.JsonSerializer.class,
- SepaMandateDTO.JsonDeserializer.class
-})
+@SpringBootTest(
+ classes = {
+ CustomerMapperImpl.class,
+ MembershipMapperImpl.class,
+ SepaMandateMapperImpl.class,
+ SepaMandateDTO.JsonSerializer.class,
+ SepaMandateDTO.JsonDeserializer.class
+ })
@RunWith(SpringRunner.class)
public class SepaMandateDTOIntTest {
@@ -59,7 +64,9 @@ public class SepaMandateDTOIntTest {
private static final String SOME_CUSTOMER_NAME = "Some Customer Name";
private static final String SOME_CUSTOMER_DISPLAY_LABEL = "Some Customer Name [10001:abc]";
private static final Customer SOME_CUSTOMER = new Customer().id(SOME_CUSTOMER_ID)
- .reference(SOME_CUSTOMER_REFERENCE).prefix(SOME_CUSTOMER_PREFIX).name(SOME_CUSTOMER_NAME);
+ .reference(SOME_CUSTOMER_REFERENCE)
+ .prefix(SOME_CUSTOMER_PREFIX)
+ .name(SOME_CUSTOMER_NAME);
private static final Long SOME_SEPA_MANDATE_ID = RandomUtils.nextLong(300, 399);
private static final SepaMandate SOME_SEPA_MANDATE = new SepaMandate().id(SOME_SEPA_MANDATE_ID).customer(SOME_CUSTOMER);
@@ -134,17 +141,18 @@ public class SepaMandateDTOIntTest {
givenAuthenticatedUser();
givenUserHavingRole(CustomerDTO.class, SOME_CUSTOMER_ID, Role.CONTRACTUAL_CONTACT);
final String json = new JSonBuilder()
- .withFieldValue("id", SOME_SEPA_MANDATE_ID)
- .withFieldValue("remark", "Updated Remark")
- .toString();
+ .withFieldValue("id", SOME_SEPA_MANDATE_ID)
+ .withFieldValue("remark", "Updated Remark")
+ .toString();
// when
final Throwable actual = catchThrowable(() -> objectMapper.readValue(json, SepaMandateDTO.class));
// then
- assertThat(actual).isInstanceOfSatisfying(BadRequestAlertException.class, bre ->
- assertThat(bre.getMessage()).isEqualTo("Update of field SepaMandateDTO.remark prohibited for current user role CONTRACTUAL_CONTACT")
- );
+ assertThat(actual).isInstanceOfSatisfying(
+ BadRequestAlertException.class,
+ bre -> assertThat(bre.getMessage()).isEqualTo(
+ "Update of field SepaMandateDTO.remark prohibited for current user role CONTRACTUAL_CONTACT"));
}
@Test
@@ -153,9 +161,9 @@ public class SepaMandateDTOIntTest {
givenAuthenticatedUser();
givenUserHavingRole(Role.ADMIN);
final String json = new JSonBuilder()
- .withFieldValue("id", SOME_SEPA_MANDATE_ID)
- .withFieldValue("remark", "Updated Remark")
- .toString();
+ .withFieldValue("id", SOME_SEPA_MANDATE_ID)
+ .withFieldValue("remark", "Updated Remark")
+ .toString();
// when
final SepaMandateDTO actual = objectMapper.readValue(json, SepaMandateDTO.class);
@@ -173,18 +181,18 @@ public class SepaMandateDTOIntTest {
private String createExpectedJSon(SepaMandateDTO dto) {
return new JSonBuilder()
- .withFieldValueIfPresent("id", dto.getId())
- .withFieldValueIfPresent("reference", dto.getReference())
- .withFieldValueIfPresent("iban", dto.getIban())
- .withFieldValueIfPresent("bic", dto.getBic())
- .withFieldValueIfPresent("grantingDocumentDate", Objects.toString(dto.getGrantingDocumentDate()))
- .withFieldValueIfPresent("revokationDocumentDate", Objects.toString(dto.getRevokationDocumentDate()))
- .withFieldValueIfPresent("validFromDate", Objects.toString(dto.getValidFromDate()))
- .withFieldValueIfPresent("validUntilDate", Objects.toString(dto.getValidUntilDate()))
- .withFieldValueIfPresent("lastUsedDate", Objects.toString(dto.getLastUsedDate()))
- .withFieldValueIfPresent("remark", dto.getRemark())
- .withFieldValueIfPresent("customerId", dto.getCustomerId())
- .withFieldValue("customerDisplayLabel", dto.getCustomerDisplayLabel())
- .toString();
+ .withFieldValueIfPresent("id", dto.getId())
+ .withFieldValueIfPresent("reference", dto.getReference())
+ .withFieldValueIfPresent("iban", dto.getIban())
+ .withFieldValueIfPresent("bic", dto.getBic())
+ .withFieldValueIfPresent("grantingDocumentDate", Objects.toString(dto.getGrantingDocumentDate()))
+ .withFieldValueIfPresent("revokationDocumentDate", Objects.toString(dto.getRevokationDocumentDate()))
+ .withFieldValueIfPresent("validFromDate", Objects.toString(dto.getValidFromDate()))
+ .withFieldValueIfPresent("validUntilDate", Objects.toString(dto.getValidUntilDate()))
+ .withFieldValueIfPresent("lastUsedDate", Objects.toString(dto.getLastUsedDate()))
+ .withFieldValueIfPresent("remark", dto.getRemark())
+ .withFieldValueIfPresent("customerId", dto.getCustomerId())
+ .withFieldValue("customerDisplayLabel", dto.getCustomerDisplayLabel())
+ .toString();
}
}
diff --git a/src/test/java/org/hostsharing/hsadminng/service/dto/SepaMandateDTOUnitTest.java b/src/test/java/org/hostsharing/hsadminng/service/dto/SepaMandateDTOUnitTest.java
index d0db7861..be7babf9 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/dto/SepaMandateDTOUnitTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/dto/SepaMandateDTOUnitTest.java
@@ -1,8 +1,10 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.dto;
+import org.hostsharing.hsadminng.service.accessfilter.Role;
+
import org.apache.commons.lang3.RandomStringUtils;
import org.apache.commons.lang3.RandomUtils;
-import org.hostsharing.hsadminng.service.accessfilter.Role;
import org.junit.Test;
import java.time.LocalDate;
@@ -16,31 +18,66 @@ public class SepaMandateDTOUnitTest extends AccessMappingsUnitTestBase objectMapper.readValue(json, ShareDTO.class));
// then
- assertThat(actual).isInstanceOfSatisfying(BadRequestAlertException.class, bre ->
- assertThat(bre.getMessage()).isEqualTo("Update of field ShareDTO.remark prohibited for current user role CONTRACTUAL_CONTACT")
- );
+ assertThat(actual).isInstanceOfSatisfying(
+ BadRequestAlertException.class,
+ bre -> assertThat(bre.getMessage())
+ .isEqualTo("Update of field ShareDTO.remark prohibited for current user role CONTRACTUAL_CONTACT"));
}
@Test
@@ -164,9 +173,9 @@ public class ShareDTOIntTest {
givenAuthenticatedUser();
givenUserHavingRole(Role.ADMIN);
final String json = new JSonBuilder()
- .withFieldValue("id", SOME_SHARE_ID)
- .withFieldValue("remark", "Updated Remark")
- .toString();
+ .withFieldValue("id", SOME_SHARE_ID)
+ .withFieldValue("remark", "Updated Remark")
+ .toString();
// when
final ShareDTO actual = objectMapper.readValue(json, ShareDTO.class);
@@ -184,15 +193,15 @@ public class ShareDTOIntTest {
private String createExpectedJSon(ShareDTO dto) {
return new JSonBuilder()
- .withFieldValueIfPresent("id", dto.getId())
- .withFieldValueIfPresent("documentDate", dto.getDocumentDate().toString())
- .withFieldValueIfPresent("valueDate", dto.getValueDate().toString())
- .withFieldValueIfPresent("action", dto.getAction().name())
- .withFieldValueIfPresent("quantity", dto.getQuantity())
- .withFieldValueIfPresent("remark", dto.getRemark())
- .withFieldValueIfPresent("membershipId", dto.getMembershipId())
- .withFieldValue("membershipDisplayLabel", dto.getMembershipDisplayLabel())
- .toString();
+ .withFieldValueIfPresent("id", dto.getId())
+ .withFieldValueIfPresent("documentDate", dto.getDocumentDate().toString())
+ .withFieldValueIfPresent("valueDate", dto.getValueDate().toString())
+ .withFieldValueIfPresent("action", dto.getAction().name())
+ .withFieldValueIfPresent("quantity", dto.getQuantity())
+ .withFieldValueIfPresent("remark", dto.getRemark())
+ .withFieldValueIfPresent("membershipId", dto.getMembershipId())
+ .withFieldValue("membershipDisplayLabel", dto.getMembershipDisplayLabel())
+ .toString();
}
private ShareDTO createSomeShareDTO(final long id) {
diff --git a/src/test/java/org/hostsharing/hsadminng/service/dto/ShareDTOUnitTest.java b/src/test/java/org/hostsharing/hsadminng/service/dto/ShareDTOUnitTest.java
index 91fb8a77..65bbd153 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/dto/ShareDTOUnitTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/dto/ShareDTOUnitTest.java
@@ -1,10 +1,12 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.dto;
-import org.apache.commons.lang3.RandomStringUtils;
-import org.apache.commons.lang3.RandomUtils;
import org.hostsharing.hsadminng.domain.enumeration.ShareAction;
import org.hostsharing.hsadminng.service.accessfilter.Role;
import org.hostsharing.hsadminng.service.util.RandomUtil;
+
+import org.apache.commons.lang3.RandomStringUtils;
+import org.apache.commons.lang3.RandomUtils;
import org.junit.Test;
import java.time.LocalDate;
@@ -18,7 +20,12 @@ public class ShareDTOUnitTest extends AccessMappingsUnitTestBase {
@Test
public void shouldHaveProperAccessForAdmin() {
initAccessFor(ShareDTO.class, Role.ADMIN).shouldBeExactlyFor(
- "membershipId", "documentDate", "quantity", "action", "valueDate", "remark");
+ "membershipId",
+ "documentDate",
+ "quantity",
+ "action",
+ "valueDate",
+ "remark");
updateAccessFor(ShareDTO.class, Role.ADMIN).shouldBeExactlyFor("remark");
readAccessFor(ShareDTO.class, Role.ADMIN).shouldBeForAllFields();
}
@@ -28,7 +35,13 @@ public class ShareDTOUnitTest extends AccessMappingsUnitTestBase {
initAccessFor(ShareDTO.class, Role.CONTRACTUAL_CONTACT).shouldBeForNothing();
updateAccessFor(ShareDTO.class, Role.CONTRACTUAL_CONTACT).shouldBeForNothing();
readAccessFor(ShareDTO.class, Role.CONTRACTUAL_CONTACT).shouldBeExactlyFor(
- "id", "membershipId", "documentDate", "quantity", "action", "valueDate", "membershipDisplayLabel");
+ "id",
+ "membershipId",
+ "documentDate",
+ "quantity",
+ "action",
+ "valueDate",
+ "membershipDisplayLabel");
}
@Test
@@ -74,4 +87,3 @@ public class ShareDTOUnitTest extends AccessMappingsUnitTestBase {
return dto;
}
}
-
diff --git a/src/test/java/org/hostsharing/hsadminng/service/mapper/UserMapperTest.java b/src/test/java/org/hostsharing/hsadminng/service/mapper/UserMapperTest.java
index 007ca933..69bd23c3 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/mapper/UserMapperTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/mapper/UserMapperTest.java
@@ -1,9 +1,12 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.mapper;
+import static org.assertj.core.api.Assertions.assertThat;
import org.hostsharing.hsadminng.HsadminNgApp;
import org.hostsharing.hsadminng.domain.User;
import org.hostsharing.hsadminng.service.dto.UserDTO;
+
import org.apache.commons.lang3.RandomStringUtils;
import org.junit.Before;
import org.junit.Test;
@@ -17,8 +20,6 @@ import java.util.HashSet;
import java.util.List;
import java.util.Set;
-import static org.assertj.core.api.Assertions.assertThat;
-
/**
* Test class for the UserMapper.
*
@@ -54,7 +55,7 @@ public class UserMapperTest {
}
@Test
- public void usersToUserDTOsShouldMapOnlyNonNullUsers(){
+ public void usersToUserDTOsShouldMapOnlyNonNullUsers() {
List users = new ArrayList<>();
users.add(user);
users.add(null);
@@ -66,7 +67,7 @@ public class UserMapperTest {
}
@Test
- public void userDTOsToUsersShouldMapOnlyNonNullUsers(){
+ public void userDTOsToUsersShouldMapOnlyNonNullUsers() {
List usersDto = new ArrayList<>();
usersDto.add(userDto);
usersDto.add(null);
@@ -78,7 +79,7 @@ public class UserMapperTest {
}
@Test
- public void userDTOsToUsersWithAuthoritiesStringShouldMapToUsersWithAuthoritiesDomain(){
+ public void userDTOsToUsersWithAuthoritiesStringShouldMapToUsersWithAuthoritiesDomain() {
Set authoritiesAsString = new HashSet<>();
authoritiesAsString.add("ADMIN");
userDto.setAuthorities(authoritiesAsString);
@@ -96,7 +97,7 @@ public class UserMapperTest {
}
@Test
- public void userDTOsToUsersMapWithNullAuthoritiesStringShouldReturnUserWithEmptyAuthorities(){
+ public void userDTOsToUsersMapWithNullAuthoritiesStringShouldReturnUserWithEmptyAuthorities() {
userDto.setAuthorities(null);
List usersDto = new ArrayList<>();
@@ -111,7 +112,7 @@ public class UserMapperTest {
}
@Test
- public void userDTOToUserMapWithAuthoritiesStringShouldReturnUserWithAuthorities(){
+ public void userDTOToUserMapWithAuthoritiesStringShouldReturnUserWithAuthorities() {
Set authoritiesAsString = new HashSet<>();
authoritiesAsString.add("ADMIN");
userDto.setAuthorities(authoritiesAsString);
@@ -127,7 +128,7 @@ public class UserMapperTest {
}
@Test
- public void userDTOToUserMapWithNullAuthoritiesStringShouldReturnUserWithEmptyAuthorities(){
+ public void userDTOToUserMapWithNullAuthoritiesStringShouldReturnUserWithEmptyAuthorities() {
userDto.setAuthorities(null);
User user = userMapper.userDTOToUser(userDto);
@@ -138,7 +139,7 @@ public class UserMapperTest {
}
@Test
- public void userDTOToUserMapWithNullUserShouldReturnNull(){
+ public void userDTOToUserMapWithNullUserShouldReturnNull() {
assertThat(userMapper.userDTOToUser(null)).isNull();
}
diff --git a/src/test/java/org/hostsharing/hsadminng/service/util/ReflectionUtilUnitTest.java b/src/test/java/org/hostsharing/hsadminng/service/util/ReflectionUtilUnitTest.java
index 637f5b0b..43013560 100644
--- a/src/test/java/org/hostsharing/hsadminng/service/util/ReflectionUtilUnitTest.java
+++ b/src/test/java/org/hostsharing/hsadminng/service/util/ReflectionUtilUnitTest.java
@@ -1,18 +1,19 @@
+// Licensed under Apache-2.0
package org.hostsharing.hsadminng.service.util;
-import org.junit.Test;
-
import static org.assertj.core.api.Assertions.assertThat;
import static org.assertj.core.api.ThrowableAssert.catchThrowable;
import static org.hostsharing.hsadminng.service.util.ReflectionUtil.unchecked;
+import org.junit.Test;
public class ReflectionUtilUnitTest {
@Test
public void getUknownFieldThrowsIllegalArgumentException() {
final Throwable actual = catchThrowable(() -> ReflectionUtil.getField(SomeClass.class, "unknownField"));
- assertThat(actual).isInstanceOf(IllegalArgumentException.class).hasMessage("java.lang.NoSuchFieldException: unknownField");
+ assertThat(actual).isInstanceOf(IllegalArgumentException.class)
+ .hasMessage("java.lang.NoSuchFieldException: unknownField");
}
@Test
@@ -57,8 +58,10 @@ public class ReflectionUtilUnitTest {
@Test
public void throwsExceptionIfGenericInterfaceNotImplemented() {
- final Throwable actual = catchThrowable(() -> ReflectionUtil.determineGenericInterfaceParameter(SomeClass.class, UnusedGenericInterface.class, 1));
- assertThat(actual).isInstanceOf(AssertionError.class).hasMessageContaining("SomeClass expected to implement UnusedGenericInterface<...>");
+ final Throwable actual = catchThrowable(
+ () -> ReflectionUtil.determineGenericInterfaceParameter(SomeClass.class, UnusedGenericInterface.class, 1));
+ assertThat(actual).isInstanceOf(AssertionError.class)
+ .hasMessageContaining("SomeClass expected to implement UnusedGenericInterface<...>");
}
@Test
@@ -75,8 +78,10 @@ public class ReflectionUtilUnitTest {
@Test
public void throwsExceptionIfGenericClassNotExended() {
- final Throwable actual = catchThrowable(() -> ReflectionUtil.determineGenericClassParameter(SomeClass.class, UnusedSuperClass.class, 1));
- assertThat(actual).isInstanceOf(AssertionError.class).hasMessageContaining("GenericClass expected to extend UnusedSuperClass<...>");
+ final Throwable actual = catchThrowable(
+ () -> ReflectionUtil.determineGenericClassParameter(SomeClass.class, UnusedSuperClass.class, 1));
+ assertThat(actual).isInstanceOf(AssertionError.class)
+ .hasMessageContaining("GenericClass expected to extend UnusedSuperClass<...>");
}
@Test
@@ -85,9 +90,8 @@ public class ReflectionUtilUnitTest {
final Throwable actual = catchThrowable(() -> unchecked(() -> {
throw givenException;
}));
- assertThat(actual).isInstanceOfSatisfying(RuntimeException.class, rte ->
- assertThat(rte.getCause()).isSameAs(givenException)
- );
+ assertThat(actual)
+ .isInstanceOfSatisfying(RuntimeException.class, rte -> assertThat(rte.getCause()).isSameAs(givenException));
}
@Test
@@ -98,6 +102,7 @@ public class ReflectionUtilUnitTest {
// --- only test fixture below ---
private static class TestDto {
+
int intVal;
TestDto(final int intval) {
@@ -118,7 +123,8 @@ public class ReflectionUtilUnitTest {
private static class SuperClass extends GenericClass implements IntermediateInterfaces {
}
- private static class UnusedSuperClass extends GenericClass implements IntermediateInterfaces