Skip to content

Commit 0a9fa7f

Browse files
committed
Build: Merge xpack checkstyle config into core (#33399)
Solves all of the xpack line length suppressions and then merges the remainder of the xpack checkstyle_suppressions.xml file into the core checkstyle_suppressions.xml file. At this point that just means the antlr generated files for sql. It also adds an exclusion to the line length tests for javadocs that are just a URL. We have one such javadoc and breaking up the line would make the link difficult to use.
1 parent ed97b0b commit 0a9fa7f

File tree

11 files changed

+79
-87
lines changed

11 files changed

+79
-87
lines changed

buildSrc/src/main/resources/checkstyle.xml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,7 @@
2323
unfair. -->
2424
<module name="LineLength">
2525
<property name="max" value="140"/>
26+
<property name="ignorePattern" value="^ *\* *https?://[^ ]+$"/>
2627
</module>
2728

2829
<module name="AvoidStarImport" />

buildSrc/src/main/resources/checkstyle_suppressions.xml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@
99
<!-- These files are generated by ANTLR so its silly to hold them to our rules. -->
1010
<suppress files="org[/\\]elasticsearch[/\\]painless[/\\]antlr[/\\]PainlessLexer\.java" checks="." />
1111
<suppress files="org[/\\]elasticsearch[/\\]painless[/\\]antlr[/\\]PainlessParser(|BaseVisitor|Visitor)\.java" checks="." />
12+
<suppress files="plugin[/\\]sql[/\\]src[/\\]main[/\\]java[/\\]org[/\\]elasticsearch[/\\]xpack[/\\]sql[/\\]parser[/\\]SqlBase(Base(Listener|Visitor)|Lexer|Listener|Parser|Visitor).java" checks="." />
1213

1314
<!-- JNA requires the no-argument constructor on JNAKernel32Library.SizeT to be public-->
1415
<suppress files="server[/\\]src[/\\]main[/\\]java[/\\]org[/\\]elasticsearch[/\\]bootstrap[/\\]JNAKernel32Library.java" checks="RedundantModifier" />

x-pack/build.gradle

Lines changed: 0 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -31,16 +31,7 @@ subprojects {
3131
}
3232
}
3333

34-
File checkstyleSuppressions = file('dev-tools/checkstyle_suppressions.xml')
3534
subprojects {
36-
tasks.withType(Checkstyle) {
37-
inputs.file(checkstyleSuppressions)
38-
// Use x-pack-elasticsearch specific suppressions file rather than the open source one.
39-
configProperties = [
40-
suppressions: checkstyleSuppressions
41-
]
42-
}
43-
4435
ext.projectSubstitutions += [ "org.elasticsearch.plugin:x-pack-ccr:${version}": xpackModule('ccr')]
4536
ext.projectSubstitutions += [ "org.elasticsearch.plugin:x-pack-core:${version}": xpackModule('core')]
4637
ext.projectSubstitutions += [ "org.elasticsearch.plugin:x-pack-deprecation:${version}": xpackModule('deprecation')]

x-pack/dev-tools/checkstyle_suppressions.xml

Lines changed: 0 additions & 29 deletions
This file was deleted.

x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/Security.java

Lines changed: 26 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -462,7 +462,8 @@ Collection<Object> createComponents(Client client, ThreadPool threadPool, Cluste
462462

463463
final AuthenticationFailureHandler failureHandler = createAuthenticationFailureHandler(realms);
464464

465-
authcService.set(new AuthenticationService(settings, realms, auditTrailService, failureHandler, threadPool, anonymousUser, tokenService));
465+
authcService.set(new AuthenticationService(settings, realms, auditTrailService, failureHandler, threadPool,
466+
anonymousUser, tokenService));
466467
components.add(authcService.get());
467468

468469
final NativePrivilegeStore privilegeStore = new NativePrivilegeStore(settings, client, securityIndex.get());
@@ -688,8 +689,8 @@ public void onIndexModule(IndexModule module) {
688689
// based on index statistics, which is probably safer...
689690
null,
690691
() -> {
691-
throw new IllegalArgumentException("permission filters are not allowed to use the current timestamp");
692-
692+
throw new IllegalArgumentException(
693+
"permission filters are not allowed to use the current timestamp");
693694
}, null),
694695
indexService.cache().bitsetFilterCache(),
695696
indexService.getThreadPool().getThreadContext(), getLicenseState(),
@@ -759,7 +760,8 @@ public List<ActionFilter> getActionFilters() {
759760

760761
@Override
761762
public List<RestHandler> getRestHandlers(Settings settings, RestController restController, ClusterSettings clusterSettings,
762-
IndexScopedSettings indexScopedSettings, SettingsFilter settingsFilter, IndexNameExpressionResolver indexNameExpressionResolver,
763+
IndexScopedSettings indexScopedSettings, SettingsFilter settingsFilter,
764+
IndexNameExpressionResolver indexNameExpressionResolver,
763765
Supplier<DiscoveryNodes> nodesInCluster) {
764766
if (enabled == false) {
765767
return emptyList();
@@ -856,8 +858,8 @@ private static void addTribeSettings(Settings settings, Settings.Builder setting
856858
Map<String, Settings> realmsSettings = settings.getGroups(SecurityField.setting("authc.realms"), true);
857859
final boolean hasNativeRealm = XPackSettings.RESERVED_REALM_ENABLED_SETTING.get(settings) ||
858860
realmsSettings.isEmpty() ||
859-
realmsSettings.entrySet().stream()
860-
.anyMatch((e) -> NativeRealmSettings.TYPE.equals(e.getValue().get("type")) && e.getValue().getAsBoolean("enabled", true));
861+
realmsSettings.entrySet().stream().anyMatch(e ->
862+
NativeRealmSettings.TYPE.equals(e.getValue().get("type")) && e.getValue().getAsBoolean("enabled", true));
861863
if (hasNativeRealm) {
862864
if (settings.get("tribe.on_conflict", "").startsWith("prefer_") == false) {
863865
throw new IllegalArgumentException("use of security on tribe nodes requires setting [tribe.on_conflict] to specify the " +
@@ -905,13 +907,20 @@ static void validateAutoCreateIndex(Settings settings) {
905907
DateTime now = new DateTime(DateTimeZone.UTC);
906908
// just use daily rollover
907909
indices.add(IndexNameResolver.resolve(IndexAuditTrailField.INDEX_NAME_PREFIX, now, IndexNameResolver.Rollover.DAILY));
908-
indices.add(IndexNameResolver.resolve(IndexAuditTrailField.INDEX_NAME_PREFIX, now.plusDays(1), IndexNameResolver.Rollover.DAILY));
909-
indices.add(IndexNameResolver.resolve(IndexAuditTrailField.INDEX_NAME_PREFIX, now.plusMonths(1), IndexNameResolver.Rollover.DAILY));
910-
indices.add(IndexNameResolver.resolve(IndexAuditTrailField.INDEX_NAME_PREFIX, now.plusMonths(2), IndexNameResolver.Rollover.DAILY));
911-
indices.add(IndexNameResolver.resolve(IndexAuditTrailField.INDEX_NAME_PREFIX, now.plusMonths(3), IndexNameResolver.Rollover.DAILY));
912-
indices.add(IndexNameResolver.resolve(IndexAuditTrailField.INDEX_NAME_PREFIX, now.plusMonths(4), IndexNameResolver.Rollover.DAILY));
913-
indices.add(IndexNameResolver.resolve(IndexAuditTrailField.INDEX_NAME_PREFIX, now.plusMonths(5), IndexNameResolver.Rollover.DAILY));
914-
indices.add(IndexNameResolver.resolve(IndexAuditTrailField.INDEX_NAME_PREFIX, now.plusMonths(6), IndexNameResolver.Rollover.DAILY));
910+
indices.add(IndexNameResolver.resolve(IndexAuditTrailField.INDEX_NAME_PREFIX, now.plusDays(1),
911+
IndexNameResolver.Rollover.DAILY));
912+
indices.add(IndexNameResolver.resolve(IndexAuditTrailField.INDEX_NAME_PREFIX, now.plusMonths(1),
913+
IndexNameResolver.Rollover.DAILY));
914+
indices.add(IndexNameResolver.resolve(IndexAuditTrailField.INDEX_NAME_PREFIX, now.plusMonths(2),
915+
IndexNameResolver.Rollover.DAILY));
916+
indices.add(IndexNameResolver.resolve(IndexAuditTrailField.INDEX_NAME_PREFIX, now.plusMonths(3),
917+
IndexNameResolver.Rollover.DAILY));
918+
indices.add(IndexNameResolver.resolve(IndexAuditTrailField.INDEX_NAME_PREFIX, now.plusMonths(4),
919+
IndexNameResolver.Rollover.DAILY));
920+
indices.add(IndexNameResolver.resolve(IndexAuditTrailField.INDEX_NAME_PREFIX, now.plusMonths(5),
921+
IndexNameResolver.Rollover.DAILY));
922+
indices.add(IndexNameResolver.resolve(IndexAuditTrailField.INDEX_NAME_PREFIX, now.plusMonths(6),
923+
IndexNameResolver.Rollover.DAILY));
915924

916925
for (String index : indices) {
917926
boolean matched = false;
@@ -977,8 +986,8 @@ public Map<String, Supplier<Transport>> getTransports(Settings settings, ThreadP
977986
if (transportClientMode || enabled == false) { // don't register anything if we are not enabled, or in transport client mode
978987
return Collections.emptyMap();
979988
}
980-
return Collections.singletonMap(Security.NAME4, () -> new SecurityNetty4ServerTransport(settings, threadPool, networkService, bigArrays,
981-
namedWriteableRegistry, circuitBreakerService, ipFilter.get(), getSslService()));
989+
return Collections.singletonMap(Security.NAME4, () -> new SecurityNetty4ServerTransport(settings, threadPool, networkService,
990+
bigArrays, namedWriteableRegistry, circuitBreakerService, ipFilter.get(), getSslService()));
982991
}
983992

984993
@Override
@@ -1058,7 +1067,8 @@ public Function<String, Predicate<String>> getFieldFilter() {
10581067
getLicenseState().isDocumentAndFieldLevelSecurityAllowed() == false) {
10591068
return MapperPlugin.NOOP_FIELD_PREDICATE;
10601069
}
1061-
IndicesAccessControl indicesAccessControl = threadContext.get().getTransient(AuthorizationServiceField.INDICES_PERMISSIONS_KEY);
1070+
IndicesAccessControl indicesAccessControl = threadContext.get()
1071+
.getTransient(AuthorizationServiceField.INDICES_PERMISSIONS_KEY);
10621072
IndicesAccessControl.IndexAccessControl indexPermissions = indicesAccessControl.getIndexPermissions(index);
10631073
if (indexPermissions == null) {
10641074
return MapperPlugin.NOOP_FIELD_PREDICATE;

x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/authc/ldap/ActiveDirectorySIDUtil.java

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,8 @@
1818
*/
1919

2020
/*
21-
* This code sourced from:http://svn.apache.org/repos/asf/directory/studio/tags/2.0.0.v20170904-M13/plugins/valueeditors/src/main/java/org/apache/directory/studio/valueeditors/msad/InPlaceMsAdObjectSidValueEditor.java
21+
* This code sourced from:
22+
* http://svn.apache.org/repos/asf/directory/studio/tags/2.0.0.v20170904-M13/plugins/valueeditors/src/main/java/org/apache/directory/studio/valueeditors/msad/InPlaceMsAdObjectSidValueEditor.java
2223
*/
2324

2425
package org.elasticsearch.xpack.security.authc.ldap;

x-pack/plugin/security/src/test/java/org/elasticsearch/xpack/security/action/user/TransportGetUsersActionTests.java

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -169,8 +169,8 @@ public void testReservedUsersOnly() {
169169
final int size = randomIntBetween(1, allReservedUsers.size());
170170
final List<User> reservedUsers = randomSubsetOf(size, allReservedUsers);
171171
final List<String> names = reservedUsers.stream().map(User::principal).collect(Collectors.toList());
172-
TransportService transportService = new TransportService(Settings.EMPTY, mock(Transport.class), null, TransportService.NOOP_TRANSPORT_INTERCEPTOR,
173-
x -> null, null, Collections.emptySet());
172+
TransportService transportService = new TransportService(Settings.EMPTY, mock(Transport.class), null,
173+
TransportService.NOOP_TRANSPORT_INTERCEPTOR, x -> null, null, Collections.emptySet());
174174
TransportGetUsersAction action = new TransportGetUsersAction(Settings.EMPTY, threadPool, mock(ActionFilters.class),
175175
mock(IndexNameExpressionResolver.class), usersStore, transportService, reservedRealm);
176176

@@ -209,8 +209,8 @@ public void testGetAllUsers() {
209209
ReservedRealmTests.mockGetAllReservedUserInfo(usersStore, Collections.emptyMap());
210210
ReservedRealm reservedRealm = new ReservedRealm(mock(Environment.class), settings, usersStore, new AnonymousUser(settings),
211211
securityIndex, threadPool);
212-
TransportService transportService = new TransportService(Settings.EMPTY, mock(Transport.class), null, TransportService.NOOP_TRANSPORT_INTERCEPTOR,
213-
x -> null, null, Collections.emptySet());
212+
TransportService transportService = new TransportService(Settings.EMPTY, mock(Transport.class), null,
213+
TransportService.NOOP_TRANSPORT_INTERCEPTOR, x -> null, null, Collections.emptySet());
214214
TransportGetUsersAction action = new TransportGetUsersAction(Settings.EMPTY, threadPool, mock(ActionFilters.class),
215215
mock(IndexNameExpressionResolver.class), usersStore, transportService, reservedRealm);
216216

@@ -256,8 +256,8 @@ public void testGetStoreOnlyUsers() {
256256
randomFrom(Collections.singletonList(new User("joe")), Arrays.asList(new User("jane"), new User("fred")), randomUsers());
257257
final String[] storeUsernames = storeUsers.stream().map(User::principal).collect(Collectors.toList()).toArray(Strings.EMPTY_ARRAY);
258258
NativeUsersStore usersStore = mock(NativeUsersStore.class);
259-
TransportService transportService = new TransportService(Settings.EMPTY, mock(Transport.class), null, TransportService.NOOP_TRANSPORT_INTERCEPTOR,
260-
x -> null, null, Collections.emptySet());
259+
TransportService transportService = new TransportService(Settings.EMPTY, mock(Transport.class), null,
260+
TransportService.NOOP_TRANSPORT_INTERCEPTOR, x -> null, null, Collections.emptySet());
261261
TransportGetUsersAction action = new TransportGetUsersAction(Settings.EMPTY, threadPool, mock(ActionFilters.class),
262262
mock(IndexNameExpressionResolver.class), usersStore, transportService, mock(ReservedRealm.class));
263263

@@ -304,8 +304,8 @@ public void testException() {
304304
randomFrom(Collections.singletonList(new User("joe")), Arrays.asList(new User("jane"), new User("fred")), randomUsers());
305305
final String[] storeUsernames = storeUsers.stream().map(User::principal).collect(Collectors.toList()).toArray(Strings.EMPTY_ARRAY);
306306
NativeUsersStore usersStore = mock(NativeUsersStore.class);
307-
TransportService transportService = new TransportService(Settings.EMPTY, mock(Transport.class), null, TransportService.NOOP_TRANSPORT_INTERCEPTOR,
308-
x -> null, null, Collections.emptySet());
307+
TransportService transportService = new TransportService(Settings.EMPTY, mock(Transport.class), null,
308+
TransportService.NOOP_TRANSPORT_INTERCEPTOR, x -> null, null, Collections.emptySet());
309309
TransportGetUsersAction action = new TransportGetUsersAction(Settings.EMPTY, threadPool, mock(ActionFilters.class),
310310
mock(IndexNameExpressionResolver.class), usersStore, transportService, mock(ReservedRealm.class));
311311

x-pack/plugin/security/src/test/java/org/elasticsearch/xpack/security/authc/file/FileRealmTests.java

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,8 @@ public void testAuthenticate() throws Exception {
8686

8787
public void testAuthenticateCaching() throws Exception {
8888
Settings settings = Settings.builder()
89-
.put("cache.hash_algo", Hasher.values()[randomIntBetween(0, Hasher.values().length - 1)].name().toLowerCase(Locale.ROOT)).build();
89+
.put("cache.hash_algo", Hasher.values()[randomIntBetween(0, Hasher.values().length - 1)].name().toLowerCase(Locale.ROOT))
90+
.build();
9091
RealmConfig config = new RealmConfig("file-test", settings, globalSettings, TestEnvironment.newEnvironment(globalSettings),
9192
threadContext);
9293
when(userPasswdStore.verifyPassword(eq("user1"), eq(new SecureString("test123")), any(Supplier.class)))

0 commit comments

Comments
 (0)