This is an automated email from the ASF dual-hosted git repository.
reta pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git
The following commit(s) were added to refs/heads/main by this push:
new 76f9ef641d Fix PMD violations
76f9ef641d is described below
commit 76f9ef641d05ffda30f7f61aa30cb15d6c530bd8
Author: Andriy Redko <[email protected]>
AuthorDate: Thu Dec 4 22:23:06 2025 -0500
Fix PMD violations
---
.../interceptors/CorbaStreamOutEndingInterceptor.java | 4 ++--
.../corba/interceptors/CorbaStreamOutInterceptor.java | 4 ++--
.../apache/cxf/jaxrs/ext/search/fiql/FiqlParserTest.java | 16 ++++++++--------
.../cxf/rs/security/jose/jwe/AbstractJweEncryption.java | 2 +-
.../jose/jwe/AbstractWrapKeyEncryptionAlgorithm.java | 2 +-
.../security/jose/jwe/DirectKeyEncryptionAlgorithm.java | 2 +-
.../apache/cxf/rs/security/jose/jwe/JweJsonConsumer.java | 4 ++--
.../org/apache/cxf/rs/security/jose/jwk/JwkUtils.java | 4 ++--
.../rs/security/oauth2/filters/OAuthRequestFilter.java | 2 +-
.../http/policy/impl/ClientPolicyCalculator.java | 2 +-
.../transport/https/httpclient/PublicSuffixMatcher.java | 2 +-
.../apache/cxf/sts/operation/TokenIssueOperation.java | 4 ++--
.../cxf/sts/token/provider/DefaultSubjectProvider.java | 4 ++--
.../sts/token/provider/jwt/DefaultJWTClaimsProvider.java | 6 +++---
.../forked/dispatch/HugeResponseInterceptor.java | 6 +++---
.../processor/internal/DefaultServiceBuilderFactory.java | 4 ++--
16 files changed, 34 insertions(+), 34 deletions(-)
diff --git
a/rt/bindings/corba/src/main/java/org/apache/cxf/binding/corba/interceptors/CorbaStreamOutEndingInterceptor.java
b/rt/bindings/corba/src/main/java/org/apache/cxf/binding/corba/interceptors/CorbaStreamOutEndingInterceptor.java
index 5c92fb6064..1bee4e78d7 100644
---
a/rt/bindings/corba/src/main/java/org/apache/cxf/binding/corba/interceptors/CorbaStreamOutEndingInterceptor.java
+++
b/rt/bindings/corba/src/main/java/org/apache/cxf/binding/corba/interceptors/CorbaStreamOutEndingInterceptor.java
@@ -120,7 +120,7 @@ public class CorbaStreamOutEndingInterceptor extends
AbstractPhaseInterceptor<Me
QName paramName;
final CorbaObjectHandler obj;
- if (param.getMode().equals(ModeType.OUT)) {
+ if (param.getMode() == ModeType.OUT) {
if (wrap) {
paramName = new QName(wrapNSUri, param.getName());
} else {
@@ -180,7 +180,7 @@ public class CorbaStreamOutEndingInterceptor extends
AbstractPhaseInterceptor<Me
QName idlType = param.getIdltype();
QName paramName;
final CorbaObjectHandler obj;
- if (param.getMode().equals(ModeType.IN)) {
+ if (param.getMode() == ModeType.IN) {
if (wrap) {
paramName = new QName(wrapNSUri, param.getName());
} else {
diff --git
a/rt/bindings/corba/src/main/java/org/apache/cxf/binding/corba/interceptors/CorbaStreamOutInterceptor.java
b/rt/bindings/corba/src/main/java/org/apache/cxf/binding/corba/interceptors/CorbaStreamOutInterceptor.java
index 7ec3265b32..d125d3334c 100644
---
a/rt/bindings/corba/src/main/java/org/apache/cxf/binding/corba/interceptors/CorbaStreamOutInterceptor.java
+++
b/rt/bindings/corba/src/main/java/org/apache/cxf/binding/corba/interceptors/CorbaStreamOutInterceptor.java
@@ -77,7 +77,7 @@ public class CorbaStreamOutInterceptor extends
AbstractPhaseInterceptor<Message>
List<ArgType> params = new ArrayList<>();
for (Iterator<ParamType> iter = paramTypes.iterator();
iter.hasNext();) {
ParamType param = iter.next();
- if (!param.getMode().equals(ModeType.OUT)) {
+ if (param.getMode() != ModeType.OUT) {
params.add(param);
}
}
@@ -100,7 +100,7 @@ public class CorbaStreamOutInterceptor extends
AbstractPhaseInterceptor<Message>
}
for (Iterator<ParamType> iter = paramTypes.iterator();
iter.hasNext();) {
ParamType param = iter.next();
- if (!param.getMode().equals(ModeType.IN)) {
+ if (param.getMode() != ModeType.IN) {
params.add(param);
}
}
diff --git
a/rt/rs/extensions/search/src/test/java/org/apache/cxf/jaxrs/ext/search/fiql/FiqlParserTest.java
b/rt/rs/extensions/search/src/test/java/org/apache/cxf/jaxrs/ext/search/fiql/FiqlParserTest.java
index 7778b48897..8db0865aba 100644
---
a/rt/rs/extensions/search/src/test/java/org/apache/cxf/jaxrs/ext/search/fiql/FiqlParserTest.java
+++
b/rt/rs/extensions/search/src/test/java/org/apache/cxf/jaxrs/ext/search/fiql/FiqlParserTest.java
@@ -368,10 +368,10 @@ public class FiqlParserTest {
assertEquals(2, conditions.size());
PrimitiveStatement st1 = conditions.get(0).getStatement();
PrimitiveStatement st2 = conditions.get(1).getStatement();
- assertTrue((ConditionType.EQUALS.equals(st1.getCondition())
- && ConditionType.GREATER_THAN.equals(st2.getCondition()))
- || (ConditionType.EQUALS.equals(st2.getCondition())
- && ConditionType.GREATER_THAN.equals(st1.getCondition())));
+ assertTrue((ConditionType.EQUALS == st1.getCondition()
+ && ConditionType.GREATER_THAN == st2.getCondition())
+ || (ConditionType.EQUALS == st2.getCondition()
+ && ConditionType.GREATER_THAN == st1.getCondition()));
assertTrue(filter.isMet(new Condition("amichalec", 12, new Date())));
assertTrue(filter.isMet(new Condition("ami", 12, new Date())));
@@ -397,10 +397,10 @@ public class FiqlParserTest {
PrimitiveStatement st1 = conditions.get(0).getStatement();
PrimitiveStatement st2 = conditions.get(1).getStatement();
- assertTrue((ConditionType.EQUALS.equals(st1.getCondition())
- && ConditionType.GREATER_THAN.equals(st2.getCondition()))
- || (ConditionType.EQUALS.equals(st2.getCondition())
- && ConditionType.GREATER_THAN.equals(st1.getCondition())));
+ assertTrue((ConditionType.EQUALS == st1.getCondition()
+ && ConditionType.GREATER_THAN == st2.getCondition())
+ || (ConditionType.EQUALS == st2.getCondition()
+ && ConditionType.GREATER_THAN == st1.getCondition()));
assertTrue(filter.isMet(new Condition("ami", 0, new Date())));
assertTrue(filter.isMet(new Condition("foo", 20, null)));
diff --git
a/rt/rs/security/jose-parent/jose/src/main/java/org/apache/cxf/rs/security/jose/jwe/AbstractJweEncryption.java
b/rt/rs/security/jose-parent/jose/src/main/java/org/apache/cxf/rs/security/jose/jwe/AbstractJweEncryption.java
index ebfb01c499..616412af4e 100644
---
a/rt/rs/security/jose-parent/jose/src/main/java/org/apache/cxf/rs/security/jose/jwe/AbstractJweEncryption.java
+++
b/rt/rs/security/jose-parent/jose/src/main/java/org/apache/cxf/rs/security/jose/jwe/AbstractJweEncryption.java
@@ -177,7 +177,7 @@ public abstract class AbstractJweEncryption implements
JweEncryptionProvider {
if (jweInHeaders != null) {
if (jweInHeaders.getKeyEncryptionAlgorithm() != null
&& (getKeyAlgorithm() == null
- ||
!getKeyAlgorithm().equals(jweInHeaders.getKeyEncryptionAlgorithm()))) {
+ || getKeyAlgorithm() !=
jweInHeaders.getKeyEncryptionAlgorithm())) {
LOG.warning("Invalid key encryption algorithm");
throw new
JweException(JweException.Error.INVALID_KEY_ALGORITHM);
}
diff --git
a/rt/rs/security/jose-parent/jose/src/main/java/org/apache/cxf/rs/security/jose/jwe/AbstractWrapKeyEncryptionAlgorithm.java
b/rt/rs/security/jose-parent/jose/src/main/java/org/apache/cxf/rs/security/jose/jwe/AbstractWrapKeyEncryptionAlgorithm.java
index 4f67106b11..ae135579fa 100644
---
a/rt/rs/security/jose-parent/jose/src/main/java/org/apache/cxf/rs/security/jose/jwe/AbstractWrapKeyEncryptionAlgorithm.java
+++
b/rt/rs/security/jose-parent/jose/src/main/java/org/apache/cxf/rs/security/jose/jwe/AbstractWrapKeyEncryptionAlgorithm.java
@@ -90,7 +90,7 @@ public abstract class AbstractWrapKeyEncryptionAlgorithm
implements KeyEncryptio
}
protected void checkAlgorithms(JweHeaders headers) {
KeyAlgorithm providedAlgo = headers.getKeyEncryptionAlgorithm();
- if (providedAlgo != null && !providedAlgo.equals(algorithm)) {
+ if (providedAlgo != null && providedAlgo != algorithm) {
LOG.warning("Invalid key encryption algorithm: " + providedAlgo);
throw new JweException(JweException.Error.INVALID_KEY_ALGORITHM);
}
diff --git
a/rt/rs/security/jose-parent/jose/src/main/java/org/apache/cxf/rs/security/jose/jwe/DirectKeyEncryptionAlgorithm.java
b/rt/rs/security/jose-parent/jose/src/main/java/org/apache/cxf/rs/security/jose/jwe/DirectKeyEncryptionAlgorithm.java
index 584390a363..c828afa80d 100644
---
a/rt/rs/security/jose-parent/jose/src/main/java/org/apache/cxf/rs/security/jose/jwe/DirectKeyEncryptionAlgorithm.java
+++
b/rt/rs/security/jose-parent/jose/src/main/java/org/apache/cxf/rs/security/jose/jwe/DirectKeyEncryptionAlgorithm.java
@@ -31,7 +31,7 @@ public class DirectKeyEncryptionAlgorithm implements
KeyEncryptionProvider {
}
protected void checkKeyEncryptionAlgorithm(JweHeaders headers) {
KeyAlgorithm keyAlgo = headers.getKeyEncryptionAlgorithm();
- if (keyAlgo != null && !KeyAlgorithm.DIRECT.equals(keyAlgo)) {
+ if (keyAlgo != null && KeyAlgorithm.DIRECT != keyAlgo) {
LOG.warning("Key encryption algorithm header is set");
throw new JweException(JweException.Error.INVALID_KEY_ALGORITHM);
}
diff --git
a/rt/rs/security/jose-parent/jose/src/main/java/org/apache/cxf/rs/security/jose/jwe/JweJsonConsumer.java
b/rt/rs/security/jose-parent/jose/src/main/java/org/apache/cxf/rs/security/jose/jwe/JweJsonConsumer.java
index 5111d5dca0..71b86e2ad3 100644
---
a/rt/rs/security/jose-parent/jose/src/main/java/org/apache/cxf/rs/security/jose/jwe/JweJsonConsumer.java
+++
b/rt/rs/security/jose-parent/jose/src/main/java/org/apache/cxf/rs/security/jose/jwe/JweJsonConsumer.java
@@ -92,9 +92,9 @@ public class JweJsonConsumer {
Map<String, Object>
recipientProps) {
for (Map.Entry<JweJsonEncryptionEntry, JweHeaders> entry :
recipientsMap.entrySet()) {
KeyAlgorithm keyAlgo =
entry.getValue().getKeyEncryptionAlgorithm();
- if (keyAlgo != null && keyAlgo.equals(jwe.getKeyAlgorithm())
+ if (keyAlgo != null && keyAlgo == jwe.getKeyAlgorithm()
|| keyAlgo == null
- && (jwe.getKeyAlgorithm() == null ||
KeyAlgorithm.DIRECT.equals(jwe.getKeyAlgorithm()))) {
+ && (jwe.getKeyAlgorithm() == null || KeyAlgorithm.DIRECT
== jwe.getKeyAlgorithm())) {
if (recipientProps != null
&&
!entry.getValue().asMap().entrySet().containsAll(recipientProps.entrySet())) {
continue;
diff --git
a/rt/rs/security/jose-parent/jose/src/main/java/org/apache/cxf/rs/security/jose/jwk/JwkUtils.java
b/rt/rs/security/jose-parent/jose/src/main/java/org/apache/cxf/rs/security/jose/jwk/JwkUtils.java
index 824f918641..d255923712 100644
---
a/rt/rs/security/jose-parent/jose/src/main/java/org/apache/cxf/rs/security/jose/jwk/JwkUtils.java
+++
b/rt/rs/security/jose-parent/jose/src/main/java/org/apache/cxf/rs/security/jose/jwk/JwkUtils.java
@@ -565,7 +565,7 @@ public final class JwkUtils {
}
public static void includeCertChain(JsonWebKey jwk, JoseHeaders headers,
String algo) {
- if (KeyType.RSA.equals(jwk.getKeyType())) {
+ if (KeyType.RSA == jwk.getKeyType()) {
List<String> chain =
CastUtils.cast((List<?>)jwk.getProperty(JsonWebKey.X509_CHAIN));
if (chain != null) {
headers.setX509Chain(chain);
@@ -574,7 +574,7 @@ public final class JwkUtils {
}
public static void includePublicKey(JsonWebKey jwk, JoseHeaders headers,
String algo) {
- if (KeyType.RSA.equals(jwk.getKeyType())) {
+ if (KeyType.RSA == jwk.getKeyType()) {
JsonWebKey jwkPublic =
JwkUtils.fromRSAPublicKey(JwkUtils.toRSAPublicKey(jwk), algo);
if (jwk.getKeyId() != null) {
jwkPublic.setKeyId(jwk.getKeyId());
diff --git
a/rt/rs/security/oauth-parent/oauth2/src/main/java/org/apache/cxf/rs/security/oauth2/filters/OAuthRequestFilter.java
b/rt/rs/security/oauth-parent/oauth2/src/main/java/org/apache/cxf/rs/security/oauth2/filters/OAuthRequestFilter.java
index 43c7dbe2ce..68a4ada20c 100644
---
a/rt/rs/security/oauth-parent/oauth2/src/main/java/org/apache/cxf/rs/security/oauth2/filters/OAuthRequestFilter.java
+++
b/rt/rs/security/oauth-parent/oauth2/src/main/java/org/apache/cxf/rs/security/oauth2/filters/OAuthRequestFilter.java
@@ -149,7 +149,7 @@ public class OAuthRequestFilter extends
AbstractAccessTokenValidator
LOG.warning(message);
throw ExceptionUtils.toForbiddenException(null, null);
}
- if (am != null &&
!am.equals(accessTokenV.getTokenSubject().getAuthenticationMethod())) {
+ if (am != null && am !=
accessTokenV.getTokenSubject().getAuthenticationMethod()) {
String message = "The token has been authorized by the resource
owner "
+ "using an unsupported authentication method";
LOG.warning(message);
diff --git
a/rt/transports/http/src/main/java/org/apache/cxf/transport/http/policy/impl/ClientPolicyCalculator.java
b/rt/transports/http/src/main/java/org/apache/cxf/transport/http/policy/impl/ClientPolicyCalculator.java
index 0f1f05804e..ee41dc0f4a 100644
---
a/rt/transports/http/src/main/java/org/apache/cxf/transport/http/policy/impl/ClientPolicyCalculator.java
+++
b/rt/transports/http/src/main/java/org/apache/cxf/transport/http/policy/impl/ClientPolicyCalculator.java
@@ -227,7 +227,7 @@ public class ClientPolicyCalculator implements
PolicyCalculator<HTTPClientPolicy
if (compatible) {
compatible &= !p1.isSetProxyServerType() ||
!p2.isSetProxyServerType()
- ||
p1.getProxyServerType().equals(p2.getProxyServerType());
+ || p1.getProxyServerType() ==
p2.getProxyServerType();
}
if (compatible) {
diff --git
a/rt/transports/http/src/main/java/org/apache/cxf/transport/https/httpclient/PublicSuffixMatcher.java
b/rt/transports/http/src/main/java/org/apache/cxf/transport/https/httpclient/PublicSuffixMatcher.java
index 9c615fef62..d01d6b0ea0 100644
---
a/rt/transports/http/src/main/java/org/apache/cxf/transport/https/httpclient/PublicSuffixMatcher.java
+++
b/rt/transports/http/src/main/java/org/apache/cxf/transport/https/httpclient/PublicSuffixMatcher.java
@@ -96,7 +96,7 @@ public final class PublicSuffixMatcher {
if (domainType == null) {
return false;
}
- return expectedType == null || domainType.equals(expectedType);
+ return expectedType == null || domainType == expectedType;
}
private boolean hasRule(final String rule, final DomainType expectedType) {
diff --git
a/services/sts/sts-core/src/main/java/org/apache/cxf/sts/operation/TokenIssueOperation.java
b/services/sts/sts-core/src/main/java/org/apache/cxf/sts/operation/TokenIssueOperation.java
index c7c1f5c4ea..d397d4f668 100644
---
a/services/sts/sts-core/src/main/java/org/apache/cxf/sts/operation/TokenIssueOperation.java
+++
b/services/sts/sts-core/src/main/java/org/apache/cxf/sts/operation/TokenIssueOperation.java
@@ -227,9 +227,9 @@ public class TokenIssueOperation extends AbstractOperation
implements IssueOpera
if (tokenResponse == null) {
LOG.fine("No Token Validator has been found that can handle this
token");
- } else if (validateTarget.getState().equals(STATE.INVALID)) {
+ } else if (validateTarget.getState() == STATE.INVALID) {
throw new STSException("Incoming token is invalid",
STSException.REQUEST_FAILED);
- } else if (validateTarget.getState().equals(STATE.VALID)) {
+ } else if (validateTarget.getState() == STATE.VALID) {
processValidToken(providerParameters, validateTarget,
tokenResponse);
} else {
//[TODO] Add plugin for validation out-of-band
diff --git
a/services/sts/sts-core/src/main/java/org/apache/cxf/sts/token/provider/DefaultSubjectProvider.java
b/services/sts/sts-core/src/main/java/org/apache/cxf/sts/token/provider/DefaultSubjectProvider.java
index 49f6f37e80..de7ae784e3 100644
---
a/services/sts/sts-core/src/main/java/org/apache/cxf/sts/token/provider/DefaultSubjectProvider.java
+++
b/services/sts/sts-core/src/main/java/org/apache/cxf/sts/token/provider/DefaultSubjectProvider.java
@@ -130,12 +130,12 @@ public class DefaultSubjectProvider implements
SubjectProvider {
//if validation was successful, the principal was set in ReceivedToken
if (providerParameters.getTokenRequirements().getOnBehalfOf() != null)
{
ReceivedToken receivedToken =
providerParameters.getTokenRequirements().getOnBehalfOf();
- if (receivedToken.getState().equals(STATE.VALID)) {
+ if (receivedToken.getState() == STATE.VALID) {
principal = receivedToken.getPrincipal();
}
} else if
(providerParameters.getTokenRequirements().getValidateTarget() != null) {
ReceivedToken receivedToken =
providerParameters.getTokenRequirements().getValidateTarget();
- if (receivedToken.getState().equals(STATE.VALID)) {
+ if (receivedToken.getState() == STATE.VALID) {
principal = receivedToken.getPrincipal();
}
} else {
diff --git
a/services/sts/sts-core/src/main/java/org/apache/cxf/sts/token/provider/jwt/DefaultJWTClaimsProvider.java
b/services/sts/sts-core/src/main/java/org/apache/cxf/sts/token/provider/jwt/DefaultJWTClaimsProvider.java
index 9f02af9332..a06a58a6d4 100644
---
a/services/sts/sts-core/src/main/java/org/apache/cxf/sts/token/provider/jwt/DefaultJWTClaimsProvider.java
+++
b/services/sts/sts-core/src/main/java/org/apache/cxf/sts/token/provider/jwt/DefaultJWTClaimsProvider.java
@@ -132,12 +132,12 @@ public class DefaultJWTClaimsProvider implements
JWTClaimsProvider {
//if validation was successful, the principal was set in ReceivedToken
if (providerParameters.getTokenRequirements().getOnBehalfOf() != null)
{
ReceivedToken receivedToken =
providerParameters.getTokenRequirements().getOnBehalfOf();
- if (receivedToken.getState().equals(STATE.VALID)) {
+ if (receivedToken.getState() == STATE.VALID) {
principal = receivedToken.getPrincipal();
}
} else if
(providerParameters.getTokenRequirements().getValidateTarget() != null) {
ReceivedToken receivedToken =
providerParameters.getTokenRequirements().getValidateTarget();
- if (receivedToken.getState().equals(STATE.VALID)) {
+ if (receivedToken.getState() == STATE.VALID) {
principal = receivedToken.getPrincipal();
}
} else {
@@ -271,7 +271,7 @@ public class DefaultJWTClaimsProvider implements
JWTClaimsProvider {
if (providerParameters.getTokenRequirements().getActAs() != null) {
ReceivedToken receivedToken =
providerParameters.getTokenRequirements().getActAs();
- if (receivedToken.getState().equals(STATE.VALID)) {
+ if (receivedToken.getState() == STATE.VALID) {
claims.setClaim("ActAs",
receivedToken.getPrincipal().getName());
}
}
diff --git
a/systests/forked/src/test/java/org/apache/cxf/systests/forked/dispatch/HugeResponseInterceptor.java
b/systests/forked/src/test/java/org/apache/cxf/systests/forked/dispatch/HugeResponseInterceptor.java
index 6da4941ba7..925e303081 100644
---
a/systests/forked/src/test/java/org/apache/cxf/systests/forked/dispatch/HugeResponseInterceptor.java
+++
b/systests/forked/src/test/java/org/apache/cxf/systests/forked/dispatch/HugeResponseInterceptor.java
@@ -40,9 +40,9 @@ public class HugeResponseInterceptor extends
AbstractPhaseInterceptor<Message> {
}
public void handleMessage(Message message) throws Fault {
- if (type.equals(ResponseInterceptorType.overflow)) {
+ if (type == ResponseInterceptorType.overflow) {
throw new StackOverflowError();
- } else if (type.equals(ResponseInterceptorType.ElementLevelThreshold))
{
+ } else if (type == ResponseInterceptorType.ElementLevelThreshold) {
InputStream is = message.getContent(InputStream.class);
if (is != null) {
CachedOutputStream bos = new CachedOutputStream();
@@ -59,7 +59,7 @@ public class HugeResponseInterceptor extends
AbstractPhaseInterceptor<Message> {
throw new Fault(e);
}
}
- } else if (type.equals(ResponseInterceptorType.ElementCountThreshold))
{
+ } else if (type == ResponseInterceptorType.ElementCountThreshold) {
InputStream is = message.getContent(InputStream.class);
if (is != null) {
CachedOutputStream bos = new CachedOutputStream();
diff --git
a/tools/javato/ws/src/main/java/org/apache/cxf/tools/java2wsdl/processor/internal/DefaultServiceBuilderFactory.java
b/tools/javato/ws/src/main/java/org/apache/cxf/tools/java2wsdl/processor/internal/DefaultServiceBuilderFactory.java
index deea27bf57..9c2d33a33a 100644
---
a/tools/javato/ws/src/main/java/org/apache/cxf/tools/java2wsdl/processor/internal/DefaultServiceBuilderFactory.java
+++
b/tools/javato/ws/src/main/java/org/apache/cxf/tools/java2wsdl/processor/internal/DefaultServiceBuilderFactory.java
@@ -49,9 +49,9 @@ public final class DefaultServiceBuilderFactory extends
ServiceBuilderFactory {
throw new ToolException("Unsupported databinding: " + dbn);
}
final AbstractServiceFactory builder;
- if (Style.Jaxws.equals(s)) {
+ if (Style.Jaxws == s) {
builder = new JaxwsServiceBuilder();
- } else if (Style.Simple.equals(s)) {
+ } else if (Style.Simple == s) {
builder = new SimpleServiceBuilder();
} else {
throw new ToolException("Unsupported frontend style: " + s);