This is an automated email from the ASF dual-hosted git repository.

zihaoxiang pushed a commit to branch dev
in repository https://gitbox.apache.org/repos/asf/dolphinscheduler.git


The following commit(s) were added to refs/heads/dev by this push:
     new 344ad4a7e8 [Chore] Remove unused code in api-server (#17871)
344ad4a7e8 is described below

commit 344ad4a7e895df846cc59e7e817756b196a5aff9
Author: Wenjun Ruan <[email protected]>
AuthorDate: Sat Jan 17 22:30:21 2026 +0800

    [Chore] Remove unused code in api-server (#17871)
---
 .../dolphinscheduler/api/ApiApplicationServer.java |  5 --
 .../apache/dolphinscheduler/api/enums/Status.java  |  1 -
 .../dolphinscheduler/api/k8s/K8sClientService.java | 18 -----
 .../api/metrics/ApiServerMetrics.java              | 15 -----
 .../api/permission/PermissionCheck.java            | 67 -------------------
 .../permission/ResourcePermissionCheckService.java | 12 ++--
 .../ResourcePermissionCheckServiceImpl.java        | 18 ++---
 .../api/service/impl/BaseServiceImpl.java          | 13 ----
 .../api/service/impl/UsersServiceImpl.java         | 77 +---------------------
 .../dolphinscheduler/api/utils/CheckUtils.java     | 22 -------
 .../ResourcePermissionCheckServiceTest.java        | 14 ++--
 .../api/service/K8SNamespaceServiceTest.java       | 11 ----
 .../api/service/UsersServiceTest.java              | 12 ----
 .../dolphinscheduler/api/utils/CheckUtilsTest.java | 15 -----
 .../org/apache/dolphinscheduler/dao/PluginDao.java |  9 ---
 15 files changed, 20 insertions(+), 289 deletions(-)

diff --git 
a/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/ApiApplicationServer.java
 
b/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/ApiApplicationServer.java
index b072fe6308..8a8a8cc102 100644
--- 
a/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/ApiApplicationServer.java
+++ 
b/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/ApiApplicationServer.java
@@ -22,7 +22,6 @@ import org.apache.dolphinscheduler.common.CommonConfiguration;
 import org.apache.dolphinscheduler.common.lifecycle.ServerLifeCycleManager;
 import 
org.apache.dolphinscheduler.common.thread.DefaultUncaughtExceptionHandler;
 import org.apache.dolphinscheduler.dao.DaoConfiguration;
-import org.apache.dolphinscheduler.dao.PluginDao;
 import 
org.apache.dolphinscheduler.plugin.datasource.api.plugin.DataSourceProcessorProvider;
 import org.apache.dolphinscheduler.plugin.storage.api.StorageConfiguration;
 import org.apache.dolphinscheduler.plugin.task.api.TaskPluginManager;
@@ -31,7 +30,6 @@ import 
org.apache.dolphinscheduler.service.ServiceConfiguration;
 
 import lombok.extern.slf4j.Slf4j;
 
-import org.springframework.beans.factory.annotation.Autowired;
 import org.springframework.boot.SpringApplication;
 import org.springframework.boot.autoconfigure.SpringBootApplication;
 import org.springframework.boot.context.event.ApplicationReadyEvent;
@@ -49,9 +47,6 @@ import org.springframework.context.event.EventListener;
 @SpringBootApplication
 public class ApiApplicationServer {
 
-    @Autowired
-    private PluginDao pluginDao;
-
     public static void main(String[] args) {
         
ApiServerMetrics.registerUncachedException(DefaultUncaughtExceptionHandler::getUncaughtExceptionCount);
         
Thread.setDefaultUncaughtExceptionHandler(DefaultUncaughtExceptionHandler.getInstance());
diff --git 
a/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/enums/Status.java
 
b/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/enums/Status.java
index daf7026e78..3d24834bd4 100644
--- 
a/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/enums/Status.java
+++ 
b/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/enums/Status.java
@@ -561,7 +561,6 @@ public enum Status {
             "查询工作流自定义变量信息错误"),
 
     NO_CURRENT_OPERATING_PERMISSION(1400001, "The current user does not have 
this permission.", "当前用户无此权限"),
-    FUNCTION_DISABLED(1400002, "The current feature is disabled.", "当前功能已被禁用"),
     SCHEDULE_TIME_NUMBER_EXCEED(1400003, "The number of complement dates 
exceed 100.", "补数日期个数超过100"),
     DESCRIPTION_TOO_LONG_ERROR(1400004, "description is too long error", 
"描述过长"),
     DELETE_WORKER_GROUP_BY_ID_FAIL_ENV(1400005,
diff --git 
a/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/k8s/K8sClientService.java
 
b/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/k8s/K8sClientService.java
index f35d95cae9..d481db8ec0 100644
--- 
a/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/k8s/K8sClientService.java
+++ 
b/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/k8s/K8sClientService.java
@@ -23,12 +23,9 @@ import java.util.Optional;
 
 import org.springframework.beans.factory.annotation.Autowired;
 import org.springframework.stereotype.Component;
-import org.yaml.snakeyaml.Yaml;
 
 import io.fabric8.kubernetes.api.model.Namespace;
 import io.fabric8.kubernetes.api.model.NamespaceList;
-import io.fabric8.kubernetes.api.model.ObjectMeta;
-import io.fabric8.kubernetes.client.KubernetesClient;
 
 /**
  * Encapsulates all client-related operations, not involving the db
@@ -36,7 +33,6 @@ import io.fabric8.kubernetes.client.KubernetesClient;
 @Component
 public class K8sClientService {
 
-    private static Yaml yaml = new Yaml();
     @Autowired
     private K8sManager k8sManager;
 
@@ -48,20 +44,6 @@ public class K8sClientService {
         }
     }
 
-    public Optional<Namespace> deleteNamespaceToK8s(String name, Long 
clusterCode) {
-        Optional<Namespace> result = getNamespaceFromK8s(name, clusterCode);
-        if (result.isPresent()) {
-            KubernetesClient client = k8sManager.getK8sClient(clusterCode);
-            Namespace body = new Namespace();
-            ObjectMeta meta = new ObjectMeta();
-            meta.setNamespace(name);
-            meta.setName(name);
-            body.setMetadata(meta);
-            client.namespaces().delete(body);
-        }
-        return getNamespaceFromK8s(name, clusterCode);
-    }
-
     private Optional<Namespace> getNamespaceFromK8s(String name, Long 
clusterCode) {
         NamespaceList listNamespace =
                 k8sManager.getK8sClient(clusterCode).namespaces().list();
diff --git 
a/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/metrics/ApiServerMetrics.java
 
b/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/metrics/ApiServerMetrics.java
index f97f9afffa..322e7059cb 100644
--- 
a/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/metrics/ApiServerMetrics.java
+++ 
b/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/metrics/ApiServerMetrics.java
@@ -17,7 +17,6 @@
 
 package org.apache.dolphinscheduler.api.metrics;
 
-import java.util.concurrent.TimeUnit;
 import java.util.function.Supplier;
 
 import lombok.experimental.UtilityClass;
@@ -25,7 +24,6 @@ import io.micrometer.core.instrument.Counter;
 import io.micrometer.core.instrument.DistributionSummary;
 import io.micrometer.core.instrument.Gauge;
 import io.micrometer.core.instrument.Metrics;
-import io.micrometer.core.instrument.Timer;
 
 @UtilityClass
 public class ApiServerMetrics {
@@ -75,13 +73,6 @@ public class ApiServerMetrics {
                     .description("size of download resource files on api")
                     .register(Metrics.globalRegistry);
 
-    static {
-        Timer.builder("ds.api.response.time")
-                .tag("user.id", "dummy")
-                .description("response time on api")
-                .register(Metrics.globalRegistry);
-    }
-
     public void incApiRequestCount() {
         apiRequestCounter.increment();
     }
@@ -110,12 +101,6 @@ public class ApiServerMetrics {
         apiResourceDownloadSizeDistribution.record(size);
     }
 
-    public void recordApiResponseTime(final long milliseconds, final int 
userId) {
-        Metrics.globalRegistry.timer(
-                "ds.api.response.time",
-                "user.id", String.valueOf(userId)).record(milliseconds, 
TimeUnit.MILLISECONDS);
-    }
-
     public void cleanUpApiResponseTimeMetricsByUserId(final int userId) {
         Metrics.globalRegistry.remove(
                 Metrics.globalRegistry.timer(
diff --git 
a/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/permission/PermissionCheck.java
 
b/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/permission/PermissionCheck.java
index 100d53f793..6ace0b64ac 100644
--- 
a/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/permission/PermissionCheck.java
+++ 
b/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/permission/PermissionCheck.java
@@ -61,31 +61,6 @@ public class PermissionCheck<T> {
      */
     private int userId;
 
-    /**
-     * permission check
-     *
-     * @param authorizationType authorization type
-     * @param processService process dao
-     */
-    public PermissionCheck(AuthorizationType authorizationType, ProcessService 
processService) {
-        this.authorizationType = authorizationType;
-        this.processService = processService;
-    }
-
-    /**
-     * permission check
-     */
-    public PermissionCheck(AuthorizationType authorizationType, ProcessService 
processService, T[] needChecks,
-                           int userId) {
-        this.authorizationType = authorizationType;
-        this.processService = processService;
-        this.needChecks = needChecks;
-        this.userId = userId;
-    }
-
-    /**
-     * permission check
-     */
     public PermissionCheck(AuthorizationType authorizationType, ProcessService 
processService, T[] needChecks,
                            int userId, Logger logger) {
         this.authorizationType = authorizationType;
@@ -95,26 +70,6 @@ public class PermissionCheck<T> {
         this.logger = logger;
     }
 
-    /**
-     * permission check
-     */
-    public PermissionCheck(AuthorizationType authorizationType, ProcessService 
processService,
-                           List<ResourceInfo> resourceList, int userId, Logger 
logger) {
-        this.authorizationType = authorizationType;
-        this.processService = processService;
-        this.resourceList = resourceList;
-        this.userId = userId;
-        this.logger = logger;
-    }
-
-    public AuthorizationType getAuthorizationType() {
-        return authorizationType;
-    }
-
-    public void setAuthorizationType(AuthorizationType authorizationType) {
-        this.authorizationType = authorizationType;
-    }
-
     public ProcessService getProcessService() {
         return processService;
     }
@@ -123,14 +78,6 @@ public class PermissionCheck<T> {
         this.processService = processService;
     }
 
-    public T[] getNeedChecks() {
-        return needChecks;
-    }
-
-    public void setNeedChecks(T[] needChecks) {
-        this.needChecks = needChecks;
-    }
-
     public int getUserId() {
         return userId;
     }
@@ -147,20 +94,6 @@ public class PermissionCheck<T> {
         this.resourceList = resourceList;
     }
 
-    /**
-     * has permission
-     *
-     * @return true if has permission
-     */
-    public boolean hasPermission() {
-        try {
-            checkPermission();
-            return true;
-        } catch (Exception e) {
-            return false;
-        }
-    }
-
     /**
      * check permission
      *
diff --git 
a/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/permission/ResourcePermissionCheckService.java
 
b/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/permission/ResourcePermissionCheckService.java
index 86214478b0..e8a9e57f52 100644
--- 
a/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/permission/ResourcePermissionCheckService.java
+++ 
b/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/permission/ResourcePermissionCheckService.java
@@ -17,6 +17,8 @@
 
 package org.apache.dolphinscheduler.api.permission;
 
+import org.apache.dolphinscheduler.common.enums.AuthorizationType;
+
 import java.util.Set;
 
 import org.slf4j.Logger;
@@ -50,13 +52,7 @@ public interface ResourcePermissionCheckService<T> {
      * @param logger
      * @return
      */
-    boolean operationPermissionCheck(Object authorizationType, Integer userId,
-                                     String permissionKey, Logger logger);
-
-    /**
-     * functionDisabled
-     * @return
-     */
-    boolean functionDisabled();
+    boolean operationPermissionCheck(AuthorizationType authorizationType, 
Integer userId, String permissionKey,
+                                     Logger logger);
 
 }
diff --git 
a/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/permission/ResourcePermissionCheckServiceImpl.java
 
b/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/permission/ResourcePermissionCheckServiceImpl.java
index adfab607c6..b5596c866f 100644
--- 
a/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/permission/ResourcePermissionCheckServiceImpl.java
+++ 
b/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/permission/ResourcePermissionCheckServiceImpl.java
@@ -44,7 +44,6 @@ import org.apache.dolphinscheduler.dao.mapper.TaskGroupMapper;
 import org.apache.dolphinscheduler.dao.mapper.TenantMapper;
 import org.apache.dolphinscheduler.dao.repository.UserDao;
 import org.apache.dolphinscheduler.dao.repository.WorkerGroupDao;
-import org.apache.dolphinscheduler.service.process.ProcessService;
 
 import java.util.Arrays;
 import java.util.Collections;
@@ -70,9 +69,9 @@ public class ResourcePermissionCheckServiceImpl
             ApplicationContextAware {
 
     @Autowired
-    private ProcessService processService;
+    private UserDao userDao;
 
-    public static final Map<AuthorizationType, 
ResourceAcquisitionAndPermissionCheck<?>> RESOURCE_LIST_MAP =
+    static final Map<AuthorizationType, 
ResourceAcquisitionAndPermissionCheck<?>> RESOURCE_LIST_MAP =
             new ConcurrentHashMap<>();
 
     @Override
@@ -100,9 +99,9 @@ public class ResourcePermissionCheckServiceImpl
     }
 
     @Override
-    public boolean operationPermissionCheck(Object authorizationType, Integer 
userId,
-                                            String permissionKey, Logger 
logger) {
-        User user = processService.getUserById(userId);
+    public boolean operationPermissionCheck(AuthorizationType 
authorizationType, Integer userId, String permissionKey,
+                                            Logger logger) {
+        User user = userDao.queryById(userId);
         if (user == null) {
             logger.error("User does not exist, userId:{}.", userId);
             return false;
@@ -113,14 +112,9 @@ public class ResourcePermissionCheckServiceImpl
         return 
RESOURCE_LIST_MAP.get(authorizationType).permissionCheck(userId, permissionKey, 
logger);
     }
 
-    @Override
-    public boolean functionDisabled() {
-        return false;
-    }
-
     @Override
     public Set<Object> userOwnedResourceIdsAcquisition(Object 
authorizationType, Integer userId, Logger logger) {
-        User user = processService.getUserById(userId);
+        User user = userDao.queryById(userId);
         if (user == null) {
             logger.error("User does not exist, userId:{}.", userId);
             return Collections.emptySet();
diff --git 
a/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/service/impl/BaseServiceImpl.java
 
b/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/service/impl/BaseServiceImpl.java
index 428b9527bc..8c256be6bb 100644
--- 
a/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/service/impl/BaseServiceImpl.java
+++ 
b/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/service/impl/BaseServiceImpl.java
@@ -124,19 +124,6 @@ public class BaseServiceImpl implements BaseService {
         return false;
     }
 
-    /**
-     * create tenant dir if not exists
-     *
-     * @param tenantCode tenant code
-     * @throws IOException if hdfs operation exception
-     */
-    // @Override
-    // public void createTenantDirIfNotExists(String tenantCode) throws 
IOException {
-    // String resourcePath = HadoopUtils.getHdfsResDir(tenantCode);
-    // // init resource path
-    // HadoopUtils.getInstance().mkdir(tenantCode,resourcePath);
-    // }
-
     /**
      * Verify that the operator has permissions
      *
diff --git 
a/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/service/impl/UsersServiceImpl.java
 
b/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/service/impl/UsersServiceImpl.java
index 5a3738cac1..ca991714b6 100644
--- 
a/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/service/impl/UsersServiceImpl.java
+++ 
b/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/service/impl/UsersServiceImpl.java
@@ -142,10 +142,6 @@ public class UsersServiceImpl extends BaseServiceImpl 
implements UsersService {
 
         // check all user params
         String msg = this.checkUserParams(userName, userPassword, email, 
phone);
-        if (resourcePermissionCheckService.functionDisabled()) {
-            putMsg(result, Status.FUNCTION_DISABLED, msg);
-            return result;
-        }
 
         if (!isAdmin(loginUser)) {
             putMsg(result, Status.USER_NO_OPERATION_PERM);
@@ -315,10 +311,7 @@ public class UsersServiceImpl extends BaseServiceImpl 
implements UsersService {
     @Override
     public Result<Object> queryUserList(User loginUser, String searchVal, 
Integer pageNo, Integer pageSize) {
         Result<Object> result = new Result<>();
-        if (resourcePermissionCheckService.functionDisabled()) {
-            putMsg(result, Status.FUNCTION_DISABLED);
-            return result;
-        }
+
         if (!isAdmin(loginUser)) {
             log.warn("User does not have permission for this feature, 
userId:{}, userName:{}.", loginUser.getId(),
                     loginUser.getUserName());
@@ -367,9 +360,7 @@ public class UsersServiceImpl extends BaseServiceImpl 
implements UsersService {
                            String queue,
                            int state,
                            String timeZone) {
-        if (resourcePermissionCheckService.functionDisabled()) {
-            throw new ServiceException(Status.FUNCTION_DISABLED);
-        }
+
         if (!canOperator(loginUser, userId)) {
             throw new ServiceException(Status.USER_NO_OPERATION_PERM);
         }
@@ -456,10 +447,7 @@ public class UsersServiceImpl extends BaseServiceImpl 
implements UsersService {
     @Transactional
     public Map<String, Object> deleteUserById(User loginUser, int id) throws 
IOException {
         Map<String, Object> result = new HashMap<>();
-        if (resourcePermissionCheckService.functionDisabled()) {
-            putMsg(result, Status.FUNCTION_DISABLED);
-            return result;
-        }
+
         // only admin can operate
         if (!isAdmin(loginUser)) {
             log.warn("User does not have permission for this feature, 
userId:{}, userName:{}.", loginUser.getId(),
@@ -515,10 +503,6 @@ public class UsersServiceImpl extends BaseServiceImpl 
implements UsersService {
         Map<String, Object> result = new HashMap<>();
         result.put(Constants.STATUS, false);
 
-        if (resourcePermissionCheckService.functionDisabled()) {
-            putMsg(result, Status.FUNCTION_DISABLED);
-            return result;
-        }
         // 1. only admin can operate
         if (this.check(result, !this.isAdmin(loginUser), 
Status.USER_NO_OPERATION_PERM)) {
             return result;
@@ -560,11 +544,6 @@ public class UsersServiceImpl extends BaseServiceImpl 
implements UsersService {
         Map<String, Object> result = new HashMap<>();
         result.put(Constants.STATUS, false);
 
-        if (resourcePermissionCheckService.functionDisabled()) {
-            putMsg(result, Status.FUNCTION_DISABLED);
-            return result;
-        }
-
         if (!isAdmin(loginUser)) {
             putMsg(result, Status.NO_CURRENT_OPERATING_PERMISSION);
             return result;
@@ -613,11 +592,6 @@ public class UsersServiceImpl extends BaseServiceImpl 
implements UsersService {
         Map<String, Object> result = new HashMap<>();
         result.put(Constants.STATUS, false);
 
-        if (resourcePermissionCheckService.functionDisabled()) {
-            putMsg(result, Status.FUNCTION_DISABLED);
-            return result;
-        }
-
         // check exist
         User tempUser = userMapper.selectById(userId);
         if (tempUser == null) {
@@ -667,11 +641,6 @@ public class UsersServiceImpl extends BaseServiceImpl 
implements UsersService {
         Map<String, Object> result = new HashMap<>();
         result.put(Constants.STATUS, false);
 
-        if (resourcePermissionCheckService.functionDisabled()) {
-            putMsg(result, Status.FUNCTION_DISABLED);
-            return result;
-        }
-
         // 1. check if user is existed
         User tempUser = this.userMapper.selectById(userId);
         if (tempUser == null) {
@@ -726,10 +695,6 @@ public class UsersServiceImpl extends BaseServiceImpl 
implements UsersService {
         Map<String, Object> result = new HashMap<>();
         result.put(Constants.STATUS, false);
 
-        if (resourcePermissionCheckService.functionDisabled()) {
-            putMsg(result, Status.FUNCTION_DISABLED);
-            return result;
-        }
         // 1. only admin can operate
         if (this.check(result, !this.isAdmin(loginUser), 
Status.USER_NO_OPERATION_PERM)) {
             log.warn("Only admin can revoke the project permission.");
@@ -772,10 +737,6 @@ public class UsersServiceImpl extends BaseServiceImpl 
implements UsersService {
     public Map<String, Object> grantNamespaces(User loginUser, int userId, 
String namespaceIds) {
         Map<String, Object> result = new HashMap<>();
         result.put(Constants.STATUS, false);
-        if (resourcePermissionCheckService.functionDisabled()) {
-            putMsg(result, Status.FUNCTION_DISABLED);
-            return result;
-        }
         // only admin can operate
         if (this.check(result, !this.isAdmin(loginUser), 
Status.USER_NO_OPERATION_PERM)) {
             log.warn("Only admin can grant namespaces.");
@@ -826,10 +787,6 @@ public class UsersServiceImpl extends BaseServiceImpl 
implements UsersService {
         Map<String, Object> result = new HashMap<>();
         result.put(Constants.STATUS, false);
 
-        if (resourcePermissionCheckService.functionDisabled()) {
-            putMsg(result, Status.FUNCTION_DISABLED);
-            return result;
-        }
         // only admin can operate
         if (this.check(result, !this.isAdmin(loginUser), 
Status.USER_NO_OPERATION_PERM)) {
             log.warn("Only admin can grant datasource.");
@@ -877,10 +834,6 @@ public class UsersServiceImpl extends BaseServiceImpl 
implements UsersService {
 
         Map<String, Object> result = new HashMap<>();
 
-        if (resourcePermissionCheckService.functionDisabled()) {
-            putMsg(result, Status.FUNCTION_DISABLED);
-            return result;
-        }
         User user = null;
         if (loginUser.getUserType() == UserType.ADMIN_USER) {
             user = loginUser;
@@ -928,10 +881,6 @@ public class UsersServiceImpl extends BaseServiceImpl 
implements UsersService {
     @Override
     public Map<String, Object> queryAllGeneralUsers(User loginUser) {
         Map<String, Object> result = new HashMap<>();
-        if (resourcePermissionCheckService.functionDisabled()) {
-            putMsg(result, Status.FUNCTION_DISABLED);
-            return result;
-        }
         // only admin can operate
         if (check(result, !isAdmin(loginUser), Status.USER_NO_OPERATION_PERM)) 
{
             log.warn("Only admin can query all general users.");
@@ -997,10 +946,6 @@ public class UsersServiceImpl extends BaseServiceImpl 
implements UsersService {
     public Map<String, Object> unauthorizedUser(User loginUser, Integer 
alertgroupId) {
 
         Map<String, Object> result = new HashMap<>();
-        if (resourcePermissionCheckService.functionDisabled()) {
-            putMsg(result, Status.FUNCTION_DISABLED);
-            return result;
-        }
         // only admin can operate
         if (check(result, !isAdmin(loginUser), Status.USER_NO_OPERATION_PERM)) 
{
             log.warn("Only admin can deauthorize user.");
@@ -1038,10 +983,6 @@ public class UsersServiceImpl extends BaseServiceImpl 
implements UsersService {
     @Override
     public Map<String, Object> authorizedUser(User loginUser, Integer 
alertGroupId) {
         Map<String, Object> result = new HashMap<>();
-        if (resourcePermissionCheckService.functionDisabled()) {
-            putMsg(result, Status.FUNCTION_DISABLED);
-            return result;
-        }
         // only admin can operate
         if (check(result, !isAdmin(loginUser), Status.USER_NO_OPERATION_PERM)) 
{
             log.warn("Only admin can authorize user.");
@@ -1102,10 +1043,6 @@ public class UsersServiceImpl extends BaseServiceImpl 
implements UsersService {
 
         // check user params
         String msg = this.checkUserParams(userName, userPassword, email, "");
-        if (resourcePermissionCheckService.functionDisabled()) {
-            putMsg(result, Status.FUNCTION_DISABLED);
-            return result;
-        }
         if (!StringUtils.isEmpty(msg)) {
             putMsg(result, Status.REQUEST_PARAMS_NOT_VALID_ERROR, msg);
             return result;
@@ -1132,10 +1069,6 @@ public class UsersServiceImpl extends BaseServiceImpl 
implements UsersService {
     public Map<String, Object> activateUser(User loginUser, String userName) {
         Map<String, Object> result = new HashMap<>();
         result.put(Constants.STATUS, false);
-        if (resourcePermissionCheckService.functionDisabled()) {
-            putMsg(result, Status.FUNCTION_DISABLED);
-            return result;
-        }
         if (!isAdmin(loginUser)) {
             putMsg(result, Status.USER_NO_OPERATION_PERM);
             return result;
@@ -1180,10 +1113,6 @@ public class UsersServiceImpl extends BaseServiceImpl 
implements UsersService {
     public Map<String, Object> batchActivateUser(User loginUser, List<String> 
userNames) {
         Map<String, Object> result = new HashMap<>();
 
-        if (resourcePermissionCheckService.functionDisabled()) {
-            putMsg(result, Status.FUNCTION_DISABLED);
-            return result;
-        }
         if (!isAdmin(loginUser)) {
             putMsg(result, Status.USER_NO_OPERATION_PERM);
             return result;
diff --git 
a/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/utils/CheckUtils.java
 
b/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/utils/CheckUtils.java
index 8b166a16dd..43f6eb8954 100644
--- 
a/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/utils/CheckUtils.java
+++ 
b/dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/utils/CheckUtils.java
@@ -20,16 +20,12 @@ package org.apache.dolphinscheduler.api.utils;
 import static 
org.apache.dolphinscheduler.common.constants.Constants.USER_PASSWORD_MAX_LENGTH;
 import static 
org.apache.dolphinscheduler.common.constants.Constants.USER_PASSWORD_MIN_LENGTH;
 
-import org.apache.dolphinscheduler.api.enums.Status;
 import org.apache.dolphinscheduler.common.constants.Constants;
 import org.apache.dolphinscheduler.common.utils.JSONUtils;
 
 import org.apache.commons.lang3.StringUtils;
 
-import java.text.MessageFormat;
 import java.time.ZoneId;
-import java.util.HashMap;
-import java.util.Map;
 import java.util.regex.Pattern;
 
 import org.hibernate.validator.internal.constraintvalidators.bv.EmailValidator;
@@ -73,24 +69,6 @@ public class CheckUtils {
         return domainString.contains(".");
     }
 
-    /**
-     * check project description
-     *
-     * @param desc desc
-     * @return true if description regex valid, otherwise return false
-     */
-    public static Map<String, Object> checkDesc(String desc) {
-        Map<String, Object> result = new HashMap<>();
-        if (!StringUtils.isEmpty(desc) && desc.length() > 200) {
-            result.put(Constants.STATUS, 
Status.REQUEST_PARAMS_NOT_VALID_ERROR);
-            result.put(Constants.MSG,
-                    
MessageFormat.format(Status.REQUEST_PARAMS_NOT_VALID_ERROR.getMsg(), "desc 
length"));
-        } else {
-            result.put(Constants.STATUS, Status.SUCCESS);
-        }
-        return result;
-    }
-
     /**
      * check extra info
      *
diff --git 
a/dolphinscheduler-api/src/test/java/org/apache/dolphinscheduler/api/permission/ResourcePermissionCheckServiceTest.java
 
b/dolphinscheduler-api/src/test/java/org/apache/dolphinscheduler/api/permission/ResourcePermissionCheckServiceTest.java
index 457bd90a91..3710a130ae 100644
--- 
a/dolphinscheduler-api/src/test/java/org/apache/dolphinscheduler/api/permission/ResourcePermissionCheckServiceTest.java
+++ 
b/dolphinscheduler-api/src/test/java/org/apache/dolphinscheduler/api/permission/ResourcePermissionCheckServiceTest.java
@@ -23,7 +23,7 @@ import org.apache.dolphinscheduler.common.enums.UserType;
 import org.apache.dolphinscheduler.dao.entity.Project;
 import org.apache.dolphinscheduler.dao.entity.User;
 import org.apache.dolphinscheduler.dao.mapper.ProjectMapper;
-import org.apache.dolphinscheduler.service.process.ProcessService;
+import org.apache.dolphinscheduler.dao.repository.UserDao;
 
 import java.util.Arrays;
 import java.util.List;
@@ -48,7 +48,7 @@ public class ResourcePermissionCheckServiceTest {
     private static final Logger logger = 
LoggerFactory.getLogger(ResourcePermissionCheckServiceTest.class);
 
     @Mock
-    private ProcessService processService;
+    private UserDao userDao;
 
     @Mock
     private ProjectMapper projectMapper;
@@ -88,11 +88,11 @@ public class ResourcePermissionCheckServiceTest {
     public void testOperationPermissionCheck() {
         User user = getGeneralUser();
 
-        
Mockito.when(processService.getUserById(user.getId())).thenReturn(null);
+        Mockito.when(userDao.queryById(user.getId())).thenReturn(null);
         
Assertions.assertFalse(resourcePermissionCheckService.operationPermissionCheck(AuthorizationType.PROJECTS,
                 user.getId(), ApiFuncIdentificationConstant.PROJECT, logger));
 
-        
Mockito.when(processService.getUserById(user.getId())).thenReturn(user);
+        Mockito.when(userDao.queryById(user.getId())).thenReturn(user);
         
Assertions.assertTrue(resourcePermissionCheckService.operationPermissionCheck(AuthorizationType.PROJECTS,
                 user.getId(), ApiFuncIdentificationConstant.PROJECT, logger));
     }
@@ -100,20 +100,20 @@ public class ResourcePermissionCheckServiceTest {
     @Test
     public void testUserOwnedResourceIdsAcquisition() {
         User generalUser = getGeneralUser();
-        
Mockito.when(processService.getUserById(generalUser.getId())).thenReturn(null);
+        Mockito.when(userDao.queryById(generalUser.getId())).thenReturn(null);
         Assertions.assertEquals(0, resourcePermissionCheckService
                 .userOwnedResourceIdsAcquisition(AuthorizationType.PROJECTS, 
generalUser.getId(), logger).size());
 
         // GENERAL_USER
         List<Project> projects = Arrays.asList(getProject(1), getProject(2), 
getProject(3));
-        
Mockito.when(processService.getUserById(generalUser.getId())).thenReturn(generalUser);
+        
Mockito.when(userDao.queryById(generalUser.getId())).thenReturn(generalUser);
         Mockito.when(projectMapper.listAuthorizedProjects(generalUser.getId(), 
null)).thenReturn(projects);
         Assertions.assertEquals(3, resourcePermissionCheckService
                 .userOwnedResourceIdsAcquisition(AuthorizationType.PROJECTS, 
generalUser.getId(), logger).size());
 
         // ADMIN_USER
         User adminUser = getAdminUser();
-        
Mockito.when(processService.getUserById(adminUser.getId())).thenReturn(adminUser);
+        
Mockito.when(userDao.queryById(adminUser.getId())).thenReturn(adminUser);
         Mockito.when(projectMapper.listAuthorizedProjects(0, 
null)).thenReturn(projects);
         Assertions.assertEquals(3, resourcePermissionCheckService
                 .userOwnedResourceIdsAcquisition(AuthorizationType.PROJECTS, 
adminUser.getId(), logger).size());
diff --git 
a/dolphinscheduler-api/src/test/java/org/apache/dolphinscheduler/api/service/K8SNamespaceServiceTest.java
 
b/dolphinscheduler-api/src/test/java/org/apache/dolphinscheduler/api/service/K8SNamespaceServiceTest.java
index 6cc6f0d324..de5e48b589 100644
--- 
a/dolphinscheduler-api/src/test/java/org/apache/dolphinscheduler/api/service/K8SNamespaceServiceTest.java
+++ 
b/dolphinscheduler-api/src/test/java/org/apache/dolphinscheduler/api/service/K8SNamespaceServiceTest.java
@@ -40,9 +40,7 @@ import java.util.ArrayList;
 import java.util.List;
 import java.util.Map;
 
-import org.junit.jupiter.api.AfterEach;
 import org.junit.jupiter.api.Assertions;
-import org.junit.jupiter.api.BeforeEach;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.extension.ExtendWith;
 import org.mockito.InjectMocks;
@@ -81,15 +79,6 @@ public class K8SNamespaceServiceTest {
     private String namespace = "default";
     private Long clusterCode = 100L;
 
-    @BeforeEach
-    public void setUp() throws Exception {
-        
Mockito.when(k8sClientService.deleteNamespaceToK8s(Mockito.anyString(), 
Mockito.anyLong())).thenReturn(null);
-    }
-
-    @AfterEach
-    public void tearDown() throws Exception {
-    }
-
     @Test
     public void queryListPaging() {
         IPage<K8sNamespace> page = new Page<>(1, 10);
diff --git 
a/dolphinscheduler-api/src/test/java/org/apache/dolphinscheduler/api/service/UsersServiceTest.java
 
b/dolphinscheduler-api/src/test/java/org/apache/dolphinscheduler/api/service/UsersServiceTest.java
index f3b0454c0a..575c2591d9 100644
--- 
a/dolphinscheduler-api/src/test/java/org/apache/dolphinscheduler/api/service/UsersServiceTest.java
+++ 
b/dolphinscheduler-api/src/test/java/org/apache/dolphinscheduler/api/service/UsersServiceTest.java
@@ -55,9 +55,7 @@ import java.util.ArrayList;
 import java.util.List;
 import java.util.Map;
 
-import org.junit.jupiter.api.AfterEach;
 import org.junit.jupiter.api.Assertions;
-import org.junit.jupiter.api.BeforeEach;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.extension.ExtendWith;
 import org.mockito.InjectMocks;
@@ -125,16 +123,6 @@ public class UsersServiceTest {
 
     private static final Logger serviceLogger = 
LoggerFactory.getLogger(BaseServiceImpl.class);
 
-    @BeforeEach
-    public void before() {
-        
Mockito.when(resourcePermissionCheckService.functionDisabled()).thenReturn(false);
-    }
-
-    @AfterEach
-    public void after() {
-
-    }
-
     @Test
     public void testCreateUserForLdap() {
         String userName = "user1";
diff --git 
a/dolphinscheduler-api/src/test/java/org/apache/dolphinscheduler/api/utils/CheckUtilsTest.java
 
b/dolphinscheduler-api/src/test/java/org/apache/dolphinscheduler/api/utils/CheckUtilsTest.java
index bca8a69a16..473c1b606d 100644
--- 
a/dolphinscheduler-api/src/test/java/org/apache/dolphinscheduler/api/utils/CheckUtilsTest.java
+++ 
b/dolphinscheduler-api/src/test/java/org/apache/dolphinscheduler/api/utils/CheckUtilsTest.java
@@ -17,11 +17,6 @@
 
 package org.apache.dolphinscheduler.api.utils;
 
-import org.apache.dolphinscheduler.api.enums.Status;
-import org.apache.dolphinscheduler.common.constants.Constants;
-
-import java.util.Map;
-
 import org.junit.jupiter.api.Assertions;
 import org.junit.jupiter.api.Test;
 
@@ -48,16 +43,6 @@ public class CheckUtilsTest {
         Assertions.assertTrue(CheckUtils.checkEmail("[email protected]"));
     }
 
-    /**
-     * check desc
-     */
-    @Test
-    public void testCheckDesc() {
-        Map<String, Object> objectMap = CheckUtils.checkDesc("I am desc");
-        Status status = (Status) objectMap.get(Constants.STATUS);
-        Assertions.assertEquals(status.getCode(), Status.SUCCESS.getCode());
-    }
-
     @Test
     public void testCheckOtherParams() {
         Assertions.assertFalse(CheckUtils.checkOtherParams(null));
diff --git 
a/dolphinscheduler-dao/src/main/java/org/apache/dolphinscheduler/dao/PluginDao.java
 
b/dolphinscheduler-dao/src/main/java/org/apache/dolphinscheduler/dao/PluginDao.java
index 24cb022881..a9424c6a8e 100644
--- 
a/dolphinscheduler-dao/src/main/java/org/apache/dolphinscheduler/dao/PluginDao.java
+++ 
b/dolphinscheduler-dao/src/main/java/org/apache/dolphinscheduler/dao/PluginDao.java
@@ -88,13 +88,4 @@ public class PluginDao {
         return currPluginDefine.getId();
     }
 
-    /**
-     * query plugin define by id
-     *
-     * @param pluginDefineId plugin define id
-     * @return PluginDefine
-     */
-    public PluginDefine getPluginDefineById(int pluginDefineId) {
-        return pluginDefineMapper.selectById(pluginDefineId);
-    }
 }


Reply via email to