This is an automated email from the ASF dual-hosted git repository.

krisden pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/knox.git


The following commit(s) were added to refs/heads/master by this push:
     new 3fb0b88  KNOX-1702 - Use Boolean.parseBoolean instead of true.equals
3fb0b88 is described below

commit 3fb0b88e6232e423d746befde3407ba13db4e400
Author: Kevin Risden <[email protected]>
AuthorDate: Thu Dec 20 11:14:09 2018 -0500

    KNOX-1702 - Use Boolean.parseBoolean instead of true.equals
    
    Signed-off-by: Kevin Risden <[email protected]>
---
 .../IdentityAsserterHttpServletRequestWrapper.java |  2 +-
 .../webappsec/deploy/WebAppSecContributor.java     | 12 ++++-----
 .../gateway/config/impl/GatewayConfigImpl.java     | 31 +++++++---------------
 .../java/org/apache/knox/gateway/util/KnoxCLI.java |  2 +-
 .../gateway/service/knoxtoken/TokenResource.java   |  2 +-
 .../knox/gateway/dispatch/DefaultDispatch.java     |  2 +-
 .../gateway/dispatch/DefaultHttpClientFactory.java |  2 +-
 7 files changed, 21 insertions(+), 32 deletions(-)

diff --git 
a/gateway-provider-identity-assertion-common/src/main/java/org/apache/knox/gateway/identityasserter/common/filter/IdentityAsserterHttpServletRequestWrapper.java
 
b/gateway-provider-identity-assertion-common/src/main/java/org/apache/knox/gateway/identityasserter/common/filter/IdentityAsserterHttpServletRequestWrapper.java
index 280dfc7..de844ca 100644
--- 
a/gateway-provider-identity-assertion-common/src/main/java/org/apache/knox/gateway/identityasserter/common/filter/IdentityAsserterHttpServletRequestWrapper.java
+++ 
b/gateway-provider-identity-assertion-common/src/main/java/org/apache/knox/gateway/identityasserter/common/filter/IdentityAsserterHttpServletRequestWrapper.java
@@ -163,7 +163,7 @@ private static SpiGatewayMessages log = 
MessagesFactory.get( SpiGatewayMessages.
       List<String> principalParamNames = getImpersonationParamNames();
       params = scrubOfExistingPrincipalParams(params, principalParamNames);
 
-      if 
("true".equals(System.getProperty(GatewayConfig.HADOOP_KERBEROS_SECURED))) {
+      if 
(Boolean.parseBoolean(System.getProperty(GatewayConfig.HADOOP_KERBEROS_SECURED)))
 {
         params.put(DOAS_PRINCIPAL_PARAM, al);
       } else {
         params.put(PRINCIPAL_PARAM, al);
diff --git 
a/gateway-provider-security-webappsec/src/main/java/org/apache/knox/gateway/webappsec/deploy/WebAppSecContributor.java
 
b/gateway-provider-security-webappsec/src/main/java/org/apache/knox/gateway/webappsec/deploy/WebAppSecContributor.java
index f01688e..8633c15 100644
--- 
a/gateway-provider-security-webappsec/src/main/java/org/apache/knox/gateway/webappsec/deploy/WebAppSecContributor.java
+++ 
b/gateway-provider-security-webappsec/src/main/java/org/apache/knox/gateway/webappsec/deploy/WebAppSecContributor.java
@@ -85,7 +85,7 @@ public class WebAppSecContributor extends 
ProviderDeploymentContributorBase {
       Map<String, String> providerParams = provider.getParams();
       // CORS support
       String corsEnabled = map.get(CORS_ENABLED);
-      if (corsEnabled != null && "true".equals(corsEnabled)) {
+      if (Boolean.parseBoolean(corsEnabled)) {
         provisionConfig(resource, providerParams, params, "cors.");
         resource.addFilter().name(getName() + CORS_SUFFIX)
                             .role(getRole())
@@ -96,7 +96,7 @@ public class WebAppSecContributor extends 
ProviderDeploymentContributorBase {
       // CRSF
       params = new ArrayList<>();
       String csrfEnabled = map.get(CSRF_ENABLED);
-      if (csrfEnabled != null && "true".equals(csrfEnabled)) {
+      if (Boolean.parseBoolean(csrfEnabled)) {
         provisionConfig(resource, providerParams, params, "csrf.");
         resource.addFilter().name(getName() + CSRF_SUFFIX)
                             .role(getRole())
@@ -107,7 +107,7 @@ public class WebAppSecContributor extends 
ProviderDeploymentContributorBase {
       // X-Frame-Options - clickjacking protection
       params = new ArrayList<>();
       String xframeOptionsEnabled = map.get(XFRAME_OPTIONS_ENABLED);
-      if (xframeOptionsEnabled != null && "true".equals(xframeOptionsEnabled)) 
{
+      if (Boolean.parseBoolean(xframeOptionsEnabled)) {
         provisionConfig(resource, providerParams, params, "xframe.");
         resource.addFilter().name(getName() + XFRAME_OPTIONS_SUFFIX)
                             .role(getRole())
@@ -118,7 +118,7 @@ public class WebAppSecContributor extends 
ProviderDeploymentContributorBase {
       // X-Content-Type-Options - MIME type sniffing protection
       params = new ArrayList<>();
       String xContentTypeOptionsEnabled = 
map.get(XCONTENT_TYPE_OPTIONS_ENABLED);
-      if (xContentTypeOptionsEnabled != null && 
"true".equals(xContentTypeOptionsEnabled)) {
+      if (Boolean.parseBoolean(xContentTypeOptionsEnabled)) {
         provisionConfig(resource, providerParams, params, "xcontent-type.");
         resource.addFilter().name(getName() + XCONTENT_TYPE_OPTIONS_SUFFIX)
                             .role(getRole())
@@ -129,7 +129,7 @@ public class WebAppSecContributor extends 
ProviderDeploymentContributorBase {
       // X-XSS-Protection - browser xss protection
       params = new ArrayList<>();
       String xssProtectionEnabled = map.get(XSS_PROTECTION_ENABLED);
-      if (xssProtectionEnabled != null && "true".equals(xssProtectionEnabled)) 
{
+      if (Boolean.parseBoolean(xssProtectionEnabled)) {
         provisionConfig(resource, providerParams, params, "xss.");
         resource.addFilter().name(getName() + XSS_PROTECTION_SUFFIX)
                             .role(getRole())
@@ -140,7 +140,7 @@ public class WebAppSecContributor extends 
ProviderDeploymentContributorBase {
       // HTTP Strict-Transport-Security
       params = new ArrayList<>();
       String strictTranportEnabled = map.get(STRICT_TRANSPORT_ENABLED);
-      if (strictTranportEnabled != null && 
"true".equals(strictTranportEnabled)) {
+      if (Boolean.parseBoolean(strictTranportEnabled)) {
         provisionConfig(resource, providerParams, params, "strict.");
         resource.addFilter().name(getName() + STRICT_TRANSPORT_SUFFIX)
                             .role(getRole())
diff --git 
a/gateway-server/src/main/java/org/apache/knox/gateway/config/impl/GatewayConfigImpl.java
 
b/gateway-server/src/main/java/org/apache/knox/gateway/config/impl/GatewayConfigImpl.java
index 6273015..35f872a 100644
--- 
a/gateway-server/src/main/java/org/apache/knox/gateway/config/impl/GatewayConfigImpl.java
+++ 
b/gateway-server/src/main/java/org/apache/knox/gateway/config/impl/GatewayConfigImpl.java
@@ -442,15 +442,12 @@ public class GatewayConfigImpl extends Configuration 
implements GatewayConfig {
 
   @Override
   public boolean isSSLEnabled() {
-    String enabled = get( SSL_ENABLED, "true" );
-
-    return "true".equals(enabled);
+    return Boolean.parseBoolean(get( SSL_ENABLED, "true" ));
   }
 
   @Override
   public boolean isHadoopKerberosSecured() {
-    String hadoopKerberosSecured = get( HADOOP_KERBEROS_SECURED, "false" );
-    return "true".equals(hadoopKerberosSecured);
+    return Boolean.parseBoolean(get( HADOOP_KERBEROS_SECURED, "false" ));
   }
 
   @Override
@@ -460,8 +457,7 @@ public class GatewayConfigImpl extends Configuration 
implements GatewayConfig {
 
   @Override
   public boolean isKerberosDebugEnabled() {
-    String kerberosDebugEnabled = get( KRB5_DEBUG, "false" );
-    return "true".equals(kerberosDebugEnabled);
+    return Boolean.parseBoolean(get( KRB5_DEBUG, "false" ));
   }
 
   @Override
@@ -522,14 +518,12 @@ public class GatewayConfigImpl extends Configuration 
implements GatewayConfig {
 
   @Override
   public boolean isClientAuthNeeded() {
-    String clientAuthNeeded = get( CLIENT_AUTH_NEEDED, "false" );
-    return "true".equals(clientAuthNeeded);
+    return Boolean.parseBoolean(get( CLIENT_AUTH_NEEDED, "false" ));
   }
 
   @Override
   public boolean isClientAuthWanted() {
-    String clientAuthWanted = get( CLIENT_AUTH_WANTED, "false" );
-    return "true".equals(clientAuthWanted);
+    return Boolean.parseBoolean(get( CLIENT_AUTH_WANTED, "false" ));
   }
 
   @Override
@@ -539,8 +533,7 @@ public class GatewayConfigImpl extends Configuration 
implements GatewayConfig {
 
   @Override
   public boolean getTrustAllCerts() {
-    String trustAllCerts = get( TRUST_ALL_CERTS, "false" );
-    return "true".equals(trustAllCerts);
+    return Boolean.parseBoolean(get( TRUST_ALL_CERTS, "false" ));
   }
 
   @Override
@@ -555,8 +548,7 @@ public class GatewayConfigImpl extends Configuration 
implements GatewayConfig {
 
   @Override
   public boolean isXForwardedEnabled() {
-    String xForwardedEnabled = get( XFORWARDED_ENABLED, "true" );
-    return "true".equals(xForwardedEnabled);
+    return Boolean.parseBoolean(get( XFORWARDED_ENABLED, "true" ));
   }
 
   @Override
@@ -679,20 +671,17 @@ public class GatewayConfigImpl extends Configuration 
implements GatewayConfig {
 
   @Override
   public boolean isMetricsEnabled() {
-    String metricsEnabled = get( METRICS_ENABLED, "false" );
-    return "true".equals(metricsEnabled);
+    return Boolean.parseBoolean(get( METRICS_ENABLED, "false" ));
   }
 
   @Override
   public boolean isJmxMetricsReportingEnabled() {
-    String enabled = get( JMX_METRICS_REPORTING_ENABLED, "false" );
-    return "true".equals(enabled);
+    return Boolean.parseBoolean(get( JMX_METRICS_REPORTING_ENABLED, "false" ));
   }
 
   @Override
   public boolean isGraphiteMetricsReportingEnabled() {
-    String enabled = get( GRAPHITE_METRICS_REPORTING_ENABLED, "false" );
-    return "true".equals(enabled);
+    return Boolean.parseBoolean(get( GRAPHITE_METRICS_REPORTING_ENABLED, 
"false" ));
   }
 
   @Override
diff --git 
a/gateway-server/src/main/java/org/apache/knox/gateway/util/KnoxCLI.java 
b/gateway-server/src/main/java/org/apache/knox/gateway/util/KnoxCLI.java
index 8987db9..309f0ed 100644
--- a/gateway-server/src/main/java/org/apache/knox/gateway/util/KnoxCLI.java
+++ b/gateway-server/src/main/java/org/apache/knox/gateway/util/KnoxCLI.java
@@ -721,7 +721,7 @@ public class KnoxCLI extends Configured implements Tool {
        out.println(name + " has been successfully created.");
      }
      else {
-       if ("true".equals(generate)) {
+       if (Boolean.parseBoolean(generate)) {
          as.generateAliasForCluster(cluster, name);
          out.println(name + " has been successfully generated.");
        }
diff --git 
a/gateway-service-knoxtoken/src/main/java/org/apache/knox/gateway/service/knoxtoken/TokenResource.java
 
b/gateway-service-knoxtoken/src/main/java/org/apache/knox/gateway/service/knoxtoken/TokenResource.java
index 307b739..526f7d9 100644
--- 
a/gateway-service-knoxtoken/src/main/java/org/apache/knox/gateway/service/knoxtoken/TokenResource.java
+++ 
b/gateway-service-knoxtoken/src/main/java/org/apache/knox/gateway/service/knoxtoken/TokenResource.java
@@ -86,7 +86,7 @@ public class TokenResource {
     }
 
     String clientCert = context.getInitParameter(TOKEN_CLIENT_CERT_REQUIRED);
-    clientCertRequired = "true".equals(clientCert);
+    clientCertRequired = Boolean.parseBoolean(clientCert);
 
     String principals = context.getInitParameter(TOKEN_ALLOWED_PRINCIPALS);
     if (principals != null) {
diff --git 
a/gateway-spi/src/main/java/org/apache/knox/gateway/dispatch/DefaultDispatch.java
 
b/gateway-spi/src/main/java/org/apache/knox/gateway/dispatch/DefaultDispatch.java
index 6eaccc8..8b899b9 100644
--- 
a/gateway-spi/src/main/java/org/apache/knox/gateway/dispatch/DefaultDispatch.java
+++ 
b/gateway-spi/src/main/java/org/apache/knox/gateway/dispatch/DefaultDispatch.java
@@ -121,7 +121,7 @@ public class DefaultDispatch extends 
AbstractGatewayDispatch {
 
     try {
       auditor.audit( Action.DISPATCH, outboundRequest.getURI().toString(), 
ResourceType.URI, ActionOutcome.UNAVAILABLE, RES.requestMethod( 
outboundRequest.getMethod() ) );
-      if( !"true".equals( System.getProperty( 
GatewayConfig.HADOOP_KERBEROS_SECURED ) ) ) {
+      if( 
!Boolean.parseBoolean(System.getProperty(GatewayConfig.HADOOP_KERBEROS_SECURED)))
 {
         // Hadoop cluster not Kerberos enabled
         addCredentialsToRequest( outboundRequest );
       }
diff --git 
a/gateway-spi/src/main/java/org/apache/knox/gateway/dispatch/DefaultHttpClientFactory.java
 
b/gateway-spi/src/main/java/org/apache/knox/gateway/dispatch/DefaultHttpClientFactory.java
index a50bd49..2b38171 100644
--- 
a/gateway-spi/src/main/java/org/apache/knox/gateway/dispatch/DefaultHttpClientFactory.java
+++ 
b/gateway-spi/src/main/java/org/apache/knox/gateway/dispatch/DefaultHttpClientFactory.java
@@ -105,7 +105,7 @@ public class DefaultHttpClientFactory implements 
HttpClientFactory {
       }
       builder.setSSLSocketFactory(new SSLConnectionSocketFactory(sslcontext));
     }
-    if ( 
"true".equals(System.getProperty(GatewayConfig.HADOOP_KERBEROS_SECURED)) ) {
+    if 
(Boolean.parseBoolean(System.getProperty(GatewayConfig.HADOOP_KERBEROS_SECURED)))
 {
       CredentialsProvider credentialsProvider = new BasicCredentialsProvider();
       credentialsProvider.setCredentials(AuthScope.ANY, new 
UseJaasCredentials());
 

Reply via email to