This is an automated email from the ASF dual-hosted git repository.
hanicz pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/knox.git
The following commit(s) were added to refs/heads/master by this push:
new 319f6cac8 KNOX-3223: Suppress cleanup, removed deprecations (#1133)
319f6cac8 is described below
commit 319f6cac8e26528a0fe31eba3084d8d34212aaab
Author: hanicz <[email protected]>
AuthorDate: Wed Dec 17 15:26:27 2025 +0100
KNOX-3223: Suppress cleanup, removed deprecations (#1133)
---
.../hadoop/gateway/shirorealm/KnoxLdapRealmTest.java | 18 +++++++++---------
.../hadoop/gateway/shirorealm/KnoxPamRealmTest.java | 2 +-
.../cm/monitor/PollingConfigurationAnalyzer.java | 1 -
.../common/filter/AbstractIdentityAssertionFilter.java | 6 +-----
.../common/filter/CommonIdentityAssertionFilter.java | 5 +----
.../common/filter/VirtualGroupMapperTest.java | 3 +--
.../groups/filter/HadoopGroupProviderFilterTest.java | 1 -
.../rewrite/impl/UrlRewriteRulesDescriptorImpl.java | 2 --
.../rewrite/spi/UrlRewriteFlowDescriptorBase.java | 1 -
.../HadoopAuthDeploymentContributorTest.java | 5 ++---
.../hadoopauth/filter/HadoopAuthFilterTest.java | 6 ++----
.../federation/jwt/filter/AbstractJWTFilter.java | 2 +-
.../jwt/filter/JWTAccessTokenAssertionFilter.java | 6 ++----
.../jwt/filter/JWTAuthCodeAssertionFilter.java | 6 ++----
.../federation/jwt/filter/JWTFederationFilter.java | 3 +--
.../provider/federation/AbstractJWTFilterTest.java | 6 ++----
.../provider/federation/CommonJWTFilterTest.java | 6 ++----
.../provider/federation/JWTFederationFilterTest.java | 1 -
.../java/org/apache/knox/gateway/GatewayFilter.java | 1 -
.../knox/gateway/deploy/DeploymentException.java | 1 -
gateway-service-knoxtoken/pom.xml | 1 +
.../knox/gateway/service/knoxtoken/TokenResource.java | 6 +-----
.../knox/gateway/shell/commands/SelectCommand.java | 1 -
.../org/apache/knox/test/mock/MockServletContext.java | 5 -----
.../util/NoClassNameMultiLineToStringStyle.java | 1 -
pom.xml | 2 +-
26 files changed, 30 insertions(+), 68 deletions(-)
diff --git
a/gateway-adapter/src/test/java/org/apache/hadoop/gateway/shirorealm/KnoxLdapRealmTest.java
b/gateway-adapter/src/test/java/org/apache/hadoop/gateway/shirorealm/KnoxLdapRealmTest.java
index fbcc96d83..8be53aae4 100644
---
a/gateway-adapter/src/test/java/org/apache/hadoop/gateway/shirorealm/KnoxLdapRealmTest.java
+++
b/gateway-adapter/src/test/java/org/apache/hadoop/gateway/shirorealm/KnoxLdapRealmTest.java
@@ -30,35 +30,35 @@ public class KnoxLdapRealmTest {
public void setGetSearchBase() {
KnoxLdapRealm realm = new KnoxLdapRealm();
realm.setSearchBase("dc=hadoop,dc=apache,dc=org");
- assertEquals(realm.getSearchBase(), "dc=hadoop,dc=apache,dc=org");
+ assertEquals("dc=hadoop,dc=apache,dc=org", realm.getSearchBase());
}
@Test
public void setGetGroupObjectClass() {
KnoxLdapRealm realm = new KnoxLdapRealm();
realm.setGroupObjectClass("groupOfMembers");
- assertEquals(realm.getGroupObjectClass(), "groupOfMembers");
+ assertEquals("groupOfMembers", realm.getGroupObjectClass());
}
@Test
public void setGetUniqueMemberAttribute() {
KnoxLdapRealm realm = new KnoxLdapRealm();
realm.setMemberAttribute("member");
- assertEquals(realm.getMemberAttribute(), "member");
+ assertEquals("member", realm.getMemberAttribute());
}
@Test
public void setGetUserSearchAttributeName() {
KnoxLdapRealm realm = new KnoxLdapRealm();
realm.setUserSearchAttributeName("uid");
- assertEquals(realm.getUserSearchAttributeName(), "uid");
+ assertEquals("uid", realm.getUserSearchAttributeName());
}
@Test
public void setGetUserObjectClass() {
KnoxLdapRealm realm = new KnoxLdapRealm();
realm.setUserObjectClass("inetuser");
- assertEquals(realm.getUserObjectClass(), "inetuser");
+ assertEquals("inetuser", realm.getUserObjectClass());
}
@Test
@@ -74,7 +74,7 @@ public class KnoxLdapRealmTest {
KnoxLdapRealm realm = new KnoxLdapRealm();
realm.setSearchBase("dc=example,dc=com");
realm.setGroupSearchBase("dc=knox,dc=example,dc=com");
- assertEquals(realm.getGroupSearchBase(), "dc=knox,dc=example,dc=com");
+ assertEquals("dc=knox,dc=example,dc=com", realm.getGroupSearchBase());
}
@Test
@@ -86,20 +86,20 @@ public class KnoxLdapRealmTest {
@Test
public void verifyDefaultGetUserObjectClass() {
KnoxLdapRealm realm = new KnoxLdapRealm();
- assertEquals(realm.getUserObjectClass(), "person");
+ assertEquals("person", realm.getUserObjectClass());
}
@Test
public void verifyDefaultUserSearchBase() {
KnoxLdapRealm realm = new KnoxLdapRealm();
realm.setSearchBase("dc=knox,dc=example,dc=com");
- assertEquals(realm.getUserSearchBase(), "dc=knox,dc=example,dc=com");
+ assertEquals("dc=knox,dc=example,dc=com", realm.getUserSearchBase());
}
@Test
public void verifyDefaultGroupSearchBase() {
KnoxLdapRealm realm = new KnoxLdapRealm();
realm.setSearchBase("dc=knox,dc=example,dc=com");
- assertEquals(realm.getGroupSearchBase(), "dc=knox,dc=example,dc=com");
+ assertEquals("dc=knox,dc=example,dc=com", realm.getGroupSearchBase());
}
}
diff --git
a/gateway-adapter/src/test/java/org/apache/hadoop/gateway/shirorealm/KnoxPamRealmTest.java
b/gateway-adapter/src/test/java/org/apache/hadoop/gateway/shirorealm/KnoxPamRealmTest.java
index d87e89dc3..a09953404 100644
---
a/gateway-adapter/src/test/java/org/apache/hadoop/gateway/shirorealm/KnoxPamRealmTest.java
+++
b/gateway-adapter/src/test/java/org/apache/hadoop/gateway/shirorealm/KnoxPamRealmTest.java
@@ -37,7 +37,7 @@ public class KnoxPamRealmTest {
public void setService() {
KnoxPamRealm realm = new KnoxPamRealm();
realm.setService("knox-pam-os-service");
- assertEquals(realm.getService(), "knox-pam-os-service");
+ assertEquals("knox-pam-os-service", realm.getService());
}
@Test
diff --git
a/gateway-discovery-cm/src/main/java/org/apache/knox/gateway/topology/discovery/cm/monitor/PollingConfigurationAnalyzer.java
b/gateway-discovery-cm/src/main/java/org/apache/knox/gateway/topology/discovery/cm/monitor/PollingConfigurationAnalyzer.java
index d7c06b211..727b9cc51 100644
---
a/gateway-discovery-cm/src/main/java/org/apache/knox/gateway/topology/discovery/cm/monitor/PollingConfigurationAnalyzer.java
+++
b/gateway-discovery-cm/src/main/java/org/apache/knox/gateway/topology/discovery/cm/monitor/PollingConfigurationAnalyzer.java
@@ -521,7 +521,6 @@ public class PollingConfigurationAnalyzer implements
Runnable {
return relevantEvents;
}
- @SuppressWarnings("unchecked")
private boolean isStartEvent(ApiEvent event) {
final Map<String, Object> attributeMap =
getAttributeMap(event.getAttributes());
final String command = getAttribute(attributeMap, COMMAND);
diff --git
a/gateway-provider-identity-assertion-common/src/main/java/org/apache/knox/gateway/identityasserter/common/filter/AbstractIdentityAssertionFilter.java
b/gateway-provider-identity-assertion-common/src/main/java/org/apache/knox/gateway/identityasserter/common/filter/AbstractIdentityAssertionFilter.java
index 8acd260fe..b4fafe30e 100644
---
a/gateway-provider-identity-assertion-common/src/main/java/org/apache/knox/gateway/identityasserter/common/filter/AbstractIdentityAssertionFilter.java
+++
b/gateway-provider-identity-assertion-common/src/main/java/org/apache/knox/gateway/identityasserter/common/filter/AbstractIdentityAssertionFilter.java
@@ -18,7 +18,6 @@
package org.apache.knox.gateway.identityasserter.common.filter;
import java.io.IOException;
-import java.security.AccessController;
import java.security.Principal;
import java.security.PrivilegedActionException;
import java.security.PrivilegedExceptionAction;
@@ -52,8 +51,6 @@ import org.apache.knox.gateway.security.ImpersonatedPrincipal;
import org.apache.knox.gateway.security.PrimaryPrincipal;
import org.apache.knox.gateway.security.SubjectUtils;
-import de.thetaphi.forbiddenapis.SuppressForbidden;
-
public abstract class AbstractIdentityAssertionFilter extends
AbstractIdentityAssertionBase implements Filter {
@@ -89,7 +86,6 @@ public abstract class AbstractIdentityAssertionFilter extends
*/
public abstract String mapUserPrincipal(String principalName);
- @SuppressForbidden
protected void continueChainAsPrincipal(HttpServletRequestWrapper request,
ServletResponse response,
FilterChain chain, String mappedPrincipalName, String[] groups) throws
IOException,
ServletException {
@@ -102,7 +98,7 @@ public abstract class AbstractIdentityAssertionFilter extends
boolean groupsMapped;
// look up the current Java Subject and assosciated group principals
- Subject currentSubject =
Subject.getSubject(AccessController.getContext());
+ Subject currentSubject = SubjectUtils.getCurrentSubject();
if (currentSubject == null) {
LOG.subjectNotAvailable();
throw new IllegalStateException("Required Subject Missing");
diff --git
a/gateway-provider-identity-assertion-common/src/main/java/org/apache/knox/gateway/identityasserter/common/filter/CommonIdentityAssertionFilter.java
b/gateway-provider-identity-assertion-common/src/main/java/org/apache/knox/gateway/identityasserter/common/filter/CommonIdentityAssertionFilter.java
index 4792640e4..a9a3d154c 100644
---
a/gateway-provider-identity-assertion-common/src/main/java/org/apache/knox/gateway/identityasserter/common/filter/CommonIdentityAssertionFilter.java
+++
b/gateway-provider-identity-assertion-common/src/main/java/org/apache/knox/gateway/identityasserter/common/filter/CommonIdentityAssertionFilter.java
@@ -23,7 +23,6 @@ import static
org.apache.knox.gateway.identityasserter.common.filter.VirtualGrou
import static org.apache.knox.gateway.util.AuthFilterUtils.PROXYGROUP_PREFIX;
import java.io.IOException;
-import java.security.AccessController;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.Collections;
@@ -45,7 +44,6 @@ import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletRequestWrapper;
import javax.servlet.http.HttpServletResponse;
-import de.thetaphi.forbiddenapis.SuppressForbidden;
import org.apache.commons.lang3.ArrayUtils;
import org.apache.commons.lang3.StringUtils;
import org.apache.knox.gateway.IdentityAsserterMessages;
@@ -222,11 +220,10 @@ public class CommonIdentityAssertionFilter extends
AbstractIdentityAssertionFilt
* to the identity to be asserted as appropriate and create the provider
specific
* assertion token. Add the assertion token to the request.
*/
- @SuppressForbidden
@Override
public void doFilter(ServletRequest request, ServletResponse response,
FilterChain chain)
throws IOException, ServletException {
- Subject subject = Subject.getSubject(AccessController.getContext());
+ Subject subject = SubjectUtils.getCurrentSubject();
if (subject == null) {
LOG.subjectNotAvailable();
diff --git
a/gateway-provider-identity-assertion-common/src/test/java/org/apache/knox/gateway/identityasserter/common/filter/VirtualGroupMapperTest.java
b/gateway-provider-identity-assertion-common/src/test/java/org/apache/knox/gateway/identityasserter/common/filter/VirtualGroupMapperTest.java
index 8227aebe1..d72de073d 100644
---
a/gateway-provider-identity-assertion-common/src/test/java/org/apache/knox/gateway/identityasserter/common/filter/VirtualGroupMapperTest.java
+++
b/gateway-provider-identity-assertion-common/src/test/java/org/apache/knox/gateway/identityasserter/common/filter/VirtualGroupMapperTest.java
@@ -39,7 +39,6 @@ import org.junit.Test;
import javax.servlet.ServletRequest;
import javax.servlet.http.HttpServletRequest;
-@SuppressWarnings("PMD.NonStaticInitializer")
public class VirtualGroupMapperTest {
private Parser parser = new Parser();
private VirtualGroupMapper mapper;
@@ -159,4 +158,4 @@ public class VirtualGroupMapperTest {
private static Set<String> setOf(String... strings) {
return new HashSet<>(Arrays.asList(strings));
}
-}
\ No newline at end of file
+}
diff --git
a/gateway-provider-identity-assertion-hadoop-groups/src/test/java/org/apache/knox/gateway/identityasserter/hadoop/groups/filter/HadoopGroupProviderFilterTest.java
b/gateway-provider-identity-assertion-hadoop-groups/src/test/java/org/apache/knox/gateway/identityasserter/hadoop/groups/filter/HadoopGroupProviderFilterTest.java
index 8e49ad1bb..39848a23e 100644
---
a/gateway-provider-identity-assertion-hadoop-groups/src/test/java/org/apache/knox/gateway/identityasserter/hadoop/groups/filter/HadoopGroupProviderFilterTest.java
+++
b/gateway-provider-identity-assertion-hadoop-groups/src/test/java/org/apache/knox/gateway/identityasserter/hadoop/groups/filter/HadoopGroupProviderFilterTest.java
@@ -142,7 +142,6 @@ public class HadoopGroupProviderFilterTest {
* {@link LdapGroupsMapping} and in case of bad config we get empty groups
* (Hadoop way).
*/
- @SuppressWarnings({ "unchecked", "rawtypes" })
@Test
public void badConfigTest() throws ServletException {
diff --git
a/gateway-provider-rewrite-common/src/main/java/org/apache/knox/gateway/filter/rewrite/impl/UrlRewriteRulesDescriptorImpl.java
b/gateway-provider-rewrite-common/src/main/java/org/apache/knox/gateway/filter/rewrite/impl/UrlRewriteRulesDescriptorImpl.java
index 2d31fbf7e..de1c9f8b3 100644
---
a/gateway-provider-rewrite-common/src/main/java/org/apache/knox/gateway/filter/rewrite/impl/UrlRewriteRulesDescriptorImpl.java
+++
b/gateway-provider-rewrite-common/src/main/java/org/apache/knox/gateway/filter/rewrite/impl/UrlRewriteRulesDescriptorImpl.java
@@ -91,14 +91,12 @@ public class UrlRewriteRulesDescriptorImpl implements
UrlRewriteRulesDescriptor
}
@Override
- @SuppressWarnings("unchecked")
public <T extends UrlRewriteFunctionDescriptor<?>> T addFunction( String
name ) {
T descriptor = newFunction( name );
addFunction( descriptor );
return descriptor;
}
- @SuppressWarnings("unchecked")
protected <T extends UrlRewriteFunctionDescriptor<?>> T newFunction( String
name ) {
return UrlRewriteFunctionDescriptorFactory.create( name );
}
diff --git
a/gateway-provider-rewrite-common/src/main/java/org/apache/knox/gateway/filter/rewrite/spi/UrlRewriteFlowDescriptorBase.java
b/gateway-provider-rewrite-common/src/main/java/org/apache/knox/gateway/filter/rewrite/spi/UrlRewriteFlowDescriptorBase.java
index fd6379819..7aa8c35fa 100644
---
a/gateway-provider-rewrite-common/src/main/java/org/apache/knox/gateway/filter/rewrite/spi/UrlRewriteFlowDescriptorBase.java
+++
b/gateway-provider-rewrite-common/src/main/java/org/apache/knox/gateway/filter/rewrite/spi/UrlRewriteFlowDescriptorBase.java
@@ -105,7 +105,6 @@ public abstract class UrlRewriteFlowDescriptorBase<T>
extends UrlRewriteStepDesc
// return step;
// }
- @SuppressWarnings( "unchecked" )
@Override
public <T extends UrlRewriteStepDescriptor<?>> T addStep( String type ) {
T step = UrlRewriteStepDescriptorFactory.create( type );
diff --git
a/gateway-provider-security-hadoopauth/src/test/java/org/apache/knox/gateway/hadoopauth/HadoopAuthDeploymentContributorTest.java
b/gateway-provider-security-hadoopauth/src/test/java/org/apache/knox/gateway/hadoopauth/HadoopAuthDeploymentContributorTest.java
index 1c6487410..c0abf893f 100644
---
a/gateway-provider-security-hadoopauth/src/test/java/org/apache/knox/gateway/hadoopauth/HadoopAuthDeploymentContributorTest.java
+++
b/gateway-provider-security-hadoopauth/src/test/java/org/apache/knox/gateway/hadoopauth/HadoopAuthDeploymentContributorTest.java
@@ -46,11 +46,10 @@ import static org.junit.Assert.fail;
public class HadoopAuthDeploymentContributorTest {
- @SuppressWarnings("rawtypes")
@Test
public void testServiceLoader() {
- ServiceLoader loader = ServiceLoader.load(
ProviderDeploymentContributor.class );
- Iterator iterator = loader.iterator();
+ ServiceLoader<ProviderDeploymentContributor> loader = ServiceLoader.load(
ProviderDeploymentContributor.class );
+ Iterator<ProviderDeploymentContributor> iterator = loader.iterator();
assertThat( "Service iterator empty.", iterator.hasNext() );
while( iterator.hasNext() ) {
Object object = iterator.next();
diff --git
a/gateway-provider-security-hadoopauth/src/test/java/org/apache/knox/gateway/hadoopauth/filter/HadoopAuthFilterTest.java
b/gateway-provider-security-hadoopauth/src/test/java/org/apache/knox/gateway/hadoopauth/filter/HadoopAuthFilterTest.java
index adc554bb9..352c3c9ef 100644
---
a/gateway-provider-security-hadoopauth/src/test/java/org/apache/knox/gateway/hadoopauth/filter/HadoopAuthFilterTest.java
+++
b/gateway-provider-security-hadoopauth/src/test/java/org/apache/knox/gateway/hadoopauth/filter/HadoopAuthFilterTest.java
@@ -33,13 +33,13 @@ import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertTrue;
-import de.thetaphi.forbiddenapis.SuppressForbidden;
import org.apache.knox.gateway.GatewayFilter;
import org.apache.knox.gateway.config.GatewayConfig;
import org.apache.knox.gateway.context.ContextAttributes;
import
org.apache.knox.gateway.provider.federation.jwt.filter.AbstractJWTFilter;
import
org.apache.knox.gateway.provider.federation.jwt.filter.JWTFederationFilter;
import
org.apache.knox.gateway.provider.federation.jwt.filter.SignatureVerificationCache;
+import org.apache.knox.gateway.security.SubjectUtils;
import org.apache.knox.gateway.services.GatewayServices;
import org.apache.knox.gateway.services.security.AliasService;
import org.apache.knox.gateway.topology.Topology;
@@ -59,7 +59,6 @@ import javax.servlet.WriteListener;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import java.io.IOException;
-import java.security.AccessController;
import java.util.Collections;
import java.util.HashMap;
import java.util.Map;
@@ -548,12 +547,11 @@ public class HadoopAuthFilterTest {
boolean doFilterCalled;
Subject subject;
- @SuppressForbidden
@Override
public void doFilter(ServletRequest request, ServletResponse response)
throws IOException {
doFilterCalled = true;
- subject = Subject.getSubject( AccessController.getContext() );
+ subject = SubjectUtils.getCurrentSubject();
}
}
diff --git
a/gateway-provider-security-jwt/src/main/java/org/apache/knox/gateway/provider/federation/jwt/filter/AbstractJWTFilter.java
b/gateway-provider-security-jwt/src/main/java/org/apache/knox/gateway/provider/federation/jwt/filter/AbstractJWTFilter.java
index b357e10a8..b5eaf69da 100644
---
a/gateway-provider-security-jwt/src/main/java/org/apache/knox/gateway/provider/federation/jwt/filter/AbstractJWTFilter.java
+++
b/gateway-provider-security-jwt/src/main/java/org/apache/knox/gateway/provider/federation/jwt/filter/AbstractJWTFilter.java
@@ -375,11 +375,11 @@ public abstract class AbstractJWTFilter implements Filter
{
return null;
}
+ @SuppressWarnings("rawtypes")
protected Subject createSubjectFromTokenData(final String principal, final
String expectedPrincipalClaimValue) {
String claimValue =
(expectedPrincipalClaimValue != null) ?
expectedPrincipalClaimValue.toLowerCase(Locale.ROOT) : null;
- @SuppressWarnings("rawtypes")
HashSet emptySet = new HashSet();
Set<Principal> principals = new HashSet<>();
Principal p = new PrimaryPrincipal(claimValue != null ? claimValue :
principal);
diff --git
a/gateway-provider-security-jwt/src/main/java/org/apache/knox/gateway/provider/federation/jwt/filter/JWTAccessTokenAssertionFilter.java
b/gateway-provider-security-jwt/src/main/java/org/apache/knox/gateway/provider/federation/jwt/filter/JWTAccessTokenAssertionFilter.java
index 4d6b56a54..073f90d7d 100644
---
a/gateway-provider-security-jwt/src/main/java/org/apache/knox/gateway/provider/federation/jwt/filter/JWTAccessTokenAssertionFilter.java
+++
b/gateway-provider-security-jwt/src/main/java/org/apache/knox/gateway/provider/federation/jwt/filter/JWTAccessTokenAssertionFilter.java
@@ -18,7 +18,6 @@
package org.apache.knox.gateway.provider.federation.jwt.filter;
import java.io.IOException;
-import java.security.AccessController;
import java.text.ParseException;
import java.util.HashMap;
@@ -31,11 +30,11 @@ import javax.servlet.ServletResponse;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
-import de.thetaphi.forbiddenapis.SuppressForbidden;
import org.apache.commons.lang3.StringUtils;
import org.apache.knox.gateway.filter.security.AbstractIdentityAssertionFilter;
import org.apache.knox.gateway.i18n.messages.MessagesFactory;
import org.apache.knox.gateway.provider.federation.jwt.JWTMessages;
+import org.apache.knox.gateway.security.SubjectUtils;
import org.apache.knox.gateway.services.GatewayServices;
import org.apache.knox.gateway.services.ServiceType;
import org.apache.knox.gateway.services.registry.ServiceRegistry;
@@ -78,7 +77,6 @@ public class JWTAccessTokenAssertionFilter extends
AbstractIdentityAssertionFilt
:
filterConfig.getInitParameter(JWTAccessTokenAssertionFilter.ISSUER);
}
- @SuppressForbidden
@Override
public void doFilter(ServletRequest request, ServletResponse response,
FilterChain chain) throws IOException, ServletException {
@@ -111,7 +109,7 @@ public class JWTAccessTokenAssertionFilter extends
AbstractIdentityAssertionFilt
// the JWTFederationFilter - once we get here we can assume that it is
authorized and we just need
// to assert the identity via an access token
- Subject subject = Subject.getSubject(AccessController.getContext());
+ Subject subject = SubjectUtils.getCurrentSubject();
String principalName = getPrincipalName(subject);
principalName = mapper.mapUserPrincipal(principalName);
diff --git
a/gateway-provider-security-jwt/src/main/java/org/apache/knox/gateway/provider/federation/jwt/filter/JWTAuthCodeAssertionFilter.java
b/gateway-provider-security-jwt/src/main/java/org/apache/knox/gateway/provider/federation/jwt/filter/JWTAuthCodeAssertionFilter.java
index 8aed95251..a1591e4cb 100644
---
a/gateway-provider-security-jwt/src/main/java/org/apache/knox/gateway/provider/federation/jwt/filter/JWTAuthCodeAssertionFilter.java
+++
b/gateway-provider-security-jwt/src/main/java/org/apache/knox/gateway/provider/federation/jwt/filter/JWTAuthCodeAssertionFilter.java
@@ -18,7 +18,6 @@
package org.apache.knox.gateway.provider.federation.jwt.filter;
import java.io.IOException;
-import java.security.AccessController;
import java.util.HashMap;
import javax.security.auth.Subject;
@@ -28,9 +27,9 @@ import javax.servlet.ServletException;
import javax.servlet.ServletRequest;
import javax.servlet.ServletResponse;
-import de.thetaphi.forbiddenapis.SuppressForbidden;
import org.apache.commons.lang3.StringUtils;
import org.apache.knox.gateway.filter.security.AbstractIdentityAssertionFilter;
+import org.apache.knox.gateway.security.SubjectUtils;
import org.apache.knox.gateway.services.ServiceType;
import org.apache.knox.gateway.services.GatewayServices;
import org.apache.knox.gateway.services.registry.ServiceRegistry;
@@ -65,11 +64,10 @@ public class JWTAuthCodeAssertionFilter extends
AbstractIdentityAssertionFilter
:
filterConfig.getInitParameter(JWTAccessTokenAssertionFilter.ISSUER);
}
- @SuppressForbidden
@Override
public void doFilter(ServletRequest request, ServletResponse response,
FilterChain chain) throws IOException {
- Subject subject = Subject.getSubject(AccessController.getContext());
+ Subject subject = SubjectUtils.getCurrentSubject();
String principalName = getPrincipalName(subject);
principalName = mapper.mapUserPrincipal(principalName);
JWT authCode;
diff --git
a/gateway-provider-security-jwt/src/main/java/org/apache/knox/gateway/provider/federation/jwt/filter/JWTFederationFilter.java
b/gateway-provider-security-jwt/src/main/java/org/apache/knox/gateway/provider/federation/jwt/filter/JWTFederationFilter.java
index 6e292370d..978e49931 100644
---
a/gateway-provider-security-jwt/src/main/java/org/apache/knox/gateway/provider/federation/jwt/filter/JWTFederationFilter.java
+++
b/gateway-provider-security-jwt/src/main/java/org/apache/knox/gateway/provider/federation/jwt/filter/JWTFederationFilter.java
@@ -438,8 +438,7 @@ public class JWTFederationFilter extends AbstractJWTFilter {
* An exception indicating that cookies are present, but none of them
contain a
* valid JWT.
*/
- @SuppressWarnings("serial")
- private class NoValidCookiesException extends Exception {
+ private static class NoValidCookiesException extends Exception {
NoValidCookiesException() {
super("None of the presented cookies are valid.");
}
diff --git
a/gateway-provider-security-jwt/src/test/java/org/apache/knox/gateway/provider/federation/AbstractJWTFilterTest.java
b/gateway-provider-security-jwt/src/test/java/org/apache/knox/gateway/provider/federation/AbstractJWTFilterTest.java
index dfa55a7d6..84eb5144b 100644
---
a/gateway-provider-security-jwt/src/test/java/org/apache/knox/gateway/provider/federation/AbstractJWTFilterTest.java
+++
b/gateway-provider-security-jwt/src/test/java/org/apache/knox/gateway/provider/federation/AbstractJWTFilterTest.java
@@ -26,13 +26,13 @@ import com.nimbusds.jose.crypto.RSASSASigner;
import com.nimbusds.jose.crypto.RSASSAVerifier;
import com.nimbusds.jwt.JWTClaimsSet;
import com.nimbusds.jwt.SignedJWT;
-import de.thetaphi.forbiddenapis.SuppressForbidden;
import org.apache.commons.codec.binary.Base64;
import org.apache.knox.gateway.config.GatewayConfig;
import
org.apache.knox.gateway.provider.federation.jwt.filter.AbstractJWTFilter;
import
org.apache.knox.gateway.provider.federation.jwt.filter.SSOCookieFederationFilter;
import
org.apache.knox.gateway.provider.federation.jwt.filter.SignatureVerificationCache;
import org.apache.knox.gateway.security.PrimaryPrincipal;
+import org.apache.knox.gateway.security.SubjectUtils;
import org.apache.knox.gateway.services.security.token.JWTokenAttributes;
import org.apache.knox.gateway.services.security.token.JWTokenAuthority;
import org.apache.knox.gateway.services.security.token.TokenServiceException;
@@ -60,7 +60,6 @@ import java.lang.reflect.Field;
import java.net.InetAddress;
import java.net.URI;
import java.nio.charset.StandardCharsets;
-import java.security.AccessController;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.Principal;
@@ -1477,12 +1476,11 @@ public abstract class AbstractJWTFilterTest {
boolean doFilterCalled;
Subject subject;
- @SuppressForbidden
@Override
public void doFilter(ServletRequest request, ServletResponse response) {
doFilterCalled = true;
- subject = Subject.getSubject( AccessController.getContext() );
+ subject = SubjectUtils.getCurrentSubject();
}
public Subject getSubject() {
diff --git
a/gateway-provider-security-jwt/src/test/java/org/apache/knox/gateway/provider/federation/CommonJWTFilterTest.java
b/gateway-provider-security-jwt/src/test/java/org/apache/knox/gateway/provider/federation/CommonJWTFilterTest.java
index d29b8e380..9442a5517 100644
---
a/gateway-provider-security-jwt/src/test/java/org/apache/knox/gateway/provider/federation/CommonJWTFilterTest.java
+++
b/gateway-provider-security-jwt/src/test/java/org/apache/knox/gateway/provider/federation/CommonJWTFilterTest.java
@@ -16,10 +16,10 @@
*/
package org.apache.knox.gateway.provider.federation;
-import de.thetaphi.forbiddenapis.SuppressForbidden;
import org.apache.knox.gateway.config.GatewayConfig;
import
org.apache.knox.gateway.provider.federation.jwt.filter.AbstractJWTFilter;
import
org.apache.knox.gateway.provider.federation.jwt.filter.JWTFederationFilter;
+import org.apache.knox.gateway.security.SubjectUtils;
import org.apache.knox.gateway.services.security.token.TokenStateService;
import org.apache.knox.gateway.services.security.token.TokenUtils;
import org.apache.knox.gateway.services.security.token.UnknownTokenException;
@@ -43,7 +43,6 @@ import java.io.IOException;
import java.lang.reflect.Field;
import java.lang.reflect.InvocationTargetException;
import java.lang.reflect.Method;
-import java.security.AccessController;
import java.util.UUID;
import static org.easymock.EasyMock.anyObject;
@@ -176,12 +175,11 @@ public class CommonJWTFilterTest {
boolean doFilterCalled;
Subject subject;
- @SuppressForbidden
@Override
public void doFilter(ServletRequest request, ServletResponse response)
throws IOException {
doFilterCalled = true;
- subject = Subject.getSubject( AccessController.getContext() );
+ subject = SubjectUtils.getCurrentSubject();
}
}
diff --git
a/gateway-provider-security-jwt/src/test/java/org/apache/knox/gateway/provider/federation/JWTFederationFilterTest.java
b/gateway-provider-security-jwt/src/test/java/org/apache/knox/gateway/provider/federation/JWTFederationFilterTest.java
index 864160b89..6f5ae4903 100644
---
a/gateway-provider-security-jwt/src/test/java/org/apache/knox/gateway/provider/federation/JWTFederationFilterTest.java
+++
b/gateway-provider-security-jwt/src/test/java/org/apache/knox/gateway/provider/federation/JWTFederationFilterTest.java
@@ -41,7 +41,6 @@ import org.junit.Test;
import com.nimbusds.jwt.SignedJWT;
-@SuppressWarnings("PMD.TestClassWithoutTestCases")
public class JWTFederationFilterTest extends AbstractJWTFilterTest {
@Before
diff --git
a/gateway-server/src/main/java/org/apache/knox/gateway/GatewayFilter.java
b/gateway-server/src/main/java/org/apache/knox/gateway/GatewayFilter.java
index 3f7adf880..a46fa8e48 100644
--- a/gateway-server/src/main/java/org/apache/knox/gateway/GatewayFilter.java
+++ b/gateway-server/src/main/java/org/apache/knox/gateway/GatewayFilter.java
@@ -111,7 +111,6 @@ public class GatewayFilter implements Filter {
}
}
- @SuppressWarnings("unchecked")
public void doFilter( ServletRequest servletRequest, ServletResponse
servletResponse ) throws IOException, ServletException {
HttpServletRequest httpRequest = (HttpServletRequest)servletRequest;
HttpServletResponse httpResponse = (HttpServletResponse)servletResponse;
diff --git
a/gateway-server/src/main/java/org/apache/knox/gateway/deploy/DeploymentException.java
b/gateway-server/src/main/java/org/apache/knox/gateway/deploy/DeploymentException.java
index 53ffe44e0..b8d234117 100644
---
a/gateway-server/src/main/java/org/apache/knox/gateway/deploy/DeploymentException.java
+++
b/gateway-server/src/main/java/org/apache/knox/gateway/deploy/DeploymentException.java
@@ -17,7 +17,6 @@
*/
package org.apache.knox.gateway.deploy;
-@SuppressWarnings("serial")
public class DeploymentException extends RuntimeException {
public DeploymentException(String message, Exception e) {
diff --git a/gateway-service-knoxtoken/pom.xml
b/gateway-service-knoxtoken/pom.xml
index f957f9bfc..be10f78b2 100644
--- a/gateway-service-knoxtoken/pom.xml
+++ b/gateway-service-knoxtoken/pom.xml
@@ -108,6 +108,7 @@
<dependency>
<groupId>de.thetaphi</groupId>
<artifactId>forbiddenapis</artifactId>
+ <scope>test</scope>
</dependency>
<dependency>
diff --git
a/gateway-service-knoxtoken/src/main/java/org/apache/knox/gateway/service/knoxtoken/TokenResource.java
b/gateway-service-knoxtoken/src/main/java/org/apache/knox/gateway/service/knoxtoken/TokenResource.java
index b7122706e..082ad1ff8 100644
---
a/gateway-service-knoxtoken/src/main/java/org/apache/knox/gateway/service/knoxtoken/TokenResource.java
+++
b/gateway-service-knoxtoken/src/main/java/org/apache/knox/gateway/service/knoxtoken/TokenResource.java
@@ -18,7 +18,6 @@
package org.apache.knox.gateway.service.knoxtoken;
import java.nio.charset.StandardCharsets;
-import java.security.AccessController;
import java.security.KeyStoreException;
import java.security.cert.Certificate;
import java.security.cert.CertificateEncodingException;
@@ -66,8 +65,6 @@ import com.nimbusds.jose.KeyLengthException;
import com.nimbusds.jose.crypto.MACSigner;
import com.nimbusds.jose.util.ByteUtils;
-import de.thetaphi.forbiddenapis.SuppressForbidden;
-
import org.apache.commons.codec.binary.Base64;
import org.apache.commons.lang3.StringUtils;
import org.apache.knox.gateway.config.GatewayConfig;
@@ -1103,9 +1100,8 @@ public class TokenResource {
return
Boolean.parseBoolean(request.getParameter(KNOX_TOKEN_INCLUDE_GROUPS));
}
- @SuppressForbidden
protected Set<String> groups() {
- Subject subject = Subject.getSubject(AccessController.getContext());
+ Subject subject = SubjectUtils.getCurrentSubject();
Set<String> groups = subject.getPrincipals(GroupPrincipal.class).stream()
.map(GroupPrincipal::getName)
.collect(Collectors.toSet());
diff --git
a/gateway-shell/src/main/java/org/apache/knox/gateway/shell/commands/SelectCommand.java
b/gateway-shell/src/main/java/org/apache/knox/gateway/shell/commands/SelectCommand.java
index da654e84a..6f8ca169d 100644
---
a/gateway-shell/src/main/java/org/apache/knox/gateway/shell/commands/SelectCommand.java
+++
b/gateway-shell/src/main/java/org/apache/knox/gateway/shell/commands/SelectCommand.java
@@ -100,7 +100,6 @@ public class SelectCommand extends
AbstractSQLCommandSupport implements KeyListe
}
String dsName = (String) getVariables().get(KNOXDATASOURCE);
- @SuppressWarnings("unchecked")
Map<String, KnoxDataSource> dataSources = getDataSources();
KnoxDataSource ds = null;
if (dsName == null || dsName.isEmpty()) {
diff --git
a/gateway-test-utils/src/main/java/org/apache/knox/test/mock/MockServletContext.java
b/gateway-test-utils/src/main/java/org/apache/knox/test/mock/MockServletContext.java
index 1f8b216b4..d2937f247 100644
---
a/gateway-test-utils/src/main/java/org/apache/knox/test/mock/MockServletContext.java
+++
b/gateway-test-utils/src/main/java/org/apache/knox/test/mock/MockServletContext.java
@@ -34,7 +34,6 @@ import java.util.Enumeration;
import java.util.EventListener;
import java.util.Map;
import java.util.Set;
-@SuppressWarnings("PMD")
public class MockServletContext implements ServletContext {
@Override
@@ -98,19 +97,16 @@ public class MockServletContext implements ServletContext {
}
@Override
- @SuppressWarnings("deprecation")
public Servlet getServlet( String s ) throws ServletException {
return null;
}
@Override
- @SuppressWarnings("deprecation")
public Enumeration<Servlet> getServlets() {
return null;
}
@Override
- @SuppressWarnings("deprecation")
public Enumeration<String> getServletNames() {
return null;
}
@@ -120,7 +116,6 @@ public class MockServletContext implements ServletContext {
}
@Override
- @SuppressWarnings("deprecation")
public void log( Exception e, String s ) {
}
diff --git
a/gateway-util-common/src/main/java/org/apache/knox/gateway/util/NoClassNameMultiLineToStringStyle.java
b/gateway-util-common/src/main/java/org/apache/knox/gateway/util/NoClassNameMultiLineToStringStyle.java
index dcc56246a..8437213b8 100644
---
a/gateway-util-common/src/main/java/org/apache/knox/gateway/util/NoClassNameMultiLineToStringStyle.java
+++
b/gateway-util-common/src/main/java/org/apache/knox/gateway/util/NoClassNameMultiLineToStringStyle.java
@@ -24,7 +24,6 @@ import org.apache.commons.lang3.builder.ToStringStyle;
* See https://github.com/apache/commons-lang/pull/308 (at the time of this
* class being written the PR is not merged)
*/
-@SuppressWarnings("serial")
public class NoClassNameMultiLineToStringStyle extends ToStringStyle {
public NoClassNameMultiLineToStringStyle() {
diff --git a/pom.xml b/pom.xml
index a6c45fd68..7b5c18c43 100644
--- a/pom.xml
+++ b/pom.xml
@@ -704,7 +704,7 @@
<!-- if the used Java version is too new, don't fail, just
do nothing: -->
<failOnUnsupportedJava>false</failOnUnsupportedJava>
<!-- prevent failing if a module doesn't have all
signature dependencies like commons-io -->
-
<failOnUnresolvableSignatures>false</failOnUnresolvableSignatures>
+
<ignoreSignaturesOfMissingClasses>true</ignoreSignaturesOfMissingClasses>
<bundledSignatures>
<!--
This will automatically choose the right