This is an automated email from the ASF dual-hosted git repository.

zhangliang pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/shardingsphere.git


The following commit(s) were added to refs/heads/master by this push:
     new bcbc9adcbb5 Rename DialectDatabasePrivilegeChecker (#32587)
bcbc9adcbb5 is described below

commit bcbc9adcbb56079d51e93e9c888487a1973542a1
Author: Liang Zhang <[email protected]>
AuthorDate: Sun Aug 18 18:19:40 2024 +0800

    Rename DialectDatabasePrivilegeChecker (#32587)
---
 .../validator/DataSourcePoolPropertiesValidator.java   |  6 +++---
 ...ecker.java => DialectDatabasePrivilegeChecker.java} |  6 +++---
 ...entChecker.java => H2DatabasePrivilegeChecker.java} |  6 +++---
 ...abase.core.checker.DialectDatabasePrivilegeChecker} |  2 +-
 ...Checker.java => MySQLDatabasePrivilegeChecker.java} |  6 +++---
 ...abase.core.checker.DialectDatabasePrivilegeChecker} |  2 +-
 .../checker/MySQLDatabaseEnvironmentCheckerTest.java   | 18 +++++++++---------
 ...ker.java => OpenGaussDatabasePrivilegeChecker.java} |  6 +++---
 ...abase.core.checker.DialectDatabasePrivilegeChecker} |  2 +-
 ...er.java => PostgreSQLDatabasePrivilegeChecker.java} |  6 +++---
 ...abase.core.checker.DialectDatabasePrivilegeChecker} |  2 +-
 .../PostgreSQLDatabaseEnvironmentCheckerTest.java      | 12 ++++++------
 .../core/checker/PipelineDataSourceCheckEngine.java    | 10 +++++-----
 .../xa/XAShardingSphereTransactionManager.java         |  6 +++---
 14 files changed, 45 insertions(+), 45 deletions(-)

diff --git 
a/infra/data-source-pool/core/src/main/java/org/apache/shardingsphere/infra/datasource/pool/props/validator/DataSourcePoolPropertiesValidator.java
 
b/infra/data-source-pool/core/src/main/java/org/apache/shardingsphere/infra/datasource/pool/props/validator/DataSourcePoolPropertiesValidator.java
index c2ae0a408fc..ad50c1fbe0e 100644
--- 
a/infra/data-source-pool/core/src/main/java/org/apache/shardingsphere/infra/datasource/pool/props/validator/DataSourcePoolPropertiesValidator.java
+++ 
b/infra/data-source-pool/core/src/main/java/org/apache/shardingsphere/infra/datasource/pool/props/validator/DataSourcePoolPropertiesValidator.java
@@ -19,7 +19,7 @@ package 
org.apache.shardingsphere.infra.datasource.pool.props.validator;
 
 import lombok.AccessLevel;
 import lombok.NoArgsConstructor;
-import 
org.apache.shardingsphere.infra.database.core.checker.DialectDatabaseEnvironmentChecker;
+import 
org.apache.shardingsphere.infra.database.core.checker.DialectDatabasePrivilegeChecker;
 import 
org.apache.shardingsphere.infra.database.core.checker.PrivilegeCheckType;
 import 
org.apache.shardingsphere.infra.database.core.spi.DatabaseTypedSPILoader;
 import org.apache.shardingsphere.infra.database.core.type.DatabaseType;
@@ -103,10 +103,10 @@ public final class DataSourcePoolPropertiesValidator {
     
     private static void checkPrivileges(final DataSource dataSource, final 
DataSourcePoolProperties props, final Collection<PrivilegeCheckType> 
expectedPrivileges) {
         DatabaseType databaseType = DatabaseTypeFactory.get((String) 
props.getConnectionPropertySynonyms().getStandardProperties().get("url"));
-        Optional<DialectDatabaseEnvironmentChecker> checker = 
DatabaseTypedSPILoader.findService(DialectDatabaseEnvironmentChecker.class, 
databaseType);
+        Optional<DialectDatabasePrivilegeChecker> checker = 
DatabaseTypedSPILoader.findService(DialectDatabasePrivilegeChecker.class, 
databaseType);
         if (checker.isPresent()) {
             for (PrivilegeCheckType each : expectedPrivileges) {
-                checker.get().checkPrivilege(dataSource, each);
+                checker.get().check(dataSource, each);
             }
         }
     }
diff --git 
a/infra/database/core/src/main/java/org/apache/shardingsphere/infra/database/core/checker/DialectDatabaseEnvironmentChecker.java
 
b/infra/database/core/src/main/java/org/apache/shardingsphere/infra/database/core/checker/DialectDatabasePrivilegeChecker.java
similarity index 85%
rename from 
infra/database/core/src/main/java/org/apache/shardingsphere/infra/database/core/checker/DialectDatabaseEnvironmentChecker.java
rename to 
infra/database/core/src/main/java/org/apache/shardingsphere/infra/database/core/checker/DialectDatabasePrivilegeChecker.java
index 84cc9724e19..b9b37719a5d 100644
--- 
a/infra/database/core/src/main/java/org/apache/shardingsphere/infra/database/core/checker/DialectDatabaseEnvironmentChecker.java
+++ 
b/infra/database/core/src/main/java/org/apache/shardingsphere/infra/database/core/checker/DialectDatabasePrivilegeChecker.java
@@ -23,10 +23,10 @@ import 
org.apache.shardingsphere.infra.spi.annotation.SingletonSPI;
 import javax.sql.DataSource;
 
 /**
- * Dialect database environment checker.
+ * Dialect database privilege checker.
  */
 @SingletonSPI
-public interface DialectDatabaseEnvironmentChecker extends DatabaseTypedSPI {
+public interface DialectDatabasePrivilegeChecker extends DatabaseTypedSPI {
     
     /**
      * Check user privileges.
@@ -34,5 +34,5 @@ public interface DialectDatabaseEnvironmentChecker extends 
DatabaseTypedSPI {
      * @param dataSource data source to be checked
      * @param privilegeCheckType privilege check type
      */
-    void checkPrivilege(DataSource dataSource, PrivilegeCheckType 
privilegeCheckType);
+    void check(DataSource dataSource, PrivilegeCheckType privilegeCheckType);
 }
diff --git 
a/infra/database/type/h2/src/main/java/org/apache/shardingsphere/infra/database/h2/checker/H2DatabaseEnvironmentChecker.java
 
b/infra/database/type/h2/src/main/java/org/apache/shardingsphere/infra/database/h2/checker/H2DatabasePrivilegeChecker.java
similarity index 83%
rename from 
infra/database/type/h2/src/main/java/org/apache/shardingsphere/infra/database/h2/checker/H2DatabaseEnvironmentChecker.java
rename to 
infra/database/type/h2/src/main/java/org/apache/shardingsphere/infra/database/h2/checker/H2DatabasePrivilegeChecker.java
index 7094b726745..8484211dfee 100644
--- 
a/infra/database/type/h2/src/main/java/org/apache/shardingsphere/infra/database/h2/checker/H2DatabaseEnvironmentChecker.java
+++ 
b/infra/database/type/h2/src/main/java/org/apache/shardingsphere/infra/database/h2/checker/H2DatabasePrivilegeChecker.java
@@ -17,7 +17,7 @@
 
 package org.apache.shardingsphere.infra.database.h2.checker;
 
-import 
org.apache.shardingsphere.infra.database.core.checker.DialectDatabaseEnvironmentChecker;
+import 
org.apache.shardingsphere.infra.database.core.checker.DialectDatabasePrivilegeChecker;
 import 
org.apache.shardingsphere.infra.database.core.checker.PrivilegeCheckType;
 
 import javax.sql.DataSource;
@@ -25,10 +25,10 @@ import javax.sql.DataSource;
 /**
  * Database environment checker for H2.
  */
-public final class H2DatabaseEnvironmentChecker implements 
DialectDatabaseEnvironmentChecker {
+public final class H2DatabasePrivilegeChecker implements 
DialectDatabasePrivilegeChecker {
     
     @Override
-    public void checkPrivilege(final DataSource dataSource, final 
PrivilegeCheckType privilegeCheckType) {
+    public void check(final DataSource dataSource, final PrivilegeCheckType 
privilegeCheckType) {
     }
     
     @Override
diff --git 
a/infra/database/type/h2/src/main/resources/META-INF/services/org.apache.shardingsphere.infra.database.core.checker.DialectDatabaseEnvironmentChecker
 
b/infra/database/type/h2/src/main/resources/META-INF/services/org.apache.shardingsphere.infra.database.core.checker.DialectDatabasePrivilegeChecker
similarity index 90%
rename from 
infra/database/type/h2/src/main/resources/META-INF/services/org.apache.shardingsphere.infra.database.core.checker.DialectDatabaseEnvironmentChecker
rename to 
infra/database/type/h2/src/main/resources/META-INF/services/org.apache.shardingsphere.infra.database.core.checker.DialectDatabasePrivilegeChecker
index c405f0ce24d..7438709b5eb 100644
--- 
a/infra/database/type/h2/src/main/resources/META-INF/services/org.apache.shardingsphere.infra.database.core.checker.DialectDatabaseEnvironmentChecker
+++ 
b/infra/database/type/h2/src/main/resources/META-INF/services/org.apache.shardingsphere.infra.database.core.checker.DialectDatabasePrivilegeChecker
@@ -15,4 +15,4 @@
 # limitations under the License.
 #
 
-org.apache.shardingsphere.infra.database.h2.checker.H2DatabaseEnvironmentChecker
+org.apache.shardingsphere.infra.database.h2.checker.H2DatabasePrivilegeChecker
diff --git 
a/infra/database/type/mysql/src/main/java/org/apache/shardingsphere/infra/database/mysql/checker/MySQLDatabaseEnvironmentChecker.java
 
b/infra/database/type/mysql/src/main/java/org/apache/shardingsphere/infra/database/mysql/checker/MySQLDatabasePrivilegeChecker.java
similarity index 95%
rename from 
infra/database/type/mysql/src/main/java/org/apache/shardingsphere/infra/database/mysql/checker/MySQLDatabaseEnvironmentChecker.java
rename to 
infra/database/type/mysql/src/main/java/org/apache/shardingsphere/infra/database/mysql/checker/MySQLDatabasePrivilegeChecker.java
index 358071b6a3d..61a2614637a 100644
--- 
a/infra/database/type/mysql/src/main/java/org/apache/shardingsphere/infra/database/mysql/checker/MySQLDatabaseEnvironmentChecker.java
+++ 
b/infra/database/type/mysql/src/main/java/org/apache/shardingsphere/infra/database/mysql/checker/MySQLDatabasePrivilegeChecker.java
@@ -17,7 +17,7 @@
 
 package org.apache.shardingsphere.infra.database.mysql.checker;
 
-import 
org.apache.shardingsphere.infra.database.core.checker.DialectDatabaseEnvironmentChecker;
+import 
org.apache.shardingsphere.infra.database.core.checker.DialectDatabasePrivilegeChecker;
 import 
org.apache.shardingsphere.infra.database.core.checker.PrivilegeCheckType;
 import 
org.apache.shardingsphere.infra.database.core.exception.CheckDatabaseEnvironmentFailedException;
 import 
org.apache.shardingsphere.infra.database.core.exception.MissingRequiredPrivilegeException;
@@ -36,7 +36,7 @@ import java.util.Map;
 /**
  * Database environment checker for MySQL.
  */
-public final class MySQLDatabaseEnvironmentChecker implements 
DialectDatabaseEnvironmentChecker {
+public final class MySQLDatabasePrivilegeChecker implements 
DialectDatabasePrivilegeChecker {
     
     private static final String SHOW_GRANTS_SQL = "SHOW GRANTS";
     
@@ -57,7 +57,7 @@ public final class MySQLDatabaseEnvironmentChecker implements 
DialectDatabaseEnv
     }
     
     @Override
-    public void checkPrivilege(final DataSource dataSource, final 
PrivilegeCheckType privilegeCheckType) {
+    public void check(final DataSource dataSource, final PrivilegeCheckType 
privilegeCheckType) {
         try (Connection connection = dataSource.getConnection()) {
             if (PrivilegeCheckType.XA == privilegeCheckType && 
MYSQL_MAJOR_VERSION_8 != connection.getMetaData().getDatabaseMajorVersion()) {
                 return;
diff --git 
a/infra/database/type/mysql/src/main/resources/META-INF/services/org.apache.shardingsphere.infra.database.core.checker.DialectDatabaseEnvironmentChecker
 
b/infra/database/type/mysql/src/main/resources/META-INF/services/org.apache.shardingsphere.infra.database.core.checker.DialectDatabasePrivilegeChecker
similarity index 97%
rename from 
infra/database/type/mysql/src/main/resources/META-INF/services/org.apache.shardingsphere.infra.database.core.checker.DialectDatabaseEnvironmentChecker
rename to 
infra/database/type/mysql/src/main/resources/META-INF/services/org.apache.shardingsphere.infra.database.core.checker.DialectDatabasePrivilegeChecker
index 631900c3ccc..076b8c0bd05 100644
--- 
a/infra/database/type/mysql/src/main/resources/META-INF/services/org.apache.shardingsphere.infra.database.core.checker.DialectDatabaseEnvironmentChecker
+++ 
b/infra/database/type/mysql/src/main/resources/META-INF/services/org.apache.shardingsphere.infra.database.core.checker.DialectDatabasePrivilegeChecker
@@ -15,4 +15,4 @@
 # limitations under the License.
 #
 
-org.apache.shardingsphere.infra.database.mysql.checker.MySQLDatabaseEnvironmentChecker
+org.apache.shardingsphere.infra.database.mysql.checker.MySQLDatabasePrivilegeChecker
diff --git 
a/infra/database/type/mysql/src/test/java/org/apache/shardingsphere/infra/database/mysql/checker/MySQLDatabaseEnvironmentCheckerTest.java
 
b/infra/database/type/mysql/src/test/java/org/apache/shardingsphere/infra/database/mysql/checker/MySQLDatabaseEnvironmentCheckerTest.java
index 2d96978e2e5..e12cd01417e 100644
--- 
a/infra/database/type/mysql/src/test/java/org/apache/shardingsphere/infra/database/mysql/checker/MySQLDatabaseEnvironmentCheckerTest.java
+++ 
b/infra/database/type/mysql/src/test/java/org/apache/shardingsphere/infra/database/mysql/checker/MySQLDatabaseEnvironmentCheckerTest.java
@@ -60,7 +60,7 @@ class MySQLDatabaseEnvironmentCheckerTest {
         when(preparedStatement.executeQuery()).thenReturn(resultSet);
         when(resultSet.next()).thenReturn(true);
         when(resultSet.getString(1)).thenReturn("GRANT REPLICATION SLAVE, 
REPLICATION CLIENT ON *.* TO '%'@'%'");
-        new MySQLDatabaseEnvironmentChecker().checkPrivilege(dataSource, 
PrivilegeCheckType.PIPELINE);
+        new MySQLDatabasePrivilegeChecker().check(dataSource, 
PrivilegeCheckType.PIPELINE);
         verify(preparedStatement).executeQuery();
     }
     
@@ -69,21 +69,21 @@ class MySQLDatabaseEnvironmentCheckerTest {
         when(preparedStatement.executeQuery()).thenReturn(resultSet);
         when(resultSet.next()).thenReturn(true);
         when(resultSet.getString(1)).thenReturn("GRANT ALL PRIVILEGES CLIENT 
ON *.* TO '%'@'%'");
-        new MySQLDatabaseEnvironmentChecker().checkPrivilege(dataSource, 
PrivilegeCheckType.PIPELINE);
+        new MySQLDatabasePrivilegeChecker().check(dataSource, 
PrivilegeCheckType.PIPELINE);
         verify(preparedStatement).executeQuery();
     }
     
     @Test
     void assertCheckPrivilegeLackPrivileges() throws SQLException {
         when(preparedStatement.executeQuery()).thenReturn(resultSet);
-        assertThrows(MissingRequiredPrivilegeException.class, () -> new 
MySQLDatabaseEnvironmentChecker().checkPrivilege(dataSource, 
PrivilegeCheckType.PIPELINE));
+        assertThrows(MissingRequiredPrivilegeException.class, () -> new 
MySQLDatabasePrivilegeChecker().check(dataSource, PrivilegeCheckType.PIPELINE));
     }
     
     @Test
     void assertCheckPrivilegeFailure() throws SQLException {
         when(preparedStatement.executeQuery()).thenReturn(resultSet);
         when(resultSet.next()).thenThrow(new SQLException(""));
-        assertThrows(CheckDatabaseEnvironmentFailedException.class, () -> new 
MySQLDatabaseEnvironmentChecker().checkPrivilege(dataSource, 
PrivilegeCheckType.PIPELINE));
+        assertThrows(CheckDatabaseEnvironmentFailedException.class, () -> new 
MySQLDatabasePrivilegeChecker().check(dataSource, PrivilegeCheckType.PIPELINE));
     }
     
     @Test
@@ -92,14 +92,14 @@ class MySQLDatabaseEnvironmentCheckerTest {
         
when(dataSource.getConnection().getMetaData().getDatabaseMajorVersion()).thenReturn(8);
         when(resultSet.next()).thenReturn(true);
         when(resultSet.getString(1)).thenReturn("GRANT XA_RECOVER_ADMIN ON *.* 
TO '%'@'%'");
-        new MySQLDatabaseEnvironmentChecker().checkPrivilege(dataSource, 
PrivilegeCheckType.XA);
+        new MySQLDatabasePrivilegeChecker().check(dataSource, 
PrivilegeCheckType.XA);
         verify(preparedStatement).executeQuery();
     }
     
     @Test
     void assertUnCheckXAPrivilegeInMySQL5() throws SQLException {
         
when(dataSource.getConnection().getMetaData().getDatabaseMajorVersion()).thenReturn(5);
-        new MySQLDatabaseEnvironmentChecker().checkPrivilege(dataSource, 
PrivilegeCheckType.XA);
+        new MySQLDatabasePrivilegeChecker().check(dataSource, 
PrivilegeCheckType.XA);
         verify(preparedStatement, times(0)).executeQuery();
     }
     
@@ -109,7 +109,7 @@ class MySQLDatabaseEnvironmentCheckerTest {
         
when(dataSource.getConnection().getMetaData().getDatabaseMajorVersion()).thenReturn(8);
         when(resultSet.next()).thenReturn(true);
         when(resultSet.getString(1)).thenReturn("GRANT ALL PRIVILEGES ON *.* 
TO '%'@'%'");
-        new MySQLDatabaseEnvironmentChecker().checkPrivilege(dataSource, 
PrivilegeCheckType.XA);
+        new MySQLDatabasePrivilegeChecker().check(dataSource, 
PrivilegeCheckType.XA);
         verify(preparedStatement).executeQuery();
     }
     
@@ -117,7 +117,7 @@ class MySQLDatabaseEnvironmentCheckerTest {
     void assertCheckXAPrivilegeLackPrivilegesInMySQL8() throws SQLException {
         when(preparedStatement.executeQuery()).thenReturn(resultSet);
         
when(dataSource.getConnection().getMetaData().getDatabaseMajorVersion()).thenReturn(8);
-        assertThrows(MissingRequiredPrivilegeException.class, () -> new 
MySQLDatabaseEnvironmentChecker().checkPrivilege(dataSource, 
PrivilegeCheckType.XA));
+        assertThrows(MissingRequiredPrivilegeException.class, () -> new 
MySQLDatabasePrivilegeChecker().check(dataSource, PrivilegeCheckType.XA));
     }
     
     @Test
@@ -125,6 +125,6 @@ class MySQLDatabaseEnvironmentCheckerTest {
         when(preparedStatement.executeQuery()).thenReturn(resultSet);
         
when(dataSource.getConnection().getMetaData().getDatabaseMajorVersion()).thenReturn(8);
         when(resultSet.next()).thenThrow(new SQLException(""));
-        assertThrows(CheckDatabaseEnvironmentFailedException.class, () -> new 
MySQLDatabaseEnvironmentChecker().checkPrivilege(dataSource, 
PrivilegeCheckType.XA));
+        assertThrows(CheckDatabaseEnvironmentFailedException.class, () -> new 
MySQLDatabasePrivilegeChecker().check(dataSource, PrivilegeCheckType.XA));
     }
 }
diff --git 
a/infra/database/type/opengauss/src/main/java/org/apache/shardingsphere/infra/database/opengauss/checker/OpenGaussDatabaseEnvironmentChecker.java
 
b/infra/database/type/opengauss/src/main/java/org/apache/shardingsphere/infra/database/opengauss/checker/OpenGaussDatabasePrivilegeChecker.java
similarity index 93%
rename from 
infra/database/type/opengauss/src/main/java/org/apache/shardingsphere/infra/database/opengauss/checker/OpenGaussDatabaseEnvironmentChecker.java
rename to 
infra/database/type/opengauss/src/main/java/org/apache/shardingsphere/infra/database/opengauss/checker/OpenGaussDatabasePrivilegeChecker.java
index a83505e20ba..2b97d086b19 100644
--- 
a/infra/database/type/opengauss/src/main/java/org/apache/shardingsphere/infra/database/opengauss/checker/OpenGaussDatabaseEnvironmentChecker.java
+++ 
b/infra/database/type/opengauss/src/main/java/org/apache/shardingsphere/infra/database/opengauss/checker/OpenGaussDatabasePrivilegeChecker.java
@@ -18,7 +18,7 @@
 package org.apache.shardingsphere.infra.database.opengauss.checker;
 
 import lombok.extern.slf4j.Slf4j;
-import 
org.apache.shardingsphere.infra.database.core.checker.DialectDatabaseEnvironmentChecker;
+import 
org.apache.shardingsphere.infra.database.core.checker.DialectDatabasePrivilegeChecker;
 import 
org.apache.shardingsphere.infra.database.core.checker.PrivilegeCheckType;
 import 
org.apache.shardingsphere.infra.database.core.exception.CheckDatabaseEnvironmentFailedException;
 import 
org.apache.shardingsphere.infra.database.core.exception.MissingRequiredPrivilegeException;
@@ -37,12 +37,12 @@ import java.util.Collections;
  * Database environment checker for openGauss.
  */
 @Slf4j
-public final class OpenGaussDatabaseEnvironmentChecker implements 
DialectDatabaseEnvironmentChecker {
+public final class OpenGaussDatabasePrivilegeChecker implements 
DialectDatabasePrivilegeChecker {
     
     private static final String SHOW_GRANTS_SQL = "SELECT * FROM pg_roles 
WHERE rolname = ?";
     
     @Override
-    public void checkPrivilege(final DataSource dataSource, final 
PrivilegeCheckType privilegeCheckType) {
+    public void check(final DataSource dataSource, final PrivilegeCheckType 
privilegeCheckType) {
         if (PrivilegeCheckType.PIPELINE != privilegeCheckType) {
             return;
         }
diff --git 
a/infra/database/type/opengauss/src/main/resources/META-INF/services/org.apache.shardingsphere.infra.database.core.checker.DialectDatabaseEnvironmentChecker
 
b/infra/database/type/opengauss/src/main/resources/META-INF/services/org.apache.shardingsphere.infra.database.core.checker.DialectDatabasePrivilegeChecker
similarity index 96%
rename from 
infra/database/type/opengauss/src/main/resources/META-INF/services/org.apache.shardingsphere.infra.database.core.checker.DialectDatabaseEnvironmentChecker
rename to 
infra/database/type/opengauss/src/main/resources/META-INF/services/org.apache.shardingsphere.infra.database.core.checker.DialectDatabasePrivilegeChecker
index 4412cff08c0..b7a184ae4c5 100644
--- 
a/infra/database/type/opengauss/src/main/resources/META-INF/services/org.apache.shardingsphere.infra.database.core.checker.DialectDatabaseEnvironmentChecker
+++ 
b/infra/database/type/opengauss/src/main/resources/META-INF/services/org.apache.shardingsphere.infra.database.core.checker.DialectDatabasePrivilegeChecker
@@ -15,4 +15,4 @@
 # limitations under the License.
 #
 
-org.apache.shardingsphere.infra.database.opengauss.checker.OpenGaussDatabaseEnvironmentChecker
+org.apache.shardingsphere.infra.database.opengauss.checker.OpenGaussDatabasePrivilegeChecker
diff --git 
a/infra/database/type/postgresql/src/main/java/org/apache/shardingsphere/infra/database/postgresql/checker/PostgreSQLDatabaseEnvironmentChecker.java
 
b/infra/database/type/postgresql/src/main/java/org/apache/shardingsphere/infra/database/postgresql/checker/PostgreSQLDatabasePrivilegeChecker.java
similarity index 93%
rename from 
infra/database/type/postgresql/src/main/java/org/apache/shardingsphere/infra/database/postgresql/checker/PostgreSQLDatabaseEnvironmentChecker.java
rename to 
infra/database/type/postgresql/src/main/java/org/apache/shardingsphere/infra/database/postgresql/checker/PostgreSQLDatabasePrivilegeChecker.java
index 9f72b08ed61..1f2299fcbb1 100644
--- 
a/infra/database/type/postgresql/src/main/java/org/apache/shardingsphere/infra/database/postgresql/checker/PostgreSQLDatabaseEnvironmentChecker.java
+++ 
b/infra/database/type/postgresql/src/main/java/org/apache/shardingsphere/infra/database/postgresql/checker/PostgreSQLDatabasePrivilegeChecker.java
@@ -18,7 +18,7 @@
 package org.apache.shardingsphere.infra.database.postgresql.checker;
 
 import lombok.extern.slf4j.Slf4j;
-import 
org.apache.shardingsphere.infra.database.core.checker.DialectDatabaseEnvironmentChecker;
+import 
org.apache.shardingsphere.infra.database.core.checker.DialectDatabasePrivilegeChecker;
 import 
org.apache.shardingsphere.infra.database.core.checker.PrivilegeCheckType;
 import 
org.apache.shardingsphere.infra.database.core.exception.CheckDatabaseEnvironmentFailedException;
 import 
org.apache.shardingsphere.infra.database.core.exception.MissingRequiredPrivilegeException;
@@ -37,12 +37,12 @@ import java.util.Collections;
  * Database environment checker for PostgreSQL.
  */
 @Slf4j
-public final class PostgreSQLDatabaseEnvironmentChecker implements 
DialectDatabaseEnvironmentChecker {
+public final class PostgreSQLDatabasePrivilegeChecker implements 
DialectDatabasePrivilegeChecker {
     
     private static final String SHOW_GRANTS_SQL = "SELECT * FROM pg_roles 
WHERE rolname = ?";
     
     @Override
-    public void checkPrivilege(final DataSource dataSource, final 
PrivilegeCheckType privilegeCheckType) {
+    public void check(final DataSource dataSource, final PrivilegeCheckType 
privilegeCheckType) {
         if (PrivilegeCheckType.PIPELINE != privilegeCheckType) {
             return;
         }
diff --git 
a/infra/database/type/postgresql/src/main/resources/META-INF/services/org.apache.shardingsphere.infra.database.core.checker.DialectDatabaseEnvironmentChecker
 
b/infra/database/type/postgresql/src/main/resources/META-INF/services/org.apache.shardingsphere.infra.database.core.checker.DialectDatabasePrivilegeChecker
similarity index 96%
rename from 
infra/database/type/postgresql/src/main/resources/META-INF/services/org.apache.shardingsphere.infra.database.core.checker.DialectDatabaseEnvironmentChecker
rename to 
infra/database/type/postgresql/src/main/resources/META-INF/services/org.apache.shardingsphere.infra.database.core.checker.DialectDatabasePrivilegeChecker
index a67dec86c20..4faa2e4480b 100644
--- 
a/infra/database/type/postgresql/src/main/resources/META-INF/services/org.apache.shardingsphere.infra.database.core.checker.DialectDatabaseEnvironmentChecker
+++ 
b/infra/database/type/postgresql/src/main/resources/META-INF/services/org.apache.shardingsphere.infra.database.core.checker.DialectDatabasePrivilegeChecker
@@ -15,4 +15,4 @@
 # limitations under the License.
 #
 
-org.apache.shardingsphere.infra.database.postgresql.checker.PostgreSQLDatabaseEnvironmentChecker
+org.apache.shardingsphere.infra.database.postgresql.checker.PostgreSQLDatabasePrivilegeChecker
diff --git 
a/infra/database/type/postgresql/src/test/java/org/apache/shardingsphere/infra/database/postgresql/checker/PostgreSQLDatabaseEnvironmentCheckerTest.java
 
b/infra/database/type/postgresql/src/test/java/org/apache/shardingsphere/infra/database/postgresql/checker/PostgreSQLDatabaseEnvironmentCheckerTest.java
index 96ba13810a5..b261fe1a139 100644
--- 
a/infra/database/type/postgresql/src/test/java/org/apache/shardingsphere/infra/database/postgresql/checker/PostgreSQLDatabaseEnvironmentCheckerTest.java
+++ 
b/infra/database/type/postgresql/src/test/java/org/apache/shardingsphere/infra/database/postgresql/checker/PostgreSQLDatabaseEnvironmentCheckerTest.java
@@ -68,28 +68,28 @@ class PostgreSQLDatabaseEnvironmentCheckerTest {
     
     @Test
     void assertCheckRolReplication() throws SQLException {
-        PostgreSQLDatabaseEnvironmentChecker dataSourceChecker = new 
PostgreSQLDatabaseEnvironmentChecker();
+        PostgreSQLDatabasePrivilegeChecker dataSourceChecker = new 
PostgreSQLDatabasePrivilegeChecker();
         when(resultSet.getString("rolreplication")).thenReturn("t");
         when(resultSet.getString("rolsuper")).thenReturn("f");
-        dataSourceChecker.checkPrivilege(dataSource, 
PrivilegeCheckType.PIPELINE);
+        dataSourceChecker.check(dataSource, PrivilegeCheckType.PIPELINE);
         verify(resultSet, atLeastOnce()).getString("rolsuper");
     }
     
     @Test
     void assertCheckRolSuper() throws SQLException {
-        PostgreSQLDatabaseEnvironmentChecker dataSourceChecker = new 
PostgreSQLDatabaseEnvironmentChecker();
+        PostgreSQLDatabasePrivilegeChecker dataSourceChecker = new 
PostgreSQLDatabasePrivilegeChecker();
         when(resultSet.getString("rolsuper")).thenReturn("t");
         when(resultSet.getString("rolreplication")).thenReturn("f");
-        dataSourceChecker.checkPrivilege(dataSource, 
PrivilegeCheckType.PIPELINE);
+        dataSourceChecker.check(dataSource, PrivilegeCheckType.PIPELINE);
         verify(resultSet, atLeastOnce()).getString("rolreplication");
     }
     
     @Test
     void assertCheckNoPrivilege() throws SQLException {
-        PostgreSQLDatabaseEnvironmentChecker dataSourceChecker = new 
PostgreSQLDatabaseEnvironmentChecker();
+        PostgreSQLDatabasePrivilegeChecker dataSourceChecker = new 
PostgreSQLDatabasePrivilegeChecker();
         when(resultSet.getString("rolsuper")).thenReturn("f");
         when(resultSet.getString("rolreplication")).thenReturn("f");
-        assertThrows(MissingRequiredPrivilegeException.class, () -> 
dataSourceChecker.checkPrivilege(dataSource, PrivilegeCheckType.PIPELINE));
+        assertThrows(MissingRequiredPrivilegeException.class, () -> 
dataSourceChecker.check(dataSource, PrivilegeCheckType.PIPELINE));
         verify(resultSet, atLeastOnce()).getString("rolreplication");
     }
 }
diff --git 
a/kernel/data-pipeline/core/src/main/java/org/apache/shardingsphere/data/pipeline/core/checker/PipelineDataSourceCheckEngine.java
 
b/kernel/data-pipeline/core/src/main/java/org/apache/shardingsphere/data/pipeline/core/checker/PipelineDataSourceCheckEngine.java
index 08cd90cb343..2554fe837c0 100644
--- 
a/kernel/data-pipeline/core/src/main/java/org/apache/shardingsphere/data/pipeline/core/checker/PipelineDataSourceCheckEngine.java
+++ 
b/kernel/data-pipeline/core/src/main/java/org/apache/shardingsphere/data/pipeline/core/checker/PipelineDataSourceCheckEngine.java
@@ -20,7 +20,7 @@ package org.apache.shardingsphere.data.pipeline.core.checker;
 import 
org.apache.shardingsphere.data.pipeline.core.exception.job.PrepareJobWithTargetTableNotEmptyException;
 import 
org.apache.shardingsphere.data.pipeline.core.importer.ImporterConfiguration;
 import 
org.apache.shardingsphere.data.pipeline.core.sqlbuilder.sql.PipelinePrepareSQLBuilder;
-import 
org.apache.shardingsphere.infra.database.core.checker.DialectDatabaseEnvironmentChecker;
+import 
org.apache.shardingsphere.infra.database.core.checker.DialectDatabasePrivilegeChecker;
 import 
org.apache.shardingsphere.infra.database.core.checker.PrivilegeCheckType;
 import 
org.apache.shardingsphere.infra.database.core.spi.DatabaseTypedSPILoader;
 import org.apache.shardingsphere.infra.database.core.type.DatabaseType;
@@ -40,14 +40,14 @@ import java.util.Collection;
  */
 public final class PipelineDataSourceCheckEngine {
     
-    private final DialectDatabaseEnvironmentChecker checker;
+    private final DialectDatabasePrivilegeChecker privilegeChecker;
     
     private final DialectPipelineDatabaseVariableChecker variableChecker;
     
     private final PipelinePrepareSQLBuilder sqlBuilder;
     
     public PipelineDataSourceCheckEngine(final DatabaseType databaseType) {
-        checker = 
DatabaseTypedSPILoader.findService(DialectDatabaseEnvironmentChecker.class, 
databaseType).orElse(null);
+        privilegeChecker = 
DatabaseTypedSPILoader.findService(DialectDatabasePrivilegeChecker.class, 
databaseType).orElse(null);
         variableChecker = 
DatabaseTypedSPILoader.findService(DialectPipelineDatabaseVariableChecker.class,
 databaseType).orElse(null);
         sqlBuilder = new PipelinePrepareSQLBuilder(databaseType);
     }
@@ -75,8 +75,8 @@ public final class PipelineDataSourceCheckEngine {
      */
     public void checkSourceDataSources(final Collection<DataSource> 
dataSources) {
         checkConnection(dataSources);
-        if (null != checker) {
-            dataSources.forEach(each -> checker.checkPrivilege(each, 
PrivilegeCheckType.PIPELINE));
+        if (null != privilegeChecker) {
+            dataSources.forEach(each -> privilegeChecker.check(each, 
PrivilegeCheckType.PIPELINE));
         }
         if (null != variableChecker) {
             dataSources.forEach(variableChecker::check);
diff --git 
a/kernel/transaction/type/xa/core/src/main/java/org/apache/shardingsphere/transaction/xa/XAShardingSphereTransactionManager.java
 
b/kernel/transaction/type/xa/core/src/main/java/org/apache/shardingsphere/transaction/xa/XAShardingSphereTransactionManager.java
index 87f3825afd9..224412a8e54 100644
--- 
a/kernel/transaction/type/xa/core/src/main/java/org/apache/shardingsphere/transaction/xa/XAShardingSphereTransactionManager.java
+++ 
b/kernel/transaction/type/xa/core/src/main/java/org/apache/shardingsphere/transaction/xa/XAShardingSphereTransactionManager.java
@@ -19,7 +19,7 @@ package org.apache.shardingsphere.transaction.xa;
 
 import com.cedarsoftware.util.CaseInsensitiveMap;
 import lombok.SneakyThrows;
-import 
org.apache.shardingsphere.infra.database.core.checker.DialectDatabaseEnvironmentChecker;
+import 
org.apache.shardingsphere.infra.database.core.checker.DialectDatabasePrivilegeChecker;
 import 
org.apache.shardingsphere.infra.database.core.checker.PrivilegeCheckType;
 import 
org.apache.shardingsphere.infra.database.core.spi.DatabaseTypedSPILoader;
 import org.apache.shardingsphere.infra.database.core.type.DatabaseType;
@@ -60,8 +60,8 @@ public final class XAShardingSphereTransactionManager 
implements ShardingSphereD
     @Override
     public void init(final Map<String, DatabaseType> databaseTypes, final 
Map<String, DataSource> dataSources, final String providerType) {
         for (Entry<String, DataSource> entry : dataSources.entrySet()) {
-            
DatabaseTypedSPILoader.findService(DialectDatabaseEnvironmentChecker.class, 
databaseTypes.get(entry.getKey()))
-                    .ifPresent(optional -> 
optional.checkPrivilege(entry.getValue(), PrivilegeCheckType.XA));
+            
DatabaseTypedSPILoader.findService(DialectDatabasePrivilegeChecker.class, 
databaseTypes.get(entry.getKey()))
+                    .ifPresent(optional -> optional.check(entry.getValue(), 
PrivilegeCheckType.XA));
         }
         xaTransactionManagerProvider = 
TypedSPILoader.getService(XATransactionManagerProvider.class, providerType);
         xaTransactionManagerProvider.init();

Reply via email to