This is an automated email from the ASF dual-hosted git repository.
reschke pushed a commit to branch OAK-11650
in repository https://gitbox.apache.org/repos/asf/jackrabbit-oak.git
The following commit(s) were added to refs/heads/OAK-11650 by this push:
new 16dbc93745 OAK-11650: Fix Javadoc errors - > as a list marker
16dbc93745 is described below
commit 16dbc93745c4a4fc30dd3e690b2901cba625c5e6
Author: Julian Reschke <[email protected]>
AuthorDate: Thu Apr 10 10:57:14 2025 +0100
OAK-11650: Fix Javadoc errors - > as a list marker
---
.../composite/CompositeProviderScopeTest.java | 4 ++--
.../authentication/L3_LoginModuleTest.java | 6 +++---
.../advanced/L2_SetupAggregationTest.java | 24 +++++++++++-----------
.../advanced/L3_UnderstandAggregationTest.java | 10 ++++-----
.../security/principal/L3_EveryoneTest.java | 8 ++++----
.../principal/L4_PrincipalProviderTest.java | 6 +++---
.../user/L10_RemovalAndMembershipTest.java | 4 ++--
.../exercise/security/user/L8_MembershipTest.java | 4 ++--
8 files changed, 33 insertions(+), 33 deletions(-)
diff --git
a/oak-core/src/test/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositeProviderScopeTest.java
b/oak-core/src/test/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositeProviderScopeTest.java
index 6b071c8c77..f82b5286a1 100644
---
a/oak-core/src/test/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositeProviderScopeTest.java
+++
b/oak-core/src/test/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositeProviderScopeTest.java
@@ -45,8 +45,8 @@ import static org.junit.Assert.assertTrue;
*
* - default permission provider
* - custom provider that
- * > supports namespace-management and nodetype-def-mgt permission on
repository level
- * > write permission below {@link #TEST_A_PATH}.
+ * + supports namespace-management and nodetype-def-mgt permission on
repository level
+ * + write permission below {@link #TEST_A_PATH}.
*
* The tests are executed both for the set of principals associated with the
test
* user and with the admin session.
diff --git
a/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authentication/L3_LoginModuleTest.java
b/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authentication/L3_LoginModuleTest.java
index 3a3a1fd02e..e963d2c83f 100644
---
a/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authentication/L3_LoginModuleTest.java
+++
b/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authentication/L3_LoginModuleTest.java
@@ -54,9 +54,9 @@ import org.junit.Test;
* {@link #getConfiguration()} method.
* Change the JAAS configuration and use the {@link #testLogin()} method to
* walk through the login. For example
- * > look at ConfigurationUtil for various options
- * > manually create a different configuration with different control flags
- * > create a configuration that also includes the {@link CustomLoginModule}
+ * + look at ConfigurationUtil for various options
+ * + manually create a different configuration with different control flags
+ * + create a configuration that also includes the {@link CustomLoginModule}
* Discuss your findings
*
*
diff --git
a/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authorization/advanced/L2_SetupAggregationTest.java
b/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authorization/advanced/L2_SetupAggregationTest.java
index da388cb708..659f51ca7c 100644
---
a/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authorization/advanced/L2_SetupAggregationTest.java
+++
b/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authorization/advanced/L2_SetupAggregationTest.java
@@ -37,22 +37,22 @@ package
org.apache.jackrabbit.oak.exercise.security.authorization.advanced;
* and deploy it with your OSGi based Oak setup.
*
* Hint: Oak comes with 2 additional authorization models, which you can use
- * > Closed User Groups in oak-authorization-cug (see also
http://jackrabbit.apache.org/oak/docs/security/authorization/cug.html)
- * > Read Only in oak-exercise
+ * + Closed User Groups in oak-authorization-cug (see also
http://jackrabbit.apache.org/oak/docs/security/authorization/cug.html)
+ * + Read Only in oak-exercise
*
* Questions:
- * > Can you identify the OSGi components that come with the model?
- * > Does your model require any mandatory configuration in order to be
functional?
+ * + Can you identify the OSGi components that come with the model?
+ * + Does your model require any mandatory configuration in order to be
functional?
*
* - Adjust Configuration of 'Apache Jackrabbit Oak SecurityProvider'
* In a second step you should adjust the configuration of the
SecurityProvider
* in order to make sure the additional AuthorizationConfiguration is
properly
* wired with the security setup.
*
- * > Add the addition configuration to the list of required service IDs (see
also http://jackrabbit.apache.org/oak/docs/security/introduction.html)
- * > Check the value of 'Authorization Composition Type'.
- * > Observe the log INFOs to verify the SecurityProvider is properly
registered
- * > Inspect the references to 'authorizationConfiguration' in
org.apache.jackrabbit.oak.security.internal.SecurityProviderRegistration
+ * + Add the addition configuration to the list of required service IDs (see
also http://jackrabbit.apache.org/oak/docs/security/introduction.html)
+ * + Check the value of 'Authorization Composition Type'.
+ * + Observe the log INFOs to verify the SecurityProvider is properly
registered
+ * + Inspect the references to 'authorizationConfiguration' in
org.apache.jackrabbit.oak.security.internal.SecurityProviderRegistration
* and verify that the extra module shows up there.
*
* - Verify Access Control Management and Permission Evaluation
@@ -66,10 +66,10 @@ package
org.apache.jackrabbit.oak.exercise.security.authorization.advanced;
* - Play with the configuration option 'Authorization Composition Type'.
*
* Questions:
- * > Would it be an option to use "OR" as the composition type with the
setup you chose?
- * > What would be the result if this was a valid option?
- * > If it was a valid option, imaging a setup scenario where it would not
work.
- * > If it wasn't an option, explain why. Think about a scenario where it
was valid.
+ * + Would it be an option to use "OR" as the composition type with the
setup you chose?
+ * + What would be the result if this was a valid option?
+ * + If it was a valid option, imaging a setup scenario where it would not
work.
+ * + If it wasn't an option, explain why. Think about a scenario where it
was valid.
*
* </pre>
*/
diff --git
a/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authorization/advanced/L3_UnderstandAggregationTest.java
b/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authorization/advanced/L3_UnderstandAggregationTest.java
index 42c82d831f..8b9e1b583f 100644
---
a/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authorization/advanced/L3_UnderstandAggregationTest.java
+++
b/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authorization/advanced/L3_UnderstandAggregationTest.java
@@ -82,11 +82,11 @@ import static org.junit.Assert.assertTrue;
*
* - Write more tests to explore aggregation of additional features within the
* authorization setup such as e.g.
- * > Privilege discovery
- * > Repository level privileges such as e.g. ability to register a new node
type.
- * > XML Import
- * > Validation
- * > Repository Initialization
+ * + Privilege discovery
+ * + Repository level privileges such as e.g. ability to register a new node
type.
+ * + XML Import
+ * + Validation
+ * + Repository Initialization
*
*
* Advanced Exercises
diff --git
a/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/principal/L3_EveryoneTest.java
b/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/principal/L3_EveryoneTest.java
index 7978518231..a058d7b9ed 100644
---
a/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/principal/L3_EveryoneTest.java
+++
b/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/principal/L3_EveryoneTest.java
@@ -65,10 +65,10 @@ import org.apache.jackrabbit.test.AbstractJCRTest;
* - {@link #testEveryoneAsAuthorizableGroup()}
* Additional test illustrating that the dynamic nature of the everyone
principal
* does not change if there exists a corresponding authorizable group.
- * > Create a new authorizable that corresponds to the everyone principal
(Q: what parameters are constants?)
- * > Verify that principal exposed by the authorizable corresponds to the
everyone principal.
- * > Assert that the dynamic nature of the principal has not changed.
- * > Test if the dynamic nature also applies to the authorizable
+ * + Create a new authorizable that corresponds to the everyone principal
(Q: what parameters are constants?)
+ * + Verify that principal exposed by the authorizable corresponds to the
everyone principal.
+ * + Assert that the dynamic nature of the principal has not changed.
+ * + Test if the dynamic nature also applies to the authorizable
*
*
* Additional Exercises:
diff --git
a/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/principal/L4_PrincipalProviderTest.java
b/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/principal/L4_PrincipalProviderTest.java
index 1fc86b249f..56e692ed07 100644
---
a/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/principal/L4_PrincipalProviderTest.java
+++
b/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/principal/L4_PrincipalProviderTest.java
@@ -64,9 +64,9 @@ import org.junit.Test;
* - Complete the {@link CustomPrincipalProvider}
* stub and deploy the exercise bundle in a Sling base repository
installation
* (e.g. Cq|Granite).
- * > Try to identify the tools that allow you to explore your custom
principals
- * > Play with the dynamic group membership as you define it in the
principal provider and verify that the subjects calculated upon login are
correct
- * > Play with the authorization part of the principal management
granting/revoking access for one of your custom principals
+ * + Try to identify the tools that allow you to explore your custom
principals
+ * + Play with the dynamic group membership as you define it in the
principal provider and verify that the subjects calculated upon login are
correct
+ * + Play with the authorization part of the principal management
granting/revoking access for one of your custom principals
* </pre>
*
* @see org.apache.jackrabbit.oak.spi.security.principal.PrincipalProvider
diff --git
a/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/user/L10_RemovalAndMembershipTest.java
b/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/user/L10_RemovalAndMembershipTest.java
index 49639036ce..ec5ed28fdb 100644
---
a/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/user/L10_RemovalAndMembershipTest.java
+++
b/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/user/L10_RemovalAndMembershipTest.java
@@ -80,8 +80,8 @@ import static org.junit.Assert.assertTrue;
* it and verify and if members-list at 'administrators' has been adjust
(test-user removed).
*
* - Explain the result both for the main and variant.
- * > the removal failed: explain why?
- * > the member-cleanup didn't succeed: explain why?
+ * + the removal failed: explain why?
+ * + the member-cleanup didn't succeed: explain why?
*
* 4. Test Execution with 'admin'
*
diff --git
a/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/user/L8_MembershipTest.java
b/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/user/L8_MembershipTest.java
index b7029da8a3..9147ecf0ce 100644
---
a/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/user/L8_MembershipTest.java
+++
b/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/user/L8_MembershipTest.java
@@ -83,8 +83,8 @@ import static org.junit.Assert.assertTrue;
* In order to complete this exercise look at the built-in node types and
* identify those types that deal with group membership.
* Once you are familiar with the node type definitions look at
- * > {@link org.apache.jackrabbit.oak.security.user.MembershipProvider} and
- * > {@link org.apache.jackrabbit.oak.security.user.MembershipWriter}
+ * + {@link org.apache.jackrabbit.oak.security.user.MembershipProvider} and
+ * + {@link org.apache.jackrabbit.oak.security.user.MembershipWriter}
* and how they deal with massive amount of members on a given group.
* Finally fix the test case :-)
*