Skip to content

Commit 58c6e23

Browse files
committed
Merge branch 'ghi11438-errorprone-fixes' of https://github.com/apache/cloudstack into add-errorprone
2 parents f3a66fd + 7e5e80e commit 58c6e23

File tree

80 files changed

+280
-220
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

80 files changed

+280
-220
lines changed

agent/src/main/java/com/cloud/agent/mockvm/MockVmMgr.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -249,7 +249,7 @@ public void freeVncPort(int port) {
249249
public MockVm createVmFromSpec(VirtualMachineTO vmSpec) {
250250
String vmName = vmSpec.getName();
251251
long ramSize = vmSpec.getMinRam();
252-
int utilizationPercent = randSeed.nextInt() % 100;
252+
int utilizationPercent = randSeed.nextInt(100);
253253
MockVm vm = null;
254254

255255
synchronized (this) {

api/src/main/java/org/apache/cloudstack/api/command/admin/backup/UpdateBackupOfferingCmd.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ public Boolean getAllowUserDrivenBackups() {
8383
public void execute() {
8484
try {
8585
if (StringUtils.isAllEmpty(getName(), getDescription()) && getAllowUserDrivenBackups() == null) {
86-
throw new InvalidParameterValueException(String.format("Can't update Backup Offering [id: %s] because there are no parameters to be updated, at least one of the",
86+
throw new InvalidParameterValueException(String.format("Can't update Backup Offering [id: %s] because there are no parameters to be updated, at least one of the " +
8787
"following should be informed: name, description or allowUserDrivenBackups.", id));
8888
}
8989

api/src/test/java/com/cloud/network/IsolationMethodTest.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
public class IsolationMethodTest {
2626
@After
2727
public void cleanTheRegistry() {
28-
PhysicalNetwork.IsolationMethod.registeredIsolationMethods.removeAll(PhysicalNetwork.IsolationMethod.registeredIsolationMethods);
28+
PhysicalNetwork.IsolationMethod.registeredIsolationMethods.clear();
2929
}
3030

3131
@Test

core/src/main/java/com/cloud/agent/resource/virtualnetwork/facade/AbstractConfigItemFacade.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ public abstract class AbstractConfigItemFacade {
106106

107107
public static AbstractConfigItemFacade getInstance(final Class<? extends NetworkElementCommand> key) {
108108
if (!flyweight.containsKey(key)) {
109-
throw new CloudRuntimeException("Unable to process the configuration for " + key.getClass().getName());
109+
throw new CloudRuntimeException("Unable to process the configuration for " + key.getName());
110110
}
111111

112112
final AbstractConfigItemFacade instance = flyweight.get(key);

core/src/main/java/com/cloud/network/HAProxyConfigurator.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -514,7 +514,7 @@ private List<String> getRulesForPool(final LoadBalancerTO lbTO, final boolean ke
514514
}
515515
dstSubRule.add(sb.toString());
516516
if (stickinessSubRule != null) {
517-
sb.append(" cookie ").append(dest.getDestIp().replace(".", "_")).append('-').append(dest.getDestPort()).toString();
517+
sb.append(" cookie ").append(dest.getDestIp().replace(".", "_")).append('-').append(dest.getDestPort());
518518
dstWithCookieSubRule.add(sb.toString());
519519
}
520520
destsAvailable = true;

core/src/main/java/com/cloud/resource/RequestWrapper.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ protected CommandWrapper<Command, Answer, ServerResource> retrieveCommands(final
8686

8787
keepCommandClass = commandClass2;
8888
} catch (final ClassCastException e) {
89-
throw new CommandNotSupported("No key found for '" + keepCommandClass.getClass() + "' in the Map!");
89+
throw new CommandNotSupported("No key found for '" + keepCommandClass + "' in the Map!");
9090
} catch (final NullPointerException e) {
9191
// Will now traverse all the resource hierarchy. Returning null
9292
// is not a problem.

core/src/main/java/org/apache/cloudstack/agent/directdownload/DirectDownloadCommand.java

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,6 @@ protected DirectDownloadCommand (final String url, final Long templateId, final
5252
final Integer soTimeout, final Integer connectionRequestTimeout, final boolean followRedirects) {
5353
this.url = url;
5454
this.templateId = templateId;
55-
this.destData = destData;
5655
this.destPool = destPool;
5756
this.checksum = checksum;
5857
this.headers = headers;

core/src/test/java/com/cloud/resource/ServerResourceBaseTest.java

Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -182,36 +182,36 @@ public void tryToAutoDiscoverResourcePrivateNetworkInterfaceTestReturnNic() thro
182182
@Test
183183
public void defineResourceNetworkInterfacesTestUseXenbr0WhenPrivateNetworkInterfaceNotConfigured() {
184184
Map<String, Object> params = createParamsMap(null, "cloudbr1", "cloudbr2", "cloudbr3");
185-
try (MockedStatic<NetUtils> ignored = Mockito.mockStatic(NetUtils.class)) {
186-
Mockito.when(NetUtils.getNetworkInterface(Mockito.anyString())).thenReturn(networkInterfaceMock1, networkInterfaceMock2, networkInterfaceMock3, networkInterfaceMock4);
185+
try (MockedStatic<NetUtils> mockedNetUtils = Mockito.mockStatic(NetUtils.class)) {
186+
mockedNetUtils.when(() -> NetUtils.getNetworkInterface(Mockito.anyString())).thenReturn(networkInterfaceMock1, networkInterfaceMock2, networkInterfaceMock3, networkInterfaceMock4);
187187

188188
serverResourceBaseSpy.defineResourceNetworkInterfaces(params);
189189

190-
verifyAndAssertNetworkInterfaces("xenbr0", "cloudbr1", "cloudbr2", "cloudbr3");
190+
verifyAndAssertNetworkInterfaces(mockedNetUtils, "xenbr0", "cloudbr1", "cloudbr2", "cloudbr3");
191191
}
192192
}
193193

194194
@Test
195195
public void defineResourceNetworkInterfacesTestUseXenbr1WhenPublicNetworkInterfaceNotConfigured() {
196196
Map<String, Object> params = createParamsMap("cloudbr0", null, "cloudbr2", "cloudbr3");
197-
try (MockedStatic<NetUtils> ignored = Mockito.mockStatic(NetUtils.class)) {
198-
Mockito.when(NetUtils.getNetworkInterface(Mockito.anyString())).thenReturn(networkInterfaceMock1, networkInterfaceMock2, networkInterfaceMock3, networkInterfaceMock4);
197+
try (MockedStatic<NetUtils> mockedNetUtils = Mockito.mockStatic(NetUtils.class)) {
198+
mockedNetUtils.when(() -> NetUtils.getNetworkInterface(Mockito.anyString())).thenReturn(networkInterfaceMock1, networkInterfaceMock2, networkInterfaceMock3, networkInterfaceMock4);
199199

200200
serverResourceBaseSpy.defineResourceNetworkInterfaces(params);
201201

202-
verifyAndAssertNetworkInterfaces("cloudbr0", "xenbr1", "cloudbr2", "cloudbr3");
202+
verifyAndAssertNetworkInterfaces(mockedNetUtils, "cloudbr0", "xenbr1", "cloudbr2", "cloudbr3");
203203
}
204204
}
205205

206206
@Test
207207
public void defineResourceNetworkInterfacesTestUseConfiguredNetworkInterfaces() {
208208
Map<String, Object> params = createParamsMap("cloudbr0", "cloudbr1", "cloudbr2", "cloudbr3");
209-
try (MockedStatic<NetUtils> ignored = Mockito.mockStatic(NetUtils.class)) {
210-
Mockito.when(NetUtils.getNetworkInterface(Mockito.anyString())).thenReturn(networkInterfaceMock1, networkInterfaceMock2, networkInterfaceMock3, networkInterfaceMock4);
209+
try (MockedStatic<NetUtils> mockedNetUtils = Mockito.mockStatic(NetUtils.class)) {
210+
mockedNetUtils.when(() -> NetUtils.getNetworkInterface(Mockito.anyString())).thenReturn(networkInterfaceMock1, networkInterfaceMock2, networkInterfaceMock3, networkInterfaceMock4);
211211

212212
serverResourceBaseSpy.defineResourceNetworkInterfaces(params);
213213

214-
verifyAndAssertNetworkInterfaces("cloudbr0", "cloudbr1", "cloudbr2", "cloudbr3");
214+
verifyAndAssertNetworkInterfaces(mockedNetUtils, "cloudbr0", "cloudbr1", "cloudbr2", "cloudbr3");
215215
}
216216
}
217217

@@ -224,9 +224,8 @@ private Map<String, Object> createParamsMap(String... params) {
224224
return result;
225225
}
226226

227-
private void verifyAndAssertNetworkInterfaces(String... expectedResults) {
228-
Mockito.verify(NetUtils.class, Mockito.times(4));
229-
NetUtils.getNetworkInterface(keyCaptor.capture());
227+
private void verifyAndAssertNetworkInterfaces(MockedStatic<NetUtils> mockedNetUtils, String... expectedResults) {
228+
mockedNetUtils.verify(() -> NetUtils.getNetworkInterface(keyCaptor.capture()), Mockito.times(4));
230229
List<String> keys = keyCaptor.getAllValues();
231230

232231
for (int i = 0; i < expectedResults.length; i++) {

engine/orchestration/src/main/java/com/cloud/agent/manager/AgentAttache.java

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@
2424
import java.util.LinkedList;
2525
import java.util.List;
2626
import java.util.Map;
27+
import java.util.Objects;
2728
import java.util.Random;
2829
import java.util.Set;
2930
import java.util.concurrent.ConcurrentHashMap;
@@ -497,6 +498,11 @@ public void process(final Answer[] answers) {
497498
*/
498499
protected abstract boolean isClosed();
499500

501+
@Override
502+
public int hashCode() {
503+
return Objects.hash(_id, _uuid, _name);
504+
}
505+
500506
protected class Alarm extends ManagedContextRunnable {
501507
long _seq;
502508

engine/orchestration/src/main/java/com/cloud/agent/manager/DirectAgentAttache.java

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -148,6 +148,11 @@ private synchronized void scheduleFromQueue() {
148148
}
149149
}
150150

151+
@Override
152+
public int hashCode() {
153+
return super.hashCode();
154+
}
155+
151156
protected class PingTask extends ManagedContextRunnable {
152157
@Override
153158
protected synchronized void runInContext() {

0 commit comments

Comments
 (0)