build: Upgrade of maven plugins (#222)

* build: Upgrade of maven plugins

Signed-off-by: Sergii Kabashniuk <skabashniuk@redhat.com>
pull/225/head
Sergii Kabashniuk 2021-12-23 14:54:46 +02:00 committed by GitHub
parent e136e366a2
commit ce7c300eb9
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
140 changed files with 271 additions and 712 deletions

View File

@ -134,41 +134,31 @@ public class IntegrityConfigurationTest {
new MethodAnnotationsScanner()); new MethodAnnotationsScanner());
Set<String> parameters = new HashSet<>(); Set<String> parameters = new HashSet<>();
parameters.addAll( parameters.addAll(
reflections reflections.getConstructorsWithAnyParamAnnotated(Named.class).stream()
.getConstructorsWithAnyParamAnnotated(Named.class)
.stream()
.flatMap(c -> Stream.of(c.getParameters())) .flatMap(c -> Stream.of(c.getParameters()))
.filter(p -> p.isAnnotationPresent(Named.class)) .filter(p -> p.isAnnotationPresent(Named.class))
.map(p -> p.getAnnotation(Named.class).value()) .map(p -> p.getAnnotation(Named.class).value())
.collect(Collectors.toSet())); .collect(Collectors.toSet()));
parameters.addAll( parameters.addAll(
reflections reflections.getFieldsAnnotatedWith(Named.class).stream()
.getFieldsAnnotatedWith(Named.class)
.stream()
.filter(f -> f.isAnnotationPresent(Named.class)) .filter(f -> f.isAnnotationPresent(Named.class))
.map(f -> f.getAnnotation(Named.class).value()) .map(f -> f.getAnnotation(Named.class).value())
.collect(Collectors.toSet())); .collect(Collectors.toSet()));
parameters.addAll( parameters.addAll(
reflections reflections.getMethodsAnnotatedWith(ScheduleDelay.class).stream()
.getMethodsAnnotatedWith(ScheduleDelay.class)
.stream()
.filter(m -> m.isAnnotationPresent(ScheduleDelay.class)) .filter(m -> m.isAnnotationPresent(ScheduleDelay.class))
.map(m -> m.getAnnotation(ScheduleDelay.class).delayParameterName()) .map(m -> m.getAnnotation(ScheduleDelay.class).delayParameterName())
.collect(Collectors.toSet())); .collect(Collectors.toSet()));
parameters.addAll( parameters.addAll(
reflections reflections.getMethodsAnnotatedWith(ScheduleDelay.class).stream()
.getMethodsAnnotatedWith(ScheduleDelay.class)
.stream()
.filter(m -> m.isAnnotationPresent(ScheduleDelay.class)) .filter(m -> m.isAnnotationPresent(ScheduleDelay.class))
.map(m -> m.getAnnotation(ScheduleDelay.class).initialDelayParameterName()) .map(m -> m.getAnnotation(ScheduleDelay.class).initialDelayParameterName())
.collect(Collectors.toSet())); .collect(Collectors.toSet()));
Set<String> unusedDeclaredConfigurationParameters = Set<String> unusedDeclaredConfigurationParameters =
getProperties(new File(Resources.getResource("che").getPath())) getProperties(new File(Resources.getResource("che").getPath())).keySet().stream()
.keySet()
.stream()
.filter(k -> !parameters.contains(k)) .filter(k -> !parameters.contains(k))
.collect(Collectors.toSet()); .collect(Collectors.toSet());
Assert.assertTrue( Assert.assertTrue(

View File

@ -29,8 +29,7 @@ public class ServerSideRequestProcessorConfigurator
public ServerSideRequestProcessorConfigurator( public ServerSideRequestProcessorConfigurator(
Set<RequestProcessorConfigurationProvider.Configuration> configurations) { Set<RequestProcessorConfigurationProvider.Configuration> configurations) {
this.configurations = this.configurations =
configurations configurations.stream()
.stream()
.collect(Collectors.toMap(Configuration::getEndpointId, Function.identity())); .collect(Collectors.toMap(Configuration::getEndpointId, Function.identity()));
} }

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2012-2018 Red Hat, Inc. * Copyright (c) 2012-2021 Red Hat, Inc.
* This program and the accompanying materials are made * This program and the accompanying materials are made
* available under the terms of the Eclipse Public License 2.0 * available under the terms of the Eclipse Public License 2.0
* which is available at https://www.eclipse.org/legal/epl-2.0/ * which is available at https://www.eclipse.org/legal/epl-2.0/
@ -60,9 +60,7 @@ public class RemoteSubscriptionManager {
String method, Class<T> eventType, BiPredicate<T, Map<String, String>> biPredicate) { String method, Class<T> eventType, BiPredicate<T, Map<String, String>> biPredicate) {
eventService.subscribe( eventService.subscribe(
event -> event ->
remoteSubscriptionStorage remoteSubscriptionStorage.getByMethod(method).stream()
.getByMethod(method)
.stream()
.filter(context -> biPredicate.test(event, context.getScope())) .filter(context -> biPredicate.test(event, context.getScope()))
.forEach(context -> transmit(context.getEndpointId(), method, event)), .forEach(context -> transmit(context.getEndpointId(), method, event)),
eventType); eventType);

View File

@ -46,9 +46,7 @@ public class ApiInfoService {
public RootResourcesList listJSON(@Context ServletContext context) { public RootResourcesList listJSON(@Context ServletContext context) {
ResourceBinder binder = (ResourceBinder) context.getAttribute(ResourceBinder.class.getName()); ResourceBinder binder = (ResourceBinder) context.getAttribute(ResourceBinder.class.getName());
return new RootResourcesList( return new RootResourcesList(
binder binder.getResources().stream()
.getResources()
.stream()
.map( .map(
new Function<ObjectFactory<ResourceDescriptor>, RootResource>() { new Function<ObjectFactory<ResourceDescriptor>, RootResource>() {
@Nullable @Nullable

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2012-2018 Red Hat, Inc. * Copyright (c) 2012-2021 Red Hat, Inc.
* This program and the accompanying materials are made * This program and the accompanying materials are made
* available under the terms of the Eclipse Public License 2.0 * available under the terms of the Eclipse Public License 2.0
* which is available at https://www.eclipse.org/legal/epl-2.0/ * which is available at https://www.eclipse.org/legal/epl-2.0/
@ -51,9 +51,7 @@ public class DefaultHttpJsonResponse implements HttpJsonResponse {
this.responseCode = responseCode; this.responseCode = responseCode;
this.headers = this.headers =
unmodifiableMap( unmodifiableMap(
headers headers.entrySet().stream()
.entrySet()
.stream()
.collect(Collectors.toMap(Map.Entry::getKey, e -> unmodifiableList(e.getValue())))); .collect(Collectors.toMap(Map.Entry::getKey, e -> unmodifiableList(e.getValue()))));
} }

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2012-2018 Red Hat, Inc. * Copyright (c) 2012-2021 Red Hat, Inc.
* This program and the accompanying materials are made * This program and the accompanying materials are made
* available under the terms of the Eclipse Public License 2.0 * available under the terms of the Eclipse Public License 2.0
* which is available at https://www.eclipse.org/legal/epl-2.0/ * which is available at https://www.eclipse.org/legal/epl-2.0/
@ -55,9 +55,7 @@ public class JsonRpcEndpointIdsHolder {
} }
public Set<String> getEndpointIdsByWorkspaceId(String workspaceId) { public Set<String> getEndpointIdsByWorkspaceId(String workspaceId) {
return endpointIds return endpointIds.entrySet().stream()
.entrySet()
.stream()
.filter(it -> it.getValue().contains(workspaceId)) .filter(it -> it.getValue().contains(workspaceId))
.map(Map.Entry::getKey) .map(Map.Entry::getKey)
.collect(toSet()); .collect(toSet());

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2012-2018 Red Hat, Inc. * Copyright (c) 2012-2021 Red Hat, Inc.
* This program and the accompanying materials are made * This program and the accompanying materials are made
* available under the terms of the Eclipse Public License 2.0 * available under the terms of the Eclipse Public License 2.0
* which is available at https://www.eclipse.org/legal/epl-2.0/ * which is available at https://www.eclipse.org/legal/epl-2.0/
@ -55,9 +55,7 @@ public class JsonRpcEndpointToMachineNameHolder {
} }
public Set<String> getEndpointIdsByWorkspaceIdPlusMachineName(String workspaceIdPlusMachineName) { public Set<String> getEndpointIdsByWorkspaceIdPlusMachineName(String workspaceIdPlusMachineName) {
return endpointIds return endpointIds.entrySet().stream()
.entrySet()
.stream()
.filter(it -> it.getValue().contains(workspaceIdPlusMachineName)) .filter(it -> it.getValue().contains(workspaceIdPlusMachineName))
.map(Map.Entry::getKey) .map(Map.Entry::getKey)
.collect(toSet()); .collect(toSet());

View File

@ -66,8 +66,7 @@ public final class PagingUtil {
pageRefs.add(Pair.of("next", page.getNextPageRef())); pageRefs.add(Pair.of("next", page.getNextPageRef()));
} }
final UriBuilder ub = UriBuilder.fromUri(uri); final UriBuilder ub = UriBuilder.fromUri(uri);
return pageRefs return pageRefs.stream()
.stream()
.map( .map(
refPair -> refPair ->
format( format(

View File

@ -55,18 +55,14 @@ public class WebSocketSessionRegistry {
} }
public Set<Session> getByPartialMatch(String partialEndpointId) { public Set<Session> getByPartialMatch(String partialEndpointId) {
return sessionsMap return sessionsMap.entrySet().stream()
.entrySet()
.stream()
.filter(it -> it.getKey().contains(partialEndpointId)) .filter(it -> it.getKey().contains(partialEndpointId))
.map(Map.Entry::getValue) .map(Map.Entry::getValue)
.collect(toSet()); .collect(toSet());
} }
public Optional<String> get(Session session) { public Optional<String> get(Session session) {
return sessionsMap return sessionsMap.entrySet().stream()
.entrySet()
.stream()
.filter(entry -> entry.getValue().equals(session)) .filter(entry -> entry.getValue().equals(session))
.map(Map.Entry::getKey) .map(Map.Entry::getKey)
.findAny(); .findAny();

View File

@ -187,9 +187,7 @@ public class CustomSqlMigrationResolver extends BaseMigrationResolver {
final Map<MigrationVersion, ResolvedMigration> migrations = new HashMap<>(); final Map<MigrationVersion, ResolvedMigration> migrations = new HashMap<>();
for (SqlScript script : for (SqlScript script :
scriptsInDir scriptsInDir.values().stream()
.values()
.stream()
.flatMap(scripts -> scripts.values().stream()) .flatMap(scripts -> scripts.values().stream())
.collect(toList())) { .collect(toList())) {
final ResolvedMigrationImpl migration = new ResolvedMigrationImpl(); final ResolvedMigrationImpl migration = new ResolvedMigrationImpl();

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2012-2018 Red Hat, Inc. * Copyright (c) 2012-2021 Red Hat, Inc.
* This program and the accompanying materials are made * This program and the accompanying materials are made
* available under the terms of the Eclipse Public License 2.0 * available under the terms of the Eclipse Public License 2.0
* which is available at https://www.eclipse.org/legal/epl-2.0/ * which is available at https://www.eclipse.org/legal/epl-2.0/
@ -80,8 +80,7 @@ public class TypeScriptDtoGenerator {
List<Class<?>> annotatedWithDtos = List<Class<?>> annotatedWithDtos =
new ArrayList<>(reflections.getTypesAnnotatedWith(DTO.class)); new ArrayList<>(reflections.getTypesAnnotatedWith(DTO.class));
List<Class<?>> interfacesDtos = List<Class<?>> interfacesDtos =
annotatedWithDtos annotatedWithDtos.stream()
.stream()
.filter(clazz -> clazz.isInterface()) .filter(clazz -> clazz.isInterface())
.collect(Collectors.toList()); .collect(Collectors.toList());
interfacesDtos.stream().forEach(this::analyze); interfacesDtos.stream().forEach(this::analyze);

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2012-2018 Red Hat, Inc. * Copyright (c) 2012-2021 Red Hat, Inc.
* This program and the accompanying materials are made * This program and the accompanying materials are made
* available under the terms of the Eclipse Public License 2.0 * available under the terms of the Eclipse Public License 2.0
* which is available at https://www.eclipse.org/legal/epl-2.0/ * which is available at https://www.eclipse.org/legal/epl-2.0/
@ -61,8 +61,7 @@ public class DtoModel {
/** Scan all getter/setter/with methods that are not inherited */ /** Scan all getter/setter/with methods that are not inherited */
protected void analyze() { protected void analyze() {
Arrays.asList(this.dto.getMethods()) Arrays.asList(this.dto.getMethods()).stream()
.stream()
.filter( .filter(
method -> method ->
!method.isBridge() !method.isBridge()
@ -85,9 +84,7 @@ public class DtoModel {
}); });
// now convert map into list // now convert map into list
fieldAttributes fieldAttributes.entrySet().stream()
.entrySet()
.stream()
.forEach( .forEach(
field -> field ->
fieldAttributeModels.add( fieldAttributeModels.add(

View File

@ -257,9 +257,7 @@ public class CheBootstrap extends EverrestGuiceContextListener {
@Override @Override
protected void configure() { protected void configure() {
Iterable<Map.Entry<Object, Object>> cheProperties = Iterable<Map.Entry<Object, Object>> cheProperties =
System.getProperties() System.getProperties().entrySet().stream()
.entrySet()
.stream()
.filter(new PropertyNamePrefixPredicate<>("che.", "codenvy.")) .filter(new PropertyNamePrefixPredicate<>("che.", "codenvy."))
.collect(toList()); .collect(toList());
bindProperties(null, cheProperties); bindProperties(null, cheProperties);
@ -274,9 +272,7 @@ public class CheBootstrap extends EverrestGuiceContextListener {
@Override @Override
protected void configure() { protected void configure() {
Iterable<Map.Entry<String, String>> cheProperties = Iterable<Map.Entry<String, String>> cheProperties =
System.getenv() System.getenv().entrySet().stream()
.entrySet()
.stream()
.filter(new PropertyNamePrefixPredicate<>("CHE_", "CODENVY_")) .filter(new PropertyNamePrefixPredicate<>("CHE_", "CODENVY_"))
.map(new EnvironmentVariableToSystemPropertyFormatNameConverter()) .map(new EnvironmentVariableToSystemPropertyFormatNameConverter())
.collect(toList()); .collect(toList());

View File

@ -516,7 +516,8 @@ public class IoUtil {
public static String countFileHash(File file, MessageDigest digest) throws IOException { public static String countFileHash(File file, MessageDigest digest) throws IOException {
byte[] b = new byte[8192]; byte[] b = new byte[8192];
try (DigestInputStream dis = new DigestInputStream(new FileInputStream(file), digest)) { try (DigestInputStream dis = new DigestInputStream(new FileInputStream(file), digest)) {
while (dis.read(b) != -1) ; while (dis.read(b) != -1)
;
return toHex(digest.digest()); return toHex(digest.digest());
} }
} }

View File

@ -909,14 +909,16 @@ public final class CronExpression implements Serializable, Cloneable {
} }
protected int skipWhiteSpace(int i, String s) { protected int skipWhiteSpace(int i, String s) {
for (; i < s.length() && (s.charAt(i) == ' ' || s.charAt(i) == '\t'); i++) {; for (; i < s.length() && (s.charAt(i) == ' ' || s.charAt(i) == '\t'); i++) {
;
} }
return i; return i;
} }
protected int findNextWhiteSpace(int i, String s) { protected int findNextWhiteSpace(int i, String s) {
for (; i < s.length() && (s.charAt(i) != ' ' || s.charAt(i) != '\t'); i++) {; for (; i < s.length() && (s.charAt(i) != ' ' || s.charAt(i) != '\t'); i++) {
;
} }
return i; return i;

View File

@ -177,9 +177,7 @@ public class KubernetesPersonalAccessTokenManager implements PersonalAccessToken
private String getFirstNamespace() private String getFirstNamespace()
throws UnsatisfiedScmPreconditionException, ScmConfigurationPersistenceException { throws UnsatisfiedScmPreconditionException, ScmConfigurationPersistenceException {
try { try {
return namespaceFactory return namespaceFactory.list().stream()
.list()
.stream()
.map(KubernetesNamespaceMeta::getName) .map(KubernetesNamespaceMeta::getName)
.findFirst() .findFirst()
.orElseThrow( .orElseThrow(

View File

@ -656,10 +656,7 @@ public class KubernetesInternalRuntime<E extends KubernetesEnvironment>
getContext().getIdentity().getWorkspaceId()); getContext().getIdentity().getWorkspaceId());
// get all the pods we care about // get all the pods we care about
Set<String> podNames = Set<String> podNames =
machines machines.getMachines(getContext().getIdentity()).values().stream()
.getMachines(getContext().getIdentity())
.values()
.stream()
.filter(Objects::nonNull) .filter(Objects::nonNull)
.map(KubernetesMachineImpl::getPodName) .map(KubernetesMachineImpl::getPodName)
.filter(Objects::nonNull) .filter(Objects::nonNull)
@ -810,8 +807,7 @@ public class KubernetesInternalRuntime<E extends KubernetesEnvironment>
ObjectMeta toCreateMeta, ObjectMeta toCreateMeta,
List<Container> toCreateContainers, List<Container> toCreateContainers,
Map<String, Map<String, Pod>> injectables) { Map<String, Map<String, Pod>> injectables) {
return toCreateContainers return toCreateContainers.stream()
.stream()
.map(c -> Names.machineName(toCreateMeta, c)) .map(c -> Names.machineName(toCreateMeta, c))
.map(injectables::get) .map(injectables::get)
// we're only interested in pods for which we require injection // we're only interested in pods for which we require injection
@ -1035,9 +1031,7 @@ public class KubernetesInternalRuntime<E extends KubernetesEnvironment>
*/ */
public boolean isConsistent() throws InfrastructureException { public boolean isConsistent() throws InfrastructureException {
Set<String> podNames = Set<String> podNames =
getInternalMachines() getInternalMachines().values().stream()
.values()
.stream()
.map(KubernetesMachineImpl::getPodName) .map(KubernetesMachineImpl::getPodName)
.collect(Collectors.toSet()); .collect(Collectors.toSet());
for (String podName : podNames) { for (String podName : podNames) {

View File

@ -98,13 +98,7 @@ public class ContainerSearch {
return ((StatefulSet) o).getSpec().getTemplate().getSpec().getContainers().stream(); return ((StatefulSet) o).getSpec().getTemplate().getSpec().getContainers().stream();
} else if (o instanceof CronJob) { } else if (o instanceof CronJob) {
return ((CronJob) o) return ((CronJob) o)
.getSpec() .getSpec().getJobTemplate().getSpec().getTemplate().getSpec().getContainers().stream();
.getJobTemplate()
.getSpec()
.getTemplate()
.getSpec()
.getContainers()
.stream();
} else if (o instanceof DeploymentConfig) { } else if (o instanceof DeploymentConfig) {
return ((DeploymentConfig) o).getSpec().getTemplate().getSpec().getContainers().stream(); return ((DeploymentConfig) o).getSpec().getTemplate().getSpec().getContainers().stream();
} else if (o instanceof Template) { } else if (o instanceof Template) {

View File

@ -124,9 +124,7 @@ public class DockerimageComponentToWorkspaceApplier implements ComponentToWorksp
componentObjects, componentObjects,
ImmutableMap.of(machineName, machineConfig)); ImmutableMap.of(machineName, machineConfig));
workspaceConfig workspaceConfig.getCommands().stream()
.getCommands()
.stream()
.filter( .filter(
c -> c ->
componentAlias != null componentAlias != null
@ -177,9 +175,7 @@ public class DockerimageComponentToWorkspaceApplier implements ComponentToWorksp
dockerimageComponent.getMemoryLimit(), dockerimageComponent.getMemoryLimit(),
dockerimageComponent.getCpuRequest(), dockerimageComponent.getCpuRequest(),
dockerimageComponent.getCpuLimit(), dockerimageComponent.getCpuLimit(),
dockerimageComponent dockerimageComponent.getEnv().stream()
.getEnv()
.stream()
.map(e -> new EnvVar(e.getName(), e.getValue(), null)) .map(e -> new EnvVar(e.getName(), e.getValue(), null))
.collect(Collectors.toCollection(ArrayList::new)), .collect(Collectors.toCollection(ArrayList::new)),
dockerimageComponent.getCommand(), dockerimageComponent.getCommand(),

View File

@ -165,8 +165,7 @@ public class KubernetesComponentToWorkspaceApplier implements ComponentToWorkspa
prepareComponentObjects(k8sComponent, componentContent); prepareComponentObjects(k8sComponent, componentContent);
List<PodData> podsData = getPodDatas(componentObjects); List<PodData> podsData = getPodDatas(componentObjects);
podsData podsData.stream()
.stream()
.flatMap( .flatMap(
e -> e ->
Stream.concat( Stream.concat(
@ -205,8 +204,7 @@ public class KubernetesComponentToWorkspaceApplier implements ComponentToWorkspa
} }
private void applyProjectsVolumes(List<PodData> podsData, List<HasMetadata> componentObjects) { private void applyProjectsVolumes(List<PodData> podsData, List<HasMetadata> componentObjects) {
if (componentObjects if (componentObjects.stream()
.stream()
.noneMatch( .noneMatch(
hasMeta -> hasMeta ->
hasMeta instanceof PersistentVolumeClaim hasMeta instanceof PersistentVolumeClaim
@ -221,18 +219,13 @@ public class KubernetesComponentToWorkspaceApplier implements ComponentToWorkspa
} }
for (PodData podData : podsData) { for (PodData podData : podsData) {
if (podData if (podData.getSpec().getVolumes().stream()
.getSpec()
.getVolumes()
.stream()
.noneMatch(volume -> volume.getName().equals(PROJECTS_VOLUME_NAME))) { .noneMatch(volume -> volume.getName().equals(PROJECTS_VOLUME_NAME))) {
Volume volume = newVolume(PROJECTS_VOLUME_NAME, PROJECTS_VOLUME_NAME); Volume volume = newVolume(PROJECTS_VOLUME_NAME, PROJECTS_VOLUME_NAME);
podData.getSpec().getVolumes().add(volume); podData.getSpec().getVolumes().add(volume);
} }
for (Container container : podData.getSpec().getContainers()) { for (Container container : podData.getSpec().getContainers()) {
if (container if (container.getVolumeMounts().stream()
.getVolumeMounts()
.stream()
.noneMatch(mount -> mount.getName().equals(PROJECTS_VOLUME_NAME))) { .noneMatch(mount -> mount.getName().equals(PROJECTS_VOLUME_NAME))) {
VolumeMount volumeMount = newVolumeMount(PROJECTS_VOLUME_NAME, projectFolderPath, null); VolumeMount volumeMount = newVolumeMount(PROJECTS_VOLUME_NAME, projectFolderPath, null);
container.getVolumeMounts().add(volumeMount); container.getVolumeMounts().add(volumeMount);
@ -282,9 +275,7 @@ public class KubernetesComponentToWorkspaceApplier implements ComponentToWorkspa
for (org.eclipse.che.api.workspace.server.model.impl.devfile.VolumeImpl componentVolume : for (org.eclipse.che.api.workspace.server.model.impl.devfile.VolumeImpl componentVolume :
component.getVolumes()) { component.getVolumes()) {
Optional<VolumeMount> sameNameMount = Optional<VolumeMount> sameNameMount =
container container.getVolumeMounts().stream()
.getVolumeMounts()
.stream()
.filter(vm -> vm.getName().equals(componentVolume.getName())) .filter(vm -> vm.getName().equals(componentVolume.getName()))
.findFirst(); .findFirst();
if (sameNameMount.isPresent() if (sameNameMount.isPresent()
@ -299,9 +290,7 @@ public class KubernetesComponentToWorkspaceApplier implements ComponentToWorkspa
getIdentifiableComponentName(component), getIdentifiableComponentName(component),
container.getName())); container.getName()));
} }
if (container if (container.getVolumeMounts().stream()
.getVolumeMounts()
.stream()
.anyMatch(vm -> vm.getMountPath().equals(componentVolume.getContainerPath()))) { .anyMatch(vm -> vm.getMountPath().equals(componentVolume.getContainerPath()))) {
throw new DevfileException( throw new DevfileException(
format( format(
@ -365,9 +354,7 @@ public class KubernetesComponentToWorkspaceApplier implements ComponentToWorkspa
private void linkCommandsToMachineName( private void linkCommandsToMachineName(
WorkspaceConfig workspaceConfig, Component component, Set<String> machinesNames) { WorkspaceConfig workspaceConfig, Component component, Set<String> machinesNames) {
List<? extends Command> componentCommands = List<? extends Command> componentCommands =
workspaceConfig workspaceConfig.getCommands().stream()
.getCommands()
.stream()
.filter( .filter(
c -> c ->
component.getAlias() != null component.getAlias() != null
@ -392,14 +379,12 @@ public class KubernetesComponentToWorkspaceApplier implements ComponentToWorkspa
private List<PodData> getPodDatas(List<HasMetadata> componentsObjects) { private List<PodData> getPodDatas(List<HasMetadata> componentsObjects) {
List<PodData> podsData = new ArrayList<>(); List<PodData> podsData = new ArrayList<>();
componentsObjects componentsObjects.stream()
.stream()
.filter(hasMetadata -> hasMetadata instanceof Pod) .filter(hasMetadata -> hasMetadata instanceof Pod)
.map(hasMetadata -> (Pod) hasMetadata) .map(hasMetadata -> (Pod) hasMetadata)
.forEach(p -> podsData.add(new PodData(p))); .forEach(p -> podsData.add(new PodData(p)));
componentsObjects componentsObjects.stream()
.stream()
.filter(hasMetadata -> hasMetadata instanceof Deployment) .filter(hasMetadata -> hasMetadata instanceof Deployment)
.map(hasMetadata -> (Deployment) hasMetadata) .map(hasMetadata -> (Deployment) hasMetadata)
.forEach(d -> podsData.add(new PodData(d))); .forEach(d -> podsData.add(new PodData(d)));

View File

@ -134,8 +134,7 @@ public class KubernetesEnvironmentProvisioner {
co -> co ->
co instanceof PersistentVolumeClaim co instanceof PersistentVolumeClaim
&& co.getMetadata().getName().equals(PROJECTS_VOLUME_NAME) && co.getMetadata().getName().equals(PROJECTS_VOLUME_NAME)
&& envObjects && envObjects.stream()
.stream()
.filter(envObject -> envObject instanceof PersistentVolumeClaim) .filter(envObject -> envObject instanceof PersistentVolumeClaim)
.anyMatch(pvc -> pvc.equals(co))); .anyMatch(pvc -> pvc.equals(co)));
} }

View File

@ -97,8 +97,7 @@ public class KubernetesRecipeParser {
clientFactory.create().load(new ByteArrayInputStream(recipeContent.getBytes())).get(); clientFactory.create().load(new ByteArrayInputStream(recipeContent.getBytes())).get();
// needed because Che master namespace is set by K8s API during list loading // needed because Che master namespace is set by K8s API during list loading
parsed parsed.stream()
.stream()
.filter(o -> o.getMetadata() != null) .filter(o -> o.getMetadata() != null)
.forEach(o -> o.getMetadata().setNamespace(null)); .forEach(o -> o.getMetadata().setNamespace(null));

View File

@ -92,9 +92,7 @@ public class KubernetesMachineImpl implements Machine {
this.status = status; this.status = status;
this.attributes = attributes; this.attributes = attributes;
this.servers = this.servers =
servers servers.entrySet().stream()
.entrySet()
.stream()
.collect( .collect(
Collectors.toMap( Collectors.toMap(
Map.Entry::getKey, Map.Entry::getKey,

View File

@ -452,9 +452,7 @@ public class KubernetesDeployments {
errorMessage.append("The following containers have terminated:\n"); errorMessage.append("The following containers have terminated:\n");
errorMessage.append( errorMessage.append(
terminatedContainers terminatedContainers.entrySet().stream()
.entrySet()
.stream()
.map(e -> e.getKey() + ": " + e.getValue()) .map(e -> e.getKey() + ": " + e.getValue())
.collect(Collectors.joining("" + "\n"))); .collect(Collectors.joining("" + "\n")));
} }

View File

@ -144,8 +144,7 @@ public class KubernetesNamespaceFactory {
if (isNullOrEmpty(defaultNamespaceName)) { if (isNullOrEmpty(defaultNamespaceName)) {
throw new ConfigurationException("che.infra.kubernetes.namespace.default must be configured"); throw new ConfigurationException("che.infra.kubernetes.namespace.default must be configured");
} else if (REQUIRED_NAMESPACE_NAME_PLACEHOLDERS } else if (REQUIRED_NAMESPACE_NAME_PLACEHOLDERS.stream()
.stream()
.noneMatch(defaultNamespaceName::contains)) { .noneMatch(defaultNamespaceName::contains)) {
throw new ConfigurationException( throw new ConfigurationException(
format( format(
@ -450,8 +449,7 @@ public class KubernetesNamespaceFactory {
List<KubernetesNamespaceMeta> labeledNamespaces = findPreparedNamespaces(resolutionCtx); List<KubernetesNamespaceMeta> labeledNamespaces = findPreparedNamespaces(resolutionCtx);
if (!labeledNamespaces.isEmpty()) { if (!labeledNamespaces.isEmpty()) {
String foundNamespace = String foundNamespace =
labeledNamespaces labeledNamespaces.stream()
.stream()
.findFirst() .findFirst()
.map(KubernetesNamespaceMeta::getName) .map(KubernetesNamespaceMeta::getName)
.orElseThrow( .orElseThrow(
@ -542,8 +540,7 @@ public class KubernetesNamespaceFactory {
cheClientFactory.create().namespaces().withLabels(namespaceLabels).list().getItems(); cheClientFactory.create().namespaces().withLabels(namespaceLabels).list().getItems();
if (!workspaceNamespaces.isEmpty()) { if (!workspaceNamespaces.isEmpty()) {
Map<String, String> evaluatedAnnotations = evaluateAnnotationPlaceholders(namespaceCtx); Map<String, String> evaluatedAnnotations = evaluateAnnotationPlaceholders(namespaceCtx);
return workspaceNamespaces return workspaceNamespaces.stream()
.stream()
.filter(p -> matchesAnnotations(p, evaluatedAnnotations)) .filter(p -> matchesAnnotations(p, evaluatedAnnotations))
.map(this::asNamespaceMeta) .map(this::asNamespaceMeta)
.collect(Collectors.toList()); .collect(Collectors.toList());

View File

@ -76,8 +76,7 @@ public class SshKeysConfigurator implements NamespaceConfigurator {
List<SshPairImpl> vcsSshPairs = getVcsSshPairs(namespaceResolutionContext); List<SshPairImpl> vcsSshPairs = getVcsSshPairs(namespaceResolutionContext);
List<String> invalidSshKeyNames = List<String> invalidSshKeyNames =
vcsSshPairs vcsSshPairs.stream()
.stream()
.filter(keyPair -> !isValidSshKeyPair(keyPair)) .filter(keyPair -> !isValidSshKeyPair(keyPair))
.map(SshPairImpl::getName) .map(SshPairImpl::getName)
.collect(toList()); .collect(toList());

View File

@ -264,10 +264,7 @@ public class CommonPVCStrategy implements WorkspaceVolumesStrategy {
} }
private Set<String> combineVolumeMountsSubpaths(KubernetesEnvironment k8sEnv) { private Set<String> combineVolumeMountsSubpaths(KubernetesEnvironment k8sEnv) {
return k8sEnv return k8sEnv.getPodsData().values().stream()
.getPodsData()
.values()
.stream()
.flatMap(p -> p.getSpec().getContainers().stream()) .flatMap(p -> p.getSpec().getContainers().stream())
.flatMap(c -> c.getVolumeMounts().stream()) .flatMap(c -> c.getVolumeMounts().stream())
.map(VolumeMount::getSubPath) .map(VolumeMount::getSubPath)

View File

@ -70,9 +70,7 @@ public class EphemeralWorkspaceAdapter {
private void replacePVCsWithEmptyDir(KubernetesEnvironment k8sEnv) { private void replacePVCsWithEmptyDir(KubernetesEnvironment k8sEnv) {
for (PodData pod : k8sEnv.getPodsData().values()) { for (PodData pod : k8sEnv.getPodsData().values()) {
PodSpec podSpec = pod.getSpec(); PodSpec podSpec = pod.getSpec();
podSpec podSpec.getVolumes().stream()
.getVolumes()
.stream()
.filter(v -> v.getPersistentVolumeClaim() != null) .filter(v -> v.getPersistentVolumeClaim() != null)
.forEach( .forEach(
v -> { v -> {

View File

@ -195,9 +195,7 @@ public class PVCProvisioner {
String pvcName = pvc.getMetadata().getName(); String pvcName = pvc.getMetadata().getName();
PodSpec podSpec = pod.getSpec(); PodSpec podSpec = pod.getSpec();
Optional<io.fabric8.kubernetes.api.model.Volume> volumeOpt = Optional<io.fabric8.kubernetes.api.model.Volume> volumeOpt =
podSpec podSpec.getVolumes().stream()
.getVolumes()
.stream()
.filter( .filter(
volume -> volume ->
volume.getPersistentVolumeClaim() != null volume.getPersistentVolumeClaim() != null

View File

@ -84,9 +84,7 @@ public class CertificateProvisioner implements ConfigurationProvisioner<Kubernet
for (PodData pod : k8sEnv.getPodsData().values()) { for (PodData pod : k8sEnv.getPodsData().values()) {
if (pod.getRole() == PodRole.DEPLOYMENT) { if (pod.getRole() == PodRole.DEPLOYMENT) {
if (pod.getSpec() if (pod.getSpec().getVolumes().stream()
.getVolumes()
.stream()
.noneMatch(v -> v.getName().equals(CHE_SELF_SIGNED_CERT_VOLUME))) { .noneMatch(v -> v.getName().equals(CHE_SELF_SIGNED_CERT_VOLUME))) {
pod.getSpec().getVolumes().add(buildCertSecretVolume(selfSignedCertSecretName)); pod.getSpec().getVolumes().add(buildCertSecretVolume(selfSignedCertSecretName));
} }
@ -102,9 +100,7 @@ public class CertificateProvisioner implements ConfigurationProvisioner<Kubernet
} }
private void provisionCertVolumeMountIfNeeded(Container container) { private void provisionCertVolumeMountIfNeeded(Container container) {
if (container if (container.getVolumeMounts().stream()
.getVolumeMounts()
.stream()
.noneMatch(vm -> vm.getName().equals(CHE_SELF_SIGNED_CERT_VOLUME))) { .noneMatch(vm -> vm.getName().equals(CHE_SELF_SIGNED_CERT_VOLUME))) {
container.getVolumeMounts().add(buildCertVolumeMount()); container.getVolumeMounts().add(buildCertVolumeMount());
} }

View File

@ -127,9 +127,7 @@ public class KubernetesTrustedCAProvisioner implements TrustedCAProvisioner {
for (PodData pod : k8sEnv.getPodsData().values()) { for (PodData pod : k8sEnv.getPodsData().values()) {
if (pod.getRole() == PodRole.DEPLOYMENT) { if (pod.getRole() == PodRole.DEPLOYMENT) {
if (pod.getSpec() if (pod.getSpec().getVolumes().stream()
.getVolumes()
.stream()
.noneMatch(v -> v.getName().equals(CHE_TRUST_STORE_VOLUME))) { .noneMatch(v -> v.getName().equals(CHE_TRUST_STORE_VOLUME))) {
pod.getSpec() pod.getSpec()
.getVolumes() .getVolumes()
@ -151,9 +149,7 @@ public class KubernetesTrustedCAProvisioner implements TrustedCAProvisioner {
} }
private void provisionTrustStoreVolumeMountIfNeeded(Container container) { private void provisionTrustStoreVolumeMountIfNeeded(Container container) {
if (container if (container.getVolumeMounts().stream()
.getVolumeMounts()
.stream()
.noneMatch(vm -> vm.getName().equals(CHE_TRUST_STORE_VOLUME))) { .noneMatch(vm -> vm.getName().equals(CHE_TRUST_STORE_VOLUME))) {
container container
.getVolumeMounts() .getVolumeMounts()

View File

@ -67,8 +67,7 @@ public abstract class PreviewUrlCommandProvisioner<
List<T> exposureObjects = loadExposureObjects(namespace); List<T> exposureObjects = loadExposureObjects(namespace);
List<Service> services = namespace.services().get(); List<Service> services = namespace.services().get();
for (CommandImpl command : for (CommandImpl command :
env.getCommands() env.getCommands().stream()
.stream()
.filter(c -> c.getPreviewUrl() != null) .filter(c -> c.getPreviewUrl() != null)
.collect(Collectors.toList())) { .collect(Collectors.toList())) {
Optional<Service> foundService = Optional<Service> foundService =

View File

@ -62,10 +62,7 @@ public class ProxySettingsProvisioner implements ConfigurationProvisioner {
TracingTags.WORKSPACE_ID.set(identity::getWorkspaceId); TracingTags.WORKSPACE_ID.set(identity::getWorkspaceId);
if (!proxyEnvVars.isEmpty()) { if (!proxyEnvVars.isEmpty()) {
k8sEnv k8sEnv.getPodsData().entrySet().stream()
.getPodsData()
.entrySet()
.stream()
// JWTProxy container doesn't need proxy settings since it never does any outbound // JWTProxy container doesn't need proxy settings since it never does any outbound
// requests, and setting of it may fail accessing internal addresses. // requests, and setting of it may fail accessing internal addresses.
.filter(entry -> !entry.getKey().equals(JWT_PROXY_POD_NAME)) .filter(entry -> !entry.getKey().equals(JWT_PROXY_POD_NAME))

View File

@ -124,8 +124,7 @@ public class SshKeysProvisioner implements ConfigurationProvisioner<KubernetesEn
allSshPairs.addAll(systemSshPairs); allSshPairs.addAll(systemSshPairs);
List<String> invalidSshKeyNames = List<String> invalidSshKeyNames =
allSshPairs allSshPairs.stream()
.stream()
.filter(keyPair -> !isValidSshKeyPair(keyPair)) .filter(keyPair -> !isValidSshKeyPair(keyPair))
.map(SshPairImpl::getName) .map(SshPairImpl::getName)
.collect(toList()); .collect(toList());
@ -220,8 +219,7 @@ public class SshKeysProvisioner implements ConfigurationProvisioner<KubernetesEn
List<SshPairImpl> sshPairs, KubernetesEnvironment k8sEnv, String wsId) { List<SshPairImpl> sshPairs, KubernetesEnvironment k8sEnv, String wsId) {
Map<String, String> data = Map<String, String> data =
sshPairs sshPairs.stream()
.stream()
.filter(sshPair -> !isNullOrEmpty(sshPair.getPrivateKey())) .filter(sshPair -> !isNullOrEmpty(sshPair.getPrivateKey()))
.collect( .collect(
toMap( toMap(

View File

@ -108,9 +108,7 @@ public class UniqueNamesProvisioner<T extends KubernetesEnvironment>
for (Container container : pod.getSpec().getContainers()) { for (Container container : pod.getSpec().getContainers()) {
// Can set env vars to key/value pairs in configmap // Can set env vars to key/value pairs in configmap
if (container.getEnv() != null) { if (container.getEnv() != null) {
container container.getEnv().stream()
.getEnv()
.stream()
.filter( .filter(
env -> env ->
env.getValueFrom() != null && env.getValueFrom().getConfigMapKeyRef() != null) env.getValueFrom() != null && env.getValueFrom().getConfigMapKeyRef() != null)
@ -128,9 +126,7 @@ public class UniqueNamesProvisioner<T extends KubernetesEnvironment>
} }
if (container.getEnvFrom() != null) { if (container.getEnvFrom() != null) {
// Can use all entries in configMap as env vars // Can use all entries in configMap as env vars
container container.getEnvFrom().stream()
.getEnvFrom()
.stream()
.filter(envFrom -> envFrom.getConfigMapRef() != null) .filter(envFrom -> envFrom.getConfigMapRef() != null)
.forEach( .forEach(
envFrom -> { envFrom -> {
@ -145,8 +141,7 @@ public class UniqueNamesProvisioner<T extends KubernetesEnvironment>
// Next update any mounted configMaps // Next update any mounted configMaps
List<Volume> volumes = pod.getSpec().getVolumes(); List<Volume> volumes = pod.getSpec().getVolumes();
if (pod.getSpec().getVolumes() != null) { if (pod.getSpec().getVolumes() != null) {
volumes volumes.stream()
.stream()
.filter(vol -> vol.getConfigMap() != null) .filter(vol -> vol.getConfigMap() != null)
.forEach( .forEach(
volume -> { volume -> {

View File

@ -104,9 +104,7 @@ public class VcsSslCertificateProvisioner
for (PodData pod : k8sEnv.getPodsData().values()) { for (PodData pod : k8sEnv.getPodsData().values()) {
if (pod.getRole() != PodRole.INJECTABLE) { if (pod.getRole() != PodRole.INJECTABLE) {
if (pod.getSpec() if (pod.getSpec().getVolumes().stream()
.getVolumes()
.stream()
.noneMatch(v -> v.getName().equals(CHE_GIT_SELF_SIGNED_VOLUME))) { .noneMatch(v -> v.getName().equals(CHE_GIT_SELF_SIGNED_VOLUME))) {
pod.getSpec().getVolumes().add(buildCertVolume(selfSignedCertConfigMapName)); pod.getSpec().getVolumes().add(buildCertVolume(selfSignedCertConfigMapName));
} }
@ -122,9 +120,7 @@ public class VcsSslCertificateProvisioner
} }
private void provisionCertVolumeMountIfNeeded(Container container) { private void provisionCertVolumeMountIfNeeded(Container container) {
if (container if (container.getVolumeMounts().stream()
.getVolumeMounts()
.stream()
.noneMatch(vm -> vm.getName().equals(CHE_GIT_SELF_SIGNED_VOLUME))) { .noneMatch(vm -> vm.getName().equals(CHE_GIT_SELF_SIGNED_VOLUME))) {
container.getVolumeMounts().add(buildCertVolumeMount()); container.getVolumeMounts().add(buildCertVolumeMount());
} }

View File

@ -58,10 +58,7 @@ public class EnvVarsConverter implements ConfigurationProvisioner {
// we need to combine the env vars from the machine config with the variables already // we need to combine the env vars from the machine config with the variables already
// present in the container. Let's key the variables by name and use the map for merging // present in the container. Let's key the variables by name and use the map for merging
Map<String, EnvVar> envVars = Map<String, EnvVar> envVars =
machineConf machineConf.getEnv().entrySet().stream()
.getEnv()
.entrySet()
.stream()
.map(e -> new EnvVar(e.getKey(), e.getValue(), null)) .map(e -> new EnvVar(e.getKey(), e.getValue(), null))
.collect(toMap(EnvVar::getName, identity())); .collect(toMap(EnvVar::getName, identity()));

View File

@ -94,10 +94,7 @@ public class FileSecretApplier extends KubernetesSecretApplier<KubernetesEnviron
if (!podData.getRole().equals(PodRole.DEPLOYMENT)) { if (!podData.getRole().equals(PodRole.DEPLOYMENT)) {
continue; continue;
} }
if (podData if (podData.getSpec().getVolumes().stream()
.getSpec()
.getVolumes()
.stream()
.anyMatch(v -> v.getName().equals(volumeFromSecret.getName()))) { .anyMatch(v -> v.getName().equals(volumeFromSecret.getName()))) {
volumeFromSecret.setName(volumeFromSecret.getName() + "_" + NameGenerator.generate("", 6)); volumeFromSecret.setName(volumeFromSecret.getName() + "_" + NameGenerator.generate("", 6));
} }
@ -135,10 +132,7 @@ public class FileSecretApplier extends KubernetesSecretApplier<KubernetesEnviron
container container
.getVolumeMounts() .getVolumeMounts()
.addAll( .addAll(
secret secret.getData().keySet().stream()
.getData()
.keySet()
.stream()
.map( .map(
secretFile -> secretFile ->
buildVolumeMount(volumeFromSecret, componentMountPath, secretFile)) buildVolumeMount(volumeFromSecret, componentMountPath, secretFile))

View File

@ -53,9 +53,7 @@ public abstract class KubernetesSecretApplier<E extends KubernetesEnvironment> {
String componentName = String componentName =
internalMachineConfig.getAttributes().get(DEVFILE_COMPONENT_ALIAS_ATTRIBUTE); internalMachineConfig.getAttributes().get(DEVFILE_COMPONENT_ALIAS_ATTRIBUTE);
if (componentName != null) { if (componentName != null) {
return env.getDevfile() return env.getDevfile().getComponents().stream()
.getComponents()
.stream()
.filter(c -> componentName.equals(c.getAlias())) .filter(c -> componentName.equals(c.getAlias()))
.findFirst(); .findFirst();
} }

View File

@ -336,9 +336,7 @@ public class KubernetesServerExposer<T extends KubernetesEnvironment> {
private Map<String, ServerConfig> match( private Map<String, ServerConfig> match(
Map<String, ServerConfig> servers, ServicePort servicePort) { Map<String, ServerConfig> servers, ServicePort servicePort) {
int port = servicePort.getTargetPort().getIntVal(); int port = servicePort.getTargetPort().getIntVal();
return servers return servers.entrySet().stream()
.entrySet()
.stream()
.filter(e -> parseInt(e.getValue().getPort().split("/")[0]) == port) .filter(e -> parseInt(e.getValue().getPort().split("/")[0]) == port)
.collect(toMap(Map.Entry::getKey, Map.Entry::getValue)); .collect(toMap(Map.Entry::getKey, Map.Entry::getValue));
} }
@ -356,9 +354,7 @@ public class KubernetesServerExposer<T extends KubernetesEnvironment> {
} }
private void exposeInContainerIfNeeded(ServicePort servicePort) { private void exposeInContainerIfNeeded(ServicePort servicePort) {
if (container if (container.getPorts().stream()
.getPorts()
.stream()
.noneMatch( .noneMatch(
p -> p ->
p.getContainerPort().equals(servicePort.getPort()) p.getContainerPort().equals(servicePort.getPort())

View File

@ -59,8 +59,7 @@ public class PreviewUrlExposer<T extends KubernetesEnvironment> {
public void expose(T env) throws InternalInfrastructureException { public void expose(T env) throws InternalInfrastructureException {
List<CommandImpl> previewUrlCommands = List<CommandImpl> previewUrlCommands =
env.getCommands() env.getCommands().stream()
.stream()
.filter(c -> c.getPreviewUrl() != null) .filter(c -> c.getPreviewUrl() != null)
.collect(Collectors.toList()); .collect(Collectors.toList());

View File

@ -87,9 +87,7 @@ public class CombinedSingleHostServerExposer<T extends KubernetesEnvironment>
@Override @Override
public Map<String, ServerConfig> getStrategyConformingServers( public Map<String, ServerConfig> getStrategyConformingServers(
Map<String, ServerConfig> externalServers) { Map<String, ServerConfig> externalServers) {
return externalServers return externalServers.entrySet().stream()
.entrySet()
.stream()
.filter(e -> !e.getValue().isRequireSubdomain()) .filter(e -> !e.getValue().isRequireSubdomain())
.collect(toMap(Map.Entry::getKey, Map.Entry::getValue)); .collect(toMap(Map.Entry::getKey, Map.Entry::getValue));
} }
@ -97,9 +95,7 @@ public class CombinedSingleHostServerExposer<T extends KubernetesEnvironment>
@Override @Override
public Map<String, ServerConfig> getServersRequiringSubdomain( public Map<String, ServerConfig> getServersRequiringSubdomain(
Map<String, ServerConfig> externalServers) { Map<String, ServerConfig> externalServers) {
return externalServers return externalServers.entrySet().stream()
.entrySet()
.stream()
.filter(e -> e.getValue().isRequireSubdomain()) .filter(e -> e.getValue().isRequireSubdomain())
.collect(toMap(Map.Entry::getKey, Map.Entry::getValue)); .collect(toMap(Map.Entry::getKey, Map.Entry::getValue));
} }

View File

@ -83,9 +83,7 @@ public abstract class AbstractServerResolver implements ServerResolver {
} }
private Map<String, ServerImpl> resolveInternalServers(String machineName) { private Map<String, ServerImpl> resolveInternalServers(String machineName) {
return services return services.get(machineName).stream()
.get(machineName)
.stream()
.map(this::resolveServiceServers) .map(this::resolveServiceServers)
.flatMap(s -> s.entrySet().stream()) .flatMap(s -> s.entrySet().stream())
.collect(Collectors.toMap(Entry::getKey, Entry::getValue, (s1, s2) -> s2)); .collect(Collectors.toMap(Entry::getKey, Entry::getValue, (s1, s2) -> s2));

View File

@ -54,9 +54,7 @@ public class ConfigMapServerResolver extends AbstractServerResolver {
Map<String, ServerImpl> serverMap = new HashMap<>(); Map<String, ServerImpl> serverMap = new HashMap<>();
serverMap.putAll(nativeServerResolver.resolveExternalServers(machineName)); serverMap.putAll(nativeServerResolver.resolveExternalServers(machineName));
serverMap.putAll( serverMap.putAll(
configMaps configMaps.get(machineName).stream()
.get(machineName)
.stream()
.map(this::fillGatewayServers) .map(this::fillGatewayServers)
.flatMap(m -> m.entrySet().stream()) .flatMap(m -> m.entrySet().stream())
.collect(Collectors.toMap(Entry::getKey, Entry::getValue, (s1, s2) -> s2))); .collect(Collectors.toMap(Entry::getKey, Entry::getValue, (s1, s2) -> s2)));

View File

@ -59,9 +59,7 @@ public class IngressServerResolver extends AbstractServerResolver {
@Override @Override
public Map<String, ServerImpl> resolveExternalServers(String machineName) { public Map<String, ServerImpl> resolveExternalServers(String machineName) {
return ingresses return ingresses.get(machineName).stream()
.get(machineName)
.stream()
.map(this::fillIngressServers) .map(this::fillIngressServers)
.flatMap(m -> m.entrySet().stream()) .flatMap(m -> m.entrySet().stream())
.collect(Collectors.toMap(Entry::getKey, Entry::getValue, (v1, v2) -> v2)); .collect(Collectors.toMap(Entry::getKey, Entry::getValue, (v1, v2) -> v2));

View File

@ -29,10 +29,7 @@ public class Services {
if (service == null || service.getSpec() == null || service.getSpec().getPorts() == null) { if (service == null || service.getSpec() == null || service.getSpec().getPorts() == null) {
return Optional.empty(); return Optional.empty();
} }
return service return service.getSpec().getPorts().stream()
.getSpec()
.getPorts()
.stream()
.filter(p -> p.getPort() != null && p.getPort() == port) .filter(p -> p.getPort() != null && p.getPort() == port)
.findFirst(); .findFirst();
} }

View File

@ -62,10 +62,7 @@ public class UnrecoverablePodEventListenerFactory {
} }
Set<String> toWatch = Set<String> toWatch =
environment environment.getPodsData().values().stream()
.getPodsData()
.values()
.stream()
.map(podData -> podData.getMetadata().getName()) .map(podData -> podData.getMetadata().getName())
.collect(Collectors.toSet()); .collect(Collectors.toSet());

View File

@ -82,9 +82,7 @@ public class ChePluginsVolumeApplier {
PodSpec podSpec = pod.getSpec(); PodSpec podSpec = pod.getSpec();
Optional<io.fabric8.kubernetes.api.model.Volume> volumeOpt = Optional<io.fabric8.kubernetes.api.model.Volume> volumeOpt =
podSpec podSpec.getVolumes().stream()
.getVolumes()
.stream()
.filter( .filter(
vm -> vm ->
vm.getPersistentVolumeClaim() != null vm.getPersistentVolumeClaim() != null
@ -101,9 +99,7 @@ public class ChePluginsVolumeApplier {
} }
private void addEmptyDirVolumeIfAbsent(PodSpec podSpec, String uniqueVolumeName) { private void addEmptyDirVolumeIfAbsent(PodSpec podSpec, String uniqueVolumeName) {
if (podSpec if (podSpec.getVolumes().stream()
.getVolumes()
.stream()
.noneMatch(volume -> volume.getName().equals(uniqueVolumeName))) { .noneMatch(volume -> volume.getName().equals(uniqueVolumeName))) {
podSpec podSpec
.getVolumes() .getVolumes()

View File

@ -180,8 +180,7 @@ public class K8sContainerResolver {
} }
private List<ContainerPort> getContainerPorts() { private List<ContainerPort> getContainerPorts() {
return containerEndpoints return containerEndpoints.stream()
.stream()
.map( .map(
endpoint -> endpoint ->
new ContainerPortBuilder() new ContainerPortBuilder()

View File

@ -55,8 +55,7 @@ public class K8sContainerResolverBuilder {
if (ports == null || ports.isEmpty()) { if (ports == null || ports.isEmpty()) {
return Collections.emptyList(); return Collections.emptyList();
} }
return ports return ports.stream()
.stream()
.map(CheContainerPort::getExposedPort) .map(CheContainerPort::getExposedPort)
.flatMap(port -> endpoints.stream().filter(e -> e.getTargetPort() == port)) .flatMap(port -> endpoints.stream().filter(e -> e.getTargetPort() == port))
.collect(Collectors.toList()); .collect(Collectors.toList());

View File

@ -136,10 +136,7 @@ public class KubernetesPluginsToolingApplier implements ChePluginsApplier {
CommandsResolver commandsResolver = new CommandsResolver(k8sEnv); CommandsResolver commandsResolver = new CommandsResolver(k8sEnv);
for (ChePlugin chePlugin : chePlugins) { for (ChePlugin chePlugin : chePlugins) {
Map<String, ComponentImpl> devfilePlugins = Map<String, ComponentImpl> devfilePlugins =
k8sEnv k8sEnv.getDevfile().getComponents().stream()
.getDevfile()
.getComponents()
.stream()
.filter(c -> c.getType().equals("cheEditor") || c.getType().equals("chePlugin")) .filter(c -> c.getType().equals("cheEditor") || c.getType().equals("chePlugin"))
.collect(Collectors.toMap(ComponentImpl::getId, Function.identity())); .collect(Collectors.toMap(ComponentImpl::getId, Function.identity()));
if (!devfilePlugins.containsKey(chePlugin.getId())) { if (!devfilePlugins.containsKey(chePlugin.getId())) {
@ -192,10 +189,7 @@ public class KubernetesPluginsToolingApplier implements ChePluginsApplier {
ChePlugin chePlugin, KubernetesEnvironment kubernetesEnvironment) { ChePlugin chePlugin, KubernetesEnvironment kubernetesEnvironment) {
List<EnvVar> workspaceEnv = toK8sEnvVars(chePlugin.getWorkspaceEnv()); List<EnvVar> workspaceEnv = toK8sEnvVars(chePlugin.getWorkspaceEnv());
kubernetesEnvironment kubernetesEnvironment.getPodsData().values().stream()
.getPodsData()
.values()
.stream()
.flatMap(pod -> pod.getSpec().getContainers().stream()) .flatMap(pod -> pod.getSpec().getContainers().stream())
.forEach(container -> container.getEnv().addAll(workspaceEnv)); .forEach(container -> container.getEnv().addAll(workspaceEnv));
} }
@ -205,8 +199,7 @@ public class KubernetesPluginsToolingApplier implements ChePluginsApplier {
if (workspaceEnv == null) { if (workspaceEnv == null) {
return emptyList(); return emptyList();
} }
return workspaceEnv return workspaceEnv.stream()
.stream()
.map(e -> new EnvVar(e.getName(), e.getValue(), null)) .map(e -> new EnvVar(e.getName(), e.getValue(), null))
.collect(Collectors.toList()); .collect(Collectors.toList());
} }
@ -280,9 +273,7 @@ public class KubernetesPluginsToolingApplier implements ChePluginsApplier {
org.eclipse.che.api.core.model.workspace.config.Command.MACHINE_NAME_ATTRIBUTE, org.eclipse.che.api.core.model.workspace.config.Command.MACHINE_NAME_ATTRIBUTE,
machineName)); machineName));
container container.getCommands().stream()
.getCommands()
.stream()
.map(c -> asCommand(machineName, c)) .map(c -> asCommand(machineName, c))
.forEach(c -> k8sEnv.getCommands().add(c)); .forEach(c -> k8sEnv.getCommands().add(c));

View File

@ -145,10 +145,7 @@ public class KubernetesArtifactsBrokerApplierTest {
assertNotNull(workspaceConfigMap); assertNotNull(workspaceConfigMap);
assertFalse(workspaceConfigMap.getData().isEmpty()); assertFalse(workspaceConfigMap.getData().isEmpty());
assertTrue( assertTrue(
workspaceConfigMap workspaceConfigMap.getData().entrySet().stream()
.getData()
.entrySet()
.stream()
.allMatch(e -> brokerConfigMap.getData().get(e.getKey()).equals(e.getValue()))); .allMatch(e -> brokerConfigMap.getData().get(e.getKey()).equals(e.getValue())));
} }

View File

@ -1003,12 +1003,7 @@ public class KubernetesInternalRuntimeTest {
assertEquals(depls.size(), 1); assertEquals(depls.size(), 1);
Deployment deployedPod = depls.get(0); Deployment deployedPod = depls.get(0);
List<String> containerNames = List<String> containerNames =
deployedPod deployedPod.getSpec().getTemplate().getSpec().getContainers().stream()
.getSpec()
.getTemplate()
.getSpec()
.getContainers()
.stream()
.map(Container::getName) .map(Container::getName)
.collect(toList()); .collect(toList());
@ -1060,12 +1055,7 @@ public class KubernetesInternalRuntimeTest {
assertEquals(depls.size(), 1); assertEquals(depls.size(), 1);
Deployment deployedPod = depls.get(0); Deployment deployedPod = depls.get(0);
List<String> containerNames = List<String> containerNames =
deployedPod deployedPod.getSpec().getTemplate().getSpec().getContainers().stream()
.getSpec()
.getTemplate()
.getSpec()
.getContainers()
.stream()
.map(Container::getName) .map(Container::getName)
.collect(toList()); .collect(toList());
@ -1155,12 +1145,7 @@ public class KubernetesInternalRuntimeTest {
assertEquals(depls.size(), 1); assertEquals(depls.size(), 1);
Deployment deployedPod = depls.get(0); Deployment deployedPod = depls.get(0);
List<String> containerNames = List<String> containerNames =
deployedPod deployedPod.getSpec().getTemplate().getSpec().getContainers().stream()
.getSpec()
.getTemplate()
.getSpec()
.getContainers()
.stream()
.map(Container::getName) .map(Container::getName)
.collect(toList()); .collect(toList());
@ -1528,9 +1513,7 @@ public class KubernetesInternalRuntimeTest {
@Override @Override
public Map<String, KubernetesMachineImpl> getMachines(RuntimeIdentity runtimeIdentity) { public Map<String, KubernetesMachineImpl> getMachines(RuntimeIdentity runtimeIdentity) {
return machines return machines.entrySet().stream()
.entrySet()
.stream()
.filter(e -> e.getKey().getWorkspaceId().equals(runtimeIdentity.getWorkspaceId())) .filter(e -> e.getKey().getWorkspaceId().equals(runtimeIdentity.getWorkspaceId()))
.collect(toMap(e -> e.getValue().getName(), Entry::getValue)); .collect(toMap(e -> e.getValue().getName(), Entry::getValue));
} }

View File

@ -241,10 +241,7 @@ public class KubernetesMachinesCacheTest {
// then // then
Optional<KubernetesMachineImpl> machineOpt = Optional<KubernetesMachineImpl> machineOpt =
machineCache machineCache.getMachines(runtimeId).entrySet().stream()
.getMachines(runtimeId)
.entrySet()
.stream()
.filter(e -> e.getKey().equals(machineName)) .filter(e -> e.getKey().equals(machineName))
.map(Map.Entry::getValue) .map(Map.Entry::getValue)
.findAny(); .findAny();

View File

@ -355,8 +355,7 @@ public class ContainerSearchTest {
} }
private static void assertContainsContainer(Collection<Container> containers, String name) { private static void assertContainsContainer(Collection<Container> containers, String name) {
containers containers.stream()
.stream()
.filter(c -> name.equals(c.getName())) .filter(c -> name.equals(c.getName()))
.findAny() .findAny()
.orElseThrow( .orElseThrow(

View File

@ -262,9 +262,7 @@ public class KubernetesComponentToWorkspaceApplierTest {
} }
// Make sure volume is created // Make sure volume is created
assertTrue( assertTrue(
p.getSpec() p.getSpec().getVolumes().stream()
.getVolumes()
.stream()
.anyMatch( .anyMatch(
v -> v ->
v.getName().equals(PROJECTS_VOLUME_NAME) v.getName().equals(PROJECTS_VOLUME_NAME)
@ -274,8 +272,7 @@ public class KubernetesComponentToWorkspaceApplierTest {
for (Container c : p.getSpec().getContainers()) { for (Container c : p.getSpec().getContainers()) {
assertEquals(c.getImagePullPolicy(), "Always"); assertEquals(c.getImagePullPolicy(), "Always");
assertTrue( assertTrue(
c.getVolumeMounts() c.getVolumeMounts().stream()
.stream()
.anyMatch( .anyMatch(
vm -> vm ->
vm.getName().equals(PROJECTS_VOLUME_NAME) vm.getName().equals(PROJECTS_VOLUME_NAME)
@ -308,18 +305,12 @@ public class KubernetesComponentToWorkspaceApplierTest {
for (MachineConfig config : configMaps.values()) { for (MachineConfig config : configMaps.values()) {
assertEquals(config.getVolumes().size(), 2); assertEquals(config.getVolumes().size(), 2);
assertTrue( assertTrue(
config config.getVolumes().entrySet().stream()
.getVolumes()
.entrySet()
.stream()
.anyMatch( .anyMatch(
entry -> entry ->
entry.getKey().equals("foo") && entry.getValue().getPath().equals("/foo1"))); entry.getKey().equals("foo") && entry.getValue().getPath().equals("/foo1")));
assertTrue( assertTrue(
config config.getVolumes().entrySet().stream()
.getVolumes()
.entrySet()
.stream()
.anyMatch( .anyMatch(
entry -> entry ->
entry.getKey().equals("bar") && entry.getValue().getPath().equals("/bar1"))); entry.getKey().equals("bar") && entry.getValue().getPath().equals("/bar1")));
@ -423,9 +414,7 @@ public class KubernetesComponentToWorkspaceApplierTest {
verify(k8sEnvProvisioner).provision(any(), any(), any(), mapCaptor.capture()); verify(k8sEnvProvisioner).provision(any(), any(), any(), mapCaptor.capture());
Map<String, MachineConfigImpl> machines = mapCaptor.getValue(); Map<String, MachineConfigImpl> machines = mapCaptor.getValue();
assertTrue( assertTrue(
machines machines.values().stream()
.values()
.stream()
.allMatch( .allMatch(
config -> config ->
config config
@ -809,8 +798,7 @@ public class KubernetesComponentToWorkspaceApplierTest {
} }
private void replaceImagePullPolicy(KubernetesList list, String imagePullPolicy) { private void replaceImagePullPolicy(KubernetesList list, String imagePullPolicy) {
list.getItems() list.getItems().stream()
.stream()
.filter(item -> item instanceof Pod) .filter(item -> item instanceof Pod)
.map(item -> (Pod) item) .map(item -> (Pod) item)
.filter(pod -> pod.getSpec() != null) .filter(pod -> pod.getSpec() != null)

View File

@ -360,10 +360,7 @@ public class KubernetesEnvironmentFactoryTest {
PodData mergedPodData = k8sEnv.getPodsData().get("merged"); PodData mergedPodData = k8sEnv.getPodsData().get("merged");
assertEquals(mergedPodData.getMetadata().getLabels().get(DEPLOYMENT_NAME_LABEL), "merged"); assertEquals(mergedPodData.getMetadata().getLabels().get(DEPLOYMENT_NAME_LABEL), "merged");
assertTrue( assertTrue(
k8sEnv k8sEnv.getServices().values().stream()
.getServices()
.values()
.stream()
.allMatch( .allMatch(
s -> s ->
ImmutableMap.of(DEPLOYMENT_NAME_LABEL, "merged") ImmutableMap.of(DEPLOYMENT_NAME_LABEL, "merged")

View File

@ -277,8 +277,7 @@ public class PodMergerTest {
public void shouldBeAbleToMergeTerminationGracePeriodS( public void shouldBeAbleToMergeTerminationGracePeriodS(
List<Long> terminationGracePeriods, Long expectedResultLong) throws ValidationException { List<Long> terminationGracePeriods, Long expectedResultLong) throws ValidationException {
List<PodData> podData = List<PodData> podData =
terminationGracePeriods terminationGracePeriods.stream()
.stream()
.map( .map(
p -> p ->
new PodData( new PodData(

View File

@ -892,9 +892,7 @@ public class KubernetesNamespaceFactoryTest {
"exec")); "exec"));
RoleBindingList bindings = k8sClient.rbac().roleBindings().inNamespace("workspace123").list(); RoleBindingList bindings = k8sClient.rbac().roleBindings().inNamespace("workspace123").list();
assertEquals( assertEquals(
bindings bindings.getItems().stream()
.getItems()
.stream()
.map(r -> r.getMetadata().getName()) .map(r -> r.getMetadata().getName())
.collect(Collectors.toSet()), .collect(Collectors.toSet()),
Sets.newHashSet( Sets.newHashSet(
@ -941,13 +939,7 @@ public class KubernetesNamespaceFactoryTest {
// then // then
Optional<Role> roleOptional = Optional<Role> roleOptional =
k8sClient k8sClient.rbac().roles().inNamespace("workspace123").list().getItems().stream()
.rbac()
.roles()
.inNamespace("workspace123")
.list()
.getItems()
.stream()
.filter(r -> r.getMetadata().getName().equals(SECRETS_ROLE_NAME)) .filter(r -> r.getMetadata().getName().equals(SECRETS_ROLE_NAME))
.findAny(); .findAny();
assertTrue(roleOptional.isPresent()); assertTrue(roleOptional.isPresent());
@ -957,13 +949,7 @@ public class KubernetesNamespaceFactoryTest {
assertEquals(rule.getApiGroups(), singletonList("")); assertEquals(rule.getApiGroups(), singletonList(""));
assertEquals(rule.getVerbs(), Arrays.asList("get", "patch")); assertEquals(rule.getVerbs(), Arrays.asList("get", "patch"));
assertTrue( assertTrue(
k8sClient k8sClient.rbac().roleBindings().inNamespace("workspace123").list().getItems().stream()
.rbac()
.roleBindings()
.inNamespace("workspace123")
.list()
.getItems()
.stream()
.anyMatch(rb -> rb.getMetadata().getName().equals("serviceAccount-secrets"))); .anyMatch(rb -> rb.getMetadata().getName().equals("serviceAccount-secrets")));
} }
@ -1024,9 +1010,7 @@ public class KubernetesNamespaceFactoryTest {
RoleBindingList bindings = k8sClient.rbac().roleBindings().inNamespace("workspace123").list(); RoleBindingList bindings = k8sClient.rbac().roleBindings().inNamespace("workspace123").list();
assertEquals( assertEquals(
bindings bindings.getItems().stream()
.getItems()
.stream()
.map(r -> r.getMetadata().getName()) .map(r -> r.getMetadata().getName())
.collect(Collectors.toSet()), .collect(Collectors.toSet()),
Sets.newHashSet( Sets.newHashSet(

View File

@ -115,8 +115,7 @@ public class KubernetesWorkspaceServiceAccountTest {
RoleBindingList rbl = k8sClient.rbac().roleBindings().inNamespace(NAMESPACE).list(); RoleBindingList rbl = k8sClient.rbac().roleBindings().inNamespace(NAMESPACE).list();
assertTrue( assertTrue(
rbl.getItems() rbl.getItems().stream()
.stream()
.anyMatch(rb -> rb.getMetadata().getName().equals(SA_NAME + "-metrics"))); .anyMatch(rb -> rb.getMetadata().getName().equals(SA_NAME + "-metrics")));
} }
@ -137,8 +136,7 @@ public class KubernetesWorkspaceServiceAccountTest {
RoleBindingList rbl = k8sClient.rbac().roleBindings().inNamespace(NAMESPACE).list(); RoleBindingList rbl = k8sClient.rbac().roleBindings().inNamespace(NAMESPACE).list();
assertTrue( assertTrue(
rbl.getItems() rbl.getItems().stream()
.stream()
.noneMatch(rb -> rb.getMetadata().getName().equals(SA_NAME + "-metrics"))); .noneMatch(rb -> rb.getMetadata().getName().equals(SA_NAME + "-metrics")));
} }
@ -153,8 +151,7 @@ public class KubernetesWorkspaceServiceAccountTest {
// then // then
RoleList rl = k8sClient.rbac().roles().inNamespace(NAMESPACE).list(); RoleList rl = k8sClient.rbac().roles().inNamespace(NAMESPACE).list();
Optional<Role> roleOptional = Optional<Role> roleOptional =
rl.getItems() rl.getItems().stream()
.stream()
.filter(r -> r.getMetadata().getName().equals(SECRETS_ROLE_NAME)) .filter(r -> r.getMetadata().getName().equals(SECRETS_ROLE_NAME))
.findFirst(); .findFirst();
assertTrue(roleOptional.isPresent()); assertTrue(roleOptional.isPresent());
@ -166,8 +163,7 @@ public class KubernetesWorkspaceServiceAccountTest {
RoleBindingList rbl = k8sClient.rbac().roleBindings().inNamespace(NAMESPACE).list(); RoleBindingList rbl = k8sClient.rbac().roleBindings().inNamespace(NAMESPACE).list();
assertTrue( assertTrue(
rbl.getItems() rbl.getItems().stream()
.stream()
.anyMatch(rb -> rb.getMetadata().getName().equals(SA_NAME + "-secrets"))); .anyMatch(rb -> rb.getMetadata().getName().equals(SA_NAME + "-secrets")));
} }
@ -182,8 +178,7 @@ public class KubernetesWorkspaceServiceAccountTest {
// then // then
RoleList rl = k8sClient.rbac().roles().inNamespace(NAMESPACE).list(); RoleList rl = k8sClient.rbac().roles().inNamespace(NAMESPACE).list();
Optional<Role> roleOptional = Optional<Role> roleOptional =
rl.getItems() rl.getItems().stream()
.stream()
.filter(r -> r.getMetadata().getName().equals(CONFIGMAPS_ROLE_NAME)) .filter(r -> r.getMetadata().getName().equals(CONFIGMAPS_ROLE_NAME))
.findFirst(); .findFirst();
assertTrue(roleOptional.isPresent()); assertTrue(roleOptional.isPresent());
@ -195,8 +190,7 @@ public class KubernetesWorkspaceServiceAccountTest {
RoleBindingList rbl = k8sClient.rbac().roleBindings().inNamespace(NAMESPACE).list(); RoleBindingList rbl = k8sClient.rbac().roleBindings().inNamespace(NAMESPACE).list();
assertTrue( assertTrue(
rbl.getItems() rbl.getItems().stream()
.stream()
.anyMatch(rb -> rb.getMetadata().getName().equals(SA_NAME + "-configmaps"))); .anyMatch(rb -> rb.getMetadata().getName().equals(SA_NAME + "-configmaps")));
} }
} }

View File

@ -99,8 +99,7 @@ public class WorkspaceServiceAccountConfiguratorTest {
assertEquals( assertEquals(
roleBindings.size(), roleBindings.size(),
6, 6,
roleBindings roleBindings.stream()
.stream()
.map(r -> r.getMetadata().getName()) .map(r -> r.getMetadata().getName())
.collect(joining(", "))); // exec, secrets, configmaps, view bindings + cr1, cr2 .collect(joining(", "))); // exec, secrets, configmaps, view bindings + cr1, cr2
} }
@ -129,8 +128,7 @@ public class WorkspaceServiceAccountConfiguratorTest {
assertEquals( assertEquals(
roleBindings.size(), roleBindings.size(),
4, 4,
roleBindings roleBindings.stream()
.stream()
.map(r -> r.getMetadata().getName()) .map(r -> r.getMetadata().getName())
.collect(joining(", "))); // exec, secrets, configmaps, view bindings .collect(joining(", "))); // exec, secrets, configmaps, view bindings
} }

View File

@ -323,9 +323,7 @@ public class PVCProvisionerTest {
private PersistentVolumeClaim findPvc( private PersistentVolumeClaim findPvc(
String volumeName, Map<String, PersistentVolumeClaim> claims) { String volumeName, Map<String, PersistentVolumeClaim> claims) {
return claims return claims.values().stream()
.values()
.stream()
.filter(c -> volumeName.equals(c.getMetadata().getLabels().get(CHE_VOLUME_NAME_LABEL))) .filter(c -> volumeName.equals(c.getMetadata().getLabels().get(CHE_VOLUME_NAME_LABEL)))
.findAny() .findAny()
.orElse(null); .orElse(null);

View File

@ -68,10 +68,7 @@ public class ProxySettingsProvisionerTest {
provisioner.provision(k8sEnv, runtimeId); provisioner.provision(k8sEnv, runtimeId);
assertTrue( assertTrue(
k8sEnv k8sEnv.getPodsData().values().stream()
.getPodsData()
.values()
.stream()
.flatMap(pod -> pod.getSpec().getContainers().stream()) .flatMap(pod -> pod.getSpec().getContainers().stream())
.allMatch( .allMatch(
container -> container ->
@ -94,10 +91,7 @@ public class ProxySettingsProvisionerTest {
provisioner.provision(k8sEnv, runtimeId); provisioner.provision(k8sEnv, runtimeId);
assertTrue( assertTrue(
k8sEnv k8sEnv.getPodsData().values().stream()
.getPodsData()
.values()
.stream()
.filter(pod -> pod.getMetadata().getName().equals(JWT_PROXY_POD_NAME)) .filter(pod -> pod.getMetadata().getName().equals(JWT_PROXY_POD_NAME))
.flatMap(pod -> pod.getSpec().getContainers().stream()) .flatMap(pod -> pod.getSpec().getContainers().stream())
.noneMatch( .noneMatch(
@ -122,10 +116,7 @@ public class ProxySettingsProvisionerTest {
provisioner.provision(k8sEnv, runtimeId); provisioner.provision(k8sEnv, runtimeId);
assertTrue( assertTrue(
k8sEnv k8sEnv.getPodsData().values().stream()
.getPodsData()
.values()
.stream()
.flatMap( .flatMap(
pod -> pod ->
Stream.concat( Stream.concat(

View File

@ -158,10 +158,7 @@ public class VcsSslCertificateProvisionerTest {
} }
for (Pod pod : for (Pod pod :
k8sEnv k8sEnv.getInjectablePodsCopy().values().stream()
.getInjectablePodsCopy()
.values()
.stream()
.flatMap(v -> v.values().stream()) .flatMap(v -> v.values().stream())
.toArray(Pod[]::new)) { .toArray(Pod[]::new)) {
assertTrue(pod.getSpec().getVolumes().isEmpty()); assertTrue(pod.getSpec().getVolumes().isEmpty());

View File

@ -514,10 +514,7 @@ public class KubernetesServerExposerTest {
assertEquals(serviceAnnotations.machineName(), machineName); assertEquals(serviceAnnotations.machineName(), machineName);
// check that we did not create servers for public endpoints // check that we did not create servers for public endpoints
assertFalse( assertFalse(
serviceAnnotations serviceAnnotations.servers().keySet().stream()
.servers()
.keySet()
.stream()
.anyMatch(key -> expectedServers.containsKey(key))); .anyMatch(key -> expectedServers.containsKey(key)));
verify(externalServerExposer) verify(externalServerExposer)
@ -547,10 +544,7 @@ public class KubernetesServerExposerTest {
// ensure that no service port is exposed // ensure that no service port is exposed
assertTrue( assertTrue(
service service.getSpec().getPorts().stream()
.getSpec()
.getPorts()
.stream()
.noneMatch(p -> p.getTargetPort().getIntVal().equals(port))); .noneMatch(p -> p.getTargetPort().getIntVal().equals(port)));
ServicePort servicePort = ServicePort servicePort =
@ -600,9 +594,7 @@ public class KubernetesServerExposerTest {
private void assertThatContainerPortIsExposed(String portProtocol, Integer port) { private void assertThatContainerPortIsExposed(String portProtocol, Integer port) {
assertTrue( assertTrue(
container container.getPorts().stream()
.getPorts()
.stream()
.anyMatch( .anyMatch(
p -> p ->
p.getContainerPort().equals(port) p.getContainerPort().equals(port)
@ -622,10 +614,7 @@ public class KubernetesServerExposerTest {
private ServicePort assertThatServicePortIsExposed(Integer port, Service service) { private ServicePort assertThatServicePortIsExposed(Integer port, Service service) {
Optional<ServicePort> servicePortOpt = Optional<ServicePort> servicePortOpt =
service service.getSpec().getPorts().stream()
.getSpec()
.getPorts()
.stream()
.filter(p -> p.getTargetPort().getIntVal().equals(port)) .filter(p -> p.getTargetPort().getIntVal().equals(port))
.findAny(); .findAny();
assertTrue(servicePortOpt.isPresent()); assertTrue(servicePortOpt.isPresent());

View File

@ -167,17 +167,13 @@ public class K8sContainerResolverTest {
} }
private List<EnvVar> toSidecarEnvVars(Map<String, String> envVars) { private List<EnvVar> toSidecarEnvVars(Map<String, String> envVars) {
return envVars return envVars.entrySet().stream()
.entrySet()
.stream()
.map(entry -> new EnvVar().name(entry.getKey()).value(entry.getValue())) .map(entry -> new EnvVar().name(entry.getKey()).value(entry.getValue()))
.collect(Collectors.toList()); .collect(Collectors.toList());
} }
private List<io.fabric8.kubernetes.api.model.EnvVar> toK8sEnvVars(Map<String, String> envVars) { private List<io.fabric8.kubernetes.api.model.EnvVar> toK8sEnvVars(Map<String, String> envVars) {
return envVars return envVars.entrySet().stream()
.entrySet()
.stream()
.map( .map(
entry -> entry ->
new io.fabric8.kubernetes.api.model.EnvVar(entry.getKey(), entry.getValue(), null)) new io.fabric8.kubernetes.api.model.EnvVar(entry.getKey(), entry.getValue(), null))

View File

@ -966,8 +966,7 @@ public class KubernetesPluginsToolingApplierTest {
Collection<InternalMachineConfig> machineConfigs, int numberOfMachines, int numberOfVolumes) { Collection<InternalMachineConfig> machineConfigs, int numberOfMachines, int numberOfVolumes) {
long numberOfMatchingMachines = long numberOfMatchingMachines =
machineConfigs machineConfigs.stream()
.stream()
.filter(machineConfig -> machineConfig.getVolumes().size() == numberOfVolumes) .filter(machineConfig -> machineConfig.getVolumes().size() == numberOfVolumes)
.count(); .count();
assertEquals(numberOfMatchingMachines, numberOfMachines); assertEquals(numberOfMatchingMachines, numberOfMachines);
@ -1002,9 +1001,7 @@ public class KubernetesPluginsToolingApplierTest {
InternalEnvironment internalEnvironment) { InternalEnvironment internalEnvironment) {
Map<String, InternalMachineConfig> machines = internalEnvironment.getMachines(); Map<String, InternalMachineConfig> machines = internalEnvironment.getMachines();
Map<String, InternalMachineConfig> nonUserMachines = Map<String, InternalMachineConfig> nonUserMachines =
machines machines.entrySet().stream()
.entrySet()
.stream()
.filter(entry -> !USER_MACHINE_NAME.equals(entry.getKey())) .filter(entry -> !USER_MACHINE_NAME.equals(entry.getKey()))
.collect(Collectors.toMap(Entry::getKey, Entry::getValue)); .collect(Collectors.toMap(Entry::getKey, Entry::getValue));
return nonUserMachines.values(); return nonUserMachines.values();
@ -1019,9 +1016,7 @@ public class KubernetesPluginsToolingApplierTest {
private List<Container> getNonUserContainers(KubernetesEnvironment kubernetesEnvironment) { private List<Container> getNonUserContainers(KubernetesEnvironment kubernetesEnvironment) {
Pod pod = kubernetesEnvironment.getPodsCopy().values().iterator().next(); Pod pod = kubernetesEnvironment.getPodsCopy().values().iterator().next();
return pod.getSpec() return pod.getSpec().getContainers().stream()
.getContainers()
.stream()
.filter(container -> userContainer != container) .filter(container -> userContainer != container)
.collect(Collectors.toList()); .collect(Collectors.toList());
} }
@ -1057,8 +1052,7 @@ public class KubernetesPluginsToolingApplierTest {
.targetPort(port); .targetPort(port);
plugin.getEndpoints().add(endpoint); plugin.getEndpoints().add(endpoint);
List<CheContainerPort> ports = plugin.getContainers().get(0).getPorts(); List<CheContainerPort> ports = plugin.getContainers().get(0).getPorts();
if (ports if (ports.stream()
.stream()
.map(CheContainerPort::getExposedPort) .map(CheContainerPort::getExposedPort)
.noneMatch(integer -> integer == port)) { .noneMatch(integer -> integer == port)) {
ports.add(new CheContainerPort().exposedPort(port)); ports.add(new CheContainerPort().exposedPort(port));

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2012-2018 Red Hat, Inc. * Copyright (c) 2012-2021 Red Hat, Inc.
* This program and the accompanying materials are made * This program and the accompanying materials are made
* available under the terms of the Eclipse Public License 2.0 * available under the terms of the Eclipse Public License 2.0
* which is available at https://www.eclipse.org/legal/epl-2.0/ * which is available at https://www.eclipse.org/legal/epl-2.0/
@ -117,8 +117,7 @@ public class SidecarServicesProvisionerTest {
} }
private Map<String, Service> toK8sServices(List<ChePluginEndpoint> endpoints) { private Map<String, Service> toK8sServices(List<ChePluginEndpoint> endpoints) {
return endpoints return endpoints.stream()
.stream()
.map(this::createService) .map(this::createService)
.collect(toMap(s -> s.getMetadata().getName(), Function.identity())); .collect(toMap(s -> s.getMetadata().getName(), Function.identity()));
} }

View File

@ -118,10 +118,7 @@ public class BrokerEnvironmentFactoryTest {
BrokersConfigs brokersConfigs = captor.getValue(); BrokersConfigs brokersConfigs = captor.getValue();
List<Container> containers = List<Container> containers =
brokersConfigs brokersConfigs.pods.values().stream()
.pods
.values()
.stream()
.flatMap(p -> p.getSpec().getContainers().stream()) .flatMap(p -> p.getSpec().getContainers().stream())
.collect(Collectors.toList()); .collect(Collectors.toList());
assertEquals(containers.size(), 1); assertEquals(containers.size(), 1);
@ -160,10 +157,7 @@ public class BrokerEnvironmentFactoryTest {
BrokersConfigs brokersConfigs = captor.getValue(); BrokersConfigs brokersConfigs = captor.getValue();
List<Container> containers = List<Container> containers =
brokersConfigs brokersConfigs.pods.values().stream()
.pods
.values()
.stream()
.flatMap(p -> p.getSpec().getContainers().stream()) .flatMap(p -> p.getSpec().getContainers().stream())
.collect(Collectors.toList()); .collect(Collectors.toList());
assertEquals(containers.size(), 1); assertEquals(containers.size(), 1);
@ -200,10 +194,7 @@ public class BrokerEnvironmentFactoryTest {
BrokersConfigs brokersConfigs = captor.getValue(); BrokersConfigs brokersConfigs = captor.getValue();
List<Container> containers = List<Container> containers =
brokersConfigs brokersConfigs.pods.values().stream()
.pods
.values()
.stream()
.flatMap(p -> p.getSpec().getContainers().stream()) .flatMap(p -> p.getSpec().getContainers().stream())
.collect(Collectors.toList()); .collect(Collectors.toList());
assertEquals(containers.size(), 1); assertEquals(containers.size(), 1);
@ -225,10 +216,7 @@ public class BrokerEnvironmentFactoryTest {
BrokersConfigs brokersConfigs = captor.getValue(); BrokersConfigs brokersConfigs = captor.getValue();
List<Container> containers = List<Container> containers =
brokersConfigs brokersConfigs.pods.values().stream()
.pods
.values()
.stream()
.flatMap(p -> p.getSpec().getContainers().stream()) .flatMap(p -> p.getSpec().getContainers().stream())
.collect(Collectors.toList()); .collect(Collectors.toList());
assertEquals(containers.size(), 1); assertEquals(containers.size(), 1);
@ -394,10 +382,7 @@ public class BrokerEnvironmentFactoryTest {
BrokersConfigs brokersConfigs = captor.getValue(); BrokersConfigs brokersConfigs = captor.getValue();
List<Container> containers = List<Container> containers =
brokersConfigs brokersConfigs.pods.values().stream()
.pods
.values()
.stream()
.flatMap(p -> p.getSpec().getContainers().stream()) .flatMap(p -> p.getSpec().getContainers().stream())
.collect(Collectors.toList()); .collect(Collectors.toList());
assertEquals(containers.size(), 1); assertEquals(containers.size(), 1);

View File

@ -40,9 +40,7 @@ public class OpenShiftEnvironmentValidator extends KubernetesEnvironmentValidato
private void validateRoutesMatchServices(OpenShiftEnvironment env) throws ValidationException { private void validateRoutesMatchServices(OpenShiftEnvironment env) throws ValidationException {
Set<String> recipeServices = Set<String> recipeServices =
env.getServices() env.getServices().values().stream()
.values()
.stream()
.map(s -> s.getMetadata().getName()) .map(s -> s.getMetadata().getName())
.collect(Collectors.toSet()); .collect(Collectors.toSet());
for (Route route : env.getRoutes().values()) { for (Route route : env.getRoutes().values()) {

View File

@ -193,8 +193,7 @@ public class OpenShiftProjectFactory extends KubernetesNamespaceFactory {
clientFactory.createOC().projects().withLabels(namespaceLabels).list().getItems(); clientFactory.createOC().projects().withLabels(namespaceLabels).list().getItems();
if (!workspaceProjects.isEmpty()) { if (!workspaceProjects.isEmpty()) {
Map<String, String> evaluatedAnnotations = evaluateAnnotationPlaceholders(namespaceCtx); Map<String, String> evaluatedAnnotations = evaluateAnnotationPlaceholders(namespaceCtx);
return workspaceProjects return workspaceProjects.stream()
.stream()
.filter(p -> matchesAnnotations(p, evaluatedAnnotations)) .filter(p -> matchesAnnotations(p, evaluatedAnnotations))
.map(this::asNamespaceMeta) .map(this::asNamespaceMeta)
.collect(Collectors.toList()); .collect(Collectors.toList());

View File

@ -52,9 +52,7 @@ public class RouteServerResolver extends AbstractServerResolver {
@Override @Override
public Map<String, ServerImpl> resolveExternalServers(String machineName) { public Map<String, ServerImpl> resolveExternalServers(String machineName) {
return routes return routes.get(machineName).stream()
.get(machineName)
.stream()
.map(r -> resolveRouteServers(machineName, r)) .map(r -> resolveRouteServers(machineName, r))
.flatMap(m -> m.entrySet().stream()) .flatMap(m -> m.entrySet().stream())
.collect(Collectors.toMap(Entry::getKey, Entry::getValue, (v1, v2) -> v2)); .collect(Collectors.toMap(Entry::getKey, Entry::getValue, (v1, v2) -> v2));

View File

@ -360,10 +360,7 @@ public class OpenShiftEnvironmentFactoryTest {
PodData mergedPodData = k8sEnv.getPodsData().get("merged"); PodData mergedPodData = k8sEnv.getPodsData().get("merged");
assertEquals(mergedPodData.getMetadata().getLabels().get(DEPLOYMENT_NAME_LABEL), "merged"); assertEquals(mergedPodData.getMetadata().getLabels().get(DEPLOYMENT_NAME_LABEL), "merged");
assertTrue( assertTrue(
k8sEnv k8sEnv.getServices().values().stream()
.getServices()
.values()
.stream()
.allMatch( .allMatch(
s -> s ->
ImmutableMap.of(DEPLOYMENT_NAME_LABEL, "merged") ImmutableMap.of(DEPLOYMENT_NAME_LABEL, "merged")

View File

@ -166,9 +166,7 @@ public class OpenshiftTrustedCAProvisionerTest {
assertEquals(podSpec.getVolumes().size(), 1); assertEquals(podSpec.getVolumes().size(), 1);
assertEquals(podSpec.getVolumes().get(0).getConfigMap().getName(), CONFIGMAP_NAME); assertEquals(podSpec.getVolumes().get(0).getConfigMap().getName(), CONFIGMAP_NAME);
assertTrue( assertTrue(
podSpec podSpec.getContainers().stream()
.getContainers()
.stream()
.allMatch( .allMatch(
c -> c.getVolumeMounts().get(0).getMountPath().equals(CERTIFICATE_MOUNT_PATH))); c -> c.getVolumeMounts().get(0).getMountPath().equals(CERTIFICATE_MOUNT_PATH)));
} }

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2012-2018 Red Hat, Inc. * Copyright (c) 2012-2021 Red Hat, Inc.
* This program and the accompanying materials are made * This program and the accompanying materials are made
* available under the terms of the Eclipse Public License 2.0 * available under the terms of the Eclipse Public License 2.0
* which is available at https://www.eclipse.org/legal/epl-2.0/ * which is available at https://www.eclipse.org/legal/epl-2.0/
@ -50,9 +50,7 @@ public final class DtoConverter {
return newDto(OrganizationDistributedResourcesDto.class) return newDto(OrganizationDistributedResourcesDto.class)
.withOrganizationId(distributedResources.getOrganizationId()) .withOrganizationId(distributedResources.getOrganizationId())
.withResourcesCap( .withResourcesCap(
distributedResources distributedResources.getResourcesCap().stream()
.getResourcesCap()
.stream()
.map(org.eclipse.che.multiuser.resource.api.DtoConverter::asDto) .map(org.eclipse.che.multiuser.resource.api.DtoConverter::asDto)
.collect(Collectors.toList())); .collect(Collectors.toList()));
} }

View File

@ -134,9 +134,7 @@ public class OrganizationResourcesDistributionService extends Service {
@Parameter(description = "Suborganization id") @PathParam("suborganizationId") @Parameter(description = "Suborganization id") @PathParam("suborganizationId")
String suborganization) String suborganization)
throws NotFoundException, ConflictException, ServerException { throws NotFoundException, ConflictException, ServerException {
return resourcesDistributor return resourcesDistributor.getResourcesCaps(suborganization).stream()
.getResourcesCaps(suborganization)
.stream()
.map(org.eclipse.che.multiuser.resource.api.DtoConverter::asDto) .map(org.eclipse.che.multiuser.resource.api.DtoConverter::asDto)
.collect(toList()); .collect(toList());
} }

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2012-2018 Red Hat, Inc. * Copyright (c) 2012-2021 Red Hat, Inc.
* This program and the accompanying materials are made * This program and the accompanying materials are made
* available under the terms of the Eclipse Public License 2.0 * available under the terms of the Eclipse Public License 2.0
* which is available at https://www.eclipse.org/legal/epl-2.0/ * which is available at https://www.eclipse.org/legal/epl-2.0/
@ -182,9 +182,7 @@ public class OrganizationResourcesDistributor {
String suborganizationId, List<? extends Resource> newResourcesCap) String suborganizationId, List<? extends Resource> newResourcesCap)
throws NotFoundException, ConflictException, ServerException { throws NotFoundException, ConflictException, ServerException {
Map<String, Resource> usedResources = Map<String, Resource> usedResources =
resourceManager resourceManager.getUsedResources(suborganizationId).stream()
.getUsedResources(suborganizationId)
.stream()
.collect(Collectors.toMap(Resource::getType, Function.identity())); .collect(Collectors.toMap(Resource::getType, Function.identity()));
for (Resource resourceToCheck : newResourcesCap) { for (Resource resourceToCheck : newResourcesCap) {
Resource usedResource = usedResources.get(resourceToCheck.getType()); Resource usedResource = usedResources.get(resourceToCheck.getType());

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2012-2018 Red Hat, Inc. * Copyright (c) 2012-2021 Red Hat, Inc.
* This program and the accompanying materials are made * This program and the accompanying materials are made
* available under the terms of the Eclipse Public License 2.0 * available under the terms of the Eclipse Public License 2.0
* which is available at https://www.eclipse.org/legal/epl-2.0/ * which is available at https://www.eclipse.org/legal/epl-2.0/
@ -136,8 +136,7 @@ public class OrganizationalAccountAvailableResourcesProvider implements Availabl
/** Returns formatted string for list of resources. */ /** Returns formatted string for list of resources. */
private static String format(Collection<? extends Resource> resources) { private static String format(Collection<? extends Resource> resources) {
return '[' return '['
+ resources + resources.stream()
.stream()
.map( .map(
resource -> resource.getAmount() + resource.getUnit() + " of " + resource.getType()) resource -> resource.getAmount() + resource.getUnit() + " of " + resource.getType())
.collect(Collectors.joining(", ")) .collect(Collectors.joining(", "))

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2012-2018 Red Hat, Inc. * Copyright (c) 2012-2021 Red Hat, Inc.
* This program and the accompanying materials are made * This program and the accompanying materials are made
* available under the terms of the Eclipse Public License 2.0 * available under the terms of the Eclipse Public License 2.0
* which is available at https://www.eclipse.org/legal/epl-2.0/ * which is available at https://www.eclipse.org/legal/epl-2.0/
@ -106,8 +106,7 @@ public class SuborganizationResourcesProvider implements ResourcesProvider {
Collection<? extends Resource> source, List<? extends Resource> caps) { Collection<? extends Resource> source, List<? extends Resource> caps) {
final Map<String, Resource> resourcesCaps = final Map<String, Resource> resourcesCaps =
caps.stream().collect(toMap(Resource::getType, Function.identity())); caps.stream().collect(toMap(Resource::getType, Function.identity()));
return source return source.stream()
.stream()
.map( .map(
resource -> { resource -> {
Resource resourceCap = resourcesCaps.get(resource.getType()); Resource resourceCap = resourcesCaps.get(resource.getType());

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2012-2018 Red Hat, Inc. * Copyright (c) 2012-2021 Red Hat, Inc.
* This program and the accompanying materials are made * This program and the accompanying materials are made
* available under the terms of the Eclipse Public License 2.0 * available under the terms of the Eclipse Public License 2.0
* which is available at https://www.eclipse.org/legal/epl-2.0/ * which is available at https://www.eclipse.org/legal/epl-2.0/
@ -93,8 +93,7 @@ public class JpaOrganizationDistributedResourcesDao implements OrganizationDistr
.setParameter("parent", organizationId) .setParameter("parent", organizationId)
.getSingleResult(); .getSingleResult();
return new Page<>( return new Page<>(
distributedResources distributedResources.stream()
.stream()
.map(OrganizationDistributedResourcesImpl::new) .map(OrganizationDistributedResourcesImpl::new)
.collect(Collectors.toList()), .collect(Collectors.toList()),
skipCount, skipCount,

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2012-2018 Red Hat, Inc. * Copyright (c) 2012-2021 Red Hat, Inc.
* This program and the accompanying materials are made * This program and the accompanying materials are made
* available under the terms of the Eclipse Public License 2.0 * available under the terms of the Eclipse Public License 2.0
* which is available at https://www.eclipse.org/legal/epl-2.0/ * which is available at https://www.eclipse.org/legal/epl-2.0/
@ -244,8 +244,7 @@ public class PermissionsManager {
throws ConflictException { throws ConflictException {
final Set<String> allowedActions = new HashSet<>(domain.getAllowedActions()); final Set<String> allowedActions = new HashSet<>(domain.getAllowedActions());
final Set<String> unsupportedActions = final Set<String> unsupportedActions =
actions actions.stream()
.stream()
.filter(action -> !allowedActions.contains(action)) .filter(action -> !allowedActions.contains(action))
.collect(Collectors.toSet()); .collect(Collectors.toSet());
if (!unsupportedActions.isEmpty()) { if (!unsupportedActions.isEmpty()) {

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2012-2018 Red Hat, Inc. * Copyright (c) 2012-2021 Red Hat, Inc.
* This program and the accompanying materials are made * This program and the accompanying materials are made
* available under the terms of the Eclipse Public License 2.0 * available under the terms of the Eclipse Public License 2.0
* which is available at https://www.eclipse.org/legal/epl-2.0/ * which is available at https://www.eclipse.org/legal/epl-2.0/
@ -48,15 +48,11 @@ public final class DtoConverter {
return DtoFactory.newDto(ResourcesDetailsDto.class) return DtoFactory.newDto(ResourcesDetailsDto.class)
.withAccountId(resourcesDetails.getAccountId()) .withAccountId(resourcesDetails.getAccountId())
.withTotalResources( .withTotalResources(
resourcesDetails resourcesDetails.getTotalResources().stream()
.getTotalResources()
.stream()
.map(DtoConverter::asDto) .map(DtoConverter::asDto)
.collect(Collectors.toList())) .collect(Collectors.toList()))
.withProvidedResources( .withProvidedResources(
resourcesDetails resourcesDetails.getProvidedResources().stream()
.getProvidedResources()
.stream()
.map(DtoConverter::asDto) .map(DtoConverter::asDto)
.collect(Collectors.toList())); .collect(Collectors.toList()));
} }
@ -69,9 +65,7 @@ public final class DtoConverter {
.withEndTime(providedResources.getEndTime()) .withEndTime(providedResources.getEndTime())
.withProviderId(providedResources.getProviderId()) .withProviderId(providedResources.getProviderId())
.withResources( .withResources(
providedResources providedResources.getResources().stream()
.getResources()
.stream()
.map(DtoConverter::asDto) .map(DtoConverter::asDto)
.collect(Collectors.toList())); .collect(Collectors.toList()));
} }

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2012-2018 Red Hat, Inc. * Copyright (c) 2012-2021 Red Hat, Inc.
* This program and the accompanying materials are made * This program and the accompanying materials are made
* available under the terms of the Eclipse Public License 2.0 * available under the terms of the Eclipse Public License 2.0
* which is available at https://www.eclipse.org/legal/epl-2.0/ * which is available at https://www.eclipse.org/legal/epl-2.0/
@ -78,8 +78,7 @@ public class NoEnoughResourcesException extends Exception {
private String resourcesToString(List<? extends Resource> resources) { private String resourcesToString(List<? extends Resource> resources) {
return '[' return '['
+ resources + resources.stream()
.stream()
.map(resource -> resource.getAmount() + resource.getUnit() + " " + resource.getType()) .map(resource -> resource.getAmount() + resource.getUnit() + " " + resource.getType())
.collect(Collectors.joining(", ")) .collect(Collectors.joining(", "))
+ ']'; + ']';

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2012-2018 Red Hat, Inc. * Copyright (c) 2012-2021 Red Hat, Inc.
* This program and the accompanying materials are made * This program and the accompanying materials are made
* available under the terms of the Eclipse Public License 2.0 * available under the terms of the Eclipse Public License 2.0
* which is available at https://www.eclipse.org/legal/epl-2.0/ * which is available at https://www.eclipse.org/legal/epl-2.0/
@ -61,8 +61,7 @@ public class FreeResourcesProvider implements ResourcesProvider {
this.freeResourcesLimitManager = freeResourcesLimitManager; this.freeResourcesLimitManager = freeResourcesLimitManager;
this.accountManager = accountManager; this.accountManager = accountManager;
this.defaultResourcesProviders = this.defaultResourcesProviders =
defaultResourcesProviders defaultResourcesProviders.stream()
.stream()
.collect(toMap(DefaultResourcesProvider::getAccountType, Function.identity())); .collect(toMap(DefaultResourcesProvider::getAccountType, Function.identity()));
} }

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2012-2018 Red Hat, Inc. * Copyright (c) 2012-2021 Red Hat, Inc.
* This program and the accompanying materials are made * This program and the accompanying materials are made
* available under the terms of the Eclipse Public License 2.0 * available under the terms of the Eclipse Public License 2.0
* which is available at https://www.eclipse.org/legal/epl-2.0/ * which is available at https://www.eclipse.org/legal/epl-2.0/
@ -36,12 +36,10 @@ public class ResourceValidator {
@Inject @Inject
public ResourceValidator(Set<ResourceType> supportedResources) { public ResourceValidator(Set<ResourceType> supportedResources) {
this.resourcesTypesToUnits = this.resourcesTypesToUnits =
supportedResources supportedResources.stream()
.stream()
.collect(toMap(ResourceType::getId, ResourceType::getSupportedUnits)); .collect(toMap(ResourceType::getId, ResourceType::getSupportedUnits));
this.resourcesTypesToDefaultUnit = this.resourcesTypesToDefaultUnit =
supportedResources supportedResources.stream()
.stream()
.collect(toMap(ResourceType::getId, ResourceType::getDefaultUnit)); .collect(toMap(ResourceType::getId, ResourceType::getDefaultUnit));
} }

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2012-2018 Red Hat, Inc. * Copyright (c) 2012-2021 Red Hat, Inc.
* This program and the accompanying materials are made * This program and the accompanying materials are made
* available under the terms of the Eclipse Public License 2.0 * available under the terms of the Eclipse Public License 2.0
* which is available at https://www.eclipse.org/legal/epl-2.0/ * which is available at https://www.eclipse.org/legal/epl-2.0/
@ -73,8 +73,7 @@ public class DefaultAvailableResourcesProvider implements AvailableResourcesProv
/** Returns formatted string for list of resources. */ /** Returns formatted string for list of resources. */
private static String format(Collection<? extends Resource> resources) { private static String format(Collection<? extends Resource> resources) {
return '[' return '['
+ resources + resources.stream()
.stream()
.map( .map(
resource -> resource.getAmount() + resource.getUnit() + " of " + resource.getType()) resource -> resource.getAmount() + resource.getUnit() + " of " + resource.getType())
.collect(Collectors.joining(", ")) .collect(Collectors.joining(", "))

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2012-2018 Red Hat, Inc. * Copyright (c) 2012-2021 Red Hat, Inc.
* This program and the accompanying materials are made * This program and the accompanying materials are made
* available under the terms of the Eclipse Public License 2.0 * available under the terms of the Eclipse Public License 2.0
* which is available at https://www.eclipse.org/legal/epl-2.0/ * which is available at https://www.eclipse.org/legal/epl-2.0/
@ -147,8 +147,7 @@ public class ResourceManager {
} }
final List<Resource> allResources = final List<Resource> allResources =
resources resources.stream()
.stream()
.flatMap(providedResources -> providedResources.getResources().stream()) .flatMap(providedResources -> providedResources.getResources().stream())
.collect(Collectors.toList()); .collect(Collectors.toList());

View File

@ -70,9 +70,7 @@ public class ResourceService extends Service {
public List<ResourceDto> getTotalResources( public List<ResourceDto> getTotalResources(
@Parameter(description = "Account id") @PathParam("accountId") String accountId) @Parameter(description = "Account id") @PathParam("accountId") String accountId)
throws NotFoundException, ServerException, ConflictException { throws NotFoundException, ServerException, ConflictException {
return resourceManager return resourceManager.getTotalResources(accountId).stream()
.getTotalResources(accountId)
.stream()
.map(DtoConverter::asDto) .map(DtoConverter::asDto)
.collect(Collectors.toList()); .collect(Collectors.toList());
} }
@ -94,9 +92,7 @@ public class ResourceService extends Service {
}) })
public List<ResourceDto> getAvailableResources(@PathParam("accountId") String accountId) public List<ResourceDto> getAvailableResources(@PathParam("accountId") String accountId)
throws NotFoundException, ServerException { throws NotFoundException, ServerException {
return resourceManager return resourceManager.getAvailableResources(accountId).stream()
.getAvailableResources(accountId)
.stream()
.map(DtoConverter::asDto) .map(DtoConverter::asDto)
.collect(Collectors.toList()); .collect(Collectors.toList());
} }
@ -118,9 +114,7 @@ public class ResourceService extends Service {
}) })
public List<ResourceDto> getUsedResources(@PathParam("accountId") String accountId) public List<ResourceDto> getUsedResources(@PathParam("accountId") String accountId)
throws NotFoundException, ServerException { throws NotFoundException, ServerException {
return resourceManager return resourceManager.getUsedResources(accountId).stream()
.getUsedResources(accountId)
.stream()
.map(DtoConverter::asDto) .map(DtoConverter::asDto)
.collect(Collectors.toList()); .collect(Collectors.toList());
} }

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2012-2018 Red Hat, Inc. * Copyright (c) 2012-2021 Red Hat, Inc.
* This program and the accompanying materials are made * This program and the accompanying materials are made
* available under the terms of the Eclipse Public License 2.0 * available under the terms of the Eclipse Public License 2.0
* which is available at https://www.eclipse.org/legal/epl-2.0/ * which is available at https://www.eclipse.org/legal/epl-2.0/
@ -52,8 +52,7 @@ public class ResourcesLocks {
this.accountManager = accountManager; this.accountManager = accountManager;
this.stripedLocks = new StripedLocks(16); this.stripedLocks = new StripedLocks(16);
this.accountTypeToLockProvider = this.accountTypeToLockProvider =
resourceLockKeyProviders resourceLockKeyProviders.stream()
.stream()
.collect( .collect(
Collectors.toMap(ResourceLockKeyProvider::getAccountType, Function.identity())); Collectors.toMap(ResourceLockKeyProvider::getAccountType, Function.identity()));
} }

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2012-2018 Red Hat, Inc. * Copyright (c) 2012-2021 Red Hat, Inc.
* This program and the accompanying materials are made * This program and the accompanying materials are made
* available under the terms of the Eclipse Public License 2.0 * available under the terms of the Eclipse Public License 2.0
* which is available at https://www.eclipse.org/legal/epl-2.0/ * which is available at https://www.eclipse.org/legal/epl-2.0/
@ -52,10 +52,7 @@ public class EnvironmentRamCalculator {
return 0; return 0;
} }
try { try {
return getInternalEnvironment(environment) return getInternalEnvironment(environment).getMachines().values().stream()
.getMachines()
.values()
.stream()
.mapToLong( .mapToLong(
m -> parseMemoryAttributeValue(m.getAttributes().get(MEMORY_LIMIT_ATTRIBUTE))) m -> parseMemoryAttributeValue(m.getAttributes().get(MEMORY_LIMIT_ATTRIBUTE)))
.sum() .sum()
@ -71,10 +68,7 @@ public class EnvironmentRamCalculator {
* @return summary RAM of all machines in runtime in megabytes * @return summary RAM of all machines in runtime in megabytes
*/ */
public long calculate(Runtime runtime) { public long calculate(Runtime runtime) {
return runtime return runtime.getMachines().values().stream()
.getMachines()
.values()
.stream()
.mapToLong( .mapToLong(
m -> parseMemoryAttributeValue(m.getAttributes().get(MEMORY_LIMIT_ATTRIBUTE))) m -> parseMemoryAttributeValue(m.getAttributes().get(MEMORY_LIMIT_ATTRIBUTE)))
.sum() .sum()

View File

@ -77,8 +77,7 @@ public class MultiUserWorkspaceActivityManager extends WorkspaceActivityManager
return defaultTimeout; return defaultTimeout;
} }
Optional<? extends Resource> timeoutOpt = Optional<? extends Resource> timeoutOpt =
availableResources availableResources.stream()
.stream()
.filter(resource -> TimeoutResourceType.ID.equals(resource.getType())) .filter(resource -> TimeoutResourceType.ID.equals(resource.getType()))
.findAny(); .findAny();

View File

@ -224,8 +224,7 @@ public class MultiuserMySqlTckModule extends TckModule {
@Override @Override
public void createAll(Collection<? extends UserImpl> entities) throws TckRepositoryException { public void createAll(Collection<? extends UserImpl> entities) throws TckRepositoryException {
final EntityManager manager = managerProvider.get(); final EntityManager manager = managerProvider.get();
entities entities.stream()
.stream()
.map( .map(
user -> user ->
new UserImpl( new UserImpl(

View File

@ -223,8 +223,7 @@ public class MultiuserPostgresqlTckModule extends TckModule {
@Override @Override
public void createAll(Collection<? extends UserImpl> entities) throws TckRepositoryException { public void createAll(Collection<? extends UserImpl> entities) throws TckRepositoryException {
final EntityManager manager = managerProvider.get(); final EntityManager manager = managerProvider.get();
entities entities.stream()
.stream()
.map( .map(
user -> user ->
new UserImpl( new UserImpl(

View File

@ -65,8 +65,7 @@ public class JpaUserDevfilePermissionDao
@Override @Override
public List<UserDevfilePermissionImpl> getByUser(String userId) throws ServerException { public List<UserDevfilePermissionImpl> getByUser(String userId) throws ServerException {
requireNonNull(userId, "User identifier required"); requireNonNull(userId, "User identifier required");
return doGetByUser(wildcardToNull(userId)) return doGetByUser(wildcardToNull(userId)).stream()
.stream()
.map(UserDevfilePermissionImpl::new) .map(UserDevfilePermissionImpl::new)
.collect(toList()); .collect(toList());
} }

View File

@ -56,8 +56,7 @@ public class ResourceServicePermissionsFilter extends CheMethodInvokerFilter {
AccountManager accountManager, Set<AccountPermissionsChecker> permissionsCheckers) { AccountManager accountManager, Set<AccountPermissionsChecker> permissionsCheckers) {
this.accountManager = accountManager; this.accountManager = accountManager;
this.permissionsCheckers = this.permissionsCheckers =
permissionsCheckers permissionsCheckers.stream()
.stream()
.collect(toMap(AccountPermissionsChecker::getAccountType, identity())); .collect(toMap(AccountPermissionsChecker::getAccountType, identity()));
} }

View File

@ -65,8 +65,7 @@ public class WorkspacePermissionsFilter extends CheMethodInvokerFilter {
this.workspaceManager = workspaceManager; this.workspaceManager = workspaceManager;
this.accountManager = accountManager; this.accountManager = accountManager;
this.accountTypeToPermissionsChecker = this.accountTypeToPermissionsChecker =
accountPermissionsCheckers accountPermissionsCheckers.stream()
.stream()
.collect(toMap(AccountPermissionsChecker::getAccountType, identity())); .collect(toMap(AccountPermissionsChecker::getAccountType, identity()));
this.superPrivilegesChecker = superPrivilegesChecker; this.superPrivilegesChecker = superPrivilegesChecker;
} }

10
pom.xml
View File

@ -107,7 +107,7 @@
<maven.antrun.plugin.version>3.0.0</maven.antrun.plugin.version> <maven.antrun.plugin.version>3.0.0</maven.antrun.plugin.version>
<maven.assembly.plugin.version>3.3.0</maven.assembly.plugin.version> <maven.assembly.plugin.version>3.3.0</maven.assembly.plugin.version>
<maven.buildhelper.plugin.version>3.2.0</maven.buildhelper.plugin.version> <maven.buildhelper.plugin.version>3.2.0</maven.buildhelper.plugin.version>
<maven.buildnumber.plugin.version>1.4</maven.buildnumber.plugin.version> <maven.buildnumber.plugin.version>3.0.0</maven.buildnumber.plugin.version>
<maven.clean.plugin.version>3.1.0</maven.clean.plugin.version> <maven.clean.plugin.version>3.1.0</maven.clean.plugin.version>
<maven.compiler.plugin.version>3.8.1</maven.compiler.plugin.version> <maven.compiler.plugin.version>3.8.1</maven.compiler.plugin.version>
<maven.dependency.plugin.version>3.1.2</maven.dependency.plugin.version> <maven.dependency.plugin.version>3.1.2</maven.dependency.plugin.version>
@ -115,11 +115,11 @@
<maven.exec.plugin.version>3.0.0</maven.exec.plugin.version> <maven.exec.plugin.version>3.0.0</maven.exec.plugin.version>
<maven.fabric8io.docker.plugin.version>0.37.0</maven.fabric8io.docker.plugin.version> <maven.fabric8io.docker.plugin.version>0.37.0</maven.fabric8io.docker.plugin.version>
<maven.failsafe.plugin.version>3.0.0-M5</maven.failsafe.plugin.version> <maven.failsafe.plugin.version>3.0.0-M5</maven.failsafe.plugin.version>
<maven.fmt.plugin.version>2.5.1</maven.fmt.plugin.version> <maven.fmt.plugin.version>2.13</maven.fmt.plugin.version>
<maven.install.plugin.version>3.0.0-M1</maven.install.plugin.version> <maven.install.plugin.version>3.0.0-M1</maven.install.plugin.version>
<maven.jacoco.plugin.version>0.8.7</maven.jacoco.plugin.version> <maven.jacoco.plugin.version>0.8.7</maven.jacoco.plugin.version>
<maven.jar.plugin.version>3.2.0</maven.jar.plugin.version> <maven.jar.plugin.version>3.2.0</maven.jar.plugin.version>
<maven.mycila.license.plugin.version>3.0</maven.mycila.license.plugin.version> <maven.mycila.license.plugin.version>4.1</maven.mycila.license.plugin.version>
<maven.plugin.plugin.version>3.6.1</maven.plugin.plugin.version> <maven.plugin.plugin.version>3.6.1</maven.plugin.plugin.version>
<maven.resources.plugin.version>3.2.0</maven.resources.plugin.version> <maven.resources.plugin.version>3.2.0</maven.resources.plugin.version>
<maven.sonar.plugin.version>3.9.0.2155</maven.sonar.plugin.version> <maven.sonar.plugin.version>3.9.0.2155</maven.sonar.plugin.version>
@ -135,7 +135,7 @@
<org.apache.httpcomponents.httpclient.version>4.5.13</org.apache.httpcomponents.httpclient.version> <org.apache.httpcomponents.httpclient.version>4.5.13</org.apache.httpcomponents.httpclient.version>
<org.apache.httpcomponents.httpcore.version>4.4.15</org.apache.httpcomponents.httpcore.version> <org.apache.httpcomponents.httpcore.version>4.4.15</org.apache.httpcomponents.httpcore.version>
<org.apache.maven.plugin-testing.maven-plugin-testing-harness.version>3.3.0</org.apache.maven.plugin-testing.maven-plugin-testing-harness.version> <org.apache.maven.plugin-testing.maven-plugin-testing-harness.version>3.3.0</org.apache.maven.plugin-testing.maven-plugin-testing-harness.version>
<org.apache.maven.plugin-tools.plugin-annotations.version>3.2</org.apache.maven.plugin-tools.plugin-annotations.version> <org.apache.maven.plugin-tools.plugin-annotations.version>3.6.2</org.apache.maven.plugin-tools.plugin-annotations.version>
<org.apache.maven.verson>3.8.4</org.apache.maven.verson> <org.apache.maven.verson>3.8.4</org.apache.maven.verson>
<org.apache.tomcat.version>10.0.14</org.apache.tomcat.version> <org.apache.tomcat.version>10.0.14</org.apache.tomcat.version>
<org.codehaus.plexus.utils.version>3.4.1</org.codehaus.plexus.utils.version> <org.codehaus.plexus.utils.version>3.4.1</org.codehaus.plexus.utils.version>
@ -1801,7 +1801,7 @@
<buildNumberPropertyName>buildNumber</buildNumberPropertyName> <buildNumberPropertyName>buildNumber</buildNumberPropertyName>
<revisionOnScmFailure>no_revision</revisionOnScmFailure> <revisionOnScmFailure>no_revision</revisionOnScmFailure>
<getRevisionOnlyOnce>true</getRevisionOnlyOnce> <getRevisionOnlyOnce>true</getRevisionOnlyOnce>
<timestampFormat>{0, date,yyyyMMdd}</timestampFormat> <timestampFormat>yyyyMMdd</timestampFormat>
</configuration> </configuration>
</plugin> </plugin>
<plugin> <plugin>

View File

@ -254,9 +254,7 @@ public class DevfileService extends Service {
final Set<String> skip = ImmutableSet.of("token", "skipCount", "maxItems", "order"); final Set<String> skip = ImmutableSet.of("token", "skipCount", "maxItems", "order");
Map<String, Set<String>> queryParams = URLEncodedUtils.parse(uriInfo.getRequestUri()); Map<String, Set<String>> queryParams = URLEncodedUtils.parse(uriInfo.getRequestUri());
final List<Pair<String, String>> query = final List<Pair<String, String>> query =
queryParams queryParams.entrySet().stream()
.entrySet()
.stream()
.filter(param -> !param.getValue().isEmpty()) .filter(param -> !param.getValue().isEmpty())
.filter(param -> !skip.contains(param.getKey())) .filter(param -> !skip.contains(param.getKey()))
.map(entry -> Pair.of(entry.getKey(), entry.getValue().iterator().next())) .map(entry -> Pair.of(entry.getKey(), entry.getValue().iterator().next()))
@ -282,9 +280,7 @@ public class DevfileService extends Service {
userDevfileManager.getUserDevfiles(maxItems, skipCount, query, searchOrder); userDevfileManager.getUserDevfiles(maxItems, skipCount, query, searchOrder);
List<UserDevfileDto> list = List<UserDevfileDto> list =
userDevfilesPage userDevfilesPage.getItems().stream()
.getItems()
.stream()
.map(DtoConverter::asDto) .map(DtoConverter::asDto)
.map(dto -> linksInjector.injectLinks(asDto(dto), getServiceContext())) .map(dto -> linksInjector.injectLinks(asDto(dto), getServiceContext()))
.collect(toList()); .collect(toList());

View File

@ -198,8 +198,7 @@ public class JpaUserDevfileDao implements UserDevfileDao {
throws ServerException { throws ServerException {
if (filter != null && !filter.isEmpty()) { if (filter != null && !filter.isEmpty()) {
List<Pair<String, String>> invalidFilter = List<Pair<String, String>> invalidFilter =
filter filter.stream()
.stream()
.filter(p -> !VALID_SEARCH_FIELDS.contains(p.first.toLowerCase())) .filter(p -> !VALID_SEARCH_FIELDS.contains(p.first.toLowerCase()))
.collect(toList()); .collect(toList());
if (!invalidFilter.isEmpty()) { if (!invalidFilter.isEmpty()) {
@ -210,8 +209,7 @@ public class JpaUserDevfileDao implements UserDevfileDao {
List<Pair<String, String>> effectiveOrder = DEFAULT_ORDER; List<Pair<String, String>> effectiveOrder = DEFAULT_ORDER;
if (order != null && !order.isEmpty()) { if (order != null && !order.isEmpty()) {
List<Pair<String, String>> invalidOrder = List<Pair<String, String>> invalidOrder =
order order.stream()
.stream()
.filter(p -> !VALID_ORDER_FIELDS.contains(p.first.toLowerCase())) .filter(p -> !VALID_ORDER_FIELDS.contains(p.first.toLowerCase()))
.collect(toList()); .collect(toList());
if (!invalidOrder.isEmpty()) { if (!invalidOrder.isEmpty()) {
@ -220,8 +218,7 @@ public class JpaUserDevfileDao implements UserDevfileDao {
} }
List<Pair<String, String>> invalidSortOrder = List<Pair<String, String>> invalidSortOrder =
order order.stream()
.stream()
.filter(p -> !p.second.equalsIgnoreCase("asc") && !p.second.equalsIgnoreCase("desc")) .filter(p -> !p.second.equalsIgnoreCase("asc") && !p.second.equalsIgnoreCase("desc"))
.collect(Collectors.toList()); .collect(Collectors.toList());
if (!invalidSortOrder.isEmpty()) { if (!invalidSortOrder.isEmpty()) {

View File

@ -75,9 +75,7 @@ public class BitbucketServerPersonalAccessTokenFetcher implements PersonalAccess
LOG.debug("Current bitbucket user {} ", user); LOG.debug("Current bitbucket user {} ", user);
// cleanup existed // cleanup existed
List<BitbucketPersonalAccessToken> existingTokens = List<BitbucketPersonalAccessToken> existingTokens =
bitbucketServerApiClient bitbucketServerApiClient.getPersonalAccessTokens(user.getSlug()).stream()
.getPersonalAccessTokens(user.getSlug())
.stream()
.filter(p -> p.getName().equals(tokenName)) .filter(p -> p.getName().equals(tokenName))
.collect(Collectors.toList()); .collect(Collectors.toList());
for (BitbucketPersonalAccessToken existedToken : existingTokens) { for (BitbucketPersonalAccessToken existedToken : existingTokens) {

Some files were not shown because too many files have changed in this diff Show More