KEYCLOAK-12213 Fix minor warnings with modificators for methods and fields in module "server-spi"

This commit is contained in:
Andrei Arlou 2019-11-23 10:36:00 +03:00 committed by Stian Thorgersen
parent 363c789ab9
commit 71b17375de
14 changed files with 40 additions and 40 deletions

View file

@ -23,7 +23,7 @@ package org.keycloak.models;
*/
public class ClaimTypeModel {
public static enum ValueType {
public enum ValueType {
BOOLEAN,
INT,
STRING,

View file

@ -127,10 +127,10 @@ public interface ClientModel extends ClientScopeModel, RoleContainerModel, Prot
*
* @return
*/
public String getAuthenticationFlowBindingOverride(String binding);
public Map<String, String> getAuthenticationFlowBindingOverrides();
public void removeAuthenticationFlowBindingOverride(String binding);
public void setAuthenticationFlowBindingOverride(String binding, String flowId);
String getAuthenticationFlowBindingOverride(String binding);
Map<String, String> getAuthenticationFlowBindingOverrides();
void removeAuthenticationFlowBindingOverride(String binding);
void setAuthenticationFlowBindingOverride(String binding, String flowId);
boolean isFrontchannelLogout();
void setFrontchannelLogout(boolean flag);

View file

@ -62,7 +62,7 @@ public class CredentialValidationOutput {
throw new IllegalStateException("Not supported yet");
}
public static enum Status {
public enum Status {
AUTHENTICATED, FAILED, CONTINUE
}
}

View file

@ -24,6 +24,6 @@ package org.keycloak.models;
*/
public interface KeycloakSessionTask {
public void run(KeycloakSession session);
void run(KeycloakSession session);
}

View file

@ -328,8 +328,8 @@ public interface RealmModel extends RoleContainerModel {
IdentityProviderMapperModel addIdentityProviderMapper(IdentityProviderMapperModel model);
void removeIdentityProviderMapper(IdentityProviderMapperModel mapping);
void updateIdentityProviderMapper(IdentityProviderMapperModel mapping);
public IdentityProviderMapperModel getIdentityProviderMapperById(String id);
public IdentityProviderMapperModel getIdentityProviderMapperByName(String brokerAlias, String name);
IdentityProviderMapperModel getIdentityProviderMapperById(String id);
IdentityProviderMapperModel getIdentityProviderMapperByName(String brokerAlias, String name);
/**

View file

@ -150,7 +150,7 @@ public interface UserModel extends RoleMapperModel {
String getServiceAccountClientLink();
void setServiceAccountClientLink(String clientInternalId);
public static enum RequiredAction {
enum RequiredAction {
VERIFY_EMAIL, UPDATE_PROFILE, CONFIGURE_TOTP, UPDATE_PASSWORD, TERMS_AND_CONDITIONS
}
}

View file

@ -38,8 +38,8 @@ public interface UserProvider extends Provider,
UserBulkUpdateProvider {
// Note: The reason there are so many query methods here is for layering a cache on top of an persistent KeycloakSession
public void addFederatedIdentity(RealmModel realm, UserModel user, FederatedIdentityModel socialLink);
public boolean removeFederatedIdentity(RealmModel realm, UserModel user, String socialProvider);
void addFederatedIdentity(RealmModel realm, UserModel user, FederatedIdentityModel socialLink);
boolean removeFederatedIdentity(RealmModel realm, UserModel user, String socialProvider);
void updateFederatedIdentity(RealmModel realm, UserModel federatedUser, FederatedIdentityModel federatedIdentityModel);
Set<FederatedIdentityModel> getFederatedIdentities(UserModel user, RealmModel realm);
FederatedIdentityModel getFederatedIdentity(UserModel user, String socialProvider, RealmModel realm);

View file

@ -74,10 +74,10 @@ public interface UserSessionModel {
void removeAuthenticatedClientSessions(Collection<String> removedClientUUIDS);
public String getNote(String name);
public void setNote(String name, String value);
public void removeNote(String name);
public Map<String, String> getNotes();
String getNote(String name);
void setNote(String name, String value);
void removeNote(String name);
Map<String, String> getNotes();
State getState();
void setState(State state);
@ -85,7 +85,7 @@ public interface UserSessionModel {
// Will completely restart whole state of user session. It will just keep same ID.
void restartSession(RealmModel realm, UserModel user, String loginUsername, String ipAddress, String authMethod, boolean rememberMe, String brokerSessionId, String brokerUserId);
public static enum State {
enum State {
LOGGED_IN,
LOGGING_OUT,
LOGGED_OUT

View file

@ -12,10 +12,10 @@ import java.io.IOException;
public class OTPCredentialModel extends CredentialModel {
public final static String TYPE = "otp";
public static final String TYPE = "otp";
public final static String TOTP = "totp";
public final static String HOTP = "hotp";
public static final String TOTP = "totp";
public static final String HOTP = "hotp";
private final OTPCredentialData credentialData;
private final OTPSecretData secretData;

View file

@ -9,8 +9,8 @@ import java.io.IOException;
public class PasswordCredentialModel extends CredentialModel {
public final static String TYPE = "password";
public final static String PASSWORD_HISTORY = "password-history";
public static final String TYPE = "password";
public static final String PASSWORD_HISTORY = "password-history";
private final PasswordCredentialData credentialData;
private final PasswordSecretData secretData;

View file

@ -31,7 +31,7 @@ import org.keycloak.util.JsonSerialization;
*/
public class WebAuthnCredentialModel extends CredentialModel {
public final static String TYPE = "webauthn";
public static final String TYPE = "webauthn";
private final WebAuthnCredentialData credentialData;
private final WebAuthnSecretData secretData;

View file

@ -31,27 +31,27 @@ import org.keycloak.models.KeycloakSessionFactory;
*/
public interface ProviderFactory<T extends Provider> {
public T create(KeycloakSession session);
T create(KeycloakSession session);
/**
* Only called once when the factory is first created. This config is pulled from keycloak_server.json
*
* @param config
*/
public void init(Config.Scope config);
void init(Config.Scope config);
/**
* Called after all provider factories have been initialized
*/
public void postInit(KeycloakSessionFactory factory);
void postInit(KeycloakSessionFactory factory);
/**
* This is called when the server shuts down.
*
*/
public void close();
void close();
public String getId();
String getId();
default int order() {
return 0;

View file

@ -27,19 +27,19 @@ import org.keycloak.models.RealmModel;
*/
public interface CommonClientSessionModel {
public String getRedirectUri();
public void setRedirectUri(String uri);
String getRedirectUri();
void setRedirectUri(String uri);
public RealmModel getRealm();
public ClientModel getClient();
RealmModel getRealm();
ClientModel getClient();
public String getAction();
public void setAction(String action);
String getAction();
void setAction(String action);
public String getProtocol();
public void setProtocol(String method);
String getProtocol();
void setProtocol(String method);
public static enum Action {
enum Action {
OAUTH_GRANT,
AUTHENTICATE,
LOGGED_OUT,
@ -47,7 +47,7 @@ public interface CommonClientSessionModel {
REQUIRED_ACTIONS
}
public enum ExecutionStatus {
enum ExecutionStatus {
FAILED,
SUCCESS,
SETUP_REQUIRED,

View file

@ -28,8 +28,8 @@ import java.util.Set;
*/
public interface UserBrokerLinkFederatedStorage {
String getUserByFederatedIdentity(FederatedIdentityModel socialLink, RealmModel realm);
public void addFederatedIdentity(RealmModel realm, String userId, FederatedIdentityModel socialLink);
public boolean removeFederatedIdentity(RealmModel realm, String userId, String socialProvider);
void addFederatedIdentity(RealmModel realm, String userId, FederatedIdentityModel socialLink);
boolean removeFederatedIdentity(RealmModel realm, String userId, String socialProvider);
void updateFederatedIdentity(RealmModel realm, String userId, FederatedIdentityModel federatedIdentityModel);
Set<FederatedIdentityModel> getFederatedIdentities(String userId, RealmModel realm);
FederatedIdentityModel getFederatedIdentity(String userId, String socialProvider, RealmModel realm);