[SCB-2590] enable checkstyle LocalVariableName (#3105)
diff --git a/ci/checkstyle/checkstyle.xml b/ci/checkstyle/checkstyle.xml
index 0b73885..08abf89 100644
--- a/ci/checkstyle/checkstyle.xml
+++ b/ci/checkstyle/checkstyle.xml
@@ -48,6 +48,11 @@
<!-- Checks for placement of the left curly brace ('{'). -->
<property name="severity" value="error"/>
</module>
+ <module name="LocalVariableName">
+ <!-- Validates identifiers for local variables against the
+ expression "^[a-z][a-zA-Z0-9]*$". -->
+ <property name="severity" value="error"/>
+ </module>
<module name="ModifierOrder"/>
<module name="NoWhitespaceAfter">
<!-- Checks that there is no whitespace after various unary operators.
diff --git a/common/common-rest/src/test/java/org/apache/servicecomb/common/rest/codec/query/QueryCodecTestBase.java b/common/common-rest/src/test/java/org/apache/servicecomb/common/rest/codec/query/QueryCodecTestBase.java
index c39e729..f3a4a68 100644
--- a/common/common-rest/src/test/java/org/apache/servicecomb/common/rest/codec/query/QueryCodecTestBase.java
+++ b/common/common-rest/src/test/java/org/apache/servicecomb/common/rest/codec/query/QueryCodecTestBase.java
@@ -42,25 +42,25 @@
}
void should_decode(String value, Object decodedValue) {
- HttpServletRequest Request = new AbstractHttpServletRequest() {
+ HttpServletRequest request = new AbstractHttpServletRequest() {
@Override
public String getParameter(String name) {
return value;
}
};
- should_decode(Request, decodedValue);
+ should_decode(request, decodedValue);
}
void should_decode(String[] value, Object decodedValue) {
- HttpServletRequest Request = new AbstractHttpServletRequest() {
+ HttpServletRequest request = new AbstractHttpServletRequest() {
@Override
public String[] getParameterValues(String name) {
return value;
}
};
- should_decode(Request, decodedValue);
+ should_decode(request, decodedValue);
}
private void should_decode(HttpServletRequest request, Object decodedValue) {
diff --git a/foundations/foundation-ssl/src/test/java/org/apache/servicecomb/foundation/ssl/TrustManagerExtTest.java b/foundations/foundation-ssl/src/test/java/org/apache/servicecomb/foundation/ssl/TrustManagerExtTest.java
index f4b7d2d..f9acbc0 100644
--- a/foundations/foundation-ssl/src/test/java/org/apache/servicecomb/foundation/ssl/TrustManagerExtTest.java
+++ b/foundations/foundation-ssl/src/test/java/org/apache/servicecomb/foundation/ssl/TrustManagerExtTest.java
@@ -269,9 +269,9 @@
MyX509Certificate myX509Certificate1 = new MyX509Certificate();
MyX509Certificate myX509Certificate2 = new MyX509Certificate();
- MyX509Certificate[] MyX509CertificateArray = new MyX509Certificate[2];
- MyX509CertificateArray[0] = myX509Certificate1;
- MyX509CertificateArray[1] = myX509Certificate2;
+ MyX509Certificate[] myX509CertificateArray = new MyX509Certificate[2];
+ myX509CertificateArray[0] = myX509Certificate1;
+ myX509CertificateArray[1] = myX509Certificate2;
new Expectations(CertificateUtil.class) {
{
@@ -289,8 +289,8 @@
Assertions.assertNotNull(trustManagerExt);
boolean validAssert = true;
try {
- trustManagerExt.checkClientTrusted(MyX509CertificateArray, "pks");
- trustManagerExt.checkServerTrusted(MyX509CertificateArray, "pks");
+ trustManagerExt.checkClientTrusted(myX509CertificateArray, "pks");
+ trustManagerExt.checkServerTrusted(myX509CertificateArray, "pks");
trustManagerExt.getAcceptedIssuers();
} catch (Exception e) {
validAssert = false;
@@ -303,9 +303,9 @@
MyX509Certificate myX509Certificate1 = new MyX509Certificate();
MyX509Certificate myX509Certificate2 = new MyX509Certificate();
- MyX509Certificate[] MyX509CertificateArray = new MyX509Certificate[2];
- MyX509CertificateArray[0] = myX509Certificate1;
- MyX509CertificateArray[1] = myX509Certificate2;
+ MyX509Certificate[] myX509CertificateArray = new MyX509Certificate[2];
+ myX509CertificateArray[0] = myX509Certificate1;
+ myX509CertificateArray[1] = myX509Certificate2;
new Expectations() {
{
@@ -324,10 +324,10 @@
SSLEngine sslengine = null;
boolean validAssert = true;
try {
- trustManagerExt.checkClientTrusted(MyX509CertificateArray, "pks", socket);
- trustManagerExt.checkClientTrusted(MyX509CertificateArray, "pks", sslengine);
- trustManagerExt.checkServerTrusted(MyX509CertificateArray, "pks", socket);
- trustManagerExt.checkServerTrusted(MyX509CertificateArray, "pks", sslengine);
+ trustManagerExt.checkClientTrusted(myX509CertificateArray, "pks", socket);
+ trustManagerExt.checkClientTrusted(myX509CertificateArray, "pks", sslengine);
+ trustManagerExt.checkServerTrusted(myX509CertificateArray, "pks", socket);
+ trustManagerExt.checkServerTrusted(myX509CertificateArray, "pks", sslengine);
} catch (Exception e) {
validAssert = false;
}
@@ -339,9 +339,9 @@
MyX509Certificate myX509Certificate1 = new MyX509Certificate();
MyX509Certificate myX509Certificate2 = new MyX509Certificate();
- MyX509Certificate[] MyX509CertificateArray = new MyX509Certificate[2];
- MyX509CertificateArray[0] = myX509Certificate1;
- MyX509CertificateArray[1] = myX509Certificate2;
+ MyX509Certificate[] myX509CertificateArray = new MyX509Certificate[2];
+ myX509CertificateArray[0] = myX509Certificate1;
+ myX509CertificateArray[1] = myX509Certificate2;
new Expectations() {
{
@@ -357,7 +357,7 @@
TrustManagerExt trustManagerExt = new TrustManagerExt(myX509ExtendedTrustManager, option, custom);
boolean validAssert = true;
try {
- trustManagerExt.checkClientTrusted(MyX509CertificateArray, "pks");
+ trustManagerExt.checkClientTrusted(myX509CertificateArray, "pks");
} catch (CertificateException e) {
Assertions.assertEquals("CN does not match IP: e=[10.67.147.114],t=null", e.getMessage());
validAssert = false;
@@ -366,13 +366,13 @@
}
@Test
- public void testCheckClientTrustedExecption(@Mocked CertificateUtil certificateUtil) {
+ public void testCheckClientTrustedException(@Mocked CertificateUtil certificateUtil) {
MyX509Certificate myX509Certificate1 = new MyX509Certificate();
MyX509Certificate myX509Certificate2 = new MyX509Certificate();
- MyX509Certificate[] MyX509CertificateArray = new MyX509Certificate[2];
- MyX509CertificateArray[0] = myX509Certificate1;
- MyX509CertificateArray[1] = myX509Certificate2;
+ MyX509Certificate[] myX509CertificateArray = new MyX509Certificate[2];
+ myX509CertificateArray[0] = myX509Certificate1;
+ myX509CertificateArray[1] = myX509Certificate2;
new Expectations() {
{
@@ -398,10 +398,10 @@
};
boolean validAssert = true;
try {
- trustManagerExt.checkClientTrusted(MyX509CertificateArray, "pks", socket);
- trustManagerExt.checkClientTrusted(MyX509CertificateArray, "pks", sslengine);
- trustManagerExt.checkServerTrusted(MyX509CertificateArray, "pks", socket);
- trustManagerExt.checkServerTrusted(MyX509CertificateArray, "pks", sslengine);
+ trustManagerExt.checkClientTrusted(myX509CertificateArray, "pks", socket);
+ trustManagerExt.checkClientTrusted(myX509CertificateArray, "pks", sslengine);
+ trustManagerExt.checkServerTrusted(myX509CertificateArray, "pks", socket);
+ trustManagerExt.checkServerTrusted(myX509CertificateArray, "pks", sslengine);
} catch (Exception e) {
Assertions.assertEquals("java.security.cert.CertificateException", e.getClass().getName());
validAssert = false;
diff --git a/service-registry/registry-service-center/src/main/java/org/apache/servicecomb/serviceregistry/refresh/ClassificationAddress.java b/service-registry/registry-service-center/src/main/java/org/apache/servicecomb/serviceregistry/refresh/ClassificationAddress.java
index fff2346..b81e070 100644
--- a/service-registry/registry-service-center/src/main/java/org/apache/servicecomb/serviceregistry/refresh/ClassificationAddress.java
+++ b/service-registry/registry-service-center/src/main/java/org/apache/servicecomb/serviceregistry/refresh/ClassificationAddress.java
@@ -142,24 +142,24 @@
}
private Map<String, List<String>> generateZoneAndRegionAddress(String key) {
- InstanceCache KieCaches = instanceCacheManager
+ InstanceCache kieCaches = instanceCacheManager
.getOrCreate(REGISTRY_APP_ID, key, DefinitionConst.VERSION_RULE_LATEST);
- List<CacheEndpoint> CacheEndpoints;
+ List<CacheEndpoint> cacheEndpoints;
if (REGISTRY_SERVICE_NAME.equals(key)) {
- CacheEndpoints = KieCaches.getOrCreateTransportMap().get(defaultTransport);
- maxRetryTimes = CacheEndpoints.size();
+ cacheEndpoints = kieCaches.getOrCreateTransportMap().get(defaultTransport);
+ maxRetryTimes = cacheEndpoints.size();
} else {
- if (KieCaches.getInstanceMap().size() <= 0) {
+ if (kieCaches.getInstanceMap().size() <= 0) {
return null;
}
- CacheEndpoints = KieCaches.getOrCreateTransportMap().get(defaultTransport);
+ cacheEndpoints = kieCaches.getOrCreateTransportMap().get(defaultTransport);
}
Map<String, List<String>> zoneAndRegion = new HashMap<>();
- dataCenterInfo = findRegion(CacheEndpoints);
+ dataCenterInfo = findRegion(cacheEndpoints);
Set<String> sameZone = new HashSet<>();
Set<String> sameRegion = new HashSet<>();
- for (CacheEndpoint cacheEndpoint : CacheEndpoints) {
+ for (CacheEndpoint cacheEndpoint : cacheEndpoints) {
if (regionAndAZMatch(dataCenterInfo, cacheEndpoint.getInstance())) {
sameZone.add(cacheEndpoint.getEndpoint());
} else {
diff --git a/service-registry/registry-service-center/src/test/java/org/apache/servicecomb/serviceregistry/client/TestIpPortManager.java b/service-registry/registry-service-center/src/test/java/org/apache/servicecomb/serviceregistry/client/TestIpPortManager.java
index 3e34874..7f17858 100644
--- a/service-registry/registry-service-center/src/test/java/org/apache/servicecomb/serviceregistry/client/TestIpPortManager.java
+++ b/service-registry/registry-service-center/src/test/java/org/apache/servicecomb/serviceregistry/client/TestIpPortManager.java
@@ -103,12 +103,11 @@
// mock endpoint list
Map<String, List<CacheEndpoint>> addresses = new HashMap<>();
List<CacheEndpoint> cacheEndpoints = new ArrayList<>();
- MicroserviceInstance Instance = new MicroserviceInstance();
- Instance.setDataCenterInfo(null);
- cacheEndpoints.add(new CacheEndpoint("http://127.0.0.1:9982", Instance));
+ MicroserviceInstance instance = new MicroserviceInstance();
+ instance.setDataCenterInfo(null);
+ cacheEndpoints.add(new CacheEndpoint("http://127.0.0.1:9982", instance));
addresses.put("rest", cacheEndpoints);
- ClassificationAddress classificationAddres = new ClassificationAddress(config, cacheManager);
- manager.classificationAddress = classificationAddres;
+ manager.classificationAddress = new ClassificationAddress(config, cacheManager);
new Expectations() {
{
cacheManager.getOrCreate("default", "SERVICECENTER", "latest");
diff --git a/swagger/swagger-generator/generator-core/src/main/java/org/apache/servicecomb/swagger/extend/PropertyModelConverterExt.java b/swagger/swagger-generator/generator-core/src/main/java/org/apache/servicecomb/swagger/extend/PropertyModelConverterExt.java
index 1a876c8..0cf56e4 100644
--- a/swagger/swagger-generator/generator-core/src/main/java/org/apache/servicecomb/swagger/extend/PropertyModelConverterExt.java
+++ b/swagger/swagger-generator/generator-core/src/main/java/org/apache/servicecomb/swagger/extend/PropertyModelConverterExt.java
@@ -51,9 +51,8 @@
return;
}
- List<String> _enum = intEnum.stream()
- .map(value -> value.toString())
- .collect(Collectors.toList());
- ((ModelImpl) model).setEnum(_enum);
+ ((ModelImpl) model).setEnum(intEnum.stream()
+ .map(Object::toString)
+ .collect(Collectors.toList()));
}
}