From 52ce72b22ef8d92a1f35b4993bcddaaa66d67350 Mon Sep 17 00:00:00 2001
From: Roberto Sánchez <roberto.sanchez@curisit.net>
Date: Thu, 18 Sep 2014 17:55:35 +0000
Subject: [PATCH] #396 fix - Fixed some SonarQube issues
---
securis/src/main/java/net/curisit/securis/security/SecurityInterceptor.java | 8 ++++----
1 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/securis/src/main/java/net/curisit/securis/security/SecurityInterceptor.java b/securis/src/main/java/net/curisit/securis/security/SecurityInterceptor.java
index 1240819..3f5c11c 100644
--- a/securis/src/main/java/net/curisit/securis/security/SecurityInterceptor.java
+++ b/securis/src/main/java/net/curisit/securis/security/SecurityInterceptor.java
@@ -34,7 +34,7 @@
// @PreMatching
@Priority(Priorities.AUTHENTICATION)
public class SecurityInterceptor implements javax.ws.rs.container.ContainerRequestFilter {
- private static final Logger log = LogManager.getLogger(SecurityInterceptor.class);
+ private static final Logger LOG = LogManager.getLogger(SecurityInterceptor.class);
@Inject
private TokenHelper tokenHelper;
@@ -59,7 +59,7 @@
return;
String token = servletRequest.getHeader(TokenHelper.TOKEN_HEADER_PÀRAM);
if (token == null || !tokenHelper.isTokenValid(token)) {
- log.info("Access denied to '{}', Token not valid.", servletRequest.getPathInfo());
+ LOG.info("Access denied to '{}', Token not valid.", servletRequest.getPathInfo());
containerRequestContext.abortWith(Response.status(Status.UNAUTHORIZED).build());
} else {
Securable sec = method.getAnnotation(Securable.class);
@@ -69,7 +69,7 @@
int userRoles = getUserRoles(username);
// if (sec.roles() != 0) {
// if ((sec.roles() & userRoles) == 0) {
- // log.info("User {} has no necessary role to access url: {}", username, servletRequest.getPathInfo());
+ // LOG.info("User {} has no necessary role to access url: {}", username, servletRequest.getPathInfo());
// containerRequestContext.abortWith(Response.status(Status.UNAUTHORIZED).build());
// }
// }
@@ -80,7 +80,7 @@
containerRequestContext.setSecurityContext(scw);
// Next line provide injection in resource methods
ResteasyProviderFactory.pushContext(BasicSecurityContext.class, scw);
- log.debug("Added custom SecurityContext for user {}, orgs: {}", username, orgs);
+ LOG.debug("Added custom SecurityContext for user {}, orgs: {}", username, orgs);
}
}
--
Gitblit v1.3.2