remove some more ParseFieldMatcher usages
Original commit: elastic/x-pack-elasticsearch@4d3b7574cc
This commit is contained in:
parent
c5cab37db6
commit
51302608cb
|
@ -7,7 +7,6 @@ package org.elasticsearch.xpack.common.http;
|
||||||
|
|
||||||
import org.elasticsearch.ElasticsearchParseException;
|
import org.elasticsearch.ElasticsearchParseException;
|
||||||
import org.elasticsearch.common.ParseField;
|
import org.elasticsearch.common.ParseField;
|
||||||
import org.elasticsearch.common.ParseFieldMatcher;
|
|
||||||
import org.elasticsearch.common.Strings;
|
import org.elasticsearch.common.Strings;
|
||||||
import org.elasticsearch.common.io.stream.StreamInput;
|
import org.elasticsearch.common.io.stream.StreamInput;
|
||||||
import org.elasticsearch.common.io.stream.StreamOutput;
|
import org.elasticsearch.common.io.stream.StreamOutput;
|
||||||
|
|
|
@ -8,8 +8,6 @@ package org.elasticsearch.xpack.notification.email.attachment;
|
||||||
import org.apache.logging.log4j.Logger;
|
import org.apache.logging.log4j.Logger;
|
||||||
import org.elasticsearch.ElasticsearchException;
|
import org.elasticsearch.ElasticsearchException;
|
||||||
import org.elasticsearch.common.ParseField;
|
import org.elasticsearch.common.ParseField;
|
||||||
import org.elasticsearch.common.ParseFieldMatcher;
|
|
||||||
import org.elasticsearch.common.ParseFieldMatcherSupplier;
|
|
||||||
import org.elasticsearch.common.Strings;
|
import org.elasticsearch.common.Strings;
|
||||||
import org.elasticsearch.common.bytes.BytesReference;
|
import org.elasticsearch.common.bytes.BytesReference;
|
||||||
import org.elasticsearch.common.logging.LoggerMessageFormat;
|
import org.elasticsearch.common.logging.LoggerMessageFormat;
|
||||||
|
@ -49,10 +47,9 @@ public class ReportingAttachmentParser implements EmailAttachmentParser<Reportin
|
||||||
public static final Setting<Integer> RETRIES_SETTING =
|
public static final Setting<Integer> RETRIES_SETTING =
|
||||||
Setting.intSetting("xpack.notification.reporting.retries", 40, 0, Setting.Property.NodeScope);
|
Setting.intSetting("xpack.notification.reporting.retries", 40, 0, Setting.Property.NodeScope);
|
||||||
|
|
||||||
private static final ObjectParser<Builder, AuthParseFieldMatcher> PARSER = new ObjectParser<>("reporting_attachment");
|
private static final ObjectParser<Builder, AuthParseContext> PARSER = new ObjectParser<>("reporting_attachment");
|
||||||
private static final ObjectParser<KibanaReportingPayload, ParseFieldMatcherSupplier> PAYLOAD_PARSER =
|
private static final ObjectParser<KibanaReportingPayload, Void> PAYLOAD_PARSER =
|
||||||
new ObjectParser<>("reporting_attachment_kibana_payload", true, null);
|
new ObjectParser<>("reporting_attachment_kibana_payload", true, null);
|
||||||
private static final ParseFieldMatcherSupplier STRICT_PARSING = () -> ParseFieldMatcher.STRICT;
|
|
||||||
|
|
||||||
static {
|
static {
|
||||||
PARSER.declareInt(Builder::retries, new ParseField("retries"));
|
PARSER.declareInt(Builder::retries, new ParseField("retries"));
|
||||||
|
@ -88,7 +85,7 @@ public class ReportingAttachmentParser implements EmailAttachmentParser<Reportin
|
||||||
@Override
|
@Override
|
||||||
public ReportingAttachment parse(String id, XContentParser parser) throws IOException {
|
public ReportingAttachment parse(String id, XContentParser parser) throws IOException {
|
||||||
Builder builder = new Builder(id);
|
Builder builder = new Builder(id);
|
||||||
PARSER.parse(parser, builder, new AuthParseFieldMatcher(authRegistry));
|
PARSER.parse(parser, builder, new AuthParseContext(authRegistry));
|
||||||
return builder.build();
|
return builder.build();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -199,7 +196,7 @@ public class ReportingAttachmentParser implements EmailAttachmentParser<Reportin
|
||||||
// EMPTY is safe here becaus we never call namedObject
|
// EMPTY is safe here becaus we never call namedObject
|
||||||
try (XContentParser parser = JsonXContent.jsonXContent.createParser(NamedXContentRegistry.EMPTY, body)) {
|
try (XContentParser parser = JsonXContent.jsonXContent.createParser(NamedXContentRegistry.EMPTY, body)) {
|
||||||
KibanaReportingPayload payload = new KibanaReportingPayload();
|
KibanaReportingPayload payload = new KibanaReportingPayload();
|
||||||
PAYLOAD_PARSER.parse(parser, payload, STRICT_PARSING);
|
PAYLOAD_PARSER.parse(parser, payload, null);
|
||||||
String path = payload.getPath();
|
String path = payload.getPath();
|
||||||
if (Strings.isEmpty(path)) {
|
if (Strings.isEmpty(path)) {
|
||||||
throw new ElasticsearchException("Watch[{}] reporting[{}] field path found in JSON payload, payload was {}",
|
throw new ElasticsearchException("Watch[{}] reporting[{}] field path found in JSON payload, payload was {}",
|
||||||
|
@ -213,20 +210,15 @@ public class ReportingAttachmentParser implements EmailAttachmentParser<Reportin
|
||||||
* A helper class to parse the HTTPAuth data, which is read by an old school pull parser, that is handed over in the ctor.
|
* A helper class to parse the HTTPAuth data, which is read by an old school pull parser, that is handed over in the ctor.
|
||||||
* See the static parser definition at the top
|
* See the static parser definition at the top
|
||||||
*/
|
*/
|
||||||
private static class AuthParseFieldMatcher implements ParseFieldMatcherSupplier {
|
private static class AuthParseContext {
|
||||||
|
|
||||||
private final HttpAuthRegistry authRegistry;
|
private final HttpAuthRegistry authRegistry;
|
||||||
|
|
||||||
AuthParseFieldMatcher(HttpAuthRegistry authRegistry) {
|
AuthParseContext(HttpAuthRegistry authRegistry) {
|
||||||
this.authRegistry = authRegistry;
|
this.authRegistry = authRegistry;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
HttpAuth parseAuth(XContentParser parser) {
|
||||||
public ParseFieldMatcher getParseFieldMatcher() {
|
|
||||||
return ParseFieldMatcher.EMPTY;
|
|
||||||
}
|
|
||||||
|
|
||||||
public HttpAuth parseAuth(XContentParser parser) {
|
|
||||||
try {
|
try {
|
||||||
return authRegistry.parse(parser);
|
return authRegistry.parse(parser);
|
||||||
} catch (IOException e) {
|
} catch (IOException e) {
|
||||||
|
|
|
@ -7,7 +7,6 @@ package org.elasticsearch.xpack.ssl;
|
||||||
|
|
||||||
import joptsimple.OptionSet;
|
import joptsimple.OptionSet;
|
||||||
import joptsimple.OptionSpec;
|
import joptsimple.OptionSpec;
|
||||||
|
|
||||||
import org.bouncycastle.asn1.DERIA5String;
|
import org.bouncycastle.asn1.DERIA5String;
|
||||||
import org.bouncycastle.asn1.x509.GeneralName;
|
import org.bouncycastle.asn1.x509.GeneralName;
|
||||||
import org.bouncycastle.asn1.x509.GeneralNames;
|
import org.bouncycastle.asn1.x509.GeneralNames;
|
||||||
|
@ -19,11 +18,8 @@ import org.elasticsearch.ExceptionsHelper;
|
||||||
import org.elasticsearch.cli.EnvironmentAwareCommand;
|
import org.elasticsearch.cli.EnvironmentAwareCommand;
|
||||||
import org.elasticsearch.cli.Terminal;
|
import org.elasticsearch.cli.Terminal;
|
||||||
import org.elasticsearch.common.ParseField;
|
import org.elasticsearch.common.ParseField;
|
||||||
import org.elasticsearch.common.ParseFieldMatcher;
|
|
||||||
import org.elasticsearch.common.ParseFieldMatcherSupplier;
|
|
||||||
import org.elasticsearch.common.Strings;
|
import org.elasticsearch.common.Strings;
|
||||||
import org.elasticsearch.common.network.InetAddresses;
|
import org.elasticsearch.common.network.InetAddresses;
|
||||||
import org.elasticsearch.common.settings.Settings;
|
|
||||||
import org.elasticsearch.common.util.set.Sets;
|
import org.elasticsearch.common.util.set.Sets;
|
||||||
import org.elasticsearch.common.xcontent.ConstructingObjectParser;
|
import org.elasticsearch.common.xcontent.ConstructingObjectParser;
|
||||||
import org.elasticsearch.common.xcontent.NamedXContentRegistry;
|
import org.elasticsearch.common.xcontent.NamedXContentRegistry;
|
||||||
|
@ -31,9 +27,9 @@ import org.elasticsearch.common.xcontent.ObjectParser;
|
||||||
import org.elasticsearch.common.xcontent.XContentParser;
|
import org.elasticsearch.common.xcontent.XContentParser;
|
||||||
import org.elasticsearch.common.xcontent.XContentType;
|
import org.elasticsearch.common.xcontent.XContentType;
|
||||||
import org.elasticsearch.env.Environment;
|
import org.elasticsearch.env.Environment;
|
||||||
import org.elasticsearch.node.internal.InternalSettingsPreparer;
|
|
||||||
import org.elasticsearch.xpack.XPackPlugin;
|
import org.elasticsearch.xpack.XPackPlugin;
|
||||||
|
|
||||||
|
import javax.security.auth.x500.X500Principal;
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.io.OutputStream;
|
import java.io.OutputStream;
|
||||||
import java.io.OutputStreamWriter;
|
import java.io.OutputStreamWriter;
|
||||||
|
@ -62,8 +58,6 @@ import java.util.regex.Pattern;
|
||||||
import java.util.zip.ZipEntry;
|
import java.util.zip.ZipEntry;
|
||||||
import java.util.zip.ZipOutputStream;
|
import java.util.zip.ZipOutputStream;
|
||||||
|
|
||||||
import javax.security.auth.x500.X500Principal;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* CLI tool to make generation of certificates or certificate requests easier for users
|
* CLI tool to make generation of certificates or certificate requests easier for users
|
||||||
*/
|
*/
|
||||||
|
@ -80,9 +74,9 @@ public class CertificateTool extends EnvironmentAwareCommand {
|
||||||
Pattern.compile("[a-zA-Z0-9!@#$%^&{}\\[\\]()_+\\-=,.~'` ]{1," + MAX_FILENAME_LENGTH + "}");
|
Pattern.compile("[a-zA-Z0-9!@#$%^&{}\\[\\]()_+\\-=,.~'` ]{1," + MAX_FILENAME_LENGTH + "}");
|
||||||
private static final int DEFAULT_KEY_SIZE = 2048;
|
private static final int DEFAULT_KEY_SIZE = 2048;
|
||||||
|
|
||||||
private static final ObjectParser<List<CertificateInformation>, CertInfoParseContext> PARSER = new ObjectParser<>("certgen");
|
private static final ObjectParser<List<CertificateInformation>, Void> PARSER = new ObjectParser<>("certgen");
|
||||||
static {
|
static {
|
||||||
ConstructingObjectParser<CertificateInformation, CertInfoParseContext> instanceParser =
|
ConstructingObjectParser<CertificateInformation, Void> instanceParser =
|
||||||
new ConstructingObjectParser<>("instances",
|
new ConstructingObjectParser<>("instances",
|
||||||
a -> new CertificateInformation((String) a[0], (String) (a[1] == null ? a[0] : a[1]),
|
a -> new CertificateInformation((String) a[0], (String) (a[1] == null ? a[0] : a[1]),
|
||||||
(List<String>) a[2], (List<String>) a[3]));
|
(List<String>) a[2], (List<String>) a[3]));
|
||||||
|
@ -248,7 +242,7 @@ public class CertificateTool extends EnvironmentAwareCommand {
|
||||||
try (Reader reader = Files.newBufferedReader(file)) {
|
try (Reader reader = Files.newBufferedReader(file)) {
|
||||||
// EMPTY is safe here because we never use namedObject
|
// EMPTY is safe here because we never use namedObject
|
||||||
XContentParser xContentParser = XContentType.YAML.xContent().createParser(NamedXContentRegistry.EMPTY, reader);
|
XContentParser xContentParser = XContentType.YAML.xContent().createParser(NamedXContentRegistry.EMPTY, reader);
|
||||||
return PARSER.parse(xContentParser, new ArrayList<>(), new CertInfoParseContext());
|
return PARSER.parse(xContentParser, new ArrayList<>(), null);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -632,20 +626,6 @@ public class CertificateTool extends EnvironmentAwareCommand {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private static class CertInfoParseContext implements ParseFieldMatcherSupplier {
|
|
||||||
|
|
||||||
private final ParseFieldMatcher parseFieldMatcher;
|
|
||||||
|
|
||||||
CertInfoParseContext() {
|
|
||||||
this.parseFieldMatcher = ParseFieldMatcher.EMPTY;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public ParseFieldMatcher getParseFieldMatcher() {
|
|
||||||
return parseFieldMatcher;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
private interface Writer {
|
private interface Writer {
|
||||||
void write(ZipOutputStream zipOutputStream, JcaPEMWriter pemWriter) throws Exception;
|
void write(ZipOutputStream zipOutputStream, JcaPEMWriter pemWriter) throws Exception;
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue