Skip to content

Commit 4c3cc7c

Browse files
committed
Upgrade Orchestrator
1 parent 414deb1 commit 4c3cc7c

7 files changed

Lines changed: 42 additions & 21 deletions

File tree

.cix.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33

44
SQ_VERSION:
55
- DEV
6-
- LTS
6+
- LATEST_RELEASE[6.7]
77
- LATEST_RELEASE
88

99
JAVA_VERSION:

.gitignore

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,3 +28,6 @@ Icon?
2828
Thumbs.db
2929
# Folder config file
3030
Desktop.ini
31+
32+
# Scanner work
33+
.scannerwork

its/it-tests/pom.xml

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,16 @@
1818
</properties>
1919

2020
<dependencies>
21+
<dependency>
22+
<groupId>com.google.code.findbugs</groupId>
23+
<artifactId>jsr305</artifactId>
24+
<scope>provided</scope>
25+
</dependency>
26+
2127
<dependency>
2228
<groupId>org.sonarsource.orchestrator</groupId>
2329
<artifactId>sonar-orchestrator</artifactId>
24-
<version>3.14.0.887</version>
30+
<version>3.22.0.1751</version>
2531
<scope>test</scope>
2632
<exclusions>
2733
<exclusion>

its/it-tests/src/test/java/com/sonar/scanner/api/it/ProxyTest.java

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,7 @@
2525
import com.sonar.scanner.api.it.tools.ProxyAuthenticator;
2626
import com.sonar.scanner.api.it.tools.SimpleScanner;
2727
import java.io.IOException;
28+
import java.net.InetAddress;
2829
import java.nio.file.Path;
2930
import java.nio.file.Paths;
3031
import java.util.HashMap;
@@ -84,7 +85,7 @@ public void stopProxy() throws Exception {
8485
}
8586

8687
private static void startProxy(boolean needProxyAuth) throws Exception {
87-
httpProxyPort = NetworkUtils.getNextAvailablePort();
88+
httpProxyPort = NetworkUtils.getNextAvailablePort(InetAddress.getLocalHost());
8889

8990
// Setup Threadpool
9091
QueuedThreadPool threadPool = new QueuedThreadPool();
@@ -211,7 +212,7 @@ public void simple_analysis_with_proxy_auth() throws Exception {
211212
params.put("http.proxyPassword", PROXY_PASSWORD);
212213
buildResult = scanner.executeSimpleProject(project("js-sample"), ORCHESTRATOR.getServer().getUrl(), params);
213214
assertThat(seenByProxy).isNotEmpty();
214-
if (ORCHESTRATOR.getServer().version().isGreaterThanOrEquals("6.1")) {
215+
if (ORCHESTRATOR.getServer().version().isGreaterThanOrEquals(6, 1)) {
215216
assertThat(buildResult.getLastStatus()).isEqualTo(0);
216217
}
217218
}

its/it-tests/src/test/java/com/sonar/scanner/api/it/SSLTest.java

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,7 @@
2323
import com.sonar.orchestrator.build.BuildResult;
2424
import com.sonar.orchestrator.util.NetworkUtils;
2525
import com.sonar.scanner.api.it.tools.SimpleScanner;
26+
import java.net.InetAddress;
2627
import java.nio.file.Path;
2728
import java.nio.file.Paths;
2829
import java.util.HashMap;
@@ -82,8 +83,8 @@ public void stopProxy() throws Exception {
8283
}
8384

8485
private static void startSSLTransparentReverseProxy(boolean requireClientAuth) throws Exception {
85-
int httpPort = NetworkUtils.getNextAvailablePort();
86-
httpsPort = NetworkUtils.getNextAvailablePort();
86+
int httpPort = NetworkUtils.getNextAvailablePort(InetAddress.getLocalHost());
87+
httpsPort = NetworkUtils.getNextAvailablePort(InetAddress.getLocalHost());
8788

8889
// Setup Threadpool
8990
QueuedThreadPool threadPool = new QueuedThreadPool();
@@ -203,5 +204,4 @@ public void simple_analysis_with_server_certificate() throws Exception {
203204
buildResult = scanner.executeSimpleProject(project("js-sample"), "https://localhost:" + httpsPort, params);
204205
assertThat(buildResult.getLastStatus()).isEqualTo(0);
205206
}
206-
207207
}

its/it-tests/src/test/java/com/sonar/scanner/api/it/ScannerApiTestSuite.java

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,19 +20,32 @@
2020
package com.sonar.scanner.api.it;
2121

2222
import com.sonar.orchestrator.Orchestrator;
23+
import com.sonar.orchestrator.locator.MavenLocation;
24+
import org.apache.commons.lang.StringUtils;
2325
import org.junit.ClassRule;
2426
import org.junit.runner.RunWith;
2527
import org.junit.runners.Suite;
2628
import org.junit.runners.Suite.SuiteClasses;
2729

30+
import static org.assertj.core.api.Assertions.fail;
31+
2832
@RunWith(Suite.class)
2933
@SuiteClasses({ProxyTest.class, SSLTest.class, PropertiesTest.class})
3034
public class ScannerApiTestSuite {
35+
private static final String SONAR_RUNTIME_VERSION = "sonar.runtimeVersion";
3136

3237
@ClassRule
3338
public static final Orchestrator ORCHESTRATOR = Orchestrator.builderEnv()
34-
.setOrchestratorProperty("javascriptVersion", "LATEST_RELEASE")
35-
.addPlugin("javascript")
39+
.setSonarVersion(getSystemPropertyOrFail(SONAR_RUNTIME_VERSION))
40+
.addPlugin(MavenLocation.of("org.sonarsource.javascript", "sonar-javascript-plugin", "LATEST_RELEASE"))
3641
.build();
3742

43+
private static String getSystemPropertyOrFail(String orchestratorPropertiesSource) {
44+
String propertyValue = System.getProperty(orchestratorPropertiesSource);
45+
if (StringUtils.isEmpty(propertyValue)) {
46+
fail(orchestratorPropertiesSource + " system property must be defined");
47+
}
48+
return propertyValue;
49+
}
50+
3851
}

its/it-tests/src/test/java/com/sonar/scanner/api/it/tools/CommandExecutor.java

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -19,17 +19,6 @@
1919
*/
2020
package com.sonar.scanner.api.it.tools;
2121

22-
import org.apache.commons.exec.CommandLine;
23-
import org.apache.commons.exec.DefaultExecutor;
24-
import org.apache.commons.exec.ExecuteStreamHandler;
25-
import org.apache.commons.exec.ExecuteWatchdog;
26-
import org.apache.commons.exec.PumpStreamHandler;
27-
import org.apache.commons.io.output.TeeOutputStream;
28-
import org.slf4j.Logger;
29-
import org.slf4j.LoggerFactory;
30-
31-
import javax.annotation.Nullable;
32-
3322
import java.io.ByteArrayOutputStream;
3423
import java.io.IOException;
3524
import java.io.InputStream;
@@ -44,6 +33,15 @@
4433
import java.util.HashSet;
4534
import java.util.Map;
4635
import java.util.Set;
36+
import javax.annotation.Nullable;
37+
import org.apache.commons.exec.CommandLine;
38+
import org.apache.commons.exec.DefaultExecutor;
39+
import org.apache.commons.exec.ExecuteStreamHandler;
40+
import org.apache.commons.exec.ExecuteWatchdog;
41+
import org.apache.commons.exec.PumpStreamHandler;
42+
import org.apache.commons.io.output.TeeOutputStream;
43+
import org.slf4j.Logger;
44+
import org.slf4j.LoggerFactory;
4745

4846
public class CommandExecutor {
4947
private static final Logger LOG = LoggerFactory.getLogger(CommandExecutor.class);
@@ -68,7 +66,7 @@ public int execute(String[] args, Map<String, String> env) throws IOException {
6866

6967
public int execute(String[] args, Map<String, String> env, @Nullable Path workingDir) throws IOException {
7068
if (!Files.isExecutable(file)) {
71-
Set<PosixFilePermission> perms = new HashSet<PosixFilePermission>();
69+
Set<PosixFilePermission> perms = new HashSet<>();
7270
perms.add(PosixFilePermission.OWNER_READ);
7371
perms.add(PosixFilePermission.OWNER_EXECUTE);
7472
Files.setPosixFilePermissions(file, perms);

0 commit comments

Comments
 (0)