diff --git a/connector-runtime/connector-runtime-core/pom.xml b/connector-runtime/connector-runtime-core/pom.xml index b6fb989a6c..42ee64ba4f 100644 --- a/connector-runtime/connector-runtime-core/pom.xml +++ b/connector-runtime/connector-runtime-core/pom.xml @@ -49,7 +49,7 @@ io.camunda.spring - java-client-operate + java-client-operate-legacy diff --git a/connector-runtime/connector-runtime-spring/pom.xml b/connector-runtime/connector-runtime-spring/pom.xml index 12d010f7bb..adfe611836 100644 --- a/connector-runtime/connector-runtime-spring/pom.xml +++ b/connector-runtime/connector-runtime-spring/pom.xml @@ -49,7 +49,7 @@ io.camunda.spring - java-client-operate + java-client-operate-legacy diff --git a/connector-runtime/connector-runtime-spring/src/main/java/io/camunda/connector/runtime/secret/ConsoleSecretApiClient.java b/connector-runtime/connector-runtime-spring/src/main/java/io/camunda/connector/runtime/secret/ConsoleSecretApiClient.java index e49d4bd578..05577efae7 100644 --- a/connector-runtime/connector-runtime-spring/src/main/java/io/camunda/connector/runtime/secret/ConsoleSecretApiClient.java +++ b/connector-runtime/connector-runtime-spring/src/main/java/io/camunda/connector/runtime/secret/ConsoleSecretApiClient.java @@ -66,7 +66,7 @@ public Map getSecrets() { try (CloseableHttpClient httpClient = HttpClientBuilder.create().build()) { var request = new HttpGet(secretsEndpoint); var authHeader = authentication.getTokenHeader(Product.CONSOLE); - request.addHeader(authHeader.getKey(), authHeader.getValue()); + authHeader.forEach(request::addHeader); return httpClient.execute(request, this::handleSecretsResponse); } catch (Exception e) { throw new RuntimeException(e); diff --git a/connector-runtime/connector-runtime-spring/src/test/java/io/camunda/connector/runtime/secret/ConsoleSecretProviderTest.java b/connector-runtime/connector-runtime-spring/src/test/java/io/camunda/connector/runtime/secret/ConsoleSecretProviderTest.java index 1e09254cae..dbc1350d2d 100644 --- a/connector-runtime/connector-runtime-spring/src/test/java/io/camunda/connector/runtime/secret/ConsoleSecretProviderTest.java +++ b/connector-runtime/connector-runtime-spring/src/test/java/io/camunda/connector/runtime/secret/ConsoleSecretProviderTest.java @@ -37,6 +37,7 @@ import org.mockito.Mockito; public class ConsoleSecretProviderTest { + private static final String TOKEN_VALUE = "Bearer XXX"; @RegisterExtension static WireMockExtension wm = @@ -44,7 +45,7 @@ public class ConsoleSecretProviderTest { static Authentication auth; - static Map.Entry authToken; + static Map authToken; static ConsoleSecretApiClient client; @@ -52,8 +53,7 @@ public class ConsoleSecretProviderTest { static void beforeAll() { // Mock authentication auth = Mockito.mock(Authentication.class); - authToken = - Collections.singletonMap("Authorization", "Bearer XXX").entrySet().iterator().next(); + authToken = Collections.singletonMap("Authorization", TOKEN_VALUE); when(auth.getTokenHeader(Product.CONSOLE)).thenReturn(authToken); client = new ConsoleSecretApiClient(wm.baseUrl() + "/secrets", auth); @@ -65,7 +65,7 @@ void testSuccessfulSecretsHandling() { var secretsResponse = Collections.singletonMap("secretKey", "secretValue"); wm.stubFor( get(urlPathMatching("/secrets")) - .withHeader("Authorization", matching(authToken.getValue())) + .withHeader("Authorization", matching(TOKEN_VALUE)) .willReturn(ResponseDefinitionBuilder.okForJson(secretsResponse))); // Test the client @@ -82,7 +82,7 @@ void testFailureOnInitialLoad() { // Mock failing response wm.stubFor( get(urlPathMatching("/secrets")) - .withHeader("Authorization", matching(authToken.getValue())) + .withHeader("Authorization", matching(TOKEN_VALUE)) .willReturn(ResponseDefinitionBuilder.responseDefinition().withStatus(500))); // Test the client @@ -95,7 +95,7 @@ void testSuccessfulSecretResolvingInCaseOfFailure() throws InterruptedException var secretsResponse = Collections.singletonMap("secretKey", "secretValue"); wm.stubFor( get(urlPathMatching("/secrets")) - .withHeader("Authorization", matching(authToken.getValue())) + .withHeader("Authorization", matching(TOKEN_VALUE)) .willReturn(ResponseDefinitionBuilder.okForJson(secretsResponse))); var consoleSecretProvider = new ConsoleSecretProvider(client, Duration.ofMillis(1)); @@ -107,7 +107,7 @@ void testSuccessfulSecretResolvingInCaseOfFailure() throws InterruptedException // Mock failing response wm.stubFor( get(urlPathMatching("/secrets")) - .withHeader("Authorization", matching(authToken.getValue())) + .withHeader("Authorization", matching(TOKEN_VALUE)) .willReturn(ResponseDefinitionBuilder.responseDefinition().withStatus(500))); // Previously cached secret should still be resolved @@ -120,7 +120,7 @@ void testSuccessfulSecretResolvingInCaseOfFailure() throws InterruptedException secretsResponse = Collections.singletonMap("secretKey", "newSecretValue"); wm.stubFor( get(urlPathMatching("/secrets")) - .withHeader("Authorization", matching(authToken.getValue())) + .withHeader("Authorization", matching(TOKEN_VALUE)) .willReturn(ResponseDefinitionBuilder.okForJson(secretsResponse))); // New secrets should be resolved diff --git a/connectors-e2e-test/connectors-e2e-test-base/pom.xml b/connectors-e2e-test/connectors-e2e-test-base/pom.xml index e042b89a36..d30ffb823c 100644 --- a/connectors-e2e-test/connectors-e2e-test-base/pom.xml +++ b/connectors-e2e-test/connectors-e2e-test-base/pom.xml @@ -44,6 +44,10 @@ org.junit.jupiter junit-jupiter + + org.junit.jupiter + junit-jupiter-api + org.assertj assertj-core diff --git a/parent/pom.xml b/parent/pom.xml index 63843ea8fb..1ecd17a301 100644 --- a/parent/pom.xml +++ b/parent/pom.xml @@ -73,7 +73,7 @@ limitations under the License. 8.5.5 1.17.7 - 8.5.5 + 8.5.16 8.5.5 @@ -295,7 +295,7 @@ limitations under the License. io.camunda.spring - java-client-operate + java-client-operate-legacy ${version.spring-zeebe}