diff --git a/.github/workflows/pull-requests.yml b/.github/workflows/pull-requests.yml index af13c80b..180088ab 100644 --- a/.github/workflows/pull-requests.yml +++ b/.github/workflows/pull-requests.yml @@ -24,3 +24,9 @@ jobs: - name: Step 4 - Build client run: ./scripts/build_client.sh + + - name: Step 5 - Upload coverage reports to Codecov + uses: codecov/codecov-action@v4 + with: + token: ${{ secrets.CODECOV_TOKEN }} + verbose: true diff --git a/.github/workflows/push-in-develop.yml b/.github/workflows/push-in-develop.yml index f45991d1..2718b5e1 100644 --- a/.github/workflows/push-in-develop.yml +++ b/.github/workflows/push-in-develop.yml @@ -21,10 +21,16 @@ jobs: - name: Step 3 - Build & Test run: mvn clean verify -ntp - - name: Step 5 - Build client + - name: Step 4 - Build client run: ./scripts/build_client.sh - - name: Maven deploy snapshot + - name: Step 5 - Upload coverage reports to Codecov + uses: codecov/codecov-action@v4 + with: + token: ${{ secrets.CODECOV_TOKEN }} + verbose: true + + - name: Step 6 - Maven deploy snapshot run: ./scripts/mvn_deploy.sh env: SONATYPE_USERNAME: ${{ secrets.SONATYPE_USERNAME }} @@ -32,4 +38,4 @@ jobs: GPG_EXECUTABLE: gpg GPG_PASSPHRASE: ${{ secrets.GPG_PASSPHRASE }} GPG_SECRET_KEY: ${{ secrets.GPG_SECRET_KEY }} - GPG_OWNERTRUST: ${{ secrets.GPG_OWNERTRUST }} + GPG_OWNERTRUST: ${{ secrets.GPG_OWNERTRUST }} \ No newline at end of file diff --git a/README.md b/README.md index 1d669fa4..cbc8e6f3 100644 --- a/README.md +++ b/README.md @@ -1,4 +1,6 @@ -# secure-token-service [![Build Status](https://travis-ci.com/adorsys/secure-token-service.svg?branch=master)](https://travis-ci.com/adorsys/secure-token-service) +[![codecov](https://codecov.io/gh/adorsys/secure-token-service/branch/develop/graph/badge.svg)](https://codecov.io/gh/adorsys/secure-token-service) + +# secure-token-service This an implementation of the secure token service as specified in the token exchange working draft https://tools.ietf.org/html/draft-ietf-oauth-token-exchange-08. diff --git a/pom.xml b/pom.xml index bf6e44f6..851f318e 100644 --- a/pom.xml +++ b/pom.xml @@ -57,14 +57,15 @@ 2.15.1 2.15.1 22.0.4 - 3.0.0-M4 - 0.8.8 + 3.2.5 + 3.2.5 + 0.8.12 1.19.7 10.10.0 42.7.3 2.2.224 - 5.11.0 - 1.4.6 + 5.12.0 + 2.0 9.37.3 1.6.13 diff --git a/sts-secret-server/pom.xml b/sts-secret-server/pom.xml index 79a6bf07..305fc8d2 100644 --- a/sts-secret-server/pom.xml +++ b/sts-secret-server/pom.xml @@ -134,9 +134,8 @@ org.apache.maven.plugins maven-failsafe-plugin - 2.22.0 + ${failsafe.version} - --add-opens java.base/java.lang=ALL-UNNAMED **/*IT.java diff --git a/sts-secret-server/src/test/java/de/adorsys/sts/secretserver/SecretServerApplicationTest.java b/sts-secret-server/src/test/java/de/adorsys/sts/secretserver/SecretServerApplicationTest.java index 1ee49750..36ace256 100644 --- a/sts-secret-server/src/test/java/de/adorsys/sts/secretserver/SecretServerApplicationTest.java +++ b/sts-secret-server/src/test/java/de/adorsys/sts/secretserver/SecretServerApplicationTest.java @@ -141,7 +141,7 @@ void shouldNotGetSecretForInvalidAccessToken() throws Exception { "20qD2QfgDoA0CpOZCQzMe9WoIfo8L-g4099--XouFyMWRU8VyVsx_73ekNKPUmWvuNIxeF3PBk9KGs7ABUnv_6n8A-KqzYTyA4y0gU" + "8E9mgIuWpDmQ2FROf1Gd-2it9k3tvr83k7N1dMvg"; - catchException(client).exchangeToken("/secret-server/token-exchange", MOPED_CLIENT_AUDIENCE, invalidAccessToken); + catchException(() -> client.exchangeToken("/secret-server/token-exchange", MOPED_CLIENT_AUDIENCE, invalidAccessToken)); Exception caughtException = caughtException(); @@ -153,7 +153,7 @@ void shouldNotGetSecretForInvalidAccessToken() throws Exception { void shouldNotGetSecretForFakeAccessToken() throws Exception { final String fakeAccessToken = "my fake access token"; - catchException(client).exchangeToken("/secret-server/token-exchange", MOPED_CLIENT_AUDIENCE, fakeAccessToken); + catchException(() -> client.exchangeToken("/secret-server/token-exchange", MOPED_CLIENT_AUDIENCE, fakeAccessToken)); Exception caughtException = caughtException(); diff --git a/sts-token-auth/src/test/resources/mockito-extensions/org.mockito.plugins.MockMaker b/sts-token-auth/src/test/resources/mockito-extensions/org.mockito.plugins.MockMaker deleted file mode 100644 index 1f0955d4..00000000 --- a/sts-token-auth/src/test/resources/mockito-extensions/org.mockito.plugins.MockMaker +++ /dev/null @@ -1 +0,0 @@ -mock-maker-inline