Fixing javadoc related warnings.

Signed-off-by: Max Lambrecht <maxlambrecht@gmail.com>
This commit is contained in:
Max Lambrecht 2020-06-18 11:29:39 -03:00
parent db57253657
commit f967aa81a6
12 changed files with 35 additions and 10 deletions

View File

@ -15,13 +15,18 @@ subprojects {
apply plugin: 'java-library' apply plugin: 'java-library'
sourceCompatibility = JavaVersion.VERSION_1_8
targetCompatibility = JavaVersion.VERSION_1_8
java { java {
withJavadocJar() withJavadocJar()
withSourcesJar() withSourcesJar()
} }
sourceCompatibility = JavaVersion.VERSION_1_8 javadoc {
targetCompatibility = JavaVersion.VERSION_1_8 exclude "**/grpc/**"
exclude "**/internal/**"
}
ext { ext {
jupiterVersion = '5.6.2' jupiterVersion = '5.6.2'

View File

@ -114,7 +114,7 @@ public class JwtBundle implements BundleSource<JwtBundle> {
} }
/** /**
* Returns the JWT authorities in the bundle, keyed by key ID. * @return the JWT authorities in the bundle, keyed by key ID.
*/ */
public Map<String, PublicKey> getJwtAuthorities() { public Map<String, PublicKey> getJwtAuthorities() {
return Collections.unmodifiableMap(jwtAuthorities); return Collections.unmodifiableMap(jwtAuthorities);
@ -136,7 +136,10 @@ public class JwtBundle implements BundleSource<JwtBundle> {
} }
/** /**
* Returns true if the bundle has a JWT authority with the given key ID. * Looks for a JWT authority id in the JWT bundle.
*
* @param keyId id of a JWT Authority
* @return true if the bundle has a JWT authority with the given key ID.
*/ */
public boolean hasJwtAuthority(String keyId) { public boolean hasJwtAuthority(String keyId) {
return jwtAuthorities.containsKey(keyId); return jwtAuthorities.containsKey(keyId);
@ -158,6 +161,8 @@ public class JwtBundle implements BundleSource<JwtBundle> {
/** /**
* Removes the JWT authority identified by the key ID from the bundle. * Removes the JWT authority identified by the key ID from the bundle.
*
* @param keyId The key id of the JWT authority to be removed
*/ */
public void removeJwtAuthority(String keyId) { public void removeJwtAuthority(String keyId) {
jwtAuthorities.remove(keyId); jwtAuthorities.remove(keyId);

View File

@ -56,7 +56,7 @@ public class JwtBundleSet implements BundleSource<JwtBundle> {
} }
/** /**
* Returns the map of JWT bundles keyed by trust domain. * @return the map of JWT bundles keyed by trust domain.
*/ */
public Map<TrustDomain, JwtBundle> getBundles() { public Map<TrustDomain, JwtBundle> getBundles() {
return Collections.unmodifiableMap(bundles); return Collections.unmodifiableMap(bundles);

View File

@ -107,7 +107,7 @@ public class X509Bundle implements BundleSource<X509Bundle> {
} }
/** /**
* Returns the X.509 Authorities in the bundle. * @return the X.509 Authorities in the bundle.
*/ */
public Set<X509Certificate> getX509Authorities() { public Set<X509Certificate> getX509Authorities() {
return Collections.unmodifiableSet(x509Authorities); return Collections.unmodifiableSet(x509Authorities);
@ -115,6 +115,8 @@ public class X509Bundle implements BundleSource<X509Bundle> {
/** /**
* Checks if the given X.509 authority exists in the bundle. * Checks if the given X.509 authority exists in the bundle.
* @param x509Authority an X.509 certificate
* @return boolean true if the x509Authority is present in the X.509 bundle, false otherwise
*/ */
public boolean hasX509Authority(X509Certificate x509Authority) { public boolean hasX509Authority(X509Certificate x509Authority) {
return x509Authorities.contains(x509Authority); return x509Authorities.contains(x509Authority);
@ -122,6 +124,7 @@ public class X509Bundle implements BundleSource<X509Bundle> {
/** /**
* Adds an X.509 authority to the bundle. * Adds an X.509 authority to the bundle.
* @param x509Authority an X.509 certificate
*/ */
public void addX509Authority(X509Certificate x509Authority) { public void addX509Authority(X509Certificate x509Authority) {
x509Authorities.add(x509Authority); x509Authorities.add(x509Authority);
@ -129,6 +132,7 @@ public class X509Bundle implements BundleSource<X509Bundle> {
/** /**
* Removes an X.509 authority from the bundle. * Removes an X.509 authority from the bundle.
* @param x509Authority an X.509 certificate
*/ */
public void removeX509Authority(X509Certificate x509Authority) { public void removeX509Authority(X509Certificate x509Authority) {
x509Authorities.remove(x509Authority); x509Authorities.remove(x509Authority);

View File

@ -66,7 +66,7 @@ public class X509BundleSet implements BundleSource<X509Bundle> {
} }
/** /**
* Returns the X.509 bundles of this X.509 Bundle Set. * @return the X.509 bundles of this X.509 Bundle Set.
*/ */
public Map<TrustDomain, X509Bundle> getBundles() { public Map<TrustDomain, X509Bundle> getBundles() {
return Collections.unmodifiableMap(bundles); return Collections.unmodifiableMap(bundles);

View File

@ -165,7 +165,7 @@ public class JwtSvid {
} }
/** /**
* Returns a copy of the expiration date time of the JWT SVID. * @return a copy of the expiration date time of the JWT SVID.
*/ */
public Date getExpiry() { public Date getExpiry() {
// defensive copying to prevent exposing a mutable object // defensive copying to prevent exposing a mutable object

View File

@ -86,7 +86,7 @@ public class X509Svid implements X509SvidSource {
} }
/** /**
* Returns the chain of certificates as an array of {@link X509Certificate} * @return the chain of certificates as an array of {@link X509Certificate}
*/ */
public X509Certificate[] getChainArray() { public X509Certificate[] getChainArray() {
return chain.toArray(new X509Certificate[0]); return chain.toArray(new X509Certificate[0]);

View File

@ -26,6 +26,7 @@ public class X509SvidValidator {
* @param chain a list representing the chain of X.509 certificates to be validated * @param chain a list representing the chain of X.509 certificates to be validated
* @param x509BundleSource a {@link BundleSource } to provide the authorities * @param x509BundleSource a {@link BundleSource } to provide the authorities
* @throws CertificateException is the chain cannot be verified with an authority from the X.509 bundle source * @throws CertificateException is the chain cannot be verified with an authority from the X.509 bundle source
* @throws BundleNotFoundException if no X.509 bundle for the trust domain could be found in the X.509 bundle source
* @throws NullPointerException if the given chain or 509BundleSource are null * @throws NullPointerException if the given chain or 509BundleSource are null
*/ */
public static void verifyChain( public static void verifyChain(

View File

@ -26,7 +26,7 @@ public class Address {
private static final List<String> VALID_SCHEMES = Arrays.asList(UNIX_SCHEME, TCP_SCHEME); private static final List<String> VALID_SCHEMES = Arrays.asList(UNIX_SCHEME, TCP_SCHEME);
/** /**
* Returns the default Workload API address hold by the system environment variable * @return the default Workload API address hold by the system environment variable
* defined by SOCKET_ENV_VARIABLE. * defined by SOCKET_ENV_VARIABLE.
*/ */
public static String getDefaultAddress() { public static String getDefaultAddress() {

View File

@ -66,6 +66,7 @@ public class WorkloadApiClient implements Closeable {
* Creates a new Workload API client using the default socket endpoint address. * Creates a new Workload API client using the default socket endpoint address.
* *
* @return a {@link WorkloadApiClient} * @return a {@link WorkloadApiClient}
* @throws SocketEndpointAddressException if the Workload API socket endpoint address is not valid
* @see Address#getDefaultAddress() * @see Address#getDefaultAddress()
*/ */
public static WorkloadApiClient newClient() throws SocketEndpointAddressException { public static WorkloadApiClient newClient() throws SocketEndpointAddressException {
@ -80,6 +81,7 @@ public class WorkloadApiClient implements Closeable {
* *
* @param options {@link ClientOptions} * @param options {@link ClientOptions}
* @return a {@link WorkloadApiClient} * @return a {@link WorkloadApiClient}
* @throws SocketEndpointAddressException if the Workload API socket endpoint address is not valid
*/ */
public static WorkloadApiClient newClient(@NonNull ClientOptions options) throws SocketEndpointAddressException { public static WorkloadApiClient newClient(@NonNull ClientOptions options) throws SocketEndpointAddressException {
String spiffeSocketPath; String spiffeSocketPath;
@ -150,6 +152,7 @@ public class WorkloadApiClient implements Closeable {
/** /**
* One-shot blocking fetch call to get an X.509 context. * One-shot blocking fetch call to get an X.509 context.
* *
* @return an instance of a {@link X509Context} containing the X.509 materials fetched from the Workload API
* @throws X509ContextException if there is an error fetching or processing the X.509 context * @throws X509ContextException if there is an error fetching or processing the X.509 context
*/ */
public X509Context fetchX509Context() throws X509ContextException { public X509Context fetchX509Context() throws X509ContextException {

View File

@ -18,6 +18,9 @@ public class ManagedChannelWrapper implements Closeable {
/** /**
* Constructor * Constructor
*
* @param managedChannel an instance of {@link ManagedChannel}
* @param eventLoopGroup an instance of {@link EventLoopGroup}
*/ */
public ManagedChannelWrapper(ManagedChannel managedChannel, EventLoopGroup eventLoopGroup) { public ManagedChannelWrapper(ManagedChannel managedChannel, EventLoopGroup eventLoopGroup) {
this.managedChannel = managedChannel; this.managedChannel = managedChannel;
@ -26,6 +29,8 @@ public class ManagedChannelWrapper implements Closeable {
/** /**
* Constructor * Constructor
*
* @param managedChannel a {@link ManagedChannel}
*/ */
public ManagedChannelWrapper(ManagedChannel managedChannel) { public ManagedChannelWrapper(ManagedChannel managedChannel) {
this.managedChannel = managedChannel; this.managedChannel = managedChannel;

View File

@ -23,6 +23,8 @@ public class RetryHandler {
/** /**
* Schedule to execute a Runnable, based on the backoff policy * Schedule to execute a Runnable, based on the backoff policy
* Updates the next delay and retries count * Updates the next delay and retries count
*
* @param runnable the task to be scheduled for execution
*/ */
public void scheduleRetry(Runnable runnable) { public void scheduleRetry(Runnable runnable) {
if (backoffPolicy.didNotReachMaxRetries(retryCount)) { if (backoffPolicy.didNotReachMaxRetries(retryCount)) {