remove redundant modifiers found by checkstyle

This commit is contained in:
Lars Grefer 2019-08-10 00:18:56 +02:00
parent d9016e52e6
commit ff1070df36
124 changed files with 187 additions and 190 deletions

View File

@ -41,14 +41,14 @@ class AclClassIdUtils {
private ConversionService conversionService; private ConversionService conversionService;
public AclClassIdUtils() { AclClassIdUtils() {
GenericConversionService genericConversionService = new GenericConversionService(); GenericConversionService genericConversionService = new GenericConversionService();
genericConversionService.addConverter(String.class, Long.class, new StringToLongConverter()); genericConversionService.addConverter(String.class, Long.class, new StringToLongConverter());
genericConversionService.addConverter(String.class, UUID.class, new StringToUUIDConverter()); genericConversionService.addConverter(String.class, UUID.class, new StringToUUIDConverter());
this.conversionService = genericConversionService; this.conversionService = genericConversionService;
} }
public AclClassIdUtils(ConversionService conversionService) { AclClassIdUtils(ConversionService conversionService) {
Assert.notNull(conversionService, "conversionService must not be null"); Assert.notNull(conversionService, "conversionService must not be null");
this.conversionService = conversionService; this.conversionService = conversionService;
} }

View File

@ -559,7 +559,7 @@ public class BasicLookupStrategy implements LookupStrategy {
private final Map<Serializable, Acl> acls; private final Map<Serializable, Acl> acls;
private final List<Sid> sids; private final List<Sid> sids;
public ProcessResultSet(Map<Serializable, Acl> acls, List<Sid> sids) { ProcessResultSet(Map<Serializable, Acl> acls, List<Sid> sids) {
Assert.notNull(acls, "ACLs cannot be null"); Assert.notNull(acls, "ACLs cannot be null");
this.acls = acls; this.acls = acls;
this.sids = sids; // can be null this.sids = sids; // can be null
@ -683,7 +683,7 @@ public class BasicLookupStrategy implements LookupStrategy {
private static class StubAclParent implements Acl { private static class StubAclParent implements Acl {
private final Long id; private final Long id;
public StubAclParent(Long id) { StubAclParent(Long id) {
this.id = id; this.id = id;
} }

View File

@ -55,8 +55,8 @@ class AssertionImplMixin {
* @param attributes the key/value pairs for this attribute. * @param attributes the key/value pairs for this attribute.
*/ */
@JsonCreator @JsonCreator
public AssertionImplMixin(@JsonProperty("principal") AttributePrincipal principal, AssertionImplMixin(@JsonProperty("principal") AttributePrincipal principal,
@JsonProperty("validFromDate") Date validFromDate, @JsonProperty("validUntilDate") Date validUntilDate, @JsonProperty("validFromDate") Date validFromDate, @JsonProperty("validUntilDate") Date validUntilDate,
@JsonProperty("authenticationDate") Date authenticationDate, @JsonProperty("attributes") Map<String, Object> attributes){ @JsonProperty("authenticationDate") Date authenticationDate, @JsonProperty("attributes") Map<String, Object> attributes){
} }
} }

View File

@ -51,8 +51,8 @@ class AttributePrincipalImplMixin {
* @param proxyRetriever the ProxyRetriever implementation to call back to the CAS server. * @param proxyRetriever the ProxyRetriever implementation to call back to the CAS server.
*/ */
@JsonCreator @JsonCreator
public AttributePrincipalImplMixin(@JsonProperty("name") String name, @JsonProperty("attributes") Map<String, Object> attributes, AttributePrincipalImplMixin(@JsonProperty("name") String name, @JsonProperty("attributes") Map<String, Object> attributes,
@JsonProperty("proxyGrantingTicket") String proxyGrantingTicket, @JsonProperty("proxyGrantingTicket") String proxyGrantingTicket,
@JsonProperty("proxyRetriever") ProxyRetriever proxyRetriever) { @JsonProperty("proxyRetriever") ProxyRetriever proxyRetriever) {
} }
} }

View File

@ -69,7 +69,7 @@ class CasAuthenticationTokenMixin {
* principal and how to obtain a proxy ticket for the user. * principal and how to obtain a proxy ticket for the user.
*/ */
@JsonCreator @JsonCreator
public CasAuthenticationTokenMixin(@JsonProperty("keyHash") Integer keyHash, @JsonProperty("principal") Object principal, CasAuthenticationTokenMixin(@JsonProperty("keyHash") Integer keyHash, @JsonProperty("principal") Object principal,
@JsonProperty("credentials") Object credentials, @JsonProperty("credentials") Object credentials,
@JsonProperty("authorities") Collection<? extends GrantedAuthority> authorities, @JsonProperty("authorities") Collection<? extends GrantedAuthority> authorities,
@JsonProperty("userDetails") UserDetails userDetails, @JsonProperty("assertion") Assertion assertion) { @JsonProperty("userDetails") UserDetails userDetails, @JsonProperty("assertion") Assertion assertion) {

View File

@ -415,7 +415,7 @@ public class CasAuthenticationFilter extends AbstractAuthenticationProcessingFil
private class CasAuthenticationFailureHandler implements AuthenticationFailureHandler { private class CasAuthenticationFailureHandler implements AuthenticationFailureHandler {
private final AuthenticationFailureHandler serviceTicketFailureHandler; private final AuthenticationFailureHandler serviceTicketFailureHandler;
public CasAuthenticationFailureHandler(AuthenticationFailureHandler failureHandler) { CasAuthenticationFailureHandler(AuthenticationFailureHandler failureHandler) {
Assert.notNull(failureHandler, "failureHandler"); Assert.notNull(failureHandler, "failureHandler");
this.serviceTicketFailureHandler = failureHandler; this.serviceTicketFailureHandler = failureHandler;
} }
@ -432,4 +432,4 @@ public class CasAuthenticationFilter extends AbstractAuthenticationProcessingFil
} }
} }
} }
} }

View File

@ -414,7 +414,7 @@ public class CasAuthenticationProviderTests {
private class MockTicketValidator implements TicketValidator { private class MockTicketValidator implements TicketValidator {
private boolean returnTicket; private boolean returnTicket;
public MockTicketValidator(boolean returnTicket) { MockTicketValidator(boolean returnTicket) {
this.returnTicket = returnTicket; this.returnTicket = returnTicket;
} }

View File

@ -193,7 +193,7 @@ public class AuthenticationConfiguration {
private static final Log logger = LogFactory private static final Log logger = LogFactory
.getLog(EnableGlobalAuthenticationAutowiredConfigurer.class); .getLog(EnableGlobalAuthenticationAutowiredConfigurer.class);
public EnableGlobalAuthenticationAutowiredConfigurer(ApplicationContext context) { EnableGlobalAuthenticationAutowiredConfigurer(ApplicationContext context) {
this.context = context; this.context = context;
} }

View File

@ -42,7 +42,7 @@ class InitializeAuthenticationProviderBeanManagerConfigurer
/** /**
* @param context the ApplicationContext to look up beans. * @param context the ApplicationContext to look up beans.
*/ */
public InitializeAuthenticationProviderBeanManagerConfigurer( InitializeAuthenticationProviderBeanManagerConfigurer(
ApplicationContext context) { ApplicationContext context) {
this.context = context; this.context = context;
} }
@ -83,4 +83,4 @@ class InitializeAuthenticationProviderBeanManagerConfigurer
.getBean(userDetailsBeanNames[0], type); .getBean(userDetailsBeanNames[0], type);
} }
} }
} }

View File

@ -43,7 +43,7 @@ class InitializeUserDetailsBeanManagerConfigurer
/** /**
* @param context * @param context
*/ */
public InitializeUserDetailsBeanManagerConfigurer(ApplicationContext context) { InitializeUserDetailsBeanManagerConfigurer(ApplicationContext context) {
this.context = context; this.context = context;
} }

View File

@ -44,7 +44,7 @@ final class AutowireBeanFactoryObjectPostProcessor
private final List<DisposableBean> disposableBeans = new ArrayList<>(); private final List<DisposableBean> disposableBeans = new ArrayList<>();
private final List<SmartInitializingSingleton> smartSingletons = new ArrayList<>(); private final List<SmartInitializingSingleton> smartSingletons = new ArrayList<>();
public AutowireBeanFactoryObjectPostProcessor( AutowireBeanFactoryObjectPostProcessor(
AutowireCapableBeanFactory autowireBeanFactory) { AutowireCapableBeanFactory autowireBeanFactory) {
Assert.notNull(autowireBeanFactory, "autowireBeanFactory cannot be null"); Assert.notNull(autowireBeanFactory, "autowireBeanFactory cannot be null");
this.autowireBeanFactory = autowireBeanFactory; this.autowireBeanFactory = autowireBeanFactory;

View File

@ -36,7 +36,7 @@ import org.springframework.util.ClassUtils;
*/ */
final class GlobalMethodSecuritySelector implements ImportSelector { final class GlobalMethodSecuritySelector implements ImportSelector {
public final String[] selectImports(AnnotationMetadata importingClassMetadata) { public String[] selectImports(AnnotationMetadata importingClassMetadata) {
Class<EnableGlobalMethodSecurity> annoType = EnableGlobalMethodSecurity.class; Class<EnableGlobalMethodSecurity> annoType = EnableGlobalMethodSecurity.class;
Map<String, Object> annotationAttributes = importingClassMetadata Map<String, Object> annotationAttributes = importingClassMetadata
.getAnnotationAttributes(annoType.getName(), false); .getAnnotationAttributes(annoType.getName(), false);

View File

@ -40,7 +40,7 @@ final class AutowiredWebSecurityConfigurersIgnoreParents {
private final ConfigurableListableBeanFactory beanFactory; private final ConfigurableListableBeanFactory beanFactory;
public AutowiredWebSecurityConfigurersIgnoreParents( AutowiredWebSecurityConfigurersIgnoreParents(
ConfigurableListableBeanFactory beanFactory) { ConfigurableListableBeanFactory beanFactory) {
Assert.notNull(beanFactory, "beanFactory cannot be null"); Assert.notNull(beanFactory, "beanFactory cannot be null");
this.beanFactory = beanFactory; this.beanFactory = beanFactory;

View File

@ -183,7 +183,7 @@ public final class ExpressionUrlAuthorizationConfigurer<H extends HttpSecurityBu
@Override @Override
@SuppressWarnings("rawtypes") @SuppressWarnings("rawtypes")
final List<AccessDecisionVoter<?>> getDecisionVoters(H http) { List<AccessDecisionVoter<?>> getDecisionVoters(H http) {
List<AccessDecisionVoter<?>> decisionVoters = new ArrayList<>(); List<AccessDecisionVoter<?>> decisionVoters = new ArrayList<>();
WebExpressionVoter expressionVoter = new WebExpressionVoter(); WebExpressionVoter expressionVoter = new WebExpressionVoter();
expressionVoter.setExpressionHandler(getExpressionHandler(http)); expressionVoter.setExpressionHandler(getExpressionHandler(http));
@ -192,7 +192,7 @@ public final class ExpressionUrlAuthorizationConfigurer<H extends HttpSecurityBu
} }
@Override @Override
final ExpressionBasedFilterInvocationSecurityMetadataSource createMetadataSource( ExpressionBasedFilterInvocationSecurityMetadataSource createMetadataSource(
H http) { H http) {
LinkedHashMap<RequestMatcher, Collection<ConfigAttribute>> requestMap = REGISTRY LinkedHashMap<RequestMatcher, Collection<ConfigAttribute>> requestMap = REGISTRY
.createRequestMap(); .createRequestMap();

View File

@ -172,7 +172,7 @@ public final class UrlAuthorizationConfigurer<H extends HttpSecurityBuilder<H>>
*/ */
@Override @Override
@SuppressWarnings("rawtypes") @SuppressWarnings("rawtypes")
final List<AccessDecisionVoter<?>> getDecisionVoters(H http) { List<AccessDecisionVoter<?>> getDecisionVoters(H http) {
List<AccessDecisionVoter<?>> decisionVoters = new ArrayList<>(); List<AccessDecisionVoter<?>> decisionVoters = new ArrayList<>();
decisionVoters.add(new RoleVoter()); decisionVoters.add(new RoleVoter());
decisionVoters.add(new AuthenticatedVoter()); decisionVoters.add(new AuthenticatedVoter());

View File

@ -133,7 +133,7 @@ public class RsaKeyConversionServicePostProcessor implements BeanFactoryPostProc
private static class ConverterPropertyEditorAdapter<T> extends PropertyEditorSupport { private static class ConverterPropertyEditorAdapter<T> extends PropertyEditorSupport {
private final Converter<String, T> converter; private final Converter<String, T> converter;
public ConverterPropertyEditorAdapter(Converter<String, T> converter) { ConverterPropertyEditorAdapter(Converter<String, T> converter) {
this.converter = converter; this.converter = converter;
} }

View File

@ -138,7 +138,7 @@ final class AuthenticationConfigBuilder {
private String openIDLoginPage; private String openIDLoginPage;
public AuthenticationConfigBuilder(Element element, boolean forceAutoConfig, AuthenticationConfigBuilder(Element element, boolean forceAutoConfig,
ParserContext pc, SessionCreationPolicy sessionPolicy, ParserContext pc, SessionCreationPolicy sessionPolicy,
BeanReference requestCache, BeanReference authenticationManager, BeanReference requestCache, BeanReference authenticationManager,
BeanReference sessionStrategy, BeanReference portMapper, BeanReference sessionStrategy, BeanReference portMapper,

View File

@ -152,7 +152,7 @@ class HttpConfigurationBuilder {
private BeanDefinition invalidSession; private BeanDefinition invalidSession;
private boolean addAllAuth; private boolean addAllAuth;
public HttpConfigurationBuilder(Element element, boolean addAllAuth, HttpConfigurationBuilder(Element element, boolean addAllAuth,
ParserContext pc, BeanReference portMapper, BeanReference portResolver, ParserContext pc, BeanReference portMapper, BeanReference portResolver,
BeanReference authenticationManager) { BeanReference authenticationManager) {
this.httpElt = element; this.httpElt = element;

View File

@ -415,12 +415,12 @@ class OrderDecorator implements Ordered {
final BeanMetadataElement bean; final BeanMetadataElement bean;
final int order; final int order;
public OrderDecorator(BeanMetadataElement bean, SecurityFilters filterOrder) { OrderDecorator(BeanMetadataElement bean, SecurityFilters filterOrder) {
this.bean = bean; this.bean = bean;
this.order = filterOrder.getOrder(); this.order = filterOrder.getOrder();
} }
public OrderDecorator(BeanMetadataElement bean, int order) { OrderDecorator(BeanMetadataElement bean, int order) {
this.bean = bean; this.bean = bean;
this.order = order; this.order = order;
} }

View File

@ -48,7 +48,7 @@ class LogoutBeanDefinitionParser implements BeanDefinitionParser {
private ManagedList<BeanMetadataElement> logoutHandlers = new ManagedList<>(); private ManagedList<BeanMetadataElement> logoutHandlers = new ManagedList<>();
private boolean csrfEnabled; private boolean csrfEnabled;
public LogoutBeanDefinitionParser(String loginPageUrl, String rememberMeServices, LogoutBeanDefinitionParser(String loginPageUrl, String rememberMeServices,
BeanMetadataElement csrfLogoutHandler) { BeanMetadataElement csrfLogoutHandler) {
this.defaultLogoutUrl = loginPageUrl + "?logout"; this.defaultLogoutUrl = loginPageUrl + "?logout";
this.rememberMeServices = rememberMeServices; this.rememberMeServices = rememberMeServices;

View File

@ -68,7 +68,7 @@ final class ProtectPointcutPostProcessor implements BeanPostProcessor {
private final PointcutParser parser; private final PointcutParser parser;
private final Set<String> processedBeans = new HashSet<>(); private final Set<String> processedBeans = new HashSet<>();
public ProtectPointcutPostProcessor( ProtectPointcutPostProcessor(
MapBasedMethodSecurityMetadataSource mapBasedMethodSecurityMetadataSource) { MapBasedMethodSecurityMetadataSource mapBasedMethodSecurityMetadataSource) {
Assert.notNull(mapBasedMethodSecurityMetadataSource, Assert.notNull(mapBasedMethodSecurityMetadataSource,
"MapBasedMethodSecurityMetadataSource to populate is required"); "MapBasedMethodSecurityMetadataSource to populate is required");

View File

@ -3645,7 +3645,7 @@ public class ServerHttpSecurity {
private final WebFilter webFilter; private final WebFilter webFilter;
private final int order; private final int order;
public OrderedWebFilter(WebFilter webFilter, int order) { OrderedWebFilter(WebFilter webFilter, int order) {
this.webFilter = webFilter; this.webFilter = webFilter;
this.order = order; this.order = order;
} }

View File

@ -243,8 +243,7 @@ public final class WebSocketMessageBrokerSecurityBeanDefinitionParser implements
private final boolean sameOriginDisabled; private final boolean sameOriginDisabled;
public MessageSecurityPostProcessor(String inboundSecurityInterceptorId, MessageSecurityPostProcessor(String inboundSecurityInterceptorId, boolean sameOriginDisabled) {
boolean sameOriginDisabled) {
this.inboundSecurityInterceptorId = inboundSecurityInterceptorId; this.inboundSecurityInterceptorId = inboundSecurityInterceptorId;
this.sameOriginDisabled = sameOriginDisabled; this.sameOriginDisabled = sameOriginDisabled;
} }

View File

@ -41,7 +41,7 @@ public class SecurityConfigurerAdapterTests {
static class OrderedObjectPostProcessor implements ObjectPostProcessor<String>, Ordered { static class OrderedObjectPostProcessor implements ObjectPostProcessor<String>, Ordered {
private final int order; private final int order;
public OrderedObjectPostProcessor(int order) { OrderedObjectPostProcessor(int order) {
this.order = order; this.order = order;
} }

View File

@ -847,7 +847,7 @@ public class ExpressionUrlAuthorizationConfigurerTests {
static class CustomExpressionRoot extends WebSecurityExpressionRoot { static class CustomExpressionRoot extends WebSecurityExpressionRoot {
public CustomExpressionRoot(Authentication a, FilterInvocation fi) { CustomExpressionRoot(Authentication a, FilterInvocation fi) {
super(a, fi); super(a, fi);
} }

View File

@ -73,7 +73,7 @@ public class NamespaceHttpExpressionHandlerTests {
@EnableWebMvc @EnableWebMvc
@EnableWebSecurity @EnableWebSecurity
private static class ExpressionHandlerConfig extends WebSecurityConfigurerAdapter { private static class ExpressionHandlerConfig extends WebSecurityConfigurerAdapter {
public ExpressionHandlerConfig() {} ExpressionHandlerConfig() {}
@Override @Override
protected void configure(AuthenticationManagerBuilder auth) throws Exception { protected void configure(AuthenticationManagerBuilder auth) throws Exception {

View File

@ -129,7 +129,7 @@ public class SecurityContextConfigurerTests {
@Configuration @Configuration
@EnableWebSecurity @EnableWebSecurity
static class SecurityContextRepositoryDefaultsSecurityContextRepositoryConfig extends WebSecurityConfigurerAdapter { static class SecurityContextRepositoryDefaultsSecurityContextRepositoryConfig extends WebSecurityConfigurerAdapter {
public SecurityContextRepositoryDefaultsSecurityContextRepositoryConfig() { SecurityContextRepositoryDefaultsSecurityContextRepositoryConfig() {
super(true); super(true);
} }

View File

@ -2133,7 +2133,7 @@ public class OAuth2ResourceServerConfigurerTests {
private class MockWebServerPropertySource extends PropertySource { private class MockWebServerPropertySource extends PropertySource {
public MockWebServerPropertySource() { MockWebServerPropertySource() {
super("mockwebserver"); super("mockwebserver");
} }
@ -2178,7 +2178,7 @@ public class OAuth2ResourceServerConfigurerTests {
private String token; private String token;
public BearerTokenRequestPostProcessor(String token) { BearerTokenRequestPostProcessor(String token) {
this.token = token; this.token = token;
} }

View File

@ -631,7 +631,7 @@ public class CsrfConfigTests {
static class CsrfReturnedResultMatcher implements ResultMatcher { static class CsrfReturnedResultMatcher implements ResultMatcher {
ExceptionalFunction<MvcResult, String> token; ExceptionalFunction<MvcResult, String> token;
public CsrfReturnedResultMatcher(ExceptionalFunction<MvcResult, String> token) { CsrfReturnedResultMatcher(ExceptionalFunction<MvcResult, String> token) {
this.token = token; this.token = token;
} }

View File

@ -83,7 +83,7 @@ public class HttpConfigTests {
private static class EncodeUrlDenyingHttpServletResponseWrapper private static class EncodeUrlDenyingHttpServletResponseWrapper
extends HttpServletResponseWrapper { extends HttpServletResponseWrapper {
public EncodeUrlDenyingHttpServletResponseWrapper(HttpServletResponse response) { EncodeUrlDenyingHttpServletResponseWrapper(HttpServletResponse response) {
super(response); super(response);
} }

View File

@ -907,7 +907,7 @@ public class MiscHttpConfigTests {
static class EncodeUrlDenyingHttpServletResponseWrapper static class EncodeUrlDenyingHttpServletResponseWrapper
extends HttpServletResponseWrapper { extends HttpServletResponseWrapper {
public EncodeUrlDenyingHttpServletResponseWrapper(HttpServletResponse response) { EncodeUrlDenyingHttpServletResponseWrapper(HttpServletResponse response) {
super(response); super(response);
} }

View File

@ -610,7 +610,7 @@ public class SessionManagementConfigTests {
private static class EncodeUrlDenyingHttpServletResponseWrapper private static class EncodeUrlDenyingHttpServletResponseWrapper
extends HttpServletResponseWrapper { extends HttpServletResponseWrapper {
public EncodeUrlDenyingHttpServletResponseWrapper(HttpServletResponse response) { EncodeUrlDenyingHttpServletResponseWrapper(HttpServletResponse response) {
super(response); super(response);
} }

View File

@ -51,7 +51,7 @@ final class HtmlUnitWebTestClient {
private final WebTestClient webTestClient; private final WebTestClient webTestClient;
public HtmlUnitWebTestClient(WebClient webClient, WebTestClient webTestClient) { HtmlUnitWebTestClient(WebClient webClient, WebTestClient webTestClient) {
Assert.notNull(webClient, "WebClient must not be null"); Assert.notNull(webClient, "WebClient must not be null");
Assert.notNull(webTestClient, "WebTestClient must not be null"); Assert.notNull(webTestClient, "WebTestClient must not be null");
this.webClient = webClient; this.webClient = webClient;

View File

@ -42,7 +42,7 @@ final class MockWebResponseBuilder {
private final FluxExchangeResult<String> exchangeResult; private final FluxExchangeResult<String> exchangeResult;
public MockWebResponseBuilder(long startTime, WebRequest webRequest, FluxExchangeResult<String> exchangeResult) { MockWebResponseBuilder(long startTime, WebRequest webRequest, FluxExchangeResult<String> exchangeResult) {
Assert.notNull(webRequest, "WebRequest must not be null"); Assert.notNull(webRequest, "WebRequest must not be null");
Assert.notNull(exchangeResult, "FluxExchangeResult must not be null"); Assert.notNull(exchangeResult, "FluxExchangeResult must not be null");
this.startTime = startTime; this.startTime = startTime;

View File

@ -48,11 +48,11 @@ class MethodSecurityEvaluationContext extends StandardEvaluationContext {
* for each instance. Use the constructor which takes the resolver, as an argument * for each instance. Use the constructor which takes the resolver, as an argument
* thus allowing for caching. * thus allowing for caching.
*/ */
public MethodSecurityEvaluationContext(Authentication user, MethodInvocation mi) { MethodSecurityEvaluationContext(Authentication user, MethodInvocation mi) {
this(user, mi, new DefaultSecurityParameterNameDiscoverer()); this(user, mi, new DefaultSecurityParameterNameDiscoverer());
} }
public MethodSecurityEvaluationContext(Authentication user, MethodInvocation mi, MethodSecurityEvaluationContext(Authentication user, MethodInvocation mi,
ParameterNameDiscoverer parameterNameDiscoverer) { ParameterNameDiscoverer parameterNameDiscoverer) {
this.mi = mi; this.mi = mi;
this.parameterNameDiscoverer = parameterNameDiscoverer; this.parameterNameDiscoverer = parameterNameDiscoverer;

View File

@ -116,7 +116,7 @@ public final class DelegatingMethodSecurityMetadataSource extends
private final Method method; private final Method method;
private final Class<?> targetClass; private final Class<?> targetClass;
public DefaultCacheKey(Method method, Class<?> targetClass) { DefaultCacheKey(Method method, Class<?> targetClass) {
this.method = method; this.method = method;
this.targetClass = targetClass; this.targetClass = targetClass;
} }

View File

@ -287,7 +287,7 @@ public class MapBasedMethodSecurityMetadataSource extends
private final Method method; private final Method method;
private final Class<?> registeredJavaType; private final Class<?> registeredJavaType;
public RegisteredMethod(Method method, Class<?> registeredJavaType) { RegisteredMethod(Method method, Class<?> registeredJavaType) {
Assert.notNull(method, "Method required"); Assert.notNull(method, "Method required");
Assert.notNull(registeredJavaType, "Registered Java Type required"); Assert.notNull(registeredJavaType, "Registered Java Type required");
this.method = method; this.method = method;

View File

@ -402,7 +402,7 @@ public abstract class AbstractJaasAuthenticationProvider
private class InternalCallbackHandler implements CallbackHandler { private class InternalCallbackHandler implements CallbackHandler {
private final Authentication authentication; private final Authentication authentication;
public InternalCallbackHandler(Authentication authentication) { InternalCallbackHandler(Authentication authentication) {
this.authentication = authentication; this.authentication = authentication;
} }

View File

@ -61,24 +61,24 @@ public final class DelegatingSecurityContextScheduledExecutorService extends
this(delegate, null); this(delegate, null);
} }
public final ScheduledFuture<?> schedule(Runnable command, long delay, TimeUnit unit) { public ScheduledFuture<?> schedule(Runnable command, long delay, TimeUnit unit) {
command = wrap(command); command = wrap(command);
return getDelegate().schedule(command, delay, unit); return getDelegate().schedule(command, delay, unit);
} }
public final <V> ScheduledFuture<V> schedule(Callable<V> callable, long delay, public <V> ScheduledFuture<V> schedule(Callable<V> callable, long delay,
TimeUnit unit) { TimeUnit unit) {
callable = wrap(callable); callable = wrap(callable);
return getDelegate().schedule(callable, delay, unit); return getDelegate().schedule(callable, delay, unit);
} }
public final ScheduledFuture<?> scheduleAtFixedRate(Runnable command, public ScheduledFuture<?> scheduleAtFixedRate(Runnable command,
long initialDelay, long period, TimeUnit unit) { long initialDelay, long period, TimeUnit unit) {
command = wrap(command); command = wrap(command);
return getDelegate().scheduleAtFixedRate(command, initialDelay, period, unit); return getDelegate().scheduleAtFixedRate(command, initialDelay, period, unit);
} }
public final ScheduledFuture<?> scheduleWithFixedDelay(Runnable command, public ScheduledFuture<?> scheduleWithFixedDelay(Runnable command,
long initialDelay, long delay, TimeUnit unit) { long initialDelay, long delay, TimeUnit unit) {
command = wrap(command); command = wrap(command);
return getDelegate().scheduleWithFixedDelay(command, initialDelay, delay, unit); return getDelegate().scheduleWithFixedDelay(command, initialDelay, delay, unit);
@ -87,4 +87,4 @@ public final class DelegatingSecurityContextScheduledExecutorService extends
private ScheduledExecutorService getDelegate() { private ScheduledExecutorService getDelegate() {
return (ScheduledExecutorService) getDelegateExecutor(); return (ScheduledExecutorService) getDelegateExecutor();
} }
} }

View File

@ -117,7 +117,7 @@ class ComparableVersion implements Comparable<ComparableVersion> {
this.value = BigInteger_ZERO; this.value = BigInteger_ZERO;
} }
public IntegerItem(String str) { IntegerItem(String str) {
this.value = new BigInteger(str); this.value = new BigInteger(str);
} }
@ -184,7 +184,7 @@ class ComparableVersion implements Comparable<ComparableVersion> {
private String value; private String value;
public StringItem(String value, boolean followedByDigit) { StringItem(String value, boolean followedByDigit) {
if (followedByDigit && value.length() == 1) { if (followedByDigit && value.length() == 1) {
// a1 = alpha-1, b1 = beta-1, m1 = milestone-1 // a1 = alpha-1, b1 = beta-1, m1 = milestone-1
switch (value.charAt(0)) { switch (value.charAt(0)) {
@ -341,7 +341,7 @@ class ComparableVersion implements Comparable<ComparableVersion> {
} }
} }
public ComparableVersion(String version) { ComparableVersion(String version) {
parseVersion(version); parseVersion(version);
} }

View File

@ -53,7 +53,7 @@ class AnonymousAuthenticationTokenMixin {
* @param authorities the authorities granted to the principal * @param authorities the authorities granted to the principal
*/ */
@JsonCreator @JsonCreator
public AnonymousAuthenticationTokenMixin(@JsonProperty("keyHash") Integer keyHash, @JsonProperty("principal") Object principal, AnonymousAuthenticationTokenMixin(@JsonProperty("keyHash") Integer keyHash, @JsonProperty("principal") Object principal,
@JsonProperty("authorities") Collection<? extends GrantedAuthority> authorities) { @JsonProperty("authorities") Collection<? extends GrantedAuthority> authorities) {
} }
} }

View File

@ -59,7 +59,7 @@ class RememberMeAuthenticationTokenMixin {
* @param authorities the authorities granted to the principal * @param authorities the authorities granted to the principal
*/ */
@JsonCreator @JsonCreator
public RememberMeAuthenticationTokenMixin(@JsonProperty("keyHash") Integer keyHash, RememberMeAuthenticationTokenMixin(@JsonProperty("keyHash") Integer keyHash,
@JsonProperty("principal") Object principal, @JsonProperty("principal") Object principal,
@JsonProperty("authorities") Collection<? extends GrantedAuthority> authorities) { @JsonProperty("authorities") Collection<? extends GrantedAuthority> authorities) {
} }

View File

@ -152,7 +152,7 @@ public final class SecurityJackson2Modules {
*/ */
static class WhitelistTypeResolverBuilder extends ObjectMapper.DefaultTypeResolverBuilder { static class WhitelistTypeResolverBuilder extends ObjectMapper.DefaultTypeResolverBuilder {
public WhitelistTypeResolverBuilder(ObjectMapper.DefaultTyping defaultTyping) { WhitelistTypeResolverBuilder(ObjectMapper.DefaultTyping defaultTyping) {
super(defaultTyping); super(defaultTyping);
} }

View File

@ -33,7 +33,7 @@ class MutableUser implements MutableUserDetails {
private String password; private String password;
private final UserDetails delegate; private final UserDetails delegate;
public MutableUser(UserDetails user) { MutableUser(UserDetails user) {
this.delegate = user; this.delegate = user;
this.password = user.getPassword(); this.password = user.getPassword();
} }

View File

@ -92,7 +92,7 @@ public class SecurityConfigTests {
private class MockConfigAttribute implements ConfigAttribute { private class MockConfigAttribute implements ConfigAttribute {
private String attribute; private String attribute;
public MockConfigAttribute(String configuration) { MockConfigAttribute(String configuration) {
this.attribute = configuration; this.attribute = configuration;
} }

View File

@ -35,31 +35,31 @@ public interface BusinessService extends Serializable {
@Secured({ "ROLE_ADMIN" }) @Secured({ "ROLE_ADMIN" })
@RolesAllowed({ "ROLE_ADMIN" }) @RolesAllowed({ "ROLE_ADMIN" })
@PreAuthorize("hasRole('ROLE_ADMIN')") @PreAuthorize("hasRole('ROLE_ADMIN')")
public void someAdminMethod(); void someAdminMethod();
@Secured({ "ROLE_USER", "ROLE_ADMIN" }) @Secured({ "ROLE_USER", "ROLE_ADMIN" })
@RolesAllowed({ "ROLE_USER", "ROLE_ADMIN" }) @RolesAllowed({ "ROLE_USER", "ROLE_ADMIN" })
public void someUserAndAdminMethod(); void someUserAndAdminMethod();
@Secured({ "ROLE_USER" }) @Secured({ "ROLE_USER" })
@RolesAllowed({ "ROLE_USER" }) @RolesAllowed({ "ROLE_USER" })
public void someUserMethod1(); void someUserMethod1();
@Secured({ "ROLE_USER" }) @Secured({ "ROLE_USER" })
@RolesAllowed({ "ROLE_USER" }) @RolesAllowed({ "ROLE_USER" })
public void someUserMethod2(); void someUserMethod2();
@RolesAllowed({ "USER" }) @RolesAllowed({ "USER" })
public void rolesAllowedUser(); void rolesAllowedUser();
public int someOther(String s); int someOther(String s);
public int someOther(int input); int someOther(int input);
public List<?> methodReturningAList(List<?> someList); List<?> methodReturningAList(List<?> someList);
public Object[] methodReturningAnArray(Object[] someArray); Object[] methodReturningAnArray(Object[] someArray);
public List<?> methodReturningAList(String userName, String extraParam); List<?> methodReturningAList(String userName, String extraParam);
} }

View File

@ -218,7 +218,7 @@ public class SecuredAnnotationSecurityMetadataSourceTests {
// Inner classes // Inner classes
class Department extends Entity { class Department extends Entity {
public Department(String name) { Department(String name) {
super(name); super(name);
} }
} }
@ -285,15 +285,15 @@ public class SecuredAnnotationSecurityMetadataSourceTests {
public @interface AnnotatedAnnotation { public @interface AnnotatedAnnotation {
} }
public static interface ReturnVoid { public interface ReturnVoid {
public void doSomething(List<?> param); void doSomething(List<?> param);
} }
@AnnotatedAnnotation @AnnotatedAnnotation
public static interface ReturnVoid2 { public interface ReturnVoid2 {
public void doSomething(List<?> param); void doSomething(List<?> param);
} }
@AnnotatedAnnotation @AnnotatedAnnotation

View File

@ -58,7 +58,7 @@ public class MethodSecurityEvaluationContextTests {
private static class NotNullVariableMethodSecurityEvaluationContext private static class NotNullVariableMethodSecurityEvaluationContext
extends MethodSecurityEvaluationContext { extends MethodSecurityEvaluationContext {
public NotNullVariableMethodSecurityEvaluationContext(Authentication auth, MethodInvocation mi, NotNullVariableMethodSecurityEvaluationContext(Authentication auth, MethodInvocation mi,
ParameterNameDiscoverer parameterNameDiscoverer) { ParameterNameDiscoverer parameterNameDiscoverer) {
super(auth, mi, parameterNameDiscoverer); super(auth, mi, parameterNameDiscoverer);
} }

View File

@ -203,19 +203,19 @@ public class PrePostAnnotationSecurityMetadataSourceTests {
// ~ Inner Classes // ~ Inner Classes
// ================================================================================================== // ==================================================================================================
public static interface ReturnVoid { public interface ReturnVoid {
public void doSomething(List<?> param); void doSomething(List<?> param);
} }
public static interface ReturnAList { public interface ReturnAList {
public List<?> doSomething(List<?> param); List<?> doSomething(List<?> param);
} }
@PreAuthorize("interfaceAuthzExpression") @PreAuthorize("interfaceAuthzExpression")
public static interface ReturnAnotherList { public interface ReturnAnotherList {
@PreAuthorize("interfaceMethodAuthzExpression") @PreAuthorize("interfaceMethodAuthzExpression")
@PreFilter(filterTarget = "param", value = "interfacePreFilterExpression") @PreFilter(filterTarget = "param", value = "interfacePreFilterExpression")
public List<?> doSomething(List<?> param); List<?> doSomething(List<?> param);
} }
@PreAuthorize("someExpression") @PreAuthorize("someExpression")
@ -275,8 +275,8 @@ public class PrePostAnnotationSecurityMetadataSourceTests {
} }
@CustomAnnotation @CustomAnnotation
public static interface ReturnVoid2 { public interface ReturnVoid2 {
public void doSomething(List<?> param); void doSomething(List<?> param);
} }
@CustomAnnotation @CustomAnnotation

View File

@ -179,8 +179,7 @@ public class AfterInvocationProviderManagerTests {
private Object forceReturnObject; private Object forceReturnObject;
public MockAfterInvocationProvider(Object forceReturnObject, Class secureObject, MockAfterInvocationProvider(Object forceReturnObject, Class secureObject, ConfigAttribute configAttribute) {
ConfigAttribute configAttribute) {
this.forceReturnObject = forceReturnObject; this.forceReturnObject = forceReturnObject;
this.secureObject = secureObject; this.secureObject = secureObject;
this.configAttribute = configAttribute; this.configAttribute = configAttribute;

View File

@ -156,8 +156,7 @@ public class AbstractAuthenticationTokenTests {
private Object credentials; private Object credentials;
private Object principal; private Object principal;
public MockAuthenticationImpl(Object principal, Object credentials, MockAuthenticationImpl(Object principal, Object credentials, List<GrantedAuthority> authorities) {
List<GrantedAuthority> authorities) {
super(authorities); super(authorities);
this.principal = principal; this.principal = principal;
this.credentials = credentials; this.credentials = credentials;

View File

@ -139,7 +139,7 @@ public class DefaultAuthenticationEventPublisherTests {
private static final class MockAuthenticationException extends private static final class MockAuthenticationException extends
AuthenticationException { AuthenticationException {
public MockAuthenticationException(String msg) { MockAuthenticationException(String msg) {
super(msg); super(msg);
} }
} }

View File

@ -290,7 +290,7 @@ public class JaasAuthenticationProviderTests {
private static class MockLoginContext extends LoginContext { private static class MockLoginContext extends LoginContext {
boolean loggedOut = false; boolean loggedOut = false;
public MockLoginContext(String loginModule) throws LoginException { MockLoginContext(String loginModule) throws LoginException {
super(loginModule); super(loginModule);
} }

View File

@ -119,7 +119,7 @@ public class RemoteAuthenticationProviderTests {
private class MockRemoteAuthenticationManager implements RemoteAuthenticationManager { private class MockRemoteAuthenticationManager implements RemoteAuthenticationManager {
private boolean grantAccess; private boolean grantAccess;
public MockRemoteAuthenticationManager(boolean grantAccess) { MockRemoteAuthenticationManager(boolean grantAccess) {
this.grantAccess = grantAccess; this.grantAccess = grantAccess;
} }

View File

@ -62,8 +62,8 @@ public class DelegatingSecurityContextSupportTests extends
private static class ConcreteDelegatingSecurityContextSupport extends private static class ConcreteDelegatingSecurityContextSupport extends
AbstractDelegatingSecurityContextSupport { AbstractDelegatingSecurityContextSupport {
public ConcreteDelegatingSecurityContextSupport(SecurityContext securityContext) { ConcreteDelegatingSecurityContextSupport(SecurityContext securityContext) {
super(securityContext); super(securityContext);
} }
} }
} }

View File

@ -148,10 +148,10 @@ public class AnnotationParameterNameDiscovererTests {
} }
static class Impl { static class Impl {
public Impl(Long dataSourceId) { Impl(Long dataSourceId) {
} }
public Impl(@P("id") String dataSourceId) { Impl(@P("id") String dataSourceId) {
} }
String findMessageByTo(@P("to") String to) { String findMessageByTo(@P("to") String to) {

View File

@ -485,7 +485,7 @@ public class BCrypt {
* @param lr an array containing the two 32-bit half blocks * @param lr an array containing the two 32-bit half blocks
* @param off the position in the array of the blocks * @param off the position in the array of the blocks
*/ */
private final void encipher(int lr[], int off) { private void encipher(int lr[], int off) {
int i, n, l = lr[off], r = lr[off + 1]; int i, n, l = lr[off], r = lr[off + 1];
l ^= P[0]; l ^= P[0];

View File

@ -28,7 +28,7 @@ final class HexEncodingTextEncryptor implements TextEncryptor {
private final BytesEncryptor encryptor; private final BytesEncryptor encryptor;
public HexEncodingTextEncryptor(BytesEncryptor encryptor) { HexEncodingTextEncryptor(BytesEncryptor encryptor) {
this.encryptor = encryptor; this.encryptor = encryptor;
} }

View File

@ -26,7 +26,7 @@ final class HexEncodingStringKeyGenerator implements StringKeyGenerator {
private final BytesKeyGenerator keyGenerator; private final BytesKeyGenerator keyGenerator;
public HexEncodingStringKeyGenerator(BytesKeyGenerator keyGenerator) { HexEncodingStringKeyGenerator(BytesKeyGenerator keyGenerator) {
this.keyGenerator = keyGenerator; this.keyGenerator = keyGenerator;
} }

View File

@ -34,14 +34,14 @@ final class SecureRandomBytesKeyGenerator implements BytesKeyGenerator {
/** /**
* Creates a secure random key generator using the defaults. * Creates a secure random key generator using the defaults.
*/ */
public SecureRandomBytesKeyGenerator() { SecureRandomBytesKeyGenerator() {
this(DEFAULT_KEY_LENGTH); this(DEFAULT_KEY_LENGTH);
} }
/** /**
* Creates a secure random key generator with a custom key length. * Creates a secure random key generator with a custom key length.
*/ */
public SecureRandomBytesKeyGenerator(int keyLength) { SecureRandomBytesKeyGenerator(int keyLength) {
this.random = new SecureRandom(); this.random = new SecureRandom();
this.keyLength = keyLength; this.keyLength = keyLength;
} }

View File

@ -26,7 +26,7 @@ final class SharedKeyGenerator implements BytesKeyGenerator {
private byte[] sharedKey; private byte[] sharedKey;
public SharedKeyGenerator(byte[] sharedKey) { SharedKeyGenerator(byte[] sharedKey) {
this.sharedKey = sharedKey; this.sharedKey = sharedKey;
} }
@ -38,4 +38,4 @@ final class SharedKeyGenerator implements BytesKeyGenerator {
return sharedKey; return sharedKey;
} }
} }

View File

@ -38,7 +38,7 @@ final class Digester {
* @param algorithm the digest algorithm; for example, "SHA-1" or "SHA-256". * @param algorithm the digest algorithm; for example, "SHA-1" or "SHA-256".
* @param iterations the number of times to apply the digest algorithm to the input * @param iterations the number of times to apply the digest algorithm to the input
*/ */
public Digester(String algorithm, int iterations) { Digester(String algorithm, int iterations) {
// eagerly validate the algorithm // eagerly validate the algorithm
createDigest(algorithm); createDigest(algorithm);
this.algorithm = algorithm; this.algorithm = algorithm;
@ -53,7 +53,7 @@ final class Digester {
return value; return value;
} }
final void setIterations(int iterations) { void setIterations(int iterations) {
if (iterations <= 0) { if (iterations <= 0) {
throw new IllegalArgumentException("Iterations value must be greater than zero"); throw new IllegalArgumentException("Iterations value must be greater than zero");
} }

View File

@ -126,7 +126,7 @@ public class BouncyCastleAesBytesEncryptorEquivalencyTest {
private final int keyLength; private final int keyLength;
public PredictableRandomBytesKeyGenerator(int keyLength) { PredictableRandomBytesKeyGenerator(int keyLength) {
this.random = new Random(1); this.random = new Random(1);
this.keyLength = keyLength; this.keyLength = keyLength;
} }

View File

@ -151,7 +151,7 @@ public class DefaultSpringSecurityContextSourceTests extends AbstractLdapIntegra
static class EnvExposingDefaultSpringSecurityContextSource extends static class EnvExposingDefaultSpringSecurityContextSource extends
DefaultSpringSecurityContextSource { DefaultSpringSecurityContextSource {
public EnvExposingDefaultSpringSecurityContextSource(String providerUrl) { EnvExposingDefaultSpringSecurityContextSource(String providerUrl) {
super(providerUrl); super(providerUrl);
} }

View File

@ -493,7 +493,7 @@ public class LdapUserDetailsManager implements UserDetailsManager {
private final ByteArrayOutputStream value = new ByteArrayOutputStream(); private final ByteArrayOutputStream value = new ByteArrayOutputStream();
public PasswordModifyRequest(String userIdentity, String oldPassword, String newPassword) { PasswordModifyRequest(String userIdentity, String oldPassword, String newPassword) {
ByteArrayOutputStream elements = new ByteArrayOutputStream(); ByteArrayOutputStream elements = new ByteArrayOutputStream();
if (userIdentity != null) { if (userIdentity != null) {

View File

@ -468,7 +468,7 @@ public class ActiveDirectoryLdapAuthenticationProviderTests {
static class MockNamingEnumeration implements NamingEnumeration<SearchResult> { static class MockNamingEnumeration implements NamingEnumeration<SearchResult> {
private SearchResult sr; private SearchResult sr;
public MockNamingEnumeration(SearchResult sr) { MockNamingEnumeration(SearchResult sr) {
this.sr = sr; this.sr = sr;
} }

View File

@ -44,7 +44,7 @@ class MessageExpressionConfigAttribute implements ConfigAttribute, EvaluationCon
* @param authorizeExpression the {@link Expression} to use. Cannot be null * @param authorizeExpression the {@link Expression} to use. Cannot be null
* @param matcher the {@link MessageMatcher} used to match the messages. * @param matcher the {@link MessageMatcher} used to match the messages.
*/ */
public MessageExpressionConfigAttribute(Expression authorizeExpression, MessageMatcher<?> matcher) { MessageExpressionConfigAttribute(Expression authorizeExpression, MessageMatcher<?> matcher) {
Assert.notNull(authorizeExpression, "authorizeExpression cannot be null"); Assert.notNull(authorizeExpression, "authorizeExpression cannot be null");
Assert.notNull(matcher, "matcher cannot be null"); Assert.notNull(matcher, "matcher cannot be null");
this.authorizeExpression = authorizeExpression; this.authorizeExpression = authorizeExpression;

View File

@ -38,7 +38,7 @@ abstract class AbstractMessageMatcherComposite<T> implements MessageMatcher<T> {
* *
* @param messageMatchers the {@link MessageMatcher} instances to try * @param messageMatchers the {@link MessageMatcher} instances to try
*/ */
public AbstractMessageMatcherComposite(List<MessageMatcher<T>> messageMatchers) { AbstractMessageMatcherComposite(List<MessageMatcher<T>> messageMatchers) {
notEmpty(messageMatchers, "messageMatchers must contain a value"); notEmpty(messageMatchers, "messageMatchers must contain a value");
if (messageMatchers.contains(null)) { if (messageMatchers.contains(null)) {
throw new IllegalArgumentException( throw new IllegalArgumentException(
@ -54,7 +54,7 @@ abstract class AbstractMessageMatcherComposite<T> implements MessageMatcher<T> {
* @param messageMatchers the {@link MessageMatcher} instances to try * @param messageMatchers the {@link MessageMatcher} instances to try
*/ */
@SafeVarargs @SafeVarargs
public AbstractMessageMatcherComposite(MessageMatcher<T>... messageMatchers) { AbstractMessageMatcherComposite(MessageMatcher<T>... messageMatchers) {
this(asList(messageMatchers)); this(asList(messageMatchers));
} }

View File

@ -265,7 +265,7 @@ public class AuthenticationPrincipalArgumentResolverTests {
this.property = property; this.property = property;
} }
public CopyUserPrincipal(CopyUserPrincipal toCopy) { CopyUserPrincipal(CopyUserPrincipal toCopy) {
this.property = toCopy.property; this.property = toCopy.property;
} }

View File

@ -194,7 +194,7 @@ public final class OidcIdTokenDecoderFactory implements JwtDecoderFactory<Client
* *
* @param jwtValidatorFactory the factory that provides an {@link OAuth2TokenValidator} * @param jwtValidatorFactory the factory that provides an {@link OAuth2TokenValidator}
*/ */
public final void setJwtValidatorFactory(Function<ClientRegistration, OAuth2TokenValidator<Jwt>> jwtValidatorFactory) { public void setJwtValidatorFactory(Function<ClientRegistration, OAuth2TokenValidator<Jwt>> jwtValidatorFactory) {
Assert.notNull(jwtValidatorFactory, "jwtValidatorFactory cannot be null"); Assert.notNull(jwtValidatorFactory, "jwtValidatorFactory cannot be null");
this.jwtValidatorFactory = jwtValidatorFactory; this.jwtValidatorFactory = jwtValidatorFactory;
} }
@ -207,7 +207,7 @@ public final class OidcIdTokenDecoderFactory implements JwtDecoderFactory<Client
* @param jwsAlgorithmResolver the resolver that provides the expected {@link JwsAlgorithm JWS algorithm} * @param jwsAlgorithmResolver the resolver that provides the expected {@link JwsAlgorithm JWS algorithm}
* for a specific {@link ClientRegistration client} * for a specific {@link ClientRegistration client}
*/ */
public final void setJwsAlgorithmResolver(Function<ClientRegistration, JwsAlgorithm> jwsAlgorithmResolver) { public void setJwsAlgorithmResolver(Function<ClientRegistration, JwsAlgorithm> jwsAlgorithmResolver) {
Assert.notNull(jwsAlgorithmResolver, "jwsAlgorithmResolver cannot be null"); Assert.notNull(jwsAlgorithmResolver, "jwsAlgorithmResolver cannot be null");
this.jwsAlgorithmResolver = jwsAlgorithmResolver; this.jwsAlgorithmResolver = jwsAlgorithmResolver;
} }
@ -219,7 +219,7 @@ public final class OidcIdTokenDecoderFactory implements JwtDecoderFactory<Client
* @param claimTypeConverterFactory the factory that provides a {@link Converter} used for type conversion * @param claimTypeConverterFactory the factory that provides a {@link Converter} used for type conversion
* of claim values for a specific {@link ClientRegistration client} * of claim values for a specific {@link ClientRegistration client}
*/ */
public final void setClaimTypeConverterFactory(Function<ClientRegistration, Converter<Map<String, Object>, Map<String, Object>>> claimTypeConverterFactory) { public void setClaimTypeConverterFactory(Function<ClientRegistration, Converter<Map<String, Object>, Map<String, Object>>> claimTypeConverterFactory) {
Assert.notNull(claimTypeConverterFactory, "claimTypeConverterFactory cannot be null"); Assert.notNull(claimTypeConverterFactory, "claimTypeConverterFactory cannot be null");
this.claimTypeConverterFactory = claimTypeConverterFactory; this.claimTypeConverterFactory = claimTypeConverterFactory;
} }

View File

@ -130,7 +130,7 @@ public final class OidcIdTokenValidator implements OAuth2TokenValidator<Jwt> {
* @since 5.2 * @since 5.2
* @param clockSkew the maximum acceptable clock skew * @param clockSkew the maximum acceptable clock skew
*/ */
public final void setClockSkew(Duration clockSkew) { public void setClockSkew(Duration clockSkew) {
Assert.notNull(clockSkew, "clockSkew cannot be null"); Assert.notNull(clockSkew, "clockSkew cannot be null");
Assert.isTrue(clockSkew.getSeconds() >= 0, "clockSkew must be >= 0"); Assert.isTrue(clockSkew.getSeconds() >= 0, "clockSkew must be >= 0");
this.clockSkew = clockSkew; this.clockSkew = clockSkew;

View File

@ -194,7 +194,7 @@ public final class ReactiveOidcIdTokenDecoderFactory implements ReactiveJwtDecod
* *
* @param jwtValidatorFactory the factory that provides an {@link OAuth2TokenValidator} * @param jwtValidatorFactory the factory that provides an {@link OAuth2TokenValidator}
*/ */
public final void setJwtValidatorFactory(Function<ClientRegistration, OAuth2TokenValidator<Jwt>> jwtValidatorFactory) { public void setJwtValidatorFactory(Function<ClientRegistration, OAuth2TokenValidator<Jwt>> jwtValidatorFactory) {
Assert.notNull(jwtValidatorFactory, "jwtValidatorFactory cannot be null"); Assert.notNull(jwtValidatorFactory, "jwtValidatorFactory cannot be null");
this.jwtValidatorFactory = jwtValidatorFactory; this.jwtValidatorFactory = jwtValidatorFactory;
} }
@ -207,7 +207,7 @@ public final class ReactiveOidcIdTokenDecoderFactory implements ReactiveJwtDecod
* @param jwsAlgorithmResolver the resolver that provides the expected {@link JwsAlgorithm JWS algorithm} * @param jwsAlgorithmResolver the resolver that provides the expected {@link JwsAlgorithm JWS algorithm}
* for a specific {@link ClientRegistration client} * for a specific {@link ClientRegistration client}
*/ */
public final void setJwsAlgorithmResolver(Function<ClientRegistration, JwsAlgorithm> jwsAlgorithmResolver) { public void setJwsAlgorithmResolver(Function<ClientRegistration, JwsAlgorithm> jwsAlgorithmResolver) {
Assert.notNull(jwsAlgorithmResolver, "jwsAlgorithmResolver cannot be null"); Assert.notNull(jwsAlgorithmResolver, "jwsAlgorithmResolver cannot be null");
this.jwsAlgorithmResolver = jwsAlgorithmResolver; this.jwsAlgorithmResolver = jwsAlgorithmResolver;
} }
@ -219,7 +219,7 @@ public final class ReactiveOidcIdTokenDecoderFactory implements ReactiveJwtDecod
* @param claimTypeConverterFactory the factory that provides a {@link Converter} used for type conversion * @param claimTypeConverterFactory the factory that provides a {@link Converter} used for type conversion
* of claim values for a specific {@link ClientRegistration client} * of claim values for a specific {@link ClientRegistration client}
*/ */
public final void setClaimTypeConverterFactory(Function<ClientRegistration, Converter<Map<String, Object>, Map<String, Object>>> claimTypeConverterFactory) { public void setClaimTypeConverterFactory(Function<ClientRegistration, Converter<Map<String, Object>, Map<String, Object>>> claimTypeConverterFactory) {
Assert.notNull(claimTypeConverterFactory, "claimTypeConverterFactory cannot be null"); Assert.notNull(claimTypeConverterFactory, "claimTypeConverterFactory cannot be null");
this.claimTypeConverterFactory = claimTypeConverterFactory; this.claimTypeConverterFactory = claimTypeConverterFactory;
} }

View File

@ -61,7 +61,7 @@ public final class AuthenticatedPrincipalOAuth2AuthorizedClientRepository implem
* *
* @param anonymousAuthorizedClientRepository the repository used for requests that are unauthenticated (or anonymous) * @param anonymousAuthorizedClientRepository the repository used for requests that are unauthenticated (or anonymous)
*/ */
public final void setAnonymousAuthorizedClientRepository(OAuth2AuthorizedClientRepository anonymousAuthorizedClientRepository) { public void setAnonymousAuthorizedClientRepository(OAuth2AuthorizedClientRepository anonymousAuthorizedClientRepository) {
Assert.notNull(anonymousAuthorizedClientRepository, "anonymousAuthorizedClientRepository cannot be null"); Assert.notNull(anonymousAuthorizedClientRepository, "anonymousAuthorizedClientRepository cannot be null");
this.anonymousAuthorizedClientRepository = anonymousAuthorizedClientRepository; this.anonymousAuthorizedClientRepository = anonymousAuthorizedClientRepository;
} }

View File

@ -177,7 +177,7 @@ public final class OAuth2AuthorizedClientArgumentResolver implements HandlerMeth
* @param clientCredentialsTokenResponseClient the client used when requesting an access token credential at the Token Endpoint for the {@code client_credentials} grant * @param clientCredentialsTokenResponseClient the client used when requesting an access token credential at the Token Endpoint for the {@code client_credentials} grant
*/ */
@Deprecated @Deprecated
public final void setClientCredentialsTokenResponseClient( public void setClientCredentialsTokenResponseClient(
OAuth2AccessTokenResponseClient<OAuth2ClientCredentialsGrantRequest> clientCredentialsTokenResponseClient) { OAuth2AccessTokenResponseClient<OAuth2ClientCredentialsGrantRequest> clientCredentialsTokenResponseClient) {
Assert.notNull(clientCredentialsTokenResponseClient, "clientCredentialsTokenResponseClient cannot be null"); Assert.notNull(clientCredentialsTokenResponseClient, "clientCredentialsTokenResponseClient cannot be null");
Assert.state(this.defaultAuthorizedClientManager, "The client cannot be set when the constructor used is \"OAuth2AuthorizedClientArgumentResolver(OAuth2AuthorizedClientManager)\". " + Assert.state(this.defaultAuthorizedClientManager, "The client cannot be set when the constructor used is \"OAuth2AuthorizedClientArgumentResolver(OAuth2AuthorizedClientManager)\". " +

View File

@ -57,7 +57,7 @@ class OAuth2AuthorizedClientResolver {
private String defaultClientRegistrationId; private String defaultClientRegistrationId;
public OAuth2AuthorizedClientResolver( OAuth2AuthorizedClientResolver(
ReactiveClientRegistrationRepository clientRegistrationRepository, ReactiveClientRegistrationRepository clientRegistrationRepository,
ServerOAuth2AuthorizedClientRepository authorizedClientRepository) { ServerOAuth2AuthorizedClientRepository authorizedClientRepository) {
Assert.notNull(clientRegistrationRepository, "clientRegistrationRepository cannot be null"); Assert.notNull(clientRegistrationRepository, "clientRegistrationRepository cannot be null");
@ -175,7 +175,7 @@ class OAuth2AuthorizedClientResolver {
private final Authentication authentication; private final Authentication authentication;
private final ServerWebExchange exchange; private final ServerWebExchange exchange;
public Request(String clientRegistrationId, Authentication authentication, Request(String clientRegistrationId, Authentication authentication,
ServerWebExchange exchange) { ServerWebExchange exchange) {
this.clientRegistrationId = clientRegistrationId; this.clientRegistrationId = clientRegistrationId;
this.authentication = authentication; this.authentication = authentication;

View File

@ -57,7 +57,7 @@ class OAuth2AuthorizedClientResolver {
private String defaultClientRegistrationId; private String defaultClientRegistrationId;
public OAuth2AuthorizedClientResolver( OAuth2AuthorizedClientResolver(
ReactiveClientRegistrationRepository clientRegistrationRepository, ReactiveClientRegistrationRepository clientRegistrationRepository,
ServerOAuth2AuthorizedClientRepository authorizedClientRepository) { ServerOAuth2AuthorizedClientRepository authorizedClientRepository) {
Assert.notNull(clientRegistrationRepository, "clientRegistrationRepository cannot be null"); Assert.notNull(clientRegistrationRepository, "clientRegistrationRepository cannot be null");
@ -176,7 +176,7 @@ class OAuth2AuthorizedClientResolver {
private final Authentication authentication; private final Authentication authentication;
private final ServerWebExchange exchange; private final ServerWebExchange exchange;
public Request(String clientRegistrationId, Authentication authentication, Request(String clientRegistrationId, Authentication authentication,
ServerWebExchange exchange) { ServerWebExchange exchange) {
this.clientRegistrationId = clientRegistrationId; this.clientRegistrationId = clientRegistrationId;
this.authentication = authentication; this.authentication = authentication;

View File

@ -65,7 +65,7 @@ public final class AuthenticatedPrincipalServerOAuth2AuthorizedClientRepository
* *
* @param anonymousAuthorizedClientRepository the repository used for requests that are unauthenticated (or anonymous) * @param anonymousAuthorizedClientRepository the repository used for requests that are unauthenticated (or anonymous)
*/ */
public final void setAnonymousAuthorizedClientRepository( public void setAnonymousAuthorizedClientRepository(
ServerOAuth2AuthorizedClientRepository anonymousAuthorizedClientRepository) { ServerOAuth2AuthorizedClientRepository anonymousAuthorizedClientRepository) {
Assert.notNull(anonymousAuthorizedClientRepository, "anonymousAuthorizedClientRepository cannot be null"); Assert.notNull(anonymousAuthorizedClientRepository, "anonymousAuthorizedClientRepository cannot be null");
this.anonymousAuthorizedClientRepository = anonymousAuthorizedClientRepository; this.anonymousAuthorizedClientRepository = anonymousAuthorizedClientRepository;

View File

@ -108,7 +108,7 @@ public final class NimbusJwtDecoderJwkSupport implements JwtDecoder {
* *
* @param claimSetConverter the {@link Converter} to use * @param claimSetConverter the {@link Converter} to use
*/ */
public final void setClaimSetConverter(Converter<Map<String, Object>, Map<String, Object>> claimSetConverter) { public void setClaimSetConverter(Converter<Map<String, Object>, Map<String, Object>> claimSetConverter) {
Assert.notNull(claimSetConverter, "claimSetConverter cannot be null"); Assert.notNull(claimSetConverter, "claimSetConverter cannot be null");
this.claimSetConverter = claimSetConverter; this.claimSetConverter = claimSetConverter;
this.delegate.setClaimSetConverter(claimSetConverter); this.delegate.setClaimSetConverter(claimSetConverter);
@ -120,7 +120,7 @@ public final class NimbusJwtDecoderJwkSupport implements JwtDecoder {
* @since 5.1 * @since 5.1
* @param restOperations the {@link RestOperations} used when requesting the JSON Web Key (JWK) Set * @param restOperations the {@link RestOperations} used when requesting the JSON Web Key (JWK) Set
*/ */
public final void setRestOperations(RestOperations restOperations) { public void setRestOperations(RestOperations restOperations) {
Assert.notNull(restOperations, "restOperations cannot be null"); Assert.notNull(restOperations, "restOperations cannot be null");
this.jwtDecoderBuilder = this.jwtDecoderBuilder.restOperations(restOperations); this.jwtDecoderBuilder = this.jwtDecoderBuilder.restOperations(restOperations);
this.delegate = makeDelegate(); this.delegate = makeDelegate();

View File

@ -107,7 +107,7 @@ public final class BearerTokenAuthenticationEntryPoint implements Authentication
* *
* @param realmName * @param realmName
*/ */
public final void setRealmName(String realmName) { public void setRealmName(String realmName) {
this.realmName = realmName; this.realmName = realmName;
} }

View File

@ -143,7 +143,7 @@ public final class BearerTokenAuthenticationFilter extends OncePerRequestFilter
* Set the {@link BearerTokenResolver} to use. Defaults to {@link DefaultBearerTokenResolver}. * Set the {@link BearerTokenResolver} to use. Defaults to {@link DefaultBearerTokenResolver}.
* @param bearerTokenResolver the {@code BearerTokenResolver} to use * @param bearerTokenResolver the {@code BearerTokenResolver} to use
*/ */
public final void setBearerTokenResolver(BearerTokenResolver bearerTokenResolver) { public void setBearerTokenResolver(BearerTokenResolver bearerTokenResolver) {
Assert.notNull(bearerTokenResolver, "bearerTokenResolver cannot be null"); Assert.notNull(bearerTokenResolver, "bearerTokenResolver cannot be null");
this.bearerTokenResolver = bearerTokenResolver; this.bearerTokenResolver = bearerTokenResolver;
} }
@ -152,7 +152,7 @@ public final class BearerTokenAuthenticationFilter extends OncePerRequestFilter
* Set the {@link AuthenticationEntryPoint} to use. Defaults to {@link BearerTokenAuthenticationEntryPoint}. * Set the {@link AuthenticationEntryPoint} to use. Defaults to {@link BearerTokenAuthenticationEntryPoint}.
* @param authenticationEntryPoint the {@code AuthenticationEntryPoint} to use * @param authenticationEntryPoint the {@code AuthenticationEntryPoint} to use
*/ */
public final void setAuthenticationEntryPoint(final AuthenticationEntryPoint authenticationEntryPoint) { public void setAuthenticationEntryPoint(final AuthenticationEntryPoint authenticationEntryPoint) {
Assert.notNull(authenticationEntryPoint, "authenticationEntryPoint cannot be null"); Assert.notNull(authenticationEntryPoint, "authenticationEntryPoint cannot be null");
this.authenticationEntryPoint = authenticationEntryPoint; this.authenticationEntryPoint = authenticationEntryPoint;
} }
@ -162,7 +162,7 @@ public final class BearerTokenAuthenticationFilter extends OncePerRequestFilter
* @param authenticationFailureHandler the {@code AuthenticationFailureHandler} to use * @param authenticationFailureHandler the {@code AuthenticationFailureHandler} to use
* @since 5.2 * @since 5.2
*/ */
public final void setAuthenticationFailureHandler(final AuthenticationFailureHandler authenticationFailureHandler) { public void setAuthenticationFailureHandler(final AuthenticationFailureHandler authenticationFailureHandler) {
Assert.notNull(authenticationFailureHandler, "authenticationFailureHandler cannot be null"); Assert.notNull(authenticationFailureHandler, "authenticationFailureHandler cannot be null");
this.authenticationFailureHandler = authenticationFailureHandler; this.authenticationFailureHandler = authenticationFailureHandler;
} }

View File

@ -85,7 +85,7 @@ public final class BearerTokenAccessDeniedHandler implements AccessDeniedHandler
* *
* @param realmName * @param realmName
*/ */
public final void setRealmName(String realmName) { public void setRealmName(String realmName) {
this.realmName = realmName; this.realmName = realmName;
} }

View File

@ -117,7 +117,7 @@ public class BearerTokenAccessDeniedHandlerTests {
} }
static class TestingOAuth2Token extends AbstractOAuth2Token { static class TestingOAuth2Token extends AbstractOAuth2Token {
public TestingOAuth2Token(String tokenValue) { TestingOAuth2Token(String tokenValue) {
super(tokenValue); super(tokenValue);
} }
} }

View File

@ -114,7 +114,7 @@ public class BearerTokenServerAccessDeniedHandlerTests {
} }
static class TestingOAuth2Token extends AbstractOAuth2Token { static class TestingOAuth2Token extends AbstractOAuth2Token {
public TestingOAuth2Token(String tokenValue) { TestingOAuth2Token(String tokenValue) {
super(tokenValue); super(tokenValue);
} }
} }

View File

@ -105,7 +105,7 @@ public class AuthenticationSimpleHttpInvokerRequestExecutorTests {
private Map<String, String> requestProperties = new HashMap<>(); private Map<String, String> requestProperties = new HashMap<>();
public MockHttpURLConnection(URL u) { MockHttpURLConnection(URL u) {
super(u); super(u);
} }

View File

@ -191,7 +191,7 @@ class UserConfig extends WebSecurityConfigurerAdapter {
class IntrospectEndpoint { class IntrospectEndpoint {
TokenStore tokenStore; TokenStore tokenStore;
public IntrospectEndpoint(TokenStore tokenStore) { IntrospectEndpoint(TokenStore tokenStore) {
this.tokenStore = tokenStore; this.tokenStore = tokenStore;
} }
@ -226,7 +226,7 @@ class IntrospectEndpoint {
class JwkSetEndpoint { class JwkSetEndpoint {
KeyPair keyPair; KeyPair keyPair;
public JwkSetEndpoint(KeyPair keyPair) { JwkSetEndpoint(KeyPair keyPair) {
this.keyPair = keyPair; this.keyPair = keyPair;
} }

View File

@ -84,7 +84,7 @@ public class OAuth2ResourceServerApplicationITests {
private static class BearerTokenRequestPostProcessor implements RequestPostProcessor { private static class BearerTokenRequestPostProcessor implements RequestPostProcessor {
private String token; private String token;
public BearerTokenRequestPostProcessor(String token) { BearerTokenRequestPostProcessor(String token) {
this.token = token; this.token = token;
} }

View File

@ -132,7 +132,7 @@ public class OAuth2ResourceServerApplicationITests {
private static class BearerTokenRequestPostProcessor implements RequestPostProcessor { private static class BearerTokenRequestPostProcessor implements RequestPostProcessor {
private String token; private String token;
public BearerTokenRequestPostProcessor(String token) { BearerTokenRequestPostProcessor(String token) {
this.token = token; this.token = token;
} }

View File

@ -84,7 +84,7 @@ public class OAuth2ResourceServerApplicationITests {
private static class BearerTokenRequestPostProcessor implements RequestPostProcessor { private static class BearerTokenRequestPostProcessor implements RequestPostProcessor {
private String token; private String token;
public BearerTokenRequestPostProcessor(String token) { BearerTokenRequestPostProcessor(String token) {
this.token = token; this.token = token;
} }

View File

@ -84,7 +84,7 @@ public class OAuth2ResourceServerApplicationITests {
private static class BearerTokenRequestPostProcessor implements RequestPostProcessor { private static class BearerTokenRequestPostProcessor implements RequestPostProcessor {
private String token; private String token;
public BearerTokenRequestPostProcessor(String token) { BearerTokenRequestPostProcessor(String token) {
this.token = token; this.token = token;
} }

View File

@ -107,7 +107,7 @@ public class OAuth2ResourceServerApplicationITests {
private static class BearerTokenRequestPostProcessor implements RequestPostProcessor { private static class BearerTokenRequestPostProcessor implements RequestPostProcessor {
private String token; private String token;
public BearerTokenRequestPostProcessor(String token) { BearerTokenRequestPostProcessor(String token) {
this.token = token; this.token = token;
} }

View File

@ -94,7 +94,7 @@ public class UsernameEqualsPasswordLoginModule implements LoginModule {
private static class UsernamePrincipal implements Principal, Serializable { private static class UsernamePrincipal implements Principal, Serializable {
private final String username; private final String username;
public UsernamePrincipal(String username) { UsernamePrincipal(String username) {
this.username = username; this.username = username;
} }

View File

@ -30,7 +30,7 @@ class DelegatingTestExecutionListener
private final TestExecutionListener delegate; private final TestExecutionListener delegate;
public DelegatingTestExecutionListener(TestExecutionListener delegate) { DelegatingTestExecutionListener(TestExecutionListener delegate) {
Assert.notNull(delegate, "delegate cannot be null"); Assert.notNull(delegate, "delegate cannot be null");
this.delegate = delegate; this.delegate = delegate;
} }

View File

@ -49,7 +49,7 @@ final class WithUserDetailsSecurityContextFactory implements
private BeanFactory beans; private BeanFactory beans;
@Autowired @Autowired
public WithUserDetailsSecurityContextFactory(BeanFactory beans) { WithUserDetailsSecurityContextFactory(BeanFactory beans) {
this.beans = beans; this.beans = beans;
} }

View File

@ -826,7 +826,7 @@ public final class SecurityMockMvcRequestPostProcessors {
implements RequestPostProcessor { implements RequestPostProcessor {
private final RequestPostProcessor delegate; private final RequestPostProcessor delegate;
public UserDetailsRequestPostProcessor(UserDetails user) { UserDetailsRequestPostProcessor(UserDetails user) {
Authentication token = new UsernamePasswordAuthenticationToken(user, Authentication token = new UsernamePasswordAuthenticationToken(user,
user.getPassword(), user.getAuthorities()); user.getPassword(), user.getAuthorities());

View File

@ -205,7 +205,7 @@ public class SecurityMockMvcRequestPostProcessorsCsrfTests {
static class SessionRequestWrapper extends HttpServletRequestWrapper { static class SessionRequestWrapper extends HttpServletRequestWrapper {
HttpSession session = new MockHttpSession(); HttpSession session = new MockHttpSession();
public SessionRequestWrapper(HttpServletRequest request) { SessionRequestWrapper(HttpServletRequest request) {
super(request); super(request);
} }

View File

@ -158,7 +158,7 @@ class DummyRequest extends HttpServletRequestWrapper {
private String queryString; private String queryString;
private String method; private String method;
public DummyRequest() { DummyRequest() {
super(UNSUPPORTED_REQUEST); super(UNSUPPORTED_REQUEST);
} }

View File

@ -38,7 +38,7 @@ import org.springframework.expression.TypedValue;
class DelegatingEvaluationContext implements EvaluationContext { class DelegatingEvaluationContext implements EvaluationContext {
private final EvaluationContext delegate; private final EvaluationContext delegate;
public DelegatingEvaluationContext(EvaluationContext delegate) { DelegatingEvaluationContext(EvaluationContext delegate) {
this.delegate = delegate; this.delegate = delegate;
} }

View File

@ -99,7 +99,7 @@ public final class ExpressionBasedFilterInvocationSecurityMetadataSource
extends AbstractVariableEvaluationContextPostProcessor { extends AbstractVariableEvaluationContextPostProcessor {
private final AntPathRequestMatcher matcher; private final AntPathRequestMatcher matcher;
public AntPathMatcherEvaluationContextPostProcessor( AntPathMatcherEvaluationContextPostProcessor(
AntPathRequestMatcher matcher) { AntPathRequestMatcher matcher) {
this.matcher = matcher; this.matcher = matcher;
} }
@ -114,7 +114,7 @@ public final class ExpressionBasedFilterInvocationSecurityMetadataSource
extends AbstractVariableEvaluationContextPostProcessor { extends AbstractVariableEvaluationContextPostProcessor {
private final RequestMatcher matcher; private final RequestMatcher matcher;
public RequestVariablesExtractorEvaluationContextPostProcessor( RequestVariablesExtractorEvaluationContextPostProcessor(
RequestMatcher matcher) { RequestMatcher matcher) {
this.matcher = matcher; this.matcher = matcher;
} }

View File

@ -31,7 +31,7 @@ class WebExpressionConfigAttribute implements ConfigAttribute,
private final Expression authorizeExpression; private final Expression authorizeExpression;
private final EvaluationContextPostProcessor<FilterInvocation> postProcessor; private final EvaluationContextPostProcessor<FilterInvocation> postProcessor;
public WebExpressionConfigAttribute(Expression authorizeExpression, WebExpressionConfigAttribute(Expression authorizeExpression,
EvaluationContextPostProcessor<FilterInvocation> postProcessor) { EvaluationContextPostProcessor<FilterInvocation> postProcessor) {
this.authorizeExpression = authorizeExpression; this.authorizeExpression = authorizeExpression;
this.postProcessor = postProcessor; this.postProcessor = postProcessor;

View File

@ -58,11 +58,11 @@ final class DefaultWASUsernameAndGroupsExtractor implements WASUsernameAndGroups
// SEC-803 // SEC-803
private static Class<?> wsCredentialClass = null; private static Class<?> wsCredentialClass = null;
public final List<String> getGroupsForCurrentUser() { public List<String> getGroupsForCurrentUser() {
return getWebSphereGroups(getRunAsSubject()); return getWebSphereGroups(getRunAsSubject());
} }
public final String getCurrentUserName() { public String getCurrentUserName() {
return getSecurityName(getRunAsSubject()); return getSecurityName(getRunAsSubject());
} }

Some files were not shown because too many files have changed in this diff Show More