SEC-1132: Updated package and class names in ref manual.

This commit is contained in:
Luke Taylor 2009-05-12 00:33:27 +00:00
parent ef388529ae
commit 1635efcb88
7 changed files with 37 additions and 38 deletions

View File

@ -276,7 +276,7 @@
<literal>user-service-ref</literal> attribute: <programlisting><![CDATA[ <literal>user-service-ref</literal> attribute: <programlisting><![CDATA[
<authentication-provider user-service-ref='myUserDetailsService'/> <authentication-provider user-service-ref='myUserDetailsService'/>
<beans:bean id="myUserDetailsService" class="org.springframework.security.userdetails.jdbc.JdbcDaoImpl"> <beans:bean id="myUserDetailsService" class="org.springframework.security.core.userdetails.jdbc.JdbcDaoImpl">
<beans:property name="dataSource" ref="dataSource"/> <beans:property name="dataSource" ref="dataSource"/>
</beans:bean> </beans:bean>
]]> ]]>
@ -355,7 +355,7 @@
file to keep Spring Security updated about session lifecycle events: <programlisting> file to keep Spring Security updated about session lifecycle events: <programlisting>
<![CDATA[ <![CDATA[
<listener> <listener>
<listener-class>org.springframework.security.ui.session.HttpSessionEventPublisher</listener-class> <listener-class>org.springframework.security.web.session.HttpSessionEventPublisher</listener-class>
</listener> </listener>
]]></programlisting> Then add the following line to your application context: <programlisting><![CDATA[ ]]></programlisting> Then add the following line to your application context: <programlisting><![CDATA[
<http> <http>

View File

@ -34,9 +34,8 @@
<link xlink:href="#x509">X.509 authentication</link>, as it already has a namespace configuration <link xlink:href="#x509">X.509 authentication</link>, as it already has a namespace configuration
option which is simpler to use and get started with. If you need to use explicit bean confiuration or option which is simpler to use and get started with. If you need to use explicit bean confiuration or
are planning on writing your own implementation then an understanding of how the are planning on writing your own implementation then an understanding of how the
provided implementations work will be useful. You will find the web related classes under the provided implementations work will be useful. You will find classes under the
<package>org.springframework.security.ui.preauth</package> package and the backend classes <package>org.springframework.security.web.authentication.preauth</package>. We just provide an outline
under <package>org.springframework.security.providers.preauth</package>. We just provide an outline
here so you should consult the Javadoc and source where appropriate. here so you should consult the Javadoc and source where appropriate.
</para> </para>
@ -152,14 +151,14 @@
A typical configuration using this filter would look like this: A typical configuration using this filter would look like this:
<programlisting><![CDATA[ <programlisting><![CDATA[
<bean id="siteminderFilter" <bean id="siteminderFilter"
class="org.springframework.security.ui.preauth.header.RequestHeaderPreAuthenticatedProcessingFilter"> class="org.springframework.security.web.authentication.preauth.header.RequestHeaderPreAuthenticatedProcessingFilter">
<security:custom-filter position="PRE_AUTH_FILTER" /> <security:custom-filter position="PRE_AUTH_FILTER" />
<property name="principalRequestHeader" value="SM_USER"/> <property name="principalRequestHeader" value="SM_USER"/>
<property name="authenticationManager" ref="authenticationManager" /> <property name="authenticationManager" ref="authenticationManager" />
</bean> </bean>
<bean id="preauthAuthProvider" <bean id="preauthAuthProvider"
class="org.springframework.security.providers.preauth.PreAuthenticatedAuthenticationProvider"> class="org.springframework.security.web.authentication.preauth.PreAuthenticatedAuthenticationProvider">
<security:custom-authentication-provider /> <security:custom-authentication-provider />
<property name="preAuthenticatedUserDetailsService"> <property name="preAuthenticatedUserDetailsService">
<bean id="userDetailsServiceWrapper" <bean id="userDetailsServiceWrapper"

View File

@ -139,18 +139,18 @@
<para>The beans required in an application context to enable remember-me services are as follows: <para>The beans required in an application context to enable remember-me services are as follows:
<programlisting><![CDATA[ <programlisting><![CDATA[
<bean id="rememberMeProcessingFilter" <bean id="rememberMeProcessingFilter"
class="org.springframework.security.ui.rememberme.RememberMeProcessingFilter"> class="org.springframework.security.web.authentication.rememberme.RememberMeProcessingFilter">
<property name="rememberMeServices" ref="rememberMeServices"/> <property name="rememberMeServices" ref="rememberMeServices"/>
<property name="authenticationManager" ref="theAuthenticationManager" /> <property name="authenticationManager" ref="theAuthenticationManager" />
</bean> </bean>
<bean id="rememberMeServices" class="org.springframework.security.ui.rememberme.TokenBasedRememberMeServices"> <bean id="rememberMeServices" class="org.springframework.security.web.authentication.rememberme.TokenBasedRememberMeServices">
<property name="userDetailsService" ref="myUserDetailsService"/> <property name="userDetailsService" ref="myUserDetailsService"/>
<property name="key" value="springRocks"/> <property name="key" value="springRocks"/>
</bean> </bean>
<bean id="rememberMeAuthenticationProvider" <bean id="rememberMeAuthenticationProvider"
class="org.springframework.security.providers.rememberme.RememberMeAuthenticationProvider"> class="org.springframework.security.web.authentication.rememberme.RememberMeAuthenticationProvider">
<property name="key" value="springRocks"/> <property name="key" value="springRocks"/>
</bean> </bean>
]]> ]]>

View File

@ -87,12 +87,12 @@
bean context with the same key: bean context with the same key:
<programlisting> <programlisting>
<![CDATA[ <![CDATA[
<bean id="runAsManager" class="org.springframework.security.runas.RunAsManagerImpl"> <bean id="runAsManager" class="org.springframework.security.access.intercept.RunAsManagerImpl">
<property name="key" value="my_run_as_password"/> <property name="key" value="my_run_as_password"/>
</bean> </bean>
<bean id="runAsAuthenticationProvider" <bean id="runAsAuthenticationProvider"
class="org.springframework.security.runas.RunAsImplAuthenticationProvider"> class="org.springframework.security.access.intercept.RunAsImplAuthenticationProvider">
<property name="key" value="my_run_as_password"/> <property name="key" value="my_run_as_password"/>
</bean>]]></programlisting></para> </bean>]]></programlisting></para>
<para>By using the same key, each <literal>RunAsUserToken</literal> <para>By using the same key, each <literal>RunAsUserToken</literal>

View File

@ -45,7 +45,7 @@
and passwords are suggested on that page. Simply authenticate with any of these and view and passwords are suggested on that page. Simply authenticate with any of these and view
the resulting page. It should contain a success message similar to the following: the resulting page. It should contain a success message similar to the following:
<literallayout> <literallayout>
Authentication object is of type: org.springframework.security.providers.UsernamePasswordAuthenticationToken Authentication object is of type: org.springframework.security.authentication.UsernamePasswordAuthenticationToken
Authentication object as a String: Authentication object as a String:
org.springframework.security.providers.UsernamePasswordAuthenticationToken@1f127853: org.springframework.security.providers.UsernamePasswordAuthenticationToken@1f127853:

View File

@ -32,14 +32,14 @@
for use with one of Spring AOP's proxying mechanisms: for use with one of Spring AOP's proxying mechanisms:
<programlisting><![CDATA[ <programlisting><![CDATA[
<bean id="bankManagerSecurity" <bean id="bankManagerSecurity"
class="org.springframework.security.intercept.method.aopalliance.MethodSecurityInterceptor"> class="org.springframework.security.intercept.aopalliance.MethodSecurityInterceptor">
<property name="authenticationManager" ref="authenticationManager"/> <property name="authenticationManager" ref="authenticationManager"/>
<property name="accessDecisionManager" ref="accessDecisionManager"/> <property name="accessDecisionManager" ref="accessDecisionManager"/>
<property name="afterInvocationManager" ref="afterInvocationManager"/> <property name="afterInvocationManager" ref="afterInvocationManager"/>
<property name="objectDefinitionSource"> <property name="securityMetadataSource">
<value> <value>
org.springframework.security.context.BankManager.delete*=ROLE_SUPERVISOR com.mycompany.BankManager.delete*=ROLE_SUPERVISOR
org.springframework.security.context.BankManager.getBalance=ROLE_TELLER,ROLE_SUPERVISOR com.mycompany.BankManager.getBalance=ROLE_TELLER,ROLE_SUPERVISOR
</value> </value>
</property> </property>
</bean> ]]> </bean> ]]>
@ -76,14 +76,14 @@
<programlisting><![CDATA[ <programlisting><![CDATA[
<bean id="bankManagerSecurity" <bean id="bankManagerSecurity"
class="org.springframework.security.intercept.method.aspectj.AspectJSecurityInterceptor"> class="org.springframework.security.intercept.aspectj.AspectJSecurityInterceptor">
<property name="authenticationManager" ref="authenticationManager"/> <property name="authenticationManager" ref="authenticationManager"/>
<property name="accessDecisionManager" ref="accessDecisionManager"/> <property name="accessDecisionManager" ref="accessDecisionManager"/>
<property name="afterInvocationManager" ref="afterInvocationManager"/> <property name="afterInvocationManager" ref="afterInvocationManager"/>
<property name="objectDefinitionSource"> <property name="securityMetadataSource">
<value> <value>
org.springframework.security.context.BankManager.delete*=ROLE_SUPERVISOR com.mycompany.BankManager.delete*=ROLE_SUPERVISOR
org.springframework.security.context.BankManager.getBalance=ROLE_TELLER,ROLE_SUPERVISOR com.mycompany.BankManager.getBalance=ROLE_TELLER,ROLE_SUPERVISOR
</value> </value>
</property> </property>
</bean>]]> </programlisting> </bean>]]> </programlisting>
@ -91,8 +91,8 @@
<para>As you can see, aside from the class name, the <para>As you can see, aside from the class name, the
<literal>AspectJSecurityInterceptor</literal> is exactly the same as <literal>AspectJSecurityInterceptor</literal> is exactly the same as
the AOP Alliance security interceptor. Indeed the two interceptors can the AOP Alliance security interceptor. Indeed the two interceptors can
share the same <literal>objectDefinitionSource</literal>, as the share the same <literal>securityMetadataSource</literal>, as the
<interfacename>ObjectDefinitionSource</interfacename> works with <interfacename>SecurityMetadataSource</interfacename> works with
<literal>java.lang.reflect.Method</literal>s rather than an AOP <literal>java.lang.reflect.Method</literal>s rather than an AOP
library-specific class. Of course, your access decisions have access library-specific class. Of course, your access decisions have access
to the relevant AOP library-specific invocation (ie to the relevant AOP library-specific invocation (ie
@ -106,8 +106,8 @@
<programlisting> <programlisting>
package org.springframework.security.samples.aspectj; package org.springframework.security.samples.aspectj;
import org.springframework.security.intercept.method.aspectj.AspectJSecurityInterceptor; import org.springframework.security.intercept.aspectj.AspectJSecurityInterceptor;
import org.springframework.security.intercept.method.aspectj.AspectJCallback; import org.springframework.security.intercept.aspectj.AspectJCallback;
import org.springframework.beans.factory.InitializingBean; import org.springframework.beans.factory.InitializingBean;
public aspect DomainObjectInstanceSecurityAspect implements InitializingBean { public aspect DomainObjectInstanceSecurityAspect implements InitializingBean {
@ -187,12 +187,12 @@ public void afterPropertiesSet() throws Exception {
<programlisting> <programlisting>
<![CDATA[ <![CDATA[
<bean id="exceptionTranslationFilter" <bean id="exceptionTranslationFilter"
class="org.springframework.security.ui.ExceptionTranslationFilter"> class="org.springframework.security.web.access.ExceptionTranslationFilter">
<property name="authenticationEntryPoint" ref="authenticationEntryPoint"/> <property name="authenticationEntryPoint" ref="authenticationEntryPoint"/>
</bean> </bean>
<bean id="authenticationEntryPoint" <bean id="authenticationEntryPoint"
class="org.springframework.security.ui.webapp.AuthenticationProcessingFilterEntryPoint"> class="org.springframework.security.web.authentication.AuthenticationProcessingFilterEntryPoint">
<property name="loginFormUrl" value="/acegilogin.jsp"/> <property name="loginFormUrl" value="/acegilogin.jsp"/>
<property name="forceHttps" value="false"/> <property name="forceHttps" value="false"/>
</bean> </bean>
@ -201,7 +201,7 @@ public void afterPropertiesSet() throws Exception {
class="org.springframework.security.intercept.web.FilterSecurityInterceptor"> class="org.springframework.security.intercept.web.FilterSecurityInterceptor">
<property name="authenticationManager" ref="authenticationManager"/> <property name="authenticationManager" ref="authenticationManager"/>
<property name="accessDecisionManager" ref="accessDecisionManager"/> <property name="accessDecisionManager" ref="accessDecisionManager"/>
<property name="objectDefinitionSource"> <property name="securityMetadataSource">
<security:filter-invocation-definition-source> <security:filter-invocation-definition-source>
<security:intercept-url pattern="/secure/super/**" access="ROLE_WE_DONT_HAVE"/> <security:intercept-url pattern="/secure/super/**" access="ROLE_WE_DONT_HAVE"/>
<security:intercept-url pattern="/secure/**" access="ROLE_SUPERVISOR,ROLE_TELLER"/> <security:intercept-url pattern="/secure/**" access="ROLE_SUPERVISOR,ROLE_TELLER"/>
@ -251,23 +251,23 @@ public void afterPropertiesSet() throws Exception {
used to configure a <classname>FilterChainProxy</classname> but the <literal>&lt;intercept-url&gt;</literal> used to configure a <classname>FilterChainProxy</classname> but the <literal>&lt;intercept-url&gt;</literal>
child elements only use the <literal>pattern</literal> and <literal>access</literal> attributes. child elements only use the <literal>pattern</literal> and <literal>access</literal> attributes.
The second is by writing your own The second is by writing your own
<interfacename>ObjectDefinitionSource</interfacename>, although this is beyond the <interfacename>SecurityMetadataSource</interfacename>, although this is beyond the
scope of this document. Irrespective of the approach used, the scope of this document. Irrespective of the approach used, the
<interfacename>ObjectDefinitionSource</interfacename> is responsible for returning <interfacename>SecurityMetadataSource</interfacename> is responsible for returning
a <literal>List&lt;ConfigAttribute&gt;</literal> containing a <literal>List&lt;ConfigAttribute&gt;</literal> containing
all of the configuration attributes associated with a single secure all of the configuration attributes associated with a single secure
HTTP URL.</para> HTTP URL.</para>
<para>It should be noted that the <para>It should be noted that the
<literal>FilterSecurityInterceptor.setObjectDefinitionSource()</literal> <literal>FilterSecurityInterceptor.setSecurityMetadataSource()</literal>
method actually expects an instance of method actually expects an instance of
<interfacename>FilterInvocationDefinitionSource</interfacename>. This is a marker <interfacename>FilterInvocationDefinitionSource</interfacename>. This is a marker
interface which subclasses <interfacename>ObjectDefinitionSource</interfacename>. interface which subclasses <interfacename>SecurityMetadataSource</interfacename>.
It simply denotes the <interfacename>ObjectDefinitionSource</interfacename> It simply denotes the <interfacename>SecurityMetadataSource</interfacename>
understands <classname>FilterInvocation</classname>s. In the interests of understands <classname>FilterInvocation</classname>s. In the interests of
simplicity we'll continue to refer to the simplicity we'll continue to refer to the
<interfacename>FilterInvocationDefinitionSource</interfacename> as an <interfacename>FilterInvocationDefinitionSource</interfacename> as an
<interfacename>ObjectDefinitionSource</interfacename>, as the distinction is of <interfacename>SecurityMetadataSource</interfacename>, as the distinction is of
little relevance to most users of the little relevance to most users of the
<classname>FilterSecurityInterceptor</classname>.</para> <classname>FilterSecurityInterceptor</classname>.</para>
@ -276,7 +276,7 @@ public void afterPropertiesSet() throws Exception {
attributes that apply to each HTTP URL. Each configuration attribute attributes that apply to each HTTP URL. Each configuration attribute
is assigned into its own <literal>SecurityConfig</literal> object. The is assigned into its own <literal>SecurityConfig</literal> object. The
<literal>SecurityConfig</literal> object is discussed in the High <literal>SecurityConfig</literal> object is discussed in the High
Level Design section. The <interfacename>ObjectDefinitionSource</interfacename> Level Design section. The <interfacename>SecurityMetadataSource</interfacename>
created by the property editor, created by the property editor,
<interfacename>FilterInvocationDefinitionSource</interfacename>, matches <interfacename>FilterInvocationDefinitionSource</interfacename>, matches
configuration attributes against <literal>FilterInvocations</literal> configuration attributes against <literal>FilterInvocations</literal>
@ -295,7 +295,7 @@ public void afterPropertiesSet() throws Exception {
<property name="authenticationManager" ref="authenticationManager"/> <property name="authenticationManager" ref="authenticationManager"/>
<property name="accessDecisionManager" ref="accessDecisionManager"/> <property name="accessDecisionManager" ref="accessDecisionManager"/>
<property name="runAsManager" ref="runAsManager"/> <property name="runAsManager" ref="runAsManager"/>
<property name="objectDefinitionSource"> <property name="securityMetadataSource">
<security:filter-invocation-definition-source path-type="regex"> <security:filter-invocation-definition-source path-type="regex">
<security:intercept-url pattern="\A/secure/super/.*\Z" access="ROLE_WE_DONT_HAVE"/> <security:intercept-url pattern="\A/secure/super/.*\Z" access="ROLE_WE_DONT_HAVE"/>
<security:intercept-url pattern="\A/secure/.*\" access="ROLE_SUPERVISOR,ROLE_TELLER"/> <security:intercept-url pattern="\A/secure/.*\" access="ROLE_SUPERVISOR,ROLE_TELLER"/>

View File

@ -145,12 +145,12 @@
<classname>FilterChainProxy</classname> class. It is wired using a <classname>FilterChainProxy</classname> class. It is wired using a
<literal>DelegatingFilterProxy</literal> (just like in the example above), <literal>DelegatingFilterProxy</literal> (just like in the example above),
but the target class is but the target class is
<literal>org.springframework.security.util.FilterChainProxy</literal>. <literal>org.springframework.security.web.FilterChainProxy</literal>.
The filter chain is then declared in the application context, using The filter chain is then declared in the application context, using
code such as this:</para> code such as this:</para>
<para><programlisting><![CDATA[ <para><programlisting><![CDATA[
<bean id="filterChainProxy" class="org.springframework.security.util.FilterChainProxy"> <bean id="filterChainProxy" class="org.springframework.security.web.FilterChainProxy">
<sec:filter-chain-map path-type="ant"> <sec:filter-chain-map path-type="ant">
<sec:filter-chain pattern="/webServices/**" <sec:filter-chain pattern="/webServices/**"
filters="httpSessionContextIntegrationFilterWithASCFalse,basicProcessingFilter,exceptionTranslationFilter,filterSecurityInterceptor"/> filters="httpSessionContextIntegrationFilterWithASCFalse,basicProcessingFilter,exceptionTranslationFilter,filterSecurityInterceptor"/>