Ensure all files end with a new line

Update all files to ensure that they always end with a new-line
character.

Issue gh-8945
This commit is contained in:
Phillip Webb 2020-07-27 11:07:14 -07:00 committed by Rob Winch
parent 218480fb7c
commit 4d487e8dc3
64 changed files with 62 additions and 67 deletions

View File

@ -142,4 +142,4 @@ final class DefaultServiceAuthenticationDetails extends WebAuthenticationDetails
return port; return port;
} }
} }

View File

@ -38,4 +38,4 @@ public interface ServiceAuthenticationDetails extends Serializable {
*/ */
String getServiceUrl(); String getServiceUrl();
} }

View File

@ -79,4 +79,4 @@ public class ServiceAuthenticationDetailsSource
} }
} }
} }

View File

@ -38,4 +38,4 @@ public interface ObjectPostProcessor<T> {
*/ */
<O extends T> O postProcess(O object); <O extends T> O postProcess(O object);
} }

View File

@ -57,4 +57,4 @@ class GlobalMethodSecurityAspectJAutoProxyRegistrar implements ImportBeanDefinit
registry.registerBeanDefinition("annotationSecurityAspect$0", aspect.getBeanDefinition()); registry.registerBeanDefinition("annotationSecurityAspect$0", aspect.getBeanDefinition());
} }
} }

View File

@ -92,4 +92,4 @@ final class PermitAllSupport {
private PermitAllSupport() { private PermitAllSupport() {
} }
} }

View File

@ -60,4 +60,4 @@ public class SecurityDebugBeanFactoryPostProcessor implements BeanDefinitionRegi
public void postProcessBeanFactory(ConfigurableListableBeanFactory beanFactory) throws BeansException { public void postProcessBeanFactory(ConfigurableListableBeanFactory beanFactory) throws BeansException {
} }
} }

View File

@ -28,4 +28,4 @@ public interface UserRepository extends CrudRepository<User, String> {
@PreAuthorize("hasRole('ROLE_ADMIN')") @PreAuthorize("hasRole('ROLE_ADMIN')")
User findByUsername(String username); User findByUsername(String username);
} }

View File

@ -134,4 +134,4 @@ public class WebMvcSecurityConfigurationTests {
} }
} }

View File

@ -42,4 +42,4 @@ public class WebConfigUtilsTests {
verifyZeroInteractions(this.parserContext); verifyZeroInteractions(this.parserContext);
} }
} }

View File

@ -29,4 +29,4 @@ public class PreAuthorizeServiceImpl {
public void contactPermission(Contact contact) { public void contactPermission(Contact contact) {
} }
} }

View File

@ -70,4 +70,4 @@ public class PreAuthorizeTests {
this.service.contactPermission(new Contact("admin")); this.service.contactPermission(new Contact("admin"));
} }
} }

View File

@ -28,4 +28,4 @@ import org.springframework.security.access.annotation.Secured;
@Secured("ROLE_ADMIN") @Secured("ROLE_ADMIN")
public @interface SecuredAdminRole { public @interface SecuredAdminRole {
} }

View File

@ -56,4 +56,4 @@ public class SecuredTests {
this.service.securedAdminRole(); this.service.securedAdminRole();
} }
} }

View File

@ -49,4 +49,4 @@ public class Sec2499Tests {
this.child.refresh(); this.child.refresh();
} }
} }

View File

@ -36,4 +36,4 @@ public class Jsr250SecurityConfig extends SecurityConfig {
super(role); super(role);
} }
} }

View File

@ -46,4 +46,4 @@ public @interface P {
*/ */
String value(); String value();
} }

View File

@ -44,4 +44,4 @@ public class InternalAuthenticationServiceException extends AuthenticationServic
super(message); super(message);
} }
} }

View File

@ -30,4 +30,4 @@ public interface ReactiveAuthenticationManagerResolver<C> {
Mono<ReactiveAuthenticationManager> resolve(C context); Mono<ReactiveAuthenticationManager> resolve(C context);
} }

View File

@ -89,4 +89,4 @@ public class InMemoryConfiguration extends Configuration {
public void refresh() { public void refresh() {
} }
} }

View File

@ -66,4 +66,4 @@ public class DelegatingSecurityContextExecutor extends AbstractDelegatingSecurit
return this.delegate; return this.delegate;
} }
} }

View File

@ -20,7 +20,3 @@
* @since 4.2 * @since 4.2
*/ */
package org.springframework.security.jackson2; package org.springframework.security.jackson2;
/**
* Package contains Jackson mixin classes.
*/

View File

@ -51,4 +51,4 @@ public class DelegatingSecurityContextTaskExecutor extends DelegatingSecurityCon
this(delegate, null); this(delegate, null);
} }
} }

View File

@ -19,4 +19,4 @@ public interface CrudRepository {
Iterable<Object> findAll(); Iterable<Object> findAll();
} }

View File

@ -29,4 +29,4 @@ import org.springframework.security.access.prepost.PreAuthorize;
@PreAuthorize("hasRole('ROLE_PERSON')") @PreAuthorize("hasRole('ROLE_PERSON')")
public interface PersonRepository extends CrudRepository { public interface PersonRepository extends CrudRepository {
} }

View File

@ -40,4 +40,4 @@ public class CurrentDelegatingSecurityContextExecutorServiceTests
return new DelegatingSecurityContextExecutorService(this.delegate); return new DelegatingSecurityContextExecutorService(this.delegate);
} }
} }

View File

@ -40,4 +40,4 @@ public class ExplicitDelegatingSecurityContextExecutorServiceTests
return new DelegatingSecurityContextExecutorService(this.delegate, this.securityContext); return new DelegatingSecurityContextExecutorService(this.delegate, this.securityContext);
} }
} }

View File

@ -40,4 +40,4 @@ public class ExplicitDelegatingSecurityContextScheduledExecutorServiceTests
return new DelegatingSecurityContextScheduledExecutorService(this.delegate, this.securityContext); return new DelegatingSecurityContextScheduledExecutorService(this.delegate, this.securityContext);
} }
} }

View File

@ -24,4 +24,4 @@ public interface StringKeyGenerator {
String generateKey(); String generateKey();
} }

View File

@ -75,4 +75,4 @@ public class SecurityEvaluationContextExtensionTests {
return this.securityExtension.getRootObject(); return this.securityExtension.getRootObject();
} }
} }

View File

@ -3,7 +3,6 @@
"-//Checkstyle//DTD SuppressionFilter Configuration 1.2//EN" "-//Checkstyle//DTD SuppressionFilter Configuration 1.2//EN"
"https://checkstyle.org/dtds/suppressions_1_2.dtd"> "https://checkstyle.org/dtds/suppressions_1_2.dtd">
<suppressions> <suppressions>
<suppress files=".*" checks="NewlineAtEndOfFile" />
<suppress files=".*" checks="NonEmptyAtclauseDescription" /> <suppress files=".*" checks="NonEmptyAtclauseDescription" />
<suppress files=".*" checks="NoWhitespaceBefore" /> <suppress files=".*" checks="NoWhitespaceBefore" />
<suppress files=".*" checks="OneTopLevelClass" /> <suppress files=".*" checks="OneTopLevelClass" />

View File

@ -21,4 +21,4 @@ public class StubUserRepository implements UserRepository {
public void doSomething() { public void doSomething() {
} }
} }

View File

@ -60,4 +60,4 @@ public final class AndMessageMatcher<T> extends AbstractMessageMatcherComposite<
return true; return true;
} }
} }

View File

@ -50,4 +50,4 @@ public class BasicAuthenticationDecoderTests {
assertThat(actualCredentials).isEqualToComparingFieldByField(expectedCredentials); assertThat(actualCredentials).isEqualToComparingFieldByField(expectedCredentials);
} }
} }

View File

@ -43,4 +43,4 @@ final class WithAnonymousUserSecurityContextFactory implements WithSecurityConte
return context; return context;
} }
} }

View File

@ -41,4 +41,4 @@ public interface WithSecurityContextFactory<A extends Annotation> {
*/ */
SecurityContext createSecurityContext(A annotation); SecurityContext createSecurityContext(A annotation);
} }

View File

@ -78,4 +78,4 @@ public class CustomUserDetails implements UserDetails {
return "CustomUserDetails{" + "username='" + this.username + '\'' + '}'; return "CustomUserDetails{" + "username='" + this.username + '\'' + '}';
} }
} }

View File

@ -23,4 +23,4 @@ import org.springframework.security.test.context.support.WithMockUser;
@WithMockUser @WithMockUser
public class WithMockUserParent { public class WithMockUserParent {
} }

View File

@ -60,4 +60,4 @@ public class WithMockUserParentTests extends WithMockUserParent {
} }
} }

View File

@ -90,4 +90,4 @@ public class WithMockUserTests {
} }
} }

View File

@ -103,4 +103,4 @@ public class SecurityMockMvcRequestPostProcessorsAuthenticationStatelessTests {
} }
} }

View File

@ -101,4 +101,4 @@ public class SecurityMockMvcRequestPostProcessorsTestSecurityContextStatelessTes
} }
} }

View File

@ -110,4 +110,4 @@ public class DefaultfSecurityRequestsTests {
} }
} }

View File

@ -133,4 +133,4 @@ public class SecurityRequestsTests {
} }
} }

View File

@ -111,4 +111,4 @@ public class WithUserAuthenticationTests {
} }
} }

View File

@ -111,4 +111,4 @@ public class WithUserClassLevelAuthenticationTests {
} }
} }

View File

@ -55,4 +55,4 @@ public final class CompositeLogoutHandler implements LogoutHandler {
} }
} }
} }

View File

@ -158,4 +158,4 @@ abstract class AbstractSessionFixationProtectionStrategy
} }
} }

View File

@ -86,4 +86,4 @@ public class CompositeSessionAuthenticationStrategy implements SessionAuthentica
return getClass().getName() + " [delegateStrategies = " + this.delegateStrategies + "]"; return getClass().getName() + " [delegateStrategies = " + this.delegateStrategies + "]";
} }
} }

View File

@ -56,4 +56,4 @@ public final class WebAsyncManagerIntegrationFilter extends OncePerRequestFilter
filterChain.doFilter(request, response); filterChain.doFilter(request, response);
} }
} }

View File

@ -30,4 +30,4 @@ public class CsrfException extends AccessDeniedException {
super(message); super(message);
} }
} }

View File

@ -54,4 +54,4 @@ public final class CsrfLogoutHandler implements LogoutHandler {
this.csrfTokenRepository.saveToken(null, request, response); this.csrfTokenRepository.saveToken(null, request, response);
} }
} }

View File

@ -47,4 +47,4 @@ public interface CsrfToken extends Serializable {
*/ */
String getToken(); String getToken();
} }

View File

@ -37,4 +37,4 @@ public class InvalidCsrfTokenException extends CsrfException {
+ "'."); + "'.");
} }
} }

View File

@ -28,4 +28,4 @@ public class MissingCsrfTokenException extends CsrfException {
super("Could not verify the provided CSRF token because your session was not found."); super("Could not verify the provided CSRF token because your session was not found.");
} }
} }

View File

@ -19,4 +19,4 @@
* To use, simply add the {@code JaasApiIntegrationFilter} to the Spring Security filter * To use, simply add the {@code JaasApiIntegrationFilter} to the Spring Security filter
* chain. * chain.
*/ */
package org.springframework.security.web.jaasapi; package org.springframework.security.web.jaasapi;

View File

@ -19,4 +19,4 @@
* @author Jitendra Singh * @author Jitendra Singh
* @since 4.2 * @since 4.2
*/ */
package org.springframework.security.web.jackson2; package org.springframework.security.web.jackson2;

View File

@ -50,4 +50,4 @@ public final class InvalidSessionAccessDeniedHandler implements AccessDeniedHand
this.invalidSessionStrategy.onInvalidSessionDetected(request, response); this.invalidSessionStrategy.onInvalidSessionDetected(request, response);
} }
} }

View File

@ -78,4 +78,4 @@ public final class AndRequestMatcher implements RequestMatcher {
return "AndRequestMatcher [requestMatchers=" + this.requestMatchers + "]"; return "AndRequestMatcher [requestMatchers=" + this.requestMatchers + "]";
} }
} }

View File

@ -272,4 +272,4 @@ public final class MediaTypeRequestMatcher implements RequestMatcher {
+ ", ignoredMediaTypes=" + this.ignoredMediaTypes + "]"; + ", ignoredMediaTypes=" + this.ignoredMediaTypes + "]";
} }
} }

View File

@ -60,4 +60,4 @@ public class NegatedRequestMatcher implements RequestMatcher {
return "NegatedRequestMatcher [requestMatcher=" + this.requestMatcher + "]"; return "NegatedRequestMatcher [requestMatcher=" + this.requestMatcher + "]";
} }
} }

View File

@ -78,4 +78,4 @@ public final class OrRequestMatcher implements RequestMatcher {
return "OrRequestMatcher [requestMatchers=" + this.requestMatchers + "]"; return "OrRequestMatcher [requestMatchers=" + this.requestMatchers + "]";
} }
} }

View File

@ -61,4 +61,4 @@ public class HttpStatusEntryPointTests {
assertThat(this.response.getStatus()).isEqualTo(HttpStatus.UNAUTHORIZED.value()); assertThat(this.response.getStatus()).isEqualTo(HttpStatus.UNAUTHORIZED.value());
} }
} }

View File

@ -152,4 +152,4 @@ public class MediaTypeRequestMatcherRequestHCNSTests {
assertThat(matcher.matches(this.request)).isFalse(); assertThat(matcher.matches(this.request)).isFalse();
} }
} }