From 5066fc5e3994f412f6aa96060cad43605188e23d Mon Sep 17 00:00:00 2001
From: Luke Taylor This service is the callback URL belonging to
* the local Acegi Security System for Spring secured application. For example,/j_acegi_security_check
)
+ * something like /j_spring_security_check
)
*/
private String filterProcessesUrl = getDefaultFilterProcessesUrl();
diff --git a/core/src/main/java/org/springframework/security/ui/cas/CasProcessingFilter.java b/core/src/main/java/org/springframework/security/ui/cas/CasProcessingFilter.java
index fffa4e92ab..80865b4ac7 100644
--- a/core/src/main/java/org/springframework/security/ui/cas/CasProcessingFilter.java
+++ b/core/src/main/java/org/springframework/security/ui/cas/CasProcessingFilter.java
@@ -77,12 +77,12 @@ public class CasProcessingFilter extends AbstractProcessingFilter {
}
/**
- * This filter by default responds to /j_acegi_cas_security_check
.
+ * This filter by default responds to /j_spring_cas_security_check
.
*
* @return the default
*/
public String getDefaultFilterProcessesUrl() {
- return "/j_acegi_cas_security_check";
+ return "/j_spring_cas_security_check";
}
public void init(FilterConfig filterConfig) throws ServletException {}
diff --git a/core/src/main/java/org/springframework/security/ui/cas/ServiceProperties.java b/core/src/main/java/org/springframework/security/ui/cas/ServiceProperties.java
index cecaa348c7..34e3aa0555 100644
--- a/core/src/main/java/org/springframework/security/ui/cas/ServiceProperties.java
+++ b/core/src/main/java/org/springframework/security/ui/cas/ServiceProperties.java
@@ -43,7 +43,7 @@ public class ServiceProperties implements InitializingBean {
/**
* Represents the service the user is authenticating to.https://www.mycompany.com/application/j_acegi_cas_security_check
+ * https://www.mycompany.com/application/j_spring_cas_security_check
*
* @return the URL of the service the user is authenticating to
*/
diff --git a/core/src/main/java/org/springframework/security/ui/logout/LogoutFilter.java b/core/src/main/java/org/springframework/security/ui/logout/LogoutFilter.java
index 55870db23d..8586db20b9 100644
--- a/core/src/main/java/org/springframework/security/ui/logout/LogoutFilter.java
+++ b/core/src/main/java/org/springframework/security/ui/logout/LogoutFilter.java
@@ -58,7 +58,7 @@ public class LogoutFilter implements Filter {
//~ Instance fields ================================================================================================
- private String filterProcessesUrl = "/j_acegi_logout";
+ private String filterProcessesUrl = "/j_spring_security_logout";
private String logoutSuccessUrl;
private LogoutHandler[] handlers;
private boolean useRelativeContext;
diff --git a/core/src/main/java/org/springframework/security/ui/switchuser/SwitchUserProcessingFilter.java b/core/src/main/java/org/springframework/security/ui/switchuser/SwitchUserProcessingFilter.java
index 188d566864..0009438ade 100644
--- a/core/src/main/java/org/springframework/security/ui/switchuser/SwitchUserProcessingFilter.java
+++ b/core/src/main/java/org/springframework/security/ui/switchuser/SwitchUserProcessingFilter.java
@@ -87,8 +87,8 @@ import javax.servlet.http.HttpServletResponse;
* Example:
* <bean id="switchUserProcessingFilter" class="org.springframework.security.ui.switchuser.SwitchUserProcessingFilter">
* <property name="authenticationDao" ref="jdbcDaoImpl" />
- * <property name="switchUserUrl"><value>/j_acegi_switch_user</value></property>
- * <property name="exitUserUrl"><value>/j_acegi_exit_user</value></property>
+ * <property name="switchUserUrl"><value>/j_spring_security_switch_user</value></property>
+ * <property name="exitUserUrl"><value>/j_spring_security_exit_user</value></property>
* <property name="targetUrl"><value>/index.jsp</value></property></bean>
/j_acegi_security_check
.
+ * This filter by default responds to /j_spring_security_check
.
*
* @return the default
*/
public String getDefaultFilterProcessesUrl() {
- return "/j_acegi_security_check";
+ return "/j_spring_security_check";
}
public void init(FilterConfig filterConfig) throws ServletException {}
diff --git a/core/src/test/java/org/springframework/security/PopulatedDatabase.java b/core/src/test/java/org/springframework/security/PopulatedDatabase.java
index 488b2fa988..0e80694994 100644
--- a/core/src/test/java/org/springframework/security/PopulatedDatabase.java
+++ b/core/src/test/java/org/springframework/security/PopulatedDatabase.java
@@ -49,7 +49,7 @@ public class PopulatedDatabase {
private static void setupDataSource() {
dataSource = new DriverManagerDataSource();
dataSource.setDriverClassName("org.hsqldb.jdbcDriver");
- dataSource.setUrl("jdbc:hsqldb:mem:acegisecuritytest");
+ dataSource.setUrl("jdbc:hsqldb:mem:springsecuritytest");
dataSource.setUsername("sa");
dataSource.setPassword("");
diff --git a/core/src/test/java/org/springframework/security/providers/cas/CasAuthenticationProviderTests.java b/core/src/test/java/org/springframework/security/providers/cas/CasAuthenticationProviderTests.java
index 36f8cf9297..c23d72472b 100644
--- a/core/src/test/java/org/springframework/security/providers/cas/CasAuthenticationProviderTests.java
+++ b/core/src/test/java/org/springframework/security/providers/cas/CasAuthenticationProviderTests.java
@@ -102,7 +102,7 @@ public class CasAuthenticationProviderTests extends TestCase {
assertEquals(makeUserDetailsFromAuthoritiesPopulator(), casResult.getPrincipal());
assertEquals("PGTIOU-0-R0zlgrl4pdAQwBvJWO3vnNpevwqStbSGcq3vKB2SqSFFRnjPHt",
casResult.getProxyGrantingTicketIou());
- assertEquals("https://localhost/portal/j_acegi_cas_security_check", casResult.getProxyList().get(0));
+ assertEquals("https://localhost/portal/j_spring_cas_security_check", casResult.getProxyList().get(0));
assertEquals("ST-123", casResult.getCredentials());
assertEquals(new GrantedAuthorityImpl("ROLE_A"), casResult.getAuthorities()[0]);
assertEquals(new GrantedAuthorityImpl("ROLE_B"), casResult.getAuthorities()[1]);
@@ -393,7 +393,7 @@ public class CasAuthenticationProviderTests extends TestCase {
throws AuthenticationException {
if (returnTicket) {
List list = new Vector();
- list.add("https://localhost/portal/j_acegi_cas_security_check");
+ list.add("https://localhost/portal/j_spring_cas_security_check");
return new TicketResponse("marissa", list, "PGTIOU-0-R0zlgrl4pdAQwBvJWO3vnNpevwqStbSGcq3vKB2SqSFFRnjPHt");
}
diff --git a/core/src/test/java/org/springframework/security/providers/cas/CasAuthenticationTokenTests.java b/core/src/test/java/org/springframework/security/providers/cas/CasAuthenticationTokenTests.java
index 3f623a9ab0..a71a197d91 100644
--- a/core/src/test/java/org/springframework/security/providers/cas/CasAuthenticationTokenTests.java
+++ b/core/src/test/java/org/springframework/security/providers/cas/CasAuthenticationTokenTests.java
@@ -140,14 +140,14 @@ public class CasAuthenticationTokenTests extends TestCase {
public void testEqualsWhenEqual() {
List proxyList1 = new Vector();
- proxyList1.add("https://localhost/newPortal/j_acegi_cas_security_check");
+ proxyList1.add("https://localhost/newPortal/j_spring_cas_security_check");
CasAuthenticationToken token1 = new CasAuthenticationToken("key", makeUserDetails(), "Password",
new GrantedAuthority[] {new GrantedAuthorityImpl("ROLE_ONE"), new GrantedAuthorityImpl("ROLE_TWO")},
makeUserDetails(), proxyList1, "PGTIOU-0-R0zlgrl4pdAQwBvJWO3vnNpevwqStbSGcq3vKB2SqSFFRnjPHt");
List proxyList2 = new Vector();
- proxyList2.add("https://localhost/newPortal/j_acegi_cas_security_check");
+ proxyList2.add("https://localhost/newPortal/j_spring_cas_security_check");
CasAuthenticationToken token2 = new CasAuthenticationToken("key", makeUserDetails(), "Password",
new GrantedAuthority[] {new GrantedAuthorityImpl("ROLE_ONE"), new GrantedAuthorityImpl("ROLE_TWO")},
@@ -159,7 +159,7 @@ public class CasAuthenticationTokenTests extends TestCase {
public void testGetters() {
// Build the proxy list returned in the ticket from CAS
List proxyList = new Vector();
- proxyList.add("https://localhost/newPortal/j_acegi_cas_security_check");
+ proxyList.add("https://localhost/newPortal/j_spring_cas_security_check");
CasAuthenticationToken token = new CasAuthenticationToken("key", makeUserDetails(), "Password",
new GrantedAuthority[] {new GrantedAuthorityImpl("ROLE_ONE"), new GrantedAuthorityImpl("ROLE_TWO")},
@@ -187,14 +187,14 @@ public class CasAuthenticationTokenTests extends TestCase {
public void testNotEqualsDueToAbstractParentEqualsCheck() {
List proxyList1 = new Vector();
- proxyList1.add("https://localhost/newPortal/j_acegi_cas_security_check");
+ proxyList1.add("https://localhost/newPortal/j_spring_cas_security_check");
CasAuthenticationToken token1 = new CasAuthenticationToken("key", makeUserDetails(), "Password",
new GrantedAuthority[] {new GrantedAuthorityImpl("ROLE_ONE"), new GrantedAuthorityImpl("ROLE_TWO")},
makeUserDetails(), proxyList1, "PGTIOU-0-R0zlgrl4pdAQwBvJWO3vnNpevwqStbSGcq3vKB2SqSFFRnjPHt");
List proxyList2 = new Vector();
- proxyList2.add("https://localhost/newPortal/j_acegi_cas_security_check");
+ proxyList2.add("https://localhost/newPortal/j_spring_cas_security_check");
CasAuthenticationToken token2 = new CasAuthenticationToken("key", makeUserDetails("OTHER_NAME"), "Password",
new GrantedAuthority[] {new GrantedAuthorityImpl("ROLE_ONE"), new GrantedAuthorityImpl("ROLE_TWO")},
@@ -205,7 +205,7 @@ public class CasAuthenticationTokenTests extends TestCase {
public void testNotEqualsDueToDifferentAuthenticationClass() {
List proxyList1 = new Vector();
- proxyList1.add("https://localhost/newPortal/j_acegi_cas_security_check");
+ proxyList1.add("https://localhost/newPortal/j_spring_cas_security_check");
CasAuthenticationToken token1 = new CasAuthenticationToken("key", makeUserDetails(), "Password",
new GrantedAuthority[] {new GrantedAuthorityImpl("ROLE_ONE"), new GrantedAuthorityImpl("ROLE_TWO")},
@@ -219,14 +219,14 @@ public class CasAuthenticationTokenTests extends TestCase {
public void testNotEqualsDueToKey() {
List proxyList1 = new Vector();
- proxyList1.add("https://localhost/newPortal/j_acegi_cas_security_check");
+ proxyList1.add("https://localhost/newPortal/j_spring_cas_security_check");
CasAuthenticationToken token1 = new CasAuthenticationToken("key", makeUserDetails(), "Password",
new GrantedAuthority[] {new GrantedAuthorityImpl("ROLE_ONE"), new GrantedAuthorityImpl("ROLE_TWO")},
makeUserDetails(), proxyList1, "PGTIOU-0-R0zlgrl4pdAQwBvJWO3vnNpevwqStbSGcq3vKB2SqSFFRnjPHt");
List proxyList2 = new Vector();
- proxyList2.add("https://localhost/newPortal/j_acegi_cas_security_check");
+ proxyList2.add("https://localhost/newPortal/j_spring_cas_security_check");
CasAuthenticationToken token2 = new CasAuthenticationToken("DIFFERENT_KEY", makeUserDetails(), "Password",
new GrantedAuthority[] {new GrantedAuthorityImpl("ROLE_ONE"), new GrantedAuthorityImpl("ROLE_TWO")},
@@ -237,14 +237,14 @@ public class CasAuthenticationTokenTests extends TestCase {
public void testNotEqualsDueToProxyGrantingTicket() {
List proxyList1 = new Vector();
- proxyList1.add("https://localhost/newPortal/j_acegi_cas_security_check");
+ proxyList1.add("https://localhost/newPortal/j_spring_cas_security_check");
CasAuthenticationToken token1 = new CasAuthenticationToken("key", makeUserDetails(), "Password",
new GrantedAuthority[] {new GrantedAuthorityImpl("ROLE_ONE"), new GrantedAuthorityImpl("ROLE_TWO")},
makeUserDetails(), proxyList1, "PGTIOU-0-R0zlgrl4pdAQwBvJWO3vnNpevwqStbSGcq3vKB2SqSFFRnjPHt");
List proxyList2 = new Vector();
- proxyList2.add("https://localhost/newPortal/j_acegi_cas_security_check");
+ proxyList2.add("https://localhost/newPortal/j_spring_cas_security_check");
CasAuthenticationToken token2 = new CasAuthenticationToken("key", makeUserDetails(), "Password",
new GrantedAuthority[] {new GrantedAuthorityImpl("ROLE_ONE"), new GrantedAuthorityImpl("ROLE_TWO")},
@@ -255,14 +255,14 @@ public class CasAuthenticationTokenTests extends TestCase {
public void testNotEqualsDueToProxyList() {
List proxyList1 = new Vector();
- proxyList1.add("https://localhost/newPortal/j_acegi_cas_security_check");
+ proxyList1.add("https://localhost/newPortal/j_spring_cas_security_check");
CasAuthenticationToken token1 = new CasAuthenticationToken("key", makeUserDetails(), "Password",
new GrantedAuthority[] {new GrantedAuthorityImpl("ROLE_ONE"), new GrantedAuthorityImpl("ROLE_TWO")},
makeUserDetails(), proxyList1, "PGTIOU-0-R0zlgrl4pdAQwBvJWO3vnNpevwqStbSGcq3vKB2SqSFFRnjPHt");
List proxyList2 = new Vector();
- proxyList2.add("https://localhost/SOME_OTHER_PORTAL/j_acegi_cas_security_check");
+ proxyList2.add("https://localhost/SOME_OTHER_PORTAL/j_spring_cas_security_check");
CasAuthenticationToken token2 = new CasAuthenticationToken("key", makeUserDetails(), "Password",
new GrantedAuthority[] {new GrantedAuthorityImpl("ROLE_ONE"), new GrantedAuthorityImpl("ROLE_TWO")},
diff --git a/core/src/test/java/org/springframework/security/providers/cas/TicketResponseTests.java b/core/src/test/java/org/springframework/security/providers/cas/TicketResponseTests.java
index 6f4016a096..e18df36b2b 100644
--- a/core/src/test/java/org/springframework/security/providers/cas/TicketResponseTests.java
+++ b/core/src/test/java/org/springframework/security/providers/cas/TicketResponseTests.java
@@ -71,7 +71,7 @@ public class TicketResponseTests extends TestCase {
public void testGetters() {
// Build the proxy list returned in the ticket from CAS
List proxyList = new Vector();
- proxyList.add("https://localhost/newPortal/j_acegi_cas_security_check");
+ proxyList.add("https://localhost/newPortal/j_spring_cas_security_check");
TicketResponse ticket = new TicketResponse("marissa", proxyList,
"PGTIOU-0-R0zlgrl4pdAQwBvJWO3vnNpevwqStbSGcq3vKB2SqSFFRnjPHt");
diff --git a/core/src/test/java/org/springframework/security/providers/cas/cache/EhCacheBasedTicketCacheTests.java b/core/src/test/java/org/springframework/security/providers/cas/cache/EhCacheBasedTicketCacheTests.java
index 173ebaec18..e3277b6179 100644
--- a/core/src/test/java/org/springframework/security/providers/cas/cache/EhCacheBasedTicketCacheTests.java
+++ b/core/src/test/java/org/springframework/security/providers/cas/cache/EhCacheBasedTicketCacheTests.java
@@ -59,7 +59,7 @@ public class EhCacheBasedTicketCacheTests extends TestCase {
private CasAuthenticationToken getToken() {
List proxyList = new Vector();
- proxyList.add("https://localhost/newPortal/j_acegi_cas_security_check");
+ proxyList.add("https://localhost/newPortal/j_spring_cas_security_check");
User user = new User("marissa", "password", true, true, true, true,
new GrantedAuthority[] {new GrantedAuthorityImpl("ROLE_ONE"), new GrantedAuthorityImpl("ROLE_TWO")});
diff --git a/core/src/test/java/org/springframework/security/providers/cas/proxy/NamedCasProxyDeciderTests.java b/core/src/test/java/org/springframework/security/providers/cas/proxy/NamedCasProxyDeciderTests.java
index 4b1abe5dd3..e4e4d558d1 100644
--- a/core/src/test/java/org/springframework/security/providers/cas/proxy/NamedCasProxyDeciderTests.java
+++ b/core/src/test/java/org/springframework/security/providers/cas/proxy/NamedCasProxyDeciderTests.java
@@ -53,12 +53,12 @@ public class NamedCasProxyDeciderTests extends TestCase {
// Build the ticket returned from CAS
List proxyList = new Vector();
- proxyList.add("https://localhost/newPortal/j_acegi_cas_security_check");
+ proxyList.add("https://localhost/newPortal/j_spring_cas_security_check");
// Build the list of valid nearest proxies
List validProxies = new Vector();
- validProxies.add("https://localhost/portal/j_acegi_cas_security_check");
- validProxies.add("https://localhost/newPortal/j_acegi_cas_security_check");
+ validProxies.add("https://localhost/portal/j_spring_cas_security_check");
+ validProxies.add("https://localhost/newPortal/j_spring_cas_security_check");
proxyDecider.setValidProxies(validProxies);
proxyDecider.afterPropertiesSet();
@@ -102,8 +102,8 @@ public class NamedCasProxyDeciderTests extends TestCase {
// Build the list of valid nearest proxies
List validProxies = new Vector();
- validProxies.add("https://localhost/portal/j_acegi_cas_security_check");
- validProxies.add("https://localhost/newPortal/j_acegi_cas_security_check");
+ validProxies.add("https://localhost/portal/j_spring_cas_security_check");
+ validProxies.add("https://localhost/newPortal/j_spring_cas_security_check");
proxyDecider.setValidProxies(validProxies);
assertEquals(validProxies, proxyDecider.getValidProxies());
@@ -115,12 +115,12 @@ public class NamedCasProxyDeciderTests extends TestCase {
// Build the ticket returned from CAS
List proxyList = new Vector();
- proxyList.add("https://localhost/untrustedWebApp/j_acegi_cas_security_check");
+ proxyList.add("https://localhost/untrustedWebApp/j_spring_cas_security_check");
// Build the list of valid nearest proxies
List validProxies = new Vector();
- validProxies.add("https://localhost/portal/j_acegi_cas_security_check");
- validProxies.add("https://localhost/newPortal/j_acegi_cas_security_check");
+ validProxies.add("https://localhost/portal/j_spring_cas_security_check");
+ validProxies.add("https://localhost/newPortal/j_spring_cas_security_check");
proxyDecider.setValidProxies(validProxies);
proxyDecider.afterPropertiesSet();
diff --git a/core/src/test/java/org/springframework/security/providers/cas/proxy/RejectProxyTicketsTests.java b/core/src/test/java/org/springframework/security/providers/cas/proxy/RejectProxyTicketsTests.java
index b897255d8d..ed13101d3a 100644
--- a/core/src/test/java/org/springframework/security/providers/cas/proxy/RejectProxyTicketsTests.java
+++ b/core/src/test/java/org/springframework/security/providers/cas/proxy/RejectProxyTicketsTests.java
@@ -72,7 +72,7 @@ public class RejectProxyTicketsTests extends TestCase {
public void testRejectsIfAnyProxyInList() {
RejectProxyTickets proxyDecider = new RejectProxyTickets();
List proxyList = new Vector();
- proxyList.add("https://localhost/webApp/j_acegi_cas_security_check");
+ proxyList.add("https://localhost/webApp/j_spring_cas_security_check");
try {
proxyDecider.confirmProxyListTrusted(proxyList);
diff --git a/core/src/test/java/org/springframework/security/providers/cas/ticketvalidator/CasProxyTicketValidatorTests.java b/core/src/test/java/org/springframework/security/providers/cas/ticketvalidator/CasProxyTicketValidatorTests.java
index 172fa0b8b8..60b45b4e08 100644
--- a/core/src/test/java/org/springframework/security/providers/cas/ticketvalidator/CasProxyTicketValidatorTests.java
+++ b/core/src/test/java/org/springframework/security/providers/cas/ticketvalidator/CasProxyTicketValidatorTests.java
@@ -65,7 +65,7 @@ public class CasProxyTicketValidatorTests extends TestCase {
public void testNormalOperation() {
ServiceProperties sp = new ServiceProperties();
sp.setSendRenew(true);
- sp.setService("https://my.com/webapp//j_acegi_cas_security_check");
+ sp.setService("https://my.com/webapp//j_spring_cas_security_check");
CasProxyTicketValidator tv = new MockCasProxyTicketValidator(true, false);
tv.setCasValidate("https://company.com/cas/proxyvalidate");
diff --git a/core/src/test/java/org/springframework/security/ui/AbstractProcessingFilterTests.java b/core/src/test/java/org/springframework/security/ui/AbstractProcessingFilterTests.java
index d542cd389c..f883be9754 100644
--- a/core/src/test/java/org/springframework/security/ui/AbstractProcessingFilterTests.java
+++ b/core/src/test/java/org/springframework/security/ui/AbstractProcessingFilterTests.java
@@ -106,9 +106,9 @@ public class AbstractProcessingFilterTests extends TestCase {
MockHttpServletRequest request = createMockRequest();
MockHttpServletResponse response = new MockHttpServletResponse();
MockAbstractProcessingFilter filter = new MockAbstractProcessingFilter();
- filter.setFilterProcessesUrl("/j_acegi_security_check");
+ filter.setFilterProcessesUrl("/j_spring_security_check");
- request.setRequestURI("/mycontext/j_acegi_security_check;jsessionid=I8MIONOSTHOR");
+ request.setRequestURI("/mycontext/j_spring_security_check;jsessionid=I8MIONOSTHOR");
assertTrue(filter.requiresAuthentication(request, response));
}
@@ -281,7 +281,7 @@ public class AbstractProcessingFilterTests extends TestCase {
AbstractProcessingFilter filter = new MockAbstractProcessingFilter();
filter.setAuthenticationManager(new MockAuthenticationManager());
filter.setDefaultTargetUrl("/");
- filter.setFilterProcessesUrl("/j_acegi_security_check");
+ filter.setFilterProcessesUrl("/j_spring_security_check");
try {
filter.afterPropertiesSet();
@@ -295,7 +295,7 @@ public class AbstractProcessingFilterTests extends TestCase {
AbstractProcessingFilter filter = new MockAbstractProcessingFilter();
filter.setAuthenticationFailureUrl("/failed.jsp");
filter.setDefaultTargetUrl("/");
- filter.setFilterProcessesUrl("/j_acegi_security_check");
+ filter.setFilterProcessesUrl("/j_spring_security_check");
try {
filter.afterPropertiesSet();
@@ -309,7 +309,7 @@ public class AbstractProcessingFilterTests extends TestCase {
AbstractProcessingFilter filter = new MockAbstractProcessingFilter();
filter.setAuthenticationFailureUrl("/failed.jsp");
filter.setAuthenticationManager(new MockAuthenticationManager());
- filter.setFilterProcessesUrl("/j_acegi_security_check");
+ filter.setFilterProcessesUrl("/j_spring_security_check");
try {
filter.afterPropertiesSet();
diff --git a/core/src/test/java/org/springframework/security/ui/cas/CasProcessingFilterEntryPointTests.java b/core/src/test/java/org/springframework/security/ui/cas/CasProcessingFilterEntryPointTests.java
index ae17cf2c7d..12c29089d1 100644
--- a/core/src/test/java/org/springframework/security/ui/cas/CasProcessingFilterEntryPointTests.java
+++ b/core/src/test/java/org/springframework/security/ui/cas/CasProcessingFilterEntryPointTests.java
@@ -86,7 +86,7 @@ public class CasProcessingFilterEntryPointTests extends TestCase {
public void testNormalOperationWithRenewFalse() throws Exception {
ServiceProperties sp = new ServiceProperties();
sp.setSendRenew(false);
- sp.setService("https://mycompany.com/bigWebApp/j_acegi_cas_security_check");
+ sp.setService("https://mycompany.com/bigWebApp/j_spring_cas_security_check");
CasProcessingFilterEntryPoint ep = new CasProcessingFilterEntryPoint();
ep.setLoginUrl("https://cas/login");
@@ -101,14 +101,14 @@ public class CasProcessingFilterEntryPointTests extends TestCase {
ep.commence(request, response, null);
assertEquals("https://cas/login?service="
- + URLEncoder.encode("https://mycompany.com/bigWebApp/j_acegi_cas_security_check", "UTF-8"),
+ + URLEncoder.encode("https://mycompany.com/bigWebApp/j_spring_cas_security_check", "UTF-8"),
response.getRedirectedUrl());
}
public void testNormalOperationWithRenewTrue() throws Exception {
ServiceProperties sp = new ServiceProperties();
sp.setSendRenew(true);
- sp.setService("https://mycompany.com/bigWebApp/j_acegi_cas_security_check");
+ sp.setService("https://mycompany.com/bigWebApp/j_spring_cas_security_check");
CasProcessingFilterEntryPoint ep = new CasProcessingFilterEntryPoint();
ep.setLoginUrl("https://cas/login");
@@ -122,7 +122,7 @@ public class CasProcessingFilterEntryPointTests extends TestCase {
ep.afterPropertiesSet();
ep.commence(request, response, null);
assertEquals("https://cas/login?service="
- + URLEncoder.encode("https://mycompany.com/bigWebApp/j_acegi_cas_security_check", "UTF-8") + "&renew=true",
+ + URLEncoder.encode("https://mycompany.com/bigWebApp/j_spring_cas_security_check", "UTF-8") + "&renew=true",
response.getRedirectedUrl());
}
}
diff --git a/core/src/test/java/org/springframework/security/ui/cas/CasProcessingFilterTests.java b/core/src/test/java/org/springframework/security/ui/cas/CasProcessingFilterTests.java
index b0a42d2efe..49729f07e0 100644
--- a/core/src/test/java/org/springframework/security/ui/cas/CasProcessingFilterTests.java
+++ b/core/src/test/java/org/springframework/security/ui/cas/CasProcessingFilterTests.java
@@ -53,7 +53,7 @@ public class CasProcessingFilterTests extends TestCase {
public void testGetters() {
CasProcessingFilter filter = new CasProcessingFilter();
- assertEquals("/j_acegi_cas_security_check", filter.getDefaultFilterProcessesUrl());
+ assertEquals("/j_spring_cas_security_check", filter.getDefaultFilterProcessesUrl());
}
public void testNormalOperation() throws Exception {
diff --git a/core/src/test/java/org/springframework/security/ui/logout/LogoutHandlerTests.java b/core/src/test/java/org/springframework/security/ui/logout/LogoutHandlerTests.java
index 8ce896a78e..7c4a4f296b 100644
--- a/core/src/test/java/org/springframework/security/ui/logout/LogoutHandlerTests.java
+++ b/core/src/test/java/org/springframework/security/ui/logout/LogoutHandlerTests.java
@@ -20,7 +20,7 @@ public class LogoutHandlerTests extends TestCase {
MockHttpServletRequest request = new MockHttpServletRequest();
MockHttpServletResponse response = new MockHttpServletResponse();
- request.setRequestURI("/j_acegi_logout;someparam=blah?otherparam=blah");
+ request.setRequestURI("/j_spring_security_logout;someparam=blah?otherparam=blah");
assertTrue(filter.requiresLogout(request, response));
}
@@ -30,7 +30,7 @@ public class LogoutHandlerTests extends TestCase {
request.setContextPath("/context");
MockHttpServletResponse response = new MockHttpServletResponse();
- request.setRequestURI("/context/j_acegi_logout?param=blah");
+ request.setRequestURI("/context/j_spring_security_logout?param=blah");
assertTrue(filter.requiresLogout(request, response));
}
diff --git a/core/src/test/java/org/springframework/security/ui/switchuser/SwitchUserProcessingFilterTests.java b/core/src/test/java/org/springframework/security/ui/switchuser/SwitchUserProcessingFilterTests.java
index 3a2873ad1a..3ce4f70a6a 100644
--- a/core/src/test/java/org/springframework/security/ui/switchuser/SwitchUserProcessingFilterTests.java
+++ b/core/src/test/java/org/springframework/security/ui/switchuser/SwitchUserProcessingFilterTests.java
@@ -69,7 +69,7 @@ public class SwitchUserProcessingFilterTests extends TestCase {
MockHttpServletRequest request = new MockHttpServletRequest();
request.setScheme("http");
request.setServerName("localhost");
- request.setRequestURI("/j_acegi_switch_user");
+ request.setRequestURI("/j_spring_security_switch_user");
return request;
}
@@ -199,8 +199,8 @@ public class SwitchUserProcessingFilterTests extends TestCase {
public void testBadConfigMissingAuthenticationDao() {
SwitchUserProcessingFilter filter = new SwitchUserProcessingFilter();
- filter.setSwitchUserUrl("/j_acegi_switch_user");
- filter.setExitUserUrl("/j_acegi_exit_user");
+ filter.setSwitchUserUrl("/j_spring_security_switch_user");
+ filter.setExitUserUrl("/j_spring_security_exit_user");
filter.setTargetUrl("/main.jsp");
try {
@@ -214,8 +214,8 @@ public class SwitchUserProcessingFilterTests extends TestCase {
public void testBadConfigMissingTargetUrl() {
SwitchUserProcessingFilter filter = new SwitchUserProcessingFilter();
filter.setUserDetailsService(new MockAuthenticationDaoUserJackLord());
- filter.setSwitchUserUrl("/j_acegi_switch_user");
- filter.setExitUserUrl("/j_acegi_exit_user");
+ filter.setSwitchUserUrl("/j_spring_security_switch_user");
+ filter.setExitUserUrl("/j_spring_security_exit_user");
try {
filter.afterPropertiesSet();
@@ -228,9 +228,9 @@ public class SwitchUserProcessingFilterTests extends TestCase {
public void testDefaultProcessesFilterUrlWithPathParameter() {
MockHttpServletRequest request = createMockSwitchRequest();
SwitchUserProcessingFilter filter = new SwitchUserProcessingFilter();
- filter.setSwitchUserUrl("/j_acegi_switch_user");
+ filter.setSwitchUserUrl("/j_spring_security_switch_user");
- request.setRequestURI("/webapp/j_acegi_switch_user;jsessionid=8JHDUD723J8");
+ request.setRequestURI("/webapp/j_spring_security_switch_user;jsessionid=8JHDUD723J8");
assertTrue(filter.requiresSwitchUser(request));
}
@@ -251,7 +251,7 @@ public class SwitchUserProcessingFilterTests extends TestCase {
// http request
MockHttpServletRequest request = createMockSwitchRequest();
- request.setRequestURI("/j_acegi_exit_user");
+ request.setRequestURI("/j_spring_security_exit_user");
// http response
MockHttpServletResponse response = new MockHttpServletResponse();
@@ -259,7 +259,7 @@ public class SwitchUserProcessingFilterTests extends TestCase {
// setup filter
SwitchUserProcessingFilter filter = new SwitchUserProcessingFilter();
filter.setUserDetailsService(new MockAuthenticationDaoUserJackLord());
- filter.setExitUserUrl("/j_acegi_exit_user");
+ filter.setExitUserUrl("/j_spring_security_exit_user");
MockFilterChain chain = new MockFilterChain(true);
@@ -278,7 +278,7 @@ public class SwitchUserProcessingFilterTests extends TestCase {
// http request
MockHttpServletRequest request = createMockSwitchRequest();
- request.setRequestURI("/j_acegi_exit_user");
+ request.setRequestURI("/j_spring_security_exit_user");
// http response
MockHttpServletResponse response = new MockHttpServletResponse();
@@ -286,7 +286,7 @@ public class SwitchUserProcessingFilterTests extends TestCase {
// setup filter
SwitchUserProcessingFilter filter = new SwitchUserProcessingFilter();
filter.setUserDetailsService(new MockAuthenticationDaoUserJackLord());
- filter.setExitUserUrl("/j_acegi_exit_user");
+ filter.setExitUserUrl("/j_spring_security_exit_user");
MockFilterChain chain = new MockFilterChain(true);
@@ -305,13 +305,13 @@ public class SwitchUserProcessingFilterTests extends TestCase {
MockHttpServletRequest request = createMockSwitchRequest();
request.addParameter(SwitchUserProcessingFilter.SPRING_SECURITY_SWITCH_USERNAME_KEY, "jacklord");
- request.setRequestURI("/webapp/j_acegi_switch_user");
+ request.setRequestURI("/webapp/j_spring_security_switch_user");
MockHttpServletResponse response = new MockHttpServletResponse();
MockFilterChain chain = new MockFilterChain(true);
SwitchUserProcessingFilter filter = new SwitchUserProcessingFilter();
- filter.setSwitchUserUrl("/j_acegi_switch_user");
+ filter.setSwitchUserUrl("/j_spring_security_switch_user");
filter.setTargetUrl("/webapp/someOtherUrl");
filter.setUserDetailsService(new MockAuthenticationDaoUserJackLord());
@@ -323,11 +323,11 @@ public class SwitchUserProcessingFilterTests extends TestCase {
public void testRequiresExitUser() {
// filter
SwitchUserProcessingFilter filter = new SwitchUserProcessingFilter();
- filter.setExitUserUrl("/j_acegi_exit_user");
+ filter.setExitUserUrl("/j_spring_security_exit_user");
// request
MockHttpServletRequest request = new MockHttpServletRequest();
- request.setRequestURI("/j_acegi_exit_user");
+ request.setRequestURI("/j_spring_security_exit_user");
assertTrue(filter.requiresExitUser(request));
}
@@ -335,7 +335,7 @@ public class SwitchUserProcessingFilterTests extends TestCase {
public void testRequiresSwitch() {
// filter
SwitchUserProcessingFilter filter = new SwitchUserProcessingFilter();
- filter.setSwitchUserUrl("/j_acegi_switch_user");
+ filter.setSwitchUserUrl("/j_spring_security_switch_user");
// request
MockHttpServletRequest request = createMockSwitchRequest();
@@ -350,7 +350,7 @@ public class SwitchUserProcessingFilterTests extends TestCase {
// http request
MockHttpServletRequest request = new MockHttpServletRequest();
- request.setRequestURI("/webapp/j_acegi_switch_user");
+ request.setRequestURI("/webapp/j_spring_security_switch_user");
request.addParameter(SwitchUserProcessingFilter.SPRING_SECURITY_SWITCH_USERNAME_KEY, "jacklord");
// http response
@@ -359,7 +359,7 @@ public class SwitchUserProcessingFilterTests extends TestCase {
// setup filter
SwitchUserProcessingFilter filter = new SwitchUserProcessingFilter();
filter.setUserDetailsService(new MockAuthenticationDaoUserJackLord());
- filter.setSwitchUserUrl("/j_acegi_switch_user");
+ filter.setSwitchUserUrl("/j_spring_security_switch_user");
MockFilterChain chain = new MockFilterChain(true);
diff --git a/core/src/test/java/org/springframework/security/ui/webapp/AuthenticationProcessingFilterTests.java b/core/src/test/java/org/springframework/security/ui/webapp/AuthenticationProcessingFilterTests.java
index 1e0cfce229..7be94abb24 100644
--- a/core/src/test/java/org/springframework/security/ui/webapp/AuthenticationProcessingFilterTests.java
+++ b/core/src/test/java/org/springframework/security/ui/webapp/AuthenticationProcessingFilterTests.java
@@ -47,7 +47,7 @@ public class AuthenticationProcessingFilterTests extends TestCase {
public void testGetters() {
AuthenticationProcessingFilter filter = new AuthenticationProcessingFilter();
- assertEquals("/j_acegi_security_check", filter.getDefaultFilterProcessesUrl());
+ assertEquals("/j_spring_security_check", filter.getDefaultFilterProcessesUrl());
}
public void testNormalOperation() throws Exception {
diff --git a/core/src/test/resources/org/springframework/security/ui/webapp/filtertest-valid.xml b/core/src/test/resources/org/springframework/security/ui/webapp/filtertest-valid.xml
index bcfbd5f877..fa8e34f774 100644
--- a/core/src/test/resources/org/springframework/security/ui/webapp/filtertest-valid.xml
+++ b/core/src/test/resources/org/springframework/security/ui/webapp/filtertest-valid.xml
@@ -51,7 +51,7 @@