Replace deprecated methods
This commit is contained in:
parent
0cefb27928
commit
52e12ad64b
|
@ -94,7 +94,7 @@ final class OAuth2ClientBeanDefinitionParser implements BeanDefinitionParser {
|
|||
.rootBeanDefinition(OAuth2AuthorizationRequestRedirectFilter.class);
|
||||
String authorizationRequestResolverRef = (authorizationCodeGrantElt != null)
|
||||
? authorizationCodeGrantElt.getAttribute(ATT_AUTHORIZATION_REQUEST_RESOLVER_REF) : null;
|
||||
if (!StringUtils.isEmpty(authorizationRequestResolverRef)) {
|
||||
if (StringUtils.hasLength(authorizationRequestResolverRef)) {
|
||||
authorizationRequestRedirectFilterBuilder.addConstructorArgReference(authorizationRequestResolverRef);
|
||||
}
|
||||
else {
|
||||
|
@ -122,7 +122,7 @@ final class OAuth2ClientBeanDefinitionParser implements BeanDefinitionParser {
|
|||
private BeanMetadataElement getAuthorizationRequestRepository(Element element) {
|
||||
String authorizationRequestRepositoryRef = (element != null)
|
||||
? element.getAttribute(ATT_AUTHORIZATION_REQUEST_REPOSITORY_REF) : null;
|
||||
if (!StringUtils.isEmpty(authorizationRequestRepositoryRef)) {
|
||||
if (StringUtils.hasLength(authorizationRequestRepositoryRef)) {
|
||||
return new RuntimeBeanReference(authorizationRequestRepositoryRef);
|
||||
}
|
||||
return BeanDefinitionBuilder.rootBeanDefinition(
|
||||
|
@ -143,7 +143,7 @@ final class OAuth2ClientBeanDefinitionParser implements BeanDefinitionParser {
|
|||
private BeanMetadataElement getAccessTokenResponseClient(Element element) {
|
||||
String accessTokenResponseClientRef = (element != null)
|
||||
? element.getAttribute(ATT_ACCESS_TOKEN_RESPONSE_CLIENT_REF) : null;
|
||||
if (!StringUtils.isEmpty(accessTokenResponseClientRef)) {
|
||||
if (StringUtils.hasLength(accessTokenResponseClientRef)) {
|
||||
return new RuntimeBeanReference(accessTokenResponseClientRef);
|
||||
}
|
||||
return BeanDefinitionBuilder.rootBeanDefinition(
|
||||
|
|
|
@ -42,7 +42,7 @@ final class OAuth2ClientBeanDefinitionParserUtils {
|
|||
|
||||
static BeanMetadataElement getClientRegistrationRepository(Element element) {
|
||||
String clientRegistrationRepositoryRef = element.getAttribute(ATT_CLIENT_REGISTRATION_REPOSITORY_REF);
|
||||
if (!StringUtils.isEmpty(clientRegistrationRepositoryRef)) {
|
||||
if (StringUtils.hasLength(clientRegistrationRepositoryRef)) {
|
||||
return new RuntimeBeanReference(clientRegistrationRepositoryRef);
|
||||
}
|
||||
return new RuntimeBeanReference(ClientRegistrationRepository.class);
|
||||
|
@ -50,7 +50,7 @@ final class OAuth2ClientBeanDefinitionParserUtils {
|
|||
|
||||
static BeanMetadataElement getAuthorizedClientRepository(Element element) {
|
||||
String authorizedClientRepositoryRef = element.getAttribute(ATT_AUTHORIZED_CLIENT_REPOSITORY_REF);
|
||||
if (!StringUtils.isEmpty(authorizedClientRepositoryRef)) {
|
||||
if (StringUtils.hasLength(authorizedClientRepositoryRef)) {
|
||||
return new RuntimeBeanReference(authorizedClientRepositoryRef);
|
||||
}
|
||||
return null;
|
||||
|
@ -58,7 +58,7 @@ final class OAuth2ClientBeanDefinitionParserUtils {
|
|||
|
||||
static BeanMetadataElement getAuthorizedClientService(Element element) {
|
||||
String authorizedClientServiceRef = element.getAttribute(ATT_AUTHORIZED_CLIENT_SERVICE_REF);
|
||||
if (!StringUtils.isEmpty(authorizedClientServiceRef)) {
|
||||
if (StringUtils.hasLength(authorizedClientServiceRef)) {
|
||||
return new RuntimeBeanReference(authorizedClientServiceRef);
|
||||
}
|
||||
return null;
|
||||
|
|
|
@ -175,7 +175,7 @@ final class OAuth2LoginBeanDefinitionParser implements BeanDefinitionParser {
|
|||
}
|
||||
Object source = parserContext.extractSource(element);
|
||||
String loginProcessingUrl = element.getAttribute(ATT_LOGIN_PROCESSING_URL);
|
||||
if (!StringUtils.isEmpty(loginProcessingUrl)) {
|
||||
if (StringUtils.hasLength(loginProcessingUrl)) {
|
||||
WebConfigUtils.validateHttpRedirect(loginProcessingUrl, parserContext, source);
|
||||
oauth2LoginAuthenticationFilterBuilder.addConstructorArgValue(loginProcessingUrl);
|
||||
}
|
||||
|
@ -187,7 +187,7 @@ final class OAuth2LoginBeanDefinitionParser implements BeanDefinitionParser {
|
|||
.rootBeanDefinition(OAuth2LoginAuthenticationProvider.class)
|
||||
.addConstructorArgValue(accessTokenResponseClient).addConstructorArgValue(oauth2UserService);
|
||||
String userAuthoritiesMapperRef = element.getAttribute(ATT_USER_AUTHORITIES_MAPPER_REF);
|
||||
if (!StringUtils.isEmpty(userAuthoritiesMapperRef)) {
|
||||
if (StringUtils.hasLength(userAuthoritiesMapperRef)) {
|
||||
oauth2LoginAuthenticationProviderBuilder.addPropertyReference("authoritiesMapper",
|
||||
userAuthoritiesMapperRef);
|
||||
}
|
||||
|
@ -197,7 +197,7 @@ final class OAuth2LoginBeanDefinitionParser implements BeanDefinitionParser {
|
|||
BeanDefinitionBuilder oauth2AuthorizationRequestRedirectFilterBuilder = BeanDefinitionBuilder
|
||||
.rootBeanDefinition(OAuth2AuthorizationRequestRedirectFilter.class);
|
||||
String authorizationRequestResolverRef = element.getAttribute(ATT_AUTHORIZATION_REQUEST_RESOLVER_REF);
|
||||
if (!StringUtils.isEmpty(authorizationRequestResolverRef)) {
|
||||
if (StringUtils.hasLength(authorizationRequestResolverRef)) {
|
||||
oauth2AuthorizationRequestRedirectFilterBuilder.addConstructorArgReference(authorizationRequestResolverRef);
|
||||
}
|
||||
else {
|
||||
|
@ -210,7 +210,7 @@ final class OAuth2LoginBeanDefinitionParser implements BeanDefinitionParser {
|
|||
this.oauth2AuthorizationRequestRedirectFilter = oauth2AuthorizationRequestRedirectFilterBuilder
|
||||
.getBeanDefinition();
|
||||
String authenticationSuccessHandlerRef = element.getAttribute(ATT_AUTHENTICATION_SUCCESS_HANDLER_REF);
|
||||
if (!StringUtils.isEmpty(authenticationSuccessHandlerRef)) {
|
||||
if (StringUtils.hasLength(authenticationSuccessHandlerRef)) {
|
||||
oauth2LoginAuthenticationFilterBuilder.addPropertyReference("authenticationSuccessHandler",
|
||||
authenticationSuccessHandlerRef);
|
||||
}
|
||||
|
@ -222,7 +222,7 @@ final class OAuth2LoginBeanDefinitionParser implements BeanDefinitionParser {
|
|||
successHandlerBuilder.getBeanDefinition());
|
||||
}
|
||||
String loginPage = element.getAttribute(ATT_LOGIN_PAGE);
|
||||
if (!StringUtils.isEmpty(loginPage)) {
|
||||
if (StringUtils.hasLength(loginPage)) {
|
||||
WebConfigUtils.validateHttpRedirect(loginPage, parserContext, source);
|
||||
this.oauth2LoginAuthenticationEntryPoint = BeanDefinitionBuilder
|
||||
.rootBeanDefinition(LoginUrlAuthenticationEntryPoint.class).addConstructorArgValue(loginPage)
|
||||
|
@ -239,7 +239,7 @@ final class OAuth2LoginBeanDefinitionParser implements BeanDefinitionParser {
|
|||
}
|
||||
}
|
||||
String authenticationFailureHandlerRef = element.getAttribute(ATT_AUTHENTICATION_FAILURE_HANDLER_REF);
|
||||
if (!StringUtils.isEmpty(authenticationFailureHandlerRef)) {
|
||||
if (StringUtils.hasLength(authenticationFailureHandlerRef)) {
|
||||
oauth2LoginAuthenticationFilterBuilder.addPropertyReference("authenticationFailureHandler",
|
||||
authenticationFailureHandlerRef);
|
||||
}
|
||||
|
@ -262,7 +262,7 @@ final class OAuth2LoginBeanDefinitionParser implements BeanDefinitionParser {
|
|||
|
||||
private BeanMetadataElement getAuthorizationRequestRepository(Element element) {
|
||||
String authorizationRequestRepositoryRef = element.getAttribute(ATT_AUTHORIZATION_REQUEST_REPOSITORY_REF);
|
||||
if (!StringUtils.isEmpty(authorizationRequestRepositoryRef)) {
|
||||
if (StringUtils.hasLength(authorizationRequestRepositoryRef)) {
|
||||
return new RuntimeBeanReference(authorizationRequestRepositoryRef);
|
||||
}
|
||||
return BeanDefinitionBuilder.rootBeanDefinition(
|
||||
|
@ -290,11 +290,11 @@ final class OAuth2LoginBeanDefinitionParser implements BeanDefinitionParser {
|
|||
BeanDefinitionBuilder oidcAuthProviderBuilder = BeanDefinitionBuilder.rootBeanDefinition(
|
||||
"org.springframework.security.oauth2.client.oidc.authentication.OidcAuthorizationCodeAuthenticationProvider")
|
||||
.addConstructorArgValue(accessTokenResponseClient).addConstructorArgValue(oidcUserService);
|
||||
if (!StringUtils.isEmpty(userAuthoritiesMapperRef)) {
|
||||
if (StringUtils.hasLength(userAuthoritiesMapperRef)) {
|
||||
oidcAuthProviderBuilder.addPropertyReference("authoritiesMapper", userAuthoritiesMapperRef);
|
||||
}
|
||||
String jwtDecoderFactoryRef = element.getAttribute(ATT_JWT_DECODER_FACTORY_REF);
|
||||
if (!StringUtils.isEmpty(jwtDecoderFactoryRef)) {
|
||||
if (StringUtils.hasLength(jwtDecoderFactoryRef)) {
|
||||
oidcAuthProviderBuilder.addPropertyReference("jwtDecoderFactory", jwtDecoderFactoryRef);
|
||||
}
|
||||
return oidcAuthProviderBuilder.getBeanDefinition();
|
||||
|
@ -302,7 +302,7 @@ final class OAuth2LoginBeanDefinitionParser implements BeanDefinitionParser {
|
|||
|
||||
private BeanMetadataElement getOidcUserService(Element element) {
|
||||
String oidcUserServiceRef = element.getAttribute(ATT_OIDC_USER_SERVICE_REF);
|
||||
if (!StringUtils.isEmpty(oidcUserServiceRef)) {
|
||||
if (StringUtils.hasLength(oidcUserServiceRef)) {
|
||||
return new RuntimeBeanReference(oidcUserServiceRef);
|
||||
}
|
||||
return BeanDefinitionBuilder
|
||||
|
@ -312,7 +312,7 @@ final class OAuth2LoginBeanDefinitionParser implements BeanDefinitionParser {
|
|||
|
||||
private BeanMetadataElement getOAuth2UserService(Element element) {
|
||||
String oauth2UserServiceRef = element.getAttribute(ATT_USER_SERVICE_REF);
|
||||
if (!StringUtils.isEmpty(oauth2UserServiceRef)) {
|
||||
if (StringUtils.hasLength(oauth2UserServiceRef)) {
|
||||
return new RuntimeBeanReference(oauth2UserServiceRef);
|
||||
}
|
||||
return BeanDefinitionBuilder
|
||||
|
@ -322,7 +322,7 @@ final class OAuth2LoginBeanDefinitionParser implements BeanDefinitionParser {
|
|||
|
||||
private BeanMetadataElement getAccessTokenResponseClient(Element element) {
|
||||
String accessTokenResponseClientRef = element.getAttribute(ATT_ACCESS_TOKEN_RESPONSE_CLIENT_REF);
|
||||
if (!StringUtils.isEmpty(accessTokenResponseClientRef)) {
|
||||
if (StringUtils.hasLength(accessTokenResponseClientRef)) {
|
||||
return new RuntimeBeanReference(accessTokenResponseClientRef);
|
||||
}
|
||||
return BeanDefinitionBuilder.rootBeanDefinition(
|
||||
|
|
|
@ -165,7 +165,7 @@ final class OAuth2ResourceServerBeanDefinitionParser implements BeanDefinitionPa
|
|||
|
||||
BeanMetadataElement getAuthenticationManagerResolver(Element element) {
|
||||
String authenticationManagerResolverRef = element.getAttribute(AUTHENTICATION_MANAGER_RESOLVER_REF);
|
||||
if (!StringUtils.isEmpty(authenticationManagerResolverRef)) {
|
||||
if (StringUtils.hasLength(authenticationManagerResolverRef)) {
|
||||
return new RuntimeBeanReference(authenticationManagerResolverRef);
|
||||
}
|
||||
BeanDefinitionBuilder authenticationManagerResolver = BeanDefinitionBuilder
|
||||
|
@ -176,7 +176,7 @@ final class OAuth2ResourceServerBeanDefinitionParser implements BeanDefinitionPa
|
|||
|
||||
BeanMetadataElement getBearerTokenResolver(Element element) {
|
||||
String bearerTokenResolverRef = element.getAttribute(BEARER_TOKEN_RESOLVER_REF);
|
||||
if (StringUtils.isEmpty(bearerTokenResolverRef)) {
|
||||
if (!StringUtils.hasLength(bearerTokenResolverRef)) {
|
||||
return new RootBeanDefinition(DefaultBearerTokenResolver.class);
|
||||
}
|
||||
return new RuntimeBeanReference(bearerTokenResolverRef);
|
||||
|
@ -184,7 +184,7 @@ final class OAuth2ResourceServerBeanDefinitionParser implements BeanDefinitionPa
|
|||
|
||||
BeanMetadataElement getEntryPoint(Element element) {
|
||||
String entryPointRef = element.getAttribute(ENTRY_POINT_REF);
|
||||
if (StringUtils.isEmpty(entryPointRef)) {
|
||||
if (!StringUtils.hasLength(entryPointRef)) {
|
||||
return this.authenticationEntryPoint;
|
||||
}
|
||||
return new RuntimeBeanReference(entryPointRef);
|
||||
|
@ -223,7 +223,7 @@ final class OAuth2ResourceServerBeanDefinitionParser implements BeanDefinitionPa
|
|||
|
||||
Object getDecoder(Element element) {
|
||||
String decoderRef = element.getAttribute(DECODER_REF);
|
||||
if (!StringUtils.isEmpty(decoderRef)) {
|
||||
if (StringUtils.hasLength(decoderRef)) {
|
||||
return new RuntimeBeanReference(decoderRef);
|
||||
}
|
||||
BeanDefinitionBuilder builder = BeanDefinitionBuilder
|
||||
|
@ -234,7 +234,7 @@ final class OAuth2ResourceServerBeanDefinitionParser implements BeanDefinitionPa
|
|||
|
||||
Object getJwtAuthenticationConverter(Element element) {
|
||||
String jwtDecoderRef = element.getAttribute(JWT_AUTHENTICATION_CONVERTER_REF);
|
||||
return (!StringUtils.isEmpty(jwtDecoderRef)) ? new RuntimeBeanReference(jwtDecoderRef)
|
||||
return (StringUtils.hasLength(jwtDecoderRef)) ? new RuntimeBeanReference(jwtDecoderRef)
|
||||
: new JwtAuthenticationConverter();
|
||||
}
|
||||
|
||||
|
@ -291,7 +291,7 @@ final class OAuth2ResourceServerBeanDefinitionParser implements BeanDefinitionPa
|
|||
|
||||
BeanMetadataElement getIntrospector(Element element) {
|
||||
String introspectorRef = element.getAttribute(INTROSPECTOR_REF);
|
||||
if (!StringUtils.isEmpty(introspectorRef)) {
|
||||
if (StringUtils.hasLength(introspectorRef)) {
|
||||
return new RuntimeBeanReference(introspectorRef);
|
||||
}
|
||||
String introspectionUri = element.getAttribute(INTROSPECTION_URI);
|
||||
|
|
|
@ -170,7 +170,7 @@ public final class ClientRegistrationsBeanDefinitionParser implements BeanDefini
|
|||
if (providers.containsKey(providerId)) {
|
||||
Map<String, String> provider = providers.get(providerId);
|
||||
String issuer = provider.get(ATT_ISSUER_URI);
|
||||
if (!StringUtils.isEmpty(issuer)) {
|
||||
if (StringUtils.hasLength(issuer)) {
|
||||
ClientRegistration.Builder builder = ClientRegistrations.fromIssuerLocation(issuer)
|
||||
.registrationId(registrationId);
|
||||
return getBuilder(parserContext, builder, provider);
|
||||
|
|
|
@ -179,7 +179,7 @@ public class SpringSecurityXsdParser {
|
|||
*/
|
||||
private Element elmt(XmlNode n) {
|
||||
String name = n.attribute("ref");
|
||||
if (StringUtils.isEmpty(name)) {
|
||||
if (!StringUtils.hasLength(name)) {
|
||||
name = n.attribute("name");
|
||||
}
|
||||
else {
|
||||
|
@ -199,7 +199,7 @@ public class SpringSecurityXsdParser {
|
|||
e.getAttrs().forEach((attr) -> attr.setElmt(e));
|
||||
e.getChildElmts().values().forEach((element) -> element.getParentElmts().put(e.getName(), e));
|
||||
String subGrpName = n.attribute("substitutionGroup");
|
||||
if (!StringUtils.isEmpty(subGrpName)) {
|
||||
if (StringUtils.hasLength(subGrpName)) {
|
||||
Element subGrp = elmt(findNode(n, subGrpName.split(":")[1]));
|
||||
subGrp.getSubGrps().add(e);
|
||||
}
|
||||
|
|
|
@ -127,7 +127,7 @@ public final class SecurityJackson2Modules {
|
|||
Class<? extends Module> securityModule = (Class<? extends Module>) ClassUtils.forName(className, loader);
|
||||
if (securityModule != null) {
|
||||
logger.debug(LogMessage.format("Loaded module %s, now registering", className));
|
||||
return securityModule.newInstance();
|
||||
return securityModule.getConstructor().newInstance();
|
||||
}
|
||||
}
|
||||
catch (Exception ex) {
|
||||
|
|
|
@ -145,7 +145,7 @@ public class JdbcUserDetailsManagerTests {
|
|||
AuthorityUtils.createAuthorityList("A", "B"));
|
||||
this.manager.createUser(user);
|
||||
UserDetails user2 = this.manager.loadUserByUsername(user.getUsername());
|
||||
assertThat(user2).isEqualToComparingFieldByField(user);
|
||||
assertThat(user2).usingRecursiveComparison().isEqualTo(user);
|
||||
}
|
||||
|
||||
@Test
|
||||
|
@ -176,7 +176,7 @@ public class JdbcUserDetailsManagerTests {
|
|||
AuthorityUtils.createAuthorityList("D", "F", "E"));
|
||||
this.manager.updateUser(newJoe);
|
||||
UserDetails joe = this.manager.loadUserByUsername(newJoe.getUsername());
|
||||
assertThat(joe).isEqualToComparingFieldByField(newJoe);
|
||||
assertThat(joe).usingRecursiveComparison().isEqualTo(newJoe);
|
||||
assertThat(this.cache.getUserMap().containsKey(newJoe.getUsername())).isFalse();
|
||||
}
|
||||
|
||||
|
|
|
@ -45,7 +45,7 @@ final class OidcUserRequestUtils {
|
|||
static boolean shouldRetrieveUserInfo(OidcUserRequest userRequest) {
|
||||
// Auto-disabled if UserInfo Endpoint URI is not provided
|
||||
ClientRegistration clientRegistration = userRequest.getClientRegistration();
|
||||
if (StringUtils.isEmpty(clientRegistration.getProviderDetails().getUserInfoEndpoint().getUri())) {
|
||||
if (!StringUtils.hasLength(clientRegistration.getProviderDetails().getUserInfoEndpoint().getUri())) {
|
||||
return false;
|
||||
}
|
||||
// The Claims requested by the profile, email, address, and phone scope values
|
||||
|
|
|
@ -157,7 +157,7 @@ public class OidcUserService implements OAuth2UserService<OidcUserRequest, OidcU
|
|||
private boolean shouldRetrieveUserInfo(OidcUserRequest userRequest) {
|
||||
// Auto-disabled if UserInfo Endpoint URI is not provided
|
||||
ProviderDetails providerDetails = userRequest.getClientRegistration().getProviderDetails();
|
||||
if (StringUtils.isEmpty(providerDetails.getUserInfoEndpoint().getUri())) {
|
||||
if (!StringUtils.hasLength(providerDetails.getUserInfoEndpoint().getUri())) {
|
||||
return false;
|
||||
}
|
||||
// The Claims requested by the profile, email, address, and phone scope values
|
||||
|
|
|
@ -189,7 +189,7 @@ public class DefaultReactiveOAuth2UserService implements ReactiveOAuth2UserServi
|
|||
|
||||
private static Mono<UserInfoErrorResponse> parse(ClientResponse httpResponse) {
|
||||
String wwwAuth = httpResponse.headers().asHttpHeaders().getFirst(HttpHeaders.WWW_AUTHENTICATE);
|
||||
if (!StringUtils.isEmpty(wwwAuth)) {
|
||||
if (StringUtils.hasLength(wwwAuth)) {
|
||||
// Bearer token error?
|
||||
return Mono.fromCallable(() -> UserInfoErrorResponse.parse(wwwAuth));
|
||||
}
|
||||
|
|
|
@ -238,10 +238,10 @@ public class OAuth2AuthorizationCodeGrantFilter extends OncePerRequestFilter {
|
|||
OAuth2Error error = ex.getError();
|
||||
UriComponentsBuilder uriBuilder = UriComponentsBuilder.fromUriString(authorizationRequest.getRedirectUri())
|
||||
.queryParam(OAuth2ParameterNames.ERROR, error.getErrorCode());
|
||||
if (!StringUtils.isEmpty(error.getDescription())) {
|
||||
if (StringUtils.hasLength(error.getDescription())) {
|
||||
uriBuilder.queryParam(OAuth2ParameterNames.ERROR_DESCRIPTION, error.getDescription());
|
||||
}
|
||||
if (!StringUtils.isEmpty(error.getUri())) {
|
||||
if (StringUtils.hasLength(error.getUri())) {
|
||||
uriBuilder.queryParam(OAuth2ParameterNames.ERROR_URI, error.getUri());
|
||||
}
|
||||
this.redirectStrategy.sendRedirect(request, response, uriBuilder.build().encode().toString());
|
||||
|
|
|
@ -111,7 +111,7 @@ public final class OAuth2AuthorizedClientArgumentResolver implements HandlerMeth
|
|||
public Object resolveArgument(MethodParameter parameter, @Nullable ModelAndViewContainer mavContainer,
|
||||
NativeWebRequest webRequest, @Nullable WebDataBinderFactory binderFactory) {
|
||||
String clientRegistrationId = this.resolveClientRegistrationId(parameter);
|
||||
if (StringUtils.isEmpty(clientRegistrationId)) {
|
||||
if (!StringUtils.hasLength(clientRegistrationId)) {
|
||||
throw new IllegalArgumentException("Unable to resolve the Client Registration Identifier. "
|
||||
+ "It must be provided via @RegisteredOAuth2AuthorizedClient(\"client1\") or "
|
||||
+ "@RegisteredOAuth2AuthorizedClient(registrationId = \"client1\").");
|
||||
|
@ -137,10 +137,10 @@ public final class OAuth2AuthorizedClientArgumentResolver implements HandlerMeth
|
|||
RegisteredOAuth2AuthorizedClient authorizedClientAnnotation = AnnotatedElementUtils
|
||||
.findMergedAnnotation(parameter.getParameter(), RegisteredOAuth2AuthorizedClient.class);
|
||||
Authentication principal = this.securityContextHolderStrategy.getContext().getAuthentication();
|
||||
if (!StringUtils.isEmpty(authorizedClientAnnotation.registrationId())) {
|
||||
if (StringUtils.hasLength(authorizedClientAnnotation.registrationId())) {
|
||||
return authorizedClientAnnotation.registrationId();
|
||||
}
|
||||
if (!StringUtils.isEmpty(authorizedClientAnnotation.value())) {
|
||||
if (StringUtils.hasLength(authorizedClientAnnotation.value())) {
|
||||
return authorizedClientAnnotation.value();
|
||||
}
|
||||
if (principal != null && OAuth2AuthenticationToken.class.isAssignableFrom(principal.getClass())) {
|
||||
|
|
|
@ -537,7 +537,7 @@ public final class ServerOAuth2AuthorizedClientExchangeFilterFunction implements
|
|||
private Map<String, String> parseAuthParameters(String wwwAuthenticateHeader) {
|
||||
// @formatter:off
|
||||
return Stream.of(wwwAuthenticateHeader)
|
||||
.filter((header) -> !StringUtils.isEmpty(header))
|
||||
.filter((header) -> StringUtils.hasLength(header))
|
||||
.filter((header) -> header.toLowerCase().startsWith("bearer"))
|
||||
.map((header) -> header.substring("bearer".length()))
|
||||
.map((header) -> header.split(","))
|
||||
|
|
|
@ -652,7 +652,7 @@ public final class ServletOAuth2AuthorizedClientExchangeFilterFunction implement
|
|||
|
||||
private Map<String, String> parseAuthParameters(String wwwAuthenticateHeader) {
|
||||
// @formatter:off
|
||||
return Stream.of(wwwAuthenticateHeader).filter((header) -> !StringUtils.isEmpty(header))
|
||||
return Stream.of(wwwAuthenticateHeader).filter((header) -> StringUtils.hasLength(header))
|
||||
.filter((header) -> header.toLowerCase().startsWith("bearer"))
|
||||
.map((header) -> header.substring("bearer".length()))
|
||||
.map((header) -> header.split(","))
|
||||
|
|
|
@ -101,7 +101,7 @@ public class WebClientReactiveClientCredentialsTokenResponseClientTests {
|
|||
this.clientRegistration.build());
|
||||
OAuth2AccessTokenResponse response = this.client.getTokenResponse(request).block();
|
||||
RecordedRequest actualRequest = this.server.takeRequest();
|
||||
String body = actualRequest.getUtf8Body();
|
||||
String body = actualRequest.getBody().readUtf8();
|
||||
assertThat(response.getAccessToken()).isNotNull();
|
||||
assertThat(response.getAccessToken().getScopes()).containsExactly("create");
|
||||
assertThat(actualRequest.getHeader(HttpHeaders.AUTHORIZATION))
|
||||
|
@ -155,7 +155,7 @@ public class WebClientReactiveClientCredentialsTokenResponseClientTests {
|
|||
OAuth2ClientCredentialsGrantRequest request = new OAuth2ClientCredentialsGrantRequest(registration);
|
||||
OAuth2AccessTokenResponse response = this.client.getTokenResponse(request).block();
|
||||
RecordedRequest actualRequest = this.server.takeRequest();
|
||||
String body = actualRequest.getUtf8Body();
|
||||
String body = actualRequest.getBody().readUtf8();
|
||||
assertThat(response.getAccessToken()).isNotNull();
|
||||
assertThat(response.getAccessToken().getScopes()).containsExactly("create");
|
||||
assertThat(actualRequest.getHeader(HttpHeaders.AUTHORIZATION)).isNull();
|
||||
|
|
|
@ -229,7 +229,7 @@ public class OAuth2AuthenticationTokenMixinTests {
|
|||
String authoritiesJson = (oidcUserAuthority != null) ? asJson(oidcUserAuthority)
|
||||
: (oauth2UserAuthority != null) ? asJson(oauth2UserAuthority) : "";
|
||||
if (!simpleAuthorities.isEmpty()) {
|
||||
if (!StringUtils.isEmpty(authoritiesJson)) {
|
||||
if (StringUtils.hasLength(authoritiesJson)) {
|
||||
authoritiesJson += ",";
|
||||
}
|
||||
authoritiesJson += asJson(simpleAuthorities);
|
||||
|
|
|
@ -194,7 +194,7 @@ public final class NimbusJwtDecoder implements JwtDecoder {
|
|||
|
||||
private String getJwtValidationExceptionMessage(Collection<OAuth2Error> errors) {
|
||||
for (OAuth2Error oAuth2Error : errors) {
|
||||
if (!StringUtils.isEmpty(oAuth2Error.getDescription())) {
|
||||
if (StringUtils.hasLength(oAuth2Error.getDescription())) {
|
||||
return String.format(DECODING_ERROR_MESSAGE_TEMPLATE, oAuth2Error.getDescription());
|
||||
}
|
||||
}
|
||||
|
@ -473,7 +473,7 @@ public final class NimbusJwtDecoder implements JwtDecoder {
|
|||
HttpHeaders headers = new HttpHeaders();
|
||||
headers.setAccept(Arrays.asList(MediaType.APPLICATION_JSON, APPLICATION_JWK_SET_JSON));
|
||||
ResponseEntity<String> response = getResponse(url, headers);
|
||||
if (response.getStatusCodeValue() != 200) {
|
||||
if (response.getStatusCode().value() != 200) {
|
||||
throw new IOException(response.toString());
|
||||
}
|
||||
return new Resource(response.getBody(), "UTF-8");
|
||||
|
|
|
@ -203,7 +203,7 @@ public final class NimbusReactiveJwtDecoder implements ReactiveJwtDecoder {
|
|||
|
||||
private String getJwtValidationExceptionMessage(Collection<OAuth2Error> errors) {
|
||||
for (OAuth2Error oAuth2Error : errors) {
|
||||
if (!StringUtils.isEmpty(oAuth2Error.getDescription())) {
|
||||
if (StringUtils.hasLength(oAuth2Error.getDescription())) {
|
||||
return oAuth2Error.getDescription();
|
||||
}
|
||||
}
|
||||
|
|
|
@ -177,7 +177,7 @@ public class NimbusOpaqueTokenIntrospector implements OpaqueTokenIntrospector {
|
|||
+ contentType + "' is not compatible with JSON");
|
||||
}
|
||||
|
||||
HTTPResponse response = new HTTPResponse(responseEntity.getStatusCodeValue());
|
||||
HTTPResponse response = new HTTPResponse(responseEntity.getStatusCode().value());
|
||||
response.setHeader(HttpHeaders.CONTENT_TYPE, contentType.toString());
|
||||
response.setContent(responseEntity.getBody());
|
||||
|
||||
|
|
|
@ -89,8 +89,8 @@ public class AuthenticationPayloadInterceptorTests {
|
|||
interceptor.intercept(exchange, authenticationPayloadChain).block();
|
||||
Authentication authentication = authenticationPayloadChain.getAuthentication();
|
||||
verify(this.authenticationManager).authenticate(this.authenticationArg.capture());
|
||||
assertThat(this.authenticationArg.getValue()).isEqualToComparingFieldByField(
|
||||
UsernamePasswordAuthenticationToken.unauthenticated("user", "password"));
|
||||
assertThat(this.authenticationArg.getValue()).usingRecursiveComparison()
|
||||
.isEqualTo(UsernamePasswordAuthenticationToken.unauthenticated("user", "password"));
|
||||
assertThat(authentication).isEqualTo(expectedAuthentication);
|
||||
}
|
||||
|
||||
|
|
|
@ -45,7 +45,7 @@ public class BasicAuthenticationDecoderTests {
|
|||
DataBuffer dataBuffer = encoder.encodeValue(expectedCredentials, factory, elementType, mimeType, hints);
|
||||
UsernamePasswordMetadata actualCredentials = decoder
|
||||
.decodeToMono(Mono.just(dataBuffer), elementType, mimeType, hints).block();
|
||||
assertThat(actualCredentials).isEqualToComparingFieldByField(expectedCredentials);
|
||||
assertThat(actualCredentials).usingRecursiveComparison().isEqualTo(expectedCredentials);
|
||||
}
|
||||
|
||||
}
|
||||
|
|
|
@ -146,7 +146,7 @@ public class FilterInvocation {
|
|||
|
||||
@Override
|
||||
public String toString() {
|
||||
if (StringUtils.isEmpty(this.request.getMethod())) {
|
||||
if (!StringUtils.hasLength(this.request.getMethod())) {
|
||||
return "filter invocation [" + getRequestUrl() + "]";
|
||||
}
|
||||
else {
|
||||
|
|
|
@ -122,7 +122,7 @@ public class CookieRequestCache implements RequestCache {
|
|||
|
||||
private static String getCookiePath(HttpServletRequest request) {
|
||||
String contextPath = request.getContextPath();
|
||||
return (!StringUtils.isEmpty(contextPath)) ? contextPath : "/";
|
||||
return (StringUtils.hasLength(contextPath)) ? contextPath : "/";
|
||||
}
|
||||
|
||||
private boolean matchesSavedRequest(HttpServletRequest request, SavedRequest savedRequest) {
|
||||
|
|
Loading…
Reference in New Issue