the {@link UserDetailsServiceConfigurer} (or this)
* @param the type of UserDetailsService being used to allow for returning the
* concrete UserDetailsService.
*/
diff --git a/config/src/main/java/org/springframework/security/config/annotation/method/configuration/EnableGlobalMethodSecurity.java b/config/src/main/java/org/springframework/security/config/annotation/method/configuration/EnableGlobalMethodSecurity.java
index d76d289497..defd6bde07 100644
--- a/config/src/main/java/org/springframework/security/config/annotation/method/configuration/EnableGlobalMethodSecurity.java
+++ b/config/src/main/java/org/springframework/security/config/annotation/method/configuration/EnableGlobalMethodSecurity.java
@@ -29,9 +29,8 @@ import org.springframework.security.config.annotation.configuration.ObjectPostPr
/**
*
- * Enables Spring Security global method security similar to the
+ * Enables Spring Security global method security similar to the <global-method-security>
* xml support.
- *
*
*
* More advanced configurations may wish to extend
diff --git a/config/src/main/java/org/springframework/security/config/annotation/web/HttpSecurityBuilder.java b/config/src/main/java/org/springframework/security/config/annotation/web/HttpSecurityBuilder.java
index b36e3379ef..df730416f9 100644
--- a/config/src/main/java/org/springframework/security/config/annotation/web/HttpSecurityBuilder.java
+++ b/config/src/main/java/org/springframework/security/config/annotation/web/HttpSecurityBuilder.java
@@ -142,11 +142,11 @@ public interface HttpSecurityBuilder> extends
* {@link LogoutFilter}
* {@link X509AuthenticationFilter}
* {@link AbstractPreAuthenticatedProcessingFilter}
- * {@link org.springframework.security.cas.web.CasAuthenticationFilter}
+ * CasAuthenticationFilter
* {@link UsernamePasswordAuthenticationFilter}
* {@link ConcurrentSessionFilter}
* {@link OpenIDAuthenticationFilter}
- * {@link DefaultLoginPageGeneratingFilter}
+ * {@link org.springframework.security.web.authentication.ui.DefaultLoginPageGeneratingFilter}
* {@link ConcurrentSessionFilter}
* {@link DigestAuthenticationFilter}
* {@link BasicAuthenticationFilter}
diff --git a/config/src/main/java/org/springframework/security/config/annotation/web/builders/HttpSecurity.java b/config/src/main/java/org/springframework/security/config/annotation/web/builders/HttpSecurity.java
index d387d25874..8fc3eeadfc 100644
--- a/config/src/main/java/org/springframework/security/config/annotation/web/builders/HttpSecurity.java
+++ b/config/src/main/java/org/springframework/security/config/annotation/web/builders/HttpSecurity.java
@@ -71,7 +71,7 @@ import org.springframework.security.web.util.matcher.RequestMatcher;
import org.springframework.util.Assert;
/**
- * A {@link HttpSecurity} is similar to Spring Security's XML element in the
+ * A {@link HttpSecurity} is similar to Spring Security's XML <http> element in the
* namespace configuration. It allows configuring web based security for specific http
* requests. By default it will be applied to all requests, but can be restricted using
* {@link #requestMatcher(RequestMatcher)} or other similar methods.
@@ -283,7 +283,7 @@ public final class HttpSecurity extends
*
* @return
* @throws Exception
- * @see {@link HeadersConfigurer}
+ * @see HeadersConfigurer
*/
public HeadersConfigurer headers() throws Exception {
return getOrApply(new HeadersConfigurer());
@@ -326,8 +326,8 @@ public final class HttpSecurity extends
*
*
* <listener>
- * <listener-class>org.springframework.security.web.session.HttpSessionEventPublisher</listener-class>
- * </listener>
+ * <listener-class>org.springframework.security.web.session.HttpSessionEventPublisher</listener-class>
+ * </listener>
*
*
* Alternatively,
@@ -378,7 +378,7 @@ public final class HttpSecurity extends
*
* @return the {@link PortMapperConfigurer} for further customizations
* @throws Exception
- * @see {@link #requiresChannel()}
+ * @see #requiresChannel()
*/
public PortMapperConfigurer portMapper() throws Exception {
return getOrApply(new PortMapperConfigurer());
@@ -716,7 +716,7 @@ public final class HttpSecurity extends
* {@link org.springframework.security.authentication.AnonymousAuthenticationToken}
* and contain the role "ROLE_ANONYMOUS".
*
- * Example Configuration
Example Configuration
*
* The following configuration demonstrates how to specify that anonymous users should
* contain the role "ROLE_ANON" instead.
@@ -908,6 +908,10 @@ public final class HttpSecurity extends
return getOrApply(new HttpBasicConfigurer());
}
+ public void setSharedObject(Class sharedType, C object) {
+ super.setSharedObject(sharedType, object);
+ }
+
@Override
protected void beforeConfigure() throws Exception {
setSharedObject(AuthenticationManager.class, getAuthenticationRegistry().build());
diff --git a/config/src/main/java/org/springframework/security/config/annotation/web/configuration/WebMvcSecurityConfiguration.java b/config/src/main/java/org/springframework/security/config/annotation/web/configuration/WebMvcSecurityConfiguration.java
index 97abb5c21f..b2dc796cca 100644
--- a/config/src/main/java/org/springframework/security/config/annotation/web/configuration/WebMvcSecurityConfiguration.java
+++ b/config/src/main/java/org/springframework/security/config/annotation/web/configuration/WebMvcSecurityConfiguration.java
@@ -29,7 +29,7 @@ import java.util.List;
/**
* Used to add a {@link RequestDataValueProcessor} for Spring MVC and Spring Security CSRF
* integration. This configuration is added whenever {@link EnableWebMvc} is added by
- * {@link SpringWebMvcImportSelector} and the DispatcherServlet is present on the
+ * SpringWebMvcImportSelector and the DispatcherServlet is present on the
* classpath. It also adds the {@link AuthenticationPrincipalArgumentResolver} as a
* {@link HandlerMethodArgumentResolver}.
*
diff --git a/config/src/main/java/org/springframework/security/config/annotation/web/configuration/WebSecurityConfigurerAdapter.java b/config/src/main/java/org/springframework/security/config/annotation/web/configuration/WebSecurityConfigurerAdapter.java
index b2d9af370d..1f83cf7b54 100644
--- a/config/src/main/java/org/springframework/security/config/annotation/web/configuration/WebSecurityConfigurerAdapter.java
+++ b/config/src/main/java/org/springframework/security/config/annotation/web/configuration/WebSecurityConfigurerAdapter.java
@@ -262,7 +262,7 @@ public abstract class WebSecurityConfigurerAdapter implements
* {@link #userDetailsService()} instead
* @return
* @throws Exception
- * @see {@link #userDetailsService()}
+ * @see #userDetailsService()
*/
public UserDetailsService userDetailsServiceBean() throws Exception {
AuthenticationManagerBuilder globalAuthBuilder = context
@@ -273,7 +273,7 @@ public abstract class WebSecurityConfigurerAdapter implements
/**
* Allows modifying and accessing the {@link UserDetailsService} from
- * {@link #userDetailsServiceBean()()} without interacting with the
+ * {@link #userDetailsServiceBean()} without interacting with the
* {@link ApplicationContext}. Developers should override this method when changing
* the instance of {@link #userDetailsServiceBean()}.
*
diff --git a/config/src/main/java/org/springframework/security/config/annotation/web/configurers/AbstractAuthenticationFilterConfigurer.java b/config/src/main/java/org/springframework/security/config/annotation/web/configurers/AbstractAuthenticationFilterConfigurer.java
index a539364245..fca1b61e0c 100644
--- a/config/src/main/java/org/springframework/security/config/annotation/web/configurers/AbstractAuthenticationFilterConfigurer.java
+++ b/config/src/main/java/org/springframework/security/config/annotation/web/configurers/AbstractAuthenticationFilterConfigurer.java
@@ -178,8 +178,8 @@ public abstract class AbstractAuthenticationFilterConfigurer
*
- * {@link org.springframework.security.config.annotation.web.builders.HttpSecurity#getAuthenticationManager()}
+ * {@link AuthenticationManager}
*
*
*
@@ -115,7 +115,7 @@ abstract class AbstractInterceptUrlConfigurer>
* @param accessDeniedUrl the URL to the access denied page (i.e. /errors/401)
* @return the {@link ExceptionHandlingConfigurer} for further customization
* @see AccessDeniedHandlerImpl
- * @see {@link #accessDeniedHandler(org.springframework.security.web.access.AccessDeniedHandler)}
+ * @see #accessDeniedHandler(org.springframework.security.web.access.AccessDeniedHandler)
*/
public ExceptionHandlingConfigurer accessDeniedPage(String accessDeniedUrl) {
AccessDeniedHandlerImpl accessDeniedHandler = new AccessDeniedHandlerImpl();
diff --git a/config/src/main/java/org/springframework/security/config/annotation/web/configurers/ExpressionUrlAuthorizationConfigurer.java b/config/src/main/java/org/springframework/security/config/annotation/web/configurers/ExpressionUrlAuthorizationConfigurer.java
index cf9fc82a01..aedc77ef4d 100644
--- a/config/src/main/java/org/springframework/security/config/annotation/web/configurers/ExpressionUrlAuthorizationConfigurer.java
+++ b/config/src/main/java/org/springframework/security/config/annotation/web/configurers/ExpressionUrlAuthorizationConfigurer.java
@@ -70,7 +70,7 @@ import org.springframework.util.StringUtils;
*
* @author Rob Winch
* @since 3.2
- * @see {@link org.springframework.security.config.annotation.web.builders.HttpSecurity#authorizeRequests()}
+ * @see org.springframework.security.config.annotation.web.builders.HttpSecurity#authorizeRequests()
*/
public final class ExpressionUrlAuthorizationConfigurer>
extends
@@ -339,7 +339,7 @@ public final class ExpressionUrlAuthorizationConfigurer
- * {@link AuthenticationManager}
+ * {@link org.springframework.security.authentication.AuthenticationManager}
* {@link RememberMeServices} - is optionally used. See {@link RememberMeConfigurer}
* {@link SessionAuthenticationStrategy} - is optionally used. See
* {@link SessionManagementConfigurer}
diff --git a/config/src/main/java/org/springframework/security/config/annotation/web/configurers/HeadersConfigurer.java b/config/src/main/java/org/springframework/security/config/annotation/web/configurers/HeadersConfigurer.java
index 71402ad2be..9334b04259 100644
--- a/config/src/main/java/org/springframework/security/config/annotation/web/configurers/HeadersConfigurer.java
+++ b/config/src/main/java/org/springframework/security/config/annotation/web/configurers/HeadersConfigurer.java
@@ -186,7 +186,7 @@ public class HeadersConfigurer> extends
* X-XSS-Protection: 1
*
*
- * or if {@link #setBlock(boolean)} is true
+ * or if {@link XXssProtectionHeaderWriter#setBlock(boolean)} of the given {@link XXssProtectionHeaderWriter} is true
*
*
*
diff --git a/config/src/main/java/org/springframework/security/config/annotation/web/configurers/HttpBasicConfigurer.java b/config/src/main/java/org/springframework/security/config/annotation/web/configurers/HttpBasicConfigurer.java
index d6b5bcd1da..78d14308a5 100644
--- a/config/src/main/java/org/springframework/security/config/annotation/web/configurers/HttpBasicConfigurer.java
+++ b/config/src/main/java/org/springframework/security/config/annotation/web/configurers/HttpBasicConfigurer.java
@@ -83,7 +83,7 @@ public final class HttpBasicConfigurer> extends
/**
* Creates a new instance
* @throws Exception
- * @see {@link HttpSecurity#httpBasic()}
+ * @see HttpSecurity#httpBasic()
*/
public HttpBasicConfigurer() throws Exception {
realmName(DEFAULT_REALM);
diff --git a/config/src/main/java/org/springframework/security/config/annotation/web/configurers/JeeConfigurer.java b/config/src/main/java/org/springframework/security/config/annotation/web/configurers/JeeConfigurer.java
index 09a2a3ccf6..e0119e89e8 100644
--- a/config/src/main/java/org/springframework/security/config/annotation/web/configurers/JeeConfigurer.java
+++ b/config/src/main/java/org/springframework/security/config/annotation/web/configurers/JeeConfigurer.java
@@ -187,7 +187,7 @@ public final class JeeConfigurer> extends
* Populates a {@link PreAuthenticatedAuthenticationProvider} into
* {@link HttpSecurity#authenticationProvider(org.springframework.security.authentication.AuthenticationProvider)}
* and a {@link Http403ForbiddenEntryPoint} into
- * {@link HttpSecurity#authenticationEntryPoint(org.springframework.security.web.AuthenticationEntryPoint)}
+ * {@link HttpSecurityBuilder#setSharedObject(Class, Object)}
*
* @see org.springframework.security.config.annotation.SecurityConfigurerAdapter#init(org.springframework.security.config.annotation.SecurityBuilder)
*/
diff --git a/config/src/main/java/org/springframework/security/config/annotation/web/configurers/LogoutConfigurer.java b/config/src/main/java/org/springframework/security/config/annotation/web/configurers/LogoutConfigurer.java
index 49e16260b8..cf73917b0b 100644
--- a/config/src/main/java/org/springframework/security/config/annotation/web/configurers/LogoutConfigurer.java
+++ b/config/src/main/java/org/springframework/security/config/annotation/web/configurers/LogoutConfigurer.java
@@ -35,7 +35,7 @@ import org.springframework.security.web.util.matcher.RequestMatcher;
/**
* Adds logout support. Other {@link SecurityConfigurer} instances may invoke
- * {@link #addLogoutHandler(LogoutHandler)} in the {@link #init(HttpSecurity)} phase.
+ * {@link #addLogoutHandler(LogoutHandler)} in the {@link #init(HttpSecurityBuilder)} phase.
*
* Security Filters
*
diff --git a/config/src/main/java/org/springframework/security/config/annotation/web/configurers/openid/OpenIDLoginConfigurer.java b/config/src/main/java/org/springframework/security/config/annotation/web/configurers/openid/OpenIDLoginConfigurer.java
index f9fe860f31..cf1f8eec98 100644
--- a/config/src/main/java/org/springframework/security/config/annotation/web/configurers/openid/OpenIDLoginConfigurer.java
+++ b/config/src/main/java/org/springframework/security/config/annotation/web/configurers/openid/OpenIDLoginConfigurer.java
@@ -199,7 +199,7 @@ public final class OpenIDLoginConfigurer>
* {@link HttpServletRequest} matches this URL the {@link OpenIDAuthenticationFilter}
* will attempt to authenticate the request. The default is "/login/openid".
*
- * @param loginUrl the URL used to perform authentication
+ * @param loginProcessingUrl the URL used to perform authentication
* @return the {@link OpenIDLoginConfigurer} for additional customization
*/
public OpenIDLoginConfigurer loginProcessingUrl(String loginProcessingUrl) {
diff --git a/config/src/main/java/org/springframework/security/config/annotation/web/messaging/MessageSecurityMetadataSourceRegistry.java b/config/src/main/java/org/springframework/security/config/annotation/web/messaging/MessageSecurityMetadataSourceRegistry.java
index 4bf9de75a3..4bdcd67bc6 100644
--- a/config/src/main/java/org/springframework/security/config/annotation/web/messaging/MessageSecurityMetadataSourceRegistry.java
+++ b/config/src/main/java/org/springframework/security/config/annotation/web/messaging/MessageSecurityMetadataSourceRegistry.java
@@ -105,7 +105,7 @@ public class MessageSecurityMetadataSourceRegistry {
* {@link MessageSecurityMetadataSourceRegistry#simpDestPathMatcher(PathMatcher)} .
*
* @return the {@link Constraint} that is associated to the {@link MessageMatcher}
- * @see {@link MessageSecurityMetadataSourceRegistry#simpDestPathMatcher(PathMatcher)}
+ * @see MessageSecurityMetadataSourceRegistry#simpDestPathMatcher(PathMatcher)
*/
public Constraint simpDestMatchers(String... patterns) {
return simpDestMatchers(null, patterns);
@@ -122,7 +122,7 @@ public class MessageSecurityMetadataSourceRegistry {
* {@link MessageSecurityMetadataSourceRegistry#simpDestPathMatcher(PathMatcher)}.
*
* @return the {@link Constraint} that is associated to the {@link MessageMatcher}
- * @see {@link MessageSecurityMetadataSourceRegistry#simpDestPathMatcher(PathMatcher)}
+ * @see MessageSecurityMetadataSourceRegistry#simpDestPathMatcher(PathMatcher)
*/
public Constraint simpMessageDestMatchers(String... patterns) {
return simpDestMatchers(SimpMessageType.MESSAGE, patterns);
@@ -139,7 +139,7 @@ public class MessageSecurityMetadataSourceRegistry {
* {@link MessageSecurityMetadataSourceRegistry#simpDestPathMatcher(PathMatcher)}.
*
* @return the {@link Constraint} that is associated to the {@link MessageMatcher}
- * @see {@link MessageSecurityMetadataSourceRegistry#simpDestPathMatcher(PathMatcher)}
+ * @see MessageSecurityMetadataSourceRegistry#simpDestPathMatcher(PathMatcher)
*/
public Constraint simpSubscribeDestMatchers(String... patterns) {
return simpDestMatchers(SimpMessageType.SUBSCRIBE, patterns);
@@ -353,7 +353,7 @@ public class MessageSecurityMetadataSourceRegistry {
*
* @return the {@link MessageSecurityMetadataSourceRegistry} for further
* customization
- * @see {@link RememberMeConfigurer}
+ * @see RememberMeConfigurer
*/
public MessageSecurityMetadataSourceRegistry rememberMe() {
return access(rememberMe);
@@ -385,7 +385,7 @@ public class MessageSecurityMetadataSourceRegistry {
*
* @return the {@link MessageSecurityMetadataSourceRegistry} for further
* customization
- * @see {@link RememberMeConfigurer}
+ * @see RememberMeConfigurer
*/
public MessageSecurityMetadataSourceRegistry fullyAuthenticated() {
return access(fullyAuthenticated);
diff --git a/config/src/main/java/org/springframework/security/config/annotation/web/servlet/configuration/WebMvcSecurityConfiguration.java b/config/src/main/java/org/springframework/security/config/annotation/web/servlet/configuration/WebMvcSecurityConfiguration.java
index 84084634a3..e50b5f284a 100644
--- a/config/src/main/java/org/springframework/security/config/annotation/web/servlet/configuration/WebMvcSecurityConfiguration.java
+++ b/config/src/main/java/org/springframework/security/config/annotation/web/servlet/configuration/WebMvcSecurityConfiguration.java
@@ -30,7 +30,7 @@ import org.springframework.web.servlet.support.RequestDataValueProcessor;
/**
* Used to add a {@link RequestDataValueProcessor} for Spring MVC and Spring Security CSRF
* integration. This configuration is added whenever {@link EnableWebMvc} is added by
- * {@link SpringWebMvcImportSelector} and the DispatcherServlet is present on the
+ * SpringWebMvcImportSelector and the DispatcherServlet is present on the
* classpath. It also adds the {@link AuthenticationPrincipalArgumentResolver} as a
* {@link HandlerMethodArgumentResolver}.
*
diff --git a/config/src/main/java/org/springframework/security/config/authentication/PasswordEncoderParser.java b/config/src/main/java/org/springframework/security/config/authentication/PasswordEncoderParser.java
index 21ba9a483a..3682c68d5e 100644
--- a/config/src/main/java/org/springframework/security/config/authentication/PasswordEncoderParser.java
+++ b/config/src/main/java/org/springframework/security/config/authentication/PasswordEncoderParser.java
@@ -25,7 +25,7 @@ import org.springframework.util.xml.DomUtils;
import org.w3c.dom.Element;
/**
- * Stateful parser for the element.
+ * Stateful parser for the <password-encoder> element.
*
* Will produce a PasswordEncoder and (optionally) a SaltSource.
*
diff --git a/core/src/main/java/org/springframework/security/access/expression/SecurityExpressionOperations.java b/core/src/main/java/org/springframework/security/access/expression/SecurityExpressionOperations.java
index fb2c48747b..f6c2da0973 100644
--- a/core/src/main/java/org/springframework/security/access/expression/SecurityExpressionOperations.java
+++ b/core/src/main/java/org/springframework/security/access/expression/SecurityExpressionOperations.java
@@ -45,7 +45,7 @@ public interface SecurityExpressionOperations {
* is converted may depend on the implementation settings.
*
*
- * @param authority the authority to test (i.e. "USER")
+ * @param role the authority to test (i.e. "USER")
* @return true if the authority is found, else false
*/
boolean hasRole(String role);
@@ -62,7 +62,7 @@ public interface SecurityExpressionOperations {
* is converted may depend on the implementation settings.
*
*
- * @param authorities the authorities to test (i.e. "USER", "ADMIN")
+ * @param roles the authorities to test (i.e. "USER", "ADMIN")
* @return true if any of the authorities is found, else false
*/
boolean hasAnyRole(String... roles);
diff --git a/core/src/main/java/org/springframework/security/access/expression/method/DefaultMethodSecurityExpressionHandler.java b/core/src/main/java/org/springframework/security/access/expression/method/DefaultMethodSecurityExpressionHandler.java
index e4bdc39248..eaed83bac8 100644
--- a/core/src/main/java/org/springframework/security/access/expression/method/DefaultMethodSecurityExpressionHandler.java
+++ b/core/src/main/java/org/springframework/security/access/expression/method/DefaultMethodSecurityExpressionHandler.java
@@ -195,8 +195,8 @@ public class DefaultMethodSecurityExpressionHandler extends
/**
*
- * Sets the default prefix to be added to {@link #hasAnyRole(String...)} or
- * {@link #hasRole(String)}. For example, if hasRole("ADMIN") or hasRole("ROLE_ADMIN")
+ * Sets the default prefix to be added to {@link org.springframework.security.access.expression.SecurityExpressionRoot#hasAnyRole(String...)} or
+ * {@link org.springframework.security.access.expression.SecurityExpressionRoot#hasRole(String)}. For example, if hasRole("ADMIN") or hasRole("ROLE_ADMIN")
* is passed in, then the role ROLE_ADMIN will be used when the defaultRolePrefix is
* "ROLE_" (default).
*
diff --git a/core/src/main/java/org/springframework/security/access/hierarchicalroles/RoleHierarchy.java b/core/src/main/java/org/springframework/security/access/hierarchicalroles/RoleHierarchy.java
index bc538c4bad..dd31746921 100755
--- a/core/src/main/java/org/springframework/security/access/hierarchicalroles/RoleHierarchy.java
+++ b/core/src/main/java/org/springframework/security/access/hierarchicalroles/RoleHierarchy.java
@@ -32,7 +32,7 @@ public interface RoleHierarchy {
* that are (transitively) reachable from them in the role hierarchy.
*
* Example:
- * Role hierarchy: ROLE_A > ROLE_B and ROLE_B > ROLE_C.
+ * Role hierarchy: ROLE_A > ROLE_B and ROLE_B > ROLE_C.
* Directly assigned authority: ROLE_A.
* Reachable authorities: ROLE_A, ROLE_B, ROLE_C.
*
diff --git a/core/src/main/java/org/springframework/security/access/hierarchicalroles/RoleHierarchyImpl.java b/core/src/main/java/org/springframework/security/access/hierarchicalroles/RoleHierarchyImpl.java
index c04d1ca35c..cee1716a6a 100755
--- a/core/src/main/java/org/springframework/security/access/hierarchicalroles/RoleHierarchyImpl.java
+++ b/core/src/main/java/org/springframework/security/access/hierarchicalroles/RoleHierarchyImpl.java
@@ -27,7 +27,7 @@ import java.util.regex.Pattern;
/**
*
* This class defines a role hierarchy for use with the UserDetailsServiceWrapper.
- *
+ *
*
* Here is an example configuration of a role hierarchy (hint: read the ">" sign as
* "includes"):
@@ -41,19 +41,18 @@ import java.util.regex.Pattern;
* </value>
* </property>
*
- *
- *
+ *
*
* Explanation of the above:
* In effect every user with ROLE_A also has ROLE_B, ROLE_AUTHENTICATED and
* ROLE_UNAUTHENTICATED;
* every user with ROLE_B also has ROLE_AUTHENTICATED and ROLE_UNAUTHENTICATED;
* every user with ROLE_AUTHENTICATED also has ROLE_UNAUTHENTICATED.
- *
+ *
*
* Hierarchical Roles will dramatically shorten your access rules (and also make the
* access rules much more elegant).
- *
+ *
*
* Consider this access rule for Spring Security's RoleVoter (background: every user that
* is authenticated should be able to log out):
@@ -62,10 +61,8 @@ import java.util.regex.Pattern;
* /logout.html=ROLE_AUTHENTICATED
* In addition to shorter rules this will also make your access rules more readable and
* your intentions clearer.
- *
*
* @author Michael Mayr
- *
*/
public class RoleHierarchyImpl implements RoleHierarchy {
diff --git a/core/src/main/java/org/springframework/security/access/intercept/package-info.java b/core/src/main/java/org/springframework/security/access/intercept/package-info.java
index 43b81cdf64..d01283a80b 100644
--- a/core/src/main/java/org/springframework/security/access/intercept/package-info.java
+++ b/core/src/main/java/org/springframework/security/access/intercept/package-info.java
@@ -8,7 +8,7 @@
* security facilities provided for it by Spring Security.
* For example, one secure object would be MethodInvocation
,
* whilst another would be HTTP
- * {@link org.springframework.security.web.FilterInvocation}. Note these are
+ * {@code org.springframework.security.web.FilterInvocation}. Note these are
* infrastructure objects and their design allows them to represent a large
* variety of actual resources that might need to be secured, such as business
* objects or HTTP request URLs.
diff --git a/core/src/main/java/org/springframework/security/access/method/MapBasedMethodSecurityMetadataSource.java b/core/src/main/java/org/springframework/security/access/method/MapBasedMethodSecurityMetadataSource.java
index 0751f94bb3..1956fb8534 100644
--- a/core/src/main/java/org/springframework/security/access/method/MapBasedMethodSecurityMetadataSource.java
+++ b/core/src/main/java/org/springframework/security/access/method/MapBasedMethodSecurityMetadataSource.java
@@ -107,7 +107,7 @@ public class MapBasedMethodSecurityMetadataSource extends
/**
* Add configuration attributes for a secure method. Method names can end or start
- * with *
for matching multiple methods.
+ * with *
for matching multiple methods.
*
* @param name type and method name, separated by a dot
* @param attr the security attributes associated with the method
@@ -131,7 +131,7 @@ public class MapBasedMethodSecurityMetadataSource extends
/**
* Add configuration attributes for a secure method. Mapped method names can end or
- * start with *
for matching multiple methods.
+ * start with *
for matching multiple methods.
*
* @param javaType target interface or class the security configuration attribute
* applies to
diff --git a/core/src/main/java/org/springframework/security/access/vote/AbstractAccessDecisionManager.java b/core/src/main/java/org/springframework/security/access/vote/AbstractAccessDecisionManager.java
index 4242aa64ed..fd7eecae67 100644
--- a/core/src/main/java/org/springframework/security/access/vote/AbstractAccessDecisionManager.java
+++ b/core/src/main/java/org/springframework/security/access/vote/AbstractAccessDecisionManager.java
@@ -33,11 +33,11 @@ import org.springframework.util.Assert;
/**
* Abstract implementation of {@link AccessDecisionManager}.
- *
+ *
+ *
* Handles configuration of a bean context defined list of {@link AccessDecisionVoter}s
* and the access control behaviour if all voters abstain from voting (defaults to deny
* access).
- *
*/
public abstract class AbstractAccessDecisionManager implements AccessDecisionManager,
InitializingBean, MessageSourceAware {
@@ -101,10 +101,9 @@ public abstract class AbstractAccessDecisionManager implements AccessDecisionMan
/**
* Iterates through all AccessDecisionVoter
s and ensures each can support
* the presented class.
- *
+ *
* If one or more voters cannot support the presented class, false
is
* returned.
- *
*
* @param clazz the type of secured object being presented
* @return true if this type is supported
diff --git a/core/src/main/java/org/springframework/security/authentication/encoding/ShaPasswordEncoder.java b/core/src/main/java/org/springframework/security/authentication/encoding/ShaPasswordEncoder.java
index 08f79463fc..6eaa2744f6 100644
--- a/core/src/main/java/org/springframework/security/authentication/encoding/ShaPasswordEncoder.java
+++ b/core/src/main/java/org/springframework/security/authentication/encoding/ShaPasswordEncoder.java
@@ -24,7 +24,7 @@ package org.springframework.security.authentication.encoding;
*
*
* As SHA is a one-way hash, the salt can contain any characters. The default strength for
- * the SHA encoding is SHA-1. If you wish to use higher strengths use the argumented
+ * the SHA encoding is SHA-1. If you wish to use higher strengths use the parametrised
* constructor. {@link #ShaPasswordEncoder(int strength)}
*
*
@@ -32,7 +32,7 @@ package org.springframework.security.authentication.encoding;
*
*
* <bean id="passwordEncoder" class="org.springframework.security.authentication.encoding.ShaPasswordEncoder">
- * <constructor-arg value="256"/>
+ * <constructor-arg value="256"/>
* </bean>
*
*
diff --git a/core/src/main/java/org/springframework/security/authentication/jaas/AbstractJaasAuthenticationProvider.java b/core/src/main/java/org/springframework/security/authentication/jaas/AbstractJaasAuthenticationProvider.java
index 8f86b86aa3..bd2f0b9f4f 100644
--- a/core/src/main/java/org/springframework/security/authentication/jaas/AbstractJaasAuthenticationProvider.java
+++ b/core/src/main/java/org/springframework/security/authentication/jaas/AbstractJaasAuthenticationProvider.java
@@ -51,7 +51,7 @@ import org.springframework.util.ObjectUtils;
* This AuthenticationProvider
is capable of validating
* {@link org.springframework.security.authentication.UsernamePasswordAuthenticationToken}
* requests contain the correct username and password.
- *
+ *
*
* This implementation is backed by a
+ *
*
* {@link JaasAuthenticationCallbackHandler}s are passed to the
* AbstractJaasAuthenticationProvider through the
@@ -84,8 +84,7 @@ import org.springframework.util.ObjectUtils;
* </list>
* </property>
*
- *
- *
+ *
*
* After calling LoginContext.login(), the AbstractJaasAuthenticationProvider will
* retrieve the returned Principals from the Subject
@@ -95,7 +94,7 @@ import org.springframework.util.ObjectUtils;
* Authorization a role, it returns that role name from it's
* {@link AuthorityGranter#grant(java.security.Principal)} method. The returned role will
* be applied to the Authorization object as a {@link GrantedAuthority}.
- *
+ *
*
* AuthorityGranters are configured in spring xml as follows...
*
diff --git a/core/src/main/java/org/springframework/security/authentication/jaas/JaasAuthenticationProvider.java b/core/src/main/java/org/springframework/security/authentication/jaas/JaasAuthenticationProvider.java
index db45da03f0..05f0a4dad0 100644
--- a/core/src/main/java/org/springframework/security/authentication/jaas/JaasAuthenticationProvider.java
+++ b/core/src/main/java/org/springframework/security/authentication/jaas/JaasAuthenticationProvider.java
@@ -61,8 +61,7 @@ import java.security.Security;
* <value>/WEB-INF/login.conf</value>
* </property>
*
- *
- *
+ *
*
* The loginContextName should coincide with a given index in the loginConfig specifed.
* The loginConfig file used in the JUnit tests appears as the following...
@@ -80,7 +79,6 @@ import java.security.Security;
* <property name="loginContextName"> <value>JAASTest</value> </property>
*
*
- *
*
* When using JAAS login modules as the authentication source, sometimes the
+ *
*
* {@link JaasAuthenticationCallbackHandler}s are passed to the JaasAuthenticationProvider
* through the
@@ -108,7 +106,6 @@ import java.security.Security;
* </property>
*
*
- *
*
* After calling LoginContext.login(), the JaasAuthenticationProvider will retrieve the
* returned Principals from the Subject (LoginContext.getSubject().getPrincipals). Each
@@ -130,10 +127,9 @@ import java.security.Security;
*
*
* A configuration note: The JaasAuthenticationProvider uses the security properites
- * "e;login.config.url.X"e; to configure jaas. If you would like to customize the
+ * "login.config.url.X" to configure jaas. If you would like to customize the
* way Jaas gets configured, create a subclass of this and override the
* {@link #configureJaas(Resource)} method.
- *
*
* @author Ray Krueger
* @author Rob Winch
diff --git a/core/src/main/java/org/springframework/security/concurrent/DelegatingSecurityContextExecutorService.java b/core/src/main/java/org/springframework/security/concurrent/DelegatingSecurityContextExecutorService.java
index 5786869bab..de7950d79b 100644
--- a/core/src/main/java/org/springframework/security/concurrent/DelegatingSecurityContextExecutorService.java
+++ b/core/src/main/java/org/springframework/security/concurrent/DelegatingSecurityContextExecutorService.java
@@ -55,7 +55,7 @@ public class DelegatingSecurityContextExecutorService extends
* Creates a new {@link DelegatingSecurityContextExecutorService} that uses the
* current {@link SecurityContext} from the {@link SecurityContextHolder}.
*
- * @param delegateTaskExecutor the {@link TaskExecutor} to delegate to. Cannot be
+ * @param delegate the {@link ExecutorService} to delegate to. Cannot be
* null.
*/
public DelegatingSecurityContextExecutorService(ExecutorService delegate) {
diff --git a/core/src/main/java/org/springframework/security/concurrent/DelegatingSecurityContextRunnable.java b/core/src/main/java/org/springframework/security/concurrent/DelegatingSecurityContextRunnable.java
index 30f9d58f29..95d3c76920 100644
--- a/core/src/main/java/org/springframework/security/concurrent/DelegatingSecurityContextRunnable.java
+++ b/core/src/main/java/org/springframework/security/concurrent/DelegatingSecurityContextRunnable.java
@@ -70,13 +70,13 @@ public final class DelegatingSecurityContextRunnable implements Runnable {
}
/**
- * Determines if the SecurityContext should be transfered if {@link #call()}
+ * Determines if the SecurityContext should be transfered if {@link #run()}
* is invoked on the same {@link Thread} the
* {@link DelegatingSecurityContextCallable} was created on.
*
* @param enableOnOriginalThread
* if false (default), will only transfer the
- * {@link SecurityContext} if {@link #call()} is invoked on a
+ * {@link SecurityContext} if {@link #run()} is invoked on a
* different {@link Thread} than the
* {@link DelegatingSecurityContextCallable} was created on.
* @since 4.0.2
diff --git a/core/src/main/java/org/springframework/security/concurrent/DelegatingSecurityContextScheduledExecutorService.java b/core/src/main/java/org/springframework/security/concurrent/DelegatingSecurityContextScheduledExecutorService.java
index eec7b5b079..9e6c2f024f 100644
--- a/core/src/main/java/org/springframework/security/concurrent/DelegatingSecurityContextScheduledExecutorService.java
+++ b/core/src/main/java/org/springframework/security/concurrent/DelegatingSecurityContextScheduledExecutorService.java
@@ -51,7 +51,7 @@ public final class DelegatingSecurityContextScheduledExecutorService extends
* Creates a new {@link DelegatingSecurityContextScheduledExecutorService} that uses
* the current {@link SecurityContext} from the {@link SecurityContextHolder}.
*
- * @param delegateTaskExecutor the {@link TaskExecutor} to delegate to. Cannot be
+ * @param delegate the {@link ScheduledExecutorService} to delegate to. Cannot be
* null.
*/
public DelegatingSecurityContextScheduledExecutorService(
diff --git a/core/src/main/java/org/springframework/security/core/annotation/AuthenticationPrincipal.java b/core/src/main/java/org/springframework/security/core/annotation/AuthenticationPrincipal.java
index ce2b2acb8d..fa2eae57eb 100644
--- a/core/src/main/java/org/springframework/security/core/annotation/AuthenticationPrincipal.java
+++ b/core/src/main/java/org/springframework/security/core/annotation/AuthenticationPrincipal.java
@@ -30,7 +30,9 @@ import org.springframework.security.core.Authentication;
* @author Rob Winch
* @since 4.0
*
- * @see org.springframework.security.messaging.context.AuthenticationPrincipalArgumentResolver
+ * See:
+ * AuthenticationPrincipalArgumentResolver
+ *
*/
@Target({ ElementType.PARAMETER, ElementType.ANNOTATION_TYPE })
@Retention(RetentionPolicy.RUNTIME)
diff --git a/core/src/main/java/org/springframework/security/core/parameters/AnnotationParameterNameDiscoverer.java b/core/src/main/java/org/springframework/security/core/parameters/AnnotationParameterNameDiscoverer.java
index 786055be9a..37bd473266 100644
--- a/core/src/main/java/org/springframework/security/core/parameters/AnnotationParameterNameDiscoverer.java
+++ b/core/src/main/java/org/springframework/security/core/parameters/AnnotationParameterNameDiscoverer.java
@@ -40,7 +40,7 @@ import org.springframework.util.ReflectionUtils;
*
* import org.springframework.security.access.method.P;
*
- * @PostAuthorize("#to == returnObject.to")
+ * {@code @PostAuthorize("#to == returnObject.to")}
* public Message findMessageByTo(@P("to") String to);
*
*
@@ -70,7 +70,7 @@ import org.springframework.util.ReflectionUtils;
*
* import org.springframework.security.access.method.P;
*
- * @PostAuthorize("#to == returnObject.to")
+ * {@code @PostAuthorize("#to == returnObject.to")}
* public Message findMessageByToAndFrom(@P("to") User to, User from);
*
*
diff --git a/core/src/main/java/org/springframework/security/core/session/SessionRegistryImpl.java b/core/src/main/java/org/springframework/security/core/session/SessionRegistryImpl.java
index e6d8fd3bea..3bee6070ae 100644
--- a/core/src/main/java/org/springframework/security/core/session/SessionRegistryImpl.java
+++ b/core/src/main/java/org/springframework/security/core/session/SessionRegistryImpl.java
@@ -32,9 +32,8 @@ import java.util.concurrent.CopyOnWriteArraySet;
* SessionDestroyedEvent}s published in the Spring application context.
*
* For this class to function correctly in a web application, it is important that you
- * register an {@link org.springframework.security.web.session.HttpSessionEventPublisher
- * HttpSessionEventPublisher} in the web.xml file so that this class is notified
- * of sessions that expire.
+ * register an HttpSessionEventPublisher
+ * in the web.xml file so that this class is notified of sessions that expire.
*
* @author Ben Alex
* @author Luke Taylor
diff --git a/core/src/main/java/org/springframework/security/core/token/KeyBasedPersistenceTokenService.java b/core/src/main/java/org/springframework/security/core/token/KeyBasedPersistenceTokenService.java
index 5add4fd067..ea5c34246f 100644
--- a/core/src/main/java/org/springframework/security/core/token/KeyBasedPersistenceTokenService.java
+++ b/core/src/main/java/org/springframework/security/core/token/KeyBasedPersistenceTokenService.java
@@ -145,7 +145,7 @@ public class KeyBasedPersistenceTokenService implements TokenService, Initializi
}
/**
- * @param pseudoRandomNumberBytes changes the number of bytes issued (must be >= 0;
+ * @param pseudoRandomNumberBytes changes the number of bytes issued (must be >= 0;
* defaults to 256)
*/
public void setPseudoRandomNumberBytes(int pseudoRandomNumberBytes) {
diff --git a/core/src/main/java/org/springframework/security/core/token/TokenService.java b/core/src/main/java/org/springframework/security/core/token/TokenService.java
index 53aa217511..7989423386 100644
--- a/core/src/main/java/org/springframework/security/core/token/TokenService.java
+++ b/core/src/main/java/org/springframework/security/core/token/TokenService.java
@@ -38,7 +38,7 @@ public interface TokenService {
Token allocateToken(String extendedInformation);
/**
- * Permits verification the <{@link Token#getKey()} was issued by this
+ * Permits verification the {@link Token#getKey()} was issued by this
* TokenService
and reconstructs the corresponding Token
.
*
* @param key as obtained from {@link Token#getKey()} and created by this
diff --git a/core/src/main/java/org/springframework/security/core/userdetails/jdbc/JdbcDaoImpl.java b/core/src/main/java/org/springframework/security/core/userdetails/jdbc/JdbcDaoImpl.java
index cd922e42d7..88b4e1e45d 100644
--- a/core/src/main/java/org/springframework/security/core/userdetails/jdbc/JdbcDaoImpl.java
+++ b/core/src/main/java/org/springframework/security/core/userdetails/jdbc/JdbcDaoImpl.java
@@ -47,7 +47,7 @@ import org.springframework.util.Assert;
*
* This table contains the login name, password and enabled status of the user.
*
- *
+ *
*
* Column |
*
@@ -64,7 +64,7 @@ import org.springframework.util.Assert;
*
* The Authorities Table
*
- *
+ *
*
* Column |
*
diff --git a/core/src/main/java/org/springframework/security/core/userdetails/memory/UserAttribute.java b/core/src/main/java/org/springframework/security/core/userdetails/memory/UserAttribute.java
index 06bde8f9b9..84c6733aed 100644
--- a/core/src/main/java/org/springframework/security/core/userdetails/memory/UserAttribute.java
+++ b/core/src/main/java/org/springframework/security/core/userdetails/memory/UserAttribute.java
@@ -23,7 +23,7 @@ import org.springframework.security.core.GrantedAuthority;
import org.springframework.security.core.authority.SimpleGrantedAuthority;
/**
- * Used by {@link InMemoryDaoImpl} to temporarily store the attributes associated with a
+ * Used by {@link org.springframework.security.provisioning.InMemoryUserDetailsManager} to temporarily store the attributes associated with a
* user.
*
* @author Ben Alex
@@ -50,7 +50,7 @@ public class UserAttribute {
/**
* Set all authorities for this user.
*
- * @param authorities {@link List} <{@link GrantedAuthority}>
+ * @param authorities {@link List} <{@link GrantedAuthority}>
* @since 1.1
*/
public void setAuthorities(List authorities) {
@@ -61,7 +61,7 @@ public class UserAttribute {
* Set all authorities for this user from String values. It will create the necessary
* {@link GrantedAuthority} objects.
*
- * @param authoritiesAsStrings {@link List} <{@link String}>
+ * @param authoritiesAsStrings {@link List} <{@link String}>
* @since 1.1
*/
public void setAuthoritiesAsString(List authoritiesAsStrings) {
diff --git a/core/src/main/java/org/springframework/security/task/DelegatingSecurityContextTaskExecutor.java b/core/src/main/java/org/springframework/security/task/DelegatingSecurityContextTaskExecutor.java
index 8506bace35..22cdd8d0e2 100644
--- a/core/src/main/java/org/springframework/security/task/DelegatingSecurityContextTaskExecutor.java
+++ b/core/src/main/java/org/springframework/security/task/DelegatingSecurityContextTaskExecutor.java
@@ -45,7 +45,7 @@ public class DelegatingSecurityContextTaskExecutor extends
* Creates a new {@link DelegatingSecurityContextTaskExecutor} that uses the current
* {@link SecurityContext} from the {@link SecurityContextHolder}.
*
- * @param delegateTaskExecutor the {@link TaskExecutor} to delegate to. Cannot be
+ * @param delegate the {@link TaskExecutor} to delegate to. Cannot be
* null.
*/
public DelegatingSecurityContextTaskExecutor(TaskExecutor delegate) {
diff --git a/crypto/src/main/java/org/springframework/security/crypto/bcrypt/BCrypt.java b/crypto/src/main/java/org/springframework/security/crypto/bcrypt/BCrypt.java
index ee06fd80e8..77a0592ce3 100644
--- a/crypto/src/main/java/org/springframework/security/crypto/bcrypt/BCrypt.java
+++ b/crypto/src/main/java/org/springframework/security/crypto/bcrypt/BCrypt.java
@@ -31,25 +31,25 @@ import java.security.SecureRandom;
* with a random salt, like this:
*
*
- * String pw_hash = BCrypt.hashpw(plain_password, BCrypt.gensalt());
+ * String pw_hash = BCrypt.hashpw(plain_password, BCrypt.gensalt());
*
*
* To check whether a plaintext password matches one that has been hashed previously, use
* the checkpw method:
*
*
- * if (BCrypt.checkpw(candidate_password, stored_hash))
- * System.out.println("It matches");
- * else
- * System.out.println("It does not match");
+ * if (BCrypt.checkpw(candidate_password, stored_hash))
+ * System.out.println("It matches");
+ * else
+ * System.out.println("It does not match");
*
*
* The gensalt() method takes an optional parameter (log_rounds) that determines the
* computational complexity of the hashing:
*
*
- * String strong_salt = BCrypt.gensalt(10)
- * String stronger_salt = BCrypt.gensalt(12)
+ * String strong_salt = BCrypt.gensalt(10)
+ * String stronger_salt = BCrypt.gensalt(12)
*
*
* The amount of work increases exponentially (2**log_rounds), so each increment is twice
diff --git a/data/src/main/java/org/springframework/security/data/repository/query/SecurityEvaluationContextExtension.java b/data/src/main/java/org/springframework/security/data/repository/query/SecurityEvaluationContextExtension.java
index f74d192eef..d94022db70 100644
--- a/data/src/main/java/org/springframework/security/data/repository/query/SecurityEvaluationContextExtension.java
+++ b/data/src/main/java/org/springframework/security/data/repository/query/SecurityEvaluationContextExtension.java
@@ -29,41 +29,39 @@ import java.util.Map;
*
* By defining this object as a Bean, Spring Security is exposed as SpEL expressions for
* creating Spring Data queries.
- *
*
*
* With Java based configuration, we can define the bean using the following:
- *
*
*
* For example, if you return a UserDetails that extends the following User object:
- *
*
*
- * @Entity
+ * @Entity
* public class User {
- * @GeneratedValue(strategy = GenerationType.AUTO)
- * @Id
+ * @GeneratedValue(strategy = GenerationType.AUTO)
+ * @Id
* private Long id;
*
* ...
+ * }
*
*
*
* And you have a Message object that looks like the following:
- *
*
*
- * @Entity
+ * @Entity
* public class Message {
- * @Id
- * @GeneratedValue(strategy = GenerationType.AUTO)
+ * @Id
+ * @GeneratedValue(strategy = GenerationType.AUTO)
* private Long id;
*
- * @OneToOne
+ * @OneToOne
* private User to;
*
* ...
+ * }
*
*
* You can use the following {@code Query} annotation to search for only messages that are
diff --git a/ldap/src/main/java/org/springframework/security/ldap/DefaultSpringSecurityContextSource.java b/ldap/src/main/java/org/springframework/security/ldap/DefaultSpringSecurityContextSource.java
index 2fe357ecb2..4d4e2376ef 100644
--- a/ldap/src/main/java/org/springframework/security/ldap/DefaultSpringSecurityContextSource.java
+++ b/ldap/src/main/java/org/springframework/security/ldap/DefaultSpringSecurityContextSource.java
@@ -40,7 +40,7 @@ public class DefaultSpringSecurityContextSource extends LdapContextSource {
* you want to use more than one server for fail-over, rather use the
* {@link #DefaultSpringSecurityContextSource(List, String)} constructor.
*
- * @param providerUrl an LDAP URL of the form ldap://localhost:389/base_dn
+ * @param providerUrl an LDAP URL of the form ldap://localhost:389/base_dn
*/
public DefaultSpringSecurityContextSource(String providerUrl) {
Assert.hasLength(providerUrl, "An LDAP connection URL must be supplied.");
diff --git a/ldap/src/main/java/org/springframework/security/ldap/search/LdapUserSearch.java b/ldap/src/main/java/org/springframework/security/ldap/search/LdapUserSearch.java
index af21a05be9..e367e69cf4 100644
--- a/ldap/src/main/java/org/springframework/security/ldap/search/LdapUserSearch.java
+++ b/ldap/src/main/java/org/springframework/security/ldap/search/LdapUserSearch.java
@@ -22,8 +22,7 @@ import org.springframework.security.core.userdetails.UsernameNotFoundException;
* Obtains a user's information from the LDAP directory given a login name.
*
* May be optionally used to configure the LDAP authentication implementation when a more
- * sophisticated approach is required than just using a simple username->DN mapping.
- *
+ * sophisticated approach is required than just using a simple username->DN mapping.
*
* @author Luke Taylor
*/
diff --git a/ldap/src/main/java/org/springframework/security/ldap/userdetails/DefaultLdapAuthoritiesPopulator.java b/ldap/src/main/java/org/springframework/security/ldap/userdetails/DefaultLdapAuthoritiesPopulator.java
index fcd30a8a91..b10d00ebe9 100644
--- a/ldap/src/main/java/org/springframework/security/ldap/userdetails/DefaultLdapAuthoritiesPopulator.java
+++ b/ldap/src/main/java/org/springframework/security/ldap/userdetails/DefaultLdapAuthoritiesPopulator.java
@@ -75,15 +75,15 @@ import java.util.Set;
*
*
* <bean id="ldapAuthoritiesPopulator"
- * class="org.springframework.security.ldap.userdetails.DefaultLdapAuthoritiesPopulator">
- * <constructor-arg ref="contextSource"/>
- * <constructor-arg value="ou=groups"/>
- * <property name="groupRoleAttribute" value="ou"/>
- * <!-- the following properties are shown with their default values -->
- * <property name="searchSubtree" value="false"/>
- * <property name="rolePrefix" value="ROLE_"/>
- * <property name="convertToUpperCase" value="true"/>
- * </bean>
+ * class="org.springframework.security.ldap.userdetails.DefaultLdapAuthoritiesPopulator">
+ * <constructor-arg ref="contextSource"/>
+ * <constructor-arg value="ou=groups"/>
+ * <property name="groupRoleAttribute" value="ou"/>
+ * <!-- the following properties are shown with their default values -->
+ * <property name="searchSubtree" value="false"/>
+ * <property name="rolePrefix" value="ROLE_"/>
+ * <property name="convertToUpperCase" value="true"/>
+ * </bean>
*
*
* A search for roles for user "uid=ben,ou=people,dc=springframework,dc=org" would return
@@ -292,7 +292,7 @@ public class DefaultLdapAuthoritiesPopulator implements LdapAuthoritiesPopulator
/**
* Sets the prefix which will be prepended to the values loaded from the directory.
- * Defaults to "ROLE_" for compatibility with RoleVoter/tt>.
+ * Defaults to "ROLE_" for compatibility with RoleVoter.
*/
public void setRolePrefix(String rolePrefix) {
Assert.notNull(rolePrefix, "rolePrefix must not be null");
@@ -326,7 +326,7 @@ public class DefaultLdapAuthoritiesPopulator implements LdapAuthoritiesPopulator
* Returns the current LDAP template. Method available so that classes extending this
* can override the template used
* @return the LDAP template
- * @see {@link org.springframework.security.ldap.SpringSecurityLdapTemplate}
+ * @see org.springframework.security.ldap.SpringSecurityLdapTemplate
*/
protected SpringSecurityLdapTemplate getLdapTemplate() {
return ldapTemplate;
@@ -336,7 +336,7 @@ public class DefaultLdapAuthoritiesPopulator implements LdapAuthoritiesPopulator
* Returns the attribute name of the LDAP attribute that will be mapped to the role
* name Method available so that classes extending this can override
* @return the attribute name used for role mapping
- * @see {@link #setGroupRoleAttribute(String)}
+ * @see #setGroupRoleAttribute(String)
*/
protected final String getGroupRoleAttribute() {
return groupRoleAttribute;
@@ -346,7 +346,7 @@ public class DefaultLdapAuthoritiesPopulator implements LdapAuthoritiesPopulator
* Returns the search filter configured for this populator Method available so that
* classes extending this can override
* @return the search filter
- * @see {@link #setGroupSearchFilter(String)}
+ * @see #setGroupSearchFilter(String)
*/
protected final String getGroupSearchFilter() {
return groupSearchFilter;
@@ -356,7 +356,7 @@ public class DefaultLdapAuthoritiesPopulator implements LdapAuthoritiesPopulator
* Returns the role prefix used by this populator Method available so that classes
* extending this can override
* @return the role prefix
- * @see {@link #setRolePrefix(String)}
+ * @see #setRolePrefix(String)
*/
protected final String getRolePrefix() {
return rolePrefix;
@@ -366,7 +366,7 @@ public class DefaultLdapAuthoritiesPopulator implements LdapAuthoritiesPopulator
* Returns true if role names are converted to uppercase Method available so that
* classes extending this can override
* @return true if role names are converted to uppercase.
- * @see {@link #setConvertToUpperCase(boolean)}
+ * @see #setConvertToUpperCase(boolean)
*/
protected final boolean isConvertToUpperCase() {
return convertToUpperCase;
@@ -376,7 +376,7 @@ public class DefaultLdapAuthoritiesPopulator implements LdapAuthoritiesPopulator
* Returns the default role Method available so that classes extending this can
* override
* @return the default role used
- * @see {@link #setDefaultRole(String)}
+ * @see #setDefaultRole(String)
*/
private GrantedAuthority getDefaultRole() {
return defaultRole;
diff --git a/ldap/src/main/java/org/springframework/security/ldap/userdetails/NestedLdapAuthoritiesPopulator.java b/ldap/src/main/java/org/springframework/security/ldap/userdetails/NestedLdapAuthoritiesPopulator.java
index dd7fce5553..dfc6530121 100644
--- a/ldap/src/main/java/org/springframework/security/ldap/userdetails/NestedLdapAuthoritiesPopulator.java
+++ b/ldap/src/main/java/org/springframework/security/ldap/userdetails/NestedLdapAuthoritiesPopulator.java
@@ -110,9 +110,6 @@ import java.util.*;
* ou: jdeveloper
* member: uid=scaladude,ou=people,dc=springframework,dc=org *
*
- *
- *
- *
*
* @author Filip Hanik
*/
diff --git a/messaging/src/main/java/org/springframework/security/messaging/access/expression/ExpressionBasedMessageSecurityMetadataSourceFactory.java b/messaging/src/main/java/org/springframework/security/messaging/access/expression/ExpressionBasedMessageSecurityMetadataSourceFactory.java
index 2fa7b0d8d9..85e5724681 100644
--- a/messaging/src/main/java/org/springframework/security/messaging/access/expression/ExpressionBasedMessageSecurityMetadataSourceFactory.java
+++ b/messaging/src/main/java/org/springframework/security/messaging/access/expression/ExpressionBasedMessageSecurityMetadataSourceFactory.java
@@ -45,7 +45,7 @@ public final class ExpressionBasedMessageSecurityMetadataSourceFactory {
* For example:
*
*
- * LinkedHashMap matcherToExpression = new LinkedHashMap();
+ * LinkedHashMap<MessageMatcher<?>,String> matcherToExpression = new LinkedHashMap<MessageMatcher<Object>,String>();
* matcherToExpression.put(new SimDestinationMessageMatcher("/public/**"), "permitAll");
* matcherToExpression.put(new SimDestinationMessageMatcher("/admin/**"), "hasRole('ROLE_ADMIN')");
* matcherToExpression.put(new SimDestinationMessageMatcher("/**"), "authenticated");
@@ -57,11 +57,9 @@ public final class ExpressionBasedMessageSecurityMetadataSourceFactory {
* If our destination is "/public/hello", it would match on "/public/**" and on "/**".
* However, only "/public/**" would be used since it is the first entry. That means
* that a destination of "/public/hello" will be mapped to "permitAll".
- *
*
*
* For a complete listing of expressions see {@link MessageSecurityExpressionRoot}
- *
*
* @param matcherToExpression an ordered mapping of {@link MessageMatcher} to Strings
* that are turned into an Expression using
@@ -81,7 +79,7 @@ public final class ExpressionBasedMessageSecurityMetadataSourceFactory {
* For example:
*
*
- * LinkedHashMap matcherToExpression = new LinkedHashMap();
+ * LinkedHashMap<MessageMatcher<?>,String> matcherToExpression = new LinkedHashMap<MessageMatcher<Object>,String>();
* matcherToExpression.put(new SimDestinationMessageMatcher("/public/**"), "permitAll");
* matcherToExpression.put(new SimDestinationMessageMatcher("/admin/**"), "hasRole('ROLE_ADMIN')");
* matcherToExpression.put(new SimDestinationMessageMatcher("/**"), "authenticated");
diff --git a/messaging/src/main/java/org/springframework/security/messaging/access/intercept/ChannelSecurityInterceptor.java b/messaging/src/main/java/org/springframework/security/messaging/access/intercept/ChannelSecurityInterceptor.java
index 0250fd0882..c3a967cb19 100644
--- a/messaging/src/main/java/org/springframework/security/messaging/access/intercept/ChannelSecurityInterceptor.java
+++ b/messaging/src/main/java/org/springframework/security/messaging/access/intercept/ChannelSecurityInterceptor.java
@@ -30,12 +30,10 @@ import org.springframework.util.Assert;
*
* The SecurityMetadataSource
required by this security interceptor is of
* type {@link MessageSecurityMetadataSource}.
- *
*
* Refer to {@link AbstractSecurityInterceptor} for details on the workflow.
- *
*
- * @see 4.0
+ * @since 4.0
* @author Rob Winch
*/
public final class ChannelSecurityInterceptor extends AbstractSecurityInterceptor
diff --git a/messaging/src/main/java/org/springframework/security/messaging/context/AuthenticationPrincipalArgumentResolver.java b/messaging/src/main/java/org/springframework/security/messaging/context/AuthenticationPrincipalArgumentResolver.java
index f2e3267683..7c43b0093e 100644
--- a/messaging/src/main/java/org/springframework/security/messaging/context/AuthenticationPrincipalArgumentResolver.java
+++ b/messaging/src/main/java/org/springframework/security/messaging/context/AuthenticationPrincipalArgumentResolver.java
@@ -32,12 +32,13 @@ import org.springframework.stereotype.Controller;
* {@link Controller}:
*
*
- * @Controller
+ * @Controller
* public class MyController {
- * @MessageMapping("/im")
+ * @MessageMapping("/im")
* public void im(@AuthenticationPrincipal CustomUser customUser) {
* // do something with CustomUser
* }
+ * }
*
*
*
@@ -47,11 +48,9 @@ import org.springframework.stereotype.Controller;
* match, null will be returned unless
* {@link AuthenticationPrincipal#errorOnInvalidType()} is true in which case a
* {@link ClassCastException} will be thrown.
- *
*
*
* Alternatively, users can create a custom meta annotation as shown below:
- *
*
*
* @Target({ ElementType.PARAMETER })
@@ -63,15 +62,15 @@ import org.springframework.stereotype.Controller;
*
*
* The custom annotation can then be used instead. For example:
- *
*
*
- * @Controller
+ * @Controller
* public class MyController {
- * @MessageMapping("/im")
+ * @MessageMapping("/im")
* public void im(@CurrentUser CustomUser customUser) {
* // do something with CustomUser
* }
+ * }
*
*
* @author Rob Winch
diff --git a/messaging/src/main/java/org/springframework/security/messaging/util/matcher/SimpDestinationMessageMatcher.java b/messaging/src/main/java/org/springframework/security/messaging/util/matcher/SimpDestinationMessageMatcher.java
index 5471ce3115..bc46d2cb34 100644
--- a/messaging/src/main/java/org/springframework/security/messaging/util/matcher/SimpDestinationMessageMatcher.java
+++ b/messaging/src/main/java/org/springframework/security/messaging/util/matcher/SimpDestinationMessageMatcher.java
@@ -55,7 +55,6 @@ public final class SimpDestinationMessageMatcher implements MessageMatcher
*
*
* The mapping matches destinations despite the using the following rules:
@@ -87,7 +86,6 @@ public final class SimpDestinationMessageMatcher implements MessageMatcher
* Creates a new instance with the specified pattern and {@link PathMatcher}.
- *
*
* @param pattern the pattern to use
* @param pathMatcher the {@link PathMatcher} to use.
@@ -100,7 +98,6 @@ public final class SimpDestinationMessageMatcher implements MessageMatcher
* Creates a new instance with the specified pattern, {@link SimpMessageType}, and
* {@link PathMatcher}.
- *
*
* @param pattern the pattern to use
* @param type the {@link SimpMessageType} to match on or null if any
@@ -155,10 +152,9 @@ public final class SimpDestinationMessageMatcher implements MessageMatcher
* Creates a new instance with the specified pattern,
* {@code SimpMessageType.SUBSCRIBE}, and {@link PathMatcher}.
- *
*
* @param pattern the pattern to use
- * @param pathMatcher the {@link PathMatcher} to use.
+ * @param matcher the {@link PathMatcher} to use.
*/
public static SimpDestinationMessageMatcher createSubscribeMatcher(String pattern,
PathMatcher matcher) {
@@ -170,10 +166,9 @@ public final class SimpDestinationMessageMatcher implements MessageMatcher
* Creates a new instance with the specified pattern, {@code SimpMessageType.MESSAGE},
* and {@link PathMatcher}.
- *
*
* @param pattern the pattern to use
- * @param pathMatcher the {@link PathMatcher} to use.
+ * @param matcher the {@link PathMatcher} to use.
*/
public static SimpDestinationMessageMatcher createMessageMatcher(String pattern,
PathMatcher matcher) {
diff --git a/openid/src/main/java/org/springframework/security/openid/OpenIDAuthenticationFilter.java b/openid/src/main/java/org/springframework/security/openid/OpenIDAuthenticationFilter.java
index 9562c110e5..91a240272b 100644
--- a/openid/src/main/java/org/springframework/security/openid/OpenIDAuthenticationFilter.java
+++ b/openid/src/main/java/org/springframework/security/openid/OpenIDAuthenticationFilter.java
@@ -246,17 +246,17 @@ public class OpenIDAuthenticationFilter extends AbstractAuthenticationProcessing
/**
* Maps the return_to url to a realm, for example:
- *
+ *
*
- * http://www.example.com/login/openid -> http://www.example.com/realm
+ * http://www.example.com/login/openid -> http://www.example.com/realm
*
- *
+ *
* If no mapping is provided then the returnToUrl will be parsed to extract the
* protocol, hostname and port followed by a trailing slash. This means that
* http://www.example.com/login/openid will automatically become
* http://www.example.com:80/
*
- * @param realmMapping containing returnToUrl -> realm mappings
+ * @param realmMapping containing returnToUrl -> realm mappings
*/
public void setRealmMapping(Map realmMapping) {
this.realmMapping = realmMapping;
diff --git a/remoting/src/main/java/org/springframework/security/remoting/dns/DnsResolver.java b/remoting/src/main/java/org/springframework/security/remoting/dns/DnsResolver.java
index 461c870474..1485c11895 100644
--- a/remoting/src/main/java/org/springframework/security/remoting/dns/DnsResolver.java
+++ b/remoting/src/main/java/org/springframework/security/remoting/dns/DnsResolver.java
@@ -39,12 +39,11 @@ public interface DnsResolver {
/**
*
* Resolves the host name for the specified service in the specified domain
- *
+ *
*
* For example, if you need the host name for an LDAP server running in the domain
* springsource.com, you would call resolveServiceEntry("ldap",
* "springsource.com").
- *
*
*
* The DNS server needs to provide the service records for this, in the example above,
@@ -59,7 +58,6 @@ public interface DnsResolver {
* priority, it will return the one with the highest weight. You will find more
* informatione about DNS service records at Wikipedia.
- *
*
* @param serviceType The service type you are searching for, e.g. ldap, kerberos, ...
* @param domain The domain, in which you are searching for the service
diff --git a/samples/servletapi-xml/src/main/java/org/springframework/security/samples/servletapi/mvc/ServletApiController.java b/samples/servletapi-xml/src/main/java/org/springframework/security/samples/servletapi/mvc/ServletApiController.java
index 17c113f253..41431bf469 100644
--- a/samples/servletapi-xml/src/main/java/org/springframework/security/samples/servletapi/mvc/ServletApiController.java
+++ b/samples/servletapi-xml/src/main/java/org/springframework/security/samples/servletapi/mvc/ServletApiController.java
@@ -41,7 +41,7 @@ import org.springframework.web.servlet.mvc.support.RedirectAttributes;
* {@link HttpServletRequest#authenticate(HttpServletResponse)}
* {@link #login(HttpServletRequest, HttpServletResponse, LoginForm, BindingResult)} -
* Integration with {@link HttpServletRequest#login(String, String)}
- * {@link #logout(HttpServletRequest, HttpServletResponse)} - Integration with
+ * {@link #logout(HttpServletRequest, HttpServletResponse, RedirectAttributes)} - Integration with
* {@link HttpServletRequest#logout()}
* {@link #remoteUser(HttpServletRequest)} - Integration with
* {@link HttpServletRequest#getRemoteUser()}
diff --git a/taglibs/src/main/java/org/springframework/security/taglibs/authz/AbstractAuthorizeTag.java b/taglibs/src/main/java/org/springframework/security/taglibs/authz/AbstractAuthorizeTag.java
index 1ccaeb601f..dcdf1de0b8 100644
--- a/taglibs/src/main/java/org/springframework/security/taglibs/authz/AbstractAuthorizeTag.java
+++ b/taglibs/src/main/java/org/springframework/security/taglibs/authz/AbstractAuthorizeTag.java
@@ -45,7 +45,7 @@ import org.springframework.web.context.support.WebApplicationContextUtils;
* technology (JSP, Facelets). It treats tag attributes as simple strings rather than
* strings that may contain expressions with the exception of the "access" attribute,
* which is always expected to contain a Spring EL expression.
- *
+ *
* Subclasses are expected to extract tag attribute values from the specific rendering
* technology, evaluate them as expressions if necessary, and set the String-based
* attributes of this class.
diff --git a/test/src/main/java/org/springframework/security/test/context/support/WithUserDetails.java b/test/src/main/java/org/springframework/security/test/context/support/WithUserDetails.java
index cf28e5bd56..32e5e42e04 100644
--- a/test/src/main/java/org/springframework/security/test/context/support/WithUserDetails.java
+++ b/test/src/main/java/org/springframework/security/test/context/support/WithUserDetails.java
@@ -40,9 +40,7 @@ import org.springframework.test.web.servlet.MockMvc;
*
The {@link SecurityContext} created with be that of
* {@link SecurityContextHolder#createEmptyContext()}
* It will be populated with an {@link UsernamePasswordAuthenticationToken} that uses
- * the username of either {@link #value()} or {@link #username()},
- * {@link GrantedAuthority} that are specified by {@link #roles()}, and a password
- * specified by {@link #password()}.
+ * the username of {@link #value()}.
*
*
* @see WithMockUser
diff --git a/test/src/main/java/org/springframework/security/test/web/servlet/request/SecurityMockMvcRequestPostProcessors.java b/test/src/main/java/org/springframework/security/test/web/servlet/request/SecurityMockMvcRequestPostProcessors.java
index e45755fa00..c5e28a9ec4 100644
--- a/test/src/main/java/org/springframework/security/test/web/servlet/request/SecurityMockMvcRequestPostProcessors.java
+++ b/test/src/main/java/org/springframework/security/test/web/servlet/request/SecurityMockMvcRequestPostProcessors.java
@@ -168,7 +168,7 @@ public final class SecurityMockMvcRequestPostProcessors {
* for the {@link Authentication#getPrincipal()} and a custom {@link UserDetails}. All
* details are declarative and do not require that the user actually exists.
*
- * @param user the UserDetails to populate
+ * @param authentication the Authentication to populate
* @return the {@link RequestPostProcessor} to use
*/
public static RequestPostProcessor authentication(Authentication authentication) {
@@ -635,10 +635,10 @@ public final class SecurityMockMvcRequestPostProcessors {
* {@link #authorities(GrantedAuthority...)}, but just not as flexible.
*
* @param roles The roles to populate. Note that if the role does not start with
- * {@link #rolePrefix(String)} it will automatically be prepended. This means by
+ * {@link #ROLE_PREFIX} it will automatically be prepended. This means by
* default {@code roles("ROLE_USER")} and {@code roles("USER")} are equivalent.
* @see #authorities(GrantedAuthority...)
- * @see #rolePrefix(String)
+ * @see #ROLE_PREFIX
* @return the UserRequestPostProcessor for further customizations
*/
public UserRequestPostProcessor roles(String... roles) {
diff --git a/test/src/main/java/org/springframework/security/test/web/servlet/response/SecurityMockMvcResultMatchers.java b/test/src/main/java/org/springframework/security/test/web/servlet/response/SecurityMockMvcResultMatchers.java
index c44a930efe..7078514dd9 100644
--- a/test/src/main/java/org/springframework/security/test/web/servlet/response/SecurityMockMvcResultMatchers.java
+++ b/test/src/main/java/org/springframework/security/test/web/servlet/response/SecurityMockMvcResultMatchers.java
@@ -202,7 +202,7 @@ public final class SecurityMockMvcResultMatchers {
/**
* Specifies the {@link Authentication#getAuthorities()}
*
- * @param expected the roles. Each value is automatically prefixed with "ROLE_"
+ * @param roles the roles. Each value is automatically prefixed with "ROLE_"
* @return the {@link AuthenticatedMatcher} for further customization
*/
public AuthenticatedMatcher withRoles(String... roles) {
diff --git a/test/src/main/java/org/springframework/security/test/web/support/WebTestUtils.java b/test/src/main/java/org/springframework/security/test/web/support/WebTestUtils.java
index 96f7c1f830..360d51d005 100644
--- a/test/src/main/java/org/springframework/security/test/web/support/WebTestUtils.java
+++ b/test/src/main/java/org/springframework/security/test/web/support/WebTestUtils.java
@@ -69,8 +69,6 @@ public abstract class WebTestUtils {
* @param request the {@link HttpServletRequest} to obtain the
* {@link SecurityContextRepository}
* @param securityContextRepository the {@link SecurityContextRepository} to set
- * @return the {@link SecurityContextRepository} for the specified
- * {@link HttpServletRequest}
*/
public static void setSecurityContextRepository(HttpServletRequest request,
SecurityContextRepository securityContextRepository) {
diff --git a/web/src/main/java/org/springframework/security/web/FilterChainProxy.java b/web/src/main/java/org/springframework/security/web/FilterChainProxy.java
index b3345730d4..841a85b2cd 100644
--- a/web/src/main/java/org/springframework/security/web/FilterChainProxy.java
+++ b/web/src/main/java/org/springframework/security/web/FilterChainProxy.java
@@ -59,14 +59,14 @@ import java.util.*;
* requests which match the pattern. An example configuration might look like this:
*
*
- * <bean id="myfilterChainProxy" class="org.springframework.security.util.FilterChainProxy">
- * <constructor-arg>
- * <util:list>
- * <security:filter-chain pattern="/do/not/filter*" filters="none"/>
- * <security:filter-chain pattern="/**" filters="filter1,filter2,filter3"/>
- * </util:list>
- * </constructor-arg>
- * </bean>
+ * <bean id="myfilterChainProxy" class="org.springframework.security.util.FilterChainProxy">
+ * <constructor-arg>
+ * <util:list>
+ * <security:filter-chain pattern="/do/not/filter*" filters="none"/>
+ * <security:filter-chain pattern="/**" filters="filter1,filter2,filter3"/>
+ * </util:list>
+ * </constructor-arg>
+ * </bean>
*
*
* The names "filter1", "filter2", "filter3" should be the bean names of {@code Filter}
diff --git a/web/src/main/java/org/springframework/security/web/PortMapperImpl.java b/web/src/main/java/org/springframework/security/web/PortMapperImpl.java
index 74f20ee371..b81976994f 100644
--- a/web/src/main/java/org/springframework/security/web/PortMapperImpl.java
+++ b/web/src/main/java/org/springframework/security/web/PortMapperImpl.java
@@ -50,7 +50,7 @@ public class PortMapperImpl implements PortMapper {
// ========================================================================================================
/**
- * Returns the translated (Integer -> Integer) version of the original port mapping
+ * Returns the translated (Integer -> Integer) version of the original port mapping
* specified via setHttpsPortMapping()
*/
public Map getTranslatedPortMappings() {
@@ -77,12 +77,12 @@ public class PortMapperImpl implements PortMapper {
* like this:
*
*
- * <property name="portMappings">
- * <map>
- * <entry key="80"><value>443</value></entry>
- * <entry key="8080"><value>8443</value></entry>
- * </map>
- * </property>
+ * <property name="portMappings">
+ * <map>
+ * <entry key="80"><value>443</value></entry>
+ * <entry key="8080"><value>8443</value></entry>
+ * </map>
+ * </property>
*
*
* @param newMappings A Map consisting of String keys and String values, where for
diff --git a/web/src/main/java/org/springframework/security/web/access/channel/ChannelProcessingFilter.java b/web/src/main/java/org/springframework/security/web/access/channel/ChannelProcessingFilter.java
index e3d8312166..de992b8bb1 100644
--- a/web/src/main/java/org/springframework/security/web/access/channel/ChannelProcessingFilter.java
+++ b/web/src/main/java/org/springframework/security/web/access/channel/ChannelProcessingFilter.java
@@ -50,30 +50,30 @@ import org.springframework.web.filter.GenericFilterBean;
*
*
*
- * <bean id="channelProcessingFilter" class="org.springframework.security.web.access.channel.ChannelProcessingFilter">
- * <property name="channelDecisionManager" ref="channelDecisionManager"/>
- * <property name="securityMetadataSource">
- * <security:filter-security-metadata-source request-matcher="regex">
- * <security:intercept-url pattern="\A/secure/.*\Z" access="REQUIRES_SECURE_CHANNEL"/>
- * <security:intercept-url pattern="\A/login.jsp.*\Z" access="REQUIRES_SECURE_CHANNEL"/>
- * <security:intercept-url pattern="\A/.*\Z" access="ANY_CHANNEL"/>
- * </security:filter-security-metadata-source>
- * </property>
- * </bean>
+ * <bean id="channelProcessingFilter" class="org.springframework.security.web.access.channel.ChannelProcessingFilter">
+ * <property name="channelDecisionManager" ref="channelDecisionManager"/>
+ * <property name="securityMetadataSource">
+ * <security:filter-security-metadata-source request-matcher="regex">
+ * <security:intercept-url pattern="\A/secure/.*\Z" access="REQUIRES_SECURE_CHANNEL"/>
+ * <security:intercept-url pattern="\A/login.jsp.*\Z" access="REQUIRES_SECURE_CHANNEL"/>
+ * <security:intercept-url pattern="\A/.*\Z" access="ANY_CHANNEL"/>
+ * </security:filter-security-metadata-source>
+ * </property>
+ * </bean>
*
- * <bean id="channelDecisionManager" class="org.springframework.security.web.access.channel.ChannelDecisionManagerImpl">
- * <property name="channelProcessors">
- * <list>
- * <ref bean="secureChannelProcessor"/>
- * <ref bean="insecureChannelProcessor"/>
- * </list>
- * </property>
- * </bean>
+ * <bean id="channelDecisionManager" class="org.springframework.security.web.access.channel.ChannelDecisionManagerImpl">
+ * <property name="channelProcessors">
+ * <list>
+ * <ref bean="secureChannelProcessor"/>
+ * <ref bean="insecureChannelProcessor"/>
+ * </list>
+ * </property>
+ * </bean>
*
* <bean id="secureChannelProcessor"
- * class="org.springframework.security.web.access.channel.SecureChannelProcessor"/>
+ * class="org.springframework.security.web.access.channel.SecureChannelProcessor"/>
* <bean id="insecureChannelProcessor"
- * class="org.springframework.security.web.access.channel.InsecureChannelProcessor"/>
+ * class="org.springframework.security.web.access.channel.InsecureChannelProcessor"/>
*
*
*
diff --git a/web/src/main/java/org/springframework/security/web/access/expression/DefaultWebSecurityExpressionHandler.java b/web/src/main/java/org/springframework/security/web/access/expression/DefaultWebSecurityExpressionHandler.java
index 55d9e1c494..2b4ff7d89c 100644
--- a/web/src/main/java/org/springframework/security/web/access/expression/DefaultWebSecurityExpressionHandler.java
+++ b/web/src/main/java/org/springframework/security/web/access/expression/DefaultWebSecurityExpressionHandler.java
@@ -46,8 +46,8 @@ public class DefaultWebSecurityExpressionHandler extends
/**
*
- * Sets the default prefix to be added to {@link #hasAnyRole(String...)} or
- * {@link #hasRole(String)}. For example, if hasRole("ADMIN") or hasRole("ROLE_ADMIN")
+ * Sets the default prefix to be added to {@link org.springframework.security.access.expression.SecurityExpressionRoot#hasAnyRole(String...)} or
+ * {@link org.springframework.security.access.expression.SecurityExpressionRoot#hasRole(String)}. For example, if hasRole("ADMIN") or hasRole("ROLE_ADMIN")
* is passed in, then the role ROLE_ADMIN will be used when the defaultRolePrefix is
* "ROLE_" (default).
*
diff --git a/web/src/main/java/org/springframework/security/web/authentication/SavedRequestAwareAuthenticationSuccessHandler.java b/web/src/main/java/org/springframework/security/web/authentication/SavedRequestAwareAuthenticationSuccessHandler.java
index f971e83cdb..6dc2b7713f 100644
--- a/web/src/main/java/org/springframework/security/web/authentication/SavedRequestAwareAuthenticationSuccessHandler.java
+++ b/web/src/main/java/org/springframework/security/web/authentication/SavedRequestAwareAuthenticationSuccessHandler.java
@@ -10,15 +10,14 @@ import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;
import org.springframework.security.core.Authentication;
import org.springframework.security.web.access.ExceptionTranslationFilter;
-import org.springframework.security.web.savedrequest.HttpSessionRequestCache;
-import org.springframework.security.web.savedrequest.RequestCache;
-import org.springframework.security.web.savedrequest.SavedRequest;
-import org.springframework.security.web.savedrequest.DefaultSavedRequest;
import org.springframework.util.StringUtils;
+import org.springframework.security.web.savedrequest.SavedRequest;
+import org.springframework.security.web.savedrequest.RequestCache;
+import org.springframework.security.web.savedrequest.HttpSessionRequestCache;
/**
* An authentication success strategy which can make use of the
- * {@link DefaultSavedRequest} which may have been stored in the session by the
+ * {@link org.springframework.security.web.savedrequest.DefaultSavedRequest} which may have been stored in the session by the
* {@link ExceptionTranslationFilter}. When such a request is intercepted and requires
* authentication, the request data is stored to record the original destination before
* the authentication process commenced, and to allow the request to be reconstructed when
@@ -36,15 +35,15 @@ import org.springframework.util.StringUtils;
* If the {@code targetUrlParameter} has been set on the request, the value will be used
* as the destination. Any {@code DefaultSavedRequest} will again be removed.
*
- * If a {@link SavedRequest} is found in the {@code RequestCache} (as set by the
+ * If a {@link org.springframework.security.web.savedrequest.SavedRequest} is found in the {@code RequestCache} (as set by the
* {@link ExceptionTranslationFilter} to record the original destination before the
* authentication process commenced), a redirect will be performed to the Url of that
* original destination. The {@code SavedRequest} object will remain cached and be picked
* up when the redirected request is received (See
- * {@link org.springframework.security.web.savedrequest.SavedRequestAwareWrapper
- * SavedRequestAwareWrapper}).
+ * SavedRequestAwareWrapper).
+ *
*
- * If no {@code SavedRequest} is found, it will delegate to the base class.
+ * If no {@link org.springframework.security.web.savedrequest.SavedRequest} is found, it will delegate to the base class.
*
*
* @author Luke Taylor
diff --git a/web/src/main/java/org/springframework/security/web/authentication/session/ChangeSessionIdAuthenticationStrategy.java b/web/src/main/java/org/springframework/security/web/authentication/session/ChangeSessionIdAuthenticationStrategy.java
index 6b08a9a1c9..f84a6c90f1 100644
--- a/web/src/main/java/org/springframework/security/web/authentication/session/ChangeSessionIdAuthenticationStrategy.java
+++ b/web/src/main/java/org/springframework/security/web/authentication/session/ChangeSessionIdAuthenticationStrategy.java
@@ -23,7 +23,7 @@ import javax.servlet.http.HttpSession;
import org.springframework.util.ReflectionUtils;
/**
- * Uses {@link HttpServletRequest#changeSessionId()} to protect against session fixation
+ * Uses {@code HttpServletRequest.changeSessionId()} to protect against session fixation
* attacks. This is the default implementation for Servlet 3.1+.
*
* @author Rob Winch
diff --git a/web/src/main/java/org/springframework/security/web/authentication/session/RegisterSessionAuthenticationStrategy.java b/web/src/main/java/org/springframework/security/web/authentication/session/RegisterSessionAuthenticationStrategy.java
index 9febfde5f4..bb178306fb 100644
--- a/web/src/main/java/org/springframework/security/web/authentication/session/RegisterSessionAuthenticationStrategy.java
+++ b/web/src/main/java/org/springframework/security/web/authentication/session/RegisterSessionAuthenticationStrategy.java
@@ -16,13 +16,12 @@ import org.springframework.util.Assert;
* {@link RegisterSessionAuthenticationStrategy} is typically used in combination with
* {@link CompositeSessionAuthenticationStrategy} and
* {@link ConcurrentSessionControlAuthenticationStrategy}, but can be used on its own if
- * tracking of sessions is desired but no need to control concurrency.
* NOTE: When using a {@link SessionRegistry} it is important that all sessions (including
* timed out sessions) are removed. This is typically done by adding
* {@link HttpSessionEventPublisher}.
- *
*
* @see CompositeSessionAuthenticationStrategy
*
diff --git a/web/src/main/java/org/springframework/security/web/authentication/session/SessionFixationProtectionStrategy.java b/web/src/main/java/org/springframework/security/web/authentication/session/SessionFixationProtectionStrategy.java
index 78526f4450..061b4b34ff 100644
--- a/web/src/main/java/org/springframework/security/web/authentication/session/SessionFixationProtectionStrategy.java
+++ b/web/src/main/java/org/springframework/security/web/authentication/session/SessionFixationProtectionStrategy.java
@@ -27,7 +27,7 @@ import javax.servlet.http.HttpSession;
import org.springframework.util.Assert;
/**
- * The default implementation of {@link SessionAuthenticationStrategy} when using <
+ * The default implementation of {@link SessionAuthenticationStrategy} when using <
* Servlet 3.1.
*
* Creates a new session for the newly authenticated user if they already have a session
diff --git a/web/src/main/java/org/springframework/security/web/authentication/switchuser/SwitchUserFilter.java b/web/src/main/java/org/springframework/security/web/authentication/switchuser/SwitchUserFilter.java
index cdc23a4152..52d51fe5bb 100644
--- a/web/src/main/java/org/springframework/security/web/authentication/switchuser/SwitchUserFilter.java
+++ b/web/src/main/java/org/springframework/security/web/authentication/switchuser/SwitchUserFilter.java
@@ -92,12 +92,12 @@ import org.springframework.web.filter.GenericFilterBean;
* correct constraints to the switchUserUrl. Example:
*
*
- * <bean id="switchUserProcessingFilter" class="org.springframework.security.web.authentication.switchuser.SwitchUserFilter">
- * <property name="userDetailsService" ref="userDetailsService" />
- * <property name="switchUserUrl" value="/login/impersonate" />
- * <property name="exitUserUrl" value="/logout/impersonate" />
- * <property name="targetUrl" value="/index.jsp" />
- * </bean>
+ * <bean id="switchUserProcessingFilter" class="org.springframework.security.web.authentication.switchuser.SwitchUserFilter">
+ * <property name="userDetailsService" ref="userDetailsService" />
+ * <property name="switchUserUrl" value="/login/impersonate" />
+ * <property name="exitUserUrl" value="/logout/impersonate" />
+ * <property name="targetUrl" value="/index.jsp" />
+ * </bean>
*
*
* @author Mark St.Godard
diff --git a/web/src/main/java/org/springframework/security/web/bind/support/AuthenticationPrincipalArgumentResolver.java b/web/src/main/java/org/springframework/security/web/bind/support/AuthenticationPrincipalArgumentResolver.java
index 25e36a1713..e1083756d7 100644
--- a/web/src/main/java/org/springframework/security/web/bind/support/AuthenticationPrincipalArgumentResolver.java
+++ b/web/src/main/java/org/springframework/security/web/bind/support/AuthenticationPrincipalArgumentResolver.java
@@ -34,13 +34,14 @@ import org.springframework.web.method.support.ModelAndViewContainer;
* {@link Controller}:
*
*
- * @Controller
+ * @Controller
* public class MyController {
- * @RequestMapping("/user/current/show")
+ * @RequestMapping("/user/current/show")
* public String show(@AuthenticationPrincipal CustomUser customUser) {
* // do something with CustomUser
* return "view";
* }
+ * }
*
*
*
@@ -50,11 +51,9 @@ import org.springframework.web.method.support.ModelAndViewContainer;
* match, null will be returned unless
* {@link AuthenticationPrincipal#errorOnInvalidType()} is true in which case a
* {@link ClassCastException} will be thrown.
- *
*
*
* Alternatively, users can create a custom meta annotation as shown below:
- *
*
*
* @Target({ ElementType.PARAMETER })
@@ -66,16 +65,16 @@ import org.springframework.web.method.support.ModelAndViewContainer;
*
*
* The custom annotation can then be used instead. For example:
- *
*
*
- * @Controller
+ * @Controller
* public class MyController {
- * @RequestMapping("/user/current/show")
+ * @RequestMapping("/user/current/show")
* public String show(@CurrentUser CustomUser customUser) {
* // do something with CustomUser
* return "view";
* }
+ * }
*
*
* @deprecated use org.springframework.security.web.method.annotation.
diff --git a/web/src/main/java/org/springframework/security/web/context/AbstractSecurityWebApplicationInitializer.java b/web/src/main/java/org/springframework/security/web/context/AbstractSecurityWebApplicationInitializer.java
index f329c1269d..0254d38a1e 100644
--- a/web/src/main/java/org/springframework/security/web/context/AbstractSecurityWebApplicationInitializer.java
+++ b/web/src/main/java/org/springframework/security/web/context/AbstractSecurityWebApplicationInitializer.java
@@ -267,7 +267,7 @@ public abstract class AbstractSecurityWebApplicationInitializer implements
}
/**
- * Return the to use the DispatcherServlet's
+ * Return the <servlet-name> to use the DispatcherServlet's
* {@link WebApplicationContext} to find the {@link DelegatingFilterProxy} or null to
* use the parent {@link ApplicationContext}.
*
@@ -278,7 +278,7 @@ public abstract class AbstractSecurityWebApplicationInitializer implements
* {@link WebApplicationContext}.
*
*
- * @return the of the DispatcherServlet to use its
+ * @return the <servlet-name> of the DispatcherServlet to use its
* {@link WebApplicationContext} or null (default) to use the parent
* {@link ApplicationContext}.
*/
diff --git a/web/src/main/java/org/springframework/security/web/csrf/InvalidCsrfTokenException.java b/web/src/main/java/org/springframework/security/web/csrf/InvalidCsrfTokenException.java
index ab4577a607..63a9b0e3aa 100644
--- a/web/src/main/java/org/springframework/security/web/csrf/InvalidCsrfTokenException.java
+++ b/web/src/main/java/org/springframework/security/web/csrf/InvalidCsrfTokenException.java
@@ -28,7 +28,8 @@ import javax.servlet.http.HttpServletRequest;
public class InvalidCsrfTokenException extends CsrfException {
/**
- * @param msg
+ * @param expectedAccessToken
+ * @param actualAccessToken
*/
public InvalidCsrfTokenException(CsrfToken expectedAccessToken,
String actualAccessToken) {
diff --git a/web/src/main/java/org/springframework/security/web/header/writers/XXssProtectionHeaderWriter.java b/web/src/main/java/org/springframework/security/web/header/writers/XXssProtectionHeaderWriter.java
index 429a74c1fb..1ed6d44329 100644
--- a/web/src/main/java/org/springframework/security/web/header/writers/XXssProtectionHeaderWriter.java
+++ b/web/src/main/java/org/springframework/security/web/header/writers/XXssProtectionHeaderWriter.java
@@ -85,7 +85,7 @@ public final class XXssProtectionHeaderWriter implements HeaderWriter {
* If false, will not specify the mode as blocked. In this instance, any content will
* be attempted to be fixed. If true, the content will be replaced with "#".
*
- * @param enabled the new value
+ * @param block the new value
*/
public void setBlock(boolean block) {
if (!enabled && block) {
diff --git a/web/src/main/java/org/springframework/security/web/header/writers/frameoptions/RegExpAllowFromStrategy.java b/web/src/main/java/org/springframework/security/web/header/writers/frameoptions/RegExpAllowFromStrategy.java
index 9badedbe9f..d7e8a102d0 100644
--- a/web/src/main/java/org/springframework/security/web/header/writers/frameoptions/RegExpAllowFromStrategy.java
+++ b/web/src/main/java/org/springframework/security/web/header/writers/frameoptions/RegExpAllowFromStrategy.java
@@ -7,7 +7,7 @@ import java.util.regex.Pattern;
/**
* Implementation which uses a regular expression to validate the supplied origin. If the
* value of the HTTP parameter matches the pattern, then the the result will be ALLOW-FROM
- * .
+ * <paramter-value>.
*
* @author Marten Deinum
* @since 3.2
diff --git a/web/src/main/java/org/springframework/security/web/header/writers/frameoptions/XFrameOptionsHeaderWriter.java b/web/src/main/java/org/springframework/security/web/header/writers/frameoptions/XFrameOptionsHeaderWriter.java
index ab3ff499c1..1c9c32b1ca 100644
--- a/web/src/main/java/org/springframework/security/web/header/writers/frameoptions/XFrameOptionsHeaderWriter.java
+++ b/web/src/main/java/org/springframework/security/web/header/writers/frameoptions/XFrameOptionsHeaderWriter.java
@@ -50,7 +50,7 @@ public final class XFrameOptionsHeaderWriter implements HeaderWriter {
*
* @param frameOptionsMode the {@link XFrameOptionsMode} to use. If using
* {@link XFrameOptionsMode#ALLOW_FROM}, use
- * {@link #FrameOptionsHeaderWriter(AllowFromStrategy)} instead.
+ * {@link #XFrameOptionsHeaderWriter(AllowFromStrategy)} instead.
*/
public XFrameOptionsHeaderWriter(XFrameOptionsMode frameOptionsMode) {
Assert.notNull(frameOptionsMode, "frameOptionsMode cannot be null");
diff --git a/web/src/main/java/org/springframework/security/web/method/annotation/AuthenticationPrincipalArgumentResolver.java b/web/src/main/java/org/springframework/security/web/method/annotation/AuthenticationPrincipalArgumentResolver.java
index ba56970760..5261658ea8 100644
--- a/web/src/main/java/org/springframework/security/web/method/annotation/AuthenticationPrincipalArgumentResolver.java
+++ b/web/src/main/java/org/springframework/security/web/method/annotation/AuthenticationPrincipalArgumentResolver.java
@@ -34,12 +34,13 @@ import org.springframework.web.method.support.ModelAndViewContainer;
* {@link Controller}:
*
*
- * @Controller
+ * @Controller
* public class MyController {
- * @MessageMapping("/im")
+ * @MessageMapping("/im")
* public void im(@AuthenticationPrincipal CustomUser customUser) {
* // do something with CustomUser
* }
+ * }
*
*
*
@@ -49,11 +50,9 @@ import org.springframework.web.method.support.ModelAndViewContainer;
* match, null will be returned unless
* {@link AuthenticationPrincipal#errorOnInvalidType()} is true in which case a
* {@link ClassCastException} will be thrown.
- *
*
*
* Alternatively, users can create a custom meta annotation as shown below:
- *
*
*
* @Target({ ElementType.PARAMETER })
@@ -65,15 +64,15 @@ import org.springframework.web.method.support.ModelAndViewContainer;
*
*
* The custom annotation can then be used instead. For example:
- *
*
*
- * @Controller
+ * @Controller
* public class MyController {
- * @MessageMapping("/im")
+ * @MessageMapping("/im")
* public void im(@CurrentUser CustomUser customUser) {
* // do something with CustomUser
* }
+ * }
*
*
* @author Rob Winch
diff --git a/web/src/main/java/org/springframework/security/web/savedrequest/SavedRequestAwareWrapper.java b/web/src/main/java/org/springframework/security/web/savedrequest/SavedRequestAwareWrapper.java
index 21480decec..1c213c06bf 100644
--- a/web/src/main/java/org/springframework/security/web/savedrequest/SavedRequestAwareWrapper.java
+++ b/web/src/main/java/org/springframework/security/web/savedrequest/SavedRequestAwareWrapper.java
@@ -43,7 +43,6 @@ import org.apache.commons.logging.LogFactory;
* wrapper. Nevertheless, the important data from the original request is emulated and
* this should prove adequate for most purposes (in particular standard HTTP GET and POST
* operations).
- *
*
*
* Added into a request by
diff --git a/web/src/main/java/org/springframework/security/web/servletapi/SecurityContextHolderAwareRequestFilter.java b/web/src/main/java/org/springframework/security/web/servletapi/SecurityContextHolderAwareRequestFilter.java
index ad6712a348..cf638c33e2 100644
--- a/web/src/main/java/org/springframework/security/web/servletapi/SecurityContextHolderAwareRequestFilter.java
+++ b/web/src/main/java/org/springframework/security/web/servletapi/SecurityContextHolderAwareRequestFilter.java
@@ -155,7 +155,7 @@ public class SecurityContextHolderAwareRequestFilter extends GenericFilterBean {
* when invoking {@link HttpServletRequest#logout()}.
*
*
- * @param logoutHandlers the {@link List}s when invoking
+ * @param logoutHandlers the {@code List<LogoutHandler>}s when invoking
* {@link HttpServletRequest#logout()}.
*
* @throws IllegalStateException if the Servlet 3 APIs are not found on the classpath
diff --git a/web/src/main/java/org/springframework/security/web/util/ThrowableAnalyzer.java b/web/src/main/java/org/springframework/security/web/util/ThrowableAnalyzer.java
index 90a0239b3d..34b88f0870 100755
--- a/web/src/main/java/org/springframework/security/web/util/ThrowableAnalyzer.java
+++ b/web/src/main/java/org/springframework/security/web/util/ThrowableAnalyzer.java
@@ -102,8 +102,11 @@ public class ThrowableAnalyzer {
/**
* Initializes associations between Throwable
s and
* ThrowableCauseExtractor
s. The default implementation performs the
- * following registrations: {@link #DEFAULT_EXTRACTOR} for {@link Throwable}
- * {@link #INVOCATIONTARGET_EXTRACTOR} for {@link InvocationTargetException}
+ * following registrations:
+ *
+ * - {@link #DEFAULT_EXTRACTOR} for {@link Throwable}
+ * - {@link #INVOCATIONTARGET_EXTRACTOR} for {@link InvocationTargetException}
+ *
* Subclasses overriding this method are encouraged to invoke the super method to
* perform the default registrations. They can register additional extractors as
* required.