Cleanup redundant type casts
This commit is contained in:
parent
43737a56bd
commit
c5b5cc507c
|
@ -455,7 +455,7 @@ public class BasicLookupStrategy implements LookupStrategy {
|
||||||
|
|
||||||
// Now we have the parent (if there is one), create the true AclImpl
|
// Now we have the parent (if there is one), create the true AclImpl
|
||||||
AclImpl result = new AclImpl(inputAcl.getObjectIdentity(),
|
AclImpl result = new AclImpl(inputAcl.getObjectIdentity(),
|
||||||
(Long) inputAcl.getId(), aclAuthorizationStrategy, grantingStrategy,
|
inputAcl.getId(), aclAuthorizationStrategy, grantingStrategy,
|
||||||
parent, null, inputAcl.isEntriesInheriting(), inputAcl.getOwner());
|
parent, null, inputAcl.isEntriesInheriting(), inputAcl.getOwner());
|
||||||
|
|
||||||
// Copy the "aces" from the input to the destination
|
// Copy the "aces" from the input to the destination
|
||||||
|
|
|
@ -118,7 +118,7 @@ public class JdbcAclService implements AclService {
|
||||||
Assert.isTrue(map.containsKey(object),
|
Assert.isTrue(map.containsKey(object),
|
||||||
() -> "There should have been an Acl entry for ObjectIdentity " + object);
|
() -> "There should have been an Acl entry for ObjectIdentity " + object);
|
||||||
|
|
||||||
return (Acl) map.get(object);
|
return map.get(object);
|
||||||
}
|
}
|
||||||
|
|
||||||
public Acl readAclById(ObjectIdentity object) throws NotFoundException {
|
public Acl readAclById(ObjectIdentity object) throws NotFoundException {
|
||||||
|
|
|
@ -501,13 +501,13 @@ public class AclImplTests {
|
||||||
assertThat(acl.isSidLoaded(BEN)).isTrue();
|
assertThat(acl.isSidLoaded(BEN)).isTrue();
|
||||||
assertThat(acl.isSidLoaded(null)).isTrue();
|
assertThat(acl.isSidLoaded(null)).isTrue();
|
||||||
assertThat(acl.isSidLoaded(new ArrayList<>(0))).isTrue();
|
assertThat(acl.isSidLoaded(new ArrayList<>(0))).isTrue();
|
||||||
assertThat(acl.isSidLoaded(Arrays.asList((Sid) new GrantedAuthoritySid(
|
assertThat(acl.isSidLoaded(Arrays.asList(new GrantedAuthoritySid(
|
||||||
"ROLE_IGNORED"), new GrantedAuthoritySid("ROLE_IGNORED"))))
|
"ROLE_IGNORED"), new GrantedAuthoritySid("ROLE_IGNORED"))))
|
||||||
.isTrue();
|
.isTrue();
|
||||||
assertThat(acl.isSidLoaded(Arrays.asList((Sid) new GrantedAuthoritySid(
|
assertThat(acl.isSidLoaded(Arrays.asList(new GrantedAuthoritySid(
|
||||||
"ROLE_GENERAL"), new GrantedAuthoritySid("ROLE_IGNORED"))))
|
"ROLE_GENERAL"), new GrantedAuthoritySid("ROLE_IGNORED"))))
|
||||||
.isFalse();
|
.isFalse();
|
||||||
assertThat(acl.isSidLoaded(Arrays.asList((Sid) new GrantedAuthoritySid(
|
assertThat(acl.isSidLoaded(Arrays.asList(new GrantedAuthoritySid(
|
||||||
"ROLE_IGNORED"), new GrantedAuthoritySid("ROLE_GENERAL"))))
|
"ROLE_IGNORED"), new GrantedAuthoritySid("ROLE_GENERAL"))))
|
||||||
.isFalse();
|
.isFalse();
|
||||||
}
|
}
|
||||||
|
|
|
@ -319,7 +319,7 @@ public class JdbcMutableAclServiceTests extends
|
||||||
|
|
||||||
Acl acl = jdbcMutableAclService.readAclById(getTopParentOid());
|
Acl acl = jdbcMutableAclService.readAclById(getTopParentOid());
|
||||||
assertThat(acl).isNotNull();
|
assertThat(acl).isNotNull();
|
||||||
assertThat(getTopParentOid()).isEqualTo(((MutableAcl) acl).getObjectIdentity());
|
assertThat(getTopParentOid()).isEqualTo(acl.getObjectIdentity());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
|
|
@ -17,7 +17,6 @@
|
||||||
package org.springframework.security.cas.jackson2;
|
package org.springframework.security.cas.jackson2;
|
||||||
|
|
||||||
import com.fasterxml.jackson.core.Version;
|
import com.fasterxml.jackson.core.Version;
|
||||||
import com.fasterxml.jackson.databind.ObjectMapper;
|
|
||||||
import com.fasterxml.jackson.databind.module.SimpleModule;
|
import com.fasterxml.jackson.databind.module.SimpleModule;
|
||||||
import org.jasig.cas.client.authentication.AttributePrincipalImpl;
|
import org.jasig.cas.client.authentication.AttributePrincipalImpl;
|
||||||
import org.jasig.cas.client.validation.AssertionImpl;
|
import org.jasig.cas.client.validation.AssertionImpl;
|
||||||
|
@ -48,7 +47,7 @@ public class CasJackson2Module extends SimpleModule {
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void setupModule(SetupContext context) {
|
public void setupModule(SetupContext context) {
|
||||||
SecurityJackson2Modules.enableDefaultTyping((ObjectMapper) context.getOwner());
|
SecurityJackson2Modules.enableDefaultTyping(context.getOwner());
|
||||||
context.setMixInAnnotations(AssertionImpl.class, AssertionImplMixin.class);
|
context.setMixInAnnotations(AssertionImpl.class, AssertionImplMixin.class);
|
||||||
context.setMixInAnnotations(AttributePrincipalImpl.class, AttributePrincipalImplMixin.class);
|
context.setMixInAnnotations(AttributePrincipalImpl.class, AttributePrincipalImplMixin.class);
|
||||||
context.setMixInAnnotations(CasAuthenticationToken.class, CasAuthenticationTokenMixin.class);
|
context.setMixInAnnotations(CasAuthenticationToken.class, CasAuthenticationTokenMixin.class);
|
||||||
|
|
|
@ -287,6 +287,6 @@ public class AuthenticationManagerBuilder
|
||||||
private <C extends UserDetailsAwareConfigurer<AuthenticationManagerBuilder, ? extends UserDetailsService>> C apply(
|
private <C extends UserDetailsAwareConfigurer<AuthenticationManagerBuilder, ? extends UserDetailsService>> C apply(
|
||||||
C configurer) throws Exception {
|
C configurer) throws Exception {
|
||||||
this.defaultUserDetailsService = configurer.getUserDetailsService();
|
this.defaultUserDetailsService = configurer.getUserDetailsService();
|
||||||
return (C) super.apply(configurer);
|
return super.apply(configurer);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -2072,11 +2072,11 @@ public class OAuth2ResourceServerConfigurerTests {
|
||||||
}
|
}
|
||||||
|
|
||||||
private <T> T bean(Class<T> beanClass) {
|
private <T> T bean(Class<T> beanClass) {
|
||||||
return (T) this.spring.getContext().getBean(beanClass);
|
return this.spring.getContext().getBean(beanClass);
|
||||||
}
|
}
|
||||||
|
|
||||||
private <T> T verifyBean(Class<T> beanClass) {
|
private <T> T verifyBean(Class<T> beanClass) {
|
||||||
return (T) verify(this.spring.getContext().getBean(beanClass));
|
return verify(this.spring.getContext().getBean(beanClass));
|
||||||
}
|
}
|
||||||
|
|
||||||
private String json(String name) throws IOException {
|
private String json(String name) throws IOException {
|
||||||
|
|
|
@ -23,7 +23,7 @@ public final class ExpressionUtils {
|
||||||
|
|
||||||
public static boolean evaluateAsBoolean(Expression expr, EvaluationContext ctx) {
|
public static boolean evaluateAsBoolean(Expression expr, EvaluationContext ctx) {
|
||||||
try {
|
try {
|
||||||
return ((Boolean) expr.getValue(ctx, Boolean.class)).booleanValue();
|
return expr.getValue(ctx, Boolean.class).booleanValue();
|
||||||
}
|
}
|
||||||
catch (EvaluationException e) {
|
catch (EvaluationException e) {
|
||||||
throw new IllegalArgumentException("Failed to evaluate expression '"
|
throw new IllegalArgumentException("Failed to evaluate expression '"
|
||||||
|
|
|
@ -98,7 +98,7 @@ public class MapBasedMethodSecurityMetadataSource extends
|
||||||
Class<?> clazz) {
|
Class<?> clazz) {
|
||||||
RegisteredMethod registeredMethod = new RegisteredMethod(method, clazz);
|
RegisteredMethod registeredMethod = new RegisteredMethod(method, clazz);
|
||||||
if (methodMap.containsKey(registeredMethod)) {
|
if (methodMap.containsKey(registeredMethod)) {
|
||||||
return (List<ConfigAttribute>) methodMap.get(registeredMethod);
|
return methodMap.get(registeredMethod);
|
||||||
}
|
}
|
||||||
// Search superclass
|
// Search superclass
|
||||||
if (clazz.getSuperclass() != null) {
|
if (clazz.getSuperclass() != null) {
|
||||||
|
@ -166,7 +166,7 @@ public class MapBasedMethodSecurityMetadataSource extends
|
||||||
// register all matching methods
|
// register all matching methods
|
||||||
for (Method method : matchingMethods) {
|
for (Method method : matchingMethods) {
|
||||||
RegisteredMethod registeredMethod = new RegisteredMethod(method, javaType);
|
RegisteredMethod registeredMethod = new RegisteredMethod(method, javaType);
|
||||||
String regMethodName = (String) this.nameMap.get(registeredMethod);
|
String regMethodName = this.nameMap.get(registeredMethod);
|
||||||
|
|
||||||
if ((regMethodName == null)
|
if ((regMethodName == null)
|
||||||
|| (!regMethodName.equals(name) && (regMethodName.length() <= name
|
|| (!regMethodName.equals(name) && (regMethodName.length() <= name
|
||||||
|
|
|
@ -17,7 +17,6 @@
|
||||||
package org.springframework.security.jackson2;
|
package org.springframework.security.jackson2;
|
||||||
|
|
||||||
import com.fasterxml.jackson.core.Version;
|
import com.fasterxml.jackson.core.Version;
|
||||||
import com.fasterxml.jackson.databind.ObjectMapper;
|
|
||||||
import com.fasterxml.jackson.databind.module.SimpleModule;
|
import com.fasterxml.jackson.databind.module.SimpleModule;
|
||||||
import org.springframework.security.authentication.AnonymousAuthenticationToken;
|
import org.springframework.security.authentication.AnonymousAuthenticationToken;
|
||||||
import org.springframework.security.authentication.BadCredentialsException;
|
import org.springframework.security.authentication.BadCredentialsException;
|
||||||
|
@ -54,7 +53,7 @@ public class CoreJackson2Module extends SimpleModule {
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void setupModule(SetupContext context) {
|
public void setupModule(SetupContext context) {
|
||||||
SecurityJackson2Modules.enableDefaultTyping((ObjectMapper) context.getOwner());
|
SecurityJackson2Modules.enableDefaultTyping(context.getOwner());
|
||||||
context.setMixInAnnotations(AnonymousAuthenticationToken.class, AnonymousAuthenticationTokenMixin.class);
|
context.setMixInAnnotations(AnonymousAuthenticationToken.class, AnonymousAuthenticationTokenMixin.class);
|
||||||
context.setMixInAnnotations(RememberMeAuthenticationToken.class, RememberMeAuthenticationTokenMixin.class);
|
context.setMixInAnnotations(RememberMeAuthenticationToken.class, RememberMeAuthenticationTokenMixin.class);
|
||||||
context.setMixInAnnotations(SimpleGrantedAuthority.class, SimpleGrantedAuthorityMixin.class);
|
context.setMixInAnnotations(SimpleGrantedAuthority.class, SimpleGrantedAuthorityMixin.class);
|
||||||
|
|
|
@ -58,7 +58,7 @@ public class AnonymousAuthenticationTokenTests {
|
||||||
|
|
||||||
try {
|
try {
|
||||||
new AnonymousAuthenticationToken("key", "Test",
|
new AnonymousAuthenticationToken("key", "Test",
|
||||||
(List<GrantedAuthority>) null);
|
null);
|
||||||
fail("Should have thrown IllegalArgumentException");
|
fail("Should have thrown IllegalArgumentException");
|
||||||
}
|
}
|
||||||
catch (IllegalArgumentException expected) {
|
catch (IllegalArgumentException expected) {
|
||||||
|
|
|
@ -21,7 +21,6 @@ package org.springframework.security.authentication.dao;
|
||||||
import java.util.HashMap;
|
import java.util.HashMap;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
|
|
||||||
import org.springframework.security.core.userdetails.User;
|
|
||||||
import org.springframework.security.core.userdetails.UserCache;
|
import org.springframework.security.core.userdetails.UserCache;
|
||||||
import org.springframework.security.core.userdetails.UserDetails;
|
import org.springframework.security.core.userdetails.UserDetails;
|
||||||
|
|
||||||
|
@ -29,7 +28,7 @@ public class MockUserCache implements UserCache {
|
||||||
private Map<String, UserDetails> cache = new HashMap<>();
|
private Map<String, UserDetails> cache = new HashMap<>();
|
||||||
|
|
||||||
public UserDetails getUserFromCache(String username) {
|
public UserDetails getUserFromCache(String username) {
|
||||||
return (User) cache.get(username);
|
return cache.get(username);
|
||||||
}
|
}
|
||||||
|
|
||||||
public void putUserInCache(UserDetails user) {
|
public void putUserInCache(UserDetails user) {
|
||||||
|
|
|
@ -62,7 +62,7 @@ public abstract class AbstractDelegatingSecurityContextScheduledExecutorServiceT
|
||||||
@Test
|
@Test
|
||||||
public void scheduleCallable() {
|
public void scheduleCallable() {
|
||||||
when(
|
when(
|
||||||
(ScheduledFuture<Object>) delegate.schedule(wrappedCallable, 1,
|
delegate.schedule(wrappedCallable, 1,
|
||||||
TimeUnit.SECONDS)).thenReturn(expectedResult);
|
TimeUnit.SECONDS)).thenReturn(expectedResult);
|
||||||
ScheduledFuture<Object> result = executor.schedule(callable, 1, TimeUnit.SECONDS);
|
ScheduledFuture<Object> result = executor.schedule(callable, 1, TimeUnit.SECONDS);
|
||||||
assertThat(result).isEqualTo(expectedResult);
|
assertThat(result).isEqualTo(expectedResult);
|
||||||
|
|
|
@ -40,7 +40,7 @@ public class KeyBasedPersistenceTokenServiceTests {
|
||||||
service.setServerSecret("MY:SECRET$$$#");
|
service.setServerSecret("MY:SECRET$$$#");
|
||||||
service.setServerInteger(Integer.valueOf(454545));
|
service.setServerInteger(Integer.valueOf(454545));
|
||||||
try {
|
try {
|
||||||
SecureRandom rnd = (SecureRandom) fb.getObject();
|
SecureRandom rnd = fb.getObject();
|
||||||
service.setSecureRandom(rnd);
|
service.setSecureRandom(rnd);
|
||||||
service.afterPropertiesSet();
|
service.afterPropertiesSet();
|
||||||
}
|
}
|
||||||
|
|
|
@ -406,7 +406,7 @@ public class JdbcUserDetailsManagerTests {
|
||||||
private Map<String, UserDetails> cache = new HashMap<>();
|
private Map<String, UserDetails> cache = new HashMap<>();
|
||||||
|
|
||||||
public UserDetails getUserFromCache(String username) {
|
public UserDetails getUserFromCache(String username) {
|
||||||
return (User) cache.get(username);
|
return cache.get(username);
|
||||||
}
|
}
|
||||||
|
|
||||||
public void putUserInCache(UserDetails user) {
|
public void putUserInCache(UserDetails user) {
|
||||||
|
|
|
@ -120,7 +120,7 @@ public class LdapShaPasswordEncoder implements PasswordEncoder {
|
||||||
sha.update(salt);
|
sha.update(salt);
|
||||||
}
|
}
|
||||||
|
|
||||||
byte[] hash = combineHashAndSalt(sha.digest(), (byte[]) salt);
|
byte[] hash = combineHashAndSalt(sha.digest(), salt);
|
||||||
|
|
||||||
String prefix;
|
String prefix;
|
||||||
|
|
||||||
|
|
|
@ -62,7 +62,7 @@ public class PythonInterpreterPreInvocationAdvice implements
|
||||||
throw new IllegalStateException("Python script did not set the permit flag");
|
throw new IllegalStateException("Python script did not set the permit flag");
|
||||||
}
|
}
|
||||||
|
|
||||||
return (Boolean) Py.tojava(allowed, Boolean.class);
|
return Py.tojava(allowed, Boolean.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
private Map<String, Object> createArgumentMap(MethodInvocation mi) {
|
private Map<String, Object> createArgumentMap(MethodInvocation mi) {
|
||||||
|
|
|
@ -24,7 +24,6 @@ import org.springframework.security.core.userdetails.UsernameNotFoundException;
|
||||||
import org.springframework.security.crypto.keygen.KeyGenerators;
|
import org.springframework.security.crypto.keygen.KeyGenerators;
|
||||||
import org.springframework.security.crypto.password.LdapShaPasswordEncoder;
|
import org.springframework.security.crypto.password.LdapShaPasswordEncoder;
|
||||||
import org.springframework.security.crypto.password.NoOpPasswordEncoder;
|
import org.springframework.security.crypto.password.NoOpPasswordEncoder;
|
||||||
import org.springframework.security.crypto.password.PasswordEncoder;
|
|
||||||
import org.springframework.security.ldap.AbstractLdapIntegrationTests;
|
import org.springframework.security.ldap.AbstractLdapIntegrationTests;
|
||||||
|
|
||||||
import org.springframework.ldap.core.DirContextAdapter;
|
import org.springframework.ldap.core.DirContextAdapter;
|
||||||
|
@ -122,7 +121,7 @@ public class PasswordComparisonAuthenticatorTests extends AbstractLdapIntegratio
|
||||||
|
|
||||||
@Test(expected = IllegalArgumentException.class)
|
@Test(expected = IllegalArgumentException.class)
|
||||||
public void testPasswordEncoderCantBeNull() {
|
public void testPasswordEncoderCantBeNull() {
|
||||||
authenticator.setPasswordEncoder((PasswordEncoder) null);
|
authenticator.setPasswordEncoder(null);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
|
|
@ -274,7 +274,7 @@ public class LdapUserDetailsManager implements UserDetailsManager {
|
||||||
ListIterator<ModificationItem> modIt = mods.listIterator();
|
ListIterator<ModificationItem> modIt = mods.listIterator();
|
||||||
|
|
||||||
while (modIt.hasNext()) {
|
while (modIt.hasNext()) {
|
||||||
ModificationItem mod = (ModificationItem) modIt.next();
|
ModificationItem mod = modIt.next();
|
||||||
Attribute a = mod.getAttribute();
|
Attribute a = mod.getAttribute();
|
||||||
if ("objectclass".equalsIgnoreCase(a.getID())) {
|
if ("objectclass".equalsIgnoreCase(a.getID())) {
|
||||||
modIt.remove();
|
modIt.remove();
|
||||||
|
|
|
@ -38,7 +38,7 @@ public class IndexPage {
|
||||||
|
|
||||||
public static <T> T to(WebDriver driver, int port, Class<T> page) {
|
public static <T> T to(WebDriver driver, int port, Class<T> page) {
|
||||||
driver.get("http://localhost:" + port +"/");
|
driver.get("http://localhost:" + port +"/");
|
||||||
return (T) PageFactory.initElements(driver, page);
|
return PageFactory.initElements(driver, page);
|
||||||
}
|
}
|
||||||
|
|
||||||
public IndexPage assertAt() {
|
public IndexPage assertAt() {
|
||||||
|
|
|
@ -102,7 +102,7 @@ public class ContactDaoSpring extends JdbcDaoSupport implements ContactDao {
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
return (Contact) list.get(0);
|
return list.get(0);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -112,7 +112,7 @@ public class DocumentDaoImpl extends JdbcDaoSupport implements DocumentDao {
|
||||||
.getLong("id")));
|
.getLong("id")));
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
return (AbstractElement[]) directories.toArray(new AbstractElement[] {});
|
return directories.toArray(new AbstractElement[] {});
|
||||||
}
|
}
|
||||||
List<AbstractElement> directories = getJdbcTemplate().query(
|
List<AbstractElement> directories = getJdbcTemplate().query(
|
||||||
SELECT_FROM_DIRECTORY, new Object[] { directory.getId() },
|
SELECT_FROM_DIRECTORY, new Object[] { directory.getId() },
|
||||||
|
@ -140,7 +140,7 @@ public class DocumentDaoImpl extends JdbcDaoSupport implements DocumentDao {
|
||||||
});
|
});
|
||||||
// Add the File elements after the Directory elements
|
// Add the File elements after the Directory elements
|
||||||
directories.addAll(files);
|
directories.addAll(files);
|
||||||
return (AbstractElement[]) directories.toArray(new AbstractElement[] {});
|
return directories.toArray(new AbstractElement[] {});
|
||||||
}
|
}
|
||||||
|
|
||||||
public void update(File file) {
|
public void update(File file) {
|
||||||
|
|
|
@ -48,7 +48,7 @@ public class SecureDocumentDaoImpl extends DocumentDaoImpl implements SecureDocu
|
||||||
}
|
}
|
||||||
|
|
||||||
public String[] getUsers() {
|
public String[] getUsers() {
|
||||||
return (String[]) getJdbcTemplate().query(SELECT_FROM_USERS,
|
return getJdbcTemplate().query(SELECT_FROM_USERS,
|
||||||
new RowMapper<String>() {
|
new RowMapper<String>() {
|
||||||
public String mapRow(ResultSet rs, int rowNumber) throws SQLException {
|
public String mapRow(ResultSet rs, int rowNumber) throws SQLException {
|
||||||
return rs.getString("USERNAME");
|
return rs.getString("USERNAME");
|
||||||
|
|
|
@ -122,7 +122,7 @@ public abstract class WebTestUtils {
|
||||||
if (springSecurityFilterChain == null) {
|
if (springSecurityFilterChain == null) {
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
List<Filter> filters = (List<Filter>) ReflectionTestUtils
|
List<Filter> filters = ReflectionTestUtils
|
||||||
.invokeMethod(springSecurityFilterChain, "getFilters", request);
|
.invokeMethod(springSecurityFilterChain, "getFilters", request);
|
||||||
if (filters == null) {
|
if (filters == null) {
|
||||||
return null;
|
return null;
|
||||||
|
@ -157,4 +157,4 @@ public abstract class WebTestUtils {
|
||||||
|
|
||||||
private WebTestUtils() {
|
private WebTestUtils() {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -89,7 +89,7 @@ public class WebXmlMappableAttributesRetriever implements ResourceLoaderAware,
|
||||||
NodeList roles = secRoleElt.getElementsByTagName("role-name");
|
NodeList roles = secRoleElt.getElementsByTagName("role-name");
|
||||||
|
|
||||||
if (roles.getLength() > 0) {
|
if (roles.getLength() > 0) {
|
||||||
String roleName = ((Element) roles.item(0)).getTextContent().trim();
|
String roleName = roles.item(0).getTextContent().trim();
|
||||||
roleNames.add(roleName);
|
roleNames.add(roleName);
|
||||||
logger.info("Retrieved role-name '" + roleName + "' from web.xml");
|
logger.info("Retrieved role-name '" + roleName + "' from web.xml");
|
||||||
}
|
}
|
||||||
|
|
|
@ -84,7 +84,7 @@ public class DigestAuthenticationEntryPoint implements AuthenticationEntryPoint,
|
||||||
|
|
||||||
public void commence(HttpServletRequest request, HttpServletResponse response,
|
public void commence(HttpServletRequest request, HttpServletResponse response,
|
||||||
AuthenticationException authException) throws IOException, ServletException {
|
AuthenticationException authException) throws IOException, ServletException {
|
||||||
HttpServletResponse httpResponse = (HttpServletResponse) response;
|
HttpServletResponse httpResponse = response;
|
||||||
|
|
||||||
// compute a nonce (do not use remote IP address due to proxy farms)
|
// compute a nonce (do not use remote IP address due to proxy farms)
|
||||||
// format of nonce is:
|
// format of nonce is:
|
||||||
|
|
|
@ -177,7 +177,7 @@ public class FastHttpDateFormat {
|
||||||
Long cachedDate = null;
|
Long cachedDate = null;
|
||||||
|
|
||||||
try {
|
try {
|
||||||
cachedDate = (Long) parseCache.get(value);
|
cachedDate = parseCache.get(value);
|
||||||
}
|
}
|
||||||
catch (Exception ignored) {
|
catch (Exception ignored) {
|
||||||
}
|
}
|
||||||
|
|
|
@ -47,12 +47,12 @@ public class DefaultServerRedirectStrategyTests {
|
||||||
|
|
||||||
@Test(expected = IllegalArgumentException.class)
|
@Test(expected = IllegalArgumentException.class)
|
||||||
public void sendRedirectWhenLocationNullThenException() {
|
public void sendRedirectWhenLocationNullThenException() {
|
||||||
this.strategy.sendRedirect(this.exchange, (URI) null);
|
this.strategy.sendRedirect(this.exchange, null);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test(expected = IllegalArgumentException.class)
|
@Test(expected = IllegalArgumentException.class)
|
||||||
public void sendRedirectWhenExchangeNullThenException() {
|
public void sendRedirectWhenExchangeNullThenException() {
|
||||||
this.strategy.sendRedirect((ServerWebExchange) null, this.location);
|
this.strategy.sendRedirect(null, this.location);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
|
|
@ -56,7 +56,7 @@ public class RedirectServerAuthenticationEntryPointTests {
|
||||||
|
|
||||||
@Test(expected = IllegalArgumentException.class)
|
@Test(expected = IllegalArgumentException.class)
|
||||||
public void constructorStringWhenNullLocationThenException() {
|
public void constructorStringWhenNullLocationThenException() {
|
||||||
new RedirectServerAuthenticationEntryPoint((String) null);
|
new RedirectServerAuthenticationEntryPoint(null);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
|
|
@ -56,7 +56,7 @@ public class RedirectServerAuthenticationFailureHandlerTests {
|
||||||
|
|
||||||
@Test(expected = IllegalArgumentException.class)
|
@Test(expected = IllegalArgumentException.class)
|
||||||
public void constructorStringWhenNullLocationThenException() {
|
public void constructorStringWhenNullLocationThenException() {
|
||||||
new RedirectServerAuthenticationEntryPoint((String) null);
|
new RedirectServerAuthenticationEntryPoint(null);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
|
|
@ -45,7 +45,7 @@ public class HttpStatusServerAccessDeniedHandlerTests {
|
||||||
|
|
||||||
@Test(expected = IllegalArgumentException.class)
|
@Test(expected = IllegalArgumentException.class)
|
||||||
public void constructorHttpStatusWhenNullThenException() {
|
public void constructorHttpStatusWhenNullThenException() {
|
||||||
new HttpStatusServerAccessDeniedHandler((HttpStatus) null);
|
new HttpStatusServerAccessDeniedHandler(null);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
|
Loading…
Reference in New Issue