SEC-562: Sandbox repackaging.
This commit is contained in:
parent
e5e4f040a1
commit
d8497a1642
|
@ -12,9 +12,9 @@
|
|||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
package org.acegisecurity.providers.openid;
|
||||
package org.springframework.security.providers.openid;
|
||||
|
||||
import org.acegisecurity.AuthenticationException;
|
||||
import org.springframework.security.AuthenticationException;
|
||||
|
||||
|
||||
/**
|
||||
|
|
|
@ -12,17 +12,17 @@
|
|||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
package org.acegisecurity.providers.openid;
|
||||
package org.springframework.security.providers.openid;
|
||||
|
||||
import org.acegisecurity.Authentication;
|
||||
import org.acegisecurity.AuthenticationException;
|
||||
import org.acegisecurity.AuthenticationServiceException;
|
||||
import org.acegisecurity.BadCredentialsException;
|
||||
import org.springframework.security.Authentication;
|
||||
import org.springframework.security.AuthenticationException;
|
||||
import org.springframework.security.AuthenticationServiceException;
|
||||
import org.springframework.security.BadCredentialsException;
|
||||
|
||||
import org.acegisecurity.providers.AuthenticationProvider;
|
||||
import org.acegisecurity.providers.cas.CasAuthoritiesPopulator;
|
||||
import org.springframework.security.providers.AuthenticationProvider;
|
||||
import org.springframework.security.providers.cas.CasAuthoritiesPopulator;
|
||||
|
||||
import org.acegisecurity.userdetails.UserDetails;
|
||||
import org.springframework.security.userdetails.UserDetails;
|
||||
|
||||
import org.springframework.beans.factory.InitializingBean;
|
||||
|
||||
|
@ -46,7 +46,7 @@ public class OpenIDAuthenticationProvider implements AuthenticationProvider, Ini
|
|||
}
|
||||
|
||||
/* (non-Javadoc)
|
||||
* @see org.acegisecurity.providers.AuthenticationProvider#authenticate(org.acegisecurity.Authentication)
|
||||
* @see org.springframework.security.providers.AuthenticationProvider#authenticate(org.springframework.security.Authentication)
|
||||
*/
|
||||
public Authentication authenticate(Authentication authentication)
|
||||
throws AuthenticationException {
|
||||
|
@ -97,7 +97,7 @@ public class OpenIDAuthenticationProvider implements AuthenticationProvider, Ini
|
|||
}
|
||||
|
||||
/* (non-Javadoc)
|
||||
* @see org.acegisecurity.providers.AuthenticationProvider#supports(java.lang.Class)
|
||||
* @see org.springframework.security.providers.AuthenticationProvider#supports(java.lang.Class)
|
||||
*/
|
||||
public boolean supports(Class authentication) {
|
||||
return OpenIDAuthenticationToken.class.isAssignableFrom(authentication);
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
package org.acegisecurity.providers.openid;
|
||||
package org.springframework.security.providers.openid;
|
||||
|
||||
import java.io.ObjectStreamException;
|
||||
import java.io.Serializable;
|
||||
|
|
|
@ -12,11 +12,11 @@
|
|||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
package org.acegisecurity.providers.openid;
|
||||
package org.springframework.security.providers.openid;
|
||||
|
||||
import org.acegisecurity.GrantedAuthority;
|
||||
import org.springframework.security.GrantedAuthority;
|
||||
|
||||
import org.acegisecurity.providers.AbstractAuthenticationToken;
|
||||
import org.springframework.security.providers.AbstractAuthenticationToken;
|
||||
|
||||
|
||||
/**
|
||||
|
@ -61,7 +61,7 @@ public class OpenIDAuthenticationToken extends AbstractAuthenticationToken {
|
|||
//~ Methods ========================================================================================================
|
||||
|
||||
/* (non-Javadoc)
|
||||
* @see org.acegisecurity.Authentication#getCredentials()
|
||||
* @see org.springframework.security.Authentication#getCredentials()
|
||||
*/
|
||||
public Object getCredentials() {
|
||||
return null;
|
||||
|
@ -76,7 +76,7 @@ public class OpenIDAuthenticationToken extends AbstractAuthenticationToken {
|
|||
}
|
||||
|
||||
/* (non-Javadoc)
|
||||
* @see org.acegisecurity.Authentication#getPrincipal()
|
||||
* @see org.springframework.security.Authentication#getPrincipal()
|
||||
*/
|
||||
public Object getPrincipal() {
|
||||
return identityUrl;
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
package org.acegisecurity.ui.openid;
|
||||
package org.springframework.security.ui.openid;
|
||||
|
||||
/**
|
||||
* Constants required by OpenID classes
|
||||
|
|
|
@ -12,9 +12,9 @@
|
|||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
package org.acegisecurity.ui.openid;
|
||||
package org.springframework.security.ui.openid;
|
||||
|
||||
import org.acegisecurity.providers.openid.OpenIDAuthenticationToken;
|
||||
import org.springframework.security.providers.openid.OpenIDAuthenticationToken;
|
||||
|
||||
import javax.servlet.http.HttpServletRequest;
|
||||
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
package org.acegisecurity.ui.openid;
|
||||
package org.springframework.security.ui.openid;
|
||||
|
||||
/**
|
||||
* Thrown by an OpenIDConsumer if it cannot process a request
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
package org.acegisecurity.ui.openid;
|
||||
package org.springframework.security.ui.openid;
|
||||
|
||||
import org.apache.commons.logging.Log;
|
||||
import org.apache.commons.logging.LogFactory;
|
||||
|
@ -34,7 +34,7 @@ import java.io.IOException;
|
|||
* <br/>
|
||||
* <br/> <servlet>
|
||||
* <br/> <servlet-name>openid</servlet-name>
|
||||
* <br/> <servlet-class>org.acegisecurity.ui.openid.OpenIDLoginInitiationServlet</servlet-class>
|
||||
* <br/> <servlet-class>org.springframework.security.ui.openid.OpenIDLoginInitiationServlet</servlet-class>
|
||||
* <br/> <load-on-startup>1</load-on-startup>
|
||||
* <br/> <init-param>
|
||||
* <br/> <description>The error page - will receive error "message"</description>
|
||||
|
|
|
@ -12,16 +12,16 @@
|
|||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
package org.acegisecurity.ui.openid;
|
||||
package org.springframework.security.ui.openid;
|
||||
|
||||
import org.acegisecurity.Authentication;
|
||||
import org.acegisecurity.AuthenticationException;
|
||||
import org.acegisecurity.AuthenticationServiceException;
|
||||
import org.springframework.security.Authentication;
|
||||
import org.springframework.security.AuthenticationException;
|
||||
import org.springframework.security.AuthenticationServiceException;
|
||||
|
||||
import org.acegisecurity.providers.openid.OpenIDAuthenticationToken;
|
||||
import org.springframework.security.providers.openid.OpenIDAuthenticationToken;
|
||||
|
||||
import org.acegisecurity.ui.AbstractProcessingFilter;
|
||||
import org.acegisecurity.ui.webapp.AuthenticationProcessingFilter;
|
||||
import org.springframework.security.ui.AbstractProcessingFilter;
|
||||
import org.springframework.security.ui.webapp.AuthenticationProcessingFilter;
|
||||
|
||||
import javax.servlet.http.HttpServletRequest;
|
||||
|
||||
|
@ -40,7 +40,7 @@ public class OpenIDResponseProcessingFilter extends AbstractProcessingFilter {
|
|||
//~ Methods ========================================================================================================
|
||||
|
||||
/* (non-Javadoc)
|
||||
* @see org.acegisecurity.ui.AbstractProcessingFilter#attemptAuthentication(javax.servlet.http.HttpServletRequest)
|
||||
* @see org.springframework.security.ui.AbstractProcessingFilter#attemptAuthentication(javax.servlet.http.HttpServletRequest)
|
||||
* @Override
|
||||
*/
|
||||
public Authentication attemptAuthentication(HttpServletRequest req)
|
||||
|
@ -65,7 +65,7 @@ public class OpenIDResponseProcessingFilter extends AbstractProcessingFilter {
|
|||
}
|
||||
|
||||
/* (non-Javadoc)
|
||||
* @see org.acegisecurity.ui.AbstractProcessingFilter#getDefaultFilterProcessesUrl()
|
||||
* @see org.springframework.security.ui.AbstractProcessingFilter#getDefaultFilterProcessesUrl()
|
||||
* @Override
|
||||
*/
|
||||
public String getDefaultFilterProcessesUrl() {
|
||||
|
|
|
@ -13,15 +13,15 @@
|
|||
* limitations under the License.
|
||||
*/
|
||||
|
||||
package org.acegisecurity.ui.openid;
|
||||
package org.springframework.security.ui.openid;
|
||||
|
||||
import org.acegisecurity.Authentication;
|
||||
import org.acegisecurity.AuthenticationException;
|
||||
import org.acegisecurity.AuthenticationServiceException;
|
||||
import org.acegisecurity.context.SecurityContextHolder;
|
||||
import org.acegisecurity.providers.openid.OpenIDAuthenticationToken;
|
||||
import org.acegisecurity.ui.AbstractProcessingFilter;
|
||||
import org.acegisecurity.ui.webapp.AuthenticationProcessingFilter;
|
||||
import org.springframework.security.Authentication;
|
||||
import org.springframework.security.AuthenticationException;
|
||||
import org.springframework.security.AuthenticationServiceException;
|
||||
import org.springframework.security.context.SecurityContextHolder;
|
||||
import org.springframework.security.providers.openid.OpenIDAuthenticationToken;
|
||||
import org.springframework.security.ui.AbstractProcessingFilter;
|
||||
import org.springframework.security.ui.webapp.AuthenticationProcessingFilter;
|
||||
import org.apache.commons.logging.Log;
|
||||
import org.apache.commons.logging.LogFactory;
|
||||
import org.springframework.util.StringUtils;
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
package org.acegisecurity.ui.openid;
|
||||
package org.springframework.security.ui.openid;
|
||||
|
||||
import org.acegisecurity.AuthenticationException;
|
||||
import org.springframework.security.AuthenticationException;
|
||||
|
||||
/**
|
||||
* @author Ray Krueger
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
package org.acegisecurity.ui.openid.consumers;
|
||||
package org.springframework.security.ui.openid.consumers;
|
||||
|
||||
import com.janrain.openid.consumer.AuthRequest;
|
||||
import com.janrain.openid.consumer.Consumer;
|
||||
|
@ -21,12 +21,12 @@ import com.janrain.openid.consumer.Response;
|
|||
import com.janrain.openid.consumer.StatusCode;
|
||||
import com.janrain.openid.store.OpenIDStore;
|
||||
|
||||
import org.acegisecurity.providers.openid.OpenIDAuthenticationStatus;
|
||||
import org.acegisecurity.providers.openid.OpenIDAuthenticationToken;
|
||||
import org.springframework.security.providers.openid.OpenIDAuthenticationStatus;
|
||||
import org.springframework.security.providers.openid.OpenIDAuthenticationToken;
|
||||
|
||||
import org.acegisecurity.ui.openid.OpenIDConstants;
|
||||
import org.acegisecurity.ui.openid.OpenIDConsumer;
|
||||
import org.acegisecurity.ui.openid.OpenIDConsumerException;
|
||||
import org.springframework.security.ui.openid.OpenIDConstants;
|
||||
import org.springframework.security.ui.openid.OpenIDConsumer;
|
||||
import org.springframework.security.ui.openid.OpenIDConsumerException;
|
||||
|
||||
import org.springframework.beans.factory.InitializingBean;
|
||||
|
||||
|
@ -64,7 +64,7 @@ public class JanRainOpenIDConsumer implements OpenIDConsumer, InitializingBean {
|
|||
}
|
||||
|
||||
/* (non-Javadoc)
|
||||
* @see org.acegisecurity.ui.openid.OpenIDConsumer#beginConsumption(java.lang.String)
|
||||
* @see org.springframework.security.ui.openid.OpenIDConsumer#beginConsumption(java.lang.String)
|
||||
*/
|
||||
public String beginConsumption(HttpServletRequest req, String identityUrl, String returnToUrl)
|
||||
throws OpenIDConsumerException {
|
||||
|
@ -110,7 +110,7 @@ public class JanRainOpenIDConsumer implements OpenIDConsumer, InitializingBean {
|
|||
}
|
||||
|
||||
/* (non-Javadoc)
|
||||
* @see org.acegisecurity.ui.openid.OpenIDConsumer#endConsumption(javax.servlet.http.HttpServletRequest)
|
||||
* @see org.springframework.security.ui.openid.OpenIDConsumer#endConsumption(javax.servlet.http.HttpServletRequest)
|
||||
*/
|
||||
public OpenIDAuthenticationToken endConsumption(HttpServletRequest req)
|
||||
throws OpenIDConsumerException {
|
||||
|
|
|
@ -12,13 +12,13 @@
|
|||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
package org.acegisecurity.ui.openid.consumers;
|
||||
package org.springframework.security.ui.openid.consumers;
|
||||
|
||||
import org.acegisecurity.providers.openid.OpenIDAuthenticationStatus;
|
||||
import org.acegisecurity.providers.openid.OpenIDAuthenticationToken;
|
||||
import org.springframework.security.providers.openid.OpenIDAuthenticationStatus;
|
||||
import org.springframework.security.providers.openid.OpenIDAuthenticationToken;
|
||||
|
||||
import org.acegisecurity.ui.openid.OpenIDConsumer;
|
||||
import org.acegisecurity.ui.openid.OpenIDConsumerException;
|
||||
import org.springframework.security.ui.openid.OpenIDConsumer;
|
||||
import org.springframework.security.ui.openid.OpenIDConsumerException;
|
||||
|
||||
import org.openid4java.association.AssociationException;
|
||||
|
||||
|
|
|
@ -12,16 +12,16 @@
|
|||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
package org.acegisecurity.providers.openid;
|
||||
package org.springframework.security.providers.openid;
|
||||
|
||||
import org.acegisecurity.AuthenticationException;
|
||||
import org.acegisecurity.GrantedAuthority;
|
||||
import org.acegisecurity.GrantedAuthorityImpl;
|
||||
import org.springframework.security.AuthenticationException;
|
||||
import org.springframework.security.GrantedAuthority;
|
||||
import org.springframework.security.GrantedAuthorityImpl;
|
||||
|
||||
import org.acegisecurity.providers.cas.CasAuthoritiesPopulator;
|
||||
import org.springframework.security.providers.cas.CasAuthoritiesPopulator;
|
||||
|
||||
import org.acegisecurity.userdetails.User;
|
||||
import org.acegisecurity.userdetails.UserDetails;
|
||||
import org.springframework.security.userdetails.User;
|
||||
import org.springframework.security.userdetails.UserDetails;
|
||||
|
||||
|
||||
/**
|
||||
|
|
|
@ -12,15 +12,15 @@
|
|||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
package org.acegisecurity.providers.openid;
|
||||
package org.springframework.security.providers.openid;
|
||||
|
||||
import junit.framework.TestCase;
|
||||
|
||||
import org.acegisecurity.Authentication;
|
||||
import org.acegisecurity.AuthenticationServiceException;
|
||||
import org.acegisecurity.BadCredentialsException;
|
||||
import org.springframework.security.Authentication;
|
||||
import org.springframework.security.AuthenticationServiceException;
|
||||
import org.springframework.security.BadCredentialsException;
|
||||
|
||||
import org.acegisecurity.providers.UsernamePasswordAuthenticationToken;
|
||||
import org.springframework.security.providers.UsernamePasswordAuthenticationToken;
|
||||
|
||||
|
||||
/**
|
||||
|
@ -36,7 +36,7 @@ public class OpenIDAuthenticationProviderTests extends TestCase {
|
|||
//~ Methods ========================================================================================================
|
||||
|
||||
/*
|
||||
* Test method for 'org.acegisecurity.providers.openid.OpenIDAuthenticationProvider.authenticate(Authentication)'
|
||||
* Test method for 'org.springframework.security.providers.openid.OpenIDAuthenticationProvider.authenticate(Authentication)'
|
||||
*/
|
||||
public void testAuthenticateCancel() {
|
||||
OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();
|
||||
|
@ -55,7 +55,7 @@ public class OpenIDAuthenticationProviderTests extends TestCase {
|
|||
}
|
||||
|
||||
/*
|
||||
* Test method for 'org.acegisecurity.providers.openid.OpenIDAuthenticationProvider.authenticate(Authentication)'
|
||||
* Test method for 'org.springframework.security.providers.openid.OpenIDAuthenticationProvider.authenticate(Authentication)'
|
||||
*/
|
||||
public void testAuthenticateError() {
|
||||
OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();
|
||||
|
@ -74,7 +74,7 @@ public class OpenIDAuthenticationProviderTests extends TestCase {
|
|||
}
|
||||
|
||||
/*
|
||||
* Test method for 'org.acegisecurity.providers.openid.OpenIDAuthenticationProvider.authenticate(Authentication)'
|
||||
* Test method for 'org.springframework.security.providers.openid.OpenIDAuthenticationProvider.authenticate(Authentication)'
|
||||
*/
|
||||
public void testAuthenticateFailure() {
|
||||
OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();
|
||||
|
@ -93,7 +93,7 @@ public class OpenIDAuthenticationProviderTests extends TestCase {
|
|||
}
|
||||
|
||||
/*
|
||||
* Test method for 'org.acegisecurity.providers.openid.OpenIDAuthenticationProvider.authenticate(Authentication)'
|
||||
* Test method for 'org.springframework.security.providers.openid.OpenIDAuthenticationProvider.authenticate(Authentication)'
|
||||
*/
|
||||
public void testAuthenticateSetupNeeded() {
|
||||
OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();
|
||||
|
@ -112,7 +112,7 @@ public class OpenIDAuthenticationProviderTests extends TestCase {
|
|||
}
|
||||
|
||||
/*
|
||||
* Test method for 'org.acegisecurity.providers.openid.OpenIDAuthenticationProvider.authenticate(Authentication)'
|
||||
* Test method for 'org.springframework.security.providers.openid.OpenIDAuthenticationProvider.authenticate(Authentication)'
|
||||
*/
|
||||
public void testAuthenticateSuccess() {
|
||||
OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();
|
||||
|
@ -147,7 +147,7 @@ public class OpenIDAuthenticationProviderTests extends TestCase {
|
|||
}
|
||||
|
||||
/*
|
||||
* Test method for 'org.acegisecurity.providers.openid.OpenIDAuthenticationProvider.supports(Class)'
|
||||
* Test method for 'org.springframework.security.providers.openid.OpenIDAuthenticationProvider.supports(Class)'
|
||||
*/
|
||||
public void testDoesntSupport() {
|
||||
OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();
|
||||
|
@ -157,7 +157,7 @@ public class OpenIDAuthenticationProviderTests extends TestCase {
|
|||
}
|
||||
|
||||
/*
|
||||
* Test method for 'org.acegisecurity.providers.openid.OpenIDAuthenticationProvider.authenticate(Authentication)'
|
||||
* Test method for 'org.springframework.security.providers.openid.OpenIDAuthenticationProvider.authenticate(Authentication)'
|
||||
*/
|
||||
public void testIgnoresUserPassAuthToken() {
|
||||
OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();
|
||||
|
@ -168,7 +168,7 @@ public class OpenIDAuthenticationProviderTests extends TestCase {
|
|||
}
|
||||
|
||||
/*
|
||||
* Test method for 'org.acegisecurity.providers.openid.OpenIDAuthenticationProvider.supports(Class)'
|
||||
* Test method for 'org.springframework.security.providers.openid.OpenIDAuthenticationProvider.supports(Class)'
|
||||
*/
|
||||
public void testSupports() {
|
||||
OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();
|
||||
|
|
|
@ -12,21 +12,21 @@
|
|||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
package org.acegisecurity.ui.openid;
|
||||
package org.springframework.security.ui.openid;
|
||||
|
||||
import junit.framework.TestCase;
|
||||
|
||||
import org.acegisecurity.AbstractAuthenticationManager;
|
||||
import org.acegisecurity.Authentication;
|
||||
import org.acegisecurity.AuthenticationException;
|
||||
import org.acegisecurity.BadCredentialsException;
|
||||
import org.springframework.security.AbstractAuthenticationManager;
|
||||
import org.springframework.security.Authentication;
|
||||
import org.springframework.security.AuthenticationException;
|
||||
import org.springframework.security.BadCredentialsException;
|
||||
|
||||
import org.acegisecurity.providers.cas.CasAuthoritiesPopulator;
|
||||
import org.acegisecurity.providers.openid.MockAuthoritiesPopulator;
|
||||
import org.acegisecurity.providers.openid.OpenIDAuthenticationStatus;
|
||||
import org.acegisecurity.providers.openid.OpenIDAuthenticationToken;
|
||||
import org.springframework.security.providers.cas.CasAuthoritiesPopulator;
|
||||
import org.springframework.security.providers.openid.MockAuthoritiesPopulator;
|
||||
import org.springframework.security.providers.openid.OpenIDAuthenticationStatus;
|
||||
import org.springframework.security.providers.openid.OpenIDAuthenticationToken;
|
||||
|
||||
import org.acegisecurity.ui.openid.consumers.MockOpenIDConsumer;
|
||||
import org.springframework.security.ui.openid.consumers.MockOpenIDConsumer;
|
||||
|
||||
import org.springframework.mock.web.MockHttpServletRequest;
|
||||
|
||||
|
@ -44,7 +44,7 @@ public class OpenIDResponseProcessingFilterTests extends TestCase {
|
|||
//~ Methods ========================================================================================================
|
||||
|
||||
/*
|
||||
* Test method for 'org.acegisecurity.ui.openid.OpenIDResponseProcessingFilter.attemptAuthentication(HttpServletRequest)'
|
||||
* Test method for 'org.springframework.security.ui.openid.OpenIDResponseProcessingFilter.attemptAuthentication(HttpServletRequest)'
|
||||
*/
|
||||
public void testAttemptAuthenticationFailure() {
|
||||
// set up mock objects
|
||||
|
@ -70,7 +70,7 @@ public class OpenIDResponseProcessingFilterTests extends TestCase {
|
|||
}
|
||||
|
||||
/*
|
||||
* Test method for 'org.acegisecurity.ui.openid.OpenIDResponseProcessingFilter.attemptAuthentication(HttpServletRequest)'
|
||||
* Test method for 'org.springframework.security.ui.openid.OpenIDResponseProcessingFilter.attemptAuthentication(HttpServletRequest)'
|
||||
*/
|
||||
public void testAttemptAuthenticationHttpServletRequest() {
|
||||
// set up mock objects
|
||||
|
@ -102,7 +102,7 @@ public class OpenIDResponseProcessingFilterTests extends TestCase {
|
|||
}
|
||||
|
||||
/*
|
||||
* Test method for 'org.acegisecurity.ui.openid.OpenIDResponseProcessingFilter.getDefaultFilterProcessesUrl()'
|
||||
* Test method for 'org.springframework.security.ui.openid.OpenIDResponseProcessingFilter.getDefaultFilterProcessesUrl()'
|
||||
*/
|
||||
public void testGetDefaultFilterProcessesUrl() {
|
||||
OpenIDResponseProcessingFilter filter = new OpenIDResponseProcessingFilter();
|
||||
|
|
|
@ -12,12 +12,12 @@
|
|||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
package org.acegisecurity.ui.openid.consumers;
|
||||
package org.springframework.security.ui.openid.consumers;
|
||||
|
||||
import org.acegisecurity.providers.openid.OpenIDAuthenticationToken;
|
||||
import org.springframework.security.providers.openid.OpenIDAuthenticationToken;
|
||||
|
||||
import org.acegisecurity.ui.openid.OpenIDConsumer;
|
||||
import org.acegisecurity.ui.openid.OpenIDConsumerException;
|
||||
import org.springframework.security.ui.openid.OpenIDConsumer;
|
||||
import org.springframework.security.ui.openid.OpenIDConsumerException;
|
||||
|
||||
import javax.servlet.http.HttpServletRequest;
|
||||
|
||||
|
@ -36,7 +36,7 @@ public class MockOpenIDConsumer implements OpenIDConsumer {
|
|||
//~ Methods ========================================================================================================
|
||||
|
||||
/* (non-Javadoc)
|
||||
* @see org.acegisecurity.ui.openid.OpenIDConsumer#beginConsumption(javax.servlet.http.HttpServletRequest, java.lang.String)
|
||||
* @see org.springframework.security.ui.openid.OpenIDConsumer#beginConsumption(javax.servlet.http.HttpServletRequest, java.lang.String)
|
||||
*/
|
||||
public String beginConsumption(HttpServletRequest req, String identityUrl, String returnToUrl)
|
||||
throws OpenIDConsumerException {
|
||||
|
@ -44,7 +44,7 @@ public class MockOpenIDConsumer implements OpenIDConsumer {
|
|||
}
|
||||
|
||||
/* (non-Javadoc)
|
||||
* @see org.acegisecurity.ui.openid.OpenIDConsumer#endConsumption(javax.servlet.http.HttpServletRequest)
|
||||
* @see org.springframework.security.ui.openid.OpenIDConsumer#endConsumption(javax.servlet.http.HttpServletRequest)
|
||||
*/
|
||||
public OpenIDAuthenticationToken endConsumption(HttpServletRequest req)
|
||||
throws OpenIDConsumerException {
|
||||
|
@ -61,7 +61,7 @@ public class MockOpenIDConsumer implements OpenIDConsumer {
|
|||
}
|
||||
|
||||
/* (non-Javadoc)
|
||||
* @see org.acegisecurity.ui.openid.OpenIDConsumer#setReturnToUrl(java.lang.String)
|
||||
* @see org.springframework.security.ui.openid.OpenIDConsumer#setReturnToUrl(java.lang.String)
|
||||
*/
|
||||
public void setReturnToUrl(String returnToUrl) {
|
||||
// TODO Auto-generated method stub
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
package org.acegisecurity.ldap.ppolicy;
|
||||
package org.springframework.security.ldap.ppolicy;
|
||||
|
||||
/**
|
||||
* @author Luke
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
package org.acegisecurity.ldap.ppolicy;
|
||||
package org.springframework.security.ldap.ppolicy;
|
||||
|
||||
/**
|
||||
* @author Luke
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
package org.acegisecurity.ldap.ppolicy;
|
||||
package org.springframework.security.ldap.ppolicy;
|
||||
|
||||
/**
|
||||
* @author Luke
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
package org.acegisecurity.ldap.ppolicy;
|
||||
package org.springframework.security.ldap.ppolicy;
|
||||
|
||||
/**
|
||||
* @author Luke
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
* limitations under the License.
|
||||
*/
|
||||
|
||||
package org.acegisecurity.ldap.ppolicy;
|
||||
package org.springframework.security.ldap.ppolicy;
|
||||
|
||||
import javax.naming.ldap.Control;
|
||||
|
||||
|
|
|
@ -13,9 +13,9 @@
|
|||
* limitations under the License.
|
||||
*/
|
||||
|
||||
package org.acegisecurity.ldap.ppolicy;
|
||||
package org.springframework.security.ldap.ppolicy;
|
||||
|
||||
import org.acegisecurity.ldap.ppolicy.PasswordPolicyControl;
|
||||
import org.springframework.security.ldap.ppolicy.PasswordPolicyControl;
|
||||
|
||||
import javax.naming.ldap.Control;
|
||||
import javax.naming.ldap.ControlFactory;
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
package org.acegisecurity.ldap.ppolicy;
|
||||
package org.springframework.security.ldap.ppolicy;
|
||||
|
||||
import org.acegisecurity.AuthenticationException;
|
||||
import org.springframework.security.AuthenticationException;
|
||||
|
||||
/**
|
||||
* @author Luke
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
* limitations under the License.
|
||||
*/
|
||||
|
||||
package org.acegisecurity.ldap.ppolicy;
|
||||
package org.springframework.security.ldap.ppolicy;
|
||||
|
||||
import netscape.ldap.ber.stream.BERChoice;
|
||||
import netscape.ldap.ber.stream.BERElement;
|
||||
|
@ -28,8 +28,8 @@ import netscape.ldap.ber.stream.BERSequence;
|
|||
import netscape.ldap.ber.stream.BERTag;
|
||||
import netscape.ldap.ber.stream.BERTagDecoder;
|
||||
|
||||
import org.acegisecurity.ldap.LdapDataAccessException;
|
||||
import org.acegisecurity.ldap.ppolicy.PasswordPolicyControl;
|
||||
import org.springframework.security.ldap.LdapDataAccessException;
|
||||
import org.springframework.security.ldap.ppolicy.PasswordPolicyControl;
|
||||
|
||||
import org.apache.commons.logging.Log;
|
||||
import org.apache.commons.logging.LogFactory;
|
||||
|
@ -50,7 +50,7 @@ import java.io.InputStream;
|
|||
* @author Luke Taylor
|
||||
* @version $Id: PasswordPolicyResponseControl.java 1496 2006-05-23 13:38:33Z benalex $
|
||||
*
|
||||
* @see org.acegisecurity.ldap.ppolicy.PasswordPolicyControl
|
||||
* @see org.springframework.security.ldap.ppolicy.PasswordPolicyControl
|
||||
* @see <a href="http://www.ibm.com/developerworks/tivoli/library/t-ldap-controls/">Stefan Zoerner's IBM developerworks
|
||||
* article on LDAP controls.</a>
|
||||
*/
|
||||
|
|
|
@ -1,11 +1,9 @@
|
|||
package org.acegisecurity.providers.ldap.authenticator;
|
||||
package org.springframework.security.providers.ldap.authenticator;
|
||||
|
||||
import org.acegisecurity.ldap.InitialDirContextFactory;
|
||||
import org.acegisecurity.ldap.DefaultInitialDirContextFactory;
|
||||
import org.acegisecurity.ldap.ppolicy.PasswordExpiredException;
|
||||
import org.acegisecurity.ldap.ppolicy.AccountLockedException;
|
||||
import org.acegisecurity.ldap.ppolicy.PasswordPolicyException;
|
||||
import org.acegisecurity.ldap.ppolicy.PasswordInHistoryException;
|
||||
import org.springframework.security.ldap.InitialDirContextFactory;
|
||||
import org.springframework.security.ldap.ppolicy.PasswordExpiredException;
|
||||
import org.springframework.security.ldap.ppolicy.AccountLockedException;
|
||||
import org.springframework.security.ldap.ppolicy.PasswordPolicyException;
|
||||
import org.apache.commons.logging.Log;
|
||||
import org.apache.commons.logging.LogFactory;
|
||||
|
||||
|
|
|
@ -13,16 +13,13 @@
|
|||
* limitations under the License.
|
||||
*/
|
||||
|
||||
package org.acegisecurity.ldap.ppolicy;
|
||||
package org.springframework.security.ldap.ppolicy;
|
||||
|
||||
import junit.framework.TestCase;
|
||||
|
||||
import javax.naming.Context;
|
||||
import javax.naming.NamingException;
|
||||
import javax.naming.ldap.InitialLdapContext;
|
||||
import javax.naming.ldap.Control;
|
||||
import javax.naming.ldap.LdapContext;
|
||||
import java.util.Hashtable;
|
||||
|
||||
/**
|
||||
* Tests for <tt>PasswordPolicyResponse</tt>.
|
||||
|
@ -41,8 +38,8 @@ public class PasswordPolicyResponseControlTests extends TestCase {
|
|||
// env.put(Context.INITIAL_CONTEXT_FACTORY, "com.sun.jndi.ldap.LdapCtxFactory");
|
||||
// env.put(Context.PROVIDER_URL, "ldap://gorille:389/");
|
||||
// env.put(Context.SECURITY_AUTHENTICATION, "simple");
|
||||
// env.put(Context.SECURITY_PRINCIPAL, "cn=manager,dc=acegisecurity,dc=org");
|
||||
// env.put(Context.SECURITY_CREDENTIALS, "acegisecurity");
|
||||
// env.put(Context.SECURITY_PRINCIPAL, "cn=manager,dc=security,dc=org");
|
||||
// env.put(Context.SECURITY_CREDENTIALS, "security");
|
||||
// env.put(LdapContext.CONTROL_FACTORIES, PasswordPolicyControlFactory.class.getName());
|
||||
//
|
||||
// InitialLdapContext ctx = new InitialLdapContext(env, null);
|
||||
|
@ -52,7 +49,7 @@ public class PasswordPolicyResponseControlTests extends TestCase {
|
|||
// ctx.setRequestControls(rctls);
|
||||
//
|
||||
// try {
|
||||
// ctx.addToEnvironment(Context.SECURITY_PRINCIPAL, "uid=bob,ou=people,dc=acegisecurity,dc=org" );
|
||||
// ctx.addToEnvironment(Context.SECURITY_PRINCIPAL, "uid=bob,ou=people,dc=security,dc=org" );
|
||||
// ctx.addToEnvironment(Context.SECURITY_CREDENTIALS, "bobspassword");
|
||||
// Object o = ctx.lookup("");
|
||||
//
|
||||
|
|
|
@ -2,18 +2,18 @@
|
|||
<project>
|
||||
<parent>
|
||||
<artifactId>acegi-security-sandbox</artifactId>
|
||||
<groupId>org.acegisecurity</groupId>
|
||||
<groupId>org.springframework.security</groupId>
|
||||
<version>2.0-SNAPSHOT</version>
|
||||
</parent>
|
||||
<modelVersion>4.0.0</modelVersion>
|
||||
<groupId>org.acegisecurity</groupId>
|
||||
<groupId>org.springframework.security</groupId>
|
||||
<artifactId>spring-security-config</artifactId>
|
||||
<name>spring-security-config</name>
|
||||
<version>2.0.0-SNAPSHOT</version>
|
||||
<url>http://maven.apache.org</url>
|
||||
<dependencies>
|
||||
<dependency>
|
||||
<groupId>org.acegisecurity</groupId>
|
||||
<groupId>org.springframework.security</groupId>
|
||||
<artifactId>acegi-security-tiger</artifactId>
|
||||
<version>1.0.6-SNAPSHOT</version>
|
||||
</dependency>
|
||||
|
|
|
@ -91,7 +91,7 @@
|
|||
type="RememberMeFilter">
|
||||
<xsd:annotation>
|
||||
<xsd:documentation
|
||||
source="org.acegisecurity.ui.rememberme.RememberMeProcessingFilter">
|
||||
source="org.springframework.security.ui.rememberme.RememberMeProcessingFilter">
|
||||
<![CDATA[
|
||||
makes the filter, but does little else, as it auto-detects everything
|
||||
]]>
|
||||
|
@ -243,9 +243,9 @@
|
|||
type="AuthenticationManager">
|
||||
<xsd:annotation>
|
||||
<xsd:documentation
|
||||
source="org.acegisecurity.providers.ProviderManager">
|
||||
source="org.springframework.security.providers.ProviderManager">
|
||||
<![CDATA[
|
||||
Resolves to 'org.acegisecurity.providers.ProviderManager'
|
||||
Resolves to 'org.springframework.security.providers.ProviderManager'
|
||||
]]>
|
||||
</xsd:documentation>
|
||||
</xsd:annotation>
|
||||
|
@ -272,7 +272,7 @@
|
|||
<xsd:element name="authentication-jdbc">
|
||||
<xsd:annotation>
|
||||
<xsd:documentation
|
||||
source="org.acegisecurity.providers.dao.DaoAuthenticationProvider">
|
||||
source="org.springframework.security.providers.dao.DaoAuthenticationProvider">
|
||||
<![CDATA[
|
||||
if not specified will be auto-tetected from the ApplicationContext and tried in order
|
||||
]]>
|
||||
|
@ -286,7 +286,7 @@
|
|||
<xsd:element name="authentication-ldap">
|
||||
<xsd:annotation>
|
||||
<xsd:documentation
|
||||
source="org.acegisecurity.providers.ldap.LdapAuthenticationProvider">
|
||||
source="org.springframework.security.providers.ldap.LdapAuthenticationProvider">
|
||||
<![CDATA[
|
||||
if not specified will be auto-tetected from the ApplicationContext and tried in order
|
||||
]]>
|
||||
|
|
|
@ -23,7 +23,7 @@
|
|||
|
||||
|
||||
<bean id="filterChainProxy"
|
||||
class="org.acegisecurity.util.FilterChainProxy">
|
||||
class="org.springframework.security.util.FilterChainProxy">
|
||||
<property name="filterInvocationDefinitionSource">
|
||||
<value>
|
||||
CONVERT_URL_TO_LOWERCASE_BEFORE_COMPARISON
|
||||
|
@ -48,7 +48,7 @@
|
|||
|
||||
|
||||
<bean id="securityContextLogoutHandler"
|
||||
class="org.acegisecurity.ui.logout.SecurityContextLogoutHandler" />
|
||||
class="org.springframework.security.ui.logout.SecurityContextLogoutHandler" />
|
||||
|
||||
<!-- the URLs are all mandatory and have no defaults (well, except authenticationUrl) -->
|
||||
<security:authentication-form id="authenticationProcessingFilter"
|
||||
|
@ -72,14 +72,14 @@
|
|||
|
||||
|
||||
<bean id="securityContextHolderAwareRequestFilter"
|
||||
class="org.acegisecurity.wrapper.SecurityContextHolderAwareRequestFilter" />
|
||||
class="org.springframework.security.wrapper.SecurityContextHolderAwareRequestFilter" />
|
||||
|
||||
<!-- makes the filter, but does little else, as it auto-detects everything -->
|
||||
<security:authentication-remember-me-filter
|
||||
id="rememberMeProcessingFilter" />
|
||||
|
||||
<bean id="anonymousProcessingFilter"
|
||||
class="org.acegisecurity.providers.anonymous.AnonymousProcessingFilter">
|
||||
class="org.springframework.security.providers.anonymous.AnonymousProcessingFilter">
|
||||
<property name="key" value="changeThis" />
|
||||
<property name="userAttribute"
|
||||
value="anonymousUser,ROLE_ANONYMOUS" />
|
||||
|
@ -95,31 +95,31 @@
|
|||
|
||||
|
||||
<bean id="authenticationEntryPoint"
|
||||
class="org.acegisecurity.ui.webapp.AuthenticationProcessingFilterEntryPoint">
|
||||
class="org.springframework.security.ui.webapp.AuthenticationProcessingFilterEntryPoint">
|
||||
<property name="loginFormUrl" value="/acegilogin.jsp" />
|
||||
<property name="forceHttps" value="false" />
|
||||
</bean>
|
||||
|
||||
|
||||
<bean id="accessDeniedHandler"
|
||||
class="org.acegisecurity.ui.AccessDeniedHandlerImpl">
|
||||
class="org.springframework.security.ui.AccessDeniedHandlerImpl">
|
||||
<property name="errorPage" value="/accessDenied.jsp" />
|
||||
</bean>
|
||||
|
||||
|
||||
<bean id="filterInvocationInterceptor"
|
||||
class="org.acegisecurity.intercept.web.FilterSecurityInterceptor">
|
||||
class="org.springframework.security.intercept.web.FilterSecurityInterceptor">
|
||||
<property name="authenticationManager"
|
||||
ref="authenticationManager" />
|
||||
<property name="accessDecisionManager">
|
||||
<bean class="org.acegisecurity.vote.AffirmativeBased">
|
||||
<bean class="org.springframework.security.vote.AffirmativeBased">
|
||||
<property name="allowIfAllAbstainDecisions"
|
||||
value="false" />
|
||||
<property name="decisionVoters">
|
||||
<list>
|
||||
<bean class="org.acegisecurity.vote.RoleVoter" />
|
||||
<bean class="org.springframework.security.vote.RoleVoter" />
|
||||
<bean
|
||||
class="org.acegisecurity.vote.AuthenticatedVoter" />
|
||||
class="org.springframework.security.vote.AuthenticatedVoter" />
|
||||
</list>
|
||||
</property>
|
||||
</bean>
|
||||
|
@ -137,16 +137,16 @@
|
|||
|
||||
|
||||
<!--<bean id="authenticationManager"
|
||||
class="org.acegisecurity.providers.ProviderManager">
|
||||
class="org.springframework.security.providers.ProviderManager">
|
||||
<property name="providers">
|
||||
<list>
|
||||
<ref local="daoAuthenticationProvider" />
|
||||
<bean
|
||||
class="org.acegisecurity.providers.anonymous.AnonymousAuthenticationProvider">
|
||||
class="org.springframework.security.providers.anonymous.AnonymousAuthenticationProvider">
|
||||
<property name="key" value="changeThis" />
|
||||
</bean>
|
||||
<bean
|
||||
class="org.acegisecurity.providers.rememberme.RememberMeAuthenticationProvider">
|
||||
class="org.springframework.security.providers.rememberme.RememberMeAuthenticationProvider">
|
||||
<property name="key" value="changeThis" />
|
||||
</bean>
|
||||
</list>
|
||||
|
@ -154,7 +154,7 @@
|
|||
</bean>-->
|
||||
|
||||
<bean id="userCache"
|
||||
class="org.acegisecurity.providers.dao.cache.EhCacheBasedUserCache">
|
||||
class="org.springframework.security.providers.dao.cache.EhCacheBasedUserCache">
|
||||
<property name="cache">
|
||||
<bean
|
||||
class="org.springframework.cache.ehcache.EhCacheFactoryBean">
|
||||
|
@ -169,6 +169,6 @@
|
|||
|
||||
<!-- This bean is optional; it isn't used by any other bean as it only listens and logs -->
|
||||
<bean id="loggerListener"
|
||||
class="org.acegisecurity.event.authentication.LoggerListener" />
|
||||
class="org.springframework.security.event.authentication.LoggerListener" />
|
||||
|
||||
</beans>
|
|
@ -15,7 +15,7 @@
|
|||
</security:authentication-repository>
|
||||
|
||||
<bean id="refToUserDetailsService"
|
||||
class="org.acegisecurity.userdetails.jdbc.JdbcDaoImpl">
|
||||
class="org.springframework.security.userdetails.jdbc.JdbcDaoImpl">
|
||||
<property name="dataSource">
|
||||
<ref bean="dataSource" />
|
||||
</property>
|
||||
|
@ -39,13 +39,13 @@
|
|||
</bean>
|
||||
|
||||
<bean id="refToSaltSource"
|
||||
class="org.acegisecurity.providers.dao.salt.SystemWideSaltSource">
|
||||
class="org.springframework.security.providers.dao.salt.SystemWideSaltSource">
|
||||
<property name="systemWideSalt">
|
||||
<value>12345</value>
|
||||
</property>
|
||||
</bean>
|
||||
|
||||
<bean id="refToPasswordEncoder"
|
||||
class="org.acegisecurity.providers.encoding.Md5PasswordEncoder" />
|
||||
class="org.springframework.security.providers.encoding.Md5PasswordEncoder" />
|
||||
|
||||
</beans>
|
|
@ -19,7 +19,7 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
|
|||
</security:authentication-repository>
|
||||
|
||||
<bean id="userDetailsService"
|
||||
class="org.acegisecurity.userdetails.jdbc.JdbcDaoImpl">
|
||||
class="org.springframework.security.userdetails.jdbc.JdbcDaoImpl">
|
||||
<property name="dataSource">
|
||||
<ref bean="dataSource" />
|
||||
</property>
|
||||
|
@ -43,12 +43,12 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
|
|||
</bean>
|
||||
|
||||
<bean id="saltSource"
|
||||
class="org.acegisecurity.providers.dao.salt.SystemWideSaltSource">
|
||||
class="org.springframework.security.providers.dao.salt.SystemWideSaltSource">
|
||||
<property name="systemWideSalt">
|
||||
<value>12345</value>
|
||||
</property>
|
||||
</bean>
|
||||
|
||||
<bean id="passwordEncoder"
|
||||
class="org.acegisecurity.providers.encoding.Md5PasswordEncoder" />
|
||||
class="org.springframework.security.providers.encoding.Md5PasswordEncoder" />
|
||||
</beans>
|
|
@ -14,7 +14,7 @@
|
|||
<security:authentication-repository id="authenticationRepository"/>
|
||||
|
||||
<bean id="userDetailsService"
|
||||
class="org.acegisecurity.userdetails.jdbc.JdbcDaoImpl">
|
||||
class="org.springframework.security.userdetails.jdbc.JdbcDaoImpl">
|
||||
<property name="dataSource">
|
||||
<ref bean="dataSource" />
|
||||
</property>
|
||||
|
|
|
@ -29,7 +29,7 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
|
|||
id="rememberMeServices" key="someValue" />
|
||||
|
||||
<bean id="userDetailsService"
|
||||
class="org.acegisecurity.userdetails.jdbc.JdbcDaoImpl">
|
||||
class="org.springframework.security.userdetails.jdbc.JdbcDaoImpl">
|
||||
<property name="dataSource">
|
||||
<ref bean="dataSource" />
|
||||
</property>
|
||||
|
|
|
@ -24,7 +24,7 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
|
|||
</security:authentication-repository>
|
||||
|
||||
<bean id="AnyBeanIdAsThisBeanWillBeAutoDetectedAndInjectedInauthenticationRepositoryUsingAutoWireByType"
|
||||
class="org.acegisecurity.userdetails.jdbc.JdbcDaoImpl">
|
||||
class="org.springframework.security.userdetails.jdbc.JdbcDaoImpl">
|
||||
<property name="dataSource">
|
||||
<ref bean="dataSource" />
|
||||
</property>
|
||||
|
|
|
@ -29,18 +29,18 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
|
|||
|
||||
|
||||
<!--<bean id="filterInvocationInterceptor"
|
||||
class="org.acegisecurity.intercept.web.FilterSecurityInterceptor">
|
||||
class="org.springframework.security.intercept.web.FilterSecurityInterceptor">
|
||||
<property name="authenticationManager"
|
||||
ref="authenticationManager" />
|
||||
<property name="accessDecisionManager">
|
||||
<bean class="org.acegisecurity.vote.AffirmativeBased">
|
||||
<bean class="org.springframework.security.vote.AffirmativeBased">
|
||||
<property name="allowIfAllAbstainDecisions"
|
||||
value="false" />
|
||||
<property name="decisionVoters">
|
||||
<list>
|
||||
<bean class="org.acegisecurity.vote.RoleVoter" />
|
||||
<bean class="org.springframework.security.vote.RoleVoter" />
|
||||
<bean
|
||||
class="org.acegisecurity.vote.AuthenticatedVoter" />
|
||||
class="org.springframework.security.vote.AuthenticatedVoter" />
|
||||
</list>
|
||||
</property>
|
||||
</bean>
|
||||
|
|
|
@ -30,7 +30,7 @@
|
|||
springAop="true" >
|
||||
<security:url-mapping source="annotations">
|
||||
<security:method-pattern
|
||||
type="org.acegisecurity.BankServiceImpl.listAccounts">
|
||||
type="org.springframework.security.BankServiceImpl.listAccounts">
|
||||
<security:configuration-attribute attribute="ROLE_A" />
|
||||
<security:configuration-attribute attribute="ROLE_B" />
|
||||
</security:method-pattern>
|
||||
|
|
|
@ -30,7 +30,7 @@
|
|||
aspectj="true" >
|
||||
<security:url-mapping source="annotations">
|
||||
<security:method-pattern
|
||||
type="org.acegisecurity.BankServiceImpl.listAccounts">
|
||||
type="org.springframework.security.BankServiceImpl.listAccounts">
|
||||
<security:configuration-attribute attribute="ROLE_A" />
|
||||
<security:configuration-attribute attribute="ROLE_B" />
|
||||
</security:method-pattern>
|
||||
|
|
|
@ -30,7 +30,7 @@
|
|||
springAop="true" >
|
||||
<security:url-mapping source="attributes">
|
||||
<security:method-pattern
|
||||
type="org.acegisecurity.BankServiceImpl.listAccounts">
|
||||
type="org.springframework.security.BankServiceImpl.listAccounts">
|
||||
<security:configuration-attribute attribute="ROLE_A" />
|
||||
<security:configuration-attribute attribute="ROLE_B" />
|
||||
</security:method-pattern>
|
||||
|
|
|
@ -30,7 +30,7 @@
|
|||
springAop="true" >
|
||||
<security:url-mapping source="xml">
|
||||
<security:method-pattern
|
||||
type="org.acegisecurity.BankServiceImpl.listAccounts">
|
||||
type="org.springframework.security.BankServiceImpl.listAccounts">
|
||||
<security:configuration-attribute attribute="ROLE_A" />
|
||||
</security:method-pattern>
|
||||
</security:url-mapping>
|
||||
|
@ -38,7 +38,7 @@
|
|||
|
||||
|
||||
<!--
|
||||
<bean id="methodSecurity" class="org.acegisecurity.intercept.method.aopalliance.MethodSecurityInterceptor">
|
||||
<bean id="methodSecurity" class="org.springframework.security.intercept.method.aopalliance.MethodSecurityInterceptor">
|
||||
<property name="validateConfigAttributes"><value>true</value></property>
|
||||
<property name="authenticationManager"><ref bean="authenticationManager"/></property>
|
||||
<property name="accessDecisionManager"><ref bean="accessDecisionManager"/></property>
|
||||
|
@ -46,8 +46,8 @@
|
|||
<property name="afterInvocationManager"><ref bean="afterInvocationManager"/></property>
|
||||
<property name="objectDefinitionSource">
|
||||
<value>
|
||||
org.acegisecurity.context.BankManager.delete*=ROLE_SUPERVISOR,RUN_AS_SERVER
|
||||
org.acegisecurity.context.BankManager.getBalance=ROLE_TELLER,ROLE_SUPERVISOR,BANKSECURITY_CUSTOMER,RUN_AS_SERVER
|
||||
org.springframework.security.context.BankManager.delete*=ROLE_SUPERVISOR,RUN_AS_SERVER
|
||||
org.springframework.security.context.BankManager.getBalance=ROLE_TELLER,ROLE_SUPERVISOR,BANKSECURITY_CUSTOMER,RUN_AS_SERVER
|
||||
</value>
|
||||
</property>
|
||||
</bean>
|
||||
|
|
|
@ -26,7 +26,7 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
|
|||
resource="classpath:org/acegisecurity/config/user.properties" />
|
||||
</security:principal-repository>
|
||||
|
||||
<bean id="bankService" class="org.acegisecurity.BankServiceImpl"/>
|
||||
<bean id="bankService" class="org.springframework.security.BankServiceImpl"/>
|
||||
|
||||
|
||||
</beans>
|
||||
|
|
|
@ -20,17 +20,17 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
|
|||
</security:exception-translation>
|
||||
|
||||
<bean id="theBeanToUse"
|
||||
class="org.acegisecurity.ui.AccessDeniedHandlerImpl">
|
||||
class="org.springframework.security.ui.AccessDeniedHandlerImpl">
|
||||
<property name="errorPage" value="/accessDenied.jsp" />
|
||||
</bean>
|
||||
|
||||
<!--<bean id="anotherBeanToUse"
|
||||
class="org.acegisecurity.ui.AccessDeniedHandlerImpl">
|
||||
class="org.springframework.security.ui.AccessDeniedHandlerImpl">
|
||||
<property name="errorPage" value="/accessDenied.jsp" />
|
||||
</bean>-->
|
||||
|
||||
<bean id="authenticationProcessingFilterEntryPoint"
|
||||
class="org.acegisecurity.ui.webapp.AuthenticationProcessingFilterEntryPoint">
|
||||
class="org.springframework.security.ui.webapp.AuthenticationProcessingFilterEntryPoint">
|
||||
<property name="loginFormUrl">
|
||||
<value>/acegilogin.jsp</value>
|
||||
</property>
|
||||
|
|
|
@ -22,12 +22,12 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
|
|||
</security:exception-translation>
|
||||
|
||||
<bean id="theBeanToUse"
|
||||
class="org.acegisecurity.ui.AccessDeniedHandlerImpl">
|
||||
class="org.springframework.security.ui.AccessDeniedHandlerImpl">
|
||||
<property name="errorPage" value="/accessDenied.jsp" />
|
||||
</bean>
|
||||
|
||||
<bean id="authenticationProcessingFilterEntryPoint"
|
||||
class="org.acegisecurity.ui.webapp.AuthenticationProcessingFilterEntryPoint">
|
||||
class="org.springframework.security.ui.webapp.AuthenticationProcessingFilterEntryPoint">
|
||||
<property name="loginFormUrl">
|
||||
<value>/acegilogin.jsp</value>
|
||||
</property>
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
|
||||
|
||||
<!--<bean id="initialDirContextFactory"
|
||||
class="org.acegisecurity.ldap.DefaultInitialDirContextFactory">
|
||||
class="org.springframework.security.ldap.DefaultInitialDirContextFactory">
|
||||
<constructor-arg
|
||||
value="ldap://monkeymachine:389/dc=acegisecurity,dc=org" />
|
||||
<property name="managerDn">
|
||||
|
@ -39,10 +39,10 @@
|
|||
</bean>
|
||||
|
||||
<bean id="ldapAuthProvider"
|
||||
class="org.acegisecurity.providers.ldap.LdapAuthenticationProvider">
|
||||
class="org.springframework.security.providers.ldap.LdapAuthenticationProvider">
|
||||
<constructor-arg>
|
||||
<bean
|
||||
class="org.acegisecurity.providers.ldap.authenticator.BindAuthenticator">
|
||||
class="org.springframework.security.providers.ldap.authenticator.BindAuthenticator">
|
||||
<constructor-arg>
|
||||
<ref local="initialDirContextFactory" />
|
||||
</constructor-arg>
|
||||
|
@ -55,7 +55,7 @@
|
|||
</constructor-arg>
|
||||
<constructor-arg>
|
||||
<bean
|
||||
class="org.acegisecurity.providers.ldap.populator.DefaultLdapAuthoritiesPopulator">
|
||||
class="org.springframework.security.providers.ldap.populator.DefaultLdapAuthoritiesPopulator">
|
||||
<constructor-arg>
|
||||
<ref local="initialDirContextFactory" />
|
||||
</constructor-arg>
|
||||
|
|
|
@ -21,7 +21,7 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
|
|||
id="rememberMeServices" key="someValue" />
|
||||
|
||||
<bean id="SecurityContextLogoutHandler"
|
||||
class="org.acegisecurity.ui.logout.SecurityContextLogoutHandler" />
|
||||
class="org.springframework.security.ui.logout.SecurityContextLogoutHandler" />
|
||||
|
||||
<security:principal-repository id="userDetailsService">
|
||||
<security:user-definition username="vishal"
|
||||
|
|
|
@ -37,7 +37,7 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
|
|||
<security:authentication-repository id="authenticationRepository" />
|
||||
|
||||
<bean id="userDetailsService"
|
||||
class="org.acegisecurity.userdetails.jdbc.JdbcDaoImpl">
|
||||
class="org.springframework.security.userdetails.jdbc.JdbcDaoImpl">
|
||||
<property name="dataSource">
|
||||
<ref bean="dataSource" />
|
||||
</property>
|
||||
|
|
|
@ -38,7 +38,7 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
|
|||
<security:authentication-repository id="authenticationRepository" />
|
||||
|
||||
<bean id="userDetailsService"
|
||||
class="org.acegisecurity.userdetails.jdbc.JdbcDaoImpl">
|
||||
class="org.springframework.security.userdetails.jdbc.JdbcDaoImpl">
|
||||
<property name="dataSource">
|
||||
<ref bean="dataSource" />
|
||||
</property>
|
||||
|
|
|
@ -36,7 +36,7 @@
|
|||
same story here, inner beans allowed
|
||||
</security:authentication-repository>
|
||||
|
||||
<bean id="userDetails" class="org.acegisecurity.userdetails.jdbc.JdbcDaoImpl">
|
||||
<bean id="userDetails" class="org.springframework.security.userdetails.jdbc.JdbcDaoImpl">
|
||||
<property name="dataSource"><ref bean="dataSource"/></property>
|
||||
</bean>
|
||||
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
package org.acegisecurity.webwork;
|
||||
package org.springframework.security.webwork;
|
||||
|
||||
import java.util.Map;
|
||||
|
||||
|
@ -21,7 +21,7 @@ import javax.servlet.ServletException;
|
|||
import javax.servlet.http.HttpServletRequest;
|
||||
import javax.servlet.http.HttpServletResponse;
|
||||
|
||||
import org.acegisecurity.ui.ExceptionTranslationFilter;
|
||||
import org.springframework.security.ui.ExceptionTranslationFilter;
|
||||
import org.apache.commons.logging.Log;
|
||||
import org.apache.commons.logging.LogFactory;
|
||||
|
||||
|
|
|
@ -12,12 +12,12 @@
|
|||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
package org.acegisecurity.webwork;
|
||||
package org.springframework.security.webwork;
|
||||
|
||||
import javax.servlet.FilterConfig;
|
||||
import javax.servlet.ServletException;
|
||||
|
||||
import org.acegisecurity.ui.ExceptionTranslationFilter;
|
||||
import org.springframework.security.ui.ExceptionTranslationFilter;
|
||||
|
||||
import com.opensymphony.webwork.dispatcher.DispatcherUtils;
|
||||
|
||||
|
|
Loading…
Reference in New Issue