Skip to content

Commit 07d7c0d

Browse files
committed
Renamed form and openID filters to shorten names
1 parent 949759c commit 07d7c0d

File tree

16 files changed

+61
-61
lines changed

16 files changed

+61
-61
lines changed

config/src/main/java/org/springframework/security/config/http/AuthenticationConfigBuilder.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,11 +53,11 @@ final class AuthenticationConfigBuilder {
5353
private static final String ATT_REALM = "realm";
5454
private static final String DEF_REALM = "Spring Security Application";
5555

56-
static final String OPEN_ID_AUTHENTICATION_PROCESSING_FILTER_CLASS = "org.springframework.security.openid.OpenIDAuthenticationProcessingFilter";
56+
static final String OPEN_ID_AUTHENTICATION_PROCESSING_FILTER_CLASS = "org.springframework.security.openid.OpenIDAuthenticationFilter";
5757
static final String OPEN_ID_AUTHENTICATION_PROVIDER_CLASS = "org.springframework.security.openid.OpenIDAuthenticationProvider";
5858
static final String OPEN_ID_CONSUMER_CLASS = "org.springframework.security.openid.OpenID4JavaConsumer";
5959
static final String OPEN_ID_ATTRIBUTE_CLASS = "org.springframework.security.openid.OpenIDAttribute";
60-
static final String AUTHENTICATION_PROCESSING_FILTER_CLASS = "org.springframework.security.web.authentication.UsernamePasswordAuthenticationProcessingFilter";
60+
static final String AUTHENTICATION_PROCESSING_FILTER_CLASS = "org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter";
6161

6262
private static final String ATT_AUTO_CONFIG = "auto-config";
6363

config/src/main/java/org/springframework/security/config/http/DefaultFilterChainValidator.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@
1515
import org.springframework.security.web.access.intercept.FilterSecurityInterceptor;
1616
import org.springframework.security.web.authentication.AnonymousProcessingFilter;
1717
import org.springframework.security.web.authentication.LoginUrlAuthenticationEntryPoint;
18-
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationProcessingFilter;
18+
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;
1919
import org.springframework.security.web.authentication.ui.DefaultLoginPageGeneratingFilter;
2020
import org.springframework.security.web.authentication.www.BasicProcessingFilter;
2121
import org.springframework.security.web.context.SecurityContextPersistenceFilter;
@@ -51,7 +51,7 @@ private Object getFilter(Class<?> type, List<Filter> filters) {
5151
*/
5252
private void checkFilterStack(List<Filter> filters) {
5353
checkForDuplicates(SecurityContextPersistenceFilter.class, filters);
54-
checkForDuplicates(UsernamePasswordAuthenticationProcessingFilter.class, filters);
54+
checkForDuplicates(UsernamePasswordAuthenticationFilter.class, filters);
5555
checkForDuplicates(SessionManagementFilter.class, filters);
5656
checkForDuplicates(BasicProcessingFilter.class, filters);
5757
checkForDuplicates(SecurityContextHolderAwareRequestFilter.class, filters);

config/src/test/java/org/springframework/security/config/FilterChainProxyConfigTests.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@
3434
import org.springframework.mock.web.MockHttpServletRequest;
3535
import org.springframework.mock.web.MockHttpServletResponse;
3636
import org.springframework.security.web.FilterChainProxy;
37-
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationProcessingFilter;
37+
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;
3838
import org.springframework.security.web.context.SecurityContextPersistenceFilter;
3939
import org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter;
4040

@@ -143,7 +143,7 @@ private void checkPathAndFilterOrder(FilterChainProxy filterChainProxy) throws E
143143
filters = filterChainProxy.getFilters("/another/nonspecificmatch");
144144
assertEquals(3, filters.size());
145145
assertTrue(filters.get(0) instanceof SecurityContextPersistenceFilter);
146-
assertTrue(filters.get(1) instanceof UsernamePasswordAuthenticationProcessingFilter);
146+
assertTrue(filters.get(1) instanceof UsernamePasswordAuthenticationFilter);
147147
assertTrue(filters.get(2) instanceof SecurityContextHolderAwareRequestFilter);
148148
}
149149

config/src/test/java/org/springframework/security/config/http/HttpSecurityBeanDefinitionParserTests.java

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@
3434
import org.springframework.security.core.session.SessionRegistryImpl;
3535
import org.springframework.security.openid.OpenID4JavaConsumer;
3636
import org.springframework.security.openid.OpenIDAttribute;
37-
import org.springframework.security.openid.OpenIDAuthenticationProcessingFilter;
37+
import org.springframework.security.openid.OpenIDAuthenticationFilter;
3838
import org.springframework.security.openid.OpenIDAuthenticationProvider;
3939
import org.springframework.security.util.FieldUtils;
4040
import org.springframework.security.web.FilterChainProxy;
@@ -54,7 +54,7 @@
5454
import org.springframework.security.web.authentication.RememberMeServices;
5555
import org.springframework.security.web.authentication.SavedRequestAwareAuthenticationSuccessHandler;
5656
import org.springframework.security.web.authentication.SimpleUrlAuthenticationFailureHandler;
57-
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationProcessingFilter;
57+
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;
5858
import org.springframework.security.web.authentication.logout.LogoutFilter;
5959
import org.springframework.security.web.authentication.logout.LogoutHandler;
6060
import org.springframework.security.web.authentication.preauth.x509.SubjectDnX509PrincipalExtractor;
@@ -100,8 +100,8 @@ public void minimalConfigurationParses() {
100100
public void beanClassNamesAreCorrect() throws Exception {
101101
assertEquals(DefaultWebSecurityExpressionHandler.class.getName(), HttpSecurityBeanDefinitionParser.EXPRESSION_HANDLER_CLASS);
102102
assertEquals(ExpressionBasedFilterInvocationSecurityMetadataSource.class.getName(), HttpSecurityBeanDefinitionParser.EXPRESSION_FIMDS_CLASS);
103-
assertEquals(UsernamePasswordAuthenticationProcessingFilter.class.getName(), AUTHENTICATION_PROCESSING_FILTER_CLASS);
104-
assertEquals(OpenIDAuthenticationProcessingFilter.class.getName(), OPEN_ID_AUTHENTICATION_PROCESSING_FILTER_CLASS);
103+
assertEquals(UsernamePasswordAuthenticationFilter.class.getName(), AUTHENTICATION_PROCESSING_FILTER_CLASS);
104+
assertEquals(OpenIDAuthenticationFilter.class.getName(), OPEN_ID_AUTHENTICATION_PROCESSING_FILTER_CLASS);
105105
assertEquals(OpenIDAuthenticationProvider.class.getName(), OPEN_ID_AUTHENTICATION_PROVIDER_CLASS);
106106
}
107107

@@ -130,7 +130,7 @@ private void checkAutoConfigFilters(List<Filter> filterList) throws Exception {
130130
assertTrue(filters.next() instanceof SecurityContextPersistenceFilter);
131131
assertTrue(filters.next() instanceof LogoutFilter);
132132
Object authProcFilter = filters.next();
133-
assertTrue(authProcFilter instanceof UsernamePasswordAuthenticationProcessingFilter);
133+
assertTrue(authProcFilter instanceof UsernamePasswordAuthenticationFilter);
134134
assertTrue(filters.next() instanceof DefaultLoginPageGeneratingFilter);
135135
assertTrue(filters.next() instanceof BasicProcessingFilter);
136136
assertTrue(filters.next() instanceof RequestCacheAwareFilter);
@@ -215,7 +215,7 @@ public void formLoginAlwaysUseDefaultSetsCorrectProperty() throws Exception {
215215
" <form-login default-target-url='/default' always-use-default-target='true' />" +
216216
"</http>" + AUTH_PROVIDER_XML);
217217
// These will be matched by the default pattern "/**"
218-
UsernamePasswordAuthenticationProcessingFilter filter = (UsernamePasswordAuthenticationProcessingFilter) getFilters("/anything").get(1);
218+
UsernamePasswordAuthenticationFilter filter = (UsernamePasswordAuthenticationFilter) getFilters("/anything").get(1);
219219
assertEquals("/default", FieldUtils.getFieldValue(filter, "successHandler.defaultTargetUrl"));
220220
assertEquals(Boolean.TRUE, FieldUtils.getFieldValue(filter, "successHandler.alwaysUseDefaultTargetUrl"));
221221
}
@@ -320,8 +320,8 @@ public void interceptUrlsAndFormLoginSupportPropertyPlaceholders() throws Except
320320
assertEquals("ROLE_A",attrs.get(0).getAttribute());
321321

322322
// Check the form login properties are set
323-
UsernamePasswordAuthenticationProcessingFilter apf = (UsernamePasswordAuthenticationProcessingFilter)
324-
getFilter(UsernamePasswordAuthenticationProcessingFilter.class);
323+
UsernamePasswordAuthenticationFilter apf = (UsernamePasswordAuthenticationFilter)
324+
getFilter(UsernamePasswordAuthenticationFilter.class);
325325
assertEquals("/defaultTarget", FieldUtils.getFieldValue(apf, "successHandler.defaultTargetUrl"));
326326
assertEquals("/authFailure", FieldUtils.getFieldValue(apf, "failureHandler.defaultFailureUrl"));
327327

@@ -690,7 +690,7 @@ private void checkSessionRegistry() throws Exception {
690690
Object sessionRegistryFromConcurrencyFilter = FieldUtils.getFieldValue(
691691
getFilter(ConcurrentSessionFilter.class), "sessionRegistry");
692692
Object sessionRegistryFromFormLoginFilter = FieldUtils.getFieldValue(
693-
getFilter(UsernamePasswordAuthenticationProcessingFilter.class),"sessionStrategy.sessionRegistry");
693+
getFilter(UsernamePasswordAuthenticationFilter.class),"sessionStrategy.sessionRegistry");
694694
// Object sessionRegistryFromController = FieldUtils.getFieldValue(getConcurrentSessionController(),"sessionRegistry");
695695
Object sessionRegistryFromMgmtFilter = FieldUtils.getFieldValue(
696696
getFilter(SessionManagementFilter.class),"sessionStrategy.sessionRegistry");
@@ -968,7 +968,7 @@ public void customSuccessAndFailureHandlersCanBeSetThroughTheNamespace() throws
968968
"<b:bean id='sh' class='" + SavedRequestAwareAuthenticationSuccessHandler.class.getName() +"'/>" +
969969
"<b:bean id='fh' class='" + SimpleUrlAuthenticationFailureHandler.class.getName() + "'/>" +
970970
AUTH_PROVIDER_XML);
971-
UsernamePasswordAuthenticationProcessingFilter apf = (UsernamePasswordAuthenticationProcessingFilter) getFilter(UsernamePasswordAuthenticationProcessingFilter.class);
971+
UsernamePasswordAuthenticationFilter apf = (UsernamePasswordAuthenticationFilter) getFilter(UsernamePasswordAuthenticationFilter.class);
972972
AuthenticationSuccessHandler sh = (AuthenticationSuccessHandler) appContext.getBean("sh");
973973
AuthenticationFailureHandler fh = (AuthenticationFailureHandler) appContext.getBean("fh");
974974
assertSame(sh, FieldUtils.getFieldValue(apf, "successHandler"));
@@ -1005,7 +1005,7 @@ public void openIDWithAttributeExchangeConfigurationIsParsedCorrectly() throws E
10051005
" </openid-login>" +
10061006
"</http>" +
10071007
AUTH_PROVIDER_XML);
1008-
OpenIDAuthenticationProcessingFilter apf = (OpenIDAuthenticationProcessingFilter) getFilter(OpenIDAuthenticationProcessingFilter.class);
1008+
OpenIDAuthenticationFilter apf = (OpenIDAuthenticationFilter) getFilter(OpenIDAuthenticationFilter.class);
10091009

10101010
OpenID4JavaConsumer consumer = (OpenID4JavaConsumer) FieldUtils.getFieldValue(apf, "consumer");
10111011
List<OpenIDAttribute> attributes = (List<OpenIDAttribute>) FieldUtils.getFieldValue(consumer, "attributesToFetch");

config/src/test/resources/org/springframework/security/util/filtertest-valid.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
3131
<!-- These are just here so we have filters of a specific type to check the ordering is as expected -->
3232
<bean id="sif" class="org.springframework.security.web.context.SecurityContextPersistenceFilter"/>
3333

34-
<bean id="apf" class="org.springframework.security.web.authentication.UsernamePasswordAuthenticationProcessingFilter">
34+
<bean id="apf" class="org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter">
3535
<property name="authenticationManager">
3636
<bean class="org.springframework.security.MockAuthenticationManager"/>
3737
</property>

itest/context/src/test/resources/filter-chain-performance-app-context.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@
3939

4040
<bean id="scpf" class="org.springframework.security.web.context.SecurityContextPersistenceFilter"/>
4141

42-
<bean id="apf" class="org.springframework.security.web.authentication.UsernamePasswordAuthenticationProcessingFilter">
42+
<bean id="apf" class="org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter">
4343
<property name="authenticationManager" ref="authenticationManager"/>
4444
</bean>
4545

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@
3030
import org.springframework.security.core.Authentication;
3131
import org.springframework.security.core.AuthenticationException;
3232
import org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter;
33-
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationProcessingFilter;
33+
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;
3434
import org.springframework.util.StringUtils;
3535

3636

@@ -63,7 +63,7 @@
6363
* @since 2.0
6464
* @see OpenIDAuthenticationProvider
6565
*/
66-
public class OpenIDAuthenticationProcessingFilter extends AbstractAuthenticationProcessingFilter {
66+
public class OpenIDAuthenticationFilter extends AbstractAuthenticationProcessingFilter {
6767
//~ Static fields/initializers =====================================================================================
6868

6969
public static final String DEFAULT_CLAIMED_IDENTITY_FIELD = "j_username";
@@ -76,7 +76,7 @@ public class OpenIDAuthenticationProcessingFilter extends AbstractAuthentication
7676

7777
//~ Constructors ===================================================================================================
7878

79-
public OpenIDAuthenticationProcessingFilter() {
79+
public OpenIDAuthenticationFilter() {
8080
super("/j_spring_openid_security_check");
8181
}
8282

@@ -158,7 +158,7 @@ private void setLastUsername(String username, HttpServletRequest request) {
158158
HttpSession session = request.getSession(false);
159159

160160
if (session != null || getAllowSessionCreation()) {
161-
request.getSession().setAttribute(UsernamePasswordAuthenticationProcessingFilter.SPRING_SECURITY_LAST_USERNAME_KEY, username);
161+
request.getSession().setAttribute(UsernamePasswordAuthenticationFilter.SPRING_SECURITY_LAST_USERNAME_KEY, username);
162162
}
163163
}
164164

openid/src/test/java/org/springframework/security/openid/OpenIDAuthenticationProcessingFilterTests.java

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,13 +13,13 @@
1313
import org.springframework.mock.web.MockHttpServletRequest;
1414
import org.springframework.mock.web.MockHttpServletResponse;
1515
import org.springframework.security.MockAuthenticationManager;
16-
import org.springframework.security.openid.OpenIDAuthenticationProcessingFilter;
16+
import org.springframework.security.openid.OpenIDAuthenticationFilter;
1717
import org.springframework.security.openid.OpenIDConsumerException;
1818
import org.springframework.security.web.authentication.SavedRequestAwareAuthenticationSuccessHandler;
1919

2020
public class OpenIDAuthenticationProcessingFilterTests {
2121

22-
OpenIDAuthenticationProcessingFilter filter;
22+
OpenIDAuthenticationFilter filter;
2323
private static final String REDIRECT_URL = "http://www.example.com/redirect";
2424
private static final String CLAIMED_IDENTITY_URL = "http://www.example.com/identity";
2525
private static final String REQUEST_PATH = "/j_spring_openid_security_check";
@@ -28,7 +28,7 @@ public class OpenIDAuthenticationProcessingFilterTests {
2828

2929
@Before
3030
public void setUp() throws Exception {
31-
filter = new OpenIDAuthenticationProcessingFilter();
31+
filter = new OpenIDAuthenticationFilter();
3232
filter.setConsumer(new MockOpenIDConsumer(REDIRECT_URL));
3333
SavedRequestAwareAuthenticationSuccessHandler successHandler = new SavedRequestAwareAuthenticationSuccessHandler();
3434
filter.setAuthenticationSuccessHandler(new SavedRequestAwareAuthenticationSuccessHandler());

web/src/main/java/org/springframework/security/web/authentication/AuthenticationProcessingFilter.java

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,13 @@
33
/**
44
* Renamed class, retained for backwards compatibility.
55
* <p>
6-
* See {@link UsernamePasswordAuthenticationProcessingFilter}.
6+
* See {@link UsernamePasswordAuthenticationFilter}.
77
*
88
* @author Luke Taylor
99
* @version $Id$
10-
* @deprecated Use UsernamePasswordAuthenticationProcessingFilter instead.
10+
* @deprecated Use UsernamePasswordAuthenticationFilter instead.
1111
*/
1212

13-
public class AuthenticationProcessingFilter extends UsernamePasswordAuthenticationProcessingFilter {
13+
public class AuthenticationProcessingFilter extends UsernamePasswordAuthenticationFilter {
1414

1515
}

web/src/main/java/org/springframework/security/web/authentication/LoginUrlAuthenticationEntryPoint.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@
4343

4444
/**
4545
* Used by the {@link ExceptionTranslationFilter} to commence a form login
46-
* authentication via the {@link UsernamePasswordAuthenticationProcessingFilter}. This object
46+
* authentication via the {@link UsernamePasswordAuthenticationFilter}. This object
4747
* holds the location of the login form, relative to the web app context path,
4848
* and is used to commence a redirect to that form.
4949
* <p>
@@ -220,7 +220,7 @@ protected boolean isForceHttps() {
220220
}
221221

222222
/**
223-
* The URL where the <code>UsernamePasswordAuthenticationProcessingFilter</code> login
223+
* The URL where the <code>UsernamePasswordAuthenticationFilter</code> login
224224
* page can be found. Should be relative to the web-app context path, and
225225
* include a leading <code>/</code>
226226
*/
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@
4646
* @version $Id$
4747
* @since 3.0
4848
*/
49-
public class UsernamePasswordAuthenticationProcessingFilter extends AbstractAuthenticationProcessingFilter {
49+
public class UsernamePasswordAuthenticationFilter extends AbstractAuthenticationProcessingFilter {
5050
//~ Static fields/initializers =====================================================================================
5151

5252
public static final String SPRING_SECURITY_FORM_USERNAME_KEY = "j_username";
@@ -59,7 +59,7 @@ public class UsernamePasswordAuthenticationProcessingFilter extends AbstractAuth
5959

6060
//~ Constructors ===================================================================================================
6161

62-
public UsernamePasswordAuthenticationProcessingFilter() {
62+
public UsernamePasswordAuthenticationFilter() {
6363
super("/j_spring_security_check");
6464
}
6565

web/src/main/java/org/springframework/security/web/authentication/session/ConcurrentSessionControlStrategy.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@
1515
import org.springframework.security.core.session.SessionInformation;
1616
import org.springframework.security.core.session.SessionRegistry;
1717
import org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter;
18-
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationProcessingFilter;
18+
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;
1919
import org.springframework.security.web.session.ConcurrentSessionFilter;
2020
import org.springframework.security.web.session.SessionManagementFilter;
2121
import org.springframework.util.Assert;
@@ -33,7 +33,7 @@
3333
* set to <tt>true</tt>, however, the user will be prevented from starting a new authenticated session.
3434
* <p>
3535
* This strategy can be injected into both the {@link SessionManagementFilter} and instances of
36-
* {@link AbstractAuthenticationProcessingFilter} (typically {@link UsernamePasswordAuthenticationProcessingFilter}).
36+
* {@link AbstractAuthenticationProcessingFilter} (typically {@link UsernamePasswordAuthenticationFilter}).
3737
*
3838
* @author Luke Taylor
3939
* @version $Id$

0 commit comments

Comments
 (0)