|
34 | 34 | import org.springframework.security.core.session.SessionRegistryImpl;
|
35 | 35 | import org.springframework.security.openid.OpenID4JavaConsumer;
|
36 | 36 | import org.springframework.security.openid.OpenIDAttribute;
|
37 |
| -import org.springframework.security.openid.OpenIDAuthenticationProcessingFilter; |
| 37 | +import org.springframework.security.openid.OpenIDAuthenticationFilter; |
38 | 38 | import org.springframework.security.openid.OpenIDAuthenticationProvider;
|
39 | 39 | import org.springframework.security.util.FieldUtils;
|
40 | 40 | import org.springframework.security.web.FilterChainProxy;
|
|
54 | 54 | import org.springframework.security.web.authentication.RememberMeServices;
|
55 | 55 | import org.springframework.security.web.authentication.SavedRequestAwareAuthenticationSuccessHandler;
|
56 | 56 | import org.springframework.security.web.authentication.SimpleUrlAuthenticationFailureHandler;
|
57 |
| -import org.springframework.security.web.authentication.UsernamePasswordAuthenticationProcessingFilter; |
| 57 | +import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter; |
58 | 58 | import org.springframework.security.web.authentication.logout.LogoutFilter;
|
59 | 59 | import org.springframework.security.web.authentication.logout.LogoutHandler;
|
60 | 60 | import org.springframework.security.web.authentication.preauth.x509.SubjectDnX509PrincipalExtractor;
|
@@ -100,8 +100,8 @@ public void minimalConfigurationParses() {
|
100 | 100 | public void beanClassNamesAreCorrect() throws Exception {
|
101 | 101 | assertEquals(DefaultWebSecurityExpressionHandler.class.getName(), HttpSecurityBeanDefinitionParser.EXPRESSION_HANDLER_CLASS);
|
102 | 102 | assertEquals(ExpressionBasedFilterInvocationSecurityMetadataSource.class.getName(), HttpSecurityBeanDefinitionParser.EXPRESSION_FIMDS_CLASS);
|
103 |
| - assertEquals(UsernamePasswordAuthenticationProcessingFilter.class.getName(), AUTHENTICATION_PROCESSING_FILTER_CLASS); |
104 |
| - assertEquals(OpenIDAuthenticationProcessingFilter.class.getName(), OPEN_ID_AUTHENTICATION_PROCESSING_FILTER_CLASS); |
| 103 | + assertEquals(UsernamePasswordAuthenticationFilter.class.getName(), AUTHENTICATION_PROCESSING_FILTER_CLASS); |
| 104 | + assertEquals(OpenIDAuthenticationFilter.class.getName(), OPEN_ID_AUTHENTICATION_PROCESSING_FILTER_CLASS); |
105 | 105 | assertEquals(OpenIDAuthenticationProvider.class.getName(), OPEN_ID_AUTHENTICATION_PROVIDER_CLASS);
|
106 | 106 | }
|
107 | 107 |
|
@@ -130,7 +130,7 @@ private void checkAutoConfigFilters(List<Filter> filterList) throws Exception {
|
130 | 130 | assertTrue(filters.next() instanceof SecurityContextPersistenceFilter);
|
131 | 131 | assertTrue(filters.next() instanceof LogoutFilter);
|
132 | 132 | Object authProcFilter = filters.next();
|
133 |
| - assertTrue(authProcFilter instanceof UsernamePasswordAuthenticationProcessingFilter); |
| 133 | + assertTrue(authProcFilter instanceof UsernamePasswordAuthenticationFilter); |
134 | 134 | assertTrue(filters.next() instanceof DefaultLoginPageGeneratingFilter);
|
135 | 135 | assertTrue(filters.next() instanceof BasicProcessingFilter);
|
136 | 136 | assertTrue(filters.next() instanceof RequestCacheAwareFilter);
|
@@ -215,7 +215,7 @@ public void formLoginAlwaysUseDefaultSetsCorrectProperty() throws Exception {
|
215 | 215 | " <form-login default-target-url='/default' always-use-default-target='true' />" +
|
216 | 216 | "</http>" + AUTH_PROVIDER_XML);
|
217 | 217 | // These will be matched by the default pattern "/**"
|
218 |
| - UsernamePasswordAuthenticationProcessingFilter filter = (UsernamePasswordAuthenticationProcessingFilter) getFilters("/anything").get(1); |
| 218 | + UsernamePasswordAuthenticationFilter filter = (UsernamePasswordAuthenticationFilter) getFilters("/anything").get(1); |
219 | 219 | assertEquals("/default", FieldUtils.getFieldValue(filter, "successHandler.defaultTargetUrl"));
|
220 | 220 | assertEquals(Boolean.TRUE, FieldUtils.getFieldValue(filter, "successHandler.alwaysUseDefaultTargetUrl"));
|
221 | 221 | }
|
@@ -320,8 +320,8 @@ public void interceptUrlsAndFormLoginSupportPropertyPlaceholders() throws Except
|
320 | 320 | assertEquals("ROLE_A",attrs.get(0).getAttribute());
|
321 | 321 |
|
322 | 322 | // Check the form login properties are set
|
323 |
| - UsernamePasswordAuthenticationProcessingFilter apf = (UsernamePasswordAuthenticationProcessingFilter) |
324 |
| - getFilter(UsernamePasswordAuthenticationProcessingFilter.class); |
| 323 | + UsernamePasswordAuthenticationFilter apf = (UsernamePasswordAuthenticationFilter) |
| 324 | + getFilter(UsernamePasswordAuthenticationFilter.class); |
325 | 325 | assertEquals("/defaultTarget", FieldUtils.getFieldValue(apf, "successHandler.defaultTargetUrl"));
|
326 | 326 | assertEquals("/authFailure", FieldUtils.getFieldValue(apf, "failureHandler.defaultFailureUrl"));
|
327 | 327 |
|
@@ -690,7 +690,7 @@ private void checkSessionRegistry() throws Exception {
|
690 | 690 | Object sessionRegistryFromConcurrencyFilter = FieldUtils.getFieldValue(
|
691 | 691 | getFilter(ConcurrentSessionFilter.class), "sessionRegistry");
|
692 | 692 | Object sessionRegistryFromFormLoginFilter = FieldUtils.getFieldValue(
|
693 |
| - getFilter(UsernamePasswordAuthenticationProcessingFilter.class),"sessionStrategy.sessionRegistry"); |
| 693 | + getFilter(UsernamePasswordAuthenticationFilter.class),"sessionStrategy.sessionRegistry"); |
694 | 694 | // Object sessionRegistryFromController = FieldUtils.getFieldValue(getConcurrentSessionController(),"sessionRegistry");
|
695 | 695 | Object sessionRegistryFromMgmtFilter = FieldUtils.getFieldValue(
|
696 | 696 | getFilter(SessionManagementFilter.class),"sessionStrategy.sessionRegistry");
|
@@ -968,7 +968,7 @@ public void customSuccessAndFailureHandlersCanBeSetThroughTheNamespace() throws
|
968 | 968 | "<b:bean id='sh' class='" + SavedRequestAwareAuthenticationSuccessHandler.class.getName() +"'/>" +
|
969 | 969 | "<b:bean id='fh' class='" + SimpleUrlAuthenticationFailureHandler.class.getName() + "'/>" +
|
970 | 970 | AUTH_PROVIDER_XML);
|
971 |
| - UsernamePasswordAuthenticationProcessingFilter apf = (UsernamePasswordAuthenticationProcessingFilter) getFilter(UsernamePasswordAuthenticationProcessingFilter.class); |
| 971 | + UsernamePasswordAuthenticationFilter apf = (UsernamePasswordAuthenticationFilter) getFilter(UsernamePasswordAuthenticationFilter.class); |
972 | 972 | AuthenticationSuccessHandler sh = (AuthenticationSuccessHandler) appContext.getBean("sh");
|
973 | 973 | AuthenticationFailureHandler fh = (AuthenticationFailureHandler) appContext.getBean("fh");
|
974 | 974 | assertSame(sh, FieldUtils.getFieldValue(apf, "successHandler"));
|
@@ -1005,7 +1005,7 @@ public void openIDWithAttributeExchangeConfigurationIsParsedCorrectly() throws E
|
1005 | 1005 | " </openid-login>" +
|
1006 | 1006 | "</http>" +
|
1007 | 1007 | AUTH_PROVIDER_XML);
|
1008 |
| - OpenIDAuthenticationProcessingFilter apf = (OpenIDAuthenticationProcessingFilter) getFilter(OpenIDAuthenticationProcessingFilter.class); |
| 1008 | + OpenIDAuthenticationFilter apf = (OpenIDAuthenticationFilter) getFilter(OpenIDAuthenticationFilter.class); |
1009 | 1009 |
|
1010 | 1010 | OpenID4JavaConsumer consumer = (OpenID4JavaConsumer) FieldUtils.getFieldValue(apf, "consumer");
|
1011 | 1011 | List<OpenIDAttribute> attributes = (List<OpenIDAttribute>) FieldUtils.getFieldValue(consumer, "attributesToFetch");
|
|
0 commit comments