@ -34,25 +34,25 @@ public class BasePermission extends AbstractPermission {
@@ -34,25 +34,25 @@ public class BasePermission extends AbstractPermission {
@ -62,11 +62,11 @@ public class BasePermission extends AbstractPermission {
@@ -62,11 +62,11 @@ public class BasePermission extends AbstractPermission {
@ -122,7 +122,7 @@ public class AfterInvocationProviderManager implements AfterInvocationManager, I
@@ -122,7 +122,7 @@ public class AfterInvocationProviderManager implements AfterInvocationManager, I
@ -51,21 +51,17 @@ public class MapBasedAttributes2GrantedAuthoritiesMapper implements Attributes2G
@@ -51,21 +51,17 @@ public class MapBasedAttributes2GrantedAuthoritiesMapper implements Attributes2G
@ -74,11 +70,14 @@ public class MapBasedAttributes2GrantedAuthoritiesMapper implements Attributes2G
@@ -74,11 +70,14 @@ public class MapBasedAttributes2GrantedAuthoritiesMapper implements Attributes2G
@ -90,8 +89,8 @@ public class MapBasedAttributes2GrantedAuthoritiesMapper implements Attributes2G
@@ -90,8 +89,8 @@ public class MapBasedAttributes2GrantedAuthoritiesMapper implements Attributes2G
@ -109,7 +108,7 @@ public class MapBasedAttributes2GrantedAuthoritiesMapper implements Attributes2G
@@ -109,7 +108,7 @@ public class MapBasedAttributes2GrantedAuthoritiesMapper implements Attributes2G
@ -121,10 +120,9 @@ public class MapBasedAttributes2GrantedAuthoritiesMapper implements Attributes2G
@@ -121,10 +120,9 @@ public class MapBasedAttributes2GrantedAuthoritiesMapper implements Attributes2G
@ -148,7 +146,7 @@ public class MapBasedAttributes2GrantedAuthoritiesMapper implements Attributes2G
@@ -148,7 +146,7 @@ public class MapBasedAttributes2GrantedAuthoritiesMapper implements Attributes2G
@ -55,27 +58,25 @@ public abstract class XmlMappableAttributesRetriever implements MappableAttribut
@@ -55,27 +58,25 @@ public abstract class XmlMappableAttributesRetriever implements MappableAttribut
publicvoidafterPropertiesSet()throwsException{
Assert.notNull(xmlInputStream,"An XML InputStream must be set");
Assert.notNull(xpathExpression,"An XPath expression must be set");
logger.debug("Reading mappable attributes from XML document");
}
try{
Documentdoc=getDocument(aStream);
String[]roles=getMappableAttributes(doc);
Set<String>roles=getMappableAttributes(doc);
if(logger.isDebugEnabled()){
logger.debug("Mappable attributes from XML document: "+Arrays.asList(roles));
logger.debug("Mappable attributes from XML document: "+roles);
}
returnroles;
}finally{
@ -118,13 +119,14 @@ public abstract class XmlMappableAttributesRetriever implements MappableAttribut
@@ -118,13 +119,14 @@ public abstract class XmlMappableAttributesRetriever implements MappableAttribut
@ -43,6 +43,7 @@ public class FilterChainProxyPostProcessor implements BeanPostProcessor, BeanFac
@@ -43,6 +43,7 @@ public class FilterChainProxyPostProcessor implements BeanPostProcessor, BeanFac
@ -51,7 +52,7 @@ public class FilterChainProxyPostProcessor implements BeanPostProcessor, BeanFac
@@ -51,7 +52,7 @@ public class FilterChainProxyPostProcessor implements BeanPostProcessor, BeanFac
@ -82,7 +83,7 @@ public class FilterChainProxyPostProcessor implements BeanPostProcessor, BeanFac
@@ -82,7 +83,7 @@ public class FilterChainProxyPostProcessor implements BeanPostProcessor, BeanFac
@ -38,57 +38,57 @@ class SessionRegistryInjectionBeanPostProcessor implements BeanPostProcessor, Be
@@ -38,57 +38,57 @@ class SessionRegistryInjectionBeanPostProcessor implements BeanPostProcessor, Be
logger.info("ConcurrentSessionController is not a standard implementation. SessionRegistry could not be read from it. Looking for it in the context.");
thrownewSecurityConfigurationException("concurrent-session-controller-ref was set but no SessionRegistry could be obtained from the application context.");
}
if(sessionRegs.size()>1){
logger.warn("More than one SessionRegistry instance in application context. Possible configuration errors may result.");
logger.info("ConcurrentSessionController is not a standard implementation. SessionRegistry could not be read from it. Looking for it in the context.");
thrownewSecurityConfigurationException("concurrent-session-controller-ref was set but no SessionRegistry could be obtained from the application context.");
}
if(sessionRegs.size()>1){
logger.warn("More than one SessionRegistry instance in application context. Possible configuration errors may result.");
@ -86,7 +86,7 @@ public class MethodExpressionAfterInvocationProvider implements AfterInvocationP
@@ -86,7 +86,7 @@ public class MethodExpressionAfterInvocationProvider implements AfterInvocationP
@ -47,7 +47,7 @@ public class WebAuthenticationDetailsSource implements AuthenticationDetailsSour
@@ -47,7 +47,7 @@ public class WebAuthenticationDetailsSource implements AuthenticationDetailsSour
@ -63,7 +63,7 @@ public class WebAuthenticationDetailsSource implements AuthenticationDetailsSour
@@ -63,7 +63,7 @@ public class WebAuthenticationDetailsSource implements AuthenticationDetailsSour
@ -72,7 +72,7 @@ public abstract class AbstractPreAuthenticatedAuthenticationDetailsSource extend
@@ -72,7 +72,7 @@ public abstract class AbstractPreAuthenticatedAuthenticationDetailsSource extend
@ -36,12 +37,12 @@ public class J2eeBasedPreAuthenticatedWebAuthenticationDetailsSource extends Abs
@@ -36,12 +37,12 @@ public class J2eeBasedPreAuthenticatedWebAuthenticationDetailsSource extends Abs
@ -35,7 +35,7 @@ public class UserAttributeEditor extends PropertyEditorSupport {
@@ -35,7 +35,7 @@ public class UserAttributeEditor extends PropertyEditorSupport {
@ -48,11 +48,11 @@ public class UserAttributeEditor extends PropertyEditorSupport {
@@ -48,11 +48,11 @@ public class UserAttributeEditor extends PropertyEditorSupport {
@ -113,7 +113,7 @@ public abstract class AbstractAccessDecisionManager implements AccessDecisionMan
@@ -113,7 +113,7 @@ public abstract class AbstractAccessDecisionManager implements AccessDecisionMan
@ -52,7 +52,7 @@ public class MockAccessDecisionManager implements AccessDecisionManager {
@@ -52,7 +52,7 @@ public class MockAccessDecisionManager implements AccessDecisionManager {
@ -53,7 +53,7 @@ public class MockAfterInvocationManager implements AfterInvocationManager {
@@ -53,7 +53,7 @@ public class MockAfterInvocationManager implements AfterInvocationManager {
@ -159,7 +159,7 @@ public class AfterInvocationProviderManagerTests extends TestCase {
@@ -159,7 +159,7 @@ public class AfterInvocationProviderManagerTests extends TestCase {
@ -30,7 +30,7 @@ public class ExpressionProtectedBusinessServiceImpl implements BusinessService {
@@ -30,7 +30,7 @@ public class ExpressionProtectedBusinessServiceImpl implements BusinessService {
@PreFilter(filterTarget="someList",value="filterObject == authentication.name or filterObject == 'sam'")
@ -38,12 +38,12 @@ public class Jsr250BusinessServiceImpl implements BusinessService {
@@ -38,12 +38,12 @@ public class Jsr250BusinessServiceImpl implements BusinessService {
@ -100,11 +100,11 @@ public class SimpleRoles2GrantedAuthoritiesMapperTests extends TestCase {
@@ -100,11 +100,11 @@ public class SimpleRoles2GrantedAuthoritiesMapperTests extends TestCase {
@ -221,11 +221,11 @@ public class GlobalMethodSecurityBeanDefinitionParserTests {
@@ -221,11 +221,11 @@ public class GlobalMethodSecurityBeanDefinitionParserTests {
@ -18,7 +18,7 @@ public class MockAfterInvocationProvider implements AfterInvocationProvider {
@@ -18,7 +18,7 @@ public class MockAfterInvocationProvider implements AfterInvocationProvider {
@ -60,10 +46,6 @@ public class MethodInvocationPrivilegeEvaluatorTests extends TestCase {
@@ -60,10 +46,6 @@ public class MethodInvocationPrivilegeEvaluatorTests extends TestCase {
@ -71,11 +53,12 @@ public class MethodInvocationPrivilegeEvaluatorTests extends TestCase {
@@ -71,11 +53,12 @@ public class MethodInvocationPrivilegeEvaluatorTests extends TestCase {
@ -85,10 +68,10 @@ public class MethodInvocationPrivilegeEvaluatorTests extends TestCase {
@@ -85,10 +68,10 @@ public class MethodInvocationPrivilegeEvaluatorTests extends TestCase {
@ -100,9 +83,10 @@ public class MethodInvocationPrivilegeEvaluatorTests extends TestCase {
@@ -100,9 +83,10 @@ public class MethodInvocationPrivilegeEvaluatorTests extends TestCase {
@ -114,10 +98,10 @@ public class MethodInvocationPrivilegeEvaluatorTests extends TestCase {
@@ -114,10 +98,10 @@ public class MethodInvocationPrivilegeEvaluatorTests extends TestCase {
@ -407,7 +407,7 @@ public class MethodSecurityInterceptorTests extends TestCase {
@@ -407,7 +407,7 @@ public class MethodSecurityInterceptorTests extends TestCase {
thrownewUnsupportedOperationException("mock method not implemented");
}
publicbooleansupports(Classclazz){
publicbooleansupports(Class<?>clazz){
if(String.class.isAssignableFrom(clazz)){
returntrue;
}else{
@ -426,7 +426,7 @@ public class MethodSecurityInterceptorTests extends TestCase {
@@ -426,7 +426,7 @@ public class MethodSecurityInterceptorTests extends TestCase {
thrownewUnsupportedOperationException("mock method not implemented");
@ -78,7 +61,7 @@ public class AspectJSecurityInterceptorTests extends TestCase {
@@ -78,7 +61,7 @@ public class AspectJSecurityInterceptorTests extends TestCase {
@ -108,7 +91,7 @@ public class AspectJSecurityInterceptorTests extends TestCase {
@@ -108,7 +91,7 @@ public class AspectJSecurityInterceptorTests extends TestCase {
// check default given we passed some GrantedAuthorty[]s (well, we passed empty list)
@ -73,27 +58,22 @@ public class UsernamePasswordAuthenticationTokenTests extends TestCase {
@@ -73,27 +58,22 @@ public class UsernamePasswordAuthenticationTokenTests extends TestCase {
token.setAuthenticated(true);
fail("Should have prohibited setAuthenticated(true)");
@ -94,49 +82,39 @@ public class AnonymousAuthenticationTokenTests extends TestCase {
@@ -94,49 +82,39 @@ public class AnonymousAuthenticationTokenTests extends TestCase {
@ -13,12 +14,12 @@ public class PortletPreAuthenticatedAuthenticationDetailsSource extends Abstract
@@ -13,12 +14,12 @@ public class PortletPreAuthenticatedAuthenticationDetailsSource extends Abstract