@ -84,7 +83,7 @@ public class DefaultSpringSecurityContextSource extends LdapContextSource {
@@ -84,7 +83,7 @@ public class DefaultSpringSecurityContextSource extends LdapContextSource {
// Remove the pooling flag unless authenticating as the 'manager' user.
@ -145,7 +144,7 @@ public class DefaultSpringSecurityContextSource extends LdapContextSource {
@@ -145,7 +144,7 @@ public class DefaultSpringSecurityContextSource extends LdapContextSource {
StringBuilderproviderUrl=newStringBuilder();
for(StringserverUrl:urls){
StringtrimmedUrl=serverUrl.trim();
if("".equals(trimmedUrl)){
if(trimmedUrl.isEmpty()){
continue;
}
providerUrl.append(trimmedUrl);
@ -160,21 +159,11 @@ public class DefaultSpringSecurityContextSource extends LdapContextSource {
@@ -160,21 +159,11 @@ public class DefaultSpringSecurityContextSource extends LdapContextSource {
@ -98,7 +97,7 @@ public class SpringSecurityLdapTemplate extends LdapTemplate {
@@ -98,7 +97,7 @@ public class SpringSecurityLdapTemplate extends LdapTemplate {
@ -112,7 +111,7 @@ public class SpringSecurityLdapTemplate extends LdapTemplate {
@@ -112,7 +111,7 @@ public class SpringSecurityLdapTemplate extends LdapTemplate {
@ -169,18 +168,19 @@ public class SpringSecurityLdapTemplate extends LdapTemplate {
@@ -169,18 +168,19 @@ public class SpringSecurityLdapTemplate extends LdapTemplate {
@ -188,7 +188,7 @@ public class SpringSecurityLdapTemplate extends LdapTemplate {
@@ -188,7 +188,7 @@ public class SpringSecurityLdapTemplate extends LdapTemplate {
@ -258,8 +258,7 @@ public class SpringSecurityLdapTemplate extends LdapTemplate {
@@ -258,8 +258,7 @@ public class SpringSecurityLdapTemplate extends LdapTemplate {
@ -296,8 +295,9 @@ public class SpringSecurityLdapTemplate extends LdapTemplate {
@@ -296,8 +295,9 @@ public class SpringSecurityLdapTemplate extends LdapTemplate {
@ -117,14 +118,15 @@ public abstract class AbstractLdapAuthenticationProvider implements Authenticati
@@ -117,14 +118,15 @@ public abstract class AbstractLdapAuthenticationProvider implements Authenticati
@ -59,7 +62,7 @@ public abstract class AbstractLdapAuthenticator implements LdapAuthenticator, In
@@ -59,7 +62,7 @@ public abstract class AbstractLdapAuthenticator implements LdapAuthenticator, In
Assert.notNull(contextSource,"contextSource must not be null.");
@ -93,7 +96,7 @@ public abstract class AbstractLdapAuthenticator implements LdapAuthenticator, In
@@ -93,7 +96,7 @@ public abstract class AbstractLdapAuthenticator implements LdapAuthenticator, In
@ -106,14 +109,14 @@ public abstract class AbstractLdapAuthenticator implements LdapAuthenticator, In
@@ -106,14 +109,14 @@ public abstract class AbstractLdapAuthenticator implements LdapAuthenticator, In
@ -57,8 +57,7 @@ public class SpringSecurityAuthenticationSource implements AuthenticationSource
@@ -57,8 +57,7 @@ public class SpringSecurityAuthenticationSource implements AuthenticationSource
@ -189,12 +189,11 @@ public final class ActiveDirectoryLdapAuthenticationProvider extends AbstractLda
@@ -189,12 +189,11 @@ public final class ActiveDirectoryLdapAuthenticationProvider extends AbstractLda
@ -77,7 +77,7 @@ public class PasswordPolicyAwareContextSource extends DefaultSpringSecurityConte
@@ -77,7 +77,7 @@ public class PasswordPolicyAwareContextSource extends DefaultSpringSecurityConte
@ -220,7 +220,7 @@ public class PasswordPolicyResponseControl extends PasswordPolicyControl {
@@ -220,7 +220,7 @@ public class PasswordPolicyResponseControl extends PasswordPolicyControl {
@ -52,7 +52,7 @@ public class FilterBasedLdapUserSearch implements LdapUserSearch {
@@ -52,7 +52,7 @@ public class FilterBasedLdapUserSearch implements LdapUserSearch {
@ -78,9 +78,9 @@ public class FilterBasedLdapUserSearch implements LdapUserSearch {
@@ -78,9 +78,9 @@ public class FilterBasedLdapUserSearch implements LdapUserSearch {
this.contextSource=contextSource;
this.searchBase=searchBase;
setSearchSubtree(true);
if(searchBase.length()==0){
if(searchBase.isEmpty()){
logger.info(LogMessage.format("Searches will be performed from the root %s since SearchBase not set",
@ -129,7 +129,7 @@ public class DefaultLdapAuthoritiesPopulator implements LdapAuthoritiesPopulator
@@ -129,7 +129,7 @@ public class DefaultLdapAuthoritiesPopulator implements LdapAuthoritiesPopulator
@ -166,7 +166,7 @@ public class DefaultLdapAuthoritiesPopulator implements LdapAuthoritiesPopulator
@@ -166,7 +166,7 @@ public class DefaultLdapAuthoritiesPopulator implements LdapAuthoritiesPopulator
if(groupSearchBase==null){
logger.info("Will not perform group search since groupSearchBase is null.");
}
elseif(groupSearchBase.length()==0){
elseif(groupSearchBase.isEmpty()){
logger.info("Will perform group search from the context source base since groupSearchBase is empty.");
}
this.authorityMapper=(record)->{
@ -365,16 +365,6 @@ public class DefaultLdapAuthoritiesPopulator implements LdapAuthoritiesPopulator
@@ -365,16 +365,6 @@ public class DefaultLdapAuthoritiesPopulator implements LdapAuthoritiesPopulator
@ -121,7 +120,7 @@ public class LdapUserDetailsManager implements UserDetailsManager {
@@ -121,7 +120,7 @@ public class LdapUserDetailsManager implements UserDetailsManager {
privatefinalLdapTemplatetemplate;
/** Default context mapper used to create a set of roles from a list of attributes */
@ -147,7 +146,7 @@ public class LdapUserDetailsManager implements UserDetailsManager {
@@ -147,7 +146,7 @@ public class LdapUserDetailsManager implements UserDetailsManager {
@ -162,6 +161,7 @@ public class LdapUserDetailsManager implements UserDetailsManager {
@@ -162,6 +161,7 @@ public class LdapUserDetailsManager implements UserDetailsManager {
@ -170,6 +170,7 @@ public class LdapUserDetailsManager implements UserDetailsManager {
@@ -170,6 +170,7 @@ public class LdapUserDetailsManager implements UserDetailsManager {
@ -205,7 +206,6 @@ public class LdapUserDetailsManager implements UserDetailsManager {
@@ -205,7 +206,6 @@ public class LdapUserDetailsManager implements UserDetailsManager {
@ -214,7 +214,8 @@ public class LdapUserDetailsManager implements UserDetailsManager {
@@ -214,7 +214,8 @@ public class LdapUserDetailsManager implements UserDetailsManager {
@ -229,7 +230,7 @@ public class LdapUserDetailsManager implements UserDetailsManager {
@@ -229,7 +230,7 @@ public class LdapUserDetailsManager implements UserDetailsManager {
// Check for any existing authorities which might be set for this
@ -322,7 +323,7 @@ public class LdapUserDetailsManager implements UserDetailsManager {
@@ -322,7 +323,7 @@ public class LdapUserDetailsManager implements UserDetailsManager {
@ -389,20 +390,26 @@ public class LdapUserDetailsManager implements UserDetailsManager {
@@ -389,20 +390,26 @@ public class LdapUserDetailsManager implements UserDetailsManager {
@ -473,6 +480,7 @@ public class LdapUserDetailsManager implements UserDetailsManager {
@@ -473,6 +480,7 @@ public class LdapUserDetailsManager implements UserDetailsManager {
@ -176,7 +176,7 @@ public class NestedLdapAuthoritiesPopulator extends DefaultLdapAuthoritiesPopula
@@ -176,7 +176,7 @@ public class NestedLdapAuthoritiesPopulator extends DefaultLdapAuthoritiesPopula
@ -200,7 +200,7 @@ public class NestedLdapAuthoritiesPopulator extends DefaultLdapAuthoritiesPopula
@@ -200,7 +200,7 @@ public class NestedLdapAuthoritiesPopulator extends DefaultLdapAuthoritiesPopula
// this prevents a forever loop for a misconfigured ldap directory