@ -34,10 +34,10 @@ public class IdentityUnavailableException extends RuntimeException {
@@ -34,10 +34,10 @@ public class IdentityUnavailableException extends RuntimeException {
@ -77,8 +77,8 @@ public class ObjectIdentityImpl implements ObjectIdentity {
@@ -77,8 +77,8 @@ public class ObjectIdentityImpl implements ObjectIdentity {
@ -194,8 +194,8 @@ public class BasicLookupStrategy implements LookupStrategy {
@@ -194,8 +194,8 @@ public class BasicLookupStrategy implements LookupStrategy {
thrownewIllegalStateException("Could not obtain AclImpl.aces field",e);
catch(IllegalAccessExceptionex){
thrownewIllegalStateException("Could not obtain AclImpl.aces field",ex);
}
}
@ -203,8 +203,8 @@ public class BasicLookupStrategy implements LookupStrategy {
@@ -203,8 +203,8 @@ public class BasicLookupStrategy implements LookupStrategy {
try{
this.fieldAcl.set(ace,acl);
}
catch(IllegalAccessExceptione){
thrownewIllegalStateException("Could not or set AclImpl on AccessControlEntryImpl fields",e);
catch(IllegalAccessExceptionex){
thrownewIllegalStateException("Could not or set AclImpl on AccessControlEntryImpl fields",ex);
}
}
@ -212,8 +212,8 @@ public class BasicLookupStrategy implements LookupStrategy {
@@ -212,8 +212,8 @@ public class BasicLookupStrategy implements LookupStrategy {
try{
this.fieldAces.set(acl,aces);
}
catch(IllegalAccessExceptione){
thrownewIllegalStateException("Could not set AclImpl entries",e);
catch(IllegalAccessExceptionex){
thrownewIllegalStateException("Could not set AclImpl entries",ex);
@ -34,10 +34,10 @@ public class AlreadyExistsException extends AclDataAccessException {
@@ -34,10 +34,10 @@ public class AlreadyExistsException extends AclDataAccessException {
@ -34,10 +34,10 @@ public class ChildrenExistException extends AclDataAccessException {
@@ -34,10 +34,10 @@ public class ChildrenExistException extends AclDataAccessException {
@ -34,10 +34,10 @@ public class NotFoundException extends AclDataAccessException {
@@ -34,10 +34,10 @@ public class NotFoundException extends AclDataAccessException {
@ -36,10 +36,10 @@ public class UnloadedSidException extends AclDataAccessException {
@@ -36,10 +36,10 @@ public class UnloadedSidException extends AclDataAccessException {
@ -121,9 +121,9 @@ public class JdbcMutableAclServiceTests extends AbstractTransactionalJUnit4Sprin
@@ -121,9 +121,9 @@ public class JdbcMutableAclServiceTests extends AbstractTransactionalJUnit4Sprin
@ -156,8 +156,8 @@ public class CasAuthenticationProvider implements AuthenticationProvider, Initia
@@ -156,8 +156,8 @@ public class CasAuthenticationProvider implements AuthenticationProvider, Initia
@ -102,8 +102,8 @@ public abstract class AbstractConfiguredSecurityBuilder<O, B extends SecurityBui
@@ -102,8 +102,8 @@ public abstract class AbstractConfiguredSecurityBuilder<O, B extends SecurityBui
try{
returnbuild();
}
catch(Exceptione){
this.logger.debug("Failed to perform build. Returning null",e);
catch(Exceptionex){
this.logger.debug("Failed to perform build. Returning null",ex);
@ -595,7 +595,7 @@ public class LdapAuthenticationProviderConfigurer<B extends ProviderManagerBuild
@@ -595,7 +595,7 @@ public class LdapAuthenticationProviderConfigurer<B extends ProviderManagerBuild
@ -153,8 +153,8 @@ public class GlobalMethodSecurityConfiguration implements ImportAware, SmartInit
@@ -153,8 +153,8 @@ public class GlobalMethodSecurityConfiguration implements ImportAware, SmartInit
@ -182,7 +182,7 @@ public class GlobalMethodSecurityConfiguration implements ImportAware, SmartInit
@@ -182,7 +182,7 @@ public class GlobalMethodSecurityConfiguration implements ImportAware, SmartInit
@ -311,26 +311,26 @@ public final class WebSecurity extends AbstractConfiguredSecurityBuilder<Filter,
@@ -311,26 +311,26 @@ public final class WebSecurity extends AbstractConfiguredSecurityBuilder<Filter,
@ -136,7 +136,7 @@ public final class RequestCacheConfigurer<H extends HttpSecurityBuilder<H>>
@@ -136,7 +136,7 @@ public final class RequestCacheConfigurer<H extends HttpSecurityBuilder<H>>
@ -560,7 +560,7 @@ public final class SessionManagementConfigurer<H extends HttpSecurityBuilder<H>>
@@ -560,7 +560,7 @@ public final class SessionManagementConfigurer<H extends HttpSecurityBuilder<H>>
@ -506,7 +506,7 @@ public final class OAuth2ResourceServerConfigurer<H extends HttpSecurityBuilder<
@@ -506,7 +506,7 @@ public final class OAuth2ResourceServerConfigurer<H extends HttpSecurityBuilder<
@ -325,7 +325,7 @@ public final class Saml2LoginConfigurer<B extends HttpSecurityBuilder<B>>
@@ -325,7 +325,7 @@ public final class Saml2LoginConfigurer<B extends HttpSecurityBuilder<B>>
@ -119,7 +119,7 @@ public abstract class AbstractSecurityWebSocketMessageBrokerConfigurer extends A
@@ -119,7 +119,7 @@ public abstract class AbstractSecurityWebSocketMessageBrokerConfigurer extends A
@ -51,9 +51,9 @@ public class AuthenticationManagerFactoryBean implements FactoryBean<Authenticat
@@ -51,9 +51,9 @@ public class AuthenticationManagerFactoryBean implements FactoryBean<Authenticat
@ -118,7 +118,7 @@ public class UserServiceBeanDefinitionParser extends AbstractUserDetailsServiceB
@@ -118,7 +118,7 @@ public class UserServiceBeanDefinitionParser extends AbstractUserDetailsServiceB
@ -113,8 +113,8 @@ public class RsaKeyConversionServicePostProcessor implements BeanFactoryPostProc
@@ -113,8 +113,8 @@ public class RsaKeyConversionServicePostProcessor implements BeanFactoryPostProc
try{
returnresource.getInputStream();
}
catch(IOExceptione){
thrownewUncheckedIOException(e);
catch(IOExceptionex){
thrownewUncheckedIOException(ex);
}
}
@ -123,8 +123,8 @@ public class RsaKeyConversionServicePostProcessor implements BeanFactoryPostProc
@@ -123,8 +123,8 @@ public class RsaKeyConversionServicePostProcessor implements BeanFactoryPostProc
@ -152,7 +152,7 @@ public class DefaultFilterChainValidator implements FilterChainProxy.FilterChain
@@ -152,7 +152,7 @@ public class DefaultFilterChainValidator implements FilterChainProxy.FilterChain
try{
filters=fcp.getFilters(loginPage);
}
catch(Exceptione){
catch(Exceptionex){
// May happen legitimately if a filter-chain request matcher requires more
// request data than that provided
// by the dummy request used when creating the filter invocation.
@ -196,19 +196,19 @@ public class DefaultFilterChainValidator implements FilterChainProxy.FilterChain
@@ -196,19 +196,19 @@ public class DefaultFilterChainValidator implements FilterChainProxy.FilterChain
.warn("Anonymous access to the login page doesn't appear to be enabled. This is almost certainly "
+"an error. Please check your configuration allows unauthenticated access to the configured "
+"login page. (Simulated access was rejected: "+e+")");
+"login page. (Simulated access was rejected: "+ex+")");
}
catch(Exceptione){
catch(Exceptionex){
// May happen legitimately if a filter-chain request matcher requires more
// request data than that provided
// by the dummy request used when creating the filter invocation. See SEC-1878
this.logger.info(
"Unable to check access to the login page to determine if anonymous access is allowed. This might be an error, but can happen under normal circumstances.",
@ -478,9 +478,9 @@ public class HeadersBeanDefinitionParser implements BeanDefinitionParser {
@@ -478,9 +478,9 @@ public class HeadersBeanDefinitionParser implements BeanDefinitionParser {
@ -363,7 +363,7 @@ final class OAuth2ResourceServerBeanDefinitionParser implements BeanDefinitionPa
@@ -363,7 +363,7 @@ final class OAuth2ResourceServerBeanDefinitionParser implements BeanDefinitionPa
@ -52,10 +52,10 @@ class ContextSourceSettingPostProcessor implements BeanFactoryPostProcessor, Ord
@@ -52,10 +52,10 @@ class ContextSourceSettingPostProcessor implements BeanFactoryPostProcessor, Ord
@ -221,7 +221,7 @@ public class LdapServerBeanDefinitionParser implements BeanDefinitionParser {
@@ -221,7 +221,7 @@ public class LdapServerBeanDefinitionParser implements BeanDefinitionParser {
@ -489,12 +489,12 @@ public class GlobalMethodSecurityBeanDefinitionParser implements BeanDefinitionP
@@ -489,12 +489,12 @@ public class GlobalMethodSecurityBeanDefinitionParser implements BeanDefinitionP
@ -122,8 +122,8 @@ final class ProtectPointcutPostProcessor implements BeanPostProcessor {
@@ -122,8 +122,8 @@ final class ProtectPointcutPostProcessor implements BeanPostProcessor {
try{
methods=bean.getClass().getMethods();
}
catch(Exceptione){
thrownewIllegalStateException(e.getMessage());
catch(Exceptionex){
thrownewIllegalStateException(ex.getMessage());
}
// Check to see if any of those methods are compatible with our pointcut
@ -36,10 +36,10 @@ public class AccessDeniedException extends RuntimeException {
@@ -36,10 +36,10 @@ public class AccessDeniedException extends RuntimeException {
@ -39,10 +39,10 @@ public class AuthorizationServiceException extends AccessDeniedException {
@@ -39,10 +39,10 @@ public class AuthorizationServiceException extends AccessDeniedException {
@ -54,8 +54,8 @@ public class ExpressionBasedAnnotationAttributeFactory implements PrePostInvocat
@@ -54,8 +54,8 @@ public class ExpressionBasedAnnotationAttributeFactory implements PrePostInvocat
thrownewIllegalArgumentException("Failed to parse expression '"+e.getExpressionString()+"'",e);
catch(ParseExceptionex){
thrownewIllegalArgumentException("Failed to parse expression '"+ex.getExpressionString()+"'",ex);
}
}
@ -73,8 +73,8 @@ public class ExpressionBasedAnnotationAttributeFactory implements PrePostInvocat
@@ -73,8 +73,8 @@ public class ExpressionBasedAnnotationAttributeFactory implements PrePostInvocat
@ -36,10 +36,10 @@ public class AccountExpiredException extends AccountStatusException {
@@ -36,10 +36,10 @@ public class AccountExpiredException extends AccountStatusException {
@ -41,10 +41,10 @@ public class AuthenticationCredentialsNotFoundException extends AuthenticationEx
@@ -41,10 +41,10 @@ public class AuthenticationCredentialsNotFoundException extends AuthenticationEx
@ -42,10 +42,10 @@ public class AuthenticationServiceException extends AuthenticationException {
@@ -42,10 +42,10 @@ public class AuthenticationServiceException extends AuthenticationException {
@ -38,10 +38,10 @@ public class BadCredentialsException extends AuthenticationException {
@@ -38,10 +38,10 @@ public class BadCredentialsException extends AuthenticationException {
@ -36,10 +36,10 @@ public class CredentialsExpiredException extends AccountStatusException {
@@ -36,10 +36,10 @@ public class CredentialsExpiredException extends AccountStatusException {
@ -36,10 +36,10 @@ public class DisabledException extends AccountStatusException {
@@ -36,10 +36,10 @@ public class DisabledException extends AccountStatusException {
@ -46,10 +46,10 @@ public class InsufficientAuthenticationException extends AuthenticationException
@@ -46,10 +46,10 @@ public class InsufficientAuthenticationException extends AuthenticationException
@ -36,10 +36,10 @@ public class LockedException extends AccountStatusException {
@@ -36,10 +36,10 @@ public class LockedException extends AccountStatusException {
@ -188,14 +188,14 @@ public class ProviderManager implements AuthenticationManager, MessageSourceAwar
@@ -188,14 +188,14 @@ public class ProviderManager implements AuthenticationManager, MessageSourceAwar
// SEC-546: Avoid polling additional providers if auth failure is due to
// invalid account status
throwe;
throwex;
}
catch(AuthenticationExceptione){
lastException=e;
catch(AuthenticationExceptionex){
lastException=ex;
}
}
@ -205,15 +205,15 @@ public class ProviderManager implements AuthenticationManager, MessageSourceAwar
@@ -205,15 +205,15 @@ public class ProviderManager implements AuthenticationManager, MessageSourceAwar
@ -256,8 +256,8 @@ public abstract class AbstractJaasAuthenticationProvider implements Authenticati
@@ -256,8 +256,8 @@ public abstract class AbstractJaasAuthenticationProvider implements Authenticati
+"The LoginContext is unavailable");
}
}
catch(LoginExceptione){
this.log.warn("Error error logging out of LoginContext",e);
catch(LoginExceptionex){
this.log.warn("Error error logging out of LoginContext",ex);
@ -223,7 +223,7 @@ public class JaasAuthenticationProvider extends AbstractJaasAuthenticationProvid
@@ -223,7 +223,7 @@ public class JaasAuthenticationProvider extends AbstractJaasAuthenticationProvid
@ -38,10 +38,10 @@ public class UsernameNotFoundException extends AuthenticationException {
@@ -38,10 +38,10 @@ public class UsernameNotFoundException extends AuthenticationException {
@ -107,8 +107,8 @@ public class Argon2PasswordEncoder implements PasswordEncoder {
@@ -107,8 +107,8 @@ public class Argon2PasswordEncoder implements PasswordEncoder {
@ -74,8 +74,8 @@ public class BouncyCastleAesCbcBytesEncryptor extends BouncyCastleAesBytesEncryp
@@ -74,8 +74,8 @@ public class BouncyCastleAesCbcBytesEncryptor extends BouncyCastleAesBytesEncryp
@ -71,8 +71,8 @@ public class BouncyCastleAesGcmBytesEncryptor extends BouncyCastleAesBytesEncryp
@@ -71,8 +71,8 @@ public class BouncyCastleAesGcmBytesEncryptor extends BouncyCastleAesBytesEncryp
@ -104,7 +104,7 @@ public class LdapShaPasswordEncoder implements PasswordEncoder {
@@ -104,7 +104,7 @@ public class LdapShaPasswordEncoder implements PasswordEncoder {
@ -112,8 +112,8 @@ public class Pbkdf2PasswordEncoder implements PasswordEncoder {
@@ -112,8 +112,8 @@ public class Pbkdf2PasswordEncoder implements PasswordEncoder {
@ -163,8 +163,8 @@ public class Pbkdf2PasswordEncoder implements PasswordEncoder {
@@ -163,8 +163,8 @@ public class Pbkdf2PasswordEncoder implements PasswordEncoder {
As described in <<oauth2resourceserver-jwt-minimaldependencies,Minimal Dependencies for JWT>> most of Resource Server support is collected in `spring-security-oauth2-resource-server`.
However unless a custom <<webflux-oauth2resourceserver-opaque-introspector-bean,`ReactiveOpaqueTokenIntrospector`>> is provided, the Resource Server will fallback to ReactiveOpaqueTokenIntrospector.
Meaning that both `spring-security-oauth2-resource-server` and `oauth2-oidc-sdk` are necessary in order to have a working minimal Resource Server that supports opaque Bearer Tokens.
As described in <<oauth2resourceserver-jwt-minimaldependencies,Minimal Dependencies for JWT>> most of Resource Server support is collected in `spring-security-oauth2-resource-server`.
However unless a custom <<webflux-oauth2resourceserver-opaque-introspector-bean,`ReactiveOpaqueTokenIntrospector`>> is provided, the Resource Server will fallback to ReactiveOpaqueTokenIntrospector.
Meaning that both `spring-security-oauth2-resource-server` and `oauth2-oidc-sdk` are necessary in order to have a working minimal Resource Server that supports opaque Bearer Tokens.
Please refer to `spring-security-oauth2-resource-server` in order to determin the correct version for `oauth2-oidc-sdk`.
@ -925,8 +925,8 @@ public class JwtOpaqueTokenIntrospector implements ReactiveOpaqueTokenIntrospect
@@ -925,8 +925,8 @@ public class JwtOpaqueTokenIntrospector implements ReactiveOpaqueTokenIntrospect
@ -36,8 +36,8 @@ The pseudocode for `ExceptionTranslationFilter` looks something like this:
@@ -36,8 +36,8 @@ The pseudocode for `ExceptionTranslationFilter` looks something like this:
@ -75,7 +75,7 @@ For example, the following would attempt to authenticate with the username "user
@@ -75,7 +75,7 @@ For example, the following would attempt to authenticate with the username "user
@ -1055,9 +1055,9 @@ To do so, remember that `NimbusJwtDecoder` ships with a constructor that takes N
@@ -1055,9 +1055,9 @@ To do so, remember that `NimbusJwtDecoder` ships with a constructor that takes N
As described in <<oauth2resourceserver-jwt-minimaldependencies,Minimal Dependencies for JWT>> most of Resource Server support is collected in `spring-security-oauth2-resource-server`.
However unless a custom <<oauth2resourceserver-opaque-introspector,`OpaqueTokenIntrospector`>> is provided, the Resource Server will fallback to NimbusOpaqueTokenIntrospector.
Meaning that both `spring-security-oauth2-resource-server` and `oauth2-oidc-sdk` are necessary in order to have a working minimal Resource Server that supports opaque Bearer Tokens.
As described in <<oauth2resourceserver-jwt-minimaldependencies,Minimal Dependencies for JWT>> most of Resource Server support is collected in `spring-security-oauth2-resource-server`.
However unless a custom <<oauth2resourceserver-opaque-introspector,`OpaqueTokenIntrospector`>> is provided, the Resource Server will fallback to NimbusOpaqueTokenIntrospector.
Meaning that both `spring-security-oauth2-resource-server` and `oauth2-oidc-sdk` are necessary in order to have a working minimal Resource Server that supports opaque Bearer Tokens.
Please refer to `spring-security-oauth2-resource-server` in order to determin the correct version for `oauth2-oidc-sdk`.
@ -1626,8 +1626,8 @@ public class JwtOpaqueTokenIntrospector implements OpaqueTokenIntrospector {
@@ -1626,8 +1626,8 @@ public class JwtOpaqueTokenIntrospector implements OpaqueTokenIntrospector {
try {
Jwt jwt = this.jwtDecoder.decode(token);
return new DefaultOAuth2AuthenticatedPrincipal(jwt.getClaims(), NO_AUTHORITIES);
} catch (JwtException e) {
throw new OAuth2IntrospectionException(e);
} catch (JwtException ex) {
throw new OAuth2IntrospectionException(ex);
}
}
@ -1899,8 +1899,8 @@ public class TenantJWSKeySelector
@@ -1899,8 +1899,8 @@ public class TenantJWSKeySelector
@ -52,8 +52,8 @@ public class PythonInterpreterPreInvocationAdvice implements PreInvocationAuthor
@@ -52,8 +52,8 @@ public class PythonInterpreterPreInvocationAdvice implements PreInvocationAuthor
try{
python.execfile(scriptResource.getInputStream());
}
catch(IOExceptione){
thrownewIllegalArgumentException("Couldn't run python script, "+script,e);
catch(IOExceptionex){
thrownewIllegalArgumentException("Couldn't run python script, "+script,ex);
@ -197,8 +197,8 @@ public class SpringSecurityLdapTemplate extends LdapTemplate {
@@ -197,8 +197,8 @@ public class SpringSecurityLdapTemplate extends LdapTemplate {
@ -316,7 +316,7 @@ public class SpringSecurityLdapTemplate extends LdapTemplate {
@@ -316,7 +316,7 @@ public class SpringSecurityLdapTemplate extends LdapTemplate {
@ -127,20 +127,20 @@ public class BindAuthenticator extends AbstractLdapAuthenticator {
@@ -127,20 +127,20 @@ public class BindAuthenticator extends AbstractLdapAuthenticator {
returnresult;
}
catch(NamingExceptione){
catch(NamingExceptionex){
// This will be thrown if an invalid user name is used and the method may
// be called multiple times to try different names, so we trap the exception
// unless a subclass wishes to implement more specialized behaviour.