@ -19,126 +20,116 @@ public class AclFormattingUtilsTests extends TestCase {
@@ -19,126 +20,116 @@ public class AclFormattingUtilsTests extends TestCase {
@ -42,13 +42,13 @@ public class AclEntryAfterInvocationCollectionFilteringProviderTests {
@@ -42,13 +42,13 @@ public class AclEntryAfterInvocationCollectionFilteringProviderTests {
@ -57,8 +57,8 @@ public class AclEntryAfterInvocationCollectionFilteringProviderTests {
@@ -57,8 +57,8 @@ public class AclEntryAfterInvocationCollectionFilteringProviderTests {
@ -69,8 +69,9 @@ public class AclEntryAfterInvocationCollectionFilteringProviderTests {
@@ -69,8 +69,9 @@ public class AclEntryAfterInvocationCollectionFilteringProviderTests {
@ -23,8 +26,8 @@ public class ObjectIdentityRetrievalStrategyImplTests extends TestCase {
@@ -23,8 +26,8 @@ public class ObjectIdentityRetrievalStrategyImplTests extends TestCase {
@ -257,36 +230,31 @@ public class BasicLookupStrategyTests {
@@ -257,36 +230,31 @@ public class BasicLookupStrategyTests {
Stringquery="INSERT INTO acl_object_identity(ID,OBJECT_ID_CLASS,OBJECT_ID_IDENTITY,PARENT_OBJECT,OWNER_SID,ENTRIES_INHERITING) VALUES (4,2,103,1,1,1);";
Stringquery="INSERT INTO acl_object_identity(ID,OBJECT_ID_CLASS,OBJECT_ID_IDENTITY,PARENT_OBJECT,OWNER_SID,ENTRIES_INHERITING) VALUES (4,2,104,null,1,1);"
+"INSERT INTO acl_object_identity(ID,OBJECT_ID_CLASS,OBJECT_ID_IDENTITY,PARENT_OBJECT,OWNER_SID,ENTRIES_INHERITING) VALUES (5,2,105,4,1,1);"
+"INSERT INTO acl_object_identity(ID,OBJECT_ID_CLASS,OBJECT_ID_IDENTITY,PARENT_OBJECT,OWNER_SID,ENTRIES_INHERITING) VALUES (6,2,106,4,1,1);"
@ -294,15 +262,13 @@ public class BasicLookupStrategyTests {
@@ -294,15 +262,13 @@ public class BasicLookupStrategyTests {
+"INSERT INTO acl_entry(ID,ACL_OBJECT_IDENTITY,ACE_ORDER,SID,MASK,GRANTING,AUDIT_SUCCESS,AUDIT_FAILURE) VALUES (5,4,0,1,1,1,0,0)";
@ -97,7 +99,6 @@ public class CasAuthenticationTokenTests extends TestCase {
@@ -97,7 +99,6 @@ public class CasAuthenticationTokenTests extends TestCase {
fail("Should have thrown IllegalArgumentException");
}
catch(IllegalArgumentExceptionexpected){
assertTrue(true);
}
}
@ -110,7 +111,7 @@ public class CasAuthenticationTokenTests extends TestCase {
@@ -110,7 +111,7 @@ public class CasAuthenticationTokenTests extends TestCase {
@ -118,16 +119,15 @@ public class CasAuthenticationTokenTests extends TestCase {
@@ -118,16 +119,15 @@ public class CasAuthenticationTokenTests extends TestCase {
@ -136,7 +136,7 @@ public class CasAuthenticationTokenTests extends TestCase {
@@ -136,7 +136,7 @@ public class CasAuthenticationTokenTests extends TestCase {
fail("Should have thrown NoSuchMethodException");
}
catch(NoSuchMethodExceptionexpected){
assertTrue(true);
}
}
@ -150,7 +150,7 @@ public class CasAuthenticationTokenTests extends TestCase {
@@ -150,7 +150,7 @@ public class CasAuthenticationTokenTests extends TestCase {
@ -161,7 +161,7 @@ public class CasAuthenticationTokenTests extends TestCase {
@@ -161,7 +161,7 @@ public class CasAuthenticationTokenTests extends TestCase {
@ -173,7 +173,7 @@ public class CasAuthenticationTokenTests extends TestCase {
@@ -173,7 +173,7 @@ public class CasAuthenticationTokenTests extends TestCase {
@ -186,16 +186,16 @@ public class CasAuthenticationTokenTests extends TestCase {
@@ -186,16 +186,16 @@ public class CasAuthenticationTokenTests extends TestCase {
@ -203,6 +203,6 @@ public class CasAuthenticationTokenTests extends TestCase {
@@ -203,6 +203,6 @@ public class CasAuthenticationTokenTests extends TestCase {
@ -59,15 +59,15 @@ public class EhCacheBasedTicketCacheTests extends AbstractStatelessTicketCacheTe
@@ -59,15 +59,15 @@ public class EhCacheBasedTicketCacheTests extends AbstractStatelessTicketCacheTe
@ -79,11 +79,11 @@ public class EhCacheBasedTicketCacheTests extends AbstractStatelessTicketCacheTe
@@ -79,11 +79,11 @@ public class EhCacheBasedTicketCacheTests extends AbstractStatelessTicketCacheTe
fail("Should have thrown IllegalArgumentException");
@ -33,14 +33,14 @@ public class NullStatelessTicketCacheTests extends AbstractStatelessTicketCacheT
@@ -33,14 +33,14 @@ public class NullStatelessTicketCacheTests extends AbstractStatelessTicketCacheT
@ -50,15 +50,15 @@ public class SpringCacheBasedTicketCacheTests extends AbstractStatelessTicketCac
@@ -50,15 +50,15 @@ public class SpringCacheBasedTicketCacheTests extends AbstractStatelessTicketCac
@ -41,10 +42,10 @@ public class GrantedAuthorityFromAssertionAttributesUserDetailsServiceTests {
@@ -41,10 +42,10 @@ public class GrantedAuthorityFromAssertionAttributesUserDetailsServiceTests {
@ -42,7 +44,7 @@ public class CasAuthenticationEntryPointTests extends TestCase {
@@ -42,7 +44,7 @@ public class CasAuthenticationEntryPointTests extends TestCase {
fail("Should have thrown IllegalArgumentException");
}
catch(IllegalArgumentExceptionexpected){
assertEquals("loginUrl must be specified",expected.getMessage());
assertThat(expected.getMessage()).isEqualTo("loginUrl must be specified");
}
}
@ -55,17 +57,17 @@ public class CasAuthenticationEntryPointTests extends TestCase {
@@ -55,17 +57,17 @@ public class CasAuthenticationEntryPointTests extends TestCase {
fail("Should have thrown IllegalArgumentException");
}
catch(IllegalArgumentExceptionexpected){
assertEquals("serviceProperties must be specified",expected.getMessage());
assertThat(expected.getMessage()).isEqualTo("serviceProperties must be specified");
@ -103,12 +99,12 @@ public class LdapUserServiceBeanDefinitionParserTests {
@@ -103,12 +99,12 @@ public class LdapUserServiceBeanDefinitionParserTests {
@ -191,4 +191,4 @@ public class AbstractSecurityWebSocketMessageBrokerConfigurerDocTests {
@@ -191,4 +191,4 @@ public class AbstractSecurityWebSocketMessageBrokerConfigurerDocTests {
@ -688,4 +688,4 @@ public class AbstractSecurityWebSocketMessageBrokerConfigurerTests {
@@ -688,4 +688,4 @@ public class AbstractSecurityWebSocketMessageBrokerConfigurerTests {
@ -33,7 +33,7 @@ public class AuthenticationManagerBeanDefinitionParserTests {
@@ -33,7 +33,7 @@ public class AuthenticationManagerBeanDefinitionParserTests {
@ -45,11 +45,11 @@ public class AuthenticationManagerBeanDefinitionParserTests {
@@ -45,11 +45,11 @@ public class AuthenticationManagerBeanDefinitionParserTests {
@ -57,7 +57,7 @@ public class AuthenticationManagerBeanDefinitionParserTests {
@@ -57,7 +57,7 @@ public class AuthenticationManagerBeanDefinitionParserTests {
@ -65,7 +65,7 @@ public class AuthenticationManagerBeanDefinitionParserTests {
@@ -65,7 +65,7 @@ public class AuthenticationManagerBeanDefinitionParserTests {
@ -118,7 +118,7 @@ public class AuthenticationProviderBeanDefinitionParserTests {
@@ -118,7 +118,7 @@ public class AuthenticationProviderBeanDefinitionParserTests {
@ -128,10 +126,10 @@ public class JdbcUserServiceBeanDefinitionParserTests {
@@ -128,10 +126,10 @@ public class JdbcUserServiceBeanDefinitionParserTests {
@ -49,8 +49,8 @@ public class FilterSecurityMetadataSourceBeanDefinitionParserTests {
@@ -49,8 +49,8 @@ public class FilterSecurityMetadataSourceBeanDefinitionParserTests {
@ -64,8 +64,8 @@ public class FilterSecurityMetadataSourceBeanDefinitionParserTests {
@@ -64,8 +64,8 @@ public class FilterSecurityMetadataSourceBeanDefinitionParserTests {
@ -81,9 +81,9 @@ public class FilterSecurityMetadataSourceBeanDefinitionParserTests {
@@ -81,9 +81,9 @@ public class FilterSecurityMetadataSourceBeanDefinitionParserTests {
@ -93,8 +93,8 @@ public class GlobalMethodSecurityBeanDefinitionParserTests {
@@ -93,8 +93,8 @@ public class GlobalMethodSecurityBeanDefinitionParserTests {
@ -121,7 +121,7 @@ public class GlobalMethodSecurityBeanDefinitionParserTests {
@@ -121,7 +121,7 @@ public class GlobalMethodSecurityBeanDefinitionParserTests {
assertEquals("Hello from the post processor!",service.getPostProcessorWasHere());
assertThat(service.getPostProcessorWasHere()).isEqualTo("Hello from the post processor!");
}
@Test(expected=AccessDeniedException.class)
@ -237,7 +237,7 @@ public class GlobalMethodSecurityBeanDefinitionParserTests {
@@ -237,7 +237,7 @@ public class GlobalMethodSecurityBeanDefinitionParserTests {
@ -280,8 +280,8 @@ public class GlobalMethodSecurityBeanDefinitionParserTests {
@@ -280,8 +280,8 @@ public class GlobalMethodSecurityBeanDefinitionParserTests {
// Expression is (filterObject == name or filterObject == 'sam'), so "joe" should
// be gone after pre-filter
// PostFilter should remove sam from the return object
assertEquals(1,result.size());
assertEquals("bob",result.get(0));
assertThat(result).hasSize(1);
assertThat(result.get(0)).isEqualTo("bob");
}
@Test
@ -293,8 +293,8 @@ public class GlobalMethodSecurityBeanDefinitionParserTests {
@@ -293,8 +293,8 @@ public class GlobalMethodSecurityBeanDefinitionParserTests {
@ -348,7 +348,7 @@ public class GlobalMethodSecurityBeanDefinitionParserTests {
@@ -348,7 +348,7 @@ public class GlobalMethodSecurityBeanDefinitionParserTests {
@ -421,7 +421,7 @@ public class GlobalMethodSecurityBeanDefinitionParserTests {
@@ -421,7 +421,7 @@ public class GlobalMethodSecurityBeanDefinitionParserTests {
@ -50,12 +50,12 @@ public class InterceptMethodsBeanDefinitionDecoratorTests implements
@@ -50,12 +50,12 @@ public class InterceptMethodsBeanDefinitionDecoratorTests implements
@ -110,15 +108,15 @@ public class Jsr250MethodSecurityMetadataSourceTests {
@@ -110,15 +108,15 @@ public class Jsr250MethodSecurityMetadataSourceTests {
@ -71,14 +71,14 @@ public class SecuredAnnotationSecurityMetadataSourceTests {
@@ -71,14 +71,14 @@ public class SecuredAnnotationSecurityMetadataSourceTests {
assertTrue("Did not find 1 attribute",attrs.size()==1);
assertThat(attrs.size()==1).as("Did not find 1 attribute").isTrue();
// should have 1 SecurityConfig
for(ConfigAttributesc:attrs){
assertEquals("Found an incorrect role","ROLE_ADMIN",sc.getAttribute());
assertThat(sc.getAttribute()).as("Found an incorrect role").isEqualTo("ROLE_ADMIN");
}
MethodsuperMethod=null;
@ -94,14 +94,14 @@ public class SecuredAnnotationSecurityMetadataSourceTests {
@@ -94,14 +94,14 @@ public class SecuredAnnotationSecurityMetadataSourceTests {
assertEquals("Did not find 1 attribute",1,superAttrs.size());
assertThat(superAttrs).as("Did not find 1 attribute").hasSize(1);
// should have 1 SecurityConfig
for(ConfigAttributesc:superAttrs){
assertEquals("Found an incorrect role","ROLE_ADMIN",sc.getAttribute());
assertThat(sc.getAttribute()).as("Found an incorrect role").isEqualTo("ROLE_ADMIN");
}
}
@ -110,15 +110,15 @@ public class SecuredAnnotationSecurityMetadataSourceTests {
@@ -110,15 +110,15 @@ public class SecuredAnnotationSecurityMetadataSourceTests {
@ -136,17 +136,17 @@ public class SecuredAnnotationSecurityMetadataSourceTests {
@@ -136,17 +136,17 @@ public class SecuredAnnotationSecurityMetadataSourceTests {
@ -157,7 +157,7 @@ public class SecuredAnnotationSecurityMetadataSourceTests {
@@ -157,7 +157,7 @@ public class SecuredAnnotationSecurityMetadataSourceTests {
}
// expect to have ROLE_USER and ROLE_ADMIN
assertTrue(user&&admin);
assertThat(user&&admin).isTrue();
}
// SEC-1491
@ -167,8 +167,8 @@ public class SecuredAnnotationSecurityMetadataSourceTests {
@@ -167,8 +167,8 @@ public class SecuredAnnotationSecurityMetadataSourceTests {
@ -180,8 +180,8 @@ public class SecuredAnnotationSecurityMetadataSourceTests {
@@ -180,8 +180,8 @@ public class SecuredAnnotationSecurityMetadataSourceTests {
@ -193,8 +193,8 @@ public class SecuredAnnotationSecurityMetadataSourceTests {
@@ -193,8 +193,8 @@ public class SecuredAnnotationSecurityMetadataSourceTests {
@ -205,8 +205,8 @@ public class SecuredAnnotationSecurityMetadataSourceTests {
@@ -205,8 +205,8 @@ public class SecuredAnnotationSecurityMetadataSourceTests {
@ -214,7 +214,7 @@ public class SecuredAnnotationSecurityMetadataSourceTests {
@@ -214,7 +214,7 @@ public class SecuredAnnotationSecurityMetadataSourceTests {
@ -78,12 +74,12 @@ public class PrePostAnnotationSecurityMetadataSourceTests {
@@ -78,12 +74,12 @@ public class PrePostAnnotationSecurityMetadataSourceTests {
@ -91,13 +87,12 @@ public class PrePostAnnotationSecurityMetadataSourceTests {
@@ -91,13 +87,12 @@ public class PrePostAnnotationSecurityMetadataSourceTests {
@ -105,13 +100,12 @@ public class PrePostAnnotationSecurityMetadataSourceTests {
@@ -105,13 +100,12 @@ public class PrePostAnnotationSecurityMetadataSourceTests {
@ -119,15 +113,14 @@ public class PrePostAnnotationSecurityMetadataSourceTests {
@@ -119,15 +113,14 @@ public class PrePostAnnotationSecurityMetadataSourceTests {
@ -135,15 +128,13 @@ public class PrePostAnnotationSecurityMetadataSourceTests {
@@ -135,15 +128,13 @@ public class PrePostAnnotationSecurityMetadataSourceTests {
@ -151,15 +142,13 @@ public class PrePostAnnotationSecurityMetadataSourceTests {
@@ -151,15 +142,13 @@ public class PrePostAnnotationSecurityMetadataSourceTests {
@ -167,7 +156,7 @@ public class PrePostAnnotationSecurityMetadataSourceTests {
@@ -167,7 +156,7 @@ public class PrePostAnnotationSecurityMetadataSourceTests {
@ -175,7 +164,7 @@ public class PrePostAnnotationSecurityMetadataSourceTests {
@@ -175,7 +164,7 @@ public class PrePostAnnotationSecurityMetadataSourceTests {
@ -183,7 +172,7 @@ public class PrePostAnnotationSecurityMetadataSourceTests {
@@ -183,7 +172,7 @@ public class PrePostAnnotationSecurityMetadataSourceTests {
@ -51,7 +53,7 @@ public class AfterInvocationProviderManagerTests extends TestCase {
@@ -51,7 +53,7 @@ public class AfterInvocationProviderManagerTests extends TestCase {
@ -65,20 +67,20 @@ public class AfterInvocationProviderManagerTests extends TestCase {
@@ -65,20 +67,20 @@ public class AfterInvocationProviderManagerTests extends TestCase {
@ -42,7 +45,7 @@ public class MethodSecurityMetadataSourceAdvisorTests extends TestCase {
@@ -42,7 +45,7 @@ public class MethodSecurityMetadataSourceAdvisorTests extends TestCase {
@ -54,6 +57,6 @@ public class MethodSecurityMetadataSourceAdvisorTests extends TestCase {
@@ -54,6 +57,6 @@ public class MethodSecurityMetadataSourceAdvisorTests extends TestCase {
@ -27,13 +27,13 @@ public class DelegatingMethodSecurityMetadataSourceTests {
@@ -27,13 +27,13 @@ public class DelegatingMethodSecurityMetadataSourceTests {
@ -46,15 +46,14 @@ public class DelegatingMethodSecurityMetadataSourceTests {
@@ -46,15 +46,14 @@ public class DelegatingMethodSecurityMetadataSourceTests {
@ -24,17 +24,17 @@ public class PreInvocationAuthorizationAdviceVoterTests {
@@ -24,17 +24,17 @@ public class PreInvocationAuthorizationAdviceVoterTests {
@ -45,9 +47,9 @@ public class AbstractAccessDecisionManagerTests extends TestCase {
@@ -45,9 +47,9 @@ public class AbstractAccessDecisionManagerTests extends TestCase {
@ -57,8 +59,8 @@ public class AbstractAccessDecisionManagerTests extends TestCase {
@@ -57,8 +59,8 @@ public class AbstractAccessDecisionManagerTests extends TestCase {
@ -71,10 +73,10 @@ public class AbstractAccessDecisionManagerTests extends TestCase {
@@ -71,10 +73,10 @@ public class AbstractAccessDecisionManagerTests extends TestCase {
@ -84,7 +86,7 @@ public class AbstractAccessDecisionManagerTests extends TestCase {
@@ -84,7 +86,7 @@ public class AbstractAccessDecisionManagerTests extends TestCase {
@ -95,7 +97,7 @@ public class AbstractAccessDecisionManagerTests extends TestCase {
@@ -95,7 +97,7 @@ public class AbstractAccessDecisionManagerTests extends TestCase {
fail("Should have thrown IllegalArgumentException");
}
catch(IllegalArgumentExceptionexpected){
assertTrue(true);
}
}
@ -105,13 +107,13 @@ public class AbstractAccessDecisionManagerTests extends TestCase {
@@ -105,13 +107,13 @@ public class AbstractAccessDecisionManagerTests extends TestCase {
fail("Should have thrown IllegalArgumentException");
@ -120,7 +122,7 @@ public class AbstractAccessDecisionManagerTests extends TestCase {
@@ -120,7 +122,7 @@ public class AbstractAccessDecisionManagerTests extends TestCase {
fail("Should have thrown IllegalArgumentException");
@ -56,11 +58,11 @@ public class AuthenticationTrustResolverImplTests extends TestCase {
@@ -56,11 +58,11 @@ public class AuthenticationTrustResolverImplTests extends TestCase {
@ -35,20 +37,17 @@ public class TestingAuthenticationProviderTests extends TestCase {
@@ -35,20 +37,17 @@ public class TestingAuthenticationProviderTests extends TestCase {
@ -73,21 +75,19 @@ public class AnonymousAuthenticationTokenTests extends TestCase {
@@ -73,21 +75,19 @@ public class AnonymousAuthenticationTokenTests extends TestCase {
@ -107,7 +107,7 @@ public class AnonymousAuthenticationTokenTests extends TestCase {
@@ -107,7 +107,7 @@ public class AnonymousAuthenticationTokenTests extends TestCase {
@ -116,7 +116,7 @@ public class AnonymousAuthenticationTokenTests extends TestCase {
@@ -116,7 +116,7 @@ public class AnonymousAuthenticationTokenTests extends TestCase {
@ -126,14 +126,14 @@ public class AnonymousAuthenticationTokenTests extends TestCase {
@@ -126,14 +126,14 @@ public class AnonymousAuthenticationTokenTests extends TestCase {
@ -77,7 +79,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
@@ -77,7 +79,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
fail("Should have thrown BadCredentialsException");
}
catch(BadCredentialsExceptionexpected){
assertTrue(true);
}
}
@ -94,7 +96,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
@@ -94,7 +96,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
fail("Expected BadCredenialsException");
}
catch(BadCredentialsExceptionexpected){
assertTrue(true);
}
}
@ -111,7 +113,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
@@ -111,7 +113,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
fail("Should have thrown AccountExpiredException");
}
catch(AccountExpiredExceptionexpected){
assertTrue(true);
}
}
@ -128,7 +130,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
@@ -128,7 +130,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
fail("Should have thrown LockedException");
}
catch(LockedExceptionexpected){
assertTrue(true);
}
}
@ -145,7 +147,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
@@ -145,7 +147,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
fail("Should have thrown CredentialsExpiredException");
}
catch(CredentialsExpiredExceptionexpected){
assertTrue(true);
}
// Check that wrong password causes BadCredentialsException, rather than
@ -157,7 +159,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
@@ -157,7 +159,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
fail("Should have thrown BadCredentialsException");
}
catch(BadCredentialsExceptionexpected){
assertTrue(true);
}
}
@ -174,7 +176,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
@@ -174,7 +176,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
fail("Should have thrown DisabledException");
}
catch(DisabledExceptionexpected){
assertTrue(true);
}
}
@ -207,7 +209,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
@@ -207,7 +209,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
fail("Should have thrown BadCredentialsException");
}
catch(BadCredentialsExceptionexpected){
assertTrue(true);
}
}
@ -224,7 +226,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
@@ -224,7 +226,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
fail("Should have thrown BadCredentialsException");
}
catch(BadCredentialsExceptionexpected){
assertTrue(true);
}
}
@ -243,7 +245,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
@@ -243,7 +245,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
fail("Should have thrown UsernameNotFoundException");
}
catch(UsernameNotFoundExceptionexpected){
assertTrue(true);
}
}
@ -252,7 +254,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
@@ -252,7 +254,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
@ -261,7 +263,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
@@ -261,7 +263,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
fail("Should have thrown BadCredentialsException");
}
catch(BadCredentialsExceptionexpected){
assertTrue(true);
}
}
@ -278,7 +280,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
@@ -278,7 +280,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
fail("Should have thrown BadCredentialsException");
}
catch(BadCredentialsExceptionexpected){
assertTrue(true);
}
}
@ -298,13 +300,11 @@ public class DaoAuthenticationProviderTests extends TestCase {
@@ -298,13 +300,11 @@ public class DaoAuthenticationProviderTests extends TestCase {
@ -328,7 +328,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
@@ -328,7 +328,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
fail("Should have returned instance of UsernamePasswordAuthenticationToken");
@ -349,14 +349,12 @@ public class DaoAuthenticationProviderTests extends TestCase {
@@ -349,14 +349,12 @@ public class DaoAuthenticationProviderTests extends TestCase {
fail("Should have returned instance of UsernamePasswordAuthenticationToken");
@ -375,8 +373,8 @@ public class DaoAuthenticationProviderTests extends TestCase {
@@ -375,8 +373,8 @@ public class DaoAuthenticationProviderTests extends TestCase {
@ -400,17 +398,17 @@ public class DaoAuthenticationProviderTests extends TestCase {
@@ -400,17 +398,17 @@ public class DaoAuthenticationProviderTests extends TestCase {
@ -427,7 +425,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
@@ -427,7 +425,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
@ -438,7 +436,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
@@ -438,7 +436,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
@ -449,14 +447,14 @@ public class DaoAuthenticationProviderTests extends TestCase {
@@ -449,14 +447,14 @@ public class DaoAuthenticationProviderTests extends TestCase {
fail("Should have thrown IllegalArgumentException");
@ -464,7 +462,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
@@ -464,7 +462,7 @@ public class DaoAuthenticationProviderTests extends TestCase {
fail("Should have thrown IllegalArgumentException");
}
catch(IllegalArgumentExceptionexpected){
assertTrue(true);
}
}
@ -473,15 +471,15 @@ public class DaoAuthenticationProviderTests extends TestCase {
@@ -473,15 +471,15 @@ public class DaoAuthenticationProviderTests extends TestCase {
@ -57,21 +57,21 @@ public class SystemWideSaltSourceTests extends TestCase {
@@ -57,21 +57,21 @@ public class SystemWideSaltSourceTests extends TestCase {
fail("Should have thrown IllegalArgumentException");
}
catch(IllegalArgumentExceptionexpected){
assertEquals("A systemWideSalt must be set",expected.getMessage());
assertThat(expected.getMessage()).isEqualTo("A systemWideSalt must be set");
@ -34,14 +34,14 @@ public class BasePasswordEncoderTests extends TestCase {
@@ -34,14 +34,14 @@ public class BasePasswordEncoderTests extends TestCase {
@ -52,7 +52,7 @@ public class BasePasswordEncoderTests extends TestCase {
@@ -52,7 +52,7 @@ public class BasePasswordEncoderTests extends TestCase {
fail("Should have thrown IllegalArgumentException");
}
catch(IllegalArgumentExceptionexpected){
assertEquals("Cannot pass a null or empty String",expected.getMessage());
assertThat(expected.getMessage()).isEqualTo("Cannot pass a null or empty String");
}
}
@ -64,7 +64,7 @@ public class BasePasswordEncoderTests extends TestCase {
@@ -64,7 +64,7 @@ public class BasePasswordEncoderTests extends TestCase {
fail("Should have thrown IllegalArgumentException");
}
catch(IllegalArgumentExceptionexpected){
assertEquals("Cannot pass a null or empty String",expected.getMessage());
assertThat(expected.getMessage()).isEqualTo("Cannot pass a null or empty String");
}
}
@ -72,34 +72,34 @@ public class BasePasswordEncoderTests extends TestCase {
@@ -72,34 +72,34 @@ public class BasePasswordEncoderTests extends TestCase {
@ -110,7 +110,7 @@ public class BasePasswordEncoderTests extends TestCase {
@@ -110,7 +110,7 @@ public class BasePasswordEncoderTests extends TestCase {
fail("Should have thrown IllegalArgumentException");
}
catch(IllegalArgumentExceptionexpected){
assertEquals("Cannot use { or } in salt.toString()",expected.getMessage());
assertThat(expected.getMessage()).isEqualTo("Cannot use { or } in salt.toString()");
}
}
@ -122,7 +122,7 @@ public class BasePasswordEncoderTests extends TestCase {
@@ -122,7 +122,7 @@ public class BasePasswordEncoderTests extends TestCase {
fail("Should have thrown IllegalArgumentException");
}
catch(IllegalArgumentExceptionexpected){
assertEquals("Cannot use { or } in salt.toString()",expected.getMessage());
assertThat(expected.getMessage()).isEqualTo("Cannot use { or } in salt.toString()");