Skip to content

Commit eb320bf

Browse files
committed
AuthorizationCodeAuthenticationProcessingFilter -> AuthorizationCodeAuthenticationFilter
1 parent 5c14e48 commit eb320bf

File tree

7 files changed

+24
-24
lines changed

7 files changed

+24
-24
lines changed

config/src/main/java/org/springframework/security/config/annotation/web/builders/FilterComparator.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ final class FilterComparator implements Comparator<Filter>, Serializable {
8989
order);
9090
order += STEP;
9191
filterToOrder.put(
92-
"org.springframework.security.oauth2.client.web.AuthorizationCodeAuthenticationProcessingFilter",
92+
"org.springframework.security.oauth2.client.web.AuthorizationCodeAuthenticationFilter",
9393
order);
9494
order += STEP;
9595
put(UsernamePasswordAuthenticationFilter.class, order);

config/src/main/java/org/springframework/security/config/annotation/web/configurers/oauth2/client/AuthorizationCodeAuthenticationFilterConfigurer.java

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@
3333
import org.springframework.security.oauth2.client.user.DefaultOAuth2UserService;
3434
import org.springframework.security.oauth2.client.user.DelegatingOAuth2UserService;
3535
import org.springframework.security.oauth2.client.user.OAuth2UserService;
36-
import org.springframework.security.oauth2.client.web.AuthorizationCodeAuthenticationProcessingFilter;
36+
import org.springframework.security.oauth2.client.web.AuthorizationCodeAuthenticationFilter;
3737
import org.springframework.security.oauth2.client.web.AuthorizationGrantTokenExchanger;
3838
import org.springframework.security.oauth2.client.web.nimbus.NimbusAuthorizationCodeTokenExchanger;
3939
import org.springframework.security.oauth2.core.AccessToken;
@@ -53,7 +53,7 @@
5353
* @author Joe Grandja
5454
*/
5555
final class AuthorizationCodeAuthenticationFilterConfigurer<H extends HttpSecurityBuilder<H>, R extends RequestMatcher> extends
56-
AbstractAuthenticationFilterConfigurer<H, AuthorizationCodeAuthenticationFilterConfigurer<H, R>, AuthorizationCodeAuthenticationProcessingFilter> {
56+
AbstractAuthenticationFilterConfigurer<H, AuthorizationCodeAuthenticationFilterConfigurer<H, R>, AuthorizationCodeAuthenticationFilter> {
5757

5858
private R authorizationResponseMatcher;
5959
private AuthorizationGrantAuthenticator<AuthorizationCodeAuthenticationToken> authorizationCodeAuthenticator;
@@ -65,7 +65,7 @@ final class AuthorizationCodeAuthenticationFilterConfigurer<H extends HttpSecuri
6565
private GrantedAuthoritiesMapper userAuthoritiesMapper;
6666

6767
AuthorizationCodeAuthenticationFilterConfigurer() {
68-
super(new AuthorizationCodeAuthenticationProcessingFilter(), null);
68+
super(new AuthorizationCodeAuthenticationFilter(), null);
6969
}
7070

7171
AuthorizationCodeAuthenticationFilterConfigurer<H, R> authorizationResponseMatcher(R authorizationResponseMatcher) {
@@ -148,7 +148,7 @@ public void init(H http) throws Exception {
148148

149149
@Override
150150
public void configure(H http) throws Exception {
151-
AuthorizationCodeAuthenticationProcessingFilter authFilter = this.getAuthenticationFilter();
151+
AuthorizationCodeAuthenticationFilter authFilter = this.getAuthenticationFilter();
152152
if (this.authorizationResponseMatcher != null) {
153153
authFilter.setAuthorizationResponseMatcher(this.authorizationResponseMatcher);
154154
}
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@
8181
* @see <a target="_blank" href="https://tools.ietf.org/html/rfc6749#section-4.1">Section 4.1 Authorization Code Grant Flow</a>
8282
* @see <a target="_blank" href="https://tools.ietf.org/html/rfc6749#section-4.1.2">Section 4.1.2 Authorization Response</a>
8383
*/
84-
public class AuthorizationCodeAuthenticationProcessingFilter extends AbstractAuthenticationProcessingFilter {
84+
public class AuthorizationCodeAuthenticationFilter extends AbstractAuthenticationProcessingFilter {
8585
public static final String DEFAULT_AUTHORIZATION_RESPONSE_BASE_URI = "/oauth2/authorize/code";
8686
private static final String AUTHORIZATION_REQUEST_NOT_FOUND_ERROR_CODE = "authorization_request_not_found";
8787
private static final String INVALID_STATE_PARAMETER_ERROR_CODE = "invalid_state_parameter";
@@ -94,7 +94,7 @@ public class AuthorizationCodeAuthenticationProcessingFilter extends AbstractAut
9494
private AuthorizationRequestRepository authorizationRequestRepository = new HttpSessionAuthorizationRequestRepository();
9595
private final ClientRegistrationIdentifierStrategy<String> providerIdentifierStrategy = new ProviderIdentifierStrategy();
9696

97-
public AuthorizationCodeAuthenticationProcessingFilter() {
97+
public AuthorizationCodeAuthenticationFilter() {
9898
super(new AuthorizationResponseMatcher());
9999
}
100100

oauth2/oauth2-client/src/main/java/org/springframework/security/oauth2/client/web/AuthorizationCodeRequestRedirectFilter.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@
4747
* It uses an {@link AuthorizationRequestUriBuilder} to build the <i>OAuth 2.0 Authorization Request</i>,
4848
* which is used as the redirect <code>URI</code> to the <i>Authorization Endpoint</i>.
4949
* The redirect <code>URI</code> will include the client identifier, requested scope(s), state, response type, and a redirection URI
50-
* which the authorization server will send the user-agent back to (handled by {@link AuthorizationCodeAuthenticationProcessingFilter})
50+
* which the authorization server will send the user-agent back to (handled by {@link AuthorizationCodeAuthenticationFilter})
5151
* once access is granted (or denied) by the end-user (resource owner).
5252
*
5353
* @author Joe Grandja
@@ -57,7 +57,7 @@
5757
* @see AuthorizationRequestUriBuilder
5858
* @see ClientRegistration
5959
* @see ClientRegistrationRepository
60-
* @see AuthorizationCodeAuthenticationProcessingFilter
60+
* @see AuthorizationCodeAuthenticationFilter
6161
* @see <a target="_blank" href="https://tools.ietf.org/html/rfc6749#section-4.1">Section 4.1 Authorization Code Grant Flow</a>
6262
* @see <a target="_blank" href="https://tools.ietf.org/html/rfc6749#section-4.1.1">Section 4.1.1 Authorization Request</a>
6363
*/

oauth2/oauth2-client/src/main/java/org/springframework/security/oauth2/client/web/AuthorizationRequestRepository.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@
2727
* <p>
2828
* Used by the {@link AuthorizationCodeRequestRedirectFilter} for persisting the <i>Authorization Request</i>
2929
* before it initiates the authorization code grant flow.
30-
* As well, used by the {@link AuthorizationCodeAuthenticationProcessingFilter} when resolving
30+
* As well, used by the {@link AuthorizationCodeAuthenticationFilter} when resolving
3131
* the associated <i>Authorization Request</i> during the handling of the <i>Authorization Response</i>.
3232
*
3333
* @author Joe Grandja
Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -49,17 +49,17 @@
4949
import static org.mockito.Mockito.mock;
5050

5151
/**
52-
* Tests {@link AuthorizationCodeAuthenticationProcessingFilter}.
52+
* Tests {@link AuthorizationCodeAuthenticationFilter}.
5353
*
5454
* @author Joe Grandja
5555
*/
56-
public class AuthorizationCodeAuthenticationProcessingFilterTests {
56+
public class AuthorizationCodeAuthenticationFilterTests {
5757

5858
@Test
5959
public void doFilterWhenNotAuthorizationCodeResponseThenContinueChain() throws Exception {
6060
ClientRegistration clientRegistration = TestUtil.googleClientRegistration();
6161

62-
AuthorizationCodeAuthenticationProcessingFilter filter = Mockito.spy(setupFilter(clientRegistration));
62+
AuthorizationCodeAuthenticationFilter filter = Mockito.spy(setupFilter(clientRegistration));
6363

6464
String requestURI = "/path";
6565
MockHttpServletRequest request = new MockHttpServletRequest("GET", requestURI);
@@ -77,7 +77,7 @@ public void doFilterWhenNotAuthorizationCodeResponseThenContinueChain() throws E
7777
public void doFilterWhenAuthorizationCodeErrorResponseThenAuthenticationFailureHandlerIsCalled() throws Exception {
7878
ClientRegistration clientRegistration = TestUtil.githubClientRegistration();
7979

80-
AuthorizationCodeAuthenticationProcessingFilter filter = Mockito.spy(setupFilter(clientRegistration));
80+
AuthorizationCodeAuthenticationFilter filter = Mockito.spy(setupFilter(clientRegistration));
8181
AuthenticationFailureHandler failureHandler = mock(AuthenticationFailureHandler.class);
8282
filter.setAuthenticationFailureHandler(failureHandler);
8383

@@ -106,7 +106,7 @@ public void doFilterWhenAuthorizationCodeSuccessResponseThenAuthenticationSucces
106106
AuthenticationManager authenticationManager = mock(AuthenticationManager.class);
107107
Mockito.when(authenticationManager.authenticate(Matchers.any(Authentication.class))).thenReturn(clientAuthentication);
108108

109-
AuthorizationCodeAuthenticationProcessingFilter filter = Mockito.spy(setupFilter(authenticationManager, clientRegistration));
109+
AuthorizationCodeAuthenticationFilter filter = Mockito.spy(setupFilter(authenticationManager, clientRegistration));
110110
AuthenticationSuccessHandler successHandler = mock(AuthenticationSuccessHandler.class);
111111
filter.setAuthenticationSuccessHandler(successHandler);
112112
AuthorizationRequestRepository authorizationRequestRepository = new HttpSessionAuthorizationRequestRepository();
@@ -135,7 +135,7 @@ public void doFilterWhenAuthorizationCodeSuccessResponseThenAuthenticationSucces
135135
public void doFilterWhenAuthorizationCodeSuccessResponseAndNoMatchingAuthorizationRequestThenThrowOAuth2AuthenticationExceptionAuthorizationRequestNotFound() throws Exception {
136136
ClientRegistration clientRegistration = TestUtil.githubClientRegistration();
137137

138-
AuthorizationCodeAuthenticationProcessingFilter filter = Mockito.spy(setupFilter(clientRegistration));
138+
AuthorizationCodeAuthenticationFilter filter = Mockito.spy(setupFilter(clientRegistration));
139139
AuthenticationFailureHandler failureHandler = mock(AuthenticationFailureHandler.class);
140140
filter.setAuthenticationFailureHandler(failureHandler);
141141

@@ -156,7 +156,7 @@ public void doFilterWhenAuthorizationCodeSuccessResponseAndNoMatchingAuthorizati
156156
public void doFilterWhenAuthorizationCodeSuccessResponseWithInvalidStateParamThenThrowOAuth2AuthenticationExceptionInvalidStateParameter() throws Exception {
157157
ClientRegistration clientRegistration = TestUtil.githubClientRegistration();
158158

159-
AuthorizationCodeAuthenticationProcessingFilter filter = Mockito.spy(setupFilter(clientRegistration));
159+
AuthorizationCodeAuthenticationFilter filter = Mockito.spy(setupFilter(clientRegistration));
160160
AuthenticationFailureHandler failureHandler = mock(AuthenticationFailureHandler.class);
161161
filter.setAuthenticationFailureHandler(failureHandler);
162162
AuthorizationRequestRepository authorizationRequestRepository = new HttpSessionAuthorizationRequestRepository();
@@ -180,7 +180,7 @@ public void doFilterWhenAuthorizationCodeSuccessResponseWithInvalidStateParamThe
180180
public void doFilterWhenAuthorizationCodeSuccessResponseWithInvalidRedirectUriParamThenThrowOAuth2AuthenticationExceptionInvalidRedirectUriParameter() throws Exception {
181181
ClientRegistration clientRegistration = TestUtil.githubClientRegistration();
182182

183-
AuthorizationCodeAuthenticationProcessingFilter filter = Mockito.spy(setupFilter(clientRegistration));
183+
AuthorizationCodeAuthenticationFilter filter = Mockito.spy(setupFilter(clientRegistration));
184184
AuthenticationFailureHandler failureHandler = mock(AuthenticationFailureHandler.class);
185185
filter.setAuthenticationFailureHandler(failureHandler);
186186
AuthorizationRequestRepository authorizationRequestRepository = new HttpSessionAuthorizationRequestRepository();
@@ -201,7 +201,7 @@ public void doFilterWhenAuthorizationCodeSuccessResponseWithInvalidRedirectUriPa
201201
verifyThrowsOAuth2AuthenticationExceptionWithErrorCode(filter, failureHandler, "invalid_redirect_uri_parameter");
202202
}
203203

204-
private void verifyThrowsOAuth2AuthenticationExceptionWithErrorCode(AuthorizationCodeAuthenticationProcessingFilter filter,
204+
private void verifyThrowsOAuth2AuthenticationExceptionWithErrorCode(AuthorizationCodeAuthenticationFilter filter,
205205
AuthenticationFailureHandler failureHandler,
206206
String errorCode) throws Exception {
207207

@@ -218,18 +218,18 @@ private void verifyThrowsOAuth2AuthenticationExceptionWithErrorCode(Authorizatio
218218
Assertions.assertThat(oauth2AuthenticationException.getErrorObject().getErrorCode()).isEqualTo(errorCode);
219219
}
220220

221-
private AuthorizationCodeAuthenticationProcessingFilter setupFilter(ClientRegistration... clientRegistrations) throws Exception {
221+
private AuthorizationCodeAuthenticationFilter setupFilter(ClientRegistration... clientRegistrations) throws Exception {
222222
AuthenticationManager authenticationManager = mock(AuthenticationManager.class);
223223

224224
return setupFilter(authenticationManager, clientRegistrations);
225225
}
226226

227-
private AuthorizationCodeAuthenticationProcessingFilter setupFilter(
227+
private AuthorizationCodeAuthenticationFilter setupFilter(
228228
AuthenticationManager authenticationManager, ClientRegistration... clientRegistrations) throws Exception {
229229

230230
ClientRegistrationRepository clientRegistrationRepository = TestUtil.clientRegistrationRepository(clientRegistrations);
231231

232-
AuthorizationCodeAuthenticationProcessingFilter filter = new AuthorizationCodeAuthenticationProcessingFilter();
232+
AuthorizationCodeAuthenticationFilter filter = new AuthorizationCodeAuthenticationFilter();
233233
filter.setClientRegistrationRepository(clientRegistrationRepository);
234234
filter.setAuthenticationManager(authenticationManager);
235235

samples/boot/oauth2login/src/integration-test/java/org/springframework/security/samples/OAuth2LoginApplicationTests.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@
4040
import org.springframework.security.oauth2.client.registration.ClientRegistration;
4141
import org.springframework.security.oauth2.client.registration.ClientRegistrationRepository;
4242
import org.springframework.security.oauth2.client.user.OAuth2UserService;
43-
import org.springframework.security.oauth2.client.web.AuthorizationCodeAuthenticationProcessingFilter;
43+
import org.springframework.security.oauth2.client.web.AuthorizationCodeAuthenticationFilter;
4444
import org.springframework.security.oauth2.client.web.AuthorizationCodeRequestRedirectFilter;
4545
import org.springframework.security.oauth2.client.web.AuthorizationGrantTokenExchanger;
4646
import org.springframework.security.oauth2.core.AccessToken;
@@ -73,7 +73,7 @@
7373

7474
/**
7575
* Integration tests for the OAuth 2.0 client filters {@link AuthorizationCodeRequestRedirectFilter}
76-
* and {@link AuthorizationCodeAuthenticationProcessingFilter}.
76+
* and {@link AuthorizationCodeAuthenticationFilter}.
7777
* These filters work together to realize the Authorization Code Grant flow.
7878
*
7979
* @author Joe Grandja

0 commit comments

Comments
 (0)