Ensure all files end with a new line
Update all files to ensure that they always end with a new-line character. Issue gh-8945
This commit is contained in:
+1
-1
@@ -142,4 +142,4 @@ final class DefaultServiceAuthenticationDetails extends WebAuthenticationDetails
|
|||||||
return port;
|
return port;
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -38,4 +38,4 @@ public interface ServiceAuthenticationDetails extends Serializable {
|
|||||||
*/
|
*/
|
||||||
String getServiceUrl();
|
String getServiceUrl();
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -79,4 +79,4 @@ public class ServiceAuthenticationDetailsSource
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -38,4 +38,4 @@ public interface ObjectPostProcessor<T> {
|
|||||||
*/
|
*/
|
||||||
<O extends T> O postProcess(O object);
|
<O extends T> O postProcess(O object);
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -57,4 +57,4 @@ class GlobalMethodSecurityAspectJAutoProxyRegistrar implements ImportBeanDefinit
|
|||||||
registry.registerBeanDefinition("annotationSecurityAspect$0", aspect.getBeanDefinition());
|
registry.registerBeanDefinition("annotationSecurityAspect$0", aspect.getBeanDefinition());
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -92,4 +92,4 @@ final class PermitAllSupport {
|
|||||||
private PermitAllSupport() {
|
private PermitAllSupport() {
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -60,4 +60,4 @@ public class SecurityDebugBeanFactoryPostProcessor implements BeanDefinitionRegi
|
|||||||
public void postProcessBeanFactory(ConfigurableListableBeanFactory beanFactory) throws BeansException {
|
public void postProcessBeanFactory(ConfigurableListableBeanFactory beanFactory) throws BeansException {
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -28,4 +28,4 @@ public interface UserRepository extends CrudRepository<User, String> {
|
|||||||
@PreAuthorize("hasRole('ROLE_ADMIN')")
|
@PreAuthorize("hasRole('ROLE_ADMIN')")
|
||||||
User findByUsername(String username);
|
User findByUsername(String username);
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -134,4 +134,4 @@ public class WebMvcSecurityConfigurationTests {
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -42,4 +42,4 @@ public class WebConfigUtilsTests {
|
|||||||
verifyZeroInteractions(this.parserContext);
|
verifyZeroInteractions(this.parserContext);
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -29,4 +29,4 @@ public class PreAuthorizeServiceImpl {
|
|||||||
public void contactPermission(Contact contact) {
|
public void contactPermission(Contact contact) {
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -70,4 +70,4 @@ public class PreAuthorizeTests {
|
|||||||
this.service.contactPermission(new Contact("admin"));
|
this.service.contactPermission(new Contact("admin"));
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -28,4 +28,4 @@ import org.springframework.security.access.annotation.Secured;
|
|||||||
@Secured("ROLE_ADMIN")
|
@Secured("ROLE_ADMIN")
|
||||||
public @interface SecuredAdminRole {
|
public @interface SecuredAdminRole {
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -56,4 +56,4 @@ public class SecuredTests {
|
|||||||
this.service.securedAdminRole();
|
this.service.securedAdminRole();
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -49,4 +49,4 @@ public class Sec2499Tests {
|
|||||||
this.child.refresh();
|
this.child.refresh();
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -36,4 +36,4 @@ public class Jsr250SecurityConfig extends SecurityConfig {
|
|||||||
super(role);
|
super(role);
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -46,4 +46,4 @@ public @interface P {
|
|||||||
*/
|
*/
|
||||||
String value();
|
String value();
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -44,4 +44,4 @@ public class InternalAuthenticationServiceException extends AuthenticationServic
|
|||||||
super(message);
|
super(message);
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -30,4 +30,4 @@ public interface ReactiveAuthenticationManagerResolver<C> {
|
|||||||
|
|
||||||
Mono<ReactiveAuthenticationManager> resolve(C context);
|
Mono<ReactiveAuthenticationManager> resolve(C context);
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -89,4 +89,4 @@ public class InMemoryConfiguration extends Configuration {
|
|||||||
public void refresh() {
|
public void refresh() {
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -66,4 +66,4 @@ public class DelegatingSecurityContextExecutor extends AbstractDelegatingSecurit
|
|||||||
return this.delegate;
|
return this.delegate;
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -20,7 +20,3 @@
|
|||||||
* @since 4.2
|
* @since 4.2
|
||||||
*/
|
*/
|
||||||
package org.springframework.security.jackson2;
|
package org.springframework.security.jackson2;
|
||||||
|
|
||||||
/**
|
|
||||||
* Package contains Jackson mixin classes.
|
|
||||||
*/
|
|
||||||
+1
-1
@@ -51,4 +51,4 @@ public class DelegatingSecurityContextTaskExecutor extends DelegatingSecurityCon
|
|||||||
this(delegate, null);
|
this(delegate, null);
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -19,4 +19,4 @@ public interface CrudRepository {
|
|||||||
|
|
||||||
Iterable<Object> findAll();
|
Iterable<Object> findAll();
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -29,4 +29,4 @@ import org.springframework.security.access.prepost.PreAuthorize;
|
|||||||
@PreAuthorize("hasRole('ROLE_PERSON')")
|
@PreAuthorize("hasRole('ROLE_PERSON')")
|
||||||
public interface PersonRepository extends CrudRepository {
|
public interface PersonRepository extends CrudRepository {
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -40,4 +40,4 @@ public class CurrentDelegatingSecurityContextExecutorServiceTests
|
|||||||
return new DelegatingSecurityContextExecutorService(this.delegate);
|
return new DelegatingSecurityContextExecutorService(this.delegate);
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -40,4 +40,4 @@ public class ExplicitDelegatingSecurityContextExecutorServiceTests
|
|||||||
return new DelegatingSecurityContextExecutorService(this.delegate, this.securityContext);
|
return new DelegatingSecurityContextExecutorService(this.delegate, this.securityContext);
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -40,4 +40,4 @@ public class ExplicitDelegatingSecurityContextScheduledExecutorServiceTests
|
|||||||
return new DelegatingSecurityContextScheduledExecutorService(this.delegate, this.securityContext);
|
return new DelegatingSecurityContextScheduledExecutorService(this.delegate, this.securityContext);
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -24,4 +24,4 @@ public interface StringKeyGenerator {
|
|||||||
|
|
||||||
String generateKey();
|
String generateKey();
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -75,4 +75,4 @@ public class SecurityEvaluationContextExtensionTests {
|
|||||||
return this.securityExtension.getRootObject();
|
return this.securityExtension.getRootObject();
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -3,7 +3,6 @@
|
|||||||
"-//Checkstyle//DTD SuppressionFilter Configuration 1.2//EN"
|
"-//Checkstyle//DTD SuppressionFilter Configuration 1.2//EN"
|
||||||
"https://checkstyle.org/dtds/suppressions_1_2.dtd">
|
"https://checkstyle.org/dtds/suppressions_1_2.dtd">
|
||||||
<suppressions>
|
<suppressions>
|
||||||
<suppress files=".*" checks="NewlineAtEndOfFile" />
|
|
||||||
<suppress files=".*" checks="NonEmptyAtclauseDescription" />
|
<suppress files=".*" checks="NonEmptyAtclauseDescription" />
|
||||||
<suppress files=".*" checks="NoWhitespaceBefore" />
|
<suppress files=".*" checks="NoWhitespaceBefore" />
|
||||||
<suppress files=".*" checks="OneTopLevelClass" />
|
<suppress files=".*" checks="OneTopLevelClass" />
|
||||||
|
|||||||
+1
-1
@@ -21,4 +21,4 @@ public class StubUserRepository implements UserRepository {
|
|||||||
public void doSomething() {
|
public void doSomething() {
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -60,4 +60,4 @@ public final class AndMessageMatcher<T> extends AbstractMessageMatcherComposite<
|
|||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -50,4 +50,4 @@ public class BasicAuthenticationDecoderTests {
|
|||||||
assertThat(actualCredentials).isEqualToComparingFieldByField(expectedCredentials);
|
assertThat(actualCredentials).isEqualToComparingFieldByField(expectedCredentials);
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -43,4 +43,4 @@ final class WithAnonymousUserSecurityContextFactory implements WithSecurityConte
|
|||||||
return context;
|
return context;
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -41,4 +41,4 @@ public interface WithSecurityContextFactory<A extends Annotation> {
|
|||||||
*/
|
*/
|
||||||
SecurityContext createSecurityContext(A annotation);
|
SecurityContext createSecurityContext(A annotation);
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -78,4 +78,4 @@ public class CustomUserDetails implements UserDetails {
|
|||||||
return "CustomUserDetails{" + "username='" + this.username + '\'' + '}';
|
return "CustomUserDetails{" + "username='" + this.username + '\'' + '}';
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -23,4 +23,4 @@ import org.springframework.security.test.context.support.WithMockUser;
|
|||||||
@WithMockUser
|
@WithMockUser
|
||||||
public class WithMockUserParent {
|
public class WithMockUserParent {
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -60,4 +60,4 @@ public class WithMockUserParentTests extends WithMockUserParent {
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -90,4 +90,4 @@ public class WithMockUserTests {
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -103,4 +103,4 @@ public class SecurityMockMvcRequestPostProcessorsAuthenticationStatelessTests {
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -101,4 +101,4 @@ public class SecurityMockMvcRequestPostProcessorsTestSecurityContextStatelessTes
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -110,4 +110,4 @@ public class DefaultfSecurityRequestsTests {
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -133,4 +133,4 @@ public class SecurityRequestsTests {
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -111,4 +111,4 @@ public class WithUserAuthenticationTests {
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -111,4 +111,4 @@ public class WithUserClassLevelAuthenticationTests {
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -55,4 +55,4 @@ public final class CompositeLogoutHandler implements LogoutHandler {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -158,4 +158,4 @@ abstract class AbstractSessionFixationProtectionStrategy
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -86,4 +86,4 @@ public class CompositeSessionAuthenticationStrategy implements SessionAuthentica
|
|||||||
return getClass().getName() + " [delegateStrategies = " + this.delegateStrategies + "]";
|
return getClass().getName() + " [delegateStrategies = " + this.delegateStrategies + "]";
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -56,4 +56,4 @@ public final class WebAsyncManagerIntegrationFilter extends OncePerRequestFilter
|
|||||||
filterChain.doFilter(request, response);
|
filterChain.doFilter(request, response);
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -30,4 +30,4 @@ public class CsrfException extends AccessDeniedException {
|
|||||||
super(message);
|
super(message);
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -54,4 +54,4 @@ public final class CsrfLogoutHandler implements LogoutHandler {
|
|||||||
this.csrfTokenRepository.saveToken(null, request, response);
|
this.csrfTokenRepository.saveToken(null, request, response);
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -47,4 +47,4 @@ public interface CsrfToken extends Serializable {
|
|||||||
*/
|
*/
|
||||||
String getToken();
|
String getToken();
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -37,4 +37,4 @@ public class InvalidCsrfTokenException extends CsrfException {
|
|||||||
+ "'.");
|
+ "'.");
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -28,4 +28,4 @@ public class MissingCsrfTokenException extends CsrfException {
|
|||||||
super("Could not verify the provided CSRF token because your session was not found.");
|
super("Could not verify the provided CSRF token because your session was not found.");
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -19,4 +19,4 @@
|
|||||||
* To use, simply add the {@code JaasApiIntegrationFilter} to the Spring Security filter
|
* To use, simply add the {@code JaasApiIntegrationFilter} to the Spring Security filter
|
||||||
* chain.
|
* chain.
|
||||||
*/
|
*/
|
||||||
package org.springframework.security.web.jaasapi;
|
package org.springframework.security.web.jaasapi;
|
||||||
|
|||||||
@@ -19,4 +19,4 @@
|
|||||||
* @author Jitendra Singh
|
* @author Jitendra Singh
|
||||||
* @since 4.2
|
* @since 4.2
|
||||||
*/
|
*/
|
||||||
package org.springframework.security.web.jackson2;
|
package org.springframework.security.web.jackson2;
|
||||||
|
|||||||
+1
-1
@@ -50,4 +50,4 @@ public final class InvalidSessionAccessDeniedHandler implements AccessDeniedHand
|
|||||||
this.invalidSessionStrategy.onInvalidSessionDetected(request, response);
|
this.invalidSessionStrategy.onInvalidSessionDetected(request, response);
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -78,4 +78,4 @@ public final class AndRequestMatcher implements RequestMatcher {
|
|||||||
return "AndRequestMatcher [requestMatchers=" + this.requestMatchers + "]";
|
return "AndRequestMatcher [requestMatchers=" + this.requestMatchers + "]";
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -272,4 +272,4 @@ public final class MediaTypeRequestMatcher implements RequestMatcher {
|
|||||||
+ ", ignoredMediaTypes=" + this.ignoredMediaTypes + "]";
|
+ ", ignoredMediaTypes=" + this.ignoredMediaTypes + "]";
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -60,4 +60,4 @@ public class NegatedRequestMatcher implements RequestMatcher {
|
|||||||
return "NegatedRequestMatcher [requestMatcher=" + this.requestMatcher + "]";
|
return "NegatedRequestMatcher [requestMatcher=" + this.requestMatcher + "]";
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -78,4 +78,4 @@ public final class OrRequestMatcher implements RequestMatcher {
|
|||||||
return "OrRequestMatcher [requestMatchers=" + this.requestMatchers + "]";
|
return "OrRequestMatcher [requestMatchers=" + this.requestMatchers + "]";
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -61,4 +61,4 @@ public class HttpStatusEntryPointTests {
|
|||||||
assertThat(this.response.getStatus()).isEqualTo(HttpStatus.UNAUTHORIZED.value());
|
assertThat(this.response.getStatus()).isEqualTo(HttpStatus.UNAUTHORIZED.value());
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
+1
-1
@@ -152,4 +152,4 @@ public class MediaTypeRequestMatcherRequestHCNSTests {
|
|||||||
assertThat(matcher.matches(this.request)).isFalse();
|
assertThat(matcher.matches(this.request)).isFalse();
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user