@Override public void afterPropertiesSet() { Assert.state(restTemplate != null, "Supply a rest-template"); super.afterPropertiesSet(); }
@Override public void afterPropertiesSet() { // call super. super.afterPropertiesSet(); Assert.notNull(getTokenServices(), "A token services must be provided."); Assert.notNull(getVerifierServices(), "Verifier services are required."); }
@Override public void afterPropertiesSet() { super.afterPropertiesSet(); setAuthenticationFailureHandler(new AuthenticationFailureHandler() { public void onAuthenticationFailure(HttpServletRequest request, HttpServletResponse response, AuthenticationException exception) throws IOException, ServletException { if (exception instanceof BadCredentialsException) { exception = new BadCredentialsException(exception.getMessage(), new BadClientCredentialsException()); } authenticationEntryPoint.commence(request, response, exception); } }); setAuthenticationSuccessHandler(new AuthenticationSuccessHandler() { public void onAuthenticationSuccess(HttpServletRequest request, HttpServletResponse response, Authentication authentication) throws IOException, ServletException { // no-op - just allow filter chain to continue to token endpoint } }); }
@Override public void afterPropertiesSet() { super.afterPropertiesSet(); // if our JOSE validators don't get wired in, drop defaults into place if (validationServices == null) { validationServices = new JWKSetCacheService(); } if (symmetricCacheService == null) { symmetricCacheService = new SymmetricKeyJWTValidatorCacheService(); } }
@Override public void afterPropertiesSet() { super.afterPropertiesSet(); if (consumer == null) { try { consumer = new OpenID4JavaConsumer(); } catch (ConsumerException e) { throw new IllegalArgumentException("Failed to initialize OpenID", e); } } if (returnToUrlParameters.isEmpty() && getRememberMeServices() instanceof AbstractRememberMeServices) { returnToUrlParameters = new HashSet<>(); returnToUrlParameters .add(((AbstractRememberMeServices) getRememberMeServices()) .getParameter()); } }
@Override public void afterPropertiesSet() { super.afterPropertiesSet(); setAuthenticationFailureHandler(new AuthenticationFailureHandler() { @Override public void onAuthenticationFailure(HttpServletRequest request, HttpServletResponse response, AuthenticationException exception) throws IOException, ServletException { if (exception instanceof BadCredentialsException) { exception = new BadCredentialsException(exception.getMessage(), new BadClientCredentialsException()); } authenticationEntryPoint.commence(request, response, exception); } }); setAuthenticationSuccessHandler(new AuthenticationSuccessHandler() { @Override public void onAuthenticationSuccess(HttpServletRequest request, HttpServletResponse response, Authentication authentication) throws IOException, ServletException { // no-op - just allow filter chain to continue to token endpoint } }); }
@Override public void afterPropertiesSet() { adapterDeploymentContext = applicationContext.getBean(AdapterDeploymentContext.class); super.afterPropertiesSet(); }
@Override public void afterPropertiesSet() { Assert.state(restTemplate != null, "Supply a rest-template"); super.afterPropertiesSet(); }
@Override public void afterPropertiesSet() { super.afterPropertiesSet(); Assert.notNull(engageService, "engageService must be set"); }
@Override public void afterPropertiesSet() { super.afterPropertiesSet(); Assert.notNull(oauthConnector, "oauthConnector bean must be set"); if (filterProcessesUrlOverride != null) { Assert.notNull(authenticationEntryPoint, "authenticationEntryPoint bean must be set when filterProcessesUrl is used"); } }
public void afterPropertiesSet() { Assert.state(this.restTemplate != null, "Supply a rest-template"); super.afterPropertiesSet(); }
/** * Verifies that required entities were autowired or set. */ @Override public void afterPropertiesSet() { super.afterPropertiesSet(); Assert.notNull(processor, "SAMLProcessor must be set"); Assert.notNull(contextProvider, "Context provider must be set"); }
@Override public void afterPropertiesSet() { super.afterPropertiesSet(); // init JWT signing key key = Keys.hmacShaKeyFor(jwtSecret.getBytes()); }
@Override public void afterPropertiesSet() { super.afterPropertiesSet(); // init JWT signing key key = Keys.hmacShaKeyFor(jwtSecret.getBytes()); }
@Override public void afterPropertiesSet() { super.afterPropertiesSet(); // if our JOSE validators don't get wired in, drop defaults into place if (validationServices == null) { validationServices = new JWKSetCacheService(); } if (symmetricCacheService == null) { symmetricCacheService = new SymmetricKeyJWTValidatorCacheService(); } }
@Override public void afterPropertiesSet() { super.afterPropertiesSet(); setAuthenticationFailureHandler(new AuthenticationFailureHandler() { public void onAuthenticationFailure(HttpServletRequest request, HttpServletResponse response, AuthenticationException exception) throws IOException, ServletException { if (exception instanceof BadCredentialsException) { exception = new BadCredentialsException(exception.getMessage(), new BadClientCredentialsException()); } authenticationEntryPoint.commence(request, response, exception); } }); setAuthenticationSuccessHandler(new AuthenticationSuccessHandler() { public void onAuthenticationSuccess(HttpServletRequest request, HttpServletResponse response, Authentication authentication) throws IOException, ServletException { // no-op - just allow filter chain to continue to token endpoint } }); }
@Override public void afterPropertiesSet() { super.afterPropertiesSet(); setAuthenticationFailureHandler(new AuthenticationFailureHandler() { @Override public void onAuthenticationFailure(HttpServletRequest request, HttpServletResponse response, AuthenticationException exception) throws IOException, ServletException { if (exception instanceof BadCredentialsException) { exception = new BadCredentialsException(exception.getMessage(), new BadClientCredentialsException()); } authenticationEntryPoint.commence(request, response, exception); } }); setAuthenticationSuccessHandler(new AuthenticationSuccessHandler() { @Override public void onAuthenticationSuccess(HttpServletRequest request, HttpServletResponse response, Authentication authentication) throws IOException, ServletException { // no-op - just allow filter chain to continue to token endpoint } }); }
@Override public void afterPropertiesSet() { super.afterPropertiesSet(); if (consumer == null) { try { consumer = new OpenID4JavaConsumer(); } catch (ConsumerException e) { throw new IllegalArgumentException("Failed to initialize OpenID", e); } } if (returnToUrlParameters.isEmpty() && getRememberMeServices() instanceof AbstractRememberMeServices) { returnToUrlParameters = new HashSet<>(); returnToUrlParameters .add(((AbstractRememberMeServices) getRememberMeServices()) .getParameter()); } }
@Override /** * Sets the handler, failed -> BadCredentialsException, success -> just continue. */ public void afterPropertiesSet() { super.afterPropertiesSet(); setAuthenticationFailureHandler(new AuthenticationFailureHandler() { public void onAuthenticationFailure(HttpServletRequest request, HttpServletResponse response, AuthenticationException exception) throws IOException, ServletException { if (exception instanceof BadCredentialsException) { exception = // NOSONAR new BadCredentialsException(exception.getMessage(), new BadClientCredentialsException()); } authenticationEntryPoint.commence(request, response, exception); } }); setAuthenticationSuccessHandler(new MyAuthenticationSuccessHandler()); }