Forráskód Böngészése

Cleanup redundant type casts

Lars Grefer 6 éve
szülő
commit
c5b5cc507c
31 módosított fájl, 38 hozzáadás és 42 törlés
  1. 1 1
      acl/src/main/java/org/springframework/security/acls/jdbc/BasicLookupStrategy.java
  2. 1 1
      acl/src/main/java/org/springframework/security/acls/jdbc/JdbcAclService.java
  3. 3 3
      acl/src/test/java/org/springframework/security/acls/domain/AclImplTests.java
  4. 1 1
      acl/src/test/java/org/springframework/security/acls/jdbc/JdbcMutableAclServiceTests.java
  5. 1 2
      cas/src/main/java/org/springframework/security/cas/jackson2/CasJackson2Module.java
  6. 1 1
      config/src/main/java/org/springframework/security/config/annotation/authentication/builders/AuthenticationManagerBuilder.java
  7. 2 2
      config/src/test/java/org/springframework/security/config/annotation/web/configurers/oauth2/server/resource/OAuth2ResourceServerConfigurerTests.java
  8. 1 1
      core/src/main/java/org/springframework/security/access/expression/ExpressionUtils.java
  9. 2 2
      core/src/main/java/org/springframework/security/access/method/MapBasedMethodSecurityMetadataSource.java
  10. 1 2
      core/src/main/java/org/springframework/security/jackson2/CoreJackson2Module.java
  11. 1 1
      core/src/test/java/org/springframework/security/authentication/anonymous/AnonymousAuthenticationTokenTests.java
  12. 1 2
      core/src/test/java/org/springframework/security/authentication/dao/MockUserCache.java
  13. 1 1
      core/src/test/java/org/springframework/security/concurrent/AbstractDelegatingSecurityContextScheduledExecutorServiceTests.java
  14. 1 1
      core/src/test/java/org/springframework/security/core/token/KeyBasedPersistenceTokenServiceTests.java
  15. 1 1
      core/src/test/java/org/springframework/security/provisioning/JdbcUserDetailsManagerTests.java
  16. 1 1
      crypto/src/main/java/org/springframework/security/crypto/password/LdapShaPasswordEncoder.java
  17. 1 1
      itest/context/src/main/java/org/springframework/security/integration/python/PythonInterpreterPreInvocationAdvice.java
  18. 1 2
      ldap/src/integration-test/java/org/springframework/security/ldap/authentication/PasswordComparisonAuthenticatorTests.java
  19. 1 1
      ldap/src/main/java/org/springframework/security/ldap/userdetails/LdapUserDetailsManager.java
  20. 1 1
      samples/boot/webflux-form/src/integration-test/java/sample/webdriver/IndexPage.java
  21. 1 1
      samples/xml/contacts/src/main/java/sample/contact/ContactDaoSpring.java
  22. 2 2
      samples/xml/dms/src/main/java/sample/dms/DocumentDaoImpl.java
  23. 1 1
      samples/xml/dms/src/main/java/sample/dms/secured/SecureDocumentDaoImpl.java
  24. 2 2
      test/src/main/java/org/springframework/security/test/web/support/WebTestUtils.java
  25. 1 1
      web/src/main/java/org/springframework/security/web/authentication/preauth/j2ee/WebXmlMappableAttributesRetriever.java
  26. 1 1
      web/src/main/java/org/springframework/security/web/authentication/www/DigestAuthenticationEntryPoint.java
  27. 1 1
      web/src/main/java/org/springframework/security/web/savedrequest/FastHttpDateFormat.java
  28. 2 2
      web/src/test/java/org/springframework/security/web/server/DefaultServerRedirectStrategyTests.java
  29. 1 1
      web/src/test/java/org/springframework/security/web/server/authentication/RedirectServerAuthenticationEntryPointTests.java
  30. 1 1
      web/src/test/java/org/springframework/security/web/server/authentication/RedirectServerAuthenticationFailureHandlerTests.java
  31. 1 1
      web/src/test/java/org/springframework/security/web/server/authorization/HttpStatusServerAccessDeniedHandlerTests.java

+ 1 - 1
acl/src/main/java/org/springframework/security/acls/jdbc/BasicLookupStrategy.java

@@ -455,7 +455,7 @@ public class BasicLookupStrategy implements LookupStrategy {
 
 		// Now we have the parent (if there is one), create the true AclImpl
 		AclImpl result = new AclImpl(inputAcl.getObjectIdentity(),
-				(Long) inputAcl.getId(), aclAuthorizationStrategy, grantingStrategy,
+				inputAcl.getId(), aclAuthorizationStrategy, grantingStrategy,
 				parent, null, inputAcl.isEntriesInheriting(), inputAcl.getOwner());
 
 		// Copy the "aces" from the input to the destination

+ 1 - 1
acl/src/main/java/org/springframework/security/acls/jdbc/JdbcAclService.java

@@ -118,7 +118,7 @@ public class JdbcAclService implements AclService {
 		Assert.isTrue(map.containsKey(object),
 				() -> "There should have been an Acl entry for ObjectIdentity " + object);
 
-		return (Acl) map.get(object);
+		return map.get(object);
 	}
 
 	public Acl readAclById(ObjectIdentity object) throws NotFoundException {

+ 3 - 3
acl/src/test/java/org/springframework/security/acls/domain/AclImplTests.java

@@ -501,13 +501,13 @@ public class AclImplTests {
 		assertThat(acl.isSidLoaded(BEN)).isTrue();
 		assertThat(acl.isSidLoaded(null)).isTrue();
 		assertThat(acl.isSidLoaded(new ArrayList<>(0))).isTrue();
-		assertThat(acl.isSidLoaded(Arrays.asList((Sid) new GrantedAuthoritySid(
+		assertThat(acl.isSidLoaded(Arrays.asList(new GrantedAuthoritySid(
 				"ROLE_IGNORED"), new GrantedAuthoritySid("ROLE_IGNORED"))))
 			.isTrue();
-		assertThat(acl.isSidLoaded(Arrays.asList((Sid) new GrantedAuthoritySid(
+		assertThat(acl.isSidLoaded(Arrays.asList(new GrantedAuthoritySid(
 				"ROLE_GENERAL"), new GrantedAuthoritySid("ROLE_IGNORED"))))
 			.isFalse();
-		assertThat(acl.isSidLoaded(Arrays.asList((Sid) new GrantedAuthoritySid(
+		assertThat(acl.isSidLoaded(Arrays.asList(new GrantedAuthoritySid(
 				"ROLE_IGNORED"), new GrantedAuthoritySid("ROLE_GENERAL"))))
 			.isFalse();
 	}

+ 1 - 1
acl/src/test/java/org/springframework/security/acls/jdbc/JdbcMutableAclServiceTests.java

@@ -319,7 +319,7 @@ public class JdbcMutableAclServiceTests extends
 
 		Acl acl = jdbcMutableAclService.readAclById(getTopParentOid());
 		assertThat(acl).isNotNull();
-		assertThat(getTopParentOid()).isEqualTo(((MutableAcl) acl).getObjectIdentity());
+		assertThat(getTopParentOid()).isEqualTo(acl.getObjectIdentity());
 	}
 
 	@Test

+ 1 - 2
cas/src/main/java/org/springframework/security/cas/jackson2/CasJackson2Module.java

@@ -17,7 +17,6 @@
 package org.springframework.security.cas.jackson2;
 
 import com.fasterxml.jackson.core.Version;
-import com.fasterxml.jackson.databind.ObjectMapper;
 import com.fasterxml.jackson.databind.module.SimpleModule;
 import org.jasig.cas.client.authentication.AttributePrincipalImpl;
 import org.jasig.cas.client.validation.AssertionImpl;
@@ -48,7 +47,7 @@ public class CasJackson2Module extends SimpleModule {
 
 	@Override
 	public void setupModule(SetupContext context) {
-		SecurityJackson2Modules.enableDefaultTyping((ObjectMapper) context.getOwner());
+		SecurityJackson2Modules.enableDefaultTyping(context.getOwner());
 		context.setMixInAnnotations(AssertionImpl.class, AssertionImplMixin.class);
 		context.setMixInAnnotations(AttributePrincipalImpl.class, AttributePrincipalImplMixin.class);
 		context.setMixInAnnotations(CasAuthenticationToken.class, CasAuthenticationTokenMixin.class);

+ 1 - 1
config/src/main/java/org/springframework/security/config/annotation/authentication/builders/AuthenticationManagerBuilder.java

@@ -287,6 +287,6 @@ public class AuthenticationManagerBuilder
 	private <C extends UserDetailsAwareConfigurer<AuthenticationManagerBuilder, ? extends UserDetailsService>> C apply(
 			C configurer) throws Exception {
 		this.defaultUserDetailsService = configurer.getUserDetailsService();
-		return (C) super.apply(configurer);
+		return super.apply(configurer);
 	}
 }

+ 2 - 2
config/src/test/java/org/springframework/security/config/annotation/web/configurers/oauth2/server/resource/OAuth2ResourceServerConfigurerTests.java

@@ -2072,11 +2072,11 @@ public class OAuth2ResourceServerConfigurerTests {
 	}
 
 	private <T> T bean(Class<T> beanClass) {
-		return (T) this.spring.getContext().getBean(beanClass);
+		return this.spring.getContext().getBean(beanClass);
 	}
 
 	private <T> T verifyBean(Class<T> beanClass) {
-		return (T) verify(this.spring.getContext().getBean(beanClass));
+		return verify(this.spring.getContext().getBean(beanClass));
 	}
 
 	private String json(String name) throws IOException {

+ 1 - 1
core/src/main/java/org/springframework/security/access/expression/ExpressionUtils.java

@@ -23,7 +23,7 @@ public final class ExpressionUtils {
 
 	public static boolean evaluateAsBoolean(Expression expr, EvaluationContext ctx) {
 		try {
-			return ((Boolean) expr.getValue(ctx, Boolean.class)).booleanValue();
+			return expr.getValue(ctx, Boolean.class).booleanValue();
 		}
 		catch (EvaluationException e) {
 			throw new IllegalArgumentException("Failed to evaluate expression '"

+ 2 - 2
core/src/main/java/org/springframework/security/access/method/MapBasedMethodSecurityMetadataSource.java

@@ -98,7 +98,7 @@ public class MapBasedMethodSecurityMetadataSource extends
 			Class<?> clazz) {
 		RegisteredMethod registeredMethod = new RegisteredMethod(method, clazz);
 		if (methodMap.containsKey(registeredMethod)) {
-			return (List<ConfigAttribute>) methodMap.get(registeredMethod);
+			return methodMap.get(registeredMethod);
 		}
 		// Search superclass
 		if (clazz.getSuperclass() != null) {
@@ -166,7 +166,7 @@ public class MapBasedMethodSecurityMetadataSource extends
 		// register all matching methods
 		for (Method method : matchingMethods) {
 			RegisteredMethod registeredMethod = new RegisteredMethod(method, javaType);
-			String regMethodName = (String) this.nameMap.get(registeredMethod);
+			String regMethodName = this.nameMap.get(registeredMethod);
 
 			if ((regMethodName == null)
 					|| (!regMethodName.equals(name) && (regMethodName.length() <= name

+ 1 - 2
core/src/main/java/org/springframework/security/jackson2/CoreJackson2Module.java

@@ -17,7 +17,6 @@
 package org.springframework.security.jackson2;
 
 import com.fasterxml.jackson.core.Version;
-import com.fasterxml.jackson.databind.ObjectMapper;
 import com.fasterxml.jackson.databind.module.SimpleModule;
 import org.springframework.security.authentication.AnonymousAuthenticationToken;
 import org.springframework.security.authentication.BadCredentialsException;
@@ -54,7 +53,7 @@ public class CoreJackson2Module extends SimpleModule {
 
 	@Override
 	public void setupModule(SetupContext context) {
-		SecurityJackson2Modules.enableDefaultTyping((ObjectMapper) context.getOwner());
+		SecurityJackson2Modules.enableDefaultTyping(context.getOwner());
 		context.setMixInAnnotations(AnonymousAuthenticationToken.class, AnonymousAuthenticationTokenMixin.class);
 		context.setMixInAnnotations(RememberMeAuthenticationToken.class, RememberMeAuthenticationTokenMixin.class);
 		context.setMixInAnnotations(SimpleGrantedAuthority.class, SimpleGrantedAuthorityMixin.class);

+ 1 - 1
core/src/test/java/org/springframework/security/authentication/anonymous/AnonymousAuthenticationTokenTests.java

@@ -58,7 +58,7 @@ public class AnonymousAuthenticationTokenTests {
 
 		try {
 			new AnonymousAuthenticationToken("key", "Test",
-					(List<GrantedAuthority>) null);
+					null);
 			fail("Should have thrown IllegalArgumentException");
 		}
 		catch (IllegalArgumentException expected) {

+ 1 - 2
core/src/test/java/org/springframework/security/authentication/dao/MockUserCache.java

@@ -21,7 +21,6 @@ package org.springframework.security.authentication.dao;
 import java.util.HashMap;
 import java.util.Map;
 
-import org.springframework.security.core.userdetails.User;
 import org.springframework.security.core.userdetails.UserCache;
 import org.springframework.security.core.userdetails.UserDetails;
 
@@ -29,7 +28,7 @@ public class MockUserCache implements UserCache {
 	private Map<String, UserDetails> cache = new HashMap<>();
 
 	public UserDetails getUserFromCache(String username) {
-		return (User) cache.get(username);
+		return cache.get(username);
 	}
 
 	public void putUserInCache(UserDetails user) {

+ 1 - 1
core/src/test/java/org/springframework/security/concurrent/AbstractDelegatingSecurityContextScheduledExecutorServiceTests.java

@@ -62,7 +62,7 @@ public abstract class AbstractDelegatingSecurityContextScheduledExecutorServiceT
 	@Test
 	public void scheduleCallable() {
 		when(
-				(ScheduledFuture<Object>) delegate.schedule(wrappedCallable, 1,
+				delegate.schedule(wrappedCallable, 1,
 						TimeUnit.SECONDS)).thenReturn(expectedResult);
 		ScheduledFuture<Object> result = executor.schedule(callable, 1, TimeUnit.SECONDS);
 		assertThat(result).isEqualTo(expectedResult);

+ 1 - 1
core/src/test/java/org/springframework/security/core/token/KeyBasedPersistenceTokenServiceTests.java

@@ -40,7 +40,7 @@ public class KeyBasedPersistenceTokenServiceTests {
 		service.setServerSecret("MY:SECRET$$$#");
 		service.setServerInteger(Integer.valueOf(454545));
 		try {
-			SecureRandom rnd = (SecureRandom) fb.getObject();
+			SecureRandom rnd = fb.getObject();
 			service.setSecureRandom(rnd);
 			service.afterPropertiesSet();
 		}

+ 1 - 1
core/src/test/java/org/springframework/security/provisioning/JdbcUserDetailsManagerTests.java

@@ -406,7 +406,7 @@ public class JdbcUserDetailsManagerTests {
 		private Map<String, UserDetails> cache = new HashMap<>();
 
 		public UserDetails getUserFromCache(String username) {
-			return (User) cache.get(username);
+			return cache.get(username);
 		}
 
 		public void putUserInCache(UserDetails user) {

+ 1 - 1
crypto/src/main/java/org/springframework/security/crypto/password/LdapShaPasswordEncoder.java

@@ -120,7 +120,7 @@ public class LdapShaPasswordEncoder implements PasswordEncoder {
 			sha.update(salt);
 		}
 
-		byte[] hash = combineHashAndSalt(sha.digest(), (byte[]) salt);
+		byte[] hash = combineHashAndSalt(sha.digest(), salt);
 
 		String prefix;
 

+ 1 - 1
itest/context/src/main/java/org/springframework/security/integration/python/PythonInterpreterPreInvocationAdvice.java

@@ -62,7 +62,7 @@ public class PythonInterpreterPreInvocationAdvice implements
 			throw new IllegalStateException("Python script did not set the permit flag");
 		}
 
-		return (Boolean) Py.tojava(allowed, Boolean.class);
+		return Py.tojava(allowed, Boolean.class);
 	}
 
 	private Map<String, Object> createArgumentMap(MethodInvocation mi) {

+ 1 - 2
ldap/src/integration-test/java/org/springframework/security/ldap/authentication/PasswordComparisonAuthenticatorTests.java

@@ -24,7 +24,6 @@ import org.springframework.security.core.userdetails.UsernameNotFoundException;
 import org.springframework.security.crypto.keygen.KeyGenerators;
 import org.springframework.security.crypto.password.LdapShaPasswordEncoder;
 import org.springframework.security.crypto.password.NoOpPasswordEncoder;
-import org.springframework.security.crypto.password.PasswordEncoder;
 import org.springframework.security.ldap.AbstractLdapIntegrationTests;
 
 import org.springframework.ldap.core.DirContextAdapter;
@@ -122,7 +121,7 @@ public class PasswordComparisonAuthenticatorTests extends AbstractLdapIntegratio
 
 	@Test(expected = IllegalArgumentException.class)
 	public void testPasswordEncoderCantBeNull() {
-		authenticator.setPasswordEncoder((PasswordEncoder) null);
+		authenticator.setPasswordEncoder(null);
 	}
 
 	@Test

+ 1 - 1
ldap/src/main/java/org/springframework/security/ldap/userdetails/LdapUserDetailsManager.java

@@ -274,7 +274,7 @@ public class LdapUserDetailsManager implements UserDetailsManager {
 		ListIterator<ModificationItem> modIt = mods.listIterator();
 
 		while (modIt.hasNext()) {
-			ModificationItem mod = (ModificationItem) modIt.next();
+			ModificationItem mod = modIt.next();
 			Attribute a = mod.getAttribute();
 			if ("objectclass".equalsIgnoreCase(a.getID())) {
 				modIt.remove();

+ 1 - 1
samples/boot/webflux-form/src/integration-test/java/sample/webdriver/IndexPage.java

@@ -38,7 +38,7 @@ public class IndexPage {
 
 	public static <T> T to(WebDriver driver, int port, Class<T> page) {
 		driver.get("http://localhost:" + port +"/");
-		return (T) PageFactory.initElements(driver, page);
+		return PageFactory.initElements(driver, page);
 	}
 
 	public IndexPage assertAt() {

+ 1 - 1
samples/xml/contacts/src/main/java/sample/contact/ContactDaoSpring.java

@@ -102,7 +102,7 @@ public class ContactDaoSpring extends JdbcDaoSupport implements ContactDao {
 			return null;
 		}
 		else {
-			return (Contact) list.get(0);
+			return list.get(0);
 		}
 	}
 

+ 2 - 2
samples/xml/dms/src/main/java/sample/dms/DocumentDaoImpl.java

@@ -112,7 +112,7 @@ public class DocumentDaoImpl extends JdbcDaoSupport implements DocumentDao {
 									.getLong("id")));
 						}
 					});
-			return (AbstractElement[]) directories.toArray(new AbstractElement[] {});
+			return directories.toArray(new AbstractElement[] {});
 		}
 		List<AbstractElement> directories = getJdbcTemplate().query(
 				SELECT_FROM_DIRECTORY, new Object[] { directory.getId() },
@@ -140,7 +140,7 @@ public class DocumentDaoImpl extends JdbcDaoSupport implements DocumentDao {
 				});
 		// Add the File elements after the Directory elements
 		directories.addAll(files);
-		return (AbstractElement[]) directories.toArray(new AbstractElement[] {});
+		return directories.toArray(new AbstractElement[] {});
 	}
 
 	public void update(File file) {

+ 1 - 1
samples/xml/dms/src/main/java/sample/dms/secured/SecureDocumentDaoImpl.java

@@ -48,7 +48,7 @@ public class SecureDocumentDaoImpl extends DocumentDaoImpl implements SecureDocu
 	}
 
 	public String[] getUsers() {
-		return (String[]) getJdbcTemplate().query(SELECT_FROM_USERS,
+		return getJdbcTemplate().query(SELECT_FROM_USERS,
 				new RowMapper<String>() {
 					public String mapRow(ResultSet rs, int rowNumber) throws SQLException {
 						return rs.getString("USERNAME");

+ 2 - 2
test/src/main/java/org/springframework/security/test/web/support/WebTestUtils.java

@@ -122,7 +122,7 @@ public abstract class WebTestUtils {
 		if (springSecurityFilterChain == null) {
 			return null;
 		}
-		List<Filter> filters = (List<Filter>) ReflectionTestUtils
+		List<Filter> filters = ReflectionTestUtils
 				.invokeMethod(springSecurityFilterChain, "getFilters", request);
 		if (filters == null) {
 			return null;
@@ -157,4 +157,4 @@ public abstract class WebTestUtils {
 
 	private WebTestUtils() {
 	}
-}
+}

+ 1 - 1
web/src/main/java/org/springframework/security/web/authentication/preauth/j2ee/WebXmlMappableAttributesRetriever.java

@@ -89,7 +89,7 @@ public class WebXmlMappableAttributesRetriever implements ResourceLoaderAware,
 			NodeList roles = secRoleElt.getElementsByTagName("role-name");
 
 			if (roles.getLength() > 0) {
-				String roleName = ((Element) roles.item(0)).getTextContent().trim();
+				String roleName = roles.item(0).getTextContent().trim();
 				roleNames.add(roleName);
 				logger.info("Retrieved role-name '" + roleName + "' from web.xml");
 			}

+ 1 - 1
web/src/main/java/org/springframework/security/web/authentication/www/DigestAuthenticationEntryPoint.java

@@ -84,7 +84,7 @@ public class DigestAuthenticationEntryPoint implements AuthenticationEntryPoint,
 
 	public void commence(HttpServletRequest request, HttpServletResponse response,
 			AuthenticationException authException) throws IOException, ServletException {
-		HttpServletResponse httpResponse = (HttpServletResponse) response;
+		HttpServletResponse httpResponse = response;
 
 		// compute a nonce (do not use remote IP address due to proxy farms)
 		// format of nonce is:

+ 1 - 1
web/src/main/java/org/springframework/security/web/savedrequest/FastHttpDateFormat.java

@@ -177,7 +177,7 @@ public class FastHttpDateFormat {
 		Long cachedDate = null;
 
 		try {
-			cachedDate = (Long) parseCache.get(value);
+			cachedDate = parseCache.get(value);
 		}
 		catch (Exception ignored) {
 		}

+ 2 - 2
web/src/test/java/org/springframework/security/web/server/DefaultServerRedirectStrategyTests.java

@@ -47,12 +47,12 @@ public class DefaultServerRedirectStrategyTests {
 
 	@Test(expected = IllegalArgumentException.class)
 	public void sendRedirectWhenLocationNullThenException() {
-		this.strategy.sendRedirect(this.exchange, (URI) null);
+		this.strategy.sendRedirect(this.exchange, null);
 	}
 
 	@Test(expected = IllegalArgumentException.class)
 	public void sendRedirectWhenExchangeNullThenException() {
-		this.strategy.sendRedirect((ServerWebExchange) null, this.location);
+		this.strategy.sendRedirect(null, this.location);
 	}
 
 	@Test

+ 1 - 1
web/src/test/java/org/springframework/security/web/server/authentication/RedirectServerAuthenticationEntryPointTests.java

@@ -56,7 +56,7 @@ public class RedirectServerAuthenticationEntryPointTests {
 
 	@Test(expected = IllegalArgumentException.class)
 	public void constructorStringWhenNullLocationThenException() {
-		new RedirectServerAuthenticationEntryPoint((String) null);
+		new RedirectServerAuthenticationEntryPoint(null);
 	}
 
 	@Test

+ 1 - 1
web/src/test/java/org/springframework/security/web/server/authentication/RedirectServerAuthenticationFailureHandlerTests.java

@@ -56,7 +56,7 @@ public class RedirectServerAuthenticationFailureHandlerTests {
 
 	@Test(expected = IllegalArgumentException.class)
 	public void constructorStringWhenNullLocationThenException() {
-		new RedirectServerAuthenticationEntryPoint((String) null);
+		new RedirectServerAuthenticationEntryPoint(null);
 	}
 
 	@Test

+ 1 - 1
web/src/test/java/org/springframework/security/web/server/authorization/HttpStatusServerAccessDeniedHandlerTests.java

@@ -45,7 +45,7 @@ public class HttpStatusServerAccessDeniedHandlerTests {
 
 	@Test(expected = IllegalArgumentException.class)
 	public void constructorHttpStatusWhenNullThenException() {
-		new HttpStatusServerAccessDeniedHandler((HttpStatus) null);
+		new HttpStatusServerAccessDeniedHandler(null);
 	}
 
 	@Test