Browse Source

SEC-562: Sandbox repackaging.

Luke Taylor 18 năm trước cách đây
mục cha
commit
d8497a1642
50 tập tin đã thay đổi với 181 bổ sung186 xóa
  1. 2 2
      sandbox/openid/src/main/java/org/springframework/security/providers/openid/AuthenticationCancelledException.java
  2. 10 10
      sandbox/openid/src/main/java/org/springframework/security/providers/openid/OpenIDAuthenticationProvider.java
  3. 1 1
      sandbox/openid/src/main/java/org/springframework/security/providers/openid/OpenIDAuthenticationStatus.java
  4. 5 5
      sandbox/openid/src/main/java/org/springframework/security/providers/openid/OpenIDAuthenticationToken.java
  5. 1 1
      sandbox/openid/src/main/java/org/springframework/security/ui/openid/OpenIDConstants.java
  6. 2 2
      sandbox/openid/src/main/java/org/springframework/security/ui/openid/OpenIDConsumer.java
  7. 1 1
      sandbox/openid/src/main/java/org/springframework/security/ui/openid/OpenIDConsumerException.java
  8. 2 2
      sandbox/openid/src/main/java/org/springframework/security/ui/openid/OpenIDLoginInitiationServlet.java
  9. 9 9
      sandbox/openid/src/main/java/org/springframework/security/ui/openid/OpenIDResponseProcessingFilter.java
  10. 9 9
      sandbox/openid/src/main/java/org/springframework/security/ui/openid/OpenIdAuthenticationProcessingFilter.java
  11. 2 2
      sandbox/openid/src/main/java/org/springframework/security/ui/openid/OpenIdAuthenticationRequiredException.java
  12. 8 8
      sandbox/openid/src/main/java/org/springframework/security/ui/openid/consumers/JanRainOpenIDConsumer.java
  13. 5 5
      sandbox/openid/src/main/java/org/springframework/security/ui/openid/consumers/OpenId4JavaConsumer.java
  14. 7 7
      sandbox/openid/src/test/java/org/springframework/security/providers/openid/MockAuthoritiesPopulator.java
  15. 13 13
      sandbox/openid/src/test/java/org/springframework/security/providers/openid/OpenIDAuthenticationProviderTests.java
  16. 13 13
      sandbox/openid/src/test/java/org/springframework/security/ui/openid/OpenIDResponseProcessingFilterTests.java
  17. 7 7
      sandbox/openid/src/test/java/org/springframework/security/ui/openid/consumers/MockOpenIDConsumer.java
  18. 1 1
      sandbox/other/src/main/java/org/springframework/security/ldap/ppolicy/AccountLockedException.java
  19. 1 1
      sandbox/other/src/main/java/org/springframework/security/ldap/ppolicy/OracleIDPasswordPolicyControl.java
  20. 1 1
      sandbox/other/src/main/java/org/springframework/security/ldap/ppolicy/PasswordExpiredException.java
  21. 1 1
      sandbox/other/src/main/java/org/springframework/security/ldap/ppolicy/PasswordInHistoryException.java
  22. 1 1
      sandbox/other/src/main/java/org/springframework/security/ldap/ppolicy/PasswordPolicyControl.java
  23. 2 2
      sandbox/other/src/main/java/org/springframework/security/ldap/ppolicy/PasswordPolicyControlFactory.java
  24. 2 2
      sandbox/other/src/main/java/org/springframework/security/ldap/ppolicy/PasswordPolicyException.java
  25. 4 4
      sandbox/other/src/main/java/org/springframework/security/ldap/ppolicy/PasswordPolicyResponseControl.java
  26. 5 7
      sandbox/other/src/main/java/org/springframework/security/providers/ldap/authenticator/OracleIDBindAuthenticator.java
  27. 4 7
      sandbox/other/src/test/java/org/springframework/security/ldap/ppolicy/PasswordPolicyResponseControlTests.java
  28. 3 3
      sandbox/spring-security-config/pom.xml
  29. 6 6
      sandbox/spring-security-config/src/main/resources/org/acegisecurity/config/spring-security-2.0.xsd
  30. 15 15
      sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/applicationContext-acegi-security.xml
  31. 3 3
      sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/authentication-beanRef-attributes.xml
  32. 3 3
      sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/authentication-dao-defaults.xml
  33. 1 1
      sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/authentication-defaults.xml
  34. 1 1
      sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/authentication-form-filter.xml
  35. 1 1
      sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/authentication-innerbeans.xml
  36. 4 4
      sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/authorization-http-config.xml
  37. 1 1
      sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/authorization-method-annotations.xml
  38. 1 1
      sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/authorization-method-aspectj.xml
  39. 1 1
      sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/authorization-method-attributes.xml
  40. 4 4
      sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/authorization-method.xml
  41. 1 1
      sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/auto-config.xml
  42. 3 3
      sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/exception-translation-autodetect-handler.xml
  43. 2 2
      sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/exception-translation-beanref.xml
  44. 4 4
      sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/ldap-config.xml
  45. 1 1
      sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/logout-filter-with-handlers.xml
  46. 1 1
      sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/remember-me-autodetect.xml
  47. 1 1
      sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/remember-me-defaults.xml
  48. 1 1
      sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/session-context-integration-defaults.xml
  49. 2 2
      sandbox/webwork/src/main/java/org/springframework/security/webwork/AcegiDispatcherUtils.java
  50. 2 2
      sandbox/webwork/src/main/java/org/springframework/security/webwork/FilterDispatcher.java

+ 2 - 2
sandbox/openid/src/main/java/org/springframework/security/providers/openid/AuthenticationCancelledException.java

@@ -12,9 +12,9 @@
  * See the License for the specific language governing permissions and
  * limitations under the License.
  */
-package org.acegisecurity.providers.openid;
+package org.springframework.security.providers.openid;
 
-import org.acegisecurity.AuthenticationException;
+import org.springframework.security.AuthenticationException;
 
 
 /**

+ 10 - 10
sandbox/openid/src/main/java/org/springframework/security/providers/openid/OpenIDAuthenticationProvider.java

@@ -12,17 +12,17 @@
  * See the License for the specific language governing permissions and
  * limitations under the License.
  */
-package org.acegisecurity.providers.openid;
+package org.springframework.security.providers.openid;
 
-import org.acegisecurity.Authentication;
-import org.acegisecurity.AuthenticationException;
-import org.acegisecurity.AuthenticationServiceException;
-import org.acegisecurity.BadCredentialsException;
+import org.springframework.security.Authentication;
+import org.springframework.security.AuthenticationException;
+import org.springframework.security.AuthenticationServiceException;
+import org.springframework.security.BadCredentialsException;
 
-import org.acegisecurity.providers.AuthenticationProvider;
-import org.acegisecurity.providers.cas.CasAuthoritiesPopulator;
+import org.springframework.security.providers.AuthenticationProvider;
+import org.springframework.security.providers.cas.CasAuthoritiesPopulator;
 
-import org.acegisecurity.userdetails.UserDetails;
+import org.springframework.security.userdetails.UserDetails;
 
 import org.springframework.beans.factory.InitializingBean;
 
@@ -46,7 +46,7 @@ public class OpenIDAuthenticationProvider implements AuthenticationProvider, Ini
     }
 
     /* (non-Javadoc)
-     * @see org.acegisecurity.providers.AuthenticationProvider#authenticate(org.acegisecurity.Authentication)
+     * @see org.springframework.security.providers.AuthenticationProvider#authenticate(org.springframework.security.Authentication)
      */
     public Authentication authenticate(Authentication authentication)
         throws AuthenticationException {
@@ -97,7 +97,7 @@ public class OpenIDAuthenticationProvider implements AuthenticationProvider, Ini
     }
 
     /* (non-Javadoc)
-     * @see org.acegisecurity.providers.AuthenticationProvider#supports(java.lang.Class)
+     * @see org.springframework.security.providers.AuthenticationProvider#supports(java.lang.Class)
      */
     public boolean supports(Class authentication) {
         return OpenIDAuthenticationToken.class.isAssignableFrom(authentication);

+ 1 - 1
sandbox/openid/src/main/java/org/springframework/security/providers/openid/OpenIDAuthenticationStatus.java

@@ -12,7 +12,7 @@
  * See the License for the specific language governing permissions and
  * limitations under the License.
  */
-package org.acegisecurity.providers.openid;
+package org.springframework.security.providers.openid;
 
 import java.io.ObjectStreamException;
 import java.io.Serializable;

+ 5 - 5
sandbox/openid/src/main/java/org/springframework/security/providers/openid/OpenIDAuthenticationToken.java

@@ -12,11 +12,11 @@
  * See the License for the specific language governing permissions and
  * limitations under the License.
  */
-package org.acegisecurity.providers.openid;
+package org.springframework.security.providers.openid;
 
-import org.acegisecurity.GrantedAuthority;
+import org.springframework.security.GrantedAuthority;
 
-import org.acegisecurity.providers.AbstractAuthenticationToken;
+import org.springframework.security.providers.AbstractAuthenticationToken;
 
 
 /**
@@ -61,7 +61,7 @@ public class OpenIDAuthenticationToken extends AbstractAuthenticationToken {
     //~ Methods ========================================================================================================
 
     /* (non-Javadoc)
-     * @see org.acegisecurity.Authentication#getCredentials()
+     * @see org.springframework.security.Authentication#getCredentials()
      */
     public Object getCredentials() {
         return null;
@@ -76,7 +76,7 @@ public class OpenIDAuthenticationToken extends AbstractAuthenticationToken {
     }
 
     /* (non-Javadoc)
-     * @see org.acegisecurity.Authentication#getPrincipal()
+     * @see org.springframework.security.Authentication#getPrincipal()
      */
     public Object getPrincipal() {
         return identityUrl;

+ 1 - 1
sandbox/openid/src/main/java/org/springframework/security/ui/openid/OpenIDConstants.java

@@ -12,7 +12,7 @@
  * See the License for the specific language governing permissions and
  * limitations under the License.
  */
-package org.acegisecurity.ui.openid;
+package org.springframework.security.ui.openid;
 
 /**
  * Constants required by OpenID classes

+ 2 - 2
sandbox/openid/src/main/java/org/springframework/security/ui/openid/OpenIDConsumer.java

@@ -12,9 +12,9 @@
  * See the License for the specific language governing permissions and
  * limitations under the License.
  */
-package org.acegisecurity.ui.openid;
+package org.springframework.security.ui.openid;
 
-import org.acegisecurity.providers.openid.OpenIDAuthenticationToken;
+import org.springframework.security.providers.openid.OpenIDAuthenticationToken;
 
 import javax.servlet.http.HttpServletRequest;
 

+ 1 - 1
sandbox/openid/src/main/java/org/springframework/security/ui/openid/OpenIDConsumerException.java

@@ -12,7 +12,7 @@
  * See the License for the specific language governing permissions and
  * limitations under the License.
  */
-package org.acegisecurity.ui.openid;
+package org.springframework.security.ui.openid;
 
 /**
  * Thrown by an OpenIDConsumer if it cannot process a request

+ 2 - 2
sandbox/openid/src/main/java/org/springframework/security/ui/openid/OpenIDLoginInitiationServlet.java

@@ -12,7 +12,7 @@
  * See the License for the specific language governing permissions and
  * limitations under the License.
  */
-package org.acegisecurity.ui.openid;
+package org.springframework.security.ui.openid;
 
 import org.apache.commons.logging.Log;
 import org.apache.commons.logging.LogFactory;
@@ -34,7 +34,7 @@ import java.io.IOException;
  * <br/>
  * <br/>        &lt;servlet&gt;
  * <br/>        &nbsp;&nbsp; &lt;servlet-name&gt;openid&lt;/servlet-name&gt;
- * <br/>        &nbsp;&nbsp; &lt;servlet-class&gt;org.acegisecurity.ui.openid.OpenIDLoginInitiationServlet&lt;/servlet-class&gt;
+ * <br/>        &nbsp;&nbsp; &lt;servlet-class&gt;org.springframework.security.ui.openid.OpenIDLoginInitiationServlet&lt;/servlet-class&gt;
  * <br/>        &nbsp;&nbsp; &lt;load-on-startup&gt;1&lt;/load-on-startup&gt;
  * <br/>        &nbsp;&nbsp; &lt;init-param&gt;
  * <br/>        &nbsp;&nbsp;&nbsp;&nbsp; &lt;description&gt;The error page - will receive error "message"&lt;/description&gt;

+ 9 - 9
sandbox/openid/src/main/java/org/springframework/security/ui/openid/OpenIDResponseProcessingFilter.java

@@ -12,16 +12,16 @@
  * See the License for the specific language governing permissions and
  * limitations under the License.
  */
-package org.acegisecurity.ui.openid;
+package org.springframework.security.ui.openid;
 
-import org.acegisecurity.Authentication;
-import org.acegisecurity.AuthenticationException;
-import org.acegisecurity.AuthenticationServiceException;
+import org.springframework.security.Authentication;
+import org.springframework.security.AuthenticationException;
+import org.springframework.security.AuthenticationServiceException;
 
-import org.acegisecurity.providers.openid.OpenIDAuthenticationToken;
+import org.springframework.security.providers.openid.OpenIDAuthenticationToken;
 
-import org.acegisecurity.ui.AbstractProcessingFilter;
-import org.acegisecurity.ui.webapp.AuthenticationProcessingFilter;
+import org.springframework.security.ui.AbstractProcessingFilter;
+import org.springframework.security.ui.webapp.AuthenticationProcessingFilter;
 
 import javax.servlet.http.HttpServletRequest;
 
@@ -40,7 +40,7 @@ public class OpenIDResponseProcessingFilter extends AbstractProcessingFilter {
     //~ Methods ========================================================================================================
 
     /* (non-Javadoc)
-     * @see org.acegisecurity.ui.AbstractProcessingFilter#attemptAuthentication(javax.servlet.http.HttpServletRequest)
+     * @see org.springframework.security.ui.AbstractProcessingFilter#attemptAuthentication(javax.servlet.http.HttpServletRequest)
      * @Override
      */
     public Authentication attemptAuthentication(HttpServletRequest req)
@@ -65,7 +65,7 @@ public class OpenIDResponseProcessingFilter extends AbstractProcessingFilter {
     }
 
     /* (non-Javadoc)
-     * @see org.acegisecurity.ui.AbstractProcessingFilter#getDefaultFilterProcessesUrl()
+     * @see org.springframework.security.ui.AbstractProcessingFilter#getDefaultFilterProcessesUrl()
      * @Override
      */
     public String getDefaultFilterProcessesUrl() {

+ 9 - 9
sandbox/openid/src/main/java/org/springframework/security/ui/openid/OpenIdAuthenticationProcessingFilter.java

@@ -13,15 +13,15 @@
  * limitations under the License.
  */
 
-package org.acegisecurity.ui.openid;
-
-import org.acegisecurity.Authentication;
-import org.acegisecurity.AuthenticationException;
-import org.acegisecurity.AuthenticationServiceException;
-import org.acegisecurity.context.SecurityContextHolder;
-import org.acegisecurity.providers.openid.OpenIDAuthenticationToken;
-import org.acegisecurity.ui.AbstractProcessingFilter;
-import org.acegisecurity.ui.webapp.AuthenticationProcessingFilter;
+package org.springframework.security.ui.openid;
+
+import org.springframework.security.Authentication;
+import org.springframework.security.AuthenticationException;
+import org.springframework.security.AuthenticationServiceException;
+import org.springframework.security.context.SecurityContextHolder;
+import org.springframework.security.providers.openid.OpenIDAuthenticationToken;
+import org.springframework.security.ui.AbstractProcessingFilter;
+import org.springframework.security.ui.webapp.AuthenticationProcessingFilter;
 import org.apache.commons.logging.Log;
 import org.apache.commons.logging.LogFactory;
 import org.springframework.util.StringUtils;

+ 2 - 2
sandbox/openid/src/main/java/org/springframework/security/ui/openid/OpenIdAuthenticationRequiredException.java

@@ -1,6 +1,6 @@
-package org.acegisecurity.ui.openid;
+package org.springframework.security.ui.openid;
 
-import org.acegisecurity.AuthenticationException;
+import org.springframework.security.AuthenticationException;
 
 /**
  * @author Ray Krueger

+ 8 - 8
sandbox/openid/src/main/java/org/springframework/security/ui/openid/consumers/JanRainOpenIDConsumer.java

@@ -12,7 +12,7 @@
  * See the License for the specific language governing permissions and
  * limitations under the License.
  */
-package org.acegisecurity.ui.openid.consumers;
+package org.springframework.security.ui.openid.consumers;
 
 import com.janrain.openid.consumer.AuthRequest;
 import com.janrain.openid.consumer.Consumer;
@@ -21,12 +21,12 @@ import com.janrain.openid.consumer.Response;
 import com.janrain.openid.consumer.StatusCode;
 import com.janrain.openid.store.OpenIDStore;
 
-import org.acegisecurity.providers.openid.OpenIDAuthenticationStatus;
-import org.acegisecurity.providers.openid.OpenIDAuthenticationToken;
+import org.springframework.security.providers.openid.OpenIDAuthenticationStatus;
+import org.springframework.security.providers.openid.OpenIDAuthenticationToken;
 
-import org.acegisecurity.ui.openid.OpenIDConstants;
-import org.acegisecurity.ui.openid.OpenIDConsumer;
-import org.acegisecurity.ui.openid.OpenIDConsumerException;
+import org.springframework.security.ui.openid.OpenIDConstants;
+import org.springframework.security.ui.openid.OpenIDConsumer;
+import org.springframework.security.ui.openid.OpenIDConsumerException;
 
 import org.springframework.beans.factory.InitializingBean;
 
@@ -64,7 +64,7 @@ public class JanRainOpenIDConsumer implements OpenIDConsumer, InitializingBean {
     }
 
     /* (non-Javadoc)
-     * @see org.acegisecurity.ui.openid.OpenIDConsumer#beginConsumption(java.lang.String)
+     * @see org.springframework.security.ui.openid.OpenIDConsumer#beginConsumption(java.lang.String)
      */
     public String beginConsumption(HttpServletRequest req, String identityUrl, String returnToUrl)
         throws OpenIDConsumerException {
@@ -110,7 +110,7 @@ public class JanRainOpenIDConsumer implements OpenIDConsumer, InitializingBean {
     }
 
     /* (non-Javadoc)
-     * @see org.acegisecurity.ui.openid.OpenIDConsumer#endConsumption(javax.servlet.http.HttpServletRequest)
+     * @see org.springframework.security.ui.openid.OpenIDConsumer#endConsumption(javax.servlet.http.HttpServletRequest)
      */
     public OpenIDAuthenticationToken endConsumption(HttpServletRequest req)
         throws OpenIDConsumerException {

+ 5 - 5
sandbox/openid/src/main/java/org/springframework/security/ui/openid/consumers/OpenId4JavaConsumer.java

@@ -12,13 +12,13 @@
  * See the License for the specific language governing permissions and
  * limitations under the License.
  */
-package org.acegisecurity.ui.openid.consumers;
+package org.springframework.security.ui.openid.consumers;
 
-import org.acegisecurity.providers.openid.OpenIDAuthenticationStatus;
-import org.acegisecurity.providers.openid.OpenIDAuthenticationToken;
+import org.springframework.security.providers.openid.OpenIDAuthenticationStatus;
+import org.springframework.security.providers.openid.OpenIDAuthenticationToken;
 
-import org.acegisecurity.ui.openid.OpenIDConsumer;
-import org.acegisecurity.ui.openid.OpenIDConsumerException;
+import org.springframework.security.ui.openid.OpenIDConsumer;
+import org.springframework.security.ui.openid.OpenIDConsumerException;
 
 import org.openid4java.association.AssociationException;
 

+ 7 - 7
sandbox/openid/src/test/java/org/springframework/security/providers/openid/MockAuthoritiesPopulator.java

@@ -12,16 +12,16 @@
  * See the License for the specific language governing permissions and
  * limitations under the License.
  */
-package org.acegisecurity.providers.openid;
+package org.springframework.security.providers.openid;
 
-import org.acegisecurity.AuthenticationException;
-import org.acegisecurity.GrantedAuthority;
-import org.acegisecurity.GrantedAuthorityImpl;
+import org.springframework.security.AuthenticationException;
+import org.springframework.security.GrantedAuthority;
+import org.springframework.security.GrantedAuthorityImpl;
 
-import org.acegisecurity.providers.cas.CasAuthoritiesPopulator;
+import org.springframework.security.providers.cas.CasAuthoritiesPopulator;
 
-import org.acegisecurity.userdetails.User;
-import org.acegisecurity.userdetails.UserDetails;
+import org.springframework.security.userdetails.User;
+import org.springframework.security.userdetails.UserDetails;
 
 
 /**

+ 13 - 13
sandbox/openid/src/test/java/org/springframework/security/providers/openid/OpenIDAuthenticationProviderTests.java

@@ -12,15 +12,15 @@
  * See the License for the specific language governing permissions and
  * limitations under the License.
  */
-package org.acegisecurity.providers.openid;
+package org.springframework.security.providers.openid;
 
 import junit.framework.TestCase;
 
-import org.acegisecurity.Authentication;
-import org.acegisecurity.AuthenticationServiceException;
-import org.acegisecurity.BadCredentialsException;
+import org.springframework.security.Authentication;
+import org.springframework.security.AuthenticationServiceException;
+import org.springframework.security.BadCredentialsException;
 
-import org.acegisecurity.providers.UsernamePasswordAuthenticationToken;
+import org.springframework.security.providers.UsernamePasswordAuthenticationToken;
 
 
 /**
@@ -36,7 +36,7 @@ public class OpenIDAuthenticationProviderTests extends TestCase {
     //~ Methods ========================================================================================================
 
     /*
-     * Test method for 'org.acegisecurity.providers.openid.OpenIDAuthenticationProvider.authenticate(Authentication)'
+     * Test method for 'org.springframework.security.providers.openid.OpenIDAuthenticationProvider.authenticate(Authentication)'
      */
     public void testAuthenticateCancel() {
         OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();
@@ -55,7 +55,7 @@ public class OpenIDAuthenticationProviderTests extends TestCase {
     }
 
     /*
-     * Test method for 'org.acegisecurity.providers.openid.OpenIDAuthenticationProvider.authenticate(Authentication)'
+     * Test method for 'org.springframework.security.providers.openid.OpenIDAuthenticationProvider.authenticate(Authentication)'
      */
     public void testAuthenticateError() {
         OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();
@@ -74,7 +74,7 @@ public class OpenIDAuthenticationProviderTests extends TestCase {
     }
 
     /*
-     * Test method for 'org.acegisecurity.providers.openid.OpenIDAuthenticationProvider.authenticate(Authentication)'
+     * Test method for 'org.springframework.security.providers.openid.OpenIDAuthenticationProvider.authenticate(Authentication)'
      */
     public void testAuthenticateFailure() {
         OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();
@@ -93,7 +93,7 @@ public class OpenIDAuthenticationProviderTests extends TestCase {
     }
 
     /*
-     * Test method for 'org.acegisecurity.providers.openid.OpenIDAuthenticationProvider.authenticate(Authentication)'
+     * Test method for 'org.springframework.security.providers.openid.OpenIDAuthenticationProvider.authenticate(Authentication)'
      */
     public void testAuthenticateSetupNeeded() {
         OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();
@@ -112,7 +112,7 @@ public class OpenIDAuthenticationProviderTests extends TestCase {
     }
 
     /*
-     * Test method for 'org.acegisecurity.providers.openid.OpenIDAuthenticationProvider.authenticate(Authentication)'
+     * Test method for 'org.springframework.security.providers.openid.OpenIDAuthenticationProvider.authenticate(Authentication)'
      */
     public void testAuthenticateSuccess() {
         OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();
@@ -147,7 +147,7 @@ public class OpenIDAuthenticationProviderTests extends TestCase {
     }
 
     /*
-     * Test method for 'org.acegisecurity.providers.openid.OpenIDAuthenticationProvider.supports(Class)'
+     * Test method for 'org.springframework.security.providers.openid.OpenIDAuthenticationProvider.supports(Class)'
      */
     public void testDoesntSupport() {
         OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();
@@ -157,7 +157,7 @@ public class OpenIDAuthenticationProviderTests extends TestCase {
     }
 
     /*
-     * Test method for 'org.acegisecurity.providers.openid.OpenIDAuthenticationProvider.authenticate(Authentication)'
+     * Test method for 'org.springframework.security.providers.openid.OpenIDAuthenticationProvider.authenticate(Authentication)'
      */
     public void testIgnoresUserPassAuthToken() {
         OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();
@@ -168,7 +168,7 @@ public class OpenIDAuthenticationProviderTests extends TestCase {
     }
 
     /*
-     * Test method for 'org.acegisecurity.providers.openid.OpenIDAuthenticationProvider.supports(Class)'
+     * Test method for 'org.springframework.security.providers.openid.OpenIDAuthenticationProvider.supports(Class)'
      */
     public void testSupports() {
         OpenIDAuthenticationProvider provider = new OpenIDAuthenticationProvider();

+ 13 - 13
sandbox/openid/src/test/java/org/springframework/security/ui/openid/OpenIDResponseProcessingFilterTests.java

@@ -12,21 +12,21 @@
  * See the License for the specific language governing permissions and
  * limitations under the License.
  */
-package org.acegisecurity.ui.openid;
+package org.springframework.security.ui.openid;
 
 import junit.framework.TestCase;
 
-import org.acegisecurity.AbstractAuthenticationManager;
-import org.acegisecurity.Authentication;
-import org.acegisecurity.AuthenticationException;
-import org.acegisecurity.BadCredentialsException;
+import org.springframework.security.AbstractAuthenticationManager;
+import org.springframework.security.Authentication;
+import org.springframework.security.AuthenticationException;
+import org.springframework.security.BadCredentialsException;
 
-import org.acegisecurity.providers.cas.CasAuthoritiesPopulator;
-import org.acegisecurity.providers.openid.MockAuthoritiesPopulator;
-import org.acegisecurity.providers.openid.OpenIDAuthenticationStatus;
-import org.acegisecurity.providers.openid.OpenIDAuthenticationToken;
+import org.springframework.security.providers.cas.CasAuthoritiesPopulator;
+import org.springframework.security.providers.openid.MockAuthoritiesPopulator;
+import org.springframework.security.providers.openid.OpenIDAuthenticationStatus;
+import org.springframework.security.providers.openid.OpenIDAuthenticationToken;
 
-import org.acegisecurity.ui.openid.consumers.MockOpenIDConsumer;
+import org.springframework.security.ui.openid.consumers.MockOpenIDConsumer;
 
 import org.springframework.mock.web.MockHttpServletRequest;
 
@@ -44,7 +44,7 @@ public class OpenIDResponseProcessingFilterTests extends TestCase {
     //~ Methods ========================================================================================================
 
     /*
-     * Test method for 'org.acegisecurity.ui.openid.OpenIDResponseProcessingFilter.attemptAuthentication(HttpServletRequest)'
+     * Test method for 'org.springframework.security.ui.openid.OpenIDResponseProcessingFilter.attemptAuthentication(HttpServletRequest)'
      */
     public void testAttemptAuthenticationFailure() {
         // set up mock objects
@@ -70,7 +70,7 @@ public class OpenIDResponseProcessingFilterTests extends TestCase {
     }
 
     /*
-     * Test method for 'org.acegisecurity.ui.openid.OpenIDResponseProcessingFilter.attemptAuthentication(HttpServletRequest)'
+     * Test method for 'org.springframework.security.ui.openid.OpenIDResponseProcessingFilter.attemptAuthentication(HttpServletRequest)'
      */
     public void testAttemptAuthenticationHttpServletRequest() {
         // set up mock objects
@@ -102,7 +102,7 @@ public class OpenIDResponseProcessingFilterTests extends TestCase {
     }
 
     /*
-     * Test method for 'org.acegisecurity.ui.openid.OpenIDResponseProcessingFilter.getDefaultFilterProcessesUrl()'
+     * Test method for 'org.springframework.security.ui.openid.OpenIDResponseProcessingFilter.getDefaultFilterProcessesUrl()'
      */
     public void testGetDefaultFilterProcessesUrl() {
         OpenIDResponseProcessingFilter filter = new OpenIDResponseProcessingFilter();

+ 7 - 7
sandbox/openid/src/test/java/org/springframework/security/ui/openid/consumers/MockOpenIDConsumer.java

@@ -12,12 +12,12 @@
  * See the License for the specific language governing permissions and
  * limitations under the License.
  */
-package org.acegisecurity.ui.openid.consumers;
+package org.springframework.security.ui.openid.consumers;
 
-import org.acegisecurity.providers.openid.OpenIDAuthenticationToken;
+import org.springframework.security.providers.openid.OpenIDAuthenticationToken;
 
-import org.acegisecurity.ui.openid.OpenIDConsumer;
-import org.acegisecurity.ui.openid.OpenIDConsumerException;
+import org.springframework.security.ui.openid.OpenIDConsumer;
+import org.springframework.security.ui.openid.OpenIDConsumerException;
 
 import javax.servlet.http.HttpServletRequest;
 
@@ -36,7 +36,7 @@ public class MockOpenIDConsumer implements OpenIDConsumer {
     //~ Methods ========================================================================================================
 
     /* (non-Javadoc)
-     * @see org.acegisecurity.ui.openid.OpenIDConsumer#beginConsumption(javax.servlet.http.HttpServletRequest, java.lang.String)
+     * @see org.springframework.security.ui.openid.OpenIDConsumer#beginConsumption(javax.servlet.http.HttpServletRequest, java.lang.String)
      */
     public String beginConsumption(HttpServletRequest req, String identityUrl, String returnToUrl)
         throws OpenIDConsumerException {
@@ -44,7 +44,7 @@ public class MockOpenIDConsumer implements OpenIDConsumer {
     }
 
     /* (non-Javadoc)
-     * @see org.acegisecurity.ui.openid.OpenIDConsumer#endConsumption(javax.servlet.http.HttpServletRequest)
+     * @see org.springframework.security.ui.openid.OpenIDConsumer#endConsumption(javax.servlet.http.HttpServletRequest)
      */
     public OpenIDAuthenticationToken endConsumption(HttpServletRequest req)
         throws OpenIDConsumerException {
@@ -61,7 +61,7 @@ public class MockOpenIDConsumer implements OpenIDConsumer {
     }
 
     /* (non-Javadoc)
-     * @see org.acegisecurity.ui.openid.OpenIDConsumer#setReturnToUrl(java.lang.String)
+     * @see org.springframework.security.ui.openid.OpenIDConsumer#setReturnToUrl(java.lang.String)
      */
     public void setReturnToUrl(String returnToUrl) {
         // TODO Auto-generated method stub

+ 1 - 1
sandbox/other/src/main/java/org/springframework/security/ldap/ppolicy/AccountLockedException.java

@@ -1,4 +1,4 @@
-package org.acegisecurity.ldap.ppolicy;
+package org.springframework.security.ldap.ppolicy;
 
 /**
  * @author Luke

+ 1 - 1
sandbox/other/src/main/java/org/springframework/security/ldap/ppolicy/OracleIDPasswordPolicyControl.java

@@ -1,4 +1,4 @@
-package org.acegisecurity.ldap.ppolicy;
+package org.springframework.security.ldap.ppolicy;
 
 /**
  * @author Luke

+ 1 - 1
sandbox/other/src/main/java/org/springframework/security/ldap/ppolicy/PasswordExpiredException.java

@@ -1,4 +1,4 @@
-package org.acegisecurity.ldap.ppolicy;
+package org.springframework.security.ldap.ppolicy;
 
 /**
  * @author Luke

+ 1 - 1
sandbox/other/src/main/java/org/springframework/security/ldap/ppolicy/PasswordInHistoryException.java

@@ -1,4 +1,4 @@
-package org.acegisecurity.ldap.ppolicy;
+package org.springframework.security.ldap.ppolicy;
 
 /**
  * @author Luke

+ 1 - 1
sandbox/other/src/main/java/org/springframework/security/ldap/ppolicy/PasswordPolicyControl.java

@@ -13,7 +13,7 @@
  * limitations under the License.
  */
 
-package org.acegisecurity.ldap.ppolicy;
+package org.springframework.security.ldap.ppolicy;
 
 import javax.naming.ldap.Control;
 

+ 2 - 2
sandbox/other/src/main/java/org/springframework/security/ldap/ppolicy/PasswordPolicyControlFactory.java

@@ -13,9 +13,9 @@
  * limitations under the License.
  */
 
-package org.acegisecurity.ldap.ppolicy;
+package org.springframework.security.ldap.ppolicy;
 
-import org.acegisecurity.ldap.ppolicy.PasswordPolicyControl;
+import org.springframework.security.ldap.ppolicy.PasswordPolicyControl;
 
 import javax.naming.ldap.Control;
 import javax.naming.ldap.ControlFactory;

+ 2 - 2
sandbox/other/src/main/java/org/springframework/security/ldap/ppolicy/PasswordPolicyException.java

@@ -1,6 +1,6 @@
-package org.acegisecurity.ldap.ppolicy;
+package org.springframework.security.ldap.ppolicy;
 
-import org.acegisecurity.AuthenticationException;
+import org.springframework.security.AuthenticationException;
 
 /**
  * @author Luke

+ 4 - 4
sandbox/other/src/main/java/org/springframework/security/ldap/ppolicy/PasswordPolicyResponseControl.java

@@ -13,7 +13,7 @@
  * limitations under the License.
  */
 
-package org.acegisecurity.ldap.ppolicy;
+package org.springframework.security.ldap.ppolicy;
 
 import netscape.ldap.ber.stream.BERChoice;
 import netscape.ldap.ber.stream.BERElement;
@@ -28,8 +28,8 @@ import netscape.ldap.ber.stream.BERSequence;
 import netscape.ldap.ber.stream.BERTag;
 import netscape.ldap.ber.stream.BERTagDecoder;
 
-import org.acegisecurity.ldap.LdapDataAccessException;
-import org.acegisecurity.ldap.ppolicy.PasswordPolicyControl;
+import org.springframework.security.ldap.LdapDataAccessException;
+import org.springframework.security.ldap.ppolicy.PasswordPolicyControl;
 
 import org.apache.commons.logging.Log;
 import org.apache.commons.logging.LogFactory;
@@ -50,7 +50,7 @@ import java.io.InputStream;
  * @author Luke Taylor
  * @version $Id: PasswordPolicyResponseControl.java 1496 2006-05-23 13:38:33Z benalex $
  *
- * @see org.acegisecurity.ldap.ppolicy.PasswordPolicyControl
+ * @see org.springframework.security.ldap.ppolicy.PasswordPolicyControl
  * @see <a href="http://www.ibm.com/developerworks/tivoli/library/t-ldap-controls/">Stefan Zoerner's IBM developerworks
  *      article on LDAP controls.</a>
  */

+ 5 - 7
sandbox/other/src/main/java/org/springframework/security/providers/ldap/authenticator/OracleIDBindAuthenticator.java

@@ -1,11 +1,9 @@
-package org.acegisecurity.providers.ldap.authenticator;
+package org.springframework.security.providers.ldap.authenticator;
 
-import org.acegisecurity.ldap.InitialDirContextFactory;
-import org.acegisecurity.ldap.DefaultInitialDirContextFactory;
-import org.acegisecurity.ldap.ppolicy.PasswordExpiredException;
-import org.acegisecurity.ldap.ppolicy.AccountLockedException;
-import org.acegisecurity.ldap.ppolicy.PasswordPolicyException;
-import org.acegisecurity.ldap.ppolicy.PasswordInHistoryException;
+import org.springframework.security.ldap.InitialDirContextFactory;
+import org.springframework.security.ldap.ppolicy.PasswordExpiredException;
+import org.springframework.security.ldap.ppolicy.AccountLockedException;
+import org.springframework.security.ldap.ppolicy.PasswordPolicyException;
 import org.apache.commons.logging.Log;
 import org.apache.commons.logging.LogFactory;
 

+ 4 - 7
sandbox/other/src/test/java/org/springframework/security/ldap/ppolicy/PasswordPolicyResponseControlTests.java

@@ -13,16 +13,13 @@
  * limitations under the License.
  */
 
-package org.acegisecurity.ldap.ppolicy;
+package org.springframework.security.ldap.ppolicy;
 
 import junit.framework.TestCase;
 
-import javax.naming.Context;
 import javax.naming.NamingException;
 import javax.naming.ldap.InitialLdapContext;
 import javax.naming.ldap.Control;
-import javax.naming.ldap.LdapContext;
-import java.util.Hashtable;
 
 /**
  * Tests for <tt>PasswordPolicyResponse</tt>.
@@ -41,8 +38,8 @@ public class PasswordPolicyResponseControlTests extends TestCase {
 //        env.put(Context.INITIAL_CONTEXT_FACTORY, "com.sun.jndi.ldap.LdapCtxFactory");
 //        env.put(Context.PROVIDER_URL, "ldap://gorille:389/");
 //        env.put(Context.SECURITY_AUTHENTICATION, "simple");
-//        env.put(Context.SECURITY_PRINCIPAL, "cn=manager,dc=acegisecurity,dc=org");
-//        env.put(Context.SECURITY_CREDENTIALS, "acegisecurity");
+//        env.put(Context.SECURITY_PRINCIPAL, "cn=manager,dc=security,dc=org");
+//        env.put(Context.SECURITY_CREDENTIALS, "security");
 //        env.put(LdapContext.CONTROL_FACTORIES, PasswordPolicyControlFactory.class.getName());
 //
 //        InitialLdapContext ctx = new InitialLdapContext(env, null);
@@ -52,7 +49,7 @@ public class PasswordPolicyResponseControlTests extends TestCase {
 //        ctx.setRequestControls(rctls);
 //
 //        try {
-//            ctx.addToEnvironment(Context.SECURITY_PRINCIPAL, "uid=bob,ou=people,dc=acegisecurity,dc=org" );
+//            ctx.addToEnvironment(Context.SECURITY_PRINCIPAL, "uid=bob,ou=people,dc=security,dc=org" );
 //            ctx.addToEnvironment(Context.SECURITY_CREDENTIALS, "bobspassword");
 //            Object o = ctx.lookup("");
 //

+ 3 - 3
sandbox/spring-security-config/pom.xml

@@ -2,18 +2,18 @@
 <project>
 	<parent>
 		<artifactId>acegi-security-sandbox</artifactId>
-		<groupId>org.acegisecurity</groupId>
+		<groupId>org.springframework.security</groupId>
 		<version>2.0-SNAPSHOT</version>
 	</parent>
 	<modelVersion>4.0.0</modelVersion>
-	<groupId>org.acegisecurity</groupId>
+	<groupId>org.springframework.security</groupId>
 	<artifactId>spring-security-config</artifactId>
 	<name>spring-security-config</name>
 	<version>2.0.0-SNAPSHOT</version>
 	<url>http://maven.apache.org</url>
 	<dependencies>
 		<dependency>
-			<groupId>org.acegisecurity</groupId>
+			<groupId>org.springframework.security</groupId>
 			<artifactId>acegi-security-tiger</artifactId>
 			<version>1.0.6-SNAPSHOT</version>
 		</dependency>

+ 6 - 6
sandbox/spring-security-config/src/main/resources/org/acegisecurity/config/spring-security-2.0.xsd

@@ -91,7 +91,7 @@
 		type="RememberMeFilter">
 		<xsd:annotation>
 			<xsd:documentation
-				source="org.acegisecurity.ui.rememberme.RememberMeProcessingFilter">
+				source="org.springframework.security.ui.rememberme.RememberMeProcessingFilter">
 				<![CDATA[
 	makes the filter, but does little else, as it auto-detects everything
 				]]>
@@ -243,10 +243,10 @@
 		type="AuthenticationManager">
 		<xsd:annotation>
 			<xsd:documentation
-				source="org.acegisecurity.providers.ProviderManager">
+				source="org.springframework.security.providers.ProviderManager">
 				<![CDATA[
-				Resolves to 'org.acegisecurity.providers.ProviderManager'
-				]]>
+				Resolves to 'org.springframework.security.providers.ProviderManager'
+                                                ]]>
 			</xsd:documentation>
 		</xsd:annotation>
 	</xsd:element>
@@ -272,7 +272,7 @@
 	<xsd:element name="authentication-jdbc">
 		<xsd:annotation>
 			<xsd:documentation
-				source="org.acegisecurity.providers.dao.DaoAuthenticationProvider">
+				source="org.springframework.security.providers.dao.DaoAuthenticationProvider">
 				<![CDATA[
 				if not specified will be auto-tetected from the ApplicationContext and tried in order 
 				]]>
@@ -286,7 +286,7 @@
 	<xsd:element name="authentication-ldap">
 		<xsd:annotation>
 			<xsd:documentation
-				source="org.acegisecurity.providers.ldap.LdapAuthenticationProvider">
+				source="org.springframework.security.providers.ldap.LdapAuthenticationProvider">
 				<![CDATA[
 				if not specified will be auto-tetected from the ApplicationContext and tried in order 
 				]]>

+ 15 - 15
sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/applicationContext-acegi-security.xml

@@ -23,7 +23,7 @@
 
 
 	<bean id="filterChainProxy"
-		class="org.acegisecurity.util.FilterChainProxy">
+		class="org.springframework.security.util.FilterChainProxy">
 		<property name="filterInvocationDefinitionSource">
 			<value>
 				CONVERT_URL_TO_LOWERCASE_BEFORE_COMPARISON
@@ -48,7 +48,7 @@
 
 
 	<bean id="securityContextLogoutHandler"
-		class="org.acegisecurity.ui.logout.SecurityContextLogoutHandler" />
+		class="org.springframework.security.ui.logout.SecurityContextLogoutHandler" />
 
 	<!--  the URLs are all mandatory and have no defaults (well, except authenticationUrl) -->
 	<security:authentication-form id="authenticationProcessingFilter"
@@ -72,14 +72,14 @@
 
 
 	<bean id="securityContextHolderAwareRequestFilter"
-		class="org.acegisecurity.wrapper.SecurityContextHolderAwareRequestFilter" />
+		class="org.springframework.security.wrapper.SecurityContextHolderAwareRequestFilter" />
 
 	<!-- makes the filter, but does little else, as it auto-detects everything -->
 	<security:authentication-remember-me-filter
 		id="rememberMeProcessingFilter" />
 
 	<bean id="anonymousProcessingFilter"
-		class="org.acegisecurity.providers.anonymous.AnonymousProcessingFilter">
+		class="org.springframework.security.providers.anonymous.AnonymousProcessingFilter">
 		<property name="key" value="changeThis" />
 		<property name="userAttribute"
 			value="anonymousUser,ROLE_ANONYMOUS" />
@@ -95,31 +95,31 @@
 
 
 	<bean id="authenticationEntryPoint"
-		class="org.acegisecurity.ui.webapp.AuthenticationProcessingFilterEntryPoint">
+		class="org.springframework.security.ui.webapp.AuthenticationProcessingFilterEntryPoint">
 		<property name="loginFormUrl" value="/acegilogin.jsp" />
 		<property name="forceHttps" value="false" />
 	</bean>
 
 
 	<bean id="accessDeniedHandler"
-		class="org.acegisecurity.ui.AccessDeniedHandlerImpl">
+		class="org.springframework.security.ui.AccessDeniedHandlerImpl">
 		<property name="errorPage" value="/accessDenied.jsp" />
 	</bean>
 
 
 	<bean id="filterInvocationInterceptor"
-		class="org.acegisecurity.intercept.web.FilterSecurityInterceptor">
+		class="org.springframework.security.intercept.web.FilterSecurityInterceptor">
 		<property name="authenticationManager"
 			ref="authenticationManager" />
 		<property name="accessDecisionManager">
-			<bean class="org.acegisecurity.vote.AffirmativeBased">
+			<bean class="org.springframework.security.vote.AffirmativeBased">
 				<property name="allowIfAllAbstainDecisions"
 					value="false" />
 				<property name="decisionVoters">
 					<list>
-						<bean class="org.acegisecurity.vote.RoleVoter" />
+						<bean class="org.springframework.security.vote.RoleVoter" />
 						<bean
-							class="org.acegisecurity.vote.AuthenticatedVoter" />
+							class="org.springframework.security.vote.AuthenticatedVoter" />
 					</list>
 				</property>
 			</bean>
@@ -137,16 +137,16 @@
 
 
 	<!--<bean id="authenticationManager"
-		class="org.acegisecurity.providers.ProviderManager">
+		class="org.springframework.security.providers.ProviderManager">
 		<property name="providers">
 		<list>
 		<ref local="daoAuthenticationProvider" />
 		<bean
-		class="org.acegisecurity.providers.anonymous.AnonymousAuthenticationProvider">
+		class="org.springframework.security.providers.anonymous.AnonymousAuthenticationProvider">
 		<property name="key" value="changeThis" />
 		</bean>
 		<bean
-		class="org.acegisecurity.providers.rememberme.RememberMeAuthenticationProvider">
+		class="org.springframework.security.providers.rememberme.RememberMeAuthenticationProvider">
 		<property name="key" value="changeThis" />
 		</bean>
 		</list>
@@ -154,7 +154,7 @@
 		</bean>-->
 
 	<bean id="userCache"
-		class="org.acegisecurity.providers.dao.cache.EhCacheBasedUserCache">
+		class="org.springframework.security.providers.dao.cache.EhCacheBasedUserCache">
 		<property name="cache">
 			<bean
 				class="org.springframework.cache.ehcache.EhCacheFactoryBean">
@@ -169,6 +169,6 @@
 
 	<!-- This bean is optional; it isn't used by any other bean as it only listens and logs -->
 	<bean id="loggerListener"
-		class="org.acegisecurity.event.authentication.LoggerListener" />
+		class="org.springframework.security.event.authentication.LoggerListener" />
 
 </beans>

+ 3 - 3
sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/authentication-beanRef-attributes.xml

@@ -15,7 +15,7 @@
 	</security:authentication-repository>
 
 	<bean id="refToUserDetailsService"
-		class="org.acegisecurity.userdetails.jdbc.JdbcDaoImpl">
+		class="org.springframework.security.userdetails.jdbc.JdbcDaoImpl">
 		<property name="dataSource">
 			<ref bean="dataSource" />
 		</property>
@@ -39,13 +39,13 @@
 	</bean>
 	
 	<bean id="refToSaltSource"
-		class="org.acegisecurity.providers.dao.salt.SystemWideSaltSource">
+		class="org.springframework.security.providers.dao.salt.SystemWideSaltSource">
 		<property name="systemWideSalt">
 			<value>12345</value>
 		</property>
 	</bean>
 
 	<bean id="refToPasswordEncoder"
-		class="org.acegisecurity.providers.encoding.Md5PasswordEncoder" />
+		class="org.springframework.security.providers.encoding.Md5PasswordEncoder" />
 	
 </beans>

+ 3 - 3
sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/authentication-dao-defaults.xml

@@ -19,7 +19,7 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
 	</security:authentication-repository>
 
 	<bean id="userDetailsService"
-		class="org.acegisecurity.userdetails.jdbc.JdbcDaoImpl">
+		class="org.springframework.security.userdetails.jdbc.JdbcDaoImpl">
 		<property name="dataSource">
 			<ref bean="dataSource" />
 		</property>
@@ -43,12 +43,12 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
 	</bean>
 
 	<bean id="saltSource"
-		class="org.acegisecurity.providers.dao.salt.SystemWideSaltSource">
+		class="org.springframework.security.providers.dao.salt.SystemWideSaltSource">
 		<property name="systemWideSalt">
 			<value>12345</value>
 		</property>
 	</bean>
 
 	<bean id="passwordEncoder"
-		class="org.acegisecurity.providers.encoding.Md5PasswordEncoder" />
+		class="org.springframework.security.providers.encoding.Md5PasswordEncoder" />
 </beans>

+ 1 - 1
sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/authentication-defaults.xml

@@ -14,7 +14,7 @@
 	<security:authentication-repository id="authenticationRepository"/>
 
 	<bean id="userDetailsService"
-		class="org.acegisecurity.userdetails.jdbc.JdbcDaoImpl">
+		class="org.springframework.security.userdetails.jdbc.JdbcDaoImpl">
 		<property name="dataSource">
 			<ref bean="dataSource" />
 		</property>

+ 1 - 1
sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/authentication-form-filter.xml

@@ -29,7 +29,7 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
 		id="rememberMeServices" key="someValue" />
 
 	<bean id="userDetailsService"
-		class="org.acegisecurity.userdetails.jdbc.JdbcDaoImpl">
+		class="org.springframework.security.userdetails.jdbc.JdbcDaoImpl">
 		<property name="dataSource">
 			<ref bean="dataSource" />
 		</property>

+ 1 - 1
sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/authentication-innerbeans.xml

@@ -24,7 +24,7 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
 	</security:authentication-repository>
 
 	<bean id="AnyBeanIdAsThisBeanWillBeAutoDetectedAndInjectedInauthenticationRepositoryUsingAutoWireByType"
-		class="org.acegisecurity.userdetails.jdbc.JdbcDaoImpl">
+		class="org.springframework.security.userdetails.jdbc.JdbcDaoImpl">
 		<property name="dataSource">
 			<ref bean="dataSource" />
 		</property>

+ 4 - 4
sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/authorization-http-config.xml

@@ -29,18 +29,18 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
 
 
 	<!--<bean id="filterInvocationInterceptor"
-		class="org.acegisecurity.intercept.web.FilterSecurityInterceptor">
+		class="org.springframework.security.intercept.web.FilterSecurityInterceptor">
 		<property name="authenticationManager"
 		ref="authenticationManager" />
 		<property name="accessDecisionManager">
-		<bean class="org.acegisecurity.vote.AffirmativeBased">
+		<bean class="org.springframework.security.vote.AffirmativeBased">
 		<property name="allowIfAllAbstainDecisions"
 		value="false" />
 		<property name="decisionVoters">
 		<list>
-		<bean class="org.acegisecurity.vote.RoleVoter" />
+		<bean class="org.springframework.security.vote.RoleVoter" />
 		<bean
-		class="org.acegisecurity.vote.AuthenticatedVoter" />
+		class="org.springframework.security.vote.AuthenticatedVoter" />
 		</list>
 		</property>
 		</bean>

+ 1 - 1
sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/authorization-method-annotations.xml

@@ -30,7 +30,7 @@
 		springAop="true" >
 		<security:url-mapping source="annotations">
 			<security:method-pattern
-				type="org.acegisecurity.BankServiceImpl.listAccounts">
+				type="org.springframework.security.BankServiceImpl.listAccounts">
 				<security:configuration-attribute attribute="ROLE_A" />
 				<security:configuration-attribute attribute="ROLE_B" />
 			</security:method-pattern>

+ 1 - 1
sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/authorization-method-aspectj.xml

@@ -30,7 +30,7 @@
 		aspectj="true" >
 		<security:url-mapping source="annotations">
 			<security:method-pattern
-				type="org.acegisecurity.BankServiceImpl.listAccounts">
+				type="org.springframework.security.BankServiceImpl.listAccounts">
 				<security:configuration-attribute attribute="ROLE_A" />
 				<security:configuration-attribute attribute="ROLE_B" />
 			</security:method-pattern>

+ 1 - 1
sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/authorization-method-attributes.xml

@@ -30,7 +30,7 @@
 		springAop="true" >
 		<security:url-mapping source="attributes">
 			<security:method-pattern
-				type="org.acegisecurity.BankServiceImpl.listAccounts">
+				type="org.springframework.security.BankServiceImpl.listAccounts">
 				<security:configuration-attribute attribute="ROLE_A" />
 				<security:configuration-attribute attribute="ROLE_B" />
 			</security:method-pattern>

+ 4 - 4
sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/authorization-method.xml

@@ -30,7 +30,7 @@
 		springAop="true" >
 		<security:url-mapping source="xml">
 			<security:method-pattern
-				type="org.acegisecurity.BankServiceImpl.listAccounts">
+				type="org.springframework.security.BankServiceImpl.listAccounts">
 				<security:configuration-attribute attribute="ROLE_A" />
 			</security:method-pattern>
 		</security:url-mapping>
@@ -38,7 +38,7 @@
 
 
 	<!-- 
-		<bean id="methodSecurity" class="org.acegisecurity.intercept.method.aopalliance.MethodSecurityInterceptor">
+		<bean id="methodSecurity" class="org.springframework.security.intercept.method.aopalliance.MethodSecurityInterceptor">
 		<property name="validateConfigAttributes"><value>true</value></property>
 		<property name="authenticationManager"><ref bean="authenticationManager"/></property>
 		<property name="accessDecisionManager"><ref bean="accessDecisionManager"/></property>
@@ -46,8 +46,8 @@
 		<property name="afterInvocationManager"><ref bean="afterInvocationManager"/></property>
 		<property name="objectDefinitionSource">
 		<value>
-		org.acegisecurity.context.BankManager.delete*=ROLE_SUPERVISOR,RUN_AS_SERVER
-		org.acegisecurity.context.BankManager.getBalance=ROLE_TELLER,ROLE_SUPERVISOR,BANKSECURITY_CUSTOMER,RUN_AS_SERVER
+		org.springframework.security.context.BankManager.delete*=ROLE_SUPERVISOR,RUN_AS_SERVER
+		org.springframework.security.context.BankManager.getBalance=ROLE_TELLER,ROLE_SUPERVISOR,BANKSECURITY_CUSTOMER,RUN_AS_SERVER
 		</value>
 		</property>
 		</bean> 

+ 1 - 1
sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/auto-config.xml

@@ -26,7 +26,7 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
 			resource="classpath:org/acegisecurity/config/user.properties" />
 	</security:principal-repository>
 	
-	<bean id="bankService" class="org.acegisecurity.BankServiceImpl"/>
+	<bean id="bankService" class="org.springframework.security.BankServiceImpl"/>
 	
 	
 </beans>

+ 3 - 3
sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/exception-translation-autodetect-handler.xml

@@ -20,17 +20,17 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
 	</security:exception-translation>
 
 	<bean id="theBeanToUse"
-		class="org.acegisecurity.ui.AccessDeniedHandlerImpl">
+		class="org.springframework.security.ui.AccessDeniedHandlerImpl">
 		<property name="errorPage" value="/accessDenied.jsp" />
 	</bean>
 
 	<!--<bean id="anotherBeanToUse"
-		class="org.acegisecurity.ui.AccessDeniedHandlerImpl">
+		class="org.springframework.security.ui.AccessDeniedHandlerImpl">
 		<property name="errorPage" value="/accessDenied.jsp" />
 		</bean>-->
 		
 	<bean id="authenticationProcessingFilterEntryPoint"
-		class="org.acegisecurity.ui.webapp.AuthenticationProcessingFilterEntryPoint">
+		class="org.springframework.security.ui.webapp.AuthenticationProcessingFilterEntryPoint">
 		<property name="loginFormUrl">
 			<value>/acegilogin.jsp</value>
 		</property>

+ 2 - 2
sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/exception-translation-beanref.xml

@@ -22,12 +22,12 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
 	</security:exception-translation>
 
 	<bean id="theBeanToUse"
-		class="org.acegisecurity.ui.AccessDeniedHandlerImpl">
+		class="org.springframework.security.ui.AccessDeniedHandlerImpl">
 		<property name="errorPage" value="/accessDenied.jsp" />
 	</bean>
 
 	<bean id="authenticationProcessingFilterEntryPoint"
-		class="org.acegisecurity.ui.webapp.AuthenticationProcessingFilterEntryPoint">
+		class="org.springframework.security.ui.webapp.AuthenticationProcessingFilterEntryPoint">
 		<property name="loginFormUrl">
 			<value>/acegilogin.jsp</value>
 		</property>

+ 4 - 4
sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/ldap-config.xml

@@ -27,7 +27,7 @@
 
 
 	<!--<bean id="initialDirContextFactory"
-		class="org.acegisecurity.ldap.DefaultInitialDirContextFactory">
+		class="org.springframework.security.ldap.DefaultInitialDirContextFactory">
 		<constructor-arg
 		value="ldap://monkeymachine:389/dc=acegisecurity,dc=org" />
 		<property name="managerDn">
@@ -39,10 +39,10 @@
 		</bean>
 		
 		<bean id="ldapAuthProvider"
-		class="org.acegisecurity.providers.ldap.LdapAuthenticationProvider">
+		class="org.springframework.security.providers.ldap.LdapAuthenticationProvider">
 		<constructor-arg>
 		<bean
-		class="org.acegisecurity.providers.ldap.authenticator.BindAuthenticator">
+		class="org.springframework.security.providers.ldap.authenticator.BindAuthenticator">
 		<constructor-arg>
 		<ref local="initialDirContextFactory" />
 		</constructor-arg>
@@ -55,7 +55,7 @@
 		</constructor-arg>
 		<constructor-arg>
 		<bean
-		class="org.acegisecurity.providers.ldap.populator.DefaultLdapAuthoritiesPopulator">
+		class="org.springframework.security.providers.ldap.populator.DefaultLdapAuthoritiesPopulator">
 		<constructor-arg>
 		<ref local="initialDirContextFactory" />
 		</constructor-arg>

+ 1 - 1
sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/logout-filter-with-handlers.xml

@@ -21,7 +21,7 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
 		id="rememberMeServices" key="someValue" />
 
 	<bean id="SecurityContextLogoutHandler"
-		class="org.acegisecurity.ui.logout.SecurityContextLogoutHandler" />
+		class="org.springframework.security.ui.logout.SecurityContextLogoutHandler" />
 
 	<security:principal-repository id="userDetailsService">
 		<security:user-definition username="vishal"

+ 1 - 1
sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/remember-me-autodetect.xml

@@ -37,7 +37,7 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
 	<security:authentication-repository id="authenticationRepository" />
 
 	<bean id="userDetailsService"
-		class="org.acegisecurity.userdetails.jdbc.JdbcDaoImpl">
+		class="org.springframework.security.userdetails.jdbc.JdbcDaoImpl">
 		<property name="dataSource">
 			<ref bean="dataSource" />
 		</property>

+ 1 - 1
sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/remember-me-defaults.xml

@@ -38,7 +38,7 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
 	<security:authentication-repository id="authenticationRepository" />
 
 	<bean id="userDetailsService"
-		class="org.acegisecurity.userdetails.jdbc.JdbcDaoImpl">
+		class="org.springframework.security.userdetails.jdbc.JdbcDaoImpl">
 		<property name="dataSource">
 			<ref bean="dataSource" />
 		</property>

+ 1 - 1
sandbox/spring-security-config/src/test/resources/org/acegisecurity/config/session-context-integration-defaults.xml

@@ -36,7 +36,7 @@
 		 same story here, inner beans allowed 
 	</security:authentication-repository>
 	
-	<bean id="userDetails" class="org.acegisecurity.userdetails.jdbc.JdbcDaoImpl">
+	<bean id="userDetails" class="org.springframework.security.userdetails.jdbc.JdbcDaoImpl">
       <property name="dataSource"><ref bean="dataSource"/></property>
     </bean>
     

+ 2 - 2
sandbox/webwork/src/main/java/org/springframework/security/webwork/AcegiDispatcherUtils.java

@@ -12,7 +12,7 @@
  * See the License for the specific language governing permissions and
  * limitations under the License.
  */
-package org.acegisecurity.webwork;
+package org.springframework.security.webwork;
 
 import java.util.Map;
 
@@ -21,7 +21,7 @@ import javax.servlet.ServletException;
 import javax.servlet.http.HttpServletRequest;
 import javax.servlet.http.HttpServletResponse;
 
-import org.acegisecurity.ui.ExceptionTranslationFilter;
+import org.springframework.security.ui.ExceptionTranslationFilter;
 import org.apache.commons.logging.Log;
 import org.apache.commons.logging.LogFactory;
 

+ 2 - 2
sandbox/webwork/src/main/java/org/springframework/security/webwork/FilterDispatcher.java

@@ -12,12 +12,12 @@
  * See the License for the specific language governing permissions and
  * limitations under the License.
  */
-package org.acegisecurity.webwork;
+package org.springframework.security.webwork;
 
 import javax.servlet.FilterConfig;
 import javax.servlet.ServletException;
 
-import org.acegisecurity.ui.ExceptionTranslationFilter;
+import org.springframework.security.ui.ExceptionTranslationFilter;
 
 import com.opensymphony.webwork.dispatcher.DispatcherUtils;