Skip to content

Commit 85a4c94

Browse files
committed
Merge branch '2.7.x'
2 parents 3987dec + b406971 commit 85a4c94

File tree

7 files changed

+42
-42
lines changed

7 files changed

+42
-42
lines changed

spring-boot-project/spring-boot-actuator-autoconfigure/src/test/java/org/springframework/boot/actuate/autoconfigure/security/servlet/ManagementWebSecurityAutoConfigurationTests.java

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -136,10 +136,10 @@ void backOffIfOAuth2ResourceServerAutoConfigurationPresent() {
136136
void backOffIfSaml2RelyingPartyAutoConfigurationPresent() {
137137
this.contextRunner.withConfiguration(AutoConfigurations.of(Saml2RelyingPartyAutoConfiguration.class))
138138
.withPropertyValues(
139-
"spring.security.saml2.relyingparty.registration.simplesamlphp.asserting-party.single-sign-on.url=https://simplesaml-for-spring-saml/SSOService.php",
140-
"spring.security.saml2.relyingparty.registration.simplesamlphp.asserting-party.single-sign-on.sign-request=false",
141-
"spring.security.saml2.relyingparty.registration.simplesamlphp.asserting-party.entity-id=https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/metadata.php",
142-
"spring.security.saml2.relyingparty.registration.simplesamlphp.asserting-party.verification.credentials[0].certificate-location=classpath:saml/certificate-location")
139+
"spring.security.saml2.relyingparty.registration.simplesamlphp.assertingparty.single-sign-on.url=https://simplesaml-for-spring-saml/SSOService.php",
140+
"spring.security.saml2.relyingparty.registration.simplesamlphp.assertingparty.single-sign-on.sign-request=false",
141+
"spring.security.saml2.relyingparty.registration.simplesamlphp.assertingparty.entity-id=https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/metadata.php",
142+
"spring.security.saml2.relyingparty.registration.simplesamlphp.assertingparty.verification.credentials[0].certificate-location=classpath:saml/certificate-location")
143143
.run((context) -> assertThat(context).doesNotHaveBean(ManagementWebSecurityAutoConfiguration.class)
144144
.doesNotHaveBean(MANAGEMENT_SECURITY_FILTER_CHAIN_BEAN));
145145
}

spring-boot-project/spring-boot-autoconfigure/src/main/java/org/springframework/boot/autoconfigure/security/saml2/Saml2RelyingPartyProperties.java

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ public static class Registration {
6868
/**
6969
* Remote SAML Identity Provider.
7070
*/
71-
private final AssertingParty assertingParty = new AssertingParty();
71+
private final AssertingParty assertingparty = new AssertingParty();
7272

7373
public String getEntityId() {
7474
return this.entityId;
@@ -90,8 +90,8 @@ public Decryption getDecryption() {
9090
return this.decryption;
9191
}
9292

93-
public AssertingParty getAssertingParty() {
94-
return this.assertingParty;
93+
public AssertingParty getAssertingparty() {
94+
return this.assertingparty;
9595
}
9696

9797
public static class Acs {

spring-boot-project/spring-boot-autoconfigure/src/main/java/org/springframework/boot/autoconfigure/security/saml2/Saml2RelyingPartyRegistrationConfiguration.java

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -73,19 +73,19 @@ private RelyingPartyRegistration asRegistration(Map.Entry<String, Registration>
7373
}
7474

7575
private RelyingPartyRegistration asRegistration(String id, Registration properties) {
76-
boolean usingMetadata = StringUtils.hasText(properties.getAssertingParty().getMetadataUri());
76+
boolean usingMetadata = StringUtils.hasText(properties.getAssertingparty().getMetadataUri());
7777
Builder builder = (usingMetadata) ? RelyingPartyRegistrations
78-
.fromMetadataLocation(properties.getAssertingParty().getMetadataUri()).registrationId(id)
78+
.fromMetadataLocation(properties.getAssertingparty().getMetadataUri()).registrationId(id)
7979
: RelyingPartyRegistration.withRegistrationId(id);
8080
builder.assertionConsumerServiceLocation(properties.getAcs().getLocation());
8181
builder.assertionConsumerServiceBinding(properties.getAcs().getBinding());
82-
builder.assertingPartyDetails(mapAssertingParty(properties.getAssertingParty(), usingMetadata));
82+
builder.assertingPartyDetails(mapAssertingParty(properties.getAssertingparty(), usingMetadata));
8383
builder.signingX509Credentials((credentials) -> properties.getSigning().getCredentials().stream()
8484
.map(this::asSigningCredential).forEach(credentials::add));
8585
builder.decryptionX509Credentials((credentials) -> properties.getDecryption().getCredentials().stream()
8686
.map(this::asDecryptionCredential).forEach(credentials::add));
8787
builder.assertingPartyDetails((details) -> details
88-
.verificationX509Credentials((credentials) -> properties.getAssertingParty().getVerification()
88+
.verificationX509Credentials((credentials) -> properties.getAssertingparty().getVerification()
8989
.getCredentials().stream().map(this::asVerificationCredential).forEach(credentials::add)));
9090
builder.entityId(properties.getEntityId());
9191
RelyingPartyRegistration registration = builder.build();

spring-boot-project/spring-boot-autoconfigure/src/test/java/org/springframework/boot/autoconfigure/security/saml2/Saml2RelyingPartyAutoConfigurationTests.java

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@ void autoconfigurationShouldQueryAssertingPartyMetadataWhenMetadataUrlIsPresent(
126126
server.start();
127127
String metadataUrl = server.url("").toString();
128128
setupMockResponse(server, new ClassPathResource("saml/idp-metadata"));
129-
this.contextRunner.withPropertyValues(PREFIX + ".foo.asserting-party.metadata-uri=" + metadataUrl)
129+
this.contextRunner.withPropertyValues(PREFIX + ".foo.assertingparty.metadata-uri=" + metadataUrl)
130130
.run((context) -> {
131131
assertThat(context).hasSingleBean(RelyingPartyRegistrationRepository.class);
132132
assertThat(server.getRequestCount()).isEqualTo(1);
@@ -140,7 +140,7 @@ void autoconfigurationShouldUseBindingFromMetadataUrlIfPresent() throws Exceptio
140140
server.start();
141141
String metadataUrl = server.url("").toString();
142142
setupMockResponse(server, new ClassPathResource("saml/idp-metadata"));
143-
this.contextRunner.withPropertyValues(PREFIX + ".foo.asserting-party.metadata-uri=" + metadataUrl)
143+
this.contextRunner.withPropertyValues(PREFIX + ".foo.assertingparty.metadata-uri=" + metadataUrl)
144144
.run((context) -> {
145145
RelyingPartyRegistrationRepository repository = context
146146
.getBean(RelyingPartyRegistrationRepository.class);
@@ -157,8 +157,8 @@ void autoconfigurationWhenMetadataUrlAndPropertyPresentShouldUseBindingFromPrope
157157
server.start();
158158
String metadataUrl = server.url("").toString();
159159
setupMockResponse(server, new ClassPathResource("saml/idp-metadata"));
160-
this.contextRunner.withPropertyValues(PREFIX + ".foo.asserting-party.metadata-uri=" + metadataUrl,
161-
PREFIX + ".foo.asserting-party.singlesignon.binding=redirect").run((context) -> {
160+
this.contextRunner.withPropertyValues(PREFIX + ".foo.assertingparty.metadata-uri=" + metadataUrl,
161+
PREFIX + ".foo.assertingparty.singlesignon.binding=redirect").run((context) -> {
162162
RelyingPartyRegistrationRepository repository = context
163163
.getBean(RelyingPartyRegistrationRepository.class);
164164
RelyingPartyRegistration registration = repository.findByRegistrationId("foo");
@@ -216,19 +216,19 @@ void samlLoginShouldShouldBeConditionalOnSecurityWebFilterClass() {
216216

217217
private String[] getPropertyValuesWithoutSigningCredentials(boolean signRequests) {
218218
return new String[] { PREFIX
219-
+ ".foo.asserting-party.singlesignon.url=https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/SSOService.php",
220-
PREFIX + ".foo.asserting-party.singlesignon.binding=post",
221-
PREFIX + ".foo.asserting-party.singlesignon.sign-request=" + signRequests,
222-
PREFIX + ".foo.asserting-party.entity-id=https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/metadata.php",
223-
PREFIX + ".foo.asserting-party.verification.credentials[0].certificate-location=classpath:saml/certificate-location" };
219+
+ ".foo.assertingparty.singlesignon.url=https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/SSOService.php",
220+
PREFIX + ".foo.assertingparty.singlesignon.binding=post",
221+
PREFIX + ".foo.assertingparty.singlesignon.sign-request=" + signRequests,
222+
PREFIX + ".foo.assertingparty.entity-id=https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/metadata.php",
223+
PREFIX + ".foo.assertingparty.verification.credentials[0].certificate-location=classpath:saml/certificate-location" };
224224
}
225225

226226
private String[] getPropertyValuesWithoutSsoBinding() {
227227
return new String[] { PREFIX
228-
+ ".foo.asserting-party.singlesignon.url=https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/SSOService.php",
229-
PREFIX + ".foo.asserting-party.singlesignon.sign-request=false",
230-
PREFIX + ".foo.asserting-party.entity-id=https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/metadata.php",
231-
PREFIX + ".foo.asserting-party.verification.credentials[0].certificate-location=classpath:saml/certificate-location" };
228+
+ ".foo.assertingparty.singlesignon.url=https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/SSOService.php",
229+
PREFIX + ".foo.assertingparty.singlesignon.sign-request=false",
230+
PREFIX + ".foo.assertingparty.entity-id=https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/metadata.php",
231+
PREFIX + ".foo.assertingparty.verification.credentials[0].certificate-location=classpath:saml/certificate-location" };
232232
}
233233

234234
private String[] getPropertyValues() {
@@ -237,11 +237,11 @@ private String[] getPropertyValues() {
237237
PREFIX + ".foo.signing.credentials[0].certificate-location=classpath:saml/certificate-location",
238238
PREFIX + ".foo.decryption.credentials[0].private-key-location=classpath:saml/private-key-location",
239239
PREFIX + ".foo.decryption.credentials[0].certificate-location=classpath:saml/certificate-location",
240-
PREFIX + ".foo.asserting-party.singlesignon.url=https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/SSOService.php",
241-
PREFIX + ".foo.asserting-party.singlesignon.binding=post",
242-
PREFIX + ".foo.asserting-party.singlesignon.sign-request=false",
243-
PREFIX + ".foo.asserting-party.entity-id=https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/metadata.php",
244-
PREFIX + ".foo.asserting-party.verification.credentials[0].certificate-location=classpath:saml/certificate-location",
240+
PREFIX + ".foo.assertingparty.singlesignon.url=https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/SSOService.php",
241+
PREFIX + ".foo.assertingparty.singlesignon.binding=post",
242+
PREFIX + ".foo.assertingparty.singlesignon.sign-request=false",
243+
PREFIX + ".foo.assertingparty.entity-id=https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/metadata.php",
244+
PREFIX + ".foo.assertingparty.verification.credentials[0].certificate-location=classpath:saml/certificate-location",
245245
PREFIX + ".foo.entity-id={baseUrl}/saml2/foo-entity-id",
246246
PREFIX + ".foo.acs.location={baseUrl}/login/saml2/foo-entity-id",
247247
PREFIX + ".foo.acs.binding=redirect" };

spring-boot-project/spring-boot-autoconfigure/src/test/java/org/springframework/boot/autoconfigure/security/saml2/Saml2RelyingPartyPropertiesTests.java

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -41,26 +41,26 @@ class Saml2RelyingPartyPropertiesTests {
4141

4242
@Test
4343
void customizeSsoUrl() {
44-
bind("spring.security.saml2.relyingparty.registration.simplesamlphp.asserting-party.single-sign-on.url",
44+
bind("spring.security.saml2.relyingparty.registration.simplesamlphp.assertingparty.single-sign-on.url",
4545
"https://simplesaml-for-spring-saml/SSOService.php");
4646
assertThat(
47-
this.properties.getRegistration().get("simplesamlphp").getAssertingParty().getSinglesignon().getUrl())
47+
this.properties.getRegistration().get("simplesamlphp").getAssertingparty().getSinglesignon().getUrl())
4848
.isEqualTo("https://simplesaml-for-spring-saml/SSOService.php");
4949
}
5050

5151
@Test
5252
void customizeSsoBinding() {
53-
bind("spring.security.saml2.relyingparty.registration.simplesamlphp.asserting-party.single-sign-on.binding",
53+
bind("spring.security.saml2.relyingparty.registration.simplesamlphp.assertingparty.single-sign-on.binding",
5454
"post");
55-
assertThat(this.properties.getRegistration().get("simplesamlphp").getAssertingParty().getSinglesignon()
55+
assertThat(this.properties.getRegistration().get("simplesamlphp").getAssertingparty().getSinglesignon()
5656
.getBinding()).isEqualTo(Saml2MessageBinding.POST);
5757
}
5858

5959
@Test
6060
void customizeSsoSignRequests() {
61-
bind("spring.security.saml2.relyingparty.registration.simplesamlphp.asserting-party.single-sign-on.sign-request",
61+
bind("spring.security.saml2.relyingparty.registration.simplesamlphp.assertingparty.single-sign-on.sign-request",
6262
"false");
63-
assertThat(this.properties.getRegistration().get("simplesamlphp").getAssertingParty().getSinglesignon()
63+
assertThat(this.properties.getRegistration().get("simplesamlphp").getAssertingparty().getSinglesignon()
6464
.isSignRequest()).isEqualTo(false);
6565
}
6666

@@ -80,16 +80,16 @@ void customizeRelyingPartyEntityIdDefaultsToServiceProviderMetadata() {
8080

8181
@Test
8282
void customizeAssertingPartyMetadataUri() {
83-
bind("spring.security.saml2.relyingparty.registration.simplesamlphp.asserting-party.metadata-uri",
83+
bind("spring.security.saml2.relyingparty.registration.simplesamlphp.assertingparty.metadata-uri",
8484
"https://idp.example.org/metadata");
85-
assertThat(this.properties.getRegistration().get("simplesamlphp").getAssertingParty().getMetadataUri())
85+
assertThat(this.properties.getRegistration().get("simplesamlphp").getAssertingparty().getMetadataUri())
8686
.isEqualTo("https://idp.example.org/metadata");
8787
}
8888

8989
@Test
9090
void customizeSsoSignRequestsIsTrueByDefault() {
9191
this.properties.getRegistration().put("simplesamlphp", new Saml2RelyingPartyProperties.Registration());
92-
assertThat(this.properties.getRegistration().get("simplesamlphp").getAssertingParty().getSinglesignon()
92+
assertThat(this.properties.getRegistration().get("simplesamlphp").getAssertingparty().getSinglesignon()
9393
.isSignRequest()).isEqualTo(true);
9494
}
9595

spring-boot-project/spring-boot-docs/src/docs/asciidoc/web/spring-security.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -262,7 +262,7 @@ You can register multiple relying parties under the `spring.security.saml2.relyi
262262
credentials:
263263
- private-key-location: "path-to-private-key"
264264
certificate-location: "path-to-certificate"
265-
asserting-party:
265+
assertingparty:
266266
verification:
267267
credentials:
268268
- certificate-location: "path-to-verification-cert"
@@ -278,7 +278,7 @@ You can register multiple relying parties under the `spring.security.saml2.relyi
278278
credentials:
279279
- private-key-location: "path-to-private-key"
280280
certificate-location: "path-to-certificate"
281-
asserting-party:
281+
assertingparty:
282282
verification:
283283
credentials:
284284
- certificate-location: "path-to-other-verification-cert"

spring-boot-tests/spring-boot-smoke-tests/spring-boot-smoke-test-saml2-service-provider/src/main/resources/application.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ spring:
88
credentials:
99
- private-key-location: "classpath:saml/privatekey.txt"
1010
certificate-location: "classpath:saml/certificate.txt"
11-
asserting-party:
11+
assertingparty:
1212
verification:
1313
credentials:
1414
- certificate-location: "classpath:saml/certificate.txt"
@@ -21,7 +21,7 @@ spring:
2121
credentials:
2222
- private-key-location: "classpath:saml/privatekey.txt"
2323
certificate-location: "classpath:saml/certificate.txt"
24-
asserting-party:
24+
assertingparty:
2525
verification:
2626
credentials:
2727
- certificate-location: "classpath:saml/certificate.txt"

0 commit comments

Comments
 (0)