Skip to content

Commit ad1d858

Browse files
thomasdarimontRob Winch
authored and
Rob Winch
committed
SEC-3056 - Fix JavaDoc errors.
Fixed JavaDoc errors accross multiple modules in order to make javadoc happy with Java 8.
1 parent 7317c09 commit ad1d858

File tree

84 files changed

+235
-268
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

84 files changed

+235
-268
lines changed

acl/src/main/java/org/springframework/security/acls/AclEntryVoter.java

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -83,14 +83,14 @@
8383
* Alternatively, you could have used a common superclass or interface for the
8484
* {@link #processDomainObjectClass} if both <code>BankAccount</code> and
8585
* <code>Customer</code> had common parents.
86-
* </p>
86+
*
8787
* <p>
8888
* If the principal does not have sufficient permissions, the voter will vote to deny
8989
* access.
90-
* </p>
90+
*
9191
* <p>
9292
* All comparisons and prefixes are case sensitive.
93-
* </p>
93+
*
9494
*
9595
* @author Ben Alex
9696
*/

config/src/main/java/org/springframework/security/config/annotation/SecurityConfigurerAdapter.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ public B and() {
5858
* Gets the {@link SecurityBuilder}. Cannot be null.
5959
*
6060
* @return the {@link SecurityBuilder}
61-
* @throw {@link IllegalStateException} if {@link SecurityBuilder} is null
61+
* @throws IllegalStateException if {@link SecurityBuilder} is null
6262
*/
6363
protected final B getBuilder() {
6464
if (securityBuilder == null) {

config/src/main/java/org/springframework/security/config/annotation/authentication/ProviderManagerBuilder.java

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,9 +36,10 @@ public interface ProviderManagerBuilder<B extends ProviderManagerBuilder<B>> ext
3636
* customizations must be done externally and the {@link ProviderManagerBuilder} is
3737
* returned immediately.
3838
*
39+
* Note that an Exception is thrown if an error occurs when adding the {@link AuthenticationProvider}.
40+
*
3941
* @return a {@link ProviderManagerBuilder} to allow further authentication to be
4042
* provided to the {@link ProviderManagerBuilder}
41-
* @throws Exception if an error occurs when adding the {@link AuthenticationProvider}
4243
*/
4344
B authenticationProvider(AuthenticationProvider authenticationProvider);
4445
}

config/src/main/java/org/springframework/security/config/annotation/authentication/builders/AuthenticationManagerBuilder.java

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ public class AuthenticationManagerBuilder
6161

6262
/**
6363
* Creates a new instance
64-
* @param the {@link ObjectPostProcessor} instance to use.
64+
* @param objectPostProcessor the {@link ObjectPostProcessor} instance to use.
6565
*/
6666
public AuthenticationManagerBuilder(ObjectPostProcessor<Object> objectPostProcessor) {
6767
super(objectPostProcessor, true);
@@ -196,7 +196,6 @@ public <T extends UserDetailsService> DaoAuthenticationConfigurer<Authentication
196196
* <p>
197197
* This method <b>does NOT</b> ensure that a {@link UserDetailsService} is available
198198
* for the {@link #getDefaultUserDetailsService()} method.
199-
* </p>
200199
*
201200
* @return a {@link LdapAuthenticationProviderConfigurer} to allow customization of
202201
* the LDAP authentication
@@ -216,11 +215,11 @@ public LdapAuthenticationProviderConfigurer<AuthenticationManagerBuilder> ldapAu
216215
* <p>
217216
* This method <b>does NOT</b> ensure that the {@link UserDetailsService} is available
218217
* for the {@link #getDefaultUserDetailsService()} method.
219-
* </p>
218+
*
219+
* Note that an {@link Exception} might be thrown if an error occurs when adding the {@link AuthenticationProvider}.
220220
*
221221
* @return a {@link AuthenticationManagerBuilder} to allow further authentication to
222222
* be provided to the {@link AuthenticationManagerBuilder}
223-
* @throws Exception if an error occurs when adding the {@link AuthenticationProvider}
224223
*/
225224
public AuthenticationManagerBuilder authenticationProvider(
226225
AuthenticationProvider authenticationProvider) {

config/src/main/java/org/springframework/security/config/annotation/authentication/configurers/provisioning/InMemoryUserDetailsManagerConfigurer.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@
2727
* to have in memory authentication. It also allows easily adding users to the in memory
2828
* authentication.
2929
*
30-
* @param <B> the type of the {@link SecurityBuilder} that is being configured
30+
* @param <B> the type of the {@link ProviderManagerBuilder} that is being configured
3131
*
3232
* @author Rob Winch
3333
* @since 3.2

config/src/main/java/org/springframework/security/config/annotation/authentication/configurers/provisioning/JdbcUserDetailsManagerConfigurer.java

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,6 @@
3838
* <p>
3939
* The only required method is the {@link #dataSource(javax.sql.DataSource)} all other
4040
* methods have reasonable defaults.
41-
* </p>
4241
*
4342
* @param <B> the type of the {@link ProviderManagerBuilder} that is being configured
4443
*
@@ -82,7 +81,7 @@ public JdbcUserDetailsManagerConfigurer<B> dataSource(DataSource dataSource)
8281
* </code>
8382
* @param query The query to use for selecting the username, password, and if the user
8483
* is enabled by username. Must contain a single parameter for the username.
85-
* @return The {@link JdbcUserDetailsManagerRegistry} used for additional
84+
* @return The {@link JdbcUserDetailsManagerConfigurer} used for additional
8685
* customizations
8786
* @throws Exception
8887
*/
@@ -102,7 +101,7 @@ public JdbcUserDetailsManagerConfigurer<B> usersByUsernameQuery(String query)
102101
*
103102
* @param query The query to use for selecting the username, authority by username.
104103
* Must contain a single parameter for the username.
105-
* @return The {@link JdbcUserDetailsManagerRegistry} used for additional
104+
* @return The {@link JdbcUserDetailsManagerConfigurer} used for additional
106105
* customizations
107106
* @throws Exception
108107
*/
@@ -126,7 +125,7 @@ public JdbcUserDetailsManagerConfigurer<B> authoritiesByUsernameQuery(String que
126125
*
127126
* @param query The query to use for selecting the authorities by group. Must contain
128127
* a single parameter for the username.
129-
* @return The {@link JdbcUserDetailsManagerRegistry} used for additional
128+
* @return The {@link JdbcUserDetailsManagerConfigurer} used for additional
130129
* customizations
131130
* @throws Exception
132131
*/
@@ -181,7 +180,7 @@ public JdbcUserDetailsManager getUserDetailsService() {
181180
/**
182181
* Populates the default schema that allows users and authorities to be stored.
183182
*
184-
* @return The {@link JdbcUserDetailsManagerRegistry} used for additional
183+
* @return The {@link JdbcUserDetailsManagerConfigurer} used for additional
185184
* customizations
186185
*/
187186
public JdbcUserDetailsManagerConfigurer<B> withDefaultSchema() {

config/src/main/java/org/springframework/security/config/annotation/authentication/configurers/provisioning/UserDetailsManagerConfigurer.java

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -80,9 +80,6 @@ public final UserDetailsBuilder withUser(String username) {
8080
/**
8181
* Builds the user to be added. At minimum the username, password, and authorities
8282
* should provided. The remaining attributes have reasonable defaults.
83-
*
84-
* @param <T> the type of {@link UserDetailsManagerConfigurer} to return for chaining
85-
* methods.
8683
*/
8784
public class UserDetailsBuilder {
8885
private String username;
@@ -103,11 +100,10 @@ private UserDetailsBuilder(C builder) {
103100
}
104101

105102
/**
106-
* Returns the {@link UserDetailsManagerRegistry} for method chaining (i.e. to add
103+
* Returns the {@link UserDetailsManagerConfigurer} for method chaining (i.e. to add
107104
* another user)
108105
*
109-
* @return the {@link UserDetailsManagerRegistry} for method chaining (i.e. to add
110-
* another user)
106+
* @return the {@link UserDetailsManagerConfigurer} for method chaining
111107
*/
112108
public C and() {
113109
return builder;

config/src/main/java/org/springframework/security/config/annotation/authentication/configurers/userdetails/UserDetailsServiceConfigurer.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,8 @@
2727
* @author Rob Winch
2828
* @since 3.2
2929
*
30-
* @param <B> the type of the {@link SecurityBuilder}
31-
* @param <C> the {@link SecurityConfigurer} (or this)
30+
* @param <B> the type of the {@link ProviderManagerBuilder}
31+
* @param <C> the {@link UserDetailsServiceConfigurer} (or this)
3232
* @param <U> the type of UserDetailsService being used to allow for returning the
3333
* concrete UserDetailsService.
3434
*/

config/src/main/java/org/springframework/security/config/annotation/method/configuration/EnableGlobalMethodSecurity.java

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,9 +29,8 @@
2929

3030
/**
3131
* <p>
32-
* Enables Spring Security global method security similar to the <global-method-security>
32+
* Enables Spring Security global method security similar to the &lt;global-method-security&gt;
3333
* xml support.
34-
* </p>
3534
*
3635
* <p>
3736
* More advanced configurations may wish to extend

config/src/main/java/org/springframework/security/config/annotation/web/HttpSecurityBuilder.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -142,11 +142,11 @@ <C extends SecurityConfigurer<DefaultSecurityFilterChain, H>> C removeConfigurer
142142
* <li>{@link LogoutFilter}</li>
143143
* <li>{@link X509AuthenticationFilter}</li>
144144
* <li>{@link AbstractPreAuthenticatedProcessingFilter}</li>
145-
* <li>{@link org.springframework.security.cas.web.CasAuthenticationFilter}</li>
145+
* <li><a href="{@docRoot}/org/springframework/security/cas/web/CasAuthenticationFilter.html">CasAuthenticationFilter</a></li>
146146
* <li>{@link UsernamePasswordAuthenticationFilter}</li>
147147
* <li>{@link ConcurrentSessionFilter}</li>
148148
* <li>{@link OpenIDAuthenticationFilter}</li>
149-
* <li>{@link DefaultLoginPageGeneratingFilter}</li>
149+
* <li>{@link org.springframework.security.web.authentication.ui.DefaultLoginPageGeneratingFilter}</li>
150150
* <li>{@link ConcurrentSessionFilter}</li>
151151
* <li>{@link DigestAuthenticationFilter}</li>
152152
* <li>{@link BasicAuthenticationFilter}</li>

config/src/main/java/org/springframework/security/config/annotation/web/builders/HttpSecurity.java

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@
7171
import org.springframework.util.Assert;
7272

7373
/**
74-
* A {@link HttpSecurity} is similar to Spring Security's XML <http> element in the
74+
* A {@link HttpSecurity} is similar to Spring Security's XML &lt;http&gt; element in the
7575
* namespace configuration. It allows configuring web based security for specific http
7676
* requests. By default it will be applied to all requests, but can be restricted using
7777
* {@link #requestMatcher(RequestMatcher)} or other similar methods.
@@ -283,7 +283,7 @@ public OpenIDLoginConfigurer<HttpSecurity> openidLogin() throws Exception {
283283
*
284284
* @return
285285
* @throws Exception
286-
* @see {@link HeadersConfigurer}
286+
* @see HeadersConfigurer
287287
*/
288288
public HeadersConfigurer<HttpSecurity> headers() throws Exception {
289289
return getOrApply(new HeadersConfigurer<HttpSecurity>());
@@ -326,8 +326,8 @@ public HeadersConfigurer<HttpSecurity> headers() throws Exception {
326326
*
327327
* <pre>
328328
* &lt;listener&gt;
329-
* &ltlistener-class&gt;org.springframework.security.web.session.HttpSessionEventPublisher&lt;/listener-class&gt;
330-
* &lt/listener>
329+
* &lt;listener-class&gt;org.springframework.security.web.session.HttpSessionEventPublisher&lt;/listener-class&gt;
330+
* &lt;/listener&gt;
331331
* </pre>
332332
*
333333
* Alternatively,
@@ -378,7 +378,7 @@ public SessionManagementConfigurer<HttpSecurity> sessionManagement() throws Exce
378378
*
379379
* @return the {@link PortMapperConfigurer} for further customizations
380380
* @throws Exception
381-
* @see {@link #requiresChannel()}
381+
* @see #requiresChannel()
382382
*/
383383
public PortMapperConfigurer<HttpSecurity> portMapper() throws Exception {
384384
return getOrApply(new PortMapperConfigurer<HttpSecurity>());
@@ -716,7 +716,7 @@ public LogoutConfigurer<HttpSecurity> logout() throws Exception {
716716
* {@link org.springframework.security.authentication.AnonymousAuthenticationToken}
717717
* and contain the role "ROLE_ANONYMOUS".
718718
*
719-
* <h2>Example Configuration</h2
719+
* <h2>Example Configuration</h2>
720720
*
721721
* The following configuration demonstrates how to specify that anonymous users should
722722
* contain the role "ROLE_ANON" instead.
@@ -908,6 +908,10 @@ public HttpBasicConfigurer<HttpSecurity> httpBasic() throws Exception {
908908
return getOrApply(new HttpBasicConfigurer<HttpSecurity>());
909909
}
910910

911+
public <C> void setSharedObject(Class<C> sharedType, C object) {
912+
super.setSharedObject(sharedType, object);
913+
}
914+
911915
@Override
912916
protected void beforeConfigure() throws Exception {
913917
setSharedObject(AuthenticationManager.class, getAuthenticationRegistry().build());

config/src/main/java/org/springframework/security/config/annotation/web/configuration/WebMvcSecurityConfiguration.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@
2929
/**
3030
* Used to add a {@link RequestDataValueProcessor} for Spring MVC and Spring Security CSRF
3131
* integration. This configuration is added whenever {@link EnableWebMvc} is added by
32-
* {@link SpringWebMvcImportSelector} and the DispatcherServlet is present on the
32+
* <a href="{@docRoot}/org/springframework/security/config/annotation/web/configuration/SpringWebMvcImportSelector.html">SpringWebMvcImportSelector</a> and the DispatcherServlet is present on the
3333
* classpath. It also adds the {@link AuthenticationPrincipalArgumentResolver} as a
3434
* {@link HandlerMethodArgumentResolver}.
3535
*

config/src/main/java/org/springframework/security/config/annotation/web/configuration/WebSecurityConfigurerAdapter.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -262,7 +262,7 @@ protected AuthenticationManager authenticationManager() throws Exception {
262262
* {@link #userDetailsService()} instead
263263
* @return
264264
* @throws Exception
265-
* @see {@link #userDetailsService()}
265+
* @see #userDetailsService()
266266
*/
267267
public UserDetailsService userDetailsServiceBean() throws Exception {
268268
AuthenticationManagerBuilder globalAuthBuilder = context
@@ -273,7 +273,7 @@ public UserDetailsService userDetailsServiceBean() throws Exception {
273273

274274
/**
275275
* Allows modifying and accessing the {@link UserDetailsService} from
276-
* {@link #userDetailsServiceBean()()} without interacting with the
276+
* {@link #userDetailsServiceBean()} without interacting with the
277277
* {@link ApplicationContext}. Developers should override this method when changing
278278
* the instance of {@link #userDetailsServiceBean()}.
279279
*

config/src/main/java/org/springframework/security/config/annotation/web/configurers/AbstractAuthenticationFilterConfigurer.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -178,8 +178,8 @@ public final T permitAll() {
178178
}
179179

180180
/**
181-
* Ensures the urls for {@link #failureUrl(String)} and
182-
* {@link #authenticationUrls(String)} are granted access to any user.
181+
* Ensures the urls for {@link #failureUrl(String)} as well as for the {@link HttpSecurityBuilder}, the
182+
* {@link #getLoginPage} and {@link #getLoginProcessingUrl} are granted access to any user.
183183
*
184184
* @param permitAll true to grant access to the URLs false to skip this step
185185
* @return the {@link FormLoginConfigurer} for additional customization

config/src/main/java/org/springframework/security/config/annotation/web/configurers/AbstractInterceptUrlConfigurer.java

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@
5151
*
5252
* <ul>
5353
* <li>
54-
* {@link org.springframework.security.config.annotation.web.builders.HttpSecurity#getAuthenticationManager()}
54+
* {@link AuthenticationManager}
5555
* </li>
5656
* </ul>
5757
*
@@ -115,7 +115,7 @@ abstract class AbstractInterceptUrlRegistry<R extends AbstractInterceptUrlRegist
115115

116116
/**
117117
* Allows setting the {@link AccessDecisionManager}. If none is provided, a
118-
* default {@l AccessDecisionManager} is created.
118+
* default {@link AccessDecisionManager} is created.
119119
*
120120
* @param accessDecisionManager the {@link AccessDecisionManager} to use
121121
* @return the {@link AbstractInterceptUrlConfigurer} for further customization
@@ -162,7 +162,7 @@ private AccessDecisionManager createDefaultAccessDecisionManager(H http) {
162162

163163
/**
164164
* If currently null, creates a default {@link AccessDecisionManager} using
165-
* {@link #createDefaultAccessDecisionManager()}. Otherwise returns the
165+
* {@link #createDefaultAccessDecisionManager(HttpSecurityBuilder)}. Otherwise returns the
166166
* {@link AccessDecisionManager}.
167167
*
168168
* @param http the builder to use

config/src/main/java/org/springframework/security/config/annotation/web/configurers/ExceptionHandlingConfigurer.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ public ExceptionHandlingConfigurer() {
8484
* @param accessDeniedUrl the URL to the access denied page (i.e. /errors/401)
8585
* @return the {@link ExceptionHandlingConfigurer} for further customization
8686
* @see AccessDeniedHandlerImpl
87-
* @see {@link #accessDeniedHandler(org.springframework.security.web.access.AccessDeniedHandler)}
87+
* @see #accessDeniedHandler(org.springframework.security.web.access.AccessDeniedHandler)
8888
*/
8989
public ExceptionHandlingConfigurer<H> accessDeniedPage(String accessDeniedUrl) {
9090
AccessDeniedHandlerImpl accessDeniedHandler = new AccessDeniedHandlerImpl();

config/src/main/java/org/springframework/security/config/annotation/web/configurers/ExpressionUrlAuthorizationConfigurer.java

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@
7070
*
7171
* @author Rob Winch
7272
* @since 3.2
73-
* @see {@link org.springframework.security.config.annotation.web.builders.HttpSecurity#authorizeRequests()}
73+
* @see org.springframework.security.config.annotation.web.builders.HttpSecurity#authorizeRequests()
7474
*/
7575
public final class ExpressionUrlAuthorizationConfigurer<H extends HttpSecurityBuilder<H>>
7676
extends
@@ -339,7 +339,7 @@ public ExpressionInterceptUrlRegistry anonymous() {
339339
*
340340
* @return the {@link ExpressionUrlAuthorizationConfigurer} for further
341341
* customization
342-
* @see {@link RememberMeConfigurer}
342+
* @see RememberMeConfigurer
343343
*/
344344
public ExpressionInterceptUrlRegistry rememberMe() {
345345
return access(rememberMe);
@@ -371,7 +371,7 @@ public ExpressionInterceptUrlRegistry authenticated() {
371371
*
372372
* @return the {@link ExpressionUrlAuthorizationConfigurer} for further
373373
* customization
374-
* @see {@link RememberMeConfigurer}
374+
* @see RememberMeConfigurer
375375
*/
376376
public ExpressionInterceptUrlRegistry fullyAuthenticated() {
377377
return access(fullyAuthenticated);

config/src/main/java/org/springframework/security/config/annotation/web/configurers/FormLoginConfigurer.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@
5353
* The following shared objects are used:
5454
*
5555
* <ul>
56-
* <li>{@link AuthenticationManager}</li>
56+
* <li>{@link org.springframework.security.authentication.AuthenticationManager}</li>
5757
* <li>{@link RememberMeServices} - is optionally used. See {@link RememberMeConfigurer}</li>
5858
* <li>{@link SessionAuthenticationStrategy} - is optionally used. See
5959
* {@link SessionManagementConfigurer}</li>

config/src/main/java/org/springframework/security/config/annotation/web/configurers/HeadersConfigurer.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -186,7 +186,7 @@ public XXssConfig block(boolean enabled) {
186186
* X-XSS-Protection: 1
187187
* </pre>
188188
*
189-
* or if {@link #setBlock(boolean)} is true
189+
* or if {@link XXssProtectionHeaderWriter#setBlock(boolean)} of the given {@link XXssProtectionHeaderWriter} is true
190190
*
191191
*
192192
* <pre>

config/src/main/java/org/springframework/security/config/annotation/web/configurers/HttpBasicConfigurer.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ public final class HttpBasicConfigurer<B extends HttpSecurityBuilder<B>> extends
8383
/**
8484
* Creates a new instance
8585
* @throws Exception
86-
* @see {@link HttpSecurity#httpBasic()}
86+
* @see HttpSecurity#httpBasic()
8787
*/
8888
public HttpBasicConfigurer() throws Exception {
8989
realmName(DEFAULT_REALM);

config/src/main/java/org/springframework/security/config/annotation/web/configurers/JeeConfigurer.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -187,7 +187,7 @@ public JeeConfigurer<H> j2eePreAuthenticatedProcessingFilter(
187187
* Populates a {@link PreAuthenticatedAuthenticationProvider} into
188188
* {@link HttpSecurity#authenticationProvider(org.springframework.security.authentication.AuthenticationProvider)}
189189
* and a {@link Http403ForbiddenEntryPoint} into
190-
* {@link HttpSecurity#authenticationEntryPoint(org.springframework.security.web.AuthenticationEntryPoint)}
190+
* {@link HttpSecurityBuilder#setSharedObject(Class, Object)}
191191
*
192192
* @see org.springframework.security.config.annotation.SecurityConfigurerAdapter#init(org.springframework.security.config.annotation.SecurityBuilder)
193193
*/

config/src/main/java/org/springframework/security/config/annotation/web/configurers/LogoutConfigurer.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@
3535

3636
/**
3737
* Adds logout support. Other {@link SecurityConfigurer} instances may invoke
38-
* {@link #addLogoutHandler(LogoutHandler)} in the {@link #init(HttpSecurity)} phase.
38+
* {@link #addLogoutHandler(LogoutHandler)} in the {@link #init(HttpSecurityBuilder)} phase.
3939
*
4040
* <h2>Security Filters</h2>
4141
*

config/src/main/java/org/springframework/security/config/annotation/web/configurers/openid/OpenIDLoginConfigurer.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -199,7 +199,7 @@ public OpenIDLoginConfigurer<H> authenticationUserDetailsService(
199199
* {@link HttpServletRequest} matches this URL the {@link OpenIDAuthenticationFilter}
200200
* will attempt to authenticate the request. The default is "/login/openid".
201201
*
202-
* @param loginUrl the URL used to perform authentication
202+
* @param loginProcessingUrl the URL used to perform authentication
203203
* @return the {@link OpenIDLoginConfigurer} for additional customization
204204
*/
205205
public OpenIDLoginConfigurer<H> loginProcessingUrl(String loginProcessingUrl) {

0 commit comments

Comments
 (0)