Skip to content

Commit f97b8b2

Browse files
committed
Apply consistent naming to builder() methods
Issue gh-143 gh-81
1 parent 4e4656f commit f97b8b2

File tree

8 files changed

+16
-16
lines changed

8 files changed

+16
-16
lines changed

oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/core/oidc/OidcProviderConfiguration.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ public Map<String, Object> getClaims() {
6262
*
6363
* @return the {@link Builder}
6464
*/
65-
public static Builder withClaims() {
65+
public static Builder builder() {
6666
return new Builder();
6767
}
6868

oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/jwt/JwtClaimsSet.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ public Map<String, Object> getClaims() {
5959
*
6060
* @return the {@link Builder}
6161
*/
62-
public static Builder withClaims() {
62+
public static Builder builder() {
6363
return new Builder();
6464
}
6565

oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/OAuth2TokenIssuerUtil.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ static Jwt issueJwtAccessToken(JwtEncoder jwtEncoder, String subject, String aud
4848
Instant issuedAt = Instant.now();
4949
Instant expiresAt = issuedAt.plus(1, ChronoUnit.HOURS); // TODO Allow configuration for access token time-to-live
5050

51-
JwtClaimsSet jwtClaimsSet = JwtClaimsSet.withClaims()
51+
JwtClaimsSet jwtClaimsSet = JwtClaimsSet.builder()
5252
.issuer(issuer)
5353
.subject(subject)
5454
.audience(Collections.singletonList(audience))

oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/web/OidcProviderConfigurationEndpointFilter.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ protected void doFilterInternal(HttpServletRequest request, HttpServletResponse
7474
return;
7575
}
7676

77-
OidcProviderConfiguration providerConfiguration = OidcProviderConfiguration.withClaims()
77+
OidcProviderConfiguration providerConfiguration = OidcProviderConfiguration.builder()
7878
.issuer(this.providerSettings.issuer())
7979
.authorizationEndpoint(asUrl(this.providerSettings.issuer(), this.providerSettings.authorizationEndpoint()))
8080
.tokenEndpoint(asUrl(this.providerSettings.issuer(), this.providerSettings.tokenEndpoint()))

oauth2-authorization-server/src/test/java/org/springframework/security/oauth2/core/oidc/OidcProviderConfigurationTests.java

+5-5
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@
3434
*/
3535
public class OidcProviderConfigurationTests {
3636
private final OidcProviderConfiguration.Builder minimalConfigurationBuilder =
37-
OidcProviderConfiguration.withClaims()
37+
OidcProviderConfiguration.builder()
3838
.issuer("https://example.com/issuer1")
3939
.authorizationEndpoint("https://example.com/issuer1/oauth2/authorize")
4040
.tokenEndpoint("https://example.com/issuer1/oauth2/token")
@@ -45,7 +45,7 @@ public class OidcProviderConfigurationTests {
4545

4646
@Test
4747
public void buildWhenAllRequiredClaimsAndAdditionalClaimsThenCreated() {
48-
OidcProviderConfiguration providerConfiguration = OidcProviderConfiguration.withClaims()
48+
OidcProviderConfiguration providerConfiguration = OidcProviderConfiguration.builder()
4949
.issuer("https://example.com/issuer1")
5050
.authorizationEndpoint("https://example.com/issuer1/oauth2/authorize")
5151
.tokenEndpoint("https://example.com/issuer1/oauth2/token")
@@ -73,7 +73,7 @@ public void buildWhenAllRequiredClaimsAndAdditionalClaimsThenCreated() {
7373

7474
@Test
7575
public void buildWhenOnlyRequiredClaimsThenCreated() {
76-
OidcProviderConfiguration providerConfiguration = OidcProviderConfiguration.withClaims()
76+
OidcProviderConfiguration providerConfiguration = OidcProviderConfiguration.builder()
7777
.issuer("https://example.com/issuer1")
7878
.authorizationEndpoint("https://example.com/issuer1/oauth2/authorize")
7979
.tokenEndpoint("https://example.com/issuer1/oauth2/token")
@@ -409,14 +409,14 @@ public void tokenEndpointAuthenticationMethodsWhenAddingOrRemovingThenCorrectVal
409409

410410
@Test
411411
public void claimWhenNameIsNullThenThrowIllegalArgumentException() {
412-
assertThatThrownBy(() -> OidcProviderConfiguration.withClaims().claim(null, "value"))
412+
assertThatThrownBy(() -> OidcProviderConfiguration.builder().claim(null, "value"))
413413
.isInstanceOf(IllegalArgumentException.class)
414414
.hasMessage("name cannot be empty");
415415
}
416416

417417
@Test
418418
public void claimWhenValueIsNullThenThrowIllegalArgumentException() {
419-
assertThatThrownBy(() -> OidcProviderConfiguration.withClaims().claim("claim-name", null))
419+
assertThatThrownBy(() -> OidcProviderConfiguration.builder().claim("claim-name", null))
420420
.isInstanceOf(IllegalArgumentException.class)
421421
.hasMessage("value cannot be null");
422422
}

oauth2-authorization-server/src/test/java/org/springframework/security/oauth2/core/oidc/http/converter/OidcProviderConfigurationHttpMessageConverterTests.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@ public void readInternalWhenInvalidProviderConfigurationThenThrowException() {
145145
@Test
146146
public void writeInternalWhenProviderConfigurationThenSuccess() {
147147
OidcProviderConfiguration providerConfiguration =
148-
OidcProviderConfiguration.withClaims()
148+
OidcProviderConfiguration.builder()
149149
.issuer("https://example.com/issuer1")
150150
.authorizationEndpoint("https://example.com/issuer1/oauth2/authorize")
151151
.tokenEndpoint("https://example.com/issuer1/oauth2/token")
@@ -187,7 +187,7 @@ public void writeInternalWhenWriteFailsThenThrowsException() {
187187
this.messageConverter.setProviderConfigurationParametersConverter(failingConverter);
188188

189189
OidcProviderConfiguration providerConfiguration =
190-
OidcProviderConfiguration.withClaims()
190+
OidcProviderConfiguration.builder()
191191
.issuer("https://example.com/issuer1")
192192
.authorizationEndpoint("https://example.com/issuer1/oauth2/authorize")
193193
.tokenEndpoint("https://example.com/issuer1/oauth2/token")

oauth2-authorization-server/src/test/java/org/springframework/security/oauth2/jwt/JwtClaimsSetTests.java

+4-4
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ public class JwtClaimsSetTests {
2929

3030
@Test
3131
public void buildWhenClaimsEmptyThenThrowIllegalArgumentException() {
32-
assertThatThrownBy(() -> JwtClaimsSet.withClaims().build())
32+
assertThatThrownBy(() -> JwtClaimsSet.builder().build())
3333
.isInstanceOf(IllegalArgumentException.class)
3434
.hasMessage("claims cannot be empty");
3535
}
@@ -38,7 +38,7 @@ public void buildWhenClaimsEmptyThenThrowIllegalArgumentException() {
3838
public void buildWhenAllClaimsProvidedThenAllClaimsAreSet() {
3939
JwtClaimsSet expectedJwtClaimsSet = TestJwtClaimsSets.jwtClaimsSet().build();
4040

41-
JwtClaimsSet jwtClaimsSet = JwtClaimsSet.withClaims()
41+
JwtClaimsSet jwtClaimsSet = JwtClaimsSet.builder()
4242
.issuer(expectedJwtClaimsSet.getIssuer().toExternalForm())
4343
.subject(expectedJwtClaimsSet.getSubject())
4444
.audience(expectedJwtClaimsSet.getAudience())
@@ -76,14 +76,14 @@ public void fromWhenClaimsProvidedThenCopied() {
7676

7777
@Test
7878
public void claimWhenNameNullThenThrowIllegalArgumentException() {
79-
assertThatThrownBy(() -> JwtClaimsSet.withClaims().claim(null, "value"))
79+
assertThatThrownBy(() -> JwtClaimsSet.builder().claim(null, "value"))
8080
.isInstanceOf(IllegalArgumentException.class)
8181
.hasMessage("name cannot be empty");
8282
}
8383

8484
@Test
8585
public void claimWhenValueNullThenThrowIllegalArgumentException() {
86-
assertThatThrownBy(() -> JwtClaimsSet.withClaims().claim("name", null))
86+
assertThatThrownBy(() -> JwtClaimsSet.builder().claim("name", null))
8787
.isInstanceOf(IllegalArgumentException.class)
8888
.hasMessage("value cannot be null");
8989
}

oauth2-authorization-server/src/test/java/org/springframework/security/oauth2/jwt/TestJwtClaimsSets.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ public static JwtClaimsSet.Builder jwtClaimsSet() {
3030
Instant issuedAt = Instant.now();
3131
Instant expiresAt = issuedAt.plus(1, ChronoUnit.HOURS);
3232

33-
return JwtClaimsSet.withClaims()
33+
return JwtClaimsSet.builder()
3434
.issuer(issuer)
3535
.subject("subject")
3636
.audience(Collections.singletonList("client-1"))

0 commit comments

Comments
 (0)