Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit d6e378e

Browse files
ngocnhan-tran1996jzheaux
authored andcommitted
Apply Diamond Operator
Signed-off-by: Tran Ngoc Nhan <ngocnhan.tran1996@gmail.com>
1 parent bd98db4 commit d6e378e

File tree

6 files changed

+7
-7
lines changed

6 files changed

+7
-7
lines changed

‎config/src/main/java/org/springframework/security/config/annotation/web/configurers/oauth2/client/OidcBackChannelLogoutHandler.java‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ private void eachLogout(HttpServletRequest request, OidcBackChannelLogoutAuthent
117117
}
118118
headers.setContentType(MediaType.APPLICATION_FORM_URLENCODED);
119119
String logout = computeLogoutEndpoint(request, token);
120-
MultiValueMap<String, String> body = new LinkedMultiValueMap();
120+
MultiValueMap<String, String> body = new LinkedMultiValueMap<>();
121121
body.add("logout_token", token.getPrincipal().getTokenValue());
122122
body.add("_spring_security_internal_logout", "true");
123123
HttpEntity<?> entity = new HttpEntity<>(body, headers);

‎config/src/main/java/org/springframework/security/config/http/FilterChainMapBeanDefinitionDecorator.java‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ public BeanDefinitionHolder decorate(Node node, BeanDefinitionHolder holder, Par
6464
}
6565
BeanDefinition matcher = matcherType.createMatcher(parserContext, path, null);
6666
if (filters.equals(HttpSecurityBeanDefinitionParser.OPT_FILTERS_NONE)) {
67-
securityFilterChains.add(createSecurityFilterChain(matcher, new ManagedList(0)));
67+
securityFilterChains.add(createSecurityFilterChain(matcher, new ManagedList<>(0)));
6868
}
6969
else {
7070
String[] filterBeanNames = StringUtils.tokenizeToStringArray(filters, ",");

‎config/src/main/java/org/springframework/security/config/http/HttpSecurityBeanDefinitionParser.java‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -370,7 +370,7 @@ static void registerFilterChainProxyIfNecessary(ParserContext pc, Element elemen
370370
// Not already registered, so register the list of filter chains and the
371371
// FilterChainProxy
372372
BeanDefinition listFactoryBean = new RootBeanDefinition(ListFactoryBean.class);
373-
listFactoryBean.getPropertyValues().add("sourceList", new ManagedList());
373+
listFactoryBean.getPropertyValues().add("sourceList", new ManagedList<>());
374374
pc.registerBeanComponent(new BeanComponentDefinition(listFactoryBean, BeanIds.FILTER_CHAINS));
375375
BeanDefinitionBuilder fcpBldr = BeanDefinitionBuilder.rootBeanDefinition(FilterChainProxy.class);
376376
fcpBldr.getRawBeanDefinition().setSource(source);

‎config/src/main/java/org/springframework/security/config/websocket/WebSocketMessageBrokerSecurityBeanDefinitionParser.java‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -354,7 +354,7 @@ else if (CSRF_HANDSHAKE_HANDLER_CLASSES.contains(beanClassName)) {
354354
if (!registry.containsBeanDefinition(CLIENT_INBOUND_CHANNEL_BEAN_ID)) {
355355
return;
356356
}
357-
ManagedList<Object> interceptors = new ManagedList();
357+
ManagedList<Object> interceptors = new ManagedList<>();
358358
interceptors.add(new RootBeanDefinition(SecurityContextChannelInterceptor.class));
359359
if (!this.sameOriginDisabled) {
360360
if (!registry.containsBeanDefinition(CSRF_CHANNEL_INTERCEPTOR_BEAN_ID)) {

‎config/src/test/java/org/springframework/security/SpringSecurityCoreVersionSerializableTests.java‎

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,8 +91,8 @@ void serializeAndDeserializeAreEqual(Class<?> clazz) throws Exception {
9191
Object deserialized = objectInputStream.readObject();
9292
// Ignore transient fields Event classes extend from EventObject which has
9393
// transient source property
94-
Set<String> transientFieldNames = new HashSet();
95-
Set<Class<?>> visitedClasses = new HashSet();
94+
Set<String> transientFieldNames = new HashSet<>();
95+
Set<Class<?>> visitedClasses = new HashSet<>();
9696
collectTransientFieldNames(transientFieldNames, visitedClasses, clazz);
9797
assertThat(deserialized).usingRecursiveComparison()
9898
.ignoringFields(transientFieldNames.toArray(new String[0]))

‎config/src/test/java/org/springframework/security/config/http/HttpHeadersConfigTests.java‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ public void requestWhenHeadersElementUsedThenResponseContainsAllSecureHeaders()
152152

153153
@Test
154154
public void requestWhenFrameOptionsConfiguredThenIncludesHeader() throws Exception {
155-
Map<String, String> headers = new HashMap(defaultHeaders);
155+
Map<String, String> headers = new HashMap<>(defaultHeaders);
156156
headers.put("X-Frame-Options", "SAMEORIGIN");
157157
this.spring.configLocations(this.xml("WithFrameOptions")).autowire();
158158
// @formatter:off

0 commit comments

Comments
(0)

AltStyle によって変換されたページ (->オリジナル) /