From dc27b51d0df895d90f52f86d54d78d46e0e27877 Mon Sep 17 00:00:00 2001
From: Tran Ngoc Nhan
Date: Sat, 1 Nov 2025 14:02:08 +0700
Subject: [PATCH 1/2] Fix typos
Signed-off-by: Tran Ngoc Nhan
---
.../access/expression/EvaluationContextPostProcessor.java | 2 +-
.../security/acls/domain/AclAuthorizationStrategy.java | 2 +-
.../security/acls/domain/GrantedAuthoritySid.java | 2 +-
.../security/acls/jdbc/JdbcAclService.java | 2 +-
.../security/acls/jdbc/JdbcMutableAclService.java | 4 ++--
.../security/cas/web/CasAuthenticationFilter.java | 8 ++++----
.../annotation/AbstractConfiguredSecurityBuilder.java | 8 ++++----
.../config/annotation/web/HttpSecurityBuilder.java | 2 +-
.../annotation/web/builders/FilterOrderRegistration.java | 2 +-
.../annotation/web/configurers/LogoutConfigurer.java | 2 +-
.../web/configurers/SessionManagementConfigurer.java | 2 +-
.../web/configurers/saml2/Saml2MetadataConfigurer.java | 2 +-
.../web/reactive/ServerHttpSecurityConfiguration.java | 2 +-
.../security/config/http/AuthenticationConfigBuilder.java | 6 +++---
.../config/ldap/LdapServerBeanDefinitionParser.java | 6 +++---
.../configurers/AuthorizeHttpRequestsConfigurerTests.java | 2 +-
.../access/expression/SecurityExpressionOperations.java | 2 +-
docs/modules/ROOT/pages/servlet/appendix/faq.adoc | 2 +-
docs/modules/ROOT/pages/servlet/configuration/kotlin.adoc | 2 +-
.../KerberosServiceAuthenticationProvider.java | 2 +-
.../kerberos/authentication/KerberosTicketValidator.java | 2 +-
.../SpnegoAuthenticationProcessingFilter.java | 4 ++--
.../messaging/util/matcher/PathPatternMessageMatcher.java | 8 ++++----
.../security/saml2/core/Saml2X509Credential.java | 2 +-
.../request/SecurityMockMvcRequestPostProcessors.java | 4 ++--
.../access/expression/EvaluationContextPostProcessor.java | 2 +-
.../websphere/DefaultWASUsernameAndGroupsExtractor.java | 6 +++---
.../rememberme/RememberMeAuthenticationFilter.java | 4 ++--
.../security/web/csrf/HttpSessionCsrfTokenRepository.java | 2 +-
.../security/web/firewall/StrictHttpFirewall.java | 6 +++---
.../web/header/writers/PermissionsPolicyHeaderWriter.java | 2 +-
.../writers/frameoptions/RegExpAllowFromStrategy.java | 2 +-
.../security/web/savedrequest/FastHttpDateFormat.java | 2 +-
.../server/authentication/AuthenticationWebFilter.java | 4 ++--
.../servlet/util/matcher/PathPatternRequestMatcher.java | 8 ++++----
.../security/web/util/ThrowableAnalyzer.java | 3 +--
.../org/springframework/security/web/util/UrlUtils.java | 2 +-
.../web/session/HttpSessionEventPublisherTests.java | 4 ++--
.../security/web/webauthn/api/CredentialRecord.java | 2 +-
.../security/web/webauthn/api/PublicKeyCredential.java | 2 +-
.../webauthn/api/PublicKeyCredentialCreationOptions.java | 2 +-
.../security/web/webauthn/api/ResidentKeyRequirement.java | 2 +-
42 files changed, 68 insertions(+), 69 deletions(-)
diff --git a/access/src/main/java/org/springframework/security/messaging/access/expression/EvaluationContextPostProcessor.java b/access/src/main/java/org/springframework/security/messaging/access/expression/EvaluationContextPostProcessor.java
index cadca0aab1d..31f89de36d9 100644
--- a/access/src/main/java/org/springframework/security/messaging/access/expression/EvaluationContextPostProcessor.java
+++ b/access/src/main/java/org/springframework/security/messaging/access/expression/EvaluationContextPostProcessor.java
@@ -39,7 +39,7 @@ interface EvaluationContextPostProcessor {
* that was passed in.
* @param context the original {@link EvaluationContext}
* @param invocation the security invocation object (i.e. Message)
- * @return the upated context.
+ * @return the updated context.
*/
EvaluationContext postProcess(EvaluationContext context, I invocation);
diff --git a/acl/src/main/java/org/springframework/security/acls/domain/AclAuthorizationStrategy.java b/acl/src/main/java/org/springframework/security/acls/domain/AclAuthorizationStrategy.java
index fa243b0fcf7..cd908d2432c 100644
--- a/acl/src/main/java/org/springframework/security/acls/domain/AclAuthorizationStrategy.java
+++ b/acl/src/main/java/org/springframework/security/acls/domain/AclAuthorizationStrategy.java
@@ -20,7 +20,7 @@
/**
* Strategy used by {@link AclImpl} to determine whether a principal is permitted to call
- * adminstrative methods on the AclImpl.
+ * administrative methods on the AclImpl.
*
* @author Ben Alex
*/
diff --git a/acl/src/main/java/org/springframework/security/acls/domain/GrantedAuthoritySid.java b/acl/src/main/java/org/springframework/security/acls/domain/GrantedAuthoritySid.java
index 73c1dc0366d..a72d690cf5e 100644
--- a/acl/src/main/java/org/springframework/security/acls/domain/GrantedAuthoritySid.java
+++ b/acl/src/main/java/org/springframework/security/acls/domain/GrantedAuthoritySid.java
@@ -42,7 +42,7 @@ public GrantedAuthoritySid(String grantedAuthority) {
public GrantedAuthoritySid(GrantedAuthority grantedAuthority) {
Assert.notNull(grantedAuthority, "GrantedAuthority required");
Assert.notNull(grantedAuthority.getAuthority(),
- "This Sid is only compatible with GrantedAuthoritys that provide a non-null getAuthority()");
+ "This Sid is only compatible with GrantedAuthority that provide a non-null getAuthority()");
this.grantedAuthority = grantedAuthority.getAuthority();
}
diff --git a/acl/src/main/java/org/springframework/security/acls/jdbc/JdbcAclService.java b/acl/src/main/java/org/springframework/security/acls/jdbc/JdbcAclService.java
index f8dbb687e66..69667c89337 100644
--- a/acl/src/main/java/org/springframework/security/acls/jdbc/JdbcAclService.java
+++ b/acl/src/main/java/org/springframework/security/acls/jdbc/JdbcAclService.java
@@ -160,7 +160,7 @@ public void setAclClassIdSupported(boolean aclClassIdSupported) {
this.findChildrenSql = DEFAULT_SELECT_ACL_WITH_PARENT_SQL_WITH_CLASS_ID_TYPE;
}
else {
- log.debug("Find children statement has already been overridden, so not overridding the default");
+ log.debug("Find children statement has already been overridden, so not overriding the default");
}
}
}
diff --git a/acl/src/main/java/org/springframework/security/acls/jdbc/JdbcMutableAclService.java b/acl/src/main/java/org/springframework/security/acls/jdbc/JdbcMutableAclService.java
index 9b8eb5acbc2..9c22037dd9e 100644
--- a/acl/src/main/java/org/springframework/security/acls/jdbc/JdbcMutableAclService.java
+++ b/acl/src/main/java/org/springframework/security/acls/jdbc/JdbcMutableAclService.java
@@ -50,7 +50,7 @@
* The default settings are for HSQLDB. If you are using a different database you will
* probably need to set the {@link #setSidIdentityQuery(String) sidIdentityQuery} and
* {@link #setClassIdentityQuery(String) classIdentityQuery} properties appropriately. The
- * other queries, SQL inserts and updates can also be customized to accomodate schema
+ * other queries, SQL inserts and updates can also be customized to accommodate schema
* variations, but must produce results consistent with those expected by the defaults.
*
* See the appendix of the Spring Security reference manual for more information on the
@@ -471,7 +471,7 @@ public void setAclClassIdSupported(boolean aclClassIdSupported) {
this.insertClass = DEFAULT_INSERT_INTO_ACL_CLASS_WITH_ID;
}
else {
- log.debug("Insert class statement has already been overridden, so not overridding the default");
+ log.debug("Insert class statement has already been overridden, so not overriding the default");
}
}
}
diff --git a/cas/src/main/java/org/springframework/security/cas/web/CasAuthenticationFilter.java b/cas/src/main/java/org/springframework/security/cas/web/CasAuthenticationFilter.java
index 06623db874d..7df0846ea52 100644
--- a/cas/src/main/java/org/springframework/security/cas/web/CasAuthenticationFilter.java
+++ b/cas/src/main/java/org/springframework/security/cas/web/CasAuthenticationFilter.java
@@ -326,7 +326,7 @@ public final void setAuthenticationFailureHandler(AuthenticationFailureHandler f
/**
* Use this {@code RequestMatcher} to match proxy receptor requests. Without setting
* this matcher, {@link CasAuthenticationFilter} will not capture any proxy receptor
- * requets.
+ * requests.
* @param proxyReceptorMatcher the {@link RequestMatcher} to use
* @since 6.5
*/
@@ -383,7 +383,7 @@ public final void setRequestCache(RequestCache requestCache) {
}
/**
- * Indicates if the request is elgible to process a service ticket. This method exists
+ * Indicates if the request is eligible to process a service ticket. This method exists
* for readability.
* @param request
* @param response
@@ -396,7 +396,7 @@ private boolean serviceTicketRequest(HttpServletRequest request, HttpServletResp
}
/**
- * Indicates if the request is elgible to process a proxy ticket.
+ * Indicates if the request is eligible to process a proxy ticket.
* @param request
* @return
*/
@@ -419,7 +419,7 @@ private boolean authenticated() {
}
/**
- * Indicates if the request is elgible to be processed as the proxy receptor.
+ * Indicates if the request is eligible to be processed as the proxy receptor.
* @param request
* @return
*/
diff --git a/config/src/main/java/org/springframework/security/config/annotation/AbstractConfiguredSecurityBuilder.java b/config/src/main/java/org/springframework/security/config/annotation/AbstractConfiguredSecurityBuilder.java
index 04046fea104..f96ea84080f 100644
--- a/config/src/main/java/org/springframework/security/config/annotation/AbstractConfiguredSecurityBuilder.java
+++ b/config/src/main/java/org/springframework/security/config/annotation/AbstractConfiguredSecurityBuilder.java
@@ -177,7 +177,7 @@ public void setSharedObject(Class sharedType, C object) {
}
/**
- * Gets a shared Object. Note that object heirarchies are not considered.
+ * Gets a shared Object. Note that object hierarchies are not considered.
* @param sharedType the type of the shared Object
* @return the shared Object or null if it is not found
*/
@@ -360,7 +360,7 @@ protected void beforeConfigure() {
/**
* Subclasses must implement this method to build the object that is being returned.
- * @return the Object to be buit or null if the implementation allows it
+ * @return the Object to be built or null if the implementation allows it
*/
protected abstract O performBuild();
@@ -414,12 +414,12 @@ private boolean isUnbuilt() {
private enum BuildState {
/**
- * This is the state before the {@link Builder#build()} is invoked
+ * This is the state before the {@link SecurityBuilder#build()} is invoked
*/
UNBUILT(0),
/**
- * The state from when {@link Builder#build()} is first invoked until all the
+ * The state from when {@link SecurityBuilder#build()} is first invoked until all the
* {@link SecurityConfigurer#init(SecurityBuilder)} methods have been invoked.
*/
INITIALIZING(1),
diff --git a/config/src/main/java/org/springframework/security/config/annotation/web/HttpSecurityBuilder.java b/config/src/main/java/org/springframework/security/config/annotation/web/HttpSecurityBuilder.java
index 633521b9109..89ff01fbcfb 100644
--- a/config/src/main/java/org/springframework/security/config/annotation/web/HttpSecurityBuilder.java
+++ b/config/src/main/java/org/springframework/security/config/annotation/web/HttpSecurityBuilder.java
@@ -82,7 +82,7 @@ public interface HttpSecurityBuilder>
void setSharedObject(Class sharedType, C object);
/**
- * Gets a shared Object. Note that object heirarchies are not considered.
+ * Gets a shared Object. Note that object hierarchies are not considered.
* @param sharedType the type of the shared Object
* @return the shared Object or null if it is not found
*/
diff --git a/config/src/main/java/org/springframework/security/config/annotation/web/builders/FilterOrderRegistration.java b/config/src/main/java/org/springframework/security/config/annotation/web/builders/FilterOrderRegistration.java
index 063ced5e88b..cdfe5728bee 100644
--- a/config/src/main/java/org/springframework/security/config/annotation/web/builders/FilterOrderRegistration.java
+++ b/config/src/main/java/org/springframework/security/config/annotation/web/builders/FilterOrderRegistration.java
@@ -133,7 +133,7 @@ final class FilterOrderRegistration {
/**
* Register a {@link Filter} with its specific position. If the {@link Filter} was
* already registered before, the position previously defined is not going to be
- * overriden
+ * overridden
* @param filter the {@link Filter} to register
* @param position the position to associate with the {@link Filter}
*/
diff --git a/config/src/main/java/org/springframework/security/config/annotation/web/configurers/LogoutConfigurer.java b/config/src/main/java/org/springframework/security/config/annotation/web/configurers/LogoutConfigurer.java
index b70b0e19c54..f4e9cf6e9f8 100644
--- a/config/src/main/java/org/springframework/security/config/annotation/web/configurers/LogoutConfigurer.java
+++ b/config/src/main/java/org/springframework/security/config/annotation/web/configurers/LogoutConfigurer.java
@@ -305,7 +305,7 @@ boolean isCustomLogoutSuccess() {
}
/**
- * Gets the logoutSuccesUrl or null if a
+ * Gets the logoutSuccessUrl or null if a
* {@link #logoutSuccessHandler(LogoutSuccessHandler)} was configured.
* @return the logoutSuccessUrl
*/
diff --git a/config/src/main/java/org/springframework/security/config/annotation/web/configurers/SessionManagementConfigurer.java b/config/src/main/java/org/springframework/security/config/annotation/web/configurers/SessionManagementConfigurer.java
index 4d004de46e7..8e75d47e89e 100644
--- a/config/src/main/java/org/springframework/security/config/annotation/web/configurers/SessionManagementConfigurer.java
+++ b/config/src/main/java/org/springframework/security/config/annotation/web/configurers/SessionManagementConfigurer.java
@@ -146,7 +146,7 @@ public final class SessionManagementConfigurer>
/**
* This should not use RequestAttributeSecurityContextRepository since that is
- * stateless and sesison management is about state management.
+ * stateless and session management is about state management.
*/
private SecurityContextRepository sessionManagementSecurityContextRepository = new HttpSessionSecurityContextRepository();
diff --git a/config/src/main/java/org/springframework/security/config/annotation/web/configurers/saml2/Saml2MetadataConfigurer.java b/config/src/main/java/org/springframework/security/config/annotation/web/configurers/saml2/Saml2MetadataConfigurer.java
index b53717d2003..00e13a15200 100644
--- a/config/src/main/java/org/springframework/security/config/annotation/web/configurers/saml2/Saml2MetadataConfigurer.java
+++ b/config/src/main/java/org/springframework/security/config/annotation/web/configurers/saml2/Saml2MetadataConfigurer.java
@@ -95,7 +95,7 @@ public Saml2MetadataConfigurer(ApplicationContext context) {
* If there is no {@code registrationId} and your
* {@link RelyingPartyRegistrationRepository} is {code Iterable}, the metadata
* endpoint will try and show all relying parties' metadata in a single
- * {@code
* If you need a more sophisticated lookup strategy than these, use
diff --git a/config/src/main/java/org/springframework/security/config/annotation/web/reactive/ServerHttpSecurityConfiguration.java b/config/src/main/java/org/springframework/security/config/annotation/web/reactive/ServerHttpSecurityConfiguration.java
index 1bff8f5dcb3..a68f357fe75 100644
--- a/config/src/main/java/org/springframework/security/config/annotation/web/reactive/ServerHttpSecurityConfiguration.java
+++ b/config/src/main/java/org/springframework/security/config/annotation/web/reactive/ServerHttpSecurityConfiguration.java
@@ -167,7 +167,7 @@ ServerHttpSecurity httpSecurity(ApplicationContext context) {
}
/**
- * Applies all {@code Custmizer} Beans to
+ * Applies all {@code Customizer} Beans to
* {@link ServerHttpSecurity}.
* @param context the {@link ApplicationContext}
* @param http the {@link ServerHttpSecurity}
diff --git a/config/src/main/java/org/springframework/security/config/http/AuthenticationConfigBuilder.java b/config/src/main/java/org/springframework/security/config/http/AuthenticationConfigBuilder.java
index 0cc2af67792..f873b390877 100644
--- a/config/src/main/java/org/springframework/security/config/http/AuthenticationConfigBuilder.java
+++ b/config/src/main/java/org/springframework/security/config/http/AuthenticationConfigBuilder.java
@@ -538,7 +538,7 @@ void createX509Filter(BeanReference authManager,
}
injectAuthenticationDetailsSource(x509Elt, filterBuilder);
filter = (RootBeanDefinition) filterBuilder.getBeanDefinition();
- createPrauthEntryPoint(x509Elt);
+ createPreauthEntryPoint(x509Elt);
createX509Provider();
}
this.x509Filter = filter;
@@ -562,7 +562,7 @@ private void createX509Provider() {
this.x509ProviderRef = new RuntimeBeanReference(this.pc.getReaderContext().registerWithGeneratedName(provider));
}
- private void createPrauthEntryPoint(Element source) {
+ private void createPreauthEntryPoint(Element source) {
if (this.preAuthEntryPoint == null) {
this.preAuthEntryPoint = new RootBeanDefinition(Http403ForbiddenEntryPoint.class);
this.preAuthEntryPoint.setSource(this.pc.extractSource(source));
@@ -595,7 +595,7 @@ void createJeeFilter(BeanReference authManager,
adsBldr.addPropertyValue("mappableRolesRetriever", mappableRolesRetriever);
filterBuilder.addPropertyValue("authenticationDetailsSource", adsBldr.getBeanDefinition());
filter = (RootBeanDefinition) filterBuilder.getBeanDefinition();
- createPrauthEntryPoint(jeeElt);
+ createPreauthEntryPoint(jeeElt);
createJeeProvider();
}
this.jeeFilter = filter;
diff --git a/config/src/main/java/org/springframework/security/config/ldap/LdapServerBeanDefinitionParser.java b/config/src/main/java/org/springframework/security/config/ldap/LdapServerBeanDefinitionParser.java
index 1316560fe92..74bc65e05da 100644
--- a/config/src/main/java/org/springframework/security/config/ldap/LdapServerBeanDefinitionParser.java
+++ b/config/src/main/java/org/springframework/security/config/ldap/LdapServerBeanDefinitionParser.java
@@ -165,20 +165,20 @@ private RootBeanDefinition createEmbeddedServer(Element element, ParserContext p
}
private RootBeanDefinition getRootBeanDefinition(String mode) {
- if (isUnboundidEnabled(mode)) {
+ if (isUnboundIdEnabled(mode)) {
return new RootBeanDefinition(UNBOUNDID_CONTAINER_CLASSNAME, null, null);
}
throw new IllegalStateException("Embedded LDAP server is not provided");
}
private String resolveBeanId(String mode) {
- if (isUnboundidEnabled(mode)) {
+ if (isUnboundIdEnabled(mode)) {
return BeanIds.EMBEDDED_UNBOUNDID;
}
return null;
}
- private boolean isUnboundidEnabled(String mode) {
+ private boolean isUnboundIdEnabled(String mode) {
return "unboundid".equals(mode) || unboundIdPresent;
}
diff --git a/config/src/test/java/org/springframework/security/config/annotation/web/configurers/AuthorizeHttpRequestsConfigurerTests.java b/config/src/test/java/org/springframework/security/config/annotation/web/configurers/AuthorizeHttpRequestsConfigurerTests.java
index 159fe17656a..15fdd19522c 100644
--- a/config/src/test/java/org/springframework/security/config/annotation/web/configurers/AuthorizeHttpRequestsConfigurerTests.java
+++ b/config/src/test/java/org/springframework/security/config/annotation/web/configurers/AuthorizeHttpRequestsConfigurerTests.java
@@ -1340,7 +1340,7 @@ SecurityFilterChain filterChain(HttpSecurity http) throws Exception {
static class ServletPathConfig {
@Bean
- PathPatternRequestMatcherBuilderFactoryBean requesMatcherBuilder() {
+ PathPatternRequestMatcherBuilderFactoryBean requestMatcherBuilder() {
PathPatternRequestMatcherBuilderFactoryBean bean = new PathPatternRequestMatcherBuilderFactoryBean();
bean.setBasePath("/spring");
return bean;
diff --git a/core/src/main/java/org/springframework/security/access/expression/SecurityExpressionOperations.java b/core/src/main/java/org/springframework/security/access/expression/SecurityExpressionOperations.java
index f63f131585f..a40020722f4 100644
--- a/core/src/main/java/org/springframework/security/access/expression/SecurityExpressionOperations.java
+++ b/core/src/main/java/org/springframework/security/access/expression/SecurityExpressionOperations.java
@@ -100,7 +100,7 @@ public interface SecurityExpressionOperations {
boolean isAnonymous();
/**
- * Determines ifthe {@link #getAuthentication()} is authenticated
+ * Determines if the {@link #getAuthentication()} is authenticated
* @return true if the {@link #getAuthentication()} is authenticated, else false
*/
boolean isAuthenticated();
diff --git a/docs/modules/ROOT/pages/servlet/appendix/faq.adoc b/docs/modules/ROOT/pages/servlet/appendix/faq.adoc
index d05269049a1..f4766ad2a17 100644
--- a/docs/modules/ROOT/pages/servlet/appendix/faq.adoc
+++ b/docs/modules/ROOT/pages/servlet/appendix/faq.adoc
@@ -414,7 +414,7 @@ If you build your project with Maven, adding the appropriate Spring Security mod
Any that are marked as "`optional`" in the Spring Security `pom.xml` files have to be added to your own `pom.xml` file if you need them.
[[appendix-faq-unboundid-deps]]
-=== What dependences are needed to run an embedded UnboundID LDAP server?
+=== What dependencies are needed to run an embedded UnboundID LDAP server?
You need to add the following dependency to your project:
diff --git a/docs/modules/ROOT/pages/servlet/configuration/kotlin.adoc b/docs/modules/ROOT/pages/servlet/configuration/kotlin.adoc
index 2d288f0a23e..964dde0e09e 100644
--- a/docs/modules/ROOT/pages/servlet/configuration/kotlin.adoc
+++ b/docs/modules/ROOT/pages/servlet/configuration/kotlin.adoc
@@ -399,7 +399,7 @@ Second, each xref:#httpsecuritydsl-bean[HttpSecurityDsl.() -> Unit Beans] is app
This means that if there are multiple `HttpSecurity.() -> Unit` Beans, the https://docs.spring.io/spring-framework/docs/current/javadoc-api/org/springframework/core/annotation/Order.html[@Order] annotation can be added to the Bean definitions to control the ordering.
Next, every xref:#top-level-dsl-bean[Top Level Security Dsl Beans] type is looked up and each is is applied using `ObjectProvider#orderedStream()`.
-If there is are differt types of top level security Beans (.e.g. `HeadersDsl.() -> Unit` and `HttpsRedirectDsl.() -> Unit`), then the order that each Dsl type is invoked is undefined.
+If there is are different types of top level security Beans (.e.g. `HeadersDsl.() -> Unit` and `HttpsRedirectDsl.() -> Unit`), then the order that each Dsl type is invoked is undefined.
However, the order that each instance of of the same top level security Bean type is defined by `ObjectProvider#orderedStream()` and can be controlled using `@Order` on the Bean the definitions.
Finally, the `HttpSecurityDsl` Bean is injected as a Bean.
diff --git a/kerberos/kerberos-core/src/main/java/org/springframework/security/kerberos/authentication/KerberosServiceAuthenticationProvider.java b/kerberos/kerberos-core/src/main/java/org/springframework/security/kerberos/authentication/KerberosServiceAuthenticationProvider.java
index 229f23ba659..5bdb2b702a8 100644
--- a/kerberos/kerberos-core/src/main/java/org/springframework/security/kerberos/authentication/KerberosServiceAuthenticationProvider.java
+++ b/kerberos/kerberos-core/src/main/java/org/springframework/security/kerberos/authentication/KerberosServiceAuthenticationProvider.java
@@ -39,7 +39,7 @@
* It needs a KerberosTicketValidator, which contains the code to validate
* the ticket, as this code is different between SUN and IBM JRE.
* It also needs an UserDetailsService to load the user properties and the
- * GrantedAuthorities, as we only get back the username from Kerbeos
+ * GrantedAuthorities, as we only get back the username from Kerberos
*
*
* You can see an example configuration in
diff --git a/kerberos/kerberos-core/src/main/java/org/springframework/security/kerberos/authentication/KerberosTicketValidator.java b/kerberos/kerberos-core/src/main/java/org/springframework/security/kerberos/authentication/KerberosTicketValidator.java
index d9a9f6ad68f..468fa842b71 100644
--- a/kerberos/kerberos-core/src/main/java/org/springframework/security/kerberos/authentication/KerberosTicketValidator.java
+++ b/kerberos/kerberos-core/src/main/java/org/springframework/security/kerberos/authentication/KerberosTicketValidator.java
@@ -31,7 +31,7 @@ public interface KerberosTicketValidator {
/**
* Validates a Kerberos/SPNEGO ticket.
- * @param token Kerbeos/SPNEGO ticket
+ * @param token Kerberos/SPNEGO ticket
* @return authenticated kerberos principal
* @throws BadCredentialsException if the ticket is not valid
*/
diff --git a/kerberos/kerberos-web/src/main/java/org/springframework/security/kerberos/web/authentication/SpnegoAuthenticationProcessingFilter.java b/kerberos/kerberos-web/src/main/java/org/springframework/security/kerberos/web/authentication/SpnegoAuthenticationProcessingFilter.java
index 018c0722ad4..0abfedec3b6 100644
--- a/kerberos/kerberos-web/src/main/java/org/springframework/security/kerberos/web/authentication/SpnegoAuthenticationProcessingFilter.java
+++ b/kerberos/kerberos-web/src/main/java/org/springframework/security/kerberos/web/authentication/SpnegoAuthenticationProcessingFilter.java
@@ -76,7 +76,7 @@
* </sec:authentication-manager>
*
* <bean id="kerberosServiceAuthenticationProvider"
- * class="org.springframework.security.kerberos.authenitcation.KerberosServiceAuthenticationProvider">
+ * class="org.springframework.security.kerberos.authentication.KerberosServiceAuthenticationProvider">
* <property name="ticketValidator">
* <bean class="org.springframework.security.kerberos.authentication.sun.SunJaasKerberosTicketValidator">
* <property name="servicePrincipal" value="HTTP/web.springsource.com" />
@@ -103,7 +103,7 @@
* bug.
*
*
- * A workaround unti this is fixed in the JVM is to change
+ * A workaround until this is fixed in the JVM is to change
*
* HKEY_LOCAL_MACHINE\System \CurrentControlSet\Control\LSA\SuppressExtendedProtection to
* 0x02
diff --git a/messaging/src/main/java/org/springframework/security/messaging/util/matcher/PathPatternMessageMatcher.java b/messaging/src/main/java/org/springframework/security/messaging/util/matcher/PathPatternMessageMatcher.java
index b99bfad5f8f..567550a0244 100644
--- a/messaging/src/main/java/org/springframework/security/messaging/util/matcher/PathPatternMessageMatcher.java
+++ b/messaging/src/main/java/org/springframework/security/messaging/util/matcher/PathPatternMessageMatcher.java
@@ -134,9 +134,9 @@ public static class Builder {
* The following are valid patterns and their meaning
*
* - {@code /path} - match exactly and only `/path`
- * - {@code /path/**} - match `/path` and any of its descendents
+ * - {@code /path/**} - match `/path` and any of its descendants
* - {@code /path/{value}/**} - match `/path/subdirectory` and any of its
- * descendents, capturing the value of the subdirectory in
+ * descendants, capturing the value of the subdirectory in
* {@link MessageAuthorizationContext#getVariables()}
*
*
@@ -169,9 +169,9 @@ public PathPatternMessageMatcher matcher(String pattern) {
* The following are valid patterns and their meaning
*
* - {@code /path} - match exactly and only `/path`
- * - {@code /path/**} - match `/path` and any of its descendents
+ * - {@code /path/**} - match `/path` and any of its descendants
* - {@code /path/{value}/**} - match `/path/subdirectory` and any of its
- * descendents, capturing the value of the subdirectory in
+ * descendants, capturing the value of the subdirectory in
* {@link MessageAuthorizationContext#getVariables()}
*
*
diff --git a/saml2/saml2-service-provider/src/main/java/org/springframework/security/saml2/core/Saml2X509Credential.java b/saml2/saml2-service-provider/src/main/java/org/springframework/security/saml2/core/Saml2X509Credential.java
index 7eb083ca18a..b768189fc21 100644
--- a/saml2/saml2-service-provider/src/main/java/org/springframework/security/saml2/core/Saml2X509Credential.java
+++ b/saml2/saml2-service-provider/src/main/java/org/springframework/security/saml2/core/Saml2X509Credential.java
@@ -48,7 +48,7 @@ public final class Saml2X509Credential implements Serializable {
/**
* Creates a {@link Saml2X509Credential} using the provided parameters
- * @param certificate the credential's public certificiate
+ * @param certificate the credential's public certificate
* @param types the credential's intended usages, must be one of
* {@link Saml2X509CredentialType#VERIFICATION} or
* {@link Saml2X509CredentialType#ENCRYPTION} or both.
diff --git a/test/src/main/java/org/springframework/security/test/web/servlet/request/SecurityMockMvcRequestPostProcessors.java b/test/src/main/java/org/springframework/security/test/web/servlet/request/SecurityMockMvcRequestPostProcessors.java
index d6ac8d9f0bb..110e496e48f 100644
--- a/test/src/main/java/org/springframework/security/test/web/servlet/request/SecurityMockMvcRequestPostProcessors.java
+++ b/test/src/main/java/org/springframework/security/test/web/servlet/request/SecurityMockMvcRequestPostProcessors.java
@@ -148,7 +148,7 @@ public static DigestRequestPostProcessor digest(String username) {
/**
* Populates the provided X509Certificate instances on the request.
- * @param certificates the X509Certificate instances to pouplate
+ * @param certificates the X509Certificate instances to populate
* @return the
* {@link org.springframework.test.web.servlet.request.RequestPostProcessor} to use.
*/
@@ -157,7 +157,7 @@ public static RequestPostProcessor x509(X509Certificate... certificates) {
}
/**
- * Finds an X509Cetificate using a resoureName and populates it on the request.
+ * Finds an X509Certificate using a resourceName and populates it on the request.
* @param resourceName the name of the X509Certificate resource
* @return the
* {@link org.springframework.test.web.servlet.request.RequestPostProcessor} to use.
diff --git a/web/src/main/java/org/springframework/security/web/access/expression/EvaluationContextPostProcessor.java b/web/src/main/java/org/springframework/security/web/access/expression/EvaluationContextPostProcessor.java
index 75524587952..55d91cdb07a 100644
--- a/web/src/main/java/org/springframework/security/web/access/expression/EvaluationContextPostProcessor.java
+++ b/web/src/main/java/org/springframework/security/web/access/expression/EvaluationContextPostProcessor.java
@@ -38,7 +38,7 @@ interface EvaluationContextPostProcessor {
* that was passed in.
* @param context the original {@link EvaluationContext}
* @param invocation the security invocation object (i.e. FilterInvocation)
- * @return the upated context.
+ * @return the updated context.
*/
EvaluationContext postProcess(EvaluationContext context, I invocation);
diff --git a/web/src/main/java/org/springframework/security/web/authentication/preauth/websphere/DefaultWASUsernameAndGroupsExtractor.java b/web/src/main/java/org/springframework/security/web/authentication/preauth/websphere/DefaultWASUsernameAndGroupsExtractor.java
index 7d97500b6f7..f67dfd53d28 100755
--- a/web/src/main/java/org/springframework/security/web/authentication/preauth/websphere/DefaultWASUsernameAndGroupsExtractor.java
+++ b/web/src/main/java/org/springframework/security/web/authentication/preauth/websphere/DefaultWASUsernameAndGroupsExtractor.java
@@ -133,8 +133,8 @@ private static List getWebSphereGroups(final @Nullable String securityNa
return new ArrayList<>(groups);
}
catch (Exception ex) {
- logger.error("Exception occured while looking up groups for user", ex);
- throw new RuntimeException("Exception occured while looking up groups for user", ex);
+ logger.error("Exception occurred while looking up groups for user", ex);
+ throw new RuntimeException("Exception occurred while looking up groups for user", ex);
}
finally {
closeContext(context);
@@ -148,7 +148,7 @@ private static void closeContext(@Nullable Context context) {
}
}
catch (NamingException ex) {
- logger.debug("Exception occured while closing context", ex);
+ logger.debug("Exception occurred while closing context", ex);
}
}
diff --git a/web/src/main/java/org/springframework/security/web/authentication/rememberme/RememberMeAuthenticationFilter.java b/web/src/main/java/org/springframework/security/web/authentication/rememberme/RememberMeAuthenticationFilter.java
index 49ad13b8810..d54bfc0bbb6 100644
--- a/web/src/main/java/org/springframework/security/web/authentication/rememberme/RememberMeAuthenticationFilter.java
+++ b/web/src/main/java/org/springframework/security/web/authentication/rememberme/RememberMeAuthenticationFilter.java
@@ -164,7 +164,7 @@ protected void onSuccessfulAuthentication(HttpServletRequest request, HttpServle
* Called if the {@code AuthenticationManager} rejects the authentication object
* returned from the {@code RememberMeServices} {@code autoLogin} method. This method
* will not be called when no remember-me token is present in the request and
- * {@code autoLogin} reurns null.
+ * {@code autoLogin} returns {@code null}.
*/
protected void onUnsuccessfulAuthentication(HttpServletRequest request, HttpServletResponse response,
AuthenticationException failed) {
@@ -184,7 +184,7 @@ public void setApplicationEventPublisher(ApplicationEventPublisher eventPublishe
* successfully authenticated. By default, the filter will just allow the current
* request to proceed, but if an {@code AuthenticationSuccessHandler} is set, it will
* be invoked and the {@code doFilter()} method will return immediately, thus allowing
- * the application to redirect the user to a specific URL, regardless of whatthe
+ * the application to redirect the user to a specific URL, regardless of what the
* original request was for.
* @param successHandler the strategy to invoke immediately before returning from
* {@code doFilter()}.
diff --git a/web/src/main/java/org/springframework/security/web/csrf/HttpSessionCsrfTokenRepository.java b/web/src/main/java/org/springframework/security/web/csrf/HttpSessionCsrfTokenRepository.java
index 834c455b5c8..6907cd69593 100644
--- a/web/src/main/java/org/springframework/security/web/csrf/HttpSessionCsrfTokenRepository.java
+++ b/web/src/main/java/org/springframework/security/web/csrf/HttpSessionCsrfTokenRepository.java
@@ -100,7 +100,7 @@ public void setHeaderName(String headerName) {
* @param sessionAttributeName the new attribute name to use
*/
public void setSessionAttributeName(String sessionAttributeName) {
- Assert.hasLength(sessionAttributeName, "sessionAttributename cannot be null or empty");
+ Assert.hasLength(sessionAttributeName, "sessionAttributeName cannot be null or empty");
this.sessionAttributeName = sessionAttributeName;
}
diff --git a/web/src/main/java/org/springframework/security/web/firewall/StrictHttpFirewall.java b/web/src/main/java/org/springframework/security/web/firewall/StrictHttpFirewall.java
index b1bcd907fc0..89a556d398c 100644
--- a/web/src/main/java/org/springframework/security/web/firewall/StrictHttpFirewall.java
+++ b/web/src/main/java/org/springframework/security/web/firewall/StrictHttpFirewall.java
@@ -799,17 +799,17 @@ public Map getParameterMap() {
@Override
public Enumeration getParameterNames() {
- Enumeration paramaterNames = super.getParameterNames();
+ Enumeration parameterNames = super.getParameterNames();
return new Enumeration<>() {
@Override
public boolean hasMoreElements() {
- return paramaterNames.hasMoreElements();
+ return parameterNames.hasMoreElements();
}
@Override
public String nextElement() {
- String name = paramaterNames.nextElement();
+ String name = parameterNames.nextElement();
validateAllowedParameterName(name);
return name;
}
diff --git a/web/src/main/java/org/springframework/security/web/header/writers/PermissionsPolicyHeaderWriter.java b/web/src/main/java/org/springframework/security/web/header/writers/PermissionsPolicyHeaderWriter.java
index a6dab3bdb4f..cae663c8b58 100644
--- a/web/src/main/java/org/springframework/security/web/header/writers/PermissionsPolicyHeaderWriter.java
+++ b/web/src/main/java/org/springframework/security/web/header/writers/PermissionsPolicyHeaderWriter.java
@@ -25,7 +25,7 @@
/**
* Provides support for
- * Permisisons Policy.
+ * Permissions Policy.
*
* Permissions Policy allows web developers to selectively enable, disable, and modify the
* behavior of certain APIs and web features in the browser.
diff --git a/web/src/main/java/org/springframework/security/web/header/writers/frameoptions/RegExpAllowFromStrategy.java b/web/src/main/java/org/springframework/security/web/header/writers/frameoptions/RegExpAllowFromStrategy.java
index a3dd7788439..51fbf2e2bc6 100644
--- a/web/src/main/java/org/springframework/security/web/header/writers/frameoptions/RegExpAllowFromStrategy.java
+++ b/web/src/main/java/org/springframework/security/web/header/writers/frameoptions/RegExpAllowFromStrategy.java
@@ -23,7 +23,7 @@
/**
* Implementation which uses a regular expression to validate the supplied origin. If the
* value of the HTTP parameter matches the pattern, then the result will be ALLOW-FROM
- * <paramter-value>.
+ * <parameter-value>.
*
* @author Marten Deinum
* @since 3.2
diff --git a/web/src/main/java/org/springframework/security/web/savedrequest/FastHttpDateFormat.java b/web/src/main/java/org/springframework/security/web/savedrequest/FastHttpDateFormat.java
index 9c0d0dbf230..cf035183871 100644
--- a/web/src/main/java/org/springframework/security/web/savedrequest/FastHttpDateFormat.java
+++ b/web/src/main/java/org/springframework/security/web/savedrequest/FastHttpDateFormat.java
@@ -141,7 +141,7 @@ public static String formatDate(long value, DateFormat threadLocalformat) {
* Parses date with given formatters.
* @param value The string to parse
* @param formats Array of formats to use
- * @return Parsed date (or null if no formatter mached)
+ * @return Parsed date (or null if no formatter matched)
*/
private static @Nullable Long internalParseDate(String value, DateFormat[] formats) {
Date date = null;
diff --git a/web/src/main/java/org/springframework/security/web/server/authentication/AuthenticationWebFilter.java b/web/src/main/java/org/springframework/security/web/server/authentication/AuthenticationWebFilter.java
index 528ab64d54c..9ed78a46f53 100644
--- a/web/src/main/java/org/springframework/security/web/server/authentication/AuthenticationWebFilter.java
+++ b/web/src/main/java/org/springframework/security/web/server/authentication/AuthenticationWebFilter.java
@@ -126,14 +126,14 @@ private Mono authenticate(ServerWebExchange exchange, WebFilterChain chain
.flatMap((authenticationManager) -> authenticationManager.authenticate(token))
.switchIfEmpty(Mono
.defer(() -> Mono.error(new IllegalStateException("No provider found for " + token.getClass()))))
- .flatMap(this::applyCurrentAuthenication)
+ .flatMap(this::applyCurrentAuthentication)
.flatMap(
(authentication) -> onAuthenticationSuccess(authentication, new WebFilterExchange(exchange, chain)))
.doOnError(AuthenticationException.class,
(ex) -> logger.debug(LogMessage.format("Authentication failed: %s", ex.getMessage()), ex));
}
- private Mono applyCurrentAuthenication(Authentication result) {
+ private Mono applyCurrentAuthentication(Authentication result) {
return ReactiveSecurityContextHolder.getContext().map((context) -> {
Authentication current = context.getAuthentication();
if (current == null) {
diff --git a/web/src/main/java/org/springframework/security/web/servlet/util/matcher/PathPatternRequestMatcher.java b/web/src/main/java/org/springframework/security/web/servlet/util/matcher/PathPatternRequestMatcher.java
index c7a2b45bcfe..6b13beb9242 100644
--- a/web/src/main/java/org/springframework/security/web/servlet/util/matcher/PathPatternRequestMatcher.java
+++ b/web/src/main/java/org/springframework/security/web/servlet/util/matcher/PathPatternRequestMatcher.java
@@ -268,9 +268,9 @@ public Builder basePath(String basePath) {
* The following are valid patterns and their meaning
*
* - {@code /path} - match exactly and only `/path`
- * - {@code /path/**} - match `/path` and any of its descendents
+ * - {@code /path/**} - match `/path` and any of its descendants
* - {@code /path/{value}/**} - match `/path/subdirectory` and any of its
- * descendents, capturing the value of the subdirectory in
+ * descendants, capturing the value of the subdirectory in
* {@link RequestAuthorizationContext#getVariables()}
*
*
@@ -303,9 +303,9 @@ public PathPatternRequestMatcher matcher(String path) {
* The following are valid patterns and their meaning
*
* - {@code /path} - match exactly and only `/path`
- * - {@code /path/**} - match `/path` and any of its descendents
+ * - {@code /path/**} - match `/path` and any of its descendants
* - {@code /path/{value}/**} - match `/path/subdirectory` and any of its
- * descendents, capturing the value of the subdirectory in
+ * descendants, capturing the value of the subdirectory in
* {@link RequestAuthorizationContext#getVariables()}
*
*
diff --git a/web/src/main/java/org/springframework/security/web/util/ThrowableAnalyzer.java b/web/src/main/java/org/springframework/security/web/util/ThrowableAnalyzer.java
index 72d788924e0..700d97a7117 100755
--- a/web/src/main/java/org/springframework/security/web/util/ThrowableAnalyzer.java
+++ b/web/src/main/java/org/springframework/security/web/util/ThrowableAnalyzer.java
@@ -72,8 +72,7 @@ public class ThrowableAnalyzer {
};
/**
- * Map of registered cause extractors. key: Class<Throwable>; value:
- * ThrowableCauseExctractor
+ * Map of registered cause extractors. key: Class<Throwable>; value: ThrowableCauseExtractor
*/
private final Map, ThrowableCauseExtractor> extractorMap;
diff --git a/web/src/main/java/org/springframework/security/web/util/UrlUtils.java b/web/src/main/java/org/springframework/security/web/util/UrlUtils.java
index 099caea7a56..2298a51b480 100644
--- a/web/src/main/java/org/springframework/security/web/util/UrlUtils.java
+++ b/web/src/main/java/org/springframework/security/web/util/UrlUtils.java
@@ -87,7 +87,7 @@ else if ("https".equals(scheme)) {
* (SEC-1255). This method is typically used to return a URL for matching against
* secured paths, hence the decoded form is used in preference to the requestURI for
* building the returned value. But this method may also be called using dummy request
- * objects which just have the requestURI and contextPatth set, for example, so it
+ * objects which just have the requestURI and contextPath set, for example, so it
* will fall back to using those.
* @return the decoded URL, excluding any server name, context path or servlet path
*
diff --git a/web/src/test/java/org/springframework/security/web/session/HttpSessionEventPublisherTests.java b/web/src/test/java/org/springframework/security/web/session/HttpSessionEventPublisherTests.java
index 61dc404e849..03b95a2e00b 100644
--- a/web/src/test/java/org/springframework/security/web/session/HttpSessionEventPublisherTests.java
+++ b/web/src/test/java/org/springframework/security/web/session/HttpSessionEventPublisherTests.java
@@ -38,7 +38,7 @@ public class HttpSessionEventPublisherTests {
* It's not that complicated so we'll just run it straight through here.
*/
@Test
- public void publishedEventIsReceivedbyListener() {
+ public void publishedEventIsReceivedByListener() {
HttpSessionEventPublisher publisher = new HttpSessionEventPublisher();
StaticWebApplicationContext context = new StaticWebApplicationContext();
MockServletContext servletContext = new MockServletContext();
@@ -66,7 +66,7 @@ public void publishedEventIsReceivedbyListener() {
}
@Test
- public void publishedEventIsReceivedbyListenerChildContext() {
+ public void publishedEventIsReceivedByListenerChildContext() {
HttpSessionEventPublisher publisher = new HttpSessionEventPublisher();
StaticWebApplicationContext context = new StaticWebApplicationContext();
MockServletContext servletContext = new MockServletContext();
diff --git a/webauthn/src/main/java/org/springframework/security/web/webauthn/api/CredentialRecord.java b/webauthn/src/main/java/org/springframework/security/web/webauthn/api/CredentialRecord.java
index 21c769b17cf..7611e5f06c6 100644
--- a/webauthn/src/main/java/org/springframework/security/web/webauthn/api/CredentialRecord.java
+++ b/webauthn/src/main/java/org/springframework/security/web/webauthn/api/CredentialRecord.java
@@ -71,7 +71,7 @@ public interface CredentialRecord {
/**
* The transpots
+ * "https://www.w3.org/TR/webauthn-3/#abstract-opdef-credential-record-transports">transports
* is the value returned from {@code response.getTransports()}.
* @return
*/
diff --git a/webauthn/src/main/java/org/springframework/security/web/webauthn/api/PublicKeyCredential.java b/webauthn/src/main/java/org/springframework/security/web/webauthn/api/PublicKeyCredential.java
index 438a169d1f2..fa8cc99663d 100644
--- a/webauthn/src/main/java/org/springframework/security/web/webauthn/api/PublicKeyCredential.java
+++ b/webauthn/src/main/java/org/springframework/security/web/webauthn/api/PublicKeyCredential.java
@@ -203,7 +203,7 @@ public PublicKeyCredentialBuilder response(R response) {
/**
* Sets the {@link #getAuthenticatorAttachment()} property.
- * @param authenticatorAttachment the authenticator attachement
+ * @param authenticatorAttachment the authenticator attachment
* @return the PublicKeyCredentialBuilder
*/
public PublicKeyCredentialBuilder authenticatorAttachment(AuthenticatorAttachment authenticatorAttachment) {
diff --git a/webauthn/src/main/java/org/springframework/security/web/webauthn/api/PublicKeyCredentialCreationOptions.java b/webauthn/src/main/java/org/springframework/security/web/webauthn/api/PublicKeyCredentialCreationOptions.java
index 5e5c0ccacbf..0bba299b394 100644
--- a/webauthn/src/main/java/org/springframework/security/web/webauthn/api/PublicKeyCredentialCreationOptions.java
+++ b/webauthn/src/main/java/org/springframework/security/web/webauthn/api/PublicKeyCredentialCreationOptions.java
@@ -105,7 +105,7 @@ public Bytes getChallenge() {
/**
* The publicKeyCredParams
- * params lisst the key types and signature algorithms the Relying Party Supports,
+ * params list the key types and signature algorithms the Relying Party Supports,
* ordered from most preferred to least preferred.
* @return the public key credential parameters
*/
diff --git a/webauthn/src/main/java/org/springframework/security/web/webauthn/api/ResidentKeyRequirement.java b/webauthn/src/main/java/org/springframework/security/web/webauthn/api/ResidentKeyRequirement.java
index 370c3b6a935..b3f9f216a09 100644
--- a/webauthn/src/main/java/org/springframework/security/web/webauthn/api/ResidentKeyRequirement.java
+++ b/webauthn/src/main/java/org/springframework/security/web/webauthn/api/ResidentKeyRequirement.java
@@ -19,7 +19,7 @@
/**
* The ResidentKeyRequirement
- * describes the Relying Partys requirements for client-side discoverable credentials.
+ * describes the Relying Party requirements for client-side discoverable credentials.
*
* @author Rob Winch
* @since 6.4
From 30be7402b2710953535ec9c08aa55380e8da36a9 Mon Sep 17 00:00:00 2001
From: Tran Ngoc Nhan
Date: Sat, 1 Nov 2025 14:16:22 +0700
Subject: [PATCH 2/2] Format code
Signed-off-by: Tran Ngoc Nhan
---
.../security/cas/web/CasAuthenticationFilter.java | 4 ++--
.../config/annotation/AbstractConfiguredSecurityBuilder.java | 4 ++--
.../springframework/security/web/util/ThrowableAnalyzer.java | 3 ++-
.../java/org/springframework/security/web/util/UrlUtils.java | 4 ++--
4 files changed, 8 insertions(+), 7 deletions(-)
diff --git a/cas/src/main/java/org/springframework/security/cas/web/CasAuthenticationFilter.java b/cas/src/main/java/org/springframework/security/cas/web/CasAuthenticationFilter.java
index 7df0846ea52..9d4d3ce99ce 100644
--- a/cas/src/main/java/org/springframework/security/cas/web/CasAuthenticationFilter.java
+++ b/cas/src/main/java/org/springframework/security/cas/web/CasAuthenticationFilter.java
@@ -383,8 +383,8 @@ public final void setRequestCache(RequestCache requestCache) {
}
/**
- * Indicates if the request is eligible to process a service ticket. This method exists
- * for readability.
+ * Indicates if the request is eligible to process a service ticket. This method
+ * exists for readability.
* @param request
* @param response
* @return
diff --git a/config/src/main/java/org/springframework/security/config/annotation/AbstractConfiguredSecurityBuilder.java b/config/src/main/java/org/springframework/security/config/annotation/AbstractConfiguredSecurityBuilder.java
index f96ea84080f..527eb84759f 100644
--- a/config/src/main/java/org/springframework/security/config/annotation/AbstractConfiguredSecurityBuilder.java
+++ b/config/src/main/java/org/springframework/security/config/annotation/AbstractConfiguredSecurityBuilder.java
@@ -419,8 +419,8 @@ private enum BuildState {
UNBUILT(0),
/**
- * The state from when {@link SecurityBuilder#build()} is first invoked until all the
- * {@link SecurityConfigurer#init(SecurityBuilder)} methods have been invoked.
+ * The state from when {@link SecurityBuilder#build()} is first invoked until all
+ * the {@link SecurityConfigurer#init(SecurityBuilder)} methods have been invoked.
*/
INITIALIZING(1),
diff --git a/web/src/main/java/org/springframework/security/web/util/ThrowableAnalyzer.java b/web/src/main/java/org/springframework/security/web/util/ThrowableAnalyzer.java
index 700d97a7117..576e24d8b2d 100755
--- a/web/src/main/java/org/springframework/security/web/util/ThrowableAnalyzer.java
+++ b/web/src/main/java/org/springframework/security/web/util/ThrowableAnalyzer.java
@@ -72,7 +72,8 @@ public class ThrowableAnalyzer {
};
/**
- * Map of registered cause extractors. key: Class<Throwable>; value: ThrowableCauseExtractor
+ * Map of registered cause extractors. key: Class<Throwable>; value:
+ * ThrowableCauseExtractor
*/
private final Map, ThrowableCauseExtractor> extractorMap;
diff --git a/web/src/main/java/org/springframework/security/web/util/UrlUtils.java b/web/src/main/java/org/springframework/security/web/util/UrlUtils.java
index 2298a51b480..926872a0d1b 100644
--- a/web/src/main/java/org/springframework/security/web/util/UrlUtils.java
+++ b/web/src/main/java/org/springframework/security/web/util/UrlUtils.java
@@ -87,8 +87,8 @@ else if ("https".equals(scheme)) {
* (SEC-1255). This method is typically used to return a URL for matching against
* secured paths, hence the decoded form is used in preference to the requestURI for
* building the returned value. But this method may also be called using dummy request
- * objects which just have the requestURI and contextPath set, for example, so it
- * will fall back to using those.
+ * objects which just have the requestURI and contextPath set, for example, so it will
+ * fall back to using those.
* @return the decoded URL, excluding any server name, context path or servlet path
*
*/