Format Java files with google-java-format 1.6

According to google java style guides wildcard imports are not used:[1].

[1] https://google.github.io/styleguide/javaguide.html#s3.3.1-wildcard-imports

Change-Id: I6fec9f95a4c1cd502a72596c8ac79ecc77ee79dd
diff --git a/src/main/java/com/thesamet/gerrit/plugins/saml/AuthenticatedUser.java b/src/main/java/com/thesamet/gerrit/plugins/saml/AuthenticatedUser.java
index 5836585..85792eb 100644
--- a/src/main/java/com/thesamet/gerrit/plugins/saml/AuthenticatedUser.java
+++ b/src/main/java/com/thesamet/gerrit/plugins/saml/AuthenticatedUser.java
@@ -15,41 +15,49 @@
 package com.thesamet.gerrit.plugins.saml;
 
 public class AuthenticatedUser implements java.io.Serializable {
-    private String username;
-    private String displayName;
-    private String email;
-    private String externalId;
+  private String username;
+  private String displayName;
+  private String email;
+  private String externalId;
 
-    public AuthenticatedUser(String username, String displayName, String email, String externalId) {
-        this.username = username;
-        this.displayName = displayName;
-        this.email = email;
-        this.externalId = externalId;
-    }
+  public AuthenticatedUser(String username, String displayName, String email, String externalId) {
+    this.username = username;
+    this.displayName = displayName;
+    this.email = email;
+    this.externalId = externalId;
+  }
 
-    public String getUsername() {
-        return username;
-    }
+  public String getUsername() {
+    return username;
+  }
 
-    public String getDisplayName() {
-        return displayName;
-    }
+  public String getDisplayName() {
+    return displayName;
+  }
 
-    public String getEmail() {
-        return email;
-    }
+  public String getEmail() {
+    return email;
+  }
 
-    public String getExternalId() {
-        return externalId;
-    }
+  public String getExternalId() {
+    return externalId;
+  }
 
-    @Override
-    public String toString() {
-        return "AuthenticatedUser{" +
-                "username='" + username + '\'' +
-                ", displayName='" + displayName + '\'' +
-                ", email='" + email + '\'' +
-                ", externalId='" + externalId + '\'' +
-                '}';
-    }
+  @Override
+  public String toString() {
+    return "AuthenticatedUser{"
+        + "username='"
+        + username
+        + '\''
+        + ", displayName='"
+        + displayName
+        + '\''
+        + ", email='"
+        + email
+        + '\''
+        + ", externalId='"
+        + externalId
+        + '\''
+        + '}';
+  }
 }
diff --git a/src/main/java/com/thesamet/gerrit/plugins/saml/SamlConfig.java b/src/main/java/com/thesamet/gerrit/plugins/saml/SamlConfig.java
index ed0e05a..8b64ebd 100644
--- a/src/main/java/com/thesamet/gerrit/plugins/saml/SamlConfig.java
+++ b/src/main/java/com/thesamet/gerrit/plugins/saml/SamlConfig.java
@@ -17,12 +17,9 @@
 import com.google.gerrit.server.config.GerritServerConfig;
 import com.google.inject.Inject;
 import com.google.inject.Singleton;
-
 import org.eclipse.jgit.lib.Config;
 
-/**
- * SAML 2.0 related settings from {@code gerrit.config}.
- */
+/** SAML 2.0 related settings from {@code gerrit.config}. */
 @Singleton
 public class SamlConfig {
 
@@ -42,11 +39,9 @@
     keystorePath = getString(cfg, "keystorePath");
     privateKeyPassword = getString(cfg, "privateKeyPassword");
     keystorePassword = getString(cfg, "keystorePassword");
-    displayNameAttr =
-        getGetStringWithDefault(cfg, "displayNameAttr", "DisplayName");
+    displayNameAttr = getGetStringWithDefault(cfg, "displayNameAttr", "DisplayName");
     userNameAttr = getGetStringWithDefault(cfg, "userNameAttr", "UserName");
-    emailAddressAttr =
-        getGetStringWithDefault(cfg, "emailAddressAttr", "EmailAddress");
+    emailAddressAttr = getGetStringWithDefault(cfg, "emailAddressAttr", "EmailAddress");
     maxAuthLifetimeAttr = cfg.getInt("saml", "maxAuthLifetime", maxAuthLifetimeDefault);
   }
 
@@ -86,8 +81,7 @@
     return cfg.getString("saml", null, name);
   }
 
-  private static String getGetStringWithDefault(Config cfg, String name,
-      String defaultValue) {
+  private static String getGetStringWithDefault(Config cfg, String name, String defaultValue) {
     String result = getString(cfg, name);
     if (result != null) {
       return result;
diff --git a/src/main/java/com/thesamet/gerrit/plugins/saml/SamlWebFilter.java b/src/main/java/com/thesamet/gerrit/plugins/saml/SamlWebFilter.java
index 2888581..66313d2 100644
--- a/src/main/java/com/thesamet/gerrit/plugins/saml/SamlWebFilter.java
+++ b/src/main/java/com/thesamet/gerrit/plugins/saml/SamlWebFilter.java
@@ -20,6 +20,21 @@
 import com.google.gerrit.server.config.GerritServerConfig;
 import com.google.inject.Inject;
 import com.google.inject.Singleton;
+import java.io.IOException;
+import java.util.Enumeration;
+import java.util.HashSet;
+import java.util.List;
+import javax.annotation.Nonnull;
+import javax.servlet.Filter;
+import javax.servlet.FilterChain;
+import javax.servlet.FilterConfig;
+import javax.servlet.ServletException;
+import javax.servlet.ServletRequest;
+import javax.servlet.ServletResponse;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletRequestWrapper;
+import javax.servlet.http.HttpServletResponse;
+import javax.servlet.http.HttpSession;
 import org.eclipse.jgit.lib.Config;
 import org.pac4j.core.context.J2EContext;
 import org.pac4j.core.exception.HttpAction;
@@ -31,269 +46,257 @@
 import org.slf4j.Logger;
 import org.slf4j.LoggerFactory;
 
-import javax.annotation.Nonnull;
-import javax.servlet.*;
-import javax.servlet.http.HttpServletRequest;
-import javax.servlet.http.HttpServletRequestWrapper;
-import javax.servlet.http.HttpServletResponse;
-import javax.servlet.http.HttpSession;
-import java.io.IOException;
-import java.util.Enumeration;
-import java.util.HashSet;
-import java.util.List;
-
 @Singleton
 class SamlWebFilter implements Filter {
-    static final String GERRIT_LOGOUT = "/logout";
-    static final String GERRIT_LOGIN = "/login";
-    static final String SAML_POSTBACK = "/plugins/gerrit-saml-plugin/saml";
+  static final String GERRIT_LOGOUT = "/logout";
+  static final String GERRIT_LOGIN = "/login";
+  static final String SAML_POSTBACK = "/plugins/gerrit-saml-plugin/saml";
 
-    private static final String SESSION_ATTR_USER = "Gerrit-Saml-User";
+  private static final String SESSION_ATTR_USER = "Gerrit-Saml-User";
 
-    static final Logger log = LoggerFactory.getLogger(SamlWebFilter.class);
-    private final SAML2Client saml2Client;
-    private final SamlConfig samlConfig;
-    private final String httpUserNameHeader;
-    private final String httpDisplaynameHeader;
-    private final String httpEmailHeader;
-    private final String httpExternalIdHeader;
-    private final HashSet<String> authHeaders;
+  static final Logger log = LoggerFactory.getLogger(SamlWebFilter.class);
+  private final SAML2Client saml2Client;
+  private final SamlConfig samlConfig;
+  private final String httpUserNameHeader;
+  private final String httpDisplaynameHeader;
+  private final String httpEmailHeader;
+  private final String httpExternalIdHeader;
+  private final HashSet<String> authHeaders;
 
-    private String getHeaderFromConfig(Config gerritConfig, String name) {
-        String s = gerritConfig.getString("auth", null, name);
-        return s == null ? "" : s.toUpperCase();
+  private String getHeaderFromConfig(Config gerritConfig, String name) {
+    String s = gerritConfig.getString("auth", null, name);
+    return s == null ? "" : s.toUpperCase();
+  }
+
+  @Inject
+  SamlWebFilter(@GerritServerConfig Config gerritConfig, SamlConfig samlConfig) {
+    this.samlConfig = samlConfig;
+    log.debug("Max Authentication Lifetime: " + samlConfig.getMaxAuthLifetimeAttr());
+    SAML2ClientConfiguration samlClientConfig =
+        new SAML2ClientConfiguration(
+            samlConfig.getKeystorePath(), samlConfig.getKeystorePassword(),
+            samlConfig.getPrivateKeyPassword(), samlConfig.getMetadataPath());
+    samlClientConfig.setMaximumAuthenticationLifetime(samlConfig.getMaxAuthLifetimeAttr());
+    saml2Client = new SAML2Client(samlClientConfig);
+    String callbackUrl =
+        gerritConfig.getString("gerrit", null, "canonicalWebUrl")
+            + "plugins/gerrit-saml-plugin/saml";
+    httpUserNameHeader = getHeaderFromConfig(gerritConfig, "httpHeader");
+    httpDisplaynameHeader = getHeaderFromConfig(gerritConfig, "httpDisplaynameHeader");
+    httpEmailHeader = getHeaderFromConfig(gerritConfig, "httpEmailHeader");
+    httpExternalIdHeader = getHeaderFromConfig(gerritConfig, "httpExternalIdHeader");
+    authHeaders =
+        Sets.newHashSet(
+            httpUserNameHeader, httpDisplaynameHeader, httpEmailHeader, httpExternalIdHeader);
+    if (authHeaders.contains("") || authHeaders.contains(null)) {
+      throw new RuntimeException("All authentication headers must be set.");
+    }
+    if (authHeaders.size() != 4) {
+      throw new RuntimeException(
+          "Unique values for httpUserNameHeader, "
+              + "httpDisplaynameHeader, httpEmailHeader and httpExternalIdHeader "
+              + "are required.");
     }
 
-    @Inject
-    SamlWebFilter(@GerritServerConfig Config gerritConfig, SamlConfig samlConfig) {
-        this.samlConfig = samlConfig;
-        log.debug("Max Authentication Lifetime: " + samlConfig.getMaxAuthLifetimeAttr());
-        SAML2ClientConfiguration samlClientConfig = new SAML2ClientConfiguration(
-                samlConfig.getKeystorePath(), samlConfig.getKeystorePassword(),
-                samlConfig.getPrivateKeyPassword(), samlConfig.getMetadataPath());
-        samlClientConfig.setMaximumAuthenticationLifetime(samlConfig.getMaxAuthLifetimeAttr());
-        saml2Client =
-                new SAML2Client(samlClientConfig);
-        String callbackUrl = gerritConfig.getString("gerrit", null, "canonicalWebUrl") + "plugins/gerrit-saml-plugin/saml";
-        httpUserNameHeader = getHeaderFromConfig(gerritConfig, "httpHeader");
-        httpDisplaynameHeader = getHeaderFromConfig(gerritConfig, "httpDisplaynameHeader");
-        httpEmailHeader = getHeaderFromConfig(gerritConfig, "httpEmailHeader");
-        httpExternalIdHeader = getHeaderFromConfig(gerritConfig, "httpExternalIdHeader");
-        authHeaders = Sets.newHashSet(
-                httpUserNameHeader,
-                httpDisplaynameHeader,
-                httpEmailHeader,
-                httpExternalIdHeader);
-        if (authHeaders.contains("") || authHeaders.contains(null)) {
-            throw new RuntimeException("All authentication headers must be set.");
+    saml2Client.setCallbackUrl(callbackUrl);
+  }
+
+  @Override
+  public void init(FilterConfig filterConfig) throws ServletException {}
+
+  @Override
+  public void destroy() {}
+
+  private AuthenticatedUser userFromRequest(HttpServletRequest request) {
+    HttpSession s = request.getSession();
+    AuthenticatedUser user = (AuthenticatedUser) s.getAttribute(SESSION_ATTR_USER);
+    if (user == null || user.getUsername() == null) return null;
+    else return user;
+  }
+
+  private void signin(J2EContext context) throws HttpAction, IOException {
+    SAML2Credentials credentials = saml2Client.getCredentials(context);
+    SAML2Profile user = saml2Client.getUserProfile(credentials, context);
+    if (user != null) {
+      log.debug(
+          "Received SAML callback for userId={} with attributes: {}",
+          getUserName(user),
+          user.getAttributes());
+      HttpSession s = context.getRequest().getSession();
+      s.setAttribute(
+          SESSION_ATTR_USER,
+          new AuthenticatedUser(
+              getUserName(user),
+              getDisplayName(user),
+              getEmailAddress(user),
+              "saml/" + user.getId()));
+
+      String redirectUri = context.getRequest().getParameter("RelayState");
+      if (null == redirectUri || redirectUri.isEmpty()) {
+        redirectUri = "/";
+      }
+      context.getResponse().sendRedirect(context.getRequest().getContextPath() + redirectUri);
+    }
+  }
+
+  @Override
+  public void doFilter(ServletRequest incomingRequest, ServletResponse response, FilterChain chain)
+      throws IOException, ServletException {
+    /* The first thing we do is to wrap the request in an anonymous request, so in case
+      a malicious user is trying to set the headers manually, they'll be discarded.
+    */
+    HttpServletRequest httpRequest = new AnonymousHttpRequest((HttpServletRequest) incomingRequest);
+    HttpServletResponse httpResponse = (HttpServletResponse) response;
+    AuthenticatedUser user = userFromRequest(httpRequest);
+
+    try {
+      if (isSamlPostback(httpRequest)) {
+        J2EContext context = new J2EContext(httpRequest, httpResponse);
+        signin(context);
+      } else if (isGerritLogin(httpRequest)) {
+        if (user == null) {
+          J2EContext context = new J2EContext(httpRequest, httpResponse);
+          redirectToIdentityProvider(context);
+        } else {
+          HttpServletRequest req = new AuthenticatedHttpRequest(httpRequest, user);
+          chain.doFilter(req, response);
         }
-        if (authHeaders.size() != 4) {
-            throw new RuntimeException("Unique values for httpUserNameHeader, " +
-                    "httpDisplaynameHeader, httpEmailHeader and httpExternalIdHeader " +
-                    "are required.");
-        }
-
-        saml2Client.setCallbackUrl(callbackUrl);
+      } else if (isGerritLogout(httpRequest)) {
+        httpRequest.getSession().removeAttribute(SESSION_ATTR_USER);
+        chain.doFilter(httpRequest, httpResponse);
+      } else {
+        chain.doFilter(httpRequest, httpResponse);
+      }
+    } catch (final HttpAction requiresHttpAction) {
+      throw new TechnicalException("Unexpected HTTP action", requiresHttpAction);
     }
+  }
 
-    @Override
-    public void init(FilterConfig filterConfig) throws ServletException {
-    }
-
-    @Override
-    public void destroy() {
-    }
-
-    private AuthenticatedUser userFromRequest(HttpServletRequest request) {
-        HttpSession s = request.getSession();
-        AuthenticatedUser user = (AuthenticatedUser) s.getAttribute(SESSION_ATTR_USER);
-        if (user == null || user.getUsername() == null)
-            return null;
-        else return user;
-    }
-
-    private void signin(J2EContext context) throws HttpAction, IOException {
-        SAML2Credentials credentials = saml2Client.getCredentials(context);
-        SAML2Profile user = saml2Client.getUserProfile(credentials, context);
-        if (user != null) {
-            log.debug("Received SAML callback for userId={} with attributes: {}",
-                    getUserName(user), user.getAttributes());
-            HttpSession s = context.getRequest().getSession();
-            s.setAttribute(SESSION_ATTR_USER, new AuthenticatedUser(
-                    getUserName(user),
-                    getDisplayName(user),
-                    getEmailAddress(user),
-                    "saml/" + user.getId()));
-
-            String redirectUri = context.getRequest().getParameter("RelayState");
-            if (null == redirectUri || redirectUri.isEmpty()) {
-                redirectUri = "/";
-            }
-            context.getResponse().sendRedirect(context.getRequest().getContextPath() + redirectUri);
-        }
-    }
-
-    @Override
-    public void doFilter(ServletRequest incomingRequest, ServletResponse response,
-                         FilterChain chain) throws IOException, ServletException {
-        /* The first thing we do is to wrap the request in an anonymous request, so in case
-           a malicious user is trying to set the headers manually, they'll be discarded.
-         */
-        HttpServletRequest httpRequest = new AnonymousHttpRequest(
-                (HttpServletRequest) incomingRequest);
-        HttpServletResponse httpResponse = (HttpServletResponse) response;
-        AuthenticatedUser user = userFromRequest(httpRequest);
-
-        try {
-            if (isSamlPostback(httpRequest)) {
-                J2EContext context = new J2EContext(httpRequest, httpResponse);
-                signin(context);
-            } else if (isGerritLogin(httpRequest)) {
-                if (user == null) {
-                    J2EContext context = new J2EContext(httpRequest, httpResponse);
-                    redirectToIdentityProvider(context);
-                } else {
-                    HttpServletRequest req = new AuthenticatedHttpRequest(httpRequest, user);
-                    chain.doFilter(req, response);
-                }
-            } else if (isGerritLogout(httpRequest)) {
-                httpRequest.getSession().removeAttribute(SESSION_ATTR_USER);
-                chain.doFilter(httpRequest, httpResponse);
-            } else {
-                chain.doFilter(httpRequest, httpResponse);
-            }
-        } catch (final HttpAction requiresHttpAction) {
-            throw new TechnicalException("Unexpected HTTP action", requiresHttpAction);
-        }
-    }
-
-    private void redirectToIdentityProvider(J2EContext context)
-            throws HttpAction {
-        String redirectUri = Url.decode(context
+  private void redirectToIdentityProvider(J2EContext context) throws HttpAction {
+    String redirectUri =
+        Url.decode(
+            context
                 .getRequest()
                 .getRequestURI()
-                .substring(
-                        context.getRequest().getContextPath().length()));
-        context.setSessionAttribute(SAML2Client.SAML_RELAY_STATE_ATTRIBUTE, redirectUri);
-        log.debug("Setting redirectUri: {}", redirectUri);
-        saml2Client.redirect(context);
+                .substring(context.getRequest().getContextPath().length()));
+    context.setSessionAttribute(SAML2Client.SAML_RELAY_STATE_ATTRIBUTE, redirectUri);
+    log.debug("Setting redirectUri: {}", redirectUri);
+    saml2Client.redirect(context);
+  }
+
+  private static boolean isGerritLogin(HttpServletRequest request) {
+    return request.getRequestURI().indexOf(GERRIT_LOGIN) >= 0;
+  }
+
+  private static boolean isGerritLogout(HttpServletRequest request) {
+    return request.getRequestURI().indexOf(GERRIT_LOGOUT) >= 0;
+  }
+
+  private static boolean isSamlPostback(HttpServletRequest request) {
+    return "POST".equals(request.getMethod())
+        && request.getRequestURI().indexOf(SAML_POSTBACK) >= 0;
+  }
+
+  private String getAttribute(SAML2Profile user, String attrName) {
+    List<?> names = (List<?>) user.getAttribute(attrName);
+    if (names != null && !names.isEmpty()) {
+      return (String) names.get(0);
+    }
+    return null;
+  }
+
+  private String getAttributeOrElseId(SAML2Profile user, String attrName) {
+    String value = getAttribute(user, attrName);
+    if (value != null) {
+      return value;
+    }
+    return user.getId();
+  }
+
+  private String getDisplayName(SAML2Profile user) {
+    return getAttributeOrElseId(user, samlConfig.getDisplayNameAttr());
+  }
+
+  private String getEmailAddress(SAML2Profile user) {
+    String emailAddress = getAttribute(user, samlConfig.getEmailAddressAttr());
+    if (emailAddress != null) {
+      return emailAddress;
+    }
+    String nameId = user.getId();
+    if (!nameId.contains("@")) {
+      log.debug(
+          "Email address attribute not found, NameId {} does not look like an email.", nameId);
+      return null;
+    }
+    return emailAddress;
+  }
+
+  private String getUserName(SAML2Profile user) {
+    return getAttributeOrElseId(user, samlConfig.getUserNameAttr());
+  }
+
+  private class AuthenticatedHttpRequest extends HttpServletRequestWrapper {
+    private AuthenticatedUser user;
+
+    public AuthenticatedHttpRequest(HttpServletRequest request, @Nonnull AuthenticatedUser user) {
+      super(request);
+      this.user = user;
     }
 
-    private static boolean isGerritLogin(HttpServletRequest request) {
-        return request.getRequestURI().indexOf(GERRIT_LOGIN) >= 0;
+    @Override
+    public Enumeration<String> getHeaderNames() {
+      final Enumeration<String> wrappedHeaderNames = super.getHeaderNames();
+      HashSet<String> headerNames = new HashSet<>(authHeaders);
+      while (wrappedHeaderNames.hasMoreElements()) {
+        headerNames.add(wrappedHeaderNames.nextElement());
+      }
+      return Iterators.asEnumeration(headerNames.iterator());
     }
 
-    private static boolean isGerritLogout(HttpServletRequest request) {
-        return request.getRequestURI().indexOf(GERRIT_LOGOUT) >= 0;
+    @Override
+    public String getHeader(String name) {
+      String nameUpperCase = name.toUpperCase();
+      if (httpUserNameHeader.equals(nameUpperCase)) {
+        return user.getUsername();
+      } else if (httpDisplaynameHeader.equals(nameUpperCase)) {
+        return user.getDisplayName();
+      } else if (httpEmailHeader.equals(nameUpperCase)) {
+        return user.getEmail();
+      } else if (httpExternalIdHeader.equals(nameUpperCase)) {
+        return user.getExternalId();
+      } else {
+        return super.getHeader(name);
+      }
+    }
+  }
+
+  private class AnonymousHttpRequest extends HttpServletRequestWrapper {
+    public AnonymousHttpRequest(HttpServletRequest request) {
+      super(request);
     }
 
-    private static boolean isSamlPostback(HttpServletRequest request) {
-        return "POST".equals(request.getMethod())
-                && request.getRequestURI().indexOf(SAML_POSTBACK) >= 0;
-    }
+    @Override
+    public Enumeration<String> getHeaderNames() {
+      final Enumeration<String> wrappedHeaderNames = super.getHeaderNames();
 
-    private String getAttribute(SAML2Profile user, String attrName) {
-        List<?> names = (List<?>) user.getAttribute(attrName);
-        if (names != null && !names.isEmpty()) {
-            return (String) names.get(0);
+      HashSet<String> headerNames = new HashSet<>();
+      while (wrappedHeaderNames.hasMoreElements()) {
+        String header = wrappedHeaderNames.nextElement();
+        if (!authHeaders.contains(header.toUpperCase())) {
+          headerNames.add(wrappedHeaderNames.nextElement());
         }
+      }
+      return Iterators.asEnumeration(headerNames.iterator());
+    }
+
+    @Override
+    public String getHeader(String name) {
+      String nameUpperCase = name.toUpperCase();
+      if (authHeaders.contains(nameUpperCase)) {
         return null;
+      } else {
+        return super.getHeader(name);
+      }
     }
-
-    private String getAttributeOrElseId(SAML2Profile user, String attrName) {
-        String value = getAttribute(user, attrName);
-        if (value != null) {
-            return value;
-        }
-        return user.getId();
-    }
-
-    private String getDisplayName(SAML2Profile user) {
-        return getAttributeOrElseId(user, samlConfig.getDisplayNameAttr());
-    }
-
-    private String getEmailAddress(SAML2Profile user) {
-        String emailAddress = getAttribute(user, samlConfig.getEmailAddressAttr());
-        if (emailAddress != null) {
-            return emailAddress;
-        }
-        String nameId = user.getId();
-        if (!nameId.contains("@")) {
-            log.debug(
-                    "Email address attribute not found, NameId {} does not look like an email.",
-                    nameId);
-            return null;
-        }
-        return emailAddress;
-    }
-
-    private String getUserName(SAML2Profile user) {
-        return getAttributeOrElseId(user, samlConfig.getUserNameAttr());
-    }
-
-    private class AuthenticatedHttpRequest extends HttpServletRequestWrapper {
-        private AuthenticatedUser user;
-
-        public AuthenticatedHttpRequest(HttpServletRequest request,
-                                        @Nonnull AuthenticatedUser user) {
-            super(request);
-            this.user = user;
-        }
-
-        @Override
-        public Enumeration<String> getHeaderNames() {
-            final Enumeration<String> wrappedHeaderNames = super.getHeaderNames();
-            HashSet<String> headerNames = new HashSet<>(authHeaders);
-            while (wrappedHeaderNames.hasMoreElements()) {
-                headerNames.add(wrappedHeaderNames.nextElement());
-            }
-            return Iterators.asEnumeration(headerNames.iterator());
-        }
-
-        @Override
-        public String getHeader(String name) {
-            String nameUpperCase = name.toUpperCase();
-            if (httpUserNameHeader.equals(nameUpperCase)) {
-                return user.getUsername();
-            } else if (httpDisplaynameHeader.equals(nameUpperCase)) {
-                return user.getDisplayName();
-            } else if (httpEmailHeader.equals(nameUpperCase)) {
-                return user.getEmail();
-            } else if (httpExternalIdHeader.equals(nameUpperCase)) {
-                return user.getExternalId();
-            } else {
-                return super.getHeader(name);
-            }
-        }
-    }
-
-    private class AnonymousHttpRequest extends HttpServletRequestWrapper {
-        public AnonymousHttpRequest(HttpServletRequest request) {
-            super(request);
-        }
-
-        @Override
-        public Enumeration<String> getHeaderNames() {
-            final Enumeration<String> wrappedHeaderNames = super.getHeaderNames();
-
-            HashSet<String> headerNames = new HashSet<>();
-            while (wrappedHeaderNames.hasMoreElements()) {
-                String header = wrappedHeaderNames.nextElement();
-                if (!authHeaders.contains(header.toUpperCase())) {
-                    headerNames.add(wrappedHeaderNames.nextElement());
-                }
-            }
-            return Iterators.asEnumeration(headerNames.iterator());
-        }
-
-        @Override
-        public String getHeader(String name) {
-            String nameUpperCase = name.toUpperCase();
-            if (authHeaders.contains(nameUpperCase)) {
-                return null;
-            } else {
-                return super.getHeader(name);
-            }
-        }
-    }
+  }
 }