|
|
|
|
@ -88,12 +88,12 @@ import org.springframework.util.Assert;
@@ -88,12 +88,12 @@ import org.springframework.util.Assert;
|
|
|
|
|
* @Configuration |
|
|
|
|
* @EnableWebSecurity |
|
|
|
|
* public class FormLoginSecurityConfig extends WebSecurityConfigurerAdapter { |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(HttpSecurity http) throws Exception { |
|
|
|
|
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and().formLogin(); |
|
|
|
|
* } |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(AuthenticationManagerBuilder auth) throws Exception { |
|
|
|
|
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER"); |
|
|
|
|
@ -144,13 +144,13 @@ public final class HttpSecurity extends
@@ -144,13 +144,13 @@ public final class HttpSecurity extends
|
|
|
|
|
* @Configuration |
|
|
|
|
* @EnableWebSecurity |
|
|
|
|
* public class OpenIDLoginConfig extends WebSecurityConfigurerAdapter { |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(HttpSecurity http) { |
|
|
|
|
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and().openidLogin() |
|
|
|
|
* .permitAll(); |
|
|
|
|
* } |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(AuthenticationManagerBuilder auth) throws Exception { |
|
|
|
|
* auth.inMemoryAuthentication() |
|
|
|
|
@ -171,7 +171,7 @@ public final class HttpSecurity extends
@@ -171,7 +171,7 @@ public final class HttpSecurity extends
|
|
|
|
|
* @Configuration |
|
|
|
|
* @EnableWebSecurity |
|
|
|
|
* public class OpenIDLoginConfig extends WebSecurityConfigurerAdapter { |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(HttpSecurity http) { |
|
|
|
|
* http.authorizeRequests() |
|
|
|
|
@ -197,7 +197,7 @@ public final class HttpSecurity extends
@@ -197,7 +197,7 @@ public final class HttpSecurity extends
|
|
|
|
|
* .type("http://schema.openid.net/namePerson").required(true);
|
|
|
|
|
* } |
|
|
|
|
* } |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* public class AutoProvisioningUserDetailsService implements |
|
|
|
|
* AuthenticationUserDetailsService<OpenIDAuthenticationToken> { |
|
|
|
|
* public UserDetails loadUserDetails(OpenIDAuthenticationToken token) |
|
|
|
|
@ -227,7 +227,7 @@ public final class HttpSecurity extends
@@ -227,7 +227,7 @@ public final class HttpSecurity extends
|
|
|
|
|
* @Configuration |
|
|
|
|
* @EnableWebSecurity |
|
|
|
|
* public class CsrfSecurityConfig extends WebSecurityConfigurerAdapter { |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(HttpSecurity http) throws Exception { |
|
|
|
|
* http |
|
|
|
|
@ -253,7 +253,7 @@ public final class HttpSecurity extends
@@ -253,7 +253,7 @@ public final class HttpSecurity extends
|
|
|
|
|
* @Configuration |
|
|
|
|
* @EnableWebSecurity |
|
|
|
|
* public class CsrfSecurityConfig extends WebSecurityConfigurerAdapter { |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(HttpSecurity http) throws Exception { |
|
|
|
|
* http |
|
|
|
|
@ -273,7 +273,7 @@ public final class HttpSecurity extends
@@ -273,7 +273,7 @@ public final class HttpSecurity extends
|
|
|
|
|
* @Configuration |
|
|
|
|
* @EnableWebSecurity |
|
|
|
|
* public class CsrfSecurityConfig extends WebSecurityConfigurerAdapter { |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(HttpSecurity http) throws Exception { |
|
|
|
|
* http |
|
|
|
|
@ -331,14 +331,14 @@ public final class HttpSecurity extends
@@ -331,14 +331,14 @@ public final class HttpSecurity extends
|
|
|
|
|
* @Configuration |
|
|
|
|
* @EnableWebSecurity |
|
|
|
|
* public class SessionManagementSecurityConfig extends WebSecurityConfigurerAdapter { |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(HttpSecurity http) throws Exception { |
|
|
|
|
* http.authorizeRequests().anyRequest().hasRole("USER").and().formLogin() |
|
|
|
|
* .permitAll().and().sessionManagement().maximumSessions(1) |
|
|
|
|
* .expiredUrl("/login?expired"); |
|
|
|
|
* } |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(AuthenticationManagerBuilder auth) throws Exception { |
|
|
|
|
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER"); |
|
|
|
|
@ -388,7 +388,7 @@ public final class HttpSecurity extends
@@ -388,7 +388,7 @@ public final class HttpSecurity extends
|
|
|
|
|
* @Configuration |
|
|
|
|
* @EnableWebSecurity |
|
|
|
|
* public class PortMapperSecurityConfig extends WebSecurityConfigurerAdapter { |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(HttpSecurity http) throws Exception { |
|
|
|
|
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and().formLogin() |
|
|
|
|
@ -396,7 +396,7 @@ public final class HttpSecurity extends
@@ -396,7 +396,7 @@ public final class HttpSecurity extends
|
|
|
|
|
* // Example portMapper() configuration
|
|
|
|
|
* .portMapper().http(9090).mapsTo(9443).http(80).mapsTo(443); |
|
|
|
|
* } |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(AuthenticationManagerBuilder auth) throws Exception { |
|
|
|
|
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER"); |
|
|
|
|
@ -426,7 +426,7 @@ public final class HttpSecurity extends
@@ -426,7 +426,7 @@ public final class HttpSecurity extends
|
|
|
|
|
* @Configuration |
|
|
|
|
* @EnableWebSecurity |
|
|
|
|
* public class JeeSecurityConfig extends WebSecurityConfigurerAdapter { |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(HttpSecurity http) throws Exception { |
|
|
|
|
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and() |
|
|
|
|
@ -449,7 +449,7 @@ public final class HttpSecurity extends
@@ -449,7 +449,7 @@ public final class HttpSecurity extends
|
|
|
|
|
* <form-error-page>/login?error</form-error-page> |
|
|
|
|
* </form-login-config> |
|
|
|
|
* </login-config> |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* <security-role> |
|
|
|
|
* <role-name>ROLE_USER</role-name> |
|
|
|
|
* </security-role> |
|
|
|
|
@ -497,7 +497,7 @@ public final class HttpSecurity extends
@@ -497,7 +497,7 @@ public final class HttpSecurity extends
|
|
|
|
|
* @Configuration |
|
|
|
|
* @EnableWebSecurity |
|
|
|
|
* public class X509SecurityConfig extends WebSecurityConfigurerAdapter { |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(HttpSecurity http) throws Exception { |
|
|
|
|
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and() |
|
|
|
|
@ -528,12 +528,12 @@ public final class HttpSecurity extends
@@ -528,12 +528,12 @@ public final class HttpSecurity extends
|
|
|
|
|
* @Configuration |
|
|
|
|
* @EnableWebSecurity |
|
|
|
|
* public class RememberMeSecurityConfig extends WebSecurityConfigurerAdapter { |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(AuthenticationManagerBuilder auth) throws Exception { |
|
|
|
|
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER"); |
|
|
|
|
* } |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(HttpSecurity http) throws Exception { |
|
|
|
|
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and().formLogin() |
|
|
|
|
@ -564,12 +564,12 @@ public final class HttpSecurity extends
@@ -564,12 +564,12 @@ public final class HttpSecurity extends
|
|
|
|
|
* @Configuration |
|
|
|
|
* @EnableWebSecurity |
|
|
|
|
* public class AuthorizeUrlsSecurityConfig extends WebSecurityConfigurerAdapter { |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(HttpSecurity http) throws Exception { |
|
|
|
|
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and().formLogin(); |
|
|
|
|
* } |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(AuthenticationManagerBuilder auth) throws Exception { |
|
|
|
|
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER") |
|
|
|
|
@ -586,13 +586,13 @@ public final class HttpSecurity extends
@@ -586,13 +586,13 @@ public final class HttpSecurity extends
|
|
|
|
|
* @Configuration |
|
|
|
|
* @EnableWebSecurity |
|
|
|
|
* public class AuthorizeUrlsSecurityConfig extends WebSecurityConfigurerAdapter { |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(HttpSecurity http) throws Exception { |
|
|
|
|
* http.authorizeRequests().antMatchers("/admin/**").hasRole("ADMIN") |
|
|
|
|
* .antMatchers("/**").hasRole("USER").and().formLogin(); |
|
|
|
|
* } |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(AuthenticationManagerBuilder auth) throws Exception { |
|
|
|
|
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER") |
|
|
|
|
@ -679,7 +679,7 @@ public final class HttpSecurity extends
@@ -679,7 +679,7 @@ public final class HttpSecurity extends
|
|
|
|
|
* @Configuration |
|
|
|
|
* @EnableWebSecurity |
|
|
|
|
* public class CsrfSecurityConfig extends WebSecurityConfigurerAdapter { |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(HttpSecurity http) throws Exception { |
|
|
|
|
* http |
|
|
|
|
@ -713,7 +713,7 @@ public final class HttpSecurity extends
@@ -713,7 +713,7 @@ public final class HttpSecurity extends
|
|
|
|
|
* @Configuration |
|
|
|
|
* @EnableWebSecurity |
|
|
|
|
* public class LogoutSecurityConfig extends WebSecurityConfigurerAdapter { |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(HttpSecurity http) throws Exception { |
|
|
|
|
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and().formLogin() |
|
|
|
|
@ -722,7 +722,7 @@ public final class HttpSecurity extends
@@ -722,7 +722,7 @@ public final class HttpSecurity extends
|
|
|
|
|
* .logout().logout().deleteCookies("remove").invalidateHttpSession(false) |
|
|
|
|
* .logoutUrl("/custom-logout").logoutSuccessUrl("/logout-success"); |
|
|
|
|
* } |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(AuthenticationManagerBuilder auth) throws Exception { |
|
|
|
|
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER"); |
|
|
|
|
@ -753,7 +753,7 @@ public final class HttpSecurity extends
@@ -753,7 +753,7 @@ public final class HttpSecurity extends
|
|
|
|
|
* @Configuration |
|
|
|
|
* @EnableWebSecurity |
|
|
|
|
* public class AnononymousSecurityConfig extends WebSecurityConfigurerAdapter { |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(HttpSecurity http) throws Exception { |
|
|
|
|
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and().formLogin() |
|
|
|
|
@ -761,7 +761,7 @@ public final class HttpSecurity extends
@@ -761,7 +761,7 @@ public final class HttpSecurity extends
|
|
|
|
|
* // sample anonymous customization
|
|
|
|
|
* .anonymous().authorities("ROLE_ANON"); |
|
|
|
|
* } |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(AuthenticationManagerBuilder auth) throws Exception { |
|
|
|
|
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER"); |
|
|
|
|
@ -777,7 +777,7 @@ public final class HttpSecurity extends
@@ -777,7 +777,7 @@ public final class HttpSecurity extends
|
|
|
|
|
* @Configuration |
|
|
|
|
* @EnableWebSecurity |
|
|
|
|
* public class AnononymousSecurityConfig extends WebSecurityConfigurerAdapter { |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(HttpSecurity http) throws Exception { |
|
|
|
|
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and().formLogin() |
|
|
|
|
@ -785,7 +785,7 @@ public final class HttpSecurity extends
@@ -785,7 +785,7 @@ public final class HttpSecurity extends
|
|
|
|
|
* // sample anonymous customization
|
|
|
|
|
* .anonymous().disabled(); |
|
|
|
|
* } |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(AuthenticationManagerBuilder auth) throws Exception { |
|
|
|
|
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER"); |
|
|
|
|
@ -816,12 +816,12 @@ public final class HttpSecurity extends
@@ -816,12 +816,12 @@ public final class HttpSecurity extends
|
|
|
|
|
* @Configuration |
|
|
|
|
* @EnableWebSecurity |
|
|
|
|
* public class FormLoginSecurityConfig extends WebSecurityConfigurerAdapter { |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(HttpSecurity http) throws Exception { |
|
|
|
|
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and().formLogin(); |
|
|
|
|
* } |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(AuthenticationManagerBuilder auth) throws Exception { |
|
|
|
|
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER"); |
|
|
|
|
@ -835,7 +835,7 @@ public final class HttpSecurity extends
@@ -835,7 +835,7 @@ public final class HttpSecurity extends
|
|
|
|
|
* @Configuration |
|
|
|
|
* @EnableWebSecurity |
|
|
|
|
* public class FormLoginSecurityConfig extends WebSecurityConfigurerAdapter { |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(HttpSecurity http) throws Exception { |
|
|
|
|
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and().formLogin() |
|
|
|
|
@ -847,7 +847,7 @@ public final class HttpSecurity extends
@@ -847,7 +847,7 @@ public final class HttpSecurity extends
|
|
|
|
|
* // with an HTTP
|
|
|
|
|
* // post
|
|
|
|
|
* } |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(AuthenticationManagerBuilder auth) throws Exception { |
|
|
|
|
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER"); |
|
|
|
|
@ -880,13 +880,13 @@ public final class HttpSecurity extends
@@ -880,13 +880,13 @@ public final class HttpSecurity extends
|
|
|
|
|
* @Configuration |
|
|
|
|
* @EnableWebSecurity |
|
|
|
|
* public class ChannelSecurityConfig extends WebSecurityConfigurerAdapter { |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(HttpSecurity http) throws Exception { |
|
|
|
|
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and().formLogin() |
|
|
|
|
* .and().requiresChannel().anyRequest().requiresSecure(); |
|
|
|
|
* } |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(AuthenticationManagerBuilder auth) throws Exception { |
|
|
|
|
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER"); |
|
|
|
|
@ -916,12 +916,12 @@ public final class HttpSecurity extends
@@ -916,12 +916,12 @@ public final class HttpSecurity extends
|
|
|
|
|
* @Configuration |
|
|
|
|
* @EnableWebSecurity |
|
|
|
|
* public class HttpBasicSecurityConfig extends WebSecurityConfigurerAdapter { |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(HttpSecurity http) throws Exception { |
|
|
|
|
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and().httpBasic(); |
|
|
|
|
* } |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(AuthenticationManagerBuilder auth) throws Exception { |
|
|
|
|
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER"); |
|
|
|
|
@ -953,7 +953,7 @@ public final class HttpSecurity extends
@@ -953,7 +953,7 @@ public final class HttpSecurity extends
|
|
|
|
|
|
|
|
|
|
/* |
|
|
|
|
* (non-Javadoc) |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @see |
|
|
|
|
* org.springframework.security.config.annotation.web.HttpBuilder#authenticationProvider |
|
|
|
|
* (org.springframework.security.authentication.AuthenticationProvider) |
|
|
|
|
@ -966,7 +966,7 @@ public final class HttpSecurity extends
@@ -966,7 +966,7 @@ public final class HttpSecurity extends
|
|
|
|
|
|
|
|
|
|
/* |
|
|
|
|
* (non-Javadoc) |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @see |
|
|
|
|
* org.springframework.security.config.annotation.web.HttpBuilder#userDetailsService |
|
|
|
|
* (org.springframework.security.core.userdetails.UserDetailsService) |
|
|
|
|
@ -983,7 +983,7 @@ public final class HttpSecurity extends
@@ -983,7 +983,7 @@ public final class HttpSecurity extends
|
|
|
|
|
|
|
|
|
|
/* |
|
|
|
|
* (non-Javadoc) |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @see |
|
|
|
|
* org.springframework.security.config.annotation.web.HttpBuilder#addFilterAfter(javax |
|
|
|
|
* .servlet.Filter, java.lang.Class) |
|
|
|
|
@ -995,7 +995,7 @@ public final class HttpSecurity extends
@@ -995,7 +995,7 @@ public final class HttpSecurity extends
|
|
|
|
|
|
|
|
|
|
/* |
|
|
|
|
* (non-Javadoc) |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @see |
|
|
|
|
* org.springframework.security.config.annotation.web.HttpBuilder#addFilterBefore( |
|
|
|
|
* javax.servlet.Filter, java.lang.Class) |
|
|
|
|
@ -1008,7 +1008,7 @@ public final class HttpSecurity extends
@@ -1008,7 +1008,7 @@ public final class HttpSecurity extends
|
|
|
|
|
|
|
|
|
|
/* |
|
|
|
|
* (non-Javadoc) |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @see |
|
|
|
|
* org.springframework.security.config.annotation.web.HttpBuilder#addFilter(javax. |
|
|
|
|
* servlet.Filter) |
|
|
|
|
@ -1048,16 +1048,24 @@ public final class HttpSecurity extends
@@ -1048,16 +1048,24 @@ public final class HttpSecurity extends
|
|
|
|
|
* @Configuration |
|
|
|
|
* @EnableWebSecurity |
|
|
|
|
* public class RequestMatchersSecurityConfig extends WebSecurityConfigurerAdapter { |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(HttpSecurity http) throws Exception { |
|
|
|
|
* http.requestMatchers().antMatchers("/api/**", "/oauth/**").and() |
|
|
|
|
* .authorizeRequests().antMatchers("/**").hasRole("USER").and().httpBasic(); |
|
|
|
|
* http |
|
|
|
|
* .requestMatchers() |
|
|
|
|
* .antMatchers("/api/**", "/oauth/**") |
|
|
|
|
* .and() |
|
|
|
|
* .authorizeRequests() |
|
|
|
|
* .antMatchers("/**").hasRole("USER") |
|
|
|
|
* .and() |
|
|
|
|
* .httpBasic(); |
|
|
|
|
* } |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(AuthenticationManagerBuilder auth) throws Exception { |
|
|
|
|
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER"); |
|
|
|
|
* auth |
|
|
|
|
* .inMemoryAuthentication() |
|
|
|
|
* .withUser("user").password("password").roles("USER"); |
|
|
|
|
* } |
|
|
|
|
* } |
|
|
|
|
* </pre> |
|
|
|
|
@ -1068,16 +1076,25 @@ public final class HttpSecurity extends
@@ -1068,16 +1076,25 @@ public final class HttpSecurity extends
|
|
|
|
|
* @Configuration |
|
|
|
|
* @EnableWebSecurity |
|
|
|
|
* public class RequestMatchersSecurityConfig extends WebSecurityConfigurerAdapter { |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(HttpSecurity http) throws Exception { |
|
|
|
|
* http.requestMatchers().antMatchers("/api/**").antMatchers("/oauth/**").and() |
|
|
|
|
* .authorizeRequests().antMatchers("/**").hasRole("USER").and().httpBasic(); |
|
|
|
|
* http |
|
|
|
|
* .requestMatchers() |
|
|
|
|
* .antMatchers("/api/**") |
|
|
|
|
* .antMatchers("/oauth/**") |
|
|
|
|
* .and() |
|
|
|
|
* .authorizeRequests() |
|
|
|
|
* .antMatchers("/**").hasRole("USER") |
|
|
|
|
* .and() |
|
|
|
|
* .httpBasic(); |
|
|
|
|
* } |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(AuthenticationManagerBuilder auth) throws Exception { |
|
|
|
|
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER"); |
|
|
|
|
* auth |
|
|
|
|
* .inMemoryAuthentication() |
|
|
|
|
* .withUser("user").password("password").roles("USER"); |
|
|
|
|
* } |
|
|
|
|
* } |
|
|
|
|
* </pre> |
|
|
|
|
@ -1088,17 +1105,27 @@ public final class HttpSecurity extends
@@ -1088,17 +1105,27 @@ public final class HttpSecurity extends
|
|
|
|
|
* @Configuration |
|
|
|
|
* @EnableWebSecurity |
|
|
|
|
* public class RequestMatchersSecurityConfig extends WebSecurityConfigurerAdapter { |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(HttpSecurity http) throws Exception { |
|
|
|
|
* http.requestMatchers().antMatchers("/api/**").and().requestMatchers() |
|
|
|
|
* .antMatchers("/oauth/**").and().authorizeRequests().antMatchers("/**") |
|
|
|
|
* .hasRole("USER").and().httpBasic(); |
|
|
|
|
* http |
|
|
|
|
* .requestMatchers() |
|
|
|
|
* .antMatchers("/api/**") |
|
|
|
|
* .and() |
|
|
|
|
* .requestMatchers() |
|
|
|
|
* .antMatchers("/oauth/**") |
|
|
|
|
* .and() |
|
|
|
|
* .authorizeRequests() |
|
|
|
|
* .antMatchers("/**").hasRole("USER") |
|
|
|
|
* .and() |
|
|
|
|
* .httpBasic(); |
|
|
|
|
* } |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* @Override |
|
|
|
|
* protected void configure(AuthenticationManagerBuilder auth) throws Exception { |
|
|
|
|
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER"); |
|
|
|
|
* auth |
|
|
|
|
* .inMemoryAuthentication() |
|
|
|
|
* .withUser("user").password("password").roles("USER"); |
|
|
|
|
* } |
|
|
|
|
* } |
|
|
|
|
* </pre> |
|
|
|
|
|