@ -61,7 +61,7 @@ public class ManagementConfigurationPlugin implements Plugin<Project> {
@@ -61,7 +61,7 @@ public class ManagementConfigurationPlugin implements Plugin<Project> {
@ -71,4 +71,4 @@ public class ManagementConfigurationPlugin implements Plugin<Project> {
@@ -71,4 +71,4 @@ public class ManagementConfigurationPlugin implements Plugin<Project> {
@ -46,7 +46,7 @@ public class CheckExpectedBranchVersionPlugin implements Plugin<Project> {
@@ -46,7 +46,7 @@ public class CheckExpectedBranchVersionPlugin implements Plugin<Project> {
task.setDescription("Check if the project version matches the branch version");
task.onlyIf("skipCheckExpectedBranchVersion property is false or not present",CheckExpectedBranchVersionPlugin::skipPropertyFalseOrNotPresent);
@ -543,7 +543,7 @@ public class CustomAuthoritiesOpaqueTokenIntrospector implements ReactiveOpaqueT
@@ -543,7 +543,7 @@ public class CustomAuthoritiesOpaqueTokenIntrospector implements ReactiveOpaqueT
public Mono<OAuth2AuthenticatedPrincipal> introspect(String token) {
return this.delegate.introspect(token)
.map(principal -> new DefaultOAuth2AuthenticatedPrincipal(
.map((principal) -> principal DefaultOAuth2AuthenticatedPrincipal(
@ -650,8 +650,8 @@ public class JwtOpaqueTokenIntrospector implements ReactiveOpaqueTokenIntrospect
@@ -650,8 +650,8 @@ public class JwtOpaqueTokenIntrospector implements ReactiveOpaqueTokenIntrospect
public Mono<OAuth2AuthenticatedPrincipal> introspect(String token) {
@ -173,7 +173,7 @@ It is configured with the following default implementation:
@@ -173,7 +173,7 @@ It is configured with the following default implementation:
@Bean
public SecurityFilterChain filterChain(HttpSecurity http) throws Exception {
http
.authorizeHttpRequests(authorize -> authorize
.authorizeHttpRequests((authorize) -> authorize
.anyRequest().authenticated()
)
.formLogin(Customizer.withDefaults())
@ -228,7 +228,7 @@ public class MultiHttpSecurityConfig {
@@ -228,7 +228,7 @@ public class MultiHttpSecurityConfig {
public SecurityFilterChain apiFilterChain(HttpSecurity http) throws Exception {
http
.securityMatcher("/api/**") <3>
.authorizeHttpRequests(authorize -> authorize
.authorizeHttpRequests((authorize) -> authorize
.anyRequest().hasRole("ADMIN")
)
.httpBasic(Customizer.withDefaults());
@ -238,7 +238,7 @@ public class MultiHttpSecurityConfig {
@@ -238,7 +238,7 @@ public class MultiHttpSecurityConfig {
@Bean <4>
public SecurityFilterChain formLoginFilterChain(HttpSecurity http) throws Exception {
http
.authorizeHttpRequests(authorize -> authorize
.authorizeHttpRequests((authorize) -> authorize
.anyRequest().authenticated()
)
.formLogin(Customizer.withDefaults());
@ -297,7 +297,7 @@ public class PartialSecurityConfig {
@@ -297,7 +297,7 @@ public class PartialSecurityConfig {
public SecurityFilterChain securedFilterChain(HttpSecurity http) throws Exception {
@ -680,7 +680,7 @@ For example, to configure the `filterSecurityPublishAuthorizationSuccess` proper
@@ -680,7 +680,7 @@ For example, to configure the `filterSecurityPublishAuthorizationSuccess` proper
@Bean
public SecurityFilterChain filterChain(HttpSecurity http) throws Exception {
@ -440,7 +440,7 @@ public class WebSocketSecurityConfig implements WebSocketMessageBrokerConfigurer
@@ -440,7 +440,7 @@ public class WebSocketSecurityConfig implements WebSocketMessageBrokerConfigurer
private final ApplicationContext applicationContext;
private final AuthorizationManager<Message<?>> authorizationManager;
public WebSocketSecurityConfig(ApplicationContext applicationContext, AuthorizationManager<Message<?>> authorizationManager) {
this.applicationContext = applicationContext;
this.authorizationManager = authorizationManager;
@ -607,8 +607,8 @@ public class WebSecurityConfig {
@@ -607,8 +607,8 @@ public class WebSecurityConfig {
public SecurityFilterChain filterChain(HttpSecurity http) throws Exception {
http
// ...
.headers(headers -> headers
.frameOptions(frameOptions -> frameOptions
.headers((headers) -> headers
.frameOptions((frameOptions) -> frameOptions
.sameOrigin()
)
);
@ -670,17 +670,17 @@ public class WebSecurityConfig {
@@ -670,17 +670,17 @@ public class WebSecurityConfig {
@Bean
public SecurityFilterChain filterChain(HttpSecurity http) throws Exception {
http
.csrf(csrf -> csrf
.csrf((csrf) -> csrf
// ignore our stomp endpoints since they are protected using Stomp headers
.ignoringRequestMatchers("/chat/**")
)
.headers(headers -> headers
.headers((headers) -> headers
// allow same origin to frame our site to support iframe SockJS