From 3925ed90c4d2b20c6b3ac36199477fceea7fa21b Mon Sep 17 00:00:00 2001 From: izeye Date: Sat, 10 Oct 2015 16:59:11 +0900 Subject: [PATCH] SEC-3124: Fix broken Javadoc related to `<` and `>` --- .../org/springframework/security/web/FilterChainProxy.java | 4 ++-- .../DefaultFilterInvocationSecurityMetadataSource.java | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/web/src/main/java/org/springframework/security/web/FilterChainProxy.java b/web/src/main/java/org/springframework/security/web/FilterChainProxy.java index 841a85b2cd..3867e29601 100644 --- a/web/src/main/java/org/springframework/security/web/FilterChainProxy.java +++ b/web/src/main/java/org/springframework/security/web/FilterChainProxy.java @@ -41,7 +41,7 @@ import java.util.*; * version 2.0, you shouldn't need to explicitly configure a {@code FilterChainProxy} bean * in your application context unless you need very fine control over the filter chain * contents. Most cases should be adequately covered by the default - * {@code <security:http />} namespace configuration options. + * {@code } namespace configuration options. *

* The {@code FilterChainProxy} is linked into the servlet container filter chain by * adding a standard Spring {@link DelegatingFilterProxy} declaration in the application @@ -54,7 +54,7 @@ import java.util.*; * and a list of filters which should be applied to matching requests. Most applications * will only contain a single filter chain, and if you are using the namespace, you don't * have to set the chains explicitly. If you require finer-grained control, you can make - * use of the {@code <filter-chain>} namespace element. This defines a URI pattern + * use of the {@code } namespace element. This defines a URI pattern * and the list of filters (as comma-separated bean names) which should be applied to * requests which match the pattern. An example configuration might look like this: * diff --git a/web/src/main/java/org/springframework/security/web/access/intercept/DefaultFilterInvocationSecurityMetadataSource.java b/web/src/main/java/org/springframework/security/web/access/intercept/DefaultFilterInvocationSecurityMetadataSource.java index 30ab8015d5..0cbb67c39a 100644 --- a/web/src/main/java/org/springframework/security/web/access/intercept/DefaultFilterInvocationSecurityMetadataSource.java +++ b/web/src/main/java/org/springframework/security/web/access/intercept/DefaultFilterInvocationSecurityMetadataSource.java @@ -43,7 +43,7 @@ import org.springframework.security.web.util.matcher.RequestMatcher; *

* The most common method creating an instance is using the Spring Security namespace. For * example, the {@code pattern} and {@code access} attributes of the - * {@code <intercept-url>} elements defined as children of the {@code <http>} + * {@code } elements defined as children of the {@code } * element are combined to build the instance used by the * {@code FilterSecurityInterceptor}. *