Some formatting fixes for HttpSecurity Javadoc
This commit is contained in:
parent
2f4610e8b7
commit
be36ddb614
|
@ -88,12 +88,12 @@ import org.springframework.util.Assert;
|
|||
* @Configuration
|
||||
* @EnableWebSecurity
|
||||
* public class FormLoginSecurityConfig extends WebSecurityConfigurerAdapter {
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(HttpSecurity http) throws Exception {
|
||||
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and().formLogin();
|
||||
* }
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(AuthenticationManagerBuilder auth) throws Exception {
|
||||
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER");
|
||||
|
@ -144,13 +144,13 @@ public final class HttpSecurity extends
|
|||
* @Configuration
|
||||
* @EnableWebSecurity
|
||||
* public class OpenIDLoginConfig extends WebSecurityConfigurerAdapter {
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(HttpSecurity http) {
|
||||
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and().openidLogin()
|
||||
* .permitAll();
|
||||
* }
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(AuthenticationManagerBuilder auth) throws Exception {
|
||||
* auth.inMemoryAuthentication()
|
||||
|
@ -171,7 +171,7 @@ public final class HttpSecurity extends
|
|||
* @Configuration
|
||||
* @EnableWebSecurity
|
||||
* public class OpenIDLoginConfig extends WebSecurityConfigurerAdapter {
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(HttpSecurity http) {
|
||||
* http.authorizeRequests()
|
||||
|
@ -197,7 +197,7 @@ public final class HttpSecurity extends
|
|||
* .type("http://schema.openid.net/namePerson").required(true);
|
||||
* }
|
||||
* }
|
||||
*
|
||||
*
|
||||
* public class AutoProvisioningUserDetailsService implements
|
||||
* AuthenticationUserDetailsService<OpenIDAuthenticationToken> {
|
||||
* public UserDetails loadUserDetails(OpenIDAuthenticationToken token)
|
||||
|
@ -227,7 +227,7 @@ public final class HttpSecurity extends
|
|||
* @Configuration
|
||||
* @EnableWebSecurity
|
||||
* public class CsrfSecurityConfig extends WebSecurityConfigurerAdapter {
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(HttpSecurity http) throws Exception {
|
||||
* http
|
||||
|
@ -253,7 +253,7 @@ public final class HttpSecurity extends
|
|||
* @Configuration
|
||||
* @EnableWebSecurity
|
||||
* public class CsrfSecurityConfig extends WebSecurityConfigurerAdapter {
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(HttpSecurity http) throws Exception {
|
||||
* http
|
||||
|
@ -273,7 +273,7 @@ public final class HttpSecurity extends
|
|||
* @Configuration
|
||||
* @EnableWebSecurity
|
||||
* public class CsrfSecurityConfig extends WebSecurityConfigurerAdapter {
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(HttpSecurity http) throws Exception {
|
||||
* http
|
||||
|
@ -331,14 +331,14 @@ public final class HttpSecurity extends
|
|||
* @Configuration
|
||||
* @EnableWebSecurity
|
||||
* public class SessionManagementSecurityConfig extends WebSecurityConfigurerAdapter {
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(HttpSecurity http) throws Exception {
|
||||
* http.authorizeRequests().anyRequest().hasRole("USER").and().formLogin()
|
||||
* .permitAll().and().sessionManagement().maximumSessions(1)
|
||||
* .expiredUrl("/login?expired");
|
||||
* }
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(AuthenticationManagerBuilder auth) throws Exception {
|
||||
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER");
|
||||
|
@ -388,7 +388,7 @@ public final class HttpSecurity extends
|
|||
* @Configuration
|
||||
* @EnableWebSecurity
|
||||
* public class PortMapperSecurityConfig extends WebSecurityConfigurerAdapter {
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(HttpSecurity http) throws Exception {
|
||||
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and().formLogin()
|
||||
|
@ -396,7 +396,7 @@ public final class HttpSecurity extends
|
|||
* // Example portMapper() configuration
|
||||
* .portMapper().http(9090).mapsTo(9443).http(80).mapsTo(443);
|
||||
* }
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(AuthenticationManagerBuilder auth) throws Exception {
|
||||
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER");
|
||||
|
@ -426,7 +426,7 @@ public final class HttpSecurity extends
|
|||
* @Configuration
|
||||
* @EnableWebSecurity
|
||||
* public class JeeSecurityConfig extends WebSecurityConfigurerAdapter {
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(HttpSecurity http) throws Exception {
|
||||
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and()
|
||||
|
@ -449,7 +449,7 @@ public final class HttpSecurity extends
|
|||
* <form-error-page>/login?error</form-error-page>
|
||||
* </form-login-config>
|
||||
* </login-config>
|
||||
*
|
||||
*
|
||||
* <security-role>
|
||||
* <role-name>ROLE_USER</role-name>
|
||||
* </security-role>
|
||||
|
@ -497,7 +497,7 @@ public final class HttpSecurity extends
|
|||
* @Configuration
|
||||
* @EnableWebSecurity
|
||||
* public class X509SecurityConfig extends WebSecurityConfigurerAdapter {
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(HttpSecurity http) throws Exception {
|
||||
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and()
|
||||
|
@ -528,12 +528,12 @@ public final class HttpSecurity extends
|
|||
* @Configuration
|
||||
* @EnableWebSecurity
|
||||
* public class RememberMeSecurityConfig extends WebSecurityConfigurerAdapter {
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(AuthenticationManagerBuilder auth) throws Exception {
|
||||
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER");
|
||||
* }
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(HttpSecurity http) throws Exception {
|
||||
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and().formLogin()
|
||||
|
@ -564,12 +564,12 @@ public final class HttpSecurity extends
|
|||
* @Configuration
|
||||
* @EnableWebSecurity
|
||||
* public class AuthorizeUrlsSecurityConfig extends WebSecurityConfigurerAdapter {
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(HttpSecurity http) throws Exception {
|
||||
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and().formLogin();
|
||||
* }
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(AuthenticationManagerBuilder auth) throws Exception {
|
||||
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER")
|
||||
|
@ -586,13 +586,13 @@ public final class HttpSecurity extends
|
|||
* @Configuration
|
||||
* @EnableWebSecurity
|
||||
* public class AuthorizeUrlsSecurityConfig extends WebSecurityConfigurerAdapter {
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(HttpSecurity http) throws Exception {
|
||||
* http.authorizeRequests().antMatchers("/admin/**").hasRole("ADMIN")
|
||||
* .antMatchers("/**").hasRole("USER").and().formLogin();
|
||||
* }
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(AuthenticationManagerBuilder auth) throws Exception {
|
||||
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER")
|
||||
|
@ -679,7 +679,7 @@ public final class HttpSecurity extends
|
|||
* @Configuration
|
||||
* @EnableWebSecurity
|
||||
* public class CsrfSecurityConfig extends WebSecurityConfigurerAdapter {
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(HttpSecurity http) throws Exception {
|
||||
* http
|
||||
|
@ -713,7 +713,7 @@ public final class HttpSecurity extends
|
|||
* @Configuration
|
||||
* @EnableWebSecurity
|
||||
* public class LogoutSecurityConfig extends WebSecurityConfigurerAdapter {
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(HttpSecurity http) throws Exception {
|
||||
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and().formLogin()
|
||||
|
@ -722,7 +722,7 @@ public final class HttpSecurity extends
|
|||
* .logout().logout().deleteCookies("remove").invalidateHttpSession(false)
|
||||
* .logoutUrl("/custom-logout").logoutSuccessUrl("/logout-success");
|
||||
* }
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(AuthenticationManagerBuilder auth) throws Exception {
|
||||
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER");
|
||||
|
@ -753,7 +753,7 @@ public final class HttpSecurity extends
|
|||
* @Configuration
|
||||
* @EnableWebSecurity
|
||||
* public class AnononymousSecurityConfig extends WebSecurityConfigurerAdapter {
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(HttpSecurity http) throws Exception {
|
||||
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and().formLogin()
|
||||
|
@ -761,7 +761,7 @@ public final class HttpSecurity extends
|
|||
* // sample anonymous customization
|
||||
* .anonymous().authorities("ROLE_ANON");
|
||||
* }
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(AuthenticationManagerBuilder auth) throws Exception {
|
||||
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER");
|
||||
|
@ -777,7 +777,7 @@ public final class HttpSecurity extends
|
|||
* @Configuration
|
||||
* @EnableWebSecurity
|
||||
* public class AnononymousSecurityConfig extends WebSecurityConfigurerAdapter {
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(HttpSecurity http) throws Exception {
|
||||
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and().formLogin()
|
||||
|
@ -785,7 +785,7 @@ public final class HttpSecurity extends
|
|||
* // sample anonymous customization
|
||||
* .anonymous().disabled();
|
||||
* }
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(AuthenticationManagerBuilder auth) throws Exception {
|
||||
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER");
|
||||
|
@ -816,12 +816,12 @@ public final class HttpSecurity extends
|
|||
* @Configuration
|
||||
* @EnableWebSecurity
|
||||
* public class FormLoginSecurityConfig extends WebSecurityConfigurerAdapter {
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(HttpSecurity http) throws Exception {
|
||||
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and().formLogin();
|
||||
* }
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(AuthenticationManagerBuilder auth) throws Exception {
|
||||
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER");
|
||||
|
@ -835,7 +835,7 @@ public final class HttpSecurity extends
|
|||
* @Configuration
|
||||
* @EnableWebSecurity
|
||||
* public class FormLoginSecurityConfig extends WebSecurityConfigurerAdapter {
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(HttpSecurity http) throws Exception {
|
||||
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and().formLogin()
|
||||
|
@ -847,7 +847,7 @@ public final class HttpSecurity extends
|
|||
* // with an HTTP
|
||||
* // post
|
||||
* }
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(AuthenticationManagerBuilder auth) throws Exception {
|
||||
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER");
|
||||
|
@ -880,13 +880,13 @@ public final class HttpSecurity extends
|
|||
* @Configuration
|
||||
* @EnableWebSecurity
|
||||
* public class ChannelSecurityConfig extends WebSecurityConfigurerAdapter {
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(HttpSecurity http) throws Exception {
|
||||
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and().formLogin()
|
||||
* .and().requiresChannel().anyRequest().requiresSecure();
|
||||
* }
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(AuthenticationManagerBuilder auth) throws Exception {
|
||||
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER");
|
||||
|
@ -916,12 +916,12 @@ public final class HttpSecurity extends
|
|||
* @Configuration
|
||||
* @EnableWebSecurity
|
||||
* public class HttpBasicSecurityConfig extends WebSecurityConfigurerAdapter {
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(HttpSecurity http) throws Exception {
|
||||
* http.authorizeRequests().antMatchers("/**").hasRole("USER").and().httpBasic();
|
||||
* }
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(AuthenticationManagerBuilder auth) throws Exception {
|
||||
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER");
|
||||
|
@ -953,7 +953,7 @@ public final class HttpSecurity extends
|
|||
|
||||
/*
|
||||
* (non-Javadoc)
|
||||
*
|
||||
*
|
||||
* @see
|
||||
* org.springframework.security.config.annotation.web.HttpBuilder#authenticationProvider
|
||||
* (org.springframework.security.authentication.AuthenticationProvider)
|
||||
|
@ -966,7 +966,7 @@ public final class HttpSecurity extends
|
|||
|
||||
/*
|
||||
* (non-Javadoc)
|
||||
*
|
||||
*
|
||||
* @see
|
||||
* org.springframework.security.config.annotation.web.HttpBuilder#userDetailsService
|
||||
* (org.springframework.security.core.userdetails.UserDetailsService)
|
||||
|
@ -983,7 +983,7 @@ public final class HttpSecurity extends
|
|||
|
||||
/*
|
||||
* (non-Javadoc)
|
||||
*
|
||||
*
|
||||
* @see
|
||||
* org.springframework.security.config.annotation.web.HttpBuilder#addFilterAfter(javax
|
||||
* .servlet.Filter, java.lang.Class)
|
||||
|
@ -995,7 +995,7 @@ public final class HttpSecurity extends
|
|||
|
||||
/*
|
||||
* (non-Javadoc)
|
||||
*
|
||||
*
|
||||
* @see
|
||||
* org.springframework.security.config.annotation.web.HttpBuilder#addFilterBefore(
|
||||
* javax.servlet.Filter, java.lang.Class)
|
||||
|
@ -1008,7 +1008,7 @@ public final class HttpSecurity extends
|
|||
|
||||
/*
|
||||
* (non-Javadoc)
|
||||
*
|
||||
*
|
||||
* @see
|
||||
* org.springframework.security.config.annotation.web.HttpBuilder#addFilter(javax.
|
||||
* servlet.Filter)
|
||||
|
@ -1048,16 +1048,24 @@ public final class HttpSecurity extends
|
|||
* @Configuration
|
||||
* @EnableWebSecurity
|
||||
* public class RequestMatchersSecurityConfig extends WebSecurityConfigurerAdapter {
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(HttpSecurity http) throws Exception {
|
||||
* http.requestMatchers().antMatchers("/api/**", "/oauth/**").and()
|
||||
* .authorizeRequests().antMatchers("/**").hasRole("USER").and().httpBasic();
|
||||
* http
|
||||
* .requestMatchers()
|
||||
* .antMatchers("/api/**", "/oauth/**")
|
||||
* .and()
|
||||
* .authorizeRequests()
|
||||
* .antMatchers("/**").hasRole("USER")
|
||||
* .and()
|
||||
* .httpBasic();
|
||||
* }
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(AuthenticationManagerBuilder auth) throws Exception {
|
||||
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER");
|
||||
* auth
|
||||
* .inMemoryAuthentication()
|
||||
* .withUser("user").password("password").roles("USER");
|
||||
* }
|
||||
* }
|
||||
* </pre>
|
||||
|
@ -1068,16 +1076,25 @@ public final class HttpSecurity extends
|
|||
* @Configuration
|
||||
* @EnableWebSecurity
|
||||
* public class RequestMatchersSecurityConfig extends WebSecurityConfigurerAdapter {
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(HttpSecurity http) throws Exception {
|
||||
* http.requestMatchers().antMatchers("/api/**").antMatchers("/oauth/**").and()
|
||||
* .authorizeRequests().antMatchers("/**").hasRole("USER").and().httpBasic();
|
||||
* http
|
||||
* .requestMatchers()
|
||||
* .antMatchers("/api/**")
|
||||
* .antMatchers("/oauth/**")
|
||||
* .and()
|
||||
* .authorizeRequests()
|
||||
* .antMatchers("/**").hasRole("USER")
|
||||
* .and()
|
||||
* .httpBasic();
|
||||
* }
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(AuthenticationManagerBuilder auth) throws Exception {
|
||||
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER");
|
||||
* auth
|
||||
* .inMemoryAuthentication()
|
||||
* .withUser("user").password("password").roles("USER");
|
||||
* }
|
||||
* }
|
||||
* </pre>
|
||||
|
@ -1088,17 +1105,27 @@ public final class HttpSecurity extends
|
|||
* @Configuration
|
||||
* @EnableWebSecurity
|
||||
* public class RequestMatchersSecurityConfig extends WebSecurityConfigurerAdapter {
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(HttpSecurity http) throws Exception {
|
||||
* http.requestMatchers().antMatchers("/api/**").and().requestMatchers()
|
||||
* .antMatchers("/oauth/**").and().authorizeRequests().antMatchers("/**")
|
||||
* .hasRole("USER").and().httpBasic();
|
||||
* http
|
||||
* .requestMatchers()
|
||||
* .antMatchers("/api/**")
|
||||
* .and()
|
||||
* .requestMatchers()
|
||||
* .antMatchers("/oauth/**")
|
||||
* .and()
|
||||
* .authorizeRequests()
|
||||
* .antMatchers("/**").hasRole("USER")
|
||||
* .and()
|
||||
* .httpBasic();
|
||||
* }
|
||||
*
|
||||
*
|
||||
* @Override
|
||||
* protected void configure(AuthenticationManagerBuilder auth) throws Exception {
|
||||
* auth.inMemoryAuthentication().withUser("user").password("password").roles("USER");
|
||||
* auth
|
||||
* .inMemoryAuthentication()
|
||||
* .withUser("user").password("password").roles("USER");
|
||||
* }
|
||||
* }
|
||||
* </pre>
|
||||
|
|
Loading…
Reference in New Issue