Typo: Update authorize-http-requests.adoc
'patters' -> 'pattern' ----- 'db' -> "db", 'ADMIN' -> "ADMIN" They should be string type ----- There is no semicolon. I added it. ----- There is no semicolon at the end of the sentence. So I added
This commit is contained in:
parent
7f58a275ae
commit
fd1db06efd
|
@ -258,7 +258,7 @@ void endpointWhenNotUserAuthorityThenForbidden() {
|
||||||
@Test
|
@Test
|
||||||
void anyWhenUnauthenticatedThenUnauthorized() {
|
void anyWhenUnauthenticatedThenUnauthorized() {
|
||||||
this.mvc.perform(get("/any"))
|
this.mvc.perform(get("/any"))
|
||||||
.andExpect(status().isUnauthorized())
|
.andExpect(status().isUnauthorized());
|
||||||
}
|
}
|
||||||
----
|
----
|
||||||
======
|
======
|
||||||
|
@ -387,7 +387,7 @@ void endpointWhenNotUserAuthorityThenForbidden() {
|
||||||
@Test
|
@Test
|
||||||
void anyWhenUnauthenticatedThenUnauthorized() {
|
void anyWhenUnauthenticatedThenUnauthorized() {
|
||||||
this.mvc.perform(get("/any"))
|
this.mvc.perform(get("/any"))
|
||||||
.andExpect(status().isUnauthorized())
|
.andExpect(status().isUnauthorized());
|
||||||
}
|
}
|
||||||
----
|
----
|
||||||
======
|
======
|
||||||
|
@ -521,7 +521,7 @@ void getWhenNoReadAuthorityThenForbidden() {
|
||||||
@Test
|
@Test
|
||||||
void postWhenWriteAuthorityThenAuthorized() {
|
void postWhenWriteAuthorityThenAuthorized() {
|
||||||
this.mvc.perform(post("/any").with(csrf()))
|
this.mvc.perform(post("/any").with(csrf()))
|
||||||
.andExpect(status().isOk())
|
.andExpect(status().isOk());
|
||||||
}
|
}
|
||||||
|
|
||||||
@WithMockUser(authorities="read")
|
@WithMockUser(authorities="read")
|
||||||
|
@ -737,7 +737,7 @@ SecurityFilterChain web(HttpSecurity http) throws Exception {
|
||||||
.dispatcherTypeMatchers(FORWARD, ERROR).permitAll() // <2>
|
.dispatcherTypeMatchers(FORWARD, ERROR).permitAll() // <2>
|
||||||
.requestMatchers("/static/**", "/signup", "/about").permitAll() // <3>
|
.requestMatchers("/static/**", "/signup", "/about").permitAll() // <3>
|
||||||
.requestMatchers("/admin/**").hasRole("ADMIN") // <4>
|
.requestMatchers("/admin/**").hasRole("ADMIN") // <4>
|
||||||
.requestMatchers("/db/**").access(allOf(hasAuthority('db'), hasRole('ADMIN'))) // <5>
|
.requestMatchers("/db/**").access(allOf(hasAuthority("db"), hasRole("ADMIN"))) // <5>
|
||||||
.anyRequest().denyAll() // <6>
|
.anyRequest().denyAll() // <6>
|
||||||
);
|
);
|
||||||
|
|
||||||
|
@ -805,7 +805,7 @@ Xml::
|
||||||
</http>
|
</http>
|
||||||
----
|
----
|
||||||
======
|
======
|
||||||
<1> We specified a URL patters that any user can access.
|
<1> We specified a URL pattern that any user can access.
|
||||||
Specifically, any user can access a request if the URL starts with "/static/".
|
Specifically, any user can access a request if the URL starts with "/static/".
|
||||||
<2> Any URL that starts with "/admin/" will be restricted to users who have the role "ROLE_ADMIN".
|
<2> Any URL that starts with "/admin/" will be restricted to users who have the role "ROLE_ADMIN".
|
||||||
You will notice that since we are invoking the `hasRole` method we do not need to specify the "ROLE_" prefix.
|
You will notice that since we are invoking the `hasRole` method we do not need to specify the "ROLE_" prefix.
|
||||||
|
|
Loading…
Reference in New Issue