diff --git a/spring-boot-modules/spring-boot-keycloak/src/main/java/com/baeldung/keycloak/SecurityConfig.java b/spring-boot-modules/spring-boot-keycloak/src/main/java/com/baeldung/keycloak/SecurityConfig.java index 24c9e1d8a1..1349ff5918 100644 --- a/spring-boot-modules/spring-boot-keycloak/src/main/java/com/baeldung/keycloak/SecurityConfig.java +++ b/spring-boot-modules/spring-boot-keycloak/src/main/java/com/baeldung/keycloak/SecurityConfig.java @@ -62,7 +62,7 @@ class SecurityConfig { .permitAll() .anyRequest() .authenticated()); - http.oauth2ResourceServer((oauth2) -> oauth2 + http.oauth2ResourceServer(oauth2 -> oauth2 .jwt(Customizer.withDefaults())); http.oauth2Login(Customizer.withDefaults()) .logout(logout -> logout.addLogoutHandler(keycloakLogoutHandler).logoutSuccessUrl("/")); @@ -88,8 +88,7 @@ class SecurityConfig { var roles = (Collection) realmAccess.get(ROLES_CLAIM); mappedAuthorities.addAll(generateAuthoritiesFromClaim(roles)); } else if (userInfo.hasClaim(GROUPS)) { - Collection roles = (Collection) userInfo.getClaim( - GROUPS); + Collection roles = userInfo.getClaim(GROUPS); mappedAuthorities.addAll(generateAuthoritiesFromClaim(roles)); } } else { @@ -97,8 +96,7 @@ class SecurityConfig { Map userAttributes = oauth2UserAuthority.getAttributes(); if (userAttributes.containsKey(REALM_ACCESS_CLAIM)) { - Map realmAccess = (Map) userAttributes.get( - REALM_ACCESS_CLAIM); + Map realmAccess = (Map) userAttributes.get(REALM_ACCESS_CLAIM); Collection roles = (Collection) realmAccess.get(ROLES_CLAIM); mappedAuthorities.addAll(generateAuthoritiesFromClaim(roles)); } diff --git a/spring-boot-modules/spring-boot-keycloak/src/main/java/com/baeldung/keycloaksoap/KeycloakSecurityConfig.java b/spring-boot-modules/spring-boot-keycloak/src/main/java/com/baeldung/keycloaksoap/KeycloakSecurityConfig.java index ff1cf0cb42..f76cfd4cc9 100644 --- a/spring-boot-modules/spring-boot-keycloak/src/main/java/com/baeldung/keycloaksoap/KeycloakSecurityConfig.java +++ b/spring-boot-modules/spring-boot-keycloak/src/main/java/com/baeldung/keycloaksoap/KeycloakSecurityConfig.java @@ -4,7 +4,7 @@ import org.springframework.boot.autoconfigure.condition.ConditionalOnProperty; import org.springframework.context.annotation.Bean; import org.springframework.context.annotation.Configuration; import org.springframework.security.config.Customizer; -import org.springframework.security.config.annotation.method.configuration.EnableGlobalMethodSecurity; +import org.springframework.security.config.annotation.method.configuration.EnableMethodSecurity; import org.springframework.security.config.annotation.web.builders.HttpSecurity; import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity; import org.springframework.security.config.annotation.web.configurers.AbstractHttpConfigurer; @@ -13,7 +13,7 @@ import org.springframework.security.web.SecurityFilterChain; @Configuration @EnableWebSecurity @ConditionalOnProperty(name = "keycloak.enabled", havingValue = "true") -@EnableGlobalMethodSecurity(jsr250Enabled = true) +@EnableMethodSecurity(jsr250Enabled = true) public class KeycloakSecurityConfig { @Bean @@ -21,7 +21,7 @@ public class KeycloakSecurityConfig { http.csrf(AbstractHttpConfigurer::disable) .authorizeHttpRequests(auth -> auth.anyRequest() .authenticated()) - .oauth2ResourceServer((oauth2) -> oauth2 + .oauth2ResourceServer(oauth2 -> oauth2 .jwt(Customizer.withDefaults())); return http.build(); }