This is an automated email from the ASF dual-hosted git repository.
ilgrosso pushed a commit to branch 4_0_X
in repository https://gitbox.apache.org/repos/asf/syncope.git
The following commit(s) were added to refs/heads/4_0_X by this push:
new 5623082977 Fix build
5623082977 is described below
commit 562308297719520e90dae155ba3a39e96038e868
Author: Francesco Chicchiriccò <[email protected]>
AuthorDate: Thu Jul 10 13:32:42 2025 +0200
Fix build
---
.../org/apache/syncope/core/spring/security/WebSecurityContext.java | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git
a/core/spring/src/main/java/org/apache/syncope/core/spring/security/WebSecurityContext.java
b/core/spring/src/main/java/org/apache/syncope/core/spring/security/WebSecurityContext.java
index d876a67cab..0b582e9f50 100644
---
a/core/spring/src/main/java/org/apache/syncope/core/spring/security/WebSecurityContext.java
+++
b/core/spring/src/main/java/org/apache/syncope/core/spring/security/WebSecurityContext.java
@@ -51,7 +51,7 @@ import
org.springframework.security.web.access.intercept.AuthorizationFilter;
import
org.springframework.security.web.authentication.www.BasicAuthenticationFilter;
import org.springframework.security.web.firewall.DefaultHttpFirewall;
import org.springframework.security.web.firewall.HttpFirewall;
-import
org.springframework.security.web.servlet.util.matcher.PathPatternRequestMatcher;
+import org.springframework.security.web.util.matcher.AntPathRequestMatcher;
@EnableWebSecurity
@EnableMethodSecurity(prePostEnabled = true)
@@ -106,9 +106,9 @@ public class WebSecurityContext {
http.addFilterBefore(mustChangePasswordFilter,
AuthorizationFilter.class);
http.authorizeHttpRequests(customizer -> customizer.
-
requestMatchers(PathPatternRequestMatcher.withDefaults().matcher("/actuator/**")).
+
requestMatchers(AntPathRequestMatcher.antMatcher("/actuator/**")).
hasAuthority(IdRepoEntitlement.ANONYMOUS).
-
requestMatchers(PathPatternRequestMatcher.withDefaults().matcher("/**")).permitAll());
+
requestMatchers(AntPathRequestMatcher.antMatcher("/**")).permitAll());
http.securityContext(AbstractHttpConfigurer::disable);
http.sessionManagement(AbstractHttpConfigurer::disable);
http.headers(AbstractHttpConfigurer::disable);