This is an automated email from the ASF dual-hosted git repository.

ilgrosso pushed a commit to branch 4_0_X
in repository https://gitbox.apache.org/repos/asf/syncope.git


The following commit(s) were added to refs/heads/4_0_X by this push:
     new 5623082977 Fix build
5623082977 is described below

commit 562308297719520e90dae155ba3a39e96038e868
Author: Francesco Chicchiriccò <[email protected]>
AuthorDate: Thu Jul 10 13:32:42 2025 +0200

    Fix build
---
 .../org/apache/syncope/core/spring/security/WebSecurityContext.java | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git 
a/core/spring/src/main/java/org/apache/syncope/core/spring/security/WebSecurityContext.java
 
b/core/spring/src/main/java/org/apache/syncope/core/spring/security/WebSecurityContext.java
index d876a67cab..0b582e9f50 100644
--- 
a/core/spring/src/main/java/org/apache/syncope/core/spring/security/WebSecurityContext.java
+++ 
b/core/spring/src/main/java/org/apache/syncope/core/spring/security/WebSecurityContext.java
@@ -51,7 +51,7 @@ import 
org.springframework.security.web.access.intercept.AuthorizationFilter;
 import 
org.springframework.security.web.authentication.www.BasicAuthenticationFilter;
 import org.springframework.security.web.firewall.DefaultHttpFirewall;
 import org.springframework.security.web.firewall.HttpFirewall;
-import 
org.springframework.security.web.servlet.util.matcher.PathPatternRequestMatcher;
+import org.springframework.security.web.util.matcher.AntPathRequestMatcher;
 
 @EnableWebSecurity
 @EnableMethodSecurity(prePostEnabled = true)
@@ -106,9 +106,9 @@ public class WebSecurityContext {
         http.addFilterBefore(mustChangePasswordFilter, 
AuthorizationFilter.class);
 
         http.authorizeHttpRequests(customizer -> customizer.
-                
requestMatchers(PathPatternRequestMatcher.withDefaults().matcher("/actuator/**")).
+                
requestMatchers(AntPathRequestMatcher.antMatcher("/actuator/**")).
                 hasAuthority(IdRepoEntitlement.ANONYMOUS).
-                
requestMatchers(PathPatternRequestMatcher.withDefaults().matcher("/**")).permitAll());
+                
requestMatchers(AntPathRequestMatcher.antMatcher("/**")).permitAll());
         http.securityContext(AbstractHttpConfigurer::disable);
         http.sessionManagement(AbstractHttpConfigurer::disable);
         http.headers(AbstractHttpConfigurer::disable);

Reply via email to