@@ -408,23 +408,23 @@ public HttpSecurity openidLogin(Customizer<OpenIDLoginConfigurer<HttpSecurity>>
408
408
* @EnableWebSecurity
409
409
* public class CsrfSecurityConfig {
410
410
*
411
- * @Bean
412
- * public SecurityFilterChain securityFilterChain(HttpSecurity http) throws Exception {
413
- * http
414
- * .headers()
415
- * .contentTypeOptions()
416
- * .and()
417
- * .xssProtection()
418
- * .and()
419
- * .cacheControl()
420
- * .and()
421
- * .httpStrictTransportSecurity()
422
- * .and()
423
- * .frameOptions()
424
- * .and()
425
- * ...;
426
- * return http.build();
427
- * }
411
+ * @Bean
412
+ * public SecurityFilterChain securityFilterChain(HttpSecurity http) throws Exception {
413
+ * http
414
+ * .headers()
415
+ * .contentTypeOptions()
416
+ * .and()
417
+ * .xssProtection()
418
+ * .and()
419
+ * .cacheControl()
420
+ * .and()
421
+ * .httpStrictTransportSecurity()
422
+ * .and()
423
+ * .frameOptions()
424
+ * .and()
425
+ * ...;
426
+ * return http.build();
427
+ * }
428
428
* }
429
429
* </pre>
430
430
*
@@ -435,13 +435,13 @@ public HttpSecurity openidLogin(Customizer<OpenIDLoginConfigurer<HttpSecurity>>
435
435
* @EnableWebSecurity
436
436
* public class CsrfSecurityConfig {
437
437
*
438
- * @Bean
439
- * public SecurityFilterChain securityFilterChain(HttpSecurity http) throws Exception {
440
- * http
441
- * .headers().disable()
442
- * ...;
443
- * return http.build();
444
- * }
438
+ * @Bean
439
+ * public SecurityFilterChain securityFilterChain(HttpSecurity http) throws Exception {
440
+ * http
441
+ * .headers().disable()
442
+ * ...;
443
+ * return http.build();
444
+ * }
445
445
* }
446
446
* </pre>
447
447
*
@@ -456,18 +456,18 @@ public HttpSecurity openidLogin(Customizer<OpenIDLoginConfigurer<HttpSecurity>>
456
456
* @EnableWebSecurity
457
457
* public class CsrfSecurityConfig {
458
458
*
459
- * @Bean
460
- * public SecurityFilterChain securityFilterChain(HttpSecurity http) throws Exception {
461
- * http
462
- * .headers()
463
- * .defaultsDisabled()
464
- * .cacheControl()
465
- * .and()
466
- * .frameOptions()
467
- * .and()
468
- * ...;
469
- * return http.build();
470
- * }
459
+ * @Bean
460
+ * public SecurityFilterChain securityFilterChain(HttpSecurity http) throws Exception {
461
+ * http
462
+ * .headers()
463
+ * .defaultsDisabled()
464
+ * .cacheControl()
465
+ * .and()
466
+ * .frameOptions()
467
+ * .and()
468
+ * ...;
469
+ * return http.build();
470
+ * }
471
471
* }
472
472
* </pre>
473
473
*
@@ -480,16 +480,16 @@ public HttpSecurity openidLogin(Customizer<OpenIDLoginConfigurer<HttpSecurity>>
480
480
* @EnableWebSecurity
481
481
* public class CsrfSecurityConfig {
482
482
*
483
- * @Bean
484
- * public SecurityFilterChain securityFilterChain(HttpSecurity http) throws Exception {
485
- * http
486
- * .headers()
487
- * .frameOptions()
488
- * .disable()
489
- * .and()
490
- * ...;
491
- * return http.build();
492
- * }
483
+ * @Bean
484
+ * public SecurityFilterChain securityFilterChain(HttpSecurity http) throws Exception {
485
+ * http
486
+ * .headers()
487
+ * .frameOptions()
488
+ * .disable()
489
+ * .and()
490
+ * ...;
491
+ * return http.build();
492
+ * }
493
493
* }
494
494
* </pre>
495
495
* @return the {@link HeadersConfigurer} for further customizations
@@ -625,12 +625,12 @@ public CorsConfigurer<HttpSecurity> cors() throws Exception {
625
625
* @EnableWebSecurity
626
626
* public class CorsSecurityConfig {
627
627
*
628
- * @Bean
629
- * public SecurityFilterChain securityFilterChain(HttpSecurity http) throws Exception {
630
- * http
631
- * .cors(withDefaults());
632
- * return http.build();
633
- * }
628
+ * @Bean
629
+ * public SecurityFilterChain securityFilterChain(HttpSecurity http) throws Exception {
630
+ * http
631
+ * .cors(withDefaults());
632
+ * return http.build();
633
+ * }
634
634
* }
635
635
* </pre>
636
636
* @param corsCustomizer the {@link Customizer} to provide more options for the
@@ -1836,13 +1836,13 @@ public HttpSecurity servletApi(Customizer<ServletApiConfigurer<HttpSecurity>> se
1836
1836
* @EnableWebSecurity
1837
1837
* public class CsrfSecurityConfig {
1838
1838
*
1839
- * @Bean
1840
- * public SecurityFilterChain securityFilterChain(HttpSecurity http) throws Exception {
1841
- * http
1842
- * .csrf().disable()
1843
- * ...;
1844
- * return http.build();
1845
- * }
1839
+ * @Bean
1840
+ * public SecurityFilterChain securityFilterChain(HttpSecurity http) throws Exception {
1841
+ * http
1842
+ * .csrf().disable()
1843
+ * ...;
1844
+ * return http.build();
1845
+ * }
1846
1846
* }
1847
1847
* </pre>
1848
1848
* @return the {@link CsrfConfigurer} for further customizations
@@ -1862,12 +1862,12 @@ public CsrfConfigurer<HttpSecurity> csrf() throws Exception {
1862
1862
* @EnableWebSecurity
1863
1863
* public class CsrfSecurityConfig {
1864
1864
*
1865
- * @Bean
1866
- * public SecurityFilterChain securityFilterChain(HttpSecurity http) throws Exception {
1867
- * http
1868
- * .csrf((csrf) -> csrf.disable());
1869
- * return http.build();
1870
- * }
1865
+ * @Bean
1866
+ * public SecurityFilterChain securityFilterChain(HttpSecurity http) throws Exception {
1867
+ * http
1868
+ * .csrf((csrf) -> csrf.disable());
1869
+ * return http.build();
1870
+ * }
1871
1871
* }
1872
1872
* </pre>
1873
1873
* @param csrfCustomizer the {@link Customizer} to provide more options for the
0 commit comments