Skip to content

Commit a5069d7

Browse files
committed
Fix Add @configuration to @enable*Security Usage
Issue gh-6613
1 parent 040111a commit a5069d7

File tree

16 files changed

+57
-8
lines changed

16 files changed

+57
-8
lines changed

config/src/integration-test/java/org/springframework/security/config/annotation/authentication/ldap/LdapAuthenticationProviderBuilderSecurityBuilderTests.java

+1
Original file line numberDiff line numberDiff line change
@@ -189,6 +189,7 @@ protected void configure(AuthenticationManagerBuilder auth) throws Exception {
189189

190190
}
191191

192+
@Configuration
192193
@EnableWebSecurity
193194
static class GroupSearchConfig extends BaseLdapProviderConfig {
194195

config/src/main/java/org/springframework/security/config/annotation/rsocket/RSocketSecurity.java

+2
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,7 @@
5555
* A minimal example can be found below:
5656
*
5757
* <pre class="code">
58+
* &#064;Configuration
5859
* &#064;EnableRSocketSecurity
5960
* public class SecurityConfig {
6061
* &#064;Bean
@@ -82,6 +83,7 @@
8283
* A more advanced configuration can be seen below:
8384
*
8485
* <pre class="code">
86+
* &#064;Configuration
8587
* &#064;EnableRSocketSecurity
8688
* public class SecurityConfig {
8789
* &#064;Bean

config/src/main/java/org/springframework/security/config/annotation/web/servlet/configuration/EnableWebMvcSecurity.java

-2
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,6 @@
2222
import java.lang.annotation.RetentionPolicy;
2323
import java.lang.annotation.Target;
2424

25-
import org.springframework.context.annotation.Configuration;
2625
import org.springframework.context.annotation.Import;
2726
import org.springframework.security.config.annotation.authentication.configuration.EnableGlobalAuthentication;
2827

@@ -39,7 +38,6 @@
3938
@Documented
4039
@Import(WebMvcSecurityConfiguration.class)
4140
@EnableGlobalAuthentication
42-
@Configuration
4341
@Deprecated
4442
public @interface EnableWebMvcSecurity {
4543

config/src/test/java/org/springframework/security/config/annotation/issue50/SecurityConfig.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -39,9 +39,9 @@
3939
* @author Rob Winch
4040
*
4141
*/
42+
@Configuration
4243
@EnableWebSecurity
4344
@EnableGlobalMethodSecurity(prePostEnabled = true)
44-
@Configuration
4545
public class SecurityConfig extends WebSecurityConfigurerAdapter {
4646

4747
@Autowired

config/src/test/java/org/springframework/security/config/annotation/method/configuration/GlobalMethodSecurityConfigurationTests.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -531,8 +531,8 @@ Authz authz() {
531531

532532
}
533533

534-
@EnableGlobalMethodSecurity(prePostEnabled = true)
535534
@Configuration
535+
@EnableGlobalMethodSecurity(prePostEnabled = true)
536536
public static class RoleHierarchyConfig {
537537

538538
@Bean
@@ -607,8 +607,8 @@ void emptyPrefixRoleUser() {
607607

608608
}
609609

610-
@EnableGlobalMethodSecurity(prePostEnabled = true)
611610
@Configuration
611+
@EnableGlobalMethodSecurity(prePostEnabled = true)
612612
public static class CustomMetadataSourceBeanProxyEnabledConfig extends GlobalMethodSecurityConfiguration {
613613

614614
}

config/src/test/java/org/springframework/security/config/annotation/method/configuration/NamespaceGlobalMethodSecurityTests.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -316,8 +316,8 @@ protected AuthenticationManager authenticationManager() {
316316

317317
}
318318

319-
@EnableGlobalMethodSecurity(jsr250Enabled = true)
320319
@Configuration
320+
@EnableGlobalMethodSecurity(jsr250Enabled = true)
321321
public static class Jsr250Config {
322322

323323
}

config/src/test/java/org/springframework/security/config/annotation/web/configurers/AnonymousConfigurerTests.java

+1
Original file line numberDiff line numberDiff line change
@@ -127,6 +127,7 @@ protected void configure(HttpSecurity http) throws Exception {
127127

128128
}
129129

130+
@Configuration
130131
@EnableWebSecurity
131132
static class AnonymousDisabledInLambdaConfig extends WebSecurityConfigurerAdapter {
132133

config/src/test/java/org/springframework/security/config/annotation/web/configurers/NamespaceHttpFormLoginTests.java

+1
Original file line numberDiff line numberDiff line change
@@ -131,6 +131,7 @@ protected void configure(HttpSecurity http) throws Exception {
131131

132132
}
133133

134+
@Configuration
134135
@EnableWebSecurity
135136
static class FormLoginCustomConfig extends WebSecurityConfigurerAdapter {
136137

config/src/test/java/org/springframework/security/config/annotation/web/configurers/X509ConfigurerTests.java

+7
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@
2626

2727
import org.springframework.beans.factory.annotation.Autowired;
2828
import org.springframework.context.annotation.Bean;
29+
import org.springframework.context.annotation.Configuration;
2930
import org.springframework.core.io.ClassPathResource;
3031
import org.springframework.security.config.annotation.ObjectPostProcessor;
3132
import org.springframework.security.config.annotation.SecurityContextChangedListenerConfig;
@@ -151,6 +152,7 @@ private <T extends Certificate> T loadCert(String location) {
151152
}
152153
}
153154

155+
@Configuration
154156
@EnableWebSecurity
155157
static class ObjectPostProcessorConfig extends WebSecurityConfigurerAdapter {
156158

@@ -180,6 +182,7 @@ public <O> O postProcess(O object) {
180182

181183
}
182184

185+
@Configuration
183186
@EnableWebSecurity
184187
static class DuplicateDoesNotOverrideConfig extends WebSecurityConfigurerAdapter {
185188

@@ -205,6 +208,7 @@ protected void configure(AuthenticationManagerBuilder auth) throws Exception {
205208

206209
}
207210

211+
@Configuration
208212
@EnableWebSecurity
209213
static class DefaultsInLambdaConfig extends WebSecurityConfigurerAdapter {
210214

@@ -227,6 +231,7 @@ protected void configure(AuthenticationManagerBuilder auth) throws Exception {
227231

228232
}
229233

234+
@Configuration
230235
@EnableWebSecurity
231236
static class SubjectPrincipalRegexInLambdaConfig extends WebSecurityConfigurerAdapter {
232237

@@ -252,6 +257,7 @@ protected void configure(AuthenticationManagerBuilder auth) throws Exception {
252257

253258
}
254259

260+
@Configuration
255261
@EnableWebSecurity
256262
static class UserDetailsServiceBeanConfig {
257263

@@ -279,6 +285,7 @@ UserDetailsService userDetailsService() {
279285

280286
}
281287

288+
@Configuration
282289
@EnableWebSecurity
283290
static class UserDetailsServiceAndBeanConfig {
284291

config/src/test/kotlin/org/springframework/security/config/annotation/method/configuration/KotlinEnableReactiveMethodSecurityTests.kt

+1-1
Original file line numberDiff line numberDiff line change
@@ -210,8 +210,8 @@ class KotlinEnableReactiveMethodSecurityTests {
210210
verify { delegate wasNot Called }
211211
}
212212

213-
@EnableReactiveMethodSecurity
214213
@Configuration
214+
@EnableReactiveMethodSecurity
215215
open class Config {
216216
var delegate = mockk<KotlinReactiveMessageService>()
217217

config/src/test/kotlin/org/springframework/security/config/web/server/AuthorizeExchangeDslTests.kt

+1-1
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ import org.springframework.test.web.reactive.server.WebTestClient
3232
import org.springframework.web.bind.annotation.RequestMapping
3333
import org.springframework.web.bind.annotation.RestController
3434
import org.springframework.web.reactive.config.EnableWebFlux
35-
import java.util.*
35+
import java.util.Base64
3636

3737
/**
3838
* Tests for [AuthorizeExchangeDsl]

docs/modules/ROOT/pages/servlet/authorization/method-security.adoc

+23
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
1+
12
[[jc-method]]
23
= Method Security
34

@@ -32,6 +33,7 @@ For example, the following would enable Spring Security's `@PreAuthorize` annota
3233
.Java
3334
[source,java,role="primary"]
3435
----
36+
@Configuration
3537
@EnableMethodSecurity
3638
public class MethodSecurityConfig {
3739
// ...
@@ -41,6 +43,7 @@ public class MethodSecurityConfig {
4143
.Kotlin
4244
[source,kotlin,role="secondary"]
4345
----
46+
@Configuration
4447
@EnableMethodSecurity
4548
class MethodSecurityConfig {
4649
// ...
@@ -98,6 +101,7 @@ You can enable support for Spring Security's `@Secured` annotation using:
98101
.Java
99102
[source,java,role="primary"]
100103
----
104+
@Configuration
101105
@EnableMethodSecurity(securedEnabled = true)
102106
public class MethodSecurityConfig {
103107
// ...
@@ -107,6 +111,7 @@ public class MethodSecurityConfig {
107111
.Kotlin
108112
[source,kotlin,role="secondary"]
109113
----
114+
@Configuration
110115
@EnableMethodSecurity(securedEnabled = true)
111116
class MethodSecurityConfig {
112117
// ...
@@ -127,6 +132,7 @@ or JSR-250 using:
127132
.Java
128133
[source,java,role="primary"]
129134
----
135+
@Configuration
130136
@EnableMethodSecurity(jsr250Enabled = true)
131137
public class MethodSecurityConfig {
132138
// ...
@@ -136,6 +142,7 @@ public class MethodSecurityConfig {
136142
.Kotlin
137143
[source,kotlin,role="secondary"]
138144
----
145+
@Configuration
139146
@EnableMethodSecurity(jsr250Enabled = true)
140147
class MethodSecurityConfig {
141148
// ...
@@ -264,6 +271,7 @@ To recreate what adding `@EnableMethodSecurity` does by default, you would publi
264271
.Java
265272
[source,java,role="primary"]
266273
----
274+
@Configuration
267275
@EnableMethodSecurity(prePostEnabled = false)
268276
class MethodSecurityConfig {
269277
@Bean
@@ -295,6 +303,7 @@ class MethodSecurityConfig {
295303
.Kotlin
296304
[source,kotlin,role="secondary"]
297305
----
306+
@Configuration
298307
@EnableMethodSecurity(prePostEnabled = false)
299308
class MethodSecurityConfig {
300309
@Bean
@@ -392,6 +401,7 @@ You may want to only support `@PreAuthorize` in your application, in which case
392401
.Java
393402
[source,java,role="primary"]
394403
----
404+
@Configuration
395405
@EnableMethodSecurity(prePostEnabled = false)
396406
class MethodSecurityConfig {
397407
@Bean
@@ -405,6 +415,7 @@ class MethodSecurityConfig {
405415
.Kotlin
406416
[source,kotlin,role="secondary"]
407417
----
418+
@Configuration
408419
@EnableMethodSecurity(prePostEnabled = false)
409420
class MethodSecurityConfig {
410421
@Bean
@@ -440,6 +451,7 @@ Thus, you can configure Spring Security to invoke your `AuthorizationManager` in
440451
.Java
441452
[source,java,role="primary"]
442453
----
454+
@Configuration
443455
@EnableMethodSecurity
444456
class MethodSecurityConfig {
445457
@Bean
@@ -458,6 +470,7 @@ class MethodSecurityConfig {
458470
.Kotlin
459471
[source,kotlin,role="secondary"]
460472
----
473+
@Configuration
461474
@EnableMethodSecurity
462475
class MethodSecurityConfig {
463476
@Bean
@@ -542,6 +555,7 @@ For example, if you have your own custom annotation, you can configure it like s
542555
.Java
543556
[source,java,role="primary"]
544557
----
558+
@Configuration
545559
@EnableMethodSecurity
546560
class MethodSecurityConfig {
547561
@Bean
@@ -558,6 +572,7 @@ class MethodSecurityConfig {
558572
.Kotlin
559573
[source,kotlin,role="secondary"]
560574
----
575+
@Configuration
561576
@EnableMethodSecurity
562577
class MethodSecurityConfig {
563578
@Bean
@@ -607,6 +622,7 @@ The following example enables Spring Security's `@Secured` annotation:
607622
.Java
608623
[source,java,role="primary"]
609624
----
625+
@Configuration
610626
@EnableGlobalMethodSecurity(securedEnabled = true)
611627
public class MethodSecurityConfig {
612628
// ...
@@ -616,6 +632,7 @@ public class MethodSecurityConfig {
616632
.Kotlin
617633
[source,kotlin,role="secondary"]
618634
----
635+
@Configuration
619636
@EnableGlobalMethodSecurity(securedEnabled = true)
620637
open class MethodSecurityConfig {
621638
// ...
@@ -666,6 +683,7 @@ Support for JSR-250 annotations can be enabled by using:
666683
.Java
667684
[source,java,role="primary"]
668685
----
686+
@Configuration
669687
@EnableGlobalMethodSecurity(jsr250Enabled = true)
670688
public class MethodSecurityConfig {
671689
// ...
@@ -675,6 +693,7 @@ public class MethodSecurityConfig {
675693
.Kotlin
676694
[source,kotlin,role="secondary"]
677695
----
696+
@Configuration
678697
@EnableGlobalMethodSecurity(jsr250Enabled = true)
679698
open class MethodSecurityConfig {
680699
// ...
@@ -689,6 +708,7 @@ To use the new expression-based syntax, you would use:
689708
.Java
690709
[source,java,role="primary"]
691710
----
711+
@Configuration
692712
@EnableGlobalMethodSecurity(prePostEnabled = true)
693713
public class MethodSecurityConfig {
694714
// ...
@@ -698,6 +718,7 @@ public class MethodSecurityConfig {
698718
.Kotlin
699719
[source,kotlin,role="secondary"]
700720
----
721+
@Configuration
701722
@EnableGlobalMethodSecurity(prePostEnabled = true)
702723
open class MethodSecurityConfig {
703724
// ...
@@ -750,6 +771,7 @@ For example, if you wanted to provide a custom `MethodSecurityExpressionHandler`
750771
.Java
751772
[source,java,role="primary"]
752773
----
774+
@Configuration
753775
@EnableGlobalMethodSecurity(prePostEnabled = true)
754776
public class MethodSecurityConfig extends GlobalMethodSecurityConfiguration {
755777
@Override
@@ -763,6 +785,7 @@ public class MethodSecurityConfig extends GlobalMethodSecurityConfiguration {
763785
.Kotlin
764786
[source,kotlin,role="secondary"]
765787
----
788+
@Configuration
766789
@EnableGlobalMethodSecurity(prePostEnabled = true)
767790
open class MethodSecurityConfig : GlobalMethodSecurityConfiguration() {
768791
override fun createExpressionHandler(): MethodSecurityExpressionHandler {

docs/modules/ROOT/pages/servlet/configuration/java.adoc

+1
Original file line numberDiff line numberDiff line change
@@ -324,6 +324,7 @@ You can also explicit disable the default:
324324
====
325325
[source,java]
326326
----
327+
@Configuration
327328
@EnableWebSecurity
328329
public class Config {
329330
@Bean

0 commit comments

Comments
 (0)