Skip to content

Commit 56f63d9

Browse files
authored
Merge branch 'master' into master
2 parents 310702d + c879e3f commit 56f63d9

File tree

17 files changed

+4062
-3816
lines changed

17 files changed

+4062
-3816
lines changed

.github/workflows/ci.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,5 +72,5 @@ jobs:
7272
env:
7373
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
7474
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
75-
run: if not "${{ secrets.SONAR_TOKEN }}" == "" gradlew jacocoTestReport sonarqube check javadoc asciidoc -Dsonar.organization=webauthn4j -Dsonar.host.url=https://sonarcloud.io -Dsonar.login=${{ secrets.SONAR_TOKEN }}
75+
run: if not "${{ secrets.SONAR_TOKEN }}" == "" gradlew jacocoTestReport sonar check javadoc asciidoc -Dsonar.organization=webauthn4j -Dsonar.host.url=https://sonarcloud.io -Dsonar.login=${{ secrets.SONAR_TOKEN }}
7676
shell: cmd

.github/workflows/pr-gate-ci.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,5 +64,5 @@ jobs:
6464
env:
6565
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
6666
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
67-
run: if not "${{ secrets.SONAR_TOKEN }}" == "" gradlew jacocoTestReport sonarqube check javadoc asciidoc -Dsonar.organization=webauthn4j -Dsonar.host.url=https://sonarcloud.io -Dsonar.login=${{ secrets.SONAR_TOKEN }}
67+
run: if not "${{ secrets.SONAR_TOKEN }}" == "" gradlew jacocoTestReport sonar check javadoc asciidoc -Dsonar.organization=webauthn4j -Dsonar.host.url=https://sonarcloud.io -Dsonar.login=${{ secrets.SONAR_TOKEN }}
6868
shell: cmd

build.gradle

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,16 +18,16 @@ buildscript {
1818
ext{
1919
//Plugins
2020
springBootVersion = '2.7.9'
21-
sonarqubeVersion = '4.0.0.2929'
21+
sonarqubeVersion = '3.5.0.2730'
2222
asciidoctorGradleVersion = "3.3.2"
2323
artifactoryVersion = '4.31.5'
2424
bintrayVersion = '1.8.5'
25-
owaspDependencyCheckVersion = '8.1.0'
25+
owaspDependencyCheckVersion = '8.1.2'
2626
httpBuilderVersion = '0.7.2'
2727

2828
//Libraries
2929
webauthn4jVersion = '0.21.0.RELEASE'
30-
springSecurityVersion = '5.7.6'
30+
springSecurityVersion = '5.8.2'
3131
hibernateValidatorVersion = '6.2.5.Final'
3232
thymeleafVersion = '3.0.4.RELEASE'
3333
modelMapperVersion = '3.1.1'

package-lock.json

Lines changed: 10 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

samples/fido-server-conformance-test-app/src/main/java/com/webauthn4j/springframework/security/webauthn/sample/app/config/WebSecurityConfig.java

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ public AuthenticationManager authenticationManager(List<AuthenticationProvider>
103103
public WebSecurityCustomizer webSecurityCustomizer() {
104104
return (web) -> {
105105
// ignore static resources
106-
web.ignoring().antMatchers(
106+
web.ignoring().requestMatchers(
107107
"/favicon.ico",
108108
"/static/**",
109109
"/webjars/**");
@@ -144,21 +144,21 @@ public SecurityFilterChain filterChain(HttpSecurity http, AuthenticationManager
144144
http.addFilterAfter(fidoServerAssertionResultEndpointFilter, SessionManagementFilter.class);
145145

146146
// Authorization
147-
http.authorizeRequests()
148-
.mvcMatchers("/").permitAll()
149-
.mvcMatchers("/api/auth/status").permitAll()
150-
.mvcMatchers(HttpMethod.GET, "/login").permitAll()
151-
.mvcMatchers(HttpMethod.POST, "/api/profile").permitAll()
152-
.mvcMatchers("/health/**").permitAll()
153-
.mvcMatchers("/info/**").permitAll()
154-
.mvcMatchers("/h2-console/**").denyAll()
155-
.mvcMatchers("/api/admin/**").hasRole(ADMIN_ROLE)
147+
http.authorizeHttpRequests()
148+
.requestMatchers("/").permitAll()
149+
.requestMatchers("/api/auth/status").permitAll()
150+
.requestMatchers(HttpMethod.GET, "/login").permitAll()
151+
.requestMatchers(HttpMethod.POST, "/api/profile").permitAll()
152+
.requestMatchers("/health/**").permitAll()
153+
.requestMatchers("/info/**").permitAll()
154+
.requestMatchers("/h2-console/**").denyAll()
155+
.requestMatchers("/api/admin/**").hasRole(ADMIN_ROLE)
156156
.anyRequest().fullyAuthenticated();
157157

158158
//TODO:
159159
http.csrf().csrfTokenRepository(CookieCsrfTokenRepository.withHttpOnlyFalse());
160160

161-
http.csrf().ignoringAntMatchers("/webauthn/**");
161+
http.csrf().ignoringRequestMatchers("/webauthn/**");
162162

163163
http.authenticationManager(authenticationManager);
164164

0 commit comments

Comments
 (0)