Skip to content

Commit 63aec87

Browse files
committed
Use Imperative in Headers
Issue gh-12224
1 parent 7675874 commit 63aec87

File tree

4 files changed

+9
-14
lines changed

4 files changed

+9
-14
lines changed

docs/modules/ROOT/pages/migration/reactive.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -171,7 +171,7 @@ http {
171171

172172
To opt-out of the 6.0 defaults and instead continue to pass `AuthenticationServiceException` on to ``ServerAuthenticationEntryPoint``s, you can follow the same steps as above, except set `rethrowAuthenticationServiceException` to false.
173173

174-
== Deprecations in OAuth2 Client
174+
== Address OAuth2 Client Deprecations
175175

176176
=== `ServerOAuth2AuthorizedClientExchangeFilterFunction`
177177

docs/modules/ROOT/pages/migration/servlet/exploits.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ open fun springSecurity(http: HttpSecurity): SecurityFilterChain {
114114
----
115115
====
116116

117-
== CSRF BREACH Protection
117+
== Protect against CSRF BREACH
118118

119119
If the steps for <<Defer Loading CsrfToken>> work for you, then you can also opt into Spring Security 6's default support for BREACH protection of the `CsrfToken` using the following configuration:
120120

docs/modules/ROOT/pages/migration/servlet/oauth2.adoc

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
The following steps relate to changes around how to configure OAuth 2.0.
44

5-
== Default authorities for oauth2Login()
5+
== Change Default `oauth2Login()` Authorities
66

77
In Spring Security 5, the default `GrantedAuthority` given to a user that authenticates with an OAuth2 or OpenID Connect 1.0 provider (via `oauth2Login()`) is `ROLE_USER`.
88

@@ -192,7 +192,7 @@ private fun grantedAuthoritiesMapper(): GrantedAuthoritiesMapper {
192192
----
193193
====
194194

195-
== Deprecations in OAuth2 Client
195+
== Address OAuth2 Client Deprecations
196196

197197
In Spring Security 6, deprecated classes and methods were removed from xref:servlet/oauth2/client/index.adoc[OAuth2 Client].
198198
Each deprecation is listed below, along with a direct replacement.
@@ -313,12 +313,7 @@ The static method `implicit()` has no direct replacement.
313313
Use of the `implicit` grant type is not recommended and all related support is removed in Spring Security 6.
314314
====
315315

316-
== Deprecations in OAuth2 Resource Server
317-
318-
In Spring Security 6, deprecated classes and methods were removed from xref:servlet/oauth2/resource-server/index.adoc[OAuth2 Resource Server].
319-
Each deprecation is listed below, along with a direct replacement.
320-
321-
=== `JwtAuthenticationConverter`
316+
== Address `JwtAuthenticationConverter` Deprecation
322317

323318
The method `extractAuthorities(...)` can be replaced with `JwtGrantedAuthoritiesConverter#convert(...)`.
324319

docs/modules/ROOT/pages/migration/servlet/session-management.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
= Session Management Migrations
22

3-
== Explicit Save SecurityContextRepository
3+
== Require Explicit Saving of SecurityContextRepository
44

55
In Spring Security 5, the default behavior is for the xref:servlet/authentication/architecture.adoc#servlet-authentication-securitycontext[`SecurityContext`] to automatically be saved to the xref:servlet/authentication/persistence.adoc#securitycontextrepository[`SecurityContextRepository`] using the xref:servlet/authentication/persistence.adoc#securitycontextpersistencefilter[`SecurityContextPersistenceFilter`].
66
Saving must be done just prior to the `HttpServletResponse` being committed and just before `SecurityContextPersistenceFilter`.
@@ -15,7 +15,7 @@ To opt into the new Spring Security 6 default, the following configuration can b
1515

1616
include::partial$servlet/architecture/security-context-explicit.adoc[]
1717

18-
== Multiple SecurityContextRepository
18+
== Change `HttpSessionSecurityContextRepository` to `DelegatingSecurityContextRepository`
1919

2020
In Spring Security 5, the default xref:servlet/authentication/persistence.adoc#securitycontextrepository[`SecurityContextRepository`] is `HttpSessionSecurityContextRepository`.
2121

@@ -82,7 +82,7 @@ fun securityFilterChain(http: HttpSecurity): SecurityFilterChain {
8282
If you are already using an implementation other than `HttpSessionSecurityContextRepository`, you should replace it with your chosen implementation in the example above to ensure that it is used along with `RequestAttributeSecurityContextRepository`.
8383
====
8484

85-
== Deprecation in SecurityContextRepository
85+
== Address `SecurityContextRepository` Deprecations
8686

8787
In Spring Security 5.7, a new method was added to xref:servlet/authentication/persistence.adoc#securitycontextrepository[`SecurityContextRepository`] with the signature:
8888

@@ -170,7 +170,7 @@ If you are not overriding the defaults (i.e. using `NullRequestCache`), then the
170170

171171
include::partial$servlet/architecture/request-cache-continue.adoc[]
172172

173-
== Explicit SessionAuthenticationStrategy
173+
== Require Explicit Invocation of SessionAuthenticationStrategy
174174

175175
In Spring Security 5, the default configuration relies on `SessionManagementFilter` to detect if a user just authenticated and invoke the `SessionAuthenticationStrategy`.
176176
The problem with this is that it means that in a typical setup, the `HttpSession` must be read for every request.

0 commit comments

Comments
 (0)