diff --git a/pom.xml b/pom.xml index b51a5cdc..85d19484 100644 --- a/pom.xml +++ b/pom.xml @@ -6,7 +6,7 @@ org.springframework.boot spring-boot-starter-parent - 3.4.5 + 3.5.0 diff --git a/srv/src/main/java/my/bookshop/config/WebSecurityConfig.java b/srv/src/main/java/my/bookshop/config/WebSecurityConfig.java index 18bd091b..2233234c 100644 --- a/srv/src/main/java/my/bookshop/config/WebSecurityConfig.java +++ b/srv/src/main/java/my/bookshop/config/WebSecurityConfig.java @@ -1,7 +1,5 @@ package my.bookshop.config; -import static org.springframework.security.web.util.matcher.AntPathRequestMatcher.antMatcher; - import org.springframework.boot.autoconfigure.condition.ConditionalOnWebApplication; import org.springframework.context.annotation.Bean; import org.springframework.context.annotation.Configuration; @@ -9,6 +7,7 @@ import org.springframework.security.config.annotation.web.builders.HttpSecurity; import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity; import org.springframework.security.web.SecurityFilterChain; +import org.springframework.security.web.servlet.util.matcher.PathPatternRequestMatcher; @Configuration @ConditionalOnWebApplication @@ -18,7 +17,7 @@ public class WebSecurityConfig { @Bean public SecurityFilterChain configure(HttpSecurity http) throws Exception { - return http.securityMatchers(s -> s.requestMatchers(antMatcher("/swagger/**"))) // + return http.securityMatchers(s -> s.requestMatchers(PathPatternRequestMatcher.withDefaults().matcher("/swagger/**"))) // .csrf(c -> c.disable()).authorizeHttpRequests(a -> a.anyRequest().permitAll()) .build(); }