1313
1414@ Configuration
1515@ EnableWebSecurity
16- public class DemoSecurityConfig {
16+ public class DemoSecurityConfig {
1717
1818// add a reference to our security data source
19-
19+
2020private DataSource securityDataSource ;
21-
21+
2222@ Autowired
2323public DemoSecurityConfig (DataSource theSecurityDataSource ) {
2424securityDataSource = theSecurityDataSource ;
2525}
26-
27- @ Bean
28- public UserDetailsManager userDetailsService () {
29- return new JdbcUserDetailsManager (securityDataSource );
30- }
31-
32- @ Bean
33- public SecurityFilterChain filterChain (HttpSecurity http ) throws Exception {
34-
35- return http
36- .authorizeRequests (configurer ->
37- configurer
38- .antMatchers ("/" ).hasRole ("EMPLOYEE" )
39- .antMatchers ("/leaders/**" ).hasRole ("MANAGER" )
40- .antMatchers ("/systems/**" ).hasRole ("ADMIN" ))
41-
42- .formLogin (configurer ->
43- configurer
44- .loginPage ("/showMyLoginPage" )
45- .loginProcessingUrl ("/authenticateTheUser" )
46- .permitAll ())
47-
48- .logout (configurer ->
49- configurer
50- .permitAll ())
51-
52- .exceptionHandling (configurer ->
53- configurer
54- .accessDeniedPage ("/access-denied" ))
55-
56- .build ();
57-
58- }
59-
26+
27+ @ Bean
28+ public UserDetailsManager userDetailsService () {
29+ return new JdbcUserDetailsManager (securityDataSource );
30+ }
31+
32+ @ Bean
33+ public SecurityFilterChain filterChain (HttpSecurity http ) throws Exception {
34+
35+ return http
36+ .authorizeRequests (configurer ->
37+ configurer
38+ .antMatchers ("/" ).hasRole ("EMPLOYEE" )
39+ .antMatchers ("/leaders/**" ).hasRole ("MANAGER" )
40+ .antMatchers ("/systems/**" ).hasRole ("ADMIN" ))
41+
42+ .formLogin (configurer -> configurer .loginPage ("/showMyLoginPage" )
43+ .loginProcessingUrl ("/authenticateTheUser" ).permitAll ())
44+
45+ .logout (configurer -> configurer .permitAll ())
46+
47+ .exceptionHandling (configurer -> configurer .accessDeniedPage ("/access-denied" ))
48+
49+ .build ();
50+
51+ }
52+
6053}
0 commit comments