@Override protected void configureInbound(MessageSecurityMetadataSourceRegistry messages) { messages .anyMessage().access("denyRob()"); } // @formatter:on
@Test public void simpDestSubscribeMatchersNotMatch() { messages.simpSubscribeDestMatchers("location/**").denyAll().anyMessage() .permitAll(); assertThat(getAttribute()).isEqualTo("permitAll"); }
@Override protected void configureInbound(MessageSecurityMetadataSourceRegistry messages) { messages .simpDestMatchers("/app/a.*").permitAll() .anyMessage().denyAll(); } // @formatter:on
@Test public void simpDestMatchersAnyRole() { messages.simpDestMatchers("admin/**", "location/**").hasAnyRole("ADMIN", "ROOT") .anyMessage().denyAll(); assertThat(getAttribute()).isEqualTo("hasAnyRole('ROLE_ADMIN','ROLE_ROOT')"); }
@Test public void simpDestMatchersAuthority() { messages.simpDestMatchers("admin/**", "location/**").hasAuthority("ROLE_ADMIN") .anyMessage().fullyAuthenticated(); assertThat(getAttribute()).isEqualTo("hasAuthority('ROLE_ADMIN')"); }
@Test public void simpDestMatchersAnyAuthority() { messages.simpDestMatchers("admin/**", "location/**") .hasAnyAuthority("ROLE_ADMIN", "ROLE_ROOT").anyMessage().denyAll(); assertThat(getAttribute()).isEqualTo("hasAnyAuthority('ROLE_ADMIN','ROLE_ROOT')"); }
@Test public void simpDestMessageMatchersMatch() { messages.simpMessageDestMatchers("location/**").denyAll().anyMessage() .permitAll(); assertThat(getAttribute()).isEqualTo("denyAll"); }
@Override protected void configureInbound(MessageSecurityMetadataSourceRegistry messages) { messages .simpDestMatchers("/app/a/*").permitAll() .anyMessage().denyAll(); } // @formatter:on
@Test public void simpDestMatchersRole() { messages.simpDestMatchers("admin/**", "location/**").hasRole("ADMIN") .anyMessage().denyAll(); assertThat(getAttribute()).isEqualTo("hasRole('ROLE_ADMIN')"); }
@Test public void simpDestMatchersDenyAll() { messages.simpDestMatchers("admin/**", "location/**").denyAll().anyMessage() .permitAll(); assertThat(getAttribute()).isEqualTo("denyAll"); }
@Test public void simpTypeMatchersMatchMulti() { messages.simpTypeMatchers(SimpMessageType.CONNECT, SimpMessageType.MESSAGE) .denyAll().anyMessage().permitAll(); assertThat(getAttribute()).isEqualTo("denyAll"); }
@Test public void simpDestMatchersRememberMe() { messages.simpDestMatchers("admin/**", "location/**").rememberMe().anyMessage() .denyAll(); assertThat(getAttribute()).isEqualTo("rememberMe"); }
@Test public void nullDestMatcherNotMatches() { messages.nullDestMatcher().denyAll().anyMessage().permitAll(); assertThat(getAttribute()).isEqualTo("permitAll"); }
@Test public void simpTypeMatchersMatch() { messages.simpTypeMatchers(SimpMessageType.MESSAGE).denyAll().anyMessage() .permitAll(); assertThat(getAttribute()).isEqualTo("denyAll"); }
@Test public void simpTypeMatchersNotMatch() { messages.simpTypeMatchers(SimpMessageType.CONNECT).denyAll().anyMessage() .permitAll(); assertThat(getAttribute()).isEqualTo("permitAll"); }
@Test public void simpTypeMatchersNotMatchMulti() { messages.simpTypeMatchers(SimpMessageType.CONNECT, SimpMessageType.DISCONNECT) .denyAll().anyMessage().permitAll(); assertThat(getAttribute()).isEqualTo("permitAll"); }
@Test public void simpDestMatchersAccess() { String expected = "hasRole('ROLE_ADMIN') and fullyAuthenticated"; messages.simpDestMatchers("admin/**", "location/**").access(expected) .anyMessage().denyAll(); assertThat(getAttribute()).isEqualTo(expected); }
@Test public void simpDestMatchersFullyAuthenticated() { messages.simpDestMatchers("admin/**", "location/**").fullyAuthenticated() .anyMessage().denyAll(); assertThat(getAttribute()).isEqualTo("fullyAuthenticated"); }
@Override protected void configureInbound(MessageSecurityMetadataSourceRegistry messages) { messages .simpDestMatchers("/permitAll/**").permitAll() .simpDestMatchers("/customExpression/**").access("denyRob") .anyMessage().denyAll(); } // @formatter:on
@Override protected void configureInbound(MessageSecurityMetadataSourceRegistry messages) { messages .simpDestMatchers("/permitAll/**").permitAll() .simpDestMatchers("/beanResolver/**").access("@security.check()") .anyMessage().denyAll(); } // @formatter:on