Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

Commit 43016d5

Browse filesBrowse files
committed
minor #17793 [Security] Replacing deprecated role: IS_AUTHENTICATED_ANONYMOUSLY (rabdelaziz)
This PR was merged into the 5.4 branch. Discussion ---------- [Security] Replacing deprecated role: IS_AUTHENTICATED_ANONYMOUSLY Replacing deprecated role: IS_AUTHENTICATED_ANONYMOUSLY <!-- If your pull request fixes a BUG, use the oldest maintained branch that contains the bug (see https://symfony.com/releases for the list of maintained branches). If your pull request documents a NEW FEATURE, use the same Symfony branch where the feature was introduced (and `6.x` for features of unreleased versions). --> Commits ------- 8547d28 Replacing deprecated role: IS_AUTHENTICATED_ANONYMOUSLY
2 parents b0c1ea2 + 8547d28 commit 43016d5
Copy full SHA for 43016d5

File tree

1 file changed

+10
-10
lines changed
Filter options

1 file changed

+10
-10
lines changed

‎security/access_control.rst

Copy file name to clipboardExpand all lines: security/access_control.rst
+10-10Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -240,7 +240,7 @@ pattern so that it is only accessible by requests from the local server itself:
240240
access_control:
241241
#
242242
# the 'ips' option supports IP addresses and subnet masks
243-
- { path: '^/internal', roles: IS_AUTHENTICATED_ANONYMOUSLY, ips: [127.0.0.1, ::1, 192.168.0.1/24] }
243+
- { path: '^/internal', roles: PUBLIC_ACCESS, ips: [127.0.0.1, ::1, 192.168.0.1/24] }
244244
- { path: '^/internal', roles: ROLE_NO_ACCESS }
245245
246246
.. code-block:: xml
@@ -259,7 +259,7 @@ pattern so that it is only accessible by requests from the local server itself:
259259
<!-- ... -->
260260
261261
<!-- the 'ips' option supports IP addresses and subnet masks -->
262-
<rule path="^/internal" role="IS_AUTHENTICATED_ANONYMOUSLY">
262+
<rule path="^/internal" role="PUBLIC_ACCESS">
263263
<ip>127.0.0.1</ip>
264264
<ip>::1</ip>
265265
</rule>
@@ -278,7 +278,7 @@ pattern so that it is only accessible by requests from the local server itself:
278278
279279
$security->accessControl()
280280
->path('^/internal')
281-
->roles(['IS_AUTHENTICATED_ANONYMOUSLY'])
281+
->roles(['PUBLIC_ACCESS'])
282282
// the 'ips' option supports IP addresses and subnet masks
283283
->ips(['127.0.0.1', '::1'])
284284
;
@@ -306,7 +306,7 @@ address):
306306

307307
* Now, the first access control rule is enabled as both the ``path`` and the
308308
``ip`` match: access is allowed as the user always has the
309-
``IS_AUTHENTICATED_ANONYMOUSLY`` role.
309+
``PUBLIC_ACCESS`` role.
310310

311311
* The second access rule is not examined as the first rule matched.
312312

@@ -411,7 +411,7 @@ access those URLs via a specific port. This could be useful for example for
411411
security:
412412
# ...
413413
access_control:
414-
- { path: ^/cart/checkout, roles: IS_AUTHENTICATED_ANONYMOUSLY, port: 8080 }
414+
- { path: ^/cart/checkout, roles: PUBLIC_ACCESS, port: 8080 }
415415
416416
.. code-block:: xml
417417
@@ -428,7 +428,7 @@ access those URLs via a specific port. This could be useful for example for
428428
<config>
429429
<!-- ... -->
430430
<rule path="^/cart/checkout"
431-
role="IS_AUTHENTICATED_ANONYMOUSLY"
431+
role="PUBLIC_ACCESS"
432432
port="8080"
433433
/>
434434
</config>
@@ -444,7 +444,7 @@ access those URLs via a specific port. This could be useful for example for
444444
445445
$security->accessControl()
446446
->path('^/cart/checkout')
447-
->roles(['IS_AUTHENTICATED_ANONYMOUSLY'])
447+
->roles(['PUBLIC_ACCESS'])
448448
->port(8080)
449449
;
450450
};
@@ -465,7 +465,7 @@ the user will be redirected to ``https``:
465465
security:
466466
# ...
467467
access_control:
468-
- { path: ^/cart/checkout, roles: IS_AUTHENTICATED_ANONYMOUSLY, requires_channel: https }
468+
- { path: ^/cart/checkout, roles: PUBLIC_ACCESS, requires_channel: https }
469469
470470
.. code-block:: xml
471471
@@ -482,7 +482,7 @@ the user will be redirected to ``https``:
482482
<config>
483483
<!-- ... -->
484484
<rule path="^/cart/checkout"
485-
role="IS_AUTHENTICATED_ANONYMOUSLY"
485+
role="PUBLIC_ACCESS"
486486
requires-channel="https"
487487
/>
488488
</config>
@@ -498,7 +498,7 @@ the user will be redirected to ``https``:
498498
499499
$security->accessControl()
500500
->path('^/cart/checkout')
501-
->roles(['IS_AUTHENTICATED_ANONYMOUSLY'])
501+
->roles(['PUBLIC_ACCESS'])
502502
->requiresChannel('https')
503503
;
504504
};

0 commit comments

Comments
0 (0)
Morty Proxy This is a proxified and sanitized view of the page, visit original site.