You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@fineract.apache.org by pt...@apache.org on 2021/12/07 11:14:46 UTC
[fineract] branch develop updated: Disabling SonarQube HotSpot, because Fineract API Rest is creating services that are used by non-browser clients
This is an automated email from the ASF dual-hosted git repository.
ptuomola pushed a commit to branch develop
in repository https://gitbox.apache.org/repos/asf/fineract.git
The following commit(s) were added to refs/heads/develop by this push:
new 291edd7 Disabling SonarQube HotSpot, because Fineract API Rest is creating services that are used by non-browser clients
291edd7 is described below
commit 291edd7a3ff048acd2d76effd66f2b2923d044d0
Author: Victor Romero <vi...@fintecheando.mx>
AuthorDate: Sun Dec 5 21:44:51 2021 -0600
Disabling SonarQube HotSpot, because Fineract API Rest is creating services that are used by non-browser clients
Disabling SonarQube HotSpot, because Fineract API Rest is creating services that are used by non-browser clients with spotlessApply
---
.../org/apache/fineract/infrastructure/core/config/SecurityConfig.java | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/fineract-provider/src/main/java/org/apache/fineract/infrastructure/core/config/SecurityConfig.java b/fineract-provider/src/main/java/org/apache/fineract/infrastructure/core/config/SecurityConfig.java
index 9b38c61..4269790 100644
--- a/fineract-provider/src/main/java/org/apache/fineract/infrastructure/core/config/SecurityConfig.java
+++ b/fineract-provider/src/main/java/org/apache/fineract/infrastructure/core/config/SecurityConfig.java
@@ -56,7 +56,7 @@ public class SecurityConfig extends WebSecurityConfigurerAdapter {
protected void configure(HttpSecurity http) throws Exception {
http //
- .csrf().disable() //
+ .csrf().disable() // NOSONAR only creating a service that is used by non-browser clients
.antMatcher("/api/**").authorizeRequests() //
.antMatchers(HttpMethod.OPTIONS, "/api/**").permitAll() //
.antMatchers(HttpMethod.POST, "/api/*/echo").permitAll() //