You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@fineract.apache.org by pt...@apache.org on 2021/12/07 11:14:46 UTC

[fineract] branch develop updated: Disabling SonarQube HotSpot, because Fineract API Rest is creating services that are used by non-browser clients

This is an automated email from the ASF dual-hosted git repository.

ptuomola pushed a commit to branch develop
in repository https://gitbox.apache.org/repos/asf/fineract.git


The following commit(s) were added to refs/heads/develop by this push:
     new 291edd7  Disabling SonarQube HotSpot, because Fineract API Rest is creating services that are used by non-browser clients
291edd7 is described below

commit 291edd7a3ff048acd2d76effd66f2b2923d044d0
Author: Victor Romero <vi...@fintecheando.mx>
AuthorDate: Sun Dec 5 21:44:51 2021 -0600

    Disabling SonarQube HotSpot, because Fineract API Rest is creating services that are used by non-browser clients
    
    Disabling SonarQube HotSpot, because Fineract API Rest is creating services that are used by non-browser clients with spotlessApply
---
 .../org/apache/fineract/infrastructure/core/config/SecurityConfig.java  | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/fineract-provider/src/main/java/org/apache/fineract/infrastructure/core/config/SecurityConfig.java b/fineract-provider/src/main/java/org/apache/fineract/infrastructure/core/config/SecurityConfig.java
index 9b38c61..4269790 100644
--- a/fineract-provider/src/main/java/org/apache/fineract/infrastructure/core/config/SecurityConfig.java
+++ b/fineract-provider/src/main/java/org/apache/fineract/infrastructure/core/config/SecurityConfig.java
@@ -56,7 +56,7 @@ public class SecurityConfig extends WebSecurityConfigurerAdapter {
     protected void configure(HttpSecurity http) throws Exception {
 
         http //
-                .csrf().disable() //
+                .csrf().disable() // NOSONAR only creating a service that is used by non-browser clients
                 .antMatcher("/api/**").authorizeRequests() //
                 .antMatchers(HttpMethod.OPTIONS, "/api/**").permitAll() //
                 .antMatchers(HttpMethod.POST, "/api/*/echo").permitAll() //