Bladeren bron

Corrected links in manual, comment in schema file.

Luke Taylor 16 jaren geleden
bovenliggende
commit
24911eb606

+ 1 - 1
config/src/main/resources/org/springframework/security/config/spring-security-3.0.rnc

@@ -228,7 +228,7 @@ expression-handler =
     element expression-handler {ref}
     element expression-handler {ref}
 
 
 custom-after-invocation-provider =
 custom-after-invocation-provider =
-    ## Used to decorate an AfterInvocationProvider to specify that it should be used with method security.
+    ## No longer supported. Use after-invocation-provider instead.
     element custom-after-invocation-provider {empty}
     element custom-after-invocation-provider {empty}
 
 
 protect-pointcut =
 protect-pointcut =

+ 3 - 3
docs/manual/src/docbook/appendix-namespace.xml

@@ -161,9 +161,9 @@
           there is no preference. If this attribute is present on any
           there is no preference. If this attribute is present on any
             <literal>&lt;intercept-url&gt;</literal> element, then a
             <literal>&lt;intercept-url&gt;</literal> element, then a
             <classname>ChannelProcessingFilter</classname> will be added to the filter stack and its
             <classname>ChannelProcessingFilter</classname> will be added to the filter stack and its
-          additional dependencies added to the application context. See the chapter on <link
+          additional dependencies added to the application context. <!--See the chapter on <link
             xlink:href="#channel-security-config">channel security</link> for an example
             xlink:href="#channel-security-config">channel security</link> for an example
-          configuration using traditional beans. </para>
+          configuration using traditional beans. --></para>
         <para> If a <literal>&lt;port-mappings&gt;</literal> configuration is added, this will be
         <para> If a <literal>&lt;port-mappings&gt;</literal> configuration is added, this will be
           used to by the <classname>SecureChannelProcessor</classname> and
           used to by the <classname>SecureChannelProcessor</classname> and
             <classname>InsecureChannelProcessor</classname> beans to determine the ports used for
             <classname>InsecureChannelProcessor</classname> beans to determine the ports used for
@@ -423,7 +423,7 @@
       <section>
       <section>
         <title>The &lt;authentication-provider&gt; Element</title>
         <title>The &lt;authentication-provider&gt; Element</title>
         <para> This element is basically a shorthand syntax for configuring a <link
         <para> This element is basically a shorthand syntax for configuring a <link
-            xlink:href="#dao-provider"><classname>DaoAuthenticationProvider</classname></link>.
+          xlink:href="#core-services-dao-provider"><classname>DaoAuthenticationProvider</classname></link>.
             <classname>DaoAuthenticationProvider</classname> loads user information from a
             <classname>DaoAuthenticationProvider</classname> loads user information from a
             <interfacename>UserDetailsService</interfacename> and compares the username/password
             <interfacename>UserDetailsService</interfacename> and compares the username/password
           combination with the values supplied at login. The
           combination with the values supplied at login. The

+ 5 - 5
docs/manual/src/docbook/core-services.xml

@@ -8,7 +8,7 @@
             <interfacename>AccessDecisionManager</interfacename>. These crop up regularly throughout
             <interfacename>AccessDecisionManager</interfacename>. These crop up regularly throughout
         the remainder of this document so it's important you know how they are configured and how
         the remainder of this document so it's important you know how they are configured and how
         they operate. </para>
         they operate. </para>
-    <section xml:id="authentication-manager">
+    <section xml:id="core-services-authentication-manager">
         <title>The <interfacename>AuthenticationManager</interfacename>,
         <title>The <interfacename>AuthenticationManager</interfacename>,
                 <classname>ProviderManager</classname> and
                 <classname>ProviderManager</classname> and
                 <classname>AuthenticationProvider</classname>s</title>
                 <classname>AuthenticationProvider</classname>s</title>
@@ -74,7 +74,7 @@
             concerned about this, because if you forget to register a suitable provider, you'll
             concerned about this, because if you forget to register a suitable provider, you'll
             simply receive a <literal>ProviderNotFoundException</literal> when an attempt to
             simply receive a <literal>ProviderNotFoundException</literal> when an attempt to
             authenticate is made.</para>
             authenticate is made.</para>
-        <section>
+        <section xml:id="core-services-dao-provider">
             <title><literal>DaoAuthenticationProvider</literal></title>
             <title><literal>DaoAuthenticationProvider</literal></title>
             <para>The simplest <interfacename>AuthenticationProvider</interfacename> implemented by
             <para>The simplest <interfacename>AuthenticationProvider</interfacename> implemented by
                 Spring Security is <literal>DaoAuthenticationProvider</literal>, which is is also
                 Spring Security is <literal>DaoAuthenticationProvider</literal>, which is is also
@@ -128,7 +128,7 @@
             should be easy for users to retrieve authentication information using a persistence
             should be easy for users to retrieve authentication information using a persistence
             strategy of their choice. Having said that, Spring Security does include a couple of
             strategy of their choice. Having said that, Spring Security does include a couple of
             useful base implementations, which we'll look at below.</para>
             useful base implementations, which we'll look at below.</para>
-        <section xml:id="in-memory-service">
+        <section xml:id="core-services-in-memory-service">
             <title>In-Memory Authentication</title>
             <title>In-Memory Authentication</title>
             <para>Is easy to use create a custom <interfacename>UserDetailsService</interfacename>
             <para>Is easy to use create a custom <interfacename>UserDetailsService</interfacename>
                 implementation that extracts information from a persistence engine of choice, but
                 implementation that extracts information from a persistence engine of choice, but
@@ -137,7 +137,7 @@
                 Security, when you don't really want to spend time configuring databases or writing
                 Security, when you don't really want to spend time configuring databases or writing
                     <interfacename>UserDetailsService</interfacename> implementations. For this sort
                     <interfacename>UserDetailsService</interfacename> implementations. For this sort
                 of situation, a simple option is to use the <literal>user-service</literal> element
                 of situation, a simple option is to use the <literal>user-service</literal> element
-                from the security <link xlink:href="#namespace-minimal">namespace</link>: <programlisting><![CDATA[
+                from the security <link xlink:href="#ns-minimal">namespace</link>: <programlisting><![CDATA[
   <user-service id="userDetailsService">
   <user-service id="userDetailsService">
     <user name="jimi" password="jimispassword" authorities="ROLE_USER, ROLE_ADMIN" />
     <user name="jimi" password="jimispassword" authorities="ROLE_USER, ROLE_ADMIN" />
     <user name="bob" password="bobspassword" authorities="ROLE_USER" />
     <user name="bob" password="bobspassword" authorities="ROLE_USER" />
@@ -153,7 +153,7 @@
  jimi=jimispassword,ROLE_USER,ROLE_ADMIN,enabled
  jimi=jimispassword,ROLE_USER,ROLE_ADMIN,enabled
  bob=bobspassword,ROLE_USER,enabled</programlisting></para>
  bob=bobspassword,ROLE_USER,enabled</programlisting></para>
         </section>
         </section>
-        <section xml:id="jdbc-service">
+        <section xml:id="core-services-jdbc-user-service">
             <title><literal>JdbcDaoImpl</literal></title>
             <title><literal>JdbcDaoImpl</literal></title>
             <para>Spring Security also includes a <interfacename>UserDetailsService</interfacename>
             <para>Spring Security also includes a <interfacename>UserDetailsService</interfacename>
                 that can obtain authentication information from a JDBC data source. Internally
                 that can obtain authentication information from a JDBC data source. Internally

+ 4 - 4
docs/manual/src/docbook/namespace-config.xml

@@ -177,7 +177,7 @@
         application (which will be used for access control). It is also possible to load user
         application (which will be used for access control). It is also possible to load user
         information from a standard properties file using the <literal>properties</literal>
         information from a standard properties file using the <literal>properties</literal>
         attribute on <literal>user-service</literal>. See the section on <link
         attribute on <literal>user-service</literal>. See the section on <link
-          xlink:href="#in-memory-service">in-memory authentication</link> for more details. Using
+          xlink:href="#core-services-in-memory-service">in-memory authentication</link> for more details. Using
         the <literal>&lt;authentication-provider&gt;</literal> element means that the user
         the <literal>&lt;authentication-provider&gt;</literal> element means that the user
         information will be used by the authentication manager to process authentication requests. </para>
         information will be used by the authentication manager to process authentication requests. </para>
       <para> At this point you should be able to start up your application and you will be required
       <para> At this point you should be able to start up your application and you will be required
@@ -366,8 +366,8 @@
       <port-mapping http="9080" https="9443"/>
       <port-mapping http="9080" https="9443"/>
     </port-mappings>
     </port-mappings>
   </http>]]>
   </http>]]>
-        </programlisting> You can find a more in-depth discussion of channel security
-        in <xref xlink:href="#channel-security"/>. </para>
+        </programlisting> <!--You can find a more in-depth discussion of channel security
+        in <xref xlink:href="#channel-security"/--> </para>
     </section>
     </section>
     <section xml:id="ns-concurrent-session">
     <section xml:id="ns-concurrent-session">
       <title>Concurrent Session Control</title>
       <title>Concurrent Session Control</title>
@@ -569,7 +569,7 @@
           element. </para>
           element. </para>
         <para> The CAS sample application is a good example of the use of custom beans with the
         <para> The CAS sample application is a good example of the use of custom beans with the
           namespace, including this syntax. If you aren't familiar with authentication entry points,
           namespace, including this syntax. If you aren't familiar with authentication entry points,
-          they are discussed in the <link xlink:href="#tech-auth-entry-point">technical
+          they are discussed in the <link xlink:href="#tech-intro-auth-entry-point">technical
             overview</link> chapter. </para>
             overview</link> chapter. </para>
       </section>
       </section>
     </section>
     </section>

+ 1 - 1
docs/manual/src/docbook/preauth.xml

@@ -111,7 +111,7 @@
     <section>
     <section>
       <title>Http403ForbiddenEntryPoint</title>
       <title>Http403ForbiddenEntryPoint</title>
       <para>
       <para>
-        The <interfacename>AuthenticationEntryPoint</interfacename> was discussed in the <link xlink:href="#tech-auth-entry-point">technical
+        The <interfacename>AuthenticationEntryPoint</interfacename> was discussed in the <link xlink:href="#tech-intro-auth-entry-point">technical
         overview</link> chapter. Normally it is responsible for kick-starting the authentication process for an unauthenticated user
         overview</link> chapter. Normally it is responsible for kick-starting the authentication process for an unauthenticated user
         (when they try to access a protected resource), but in the pre-authenticated case this doesn't apply. You would only
         (when they try to access a protected resource), but in the pre-authenticated case this doesn't apply. You would only
         configure the <classname>ExceptionTranslationFilter</classname> with an instance of this class if you aren't 
         configure the <classname>ExceptionTranslationFilter</classname> with an instance of this class if you aren't 

+ 2 - 2
docs/manual/src/docbook/samples.xml

@@ -19,7 +19,7 @@
             namespace configuration throughout. The compiled application is included in the
             namespace configuration throughout. The compiled application is included in the
             distribution zip file, ready to be deployed into your web container
             distribution zip file, ready to be deployed into your web container
                 (<filename>spring-security-samples-tutorial-3.0.x.war</filename>). The <link
                 (<filename>spring-security-samples-tutorial-3.0.x.war</filename>). The <link
-                xlink:href="#form">form-based</link> authentication mechanism is used in combination
+                    xlink:href="#ns-form-and-basic">form-based</link> authentication mechanism is used in combination
             with the commonly-used <link xlink:href="#remember-me">remember-me</link> authentication
             with the commonly-used <link xlink:href="#remember-me">remember-me</link> authentication
             provider to automatically remember the login using cookies.</para>
             provider to automatically remember the login using cookies.</para>
         <para>We recommend you start with the tutorial sample, as the XML is minimal and easy to
         <para>We recommend you start with the tutorial sample, as the XML is minimal and easy to
@@ -117,6 +117,6 @@ Success! Your web filters appear to be properly configured!
                 xlink:href="#preauth">pre-authentication</link> framework to make use of login
                 xlink:href="#preauth">pre-authentication</link> framework to make use of login
             information from a J2EE container. The user name and roles are those setup by the
             information from a J2EE container. The user name and roles are those setup by the
             container. </para>
             container. </para>
-        <para> The code is in <filename>samples/preauth</filename> . </para>
+        <para> The code is in <filename>samples/preauth</filename>. </para>
     </section>
     </section>
 </chapter>
 </chapter>

+ 1 - 1
docs/manual/src/docbook/security-filter-chain.xml

@@ -110,7 +110,7 @@
         <literal>false</literal> and servlet container lifecycle invocations are not delegated
         <literal>false</literal> and servlet container lifecycle invocations are not delegated
       through <literal>DelegatingFilterProxy</literal>.</para>
       through <literal>DelegatingFilterProxy</literal>.</para>
     <para> When we looked at how to set up web security using <link
     <para> When we looked at how to set up web security using <link
-        xlink:href="#namespace-auto-config">namespace configuration</link>, we used a
+      xlink:href="#ns-web-xml">namespace configuration</link>, we used a
         <literal>DelegatingFilterProxy</literal> with the name
         <literal>DelegatingFilterProxy</literal> with the name
         <quote>springSecurityFilterChain</quote>. You should now be able to see that this is the
         <quote>springSecurityFilterChain</quote>. You should now be able to see that this is the
       name of the <classname>FilterChainProxy</classname> which is created by the namespace. </para>
       name of the <classname>FilterChainProxy</classname> which is created by the namespace. </para>

+ 1 - 1
docs/manual/src/docbook/springsecurity.xml

@@ -10,7 +10,7 @@
       </author>
       </author>
     </authorgroup>
     </authorgroup>
     <productname>Spring Security</productname>
     <productname>Spring Security</productname>
-    <releaseinfo>3.0.0.M1</releaseinfo>
+    <releaseinfo>3.0.0.M2</releaseinfo>
   </info>
   </info>
   <toc/>
   <toc/>
   <preface xml:id="preface">
   <preface xml:id="preface">

+ 2 - 2
docs/manual/src/docbook/technical-overview.xml

@@ -111,7 +111,7 @@ if (principal instanceof UserDetails) {
       <para> On successful authentication, <interfacename>UserDetails</interfacename> is used to
       <para> On successful authentication, <interfacename>UserDetails</interfacename> is used to
         build the <interfacename>Authentication</interfacename> object that is stored in the
         build the <interfacename>Authentication</interfacename> object that is stored in the
           <classname>SecurityContextHolder</classname> (more on this <link
           <classname>SecurityContextHolder</classname> (more on this <link
-          xlink:href="#tech-intro-authentication-mgr">below</link>). The good news is that we
+          xlink:href="#tech-intro-authentication">below</link>). The good news is that we
         provide a number of <interfacename>UserDetailsService</interfacename> implementations,
         provide a number of <interfacename>UserDetailsService</interfacename> implementations,
         including one that uses an in-memory map (<classname>InMemoryDaoImpl</classname>) and
         including one that uses an in-memory map (<classname>InMemoryDaoImpl</classname>) and
         another that uses JDBC (<classname>JdbcDaoImpl</classname>). Most users tend to
         another that uses JDBC (<classname>JdbcDaoImpl</classname>). Most users tend to
@@ -322,7 +322,7 @@ Successfully authenticated. Security context contains: \
           work, and still provide authorization capabilities. All you need to do is write a filter
           work, and still provide authorization capabilities. All you need to do is write a filter
           (or equivalent) that reads the third-party user information from a location, build a
           (or equivalent) that reads the third-party user information from a location, build a
           Spring Security-specific <interfacename>Authentication</interfacename> object, and put it
           Spring Security-specific <interfacename>Authentication</interfacename> object, and put it
-          onto the <classname>SecurityContextHolder</classname>.</para>
+          into the <classname>SecurityContextHolder</classname>.</para>
         <para> If you're wondering how the <interfacename>AuthenticationManager</interfacename>
         <para> If you're wondering how the <interfacename>AuthenticationManager</interfacename>
           manager is implemented in a real world example, we'll look at that in </para>
           manager is implemented in a real world example, we'll look at that in </para>
       </section>
       </section>