Skip to content

Commit 43016d5

Browse files
committed
minor #17793 [Security] Replacing deprecated role: IS_AUTHENTICATED_ANONYMOUSLY (rabdelaziz)
This PR was merged into the 5.4 branch. Discussion ---------- [Security] Replacing deprecated role: IS_AUTHENTICATED_ANONYMOUSLY Replacing deprecated role: IS_AUTHENTICATED_ANONYMOUSLY <!-- If your pull request fixes a BUG, use the oldest maintained branch that contains the bug (see https://symfony.com/releases for the list of maintained branches). If your pull request documents a NEW FEATURE, use the same Symfony branch where the feature was introduced (and `6.x` for features of unreleased versions). --> Commits ------- 8547d28 Replacing deprecated role: IS_AUTHENTICATED_ANONYMOUSLY
2 parents b0c1ea2 + 8547d28 commit 43016d5

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

security/access_control.rst

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -240,7 +240,7 @@ pattern so that it is only accessible by requests from the local server itself:
240240
access_control:
241241
#
242242
# the 'ips' option supports IP addresses and subnet masks
243-
- { path: '^/internal', roles: IS_AUTHENTICATED_ANONYMOUSLY, ips: [127.0.0.1, ::1, 192.168.0.1/24] }
243+
- { path: '^/internal', roles: PUBLIC_ACCESS, ips: [127.0.0.1, ::1, 192.168.0.1/24] }
244244
- { path: '^/internal', roles: ROLE_NO_ACCESS }
245245
246246
.. code-block:: xml
@@ -259,7 +259,7 @@ pattern so that it is only accessible by requests from the local server itself:
259259
<!-- ... -->
260260
261261
<!-- the 'ips' option supports IP addresses and subnet masks -->
262-
<rule path="^/internal" role="IS_AUTHENTICATED_ANONYMOUSLY">
262+
<rule path="^/internal" role="PUBLIC_ACCESS">
263263
<ip>127.0.0.1</ip>
264264
<ip>::1</ip>
265265
</rule>
@@ -278,7 +278,7 @@ pattern so that it is only accessible by requests from the local server itself:
278278
279279
$security->accessControl()
280280
->path('^/internal')
281-
->roles(['IS_AUTHENTICATED_ANONYMOUSLY'])
281+
->roles(['PUBLIC_ACCESS'])
282282
// the 'ips' option supports IP addresses and subnet masks
283283
->ips(['127.0.0.1', '::1'])
284284
;
@@ -306,7 +306,7 @@ address):
306306

307307
* Now, the first access control rule is enabled as both the ``path`` and the
308308
``ip`` match: access is allowed as the user always has the
309-
``IS_AUTHENTICATED_ANONYMOUSLY`` role.
309+
``PUBLIC_ACCESS`` role.
310310

311311
* The second access rule is not examined as the first rule matched.
312312

@@ -411,7 +411,7 @@ access those URLs via a specific port. This could be useful for example for
411411
security:
412412
# ...
413413
access_control:
414-
- { path: ^/cart/checkout, roles: IS_AUTHENTICATED_ANONYMOUSLY, port: 8080 }
414+
- { path: ^/cart/checkout, roles: PUBLIC_ACCESS, port: 8080 }
415415
416416
.. code-block:: xml
417417
@@ -428,7 +428,7 @@ access those URLs via a specific port. This could be useful for example for
428428
<config>
429429
<!-- ... -->
430430
<rule path="^/cart/checkout"
431-
role="IS_AUTHENTICATED_ANONYMOUSLY"
431+
role="PUBLIC_ACCESS"
432432
port="8080"
433433
/>
434434
</config>
@@ -444,7 +444,7 @@ access those URLs via a specific port. This could be useful for example for
444444
445445
$security->accessControl()
446446
->path('^/cart/checkout')
447-
->roles(['IS_AUTHENTICATED_ANONYMOUSLY'])
447+
->roles(['PUBLIC_ACCESS'])
448448
->port(8080)
449449
;
450450
};
@@ -465,7 +465,7 @@ the user will be redirected to ``https``:
465465
security:
466466
# ...
467467
access_control:
468-
- { path: ^/cart/checkout, roles: IS_AUTHENTICATED_ANONYMOUSLY, requires_channel: https }
468+
- { path: ^/cart/checkout, roles: PUBLIC_ACCESS, requires_channel: https }
469469
470470
.. code-block:: xml
471471
@@ -482,7 +482,7 @@ the user will be redirected to ``https``:
482482
<config>
483483
<!-- ... -->
484484
<rule path="^/cart/checkout"
485-
role="IS_AUTHENTICATED_ANONYMOUSLY"
485+
role="PUBLIC_ACCESS"
486486
requires-channel="https"
487487
/>
488488
</config>
@@ -498,7 +498,7 @@ the user will be redirected to ``https``:
498498
499499
$security->accessControl()
500500
->path('^/cart/checkout')
501-
->roles(['IS_AUTHENTICATED_ANONYMOUSLY'])
501+
->roles(['PUBLIC_ACCESS'])
502502
->requiresChannel('https')
503503
;
504504
};

0 commit comments

Comments
 (0)