You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/documentation/master/sdl-directives.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -128,7 +128,7 @@ We now need to wire in the code that can handle any field with this ``@auth`` di
128
128
{{< / highlight >}}
129
129
130
130
This has modified the ``GraphQLFieldDefinition`` so that its original data fetcher will ONLY be called if the current authorisation context
131
-
has the ``manager`` role. Exactly what mechanisms you use for authorisation is up to you. You could use Spring Security for example say, graphql-java doesnt
131
+
has the ``manager`` role. Exactly what mechanisms you use for authorisation is up to you. You could use Spring Security for example say, graphql-java doesn't
132
132
really care.
133
133
134
134
You would provide this authorisation checker into the execution "context" object of the graphql input so it can then be accessed later in the
Copy file name to clipboardExpand all lines: content/documentation/v10/sdl-directives.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -124,7 +124,7 @@ We now need to wire in the code that can handle any field with this ``@auth`` di
124
124
{{< / highlight >}}
125
125
126
126
This has modified the ``GraphQLFieldDefinition`` so that its original data fetcher will ONLY be called if the current authorisation context
127
-
has the ``manager`` role. Exactly what mechanisms you use for authorisation is up to you. You could use Spring Security for example say, graphql-java doesnt
127
+
has the ``manager`` role. Exactly what mechanisms you use for authorisation is up to you. You could use Spring Security for example say, graphql-java doesn't
128
128
really care.
129
129
130
130
You would provide this authorisation checker into the execution "context" object of the graphql input so it can then be accessed later in the
Copy file name to clipboardExpand all lines: content/documentation/v11/sdl-directives.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -124,7 +124,7 @@ We now need to wire in the code that can handle any field with this ``@auth`` di
124
124
{{< / highlight >}}
125
125
126
126
This has modified the ``GraphQLFieldDefinition`` so that its original data fetcher will ONLY be called if the current authorisation context
127
-
has the ``manager`` role. Exactly what mechanisms you use for authorisation is up to you. You could use Spring Security for example say, graphql-java doesnt
127
+
has the ``manager`` role. Exactly what mechanisms you use for authorisation is up to you. You could use Spring Security for example say, graphql-java doesn't
128
128
really care.
129
129
130
130
You would provide this authorisation checker into the execution "context" object of the graphql input so it can then be accessed later in the
Copy file name to clipboardExpand all lines: content/documentation/v12/sdl-directives.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -128,7 +128,7 @@ We now need to wire in the code that can handle any field with this ``@auth`` di
128
128
{{< / highlight >}}
129
129
130
130
This has modified the ``GraphQLFieldDefinition`` so that its original data fetcher will ONLY be called if the current authorisation context
131
-
has the ``manager`` role. Exactly what mechanisms you use for authorisation is up to you. You could use Spring Security for example say, graphql-java doesnt
131
+
has the ``manager`` role. Exactly what mechanisms you use for authorisation is up to you. You could use Spring Security for example say, graphql-java doesn't
132
132
really care.
133
133
134
134
You would provide this authorisation checker into the execution "context" object of the graphql input so it can then be accessed later in the
Copy file name to clipboardExpand all lines: content/documentation/v13/sdl-directives.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -128,7 +128,7 @@ We now need to wire in the code that can handle any field with this ``@auth`` di
128
128
{{< / highlight >}}
129
129
130
130
This has modified the ``GraphQLFieldDefinition`` so that its original data fetcher will ONLY be called if the current authorisation context
131
-
has the ``manager`` role. Exactly what mechanisms you use for authorisation is up to you. You could use Spring Security for example say, graphql-java doesnt
131
+
has the ``manager`` role. Exactly what mechanisms you use for authorisation is up to you. You could use Spring Security for example say, graphql-java doesn't
132
132
really care.
133
133
134
134
You would provide this authorisation checker into the execution "context" object of the graphql input so it can then be accessed later in the
0 commit comments