Skip to content

Commit

Permalink
[UNDERTOW-2213] Revert "[UNDERTOW-2209] Style and cleanup changes (no…
Browse files Browse the repository at this point in the history
…ne of the changes will affect the algorithm workflow)"

This reverts commit f29fcc7.

Signed-off-by: Flavia Rainone <frainone@redhat.com>
  • Loading branch information
fl4via committed Dec 15, 2022
1 parent ce3ca99 commit cd6ca38
Showing 1 changed file with 6 additions and 5 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -190,15 +190,16 @@ private void handleMatch(final String method, final PathSecurityInformation exac
transport(currentMatch, role.transportGuaranteeType);
currentMatch.constraints.add(new SingleConstraintMatch(role.emptyRoleSemantic, role.roles));
}
} else if (denyUncoveredHttpMethods) {
if (exact.perMethodRequiredRoles.size() == 0) {
} else if(denyUncoveredHttpMethods) {
if(exact.perMethodRequiredRoles.size() == 0) {
// 13.8.4. When HTTP methods are not enumerated within a security-constraint, the protections defined by the
// constraint apply to the complete set of HTTP (extension) methods.
currentMatch.uncovered = false;
currentMatch.constraints.add(new SingleConstraintMatch(SecurityInfo.EmptyRoleSemantic.PERMIT, new HashSet<>()));
} else {
//at this point method info is null, but there is match, above if will be triggered for default path, we need to flip it?
// keep currentMatch.uncovered value as true (this is the value that is initially set)
} else if(exact.perMethodRequiredRoles.size() > 0) {
//at this point method is null, but there is match, above if will be triggered for default path, we need to flip it?
currentMatch.uncovered = true;
//NOTE: ?
currentMatch.constraints.clear();
currentMatch.constraints.add(new SingleConstraintMatch(SecurityInfo.EmptyRoleSemantic.DENY, new HashSet<>()));
}
Expand Down

0 comments on commit cd6ca38

Please sign in to comment.