See 13.8.1 of the servlet spec.

The result in is unioning all the constraints together for one that passes

It might be easier to write a filter to implement the restriction that only GET/POST/HEAD is allowed.

-Tim

Peter Holcomb wrote:
We have a situation where we recently introduced a new security
constraint into our configuration that has caused a conflict with our
previous constraint.  Here's our current configuration:

<security-constraint>
  <display-name>Restrict access to XHTML pages</display-name>
  <web-resource-collection>
    <web-resource-name>Restrict access to XHTML pages</web-resource-name>
    <url-pattern>*.xhtml</url-pattern>
  </web-resource-collection>
  <auth-constraint>
    <description>With no roles defined, no access granted</description>
  </auth-constraint>
</security-constraint>

<!-- restrict HTTP protocol methods that are not needed -->
<security-constraint>
  <web-resource-collection>
    <web-resource-name>Protected Context</web-resource-name>
    <url-pattern>/*</url-pattern>
    <http-method>PUT</http-method>
    <http-method>DELETE</http-method>
    <http-method>TRACE</http-method>
    <http-method>OPTIONS</http-method>
  </web-resource-collection>
  <auth-constraint />
</security-constraint>

The purpose of the first constraint is to restrict access to all
.xhtml documents.  This was our original configuration and has been
working.  The second constraint was put in place in order to block
methods that we do not use (HTTP PUT, DELETE, TRACE, ect...).  This
constraint has had the effect of causing our .xhtml documents to now
be accessible.  You can point your browser to an .xhtml page and grab
it.  When we remove the second constraint, the .xhtml files are once
again inaccessible.  What are we doing wrong?



---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to