|
1 | 1 | security:
|
2 |
| - # https://symfony.com/doc/current/security.html#registering-the-user-hashing-passwords |
3 |
| - password_hashers: |
4 |
| - Symfony\Component\Security\Core\User\PasswordAuthenticatedUserInterface: 'auto' |
5 |
| - # https://symfony.com/doc/current/security.html#loading-the-user-the-user-provider |
6 |
| - providers: |
7 |
| - users_in_memory: { memory: null } |
8 |
| - api_user_provider: |
9 |
| - id: App\Security\ApiUserProvider |
10 |
| - firewalls: |
11 |
| - dev: |
12 |
| - pattern: ^/(_(profiler|wdt)|css|images|js)/ |
13 |
| - security: false |
14 |
| - main: |
15 |
| - stateless: true |
16 |
| - custom_authenticators: |
17 |
| - - App\Security\ApiKeyAuthenticator |
18 |
| - provider: api_user_provider |
| 2 | + # https://symfony.com/doc/current/security.html#registering-the-user-hashing-passwords |
| 3 | + password_hashers: |
| 4 | + Symfony\Component\Security\Core\User\PasswordAuthenticatedUserInterface: "auto" |
| 5 | + # https://symfony.com/doc/current/security.html#loading-the-user-the-user-provider |
| 6 | + providers: |
| 7 | + users_in_memory: { memory: null } |
| 8 | + api_user_provider: |
| 9 | + id: App\Security\ApiUserProvider |
| 10 | + firewalls: |
| 11 | + dev: |
| 12 | + pattern: ^/(_(profiler|wdt)|css|images|js)/ |
| 13 | + security: false |
| 14 | + main: |
| 15 | + stateless: true |
| 16 | + custom_authenticators: |
| 17 | + - App\Security\ApiKeyAuthenticator |
| 18 | + provider: api_user_provider |
19 | 19 |
|
20 |
| - # activate different ways to authenticate |
21 |
| - # https://symfony.com/doc/current/security.html#the-firewall |
| 20 | + # activate different ways to authenticate |
| 21 | + # https://symfony.com/doc/current/security.html#the-firewall |
22 | 22 |
|
23 |
| - # https://symfony.com/doc/current/security/impersonating_user.html |
24 |
| - # switch_user: true |
| 23 | + # https://symfony.com/doc/current/security/impersonating_user.html |
| 24 | + # switch_user: true |
25 | 25 |
|
26 |
| - # Easy way to control access for large sections of your site |
27 |
| - # Note: Only the *first* access control that matches will be used |
28 |
| - access_control: |
29 |
| - - { path: ^/api/v2/docs, roles: PUBLIC_ACCESS } |
30 |
| - - { path: ^/api, roles: IS_AUTHENTICATED_FULLY } |
31 |
| - # - { path: ^/profile, roles: ROLE_USER } |
| 26 | + # Easy way to control access for large sections of your site |
| 27 | + # Note: Only the *first* access control that matches will be used |
| 28 | + access_control: |
| 29 | + - { path: ^/api/v2/docs, roles: PUBLIC_ACCESS } |
| 30 | + - { path: ^/api, roles: IS_AUTHENTICATED_FULLY } |
| 31 | + # - { path: ^/profile, roles: ROLE_USER } |
32 | 32 |
|
33 | 33 | when@test:
|
34 |
| - security: |
35 |
| - password_hashers: |
36 |
| - # By default, password hashers are resource intensive and take time. This is |
37 |
| - # important to generate secure password hashes. In tests however, secure hashes |
38 |
| - # are not important, waste resources and increase test times. The following |
39 |
| - # reduces the work factor to the lowest possible values. |
40 |
| - Symfony\Component\Security\Core\User\PasswordAuthenticatedUserInterface: |
41 |
| - algorithm: auto |
42 |
| - cost: 4 # Lowest possible value for bcrypt |
43 |
| - time_cost: 3 # Lowest possible value for argon |
44 |
| - memory_cost: 10 # Lowest possible value for argon |
| 34 | + security: |
| 35 | + password_hashers: |
| 36 | + # By default, password hashers are resource intensive and take time. This is |
| 37 | + # important to generate secure password hashes. In tests however, secure hashes |
| 38 | + # are not important, waste resources and increase test times. The following |
| 39 | + # reduces the work factor to the lowest possible values. |
| 40 | + Symfony\Component\Security\Core\User\PasswordAuthenticatedUserInterface: |
| 41 | + algorithm: auto |
| 42 | + cost: 4 # Lowest possible value for bcrypt |
| 43 | + time_cost: 3 # Lowest possible value for argon |
| 44 | + memory_cost: 10 # Lowest possible value for argon |
0 commit comments