@@ -240,7 +240,7 @@ pattern so that it is only accessible by requests from the local server itself:
240240 access_control :
241241 #
242242 # the 'ips' option supports IP addresses and subnet masks
243- - { path: '^/internal', roles: IS_AUTHENTICATED_ANONYMOUSLY , ips: [127.0.0.1, ::1, 192.168.0.1/24] }
243+ - { path: '^/internal', roles: PUBLIC_ACCESS , ips: [127.0.0.1, ::1, 192.168.0.1/24] }
244244 - { path: '^/internal', roles: ROLE_NO_ACCESS }
245245
246246 .. code-block :: xml
@@ -259,7 +259,7 @@ pattern so that it is only accessible by requests from the local server itself:
259259 <!-- ... -->
260260
261261 <!-- the 'ips' option supports IP addresses and subnet masks -->
262- <rule path =" ^/internal" role =" IS_AUTHENTICATED_ANONYMOUSLY " >
262+ <rule path =" ^/internal" role =" PUBLIC_ACCESS " >
263263 <ip >127.0.0.1</ip >
264264 <ip >::1</ip >
265265 </rule >
@@ -278,7 +278,7 @@ pattern so that it is only accessible by requests from the local server itself:
278278
279279 $security->accessControl()
280280 ->path('^/internal')
281- ->roles(['IS_AUTHENTICATED_ANONYMOUSLY '])
281+ ->roles(['PUBLIC_ACCESS '])
282282 // the 'ips' option supports IP addresses and subnet masks
283283 ->ips(['127.0.0.1', '::1'])
284284 ;
@@ -306,7 +306,7 @@ address):
306306
307307* Now, the first access control rule is enabled as both the ``path `` and the
308308 ``ip `` match: access is allowed as the user always has the
309- ``IS_AUTHENTICATED_ANONYMOUSLY `` role.
309+ ``PUBLIC_ACCESS `` role.
310310
311311* The second access rule is not examined as the first rule matched.
312312
@@ -411,7 +411,7 @@ access those URLs via a specific port. This could be useful for example for
411411 security :
412412 # ...
413413 access_control :
414- - { path: ^/cart/checkout, roles: IS_AUTHENTICATED_ANONYMOUSLY , port: 8080 }
414+ - { path: ^/cart/checkout, roles: PUBLIC_ACCESS , port: 8080 }
415415
416416 .. code-block :: xml
417417
@@ -428,7 +428,7 @@ access those URLs via a specific port. This could be useful for example for
428428 <config >
429429 <!-- ... -->
430430 <rule path =" ^/cart/checkout"
431- role =" IS_AUTHENTICATED_ANONYMOUSLY "
431+ role =" PUBLIC_ACCESS "
432432 port =" 8080"
433433 />
434434 </config >
@@ -444,7 +444,7 @@ access those URLs via a specific port. This could be useful for example for
444444
445445 $security->accessControl()
446446 ->path('^/cart/checkout')
447- ->roles(['IS_AUTHENTICATED_ANONYMOUSLY '])
447+ ->roles(['PUBLIC_ACCESS '])
448448 ->port(8080)
449449 ;
450450 };
@@ -465,7 +465,7 @@ the user will be redirected to ``https``:
465465 security :
466466 # ...
467467 access_control :
468- - { path: ^/cart/checkout, roles: IS_AUTHENTICATED_ANONYMOUSLY , requires_channel: https }
468+ - { path: ^/cart/checkout, roles: PUBLIC_ACCESS , requires_channel: https }
469469
470470 .. code-block :: xml
471471
@@ -482,7 +482,7 @@ the user will be redirected to ``https``:
482482 <config >
483483 <!-- ... -->
484484 <rule path =" ^/cart/checkout"
485- role =" IS_AUTHENTICATED_ANONYMOUSLY "
485+ role =" PUBLIC_ACCESS "
486486 requires-channel =" https"
487487 />
488488 </config >
@@ -498,7 +498,7 @@ the user will be redirected to ``https``:
498498
499499 $security->accessControl()
500500 ->path('^/cart/checkout')
501- ->roles(['IS_AUTHENTICATED_ANONYMOUSLY '])
501+ ->roles(['PUBLIC_ACCESS '])
502502 ->requiresChannel('https')
503503 ;
504504 };
0 commit comments