Skip to content

Commit 6dbbd2b

Browse files
albersgsmet
authored andcommitted
Fix more wrong endpoints in openid-connect-client guide
#26372 did not catch all occurrances of the endpoints. This commit fixes the missing ones. Signed-off-by: Harald Albers <github@albersweb.de> (cherry picked from commit 007ea98)
1 parent 37f3de6 commit 6dbbd2b

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

docs/src/main/asciidoc/security-openid-connect-client.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ In this example, we will build an application which consists of two JAX-RS resou
3131
* `/frontend/user-name-with-propagated-token`
3232
* `/frontend/admin-name-with-propagated-token`
3333

34-
`FrontendResource` will use REST Client with `OpenID Connect Client Reactive Filter` to acquire and propagate an access token to `ProtectedResource` when either `/frontend/user-name-with-oidc-client` or `/frontend/admin-name-with-oidc-client` is called. And it will use REST Client with `OpenID Connect Token Propagation Reactive Filter` to propagate the current incoming access token to `ProtectedResource` when either `/frontend/user-name-with-propagated-token` or `/frontend/admin-name-with-propagated-token` is called.
34+
`FrontendResource` will use REST Client with `OpenID Connect Client Reactive Filter` to acquire and propagate an access token to `ProtectedResource` when either `/frontend/user-name-with-oidc-client-token` or `/frontend/admin-name-with-oidc-client-token` is called. And it will use REST Client with `OpenID Connect Token Propagation Reactive Filter` to propagate the current incoming access token to `ProtectedResource` when either `/frontend/user-name-with-propagated-token` or `/frontend/admin-name-with-propagated-token` is called.
3535

3636
`ProtecedResource` has 2 endpoints:
3737

@@ -264,7 +264,7 @@ public class FrontendResource {
264264
}
265265
----
266266

267-
`FrontendResource` will use REST Client with `OpenID Connect Client Reactive Filter` to acquire and propagate an access token to `ProtectedResource` when either `/frontend/user-name-with-oidc-client` or `/frontend/admin-name-with-oidc-client` is called. And it will use REST Client with `OpenID Connect Token Propagation Reactive Filter` to propagate the current incoming access token to `ProtectedResource` when either `/frontend/user-name-with-propagated-token` or `/frontend/admin-name-with-propagated-token` is called.
267+
`FrontendResource` will use REST Client with `OpenID Connect Client Reactive Filter` to acquire and propagate an access token to `ProtectedResource` when either `/frontend/user-name-with-oidc-client-token` or `/frontend/admin-name-with-oidc-client-token` is called. And it will use REST Client with `OpenID Connect Token Propagation Reactive Filter` to propagate the current incoming access token to `ProtectedResource` when either `/frontend/user-name-with-propagated-token` or `/frontend/admin-name-with-propagated-token` is called.
268268

269269
Finally, lets add a JAX-RS `ExceptionMapper`:
270270

@@ -485,15 +485,15 @@ Now lets check `FrontendResource` methods which do not propagate the existing to
485485
[source,bash]
486486
----
487487
curl -v -X GET \
488-
http://localhost:8080/frontend/user-name-with-oidc-client`
488+
http://localhost:8080/frontend/user-name-with-oidc-client-token`
489489
----
490490

491491
will return `200` status code and the name `alice`, but
492492

493493
[source,bash]
494494
----
495495
curl -v -X GET \
496-
http://localhost:8080/frontend/admin-name-with-oidc-client`
496+
http://localhost:8080/frontend/admin-name-with-oidc-client-token`
497497
----
498498

499499
will return `403` status code.

0 commit comments

Comments
 (0)