Skip to content

Commit

Permalink
Fix more wrong endpoints in openid-connect-client guide
Browse files Browse the repository at this point in the history
#26372 did not catch all occurrances of the endpoints.
This commit fixes the missing ones.

Signed-off-by: Harald Albers <github@albersweb.de>
(cherry picked from commit 007ea98)
  • Loading branch information
albers authored and gsmet committed Oct 4, 2022
1 parent 37f3de6 commit 6dbbd2b
Showing 1 changed file with 4 additions and 4 deletions.
8 changes: 4 additions & 4 deletions docs/src/main/asciidoc/security-openid-connect-client.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ In this example, we will build an application which consists of two JAX-RS resou
* `/frontend/user-name-with-propagated-token`
* `/frontend/admin-name-with-propagated-token`

`FrontendResource` will use REST Client with `OpenID Connect Client Reactive Filter` to acquire and propagate an access token to `ProtectedResource` when either `/frontend/user-name-with-oidc-client` or `/frontend/admin-name-with-oidc-client` is called. And it will use REST Client with `OpenID Connect Token Propagation Reactive Filter` to propagate the current incoming access token to `ProtectedResource` when either `/frontend/user-name-with-propagated-token` or `/frontend/admin-name-with-propagated-token` is called.
`FrontendResource` will use REST Client with `OpenID Connect Client Reactive Filter` to acquire and propagate an access token to `ProtectedResource` when either `/frontend/user-name-with-oidc-client-token` or `/frontend/admin-name-with-oidc-client-token` is called. And it will use REST Client with `OpenID Connect Token Propagation Reactive Filter` to propagate the current incoming access token to `ProtectedResource` when either `/frontend/user-name-with-propagated-token` or `/frontend/admin-name-with-propagated-token` is called.

`ProtecedResource` has 2 endpoints:

Expand Down Expand Up @@ -264,7 +264,7 @@ public class FrontendResource {
}
----

`FrontendResource` will use REST Client with `OpenID Connect Client Reactive Filter` to acquire and propagate an access token to `ProtectedResource` when either `/frontend/user-name-with-oidc-client` or `/frontend/admin-name-with-oidc-client` is called. And it will use REST Client with `OpenID Connect Token Propagation Reactive Filter` to propagate the current incoming access token to `ProtectedResource` when either `/frontend/user-name-with-propagated-token` or `/frontend/admin-name-with-propagated-token` is called.
`FrontendResource` will use REST Client with `OpenID Connect Client Reactive Filter` to acquire and propagate an access token to `ProtectedResource` when either `/frontend/user-name-with-oidc-client-token` or `/frontend/admin-name-with-oidc-client-token` is called. And it will use REST Client with `OpenID Connect Token Propagation Reactive Filter` to propagate the current incoming access token to `ProtectedResource` when either `/frontend/user-name-with-propagated-token` or `/frontend/admin-name-with-propagated-token` is called.

Finally, lets add a JAX-RS `ExceptionMapper`:

Expand Down Expand Up @@ -485,15 +485,15 @@ Now lets check `FrontendResource` methods which do not propagate the existing to
[source,bash]
----
curl -v -X GET \
http://localhost:8080/frontend/user-name-with-oidc-client`
http://localhost:8080/frontend/user-name-with-oidc-client-token`
----

will return `200` status code and the name `alice`, but

[source,bash]
----
curl -v -X GET \
http://localhost:8080/frontend/admin-name-with-oidc-client`
http://localhost:8080/frontend/admin-name-with-oidc-client-token`
----

will return `403` status code.
Expand Down

0 comments on commit 6dbbd2b

Please sign in to comment.