Skip to content

Commit 4e054a3

Browse files
committed
Sync documentation of main branch
1 parent 45373dc commit 4e054a3

File tree

3 files changed

+4
-4
lines changed

3 files changed

+4
-4
lines changed

_versions/main/guides/rest-migration.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ Users are instead encouraged to use the Jakarta REST standard `jakarta.ws.rs.Bea
103103

104104
Although Quarkus REST provides the same spec compliant behavior as RESTEasy Classic does, it does not include the same exact provider implementations at runtime.
105105

106-
The most common case where the difference in providers might result in different behavior, is the included `jakarta.ws.rs.ext.ExceptionMapper` implementations. To see what classes are included in the application, launch the application in dev mode and navigate to http://localhost:8080/q/dev-ui/io.quarkus.quarkus-rest/exception-mappers.
106+
The most common case where the difference in providers might result in different behavior, is the included `jakarta.ws.rs.ext.ExceptionMapper` implementations. To see what classes are included in the application, launch the application in dev mode and navigate to http://localhost:8080/q/dev-ui/quarkus-rest/exception-mappers.
107107

108108
==== Service Loading
109109

_versions/main/guides/security-oidc-auth0-tutorial.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -190,7 +190,7 @@ Typically, Quarkus must be configured with `quarkus.oidc.application-type=servic
190190
You also need to configure the Auth0 application to allow the callbacks to the OIDC Dev UI.
191191
Use the following URL format:
192192

193-
`http://localhost:8080/q/dev-ui/io.quarkus.quarkus-oidc/${provider-name}-provider`
193+
`http://localhost:8080/q/dev-ui/quarkus-oidc/${provider-name}-provider`
194194

195195
* Where in this example, the `${provider-name}` is `auth0`
196196

_versions/main/guides/security-openid-connect-dev-services.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -178,7 +178,7 @@ It is recommended to do this in production to avoid the users being redirected t
178178
179179
If Keycloak enforces it, you see an authentication error informing you that the `redirect_uri` value is wrong.
180180
181-
In this case, select the *Keycloak Admin* option in the top right corner, login as `admin:admin`, select the test realm and the client which Dev UI for Keycloak is configured with, and add `http://localhost:8080/q/dev-ui/io.quarkus.quarkus-oidc/keycloak-provider` to `Valid Redirect URIs`.
181+
In this case, select the *Keycloak Admin* option in the top right corner, login as `admin:admin`, select the test realm and the client which Dev UI for Keycloak is configured with, and add `http://localhost:8080/q/dev-ui/quarkus-oidc/keycloak-provider` to `Valid Redirect URIs`.
182182
If you used `-Dquarkus.http.port` when starting Quarkus, then change `8080` to the value of `quarkus.http.port`
183183
184184
If the container is shared between multiple applications running on different ports, you must register `redirect_uri` values for each application.
@@ -364,7 +364,7 @@ Follow the link to log in to your provider, get the tokens, and test the applica
364364
The experience is the same as described in the <<keycloak-authorization-code-grant,Authorization code grant for Keycloak>> section, where the Dev Services for Keycloak container has been started, especially if you work with Keycloak.
365365

366366
You likely need to configure your OpenID Connect provider to support redirecting back to the `Dev Console`.
367-
You add `http://localhost:8080/q/dev-ui/io.quarkus.quarkus-oidc/<providerName>-provider` as one of the supported redirect and logout URLs, where `<providerName>` must be replaced by the name of the provider shown in the Dev UI, for example, `auth0`.
367+
You add `http://localhost:8080/q/dev-ui/quarkus-oidc/<providerName>-provider` as one of the supported redirect and logout URLs, where `<providerName>` must be replaced by the name of the provider shown in the Dev UI, for example, `auth0`.
368368

369369
The Dev UI experience described in the <<keycloak-authorization-code-grant,Authorization code grant for Keycloak>> section might differ slightly if you work with other providers.
370370
For example, an access token might not be in JWT format, so it would not be possible to show its internal content.

0 commit comments

Comments
 (0)