Skip to content

Commit 6f40306

Browse files
mrtssvenzik
authored andcommitted
Update Web eID group ID to eu.webeid.security, amend REAME (#51)
WE2-899 Signed-off-by: Mart Somermaa <[email protected]> Co-authored-by: Mart Somermaa <[email protected]>
1 parent 9a359e5 commit 6f40306

File tree

2 files changed

+7
-5
lines changed

2 files changed

+7
-5
lines changed

example/README.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Web eID only works over a HTTPS connection with a trusted HTTPS certificate.
1717
You can either setup a reverse HTTPS proxy during development or, alternatively, configure
1818
HTTPS support directly in the bundled web server. HTTPS configuration is described in more detail in section _[HTTPS support](#https-support)_ below.
1919

20-
You can use, for example, [_ngrok_](https://ngrok.com/) or [_localtunnel_](https://theboroer.github.io/localtunnel-www/) to get a reverse HTTPS proxy. Download _ngrok_ and run it in a terminal window by providing the protocol and Spring Boot application port arguments as follows:
20+
You can use solutions like [_ngrok_](https://ngrok.com/), [_localtunnel_](https://theboroer.github.io/localtunnel-www/), or any other reverse HTTPS proxy tool. For example, with _ngrok_, download and run it in a terminal window by providing the protocol and the Spring Boot application port arguments as follows:
2121

2222
ngrok http 8080
2323

@@ -33,6 +33,8 @@ web-eid-auth-token:
3333
local-origin: "https://<<NGROK HOSTNAME HERE>>"
3434
```
3535
36+
**Note that the origin URL must not end with a slash `/`**.
37+
3638
### 3. Configure the trusted certificate authority certificates
3739

3840
The algorithm, which performs the validation of the Web eID authentication token, needs to know which intermediate certificate authorities (CA) are trusted to issue the eID authentication certificates. CA certificates are loaded either from `.cer` files in the profile-specific subdirectory of the [`certs` resource directory](src/main/resources/certs) or the [truststore file](src/main/resources/certs/prod/trusted_certificates.jks). By default, Estonian eID test CA certificates are included in the `dev` profile and production CA certificates in the `prod` profile.

example/pom.xml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,12 +5,12 @@
55
<parent>
66
<groupId>org.springframework.boot</groupId>
77
<artifactId>spring-boot-starter-parent</artifactId>
8-
<version>3.2.4</version>
8+
<version>3.3.0</version>
99
<relativePath/> <!-- lookup parent from repository -->
1010
</parent>
1111
<groupId>eu.webeid.example</groupId>
1212
<artifactId>web-eid-springboot-example</artifactId>
13-
<version>3.0.0-SNAPSHOT</version>
13+
<version>3.1.0</version>
1414
<name>web-eid-springboot-example</name>
1515
<description>Example Spring Boot application that demonstrates how to use Web eID for authentication and digital
1616
signing
@@ -19,7 +19,7 @@
1919
<properties>
2020
<java.version>17</java.version>
2121
<maven-surefire-plugin.version>3.2.5</maven-surefire-plugin.version>
22-
<webeid.version>3.0.2-SNAPSHOT</webeid.version>
22+
<webeid.version>3.1.0</webeid.version>
2323
<digidoc4j.version>5.3.0</digidoc4j.version>
2424
<jmockit.version>1.44</jmockit.version>
2525
<jib.version>3.4.2</jib.version>
@@ -45,7 +45,7 @@
4545
<version>${digidoc4j.version}</version>
4646
</dependency>
4747
<dependency>
48-
<groupId>org.webeid.security</groupId>
48+
<groupId>eu.webeid.security</groupId>
4949
<artifactId>authtoken-validation</artifactId>
5050
<version>${webeid.version}</version>
5151
</dependency>

0 commit comments

Comments
 (0)