Skip to content

Commit 9b1ebc3

Browse files
committed
Format README
1 parent b67b6bf commit 9b1ebc3

File tree

1 file changed

+21
-21
lines changed

1 file changed

+21
-21
lines changed

README.md

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ that identifies the user avoiding exposing the username and password. Particular
6969

7070
## :arrow_forward: Video: What is OpenID Connect?
7171

72-
[![](https://fiware.github.io/tutorials.Step-by-Step/img/video-logo.png)](https://www.youtube.com/watch?v=Kb56GzQ2pSk "OpenID connect")
72+
[![](https://fiware.github.io/tutorials.Step-by-Step/img/video-logo.png)](https://www.youtube.com/watch?v=Kb56GzQ2pSk 'OpenID connect')
7373

7474
Click on the image above to watch a video on OpenID connect and identity.
7575

@@ -200,23 +200,23 @@ tutorial:
200200
default:
201201
ipv4_address: 172.18.1.7
202202
expose:
203-
- "3000"
204-
- "3001"
203+
- '3000'
204+
- '3001'
205205
ports:
206-
- "3000:3000"
207-
- "3001:3001"
206+
- '3000:3000'
207+
- '3001:3001'
208208
environment:
209-
- "DEBUG=tutorial:*"
210-
- "SECURE_ENDPOINTS=true"
211-
- "OIDC_ENABLED=true"
212-
- "WEB_APP_PORT=3000"
213-
- "KEYROCK_URL=http://localhost"
214-
- "KEYROCK_IP_ADDRESS=http://172.18.1.5"
215-
- "KEYROCK_PORT=3005"
216-
- "KEYROCK_CLIENT_ID=tutorial-dckr-site-0000-xpresswebapp"
217-
- "KEYROCK_CLIENT_SECRET=tutorial-dckr-site-0000-clientsecret"
218-
- "KEYROCK_JWT_SECRET=jsonwebtokenpass"
219-
- "CALLBACK_URL=http://localhost:3000/login"
209+
- 'DEBUG=tutorial:*'
210+
- 'SECURE_ENDPOINTS=true'
211+
- 'OIDC_ENABLED=true'
212+
- 'WEB_APP_PORT=3000'
213+
- 'KEYROCK_URL=http://localhost'
214+
- 'KEYROCK_IP_ADDRESS=http://172.18.1.5'
215+
- 'KEYROCK_PORT=3005'
216+
- 'KEYROCK_CLIENT_ID=tutorial-dckr-site-0000-xpresswebapp'
217+
- 'KEYROCK_CLIENT_SECRET=tutorial-dckr-site-0000-clientsecret'
218+
- 'KEYROCK_JWT_SECRET=jsonwebtokenpass'
219+
- 'CALLBACK_URL=http://localhost:3000/login'
220220
```
221221
222222
The `tutorial` container is listening on two ports:
@@ -445,7 +445,7 @@ coming from Keyrock
445445

446446
```javascript
447447
function authCodeOICGrant(req, res) {
448-
const path = oa.getAuthorizeUrl("code", "openid", "oic");
448+
const path = oa.getAuthorizeUrl('code', 'openid', 'oic');
449449
return res.redirect(path);
450450
}
451451
```
@@ -456,7 +456,7 @@ interim access code is received from **Keyrock** and second request must be made
456456
```javascript
457457
function authCodeOICGrantCallback(req, res) {
458458
return oa
459-
.getOAuthAccessToken(req.query.code, "authorization_code")
459+
.getOAuthAccessToken(req.query.code, 'authorization_code')
460460
.then((results) => {
461461
return getUserFromIdToken(req, results.id_token);
462462
})
@@ -558,7 +558,7 @@ to follow an OIDC flow the response type is "id_token".
558558

559559
```javascript
560560
function implicitOICGrant(req, res) {
561-
const path = oa.getAuthorizeUrl("id_token", null, "oic");
561+
const path = oa.getAuthorizeUrl('id_token', null, 'oic');
562562
return res.redirect(path);
563563
}
564564
```
@@ -615,7 +615,7 @@ using authorization code previously generated, Keyrock generates a new access to
615615

616616
```javascript
617617
function hybridOICGrant(req, res) {
618-
const path = oa.getAuthorizeUrl("code id_token token", "openid", "oic");
618+
const path = oa.getAuthorizeUrl('code id_token token', 'openid', 'oic');
619619
return res.redirect(path);
620620
}
621621
```
@@ -626,7 +626,7 @@ interim access code is received from **Keyrock** and second request must be made
626626
```javascript
627627
function authCodeOICGrantCallback(req, res) {
628628
return oa
629-
.getOAuthAccessToken(req.query.code, "hybrid")
629+
.getOAuthAccessToken(req.query.code, 'hybrid')
630630
.then((results) => {
631631
return getUserFromIdToken(req, results.id_token);
632632
})

0 commit comments

Comments
 (0)