@@ -69,7 +69,7 @@ that identifies the user avoiding exposing the username and password. Particular
6969
7070## :arrow_forward : Video: What is OpenID Connect?
7171
72- [ ![ ] ( https://fiware.github.io/tutorials.Step-by-Step/img/video-logo.png )] ( https://www.youtube.com/watch?v=Kb56GzQ2pSk " OpenID connect " )
72+ [ ![ ] ( https://fiware.github.io/tutorials.Step-by-Step/img/video-logo.png )] ( https://www.youtube.com/watch?v=Kb56GzQ2pSk ' OpenID connect ' )
7373
7474Click on the image above to watch a video on OpenID connect and identity.
7575
@@ -200,23 +200,23 @@ tutorial:
200200 default :
201201 ipv4_address : 172.18.1.7
202202 expose :
203- - " 3000"
204- - " 3001"
203+ - ' 3000'
204+ - ' 3001'
205205 ports :
206- - " 3000:3000"
207- - " 3001:3001"
206+ - ' 3000:3000'
207+ - ' 3001:3001'
208208 environment :
209- - " DEBUG=tutorial:*"
210- - " SECURE_ENDPOINTS=true"
211- - " OIDC_ENABLED=true"
212- - " WEB_APP_PORT=3000"
213- - " KEYROCK_URL=http://localhost"
214- - " KEYROCK_IP_ADDRESS=http://172.18.1.5"
215- - " KEYROCK_PORT=3005"
216- - " KEYROCK_CLIENT_ID=tutorial-dckr-site-0000-xpresswebapp"
217- - " KEYROCK_CLIENT_SECRET=tutorial-dckr-site-0000-clientsecret"
218- - " KEYROCK_JWT_SECRET=jsonwebtokenpass"
219- - " CALLBACK_URL=http://localhost:3000/login"
209+ - ' DEBUG=tutorial:*'
210+ - ' SECURE_ENDPOINTS=true'
211+ - ' OIDC_ENABLED=true'
212+ - ' WEB_APP_PORT=3000'
213+ - ' KEYROCK_URL=http://localhost'
214+ - ' KEYROCK_IP_ADDRESS=http://172.18.1.5'
215+ - ' KEYROCK_PORT=3005'
216+ - ' KEYROCK_CLIENT_ID=tutorial-dckr-site-0000-xpresswebapp'
217+ - ' KEYROCK_CLIENT_SECRET=tutorial-dckr-site-0000-clientsecret'
218+ - ' KEYROCK_JWT_SECRET=jsonwebtokenpass'
219+ - ' CALLBACK_URL=http://localhost:3000/login'
220220` ` `
221221
222222The ` tutorial` container is listening on two ports:
@@ -445,7 +445,7 @@ coming from Keyrock
445445
446446``` javascript
447447function authCodeOICGrant (req , res ) {
448- const path = oa .getAuthorizeUrl (" code" , " openid" , " oic" );
448+ const path = oa .getAuthorizeUrl (' code' , ' openid' , ' oic' );
449449 return res .redirect (path);
450450}
451451```
@@ -456,7 +456,7 @@ interim access code is received from **Keyrock** and second request must be made
456456``` javascript
457457function authCodeOICGrantCallback (req , res ) {
458458 return oa
459- .getOAuthAccessToken (req .query .code , " authorization_code" )
459+ .getOAuthAccessToken (req .query .code , ' authorization_code' )
460460 .then ((results ) => {
461461 return getUserFromIdToken (req, results .id_token );
462462 })
@@ -558,7 +558,7 @@ to follow an OIDC flow the response type is "id_token".
558558
559559``` javascript
560560function implicitOICGrant (req , res ) {
561- const path = oa .getAuthorizeUrl (" id_token" , null , " oic" );
561+ const path = oa .getAuthorizeUrl (' id_token' , null , ' oic' );
562562 return res .redirect (path);
563563}
564564```
@@ -615,7 +615,7 @@ using authorization code previously generated, Keyrock generates a new access to
615615
616616``` javascript
617617function hybridOICGrant (req , res ) {
618- const path = oa .getAuthorizeUrl (" code id_token token" , " openid" , " oic" );
618+ const path = oa .getAuthorizeUrl (' code id_token token' , ' openid' , ' oic' );
619619 return res .redirect (path);
620620}
621621```
@@ -626,7 +626,7 @@ interim access code is received from **Keyrock** and second request must be made
626626``` javascript
627627function authCodeOICGrantCallback (req , res ) {
628628 return oa
629- .getOAuthAccessToken (req .query .code , " hybrid" )
629+ .getOAuthAccessToken (req .query .code , ' hybrid' )
630630 .then ((results ) => {
631631 return getUserFromIdToken (req, results .id_token );
632632 })
0 commit comments