From 6ed5b99476c17160c277195cd57ebe9ce90fa6fa Mon Sep 17 00:00:00 2001 From: Rolfe Dlugy-Hegwer Date: Mon, 27 Jan 2025 17:42:27 -0500 Subject: [PATCH] Update conditionals with current extension name --- .../main/asciidoc/security-authentication-mechanisms.adoc | 4 ++-- ...ecurity-oidc-bearer-token-authentication-tutorial.adoc | 8 ++++---- .../security-oidc-bearer-token-authentication.adoc | 4 ++-- .../security-oidc-code-flow-authentication-tutorial.adoc | 4 ++-- 4 files changed, 10 insertions(+), 10 deletions(-) diff --git a/docs/src/main/asciidoc/security-authentication-mechanisms.adoc b/docs/src/main/asciidoc/security-authentication-mechanisms.adoc index 08683efef4ba0c..f81c556fa17fcf 100644 --- a/docs/src/main/asciidoc/security-authentication-mechanisms.adoc +++ b/docs/src/main/asciidoc/security-authentication-mechanisms.adoc @@ -387,9 +387,9 @@ For more information about OIDC authentication and authorization methods that yo |Multiple tenants that can support the Bearer token authentication or Authorization Code Flow mechanisms|xref:security-openid-connect-multitenancy.adoc[Using OpenID Connect (OIDC) multi-tenancy] |Securing Quarkus with commonly used OpenID Connect providers|xref:security-openid-connect-providers.adoc[Configuring well-known OpenID Connect providers] |Using Keycloak to centralize authorization |xref:security-keycloak-authorization.adoc[Using OpenID Connect (OIDC) and Keycloak to centralize authorization] -ifndef::no-quarkus-keycloak-admin-client[] +ifndef::no-quarkus-keycloak-admin-resteasy-client[] |Configuring Keycloak programmatically |xref:security-keycloak-admin-client.adoc[Using the Keycloak admin client] -endif::no-quarkus-keycloak-admin-client[] +endif::no-quarkus-keycloak-admin-resteasy-client[] |==== [NOTE] diff --git a/docs/src/main/asciidoc/security-oidc-bearer-token-authentication-tutorial.adoc b/docs/src/main/asciidoc/security-oidc-bearer-token-authentication-tutorial.adoc index fbcb7fd5fbd91e..25ad7831bfeeee 100644 --- a/docs/src/main/asciidoc/security-oidc-bearer-token-authentication-tutorial.adoc +++ b/docs/src/main/asciidoc/security-oidc-bearer-token-authentication-tutorial.adoc @@ -228,13 +228,13 @@ docker run --name keycloak -e KC_BOOTSTRAP_ADMIN_USERNAME=admin -e KC_BOOTSTRAP_ For more information, see the Keycloak documentation about link:https://www.keycloak.org/docs/latest/server_admin/index.html#configuring-realms[creating and configuring a new realm]. -ifndef::no-quarkus-keycloak-admin-client[] +ifndef::no-quarkus-keycloak-admin-resteasy-client[] [NOTE] ==== If you want to use the Keycloak Admin Client to configure your server from your application, you need to include either the `quarkus-keycloak-admin-rest-client` or the `quarkus-keycloak-admin-resteasy-client` (if the application uses `quarkus-rest-client`) extension. For more information, see the xref:security-keycloak-admin-client.adoc[Quarkus Keycloak Admin Client] guide. ==== -endif::no-quarkus-keycloak-admin-client[] +endif::no-quarkus-keycloak-admin-resteasy-client[] @@ -383,6 +383,6 @@ For information about writing integration tests that depend on `Dev Services for * xref:security-jwt-build.adoc[Sign and encrypt JWT tokens with SmallRye JWT Build] * xref:security-authentication-mechanisms.adoc#combining-authentication-mechanisms[Combining authentication mechanisms] * xref:security-overview.adoc[Quarkus Security overview] -ifndef::no-quarkus-keycloak-admin-client[] +ifndef::no-quarkus-keycloak-admin-resteasy-client[] * xref:security-keycloak-admin-client.adoc[Quarkus Keycloak Admin Client] -endif::no-quarkus-keycloak-admin-client[] +endif::no-quarkus-keycloak-admin-resteasy-client[] diff --git a/docs/src/main/asciidoc/security-oidc-bearer-token-authentication.adoc b/docs/src/main/asciidoc/security-oidc-bearer-token-authentication.adoc index ab1ee4e5c40248..837f890d1a08f1 100644 --- a/docs/src/main/asciidoc/security-oidc-bearer-token-authentication.adoc +++ b/docs/src/main/asciidoc/security-oidc-bearer-token-authentication.adoc @@ -1594,7 +1594,7 @@ section of the OpenID Connect Multi-Tenancy guide. * xref:security-authentication-mechanisms.adoc#oidc-jwt-oauth2-comparison[Choosing between OpenID Connect, SmallRye JWT, and OAuth2 authentication mechanisms] * xref:security-authentication-mechanisms.adoc#combining-authentication-mechanisms[Combining authentication mechanisms] * xref:security-overview.adoc[Quarkus Security overview] -ifndef::no-quarkus-keycloak-admin-client[] +ifndef::no-quarkus-keycloak-admin-resteasy-client[] * xref:security-keycloak-admin-client.adoc[Quarkus Keycloak Admin Client] -endif::no-quarkus-keycloak-admin-client[] +endif::no-quarkus-keycloak-admin-resteasy-client[] * xref:security-openid-connect-multitenancy.adoc[Using OpenID Connect Multi-Tenancy] diff --git a/docs/src/main/asciidoc/security-oidc-code-flow-authentication-tutorial.adoc b/docs/src/main/asciidoc/security-oidc-code-flow-authentication-tutorial.adoc index d55e757363b610..fe7b43e2bb64af 100644 --- a/docs/src/main/asciidoc/security-oidc-code-flow-authentication-tutorial.adoc +++ b/docs/src/main/asciidoc/security-oidc-code-flow-authentication-tutorial.adoc @@ -287,9 +287,9 @@ After you have completed this tutorial, explore xref:security-oidc-bearer-token- * xref:security-openid-connect-dev-services.adoc[Dev Services for Keycloak] * xref:security-jwt-build.adoc[Sign and encrypt JWT tokens with SmallRye JWT Build] * xref:security-authentication-mechanisms.adoc#oidc-jwt-oauth2-comparison[Choosing between OpenID Connect, SmallRye JWT, and OAuth2 authentication mechanisms] -ifndef::no-quarkus-keycloak-admin-client[] +ifndef::no-quarkus-keycloak-admin-resteasy-client[] * xref:security-keycloak-admin-client.adoc[Quarkus Keycloak Admin Client] -endif::no-quarkus-keycloak-admin-client[] +endif::no-quarkus-keycloak-admin-resteasy-client[] * https://www.keycloak.org/documentation.html[Keycloak Documentation] * xref:security-oidc-auth0-tutorial.adoc[Protect Quarkus web application by using Auth0 OpenID Connect provider] * https://openid.net/connect/[OpenID Connect]