Skip to content

Commit ac441e6

Browse files
author
Steve Riesenberg
committed
Polish Antora migration
Issue gh-1292 Closes gh-1295
1 parent 0f0424a commit ac441e6

File tree

19 files changed

+149
-149
lines changed

19 files changed

+149
-149
lines changed

docs/antora-playbook.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,11 +11,11 @@ antora:
1111
- '@antora/atlas-extension'
1212
site:
1313
title: Spring Authorization Server
14-
url: https://https://rwinch.github.io/spring-authorization-server/
14+
url: https://docs.spring.io/spring-authorization-server/
1515
content:
1616
sources:
1717
- url: ..
18-
branches: antora
18+
branches: HEAD
1919
start_path: docs
2020
worktrees: true
2121
asciidoc:

docs/modules/ROOT/nav.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
* xref:index.adoc[]
1+
* xref:overview.adoc[]
22
* xref:getting-help.adoc[]
33
* xref:getting-started.adoc[]
44
* xref:configuration-model.adoc[]

docs/modules/ROOT/pages/getting-started.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ If you want to customize the default configuration (regardless of whether you're
8888

8989
These components can be defined as follows:
9090

91-
[[sample.gettingStarted]]
91+
[[sample.gettingstarted]]
9292
.SecurityConfig.java
9393
[source,java]
9494
----

docs/modules/ROOT/pages/guides/how-to-jpa.adoc

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ CREATE TABLE authorization (
112112
=== Authorization Consent Schema
113113

114114
The xref:core-model-components.adoc#oauth2-authorization-consent[`OAuth2AuthorizationConsent`] domain object is the simplest to model and contains only a single multi-valued field in addition to a composite key.
115-
The following listing shows the `authorizationConsent` schema.
115+
The following listing shows the `authorizationconsent` schema.
116116

117117
.Authorization Consent Schema
118118
[source,sql]
@@ -167,11 +167,11 @@ include::{examples-dir}/main/java/sample/jpa/entity/authorization/Authorization.
167167

168168
The following listing shows the `AuthorizationConsent` entity, which is used to persist information mapped from the xref:core-model-components.adoc#oauth2-authorization-consent[`OAuth2AuthorizationConsent`] domain object.
169169

170-
[[sample.jpa.entity.authorizationConsent]]
170+
[[sample.jpa.entity.authorizationconsent]]
171171
.Authorization Consent Entity
172172
[source,java]
173173
----
174-
include::{examples-dir}/main/java/sample/jpa/entity/authorizationConsent/AuthorizationConsent.java[]
174+
include::{examples-dir}/main/java/sample/jpa/entity/authorizationconsent/AuthorizationConsent.java[]
175175
----
176176

177177
[[create-spring-data-repositories]]
@@ -213,11 +213,11 @@ include::{examples-dir}/main/java/sample/jpa/repository/authorization/Authorizat
213213

214214
The following listing shows the `AuthorizationConsentRepository`, which is able to find and delete an xref:guides/how-to-jpa.adoc#authorization-consent-entity[`AuthorizationConsent`] by the `registeredClientId` and `principalName` fields that form a composite primary key.
215215

216-
[[sample.jpa.repository.authorizationConsent]]
216+
[[sample.jpa.repository.authorizationconsent]]
217217
.Authorization Consent Repository
218218
[source,java]
219219
----
220-
include::{examples-dir}/main/java/sample/jpa/repository/authorizationConsent/AuthorizationConsentRepository.java[]
220+
include::{examples-dir}/main/java/sample/jpa/repository/authorizationconsent/AuthorizationConsentRepository.java[]
221221
----
222222

223223
[[implement-core-services]]
@@ -263,9 +263,9 @@ include::{examples-dir}/main/java/sample/jpa/service/authorization/JpaOAuth2Auth
263263

264264
The following listing shows the `JpaOAuth2AuthorizationConsentService`, which uses an xref:guides/how-to-jpa.adoc#authorization-consent-repository[`AuthorizationConsentRepository`] for persisting an xref:guides/how-to-jpa.adoc#authorization-consent-entity[`AuthorizationConsent`] and maps to and from the xref:core-model-components.adoc#oauth2-authorization-consent[`OAuth2AuthorizationConsent`] domain object.
265265

266-
[[sample.jpa.service.authorizationConsent]]
266+
[[sample.jpa.service.authorizationconsent]]
267267
.`OAuth2AuthorizationConsentService` Implementation
268268
[source,java]
269269
----
270-
include::{examples-dir}/main/java/sample/jpa/service/authorizationConsent/JpaOAuth2AuthorizationConsentService.java[]
270+
include::{examples-dir}/main/java/sample/jpa/service/authorizationconsent/JpaOAuth2AuthorizationConsentService.java[]
271271
----

docs/modules/ROOT/pages/guides/how-to-userinfo.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ The following listing shows how to use the customization option that is availabl
8383
include::{examples-dir}/main/java/sample/userinfo/jwt/JwtUserInfoMapperSecurityConfig.java[]
8484
----
8585

86-
This configuration maps claims from the access token (which is a JWT when using the xref:getting-started.adoc#sample.gettingStarted[Getting Started config]) to populate the user info response and provides the following:
86+
This configuration maps claims from the access token (which is a JWT when using the xref:getting-started.adoc#sample.gettingstarted[Getting Started config]) to populate the user info response and provides the following:
8787

8888
<1> A Spring Security filter chain for the xref:{docs-dir}/protocol-endpoints.adoc[Protocol Endpoints].
8989
<2> A user info mapper that maps claims in a domain-specific way.

docs/modules/ROOT/pages/index.adoc

Lines changed: 3 additions & 100 deletions
Original file line numberDiff line numberDiff line change
@@ -1,109 +1,12 @@
1+
:noheader:
12
[[top]]
2-
= Overview
3-
:page-section-summary-toc: 1
4-
Joe Grandja, Steve Riesenberg
5-
v{spring-authorization-server-version}
6-
:docinfo: private-footer
7-
:nofooter:
8-
9-
This site contains reference documentation and how-to guides for Spring Authorization Server.
3+
= Spring Authorization Server Reference
104

115
[horizontal]
12-
xref:index.adoc#introducing-spring-authorization-server[Introduction] :: Introduction and feature list
6+
xref:overview.adoc[Overview] :: Introduction and feature list
137
xref:getting-help.adoc[Getting Help] :: Links to samples, questions and issues
148
xref:getting-started.adoc[Getting Started] :: System requirements, dependencies and developing your first application
159
xref:configuration-model.adoc[Configuration Model] :: Default configuration and customizing the configuration
1610
xref:core-model-components.adoc[Core Model / Components] :: Core domain model and component interfaces
1711
xref:protocol-endpoints.adoc[Protocol Endpoints] :: OAuth2 and OpenID Connect 1.0 protocol endpoint implementations
1812
xref:how-to.adoc[How-to Guides] :: Guides to get the most from Spring Authorization Server
19-
20-
21-
[[introducing-spring-authorization-server]]
22-
== Introducing Spring Authorization Server
23-
24-
Spring Authorization Server is a framework that provides implementations of the https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-07[OAuth 2.1] and https://openid.net/specs/openid-connect-core-1_0.html[OpenID Connect 1.0] specifications and other related specifications.
25-
It is built on top of https://spring.io/projects/spring-security[Spring Security] to provide a secure, light-weight, and customizable foundation for building OpenID Connect 1.0 Identity Providers and OAuth2 Authorization Server products.
26-
27-
[[feature-list]]
28-
== Feature List
29-
30-
Spring Authorization Server supports the following features:
31-
32-
[cols="2a,4a,6a"]
33-
|===
34-
|Category |Feature |Related specifications
35-
36-
|xref:protocol-endpoints.adoc#oauth2-token-endpoint[Authorization Grant]
37-
|
38-
* Authorization Code
39-
** xref:protocol-endpoints.adoc#oauth2-authorization-endpoint[User Consent]
40-
* Client Credentials
41-
* Refresh Token
42-
* Device Code
43-
** xref:protocol-endpoints.adoc#oauth2-device-verification-endpoint[User Consent]
44-
|
45-
* The OAuth 2.1 Authorization Framework (https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-07[draft])
46-
** https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-07#section-4.1[Authorization Code Grant]
47-
** https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-07#section-4.2[Client Credentials Grant]
48-
** https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-07#section-4.3[Refresh Token Grant]
49-
* OpenID Connect Core 1.0 (https://openid.net/specs/openid-connect-core-1_0.html[spec])
50-
** https://openid.net/specs/openid-connect-core-1_0.html#CodeFlowAuth[Authorization Code Flow]
51-
* OAuth 2.0 Device Authorization Grant
52-
(https://tools.ietf.org/html/rfc8628[spec])
53-
** https://tools.ietf.org/html/rfc8628#section-3[Device Flow]
54-
55-
|xref:core-model-components.adoc#oauth2-token-generator[Token Formats]
56-
|
57-
* Self-contained (JWT)
58-
* Reference (Opaque)
59-
|
60-
* JSON Web Token (JWT) (https://tools.ietf.org/html/rfc7519[RFC 7519])
61-
* JSON Web Signature (JWS) (https://tools.ietf.org/html/rfc7515[RFC 7515])
62-
63-
|xref:configuration-model.adoc#configuring-client-authentication[Client Authentication]
64-
|
65-
* `client_secret_basic`
66-
* `client_secret_post`
67-
* `client_secret_jwt`
68-
* `private_key_jwt`
69-
* `none` (public clients)
70-
|
71-
* The OAuth 2.1 Authorization Framework (https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-07#section-2.4[Client Authentication])
72-
* JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication (https://tools.ietf.org/html/rfc7523[RFC 7523])
73-
* Proof Key for Code Exchange by OAuth Public Clients (PKCE) (https://tools.ietf.org/html/rfc7636[RFC 7636])
74-
75-
|xref:protocol-endpoints.adoc[Protocol Endpoints]
76-
|
77-
* xref:protocol-endpoints.adoc#oauth2-authorization-endpoint[OAuth2 Authorization Endpoint]
78-
* xref:protocol-endpoints.adoc#oauth2-device-authorization-endpoint[OAuth2 Device Authorization Endpoint]
79-
* xref:protocol-endpoints.adoc#oauth2-device-verification-endpoint[OAuth2 Device Verification Endpoint]
80-
* xref:protocol-endpoints.adoc#oauth2-token-endpoint[OAuth2 Token Endpoint]
81-
* xref:protocol-endpoints.adoc#oauth2-token-introspection-endpoint[OAuth2 Token Introspection Endpoint]
82-
* xref:protocol-endpoints.adoc#oauth2-token-revocation-endpoint[OAuth2 Token Revocation Endpoint]
83-
* xref:protocol-endpoints.adoc#oauth2-authorization-server-metadata-endpoint[OAuth2 Authorization Server Metadata Endpoint]
84-
* xref:protocol-endpoints.adoc#jwk-set-endpoint[JWK Set Endpoint]
85-
* xref:protocol-endpoints.adoc#oidc-provider-configuration-endpoint[OpenID Connect 1.0 Provider Configuration Endpoint]
86-
* xref:protocol-endpoints.adoc#oidc-logout-endpoint[OpenID Connect 1.0 Logout Endpoint]
87-
* xref:protocol-endpoints.adoc#oidc-user-info-endpoint[OpenID Connect 1.0 UserInfo Endpoint]
88-
* xref:protocol-endpoints.adoc#oidc-client-registration-endpoint[OpenID Connect 1.0 Client Registration Endpoint]
89-
|
90-
* The OAuth 2.1 Authorization Framework (https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-07[draft])
91-
** https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-07#section-3.1[Authorization Endpoint]
92-
** https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-07#section-3.2[Token Endpoint]
93-
* OAuth 2.0 Device Authorization Grant (https://tools.ietf.org/html/rfc8628[RFC 8628])
94-
** https://tools.ietf.org/html/rfc8628#section-3.1[Device Authorization Endpoint]
95-
** https://tools.ietf.org/html/rfc8628#section-3.3[Device Verification Endpoint]
96-
* OAuth 2.0 Token Introspection (https://tools.ietf.org/html/rfc7662[RFC 7662])
97-
* OAuth 2.0 Token Revocation (https://tools.ietf.org/html/rfc7009[RFC 7009])
98-
* OAuth 2.0 Authorization Server Metadata (https://tools.ietf.org/html/rfc8414[RFC 8414])
99-
* JSON Web Key (JWK) (https://tools.ietf.org/html/rfc7517[RFC 7517])
100-
* OpenID Connect Discovery 1.0 (https://openid.net/specs/openid-connect-discovery-1_0.html[spec])
101-
** https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfig[Provider Configuration Endpoint]
102-
* OpenID Connect RP-Initiated Logout 1.0 (https://openid.net/specs/openid-connect-rpinitiated-1_0.html[spec])
103-
** https://openid.net/specs/openid-connect-rpinitiated-1_0.html#RPLogout[Logout Endpoint]
104-
* OpenID Connect Core 1.0 (https://openid.net/specs/openid-connect-core-1_0.html[spec])
105-
** https://openid.net/specs/openid-connect-core-1_0.html#UserInfo[UserInfo Endpoint]
106-
* OpenID Connect Dynamic Client Registration 1.0 (https://openid.net/specs/openid-connect-registration-1_0.html[spec])
107-
** https://openid.net/specs/openid-connect-registration-1_0.html#ClientRegistration[Client Registration Endpoint]
108-
** https://openid.net/specs/openid-connect-registration-1_0.html#ClientConfigurationEndpoint[Client Configuration Endpoint]
109-
|===

docs/modules/ROOT/pages/overview.adoc

Lines changed: 94 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,94 @@
1+
[[overview]]
2+
= Overview
3+
4+
This site contains reference documentation and how-to guides for Spring Authorization Server.
5+
6+
[[introducing-spring-authorization-server]]
7+
== Introducing Spring Authorization Server
8+
9+
Spring Authorization Server is a framework that provides implementations of the https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-07[OAuth 2.1] and https://openid.net/specs/openid-connect-core-1_0.html[OpenID Connect 1.0] specifications and other related specifications.
10+
It is built on top of https://spring.io/projects/spring-security[Spring Security] to provide a secure, light-weight, and customizable foundation for building OpenID Connect 1.0 Identity Providers and OAuth2 Authorization Server products.
11+
12+
[[feature-list]]
13+
== Feature List
14+
15+
Spring Authorization Server supports the following features:
16+
17+
[cols="2a,4a,6a"]
18+
|===
19+
|Category |Feature |Related specifications
20+
21+
|xref:protocol-endpoints.adoc#oauth2-token-endpoint[Authorization Grant]
22+
|
23+
* Authorization Code
24+
** xref:protocol-endpoints.adoc#oauth2-authorization-endpoint[User Consent]
25+
* Client Credentials
26+
* Refresh Token
27+
* Device Code
28+
** xref:protocol-endpoints.adoc#oauth2-device-verification-endpoint[User Consent]
29+
|
30+
* The OAuth 2.1 Authorization Framework (https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-07[draft])
31+
** https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-07#section-4.1[Authorization Code Grant]
32+
** https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-07#section-4.2[Client Credentials Grant]
33+
** https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-07#section-4.3[Refresh Token Grant]
34+
* OpenID Connect Core 1.0 (https://openid.net/specs/openid-connect-core-1_0.html[spec])
35+
** https://openid.net/specs/openid-connect-core-1_0.html#CodeFlowAuth[Authorization Code Flow]
36+
* OAuth 2.0 Device Authorization Grant
37+
(https://tools.ietf.org/html/rfc8628[spec])
38+
** https://tools.ietf.org/html/rfc8628#section-3[Device Flow]
39+
40+
|xref:core-model-components.adoc#oauth2-token-generator[Token Formats]
41+
|
42+
* Self-contained (JWT)
43+
* Reference (Opaque)
44+
|
45+
* JSON Web Token (JWT) (https://tools.ietf.org/html/rfc7519[RFC 7519])
46+
* JSON Web Signature (JWS) (https://tools.ietf.org/html/rfc7515[RFC 7515])
47+
48+
|xref:configuration-model.adoc#configuring-client-authentication[Client Authentication]
49+
|
50+
* `client_secret_basic`
51+
* `client_secret_post`
52+
* `client_secret_jwt`
53+
* `private_key_jwt`
54+
* `none` (public clients)
55+
|
56+
* The OAuth 2.1 Authorization Framework (https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-07#section-2.4[Client Authentication])
57+
* JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication (https://tools.ietf.org/html/rfc7523[RFC 7523])
58+
* Proof Key for Code Exchange by OAuth Public Clients (PKCE) (https://tools.ietf.org/html/rfc7636[RFC 7636])
59+
60+
|xref:protocol-endpoints.adoc[Protocol Endpoints]
61+
|
62+
* xref:protocol-endpoints.adoc#oauth2-authorization-endpoint[OAuth2 Authorization Endpoint]
63+
* xref:protocol-endpoints.adoc#oauth2-device-authorization-endpoint[OAuth2 Device Authorization Endpoint]
64+
* xref:protocol-endpoints.adoc#oauth2-device-verification-endpoint[OAuth2 Device Verification Endpoint]
65+
* xref:protocol-endpoints.adoc#oauth2-token-endpoint[OAuth2 Token Endpoint]
66+
* xref:protocol-endpoints.adoc#oauth2-token-introspection-endpoint[OAuth2 Token Introspection Endpoint]
67+
* xref:protocol-endpoints.adoc#oauth2-token-revocation-endpoint[OAuth2 Token Revocation Endpoint]
68+
* xref:protocol-endpoints.adoc#oauth2-authorization-server-metadata-endpoint[OAuth2 Authorization Server Metadata Endpoint]
69+
* xref:protocol-endpoints.adoc#jwk-set-endpoint[JWK Set Endpoint]
70+
* xref:protocol-endpoints.adoc#oidc-provider-configuration-endpoint[OpenID Connect 1.0 Provider Configuration Endpoint]
71+
* xref:protocol-endpoints.adoc#oidc-logout-endpoint[OpenID Connect 1.0 Logout Endpoint]
72+
* xref:protocol-endpoints.adoc#oidc-user-info-endpoint[OpenID Connect 1.0 UserInfo Endpoint]
73+
* xref:protocol-endpoints.adoc#oidc-client-registration-endpoint[OpenID Connect 1.0 Client Registration Endpoint]
74+
|
75+
* The OAuth 2.1 Authorization Framework (https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-07[draft])
76+
** https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-07#section-3.1[Authorization Endpoint]
77+
** https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-07#section-3.2[Token Endpoint]
78+
* OAuth 2.0 Device Authorization Grant (https://tools.ietf.org/html/rfc8628[RFC 8628])
79+
** https://tools.ietf.org/html/rfc8628#section-3.1[Device Authorization Endpoint]
80+
** https://tools.ietf.org/html/rfc8628#section-3.3[Device Verification Endpoint]
81+
* OAuth 2.0 Token Introspection (https://tools.ietf.org/html/rfc7662[RFC 7662])
82+
* OAuth 2.0 Token Revocation (https://tools.ietf.org/html/rfc7009[RFC 7009])
83+
* OAuth 2.0 Authorization Server Metadata (https://tools.ietf.org/html/rfc8414[RFC 8414])
84+
* JSON Web Key (JWK) (https://tools.ietf.org/html/rfc7517[RFC 7517])
85+
* OpenID Connect Discovery 1.0 (https://openid.net/specs/openid-connect-discovery-1_0.html[spec])
86+
** https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfig[Provider Configuration Endpoint]
87+
* OpenID Connect RP-Initiated Logout 1.0 (https://openid.net/specs/openid-connect-rpinitiated-1_0.html[spec])
88+
** https://openid.net/specs/openid-connect-rpinitiated-1_0.html#RPLogout[Logout Endpoint]
89+
* OpenID Connect Core 1.0 (https://openid.net/specs/openid-connect-core-1_0.html[spec])
90+
** https://openid.net/specs/openid-connect-core-1_0.html#UserInfo[UserInfo Endpoint]
91+
* OpenID Connect Dynamic Client Registration 1.0 (https://openid.net/specs/openid-connect-registration-1_0.html[spec])
92+
** https://openid.net/specs/openid-connect-registration-1_0.html#ClientRegistration[Client Registration Endpoint]
93+
** https://openid.net/specs/openid-connect-registration-1_0.html#ClientConfigurationEndpoint[Client Configuration Endpoint]
94+
|===

docs/spring-authorization-server-docs.gradle

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
plugins {
22
id "io.spring.convention.docs"
3-
id 'io.spring.antora.generate-antora-yml' version '0.0.1'
4-
id 'org.antora' version '1.0.0'
3+
id "io.spring.antora.generate-antora-yml" version "0.0.1"
4+
id "org.antora" version "1.0.0"
55
id "java"
66
}
77

@@ -10,11 +10,11 @@ version = project.rootProject.version
1010
sourceCompatibility = "17"
1111

1212
antora {
13-
playbook = 'cached-antora-playbook.yml'
13+
playbook = "cached-antora-playbook.yml"
1414
playbookProvider {
15-
repository = 'rwinch/spring-authorization-server'
16-
branch = 'docs-build'
17-
path = 'lib/antora/templates/per-branch-antora-playbook.yml'
15+
repository = "spring-projects/spring-authorization-server"
16+
branch = "docs-build"
17+
path = "lib/antora/templates/per-branch-antora-playbook.yml"
1818
checkLocalBranch = true
1919
}
2020
options = [clean: true, fetch: !project.gradle.startParameter.offline, stacktrace: true]

docs/src/docs/asciidoc/examples/spring-authorization-server-docs-examples.gradle

Whitespace-only changes.

docs/src/docs/asciidoc/index-docinfo-footer.html

Lines changed: 0 additions & 8 deletions
This file was deleted.

docs/src/docs/asciidoc/index-docinfo.xml

Lines changed: 0 additions & 13 deletions
This file was deleted.

docs/src/main/java/sample/jpa/entity/authorizationConsent/AuthorizationConsent.java renamed to docs/src/main/java/sample/jpa/entity/authorizationconsent/AuthorizationConsent.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@
1313
* See the License for the specific language governing permissions and
1414
* limitations under the License.
1515
*/
16-
package sample.jpa.entity.authorizationConsent;
16+
package sample.jpa.entity.authorizationconsent;
1717

1818
import java.io.Serializable;
1919
import java.util.Objects;

docs/src/main/java/sample/jpa/repository/authorizationConsent/AuthorizationConsentRepository.java renamed to docs/src/main/java/sample/jpa/repository/authorizationconsent/AuthorizationConsentRepository.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,11 +13,11 @@
1313
* See the License for the specific language governing permissions and
1414
* limitations under the License.
1515
*/
16-
package sample.jpa.repository.authorizationConsent;
16+
package sample.jpa.repository.authorizationconsent;
1717

1818
import java.util.Optional;
1919

20-
import sample.jpa.entity.authorizationConsent.AuthorizationConsent;
20+
import sample.jpa.entity.authorizationconsent.AuthorizationConsent;
2121

2222
import org.springframework.data.jpa.repository.JpaRepository;
2323
import org.springframework.stereotype.Repository;

0 commit comments

Comments
 (0)