Skip to content

Commit efae213

Browse files
authored
fix source code block language syntax
same as in #15566 included here to prevent conflicts
1 parent 13d2acf commit efae213

File tree

2 files changed

+10
-10
lines changed

2 files changed

+10
-10
lines changed

docs/modules/ROOT/pages/reactive/oauth2/login/logout.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ To enable this, you can stand up the Back-Channel Logout endpoint in the DSL lik
135135
======
136136
Java::
137137
+
138-
[source=java,role="primary"]
138+
[source,java,role="primary"]
139139
----
140140
@Bean
141141
public SecurityWebFilterChain filterChain(ServerHttpSecurity http) throws Exception {
@@ -153,7 +153,7 @@ public SecurityWebFilterChain filterChain(ServerHttpSecurity http) throws Except
153153
154154
Kotlin::
155155
+
156-
[source=kotlin,role="secondary"]
156+
[source,kotlin,role="secondary"]
157157
----
158158
@Bean
159159
open fun filterChain(http: ServerHttpSecurity): SecurityWebFilterChain {
@@ -209,7 +209,7 @@ You can achieve this by configuring a custom `ReactiveOidcSessionRegistry`, like
209209
======
210210
Java::
211211
+
212-
[source=java,role="primary"]
212+
[source,java,role="primary"]
213213
----
214214
@Component
215215
public final class MySpringDataOidcSessionRegistry implements ReactiveOidcSessionRegistry {
@@ -238,7 +238,7 @@ public final class MySpringDataOidcSessionRegistry implements ReactiveOidcSessio
238238
239239
Kotlin::
240240
+
241-
[source=kotlin,role="secondary"]
241+
[source,kotlin,role="secondary"]
242242
----
243243
@Component
244244
class MySpringDataOidcSessionRegistry: ReactiveOidcSessionRegistry {

docs/modules/ROOT/pages/servlet/oauth2/login/logout.adoc

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ To enable this, you can stand up the Back-Channel Logout endpoint in the DSL lik
134134
======
135135
Java::
136136
+
137-
[source=java,role="primary"]
137+
[source,java,role="primary"]
138138
----
139139
@Bean
140140
public SecurityFilterChain filterChain(HttpSecurity http) throws Exception {
@@ -152,7 +152,7 @@ public SecurityFilterChain filterChain(HttpSecurity http) throws Exception {
152152
153153
Kotlin::
154154
+
155-
[source=kotlin,role="secondary"]
155+
[source,kotlin,role="secondary"]
156156
----
157157
@Bean
158158
open fun filterChain(http: HttpSecurity): SecurityFilterChain {
@@ -176,7 +176,7 @@ Then, you need a way listen to events published by Spring Security to remove old
176176
======
177177
Java::
178178
+
179-
[source=java,role="primary"]
179+
[source,java,role="primary"]
180180
----
181181
@Bean
182182
public HttpSessionEventPublisher sessionEventPublisher() {
@@ -186,7 +186,7 @@ public HttpSessionEventPublisher sessionEventPublisher() {
186186
187187
Kotlin::
188188
+
189-
[source=kotlin,role="secondary"]
189+
[source,kotlin,role="secondary"]
190190
----
191191
@Bean
192192
open fun sessionEventPublisher(): HttpSessionEventPublisher {
@@ -235,7 +235,7 @@ You can achieve this by configuring a custom `OidcSessionRegistry`, like so:
235235
======
236236
Java::
237237
+
238-
[source=java,role="primary"]
238+
[source,java,role="primary"]
239239
----
240240
@Component
241241
public final class MySpringDataOidcSessionRegistry implements OidcSessionRegistry {
@@ -264,7 +264,7 @@ public final class MySpringDataOidcSessionRegistry implements OidcSessionRegistr
264264
265265
Kotlin::
266266
+
267-
[source=kotlin,role="secondary"]
267+
[source,kotlin,role="secondary"]
268268
----
269269
@Component
270270
class MySpringDataOidcSessionRegistry: OidcSessionRegistry {

0 commit comments

Comments
 (0)