Skip to content

Commit 4e6bab1

Browse files
committed
Typo fixes in the Secure MCP server post
1 parent 1a66fef commit 4e6bab1

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

_posts/2025-04-28-secure-mcp-sse-server.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -200,7 +200,7 @@ Note the use of the `%prod.` prefixes. It ensures the configuration properties p
200200

201201
Currently, MCP clients can not use the authorization code flow themselves. Therefore, we implement an OAuth2 login endpoint that will return a GitHub token for the user to use with MCP clients, which can work with bearer tokens.
202202

203-
Add another dependency: to support Qute templates:
203+
Add another dependency to support Qute templates:
204204

205205
[source,xml]
206206
----
@@ -249,7 +249,7 @@ public class LoginResource {
249249
}
250250
}
251251
----
252-
<1> GitHub access tokens are binary and Quarkus OIDC indirectly verifies them by using them to request GutHub specific `UserInfo` representation.
252+
<1> GitHub access tokens are binary and Quarkus OIDC indirectly verifies them by using them to request GitHub specific `UserInfo` representation.
253253
<2> `AccessTokenCredential` is used to capture a binary GitHub access token.
254254
<3> After the user logs in to GitHub and is redirected to this endpoint, the access token will be returned to the user in an HTML page generated with a simple https://github.com/quarkiverse/quarkus-mcp-server/tree/main/samples/secure-mcp-sse-server/src/main/resources/templates/accessTokenPage.html[Qute template].
255255
Of course, you would not do that in a real application. It is just an example to demonstrate the capability.

0 commit comments

Comments
 (0)