Skip to content

Commit 3defb8b

Browse files
Add missing double slashes after "config-ocivault:" (#84)
* Add missing double slashes after "config-ocivault:" * Add missing '//' * Add missing '//' * Add missing '//' * Add missing '//' * Adding missing '//'
1 parent 0aeb9d2 commit 3defb8b

File tree

8 files changed

+13
-13
lines changed

8 files changed

+13
-13
lines changed

README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ types of providers.
7474
A Centralized Config Provider is identified and configured by a JDBC URL of the
7575
following form:
7676
<pre>
77-
jdbc:oracle:thin:@config-{provider-name}:[path][?parameters]
77+
jdbc:oracle:thin:@config-{provider-name}://[path][?parameters]
7878
</pre>
7979
For example, the URL below identifies and configures the Centralized Config Provider for Azure:
8080
<pre>

ojdbc-provider-azure/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -95,10 +95,10 @@ The sample code below executes as expected with the previous configuration (and
9595
```
9696
## Azure Vault Config Provider
9797
Similar to [OCI Vault Config Provider](../ojdbc-provider-oci/README.md#oci-vault-config-provider), JSON Payload can also be stored in the content of Azure Key Vault Secret.
98-
The Oracle DataSource uses a new prefix `jdbc:oracle:thin:@config-azurevault:`. Users only need to indicate the Vault Secret’s secret identifier, with the following syntax:
98+
The Oracle DataSource uses a new prefix `jdbc:oracle:thin:@config-azurevault://`. Users only need to indicate the Vault Secret’s secret identifier, with the following syntax:
9999

100100
<pre>
101-
jdbc:oracle:thin:@config-azurevault:{secret-identifier}
101+
jdbc:oracle:thin:@config-azurevault://{secret-identifier}
102102
</pre>
103103

104104
To view an example format of JSON Payload, please refer to [JSON Payload format](../ojdbc-provider-oci/README.md#json-payload-format).

ojdbc-provider-oci/README.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -70,10 +70,10 @@ Provider can now support Database Tools Connections with Proxy Authentication,
7070
only if username is provided in Proxy Authentication Info, without the password and roles.
7171

7272
## OCI Object Storage Config Provider
73-
The Oracle DataSource uses a new prefix `jdbc:oracle:thin:@config-ociobject:` to be able to identify that the configuration parameters should be loaded using OCI Object Storage. Users only need to indicate the URL Path of the Object containing the JSON payload, with the following syntax:
73+
The Oracle DataSource uses a new prefix `jdbc:oracle:thin:@config-ociobject://` to be able to identify that the configuration parameters should be loaded using OCI Object Storage. Users only need to indicate the URL Path of the Object containing the JSON payload, with the following syntax:
7474

7575
<pre>
76-
jdbc:oracle:thin:@config-ociobject:{url_path}[?option1=value1&option2=value2...]
76+
jdbc:oracle:thin:@config-ociobject://{url_path}[?option1=value1&option2=value2...]
7777
</pre>
7878

7979
The insturctions of obtaining a URL Path can be found in [Get the URI or Pre-Authenticated Request URL to Access the Object Store](https://docs.oracle.com/en/cloud/paas/autonomous-database/csgru/get-uri-access-object-store.html).
@@ -151,7 +151,7 @@ For the JSON type of provider (OCI Object Storage, HTTP/HTTPS, File) the passwor
151151
Apart from OCI Object Storage, users can also store JSON Payload in the content of OCI Vault Secret. Users need to indicate the OCID of the Secret with the following syntax:
152152

153153
<pre>
154-
jdbc:oracle:thin:@config-ocivault:{secret-ocid}
154+
jdbc:oracle:thin:@config-ocivault://{secret-ocid}
155155
</pre>
156156

157157
The JSON Payload retrieved by OCI Vault Config Provider follows the same format in [OCI Object Storage Config Provider](#json-payload-format).

ojdbc-provider-samples/src/main/java/oracle/jdbc/provider/azure/configuration/AzureAppConfigExample.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ public class AzureAppConfigExample {
100100
*/
101101
public static void main(String[] args) throws SQLException {
102102
// Construct a jdbc: URL
103-
String url = "jdbc:oracle:thin:@config-azure:" + APPCONFIG_NAME;
103+
String url = "jdbc:oracle:thin:@config-azure://" + APPCONFIG_NAME;
104104

105105
String optionalString = constructOptionalString();
106106
if (optionalString.length() != 0)

ojdbc-provider-samples/src/main/java/oracle/jdbc/provider/azure/configuration/SimpleAzureAppConfigExample.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -58,14 +58,14 @@
5858
* <li>AZURE_CLIENT_SECRET A client secret that was generated for the App
5959
* Registration.</li>
6060
* </ul>
61-
* <p>The Oracle DataSource uses a new prefix jdbc:oracle:thin:@config-azure:
61+
* <p>The Oracle DataSource uses a new prefix jdbc:oracle:thin:@config-azure://
6262
* to be able to identify that the configuration parameters should be loaded
6363
* using Azure App Configuration. Users only need to indicate the App Config's
6464
* name, a prefix for the key-names and the Label (both optionally) with the
6565
* following syntax:
6666
* </p>
6767
* <pre>
68-
* jdbc:oracle:thin:@config-azure:{appconfig-name}[?key=prefix&amp;label=value
68+
* jdbc:oracle:thin:@config-azure://{appconfig-name}[?key=prefix&amp;label=value
6969
* &amp;option1=value1&amp;option2=value2...]
7070
* </pre>
7171
*/

ojdbc-provider-samples/src/main/java/oracle/jdbc/provider/azure/configuration/SimpleAzureVaultJsonExample.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -65,14 +65,14 @@
6565
* {@link oracle.jdbc.spi.OracleConfigurationProvider}.
6666
* </p>
6767
* <p>The Oracle DataSource uses a new prefix
68-
* jdbc:oracle:thin:@config-azurevault:
68+
* jdbc:oracle:thin:@config-azurevault://
6969
* to be able to identify that the configuration parameters should be loaded
7070
* using Azure Vault Secret. Users only need to indicate the Vault Secret's
7171
* secret identifier, with the
7272
* following syntax:
7373
* </p>
7474
* <pre>
75-
* jdbc:oracle:thin:@config-azurevault:{secret-identifier}
75+
* jdbc:oracle:thin:@config-azurevault://{secret-identifier}
7676
* </pre>
7777
*/
7878

ojdbc-provider-samples/src/main/java/oracle/jdbc/provider/oci/configuration/ObjectStorageExample.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ public class ObjectStorageExample {
8383
* @throws SQLException if an error occurs during the database calls
8484
*/
8585
public static void main(String[] args) throws SQLException {
86-
String url = "jdbc:oracle:thin:@config-ociobject:" + OBJECT_URI;
86+
String url = "jdbc:oracle:thin:@config-ociobject://" + OBJECT_URI;
8787

8888
if (OCI_AUTHENTICATION == null)
8989
System.out.println("oci_authentication property is empty. Default " +

ojdbc-provider-samples/src/main/java/oracle/jdbc/provider/oci/configuration/SimpleVaultJsonExample.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ public class SimpleVaultJsonExample {
6868
* </p>
6969
* Users need to indicate the OCID of the Secret with the following syntax:
7070
* <pre>
71-
* jdbc:oracle:thin:@config-ocivault:{secret-ocid}
71+
* jdbc:oracle:thin:@config-ocivault://{secret-ocid}
7272
* </pre>
7373
* @param args the command line arguments
7474
* @throws SQLException if an error occurs during the database calls

0 commit comments

Comments
 (0)