Skip to content

Commit f098892

Browse files
author
quarkusbot
committed
Sync web site with Quarkus documentation
1 parent 2bb8dbf commit f098892

12 files changed

+83
-15
lines changed

_generated-doc/3.15/config/quarkus-all-config.adoc

Lines changed: 21 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11467,7 +11467,7 @@ a| [[quarkus-vertx-http_quarkus-http-proxy-allow-forwarded]] [.property-path]##l
1146711467

1146811468
[.description]
1146911469
--
11470-
If this is true and proxy address forwarding is enabled then the standard `Forwarded` header will be used. In case the not standard `X-Forwarded-For` header is enabled and detected on HTTP requests, the standard header has the precedence. Activating this together with `quarkus.http.proxy.allow-x-forwarded` has security implications as clients can forge requests with a forwarded header that is not overwritten by the proxy. Therefore, proxies should strip unexpected `X-Forwarded` or `X-Forwarded-++*++` headers from the client.
11470+
If this is true and proxy address forwarding is enabled then the standard `Forwarded` header will be used. In case the not standard `X-Forwarded-For` header is enabled and detected on HTTP requests, the standard header has the precedence. Activating this together with `quarkus.http.proxy.allow-x-forwarded` has security implications as clients can forge requests with a forwarded header that is not overwritten by the proxy. Therefore, proxies should strip unexpected `Forwarded` or `X-Forwarded-++*++` headers from the client.
1147111471

1147211472

1147311473
ifdef::add-copy-button-to-env-var[]
@@ -11484,7 +11484,7 @@ a| [[quarkus-vertx-http_quarkus-http-proxy-allow-x-forwarded]] [.property-path]#
1148411484

1148511485
[.description]
1148611486
--
11487-
If either this or `allow-forwarded` are true and proxy address forwarding is enabled then the not standard `Forwarded` header will be used. In case the standard `Forwarded` header is enabled and detected on HTTP requests, the standard header has the precedence. Activating this together with `quarkus.http.proxy.allow-forwarded` has security implications as clients can forge requests with a forwarded header that is not overwritten by the proxy. Therefore, proxies should strip unexpected `X-Forwarded` or `X-Forwarded-++*++` headers from the client.
11487+
If either this or `allow-forwarded` are true and proxy address forwarding is enabled then the not standard `Forwarded` header will be used. In case the standard `Forwarded` header is enabled and detected on HTTP requests, the standard header has the precedence. Activating this together with `quarkus.http.proxy.allow-forwarded` has security implications as clients can forge requests with a forwarded header that is not overwritten by the proxy. Therefore, proxies should strip unexpected `Forwarded` or `X-Forwarded-++*++` headers from the client.
1148811488

1148911489

1149011490
ifdef::add-copy-button-to-env-var[]
@@ -12850,7 +12850,7 @@ a| [[quarkus-vertx-http_quarkus-management-proxy-allow-forwarded]] [.property-pa
1285012850

1285112851
[.description]
1285212852
--
12853-
If this is true and proxy address forwarding is enabled then the standard `Forwarded` header will be used. In case the not standard `X-Forwarded-For` header is enabled and detected on HTTP requests, the standard header has the precedence. Activating this together with `quarkus.http.proxy.allow-x-forwarded` has security implications as clients can forge requests with a forwarded header that is not overwritten by the proxy. Therefore, proxies should strip unexpected `X-Forwarded` or `X-Forwarded-++*++` headers from the client.
12853+
If this is true and proxy address forwarding is enabled then the standard `Forwarded` header will be used. In case the not standard `X-Forwarded-For` header is enabled and detected on HTTP requests, the standard header has the precedence. Activating this together with `quarkus.http.proxy.allow-x-forwarded` has security implications as clients can forge requests with a forwarded header that is not overwritten by the proxy. Therefore, proxies should strip unexpected `Forwarded` or `X-Forwarded-++*++` headers from the client.
1285412854

1285512855

1285612856
ifdef::add-copy-button-to-env-var[]
@@ -12867,7 +12867,7 @@ a| [[quarkus-vertx-http_quarkus-management-proxy-allow-x-forwarded]] [.property-
1286712867

1286812868
[.description]
1286912869
--
12870-
If either this or `allow-forwarded` are true and proxy address forwarding is enabled then the not standard `Forwarded` header will be used. In case the standard `Forwarded` header is enabled and detected on HTTP requests, the standard header has the precedence. Activating this together with `quarkus.http.proxy.allow-forwarded` has security implications as clients can forge requests with a forwarded header that is not overwritten by the proxy. Therefore, proxies should strip unexpected `X-Forwarded` or `X-Forwarded-++*++` headers from the client.
12870+
If either this or `allow-forwarded` are true and proxy address forwarding is enabled then the not standard `Forwarded` header will be used. In case the standard `Forwarded` header is enabled and detected on HTTP requests, the standard header has the precedence. Activating this together with `quarkus.http.proxy.allow-forwarded` has security implications as clients can forge requests with a forwarded header that is not overwritten by the proxy. Therefore, proxies should strip unexpected `Forwarded` or `X-Forwarded-++*++` headers from the client.
1287112871

1287212872

1287312873
ifdef::add-copy-button-to-env-var[]
@@ -69999,6 +69999,23 @@ endif::add-copy-button-to-env-var[]
6999969999
|string
7000070000
|`/`
7000170001

70002+
a| [[quarkus-security-webauthn_quarkus-webauthn-enable-callback-endpoint]] [.property-path]##link:#quarkus-security-webauthn_quarkus-webauthn-enable-callback-endpoint[`quarkus.webauthn.enable-callback-endpoint`]##
70003+
70004+
[.description]
70005+
--
70006+
Set to `true` if you want to enable the default registration and login endpoint at `/q/webauthn/callback`.
70007+
70008+
70009+
ifdef::add-copy-button-to-env-var[]
70010+
Environment variable: env_var_with_copy_button:+++QUARKUS_WEBAUTHN_ENABLE_CALLBACK_ENDPOINT+++[]
70011+
endif::add-copy-button-to-env-var[]
70012+
ifndef::add-copy-button-to-env-var[]
70013+
Environment variable: `+++QUARKUS_WEBAUTHN_ENABLE_CALLBACK_ENDPOINT+++`
70014+
endif::add-copy-button-to-env-var[]
70015+
--
70016+
|boolean
70017+
|`false`
70018+
7000270019

7000370020
h|[.extension-name]##SmallRye GraphQL##
7000470021
h|Type

_generated-doc/3.15/config/quarkus-security-webauthn.adoc

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -365,6 +365,23 @@ endif::add-copy-button-to-env-var[]
365365
|string
366366
|`/`
367367

368+
a| [[quarkus-security-webauthn_quarkus-webauthn-enable-callback-endpoint]] [.property-path]##link:#quarkus-security-webauthn_quarkus-webauthn-enable-callback-endpoint[`quarkus.webauthn.enable-callback-endpoint`]##
369+
370+
[.description]
371+
--
372+
Set to `true` if you want to enable the default registration and login endpoint at `/q/webauthn/callback`.
373+
374+
375+
ifdef::add-copy-button-to-env-var[]
376+
Environment variable: env_var_with_copy_button:+++QUARKUS_WEBAUTHN_ENABLE_CALLBACK_ENDPOINT+++[]
377+
endif::add-copy-button-to-env-var[]
378+
ifndef::add-copy-button-to-env-var[]
379+
Environment variable: `+++QUARKUS_WEBAUTHN_ENABLE_CALLBACK_ENDPOINT+++`
380+
endif::add-copy-button-to-env-var[]
381+
--
382+
|boolean
383+
|`false`
384+
368385
|===
369386

370387
ifndef::no-duration-note[]

_generated-doc/3.15/config/quarkus-security-webauthn_quarkus.webauthn.adoc

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -365,6 +365,23 @@ endif::add-copy-button-to-env-var[]
365365
|string
366366
|`/`
367367

368+
a| [[quarkus-security-webauthn_quarkus-webauthn-enable-callback-endpoint]] [.property-path]##link:#quarkus-security-webauthn_quarkus-webauthn-enable-callback-endpoint[`quarkus.webauthn.enable-callback-endpoint`]##
369+
370+
[.description]
371+
--
372+
Set to `true` if you want to enable the default registration and login endpoint at `/q/webauthn/callback`.
373+
374+
375+
ifdef::add-copy-button-to-env-var[]
376+
Environment variable: env_var_with_copy_button:+++QUARKUS_WEBAUTHN_ENABLE_CALLBACK_ENDPOINT+++[]
377+
endif::add-copy-button-to-env-var[]
378+
ifndef::add-copy-button-to-env-var[]
379+
Environment variable: `+++QUARKUS_WEBAUTHN_ENABLE_CALLBACK_ENDPOINT+++`
380+
endif::add-copy-button-to-env-var[]
381+
--
382+
|boolean
383+
|`false`
384+
368385
|===
369386

370387
ifndef::no-duration-note[]

_generated-doc/3.15/config/quarkus-vertx-http_quarkus.http.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2805,7 +2805,7 @@ a| [[quarkus-vertx-http_quarkus-http-proxy-allow-forwarded]] [.property-path]##l
28052805

28062806
[.description]
28072807
--
2808-
If this is true and proxy address forwarding is enabled then the standard `Forwarded` header will be used. In case the not standard `X-Forwarded-For` header is enabled and detected on HTTP requests, the standard header has the precedence. Activating this together with `quarkus.http.proxy.allow-x-forwarded` has security implications as clients can forge requests with a forwarded header that is not overwritten by the proxy. Therefore, proxies should strip unexpected `X-Forwarded` or `X-Forwarded-++*++` headers from the client.
2808+
If this is true and proxy address forwarding is enabled then the standard `Forwarded` header will be used. In case the not standard `X-Forwarded-For` header is enabled and detected on HTTP requests, the standard header has the precedence. Activating this together with `quarkus.http.proxy.allow-x-forwarded` has security implications as clients can forge requests with a forwarded header that is not overwritten by the proxy. Therefore, proxies should strip unexpected `Forwarded` or `X-Forwarded-++*++` headers from the client.
28092809

28102810

28112811
ifdef::add-copy-button-to-env-var[]
@@ -2822,7 +2822,7 @@ a| [[quarkus-vertx-http_quarkus-http-proxy-allow-x-forwarded]] [.property-path]#
28222822

28232823
[.description]
28242824
--
2825-
If either this or `allow-forwarded` are true and proxy address forwarding is enabled then the not standard `Forwarded` header will be used. In case the standard `Forwarded` header is enabled and detected on HTTP requests, the standard header has the precedence. Activating this together with `quarkus.http.proxy.allow-forwarded` has security implications as clients can forge requests with a forwarded header that is not overwritten by the proxy. Therefore, proxies should strip unexpected `X-Forwarded` or `X-Forwarded-++*++` headers from the client.
2825+
If either this or `allow-forwarded` are true and proxy address forwarding is enabled then the not standard `Forwarded` header will be used. In case the standard `Forwarded` header is enabled and detected on HTTP requests, the standard header has the precedence. Activating this together with `quarkus.http.proxy.allow-forwarded` has security implications as clients can forge requests with a forwarded header that is not overwritten by the proxy. Therefore, proxies should strip unexpected `Forwarded` or `X-Forwarded-++*++` headers from the client.
28262826

28272827

28282828
ifdef::add-copy-button-to-env-var[]

_generated-doc/3.15/config/quarkus-vertx-http_quarkus.management.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1169,7 +1169,7 @@ a| [[quarkus-vertx-http_quarkus-management-proxy-allow-forwarded]] [.property-pa
11691169

11701170
[.description]
11711171
--
1172-
If this is true and proxy address forwarding is enabled then the standard `Forwarded` header will be used. In case the not standard `X-Forwarded-For` header is enabled and detected on HTTP requests, the standard header has the precedence. Activating this together with `quarkus.http.proxy.allow-x-forwarded` has security implications as clients can forge requests with a forwarded header that is not overwritten by the proxy. Therefore, proxies should strip unexpected `X-Forwarded` or `X-Forwarded-++*++` headers from the client.
1172+
If this is true and proxy address forwarding is enabled then the standard `Forwarded` header will be used. In case the not standard `X-Forwarded-For` header is enabled and detected on HTTP requests, the standard header has the precedence. Activating this together with `quarkus.http.proxy.allow-x-forwarded` has security implications as clients can forge requests with a forwarded header that is not overwritten by the proxy. Therefore, proxies should strip unexpected `Forwarded` or `X-Forwarded-++*++` headers from the client.
11731173

11741174

11751175
ifdef::add-copy-button-to-env-var[]
@@ -1186,7 +1186,7 @@ a| [[quarkus-vertx-http_quarkus-management-proxy-allow-x-forwarded]] [.property-
11861186

11871187
[.description]
11881188
--
1189-
If either this or `allow-forwarded` are true and proxy address forwarding is enabled then the not standard `Forwarded` header will be used. In case the standard `Forwarded` header is enabled and detected on HTTP requests, the standard header has the precedence. Activating this together with `quarkus.http.proxy.allow-forwarded` has security implications as clients can forge requests with a forwarded header that is not overwritten by the proxy. Therefore, proxies should strip unexpected `X-Forwarded` or `X-Forwarded-++*++` headers from the client.
1189+
If either this or `allow-forwarded` are true and proxy address forwarding is enabled then the not standard `Forwarded` header will be used. In case the standard `Forwarded` header is enabled and detected on HTTP requests, the standard header has the precedence. Activating this together with `quarkus.http.proxy.allow-forwarded` has security implications as clients can forge requests with a forwarded header that is not overwritten by the proxy. Therefore, proxies should strip unexpected `Forwarded` or `X-Forwarded-++*++` headers from the client.
11901190

11911191

11921192
ifdef::add-copy-button-to-env-var[]

_versions/3.15/guides/_attributes.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
// Common attributes.
22
// --> No blank lines (it ends the document header)
33
:project-name: Quarkus
4-
:quarkus-version: 3.15.3
4+
:quarkus-version: 3.15.3.1
55
:quarkus-platform-groupid: io.quarkus.platform
66
// .
77
:maven-version: 3.9.8

_versions/3.15/guides/context-propagation.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ them to the client as JSON using xref:rest-json.adoc[Jackson or JSON-B]:
135135
// Create a REST client to the Star Wars API
136136
WebClient client = WebClient.create(vertx,
137137
new WebClientOptions()
138-
.setDefaultHost("swapi.dev")
138+
.setDefaultHost("swapi.tech")
139139
.setDefaultPort(443)
140140
.setSsl(true));
141141
// get the list of Star Wars people, with context capture

_versions/3.15/guides/deploying-to-kubernetes.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -301,7 +301,7 @@ of secret that contains the required credentials. Quarkus can automatically gene
301301
quarkus.kubernetes.generate-image-pull-secret=true
302302
----
303303

304-
More specifically a `Secret`like the one bellow is genrated:
304+
More specifically a `Secret` like the one below is generated:
305305

306306
[source,yaml]
307307
----

_versions/3.15/guides/http-reference.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -554,7 +554,7 @@ quarkus.http.proxy.trusted-proxies=127.0.0.1 <1>
554554
----
555555
<1> Configure trusted proxy with the IP address `127.0.0.1`. Request headers from any other address are going to be ignored.
556556

557-
Both configurations related to standard and non-standard headers can be combined, although the standard headers configuration will have precedence. However, combining them has security implications as clients can forge requests with a forwarded header that is not overwritten by the proxy. Therefore, proxies should strip unexpected `X-Forwarded` or `X-Forwarded-*` headers from the client.
557+
Both configurations related to standard and non-standard headers can be combined, although the standard headers configuration will have precedence. However, combining them has security implications as clients can forge requests with a forwarded header that is not overwritten by the proxy. Therefore, proxies should strip unexpected `Forwarded` or `X-Forwarded-*` headers from the client.
558558

559559
Supported forwarding address headers are:
560560

_versions/3.15/guides/mongodb-panache.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -242,7 +242,7 @@ List<String> namesButEmmanuels = persons
242242
.collect(Collectors.toList());
243243
----
244244

245-
NOTE: A `persistOrUpdate()` method exist that persist or update an entity in the database, it uses the __upsert__ capability of MongoDB to do it in a single query.
245+
NOTE: A `persistOrUpdate()` method persists or updates an entity in the database, it uses the __upsert__ capability of MongoDB to do it in a single query.
246246

247247
=== Adding entity methods
248248

@@ -410,7 +410,7 @@ List<String> namesButEmmanuels = persons
410410
.collect(Collectors.toList());
411411
----
412412

413-
NOTE: A `persistOrUpdate()` method exist that persist or update an entity in the database, it uses the __upsert__ capability of MongoDB to do it in a single query.
413+
NOTE: A `persistOrUpdate()` method persists or updates an entity in the database, it uses the __upsert__ capability of MongoDB to do it in a single query.
414414

415415
NOTE: The rest of the documentation show usages based on the active record pattern only,
416416
but keep in mind that they can be performed with the repository pattern as well.

0 commit comments

Comments
 (0)