Skip to content

Commit f2ac4f7

Browse files
committed
Fixed a bunch of ENV vars in the docs
1 parent 0589e9c commit f2ac4f7

6 files changed

+48
-51
lines changed

docs/modules/ROOT/partials/getting-started/proc-configuring-kafka-oauth.adoc

+3-3
Original file line numberDiff line numberDiff line change
@@ -28,13 +28,13 @@ When you set these environment variables, the Kafka producer and consumer applic
2828
| `APICURIO_KAFKASQL_SECURITY_SASL_ENABLED`
2929
| Enables SASL OAuth authentication for {registry} storage in Kafka. You must set this variable to `true` for the other variables to have effect.
3030
| `false`
31-
| `APICURIO_KAFKASQL_SECURITY_SASL_CLIENT_IDapicurio.kafkasql.security.sasl.client-id`
31+
| `APICURIO_KAFKASQL_SECURITY_SASL_CLIENT-ID`
3232
| The client ID used to authenticate to Kafka.
3333
| `-`
34-
| `APICURIO_KAFKASQL_SECURITY_SASL_CLIENT_SECRET`
34+
| `APICURIO_KAFKASQL_SECURITY_SASL_CLIENT-SECRET`
3535
| The client secret used to authenticate to Kafka.
3636
| `-`
37-
| `APICURIO_KAFKASQL_SECURITY_SASL_TOKEN_ENDPOINT`
37+
| `APICURIO_KAFKASQL_SECURITY_SASL_TOKEN-ENDPOINT`
3838
| The URL of the OAuth identity server.
3939
| `\http://localhost:8090`
4040
|===

docs/modules/ROOT/partials/getting-started/proc-configuring-registry-security-azure.adoc

+7-10
Original file line numberDiff line numberDiff line change
@@ -45,13 +45,13 @@ IMPORTANT: You must register your {registry} application host as a *Redirect URI
4545
|Environment variable
4646
|Description
4747
|Setting
48-
|`QUARKUS_OIDC_CLIENT_ID`
48+
|`QUARKUS_OIDC_CLIENT-ID`
4949
|The client application ID for the {registry} REST API
5050
|Your Azure AD Application (client) ID obtained in step 5. For example: `123456a7-b8c9-012d-e3f4-5fg67h8i901`
51-
|`APICURIO_UI_AUTH_OIDC_CLIENT_ID`
51+
|`APICURIO_UI_AUTH_OIDC_CLIENT-ID`
5252
|The client application ID for the {registry} web console.
5353
|Your Azure AD Application (client) ID obtained in step 5. For example: `123456a7-b8c9-012d-e3f4-5fg67h8i901`
54-
|`QUARKUS_OIDC_AUTH_SERVER_URL`
54+
|`QUARKUS_OIDC_AUTH-SERVER-URL`
5555
|The URL for authentication in Azure AD.
5656
|Your Azure AD Application (tenant) ID obtained in step 6. For example: `\https://login.microsoftonline.com/1a2bc34d-567e-89f1-g0hi-1j2kl3m4no56/v2.0`.
5757
|===
@@ -64,22 +64,19 @@ IMPORTANT: You must register your {registry} application host as a *Redirect URI
6464
|Environment variable
6565
|Description
6666
|Setting
67-
|`QUARKUS_OIDC_TENANT_ENABLED`
67+
|`QUARKUS_OIDC_TENANT-ENABLED`
6868
|Enables authentication for {registry}.
6969
|`true`
70-
|`APICURIO_UI_AUTH_TYPE`
71-
|The {registry} authentication type.
72-
|`oidc`
7370
|`QUARKUS_HTTP_CORS_ORIGINS`
7471
|The host for your {registry} deployment for cross-origin resource sharing (CORS).
7572
|For example: `\https://test-registry.com`
76-
|`APICURIO_UI_AUTH_OIDC_REDIRECT_URI`
73+
|`APICURIO_UI_AUTH_OIDC_REDIRECT-URI`
7774
|The host for your {registry} web console.
7875
|For example: `\https://test-registry.com/ui`
79-
|`APICURIO_AUTH_ROLE_BASED_AUTHORIZATION`
76+
|`APICURIO_AUTH_ROLE-BASED-AUTHORIZATION`
8077
|Enables role-based authorization in {registry}.
8178
|`true`
82-
|`QUARKUS_OIDC_ROLES_ROLE_CLAIM_PATH`
79+
|`QUARKUS_OIDC_ROLES_ROLE-CLAIM-PATH`
8380
|The name of the claim in which Azure AD stores roles.
8481
|`roles`
8582
|===

docs/modules/ROOT/partials/getting-started/proc-configuring-registry-security-keycloak.adoc

+4-4
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ You can use the defaults for the other client settings.
8181
|The client ID for the {registry} REST API.
8282
|String
8383
|`registry-api`
84-
|`APICURIO_UI_AUTH_OIDC_CLIENT_ID`
84+
|`APICURIO_UI_AUTH_OIDC_CLIENT-ID`
8585
|The client ID for the {registry} web console.
8686
|String
8787
|`apicurio-registry`
@@ -98,7 +98,7 @@ TIP: For an example of setting environment variables on OpenShift, see xref:conf
9898
|Java system property
9999
|Type
100100
|Default value
101-
|`APICURIO_AUTH_ROLE_BASED_AUTHORIZATION`
101+
|`APICURIO_AUTH_ROLE-BASED-AUTHORIZATION`
102102
|`apicurio.auth.role-based-authorization`
103103
|Boolean
104104
|`false`
@@ -140,8 +140,8 @@ TIP: For an example of setting environment variables on OpenShift, see xref:conf
140140
|Java system property
141141
|Type
142142
|Default value
143-
|`APICURIO_AUTH_OWNER_ONLY_AUTHORIZATION`
144-
|`apicurio.auth.owner-only-authorization`
143+
|`APICURIO_AUTH_OWNER-ONLY-AUTHORIZATION_LIMIT-GROUP-ACCESS`
144+
|`apicurio.auth.owner-only-authorization.limit-group-access`
145145
|Boolean
146146
|`false`
147147
|===

docs/modules/ROOT/partials/getting-started/ref-registry-config-migration.adoc

+2-2
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
{registry} v3 has simplified the configuration options, removing duplicates and improving consistency.
55
For most options, the only change is ssrenaming of the prefix from `registry` to `apicurio`, for example, changing `registry.kafkasql.bootstrap.servers` to `apicurio.kafkasql.bootstrap.servers`.
66

7-
NOTE: For each configuration property you can override the value by using the corresponding environment variable, for example, `APICURIO_KAFKA_SQL_BOOTSTRAP_SERVERS`.s
7+
NOTE: For each configuration property you can override the value by using the corresponding environment variable, for example, `APICURIO_KAFKASQL_BOOTSTRAP_SERVERS`.s
88

99
== api
1010
.api configuration options
@@ -282,4 +282,4 @@ NOTE: For each configuration property you can override the value by using the co
282282
|`apicurio.ui.features.read-only.enabled`
283283
|`registry.ui.features.settings`
284284
|`apicurio.ui.features.settings`
285-
|===
285+
|===

docs/modules/ROOT/partials/getting-started/ref-registry-kafka-topic-names.adoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ The default Kafka topic name that {registry} uses to store data is `kafkasql-jou
1616
| `APICURIO_KAFKASQL_TOPIC`
1717
| `apicurio.kafkasql.topic`
1818
| `kafkasql-journal`
19-
| `APICURIO_KAFKASQL_TOPIC_AUTO_CREATE`
19+
| `APICURIO_KAFKASQL_TOPIC_AUTO-CREATE`
2020
| `apicurio.kafkasql.topic.auto-create`
2121
| `true`
2222
|===

docs/modules/ROOT/partials/getting-started/ref-registry-security-configuration.adoc

+31-31
Original file line numberDiff line numberDiff line change
@@ -36,19 +36,19 @@ You can set the following environment variables to configure authentication for
3636
|Description
3737
|Type
3838
|Default
39-
|`QUARKUS_OIDC_TENANT_ENABLED`
39+
|`QUARKUS_OIDC_TENANT-ENABLED`
4040
|Enables authentication for {registry}. When set to `true`, the environment variables that follow are required for authentication using {keycloak}.
4141
|String
4242
|`false`
43-
|`QUARKUS_OIDC_AUTH_SERVER_URL`
43+
|`QUARKUS_OIDC_AUTH-SERVER-URL`
4444
|The URL of the {keycloak} authentication server. For example, `\http://localhost:8080`.
4545
|String
4646
|-
47-
|`QUARKUS_OIDC_CLIENT_ID`
47+
|`QUARKUS_OIDC_CLIENT-ID`
4848
|The client ID for the {registry} REST API.
4949
|String
5050
|`registry-api`
51-
|`APICURIO_UI_AUTH_OIDC_CLIENT_ID`
51+
|`APICURIO_UI_AUTH_OIDC_CLIENT-ID`
5252
|The client ID for the {registry} web console.
5353
|String
5454
|`apicurio-registry`
@@ -63,7 +63,7 @@ You can set the following environment variables to configure authentication for
6363
|String
6464
|-
6565

66-
|`ROLE_BASED_AUTHZ_ENABLED`
66+
|`APICURIO_AUTH_ROLE-BASED-AUTHORIZATION`
6767
|Enables or disables role-based authorization.
6868
|Boolean
6969
|False
@@ -83,12 +83,12 @@ By default, {registry} supports authentication by using OpenID Connect. Users or
8383
|Java system property
8484
|Type
8585
|Default value
86-
|`QUARKUS_OIDC_TENANT_ENABLED`
87-
|`apicurio.auth.enabled`
86+
|`QUARKUS_OIDC_TENANT-ENABLED`
87+
|`quarkus.oidc.tenant-enabled`
8888
|Boolean
8989
|`false`
90-
|`CLIENT_CREDENTIALS_BASIC_ENABLED`
91-
|`apicurio.auth.basic-auth-client-credentials.enabled`
90+
|`APICURIO_AUTHN_BASIC-CLIENT-CREDENTIALS.ENABLED`
91+
|`apicurio.authn.basic-client-credentials.enabled`
9292
|Boolean
9393
|`false`
9494
|===
@@ -107,8 +107,8 @@ When using {keycloak}, it is best to set this configuration to your {keycloak} J
107107
|Java system property
108108
|Type
109109
|Default value
110-
|`CLIENT_CREDENTIALS_BASIC_CACHE_EXPIRATION`
111-
|`apicurio.auth.basic-auth-client-credentials.cache-expiration`
110+
|`APICURIO_AUTHN_BASIC-CLIENT-CREDENTIALS_CACHE-EXPIRATION`
111+
|`apicurio.authn.basic-client-credentials.cache-expiration`
112112
|Integer
113113
|`10`
114114
|===
@@ -127,11 +127,11 @@ You can set the following options to `true` to enable role-based authorization i
127127
|Java system property
128128
|Type
129129
|Default value
130-
|`QUARKUS_OIDC_TENANT_ENABLED`
131-
|`apicurio.auth.enabled`
130+
|`QUARKUS_OIDC_TENANT-ENABLED`
131+
|`quarkus.oidc.tenant-enabled`
132132
|Boolean
133133
|`false`
134-
|`APICURIO_AUTH_ROLE_BASED_AUTHORIZATION`
134+
|`APICURIO_AUTH_ROLE-BASED-AUTHORIZATION`
135135
|`apicurio.auth.role-based-authorization`
136136
|Boolean
137137
|`false`
@@ -152,7 +152,7 @@ To enable using roles assigned by {keycloak}, set the following environment vari
152152
|Description
153153
|Type
154154
|Default
155-
|`ROLE_BASED_AUTHZ_SOURCE`
155+
|`APICURIO_AUTH_ROLE-SOURCE`
156156
| When set to `token`, user roles are taken from the authentication token.
157157
|String
158158
|`token`
@@ -210,7 +210,7 @@ To enable using roles managed internally by {registry}, set the following enviro
210210
|Description
211211
|Type
212212
|Default
213-
|`ROLE_BASED_AUTHZ_SOURCE`
213+
|`APICURIO_AUTH_ROLE-SOURCE`
214214
| When set to `application`, user roles are managed internally by {registry}.
215215
|String
216216
|`token`
@@ -235,27 +235,27 @@ Because there are no default admin users in {registry}, it is usually helpful to
235235
|Description
236236
|Type
237237
|Default
238-
|`APICURIO_AUTH_ADMIN_OVERRIDE_ENABLED`
238+
|`APICURIO_AUTH_ADMIN-OVERRIDE_ENABLED`
239239
| Enables the admin-override feature.
240240
|String
241241
|`false`
242-
|`APICURIO_AUTH_ADMIN_OVERRIDE_FROM`
242+
|`APICURIO_AUTH_ADMIN-OVERRIDE_FROM`
243243
|Where to look for admin-override information. Only `token` is currently supported.
244244
|String
245245
|`token`
246-
|`APICURIO_AUTH_ADMIN_OVERRIDE_TYPE`
246+
|`APICURIO_AUTH_ADMIN-OVERRIDE_TYPE`
247247
|The type of information used to determine if a user is an admin. Values depend on the value of the FROM variable, for example, `role` or `claim` when FROM is `token`.
248248
|String
249249
|`role`
250-
|`APICURIO_AUTH_ADMIN_OVERRIDE_ROLE`
250+
|`APICURIO_AUTH_ADMIN-OVERRIDE_ROLE`
251251
|The name of the role that indicates a user is an admin.
252252
|String
253253
|`sr-admin`
254-
|`APICURIO_AUTH_ADMIN_OVERRIDE_CLAIM`
254+
|`APICURIO_AUTH_ADMIN-OVERRIDE_CLAIM`
255255
|The name of a JWT token claim to use for determining admin-override.
256256
|String
257257
|`org-admin`
258-
|`APICURIO_AUTH_ADMIN_OVERRIDE_CLAIM_VALUE`
258+
|`APICURIO_AUTH_ADMIN-OVERRIDE_CLAIM-VALUE`
259259
|The value that the JWT token claim indicated by the CLAIM variable must be for the user to be granted admin-override.
260260
|String
261261
|`true`
@@ -280,16 +280,16 @@ You can set the following options to `true` to enable owner-only authorization f
280280
|Default value
281281

282282
|`QUARKUS_OIDC_TENANT_ENABLED`
283-
|`apicurio.auth.enabled`
283+
|`quarkus.oidc.tenant-enabled`
284284
|Boolean
285285
|`false`
286286

287-
|`APICURIO_AUTH_OBAC_ENABLED`
287+
|`APICURIO_AUTH_OWNER-ONLY-AUTHORIZATION`
288288
|`apicurio.auth.owner-only-authorization`
289289
|Boolean
290290
|`false`
291291

292-
|`APICURIO_AUTH_OBAC_LIMIT_GROUP_ACCESS`
292+
|`APICURIO_AUTH_OWNER-ONLY-AUTHORIZATION_LIMIT-GROUP-ACCESS`
293293
|`apicurio.auth.owner-only-authorization.limit-group-access`
294294
|Boolean
295295
|`false`
@@ -314,11 +314,11 @@ To enable authenticated read access, you must first enable role-based authorizat
314314
|Java system property
315315
|Type
316316
|Default value
317-
|`QUARKUS_OIDC_TENANT_ENABLED`
318-
|`apicurio.auth.enabled`
317+
|`QUARKUS_OIDC_TENANT-ENABLED`
318+
|`quarkus.oidc.tenant-enabled`
319319
|Boolean
320320
|`false`
321-
|`APICURIO_AUTH_AUTHENTICATED_READS_ENABLED`
321+
|`APICURIO_AUTH_AUTHENTICATED-READ-ACCESS_ENABLED`
322322
|`apicurio.auth.authenticated-read-access.enabled`
323323
|Boolean
324324
|`false`
@@ -343,11 +343,11 @@ calls to the REST API, set the following options to `true`:
343343
|Java system property
344344
|Type
345345
|Default value
346-
|`QUARKUS_OIDC_TENANT_ENABLED`
347-
|`apicurio.auth.enabled`
346+
|`QUARKUS_OIDC_TENANT-ENABLED`
347+
|`quarkus.oidc.tenant-enabled`
348348
|Boolean
349349
|`false`
350-
|`APICURIO_AUTH_ANONYMOUS_READ_ACCESS_ENABLED`
350+
|`APICURIO_AUTH_ANONYMOUS-READ-ACCESS_ENABLED`
351351
|`apicurio.auth.anonymous-read-access.enabled`
352352
|Boolean
353353
|`false`

0 commit comments

Comments
 (0)