Skip to content

Commit 72d2b86

Browse files
committed
Remove a duplicated line in the TLS registry guide
1 parent e9af5d0 commit 72d2b86

File tree

1 file changed

+16
-17
lines changed

1 file changed

+16
-17
lines changed

docs/src/main/asciidoc/tls-registry-reference.adoc

Lines changed: 16 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -195,15 +195,15 @@ This setting is important when using SNI, because it uses the first specified pa
195195
PKCS12 keystores are single files that contain the certificate and the private key.
196196

197197
To configure a PKCS12 keystore:
198-
198+
199199
[source,properties]
200200
----
201201
quarkus.tls.key-store.p12.path=server-keystore.p12
202202
quarkus.tls.key-store.p12.password=secret
203203
----
204-
204+
205205
`.p12` files are password-protected, so you need to provide the password to open the keystore.
206-
206+
207207
These files can include more than one certificate and private key.
208208
If this is the case, take either of the following actions:
209209

@@ -239,11 +239,11 @@ To configure a JKS keystore:
239239
quarkus.tls.key-store.jks.path=server-keystore.jks
240240
quarkus.tls.key-store.jks.password=secret
241241
----
242-
242+
243243
`.jks` files are password-protected, so you need to provide the password to open the keystore.
244244
Also, they can include more than one certificate and private key.
245245
If this is the case:
246-
246+
247247
* Provide and configure the alias of the certificate and the private key you want to use:
248248
+
249249
[source,properties]
@@ -264,12 +264,12 @@ Server Name Indication (SNI) is a TLS extension that makes it possible for a cli
264264
SNI enables a server to present different TLS certificates for multiple domains on a single IP address, which facilitates secure communication for virtual hosting scenarios.
265265

266266
To enable SNI:
267-
267+
268268
[source,properties]
269269
----
270270
quarkus.tls.key-store.sni=true # Disabled by default
271271
----
272-
272+
273273
With SNI enabled, the client indicates the server name during the TLS handshake, which allows the server to select the appropriate certificate:
274274

275275
* When configuring the keystore with PEM files, multiple certificate (CRT) and key files must be provided.
@@ -337,7 +337,7 @@ quarkus.tls.trust-store.p12.path=client-truststore.p12
337337
quarkus.tls.trust-store.p12.password=password
338338
quarkus.tls.trust-store.p12.alias=my-alias
339339
----
340-
340+
341341
`.p12` files are password-protected, so you need to provide the password to open the truststore.
342342
However, unlike keystores, the alias does not require a password because it contains a public certificate, not a private key.
343343

@@ -355,7 +355,7 @@ quarkus.tls.trust-store.jks.path=client-truststore.jks
355355
quarkus.tls.trust-store.jks.password=password
356356
quarkus.tls.trust-store.jks.alias=my-alias
357357
----
358-
358+
359359
`.jks` files are password-protected, so you need to provide the password to open the truststore.
360360
However, unlike keystores, the alias does not require a password because it contains a public certificate, not a private key.
361361

@@ -379,7 +379,7 @@ quarkus.tls.trust-store.credentials-provider.bean-name=my-credentials-provider
379379
# The key used to retrieve the truststore password, `password` by default
380380
quarkus.tls.trust-store.credentials-provider.password-key=password
381381
----
382-
382+
383383
IMPORTANT: The credential provider can only be used with PKCS12 and JKS truststores.
384384

385385
=== Other properties
@@ -509,7 +509,7 @@ While extensions automatically use the TLS registry, you can also access the TLS
509509

510510
To access the TLS configuration, inject the `TlsConfigurationRegistry` bean.
511511
You can retrieve a named TLS configuration by calling `get("<NAME>")` or the default configuration by calling `getDefault()`.
512-
512+
513513
[source,java]
514514
----
515515
@Inject
@@ -519,7 +519,7 @@ TlsConfiguration def = certificates.getDefault().orElseThrow();
519519
TlsConfiguration named = certificates.get("name").orElseThrow();
520520
//...
521521
----
522-
522+
523523
The `TlsConfiguration` object contains the keystores, truststores, cipher suites, protocols, and other properties.
524524
It also provides a way to create an `SSLContext` from the configuration.
525525

@@ -538,9 +538,9 @@ To register a certificate in the TLS registry by using the extension, the _proce
538538
TlsCertificateBuildItem item = new TlsCertificateBuildItem("named",
539539
new MyCertificateSupplier());
540540
----
541-
541+
542542
The certificate supplier is a runtime object generally retrieved by using a recorder method.
543-
543+
544544
.An example of a certificate supplier:
545545
[source,java]
546546
----
@@ -768,7 +768,6 @@ The generated secret includes the following files:
768768

769769
== Working with OpenShift serving certificates
770770

771-
When running your application in OpenShift, you can use the link:https://docs.openshift.com/container-platform/4.16/security/certificates/service-serving-certificate.html[OpenShift serving certificates] to generate and renew TLS certificates automatically.
772771
When running your application in OpenShift, you can use the link:https://docs.openshift.com/container-platform/4.16/security/certificates/service-serving-certificate.html[OpenShift serving certificates] to generate and renew TLS certificates automatically.
773772
The Quarkus TLS registry can use these certificates and Certificate Authority (CA) files to handle HTTPS traffic and validate certificates securely.
774773

@@ -876,7 +875,7 @@ Ensure that the path matches the one used in the configuration (here `/etc/tls`)
876875
. Deploy your application to use the certificate generated by OpenShift.
877876
This will make the service available over HTTPS.
878877

879-
[NOTE]
878+
[NOTE]
880879
====
881880
By setting the `quarkus.tls.key-store.pem.acme.cert` and `quarkus.tls.key-store.pem.acme.key` variables or their environment variable variant, the TLS registry will use the certificate and private key from the secret.
882881
@@ -1148,7 +1147,7 @@ Even if the Quarkus Development CA is installed, you can generate a self-signed
11481147
----
11491148
quarkus tls generate-certificate --name my-cert --self-signed
11501149
----
1151-
1150+
11521151
This generates a self-signed certificate that the Quarkus Development CA does not sign.
11531152

11541153
=== Uninstalling the Quarkus Development CA

0 commit comments

Comments
 (0)