-
Notifications
You must be signed in to change notification settings - Fork 2.7k
Migration Guide 2.6
Once upon a time, Quarkus was a young project and we didn't have a lot of infrastructure around it to host extensions. Thus all the extensions created then ended up in the main repository (called Core).
Since then, we have invested a lot in setting up the Quarkiverse Hub infrastructure which allows easy collaboration on extensions that live outside of the Core repository.
The Core repository is very large now and we have started moving extensions outside of it to make it smaller (easier to import in IDEs, faster local builds, shorter CI runs...) and also to lower the barrier to entry to contribute to these extensions: they are in small independent projects, far easier to build and contribute to.
For all these extensions, we put in place relocations so migration should be seamless but in any case you need to adjust your project for the future.
If you are a user of these extensions, have a look at their respective project and don't hesitate to contribute to them and provide feedback.
These moved out extensions are not handled the same and there are three categories.
These extensions are not in the Quarkus Platform BOM anymore and you need to define the version yourself in your build file:
Component | New groupId | Current version | Repository |
---|---|---|---|
Amazon Alexa | io.quarkiverse.amazonalexa | 1.0.0 | https://github.com/quarkiverse/quarkus-amazon-alexa |
- Amazon Alexa
- Artemis
- Hibernate Search ORM Elasticsearch AWS
- JGit
- JSch Logging Sentry Neo4j Tika
Amazon Services
Consul Config Logging Sentry Neo4j Vault
The SQL Server integration was moved to a separate dependency. See https://flywaydb.org/documentation/database/sqlserver#java-usage. SQL Server users need to add the following dependency from now on:
<dependency>
<groupId>org.flywaydb</groupId>
<artifactId>flyway-sqlserver</artifactId>
</dependency>
Deprecated OIDC TokenConfigResolver
and TokenStateManager
methods, quarkus.oidc.authentication.auto-refresh-timeout
property removed
OIDC TokenConfigResolver
methods deprecated in 2.2 and TokenStateManager
methods deprecated in 2.3 have now been removed.
It should have a minimum impact if any at all since only TokenConfigResolver
and TokenStateManager
methods returning Uni
can work without blocking the IO thread and thus should be used in the real world applications.
A long time deprecated quarkus.oidc.authentication.auto-refresh-timeout
property has also been removed - please use a better named quarkus.oidc.authentication.refresh-token-time-skew
from now on.
The way a Vert.x
RoutingContext
can be accessed in the custom OIDC SecurityIdentityAugmentor
s has changed.
If it is required then please access it as a SecurityIdentity
attribute which will be more portable:
import javax.enterprise.context.ApplicationScoped;
import io.quarkus.security.identity.AuthenticationRequestContext;
import io.quarkus.security.identity.SecurityIdentity;
import io.quarkus.security.identity.SecurityIdentityAugmentor;
import io.quarkus.security.runtime.QuarkusSecurityIdentity;
import io.smallrye.mutiny.Uni;
import io.vertx.ext.web.RoutingContext;
@ApplicationScoped
public class CustomOidcSecurityIdentityAugmentor implements SecurityIdentityAugmentor {
@Override
public Uni<SecurityIdentity> augment(SecurityIdentity identity, AuthenticationRequestContext context) {
// Instead of
// IdTokenCredential cred = identity.getCredential(IdTokenCredential.class);
// RoutingContext context = cred.getRoutingContext();
RoutingContext context = identity.getAttribute(RoutingContext.class.getName());
QuarkusSecurityIdentity.Builder builder = QuarkusSecurityIdentity.builder(identity);
// Use RoutingContext as required
return Uni.createFrom().item(builder.build);
}
}
The old way of accessing RoutingContext
as an OIDC IdTokenCredential
or AccessTokenCredential
property prevents the use of OIDC tokens for running the background tasks when no RoutingContext
is available.
The produces
attribute of the @Route
annotation was only used for content negotiation.
Starting Quarkus 2.6, it is also used to indicate how Multi
instances need to be serialized in the HTTP response.
When a route returns a Multi<T>
, it can:
- send the item one by one, without any modification (raw stream)
- wrap the
Multi
as a JSON Array, where each item is sent one by one - produce a server-sent-event stream
- produce JSON (also named ND-JSON) stream
Before Quarkus 2.6, to express the three last possibilities you had to wrap the produced Multi
using ReactiveRoutes.asJsonArray
, ReactiveRoutes.asEventStream
and ReactiveRoutes.asJsonStream
. Unfortunately, this approach does not work when Quarkus security is enabled.
To work around that problem, starting Quarkus 2.6, you can indicate the serialization you need using the produces
attribute of @Route
. If the first value of the produces
array is application/json
, text/event-stream
, application/x-ndjson
(or application/stream+json
), the associated serialization is used.
So, instead of:
- returning
ReactiveRoutes.asJsonArray(multi)
, returnmulti
directly and setproduces="application/json"
- returning
ReactiveRoutes.asEventStream(multi)
, returnmulti
directly and setproduces="text/event-stream"
- returning
ReactiveRoutes.asJsonStream(multi)
, returnmulti
directly and setproduces="application/x-ndjson"
The format of a JSON response produced when a constraint violation occurs was changed in an incompatible way.
If a parameter of a reactive route method violates the rules defined by Bean Validation then an HTTP 400 response is produced.
And if the request accepts the JSON payload then the response should follow the Problem format.
However, prior to version 2.6 the produced JSON included an incorrect property: details
.
The payload now follows the format, i.e. the property is called detail
.
The native image builders ubi-quarkus-native-image
and ubi-quarkus-mandrel
are now based on ubi-micro:8.5 (instead of ubi-micro:8.4).
In addition, both images provide the upx tool which can be used to compress native executable.
gRPC metrics are now handled by the quarkus-micrometer
extension.
gRPC server and clients metrics are automatically enabled when your application depends on the quarkus-micrometer
extension.
In the case you do not want to collect these metrics, you can disable them using:
quarkus.micrometer.binder.grpc-client.enabled=false
quarkus.micrometer.binder.grpc-server.enabled=false
The quarkus.grpc.metrics.enabled
property has no effect anymore.
Global gRPC client interceptors must be annotated with @io.quarkus.grpc.GlobalInterceptor
since 2.6.
Prior to Quarkus 2.6, all the CDI beans implementing io.grpc.ClientInterceptor
were considered global interceptors, i.e. applied to all injected gRPC clients. Since 2.6, it is possible to make a client-specific interceptor, by annotating the injection point of a gRPC client with the @io.quarkus.grpc.RegisterClientInterceptor
annotation.
To avoid having a split package between the smallrye-reactive-messaging-api
and smallrye-reactive-messaging-provider
, the classes from io.smallrye.reactive.messaging
from the smallrye-reactive-messasing-provider
have been moved to io.smallrye.reactive.messaging.provider
. These classes are internal / implementation-specific classes and should not have been used directly.