This is an automated email from the ASF dual-hosted git repository.
acosentino pushed a commit to branch camel-master
in repository https://gitbox.apache.org/repos/asf/camel-kafka-connector.git
The following commit(s) were added to refs/heads/camel-master by this push:
new 34459cb [create-pull-request] automated change
34459cb is described below
commit 34459cbb0ba2862268bae8b7bbcee484701139cb
Author: github-actions[bot]
<41898282+github-actions[bot]@users.noreply.github.com>
AuthorDate: Sun Mar 14 03:35:57 2021 +0000
[create-pull-request] automated change
---
.../connectors/camel-aws-secrets-manager-sink.json | 212 +++++++++++++++++++++
1 file changed, 212 insertions(+)
diff --git
a/camel-kafka-connector-catalog/src/generated/resources/connectors/camel-aws-secrets-manager-sink.json
b/camel-kafka-connector-catalog/src/generated/resources/connectors/camel-aws-secrets-manager-sink.json
new file mode 100644
index 0000000..9a52526
--- /dev/null
+++
b/camel-kafka-connector-catalog/src/generated/resources/connectors/camel-aws-secrets-manager-sink.json
@@ -0,0 +1,212 @@
+{
+ "connector": {
+ "class":
"org.apache.camel.kafkaconnector.awssecretsmanager.CamelAwssecretsmanagerSinkConnector",
+ "artifactId": "camel-aws-secrets-manager-kafka-connector",
+ "groupId": "org.apache.camel.kafkaconnector",
+ "id": "camel-aws-secrets-manager-sink",
+ "type": "sink",
+ "version": "0.9.0-SNAPSHOT",
+ "description": "Manage AWS Secrets Manager services using AWS
SDK version 2.x."
+ },
+ "properties": {
+ "camel.sink.path.label": {
+ "name": "camel.sink.path.label",
+ "description": "Logical name",
+ "priority": "HIGH",
+ "required": "true"
+ },
+ "camel.sink.endpoint.lazyStartProducer": {
+ "name": "camel.sink.endpoint.lazyStartProducer",
+ "description": "Whether the producer should be started
lazy (on the first message). By starting lazy you can use this to allow
CamelContext and routes to startup in situations where a producer may otherwise
fail during starting and cause the route to fail being started. By deferring
this startup to be lazy then the startup failure can be handled during routing
messages via Camel's routing error handlers. Beware that when the first message
is processed then creating and starting the pr [...]
+ "defaultValue": "false",
+ "priority": "MEDIUM",
+ "required": "false"
+ },
+ "camel.sink.endpoint.operation": {
+ "name": "camel.sink.endpoint.operation",
+ "description": "The operation to perform One of:
[listSecrets]",
+ "priority": "HIGH",
+ "required": "true",
+ "enum": [
+ "listSecrets"
+ ]
+ },
+ "camel.sink.endpoint.overrideEndpoint": {
+ "name": "camel.sink.endpoint.overrideEndpoint",
+ "description": "Set the need for overidding the
endpoint. This option needs to be used in combination with uriEndpointOverride
option",
+ "defaultValue": "false",
+ "priority": "MEDIUM",
+ "required": "false"
+ },
+ "camel.sink.endpoint.pojoRequest": {
+ "name": "camel.sink.endpoint.pojoRequest",
+ "description": "If we want to use a POJO request as
body or not",
+ "defaultValue": "false",
+ "priority": "MEDIUM",
+ "required": "false"
+ },
+ "camel.sink.endpoint.proxyHost": {
+ "name": "camel.sink.endpoint.proxyHost",
+ "description": "To define a proxy host when
instantiating the Secrets Manager client",
+ "priority": "MEDIUM",
+ "required": "false"
+ },
+ "camel.sink.endpoint.proxyPort": {
+ "name": "camel.sink.endpoint.proxyPort",
+ "description": "To define a proxy port when
instantiating the Secrets Manager client",
+ "priority": "MEDIUM",
+ "required": "false"
+ },
+ "camel.sink.endpoint.proxyProtocol": {
+ "name": "camel.sink.endpoint.proxyProtocol",
+ "description": "To define a proxy protocol when
instantiating the Secrets Manager client One of: [HTTP] [HTTPS]",
+ "defaultValue": "\"HTTPS\"",
+ "priority": "MEDIUM",
+ "required": "false",
+ "enum": [
+ "HTTP",
+ "HTTPS"
+ ]
+ },
+ "camel.sink.endpoint.region": {
+ "name": "camel.sink.endpoint.region",
+ "description": "The region in which Secrets Manager
client needs to work. When using this parameter, the configuration will expect
the lowercase name of the region (for example ap-east-1) You'll need to use the
name Region.EU_WEST_1.id()",
+ "priority": "MEDIUM",
+ "required": "false"
+ },
+ "camel.sink.endpoint.secretsManagerClient": {
+ "name": "camel.sink.endpoint.secretsManagerClient",
+ "description": "To use a existing configured AWS
Secrets Manager as client",
+ "priority": "MEDIUM",
+ "required": "false"
+ },
+ "camel.sink.endpoint.trustAllCertificates": {
+ "name": "camel.sink.endpoint.trustAllCertificates",
+ "description": "If we want to trust all certificates in
case of overriding the endpoint",
+ "defaultValue": "false",
+ "priority": "MEDIUM",
+ "required": "false"
+ },
+ "camel.sink.endpoint.uriEndpointOverride": {
+ "name": "camel.sink.endpoint.uriEndpointOverride",
+ "description": "Set the overriding uri endpoint. This
option needs to be used in combination with overrideEndpoint option",
+ "priority": "MEDIUM",
+ "required": "false"
+ },
+ "camel.sink.endpoint.accessKey": {
+ "name": "camel.sink.endpoint.accessKey",
+ "description": "Amazon AWS Access Key",
+ "priority": "MEDIUM",
+ "required": "false"
+ },
+ "camel.sink.endpoint.secretKey": {
+ "name": "camel.sink.endpoint.secretKey",
+ "description": "Amazon AWS Secret Key",
+ "priority": "MEDIUM",
+ "required": "false"
+ },
+ "camel.component.aws-secrets-manager.configuration": {
+ "name":
"camel.component.aws-secrets-manager.configuration",
+ "description": "Component configuration",
+ "priority": "MEDIUM",
+ "required": "false"
+ },
+ "camel.component.aws-secrets-manager.lazyStartProducer": {
+ "name":
"camel.component.aws-secrets-manager.lazyStartProducer",
+ "description": "Whether the producer should be started
lazy (on the first message). By starting lazy you can use this to allow
CamelContext and routes to startup in situations where a producer may otherwise
fail during starting and cause the route to fail being started. By deferring
this startup to be lazy then the startup failure can be handled during routing
messages via Camel's routing error handlers. Beware that when the first message
is processed then creating and starting the pr [...]
+ "defaultValue": "false",
+ "priority": "MEDIUM",
+ "required": "false"
+ },
+ "camel.component.aws-secrets-manager.operation": {
+ "name": "camel.component.aws-secrets-manager.operation",
+ "description": "The operation to perform One of:
[listSecrets]",
+ "priority": "HIGH",
+ "required": "true",
+ "enum": [
+ "listSecrets"
+ ]
+ },
+ "camel.component.aws-secrets-manager.overrideEndpoint": {
+ "name":
"camel.component.aws-secrets-manager.overrideEndpoint",
+ "description": "Set the need for overidding the
endpoint. This option needs to be used in combination with uriEndpointOverride
option",
+ "defaultValue": "false",
+ "priority": "MEDIUM",
+ "required": "false"
+ },
+ "camel.component.aws-secrets-manager.pojoRequest": {
+ "name":
"camel.component.aws-secrets-manager.pojoRequest",
+ "description": "If we want to use a POJO request as
body or not",
+ "defaultValue": "false",
+ "priority": "MEDIUM",
+ "required": "false"
+ },
+ "camel.component.aws-secrets-manager.proxyHost": {
+ "name": "camel.component.aws-secrets-manager.proxyHost",
+ "description": "To define a proxy host when
instantiating the Secrets Manager client",
+ "priority": "MEDIUM",
+ "required": "false"
+ },
+ "camel.component.aws-secrets-manager.proxyPort": {
+ "name": "camel.component.aws-secrets-manager.proxyPort",
+ "description": "To define a proxy port when
instantiating the Secrets Manager client",
+ "priority": "MEDIUM",
+ "required": "false"
+ },
+ "camel.component.aws-secrets-manager.proxyProtocol": {
+ "name":
"camel.component.aws-secrets-manager.proxyProtocol",
+ "description": "To define a proxy protocol when
instantiating the Secrets Manager client One of: [HTTP] [HTTPS]",
+ "defaultValue": "\"HTTPS\"",
+ "priority": "MEDIUM",
+ "required": "false",
+ "enum": [
+ "HTTP",
+ "HTTPS"
+ ]
+ },
+ "camel.component.aws-secrets-manager.region": {
+ "name": "camel.component.aws-secrets-manager.region",
+ "description": "The region in which Secrets Manager
client needs to work. When using this parameter, the configuration will expect
the lowercase name of the region (for example ap-east-1) You'll need to use the
name Region.EU_WEST_1.id()",
+ "priority": "MEDIUM",
+ "required": "false"
+ },
+ "camel.component.aws-secrets-manager.secretsManagerClient": {
+ "name":
"camel.component.aws-secrets-manager.secretsManagerClient",
+ "description": "To use a existing configured AWS
Secrets Manager as client",
+ "priority": "MEDIUM",
+ "required": "false"
+ },
+ "camel.component.aws-secrets-manager.trustAllCertificates": {
+ "name":
"camel.component.aws-secrets-manager.trustAllCertificates",
+ "description": "If we want to trust all certificates in
case of overriding the endpoint",
+ "defaultValue": "false",
+ "priority": "MEDIUM",
+ "required": "false"
+ },
+ "camel.component.aws-secrets-manager.uriEndpointOverride": {
+ "name":
"camel.component.aws-secrets-manager.uriEndpointOverride",
+ "description": "Set the overriding uri endpoint. This
option needs to be used in combination with overrideEndpoint option",
+ "priority": "MEDIUM",
+ "required": "false"
+ },
+ "camel.component.aws-secrets-manager.autowiredEnabled": {
+ "name":
"camel.component.aws-secrets-manager.autowiredEnabled",
+ "description": "Whether autowiring is enabled. This is
used for automatic autowiring options (the option must be marked as autowired)
by looking up in the registry to find if there is a single instance of matching
type, which then gets configured on the component. This can be used for
automatic configuring JDBC data sources, JMS connection factories, AWS Clients,
etc.",
+ "defaultValue": "true",
+ "priority": "MEDIUM",
+ "required": "false"
+ },
+ "camel.component.aws-secrets-manager.accessKey": {
+ "name": "camel.component.aws-secrets-manager.accessKey",
+ "description": "Amazon AWS Access Key",
+ "priority": "MEDIUM",
+ "required": "false"
+ },
+ "camel.component.aws-secrets-manager.secretKey": {
+ "name": "camel.component.aws-secrets-manager.secretKey",
+ "description": "Amazon AWS Secret Key",
+ "priority": "MEDIUM",
+ "required": "false"
+ }
+ }
+}