This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel.git
commit b891e90ece147230971c4d866dd4af68803ee374 Author: Andrea Cosentino <[email protected]> AuthorDate: Thu Jun 15 11:14:37 2023 +0200 CAMEL-19159 - Camel-AWS: Support Profile Credential provider as configuration - AWS EKS Signed-off-by: Andrea Cosentino <[email protected]> --- .../camel-aws2-eks/src/main/docs/aws2-eks-component.adoc | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/components/camel-aws/camel-aws2-eks/src/main/docs/aws2-eks-component.adoc b/components/camel-aws/camel-aws2-eks/src/main/docs/aws2-eks-component.adoc index 3854ff580ac..74f8d350811 100644 --- a/components/camel-aws/camel-aws2-eks/src/main/docs/aws2-eks-component.adoc +++ b/components/camel-aws/camel-aws2-eks/src/main/docs/aws2-eks-component.adoc @@ -57,10 +57,12 @@ the https://aws.amazon.com/eks/[Amazon EKS] service. == Usage -=== Static credentials vs Default Credential Provider +=== Static credentials, Default Credential Provider and Profile Credentials Provider You have the possibility of avoiding the usage of explicit static credentials, by specifying the useDefaultCredentialsProvider option and set it to true. +The order of evaluation for Default Credentials Provider is the following: + - Java system properties - aws.accessKeyId and aws.secretKey - Environment variables - AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY. - Web Identity Token from AWS STS. @@ -68,6 +70,10 @@ You have the possibility of avoiding the usage of explicit static credentials, b - Amazon ECS container credentials - loaded from the Amazon ECS if the environment variable AWS_CONTAINER_CREDENTIALS_RELATIVE_URI is set. - Amazon EC2 Instance profile credentials. +You have also the possibility of using Profile Credentials Provider, by specifying the useProfileCredentialsProvider option to true and profileCredentialsName to the profile name. + +Only one of static, default and profile credentials could be used at the same time. + For more information about this you can look at https://docs.aws.amazon.com/sdk-for-java/latest/developer-guide/credentials.html[AWS credentials documentation] // component headers: START
