This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch 2181-part-4 in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git
commit 889d998576d12e55283bf39e047383affd7c890c Author: Andrea Cosentino <[email protected]> AuthorDate: Wed Aug 7 08:02:34 2024 +0200 AWS Kamelets: Support profile and session credentials provider out of the box - AWS SQS FIFO Sink Signed-off-by: Andrea Cosentino <[email protected]> --- kamelets/aws-sqs-fifo-sink.kamelet.yaml | 33 +++++++++++++++++++++++++++++++-- 1 file changed, 31 insertions(+), 2 deletions(-) diff --git a/kamelets/aws-sqs-fifo-sink.kamelet.yaml b/kamelets/aws-sqs-fifo-sink.kamelet.yaml index 481d00df..6228ce57 100644 --- a/kamelets/aws-sqs-fifo-sink.kamelet.yaml +++ b/kamelets/aws-sqs-fifo-sink.kamelet.yaml @@ -91,6 +91,27 @@ spec: description: Set whether the SQS client should expect to load credentials through a default credentials provider or to expect static credentials to be passed in. type: boolean default: false + useProfileCredentialsProvider: + title: Profile Credentials Provider + description: Set whether the SQS client should expect to load credentials through a profile credentials provider. + type: boolean + default: false + useSessionCredentials: + title: Session Credentials + description: Set whether the SQS client should expect to use Session Credentials. This is useful in situation in which the user needs to assume a IAM role for doing operations in SQS. + type: boolean + default: false + profileCredentialsName: + title: Profile Credentials Name + description: If using a profile credentials provider this parameter will set the profile name. + type: string + sessionToken: + title: Session Token + description: Amazon AWS Session Token used when the user needs to assume a IAM role. + type: string + format: password + x-descriptors: + - urn:camel:group:credentials uriEndpointOverride: title: Overwrite Endpoint URI description: The overriding endpoint URI. To use this option, you must also select the `overrideEndpoint` option. @@ -139,12 +160,16 @@ spec: accessKey: "{{?accessKey}}" secretKey: "{{?secretKey}}" region: "{{region}}" - useDefaultCredentialsProvider: "{{useDefaultCredentialsProvider}}" + useDefaultCredentialsProvider: "{{useDefaultCredentialsProvider}}" + useProfileCredentialsProvider: "{{useProfileCredentialsProvider}}" + useSessionCredentials: "{{useSessionCredentials}}" messageGroupIdStrategy: "usePropertyValue" messageDeduplicationIdStrategy: "useContentBasedDeduplication" amazonAWSHost: "{{?amazonAWSHost}}" protocol: "{{?protocol}}" uriEndpointOverride: "{{?uriEndpointOverride}}" + profileCredentialsName: "{{?profileCredentialsName}}" + sessionToken: "{{?sessionToken}}" overrideEndpoint: "{{overrideEndpoint}}" otherwise: steps: @@ -155,10 +180,14 @@ spec: accessKey: "{{?accessKey}}" secretKey: "{{?secretKey}}" region: "{{region}}" - useDefaultCredentialsProvider: "{{useDefaultCredentialsProvider}}" + useDefaultCredentialsProvider: "{{useDefaultCredentialsProvider}}" + useProfileCredentialsProvider: "{{useProfileCredentialsProvider}}" + useSessionCredentials: "{{useSessionCredentials}}" messageGroupIdStrategy: "usePropertyValue" messageDeduplicationIdStrategy: "useExchangeId" amazonAWSHost: "{{?amazonAWSHost}}" protocol: "{{?protocol}}" uriEndpointOverride: "{{?uriEndpointOverride}}" + profileCredentialsName: "{{?profileCredentialsName}}" + sessionToken: "{{?sessionToken}}" overrideEndpoint: "{{overrideEndpoint}}"
