pkalsi97 opened a new pull request, #6441:
URL: https://github.com/apache/camel-k/pull/6441

   This PR improves the JVM trait's CA certificate handling to address the 
issues reported in #6432.
   
   Features:
   - **Multiple CA Certificates Support**: using `ca-certs`, each certificate 
can be imported with a unique alias (`custom-ca-0`, `custom-ca-1`, etc.)
   - **System Truststore Integration**: `ca-cert-use-system-truststore` option 
when enabled copies JDK's default `cacerts` before adding custom certificates
   - **Optional Password**: `ca-cert-password` is now optional, defaults to 
JDK's standard password `changeit` when not specified
   - Added 3 new E2E Test to verify the working 
   
   Fix: 
   - Clarified in API comments that `ca-cert` and `ca-certs` properties expect 
*paths* to mounted files, not secret names
   
   #### Examples
   
   ##### Simple (single cert, default password)
   ```bash
   kamel run MyRoute.java \
     -t mount.configs=secret:my-ca \
     -t jvm.ca-certs=/etc/camel/conf.d/_secrets/my-ca/ca.crt
   ```
   
   ##### Multiple Certificates
   ```bash
   kamel run MyRoute.java \
     -t mount.configs=secret:ca1 \
     -t mount.configs=secret:ca2 \
     -t jvm.ca-certs=/etc/camel/conf.d/_secrets/ca1/ca.crt \
     -t jvm.ca-certs=/etc/camel/conf.d/_secrets/ca2/ca.crt
   ```
   
   ##### With System Truststore (preserve public CAs)
   ```bash
   kamel run MyRoute.java \
     -t mount.configs=secret:my-ca \
     -t jvm.ca-certs=/etc/camel/conf.d/_secrets/my-ca/ca.crt \
     -t jvm.ca-cert-use-system-truststore=true
   ```


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to