This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch camel-master in repository https://gitbox.apache.org/repos/asf/camel-kafka-connector.git
The following commit(s) were added to refs/heads/camel-master by this push: new 34459cb [create-pull-request] automated change 34459cb is described below commit 34459cbb0ba2862268bae8b7bbcee484701139cb Author: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com> AuthorDate: Sun Mar 14 03:35:57 2021 +0000 [create-pull-request] automated change --- .../connectors/camel-aws-secrets-manager-sink.json | 212 +++++++++++++++++++++ 1 file changed, 212 insertions(+) diff --git a/camel-kafka-connector-catalog/src/generated/resources/connectors/camel-aws-secrets-manager-sink.json b/camel-kafka-connector-catalog/src/generated/resources/connectors/camel-aws-secrets-manager-sink.json new file mode 100644 index 0000000..9a52526 --- /dev/null +++ b/camel-kafka-connector-catalog/src/generated/resources/connectors/camel-aws-secrets-manager-sink.json @@ -0,0 +1,212 @@ +{ + "connector": { + "class": "org.apache.camel.kafkaconnector.awssecretsmanager.CamelAwssecretsmanagerSinkConnector", + "artifactId": "camel-aws-secrets-manager-kafka-connector", + "groupId": "org.apache.camel.kafkaconnector", + "id": "camel-aws-secrets-manager-sink", + "type": "sink", + "version": "0.9.0-SNAPSHOT", + "description": "Manage AWS Secrets Manager services using AWS SDK version 2.x." + }, + "properties": { + "camel.sink.path.label": { + "name": "camel.sink.path.label", + "description": "Logical name", + "priority": "HIGH", + "required": "true" + }, + "camel.sink.endpoint.lazyStartProducer": { + "name": "camel.sink.endpoint.lazyStartProducer", + "description": "Whether the producer should be started lazy (on the first message). By starting lazy you can use this to allow CamelContext and routes to startup in situations where a producer may otherwise fail during starting and cause the route to fail being started. By deferring this startup to be lazy then the startup failure can be handled during routing messages via Camel's routing error handlers. Beware that when the first message is processed then creating and starting the pr [...] + "defaultValue": "false", + "priority": "MEDIUM", + "required": "false" + }, + "camel.sink.endpoint.operation": { + "name": "camel.sink.endpoint.operation", + "description": "The operation to perform One of: [listSecrets]", + "priority": "HIGH", + "required": "true", + "enum": [ + "listSecrets" + ] + }, + "camel.sink.endpoint.overrideEndpoint": { + "name": "camel.sink.endpoint.overrideEndpoint", + "description": "Set the need for overidding the endpoint. This option needs to be used in combination with uriEndpointOverride option", + "defaultValue": "false", + "priority": "MEDIUM", + "required": "false" + }, + "camel.sink.endpoint.pojoRequest": { + "name": "camel.sink.endpoint.pojoRequest", + "description": "If we want to use a POJO request as body or not", + "defaultValue": "false", + "priority": "MEDIUM", + "required": "false" + }, + "camel.sink.endpoint.proxyHost": { + "name": "camel.sink.endpoint.proxyHost", + "description": "To define a proxy host when instantiating the Secrets Manager client", + "priority": "MEDIUM", + "required": "false" + }, + "camel.sink.endpoint.proxyPort": { + "name": "camel.sink.endpoint.proxyPort", + "description": "To define a proxy port when instantiating the Secrets Manager client", + "priority": "MEDIUM", + "required": "false" + }, + "camel.sink.endpoint.proxyProtocol": { + "name": "camel.sink.endpoint.proxyProtocol", + "description": "To define a proxy protocol when instantiating the Secrets Manager client One of: [HTTP] [HTTPS]", + "defaultValue": "\"HTTPS\"", + "priority": "MEDIUM", + "required": "false", + "enum": [ + "HTTP", + "HTTPS" + ] + }, + "camel.sink.endpoint.region": { + "name": "camel.sink.endpoint.region", + "description": "The region in which Secrets Manager client needs to work. When using this parameter, the configuration will expect the lowercase name of the region (for example ap-east-1) You'll need to use the name Region.EU_WEST_1.id()", + "priority": "MEDIUM", + "required": "false" + }, + "camel.sink.endpoint.secretsManagerClient": { + "name": "camel.sink.endpoint.secretsManagerClient", + "description": "To use a existing configured AWS Secrets Manager as client", + "priority": "MEDIUM", + "required": "false" + }, + "camel.sink.endpoint.trustAllCertificates": { + "name": "camel.sink.endpoint.trustAllCertificates", + "description": "If we want to trust all certificates in case of overriding the endpoint", + "defaultValue": "false", + "priority": "MEDIUM", + "required": "false" + }, + "camel.sink.endpoint.uriEndpointOverride": { + "name": "camel.sink.endpoint.uriEndpointOverride", + "description": "Set the overriding uri endpoint. This option needs to be used in combination with overrideEndpoint option", + "priority": "MEDIUM", + "required": "false" + }, + "camel.sink.endpoint.accessKey": { + "name": "camel.sink.endpoint.accessKey", + "description": "Amazon AWS Access Key", + "priority": "MEDIUM", + "required": "false" + }, + "camel.sink.endpoint.secretKey": { + "name": "camel.sink.endpoint.secretKey", + "description": "Amazon AWS Secret Key", + "priority": "MEDIUM", + "required": "false" + }, + "camel.component.aws-secrets-manager.configuration": { + "name": "camel.component.aws-secrets-manager.configuration", + "description": "Component configuration", + "priority": "MEDIUM", + "required": "false" + }, + "camel.component.aws-secrets-manager.lazyStartProducer": { + "name": "camel.component.aws-secrets-manager.lazyStartProducer", + "description": "Whether the producer should be started lazy (on the first message). By starting lazy you can use this to allow CamelContext and routes to startup in situations where a producer may otherwise fail during starting and cause the route to fail being started. By deferring this startup to be lazy then the startup failure can be handled during routing messages via Camel's routing error handlers. Beware that when the first message is processed then creating and starting the pr [...] + "defaultValue": "false", + "priority": "MEDIUM", + "required": "false" + }, + "camel.component.aws-secrets-manager.operation": { + "name": "camel.component.aws-secrets-manager.operation", + "description": "The operation to perform One of: [listSecrets]", + "priority": "HIGH", + "required": "true", + "enum": [ + "listSecrets" + ] + }, + "camel.component.aws-secrets-manager.overrideEndpoint": { + "name": "camel.component.aws-secrets-manager.overrideEndpoint", + "description": "Set the need for overidding the endpoint. This option needs to be used in combination with uriEndpointOverride option", + "defaultValue": "false", + "priority": "MEDIUM", + "required": "false" + }, + "camel.component.aws-secrets-manager.pojoRequest": { + "name": "camel.component.aws-secrets-manager.pojoRequest", + "description": "If we want to use a POJO request as body or not", + "defaultValue": "false", + "priority": "MEDIUM", + "required": "false" + }, + "camel.component.aws-secrets-manager.proxyHost": { + "name": "camel.component.aws-secrets-manager.proxyHost", + "description": "To define a proxy host when instantiating the Secrets Manager client", + "priority": "MEDIUM", + "required": "false" + }, + "camel.component.aws-secrets-manager.proxyPort": { + "name": "camel.component.aws-secrets-manager.proxyPort", + "description": "To define a proxy port when instantiating the Secrets Manager client", + "priority": "MEDIUM", + "required": "false" + }, + "camel.component.aws-secrets-manager.proxyProtocol": { + "name": "camel.component.aws-secrets-manager.proxyProtocol", + "description": "To define a proxy protocol when instantiating the Secrets Manager client One of: [HTTP] [HTTPS]", + "defaultValue": "\"HTTPS\"", + "priority": "MEDIUM", + "required": "false", + "enum": [ + "HTTP", + "HTTPS" + ] + }, + "camel.component.aws-secrets-manager.region": { + "name": "camel.component.aws-secrets-manager.region", + "description": "The region in which Secrets Manager client needs to work. When using this parameter, the configuration will expect the lowercase name of the region (for example ap-east-1) You'll need to use the name Region.EU_WEST_1.id()", + "priority": "MEDIUM", + "required": "false" + }, + "camel.component.aws-secrets-manager.secretsManagerClient": { + "name": "camel.component.aws-secrets-manager.secretsManagerClient", + "description": "To use a existing configured AWS Secrets Manager as client", + "priority": "MEDIUM", + "required": "false" + }, + "camel.component.aws-secrets-manager.trustAllCertificates": { + "name": "camel.component.aws-secrets-manager.trustAllCertificates", + "description": "If we want to trust all certificates in case of overriding the endpoint", + "defaultValue": "false", + "priority": "MEDIUM", + "required": "false" + }, + "camel.component.aws-secrets-manager.uriEndpointOverride": { + "name": "camel.component.aws-secrets-manager.uriEndpointOverride", + "description": "Set the overriding uri endpoint. This option needs to be used in combination with overrideEndpoint option", + "priority": "MEDIUM", + "required": "false" + }, + "camel.component.aws-secrets-manager.autowiredEnabled": { + "name": "camel.component.aws-secrets-manager.autowiredEnabled", + "description": "Whether autowiring is enabled. This is used for automatic autowiring options (the option must be marked as autowired) by looking up in the registry to find if there is a single instance of matching type, which then gets configured on the component. This can be used for automatic configuring JDBC data sources, JMS connection factories, AWS Clients, etc.", + "defaultValue": "true", + "priority": "MEDIUM", + "required": "false" + }, + "camel.component.aws-secrets-manager.accessKey": { + "name": "camel.component.aws-secrets-manager.accessKey", + "description": "Amazon AWS Access Key", + "priority": "MEDIUM", + "required": "false" + }, + "camel.component.aws-secrets-manager.secretKey": { + "name": "camel.component.aws-secrets-manager.secretKey", + "description": "Amazon AWS Secret Key", + "priority": "MEDIUM", + "required": "false" + } + } +}