This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel.git
The following commit(s) were added to refs/heads/main by this push: new 6425ee66c36 Adding Security Documentation about Azure Key Vault Automatic Camel context reload on secret refresh 6425ee66c36 is described below commit 6425ee66c361b30698a078c51a8bb386078ffdf2 Author: Andrea Cosentino <anco...@gmail.com> AuthorDate: Mon Sep 26 08:04:41 2022 +0200 Adding Security Documentation about Azure Key Vault Automatic Camel context reload on secret refresh --- docs/user-manual/modules/ROOT/pages/security.adoc | 48 +++++++++++++++++++++++ 1 file changed, 48 insertions(+) diff --git a/docs/user-manual/modules/ROOT/pages/security.adoc b/docs/user-manual/modules/ROOT/pages/security.adoc index 0da4acef5ba..2ff7de80c71 100644 --- a/docs/user-manual/modules/ROOT/pages/security.adoc +++ b/docs/user-manual/modules/ROOT/pages/security.adoc @@ -588,3 +588,51 @@ events related to life cycle of the secret. There are only two requirements: - Adding `camel-google-secret-manager` JAR to your Camel application. - Give the service account used permissions to do operation at secret management level (for example accessing the secret payload, or being admin of secret manager service and also have permission over the Pubsub service) + +==== Automatic Camel context reloading on Secret Refresh while using Azure Key Vault + +Being able to reload Camel context on a Secret Refresh, could be done by specifying the usual credentials (the same used for Azure Key Vault Property Function). + +With Environment variables: + +[source,bash] +---- +export $CAMEL_VAULT_AZURE_TENANT_ID=tenantId +export $CAMEL_VAULT_AZURE_CLIENT_ID=clientId +export $CAMEL_VAULT_AZURE_CLIENT_SECRET=clientSecret +export $CAMEL_VAULT_AZURE_VAULT_NAME=vaultName +---- + +or as plain Camel main properties: + +[source,properties] +---- +camel.vault.azure.tenantId = accessKey +camel.vault.azure.clientId = clientId +camel.vault.azure.clientSecret = clientSecret +camel.vault.azure.vaultName = vaultName +---- + +To enable the automatic refresh you'll need additional properties to set: + +[source,properties] +---- +camel.vault.azure.refreshEnabled=true +camel.vault.azure.refreshPeriod=60000 +camel.vault.azure.secrets=Secret +camel.vault.azure.eventhubConnectionString=eventhub_conn_string +camel.vault.azure.blobAccountName=blob_account_name +camel.vault.azure.blobContainerName=blob_container_name +camel.vault.azure.blobAccessKey=blob_access_key +camel.main.context-reload-enabled = true +---- + +where `camel.vault.azure.refreshEnabled` will enable the automatic context reload, `camel.vault.azure.refreshPeriod` is the interval of time between two different checks for update events and `camel.vault.azure.secrets` is a regex representing the secrets we want to track for updates. + +where `camel.vault.azure.eventhubConnectionString` is the eventhub connection string to get notification from, `camel.vault.azure.blobAccountName`, `camel.vault.azure.blobContainerName` and `camel.vault.azure.blobAccessKey` are the Azure Storage Blob parameters for the checkpoint store needed by Azure Eventhub. + +Note that `camel.vault.azure.secrets` is not mandatory: if not specified the task responsible for checking updates events will take into accounts or the properties with an `azure:` prefix. + +The only requirement is adding the camel-azure-key-vault jar to your Camel application. + +