This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-k.git
commit 28f27846c40f6416efde61631997a7bc95cdc254 Author: Andrea Cosentino <anco...@gmail.com> AuthorDate: Wed Sep 28 17:58:31 2022 +0200 Regen documentation --- docs/modules/traits/pages/aws-secrets-manager.adoc | 2 ++ resources/traits.yaml | 10 ++++++---- 2 files changed, 8 insertions(+), 4 deletions(-) diff --git a/docs/modules/traits/pages/aws-secrets-manager.adoc b/docs/modules/traits/pages/aws-secrets-manager.adoc index 5bc3150a4..b0b894d65 100644 --- a/docs/modules/traits/pages/aws-secrets-manager.adoc +++ b/docs/modules/traits/pages/aws-secrets-manager.adoc @@ -5,6 +5,8 @@ The Secrets Manager trait can be used to use secrets from AWS Secrets Manager The AWS Secrets Manager trait is disabled by default. +For more information about how to use secrets from AWS Secrets Manager take a look at the components docs: xref:components::aws-secrets-manager-component.adoc[AWS Secrets Manager component] + A sample execution of this trait, would require the following trait options: -t aws-secrets-manager.enabled=true -t aws-secrets-manager.access-key="aws-access-key" -t aws-secrets-manager.secret-key="aws-secret-key" -t aws-secrets-manager.region="aws-region" diff --git a/resources/traits.yaml b/resources/traits.yaml index 751f053a9..3cee61d7e 100755 --- a/resources/traits.yaml +++ b/resources/traits.yaml @@ -72,10 +72,12 @@ traits: - Knative - OpenShift description: 'The Secrets Manager trait can be used to use secrets from AWS Secrets - Manager The AWS Secrets Manager trait is disabled by default. A sample execution - of this trait, would require the following trait options: -t aws-secrets-manager.enabled=true - -t aws-secrets-manager.access-key="aws-access-key" -t aws-secrets-manager.secret-key="aws-secret-key" - -t aws-secrets-manager.region="aws-region"' + Manager The AWS Secrets Manager trait is disabled by default. For more information + about how to use secrets from AWS Secrets Manager take a look at the components + docs: xref:components::aws-secrets-manager-component.adoc[AWS Secrets Manager + component] A sample execution of this trait, would require the following trait + options: -t aws-secrets-manager.enabled=true -t aws-secrets-manager.access-key="aws-access-key" + -t aws-secrets-manager.secret-key="aws-secret-key" -t aws-secrets-manager.region="aws-region"' properties: - name: enabled type: bool