This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch 1915 in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git
commit d2e70ff5806e34d87036654632cae881d097f7a5 Author: Andrea Cosentino <anco...@gmail.com> AuthorDate: Fri Feb 23 10:56:31 2024 +0100 Added a Kafka Apicurio Source secured with Keycloak Kamelet Signed-off-by: Andrea Cosentino <anco...@gmail.com> --- ...t-secured-apicurio-registry-source.kamelet.yaml | 182 +++++++++++++++++++++ 1 file changed, 182 insertions(+) diff --git a/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml b/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml new file mode 100644 index 00000000..bbea5e40 --- /dev/null +++ b/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml @@ -0,0 +1,182 @@ +# --------------------------------------------------------------------------- +# Licensed to the Apache Software Foundation (ASF) under one or more +# contributor license agreements. See the NOTICE file distributed with +# this work for additional information regarding copyright ownership. +# The ASF licenses this file to You under the Apache License, Version 2.0 +# (the "License"); you may not use this file except in compliance with +# the License. You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# --------------------------------------------------------------------------- +apiVersion: camel.apache.org/v1 +kind: Kamelet +metadata: + name: kafka-not-secured-apicurio-registry-source + annotations: + camel.apache.org/kamelet.support.level: "Preview" + camel.apache.org/catalog.version: "4.4.0" + camel.apache.org/kamelet.icon: "data:image/svg+xml;base64,PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0idXRmLTgiPz4NCjwhLS0gR2VuZXJhdG9yOiBBZG9iZSBJbGx1c3RyYXRvciAxOS4wLjAsIFNWRyBFeHBvcnQgUGx1Zy1JbiAuIFNWRyBWZXJzaW9uOiA2LjAwIEJ1aWxkIDApICAtLT4NCjxzdmcgdmVyc2lvbj0iMS4xIiBpZD0iTGF5ZXJfMSIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxuczp4bGluaz0iaHR0cDovL3d3dy53My5vcmcvMTk5OS94bGluayIgeD0iMHB4IiB5PSIwcHgiDQoJIHZpZXdCb3g9IjAgMCA1MDAgNTAwIiBzdHlsZT0iZW5hYmxlLWJhY2tncm91bmQ6bmV3IDAgMCA1MD [...] + camel.apache.org/provider: "Apache Software Foundation" + camel.apache.org/kamelet.group: "Kafka" + camel.apache.org/kamelet.namespace: "Kafka" + camel.apache.org/keda.type: "kafka" + labels: + camel.apache.org/kamelet.type: "source" +spec: + definition: + title: "Kafka not secured with Apicurio Registry secured with Keycloak Source" + description: |- + Receive data from Kafka topics on an insecure broker combined with Apicurio Registry secured with Keycloak. + required: + - topic + - bootstrapServers + - apicurioRegistryUrl + - apicurioAuthServiceUrl + - apicurioAuthRealm + - apicurioAuthClientId + - apicurioAuthClientSecret + - apicurioAuthUsername + - apicurioAuthPassword + type: object + properties: + topic: + title: Topic Names + description: Comma separated list of Kafka topic names + type: string + x-descriptors: + - urn:keda:metadata:topic + - urn:keda:required + bootstrapServers: + title: Bootstrap Servers + description: Comma separated list of Kafka Broker URLs + type: string + x-descriptors: + - urn:keda:metadata:bootstrapServers + - urn:keda:required + autoCommitEnable: + title: Auto Commit Enable + description: If true, periodically commit to ZooKeeper the offset of messages already fetched by the consumer + type: boolean + default: true + allowManualCommit: + title: Allow Manual Commit + description: Whether to allow doing manual commits + type: boolean + default: false + pollOnError: + title: Poll On Error Behavior + description: What to do if kafka threw an exception while polling for new messages. There are 5 enums and the value can be one of DISCARD, ERROR_HANDLER, RECONNECT, RETRY, STOP + type: string + default: "ERROR_HANDLER" + autoOffsetReset: + title: Auto Offset Reset + description: What to do when there is no initial offset. There are 3 enums and the value can be one of latest, earliest, none + type: string + default: "latest" + x-descriptors: + - urn:keda:metadata:offsetResetPolicy + consumerGroup: + title: Consumer Group + description: A string that uniquely identifies the group of consumers to which this source belongs + type: string + example: "my-group-id" + x-descriptors: + - urn:keda:metadata:consumerGroup + - urn:keda:required + deserializeHeaders: + title: Automatically Deserialize Headers + description: When enabled the Kamelet source will deserialize all message headers to String representation. + type: boolean + default: true + valueDeserializer: + title: Value Deserializer + description: Deserializer class for value that implements the Deserializer interface. + type: string + default: "io.apicurio.registry.serde.avro.AvroKafkaDeserializer" + apicurioRegistryUrl: + title: Apicurio Registry URL + description: The Apicurio Schema Registry URL + type: string + x-descriptors: + - urn:keda:metadata:bootstrapServers + - urn:keda:required + avroDatumProvider: + title: Avro Datum Provider + description: How to read data with Avro + type: string + default: "io.apicurio.registry.serde.avro.ReflectAvroDatumProvider" + apicurioAuthServiceUrl: + title: Apicurio Registry Auth Service URL + description: The URL for Keycloak instance securing the Apicurio Registry + type: string + example: "http://my-keycloak.com:8080/" + apicurioAuthRealm: + title: Apicurio Registry Auth Realm + description: The Realm in Keycloak instance securing the Apicurio Registry + type: string + apicurioAuthClientId: + title: Apicurio Registry Auth Client ID + description: The Client ID in Keycloak instance securing the Apicurio Registry + type: string + apicurioAuthClientSecret: + title: Apicurio Registry Auth Client Secret + description: The Client Secret in Keycloak instance securing the Apicurio Registry + type: string + format: password + x-descriptors: + - urn:camel:group:credentials + - urn:keda:authentication:password + - urn:keda:required + apicurioAuthUsername: + title: Apicurio Registry Auth Username + description: The Username in Keycloak instance securing the Apicurio Registry + type: string + apicurioAuthPassword: + title: Apicurio Registry Auth Password + description: The Password in Keycloak instance securing the Apicurio Registry + type: string + format: password + x-descriptors: + - urn:camel:group:credentials + - urn:keda:authentication:password + - urn:keda:required + dependencies: + - "mvn:org.apache.camel.kamelets:camel-kamelets-utils:4.4.0" + - "camel:kafka" + - "camel:core" + - "camel:kamelet" + - "mvn:io.quarkus:quarkus-apicurio-registry-avro:3.6.3" + template: + beans: + - name: kafkaHeaderDeserializer + type: "#class:org.apache.camel.kamelets.utils.serialization.kafka.KafkaHeaderDeserializer" + properties: + enabled: '{{deserializeHeaders}}' + from: + uri: "kafka:{{topic}}" + parameters: + brokers: "{{bootstrapServers}}" + autoCommitEnable: "{{autoCommitEnable}}" + allowManualCommit: "{{allowManualCommit}}" + pollOnError: "{{pollOnError}}" + autoOffsetReset: "{{autoOffsetReset}}" + groupId: "{{?consumerGroup}}" + valueDeserializer: "{{valueDeserializer}}" + additionalProperties.apicurio.registry.url: "{{apicurioRegistryUrl}}" + additionalProperties.apicurio.registry.avro-datum-provider: "{{avroDatumProvider}}" + additionalProperties.apicurio.auth.service.url: "{{apicurioAuthServiceUrl}}" + additionalProperties.apicurio.auth.realm: "{{apicurioAuthRealm}}" + additionalProperties.apicurio.auth.client.id: "{{apicurioAuthClientId}}" + additionalProperties.apicurio.auth.client.secret: "{{apicurioAuthClientSecret}}" + additionalProperties.apicurio.auth.username: "{{apicurioAuthUsername}}" + additionalProperties.apicurio.auth.password: "{{apicurioAuthPassword}}" + steps: + - process: + ref: "{{kafkaHeaderDeserializer}}" + - to: "kamelet:sink"