This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch 2131-part-1 in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git
commit 6bd21e5f8a12125801761d8e92bd9a7a99ef6ddd Author: Andrea Cosentino <anco...@gmail.com> AuthorDate: Mon Aug 5 14:55:25 2024 +0200 AWS Kamelets: Support profile and session credentials provider out of the box - Cloudwatch Signed-off-by: Andrea Cosentino <anco...@gmail.com> --- .../kamelets/aws-cloudwatch-sink.kamelet.yaml | 27 +++++++++++++++++++++- 1 file changed, 26 insertions(+), 1 deletion(-) diff --git a/library/camel-kamelets/src/main/resources/kamelets/aws-cloudwatch-sink.kamelet.yaml b/library/camel-kamelets/src/main/resources/kamelets/aws-cloudwatch-sink.kamelet.yaml index d69d7051..340b32bc 100644 --- a/library/camel-kamelets/src/main/resources/kamelets/aws-cloudwatch-sink.kamelet.yaml +++ b/library/camel-kamelets/src/main/resources/kamelets/aws-cloudwatch-sink.kamelet.yaml @@ -76,9 +76,30 @@ spec: enum: ["ap-south-1", "eu-south-1", "us-gov-east-1", "me-central-1", "ca-central-1", "eu-central-1", "us-iso-west-1", "us-west-1", "us-west-2", "af-south-1", "eu-north-1", "eu-west-3", "eu-west-2", "eu-west-1", "ap-northeast-3", "ap-northeast-2", "ap-northeast-1", "me-south-1", "sa-east-1", "ap-east-1", "cn-north-1", "us-gov-west-1", "ap-southeast-1", "ap-southeast-2", "us-iso-east-1", "ap-southeast-3", "us-east-1", "us-east-2", "cn-northwest-1", "us-isob-east-1", "aws-global", "a [...] useDefaultCredentialsProvider: title: Default Credentials Provider - description: If true, the CloudWatch client loads credentials through a default credentials provider. If false, it uses the basic authentication method (access key and secret key). + description: If true, the Cloudwatch client loads credentials through a default credentials provider. If false, it uses the basic authentication method (access key and secret key). type: boolean default: false + useProfileCredentialsProvider: + title: Profile Credentials Provider + description: Set whether the Cloudwatch client should expect to load credentials through a profile credentials provider. + type: boolean + default: false + useSessionCredentials: + title: Session Credentials + description: Set whether the Cloudwatch client should expect to use Session Credentials. This is useful in situation in which the user needs to assume a IAM role for doing operations in Cloudwatch. + type: boolean + default: false + profileCredentialsName: + title: Profile Credentials Name + description: If using a profile credentials provider this parameter will set the profile name. + type: string + sessionToken: + title: Session Token + description: Amazon AWS Session Token used when the user needs to assume a IAM role. + type: string + format: password + x-descriptors: + - urn:camel:group:credentials uriEndpointOverride: title: Overwrite Endpoint URI description: The overriding endpoint URI. To use this option, you must also select the `overrideEndpoint` option. @@ -175,5 +196,9 @@ spec: accessKey: "{{?accessKey}}" region: "{{region}}" useDefaultCredentialsProvider: "{{useDefaultCredentialsProvider}}" + useProfileCredentialsProvider: "{{useProfileCredentialsProvider}}" + useSessionCredentials: "{{useSessionCredentials}}" uriEndpointOverride: "{{?uriEndpointOverride}}" + profileCredentialsName: "{{?profileCredentialsName}}" + sessionToken: "{{?sessionToken}}" overrideEndpoint: "{{overrideEndpoint}}"