This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git
commit 239dcb4eaded6f7396e5d3fa3377a93e33e5fae3 Author: Andrea Cosentino <anco...@gmail.com> AuthorDate: Mon Aug 5 15:25:03 2024 +0200 AWS Kamelets: Support profile and session credentials provider out of the box - Eventbridge Sink Signed-off-by: Andrea Cosentino <anco...@gmail.com> --- kamelets/aws-eventbridge-sink.kamelet.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) diff --git a/kamelets/aws-eventbridge-sink.kamelet.yaml b/kamelets/aws-eventbridge-sink.kamelet.yaml index 2f6a80f6..420f038e 100644 --- a/kamelets/aws-eventbridge-sink.kamelet.yaml +++ b/kamelets/aws-eventbridge-sink.kamelet.yaml @@ -78,6 +78,27 @@ spec: description: If true, the Eventbridge client loads credentials through a default credentials provider. If false, it uses the basic authentication method (access key and secret key). type: boolean default: false + useProfileCredentialsProvider: + title: Profile Credentials Provider + description: Set whether the Eventbridge client should expect to load credentials through a profile credentials provider. + type: boolean + default: false + useSessionCredentials: + title: Session Credentials + description: Set whether the Eventbridge client should expect to use Session Credentials. This is useful in situation in which the user needs to assume a IAM role for doing operations in Eventbridge. + type: boolean + default: false + profileCredentialsName: + title: Profile Credentials Name + description: If using a profile credentials provider this parameter will set the profile name. + type: string + sessionToken: + title: Session Token + description: Amazon AWS Session Token used when the user needs to assume a IAM role. + type: string + format: password + x-descriptors: + - urn:camel:group:credentials uriEndpointOverride: title: Overwrite Endpoint URI description: The overriding endpoint URI. To use this option, you must also select the `overrideEndpoint` option. @@ -138,6 +159,10 @@ spec: accessKey: "{{?accessKey}}" region: "{{region}}" useDefaultCredentialsProvider: "{{useDefaultCredentialsProvider}}" + useProfileCredentialsProvider: "{{useProfileCredentialsProvider}}" + useSessionCredentials: "{{useSessionCredentials}}" uriEndpointOverride: "{{?uriEndpointOverride}}" + profileCredentialsName: "{{?profileCredentialsName}}" + sessionToken: "{{?sessionToken}}" overrideEndpoint: "{{overrideEndpoint}}" operation: "putEvent"