This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch 2131-part-3 in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git
commit a763799ea373f6a245a4e27d388553caa23874f8 Author: Andrea Cosentino <anco...@gmail.com> AuthorDate: Mon Aug 5 16:38:47 2024 +0200 AWS Kamelets: Support profile and session credentials provider out of the box - AWS Secrets Manager Sink Signed-off-by: Andrea Cosentino <anco...@gmail.com> --- kamelets/aws-secrets-manager-sink.kamelet.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) diff --git a/kamelets/aws-secrets-manager-sink.kamelet.yaml b/kamelets/aws-secrets-manager-sink.kamelet.yaml index 14bfd75e..46dcf736 100644 --- a/kamelets/aws-secrets-manager-sink.kamelet.yaml +++ b/kamelets/aws-secrets-manager-sink.kamelet.yaml @@ -71,6 +71,27 @@ spec: description: Set whether the Secrets Manager client should expect to load credentials through a default credentials provider or to expect static credentials to be passed in. type: boolean default: false + useProfileCredentialsProvider: + title: Profile Credentials Provider + description: Set whether the Secrets Manager client should expect to load credentials through a profile credentials provider. + type: boolean + default: false + useSessionCredentials: + title: Session Credentials + description: Set whether the Secrets Manager client should expect to use Session Credentials. This is useful in situation in which the user needs to assume a IAM role for doing operations in Secrets Manager. + type: boolean + default: false + profileCredentialsName: + title: Profile Credentials Name + description: If using a profile credentials provider this parameter will set the profile name. + type: string + sessionToken: + title: Session Token + description: Amazon AWS Session Token used when the user needs to assume a IAM role. + type: string + format: password + x-descriptors: + - urn:camel:group:credentials dependencies: - "camel:core" - "camel:aws-secrets-manager" @@ -103,4 +124,8 @@ spec: accessKey: "{{?accessKey}}" region: "{{region}}" useDefaultCredentialsProvider: "{{useDefaultCredentialsProvider}}" + useProfileCredentialsProvider: "{{useProfileCredentialsProvider}}" + useSessionCredentials: "{{useSessionCredentials}}" operation: "createSecret" + profileCredentialsName: "{{?profileCredentialsName}}" + sessionToken: "{{?sessionToken}}"