This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel.git


The following commit(s) were added to refs/heads/main by this push:
     new ca820f2e654 CAMEL-21330 - Camel-AWS-Secrets-Manager: Support 
Properties Function with Localstack (#16063)
ca820f2e654 is described below

commit ca820f2e654874f3b9b1ac624ed755f262163406
Author: Andrea Cosentino <anco...@gmail.com>
AuthorDate: Wed Oct 23 12:44:58 2024 +0200

    CAMEL-21330 - Camel-AWS-Secrets-Manager: Support Properties Function with 
Localstack (#16063)
    
    Signed-off-by: Andrea Cosentino <anco...@gmail.com>
---
 .../src/main/docs/aws-secrets-manager-component.adoc         | 12 ++++++++++++
 1 file changed, 12 insertions(+)

diff --git 
a/components/camel-aws/camel-aws-secrets-manager/src/main/docs/aws-secrets-manager-component.adoc
 
b/components/camel-aws/camel-aws-secrets-manager/src/main/docs/aws-secrets-manager-component.adoc
index 11b59cc04b2..5928786ad71 100644
--- 
a/components/camel-aws/camel-aws-secrets-manager/src/main/docs/aws-secrets-manager-component.adoc
+++ 
b/components/camel-aws/camel-aws-secrets-manager/src/main/docs/aws-secrets-manager-component.adoc
@@ -236,6 +236,18 @@ For the moment we are not considering the rotation 
function if any are applied,
 
 The only requirement is adding the camel-aws-secrets-manager jar to your Camel 
application.
 
+=== Testing AWS Secrets Manager Property Function with Localstack
+
+For testing purpose you might want to test the function on Localstack. To make 
this easier you can use the following two properties in combination with the 
others:
+
+[source,properties]
+----
+camel.vault.aws.overrideEndpoint = true
+camel.vault.aws.uriEndpointOverride = <localstack_url>
+----
+
+With this you could be able to retrieve secret with the function directly from 
the Localstack instance.
+
 === Automatic Camel context reloading on Secret Refresh
 
 Being able to reload Camel context on a Secret Refresh could be done by 
specifying the usual credentials (the same used for AWS Secret Manager Property 
Function).

Reply via email to