This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch camel-master
in repository https://gitbox.apache.org/repos/asf/camel-kafka-connector.git


The following commit(s) were added to refs/heads/camel-master by this push:
     new 34459cb  [create-pull-request] automated change
34459cb is described below

commit 34459cbb0ba2862268bae8b7bbcee484701139cb
Author: github-actions[bot] 
<41898282+github-actions[bot]@users.noreply.github.com>
AuthorDate: Sun Mar 14 03:35:57 2021 +0000

    [create-pull-request] automated change
---
 .../connectors/camel-aws-secrets-manager-sink.json | 212 +++++++++++++++++++++
 1 file changed, 212 insertions(+)

diff --git 
a/camel-kafka-connector-catalog/src/generated/resources/connectors/camel-aws-secrets-manager-sink.json
 
b/camel-kafka-connector-catalog/src/generated/resources/connectors/camel-aws-secrets-manager-sink.json
new file mode 100644
index 0000000..9a52526
--- /dev/null
+++ 
b/camel-kafka-connector-catalog/src/generated/resources/connectors/camel-aws-secrets-manager-sink.json
@@ -0,0 +1,212 @@
+{
+       "connector": {
+               "class": 
"org.apache.camel.kafkaconnector.awssecretsmanager.CamelAwssecretsmanagerSinkConnector",
+               "artifactId": "camel-aws-secrets-manager-kafka-connector",
+               "groupId": "org.apache.camel.kafkaconnector",
+               "id": "camel-aws-secrets-manager-sink",
+               "type": "sink",
+               "version": "0.9.0-SNAPSHOT",
+               "description": "Manage AWS Secrets Manager services using AWS 
SDK version 2.x."
+       },
+       "properties": {
+               "camel.sink.path.label": {
+                       "name": "camel.sink.path.label",
+                       "description": "Logical name",
+                       "priority": "HIGH",
+                       "required": "true"
+               },
+               "camel.sink.endpoint.lazyStartProducer": {
+                       "name": "camel.sink.endpoint.lazyStartProducer",
+                       "description": "Whether the producer should be started 
lazy (on the first message). By starting lazy you can use this to allow 
CamelContext and routes to startup in situations where a producer may otherwise 
fail during starting and cause the route to fail being started. By deferring 
this startup to be lazy then the startup failure can be handled during routing 
messages via Camel's routing error handlers. Beware that when the first message 
is processed then creating and starting the pr [...]
+                       "defaultValue": "false",
+                       "priority": "MEDIUM",
+                       "required": "false"
+               },
+               "camel.sink.endpoint.operation": {
+                       "name": "camel.sink.endpoint.operation",
+                       "description": "The operation to perform One of: 
[listSecrets]",
+                       "priority": "HIGH",
+                       "required": "true",
+                       "enum": [
+                               "listSecrets"
+                       ]
+               },
+               "camel.sink.endpoint.overrideEndpoint": {
+                       "name": "camel.sink.endpoint.overrideEndpoint",
+                       "description": "Set the need for overidding the 
endpoint. This option needs to be used in combination with uriEndpointOverride 
option",
+                       "defaultValue": "false",
+                       "priority": "MEDIUM",
+                       "required": "false"
+               },
+               "camel.sink.endpoint.pojoRequest": {
+                       "name": "camel.sink.endpoint.pojoRequest",
+                       "description": "If we want to use a POJO request as 
body or not",
+                       "defaultValue": "false",
+                       "priority": "MEDIUM",
+                       "required": "false"
+               },
+               "camel.sink.endpoint.proxyHost": {
+                       "name": "camel.sink.endpoint.proxyHost",
+                       "description": "To define a proxy host when 
instantiating the Secrets Manager client",
+                       "priority": "MEDIUM",
+                       "required": "false"
+               },
+               "camel.sink.endpoint.proxyPort": {
+                       "name": "camel.sink.endpoint.proxyPort",
+                       "description": "To define a proxy port when 
instantiating the Secrets Manager client",
+                       "priority": "MEDIUM",
+                       "required": "false"
+               },
+               "camel.sink.endpoint.proxyProtocol": {
+                       "name": "camel.sink.endpoint.proxyProtocol",
+                       "description": "To define a proxy protocol when 
instantiating the Secrets Manager client One of: [HTTP] [HTTPS]",
+                       "defaultValue": "\"HTTPS\"",
+                       "priority": "MEDIUM",
+                       "required": "false",
+                       "enum": [
+                               "HTTP",
+                               "HTTPS"
+                       ]
+               },
+               "camel.sink.endpoint.region": {
+                       "name": "camel.sink.endpoint.region",
+                       "description": "The region in which Secrets Manager 
client needs to work. When using this parameter, the configuration will expect 
the lowercase name of the region (for example ap-east-1) You'll need to use the 
name Region.EU_WEST_1.id()",
+                       "priority": "MEDIUM",
+                       "required": "false"
+               },
+               "camel.sink.endpoint.secretsManagerClient": {
+                       "name": "camel.sink.endpoint.secretsManagerClient",
+                       "description": "To use a existing configured AWS 
Secrets Manager as client",
+                       "priority": "MEDIUM",
+                       "required": "false"
+               },
+               "camel.sink.endpoint.trustAllCertificates": {
+                       "name": "camel.sink.endpoint.trustAllCertificates",
+                       "description": "If we want to trust all certificates in 
case of overriding the endpoint",
+                       "defaultValue": "false",
+                       "priority": "MEDIUM",
+                       "required": "false"
+               },
+               "camel.sink.endpoint.uriEndpointOverride": {
+                       "name": "camel.sink.endpoint.uriEndpointOverride",
+                       "description": "Set the overriding uri endpoint. This 
option needs to be used in combination with overrideEndpoint option",
+                       "priority": "MEDIUM",
+                       "required": "false"
+               },
+               "camel.sink.endpoint.accessKey": {
+                       "name": "camel.sink.endpoint.accessKey",
+                       "description": "Amazon AWS Access Key",
+                       "priority": "MEDIUM",
+                       "required": "false"
+               },
+               "camel.sink.endpoint.secretKey": {
+                       "name": "camel.sink.endpoint.secretKey",
+                       "description": "Amazon AWS Secret Key",
+                       "priority": "MEDIUM",
+                       "required": "false"
+               },
+               "camel.component.aws-secrets-manager.configuration": {
+                       "name": 
"camel.component.aws-secrets-manager.configuration",
+                       "description": "Component configuration",
+                       "priority": "MEDIUM",
+                       "required": "false"
+               },
+               "camel.component.aws-secrets-manager.lazyStartProducer": {
+                       "name": 
"camel.component.aws-secrets-manager.lazyStartProducer",
+                       "description": "Whether the producer should be started 
lazy (on the first message). By starting lazy you can use this to allow 
CamelContext and routes to startup in situations where a producer may otherwise 
fail during starting and cause the route to fail being started. By deferring 
this startup to be lazy then the startup failure can be handled during routing 
messages via Camel's routing error handlers. Beware that when the first message 
is processed then creating and starting the pr [...]
+                       "defaultValue": "false",
+                       "priority": "MEDIUM",
+                       "required": "false"
+               },
+               "camel.component.aws-secrets-manager.operation": {
+                       "name": "camel.component.aws-secrets-manager.operation",
+                       "description": "The operation to perform One of: 
[listSecrets]",
+                       "priority": "HIGH",
+                       "required": "true",
+                       "enum": [
+                               "listSecrets"
+                       ]
+               },
+               "camel.component.aws-secrets-manager.overrideEndpoint": {
+                       "name": 
"camel.component.aws-secrets-manager.overrideEndpoint",
+                       "description": "Set the need for overidding the 
endpoint. This option needs to be used in combination with uriEndpointOverride 
option",
+                       "defaultValue": "false",
+                       "priority": "MEDIUM",
+                       "required": "false"
+               },
+               "camel.component.aws-secrets-manager.pojoRequest": {
+                       "name": 
"camel.component.aws-secrets-manager.pojoRequest",
+                       "description": "If we want to use a POJO request as 
body or not",
+                       "defaultValue": "false",
+                       "priority": "MEDIUM",
+                       "required": "false"
+               },
+               "camel.component.aws-secrets-manager.proxyHost": {
+                       "name": "camel.component.aws-secrets-manager.proxyHost",
+                       "description": "To define a proxy host when 
instantiating the Secrets Manager client",
+                       "priority": "MEDIUM",
+                       "required": "false"
+               },
+               "camel.component.aws-secrets-manager.proxyPort": {
+                       "name": "camel.component.aws-secrets-manager.proxyPort",
+                       "description": "To define a proxy port when 
instantiating the Secrets Manager client",
+                       "priority": "MEDIUM",
+                       "required": "false"
+               },
+               "camel.component.aws-secrets-manager.proxyProtocol": {
+                       "name": 
"camel.component.aws-secrets-manager.proxyProtocol",
+                       "description": "To define a proxy protocol when 
instantiating the Secrets Manager client One of: [HTTP] [HTTPS]",
+                       "defaultValue": "\"HTTPS\"",
+                       "priority": "MEDIUM",
+                       "required": "false",
+                       "enum": [
+                               "HTTP",
+                               "HTTPS"
+                       ]
+               },
+               "camel.component.aws-secrets-manager.region": {
+                       "name": "camel.component.aws-secrets-manager.region",
+                       "description": "The region in which Secrets Manager 
client needs to work. When using this parameter, the configuration will expect 
the lowercase name of the region (for example ap-east-1) You'll need to use the 
name Region.EU_WEST_1.id()",
+                       "priority": "MEDIUM",
+                       "required": "false"
+               },
+               "camel.component.aws-secrets-manager.secretsManagerClient": {
+                       "name": 
"camel.component.aws-secrets-manager.secretsManagerClient",
+                       "description": "To use a existing configured AWS 
Secrets Manager as client",
+                       "priority": "MEDIUM",
+                       "required": "false"
+               },
+               "camel.component.aws-secrets-manager.trustAllCertificates": {
+                       "name": 
"camel.component.aws-secrets-manager.trustAllCertificates",
+                       "description": "If we want to trust all certificates in 
case of overriding the endpoint",
+                       "defaultValue": "false",
+                       "priority": "MEDIUM",
+                       "required": "false"
+               },
+               "camel.component.aws-secrets-manager.uriEndpointOverride": {
+                       "name": 
"camel.component.aws-secrets-manager.uriEndpointOverride",
+                       "description": "Set the overriding uri endpoint. This 
option needs to be used in combination with overrideEndpoint option",
+                       "priority": "MEDIUM",
+                       "required": "false"
+               },
+               "camel.component.aws-secrets-manager.autowiredEnabled": {
+                       "name": 
"camel.component.aws-secrets-manager.autowiredEnabled",
+                       "description": "Whether autowiring is enabled. This is 
used for automatic autowiring options (the option must be marked as autowired) 
by looking up in the registry to find if there is a single instance of matching 
type, which then gets configured on the component. This can be used for 
automatic configuring JDBC data sources, JMS connection factories, AWS Clients, 
etc.",
+                       "defaultValue": "true",
+                       "priority": "MEDIUM",
+                       "required": "false"
+               },
+               "camel.component.aws-secrets-manager.accessKey": {
+                       "name": "camel.component.aws-secrets-manager.accessKey",
+                       "description": "Amazon AWS Access Key",
+                       "priority": "MEDIUM",
+                       "required": "false"
+               },
+               "camel.component.aws-secrets-manager.secretKey": {
+                       "name": "camel.component.aws-secrets-manager.secretKey",
+                       "description": "Amazon AWS Secret Key",
+                       "priority": "MEDIUM",
+                       "required": "false"
+               }
+       }
+}

Reply via email to