This is an automated email from the ASF dual-hosted git repository.
orpiske pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/camel-kafka-connector.git
The following commit(s) were added to refs/heads/master by this push:
new 4dfe572 CAMEL-16524: the camel-crypto-cms component was removed from
Camel Core
4dfe572 is described below
commit 4dfe5723e03c9d935319e95efe5026935a0f264e
Author: Otavio Rodolfo Piske <[email protected]>
AuthorDate: Tue Apr 20 13:45:02 2021 +0200
CAMEL-16524: the camel-crypto-cms component was removed from Camel Core
---
.../camel-crypto-cms-kafka-connector/pom.xml | 139 --------------
.../descriptors/connector-sink.properties | 1 -
.../generated/resources/camel-crypto-cms-sink.json | 159 ----------------
.../src/main/assembly/package.xml | 56 ------
.../camel-crypto-cms-kafka-sink-connector.adoc | 72 --------
.../CamelCryptocmsSinkConnector.properties | 35 ----
.../cryptocms/CamelCryptocmsSinkConnector.java | 35 ----
.../CamelCryptocmsSinkConnectorConfig.java | 128 -------------
.../cryptocms/CamelCryptocmsSinkTask.java | 39 ----
.../src/main/resources/META-INF/LICENSE.txt | 203 ---------------------
.../src/main/resources/META-INF/NOTICE.txt | 11 --
connectors/pom.xml | 1 -
12 files changed, 879 deletions(-)
diff --git a/connectors/camel-crypto-cms-kafka-connector/pom.xml
b/connectors/camel-crypto-cms-kafka-connector/pom.xml
deleted file mode 100644
index 640243e..0000000
--- a/connectors/camel-crypto-cms-kafka-connector/pom.xml
+++ /dev/null
@@ -1,139 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<!--
-
- Licensed to the Apache Software Foundation (ASF) under one or more
- contributor license agreements. See the NOTICE file distributed with
- this work for additional information regarding copyright ownership.
- The ASF licenses this file to You under the Apache License, Version 2.0
- (the "License"); you may not use this file except in compliance with
- the License. You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
-
--->
-<project xmlns="http://maven.apache.org/POM/4.0.0"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://maven.apache.org/POM/4.0.0
http://maven.apache.org/xsd/maven-4.0.0.xsd">
- <modelVersion>4.0.0</modelVersion>
- <parent>
- <groupId>org.apache.camel.kafkaconnector</groupId>
- <artifactId>connectors</artifactId>
- <version>0.10.0-SNAPSHOT</version>
- </parent>
- <artifactId>camel-crypto-cms-kafka-connector</artifactId>
- <name>Camel-Kafka-Connector :: crypto-cms</name>
- <description>Camel Kafka Connector for crypto-cms</description>
- <dependencies>
- <!-- Kafka -->
- <dependency>
- <groupId>org.apache.kafka</groupId>
- <artifactId>connect-api</artifactId>
- <scope>provided</scope>
- </dependency>
- <dependency>
- <groupId>org.apache.kafka</groupId>
- <artifactId>connect-transforms</artifactId>
- <scope>provided</scope>
- </dependency>
- <!-- Camel -->
- <dependency>
- <groupId>org.apache.camel</groupId>
- <artifactId>camel-crypto-cms</artifactId>
- </dependency>
- <!--START OF GENERATED CODE-->
- <dependency>
- <groupId>org.apache.camel.kafkaconnector</groupId>
- <artifactId>camel-kafka-connector</artifactId>
- </dependency>
- <dependency>
- <groupId>org.apache.camel</groupId>
- <artifactId>camel-jackson</artifactId>
- </dependency>
- <!--END OF GENERATED CODE-->
- </dependencies>
- <build>
- <plugins>
- <plugin>
- <groupId>org.apache.maven.plugins</groupId>
- <artifactId>maven-surefire-plugin</artifactId>
- <version>${version.maven.surefire.plugin}</version>
- <configuration>
- <failIfNoTests>false</failIfNoTests>
- </configuration>
- </plugin>
- <plugin>
- <groupId>org.apache.maven.plugins</groupId>
- <artifactId>maven-jar-plugin</artifactId>
- <version>${version.maven.jar}</version>
- <configuration>
- <archive>
- <manifest>
-
<addDefaultImplementationEntries>true</addDefaultImplementationEntries>
-
<addDefaultSpecificationEntries>true</addDefaultSpecificationEntries>
- </manifest>
- </archive>
- </configuration>
- </plugin>
- <plugin>
- <groupId>org.apache.maven.plugins</groupId>
- <artifactId>maven-compiler-plugin</artifactId>
- <version>2.5.1</version>
- <inherited>true</inherited>
- <configuration>
- <source>1.8</source>
- <target>1.8</target>
- </configuration>
- </plugin>
- <plugin>
- <artifactId>maven-assembly-plugin</artifactId>
- <version>2.5.3</version>
- <configuration>
- <descriptors>
- <descriptor>src/main/assembly/package.xml</descriptor>
- </descriptors>
- </configuration>
- <executions>
- <execution>
- <id>make-assembly</id>
- <phase>package</phase>
- <goals>
- <goal>single</goal>
- </goals>
- </execution>
- </executions>
- </plugin>
- </plugins>
- </build>
- <!--START OF GENERATED CODE-->
- <repositories>
- <!-- camel-jira -->
- <repository>
- <id>atlassian-public</id>
- <url>https://packages.atlassian.com/maven-external</url>
- <name>Atlassian Public Repo</name>
- <snapshots>
- <enabled>false</enabled>
- </snapshots>
- <releases>
- <enabled>true</enabled>
- </releases>
- </repository>
- <!-- camel-ipfs and camel-weka -->
- <repository>
- <id>jboss.thirdparty</id>
- <name>JBoss Thirdparty Repository</name>
-
<url>https://repository.jboss.org/nexus/service/local/repositories/thirdparty-releases/content/</url>
- <snapshots>
- <enabled>false</enabled>
- </snapshots>
- <releases>
- <enabled>true</enabled>
- </releases>
- </repository>
- </repositories>
- <!--END OF GENERATED CODE-->
-</project>
diff --git
a/connectors/camel-crypto-cms-kafka-connector/src/generated/descriptors/connector-sink.properties
b/connectors/camel-crypto-cms-kafka-connector/src/generated/descriptors/connector-sink.properties
deleted file mode 100644
index 91d4d49..0000000
---
a/connectors/camel-crypto-cms-kafka-connector/src/generated/descriptors/connector-sink.properties
+++ /dev/null
@@ -1 +0,0 @@
-camel-crypto-cms-sink
\ No newline at end of file
diff --git
a/connectors/camel-crypto-cms-kafka-connector/src/generated/resources/camel-crypto-cms-sink.json
b/connectors/camel-crypto-cms-kafka-connector/src/generated/resources/camel-crypto-cms-sink.json
deleted file mode 100644
index 74d4215..0000000
---
a/connectors/camel-crypto-cms-kafka-connector/src/generated/resources/camel-crypto-cms-sink.json
+++ /dev/null
@@ -1,159 +0,0 @@
-{
- "connector": {
- "class":
"org.apache.camel.kafkaconnector.cryptocms.CamelCryptocmsSinkConnector",
- "artifactId": "camel-crypto-cms-kafka-connector",
- "groupId": "org.apache.camel.kafkaconnector",
- "id": "camel-crypto-cms-sink",
- "type": "sink",
- "version": "0.10.0-SNAPSHOT",
- "description": "Encrypt, decrypt, sign and verify data in CMS
Enveloped Data format."
- },
- "properties": {
- "camel.sink.path.cryptoOperation": {
- "name": "camel.sink.path.cryptoOperation",
- "description": "Set the Crypto operation from that
supplied after the crypto scheme in the endpoint uri e.g. crypto-cms:sign sets
sign as the operation. Possible values: sign, verify, encrypt, or decrypt. One
of: [sign] [verify] [encrypt] [decrypt]",
- "priority": "HIGH",
- "required": "true",
- "enum": [
- "sign",
- "verify",
- "encrypt",
- "decrypt"
- ]
- },
- "camel.sink.path.name": {
- "name": "camel.sink.path.name",
- "description": "The name part in the URI can be chosen
by the user to distinguish between different
signer\/verifier\/encryptor\/decryptor endpoints within the camel context.",
- "priority": "HIGH",
- "required": "true"
- },
- "camel.sink.endpoint.keyStore": {
- "name": "camel.sink.endpoint.keyStore",
- "description": "Keystore which contains signer private
keys, verifier public keys, encryptor public keys, decryptor private keys
depending on the operation. Use either this parameter or the parameter
'keyStoreParameters'.",
- "priority": "MEDIUM",
- "required": "false"
- },
- "camel.sink.endpoint.keyStoreParameters": {
- "name": "camel.sink.endpoint.keyStoreParameters",
- "description": "Keystore containing signer private
keys, verifier public keys, encryptor public keys, decryptor private keys
depending on the operation. Use either this parameter or the parameter
'keystore'.",
- "priority": "MEDIUM",
- "required": "false"
- },
- "camel.sink.endpoint.lazyStartProducer": {
- "name": "camel.sink.endpoint.lazyStartProducer",
- "description": "Whether the producer should be started
lazy (on the first message). By starting lazy you can use this to allow
CamelContext and routes to startup in situations where a producer may otherwise
fail during starting and cause the route to fail being started. By deferring
this startup to be lazy then the startup failure can be handled during routing
messages via Camel's routing error handlers. Beware that when the first message
is processed then creating and starting the pr [...]
- "defaultValue": "false",
- "priority": "MEDIUM",
- "required": "false"
- },
- "camel.sink.endpoint.password": {
- "name": "camel.sink.endpoint.password",
- "description": "Sets the password of the private keys.
It is assumed that all private keys in the keystore have the same password. If
not set then it is assumed that the password of the private keys is given by
the keystore password given in the KeyStoreParameters.",
- "priority": "MEDIUM",
- "required": "false"
- },
- "camel.sink.endpoint.fromBase64": {
- "name": "camel.sink.endpoint.fromBase64",
- "description": "If true then the CMS message is base 64
encoded and must be decoded during the processing. Default value is false.",
- "defaultValue": "false",
- "priority": "MEDIUM",
- "required": "false"
- },
- "camel.sink.endpoint.contentEncryptionAlgorithm": {
- "name":
"camel.sink.endpoint.contentEncryptionAlgorithm",
- "description": "Encryption algorithm, for example
DESede\/CBC\/PKCS5Padding. Further possible values: DESede\/CBC\/PKCS5Padding,
AES\/CBC\/PKCS5Padding, Camellia\/CBC\/PKCS5Padding, CAST5\/CBC\/PKCS5Padding.
One of: [AES\/CBC\/PKCS5Padding] [DESede\/CBC\/PKCS5Padding]
[Camellia\/CBC\/PKCS5Padding] [CAST5\/CBC\/PKCS5Padding]",
- "priority": "MEDIUM",
- "required": "false",
- "enum": [
- "AES\/CBC\/PKCS5Padding",
- "DESede\/CBC\/PKCS5Padding",
- "Camellia\/CBC\/PKCS5Padding",
- "CAST5\/CBC\/PKCS5Padding"
- ]
- },
- "camel.sink.endpoint.originatorInformationProvider": {
- "name":
"camel.sink.endpoint.originatorInformationProvider",
- "description": "Provider for the originator info. See
https:\/\/tools.ietf.org\/html\/rfc5652#section-6.1. The default value is
null.",
- "priority": "MEDIUM",
- "required": "false"
- },
- "camel.sink.endpoint.recipient": {
- "name": "camel.sink.endpoint.recipient",
- "description": "Recipient Info: reference to a bean
which implements the interface
org.apache.camel.component.crypto.cms.api.TransRecipientInfo",
- "priority": "MEDIUM",
- "required": "false"
- },
- "camel.sink.endpoint.secretKeyLength": {
- "name": "camel.sink.endpoint.secretKeyLength",
- "description": "Key length for the secret symmetric key
used for the content encryption. Only used if the specified content-encryption
algorithm allows keys of different sizes. If
contentEncryptionAlgorithm=AES\/CBC\/PKCS5Padding or
Camellia\/CBC\/PKCS5Padding then 128; if
contentEncryptionAlgorithm=DESede\/CBC\/PKCS5Padding then 192, 128; if strong
encryption is enabled then for AES\/CBC\/PKCS5Padding and
Camellia\/CBC\/PKCS5Padding also the key lengths 192 and 256 are possible.",
- "priority": "MEDIUM",
- "required": "false"
- },
- "camel.sink.endpoint.unprotectedAttributesGeneratorProvider": {
- "name":
"camel.sink.endpoint.unprotectedAttributesGeneratorProvider",
- "description": "Provider of the generator for the
unprotected attributes. The default value is null which means no unprotected
attribute is added to the Enveloped Data object. See
https:\/\/tools.ietf.org\/html\/rfc5652#section-6.1.",
- "priority": "MEDIUM",
- "required": "false"
- },
- "camel.sink.endpoint.toBase64": {
- "name": "camel.sink.endpoint.toBase64",
- "description": "Indicates whether the Signed Data or
Enveloped Data instance shall be base 64 encoded. Default value is false.",
- "defaultValue": "\"false\"",
- "priority": "MEDIUM",
- "required": "false"
- },
- "camel.sink.endpoint.includeContent": {
- "name": "camel.sink.endpoint.includeContent",
- "description": "Indicates whether the signed content
should be included into the Signed Data instance. If false then a detached
Signed Data instance is created in the header CamelCryptoCmsSignedData.",
- "defaultValue": "\"true\"",
- "priority": "MEDIUM",
- "required": "false"
- },
- "camel.sink.endpoint.signer": {
- "name": "camel.sink.endpoint.signer",
- "description": "Signer information: reference to
bean(s) which implements org.apache.camel.component.crypto.cms.api.SignerInfo.
Multiple values can be separated by comma",
- "priority": "MEDIUM",
- "required": "false"
- },
- "camel.sink.endpoint.signedDataHeaderBase64": {
- "name": "camel.sink.endpoint.signedDataHeaderBase64",
- "description": "Indicates whether the value in the
header CamelCryptoCmsSignedData is base64 encoded. Default value is false. Only
relevant for detached signatures. In the detached signature case, the header
contains the Signed Data object.",
- "defaultValue": "false",
- "priority": "MEDIUM",
- "required": "false"
- },
- "camel.sink.endpoint.verifySignaturesOfAllSigners": {
- "name":
"camel.sink.endpoint.verifySignaturesOfAllSigners",
- "description": "If true then the signatures of all
signers contained in the Signed Data object are verified. If false then only
one signature whose signer info matches with one of the specified certificates
is verified. Default value is true.",
- "defaultValue": "true",
- "priority": "MEDIUM",
- "required": "false"
- },
- "camel.component.crypto-cms.lazyStartProducer": {
- "name": "camel.component.crypto-cms.lazyStartProducer",
- "description": "Whether the producer should be started
lazy (on the first message). By starting lazy you can use this to allow
CamelContext and routes to startup in situations where a producer may otherwise
fail during starting and cause the route to fail being started. By deferring
this startup to be lazy then the startup failure can be handled during routing
messages via Camel's routing error handlers. Beware that when the first message
is processed then creating and starting the pr [...]
- "defaultValue": "false",
- "priority": "MEDIUM",
- "required": "false"
- },
- "camel.component.crypto-cms.autowiredEnabled": {
- "name": "camel.component.crypto-cms.autowiredEnabled",
- "description": "Whether autowiring is enabled. This is
used for automatic autowiring options (the option must be marked as autowired)
by looking up in the registry to find if there is a single instance of matching
type, which then gets configured on the component. This can be used for
automatic configuring JDBC data sources, JMS connection factories, AWS Clients,
etc.",
- "defaultValue": "true",
- "priority": "MEDIUM",
- "required": "false"
- },
-
"camel.component.crypto-cms.envelopedDataDecryptorConfiguration": {
- "name":
"camel.component.crypto-cms.envelopedDataDecryptorConfiguration",
- "description": "To configure the shared
EnvelopedDataDecryptorConfiguration, which determines the uri parameters for
the decrypt operation.",
- "priority": "MEDIUM",
- "required": "false"
- },
- "camel.component.crypto-cms.signedDataVerifierConfiguration": {
- "name":
"camel.component.crypto-cms.signedDataVerifierConfiguration",
- "description": "To configure the shared
SignedDataVerifierConfiguration, which determines the uri parameters for the
verify operation.",
- "priority": "MEDIUM",
- "required": "false"
- }
- }
-}
\ No newline at end of file
diff --git
a/connectors/camel-crypto-cms-kafka-connector/src/main/assembly/package.xml
b/connectors/camel-crypto-cms-kafka-connector/src/main/assembly/package.xml
deleted file mode 100644
index 05f0b1a..0000000
--- a/connectors/camel-crypto-cms-kafka-connector/src/main/assembly/package.xml
+++ /dev/null
@@ -1,56 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<!--
-
- Licensed to the Apache Software Foundation (ASF) under one or more
- contributor license agreements. See the NOTICE file distributed with
- this work for additional information regarding copyright ownership.
- The ASF licenses this file to You under the Apache License, Version 2.0
- (the "License"); you may not use this file except in compliance with
- the License. You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
-
--->
-<assembly>
- <!-- Assembles a packaged version targeting OS installation. -->
- <id>package</id>
- <formats>
- <format>tar.gz</format>
- </formats>
- <includeBaseDirectory>false</includeBaseDirectory>
- <fileSets>
- <fileSet>
- <directory>${project.basedir}/../..</directory>
- <outputDirectory>${project.artifactId}/</outputDirectory>
- <includes>
- <include>README*</include>
- <include>LICENSE*</include>
- <include>NOTICE*</include>
- <include>licenses/</include>
- </includes>
- </fileSet>
- <fileSet>
- <directory>${project.basedir}/src/main/docs</directory>
- <outputDirectory>docs/</outputDirectory>
- <includes>
- <include>**/*</include>
- </includes>
- </fileSet>
- </fileSets>
- <dependencySets>
- <dependencySet>
- <outputDirectory>${project.artifactId}/</outputDirectory>
- <useProjectArtifact>true</useProjectArtifact>
- <useTransitiveFiltering>true</useTransitiveFiltering>
- <excludes>
- <exclude>org.apache.kafka:connect-api</exclude>
- </excludes>
- </dependencySet>
- </dependencySets>
-</assembly>
diff --git
a/connectors/camel-crypto-cms-kafka-connector/src/main/docs/camel-crypto-cms-kafka-sink-connector.adoc
b/connectors/camel-crypto-cms-kafka-connector/src/main/docs/camel-crypto-cms-kafka-sink-connector.adoc
deleted file mode 100644
index df01563..0000000
---
a/connectors/camel-crypto-cms-kafka-connector/src/main/docs/camel-crypto-cms-kafka-sink-connector.adoc
+++ /dev/null
@@ -1,72 +0,0 @@
-// kafka-connector options: START
-[[camel-crypto-cms-kafka-connector-sink]]
-= camel-crypto-cms-kafka-connector sink configuration
-
-Connector Description: Encrypt, decrypt, sign and verify data in CMS Enveloped
Data format.
-
-When using camel-crypto-cms-kafka-connector as sink make sure to use the
following Maven dependency to have support for the connector:
-
-[source,xml]
-----
-<dependency>
- <groupId>org.apache.camel.kafkaconnector</groupId>
- <artifactId>camel-crypto-cms-kafka-connector</artifactId>
- <version>x.x.x</version>
- <!-- use the same version as your Camel Kafka connector version -->
-</dependency>
-----
-
-To use this Sink connector in Kafka connect you'll need to set the following
connector.class
-
-[source,java]
-----
-connector.class=org.apache.camel.kafkaconnector.cryptocms.CamelCryptocmsSinkConnector
-----
-
-
-The camel-crypto-cms sink connector supports 21 options, which are listed
below.
-
-
-
-[width="100%",cols="2,5,^1,1,1",options="header"]
-|===
-| Name | Description | Default | Required | Priority
-| *camel.sink.path.cryptoOperation* | Set the Crypto operation from that
supplied after the crypto scheme in the endpoint uri e.g. crypto-cms:sign sets
sign as the operation. Possible values: sign, verify, encrypt, or decrypt. One
of: [sign] [verify] [encrypt] [decrypt] | null | true | HIGH
-| *camel.sink.path.name* | The name part in the URI can be chosen by the user
to distinguish between different signer/verifier/encryptor/decryptor endpoints
within the camel context. | null | true | HIGH
-| *camel.sink.endpoint.keyStore* | Keystore which contains signer private
keys, verifier public keys, encryptor public keys, decryptor private keys
depending on the operation. Use either this parameter or the parameter
'keyStoreParameters'. | null | false | MEDIUM
-| *camel.sink.endpoint.keyStoreParameters* | Keystore containing signer
private keys, verifier public keys, encryptor public keys, decryptor private
keys depending on the operation. Use either this parameter or the parameter
'keystore'. | null | false | MEDIUM
-| *camel.sink.endpoint.lazyStartProducer* | Whether the producer should be
started lazy (on the first message). By starting lazy you can use this to allow
CamelContext and routes to startup in situations where a producer may otherwise
fail during starting and cause the route to fail being started. By deferring
this startup to be lazy then the startup failure can be handled during routing
messages via Camel's routing error handlers. Beware that when the first message
is processed then cre [...]
-| *camel.sink.endpoint.password* | Sets the password of the private keys. It
is assumed that all private keys in the keystore have the same password. If not
set then it is assumed that the password of the private keys is given by the
keystore password given in the KeyStoreParameters. | null | false | MEDIUM
-| *camel.sink.endpoint.fromBase64* | If true then the CMS message is base 64
encoded and must be decoded during the processing. Default value is false. |
false | false | MEDIUM
-| *camel.sink.endpoint.contentEncryptionAlgorithm* | Encryption algorithm, for
example DESede/CBC/PKCS5Padding. Further possible values:
DESede/CBC/PKCS5Padding, AES/CBC/PKCS5Padding, Camellia/CBC/PKCS5Padding,
CAST5/CBC/PKCS5Padding. One of: [AES/CBC/PKCS5Padding]
[DESede/CBC/PKCS5Padding] [Camellia/CBC/PKCS5Padding] [CAST5/CBC/PKCS5Padding]
| null | false | MEDIUM
-| *camel.sink.endpoint.originatorInformationProvider* | Provider for the
originator info. See \https://tools.ietf.org/html/rfc5652#section-6.1. The
default value is null. | null | false | MEDIUM
-| *camel.sink.endpoint.recipient* | Recipient Info: reference to a bean which
implements the interface
org.apache.camel.component.crypto.cms.api.TransRecipientInfo | null | false |
MEDIUM
-| *camel.sink.endpoint.secretKeyLength* | Key length for the secret symmetric
key used for the content encryption. Only used if the specified
content-encryption algorithm allows keys of different sizes. If
contentEncryptionAlgorithm=AES/CBC/PKCS5Padding or Camellia/CBC/PKCS5Padding
then 128; if contentEncryptionAlgorithm=DESede/CBC/PKCS5Padding then 192, 128;
if strong encryption is enabled then for AES/CBC/PKCS5Padding and
Camellia/CBC/PKCS5Padding also the key lengths 192 and 256 are p [...]
-| *camel.sink.endpoint.unprotectedAttributesGenerator Provider* | Provider of
the generator for the unprotected attributes. The default value is null which
means no unprotected attribute is added to the Enveloped Data object. See
\https://tools.ietf.org/html/rfc5652#section-6.1. | null | false | MEDIUM
-| *camel.sink.endpoint.toBase64* | Indicates whether the Signed Data or
Enveloped Data instance shall be base 64 encoded. Default value is false. |
"false" | false | MEDIUM
-| *camel.sink.endpoint.includeContent* | Indicates whether the signed content
should be included into the Signed Data instance. If false then a detached
Signed Data instance is created in the header CamelCryptoCmsSignedData. |
"true" | false | MEDIUM
-| *camel.sink.endpoint.signer* | Signer information: reference to bean(s)
which implements org.apache.camel.component.crypto.cms.api.SignerInfo. Multiple
values can be separated by comma | null | false | MEDIUM
-| *camel.sink.endpoint.signedDataHeaderBase64* | Indicates whether the value
in the header CamelCryptoCmsSignedData is base64 encoded. Default value is
false. Only relevant for detached signatures. In the detached signature case,
the header contains the Signed Data object. | false | false | MEDIUM
-| *camel.sink.endpoint.verifySignaturesOfAllSigners* | If true then the
signatures of all signers contained in the Signed Data object are verified. If
false then only one signature whose signer info matches with one of the
specified certificates is verified. Default value is true. | true | false |
MEDIUM
-| *camel.component.crypto-cms.lazyStartProducer* | Whether the producer should
be started lazy (on the first message). By starting lazy you can use this to
allow CamelContext and routes to startup in situations where a producer may
otherwise fail during starting and cause the route to fail being started. By
deferring this startup to be lazy then the startup failure can be handled
during routing messages via Camel's routing error handlers. Beware that when
the first message is processed t [...]
-| *camel.component.crypto-cms.autowiredEnabled* | Whether autowiring is
enabled. This is used for automatic autowiring options (the option must be
marked as autowired) by looking up in the registry to find if there is a single
instance of matching type, which then gets configured on the component. This
can be used for automatic configuring JDBC data sources, JMS connection
factories, AWS Clients, etc. | true | false | MEDIUM
-| *camel.component.crypto-cms.envelopedDataDecryptor Configuration* | To
configure the shared EnvelopedDataDecryptorConfiguration, which determines the
uri parameters for the decrypt operation. | null | false | MEDIUM
-| *camel.component.crypto-cms.signedDataVerifier Configuration* | To configure
the shared SignedDataVerifierConfiguration, which determines the uri parameters
for the verify operation. | null | false | MEDIUM
-|===
-
-
-
-The camel-crypto-cms sink connector has no converters out of the box.
-
-
-
-
-
-The camel-crypto-cms sink connector has no transforms out of the box.
-
-
-
-
-
-The camel-crypto-cms sink connector has no aggregation strategies out of the
box.
-// kafka-connector options: END
diff --git
a/connectors/camel-crypto-cms-kafka-connector/src/main/docs/examples/CamelCryptocmsSinkConnector.properties
b/connectors/camel-crypto-cms-kafka-connector/src/main/docs/examples/CamelCryptocmsSinkConnector.properties
deleted file mode 100644
index 5cdf3a9..0000000
---
a/connectors/camel-crypto-cms-kafka-connector/src/main/docs/examples/CamelCryptocmsSinkConnector.properties
+++ /dev/null
@@ -1,35 +0,0 @@
-## ---------------------------------------------------------------------------
-## Licensed to the Apache Software Foundation (ASF) under one or more
-## contributor license agreements. See the NOTICE file distributed with
-## this work for additional information regarding copyright ownership.
-## The ASF licenses this file to You under the Apache License, Version 2.0
-## (the "License"); you may not use this file except in compliance with
-## the License. You may obtain a copy of the License at
-##
-## http://www.apache.org/licenses/LICENSE-2.0
-##
-## Unless required by applicable law or agreed to in writing, software
-## distributed under the License is distributed on an "AS IS" BASIS,
-## WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-## See the License for the specific language governing permissions and
-## limitations under the License.
-## ---------------------------------------------------------------------------
-
-name=CamelCrypto-cmsSinkConnector
-connector.class=org.apache.camel.kafkaconnector.cryptocms.CamelCryptocmsSinkConnector
-tasks.max=1
-
-# use the kafka converters that better suit your needs, these are just
defaults:
-key.converter=org.apache.kafka.connect.storage.StringConverter
-value.converter=org.apache.kafka.connect.storage.StringConverter
-
-# comma separated topics to get messages from
-topics=
-
-# mandatory properties (for a complete properties list see the connector
documentation):
-
-# Set the Crypto operation from that supplied after the crypto scheme in the
endpoint uri e.g. crypto-cms:sign sets sign as the operation. Possible values:
sign, verify, encrypt, or decrypt. One of: [sign] [verify] [encrypt] [decrypt]
-camel.sink.path.cryptoOperation=
-# The name part in the URI can be chosen by the user to distinguish between
different signer/verifier/encryptor/decryptor endpoints within the camel
context.
-camel.sink.path.name=
-
diff --git
a/connectors/camel-crypto-cms-kafka-connector/src/main/java/org/apache/camel/kafkaconnector/cryptocms/CamelCryptocmsSinkConnector.java
b/connectors/camel-crypto-cms-kafka-connector/src/main/java/org/apache/camel/kafkaconnector/cryptocms/CamelCryptocmsSinkConnector.java
deleted file mode 100644
index aa9f706..0000000
---
a/connectors/camel-crypto-cms-kafka-connector/src/main/java/org/apache/camel/kafkaconnector/cryptocms/CamelCryptocmsSinkConnector.java
+++ /dev/null
@@ -1,35 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one or more
- * contributor license agreements. See the NOTICE file distributed with
- * this work for additional information regarding copyright ownership.
- * The ASF licenses this file to You under the Apache License, Version 2.0
- * (the "License"); you may not use this file except in compliance with
- * the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-package org.apache.camel.kafkaconnector.cryptocms;
-
-import javax.annotation.Generated;
-import org.apache.camel.kafkaconnector.CamelSinkConnector;
-import org.apache.kafka.common.config.ConfigDef;
-import org.apache.kafka.connect.connector.Task;
-
-@Generated("This class has been generated by
camel-kafka-connector-generator-maven-plugin, remove this annotation to prevent
it from being generated.")
-public class CamelCryptocmsSinkConnector extends CamelSinkConnector {
-
- @Override
- public ConfigDef config() {
- return CamelCryptocmsSinkConnectorConfig.conf();
- }
- @Override
- public Class<? extends Task> taskClass() {
- return CamelCryptocmsSinkTask.class;
- }
-}
\ No newline at end of file
diff --git
a/connectors/camel-crypto-cms-kafka-connector/src/main/java/org/apache/camel/kafkaconnector/cryptocms/CamelCryptocmsSinkConnectorConfig.java
b/connectors/camel-crypto-cms-kafka-connector/src/main/java/org/apache/camel/kafkaconnector/cryptocms/CamelCryptocmsSinkConnectorConfig.java
deleted file mode 100644
index fe30e71..0000000
---
a/connectors/camel-crypto-cms-kafka-connector/src/main/java/org/apache/camel/kafkaconnector/cryptocms/CamelCryptocmsSinkConnectorConfig.java
+++ /dev/null
@@ -1,128 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one or more
- * contributor license agreements. See the NOTICE file distributed with
- * this work for additional information regarding copyright ownership.
- * The ASF licenses this file to You under the Apache License, Version 2.0
- * (the "License"); you may not use this file except in compliance with
- * the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-package org.apache.camel.kafkaconnector.cryptocms;
-
-import java.util.Map;
-import javax.annotation.Generated;
-import org.apache.camel.kafkaconnector.CamelSinkConnectorConfig;
-import org.apache.kafka.common.config.ConfigDef;
-
-@Generated("This class has been generated by
camel-kafka-connector-generator-maven-plugin, remove this annotation to prevent
it from being generated.")
-public class CamelCryptocmsSinkConnectorConfig
- extends
- CamelSinkConnectorConfig {
-
- public static final String CAMEL_SINK_CRYPTOCMS_PATH_CRYPTO_OPERATION_CONF
= "camel.sink.path.cryptoOperation";
- public static final String CAMEL_SINK_CRYPTOCMS_PATH_CRYPTO_OPERATION_DOC
= "Set the Crypto operation from that supplied after the crypto scheme in the
endpoint uri e.g. crypto-cms:sign sets sign as the operation. Possible values:
sign, verify, encrypt, or decrypt. One of: [sign] [verify] [encrypt] [decrypt]";
- public static final String
CAMEL_SINK_CRYPTOCMS_PATH_CRYPTO_OPERATION_DEFAULT = null;
- public static final String CAMEL_SINK_CRYPTOCMS_PATH_NAME_CONF =
"camel.sink.path.name";
- public static final String CAMEL_SINK_CRYPTOCMS_PATH_NAME_DOC = "The name
part in the URI can be chosen by the user to distinguish between different
signer/verifier/encryptor/decryptor endpoints within the camel context.";
- public static final String CAMEL_SINK_CRYPTOCMS_PATH_NAME_DEFAULT = null;
- public static final String CAMEL_SINK_CRYPTOCMS_ENDPOINT_KEY_STORE_CONF =
"camel.sink.endpoint.keyStore";
- public static final String CAMEL_SINK_CRYPTOCMS_ENDPOINT_KEY_STORE_DOC =
"Keystore which contains signer private keys, verifier public keys, encryptor
public keys, decryptor private keys depending on the operation. Use either this
parameter or the parameter 'keyStoreParameters'.";
- public static final String CAMEL_SINK_CRYPTOCMS_ENDPOINT_KEY_STORE_DEFAULT
= null;
- public static final String
CAMEL_SINK_CRYPTOCMS_ENDPOINT_KEY_STORE_PARAMETERS_CONF =
"camel.sink.endpoint.keyStoreParameters";
- public static final String
CAMEL_SINK_CRYPTOCMS_ENDPOINT_KEY_STORE_PARAMETERS_DOC = "Keystore containing
signer private keys, verifier public keys, encryptor public keys, decryptor
private keys depending on the operation. Use either this parameter or the
parameter 'keystore'.";
- public static final String
CAMEL_SINK_CRYPTOCMS_ENDPOINT_KEY_STORE_PARAMETERS_DEFAULT = null;
- public static final String
CAMEL_SINK_CRYPTOCMS_ENDPOINT_LAZY_START_PRODUCER_CONF =
"camel.sink.endpoint.lazyStartProducer";
- public static final String
CAMEL_SINK_CRYPTOCMS_ENDPOINT_LAZY_START_PRODUCER_DOC = "Whether the producer
should be started lazy (on the first message). By starting lazy you can use
this to allow CamelContext and routes to startup in situations where a producer
may otherwise fail during starting and cause the route to fail being started.
By deferring this startup to be lazy then the startup failure can be handled
during routing messages via Camel's routing error handlers. Beware that [...]
- public static final Boolean
CAMEL_SINK_CRYPTOCMS_ENDPOINT_LAZY_START_PRODUCER_DEFAULT = false;
- public static final String CAMEL_SINK_CRYPTOCMS_ENDPOINT_PASSWORD_CONF =
"camel.sink.endpoint.password";
- public static final String CAMEL_SINK_CRYPTOCMS_ENDPOINT_PASSWORD_DOC =
"Sets the password of the private keys. It is assumed that all private keys in
the keystore have the same password. If not set then it is assumed that the
password of the private keys is given by the keystore password given in the
KeyStoreParameters.";
- public static final String CAMEL_SINK_CRYPTOCMS_ENDPOINT_PASSWORD_DEFAULT
= null;
- public static final String CAMEL_SINK_CRYPTOCMS_ENDPOINT_FROM_BASE_64CONF
= "camel.sink.endpoint.fromBase64";
- public static final String CAMEL_SINK_CRYPTOCMS_ENDPOINT_FROM_BASE_64DOC =
"If true then the CMS message is base 64 encoded and must be decoded during the
processing. Default value is false.";
- public static final Boolean
CAMEL_SINK_CRYPTOCMS_ENDPOINT_FROM_BASE_64DEFAULT = false;
- public static final String
CAMEL_SINK_CRYPTOCMS_ENDPOINT_CONTENT_ENCRYPTION_ALGORITHM_CONF =
"camel.sink.endpoint.contentEncryptionAlgorithm";
- public static final String
CAMEL_SINK_CRYPTOCMS_ENDPOINT_CONTENT_ENCRYPTION_ALGORITHM_DOC = "Encryption
algorithm, for example DESede/CBC/PKCS5Padding. Further possible values:
DESede/CBC/PKCS5Padding, AES/CBC/PKCS5Padding, Camellia/CBC/PKCS5Padding,
CAST5/CBC/PKCS5Padding. One of: [AES/CBC/PKCS5Padding]
[DESede/CBC/PKCS5Padding] [Camellia/CBC/PKCS5Padding] [CAST5/CBC/PKCS5Padding]";
- public static final String
CAMEL_SINK_CRYPTOCMS_ENDPOINT_CONTENT_ENCRYPTION_ALGORITHM_DEFAULT = null;
- public static final String
CAMEL_SINK_CRYPTOCMS_ENDPOINT_ORIGINATOR_INFORMATION_PROVIDER_CONF =
"camel.sink.endpoint.originatorInformationProvider";
- public static final String
CAMEL_SINK_CRYPTOCMS_ENDPOINT_ORIGINATOR_INFORMATION_PROVIDER_DOC = "Provider
for the originator info. See https://tools.ietf.org/html/rfc5652#section-6.1.
The default value is null.";
- public static final String
CAMEL_SINK_CRYPTOCMS_ENDPOINT_ORIGINATOR_INFORMATION_PROVIDER_DEFAULT = null;
- public static final String CAMEL_SINK_CRYPTOCMS_ENDPOINT_RECIPIENT_CONF =
"camel.sink.endpoint.recipient";
- public static final String CAMEL_SINK_CRYPTOCMS_ENDPOINT_RECIPIENT_DOC =
"Recipient Info: reference to a bean which implements the interface
org.apache.camel.component.crypto.cms.api.TransRecipientInfo";
- public static final String CAMEL_SINK_CRYPTOCMS_ENDPOINT_RECIPIENT_DEFAULT
= null;
- public static final String
CAMEL_SINK_CRYPTOCMS_ENDPOINT_SECRET_KEY_LENGTH_CONF =
"camel.sink.endpoint.secretKeyLength";
- public static final String
CAMEL_SINK_CRYPTOCMS_ENDPOINT_SECRET_KEY_LENGTH_DOC = "Key length for the
secret symmetric key used for the content encryption. Only used if the
specified content-encryption algorithm allows keys of different sizes. If
contentEncryptionAlgorithm=AES/CBC/PKCS5Padding or Camellia/CBC/PKCS5Padding
then 128; if contentEncryptionAlgorithm=DESede/CBC/PKCS5Padding then 192, 128;
if strong encryption is enabled then for AES/CBC/PKCS5Padding and
Camellia/CBC/PKCS5Pa [...]
- public static final Integer
CAMEL_SINK_CRYPTOCMS_ENDPOINT_SECRET_KEY_LENGTH_DEFAULT = null;
- public static final String
CAMEL_SINK_CRYPTOCMS_ENDPOINT_UNPROTECTED_ATTRIBUTES_GENERATOR_PROVIDER_CONF =
"camel.sink.endpoint.unprotectedAttributesGeneratorProvider";
- public static final String
CAMEL_SINK_CRYPTOCMS_ENDPOINT_UNPROTECTED_ATTRIBUTES_GENERATOR_PROVIDER_DOC =
"Provider of the generator for the unprotected attributes. The default value is
null which means no unprotected attribute is added to the Enveloped Data
object. See https://tools.ietf.org/html/rfc5652#section-6.1.";
- public static final String
CAMEL_SINK_CRYPTOCMS_ENDPOINT_UNPROTECTED_ATTRIBUTES_GENERATOR_PROVIDER_DEFAULT
= null;
- public static final String CAMEL_SINK_CRYPTOCMS_ENDPOINT_TO_BASE_64CONF =
"camel.sink.endpoint.toBase64";
- public static final String CAMEL_SINK_CRYPTOCMS_ENDPOINT_TO_BASE_64DOC =
"Indicates whether the Signed Data or Enveloped Data instance shall be base 64
encoded. Default value is false.";
- public static final String CAMEL_SINK_CRYPTOCMS_ENDPOINT_TO_BASE_64DEFAULT
= "false";
- public static final String
CAMEL_SINK_CRYPTOCMS_ENDPOINT_INCLUDE_CONTENT_CONF =
"camel.sink.endpoint.includeContent";
- public static final String
CAMEL_SINK_CRYPTOCMS_ENDPOINT_INCLUDE_CONTENT_DOC = "Indicates whether the
signed content should be included into the Signed Data instance. If false then
a detached Signed Data instance is created in the header
CamelCryptoCmsSignedData.";
- public static final String
CAMEL_SINK_CRYPTOCMS_ENDPOINT_INCLUDE_CONTENT_DEFAULT = "true";
- public static final String CAMEL_SINK_CRYPTOCMS_ENDPOINT_SIGNER_CONF =
"camel.sink.endpoint.signer";
- public static final String CAMEL_SINK_CRYPTOCMS_ENDPOINT_SIGNER_DOC =
"Signer information: reference to bean(s) which implements
org.apache.camel.component.crypto.cms.api.SignerInfo. Multiple values can be
separated by comma";
- public static final String CAMEL_SINK_CRYPTOCMS_ENDPOINT_SIGNER_DEFAULT =
null;
- public static final String
CAMEL_SINK_CRYPTOCMS_ENDPOINT_SIGNED_DATA_HEADER_BASE_64CONF =
"camel.sink.endpoint.signedDataHeaderBase64";
- public static final String
CAMEL_SINK_CRYPTOCMS_ENDPOINT_SIGNED_DATA_HEADER_BASE_64DOC = "Indicates
whether the value in the header CamelCryptoCmsSignedData is base64 encoded.
Default value is false. Only relevant for detached signatures. In the detached
signature case, the header contains the Signed Data object.";
- public static final Boolean
CAMEL_SINK_CRYPTOCMS_ENDPOINT_SIGNED_DATA_HEADER_BASE_64DEFAULT = false;
- public static final String
CAMEL_SINK_CRYPTOCMS_ENDPOINT_VERIFY_SIGNATURES_OF_ALL_SIGNERS_CONF =
"camel.sink.endpoint.verifySignaturesOfAllSigners";
- public static final String
CAMEL_SINK_CRYPTOCMS_ENDPOINT_VERIFY_SIGNATURES_OF_ALL_SIGNERS_DOC = "If true
then the signatures of all signers contained in the Signed Data object are
verified. If false then only one signature whose signer info matches with one
of the specified certificates is verified. Default value is true.";
- public static final Boolean
CAMEL_SINK_CRYPTOCMS_ENDPOINT_VERIFY_SIGNATURES_OF_ALL_SIGNERS_DEFAULT = true;
- public static final String
CAMEL_SINK_CRYPTOCMS_COMPONENT_LAZY_START_PRODUCER_CONF =
"camel.component.crypto-cms.lazyStartProducer";
- public static final String
CAMEL_SINK_CRYPTOCMS_COMPONENT_LAZY_START_PRODUCER_DOC = "Whether the producer
should be started lazy (on the first message). By starting lazy you can use
this to allow CamelContext and routes to startup in situations where a producer
may otherwise fail during starting and cause the route to fail being started.
By deferring this startup to be lazy then the startup failure can be handled
during routing messages via Camel's routing error handlers. Beware that [...]
- public static final Boolean
CAMEL_SINK_CRYPTOCMS_COMPONENT_LAZY_START_PRODUCER_DEFAULT = false;
- public static final String
CAMEL_SINK_CRYPTOCMS_COMPONENT_AUTOWIRED_ENABLED_CONF =
"camel.component.crypto-cms.autowiredEnabled";
- public static final String
CAMEL_SINK_CRYPTOCMS_COMPONENT_AUTOWIRED_ENABLED_DOC = "Whether autowiring is
enabled. This is used for automatic autowiring options (the option must be
marked as autowired) by looking up in the registry to find if there is a single
instance of matching type, which then gets configured on the component. This
can be used for automatic configuring JDBC data sources, JMS connection
factories, AWS Clients, etc.";
- public static final Boolean
CAMEL_SINK_CRYPTOCMS_COMPONENT_AUTOWIRED_ENABLED_DEFAULT = true;
- public static final String
CAMEL_SINK_CRYPTOCMS_COMPONENT_ENVELOPED_DATA_DECRYPTOR_CONFIGURATION_CONF =
"camel.component.crypto-cms.envelopedDataDecryptorConfiguration";
- public static final String
CAMEL_SINK_CRYPTOCMS_COMPONENT_ENVELOPED_DATA_DECRYPTOR_CONFIGURATION_DOC = "To
configure the shared EnvelopedDataDecryptorConfiguration, which determines the
uri parameters for the decrypt operation.";
- public static final String
CAMEL_SINK_CRYPTOCMS_COMPONENT_ENVELOPED_DATA_DECRYPTOR_CONFIGURATION_DEFAULT =
null;
- public static final String
CAMEL_SINK_CRYPTOCMS_COMPONENT_SIGNED_DATA_VERIFIER_CONFIGURATION_CONF =
"camel.component.crypto-cms.signedDataVerifierConfiguration";
- public static final String
CAMEL_SINK_CRYPTOCMS_COMPONENT_SIGNED_DATA_VERIFIER_CONFIGURATION_DOC = "To
configure the shared SignedDataVerifierConfiguration, which determines the uri
parameters for the verify operation.";
- public static final String
CAMEL_SINK_CRYPTOCMS_COMPONENT_SIGNED_DATA_VERIFIER_CONFIGURATION_DEFAULT =
null;
-
- public CamelCryptocmsSinkConnectorConfig(
- ConfigDef config,
- Map<String, String> parsedConfig) {
- super(config, parsedConfig);
- }
-
- public CamelCryptocmsSinkConnectorConfig(Map<String, String> parsedConfig)
{
- this(conf(), parsedConfig);
- }
-
- public static ConfigDef conf() {
- ConfigDef conf = new ConfigDef(CamelSinkConnectorConfig.conf());
- conf.define(CAMEL_SINK_CRYPTOCMS_PATH_CRYPTO_OPERATION_CONF,
ConfigDef.Type.STRING, CAMEL_SINK_CRYPTOCMS_PATH_CRYPTO_OPERATION_DEFAULT,
ConfigDef.Importance.HIGH, CAMEL_SINK_CRYPTOCMS_PATH_CRYPTO_OPERATION_DOC);
- conf.define(CAMEL_SINK_CRYPTOCMS_PATH_NAME_CONF,
ConfigDef.Type.STRING, CAMEL_SINK_CRYPTOCMS_PATH_NAME_DEFAULT,
ConfigDef.Importance.HIGH, CAMEL_SINK_CRYPTOCMS_PATH_NAME_DOC);
- conf.define(CAMEL_SINK_CRYPTOCMS_ENDPOINT_KEY_STORE_CONF,
ConfigDef.Type.STRING, CAMEL_SINK_CRYPTOCMS_ENDPOINT_KEY_STORE_DEFAULT,
ConfigDef.Importance.MEDIUM, CAMEL_SINK_CRYPTOCMS_ENDPOINT_KEY_STORE_DOC);
- conf.define(CAMEL_SINK_CRYPTOCMS_ENDPOINT_KEY_STORE_PARAMETERS_CONF,
ConfigDef.Type.STRING,
CAMEL_SINK_CRYPTOCMS_ENDPOINT_KEY_STORE_PARAMETERS_DEFAULT,
ConfigDef.Importance.MEDIUM,
CAMEL_SINK_CRYPTOCMS_ENDPOINT_KEY_STORE_PARAMETERS_DOC);
- conf.define(CAMEL_SINK_CRYPTOCMS_ENDPOINT_LAZY_START_PRODUCER_CONF,
ConfigDef.Type.BOOLEAN,
CAMEL_SINK_CRYPTOCMS_ENDPOINT_LAZY_START_PRODUCER_DEFAULT,
ConfigDef.Importance.MEDIUM,
CAMEL_SINK_CRYPTOCMS_ENDPOINT_LAZY_START_PRODUCER_DOC);
- conf.define(CAMEL_SINK_CRYPTOCMS_ENDPOINT_PASSWORD_CONF,
ConfigDef.Type.STRING, CAMEL_SINK_CRYPTOCMS_ENDPOINT_PASSWORD_DEFAULT,
ConfigDef.Importance.MEDIUM, CAMEL_SINK_CRYPTOCMS_ENDPOINT_PASSWORD_DOC);
- conf.define(CAMEL_SINK_CRYPTOCMS_ENDPOINT_FROM_BASE_64CONF,
ConfigDef.Type.BOOLEAN, CAMEL_SINK_CRYPTOCMS_ENDPOINT_FROM_BASE_64DEFAULT,
ConfigDef.Importance.MEDIUM, CAMEL_SINK_CRYPTOCMS_ENDPOINT_FROM_BASE_64DOC);
-
conf.define(CAMEL_SINK_CRYPTOCMS_ENDPOINT_CONTENT_ENCRYPTION_ALGORITHM_CONF,
ConfigDef.Type.STRING,
CAMEL_SINK_CRYPTOCMS_ENDPOINT_CONTENT_ENCRYPTION_ALGORITHM_DEFAULT,
ConfigDef.Importance.MEDIUM,
CAMEL_SINK_CRYPTOCMS_ENDPOINT_CONTENT_ENCRYPTION_ALGORITHM_DOC);
-
conf.define(CAMEL_SINK_CRYPTOCMS_ENDPOINT_ORIGINATOR_INFORMATION_PROVIDER_CONF,
ConfigDef.Type.STRING,
CAMEL_SINK_CRYPTOCMS_ENDPOINT_ORIGINATOR_INFORMATION_PROVIDER_DEFAULT,
ConfigDef.Importance.MEDIUM,
CAMEL_SINK_CRYPTOCMS_ENDPOINT_ORIGINATOR_INFORMATION_PROVIDER_DOC);
- conf.define(CAMEL_SINK_CRYPTOCMS_ENDPOINT_RECIPIENT_CONF,
ConfigDef.Type.STRING, CAMEL_SINK_CRYPTOCMS_ENDPOINT_RECIPIENT_DEFAULT,
ConfigDef.Importance.MEDIUM, CAMEL_SINK_CRYPTOCMS_ENDPOINT_RECIPIENT_DOC);
- conf.define(CAMEL_SINK_CRYPTOCMS_ENDPOINT_SECRET_KEY_LENGTH_CONF,
ConfigDef.Type.INT, CAMEL_SINK_CRYPTOCMS_ENDPOINT_SECRET_KEY_LENGTH_DEFAULT,
ConfigDef.Importance.MEDIUM,
CAMEL_SINK_CRYPTOCMS_ENDPOINT_SECRET_KEY_LENGTH_DOC);
-
conf.define(CAMEL_SINK_CRYPTOCMS_ENDPOINT_UNPROTECTED_ATTRIBUTES_GENERATOR_PROVIDER_CONF,
ConfigDef.Type.STRING,
CAMEL_SINK_CRYPTOCMS_ENDPOINT_UNPROTECTED_ATTRIBUTES_GENERATOR_PROVIDER_DEFAULT,
ConfigDef.Importance.MEDIUM,
CAMEL_SINK_CRYPTOCMS_ENDPOINT_UNPROTECTED_ATTRIBUTES_GENERATOR_PROVIDER_DOC);
- conf.define(CAMEL_SINK_CRYPTOCMS_ENDPOINT_TO_BASE_64CONF,
ConfigDef.Type.STRING, CAMEL_SINK_CRYPTOCMS_ENDPOINT_TO_BASE_64DEFAULT,
ConfigDef.Importance.MEDIUM, CAMEL_SINK_CRYPTOCMS_ENDPOINT_TO_BASE_64DOC);
- conf.define(CAMEL_SINK_CRYPTOCMS_ENDPOINT_INCLUDE_CONTENT_CONF,
ConfigDef.Type.STRING, CAMEL_SINK_CRYPTOCMS_ENDPOINT_INCLUDE_CONTENT_DEFAULT,
ConfigDef.Importance.MEDIUM, CAMEL_SINK_CRYPTOCMS_ENDPOINT_INCLUDE_CONTENT_DOC);
- conf.define(CAMEL_SINK_CRYPTOCMS_ENDPOINT_SIGNER_CONF,
ConfigDef.Type.STRING, CAMEL_SINK_CRYPTOCMS_ENDPOINT_SIGNER_DEFAULT,
ConfigDef.Importance.MEDIUM, CAMEL_SINK_CRYPTOCMS_ENDPOINT_SIGNER_DOC);
-
conf.define(CAMEL_SINK_CRYPTOCMS_ENDPOINT_SIGNED_DATA_HEADER_BASE_64CONF,
ConfigDef.Type.BOOLEAN,
CAMEL_SINK_CRYPTOCMS_ENDPOINT_SIGNED_DATA_HEADER_BASE_64DEFAULT,
ConfigDef.Importance.MEDIUM,
CAMEL_SINK_CRYPTOCMS_ENDPOINT_SIGNED_DATA_HEADER_BASE_64DOC);
-
conf.define(CAMEL_SINK_CRYPTOCMS_ENDPOINT_VERIFY_SIGNATURES_OF_ALL_SIGNERS_CONF,
ConfigDef.Type.BOOLEAN,
CAMEL_SINK_CRYPTOCMS_ENDPOINT_VERIFY_SIGNATURES_OF_ALL_SIGNERS_DEFAULT,
ConfigDef.Importance.MEDIUM,
CAMEL_SINK_CRYPTOCMS_ENDPOINT_VERIFY_SIGNATURES_OF_ALL_SIGNERS_DOC);
- conf.define(CAMEL_SINK_CRYPTOCMS_COMPONENT_LAZY_START_PRODUCER_CONF,
ConfigDef.Type.BOOLEAN,
CAMEL_SINK_CRYPTOCMS_COMPONENT_LAZY_START_PRODUCER_DEFAULT,
ConfigDef.Importance.MEDIUM,
CAMEL_SINK_CRYPTOCMS_COMPONENT_LAZY_START_PRODUCER_DOC);
- conf.define(CAMEL_SINK_CRYPTOCMS_COMPONENT_AUTOWIRED_ENABLED_CONF,
ConfigDef.Type.BOOLEAN,
CAMEL_SINK_CRYPTOCMS_COMPONENT_AUTOWIRED_ENABLED_DEFAULT,
ConfigDef.Importance.MEDIUM,
CAMEL_SINK_CRYPTOCMS_COMPONENT_AUTOWIRED_ENABLED_DOC);
-
conf.define(CAMEL_SINK_CRYPTOCMS_COMPONENT_ENVELOPED_DATA_DECRYPTOR_CONFIGURATION_CONF,
ConfigDef.Type.STRING,
CAMEL_SINK_CRYPTOCMS_COMPONENT_ENVELOPED_DATA_DECRYPTOR_CONFIGURATION_DEFAULT,
ConfigDef.Importance.MEDIUM,
CAMEL_SINK_CRYPTOCMS_COMPONENT_ENVELOPED_DATA_DECRYPTOR_CONFIGURATION_DOC);
-
conf.define(CAMEL_SINK_CRYPTOCMS_COMPONENT_SIGNED_DATA_VERIFIER_CONFIGURATION_CONF,
ConfigDef.Type.STRING,
CAMEL_SINK_CRYPTOCMS_COMPONENT_SIGNED_DATA_VERIFIER_CONFIGURATION_DEFAULT,
ConfigDef.Importance.MEDIUM,
CAMEL_SINK_CRYPTOCMS_COMPONENT_SIGNED_DATA_VERIFIER_CONFIGURATION_DOC);
- return conf;
- }
-}
\ No newline at end of file
diff --git
a/connectors/camel-crypto-cms-kafka-connector/src/main/java/org/apache/camel/kafkaconnector/cryptocms/CamelCryptocmsSinkTask.java
b/connectors/camel-crypto-cms-kafka-connector/src/main/java/org/apache/camel/kafkaconnector/cryptocms/CamelCryptocmsSinkTask.java
deleted file mode 100644
index 793a54b..0000000
---
a/connectors/camel-crypto-cms-kafka-connector/src/main/java/org/apache/camel/kafkaconnector/cryptocms/CamelCryptocmsSinkTask.java
+++ /dev/null
@@ -1,39 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one or more
- * contributor license agreements. See the NOTICE file distributed with
- * this work for additional information regarding copyright ownership.
- * The ASF licenses this file to You under the Apache License, Version 2.0
- * (the "License"); you may not use this file except in compliance with
- * the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-package org.apache.camel.kafkaconnector.cryptocms;
-
-import java.util.HashMap;
-import java.util.Map;
-import javax.annotation.Generated;
-import org.apache.camel.kafkaconnector.CamelSinkConnectorConfig;
-import org.apache.camel.kafkaconnector.CamelSinkTask;
-
-@Generated("This class has been generated by
camel-kafka-connector-generator-maven-plugin, remove this annotation to prevent
it from being generated.")
-public class CamelCryptocmsSinkTask extends CamelSinkTask {
-
- @Override
- protected CamelSinkConnectorConfig getCamelSinkConnectorConfig(
- Map<String, String> props) {
- return new CamelCryptocmsSinkConnectorConfig(props);
- }
- @Override
- protected Map<String, String> getDefaultConfig() {
- return new HashMap<String, String>() {{
- put(CamelSinkConnectorConfig.CAMEL_SINK_COMPONENT_CONF,
"crypto-cms");
- }};
- }
-}
\ No newline at end of file
diff --git
a/connectors/camel-crypto-cms-kafka-connector/src/main/resources/META-INF/LICENSE.txt
b/connectors/camel-crypto-cms-kafka-connector/src/main/resources/META-INF/LICENSE.txt
deleted file mode 100644
index 6b0b127..0000000
---
a/connectors/camel-crypto-cms-kafka-connector/src/main/resources/META-INF/LICENSE.txt
+++ /dev/null
@@ -1,203 +0,0 @@
-
- Apache License
- Version 2.0, January 2004
- http://www.apache.org/licenses/
-
- TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
-
- 1. Definitions.
-
- "License" shall mean the terms and conditions for use, reproduction,
- and distribution as defined by Sections 1 through 9 of this document.
-
- "Licensor" shall mean the copyright owner or entity authorized by
- the copyright owner that is granting the License.
-
- "Legal Entity" shall mean the union of the acting entity and all
- other entities that control, are controlled by, or are under common
- control with that entity. For the purposes of this definition,
- "control" means (i) the power, direct or indirect, to cause the
- direction or management of such entity, whether by contract or
- otherwise, or (ii) ownership of fifty percent (50%) or more of the
- outstanding shares, or (iii) beneficial ownership of such entity.
-
- "You" (or "Your") shall mean an individual or Legal Entity
- exercising permissions granted by this License.
-
- "Source" form shall mean the preferred form for making modifications,
- including but not limited to software source code, documentation
- source, and configuration files.
-
- "Object" form shall mean any form resulting from mechanical
- transformation or translation of a Source form, including but
- not limited to compiled object code, generated documentation,
- and conversions to other media types.
-
- "Work" shall mean the work of authorship, whether in Source or
- Object form, made available under the License, as indicated by a
- copyright notice that is included in or attached to the work
- (an example is provided in the Appendix below).
-
- "Derivative Works" shall mean any work, whether in Source or Object
- form, that is based on (or derived from) the Work and for which the
- editorial revisions, annotations, elaborations, or other modifications
- represent, as a whole, an original work of authorship. For the purposes
- of this License, Derivative Works shall not include works that remain
- separable from, or merely link (or bind by name) to the interfaces of,
- the Work and Derivative Works thereof.
-
- "Contribution" shall mean any work of authorship, including
- the original version of the Work and any modifications or additions
- to that Work or Derivative Works thereof, that is intentionally
- submitted to Licensor for inclusion in the Work by the copyright owner
- or by an individual or Legal Entity authorized to submit on behalf of
- the copyright owner. For the purposes of this definition, "submitted"
- means any form of electronic, verbal, or written communication sent
- to the Licensor or its representatives, including but not limited to
- communication on electronic mailing lists, source code control systems,
- and issue tracking systems that are managed by, or on behalf of, the
- Licensor for the purpose of discussing and improving the Work, but
- excluding communication that is conspicuously marked or otherwise
- designated in writing by the copyright owner as "Not a Contribution."
-
- "Contributor" shall mean Licensor and any individual or Legal Entity
- on behalf of whom a Contribution has been received by Licensor and
- subsequently incorporated within the Work.
-
- 2. Grant of Copyright License. Subject to the terms and conditions of
- this License, each Contributor hereby grants to You a perpetual,
- worldwide, non-exclusive, no-charge, royalty-free, irrevocable
- copyright license to reproduce, prepare Derivative Works of,
- publicly display, publicly perform, sublicense, and distribute the
- Work and such Derivative Works in Source or Object form.
-
- 3. Grant of Patent License. Subject to the terms and conditions of
- this License, each Contributor hereby grants to You a perpetual,
- worldwide, non-exclusive, no-charge, royalty-free, irrevocable
- (except as stated in this section) patent license to make, have made,
- use, offer to sell, sell, import, and otherwise transfer the Work,
- where such license applies only to those patent claims licensable
- by such Contributor that are necessarily infringed by their
- Contribution(s) alone or by combination of their Contribution(s)
- with the Work to which such Contribution(s) was submitted. If You
- institute patent litigation against any entity (including a
- cross-claim or counterclaim in a lawsuit) alleging that the Work
- or a Contribution incorporated within the Work constitutes direct
- or contributory patent infringement, then any patent licenses
- granted to You under this License for that Work shall terminate
- as of the date such litigation is filed.
-
- 4. Redistribution. You may reproduce and distribute copies of the
- Work or Derivative Works thereof in any medium, with or without
- modifications, and in Source or Object form, provided that You
- meet the following conditions:
-
- (a) You must give any other recipients of the Work or
- Derivative Works a copy of this License; and
-
- (b) You must cause any modified files to carry prominent notices
- stating that You changed the files; and
-
- (c) You must retain, in the Source form of any Derivative Works
- that You distribute, all copyright, patent, trademark, and
- attribution notices from the Source form of the Work,
- excluding those notices that do not pertain to any part of
- the Derivative Works; and
-
- (d) If the Work includes a "NOTICE" text file as part of its
- distribution, then any Derivative Works that You distribute must
- include a readable copy of the attribution notices contained
- within such NOTICE file, excluding those notices that do not
- pertain to any part of the Derivative Works, in at least one
- of the following places: within a NOTICE text file distributed
- as part of the Derivative Works; within the Source form or
- documentation, if provided along with the Derivative Works; or,
- within a display generated by the Derivative Works, if and
- wherever such third-party notices normally appear. The contents
- of the NOTICE file are for informational purposes only and
- do not modify the License. You may add Your own attribution
- notices within Derivative Works that You distribute, alongside
- or as an addendum to the NOTICE text from the Work, provided
- that such additional attribution notices cannot be construed
- as modifying the License.
-
- You may add Your own copyright statement to Your modifications and
- may provide additional or different license terms and conditions
- for use, reproduction, or distribution of Your modifications, or
- for any such Derivative Works as a whole, provided Your use,
- reproduction, and distribution of the Work otherwise complies with
- the conditions stated in this License.
-
- 5. Submission of Contributions. Unless You explicitly state otherwise,
- any Contribution intentionally submitted for inclusion in the Work
- by You to the Licensor shall be under the terms and conditions of
- this License, without any additional terms or conditions.
- Notwithstanding the above, nothing herein shall supersede or modify
- the terms of any separate license agreement you may have executed
- with Licensor regarding such Contributions.
-
- 6. Trademarks. This License does not grant permission to use the trade
- names, trademarks, service marks, or product names of the Licensor,
- except as required for reasonable and customary use in describing the
- origin of the Work and reproducing the content of the NOTICE file.
-
- 7. Disclaimer of Warranty. Unless required by applicable law or
- agreed to in writing, Licensor provides the Work (and each
- Contributor provides its Contributions) on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
- implied, including, without limitation, any warranties or conditions
- of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
- PARTICULAR PURPOSE. You are solely responsible for determining the
- appropriateness of using or redistributing the Work and assume any
- risks associated with Your exercise of permissions under this License.
-
- 8. Limitation of Liability. In no event and under no legal theory,
- whether in tort (including negligence), contract, or otherwise,
- unless required by applicable law (such as deliberate and grossly
- negligent acts) or agreed to in writing, shall any Contributor be
- liable to You for damages, including any direct, indirect, special,
- incidental, or consequential damages of any character arising as a
- result of this License or out of the use or inability to use the
- Work (including but not limited to damages for loss of goodwill,
- work stoppage, computer failure or malfunction, or any and all
- other commercial damages or losses), even if such Contributor
- has been advised of the possibility of such damages.
-
- 9. Accepting Warranty or Additional Liability. While redistributing
- the Work or Derivative Works thereof, You may choose to offer,
- and charge a fee for, acceptance of support, warranty, indemnity,
- or other liability obligations and/or rights consistent with this
- License. However, in accepting such obligations, You may act only
- on Your own behalf and on Your sole responsibility, not on behalf
- of any other Contributor, and only if You agree to indemnify,
- defend, and hold each Contributor harmless for any liability
- incurred by, or claims asserted against, such Contributor by reason
- of your accepting any such warranty or additional liability.
-
- END OF TERMS AND CONDITIONS
-
- APPENDIX: How to apply the Apache License to your work.
-
- To apply the Apache License to your work, attach the following
- boilerplate notice, with the fields enclosed by brackets "[]"
- replaced with your own identifying information. (Don't include
- the brackets!) The text should be enclosed in the appropriate
- comment syntax for the file format. We also recommend that a
- file or class name and description of purpose be included on the
- same "printed page" as the copyright notice for easier
- identification within third-party archives.
-
- Copyright [yyyy] [name of copyright owner]
-
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
-
diff --git
a/connectors/camel-crypto-cms-kafka-connector/src/main/resources/META-INF/NOTICE.txt
b/connectors/camel-crypto-cms-kafka-connector/src/main/resources/META-INF/NOTICE.txt
deleted file mode 100644
index 2e215bf..0000000
---
a/connectors/camel-crypto-cms-kafka-connector/src/main/resources/META-INF/NOTICE.txt
+++ /dev/null
@@ -1,11 +0,0 @@
- =========================================================================
- == NOTICE file corresponding to the section 4 d of ==
- == the Apache License, Version 2.0, ==
- == in this case for the Apache Camel distribution. ==
- =========================================================================
-
- This product includes software developed by
- The Apache Software Foundation (http://www.apache.org/).
-
- Please read the different LICENSE files present in the licenses directory of
- this distribution.
diff --git a/connectors/pom.xml b/connectors/pom.xml
index 002df08..b8b8a03 100644
--- a/connectors/pom.xml
+++ b/connectors/pom.xml
@@ -262,7 +262,6 @@
<module>camel-couchdb-kafka-connector</module>
<module>camel-cql-kafka-connector</module>
<module>camel-cron-kafka-connector</module>
- <module>camel-crypto-cms-kafka-connector</module>
<module>camel-crypto-kafka-connector</module>
<module>camel-cxf-kafka-connector</module>
<module>camel-cxfrs-kafka-connector</module>