(camel) 01/01: CAMEL-20457: camel-core - Fix NPE in split parallel timeout without agg strategy.
This is an automated email from the ASF dual-hosted git repository. davsclaus pushed a commit to branch split in repository https://gitbox.apache.org/repos/asf/camel.git commit ced01fcee8d0babc1e03012b5df2d657ea734d1d Author: Claus Ibsen AuthorDate: Sat Feb 24 08:59:34 2024 +0100 CAMEL-20457: camel-core - Fix NPE in split parallel timeout without agg strategy. --- .../apache/camel/processor/MulticastProcessor.java | 7 +- ...itParallelTimeoutNoAggregationStrategyTest.java | 79 ++ 2 files changed, 84 insertions(+), 2 deletions(-) diff --git a/core/camel-core-processor/src/main/java/org/apache/camel/processor/MulticastProcessor.java b/core/camel-core-processor/src/main/java/org/apache/camel/processor/MulticastProcessor.java index 0a2333ba89a..89f946fa4e7 100644 --- a/core/camel-core-processor/src/main/java/org/apache/camel/processor/MulticastProcessor.java +++ b/core/camel-core-processor/src/main/java/org/apache/camel/processor/MulticastProcessor.java @@ -469,9 +469,12 @@ public class MulticastProcessor extends AsyncProcessorSupport Exchange exchange = completion.pollUnordered(); int index = exchange != null ? getExchangeIndex(exchange) : nbExchangeSent.get(); while (nbAggregated.get() < index) { +int idx = nbAggregated.getAndIncrement(); AggregationStrategy strategy = getAggregationStrategy(null); -strategy.timeout(result.get() != null ? result.get() : original, -nbAggregated.getAndIncrement(), nbExchangeSent.get(), timeout); +if (strategy != null) { +strategy.timeout(result.get() != null ? result.get() : original, +idx, nbExchangeSent.get(), timeout); +} } if (exchange != null) { doAggregate(result, exchange, original); diff --git a/core/camel-core/src/test/java/org/apache/camel/processor/SplitParallelTimeoutNoAggregationStrategyTest.java b/core/camel-core/src/test/java/org/apache/camel/processor/SplitParallelTimeoutNoAggregationStrategyTest.java new file mode 100644 index 000..6464d4da4bd --- /dev/null +++ b/core/camel-core/src/test/java/org/apache/camel/processor/SplitParallelTimeoutNoAggregationStrategyTest.java @@ -0,0 +1,79 @@ +/* + * Licensed to the Apache Software Foundation (ASF) under one or more + * contributor license agreements. See the NOTICE file distributed with + * this work for additional information regarding copyright ownership. + * The ASF licenses this file to You under the Apache License, Version 2.0 + * (the "License"); you may not use this file except in compliance with + * the License. You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +package org.apache.camel.processor; + +import java.util.concurrent.Phaser; +import java.util.concurrent.TimeUnit; + +import org.apache.camel.ContextTestSupport; +import org.apache.camel.builder.RouteBuilder; +import org.apache.camel.component.mock.MockEndpoint; +import org.junit.jupiter.api.Assumptions; +import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.Test; +import org.junit.jupiter.api.Timeout; +import org.junit.jupiter.api.parallel.Isolated; + +@Isolated +@Timeout(60) +public class SplitParallelTimeoutNoAggregationStrategyTest extends ContextTestSupport { + +private final Phaser phaser = new Phaser(3); + +@BeforeEach +void sendEarly() { +Assumptions.assumeTrue(context.isStarted(), "The test cannot be run because the context is not started"); +template.sendBody("direct:start", "A,B,C"); +} + +@Test +public void testSplitTimeout() throws Exception { +MockEndpoint mock = getMockEndpoint("mock:result"); +// A will timeout so we only get B and/or C +mock.message(0).body().not(body().contains("A")); + +phaser.awaitAdvanceInterruptibly(0, 5000, TimeUnit.SECONDS); + +assertMockEndpointsSatisfied(); +} + +@Override +protected RouteBuilder createRouteBuilder() throws Exception { +return new RouteBuilder() { +@Override +public void configure() throws Exception { +from("direct:start") + .split(body().tokenize(",")).parallelProcessing().timeout(100) +.choice() +
(camel) branch split created (now ced01fcee8d)
This is an automated email from the ASF dual-hosted git repository. davsclaus pushed a change to branch split in repository https://gitbox.apache.org/repos/asf/camel.git at ced01fcee8d CAMEL-20457: camel-core - Fix NPE in split parallel timeout without agg strategy. This branch includes the following new commits: new ced01fcee8d CAMEL-20457: camel-core - Fix NPE in split parallel timeout without agg strategy. The 1 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "add" were already present in the repository and have only been added to this reference.
Re: [PR] [Github Actions] Periodic Sync Camel Spring Boot (Camel 4) [camel-spring-boot]
davsclaus closed pull request #1091: [Github Actions] Periodic Sync Camel Spring Boot (Camel 4) URL: https://github.com/apache/camel-spring-boot/pull/1091 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
Re: [PR] Update chuck-norris-source.kamelet.yaml [camel-spring-boot-examples]
davsclaus merged PR #124: URL: https://github.com/apache/camel-spring-boot-examples/pull/124 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
(camel-spring-boot-examples) branch main updated: Update chuck-norris-source.kamelet.yaml (#124)
This is an automated email from the ASF dual-hosted git repository. davsclaus pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-spring-boot-examples.git The following commit(s) were added to refs/heads/main by this push: new 0776329 Update chuck-norris-source.kamelet.yaml (#124) 0776329 is described below commit 07763295cd25d417a52aba191380cbaff4d1c1a1 Author: Nimo <2087890+foundingn...@users.noreply.github.com> AuthorDate: Sat Feb 24 17:41:57 2024 +1100 Update chuck-norris-source.kamelet.yaml (#124) Fix typo --- .../src/main/resources/kamelets/chuck-norris-source.kamelet.yaml| 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kamelet-chucknorris/src/main/resources/kamelets/chuck-norris-source.kamelet.yaml b/kamelet-chucknorris/src/main/resources/kamelets/chuck-norris-source.kamelet.yaml index e62299b..6fc962d 100644 --- a/kamelet-chucknorris/src/main/resources/kamelets/chuck-norris-source.kamelet.yaml +++ b/kamelet-chucknorris/src/main/resources/kamelets/chuck-norris-source.kamelet.yaml @@ -14,7 +14,7 @@ spec: definition: title: "Chuck Norris Source" description: |- - Gets peridically Chuck Norris jokes from http://www.icndb.com/ + Gets periodically Chuck Norris jokes from http://www.icndb.com/ type: object properties: period:
[PR] Update chuck-norris-source.kamelet.yaml [camel-spring-boot-examples]
foundingnimo opened a new pull request, #124: URL: https://github.com/apache/camel-spring-boot-examples/pull/124 Fix typo -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
(camel-kamelets) branch main updated: Updated CHANGELOG.md
This is an automated email from the ASF dual-hosted git repository. github-bot pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git The following commit(s) were added to refs/heads/main by this push: new 123f6538 Updated CHANGELOG.md 123f6538 is described below commit 123f6538831daa2aa73a8b9d2d0e91c58ec0fa50 Author: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com> AuthorDate: Sat Feb 24 03:08:42 2024 + Updated CHANGELOG.md --- CHANGELOG.md | 4 1 file changed, 4 insertions(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index 25c63d6c..be55176b 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -6,7 +6,11 @@ **Closed issues:** +- Kafka Apicurio Secured Sink Kamelet [\#1916](https://github.com/apache/camel-kamelets/issues/1916) +- Kafka Apicurio Secured Source Kamelet [\#1915](https://github.com/apache/camel-kamelets/issues/1915) - Release Camel-Kamelets 4.4.0 [\#1902](https://github.com/apache/camel-kamelets/issues/1902) +- Kafka Schema Registries: Support HTTPS of Apicurio Registry [\#1786](https://github.com/apache/camel-kamelets/issues/1786) +- Kafka Schema Registries: Support authentication mechanisms for Apicurio Registry [\#1684](https://github.com/apache/camel-kamelets/issues/1684) ## [v4.4.0](https://github.com/apache/camel-kamelets/tree/v4.4.0) (2024-02-19)
Re: [I] [CI] - Quarkus Main Branch Build Failure [camel-quarkus]
github-actions[bot] commented on issue #2926: URL: https://github.com/apache/camel-quarkus/issues/2926#issuecomment-1962220492 The [quarkus-main](https://github.com/apache/camel-quarkus/tree/quarkus-main) branch build has failed: * Build ID: 8027495795-1402-cd814ecc-ac12-4ec8-a20c-551eed2cb410 * Camel Quarkus Commit: 4c8d7ac6d5b44c4731562171eda19d5cc29aa289 * Quarkus Main Commit: fd57971cd8d97d3c0cb3402f5d2f897248b2ce69 * Link to build: https://github.com/apache/camel-quarkus/actions/runs/8027495795 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
(camel-k) branch release-2.2.x updated: chore: changelog automatic update
This is an automated email from the ASF dual-hosted git repository. github-bot pushed a commit to branch release-2.2.x in repository https://gitbox.apache.org/repos/asf/camel-k.git The following commit(s) were added to refs/heads/release-2.2.x by this push: new 65e44218f chore: changelog automatic update 65e44218f is described below commit 65e44218f954fcaa7f14aefc5f6e9933557a4466 Author: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com> AuthorDate: Sat Feb 24 01:11:12 2024 + chore: changelog automatic update --- CHANGELOG.md | 1 + 1 file changed, 1 insertion(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index 87eb44004..29c772ff0 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -6,6 +6,7 @@ **Closed issues:** +- Debug Integrations failing [\#5161](https://github.com/apache/camel-k/issues/5161) - Performance regression due to configmap/secrets whole cluster watch [\#5143](https://github.com/apache/camel-k/issues/5143) - camel-jackson configure configure "autoDiscoverObjectMapper" property for non-spring boot application [\#5140](https://github.com/apache/camel-k/issues/5140) - Integrations remain in Initialization loop when referenced config map has owner references [\#5114](https://github.com/apache/camel-k/issues/5114)
(camel-k) branch release-2.1.x updated: chore: changelog automatic update
This is an automated email from the ASF dual-hosted git repository. github-bot pushed a commit to branch release-2.1.x in repository https://gitbox.apache.org/repos/asf/camel-k.git The following commit(s) were added to refs/heads/release-2.1.x by this push: new 160a75236 chore: changelog automatic update 160a75236 is described below commit 160a752360794a8eab6acfe14efb58d6f2d5340c Author: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com> AuthorDate: Sat Feb 24 00:26:37 2024 + chore: changelog automatic update --- CHANGELOG.md | 1 + 1 file changed, 1 insertion(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index 87eb44004..29c772ff0 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -6,6 +6,7 @@ **Closed issues:** +- Debug Integrations failing [\#5161](https://github.com/apache/camel-k/issues/5161) - Performance regression due to configmap/secrets whole cluster watch [\#5143](https://github.com/apache/camel-k/issues/5143) - camel-jackson configure configure "autoDiscoverObjectMapper" property for non-spring boot application [\#5140](https://github.com/apache/camel-k/issues/5140) - Integrations remain in Initialization loop when referenced config map has owner references [\#5114](https://github.com/apache/camel-k/issues/5114)
(camel-k) branch main updated: chore: nightly automatic updates
This is an automated email from the ASF dual-hosted git repository. github-bot pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-k.git The following commit(s) were added to refs/heads/main by this push: new 08582b239 chore: nightly automatic updates 08582b239 is described below commit 08582b2397cefdb5249880378cfd0a043248688f Author: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com> AuthorDate: Fri Feb 23 23:45:54 2024 + chore: nightly automatic updates --- CHANGELOG.md | 3 +++ coverage.out | 8 2 files changed, 7 insertions(+), 4 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index a9500b6b9..1d89334be 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -6,6 +6,7 @@ **Closed issues:** +- Debug Integrations failing [\#5161](https://github.com/apache/camel-k/issues/5161) - Performance regression due to configmap/secrets whole cluster watch [\#5143](https://github.com/apache/camel-k/issues/5143) - camel-jackson configure configure "autoDiscoverObjectMapper" property for non-spring boot application [\#5140](https://github.com/apache/camel-k/issues/5140) - Integrations remain in Initialization loop when referenced config map has owner references [\#5114](https://github.com/apache/camel-k/issues/5114) @@ -45,6 +46,8 @@ **Merged pull requests:** +- chore\(deps\): bump github.com/prometheus/common from 0.47.0 to 0.48.0 [\#5177](https://github.com/apache/camel-k/pull/5177) ([dependabot[bot]](https://github.com/apps/dependabot)) +- fix\(ctrl\): calculate digest on spec traits [\#5176](https://github.com/apache/camel-k/pull/5176) ([squakez](https://github.com/squakez)) - chore\(deps\): bump go.uber.org/zap from 1.26.0 to 1.27.0 [\#5171](https://github.com/apache/camel-k/pull/5171) ([dependabot[bot]](https://github.com/apps/dependabot)) - fix\(\#3433\): Deprecate platform trait create default option [\#5170](https://github.com/apache/camel-k/pull/5170) ([christophd](https://github.com/christophd)) - Move KameletRepositorySpec to common types [\#5168](https://github.com/apache/camel-k/pull/5168) ([christophd](https://github.com/christophd)) diff --git a/coverage.out b/coverage.out index dfc5d8c9a..4ff6fd19e 100644 --- a/coverage.out +++ b/coverage.out @@ -1824,14 +1824,14 @@ github.com/apache/camel-k/v2/pkg/util/defaults/defaults_support.go:40: Insta github.com/apache/camel-k/v2/pkg/util/defaults/defaults_support.go:44: OperatorID 100.0% github.com/apache/camel-k/v2/pkg/util/defaults/defaults_support.go:48: boolEnvOrDefault 100.0% github.com/apache/camel-k/v2/pkg/util/defaults/defaults_support.go:58: envOrDefault 100.0% -github.com/apache/camel-k/v2/pkg/util/digest/digest.go:50: ComputeForIntegration 54.5% -github.com/apache/camel-k/v2/pkg/util/digest/digest.go:207: computeForTrait 0.0% -github.com/apache/camel-k/v2/pkg/util/digest/digest.go:230: computeForTraitProps 0.0% +github.com/apache/camel-k/v2/pkg/util/digest/digest.go:50: ComputeForIntegration 57.1% +github.com/apache/camel-k/v2/pkg/util/digest/digest.go:207: computeForTrait 41.7% +github.com/apache/camel-k/v2/pkg/util/digest/digest.go:230: computeForTraitProps 80.0% github.com/apache/camel-k/v2/pkg/util/digest/digest.go:241: toMap 71.4% github.com/apache/camel-k/v2/pkg/util/digest/digest.go:256: ComputeForIntegrationKit 0.0% github.com/apache/camel-k/v2/pkg/util/digest/digest.go:284: ComputeForResource 0.0% github.com/apache/camel-k/v2/pkg/util/digest/digest.go:313: ComputeForSource 0.0% -github.com/apache/camel-k/v2/pkg/util/digest/digest.go:356: sortedTraitsMapKeys 71.4% +github.com/apache/camel-k/v2/pkg/util/digest/digest.go:356: sortedTraitsMapKeys 100.0%
(camel-karavan) branch main updated: Fix #1145
This is an automated email from the ASF dual-hosted git repository. marat pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-karavan.git The following commit(s) were added to refs/heads/main by this push: new 2f5e3892 Fix #1145 2f5e3892 is described below commit 2f5e3892a470e054a03b342682f1a885bf5bc7ba Author: Marat Gubaidullin AuthorDate: Fri Feb 23 17:08:59 2024 -0500 Fix #1145 --- .../src/main/resources/snippets/kubernetes-application.properties | 3 ++- karavan-app/src/main/resources/snippets/kubernetes-build.sh| 2 ++ .../src/main/resources/snippets/kubernetes-builder-env.properties | 2 +- 3 files changed, 5 insertions(+), 2 deletions(-) diff --git a/karavan-app/src/main/resources/snippets/kubernetes-application.properties b/karavan-app/src/main/resources/snippets/kubernetes-application.properties index 832343a9..09418d44 100644 --- a/karavan-app/src/main/resources/snippets/kubernetes-application.properties +++ b/karavan-app/src/main/resources/snippets/kubernetes-application.properties @@ -21,10 +21,11 @@ camel.routecontroller.threadPoolSize=3 camel.context.dev-console=true label.runtime=app.kubernetes.io/runtime jib.from.image=gcr.io/distroless/java17@sha256:85c2fa20773270fe6fecf576dd5a53f5bb8b914e57a463c533dac034c51862d9 +#jib.from.image=gcr.io/distroless/java17-debian11:nonroot-arm64 jkube.version=1.16.0 jkube.skip.build=true jkube.namespace=default -jkube.imagePullPolicy=IfNotPresent +jkube.imagePullPolicy=Always jkube.enricher.jkube-controller.type=Deployment jkube.enricher.jkube-controller.replicaCount=1 jkube.enricher.jkube-service.port=80:8080,443:8080 diff --git a/karavan-app/src/main/resources/snippets/kubernetes-build.sh b/karavan-app/src/main/resources/snippets/kubernetes-build.sh index bbfffbb0..ba8fd596 100644 --- a/karavan-app/src/main/resources/snippets/kubernetes-build.sh +++ b/karavan-app/src/main/resources/snippets/kubernetes-build.sh @@ -26,6 +26,8 @@ export NAMESPACE=$(cat /var/run/secrets/kubernetes.io/serviceaccount/namespace) mvn package jib:build k8s:resource k8s:apply \ -Djkube.namespace=${NAMESPACE} \ -Djib.allowInsecureRegistries=true \ +# -Djib.from.platforms=linux/arm64 \ +# -Djib.platform.architecture=arm64 \ -Djib.to.image=${IMAGE_REGISTRY}/${IMAGE_GROUP}/${PROJECT_ID}:${TAG} \ -Djib.to.auth.username=${IMAGE_REGISTRY_USERNAME} \ -Djib.to.auth.password=${IMAGE_REGISTRY_PASSWORD} \ No newline at end of file diff --git a/karavan-app/src/main/resources/snippets/kubernetes-builder-env.properties b/karavan-app/src/main/resources/snippets/kubernetes-builder-env.properties index 5e13d78f..77996d19 100644 --- a/karavan-app/src/main/resources/snippets/kubernetes-builder-env.properties +++ b/karavan-app/src/main/resources/snippets/kubernetes-builder-env.properties @@ -1,6 +1,6 @@ IMAGE_REGISTRY=karavan:karavan.container-image.registry IMAGE_REGISTRY_USERNAME=karavan:karavan.container-image.registry-username -IMAGE_REGISTRY_PASSWORD=karavan:karavan.container-image.password +IMAGE_REGISTRY_PASSWORD=karavan:karavan.container-image.registry-password IMAGE_GROUP=karavan:karavan.container-image.group GIT_REPOSITORY=karavan:karavan.git.repository GIT_USERNAME=karavan:karavan.git.username
Re: [I] Karavan should build correct images on minikube on M2 [camel-karavan]
mgubaidullin closed issue #1145: Karavan should build correct images on minikube on M2 URL: https://github.com/apache/camel-karavan/issues/1145 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
(camel-karavan) 02/02: Add kubernetes-builder-env.properties
This is an automated email from the ASF dual-hosted git repository. marat pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-karavan.git commit a9a54a92c4144677010d31ca91bfcd7605c3b1c6 Author: Marat Gubaidullin AuthorDate: Fri Feb 23 15:57:48 2024 -0500 Add kubernetes-builder-env.properties --- .../java/org/apache/camel/karavan/code/CodeService.java | 1 + .../resources/snippets/kubernetes-builder-env.properties | 16 2 files changed, 9 insertions(+), 8 deletions(-) diff --git a/karavan-app/src/main/java/org/apache/camel/karavan/code/CodeService.java b/karavan-app/src/main/java/org/apache/camel/karavan/code/CodeService.java index 89e5298d..3b2f9df9 100644 --- a/karavan-app/src/main/java/org/apache/camel/karavan/code/CodeService.java +++ b/karavan-app/src/main/java/org/apache/camel/karavan/code/CodeService.java @@ -199,6 +199,7 @@ public class CodeService { files.addAll(targets.stream().map(target -> target + "-" + APPLICATION_PROPERTIES_FILENAME).toList()); files.addAll(targets.stream().map(target -> target + "-" + BUILD_SCRIPT_FILENAME).toList()); files.addAll(blockList); +files.add(BUILDER_ENV_MAPPING_FILENAME); files.addAll(getBeanTemplateNames()); diff --git a/karavan-app/src/main/resources/snippets/kubernetes-builder-env.properties b/karavan-app/src/main/resources/snippets/kubernetes-builder-env.properties index 5c11b05d..5e13d78f 100644 --- a/karavan-app/src/main/resources/snippets/kubernetes-builder-env.properties +++ b/karavan-app/src/main/resources/snippets/kubernetes-builder-env.properties @@ -1,8 +1,8 @@ -IMAGE_REGISTRY=karavan:image-registry -IMAGE_REGISTRY_USERNAME=karavan:image-registry-username -IMAGE_REGISTRY_PASSWORD=karavan:image-password -IMAGE_GROUP=karavan:image-group -GIT_REPOSITORY=karavan:git-repository -GIT_USERNAME=karavan:git-username -GIT_PASSWORD=karavan:git-password -GIT_BRANCH=karavan:git-branch \ No newline at end of file +IMAGE_REGISTRY=karavan:karavan.container-image.registry +IMAGE_REGISTRY_USERNAME=karavan:karavan.container-image.registry-username +IMAGE_REGISTRY_PASSWORD=karavan:karavan.container-image.password +IMAGE_GROUP=karavan:karavan.container-image.group +GIT_REPOSITORY=karavan:karavan.git.repository +GIT_USERNAME=karavan:karavan.git.username +GIT_PASSWORD=karavan:karavan.git.password +GIT_BRANCH=karavan:karavan.git.branch \ No newline at end of file
(camel-karavan) 01/02: Deploy to minikube
This is an automated email from the ASF dual-hosted git repository. marat pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-karavan.git commit 437f635ef69a4d80df99599b3ecac4c90b3a9e25 Author: Marat Gubaidullin AuthorDate: Fri Feb 23 15:49:23 2024 -0500 Deploy to minikube --- docs/README.md | 3 +- docs/WEB_OPENSHIFT.md | 65 -- docs/install/karavan-kubernetes/kustomization.yaml | 7 +++ docs/install/karavan-kubernetes/nodePort.yaml | 14 + 4 files changed, 22 insertions(+), 67 deletions(-) diff --git a/docs/README.md b/docs/README.md index a8d26af8..9c3b0fd2 100644 --- a/docs/README.md +++ b/docs/README.md @@ -8,8 +8,7 @@ Karavan Web Application is a container deployed into Docker, Kubernetes or OpenS 1. [Run in Docker](WEB_DOCKER.md) 2. [Run in Kubernetes](WEB_KUBERNETES.md) -3. [Run in Openshift](WEB_OPENSHIFT.md) -4. [How to use](WEB_HOWTO.md) +3. [How to use](WEB_HOWTO.md) ### VS Code extensions diff --git a/docs/WEB_OPENSHIFT.md b/docs/WEB_OPENSHIFT.md deleted file mode 100644 index 46529001.. --- a/docs/WEB_OPENSHIFT.md +++ /dev/null @@ -1,65 +0,0 @@ -## Karavan in Openshift - -### Requirements -1. Openshift v4.13+ and openshift-cli installed - -### Install on OpenShift Local -1. Start OpenShift Local -``` -crc start -``` -2. Get credentials -``` -crc console --credentials -``` -3. Login as an admin -``` -oc login -u kubeadmin -p password https://YOUR_OPENSHIFT_HOST:PORT -``` -4. Install Karavan using Maven - -Download installer from Maven Central: https://repo1.maven.org/maven2/org/apache/camel/karavan/karavan-installer/4.4.0/karavan-installer-4.4.0.jar - -ex. with following command: -``` -mvn org.apache.maven.plugins:maven-dependency-plugin:3.0.2:copy -Dartifact=org.apache.camel.karavan:karavan-installer:4.4.0:jar -DoutputDirectory=. -``` - -Install Karavan with Gitea (for demo purpose) -``` -java -jar karavan-installer-4.4.0.jar --install-gitea - -``` - -5. Install Karavan using Jbang - -Install Karavan with Gitea (for demo purpose) -``` -jbang org.apache.camel.karavan:karavan-installer:4.4.0 --install-gitea -``` - -6. Get karavan route host -``` -oc get route karavan -n karavan -o jsonpath='{.spec.host}' -``` - Use karavan host to connect to the application - - -### Install parameters - -`--namespace` - Namespace -`--node-port` - Node port -`--yaml` - Create YAML file. Do not apply -`--file` - YAML file name, defaultValue = `karavan.yaml` -`--openshift` - Create files for OpenShift - -`--git-repository` - Git repository -`--git-username` - Git username -`--git-password` - Git password -`--git-branch` - Git branch -`--install-gitea` - Install Gitea (for demo purposes), defaultValue = `false` - -`--image-registry` - Image registry -`--image-group` - Image group, defaultValue = `karavan` -`--image-registry-username` - Image registry username -`--image-registry-password` - Image registry password \ No newline at end of file diff --git a/docs/install/karavan-kubernetes/kustomization.yaml b/docs/install/karavan-kubernetes/kustomization.yaml index 488d20e7..a295a9fc 100644 --- a/docs/install/karavan-kubernetes/kustomization.yaml +++ b/docs/install/karavan-kubernetes/kustomization.yaml @@ -14,6 +14,13 @@ resources: - deployment.yaml - service.yaml +# Patch for Service with nodePort +patches: + - path: ./nodePort.yaml +target: + kind: "Service" + name: "karavan" + # Replace secret from.env if required secretGenerator: - name: karavan diff --git a/docs/install/karavan-kubernetes/nodePort.yaml b/docs/install/karavan-kubernetes/nodePort.yaml new file mode 100644 index ..2ec57a04 --- /dev/null +++ b/docs/install/karavan-kubernetes/nodePort.yaml @@ -0,0 +1,14 @@ +apiVersion: "v1" +kind: "Service" +metadata: + name: "karavan" +spec: + ports: + - name: "http" +nodePort: 30777 +port: 80 +protocol: "TCP" +targetPort: 8080 + selector: +app: "karavan" + type: "NodePort" \ No newline at end of file
(camel-karavan) branch main updated (8d19037f -> a9a54a92)
This is an automated email from the ASF dual-hosted git repository. marat pushed a change to branch main in repository https://gitbox.apache.org/repos/asf/camel-karavan.git from 8d19037f Fix #1128 new 437f635e Deploy to minikube new a9a54a92 Add kubernetes-builder-env.properties The 2 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "add" were already present in the repository and have only been added to this reference. Summary of changes: docs/README.md | 3 +- docs/WEB_OPENSHIFT.md | 65 -- docs/install/karavan-kubernetes/kustomization.yaml | 7 +++ .../{service.yaml => nodePort.yaml}| 10 +--- .../org/apache/camel/karavan/code/CodeService.java | 1 + .../snippets/kubernetes-builder-env.properties | 16 +++--- 6 files changed, 19 insertions(+), 83 deletions(-) delete mode 100644 docs/WEB_OPENSHIFT.md copy docs/install/karavan-kubernetes/{service.yaml => nodePort.yaml} (56%)
(camel-karavan) 01/02: Upgrade
This is an automated email from the ASF dual-hosted git repository. marat pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-karavan.git commit 8dd60ca874f3aa808e8c98583233840a79917bcc Author: Marat Gubaidullin AuthorDate: Fri Feb 23 15:28:58 2024 -0500 Upgrade --- .gitignore | 4 +- docs/WEB_DOCKER.md | 49 +++--- docs/WEB_KUBERNETES.md | 47 - .../karavan-docker/docker-compose-gitea.yaml | 2 +- docs/install/karavan-kubernetes/deployment.yaml| 29 +++-- docs/install/karavan-kubernetes/kustomization.yaml | 11 - docs/install/karavan-kubernetes/secret.yaml| 4 +- karavan-app/pom.xml| 17 ++-- .../karavan/kubernetes/KubernetesService.java | 2 +- .../camel/karavan/service/ProjectService.java | 2 + 10 files changed, 69 insertions(+), 98 deletions(-) diff --git a/.gitignore b/.gitignore index f0269644..ae9b466c 100644 --- a/.gitignore +++ b/.gitignore @@ -77,4 +77,6 @@ karavan-cloud/karavan-secret-real.yaml docs/install/karavan-docker/data/* -**/dependency-reduced-pom.xml \ No newline at end of file +**/dependency-reduced-pom.xml + +.env \ No newline at end of file diff --git a/docs/WEB_DOCKER.md b/docs/WEB_DOCKER.md index 835d7111..b0f56aaa 100644 --- a/docs/WEB_DOCKER.md +++ b/docs/WEB_DOCKER.md @@ -5,52 +5,31 @@ 2. Docker Engine 24+ ### How to run Karavan on Docker -1. Create network +1. Download [docker-compose.yaml](install/karavan-docker/docker-compose.yaml) +2. Set Environment Variables for Git Repository and Container Image Registry connections in docker-compose.yaml +2. Create network ``` docker network create karavan ``` -2. Start Karavan with demo features +3. Start Karavan ``` -docker run -it --rm --name karavan \ ---network karavan -p 8080:8080 \ --e KARAVAN_GIT_INSTALL_GITEA=true \ --e KARAVAN_IMAGE_REGISTRY_INSTALL=true \ --v /var/run/docker.sock:/var/run/docker.sock \ -ghcr.io/apache/camel-karavan:4.4.0 +docker compose up ``` 3. Open http://localhost:8080 -### Configuration variables -1. For demo/evaluation purposes: +### How to run Demo Karavan on Docker with Gitea -Install Gitea Git repository +1. Download [karavan-docker](install/karavan-docker) folder +2. Unzip data.zip with Gitea database in karavan-docker folder ``` --e KARAVAN_GIT_INSTALL_GITEA=true +unzip data.zip ``` - -Install Image registry -``` --e KARAVAN_IMAGE_REGISTRY_INSTALL=true -``` - -2. Maven cache -``` --e KARAVAN_MAVEN_CACHE=$YOUR_PATH_TO_MAVEN/.m2 +2. Create network ``` - -3. Git repository +docker network create karavan ``` --e KARAVAN_GIT_REPOSITORY=$YOUR_GIT_REPOSITORY \ --e KARAVAN_GIT_USERNAME=$YOUR_GIT_USERNAME \ --e KARAVAN_GIT_PASSWORD=$YOUR_GIT_PASSWORD \ --e KARAVAN_GIT_BRANCH=$YOUR_GIT_DEFAULT_BRANCH \ +3. Start Karavan ``` - -4. Image registry +docker compose -f docker-compose-gitea.yaml up ``` --e KARAVAN_IMAGE_REGISTRY=$YOUR_IMAGE_REGISTRY \ --e KARAVAN_IMAGE_REGISTRY_USERNAME=$YOUR_IMAGE_REGISTRY_USERNAME \ --e KARAVAN_IMAGE_REGISTRY_PASSWORD=$YOUR_IMAGE_REGISTRY_PASSWORD \ --e KARAVAN_IMAGE_GROUP=$YOUR_IMAGE_GROUP \ -``` - +3. Open http://localhost:8080 diff --git a/docs/WEB_KUBERNETES.md b/docs/WEB_KUBERNETES.md index c0340833..e46f8cec 100644 --- a/docs/WEB_KUBERNETES.md +++ b/docs/WEB_KUBERNETES.md @@ -16,50 +16,17 @@ ``` minikube dashboard ``` -4. Install Karavan using Maven +4. Download [karavan-kubernetes](install/karavan-kubernetes) folder -Download installer from Maven Central: https://repo1.maven.org/maven2/org/apache/camel/karavan/karavan-installer/4.4.0/karavan-installer-4.4.0.jar - -ex. with following command: +5. Get registry IP and set it to `secrets.yaml` ``` -mvn org.apache.maven.plugins:maven-dependency-plugin:3.0.2:copy -Dartifact=org.apache.camel.karavan:karavan-installer:4.4.0:jar -DoutputDirectory=. +kubectl get service registry -n kube-system -o jsonpath="{.spec.clusterIP}" ``` -Install Karavan with Gitea (for demo purpose) -``` -java -jar karavan-installer-4.4.0.jar --install-gitea --node-port=30777 - -``` - -5. Install Karavan using Jbang - -Install Karavan with Gitea (for demo purpose) -``` -jbang org.apache.camel.karavan:karavan-installer:4.4.0 --install-gitea --node-port=30777 -``` +6. Set Secrets for Git Repository and Container Image Registry connections in `secrets.yaml` -6. Get karavan service URL +6. Install Karavan using kubectl ``` -minikube service karavan --url --namespace karavan +kubectl create namespace karavan +kubectl apply -k . ``` - Use karavan URL to connect to the application - - -###
(camel-karavan) branch main updated (8d0baf4b -> 8d19037f)
This is an automated email from the ASF dual-hosted git repository. marat pushed a change to branch main in repository https://gitbox.apache.org/repos/asf/camel-karavan.git from 8d0baf4b Update app.yml new 8dd60ca8 Upgrade new 8d19037f Fix #1128 The 2 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "add" were already present in the repository and have only been added to this reference. Summary of changes: .github/workflows/app-oidc.yml | 5 ++- .github/workflows/app.yml | 1 - .gitignore | 4 +- docs/WEB_DOCKER.md | 49 +++--- docs/WEB_KUBERNETES.md | 47 - .../karavan-docker/docker-compose-gitea.yaml | 2 +- docs/install/karavan-kubernetes/deployment.yaml| 29 +++-- docs/install/karavan-kubernetes/kustomization.yaml | 11 - docs/install/karavan-kubernetes/secret.yaml| 4 +- karavan-app/pom.xml| 17 ++-- .../karavan/kubernetes/KubernetesService.java | 2 +- .../camel/karavan/service/ProjectService.java | 2 + 12 files changed, 73 insertions(+), 100 deletions(-)
(camel-karavan) 02/02: Fix #1128
This is an automated email from the ASF dual-hosted git repository. marat pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-karavan.git commit 8d19037f0290221b92cf288bbd5345968cbf0e3d Author: Marat Gubaidullin AuthorDate: Fri Feb 23 15:30:49 2024 -0500 Fix #1128 --- .github/workflows/app-oidc.yml | 5 - .github/workflows/app.yml | 1 - 2 files changed, 4 insertions(+), 2 deletions(-) diff --git a/.github/workflows/app-oidc.yml b/.github/workflows/app-oidc.yml index 1fe36e72..eb51e210 100644 --- a/.github/workflows/app-oidc.yml +++ b/.github/workflows/app-oidc.yml @@ -42,7 +42,6 @@ jobs: mvn clean compile exec:java -f karavan-generator \ -Dexec.mainClass="org.apache.camel.karavan.generator.KaravanGenerator" - # Building Karavan Core - name: Set up Node uses: actions/setup-node@v4 with: @@ -52,6 +51,9 @@ jobs: working-directory: ./karavan/karavan-core run: npm ci + - name: Create Multi Platfrom Builder +run: docker buildx create --use --platform=linux/arm64,linux/amd64 --name multi-platform-builder + - name: Build application working-directory: ./karavan/karavan-app run: | @@ -59,6 +61,7 @@ jobs: -Dquarkus.quinoa.package-manager-install=false \ -Dquarkus.container-image.build=true \ -Dquarkus.container-image.push=true \ + -Dquarkus.docker.buildx.platform=linux/amd64,linux/arm64 \ -Dquarkus.container-image.image=${{ env.REGISTRY }}/${GITHUB_REPOSITORY}:${{ env.TAG }}-oidc \ -Dquarkus.container-image.username=${{ github.actor }} \ -Dquarkus.container-image.password=${{ secrets.GITHUB_TOKEN }} diff --git a/.github/workflows/app.yml b/.github/workflows/app.yml index 87361e0d..959aac2d 100644 --- a/.github/workflows/app.yml +++ b/.github/workflows/app.yml @@ -42,7 +42,6 @@ jobs: mvn clean compile exec:java -f karavan-generator \ -Dexec.mainClass="org.apache.camel.karavan.generator.KaravanGenerator" - # Building Karavan Core - name: Set up Node uses: actions/setup-node@v4 with:
Re: [I] Karavan should be build using src/main/docker/Dockerfile.jdk [camel-karavan]
mgubaidullin closed issue #1128: Karavan should be build using src/main/docker/Dockerfile.jdk URL: https://github.com/apache/camel-karavan/issues/1128 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
(camel-karavan) branch main updated: Update app.yml
This is an automated email from the ASF dual-hosted git repository. marat pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-karavan.git The following commit(s) were added to refs/heads/main by this push: new 8d0baf4b Update app.yml 8d0baf4b is described below commit 8d0baf4bb10cc83514d54b68696851b02a1edee5 Author: Marat Gubaidullin AuthorDate: Fri Feb 23 15:19:22 2024 -0500 Update app.yml --- .github/workflows/app.yml | 3 +++ 1 file changed, 3 insertions(+) diff --git a/.github/workflows/app.yml b/.github/workflows/app.yml index c4081da4..87361e0d 100644 --- a/.github/workflows/app.yml +++ b/.github/workflows/app.yml @@ -52,6 +52,9 @@ jobs: working-directory: ./karavan/karavan-core run: npm ci + - name: Create Multi Platfrom Builder +run: docker buildx create --use --platform=linux/arm64,linux/amd64 --name multi-platform-builder + - name: Build application working-directory: ./karavan/karavan-app run: |
[I] Error configuring property: camel.component.test[00001]port[80]tcp.addr because cannot find component with name test[00001]port[80]tcp. [camel-k]
lsergio opened a new issue, #5179: URL: https://github.com/apache/camel-k/issues/5179 ### What happened? I have created the following Integration: ``` apiVersion: camel.apache.org/v1 kind: Integration metadata: name: basic spec: sources: - name: flow1.groovy content: |- from('quartz://flow1/trigger?cron=0+*+*+?+*+*') .to("https://httpbin.org/delay/2?bridgeEndpoint=true;) .to("log:info") ``` It creates a CronJob to run every minute. When the Integration runs, I get the following error on its log: ``` Caused by: java.lang.RuntimeException: java.lang.IllegalArgumentException: Error configuring property: camel.component.test[1]port[80]tcp.addr because cannot find component with name test[1]port[80]tcp. Make sure you have the component on the classpath at org.apache.camel.quarkus.main.CamelMainRuntime.start(CamelMainRuntime.java:65) at org.apache.camel.quarkus.core.CamelBootstrapRecorder.start(CamelBootstrapRecorder.java:45) ... 15 more Caused by: java.lang.IllegalArgumentException: Error configuring property: camel.component.test[1]port[80]tcp.addr because cannot find component with name test[1]port[80]tcp. Make sure you have the component on the classpath at org.apache.camel.main.BaseMainSupport.lambda$doAutoConfigurationFromProperties$29(BaseMainSupport.java:1683) at org.apache.camel.main.MainHelper.computeProperties(MainHelper.java:407) at org.apache.camel.main.BaseMainSupport.doAutoConfigurationFromProperties(BaseMainSupport.java:1675) at org.apache.camel.main.BaseMainSupport.autoConfigurationFromProperties(BaseMainSupport.java:1638) at org.apache.camel.main.BaseMainSupport.autoconfigure(BaseMainSupport.java:447) at org.apache.camel.main.MainSupport.autoconfigure(MainSupport.java:73) at org.apache.camel.main.BaseMainSupport.postProcessCamelContext(BaseMainSupport.java:627) at org.apache.camel.quarkus.main.CamelMain.initCamelContext(CamelMain.java:116) at org.apache.camel.quarkus.main.CamelMain.doInit(CamelMain.java:86) at org.apache.camel.support.service.BaseService.init(BaseService.java:78) at org.apache.camel.quarkus.main.CamelMain.startEngine(CamelMain.java:137) at org.apache.camel.quarkus.main.CamelMainRuntime.start(CamelMainRuntime.java:49) ... 16 more ``` 1 seems to be a knative revision number, so I decided to disable the knative trait: ``` traits: knative: enabled: false ``` and the error disappeared. As this integration did not create a Service/Knative Service, should the knative trait be activated? This started to happen today in our cluster, so maybe it's also related to some environment configuration. If someone can provide some guidance, I would appreciate as well. ### Steps to reproduce _No response_ ### Relevant log output _No response_ ### Camel K version 2.2.0 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
(camel-karavan) branch main updated: Update app.yml
This is an automated email from the ASF dual-hosted git repository. marat pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-karavan.git The following commit(s) were added to refs/heads/main by this push: new fcf9473c Update app.yml fcf9473c is described below commit fcf9473cd35ec66076be279a231991670224519c Author: Marat Gubaidullin AuthorDate: Fri Feb 23 14:42:38 2024 -0500 Update app.yml --- .github/workflows/app.yml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/.github/workflows/app.yml b/.github/workflows/app.yml index 138b6ca8..c4081da4 100644 --- a/.github/workflows/app.yml +++ b/.github/workflows/app.yml @@ -59,7 +59,8 @@ jobs: -Dquarkus.quinoa.package-manager-install=false \ -Dquarkus.container-image.build=true \ -Dquarkus.container-image.push=true \ + -Dquarkus.docker.buildx.platform=linux/amd64,linux/arm64 \ -Dquarkus.container-image.image=${{ env.REGISTRY }}/${GITHUB_REPOSITORY}:${{ env.TAG }} \ -Dquarkus.container-image.username=${{ github.actor }} \ -Dquarkus.container-image.password=${{ secrets.GITHUB_TOKEN }} -if: ${{ github.ref == 'refs/heads/main' }} \ No newline at end of file +if: ${{ github.ref == 'refs/heads/main' }}
(camel) branch regen_bot updated (17807d7e395 -> 1059a25e735)
This is an automated email from the ASF dual-hosted git repository. github-bot pushed a change to branch regen_bot in repository https://gitbox.apache.org/repos/asf/camel.git omit 17807d7e395 Regen for commit c15cdbd6f4c2cd9b5658eb78ccb72acb7ec6ac03 add 1059a25e735 Regen for commit c15cdbd6f4c2cd9b5658eb78ccb72acb7ec6ac03 (#13281) This update added new revisions after undoing existing revisions. That is to say, some revisions that were in the old version of the branch are not in the new version. This situation occurs when a user --force pushes a change and generates a repository containing something like this: * -- * -- B -- O -- O -- O (17807d7e395) \ N -- N -- N refs/heads/regen_bot (1059a25e735) You should already have received notification emails for all of the O revisions, and so the following emails describe only the N revisions from the common base, B. Any revisions marked "omit" are not gone; other references still refer to them. Any revisions marked "discard" are gone forever. No new revisions were added by this update. Summary of changes:
(camel) branch main updated: Regen for commit c15cdbd6f4c2cd9b5658eb78ccb72acb7ec6ac03 (#13281)
This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel.git The following commit(s) were added to refs/heads/main by this push: new 1059a25e735 Regen for commit c15cdbd6f4c2cd9b5658eb78ccb72acb7ec6ac03 (#13281) 1059a25e735 is described below commit 1059a25e7352ced78ae1cef6e1fe5127452a882f Author: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com> AuthorDate: Fri Feb 23 20:10:46 2024 +0100 Regen for commit c15cdbd6f4c2cd9b5658eb78ccb72acb7ec6ac03 (#13281) Signed-off-by: GitHub Co-authored-by: davsclaus --- .../resources/org/apache/camel/catalog/components/knative.json| 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/catalog/camel-catalog/src/generated/resources/org/apache/camel/catalog/components/knative.json b/catalog/camel-catalog/src/generated/resources/org/apache/camel/catalog/components/knative.json index 6b5b5ed1cc7..2f6c7f376b2 100644 --- a/catalog/camel-catalog/src/generated/resources/org/apache/camel/catalog/components/knative.json +++ b/catalog/camel-catalog/src/generated/resources/org/apache/camel/catalog/components/knative.json @@ -24,7 +24,7 @@ }, "componentProperties": { "ceOverride": { "index": 0, "kind": "property", "displayName": "Ce Override", "group": "common", "label": "", "required": false, "type": "object", "javaType": "java.util.Map", "prefix": "ce.override.", "deprecated": false, "autowired": false, "secret": false, "configurationClass": "org.apache.camel.component.knative.KnativeConfiguration", "configurationField": "configuration", "description": "CloudEvent headers to override" }, -"cloudEventsSpecVersion": { "index": 1, "kind": "property", "displayName": "Cloud Events Spec Version", "group": "common", "label": "", "required": false, "type": "string", "javaType": "java.lang.String", "enum": [ "1.0", "1.0.1" ], "deprecated": false, "autowired": false, "secret": false, "defaultValue": "1.0", "configurationClass": "org.apache.camel.component.knative.KnativeConfiguration", "configurationField": "configuration", "description": "Set the version of the cloudevents spec." }, +"cloudEventsSpecVersion": { "index": 1, "kind": "property", "displayName": "Cloud Events Spec Version", "group": "common", "label": "", "required": false, "type": "string", "javaType": "java.lang.String", "enum": [ "1.0", "1.0.1", "1.0.2" ], "deprecated": false, "autowired": false, "secret": false, "defaultValue": "1.0", "configurationClass": "org.apache.camel.component.knative.KnativeConfiguration", "configurationField": "configuration", "description": "Set the version of the cloude [...] "cloudEventsType": { "index": 2, "kind": "property", "displayName": "Cloud Events Type", "group": "common", "label": "", "required": false, "type": "string", "javaType": "java.lang.String", "deprecated": false, "autowired": false, "secret": false, "defaultValue": "org.apache.camel.event", "configurationClass": "org.apache.camel.component.knative.KnativeConfiguration", "configurationField": "configuration", "description": "Set the event-type information of the produced events." }, "configuration": { "index": 3, "kind": "property", "displayName": "Configuration", "group": "common", "label": "", "required": false, "type": "object", "javaType": "org.apache.camel.component.knative.KnativeConfiguration", "deprecated": false, "autowired": false, "secret": false, "description": "Set the configuration." }, "consumerFactory": { "index": 4, "kind": "property", "displayName": "Consumer Factory", "group": "common", "label": "", "required": false, "type": "object", "javaType": "org.apache.camel.component.knative.spi.KnativeConsumerFactory", "deprecated": false, "autowired": false, "secret": false, "description": "The protocol consumer factory." }, @@ -50,7 +50,7 @@ "type": { "index": 0, "kind": "path", "displayName": "Type", "group": "common", "label": "", "required": false, "type": "object", "javaType": "org.apache.camel.component.knative.spi.Knative.Type", "enum": [ "endpoint", "channel", "event" ], "deprecated": false, "autowired": false, "secret": false, "description": "The Knative resource type" }, "typeId": { "index": 1, "kind": "path", "displayName": "Type Id", "group": "common", "label": "", "required": false, "type": "string", "javaType": "java.lang.String", "deprecated": false, "autowired": false, "secret": false, "description": "The identifier of the Knative resource" }, "ceOverride": { "index": 2, "kind": "parameter", "displayName": "Ce Override", "group": "common", "label": "", "required": false, "type": "object", "javaType": "java.util.Map", "prefix": "ce.override.", "deprecated": false, "autowired": false, "secret": false, "configurationClass": "org.apache.camel.component.knative.KnativeConfiguration", "configurationField":
Re: [PR] Generated sources regen [camel]
oscerd merged PR #13281: URL: https://github.com/apache/camel/pull/13281 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
(camel) branch regen_bot updated (1b8d9827dcb -> 17807d7e395)
This is an automated email from the ASF dual-hosted git repository. github-bot pushed a change to branch regen_bot in repository https://gitbox.apache.org/repos/asf/camel.git from 1b8d9827dcb Bump infinispan-version from 14.0.24.Final to 14.0.25.Final (#13280) add c15cdbd6f4c Add cloud event 1.0.2 spec add 17807d7e395 Regen for commit c15cdbd6f4c2cd9b5658eb78ccb72acb7ec6ac03 No new revisions were added by this update. Summary of changes: .../apache/camel/catalog/components/knative.json | 4 +-- .../apache/camel/component/knative/knative.json| 4 +-- .../component/knative/KnativeConfiguration.java| 2 +- .../component/knative/ce/CloudEventProcessors.java | 29 +- .../component/knative/http/KnativeHttpTest.java| 3 ++- 5 files changed, 35 insertions(+), 7 deletions(-)
[PR] Generated sources regen [camel]
github-actions[bot] opened a new pull request, #13281: URL: https://github.com/apache/camel/pull/13281 Regen bot :robot: found some uncommitted changes after running build on :camel: `main` branch. Please do not delete `regen_bot` branch after merge/rebase. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
(camel) branch main updated: Add cloud event 1.0.2 spec
This is an automated email from the ASF dual-hosted git repository. davsclaus pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel.git The following commit(s) were added to refs/heads/main by this push: new c15cdbd6f4c Add cloud event 1.0.2 spec c15cdbd6f4c is described below commit c15cdbd6f4c2cd9b5658eb78ccb72acb7ec6ac03 Author: Claus Ibsen AuthorDate: Fri Feb 23 20:00:40 2024 +0100 Add cloud event 1.0.2 spec --- .../apache/camel/component/knative/knative.json| 4 +-- .../component/knative/KnativeConfiguration.java| 2 +- .../component/knative/ce/CloudEventProcessors.java | 29 +- .../component/knative/http/KnativeHttpTest.java| 3 ++- 4 files changed, 33 insertions(+), 5 deletions(-) diff --git a/components/camel-knative/camel-knative-component/src/generated/resources/org/apache/camel/component/knative/knative.json b/components/camel-knative/camel-knative-component/src/generated/resources/org/apache/camel/component/knative/knative.json index 6b5b5ed1cc7..2f6c7f376b2 100644 --- a/components/camel-knative/camel-knative-component/src/generated/resources/org/apache/camel/component/knative/knative.json +++ b/components/camel-knative/camel-knative-component/src/generated/resources/org/apache/camel/component/knative/knative.json @@ -24,7 +24,7 @@ }, "componentProperties": { "ceOverride": { "index": 0, "kind": "property", "displayName": "Ce Override", "group": "common", "label": "", "required": false, "type": "object", "javaType": "java.util.Map", "prefix": "ce.override.", "deprecated": false, "autowired": false, "secret": false, "configurationClass": "org.apache.camel.component.knative.KnativeConfiguration", "configurationField": "configuration", "description": "CloudEvent headers to override" }, -"cloudEventsSpecVersion": { "index": 1, "kind": "property", "displayName": "Cloud Events Spec Version", "group": "common", "label": "", "required": false, "type": "string", "javaType": "java.lang.String", "enum": [ "1.0", "1.0.1" ], "deprecated": false, "autowired": false, "secret": false, "defaultValue": "1.0", "configurationClass": "org.apache.camel.component.knative.KnativeConfiguration", "configurationField": "configuration", "description": "Set the version of the cloudevents spec." }, +"cloudEventsSpecVersion": { "index": 1, "kind": "property", "displayName": "Cloud Events Spec Version", "group": "common", "label": "", "required": false, "type": "string", "javaType": "java.lang.String", "enum": [ "1.0", "1.0.1", "1.0.2" ], "deprecated": false, "autowired": false, "secret": false, "defaultValue": "1.0", "configurationClass": "org.apache.camel.component.knative.KnativeConfiguration", "configurationField": "configuration", "description": "Set the version of the cloude [...] "cloudEventsType": { "index": 2, "kind": "property", "displayName": "Cloud Events Type", "group": "common", "label": "", "required": false, "type": "string", "javaType": "java.lang.String", "deprecated": false, "autowired": false, "secret": false, "defaultValue": "org.apache.camel.event", "configurationClass": "org.apache.camel.component.knative.KnativeConfiguration", "configurationField": "configuration", "description": "Set the event-type information of the produced events." }, "configuration": { "index": 3, "kind": "property", "displayName": "Configuration", "group": "common", "label": "", "required": false, "type": "object", "javaType": "org.apache.camel.component.knative.KnativeConfiguration", "deprecated": false, "autowired": false, "secret": false, "description": "Set the configuration." }, "consumerFactory": { "index": 4, "kind": "property", "displayName": "Consumer Factory", "group": "common", "label": "", "required": false, "type": "object", "javaType": "org.apache.camel.component.knative.spi.KnativeConsumerFactory", "deprecated": false, "autowired": false, "secret": false, "description": "The protocol consumer factory." }, @@ -50,7 +50,7 @@ "type": { "index": 0, "kind": "path", "displayName": "Type", "group": "common", "label": "", "required": false, "type": "object", "javaType": "org.apache.camel.component.knative.spi.Knative.Type", "enum": [ "endpoint", "channel", "event" ], "deprecated": false, "autowired": false, "secret": false, "description": "The Knative resource type" }, "typeId": { "index": 1, "kind": "path", "displayName": "Type Id", "group": "common", "label": "", "required": false, "type": "string", "javaType": "java.lang.String", "deprecated": false, "autowired": false, "secret": false, "description": "The identifier of the Knative resource" }, "ceOverride": { "index": 2, "kind": "parameter", "displayName": "Ce Override", "group": "common", "label": "", "required": false, "type": "object", "javaType": "java.util.Map", "prefix": "ce.override.", "deprecated": false, "autowired": false, "secret": false, "configurationClass":
(camel-karavan) branch main updated (e4df9c8d -> c4989eef)
This is an automated email from the ASF dual-hosted git repository. marat pushed a change to branch main in repository https://gitbox.apache.org/repos/asf/camel-karavan.git from e4df9c8d Cleanup new 64b2de59 Cleanup new c4989eef Cleanup The 2 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "add" were already present in the repository and have only been added to this reference. Summary of changes: .github/workflows/app-oidc.yml | 2 +- .github/workflows/app.yml| 2 +- .github/workflows/docker-devmode.yml | 2 +- karavan-app/src/main/webui/package-lock.json | 28 ++-- karavan-app/src/main/webui/package.json | 2 +- 5 files changed, 30 insertions(+), 6 deletions(-)
(camel-karavan) 02/02: Cleanup
This is an automated email from the ASF dual-hosted git repository. marat pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-karavan.git commit c4989eef25d25da03fa6bf6a5fd43fac4ecb6a1c Author: Marat Gubaidullin AuthorDate: Fri Feb 23 11:42:55 2024 -0500 Cleanup --- karavan-app/src/main/webui/package-lock.json | 28 ++-- karavan-app/src/main/webui/package.json | 2 +- 2 files changed, 27 insertions(+), 3 deletions(-) diff --git a/karavan-app/src/main/webui/package-lock.json b/karavan-app/src/main/webui/package-lock.json index 9645dc74..504f6010 100644 --- a/karavan-app/src/main/webui/package-lock.json +++ b/karavan-app/src/main/webui/package-lock.json @@ -26,7 +26,7 @@ "buffer": "6.0.3", "file-saver": "2.0.5", "html-to-image": "1.11.11", -"karavan-core": "file:../../../../../karavan-core", +"karavan-core": "file:../../../../karavan-core", "keycloak-js": "23.0.6", "react": "18.2.0", "react-dom": "18.2.0", @@ -53,6 +53,30 @@ } }, "../../../../../karavan-core": { + "version": "4.4.0", + "extraneous": true, + "license": "Apache-2.0", + "dependencies": { +"@types/js-yaml": "^4.0.7", +"@types/uuid": "^9.0.5", +"tsconfig-paths": "^4.2.0", +"typescript": "^5.1", +"uuid": "9.0.1" + }, + "devDependencies": { +"@types/chai": "^4.3.0", +"@types/dagre": "^0.7.47", +"@types/mocha": "^9.1.0", +"@types/node": "^18.11.18", +"chai": "^4.3.4", +"cross-env": "^7.0.3", +"fs": "^0.0.1-security", +"mocha": "^10.2.0", +"ts-node": "^10.9.1", +"tsc-alias": "^1.8.7" + } +}, +"../../../../karavan-core": { "version": "4.4.0", "license": "Apache-2.0", "dependencies": { @@ -14128,7 +14152,7 @@ } }, "node_modules/karavan-core": { - "resolved": "../../../../../karavan-core", + "resolved": "../../../../karavan-core", "link": true }, "node_modules/keycloak-js": { diff --git a/karavan-app/src/main/webui/package.json b/karavan-app/src/main/webui/package.json index 8d195436..e0297ec5 100644 --- a/karavan-app/src/main/webui/package.json +++ b/karavan-app/src/main/webui/package.json @@ -47,7 +47,7 @@ "buffer": "6.0.3", "file-saver": "2.0.5", "html-to-image": "1.11.11", -"karavan-core": "file:../../../../../karavan-core", +"karavan-core": "file:../../../../karavan-core", "keycloak-js": "23.0.6", "react": "18.2.0", "react-dom": "18.2.0",
(camel-karavan) 01/02: Cleanup
This is an automated email from the ASF dual-hosted git repository. marat pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-karavan.git commit 64b2de5999da25fa69249dc213d4bee64a9030fc Author: Marat Gubaidullin AuthorDate: Fri Feb 23 11:40:04 2024 -0500 Cleanup --- .github/workflows/app-oidc.yml | 2 +- .github/workflows/app.yml| 2 +- .github/workflows/docker-devmode.yml | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/.github/workflows/app-oidc.yml b/.github/workflows/app-oidc.yml index d6951bfd..1fe36e72 100644 --- a/.github/workflows/app-oidc.yml +++ b/.github/workflows/app-oidc.yml @@ -1,4 +1,4 @@ -name: Web application +name: Application OIDC on: push: diff --git a/.github/workflows/app.yml b/.github/workflows/app.yml index b38ff839..138b6ca8 100644 --- a/.github/workflows/app.yml +++ b/.github/workflows/app.yml @@ -1,4 +1,4 @@ -name: Web application +name: Application on: push: diff --git a/.github/workflows/docker-devmode.yml b/.github/workflows/docker-devmode.yml index dcb49edc..7f901adc 100644 --- a/.github/workflows/docker-devmode.yml +++ b/.github/workflows/docker-devmode.yml @@ -1,4 +1,4 @@ -name: DevMode container image +name: DevMode container on: push:
(camel-karavan) branch main updated: Cleanup
This is an automated email from the ASF dual-hosted git repository. marat pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-karavan.git The following commit(s) were added to refs/heads/main by this push: new e4df9c8d Cleanup e4df9c8d is described below commit e4df9c8d6c3fd4ecc032d8cf127da3932de6bc85 Author: Marat Gubaidullin AuthorDate: Fri Feb 23 11:39:12 2024 -0500 Cleanup --- .github/workflows/app-oidc.yml | 8 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/.github/workflows/app-oidc.yml b/.github/workflows/app-oidc.yml index 5cbcc6b1..d6951bfd 100644 --- a/.github/workflows/app-oidc.yml +++ b/.github/workflows/app-oidc.yml @@ -17,18 +17,18 @@ jobs: runs-on: ubuntu-latest steps: - name: Checkout Karavan -uses: actions/checkout@v43 +uses: actions/checkout@v4 with: path: karavan - name: Set up JDK 17 -uses: actions/setup-java@v43 +uses: actions/setup-java@v4 with: distribution: adopt java-version: 17 - name: Cache local Maven repository -uses: actions/cache@v43 +uses: actions/cache@v4 with: path: | ~/.m2/repository @@ -44,7 +44,7 @@ jobs: # Building Karavan Core - name: Set up Node -uses: actions/setup-node@v43 +uses: actions/setup-node@v4 with: node-version: '18.14.2'
(camel-karavan) branch main updated: Cleanup
This is an automated email from the ASF dual-hosted git repository. marat pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-karavan.git The following commit(s) were added to refs/heads/main by this push: new 8732f101 Cleanup 8732f101 is described below commit 8732f101769aefcc8349e792dd511d3b84bd5c79 Author: Marat Gubaidullin AuthorDate: Fri Feb 23 11:38:29 2024 -0500 Cleanup --- .github/workflows/app-oidc.yml | 8 .github/workflows/app.yml | 8 .github/workflows/vscode.yml| 8 karavan-app/src/main/webui/package.json | 6 +++--- 4 files changed, 15 insertions(+), 15 deletions(-) diff --git a/.github/workflows/app-oidc.yml b/.github/workflows/app-oidc.yml index 1cd31c51..5cbcc6b1 100644 --- a/.github/workflows/app-oidc.yml +++ b/.github/workflows/app-oidc.yml @@ -17,18 +17,18 @@ jobs: runs-on: ubuntu-latest steps: - name: Checkout Karavan -uses: actions/checkout@v3 +uses: actions/checkout@v43 with: path: karavan - name: Set up JDK 17 -uses: actions/setup-java@v3 +uses: actions/setup-java@v43 with: distribution: adopt java-version: 17 - name: Cache local Maven repository -uses: actions/cache@v3 +uses: actions/cache@v43 with: path: | ~/.m2/repository @@ -44,7 +44,7 @@ jobs: # Building Karavan Core - name: Set up Node -uses: actions/setup-node@v3 +uses: actions/setup-node@v43 with: node-version: '18.14.2' diff --git a/.github/workflows/app.yml b/.github/workflows/app.yml index 3e8f97a7..b38ff839 100644 --- a/.github/workflows/app.yml +++ b/.github/workflows/app.yml @@ -17,18 +17,18 @@ jobs: runs-on: ubuntu-latest steps: - name: Checkout Karavan -uses: actions/checkout@v3 +uses: actions/checkout@v4 with: path: karavan - name: Set up JDK 17 -uses: actions/setup-java@v3 +uses: actions/setup-java@v4 with: distribution: adopt java-version: 17 - name: Cache local Maven repository -uses: actions/cache@v3 +uses: actions/cache@v4 with: path: | ~/.m2/repository @@ -44,7 +44,7 @@ jobs: # Building Karavan Core - name: Set up Node -uses: actions/setup-node@v3 +uses: actions/setup-node@v4 with: node-version: '18.14.2' diff --git a/.github/workflows/vscode.yml b/.github/workflows/vscode.yml index 9fc46d27..60364717 100644 --- a/.github/workflows/vscode.yml +++ b/.github/workflows/vscode.yml @@ -15,17 +15,17 @@ jobs: steps: - name: Checkout -uses: actions/checkout@v3 +uses: actions/checkout@v4 # Generate Karavan UI model and API, Kamelets and Components - name: Set up JDK 17 -uses: actions/setup-java@v3 +uses: actions/setup-java@v4 with: distribution: adopt java-version: 17 - name: Cache local Maven repository -uses: actions/cache@v3 +uses: actions/cache@v4 with: path: | ~/.m2/repository @@ -40,7 +40,7 @@ jobs: # Building Karavan Core - name: Set up Node -uses: actions/setup-node@v3 +uses: actions/setup-node@v4 with: node-version: '20' diff --git a/karavan-app/src/main/webui/package.json b/karavan-app/src/main/webui/package.json index 88796fd4..8d195436 100644 --- a/karavan-app/src/main/webui/package.json +++ b/karavan-app/src/main/webui/package.json @@ -3,9 +3,9 @@ "version": "4.4.0", "private": true, "scripts": { -"copy-designer": "cp -r ../../../../../karavan-designer/src/designer src", -"copy-knowledgebase": "cp -r ../../../../../karavan-designer/src/knowledgebase src", -"copy-topology": "cp -r ../../../../../karavan-designer/src/topology src", +"copy-designer": "cp -r ../../../../karavan-designer/src/designer src", +"copy-knowledgebase": "cp -r ../../../../karavan-designer/src/knowledgebase src", +"copy-topology": "cp -r ../../../../karavan-designer/src/topology src", "copy-code": " npm run copy-designer && npm run copy-knowledgebase && npm run copy-topology", "start": "export PORT=3003 && npm run copy-code && react-scripts start", "build": "npm run copy-code && DISABLE_ESLINT_PLUGIN=true react-scripts build"
(camel-karavan) branch main updated: Cleanup
This is an automated email from the ASF dual-hosted git repository. marat pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-karavan.git The following commit(s) were added to refs/heads/main by this push: new 1c8c1243 Cleanup 1c8c1243 is described below commit 1c8c1243fce8b81a0c5202bb65d60eff58ed85e0 Author: Marat Gubaidullin AuthorDate: Fri Feb 23 11:32:00 2024 -0500 Cleanup --- .github/workflows/installer.yml | 50 - 1 file changed, 50 deletions(-) diff --git a/.github/workflows/installer.yml b/.github/workflows/installer.yml deleted file mode 100644 index 7bd9b373.. --- a/.github/workflows/installer.yml +++ /dev/null @@ -1,50 +0,0 @@ -name: Installer - -on: - push: -branches: [ main ] -paths: ['karavan-web/karavan-installer/**', '.github/workflows/installer.yml'] - workflow_dispatch: - pull_request: -branches: [ main ] - -env: - TAG: 4.4.0 - -jobs: - build: -runs-on: ubuntu-latest -steps: - - name: Checkout Karavan -uses: actions/checkout@v3 -with: - path: karavan - - - name: Set up JDK 17 -uses: actions/setup-java@v3 -with: - distribution: adopt - java-version: 17 - - - name: Cache local Maven repository -uses: actions/cache@v3 -with: - path: | -~/.m2/repository -!~/.m2/repository/org/apache/camel/karavan - key: ${{ runner.os }}-maven-${{ hashFiles('**/pom.xml') }} - restore-keys: ${{ runner.os }}-maven- - - # Build Karavan installer - - name: Build Karavan installer -working-directory: ./karavan/karavan-web/karavan-installer -run: | - mvn package -if: ${{ github.ref == 'refs/heads/main' }} - - - name: Karavan installer (upload) -uses: actions/upload-artifact@v3 -with: - name: karavan-installer.jar - path: ./karavan/karavan-web/karavan-installer/target/karavan-installer-${{ env.TAG }}.jar -if: ${{ github.ref == 'refs/heads/main' }} \ No newline at end of file
(camel-karavan) 03/09: gitignore
This is an automated email from the ASF dual-hosted git repository. marat pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-karavan.git commit c99e2fcce22ed9b3152e59b2f016eb52262a941e Author: Marat Gubaidullin AuthorDate: Thu Feb 22 22:45:55 2024 -0500 gitignore --- .gitignore | 3 +++ 1 file changed, 3 insertions(+) diff --git a/.gitignore b/.gitignore index e73e69cf..6c8cde15 100644 --- a/.gitignore +++ b/.gitignore @@ -37,6 +37,7 @@ yarn-error.log* # OSX .DS_Store +*__MACOSX/ # Vim *.swp @@ -74,4 +75,6 @@ yarn-error.log* karavan-cloud/karavan-secret-real.yaml +install/karavan-docker/data/* + **/dependency-reduced-pom.xml \ No newline at end of file
(camel-karavan) 04/09: Docker compose
This is an automated email from the ASF dual-hosted git repository. marat pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-karavan.git commit 5d97f3fe5aefdfecc771d228a6b8e21f49e9d440 Author: Marat Gubaidullin AuthorDate: Fri Feb 23 09:28:03 2024 -0500 Docker compose --- ...ocker-compose.yaml => docker-compose-gitea.yaml} | 1 + install/karavan-docker/docker-compose.yaml | 21 - .../src/main/resources/services/internal.yaml | 15 --- 3 files changed, 5 insertions(+), 32 deletions(-) diff --git a/install/karavan-docker/docker-compose.yaml b/install/karavan-docker/docker-compose-gitea.yaml similarity index 95% copy from install/karavan-docker/docker-compose.yaml copy to install/karavan-docker/docker-compose-gitea.yaml index db64844b..96c4d812 100644 --- a/install/karavan-docker/docker-compose.yaml +++ b/install/karavan-docker/docker-compose-gitea.yaml @@ -16,6 +16,7 @@ services: - KARAVAN_IMAGE_REGISTRY_USERNAME= - KARAVAN_IMAGE_REGISTRY_PASSWORD= - KARAVAN_IMAGE_GROUP=karavan + - KARAVAN_DOCKER_NETWORK=karavan volumes: - "/var/run/docker.sock:/var/run/docker.sock" labels: diff --git a/install/karavan-docker/docker-compose.yaml b/install/karavan-docker/docker-compose.yaml index db64844b..ca7814df 100644 --- a/install/karavan-docker/docker-compose.yaml +++ b/install/karavan-docker/docker-compose.yaml @@ -8,14 +8,15 @@ services: ports: - "8080:8080" environment: - - KARAVAN_GIT_REPOSITORY=http://gitea:3000/karavan/karavan.git - - KARAVAN_GIT_USERNAME=karavan - - KARAVAN_GIT_PASSWORD=karavan + - KARAVAN_GIT_REPOSITORY=${KARAVAN_GIT_REPOSITORY} + - KARAVAN_GIT_USERNAME=${KARAVAN_GIT_USERNAME} + - KARAVAN_GIT_PASSWORD=${KARAVAN_GIT_PASSWORD} - KARAVAN_GIT_BRANCH=main - KARAVAN_IMAGE_REGISTRY=registry:5000 - KARAVAN_IMAGE_REGISTRY_USERNAME= - KARAVAN_IMAGE_REGISTRY_PASSWORD= - KARAVAN_IMAGE_GROUP=karavan + - KARAVAN_DOCKER_NETWORK=karavan volumes: - "/var/run/docker.sock:/var/run/docker.sock" labels: @@ -23,20 +24,6 @@ services: networks: - karavan - gitea: -container_name: gitea -image: gitea/gitea:1.21.6-rootless -restart: always -ports: - - "3000:3000" -volumes: - - ./data:/var/lib/gitea - - ./config:/etc/gitea -labels: - - "org.apache.camel.karavan/type=internal" -networks: - - karavan - registry: container_name: registry image: registry:2 diff --git a/karavan-web/karavan-app/src/main/resources/services/internal.yaml b/karavan-web/karavan-app/src/main/resources/services/internal.yaml deleted file mode 100644 index 9f01ef32.. --- a/karavan-web/karavan-app/src/main/resources/services/internal.yaml +++ /dev/null @@ -1,15 +0,0 @@ -version: '3.8' - -services: - - gitea: -image: gitea/gitea:1.20.2-rootless -restart: always -ports: - - "3000:3000" - - registry: -image: registry:2 -restart: always -ports: - - ":5000" \ No newline at end of file
(camel-karavan) 09/09: Cleanup
This is an automated email from the ASF dual-hosted git repository. marat pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-karavan.git commit ea49b0d21e2cbb5041189bb2cea8b649c0e07afd Author: Marat Gubaidullin AuthorDate: Fri Feb 23 11:29:42 2024 -0500 Cleanup --- .gitignore | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.gitignore b/.gitignore index 6c8cde15..f0269644 100644 --- a/.gitignore +++ b/.gitignore @@ -75,6 +75,6 @@ yarn-error.log* karavan-cloud/karavan-secret-real.yaml -install/karavan-docker/data/* +docs/install/karavan-docker/data/* **/dependency-reduced-pom.xml \ No newline at end of file
(camel-karavan) 05/09: Redesign
This is an automated email from the ASF dual-hosted git repository. marat pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-karavan.git commit ca05abcd671e849f618d0dc5e7d9d82ef0b8003e Author: Marat Gubaidullin AuthorDate: Fri Feb 23 09:55:41 2024 -0500 Redesign --- .../org/apache/camel/karavan/api/AuthResource.java | 2 +- .../apache/camel/karavan/api/BuildResource.java| 2 +- .../camel/karavan/api/ContainerResource.java | 2 +- .../apache/camel/karavan/api/DevModeResource.java | 2 +- .../apache/camel/karavan/api/ImagesResource.java | 4 +- .../camel/karavan/api/InfrastructureResource.java | 2 +- .../apache/camel/karavan/api/KameletResources.java | 2 +- .../camel/karavan/api/ProjectFileResource.java | 2 +- .../apache/camel/karavan/api/ProjectResource.java | 4 +- .../apache/camel/karavan/api/StatusResource.java | 2 +- .../org/apache/camel/karavan/code/CodeService.java | 11 +- .../camel/karavan/docker/DockerEventListener.java | 2 +- .../camel/karavan/docker/DockerForGitea.java | 75 -- .../camel/karavan/docker/DockerForRegistry.java| 49 -- .../org/apache/camel/karavan/git/GiteaService.java | 166 - .../karavan/kubernetes/DeploymentEventHandler.java | 2 +- .../karavan/kubernetes/KubernetesService.java | 2 +- .../camel/karavan/kubernetes/PodEventHandler.java | 2 +- .../karavan/kubernetes/ServiceEventHandler.java| 2 +- .../camel/karavan/{git => }/model/GitConfig.java | 2 +- .../camel/karavan/{git => }/model/GitRepo.java | 2 +- .../camel/karavan/{git => }/model/GitRepoFile.java | 2 +- .../{registry => model}/RegistryConfig.java| 2 +- .../apache/camel/karavan/service/CamelService.java | 1 - .../karavan/service/ContainerStatusService.java| 1 - .../camel/karavan/{git => service}/GitService.java | 38 + .../{cache => service}/KaravanCacheService.java| 2 +- .../camel/karavan/service/KaravanService.java | 33 .../camel/karavan/service/ProjectService.java | 9 +- .../{registry => service}/RegistryService.java | 6 +- .../project/ProjectFileCreateValidator.java| 2 +- .../validation/project/ProjectModifyValidator.java | 2 +- .../src/main/resources/application.properties | 20 +-- 33 files changed, 37 insertions(+), 420 deletions(-) diff --git a/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/api/AuthResource.java b/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/api/AuthResource.java index fa44e8eb..00751702 100644 --- a/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/api/AuthResource.java +++ b/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/api/AuthResource.java @@ -22,7 +22,7 @@ import jakarta.ws.rs.Path; import jakarta.ws.rs.Produces; import jakarta.ws.rs.core.MediaType; import jakarta.ws.rs.core.Response; -import org.apache.camel.karavan.cache.KaravanCacheService; +import org.apache.camel.karavan.service.KaravanCacheService; import org.apache.camel.karavan.kubernetes.KubernetesService; import org.apache.camel.karavan.service.AuthService; import org.apache.camel.karavan.service.ProjectService; diff --git a/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/api/BuildResource.java b/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/api/BuildResource.java index 17ce3ad9..7dd5fbda 100644 --- a/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/api/BuildResource.java +++ b/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/api/BuildResource.java @@ -23,7 +23,7 @@ import jakarta.ws.rs.Path; import jakarta.ws.rs.Produces; import jakarta.ws.rs.core.MediaType; import jakarta.ws.rs.core.Response; -import org.apache.camel.karavan.cache.KaravanCacheService; +import org.apache.camel.karavan.service.KaravanCacheService; import org.apache.camel.karavan.code.CodeService; import org.apache.camel.karavan.kubernetes.KubernetesService; diff --git a/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/api/ContainerResource.java b/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/api/ContainerResource.java index 5b7e8b3a..a5450dc2 100644 --- a/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/api/ContainerResource.java +++ b/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/api/ContainerResource.java @@ -24,7 +24,7 @@ import jakarta.inject.Inject; import jakarta.ws.rs.*; import jakarta.ws.rs.core.MediaType; import jakarta.ws.rs.core.Response; -import org.apache.camel.karavan.cache.KaravanCacheService; +import org.apache.camel.karavan.service.KaravanCacheService; import org.apache.camel.karavan.model.ContainerStatus; import org.apache.camel.karavan.code.DockerComposeConverter; import org.apache.camel.karavan.model.DockerComposeService; diff --git
(camel-karavan) 08/09: Cleanup
This is an automated email from the ASF dual-hosted git repository. marat pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-karavan.git commit f376a9e3aa783f15da79bfaeac011eac5c1c337b Author: Marat Gubaidullin AuthorDate: Fri Feb 23 11:29:16 2024 -0500 Cleanup --- docs/install/karavan-docker/data/data/gitea.db | Bin 2011136 -> 0 bytes .../data/data/sessions/8/4/840f7d50db7755d3| Bin 108 -> 0 bytes docs/install/karavan-docker/data/git/.ash_history | 7 - .../data/git/repositories/karavan/karavan.git/HEAD | 1 - .../git/repositories/karavan/karavan.git/config| 5 - .../repositories/karavan/karavan.git/description | 1 - .../karavan.git/hooks/applypatch-msg.sample| 15 -- .../karavan/karavan.git/hooks/commit-msg.sample| 24 --- .../karavan/karavan.git/hooks/post-receive | 16 -- .../karavan/karavan.git/hooks/post-receive.d/gitea | 3 - .../karavan/karavan.git/hooks/post-update.sample | 8 - .../karavan.git/hooks/pre-applypatch.sample| 14 -- .../karavan/karavan.git/hooks/pre-commit.sample| 49 -- .../karavan.git/hooks/pre-merge-commit.sample | 13 -- .../karavan/karavan.git/hooks/pre-push.sample | 53 --- .../karavan/karavan.git/hooks/pre-rebase.sample| 169 - .../karavan/karavan.git/hooks/pre-receive | 16 -- .../karavan/karavan.git/hooks/pre-receive.d/gitea | 3 - .../karavan/karavan.git/hooks/pre-receive.sample | 24 --- .../karavan.git/hooks/prepare-commit-msg.sample| 42 - .../karavan/karavan.git/hooks/proc-receive | 3 - .../karavan/karavan.git/hooks/proc-receive.d/gitea | 0 .../karavan.git/hooks/push-to-checkout.sample | 78 -- .../repositories/karavan/karavan.git/hooks/update | 15 -- .../karavan/karavan.git/hooks/update.d/gitea | 3 - .../karavan/karavan.git/hooks/update.sample| 128 .../repositories/karavan/karavan.git/info/exclude | 6 - .../git/repositories/karavan/karavan.git/info/refs | 2 - .../git/repositories/karavan/karavan.git/logs/HEAD | 2 - .../karavan/karavan.git/logs/refs/heads/main | 3 - .../karavan/karavan.git/logs/refs/heads/master | 1 - .../44/826627f477d558695fd21993d364d36a5baf8e | 1 - .../4d/c56864bae9e452a250d75feb016733d09ea202 | Bin 176 -> 0 bytes .../51/3d1c7a4e4ec7418219a6f6a996a1dd50d215e0 | 1 - .../53/f60eac786573f36f937e92590fbeaa5ec352c5 | Bin 82 -> 0 bytes .../5d/93737949f3bf7448b9bff1ea1a6857719dfd7e | 2 - .../5f/fc8af4a5bce3a5d1bb10922825d1ab17cb248c | 1 - .../72/0c5f7aa181cf9cea23da548fbb021f38d9fbaf | Bin 142 -> 0 bytes .../80/825cb6e07f54443b341ed9d39784cd876ffa1c | Bin 50 -> 0 bytes .../83/2343a9e507c6fd57f16d8791fb20e9acc46dbd | 5 - .../99/9ce6b4f4cb2946870b45fdb306d8ac959c61af | Bin 98 -> 0 bytes .../a1/92ec1ddb71a9da1131292f4f2645e0ea41e221 | Bin 61 -> 0 bytes .../a5/e29f22a7f42f1e054fc9380d6a6063fc8be52d | 2 - .../b2/e8bc617d3c37efc3dc96230743b93289cd9664 | Bin 250 -> 0 bytes .../b5/8ab73999afe74516d77bad5862d71b9dea34ea | 2 - .../bb/fffbb02c86388164755e548c7c84edd1f7a24b | Bin 543 -> 0 bytes .../c6/8f4b7a3e8685a07f772def18929fb51e15dc38 | Bin 111 -> 0 bytes .../cb/50014baed1b4e4ee52e3015c6d998a8f3274d3 | Bin 446 -> 0 bytes .../d9/e2f98208630a987d87699ab91a1e12b7a6b70c | Bin 612 -> 0 bytes .../e3/640c5fd355a8b8f02c74568c8c61f8d6d96ba1 | 1 - .../e5/100668f68a70d11d77595d14f2d9a840887ece | Bin 146 -> 0 bytes .../e6/9de29bb2d1d6434b8b29ae775ad8c2e48c5391 | Bin 15 -> 0 bytes .../ee/05cbffa4bf921604993d10f00af6db466791f1 | 3 - .../ee/ef3a7abbc3e07d43d5959d55a75e1712d09344 | 2 - .../f5/03fd174754be16f5d3e400bf72c021a051bd87 | Bin 617 -> 0 bytes .../f8/4f7799dbee242a0334389d8f49094cce02c21b | Bin 495 -> 0 bytes .../fa/c0a07e79fb57ae79082b13c5c95933669d5548 | 1 - .../fb/b3f1d36c81acb2c989d2eda61d70f678d010d9 | Bin 51 -> 0 bytes .../karavan/karavan.git/objects/info/packs | 1 - .../karavan/karavan.git/refs/heads/main| 1 - .../karavan/karavan.git/refs/heads/master | 1 - docs/install/karavan-docker/data/home/.gitconfig | 22 --- .../data/indexers/issues.bleve/index_meta.json | 1 - .../data/indexers/issues.bleve/rupture_meta.json | 1 - .../data/indexers/issues.bleve/store/root.bolt | Bin 65536 -> 0 bytes docs/install/karavan-docker/data/jwt/private.pem | 52 --- .../karavan-docker/data/queues/common/10.ldb | Bin 519 -> 0 bytes .../karavan-docker/data/queues/common/11.log | Bin 1520 -> 0 bytes .../karavan-docker/data/queues/common/CURRENT | 1 - .../install/karavan-docker/data/queues/common/LOCK | 0 docs/install/karavan-docker/data/queues/common/LOG | 50 -- .../data/queues/common/MANIFEST-12 | Bin 151 -> 0 bytes
(camel-karavan) 06/09: Docker compose
This is an automated email from the ASF dual-hosted git repository. marat pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-karavan.git commit 00023abfe7f456604942e30ada9f5d829b9c4812 Author: Marat Gubaidullin AuthorDate: Fri Feb 23 09:56:02 2024 -0500 Docker compose --- install/karavan-docker/docker-compose-gitea.yaml | 17 - 1 file changed, 16 insertions(+), 1 deletion(-) diff --git a/install/karavan-docker/docker-compose-gitea.yaml b/install/karavan-docker/docker-compose-gitea.yaml index 96c4d812..2b330438 100644 --- a/install/karavan-docker/docker-compose-gitea.yaml +++ b/install/karavan-docker/docker-compose-gitea.yaml @@ -4,7 +4,7 @@ services: karavan: container_name: karavan -image: ghcr.io/apache/camel-karavan:4.4.0 +image: marat/karavan:4.4.0 ports: - "8080:8080" environment: @@ -21,6 +21,15 @@ services: - "/var/run/docker.sock:/var/run/docker.sock" labels: - "org.apache.camel.karavan/type=internal" +depends_on: + gitea: +condition: service_healthy +restart: true +restart_policy: +condition: on-failure +delay: 3s +max_attempts: 5 +window: 60s networks: - karavan @@ -33,6 +42,12 @@ services: volumes: - ./data:/var/lib/gitea - ./config:/etc/gitea +healthcheck: + test: ["CMD", "curl", "-f", "http://localhost:3000/api/healthz;] + interval: 1m + timeout: 10s + retries: 3 + start_period: 10s labels: - "org.apache.camel.karavan/type=internal" networks:
(camel-karavan) 02/09: Docke compose
This is an automated email from the ASF dual-hosted git repository. marat pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-karavan.git commit 18906112558e616839a13331081d653ca5d4eb0b Author: Marat Gubaidullin AuthorDate: Thu Feb 22 22:44:29 2024 -0500 Docke compose --- install/karavan-docker/config/app.ini | 98 + install/karavan-docker/data.zip| Bin 0 -> 73304 bytes install/karavan-docker/docker-compose.yaml | 54 .../camel/karavan/registry/RegistryService.java| 2 +- 4 files changed, 153 insertions(+), 1 deletion(-) diff --git a/install/karavan-docker/config/app.ini b/install/karavan-docker/config/app.ini new file mode 100644 index ..5d85a4c9 --- /dev/null +++ b/install/karavan-docker/config/app.ini @@ -0,0 +1,98 @@ +APP_NAME = Gitea: Git with a cup of tea +RUN_USER = git +RUN_MODE = prod +WORK_PATH = /var/lib/gitea + +[repository] +ROOT = /var/lib/gitea/git/repositories + +[repository.local] +LOCAL_COPY_PATH = /tmp/gitea/local-repo + +[repository.upload] +TEMP_PATH = /tmp/gitea/uploads + +[server] +APP_DATA_PATH = /var/lib/gitea +SSH_DOMAIN = gitea +HTTP_PORT = 3000 +ROOT_URL = http://localhost:3000/ +DISABLE_SSH = false +; In rootless gitea container only internal ssh server is supported +START_SSH_SERVER = true +SSH_PORT = +SSH_LISTEN_PORT = +BUILTIN_SSH_SERVER_USER = git +LFS_START_SERVER = true +DOMAIN = localhost +LFS_JWT_SECRET = cc4pXAedXHJSZ9GvVQoGDP8mL6mkok3qP-XoGKBpg-g +OFFLINE_MODE = false + +[database] +PATH = /var/lib/gitea/data/gitea.db +DB_TYPE = sqlite3 +HOST = localhost:3306 +NAME = gitea +USER = root +PASSWD = +SCHEMA = +SSL_MODE = disable +LOG_SQL = false + +[session] +PROVIDER_CONFIG = /var/lib/gitea/data/sessions +PROVIDER = file + +[picture] +AVATAR_UPLOAD_PATH = /var/lib/gitea/data/avatars +REPOSITORY_AVATAR_UPLOAD_PATH = /var/lib/gitea/data/repo-avatars + +[attachment] +PATH = /var/lib/gitea/data/attachments + +[log] +ROOT_PATH = /var/lib/gitea/data/log +MODE = console +LEVEL = info + +[security] +INSTALL_LOCK = true +SECRET_KEY = +REVERSE_PROXY_LIMIT = 1 +REVERSE_PROXY_TRUSTED_PROXIES = * +INTERNAL_TOKEN = eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYmYiOjE3MDg2NTM3NjB9.c5cId2fvNYfSqFAl4V23C9m4w6Xw89dxkoZp8YBpDh0 +PASSWORD_HASH_ALGO = pbkdf2 + +[service] +DISABLE_REGISTRATION = false +REQUIRE_SIGNIN_VIEW = false +REGISTER_EMAIL_CONFIRM = false +ENABLE_NOTIFY_MAIL = false +ALLOW_ONLY_EXTERNAL_REGISTRATION = false +ENABLE_CAPTCHA = false +DEFAULT_KEEP_EMAIL_PRIVATE = false +DEFAULT_ALLOW_CREATE_ORGANIZATION = true +DEFAULT_ENABLE_TIMETRACKING = true +NO_REPLY_ADDRESS = noreply.localhost + +[lfs] +PATH = /var/lib/gitea/git/lfs + +[mailer] +ENABLED = false + +[openid] +ENABLE_OPENID_SIGNIN = true +ENABLE_OPENID_SIGNUP = true + +[cron.update_checker] +ENABLED = false + +[repository.pull-request] +DEFAULT_MERGE_STYLE = merge + +[repository.signing] +DEFAULT_TRUST_MODEL = committer + +[oauth2] +JWT_SECRET = NydT-c0maoxZfgOHloby9v2liDWM2lSs995O-rI6G2c diff --git a/install/karavan-docker/data.zip b/install/karavan-docker/data.zip new file mode 100644 index ..54e6f3f7 Binary files /dev/null and b/install/karavan-docker/data.zip differ diff --git a/install/karavan-docker/docker-compose.yaml b/install/karavan-docker/docker-compose.yaml new file mode 100644 index ..db64844b --- /dev/null +++ b/install/karavan-docker/docker-compose.yaml @@ -0,0 +1,54 @@ +version: '3.8' + +services: + + karavan: +container_name: karavan +image: ghcr.io/apache/camel-karavan:4.4.0 +ports: + - "8080:8080" +environment: + - KARAVAN_GIT_REPOSITORY=http://gitea:3000/karavan/karavan.git + - KARAVAN_GIT_USERNAME=karavan + - KARAVAN_GIT_PASSWORD=karavan + - KARAVAN_GIT_BRANCH=main + - KARAVAN_IMAGE_REGISTRY=registry:5000 + - KARAVAN_IMAGE_REGISTRY_USERNAME= + - KARAVAN_IMAGE_REGISTRY_PASSWORD= + - KARAVAN_IMAGE_GROUP=karavan +volumes: + - "/var/run/docker.sock:/var/run/docker.sock" +labels: + - "org.apache.camel.karavan/type=internal" +networks: + - karavan + + gitea: +container_name: gitea +image: gitea/gitea:1.21.6-rootless +restart: always +ports: + - "3000:3000" +volumes: + - ./data:/var/lib/gitea + - ./config:/etc/gitea +labels: + - "org.apache.camel.karavan/type=internal" +networks: + - karavan + + registry: +container_name: registry +image: registry:2 +restart: always +ports: + - ":5000" +labels: + - "org.apache.camel.karavan/type=internal" +networks: + - karavan + +networks: + karavan: +name: karavan +external: true \ No newline at end of file diff --git a/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/registry/RegistryService.java
(camel-karavan) 01/09: proeprties for #1135
This is an automated email from the ASF dual-hosted git repository. marat pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-karavan.git commit 5e9cccade08464b3172c58944a22def452818e15 Author: Marat Gubaidullin AuthorDate: Thu Feb 22 22:41:31 2024 -0500 proeprties for #1135 --- .../src/main/resources/snippets/docker-application.properties | 10 +- .../main/resources/snippets/kubernetes-application.properties | 10 +- .../main/resources/snippets/openshift-application.properties | 10 +- 3 files changed, 15 insertions(+), 15 deletions(-) diff --git a/karavan-web/karavan-app/src/main/resources/snippets/docker-application.properties b/karavan-web/karavan-app/src/main/resources/snippets/docker-application.properties index 4b447641..580af06f 100644 --- a/karavan-web/karavan-app/src/main/resources/snippets/docker-application.properties +++ b/karavan-web/karavan-app/src/main/resources/snippets/docker-application.properties @@ -11,11 +11,11 @@ camel.server.healthCheckEnabled=true camel.server.devConsoleEnabled=true camel.main.tracingStandby=true camel.main.autoConfigurationFailFast=false -camel.main.routeControllerSuperviseEnabled=true -camel.main.routeControllerBackoffDelay = 5000 -camel.main.routeControllerBackoffMaxAttempts = 100 -camel.main.routeControllerInitialDelay = 1000 -camel.main.routeControllerThreadPoolSize = 3 +camel.routecontroller.superviseEnabled=true +camel.routecontroller.backoffDelay=5000 +camel.routecontroller.backoffMaxAttempts=100 +camel.routecontroller.initialDelay=1000 +camel.routecontroller.threadPoolSize=3 camel.context.dev-console=true camel.health.enabled=true camel.health.exposure-level=full diff --git a/karavan-web/karavan-app/src/main/resources/snippets/kubernetes-application.properties b/karavan-web/karavan-app/src/main/resources/snippets/kubernetes-application.properties index abda3182..832343a9 100644 --- a/karavan-web/karavan-app/src/main/resources/snippets/kubernetes-application.properties +++ b/karavan-web/karavan-app/src/main/resources/snippets/kubernetes-application.properties @@ -13,11 +13,11 @@ camel.server.healthCheckEnabled=true camel.server.devConsoleEnabled=true camel.main.tracingStandby=true camel.main.autoConfigurationFailFast=false -camel.main.routeControllerSuperviseEnabled=true -camel.main.routeControllerBackoffDelay = 5000 -camel.main.routeControllerBackoffMaxAttempts = 100 -camel.main.routeControllerInitialDelay = 1000 -camel.main.routeControllerThreadPoolSize = 3 +camel.routecontroller.superviseEnabled=true +camel.routecontroller.backoffDelay=5000 +camel.routecontroller.backoffMaxAttempts=100 +camel.routecontroller.initialDelay=1000 +camel.routecontroller.threadPoolSize=3 camel.context.dev-console=true label.runtime=app.kubernetes.io/runtime jib.from.image=gcr.io/distroless/java17@sha256:85c2fa20773270fe6fecf576dd5a53f5bb8b914e57a463c533dac034c51862d9 diff --git a/karavan-web/karavan-app/src/main/resources/snippets/openshift-application.properties b/karavan-web/karavan-app/src/main/resources/snippets/openshift-application.properties index ae861d60..d9e2f982 100644 --- a/karavan-web/karavan-app/src/main/resources/snippets/openshift-application.properties +++ b/karavan-web/karavan-app/src/main/resources/snippets/openshift-application.properties @@ -13,11 +13,11 @@ camel.server.healthCheckEnabled=true camel.server.devConsoleEnabled=true camel.main.tracingStandby=true camel.main.autoConfigurationFailFast=false -camel.main.routeControllerSuperviseEnabled=true -camel.main.routeControllerBackoffDelay = 5000 -camel.main.routeControllerBackoffMaxAttempts = 100 -camel.main.routeControllerInitialDelay = 1000 -camel.main.routeControllerThreadPoolSize = 3 +camel.routecontroller.superviseEnabled=true +camel.routecontroller.backoffDelay=5000 +camel.routecontroller.backoffMaxAttempts=100 +camel.routecontroller.initialDelay=1000 +camel.routecontroller.threadPoolSize=3 camel.context.dev-console=true label.runtime=app.openshift.io/runtime jib.from.image=gcr.io/distroless/java17@sha256:85c2fa20773270fe6fecf576dd5a53f5bb8b914e57a463c533dac034c51862d9
(camel-karavan) branch main updated (1a21ca28 -> ea49b0d2)
This is an automated email from the ASF dual-hosted git repository. marat pushed a change to branch main in repository https://gitbox.apache.org/repos/asf/camel-karavan.git from 1a21ca28 Default tag is dev new 5e9cccad proeprties for #1135 new 18906112 Docke compose new c99e2fcc gitignore new 5d97f3fe Docker compose new ca05abcd Redesign new 00023abf Docker compose new c52a9cb5 Cleanup new f376a9e3 Cleanup new ea49b0d2 Cleanup The 9 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "add" were already present in the repository and have only been added to this reference. Summary of changes: .github/workflows/app-oidc.yml | 4 +- .github/workflows/app.yml | 4 +- .github/workflows/docker-devmode.yml | 6 +- .gitignore | 3 + docs/install/karavan-docker/config/app.ini | 98 ++ docs/install/karavan-docker/data.zip | Bin 0 -> 73304 bytes .../karavan-docker/docker-compose-gitea.yaml | 70 docs/install/karavan-docker/docker-compose.yaml| 41 +++ docs/install/karavan-kubernetes/deployment.yaml| 66 docs/install/karavan-kubernetes/kustomization.yaml | 15 + docs/install/karavan-kubernetes/role-binding.yaml | 26 ++ docs/install/karavan-kubernetes/role.yaml | 30 ++ docs/install/karavan-kubernetes/secret.yaml| 19 ++ .../karavan-kubernetes/service-account.yaml| 5 + docs/install/karavan-kubernetes/service.yaml | 20 ++ .../karavan-app => karavan-app}/.dockerignore | 0 .../.mvn/wrapper/maven-wrapper.properties | 0 .../Dockerfile.dockerignore| 0 {karavan-web/karavan-app => karavan-app}/mvnw | 0 {karavan-web/karavan-app => karavan-app}/mvnw.cmd | 0 {karavan-web/karavan-app => karavan-app}/pom.xml | 0 .../src/main/docker/Dockerfile | 0 .../org/apache/camel/karavan/api/AuthResource.java | 2 +- .../apache/camel/karavan/api/BuildResource.java| 2 +- .../camel/karavan/api/ComponentResources.java | 0 .../camel/karavan/api/ConfigurationResource.java | 0 .../camel/karavan/api/ContainerResource.java | 2 +- .../apache/camel/karavan/api/DevModeResource.java | 2 +- .../apache/camel/karavan/api/ImagesResource.java | 4 +- .../camel/karavan/api/InfrastructureResource.java | 2 +- .../apache/camel/karavan/api/KameletResources.java | 2 +- .../apache/camel/karavan/api/LogWatchResource.java | 0 .../camel/karavan/api/NotificationResource.java| 0 .../camel/karavan/api/ProjectFileResource.java | 2 +- .../camel/karavan/api/ProjectGitResource.java | 0 .../apache/camel/karavan/api/ProjectResource.java | 4 +- .../apache/camel/karavan/api/StatusResource.java | 2 +- .../apache/camel/karavan/api/UsersResource.java| 0 .../org/apache/camel/karavan/code/CodeService.java | 11 +- .../camel/karavan/code/DockerComposeConverter.java | 0 .../camel/karavan/docker/DockerEventListener.java | 2 +- .../camel/karavan/docker/DockerForKaravan.java | 0 .../apache/camel/karavan/docker/DockerService.java | 8 +- .../camel/karavan/docker/DockerServiceUtils.java | 0 .../apache/camel/karavan/docker/LogCallback.java | 0 .../camel/karavan/docker/LoggerCallback.java | 0 .../apache/camel/karavan/docker/PullCallback.java | 0 .../karavan/kubernetes/DeploymentEventHandler.java | 2 +- .../karavan/kubernetes/KubernetesService.java | 2 +- .../camel/karavan/kubernetes/PodEventHandler.java | 2 +- .../karavan/kubernetes/ServiceEventHandler.java| 2 +- .../apache/camel/karavan/model/CamelStatus.java| 0 .../camel/karavan/model/CamelStatusValue.java | 0 .../apache/camel/karavan/model/ContainerPort.java | 0 .../camel/karavan/model/ContainerStatus.java | 0 .../camel/karavan/model/DeploymentStatus.java | 0 .../apache/camel/karavan/model/DockerCompose.java | 0 .../karavan/model/DockerComposeHealthCheck.java| 0 .../camel/karavan/model/DockerComposeNetwork.java | 0 .../camel/karavan/model/DockerComposeService.java | 0 .../org/apache/camel/karavan}/model/GitConfig.java | 2 +- .../org/apache/camel/karavan}/model/GitRepo.java | 2 +- .../apache/camel/karavan}/model/GitRepoFile.java | 2 +- .../org/apache/camel/karavan/model/GroupedKey.java | 0 .../org/apache/camel/karavan/model/Project.java| 0 .../apache/camel/karavan/model/ProjectFile.java| 0 .../camel/karavan/model}/RegistryConfig.java | 2 +- .../apache/camel/karavan/model/ServiceStatus.java | 0 .../apache/camel/karavan/service/AuthService.java | 0 .../apache/camel/karavan/service/CamelService.java | 1 - .../camel/karavan/service/ConfigService.java | 0
(camel-kamelets) branch regen_bot updated (fdf01671 -> 92e0441a)
This is an automated email from the ASF dual-hosted git repository. github-bot pushed a change to branch regen_bot in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git omit fdf01671 Regen for commit 1c00d673f03a7d6fba8fba0d959f9a406f801b5b add 92e0441a Regen for commit 1c00d673f03a7d6fba8fba0d959f9a406f801b5b This update added new revisions after undoing existing revisions. That is to say, some revisions that were in the old version of the branch are not in the new version. This situation occurs when a user --force pushes a change and generates a repository containing something like this: * -- * -- B -- O -- O -- O (fdf01671) \ N -- N -- N refs/heads/regen_bot (92e0441a) You should already have received notification emails for all of the O revisions, and so the following emails describe only the N revisions from the common base, B. Any revisions marked "omit" are not gone; other references still refer to them. Any revisions marked "discard" are gone forever. No new revisions were added by this update. Summary of changes:
Re: [I] Kafka Schema Registries: Support HTTPS of Apicurio Registry [camel-kamelets]
oscerd commented on issue #1786: URL: https://github.com/apache/camel-kamelets/issues/1786#issuecomment-1961483412 We added support for keycloak backed Apicurio instances. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
Re: [I] Kafka Schema Registries: Support HTTPS of Apicurio Registry [camel-kamelets]
oscerd closed issue #1786: Kafka Schema Registries: Support HTTPS of Apicurio Registry URL: https://github.com/apache/camel-kamelets/issues/1786 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
Re: [PR] Added a Kafka Apicurio Sink secured with Keycloak Kamelet [camel-kamelets]
oscerd commented on PR #1919: URL: https://github.com/apache/camel-kamelets/pull/1919#issuecomment-1961482438 Fixes #1916 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
Re: [I] Kafka Apicurio Secured Sink Kamelet [camel-kamelets]
oscerd closed issue #1916: Kafka Apicurio Secured Sink Kamelet URL: https://github.com/apache/camel-kamelets/issues/1916 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
Re: [PR] Generated sources regen [camel-kamelets]
oscerd merged PR #1920: URL: https://github.com/apache/camel-kamelets/pull/1920 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
(camel-kamelets) branch main updated: Regen for commit 1c00d673f03a7d6fba8fba0d959f9a406f801b5b
This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git The following commit(s) were added to refs/heads/main by this push: new 92e0441a Regen for commit 1c00d673f03a7d6fba8fba0d959f9a406f801b5b 92e0441a is described below commit 92e0441a48f8e42d5834baf76fbf25a31e7a6712 Author: oscerd AuthorDate: Fri Feb 23 10:22:02 2024 + Regen for commit 1c00d673f03a7d6fba8fba0d959f9a406f801b5b Signed-off-by: GitHub --- docs/modules/ROOT/nav.adoc | 1 - 1 file changed, 1 deletion(-) diff --git a/docs/modules/ROOT/nav.adoc b/docs/modules/ROOT/nav.adoc index 9ef5e6db..d67885d4 100644 --- a/docs/modules/ROOT/nav.adoc +++ b/docs/modules/ROOT/nav.adoc @@ -134,7 +134,6 @@ * xref:kafka-azure-schema-registry-sink.adoc[] * xref:kafka-azure-schema-registry-source.adoc[] * xref:kafka-batch-apicurio-registry-not-secured-source.adoc[] -* xref:kafka-batch-apicurio-registry-source.adoc[] * xref:kafka-batch-azure-schema-registry-source.adoc[] * xref:kafka-batch-manual-commit-action.adoc[] * xref:kafka-batch-not-secured-source.adoc[]
(camel-kamelets) branch 1916 deleted (was b74ffef2)
This is an automated email from the ASF dual-hosted git repository. acosentino pushed a change to branch 1916 in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git was b74ffef2 Added a Kafka Apicurio Sink secured with Keycloak Kamelet The revisions that were on this branch are still contained in other references; therefore, this change does not discard any commits from the repository.
Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]
lburgazzoli commented on code in PR #5090: URL: https://github.com/apache/camel-k/pull/5090#discussion_r1500747075 ## pkg/trait/mount.go: ## @@ -165,4 +193,191 @@ func (t *mountTrait) mountResource(vols *[]corev1.Volume, mnts *[]corev1.VolumeM *vols = append(*vols, *vol) *mnts = append(*mnts, *mnt) + + // User specified location file (only properties file) + if dstDir != "" { + if strings.HasSuffix(dstDir, ".properties") { + return []string{mntPath}, nil + } + return nil, nil + } + + // We only process this for text configuration .properties files, never for resources + if conf.ContentType() == utilResource.ContentTypeText { + // the user asked to store the entire resource without specifying any filter + // we need to list all the resources belonging to the resource + if conf.StorageType() == utilResource.StorageTypeConfigmap { + cm := kubernetes.LookupConfigmap(e.Ctx, e.Client, e.Integration.Namespace, conf.Name()) Review Comment: as far as I remember, it does not matter. The runtime/extensione loads them even if they are not .properties -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]
squakez commented on code in PR #5090: URL: https://github.com/apache/camel-k/pull/5090#discussion_r1500743704 ## pkg/trait/mount.go: ## @@ -165,4 +193,191 @@ func (t *mountTrait) mountResource(vols *[]corev1.Volume, mnts *[]corev1.VolumeM *vols = append(*vols, *vol) *mnts = append(*mnts, *mnt) + + // User specified location file (only properties file) + if dstDir != "" { + if strings.HasSuffix(dstDir, ".properties") { + return []string{mntPath}, nil + } + return nil, nil + } + + // We only process this for text configuration .properties files, never for resources + if conf.ContentType() == utilResource.ContentTypeText { + // the user asked to store the entire resource without specifying any filter + // we need to list all the resources belonging to the resource + if conf.StorageType() == utilResource.StorageTypeConfigmap { + cm := kubernetes.LookupConfigmap(e.Ctx, e.Client, e.Integration.Namespace, conf.Name()) Review Comment: No. Not all the cm/secrets are `.properties` file. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]
lburgazzoli commented on code in PR #5090: URL: https://github.com/apache/camel-k/pull/5090#discussion_r1500740746 ## pkg/trait/mount.go: ## @@ -165,4 +193,191 @@ func (t *mountTrait) mountResource(vols *[]corev1.Volume, mnts *[]corev1.VolumeM *vols = append(*vols, *vol) *mnts = append(*mnts, *mnt) + + // User specified location file (only properties file) + if dstDir != "" { + if strings.HasSuffix(dstDir, ".properties") { + return []string{mntPath}, nil + } + return nil, nil + } + + // We only process this for text configuration .properties files, never for resources + if conf.ContentType() == utilResource.ContentTypeText { + // the user asked to store the entire resource without specifying any filter + // we need to list all the resources belonging to the resource + if conf.StorageType() == utilResource.StorageTypeConfigmap { + cm := kubernetes.LookupConfigmap(e.Ctx, e.Client, e.Integration.Namespace, conf.Name()) + if cm != nil { + for k := range cm.Data { + if strings.HasSuffix(k, ".properties") { + paths = append(paths, fmt.Sprintf("%s/%s", mntPath, k)) + } else { + // Deprecated: use explicit configuration instead + envName := strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_")) + t.L.Infof(`Deprecation notice: the operator is adding the environment variable %s which will take runtime value from configmap. + This feature may disappear in future releases, make sure to use properties file in you configmap instead.`, envName) + propsAsEnv = append(propsAsEnv, corev1.EnvVar{ + Name: envName, + ValueFrom: { + ConfigMapKeyRef: { + LocalObjectReference: corev1.LocalObjectReference{ + Name: cm.Name, + }, + Key: k, + }, + }, + }) + } + } + } + } else if conf.StorageType() == utilResource.StorageTypeSecret { + sec := kubernetes.LookupSecret(e.Ctx, e.Client, e.Integration.Namespace, conf.Name()) + if sec != nil { + for k := range sec.Data { + if strings.HasSuffix(k, ".properties") { + paths = append(paths, fmt.Sprintf("%s/%s", mntPath, k)) + } else { + // Deprecated: use explicit configuration instead + envName := strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_")) + t.L.Infof(`Deprecation notice: the operator is adding the environment variable %s which will take runtime value from secret. + This feature may disappear in future releases, make sure to use properties file in you secret instead.`, envName) + propsAsEnv = append(propsAsEnv, corev1.EnvVar{ + Name: envName, + ValueFrom: { + SecretKeyRef: { + LocalObjectReference: corev1.LocalObjectReference{ + Name: sec.Name, + }, + Key: k, + }, + }, + }) +
Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]
squakez commented on code in PR #5090: URL: https://github.com/apache/camel-k/pull/5090#discussion_r1500731359 ## pkg/trait/mount.go: ## @@ -165,4 +193,191 @@ func (t *mountTrait) mountResource(vols *[]corev1.Volume, mnts *[]corev1.VolumeM *vols = append(*vols, *vol) *mnts = append(*mnts, *mnt) + + // User specified location file (only properties file) + if dstDir != "" { + if strings.HasSuffix(dstDir, ".properties") { + return []string{mntPath}, nil + } + return nil, nil + } + + // We only process this for text configuration .properties files, never for resources + if conf.ContentType() == utilResource.ContentTypeText { + // the user asked to store the entire resource without specifying any filter + // we need to list all the resources belonging to the resource + if conf.StorageType() == utilResource.StorageTypeConfigmap { + cm := kubernetes.LookupConfigmap(e.Ctx, e.Client, e.Integration.Namespace, conf.Name()) + if cm != nil { + for k := range cm.Data { + if strings.HasSuffix(k, ".properties") { + paths = append(paths, fmt.Sprintf("%s/%s", mntPath, k)) + } else { + // Deprecated: use explicit configuration instead + envName := strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_")) + t.L.Infof(`Deprecation notice: the operator is adding the environment variable %s which will take runtime value from configmap. + This feature may disappear in future releases, make sure to use properties file in you configmap instead.`, envName) + propsAsEnv = append(propsAsEnv, corev1.EnvVar{ + Name: envName, + ValueFrom: { + ConfigMapKeyRef: { + LocalObjectReference: corev1.LocalObjectReference{ + Name: cm.Name, + }, + Key: k, + }, + }, + }) + } + } + } + } else if conf.StorageType() == utilResource.StorageTypeSecret { + sec := kubernetes.LookupSecret(e.Ctx, e.Client, e.Integration.Namespace, conf.Name()) + if sec != nil { + for k := range sec.Data { + if strings.HasSuffix(k, ".properties") { + paths = append(paths, fmt.Sprintf("%s/%s", mntPath, k)) + } else { + // Deprecated: use explicit configuration instead + envName := strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_")) + t.L.Infof(`Deprecation notice: the operator is adding the environment variable %s which will take runtime value from secret. + This feature may disappear in future releases, make sure to use properties file in you secret instead.`, envName) + propsAsEnv = append(propsAsEnv, corev1.EnvVar{ + Name: envName, + ValueFrom: { + SecretKeyRef: { + LocalObjectReference: corev1.LocalObjectReference{ + Name: sec.Name, + }, + Key: k, + }, + }, + }) +
Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]
lburgazzoli commented on code in PR #5090: URL: https://github.com/apache/camel-k/pull/5090#discussion_r1500730105 ## pkg/trait/mount.go: ## @@ -165,4 +193,191 @@ func (t *mountTrait) mountResource(vols *[]corev1.Volume, mnts *[]corev1.VolumeM *vols = append(*vols, *vol) *mnts = append(*mnts, *mnt) + + // User specified location file (only properties file) + if dstDir != "" { + if strings.HasSuffix(dstDir, ".properties") { + return []string{mntPath}, nil + } + return nil, nil + } + + // We only process this for text configuration .properties files, never for resources + if conf.ContentType() == utilResource.ContentTypeText { + // the user asked to store the entire resource without specifying any filter + // we need to list all the resources belonging to the resource + if conf.StorageType() == utilResource.StorageTypeConfigmap { + cm := kubernetes.LookupConfigmap(e.Ctx, e.Client, e.Integration.Namespace, conf.Name()) Review Comment: Isn't this already the case ? with mount.configs we know already what config maps/secrets are configuration resources. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
(camel-k) branch dependabot/go_modules/github.com/prometheus/common-0.48.0 deleted (was 09d7f519e)
This is an automated email from the ASF dual-hosted git repository. pcongiusti pushed a change to branch dependabot/go_modules/github.com/prometheus/common-0.48.0 in repository https://gitbox.apache.org/repos/asf/camel-k.git was 09d7f519e chore(deps): bump github.com/prometheus/common from 0.47.0 to 0.48.0 The revisions that were on this branch are still contained in other references; therefore, this change does not discard any commits from the repository.
(camel-k) branch main updated: chore(deps): bump github.com/prometheus/common from 0.47.0 to 0.48.0
This is an automated email from the ASF dual-hosted git repository. pcongiusti pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-k.git The following commit(s) were added to refs/heads/main by this push: new 24a3cd629 chore(deps): bump github.com/prometheus/common from 0.47.0 to 0.48.0 24a3cd629 is described below commit 24a3cd62980bf7f4d6436fa06b88c67490d7dea3 Author: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> AuthorDate: Fri Feb 23 00:43:37 2024 + chore(deps): bump github.com/prometheus/common from 0.47.0 to 0.48.0 Bumps [github.com/prometheus/common](https://github.com/prometheus/common) from 0.47.0 to 0.48.0. - [Release notes](https://github.com/prometheus/common/releases) - [Commits](https://github.com/prometheus/common/compare/v0.47.0...v0.48.0) --- updated-dependencies: - dependency-name: github.com/prometheus/common dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] --- go.mod | 2 +- go.sum | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/go.mod b/go.mod index 4cb269a03..d74ced5aa 100644 --- a/go.mod +++ b/go.mod @@ -23,7 +23,7 @@ require ( github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring v0.67.1 github.com/prometheus/client_golang v1.18.0 github.com/prometheus/client_model v0.6.0 - github.com/prometheus/common v0.47.0 + github.com/prometheus/common v0.48.0 github.com/redhat-developer/service-binding-operator v1.4.0 github.com/rs/xid v1.5.0 github.com/sirupsen/logrus v1.9.3 diff --git a/go.sum b/go.sum index f3ce79b20..d339a1976 100644 --- a/go.sum +++ b/go.sum @@ -360,8 +360,8 @@ github.com/prometheus/common v0.26.0/go.mod h1:M7rCNAaPfAosfx8veZJCuw84e35h3Cfd9 github.com/prometheus/common v0.32.1/go.mod h1:vu+V0TpY+O6vW9J44gczi3Ap/oXXR10b+M/gUGO4Hls= github.com/prometheus/common v0.35.0/go.mod h1:phzohg0JFMnBEFGxTDbfu3QyL5GI8gTQJFhYO5B3mfA= github.com/prometheus/common v0.37.0/go.mod h1:phzohg0JFMnBEFGxTDbfu3QyL5GI8gTQJFhYO5B3mfA= -github.com/prometheus/common v0.47.0 h1:p5Cz0FNHo7SnWOmWmoRozVcjEp0bIVU8cV7OShpjL1k= -github.com/prometheus/common v0.47.0/go.mod h1:0/KsvlIEfPQCQ5I2iNSAWKPZziNCvRs5EC6ILDTlAPc= +github.com/prometheus/common v0.48.0 h1:QO8U2CdOzSn1BBsmXJXduaaW+dY/5QLjfB8svtSzKKE= +github.com/prometheus/common v0.48.0/go.mod h1:0/KsvlIEfPQCQ5I2iNSAWKPZziNCvRs5EC6ILDTlAPc= github.com/prometheus/procfs v0.0.0-20181005140218-185b4288413d/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk= github.com/prometheus/procfs v0.0.2/go.mod h1:TjEm7ze935MbeOT/UhFTIMYKhuLP4wbCsTZCD3I8kEA= github.com/prometheus/procfs v0.1.3/go.mod h1:lV6e/gmhEcM9IjHGsFOCxxuZ+z1YqCvr4OA4YeYWdaU=
Re: [PR] chore(deps): bump github.com/prometheus/common from 0.47.0 to 0.48.0 [camel-k]
squakez merged PR #5177: URL: https://github.com/apache/camel-k/pull/5177 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]
squakez commented on code in PR #5090: URL: https://github.com/apache/camel-k/pull/5090#discussion_r1500722411 ## pkg/trait/mount.go: ## @@ -165,4 +193,191 @@ func (t *mountTrait) mountResource(vols *[]corev1.Volume, mnts *[]corev1.VolumeM *vols = append(*vols, *vol) *mnts = append(*mnts, *mnt) + + // User specified location file (only properties file) + if dstDir != "" { + if strings.HasSuffix(dstDir, ".properties") { + return []string{mntPath}, nil + } + return nil, nil + } + + // We only process this for text configuration .properties files, never for resources + if conf.ContentType() == utilResource.ContentTypeText { + // the user asked to store the entire resource without specifying any filter + // we need to list all the resources belonging to the resource + if conf.StorageType() == utilResource.StorageTypeConfigmap { + cm := kubernetes.LookupConfigmap(e.Ctx, e.Client, e.Integration.Namespace, conf.Name()) Review Comment: True. We may rework the feature to let the user explictly specify the cm/secrets holding the properties and deprecate this part for future removal. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]
lburgazzoli commented on code in PR #5090: URL: https://github.com/apache/camel-k/pull/5090#discussion_r1500718125 ## pkg/trait/mount.go: ## @@ -165,4 +193,191 @@ func (t *mountTrait) mountResource(vols *[]corev1.Volume, mnts *[]corev1.VolumeM *vols = append(*vols, *vol) *mnts = append(*mnts, *mnt) + + // User specified location file (only properties file) + if dstDir != "" { + if strings.HasSuffix(dstDir, ".properties") { + return []string{mntPath}, nil + } + return nil, nil + } + + // We only process this for text configuration .properties files, never for resources + if conf.ContentType() == utilResource.ContentTypeText { + // the user asked to store the entire resource without specifying any filter + // we need to list all the resources belonging to the resource + if conf.StorageType() == utilResource.StorageTypeConfigmap { + cm := kubernetes.LookupConfigmap(e.Ctx, e.Client, e.Integration.Namespace, conf.Name()) + if cm != nil { + for k := range cm.Data { + if strings.HasSuffix(k, ".properties") { + paths = append(paths, fmt.Sprintf("%s/%s", mntPath, k)) + } else { + // Deprecated: use explicit configuration instead + envName := strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_")) + t.L.Infof(`Deprecation notice: the operator is adding the environment variable %s which will take runtime value from configmap. + This feature may disappear in future releases, make sure to use properties file in you configmap instead.`, envName) + propsAsEnv = append(propsAsEnv, corev1.EnvVar{ + Name: envName, + ValueFrom: { + ConfigMapKeyRef: { + LocalObjectReference: corev1.LocalObjectReference{ + Name: cm.Name, + }, + Key: k, + }, + }, + }) + } + } + } + } else if conf.StorageType() == utilResource.StorageTypeSecret { + sec := kubernetes.LookupSecret(e.Ctx, e.Client, e.Integration.Namespace, conf.Name()) + if sec != nil { + for k := range sec.Data { + if strings.HasSuffix(k, ".properties") { + paths = append(paths, fmt.Sprintf("%s/%s", mntPath, k)) + } else { + // Deprecated: use explicit configuration instead + envName := strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_")) + t.L.Infof(`Deprecation notice: the operator is adding the environment variable %s which will take runtime value from secret. + This feature may disappear in future releases, make sure to use properties file in you secret instead.`, envName) + propsAsEnv = append(propsAsEnv, corev1.EnvVar{ + Name: envName, + ValueFrom: { + SecretKeyRef: { + LocalObjectReference: corev1.LocalObjectReference{ + Name: sec.Name, + }, + Key: k, + }, + }, + }) +
Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]
squakez commented on code in PR #5090: URL: https://github.com/apache/camel-k/pull/5090#discussion_r1500712295 ## pkg/trait/mount.go: ## @@ -165,4 +193,191 @@ func (t *mountTrait) mountResource(vols *[]corev1.Volume, mnts *[]corev1.VolumeM *vols = append(*vols, *vol) *mnts = append(*mnts, *mnt) + + // User specified location file (only properties file) + if dstDir != "" { + if strings.HasSuffix(dstDir, ".properties") { + return []string{mntPath}, nil + } + return nil, nil + } + + // We only process this for text configuration .properties files, never for resources + if conf.ContentType() == utilResource.ContentTypeText { + // the user asked to store the entire resource without specifying any filter + // we need to list all the resources belonging to the resource + if conf.StorageType() == utilResource.StorageTypeConfigmap { + cm := kubernetes.LookupConfigmap(e.Ctx, e.Client, e.Integration.Namespace, conf.Name()) + if cm != nil { + for k := range cm.Data { + if strings.HasSuffix(k, ".properties") { + paths = append(paths, fmt.Sprintf("%s/%s", mntPath, k)) + } else { + // Deprecated: use explicit configuration instead + envName := strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_")) + t.L.Infof(`Deprecation notice: the operator is adding the environment variable %s which will take runtime value from configmap. + This feature may disappear in future releases, make sure to use properties file in you configmap instead.`, envName) + propsAsEnv = append(propsAsEnv, corev1.EnvVar{ + Name: envName, + ValueFrom: { + ConfigMapKeyRef: { + LocalObjectReference: corev1.LocalObjectReference{ + Name: cm.Name, + }, + Key: k, + }, + }, + }) + } + } + } + } else if conf.StorageType() == utilResource.StorageTypeSecret { + sec := kubernetes.LookupSecret(e.Ctx, e.Client, e.Integration.Namespace, conf.Name()) + if sec != nil { + for k := range sec.Data { + if strings.HasSuffix(k, ".properties") { + paths = append(paths, fmt.Sprintf("%s/%s", mntPath, k)) + } else { + // Deprecated: use explicit configuration instead + envName := strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_")) + t.L.Infof(`Deprecation notice: the operator is adding the environment variable %s which will take runtime value from secret. + This feature may disappear in future releases, make sure to use properties file in you secret instead.`, envName) + propsAsEnv = append(propsAsEnv, corev1.EnvVar{ + Name: envName, + ValueFrom: { + SecretKeyRef: { + LocalObjectReference: corev1.LocalObjectReference{ + Name: sec.Name, + }, + Key: k, + }, + }, + }) +
Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]
squakez commented on code in PR #5090: URL: https://github.com/apache/camel-k/pull/5090#discussion_r1500712295 ## pkg/trait/mount.go: ## @@ -165,4 +193,191 @@ func (t *mountTrait) mountResource(vols *[]corev1.Volume, mnts *[]corev1.VolumeM *vols = append(*vols, *vol) *mnts = append(*mnts, *mnt) + + // User specified location file (only properties file) + if dstDir != "" { + if strings.HasSuffix(dstDir, ".properties") { + return []string{mntPath}, nil + } + return nil, nil + } + + // We only process this for text configuration .properties files, never for resources + if conf.ContentType() == utilResource.ContentTypeText { + // the user asked to store the entire resource without specifying any filter + // we need to list all the resources belonging to the resource + if conf.StorageType() == utilResource.StorageTypeConfigmap { + cm := kubernetes.LookupConfigmap(e.Ctx, e.Client, e.Integration.Namespace, conf.Name()) + if cm != nil { + for k := range cm.Data { + if strings.HasSuffix(k, ".properties") { + paths = append(paths, fmt.Sprintf("%s/%s", mntPath, k)) + } else { + // Deprecated: use explicit configuration instead + envName := strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_")) + t.L.Infof(`Deprecation notice: the operator is adding the environment variable %s which will take runtime value from configmap. + This feature may disappear in future releases, make sure to use properties file in you configmap instead.`, envName) + propsAsEnv = append(propsAsEnv, corev1.EnvVar{ + Name: envName, + ValueFrom: { + ConfigMapKeyRef: { + LocalObjectReference: corev1.LocalObjectReference{ + Name: cm.Name, + }, + Key: k, + }, + }, + }) + } + } + } + } else if conf.StorageType() == utilResource.StorageTypeSecret { + sec := kubernetes.LookupSecret(e.Ctx, e.Client, e.Integration.Namespace, conf.Name()) + if sec != nil { + for k := range sec.Data { + if strings.HasSuffix(k, ".properties") { + paths = append(paths, fmt.Sprintf("%s/%s", mntPath, k)) + } else { + // Deprecated: use explicit configuration instead + envName := strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_")) + t.L.Infof(`Deprecation notice: the operator is adding the environment variable %s which will take runtime value from secret. + This feature may disappear in future releases, make sure to use properties file in you secret instead.`, envName) + propsAsEnv = append(propsAsEnv, corev1.EnvVar{ + Name: envName, + ValueFrom: { + SecretKeyRef: { + LocalObjectReference: corev1.LocalObjectReference{ + Name: sec.Name, + }, + Key: k, + }, + }, + }) +
Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]
squakez commented on code in PR #5090: URL: https://github.com/apache/camel-k/pull/5090#discussion_r1500712295 ## pkg/trait/mount.go: ## @@ -165,4 +193,191 @@ func (t *mountTrait) mountResource(vols *[]corev1.Volume, mnts *[]corev1.VolumeM *vols = append(*vols, *vol) *mnts = append(*mnts, *mnt) + + // User specified location file (only properties file) + if dstDir != "" { + if strings.HasSuffix(dstDir, ".properties") { + return []string{mntPath}, nil + } + return nil, nil + } + + // We only process this for text configuration .properties files, never for resources + if conf.ContentType() == utilResource.ContentTypeText { + // the user asked to store the entire resource without specifying any filter + // we need to list all the resources belonging to the resource + if conf.StorageType() == utilResource.StorageTypeConfigmap { + cm := kubernetes.LookupConfigmap(e.Ctx, e.Client, e.Integration.Namespace, conf.Name()) + if cm != nil { + for k := range cm.Data { + if strings.HasSuffix(k, ".properties") { + paths = append(paths, fmt.Sprintf("%s/%s", mntPath, k)) + } else { + // Deprecated: use explicit configuration instead + envName := strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_")) + t.L.Infof(`Deprecation notice: the operator is adding the environment variable %s which will take runtime value from configmap. + This feature may disappear in future releases, make sure to use properties file in you configmap instead.`, envName) + propsAsEnv = append(propsAsEnv, corev1.EnvVar{ + Name: envName, + ValueFrom: { + ConfigMapKeyRef: { + LocalObjectReference: corev1.LocalObjectReference{ + Name: cm.Name, + }, + Key: k, + }, + }, + }) + } + } + } + } else if conf.StorageType() == utilResource.StorageTypeSecret { + sec := kubernetes.LookupSecret(e.Ctx, e.Client, e.Integration.Namespace, conf.Name()) + if sec != nil { + for k := range sec.Data { + if strings.HasSuffix(k, ".properties") { + paths = append(paths, fmt.Sprintf("%s/%s", mntPath, k)) + } else { + // Deprecated: use explicit configuration instead + envName := strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_")) + t.L.Infof(`Deprecation notice: the operator is adding the environment variable %s which will take runtime value from secret. + This feature may disappear in future releases, make sure to use properties file in you secret instead.`, envName) + propsAsEnv = append(propsAsEnv, corev1.EnvVar{ + Name: envName, + ValueFrom: { + SecretKeyRef: { + LocalObjectReference: corev1.LocalObjectReference{ + Name: sec.Name, + }, + Key: k, + }, + }, + }) +
Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]
lburgazzoli commented on code in PR #5090: URL: https://github.com/apache/camel-k/pull/5090#discussion_r1500554671 ## pkg/trait/mount.go: ## @@ -165,4 +193,191 @@ func (t *mountTrait) mountResource(vols *[]corev1.Volume, mnts *[]corev1.VolumeM *vols = append(*vols, *vol) *mnts = append(*mnts, *mnt) + + // User specified location file (only properties file) + if dstDir != "" { + if strings.HasSuffix(dstDir, ".properties") { + return []string{mntPath}, nil + } + return nil, nil + } + + // We only process this for text configuration .properties files, never for resources + if conf.ContentType() == utilResource.ContentTypeText { + // the user asked to store the entire resource without specifying any filter + // we need to list all the resources belonging to the resource + if conf.StorageType() == utilResource.StorageTypeConfigmap { + cm := kubernetes.LookupConfigmap(e.Ctx, e.Client, e.Integration.Namespace, conf.Name()) Review Comment: The operator must NOT access to the user's config map/secrets/resources. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
(camel-website) branch kamelets-4.4.0 deleted (was 3e6a6abd)
This is an automated email from the ASF dual-hosted git repository. zregvart pushed a change to branch kamelets-4.4.0 in repository https://gitbox.apache.org/repos/asf/camel-website.git was 3e6a6abd Added docs for Camel-Kamelets 4.4.x The revisions that were on this branch are still contained in other references; therefore, this change does not discard any commits from the repository.
(camel-kamelets-examples) branch apicurio-secured-schema-reg-ex deleted (was 1422f8f)
This is an automated email from the ASF dual-hosted git repository. acosentino pushed a change to branch apicurio-secured-schema-reg-ex in repository https://gitbox.apache.org/repos/asf/camel-kamelets-examples.git was 1422f8f Added an example of Kafka Apicurio Kamelet with Keycloak The revisions that were on this branch are still contained in other references; therefore, this change does not discard any commits from the repository.
(camel-kamelets-examples) branch main updated: Added an example of Kafka Apicurio Kamelet with Keycloak
This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-kamelets-examples.git The following commit(s) were added to refs/heads/main by this push: new cb6cf4f Added an example of Kafka Apicurio Kamelet with Keycloak cb6cf4f is described below commit cb6cf4fbe7f353af7c3564caaff0703c9cadf288 Author: Andrea Cosentino AuthorDate: Fri Feb 23 11:58:22 2024 +0100 Added an example of Kafka Apicurio Kamelet with Keycloak Signed-off-by: Andrea Cosentino --- .../README.md | 102 .../application.properties | 9 + .../kafka-apicurio-kamelet.yaml| 45 ++ .../kafka-apicurio-producer-kamelet.yaml | 53 ++ .../kafka-producer/pom.xml | 84 +++ .../kafka-producer/src/main/avro/order.avsc| 33 + .../main/java/com/acme/example/kafka/Produce.java | 85 +++ .../java/com/acme/example/kafka/models/Order.java | 673 + 8 files changed, 1084 insertions(+) diff --git a/jbang/kafka-apicurio-secured-schema-registry/README.md b/jbang/kafka-apicurio-secured-schema-registry/README.md new file mode 100644 index 000..da2a6ea --- /dev/null +++ b/jbang/kafka-apicurio-secured-schema-registry/README.md @@ -0,0 +1,102 @@ +# Example for consuming from Kafka with the usage of Apicurio Schema Registry secured with Keycloak and Avro + +You'll need a running Kafka instance and an Apicurio Registry + +## Kafka instance + +You could use a plain Kafka archive or use an Ansible role + +## Apicurio Registry settings + +Follow the guide here to have a fully running Apicurio Registry with Keycloak: https://github.com/Apicurio/apicurio-registry/tree/main/distro/docker-compose#docker-compose-and-quarkus-based-installation + +Once everything is up and running, access the Keycloak instance located at `http://YOUR_IP:8080` + +The username and password is admin/admin. + +Select the realm `registry` and create a new user called `registry-account` with password `registry`. + +The client Id from Keycloak will be `registry-api`. + +In the client page, select credentials and copy the client secret value. + +In `application.properties` file copy the client secret value into `keycloak.client.secret`. + +The rest of the options could be used as-is. + +## Configure the applications + +In `application.properties` set the Kafka instance address. + +## Produce to Kafka. + +Run [`Produce.java`](./kafka-producer/src/main/java/com/acme/example/kafka/Produce.java) to produce a message to the Kafka. + +```bash +mvn compile exec:java -Dexec.mainClass="com.acme.example.kafka.Produce" +``` + +## Produce to Kafka without Kamelets + +To consume messages using a Camel route, first install the kafka-producer maven project: +```bash +cd kafka-producer +mvn clean install +``` +then run: +```bash +jbang run camel@apache/camel run --local-kamelet-dir= kafka-apicurio-kamelet.yaml +``` + +You should see something like + +```bash +2024-02-23 11:53:11.840 INFO 39989 --- [ main] el.impl.engine.AbstractCamelContext : Routes startup (started:3) +2024-02-23 11:53:11.841 INFO 39989 --- [ main] el.impl.engine.AbstractCamelContext : Started kafka-to-apicurio-log (kamelet://kafka-not-secured-apicurio-registry-source) +2024-02-23 11:53:11.841 INFO 39989 --- [ main] el.impl.engine.AbstractCamelContext : Started kafka-not-secured-apicurio-registry-source-1 (kafka://my-topic) +2024-02-23 11:53:11.841 INFO 39989 --- [ main] el.impl.engine.AbstractCamelContext : Started log-sink-2 (kamelet://source) +2024-02-23 11:53:11.841 INFO 39989 --- [ main] el.impl.engine.AbstractCamelContext : Apache Camel 4.4.0 (kafka-apicurio-kamelet) started in 216ms (build:0ms init:0ms start:216ms) +2024-02-23 11:53:12.083 INFO 39989 --- [sumer[my-topic]] fka.clients.consumer.ConsumerConfig : These configurations '[apicurio.registry.avroDatumProvider, apicurio.auth.service.url, apicurio.auth.realm, apicurio.auth.password, apicurio.auth.client.id, apicurio.auth.client.secret, apicurio.registry.url, apicurio.auth.username]' were supplied but are not used yet. +2024-02-23 11:53:12.085 INFO 39989 --- [sumer[my-topic]] he.kafka.common.utils.AppInfoParser : Kafka version: 3.5.1 +2024-02-23 11:53:12.085 INFO 39989 --- [sumer[my-topic]] he.kafka.common.utils.AppInfoParser : Kafka commitId: 2c6fb6c54472e90a +2024-02-23 11:53:12.085 INFO 39989 --- [sumer[my-topic]] he.kafka.common.utils.AppInfoParser : Kafka startTimeMs: 1708685592083 +2024-02-23 11:53:12.090 INFO 39989 --- [sumer[my-topic]] ort.classic.AssignmentAdapterHelper : Using NO-OP resume strategy +2024-02-23 11:53:12.090 INFO 39989 --- [sumer[my-topic]] l.component.kafka.KafkaFetchRecords : Subscribing my-topic-Thread 0 to topic my-topic +2024-02-23 11:53:12.091 INFO 39989 ---
Re: [PR] Added an example of Kafka Apicurio Kamelet with Keycloak [camel-kamelets-examples]
oscerd merged PR #65: URL: https://github.com/apache/camel-kamelets-examples/pull/65 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
[PR] Added an example of Kafka Apicurio Kamelet with Keycloak [camel-kamelets-examples]
oscerd opened a new pull request, #65: URL: https://github.com/apache/camel-kamelets-examples/pull/65 (no comment) -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
(camel-kamelets-examples) 01/01: Added an example of Kafka Apicurio Kamelet with Keycloak
This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch apicurio-secured-schema-reg-ex in repository https://gitbox.apache.org/repos/asf/camel-kamelets-examples.git commit 1422f8fdddbad641fc739dadd32fb293d99d4c51 Author: Andrea Cosentino AuthorDate: Fri Feb 23 11:58:22 2024 +0100 Added an example of Kafka Apicurio Kamelet with Keycloak Signed-off-by: Andrea Cosentino --- .../README.md | 102 .../application.properties | 9 + .../kafka-apicurio-kamelet.yaml| 45 ++ .../kafka-apicurio-producer-kamelet.yaml | 53 ++ .../kafka-producer/pom.xml | 84 +++ .../kafka-producer/src/main/avro/order.avsc| 33 + .../main/java/com/acme/example/kafka/Produce.java | 85 +++ .../java/com/acme/example/kafka/models/Order.java | 673 + 8 files changed, 1084 insertions(+) diff --git a/jbang/kafka-apicurio-secured-schema-registry/README.md b/jbang/kafka-apicurio-secured-schema-registry/README.md new file mode 100644 index 000..da2a6ea --- /dev/null +++ b/jbang/kafka-apicurio-secured-schema-registry/README.md @@ -0,0 +1,102 @@ +# Example for consuming from Kafka with the usage of Apicurio Schema Registry secured with Keycloak and Avro + +You'll need a running Kafka instance and an Apicurio Registry + +## Kafka instance + +You could use a plain Kafka archive or use an Ansible role + +## Apicurio Registry settings + +Follow the guide here to have a fully running Apicurio Registry with Keycloak: https://github.com/Apicurio/apicurio-registry/tree/main/distro/docker-compose#docker-compose-and-quarkus-based-installation + +Once everything is up and running, access the Keycloak instance located at `http://YOUR_IP:8080` + +The username and password is admin/admin. + +Select the realm `registry` and create a new user called `registry-account` with password `registry`. + +The client Id from Keycloak will be `registry-api`. + +In the client page, select credentials and copy the client secret value. + +In `application.properties` file copy the client secret value into `keycloak.client.secret`. + +The rest of the options could be used as-is. + +## Configure the applications + +In `application.properties` set the Kafka instance address. + +## Produce to Kafka. + +Run [`Produce.java`](./kafka-producer/src/main/java/com/acme/example/kafka/Produce.java) to produce a message to the Kafka. + +```bash +mvn compile exec:java -Dexec.mainClass="com.acme.example.kafka.Produce" +``` + +## Produce to Kafka without Kamelets + +To consume messages using a Camel route, first install the kafka-producer maven project: +```bash +cd kafka-producer +mvn clean install +``` +then run: +```bash +jbang run camel@apache/camel run --local-kamelet-dir= kafka-apicurio-kamelet.yaml +``` + +You should see something like + +```bash +2024-02-23 11:53:11.840 INFO 39989 --- [ main] el.impl.engine.AbstractCamelContext : Routes startup (started:3) +2024-02-23 11:53:11.841 INFO 39989 --- [ main] el.impl.engine.AbstractCamelContext : Started kafka-to-apicurio-log (kamelet://kafka-not-secured-apicurio-registry-source) +2024-02-23 11:53:11.841 INFO 39989 --- [ main] el.impl.engine.AbstractCamelContext : Started kafka-not-secured-apicurio-registry-source-1 (kafka://my-topic) +2024-02-23 11:53:11.841 INFO 39989 --- [ main] el.impl.engine.AbstractCamelContext : Started log-sink-2 (kamelet://source) +2024-02-23 11:53:11.841 INFO 39989 --- [ main] el.impl.engine.AbstractCamelContext : Apache Camel 4.4.0 (kafka-apicurio-kamelet) started in 216ms (build:0ms init:0ms start:216ms) +2024-02-23 11:53:12.083 INFO 39989 --- [sumer[my-topic]] fka.clients.consumer.ConsumerConfig : These configurations '[apicurio.registry.avroDatumProvider, apicurio.auth.service.url, apicurio.auth.realm, apicurio.auth.password, apicurio.auth.client.id, apicurio.auth.client.secret, apicurio.registry.url, apicurio.auth.username]' were supplied but are not used yet. +2024-02-23 11:53:12.085 INFO 39989 --- [sumer[my-topic]] he.kafka.common.utils.AppInfoParser : Kafka version: 3.5.1 +2024-02-23 11:53:12.085 INFO 39989 --- [sumer[my-topic]] he.kafka.common.utils.AppInfoParser : Kafka commitId: 2c6fb6c54472e90a +2024-02-23 11:53:12.085 INFO 39989 --- [sumer[my-topic]] he.kafka.common.utils.AppInfoParser : Kafka startTimeMs: 1708685592083 +2024-02-23 11:53:12.090 INFO 39989 --- [sumer[my-topic]] ort.classic.AssignmentAdapterHelper : Using NO-OP resume strategy +2024-02-23 11:53:12.090 INFO 39989 --- [sumer[my-topic]] l.component.kafka.KafkaFetchRecords : Subscribing my-topic-Thread 0 to topic my-topic +2024-02-23 11:53:12.091 INFO 39989 --- [sumer[my-topic]] afka.clients.consumer.KafkaConsumer : [Consumer clientId=consumer-2b2daf0d-5ce6-4fe3-8f3d-253d7cd92160-1,
(camel-kamelets-examples) branch apicurio-secured-schema-reg-ex created (now 1422f8f)
This is an automated email from the ASF dual-hosted git repository. acosentino pushed a change to branch apicurio-secured-schema-reg-ex in repository https://gitbox.apache.org/repos/asf/camel-kamelets-examples.git at 1422f8f Added an example of Kafka Apicurio Kamelet with Keycloak This branch includes the following new commits: new 1422f8f Added an example of Kafka Apicurio Kamelet with Keycloak The 1 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "add" were already present in the repository and have only been added to this reference.
(camel-kamelets) branch regen_bot updated (41fd1cab -> fdf01671)
This is an automated email from the ASF dual-hosted git repository. github-bot pushed a change to branch regen_bot in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git from 41fd1cab Regen for commit 899679e4d9a7d6e94bf1460c08b83566fe1b5b3f add 29abeb11 Added a Kafka Apicurio Sink secured with Keycloak Kamelet add 8f71007e Added a Kafka Apicurio Sink secured with Keycloak Kamelet add 6e46798c Added a Kafka Apicurio Sink secured with Keycloak Kamelet add 1c00d673 Added a Kafka Apicurio Sink secured with Keycloak Kamelet add fdf01671 Regen for commit 1c00d673f03a7d6fba8fba0d959f9a406f801b5b No new revisions were added by this update. Summary of changes: docs/modules/ROOT/nav.adoc | 1 + ...ot-secured-apicurio-registry-sink.kamelet.yaml} | 53 -- ...not-secured-apicurio-registry-sink.kamelet.yaml | 53 -- 3 files changed, 101 insertions(+), 6 deletions(-) copy kamelets/{kafka-apicurio-registry-not-secured-sink.kamelet.yaml => kafka-not-secured-apicurio-registry-sink.kamelet.yaml} (74%) copy kamelets/kafka-apicurio-registry-not-secured-sink.kamelet.yaml => library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml (74%)
[PR] Generated sources regen [camel-kamelets]
github-actions[bot] opened a new pull request, #1920: URL: https://github.com/apache/camel-kamelets/pull/1920 Regen bot :robot: found some uncommited changes after running build on :camel: kamelets main. Please do not delete `regen_bot` branch after merge/rebase. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]
lburgazzoli commented on code in PR #5090: URL: https://github.com/apache/camel-k/pull/5090#discussion_r1500464327 ## pkg/trait/mount.go: ## @@ -165,4 +193,191 @@ func (t *mountTrait) mountResource(vols *[]corev1.Volume, mnts *[]corev1.VolumeM *vols = append(*vols, *vol) *mnts = append(*mnts, *mnt) + + // User specified location file (only properties file) + if dstDir != "" { + if strings.HasSuffix(dstDir, ".properties") { + return []string{mntPath}, nil + } + return nil, nil + } + + // We only process this for text configuration .properties files, never for resources + if conf.ContentType() == utilResource.ContentTypeText { + // the user asked to store the entire resource without specifying any filter + // we need to list all the resources belonging to the resource + if conf.StorageType() == utilResource.StorageTypeConfigmap { + cm := kubernetes.LookupConfigmap(e.Ctx, e.Client, e.Integration.Namespace, conf.Name()) + if cm != nil { + for k := range cm.Data { + if strings.HasSuffix(k, ".properties") { + paths = append(paths, fmt.Sprintf("%s/%s", mntPath, k)) + } else { + // Deprecated: use explicit configuration instead + envName := strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_")) + t.L.Infof(`Deprecation notice: the operator is adding the environment variable %s which will take runtime value from configmap. + This feature may disappear in future releases, make sure to use properties file in you configmap instead.`, envName) + propsAsEnv = append(propsAsEnv, corev1.EnvVar{ + Name: envName, + ValueFrom: { + ConfigMapKeyRef: { + LocalObjectReference: corev1.LocalObjectReference{ + Name: cm.Name, + }, + Key: k, + }, + }, + }) + } + } + } + } else if conf.StorageType() == utilResource.StorageTypeSecret { + sec := kubernetes.LookupSecret(e.Ctx, e.Client, e.Integration.Namespace, conf.Name()) + if sec != nil { + for k := range sec.Data { + if strings.HasSuffix(k, ".properties") { + paths = append(paths, fmt.Sprintf("%s/%s", mntPath, k)) + } else { + // Deprecated: use explicit configuration instead + envName := strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_")) + t.L.Infof(`Deprecation notice: the operator is adding the environment variable %s which will take runtime value from secret. + This feature may disappear in future releases, make sure to use properties file in you secret instead.`, envName) + propsAsEnv = append(propsAsEnv, corev1.EnvVar{ + Name: envName, + ValueFrom: { + SecretKeyRef: { + LocalObjectReference: corev1.LocalObjectReference{ + Name: sec.Name, + }, + Key: k, + }, + }, + }) +
(camel-kamelets) 04/04: Added a Kafka Apicurio Sink secured with Keycloak Kamelet
This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git commit 1c00d673f03a7d6fba8fba0d959f9a406f801b5b Author: Andrea Cosentino AuthorDate: Fri Feb 23 11:17:19 2024 +0100 Added a Kafka Apicurio Sink secured with Keycloak Kamelet Signed-off-by: Andrea Cosentino --- .../kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml b/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml index cfb05337..a816ff29 100644 --- a/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml +++ b/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml @@ -29,7 +29,7 @@ metadata: camel.apache.org/kamelet.type: "sink" spec: definition: -title: "Kafka Not Secured with Apicurio Registry Sink secured with Keycloak." +title: "Kafka Not Secured with Apicurio Registry secured with Keycloak Sink" description: |- Send data to Kafka topics on an insecure broker with Apicurio Registry secured with Keycloak.
(camel-kamelets) 02/04: Added a Kafka Apicurio Sink secured with Keycloak Kamelet
This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git commit 8f71007eda47ff124dc5785e64bea347efdd8d34 Author: Andrea Cosentino AuthorDate: Fri Feb 23 11:15:31 2024 +0100 Added a Kafka Apicurio Sink secured with Keycloak Kamelet Signed-off-by: Andrea Cosentino --- ...not-secured-apicurio-registry-sink.kamelet.yaml | 162 + 1 file changed, 162 insertions(+) diff --git a/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml b/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml new file mode 100644 index ..cfb05337 --- /dev/null +++ b/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml @@ -0,0 +1,162 @@ +# --- +# Licensed to the Apache Software Foundation (ASF) under one or more +# contributor license agreements. See the NOTICE file distributed with +# this work for additional information regarding copyright ownership. +# The ASF licenses this file to You under the Apache License, Version 2.0 +# (the "License"); you may not use this file except in compliance with +# the License. You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# --- +apiVersion: camel.apache.org/v1 +kind: Kamelet +metadata: + name: kafka-not-secured-apicurio-registry-sink + annotations: +camel.apache.org/kamelet.support.level: "Stable" +camel.apache.org/catalog.version: "4.5.0-SNAPSHOT" +camel.apache.org/kamelet.icon: "data:image/svg+xml;base64,PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0idXRmLTgiPz4NCjwhLS0gR2VuZXJhdG9yOiBBZG9iZSBJbGx1c3RyYXRvciAxOS4wLjAsIFNWRyBFeHBvcnQgUGx1Zy1JbiAuIFNWRyBWZXJzaW9uOiA2LjAwIEJ1aWxkIDApICAtLT4NCjxzdmcgdmVyc2lvbj0iMS4xIiBpZD0iTGF5ZXJfMSIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxuczp4bGluaz0iaHR0cDovL3d3dy53My5vcmcvMTk5OS94bGluayIgeD0iMHB4IiB5PSIwcHgiDQoJIHZpZXdCb3g9IjAgMCA1MDAgNTAwIiBzdHlsZT0iZW5hYmxlLWJhY2tncm91bmQ6bmV3IDAgMCA1MD [...] +camel.apache.org/provider: "Apache Software Foundation" +camel.apache.org/kamelet.group: "Kafka" +camel.apache.org/kamelet.namespace: "Kafka" + labels: +camel.apache.org/kamelet.type: "sink" +spec: + definition: +title: "Kafka Not Secured with Apicurio Registry Sink secured with Keycloak." +description: |- + Send data to Kafka topics on an insecure broker with Apicurio Registry secured with Keycloak. + + The Kamelet is able to understand the following headers to be set: + + - `key` / `ce-key`: as message key + + - `partition-key` / `ce-partitionkey`: as message partition key + + Both the headers are optional. + + Three headers, if specified, will be deduplicated with different names, kafka.key will be duplicated into kafka.KEY, kafka.topic into kafka.TOPIC and kafka.override_topic into kafka.OVERRIDE_TOPIC +required: + - topic + - bootstrapServers + - apicurioRegistryUrl + - apicurioAuthServiceUrl + - apicurioAuthRealm + - apicurioAuthClientId + - apicurioAuthClientSecret + - apicurioAuthUsername + - apicurioAuthPassword +type: object +properties: + topic: +title: Topic Names +description: Comma separated list of Kafka topic names +type: string + bootstrapServers: +title: Bootstrap Servers +description: Comma separated list of Kafka Broker URLs +type: string + valueSerializer: +title: Value Serializer +description: Serliazer class for value that implements the Serializer interface. +type: string +default: "io.apicurio.registry.serde.avro.AvroKafkaSerializer" + apicurioRegistryUrl: +title: Apicurio Registry URL +description: The Apicurio Schema Registry URL +type: string +x-descriptors: +- urn:keda:metadata:apicurioRegistryUrl +- urn:keda:required + avroDatumProvider: +title: Avro Datum Provider +description: How to write data with Avro +type: string +default: "io.apicurio.registry.serde.avro.ReflectAvroDatumProvider" + apicurioAuthServiceUrl: +title: Apicurio Registry Auth Service URL +description: The URL for Keycloak instance securing the Apicurio Registry +type: string +example:
(camel-kamelets) 03/04: Added a Kafka Apicurio Sink secured with Keycloak Kamelet
This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git commit 6e46798c9273fbe0afe30955835be3ecfac4266b Author: Andrea Cosentino AuthorDate: Fri Feb 23 11:19:12 2024 +0100 Added a Kafka Apicurio Sink secured with Keycloak Kamelet Signed-off-by: Andrea Cosentino --- docs/modules/ROOT/nav.adoc | 2 ++ kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml | 2 +- 2 files changed, 3 insertions(+), 1 deletion(-) diff --git a/docs/modules/ROOT/nav.adoc b/docs/modules/ROOT/nav.adoc index f2ef8333..9ef5e6db 100644 --- a/docs/modules/ROOT/nav.adoc +++ b/docs/modules/ROOT/nav.adoc @@ -134,6 +134,7 @@ * xref:kafka-azure-schema-registry-sink.adoc[] * xref:kafka-azure-schema-registry-source.adoc[] * xref:kafka-batch-apicurio-registry-not-secured-source.adoc[] +* xref:kafka-batch-apicurio-registry-source.adoc[] * xref:kafka-batch-azure-schema-registry-source.adoc[] * xref:kafka-batch-manual-commit-action.adoc[] * xref:kafka-batch-not-secured-source.adoc[] @@ -141,6 +142,7 @@ * xref:kafka-batch-source.adoc[] * xref:kafka-batch-ssl-source.adoc[] * xref:kafka-manual-commit-action.adoc[] +* xref:kafka-not-secured-apicurio-registry-sink.adoc[] * xref:kafka-not-secured-apicurio-registry-source.adoc[] * xref:kafka-not-secured-sink.adoc[] * xref:kafka-not-secured-source.adoc[] diff --git a/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml b/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml index cfb05337..a816ff29 100644 --- a/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml +++ b/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml @@ -29,7 +29,7 @@ metadata: camel.apache.org/kamelet.type: "sink" spec: definition: -title: "Kafka Not Secured with Apicurio Registry Sink secured with Keycloak." +title: "Kafka Not Secured with Apicurio Registry secured with Keycloak Sink" description: |- Send data to Kafka topics on an insecure broker with Apicurio Registry secured with Keycloak.
(camel-kamelets) branch main updated (41fd1cab -> 1c00d673)
This is an automated email from the ASF dual-hosted git repository. acosentino pushed a change to branch main in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git from 41fd1cab Regen for commit 899679e4d9a7d6e94bf1460c08b83566fe1b5b3f new 29abeb11 Added a Kafka Apicurio Sink secured with Keycloak Kamelet new 8f71007e Added a Kafka Apicurio Sink secured with Keycloak Kamelet new 6e46798c Added a Kafka Apicurio Sink secured with Keycloak Kamelet new 1c00d673 Added a Kafka Apicurio Sink secured with Keycloak Kamelet The 4 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "add" were already present in the repository and have only been added to this reference. Summary of changes: docs/modules/ROOT/nav.adoc | 2 + ...ot-secured-apicurio-registry-sink.kamelet.yaml} | 53 -- ...not-secured-apicurio-registry-sink.kamelet.yaml | 53 -- 3 files changed, 102 insertions(+), 6 deletions(-) copy kamelets/{kafka-apicurio-registry-not-secured-sink.kamelet.yaml => kafka-not-secured-apicurio-registry-sink.kamelet.yaml} (74%) copy kamelets/kafka-apicurio-registry-not-secured-sink.kamelet.yaml => library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml (74%)
(camel-kamelets) 01/04: Added a Kafka Apicurio Sink secured with Keycloak Kamelet
This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git commit 29abeb110515f45d68b14bbdd1fe854279be358e Author: Andrea Cosentino AuthorDate: Fri Feb 23 11:14:31 2024 +0100 Added a Kafka Apicurio Sink secured with Keycloak Kamelet Signed-off-by: Andrea Cosentino --- ...not-secured-apicurio-registry-sink.kamelet.yaml | 162 + 1 file changed, 162 insertions(+) diff --git a/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml b/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml new file mode 100644 index ..cfb05337 --- /dev/null +++ b/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml @@ -0,0 +1,162 @@ +# --- +# Licensed to the Apache Software Foundation (ASF) under one or more +# contributor license agreements. See the NOTICE file distributed with +# this work for additional information regarding copyright ownership. +# The ASF licenses this file to You under the Apache License, Version 2.0 +# (the "License"); you may not use this file except in compliance with +# the License. You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# --- +apiVersion: camel.apache.org/v1 +kind: Kamelet +metadata: + name: kafka-not-secured-apicurio-registry-sink + annotations: +camel.apache.org/kamelet.support.level: "Stable" +camel.apache.org/catalog.version: "4.5.0-SNAPSHOT" +camel.apache.org/kamelet.icon: "data:image/svg+xml;base64,PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0idXRmLTgiPz4NCjwhLS0gR2VuZXJhdG9yOiBBZG9iZSBJbGx1c3RyYXRvciAxOS4wLjAsIFNWRyBFeHBvcnQgUGx1Zy1JbiAuIFNWRyBWZXJzaW9uOiA2LjAwIEJ1aWxkIDApICAtLT4NCjxzdmcgdmVyc2lvbj0iMS4xIiBpZD0iTGF5ZXJfMSIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxuczp4bGluaz0iaHR0cDovL3d3dy53My5vcmcvMTk5OS94bGluayIgeD0iMHB4IiB5PSIwcHgiDQoJIHZpZXdCb3g9IjAgMCA1MDAgNTAwIiBzdHlsZT0iZW5hYmxlLWJhY2tncm91bmQ6bmV3IDAgMCA1MD [...] +camel.apache.org/provider: "Apache Software Foundation" +camel.apache.org/kamelet.group: "Kafka" +camel.apache.org/kamelet.namespace: "Kafka" + labels: +camel.apache.org/kamelet.type: "sink" +spec: + definition: +title: "Kafka Not Secured with Apicurio Registry Sink secured with Keycloak." +description: |- + Send data to Kafka topics on an insecure broker with Apicurio Registry secured with Keycloak. + + The Kamelet is able to understand the following headers to be set: + + - `key` / `ce-key`: as message key + + - `partition-key` / `ce-partitionkey`: as message partition key + + Both the headers are optional. + + Three headers, if specified, will be deduplicated with different names, kafka.key will be duplicated into kafka.KEY, kafka.topic into kafka.TOPIC and kafka.override_topic into kafka.OVERRIDE_TOPIC +required: + - topic + - bootstrapServers + - apicurioRegistryUrl + - apicurioAuthServiceUrl + - apicurioAuthRealm + - apicurioAuthClientId + - apicurioAuthClientSecret + - apicurioAuthUsername + - apicurioAuthPassword +type: object +properties: + topic: +title: Topic Names +description: Comma separated list of Kafka topic names +type: string + bootstrapServers: +title: Bootstrap Servers +description: Comma separated list of Kafka Broker URLs +type: string + valueSerializer: +title: Value Serializer +description: Serliazer class for value that implements the Serializer interface. +type: string +default: "io.apicurio.registry.serde.avro.AvroKafkaSerializer" + apicurioRegistryUrl: +title: Apicurio Registry URL +description: The Apicurio Schema Registry URL +type: string +x-descriptors: +- urn:keda:metadata:apicurioRegistryUrl +- urn:keda:required + avroDatumProvider: +title: Avro Datum Provider +description: How to write data with Avro +type: string +default: "io.apicurio.registry.serde.avro.ReflectAvroDatumProvider" + apicurioAuthServiceUrl: +title: Apicurio Registry Auth Service URL +description: The URL for Keycloak instance securing the Apicurio Registry +type: string +example: "http://my-keycloak.com:8080/; + apicurioAuthRealm: +title: Apicurio Registry Auth Realm +description: The
Re: [PR] Added a Kafka Apicurio Sink secured with Keycloak Kamelet [camel-kamelets]
oscerd merged PR #1919: URL: https://github.com/apache/camel-kamelets/pull/1919 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
(camel-kamelets) branch regen_bot updated (e115d1de -> 41fd1cab)
This is an automated email from the ASF dual-hosted git repository. github-bot pushed a change to branch regen_bot in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git omit e115d1de Regen for commit 899679e4d9a7d6e94bf1460c08b83566fe1b5b3f add 41fd1cab Regen for commit 899679e4d9a7d6e94bf1460c08b83566fe1b5b3f This update added new revisions after undoing existing revisions. That is to say, some revisions that were in the old version of the branch are not in the new version. This situation occurs when a user --force pushes a change and generates a repository containing something like this: * -- * -- B -- O -- O -- O (e115d1de) \ N -- N -- N refs/heads/regen_bot (41fd1cab) You should already have received notification emails for all of the O revisions, and so the following emails describe only the N revisions from the common base, B. Any revisions marked "omit" are not gone; other references still refer to them. Any revisions marked "discard" are gone forever. No new revisions were added by this update. Summary of changes:
(camel-kamelets) branch 1916 updated (d5e1f74b -> b74ffef2)
This is an automated email from the ASF dual-hosted git repository. acosentino pushed a change to branch 1916 in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git discard d5e1f74b Added a Kafka Apicurio Sink secured with Keycloak Kamelet discard 90d6168c Added a Kafka Apicurio Sink secured with Keycloak Kamelet discard 4dad5d40 Added a Kafka Apicurio Sink secured with Keycloak Kamelet discard 442fc02e Added a Kafka Apicurio Sink secured with Keycloak Kamelet add 41fd1cab Regen for commit 899679e4d9a7d6e94bf1460c08b83566fe1b5b3f add 7ec789b9 Added a Kafka Apicurio Sink secured with Keycloak Kamelet add 154b3325 Added a Kafka Apicurio Sink secured with Keycloak Kamelet add 69cc918d Added a Kafka Apicurio Sink secured with Keycloak Kamelet add b74ffef2 Added a Kafka Apicurio Sink secured with Keycloak Kamelet This update added new revisions after undoing existing revisions. That is to say, some revisions that were in the old version of the branch are not in the new version. This situation occurs when a user --force pushes a change and generates a repository containing something like this: * -- * -- B -- O -- O -- O (d5e1f74b) \ N -- N -- N refs/heads/1916 (b74ffef2) You should already have received notification emails for all of the O revisions, and so the following emails describe only the N revisions from the common base, B. Any revisions marked "omit" are not gone; other references still refer to them. Any revisions marked "discard" are gone forever. No new revisions were added by this update. Summary of changes:
Re: [PR] Generated sources regen [camel-kamelets]
oscerd merged PR #1918: URL: https://github.com/apache/camel-kamelets/pull/1918 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
(camel-kamelets) branch main updated: Regen for commit 899679e4d9a7d6e94bf1460c08b83566fe1b5b3f
This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git The following commit(s) were added to refs/heads/main by this push: new 41fd1cab Regen for commit 899679e4d9a7d6e94bf1460c08b83566fe1b5b3f 41fd1cab is described below commit 41fd1cab8912d65b045734503fb1f7f295cd6719 Author: oscerd AuthorDate: Fri Feb 23 10:08:58 2024 + Regen for commit 899679e4d9a7d6e94bf1460c08b83566fe1b5b3f Signed-off-by: GitHub --- docs/modules/ROOT/nav.adoc | 1 + 1 file changed, 1 insertion(+) diff --git a/docs/modules/ROOT/nav.adoc b/docs/modules/ROOT/nav.adoc index c8f6e470..f2ef8333 100644 --- a/docs/modules/ROOT/nav.adoc +++ b/docs/modules/ROOT/nav.adoc @@ -141,6 +141,7 @@ * xref:kafka-batch-source.adoc[] * xref:kafka-batch-ssl-source.adoc[] * xref:kafka-manual-commit-action.adoc[] +* xref:kafka-not-secured-apicurio-registry-source.adoc[] * xref:kafka-not-secured-sink.adoc[] * xref:kafka-not-secured-source.adoc[] * xref:kafka-scram-sink.adoc[]
(camel-kamelets) branch 1916 created (now d5e1f74b)
This is an automated email from the ASF dual-hosted git repository. acosentino pushed a change to branch 1916 in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git at d5e1f74b Added a Kafka Apicurio Sink secured with Keycloak Kamelet This branch includes the following new commits: new 442fc02e Added a Kafka Apicurio Sink secured with Keycloak Kamelet new 4dad5d40 Added a Kafka Apicurio Sink secured with Keycloak Kamelet new 90d6168c Added a Kafka Apicurio Sink secured with Keycloak Kamelet new d5e1f74b Added a Kafka Apicurio Sink secured with Keycloak Kamelet The 4 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "add" were already present in the repository and have only been added to this reference.
(camel-kamelets) 03/04: Added a Kafka Apicurio Sink secured with Keycloak Kamelet
This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch 1916 in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git commit 90d6168cc23dfb4fdb63f47916977dd76dae6b04 Author: Andrea Cosentino AuthorDate: Fri Feb 23 11:16:39 2024 +0100 Added a Kafka Apicurio Sink secured with Keycloak Kamelet Signed-off-by: Andrea Cosentino --- docs/modules/ROOT/nav.adoc | 3 +++ kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml | 2 +- 2 files changed, 4 insertions(+), 1 deletion(-) diff --git a/docs/modules/ROOT/nav.adoc b/docs/modules/ROOT/nav.adoc index c8f6e470..9ef5e6db 100644 --- a/docs/modules/ROOT/nav.adoc +++ b/docs/modules/ROOT/nav.adoc @@ -134,6 +134,7 @@ * xref:kafka-azure-schema-registry-sink.adoc[] * xref:kafka-azure-schema-registry-source.adoc[] * xref:kafka-batch-apicurio-registry-not-secured-source.adoc[] +* xref:kafka-batch-apicurio-registry-source.adoc[] * xref:kafka-batch-azure-schema-registry-source.adoc[] * xref:kafka-batch-manual-commit-action.adoc[] * xref:kafka-batch-not-secured-source.adoc[] @@ -141,6 +142,8 @@ * xref:kafka-batch-source.adoc[] * xref:kafka-batch-ssl-source.adoc[] * xref:kafka-manual-commit-action.adoc[] +* xref:kafka-not-secured-apicurio-registry-sink.adoc[] +* xref:kafka-not-secured-apicurio-registry-source.adoc[] * xref:kafka-not-secured-sink.adoc[] * xref:kafka-not-secured-source.adoc[] * xref:kafka-scram-sink.adoc[] diff --git a/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml b/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml index cfb05337..a816ff29 100644 --- a/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml +++ b/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml @@ -29,7 +29,7 @@ metadata: camel.apache.org/kamelet.type: "sink" spec: definition: -title: "Kafka Not Secured with Apicurio Registry Sink secured with Keycloak." +title: "Kafka Not Secured with Apicurio Registry secured with Keycloak Sink" description: |- Send data to Kafka topics on an insecure broker with Apicurio Registry secured with Keycloak.
(camel-kamelets) 02/04: Added a Kafka Apicurio Sink secured with Keycloak Kamelet
This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch 1916 in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git commit 4dad5d40eeb91cb7b15ce4eb4b0eb8cbbe81754e Author: Andrea Cosentino AuthorDate: Fri Feb 23 11:15:31 2024 +0100 Added a Kafka Apicurio Sink secured with Keycloak Kamelet Signed-off-by: Andrea Cosentino --- ...not-secured-apicurio-registry-sink.kamelet.yaml | 162 + 1 file changed, 162 insertions(+) diff --git a/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml b/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml new file mode 100644 index ..cfb05337 --- /dev/null +++ b/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml @@ -0,0 +1,162 @@ +# --- +# Licensed to the Apache Software Foundation (ASF) under one or more +# contributor license agreements. See the NOTICE file distributed with +# this work for additional information regarding copyright ownership. +# The ASF licenses this file to You under the Apache License, Version 2.0 +# (the "License"); you may not use this file except in compliance with +# the License. You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# --- +apiVersion: camel.apache.org/v1 +kind: Kamelet +metadata: + name: kafka-not-secured-apicurio-registry-sink + annotations: +camel.apache.org/kamelet.support.level: "Stable" +camel.apache.org/catalog.version: "4.5.0-SNAPSHOT" +camel.apache.org/kamelet.icon: "data:image/svg+xml;base64,PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0idXRmLTgiPz4NCjwhLS0gR2VuZXJhdG9yOiBBZG9iZSBJbGx1c3RyYXRvciAxOS4wLjAsIFNWRyBFeHBvcnQgUGx1Zy1JbiAuIFNWRyBWZXJzaW9uOiA2LjAwIEJ1aWxkIDApICAtLT4NCjxzdmcgdmVyc2lvbj0iMS4xIiBpZD0iTGF5ZXJfMSIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxuczp4bGluaz0iaHR0cDovL3d3dy53My5vcmcvMTk5OS94bGluayIgeD0iMHB4IiB5PSIwcHgiDQoJIHZpZXdCb3g9IjAgMCA1MDAgNTAwIiBzdHlsZT0iZW5hYmxlLWJhY2tncm91bmQ6bmV3IDAgMCA1MD [...] +camel.apache.org/provider: "Apache Software Foundation" +camel.apache.org/kamelet.group: "Kafka" +camel.apache.org/kamelet.namespace: "Kafka" + labels: +camel.apache.org/kamelet.type: "sink" +spec: + definition: +title: "Kafka Not Secured with Apicurio Registry Sink secured with Keycloak." +description: |- + Send data to Kafka topics on an insecure broker with Apicurio Registry secured with Keycloak. + + The Kamelet is able to understand the following headers to be set: + + - `key` / `ce-key`: as message key + + - `partition-key` / `ce-partitionkey`: as message partition key + + Both the headers are optional. + + Three headers, if specified, will be deduplicated with different names, kafka.key will be duplicated into kafka.KEY, kafka.topic into kafka.TOPIC and kafka.override_topic into kafka.OVERRIDE_TOPIC +required: + - topic + - bootstrapServers + - apicurioRegistryUrl + - apicurioAuthServiceUrl + - apicurioAuthRealm + - apicurioAuthClientId + - apicurioAuthClientSecret + - apicurioAuthUsername + - apicurioAuthPassword +type: object +properties: + topic: +title: Topic Names +description: Comma separated list of Kafka topic names +type: string + bootstrapServers: +title: Bootstrap Servers +description: Comma separated list of Kafka Broker URLs +type: string + valueSerializer: +title: Value Serializer +description: Serliazer class for value that implements the Serializer interface. +type: string +default: "io.apicurio.registry.serde.avro.AvroKafkaSerializer" + apicurioRegistryUrl: +title: Apicurio Registry URL +description: The Apicurio Schema Registry URL +type: string +x-descriptors: +- urn:keda:metadata:apicurioRegistryUrl +- urn:keda:required + avroDatumProvider: +title: Avro Datum Provider +description: How to write data with Avro +type: string +default: "io.apicurio.registry.serde.avro.ReflectAvroDatumProvider" + apicurioAuthServiceUrl: +title: Apicurio Registry Auth Service URL +description: The URL for Keycloak instance securing the Apicurio Registry +type: string +example:
(camel-kamelets) 01/04: Added a Kafka Apicurio Sink secured with Keycloak Kamelet
This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch 1916 in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git commit 442fc02e3e502d71d7f9588475a853c338deb43f Author: Andrea Cosentino AuthorDate: Fri Feb 23 11:14:31 2024 +0100 Added a Kafka Apicurio Sink secured with Keycloak Kamelet Signed-off-by: Andrea Cosentino --- ...not-secured-apicurio-registry-sink.kamelet.yaml | 162 + 1 file changed, 162 insertions(+) diff --git a/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml b/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml new file mode 100644 index ..cfb05337 --- /dev/null +++ b/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml @@ -0,0 +1,162 @@ +# --- +# Licensed to the Apache Software Foundation (ASF) under one or more +# contributor license agreements. See the NOTICE file distributed with +# this work for additional information regarding copyright ownership. +# The ASF licenses this file to You under the Apache License, Version 2.0 +# (the "License"); you may not use this file except in compliance with +# the License. You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# --- +apiVersion: camel.apache.org/v1 +kind: Kamelet +metadata: + name: kafka-not-secured-apicurio-registry-sink + annotations: +camel.apache.org/kamelet.support.level: "Stable" +camel.apache.org/catalog.version: "4.5.0-SNAPSHOT" +camel.apache.org/kamelet.icon: "data:image/svg+xml;base64,PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0idXRmLTgiPz4NCjwhLS0gR2VuZXJhdG9yOiBBZG9iZSBJbGx1c3RyYXRvciAxOS4wLjAsIFNWRyBFeHBvcnQgUGx1Zy1JbiAuIFNWRyBWZXJzaW9uOiA2LjAwIEJ1aWxkIDApICAtLT4NCjxzdmcgdmVyc2lvbj0iMS4xIiBpZD0iTGF5ZXJfMSIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxuczp4bGluaz0iaHR0cDovL3d3dy53My5vcmcvMTk5OS94bGluayIgeD0iMHB4IiB5PSIwcHgiDQoJIHZpZXdCb3g9IjAgMCA1MDAgNTAwIiBzdHlsZT0iZW5hYmxlLWJhY2tncm91bmQ6bmV3IDAgMCA1MD [...] +camel.apache.org/provider: "Apache Software Foundation" +camel.apache.org/kamelet.group: "Kafka" +camel.apache.org/kamelet.namespace: "Kafka" + labels: +camel.apache.org/kamelet.type: "sink" +spec: + definition: +title: "Kafka Not Secured with Apicurio Registry Sink secured with Keycloak." +description: |- + Send data to Kafka topics on an insecure broker with Apicurio Registry secured with Keycloak. + + The Kamelet is able to understand the following headers to be set: + + - `key` / `ce-key`: as message key + + - `partition-key` / `ce-partitionkey`: as message partition key + + Both the headers are optional. + + Three headers, if specified, will be deduplicated with different names, kafka.key will be duplicated into kafka.KEY, kafka.topic into kafka.TOPIC and kafka.override_topic into kafka.OVERRIDE_TOPIC +required: + - topic + - bootstrapServers + - apicurioRegistryUrl + - apicurioAuthServiceUrl + - apicurioAuthRealm + - apicurioAuthClientId + - apicurioAuthClientSecret + - apicurioAuthUsername + - apicurioAuthPassword +type: object +properties: + topic: +title: Topic Names +description: Comma separated list of Kafka topic names +type: string + bootstrapServers: +title: Bootstrap Servers +description: Comma separated list of Kafka Broker URLs +type: string + valueSerializer: +title: Value Serializer +description: Serliazer class for value that implements the Serializer interface. +type: string +default: "io.apicurio.registry.serde.avro.AvroKafkaSerializer" + apicurioRegistryUrl: +title: Apicurio Registry URL +description: The Apicurio Schema Registry URL +type: string +x-descriptors: +- urn:keda:metadata:apicurioRegistryUrl +- urn:keda:required + avroDatumProvider: +title: Avro Datum Provider +description: How to write data with Avro +type: string +default: "io.apicurio.registry.serde.avro.ReflectAvroDatumProvider" + apicurioAuthServiceUrl: +title: Apicurio Registry Auth Service URL +description: The URL for Keycloak instance securing the Apicurio Registry +type: string +example: "http://my-keycloak.com:8080/; + apicurioAuthRealm: +title: Apicurio Registry Auth Realm +description: The
(camel-kamelets) 04/04: Added a Kafka Apicurio Sink secured with Keycloak Kamelet
This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch 1916 in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git commit d5e1f74b57e2aa9c25a29b8737db7b3a8d7d1069 Author: Andrea Cosentino AuthorDate: Fri Feb 23 11:17:19 2024 +0100 Added a Kafka Apicurio Sink secured with Keycloak Kamelet Signed-off-by: Andrea Cosentino --- .../kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml b/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml index cfb05337..a816ff29 100644 --- a/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml +++ b/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml @@ -29,7 +29,7 @@ metadata: camel.apache.org/kamelet.type: "sink" spec: definition: -title: "Kafka Not Secured with Apicurio Registry Sink secured with Keycloak." +title: "Kafka Not Secured with Apicurio Registry secured with Keycloak Sink" description: |- Send data to Kafka topics on an insecure broker with Apicurio Registry secured with Keycloak.
[PR] Added a Kafka Apicurio Sink secured with Keycloak Kamelet [camel-kamelets]
oscerd opened a new pull request, #1919: URL: https://github.com/apache/camel-kamelets/pull/1919 (no comment) -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]
github-actions[bot] commented on PR #5090: URL: https://github.com/apache/camel-k/pull/5090#issuecomment-1961057814 :heavy_check_mark: Unit test coverage report - coverage increased from 35.8% to 37.9% (**+2.1%**) -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
[PR] Generated sources regen [camel-kamelets]
github-actions[bot] opened a new pull request, #1918: URL: https://github.com/apache/camel-kamelets/pull/1918 Regen bot :robot: found some uncommited changes after running build on :camel: kamelets main. Please do not delete `regen_bot` branch after merge/rebase. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
(camel-kamelets) branch regen_bot updated (f5ceac1b -> e115d1de)
This is an automated email from the ASF dual-hosted git repository. github-bot pushed a change to branch regen_bot in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git from f5ceac1b Snowflake Sink Kamelet: Fixed database name description add 2f290dea Updated CHANGELOG.md add 4f65c8d5 Added a Kafka Apicurio Source secured with Keycloak Kamelet add 07e45f3d Added a Kafka Apicurio Source secured with Keycloak Kamelet add 899679e4 Added a Kafka Apicurio Source secured with Keycloak Kamelet add e115d1de Regen for commit 899679e4d9a7d6e94bf1460c08b83566fe1b5b3f No new revisions were added by this update. Summary of changes: CHANGELOG.md | 8 docs/modules/ROOT/nav.adoc | 1 + ...-secured-apicurio-registry-source.kamelet.yaml} | 53 -- ...t-secured-apicurio-registry-source.kamelet.yaml | 53 -- 4 files changed, 109 insertions(+), 6 deletions(-) copy kamelets/{kafka-apicurio-registry-not-secured-source.kamelet.yaml => kafka-not-secured-apicurio-registry-source.kamelet.yaml} (77%) copy kamelets/kafka-apicurio-registry-not-secured-source.kamelet.yaml => library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml (77%)
Re: [PR] [chore] improve metrics for integration [camel-k]
squakez commented on PR #5154: URL: https://github.com/apache/camel-k/pull/5154#issuecomment-1961048212 @gansheer please, rebase against `main` as we have fixed the errored check. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org
(camel-kamelets) 03/03: Added a Kafka Apicurio Source secured with Keycloak Kamelet
This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git commit 899679e4d9a7d6e94bf1460c08b83566fe1b5b3f Author: Andrea Cosentino AuthorDate: Fri Feb 23 10:58:59 2024 +0100 Added a Kafka Apicurio Source secured with Keycloak Kamelet Signed-off-by: Andrea Cosentino --- ...t-secured-apicurio-registry-source.kamelet.yaml | 182 + 1 file changed, 182 insertions(+) diff --git a/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml b/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml new file mode 100644 index ..657de996 --- /dev/null +++ b/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml @@ -0,0 +1,182 @@ +# --- +# Licensed to the Apache Software Foundation (ASF) under one or more +# contributor license agreements. See the NOTICE file distributed with +# this work for additional information regarding copyright ownership. +# The ASF licenses this file to You under the Apache License, Version 2.0 +# (the "License"); you may not use this file except in compliance with +# the License. You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# --- +apiVersion: camel.apache.org/v1 +kind: Kamelet +metadata: + name: kafka-not-secured-apicurio-registry-source + annotations: +camel.apache.org/kamelet.support.level: "Preview" +camel.apache.org/catalog.version: "4.5.0-SNAPSHOT" +camel.apache.org/kamelet.icon: "data:image/svg+xml;base64,PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0idXRmLTgiPz4NCjwhLS0gR2VuZXJhdG9yOiBBZG9iZSBJbGx1c3RyYXRvciAxOS4wLjAsIFNWRyBFeHBvcnQgUGx1Zy1JbiAuIFNWRyBWZXJzaW9uOiA2LjAwIEJ1aWxkIDApICAtLT4NCjxzdmcgdmVyc2lvbj0iMS4xIiBpZD0iTGF5ZXJfMSIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxuczp4bGluaz0iaHR0cDovL3d3dy53My5vcmcvMTk5OS94bGluayIgeD0iMHB4IiB5PSIwcHgiDQoJIHZpZXdCb3g9IjAgMCA1MDAgNTAwIiBzdHlsZT0iZW5hYmxlLWJhY2tncm91bmQ6bmV3IDAgMCA1MD [...] +camel.apache.org/provider: "Apache Software Foundation" +camel.apache.org/kamelet.group: "Kafka" +camel.apache.org/kamelet.namespace: "Kafka" +camel.apache.org/keda.type: "kafka" + labels: +camel.apache.org/kamelet.type: "source" +spec: + definition: +title: "Kafka not secured with Apicurio Registry secured with Keycloak Source" +description: |- + Receive data from Kafka topics on an insecure broker combined with Apicurio Registry secured with Keycloak. +required: + - topic + - bootstrapServers + - apicurioRegistryUrl + - apicurioAuthServiceUrl + - apicurioAuthRealm + - apicurioAuthClientId + - apicurioAuthClientSecret + - apicurioAuthUsername + - apicurioAuthPassword +type: object +properties: + topic: +title: Topic Names +description: Comma separated list of Kafka topic names +type: string +x-descriptors: +- urn:keda:metadata:topic +- urn:keda:required + bootstrapServers: +title: Bootstrap Servers +description: Comma separated list of Kafka Broker URLs +type: string +x-descriptors: +- urn:keda:metadata:bootstrapServers +- urn:keda:required + autoCommitEnable: +title: Auto Commit Enable +description: If true, periodically commit to ZooKeeper the offset of messages already fetched by the consumer +type: boolean +default: true + allowManualCommit: +title: Allow Manual Commit +description: Whether to allow doing manual commits +type: boolean +default: false + pollOnError: +title: Poll On Error Behavior +description: What to do if kafka threw an exception while polling for new messages. There are 5 enums and the value can be one of DISCARD, ERROR_HANDLER, RECONNECT, RETRY, STOP +type: string +default: "ERROR_HANDLER" + autoOffsetReset: +title: Auto Offset Reset +description: What to do when there is no initial offset. There are 3 enums and the value can be one of latest, earliest, none +type: string +default: "latest" +x-descriptors: +- urn:keda:metadata:offsetResetPolicy + consumerGroup: +title: Consumer Group +description: A string
(camel-kamelets) 01/03: Added a Kafka Apicurio Source secured with Keycloak Kamelet
This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git commit 4f65c8d5b50399b627274c3c9d5522746fffbe0d Author: Andrea Cosentino AuthorDate: Fri Feb 23 10:56:31 2024 +0100 Added a Kafka Apicurio Source secured with Keycloak Kamelet Signed-off-by: Andrea Cosentino --- ...t-secured-apicurio-registry-source.kamelet.yaml | 182 + 1 file changed, 182 insertions(+) diff --git a/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml b/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml new file mode 100644 index ..bbea5e40 --- /dev/null +++ b/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml @@ -0,0 +1,182 @@ +# --- +# Licensed to the Apache Software Foundation (ASF) under one or more +# contributor license agreements. See the NOTICE file distributed with +# this work for additional information regarding copyright ownership. +# The ASF licenses this file to You under the Apache License, Version 2.0 +# (the "License"); you may not use this file except in compliance with +# the License. You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# --- +apiVersion: camel.apache.org/v1 +kind: Kamelet +metadata: + name: kafka-not-secured-apicurio-registry-source + annotations: +camel.apache.org/kamelet.support.level: "Preview" +camel.apache.org/catalog.version: "4.4.0" +camel.apache.org/kamelet.icon: "data:image/svg+xml;base64,PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0idXRmLTgiPz4NCjwhLS0gR2VuZXJhdG9yOiBBZG9iZSBJbGx1c3RyYXRvciAxOS4wLjAsIFNWRyBFeHBvcnQgUGx1Zy1JbiAuIFNWRyBWZXJzaW9uOiA2LjAwIEJ1aWxkIDApICAtLT4NCjxzdmcgdmVyc2lvbj0iMS4xIiBpZD0iTGF5ZXJfMSIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxuczp4bGluaz0iaHR0cDovL3d3dy53My5vcmcvMTk5OS94bGluayIgeD0iMHB4IiB5PSIwcHgiDQoJIHZpZXdCb3g9IjAgMCA1MDAgNTAwIiBzdHlsZT0iZW5hYmxlLWJhY2tncm91bmQ6bmV3IDAgMCA1MD [...] +camel.apache.org/provider: "Apache Software Foundation" +camel.apache.org/kamelet.group: "Kafka" +camel.apache.org/kamelet.namespace: "Kafka" +camel.apache.org/keda.type: "kafka" + labels: +camel.apache.org/kamelet.type: "source" +spec: + definition: +title: "Kafka not secured with Apicurio Registry secured with Keycloak Source" +description: |- + Receive data from Kafka topics on an insecure broker combined with Apicurio Registry secured with Keycloak. +required: + - topic + - bootstrapServers + - apicurioRegistryUrl + - apicurioAuthServiceUrl + - apicurioAuthRealm + - apicurioAuthClientId + - apicurioAuthClientSecret + - apicurioAuthUsername + - apicurioAuthPassword +type: object +properties: + topic: +title: Topic Names +description: Comma separated list of Kafka topic names +type: string +x-descriptors: +- urn:keda:metadata:topic +- urn:keda:required + bootstrapServers: +title: Bootstrap Servers +description: Comma separated list of Kafka Broker URLs +type: string +x-descriptors: +- urn:keda:metadata:bootstrapServers +- urn:keda:required + autoCommitEnable: +title: Auto Commit Enable +description: If true, periodically commit to ZooKeeper the offset of messages already fetched by the consumer +type: boolean +default: true + allowManualCommit: +title: Allow Manual Commit +description: Whether to allow doing manual commits +type: boolean +default: false + pollOnError: +title: Poll On Error Behavior +description: What to do if kafka threw an exception while polling for new messages. There are 5 enums and the value can be one of DISCARD, ERROR_HANDLER, RECONNECT, RETRY, STOP +type: string +default: "ERROR_HANDLER" + autoOffsetReset: +title: Auto Offset Reset +description: What to do when there is no initial offset. There are 3 enums and the value can be one of latest, earliest, none +type: string +default: "latest" +x-descriptors: +- urn:keda:metadata:offsetResetPolicy + consumerGroup: +title: Consumer Group +description: A string that uniquely identifies the group of consumers to which this source belongs +type: string +example: "my-group-id" +
(camel-kamelets) 02/03: Added a Kafka Apicurio Source secured with Keycloak Kamelet
This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git commit 07e45f3d01345d01c3619da0847cf539bd411339 Author: Andrea Cosentino AuthorDate: Fri Feb 23 10:57:57 2024 +0100 Added a Kafka Apicurio Source secured with Keycloak Kamelet Signed-off-by: Andrea Cosentino --- kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml b/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml index bbea5e40..657de996 100644 --- a/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml +++ b/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml @@ -20,7 +20,7 @@ metadata: name: kafka-not-secured-apicurio-registry-source annotations: camel.apache.org/kamelet.support.level: "Preview" -camel.apache.org/catalog.version: "4.4.0" +camel.apache.org/catalog.version: "4.5.0-SNAPSHOT" camel.apache.org/kamelet.icon: "data:image/svg+xml;base64,PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0idXRmLTgiPz4NCjwhLS0gR2VuZXJhdG9yOiBBZG9iZSBJbGx1c3RyYXRvciAxOS4wLjAsIFNWRyBFeHBvcnQgUGx1Zy1JbiAuIFNWRyBWZXJzaW9uOiA2LjAwIEJ1aWxkIDApICAtLT4NCjxzdmcgdmVyc2lvbj0iMS4xIiBpZD0iTGF5ZXJfMSIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxuczp4bGluaz0iaHR0cDovL3d3dy53My5vcmcvMTk5OS94bGluayIgeD0iMHB4IiB5PSIwcHgiDQoJIHZpZXdCb3g9IjAgMCA1MDAgNTAwIiBzdHlsZT0iZW5hYmxlLWJhY2tncm91bmQ6bmV3IDAgMCA1MD [...] camel.apache.org/provider: "Apache Software Foundation" camel.apache.org/kamelet.group: "Kafka" @@ -147,7 +147,7 @@ spec: - urn:keda:authentication:password - urn:keda:required dependencies: -- "mvn:org.apache.camel.kamelets:camel-kamelets-utils:4.4.0" +- "mvn:org.apache.camel.kamelets:camel-kamelets-utils:4.5.0-SNAPSHOT" - "camel:kafka" - "camel:core" - "camel:kamelet"
Re: [I] Kafka Schema Registries: Support authentication mechanisms for Apicurio Registry [camel-kamelets]
oscerd closed issue #1684: Kafka Schema Registries: Support authentication mechanisms for Apicurio Registry URL: https://github.com/apache/camel-kamelets/issues/1684 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org