(camel) 01/01: CAMEL-20457: camel-core - Fix NPE in split parallel timeout without agg strategy.

2024-02-23 Thread davsclaus
This is an automated email from the ASF dual-hosted git repository.

davsclaus pushed a commit to branch split
in repository https://gitbox.apache.org/repos/asf/camel.git

commit ced01fcee8d0babc1e03012b5df2d657ea734d1d
Author: Claus Ibsen 
AuthorDate: Sat Feb 24 08:59:34 2024 +0100

CAMEL-20457: camel-core - Fix NPE in split parallel timeout without agg 
strategy.
---
 .../apache/camel/processor/MulticastProcessor.java |  7 +-
 ...itParallelTimeoutNoAggregationStrategyTest.java | 79 ++
 2 files changed, 84 insertions(+), 2 deletions(-)

diff --git 
a/core/camel-core-processor/src/main/java/org/apache/camel/processor/MulticastProcessor.java
 
b/core/camel-core-processor/src/main/java/org/apache/camel/processor/MulticastProcessor.java
index 0a2333ba89a..89f946fa4e7 100644
--- 
a/core/camel-core-processor/src/main/java/org/apache/camel/processor/MulticastProcessor.java
+++ 
b/core/camel-core-processor/src/main/java/org/apache/camel/processor/MulticastProcessor.java
@@ -469,9 +469,12 @@ public class MulticastProcessor extends 
AsyncProcessorSupport
 Exchange exchange = completion.pollUnordered();
 int index = exchange != null ? 
getExchangeIndex(exchange) : nbExchangeSent.get();
 while (nbAggregated.get() < index) {
+int idx = nbAggregated.getAndIncrement();
 AggregationStrategy strategy = 
getAggregationStrategy(null);
-strategy.timeout(result.get() != null ? 
result.get() : original,
-nbAggregated.getAndIncrement(), 
nbExchangeSent.get(), timeout);
+if (strategy != null) {
+strategy.timeout(result.get() != null ? 
result.get() : original,
+idx, nbExchangeSent.get(), timeout);
+}
 }
 if (exchange != null) {
 doAggregate(result, exchange, original);
diff --git 
a/core/camel-core/src/test/java/org/apache/camel/processor/SplitParallelTimeoutNoAggregationStrategyTest.java
 
b/core/camel-core/src/test/java/org/apache/camel/processor/SplitParallelTimeoutNoAggregationStrategyTest.java
new file mode 100644
index 000..6464d4da4bd
--- /dev/null
+++ 
b/core/camel-core/src/test/java/org/apache/camel/processor/SplitParallelTimeoutNoAggregationStrategyTest.java
@@ -0,0 +1,79 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *  http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.camel.processor;
+
+import java.util.concurrent.Phaser;
+import java.util.concurrent.TimeUnit;
+
+import org.apache.camel.ContextTestSupport;
+import org.apache.camel.builder.RouteBuilder;
+import org.apache.camel.component.mock.MockEndpoint;
+import org.junit.jupiter.api.Assumptions;
+import org.junit.jupiter.api.BeforeEach;
+import org.junit.jupiter.api.Test;
+import org.junit.jupiter.api.Timeout;
+import org.junit.jupiter.api.parallel.Isolated;
+
+@Isolated
+@Timeout(60)
+public class SplitParallelTimeoutNoAggregationStrategyTest extends 
ContextTestSupport {
+
+private final Phaser phaser = new Phaser(3);
+
+@BeforeEach
+void sendEarly() {
+Assumptions.assumeTrue(context.isStarted(), "The test cannot be run 
because the context is not started");
+template.sendBody("direct:start", "A,B,C");
+}
+
+@Test
+public void testSplitTimeout() throws Exception {
+MockEndpoint mock = getMockEndpoint("mock:result");
+// A will timeout so we only get B and/or C
+mock.message(0).body().not(body().contains("A"));
+
+phaser.awaitAdvanceInterruptibly(0, 5000, TimeUnit.SECONDS);
+
+assertMockEndpointsSatisfied();
+}
+
+@Override
+protected RouteBuilder createRouteBuilder() throws Exception {
+return new RouteBuilder() {
+@Override
+public void configure() throws Exception {
+from("direct:start")
+
.split(body().tokenize(",")).parallelProcessing().timeout(100)
+.choice()
+

(camel) branch split created (now ced01fcee8d)

2024-02-23 Thread davsclaus
This is an automated email from the ASF dual-hosted git repository.

davsclaus pushed a change to branch split
in repository https://gitbox.apache.org/repos/asf/camel.git


  at ced01fcee8d CAMEL-20457: camel-core - Fix NPE in split parallel 
timeout without agg strategy.

This branch includes the following new commits:

 new ced01fcee8d CAMEL-20457: camel-core - Fix NPE in split parallel 
timeout without agg strategy.

The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.




Re: [PR] [Github Actions] Periodic Sync Camel Spring Boot (Camel 4) [camel-spring-boot]

2024-02-23 Thread via GitHub


davsclaus closed pull request #1091: [Github Actions] Periodic Sync Camel 
Spring Boot (Camel 4)
URL: https://github.com/apache/camel-spring-boot/pull/1091


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



Re: [PR] Update chuck-norris-source.kamelet.yaml [camel-spring-boot-examples]

2024-02-23 Thread via GitHub


davsclaus merged PR #124:
URL: https://github.com/apache/camel-spring-boot-examples/pull/124


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



(camel-spring-boot-examples) branch main updated: Update chuck-norris-source.kamelet.yaml (#124)

2024-02-23 Thread davsclaus
This is an automated email from the ASF dual-hosted git repository.

davsclaus pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-spring-boot-examples.git


The following commit(s) were added to refs/heads/main by this push:
 new 0776329  Update chuck-norris-source.kamelet.yaml (#124)
0776329 is described below

commit 07763295cd25d417a52aba191380cbaff4d1c1a1
Author: Nimo <2087890+foundingn...@users.noreply.github.com>
AuthorDate: Sat Feb 24 17:41:57 2024 +1100

Update chuck-norris-source.kamelet.yaml (#124)

Fix typo
---
 .../src/main/resources/kamelets/chuck-norris-source.kamelet.yaml| 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git 
a/kamelet-chucknorris/src/main/resources/kamelets/chuck-norris-source.kamelet.yaml
 
b/kamelet-chucknorris/src/main/resources/kamelets/chuck-norris-source.kamelet.yaml
index e62299b..6fc962d 100644
--- 
a/kamelet-chucknorris/src/main/resources/kamelets/chuck-norris-source.kamelet.yaml
+++ 
b/kamelet-chucknorris/src/main/resources/kamelets/chuck-norris-source.kamelet.yaml
@@ -14,7 +14,7 @@ spec:
   definition:
 title: "Chuck Norris Source"
 description: |-
-  Gets peridically Chuck Norris jokes from http://www.icndb.com/
+  Gets periodically Chuck Norris jokes from http://www.icndb.com/
 type: object
 properties:
   period:



[PR] Update chuck-norris-source.kamelet.yaml [camel-spring-boot-examples]

2024-02-23 Thread via GitHub


foundingnimo opened a new pull request, #124:
URL: https://github.com/apache/camel-spring-boot-examples/pull/124

   Fix typo


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



(camel-kamelets) branch main updated: Updated CHANGELOG.md

2024-02-23 Thread github-bot
This is an automated email from the ASF dual-hosted git repository.

github-bot pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git


The following commit(s) were added to refs/heads/main by this push:
 new 123f6538 Updated CHANGELOG.md
123f6538 is described below

commit 123f6538831daa2aa73a8b9d2d0e91c58ec0fa50
Author: github-actions[bot] 
<41898282+github-actions[bot]@users.noreply.github.com>
AuthorDate: Sat Feb 24 03:08:42 2024 +

Updated CHANGELOG.md
---
 CHANGELOG.md | 4 
 1 file changed, 4 insertions(+)

diff --git a/CHANGELOG.md b/CHANGELOG.md
index 25c63d6c..be55176b 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -6,7 +6,11 @@
 
 **Closed issues:**
 
+- Kafka Apicurio Secured Sink Kamelet 
[\#1916](https://github.com/apache/camel-kamelets/issues/1916)
+- Kafka Apicurio Secured Source Kamelet 
[\#1915](https://github.com/apache/camel-kamelets/issues/1915)
 - Release Camel-Kamelets 4.4.0 
[\#1902](https://github.com/apache/camel-kamelets/issues/1902)
+- Kafka Schema Registries: Support HTTPS of Apicurio Registry 
[\#1786](https://github.com/apache/camel-kamelets/issues/1786)
+- Kafka Schema Registries: Support authentication mechanisms for Apicurio 
Registry [\#1684](https://github.com/apache/camel-kamelets/issues/1684)
 
 ## [v4.4.0](https://github.com/apache/camel-kamelets/tree/v4.4.0) (2024-02-19)
 



Re: [I] [CI] - Quarkus Main Branch Build Failure [camel-quarkus]

2024-02-23 Thread via GitHub


github-actions[bot] commented on issue #2926:
URL: https://github.com/apache/camel-quarkus/issues/2926#issuecomment-1962220492

   The 
[quarkus-main](https://github.com/apache/camel-quarkus/tree/quarkus-main) 
branch build has failed:
   
   * Build ID: 8027495795-1402-cd814ecc-ac12-4ec8-a20c-551eed2cb410
   * Camel Quarkus Commit: 4c8d7ac6d5b44c4731562171eda19d5cc29aa289
   
   * Quarkus Main Commit: fd57971cd8d97d3c0cb3402f5d2f897248b2ce69
   * Link to build: 
https://github.com/apache/camel-quarkus/actions/runs/8027495795


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



(camel-k) branch release-2.2.x updated: chore: changelog automatic update

2024-02-23 Thread github-bot
This is an automated email from the ASF dual-hosted git repository.

github-bot pushed a commit to branch release-2.2.x
in repository https://gitbox.apache.org/repos/asf/camel-k.git


The following commit(s) were added to refs/heads/release-2.2.x by this push:
 new 65e44218f chore: changelog automatic update
65e44218f is described below

commit 65e44218f954fcaa7f14aefc5f6e9933557a4466
Author: github-actions[bot] 
<41898282+github-actions[bot]@users.noreply.github.com>
AuthorDate: Sat Feb 24 01:11:12 2024 +

chore: changelog automatic update
---
 CHANGELOG.md | 1 +
 1 file changed, 1 insertion(+)

diff --git a/CHANGELOG.md b/CHANGELOG.md
index 87eb44004..29c772ff0 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -6,6 +6,7 @@
 
 **Closed issues:**
 
+- Debug Integrations failing 
[\#5161](https://github.com/apache/camel-k/issues/5161)
 - Performance regression due to configmap/secrets whole cluster watch 
[\#5143](https://github.com/apache/camel-k/issues/5143)
 - camel-jackson configure configure "autoDiscoverObjectMapper" property for 
non-spring boot application 
[\#5140](https://github.com/apache/camel-k/issues/5140)
 - Integrations remain in Initialization loop when referenced config map has 
owner references [\#5114](https://github.com/apache/camel-k/issues/5114)



(camel-k) branch release-2.1.x updated: chore: changelog automatic update

2024-02-23 Thread github-bot
This is an automated email from the ASF dual-hosted git repository.

github-bot pushed a commit to branch release-2.1.x
in repository https://gitbox.apache.org/repos/asf/camel-k.git


The following commit(s) were added to refs/heads/release-2.1.x by this push:
 new 160a75236 chore: changelog automatic update
160a75236 is described below

commit 160a752360794a8eab6acfe14efb58d6f2d5340c
Author: github-actions[bot] 
<41898282+github-actions[bot]@users.noreply.github.com>
AuthorDate: Sat Feb 24 00:26:37 2024 +

chore: changelog automatic update
---
 CHANGELOG.md | 1 +
 1 file changed, 1 insertion(+)

diff --git a/CHANGELOG.md b/CHANGELOG.md
index 87eb44004..29c772ff0 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -6,6 +6,7 @@
 
 **Closed issues:**
 
+- Debug Integrations failing 
[\#5161](https://github.com/apache/camel-k/issues/5161)
 - Performance regression due to configmap/secrets whole cluster watch 
[\#5143](https://github.com/apache/camel-k/issues/5143)
 - camel-jackson configure configure "autoDiscoverObjectMapper" property for 
non-spring boot application 
[\#5140](https://github.com/apache/camel-k/issues/5140)
 - Integrations remain in Initialization loop when referenced config map has 
owner references [\#5114](https://github.com/apache/camel-k/issues/5114)



(camel-k) branch main updated: chore: nightly automatic updates

2024-02-23 Thread github-bot
This is an automated email from the ASF dual-hosted git repository.

github-bot pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-k.git


The following commit(s) were added to refs/heads/main by this push:
 new 08582b239 chore: nightly automatic updates
08582b239 is described below

commit 08582b2397cefdb5249880378cfd0a043248688f
Author: github-actions[bot] 
<41898282+github-actions[bot]@users.noreply.github.com>
AuthorDate: Fri Feb 23 23:45:54 2024 +

chore: nightly automatic updates
---
 CHANGELOG.md | 3 +++
 coverage.out | 8 
 2 files changed, 7 insertions(+), 4 deletions(-)

diff --git a/CHANGELOG.md b/CHANGELOG.md
index a9500b6b9..1d89334be 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -6,6 +6,7 @@
 
 **Closed issues:**
 
+- Debug Integrations failing 
[\#5161](https://github.com/apache/camel-k/issues/5161)
 - Performance regression due to configmap/secrets whole cluster watch 
[\#5143](https://github.com/apache/camel-k/issues/5143)
 - camel-jackson configure configure "autoDiscoverObjectMapper" property for 
non-spring boot application 
[\#5140](https://github.com/apache/camel-k/issues/5140)
 - Integrations remain in Initialization loop when referenced config map has 
owner references [\#5114](https://github.com/apache/camel-k/issues/5114)
@@ -45,6 +46,8 @@
 
 **Merged pull requests:**
 
+- chore\(deps\): bump github.com/prometheus/common from 0.47.0 to 0.48.0 
[\#5177](https://github.com/apache/camel-k/pull/5177) 
([dependabot[bot]](https://github.com/apps/dependabot))
+- fix\(ctrl\): calculate digest on spec traits 
[\#5176](https://github.com/apache/camel-k/pull/5176) 
([squakez](https://github.com/squakez))
 - chore\(deps\): bump go.uber.org/zap from 1.26.0 to 1.27.0 
[\#5171](https://github.com/apache/camel-k/pull/5171) 
([dependabot[bot]](https://github.com/apps/dependabot))
 - fix\(\#3433\): Deprecate platform trait create default option 
[\#5170](https://github.com/apache/camel-k/pull/5170) 
([christophd](https://github.com/christophd))
 - Move KameletRepositorySpec to common types 
[\#5168](https://github.com/apache/camel-k/pull/5168) 
([christophd](https://github.com/christophd))
diff --git a/coverage.out b/coverage.out
index dfc5d8c9a..4ff6fd19e 100644
--- a/coverage.out
+++ b/coverage.out
@@ -1824,14 +1824,14 @@ 
github.com/apache/camel-k/v2/pkg/util/defaults/defaults_support.go:40:  
Insta
 github.com/apache/camel-k/v2/pkg/util/defaults/defaults_support.go:44: 
OperatorID  
100.0%
 github.com/apache/camel-k/v2/pkg/util/defaults/defaults_support.go:48: 
boolEnvOrDefault
100.0%
 github.com/apache/camel-k/v2/pkg/util/defaults/defaults_support.go:58: 
envOrDefault
100.0%
-github.com/apache/camel-k/v2/pkg/util/digest/digest.go:50: 
ComputeForIntegration   
54.5%
-github.com/apache/camel-k/v2/pkg/util/digest/digest.go:207:
computeForTrait 
0.0%
-github.com/apache/camel-k/v2/pkg/util/digest/digest.go:230:
computeForTraitProps
0.0%
+github.com/apache/camel-k/v2/pkg/util/digest/digest.go:50: 
ComputeForIntegration   
57.1%
+github.com/apache/camel-k/v2/pkg/util/digest/digest.go:207:
computeForTrait 
41.7%
+github.com/apache/camel-k/v2/pkg/util/digest/digest.go:230:
computeForTraitProps
80.0%
 github.com/apache/camel-k/v2/pkg/util/digest/digest.go:241:
toMap   
71.4%
 github.com/apache/camel-k/v2/pkg/util/digest/digest.go:256:
ComputeForIntegrationKit
0.0%
 github.com/apache/camel-k/v2/pkg/util/digest/digest.go:284:
ComputeForResource  
0.0%
 github.com/apache/camel-k/v2/pkg/util/digest/digest.go:313:
ComputeForSource
0.0%
-github.com/apache/camel-k/v2/pkg/util/digest/digest.go:356:
sortedTraitsMapKeys 
71.4%
+github.com/apache/camel-k/v2/pkg/util/digest/digest.go:356:
sortedTraitsMapKeys 
100.0%
 

(camel-karavan) branch main updated: Fix #1145

2024-02-23 Thread marat
This is an automated email from the ASF dual-hosted git repository.

marat pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-karavan.git


The following commit(s) were added to refs/heads/main by this push:
 new 2f5e3892 Fix #1145
2f5e3892 is described below

commit 2f5e3892a470e054a03b342682f1a885bf5bc7ba
Author: Marat Gubaidullin 
AuthorDate: Fri Feb 23 17:08:59 2024 -0500

Fix #1145
---
 .../src/main/resources/snippets/kubernetes-application.properties  | 3 ++-
 karavan-app/src/main/resources/snippets/kubernetes-build.sh| 2 ++
 .../src/main/resources/snippets/kubernetes-builder-env.properties  | 2 +-
 3 files changed, 5 insertions(+), 2 deletions(-)

diff --git 
a/karavan-app/src/main/resources/snippets/kubernetes-application.properties 
b/karavan-app/src/main/resources/snippets/kubernetes-application.properties
index 832343a9..09418d44 100644
--- a/karavan-app/src/main/resources/snippets/kubernetes-application.properties
+++ b/karavan-app/src/main/resources/snippets/kubernetes-application.properties
@@ -21,10 +21,11 @@ camel.routecontroller.threadPoolSize=3
 camel.context.dev-console=true
 label.runtime=app.kubernetes.io/runtime
 
jib.from.image=gcr.io/distroless/java17@sha256:85c2fa20773270fe6fecf576dd5a53f5bb8b914e57a463c533dac034c51862d9
+#jib.from.image=gcr.io/distroless/java17-debian11:nonroot-arm64
 jkube.version=1.16.0
 jkube.skip.build=true
 jkube.namespace=default
-jkube.imagePullPolicy=IfNotPresent
+jkube.imagePullPolicy=Always
 jkube.enricher.jkube-controller.type=Deployment
 jkube.enricher.jkube-controller.replicaCount=1
 jkube.enricher.jkube-service.port=80:8080,443:8080
diff --git a/karavan-app/src/main/resources/snippets/kubernetes-build.sh 
b/karavan-app/src/main/resources/snippets/kubernetes-build.sh
index bbfffbb0..ba8fd596 100644
--- a/karavan-app/src/main/resources/snippets/kubernetes-build.sh
+++ b/karavan-app/src/main/resources/snippets/kubernetes-build.sh
@@ -26,6 +26,8 @@ export NAMESPACE=$(cat 
/var/run/secrets/kubernetes.io/serviceaccount/namespace)
 mvn package jib:build k8s:resource k8s:apply \
   -Djkube.namespace=${NAMESPACE} \
   -Djib.allowInsecureRegistries=true \
+#  -Djib.from.platforms=linux/arm64 \
+#  -Djib.platform.architecture=arm64 \
   -Djib.to.image=${IMAGE_REGISTRY}/${IMAGE_GROUP}/${PROJECT_ID}:${TAG} \
   -Djib.to.auth.username=${IMAGE_REGISTRY_USERNAME} \
   -Djib.to.auth.password=${IMAGE_REGISTRY_PASSWORD}
\ No newline at end of file
diff --git 
a/karavan-app/src/main/resources/snippets/kubernetes-builder-env.properties 
b/karavan-app/src/main/resources/snippets/kubernetes-builder-env.properties
index 5e13d78f..77996d19 100644
--- a/karavan-app/src/main/resources/snippets/kubernetes-builder-env.properties
+++ b/karavan-app/src/main/resources/snippets/kubernetes-builder-env.properties
@@ -1,6 +1,6 @@
 IMAGE_REGISTRY=karavan:karavan.container-image.registry
 IMAGE_REGISTRY_USERNAME=karavan:karavan.container-image.registry-username
-IMAGE_REGISTRY_PASSWORD=karavan:karavan.container-image.password
+IMAGE_REGISTRY_PASSWORD=karavan:karavan.container-image.registry-password
 IMAGE_GROUP=karavan:karavan.container-image.group
 GIT_REPOSITORY=karavan:karavan.git.repository
 GIT_USERNAME=karavan:karavan.git.username



Re: [I] Karavan should build correct images on minikube on M2 [camel-karavan]

2024-02-23 Thread via GitHub


mgubaidullin closed issue #1145: Karavan should build correct images on 
minikube on M2
URL: https://github.com/apache/camel-karavan/issues/1145


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



(camel-karavan) 02/02: Add kubernetes-builder-env.properties

2024-02-23 Thread marat
This is an automated email from the ASF dual-hosted git repository.

marat pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-karavan.git

commit a9a54a92c4144677010d31ca91bfcd7605c3b1c6
Author: Marat Gubaidullin 
AuthorDate: Fri Feb 23 15:57:48 2024 -0500

Add kubernetes-builder-env.properties
---
 .../java/org/apache/camel/karavan/code/CodeService.java  |  1 +
 .../resources/snippets/kubernetes-builder-env.properties | 16 
 2 files changed, 9 insertions(+), 8 deletions(-)

diff --git 
a/karavan-app/src/main/java/org/apache/camel/karavan/code/CodeService.java 
b/karavan-app/src/main/java/org/apache/camel/karavan/code/CodeService.java
index 89e5298d..3b2f9df9 100644
--- a/karavan-app/src/main/java/org/apache/camel/karavan/code/CodeService.java
+++ b/karavan-app/src/main/java/org/apache/camel/karavan/code/CodeService.java
@@ -199,6 +199,7 @@ public class CodeService {
 files.addAll(targets.stream().map(target -> target + "-" + 
APPLICATION_PROPERTIES_FILENAME).toList());
 files.addAll(targets.stream().map(target ->  target + "-" + 
BUILD_SCRIPT_FILENAME).toList());
 files.addAll(blockList);
+files.add(BUILDER_ENV_MAPPING_FILENAME);
 
 files.addAll(getBeanTemplateNames());
 
diff --git 
a/karavan-app/src/main/resources/snippets/kubernetes-builder-env.properties 
b/karavan-app/src/main/resources/snippets/kubernetes-builder-env.properties
index 5c11b05d..5e13d78f 100644
--- a/karavan-app/src/main/resources/snippets/kubernetes-builder-env.properties
+++ b/karavan-app/src/main/resources/snippets/kubernetes-builder-env.properties
@@ -1,8 +1,8 @@
-IMAGE_REGISTRY=karavan:image-registry
-IMAGE_REGISTRY_USERNAME=karavan:image-registry-username
-IMAGE_REGISTRY_PASSWORD=karavan:image-password
-IMAGE_GROUP=karavan:image-group
-GIT_REPOSITORY=karavan:git-repository
-GIT_USERNAME=karavan:git-username
-GIT_PASSWORD=karavan:git-password
-GIT_BRANCH=karavan:git-branch
\ No newline at end of file
+IMAGE_REGISTRY=karavan:karavan.container-image.registry
+IMAGE_REGISTRY_USERNAME=karavan:karavan.container-image.registry-username
+IMAGE_REGISTRY_PASSWORD=karavan:karavan.container-image.password
+IMAGE_GROUP=karavan:karavan.container-image.group
+GIT_REPOSITORY=karavan:karavan.git.repository
+GIT_USERNAME=karavan:karavan.git.username
+GIT_PASSWORD=karavan:karavan.git.password
+GIT_BRANCH=karavan:karavan.git.branch
\ No newline at end of file



(camel-karavan) 01/02: Deploy to minikube

2024-02-23 Thread marat
This is an automated email from the ASF dual-hosted git repository.

marat pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-karavan.git

commit 437f635ef69a4d80df99599b3ecac4c90b3a9e25
Author: Marat Gubaidullin 
AuthorDate: Fri Feb 23 15:49:23 2024 -0500

Deploy to minikube
---
 docs/README.md |  3 +-
 docs/WEB_OPENSHIFT.md  | 65 --
 docs/install/karavan-kubernetes/kustomization.yaml |  7 +++
 docs/install/karavan-kubernetes/nodePort.yaml  | 14 +
 4 files changed, 22 insertions(+), 67 deletions(-)

diff --git a/docs/README.md b/docs/README.md
index a8d26af8..9c3b0fd2 100644
--- a/docs/README.md
+++ b/docs/README.md
@@ -8,8 +8,7 @@ Karavan Web Application is a container deployed into Docker, 
Kubernetes or OpenS
 
 1. [Run in Docker](WEB_DOCKER.md)
 2. [Run in Kubernetes](WEB_KUBERNETES.md)
-3. [Run in Openshift](WEB_OPENSHIFT.md)
-4. [How to use](WEB_HOWTO.md)
+3. [How to use](WEB_HOWTO.md)
 
 ### VS Code extensions
 
diff --git a/docs/WEB_OPENSHIFT.md b/docs/WEB_OPENSHIFT.md
deleted file mode 100644
index 46529001..
--- a/docs/WEB_OPENSHIFT.md
+++ /dev/null
@@ -1,65 +0,0 @@
-## Karavan in Openshift
-
-### Requirements
-1. Openshift v4.13+ and openshift-cli installed
-
-### Install on OpenShift Local
-1. Start OpenShift Local
-```
-crc start
-```
-2. Get credentials
-```
-crc console --credentials
-```
-3. Login as an admin
-```
-oc login -u kubeadmin -p password https://YOUR_OPENSHIFT_HOST:PORT
-```
-4. Install Karavan using Maven
-
-Download installer from Maven Central: 
https://repo1.maven.org/maven2/org/apache/camel/karavan/karavan-installer/4.4.0/karavan-installer-4.4.0.jar
 
-
-ex. with following command:
-```
-mvn org.apache.maven.plugins:maven-dependency-plugin:3.0.2:copy 
-Dartifact=org.apache.camel.karavan:karavan-installer:4.4.0:jar 
-DoutputDirectory=.
-```
-
-Install Karavan with Gitea (for demo purpose)
-```
-java -jar karavan-installer-4.4.0.jar --install-gitea
-
-```
-
-5. Install Karavan using Jbang
-
-Install Karavan with Gitea (for demo purpose)
-```
-jbang org.apache.camel.karavan:karavan-installer:4.4.0 --install-gitea
-```
-
-6. Get karavan route host
-```
-oc get route karavan -n karavan -o jsonpath='{.spec.host}'
-```
-   Use karavan host to connect to the application
-
-
-### Install parameters
-
-`--namespace` - Namespace
-`--node-port` - Node port
-`--yaml` - Create YAML file. Do not apply
-`--file` - YAML file name, defaultValue = `karavan.yaml`
-`--openshift` - Create files for OpenShift
-
-`--git-repository` - Git repository
-`--git-username` - Git username
-`--git-password` - Git password
-`--git-branch` - Git branch
-`--install-gitea` - Install Gitea (for demo purposes), defaultValue = 
`false`
-
-`--image-registry` - Image registry
-`--image-group` - Image group, defaultValue = `karavan`
-`--image-registry-username` - Image registry username
-`--image-registry-password` - Image registry password
\ No newline at end of file
diff --git a/docs/install/karavan-kubernetes/kustomization.yaml 
b/docs/install/karavan-kubernetes/kustomization.yaml
index 488d20e7..a295a9fc 100644
--- a/docs/install/karavan-kubernetes/kustomization.yaml
+++ b/docs/install/karavan-kubernetes/kustomization.yaml
@@ -14,6 +14,13 @@ resources:
   - deployment.yaml
   - service.yaml
 
+# Patch for Service with nodePort
+patches:
+  - path: ./nodePort.yaml
+target:
+  kind: "Service"
+  name: "karavan"
+  
 # Replace secret from.env if required
 secretGenerator:
 - name: karavan
diff --git a/docs/install/karavan-kubernetes/nodePort.yaml 
b/docs/install/karavan-kubernetes/nodePort.yaml
new file mode 100644
index ..2ec57a04
--- /dev/null
+++ b/docs/install/karavan-kubernetes/nodePort.yaml
@@ -0,0 +1,14 @@
+apiVersion: "v1"
+kind: "Service"
+metadata:
+  name: "karavan"
+spec:
+  ports:
+  - name: "http"
+nodePort: 30777
+port: 80
+protocol: "TCP"
+targetPort: 8080
+  selector:
+app: "karavan"
+  type: "NodePort"
\ No newline at end of file



(camel-karavan) branch main updated (8d19037f -> a9a54a92)

2024-02-23 Thread marat
This is an automated email from the ASF dual-hosted git repository.

marat pushed a change to branch main
in repository https://gitbox.apache.org/repos/asf/camel-karavan.git


from 8d19037f Fix #1128
 new 437f635e Deploy to minikube
 new a9a54a92 Add kubernetes-builder-env.properties

The 2 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 docs/README.md |  3 +-
 docs/WEB_OPENSHIFT.md  | 65 --
 docs/install/karavan-kubernetes/kustomization.yaml |  7 +++
 .../{service.yaml => nodePort.yaml}| 10 +---
 .../org/apache/camel/karavan/code/CodeService.java |  1 +
 .../snippets/kubernetes-builder-env.properties | 16 +++---
 6 files changed, 19 insertions(+), 83 deletions(-)
 delete mode 100644 docs/WEB_OPENSHIFT.md
 copy docs/install/karavan-kubernetes/{service.yaml => nodePort.yaml} (56%)



(camel-karavan) 01/02: Upgrade

2024-02-23 Thread marat
This is an automated email from the ASF dual-hosted git repository.

marat pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-karavan.git

commit 8dd60ca874f3aa808e8c98583233840a79917bcc
Author: Marat Gubaidullin 
AuthorDate: Fri Feb 23 15:28:58 2024 -0500

Upgrade
---
 .gitignore |  4 +-
 docs/WEB_DOCKER.md | 49 +++---
 docs/WEB_KUBERNETES.md | 47 -
 .../karavan-docker/docker-compose-gitea.yaml   |  2 +-
 docs/install/karavan-kubernetes/deployment.yaml| 29 +++--
 docs/install/karavan-kubernetes/kustomization.yaml | 11 -
 docs/install/karavan-kubernetes/secret.yaml|  4 +-
 karavan-app/pom.xml| 17 ++--
 .../karavan/kubernetes/KubernetesService.java  |  2 +-
 .../camel/karavan/service/ProjectService.java  |  2 +
 10 files changed, 69 insertions(+), 98 deletions(-)

diff --git a/.gitignore b/.gitignore
index f0269644..ae9b466c 100644
--- a/.gitignore
+++ b/.gitignore
@@ -77,4 +77,6 @@ karavan-cloud/karavan-secret-real.yaml
 
 docs/install/karavan-docker/data/*
 
-**/dependency-reduced-pom.xml
\ No newline at end of file
+**/dependency-reduced-pom.xml
+
+.env
\ No newline at end of file
diff --git a/docs/WEB_DOCKER.md b/docs/WEB_DOCKER.md
index 835d7111..b0f56aaa 100644
--- a/docs/WEB_DOCKER.md
+++ b/docs/WEB_DOCKER.md
@@ -5,52 +5,31 @@
 2. Docker Engine 24+
 
 ### How to run Karavan on Docker
-1. Create network
+1. Download [docker-compose.yaml](install/karavan-docker/docker-compose.yaml)
+2. Set Environment Variables for Git Repository and Container Image Registry 
connections in docker-compose.yaml
+2. Create network
 ```
 docker network create karavan
 ```
-2. Start Karavan with demo features
+3. Start Karavan
 ```
-docker run -it --rm  --name karavan \
---network karavan -p 8080:8080 \
--e KARAVAN_GIT_INSTALL_GITEA=true \
--e KARAVAN_IMAGE_REGISTRY_INSTALL=true \
--v /var/run/docker.sock:/var/run/docker.sock \
-ghcr.io/apache/camel-karavan:4.4.0
+docker compose up
 ```
 3. Open http://localhost:8080
 
-### Configuration variables
-1. For demo/evaluation purposes:
+### How to run Demo Karavan on Docker with Gitea
 
-Install Gitea Git repository
+1. Download [karavan-docker](install/karavan-docker) folder
+2. Unzip data.zip with Gitea database in karavan-docker folder
 ```
--e KARAVAN_GIT_INSTALL_GITEA=true
+unzip data.zip
 ```
-
-Install Image registry
-```
--e KARAVAN_IMAGE_REGISTRY_INSTALL=true
-```
-
-2. Maven cache
-```
--e KARAVAN_MAVEN_CACHE=$YOUR_PATH_TO_MAVEN/.m2
+2. Create network
 ```
-
-3. Git repository
+docker network create karavan
 ```
--e KARAVAN_GIT_REPOSITORY=$YOUR_GIT_REPOSITORY \
--e KARAVAN_GIT_USERNAME=$YOUR_GIT_USERNAME \
--e KARAVAN_GIT_PASSWORD=$YOUR_GIT_PASSWORD \
--e KARAVAN_GIT_BRANCH=$YOUR_GIT_DEFAULT_BRANCH \
+3. Start Karavan
 ```
-
-4. Image registry
+docker compose -f docker-compose-gitea.yaml up
 ```
--e KARAVAN_IMAGE_REGISTRY=$YOUR_IMAGE_REGISTRY \
--e KARAVAN_IMAGE_REGISTRY_USERNAME=$YOUR_IMAGE_REGISTRY_USERNAME \
--e KARAVAN_IMAGE_REGISTRY_PASSWORD=$YOUR_IMAGE_REGISTRY_PASSWORD \
--e KARAVAN_IMAGE_GROUP=$YOUR_IMAGE_GROUP \
-```
-
+3. Open http://localhost:8080
diff --git a/docs/WEB_KUBERNETES.md b/docs/WEB_KUBERNETES.md
index c0340833..e46f8cec 100644
--- a/docs/WEB_KUBERNETES.md
+++ b/docs/WEB_KUBERNETES.md
@@ -16,50 +16,17 @@
 ```
 minikube dashboard
 ```
-4. Install Karavan using Maven
+4. Download [karavan-kubernetes](install/karavan-kubernetes) folder
 
-Download installer from Maven Central: 
https://repo1.maven.org/maven2/org/apache/camel/karavan/karavan-installer/4.4.0/karavan-installer-4.4.0.jar
 
-
-ex. with following command:
+5. Get registry IP and set it to `secrets.yaml`
 ```
-mvn org.apache.maven.plugins:maven-dependency-plugin:3.0.2:copy 
-Dartifact=org.apache.camel.karavan:karavan-installer:4.4.0:jar 
-DoutputDirectory=.
+kubectl get service registry -n kube-system -o jsonpath="{.spec.clusterIP}"
 ```
 
-Install Karavan with Gitea (for demo purpose)
-```
-java -jar karavan-installer-4.4.0.jar --install-gitea --node-port=30777
-
-```
-
-5. Install Karavan using Jbang
-
-Install Karavan with Gitea (for demo purpose)
-```
-jbang org.apache.camel.karavan:karavan-installer:4.4.0 --install-gitea 
--node-port=30777
-```
+6. Set Secrets for Git Repository and Container Image Registry connections in 
`secrets.yaml`
 
-6. Get karavan service URL
+6. Install Karavan using kubectl
 ```
-minikube service karavan --url --namespace karavan
+kubectl create namespace karavan
+kubectl apply -k .
 ```
-   Use karavan URL to connect to the application
-
-
-### 

(camel-karavan) branch main updated (8d0baf4b -> 8d19037f)

2024-02-23 Thread marat
This is an automated email from the ASF dual-hosted git repository.

marat pushed a change to branch main
in repository https://gitbox.apache.org/repos/asf/camel-karavan.git


from 8d0baf4b Update app.yml
 new 8dd60ca8 Upgrade
 new 8d19037f Fix #1128

The 2 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 .github/workflows/app-oidc.yml |  5 ++-
 .github/workflows/app.yml  |  1 -
 .gitignore |  4 +-
 docs/WEB_DOCKER.md | 49 +++---
 docs/WEB_KUBERNETES.md | 47 -
 .../karavan-docker/docker-compose-gitea.yaml   |  2 +-
 docs/install/karavan-kubernetes/deployment.yaml| 29 +++--
 docs/install/karavan-kubernetes/kustomization.yaml | 11 -
 docs/install/karavan-kubernetes/secret.yaml|  4 +-
 karavan-app/pom.xml| 17 ++--
 .../karavan/kubernetes/KubernetesService.java  |  2 +-
 .../camel/karavan/service/ProjectService.java  |  2 +
 12 files changed, 73 insertions(+), 100 deletions(-)



(camel-karavan) 02/02: Fix #1128

2024-02-23 Thread marat
This is an automated email from the ASF dual-hosted git repository.

marat pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-karavan.git

commit 8d19037f0290221b92cf288bbd5345968cbf0e3d
Author: Marat Gubaidullin 
AuthorDate: Fri Feb 23 15:30:49 2024 -0500

Fix #1128
---
 .github/workflows/app-oidc.yml | 5 -
 .github/workflows/app.yml  | 1 -
 2 files changed, 4 insertions(+), 2 deletions(-)

diff --git a/.github/workflows/app-oidc.yml b/.github/workflows/app-oidc.yml
index 1fe36e72..eb51e210 100644
--- a/.github/workflows/app-oidc.yml
+++ b/.github/workflows/app-oidc.yml
@@ -42,7 +42,6 @@ jobs:
   mvn clean compile exec:java -f karavan-generator \
   
-Dexec.mainClass="org.apache.camel.karavan.generator.KaravanGenerator"
 
-  #  Building Karavan Core
   - name: Set up Node
 uses: actions/setup-node@v4
 with:
@@ -52,6 +51,9 @@ jobs:
 working-directory: ./karavan/karavan-core
 run: npm ci
 
+  - name: Create Multi Platfrom Builder
+run: docker buildx create --use --platform=linux/arm64,linux/amd64 
--name multi-platform-builder
+
   - name: Build application
 working-directory: ./karavan/karavan-app
 run: |
@@ -59,6 +61,7 @@ jobs:
   -Dquarkus.quinoa.package-manager-install=false \
   -Dquarkus.container-image.build=true \
   -Dquarkus.container-image.push=true \
+  -Dquarkus.docker.buildx.platform=linux/amd64,linux/arm64 \
   -Dquarkus.container-image.image=${{ env.REGISTRY 
}}/${GITHUB_REPOSITORY}:${{ env.TAG }}-oidc \
   -Dquarkus.container-image.username=${{ github.actor }} \
   -Dquarkus.container-image.password=${{ secrets.GITHUB_TOKEN }}
diff --git a/.github/workflows/app.yml b/.github/workflows/app.yml
index 87361e0d..959aac2d 100644
--- a/.github/workflows/app.yml
+++ b/.github/workflows/app.yml
@@ -42,7 +42,6 @@ jobs:
   mvn clean compile exec:java -f karavan-generator \
   
-Dexec.mainClass="org.apache.camel.karavan.generator.KaravanGenerator"
 
-  #  Building Karavan Core
   - name: Set up Node
 uses: actions/setup-node@v4
 with:



Re: [I] Karavan should be build using src/main/docker/Dockerfile.jdk [camel-karavan]

2024-02-23 Thread via GitHub


mgubaidullin closed issue #1128: Karavan should be build using 
src/main/docker/Dockerfile.jdk 
URL: https://github.com/apache/camel-karavan/issues/1128


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



(camel-karavan) branch main updated: Update app.yml

2024-02-23 Thread marat
This is an automated email from the ASF dual-hosted git repository.

marat pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-karavan.git


The following commit(s) were added to refs/heads/main by this push:
 new 8d0baf4b Update app.yml
8d0baf4b is described below

commit 8d0baf4bb10cc83514d54b68696851b02a1edee5
Author: Marat Gubaidullin 
AuthorDate: Fri Feb 23 15:19:22 2024 -0500

Update app.yml
---
 .github/workflows/app.yml | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/.github/workflows/app.yml b/.github/workflows/app.yml
index c4081da4..87361e0d 100644
--- a/.github/workflows/app.yml
+++ b/.github/workflows/app.yml
@@ -52,6 +52,9 @@ jobs:
 working-directory: ./karavan/karavan-core
 run: npm ci
 
+  - name: Create Multi Platfrom Builder
+run: docker buildx create --use --platform=linux/arm64,linux/amd64 
--name multi-platform-builder
+
   - name: Build application
 working-directory: ./karavan/karavan-app
 run: |



[I] Error configuring property: camel.component.test[00001]port[80]tcp.addr because cannot find component with name test[00001]port[80]tcp. [camel-k]

2024-02-23 Thread via GitHub


lsergio opened a new issue, #5179:
URL: https://github.com/apache/camel-k/issues/5179

   ### What happened?
   
   I have created the following Integration:
   ```
   apiVersion: camel.apache.org/v1
   kind: Integration
   metadata:
 name: basic
   spec:
 sources:
 - name: flow1.groovy
   content: |-
 from('quartz://flow1/trigger?cron=0+*+*+?+*+*')
.to("https://httpbin.org/delay/2?bridgeEndpoint=true;)
.to("log:info")
   ```
   
   It creates a CronJob to run every minute. 
   When the Integration runs, I get the following error on its log:
   
   ```
   Caused by: java.lang.RuntimeException: java.lang.IllegalArgumentException: 
Error configuring property: camel.component.test[1]port[80]tcp.addr because 
cannot find component with name test[1]port[80]tcp. Make sure you have the 
component on the classpath
at 
org.apache.camel.quarkus.main.CamelMainRuntime.start(CamelMainRuntime.java:65)
at 
org.apache.camel.quarkus.core.CamelBootstrapRecorder.start(CamelBootstrapRecorder.java:45)
... 15 more
   Caused by: java.lang.IllegalArgumentException: Error configuring property: 
camel.component.test[1]port[80]tcp.addr because cannot find component with 
name test[1]port[80]tcp. Make sure you have the component on the classpath
at 
org.apache.camel.main.BaseMainSupport.lambda$doAutoConfigurationFromProperties$29(BaseMainSupport.java:1683)
at 
org.apache.camel.main.MainHelper.computeProperties(MainHelper.java:407)
at 
org.apache.camel.main.BaseMainSupport.doAutoConfigurationFromProperties(BaseMainSupport.java:1675)
at 
org.apache.camel.main.BaseMainSupport.autoConfigurationFromProperties(BaseMainSupport.java:1638)
at 
org.apache.camel.main.BaseMainSupport.autoconfigure(BaseMainSupport.java:447)
at org.apache.camel.main.MainSupport.autoconfigure(MainSupport.java:73)
at 
org.apache.camel.main.BaseMainSupport.postProcessCamelContext(BaseMainSupport.java:627)
at 
org.apache.camel.quarkus.main.CamelMain.initCamelContext(CamelMain.java:116)
at org.apache.camel.quarkus.main.CamelMain.doInit(CamelMain.java:86)
at 
org.apache.camel.support.service.BaseService.init(BaseService.java:78)
at 
org.apache.camel.quarkus.main.CamelMain.startEngine(CamelMain.java:137)
at 
org.apache.camel.quarkus.main.CamelMainRuntime.start(CamelMainRuntime.java:49)
... 16 more
   ```
   1 seems to be a knative revision number, so I decided to disable the 
knative trait:
   
   ```
 traits:
   knative:
 enabled: false
   ```
   and the error disappeared.
   
   As this integration did not create a Service/Knative Service, should the 
knative trait be activated?
   
   This started to happen today in our cluster, so maybe it's also related to 
some environment configuration. If someone can provide some guidance, I would 
appreciate as well.
   
   
   ### Steps to reproduce
   
   _No response_
   
   ### Relevant log output
   
   _No response_
   
   ### Camel K version
   
   2.2.0


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



(camel-karavan) branch main updated: Update app.yml

2024-02-23 Thread marat
This is an automated email from the ASF dual-hosted git repository.

marat pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-karavan.git


The following commit(s) were added to refs/heads/main by this push:
 new fcf9473c Update app.yml
fcf9473c is described below

commit fcf9473cd35ec66076be279a231991670224519c
Author: Marat Gubaidullin 
AuthorDate: Fri Feb 23 14:42:38 2024 -0500

Update app.yml
---
 .github/workflows/app.yml | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/.github/workflows/app.yml b/.github/workflows/app.yml
index 138b6ca8..c4081da4 100644
--- a/.github/workflows/app.yml
+++ b/.github/workflows/app.yml
@@ -59,7 +59,8 @@ jobs:
   -Dquarkus.quinoa.package-manager-install=false \
   -Dquarkus.container-image.build=true \
   -Dquarkus.container-image.push=true \
+  -Dquarkus.docker.buildx.platform=linux/amd64,linux/arm64 \
   -Dquarkus.container-image.image=${{ env.REGISTRY 
}}/${GITHUB_REPOSITORY}:${{ env.TAG }} \
   -Dquarkus.container-image.username=${{ github.actor }} \
   -Dquarkus.container-image.password=${{ secrets.GITHUB_TOKEN }}
-if: ${{ github.ref == 'refs/heads/main' }}
\ No newline at end of file
+if: ${{ github.ref == 'refs/heads/main' }}



(camel) branch regen_bot updated (17807d7e395 -> 1059a25e735)

2024-02-23 Thread github-bot
This is an automated email from the ASF dual-hosted git repository.

github-bot pushed a change to branch regen_bot
in repository https://gitbox.apache.org/repos/asf/camel.git


omit 17807d7e395 Regen for commit c15cdbd6f4c2cd9b5658eb78ccb72acb7ec6ac03
 add 1059a25e735 Regen for commit c15cdbd6f4c2cd9b5658eb78ccb72acb7ec6ac03 
(#13281)

This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version.  This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:

 * -- * -- B -- O -- O -- O   (17807d7e395)
\
 N -- N -- N   refs/heads/regen_bot (1059a25e735)

You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.

Any revisions marked "omit" are not gone; other references still
refer to them.  Any revisions marked "discard" are gone forever.

No new revisions were added by this update.

Summary of changes:



(camel) branch main updated: Regen for commit c15cdbd6f4c2cd9b5658eb78ccb72acb7ec6ac03 (#13281)

2024-02-23 Thread acosentino
This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel.git


The following commit(s) were added to refs/heads/main by this push:
 new 1059a25e735 Regen for commit c15cdbd6f4c2cd9b5658eb78ccb72acb7ec6ac03 
(#13281)
1059a25e735 is described below

commit 1059a25e7352ced78ae1cef6e1fe5127452a882f
Author: github-actions[bot] 
<41898282+github-actions[bot]@users.noreply.github.com>
AuthorDate: Fri Feb 23 20:10:46 2024 +0100

Regen for commit c15cdbd6f4c2cd9b5658eb78ccb72acb7ec6ac03 (#13281)

Signed-off-by: GitHub 
Co-authored-by: davsclaus 
---
 .../resources/org/apache/camel/catalog/components/knative.json| 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git 
a/catalog/camel-catalog/src/generated/resources/org/apache/camel/catalog/components/knative.json
 
b/catalog/camel-catalog/src/generated/resources/org/apache/camel/catalog/components/knative.json
index 6b5b5ed1cc7..2f6c7f376b2 100644
--- 
a/catalog/camel-catalog/src/generated/resources/org/apache/camel/catalog/components/knative.json
+++ 
b/catalog/camel-catalog/src/generated/resources/org/apache/camel/catalog/components/knative.json
@@ -24,7 +24,7 @@
   },
   "componentProperties": {
 "ceOverride": { "index": 0, "kind": "property", "displayName": "Ce 
Override", "group": "common", "label": "", "required": false, "type": "object", 
"javaType": "java.util.Map", "prefix": 
"ce.override.", "deprecated": false, "autowired": false, "secret": false, 
"configurationClass": 
"org.apache.camel.component.knative.KnativeConfiguration", 
"configurationField": "configuration", "description": "CloudEvent headers to 
override" },
-"cloudEventsSpecVersion": { "index": 1, "kind": "property", "displayName": 
"Cloud Events Spec Version", "group": "common", "label": "", "required": false, 
"type": "string", "javaType": "java.lang.String", "enum": [ "1.0", "1.0.1" ], 
"deprecated": false, "autowired": false, "secret": false, "defaultValue": 
"1.0", "configurationClass": 
"org.apache.camel.component.knative.KnativeConfiguration", 
"configurationField": "configuration", "description": "Set the version of the 
cloudevents spec." },
+"cloudEventsSpecVersion": { "index": 1, "kind": "property", "displayName": 
"Cloud Events Spec Version", "group": "common", "label": "", "required": false, 
"type": "string", "javaType": "java.lang.String", "enum": [ "1.0", "1.0.1", 
"1.0.2" ], "deprecated": false, "autowired": false, "secret": false, 
"defaultValue": "1.0", "configurationClass": 
"org.apache.camel.component.knative.KnativeConfiguration", 
"configurationField": "configuration", "description": "Set the version of the 
cloude [...]
 "cloudEventsType": { "index": 2, "kind": "property", "displayName": "Cloud 
Events Type", "group": "common", "label": "", "required": false, "type": 
"string", "javaType": "java.lang.String", "deprecated": false, "autowired": 
false, "secret": false, "defaultValue": "org.apache.camel.event", 
"configurationClass": 
"org.apache.camel.component.knative.KnativeConfiguration", 
"configurationField": "configuration", "description": "Set the event-type 
information of the produced events." },
 "configuration": { "index": 3, "kind": "property", "displayName": 
"Configuration", "group": "common", "label": "", "required": false, "type": 
"object", "javaType": 
"org.apache.camel.component.knative.KnativeConfiguration", "deprecated": false, 
"autowired": false, "secret": false, "description": "Set the configuration." },
 "consumerFactory": { "index": 4, "kind": "property", "displayName": 
"Consumer Factory", "group": "common", "label": "", "required": false, "type": 
"object", "javaType": 
"org.apache.camel.component.knative.spi.KnativeConsumerFactory", "deprecated": 
false, "autowired": false, "secret": false, "description": "The protocol 
consumer factory." },
@@ -50,7 +50,7 @@
 "type": { "index": 0, "kind": "path", "displayName": "Type", "group": 
"common", "label": "", "required": false, "type": "object", "javaType": 
"org.apache.camel.component.knative.spi.Knative.Type", "enum": [ "endpoint", 
"channel", "event" ], "deprecated": false, "autowired": false, "secret": false, 
"description": "The Knative resource type" },
 "typeId": { "index": 1, "kind": "path", "displayName": "Type Id", "group": 
"common", "label": "", "required": false, "type": "string", "javaType": 
"java.lang.String", "deprecated": false, "autowired": false, "secret": false, 
"description": "The identifier of the Knative resource" },
 "ceOverride": { "index": 2, "kind": "parameter", "displayName": "Ce 
Override", "group": "common", "label": "", "required": false, "type": "object", 
"javaType": "java.util.Map", "prefix": 
"ce.override.", "deprecated": false, "autowired": false, "secret": false, 
"configurationClass": 
"org.apache.camel.component.knative.KnativeConfiguration", 
"configurationField": 

Re: [PR] Generated sources regen [camel]

2024-02-23 Thread via GitHub


oscerd merged PR #13281:
URL: https://github.com/apache/camel/pull/13281


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



(camel) branch regen_bot updated (1b8d9827dcb -> 17807d7e395)

2024-02-23 Thread github-bot
This is an automated email from the ASF dual-hosted git repository.

github-bot pushed a change to branch regen_bot
in repository https://gitbox.apache.org/repos/asf/camel.git


from 1b8d9827dcb Bump infinispan-version from 14.0.24.Final to 
14.0.25.Final (#13280)
 add c15cdbd6f4c Add cloud event 1.0.2 spec
 add 17807d7e395 Regen for commit c15cdbd6f4c2cd9b5658eb78ccb72acb7ec6ac03

No new revisions were added by this update.

Summary of changes:
 .../apache/camel/catalog/components/knative.json   |  4 +--
 .../apache/camel/component/knative/knative.json|  4 +--
 .../component/knative/KnativeConfiguration.java|  2 +-
 .../component/knative/ce/CloudEventProcessors.java | 29 +-
 .../component/knative/http/KnativeHttpTest.java|  3 ++-
 5 files changed, 35 insertions(+), 7 deletions(-)



[PR] Generated sources regen [camel]

2024-02-23 Thread via GitHub


github-actions[bot] opened a new pull request, #13281:
URL: https://github.com/apache/camel/pull/13281

   Regen bot :robot: found some uncommitted changes after running build on 
:camel: `main` branch.
   Please do not delete `regen_bot` branch after merge/rebase.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



(camel) branch main updated: Add cloud event 1.0.2 spec

2024-02-23 Thread davsclaus
This is an automated email from the ASF dual-hosted git repository.

davsclaus pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel.git


The following commit(s) were added to refs/heads/main by this push:
 new c15cdbd6f4c Add cloud event 1.0.2 spec
c15cdbd6f4c is described below

commit c15cdbd6f4c2cd9b5658eb78ccb72acb7ec6ac03
Author: Claus Ibsen 
AuthorDate: Fri Feb 23 20:00:40 2024 +0100

Add cloud event 1.0.2 spec
---
 .../apache/camel/component/knative/knative.json|  4 +--
 .../component/knative/KnativeConfiguration.java|  2 +-
 .../component/knative/ce/CloudEventProcessors.java | 29 +-
 .../component/knative/http/KnativeHttpTest.java|  3 ++-
 4 files changed, 33 insertions(+), 5 deletions(-)

diff --git 
a/components/camel-knative/camel-knative-component/src/generated/resources/org/apache/camel/component/knative/knative.json
 
b/components/camel-knative/camel-knative-component/src/generated/resources/org/apache/camel/component/knative/knative.json
index 6b5b5ed1cc7..2f6c7f376b2 100644
--- 
a/components/camel-knative/camel-knative-component/src/generated/resources/org/apache/camel/component/knative/knative.json
+++ 
b/components/camel-knative/camel-knative-component/src/generated/resources/org/apache/camel/component/knative/knative.json
@@ -24,7 +24,7 @@
   },
   "componentProperties": {
 "ceOverride": { "index": 0, "kind": "property", "displayName": "Ce 
Override", "group": "common", "label": "", "required": false, "type": "object", 
"javaType": "java.util.Map", "prefix": 
"ce.override.", "deprecated": false, "autowired": false, "secret": false, 
"configurationClass": 
"org.apache.camel.component.knative.KnativeConfiguration", 
"configurationField": "configuration", "description": "CloudEvent headers to 
override" },
-"cloudEventsSpecVersion": { "index": 1, "kind": "property", "displayName": 
"Cloud Events Spec Version", "group": "common", "label": "", "required": false, 
"type": "string", "javaType": "java.lang.String", "enum": [ "1.0", "1.0.1" ], 
"deprecated": false, "autowired": false, "secret": false, "defaultValue": 
"1.0", "configurationClass": 
"org.apache.camel.component.knative.KnativeConfiguration", 
"configurationField": "configuration", "description": "Set the version of the 
cloudevents spec." },
+"cloudEventsSpecVersion": { "index": 1, "kind": "property", "displayName": 
"Cloud Events Spec Version", "group": "common", "label": "", "required": false, 
"type": "string", "javaType": "java.lang.String", "enum": [ "1.0", "1.0.1", 
"1.0.2" ], "deprecated": false, "autowired": false, "secret": false, 
"defaultValue": "1.0", "configurationClass": 
"org.apache.camel.component.knative.KnativeConfiguration", 
"configurationField": "configuration", "description": "Set the version of the 
cloude [...]
 "cloudEventsType": { "index": 2, "kind": "property", "displayName": "Cloud 
Events Type", "group": "common", "label": "", "required": false, "type": 
"string", "javaType": "java.lang.String", "deprecated": false, "autowired": 
false, "secret": false, "defaultValue": "org.apache.camel.event", 
"configurationClass": 
"org.apache.camel.component.knative.KnativeConfiguration", 
"configurationField": "configuration", "description": "Set the event-type 
information of the produced events." },
 "configuration": { "index": 3, "kind": "property", "displayName": 
"Configuration", "group": "common", "label": "", "required": false, "type": 
"object", "javaType": 
"org.apache.camel.component.knative.KnativeConfiguration", "deprecated": false, 
"autowired": false, "secret": false, "description": "Set the configuration." },
 "consumerFactory": { "index": 4, "kind": "property", "displayName": 
"Consumer Factory", "group": "common", "label": "", "required": false, "type": 
"object", "javaType": 
"org.apache.camel.component.knative.spi.KnativeConsumerFactory", "deprecated": 
false, "autowired": false, "secret": false, "description": "The protocol 
consumer factory." },
@@ -50,7 +50,7 @@
 "type": { "index": 0, "kind": "path", "displayName": "Type", "group": 
"common", "label": "", "required": false, "type": "object", "javaType": 
"org.apache.camel.component.knative.spi.Knative.Type", "enum": [ "endpoint", 
"channel", "event" ], "deprecated": false, "autowired": false, "secret": false, 
"description": "The Knative resource type" },
 "typeId": { "index": 1, "kind": "path", "displayName": "Type Id", "group": 
"common", "label": "", "required": false, "type": "string", "javaType": 
"java.lang.String", "deprecated": false, "autowired": false, "secret": false, 
"description": "The identifier of the Knative resource" },
 "ceOverride": { "index": 2, "kind": "parameter", "displayName": "Ce 
Override", "group": "common", "label": "", "required": false, "type": "object", 
"javaType": "java.util.Map", "prefix": 
"ce.override.", "deprecated": false, "autowired": false, "secret": false, 
"configurationClass": 

(camel-karavan) branch main updated (e4df9c8d -> c4989eef)

2024-02-23 Thread marat
This is an automated email from the ASF dual-hosted git repository.

marat pushed a change to branch main
in repository https://gitbox.apache.org/repos/asf/camel-karavan.git


from e4df9c8d Cleanup
 new 64b2de59 Cleanup
 new c4989eef Cleanup

The 2 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 .github/workflows/app-oidc.yml   |  2 +-
 .github/workflows/app.yml|  2 +-
 .github/workflows/docker-devmode.yml |  2 +-
 karavan-app/src/main/webui/package-lock.json | 28 ++--
 karavan-app/src/main/webui/package.json  |  2 +-
 5 files changed, 30 insertions(+), 6 deletions(-)



(camel-karavan) 02/02: Cleanup

2024-02-23 Thread marat
This is an automated email from the ASF dual-hosted git repository.

marat pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-karavan.git

commit c4989eef25d25da03fa6bf6a5fd43fac4ecb6a1c
Author: Marat Gubaidullin 
AuthorDate: Fri Feb 23 11:42:55 2024 -0500

Cleanup
---
 karavan-app/src/main/webui/package-lock.json | 28 ++--
 karavan-app/src/main/webui/package.json  |  2 +-
 2 files changed, 27 insertions(+), 3 deletions(-)

diff --git a/karavan-app/src/main/webui/package-lock.json 
b/karavan-app/src/main/webui/package-lock.json
index 9645dc74..504f6010 100644
--- a/karavan-app/src/main/webui/package-lock.json
+++ b/karavan-app/src/main/webui/package-lock.json
@@ -26,7 +26,7 @@
 "buffer": "6.0.3",
 "file-saver": "2.0.5",
 "html-to-image": "1.11.11",
-"karavan-core": "file:../../../../../karavan-core",
+"karavan-core": "file:../../../../karavan-core",
 "keycloak-js": "23.0.6",
 "react": "18.2.0",
 "react-dom": "18.2.0",
@@ -53,6 +53,30 @@
   }
 },
 "../../../../../karavan-core": {
+  "version": "4.4.0",
+  "extraneous": true,
+  "license": "Apache-2.0",
+  "dependencies": {
+"@types/js-yaml": "^4.0.7",
+"@types/uuid": "^9.0.5",
+"tsconfig-paths": "^4.2.0",
+"typescript": "^5.1",
+"uuid": "9.0.1"
+  },
+  "devDependencies": {
+"@types/chai": "^4.3.0",
+"@types/dagre": "^0.7.47",
+"@types/mocha": "^9.1.0",
+"@types/node": "^18.11.18",
+"chai": "^4.3.4",
+"cross-env": "^7.0.3",
+"fs": "^0.0.1-security",
+"mocha": "^10.2.0",
+"ts-node": "^10.9.1",
+"tsc-alias": "^1.8.7"
+  }
+},
+"../../../../karavan-core": {
   "version": "4.4.0",
   "license": "Apache-2.0",
   "dependencies": {
@@ -14128,7 +14152,7 @@
   }
 },
 "node_modules/karavan-core": {
-  "resolved": "../../../../../karavan-core",
+  "resolved": "../../../../karavan-core",
   "link": true
 },
 "node_modules/keycloak-js": {
diff --git a/karavan-app/src/main/webui/package.json 
b/karavan-app/src/main/webui/package.json
index 8d195436..e0297ec5 100644
--- a/karavan-app/src/main/webui/package.json
+++ b/karavan-app/src/main/webui/package.json
@@ -47,7 +47,7 @@
 "buffer": "6.0.3",
 "file-saver": "2.0.5",
 "html-to-image": "1.11.11",
-"karavan-core": "file:../../../../../karavan-core",
+"karavan-core": "file:../../../../karavan-core",
 "keycloak-js": "23.0.6",
 "react": "18.2.0",
 "react-dom": "18.2.0",



(camel-karavan) 01/02: Cleanup

2024-02-23 Thread marat
This is an automated email from the ASF dual-hosted git repository.

marat pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-karavan.git

commit 64b2de5999da25fa69249dc213d4bee64a9030fc
Author: Marat Gubaidullin 
AuthorDate: Fri Feb 23 11:40:04 2024 -0500

Cleanup
---
 .github/workflows/app-oidc.yml   | 2 +-
 .github/workflows/app.yml| 2 +-
 .github/workflows/docker-devmode.yml | 2 +-
 3 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/.github/workflows/app-oidc.yml b/.github/workflows/app-oidc.yml
index d6951bfd..1fe36e72 100644
--- a/.github/workflows/app-oidc.yml
+++ b/.github/workflows/app-oidc.yml
@@ -1,4 +1,4 @@
-name: Web application 
+name: Application OIDC
 
 on:
   push:
diff --git a/.github/workflows/app.yml b/.github/workflows/app.yml
index b38ff839..138b6ca8 100644
--- a/.github/workflows/app.yml
+++ b/.github/workflows/app.yml
@@ -1,4 +1,4 @@
-name: Web application 
+name: Application 
 
 on:
   push:
diff --git a/.github/workflows/docker-devmode.yml 
b/.github/workflows/docker-devmode.yml
index dcb49edc..7f901adc 100644
--- a/.github/workflows/docker-devmode.yml
+++ b/.github/workflows/docker-devmode.yml
@@ -1,4 +1,4 @@
-name: DevMode container image
+name: DevMode container
 
 on:
   push:



(camel-karavan) branch main updated: Cleanup

2024-02-23 Thread marat
This is an automated email from the ASF dual-hosted git repository.

marat pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-karavan.git


The following commit(s) were added to refs/heads/main by this push:
 new e4df9c8d Cleanup
e4df9c8d is described below

commit e4df9c8d6c3fd4ecc032d8cf127da3932de6bc85
Author: Marat Gubaidullin 
AuthorDate: Fri Feb 23 11:39:12 2024 -0500

Cleanup
---
 .github/workflows/app-oidc.yml | 8 
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/.github/workflows/app-oidc.yml b/.github/workflows/app-oidc.yml
index 5cbcc6b1..d6951bfd 100644
--- a/.github/workflows/app-oidc.yml
+++ b/.github/workflows/app-oidc.yml
@@ -17,18 +17,18 @@ jobs:
 runs-on: ubuntu-latest
 steps:
   - name: Checkout Karavan
-uses: actions/checkout@v43
+uses: actions/checkout@v4
 with:
   path: karavan
 
   - name: Set up JDK 17
-uses: actions/setup-java@v43
+uses: actions/setup-java@v4
 with:
   distribution: adopt
   java-version: 17
 
   - name: Cache local Maven repository
-uses: actions/cache@v43
+uses: actions/cache@v4
 with:
   path: |
 ~/.m2/repository
@@ -44,7 +44,7 @@ jobs:
 
   #  Building Karavan Core
   - name: Set up Node
-uses: actions/setup-node@v43
+uses: actions/setup-node@v4
 with:
   node-version: '18.14.2'
 



(camel-karavan) branch main updated: Cleanup

2024-02-23 Thread marat
This is an automated email from the ASF dual-hosted git repository.

marat pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-karavan.git


The following commit(s) were added to refs/heads/main by this push:
 new 8732f101 Cleanup
8732f101 is described below

commit 8732f101769aefcc8349e792dd511d3b84bd5c79
Author: Marat Gubaidullin 
AuthorDate: Fri Feb 23 11:38:29 2024 -0500

Cleanup
---
 .github/workflows/app-oidc.yml  | 8 
 .github/workflows/app.yml   | 8 
 .github/workflows/vscode.yml| 8 
 karavan-app/src/main/webui/package.json | 6 +++---
 4 files changed, 15 insertions(+), 15 deletions(-)

diff --git a/.github/workflows/app-oidc.yml b/.github/workflows/app-oidc.yml
index 1cd31c51..5cbcc6b1 100644
--- a/.github/workflows/app-oidc.yml
+++ b/.github/workflows/app-oidc.yml
@@ -17,18 +17,18 @@ jobs:
 runs-on: ubuntu-latest
 steps:
   - name: Checkout Karavan
-uses: actions/checkout@v3
+uses: actions/checkout@v43
 with:
   path: karavan
 
   - name: Set up JDK 17
-uses: actions/setup-java@v3
+uses: actions/setup-java@v43
 with:
   distribution: adopt
   java-version: 17
 
   - name: Cache local Maven repository
-uses: actions/cache@v3
+uses: actions/cache@v43
 with:
   path: |
 ~/.m2/repository
@@ -44,7 +44,7 @@ jobs:
 
   #  Building Karavan Core
   - name: Set up Node
-uses: actions/setup-node@v3
+uses: actions/setup-node@v43
 with:
   node-version: '18.14.2'
 
diff --git a/.github/workflows/app.yml b/.github/workflows/app.yml
index 3e8f97a7..b38ff839 100644
--- a/.github/workflows/app.yml
+++ b/.github/workflows/app.yml
@@ -17,18 +17,18 @@ jobs:
 runs-on: ubuntu-latest
 steps:
   - name: Checkout Karavan
-uses: actions/checkout@v3
+uses: actions/checkout@v4
 with:
   path: karavan
 
   - name: Set up JDK 17
-uses: actions/setup-java@v3
+uses: actions/setup-java@v4
 with:
   distribution: adopt
   java-version: 17
 
   - name: Cache local Maven repository
-uses: actions/cache@v3
+uses: actions/cache@v4
 with:
   path: |
 ~/.m2/repository
@@ -44,7 +44,7 @@ jobs:
 
   #  Building Karavan Core
   - name: Set up Node
-uses: actions/setup-node@v3
+uses: actions/setup-node@v4
 with:
   node-version: '18.14.2'
 
diff --git a/.github/workflows/vscode.yml b/.github/workflows/vscode.yml
index 9fc46d27..60364717 100644
--- a/.github/workflows/vscode.yml
+++ b/.github/workflows/vscode.yml
@@ -15,17 +15,17 @@ jobs:
 
 steps:
   - name: Checkout
-uses: actions/checkout@v3
+uses: actions/checkout@v4
 
   #  Generate Karavan UI model and API, Kamelets and Components
   - name: Set up JDK 17
-uses: actions/setup-java@v3
+uses: actions/setup-java@v4
 with:
   distribution: adopt
   java-version: 17
 
   - name: Cache local Maven repository
-uses: actions/cache@v3
+uses: actions/cache@v4
 with:
   path: |
 ~/.m2/repository
@@ -40,7 +40,7 @@ jobs:
 
   #  Building Karavan Core
   - name: Set up Node
-uses: actions/setup-node@v3
+uses: actions/setup-node@v4
 with:
   node-version: '20'
 
diff --git a/karavan-app/src/main/webui/package.json 
b/karavan-app/src/main/webui/package.json
index 88796fd4..8d195436 100644
--- a/karavan-app/src/main/webui/package.json
+++ b/karavan-app/src/main/webui/package.json
@@ -3,9 +3,9 @@
   "version": "4.4.0",
   "private": true,
   "scripts": {
-"copy-designer": "cp -r ../../../../../karavan-designer/src/designer src",
-"copy-knowledgebase": "cp -r 
../../../../../karavan-designer/src/knowledgebase src",
-"copy-topology": "cp -r ../../../../../karavan-designer/src/topology src",
+"copy-designer": "cp -r ../../../../karavan-designer/src/designer src",
+"copy-knowledgebase": "cp -r 
../../../../karavan-designer/src/knowledgebase src",
+"copy-topology": "cp -r ../../../../karavan-designer/src/topology src",
 "copy-code": " npm run copy-designer &&  npm run copy-knowledgebase &&  
npm run copy-topology",
 "start": "export PORT=3003 && npm run copy-code && react-scripts start",
 "build": "npm run copy-code && DISABLE_ESLINT_PLUGIN=true react-scripts 
build"



(camel-karavan) branch main updated: Cleanup

2024-02-23 Thread marat
This is an automated email from the ASF dual-hosted git repository.

marat pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-karavan.git


The following commit(s) were added to refs/heads/main by this push:
 new 1c8c1243 Cleanup
1c8c1243 is described below

commit 1c8c1243fce8b81a0c5202bb65d60eff58ed85e0
Author: Marat Gubaidullin 
AuthorDate: Fri Feb 23 11:32:00 2024 -0500

Cleanup
---
 .github/workflows/installer.yml | 50 -
 1 file changed, 50 deletions(-)

diff --git a/.github/workflows/installer.yml b/.github/workflows/installer.yml
deleted file mode 100644
index 7bd9b373..
--- a/.github/workflows/installer.yml
+++ /dev/null
@@ -1,50 +0,0 @@
-name: Installer
-
-on:
-  push:
-branches: [ main ]
-paths: ['karavan-web/karavan-installer/**', 
'.github/workflows/installer.yml']
-  workflow_dispatch:
-  pull_request:
-branches: [ main ]
-
-env:
-  TAG: 4.4.0
-
-jobs:
-  build:
-runs-on: ubuntu-latest
-steps:
-  - name: Checkout Karavan
-uses: actions/checkout@v3
-with:
-  path: karavan
-
-  - name: Set up JDK 17
-uses: actions/setup-java@v3
-with:
-  distribution: adopt
-  java-version: 17
-
-  - name: Cache local Maven repository
-uses: actions/cache@v3
-with:
-  path: |
-~/.m2/repository
-!~/.m2/repository/org/apache/camel/karavan
-  key: ${{ runner.os }}-maven-${{ hashFiles('**/pom.xml') }}
-  restore-keys: ${{ runner.os }}-maven-
-  
-  #  Build Karavan installer
-  - name: Build Karavan installer
-working-directory: ./karavan/karavan-web/karavan-installer
-run: |
-  mvn package
-if: ${{ github.ref == 'refs/heads/main' }}
-
-  - name: Karavan installer (upload)
-uses: actions/upload-artifact@v3
-with:
-  name: karavan-installer.jar
-  path: 
./karavan/karavan-web/karavan-installer/target/karavan-installer-${{ env.TAG 
}}.jar
-if: ${{ github.ref == 'refs/heads/main' }}
\ No newline at end of file



(camel-karavan) 03/09: gitignore

2024-02-23 Thread marat
This is an automated email from the ASF dual-hosted git repository.

marat pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-karavan.git

commit c99e2fcce22ed9b3152e59b2f016eb52262a941e
Author: Marat Gubaidullin 
AuthorDate: Thu Feb 22 22:45:55 2024 -0500

gitignore
---
 .gitignore | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/.gitignore b/.gitignore
index e73e69cf..6c8cde15 100644
--- a/.gitignore
+++ b/.gitignore
@@ -37,6 +37,7 @@ yarn-error.log*
 
 # OSX
 .DS_Store
+*__MACOSX/
 
 # Vim
 *.swp
@@ -74,4 +75,6 @@ yarn-error.log*
 
 karavan-cloud/karavan-secret-real.yaml
 
+install/karavan-docker/data/*
+
 **/dependency-reduced-pom.xml
\ No newline at end of file



(camel-karavan) 04/09: Docker compose

2024-02-23 Thread marat
This is an automated email from the ASF dual-hosted git repository.

marat pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-karavan.git

commit 5d97f3fe5aefdfecc771d228a6b8e21f49e9d440
Author: Marat Gubaidullin 
AuthorDate: Fri Feb 23 09:28:03 2024 -0500

Docker compose
---
 ...ocker-compose.yaml => docker-compose-gitea.yaml} |  1 +
 install/karavan-docker/docker-compose.yaml  | 21 -
 .../src/main/resources/services/internal.yaml   | 15 ---
 3 files changed, 5 insertions(+), 32 deletions(-)

diff --git a/install/karavan-docker/docker-compose.yaml 
b/install/karavan-docker/docker-compose-gitea.yaml
similarity index 95%
copy from install/karavan-docker/docker-compose.yaml
copy to install/karavan-docker/docker-compose-gitea.yaml
index db64844b..96c4d812 100644
--- a/install/karavan-docker/docker-compose.yaml
+++ b/install/karavan-docker/docker-compose-gitea.yaml
@@ -16,6 +16,7 @@ services:
   - KARAVAN_IMAGE_REGISTRY_USERNAME=
   - KARAVAN_IMAGE_REGISTRY_PASSWORD=
   - KARAVAN_IMAGE_GROUP=karavan
+  - KARAVAN_DOCKER_NETWORK=karavan
 volumes:
   - "/var/run/docker.sock:/var/run/docker.sock"
 labels:
diff --git a/install/karavan-docker/docker-compose.yaml 
b/install/karavan-docker/docker-compose.yaml
index db64844b..ca7814df 100644
--- a/install/karavan-docker/docker-compose.yaml
+++ b/install/karavan-docker/docker-compose.yaml
@@ -8,14 +8,15 @@ services:
 ports:
   - "8080:8080"
 environment:
-  - KARAVAN_GIT_REPOSITORY=http://gitea:3000/karavan/karavan.git
-  - KARAVAN_GIT_USERNAME=karavan
-  - KARAVAN_GIT_PASSWORD=karavan
+  - KARAVAN_GIT_REPOSITORY=${KARAVAN_GIT_REPOSITORY}
+  - KARAVAN_GIT_USERNAME=${KARAVAN_GIT_USERNAME}
+  - KARAVAN_GIT_PASSWORD=${KARAVAN_GIT_PASSWORD}
   - KARAVAN_GIT_BRANCH=main
   - KARAVAN_IMAGE_REGISTRY=registry:5000
   - KARAVAN_IMAGE_REGISTRY_USERNAME=
   - KARAVAN_IMAGE_REGISTRY_PASSWORD=
   - KARAVAN_IMAGE_GROUP=karavan
+  - KARAVAN_DOCKER_NETWORK=karavan
 volumes:
   - "/var/run/docker.sock:/var/run/docker.sock"
 labels:
@@ -23,20 +24,6 @@ services:
 networks:
   - karavan
 
-  gitea:
-container_name: gitea
-image: gitea/gitea:1.21.6-rootless
-restart: always
-ports:
-  - "3000:3000"
-volumes:
-  - ./data:/var/lib/gitea
-  - ./config:/etc/gitea
-labels:
-  - "org.apache.camel.karavan/type=internal"  
-networks:
-  - karavan
-
   registry:
 container_name: registry
 image: registry:2
diff --git a/karavan-web/karavan-app/src/main/resources/services/internal.yaml 
b/karavan-web/karavan-app/src/main/resources/services/internal.yaml
deleted file mode 100644
index 9f01ef32..
--- a/karavan-web/karavan-app/src/main/resources/services/internal.yaml
+++ /dev/null
@@ -1,15 +0,0 @@
-version: '3.8'
-
-services:
-
-  gitea:
-image: gitea/gitea:1.20.2-rootless
-restart: always
-ports:
-  - "3000:3000"
-
-  registry:
-image: registry:2
-restart: always
-ports:
-  - ":5000"
\ No newline at end of file



(camel-karavan) 09/09: Cleanup

2024-02-23 Thread marat
This is an automated email from the ASF dual-hosted git repository.

marat pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-karavan.git

commit ea49b0d21e2cbb5041189bb2cea8b649c0e07afd
Author: Marat Gubaidullin 
AuthorDate: Fri Feb 23 11:29:42 2024 -0500

Cleanup
---
 .gitignore | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/.gitignore b/.gitignore
index 6c8cde15..f0269644 100644
--- a/.gitignore
+++ b/.gitignore
@@ -75,6 +75,6 @@ yarn-error.log*
 
 karavan-cloud/karavan-secret-real.yaml
 
-install/karavan-docker/data/*
+docs/install/karavan-docker/data/*
 
 **/dependency-reduced-pom.xml
\ No newline at end of file



(camel-karavan) 05/09: Redesign

2024-02-23 Thread marat
This is an automated email from the ASF dual-hosted git repository.

marat pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-karavan.git

commit ca05abcd671e849f618d0dc5e7d9d82ef0b8003e
Author: Marat Gubaidullin 
AuthorDate: Fri Feb 23 09:55:41 2024 -0500

Redesign
---
 .../org/apache/camel/karavan/api/AuthResource.java |   2 +-
 .../apache/camel/karavan/api/BuildResource.java|   2 +-
 .../camel/karavan/api/ContainerResource.java   |   2 +-
 .../apache/camel/karavan/api/DevModeResource.java  |   2 +-
 .../apache/camel/karavan/api/ImagesResource.java   |   4 +-
 .../camel/karavan/api/InfrastructureResource.java  |   2 +-
 .../apache/camel/karavan/api/KameletResources.java |   2 +-
 .../camel/karavan/api/ProjectFileResource.java |   2 +-
 .../apache/camel/karavan/api/ProjectResource.java  |   4 +-
 .../apache/camel/karavan/api/StatusResource.java   |   2 +-
 .../org/apache/camel/karavan/code/CodeService.java |  11 +-
 .../camel/karavan/docker/DockerEventListener.java  |   2 +-
 .../camel/karavan/docker/DockerForGitea.java   |  75 --
 .../camel/karavan/docker/DockerForRegistry.java|  49 --
 .../org/apache/camel/karavan/git/GiteaService.java | 166 -
 .../karavan/kubernetes/DeploymentEventHandler.java |   2 +-
 .../karavan/kubernetes/KubernetesService.java  |   2 +-
 .../camel/karavan/kubernetes/PodEventHandler.java  |   2 +-
 .../karavan/kubernetes/ServiceEventHandler.java|   2 +-
 .../camel/karavan/{git => }/model/GitConfig.java   |   2 +-
 .../camel/karavan/{git => }/model/GitRepo.java |   2 +-
 .../camel/karavan/{git => }/model/GitRepoFile.java |   2 +-
 .../{registry => model}/RegistryConfig.java|   2 +-
 .../apache/camel/karavan/service/CamelService.java |   1 -
 .../karavan/service/ContainerStatusService.java|   1 -
 .../camel/karavan/{git => service}/GitService.java |  38 +
 .../{cache => service}/KaravanCacheService.java|   2 +-
 .../camel/karavan/service/KaravanService.java  |  33 
 .../camel/karavan/service/ProjectService.java  |   9 +-
 .../{registry => service}/RegistryService.java |   6 +-
 .../project/ProjectFileCreateValidator.java|   2 +-
 .../validation/project/ProjectModifyValidator.java |   2 +-
 .../src/main/resources/application.properties  |  20 +--
 33 files changed, 37 insertions(+), 420 deletions(-)

diff --git 
a/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/api/AuthResource.java
 
b/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/api/AuthResource.java
index fa44e8eb..00751702 100644
--- 
a/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/api/AuthResource.java
+++ 
b/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/api/AuthResource.java
@@ -22,7 +22,7 @@ import jakarta.ws.rs.Path;
 import jakarta.ws.rs.Produces;
 import jakarta.ws.rs.core.MediaType;
 import jakarta.ws.rs.core.Response;
-import org.apache.camel.karavan.cache.KaravanCacheService;
+import org.apache.camel.karavan.service.KaravanCacheService;
 import org.apache.camel.karavan.kubernetes.KubernetesService;
 import org.apache.camel.karavan.service.AuthService;
 import org.apache.camel.karavan.service.ProjectService;
diff --git 
a/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/api/BuildResource.java
 
b/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/api/BuildResource.java
index 17ce3ad9..7dd5fbda 100644
--- 
a/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/api/BuildResource.java
+++ 
b/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/api/BuildResource.java
@@ -23,7 +23,7 @@ import jakarta.ws.rs.Path;
 import jakarta.ws.rs.Produces;
 import jakarta.ws.rs.core.MediaType;
 import jakarta.ws.rs.core.Response;
-import org.apache.camel.karavan.cache.KaravanCacheService;
+import org.apache.camel.karavan.service.KaravanCacheService;
 import org.apache.camel.karavan.code.CodeService;
 import org.apache.camel.karavan.kubernetes.KubernetesService;
 
diff --git 
a/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/api/ContainerResource.java
 
b/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/api/ContainerResource.java
index 5b7e8b3a..a5450dc2 100644
--- 
a/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/api/ContainerResource.java
+++ 
b/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/api/ContainerResource.java
@@ -24,7 +24,7 @@ import jakarta.inject.Inject;
 import jakarta.ws.rs.*;
 import jakarta.ws.rs.core.MediaType;
 import jakarta.ws.rs.core.Response;
-import org.apache.camel.karavan.cache.KaravanCacheService;
+import org.apache.camel.karavan.service.KaravanCacheService;
 import org.apache.camel.karavan.model.ContainerStatus;
 import org.apache.camel.karavan.code.DockerComposeConverter;
 import org.apache.camel.karavan.model.DockerComposeService;
diff --git 

(camel-karavan) 08/09: Cleanup

2024-02-23 Thread marat
This is an automated email from the ASF dual-hosted git repository.

marat pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-karavan.git

commit f376a9e3aa783f15da79bfaeac011eac5c1c337b
Author: Marat Gubaidullin 
AuthorDate: Fri Feb 23 11:29:16 2024 -0500

Cleanup
---
 docs/install/karavan-docker/data/data/gitea.db | Bin 2011136 -> 0 bytes
 .../data/data/sessions/8/4/840f7d50db7755d3| Bin 108 -> 0 bytes
 docs/install/karavan-docker/data/git/.ash_history  |   7 -
 .../data/git/repositories/karavan/karavan.git/HEAD |   1 -
 .../git/repositories/karavan/karavan.git/config|   5 -
 .../repositories/karavan/karavan.git/description   |   1 -
 .../karavan.git/hooks/applypatch-msg.sample|  15 --
 .../karavan/karavan.git/hooks/commit-msg.sample|  24 ---
 .../karavan/karavan.git/hooks/post-receive |  16 --
 .../karavan/karavan.git/hooks/post-receive.d/gitea |   3 -
 .../karavan/karavan.git/hooks/post-update.sample   |   8 -
 .../karavan.git/hooks/pre-applypatch.sample|  14 --
 .../karavan/karavan.git/hooks/pre-commit.sample|  49 --
 .../karavan.git/hooks/pre-merge-commit.sample  |  13 --
 .../karavan/karavan.git/hooks/pre-push.sample  |  53 ---
 .../karavan/karavan.git/hooks/pre-rebase.sample| 169 -
 .../karavan/karavan.git/hooks/pre-receive  |  16 --
 .../karavan/karavan.git/hooks/pre-receive.d/gitea  |   3 -
 .../karavan/karavan.git/hooks/pre-receive.sample   |  24 ---
 .../karavan.git/hooks/prepare-commit-msg.sample|  42 -
 .../karavan/karavan.git/hooks/proc-receive |   3 -
 .../karavan/karavan.git/hooks/proc-receive.d/gitea |   0
 .../karavan.git/hooks/push-to-checkout.sample  |  78 --
 .../repositories/karavan/karavan.git/hooks/update  |  15 --
 .../karavan/karavan.git/hooks/update.d/gitea   |   3 -
 .../karavan/karavan.git/hooks/update.sample| 128 
 .../repositories/karavan/karavan.git/info/exclude  |   6 -
 .../git/repositories/karavan/karavan.git/info/refs |   2 -
 .../git/repositories/karavan/karavan.git/logs/HEAD |   2 -
 .../karavan/karavan.git/logs/refs/heads/main   |   3 -
 .../karavan/karavan.git/logs/refs/heads/master |   1 -
 .../44/826627f477d558695fd21993d364d36a5baf8e  |   1 -
 .../4d/c56864bae9e452a250d75feb016733d09ea202  | Bin 176 -> 0 bytes
 .../51/3d1c7a4e4ec7418219a6f6a996a1dd50d215e0  |   1 -
 .../53/f60eac786573f36f937e92590fbeaa5ec352c5  | Bin 82 -> 0 bytes
 .../5d/93737949f3bf7448b9bff1ea1a6857719dfd7e  |   2 -
 .../5f/fc8af4a5bce3a5d1bb10922825d1ab17cb248c  |   1 -
 .../72/0c5f7aa181cf9cea23da548fbb021f38d9fbaf  | Bin 142 -> 0 bytes
 .../80/825cb6e07f54443b341ed9d39784cd876ffa1c  | Bin 50 -> 0 bytes
 .../83/2343a9e507c6fd57f16d8791fb20e9acc46dbd  |   5 -
 .../99/9ce6b4f4cb2946870b45fdb306d8ac959c61af  | Bin 98 -> 0 bytes
 .../a1/92ec1ddb71a9da1131292f4f2645e0ea41e221  | Bin 61 -> 0 bytes
 .../a5/e29f22a7f42f1e054fc9380d6a6063fc8be52d  |   2 -
 .../b2/e8bc617d3c37efc3dc96230743b93289cd9664  | Bin 250 -> 0 bytes
 .../b5/8ab73999afe74516d77bad5862d71b9dea34ea  |   2 -
 .../bb/fffbb02c86388164755e548c7c84edd1f7a24b  | Bin 543 -> 0 bytes
 .../c6/8f4b7a3e8685a07f772def18929fb51e15dc38  | Bin 111 -> 0 bytes
 .../cb/50014baed1b4e4ee52e3015c6d998a8f3274d3  | Bin 446 -> 0 bytes
 .../d9/e2f98208630a987d87699ab91a1e12b7a6b70c  | Bin 612 -> 0 bytes
 .../e3/640c5fd355a8b8f02c74568c8c61f8d6d96ba1  |   1 -
 .../e5/100668f68a70d11d77595d14f2d9a840887ece  | Bin 146 -> 0 bytes
 .../e6/9de29bb2d1d6434b8b29ae775ad8c2e48c5391  | Bin 15 -> 0 bytes
 .../ee/05cbffa4bf921604993d10f00af6db466791f1  |   3 -
 .../ee/ef3a7abbc3e07d43d5959d55a75e1712d09344  |   2 -
 .../f5/03fd174754be16f5d3e400bf72c021a051bd87  | Bin 617 -> 0 bytes
 .../f8/4f7799dbee242a0334389d8f49094cce02c21b  | Bin 495 -> 0 bytes
 .../fa/c0a07e79fb57ae79082b13c5c95933669d5548  |   1 -
 .../fb/b3f1d36c81acb2c989d2eda61d70f678d010d9  | Bin 51 -> 0 bytes
 .../karavan/karavan.git/objects/info/packs |   1 -
 .../karavan/karavan.git/refs/heads/main|   1 -
 .../karavan/karavan.git/refs/heads/master  |   1 -
 docs/install/karavan-docker/data/home/.gitconfig   |  22 ---
 .../data/indexers/issues.bleve/index_meta.json |   1 -
 .../data/indexers/issues.bleve/rupture_meta.json   |   1 -
 .../data/indexers/issues.bleve/store/root.bolt | Bin 65536 -> 0 bytes
 docs/install/karavan-docker/data/jwt/private.pem   |  52 ---
 .../karavan-docker/data/queues/common/10.ldb   | Bin 519 -> 0 bytes
 .../karavan-docker/data/queues/common/11.log   | Bin 1520 -> 0 bytes
 .../karavan-docker/data/queues/common/CURRENT  |   1 -
 .../install/karavan-docker/data/queues/common/LOCK |   0
 docs/install/karavan-docker/data/queues/common/LOG |  50 --
 .../data/queues/common/MANIFEST-12 | Bin 151 -> 0 bytes
 

(camel-karavan) 06/09: Docker compose

2024-02-23 Thread marat
This is an automated email from the ASF dual-hosted git repository.

marat pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-karavan.git

commit 00023abfe7f456604942e30ada9f5d829b9c4812
Author: Marat Gubaidullin 
AuthorDate: Fri Feb 23 09:56:02 2024 -0500

Docker compose
---
 install/karavan-docker/docker-compose-gitea.yaml | 17 -
 1 file changed, 16 insertions(+), 1 deletion(-)

diff --git a/install/karavan-docker/docker-compose-gitea.yaml 
b/install/karavan-docker/docker-compose-gitea.yaml
index 96c4d812..2b330438 100644
--- a/install/karavan-docker/docker-compose-gitea.yaml
+++ b/install/karavan-docker/docker-compose-gitea.yaml
@@ -4,7 +4,7 @@ services:
 
   karavan:
 container_name: karavan
-image: ghcr.io/apache/camel-karavan:4.4.0
+image: marat/karavan:4.4.0
 ports:
   - "8080:8080"
 environment:
@@ -21,6 +21,15 @@ services:
   - "/var/run/docker.sock:/var/run/docker.sock"
 labels:
   - "org.apache.camel.karavan/type=internal"
+depends_on:
+  gitea:
+condition: service_healthy
+restart: true
+restart_policy:
+condition: on-failure
+delay: 3s
+max_attempts: 5
+window: 60s
 networks:
   - karavan
 
@@ -33,6 +42,12 @@ services:
 volumes:
   - ./data:/var/lib/gitea
   - ./config:/etc/gitea
+healthcheck:
+  test: ["CMD", "curl", "-f", "http://localhost:3000/api/healthz;]
+  interval: 1m
+  timeout: 10s
+  retries: 3
+  start_period: 10s  
 labels:
   - "org.apache.camel.karavan/type=internal"  
 networks:



(camel-karavan) 02/09: Docke compose

2024-02-23 Thread marat
This is an automated email from the ASF dual-hosted git repository.

marat pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-karavan.git

commit 18906112558e616839a13331081d653ca5d4eb0b
Author: Marat Gubaidullin 
AuthorDate: Thu Feb 22 22:44:29 2024 -0500

Docke compose
---
 install/karavan-docker/config/app.ini  |  98 +
 install/karavan-docker/data.zip| Bin 0 -> 73304 bytes
 install/karavan-docker/docker-compose.yaml |  54 
 .../camel/karavan/registry/RegistryService.java|   2 +-
 4 files changed, 153 insertions(+), 1 deletion(-)

diff --git a/install/karavan-docker/config/app.ini 
b/install/karavan-docker/config/app.ini
new file mode 100644
index ..5d85a4c9
--- /dev/null
+++ b/install/karavan-docker/config/app.ini
@@ -0,0 +1,98 @@
+APP_NAME = Gitea: Git with a cup of tea
+RUN_USER = git
+RUN_MODE = prod
+WORK_PATH = /var/lib/gitea
+
+[repository]
+ROOT = /var/lib/gitea/git/repositories
+
+[repository.local]
+LOCAL_COPY_PATH = /tmp/gitea/local-repo
+
+[repository.upload]
+TEMP_PATH = /tmp/gitea/uploads
+
+[server]
+APP_DATA_PATH = /var/lib/gitea
+SSH_DOMAIN = gitea
+HTTP_PORT = 3000
+ROOT_URL = http://localhost:3000/
+DISABLE_SSH = false
+; In rootless gitea container only internal ssh server is supported
+START_SSH_SERVER = true
+SSH_PORT = 
+SSH_LISTEN_PORT = 
+BUILTIN_SSH_SERVER_USER = git
+LFS_START_SERVER = true
+DOMAIN = localhost
+LFS_JWT_SECRET = cc4pXAedXHJSZ9GvVQoGDP8mL6mkok3qP-XoGKBpg-g
+OFFLINE_MODE = false
+
+[database]
+PATH = /var/lib/gitea/data/gitea.db
+DB_TYPE = sqlite3
+HOST = localhost:3306
+NAME = gitea
+USER = root
+PASSWD = 
+SCHEMA = 
+SSL_MODE = disable
+LOG_SQL = false
+
+[session]
+PROVIDER_CONFIG = /var/lib/gitea/data/sessions
+PROVIDER = file
+
+[picture]
+AVATAR_UPLOAD_PATH = /var/lib/gitea/data/avatars
+REPOSITORY_AVATAR_UPLOAD_PATH = /var/lib/gitea/data/repo-avatars
+
+[attachment]
+PATH = /var/lib/gitea/data/attachments
+
+[log]
+ROOT_PATH = /var/lib/gitea/data/log
+MODE = console
+LEVEL = info
+
+[security]
+INSTALL_LOCK = true
+SECRET_KEY = 
+REVERSE_PROXY_LIMIT = 1
+REVERSE_PROXY_TRUSTED_PROXIES = *
+INTERNAL_TOKEN = 
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYmYiOjE3MDg2NTM3NjB9.c5cId2fvNYfSqFAl4V23C9m4w6Xw89dxkoZp8YBpDh0
+PASSWORD_HASH_ALGO = pbkdf2
+
+[service]
+DISABLE_REGISTRATION = false
+REQUIRE_SIGNIN_VIEW = false
+REGISTER_EMAIL_CONFIRM = false
+ENABLE_NOTIFY_MAIL = false
+ALLOW_ONLY_EXTERNAL_REGISTRATION = false
+ENABLE_CAPTCHA = false
+DEFAULT_KEEP_EMAIL_PRIVATE = false
+DEFAULT_ALLOW_CREATE_ORGANIZATION = true
+DEFAULT_ENABLE_TIMETRACKING = true
+NO_REPLY_ADDRESS = noreply.localhost
+
+[lfs]
+PATH = /var/lib/gitea/git/lfs
+
+[mailer]
+ENABLED = false
+
+[openid]
+ENABLE_OPENID_SIGNIN = true
+ENABLE_OPENID_SIGNUP = true
+
+[cron.update_checker]
+ENABLED = false
+
+[repository.pull-request]
+DEFAULT_MERGE_STYLE = merge
+
+[repository.signing]
+DEFAULT_TRUST_MODEL = committer
+
+[oauth2]
+JWT_SECRET = NydT-c0maoxZfgOHloby9v2liDWM2lSs995O-rI6G2c
diff --git a/install/karavan-docker/data.zip b/install/karavan-docker/data.zip
new file mode 100644
index ..54e6f3f7
Binary files /dev/null and b/install/karavan-docker/data.zip differ
diff --git a/install/karavan-docker/docker-compose.yaml 
b/install/karavan-docker/docker-compose.yaml
new file mode 100644
index ..db64844b
--- /dev/null
+++ b/install/karavan-docker/docker-compose.yaml
@@ -0,0 +1,54 @@
+version: '3.8'
+
+services:
+
+  karavan:
+container_name: karavan
+image: ghcr.io/apache/camel-karavan:4.4.0
+ports:
+  - "8080:8080"
+environment:
+  - KARAVAN_GIT_REPOSITORY=http://gitea:3000/karavan/karavan.git
+  - KARAVAN_GIT_USERNAME=karavan
+  - KARAVAN_GIT_PASSWORD=karavan
+  - KARAVAN_GIT_BRANCH=main
+  - KARAVAN_IMAGE_REGISTRY=registry:5000
+  - KARAVAN_IMAGE_REGISTRY_USERNAME=
+  - KARAVAN_IMAGE_REGISTRY_PASSWORD=
+  - KARAVAN_IMAGE_GROUP=karavan
+volumes:
+  - "/var/run/docker.sock:/var/run/docker.sock"
+labels:
+  - "org.apache.camel.karavan/type=internal"
+networks:
+  - karavan
+
+  gitea:
+container_name: gitea
+image: gitea/gitea:1.21.6-rootless
+restart: always
+ports:
+  - "3000:3000"
+volumes:
+  - ./data:/var/lib/gitea
+  - ./config:/etc/gitea
+labels:
+  - "org.apache.camel.karavan/type=internal"  
+networks:
+  - karavan
+
+  registry:
+container_name: registry
+image: registry:2
+restart: always
+ports:
+  - ":5000"
+labels:
+  - "org.apache.camel.karavan/type=internal"  
+networks:
+  - karavan  
+
+networks:
+  karavan:
+name: karavan
+external: true
\ No newline at end of file
diff --git 
a/karavan-web/karavan-app/src/main/java/org/apache/camel/karavan/registry/RegistryService.java
 

(camel-karavan) 01/09: proeprties for #1135

2024-02-23 Thread marat
This is an automated email from the ASF dual-hosted git repository.

marat pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-karavan.git

commit 5e9cccade08464b3172c58944a22def452818e15
Author: Marat Gubaidullin 
AuthorDate: Thu Feb 22 22:41:31 2024 -0500

proeprties for #1135
---
 .../src/main/resources/snippets/docker-application.properties  | 10 +-
 .../main/resources/snippets/kubernetes-application.properties  | 10 +-
 .../main/resources/snippets/openshift-application.properties   | 10 +-
 3 files changed, 15 insertions(+), 15 deletions(-)

diff --git 
a/karavan-web/karavan-app/src/main/resources/snippets/docker-application.properties
 
b/karavan-web/karavan-app/src/main/resources/snippets/docker-application.properties
index 4b447641..580af06f 100644
--- 
a/karavan-web/karavan-app/src/main/resources/snippets/docker-application.properties
+++ 
b/karavan-web/karavan-app/src/main/resources/snippets/docker-application.properties
@@ -11,11 +11,11 @@ camel.server.healthCheckEnabled=true
 camel.server.devConsoleEnabled=true
 camel.main.tracingStandby=true
 camel.main.autoConfigurationFailFast=false
-camel.main.routeControllerSuperviseEnabled=true
-camel.main.routeControllerBackoffDelay = 5000
-camel.main.routeControllerBackoffMaxAttempts = 100
-camel.main.routeControllerInitialDelay = 1000
-camel.main.routeControllerThreadPoolSize = 3
+camel.routecontroller.superviseEnabled=true
+camel.routecontroller.backoffDelay=5000
+camel.routecontroller.backoffMaxAttempts=100
+camel.routecontroller.initialDelay=1000
+camel.routecontroller.threadPoolSize=3
 camel.context.dev-console=true
 camel.health.enabled=true
 camel.health.exposure-level=full
diff --git 
a/karavan-web/karavan-app/src/main/resources/snippets/kubernetes-application.properties
 
b/karavan-web/karavan-app/src/main/resources/snippets/kubernetes-application.properties
index abda3182..832343a9 100644
--- 
a/karavan-web/karavan-app/src/main/resources/snippets/kubernetes-application.properties
+++ 
b/karavan-web/karavan-app/src/main/resources/snippets/kubernetes-application.properties
@@ -13,11 +13,11 @@ camel.server.healthCheckEnabled=true
 camel.server.devConsoleEnabled=true
 camel.main.tracingStandby=true
 camel.main.autoConfigurationFailFast=false
-camel.main.routeControllerSuperviseEnabled=true
-camel.main.routeControllerBackoffDelay = 5000
-camel.main.routeControllerBackoffMaxAttempts = 100
-camel.main.routeControllerInitialDelay = 1000
-camel.main.routeControllerThreadPoolSize = 3
+camel.routecontroller.superviseEnabled=true
+camel.routecontroller.backoffDelay=5000
+camel.routecontroller.backoffMaxAttempts=100
+camel.routecontroller.initialDelay=1000
+camel.routecontroller.threadPoolSize=3
 camel.context.dev-console=true
 label.runtime=app.kubernetes.io/runtime
 
jib.from.image=gcr.io/distroless/java17@sha256:85c2fa20773270fe6fecf576dd5a53f5bb8b914e57a463c533dac034c51862d9
diff --git 
a/karavan-web/karavan-app/src/main/resources/snippets/openshift-application.properties
 
b/karavan-web/karavan-app/src/main/resources/snippets/openshift-application.properties
index ae861d60..d9e2f982 100644
--- 
a/karavan-web/karavan-app/src/main/resources/snippets/openshift-application.properties
+++ 
b/karavan-web/karavan-app/src/main/resources/snippets/openshift-application.properties
@@ -13,11 +13,11 @@ camel.server.healthCheckEnabled=true
 camel.server.devConsoleEnabled=true
 camel.main.tracingStandby=true
 camel.main.autoConfigurationFailFast=false
-camel.main.routeControllerSuperviseEnabled=true
-camel.main.routeControllerBackoffDelay = 5000
-camel.main.routeControllerBackoffMaxAttempts = 100
-camel.main.routeControllerInitialDelay = 1000
-camel.main.routeControllerThreadPoolSize = 3
+camel.routecontroller.superviseEnabled=true
+camel.routecontroller.backoffDelay=5000
+camel.routecontroller.backoffMaxAttempts=100
+camel.routecontroller.initialDelay=1000
+camel.routecontroller.threadPoolSize=3
 camel.context.dev-console=true
 label.runtime=app.openshift.io/runtime
 
jib.from.image=gcr.io/distroless/java17@sha256:85c2fa20773270fe6fecf576dd5a53f5bb8b914e57a463c533dac034c51862d9



(camel-karavan) branch main updated (1a21ca28 -> ea49b0d2)

2024-02-23 Thread marat
This is an automated email from the ASF dual-hosted git repository.

marat pushed a change to branch main
in repository https://gitbox.apache.org/repos/asf/camel-karavan.git


from 1a21ca28 Default tag is dev
 new 5e9cccad proeprties for #1135
 new 18906112 Docke compose
 new c99e2fcc gitignore
 new 5d97f3fe Docker compose
 new ca05abcd Redesign
 new 00023abf Docker compose
 new c52a9cb5 Cleanup
 new f376a9e3 Cleanup
 new ea49b0d2 Cleanup

The 9 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 .github/workflows/app-oidc.yml |   4 +-
 .github/workflows/app.yml  |   4 +-
 .github/workflows/docker-devmode.yml   |   6 +-
 .gitignore |   3 +
 docs/install/karavan-docker/config/app.ini |  98 ++
 docs/install/karavan-docker/data.zip   | Bin 0 -> 73304 bytes
 .../karavan-docker/docker-compose-gitea.yaml   |  70 
 docs/install/karavan-docker/docker-compose.yaml|  41 +++
 docs/install/karavan-kubernetes/deployment.yaml|  66 
 docs/install/karavan-kubernetes/kustomization.yaml |  15 +
 docs/install/karavan-kubernetes/role-binding.yaml  |  26 ++
 docs/install/karavan-kubernetes/role.yaml  |  30 ++
 docs/install/karavan-kubernetes/secret.yaml|  19 ++
 .../karavan-kubernetes/service-account.yaml|   5 +
 docs/install/karavan-kubernetes/service.yaml   |  20 ++
 .../karavan-app => karavan-app}/.dockerignore  |   0
 .../.mvn/wrapper/maven-wrapper.properties  |   0
 .../Dockerfile.dockerignore|   0
 {karavan-web/karavan-app => karavan-app}/mvnw  |   0
 {karavan-web/karavan-app => karavan-app}/mvnw.cmd  |   0
 {karavan-web/karavan-app => karavan-app}/pom.xml   |   0
 .../src/main/docker/Dockerfile |   0
 .../org/apache/camel/karavan/api/AuthResource.java |   2 +-
 .../apache/camel/karavan/api/BuildResource.java|   2 +-
 .../camel/karavan/api/ComponentResources.java  |   0
 .../camel/karavan/api/ConfigurationResource.java   |   0
 .../camel/karavan/api/ContainerResource.java   |   2 +-
 .../apache/camel/karavan/api/DevModeResource.java  |   2 +-
 .../apache/camel/karavan/api/ImagesResource.java   |   4 +-
 .../camel/karavan/api/InfrastructureResource.java  |   2 +-
 .../apache/camel/karavan/api/KameletResources.java |   2 +-
 .../apache/camel/karavan/api/LogWatchResource.java |   0
 .../camel/karavan/api/NotificationResource.java|   0
 .../camel/karavan/api/ProjectFileResource.java |   2 +-
 .../camel/karavan/api/ProjectGitResource.java  |   0
 .../apache/camel/karavan/api/ProjectResource.java  |   4 +-
 .../apache/camel/karavan/api/StatusResource.java   |   2 +-
 .../apache/camel/karavan/api/UsersResource.java|   0
 .../org/apache/camel/karavan/code/CodeService.java |  11 +-
 .../camel/karavan/code/DockerComposeConverter.java |   0
 .../camel/karavan/docker/DockerEventListener.java  |   2 +-
 .../camel/karavan/docker/DockerForKaravan.java |   0
 .../apache/camel/karavan/docker/DockerService.java |   8 +-
 .../camel/karavan/docker/DockerServiceUtils.java   |   0
 .../apache/camel/karavan/docker/LogCallback.java   |   0
 .../camel/karavan/docker/LoggerCallback.java   |   0
 .../apache/camel/karavan/docker/PullCallback.java  |   0
 .../karavan/kubernetes/DeploymentEventHandler.java |   2 +-
 .../karavan/kubernetes/KubernetesService.java  |   2 +-
 .../camel/karavan/kubernetes/PodEventHandler.java  |   2 +-
 .../karavan/kubernetes/ServiceEventHandler.java|   2 +-
 .../apache/camel/karavan/model/CamelStatus.java|   0
 .../camel/karavan/model/CamelStatusValue.java  |   0
 .../apache/camel/karavan/model/ContainerPort.java  |   0
 .../camel/karavan/model/ContainerStatus.java   |   0
 .../camel/karavan/model/DeploymentStatus.java  |   0
 .../apache/camel/karavan/model/DockerCompose.java  |   0
 .../karavan/model/DockerComposeHealthCheck.java|   0
 .../camel/karavan/model/DockerComposeNetwork.java  |   0
 .../camel/karavan/model/DockerComposeService.java  |   0
 .../org/apache/camel/karavan}/model/GitConfig.java |   2 +-
 .../org/apache/camel/karavan}/model/GitRepo.java   |   2 +-
 .../apache/camel/karavan}/model/GitRepoFile.java   |   2 +-
 .../org/apache/camel/karavan/model/GroupedKey.java |   0
 .../org/apache/camel/karavan/model/Project.java|   0
 .../apache/camel/karavan/model/ProjectFile.java|   0
 .../camel/karavan/model}/RegistryConfig.java   |   2 +-
 .../apache/camel/karavan/model/ServiceStatus.java  |   0
 .../apache/camel/karavan/service/AuthService.java  |   0
 .../apache/camel/karavan/service/CamelService.java |   1 -
 .../camel/karavan/service/ConfigService.java   |   0
 

(camel-kamelets) branch regen_bot updated (fdf01671 -> 92e0441a)

2024-02-23 Thread github-bot
This is an automated email from the ASF dual-hosted git repository.

github-bot pushed a change to branch regen_bot
in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git


omit fdf01671 Regen for commit 1c00d673f03a7d6fba8fba0d959f9a406f801b5b
 add 92e0441a Regen for commit 1c00d673f03a7d6fba8fba0d959f9a406f801b5b

This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version.  This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:

 * -- * -- B -- O -- O -- O   (fdf01671)
\
 N -- N -- N   refs/heads/regen_bot (92e0441a)

You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.

Any revisions marked "omit" are not gone; other references still
refer to them.  Any revisions marked "discard" are gone forever.

No new revisions were added by this update.

Summary of changes:



Re: [I] Kafka Schema Registries: Support HTTPS of Apicurio Registry [camel-kamelets]

2024-02-23 Thread via GitHub


oscerd commented on issue #1786:
URL: 
https://github.com/apache/camel-kamelets/issues/1786#issuecomment-1961483412

   We added support for keycloak backed Apicurio instances.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



Re: [I] Kafka Schema Registries: Support HTTPS of Apicurio Registry [camel-kamelets]

2024-02-23 Thread via GitHub


oscerd closed issue #1786: Kafka Schema Registries: Support HTTPS of Apicurio 
Registry
URL: https://github.com/apache/camel-kamelets/issues/1786


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



Re: [PR] Added a Kafka Apicurio Sink secured with Keycloak Kamelet [camel-kamelets]

2024-02-23 Thread via GitHub


oscerd commented on PR #1919:
URL: https://github.com/apache/camel-kamelets/pull/1919#issuecomment-1961482438

   Fixes #1916 


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



Re: [I] Kafka Apicurio Secured Sink Kamelet [camel-kamelets]

2024-02-23 Thread via GitHub


oscerd closed issue #1916: Kafka Apicurio Secured Sink Kamelet
URL: https://github.com/apache/camel-kamelets/issues/1916


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



Re: [PR] Generated sources regen [camel-kamelets]

2024-02-23 Thread via GitHub


oscerd merged PR #1920:
URL: https://github.com/apache/camel-kamelets/pull/1920


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



(camel-kamelets) branch main updated: Regen for commit 1c00d673f03a7d6fba8fba0d959f9a406f801b5b

2024-02-23 Thread acosentino
This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git


The following commit(s) were added to refs/heads/main by this push:
 new 92e0441a Regen for commit 1c00d673f03a7d6fba8fba0d959f9a406f801b5b
92e0441a is described below

commit 92e0441a48f8e42d5834baf76fbf25a31e7a6712
Author: oscerd 
AuthorDate: Fri Feb 23 10:22:02 2024 +

Regen for commit 1c00d673f03a7d6fba8fba0d959f9a406f801b5b

Signed-off-by: GitHub 
---
 docs/modules/ROOT/nav.adoc | 1 -
 1 file changed, 1 deletion(-)

diff --git a/docs/modules/ROOT/nav.adoc b/docs/modules/ROOT/nav.adoc
index 9ef5e6db..d67885d4 100644
--- a/docs/modules/ROOT/nav.adoc
+++ b/docs/modules/ROOT/nav.adoc
@@ -134,7 +134,6 @@
 * xref:kafka-azure-schema-registry-sink.adoc[]
 * xref:kafka-azure-schema-registry-source.adoc[]
 * xref:kafka-batch-apicurio-registry-not-secured-source.adoc[]
-* xref:kafka-batch-apicurio-registry-source.adoc[]
 * xref:kafka-batch-azure-schema-registry-source.adoc[]
 * xref:kafka-batch-manual-commit-action.adoc[]
 * xref:kafka-batch-not-secured-source.adoc[]



(camel-kamelets) branch 1916 deleted (was b74ffef2)

2024-02-23 Thread acosentino
This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a change to branch 1916
in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git


 was b74ffef2 Added a Kafka Apicurio Sink secured with Keycloak Kamelet

The revisions that were on this branch are still contained in
other references; therefore, this change does not discard any commits
from the repository.



Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]

2024-02-23 Thread via GitHub


lburgazzoli commented on code in PR #5090:
URL: https://github.com/apache/camel-k/pull/5090#discussion_r1500747075


##
pkg/trait/mount.go:
##
@@ -165,4 +193,191 @@ func (t *mountTrait) mountResource(vols *[]corev1.Volume, 
mnts *[]corev1.VolumeM
 
*vols = append(*vols, *vol)
*mnts = append(*mnts, *mnt)
+
+   // User specified location file (only properties file)
+   if dstDir != "" {
+   if strings.HasSuffix(dstDir, ".properties") {
+   return []string{mntPath}, nil
+   }
+   return nil, nil
+   }
+
+   // We only process this for text configuration .properties files, never 
for resources
+   if conf.ContentType() == utilResource.ContentTypeText {
+   // the user asked to store the entire resource without 
specifying any filter
+   // we need to list all the resources belonging to the resource
+   if conf.StorageType() == utilResource.StorageTypeConfigmap {
+   cm := kubernetes.LookupConfigmap(e.Ctx, e.Client, 
e.Integration.Namespace, conf.Name())

Review Comment:
   as far as I remember, it does not matter. 
   The runtime/extensione loads them even if they are not .properties



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]

2024-02-23 Thread via GitHub


squakez commented on code in PR #5090:
URL: https://github.com/apache/camel-k/pull/5090#discussion_r1500743704


##
pkg/trait/mount.go:
##
@@ -165,4 +193,191 @@ func (t *mountTrait) mountResource(vols *[]corev1.Volume, 
mnts *[]corev1.VolumeM
 
*vols = append(*vols, *vol)
*mnts = append(*mnts, *mnt)
+
+   // User specified location file (only properties file)
+   if dstDir != "" {
+   if strings.HasSuffix(dstDir, ".properties") {
+   return []string{mntPath}, nil
+   }
+   return nil, nil
+   }
+
+   // We only process this for text configuration .properties files, never 
for resources
+   if conf.ContentType() == utilResource.ContentTypeText {
+   // the user asked to store the entire resource without 
specifying any filter
+   // we need to list all the resources belonging to the resource
+   if conf.StorageType() == utilResource.StorageTypeConfigmap {
+   cm := kubernetes.LookupConfigmap(e.Ctx, e.Client, 
e.Integration.Namespace, conf.Name())

Review Comment:
   No. Not all the cm/secrets are `.properties` file.



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]

2024-02-23 Thread via GitHub


lburgazzoli commented on code in PR #5090:
URL: https://github.com/apache/camel-k/pull/5090#discussion_r1500740746


##
pkg/trait/mount.go:
##
@@ -165,4 +193,191 @@ func (t *mountTrait) mountResource(vols *[]corev1.Volume, 
mnts *[]corev1.VolumeM
 
*vols = append(*vols, *vol)
*mnts = append(*mnts, *mnt)
+
+   // User specified location file (only properties file)
+   if dstDir != "" {
+   if strings.HasSuffix(dstDir, ".properties") {
+   return []string{mntPath}, nil
+   }
+   return nil, nil
+   }
+
+   // We only process this for text configuration .properties files, never 
for resources
+   if conf.ContentType() == utilResource.ContentTypeText {
+   // the user asked to store the entire resource without 
specifying any filter
+   // we need to list all the resources belonging to the resource
+   if conf.StorageType() == utilResource.StorageTypeConfigmap {
+   cm := kubernetes.LookupConfigmap(e.Ctx, e.Client, 
e.Integration.Namespace, conf.Name())
+   if cm != nil {
+   for k := range cm.Data {
+   if strings.HasSuffix(k, ".properties") {
+   paths = append(paths, 
fmt.Sprintf("%s/%s", mntPath, k))
+   } else {
+   // Deprecated: use explicit 
configuration instead
+   envName := 
strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_"))
+   t.L.Infof(`Deprecation notice: 
the operator is adding the environment variable %s which will take runtime 
value from configmap.
+   This feature may disappear in 
future releases, make sure to use properties file in you configmap instead.`, 
envName)
+   propsAsEnv = append(propsAsEnv, 
corev1.EnvVar{
+   Name: envName,
+   ValueFrom: 
{
+   
ConfigMapKeyRef: {
+   
LocalObjectReference: corev1.LocalObjectReference{
+   
Name: cm.Name,
+   },
+   Key: k,
+   },
+   },
+   })
+   }
+   }
+   }
+   } else if conf.StorageType() == utilResource.StorageTypeSecret {
+   sec := kubernetes.LookupSecret(e.Ctx, e.Client, 
e.Integration.Namespace, conf.Name())
+   if sec != nil {
+   for k := range sec.Data {
+   if strings.HasSuffix(k, ".properties") {
+   paths = append(paths, 
fmt.Sprintf("%s/%s", mntPath, k))
+   } else {
+   // Deprecated: use explicit 
configuration instead
+   envName := 
strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_"))
+   t.L.Infof(`Deprecation notice: 
the operator is adding the environment variable %s which will take runtime 
value from secret.
+   This feature may disappear in 
future releases, make sure to use properties file in you secret instead.`, 
envName)
+   propsAsEnv = append(propsAsEnv, 
corev1.EnvVar{
+   Name: envName,
+   ValueFrom: 
{
+   SecretKeyRef: 
{
+   
LocalObjectReference: corev1.LocalObjectReference{
+   
Name: sec.Name,
+   },
+   Key: k,
+   },
+   },
+   })
+  

Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]

2024-02-23 Thread via GitHub


squakez commented on code in PR #5090:
URL: https://github.com/apache/camel-k/pull/5090#discussion_r1500731359


##
pkg/trait/mount.go:
##
@@ -165,4 +193,191 @@ func (t *mountTrait) mountResource(vols *[]corev1.Volume, 
mnts *[]corev1.VolumeM
 
*vols = append(*vols, *vol)
*mnts = append(*mnts, *mnt)
+
+   // User specified location file (only properties file)
+   if dstDir != "" {
+   if strings.HasSuffix(dstDir, ".properties") {
+   return []string{mntPath}, nil
+   }
+   return nil, nil
+   }
+
+   // We only process this for text configuration .properties files, never 
for resources
+   if conf.ContentType() == utilResource.ContentTypeText {
+   // the user asked to store the entire resource without 
specifying any filter
+   // we need to list all the resources belonging to the resource
+   if conf.StorageType() == utilResource.StorageTypeConfigmap {
+   cm := kubernetes.LookupConfigmap(e.Ctx, e.Client, 
e.Integration.Namespace, conf.Name())
+   if cm != nil {
+   for k := range cm.Data {
+   if strings.HasSuffix(k, ".properties") {
+   paths = append(paths, 
fmt.Sprintf("%s/%s", mntPath, k))
+   } else {
+   // Deprecated: use explicit 
configuration instead
+   envName := 
strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_"))
+   t.L.Infof(`Deprecation notice: 
the operator is adding the environment variable %s which will take runtime 
value from configmap.
+   This feature may disappear in 
future releases, make sure to use properties file in you configmap instead.`, 
envName)
+   propsAsEnv = append(propsAsEnv, 
corev1.EnvVar{
+   Name: envName,
+   ValueFrom: 
{
+   
ConfigMapKeyRef: {
+   
LocalObjectReference: corev1.LocalObjectReference{
+   
Name: cm.Name,
+   },
+   Key: k,
+   },
+   },
+   })
+   }
+   }
+   }
+   } else if conf.StorageType() == utilResource.StorageTypeSecret {
+   sec := kubernetes.LookupSecret(e.Ctx, e.Client, 
e.Integration.Namespace, conf.Name())
+   if sec != nil {
+   for k := range sec.Data {
+   if strings.HasSuffix(k, ".properties") {
+   paths = append(paths, 
fmt.Sprintf("%s/%s", mntPath, k))
+   } else {
+   // Deprecated: use explicit 
configuration instead
+   envName := 
strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_"))
+   t.L.Infof(`Deprecation notice: 
the operator is adding the environment variable %s which will take runtime 
value from secret.
+   This feature may disappear in 
future releases, make sure to use properties file in you secret instead.`, 
envName)
+   propsAsEnv = append(propsAsEnv, 
corev1.EnvVar{
+   Name: envName,
+   ValueFrom: 
{
+   SecretKeyRef: 
{
+   
LocalObjectReference: corev1.LocalObjectReference{
+   
Name: sec.Name,
+   },
+   Key: k,
+   },
+   },
+   })
+  

Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]

2024-02-23 Thread via GitHub


lburgazzoli commented on code in PR #5090:
URL: https://github.com/apache/camel-k/pull/5090#discussion_r1500730105


##
pkg/trait/mount.go:
##
@@ -165,4 +193,191 @@ func (t *mountTrait) mountResource(vols *[]corev1.Volume, 
mnts *[]corev1.VolumeM
 
*vols = append(*vols, *vol)
*mnts = append(*mnts, *mnt)
+
+   // User specified location file (only properties file)
+   if dstDir != "" {
+   if strings.HasSuffix(dstDir, ".properties") {
+   return []string{mntPath}, nil
+   }
+   return nil, nil
+   }
+
+   // We only process this for text configuration .properties files, never 
for resources
+   if conf.ContentType() == utilResource.ContentTypeText {
+   // the user asked to store the entire resource without 
specifying any filter
+   // we need to list all the resources belonging to the resource
+   if conf.StorageType() == utilResource.StorageTypeConfigmap {
+   cm := kubernetes.LookupConfigmap(e.Ctx, e.Client, 
e.Integration.Namespace, conf.Name())

Review Comment:
   Isn't this already the case ? with mount.configs we know already what config 
maps/secrets are configuration resources. 



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



(camel-k) branch dependabot/go_modules/github.com/prometheus/common-0.48.0 deleted (was 09d7f519e)

2024-02-23 Thread pcongiusti
This is an automated email from the ASF dual-hosted git repository.

pcongiusti pushed a change to branch 
dependabot/go_modules/github.com/prometheus/common-0.48.0
in repository https://gitbox.apache.org/repos/asf/camel-k.git


 was 09d7f519e chore(deps): bump github.com/prometheus/common from 0.47.0 
to 0.48.0

The revisions that were on this branch are still contained in
other references; therefore, this change does not discard any commits
from the repository.



(camel-k) branch main updated: chore(deps): bump github.com/prometheus/common from 0.47.0 to 0.48.0

2024-02-23 Thread pcongiusti
This is an automated email from the ASF dual-hosted git repository.

pcongiusti pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-k.git


The following commit(s) were added to refs/heads/main by this push:
 new 24a3cd629 chore(deps): bump github.com/prometheus/common from 0.47.0 
to 0.48.0
24a3cd629 is described below

commit 24a3cd62980bf7f4d6436fa06b88c67490d7dea3
Author: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
AuthorDate: Fri Feb 23 00:43:37 2024 +

chore(deps): bump github.com/prometheus/common from 0.47.0 to 0.48.0

Bumps [github.com/prometheus/common](https://github.com/prometheus/common) 
from 0.47.0 to 0.48.0.
- [Release notes](https://github.com/prometheus/common/releases)
- [Commits](https://github.com/prometheus/common/compare/v0.47.0...v0.48.0)

---
updated-dependencies:
- dependency-name: github.com/prometheus/common
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] 
---
 go.mod | 2 +-
 go.sum | 4 ++--
 2 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/go.mod b/go.mod
index 4cb269a03..d74ced5aa 100644
--- a/go.mod
+++ b/go.mod
@@ -23,7 +23,7 @@ require (
github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring 
v0.67.1
github.com/prometheus/client_golang v1.18.0
github.com/prometheus/client_model v0.6.0
-   github.com/prometheus/common v0.47.0
+   github.com/prometheus/common v0.48.0
github.com/redhat-developer/service-binding-operator v1.4.0
github.com/rs/xid v1.5.0
github.com/sirupsen/logrus v1.9.3
diff --git a/go.sum b/go.sum
index f3ce79b20..d339a1976 100644
--- a/go.sum
+++ b/go.sum
@@ -360,8 +360,8 @@ github.com/prometheus/common v0.26.0/go.mod 
h1:M7rCNAaPfAosfx8veZJCuw84e35h3Cfd9
 github.com/prometheus/common v0.32.1/go.mod 
h1:vu+V0TpY+O6vW9J44gczi3Ap/oXXR10b+M/gUGO4Hls=
 github.com/prometheus/common v0.35.0/go.mod 
h1:phzohg0JFMnBEFGxTDbfu3QyL5GI8gTQJFhYO5B3mfA=
 github.com/prometheus/common v0.37.0/go.mod 
h1:phzohg0JFMnBEFGxTDbfu3QyL5GI8gTQJFhYO5B3mfA=
-github.com/prometheus/common v0.47.0 
h1:p5Cz0FNHo7SnWOmWmoRozVcjEp0bIVU8cV7OShpjL1k=
-github.com/prometheus/common v0.47.0/go.mod 
h1:0/KsvlIEfPQCQ5I2iNSAWKPZziNCvRs5EC6ILDTlAPc=
+github.com/prometheus/common v0.48.0 
h1:QO8U2CdOzSn1BBsmXJXduaaW+dY/5QLjfB8svtSzKKE=
+github.com/prometheus/common v0.48.0/go.mod 
h1:0/KsvlIEfPQCQ5I2iNSAWKPZziNCvRs5EC6ILDTlAPc=
 github.com/prometheus/procfs v0.0.0-20181005140218-185b4288413d/go.mod 
h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk=
 github.com/prometheus/procfs v0.0.2/go.mod 
h1:TjEm7ze935MbeOT/UhFTIMYKhuLP4wbCsTZCD3I8kEA=
 github.com/prometheus/procfs v0.1.3/go.mod 
h1:lV6e/gmhEcM9IjHGsFOCxxuZ+z1YqCvr4OA4YeYWdaU=



Re: [PR] chore(deps): bump github.com/prometheus/common from 0.47.0 to 0.48.0 [camel-k]

2024-02-23 Thread via GitHub


squakez merged PR #5177:
URL: https://github.com/apache/camel-k/pull/5177


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]

2024-02-23 Thread via GitHub


squakez commented on code in PR #5090:
URL: https://github.com/apache/camel-k/pull/5090#discussion_r1500722411


##
pkg/trait/mount.go:
##
@@ -165,4 +193,191 @@ func (t *mountTrait) mountResource(vols *[]corev1.Volume, 
mnts *[]corev1.VolumeM
 
*vols = append(*vols, *vol)
*mnts = append(*mnts, *mnt)
+
+   // User specified location file (only properties file)
+   if dstDir != "" {
+   if strings.HasSuffix(dstDir, ".properties") {
+   return []string{mntPath}, nil
+   }
+   return nil, nil
+   }
+
+   // We only process this for text configuration .properties files, never 
for resources
+   if conf.ContentType() == utilResource.ContentTypeText {
+   // the user asked to store the entire resource without 
specifying any filter
+   // we need to list all the resources belonging to the resource
+   if conf.StorageType() == utilResource.StorageTypeConfigmap {
+   cm := kubernetes.LookupConfigmap(e.Ctx, e.Client, 
e.Integration.Namespace, conf.Name())

Review Comment:
   True. We may rework the feature to let the user explictly specify the 
cm/secrets holding the properties and deprecate this part for future removal.



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]

2024-02-23 Thread via GitHub


lburgazzoli commented on code in PR #5090:
URL: https://github.com/apache/camel-k/pull/5090#discussion_r1500718125


##
pkg/trait/mount.go:
##
@@ -165,4 +193,191 @@ func (t *mountTrait) mountResource(vols *[]corev1.Volume, 
mnts *[]corev1.VolumeM
 
*vols = append(*vols, *vol)
*mnts = append(*mnts, *mnt)
+
+   // User specified location file (only properties file)
+   if dstDir != "" {
+   if strings.HasSuffix(dstDir, ".properties") {
+   return []string{mntPath}, nil
+   }
+   return nil, nil
+   }
+
+   // We only process this for text configuration .properties files, never 
for resources
+   if conf.ContentType() == utilResource.ContentTypeText {
+   // the user asked to store the entire resource without 
specifying any filter
+   // we need to list all the resources belonging to the resource
+   if conf.StorageType() == utilResource.StorageTypeConfigmap {
+   cm := kubernetes.LookupConfigmap(e.Ctx, e.Client, 
e.Integration.Namespace, conf.Name())
+   if cm != nil {
+   for k := range cm.Data {
+   if strings.HasSuffix(k, ".properties") {
+   paths = append(paths, 
fmt.Sprintf("%s/%s", mntPath, k))
+   } else {
+   // Deprecated: use explicit 
configuration instead
+   envName := 
strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_"))
+   t.L.Infof(`Deprecation notice: 
the operator is adding the environment variable %s which will take runtime 
value from configmap.
+   This feature may disappear in 
future releases, make sure to use properties file in you configmap instead.`, 
envName)
+   propsAsEnv = append(propsAsEnv, 
corev1.EnvVar{
+   Name: envName,
+   ValueFrom: 
{
+   
ConfigMapKeyRef: {
+   
LocalObjectReference: corev1.LocalObjectReference{
+   
Name: cm.Name,
+   },
+   Key: k,
+   },
+   },
+   })
+   }
+   }
+   }
+   } else if conf.StorageType() == utilResource.StorageTypeSecret {
+   sec := kubernetes.LookupSecret(e.Ctx, e.Client, 
e.Integration.Namespace, conf.Name())
+   if sec != nil {
+   for k := range sec.Data {
+   if strings.HasSuffix(k, ".properties") {
+   paths = append(paths, 
fmt.Sprintf("%s/%s", mntPath, k))
+   } else {
+   // Deprecated: use explicit 
configuration instead
+   envName := 
strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_"))
+   t.L.Infof(`Deprecation notice: 
the operator is adding the environment variable %s which will take runtime 
value from secret.
+   This feature may disappear in 
future releases, make sure to use properties file in you secret instead.`, 
envName)
+   propsAsEnv = append(propsAsEnv, 
corev1.EnvVar{
+   Name: envName,
+   ValueFrom: 
{
+   SecretKeyRef: 
{
+   
LocalObjectReference: corev1.LocalObjectReference{
+   
Name: sec.Name,
+   },
+   Key: k,
+   },
+   },
+   })
+  

Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]

2024-02-23 Thread via GitHub


squakez commented on code in PR #5090:
URL: https://github.com/apache/camel-k/pull/5090#discussion_r1500712295


##
pkg/trait/mount.go:
##
@@ -165,4 +193,191 @@ func (t *mountTrait) mountResource(vols *[]corev1.Volume, 
mnts *[]corev1.VolumeM
 
*vols = append(*vols, *vol)
*mnts = append(*mnts, *mnt)
+
+   // User specified location file (only properties file)
+   if dstDir != "" {
+   if strings.HasSuffix(dstDir, ".properties") {
+   return []string{mntPath}, nil
+   }
+   return nil, nil
+   }
+
+   // We only process this for text configuration .properties files, never 
for resources
+   if conf.ContentType() == utilResource.ContentTypeText {
+   // the user asked to store the entire resource without 
specifying any filter
+   // we need to list all the resources belonging to the resource
+   if conf.StorageType() == utilResource.StorageTypeConfigmap {
+   cm := kubernetes.LookupConfigmap(e.Ctx, e.Client, 
e.Integration.Namespace, conf.Name())
+   if cm != nil {
+   for k := range cm.Data {
+   if strings.HasSuffix(k, ".properties") {
+   paths = append(paths, 
fmt.Sprintf("%s/%s", mntPath, k))
+   } else {
+   // Deprecated: use explicit 
configuration instead
+   envName := 
strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_"))
+   t.L.Infof(`Deprecation notice: 
the operator is adding the environment variable %s which will take runtime 
value from configmap.
+   This feature may disappear in 
future releases, make sure to use properties file in you configmap instead.`, 
envName)
+   propsAsEnv = append(propsAsEnv, 
corev1.EnvVar{
+   Name: envName,
+   ValueFrom: 
{
+   
ConfigMapKeyRef: {
+   
LocalObjectReference: corev1.LocalObjectReference{
+   
Name: cm.Name,
+   },
+   Key: k,
+   },
+   },
+   })
+   }
+   }
+   }
+   } else if conf.StorageType() == utilResource.StorageTypeSecret {
+   sec := kubernetes.LookupSecret(e.Ctx, e.Client, 
e.Integration.Namespace, conf.Name())
+   if sec != nil {
+   for k := range sec.Data {
+   if strings.HasSuffix(k, ".properties") {
+   paths = append(paths, 
fmt.Sprintf("%s/%s", mntPath, k))
+   } else {
+   // Deprecated: use explicit 
configuration instead
+   envName := 
strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_"))
+   t.L.Infof(`Deprecation notice: 
the operator is adding the environment variable %s which will take runtime 
value from secret.
+   This feature may disappear in 
future releases, make sure to use properties file in you secret instead.`, 
envName)
+   propsAsEnv = append(propsAsEnv, 
corev1.EnvVar{
+   Name: envName,
+   ValueFrom: 
{
+   SecretKeyRef: 
{
+   
LocalObjectReference: corev1.LocalObjectReference{
+   
Name: sec.Name,
+   },
+   Key: k,
+   },
+   },
+   })
+  

Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]

2024-02-23 Thread via GitHub


squakez commented on code in PR #5090:
URL: https://github.com/apache/camel-k/pull/5090#discussion_r1500712295


##
pkg/trait/mount.go:
##
@@ -165,4 +193,191 @@ func (t *mountTrait) mountResource(vols *[]corev1.Volume, 
mnts *[]corev1.VolumeM
 
*vols = append(*vols, *vol)
*mnts = append(*mnts, *mnt)
+
+   // User specified location file (only properties file)
+   if dstDir != "" {
+   if strings.HasSuffix(dstDir, ".properties") {
+   return []string{mntPath}, nil
+   }
+   return nil, nil
+   }
+
+   // We only process this for text configuration .properties files, never 
for resources
+   if conf.ContentType() == utilResource.ContentTypeText {
+   // the user asked to store the entire resource without 
specifying any filter
+   // we need to list all the resources belonging to the resource
+   if conf.StorageType() == utilResource.StorageTypeConfigmap {
+   cm := kubernetes.LookupConfigmap(e.Ctx, e.Client, 
e.Integration.Namespace, conf.Name())
+   if cm != nil {
+   for k := range cm.Data {
+   if strings.HasSuffix(k, ".properties") {
+   paths = append(paths, 
fmt.Sprintf("%s/%s", mntPath, k))
+   } else {
+   // Deprecated: use explicit 
configuration instead
+   envName := 
strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_"))
+   t.L.Infof(`Deprecation notice: 
the operator is adding the environment variable %s which will take runtime 
value from configmap.
+   This feature may disappear in 
future releases, make sure to use properties file in you configmap instead.`, 
envName)
+   propsAsEnv = append(propsAsEnv, 
corev1.EnvVar{
+   Name: envName,
+   ValueFrom: 
{
+   
ConfigMapKeyRef: {
+   
LocalObjectReference: corev1.LocalObjectReference{
+   
Name: cm.Name,
+   },
+   Key: k,
+   },
+   },
+   })
+   }
+   }
+   }
+   } else if conf.StorageType() == utilResource.StorageTypeSecret {
+   sec := kubernetes.LookupSecret(e.Ctx, e.Client, 
e.Integration.Namespace, conf.Name())
+   if sec != nil {
+   for k := range sec.Data {
+   if strings.HasSuffix(k, ".properties") {
+   paths = append(paths, 
fmt.Sprintf("%s/%s", mntPath, k))
+   } else {
+   // Deprecated: use explicit 
configuration instead
+   envName := 
strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_"))
+   t.L.Infof(`Deprecation notice: 
the operator is adding the environment variable %s which will take runtime 
value from secret.
+   This feature may disappear in 
future releases, make sure to use properties file in you secret instead.`, 
envName)
+   propsAsEnv = append(propsAsEnv, 
corev1.EnvVar{
+   Name: envName,
+   ValueFrom: 
{
+   SecretKeyRef: 
{
+   
LocalObjectReference: corev1.LocalObjectReference{
+   
Name: sec.Name,
+   },
+   Key: k,
+   },
+   },
+   })
+  

Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]

2024-02-23 Thread via GitHub


squakez commented on code in PR #5090:
URL: https://github.com/apache/camel-k/pull/5090#discussion_r1500712295


##
pkg/trait/mount.go:
##
@@ -165,4 +193,191 @@ func (t *mountTrait) mountResource(vols *[]corev1.Volume, 
mnts *[]corev1.VolumeM
 
*vols = append(*vols, *vol)
*mnts = append(*mnts, *mnt)
+
+   // User specified location file (only properties file)
+   if dstDir != "" {
+   if strings.HasSuffix(dstDir, ".properties") {
+   return []string{mntPath}, nil
+   }
+   return nil, nil
+   }
+
+   // We only process this for text configuration .properties files, never 
for resources
+   if conf.ContentType() == utilResource.ContentTypeText {
+   // the user asked to store the entire resource without 
specifying any filter
+   // we need to list all the resources belonging to the resource
+   if conf.StorageType() == utilResource.StorageTypeConfigmap {
+   cm := kubernetes.LookupConfigmap(e.Ctx, e.Client, 
e.Integration.Namespace, conf.Name())
+   if cm != nil {
+   for k := range cm.Data {
+   if strings.HasSuffix(k, ".properties") {
+   paths = append(paths, 
fmt.Sprintf("%s/%s", mntPath, k))
+   } else {
+   // Deprecated: use explicit 
configuration instead
+   envName := 
strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_"))
+   t.L.Infof(`Deprecation notice: 
the operator is adding the environment variable %s which will take runtime 
value from configmap.
+   This feature may disappear in 
future releases, make sure to use properties file in you configmap instead.`, 
envName)
+   propsAsEnv = append(propsAsEnv, 
corev1.EnvVar{
+   Name: envName,
+   ValueFrom: 
{
+   
ConfigMapKeyRef: {
+   
LocalObjectReference: corev1.LocalObjectReference{
+   
Name: cm.Name,
+   },
+   Key: k,
+   },
+   },
+   })
+   }
+   }
+   }
+   } else if conf.StorageType() == utilResource.StorageTypeSecret {
+   sec := kubernetes.LookupSecret(e.Ctx, e.Client, 
e.Integration.Namespace, conf.Name())
+   if sec != nil {
+   for k := range sec.Data {
+   if strings.HasSuffix(k, ".properties") {
+   paths = append(paths, 
fmt.Sprintf("%s/%s", mntPath, k))
+   } else {
+   // Deprecated: use explicit 
configuration instead
+   envName := 
strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_"))
+   t.L.Infof(`Deprecation notice: 
the operator is adding the environment variable %s which will take runtime 
value from secret.
+   This feature may disappear in 
future releases, make sure to use properties file in you secret instead.`, 
envName)
+   propsAsEnv = append(propsAsEnv, 
corev1.EnvVar{
+   Name: envName,
+   ValueFrom: 
{
+   SecretKeyRef: 
{
+   
LocalObjectReference: corev1.LocalObjectReference{
+   
Name: sec.Name,
+   },
+   Key: k,
+   },
+   },
+   })
+  

Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]

2024-02-23 Thread via GitHub


lburgazzoli commented on code in PR #5090:
URL: https://github.com/apache/camel-k/pull/5090#discussion_r1500554671


##
pkg/trait/mount.go:
##
@@ -165,4 +193,191 @@ func (t *mountTrait) mountResource(vols *[]corev1.Volume, 
mnts *[]corev1.VolumeM
 
*vols = append(*vols, *vol)
*mnts = append(*mnts, *mnt)
+
+   // User specified location file (only properties file)
+   if dstDir != "" {
+   if strings.HasSuffix(dstDir, ".properties") {
+   return []string{mntPath}, nil
+   }
+   return nil, nil
+   }
+
+   // We only process this for text configuration .properties files, never 
for resources
+   if conf.ContentType() == utilResource.ContentTypeText {
+   // the user asked to store the entire resource without 
specifying any filter
+   // we need to list all the resources belonging to the resource
+   if conf.StorageType() == utilResource.StorageTypeConfigmap {
+   cm := kubernetes.LookupConfigmap(e.Ctx, e.Client, 
e.Integration.Namespace, conf.Name())

Review Comment:
   The operator must NOT access to the user's config map/secrets/resources.



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



(camel-website) branch kamelets-4.4.0 deleted (was 3e6a6abd)

2024-02-23 Thread zregvart
This is an automated email from the ASF dual-hosted git repository.

zregvart pushed a change to branch kamelets-4.4.0
in repository https://gitbox.apache.org/repos/asf/camel-website.git


 was 3e6a6abd Added docs for Camel-Kamelets 4.4.x

The revisions that were on this branch are still contained in
other references; therefore, this change does not discard any commits
from the repository.



(camel-kamelets-examples) branch apicurio-secured-schema-reg-ex deleted (was 1422f8f)

2024-02-23 Thread acosentino
This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a change to branch apicurio-secured-schema-reg-ex
in repository https://gitbox.apache.org/repos/asf/camel-kamelets-examples.git


 was 1422f8f  Added an example of Kafka Apicurio Kamelet with Keycloak

The revisions that were on this branch are still contained in
other references; therefore, this change does not discard any commits
from the repository.



(camel-kamelets-examples) branch main updated: Added an example of Kafka Apicurio Kamelet with Keycloak

2024-02-23 Thread acosentino
This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-kamelets-examples.git


The following commit(s) were added to refs/heads/main by this push:
 new cb6cf4f  Added an example of Kafka Apicurio Kamelet with Keycloak
cb6cf4f is described below

commit cb6cf4fbe7f353af7c3564caaff0703c9cadf288
Author: Andrea Cosentino 
AuthorDate: Fri Feb 23 11:58:22 2024 +0100

Added an example of Kafka Apicurio Kamelet with Keycloak

Signed-off-by: Andrea Cosentino 
---
 .../README.md  | 102 
 .../application.properties |   9 +
 .../kafka-apicurio-kamelet.yaml|  45 ++
 .../kafka-apicurio-producer-kamelet.yaml   |  53 ++
 .../kafka-producer/pom.xml |  84 +++
 .../kafka-producer/src/main/avro/order.avsc|  33 +
 .../main/java/com/acme/example/kafka/Produce.java  |  85 +++
 .../java/com/acme/example/kafka/models/Order.java  | 673 +
 8 files changed, 1084 insertions(+)

diff --git a/jbang/kafka-apicurio-secured-schema-registry/README.md 
b/jbang/kafka-apicurio-secured-schema-registry/README.md
new file mode 100644
index 000..da2a6ea
--- /dev/null
+++ b/jbang/kafka-apicurio-secured-schema-registry/README.md
@@ -0,0 +1,102 @@
+# Example for consuming from Kafka with the usage of Apicurio Schema Registry 
secured with Keycloak and Avro
+
+You'll need a running Kafka instance and an Apicurio Registry
+
+## Kafka instance
+
+You could use a plain Kafka archive or use an Ansible role
+
+## Apicurio Registry settings
+
+Follow the guide here to have a fully running Apicurio Registry with Keycloak: 
https://github.com/Apicurio/apicurio-registry/tree/main/distro/docker-compose#docker-compose-and-quarkus-based-installation
+
+Once everything is up and running, access the Keycloak instance located at 
`http://YOUR_IP:8080`
+
+The username and password is admin/admin.
+
+Select the realm `registry` and create a new user called `registry-account` 
with password `registry`.
+
+The client Id from Keycloak will be `registry-api`.
+
+In the client page, select credentials and copy the client secret value.
+
+In `application.properties` file copy the client secret value into 
`keycloak.client.secret`.
+
+The rest of the options could be used as-is.
+
+## Configure the applications
+
+In `application.properties` set the Kafka instance address.
+
+## Produce to Kafka.
+
+Run 
[`Produce.java`](./kafka-producer/src/main/java/com/acme/example/kafka/Produce.java)
 to produce a message to the Kafka.
+
+```bash
+mvn compile exec:java -Dexec.mainClass="com.acme.example.kafka.Produce"
+```
+
+## Produce to Kafka without Kamelets
+
+To consume messages using a Camel route, first install the kafka-producer 
maven project:
+```bash
+cd kafka-producer
+mvn clean install
+```
+then run:
+```bash
+jbang run camel@apache/camel run 
--local-kamelet-dir= kafka-apicurio-kamelet.yaml
+```
+
+You should see something like
+
+```bash
+2024-02-23 11:53:11.840  INFO 39989 --- [   main] 
el.impl.engine.AbstractCamelContext : Routes startup (started:3)
+2024-02-23 11:53:11.841  INFO 39989 --- [   main] 
el.impl.engine.AbstractCamelContext : Started kafka-to-apicurio-log 
(kamelet://kafka-not-secured-apicurio-registry-source)
+2024-02-23 11:53:11.841  INFO 39989 --- [   main] 
el.impl.engine.AbstractCamelContext : Started 
kafka-not-secured-apicurio-registry-source-1 (kafka://my-topic)
+2024-02-23 11:53:11.841  INFO 39989 --- [   main] 
el.impl.engine.AbstractCamelContext : Started log-sink-2 (kamelet://source)
+2024-02-23 11:53:11.841  INFO 39989 --- [   main] 
el.impl.engine.AbstractCamelContext : Apache Camel 4.4.0 
(kafka-apicurio-kamelet) started in 216ms (build:0ms init:0ms start:216ms)
+2024-02-23 11:53:12.083  INFO 39989 --- [sumer[my-topic]] 
fka.clients.consumer.ConsumerConfig : These configurations 
'[apicurio.registry.avroDatumProvider, apicurio.auth.service.url, 
apicurio.auth.realm, apicurio.auth.password, apicurio.auth.client.id, 
apicurio.auth.client.secret, apicurio.registry.url, apicurio.auth.username]' 
were supplied but are not used yet.
+2024-02-23 11:53:12.085  INFO 39989 --- [sumer[my-topic]] 
he.kafka.common.utils.AppInfoParser : Kafka version: 3.5.1
+2024-02-23 11:53:12.085  INFO 39989 --- [sumer[my-topic]] 
he.kafka.common.utils.AppInfoParser : Kafka commitId: 2c6fb6c54472e90a
+2024-02-23 11:53:12.085  INFO 39989 --- [sumer[my-topic]] 
he.kafka.common.utils.AppInfoParser : Kafka startTimeMs: 1708685592083
+2024-02-23 11:53:12.090  INFO 39989 --- [sumer[my-topic]] 
ort.classic.AssignmentAdapterHelper : Using NO-OP resume strategy
+2024-02-23 11:53:12.090  INFO 39989 --- [sumer[my-topic]] 
l.component.kafka.KafkaFetchRecords : Subscribing my-topic-Thread 0 to topic 
my-topic
+2024-02-23 11:53:12.091  INFO 39989 --- 

Re: [PR] Added an example of Kafka Apicurio Kamelet with Keycloak [camel-kamelets-examples]

2024-02-23 Thread via GitHub


oscerd merged PR #65:
URL: https://github.com/apache/camel-kamelets-examples/pull/65


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



[PR] Added an example of Kafka Apicurio Kamelet with Keycloak [camel-kamelets-examples]

2024-02-23 Thread via GitHub


oscerd opened a new pull request, #65:
URL: https://github.com/apache/camel-kamelets-examples/pull/65

   (no comment)


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



(camel-kamelets-examples) 01/01: Added an example of Kafka Apicurio Kamelet with Keycloak

2024-02-23 Thread acosentino
This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch apicurio-secured-schema-reg-ex
in repository https://gitbox.apache.org/repos/asf/camel-kamelets-examples.git

commit 1422f8fdddbad641fc739dadd32fb293d99d4c51
Author: Andrea Cosentino 
AuthorDate: Fri Feb 23 11:58:22 2024 +0100

Added an example of Kafka Apicurio Kamelet with Keycloak

Signed-off-by: Andrea Cosentino 
---
 .../README.md  | 102 
 .../application.properties |   9 +
 .../kafka-apicurio-kamelet.yaml|  45 ++
 .../kafka-apicurio-producer-kamelet.yaml   |  53 ++
 .../kafka-producer/pom.xml |  84 +++
 .../kafka-producer/src/main/avro/order.avsc|  33 +
 .../main/java/com/acme/example/kafka/Produce.java  |  85 +++
 .../java/com/acme/example/kafka/models/Order.java  | 673 +
 8 files changed, 1084 insertions(+)

diff --git a/jbang/kafka-apicurio-secured-schema-registry/README.md 
b/jbang/kafka-apicurio-secured-schema-registry/README.md
new file mode 100644
index 000..da2a6ea
--- /dev/null
+++ b/jbang/kafka-apicurio-secured-schema-registry/README.md
@@ -0,0 +1,102 @@
+# Example for consuming from Kafka with the usage of Apicurio Schema Registry 
secured with Keycloak and Avro
+
+You'll need a running Kafka instance and an Apicurio Registry
+
+## Kafka instance
+
+You could use a plain Kafka archive or use an Ansible role
+
+## Apicurio Registry settings
+
+Follow the guide here to have a fully running Apicurio Registry with Keycloak: 
https://github.com/Apicurio/apicurio-registry/tree/main/distro/docker-compose#docker-compose-and-quarkus-based-installation
+
+Once everything is up and running, access the Keycloak instance located at 
`http://YOUR_IP:8080`
+
+The username and password is admin/admin.
+
+Select the realm `registry` and create a new user called `registry-account` 
with password `registry`.
+
+The client Id from Keycloak will be `registry-api`.
+
+In the client page, select credentials and copy the client secret value.
+
+In `application.properties` file copy the client secret value into 
`keycloak.client.secret`.
+
+The rest of the options could be used as-is.
+
+## Configure the applications
+
+In `application.properties` set the Kafka instance address.
+
+## Produce to Kafka.
+
+Run 
[`Produce.java`](./kafka-producer/src/main/java/com/acme/example/kafka/Produce.java)
 to produce a message to the Kafka.
+
+```bash
+mvn compile exec:java -Dexec.mainClass="com.acme.example.kafka.Produce"
+```
+
+## Produce to Kafka without Kamelets
+
+To consume messages using a Camel route, first install the kafka-producer 
maven project:
+```bash
+cd kafka-producer
+mvn clean install
+```
+then run:
+```bash
+jbang run camel@apache/camel run 
--local-kamelet-dir= kafka-apicurio-kamelet.yaml
+```
+
+You should see something like
+
+```bash
+2024-02-23 11:53:11.840  INFO 39989 --- [   main] 
el.impl.engine.AbstractCamelContext : Routes startup (started:3)
+2024-02-23 11:53:11.841  INFO 39989 --- [   main] 
el.impl.engine.AbstractCamelContext : Started kafka-to-apicurio-log 
(kamelet://kafka-not-secured-apicurio-registry-source)
+2024-02-23 11:53:11.841  INFO 39989 --- [   main] 
el.impl.engine.AbstractCamelContext : Started 
kafka-not-secured-apicurio-registry-source-1 (kafka://my-topic)
+2024-02-23 11:53:11.841  INFO 39989 --- [   main] 
el.impl.engine.AbstractCamelContext : Started log-sink-2 (kamelet://source)
+2024-02-23 11:53:11.841  INFO 39989 --- [   main] 
el.impl.engine.AbstractCamelContext : Apache Camel 4.4.0 
(kafka-apicurio-kamelet) started in 216ms (build:0ms init:0ms start:216ms)
+2024-02-23 11:53:12.083  INFO 39989 --- [sumer[my-topic]] 
fka.clients.consumer.ConsumerConfig : These configurations 
'[apicurio.registry.avroDatumProvider, apicurio.auth.service.url, 
apicurio.auth.realm, apicurio.auth.password, apicurio.auth.client.id, 
apicurio.auth.client.secret, apicurio.registry.url, apicurio.auth.username]' 
were supplied but are not used yet.
+2024-02-23 11:53:12.085  INFO 39989 --- [sumer[my-topic]] 
he.kafka.common.utils.AppInfoParser : Kafka version: 3.5.1
+2024-02-23 11:53:12.085  INFO 39989 --- [sumer[my-topic]] 
he.kafka.common.utils.AppInfoParser : Kafka commitId: 2c6fb6c54472e90a
+2024-02-23 11:53:12.085  INFO 39989 --- [sumer[my-topic]] 
he.kafka.common.utils.AppInfoParser : Kafka startTimeMs: 1708685592083
+2024-02-23 11:53:12.090  INFO 39989 --- [sumer[my-topic]] 
ort.classic.AssignmentAdapterHelper : Using NO-OP resume strategy
+2024-02-23 11:53:12.090  INFO 39989 --- [sumer[my-topic]] 
l.component.kafka.KafkaFetchRecords : Subscribing my-topic-Thread 0 to topic 
my-topic
+2024-02-23 11:53:12.091  INFO 39989 --- [sumer[my-topic]] 
afka.clients.consumer.KafkaConsumer : [Consumer 
clientId=consumer-2b2daf0d-5ce6-4fe3-8f3d-253d7cd92160-1, 

(camel-kamelets-examples) branch apicurio-secured-schema-reg-ex created (now 1422f8f)

2024-02-23 Thread acosentino
This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a change to branch apicurio-secured-schema-reg-ex
in repository https://gitbox.apache.org/repos/asf/camel-kamelets-examples.git


  at 1422f8f  Added an example of Kafka Apicurio Kamelet with Keycloak

This branch includes the following new commits:

 new 1422f8f  Added an example of Kafka Apicurio Kamelet with Keycloak

The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.




(camel-kamelets) branch regen_bot updated (41fd1cab -> fdf01671)

2024-02-23 Thread github-bot
This is an automated email from the ASF dual-hosted git repository.

github-bot pushed a change to branch regen_bot
in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git


from 41fd1cab Regen for commit 899679e4d9a7d6e94bf1460c08b83566fe1b5b3f
 add 29abeb11 Added a Kafka Apicurio Sink secured with Keycloak Kamelet
 add 8f71007e Added a Kafka Apicurio Sink secured with Keycloak Kamelet
 add 6e46798c Added a Kafka Apicurio Sink secured with Keycloak Kamelet
 add 1c00d673 Added a Kafka Apicurio Sink secured with Keycloak Kamelet
 add fdf01671 Regen for commit 1c00d673f03a7d6fba8fba0d959f9a406f801b5b

No new revisions were added by this update.

Summary of changes:
 docs/modules/ROOT/nav.adoc |  1 +
 ...ot-secured-apicurio-registry-sink.kamelet.yaml} | 53 --
 ...not-secured-apicurio-registry-sink.kamelet.yaml | 53 --
 3 files changed, 101 insertions(+), 6 deletions(-)
 copy kamelets/{kafka-apicurio-registry-not-secured-sink.kamelet.yaml => 
kafka-not-secured-apicurio-registry-sink.kamelet.yaml} (74%)
 copy kamelets/kafka-apicurio-registry-not-secured-sink.kamelet.yaml => 
library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
 (74%)



[PR] Generated sources regen [camel-kamelets]

2024-02-23 Thread via GitHub


github-actions[bot] opened a new pull request, #1920:
URL: https://github.com/apache/camel-kamelets/pull/1920

   Regen bot :robot: found some uncommited changes after running build on 
:camel: kamelets main.
   Please do not delete `regen_bot` branch after merge/rebase.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]

2024-02-23 Thread via GitHub


lburgazzoli commented on code in PR #5090:
URL: https://github.com/apache/camel-k/pull/5090#discussion_r1500464327


##
pkg/trait/mount.go:
##
@@ -165,4 +193,191 @@ func (t *mountTrait) mountResource(vols *[]corev1.Volume, 
mnts *[]corev1.VolumeM
 
*vols = append(*vols, *vol)
*mnts = append(*mnts, *mnt)
+
+   // User specified location file (only properties file)
+   if dstDir != "" {
+   if strings.HasSuffix(dstDir, ".properties") {
+   return []string{mntPath}, nil
+   }
+   return nil, nil
+   }
+
+   // We only process this for text configuration .properties files, never 
for resources
+   if conf.ContentType() == utilResource.ContentTypeText {
+   // the user asked to store the entire resource without 
specifying any filter
+   // we need to list all the resources belonging to the resource
+   if conf.StorageType() == utilResource.StorageTypeConfigmap {
+   cm := kubernetes.LookupConfigmap(e.Ctx, e.Client, 
e.Integration.Namespace, conf.Name())
+   if cm != nil {
+   for k := range cm.Data {
+   if strings.HasSuffix(k, ".properties") {
+   paths = append(paths, 
fmt.Sprintf("%s/%s", mntPath, k))
+   } else {
+   // Deprecated: use explicit 
configuration instead
+   envName := 
strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_"))
+   t.L.Infof(`Deprecation notice: 
the operator is adding the environment variable %s which will take runtime 
value from configmap.
+   This feature may disappear in 
future releases, make sure to use properties file in you configmap instead.`, 
envName)
+   propsAsEnv = append(propsAsEnv, 
corev1.EnvVar{
+   Name: envName,
+   ValueFrom: 
{
+   
ConfigMapKeyRef: {
+   
LocalObjectReference: corev1.LocalObjectReference{
+   
Name: cm.Name,
+   },
+   Key: k,
+   },
+   },
+   })
+   }
+   }
+   }
+   } else if conf.StorageType() == utilResource.StorageTypeSecret {
+   sec := kubernetes.LookupSecret(e.Ctx, e.Client, 
e.Integration.Namespace, conf.Name())
+   if sec != nil {
+   for k := range sec.Data {
+   if strings.HasSuffix(k, ".properties") {
+   paths = append(paths, 
fmt.Sprintf("%s/%s", mntPath, k))
+   } else {
+   // Deprecated: use explicit 
configuration instead
+   envName := 
strings.ToUpper(strings.ReplaceAll(strings.ReplaceAll(k, "-", "_"), ".", "_"))
+   t.L.Infof(`Deprecation notice: 
the operator is adding the environment variable %s which will take runtime 
value from secret.
+   This feature may disappear in 
future releases, make sure to use properties file in you secret instead.`, 
envName)
+   propsAsEnv = append(propsAsEnv, 
corev1.EnvVar{
+   Name: envName,
+   ValueFrom: 
{
+   SecretKeyRef: 
{
+   
LocalObjectReference: corev1.LocalObjectReference{
+   
Name: sec.Name,
+   },
+   Key: k,
+   },
+   },
+   })
+  

(camel-kamelets) 04/04: Added a Kafka Apicurio Sink secured with Keycloak Kamelet

2024-02-23 Thread acosentino
This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git

commit 1c00d673f03a7d6fba8fba0d959f9a406f801b5b
Author: Andrea Cosentino 
AuthorDate: Fri Feb 23 11:17:19 2024 +0100

Added a Kafka Apicurio Sink secured with Keycloak Kamelet

Signed-off-by: Andrea Cosentino 
---
 .../kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml  | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git 
a/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
 
b/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
index cfb05337..a816ff29 100644
--- 
a/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
+++ 
b/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
@@ -29,7 +29,7 @@ metadata:
 camel.apache.org/kamelet.type: "sink"
 spec:
   definition:
-title: "Kafka Not Secured with Apicurio Registry Sink  secured with 
Keycloak."
+title: "Kafka Not Secured with Apicurio Registry secured with Keycloak 
Sink"
 description: |-
   Send data to Kafka topics on an insecure broker with Apicurio Registry 
secured with Keycloak.
 



(camel-kamelets) 02/04: Added a Kafka Apicurio Sink secured with Keycloak Kamelet

2024-02-23 Thread acosentino
This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git

commit 8f71007eda47ff124dc5785e64bea347efdd8d34
Author: Andrea Cosentino 
AuthorDate: Fri Feb 23 11:15:31 2024 +0100

Added a Kafka Apicurio Sink secured with Keycloak Kamelet

Signed-off-by: Andrea Cosentino 
---
 ...not-secured-apicurio-registry-sink.kamelet.yaml | 162 +
 1 file changed, 162 insertions(+)

diff --git 
a/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
 
b/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
new file mode 100644
index ..cfb05337
--- /dev/null
+++ 
b/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
@@ -0,0 +1,162 @@
+# ---
+# Licensed to the Apache Software Foundation (ASF) under one or more
+# contributor license agreements.  See the NOTICE file distributed with
+# this work for additional information regarding copyright ownership.
+# The ASF licenses this file to You under the Apache License, Version 2.0
+# (the "License"); you may not use this file except in compliance with
+# the License.  You may obtain a copy of the License at
+#
+#  http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+# ---
+apiVersion: camel.apache.org/v1
+kind: Kamelet
+metadata:
+  name: kafka-not-secured-apicurio-registry-sink
+  annotations:
+camel.apache.org/kamelet.support.level: "Stable"
+camel.apache.org/catalog.version: "4.5.0-SNAPSHOT"
+camel.apache.org/kamelet.icon: 
"data:image/svg+xml;base64,PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0idXRmLTgiPz4NCjwhLS0gR2VuZXJhdG9yOiBBZG9iZSBJbGx1c3RyYXRvciAxOS4wLjAsIFNWRyBFeHBvcnQgUGx1Zy1JbiAuIFNWRyBWZXJzaW9uOiA2LjAwIEJ1aWxkIDApICAtLT4NCjxzdmcgdmVyc2lvbj0iMS4xIiBpZD0iTGF5ZXJfMSIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxuczp4bGluaz0iaHR0cDovL3d3dy53My5vcmcvMTk5OS94bGluayIgeD0iMHB4IiB5PSIwcHgiDQoJIHZpZXdCb3g9IjAgMCA1MDAgNTAwIiBzdHlsZT0iZW5hYmxlLWJhY2tncm91bmQ6bmV3IDAgMCA1MD
 [...]
+camel.apache.org/provider: "Apache Software Foundation"
+camel.apache.org/kamelet.group: "Kafka"
+camel.apache.org/kamelet.namespace: "Kafka"
+  labels:
+camel.apache.org/kamelet.type: "sink"
+spec:
+  definition:
+title: "Kafka Not Secured with Apicurio Registry Sink  secured with 
Keycloak."
+description: |-
+  Send data to Kafka topics on an insecure broker with Apicurio Registry 
secured with Keycloak.
+
+  The Kamelet is able to understand the following headers to be set:
+
+  - `key` / `ce-key`: as message key
+
+  - `partition-key` / `ce-partitionkey`: as message partition key
+
+  Both the headers are optional.
+
+  Three headers, if specified, will be deduplicated with different names, 
kafka.key will be duplicated into kafka.KEY, kafka.topic into kafka.TOPIC and 
kafka.override_topic into kafka.OVERRIDE_TOPIC
+required:
+  - topic
+  - bootstrapServers
+  - apicurioRegistryUrl
+  - apicurioAuthServiceUrl
+  - apicurioAuthRealm
+  - apicurioAuthClientId
+  - apicurioAuthClientSecret
+  - apicurioAuthUsername
+  - apicurioAuthPassword
+type: object
+properties:
+  topic:
+title: Topic Names
+description: Comma separated list of Kafka topic names
+type: string
+  bootstrapServers:
+title: Bootstrap Servers
+description: Comma separated list of Kafka Broker URLs
+type: string
+  valueSerializer:
+title: Value Serializer
+description: Serliazer class for value that implements the Serializer 
interface.
+type: string
+default: "io.apicurio.registry.serde.avro.AvroKafkaSerializer"
+  apicurioRegistryUrl:
+title: Apicurio Registry URL
+description: The Apicurio Schema Registry URL
+type: string
+x-descriptors:
+- urn:keda:metadata:apicurioRegistryUrl
+- urn:keda:required
+  avroDatumProvider:
+title: Avro Datum Provider
+description: How to write data with Avro
+type: string
+default: "io.apicurio.registry.serde.avro.ReflectAvroDatumProvider"
+  apicurioAuthServiceUrl:
+title: Apicurio Registry Auth Service URL
+description: The URL for Keycloak instance securing the Apicurio 
Registry
+type: string
+example: 

(camel-kamelets) 03/04: Added a Kafka Apicurio Sink secured with Keycloak Kamelet

2024-02-23 Thread acosentino
This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git

commit 6e46798c9273fbe0afe30955835be3ecfac4266b
Author: Andrea Cosentino 
AuthorDate: Fri Feb 23 11:19:12 2024 +0100

Added a Kafka Apicurio Sink secured with Keycloak Kamelet

Signed-off-by: Andrea Cosentino 
---
 docs/modules/ROOT/nav.adoc | 2 ++
 kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml | 2 +-
 2 files changed, 3 insertions(+), 1 deletion(-)

diff --git a/docs/modules/ROOT/nav.adoc b/docs/modules/ROOT/nav.adoc
index f2ef8333..9ef5e6db 100644
--- a/docs/modules/ROOT/nav.adoc
+++ b/docs/modules/ROOT/nav.adoc
@@ -134,6 +134,7 @@
 * xref:kafka-azure-schema-registry-sink.adoc[]
 * xref:kafka-azure-schema-registry-source.adoc[]
 * xref:kafka-batch-apicurio-registry-not-secured-source.adoc[]
+* xref:kafka-batch-apicurio-registry-source.adoc[]
 * xref:kafka-batch-azure-schema-registry-source.adoc[]
 * xref:kafka-batch-manual-commit-action.adoc[]
 * xref:kafka-batch-not-secured-source.adoc[]
@@ -141,6 +142,7 @@
 * xref:kafka-batch-source.adoc[]
 * xref:kafka-batch-ssl-source.adoc[]
 * xref:kafka-manual-commit-action.adoc[]
+* xref:kafka-not-secured-apicurio-registry-sink.adoc[]
 * xref:kafka-not-secured-apicurio-registry-source.adoc[]
 * xref:kafka-not-secured-sink.adoc[]
 * xref:kafka-not-secured-source.adoc[]
diff --git a/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml 
b/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
index cfb05337..a816ff29 100644
--- a/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
+++ b/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
@@ -29,7 +29,7 @@ metadata:
 camel.apache.org/kamelet.type: "sink"
 spec:
   definition:
-title: "Kafka Not Secured with Apicurio Registry Sink  secured with 
Keycloak."
+title: "Kafka Not Secured with Apicurio Registry secured with Keycloak 
Sink"
 description: |-
   Send data to Kafka topics on an insecure broker with Apicurio Registry 
secured with Keycloak.
 



(camel-kamelets) branch main updated (41fd1cab -> 1c00d673)

2024-02-23 Thread acosentino
This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a change to branch main
in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git


from 41fd1cab Regen for commit 899679e4d9a7d6e94bf1460c08b83566fe1b5b3f
 new 29abeb11 Added a Kafka Apicurio Sink secured with Keycloak Kamelet
 new 8f71007e Added a Kafka Apicurio Sink secured with Keycloak Kamelet
 new 6e46798c Added a Kafka Apicurio Sink secured with Keycloak Kamelet
 new 1c00d673 Added a Kafka Apicurio Sink secured with Keycloak Kamelet

The 4 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 docs/modules/ROOT/nav.adoc |  2 +
 ...ot-secured-apicurio-registry-sink.kamelet.yaml} | 53 --
 ...not-secured-apicurio-registry-sink.kamelet.yaml | 53 --
 3 files changed, 102 insertions(+), 6 deletions(-)
 copy kamelets/{kafka-apicurio-registry-not-secured-sink.kamelet.yaml => 
kafka-not-secured-apicurio-registry-sink.kamelet.yaml} (74%)
 copy kamelets/kafka-apicurio-registry-not-secured-sink.kamelet.yaml => 
library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
 (74%)



(camel-kamelets) 01/04: Added a Kafka Apicurio Sink secured with Keycloak Kamelet

2024-02-23 Thread acosentino
This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git

commit 29abeb110515f45d68b14bbdd1fe854279be358e
Author: Andrea Cosentino 
AuthorDate: Fri Feb 23 11:14:31 2024 +0100

Added a Kafka Apicurio Sink secured with Keycloak Kamelet

Signed-off-by: Andrea Cosentino 
---
 ...not-secured-apicurio-registry-sink.kamelet.yaml | 162 +
 1 file changed, 162 insertions(+)

diff --git a/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml 
b/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
new file mode 100644
index ..cfb05337
--- /dev/null
+++ b/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
@@ -0,0 +1,162 @@
+# ---
+# Licensed to the Apache Software Foundation (ASF) under one or more
+# contributor license agreements.  See the NOTICE file distributed with
+# this work for additional information regarding copyright ownership.
+# The ASF licenses this file to You under the Apache License, Version 2.0
+# (the "License"); you may not use this file except in compliance with
+# the License.  You may obtain a copy of the License at
+#
+#  http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+# ---
+apiVersion: camel.apache.org/v1
+kind: Kamelet
+metadata:
+  name: kafka-not-secured-apicurio-registry-sink
+  annotations:
+camel.apache.org/kamelet.support.level: "Stable"
+camel.apache.org/catalog.version: "4.5.0-SNAPSHOT"
+camel.apache.org/kamelet.icon: 
"data:image/svg+xml;base64,PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0idXRmLTgiPz4NCjwhLS0gR2VuZXJhdG9yOiBBZG9iZSBJbGx1c3RyYXRvciAxOS4wLjAsIFNWRyBFeHBvcnQgUGx1Zy1JbiAuIFNWRyBWZXJzaW9uOiA2LjAwIEJ1aWxkIDApICAtLT4NCjxzdmcgdmVyc2lvbj0iMS4xIiBpZD0iTGF5ZXJfMSIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxuczp4bGluaz0iaHR0cDovL3d3dy53My5vcmcvMTk5OS94bGluayIgeD0iMHB4IiB5PSIwcHgiDQoJIHZpZXdCb3g9IjAgMCA1MDAgNTAwIiBzdHlsZT0iZW5hYmxlLWJhY2tncm91bmQ6bmV3IDAgMCA1MD
 [...]
+camel.apache.org/provider: "Apache Software Foundation"
+camel.apache.org/kamelet.group: "Kafka"
+camel.apache.org/kamelet.namespace: "Kafka"
+  labels:
+camel.apache.org/kamelet.type: "sink"
+spec:
+  definition:
+title: "Kafka Not Secured with Apicurio Registry Sink  secured with 
Keycloak."
+description: |-
+  Send data to Kafka topics on an insecure broker with Apicurio Registry 
secured with Keycloak.
+
+  The Kamelet is able to understand the following headers to be set:
+
+  - `key` / `ce-key`: as message key
+
+  - `partition-key` / `ce-partitionkey`: as message partition key
+
+  Both the headers are optional.
+
+  Three headers, if specified, will be deduplicated with different names, 
kafka.key will be duplicated into kafka.KEY, kafka.topic into kafka.TOPIC and 
kafka.override_topic into kafka.OVERRIDE_TOPIC
+required:
+  - topic
+  - bootstrapServers
+  - apicurioRegistryUrl
+  - apicurioAuthServiceUrl
+  - apicurioAuthRealm
+  - apicurioAuthClientId
+  - apicurioAuthClientSecret
+  - apicurioAuthUsername
+  - apicurioAuthPassword
+type: object
+properties:
+  topic:
+title: Topic Names
+description: Comma separated list of Kafka topic names
+type: string
+  bootstrapServers:
+title: Bootstrap Servers
+description: Comma separated list of Kafka Broker URLs
+type: string
+  valueSerializer:
+title: Value Serializer
+description: Serliazer class for value that implements the Serializer 
interface.
+type: string
+default: "io.apicurio.registry.serde.avro.AvroKafkaSerializer"
+  apicurioRegistryUrl:
+title: Apicurio Registry URL
+description: The Apicurio Schema Registry URL
+type: string
+x-descriptors:
+- urn:keda:metadata:apicurioRegistryUrl
+- urn:keda:required
+  avroDatumProvider:
+title: Avro Datum Provider
+description: How to write data with Avro
+type: string
+default: "io.apicurio.registry.serde.avro.ReflectAvroDatumProvider"
+  apicurioAuthServiceUrl:
+title: Apicurio Registry Auth Service URL
+description: The URL for Keycloak instance securing the Apicurio 
Registry
+type: string
+example: "http://my-keycloak.com:8080/;
+  apicurioAuthRealm:
+title: Apicurio Registry Auth Realm
+description: The 

Re: [PR] Added a Kafka Apicurio Sink secured with Keycloak Kamelet [camel-kamelets]

2024-02-23 Thread via GitHub


oscerd merged PR #1919:
URL: https://github.com/apache/camel-kamelets/pull/1919


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



(camel-kamelets) branch regen_bot updated (e115d1de -> 41fd1cab)

2024-02-23 Thread github-bot
This is an automated email from the ASF dual-hosted git repository.

github-bot pushed a change to branch regen_bot
in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git


omit e115d1de Regen for commit 899679e4d9a7d6e94bf1460c08b83566fe1b5b3f
 add 41fd1cab Regen for commit 899679e4d9a7d6e94bf1460c08b83566fe1b5b3f

This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version.  This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:

 * -- * -- B -- O -- O -- O   (e115d1de)
\
 N -- N -- N   refs/heads/regen_bot (41fd1cab)

You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.

Any revisions marked "omit" are not gone; other references still
refer to them.  Any revisions marked "discard" are gone forever.

No new revisions were added by this update.

Summary of changes:



(camel-kamelets) branch 1916 updated (d5e1f74b -> b74ffef2)

2024-02-23 Thread acosentino
This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a change to branch 1916
in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git


 discard d5e1f74b Added a Kafka Apicurio Sink secured with Keycloak Kamelet
 discard 90d6168c Added a Kafka Apicurio Sink secured with Keycloak Kamelet
 discard 4dad5d40 Added a Kafka Apicurio Sink secured with Keycloak Kamelet
 discard 442fc02e Added a Kafka Apicurio Sink secured with Keycloak Kamelet
 add 41fd1cab Regen for commit 899679e4d9a7d6e94bf1460c08b83566fe1b5b3f
 add 7ec789b9 Added a Kafka Apicurio Sink secured with Keycloak Kamelet
 add 154b3325 Added a Kafka Apicurio Sink secured with Keycloak Kamelet
 add 69cc918d Added a Kafka Apicurio Sink secured with Keycloak Kamelet
 add b74ffef2 Added a Kafka Apicurio Sink secured with Keycloak Kamelet

This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version.  This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:

 * -- * -- B -- O -- O -- O   (d5e1f74b)
\
 N -- N -- N   refs/heads/1916 (b74ffef2)

You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.

Any revisions marked "omit" are not gone; other references still
refer to them.  Any revisions marked "discard" are gone forever.

No new revisions were added by this update.

Summary of changes:



Re: [PR] Generated sources regen [camel-kamelets]

2024-02-23 Thread via GitHub


oscerd merged PR #1918:
URL: https://github.com/apache/camel-kamelets/pull/1918


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



(camel-kamelets) branch main updated: Regen for commit 899679e4d9a7d6e94bf1460c08b83566fe1b5b3f

2024-02-23 Thread acosentino
This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git


The following commit(s) were added to refs/heads/main by this push:
 new 41fd1cab Regen for commit 899679e4d9a7d6e94bf1460c08b83566fe1b5b3f
41fd1cab is described below

commit 41fd1cab8912d65b045734503fb1f7f295cd6719
Author: oscerd 
AuthorDate: Fri Feb 23 10:08:58 2024 +

Regen for commit 899679e4d9a7d6e94bf1460c08b83566fe1b5b3f

Signed-off-by: GitHub 
---
 docs/modules/ROOT/nav.adoc | 1 +
 1 file changed, 1 insertion(+)

diff --git a/docs/modules/ROOT/nav.adoc b/docs/modules/ROOT/nav.adoc
index c8f6e470..f2ef8333 100644
--- a/docs/modules/ROOT/nav.adoc
+++ b/docs/modules/ROOT/nav.adoc
@@ -141,6 +141,7 @@
 * xref:kafka-batch-source.adoc[]
 * xref:kafka-batch-ssl-source.adoc[]
 * xref:kafka-manual-commit-action.adoc[]
+* xref:kafka-not-secured-apicurio-registry-source.adoc[]
 * xref:kafka-not-secured-sink.adoc[]
 * xref:kafka-not-secured-source.adoc[]
 * xref:kafka-scram-sink.adoc[]



(camel-kamelets) branch 1916 created (now d5e1f74b)

2024-02-23 Thread acosentino
This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a change to branch 1916
in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git


  at d5e1f74b Added a Kafka Apicurio Sink secured with Keycloak Kamelet

This branch includes the following new commits:

 new 442fc02e Added a Kafka Apicurio Sink secured with Keycloak Kamelet
 new 4dad5d40 Added a Kafka Apicurio Sink secured with Keycloak Kamelet
 new 90d6168c Added a Kafka Apicurio Sink secured with Keycloak Kamelet
 new d5e1f74b Added a Kafka Apicurio Sink secured with Keycloak Kamelet

The 4 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.




(camel-kamelets) 03/04: Added a Kafka Apicurio Sink secured with Keycloak Kamelet

2024-02-23 Thread acosentino
This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch 1916
in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git

commit 90d6168cc23dfb4fdb63f47916977dd76dae6b04
Author: Andrea Cosentino 
AuthorDate: Fri Feb 23 11:16:39 2024 +0100

Added a Kafka Apicurio Sink secured with Keycloak Kamelet

Signed-off-by: Andrea Cosentino 
---
 docs/modules/ROOT/nav.adoc | 3 +++
 kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml | 2 +-
 2 files changed, 4 insertions(+), 1 deletion(-)

diff --git a/docs/modules/ROOT/nav.adoc b/docs/modules/ROOT/nav.adoc
index c8f6e470..9ef5e6db 100644
--- a/docs/modules/ROOT/nav.adoc
+++ b/docs/modules/ROOT/nav.adoc
@@ -134,6 +134,7 @@
 * xref:kafka-azure-schema-registry-sink.adoc[]
 * xref:kafka-azure-schema-registry-source.adoc[]
 * xref:kafka-batch-apicurio-registry-not-secured-source.adoc[]
+* xref:kafka-batch-apicurio-registry-source.adoc[]
 * xref:kafka-batch-azure-schema-registry-source.adoc[]
 * xref:kafka-batch-manual-commit-action.adoc[]
 * xref:kafka-batch-not-secured-source.adoc[]
@@ -141,6 +142,8 @@
 * xref:kafka-batch-source.adoc[]
 * xref:kafka-batch-ssl-source.adoc[]
 * xref:kafka-manual-commit-action.adoc[]
+* xref:kafka-not-secured-apicurio-registry-sink.adoc[]
+* xref:kafka-not-secured-apicurio-registry-source.adoc[]
 * xref:kafka-not-secured-sink.adoc[]
 * xref:kafka-not-secured-source.adoc[]
 * xref:kafka-scram-sink.adoc[]
diff --git a/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml 
b/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
index cfb05337..a816ff29 100644
--- a/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
+++ b/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
@@ -29,7 +29,7 @@ metadata:
 camel.apache.org/kamelet.type: "sink"
 spec:
   definition:
-title: "Kafka Not Secured with Apicurio Registry Sink  secured with 
Keycloak."
+title: "Kafka Not Secured with Apicurio Registry secured with Keycloak 
Sink"
 description: |-
   Send data to Kafka topics on an insecure broker with Apicurio Registry 
secured with Keycloak.
 



(camel-kamelets) 02/04: Added a Kafka Apicurio Sink secured with Keycloak Kamelet

2024-02-23 Thread acosentino
This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch 1916
in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git

commit 4dad5d40eeb91cb7b15ce4eb4b0eb8cbbe81754e
Author: Andrea Cosentino 
AuthorDate: Fri Feb 23 11:15:31 2024 +0100

Added a Kafka Apicurio Sink secured with Keycloak Kamelet

Signed-off-by: Andrea Cosentino 
---
 ...not-secured-apicurio-registry-sink.kamelet.yaml | 162 +
 1 file changed, 162 insertions(+)

diff --git 
a/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
 
b/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
new file mode 100644
index ..cfb05337
--- /dev/null
+++ 
b/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
@@ -0,0 +1,162 @@
+# ---
+# Licensed to the Apache Software Foundation (ASF) under one or more
+# contributor license agreements.  See the NOTICE file distributed with
+# this work for additional information regarding copyright ownership.
+# The ASF licenses this file to You under the Apache License, Version 2.0
+# (the "License"); you may not use this file except in compliance with
+# the License.  You may obtain a copy of the License at
+#
+#  http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+# ---
+apiVersion: camel.apache.org/v1
+kind: Kamelet
+metadata:
+  name: kafka-not-secured-apicurio-registry-sink
+  annotations:
+camel.apache.org/kamelet.support.level: "Stable"
+camel.apache.org/catalog.version: "4.5.0-SNAPSHOT"
+camel.apache.org/kamelet.icon: 
"data:image/svg+xml;base64,PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0idXRmLTgiPz4NCjwhLS0gR2VuZXJhdG9yOiBBZG9iZSBJbGx1c3RyYXRvciAxOS4wLjAsIFNWRyBFeHBvcnQgUGx1Zy1JbiAuIFNWRyBWZXJzaW9uOiA2LjAwIEJ1aWxkIDApICAtLT4NCjxzdmcgdmVyc2lvbj0iMS4xIiBpZD0iTGF5ZXJfMSIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxuczp4bGluaz0iaHR0cDovL3d3dy53My5vcmcvMTk5OS94bGluayIgeD0iMHB4IiB5PSIwcHgiDQoJIHZpZXdCb3g9IjAgMCA1MDAgNTAwIiBzdHlsZT0iZW5hYmxlLWJhY2tncm91bmQ6bmV3IDAgMCA1MD
 [...]
+camel.apache.org/provider: "Apache Software Foundation"
+camel.apache.org/kamelet.group: "Kafka"
+camel.apache.org/kamelet.namespace: "Kafka"
+  labels:
+camel.apache.org/kamelet.type: "sink"
+spec:
+  definition:
+title: "Kafka Not Secured with Apicurio Registry Sink  secured with 
Keycloak."
+description: |-
+  Send data to Kafka topics on an insecure broker with Apicurio Registry 
secured with Keycloak.
+
+  The Kamelet is able to understand the following headers to be set:
+
+  - `key` / `ce-key`: as message key
+
+  - `partition-key` / `ce-partitionkey`: as message partition key
+
+  Both the headers are optional.
+
+  Three headers, if specified, will be deduplicated with different names, 
kafka.key will be duplicated into kafka.KEY, kafka.topic into kafka.TOPIC and 
kafka.override_topic into kafka.OVERRIDE_TOPIC
+required:
+  - topic
+  - bootstrapServers
+  - apicurioRegistryUrl
+  - apicurioAuthServiceUrl
+  - apicurioAuthRealm
+  - apicurioAuthClientId
+  - apicurioAuthClientSecret
+  - apicurioAuthUsername
+  - apicurioAuthPassword
+type: object
+properties:
+  topic:
+title: Topic Names
+description: Comma separated list of Kafka topic names
+type: string
+  bootstrapServers:
+title: Bootstrap Servers
+description: Comma separated list of Kafka Broker URLs
+type: string
+  valueSerializer:
+title: Value Serializer
+description: Serliazer class for value that implements the Serializer 
interface.
+type: string
+default: "io.apicurio.registry.serde.avro.AvroKafkaSerializer"
+  apicurioRegistryUrl:
+title: Apicurio Registry URL
+description: The Apicurio Schema Registry URL
+type: string
+x-descriptors:
+- urn:keda:metadata:apicurioRegistryUrl
+- urn:keda:required
+  avroDatumProvider:
+title: Avro Datum Provider
+description: How to write data with Avro
+type: string
+default: "io.apicurio.registry.serde.avro.ReflectAvroDatumProvider"
+  apicurioAuthServiceUrl:
+title: Apicurio Registry Auth Service URL
+description: The URL for Keycloak instance securing the Apicurio 
Registry
+type: string
+example: 

(camel-kamelets) 01/04: Added a Kafka Apicurio Sink secured with Keycloak Kamelet

2024-02-23 Thread acosentino
This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch 1916
in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git

commit 442fc02e3e502d71d7f9588475a853c338deb43f
Author: Andrea Cosentino 
AuthorDate: Fri Feb 23 11:14:31 2024 +0100

Added a Kafka Apicurio Sink secured with Keycloak Kamelet

Signed-off-by: Andrea Cosentino 
---
 ...not-secured-apicurio-registry-sink.kamelet.yaml | 162 +
 1 file changed, 162 insertions(+)

diff --git a/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml 
b/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
new file mode 100644
index ..cfb05337
--- /dev/null
+++ b/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
@@ -0,0 +1,162 @@
+# ---
+# Licensed to the Apache Software Foundation (ASF) under one or more
+# contributor license agreements.  See the NOTICE file distributed with
+# this work for additional information regarding copyright ownership.
+# The ASF licenses this file to You under the Apache License, Version 2.0
+# (the "License"); you may not use this file except in compliance with
+# the License.  You may obtain a copy of the License at
+#
+#  http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+# ---
+apiVersion: camel.apache.org/v1
+kind: Kamelet
+metadata:
+  name: kafka-not-secured-apicurio-registry-sink
+  annotations:
+camel.apache.org/kamelet.support.level: "Stable"
+camel.apache.org/catalog.version: "4.5.0-SNAPSHOT"
+camel.apache.org/kamelet.icon: 
"data:image/svg+xml;base64,PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0idXRmLTgiPz4NCjwhLS0gR2VuZXJhdG9yOiBBZG9iZSBJbGx1c3RyYXRvciAxOS4wLjAsIFNWRyBFeHBvcnQgUGx1Zy1JbiAuIFNWRyBWZXJzaW9uOiA2LjAwIEJ1aWxkIDApICAtLT4NCjxzdmcgdmVyc2lvbj0iMS4xIiBpZD0iTGF5ZXJfMSIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxuczp4bGluaz0iaHR0cDovL3d3dy53My5vcmcvMTk5OS94bGluayIgeD0iMHB4IiB5PSIwcHgiDQoJIHZpZXdCb3g9IjAgMCA1MDAgNTAwIiBzdHlsZT0iZW5hYmxlLWJhY2tncm91bmQ6bmV3IDAgMCA1MD
 [...]
+camel.apache.org/provider: "Apache Software Foundation"
+camel.apache.org/kamelet.group: "Kafka"
+camel.apache.org/kamelet.namespace: "Kafka"
+  labels:
+camel.apache.org/kamelet.type: "sink"
+spec:
+  definition:
+title: "Kafka Not Secured with Apicurio Registry Sink  secured with 
Keycloak."
+description: |-
+  Send data to Kafka topics on an insecure broker with Apicurio Registry 
secured with Keycloak.
+
+  The Kamelet is able to understand the following headers to be set:
+
+  - `key` / `ce-key`: as message key
+
+  - `partition-key` / `ce-partitionkey`: as message partition key
+
+  Both the headers are optional.
+
+  Three headers, if specified, will be deduplicated with different names, 
kafka.key will be duplicated into kafka.KEY, kafka.topic into kafka.TOPIC and 
kafka.override_topic into kafka.OVERRIDE_TOPIC
+required:
+  - topic
+  - bootstrapServers
+  - apicurioRegistryUrl
+  - apicurioAuthServiceUrl
+  - apicurioAuthRealm
+  - apicurioAuthClientId
+  - apicurioAuthClientSecret
+  - apicurioAuthUsername
+  - apicurioAuthPassword
+type: object
+properties:
+  topic:
+title: Topic Names
+description: Comma separated list of Kafka topic names
+type: string
+  bootstrapServers:
+title: Bootstrap Servers
+description: Comma separated list of Kafka Broker URLs
+type: string
+  valueSerializer:
+title: Value Serializer
+description: Serliazer class for value that implements the Serializer 
interface.
+type: string
+default: "io.apicurio.registry.serde.avro.AvroKafkaSerializer"
+  apicurioRegistryUrl:
+title: Apicurio Registry URL
+description: The Apicurio Schema Registry URL
+type: string
+x-descriptors:
+- urn:keda:metadata:apicurioRegistryUrl
+- urn:keda:required
+  avroDatumProvider:
+title: Avro Datum Provider
+description: How to write data with Avro
+type: string
+default: "io.apicurio.registry.serde.avro.ReflectAvroDatumProvider"
+  apicurioAuthServiceUrl:
+title: Apicurio Registry Auth Service URL
+description: The URL for Keycloak instance securing the Apicurio 
Registry
+type: string
+example: "http://my-keycloak.com:8080/;
+  apicurioAuthRealm:
+title: Apicurio Registry Auth Realm
+description: The 

(camel-kamelets) 04/04: Added a Kafka Apicurio Sink secured with Keycloak Kamelet

2024-02-23 Thread acosentino
This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch 1916
in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git

commit d5e1f74b57e2aa9c25a29b8737db7b3a8d7d1069
Author: Andrea Cosentino 
AuthorDate: Fri Feb 23 11:17:19 2024 +0100

Added a Kafka Apicurio Sink secured with Keycloak Kamelet

Signed-off-by: Andrea Cosentino 
---
 .../kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml  | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git 
a/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
 
b/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
index cfb05337..a816ff29 100644
--- 
a/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
+++ 
b/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-sink.kamelet.yaml
@@ -29,7 +29,7 @@ metadata:
 camel.apache.org/kamelet.type: "sink"
 spec:
   definition:
-title: "Kafka Not Secured with Apicurio Registry Sink  secured with 
Keycloak."
+title: "Kafka Not Secured with Apicurio Registry secured with Keycloak 
Sink"
 description: |-
   Send data to Kafka topics on an insecure broker with Apicurio Registry 
secured with Keycloak.
 



[PR] Added a Kafka Apicurio Sink secured with Keycloak Kamelet [camel-kamelets]

2024-02-23 Thread via GitHub


oscerd opened a new pull request, #1919:
URL: https://github.com/apache/camel-kamelets/pull/1919

   (no comment)


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



Re: [PR] feat(runtime): get rid off camel k runtime dependency - WIP [camel-k]

2024-02-23 Thread via GitHub


github-actions[bot] commented on PR #5090:
URL: https://github.com/apache/camel-k/pull/5090#issuecomment-1961057814

   :heavy_check_mark: Unit test coverage report - coverage increased from 35.8% 
to 37.9% (**+2.1%**)


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



[PR] Generated sources regen [camel-kamelets]

2024-02-23 Thread via GitHub


github-actions[bot] opened a new pull request, #1918:
URL: https://github.com/apache/camel-kamelets/pull/1918

   Regen bot :robot: found some uncommited changes after running build on 
:camel: kamelets main.
   Please do not delete `regen_bot` branch after merge/rebase.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



(camel-kamelets) branch regen_bot updated (f5ceac1b -> e115d1de)

2024-02-23 Thread github-bot
This is an automated email from the ASF dual-hosted git repository.

github-bot pushed a change to branch regen_bot
in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git


from f5ceac1b Snowflake Sink Kamelet: Fixed database name description
 add 2f290dea Updated CHANGELOG.md
 add 4f65c8d5 Added a Kafka Apicurio Source secured with Keycloak Kamelet
 add 07e45f3d Added a Kafka Apicurio Source secured with Keycloak Kamelet
 add 899679e4 Added a Kafka Apicurio Source secured with Keycloak Kamelet
 add e115d1de Regen for commit 899679e4d9a7d6e94bf1460c08b83566fe1b5b3f

No new revisions were added by this update.

Summary of changes:
 CHANGELOG.md   |  8 
 docs/modules/ROOT/nav.adoc |  1 +
 ...-secured-apicurio-registry-source.kamelet.yaml} | 53 --
 ...t-secured-apicurio-registry-source.kamelet.yaml | 53 --
 4 files changed, 109 insertions(+), 6 deletions(-)
 copy kamelets/{kafka-apicurio-registry-not-secured-source.kamelet.yaml => 
kafka-not-secured-apicurio-registry-source.kamelet.yaml} (77%)
 copy kamelets/kafka-apicurio-registry-not-secured-source.kamelet.yaml => 
library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml
 (77%)



Re: [PR] [chore] improve metrics for integration [camel-k]

2024-02-23 Thread via GitHub


squakez commented on PR #5154:
URL: https://github.com/apache/camel-k/pull/5154#issuecomment-1961048212

   @gansheer please, rebase against `main` as we have fixed the errored check.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



(camel-kamelets) 03/03: Added a Kafka Apicurio Source secured with Keycloak Kamelet

2024-02-23 Thread acosentino
This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git

commit 899679e4d9a7d6e94bf1460c08b83566fe1b5b3f
Author: Andrea Cosentino 
AuthorDate: Fri Feb 23 10:58:59 2024 +0100

Added a Kafka Apicurio Source secured with Keycloak Kamelet

Signed-off-by: Andrea Cosentino 
---
 ...t-secured-apicurio-registry-source.kamelet.yaml | 182 +
 1 file changed, 182 insertions(+)

diff --git 
a/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml
 
b/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml
new file mode 100644
index ..657de996
--- /dev/null
+++ 
b/library/camel-kamelets/src/main/resources/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml
@@ -0,0 +1,182 @@
+# ---
+# Licensed to the Apache Software Foundation (ASF) under one or more
+# contributor license agreements.  See the NOTICE file distributed with
+# this work for additional information regarding copyright ownership.
+# The ASF licenses this file to You under the Apache License, Version 2.0
+# (the "License"); you may not use this file except in compliance with
+# the License.  You may obtain a copy of the License at
+#
+#  http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+# ---
+apiVersion: camel.apache.org/v1
+kind: Kamelet
+metadata:
+  name: kafka-not-secured-apicurio-registry-source
+  annotations:
+camel.apache.org/kamelet.support.level: "Preview"
+camel.apache.org/catalog.version: "4.5.0-SNAPSHOT"
+camel.apache.org/kamelet.icon: 
"data:image/svg+xml;base64,PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0idXRmLTgiPz4NCjwhLS0gR2VuZXJhdG9yOiBBZG9iZSBJbGx1c3RyYXRvciAxOS4wLjAsIFNWRyBFeHBvcnQgUGx1Zy1JbiAuIFNWRyBWZXJzaW9uOiA2LjAwIEJ1aWxkIDApICAtLT4NCjxzdmcgdmVyc2lvbj0iMS4xIiBpZD0iTGF5ZXJfMSIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxuczp4bGluaz0iaHR0cDovL3d3dy53My5vcmcvMTk5OS94bGluayIgeD0iMHB4IiB5PSIwcHgiDQoJIHZpZXdCb3g9IjAgMCA1MDAgNTAwIiBzdHlsZT0iZW5hYmxlLWJhY2tncm91bmQ6bmV3IDAgMCA1MD
 [...]
+camel.apache.org/provider: "Apache Software Foundation"
+camel.apache.org/kamelet.group: "Kafka"
+camel.apache.org/kamelet.namespace: "Kafka"
+camel.apache.org/keda.type: "kafka"
+  labels:
+camel.apache.org/kamelet.type: "source"
+spec:
+  definition:
+title: "Kafka not secured with Apicurio Registry secured with Keycloak 
Source"
+description: |-
+  Receive data from Kafka topics on an insecure broker combined with 
Apicurio Registry secured with Keycloak.
+required:
+  - topic
+  - bootstrapServers
+  - apicurioRegistryUrl
+  - apicurioAuthServiceUrl
+  - apicurioAuthRealm
+  - apicurioAuthClientId
+  - apicurioAuthClientSecret
+  - apicurioAuthUsername
+  - apicurioAuthPassword
+type: object
+properties:
+  topic:
+title: Topic Names
+description: Comma separated list of Kafka topic names
+type: string
+x-descriptors:
+- urn:keda:metadata:topic
+- urn:keda:required
+  bootstrapServers:
+title: Bootstrap Servers
+description: Comma separated list of Kafka Broker URLs
+type: string
+x-descriptors:
+- urn:keda:metadata:bootstrapServers
+- urn:keda:required
+  autoCommitEnable:
+title: Auto Commit Enable
+description: If true, periodically commit to ZooKeeper the offset of 
messages already fetched by the consumer
+type: boolean
+default: true
+  allowManualCommit:
+title: Allow Manual Commit
+description: Whether to allow doing manual commits
+type: boolean
+default: false
+  pollOnError:
+title: Poll On Error Behavior
+description: What to do if kafka threw an exception while polling for 
new messages. There are 5 enums and the value can be one of DISCARD, 
ERROR_HANDLER, RECONNECT, RETRY, STOP
+type: string
+default: "ERROR_HANDLER"
+  autoOffsetReset:
+title: Auto Offset Reset
+description: What to do when there is no initial offset. There are 3 
enums and the value can be one of latest, earliest, none
+type: string
+default: "latest"
+x-descriptors:
+- urn:keda:metadata:offsetResetPolicy
+  consumerGroup:
+title: Consumer Group
+description: A string 

(camel-kamelets) 01/03: Added a Kafka Apicurio Source secured with Keycloak Kamelet

2024-02-23 Thread acosentino
This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git

commit 4f65c8d5b50399b627274c3c9d5522746fffbe0d
Author: Andrea Cosentino 
AuthorDate: Fri Feb 23 10:56:31 2024 +0100

Added a Kafka Apicurio Source secured with Keycloak Kamelet

Signed-off-by: Andrea Cosentino 
---
 ...t-secured-apicurio-registry-source.kamelet.yaml | 182 +
 1 file changed, 182 insertions(+)

diff --git a/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml 
b/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml
new file mode 100644
index ..bbea5e40
--- /dev/null
+++ b/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml
@@ -0,0 +1,182 @@
+# ---
+# Licensed to the Apache Software Foundation (ASF) under one or more
+# contributor license agreements.  See the NOTICE file distributed with
+# this work for additional information regarding copyright ownership.
+# The ASF licenses this file to You under the Apache License, Version 2.0
+# (the "License"); you may not use this file except in compliance with
+# the License.  You may obtain a copy of the License at
+#
+#  http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+# ---
+apiVersion: camel.apache.org/v1
+kind: Kamelet
+metadata:
+  name: kafka-not-secured-apicurio-registry-source
+  annotations:
+camel.apache.org/kamelet.support.level: "Preview"
+camel.apache.org/catalog.version: "4.4.0"
+camel.apache.org/kamelet.icon: 
"data:image/svg+xml;base64,PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0idXRmLTgiPz4NCjwhLS0gR2VuZXJhdG9yOiBBZG9iZSBJbGx1c3RyYXRvciAxOS4wLjAsIFNWRyBFeHBvcnQgUGx1Zy1JbiAuIFNWRyBWZXJzaW9uOiA2LjAwIEJ1aWxkIDApICAtLT4NCjxzdmcgdmVyc2lvbj0iMS4xIiBpZD0iTGF5ZXJfMSIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxuczp4bGluaz0iaHR0cDovL3d3dy53My5vcmcvMTk5OS94bGluayIgeD0iMHB4IiB5PSIwcHgiDQoJIHZpZXdCb3g9IjAgMCA1MDAgNTAwIiBzdHlsZT0iZW5hYmxlLWJhY2tncm91bmQ6bmV3IDAgMCA1MD
 [...]
+camel.apache.org/provider: "Apache Software Foundation"
+camel.apache.org/kamelet.group: "Kafka"
+camel.apache.org/kamelet.namespace: "Kafka"
+camel.apache.org/keda.type: "kafka"
+  labels:
+camel.apache.org/kamelet.type: "source"
+spec:
+  definition:
+title: "Kafka not secured with Apicurio Registry secured with Keycloak 
Source"
+description: |-
+  Receive data from Kafka topics on an insecure broker combined with 
Apicurio Registry secured with Keycloak.
+required:
+  - topic
+  - bootstrapServers
+  - apicurioRegistryUrl
+  - apicurioAuthServiceUrl
+  - apicurioAuthRealm
+  - apicurioAuthClientId
+  - apicurioAuthClientSecret
+  - apicurioAuthUsername
+  - apicurioAuthPassword
+type: object
+properties:
+  topic:
+title: Topic Names
+description: Comma separated list of Kafka topic names
+type: string
+x-descriptors:
+- urn:keda:metadata:topic
+- urn:keda:required
+  bootstrapServers:
+title: Bootstrap Servers
+description: Comma separated list of Kafka Broker URLs
+type: string
+x-descriptors:
+- urn:keda:metadata:bootstrapServers
+- urn:keda:required
+  autoCommitEnable:
+title: Auto Commit Enable
+description: If true, periodically commit to ZooKeeper the offset of 
messages already fetched by the consumer
+type: boolean
+default: true
+  allowManualCommit:
+title: Allow Manual Commit
+description: Whether to allow doing manual commits
+type: boolean
+default: false
+  pollOnError:
+title: Poll On Error Behavior
+description: What to do if kafka threw an exception while polling for 
new messages. There are 5 enums and the value can be one of DISCARD, 
ERROR_HANDLER, RECONNECT, RETRY, STOP
+type: string
+default: "ERROR_HANDLER"
+  autoOffsetReset:
+title: Auto Offset Reset
+description: What to do when there is no initial offset. There are 3 
enums and the value can be one of latest, earliest, none
+type: string
+default: "latest"
+x-descriptors:
+- urn:keda:metadata:offsetResetPolicy
+  consumerGroup:
+title: Consumer Group
+description: A string that uniquely identifies the group of consumers 
to which this source belongs
+type: string
+example: "my-group-id"
+  

(camel-kamelets) 02/03: Added a Kafka Apicurio Source secured with Keycloak Kamelet

2024-02-23 Thread acosentino
This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git

commit 07e45f3d01345d01c3619da0847cf539bd411339
Author: Andrea Cosentino 
AuthorDate: Fri Feb 23 10:57:57 2024 +0100

Added a Kafka Apicurio Source secured with Keycloak Kamelet

Signed-off-by: Andrea Cosentino 
---
 kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml 
b/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml
index bbea5e40..657de996 100644
--- a/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml
+++ b/kamelets/kafka-not-secured-apicurio-registry-source.kamelet.yaml
@@ -20,7 +20,7 @@ metadata:
   name: kafka-not-secured-apicurio-registry-source
   annotations:
 camel.apache.org/kamelet.support.level: "Preview"
-camel.apache.org/catalog.version: "4.4.0"
+camel.apache.org/catalog.version: "4.5.0-SNAPSHOT"
 camel.apache.org/kamelet.icon: 
"data:image/svg+xml;base64,PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0idXRmLTgiPz4NCjwhLS0gR2VuZXJhdG9yOiBBZG9iZSBJbGx1c3RyYXRvciAxOS4wLjAsIFNWRyBFeHBvcnQgUGx1Zy1JbiAuIFNWRyBWZXJzaW9uOiA2LjAwIEJ1aWxkIDApICAtLT4NCjxzdmcgdmVyc2lvbj0iMS4xIiBpZD0iTGF5ZXJfMSIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxuczp4bGluaz0iaHR0cDovL3d3dy53My5vcmcvMTk5OS94bGluayIgeD0iMHB4IiB5PSIwcHgiDQoJIHZpZXdCb3g9IjAgMCA1MDAgNTAwIiBzdHlsZT0iZW5hYmxlLWJhY2tncm91bmQ6bmV3IDAgMCA1MD
 [...]
 camel.apache.org/provider: "Apache Software Foundation"
 camel.apache.org/kamelet.group: "Kafka"
@@ -147,7 +147,7 @@ spec:
 - urn:keda:authentication:password
 - urn:keda:required
   dependencies:
-- "mvn:org.apache.camel.kamelets:camel-kamelets-utils:4.4.0"
+- "mvn:org.apache.camel.kamelets:camel-kamelets-utils:4.5.0-SNAPSHOT"
 - "camel:kafka"
 - "camel:core"
 - "camel:kamelet"



Re: [I] Kafka Schema Registries: Support authentication mechanisms for Apicurio Registry [camel-kamelets]

2024-02-23 Thread via GitHub


oscerd closed issue #1684: Kafka Schema Registries: Support authentication 
mechanisms for Apicurio Registry
URL: https://github.com/apache/camel-kamelets/issues/1684


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



  1   2   >