AWS Key Management Service (KMS)
Since Camel 3.1
Only producer is supported
The AWS2 KMS component supports the ability to work with keys stored in AWS KMS instances.
Prerequisites
You must have a valid Amazon Web Services developer account, and be signed up to use Amazon KMS. More information is available at Amazon KMS.
The AWS2 KMS component is not supported in OSGI |
URI Format
aws2-kms://label[?options]
You can append query options to the URI in the following format, ?options=value&option2=value&…
URI Options
The AWS Key Management Service (KMS) component supports 16 options, which are listed below.
Name | Description | Default | Type |
---|---|---|---|
configuration (producer) |
Component configuration |
KMS2Configuration |
|
kmsClient (producer) |
Autowired To use a existing configured AWS KMS as client |
KmsClient |
|
lazyStartProducer (producer) |
Whether the producer should be started lazy (on the first message). By starting lazy you can use this to allow CamelContext and routes to startup in situations where a producer may otherwise fail during starting and cause the route to fail being started. By deferring this startup to be lazy then the startup failure can be handled during routing messages via Camel’s routing error handlers. Beware that when the first message is processed then creating and starting the producer may take a little time and prolong the total processing time of the processing. |
false |
boolean |
operation (producer) |
Required The operation to perform. There are 6 enums and the value can be one of: listKeys, createKey, disableKey, scheduleKeyDeletion, describeKey, enableKey |
KMS2Operations |
|
overrideEndpoint (producer) |
Set the need for overidding the endpoint. This option needs to be used in combination with uriEndpointOverride option |
false |
boolean |
pojoRequest (producer) |
If we want to use a POJO request as body or not |
false |
boolean |
proxyHost (producer) |
To define a proxy host when instantiating the KMS client |
String |
|
proxyPort (producer) |
To define a proxy port when instantiating the KMS client |
Integer |
|
proxyProtocol (producer) |
To define a proxy protocol when instantiating the KMS client. There are 2 enums and the value can be one of: HTTP, HTTPS |
HTTPS |
Protocol |
region (producer) |
The region in which EKS client needs to work. When using this parameter, the configuration will expect the lowercase name of the region (for example ap-east-1) You’ll need to use the name Region.EU_WEST_1.id() |
String |
|
trustAllCertificates (producer) |
If we want to trust all certificates in case of overriding the endpoint |
false |
boolean |
uriEndpointOverride (producer) |
Set the overriding uri endpoint. This option needs to be used in combination with overrideEndpoint option |
String |
|
useDefaultCredentialsProvider (producer) |
Set whether the KMS client should expect to load credentials through a default credentials provider or to expect static credentials to be passed in. |
false |
boolean |
autowiredEnabled (advanced) |
Whether autowiring is enabled. This is used for automatic autowiring options (the option must be marked as autowired) by looking up in the registry to find if there is a single instance of matching type, which then gets configured on the component. This can be used for automatic configuring JDBC data sources, JMS connection factories, AWS Clients, etc. |
true |
boolean |
accessKey (security) |
Amazon AWS Access Key |
String |
|
secretKey (security) |
Amazon AWS Secret Key |
String |
The AWS Key Management Service (KMS) endpoint is configured using URI syntax:
aws2-kms:label
with the following path and query parameters:
Query Parameters (14 parameters):
Name | Description | Default | Type |
---|---|---|---|
kmsClient (producer) |
Autowired To use a existing configured AWS KMS as client |
KmsClient |
|
lazyStartProducer (producer) |
Whether the producer should be started lazy (on the first message). By starting lazy you can use this to allow CamelContext and routes to startup in situations where a producer may otherwise fail during starting and cause the route to fail being started. By deferring this startup to be lazy then the startup failure can be handled during routing messages via Camel’s routing error handlers. Beware that when the first message is processed then creating and starting the producer may take a little time and prolong the total processing time of the processing. |
false |
boolean |
operation (producer) |
Required The operation to perform. There are 6 enums and the value can be one of: listKeys, createKey, disableKey, scheduleKeyDeletion, describeKey, enableKey |
KMS2Operations |
|
overrideEndpoint (producer) |
Set the need for overidding the endpoint. This option needs to be used in combination with uriEndpointOverride option |
false |
boolean |
pojoRequest (producer) |
If we want to use a POJO request as body or not |
false |
boolean |
proxyHost (producer) |
To define a proxy host when instantiating the KMS client |
String |
|
proxyPort (producer) |
To define a proxy port when instantiating the KMS client |
Integer |
|
proxyProtocol (producer) |
To define a proxy protocol when instantiating the KMS client. There are 2 enums and the value can be one of: HTTP, HTTPS |
HTTPS |
Protocol |
region (producer) |
The region in which EKS client needs to work. When using this parameter, the configuration will expect the lowercase name of the region (for example ap-east-1) You’ll need to use the name Region.EU_WEST_1.id() |
String |
|
trustAllCertificates (producer) |
If we want to trust all certificates in case of overriding the endpoint |
false |
boolean |
uriEndpointOverride (producer) |
Set the overriding uri endpoint. This option needs to be used in combination with overrideEndpoint option |
String |
|
useDefaultCredentialsProvider (producer) |
Set whether the KMS client should expect to load credentials through a default credentials provider or to expect static credentials to be passed in. |
false |
boolean |
accessKey (security) |
Amazon AWS Access Key |
String |
|
secretKey (security) |
Amazon AWS Secret Key |
String |
Required KMS component options
You have to provide the amazonKmsClient in the Registry or your accessKey and secretKey to access the Amazon KMS service.
Usage
Static credentials vs Default Credential Provider
You have the possibility of avoiding the usage of explicit static credentials, by specifying the useDefaultCredentialsProvider option and set it to true.
-
Java system properties - aws.accessKeyId and aws.secretKey
-
Environment variables - AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY.
-
Web Identity Token from AWS STS.
-
The shared credentials and config files.
-
Amazon ECS container credentials - loaded from the Amazon ECS if the environment variable AWS_CONTAINER_CREDENTIALS_RELATIVE_URI is set.
-
Amazon EC2 Instance profile credentials.
For more information about this you can look at AWS credentials documentation
Message headers evaluated by the KMS producer
Header | Type | Description |
---|---|---|
|
|
The limit number of keys to return while performing a listKeys operation |
|
|
The operation we want to perform |
|
|
A key description to use while performing a createKey operation |
|
|
The key Id |
Producer Examples
-
listKeys: this operation will list the available keys in KMS
from("direct:listKeys")
.to("aws2-kms://test?kmsClient=#amazonKmsClient&operation=listKeys")
-
createKey: this operation will create a key in KMS
from("direct:createKey")
.to("aws2-kms://test?kmsClient=#amazonKmsClient&operation=createKey")
-
disableKey: this operation will disable a key in KMS
from("direct:disableKey")
.setHeader(KMS2Constants.KEY_ID, constant("123")
.to("aws2-kms://test?kmsClient=#amazonKmsClient&operation=disableKey")
-
enableKey: this operation will enable a key in KMS
from("direct:enableKey")
.setHeader(KMS2Constants.KEY_ID, constant("123")
.to("aws2-kms://test?kmsClient=#amazonKmsClient&operation=enableKey")
Using a POJO as body
Sometimes build an AWS Request can be complex, because of multiple options. We introduce the possibility to use a POJO as body. In AWS KMS there are multiple operations you can submit, as an example for List keys request, you can do something like:
from("direct:createUser") .setBody(ListKeysRequest.builder().limit(10).build()) .to("aws2-kms://test?kmsClient=#amazonKmsClient&operation=listKeys&pojoRequest=true")
In this way you’ll pass the request directly without the need of passing headers and options specifically related to this operation.
Dependencies
Maven users will need to add the following dependency to their pom.xml.
pom.xml
<dependency>
<groupId>org.apache.camel</groupId>
<artifactId>camel-aws2-kms</artifactId>
<version>${camel-version}</version>
</dependency>
where ${camel-version}
must be replaced by the actual version of Camel.
Spring Boot Auto-Configuration
When using aws2-kms with Spring Boot make sure to use the following Maven dependency to have support for auto configuration:
<dependency>
<groupId>org.apache.camel.springboot</groupId>
<artifactId>camel-aws2-kms-starter</artifactId>
<version>x.x.x</version>
<!-- use the same version as your Camel core version -->
</dependency>
The component supports 17 options, which are listed below.
Name | Description | Default | Type |
---|---|---|---|
camel.component.aws2-kms.access-key |
Amazon AWS Access Key |
String |
|
camel.component.aws2-kms.autowired-enabled |
Whether autowiring is enabled. This is used for automatic autowiring options (the option must be marked as autowired) by looking up in the registry to find if there is a single instance of matching type, which then gets configured on the component. This can be used for automatic configuring JDBC data sources, JMS connection factories, AWS Clients, etc. |
true |
Boolean |
camel.component.aws2-kms.configuration |
Component configuration. The option is a org.apache.camel.component.aws2.kms.KMS2Configuration type. |
KMS2Configuration |
|
camel.component.aws2-kms.enabled |
Whether to enable auto configuration of the aws2-kms component. This is enabled by default. |
Boolean |
|
camel.component.aws2-kms.kms-client |
To use a existing configured AWS KMS as client. The option is a software.amazon.awssdk.services.kms.KmsClient type. |
KmsClient |
|
camel.component.aws2-kms.lazy-start-producer |
Whether the producer should be started lazy (on the first message). By starting lazy you can use this to allow CamelContext and routes to startup in situations where a producer may otherwise fail during starting and cause the route to fail being started. By deferring this startup to be lazy then the startup failure can be handled during routing messages via Camel’s routing error handlers. Beware that when the first message is processed then creating and starting the producer may take a little time and prolong the total processing time of the processing. |
false |
Boolean |
camel.component.aws2-kms.operation |
The operation to perform |
KMS2Operations |
|
camel.component.aws2-kms.override-endpoint |
Set the need for overidding the endpoint. This option needs to be used in combination with uriEndpointOverride option |
false |
Boolean |
camel.component.aws2-kms.pojo-request |
If we want to use a POJO request as body or not |
false |
Boolean |
camel.component.aws2-kms.proxy-host |
To define a proxy host when instantiating the KMS client |
String |
|
camel.component.aws2-kms.proxy-port |
To define a proxy port when instantiating the KMS client |
Integer |
|
camel.component.aws2-kms.proxy-protocol |
To define a proxy protocol when instantiating the KMS client |
Protocol |
|
camel.component.aws2-kms.region |
The region in which EKS client needs to work. When using this parameter, the configuration will expect the lowercase name of the region (for example ap-east-1) You’ll need to use the name Region.EU_WEST_1.id() |
String |
|
camel.component.aws2-kms.secret-key |
Amazon AWS Secret Key |
String |
|
camel.component.aws2-kms.trust-all-certificates |
If we want to trust all certificates in case of overriding the endpoint |
false |
Boolean |
camel.component.aws2-kms.uri-endpoint-override |
Set the overriding uri endpoint. This option needs to be used in combination with overrideEndpoint option |
String |
|
camel.component.aws2-kms.use-default-credentials-provider |
Set whether the KMS client should expect to load credentials through a default credentials provider or to expect static credentials to be passed in. |
false |
Boolean |