CAMEL-21812: camel-jbang - Provide an option in camel k8s to trust a … #17416
+260
−56
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
…given cert
https://issues.apache.org/jira/browse/CAMEL-21812
With this change, containers now use an enhanced version of run-java.sh (which we have had in jbang-core templates) as entrypoint for all runtimes.
The entrypoint (run-java.sh) now supports SSL_TRUSTSTORE_CERTIFICATES which you may already know from the Strimzi Kafka image.
When using
jbang camel kubernetes
you add certificates that you want the resulting java process to trust the set of input files and either use the SSL_TRUSTSTORE_CERTIFICATES envar directly or use--property=ssl.truststore.certificates=...
which will then map to that envar.For eaxmple like this
run-java.sh adds the given certificates to the truststore on startup.
Beyond camel-oauth, this generally gives our jbang generated images the ability to connect to arbitrary endpoints with TLS. When needed this could also move a layer down, such that it is generally supported in jbang camel (not limited to containers)