Configuring Maven
Camel K builds are performed by Maven. For this reason it may requires certain Maven best practices that will make your application to run faster, more secure and more resiliently. The Maven configuration is defined at IntegrationPlatform level. Have a look at the following sections to discover how to configure Maven in Camel K.
Maven Repository Manager (Proxy)
The first best practice we suggest is to provide a Maven Repository Manager that acts as an intermediary between the cluster and the various artifacts repositories that may be required by Camel K.
If your company has already one available in the cluster, you should use it. If not, we suggest you to take the opportunity and run a Maven proxy beside your Camel K operator. There are many benefits by introducing a proxy, above all the reduction in the time required to download dependencies (which are cached in the proxy) and inherently the egress bandwidth cost saving.
You can create a settings.xml
file as illustred below:
<settings xmlns="http://maven.apache.org/SETTINGS/1.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/SETTINGS/1.0.0 https://maven.apache.org/xsd/settings-1.0.0.xsd">
<mirrors>
<mirror>
<id>camel-k-maven-repository-manager</id>
<name>Maven Repository Manager</name>
<url>MAVEN_PROXY_URL[:MAVEN_PROXY_PORT]/</url>
<mirrorOf>*</mirrorOf>
</mirror>
</mirrors>
</settings>
You can use any id or name. What’s important is the location where to expect the service and the mirrorOf
configuration which specifies that this service acts as a proxy for any repository required by the operator build. See the next paragraph to learn how to apply this configuration to your Camel K operator.
Maven Settings
In general you can tune Maven with any parameter expected by settings.xml
configuration file. Once you have the file ready you can create a Configmap or a Secret in order to use it in your Camel K installation:
kubectl create cm my-maven-proxy --from-file settings.xml
Once the Configmap/Secret is ready, then, you can configure it in your Camel K operator directly at installation time (see specific installation method details). The ConfigMap or Secret can then be also referenced in the IntegrationPlatform resource, from the spec.build.maven.settings
field, e.g.:
apiVersion: camel.apache.org/v1
kind: IntegrationPlatform
metadata:
name: camel-k
spec:
build:
maven:
settings:
configMapKeyRef:
key: settings.xml
name: maven-settings
This last method is useful when you introduce any configuration while Camel K operator is running (it won’t require a restart).
Maven Settings Security
If your project also requires a Maven Settings Security in a settings-security.xml
file (as described in the official Maven Password Encryption guide), you can create a ConfigMap or Secret for that file
$ kubectl create configmap maven-settings-security --from-file=settings-security.xml
and reference it in the IntegrationPlatform resource:
apiVersion: camel.apache.org/v1
kind: IntegrationPlatform
metadata:
name: camel-k
spec:
build:
maven:
settings:
configMapKeyRef:
key: settings.xml
name: maven-settings
settingsSecurity:
configMapKeyRef:
key: settings-security.xml
name: maven-settings-security
The IntegrationPlatform resource can be edited directly, to reference the ConfigMap(s) or the Secret(s) that contains the Maven settings and settings security, e.g.:
$ kubectl edit ip camel-k
HTTP Proxy
HTTP proxy can be configured on the Camel K operator Deployment, with the usual HTTP_PROXY
, HTTPS_PROXY
, and NO_PROXY
environment variables.
The operator automatically configures Maven according to the values of these variables.
See the HTTP proxy documentation for more details.
The generated configuration can be overwritten in the Maven Settings if necessary.
CA Certificates
The CA certificates, used by the Maven commands to connect to the remote Maven repositories, can be provided in a Secret.
The kubectl
CLI provides a convenient command, to create a Secret from a file, e.g.:
$ kubectl create secret generic maven-ca-certs --from-file=ca.crt
The Secret can contain X.509 certificates, and PKCS#7 formatted certificate chains. A JKS formatted keystore is automatically created to store the CA certificate(s), and configured to be used as a trusted certificate(s) by the Maven commands. The root CA certificates are also imported into the created keystore.
The created Secret can then be referenced in the IntegrationPlatform resource, from the spec.build.maven.caSecret
field, e.g.:
apiVersion: camel.apache.org/v1
kind: IntegrationPlatform
metadata:
name: camel-k
spec:
pipeline:
maven:
caSecret:
key: tls.crt
name: tls-secret
Maven Extensions
The Maven extensions used by the Camel K operator while building integrations can be configured changing the spec.build.maven.extension
field, e.g:
apiVersion: camel.apache.org/v1
kind: IntegrationPlatform
metadata:
name: camel-k
spec:
build:
extension:
- artifactId: aws-maven
groupId: fi.yle.tools
version: 1.4.2
The IntegrationPlatform resource can be edited directly, to add or remove extensions, e.g.:
$ kubectl edit ip camel-k
Maven extensions are typically used to enable Wagon Providers, used for the transport of artifacts between repository.
S3 Bucket as a Maven Repository
In this section, we will show how to configure Camel K to fetch artifacts from a S3 bucket that’s set up as a Maven repository. We will assume that the bucket is already up and running and configured correctly. We will also assume you know how to set up Maven locally to fetch artifacts from it.
Custom Maven Settings
The first thing that needs to be done is to create a Maven settings file configured to use the S3 bucket as a Maven repository. The Maven settings file will be used by the Camel K operator so make sure your S3 instance is accessible in your cluster.
The Maven settings will contain all the information needed for Maven to access the S3 bucket namely your credentials, S3 URL and bucket name. This information will typically be located in the server
and repository
section of your Maven settings.
For example when using MinIO as a S3 provider and fi.yle.tools:aws-maven:1.4.3
as a Wagon Provider, your Maven settings will look something like this:
<?xml version="1.0" encoding="UTF-8"?>
<settings xmlns="http://maven.apache.org/SETTINGS/1.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://maven.apache.org/SETTINGS/1.0.0 https://maven.apache.org/xsd/settings-1.0.0.xsd">
<servers>
<server>
<id>minio-release</id>
<username>291cafe6-eceb-43dc-91b3-58be867d9da2</username>
<password>e383fed0-4645-45f6-acea-65f3748b96c8</password>
<configuration>
<wagonProvider>s3</wagonProvider>
<s3Provider>minio</s3Provider>
<endpoint>https://minio-tenant-1-hl.minio-tenant-1.svc.cluster.local:4430</endpoint>
</configuration>
</server>
<server>
<id>minio-snapshot</id>
<username>291cafe6-eceb-43dc-91b3-58be867d9da2</username>
<password>e383fed0-4645-45f6-acea-65f3748b96c8</password>
<configuration>
<wagonProvider>s3</wagonProvider>
<s3Provider>minio</s3Provider>
<endpoint>https://minio-tenant-1-hl.minio-tenant-1.svc.cluster.local:4430</endpoint>
</configuration>
</server>
</servers>
<profiles>
<profile>
<id>maven-settings</id>
<activation>
<activeByDefault>true</activeByDefault>
</activation>
<repositories>
<repository>
<id>central</id>
<url>https://repo.maven.apache.org/maven2</url>
<snapshots>
<enabled>false</enabled>
<checksumPolicy>fail</checksumPolicy>
</snapshots>
<releases>
<enabled>true</enabled>
<checksumPolicy>fail</checksumPolicy>
</releases>
</repository>
<repository>
<id>minio-release</id>
<name>MinIO Release Repository</name>
<url>s3://maven/release</url>
</repository>
<repository>
<id>minio-snapshot</id>
<name>MinIO Snapshot Repository</name>
<url>s3://maven/snapshot</url>
</repository>
</repositories>
<pluginRepositories>
<pluginRepository>
<id>central</id>
<url>https://repo.maven.apache.org/maven2</url>
<snapshots>
<enabled>false</enabled>
<checksumPolicy>fail</checksumPolicy>
</snapshots>
<releases>
<enabled>true</enabled>
<checksumPolicy>fail</checksumPolicy>
</releases>
</pluginRepository>
<pluginRepository>
<id>minio-snapshot</id>
<name>MinIO Snapshot Repository</name>
<url>s3://maven/snapshot</url>
</pluginRepository>
<pluginRepository>
<id>minio-release</id>
<name>MinIO Release Repository</name>
<url>s3://maven/release</url>
</pluginRepository>
<pluginRepository>
<id>yle-public</id>
<name>Yle public repository</name>
<url>https://maven.yle.fi/release</url>
<layout>default</layout>
</pluginRepository>
</pluginRepositories>
</profile>
</profiles>
</settings>
Since these settings contains credentials, you will want to store it in a Kubernetes Secret. As mentioned above, the kubectl
CLI provides a convenient command to create a Secret from a file, e.g.:
$ kubectl create secret generic camel-k-s3-maven-settings --from-file=maven-settings=maven_settings.xml
S3 TLS Certificates
In most cases, you will need to add the certificate(s) served by your S3 instance to the list of certificate(s) trusted by the Camel K Operator when running Maven commands. Where/how to get the certificate(s) varies greatly depending on how your S3 instance is set up, and will not be covered here. Once retrieved, you should create a Kubernetes Secret containing the certificate(s) similar to what is described in the section CA Certificates, e.g.:
$ kubectl create secret generic s3-ca --from-file=s3-ca=ca.crt
Maven settings, certificates and extensions
We are now ready to configure the Camel K operator to use your S3 bucket as a Maven repository. This can be done setting the Maven settings, the CA secret and the extension as explained in the chapter above.
Maven dependencies hosted in your S3 bucket can now be used just like any other dependency when running an integration. For example when using the Kamel CLI using the --dependency
option:
$ kamel run S3.java --dependency=mvn:artfiactId:groupId:version
Maven Profiles
You can customize the build of an Integration with a Maven profile:
<profile>
<id>my-profile</id>
...
</profile>
Once you have the file ready you can create a Configmap or a Secret in order to use it in your integration:
kubectl create cm my-maven-profile --from-file my-profile.xml
Once the Configmap/Secret is ready, then, you can use it to run your integration:
kamel run hello.yaml -t builder.maven-profile=configmap:my-maven-profile/my-profile.xml
The profile will be added to your Integration’s project generated POM file. What will be changed in the mvn package
execution will depend on your profile definition.