You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@camel.apache.org by da...@apache.org on 2020/03/22 09:07:16 UTC

[camel] 09/13: CAMEL-14762: Regen and fixed some components had invalid setter/getter pairs

This is an automated email from the ASF dual-hosted git repository.

davsclaus pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/camel.git

commit e6fad20c3712f0ad9f748fe3a136f80ecc94208d
Author: Claus Ibsen <cl...@gmail.com>
AuthorDate: Sun Mar 22 09:03:45 2020 +0100

    CAMEL-14762: Regen and fixed some components had invalid setter/getter pairs
---
 docs/components/modules/ROOT/pages/milo-server-component.adoc | 10 +++++-----
 docs/components/modules/ROOT/pages/salesforce-component.adoc  |  4 ++--
 2 files changed, 7 insertions(+), 7 deletions(-)

diff --git a/docs/components/modules/ROOT/pages/milo-server-component.adoc b/docs/components/modules/ROOT/pages/milo-server-component.adoc
index 1169e8b..871b874 100644
--- a/docs/components/modules/ROOT/pages/milo-server-component.adoc
+++ b/docs/components/modules/ROOT/pages/milo-server-component.adoc
@@ -41,18 +41,18 @@ The OPC UA Server component supports 20 options, which are listed below.
 | *applicationName* (common) | The application name |  | String
 | *applicationUri* (common) | The application URI |  | String
 | *bindAddresses* (common) | Set the addresses of the local addresses the server should bind to |  | String
-| *bindPort* (common) | The TCP port the server binds to |  | int
 | *buildInfo* (common) | Server build info |  | BuildInfo
+| *certificate* (common) | Server certificate |  | X509Certificate
 | *certificateManager* (common) | Server certificate manager |  | CertificateManager
-| *certificateValidator* (common) | Validator for client certificates |  | Supplier
-| *defaultCertificateValidator* (common) | Validator for client certificates using default file based approach |  | File
+| *certificateValidator* (common) | Validator for client certificates |  | CertificateValidator
+| *defaultCertificateValidator* (common) | Validator for client certificates using default file based approach |  | String
 | *enableAnonymousAuthentication* (common) | Enable anonymous authentication, disabled by default | false | boolean
 | *namespaceUri* (common) | The URI of the namespace, defaults to urn:org:apache:camel |  | String
 | *path* (common) | The path to be appended to the end of the endpoint url. (doesn't need to start with '/') |  | String
+| *port* (common) | The TCP port the server binds to |  | int
 | *productUri* (common) | The product URI |  | String
 | *securityPolicies* (common) | Security policies |  | Set
-| *securityPoliciesById* (common) | Security policies by URI or name |  | Collection
-| *serverCertificate* (common) | Server certificate |  | Result
+| *securityPoliciesById* (common) | Security policies by URI or name. Multiple policies can be separated by comma. |  | String
 | *userAuthenticationCredentials* (common) | Set user password combinations in the form of user1:pwd1,user2:pwd2 Usernames and passwords will be URL decoded |  | String
 | *usernameSecurityPolicyUri* (common) | Set the UserTokenPolicy used when. The value can be one of: None, Basic128Rsa15, Basic256, Basic256Sha256, Aes128_Sha256_RsaOaep, Aes256_Sha256_RsaPss |  | SecurityPolicy
 | *bridgeErrorHandler* (consumer) | Allows for bridging the consumer to the Camel routing Error Handler, which mean any exceptions occurred while the consumer is trying to pickup incoming messages, or the likes, will now be processed as a message and handled by the routing Error Handler. By default the consumer will use the org.apache.camel.spi.ExceptionHandler to deal with exceptions, that will be logged at WARN or ERROR level and ignored. | false | boolean
diff --git a/docs/components/modules/ROOT/pages/salesforce-component.adoc b/docs/components/modules/ROOT/pages/salesforce-component.adoc
index 43b2931..098a5c6 100644
--- a/docs/components/modules/ROOT/pages/salesforce-component.adoc
+++ b/docs/components/modules/ROOT/pages/salesforce-component.adoc
@@ -711,17 +711,17 @@ The Salesforce component supports 72 options, which are listed below.
 | *httpProxyHost* (proxy) | Hostname of the HTTP proxy server to use. |  | String
 | *httpProxyIncludedAddresses* (proxy) | A list of addresses for which HTTP proxy server should be used. |  | Set
 | *httpProxyPort* (proxy) | Port number of the HTTP proxy server to use. |  | Integer
-| *isHttpProxySocks4* (proxy) | If set to true the configures the HTTP proxy to use as a SOCKS4 proxy. | false | boolean
+| *httpProxySocks4* (proxy) | If set to true the configures the HTTP proxy to use as a SOCKS4 proxy. | false | boolean
 | *authenticationType* (security) | Explicit authentication method to be used, one of USERNAME_PASSWORD, REFRESH_TOKEN or JWT. Salesforce component can auto-determine the authentication method to use from the properties set, set this property to eliminate any ambiguity. The value can be one of: USERNAME_PASSWORD, REFRESH_TOKEN, JWT |  | AuthenticationType
 | *clientId* (security) | *Required* OAuth Consumer Key of the connected app configured in the Salesforce instance setup. Typically a connected app needs to be configured but one can be provided by installing a package. |  | String
 | *clientSecret* (security) | OAuth Consumer Secret of the connected app configured in the Salesforce instance setup. |  | String
 | *httpProxyAuthUri* (security) | Used in authentication against the HTTP proxy server, needs to match the URI of the proxy server in order for the httpProxyUsername and httpProxyPassword to be used for authentication. |  | String
 | *httpProxyPassword* (security) | Password to use to authenticate against the HTTP proxy server. |  | String
 | *httpProxyRealm* (security) | Realm of the proxy server, used in preemptive Basic/Digest authentication methods against the HTTP proxy server. |  | String
+| *httpProxySecure* (security) | If set to false disables the use of TLS when accessing the HTTP proxy. | true | boolean
 | *httpProxyUseDigestAuth* (security) | If set to true Digest authentication will be used when authenticating to the HTTP proxy, otherwise Basic authorization method will be used | false | boolean
 | *httpProxyUsername* (security) | Username to use to authenticate against the HTTP proxy server. |  | String
 | *instanceUrl* (security) | URL of the Salesforce instance used after authentication, by default received from Salesforce on successful authentication |  | String
-| *isHttpProxySecure* (security) | If set to false disables the use of TLS when accessing the HTTP proxy. | true | boolean
 | *keystore* (security) | KeyStore parameters to use in OAuth JWT flow. The KeyStore should contain only one entry with private key and certificate. Salesforce does not verify the certificate chain, so this can easily be a selfsigned certificate. Make sure that you upload the certificate to the corresponding connected app. |  | KeyStoreParameters
 | *lazyLogin* (security) | If set to true prevents the component from authenticating to Salesforce with the start of the component. You would generally set this to the (default) false and authenticate early and be immediately aware of any authentication issues. | false | boolean
 | *loginConfig* (security) | All authentication configuration in one nested bean, all properties set there can be set directly on the component as well |  | SalesforceLoginConfig