This is an automated email from the ASF dual-hosted git repository.

orpiske pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel.git

commit d8f594e349d53776c899db514e25edce2a7c6b73
Author: Otavio Rodolfo Piske <[email protected]>
AuthorDate: Wed Feb 21 12:39:49 2024 +0100

    CAMEL-20410: documentation fixes for camel-ldap
    
    - Fixed samples
    - Fixed grammar and typos
    - Fixed punctuation
    - Added and/or fixed links
    - Converted to use tabs
---
 components/camel-ldap/src/main/docs/ldap-component.adoc | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/components/camel-ldap/src/main/docs/ldap-component.adoc 
b/components/camel-ldap/src/main/docs/ldap-component.adoc
index d5bf23823a7..37bd4157ec4 100644
--- a/components/camel-ldap/src/main/docs/ldap-component.adoc
+++ b/components/camel-ldap/src/main/docs/ldap-component.adoc
@@ -105,7 +105,7 @@ XML (Spring)::
 
-----------------------------------------------------------------------------------------
 ====
 
-The preceding example declares a regular Sun based LDAP `DirContext`
+The preceding example declares a regular Sun-based LDAP `DirContext`
 that connects anonymously to a locally hosted LDAP server.
 
 [NOTE]
@@ -117,7 +117,7 @@ For Camel Quarkus applications, you can achieve similar 
behavior by using the `@
 
 == Security concerns related to LDAP injection
 
-IMPORTANT: The camel-ldap component uses the message body as filter the search 
results.
+IMPORTANT: The camel-ldap component uses the message body to filter the search 
results.
 Therefore, the message body should be protected from LDAP injection. To assist 
with this,
 you can use `org.apache.camel.component.ldap.LdapHelper` utility class that 
has method(s)
 to escape string values to be LDAP injection safe.

Reply via email to