This is an automated email from the ASF dual-hosted git repository.

orpiske pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel.git

commit 35b84bc2bf60a6f9182ac700bf4b5f7eb7063b2d
Author: Otavio Rodolfo Piske <angusyo...@gmail.com>
AuthorDate: Wed Feb 21 17:53:51 2024 +0100

    CAMEL-20410: documentation fixes for camel-shiro
    
    - Fixed samples
    - Fixed grammar and typos
    - Fixed punctuation
    - Added and/or fixed links
    - Converted to use tabs
---
 components/camel-shiro/src/main/docs/shiro.adoc | 26 ++++++++++++-------------
 1 file changed, 13 insertions(+), 13 deletions(-)

diff --git a/components/camel-shiro/src/main/docs/shiro.adoc 
b/components/camel-shiro/src/main/docs/shiro.adoc
index ca3c7eab0a2..e88cb5d0d66 100644
--- a/components/camel-shiro/src/main/docs/shiro.adoc
+++ b/components/camel-shiro/src/main/docs/shiro.adoc
@@ -11,14 +11,14 @@
 
 *Since Camel {since}*
 
-The Shiro Security component in Camel is a security focused component,
+The Shiro Security component in Camel is a security-focused component,
 based on the Apache Shiro security project.
 
 Apache Shiro is a powerful and flexible open-source security framework
 that cleanly handles authentication, authorization, enterprise session
 management and cryptography. The objective of the Apache Shiro project
 is to provide the most robust and comprehensive application security
-framework available while also being very easy to understand and
+framework available while also being straightforward to understand and
 extremely simple to use.
 
 This camel shiro-security component allows authentication and
@@ -26,9 +26,9 @@ authorization support to be applied to different segments of 
a camel
 route.
 
 Shiro security is applied on a route using a Camel Policy. A Policy in
-Camel utilizes a strategy pattern for applying interceptors on Camel
-Processors. It offering the ability to apply cross-cutting concerns (for
-example. security, transactions etc) on sections/segments of a camel
+Camel uses a strategy pattern for applying interceptors on Camel
+Processors. It is offering the ability to apply cross-cutting concerns (for
+example, security, transactions, etc.), on sections/segments of a Camel
 route.
 
 Maven users will need to add the following dependency to their `pom.xml`
@@ -52,7 +52,7 @@ must be instantiated with security configuration details 
(including
 users, passwords, roles etc). This object must then be applied to a
 camel route. This ShiroSecurityPolicy Object may also be registered in
 the Camel registry (JNDI or ApplicationContextRegistry) and then
-utilized on other routes in the Camel Context.
+used on other routes in the Camel Context.
 
 Configuration details are provided to the ShiroSecurityPolicy using an
 Ini file (properties file) or an Ini object. The Ini file is a standard
@@ -112,30 +112,30 @@ A ShiroSecurityPolicy object is instantiated as follows
 |`iniResourcePath or ini` |`none` |Resource String or Ini Object |A mandatory 
Resource String for the iniResourcePath or an instance of an
 Ini object must be passed to the security policy. Resources can be
 acquired from the file system, classpath, or URLs when prefixed with
-"file:, classpath:, or url:" respectively. For e.g "classpath:shiro.ini"
+"file:, classpath:, or url:" respectively. For e.g., `classpath:shiro.ini`
 
 |`passPhrase` |`An AES 128 based key` |byte[] |A passPhrase to decrypt 
ShiroSecurityToken(s) sent along with Message
 Exchanges
 
-|`alwaysReauthenticate` |`true` |boolean |Setting to ensure re-authentication 
on every individual request. If set
+|`alwaysReauthenticate` |`true` |boolean |Setting to ensure re-authentication 
on every request. If set
 to false, the user is authenticated and locked such than only requests
 from the same user going forward are authenticated.
 
 |`permissionsList` |`none` |List<Permission> |A List of permissions required 
in order for an authenticated user to be
-authorized to perform further action i.e continue further on the route.
+authorized to perform further action i.e., continue further on the route.
 If no Permissions list or Roles List (see below) is provided to the
 ShiroSecurityPolicy object, then authorization is deemed as not
 required. Note that the default is that authorization is granted if any
 of the Permission Objects in the list are applicable.
 
 |`rolesList` |`none` |List<String> |A List of roles required in order for an 
authenticated
-user to be authorized to perform further action i.e continue further on
+user to be authorized to perform further action i.e., continue further on
 the route. If no roles list or permissions list (see above) is provided
 to the ShiroSecurityPolicy object, then authorization is deemed as not
 required. Note that the default is that authorization is granted if any
 of the roles in the list are applicable.
 
-|`cipherService` |`AES` |org.apache.shiro.crypto.CipherService |Shiro ships 
with AES & Blowfish based CipherServices. You may use one
+|`cipherService` |`AES` |org.apache.shiro.crypto.CipherService |Shiro ships 
with AES & Blowfish-based CipherServices. You may use one of
 these or pass in your own Cipher implementation
 
 |`base64` |`false` |`boolean` |To use base64 encoding for the security token 
header,
@@ -144,11 +144,11 @@ option must also be set on `ShiroSecurityTokenInjector` 
as well.
 
 |`allPermissionsRequired` |`false` |`boolean` |The default is that 
authorization is granted if any of the
 Permission Objects in the permissionsList parameter are applicable. Set
-this to true to require all of the Permissions to be met.
+this to true to require all the Permissions to be met.
 
 |`allRolesRequired` |`false` |`boolean` |The default is that authorization is 
granted if any of the
 roles in the rolesList parameter are applicable. Set this to true to
-require all of the roles to be met.
+require all the roles to be met.
 |=======================================================================
 
 [[ShiroSecurity-ApplyingShiroAuthenticationonaCamelRoute]]

Reply via email to