Modified: websites/production/camel/content/news.html
==============================================================================
--- websites/production/camel/content/news.html (original)
+++ websites/production/camel/content/news.html Fri Sep  7 07:31:26 2018
@@ -95,6 +95,30 @@
                  </span>
             </span>
             <span class="blogHeading">
+                <a shape="rect" class="blogHeading" 
href="2018/09/07/apache-camel-2221-released.html">Apache Camel 2.22.1 
Released</a>
+                </span><div class="page-metadata not-personal">    <a 
shape="rect" class="url fn confluence-userlink" href="    
/confluence/display/~gzurowski ">Gregor Zurowski</a> posted on Sep 07, 
2018</div>
+            
+        </div>
+    
+    <div class="wiki-content">
+        <p>The Camel community announces the immediate availability of the new 
patch release Camel 2.22.1. This release contains 47 fixes applied in the past 
few weeks by the community on the Camel 2.22.x maintenance branch.</p><p>The 
artifacts are published and ready for you to&#160;<a shape="rect" 
class="external-link" 
href="http://camel.apache.org/download.html";>download</a>&#160;either from the 
Apache mirrors or from the Central Maven repository. For more details please 
take a look at the&#160;<a shape="rect" class="external-link" 
href="https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12343346&amp;projectId=12311211";>release
 notes</a>.<br clear="none">Many thanks to all who made this release 
possible.</p><p>On behalf of the Camel PMC,<br clear="none">Gregor Zurowski</p>
+    </div>
+    
+        
+    </div>
+    
+        
+<div class="blog-post-listing">
+            <div class="logo-heading-block">
+            <span class="logoBlock">
+                 <span class="aui-avatar aui-avatar-large">
+                     <span class="aui-avatar-inner">
+                         <a shape="rect" class="userLogoLink" href="    
/confluence/display/~gzurowski ">
+              <img class="userLogo logo" 
src="news.userimage/gzurowski-89607-pp-wojtek-avatar.png" alt="User icon: 
gzurowski" title="gzurowski">
+           </a>                     </span>
+                 </span>
+            </span>
+            <span class="blogHeading">
                 <a shape="rect" class="blogHeading" 
href="2018/07/26/apache-camel-2204-released.html">Apache Camel 2.20.4 
Released</a>
                 </span><div class="page-metadata not-personal">    <a 
shape="rect" class="url fn confluence-userlink" href="    
/confluence/display/~gzurowski ">Gregor Zurowski</a> posted on Jul 26, 
2018</div>
             
@@ -537,30 +561,6 @@
     </div>
     
         
-    </div>
-    
-        
-<div class="blog-post-listing">
-            <div class="logo-heading-block">
-            <span class="logoBlock">
-                 <span class="aui-avatar aui-avatar-large">
-                     <span class="aui-avatar-inner">
-                         <a shape="rect" class="userLogoLink" href="    
/confluence/display/~gzurowski ">
-              <img class="userLogo logo" 
src="news.userimage/gzurowski-89607-pp-wojtek-avatar.png" alt="User icon: 
gzurowski" title="gzurowski">
-           </a>                     </span>
-                 </span>
-            </span>
-            <span class="blogHeading">
-                <a shape="rect" class="blogHeading" 
href="2017/06/15/apache-camel-2191-released.html">Apache Camel 2.19.1 
Released</a>
-                </span><div class="page-metadata not-personal">    <a 
shape="rect" class="url fn confluence-userlink" href="    
/confluence/display/~gzurowski ">Gregor Zurowski</a> posted on Jun 15, 
2017</div>
-            
-        </div>
-    
-    <div class="wiki-content">
-        <p>The Camel community announces the immediate availability of the new 
patch release Camel 2.19.1. This release contains 57 fixes applied in the past 
few weeks by the community on the Camel 2.19.x maintenance branch.</p><p>The 
artifacts are published and ready for you to <a shape="rect" 
class="external-link" href="http://camel.apache.org/download.html";>download</a> 
either from the Apache mirrors or from the Central Maven repository. For more 
details please take a look at the <a shape="rect" class="external-link" 
href="https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12340460&amp;projectId=12311211";>release
 notes</a>.</p><p>Many thanks to all who made this release possible.</p><p>On 
behalf of the Camel PMC,<br clear="none">Gregor Zurowski</p>
-    </div>
-    
-        
     </div>
     </div></div>
         </td>

Modified: websites/production/camel/content/processorfactory.html
==============================================================================
--- websites/production/camel/content/processorfactory.html (original)
+++ websites/production/camel/content/processorfactory.html Fri Sep  7 07:31:26 
2018
@@ -129,6 +129,7 @@ public static class MyFactory implements
 <p>The unit test and route is as follows:</p>
 
 Error rendering macro 'code': Invalid value specified for parameter 
'java.lang.NullPointerException'<pre class="conf-macro output-inline" 
data-hasbody="true" data-macro-name="unmigrated-inline-wiki-markup">
+@Test
 public void testAlterDefinitionUsingProcessorFactory() throws Exception {
     getMockEndpoint("mock:foo").expectedBodiesReceived("body was altered");
 
@@ -137,6 +138,7 @@ public void testAlterDefinitionUsingProc
     assertMockEndpointsSatisfied();
 }
 
+@Test
 public void testAlterDefinitionUsingProcessorFactoryWithChild() throws 
Exception {
     getMockEndpoint("mock:split").expectedBodiesReceived("body was altered", 
"body was altered");
     getMockEndpoint("mock:extra").expectedBodiesReceived("body was altered", 
"body was altered");

Modified: websites/production/camel/content/security-advisories.html
==============================================================================
--- websites/production/camel/content/security-advisories.html (original)
+++ websites/production/camel/content/security-advisories.html Fri Sep  7 
07:31:26 2018
@@ -78,7 +78,7 @@
        <tbody>
         <tr>
         <td valign="top" width="100%">
-<div class="wiki-content maincontent"><h3 
id="SecurityAdvisories-2018">2018</h3><ul><li><a shape="rect" 
href="security-advisories.data/CVE-2018-8027.txt.asc?version=4&amp;modificationDate=1533020841313&amp;api=v2"
 data-linked-resource-id="89065844" data-linked-resource-version="4" 
data-linked-resource-type="attachment" 
data-linked-resource-default-alias="CVE-2018-8027.txt.asc" data-nice-type="Text 
File" data-linked-resource-content-type="text/plain" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2018-8027</a><a shape="rect" 
href="security-advisories.data/CVE-2018-8027.txt.asc?version=4&amp;modificationDate=1533020841313&amp;api=v2"
 data-linked-resource-id="89065844" data-linked-resource-version="4" 
data-linked-resource-type="attachment" 
data-linked-resource-default-alias="CVE-2018-8027.txt.asc" data-nice-type="Text 
File" data-linked-resource-content-type="text/plain" 
data-linked-resource-container-id="34833933" data-linked-resource-conta
 iner-version="18">&#160;</a>-&#160;Apache Camel's Core is vulnerable to XXE in 
XSD validation processor</li></ul><h3 
id="SecurityAdvisories-2017">2017</h3><ul><li><a shape="rect" 
href="security-advisories.data/CVE-2017-12634.txt.asc?version=1&amp;modificationDate=1510733922000&amp;api=v2"
 data-linked-resource-id="74687198" data-linked-resource-version="1" 
data-linked-resource-type="attachment" 
data-linked-resource-default-alias="CVE-2017-12634.txt.asc" 
data-nice-type="Text File" data-linked-resource-content-type="text/plain" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2017-12634</a>&#160;- Apache 
Camel's Castor unmarshalling operation is vulnerable to Remote Code Execution 
attacks</li><li><a shape="rect" 
href="security-advisories.data/CVE-2017-12633.txt.asc?version=1&amp;modificationDate=1510733921000&amp;api=v2"
 data-linked-resource-id="74687197" data-linked-resource-version="1" 
data-linked-resource-type="attachment" data-linked-reso
 urce-default-alias="CVE-2017-12633.txt.asc" data-nice-type="Text File" 
data-linked-resource-content-type="text/plain" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2017-12633</a>&#160;- Apache 
Camel's Hessian unmarshalling operation is vulnerable to Remote Code Execution 
attacks</li><li><a shape="rect" 
href="security-advisories.data/CVE-2017-5643.txt.asc?version=1&amp;modificationDate=1489652454000&amp;api=v2"
 data-linked-resource-id="68719271" data-linked-resource-version="1" 
data-linked-resource-type="attachment" 
data-linked-resource-default-alias="CVE-2017-5643.txt.asc" 
data-linked-resource-content-type="application/pgp-encrypted" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2017-5643</a>&#160;-&#160;Apache
 Camel's Validation Component is vulnerable against SSRF via remote DTDs and 
XXE</li><li><a shape="rect" 
href="security-advisories.data/CVE-2017-3159.txt.asc?version=1&amp;modificatio
 nDate=1486565167000&amp;api=v2" data-linked-resource-id="67641933" 
data-linked-resource-version="1" data-linked-resource-type="attachment" 
data-linked-resource-default-alias="CVE-2017-3159.txt.asc" 
data-linked-resource-content-type="application/pgp-encrypted" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2017-3159</a>&#160;-&#160;Apache
 Camel's Snakeyaml unmarshalling operation is vulnerable to Remote Code 
Execution attacks</li></ul><h3 id="SecurityAdvisories-2016">2016</h3><ul><li><a 
shape="rect" 
href="security-advisories.data/CVE-2016-8749.txt.asc?version=2&amp;modificationDate=1486565034000&amp;api=v2"
 data-linked-resource-id="67641927" data-linked-resource-version="2" 
data-linked-resource-type="attachment" 
data-linked-resource-default-alias="CVE-2016-8749.txt.asc" 
data-linked-resource-content-type="application/pgp-encrypted" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2016-8749</a>&#1
 60;-&#160;Apache Camel's Jackson and JacksonXML unmarshalling operation are 
vulnerable to Remote Code Execution attacks</li></ul><h3 
id="SecurityAdvisories-2015">2015</h3><ul><li><a shape="rect" 
href="security-advisories.data/CVE-2015-5344.txt.asc?version=1&amp;modificationDate=1454056803000&amp;api=v2"
 data-linked-resource-id="61338184" data-linked-resource-version="1" 
data-linked-resource-type="attachment" 
data-linked-resource-default-alias="CVE-2015-5344.txt.asc" data-nice-type="Text 
File" data-linked-resource-content-type="text/plain" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2015-5344</a>&#160;-&#160;Apache
 Camel's XStream usage is vulnerable&#160;to Remote Code Execution 
attacks.</li><li><a shape="rect" 
href="security-advisories.data/CVE-2015-5348.txt.asc?version=1&amp;modificationDate=1450340845000&amp;api=v2"
 data-linked-resource-id="61333112" data-linked-resource-version="1" 
data-linked-resource-type="attachment" data-linke
 d-resource-default-alias="CVE-2015-5348.txt.asc" data-nice-type="Text File" 
data-linked-resource-content-type="text/plain" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2015-5348</a> - Apache Camel's 
Jetty/Servlet usage is vulnerable to Java object de-serialisation 
vulnerability.</li><li><a shape="rect" 
href="security-advisories.data/CVE-2015-0264.txt.asc?version=1&amp;modificationDate=1426539191000&amp;api=v2"
 data-linked-resource-id="54165590" data-linked-resource-version="1" 
data-linked-resource-type="attachment" 
data-linked-resource-default-alias="CVE-2015-0264.txt.asc" data-nice-type="Text 
File" data-linked-resource-content-type="text/plain" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2015-0264</a> - The XPath 
handling in Apache Camel for invalid XML Strings or invalid XML GenericFile 
objects allows remote attackers to read arbitrary files via an XML External 
Entity (XXE) declaration
 . The XML External Entity (XXE) will be resolved before the Exception is 
thrown.</li><li><a shape="rect" 
href="security-advisories.data/CVE-2015-0263.txt.asc?version=1&amp;modificationDate=1426539178000&amp;api=v2"
 data-linked-resource-id="54165589" data-linked-resource-version="1" 
data-linked-resource-type="attachment" 
data-linked-resource-default-alias="CVE-2015-0263.txt.asc" data-nice-type="Text 
File" data-linked-resource-content-type="text/plain" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2015-0263</a> - The XML 
converter setup in Apache Camel allows remote attackers to read arbitrary files 
via an SAXSource containing an XML External Entity (XXE) 
declaration.</li></ul><h3 id="SecurityAdvisories-2014">2014</h3><ul><li><a 
shape="rect" 
href="security-advisories.data/CVE-2014-0003.txt.asc?version=1&amp;modificationDate=1393615582000&amp;api=v2"
 data-linked-resource-id="40009835" data-linked-resource-version="1" 
data-linked-resource-t
 ype="attachment" data-linked-resource-default-alias="CVE-2014-0003.txt.asc" 
data-nice-type="Text File" data-linked-resource-content-type="text/plain" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2014-0003</a> - The Apache 
Camel XSLT component allows XSL stylesheets to perform calls to external Java 
methods.</li><li><a shape="rect" 
href="security-advisories.data/CVE-2014-0002.txt.asc?version=1&amp;modificationDate=1393615569000&amp;api=v2"
 data-linked-resource-id="40009834" data-linked-resource-version="1" 
data-linked-resource-type="attachment" 
data-linked-resource-default-alias="CVE-2014-0002.txt.asc" data-nice-type="Text 
File" data-linked-resource-content-type="text/plain" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2014-0002</a> - The Apache 
Camel XSLT component will resolve entities in XML messages when transforming 
them using an xslt route.</li></ul><h3 id="SecurityAdvisories-2013">2
 013</h3><ul><li><a shape="rect" 
href="security-advisories.data/CVE-2013-4330.txt.asc?version=1&amp;modificationDate=1380633919000&amp;api=v2"
 data-linked-resource-id="35192841" data-linked-resource-version="1" 
data-linked-resource-type="attachment" 
data-linked-resource-default-alias="CVE-2013-4330.txt.asc" data-nice-type="Text 
File" data-linked-resource-content-type="text/plain" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2013-4330</a> - Writing files 
using FILE or FTP components, can potentially be exploited by a malicious 
user.</li></ul><p>&#160;</p></div>
+<div class="wiki-content maincontent"><h3 
id="SecurityAdvisories-2018">2018</h3><ul><li><a shape="rect" 
href="security-advisories.data/CVE-2018-8027.txt.asc?version=4&amp;modificationDate=1533020841000&amp;api=v2"
 data-linked-resource-id="89065844" data-linked-resource-version="4" 
data-linked-resource-type="attachment" 
data-linked-resource-default-alias="CVE-2018-8027.txt.asc" data-nice-type="Text 
File" data-linked-resource-content-type="text/plain" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2018-8027</a><a shape="rect" 
href="security-advisories.data/CVE-2018-8027.txt.asc?version=4&amp;modificationDate=1533020841000&amp;api=v2"
 data-linked-resource-id="89065844" data-linked-resource-version="4" 
data-linked-resource-type="attachment" 
data-linked-resource-default-alias="CVE-2018-8027.txt.asc" data-nice-type="Text 
File" data-linked-resource-content-type="text/plain" 
data-linked-resource-container-id="34833933" data-linked-resource-conta
 iner-version="18">&#160;</a>-&#160;Apache Camel's Core is vulnerable to XXE in 
XSD validation processor</li></ul><h3 
id="SecurityAdvisories-2017">2017</h3><ul><li><a shape="rect" 
href="security-advisories.data/CVE-2017-12634.txt.asc?version=1&amp;modificationDate=1510733922000&amp;api=v2"
 data-linked-resource-id="74687198" data-linked-resource-version="1" 
data-linked-resource-type="attachment" 
data-linked-resource-default-alias="CVE-2017-12634.txt.asc" 
data-nice-type="Text File" data-linked-resource-content-type="text/plain" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2017-12634</a>&#160;- Apache 
Camel's Castor unmarshalling operation is vulnerable to Remote Code Execution 
attacks</li><li><a shape="rect" 
href="security-advisories.data/CVE-2017-12633.txt.asc?version=1&amp;modificationDate=1510733921000&amp;api=v2"
 data-linked-resource-id="74687197" data-linked-resource-version="1" 
data-linked-resource-type="attachment" data-linked-reso
 urce-default-alias="CVE-2017-12633.txt.asc" data-nice-type="Text File" 
data-linked-resource-content-type="text/plain" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2017-12633</a>&#160;- Apache 
Camel's Hessian unmarshalling operation is vulnerable to Remote Code Execution 
attacks</li><li><a shape="rect" 
href="security-advisories.data/CVE-2017-5643.txt.asc?version=1&amp;modificationDate=1489652454000&amp;api=v2"
 data-linked-resource-id="68719271" data-linked-resource-version="1" 
data-linked-resource-type="attachment" 
data-linked-resource-default-alias="CVE-2017-5643.txt.asc" 
data-linked-resource-content-type="application/pgp-encrypted" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2017-5643</a>&#160;-&#160;Apache
 Camel's Validation Component is vulnerable against SSRF via remote DTDs and 
XXE</li><li><a shape="rect" 
href="security-advisories.data/CVE-2017-3159.txt.asc?version=1&amp;modificatio
 nDate=1486565167000&amp;api=v2" data-linked-resource-id="67641933" 
data-linked-resource-version="1" data-linked-resource-type="attachment" 
data-linked-resource-default-alias="CVE-2017-3159.txt.asc" 
data-linked-resource-content-type="application/pgp-encrypted" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2017-3159</a>&#160;-&#160;Apache
 Camel's Snakeyaml unmarshalling operation is vulnerable to Remote Code 
Execution attacks</li></ul><h3 id="SecurityAdvisories-2016">2016</h3><ul><li><a 
shape="rect" 
href="security-advisories.data/CVE-2016-8749.txt.asc?version=2&amp;modificationDate=1486565034000&amp;api=v2"
 data-linked-resource-id="67641927" data-linked-resource-version="2" 
data-linked-resource-type="attachment" 
data-linked-resource-default-alias="CVE-2016-8749.txt.asc" 
data-linked-resource-content-type="application/pgp-encrypted" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2016-8749</a>&#1
 60;-&#160;Apache Camel's Jackson and JacksonXML unmarshalling operation are 
vulnerable to Remote Code Execution attacks</li></ul><h3 
id="SecurityAdvisories-2015">2015</h3><ul><li><a shape="rect" 
href="security-advisories.data/CVE-2015-5344.txt.asc?version=1&amp;modificationDate=1454056803000&amp;api=v2"
 data-linked-resource-id="61338184" data-linked-resource-version="1" 
data-linked-resource-type="attachment" 
data-linked-resource-default-alias="CVE-2015-5344.txt.asc" data-nice-type="Text 
File" data-linked-resource-content-type="text/plain" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2015-5344</a>&#160;-&#160;Apache
 Camel's XStream usage is vulnerable&#160;to Remote Code Execution 
attacks.</li><li><a shape="rect" 
href="security-advisories.data/CVE-2015-5348.txt.asc?version=1&amp;modificationDate=1450340845000&amp;api=v2"
 data-linked-resource-id="61333112" data-linked-resource-version="1" 
data-linked-resource-type="attachment" data-linke
 d-resource-default-alias="CVE-2015-5348.txt.asc" data-nice-type="Text File" 
data-linked-resource-content-type="text/plain" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2015-5348</a> - Apache Camel's 
Jetty/Servlet usage is vulnerable to Java object de-serialisation 
vulnerability.</li><li><a shape="rect" 
href="security-advisories.data/CVE-2015-0264.txt.asc?version=1&amp;modificationDate=1426539191000&amp;api=v2"
 data-linked-resource-id="54165590" data-linked-resource-version="1" 
data-linked-resource-type="attachment" 
data-linked-resource-default-alias="CVE-2015-0264.txt.asc" data-nice-type="Text 
File" data-linked-resource-content-type="text/plain" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2015-0264</a> - The XPath 
handling in Apache Camel for invalid XML Strings or invalid XML GenericFile 
objects allows remote attackers to read arbitrary files via an XML External 
Entity (XXE) declaration
 . The XML External Entity (XXE) will be resolved before the Exception is 
thrown.</li><li><a shape="rect" 
href="security-advisories.data/CVE-2015-0263.txt.asc?version=1&amp;modificationDate=1426539178000&amp;api=v2"
 data-linked-resource-id="54165589" data-linked-resource-version="1" 
data-linked-resource-type="attachment" 
data-linked-resource-default-alias="CVE-2015-0263.txt.asc" data-nice-type="Text 
File" data-linked-resource-content-type="text/plain" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2015-0263</a> - The XML 
converter setup in Apache Camel allows remote attackers to read arbitrary files 
via an SAXSource containing an XML External Entity (XXE) 
declaration.</li></ul><h3 id="SecurityAdvisories-2014">2014</h3><ul><li><a 
shape="rect" 
href="security-advisories.data/CVE-2014-0003.txt.asc?version=1&amp;modificationDate=1393615582000&amp;api=v2"
 data-linked-resource-id="40009835" data-linked-resource-version="1" 
data-linked-resource-t
 ype="attachment" data-linked-resource-default-alias="CVE-2014-0003.txt.asc" 
data-nice-type="Text File" data-linked-resource-content-type="text/plain" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2014-0003</a> - The Apache 
Camel XSLT component allows XSL stylesheets to perform calls to external Java 
methods.</li><li><a shape="rect" 
href="security-advisories.data/CVE-2014-0002.txt.asc?version=1&amp;modificationDate=1393615569000&amp;api=v2"
 data-linked-resource-id="40009834" data-linked-resource-version="1" 
data-linked-resource-type="attachment" 
data-linked-resource-default-alias="CVE-2014-0002.txt.asc" data-nice-type="Text 
File" data-linked-resource-content-type="text/plain" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2014-0002</a> - The Apache 
Camel XSLT component will resolve entities in XML messages when transforming 
them using an xslt route.</li></ul><h3 id="SecurityAdvisories-2013">2
 013</h3><ul><li><a shape="rect" 
href="security-advisories.data/CVE-2013-4330.txt.asc?version=1&amp;modificationDate=1380633919000&amp;api=v2"
 data-linked-resource-id="35192841" data-linked-resource-version="1" 
data-linked-resource-type="attachment" 
data-linked-resource-default-alias="CVE-2013-4330.txt.asc" data-nice-type="Text 
File" data-linked-resource-content-type="text/plain" 
data-linked-resource-container-id="34833933" 
data-linked-resource-container-version="18">CVE-2013-4330</a> - Writing files 
using FILE or FTP components, can potentially be exploited by a malicious 
user.</li></ul><p>&#160;</p></div>
         </td>
         <td valign="top">
           <div class="navigation">

Modified: websites/production/camel/content/siteindex.html
==============================================================================
--- websites/production/camel/content/siteindex.html (original)
+++ websites/production/camel/content/siteindex.html Fri Sep  7 07:31:26 2018
@@ -92,14 +92,14 @@
 <div class="wiki-content maincontent">
 <span class="conf-macro output-inline" data-hasbody="true" 
data-macro-name="unmigrated-inline-wiki-markup"></span><h2>Space Index</h2>
 <div class="index-macro-info">
-    <h4>Total number of pages: 953</h4>
+    <h4>Total number of pages: 954</h4>
             <span class="excerpt-info">
             <span class="aui-icon aui-icon-small aui-iconfont-info">info</span>
             Page excerpts are hidden because there are more than 200 pages
         </span>
     </div>
 <table class="grid" width="99%" cellspacing="0"><tbody><tr><td colspan="2" 
rowspan="1">
-         <table width="100%"><tbody><tr><td colspan="1" rowspan="1"><a 
shape="rect" href="#index-0-9">0-9</a> ... 0</td><td colspan="1" rowspan="1"><a 
shape="rect" href="#index-A">A</a> ... 39</td><td colspan="1" rowspan="1"><a 
shape="rect" href="#index-B">B</a> ... 43</td><td colspan="1" rowspan="1"><a 
shape="rect" href="#index-C">C</a> ... 216</td><td colspan="1" rowspan="1"><a 
shape="rect" href="#index-D">D</a> ... 32</td><td colspan="1" rowspan="1"><a 
shape="rect" href="#index-E">E</a> ... 33</td></tr><tr><td colspan="1" 
rowspan="1"><a shape="rect" href="#index-F">F</a> ... 15</td><td colspan="1" 
rowspan="1"><a shape="rect" href="#index-G">G</a> ... 33</td><td colspan="1" 
rowspan="1"><a shape="rect" href="#index-H">H</a> ... 88</td><td colspan="1" 
rowspan="1"><a shape="rect" href="#index-I">I</a> ... 19</td><td colspan="1" 
rowspan="1"><a shape="rect" href="#index-J">J</a> ... 32</td><td colspan="1" 
rowspan="1"><a shape="rect" href="#index-K">K</a> ... 6</td></tr><tr><td 
colspan=
 "1" rowspan="1"><a shape="rect" href="#index-L">L</a> ... 20</td><td 
colspan="1" rowspan="1"><a shape="rect" href="#index-M">M</a> ... 36</td><td 
colspan="1" rowspan="1"><a shape="rect" href="#index-N">N</a> ... 12</td><td 
colspan="1" rowspan="1"><a shape="rect" href="#index-O">O</a> ... 7</td><td 
colspan="1" rowspan="1"><a shape="rect" href="#index-P">P</a> ... 27</td><td 
colspan="1" rowspan="1"><a shape="rect" href="#index-Q">Q</a> ... 
5</td></tr><tr><td colspan="1" rowspan="1"><a shape="rect" 
href="#index-R">R</a> ... 33</td><td colspan="1" rowspan="1"><a shape="rect" 
href="#index-S">S</a> ... 90</td><td colspan="1" rowspan="1"><a shape="rect" 
href="#index-T">T</a> ... 44</td><td colspan="1" rowspan="1"><a shape="rect" 
href="#index-U">U</a> ... 19</td><td colspan="1" rowspan="1"><a shape="rect" 
href="#index-V">V</a> ... 8</td><td colspan="1" rowspan="1"><a shape="rect" 
href="#index-W">W</a> ... 30</td></tr><tr><td colspan="1" rowspan="1"><a 
shape="rect" href="#index-X">X</a> ... 
 14</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-Y">Y</a> ... 
2</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-Z">Z</a> ... 
4</td><td colspan="1" rowspan="1"><a shape="rect" 
href="#index-%21@%23%24">!@#$</a> ... 0</td><td colspan="1" 
rowspan="1">&#160;</td><td colspan="1" 
rowspan="1">&#160;</td></tr></tbody></table>
+         <table width="100%"><tbody><tr><td colspan="1" rowspan="1"><a 
shape="rect" href="#index-0-9">0-9</a> ... 0</td><td colspan="1" rowspan="1"><a 
shape="rect" href="#index-A">A</a> ... 39</td><td colspan="1" rowspan="1"><a 
shape="rect" href="#index-B">B</a> ... 43</td><td colspan="1" rowspan="1"><a 
shape="rect" href="#index-C">C</a> ... 217</td><td colspan="1" rowspan="1"><a 
shape="rect" href="#index-D">D</a> ... 32</td><td colspan="1" rowspan="1"><a 
shape="rect" href="#index-E">E</a> ... 33</td></tr><tr><td colspan="1" 
rowspan="1"><a shape="rect" href="#index-F">F</a> ... 15</td><td colspan="1" 
rowspan="1"><a shape="rect" href="#index-G">G</a> ... 33</td><td colspan="1" 
rowspan="1"><a shape="rect" href="#index-H">H</a> ... 88</td><td colspan="1" 
rowspan="1"><a shape="rect" href="#index-I">I</a> ... 19</td><td colspan="1" 
rowspan="1"><a shape="rect" href="#index-J">J</a> ... 32</td><td colspan="1" 
rowspan="1"><a shape="rect" href="#index-K">K</a> ... 6</td></tr><tr><td 
colspan=
 "1" rowspan="1"><a shape="rect" href="#index-L">L</a> ... 20</td><td 
colspan="1" rowspan="1"><a shape="rect" href="#index-M">M</a> ... 36</td><td 
colspan="1" rowspan="1"><a shape="rect" href="#index-N">N</a> ... 12</td><td 
colspan="1" rowspan="1"><a shape="rect" href="#index-O">O</a> ... 7</td><td 
colspan="1" rowspan="1"><a shape="rect" href="#index-P">P</a> ... 27</td><td 
colspan="1" rowspan="1"><a shape="rect" href="#index-Q">Q</a> ... 
5</td></tr><tr><td colspan="1" rowspan="1"><a shape="rect" 
href="#index-R">R</a> ... 33</td><td colspan="1" rowspan="1"><a shape="rect" 
href="#index-S">S</a> ... 90</td><td colspan="1" rowspan="1"><a shape="rect" 
href="#index-T">T</a> ... 44</td><td colspan="1" rowspan="1"><a shape="rect" 
href="#index-U">U</a> ... 19</td><td colspan="1" rowspan="1"><a shape="rect" 
href="#index-V">V</a> ... 8</td><td colspan="1" rowspan="1"><a shape="rect" 
href="#index-W">W</a> ... 30</td></tr><tr><td colspan="1" rowspan="1"><a 
shape="rect" href="#index-X">X</a> ... 
 14</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-Y">Y</a> ... 
2</td><td colspan="1" rowspan="1"><a shape="rect" href="#index-Z">Z</a> ... 
4</td><td colspan="1" rowspan="1"><a shape="rect" 
href="#index-%21@%23%24">!@#$</a> ... 0</td><td colspan="1" 
rowspan="1">&#160;</td><td colspan="1" 
rowspan="1">&#160;</td></tr></tbody></table>
         </td></tr><tr valign="top"><td colspan="1" rowspan="1"><h4 
style="margin-top: 0px"><a shape="rect" name="index-0-9"></a>0-9</h4>
         </td><td colspan="1" rowspan="1"><h4 style="margin-top: 0px"><a 
shape="rect" name="index-A"></a>A</h4>
                              <span class="icon aui-icon content-type-page" 
title="Page">Page:</span>                 <a shape="rect" 
href="acknowledgment.html">Acknowledgment</a>
@@ -454,6 +454,8 @@
         <br clear="none">
                                          <span class="icon aui-icon 
content-type-page" title="Page">Page:</span>                 <a shape="rect" 
href="camel-2221-release.html">Camel 2.22.1 Release</a>
         <br clear="none">
+                                         <span class="icon aui-icon 
content-type-page" title="Page">Page:</span>                 <a shape="rect" 
href="camel-2222-release.html">Camel 2.22.2 Release</a>
+        <br clear="none">
                                          <span class="icon aui-icon 
content-type-page" title="Page">Page:</span>                 <a shape="rect" 
href="camel-2230-release.html">Camel 2.23.0 Release</a>
         <br clear="none">
                                          <span class="icon aui-icon 
content-type-page" title="Page">Page:</span>                 <a shape="rect" 
href="camel-23-overhaul-of-aggregator-eip.html">Camel 2.3 - Overhaul of 
Aggregator EIP</a>


Reply via email to