This is an automated email from the ASF dual-hosted git repository.

davsclaus pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/camel.git

commit e6fad20c3712f0ad9f748fe3a136f80ecc94208d
Author: Claus Ibsen <claus.ib...@gmail.com>
AuthorDate: Sun Mar 22 09:03:45 2020 +0100

    CAMEL-14762: Regen and fixed some components had invalid setter/getter pairs
---
 docs/components/modules/ROOT/pages/milo-server-component.adoc | 10 +++++-----
 docs/components/modules/ROOT/pages/salesforce-component.adoc  |  4 ++--
 2 files changed, 7 insertions(+), 7 deletions(-)

diff --git a/docs/components/modules/ROOT/pages/milo-server-component.adoc 
b/docs/components/modules/ROOT/pages/milo-server-component.adoc
index 1169e8b..871b874 100644
--- a/docs/components/modules/ROOT/pages/milo-server-component.adoc
+++ b/docs/components/modules/ROOT/pages/milo-server-component.adoc
@@ -41,18 +41,18 @@ The OPC UA Server component supports 20 options, which are 
listed below.
 | *applicationName* (common) | The application name |  | String
 | *applicationUri* (common) | The application URI |  | String
 | *bindAddresses* (common) | Set the addresses of the local addresses the 
server should bind to |  | String
-| *bindPort* (common) | The TCP port the server binds to |  | int
 | *buildInfo* (common) | Server build info |  | BuildInfo
+| *certificate* (common) | Server certificate |  | X509Certificate
 | *certificateManager* (common) | Server certificate manager |  | 
CertificateManager
-| *certificateValidator* (common) | Validator for client certificates |  | 
Supplier
-| *defaultCertificateValidator* (common) | Validator for client certificates 
using default file based approach |  | File
+| *certificateValidator* (common) | Validator for client certificates |  | 
CertificateValidator
+| *defaultCertificateValidator* (common) | Validator for client certificates 
using default file based approach |  | String
 | *enableAnonymousAuthentication* (common) | Enable anonymous authentication, 
disabled by default | false | boolean
 | *namespaceUri* (common) | The URI of the namespace, defaults to 
urn:org:apache:camel |  | String
 | *path* (common) | The path to be appended to the end of the endpoint url. 
(doesn't need to start with '/') |  | String
+| *port* (common) | The TCP port the server binds to |  | int
 | *productUri* (common) | The product URI |  | String
 | *securityPolicies* (common) | Security policies |  | Set
-| *securityPoliciesById* (common) | Security policies by URI or name |  | 
Collection
-| *serverCertificate* (common) | Server certificate |  | Result
+| *securityPoliciesById* (common) | Security policies by URI or name. Multiple 
policies can be separated by comma. |  | String
 | *userAuthenticationCredentials* (common) | Set user password combinations in 
the form of user1:pwd1,user2:pwd2 Usernames and passwords will be URL decoded | 
 | String
 | *usernameSecurityPolicyUri* (common) | Set the UserTokenPolicy used when. 
The value can be one of: None, Basic128Rsa15, Basic256, Basic256Sha256, 
Aes128_Sha256_RsaOaep, Aes256_Sha256_RsaPss |  | SecurityPolicy
 | *bridgeErrorHandler* (consumer) | Allows for bridging the consumer to the 
Camel routing Error Handler, which mean any exceptions occurred while the 
consumer is trying to pickup incoming messages, or the likes, will now be 
processed as a message and handled by the routing Error Handler. By default the 
consumer will use the org.apache.camel.spi.ExceptionHandler to deal with 
exceptions, that will be logged at WARN or ERROR level and ignored. | false | 
boolean
diff --git a/docs/components/modules/ROOT/pages/salesforce-component.adoc 
b/docs/components/modules/ROOT/pages/salesforce-component.adoc
index 43b2931..098a5c6 100644
--- a/docs/components/modules/ROOT/pages/salesforce-component.adoc
+++ b/docs/components/modules/ROOT/pages/salesforce-component.adoc
@@ -711,17 +711,17 @@ The Salesforce component supports 72 options, which are 
listed below.
 | *httpProxyHost* (proxy) | Hostname of the HTTP proxy server to use. |  | 
String
 | *httpProxyIncludedAddresses* (proxy) | A list of addresses for which HTTP 
proxy server should be used. |  | Set
 | *httpProxyPort* (proxy) | Port number of the HTTP proxy server to use. |  | 
Integer
-| *isHttpProxySocks4* (proxy) | If set to true the configures the HTTP proxy 
to use as a SOCKS4 proxy. | false | boolean
+| *httpProxySocks4* (proxy) | If set to true the configures the HTTP proxy to 
use as a SOCKS4 proxy. | false | boolean
 | *authenticationType* (security) | Explicit authentication method to be used, 
one of USERNAME_PASSWORD, REFRESH_TOKEN or JWT. Salesforce component can 
auto-determine the authentication method to use from the properties set, set 
this property to eliminate any ambiguity. The value can be one of: 
USERNAME_PASSWORD, REFRESH_TOKEN, JWT |  | AuthenticationType
 | *clientId* (security) | *Required* OAuth Consumer Key of the connected app 
configured in the Salesforce instance setup. Typically a connected app needs to 
be configured but one can be provided by installing a package. |  | String
 | *clientSecret* (security) | OAuth Consumer Secret of the connected app 
configured in the Salesforce instance setup. |  | String
 | *httpProxyAuthUri* (security) | Used in authentication against the HTTP 
proxy server, needs to match the URI of the proxy server in order for the 
httpProxyUsername and httpProxyPassword to be used for authentication. |  | 
String
 | *httpProxyPassword* (security) | Password to use to authenticate against the 
HTTP proxy server. |  | String
 | *httpProxyRealm* (security) | Realm of the proxy server, used in preemptive 
Basic/Digest authentication methods against the HTTP proxy server. |  | String
+| *httpProxySecure* (security) | If set to false disables the use of TLS when 
accessing the HTTP proxy. | true | boolean
 | *httpProxyUseDigestAuth* (security) | If set to true Digest authentication 
will be used when authenticating to the HTTP proxy, otherwise Basic 
authorization method will be used | false | boolean
 | *httpProxyUsername* (security) | Username to use to authenticate against the 
HTTP proxy server. |  | String
 | *instanceUrl* (security) | URL of the Salesforce instance used after 
authentication, by default received from Salesforce on successful 
authentication |  | String
-| *isHttpProxySecure* (security) | If set to false disables the use of TLS 
when accessing the HTTP proxy. | true | boolean
 | *keystore* (security) | KeyStore parameters to use in OAuth JWT flow. The 
KeyStore should contain only one entry with private key and certificate. 
Salesforce does not verify the certificate chain, so this can easily be a 
selfsigned certificate. Make sure that you upload the certificate to the 
corresponding connected app. |  | KeyStoreParameters
 | *lazyLogin* (security) | If set to true prevents the component from 
authenticating to Salesforce with the start of the component. You would 
generally set this to the (default) false and authenticate early and be 
immediately aware of any authentication issues. | false | boolean
 | *loginConfig* (security) | All authentication configuration in one nested 
bean, all properties set there can be set directly on the component as well |  
| SalesforceLoginConfig

Reply via email to