This is an automated email from the ASF dual-hosted git repository.

davsclaus pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel.git


The following commit(s) were added to refs/heads/main by this push:
     new 4b7c988  CAMEL-16861: Cleanup docs
4b7c988 is described below

commit 4b7c988c4df8357c3f193a2e314ea14c4b13674c
Author: Claus Ibsen <[email protected]>
AuthorDate: Mon Nov 1 10:38:44 2021 +0100

    CAMEL-16861: Cleanup docs
---
 docs/user-manual/modules/ROOT/nav.adoc             |   1 -
 .../user-manual/modules/ROOT/pages/camel-boot.adoc |  32 -----
 .../modules/ROOT/pages/camel-catalog.adoc          |  31 +++--
 .../ROOT/pages/camel-component-maven-plugin.adoc   |  10 +-
 .../ROOT/pages/camel-configuration-utilities.adoc  | 141 ++++++++++++---------
 .../modules/ROOT/pages/camel-jbang.adoc            |  18 +--
 .../modules/ROOT/pages/camel-maven-archetypes.adoc |   4 +-
 .../modules/ROOT/pages/camel-maven-plugin.adoc     |  26 +---
 .../ROOT/pages/camel-report-maven-plugin.adoc      |  45 ++++---
 docs/user-manual/modules/ROOT/pages/index.adoc     |   1 -
 10 files changed, 146 insertions(+), 163 deletions(-)

diff --git a/docs/user-manual/modules/ROOT/nav.adoc 
b/docs/user-manual/modules/ROOT/nav.adoc
index d842afb..d6a1623 100644
--- a/docs/user-manual/modules/ROOT/nav.adoc
+++ b/docs/user-manual/modules/ROOT/nav.adoc
@@ -5,7 +5,6 @@
 ** link:/community/books/[Books]
 ** xref:building.adoc[Building]
 ** xref:camel-jbang.adoc[Camel JBang]
-** xref:camel-boot.adoc[Camel Boot]
 ** xref:camel-maven-plugin.adoc[Camel Maven Plugin]
 ** xref:camel-component-maven-plugin.adoc[Camel Component Maven Plugin]
 ** xref:camel-report-maven-plugin.adoc[Camel Maven Report Plugin]
diff --git a/docs/user-manual/modules/ROOT/pages/camel-boot.adoc 
b/docs/user-manual/modules/ROOT/pages/camel-boot.adoc
deleted file mode 100644
index 3dcfb1e..0000000
--- a/docs/user-manual/modules/ROOT/pages/camel-boot.adoc
+++ /dev/null
@@ -1,32 +0,0 @@
-= Camel Boot
-
-Camel lets you boot up a JVM process and configure Camel nicely using
-whichever dependency injection framework you choose.
-
-For each of the main dependency injection frameworks, Camel has a Main
-class with a `public static void run(String[] args)` function so that
-you can boot up your JVM which then also bootstraps the Dependency
-Injection framework to load all the camel contexts and services
-required.
-
-The following camel boot options are supported:
-
-[[CamelBoot-CDI]]
-== CDI
-
-Using the xref:components:others:cdi.adoc[camel-cdi module] you can boot up 
your Camel
-Java process using the *org.apache.camel.cdi.Main* class
-
-[[CamelBoot-Spring]]
-== Spring
-
-Using the xref:components:others:spring-main.adoc[Spring] you can boot your
-Camel Java process using the *org.apache.camel.spring.Main* class
-
-[[CamelBoot-SpringBoot]]
-== Spring Boot
-
-You can combine Spring Boot with Camel using
-Camel's Spring Boot integration. In this case
-your application looks and feels like a regular Spring Boot application
-but with full Camel integration.
diff --git a/docs/user-manual/modules/ROOT/pages/camel-catalog.adoc 
b/docs/user-manual/modules/ROOT/pages/camel-catalog.adoc
index 15f4b89..f08dc39 100644
--- a/docs/user-manual/modules/ROOT/pages/camel-catalog.adoc
+++ b/docs/user-manual/modules/ROOT/pages/camel-catalog.adoc
@@ -2,30 +2,38 @@
 
 Each release includes a catalog with all sorts of information about what’s 
included in the release.
 
-The catalog is shipped in an independent standalone camel-catalog JAR 
containing the following information:
+== About Camel Catalog
 
-- List of all components, data formats, languages, EIPs, and everything else 
in the
-release
-- Curated lists for Spring Boot and Apache Karaf runtime
+The catalog is shipped in an independent standalone `camel-catalog` JAR 
containing the following information:
+
+- List of all components, data formats, languages, EIPs, and everything else 
in the release
+- Curated lists for Camel Quarkus, Camel Spring Boot, and Camel Karaf runtimes
 - JSON schema with extensive details for every option
 - Human-readable documentation for every option
 - Categorization of options (for example, find all database components)
 - XML schema for the XML DSLs
 - Maven Archetype Catalog of all the Camel archetypes
-- Component documentation as ascii doc
-- Validator for Camel endpoint and Simple language
-- API to create Camel endpoint URLs
-- Java API
+
+There is also a Java API for tooling:
+
+- validating Camel endpoints and the Simple language
+- creating Camel endpoint URLs
 
 The catalog provides a wealth of information that tooling can tap into and use.
 
-For example, 
https://plugins.jetbrains.com/plugin/9371-apache-camel-idea-plugin[Camel 
tooling for IDEA], 
https://marketplace.eclipse.org/content/language-support-apache-camel[Eclipse] 
and 
https://marketplace.visualstudio.com/items?itemName=redhat.vscode-apache-camel[VSCode]
 uses the catalog in the editor
-to know all details about every EIP and component Camel supports.
+=== Tooling using Camel Catalog
+
+The following tools uses the catalog in their editor:
+
+- https://plugins.jetbrains.com/plugin/9371-apache-camel-idea-plugin[Camel 
tooling for IDEA]
+- https://marketplace.eclipse.org/content/language-support-apache-camel[Camel 
tooling for Eclipse]
+- 
https://marketplace.visualstudio.com/items?itemName=redhat.vscode-apache-camel[Camel
 tooling for VS Code]
+- 
https://marketplace.visualstudio.com/items?itemName=camel-karavan.karavan[Camel 
Karavan for VS Code]
 
 The xref:camel-report-maven-plugin.adoc[Camel Maven validation] plugin uses 
the catalog during validation of all the
 Camel endpoints found while scanning the source code.
 
-== Layout of camel-catalog
+=== Layout of camel-catalog
 
 JAR includes the information using the following directory layout:
 
@@ -38,7 +46,6 @@ org
       ├── archetypes (Maven archetype catalog)
       ├── components (JSON schema)
       ├── dataformats (JSON schema)
-      ├── docs (Ascii docs)
       ├── languages (JSON schema)
       ├── main (JSON schema)
       ├── models (JSON schema)
diff --git 
a/docs/user-manual/modules/ROOT/pages/camel-component-maven-plugin.adoc 
b/docs/user-manual/modules/ROOT/pages/camel-component-maven-plugin.adoc
index da6150f..b58c4bb 100644
--- a/docs/user-manual/modules/ROOT/pages/camel-component-maven-plugin.adoc
+++ b/docs/user-manual/modules/ROOT/pages/camel-component-maven-plugin.adoc
@@ -6,7 +6,10 @@ Maven Plugin] allows third party component developers to 
generate all the necess
 
 == Goals Supported
 
-=== :generate
+The following goals is supported:
+
+=== generate
+
 This goal will generate the following metadata files and Java files:
 
 * Jandex index: it will generate a Jandex index for used Java annotations 
within the project which allows to more efficiency to search and load the 
annotations to generate other metadata as mentioned below.
@@ -44,4 +47,7 @@ In case you *did not* use the Camel Maven Archetypes to 
bootstrap the initial co
 </plugin>
 ----
 
-This will attach this plugin `:generate` goal to Maven's `process-classes`, in 
order to generate all the necessary files being describe above upon 
compilation. Thus, `mvn test`, `mvn package`, `mvn verify` and `mvn install` 
phases should run this plugin.
+This will attach the plugin `generate` goal to Maven's `process-classes`,
+in order to generate all the necessary files being described above upon 
compilation.
+
+Thus, `mvn test`, `mvn package`, `mvn verify` and `mvn install` phases should 
run this plugin.
diff --git 
a/docs/user-manual/modules/ROOT/pages/camel-configuration-utilities.adoc 
b/docs/user-manual/modules/ROOT/pages/camel-configuration-utilities.adoc
index 1515f7b..491b875 100644
--- a/docs/user-manual/modules/ROOT/pages/camel-configuration-utilities.adoc
+++ b/docs/user-manual/modules/ROOT/pages/camel-configuration-utilities.adoc
@@ -5,7 +5,7 @@ 
https://docs.oracle.com/en/java/javase/11/security/java-secure-socket-extension-
 Secure Socket Extension] (JSSE) API in order to greatly simplify the use
 of custom transport layer security (TLS) settings on Camel components.
 
-== Supported Components
+== Supported JSSE Components
 
 A number of Camel components support this (such as but not limited to):
 
@@ -17,7 +17,7 @@ A number of Camel components support this (such as but not 
limited to):
 * xref:components::netty-component.adoc[Netty]
 * xref:components::mail-component.adoc[Mail]
 
-== Configuration
+== Configuring JSSE with Camel
 
 The key component in configuring TLS through the JSSE API is the `SSLContext`.
 
@@ -55,11 +55,11 @@ contain the following elements:
 
 provider::
 The optional provider identifier for the JSSE implementation to use when
-constructing the SSLContext.  If omitted, the standard provider look-up
+constructing the SSLContext. If omitted, the standard provider look-up
 mechanism is used to resolve the provider.
 secureSocketProtocol::
 The optional secure socket protocol. See 
https://docs.oracle.com/en/java/javase/11/docs/specs/security/standard-names.html[Java
 Security Standard Algorithm Names]
-for information about standard protocol names.  If omitted, TLS is used by 
default.
+for information about standard protocol names. If omitted, TLS is used by 
default.
 Note that this property is related to but distinctly different from the
 secureSocketProtocols and secureSocketProtocolsFilter properties.
 certAlias::
@@ -71,65 +71,75 @@ sessions on both the client and server side as well as in 
the SSLEngine.
 cipherSuites::
 This optional property represents a collection of explicitly named
 cipher suites to enable on both the client and server side as well as in
-the SSLEngine.  These values take precedence over filters supplied in
-cipherSuitesFilter.  The utility attempts to enable the listed cipher
-suites regardless of whether or not the JSSE provider actually supports
-them or not.  This behavior guarantees that listed cipher suites are
-always enabled when listed.  For a more lenient option, use
+the SSLEngine. These values take precedence over filters supplied in
+cipherSuitesFilter. The utility attempts to enable the listed cipher
+suites regardless of whether the JSSE provider actually supports
+them or not. This behavior guarantees that listed cipher suites are
+always enabled when listed. For a more lenient option, use
 cipherSuitesFilter.
 cipherSuitesFilter::
 This optional property represents a collection of include and exclude
 patterns for cipher suites to enable on both the client and server side
-as well as in the SSLEngine.  The patterns are applied over only the
-available cipher suites.  The exclude patterns have precedence over the
-include patterns.  If no cipherSuites and no cipherSuitesFilter are
-present, the default patterns applied are: +
-Includes .\*; +
+as well as in the SSLEngine. The patterns are applied over only the
+available cipher suites. The excludes patterns have precedence over the
+includes patterns. If no cipherSuites and no cipherSuitesFilter are
+present, the default patterns applied are:
+
+[source,text]
+----
+Includes .\*;
 Excludes .*_NULL_.*, .\*_anon_.*, .\*DES.*, .\*EXPORT.*, .\*MD5, .*RC4.*
+----
+
 secureSocketProtocols::
 This optional property represents a collection of explicitly named
 secure socket protocols, such as SSLv3/TLS/etc., to enable on both the
-client and server side as well as in the SSLEngine.  These values take
+client and server side as well as in the SSLEngine. These values take
 precedence over filters supplied in secureSocketProtocolsFilter.  The
-utility attempts to enable the listed protocols regardless of whether or
-not the JSSE provider actually supports them or not.  This behavior
-guarantees that listed protocols are always enabled when listed.  For a
+utility attempts to enable the listed protocols regardless of whether
+the JSSE provider actually supports them or not. This behavior
+guarantees that listed protocols are always enabled when listed. For a
 more lenient option, use secureSocketProtocolsFilter.
 secureSocketProtocolsFilter::
 This optional property represents a collection of include and exclude
 patterns for secure socket protocols to enable on both the client and
-server side as well as in the SSLEngine.  The patterns are applied over
-only the available protocols. The exclude patterns have precedence over
-the include patterns. If no secureSocketProtocols and no
+server side as well as in the SSLEngine. The patterns are applied over
+only the available protocols. The excludes patterns have precedence over
+the includes patterns. If no secureSocketProtocols and no
 secureSocketProtocolsFilter are present, the default patterns applied
-are: Includes .*
+are:
+
+[source,text]
+----
+Includes .*
+----
 
 keyManagers::
 This optional property configures the source of key material for
 providing identity of client and server side connections as well as in
-the SSLEngine.  If omitted, no source of key material is provided and
+the SSLEngine. If omitted, no source of key material is provided and
 the SSLContext is suitable only for client-side usage when mutual
-authentication is not in use.  You typically configure this property
+authentication is not in use. You typically configure this property
 with a key store containing a client or server private key.
 trustManagers::
 This optional property configures the source of material for verifying
-trust of key material used in the handshake process.  If omitted, the
-default trust manager is automatically used.  See the
+trust of key material used in the handshake process. If omitted, the
+default trust manager is automatically used. See the
 
https://docs.oracle.com/en/java/javase/11/security/java-secure-socket-extension-jsse-reference-guide.html#GUID-7D9F43B8-AABF-4C5B-93E6-3AFB18B66150[JSSE
 documentation] for more information on how the default trust manager is
-configured.  You typically configure this property with a key store
+configured. You typically configure this property with a key store
 containing trusted CA certificates.
 secureRandom::
 This optional property configures the secure random number generator
-used by the client and server side as well as in the SSLEngine.  If
+used by the client and server side as well as in the SSLEngine. If
 omitted, the default secure random number generator is used.
 clientParameters::
 This optional property configures additional settings that apply only to
-the client side aspects of the SSLContext.  If present, these settings
+the client side aspects of the SSLContext. If present, these settings
 override the settings specified at the SSLContextParameters level.
 serverParameters::
 This optional property configures additional settings that apply only to
-the server side aspects of the SSLContext.  If present, these settings
+the server side aspects of the SSLContext. If present, these settings
 override the settings specified at the SSLContextParameters level.
 
 
@@ -150,18 +160,18 @@ PKCS#11, the key password may be provided through other 
means and is
 omitted entirely in this configuration.
 provider::
 The optional provider identifier for the KeyManagerFactory used to
-create the KeyManagers represented by this object's configuration.  If
+create the KeyManagers represented by this object's configuration. If
 omitted, the default look-up behavior is used.
 algorithm::
 The optional algorithm name for the KeyManagerFactory used to create the
-KeyManager represented by this object's configuration.  See the
+KeyManager represented by this object's configuration. See the
 
https://docs.oracle.com/en/java/javase/11/security/java-secure-socket-extension-jsse-reference-guide.html[Java
 Secure Socket Extension Reference Guide] for information about standard
 algorithm names.
 keyStore::
 This optional property represents the key store that provides key
-material to the key manager.  This is typically configured with a key
-store containing a user or server private key.  In some cases, such as
+material to the key manager. This is typically configured with a key
+store containing a user or server private key. In some cases, such as
 when using PKCS#11, the key store is omitted entirely.
 
 === TrustManagersParameters
@@ -175,7 +185,7 @@ TrustManagersParameters contain the following elements:
 
 provider::
 The optional provider identifier for the TrustManagerFactory used to
-create the TrustManagers represented by this object's configuration.  If
+create the TrustManagers represented by this object's configuration. If
 omitted, the default look-up behavior is used.
 algorithm::
 The optional algorithm name for the TrustManagerFactory used to create
@@ -184,11 +194,12 @@ 
https://docs.oracle.com/en/java/javase/11/security/java-secure-socket-extension-
 Secure Socket Extension Reference Guide] for information about standard
 algorithm names.
 trustManager::
-To use a existing configured trust manager instead of using
+To use an existing configured trust manager instead of using
 TrustManagerFactory to get the TrustManager.
 keyStore::
-See <<CamelConfigurationUtilities-KeyStoreParameters>>. This optional property 
represents the key store that provides key
-material to the trust manager.  This is typically configured with a key
+See <<CamelConfigurationUtilities-KeyStoreParameters>>.
+This optional property represents the key store that provides key
+material to the trust manager. This is typically configured with a key
 store containing trusted CA certificates / public keys.  In some cases,
 such as when using PKCS#11, the key store is omitted entirely.
 
@@ -203,20 +214,20 @@ KeyStoreParameters contain the following elements:
 * resource (attribute)
 
 type::
-The optional type of the key store.  See the
+The optional type of the key store. See the
 
https://docs.oracle.com/en/java/javase/11/docs/specs/security/standard-names.html[Java
 Security Standard Algorithm Names]
-for more information on standard names.  If omitted, defaults to the default
+for more information on standard names. If omitted, defaults to the default
 lookup mechanism as defined by `KeyStore.getDefaultType()`
 password::
 The optional password for reading/opening/verifying the key store.
 provider::
 The optional provider identifier for the provider used to create the
-KeyStores represented by this object's configuration.  If omitted, the
+KeyStores represented by this object's configuration. If omitted, the
 default look-up behavior is used.
 resource::
 This optional property represents the location of the key store resource
-to load the key store from.  In some cases, the resource is omitted as
-the key store content is provided by other means.  The loading of the
+to load the key store from. In some cases, the resource is omitted as
+the key store content is provided by other means. The loading of the
 resource, if provided, is attempted by treating the resource as a file
 path, a class path resource, and a URL in that order. An exception is
 thrown if the resource cannot be resolved to readable input stream using
@@ -231,14 +242,16 @@ FilterParameters contain the following elements:
 * exclude (element, multiple string)
 include::
 This optional property represents zero or more regular expression
-patterns for which matching values should be included.  The list of
-excludes takes precedence over the include patterns.
+patterns for which matching values should be included. The list of
+excludes takes precedence over the includes patterns.
 exclude::
 This optional property represents zero or more regular expression
-patterns for which matching values should be included.  The list of
-excludes takes precedence over the include patterns.
+patterns for which matching values should be included. The list of
+excludes takes precedence over the includes patterns.
+
 
 === SecureRandomParameters
+
 SecureRandomParameters contain the following elements:
 
 * algorithm (attribute)
@@ -252,9 +265,10 @@ for information about standard RNG algorithm names.
 provider::
 The optional provider identifier for the SecureRandom factory method
 used to create the SecureRandom represented by this object's
-configuration.  If omitted, the default look-up behavior is used.
+configuration. If omitted, the default look-up behavior is used.
 
 === SSLContextServerParameters
+
 SSLContextServerParameters contain the following elements:
 
 * clientAuthentication (attribute)
@@ -267,32 +281,34 @@ SSLContextServerParameters contain the following elements:
 clientAuthentication::
 This optional property indicates if the server side does not request,
 requests, or requires clients to provide authentication credentials
-during the handshake process.  This is commonly referred to as mutual
-authentication, two direction SSL/TLS, or two-legged SSL/TLS.  +
- Valid values are: NONE, WANT, REQUIRE
+during the handshake process. This is commonly referred to as mutual
+authentication, two direction SSL/TLS, or two-legged SSL/TLS.
+Valid values are: NONE, WANT, REQUIRE
+
 sessionTimeout::
 This optional property defines the timeout period, in seconds, for
-sessions on the server side.  This setting affects both the
-SSLServerSocketFactory/SSLServerSocket as well as the server side of the
+sessions on the server side. This setting affects both the
+SSLServerSocketFactory/SSLServerSocket and the server side of the
 SSLEngine.
 cipherSuites::
 This optional property overrides the value of this
-setting in the SSLContextParameters. This option has no affect on the
+setting in the SSLContextParameters. This option has no effect on the
 SSLEngine configuration.
 cipherSuitesFilter::
 This optional property overrides the value of this
-setting in the SSLContextParameters.  This option has no affect on the
+setting in the SSLContextParameters.  This option has no effect on the
 SSLEngine configuration.
 secureSocketProtocols::
 This optional property overrides the
-value of this setting in the SSLContextParameters.  This option has no
-affect on the SSLEngine configuration.
+value of this setting in the SSLContextParameters. This option has no
+effect on the SSLEngine configuration.
 secureSocketProtocolsFilter::
 This optional property overrides the value of this
-setting in the SSLContextParameters. This option has no affect on the
+setting in the SSLContextParameters. This option has no effect on the
 SSLEngine configuration.
 
 === SSLContextClientParameters
+
 SSLContextClientParameters contains the following elements:
 
 * sniHostNames (elements)
@@ -351,8 +367,13 @@ SSLEngine engine = scp.createSSLEngine();
 In this example, both the client and server sides share the same custom
 key store; however, the client side allows any supported cipher suite
 while the server side will use the default cipher suite filter and
-exclude any cipher suites that match the patterns .*_NULL_.* and
-.*_anon_.*.
+exclude any cipher suites that match the patterns:
+
+[source,text]
+----
+.*_NULL_.*
+.*_anon_.*
+----
 
 [source,java]
 -------------------------------------------------------------------
diff --git a/docs/user-manual/modules/ROOT/pages/camel-jbang.adoc 
b/docs/user-manual/modules/ROOT/pages/camel-jbang.adoc
index 9dd4c0c..add02b4 100644
--- a/docs/user-manual/modules/ROOT/pages/camel-jbang.adoc
+++ b/docs/user-manual/modules/ROOT/pages/camel-jbang.adoc
@@ -1,9 +1,9 @@
 = Camel JBang
 
-A JBang-based Camel app for searching for kamelets, components, languages,  
running routes. This component is available from *Camel 3.12* and newer 
versions.
+A JBang-based Camel app for searching for kamelets, components, languages, 
running routes.
 
+The `camel-jbang` is available from *Camel 3.12* and newer versions.
 
-[[CamelJBang-Installation]]
 == Installation
 
 JBang makes it easy for us by providing an installation feature that works 
with Github. If you have JBang installed on your system, then you can run the 
following command to install CamelJBang:
@@ -13,9 +13,7 @@ JBang makes it easy for us by providing an installation 
feature that works with
 jbang app install CamelJBang@apache/camel
 ----
 
-
-[[CamelJBang-Usage]]
-== Usage
+== Using Camel JBang
 
 The CamelJBang supports multiple commands. Running the command below, will 
print all of them:
 
@@ -26,8 +24,7 @@ CamelJBang.java [command]
 
 All the commands support the `--help` and will display the appropriate help if 
that flag is provided.
 
-[[CamelJBang-Search]]
-== Search
+=== Search
 
 You can use the CLI to search for kamelets, components, languages and 
miscelaneous components (others). Running the following command will present a 
list of items that can be searched:
 
@@ -71,8 +68,7 @@ The same behavior also works for all the other search 
commands. The table below
 |===
 
 
-[[CamelJBang-Init-Kamets]]
-== Init Kamelets
+=== Init Kamelets
 
 The init sub-command can be used to simplify creating Kamelets. Through this 
command, it is possible to create new Kamelets through pre-configured 
templates. It works in two steps: first it is necessary to bootstrap the 
Kamelet by creating a properties file with the parameters necessary to create 
the Kamelet. Once the properties file is correctly set, then it is possible to 
create a pre-filled Kamelet by processing that properties file.
 
@@ -99,8 +95,7 @@ Running this command will create a new file in the `work` 
directory. The name of
 After the file is generated, it may still need to require final adjustments, 
such as correctly setting the name, the icon and other requirements for 
official Kamelets. Please consult the Kamelet development documentation for 
updated details.
 
 
-[[CamelJBang-Init-Bindings]]
-== Init Bindings
+=== Init Bindings
 
 The init sub-command can also be used to simplify creating Kamelets bindings. 
Through this command, it is possible to create new bindings through 
pre-configured templates. Use the  `--kamelet` option (you can list the 
available ones using the search command) to set the Kamelet to generate the 
binding for.
 
@@ -121,7 +116,6 @@ CamelJBang init binding --destination 
/path/to/destination/directory/ --kamelet
 ----
 
 
-[[CamelJBang-Running]]
 == Running Routes
 
 At the moment it is possible to run YAML-based routes which also refer to 
Kamelets in the catalog.
diff --git a/docs/user-manual/modules/ROOT/pages/camel-maven-archetypes.adoc 
b/docs/user-manual/modules/ROOT/pages/camel-maven-archetypes.adoc
index 18ef1f6..340c0dc 100644
--- a/docs/user-manual/modules/ROOT/pages/camel-maven-archetypes.adoc
+++ b/docs/user-manual/modules/ROOT/pages/camel-maven-archetypes.adoc
@@ -2,7 +2,6 @@
 
 Camel is distributed with the following archetypes for Maven end users.
 
-[[CamelMavenArchetypes-ArchetypeSupported]]
 == Archetype Supported
 
 [width="100%",cols="50%,50%",options="header",]
@@ -58,8 +57,7 @@ The maven coordinates for these archetypes is the following:
 </dependency>
 ----
 
-[[CamelMavenArchetypes-Snapshotarchetypes]]
-== Snapshot archetypes
+=== Snapshot Archetypes
 
 If you would like to use an archetype from an unreleased version of
 Camel, you just need to let the maven-archetype-plugin know where to
diff --git a/docs/user-manual/modules/ROOT/pages/camel-maven-plugin.adoc 
b/docs/user-manual/modules/ROOT/pages/camel-maven-plugin.adoc
index d7e134d..168e7fd 100644
--- a/docs/user-manual/modules/ROOT/pages/camel-maven-plugin.adoc
+++ b/docs/user-manual/modules/ROOT/pages/camel-maven-plugin.adoc
@@ -10,8 +10,9 @@ The Camel Maven Plugin supports the following goals
 The `camel:run` goal of the Camel Maven Plugin is used to run your Camel 
Spring configurations in a forked JVM from Maven.
 A good example application to get you started is the Spring Example.
 
+[source,bash]
 ----
-cd examples/camel-example-spring
+cd examples/spring
 mvn camel:run
 ----
 
@@ -27,6 +28,7 @@ If you want to boot up your Camel routes a little faster, you 
could try the `cam
 
 The maven plugin *run* goal supports the following options which can be 
configured from the command line (use `-D` syntax), or defined in the `pom.xml` 
file in the `<configuration>` tag.
 
+[width="100%",cols="2,2,6",options="header",]
 |===
 | Parameter | Default Value | Description
 | duration | -1 | Sets the time duration (seconds) that the application will 
run for before terminating. A value <= 0 will run forever.
@@ -49,6 +51,7 @@ You should add the CDI container of your choice (e.g. Weld or 
OpenWebBeans) to t
 
 From the source of Camel you can run a CDI example via
 
+[source,bash]
 ----
 cd examples/camel-example-cdi
 mvn compile camel:run
@@ -70,27 +73,6 @@ You can enable this in the configuration using:
 </plugin>
 ----
 
-=== Using live reload of XML files
-
-You can configure the plugin to scan for XML file changes and trigger a reload 
of the Camel routes which are contained in those XML files.
-
-[source,xml]
-----
-<plugin>
-  <groupId>org.apache.camel</groupId>
-  <artifactId>camel-maven-plugin</artifactId>
-  <configuration>
-    
<fileWatcherDirectory>src/main/resources/META-INF/spring</fileWatcherDirectory>
-  </configuration>
-</plugin>
-----
-
-Then the plugin watches this directory. This allows you to edit the source 
code from your editor and save the file, and have
-    the running Camel application pickup those changes.
-
-Notice its only changes of Camel routes, eg `<routes>`, or `<route>` which is 
supported.
-You cannot change Spring or OSGi Blueprint `<bean>` elements.
-
 
 == camel:prepare-fatjar
 
diff --git a/docs/user-manual/modules/ROOT/pages/camel-report-maven-plugin.adoc 
b/docs/user-manual/modules/ROOT/pages/camel-report-maven-plugin.adoc
index 8167e8f..7e05009 100644
--- a/docs/user-manual/modules/ROOT/pages/camel-report-maven-plugin.adoc
+++ b/docs/user-manual/modules/ROOT/pages/camel-report-maven-plugin.adoc
@@ -15,8 +15,9 @@ For validating the source code for mis configured Camel:
 - seda/direct endpoint pairs
 - configuration in properties files
 
-Then you can run the validate goal from the command line or from within your 
Java editor such as IDEA or Eclipse.
+Then you can run validate goal from the command line or from within your Java 
editor such as IDEA or Eclipse.
 
+[source,bash]
 ----
 mvn camel-report:validate
 ----
@@ -66,38 +67,41 @@ changed accordingly to `process-test-classes` as shown 
below:
 
 === Running the goal on any Maven project
 
-You can also run the validate goal on any Maven project without having to add 
the plugin to the `pom.xml` file.
+You can also run validate goal on any Maven project without having to add the 
plugin to the `pom.xml` file.
 Doing so requires to specify the plugin using its fully qualified name. For 
example to run the goal on
-the `camel-example-cdi` from Apache Camel you can run
+the `cdi` from Apache Camel you can run
 
+[source,bash]
 ----
-$cd camel-example-cdi
-$mvn org.apache.camel:camel-report-maven-plugin:2.20.0:validate
+$cd examples/cdi
+$mvn org.apache.camel:camel-report-maven-plugin:3.13.0:validate
 ----
 
 which then runs and outputs the following:
 
 ----
 [INFO] ------------------------------------------------------------------------
-[INFO] Building Camel :: Example :: CDI 3.0.0
+[INFO] Building Camel :: Example :: CDI 3.13.0
 [INFO] ------------------------------------------------------------------------
 [INFO]
-[INFO] --- camel-report-maven-plugin:3.0.0:validate (default-cli) @ 
camel-example-cdi ---
-[INFO] Endpoint validation success: (4 = passed, 0 = invalid, 0 = incapable, 0 
= unknown components)
+[INFO] --- camel-report-maven-plugin:3.13.0:validate (default-cli) @ 
camel-example-cdi ---
+[INFO] Endpoint validation success: (5 = passed, 0 = invalid, 0 = incapable, 0 
= unknown components, 0 = deprecated options)
 [INFO] Simple validation success: (0 = passed, 0 = invalid)
+[INFO] Endpoint pair (seda/direct) validation success: (0 = pairs)
+[INFO] Duplicate route id validation success: (0 = ids)
+[INFO] Configuration validation success: (0 = passed, 0 = invalid, 0 = 
incapable, 0 = unknown components, 0 = deprecated options)
 [INFO] ------------------------------------------------------------------------
 [INFO] BUILD SUCCESS
 [INFO] ------------------------------------------------------------------------
 ----
 
-The validation passed, and 4 endpoints was validated. Now suppose we made a 
typo in one of the Camel endpoint uris in the source code, such as:
+The validation passed, and 5 endpoints was validated. Now suppose we made a 
typo in one of the Camel endpoint uris in the source code, such as:
 
 [source,java]
 ----
 @Uri("timer:foo?period=5000")
 ----
 
-
 is changed to include a typo error in the `period` option
 
 [source,java]
@@ -105,15 +109,15 @@ is changed to include a typo error in the `period` option
 @Uri("timer:foo?perid=5000")
 ----
 
-And when running the validate goal again reports the following:
+And when running validate goal again reports the following:
 
 ----
 [INFO] ------------------------------------------------------------------------
-[INFO] Building Camel :: Example :: CDI 3.0.0
+[INFO] Building Camel :: Example :: CDI 3.13.0
 [INFO] ------------------------------------------------------------------------
 [INFO]
-[INFO] --- camel-report-maven-plugin:3.0.0:validate (default-cli) @ 
camel-example-cdi ---
-[WARNING] Endpoint validation error at: 
org.apache.camel.example.cdi.MyRoutes(MyRoutes.java:32)
+[INFO] --- camel-report-maven-plugin:3.13.0:validate (default-cli) @ 
camel-example-cdi ---
+[WARNING] Endpoint validation error at: 
org.apache.camel.example.cdi.MyRoutes(MyRoutes.java:31)
 
        timer:foo?perid=5000
 
@@ -155,6 +159,7 @@ The maven plugin *validate* goal supports the following 
options which can be con
 
 For example to turn off ignoring usage of deprecated options from the command 
line, you can run:
 
+[source,bash]
 ----
 $mvn camel-report:validate -Dcamel.ignoreDeprecated=true
 ----
@@ -166,6 +171,7 @@ Notice that you must prefix the `-D` command argument with 
`camel.`, eg `camel.i
 If you have a Maven project then you can run the plugin to validate the 
endpoints in the unit test source code as well.
 You can pass in the options using `-D` style as shown:
 
+[source,bash]
 ----
 $cd myproject
 $mvn org.apache.camel:camel-report-maven-plugin:3.0.0:validate 
-DincludeTest=true
@@ -220,6 +226,7 @@ This can be done either in the configuration of the 
`maven-surefire-plugin`:
 
 Or from the command line when running tests:
 
+[source,bash]
 ----
 mvn clean test -DCamelTestRouteCoverage=true
 ----
@@ -239,7 +246,7 @@ public class FooApplicationTest {
 
 ==== Enabling via isDumpRouteCoverage method
 
-However if you are using `camel-test` and your unit tests are extending 
`CamelTestSupport` then you can
+However, if you are using `camel-test-junit5` and your unit tests are 
extending `CamelTestSupport` then you can
 turn on route coverage as shown:
 
 [source,java]
@@ -250,7 +257,7 @@ public boolean isDumpRouteCoverage() {
 }
 ----
 
-Routes that can be route coveraged must have an unique id assigned, in other 
words you cannot use anonymous routes.
+Routes that can be route covered must have a unique id assigned, in other 
words you cannot use anonymous routes.
 
 You do this using `routeId` in Java DSL:
 
@@ -276,20 +283,22 @@ And in XML DSL you just assign the route id via the id 
attribute
 
 After unit testing with:
 
+[source,bash]
 ----
 mvn test
 ----
 
 You can then run the goal to report the route coverage
 
+[source,bash]
 ----
 mvn camel-report:route-coverage
 ----
 
-Which then reports which routes has missing route coverage with precise source 
code line reporting:
+Which then reports which routes have missing route coverage with precise 
source code line reporting:
 
 ----
-[INFO] --- camel-camel-report-plugin:3.0.0:route-coverage (default-cli) @ 
camel-example-spring-boot-xml ---
+[INFO] --- camel-camel-report-plugin:3.13.0:route-coverage (default-cli) @ 
camel-example-spring-boot-xml ---
 [INFO] Discovered 1 routes
 [INFO] Route coverage summary:
 
diff --git a/docs/user-manual/modules/ROOT/pages/index.adoc 
b/docs/user-manual/modules/ROOT/pages/index.adoc
index 828ce11..9f0e78f 100644
--- a/docs/user-manual/modules/ROOT/pages/index.adoc
+++ b/docs/user-manual/modules/ROOT/pages/index.adoc
@@ -43,7 +43,6 @@ For a deeper and better understanding of Apache Camel, an 
xref:faq:what-is-camel
 
 * xref:getting-started.adoc[Getting Started]
 * xref:book-getting-started.adoc[Longer Getting Started Guide]
-* xref:camel-boot.adoc[Camel Boot]
 * xref:components:others:cdi.adoc[Working with Camel and CDI]
 * xref:spring.adoc[Working with Camel and Spring]
 * xref:faq:how-do-i-configure-endpoints.adoc[How do I configure endpoints?]

Reply via email to