This is an automated email from the ASF dual-hosted git repository.

tsato pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-k.git

commit 9b8588b58c6c7baf2801cab1812664607d84dab8
Author: Tadayoshi Sato <[email protected]>
AuthorDate: Tue Jul 19 18:50:45 2022 +0900

    fix(olm): fix profile name: Openshift -> OpenShift
    
    Also fixes every occurrence of "Openshift" to "OpenShift" in the docs.
---
 config/crd/bases/camel.apache.org_integrationplatforms.yaml    | 4 ++--
 config/samples/patch-integration-platform.yaml                 | 2 +-
 docs/modules/ROOT/pages/architecture/traits.adoc               | 4 ++--
 docs/modules/ROOT/pages/contributing/local-deployment-olm.adoc | 2 +-
 docs/modules/ROOT/partials/apis/camel-k-crds.adoc              | 4 ++--
 docs/modules/traits/pages/route.adoc                           | 8 ++++----
 e2e/yaks/openshift/monitoring/alerting.feature                 | 2 +-
 helm/camel-k/crds/crd-integration-platform.yaml                | 4 ++--
 install/Makefile                                               | 2 +-
 pkg/apis/camel/v1/integrationplatform_types.go                 | 4 ++--
 pkg/apis/camel/v1/trait/route.go                               | 2 +-
 pkg/resources/resources.go                                     | 6 +++---
 pkg/trait/pull_secret.go                                       | 6 +++---
 release.adoc                                                   | 2 +-
 resources/traits.yaml                                          | 2 +-
 15 files changed, 27 insertions(+), 27 deletions(-)

diff --git a/config/crd/bases/camel.apache.org_integrationplatforms.yaml 
b/config/crd/bases/camel.apache.org_integrationplatforms.yaml
index 97e728f3c..5ae353de6 100644
--- a/config/crd/bases/camel.apache.org_integrationplatforms.yaml
+++ b/config/crd/bases/camel.apache.org_integrationplatforms.yaml
@@ -310,7 +310,7 @@ spec:
                 type: object
               cluster:
                 description: what kind of cluster you're running (ie, plain 
Kubernetes
-                  or Openshift)
+                  or OpenShift)
                 type: string
               configuration:
                 description: list of configuration properties to be attached 
to all
@@ -1868,7 +1868,7 @@ spec:
                 type: object
               cluster:
                 description: what kind of cluster you're running (ie, plain 
Kubernetes
-                  or Openshift)
+                  or OpenShift)
                 type: string
               conditions:
                 description: which are the conditions met (particularly useful 
when
diff --git a/config/samples/patch-integration-platform.yaml 
b/config/samples/patch-integration-platform.yaml
index 0f60cd2ab..4af3fedc8 100644
--- a/config/samples/patch-integration-platform.yaml
+++ b/config/samples/patch-integration-platform.yaml
@@ -24,7 +24,7 @@ spec:
   # The profile to be implemented by default
   # ie. OpenShift, Kubernetes, Knative
   #
-  profile: Openshift
+  profile: OpenShift
   #
   #
   # Options propagated to integrations
diff --git a/docs/modules/ROOT/pages/architecture/traits.adoc 
b/docs/modules/ROOT/pages/architecture/traits.adoc
index 203445c06..23c154a32 100644
--- a/docs/modules/ROOT/pages/architecture/traits.adoc
+++ b/docs/modules/ROOT/pages/architecture/traits.adoc
@@ -19,10 +19,10 @@ Traits are typically used to tune several aspects of an 
`Integration`. However,
 Another important concept related to the trait lifecycle is the **trait 
profile**. At this time, Camel K is supporting the following profiles:
 
 * Kubernetes
-* Openshift
+* OpenShift
 * Knative
 
-A profile is useful to identify on which kind of cluster a trait has to run: 
vanilla `Kubernetes`, `Openshift` or OpenShift/Kubernetes clusters powered by 
`Knative`. The default is to allow a trait on any profile; each trait can 
specify a different behavior (ie, running a trait only for a profile as it 
happens with `Knative`).
+A profile is useful to identify on which kind of cluster a trait has to run: 
vanilla `Kubernetes`, `OpenShift` or OpenShift/Kubernetes clusters powered by 
`Knative`. The default is to allow a trait on any profile; each trait can 
specify a different behavior (ie, running a trait only for a profile as it 
happens with `Knative`).
 
 [[traits-configuration]]
 === Trait configuration
diff --git a/docs/modules/ROOT/pages/contributing/local-deployment-olm.adoc 
b/docs/modules/ROOT/pages/contributing/local-deployment-olm.adoc
index fc42ff012..996c8b731 100644
--- a/docs/modules/ROOT/pages/contributing/local-deployment-olm.adoc
+++ b/docs/modules/ROOT/pages/contributing/local-deployment-olm.adoc
@@ -6,7 +6,7 @@ The following steps assume that
 - you've already built the camel-k image using `make images` and made it 
available in the cluster as an imagestream
 - you've already built the bundle image using `make bundle` and have pushed it 
to some registry
 
-To perform OLM (Operator Lifecycle Manager) based deployment of camel-k, built 
from source locally on an Openshift cluster, you can follow the steps below.
+To perform OLM (Operator Lifecycle Manager) based deployment of camel-k, built 
from source locally on an OpenShift cluster, you can follow the steps below.
 
 Login to the cluster using the standard "oc" tool, create new project, 
complete the basic setup process. Reference commands below
 
diff --git a/docs/modules/ROOT/partials/apis/camel-k-crds.adoc 
b/docs/modules/ROOT/partials/apis/camel-k-crds.adoc
index 5562e39b2..977c7a31a 100644
--- a/docs/modules/ROOT/partials/apis/camel-k-crds.adoc
+++ b/docs/modules/ROOT/partials/apis/camel-k-crds.adoc
@@ -1885,7 +1885,7 @@ IntegrationPlatformSpec defines the desired state of 
IntegrationPlatform
 |
 
 
-what kind of cluster you're running (ie, plain Kubernetes or Openshift)
+what kind of cluster you're running (ie, plain Kubernetes or OpenShift)
 
 |`profile` +
 *xref:#_camel_apache_org_v1_TraitProfile[TraitProfile]*
@@ -5487,7 +5487,7 @@ as a Maven repository.
 
 The Route trait can be used to configure the creation of OpenShift routes for 
the integration.
 
-The certificate and key contents may be sourced either from the local 
filesystem or in a Openshift `secret` object.
+The certificate and key contents may be sourced either from the local 
filesystem or in a OpenShift `secret` object.
 The user may use the parameters ending in `-secret` (example: 
`tls-certificate-secret`) to reference a certificate stored in a `secret`.
 Parameters ending in `-secret` have higher priorities and in case the same 
route parameter is set, for example: `tls-key-secret` and `tls-key`,
 then `tls-key-secret` is used.
diff --git a/docs/modules/traits/pages/route.adoc 
b/docs/modules/traits/pages/route.adoc
index 493586cef..dbb3ceb76 100755
--- a/docs/modules/traits/pages/route.adoc
+++ b/docs/modules/traits/pages/route.adoc
@@ -3,7 +3,7 @@
 // Start of autogenerated code - DO NOT EDIT! (description)
 The Route trait can be used to configure the creation of OpenShift routes for 
the integration.
 
-The certificate and key contents may be sourced either from the local 
filesystem or in a Openshift `secret` object.
+The certificate and key contents may be sourced either from the local 
filesystem or in a OpenShift `secret` object.
 The user may use the parameters ending in `-secret` (example: 
`tls-certificate-secret`) to reference a certificate stored in a `secret`.
 Parameters ending in `-secret` have higher priorities and in case the same 
route parameter is set, for example: `tls-key-secret` and `tls-key`,
 then `tls-key-secret` is used.
@@ -107,7 +107,7 @@ Refer to the OpenShift route documentation for additional 
information.
 
 == Examples
 
-These examples uses *secrets* to store the certificates and keys to be 
referenced in the integrations. Read Openshift route documentation for detailed 
information about routes. The 
https://github.com/apache/camel-k/blob/main/examples/http/PlatformHttpServer.java[PlatformHttpServer.java]
 is the integration example. 
+These examples uses *secrets* to store the certificates and keys to be 
referenced in the integrations. Read OpenShift route documentation for detailed 
information about routes. The 
https://github.com/apache/camel-k/blob/main/examples/http/PlatformHttpServer.java[PlatformHttpServer.java]
 is the integration example. 
 
 As a requirement to run these examples, you should have a `secret` with a key 
and certificate.
 
@@ -141,12 +141,12 @@ kamel run --dev PlatformHttpServer.java --resource 
secret:my-combined-certs@/etc
 [source,console]
 kamel run --dev PlatformHttpServer.java --resource 
secret:my-combined-certs@/etc/ssl/my-combined-certs  -p 
quarkus.http.ssl.certificate.file=/etc/ssl/my-combined-certs/tls.crt -p 
quarkus.http.ssl.certificate.key-file=/etc/ssl/my-combined-certs/tls.key -t 
route.tls-termination=reencrypt -t 
route.tls-destination-ca-certificate-secret=my-combined-certs/tls.crt -t 
route.tls-certificate-secret=my-combined-certs/tls.crt -t 
route.tls-key-secret=my-combined-certs/tls.key -t container.port=8443
 
-* To add a *reencrypt* route using a specific certificate from a secret for 
the route and 
https://docs.openshift.com/container-platform/4.8/security/certificates/service-serving-certificate.html#add-service-certificate_service-serving-certificate[Openshift
 service serving certificates] for the integration endpoint. This way the 
Openshift service serving certificates is set up only in the integration pod. 
The keys and certificates should be visible in the running integration pod, to 
achie [...]
+* To add a *reencrypt* route using a specific certificate from a secret for 
the route and 
https://docs.openshift.com/container-platform/4.8/security/certificates/service-serving-certificate.html#add-service-certificate_service-serving-certificate[OpenShift
 service serving certificates] for the integration endpoint. This way the 
OpenShift service serving certificates is set up only in the integration pod. 
The keys and certificates should be visible in the running integration pod, to 
achie [...]
 +
 [source,console]
 kamel run --dev PlatformHttpServer.java --resource 
secret:cert-from-openshift@/etc/ssl/cert-from-openshift  -p 
quarkus.http.ssl.certificate.file=/etc/ssl/cert-from-openshift/tls.crt -p 
quarkus.http.ssl.certificate.key-file=/etc/ssl/cert-from-openshift/tls.key -t 
route.tls-termination=reencrypt -t 
route.tls-certificate-secret=my-combined-certs/tls.crt -t 
route.tls-key-secret=my-combined-certs/tls.key -t container.port=8443
 +
-Then you should annotate the integration service to inject the Openshift 
service serving certificates
+Then you should annotate the integration service to inject the OpenShift 
service serving certificates
 +
 [source,console]
 oc annotate service platform-http-server 
service.beta.openshift.io/serving-cert-secret-name=cert-from-openshift
diff --git a/e2e/yaks/openshift/monitoring/alerting.feature 
b/e2e/yaks/openshift/monitoring/alerting.feature
index 3a5750998..04b5d4a6b 100644
--- a/e2e/yaks/openshift/monitoring/alerting.feature
+++ b/e2e/yaks/openshift/monitoring/alerting.feature
@@ -1,4 +1,4 @@
-Feature: Alerts from Camel K are propagated to Openshift Prometheus
+Feature: Alerts from Camel K are propagated to OpenShift Prometheus
 
   Background: Prepare Thanos-ruler URL
     Given URL: https://thanos-ruler.openshift-user-workload-monitoring:9091
diff --git a/helm/camel-k/crds/crd-integration-platform.yaml 
b/helm/camel-k/crds/crd-integration-platform.yaml
index 97e728f3c..5ae353de6 100644
--- a/helm/camel-k/crds/crd-integration-platform.yaml
+++ b/helm/camel-k/crds/crd-integration-platform.yaml
@@ -310,7 +310,7 @@ spec:
                 type: object
               cluster:
                 description: what kind of cluster you're running (ie, plain 
Kubernetes
-                  or Openshift)
+                  or OpenShift)
                 type: string
               configuration:
                 description: list of configuration properties to be attached 
to all
@@ -1868,7 +1868,7 @@ spec:
                 type: object
               cluster:
                 description: what kind of cluster you're running (ie, plain 
Kubernetes
-                  or Openshift)
+                  or OpenShift)
                 type: string
               conditions:
                 description: which are the conditions met (particularly useful 
when
diff --git a/install/Makefile b/install/Makefile
index d5e4ed862..1680f9d90 100644
--- a/install/Makefile
+++ b/install/Makefile
@@ -335,7 +335,7 @@ endif
 # Customizes the samples patches for openshift
 #
 .platform-openshift-patch:
-       @sed -i 's/.*profile:.*/  profile: Openshift/' 
$(SAMPLES)/$(INT_PLATFORM_PATCH).$(YAML)
+       @sed -i 's/.*profile:.*/  profile: OpenShift/' 
$(SAMPLES)/$(INT_PLATFORM_PATCH).$(YAML)
 
 #
 # Install the integration platform
diff --git a/pkg/apis/camel/v1/integrationplatform_types.go 
b/pkg/apis/camel/v1/integrationplatform_types.go
index b2265c0ce..0bb94e061 100644
--- a/pkg/apis/camel/v1/integrationplatform_types.go
+++ b/pkg/apis/camel/v1/integrationplatform_types.go
@@ -27,7 +27,7 @@ import (
 
 // IntegrationPlatformSpec defines the desired state of IntegrationPlatform
 type IntegrationPlatformSpec struct {
-       // what kind of cluster you're running (ie, plain Kubernetes or 
Openshift)
+       // what kind of cluster you're running (ie, plain Kubernetes or 
OpenShift)
        Cluster IntegrationPlatformCluster `json:"cluster,omitempty"`
        // the profile you wish to use. It will apply certain traits which are 
required by the specific profile chosen.
        // It usually relates the Cluster with the optional definition of 
special profiles (ie, Knative)
@@ -177,7 +177,7 @@ const (
        IntegrationPlatformBuildPublishStrategyKaniko 
IntegrationPlatformBuildPublishStrategy = "Kaniko"
        // IntegrationPlatformBuildPublishStrategyS2I uses the Source to Images 
(S2I) feature
        // 
(https://docs.openshift.com/container-platform/4.9/openshift_images/create-images.html#images-create-s2i_create-images)
-       // provided by an Openshift cluster in order to create and push the 
images to the registry. It is the default choice on Openshift cluster
+       // provided by an OpenShift cluster in order to create and push the 
images to the registry. It is the default choice on OpenShift cluster
        IntegrationPlatformBuildPublishStrategyS2I 
IntegrationPlatformBuildPublishStrategy = "S2I"
        // IntegrationPlatformBuildPublishStrategySpectrum uses Spectrum 
project (https://github.com/container-tools/spectrum)
        // in order to push the incremental images to the image repository. It 
is the default choice on vanilla Kubernetes cluster
diff --git a/pkg/apis/camel/v1/trait/route.go b/pkg/apis/camel/v1/trait/route.go
index a25ac8171..29466b9cd 100644
--- a/pkg/apis/camel/v1/trait/route.go
+++ b/pkg/apis/camel/v1/trait/route.go
@@ -19,7 +19,7 @@ package trait
 
 // The Route trait can be used to configure the creation of OpenShift routes 
for the integration.
 //
-// The certificate and key contents may be sourced either from the local 
filesystem or in a Openshift `secret` object.
+// The certificate and key contents may be sourced either from the local 
filesystem or in a OpenShift `secret` object.
 // The user may use the parameters ending in `-secret` (example: 
`tls-certificate-secret`) to reference a certificate stored in a `secret`.
 // Parameters ending in `-secret` have higher priorities and in case the same 
route parameter is set, for example: `tls-key-secret` and `tls-key`,
 // then `tls-key-secret` is used.
diff --git a/pkg/resources/resources.go b/pkg/resources/resources.go
index 6492bd45d..49722daca 100644
--- a/pkg/resources/resources.go
+++ b/pkg/resources/resources.go
@@ -140,7 +140,7 @@ var assets = func() http.FileSystem {
                        modTime:          time.Time{},
                        uncompressedSize: 174369,
 
-                       compressedContent: 
[]byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xec\xbd\x7d\x73\xdb\x36\xb6\x30\xfe\x7f\x3e\x05\xc6\xfd\x23\x4e\x46\x92\x9b\xdd\xdb\xdd\x5e\xdf\xe9\x3c\x8f\xd7\x49\x5b\x37\x71\xec\x6b\x3b\xb9\x77\xa7\xed\x54\x10\x79\x24\x21\x22\x01\x2e\x00\xca\x51\x7f\xfb\xfb\xee\xcf\xe0\x00\x20\x29\x89\x04\x29\xc9\x6f\x6d\xc4\xce\xec\xc6\x36\x01\x1e\x1c\x1c\x9c\x37\x9c\x97\xaf\x48\xff\xee\x9e\x67\x5f\x91\x77\x2c\x02\xae\x20\x26\x5a\x10\x3d\x05\x72\x92\xd1\x68\x0a\xe4\x5a\x8c\xf5\x
 [...]
+                       compressedContent: 
[]byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xec\xbd\x7d\x73\xdb\x36\xb6\x30\xfe\x7f\x3e\x05\xc6\xfd\x23\x4e\xc6\x92\x9b\xdd\xdb\xdd\x5e\xdf\xe9\x3c\x8f\xd7\x49\x5b\x37\x71\xec\x6b\x39\xb9\x77\xa7\xed\x54\x10\x79\x24\x21\x22\x01\x2e\x00\xca\x51\x7f\xfb\xfb\xee\xcf\xe0\x00\x20\x29\x89\x04\x29\xc9\x6f\x6d\xc4\xce\xec\xc6\x36\x01\x1e\x1c\x1c\x9c\x37\x9c\x97\xaf\x48\xef\xee\x9e\x67\x5f\x91\x77\x2c\x02\xae\x20\x26\x5a\x10\x3d\x05\x72\x9a\xd1\x68\x0a\x64\x20\xc6\xfa\x
 [...]
                },
                "/crd/bases/camel.apache.org_integrations.yaml": 
&vfsgen۰CompressedFileInfo{
                        name:             "camel.apache.org_integrations.yaml",
@@ -507,7 +507,7 @@ var assets = func() http.FileSystem {
                        modTime:          time.Time{},
                        uncompressedSize: 3711,
 
-                       compressedContent: 
[]byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x57\x5f\x8f\xdb\xb8\x11\x7f\xd7\xa7\x18\xc4\x2f\x09\x20\xcb\xd9\xb4\x45\x51\xf5\xc9\xd9\xec\xf6\xdc\x4d\xec\x60\xb5\xd7\xeb\xa1\xe8\xc3\x98\x1a\x4b\x84\x29\x52\x25\xa9\x75\xdc\x6e\xbf\x7b\x31\x24\x65\xcb\x1b\xdf\xa1\x0f\x67\x60\xbd\x36\x35\x7f\x7e\x33\xf3\x9b\xe1\x78\x06\xf3\xdf\xee\x95\xcd\xe0\xb3\x14\xa4\x1d\xd5\xe0\x0d\xf8\x96\x60\xd9\xa3\x68\x09\x2a\xb3\xf3\x07\xb4\x04\xf7\x66\xd0\x35\x7a\x69\x34\xbc\x5d\x56\x
 [...]
+                       compressedContent: 
[]byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xac\x57\x5f\x8f\xdb\xb8\x11\x7f\xd7\xa7\x18\xc4\x2f\x09\x20\xcb\xd9\xb4\x45\x51\xf5\xc9\xd9\xec\xf6\xdc\x4d\xec\x60\xb5\xd7\xeb\xa1\xe8\xc3\x98\x1a\x4b\x84\x29\x52\x25\xa9\x75\xdc\x6e\xbf\x7b\x31\x24\x65\xcb\x1b\xdf\xa1\x0f\x67\x60\xbd\x36\x35\x7f\x7e\x33\xf3\x9b\xe1\x78\x06\xf3\xdf\xee\x95\xcd\xe0\xb3\x14\xa4\x1d\xd5\xe0\x0d\xf8\x96\x60\xd9\xa3\x68\x09\x2a\xb3\xf3\x07\xb4\x04\xf7\x66\xd0\x35\x7a\x69\x34\xbc\x5d\x56\x
 [...]
                },
                "/templates": &vfsgen۰DirInfo{
                        name:    "templates",
@@ -606,7 +606,7 @@ var assets = func() http.FileSystem {
                        modTime:          time.Time{},
                        uncompressedSize: 51733,
 
-                       compressedContent: 
[]byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xec\x7d\xfd\x73\x1b\xb9\xb1\xe0\xef\xfb\x57\xa0\x94\xab\xb2\xe4\x22\x29\xef\xe6\x25\xd9\xd3\xdd\xbe\x9c\xd6\xf6\x26\xda\xf5\x87\xce\xd6\x6e\x5e\xca\xe7\x0a\xc1\x99\x26\x09\x73\x08\x4c\x00\x8c\x64\xe6\x72\xff\xfb\x15\xba\x1b\x1f\x33\xa4\x24\xca\xb6\xf6\x45\x57\x97\xad\x8a\x45\x72\x06\x68\x34\xba\x1b\xfd\x0d\x6f\xa5\xf2\xee\xe4\xab\xb1\xd0\x72\x0d\x27\xe2\xb7\xae\x92\x0d\x7c\x25\x44\xdb\x48\x3f\x37\x76\x7d\x22\xe6\xb2\x
 [...]
+                       compressedContent: 
[]byte("\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\xff\xec\x7d\xfd\x73\x1b\xb9\xb1\xe0\xef\xfb\x57\xa0\x94\xab\xb2\xe4\x22\x29\xef\xe6\x25\xd9\xd3\xdd\xbe\x9c\xd6\xf6\x26\xda\xf5\x87\xce\xd6\x6e\x5e\xca\xe7\x0a\xc1\x99\x26\x09\x73\x08\x4c\x00\x8c\x64\xe6\x72\xff\xfb\x15\xba\x1b\x1f\x33\xa4\x24\xca\xb6\xf6\x45\x57\x97\xad\x8a\x45\x72\x06\x68\x34\xba\x1b\xfd\x0d\x6f\xa5\xf2\xee\xe4\xab\xb1\xd0\x72\x0d\x27\xe2\xb7\xae\x92\x0d\x7c\x25\x44\xdb\x48\x3f\x37\x76\x7d\x22\xe6\xb2\x
 [...]
                },
        }
        fs["/"].(*vfsgen۰DirInfo).entries = []os.FileInfo{
diff --git a/pkg/trait/pull_secret.go b/pkg/trait/pull_secret.go
index 470186ffd..4a00537c2 100644
--- a/pkg/trait/pull_secret.go
+++ b/pkg/trait/pull_secret.go
@@ -70,17 +70,17 @@ func (t *pullSecretTrait) Configure(e *Environment) (bool, 
error) {
                        }
                }
                if t.ImagePullerDelegation == nil {
-                       var isOpenshift bool
+                       var isOpenShift bool
                        if t.Client != nil {
                                var err error
-                               isOpenshift, err = 
openshift.IsOpenShift(t.Client)
+                               isOpenShift, err = 
openshift.IsOpenShift(t.Client)
                                if err != nil {
                                        return false, err
                                }
                        }
                        isOperatorGlobal := platform.IsCurrentOperatorGlobal()
                        isKitExternal := 
e.Integration.GetIntegrationKitNamespace(e.Platform) != e.Integration.Namespace
-                       needsDelegation := isOpenshift && isOperatorGlobal && 
isKitExternal
+                       needsDelegation := isOpenShift && isOperatorGlobal && 
isKitExternal
                        t.ImagePullerDelegation = &needsDelegation
                }
        }
diff --git a/release.adoc b/release.adoc
index 8ba2600f8..1a7de581d 100644
--- a/release.adoc
+++ b/release.adoc
@@ -245,7 +245,7 @@ The 
https://github.com/k8s-operatorhub/community-operators/[OperatorHub] downstr
 of Camel K, so that it can be easily installed on platforms that support 
Operator Hub.
 
 The 
https://github.com/redhat-openshift-ecosystem/community-operators-prod/[Embedded
 OperatorHub in OpenShift and OKD] downstream channel should be synced to 
publish the latest version
-of Camel K, so that it can be easily installed on Openshift and OKD.
+of Camel K, so that it can be easily installed on OpenShift and OKD.
 
 You can create the bundle using the `make bundle` command.
 
diff --git a/resources/traits.yaml b/resources/traits.yaml
index 3df08e162..a1d2af82e 100755
--- a/resources/traits.yaml
+++ b/resources/traits.yaml
@@ -1067,7 +1067,7 @@ traits:
   - OpenShift
   description: 'The Route trait can be used to configure the creation of 
OpenShift
     routes for the integration. The certificate and key contents may be 
sourced either
-    from the local filesystem or in a Openshift `secret` object. The user may 
use
+    from the local filesystem or in a OpenShift `secret` object. The user may 
use
     the parameters ending in `-secret` (example: `tls-certificate-secret`) to 
reference
     a certificate stored in a `secret`. Parameters ending in `-secret` have 
higher
     priorities and in case the same route parameter is set, for example: 
`tls-key-secret`

Reply via email to