This is an automated email from the ASF dual-hosted git repository. orpiske pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/camel.git
commit d8f594e349d53776c899db514e25edce2a7c6b73 Author: Otavio Rodolfo Piske <[email protected]> AuthorDate: Wed Feb 21 12:39:49 2024 +0100 CAMEL-20410: documentation fixes for camel-ldap - Fixed samples - Fixed grammar and typos - Fixed punctuation - Added and/or fixed links - Converted to use tabs --- components/camel-ldap/src/main/docs/ldap-component.adoc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/components/camel-ldap/src/main/docs/ldap-component.adoc b/components/camel-ldap/src/main/docs/ldap-component.adoc index d5bf23823a7..37bd4157ec4 100644 --- a/components/camel-ldap/src/main/docs/ldap-component.adoc +++ b/components/camel-ldap/src/main/docs/ldap-component.adoc @@ -105,7 +105,7 @@ XML (Spring):: ----------------------------------------------------------------------------------------- ==== -The preceding example declares a regular Sun based LDAP `DirContext` +The preceding example declares a regular Sun-based LDAP `DirContext` that connects anonymously to a locally hosted LDAP server. [NOTE] @@ -117,7 +117,7 @@ For Camel Quarkus applications, you can achieve similar behavior by using the `@ == Security concerns related to LDAP injection -IMPORTANT: The camel-ldap component uses the message body as filter the search results. +IMPORTANT: The camel-ldap component uses the message body to filter the search results. Therefore, the message body should be protected from LDAP injection. To assist with this, you can use `org.apache.camel.component.ldap.LdapHelper` utility class that has method(s) to escape string values to be LDAP injection safe.
