Closed cchet closed 5 years ago
The copied strategies of camel-jcifs shall be evaluated and missing one implemented. (Process strategy, Lock strategies, ...)
Used the lock strategies from camel-ftp with little modifications, which were suitable for this component
The copied strategies of camel-jcifs shall be evaluated and missing one implemented. (Process strategy, Lock strategies, ...)