diff --git a/CHANGELOG.md b/CHANGELOG.md index 55baa7b9..8ff845b1 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -536,7 +536,7 @@ All notable changes to this project will be documented in this file. ### Added - Support for 1.15.0 ([#125]) -- Sensitive property key is setable via a secret ([#125]) +- Sensitive property key is settable via a secret ([#125]) ### Changed diff --git a/docs/modules/nifi/pages/usage_guide/custom-components.adoc b/docs/modules/nifi/pages/usage_guide/custom-components.adoc index 82f9e9fd..1d7b3c3f 100644 --- a/docs/modules/nifi/pages/usage_guide/custom-components.adoc +++ b/docs/modules/nifi/pages/usage_guide/custom-components.adoc @@ -153,7 +153,7 @@ binaryData: custom-nifi-processor-1.0.0.nar: ... ---- -The Python script is taken from {nifi-docs-flowfile-source}[the offical NiFi Python developer guide]. +The Python script is taken from {nifi-docs-flowfile-source}[the official NiFi Python developer guide]. Afterwards, we need to mount the ConfigMap as described in xref:nifi:usage_guide/extra-volumes.adoc[] and extend the `nifi.properties` file: diff --git a/docs/modules/nifi/pages/usage_guide/security.adoc b/docs/modules/nifi/pages/usage_guide/security.adoc index 3dc14bc6..11453277 100644 --- a/docs/modules/nifi/pages/usage_guide/security.adoc +++ b/docs/modules/nifi/pages/usage_guide/security.adoc @@ -364,7 +364,7 @@ allow := { ---- <1> The default rule should return `"resourceNotFound": true`. If this is not set, NiFi's access policy inheritance will not work. Any values for the `allowed` field in the response will be ignored. <2> A rule that grants all users access to the root process group and thus to all components in the NiFi instance. -<3> A rule that denies access to a specific process group for the user "alice". For this process group the default rego rule will not be applied and NiFi's component inhertiance will not be used. All child components of this process group will also be authorized based on this rule unless a more granular rule overrides it. +<3> A rule that denies access to a specific process group for the user "alice". For this process group the default rego rule will not be applied and NiFi's component inheritance will not be used. All child components of this process group will also be authorized based on this rule unless a more granular rule overrides it. [#communication-between-nifi-nodes] ==== Communication between NiFi nodes diff --git a/docs/modules/nifi/pages/usage_guide/writing-to-iceberg-tables.adoc b/docs/modules/nifi/pages/usage_guide/writing-to-iceberg-tables.adoc index 5c89b747..9531a1be 100644 --- a/docs/modules/nifi/pages/usage_guide/writing-to-iceberg-tables.adoc +++ b/docs/modules/nifi/pages/usage_guide/writing-to-iceberg-tables.adoc @@ -116,7 +116,7 @@ and `Hadoop Configuration Resources` to `/stackable/userdata/nifi-hive-s3-config Afterwards you can create the `PutIceberg` processor and configure the `HiveCatalogService`. Also set `Catalog Namespace` to your schema name and the `Table Name`. -For the `File Format` it is recommened to use `PARQUET` or `ORC` rather than `AVRO` for performance reasons, but you can leave it empty or choose your desired format. +For the `File Format` it is recommended to use `PARQUET` or `ORC` rather than `AVRO` for performance reasons, but you can leave it empty or choose your desired format. You should end up with the following `PutIceberg` processor: diff --git a/extra/crds.yaml b/extra/crds.yaml index 7a9c0e3d..b7200414 100644 --- a/extra/crds.yaml +++ b/extra/crds.yaml @@ -150,7 +150,7 @@ spec: enabled: default: true description: |- - Wether the Kubernetes Job should be created, defaults to true. It can be helpful to disable + Whether the Kubernetes Job should be created, defaults to true. It can be helpful to disable the Job, e.g. when you configOverride an authentication mechanism, which the Job currently can't use to authenticate against NiFi. type: boolean diff --git a/rust/operator-binary/src/config/mod.rs b/rust/operator-binary/src/config/mod.rs index 2c7e6572..9a2929c9 100644 --- a/rust/operator-binary/src/config/mod.rs +++ b/rust/operator-binary/src/config/mod.rs @@ -442,7 +442,7 @@ pub fn build_nifi_properties( "2".to_string(), ); - // Volatile Provenance Respository Properties + // Volatile Provenance Repository Properties properties.insert( "nifi.provenance.repository.buffer.size".to_string(), "100000".to_string(), diff --git a/rust/operator-binary/src/controller.rs b/rust/operator-binary/src/controller.rs index a869cc64..60342252 100644 --- a/rust/operator-binary/src/controller.rs +++ b/rust/operator-binary/src/controller.rs @@ -964,7 +964,7 @@ async fn build_node_rolegroup_statefulset( // uses RC2. Thus, the keytool usage here LGTM (no alias trickery) and has my nod of approval. prepare_args.extend(vec![ // The source directory is a secret-op mount and we do not want to write / add anything in there - // Therefore we import all the contents to a truststore in "writeable" empty dirs. + // Therefore we import all the contents to a truststore in "writable" empty dirs. // Keytool is only barking if a password is not set for the destination truststore (which we set) // and do provide an empty password for the source truststore coming from the secret-operator. // Using no password will result in a warning. diff --git a/rust/operator-binary/src/crd/mod.rs b/rust/operator-binary/src/crd/mod.rs index fd10c060..1cca0564 100644 --- a/rust/operator-binary/src/crd/mod.rs +++ b/rust/operator-binary/src/crd/mod.rs @@ -322,7 +322,7 @@ pub fn default_allow_all() -> bool { #[derive(Clone, Debug, Deserialize, JsonSchema, PartialEq, Serialize)] #[serde(rename_all = "camelCase")] pub struct CreateReportingTaskJob { - /// Wether the Kubernetes Job should be created, defaults to true. It can be helpful to disable + /// Whether the Kubernetes Job should be created, defaults to true. It can be helpful to disable /// the Job, e.g. when you configOverride an authentication mechanism, which the Job currently /// can't use to authenticate against NiFi. #[serde(default = "CreateReportingTaskJob::default_enabled")] diff --git a/rust/operator-binary/src/operations/upgrade.rs b/rust/operator-binary/src/operations/upgrade.rs index 69a01820..227405ba 100644 --- a/rust/operator-binary/src/operations/upgrade.rs +++ b/rust/operator-binary/src/operations/upgrade.rs @@ -88,7 +88,7 @@ pub async fn cluster_version_update_state( // we requeue to wait until a full stop has been performed. if target_replicas == 0 && current_replicas > 0 { tracing::info!( - "Cluster is performing a full restart at the moment and still shutting down, remaining replicas: [{}] - requeueing to wait for shutdown to finish", + "Cluster is performing a full restart at the moment and still shutting down, remaining replicas: [{}] - requeuing to wait for shutdown to finish", current_replicas ); return Ok(ClusterVersionUpdateState::UpdateInProgress); diff --git a/rust/operator-binary/src/product_logging.rs b/rust/operator-binary/src/product_logging.rs index 9ae11b08..b9fb012a 100644 --- a/rust/operator-binary/src/product_logging.rs +++ b/rust/operator-binary/src/product_logging.rs @@ -39,7 +39,7 @@ pub const NIFI_LOG_FILE: &str = "nifi.log4j.xml"; const CONSOLE_CONVERSION_PATTERN: &str = "%date %level [%thread] %logger{40} %msg%n"; // This is required to remove double entries in the nifi.log4j.xml as well as nested // console output like: " ... ... -const ADDITONAL_LOGBACK_CONFIG: &str = r#" +const ADDITIONAL_LOGBACK_CONFIG: &str = r#" %msg%n @@ -78,7 +78,7 @@ pub fn extend_role_group_config_map( .value as u32, CONSOLE_CONVERSION_PATTERN, log_config, - Some(ADDITONAL_LOGBACK_CONFIG), + Some(ADDITIONAL_LOGBACK_CONFIG), ), ); } diff --git a/rust/operator-binary/src/security/mod.rs b/rust/operator-binary/src/security/mod.rs index 3a5c6d9e..74416edd 100644 --- a/rust/operator-binary/src/security/mod.rs +++ b/rust/operator-binary/src/security/mod.rs @@ -19,7 +19,7 @@ pub enum Error { #[snafu(display("tls failure"))] Tls { source: tls::Error }, - #[snafu(display("sensistive key failure"))] + #[snafu(display("sensitive key failure"))] SensitiveKey { source: sensitive_key::Error }, #[snafu(display("failed to ensure OIDC admin password exists"))] diff --git a/tests/templates/kuttl/iceberg-hive/03_kerberos-secretclass.yaml.j2 b/tests/templates/kuttl/iceberg-hive/03_kerberos-secretclass.yaml.j2 index e5033462..eb7a71d9 100644 --- a/tests/templates/kuttl/iceberg-hive/03_kerberos-secretclass.yaml.j2 +++ b/tests/templates/kuttl/iceberg-hive/03_kerberos-secretclass.yaml.j2 @@ -20,7 +20,7 @@ kind: Secret metadata: name: secret-operator-keytab data: - # To create keytab. When promted enter password asdf + # To create keytab. When prompted enter password asdf # cat | ktutil << 'EOF' # list # add_entry -password -p stackable-secret-operator@CLUSTER.LOCAL -k 1 -e aes256-cts-hmac-sha384-192 diff --git a/tests/templates/kuttl/iceberg-rest/22-keycloak-realm-cm.yaml.j2 b/tests/templates/kuttl/iceberg-rest/22-keycloak-realm-cm.yaml.j2 index 233077d8..47ac2e08 100644 --- a/tests/templates/kuttl/iceberg-rest/22-keycloak-realm-cm.yaml.j2 +++ b/tests/templates/kuttl/iceberg-rest/22-keycloak-realm-cm.yaml.j2 @@ -2005,14 +2005,14 @@ data: "authenticatorFlow": false, "requirement": "ALTERNATIVE", "priority": 10, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { "authenticatorFlow": true, "requirement": "ALTERNATIVE", "priority": 20, - "autheticatorFlow": true, + "authenticatorFlow": true, "flowAlias": "Verify Existing Account by Re-authentication", "userSetupAllowed": false } @@ -2031,7 +2031,7 @@ data: "authenticatorFlow": false, "requirement": "REQUIRED", "priority": 10, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { @@ -2040,7 +2040,7 @@ data: "authenticatorFlow": false, "requirement": "REQUIRED", "priority": 20, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { @@ -2048,7 +2048,7 @@ data: "authenticatorFlow": false, "requirement": "ALTERNATIVE", "priority": 30, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { @@ -2056,7 +2056,7 @@ data: "authenticatorFlow": false, "requirement": "DISABLED", "priority": 40, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { @@ -2064,7 +2064,7 @@ data: "authenticatorFlow": false, "requirement": "DISABLED", "priority": 50, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false } ] @@ -2082,7 +2082,7 @@ data: "authenticatorFlow": false, "requirement": "REQUIRED", "priority": 10, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { @@ -2090,7 +2090,7 @@ data: "authenticatorFlow": false, "requirement": "ALTERNATIVE", "priority": 20, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false } ] @@ -2108,7 +2108,7 @@ data: "authenticatorFlow": false, "requirement": "REQUIRED", "priority": 10, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { @@ -2116,7 +2116,7 @@ data: "authenticatorFlow": false, "requirement": "REQUIRED", "priority": 20, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false } ] @@ -2134,7 +2134,7 @@ data: "authenticatorFlow": false, "requirement": "REQUIRED", "priority": 10, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { @@ -2142,7 +2142,7 @@ data: "authenticatorFlow": false, "requirement": "REQUIRED", "priority": 20, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false } ] @@ -2160,7 +2160,7 @@ data: "authenticatorFlow": false, "requirement": "REQUIRED", "priority": 10, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { @@ -2169,7 +2169,7 @@ data: "authenticatorFlow": false, "requirement": "REQUIRED", "priority": 20, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { @@ -2177,7 +2177,7 @@ data: "authenticatorFlow": false, "requirement": "ALTERNATIVE", "priority": 30, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { @@ -2185,7 +2185,7 @@ data: "authenticatorFlow": false, "requirement": "DISABLED", "priority": 40, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { @@ -2193,7 +2193,7 @@ data: "authenticatorFlow": false, "requirement": "DISABLED", "priority": 50, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false } ] @@ -2211,14 +2211,14 @@ data: "authenticatorFlow": false, "requirement": "REQUIRED", "priority": 10, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { "authenticatorFlow": true, "requirement": "REQUIRED", "priority": 20, - "autheticatorFlow": true, + "authenticatorFlow": true, "flowAlias": "Account verification options", "userSetupAllowed": false } @@ -2235,7 +2235,7 @@ data: "authenticatorFlow": true, "requirement": "CONDITIONAL", "priority": 10, - "autheticatorFlow": true, + "authenticatorFlow": true, "flowAlias": "Browser - Conditional Organization", "userSetupAllowed": false } @@ -2254,7 +2254,7 @@ data: "authenticatorFlow": false, "requirement": "REQUIRED", "priority": 10, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { @@ -2262,7 +2262,7 @@ data: "authenticatorFlow": false, "requirement": "REQUIRED", "priority": 20, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false } ] @@ -2281,14 +2281,14 @@ data: "authenticatorFlow": false, "requirement": "ALTERNATIVE", "priority": 10, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { "authenticatorFlow": true, "requirement": "ALTERNATIVE", "priority": 20, - "autheticatorFlow": true, + "authenticatorFlow": true, "flowAlias": "Handle Existing Account", "userSetupAllowed": false } @@ -2307,14 +2307,14 @@ data: "authenticatorFlow": false, "requirement": "REQUIRED", "priority": 10, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { "authenticatorFlow": true, "requirement": "CONDITIONAL", "priority": 20, - "autheticatorFlow": true, + "authenticatorFlow": true, "flowAlias": "First broker login - Conditional 2FA", "userSetupAllowed": false } @@ -2333,7 +2333,7 @@ data: "authenticatorFlow": false, "requirement": "ALTERNATIVE", "priority": 10, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { @@ -2341,7 +2341,7 @@ data: "authenticatorFlow": false, "requirement": "DISABLED", "priority": 20, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { @@ -2349,14 +2349,14 @@ data: "authenticatorFlow": false, "requirement": "ALTERNATIVE", "priority": 25, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { "authenticatorFlow": true, "requirement": "ALTERNATIVE", "priority": 26, - "autheticatorFlow": true, + "authenticatorFlow": true, "flowAlias": "Organization", "userSetupAllowed": false }, @@ -2364,7 +2364,7 @@ data: "authenticatorFlow": true, "requirement": "ALTERNATIVE", "priority": 30, - "autheticatorFlow": true, + "authenticatorFlow": true, "flowAlias": "forms", "userSetupAllowed": false } @@ -2383,7 +2383,7 @@ data: "authenticatorFlow": false, "requirement": "ALTERNATIVE", "priority": 10, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { @@ -2391,7 +2391,7 @@ data: "authenticatorFlow": false, "requirement": "ALTERNATIVE", "priority": 20, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { @@ -2399,7 +2399,7 @@ data: "authenticatorFlow": false, "requirement": "ALTERNATIVE", "priority": 30, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { @@ -2407,7 +2407,7 @@ data: "authenticatorFlow": false, "requirement": "ALTERNATIVE", "priority": 40, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false } ] @@ -2425,7 +2425,7 @@ data: "authenticatorFlow": false, "requirement": "REQUIRED", "priority": 10, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { @@ -2433,14 +2433,14 @@ data: "authenticatorFlow": false, "requirement": "REQUIRED", "priority": 20, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { "authenticatorFlow": true, "requirement": "CONDITIONAL", "priority": 30, - "autheticatorFlow": true, + "authenticatorFlow": true, "flowAlias": "Direct Grant - Conditional OTP", "userSetupAllowed": false } @@ -2459,7 +2459,7 @@ data: "authenticatorFlow": false, "requirement": "REQUIRED", "priority": 10, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false } ] @@ -2478,14 +2478,14 @@ data: "authenticatorFlow": false, "requirement": "REQUIRED", "priority": 10, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { "authenticatorFlow": true, "requirement": "REQUIRED", "priority": 20, - "autheticatorFlow": true, + "authenticatorFlow": true, "flowAlias": "User creation or linking", "userSetupAllowed": false }, @@ -2493,7 +2493,7 @@ data: "authenticatorFlow": true, "requirement": "CONDITIONAL", "priority": 60, - "autheticatorFlow": true, + "authenticatorFlow": true, "flowAlias": "First Broker Login - Conditional Organization", "userSetupAllowed": false } @@ -2512,14 +2512,14 @@ data: "authenticatorFlow": false, "requirement": "REQUIRED", "priority": 10, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { "authenticatorFlow": true, "requirement": "CONDITIONAL", "priority": 20, - "autheticatorFlow": true, + "authenticatorFlow": true, "flowAlias": "Browser - Conditional 2FA", "userSetupAllowed": false } @@ -2538,7 +2538,7 @@ data: "authenticatorFlow": true, "requirement": "REQUIRED", "priority": 10, - "autheticatorFlow": true, + "authenticatorFlow": true, "flowAlias": "registration form", "userSetupAllowed": false } @@ -2557,7 +2557,7 @@ data: "authenticatorFlow": false, "requirement": "REQUIRED", "priority": 20, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { @@ -2565,7 +2565,7 @@ data: "authenticatorFlow": false, "requirement": "REQUIRED", "priority": 50, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { @@ -2573,7 +2573,7 @@ data: "authenticatorFlow": false, "requirement": "DISABLED", "priority": 60, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { @@ -2581,7 +2581,7 @@ data: "authenticatorFlow": false, "requirement": "DISABLED", "priority": 70, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false } ] @@ -2599,7 +2599,7 @@ data: "authenticatorFlow": false, "requirement": "REQUIRED", "priority": 10, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { @@ -2607,7 +2607,7 @@ data: "authenticatorFlow": false, "requirement": "REQUIRED", "priority": 20, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { @@ -2615,14 +2615,14 @@ data: "authenticatorFlow": false, "requirement": "REQUIRED", "priority": 30, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false }, { "authenticatorFlow": true, "requirement": "CONDITIONAL", "priority": 40, - "autheticatorFlow": true, + "authenticatorFlow": true, "flowAlias": "Reset - Conditional OTP", "userSetupAllowed": false } @@ -2641,7 +2641,7 @@ data: "authenticatorFlow": false, "requirement": "REQUIRED", "priority": 10, - "autheticatorFlow": false, + "authenticatorFlow": false, "userSetupAllowed": false } ]