nifi/nifi-commons/pom.xml

78 lines
3.6 KiB
XML
Raw Normal View History

<?xml version="1.0" encoding="UTF-8"?>
<!--
Licensed to the Apache Software Foundation (ASF) under one or more
contributor license agreements. See the NOTICE file distributed with
this work for additional information regarding copyright ownership.
The ASF licenses this file to You under the Apache License, Version 2.0
(the "License"); you may not use this file except in compliance with
the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
-->
<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 https://maven.apache.org/xsd/maven-4.0.0.xsd">
<modelVersion>4.0.0</modelVersion>
<parent>
<groupId>org.apache.nifi</groupId>
<artifactId>nifi</artifactId>
2023-02-09 17:32:53 -05:00
<version>2.0.0-SNAPSHOT</version>
</parent>
<artifactId>nifi-commons</artifactId>
<packaging>pom</packaging>
<modules>
<module>nifi-build</module>
<module>nifi-data-provenance-utils</module>
<module>nifi-deprecation-log</module>
<module>nifi-expression-language</module>
<module>nifi-external-resource-utils</module>
<module>nifi-flowfile-packager</module>
<module>nifi-flow-encryptor</module>
<module>nifi-hl7-query-language</module>
<module>nifi-json-utils</module>
<module>nifi-jetty-configuration</module>
<module>nifi-logging-utils</module>
<module>nifi-metrics</module>
<module>nifi-parameter</module>
<module>nifi-property-encryptor</module>
<module>nifi-property-utils</module>
<module>nifi-properties</module>
<module>nifi-property-protection-api</module>
<module>nifi-property-protection-aws</module>
<module>nifi-property-protection-azure</module>
<module>nifi-property-protection-cipher</module>
<module>nifi-property-protection-factory</module>
<module>nifi-property-protection-gcp</module>
<module>nifi-property-protection-hashicorp</module>
<module>nifi-property-protection-loader</module>
<module>nifi-property-protection-shared</module>
<module>nifi-record</module>
<module>nifi-record-path</module>
<module>nifi-repository-encryption</module>
<module>nifi-schema-utils</module>
<module>nifi-security-crypto-key</module>
<module>nifi-security-identity</module>
<module>nifi-security-kerberos-api</module>
<module>nifi-security-kerberos</module>
<module>nifi-security-kms</module>
<module>nifi-security-socket-ssl</module>
<module>nifi-security-ssl</module>
<module>nifi-security-utils-api</module>
<module>nifi-security-utils</module>
<module>nifi-single-user-utils</module>
<module>nifi-site-to-site-client</module>
<module>nifi-socket-utils</module>
<module>nifi-utils</module>
<module>nifi-uuid5</module>
<module>nifi-hashicorp-vault</module>
<module>nifi-hashicorp-vault-api</module>
<module>nifi-web-client</module>
<module>nifi-web-client-api</module>
<module>nifi-web-utils</module>
<module>nifi-write-ahead-log</module>
<module>nifi-xml-processing</module>
</modules>
NIFI-6380: Introduced the notion of Parameters and Parameter Contexts to the code base. - Added nifi-parameter module - Added Parameter to nifi-api - Added ParameterContext and ParameterLookup - Updated EL to support Parameters - Updated backend so that any property can make use of Parameters - Added web endpoint for Parameter Contexts - Updated Templates to make use of Parameter Contexts - Updated Versioned Flows to make use of Parameter Contexts - Updated Stateless NiFi to support Parameters and take Parameters as part of the configuration, not Variables. NIFI-6380: Addressed review feedback and fixed bugs; added additional unit and integration tests to verify NIFI-6380: Added Description to Parameter Context NIFI-6380: Fixed checkstyle violations NIFI-6380: Fixed bug that caused updating a Parameter Context to fail if the name is provided and unchanged NIFI-6380: If parameter is being deleted, don't worry about its sensitivity flag. This addresses a bug where the deletion of a Sensitive Parameter would require that the Parameter be submitted with a value of null and a sensitivity flag of true; else it would provide an error indicating that the parameter can't be changed from sensitive to non-sensitive. Now, the sensitivity flag is ignored. NIFI-6380: Fixed bug around unsetting Process Group's Parameter Context NIFI-6380: Moved lastRefreshed timestamp from ParameterContextDTO to ParameterContextsEntity and renamed to currentTime to match the pattern of ControllerServicesEntity rather than FlowHistory. Added parameterContextId to ProcessGroupFlowDTO NIFI-6380: Added additional integration tests around escaped parameter references NIFI-6380: Additional tests and bug fix for referencing EL from within another EL Expression NIFI-6380: Created ParameterEntity to house a 'canWrite' flag for parameters and updated ParameterContext to use it. Updated ParameterContextUpdateRequestDTO to include a Set<AffectedComponentEntity> indicating the components that are affected by the update NIFI-6380: Addressed review feedback NIFI-6380: Addressed additional review feedback, mostly around code cleanup NIFI-6380: Bug fix NIFI-6380: Addressed more review feedback; fixed a couple of minor bugs encountered when testing NIFI-6380: Bug fix around Parameter escaping for properties that support Expression Language. Fixed inconcsistency in Authorization hierarchy between /parameter-contexts/1234 and /parameter-contexts to ensure that the parent of /parameter-contexts is /controller, regardless of how we arrive at the /parameter-contexts resource NIFI-6380: Fixed but around using ProcessContext#newPropertyValue(String) that previously resulted in causing the Parameters to be evaluated a second time, thereby ignoring escape characters. Updated Integration Test to verify behavior. Also fixed bug in LoadBalanceQueueIT as it was a one-liner and noticed it while running tests to verify other behavior NIFI-6380: Ensure that if Processor or Controller Services references or de-references a Parameter that user making the change has READ policy on the Parameter Context NIFI-6380: Verify permissions on Parameter Context when creating processor/controller service and when moving between groups, insantiating template, reverting/change flow version NIFI-6380: Addressed problem that resulted from rebasing against master; fixed bug in showing the Affected Components for a particular Parameter Context Update NIFI-6380: Fixed NPE that occurs when attempting to update controller-level Controller Service NIFI-6380: Updated validation error text when referencing parameter from controller-level controller service or reporting task NIFI-6380: Ensuring permissions for copy/paste when components reference parameters. NIFI-6380: Do not require READ policy on Parameter Context in order to un-reference a parameter, only to reference one. NIFI-6380: Restricted parameter names to match those in the Feature Proposal. Fixed bug that allowed copy & paste of a PG for which user does not have READ policy for a child/descendant PG's parameter context This closes #3536
2019-05-02 11:33:10 -04:00
</project>