Skip to content

Commit 47df4f9

Browse files
authored
* fix code and styling. (#94)
1 parent e1f289b commit 47df4f9

File tree

6 files changed

+40
-9
lines changed

6 files changed

+40
-9
lines changed

flink-cyber/cyber-csd/src/main/aux/templates/kafka.properties.j2

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,10 @@ schema.registry.url={{globals['schema.registry.url']}}
3030
kafka.security.protocol=SASL_SSL
3131
kafka.ssl.truststore.location={{globals['ssl.client.truststore.location']}}
3232
kafka.ssl.truststore.password={{globals['ssl.client.truststore.password']}}
33+
kafka.sasl.jaas.config=com.sun.security.auth.module.Krb5LoginModule required debug=true \
34+
useKeyTab=true storeKey=true keyTab="{{'{{CMF_CONF_DIR}}/cybersec.keytab'}}" \
35+
principal="{{ globals['cybersec.service.principal'] }}";
36+
kafka.sasl.kerberos.service.name={{ globals['kafka_principal_name'] }}
3337

3438
schema.registry.client.ssl.trustStorePath={{globals['ssl.client.truststore.location']}}
3539
schema.registry.client.ssl.trustStorePassword={{globals['ssl.client.truststore.password']}}

flink-cyber/cyber-csd/src/main/aux/templates/parser-ui.properties.j2

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,4 +20,19 @@ spring.kafka.external-clusters.{{ obj['name'] }}.consumer.key-deserializer={{ gl
2020
spring.kafka.external-clusters.{{ obj['name'] }}.consumer.value-deserializer={{ globals['spring.kafka.consumer.value-deserializer'] }}
2121
spring.kafka.external-clusters.{{ obj['name'] }}.producer.key-serializer={{ globals['spring.kafka.producer.key-deserialize'] }}
2222
spring.kafka.external-clusters.{{ obj['name'] }}.producer.value-serializer={{ globals['spring.kafka.producer.value-serializer'] }}
23+
24+
{% if globals['kerberos.auth.enable'] %}
25+
26+
spring.kafka.security.protocol=SASL_SSL
27+
spring.kafka.properties.sasl.kerberos.service.name={{ globals['kafka_principal_name'] }}
28+
spring.kafka.properties.sasl.jaas.config=com.sun.security.auth.module.Krb5LoginModule required debug=true \
29+
useKeyTab=true storeKey=true keyTab="{{'{{CONF_DIR}}/cybersec.keytab'}}" \
30+
principal="{{ globals['cybersec.service.principal'] }}";
31+
spring.kafka.ssl.trustStoreLocation=file:{{ globals['security.ssl.rest.truststore'] }}
32+
spring.kafka.ssl.keyStoreLocation=file:{{ globals['ssl.server.keystore.location'] }}
33+
spring.kafka.ssl.trustStorePassword={{ globals['security.ssl.rest.truststore-password'] }}
34+
spring.kafka.ssl.keyStorePassword={{ globals['ssl.server.keystore.password'] }}
35+
spring.kafka.ssl.keyPassword={{ globals['ssl.server.keystore.keypassword'] }}
36+
37+
{% endif %}
2338
{% endfor %}

flink-cyber/cyber-csd/src/main/descriptor/service.sdl

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -378,6 +378,7 @@
378378
"kerberosPrincipals": [
379379
{
380380
"name": "cybersec_service_principal",
381+
"propertyName": "cybersec.service.principal",
381382
"primary": "${principal}",
382383
"instance": "${host}"
383384
},
@@ -390,10 +391,10 @@
390391
"sslServer": {
391392
"keyIdentifier": "parser_ui_chaining",
392393
"enabledConfigName": "ssl_enabled",
393-
"keystoreLocationConfigName": "ssl_server_keystore_location",
394-
"keystorePasswordConfigName": "ssl_server_keystore_password",
394+
"keystoreLocationConfigName": "ssl.server.keystore.location",
395+
"keystorePasswordConfigName": "ssl.server.keystore.password",
395396
"keyPasswordOptionality": "required",
396-
"keystoreKeyPasswordConfigName": "ssl_server_keystore_keypassword",
397+
"keystoreKeyPasswordConfigName": "ssl.server.keystore.keypassword",
397398
"autoTlsMode": "auto"
398399
},
399400
"sslClient": {

flink-cyber/cyber-parcel/pom.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ under the License.
4949
<cybersec.basedir>${project.parent.basedir}</cybersec.basedir>
5050
<parcel.basename>CYBERSEC-${cybersec.full.version}</parcel.basename>
5151
<parcel.tar.gz.filename>${parcel.basename}.tar.gz</parcel.tar.gz.filename>
52-
<parcel.filename>${parcel.basename}-el7.parcel</parcel.filename>
52+
<parcel.filename>${parcel.basename}-el8.parcel</parcel.filename>
5353
<flink.tar.gz.url>file://${cybersec.basedir}/cyber-jobs/target/cyber-jobs-${project.parent.version}.tar.gz</flink.tar.gz.url>
5454
</properties>
5555

flink-cyber/flink-indexing/flink-indexing-hive/src/main/java/com/cloudera/cyber/indexing/hive/tableapi/TableApiAbstractJob.java

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -247,7 +247,9 @@ private ResolvedSchema createTableIfNotExists(StreamTableEnvironment tableEnv, S
247247

248248
protected String getTransformation(DataType tableColumnDataType, MappingColumnDto mapping) {
249249
String transformation = mapping.getTransformation();
250-
if (transformation == null && isNonDefaultColumn(mapping.getName()) && (DataTypes.BOOLEAN().equals(tableColumnDataType) || tableColumnDataType.getLogicalType().is(LogicalTypeFamily.NUMERIC))) {
250+
if (transformation == null && isNonDefaultColumn(mapping.getName())
251+
&& (DataTypes.BOOLEAN().equals(tableColumnDataType)
252+
|| tableColumnDataType.getLogicalType().is(LogicalTypeFamily.NUMERIC))) {
251253
transformation = String.format("TRY_CAST(%%s AS %s)", tableColumnDataType.getLogicalType().getTypeRoot().name());
252254
}
253255

flink-cyber/metron-parser-chain/parser-chains-config-service/frontend/parser-chains-client/src/app/cluster/pipelines/pipeline-stepper/pipeline-stepper.component.ts

Lines changed: 13 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -178,9 +178,18 @@ export class PipelineStepperComponent {
178178
}
179179
}).afterClosed().subscribe((data: { id: string, name: string }) => {
180180
if (data) {
181-
const tmp: Map<string, CustomChip> = new Map();
182-
tmp.set(chainId, {name: data.name, allowMapping: false, selected: true, removable: false});
183-
this.topicMap.set(index, tmp);
181+
if (this.topicMap.get(index)) {
182+
this.topicMap.get(index).set(chainId, {
183+
name: data.name,
184+
allowMapping: false,
185+
selected: true,
186+
removable: false
187+
});
188+
} else {
189+
const tmp: Map<string, CustomChip> = new Map();
190+
tmp.set(chainId, {name: data.name, allowMapping: false, selected: true, removable: false});
191+
this.topicMap.set(index, tmp);
192+
}
184193
}
185194
});
186195
}
@@ -203,4 +212,4 @@ export class PipelineStepperComponent {
203212
}
204213
}
205214

206-
type PipedChainModel = ChainModel & { pipeline: string}
215+
type PipedChainModel = ChainModel & { pipeline: string }

0 commit comments

Comments
 (0)