[jira] [Commented] (NIFI-13992) Excessive bootstrap logging

2024-11-08 Thread David Handermann (Jira)


[ 
https://issues.apache.org/jira/browse/NIFI-13992?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17896729#comment-17896729
 ] 

David Handermann commented on NIFI-13992:
-

To provide some background context, as commented in the Apache NiFI Slack:

For containerized deployments, the bootstrap process is really unnecessary, so 
the {{nifi.sh run}} command starts NiFi and does not continue running the 
bootstrap monitor.

When launching with {{nifi.sh start}} the bootstrap process continues running. 
The status logging raises the question of "who watches the watchers?" as it 
relates to the health of the bootstrap process itself. Defaulting the status 
message to the info level, and logging every five seconds gives a positive 
indication of the bootstrap status, and a historical track if the main process 
dies. However, I appreciate that this could be considered excessive in some 
scenarios. For such situations, simply changing the Logback configuration for 
that logger to WARN is an option.

The current default is a bit a of middle-ground approach, although at a high 
level, using nifi.sh run with some other robust monitoring strategy is the 
better option.

> Excessive bootstrap logging
> ---
>
> Key: NIFI-13992
> URL: https://issues.apache.org/jira/browse/NIFI-13992
> Project: Apache NiFi
>  Issue Type: Improvement
>Reporter: Mark Bean
>Assignee: Mark Bean
>Priority: Major
>
> The bootstrap application logger is writing a status message to 
> `nifi-bootstrap.log` every 5 seconds. This is an excessive amount of logging. 
> Recommend reducing the frequency and/or changing the logging to DEBUG level.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (NIFI-13989) Refactor JsonTreeRowRecordReader constructor to take a parameter object

2024-11-08 Thread David Handermann (Jira)


[ 
https://issues.apache.org/jira/browse/NIFI-13989?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17896728#comment-17896728
 ] 

David Handermann commented on NIFI-13989:
-

I still lean against introducing a parameter object for its own sake in this 
scenario, as it seems that reducing the number of constructors would address 
most of the maintenance concerns.

> Refactor JsonTreeRowRecordReader constructor to take a parameter object
> ---
>
> Key: NIFI-13989
> URL: https://issues.apache.org/jira/browse/NIFI-13989
> Project: Apache NiFi
>  Issue Type: Improvement
>Reporter: Daniel Stieglitz
>Assignee: Daniel Stieglitz
>Priority: Minor
>
> When attempting a fix for NIFI-13963 I found it very hard to add another 
> argument as there are already 13 arguments for the current constructor. This 
> is a code smell Martin Fowler identifies as a long parameter list 
> [https://luzkan.github.io/smells/long-parameter-list.|https://luzkan.github.io/smells/long-parameter-list]
>  One of the solutions is to create a parameter object to encompass all the 
> arguments.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (NIFI-13989) Refactor JsonTreeRowRecordReader constructor to take a parameter object

2024-11-08 Thread David Handermann (Jira)


[ 
https://issues.apache.org/jira/browse/NIFI-13989?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17896725#comment-17896725
 ] 

David Handermann commented on NIFI-13989:
-

As a first pass, I would consider reducing the number of constructors to 1, 
since the others appear to be basically for convenience in testing. Having a 
shared test method would obviate the need for multiple constructors, making it 
easier to maintain across the board.

> Refactor JsonTreeRowRecordReader constructor to take a parameter object
> ---
>
> Key: NIFI-13989
> URL: https://issues.apache.org/jira/browse/NIFI-13989
> Project: Apache NiFi
>  Issue Type: Improvement
>Reporter: Daniel Stieglitz
>Assignee: Daniel Stieglitz
>Priority: Minor
>
> When attempting a fix for NIFI-13963 I found it very hard to add another 
> argument as there are already 13 arguments for the current constructor. This 
> is a code smell Martin Fowler identifies as a long parameter list 
> [https://luzkan.github.io/smells/long-parameter-list.|https://luzkan.github.io/smells/long-parameter-list]
>  One of the solutions is to create a parameter object to encompass all the 
> arguments.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (NIFI-13989) Refactor JsonTreeRowRecordReader constructor to take a parameter object

2024-11-08 Thread David Handermann (Jira)


[ 
https://issues.apache.org/jira/browse/NIFI-13989?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17896720#comment-17896720
 ] 

David Handermann commented on NIFI-13989:
-

Thanks for the reply [~dstiegli1].

It is worth noting that several of the overloaded constructors have usage 
limited to test classes, so there may be some value in refactoring test 
references to streamline the number of constructors. However, although the 
number of constructor arguments has grown over time, this is not a 
public-facing class. As such, I would not expect it to change very often.

> Refactor JsonTreeRowRecordReader constructor to take a parameter object
> ---
>
> Key: NIFI-13989
> URL: https://issues.apache.org/jira/browse/NIFI-13989
> Project: Apache NiFi
>  Issue Type: Improvement
>Reporter: Daniel Stieglitz
>Assignee: Daniel Stieglitz
>Priority: Minor
>
> When attempting a fix for NIFI-13963 I found it very hard to add another 
> argument as there are already 13 arguments for the current constructor. This 
> is a code smell Martin Fowler identifies as a long parameter list 
> [https://luzkan.github.io/smells/long-parameter-list.|https://luzkan.github.io/smells/long-parameter-list]
>  One of the solutions is to create a parameter object to encompass all the 
> arguments.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (NIFI-13989) Refactor JsonTreeRowRecordReader constructor to take a parameter object

2024-11-08 Thread David Handermann (Jira)


[ 
https://issues.apache.org/jira/browse/NIFI-13989?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17896715#comment-17896715
 ] 

David Handermann commented on NIFI-13989:
-

[~dstiegli1] I do not recommend making this change. Although a large number of 
arguments can be a problem in some cases, simply refactoring that for its own 
sake does not seem worth the effort right now.

> Refactor JsonTreeRowRecordReader constructor to take a parameter object
> ---
>
> Key: NIFI-13989
> URL: https://issues.apache.org/jira/browse/NIFI-13989
> Project: Apache NiFi
>  Issue Type: Improvement
>Affects Versions: 2.0.0
>Reporter: Daniel Stieglitz
>Assignee: Daniel Stieglitz
>Priority: Minor
>
> When attempting a fix for NIFI-13963 I found it very hard to add another 
> argument as there already 13 arguments for the current constructor. This is a 
> code smell Martin Fowler identifies as a long parameter list 
> [https://luzkan.github.io/smells/long-parameter-list.|https://luzkan.github.io/smells/long-parameter-list]
>  One of the solutions is to create a parameter object to encompass all the 
> arguments.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13989) Refactor JsonTreeRowRecordReader constructor to take a parameter object

2024-11-08 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13989?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13989:

Affects Version/s: (was: 2.0.0)

> Refactor JsonTreeRowRecordReader constructor to take a parameter object
> ---
>
> Key: NIFI-13989
> URL: https://issues.apache.org/jira/browse/NIFI-13989
> Project: Apache NiFi
>  Issue Type: Improvement
>Reporter: Daniel Stieglitz
>Assignee: Daniel Stieglitz
>Priority: Minor
>
> When attempting a fix for NIFI-13963 I found it very hard to add another 
> argument as there already 13 arguments for the current constructor. This is a 
> code smell Martin Fowler identifies as a long parameter list 
> [https://luzkan.github.io/smells/long-parameter-list.|https://luzkan.github.io/smells/long-parameter-list]
>  One of the solutions is to create a parameter object to encompass all the 
> arguments.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Resolved] (NIFI-13985) StandardSSLContextService error for when keystore file is not provided

2024-11-08 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13985?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann resolved NIFI-13985.
-
Fix Version/s: 2.1.0
   Resolution: Fixed

> StandardSSLContextService error for when keystore file is not provided
> --
>
> Key: NIFI-13985
> URL: https://issues.apache.org/jira/browse/NIFI-13985
> Project: Apache NiFi
>  Issue Type: Bug
>Affects Versions: 2.0.0
>Reporter: Mark Bean
>Assignee: Mark Bean
>Priority: Major
> Fix For: 2.1.0
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> Currently, when the Keystore file is not provided in the 
> StandardSSLContextService configuration, a TrustManager not be created.
> {{252         final TrustManager trustManager;}}
> {{253         final String trustStoreFile = {*}getKeyStoreFile{*}();}}
> {{254         if (trustStoreFile == null || trustStoreFile.isBlank()) {}}
> {{255             getLogger().debug("Trust Store File not configured");}}
> {{256         } else {}}
> {{257             trustManager = createTrustManager();}}
> {{258             sslContextBuilder.trustManager(trustManager);}}
> {{259         }}}
> Line 254 should be:
> {{         final String trustStoreFile = {*}getTrustStoreFile{*}();}}



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (NIFI-13988) ExcelReader - Use Starting Row schema strategy and string empty values

2024-11-08 Thread David Handermann (Jira)


[ 
https://issues.apache.org/jira/browse/NIFI-13988?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17896712#comment-17896712
 ] 

David Handermann commented on NIFI-13988:
-

[~dstiegli1] The main reason for limiting the number of rows is for efficiency, 
avoiding the need to read the file twice.

That's a good point [~iiojj2], given the uncertainty, a more flexible solution 
could be to always have {{STRING}} as one of several type choices.

Alternatively, based on the stack trace, it seems like number handling should 
account for an empty string and treat it as a {{null}} when the inferred type 
is a number.

> ExcelReader - Use Starting Row schema strategy and string empty values
> --
>
> Key: NIFI-13988
> URL: https://issues.apache.org/jira/browse/NIFI-13988
> Project: Apache NiFi
>  Issue Type: Bug
>  Components: Core Framework
>Affects Versions: 2.0.0
>Reporter: Philipp Korniets
>Assignee: Daniel Stieglitz
>Priority: Major
> Attachments: Test workbook NiFi2_0.xlsx
>
>
> When Use Starting Row as schema strategy in ExcelReader it analyses first 10 
> row. Problem appears with empty cells of  *Numerical* type which can appear 
> anywhere after 10 rows. The cells *looks like* NULL, but actually is an empty 
> string.
> File with example data attached. 
> Field Exercise Price. 
> Use Starting Row throws an error:
> {code:java}
> Caused by: java.lang.NumberFormatException: For input string: ""
>     at 
> java.base/java.lang.NumberFormatException.forInputString(NumberFormatException.java:67)
>     at java.base/java.lang.Long.parseLong(Long.java:719)
>     at java.base/java.lang.Long.parseLong(Long.java:832)
>     at 
> org.apache.nifi.serialization.record.util.DataTypeUtils.toLong(DataTypeUtils.java:1391)
>     at 
> org.apache.nifi.serialization.record.util.DataTypeUtils.convertType(DataTypeUtils.java:213)
>     at 
> org.apache.nifi.serialization.record.util.DataTypeUtils.convertType(DataTypeUtils.java:174)
>     at 
> org.apache.nifi.excel.ExcelRecordReader.convert(ExcelRecordReader.java:170)
>     at 
> org.apache.nifi.excel.ExcelRecordReader.lambda$getCurrentRowValues$0(ExcelRecordReader.java:127)
>     at 
> java.base/java.util.stream.Streams$RangeIntSpliterator.forEachRemaining(Streams.java:104)
>     at 
> java.base/java.util.stream.IntPipeline$Head.forEach(IntPipeline.java:617)
>     at 
> org.apache.nifi.excel.ExcelRecordReader.getCurrentRowValues(ExcelRecordReader.java:114)
>     at 
> org.apache.nifi.excel.ExcelRecordReader.nextRecord(ExcelRecordReader.java:84)
>     ... 28 common frames omitted{code}



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13986) Upgrade Jetty to 12.0.15 and Jackson to 2.18.1 along with others

2024-11-07 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13986?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13986:

Fix Version/s: 2.1.0
   Resolution: Fixed
   Status: Resolved  (was: Patch Available)

> Upgrade Jetty to 12.0.15 and Jackson to 2.18.1 along with others
> 
>
> Key: NIFI-13986
> URL: https://issues.apache.org/jira/browse/NIFI-13986
> Project: Apache NiFi
>  Issue Type: Task
>Reporter: Pierre Villard
>Assignee: Pierre Villard
>Priority: Major
> Fix For: 2.1.0
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> * kafka-clients from 3.8.0 to 3.9.0
>  * jetty from 12.0.14 to 12.0.15
>  * jackson from 2.18.0 to 2.18.1
>  * exec-maven-plugin from 3.4.1 to 3.5.0
>  * docker-maven-plugin from 0.43.4 to 0.45.1
>  * maven-checkstyle from 3.5.0 to 3.6.0
>  * checkstyle from 10.18.2 to 10.20.0
>  * swagger-codegen from 3.0.63 to 3.0.64
>  * dependency-check from 10.0.4 to 11.1.0



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13986) Upgrade Jetty to 12.0.15 and Jackson to 2.18.1 along with others

2024-11-07 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13986?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13986:

Summary: Upgrade Jetty to 12.0.15 and Jackson to 2.18.1 along with others  
(was: Upgrade dep. jackson, jetty, kafka and plugins)

> Upgrade Jetty to 12.0.15 and Jackson to 2.18.1 along with others
> 
>
> Key: NIFI-13986
> URL: https://issues.apache.org/jira/browse/NIFI-13986
> Project: Apache NiFi
>  Issue Type: Task
>Reporter: Pierre Villard
>Assignee: Pierre Villard
>Priority: Major
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> * kafka-clients from 3.8.0 to 3.9.0
>  * jetty from 12.0.14 to 12.0.15
>  * jackson from 2.18.0 to 2.18.1
>  * exec-maven-plugin from 3.4.1 to 3.5.0
>  * docker-maven-plugin from 0.43.4 to 0.45.1
>  * maven-checkstyle from 3.5.0 to 3.6.0
>  * checkstyle from 10.18.2 to 10.20.0
>  * swagger-codegen from 3.0.63 to 3.0.64
>  * dependency-check from 10.0.4 to 11.1.0



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (NIP-1) Add VerifiableRegistryClient interface to verify Registry Client implementations

2024-11-07 Thread David Handermann (Jira)


[ 
https://issues.apache.org/jira/browse/NIP-1?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17896422#comment-17896422
 ] 

David Handermann commented on NIP-1:


It sounds like the last piece remaining is for concurrence from a frontend 
development perspective. If there is a commitment to do the frontend work, then 
it sounds like everything is covered.

> Add VerifiableRegistryClient interface to verify Registry Client 
> implementations
> 
>
> Key: NIP-1
> URL: https://issues.apache.org/jira/browse/NIP-1
> Project: NiFi Improvement Proposal
>  Issue Type: New Feature
>Reporter: Matt Burgess
>Priority: Normal
>  Labels: nifi-registry
>
> Motivation
> To verify basic connectivity from a NiFiRegistryClient to a Registry instance
> Scope
> Add VerifiableRegistryClient interface to verify NiFiRegistryClient 
> implementations
>  
> Compatibility
> Existing implementations in Apache NiFi will need to implement the verify() 
> method, but a default no-op implementation will be offered so as not to 
> interrupt compatibility. The no-op implementation should log/report that no 
> actual verification was applied.
> Description
> Registry Clients didn't exist when the Verifiable (ControllerService, 
> Processor, ReportingTask, ParameterProvider, etc.) interfaces were added.
> Verification
> Implement the verify method for JerseyNiFiRegistryClient (contributed as a 
> separate Jira) and run with a live instance, validating that incorrect 
> configurations return error message(s) and a correct configuration returns 
> success. Fetching the available buckets should suffice for verification, 
> whether buckets exist or not.
> Alternatives
> None identified, current behavior does not allow verification of 
> NiFiRegistryClient instances



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIP-1) Add VerifiableRegistryClient interface to verify Registry Client implementations

2024-11-07 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIP-1?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIP-1:
---
Labels: nifi-api nifi-registry  (was: nifi-registry)

> Add VerifiableRegistryClient interface to verify Registry Client 
> implementations
> 
>
> Key: NIP-1
> URL: https://issues.apache.org/jira/browse/NIP-1
> Project: NiFi Improvement Proposal
>  Issue Type: New Feature
>Reporter: Matt Burgess
>Priority: Normal
>  Labels: nifi-api, nifi-registry
>
> Motivation
> To verify basic connectivity from a NiFiRegistryClient to a Registry instance
> Scope
> Add VerifiableRegistryClient interface to verify NiFiRegistryClient 
> implementations
>  
> Compatibility
> Existing implementations in Apache NiFi will need to implement the verify() 
> method, but a default no-op implementation will be offered so as not to 
> interrupt compatibility. The no-op implementation should log/report that no 
> actual verification was applied.
> Description
> Registry Clients didn't exist when the Verifiable (ControllerService, 
> Processor, ReportingTask, ParameterProvider, etc.) interfaces were added.
> Verification
> Implement the verify method for JerseyNiFiRegistryClient (contributed as a 
> separate Jira) and run with a live instance, validating that incorrect 
> configurations return error message(s) and a correct configuration returns 
> success. Fetching the available buckets should suffice for verification, 
> whether buckets exist or not.
> Alternatives
> None identified, current behavior does not allow verification of 
> NiFiRegistryClient instances



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (NIFI-13983) Some java artifcats still missing for 2.0.0 release

2024-11-07 Thread David Handermann (Jira)


[ 
https://issues.apache.org/jira/browse/NIFI-13983?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17896331#comment-17896331
 ] 

David Handermann commented on NIFI-13983:
-

[~rubenvw] NIFI-13947 lists a number of modules removed from the 2.0.0 version, 
including the legacy Kerberos Credentials Service API and the Graphite Metric 
Reporter Service. It looks like these should also be added to the main list of 
Deprecated Components and Features for completeness.

https://cwiki.apache.org/confluence/display/NIFI/Deprecated+Components+and+Features

The Kerberos User Service API is the current supported solution for Kerberos 
integration.

The NiFi REST API includes Prometheus and JSON-based metrics, without the need 
for a separate reporting task.

> Some java artifcats still missing for 2.0.0 release
> ---
>
> Key: NIFI-13983
> URL: https://issues.apache.org/jira/browse/NIFI-13983
> Project: Apache NiFi
>  Issue Type: Task
>Reporter: Ruben Van Wanzeele
>Priority: Minor
>
> I cannot fine the following artifacts with the 2.0.0 release:
>  * nifi-kerberos-credentials-service-api
>  ** latest one I find is the 2.0.0-M4
>  ** 
> [https://mvnrepository.com/artifact/org.apache.nifi/nifi-kerberos-credentials-service-api]
>  * nifi-metrics-reporter-service-api
>  ** latest one I find is 1.28.0
>  ** 
> [https://mvnrepository.com/artifact/org.apache.nifi/nifi-metrics-reporter-service-api]
>  * nifi-metrics-reporting-task
>  ** latest one I find is 1.28.0
>  ** 
> [https://mvnrepository.com/artifact/org.apache.nifi/nifi-metrics-reporting-task]
> Is this functionality dropped / replaced with something else



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13983) Some java artifcats still missing for 2.0.0 release

2024-11-07 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13983?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13983:

Priority: Minor  (was: Critical)

> Some java artifcats still missing for 2.0.0 release
> ---
>
> Key: NIFI-13983
> URL: https://issues.apache.org/jira/browse/NIFI-13983
> Project: Apache NiFi
>  Issue Type: Bug
>Reporter: Ruben Van Wanzeele
>Priority: Minor
>
> I cannot fine the following artifacts with the 2.0.0 release:
>  * nifi-kerberos-credentials-service-api
>  ** latest one I find is the 2.0.0-M4
>  ** 
> [https://mvnrepository.com/artifact/org.apache.nifi/nifi-kerberos-credentials-service-api]
>  * nifi-metrics-reporter-service-api
>  ** latest one I find is 1.28.0
>  ** 
> [https://mvnrepository.com/artifact/org.apache.nifi/nifi-metrics-reporter-service-api]
>  * nifi-metrics-reporting-task
>  ** latest one I find is 1.28.0
>  ** 
> [https://mvnrepository.com/artifact/org.apache.nifi/nifi-metrics-reporting-task]
> Is this functionality dropped / replaced with something else



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13983) Some java artifcats still missing for 2.0.0 release

2024-11-07 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13983?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13983:

Issue Type: Task  (was: Bug)

> Some java artifcats still missing for 2.0.0 release
> ---
>
> Key: NIFI-13983
> URL: https://issues.apache.org/jira/browse/NIFI-13983
> Project: Apache NiFi
>  Issue Type: Task
>Reporter: Ruben Van Wanzeele
>Priority: Minor
>
> I cannot fine the following artifacts with the 2.0.0 release:
>  * nifi-kerberos-credentials-service-api
>  ** latest one I find is the 2.0.0-M4
>  ** 
> [https://mvnrepository.com/artifact/org.apache.nifi/nifi-kerberos-credentials-service-api]
>  * nifi-metrics-reporter-service-api
>  ** latest one I find is 1.28.0
>  ** 
> [https://mvnrepository.com/artifact/org.apache.nifi/nifi-metrics-reporter-service-api]
>  * nifi-metrics-reporting-task
>  ** latest one I find is 1.28.0
>  ** 
> [https://mvnrepository.com/artifact/org.apache.nifi/nifi-metrics-reporting-task]
> Is this functionality dropped / replaced with something else



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (NIFI-13985) StandardSSLContextService error for when keystore file is not provided

2024-11-07 Thread David Handermann (Jira)


[ 
https://issues.apache.org/jira/browse/NIFI-13985?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17896364#comment-17896364
 ] 

David Handermann commented on NIFI-13985:
-

Thanks for flagging this issue [~markbean]. If you are planning on putting 
together a pull request, glad to collaborate on a review.

> StandardSSLContextService error for when keystore file is not provided
> --
>
> Key: NIFI-13985
> URL: https://issues.apache.org/jira/browse/NIFI-13985
> Project: Apache NiFi
>  Issue Type: Bug
>Affects Versions: 2.0.0
>Reporter: Mark Bean
>Assignee: Mark Bean
>Priority: Major
>
> Currently, when the Keystore file is not provided in the 
> StandardSSLContextService configuration, a TrustManager not be created.
> {{252         final TrustManager trustManager;}}
> {{253         final String trustStoreFile = {*}getKeyStoreFile{*}();}}
> {{254         if (trustStoreFile == null || trustStoreFile.isBlank()) {}}
> {{255             getLogger().debug("Trust Store File not configured");}}
> {{256         } else {}}
> {{257             trustManager = createTrustManager();}}
> {{258             sslContextBuilder.trustManager(trustManager);}}
> {{259         }}}
> Line 254 should be:
> {{         final String trustStoreFile = {*}getTrustStoreFile{*}();}}



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13922) SplitExcel appears to drop the values of a column which are from a calculated formula

2024-11-07 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13922?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13922:

Fix Version/s: 1.29.0
   1.28.1

> SplitExcel appears to drop the values of a column which are from a calculated 
> formula 
> --
>
> Key: NIFI-13922
> URL: https://issues.apache.org/jira/browse/NIFI-13922
> Project: Apache NiFi
>  Issue Type: Bug
>Affects Versions: 1.27.0, 2.0.0-M4
>Reporter: Daniel Stieglitz
>Assignee: Daniel Stieglitz
>Priority: Major
> Fix For: 2.0.0, 1.29.0, 1.28.1
>
>  Time Spent: 40m
>  Remaining Estimate: 0h
>
> When reading the SalesData.xlsx referred to in NIFI-13418 with a flow which 
> consists of
> GetFile -> SplitExcel -> ConvertRecord where the ConvertRecord is configured 
> with an ExcelReader and a CsvrecordSetWriter it appears the values for column 
> 'Sale_amt' which is a formula (column F * column G) is completely dropped as 
> seen in the sample below with column headers and the first row
> {code:java}
> OrderDate,Region,Manager,SalesMan,Item,Units,Unit_price,Sale_amt
> 43106,East,Martha,Alexander,Television,95,1198,
> {code}
> Although when reading one of the tabs with a flow which consists of GetFile 
> -> ConvertRecord the column is not dropped e.g. of the column names and the 
> first row
> {code:java}
> OrderDate,Region,Manager,SalesMan,Item,Units,Unit_price,Sale_amt
> 151519680,East,Martha,Alexander,Television,95,1198,113810.0
> {code}



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Resolved] (NIFI-3364) Sort Bootstrap java.arg properties in order

2024-11-07 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-3364?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann resolved NIFI-3364.

Fix Version/s: 2.1.0
   Resolution: Fixed

> Sort Bootstrap java.arg properties in order
> ---
>
> Key: NIFI-3364
> URL: https://issues.apache.org/jira/browse/NIFI-3364
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Configuration
>Affects Versions: 0.8.0, 0.7.1, 1.2.0, 1.1.1, 1.0.1
> Environment: Any and all platforms and environments.
>Reporter: Russell Bateman
>Assignee: Jim Steinebrey
>Priority: Minor
>  Labels: easyfix, patch
> Fix For: 2.1.0
>
> Attachments: RunNiFi.java
>
>  Time Spent: 1h
>  Remaining Estimate: 0h
>
> In albeit rare cases, JVM argument ordering is important. The present 
> implementation of the sense of java.arg.N leaves N ignored in the final list 
> when presented to the JVM at launch.
> Two examples of insurmountably critical ordering are the use the Java Flight 
> Recorder and the JMX remote arguments in support of using Java Mission 
> Control remotely to connect to and profile (what's being done by) NiFi.
> Attached is a coded solution for replacing this block of code in RunNiFi.java:
> for (final Map.Entry entry : props.entrySet()) {
>   final String key = entry.getKey();
>   final String value = entry.getValue();
>  
>   if (key.startsWith("java.arg")) {
> javaAdditionalArgs.add(value);
>   }
> }



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-3364) Sort Bootstrap java.arg properties in order

2024-11-07 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-3364?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-3364:
---
Summary: Sort Bootstrap java.arg properties in order  (was: NiFi start-up 
fails to honor N in definitions java.arg.N as made in conf/bootstrap.conf)

> Sort Bootstrap java.arg properties in order
> ---
>
> Key: NIFI-3364
> URL: https://issues.apache.org/jira/browse/NIFI-3364
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Configuration
>Affects Versions: 0.8.0, 0.7.1, 1.2.0, 1.1.1, 1.0.1
> Environment: Any and all platforms and environments.
>Reporter: Russell Bateman
>Assignee: Jim Steinebrey
>Priority: Minor
>  Labels: easyfix, patch
> Attachments: RunNiFi.java
>
>  Time Spent: 1h
>  Remaining Estimate: 0h
>
> In albeit rare cases, JVM argument ordering is important. The present 
> implementation of the sense of java.arg.N leaves N ignored in the final list 
> when presented to the JVM at launch.
> Two examples of insurmountably critical ordering are the use the Java Flight 
> Recorder and the JMX remote arguments in support of using Java Mission 
> Control remotely to connect to and profile (what's being done by) NiFi.
> Attached is a coded solution for replacing this block of code in RunNiFi.java:
> for (final Map.Entry entry : props.entrySet()) {
>   final String key = entry.getKey();
>   final String value = entry.getValue();
>  
>   if (key.startsWith("java.arg")) {
> javaAdditionalArgs.add(value);
>   }
> }



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (NIFI-13972) ObjectLocalDateTimeFieldConverter.convertField ignores time zone

2024-11-06 Thread David Handermann (Jira)


[ 
https://issues.apache.org/jira/browse/NIFI-13972?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17896084#comment-17896084
 ] 

David Handermann commented on NIFI-13972:
-

Thanks for the review and verification [~turcsanyip]!

> ObjectLocalDateTimeFieldConverter.convertField ignores time zone
> 
>
> Key: NIFI-13972
> URL: https://issues.apache.org/jira/browse/NIFI-13972
> Project: Apache NiFi
>  Issue Type: Bug
>Reporter: Tamas Palfy
>Assignee: Tamas Palfy
>Priority: Major
>
> When the incoming value is a string that contains timezone/offset information 
> the returned LocalDateTime simply ignores that part and returns a value as if 
> it was in the local timezone.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (NIFI-13972) ObjectLocalDateTimeFieldConverter.convertField ignores time zone

2024-11-06 Thread David Handermann (Jira)


[ 
https://issues.apache.org/jira/browse/NIFI-13972?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17896054#comment-17896054
 ] 

David Handermann commented on NIFI-13972:
-

For reference, the following simple method runs the string to LocalDateTime 
conversion:

{noformat}
public static void main(final String[] args) {
final ObjectLocalDateTimeFieldConverter converter = new 
ObjectLocalDateTimeFieldConverter();

final String string = "2020-01-01 12:00:00.123456789";
final Optional pattern = Optional.of("-MM-dd 
HH:mm:ss.S");

final long started = System.currentTimeMillis();

final long iterations = 10_000_000L;
for (long i = 0; i < iterations; i++) {
converter.convertField(string, pattern, "fieldName");
}

final long elapsed = System.currentTimeMillis() - started;
System.out.printf("Elapsed: %d ms%n", elapsed);
}
{noformat}

Running that on the current main branch takes around 11000 ms on an Apple M3 
Max. Running with a time zone takes around 4500 ms.

Running that with the pull request for NIFI-13978 using the TemporalQuery 
approach cuts the above time to around 2500 ms, and around 4000 ms with a time 
zone.

> ObjectLocalDateTimeFieldConverter.convertField ignores time zone
> 
>
> Key: NIFI-13972
> URL: https://issues.apache.org/jira/browse/NIFI-13972
> Project: Apache NiFi
>  Issue Type: Bug
>Reporter: Tamas Palfy
>Assignee: Tamas Palfy
>Priority: Major
>
> When the incoming value is a string that contains timezone/offset information 
> the returned LocalDateTime simply ignores that part and returns a value as if 
> it was in the local timezone.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13979) Upgrade happy-dom to 15.10.1

2024-11-06 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13979?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13979:

Status: Patch Available  (was: Open)

> Upgrade happy-dom to 15.10.1
> 
>
> Key: NIFI-13979
> URL: https://issues.apache.org/jira/browse/NIFI-13979
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Core UI
>Reporter: David Handermann
>Priority: Minor
>
> The happy-dom library is a development dependency of the web user interface, 
> not shipped in any runntime components. The library should be upgraded to 
> 15.10.1 to resolve an security vulnerability finding in earlier versions.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Created] (NIFI-13979) Upgrade happy-dom to 15.10.1

2024-11-06 Thread David Handermann (Jira)
David Handermann created NIFI-13979:
---

 Summary: Upgrade happy-dom to 15.10.1
 Key: NIFI-13979
 URL: https://issues.apache.org/jira/browse/NIFI-13979
 Project: Apache NiFi
  Issue Type: Improvement
  Components: Core UI
Reporter: David Handermann


The happy-dom library is a development dependency of the web user interface, 
not shipped in any runntime components. The library should be upgraded to 
15.10.1 to resolve an security vulnerability finding in earlier versions.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (NIFI-13972) ObjectLocalDateTimeFieldConverter.convertField ignores time zone

2024-11-06 Thread David Handermann (Jira)


[ 
https://issues.apache.org/jira/browse/NIFI-13972?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17896038#comment-17896038
 ] 

David Handermann commented on NIFI-13972:
-

Thanks [~turcsanyip]. I created a separate issue NIFI-13978 and submitted a 
pull request with proposed changes.

After initial evaluation, the parseUnresolved method approach did not prove to 
be sufficient, as the object resolution process involves more steps within the 
DateTimeFormatter.

Instead of that approach, I implemented a custom TemporalQuery that looks for 
the presence of a ZoneId in the parsed TemporalAccessor. Using this 
TemporalQuery avoids the try-catch loop of parseBest() and enables resolution 
based on the ZonedDateTime or LocalDateTime as appropriate to the parsed set of 
fields.

Glad to compare approaches with that background.

> ObjectLocalDateTimeFieldConverter.convertField ignores time zone
> 
>
> Key: NIFI-13972
> URL: https://issues.apache.org/jira/browse/NIFI-13972
> Project: Apache NiFi
>  Issue Type: Bug
>Reporter: Tamas Palfy
>Assignee: Tamas Palfy
>Priority: Major
>
> When the incoming value is a string that contains timezone/offset information 
> the returned LocalDateTime simply ignores that part and returns a value as if 
> it was in the local timezone.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13978) Improve Performance of Record Date Time Parsing

2024-11-06 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13978?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13978:

Status: Patch Available  (was: Open)

> Improve Performance of Record Date Time Parsing
> ---
>
> Key: NIFI-13978
> URL: https://issues.apache.org/jira/browse/NIFI-13978
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Core Framework
>Reporter: David Handermann
>Assignee: David Handermann
>Priority: Minor
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> Recent changes to handle time zones when parsing strings to LocalDateTime 
> objects for Record processing resulted in sub-optimal performance. 
> Specifically, parsing strings with timestamp patterns that did not include a 
> time zone require two object resolution attempts due to the use of 
> {{DateTimeFormatter.parseBest()}} with {{ZonedDateTime::from}} and then 
> {{LocalDateTime::from}}.
> Instead of relying on multiple passes try-catch handling in {{parseBest()}}, 
> using the standard {{parse()}} method with a custom {{TemporalQuery}} avoids 
> multiple passes. The {{parse()}} method handles parsing a string to a map of 
> fields, and then calls the provided {{TemporalQuery}} to resolve the 
> requested object type. The {{TemporalAccessor}} can be queried for a 
> {{ZoneId}} to determine whether to resolve the object as a {{LocalDateTime}} 
> or a {{ZonedDateTime}} for subsequent conversion to a {{LocalDateTime}}.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Created] (NIFI-13978) Improve Performance of Record Date Time Parsing

2024-11-06 Thread David Handermann (Jira)
David Handermann created NIFI-13978:
---

 Summary: Improve Performance of Record Date Time Parsing
 Key: NIFI-13978
 URL: https://issues.apache.org/jira/browse/NIFI-13978
 Project: Apache NiFi
  Issue Type: Improvement
  Components: Core Framework
Reporter: David Handermann
Assignee: David Handermann


Recent changes to handle time zones when parsing strings to LocalDateTime 
objects for Record processing resulted in sub-optimal performance. 
Specifically, parsing strings with timestamp patterns that did not include a 
time zone require two object resolution attempts due to the use of 
{{DateTimeFormatter.parseBest()}} with {{ZonedDateTime::from}} and then 
{{LocalDateTime::from}}.

Instead of relying on multiple passes try-catch handling in {{parseBest()}}, 
using the standard {{parse()}} method with a custom {{TemporalQuery}} avoids 
multiple passes. The {{parse()}} method handles parsing a string to a map of 
fields, and then calls the provided {{TemporalQuery}} to resolve the requested 
object type. The {{TemporalAccessor}} can be queried for a {{ZoneId}} to 
determine whether to resolve the object as a {{LocalDateTime}} or a 
{{ZonedDateTime}} for subsequent conversion to a {{LocalDateTime}}.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (NIFI-13972) ObjectLocalDateTimeFieldConverter.convertField ignores time zone

2024-11-06 Thread David Handermann (Jira)


[ 
https://issues.apache.org/jira/browse/NIFI-13972?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17896008#comment-17896008
 ] 

David Handermann commented on NIFI-13972:
-

Thanks for highlighting the parseBest() behavior [~tpalfy] and running the 
performance comparison [~turcsanyip].

Setting a zone on the DateTimeFormatter instance could be problematic due to 
the shared registry of instances.

The fundamental difficulty is attempting to determine whether the specified 
pattern includes a timezone component, given the variety of formatting 
approaches.

Another approach would be to perform more granular time unit queries on an 
unresolved TemporalAccessor. The parseBest() method is a brute-force attempt to 
do that, but given the performance implications, this looks like it is worth 
revisiting. I think it should be possible include some logic that looks for a 
time zone component in the unresolved TemporalAccessor, and then decide whether 
to build a ZonedDateTime or LocalDateTime object.

I will take a look at that approach to consider the implications, and I'm open 
to additional options.

> ObjectLocalDateTimeFieldConverter.convertField ignores time zone
> 
>
> Key: NIFI-13972
> URL: https://issues.apache.org/jira/browse/NIFI-13972
> Project: Apache NiFi
>  Issue Type: Bug
>Reporter: Tamas Palfy
>Assignee: Tamas Palfy
>Priority: Major
>
> When the incoming value is a string that contains timezone/offset information 
> the returned LocalDateTime simply ignores that part and returns a value as if 
> it was in the local timezone.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Resolved] (NIFI-13970) Create a DISCLAIMER file for the 1.x line indicating support posture regarding key dependencies

2024-11-05 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13970?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann resolved NIFI-13970.
-
Resolution: Fixed

> Create a DISCLAIMER file for the 1.x line indicating support posture 
> regarding key dependencies
> ---
>
> Key: NIFI-13970
> URL: https://issues.apache.org/jira/browse/NIFI-13970
> Project: Apache NiFi
>  Issue Type: Task
>Reporter: Joe Witt
>Assignee: Joe Witt
>Priority: Major
> Fix For: 1.29.0, 1.28.1
>
>  Time Spent: 1h 10m
>  Remaining Estimate: 0h
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (NIFI-13878) Implement an option in nifi.properties that forces authentication with OpenID/SSO

2024-11-05 Thread David Handermann (Jira)


[ 
https://issues.apache.org/jira/browse/NIFI-13878?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17895748#comment-17895748
 ] 

David Handermann commented on NIFI-13878:
-

Sounds good [~deragon], I agree that leaving this open for now is worthwhile, 
with the potential to revisit the overall security filter structure down the 
road.

> Implement an option in nifi.properties that forces authentication with 
> OpenID/SSO
> -
>
> Key: NIFI-13878
> URL: https://issues.apache.org/jira/browse/NIFI-13878
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Configuration
>Affects Versions: 2.0.0-M4
> Environment: RHEL 9.4 on AWS EC2 with Okta as Identity Provider.
>Reporter: Hans Deragon
>Priority: Major
>  Labels: OpenID, certificate
>
> This is a feature request to implement an option in nifi.properties that 
> forces authentication with OpenID/SSO, or disable X.509 certificate use for 
> authentication.
> We discovered with NiFi 2.0.0-M4 that if a personal X.509 certificate is set 
> in user accounts under Windows, that certificate is getting used by NiFi for 
> authentication instead of the normal OpenID/SSO headers. The user id in the 
> X.509 certificate is not the same as the one in OpenID/SSO (Okta) and thus, 
> the person is denied access to NiFi.
> This particular certificate is not meant to be used by NiFi to authenticate 
> and authorize users in NiFi even though it is recognized by our Identity 
> Provider.  We desire that NiFi only authenticate and authorize users with 
> OpenID/SSO (which works when I remove the personal certificate from user's 
> Windows workstations).
> This issue has been discussed in NiFi User's mailing list but nobody seams to 
> come up with a solution to our problem, thus this Jira.
> See:  [NiFi 2.0 and possibility to ignore X.509 certificate or force 
> authorization with 
> OpenID/SSO.|https://lists.apache.org/thread/yphnmj27dpkpdm548mt7dd0jkbjn3wch]
> More details:
>  * In 
> nifi-framework-bundle/.../web/security/x509/X509AuthenticationFilter.java, I 
> commented out code in attemptAuthentication() so it always returns null and 
> that works (of course).
>  * I attempted to play with the order of addFilterBefore() in 
> nifi-framework-bundle/.../web/security/configuration/WebSecurityConfiguration.java
>  to hope that OpenID/SSO would always be
>  tested first, without success.
>  * I had one machine (an AWS EC2) that OpenID/SSO always worked despite the 
> certificate.  I do not understand why that happened and of course, I compared 
> the conf/ directory to another EC2 which uses the certificate instead to 
> authenticate the user and found not significant difference, nothing related 
> to this topic.  I was using Chrome when this happened and clearing the 
> cookies did not change the behavior.  Using Edge to access the same machine 
> would cause the certificate being used.  Very odd behavior which I cannot 
> explain.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13878) Implement an option in nifi.properties that forces authentication with OpenID/SSO

2024-11-05 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13878?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13878:

Affects Version/s: (was: 2.0.0-M4)

> Implement an option in nifi.properties that forces authentication with 
> OpenID/SSO
> -
>
> Key: NIFI-13878
> URL: https://issues.apache.org/jira/browse/NIFI-13878
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Configuration
> Environment: RHEL 9.4 on AWS EC2 with Okta as Identity Provider.
>Reporter: Hans Deragon
>Priority: Major
>  Labels: OpenID, certificate
>
> This is a feature request to implement an option in nifi.properties that 
> forces authentication with OpenID/SSO, or disable X.509 certificate use for 
> authentication.
> We discovered with NiFi 2.0.0-M4 that if a personal X.509 certificate is set 
> in user accounts under Windows, that certificate is getting used by NiFi for 
> authentication instead of the normal OpenID/SSO headers. The user id in the 
> X.509 certificate is not the same as the one in OpenID/SSO (Okta) and thus, 
> the person is denied access to NiFi.
> This particular certificate is not meant to be used by NiFi to authenticate 
> and authorize users in NiFi even though it is recognized by our Identity 
> Provider.  We desire that NiFi only authenticate and authorize users with 
> OpenID/SSO (which works when I remove the personal certificate from user's 
> Windows workstations).
> This issue has been discussed in NiFi User's mailing list but nobody seams to 
> come up with a solution to our problem, thus this Jira.
> See:  [NiFi 2.0 and possibility to ignore X.509 certificate or force 
> authorization with 
> OpenID/SSO.|https://lists.apache.org/thread/yphnmj27dpkpdm548mt7dd0jkbjn3wch]
> More details:
>  * In 
> nifi-framework-bundle/.../web/security/x509/X509AuthenticationFilter.java, I 
> commented out code in attemptAuthentication() so it always returns null and 
> that works (of course).
>  * I attempted to play with the order of addFilterBefore() in 
> nifi-framework-bundle/.../web/security/configuration/WebSecurityConfiguration.java
>  to hope that OpenID/SSO would always be
>  tested first, without success.
>  * I had one machine (an AWS EC2) that OpenID/SSO always worked despite the 
> certificate.  I do not understand why that happened and of course, I compared 
> the conf/ directory to another EC2 which uses the certificate instead to 
> authenticate the user and found not significant difference, nothing related 
> to this topic.  I was using Chrome when this happened and clearing the 
> cookies did not change the behavior.  Using Edge to access the same machine 
> would cause the certificate being used.  Very odd behavior which I cannot 
> explain.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (NIFI-13972) ObjectLocalDateTimeFieldConverter.convertField ignores time zone

2024-11-05 Thread David Handermann (Jira)


[ 
https://issues.apache.org/jira/browse/NIFI-13972?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17895747#comment-17895747
 ] 

David Handermann commented on NIFI-13972:
-

The {{DateTuneFormatter.parseBest()}} method does try each of the Temporal 
Queries supplied, but those attempts work against a parsed TemporalAccessor, so 
the amount of additional work is minimized.

> ObjectLocalDateTimeFieldConverter.convertField ignores time zone
> 
>
> Key: NIFI-13972
> URL: https://issues.apache.org/jira/browse/NIFI-13972
> Project: Apache NiFi
>  Issue Type: Bug
>Reporter: Tamas Palfy
>Assignee: Tamas Palfy
>Priority: Major
>
> When the incoming value is a string that contains timezone/offset information 
> the returned LocalDateTime simply ignores that part and returns a value as if 
> it was in the local timezone.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (NIFI-13972) ObjectLocalDateTimeFieldConverter.convertField ignores time zone

2024-11-05 Thread David Handermann (Jira)


[ 
https://issues.apache.org/jira/browse/NIFI-13972?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17895743#comment-17895743
 ] 

David Handermann commented on NIFI-13972:
-

You're welcome, thanks for confirming!

> ObjectLocalDateTimeFieldConverter.convertField ignores time zone
> 
>
> Key: NIFI-13972
> URL: https://issues.apache.org/jira/browse/NIFI-13972
> Project: Apache NiFi
>  Issue Type: Bug
>Reporter: Tamas Palfy
>Assignee: Tamas Palfy
>Priority: Major
>
> When the incoming value is a string that contains timezone/offset information 
> the returned LocalDateTime simply ignores that part and returns a value as if 
> it was in the local timezone.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (NIFI-13972) ObjectLocalDateTimeFieldConverter.convertField ignores time zone

2024-11-05 Thread David Handermann (Jira)


[ 
https://issues.apache.org/jira/browse/NIFI-13972?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17895732#comment-17895732
 ] 

David Handermann commented on NIFI-13972:
-

[~tpalfy]  Changes in NIFI-13579 improved this behavior, are you seeing this 
issue in a particular version?

> ObjectLocalDateTimeFieldConverter.convertField ignores time zone
> 
>
> Key: NIFI-13972
> URL: https://issues.apache.org/jira/browse/NIFI-13972
> Project: Apache NiFi
>  Issue Type: Bug
>Reporter: Tamas Palfy
>Assignee: Tamas Palfy
>Priority: Major
>
> When the incoming value is a string that contains timezone/offset information 
> the returned LocalDateTime simply ignores that part and returns a value as if 
> it was in the local timezone.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13971) Correct Parameter Context Logging on Flow Synchronization

2024-11-05 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13971?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13971:

Fix Version/s: (was: 1.29.0)

> Correct Parameter Context Logging on Flow Synchronization
> -
>
> Key: NIFI-13971
> URL: https://issues.apache.org/jira/browse/NIFI-13971
> Project: Apache NiFi
>  Issue Type: Bug
>Reporter: David Handermann
>Assignee: David Handermann
>Priority: Minor
> Fix For: 1.28.1
>
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> The Flow Synchronization process includes several levels of logging for 
> informational and debugging purposes, including details related to Parameter 
> Context updates. Logging Parameter Context information includes unnecessary 
> details, which should be removed. Recent changes to Parameter Provider 
> integration on the main branch included these improvements, and the relevant 
> logging changes should be backported as part of the finalization process for 
> the support branch.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13971) Correct Parameter Context Logging on Flow Synchronization

2024-11-05 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13971?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13971:

Status: Patch Available  (was: Open)

> Correct Parameter Context Logging on Flow Synchronization
> -
>
> Key: NIFI-13971
> URL: https://issues.apache.org/jira/browse/NIFI-13971
> Project: Apache NiFi
>  Issue Type: Bug
>Reporter: David Handermann
>Assignee: David Handermann
>Priority: Minor
> Fix For: 1.29.0, 1.28.1
>
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> The Flow Synchronization process includes several levels of logging for 
> informational and debugging purposes, including details related to Parameter 
> Context updates. Logging Parameter Context information includes unnecessary 
> details, which should be removed. Recent changes to Parameter Provider 
> integration on the main branch included these improvements, and the relevant 
> logging changes should be backported as part of the finalization process for 
> the support branch.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Created] (NIFI-13971) Correct Parameter Context Logging on Flow Synchronization

2024-11-05 Thread David Handermann (Jira)
David Handermann created NIFI-13971:
---

 Summary: Correct Parameter Context Logging on Flow Synchronization
 Key: NIFI-13971
 URL: https://issues.apache.org/jira/browse/NIFI-13971
 Project: Apache NiFi
  Issue Type: Bug
Reporter: David Handermann
Assignee: David Handermann
 Fix For: 1.29.0, 1.28.1


The Flow Synchronization process includes several levels of logging for 
informational and debugging purposes, including details related to Parameter 
Context updates. Logging Parameter Context information includes unnecessary 
details, which should be removed. Recent changes to Parameter Provider 
integration on the main branch included these improvements, and the relevant 
logging changes should be backported as part of the finalization process for 
the support branch.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Assigned] (NIFI-12836) Connection pool shut down and SocketException for many AWS processors

2024-11-05 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-12836?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann reassigned NIFI-12836:
---

Assignee: David Handermann

> Connection pool shut down and SocketException for many AWS processors
> -
>
> Key: NIFI-12836
> URL: https://issues.apache.org/jira/browse/NIFI-12836
> Project: Apache NiFi
>  Issue Type: Bug
>Reporter: Lehel Boér
>Assignee: David Handermann
>Priority: Major
>
> Reported encountering "Connection pool shut down" errors for the 
> PutDynamoDBRecord, DeleteDynamoDB, and PutSQS processors while running in a 
> NiFi cluster on version 2.0.0-M1.
>  * [Stack Trace reported on the mailing list|https://codefile.io/f/ZMXYzHt89X]
> https://lists.apache.org/thread/5fbtwk68yr4bcxpp2h2mtzwy0566rfqz
>  
>  
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-3364) NiFi start-up fails to honor N in definitions java.arg.N as made in conf/bootstrap.conf

2024-11-05 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-3364?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-3364:
---
Priority: Minor  (was: Critical)

> NiFi start-up fails to honor N in definitions java.arg.N as made in 
> conf/bootstrap.conf
> ---
>
> Key: NIFI-3364
> URL: https://issues.apache.org/jira/browse/NIFI-3364
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Configuration
>Affects Versions: 0.8.0, 0.7.1, 1.2.0, 1.1.1, 1.0.1
> Environment: Any and all platforms and environments.
>Reporter: Russell Bateman
>Assignee: Jim Steinebrey
>Priority: Minor
>  Labels: easyfix, patch
> Attachments: RunNiFi.java
>
>
> In albeit rare cases, JVM argument ordering is important. The present 
> implementation of the sense of java.arg.N leaves N ignored in the final list 
> when presented to the JVM at launch.
> Two examples of insurmountably critical ordering are the use the Java Flight 
> Recorder and the JMX remote arguments in support of using Java Mission 
> Control remotely to connect to and profile (what's being done by) NiFi.
> Attached is a coded solution for replacing this block of code in RunNiFi.java:
> for (final Map.Entry entry : props.entrySet()) {
>   final String key = entry.getKey();
>   final String value = entry.getValue();
>  
>   if (key.startsWith("java.arg")) {
> javaAdditionalArgs.add(value);
>   }
> }



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Resolved] (NIFI-13965) Reduce duplicate code in TestConvertRecord and make use of Java 21 features

2024-11-04 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13965?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann resolved NIFI-13965.
-
Fix Version/s: 2.1.0
   Resolution: Fixed

> Reduce duplicate code in TestConvertRecord and make use of Java 21 features
> ---
>
> Key: NIFI-13965
> URL: https://issues.apache.org/jira/browse/NIFI-13965
> Project: Apache NiFi
>  Issue Type: Improvement
>Reporter: Daniel Stieglitz
>Assignee: Daniel Stieglitz
>Priority: Minor
> Fix For: 2.1.0
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> Intellij is indicating the loading of the same json and schemas are loaded 
> multiple times. These should be done once. Also other Java 21 features 
> Intellij suggested should be made (e.g use of getFirst instead of get(0), 
> text block instead of concatenation etc).



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13966) Remove unsupported security protocols from SNMP processors

2024-11-04 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13966?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13966:

Fix Version/s: 2.1.0
   Resolution: Fixed
   Status: Resolved  (was: Patch Available)

> Remove unsupported security protocols from SNMP processors
> --
>
> Key: NIFI-13966
> URL: https://issues.apache.org/jira/browse/NIFI-13966
> Project: Apache NiFi
>  Issue Type: Improvement
>Reporter: Peter Turcsanyi
>Assignee: Peter Turcsanyi
>Priority: Minor
> Fix For: 2.1.0
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> NIFI-13943 upgraded SNMP4J client library from 2.x to 3.x where MD5 and SHA 
> authentication protocols are not enabled by default anymore because they are 
> insecure (https://www.snmp4j.org/CHANGES.txt). 3DES privacy protocol is not 
> enabled either.
> Remove these protocols from the SNMP processors' configuration options.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Resolved] (NIFI-13915) Conduct Release for Apache NiFi 2.0.0

2024-11-04 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13915?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann resolved NIFI-13915.
-
Resolution: Fixed

> Conduct Release for Apache NiFi 2.0.0
> -
>
> Key: NIFI-13915
> URL: https://issues.apache.org/jira/browse/NIFI-13915
> Project: Apache NiFi
>  Issue Type: Task
>Reporter: David Handermann
>Assignee: David Handermann
>Priority: Major
> Fix For: 2.0.0
>
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Closed] (NIFI-13962) Overrride trusted hostname verification

2024-11-04 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13962?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann closed NIFI-13962.
---

> Overrride trusted hostname verification 
> 
>
> Key: NIFI-13962
> URL: https://issues.apache.org/jira/browse/NIFI-13962
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Extensions
>Reporter: Pedro Oliveira
>Priority: Major
>  Time Spent: 1h
>  Remaining Estimate: 0h
>
> Add a property "Trusted Hostname" to the configuration of the 
> StandardSSLContextService Controller Service to allow to override the trusted 
> hostname verification on the establishment of the HTTP connection to the HTTP 
> server.
> This property if not empty should be set with the hostname and will be used 
> to validate the hostname in the certificate.
> The property is need because there are situations in which the hostname in 
> the certificate is different from the hostname of the server.
> This occurs when the server returns a certificate with an old hostname 
> because it is not possible to generate a new certificate with the actual 
> hostname.
> This property existed in NiFi old versions (<1.14) in the configuration of 
> the processor InvokeHTTP but was removed in later versions. 
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Resolved] (NIFI-13962) Overrride trusted hostname verification

2024-11-04 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13962?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann resolved NIFI-13962.
-
Resolution: Won't Fix  (was: Fixed)

> Overrride trusted hostname verification 
> 
>
> Key: NIFI-13962
> URL: https://issues.apache.org/jira/browse/NIFI-13962
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Extensions
>Reporter: Pedro Oliveira
>Priority: Major
>  Time Spent: 1h
>  Remaining Estimate: 0h
>
> Add a property "Trusted Hostname" to the configuration of the 
> StandardSSLContextService Controller Service to allow to override the trusted 
> hostname verification on the establishment of the HTTP connection to the HTTP 
> server.
> This property if not empty should be set with the hostname and will be used 
> to validate the hostname in the certificate.
> The property is need because there are situations in which the hostname in 
> the certificate is different from the hostname of the server.
> This occurs when the server returns a certificate with an old hostname 
> because it is not possible to generate a new certificate with the actual 
> hostname.
> This property existed in NiFi old versions (<1.14) in the configuration of 
> the processor InvokeHTTP but was removed in later versions. 
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Closed] (NIFI-13962) Overrride trusted hostname verification

2024-11-04 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13962?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann closed NIFI-13962.
---

> Overrride trusted hostname verification 
> 
>
> Key: NIFI-13962
> URL: https://issues.apache.org/jira/browse/NIFI-13962
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Extensions
>Reporter: Pedro Oliveira
>Priority: Major
>  Time Spent: 1h
>  Remaining Estimate: 0h
>
> Add a property "Trusted Hostname" to the configuration of the 
> StandardSSLContextService Controller Service to allow to override the trusted 
> hostname verification on the establishment of the HTTP connection to the HTTP 
> server.
> This property if not empty should be set with the hostname and will be used 
> to validate the hostname in the certificate.
> The property is need because there are situations in which the hostname in 
> the certificate is different from the hostname of the server.
> This occurs when the server returns a certificate with an old hostname 
> because it is not possible to generate a new certificate with the actual 
> hostname.
> This property existed in NiFi old versions (<1.14) in the configuration of 
> the processor InvokeHTTP but was removed in later versions. 
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13962) Overrride trusted hostname verification

2024-11-04 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13962?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13962:

Status: Reopened  (was: Closed)

> Overrride trusted hostname verification 
> 
>
> Key: NIFI-13962
> URL: https://issues.apache.org/jira/browse/NIFI-13962
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Extensions
>Reporter: Pedro Oliveira
>Priority: Major
>  Time Spent: 1h
>  Remaining Estimate: 0h
>
> Add a property "Trusted Hostname" to the configuration of the 
> StandardSSLContextService Controller Service to allow to override the trusted 
> hostname verification on the establishment of the HTTP connection to the HTTP 
> server.
> This property if not empty should be set with the hostname and will be used 
> to validate the hostname in the certificate.
> The property is need because there are situations in which the hostname in 
> the certificate is different from the hostname of the server.
> This occurs when the server returns a certificate with an old hostname 
> because it is not possible to generate a new certificate with the actual 
> hostname.
> This property existed in NiFi old versions (<1.14) in the configuration of 
> the processor InvokeHTTP but was removed in later versions. 
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Resolved] (NIFI-13962) Overrride trusted hostname verification

2024-11-04 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13962?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann resolved NIFI-13962.
-
Resolution: Fixed

Please see the discussion on NIFI-7064 for the reasons related to removing the 
trusted hostname property from InvokeHTTP.

At this time, this type of change will not be considered for inclusion due to 
the inherent security risks associated with bypass TLS certificate verification.

> Overrride trusted hostname verification 
> 
>
> Key: NIFI-13962
> URL: https://issues.apache.org/jira/browse/NIFI-13962
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Extensions
>Reporter: Pedro Oliveira
>Priority: Major
>  Time Spent: 1h
>  Remaining Estimate: 0h
>
> Add a property "Trusted Hostname" to the configuration of the 
> StandardSSLContextService Controller Service to allow to override the trusted 
> hostname verification on the establishment of the HTTP connection to the HTTP 
> server.
> This property if not empty should be set with the hostname and will be used 
> to validate the hostname in the certificate.
> The property is need because there are situations in which the hostname in 
> the certificate is different from the hostname of the server.
> This occurs when the server returns a certificate with an old hostname 
> because it is not possible to generate a new certificate with the actual 
> hostname.
> This property existed in NiFi old versions (<1.14) in the configuration of 
> the processor InvokeHTTP but was removed in later versions. 
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Resolved] (NIFI-13957) Upgrade Snowflake JDBC to 3.20.0 and Snowflake Ingest to 2.3.0

2024-11-02 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13957?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann resolved NIFI-13957.
-
Fix Version/s: 2.1.0
   Resolution: Fixed

> Upgrade Snowflake JDBC to 3.20.0 and Snowflake Ingest to 2.3.0
> --
>
> Key: NIFI-13957
> URL: https://issues.apache.org/jira/browse/NIFI-13957
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Extensions
>Reporter: David Handermann
>Assignee: David Handermann
>Priority: Minor
> Fix For: 2.1.0
>
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> The Snowflake JDBC driver should be upgraded to 
> [3.20.0|https://docs.snowflake.com/en/release-notes/clients-drivers/jdbc-2024]
>  in order to mitigate CVE-2024-43382 related to client-side encryption issues 
> for Azure and GCP with staged files and non-default key sizes.
> The Snowflake Ingest Java library indicates compatibility with JDBC 3.16.0 or 
> higher.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Resolved] (NIFI-13958) Upgrade elliptic to 6.6.0 for Registry

2024-11-02 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13958?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann resolved NIFI-13958.
-
Fix Version/s: 2.1.0
   Resolution: Fixed

> Upgrade elliptic to 6.6.0 for Registry
> --
>
> Key: NIFI-13958
> URL: https://issues.apache.org/jira/browse/NIFI-13958
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: NiFi Registry
>Reporter: David Handermann
>Assignee: David Handermann
>Priority: Minor
> Fix For: 2.1.0
>
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> The [elliptic|https://github.com/indutny/elliptic] library is a transitive 
> dependency of Webpack for NiFi Registry, used during development builds, and 
> should be upgraded to 6.6.0 to mitigate CVE-2024-48948 related to signature 
> verification. As this is a development build dependency, it does not impact 
> any runtime behavior.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13957) Upgrade Snowflake JDBC to 3.20.0 and Snowflake Ingest to 2.3.0

2024-11-01 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13957?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13957:

Summary: Upgrade Snowflake JDBC to 3.20.0 and Snowflake Ingest to 2.3.0  
(was: Upgrade Snowflake JDBC to 3.20.0)

> Upgrade Snowflake JDBC to 3.20.0 and Snowflake Ingest to 2.3.0
> --
>
> Key: NIFI-13957
> URL: https://issues.apache.org/jira/browse/NIFI-13957
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Extensions
>Reporter: David Handermann
>Assignee: David Handermann
>Priority: Minor
>
> The Snowflake JDBC driver should be upgraded to 
> [3.20.0|https://docs.snowflake.com/en/release-notes/clients-drivers/jdbc-2024]
>  in order to mitigate CVE-2024-43382 related to client-side encryption issues 
> for Azure and GCP with staged files and non-default key sizes.
> The Snowflake Ingest Java library indicates compatibility with JDBC 3.16.0 or 
> higher.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Assigned] (NIFI-13958) Upgrade elliptic to 6.6.0 for Registry

2024-11-01 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13958?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann reassigned NIFI-13958:
---

Assignee: David Handermann

> Upgrade elliptic to 6.6.0 for Registry
> --
>
> Key: NIFI-13958
> URL: https://issues.apache.org/jira/browse/NIFI-13958
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: NiFi Registry
>Reporter: David Handermann
>Assignee: David Handermann
>Priority: Minor
>
> The [elliptic|https://github.com/indutny/elliptic] library is a transitive 
> dependency of Webpack for NiFi Registry, used during development builds, and 
> should be upgraded to 6.6.0 to mitigate CVE-2024-48948 related to signature 
> verification. As this is a development build dependency, it does not impact 
> any runtime behavior.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13956) Upgrade Angular to 18.2.11 or later

2024-11-01 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13956?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13956:

Summary: Upgrade Angular to 18.2.11 or later  (was: JS dependencies have 
security vulnerabilities )

> Upgrade Angular to 18.2.11 or later
> ---
>
> Key: NIFI-13956
> URL: https://issues.apache.org/jira/browse/NIFI-13956
> Project: Apache NiFi
>  Issue Type: Bug
>  Components: Core UI
>Affects Versions: 2.0.0-M4, 2.0.0
>Reporter: Dimitri John Ledkov
>Priority: Major
>
> Can you please upgrade angularjs to latest minor point release as well as 
> http_proxy_middleware? Scanners are picking up that there are vulnerabilities.
>  
> ```
>  xnox@chainguard:/tmp/nifi/nifi-frontend/src/main/frontend$ npm audit
>  # npm audit report
>  
>  http-proxy-middleware  3.0.0 - 3.0.2
>  Severity: high
>  Denial of service in http-proxy-middleware - 
> https://github.com/advisories/GHSA-c7qv-q95q-8v27
>  fix available via `npm audit fix --force`
>  Will install @angular-devkit/build-angular@18.2.10, which is outside the 
> stated dependency range
>  node_modules/http-proxy-middleware
>    @angular-devkit/build-angular  18.0.0-next.0 - 18.2.9 || 19.0.0-next.0 - 
> 19.0.0-next.9
>    Depends on vulnerable versions of http-proxy-middleware
>    node_modules/@angular-devkit/build-angular
>  
>  2 high severity vulnerabilities
>  
>  To address all issues, run:
>    npm audit fix --force
> ```
>  
> Note usually dependabot can help with these, and it is a good practice to run 
> `npm audit` prior to cutting a release.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Created] (NIFI-13958) Upgrade elliptic to 6.6.0 for Registry

2024-11-01 Thread David Handermann (Jira)
David Handermann created NIFI-13958:
---

 Summary: Upgrade elliptic to 6.6.0 for Registry
 Key: NIFI-13958
 URL: https://issues.apache.org/jira/browse/NIFI-13958
 Project: Apache NiFi
  Issue Type: Improvement
  Components: NiFi Registry
Reporter: David Handermann


The [elliptic|https://github.com/indutny/elliptic] library is a transitive 
dependency of Webpack for NiFi Registry, used during development builds, and 
should be upgraded to 6.6.0 to mitigate CVE-2024-48948 related to signature 
verification. As this is a development build dependency, it does not impact any 
runtime behavior.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13957) Upgrade Snowflake JDBC to 3.20.0

2024-11-01 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13957?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13957:

Summary: Upgrade Snowflake JDBC to 3.20.0  (was: Upgraded Snowflake JDBC to 
3.20.0)

> Upgrade Snowflake JDBC to 3.20.0
> 
>
> Key: NIFI-13957
> URL: https://issues.apache.org/jira/browse/NIFI-13957
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Extensions
>Reporter: David Handermann
>Assignee: David Handermann
>Priority: Minor
>
> The Snowflake JDBC driver should be upgraded to 
> [3.20.0|https://docs.snowflake.com/en/release-notes/clients-drivers/jdbc-2024]
>  in order to mitigate CVE-2024-43382 related to client-side encryption issues 
> for Azure and GCP with staged files and non-default key sizes.
> The Snowflake Ingest Java library indicates compatibility with JDBC 3.16.0 or 
> higher.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (NIFI-13956) Upgrade Angular to 18.2.11 or later

2024-11-01 Thread David Handermann (Jira)


[ 
https://issues.apache.org/jira/browse/NIFI-13956?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17894854#comment-17894854
 ] 

David Handermann commented on NIFI-13956:
-

For tracking, I updated the title to indicate that the Angular should be 
upgraded to the latest minor version, which includes the transitive dependency 
upgrade for http-proxy-middleware 3.0.3.

As previously noted, http-proxy-middleware is a development dependency and is 
not included in any binary releases, so updating it can occur as part of 
standard dependency maintenance work.

> Upgrade Angular to 18.2.11 or later
> ---
>
> Key: NIFI-13956
> URL: https://issues.apache.org/jira/browse/NIFI-13956
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Core UI
>Affects Versions: 2.0.0-M4, 2.0.0
>Reporter: Dimitri John Ledkov
>Priority: Major
>
> Can you please upgrade angularjs to latest minor point release as well as 
> http_proxy_middleware? Scanners are picking up that there are vulnerabilities.
>  
> ```
>  xnox@chainguard:/tmp/nifi/nifi-frontend/src/main/frontend$ npm audit
>  # npm audit report
>  
>  http-proxy-middleware  3.0.0 - 3.0.2
>  Severity: high
>  Denial of service in http-proxy-middleware - 
> https://github.com/advisories/GHSA-c7qv-q95q-8v27
>  fix available via `npm audit fix --force`
>  Will install @angular-devkit/build-angular@18.2.10, which is outside the 
> stated dependency range
>  node_modules/http-proxy-middleware
>    @angular-devkit/build-angular  18.0.0-next.0 - 18.2.9 || 19.0.0-next.0 - 
> 19.0.0-next.9
>    Depends on vulnerable versions of http-proxy-middleware
>    node_modules/@angular-devkit/build-angular
>  
>  2 high severity vulnerabilities
>  
>  To address all issues, run:
>    npm audit fix --force
> ```
>  
> Note usually dependabot can help with these, and it is a good practice to run 
> `npm audit` prior to cutting a release.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Created] (NIFI-13957) Upgraded Snowflake JDBC to 3.20.0

2024-11-01 Thread David Handermann (Jira)
David Handermann created NIFI-13957:
---

 Summary: Upgraded Snowflake JDBC to 3.20.0
 Key: NIFI-13957
 URL: https://issues.apache.org/jira/browse/NIFI-13957
 Project: Apache NiFi
  Issue Type: Improvement
  Components: Extensions
Reporter: David Handermann
Assignee: David Handermann


The Snowflake JDBC driver should be upgraded to 
[3.20.0|https://docs.snowflake.com/en/release-notes/clients-drivers/jdbc-2024] 
in order to mitigate CVE-2024-43382 related to client-side encryption issues 
for Azure and GCP with staged files and non-default key sizes.

The Snowflake Ingest Java library indicates compatibility with JDBC 3.16.0 or 
higher.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13956) Upgrade Angular to 18.2.11 or later

2024-11-01 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13956?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13956:

Priority: Minor  (was: Major)

> Upgrade Angular to 18.2.11 or later
> ---
>
> Key: NIFI-13956
> URL: https://issues.apache.org/jira/browse/NIFI-13956
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Core UI
>Affects Versions: 2.0.0-M4, 2.0.0
>Reporter: Dimitri John Ledkov
>Priority: Minor
>
> Can you please upgrade angularjs to latest minor point release as well as 
> http_proxy_middleware? Scanners are picking up that there are vulnerabilities.
>  
> ```
>  xnox@chainguard:/tmp/nifi/nifi-frontend/src/main/frontend$ npm audit
>  # npm audit report
>  
>  http-proxy-middleware  3.0.0 - 3.0.2
>  Severity: high
>  Denial of service in http-proxy-middleware - 
> https://github.com/advisories/GHSA-c7qv-q95q-8v27
>  fix available via `npm audit fix --force`
>  Will install @angular-devkit/build-angular@18.2.10, which is outside the 
> stated dependency range
>  node_modules/http-proxy-middleware
>    @angular-devkit/build-angular  18.0.0-next.0 - 18.2.9 || 19.0.0-next.0 - 
> 19.0.0-next.9
>    Depends on vulnerable versions of http-proxy-middleware
>    node_modules/@angular-devkit/build-angular
>  
>  2 high severity vulnerabilities
>  
>  To address all issues, run:
>    npm audit fix --force
> ```
>  
> Note usually dependabot can help with these, and it is a good practice to run 
> `npm audit` prior to cutting a release.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13956) Upgrade Angular to 18.2.11 or later

2024-11-01 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13956?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13956:

Issue Type: Improvement  (was: Bug)

> Upgrade Angular to 18.2.11 or later
> ---
>
> Key: NIFI-13956
> URL: https://issues.apache.org/jira/browse/NIFI-13956
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Core UI
>Affects Versions: 2.0.0-M4, 2.0.0
>Reporter: Dimitri John Ledkov
>Priority: Major
>
> Can you please upgrade angularjs to latest minor point release as well as 
> http_proxy_middleware? Scanners are picking up that there are vulnerabilities.
>  
> ```
>  xnox@chainguard:/tmp/nifi/nifi-frontend/src/main/frontend$ npm audit
>  # npm audit report
>  
>  http-proxy-middleware  3.0.0 - 3.0.2
>  Severity: high
>  Denial of service in http-proxy-middleware - 
> https://github.com/advisories/GHSA-c7qv-q95q-8v27
>  fix available via `npm audit fix --force`
>  Will install @angular-devkit/build-angular@18.2.10, which is outside the 
> stated dependency range
>  node_modules/http-proxy-middleware
>    @angular-devkit/build-angular  18.0.0-next.0 - 18.2.9 || 19.0.0-next.0 - 
> 19.0.0-next.9
>    Depends on vulnerable versions of http-proxy-middleware
>    node_modules/@angular-devkit/build-angular
>  
>  2 high severity vulnerabilities
>  
>  To address all issues, run:
>    npm audit fix --force
> ```
>  
> Note usually dependabot can help with these, and it is a good practice to run 
> `npm audit` prior to cutting a release.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-7421) Support SASL/OAUTHBEARER in Kafka processors

2024-10-30 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-7421?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-7421:
---
Description: Add support for SASL/OAUTHBEARER to the Kafka 3 processors 
which now have an allowable values list of SASL mechanisms.  (was: Add support 
for SASL/OAUTHBEARER to the Kafka 2.x processors which now have an allowable 
values list of SASL mechanisms.)

> Support SASL/OAUTHBEARER in Kafka processors
> 
>
> Key: NIFI-7421
> URL: https://issues.apache.org/jira/browse/NIFI-7421
> Project: Apache NiFi
>  Issue Type: Improvement
>Reporter: Bryan Bende
>Priority: Major
>
> Add support for SASL/OAUTHBEARER to the Kafka 3 processors which now have an 
> allowable values list of SASL mechanisms.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13944) Upgrade Redis version to 5.2.0

2024-10-29 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13944?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13944:

Fix Version/s: 2.0.0
   Resolution: Fixed
   Status: Resolved  (was: Patch Available)

> Upgrade Redis version to 5.2.0
> --
>
> Key: NIFI-13944
> URL: https://issues.apache.org/jira/browse/NIFI-13944
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Extensions
>Reporter: Matt Burgess
>Assignee: Matt Burgess
>Priority: Major
> Fix For: 2.0.0
>
>  Time Spent: 1h
>  Remaining Estimate: 0h
>
> The current version of the Redis library is 3.10.0, which is compatible with 
> up to 6.2 which is EOL on Feb 2025. This should be updated to the latest 
> version 5.2.0 to support 6.4+.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13947) Remove unused nifi-security-utils Maven configuration

2024-10-29 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13947?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13947:

Status: Patch Available  (was: Open)

> Remove unused nifi-security-utils Maven configuration
> -
>
> Key: NIFI-13947
> URL: https://issues.apache.org/jira/browse/NIFI-13947
> Project: Apache NiFi
>  Issue Type: Bug
>Reporter: David Handermann
>Assignee: David Handermann
>Priority: Minor
> Fix For: 2.0.0
>
>
> Following recent changes to TLS configuration, the {{nifi-security-utils}} 
> module is no longer referenced, but updates did not include removing the 
> Maven configuration pom.xml.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Created] (NIFI-13947) Remove unused nifi-security-utils Maven configuration

2024-10-29 Thread David Handermann (Jira)
David Handermann created NIFI-13947:
---

 Summary: Remove unused nifi-security-utils Maven configuration
 Key: NIFI-13947
 URL: https://issues.apache.org/jira/browse/NIFI-13947
 Project: Apache NiFi
  Issue Type: Bug
Reporter: David Handermann
Assignee: David Handermann
 Fix For: 2.0.0


Following recent changes to TLS configuration, the {{nifi-security-utils}} 
module is no longer referenced, but updates did not include removing the Maven 
configuration pom.xml.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13946) SNMP Integration Test Failures with SNMP4J 3

2024-10-29 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13946?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13946:

Status: Patch Available  (was: Open)

> SNMP Integration Test Failures with SNMP4J 3
> 
>
> Key: NIFI-13946
> URL: https://issues.apache.org/jira/browse/NIFI-13946
> Project: Apache NiFi
>  Issue Type: Bug
>Reporter: David Handermann
>Assignee: David Handermann
>Priority: Major
> Fix For: 2.0.0
>
>
> SNMP4J version 3 introduced [several 
> changes|https://www.snmp4j.org/CHANGES.txt] that broke the expected behavior 
> of existing integration tests. These changes include defaulting to listen on 
> 127.0.0.1 and disabling SHA and MD5 algorithms for SNMP Version 3.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Created] (NIFI-13946) SNMP Integration Test Failures with SNMP4J 3

2024-10-29 Thread David Handermann (Jira)
David Handermann created NIFI-13946:
---

 Summary: SNMP Integration Test Failures with SNMP4J 3
 Key: NIFI-13946
 URL: https://issues.apache.org/jira/browse/NIFI-13946
 Project: Apache NiFi
  Issue Type: Bug
Reporter: David Handermann
Assignee: David Handermann
 Fix For: 2.0.0


SNMP4J version 3 introduced [several 
changes|https://www.snmp4j.org/CHANGES.txt] that broke the expected behavior of 
existing integration tests. These changes include defaulting to listen on 
127.0.0.1 and disabling SHA and MD5 algorithms for SNMP Version 3.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13843) Unknown fields not dropped by JSON Writer as expected by specified schema

2024-10-29 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13843?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13843:

Fix Version/s: 2.0.0
   Resolution: Fixed
   Status: Resolved  (was: Patch Available)

> Unknown fields not dropped by JSON Writer as expected by specified schema
> -
>
> Key: NIFI-13843
> URL: https://issues.apache.org/jira/browse/NIFI-13843
> Project: Apache NiFi
>  Issue Type: Bug
>  Components: Extensions
>Affects Versions: 1.27.0, 2.0.0-M4
>Reporter: Pierre Villard
>Assignee: Pierre Villard
>Priority: Major
> Fix For: 2.0.0
>
>  Time Spent: 1h 10m
>  Remaining Estimate: 0h
>
> Consider the following use case:
>  * GFF Processor, generating a JSON with 3 fields: a, b, and c
>  * ConvertRecord with JSON Reader / JSON Writer
>  ** Both reader and writer are configured with a schema only specifying 
> fields a and b
> The expected result is a JSON that only contains fields a and b.
> We're following the below path in the code:
>  * AbstractRecordProcessor (L131)
> {code:java}
> Record firstRecord = reader.nextRecord(); {code}
> In this case, the default method for nextRecord() is defined in RecordReader 
> (L50)
> {code:java}
> default Record nextRecord() throws IOException, MalformedRecordException {
> return nextRecord(true, false);
> } {code}
> where we are NOT dropping the unknown fields (Java doc needs some fixing here 
> as it is saying the opposite)
> We get to 
> {code:java}
> writer.write(firstRecord); {code}
> which gets us to
>  * WriteJsonResult (L206)
> Here, we do a check
> {code:java}
> isUseSerializeForm(record, writeSchema) {code}
> which currently returns true when it should not. Because of this we write the 
> serialised form which ignores the writer schema.
> In this method isUseSerializeForm(), we do check
> {code:java}
> record.getSchema().equals(writeSchema) {code}
> But at this point record.getSchema() returns the schema defined in the reader 
> which is equal to the one defined in the writer - even though the record has 
> additional fields compared to the defined schema.
> The suggested fix is check is to also add a check on
> {code:java}
> record.isDropUnknownFields() {code}
> If dropUnknownFields is false, then we do not use the serialised form.
> While this does solve the issue, I'm a bit conflicted on the current 
> approach. Not only this could have a performance impact (we are likely going 
> to not use the serialized form as often), but it also feels like the default 
> should be to ignore the unknown fields when reading the record.
> If we consider the below scenario:
>  * GFF Processor, generating a JSON with 3 fields: {{{}a{}}}, {{{}b{}}}, and 
> {{c}}
>  * ConvertRecord with JSON Reader / JSON Writer
>  ** JSON reader with a schema only specifying fields {{a}} and {{b}}
>  ** JSON writer with a schema specifying fields {{{}a{}}}, {{{}b{}}}, and 
> {{c}} ({{{}c{}}} defaulting to {{{}null{}}})
> It feels like the expected result should be a JSON with the field {{c}} and a 
> {{null}} value, because the reader would drop the field when reading the JSON 
> and converting it into a record and pass it to the writer.
> If we agree on the above, then it may be easier to juste override 
> {{nextRecord()}} in {{AbstractJsonRowRecordReader}} and default to 
> {{{}nextRecord(true, true){}}}.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13945) Exclude FindBugs Annotations and Hibernate Annotations

2024-10-29 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13945?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13945:

Status: Patch Available  (was: Open)

> Exclude FindBugs Annotations and Hibernate Annotations
> --
>
> Key: NIFI-13945
> URL: https://issues.apache.org/jira/browse/NIFI-13945
> Project: Apache NiFi
>  Issue Type: Bug
>  Components: Extensions
>Reporter: David Handermann
>Assignee: David Handermann
>Priority: Major
> Fix For: 2.0.0
>
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> Recent updates to several dependencies highlighted license compliance issues 
> with the inclusion of LGPL 2:
> - FindBugs Annotations in nifi-opentelemetry-processors through 
> jackson-datatype-protobuf
> - Hibernate Commons Annotations and Hibernate Core in nifi-registry-framework



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Created] (NIFI-13945) Exclude FindBugs Annotations and Hibernate Annotations

2024-10-29 Thread David Handermann (Jira)
David Handermann created NIFI-13945:
---

 Summary: Exclude FindBugs Annotations and Hibernate Annotations
 Key: NIFI-13945
 URL: https://issues.apache.org/jira/browse/NIFI-13945
 Project: Apache NiFi
  Issue Type: Bug
  Components: Extensions
Reporter: David Handermann
Assignee: David Handermann
 Fix For: 2.0.0


Recent updates to several dependencies highlighted license compliance issues 
with the inclusion of LGPL 2:

- FindBugs Annotations in nifi-opentelemetry-processors through 
jackson-datatype-protobuf
- Hibernate Commons Annotations and Hibernate Core in nifi-registry-framework



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (NIP-1) Add VerifiableRegistryClient interface to verify Registry Client implementations

2024-10-28 Thread David Handermann (Jira)


[ 
https://issues.apache.org/jira/browse/NIP-1?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17893678#comment-17893678
 ] 

David Handermann commented on NIP-1:


Thanks for summarizing the full scope of changes required [~mattyb149].

What aspects of the implementation would you plan to handle yourself as part of 
introducing this feature?

> Add VerifiableRegistryClient interface to verify Registry Client 
> implementations
> 
>
> Key: NIP-1
> URL: https://issues.apache.org/jira/browse/NIP-1
> Project: NiFi Improvement Proposal
>  Issue Type: New Feature
>Reporter: Matt Burgess
>Priority: Normal
>  Labels: nifi-registry
>
> Motivation
> To verify basic connectivity from a NiFiRegistryClient to a Registry instance
> Scope
> Add VerifiableRegistryClient interface to verify NiFiRegistryClient 
> implementations
>  
> Compatibility
> Existing implementations in Apache NiFi will need to implement the verify() 
> method, but a default no-op implementation will be offered so as not to 
> interrupt compatibility. The no-op implementation should log/report that no 
> actual verification was applied.
> Description
> Registry Clients didn't exist when the Verifiable (ControllerService, 
> Processor, ReportingTask, ParameterProvider, etc.) interfaces were added.
> Verification
> Implement the verify method for JerseyNiFiRegistryClient (contributed as a 
> separate Jira) and run with a live instance, validating that incorrect 
> configurations return error message(s) and a correct configuration returns 
> success. Fetching the available buckets should suffice for verification, 
> whether buckets exist or not.
> Alternatives
> None identified, current behavior does not allow verification of 
> NiFiRegistryClient instances



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13922) SplitExcel appears to drop the values of a column which are from a calculated formula

2024-10-28 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13922?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13922:

Fix Version/s: 2.0.0
   Resolution: Fixed
   Status: Resolved  (was: Patch Available)

> SplitExcel appears to drop the values of a column which are from a calculated 
> formula 
> --
>
> Key: NIFI-13922
> URL: https://issues.apache.org/jira/browse/NIFI-13922
> Project: Apache NiFi
>  Issue Type: Bug
>Affects Versions: 1.27.0, 2.0.0-M4
>Reporter: Daniel Stieglitz
>Assignee: Daniel Stieglitz
>Priority: Major
> Fix For: 2.0.0
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> When reading the SalesData.xlsx referred to in NIFI-13418 with a flow which 
> consists of
> GetFile -> SplitExcel -> ConvertRecord where the ConvertRecord is configured 
> with an ExcelReader and a CsvrecordSetWriter it appears the values for column 
> 'Sale_amt' which is a formula (column F * column G) is completely dropped as 
> seen in the sample below with column headers and the first row
> {code:java}
> OrderDate,Region,Manager,SalesMan,Item,Units,Unit_price,Sale_amt
> 43106,East,Martha,Alexander,Television,95,1198,
> {code}
> Although when reading one of the tabs with a flow which consists of GetFile 
> -> ConvertRecord the column is not dropped e.g. of the column names and the 
> first row
> {code:java}
> OrderDate,Region,Manager,SalesMan,Item,Units,Unit_price,Sale_amt
> 151519680,East,Martha,Alexander,Television,95,1198,113810.0
> {code}



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Resolved] (NIFI-13939) Upgrade Logback to 1.5.12 and AWS SDK to 2.29.1 along with Spring Boot 3.3.5 and others

2024-10-28 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13939?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann resolved NIFI-13939.
-
Resolution: Fixed

> Upgrade Logback to 1.5.12 and AWS SDK to 2.29.1 along with Spring Boot 3.3.5 
> and others
> ---
>
> Key: NIFI-13939
> URL: https://issues.apache.org/jira/browse/NIFI-13939
> Project: Apache NiFi
>  Issue Type: Improvement
>Reporter: Joe Witt
>Assignee: Joe Witt
>Priority: Major
> Fix For: 2.0.0
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> ch.qos.logback1.5.11 1.5.12
> com.amazonaws 1.12.775 1.12.777
> com.github.luben  zstd-jni 1.5.6-6 1.5.6-7
> com.github.wnameless.json 0.17.0 0.17.1
> com.ibm.icu   icu4j 75.1 76.1
> com.nimbusds  nimbus-jose-jwt 9.41.2 9.42
> io.github.rburgst 3.1.0 3.1.1
> org.testcontainers 1.20.2 1.20.3
> software.amazon.awssdk 2.28.25 2.29.1
> com.hubspot.jackson   0.9.15 0.9.16
> com.slack.api 1.44.0 1.44.1
> com.zendesk/mysql-binlog-.. 0.29.2 0.30.1
> net.datafaker 2.4.0 2.4.1
> org.flywaydb 10.20.0 10.20.1
> org.mariadb.jdbc  3.4.1 3.5.0
> org.springframework.boot  3.3.4 3.3.5
> org.springframework.security.kerberos 1.0.1.RELEASE vs 2.1.1



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13943) Upgrade Dropbox, Camel Salesforce, QuestDB, and SNMP4J

2024-10-28 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13943?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13943:

Fix Version/s: 2.0.0
   Resolution: Fixed
   Status: Resolved  (was: Patch Available)

> Upgrade Dropbox, Camel Salesforce, QuestDB, and SNMP4J
> --
>
> Key: NIFI-13943
> URL: https://issues.apache.org/jira/browse/NIFI-13943
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Extensions
>Reporter: Matt Burgess
>Assignee: Matt Burgess
>Priority: Major
> Fix For: 2.0.0
>
>  Time Spent: 1h
>  Remaining Estimate: 0h
>
> The following libraries should be upgraded (the list is "package-name 
> currVersion latestVersionAvail"):
> com.dropbox.core 5.4.6 7.0.0
> org.apache.camel/salesforce 3.14.10 3.22.2
> org.questdb 7.4.2 8.1.4
> org.snmp4j 2.8.18 3.8.2
> The Salesforce 3.x line is already EOL and has been for 2 years, but 
> upgrading to 4+ versions introduces an apparent conflict between 
> camel-salesforce JsonUtils and Jackson modules (older Jackson package names 
> versus Jackson Jakarta package names) causing classloader issues. This should 
> be investigated separately.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13941) Correct Maximum DNS Name Length for Generated Certificates

2024-10-28 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13941?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13941:

Priority: Minor  (was: Major)

> Correct Maximum DNS Name Length for Generated Certificates
> --
>
> Key: NIFI-13941
> URL: https://issues.apache.org/jira/browse/NIFI-13941
> Project: Apache NiFi
>  Issue Type: Bug
>Reporter: David Handermann
>Assignee: David Handermann
>Priority: Minor
> Fix For: 2.0.0
>
>  Time Spent: 40m
>  Remaining Estimate: 0h
>
> The {{nifi.web.proxy.host}} property provides optional DNS names for NiFi 
> running behind a reverse proxy or gateway, and the automated certificate 
> generation process considers property values when adding DNS Subject 
> Alternative Names.
> Recent updates to remove the optional port element set a maximum length of 64 
> characters for the entire DNS address, which is the limit for a label, but an 
> not the entire address according to [RFC 
> 1035|https://www.rfc-editor.org/rfc/rfc1035]. The length limitation should be 
> changed to 255 as described in RFC 1035 Section 2.3.4.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13941) Correct Maximum DNS Name Length for Generated Certificates

2024-10-28 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13941?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13941:

Resolution: Fixed
Status: Resolved  (was: Patch Available)

> Correct Maximum DNS Name Length for Generated Certificates
> --
>
> Key: NIFI-13941
> URL: https://issues.apache.org/jira/browse/NIFI-13941
> Project: Apache NiFi
>  Issue Type: Bug
>Reporter: David Handermann
>Assignee: David Handermann
>Priority: Minor
> Fix For: 2.0.0
>
>  Time Spent: 40m
>  Remaining Estimate: 0h
>
> The {{nifi.web.proxy.host}} property provides optional DNS names for NiFi 
> running behind a reverse proxy or gateway, and the automated certificate 
> generation process considers property values when adding DNS Subject 
> Alternative Names.
> Recent updates to remove the optional port element set a maximum length of 64 
> characters for the entire DNS address, which is the limit for a label, but an 
> not the entire address according to [RFC 
> 1035|https://www.rfc-editor.org/rfc/rfc1035]. The length limitation should be 
> changed to 255 as described in RFC 1035 Section 2.3.4.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13943) Upgrade Dropbox, Camel Salesforce, QuestDB, and SNMP4J

2024-10-28 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13943?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13943:

Summary: Upgrade Dropbox, Camel Salesforce, QuestDB, and SNMP4J  (was: 
Upgrade dependency versions for libraries becoming EOL)

> Upgrade Dropbox, Camel Salesforce, QuestDB, and SNMP4J
> --
>
> Key: NIFI-13943
> URL: https://issues.apache.org/jira/browse/NIFI-13943
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Extensions
>Reporter: Matt Burgess
>Assignee: Matt Burgess
>Priority: Major
>  Time Spent: 1h
>  Remaining Estimate: 0h
>
> The following libraries should be upgraded (the list is "package-name 
> currVersion latestVersionAvail"):
> com.dropbox.core 5.4.6 7.0.0
> org.apache.camel/salesforce 3.14.10 3.22.2
> org.questdb 7.4.2 8.1.4
> org.snmp4j 2.8.18 3.8.2
> The Salesforce 3.x line is already EOL and has been for 2 years, but 
> upgrading to 4+ versions introduces an apparent conflict between 
> camel-salesforce JsonUtils and Jackson modules (older Jackson package names 
> versus Jackson Jakarta package names) causing classloader issues. This should 
> be investigated separately.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Resolved] (NIFI-13868) Add pg-delete to toolkit CLI

2024-10-28 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13868?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann resolved NIFI-13868.
-
Fix Version/s: 2.0.0
   Resolution: Fixed

> Add pg-delete to toolkit CLI
> 
>
> Key: NIFI-13868
> URL: https://issues.apache.org/jira/browse/NIFI-13868
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Tools and Build
>Affects Versions: 1.27.0
>Reporter: Greg Solovyev
>Assignee: Greg Solovyev
>Priority: Minor
> Fix For: 2.0.0
>
>  Time Spent: 1h 40m
>  Remaining Estimate: 0h
>
> We use Nifi Toolkit extensively to control a fleet of Nifi instances that are 
> deployed remotely. WE use it especially heavily for managing process groups. 
> One of the tasks that is impossible to perform via Nifi Toolkit currently is 
> deleting a process group. I added `delete-pg` command to our fork of Nifi, 
> but it would be nice to have it in the upstream, so that we can stay rebased 
> on upstream.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13868) Add pg-delete to toolkit CLI

2024-10-28 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13868?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13868:

Fix Version/s: 1.29.0

> Add pg-delete to toolkit CLI
> 
>
> Key: NIFI-13868
> URL: https://issues.apache.org/jira/browse/NIFI-13868
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Tools and Build
>Affects Versions: 1.27.0
>Reporter: Greg Solovyev
>Assignee: Greg Solovyev
>Priority: Minor
> Fix For: 2.0.0, 1.29.0
>
>  Time Spent: 1h 50m
>  Remaining Estimate: 0h
>
> We use Nifi Toolkit extensively to control a fleet of Nifi instances that are 
> deployed remotely. WE use it especially heavily for managing process groups. 
> One of the tasks that is impossible to perform via Nifi Toolkit currently is 
> deleting a process group. I added `delete-pg` command to our fork of Nifi, 
> but it would be nice to have it in the upstream, so that we can stay rebased 
> on upstream.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13930) PutAzureDataLakeStorage does not cause Azure to emit a FlushWithClose event on file write

2024-10-28 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13930?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13930:

Fix Version/s: 1.29.0

> PutAzureDataLakeStorage does not cause Azure to emit a FlushWithClose event 
> on file write
> -
>
> Key: NIFI-13930
> URL: https://issues.apache.org/jira/browse/NIFI-13930
> Project: Apache NiFi
>  Issue Type: Bug
>Affects Versions: 1.23.2
> Environment: amd64, Windows Server 2022, Java 21.0.3
>Reporter: Mark Ward
>Assignee: Peter Turcsanyi
>Priority: Minor
> Fix For: 2.0.0, 1.29.0
>
>  Time Spent: 40m
>  Remaining Estimate: 0h
>
> Hi,
> Note: I am raising this issue on Databrick's behalf, they've requested Jira 
> access and are currently awaiting approval.
> We use NiFi to write files to an Azure Storage account where our Databricks 
> workspace can ingest the files using an Azure Queue and Databrick's File 
> Notification feature, which then initiates a workflow/job.
> However, files are not being picked up in a timely manner by Databricks.
> We raised with Databricks and they've investigated, with the conclusion being 
> that NiFi's behaviour when completing the file write, and then subsequent 
> rename, does not emit and event type that would normally be expected.
> Please see Databricks's summary below for information:
> {quote} # Customer uses Apache Nifi 1.23.2, which performs the following 
> operations via the Azure API 
> ([src|https://github.com/apache/nifi/blob/rel/nifi-1.23.2/nifi-nar-bundles/nifi-azure-bundle/nifi-azure-processors/src/main/java/org/apache/nifi/processors/azure/storage/PutAzureDataLakeStorage.java#L149-L166])
>  ## Create a temp file using the [Path 
> Create|https://learn.microsoft.com/en-us/rest/api/storageservices/datalakestoragegen2/path/create?view=rest-storageservices-datalakestoragegen2-2019-12-12]
>  API. In this case Azure emits a 
> [BlobCreated|https://learn.microsoft.com/en-us/azure/event-grid/event-schema-blob-storage?toc=%2Fazure%2Fstorage%2Fblobs%2Ftoc.json&tabs=event-grid-event-schema#microsoftstorageblobcreated-event-data-lake-storage-gen2-1]
>  event with the {{api}} field set to {{CreateFile}} (which is purposefully 
> not processed by CSMS - 
> [source|https://github.com/databricks/universe/blob/fc4a34b61abe58fbe363cc55cdb67edd480f985e/jobs-cloud-storage-meta/src/cloud/azure/resourcemanagement/AqsEventGridResourceManagementClient.scala#L366]).
>  ## 
> [Append|https://github.com/Azure/azure-sdk-for-java/blob/main/sdk/storage/azure-storage-file-datalake/src/main/java/com/azure/storage/file/datalake/DataLakeFileClient.java#L656]
>  content to the file, there is no file event for this operation.
>  ## 
> [Flush|https://github.com/Azure/azure-sdk-for-java/blob/main/sdk/storage/azure-storage-file-datalake/src/main/java/com/azure/storage/file/datalake/DataLakeFileClient.java#L930]
>  the appended content file content. Nifi’s implementation flushes the file 
> without closing it 
> ([source|https://github.com/Azure/azure-sdk-for-java/blob/main/sdk/storage/azure-storage-file-datalake/src/main/java/com/azure/storage/file/datalake/DataLakeFileClient.java#L935]),
>  as a result Azure +doesn’t+ emit a {{FlushWithClose}} event (CSMS processes 
> this event type).
>  ## 
> [Rename|https://learn.microsoft.com/en-us/dotnet/api/azure.storage.files.datalake.datalakefileclient.rename?view=azure-dotnet]
>  the temp file to its final name, this generates a 
> [BlobRenamed|https://learn.microsoft.com/en-us/azure/event-grid/event-schema-blob-storage?toc=%2Fazure%2Fstorage%2Fblobs%2Ftoc.json&tabs=event-grid-event-schema#microsoftstorageblobrenamed-event-data-lake-storage-gen2-1]
>  that’s processed by CSMS (but ignored, see below).
>  # The behaviour observed by the customer is explained by:
>  ## When (1d) happens, CSMS gets the BlobRenamed event for a file for which 
> it doesn’t know the metadata about the source file. The BlobRenamed event 
> doesn’t contain all the information needed by CSMS (it misses the {{etag}} 
> and the {{{}blob size{}}}) and therefore [CSMS ignores the 
> event|https://github.com/databricks/universe/blob/master/jobs-cloud-storage-meta/src/storage/StorageHelper.scala#L600]
>  and no object is created.
>  ## When CSMS performs the daily full scan, it finds the renamed file and 
> creates an object for it in its database. This causes the file arrival 
> trigger to find the file and trigger a (delayed) run.{quote}



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13942) Improve failure message for uploaded NARs that fail install

2024-10-28 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13942?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13942:

Fix Version/s: 2.0.0
   Resolution: Fixed
   Status: Resolved  (was: Patch Available)

> Improve failure message for uploaded NARs that fail install
> ---
>
> Key: NIFI-13942
> URL: https://issues.apache.org/jira/browse/NIFI-13942
> Project: Apache NiFi
>  Issue Type: Improvement
>Affects Versions: 2.0.0-M4
>Reporter: Bryan Bende
>Assignee: Bryan Bende
>Priority: Major
> Fix For: 2.0.0
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> When an uploaded NAR fails to install, the message of the throwable is stored 
> as the failure message. For some throwabls, the message by itself is not 
> meaningful enough and would help to have to the class name of the throwable. 
> One example is a NoSuchMethodError where the message is just the name of the 
> method that is missing.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13939) Upgrade Logback to 1.5.12 and AWS SDK to 2.29.1 along with Spring Boot 3.3.5 and others

2024-10-28 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13939?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13939:

Summary: Upgrade Logback to 1.5.12 and AWS SDK to 2.29.1 along with Spring 
Boot 3.3.5 and others  (was: Bump key dependencies such as 
logback/aws/spring/and more)

> Upgrade Logback to 1.5.12 and AWS SDK to 2.29.1 along with Spring Boot 3.3.5 
> and others
> ---
>
> Key: NIFI-13939
> URL: https://issues.apache.org/jira/browse/NIFI-13939
> Project: Apache NiFi
>  Issue Type: Improvement
>Reporter: Joe Witt
>Assignee: Joe Witt
>Priority: Major
> Fix For: 2.0.0
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> ch.qos.logback1.5.11 1.5.12
> com.amazonaws 1.12.775 1.12.777
> com.github.luben  zstd-jni 1.5.6-6 1.5.6-7
> com.github.wnameless.json 0.17.0 0.17.1
> com.ibm.icu   icu4j 75.1 76.1
> com.nimbusds  nimbus-jose-jwt 9.41.2 9.42
> io.github.rburgst 3.1.0 3.1.1
> org.testcontainers 1.20.2 1.20.3
> software.amazon.awssdk 2.28.25 2.29.1
> com.hubspot.jackson   0.9.15 0.9.16
> com.slack.api 1.44.0 1.44.1
> com.zendesk/mysql-binlog-.. 0.29.2 0.30.1
> net.datafaker 2.4.0 2.4.1
> org.flywaydb 10.20.0 10.20.1
> org.mariadb.jdbc  3.4.1 3.5.0
> org.springframework.boot  3.3.4 3.3.5
> org.springframework.security.kerberos 1.0.1.RELEASE vs 2.1.1



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13941) Correct Maximum DNS Name Length for Generated Certificates

2024-10-28 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13941?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13941:

Status: Patch Available  (was: Open)

> Correct Maximum DNS Name Length for Generated Certificates
> --
>
> Key: NIFI-13941
> URL: https://issues.apache.org/jira/browse/NIFI-13941
> Project: Apache NiFi
>  Issue Type: Bug
>Reporter: David Handermann
>Assignee: David Handermann
>Priority: Major
> Fix For: 2.0.0
>
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> The {{nifi.web.proxy.host}} property provides optional DNS names for NiFi 
> running behind a reverse proxy or gateway, and the automated certificate 
> generation process considers property values when adding DNS Subject 
> Alternative Names.
> Recent updates to remove the optional port element set a maximum length of 64 
> characters for the entire DNS address, which is the limit for a label, but an 
> not the entire address according to [RFC 
> 1035|https://www.rfc-editor.org/rfc/rfc1035]. The length limitation should be 
> changed to 255 as described in RFC 1035 Section 2.3.4.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Created] (NIFI-13941) Correct Maximum DNS Name Length for Generated Certificates

2024-10-28 Thread David Handermann (Jira)
David Handermann created NIFI-13941:
---

 Summary: Correct Maximum DNS Name Length for Generated Certificates
 Key: NIFI-13941
 URL: https://issues.apache.org/jira/browse/NIFI-13941
 Project: Apache NiFi
  Issue Type: Bug
Reporter: David Handermann
Assignee: David Handermann
 Fix For: 2.0.0


The {{nifi.web.proxy.host}} property provides optional DNS names for NiFi 
running behind a reverse proxy or gateway, and the automated certificate 
generation process considers property values when adding DNS Subject 
Alternative Names.

Recent updates to remove the optional port element set a maximum length of 64 
characters for the entire DNS address, which is the limit for a label, but an 
not the entire address according to [RFC 
1035|https://www.rfc-editor.org/rfc/rfc1035]. The length limitation should be 
changed to 255 as described in RFC 1035 Section 2.3.4.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13937) NiFi CLI - Add command pg-empty-queues

2024-10-28 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13937?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13937:

Fix Version/s: 2.0.0
   Resolution: Fixed
   Status: Resolved  (was: Patch Available)

> NiFi CLI - Add command pg-empty-queues
> --
>
> Key: NIFI-13937
> URL: https://issues.apache.org/jira/browse/NIFI-13937
> Project: Apache NiFi
>  Issue Type: Improvement
>Reporter: Pierre Villard
>Assignee: Pierre Villard
>Priority: Major
> Fix For: 2.0.0
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> Add a command to the NiFi CLI to recursively empty all queues in a process 
> group.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13934) Remove Hive 3 Catalog Support from Iceberg NAR

2024-10-28 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13934?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13934:

Resolution: Abandoned
Status: Resolved  (was: Patch Available)

> Remove Hive 3 Catalog Support from Iceberg NAR
> --
>
> Key: NIFI-13934
> URL: https://issues.apache.org/jira/browse/NIFI-13934
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Extensions
>Reporter: David Handermann
>Assignee: David Handermann
>Priority: Major
>  Time Spent: 2h 10m
>  Remaining Estimate: 0h
>
> Apache Iceberg supports a [Hive Metastore 
> Catalog|https://iceberg.apache.org/docs/nightly/hive/] for both Hive 3 and 
> Hive 4. The Hive Catalog is part of Hive 4 itself.
> The Apache Hive project declared Hive 3 [end of 
> life|https://hive.apache.org/general/downloads/] on 8 October 2024, so that 
> version will not be receiving updates. As a result of these changes, Hive 3 
> support should be removed for NiFi integrations for the Iceberg Hive Catalog. 
> Removing existing support for Hive 3 will provide a cleaner foundation for 
> potential future integration with Hive 4, avoiding the potential security 
> issues related to an unsupported version of Hive.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Resolved] (NIFI-13544) Set Thread Executors to Concurrent Tasks configured in PublishGCPubSub

2024-10-28 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13544?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann resolved NIFI-13544.
-
Fix Version/s: 2.0.0
 Assignee: Pierre Villard
   Resolution: Fixed

> Set Thread Executors to Concurrent Tasks configured in PublishGCPubSub
> --
>
> Key: NIFI-13544
> URL: https://issues.apache.org/jira/browse/NIFI-13544
> Project: Apache NiFi
>  Issue Type: Improvement
>Affects Versions: 1.27.0
>Reporter: Paul-Adrien Cordonnier
>Assignee: Pierre Villard
>Priority: Major
> Fix For: 2.0.0
>
>  Time Spent: 50m
>  Remaining Estimate: 0h
>
> The GCP java-pubsub library has a default behaviour of creating a threadpool 
> of 5 threads per  processor on the machine. On a typical production server it 
> can be 200 threads per processor, mutliplied by the number of GCP publish 
> processor it can very well overwhelm a JVM.
> [Link to the gcp library 
> snippet|https://github.com/googleapis/java-pubsub/blob/4e17c34880d0498d2bd891ea7caa8fe095054016/google-cloud-pubsub/src/main/java/com/google/cloud/pubsub/v1/Publisher.java#L712-L716]
> Similar to whats its done with 
> [putkudu|https://github.com/apache/nifi/blob/support/nifi-1.x/nifi-nar-bundles/nifi-kudu-bundle/nifi-kudu-processors/src/main/java/org/apache/nifi/processors/kudu/AbstractKuduProcessor.java#L148].
>  I think we should be able to set the size of the threadpool as a property of 
> the processor. Default behaviour being the one in pubsub-library so that 
> there are no impact on performance after upgrading.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13544) Set Thread Executors to Concurrent Tasks configured in PublishGCPubSub

2024-10-28 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13544?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13544:

Summary: Set Thread Executors to Concurrent Tasks configured in 
PublishGCPubSub  (was: Add property to set the size of the threadpool of pubsub 
publish)

> Set Thread Executors to Concurrent Tasks configured in PublishGCPubSub
> --
>
> Key: NIFI-13544
> URL: https://issues.apache.org/jira/browse/NIFI-13544
> Project: Apache NiFi
>  Issue Type: Improvement
>Affects Versions: 1.27.0
>Reporter: Paul-Adrien Cordonnier
>Priority: Major
>  Time Spent: 50m
>  Remaining Estimate: 0h
>
> The GCP java-pubsub library has a default behaviour of creating a threadpool 
> of 5 threads per  processor on the machine. On a typical production server it 
> can be 200 threads per processor, mutliplied by the number of GCP publish 
> processor it can very well overwhelm a JVM.
> [Link to the gcp library 
> snippet|https://github.com/googleapis/java-pubsub/blob/4e17c34880d0498d2bd891ea7caa8fe095054016/google-cloud-pubsub/src/main/java/com/google/cloud/pubsub/v1/Publisher.java#L712-L716]
> Similar to whats its done with 
> [putkudu|https://github.com/apache/nifi/blob/support/nifi-1.x/nifi-nar-bundles/nifi-kudu-bundle/nifi-kudu-processors/src/main/java/org/apache/nifi/processors/kudu/AbstractKuduProcessor.java#L148].
>  I think we should be able to set the size of the threadpool as a property of 
> the processor. Default behaviour being the one in pubsub-library so that 
> there are no impact on performance after upgrading.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (NIFI-13934) Remove Hive 3 Catalog Support from Iceberg NAR

2024-10-28 Thread David Handermann (Jira)


[ 
https://issues.apache.org/jira/browse/NIFI-13934?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17893480#comment-17893480
 ] 

David Handermann commented on NIFI-13934:
-

Yes, NIFI-13938 removes all Iceberg components, including the Hive 3-based 
Catalog Service.

> Remove Hive 3 Catalog Support from Iceberg NAR
> --
>
> Key: NIFI-13934
> URL: https://issues.apache.org/jira/browse/NIFI-13934
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Extensions
>Reporter: David Handermann
>Assignee: David Handermann
>Priority: Major
>  Time Spent: 2h 10m
>  Remaining Estimate: 0h
>
> Apache Iceberg supports a [Hive Metastore 
> Catalog|https://iceberg.apache.org/docs/nightly/hive/] for both Hive 3 and 
> Hive 4. The Hive Catalog is part of Hive 4 itself.
> The Apache Hive project declared Hive 3 [end of 
> life|https://hive.apache.org/general/downloads/] on 8 October 2024, so that 
> version will not be receiving updates. As a result of these changes, Hive 3 
> support should be removed for NiFi integrations for the Iceberg Hive Catalog. 
> Removing existing support for Hive 3 will provide a cleaner foundation for 
> potential future integration with Hive 4, avoiding the potential security 
> issues related to an unsupported version of Hive.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13936) Remove GCP PubSub Lite components

2024-10-28 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13936?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13936:

Resolution: Fixed
Status: Resolved  (was: Patch Available)

> Remove GCP PubSub Lite components
> -
>
> Key: NIFI-13936
> URL: https://issues.apache.org/jira/browse/NIFI-13936
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Extensions
>Reporter: Pierre Villard
>Assignee: Pierre Villard
>Priority: Major
> Fix For: 2.0.0
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> Pub/Sub Lite is deprecated. Effective March 18, 2026, Pub/Sub Lite will be 
> turned down.
>  * Current customers: Pub/Sub Lite remains functional until March 18, 2026. 
> If you have not used Pub/Sub Lite within the 90-day period preceding 
> September 24, 2024 (June 26, 2024 - September 24, 2024), you won't be able to 
> access Pub/Sub Lite starting on September 24, 2024.
>  * New customers: Pub/Sub Lite is no longer available for new customers after 
> September 24, 2024.
> See - 
> [https://cloud.google.com/pubsub/lite/docs/migrate-pubsub-lite-to-pubsub]
> Given the upcoming 2.0 release, it's better to just remove the components. If 
> needed by someone, they can still download the NAR from 2.0-M4 to get these 
> specific processors.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Created] (NIFI-13938) Remove Iceberg Modules

2024-10-28 Thread David Handermann (Jira)
David Handermann created NIFI-13938:
---

 Summary: Remove Iceberg Modules
 Key: NIFI-13938
 URL: https://issues.apache.org/jira/browse/NIFI-13938
 Project: Apache NiFi
  Issue Type: Improvement
Reporter: David Handermann
Assignee: David Handermann
 Fix For: 2.0.0


Based on issues surrounding the Hive 3 end-of-life dependencies described in 
NIFI-13934, current Iceberg components should be removed.

The existing implementation includes tight coupling to Hive 3 and Hadoop 
dependencies along with support for Kerberos authentication. The class loading 
strategy motivated the current design, but as a result, requires tight coupling 
to existing dependencies.

Rather than selective removal of the Hive 3 Catalog Service from existing 
bundles, the current Iceberg components should be removed. Previous released 
versions such as 2.0.0-M4 remain available in Maven Central.

Removing the existing modules avoids coupling to Hive 3 and provides an 
opportunity for a different design.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13935) Remove HBase Processors and Services

2024-10-26 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13935?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13935:

Status: Patch Available  (was: Open)

> Remove HBase Processors and Services
> 
>
> Key: NIFI-13935
> URL: https://issues.apache.org/jira/browse/NIFI-13935
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Extensions
>Reporter: David Handermann
>Assignee: David Handermann
>Priority: Major
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> Apache HBase 2 has a direct dependency on Protobuf Java 2.5.0, which has 
> multiple known vulnerabilities related to potential resource exhaustion. 
> [HBase Protobuf 
> documentation|https://github.com/apache/hbase/blob/1e0884da4bdab6ba231333f55374df02200d1101/src/main/asciidoc/_chapters/protobuf.adoc]
>  describes changes to Protobuf dependencies for HBase 3, although HBase 3 is 
> still in beta at the time of this writing. Existing NiFi integration with 
> HBase 2 should be removed from the main branch to eliminate vulnerabilities 
> associated with Protobuf Java 2.5.0. Direct support for HBase could be 
> revisited with new versions of HBase.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Created] (NIFI-13935) Remove HBase Processors and Services

2024-10-26 Thread David Handermann (Jira)
David Handermann created NIFI-13935:
---

 Summary: Remove HBase Processors and Services
 Key: NIFI-13935
 URL: https://issues.apache.org/jira/browse/NIFI-13935
 Project: Apache NiFi
  Issue Type: Improvement
  Components: Extensions
Reporter: David Handermann
Assignee: David Handermann


Apache HBase 2 has a direct dependency on Protobuf Java 2.5.0, which has 
multiple known vulnerabilities related to potential resource exhaustion. [HBase 
Protobuf 
documentation|https://github.com/apache/hbase/blob/1e0884da4bdab6ba231333f55374df02200d1101/src/main/asciidoc/_chapters/protobuf.adoc]
 describes changes to Protobuf dependencies for HBase 3, although HBase 3 is 
still in beta at the time of this writing. Existing NiFi integration with HBase 
2 should be removed from the main branch to eliminate vulnerabilities 
associated with Protobuf Java 2.5.0. Direct support for HBase could be 
revisited with new versions of HBase.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (NIFI-13934) Remove Hive 3 Catalog Support from Iceberg NAR

2024-10-26 Thread David Handermann (Jira)


[ 
https://issues.apache.org/jira/browse/NIFI-13934?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17893155#comment-17893155
 ] 

David Handermann commented on NIFI-13934:
-

Thanks for noting the existing vulnerabilities [~joewitt], you are correct, 
libthrift 0.9.3 and protobuf-java 2.5.0 have several vulnerabilities, so 
removing Hive 3 removes these known vulnerabilities.

> Remove Hive 3 Catalog Support from Iceberg NAR
> --
>
> Key: NIFI-13934
> URL: https://issues.apache.org/jira/browse/NIFI-13934
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Extensions
>Reporter: David Handermann
>Assignee: David Handermann
>Priority: Major
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> Apache Iceberg supports a [Hive Metastore 
> Catalog|https://iceberg.apache.org/docs/nightly/hive/] for both Hive 3 and 
> Hive 4. The Hive Catalog is part of Hive 4 itself.
> The Apache Hive project declared Hive 3 [end of 
> life|https://hive.apache.org/general/downloads/] on 8 October 2024, so that 
> version will not be receiving updates. As a result of these changes, Hive 3 
> support should be removed for NiFi integrations for the Iceberg Hive Catalog. 
> Removing existing support for Hive 3 will provide a cleaner foundation for 
> potential future integration with Hive 4, avoiding the potential security 
> issues related to an unsupported version of Hive.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13934) Remove Hive 3 Catalog Support from Iceberg NAR

2024-10-26 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13934?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13934:

Status: Patch Available  (was: Open)

> Remove Hive 3 Catalog Support from Iceberg NAR
> --
>
> Key: NIFI-13934
> URL: https://issues.apache.org/jira/browse/NIFI-13934
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Extensions
>Reporter: David Handermann
>Assignee: David Handermann
>Priority: Major
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> Apache Iceberg supports a [Hive Metastore 
> Catalog|https://iceberg.apache.org/docs/nightly/hive/] for both Hive 3 and 
> Hive 4. The Hive Catalog is part of Hive 4 itself.
> The Apache Hive project declared Hive 3 [end of 
> life|https://hive.apache.org/general/downloads/] on 8 October 2024, so that 
> version will not be receiving updates. As a result of these changes, Hive 3 
> support should be removed for NiFi integrations for the Iceberg Hive Catalog. 
> Removing existing support for Hive 3 will provide a cleaner foundation for 
> potential future integration with Hive 4, avoiding the potential security 
> issues related to an unsupported version of Hive.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Created] (NIFI-13934) Remove Hive 3 Catalog Support from Iceberg NAR

2024-10-26 Thread David Handermann (Jira)
David Handermann created NIFI-13934:
---

 Summary: Remove Hive 3 Catalog Support from Iceberg NAR
 Key: NIFI-13934
 URL: https://issues.apache.org/jira/browse/NIFI-13934
 Project: Apache NiFi
  Issue Type: Improvement
  Components: Extensions
Reporter: David Handermann
Assignee: David Handermann


Apache Iceberg supports a [Hive Metastore 
Catalog|https://iceberg.apache.org/docs/nightly/hive/] for both Hive 3 and Hive 
4. The Hive Catalog is part of Hive 4 itself.

The Apache Hive project declared Hive 3 [end of 
life|https://hive.apache.org/general/downloads/] on 8 October 2024, so that 
version will not be receiving updates. As a result of these changes, Hive 3 
support should be removed for NiFi integrations for the Iceberg Hive Catalog. 
Removing existing support for Hive 3 will provide a cleaner foundation for 
potential future integration with Hive 4, avoiding the potential security 
issues related to an unsupported version of Hive.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Created] (NIFI-13933) Upgrade Spring Security to 6.3.4 and Address Dependency Check Findings

2024-10-26 Thread David Handermann (Jira)
David Handermann created NIFI-13933:
---

 Summary: Upgrade Spring Security to 6.3.4 and Address Dependency 
Check Findings
 Key: NIFI-13933
 URL: https://issues.apache.org/jira/browse/NIFI-13933
 Project: Apache NiFi
  Issue Type: Improvement
  Components: Core Framework
Reporter: David Handermann
Assignee: David Handermann


Spring Security dependencies should be upgraded to 6.3.4 to address findings 
for CVE-2024-38821. This vulnerability applies to WebFlux libraries that NiFi 
does not use.

In addition, recent Dependency Check Plugin reports include a number of false 
positives related to Azure Identity libraries. False positives should be 
suppressed and other impacted dependencies should be upgraded.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13724) NiFi Registry Events Include Additional Metadata

2024-10-26 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13724?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13724:

Summary: NiFi Registry Events Include Additional Metadata  (was: Nifi 
Registry Events Include Additional Metadata)

> NiFi Registry Events Include Additional Metadata
> 
>
> Key: NIFI-13724
> URL: https://issues.apache.org/jira/browse/NIFI-13724
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: NiFi Registry
>Reporter: Dye357
>Assignee: Dye357
>Priority: Minor
> Fix For: 2.0.0, 1.29.0
>
>  Time Spent: 1h 40m
>  Remaining Estimate: 0h
>
> Currently the Nifi Registry EventFactory adds a few pieces of metadata to the 
> EventType - when writing a custom extension for Nifi Registry a developer is 
> limited in the amount of information they have about the event – this ticket 
> would expand the scope of metadata included in each event to include the 
> Name, Description and Timestamps. 
> As a work-around we were using the nifi-registry-client to use the provided 
> IDs to enrich our dataset however we've run into problems:
> 1. The nifi registry client is broken when running inside an Nifi Registry 
> extension due to JavaX/Jakarta classpath issues. (Separate ticket)
> 2. This the most important of the two points – if we have a Bucket Deleted or 
> Flow Deleted event only having the ID is useless because we can no longer 
> query the API to get the name and description for the Entity in question 
> which has led to some auditing/accountability concerns. 
> I'm putting together a PR to include the additional specified metadata in the 
> EventFactory. The PR should be merge-able on 1.x and 2.x



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13929) Many duplicates for Provenance Events when running Stateless flow with multiple threads

2024-10-26 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13929?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13929:

Fix Version/s: 2.0.0
   Resolution: Fixed
   Status: Resolved  (was: Patch Available)

> Many duplicates for Provenance Events when running Stateless flow with 
> multiple threads
> ---
>
> Key: NIFI-13929
> URL: https://issues.apache.org/jira/browse/NIFI-13929
> Project: Apache NiFi
>  Issue Type: Bug
>  Components: Core Framework
>Reporter: Mark Payne
>Assignee: Mark Payne
>Priority: Critical
> Fix For: 2.0.0
>
> Attachments: events.png, flow.png
>
>  Time Spent: 40m
>  Remaining Estimate: 0h
>
> When running a flow using the Stateless Execution Engine, we see it making a 
> huge number of duplicates in the provenance repository. This results in poor 
> performance, as well as very incorrect Provenance.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13927) PublishGCPPubSub processor stop working and is stucked when using Record Oriented mode

2024-10-26 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13927?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13927:

Fix Version/s: 2.0.0
   Resolution: Fixed
   Status: Resolved  (was: Patch Available)

> PublishGCPPubSub processor stop working and is stucked when using Record 
> Oriented mode
> --
>
> Key: NIFI-13927
> URL: https://issues.apache.org/jira/browse/NIFI-13927
> Project: Apache NiFi
>  Issue Type: Bug
>  Components: Extensions
>Affects Versions: 1.26.0, 2.0.0-M4
>Reporter: Julien G.
>Assignee: Pierre Villard
>Priority: Major
> Fix For: 2.0.0
>
> Attachments: EXAMPLE.json, nifi.tdump
>
>  Time Spent: 1.5h
>  Remaining Estimate: 0h
>
> When using the PublishGCPPubSub processor with the Record Oriented mode the 
> processor will stay stucked. It won't processor any FlowFile. When the 
> processor is terminated the thread isn't released by the processor.
> It FlowFile Oriented mode, it works fine.
> It seems to be linked to how many records are in the FlowFile, becase when 
> having a single record in the FlowFile, it seems to have no issue (may be it 
> take more time to appear).
> But if you start to have more records in the FlowFile, it won't work. To make 
> the processor works again you either need to restart the node or removing and 
> recreating the processor. But it's temporary, because it some point it will 
> be stucked again. When stucked the processor won't be unstucked even after 
> days (we had a processor stucked for 3 days straight).
> You can find attached a thread dump when the processor was running and 
> stucked, and with ~10 threads not released . And you can also find an example 
> that will show the issue with a FlowFile of 500 records that instantly 
> stucked in the publish.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13724) Nifi Registry Events Include Additional Metadata

2024-10-26 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13724?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13724:

Fix Version/s: 1.29.0

> Nifi Registry Events Include Additional Metadata
> 
>
> Key: NIFI-13724
> URL: https://issues.apache.org/jira/browse/NIFI-13724
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: NiFi Registry
>Reporter: Dye357
>Assignee: Dye357
>Priority: Minor
> Fix For: 2.0.0, 1.29.0
>
>  Time Spent: 1h 40m
>  Remaining Estimate: 0h
>
> Currently the Nifi Registry EventFactory adds a few pieces of metadata to the 
> EventType - when writing a custom extension for Nifi Registry a developer is 
> limited in the amount of information they have about the event – this ticket 
> would expand the scope of metadata included in each event to include the 
> Name, Description and Timestamps. 
> As a work-around we were using the nifi-registry-client to use the provided 
> IDs to enrich our dataset however we've run into problems:
> 1. The nifi registry client is broken when running inside an Nifi Registry 
> extension due to JavaX/Jakarta classpath issues. (Separate ticket)
> 2. This the most important of the two points – if we have a Bucket Deleted or 
> Flow Deleted event only having the ID is useless because we can no longer 
> query the API to get the name and description for the Entity in question 
> which has led to some auditing/accountability concerns. 
> I'm putting together a PR to include the additional specified metadata in the 
> EventFactory. The PR should be merge-able on 1.x and 2.x



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13896) Improving TailFile performance

2024-10-26 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13896?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13896:

Fix Version/s: 1.29.0

> Improving TailFile performance
> --
>
> Key: NIFI-13896
> URL: https://issues.apache.org/jira/browse/NIFI-13896
> Project: Apache NiFi
>  Issue Type: Improvement
>Reporter: Lehel Boér
>Assignee: Lehel Boér
>Priority: Major
> Fix For: 2.0.0, 1.29.0
>
> Attachments: tailfile_test.png
>
>  Time Spent: 1h 20m
>  Remaining Estimate: 0h
>
> In case of tailing numerous files, the processor is slow because it 
> repeatedly loops over a large number of tailed files and performs several 
> expensive operations.
>  * In the {{OnTrigger}} method, a loop (loop 1) iterates over all tailed 
> files in the state object.
>  * Inside this loop, for each tailed file, the {{recoverRolledFiles}} method 
> is called (loop 2), which then leads to {{consumeFilesFully}} and finally 
> triggers {{{}cleanup{}}}.
>  * In the {{cleanup}} method, another loop (loop 3) iterates over all tailed 
> files in the state again.
>  * During the {{{}cleanup{}}}, {{persistState}} is invoked, which removes any 
> legacy state variables from the NiFi state. These legacy state variables 
> originate from NiFi 1.0, when support for "Multiple Tailed Files" was not 
> available, so state keys didn’t have the "file.x." prefix. As the {{cleanup}} 
> iterates over and persists each tailed file's state, the overall state size 
> grows (adding six entries per tailed file). This causes the legacy cleanup 
> loop to become progressively slower with each iteration as the number of 
> state entries grows.
> This can lead to hours of execution time.
>  
> Suggestion for improvement:
>  
>  * Moving out the loop that removes old state entries from cleanup. The 
> cleanup of old entries should be run on the startup instead.
> {code:java}
> for(String key : oldState.toMap().keySet()) {
> // These states are stored by older version of NiFi, and won't be used 
> anymore.
> // New states have 'file..' prefix.
> if (TailFileState.StateKeys.CHECKSUM.equals(key)
> || TailFileState.StateKeys.FILENAME.equals(key)
> || TailFileState.StateKeys.POSITION.equals(key)
> || TailFileState.StateKeys.TIMESTAMP.equals(key)) {
> getLogger().info("Removed state {}={} stored by older version of 
> NiFi.", new Object[]{key, oldState.get(key)});
> continue;
> }
> updatedState.put(key, oldState.get(key));
> } {code}



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13933) Upgrade Spring Security to 6.3.4 and Address Dependency Check Findings

2024-10-26 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13933?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13933:

Fix Version/s: 2.0.0

> Upgrade Spring Security to 6.3.4 and Address Dependency Check Findings
> --
>
> Key: NIFI-13933
> URL: https://issues.apache.org/jira/browse/NIFI-13933
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Core Framework
>Reporter: David Handermann
>Assignee: David Handermann
>Priority: Major
> Fix For: 2.0.0
>
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> Spring Security dependencies should be upgraded to 6.3.4 to address findings 
> for CVE-2024-38821. This vulnerability applies to WebFlux libraries that NiFi 
> does not use.
> In addition, recent Dependency Check Plugin reports include a number of false 
> positives related to Azure Identity libraries. False positives should be 
> suppressed and other impacted dependencies should be upgraded.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (NIFI-13933) Upgrade Spring Security to 6.3.4 and Address Dependency Check Findings

2024-10-26 Thread David Handermann (Jira)


 [ 
https://issues.apache.org/jira/browse/NIFI-13933?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

David Handermann updated NIFI-13933:

Status: Patch Available  (was: Open)

> Upgrade Spring Security to 6.3.4 and Address Dependency Check Findings
> --
>
> Key: NIFI-13933
> URL: https://issues.apache.org/jira/browse/NIFI-13933
> Project: Apache NiFi
>  Issue Type: Improvement
>  Components: Core Framework
>Reporter: David Handermann
>Assignee: David Handermann
>Priority: Major
> Fix For: 2.0.0
>
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> Spring Security dependencies should be upgraded to 6.3.4 to address findings 
> for CVE-2024-38821. This vulnerability applies to WebFlux libraries that NiFi 
> does not use.
> In addition, recent Dependency Check Plugin reports include a number of false 
> positives related to Azure Identity libraries. False positives should be 
> suppressed and other impacted dependencies should be upgraded.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


  1   2   3   4   5   6   7   8   9   10   >