knox-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From lmc...@apache.org
Subject svn commit: r1803686 [2/2] - in /knox: site/ site/books/knox-0-10-0/ site/books/knox-0-11-0/ site/books/knox-0-12-0/ site/books/knox-0-13-0/ site/books/knox-0-4-0/ site/books/knox-0-5-0/ site/books/knox-0-6-0/ site/books/knox-0-7-0/ site/books/knox-0-8...
Date Tue, 01 Aug 2017 18:56:33 GMT
Modified: knox/site/license.html
URL: http://svn.apache.org/viewvc/knox/site/license.html?rev=1803686&r1=1803685&r2=1803686&view=diff
==============================================================================
--- knox/site/license.html (original)
+++ knox/site/license.html Tue Aug  1 18:56:32 2017
@@ -1,13 +1,13 @@
 <!DOCTYPE html>
 <!--
- | Generated by Apache Maven Doxia at 2017-07-11
+ | Generated by Apache Maven Doxia at 2017-08-01
  | Rendered using Apache Maven Fluido Skin 1.3.0
 -->
 <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <head>
     <meta charset="UTF-8" />
     <meta name="viewport" content="width=device-width, initial-scale=1.0" />
-    <meta name="Date-Revision-yyyymmdd" content="20170711" />
+    <meta name="Date-Revision-yyyymmdd" content="20170801" />
     <meta http-equiv="Content-Language" content="en" />
     <title>Knox Gateway &#x2013; Project License</title>
     <link rel="stylesheet" href="./css/apache-maven-fluido-1.3.0.min.css" />
@@ -58,7 +58,7 @@
               
                 
                     
-                  <li id="publishDate" class="pull-right">Last Published: 2017-07-11</li>

+                  <li id="publishDate" class="pull-right">Last Published: 2017-08-01</li>

             
                             </ul>
       </div>

Modified: knox/site/mail-lists.html
URL: http://svn.apache.org/viewvc/knox/site/mail-lists.html?rev=1803686&r1=1803685&r2=1803686&view=diff
==============================================================================
--- knox/site/mail-lists.html (original)
+++ knox/site/mail-lists.html Tue Aug  1 18:56:32 2017
@@ -1,13 +1,13 @@
 <!DOCTYPE html>
 <!--
- | Generated by Apache Maven Doxia at 2017-07-11
+ | Generated by Apache Maven Doxia at 2017-08-01
  | Rendered using Apache Maven Fluido Skin 1.3.0
 -->
 <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <head>
     <meta charset="UTF-8" />
     <meta name="viewport" content="width=device-width, initial-scale=1.0" />
-    <meta name="Date-Revision-yyyymmdd" content="20170711" />
+    <meta name="Date-Revision-yyyymmdd" content="20170801" />
     <meta http-equiv="Content-Language" content="en" />
     <title>Knox Gateway &#x2013; Project Mailing Lists</title>
     <link rel="stylesheet" href="./css/apache-maven-fluido-1.3.0.min.css" />
@@ -58,7 +58,7 @@
               
                 
                     
-                  <li id="publishDate" class="pull-right">Last Published: 2017-07-11</li>

+                  <li id="publishDate" class="pull-right">Last Published: 2017-08-01</li>

             
                             </ul>
       </div>

Modified: knox/site/project-info.html
URL: http://svn.apache.org/viewvc/knox/site/project-info.html?rev=1803686&r1=1803685&r2=1803686&view=diff
==============================================================================
--- knox/site/project-info.html (original)
+++ knox/site/project-info.html Tue Aug  1 18:56:32 2017
@@ -1,13 +1,13 @@
 <!DOCTYPE html>
 <!--
- | Generated by Apache Maven Doxia at 2017-07-11
+ | Generated by Apache Maven Doxia at 2017-08-01
  | Rendered using Apache Maven Fluido Skin 1.3.0
 -->
 <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <head>
     <meta charset="UTF-8" />
     <meta name="viewport" content="width=device-width, initial-scale=1.0" />
-    <meta name="Date-Revision-yyyymmdd" content="20170711" />
+    <meta name="Date-Revision-yyyymmdd" content="20170801" />
     <meta http-equiv="Content-Language" content="en" />
     <title>Knox Gateway &#x2013; Project Information</title>
     <link rel="stylesheet" href="./css/apache-maven-fluido-1.3.0.min.css" />
@@ -58,7 +58,7 @@
               
                 
                     
-                  <li id="publishDate" class="pull-right">Last Published: 2017-07-11</li>

+                  <li id="publishDate" class="pull-right">Last Published: 2017-08-01</li>

             
                             </ul>
       </div>

Modified: knox/site/team-list.html
URL: http://svn.apache.org/viewvc/knox/site/team-list.html?rev=1803686&r1=1803685&r2=1803686&view=diff
==============================================================================
--- knox/site/team-list.html (original)
+++ knox/site/team-list.html Tue Aug  1 18:56:32 2017
@@ -1,13 +1,13 @@
 <!DOCTYPE html>
 <!--
- | Generated by Apache Maven Doxia at 2017-07-11
+ | Generated by Apache Maven Doxia at 2017-08-01
  | Rendered using Apache Maven Fluido Skin 1.3.0
 -->
 <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <head>
     <meta charset="UTF-8" />
     <meta name="viewport" content="width=device-width, initial-scale=1.0" />
-    <meta name="Date-Revision-yyyymmdd" content="20170711" />
+    <meta name="Date-Revision-yyyymmdd" content="20170801" />
     <meta http-equiv="Content-Language" content="en" />
     <title>Knox Gateway &#x2013; Team list</title>
     <link rel="stylesheet" href="./css/apache-maven-fluido-1.3.0.min.css" />
@@ -58,7 +58,7 @@
               
                 
                     
-                  <li id="publishDate" class="pull-right">Last Published: 2017-07-11</li>

+                  <li id="publishDate" class="pull-right">Last Published: 2017-08-01</li>

             
                             </ul>
       </div>

Modified: knox/trunk/books/0.13.0/book_gateway-details.md
URL: http://svn.apache.org/viewvc/knox/trunk/books/0.13.0/book_gateway-details.md?rev=1803686&r1=1803685&r2=1803686&view=diff
==============================================================================
--- knox/trunk/books/0.13.0/book_gateway-details.md (original)
+++ knox/trunk/books/0.13.0/book_gateway-details.md Tue Aug  1 18:56:32 2017
@@ -29,7 +29,7 @@ The gateway functions much like a revers
 As such, it maintains a mapping of URLs that are exposed externally by the gateway to URLs
that are provided by the Hadoop cluster.
 
 #### Default Topology URLs #####
-In order to provide compatibility with the Hadoop java client and existing CLI tools, the
Knox Gateway has provided a feature called the Default Topology. This refers to a topology
deployment that will be able to route URLs without the additional context that the gateway
uses for differentiating from one Hadoop cluster to another. This allows the URLs to match
those used by existing clients for that may access webhdfs through the Hadoop file system
abstraction.
+In order to provide compatibility with the Hadoop java client and existing CLI tools, the
Knox Gateway has provided a feature called the Default Topology. This refers to a topology
deployment that will be able to route URLs without the additional context that the gateway
uses for differentiating from one Hadoop cluster to another. This allows the URLs to match
those used by existing clients that may access webhdfs through the Hadoop file system abstraction.
 
 When a topology file is deployed with a file name that matches the configured default topology
name, a specialized mapping for URLs is installed for that particular topology. This allows
the URLs that are expected by the existing Hadoop CLIs for webhdfs to be used in interacting
with the specific Hadoop cluster that is represented by the default topology file.
 

Modified: knox/trunk/books/0.13.0/book_getting-started.md
URL: http://svn.apache.org/viewvc/knox/trunk/books/0.13.0/book_getting-started.md?rev=1803686&r1=1803685&r2=1803686&view=diff
==============================================================================
--- knox/trunk/books/0.13.0/book_getting-started.md (original)
+++ knox/trunk/books/0.13.0/book_getting-started.md Tue Aug  1 18:56:32 2017
@@ -42,7 +42,7 @@ All of the instructions and samples prov
 
 Knox can be installed by expanding the zip/archive file.
 
-The table below provides a brief explanation of the important files and directories within
`{GATEWWAY_HOME}`
+The table below provides a brief explanation of the important files and directories within
`{GATEWAY_HOME}`
 
 | Directory                | Purpose |
 | ------------------------ | ------- |

Modified: knox/trunk/books/0.13.0/book_service-details.md
URL: http://svn.apache.org/viewvc/knox/trunk/books/0.13.0/book_service-details.md?rev=1803686&r1=1803685&r2=1803686&view=diff
==============================================================================
--- knox/trunk/books/0.13.0/book_service-details.md (original)
+++ knox/trunk/books/0.13.0/book_service-details.md Tue Aug  1 18:56:32 2017
@@ -17,11 +17,11 @@
 
 ## Service Details ##
 
-In the sections that follow the integrations currently available out of the box with the
gateway will be described.
+In the sections that follow, the integrations currently available out of the box with the
gateway will be described.
 In general these sections will include examples that demonstrate how to access each of these
services via the gateway.
 In many cases this will include both the use of [cURL][curl] as a REST API client as well
as the use of the Knox Client DSL.
 You may notice that there are some minor differences between using the REST API of a given
service via the gateway.
-In general this is necessary in order to achieve the goal of leaking internal Hadoop cluster
details to the client.
+In general this is necessary in order to achieve the goal of not leaking internal Hadoop
cluster details to the client.
 
 Keep in mind that the gateway uses a plugin model for supporting Hadoop services.
 Check back with the [Apache Knox][site] site for the latest news on plugin availability.
@@ -54,9 +54,9 @@ These examples are optional but to try t
 
 ### Customization
 
-Using these samples with other Hadoop installations will require changes to the steps describe
here as well as changes to referenced sample scripts.
+Using these samples with other Hadoop installations will require changes to the steps described
here as well as changes to referenced sample scripts.
 This will also likely require changes to the gateway's default configuration.
-In particular host names, ports user names and password may need to be changed to match your
environment.
+In particular host names, ports, user names and password may need to be changed to match
your environment.
 These changes may need to be made to gateway configuration and also the Groovy sample script
files in the distribution.
 All of the values that may need to be customized in the sample scripts can be found together
at the top of each of these files.
 

Modified: knox/trunk/books/0.13.0/book_ui_service_details.md
URL: http://svn.apache.org/viewvc/knox/trunk/books/0.13.0/book_ui_service_details.md?rev=1803686&r1=1803685&r2=1803686&view=diff
==============================================================================
--- knox/trunk/books/0.13.0/book_ui_service_details.md (original)
+++ knox/trunk/books/0.13.0/book_ui_service_details.md Tue Aug  1 18:56:32 2017
@@ -17,7 +17,7 @@
 
 ## UI Service Details ##
 
-In the sections that follow the integrations for proxying various UIs currently available
out of the box with the
+In the sections that follow, the integrations for proxying various UIs currently available
out of the box with the
 gateway will be described. These sections will include examples that demonstrate how to access
each of these services
 via the gateway.
 
@@ -72,7 +72,7 @@ In addition to the service configuration
     </service>
 
 By default the gateway is configured to use the HTTP endpoint for WebHDFS in the Sandbox.
-This could alternatively be configured to use the HTTPS endpoint by provided the correct
address.
+This could alternatively be configured to use the HTTPS endpoint by providing the correct
address.
 
 #### Name Node UI URL Mapping ####
 
@@ -335,4 +335,4 @@ through authentication challenge and cre
         </service>
     </topology>
     
-    
\ No newline at end of file
+    

Modified: knox/trunk/books/0.13.0/config.md
URL: http://svn.apache.org/viewvc/knox/trunk/books/0.13.0/config.md?rev=1803686&r1=1803685&r2=1803686&view=diff
==============================================================================
--- knox/trunk/books/0.13.0/config.md (original)
+++ knox/trunk/books/0.13.0/config.md Tue Aug  1 18:56:32 2017
@@ -195,12 +195,12 @@ The general outline of a provider elemen
 /topology/gateway/provider/role
 : Defines the role of a particular provider.
 There are a number of pre-defined roles used by out-of-the-box provider plugins for the gateway.
-These roles are: authentication, identity-assertion, authentication, rewrite and hostmap
+These roles are: authentication, identity-assertion, rewrite and hostmap
 
 /topology/gateway/provider/name
 : Defines the name of the provider for which this configuration applies.
 There can be multiple provider implementations for a given role.
-Specifying the name is used identify which particular provider is being configured.
+Specifying the name is used to identify which particular provider is being configured.
 Typically each topology descriptor should contain only one provider for each role but there
are exceptions.
 
 /topology/gateway/provider/enabled
@@ -241,7 +241,7 @@ topology/service/url
 
 #### Hostmap Provider ####
 
-The purpose of the Hostmap provider is to handle situations where host are known by one name
within the cluster and another name externally.
+The purpose of the Hostmap provider is to handle situations where hosts are known by one
name within the cluster and another name externally.
 This frequently occurs when virtual machines are used and in particular when using cloud
hosting services.
 Currently, the Hostmap provider is configured as part of the topology file.
 The basic structure is shown below.
@@ -343,7 +343,7 @@ topology/gateway/provider/param
 : Host mapping is configured by providing parameters for each external to internal mapping.
 
 topology/gateway/provider/param/name
-: The parameter names represent an external host names associated with the internal host
names provided by the value element.
+: The parameter names represent the external host names associated with the internal host
names provided by the value element.
 This can be a comma separated list of host names that all represent the same physical host.
 When mapping from internal to external host name the first external host name in the list
is used.
 
@@ -377,11 +377,11 @@ We do make some provisions in order to p
 
 It is encrypted with AES 128 bit encryption and where possible the file permissions are set
to only be accessible by the user that the gateway is running as.
 
-After persisting the secret, ensure that the file at config/security/master has the appropriate
permissions set for your environment.
+After persisting the secret, ensure that the file at data/security/master has the appropriate
permissions set for your environment.
 This is probably the most important layer of defense for master secret.
-Do not assume that the encryption if sufficient protection.
+Do not assume that the encryption is sufficient protection.
 
-A specific user should be created to run the gateway this user will be the only user with
permissions for the persisted master file.
+A specific user should be created to run the gateway. This user will be the only user with
permissions for the persisted master file.
 
 See the Knox CLI section for descriptions of the command line utilities related to the master
secret.
 
@@ -411,7 +411,7 @@ Upon deployment of a Hadoop cluster topo
 1. Look for a credential store for the topology. For instance, we have a sample topology
that gets deployed out of the box.  We look for `data/security/keystores/sandbox-credentials.jceks`.
This topology specific credential store is used for storing secrets/passwords that are used
for encrypting sensitive data with topology specific keys.
     * If no credential store is found for the topology being deployed then one is created
for it.
       Population of the aliases is delegated to the configured providers within the system
that will require the use of a  secret for a particular task.
-      They may programmatic set the value of the secret or choose to have the value for the
specified alias generated through the AliasService.
+      They may programmatically set the value of the secret or choose to have the value for
the specified alias generated through the AliasService.
     * If a credential store is found then we ensure that it can be loaded with the provided
master secret and the configured providers have the opportunity to ensure that the aliases
are populated and if not to populate them.
 
 By leveraging the algorithm described above we can provide a window of opportunity for management
of these artifacts in a number of ways.
@@ -474,7 +474,7 @@ You may have to adjust according to your
 
 General steps:
 
-1. Stop Knox gateway and back up all files in `{GATEWWAY_HOME}/data/security/keystores`
+1. Stop Knox gateway and back up all files in `{GATEWAY_HOME}/data/security/keystores`
 
         gateway.sh stop
 
@@ -484,7 +484,7 @@ General steps:
         
 3. Create identity keystore gateway.jks. cert in alias gateway-identity  
 
-        cd {GATEWWAY_HOME}/data/security/keystore  
+        cd {GATEWAY_HOME}/data/security/keystore  
         keytool -genkeypair -alias gateway-identity -keyalg RSA -keysize 1024 -dname "CN=$fqdn_knox,OU=hdp,O=sdge"
-keypass $keypass -keystore gateway.jks -storepass $master-key -validity 300  
 
     NOTE: `$fqdn_knox` is the hostname of the Knox host. Some may choose `$keypass` to be
the same as `$master-key`.
@@ -537,4 +537,4 @@ Once you have created these keystores yo
 
 NOTE: the SSL certificate will need special consideration depending on the type of certificate.
Wildcard certs may be able to be shared across all gateway instances in a cluster.
 When certs are dedicated to specific machines the gateway identity store will not be able
to be blindly replicated as host name verification problems will ensue.
-Obviously, trust-stores will need to be taken into account as well.
\ No newline at end of file
+Obviously, trust-stores will need to be taken into account as well.

Modified: knox/trunk/books/0.13.0/config_authn.md
URL: http://svn.apache.org/viewvc/knox/trunk/books/0.13.0/config_authn.md?rev=1803686&r1=1803685&r2=1803686&view=diff
==============================================================================
--- knox/trunk/books/0.13.0/config_authn.md (original)
+++ knox/trunk/books/0.13.0/config_authn.md Tue Aug  1 18:56:32 2017
@@ -96,7 +96,7 @@ This happens to be the way that we are c
 
 This section discusses the LDAP configuration used above for the Shiro Provider. Some of
these configuration elements will need to be customized to reflect your deployment environment.
 
-**main.ldapRealm** - this element indicates the fully qualified class name of the Shiro realm
to be used in authenticating the user. The class name provided by default in the sample is
the `org.apache.shiro.realm.ldap.JndiLdapRealm` this implementation provides us with the ability
to authenticate but by default has authorization disabled. In order to provide authorization
- which is seen by Shiro as dependent on an LDAP schema that is specific to each organization
- an extension of JndiLdapRealm is generally used to override and implement the doGetAuhtorizationInfo
method. In this particular release we are providing a simple authorization provider that can
be used along with the Shiro authentication provider.
+**main.ldapRealm** - this element indicates the fully qualified class name of the Shiro realm
to be used in authenticating the user. The class name provided by default in the sample is
the `org.apache.shiro.realm.ldap.JndiLdapRealm` this implementation provides us with the ability
to authenticate but by default has authorization disabled. In order to provide authorization
- which is seen by Shiro as dependent on an LDAP schema that is specific to each organization
- an extension of JndiLdapRealm is generally used to override and implement the doGetAuthorizationInfo
method. In this particular release we are providing a simple authorization provider that can
be used along with the Shiro authentication provider.
 
 **main.ldapRealm.userDnTemplate** - in order to bind a simple username to an LDAP server
that generally requires a full distinguished name (DN), we must provide the template into
which the simple username will be inserted. This template allows for the creation of a DN
by injecting the simple username into the common name (CN) portion of the DN. **This element
will need to be customized to reflect your deployment environment.** The template provided
in the sample is only an example and is valid only within the LDAP schema distributed with
Knox and is represented by the users.ldif file in the `{GATEWAY_HOME}/conf` directory.
 
@@ -136,7 +136,7 @@ Knox maps each cluster topology to a web
 
 To configure session idle timeout for the topology, please specify value of parameter sessionTimeout
for ShiroProvider in your topology file. If you do not specify the value for this parameter,
it defaults to 30 minutes.
 
-The definition would look like the following in the topoloogy file:
+The definition would look like the following in the topology file:
 
     ...
     <provider>
@@ -156,4 +156,4 @@ The definition would look like the follo
     <provider>
     ...
 
-At present, ShiroProvider in Knox leverages JavaEE session to maintain authentication state
for a user across requests using JSESSIONID cookie. So, a client that authenticated with Knox
could pass the JSESSIONID cookie with repeated requests as long as the session has not timed
out instead of submitting userid/password with every request. Presenting a valid session cookie
in place of userid/password would also perform better as additional credential store lookups
are avoided.
\ No newline at end of file
+At present, ShiroProvider in Knox leverages JavaEE session to maintain authentication state
for a user across requests using JSESSIONID cookie. So, a client that authenticated with Knox
could pass the JSESSIONID cookie with repeated requests as long as the session has not timed
out instead of submitting userid/password with every request. Presenting a valid session cookie
in place of userid/password would also perform better as additional credential store lookups
are avoided.

Modified: knox/trunk/books/0.13.0/config_id_assertion.md
URL: http://svn.apache.org/viewvc/knox/trunk/books/0.13.0/config_id_assertion.md?rev=1803686&r1=1803685&r2=1803686&view=diff
==============================================================================
--- knox/trunk/books/0.13.0/config_id_assertion.md (original)
+++ knox/trunk/books/0.13.0/config_id_assertion.md Tue Aug  1 18:56:32 2017
@@ -206,7 +206,7 @@ The 'role' for this provider is 'identit
 ### Configuration ###
 
 All the configuration for 'HadoopGroupProvider' resides in the provider section in a gateway
topology file.
-The 'hadoop.security.group.mapping' property determines the implementation. Some of the valid
implementation are as follows 
+The 'hadoop.security.group.mapping' property determines the implementation. Some of the valid
implementations are as follows 
 #### org.apache.hadoop.security.JniBasedUnixGroupsMappingWithFallback
 
 This is the default implementation and will be picked up if 'hadoop.security.group.mapping'
is not specified. This implementation will determine if the Java Native Interface (JNI) is
available. If JNI is available, the implementation will use the API within Hadoop to resolve
a list of groups for a user. If JNI is not available then the shell implementation, org.apache.hadoop.security.ShellBasedUnixGroupsMapping,
is used, which shells out with the 'bash -c groups' command (for a Linux/Unix environment)
or the 'net group' command (for a Windows environment) to resolve a list of groups for a user.

Modified: knox/trunk/books/0.13.0/config_webappsec_provider.md
URL: http://svn.apache.org/viewvc/knox/trunk/books/0.13.0/config_webappsec_provider.md?rev=1803686&r1=1803685&r2=1803686&view=diff
==============================================================================
--- knox/trunk/books/0.13.0/config_webappsec_provider.md (original)
+++ knox/trunk/books/0.13.0/config_webappsec_provider.md Tue Aug  1 18:56:32 2017
@@ -95,7 +95,7 @@ cors.tagRequests             | {true\|fa
 
 ##### X-Frame-Options
 
-Cross Frame Scripting and Clickjacking are attackes that can be prevented by controlling
the ability for a third-party to embed an application or resource within a Frame, IFrame or
Object html element. This can be done adding the X-Frame-Options HTTP header to responses.
+Cross Frame Scripting and Clickjacking are attacks that can be prevented by controlling the
ability for a third-party to embed an application or resource within a Frame, IFrame or Object
html element. This can be done adding the X-Frame-Options HTTP header to responses.
 
 ###### Config
 

Modified: knox/trunk/books/0.13.0/service_hive.md
URL: http://svn.apache.org/viewvc/knox/trunk/books/0.13.0/service_hive.md?rev=1803686&r1=1803685&r2=1803686&view=diff
==============================================================================
--- knox/trunk/books/0.13.0/service_hive.md (original)
+++ knox/trunk/books/0.13.0/service_hive.md Tue Aug  1 18:56:32 2017
@@ -74,7 +74,7 @@ This guide provides detailed examples fo
      1. Hive JDBC in HTTP mode depends on following minimal libraries set to run successfully(must
be in the classpath):
          * hive-jdbc-0.14.0-standalone.jar;
          * commons-logging-1.1.3.jar;
-     2. Connection URL has to be following: `jdbc:hive2://{gateway-host}:{gateway-port}/;ssl=true;sslTrustStore={gateway-trust-store-path};trustStorePassword={gateway-trust-store-password};transportMode=http;httpPath={gateway-path}/{cluster-name}/hive`
+     2. Connection URL has to be the following: `jdbc:hive2://{gateway-host}:{gateway-port}/;ssl=true;sslTrustStore={gateway-trust-store-path};trustStorePassword={gateway-trust-store-password};transportMode=http;httpPath={gateway-path}/{cluster-name}/hive`
      3. Look at https://cwiki.apache.org/confluence/display/Hive/GettingStarted#GettingStarted-DDLOperations
for examples.
        Hint: For testing it would be better to execute `set hive.security.authorization.enabled=false`
as the first statement.
        Hint: Good examples of Hive DDL/DML can be found here http://gettingstarted.hadooponazure.com/hw/hive.html
@@ -176,7 +176,7 @@ Sample example for creating new table, l
 
 ###### Groovy ######
 
-Make sure that `{GATEWAY_HOME/ext}` directory contains following libraries for successful
execution:
+Make sure that `{GATEWAY_HOME/ext}` directory contains the following libraries for successful
execution:
 
 - hive-jdbc-0.14.0-standalone.jar;
 - commons-logging-1.1.3.jar;

Modified: knox/trunk/books/0.13.0/service_webhcat.md
URL: http://svn.apache.org/viewvc/knox/trunk/books/0.13.0/service_webhcat.md?rev=1803686&r1=1803685&r2=1803686&view=diff
==============================================================================
--- knox/trunk/books/0.13.0/service_webhcat.md (original)
+++ knox/trunk/books/0.13.0/service_webhcat.md Tue Aug  1 18:56:32 2017
@@ -58,11 +58,11 @@ The values in this sample are configured
 
 The URLs provided for the role NAMENODE and JOBTRACKER do not result in an endpoint being
exposed by the gateway.
 This information is only required so that other URLs can be rewritten that reference the
appropriate RPC address for Hadoop services.
-This prevents clients from needed to be aware of the internal cluster details.
+This prevents clients from needing to be aware of the internal cluster details.
 Note that for Hadoop 2 the JOBTRACKER RPC endpoint is provided by the Resource Manager component.
 
 By default the gateway is configured to use the HTTP endpoint for WebHCat in the Sandbox.
-This could alternatively be configured to use the HTTPS endpoint by provided the correct
address.
+This could alternatively be configured to use the HTTPS endpoint by providing the correct
address.
 
 #### WebHCat URL Mapping ####
 
@@ -75,7 +75,7 @@ For WebHCat URLs, the mapping of Knox Ga
 
 #### WebHCat via cURL
 
-Use can use cURL to directly invoke the REST APIs via the gateway. For the full list of available
REST calls look at the WebHCat documentation. This is a simple curl command to test the connection:
+Users can use cURL to directly invoke the REST APIs via the gateway. For the full list of
available REST calls look at the WebHCat documentation. This is a simple curl command to test
the connection:
 
     curl -i -k -u guest:guest-password 'https://localhost:8443/gateway/sandbox/templeton/v1/status'
 

Modified: knox/trunk/books/0.13.0/service_webhdfs.md
URL: http://svn.apache.org/viewvc/knox/trunk/books/0.13.0/service_webhdfs.md?rev=1803686&r1=1803685&r2=1803686&view=diff
==============================================================================
--- knox/trunk/books/0.13.0/service_webhdfs.md (original)
+++ knox/trunk/books/0.13.0/service_webhdfs.md Tue Aug  1 18:56:32 2017
@@ -56,10 +56,10 @@ The values in this sample are configured
 
 The URL provided for the role NAMENODE does not result in an endpoint being exposed by the
gateway.
 This information is only required so that other URLs can be rewritten that reference the
Name Node's RPC address.
-This prevents clients from needed to be aware of the internal cluster details.
+This prevents clients from needing to be aware of the internal cluster details.
 
 By default the gateway is configured to use the HTTP endpoint for WebHDFS in the Sandbox.
-This could alternatively be configured to use the HTTPS endpoint by provided the correct
address.
+This could alternatively be configured to use the HTTPS endpoint by providing the correct
address.
 
 #### WebHDFS URL Mapping ####
 
@@ -80,7 +80,7 @@ A WebHDFS request to the NameNode to ret
 Note that this URL contains the network location of a DataNode.
 The gateway will rewrite this URL to look like the URL below.
 
-    https://{gateway-host}:{gateway-port}/{gateway-path}/{custer-name}/webhdfs/data/v1/{path}?_={encrypted-query-parameters}
+    https://{gateway-host}:{gateway-port}/{gateway-path}/{cluster-name}/webhdfs/data/v1/{path}?_={encrypted-query-parameters}
 
 The `{encrypted-query-parameters}` will contain the `{datanode-host}` and `{datanode-port}`
information.
 This information along with the original query parameters are encrypted so that the internal
Hadoop details are protected.
@@ -141,7 +141,7 @@ This is provided as an example to illust
 
 ##### WebHDFS via cURL
 
-Use can use cURL to directly invoke the REST APIs via the gateway.
+Users can use cURL to directly invoke the REST APIs via the gateway.
 
 ###### Optionally cleanup the sample directory in case a previous example was run without
cleaning up.
 

Modified: knox/trunk/books/0.13.0/websocket-support.md
URL: http://svn.apache.org/viewvc/knox/trunk/books/0.13.0/websocket-support.md?rev=1803686&r1=1803685&r2=1803686&view=diff
==============================================================================
--- knox/trunk/books/0.13.0/websocket-support.md (original)
+++ knox/trunk/books/0.13.0/websocket-support.md Tue Aug  1 18:56:32 2017
@@ -19,7 +19,7 @@
 
 ### Introduction
 
-Websocket is a communication protocol that allows full duplex communication over single TCP
connection.
+Websocket is a communication protocol that allows full duplex communication over a single
TCP connection.
 Knox provides out-of-the-box support for websocket protocol, currently only text messages
are supported.
 
 ### Configuration ###



Mime
View raw message