diff --git a/openmetadata-docs/content/deployment/configuration.md b/openmetadata-docs/content/deployment/configuration.md index ac2c7724557..637626f3d51 100644 --- a/openmetadata-docs/content/deployment/configuration.md +++ b/openmetadata-docs/content/deployment/configuration.md @@ -9,7 +9,7 @@ This document describes OpenMetadata Server Configuration ```yaml swagger: - resourcePackage: org.openmetadata.service.resources + resourcePackage: org.openmetadata.catalog.resources server: @@ -26,7 +26,7 @@ server: logging: level: INFO loggers: - org.openmetadata.service.common: DEBUG + org.openmetadata.catalog.common: DEBUG io.swagger: ERROR appenders: - type: file @@ -54,7 +54,7 @@ elasticsearch: eventHandlerConfiguration: eventHandlerClassNames: - - "org.openmetadata.service.events.AuditEventHandler" + - "org.openmetadata.catalog.events.AuditEventHandler" health: delayedShutdownHandlerEnabled: true @@ -136,7 +136,7 @@ ElasticSearch running on the local machine. Please make sure you update it with ```yaml eventHandlerConfiguration: eventHandlerClassNames: - - "org.openmetadata.service.events.AuditEventHandler" + - "org.openmetadata.catalog.events.AuditEventHandler" ``` EventHandler configuration is optional. It will update the AuditLog in MySQL DB and also ElasticSearch indexes whenever diff --git a/openmetadata-docs/content/deployment/kubernetes/values.md b/openmetadata-docs/content/deployment/kubernetes/values.md index 25678ded253..d9f6b0a7297 100644 --- a/openmetadata-docs/content/deployment/kubernetes/values.md +++ b/openmetadata-docs/content/deployment/kubernetes/values.md @@ -20,8 +20,8 @@ This page list all the supported helm values for OpenMetadata Helm Charts. | global.authentication.clientId | string | `Empty String` | | global.authentication.callbackUrl | string | `Empty String` | | global.authentication.jwtPrincipalClaims | list | `[email,preferred_username,sub]` | -| global.authorizer.className | string | `org.openmetadata.service.security.NoopAuthorizer` | -| global.authorizer.containerRequestFilter | string | `org.openmetadata.service.security.NoopFilter` | +| global.authorizer.className | string | `org.openmetadata.catalog.security.NoopAuthorizer` | +| global.authorizer.containerRequestFilter | string | `org.openmetadata.catalog.security.NoopFilter` | | global.authorizer.enforcePrincipalDomain | bool | `false` | | global.authorizer.enableSecureSocketConnection | bool | `false` | | global.authorizer.initialAdmins | list | `[admin]` | diff --git a/openmetadata-docs/content/deployment/secrets-manager/how-to-add-a-new-implementation/index.md b/openmetadata-docs/content/deployment/secrets-manager/how-to-add-a-new-implementation/index.md index 946915c2145..ca919a29476 100644 --- a/openmetadata-docs/content/deployment/secrets-manager/how-to-add-a-new-implementation/index.md +++ b/openmetadata-docs/content/deployment/secrets-manager/how-to-add-a-new-implementation/index.md @@ -18,7 +18,7 @@ Create a new entry in the JSON schema definition of the Secrets Manager provider "title": "Secrets Manager Provider", "description": "OpenMetadata Secrets Manager Provider. Make sure to configure the same secrets manager providers as the ones configured on the OpenMetadata server.", "type": "string", - "javaType": "org.openmetadata.service.services.connections.metadata.SecretsManagerProvider", + "javaType": "org.openmetadata.catalog.services.connections.metadata.SecretsManagerProvider", "enum": ["noop", "aws", "aws-ssm", "awesome-sm"], "additionalProperties": false } diff --git a/openmetadata-docs/content/deployment/security/amazon-cognito-sso/bare-metal.md b/openmetadata-docs/content/deployment/security/amazon-cognito-sso/bare-metal.md index 8006a845dd0..73751e6b4d5 100644 --- a/openmetadata-docs/content/deployment/security/amazon-cognito-sso/bare-metal.md +++ b/openmetadata-docs/content/deployment/security/amazon-cognito-sso/bare-metal.md @@ -27,9 +27,9 @@ Then, ```yaml authorizerConfiguration: - className: "org.openmetadata.service.security.DefaultAuthorizer" + className: "org.openmetadata.catalog.security.DefaultAuthorizer" # JWT Filter - containerRequestFilter: "org.openmetadata.service.security.JwtFilter" + containerRequestFilter: "org.openmetadata.catalog.security.JwtFilter" adminPrincipals: - "user1" - "user2" diff --git a/openmetadata-docs/content/deployment/security/amazon-cognito-sso/docker.md b/openmetadata-docs/content/deployment/security/amazon-cognito-sso/docker.md index 82146611421..79888e6d4c2 100644 --- a/openmetadata-docs/content/deployment/security/amazon-cognito-sso/docker.md +++ b/openmetadata-docs/content/deployment/security/amazon-cognito-sso/docker.md @@ -14,8 +14,8 @@ generated when setting up the account in the previous steps. ```bash # OpenMetadata Server Authentication Configuration -AUTHORIZER_CLASS_NAME=org.openmetadata.service.security.DefaultAuthorizer -AUTHORIZER_REQUEST_FILTER=org.openmetadata.service.security.JwtFilter +AUTHORIZER_CLASS_NAME=org.openmetadata.catalog.security.DefaultAuthorizer +AUTHORIZER_REQUEST_FILTER=org.openmetadata.catalog.security.JwtFilter AUTHORIZER_ADMIN_PRINCIPALS=[admin] # Your `name` from name@domain.com AUTHORIZER_INGESTION_PRINCIPALS=[ingestion-bot] AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain diff --git a/openmetadata-docs/content/deployment/security/amazon-cognito-sso/kubernetes.md b/openmetadata-docs/content/deployment/security/amazon-cognito-sso/kubernetes.md index 39a573b25ee..7f5d976126c 100644 --- a/openmetadata-docs/content/deployment/security/amazon-cognito-sso/kubernetes.md +++ b/openmetadata-docs/content/deployment/security/amazon-cognito-sso/kubernetes.md @@ -13,8 +13,8 @@ place the client id value and update the authorizer configurations in the `value ```yaml global: authorizer: - className: "org.openmetadata.service.security.DefaultAuthorizer" - containerRequestFilter: "org.openmetadata.service.security.JwtFilter" + className: "org.openmetadata.catalog.security.DefaultAuthorizer" + containerRequestFilter: "org.openmetadata.catalog.security.JwtFilter" initialAdmins: - "user1" - "user2" diff --git a/openmetadata-docs/content/deployment/security/auth0/bare-metal.md b/openmetadata-docs/content/deployment/security/auth0/bare-metal.md index 5268886203f..7a79bcfc352 100644 --- a/openmetadata-docs/content/deployment/security/auth0/bare-metal.md +++ b/openmetadata-docs/content/deployment/security/auth0/bare-metal.md @@ -25,9 +25,9 @@ Then, ```yaml authorizerConfiguration: - className: "org.openmetadata.service.security.DefaultAuthorizer" + className: "org.openmetadata.catalog.security.DefaultAuthorizer" # JWT Filter - containerRequestFilter: "org.openmetadata.service.security.JwtFilter" + containerRequestFilter: "org.openmetadata.catalog.security.JwtFilter" adminPrincipals: - "user1" - "user2" diff --git a/openmetadata-docs/content/deployment/security/auth0/docker.md b/openmetadata-docs/content/deployment/security/auth0/docker.md index 4fe729df7d6..ea7bb65f92b 100644 --- a/openmetadata-docs/content/deployment/security/auth0/docker.md +++ b/openmetadata-docs/content/deployment/security/auth0/docker.md @@ -14,8 +14,8 @@ generated when setting up the account. ```shell # OpenMetadata Server Authentication Configuration -AUTHORIZER_CLASS_NAME=org.openmetadata.service.security.DefaultAuthorizer -AUTHORIZER_REQUEST_FILTER=org.openmetadata.service.security.JwtFilter +AUTHORIZER_CLASS_NAME=org.openmetadata.catalog.security.DefaultAuthorizer +AUTHORIZER_REQUEST_FILTER=org.openmetadata.catalog.security.JwtFilter AUTHORIZER_ADMIN_PRINCIPALS=[admin] # Your `name` from name@domain.com AUTHORIZER_INGESTION_PRINCIPALS=[ingestion-bot] AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain diff --git a/openmetadata-docs/content/deployment/security/auth0/kubernetes.md b/openmetadata-docs/content/deployment/security/auth0/kubernetes.md index 6fa07e19902..fb10bfec235 100644 --- a/openmetadata-docs/content/deployment/security/auth0/kubernetes.md +++ b/openmetadata-docs/content/deployment/security/auth0/kubernetes.md @@ -13,8 +13,8 @@ place the client id value and update the authorizer configurations in the `value ```yaml global: authorizer: - className: "org.openmetadata.service.security.DefaultAuthorizer" - containerRequestFilter: "org.openmetadata.service.security.JwtFilter" + className: "org.openmetadata.catalog.security.DefaultAuthorizer" + containerRequestFilter: "org.openmetadata.catalog.security.JwtFilter" initialAdmins: - "suresh" botPrincipals: diff --git a/openmetadata-docs/content/deployment/security/azure/bare-metal.md b/openmetadata-docs/content/deployment/security/azure/bare-metal.md index c75ec275d14..b02e3dfe54e 100644 --- a/openmetadata-docs/content/deployment/security/azure/bare-metal.md +++ b/openmetadata-docs/content/deployment/security/azure/bare-metal.md @@ -25,9 +25,9 @@ Then, ```yaml authorizerConfiguration: - className: "org.openmetadata.service.security.DefaultAuthorizer" + className: "org.openmetadata.catalog.security.DefaultAuthorizer" # JWT Filter - containerRequestFilter: "org.openmetadata.service.security.JwtFilter" + containerRequestFilter: "org.openmetadata.catalog.security.JwtFilter" adminPrincipals: - "user1" - "user2" diff --git a/openmetadata-docs/content/deployment/security/azure/docker.md b/openmetadata-docs/content/deployment/security/azure/docker.md index c5cef41f53b..cb8268cc390 100644 --- a/openmetadata-docs/content/deployment/security/azure/docker.md +++ b/openmetadata-docs/content/deployment/security/azure/docker.md @@ -14,8 +14,8 @@ generated when setting up the account. ```shell # OpenMetadata Server Authentication Configuration -AUTHORIZER_CLASS_NAME=org.openmetadata.service.security.DefaultAuthorizer -AUTHORIZER_REQUEST_FILTER=org.openmetadata.service.security.JwtFilter +AUTHORIZER_CLASS_NAME=org.openmetadata.catalog.security.DefaultAuthorizer +AUTHORIZER_REQUEST_FILTER=org.openmetadata.catalog.security.JwtFilter AUTHORIZER_ADMIN_PRINCIPALS=[admin] # Your `name` from name@domain.com AUTHORIZER_INGESTION_PRINCIPALS=[ingestion-bot] AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain diff --git a/openmetadata-docs/content/deployment/security/azure/kubernetes.md b/openmetadata-docs/content/deployment/security/azure/kubernetes.md index 12c04cf0085..c035db2e873 100644 --- a/openmetadata-docs/content/deployment/security/azure/kubernetes.md +++ b/openmetadata-docs/content/deployment/security/azure/kubernetes.md @@ -13,8 +13,8 @@ place the client id value and update the authorizer configurations in the `value ```yaml global: authorizer: - className: "org.openmetadata.service.security.DefaultAuthorizer" - containerRequestFilter: "org.openmetadata.service.security.JwtFilter" + className: "org.openmetadata.catalog.security.DefaultAuthorizer" + containerRequestFilter: "org.openmetadata.catalog.security.JwtFilter" initialAdmins: - "user1" - "user2" diff --git a/openmetadata-docs/content/deployment/security/custom-oidc/bare-metal.md b/openmetadata-docs/content/deployment/security/custom-oidc/bare-metal.md index 148e1cbcd8e..ccbaeecca57 100644 --- a/openmetadata-docs/content/deployment/security/custom-oidc/bare-metal.md +++ b/openmetadata-docs/content/deployment/security/custom-oidc/bare-metal.md @@ -30,9 +30,9 @@ Then, ```yaml authorizerConfiguration: - className: "org.openmetadata.service.security.DefaultAuthorizer" + className: "org.openmetadata.catalog.security.DefaultAuthorizer" # JWT Filter - containerRequestFilter: "org.openmetadata.service.security.JwtFilter" + containerRequestFilter: "org.openmetadata.catalog.security.JwtFilter" adminPrincipals: - "user1" - "user2" diff --git a/openmetadata-docs/content/deployment/security/custom-oidc/docker.md b/openmetadata-docs/content/deployment/security/custom-oidc/docker.md index 4e25e7e23af..76555629e65 100644 --- a/openmetadata-docs/content/deployment/security/custom-oidc/docker.md +++ b/openmetadata-docs/content/deployment/security/custom-oidc/docker.md @@ -14,8 +14,8 @@ generated when setting up the account. ```shell # OpenMetadata Server Authentication Configuration -AUTHORIZER_CLASS_NAME=org.openmetadata.service.security.DefaultAuthorizer -AUTHORIZER_REQUEST_FILTER=org.openmetadata.service.security.JwtFilter +AUTHORIZER_CLASS_NAME=org.openmetadata.catalog.security.DefaultAuthorizer +AUTHORIZER_REQUEST_FILTER=org.openmetadata.catalog.security.JwtFilter AUTHORIZER_ADMIN_PRINCIPALS=[admin] # Your `name` from name@domain.com AUTHORIZER_INGESTION_PRINCIPALS=[ingestion-bot] AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain diff --git a/openmetadata-docs/content/deployment/security/custom-oidc/kubernetes.md b/openmetadata-docs/content/deployment/security/custom-oidc/kubernetes.md index aabd036e860..ffd55bb5441 100644 --- a/openmetadata-docs/content/deployment/security/custom-oidc/kubernetes.md +++ b/openmetadata-docs/content/deployment/security/custom-oidc/kubernetes.md @@ -13,8 +13,8 @@ place the client id value and update the authorizer configurations in the `value ```yaml global: authorizer: - className: "org.openmetadata.service.security.DefaultAuthorizer" - containerRequestFilter: "org.openmetadata.service.security.JwtFilter" + className: "org.openmetadata.catalog.security.DefaultAuthorizer" + containerRequestFilter: "org.openmetadata.catalog.security.JwtFilter" initialAdmins: - "user1" - "user2" diff --git a/openmetadata-docs/content/deployment/security/google/bare-metal.md b/openmetadata-docs/content/deployment/security/google/bare-metal.md index 99056060499..b96a717127f 100644 --- a/openmetadata-docs/content/deployment/security/google/bare-metal.md +++ b/openmetadata-docs/content/deployment/security/google/bare-metal.md @@ -25,9 +25,9 @@ Then, ```yaml authorizerConfiguration: - className: "org.openmetadata.service.security.DefaultAuthorizer" + className: "org.openmetadata.catalog.security.DefaultAuthorizer" # JWT Filter - containerRequestFilter: "org.openmetadata.service.security.JwtFilter" + containerRequestFilter: "org.openmetadata.catalog.security.JwtFilter" adminPrincipals: - "user1" - "user2" diff --git a/openmetadata-docs/content/deployment/security/google/docker.md b/openmetadata-docs/content/deployment/security/google/docker.md index c6afa30c179..a6a5bb8f3ad 100644 --- a/openmetadata-docs/content/deployment/security/google/docker.md +++ b/openmetadata-docs/content/deployment/security/google/docker.md @@ -14,8 +14,8 @@ generated when setting up the account in the previous steps. ```bash # OpenMetadata Server Authentication Configuration -AUTHORIZER_CLASS_NAME=org.openmetadata.service.security.DefaultAuthorizer -AUTHORIZER_REQUEST_FILTER=org.openmetadata.service.security.JwtFilter +AUTHORIZER_CLASS_NAME=org.openmetadata.catalog.security.DefaultAuthorizer +AUTHORIZER_REQUEST_FILTER=org.openmetadata.catalog.security.JwtFilter AUTHORIZER_ADMIN_PRINCIPALS=[admin] # Your `name` from name@domain.com AUTHORIZER_INGESTION_PRINCIPALS=[ingestion-bot] AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain diff --git a/openmetadata-docs/content/deployment/security/google/kubernetes.md b/openmetadata-docs/content/deployment/security/google/kubernetes.md index 6c0713119f5..2514919af93 100644 --- a/openmetadata-docs/content/deployment/security/google/kubernetes.md +++ b/openmetadata-docs/content/deployment/security/google/kubernetes.md @@ -13,8 +13,8 @@ place the client id value and update the authorizer configurations in the `value ```yaml global: authorizer: - className: "org.openmetadata.service.security.DefaultAuthorizer" - containerRequestFilter: "org.openmetadata.service.security.JwtFilter" + className: "org.openmetadata.catalog.security.DefaultAuthorizer" + containerRequestFilter: "org.openmetadata.catalog.security.JwtFilter" initialAdmins: - "user1" - "user2" diff --git a/openmetadata-docs/content/deployment/security/keycloak/bare-metal.md b/openmetadata-docs/content/deployment/security/keycloak/bare-metal.md index e39b551165c..2a3a5e3300b 100644 --- a/openmetadata-docs/content/deployment/security/keycloak/bare-metal.md +++ b/openmetadata-docs/content/deployment/security/keycloak/bare-metal.md @@ -31,9 +31,9 @@ Then, ```yaml authorizerConfiguration: - className: "org.openmetadata.service.security.DefaultAuthorizer" + className: "org.openmetadata.catalog.security.DefaultAuthorizer" # JWT Filter - containerRequestFilter: "org.openmetadata.service.security.JwtFilter" + containerRequestFilter: "org.openmetadata.catalog.security.JwtFilter" adminPrincipals: - "admin-user" botPrincipals: diff --git a/openmetadata-docs/content/deployment/security/keycloak/docker.md b/openmetadata-docs/content/deployment/security/keycloak/docker.md index 38da1ffff66..f42c9c077df 100644 --- a/openmetadata-docs/content/deployment/security/keycloak/docker.md +++ b/openmetadata-docs/content/deployment/security/keycloak/docker.md @@ -16,8 +16,8 @@ The configuration below already uses the presets shown in the example of keycloa ```shell # OpenMetadata Server Authentication Configuration -AUTHORIZER_CLASS_NAME=org.openmetadata.service.security.DefaultAuthorizer -AUTHORIZER_REQUEST_FILTER=org.openmetadata.service.security.JwtFilter +AUTHORIZER_CLASS_NAME=org.openmetadata.catalog.security.DefaultAuthorizer +AUTHORIZER_REQUEST_FILTER=org.openmetadata.catalog.security.JwtFilter AUTHORIZER_ADMIN_PRINCIPALS=[admin-user] # Your `name` from name@domain.com AUTHORIZER_INGESTION_PRINCIPALS=[ingestion-bot,service-account-open-metadata] AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain diff --git a/openmetadata-docs/content/deployment/security/keycloak/kubernetes.md b/openmetadata-docs/content/deployment/security/keycloak/kubernetes.md index eb3b6c4c824..46e250d0cc6 100644 --- a/openmetadata-docs/content/deployment/security/keycloak/kubernetes.md +++ b/openmetadata-docs/content/deployment/security/keycloak/kubernetes.md @@ -20,8 +20,8 @@ The configuration below already uses the presets shown in the example of keycloa ```yaml global: authorizer: - className: "org.openmetadata.service.security.DefaultAuthorizer" - containerRequestFilter: "org.openmetadata.service.security.JwtFilter" + className: "org.openmetadata.catalog.security.DefaultAuthorizer" + containerRequestFilter: "org.openmetadata.catalog.security.JwtFilter" initialAdmins: - "admin-user" botPrincipals: diff --git a/openmetadata-docs/content/deployment/security/okta/bare-metal.md b/openmetadata-docs/content/deployment/security/okta/bare-metal.md index b4254c7205f..eb9c5884799 100644 --- a/openmetadata-docs/content/deployment/security/okta/bare-metal.md +++ b/openmetadata-docs/content/deployment/security/okta/bare-metal.md @@ -26,9 +26,9 @@ Then, ```yaml authorizerConfiguration: - className: "org.openmetadata.service.security.DefaultAuthorizer" + className: "org.openmetadata.catalog.security.DefaultAuthorizer" # JWT Filter - containerRequestFilter: "org.openmetadata.service.security.JwtFilter" + containerRequestFilter: "org.openmetadata.catalog.security.JwtFilter" adminPrincipals: - "user1" - "user2" diff --git a/openmetadata-docs/content/deployment/security/okta/docker.md b/openmetadata-docs/content/deployment/security/okta/docker.md index 9707d1f255a..9516c0a0836 100644 --- a/openmetadata-docs/content/deployment/security/okta/docker.md +++ b/openmetadata-docs/content/deployment/security/okta/docker.md @@ -16,8 +16,8 @@ Note: Make sure to add the Ingestion Client ID for the Service application in `A ```shell # OpenMetadata Server Authentication Configuration -AUTHORIZER_CLASS_NAME=org.openmetadata.service.security.DefaultAuthorizer -AUTHORIZER_REQUEST_FILTER=org.openmetadata.service.security.JwtFilter +AUTHORIZER_CLASS_NAME=org.openmetadata.catalog.security.DefaultAuthorizer +AUTHORIZER_REQUEST_FILTER=org.openmetadata.catalog.security.JwtFilter AUTHORIZER_ADMIN_PRINCIPALS=[admin] # Your `name` from name@domain.com AUTHORIZER_INGESTION_PRINCIPALS=[ingestion-bot, ] AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain diff --git a/openmetadata-docs/content/deployment/security/okta/kubernetes.md b/openmetadata-docs/content/deployment/security/okta/kubernetes.md index 9fbd5711487..eac077c6ad2 100644 --- a/openmetadata-docs/content/deployment/security/okta/kubernetes.md +++ b/openmetadata-docs/content/deployment/security/okta/kubernetes.md @@ -15,8 +15,8 @@ Note: Make sure to add the Ingestion Client ID for the Service application in `b ```yaml global: authorizer: - className: "org.openmetadata.service.security.DefaultAuthorizer" - containerRequestFilter: "org.openmetadata.service.security.JwtFilter" + className: "org.openmetadata.catalog.security.DefaultAuthorizer" + containerRequestFilter: "org.openmetadata.catalog.security.JwtFilter" initialAdmins: - "user1" - "user2" diff --git a/openmetadata-docs/content/deployment/security/one-login/bare-metal.md b/openmetadata-docs/content/deployment/security/one-login/bare-metal.md index 4a4ad91179d..b74c3cc42d3 100644 --- a/openmetadata-docs/content/deployment/security/one-login/bare-metal.md +++ b/openmetadata-docs/content/deployment/security/one-login/bare-metal.md @@ -30,9 +30,9 @@ Then, ```yaml authorizerConfiguration: - className: "org.openmetadata.service.security.DefaultAuthorizer" + className: "org.openmetadata.catalog.security.DefaultAuthorizer" # JWT Filter - containerRequestFilter: "org.openmetadata.service.security.JwtFilter" + containerRequestFilter: "org.openmetadata.catalog.security.JwtFilter" adminPrincipals: - "user1" - "user2" diff --git a/openmetadata-docs/content/deployment/security/one-login/docker.md b/openmetadata-docs/content/deployment/security/one-login/docker.md index f42ebef4663..f9466c329c2 100644 --- a/openmetadata-docs/content/deployment/security/one-login/docker.md +++ b/openmetadata-docs/content/deployment/security/one-login/docker.md @@ -14,8 +14,8 @@ generated when setting up the account. ```shell # OpenMetadata Server Authentication Configuration -AUTHORIZER_CLASS_NAME=org.openmetadata.service.security.DefaultAuthorizer -AUTHORIZER_REQUEST_FILTER=org.openmetadata.service.security.JwtFilter +AUTHORIZER_CLASS_NAME=org.openmetadata.catalog.security.DefaultAuthorizer +AUTHORIZER_REQUEST_FILTER=org.openmetadata.catalog.security.JwtFilter AUTHORIZER_ADMIN_PRINCIPALS=[admin] # Your `name` from name@domain.com AUTHORIZER_INGESTION_PRINCIPALS=[ingestion-bot] AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain diff --git a/openmetadata-docs/content/deployment/security/one-login/kubernetes.md b/openmetadata-docs/content/deployment/security/one-login/kubernetes.md index bbedcb746b1..65ca46dca55 100644 --- a/openmetadata-docs/content/deployment/security/one-login/kubernetes.md +++ b/openmetadata-docs/content/deployment/security/one-login/kubernetes.md @@ -13,9 +13,9 @@ place the client id value and update the authorizer configurations in the `value ```yaml global: authorizer: - className: "org.openmetadata.service.security.DefaultAuthorizer" + className: "org.openmetadata.catalog.security.DefaultAuthorizer" # JWT Filter - containerRequestFilter: "org.openmetadata.service.security.JwtFilter" + containerRequestFilter: "org.openmetadata.catalog.security.JwtFilter" initialAdmins: - "suresh" botPrincipals: diff --git a/openmetadata-docs/content/deployment/upgrade/kubernetes.md b/openmetadata-docs/content/deployment/upgrade/kubernetes.md index 1002e712477..41a7909fd82 100644 --- a/openmetadata-docs/content/deployment/upgrade/kubernetes.md +++ b/openmetadata-docs/content/deployment/upgrade/kubernetes.md @@ -95,7 +95,7 @@ release is backward incompatible. ```commandline [I/O dispatcher 1] DEBUG org.apache.http.impl.nio.client.InternalIODispatch - http-outgoing-0 [ACTIVE] [content length: 263; pos: 263; completed: true] [main] DEBUG org.elasticsearch.client.RestClient - request [PUT http://elasticsearch:9200/glossary_search_index/_mapping?master_timeout=30s&ignore_unavailable=false&expand_wildcards=open%2Cclosed&allow_no_indices=false&ignore_throttled=false&timeout=30s] returned [HTTP/1.1 400 Bad Request] -[main] ERROR org.openmetadata.service.elasticsearch.ElasticSearchIndexDefinition - Failed to update Elastic Search indexes due to +[main] ERROR org.openmetadata.catalog.elasticsearch.ElasticSearchIndexDefinition - Failed to update Elastic Search indexes due to org.elasticsearch.ElasticsearchStatusException: Elasticsearch exception [type=illegal_argument_exception, reason=can't merge a non object mapping [owner] with an object mapping] at org.elasticsearch.rest.BytesRestResponse.errorFromXContent(BytesRestResponse.java:176) at org.elasticsearch.client.RestHighLevelClient.parseEntity(RestHighLevelClient.java:1933) @@ -104,10 +104,10 @@ org.elasticsearch.ElasticsearchStatusException: Elasticsearch exception [type=il at org.elasticsearch.client.RestHighLevelClient.performRequest(RestHighLevelClient.java:1639) at org.elasticsearch.client.RestHighLevelClient.performRequestAndParseEntity(RestHighLevelClient.java:1606) at org.elasticsearch.client.IndicesClient.putMapping(IndicesClient.java:342) - at org.openmetadata.service.elasticsearch.ElasticSearchIndexDefinition.updateIndex(ElasticSearchIndexDefinition.java:139) - at org.openmetadata.service.elasticsearch.ElasticSearchIndexDefinition.updateIndexes(ElasticSearchIndexDefinition.java:91) - at org.openmetadata.service.util.TablesInitializer.execute(TablesInitializer.java:227) - at org.openmetadata.service.util.TablesInitializer.main(TablesInitializer.java:149) + at org.openmetadata.catalog.elasticsearch.ElasticSearchIndexDefinition.updateIndex(ElasticSearchIndexDefinition.java:139) + at org.openmetadata.catalog.elasticsearch.ElasticSearchIndexDefinition.updateIndexes(ElasticSearchIndexDefinition.java:91) + at org.openmetadata.catalog.util.TablesInitializer.execute(TablesInitializer.java:227) + at org.openmetadata.catalog.util.TablesInitializer.main(TablesInitializer.java:149) Suppressed: org.elasticsearch.client.ResponseException: method [PUT], host [http://elasticsearch:9200], URI [/glossary_search_index/_mapping?master_timeout=30s&ignore_unavailable=false&expand_wildcards=open%2Cclosed&allow_no_indices=false&ignore_throttled=false&timeout=30s], status line [HTTP/1.1 400 Bad Request] {"error":{"root_cause":[{"type":"illegal_argument_exception","reason":"can't merge a non object mapping [owner] with an object mapping"}],"type":"illegal_argument_exception","reason":"can't merge a non object mapping [owner] with an object mapping"},"status":400} at org.elasticsearch.client.RestClient.convertResponse(RestClient.java:326)