This is an automated email from the ASF dual-hosted git repository.
uranusjr pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/airflow.git
The following commit(s) were added to refs/heads/main by this push:
new f21e641193 Fix typos in image documentation (#37714)
f21e641193 is described below
commit f21e641193ce559b42ddc64585ee4e1a9c15799c
Author: Jarek Potiuk <[email protected]>
AuthorDate: Mon Feb 26 17:43:28 2024 +0100
Fix typos in image documentation (#37714)
---
docs/docker-stack/index.rst | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/docs/docker-stack/index.rst b/docs/docker-stack/index.rst
index 38f2b11cb3..80f899aca9 100644
--- a/docs/docker-stack/index.rst
+++ b/docs/docker-stack/index.rst
@@ -120,7 +120,7 @@ including the need to provide reproducible scenarios and
submitting ONE issue pe
vulnerabilities in one email - those are rejected immediately, as they make
the process of handling the issue
way harder for everyone, including the reporters.
-Also DO NOT open aa GitHub Issue with the scan results and asking what to do.
The GitHub Issues are for
+Also DO NOT open a GitHub Issue with the scan results and asking what to do.
The GitHub Issues are for
reporting bugs and feature requests to Airflow itself, not for asking for help
with the security scans on
3rd party components.
@@ -156,7 +156,7 @@ You have four options:
vulnerability, it does not mean that it can be exploited in Airflow (or
specifically in the way you are
using Airflow). If you do have a reproducible scenario how a vulnerability
can be exploited in Airflow, you should -
of course - privately report it to the security team. But if you do not
have reproducible
- scenario, please make a research and try to understand the impact of the
vulnerability on Airflow. That
+ scenario, please do some research and try to understand the impact of the
vulnerability on Airflow. That
research might result in a public GitHub Discussion where you can discuss
the impact of the
vulnerability if you research will indicate Airflow might not be impacted
or private security email if
you find a reproducible scenario on how to exploit it.
@@ -175,7 +175,7 @@ security researchers to help the community to understand
the impact of the vulne
could be a fantastic contribution to the community and way to give back to the
project that your company uses
for free.
-You are free to discuss it publicly, open a `Github Discussion
<https://github.com/apache/airflow/discussions>`_
+You are free to discuss it publicly, open a `GitHub Discussion
<https://github.com/apache/airflow/discussions>`_
mentioning your findings and research you've done so far. Ideally (as a way to
contribute to Airflow) you
should explain the findings of your own security team in your company to help
to research and understand
the impact of the vulnerability on Airflow (and your way of using it).