This is an automated email from the ASF dual-hosted git repository.

github-bot pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/dolphinscheduler-website.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new b0d3aaaeab Automated deployment: 
2b675b4f31a7e4f616eaf98fa0d69baa94ccac25
b0d3aaaeab is described below

commit b0d3aaaeabdc8ed4e1a747bcf391f265865bbb6c
Author: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
AuthorDate: Thu Oct 17 05:06:21 2024 +0000

    Automated deployment: 2b675b4f31a7e4f616eaf98fa0d69baa94ccac25
---
 data/doc/en-us.json                                |  13 +-
 data/doc/zh-cn.json                                |  13 +-
 fetch/doc/en-us/dev.json                           |  10 +
 fetch/doc/zh-cn/dev.json                           |  10 +
 .../en-us/dev/contribute/join/security-model.json  | 229 +++++++++++++++++++++
 pages/doc/en-us/dev/contribute/join/security.json  |  10 +-
 .../zh-cn/dev/contribute/join/security-model.json  | 229 +++++++++++++++++++++
 pages/doc/zh-cn/dev/contribute/join/security.json  |  10 +-
 python/2.0.5/.buildinfo                            |   2 +-
 python/2.0.6/.buildinfo                            |   2 +-
 python/2.0.7/.buildinfo                            |   2 +-
 python/3.0.0/.buildinfo                            |   2 +-
 python/3.0.1/.buildinfo                            |   2 +-
 python/3.1.0/.buildinfo                            |   2 +-
 python/4.0.0/.buildinfo                            |   2 +-
 python/4.0.1/.buildinfo                            |   2 +-
 python/4.0.2/.buildinfo                            |   2 +-
 python/4.0.3/.buildinfo                            |   2 +-
 python/4.0.4/.buildinfo                            |   2 +-
 python/main/.buildinfo                             |   2 +-
 20 files changed, 530 insertions(+), 18 deletions(-)

diff --git a/data/doc/en-us.json b/data/doc/en-us.json
index ef3f78f51e..8d636aa5fd 100644
--- a/data/doc/en-us.json
+++ b/data/doc/en-us.json
@@ -35772,7 +35772,18 @@
     ]
   },
   {
-    "content": "Security\nThe Apache Software Foundation takes a rigorous 
stance on eliminating security issues in its software projects. Apache 
DolphinScheduler is also very concerned Security issues related to its features 
and functionality.\nIf you have apprehensions regarding DolphinScheduler’s 
security or you discover vulnerability or potential threat, don’t hesitate to 
get in touch with the Apache Security Team by dropping a mail at 
[email protected]. Please specify the project n [...]
+    "content": "Apache DolphinScheduler Security Model\nThis document is 
mainly used to describe the scope of work, responsibilities and key functions 
of users with different roles. By introducing user permissions and functions, 
it helps users understand the precautions and rules in the deployment, use, 
operation and maintenance stages. Developers can use this document to 
understand the boundaries between security vulnerabilities and normal 
functions.\nApache DolphinScheduler Workflow\nF [...]
+    "version": "dev",
+    "link": "/contribute/join/security-model",
+    "title": "Apache DolphinScheduler Security Model",
+    "location": [
+      "Contribution",
+      "Join",
+      "Security model"
+    ]
+  },
+  {
+    "content": "Security\nThe Apache Software Foundation takes a rigorous 
stance on eliminating security issues in its software projects. Apache 
DolphinScheduler is also very concerned Security issues related to its features 
and functionality.\nIf you have apprehensions regarding DolphinScheduler’s 
security or you discover vulnerability or potential threat, don’t hesitate to 
get in touch with the Apache Security Team by dropping a mail at 
[email protected]. Please specify the project n [...]
     "version": "dev",
     "link": "/contribute/join/security",
     "title": "Security",
diff --git a/data/doc/zh-cn.json b/data/doc/zh-cn.json
index 7be91fd1a3..90b18078ab 100644
--- a/data/doc/zh-cn.json
+++ b/data/doc/zh-cn.json
@@ -31524,7 +31524,18 @@
     ]
   },
   {
-    "content": "安全\nApache Software Foundation在消除其软件项目中的安全性问题方面采取严格的立场。 Apache 
DolphinScheduler也非常关注与其功能有关的安全性问题。\n如果您对DolphinScheduler的安全性有疑虑,或者发现了漏洞或潜在威胁,请发送邮件至[[email protected]](mailto:[email protected]),与Apache安全团队联系。
 请在电子邮件中将项目名称指定为DolphinScheduler,并提供相关问题或潜在威胁的描述。 还敦促您推荐重现和复制问题的方法。 
在评估和分析调查结果之后,apache安全团队和DolphinScheduler社区将与您联系。\n在公共领域公开该安全电子邮件之前,请注意在安全电子邮件中报告该安全问题。\n",
+    "content": "Apache 
DolphinScheduler安全模型\n本文档主要用于描述不同角色用户的工作范围、职责和重点功能,通过对用户权限和功能的介绍辅助用户在了解部署、使用、运维等阶段的注意事项和规则。针对开发者可以通过本文档了解安全漏洞与正常功能的边界。\nApache
 DolphinScheduler工作流程\n从了解到使用Apache 
DolphinScheduler,用户一般会经过以下几个阶段。\n1.系统部署,配置运行环境\n2.创建系统用户,配置对应资源\n3.创建工作流定义,配置任务运行\n4.系统运维\n无论用户使用的是单节点、伪集群、还是集群部署(服务器或云部署),对于系统的使用都会经过以上四个步骤。针对上述四个步骤,一般会涉及到以下三种类型的用户。\n用户类型\n1.服务部署人员\n服务部署人员需要拥有操作服务器的权限,服务部署人员需要了解相关任务运行的方式,已确�
 ��务器安全边界和环境要求。\n(1).对于多租户运行场景,服务器部署用户需要具备创建用户和切换用户权限。\n(2).Apache 
DolphinScheduler [...]
+    "version": "dev",
+    "link": "/contribute/join/security-model",
+    "title": "Apache DolphinScheduler安全模型",
+    "location": [
+      "贡献指南",
+      "如何参与",
+      "安全模型"
+    ]
+  },
+  {
+    "content": "安全\nApache Software Foundation在消除其软件项目中的安全性问题方面采取严格的立场。 Apache 
DolphinScheduler也非常关注与其功能有关的安全性问题。\n如果您对DolphinScheduler的安全性有疑虑,或者发现了漏洞或潜在威胁,请发送邮件至[[email protected]](mailto:[email protected]),与Apache安全团队联系。
 请在电子邮件中将项目名称指定为DolphinScheduler,并提供相关问题或潜在威胁的描述。 还敦促您推荐重现和复制问题的方法。 
在评估和分析调查结果之后,apache安全团队和DolphinScheduler社区将与您联系。\n在公共领域公开该安全电子邮件之前,请注意在安全电子邮件中报告该安全问题。\n注意\n在您提交之前,请先按照Apache
 DolphinScheduler安全模型检查该问题是否属于安全漏洞。\n",
     "version": "dev",
     "link": "/contribute/join/security",
     "title": "安全",
diff --git a/fetch/doc/en-us/dev.json b/fetch/doc/en-us/dev.json
index 77f6a61f38..8b5f857023 100644
--- a/fetch/doc/en-us/dev.json
+++ b/fetch/doc/en-us/dev.json
@@ -1312,6 +1312,16 @@
       {
         "title": "Join",
         "children": [
+          {
+            "title": "Security model",
+            "children": [],
+            "location": [
+              "Contribution",
+              "Join",
+              "Security model"
+            ],
+            "key": "/contribute/join/security-model"
+          },
           {
             "title": "Security Report",
             "children": [],
diff --git a/fetch/doc/zh-cn/dev.json b/fetch/doc/zh-cn/dev.json
index 5890a45eea..a5354b2b24 100644
--- a/fetch/doc/zh-cn/dev.json
+++ b/fetch/doc/zh-cn/dev.json
@@ -1272,6 +1272,16 @@
       {
         "title": "如何参与",
         "children": [
+          {
+            "title": "安全模型",
+            "children": [],
+            "location": [
+              "贡献指南",
+              "如何参与",
+              "安全模型"
+            ],
+            "key": "/contribute/join/security-model"
+          },
           {
             "title": "报告安全问题",
             "children": [],
diff --git a/pages/doc/en-us/dev/contribute/join/security-model.json 
b/pages/doc/en-us/dev/contribute/join/security-model.json
new file mode 100644
index 0000000000..196b8aefa5
--- /dev/null
+++ b/pages/doc/en-us/dev/contribute/join/security-model.json
@@ -0,0 +1,229 @@
+{
+  "__html": "<h1 id=\"apache-dolphinscheduler-security-model\">Apache 
DolphinScheduler Security Model</h1>\n<p>This document is mainly used to 
describe the scope of work, responsibilities and key functions of users with 
different roles. By introducing user permissions and functions, it helps users 
understand the precautions and rules in the deployment, use, operation and 
maintenance stages. Developers can use this document to understand the 
boundaries between security vulnerabilities and [...]
+  "location": [
+    "Contribution",
+    "Join",
+    "Security model"
+  ],
+  "structure": [
+    {
+      "title": "Apache DolphinScheduler Workflow",
+      "children": [
+        {
+          "title": "1. Service deployment personnel",
+          "children": [],
+          "anchor": "1.-service-deployment-personnel"
+        },
+        {
+          "title": "2. System administrator",
+          "children": [],
+          "anchor": "2.-system-administrator"
+        },
+        {
+          "title": "3. Ordinary system users",
+          "children": [],
+          "anchor": "3.-ordinary-system-users"
+        },
+        {
+          "title": "4. Unlogged in users",
+          "children": [],
+          "anchor": "4.-unlogged-in-users"
+        },
+        {
+          "title": "Examples of Mistaken Security Vulnerabilities",
+          "children": [],
+          "anchor": "examples-of-mistaken-security-vulnerabilities"
+        }
+      ],
+      "anchor": "apache-dolphinscheduler-workflow"
+    },
+    {
+      "title": "User Type",
+      "children": [
+        {
+          "title": "1. Service deployment personnel",
+          "children": [],
+          "anchor": "1.-service-deployment-personnel"
+        },
+        {
+          "title": "2. System administrator",
+          "children": [],
+          "anchor": "2.-system-administrator"
+        },
+        {
+          "title": "3. Ordinary system users",
+          "children": [],
+          "anchor": "3.-ordinary-system-users"
+        },
+        {
+          "title": "4. Unlogged in users",
+          "children": [],
+          "anchor": "4.-unlogged-in-users"
+        },
+        {
+          "title": "Examples of Mistaken Security Vulnerabilities",
+          "children": [],
+          "anchor": "examples-of-mistaken-security-vulnerabilities"
+        }
+      ],
+      "anchor": "user-type"
+    },
+    {
+      "title": "Data source management",
+      "children": [
+        {
+          "title": "1. Service deployment personnel",
+          "children": [],
+          "anchor": "1.-service-deployment-personnel"
+        },
+        {
+          "title": "2. System administrator",
+          "children": [],
+          "anchor": "2.-system-administrator"
+        },
+        {
+          "title": "3. Ordinary system users",
+          "children": [],
+          "anchor": "3.-ordinary-system-users"
+        },
+        {
+          "title": "4. Unlogged in users",
+          "children": [],
+          "anchor": "4.-unlogged-in-users"
+        },
+        {
+          "title": "Examples of Mistaken Security Vulnerabilities",
+          "children": [],
+          "anchor": "examples-of-mistaken-security-vulnerabilities"
+        }
+      ],
+      "anchor": "data-source-management"
+    },
+    {
+      "title": "Resource Center",
+      "children": [
+        {
+          "title": "1. Service deployment personnel",
+          "children": [],
+          "anchor": "1.-service-deployment-personnel"
+        },
+        {
+          "title": "2. System administrator",
+          "children": [],
+          "anchor": "2.-system-administrator"
+        },
+        {
+          "title": "3. Ordinary system users",
+          "children": [],
+          "anchor": "3.-ordinary-system-users"
+        },
+        {
+          "title": "4. Unlogged in users",
+          "children": [],
+          "anchor": "4.-unlogged-in-users"
+        },
+        {
+          "title": "Examples of Mistaken Security Vulnerabilities",
+          "children": [],
+          "anchor": "examples-of-mistaken-security-vulnerabilities"
+        }
+      ],
+      "anchor": "resource-center"
+    },
+    {
+      "title": "Alarm Management",
+      "children": [
+        {
+          "title": "1. Service deployment personnel",
+          "children": [],
+          "anchor": "1.-service-deployment-personnel"
+        },
+        {
+          "title": "2. System administrator",
+          "children": [],
+          "anchor": "2.-system-administrator"
+        },
+        {
+          "title": "3. Ordinary system users",
+          "children": [],
+          "anchor": "3.-ordinary-system-users"
+        },
+        {
+          "title": "4. Unlogged in users",
+          "children": [],
+          "anchor": "4.-unlogged-in-users"
+        },
+        {
+          "title": "Examples of Mistaken Security Vulnerabilities",
+          "children": [],
+          "anchor": "examples-of-mistaken-security-vulnerabilities"
+        }
+      ],
+      "anchor": "alarm-management"
+    },
+    {
+      "title": "Authentication method",
+      "children": [
+        {
+          "title": "1. Service deployment personnel",
+          "children": [],
+          "anchor": "1.-service-deployment-personnel"
+        },
+        {
+          "title": "2. System administrator",
+          "children": [],
+          "anchor": "2.-system-administrator"
+        },
+        {
+          "title": "3. Ordinary system users",
+          "children": [],
+          "anchor": "3.-ordinary-system-users"
+        },
+        {
+          "title": "4. Unlogged in users",
+          "children": [],
+          "anchor": "4.-unlogged-in-users"
+        },
+        {
+          "title": "Examples of Mistaken Security Vulnerabilities",
+          "children": [],
+          "anchor": "examples-of-mistaken-security-vulnerabilities"
+        }
+      ],
+      "anchor": "authentication-method"
+    },
+    {
+      "title": "Security Center",
+      "children": [
+        {
+          "title": "1. Service deployment personnel",
+          "children": [],
+          "anchor": "1.-service-deployment-personnel"
+        },
+        {
+          "title": "2. System administrator",
+          "children": [],
+          "anchor": "2.-system-administrator"
+        },
+        {
+          "title": "3. Ordinary system users",
+          "children": [],
+          "anchor": "3.-ordinary-system-users"
+        },
+        {
+          "title": "4. Unlogged in users",
+          "children": [],
+          "anchor": "4.-unlogged-in-users"
+        },
+        {
+          "title": "Examples of Mistaken Security Vulnerabilities",
+          "children": [],
+          "anchor": "examples-of-mistaken-security-vulnerabilities"
+        }
+      ],
+      "anchor": "security-center"
+    }
+  ],
+  "title": "Apache DolphinScheduler Security Model",
+  "link": "/contribute/join/security-model"
+}
\ No newline at end of file
diff --git a/pages/doc/en-us/dev/contribute/join/security.json 
b/pages/doc/en-us/dev/contribute/join/security.json
index 867901ca84..5ae71582af 100644
--- a/pages/doc/en-us/dev/contribute/join/security.json
+++ b/pages/doc/en-us/dev/contribute/join/security.json
@@ -1,11 +1,17 @@
 {
-  "__html": "<h1 id=\"security\">Security</h1>\n<p>The Apache Software 
Foundation takes a rigorous stance on eliminating security issues in its 
software projects. Apache DolphinScheduler is also very concerned Security 
issues related to its features and functionality.</p>\n<p>If you have 
apprehensions regarding DolphinScheduler’s security or you discover 
vulnerability or potential threat, don’t hesitate to get in touch with the 
Apache Security Team by dropping a mail at <a href=\"mailto: [...]
+  "__html": "<h1 id=\"security\">Security</h1>\n<p>The Apache Software 
Foundation takes a rigorous stance on eliminating security issues in its 
software projects. Apache DolphinScheduler is also very concerned Security 
issues related to its features and functionality.</p>\n<p>If you have 
apprehensions regarding DolphinScheduler’s security or you discover 
vulnerability or potential threat, don’t hesitate to get in touch with the 
Apache Security Team by dropping a mail at <a href=\"mailto: [...]
   "location": [
     "Contribution",
     "Join",
     "Security Report"
   ],
-  "structure": [],
+  "structure": [
+    {
+      "title": "Note",
+      "children": [],
+      "anchor": "note"
+    }
+  ],
   "title": "Security",
   "link": "/contribute/join/security"
 }
\ No newline at end of file
diff --git a/pages/doc/zh-cn/dev/contribute/join/security-model.json 
b/pages/doc/zh-cn/dev/contribute/join/security-model.json
new file mode 100644
index 0000000000..c44a393560
--- /dev/null
+++ b/pages/doc/zh-cn/dev/contribute/join/security-model.json
@@ -0,0 +1,229 @@
+{
+  "__html": "<h1 id=\"apache-dolphinscheduler安全模型\">Apache 
DolphinScheduler安全模型</h1>\n<p>本文档主要用于描述不同角色用户的工作范围、职责和重点功能,通过对用户权限和功能的介绍辅助用户在了解部署、使用、运维等阶段的注意事项和规则。针对开发者可以通过本文档了解安全漏洞与正常功能的边界。</p>\n<h2
 id=\"apache-dolphinscheduler工作流程\">Apache 
DolphinScheduler工作流程</h2>\n<p>从了解到使用Apache 
DolphinScheduler,用户一般会经过以下几个阶段。</p>\n<p>1.系统部署,配置运行环境</p>\n<p>2.创建系统用户,配置对应资源</p>\n<p>3.创建工作流定义,配置任务运行</p>\n<p>4.系统运维</p>\n<p>无论用户使用的是单节点、伪集群、还是集群部署(服务器或云部署),对于系统的使用都会经过以上四个步骤。针对上述四个步骤,一般会涉及到以下三种类型的用户。</p>\n<h2
 i [...
 ]
+  "location": [
+    "贡献指南",
+    "如何参与",
+    "安全模型"
+  ],
+  "structure": [
+    {
+      "title": "Apache DolphinScheduler工作流程",
+      "children": [
+        {
+          "title": "1.服务部署人员",
+          "children": [],
+          "anchor": "1.服务部署人员"
+        },
+        {
+          "title": "2.系统管理员",
+          "children": [],
+          "anchor": "2.系统管理员"
+        },
+        {
+          "title": "3.系统普通用户",
+          "children": [],
+          "anchor": "3.系统普通用户"
+        },
+        {
+          "title": "4.未登录用户",
+          "children": [],
+          "anchor": "4.未登录用户"
+        },
+        {
+          "title": "误认为是安全漏洞的示例",
+          "children": [],
+          "anchor": "误认为是安全漏洞的示例"
+        }
+      ],
+      "anchor": "apache-dolphinscheduler工作流程"
+    },
+    {
+      "title": "用户类型",
+      "children": [
+        {
+          "title": "1.服务部署人员",
+          "children": [],
+          "anchor": "1.服务部署人员"
+        },
+        {
+          "title": "2.系统管理员",
+          "children": [],
+          "anchor": "2.系统管理员"
+        },
+        {
+          "title": "3.系统普通用户",
+          "children": [],
+          "anchor": "3.系统普通用户"
+        },
+        {
+          "title": "4.未登录用户",
+          "children": [],
+          "anchor": "4.未登录用户"
+        },
+        {
+          "title": "误认为是安全漏洞的示例",
+          "children": [],
+          "anchor": "误认为是安全漏洞的示例"
+        }
+      ],
+      "anchor": "用户类型"
+    },
+    {
+      "title": "数据源管理",
+      "children": [
+        {
+          "title": "1.服务部署人员",
+          "children": [],
+          "anchor": "1.服务部署人员"
+        },
+        {
+          "title": "2.系统管理员",
+          "children": [],
+          "anchor": "2.系统管理员"
+        },
+        {
+          "title": "3.系统普通用户",
+          "children": [],
+          "anchor": "3.系统普通用户"
+        },
+        {
+          "title": "4.未登录用户",
+          "children": [],
+          "anchor": "4.未登录用户"
+        },
+        {
+          "title": "误认为是安全漏洞的示例",
+          "children": [],
+          "anchor": "误认为是安全漏洞的示例"
+        }
+      ],
+      "anchor": "数据源管理"
+    },
+    {
+      "title": "资源中心",
+      "children": [
+        {
+          "title": "1.服务部署人员",
+          "children": [],
+          "anchor": "1.服务部署人员"
+        },
+        {
+          "title": "2.系统管理员",
+          "children": [],
+          "anchor": "2.系统管理员"
+        },
+        {
+          "title": "3.系统普通用户",
+          "children": [],
+          "anchor": "3.系统普通用户"
+        },
+        {
+          "title": "4.未登录用户",
+          "children": [],
+          "anchor": "4.未登录用户"
+        },
+        {
+          "title": "误认为是安全漏洞的示例",
+          "children": [],
+          "anchor": "误认为是安全漏洞的示例"
+        }
+      ],
+      "anchor": "资源中心"
+    },
+    {
+      "title": "告警管理",
+      "children": [
+        {
+          "title": "1.服务部署人员",
+          "children": [],
+          "anchor": "1.服务部署人员"
+        },
+        {
+          "title": "2.系统管理员",
+          "children": [],
+          "anchor": "2.系统管理员"
+        },
+        {
+          "title": "3.系统普通用户",
+          "children": [],
+          "anchor": "3.系统普通用户"
+        },
+        {
+          "title": "4.未登录用户",
+          "children": [],
+          "anchor": "4.未登录用户"
+        },
+        {
+          "title": "误认为是安全漏洞的示例",
+          "children": [],
+          "anchor": "误认为是安全漏洞的示例"
+        }
+      ],
+      "anchor": "告警管理"
+    },
+    {
+      "title": "认证方式",
+      "children": [
+        {
+          "title": "1.服务部署人员",
+          "children": [],
+          "anchor": "1.服务部署人员"
+        },
+        {
+          "title": "2.系统管理员",
+          "children": [],
+          "anchor": "2.系统管理员"
+        },
+        {
+          "title": "3.系统普通用户",
+          "children": [],
+          "anchor": "3.系统普通用户"
+        },
+        {
+          "title": "4.未登录用户",
+          "children": [],
+          "anchor": "4.未登录用户"
+        },
+        {
+          "title": "误认为是安全漏洞的示例",
+          "children": [],
+          "anchor": "误认为是安全漏洞的示例"
+        }
+      ],
+      "anchor": "认证方式"
+    },
+    {
+      "title": "安全中心",
+      "children": [
+        {
+          "title": "1.服务部署人员",
+          "children": [],
+          "anchor": "1.服务部署人员"
+        },
+        {
+          "title": "2.系统管理员",
+          "children": [],
+          "anchor": "2.系统管理员"
+        },
+        {
+          "title": "3.系统普通用户",
+          "children": [],
+          "anchor": "3.系统普通用户"
+        },
+        {
+          "title": "4.未登录用户",
+          "children": [],
+          "anchor": "4.未登录用户"
+        },
+        {
+          "title": "误认为是安全漏洞的示例",
+          "children": [],
+          "anchor": "误认为是安全漏洞的示例"
+        }
+      ],
+      "anchor": "安全中心"
+    }
+  ],
+  "title": "Apache DolphinScheduler安全模型",
+  "link": "/contribute/join/security-model"
+}
\ No newline at end of file
diff --git a/pages/doc/zh-cn/dev/contribute/join/security.json 
b/pages/doc/zh-cn/dev/contribute/join/security.json
index ec14f8e03a..b766f79c12 100644
--- a/pages/doc/zh-cn/dev/contribute/join/security.json
+++ b/pages/doc/zh-cn/dev/contribute/join/security.json
@@ -1,11 +1,17 @@
 {
-  "__html": "<h1 id=\"安全\">安全</h1>\n<p>Apache Software 
Foundation在消除其软件项目中的安全性问题方面采取严格的立场。 Apache 
DolphinScheduler也非常关注与其功能有关的安全性问题。</p>\n<p>如果您对DolphinScheduler的安全性有疑虑,或者发现了漏洞或潜在威胁,请发送邮件至[[email protected]](mailto:[email protected]),与Apache安全团队联系。
 请在电子邮件中将项目名称指定为DolphinScheduler,并提供相关问题或潜在威胁的描述。 还敦促您推荐重现和复制问题的方法。 
在评估和分析调查结果之后,apache安全团队和DolphinScheduler社区将与您联系。</p>\n<p>在公共领域公开该安全电子邮件之前,请注意在安全电子邮件中报告该安全问题。</p>\n",
+  "__html": "<h1 id=\"安全\">安全</h1>\n<p>Apache Software 
Foundation在消除其软件项目中的安全性问题方面采取严格的立场。 Apache 
DolphinScheduler也非常关注与其功能有关的安全性问题。</p>\n<p>如果您对DolphinScheduler的安全性有疑虑,或者发现了漏洞或潜在威胁,请发送邮件至[[email protected]](mailto:[email protected]),与Apache安全团队联系。
 请在电子邮件中将项目名称指定为DolphinScheduler,并提供相关问题或潜在威胁的描述。 还敦促您推荐重现和复制问题的方法。 
在评估和分析调查结果之后,apache安全团队和DolphinScheduler社区将与您联系。</p>\n<p>在公共领域公开该安全电子邮件之前,请注意在安全电子邮件中报告该安全问题。</p>\n<h2
 id=\"注意\">注意</h2>\n<p>在您提交之前,请先按照Apache DolphinScheduler<a href=\"htt [...]
   "location": [
     "贡献指南",
     "如何参与",
     "报告安全问题"
   ],
-  "structure": [],
+  "structure": [
+    {
+      "title": "注意",
+      "children": [],
+      "anchor": "注意"
+    }
+  ],
   "title": "安全",
   "link": "/contribute/join/security"
 }
\ No newline at end of file
diff --git a/python/2.0.5/.buildinfo b/python/2.0.5/.buildinfo
index 15d5f1c612..9716611c69 100644
--- a/python/2.0.5/.buildinfo
+++ b/python/2.0.5/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: 4ce0d3d6d802265959a9629f24c01bc5
+config: cae97be77491f35b02a54f6b30dd279d
 tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/2.0.6/.buildinfo b/python/2.0.6/.buildinfo
index 7bc94ee54e..731f603a2a 100644
--- a/python/2.0.6/.buildinfo
+++ b/python/2.0.6/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: bacf61cc47b4cc66f85406a8665f30d2
+config: 78bfe62331c134342e6791066797d120
 tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/2.0.7/.buildinfo b/python/2.0.7/.buildinfo
index 05a11dad2e..49a9a107fc 100644
--- a/python/2.0.7/.buildinfo
+++ b/python/2.0.7/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: a5c4a77db3065372a6029ca0424607dc
+config: 9309b7a0cb1b442b04074b9d61365f86
 tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/3.0.0/.buildinfo b/python/3.0.0/.buildinfo
index 72ff5deea7..b101e89674 100644
--- a/python/3.0.0/.buildinfo
+++ b/python/3.0.0/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: 00cb2758e62e3594a1e0b95e85eef0d4
+config: ae7d889516b4060b28412b4fe4415492
 tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/3.0.1/.buildinfo b/python/3.0.1/.buildinfo
index 8d9f0aecca..b34932c475 100644
--- a/python/3.0.1/.buildinfo
+++ b/python/3.0.1/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: aeda5bbc63b4c27f4653eca34ced354b
+config: 0d100832ff8f36c729562019cc2db3aa
 tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/3.1.0/.buildinfo b/python/3.1.0/.buildinfo
index ea0cd313a4..435af10a8f 100644
--- a/python/3.1.0/.buildinfo
+++ b/python/3.1.0/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: af929747a3aabbc1f621a945a4eb8fd1
+config: a61fb6a849494a95975845593e0c7208
 tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/4.0.0/.buildinfo b/python/4.0.0/.buildinfo
index fcd8931082..e7410cfa1e 100644
--- a/python/4.0.0/.buildinfo
+++ b/python/4.0.0/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: d4eba71459dc81a93a3982a6d9451e78
+config: db707b2dec5869bef68899f9c1158973
 tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/4.0.1/.buildinfo b/python/4.0.1/.buildinfo
index 3ca2c2115d..8b83197504 100644
--- a/python/4.0.1/.buildinfo
+++ b/python/4.0.1/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: 87903ea442dbfd0f3ae45f0be67be385
+config: da238c479ae6093c0af2930f2b962601
 tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/4.0.2/.buildinfo b/python/4.0.2/.buildinfo
index 1902b1e068..c6c4d2783b 100644
--- a/python/4.0.2/.buildinfo
+++ b/python/4.0.2/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: 885306f3abd85eeece9abe25eac07887
+config: f88b42d8c34bfb82a5121dcd20a5b383
 tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/4.0.3/.buildinfo b/python/4.0.3/.buildinfo
index 2445d8ad2a..637899b6ea 100644
--- a/python/4.0.3/.buildinfo
+++ b/python/4.0.3/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: f223d0b3e38be08f36cc710754bdbe8b
+config: ae7a017e8beef646f58074bd30a0642d
 tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/4.0.4/.buildinfo b/python/4.0.4/.buildinfo
index 614a8723f6..c4d3fd100d 100644
--- a/python/4.0.4/.buildinfo
+++ b/python/4.0.4/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: 9c81fee7c7a4ce250861866972445b4b
+config: d43a6759f78238f7645d82f420b7f9d1
 tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/main/.buildinfo b/python/main/.buildinfo
index c16bdae853..fe6dd004eb 100644
--- a/python/main/.buildinfo
+++ b/python/main/.buildinfo
@@ -1,4 +1,4 @@
 # Sphinx build info version 1
 # This file records the configuration used when building these files. When it 
is not found, a full rebuild will be done.
-config: 9a74e80d1a8728a5ddb440501af0b8a3
+config: b3d91876e94cb86f85c2810b10e249b9
 tags: 645f666f9bcd5a90fca523b33c5a78b7

Reply via email to