Alexey Serbin has posted comments on this change. ( 
http://gerrit.cloudera.org:8080/23151 )

Change subject: add 1.18.0 blog post
......................................................................


Patch Set 3: Code-Review+1

(4 comments)

http://gerrit.cloudera.org:8080/#/c/23151/3/_posts/2025-07-10-apache-kudu-1-18-0-release.md
File _posts/2025-07-10-apache-kudu-1-18-0-release.md:

http://gerrit.cloudera.org:8080/#/c/23151/3/_posts/2025-07-10-apache-kudu-1-18-0-release.md@34
PS3, Line 34: JWT client auth improvements
Improvements in JWT client authentication


http://gerrit.cloudera.org:8080/#/c/23151/3/_posts/2025-07-10-apache-kudu-1-18-0-release.md@35
PS3, Line 35: IPKI CA certificate endpoints
This is added in the scope of JWT authn-related work, and that's already 
described in the time above.  Consider removing this.


http://gerrit.cloudera.org:8080/#/c/23151/3/_posts/2025-07-10-apache-kudu-1-18-0-release.md@36
PS3, Line 36: Support for dedicated SPNEGO keytab
Dedicated SPNEGO keytab for embedded webserver


http://gerrit.cloudera.org:8080/#/c/23151/3/_posts/2025-07-10-apache-kudu-1-18-0-release.md@37
PS3, Line 37: Stronger web UI headers
Sorry, I missed this during prior review rounds, but this looks like an 
incomplete sentence.  I guess stronger/tighter security was meant instead?  
Maybe, rephrase as:

  - HTTP headers for enhanced security of the embedded webserver



--
To view, visit http://gerrit.cloudera.org:8080/23151
To unsubscribe, visit http://gerrit.cloudera.org:8080/settings

Gerrit-Project: kudu
Gerrit-Branch: gh-pages
Gerrit-MessageType: comment
Gerrit-Change-Id: Id8d78844a6b9a8389d87c6a63820b04c98ef49c3
Gerrit-Change-Number: 23151
Gerrit-PatchSet: 3
Gerrit-Owner: Abhishek Chennaka <[email protected]>
Gerrit-Reviewer: Abhishek Chennaka <[email protected]>
Gerrit-Reviewer: Alexey Serbin <[email protected]>
Gerrit-Reviewer: Attila Bukor <[email protected]>
Gerrit-Reviewer: Marton Greber <[email protected]>
Gerrit-Comment-Date: Sat, 12 Jul 2025 03:07:58 +0000
Gerrit-HasComments: Yes

Reply via email to