You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@zeppelin.apache.org by zj...@apache.org on 2019/03/13 07:26:47 UTC

[zeppelin] branch branch-0.8 updated: [ZEPPELIN-4054] Fix LdapGroupRealm path in shiro doc

This is an automated email from the ASF dual-hosted git repository.

zjffdu pushed a commit to branch branch-0.8
in repository https://gitbox.apache.org/repos/asf/zeppelin.git


The following commit(s) were added to refs/heads/branch-0.8 by this push:
     new 3997d42  [ZEPPELIN-4054] Fix LdapGroupRealm path in shiro doc
3997d42 is described below

commit 3997d42a505f66f14cfc1206a810b75b01975414
Author: Ethan <cq...@gmail.com>
AuthorDate: Tue Mar 12 11:01:53 2019 +0800

    [ZEPPELIN-4054] Fix LdapGroupRealm path in shiro doc
    
    LdapGroupRealm has moved to org.apache.zeppelin.realm
    
    ### What is this PR for?
    Fix doc
    
    ### What type of PR is it?
    Documentation
    
    ### Todos
    [ ] - Fix LdapGroupRealm path in shiro doc
    
    ### What is the Jira issue?
    https://issues.apache.org/jira/browse/ZEPPELIN-4054
    
    ### How should this be tested?
    no need
    
    ### Screenshots (if appropriate)
    no need
    
    ### Questions:
    
    Author: Ethan <cq...@gmail.com>
    
    Closes #3330 from cquptEthan/fix-shiro-doc and squashes the following commits:
    
    0524e5adf [Ethan] Fix LdapGroupRealm path in shiro doc
    
    (cherry picked from commit bc89ab9c25690a650698d38f874f8af45abbef92)
    Signed-off-by: Jeff Zhang <zj...@apache.org>
---
 docs/setup/security/shiro_authentication.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/docs/setup/security/shiro_authentication.md b/docs/setup/security/shiro_authentication.md
index 11d5c68..c56b77a 100644
--- a/docs/setup/security/shiro_authentication.md
+++ b/docs/setup/security/shiro_authentication.md
@@ -80,7 +80,7 @@ activeDirectoryRealm.groupRolesMap = "CN=aGroupName,OU=groups,DC=SOME_GROUP,DC=C
 activeDirectoryRealm.authorizationCachingEnabled = false
 activeDirectoryRealm.principalSuffix = @corp.company.net
 
-ldapRealm = org.apache.zeppelin.server.LdapGroupRealm
+ldapRealm = org.apache.zeppelin.realm.LdapGroupRealm
 # search base for ldap groups (only relevant for LdapGroupRealm):
 ldapRealm.contextFactory.environment[ldap.searchBase] = dc=COMPANY,dc=COM
 ldapRealm.contextFactory.url = ldap://ldap.test.com:389