You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@ranger.apache.org by ni...@apache.org on 2019/05/20 12:45:11 UTC
[ranger] branch master updated (e97cd52 -> 0adbd66)
This is an automated email from the ASF dual-hosted git repository.
ni3galave pushed a change to branch master
in repository https://gitbox.apache.org/repos/asf/ranger.git.
from e97cd52 RANGER-2429: Ranger KMS is not starting properly due to missing libraries
new 35eb451 RANGER-2435: Add support for sticky breadcrumbs.
new 0adbd66 RANGER-2439: Unable to view policy details from access audits when policy has policy condition at policy level
The 2 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "add" were already present in the repository and have only
been added to this reference.
Summary of changes:
security-admin/src/main/webapp/index.html | 2 +-
.../src/main/webapp/scripts/views/policies/RangerPolicyRO.js | 7 +++++--
security-admin/src/main/webapp/styles/xa.css | 12 +++++++++++-
3 files changed, 17 insertions(+), 4 deletions(-)
[ranger] 01/02: RANGER-2435: Add support for sticky breadcrumbs.
Posted by ni...@apache.org.
This is an automated email from the ASF dual-hosted git repository.
ni3galave pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/ranger.git
commit 35eb4511ace03c0d3bfc7b7427b3fdd7b22e85ac
Author: Nitin Galave <ni...@apache.org>
AuthorDate: Fri May 17 15:26:39 2019 +0530
RANGER-2435: Add support for sticky breadcrumbs.
---
security-admin/src/main/webapp/index.html | 2 +-
security-admin/src/main/webapp/styles/xa.css | 12 +++++++++++-
2 files changed, 12 insertions(+), 2 deletions(-)
diff --git a/security-admin/src/main/webapp/index.html b/security-admin/src/main/webapp/index.html
index 59eb9cf..ebcea3b 100644
--- a/security-admin/src/main/webapp/index.html
+++ b/security-admin/src/main/webapp/index.html
@@ -70,7 +70,7 @@
================================================== -->
<section class="container">
- <section id="r_breadcrumbs" class="row-fluid">
+ <section id="r_breadcrumbs" class="row-fluid r_breadcrumbs">
</section>
<div class='notifications top-right ranger-notifications'></div>
diff --git a/security-admin/src/main/webapp/styles/xa.css b/security-admin/src/main/webapp/styles/xa.css
index 6ae646d..8b44d3a 100644
--- a/security-admin/src/main/webapp/styles/xa.css
+++ b/security-admin/src/main/webapp/styles/xa.css
@@ -267,7 +267,7 @@ body {
}
.toggle-slide .toggle-blob {
position: relative;
- z-index: 99;
+ z-index: 3;
cursor: hand;
cursor: grab;
cursor: -moz-grab;
@@ -2700,6 +2700,16 @@ textarea:read-only{
text-overflow: ellipsis;
max-width: 300px;
}
+.r_breadcrumbs {
+ position: -webkit-sticky;
+ position: sticky;
+ top: 40px;
+ padding-right: 2px;
+ z-index: 10;
+ background: #eeeeee;
+ padding-top: 9px;
+}
+
#zoneServiceAccordion .accordion-inner{
padding:0px;
border: 0px;
[ranger] 02/02: RANGER-2439: Unable to view policy details from
access audits when policy has policy condition at policy level
Posted by ni...@apache.org.
This is an automated email from the ASF dual-hosted git repository.
ni3galave pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/ranger.git
commit 0adbd66a7a6f27d120641d481a452a2c036e35c0
Author: Nitin Galave <ni...@apache.org>
AuthorDate: Fri May 17 15:49:04 2019 +0530
RANGER-2439: Unable to view policy details from access audits when policy has policy condition at policy level
---
.../src/main/webapp/scripts/views/policies/RangerPolicyRO.js | 7 +++++--
1 file changed, 5 insertions(+), 2 deletions(-)
diff --git a/security-admin/src/main/webapp/scripts/views/policies/RangerPolicyRO.js b/security-admin/src/main/webapp/scripts/views/policies/RangerPolicyRO.js
index 1af54e1..a4b6087 100644
--- a/security-admin/src/main/webapp/scripts/views/policies/RangerPolicyRO.js
+++ b/security-admin/src/main/webapp/scripts/views/policies/RangerPolicyRO.js
@@ -174,8 +174,8 @@ define(function(require) {
if(this.policy.has('validitySchedules')){
details.validitySchedules = this.policy.get('validitySchedules');
}
- if(this.policy.has('conditions') && this.policy.get('conditions').length > 0){
- details.conditions = XAUtils.getPolicyConditionDetails(this.policy.get('conditions'), self.rangerService);
+ if(this.policy.has('conditions') && this.policy.get('conditions').length > 0 && self.serviceDef){
+ details.conditions = XAUtils.getPolicyConditionDetails(this.policy.get('conditions'), self.serviceDef);
}
//get policyItems
this.createPolicyItems();
@@ -267,6 +267,9 @@ define(function(require) {
getPolicyByVersion : function(ver, e){
//to support old policy log after updating that policy.
this.policy.set('serviceType',undefined);
+ if(this.policy.has('conditions')){
+ this.policy.set('conditions', '');
+ }
this.policy.fetchByVersion(ver, {
cache : false,
async : false