You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@ranger.apache.org by ni...@apache.org on 2020/08/14 14:29:46 UTC

[ranger] branch master updated (74d1638 -> e5a7f61)

This is an automated email from the ASF dual-hosted git repository.

ni3galave pushed a change to branch master
in repository https://gitbox.apache.org/repos/asf/ranger.git.


    from 74d1638  RANGER-2948: Ranger plugin enhancement to support a hook to register plugin chains
     new e6f85bb  RANGER-2951 : Ranger's Default Hive Policies on mow-int do not include a database wildcard
     new e5a7f61  RANGER-2952 : Not able remove services from Security zone

The 2 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 security-admin/src/main/webapp/scripts/models/RangerZone.js |  3 +++
 .../main/webapp/scripts/views/policies/RangerPolicyForm.js  |  6 +++++-
 .../webapp/scripts/views/security_zone/ZoneResourceForm.js  | 13 +++++++------
 3 files changed, 15 insertions(+), 7 deletions(-)


[ranger] 01/02: RANGER-2951 : Ranger's Default Hive Policies on mow-int do not include a database wildcard

Posted by ni...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

ni3galave pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/ranger.git

commit e6f85bba857175c65e202b1b660b0f50525e83c9
Author: Nitin Galave <ni...@apache.org>
AuthorDate: Fri Aug 14 17:47:06 2020 +0530

    RANGER-2951 : Ranger's Default Hive Policies on mow-int do not include a database wildcard
---
 .../main/webapp/scripts/views/policies/RangerPolicyForm.js  |  6 +++++-
 .../webapp/scripts/views/security_zone/ZoneResourceForm.js  | 13 +++++++------
 2 files changed, 12 insertions(+), 7 deletions(-)

diff --git a/security-admin/src/main/webapp/scripts/views/policies/RangerPolicyForm.js b/security-admin/src/main/webapp/scripts/views/policies/RangerPolicyForm.js
index f0b687f..0b64e6a 100644
--- a/security-admin/src/main/webapp/scripts/views/policies/RangerPolicyForm.js
+++ b/security-admin/src/main/webapp/scripts/views/policies/RangerPolicyForm.js
@@ -358,7 +358,11 @@ define(function(require){
 				_.each(this.model.get('resources'),function(obj,key){
 					var resourceDef = _.findWhere(resourceDefList,{'name':key}),
 					sameLevelResourceDef = [], parentResource ;
-					sameLevelResourceDef = _.where(resourceDefList, {'level': resourceDef.level, 'parent' : resourceDef.parent});
+					sameLevelResourceDef = _.filter(resourceDefList, function(objRsc){
+						if (objRsc.level === resourceDef.level && objRsc.parent === resourceDef.parent) {
+							return objRsc
+						}
+					});
 					//for parent leftnode status
                     if(resourceDef.parent){
                     	parentResource = _.findWhere(resourceDefList ,{'name':resourceDef.parent});
diff --git a/security-admin/src/main/webapp/scripts/views/security_zone/ZoneResourceForm.js b/security-admin/src/main/webapp/scripts/views/security_zone/ZoneResourceForm.js
index dbd1a3f..a23c744 100644
--- a/security-admin/src/main/webapp/scripts/views/security_zone/ZoneResourceForm.js
+++ b/security-admin/src/main/webapp/scripts/views/security_zone/ZoneResourceForm.js
@@ -107,12 +107,13 @@ define(function(require) {
                     _.each(this.model.get('resources'), function(obj, key) {
                         var resourceDef = _.findWhere(resourceDefList, {
                                 'name': key
-                            }),
-                            sameLevelResourceDef = [],
-                            parentResource;
-                        sameLevelResourceDef = _.where(resourceDefList, {
-                            'level': resourceDef.level,
-                            'parent': resourceDef.parent
+                        }),
+                        sameLevelResourceDef = [],
+                        parentResource;
+                        sameLevelResourceDef = _.filter(resourceDefList, function(objRsc){
+                            if (objRsc.level === resourceDef.level && objRsc.parent === resourceDef.parent) {
+                                return objRsc
+                            }
                         });
                         //for parent leftnode status
                         if (resourceDef.parent) {


[ranger] 02/02: RANGER-2952 : Not able remove services from Security zone

Posted by ni...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

ni3galave pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/ranger.git

commit e5a7f61a0d8bf8e2c389b06b03ce5c9caa1bf165
Author: Nitin Galave <ni...@apache.org>
AuthorDate: Fri Aug 14 18:14:25 2020 +0530

    RANGER-2952 : Not able remove services from Security zone
---
 security-admin/src/main/webapp/scripts/models/RangerZone.js | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/security-admin/src/main/webapp/scripts/models/RangerZone.js b/security-admin/src/main/webapp/scripts/models/RangerZone.js
index f91c96f..08d1181 100644
--- a/security-admin/src/main/webapp/scripts/models/RangerZone.js
+++ b/security-admin/src/main/webapp/scripts/models/RangerZone.js
@@ -229,6 +229,9 @@ define(function(require) {
 
                 }
             },
+            toString : function(){
+                return this.get('name');
+            },
         }, {
             // static class members
         });