This is an automated email from the ASF dual-hosted git repository.

ni3galave pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/ranger.git


The following commit(s) were added to refs/heads/master by this push:
     new 9ed59b3  RANGER-2216: Ranger Audit UI lacks the feature to search the 
audits using Policy Id or Policy Name
9ed59b3 is described below

commit 9ed59b32f790ccdce813f81860d7cdd344881630
Author: Nitin Galave <[email protected]>
AuthorDate: Thu Jan 3 12:11:38 2019 +0530

    RANGER-2216: Ranger Audit UI lacks the feature to search the audits using 
Policy Id or Policy Name
---
 security-admin/src/main/webapp/scripts/views/reports/AuditLayout.js | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git 
a/security-admin/src/main/webapp/scripts/views/reports/AuditLayout.js 
b/security-admin/src/main/webapp/scripts/views/reports/AuditLayout.js
index 9040c49..886815d 100644
--- a/security-admin/src/main/webapp/scripts/views/reports/AuditLayout.js
+++ b/security-admin/src/main/webapp/scripts/views/reports/AuditLayout.js
@@ -310,13 +310,13 @@ define(function(require) {
                        var serverListForRepoType =  
this.serviceDefList.map(function(serviceDef){ return {'label' : 
serviceDef.get('name').toUpperCase(), 'value' : serviceDef.get('id')}; })
                        var serverAttrName = [{text : 'Start Date',label 
:'startDate'},{text : 'End Date',label :'endDate'},
                                              {text : 'User',label 
:'requestUser'},{text : 'Resource Name',label :'resourcePath'},
-                                             {text : 'Service Name',label 
:'repoName'},
+                                             {text : 'Service Name',label 
:'repoName'},{text : 'Policy ID',label :'policyId'},
                                              {text : 'Service Type',label 
:'repoType','multiple' : true, 'optionsArr' : serverListForRepoType},
                                              {text : 'Result',label 
:'accessResult', 'multiple' : true, 'optionsArr' : 
XAUtils.enumToSelectLabelValuePairs(XAEnums.AccessResult)},
                                              {text : 'Access Type',label 
:'accessType'},{text : 'Access Enforcer',label :'aclEnforcer'},
                                              {text : 'Client IP',label 
:'clientIP'},{text : 'Tags',label :'tags'},
                                              {text : 'Resource Type',label : 
'resourceType'},{text : 'Cluster Name',label : 'cluster'}];
-            var searchOpt = ['Resource Type','Start Date','End 
Date','User','Service Name','Service Type','Resource Name','Access 
Type','Result','Access Enforcer','Client IP','Tags','Cluster Name'];//,'Policy 
ID'
+            var searchOpt = ['Resource Type','Start Date','End 
Date','User','Service Name','Service Type','Resource Name','Access 
Type','Result','Access Enforcer','Client IP','Tags','Cluster Name', 'Policy 
ID'];
                         this.clearVisualSearch(this.accessAuditList, 
serverAttrName);
                         this.searchInfoArr =[{text :'Access Enforcer', info 
:localization.tt('msg.accessEnforcer')},
                                             {text :'Access Type'       , info 
:localization.tt('msg.accessTypeMsg')},

Reply via email to