This is an automated email from the ASF dual-hosted git repository.
ni3galave pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/ranger.git
The following commit(s) were added to refs/heads/master by this push:
new 9ed59b3 RANGER-2216: Ranger Audit UI lacks the feature to search the
audits using Policy Id or Policy Name
9ed59b3 is described below
commit 9ed59b32f790ccdce813f81860d7cdd344881630
Author: Nitin Galave <[email protected]>
AuthorDate: Thu Jan 3 12:11:38 2019 +0530
RANGER-2216: Ranger Audit UI lacks the feature to search the audits using
Policy Id or Policy Name
---
security-admin/src/main/webapp/scripts/views/reports/AuditLayout.js | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git
a/security-admin/src/main/webapp/scripts/views/reports/AuditLayout.js
b/security-admin/src/main/webapp/scripts/views/reports/AuditLayout.js
index 9040c49..886815d 100644
--- a/security-admin/src/main/webapp/scripts/views/reports/AuditLayout.js
+++ b/security-admin/src/main/webapp/scripts/views/reports/AuditLayout.js
@@ -310,13 +310,13 @@ define(function(require) {
var serverListForRepoType =
this.serviceDefList.map(function(serviceDef){ return {'label' :
serviceDef.get('name').toUpperCase(), 'value' : serviceDef.get('id')}; })
var serverAttrName = [{text : 'Start Date',label
:'startDate'},{text : 'End Date',label :'endDate'},
{text : 'User',label
:'requestUser'},{text : 'Resource Name',label :'resourcePath'},
- {text : 'Service Name',label
:'repoName'},
+ {text : 'Service Name',label
:'repoName'},{text : 'Policy ID',label :'policyId'},
{text : 'Service Type',label
:'repoType','multiple' : true, 'optionsArr' : serverListForRepoType},
{text : 'Result',label
:'accessResult', 'multiple' : true, 'optionsArr' :
XAUtils.enumToSelectLabelValuePairs(XAEnums.AccessResult)},
{text : 'Access Type',label
:'accessType'},{text : 'Access Enforcer',label :'aclEnforcer'},
{text : 'Client IP',label
:'clientIP'},{text : 'Tags',label :'tags'},
{text : 'Resource Type',label :
'resourceType'},{text : 'Cluster Name',label : 'cluster'}];
- var searchOpt = ['Resource Type','Start Date','End
Date','User','Service Name','Service Type','Resource Name','Access
Type','Result','Access Enforcer','Client IP','Tags','Cluster Name'];//,'Policy
ID'
+ var searchOpt = ['Resource Type','Start Date','End
Date','User','Service Name','Service Type','Resource Name','Access
Type','Result','Access Enforcer','Client IP','Tags','Cluster Name', 'Policy
ID'];
this.clearVisualSearch(this.accessAuditList,
serverAttrName);
this.searchInfoArr =[{text :'Access Enforcer', info
:localization.tt('msg.accessEnforcer')},
{text :'Access Type' , info
:localization.tt('msg.accessTypeMsg')},