def hive(request): return render("hive.mako", request, { 'initial': json.dumps({ 'user': request.user.username, 'sentry_provider': get_hive_sentry_provider(), 'is_sentry_admin': request.user.groups.filter(name__in=get_sentry_server_admin_groups()).exists() }), 'has_impersonation_perm': _has_impersonation_perm(request.user), })
def _sentry(request, component): return render("sentry.mako", request, { 'initial': json.dumps({ 'component': component, 'user': request.user.username, 'sentry_provider': get_hive_sentry_provider(), 'is_sentry_admin': request.user.groups.filter(name__in=get_sentry_server_admin_groups()).exists() }), 'has_impersonation_perm': _has_impersonation_perm(request.user) and component == 'hive', 'component': component })
def test_security_plain(): tmpdir = tempfile.mkdtemp() finish = SENTRY_CONF_DIR.set_for_testing(tmpdir) try: xml = sentry_site_xml(provider='default') file(os.path.join(tmpdir, 'sentry-site.xml'), 'w').write(xml) sentry_site.reset() assert_equal('default', get_hive_sentry_provider()) assert_equal('test/[email protected]', get_sentry_server_principal()) security = SentryClient('test.com', 11111, 'test')._get_security() assert_equal('test', security['kerberos_principal_short_name']) assert_equal(False, security['use_sasl']) assert_equal('NOSASL', security['mechanism']) finally: sentry_site.reset() finish() shutil.rmtree(tmpdir)
def getkey(table): names = table['aggregateInfo'][0] names['server'] = get_hive_sentry_provider() return names
def hive(request): return render("hive.mako", request, { 'initial': json.dumps({'user': request.user.username, 'sentry_provider': get_hive_sentry_provider()}), 'has_impersonation_perm': _has_impersonation_perm(request.user) })
def hive(request): return render("hive.mako", request, { 'initial': json.dumps({'user': request.user.username, 'sentry_provider': get_hive_sentry_provider()}), })