1
0
Fork 0
mirror of https://we.phorge.it/source/phorge.git synced 2024-12-21 13:00:56 +01:00
phorge-phorge/webroot/rsrc/css/aphront/dialog-view.css

151 lines
2.5 KiB
CSS
Raw Normal View History

2011-01-25 20:31:40 +01:00
/**
* @provides aphront-dialog-view-css
*/
.aphront-dialog-view {
width: 540px;
margin: 32px auto 16px;
border: 1px solid {$lightblueborder};
border-bottom: 1px solid {$blueborder};
box-shadow: 0 1px 5px rgba(0, 0, 0, 0.25),
inset 0 1px 0 rgba(255, 255, 255, 0.5);
}
.device-phone .aphront-dialog-view {
margin: 16px;
width: auto;
}
.aphront-dialog-view-standalone {
margin: auto;
}
.aphront-dialog-head .phui-action-header {
border-bottom: 1px solid {$lightblueborder};
padding: 4px 16px;
white-space: nowrap;
2011-01-25 20:31:40 +01:00
}
.aphront-dialog-head .phui-action-header
.phui-action-header-title {
font-size: 15px;
color: {$bluetext};
text-shadow: 0 1px 2px #fff;
}
.aphront-dialog-flush .aphront-dialog-body {
padding: 0;
}
.aphront-dialog-view-width-form {
width: 600px;
}
2011-01-25 20:31:40 +01:00
.aphront-dialog-view-width-full {
width: 90%;
}
2011-01-25 20:31:40 +01:00
.aphront-dialog-body {
background: #ffffff;
padding: 16px;
2011-01-25 20:31:40 +01:00
border: none;
}
.aphront-dialog-tail {
border: none;
background: {$lightgreybackground};
padding: 8px 16px;
border-top: 1px solid #d4dadf;
}
.aphront-dialog-foot {
padding: 6px 0;
float: left;
2011-01-25 20:31:40 +01:00
}
.aphront-dialog-tail button,
.aphront-dialog-tail a.button {
float: right;
margin-left: 8px;
2011-01-25 20:31:40 +01:00
}
.jx-client-dialog {
position: absolute;
width: 100%;
}
.jx-mask {
opacity: .75;
background: #fff;
position: fixed;
top: 0;
left: 0;
right: 0;
bottom: 0;
}
.jx-dark-mask {
background: #000000;
opacity: 0.9;
}
.aphront-exception-dialog {
width: 95%;
}
.aphront-exception-dialog .exception-message {
font-size: 14px;
background: #efefef;
padding: 1em;
white-space: pre-wrap;
}
.aphront-exception-dialog .exception-trace {
margin-top: 15px;
}
.aphront-exception-dialog .exception-trace-header {
font-size: 11px;
color: {$greytext};
border-bottom: 1px solid #aaaaaa;
padding-bottom: .5em;
margin-bottom: .5em;
}
Add basic per-object privacy policies Summary: Provides a basic start for access policies. Objects expose various capabilities, like CAN_VIEW, CAN_EDIT, etc., and set a policy for each capability. We currently implement three policies, PUBLIC (anyone, including logged-out), USERS (any logged-in) and NOONE (nobody). There's also a way to provide automatic capability grants (e.g., the owner of an object can always see it, even if some capability is set to "NOONE"), but I'm not sure how great the implementation feels and it might change. Most of the code here is providing a primitive for efficient policy-aware list queries. The problem with doing queries naively is that you have to do crazy amounts of filtering, e.g. to show the user page 6, you need to filter at least 600 objects (and likely more) before you can figure out which ones are 500-600 for them. You can't just do "LIMIT 500, 100" because that might have only 50 results, or no results. Instead, the query looks like "WHERE id > last_visible_id", and then we fetch additional pages as necessary to satisfy the request. The general idea is that we move all data access to Query classes and have them do object filtering. The ID paging primitive allows efficient paging in most cases, and the executeOne() method provides a concise way to do policy checks for edit/view screens. We'll probably end up with mostly broader policy UIs or configuration-based policies, but there are at least a few cases for per-object privacy (e.g., marking tasks as "Security", and restricting things to the members of projects) so I figured we'd start with a flexible primitive and the simplify it in the UI where we can. Test Plan: Unit tests, played around in the UI with various policy settings. Reviewers: btrahan, vrana, jungejason Reviewed By: btrahan CC: aran Maniphest Tasks: T603 Differential Revision: https://secure.phabricator.com/D2210
2012-04-14 19:13:29 +02:00
.aphront-access-dialog {
width: 50%;
}
.aphront-dialog-view ul {
margin: 12px 24px;
list-style: circle;
}
.aphront-policy-rejection {
font-weight: bold;
}
.aphront-capability-details {
margin: 20px 0 4px;
}
Improve handling of email verification and "activated" accounts Summary: Small step forward which improves existing stuff or lays groudwork for future stuff: - Currently, to check for email verification, we have to single-query the email address on every page. Instead, denoramlize it into the user object. - Migrate all the existing users. - When the user verifies an email, mark them as `isEmailVerified` if the email is their primary email. - Just make the checks look at the `isEmailVerified` field. - Add a new check, `isUserActivated()`, to cover email-verified plus disabled. Currently, a non-verified-but-not-disabled user could theoretically use Conduit over SSH, if anyone deployed it. Tighten that up. - Add an `isApproved` flag, which is always true for now. In a future diff, I want to add a default-on admin approval queue for new accounts, to prevent configuration mistakes. The way it will work is: - When the queue is enabled, registering users are created with `isApproved = false`. - Admins are sent an email, "[Phabricator] New User Approval (alincoln)", telling them that a new user is waiting for approval. - They go to the web UI and approve the user. - Manually-created accounts are auto-approved. - The email will have instructions for disabling the queue. I think this queue will be helpful for new installs and give them peace of mind, and when you go to disable it we have a better opportunity to warn you about exactly what that means. Generally, I want to improve the default safety of registration, since if you just blindly coast through the path of least resistance right now your install ends up pretty open, and realistically few installs are on VPNs. Test Plan: - Ran migration, verified `isEmailVerified` populated correctly. - Created a new user, checked DB for verified (not verified). - Verified, checked DB (now verified). - Used Conduit, People, Diffusion. Reviewers: btrahan Reviewed By: btrahan CC: chad, aran Differential Revision: https://secure.phabricator.com/D7572
2013-11-12 23:37:04 +01:00
.aphront-dialog-view-paragraph + .aphront-dialog-view-paragraph {
margin-top: 16px;
}
.device-desktop .aphront-dialog-flush .phui-object-item-list-view {
margin: 0;
padding: 0;
}
.aphront-dialog-flush .phui-object-item-list-view.phui-object-list-stackable
.phui-object-item {
border: 0;
}
.aphront-dialog-flush .phui-object-item-list-view.phui-object-list-stackable
.phui-object-item-frame {
border: 0;
border-top: 1px solid {$thinblueborder};
}