1
0
Fork 0
mirror of https://we.phorge.it/source/phorge.git synced 2024-09-20 09:18:48 +02:00
phorge-phorge/webroot/rsrc/css/aphront/dialog-view.css

176 lines
2.9 KiB
CSS
Raw Normal View History

2011-01-25 20:31:40 +01:00
/**
* @provides aphront-dialog-view-css
*/
.aphront-dialog-view {
width: 540px;
margin: 32px auto 16px;
border: 1px solid {$lightblueborder};
border-radius: 3px;
background-color: #fff;
}
.jx-client-dialog .aphront-dialog-view {
box-shadow: {$dropshadow};
}
.device-phone .aphront-dialog-view {
margin: 16px;
width: auto;
}
.aphront-dialog-view-standalone {
margin: 32px auto;
}
.aphront-dialog-head {
padding: 12px 12px 0 12px;
2011-01-25 20:31:40 +01:00
}
.aphront-dialog-flush .aphront-dialog-body {
padding: 0;
}
.aphront-dialog-view-width-form {
width: 600px;
}
2011-01-25 20:31:40 +01:00
.aphront-dialog-view-width-full {
width: 90%;
max-width: 1040px;
}
2011-01-25 20:31:40 +01:00
.aphront-dialog-body {
background: #fff;
padding: 16px;
2011-01-25 20:31:40 +01:00
border: none;
}
.device-phone .aphront-dialog-body {
padding: 8px;
}
2011-01-25 20:31:40 +01:00
.aphront-dialog-tail {
border: none;
position: relative;
background: {$lightgreybackground};
padding: 8px 16px;
border-top: 1px solid {$thinblueborder};
border-bottom-left-radius: 3px;
border-bottom-right-radius: 3px;
}
.device .aphront-dialog-resize {
/* No resizing on devices. */
display: none;
}
.aphront-dialog-resize {
position: absolute;
right: -4px;
bottom: -4px;
width: 18px;
height: 18px;
background-image: url(/rsrc/image/resize.png);
background-size: 100%;
cursor: nwse-resize;
pointer-events: all;
}
.aphront-dialog-foot {
padding: 6px 0;
float: left;
2011-01-25 20:31:40 +01:00
}
.aphront-dialog-tail button,
.aphront-dialog-tail a.button {
float: right;
margin-left: 8px;
2011-01-25 20:31:40 +01:00
}
.jx-client-dialog {
position: absolute;
width: 100%;
}
.jx-mask {
opacity: .7;
background: #292f33;
position: fixed;
top: 0;
left: 0;
right: 0;
bottom: 0;
}
.jx-dark-mask {
background: #292f33;
opacity: 0.95;
}
.aphront-exception-dialog {
width: 95%;
}
.aphront-exception-dialog .exception-message {
font-size: 14px;
background: {$sh-yellowbackground};
border: 1px solid {$sh-yellowborder};
padding: 12px;
white-space: pre-wrap;
}
.aphront-exception-dialog .exception-trace {
margin-top: 16px;
}
Add basic per-object privacy policies Summary: Provides a basic start for access policies. Objects expose various capabilities, like CAN_VIEW, CAN_EDIT, etc., and set a policy for each capability. We currently implement three policies, PUBLIC (anyone, including logged-out), USERS (any logged-in) and NOONE (nobody). There's also a way to provide automatic capability grants (e.g., the owner of an object can always see it, even if some capability is set to "NOONE"), but I'm not sure how great the implementation feels and it might change. Most of the code here is providing a primitive for efficient policy-aware list queries. The problem with doing queries naively is that you have to do crazy amounts of filtering, e.g. to show the user page 6, you need to filter at least 600 objects (and likely more) before you can figure out which ones are 500-600 for them. You can't just do "LIMIT 500, 100" because that might have only 50 results, or no results. Instead, the query looks like "WHERE id > last_visible_id", and then we fetch additional pages as necessary to satisfy the request. The general idea is that we move all data access to Query classes and have them do object filtering. The ID paging primitive allows efficient paging in most cases, and the executeOne() method provides a concise way to do policy checks for edit/view screens. We'll probably end up with mostly broader policy UIs or configuration-based policies, but there are at least a few cases for per-object privacy (e.g., marking tasks as "Security", and restricting things to the members of projects) so I figured we'd start with a flexible primitive and the simplify it in the UI where we can. Test Plan: Unit tests, played around in the UI with various policy settings. Reviewers: btrahan, vrana, jungejason Reviewed By: btrahan CC: aran Maniphest Tasks: T603 Differential Revision: https://secure.phabricator.com/D2210
2012-04-14 19:13:29 +02:00
.aphront-access-dialog {
width: 50%;
}
Require several advanced postgraduate degrees to understand object policies Summary: Fixes T11836. See some prior discussion in T8376#120613. The policy hint in headers in the UI is not exhaustive, and can not reasonably be exhaustive. For example, on a revision, it may say "All Users", but really mean "All users who can see the space this object is in and the repository it belongs to, plus the revision author and reviewers". These rules are explained if you click (and, often, in the documentation), but "All Users" is still at least somewhat misleading. I don't think there's any perfect solution here that balances the needs of both new and experienced users perfectly, but this change tries to do a bit better about avoiding cases where we say something very open (like "All Users") when the real policy is not very open. Specifically, I've made these changes to the header: - Spaces are now listed in the tag, so it will say `(S3 > All Users)` instead of `(All Users)`. They're already listed in the header, this just makes it more explicit that Spaces are a policy container and part of the view policy. - Extended policy objects are now listed in the tag, so it will say `(S3 > rARC > All Users)` for a revision in the Arcanist repository which is also in Space 3. - Objects can now provide a "Policy Codex", which is an object that represents a rulebook of more sophisticated policy descriptions. This codex can replace the tag with something else. - Imported calendar events now say "Uses Import Policy" instead of, e.g., "All Users". I've made these changes to the policy dialog: - Split it into more visually separate sections. - Added an explicit section for extended policies ("You must also have access to these other objects: ..."). - Broken the object policy rules into a "Special Rules" section (for rules like "you can only see a revision if you can see the repository it is part of") and an "Object Policy" section (for the actual object policy). - Tried to make it a little more readable? - The new policy dialogs are great to curl up with in front of a fire with a nice cup of cocoa. I've made these changes to infrastructure: - Implementing `PhabricatorPolicyInterface` no longer requires you to implement `describeAutomaticCapability()`. - Instead, implement `PhabricatorPolicyCodexInterface` and return a `PhabricatorPolicyCodex` object. - This "codex" is a policy rulebook which can set all the policy icons, labels, colors, rules, etc., to properly explain complex policies. - Broadly, the old method was usually either not useful (most objects have no special rules) or not powerful enough (objects with special rules often need to do more in order to explain them). Test Plan: {F1912860} {F1912861} {F1912862} {F1912863} Reviewers: chad Reviewed By: chad Subscribers: avivey Maniphest Tasks: T11836 Differential Revision: https://secure.phabricator.com/D16830
2016-11-09 19:02:25 +01:00
.aphront-access-dialog .aphront-dialog-body {
padding: 0 12px;
}
.aphront-policy-rejection {
font-weight: bold;
}
.aphront-capability-details {
margin: 20px 0 4px;
}
Improve handling of email verification and "activated" accounts Summary: Small step forward which improves existing stuff or lays groudwork for future stuff: - Currently, to check for email verification, we have to single-query the email address on every page. Instead, denoramlize it into the user object. - Migrate all the existing users. - When the user verifies an email, mark them as `isEmailVerified` if the email is their primary email. - Just make the checks look at the `isEmailVerified` field. - Add a new check, `isUserActivated()`, to cover email-verified plus disabled. Currently, a non-verified-but-not-disabled user could theoretically use Conduit over SSH, if anyone deployed it. Tighten that up. - Add an `isApproved` flag, which is always true for now. In a future diff, I want to add a default-on admin approval queue for new accounts, to prevent configuration mistakes. The way it will work is: - When the queue is enabled, registering users are created with `isApproved = false`. - Admins are sent an email, "[Phabricator] New User Approval (alincoln)", telling them that a new user is waiting for approval. - They go to the web UI and approve the user. - Manually-created accounts are auto-approved. - The email will have instructions for disabling the queue. I think this queue will be helpful for new installs and give them peace of mind, and when you go to disable it we have a better opportunity to warn you about exactly what that means. Generally, I want to improve the default safety of registration, since if you just blindly coast through the path of least resistance right now your install ends up pretty open, and realistically few installs are on VPNs. Test Plan: - Ran migration, verified `isEmailVerified` populated correctly. - Created a new user, checked DB for verified (not verified). - Verified, checked DB (now verified). - Used Conduit, People, Diffusion. Reviewers: btrahan Reviewed By: btrahan CC: chad, aran Differential Revision: https://secure.phabricator.com/D7572
2013-11-12 23:37:04 +01:00
.aphront-dialog-view-paragraph + .aphront-dialog-view-paragraph {
margin-top: 16px;
}
.device-desktop .aphront-dialog-flush .phui-object-item-list-view {
margin: 0;
padding: 0;
}
.aphront-dialog-flush .phui-object-item-list-view.phui-object-list-stackable
.phui-object-item {
border: 0;
}
.aphront-dialog-flush .phui-object-item-list-view.phui-object-list-stackable
.phui-object-item-frame {
border: 0;
border-top: 1px solid {$thinblueborder};
}
.aphront-dialog-object-list .phui-object-box {
border: none;
padding: 0;
margin: 0;
}
.aphront-dialog-object-list .aphront-dialog-body {
padding: 0 12px;
}
.aphront-dialog-tab-group .aphront-dialog-body {
padding: 0 12px;
}