This project is mirrored from https://github.com/metabase/metabase.
Pull mirroring updated .
- Oct 27, 2021
-
-
Alexander Lesnenko authored
-
- Oct 26, 2021
-
-
Gustavo Saiani authored
-
Noah Moss authored
Co-authored-by:
Alexander Polyankin <alexander.polyankin@metabase.com>
-
Dalton authored
* move parameter values logic to own utils file * fix lint error resulting from rebase
-
Nemanja Glumac authored
#18646 Repro: Cannot select granularity/binning on fields from SQL question, which is joined (#18661)
-
Gustavo Saiani authored
-
Dalton authored
* move target utils to own file * move parameter to mbql functions to own utils file (#18663)
-
Alexander Lesnenko authored
* Summarize sidebar improvements * Summarize sidebar specs * cursor pointer for add aggregation button * review fixes
-
Alexander Polyankin authored
-
Dalton authored
* move mapping options function into own utils file * pull out option-building logic into own functions
-
Alexander Polyankin authored
-
Pawit Pornkitprasan authored
This reverts commit c6688f5caf226c6ec5be424859fc00b93665620f. Redshift only supports VACUUM command at a time on the whole cluster, so running VACUUM can fail with parallel executions.
-
Jeff Evans authored
v2.0.0.3 -> v2.1.0.1
-
dpsutton authored
* Add dataset flag to Card * Set dataset viz type to table * Include datasets in collection children * Ensure can write as dataset, include more tests
-
Alexander Polyankin authored
-
- Oct 25, 2021
-
-
Dalton authored
-
Dalton authored
* add parameters/constants file for options-related constants * add feature-flag utils file * move dashboard parameter options logic to own utils file * pull out mapping logic into own function
-
Nemanja Glumac authored
#18011 Repro: Post aggregation drill-through by dragging/selecting a portion of a chart results in an error (#18651) * Add repro for #18011 * Expand the repro to include different granularity Confirms that the issue doesn't work for "foo-of-bar" granularities.
-
Gustavo Saiani authored
-
Ariya Hidayat authored
-
Gustavo Saiani authored
-
Dalton authored
* move parameter type utils into own file * move parameter operator logic into own utils file * update reference in meta/Dashboard.js * move parameter filter utils to own file (#18634)
-
Gustavo Saiani authored
-
Dalton authored
-
Nemanja Glumac authored
* Enable email setup smoke test * Remove deprecated e2e helpers
-
- Oct 24, 2021
-
-
Pawit Pornkitprasan authored
-
Pawit Pornkitprasan authored
-
Nemanja Glumac authored
-
- Oct 22, 2021
-
-
Cam Saul authored
* Optimize classloader/require a bit (avoid lock + try-catch if already loaded) * Even faster
-
Alexander Polyankin authored
-
Noah Moss authored
-
Nemanja Glumac authored
* Refactor and register global Slack configuration e2e helper * Use slack helper in tests
-
Nemanja Glumac authored
Closes #17701
-
Nemanja Glumac authored
-
- Oct 21, 2021
-
-
Jeff Evans authored
Integrate secret handling with db-details Add helper function to database model namespace to "swap out" secret values with inserted IDs Calling this from the pre-update fn Add pre-insert fn for database model to perform the same Adding test to database model test ns Add creator_id to secret model to capture the user who created this secret instance/version Add creator-id and created-at sub properties for each secret in db details
-
Jeff Bruemmer authored
-
Nemanja Glumac authored
-
Ariya Hidayat authored
-
Pawit Pornkitprasan authored
Version 2.6.0 until 2.7.0 of org.apache.sshd has a bug that will fail to connect to SSH servers configured to use `-oKexAlgorithms=diffie-hellman-group-exchange-sha256`. Reverting to the known working version. We can upgrade to 2.7.1 once it is released. Reference: https://issues.apache.org/jira/browse/SSHD-1163 Fixes #18316
-
Jeff Evans authored
Add secret model Add Liquibase migration for secret table Implement bare bones model namespace for secret Add simple test to ensure secret values are stored and retrieved under an encryption key (or not) Add :creator_id to secret model to capture the user who created this secret instance/version Support updating secret values as part of encryption key rotation Add test assertions for secret values in the `rotate-encryption-key!-test`
-