Documentation ¶
Index ¶
- type GetLDAPUserParams
- type LDAPAttribute
- type LDAPRoleDTO
- type LDAPServerDTO
- type LDAPUserDTO
- type OrganizationNotFoundError
- type Service
- func (s *Service) GetLDAPStatus(c *contextmodel.ReqContext) response.Response
- func (s *Service) GetUserFromLDAP(c *contextmodel.ReqContext) response.Response
- func (s *Service) PostSyncUserWithLDAP(c *contextmodel.ReqContext) response.Response
- func (s *Service) ReloadLDAPCfg(c *contextmodel.ReqContext) response.Response
- type SyncLDAPUserParams
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type GetLDAPUserParams ¶
type GetLDAPUserParams struct { // in:path // required:true UserName string `json:"user_name"` }
swagger:parameters getUserFromLDAP
type LDAPAttribute ¶
type LDAPAttribute struct { ConfigAttributeValue string `json:"cfgAttrValue"` LDAPAttributeValue string `json:"ldapValue"` }
LDAPAttribute is a serializer for user attributes mapped from LDAP. Is meant to display both the serialized value and the LDAP key we received it from.
type LDAPRoleDTO ¶
type LDAPRoleDTO struct { OrgId int64 `json:"orgId"` OrgName string `json:"orgName"` OrgRole org.RoleType `json:"orgRole"` GroupDN string `json:"groupDN"` }
RoleDTO is a serializer for mapped roles from LDAP
type LDAPServerDTO ¶
type LDAPServerDTO struct { Host string `json:"host"` Port int `json:"port"` Available bool `json:"available"` Error string `json:"error"` }
LDAPServerDTO is a serializer for LDAP server statuses
type LDAPUserDTO ¶
type LDAPUserDTO struct { Name *LDAPAttribute `json:"name"` Surname *LDAPAttribute `json:"surname"` Email *LDAPAttribute `json:"email"` Username *LDAPAttribute `json:"login"` IsGrafanaAdmin *bool `json:"isGrafanaAdmin"` IsDisabled bool `json:"isDisabled"` OrgRoles []LDAPRoleDTO `json:"roles"` Teams []ldap.TeamOrgGroupDTO `json:"teams"` }
LDAPUserDTO is a serializer for users mapped from LDAP
type OrganizationNotFoundError ¶
type OrganizationNotFoundError struct {
OrgID int64
}
func (*OrganizationNotFoundError) Error ¶
func (e *OrganizationNotFoundError) Error() string
type Service ¶
type Service struct {
// contains filtered or unexported fields
}
func ProvideService ¶
func ProvideService(cfg *setting.Cfg, router routing.RouteRegister, accessControl ac.AccessControl, userService user.Service, authInfoService login.AuthInfoService, ldapGroupsService ldap.Groups, loginService login.Service, orgService org.Service, ldapService service.LDAP, sessionService auth.UserTokenService, bundleRegistry supportbundles.Service) *Service
func (*Service) GetLDAPStatus ¶
func (s *Service) GetLDAPStatus(c *contextmodel.ReqContext) response.Response
swagger:route GET /admin/ldap/status admin_ldap getLDAPStatus
Attempts to connect to all the configured LDAP servers and returns information on whenever they're available or not.
If you are running Grafana Enterprise and have Fine-grained access control enabled, you need to have a permission with action `ldap.status:read`.
Security: - basic:
Responses: 200: okResponse 401: unauthorisedError 403: forbiddenError 500: internalServerError
func (*Service) GetUserFromLDAP ¶
func (s *Service) GetUserFromLDAP(c *contextmodel.ReqContext) response.Response
swagger:route GET /admin/ldap/{user_name} admin_ldap getUserFromLDAP
Finds an user based on a username in LDAP. This helps illustrate how would the particular user be mapped in Grafana when synced.
If you are running Grafana Enterprise and have Fine-grained access control enabled, you need to have a permission with action `ldap.user:read`.
Security: - basic:
Responses: 200: okResponse 401: unauthorisedError 403: forbiddenError 500: internalServerError
func (*Service) PostSyncUserWithLDAP ¶
func (s *Service) PostSyncUserWithLDAP(c *contextmodel.ReqContext) response.Response
swagger:route POST /admin/ldap/sync/{user_id} admin_ldap postSyncUserWithLDAP
Enables a single Grafana user to be synchronized against LDAP.
If you are running Grafana Enterprise and have Fine-grained access control enabled, you need to have a permission with action `ldap.user:sync`.
Security: - basic:
Responses: 200: okResponse 401: unauthorisedError 403: forbiddenError 500: internalServerError
func (*Service) ReloadLDAPCfg ¶
func (s *Service) ReloadLDAPCfg(c *contextmodel.ReqContext) response.Response
swagger:route POST /admin/ldap/reload admin_ldap reloadLDAPCfg
Reloads the LDAP configuration.
If you are running Grafana Enterprise and have Fine-grained access control enabled, you need to have a permission with action `ldap.config:reload`.
Security: - basic:
Responses: 200: okResponse 401: unauthorisedError 403: forbiddenError 500: internalServerError
type SyncLDAPUserParams ¶
type SyncLDAPUserParams struct { // in:path // required:true UserID int64 `json:"user_id"` }
swagger:parameters postSyncUserWithLDAP