package
11.5.1+incompatible
Repository: https://github.com/grafana/grafana.git
Documentation: pkg.go.dev

# Packages

No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author

# Functions

No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
CloneRequest creates request copy including request body.
No description provided by the author
CopyRequestBody returns copy of request body and keeps the original one to prevent error when reading closed body.
Declare OSS roles to the accesscontrol service.
No description provided by the author
No description provided by the author
EvalAll returns evaluator that requires all passed evaluators to evaluate to true.
EvalAny returns evaluator that requires at least one of passed evaluators to evaluate to true.
EvalPermission returns an evaluator that will require at least one of passed scopes to match.
Field returns an injectable scope part for selected fields from the request's context available in accesscontrol.ScopeParams.
Filter creates a where clause to restrict the view of a query based on a users permissions Scopes that exists for all actions will be parsed and compared against the supplied sqlID Prefix parameter is the prefix of the scope that we support (e.g.
No description provided by the author
GetOrgRoles returns legacy org roles for a user.
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
GetResourcesMetadata returns a map of accesscontrol metadata, listing for each resource, users available actions.
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
GroupScopesByAction will group scopes on action Deprecated: use GroupScopesByActionContext instead.
GroupScopesByAction will group scopes on action.
No description provided by the author
HasGlobalAccess checks user access with globally assigned permissions only.
No description provided by the author
No description provided by the author
No description provided by the author
MergeMeta will merge actions matching prefix of second metadata into first.
No description provided by the author
No description provided by the author
No description provided by the author
NewScopeProvider creates a new ScopeProvider that is configured with specific root scope.
Parameter returns injectable scope part, based on URL parameters.
No description provided by the author
No description provided by the author
No description provided by the author
PermissionsForActions generate Permissions for all actions provided scoped to provided scope.
PrefixedRoleUID generates a uid from name with the same prefix.
Reduce will reduce a list of permissions to its minimal form, grouping scopes by action.
ReqHasRole generates a fallback to check whether the user has a role ReqHasRole(org.RoleAdmin) will always return true for Grafana server admins, eg, a Grafana Admin / Viewer role combination.
No description provided by the author
Scope builds scope from parts e.g.
ScopePrefix returns the prefix associated to a given scope we assume prefixes are all in the form <resource>:<attribute>:<value> ex: "datasources:name:test" returns "datasources:name:".
No description provided by the author
SetAcceptListForTest allow us to mutate the list for blackbox testing.
SplitScope returns kind, attribute and Identifier.
No description provided by the author
UseGlobalOrgFromRequestData returns global org if `global` flag is set or the org where user is logged in.
UseGlobalOrgFromRequestParams returns global org if `global` flag is set or the org where user is logged in.
UseGlobalOrSingleOrg returns the global organization or the current organization in a single organization setup.
No description provided by the author
UseOrgFromRequestData returns the organization from the request data.
No description provided by the author
ValidateBuiltInRoles errors when a built-in role does not match expected pattern.
ValidateFixedRole errors when a fixed role does not match expected pattern.
No description provided by the author
No description provided by the author
WildcardsFromPrefixes generates valid wildcards from prefixes datasource:uid: => "*", "datasource:*", "datasource:uid:*".

# Constants

Alerting instances (+silences) actions.
No description provided by the author
No description provided by the author
External alerting instances actions.
No description provided by the author
No description provided by the author
External alerting notifications actions.
No description provided by the author
No description provided by the author
Alerting Notification actions (legacy).
No description provided by the author
Alerting notifications template actions.
No description provided by the author
No description provided by the author
Alerting notifications time interval actions.
No description provided by the author
No description provided by the author
Alerting provisioning actions.
No description provided by the author
ActionAlertingProvisioningSetStatus Gives access to set provisioning status to alerting resources.
No description provided by the author
No description provided by the author
No description provided by the author
Alerting receiver actions.
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
Alerting routes policies actions.
No description provided by the author
Alerting rules actions.
No description provided by the author
No description provided by the author
External alerting rule actions.
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
Annotations related actions.
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
Datasources actions.
Feature Management actions.
No description provided by the author
No description provided by the author
No description provided by the author
LDAP actions.
No description provided by the author
Library Panel actions.
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
Org actions.
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
Server actions.
Settings actions.
No description provided by the author
Team related actions.
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
Usage stats actions.
We can ignore gosec G101 since this does not contain any credentials.
We can ignore gosec G101 since this does not contain any credentials.
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
We can ignore gosec G101 since this does not contain any credentials.
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
Users actions.
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
APIKeys scope.
Global Scopes.
Settings scope.
No description provided by the author
Team related scopes.
Users scope.
No description provided by the author

# Variables

ApiKeyAccessEvaluator is used to protect the "Configuration > API keys" page access.
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
Note: these are intended to be replaced by equivalent errutil implementations.
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
OrgPreferencesAccessEvaluator is used to protect the "Configure > Preferences" page access.
OrgsAccessEvaluator is used to protect the "Server Admin > Orgs" page access (you need to have read access to update or delete orgs; read is the minimum).
OrgsCreateAccessEvaluator is used to protect the "Server Admin > Orgs > New Org" page access.
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
Annotation scopes.
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
Team scope.
Roles definition.
TeamsAccessEvaluator is used to protect the "Configuration > Teams" page access grants access to a user when they can either create teams or can read and update a team.
TeamsEditAccessEvaluator is used to protect the "Configuration > Teams > edit" page access.

# Structs

No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
Permission is the model for access control permissions.
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
ResourcePermission is structure that holds all actions that either a team / user / builtin-role can perform against specific resource.
Role is the model for Role in RBAC.
swagger:ignore.
swagger:model RoleDTO.
RoleRegistration stores a role and its assignments to built-in roles (Viewer, Editor, Admin, Grafana Admin).
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author

# Interfaces

No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
No description provided by the author
ResourceResolver is called before authorization is performed.
No description provided by the author
ScopeAttributeResolver is used to resolve attributes in scopes to one or more scopes that are evaluated by logical or.
ScopeProvider provides methods that construct scopes.
No description provided by the author
No description provided by the author
go:generate mockery --name Store --structname MockStore --outpkg actest --filename store_mock.go --output ./actest/.
No description provided by the author

# Type aliases

No description provided by the author
Metadata contains user accesses for a given resource Ex: map[string]bool{"create":true, "delete": true}.
No description provided by the author
ResourceResolverFunc is an adapter so that functions can implement ResourceResolver.
No description provided by the author
ScopeAttributeResolverFunc is an adapter to allow functions to implement ScopeAttributeResolver interface.
No description provided by the author