Skip to content

Commit f138df1

Browse files
OAS Update
1 parent 813cd5f commit f138df1

File tree

1 file changed

+16
-6
lines changed

1 file changed

+16
-6
lines changed

services/observability/v1/observability.json

Lines changed: 16 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1667,6 +1667,11 @@
16671667
},
16681668
"GrafanaOauth": {
16691669
"properties": {
1670+
"allowAssignGrafanaAdmin": {
1671+
"default": false,
1672+
"title": "Allowassigngrafanaadmin",
1673+
"type": "boolean"
1674+
},
16701675
"apiUrl": {
16711676
"maxLength": 300,
16721677
"minLength": 1,
@@ -3942,6 +3947,11 @@
39423947
"properties": {
39433948
"genericOauth": {
39443949
"properties": {
3950+
"allowAssignGrafanaAdmin": {
3951+
"default": false,
3952+
"description": "Set to true to enable automatic sync of the Grafana server administrator role. \nIf this option is set to true and the result of evaluating role_attribute_path for \na user is GrafanaAdmin, Grafana grants the user the server administrator privileges and \norganization administrator role. If this option is set to false and the result of \nevaluating role_attribute_path for a user is GrafanaAdmin, Grafana grants the user \nonly organization administrator role.",
3953+
"type": "boolean"
3954+
},
39453955
"apiUrl": {
39463956
"description": "Set api_url to the resource that returns OpenID UserInfo compatible information.",
39473957
"type": "string"
@@ -3951,7 +3961,7 @@
39513961
"type": "string"
39523962
},
39533963
"enabled": {
3954-
"description": "enable or disable generic oauth login",
3964+
"description": "Enable or disable generic oauth login",
39553965
"type": "boolean"
39563966
},
39573967
"name": {
@@ -3967,12 +3977,12 @@
39673977
"type": "string"
39683978
},
39693979
"roleAttributePath": {
3970-
"description": "Grafana checks for the presence of a role using the JMESPath specified via the role_attribute_path configuration option. The JMESPath is applied to the id_token first. If there is no match, then the UserInfo endpoint specified via the api_url configuration option is tried next. The result after evaluation of the role_attribute_path JMESPath expression should be a valid Grafana role, for example, Viewer, Editor or Admin\nFor example: contains(roles[\\*], 'grafana-admin') \u0026\u0026 'Admin' || contains(roles[\\*], 'grafana-editor') \u0026\u0026 'Editor' || contains(roles[\\*], 'grafana-viewer') \u0026\u0026 'Viewer'",
3980+
"description": "Grafana checks for the presence of a role using the JMESPath specified via the \nrole_attribute_path configuration option. The JMESPath is applied to the id_token first. \nIf there is no match, then the UserInfo endpoint specified via the api_url configuration \noption is tried next. The result after evaluation of the role_attribute_path JMESPath \nexpression should be a valid Grafana role, for example, Viewer, Editor or Admin\nFor example: contains(roles[\\*], 'grafana-admin') \u0026\u0026 'Admin' || contains(roles[\\*], \n'grafana-editor') \u0026\u0026 'Editor' || contains(roles[\\*], 'grafana-viewer') \u0026\u0026 'Viewer'",
39713981
"type": "string"
39723982
},
39733983
"roleAttributeStrict": {
39743984
"default": true,
3975-
"description": "If therole_attribute_path property does not return a role, then the user is assigned the Viewer role by default. You can disable the role assignment by setting role_attribute_strict = true. It denies user access if no role or an invalid role is returned.",
3985+
"description": "If the role_attribute_path property does not return a role, then the user is assigned the Viewer role by default. You can disable the role assignment by setting role_attribute_strict = true. It denies user access if no role or an invalid role is returned.",
39763986
"type": "boolean"
39773987
},
39783988
"scopes": {
@@ -3985,7 +3995,7 @@
39853995
"type": "string"
39863996
},
39873997
"usePkce": {
3988-
"description": "enable or disable Proof Key for Code Exchange",
3998+
"description": "Enable or disable Proof Key for Code Exchange",
39893999
"type": "boolean"
39904000
}
39914001
},
@@ -4001,11 +4011,11 @@
40014011
"type": "object"
40024012
},
40034013
"publicReadAccess": {
4004-
"description": "If it's true, anyone can access the Grafana dashboards without logging in. If it is wrong, a login is required.",
4014+
"description": "If it's true, anyone can access the Grafana dashboards without logging in. \nIf it is wrong, a login is required.",
40054015
"type": "boolean"
40064016
},
40074017
"useStackitSso": {
4008-
"description": "If it's true, it overwrites the current genericOauth config and configures STACKIT SSO for this instance.",
4018+
"description": "If it's true, it overwrites the current genericOauth config and configures \nSTACKIT SSO for this instance.",
40094019
"type": "boolean"
40104020
}
40114021
},

0 commit comments

Comments
 (0)