github.com/goharbor/go-client@v0.210.0/pkg/sdk/v2.0/models/configurations.go (about)

     1  // Code generated by go-swagger; DO NOT EDIT.
     2  
     3  package models
     4  
     5  // This file was generated by the swagger tool.
     6  // Editing this file might prove futile when you re-run the swagger generate command
     7  
     8  import (
     9  	"context"
    10  
    11  	"github.com/go-openapi/strfmt"
    12  	"github.com/go-openapi/swag"
    13  )
    14  
    15  // Configurations configurations
    16  //
    17  // swagger:model Configurations
    18  type Configurations struct {
    19  
    20  	// The audit log forward endpoint
    21  	AuditLogForwardEndpoint *string `json:"audit_log_forward_endpoint,omitempty"`
    22  
    23  	// The auth mode of current system, such as "db_auth", "ldap_auth", "oidc_auth"
    24  	AuthMode *string `json:"auth_mode,omitempty"`
    25  
    26  	// The banner message for the UI.It is the stringified result of the banner message object
    27  	BannerMessage *string `json:"banner_message,omitempty"`
    28  
    29  	// The group which has the harbor admin privileges
    30  	HTTPAuthproxyAdminGroups *string `json:"http_authproxy_admin_groups,omitempty"`
    31  
    32  	// The username which has the harbor admin privileges
    33  	HTTPAuthproxyAdminUsernames *string `json:"http_authproxy_admin_usernames,omitempty"`
    34  
    35  	// The endpoint of the HTTP auth
    36  	HTTPAuthproxyEndpoint *string `json:"http_authproxy_endpoint,omitempty"`
    37  
    38  	// The certificate of the HTTP auth provider
    39  	HTTPAuthproxyServerCertificate *string `json:"http_authproxy_server_certificate,omitempty"`
    40  
    41  	// Search user before onboard
    42  	HTTPAuthproxySkipSearch *bool `json:"http_authproxy_skip_search,omitempty"`
    43  
    44  	// The token review endpoint
    45  	HTTPAuthproxyTokenreviewEndpoint *string `json:"http_authproxy_tokenreview_endpoint,omitempty"`
    46  
    47  	// Verify the HTTP auth provider's certificate
    48  	HTTPAuthproxyVerifyCert *bool `json:"http_authproxy_verify_cert,omitempty"`
    49  
    50  	// The Base DN for LDAP binding.
    51  	LdapBaseDn *string `json:"ldap_base_dn,omitempty"`
    52  
    53  	// The filter for LDAP search
    54  	LdapFilter *string `json:"ldap_filter,omitempty"`
    55  
    56  	// Specify the ldap group which have the same privilege with Harbor admin
    57  	LdapGroupAdminDn *string `json:"ldap_group_admin_dn,omitempty"`
    58  
    59  	// The attribute which is used as identity of the LDAP group, default is cn.'
    60  	LdapGroupAttributeName *string `json:"ldap_group_attribute_name,omitempty"`
    61  
    62  	// The base DN to search LDAP group.
    63  	LdapGroupBaseDn *string `json:"ldap_group_base_dn,omitempty"`
    64  
    65  	// The user attribute to identify the group membership
    66  	LdapGroupMembershipAttribute *string `json:"ldap_group_membership_attribute,omitempty"`
    67  
    68  	// The filter to search the ldap group
    69  	LdapGroupSearchFilter *string `json:"ldap_group_search_filter,omitempty"`
    70  
    71  	// The scope to search ldap group. ''0-LDAP_SCOPE_BASE, 1-LDAP_SCOPE_ONELEVEL, 2-LDAP_SCOPE_SUBTREE''
    72  	LdapGroupSearchScope *int64 `json:"ldap_group_search_scope,omitempty"`
    73  
    74  	// The scope to search ldap users,'0-LDAP_SCOPE_BASE, 1-LDAP_SCOPE_ONELEVEL, 2-LDAP_SCOPE_SUBTREE'
    75  	LdapScope *int64 `json:"ldap_scope,omitempty"`
    76  
    77  	// The DN of the user to do the search.
    78  	LdapSearchDn *string `json:"ldap_search_dn,omitempty"`
    79  
    80  	// The password of the ldap search dn
    81  	LdapSearchPassword *string `json:"ldap_search_password,omitempty"`
    82  
    83  	// Timeout in seconds for connection to LDAP server
    84  	LdapTimeout *int64 `json:"ldap_timeout,omitempty"`
    85  
    86  	// The attribute which is used as identity for the LDAP binding, such as "CN" or "SAMAccountname"
    87  	LdapUID *string `json:"ldap_uid,omitempty"`
    88  
    89  	// The URL of LDAP server
    90  	LdapURL *string `json:"ldap_url,omitempty"`
    91  
    92  	// Whether verify your OIDC server certificate, disable it if your OIDC server is hosted via self-hosted certificate.
    93  	LdapVerifyCert *bool `json:"ldap_verify_cert,omitempty"`
    94  
    95  	// Enable notification
    96  	NotificationEnable *bool `json:"notification_enable,omitempty"`
    97  
    98  	// The OIDC group which has the harbor admin privileges
    99  	OIDCAdminGroup *string `json:"oidc_admin_group,omitempty"`
   100  
   101  	// Auto onboard the OIDC user
   102  	OIDCAutoOnboard *bool `json:"oidc_auto_onboard,omitempty"`
   103  
   104  	// The client ID of the OIDC provider
   105  	OIDCClientID *string `json:"oidc_client_id,omitempty"`
   106  
   107  	// The OIDC provider secret
   108  	OIDCClientSecret *string `json:"oidc_client_secret,omitempty"`
   109  
   110  	// The endpoint of the OIDC provider
   111  	OIDCEndpoint *string `json:"oidc_endpoint,omitempty"`
   112  
   113  	// Extra parameters to add when redirect request to OIDC provider
   114  	OIDCExtraRedirectParms *string `json:"oidc_extra_redirect_parms,omitempty"`
   115  
   116  	// The OIDC group filter which filters out the group name doesn't match the regular expression
   117  	OIDCGroupFilter *string `json:"oidc_group_filter,omitempty"`
   118  
   119  	// The attribute claims the group name
   120  	OIDCGroupsClaim *string `json:"oidc_groups_claim,omitempty"`
   121  
   122  	// The OIDC provider name
   123  	OIDCName *string `json:"oidc_name,omitempty"`
   124  
   125  	// The scope of the OIDC provider
   126  	OIDCScope *string `json:"oidc_scope,omitempty"`
   127  
   128  	// The attribute claims the username
   129  	OIDCUserClaim *string `json:"oidc_user_claim,omitempty"`
   130  
   131  	// Verify the OIDC provider's certificate'
   132  	OIDCVerifyCert *bool `json:"oidc_verify_cert,omitempty"`
   133  
   134  	// The flag to indicate whether the current auth mode should consider as a primary one.
   135  	PrimaryAuthMode *bool `json:"primary_auth_mode,omitempty"`
   136  
   137  	// Indicate who can create projects, it could be ''adminonly'' or ''everyone''.
   138  	ProjectCreationRestriction *string `json:"project_creation_restriction,omitempty"`
   139  
   140  	// Enable quota per project
   141  	QuotaPerProjectEnable *bool `json:"quota_per_project_enable,omitempty"`
   142  
   143  	// The flag to indicate whether Harbor is in readonly mode.
   144  	ReadOnly *bool `json:"read_only,omitempty"`
   145  
   146  	// The rebot account name prefix
   147  	RobotNamePrefix *string `json:"robot_name_prefix,omitempty"`
   148  
   149  	// The robot account token duration in days
   150  	RobotTokenDuration *int64 `json:"robot_token_duration,omitempty"`
   151  
   152  	// Whether or not to skip update pull time for scanner
   153  	ScannerSkipUpdatePulltime *bool `json:"scanner_skip_update_pulltime,omitempty"`
   154  
   155  	// Whether the Harbor instance supports self-registration.  If it''s set to false, admin need to add user to the instance.
   156  	SelfRegistration *bool `json:"self_registration,omitempty"`
   157  
   158  	// The session timeout for harbor, in minutes.
   159  	SessionTimeout *int64 `json:"session_timeout,omitempty"`
   160  
   161  	// Skip audit log database
   162  	SkipAuditLogDatabase *bool `json:"skip_audit_log_database,omitempty"`
   163  
   164  	// The storage quota per project
   165  	StoragePerProject *int64 `json:"storage_per_project,omitempty"`
   166  
   167  	// The expiration time of the token for internal Registry, in minutes.
   168  	TokenExpiration *int64 `json:"token_expiration,omitempty"`
   169  
   170  	// The client id of UAA
   171  	UaaClientID *string `json:"uaa_client_id,omitempty"`
   172  
   173  	// The client secret of the UAA
   174  	UaaClientSecret *string `json:"uaa_client_secret,omitempty"`
   175  
   176  	// The endpoint of the UAA
   177  	UaaEndpoint *string `json:"uaa_endpoint,omitempty"`
   178  
   179  	// Verify the certificate in UAA server
   180  	UaaVerifyCert *bool `json:"uaa_verify_cert,omitempty"`
   181  }
   182  
   183  // Validate validates this configurations
   184  func (m *Configurations) Validate(formats strfmt.Registry) error {
   185  	return nil
   186  }
   187  
   188  // ContextValidate validates this configurations based on context it is used
   189  func (m *Configurations) ContextValidate(ctx context.Context, formats strfmt.Registry) error {
   190  	return nil
   191  }
   192  
   193  // MarshalBinary interface implementation
   194  func (m *Configurations) MarshalBinary() ([]byte, error) {
   195  	if m == nil {
   196  		return nil, nil
   197  	}
   198  	return swag.WriteJSON(m)
   199  }
   200  
   201  // UnmarshalBinary interface implementation
   202  func (m *Configurations) UnmarshalBinary(b []byte) error {
   203  	var res Configurations
   204  	if err := swag.ReadJSON(b, &res); err != nil {
   205  		return err
   206  	}
   207  	*m = res
   208  	return nil
   209  }