github.com/goharbor/go-client@v0.210.0/pkg/sdk/v2.0/models/configurations.go (about) 1 // Code generated by go-swagger; DO NOT EDIT. 2 3 package models 4 5 // This file was generated by the swagger tool. 6 // Editing this file might prove futile when you re-run the swagger generate command 7 8 import ( 9 "context" 10 11 "github.com/go-openapi/strfmt" 12 "github.com/go-openapi/swag" 13 ) 14 15 // Configurations configurations 16 // 17 // swagger:model Configurations 18 type Configurations struct { 19 20 // The audit log forward endpoint 21 AuditLogForwardEndpoint *string `json:"audit_log_forward_endpoint,omitempty"` 22 23 // The auth mode of current system, such as "db_auth", "ldap_auth", "oidc_auth" 24 AuthMode *string `json:"auth_mode,omitempty"` 25 26 // The banner message for the UI.It is the stringified result of the banner message object 27 BannerMessage *string `json:"banner_message,omitempty"` 28 29 // The group which has the harbor admin privileges 30 HTTPAuthproxyAdminGroups *string `json:"http_authproxy_admin_groups,omitempty"` 31 32 // The username which has the harbor admin privileges 33 HTTPAuthproxyAdminUsernames *string `json:"http_authproxy_admin_usernames,omitempty"` 34 35 // The endpoint of the HTTP auth 36 HTTPAuthproxyEndpoint *string `json:"http_authproxy_endpoint,omitempty"` 37 38 // The certificate of the HTTP auth provider 39 HTTPAuthproxyServerCertificate *string `json:"http_authproxy_server_certificate,omitempty"` 40 41 // Search user before onboard 42 HTTPAuthproxySkipSearch *bool `json:"http_authproxy_skip_search,omitempty"` 43 44 // The token review endpoint 45 HTTPAuthproxyTokenreviewEndpoint *string `json:"http_authproxy_tokenreview_endpoint,omitempty"` 46 47 // Verify the HTTP auth provider's certificate 48 HTTPAuthproxyVerifyCert *bool `json:"http_authproxy_verify_cert,omitempty"` 49 50 // The Base DN for LDAP binding. 51 LdapBaseDn *string `json:"ldap_base_dn,omitempty"` 52 53 // The filter for LDAP search 54 LdapFilter *string `json:"ldap_filter,omitempty"` 55 56 // Specify the ldap group which have the same privilege with Harbor admin 57 LdapGroupAdminDn *string `json:"ldap_group_admin_dn,omitempty"` 58 59 // The attribute which is used as identity of the LDAP group, default is cn.' 60 LdapGroupAttributeName *string `json:"ldap_group_attribute_name,omitempty"` 61 62 // The base DN to search LDAP group. 63 LdapGroupBaseDn *string `json:"ldap_group_base_dn,omitempty"` 64 65 // The user attribute to identify the group membership 66 LdapGroupMembershipAttribute *string `json:"ldap_group_membership_attribute,omitempty"` 67 68 // The filter to search the ldap group 69 LdapGroupSearchFilter *string `json:"ldap_group_search_filter,omitempty"` 70 71 // The scope to search ldap group. ''0-LDAP_SCOPE_BASE, 1-LDAP_SCOPE_ONELEVEL, 2-LDAP_SCOPE_SUBTREE'' 72 LdapGroupSearchScope *int64 `json:"ldap_group_search_scope,omitempty"` 73 74 // The scope to search ldap users,'0-LDAP_SCOPE_BASE, 1-LDAP_SCOPE_ONELEVEL, 2-LDAP_SCOPE_SUBTREE' 75 LdapScope *int64 `json:"ldap_scope,omitempty"` 76 77 // The DN of the user to do the search. 78 LdapSearchDn *string `json:"ldap_search_dn,omitempty"` 79 80 // The password of the ldap search dn 81 LdapSearchPassword *string `json:"ldap_search_password,omitempty"` 82 83 // Timeout in seconds for connection to LDAP server 84 LdapTimeout *int64 `json:"ldap_timeout,omitempty"` 85 86 // The attribute which is used as identity for the LDAP binding, such as "CN" or "SAMAccountname" 87 LdapUID *string `json:"ldap_uid,omitempty"` 88 89 // The URL of LDAP server 90 LdapURL *string `json:"ldap_url,omitempty"` 91 92 // Whether verify your OIDC server certificate, disable it if your OIDC server is hosted via self-hosted certificate. 93 LdapVerifyCert *bool `json:"ldap_verify_cert,omitempty"` 94 95 // Enable notification 96 NotificationEnable *bool `json:"notification_enable,omitempty"` 97 98 // The OIDC group which has the harbor admin privileges 99 OIDCAdminGroup *string `json:"oidc_admin_group,omitempty"` 100 101 // Auto onboard the OIDC user 102 OIDCAutoOnboard *bool `json:"oidc_auto_onboard,omitempty"` 103 104 // The client ID of the OIDC provider 105 OIDCClientID *string `json:"oidc_client_id,omitempty"` 106 107 // The OIDC provider secret 108 OIDCClientSecret *string `json:"oidc_client_secret,omitempty"` 109 110 // The endpoint of the OIDC provider 111 OIDCEndpoint *string `json:"oidc_endpoint,omitempty"` 112 113 // Extra parameters to add when redirect request to OIDC provider 114 OIDCExtraRedirectParms *string `json:"oidc_extra_redirect_parms,omitempty"` 115 116 // The OIDC group filter which filters out the group name doesn't match the regular expression 117 OIDCGroupFilter *string `json:"oidc_group_filter,omitempty"` 118 119 // The attribute claims the group name 120 OIDCGroupsClaim *string `json:"oidc_groups_claim,omitempty"` 121 122 // The OIDC provider name 123 OIDCName *string `json:"oidc_name,omitempty"` 124 125 // The scope of the OIDC provider 126 OIDCScope *string `json:"oidc_scope,omitempty"` 127 128 // The attribute claims the username 129 OIDCUserClaim *string `json:"oidc_user_claim,omitempty"` 130 131 // Verify the OIDC provider's certificate' 132 OIDCVerifyCert *bool `json:"oidc_verify_cert,omitempty"` 133 134 // The flag to indicate whether the current auth mode should consider as a primary one. 135 PrimaryAuthMode *bool `json:"primary_auth_mode,omitempty"` 136 137 // Indicate who can create projects, it could be ''adminonly'' or ''everyone''. 138 ProjectCreationRestriction *string `json:"project_creation_restriction,omitempty"` 139 140 // Enable quota per project 141 QuotaPerProjectEnable *bool `json:"quota_per_project_enable,omitempty"` 142 143 // The flag to indicate whether Harbor is in readonly mode. 144 ReadOnly *bool `json:"read_only,omitempty"` 145 146 // The rebot account name prefix 147 RobotNamePrefix *string `json:"robot_name_prefix,omitempty"` 148 149 // The robot account token duration in days 150 RobotTokenDuration *int64 `json:"robot_token_duration,omitempty"` 151 152 // Whether or not to skip update pull time for scanner 153 ScannerSkipUpdatePulltime *bool `json:"scanner_skip_update_pulltime,omitempty"` 154 155 // Whether the Harbor instance supports self-registration. If it''s set to false, admin need to add user to the instance. 156 SelfRegistration *bool `json:"self_registration,omitempty"` 157 158 // The session timeout for harbor, in minutes. 159 SessionTimeout *int64 `json:"session_timeout,omitempty"` 160 161 // Skip audit log database 162 SkipAuditLogDatabase *bool `json:"skip_audit_log_database,omitempty"` 163 164 // The storage quota per project 165 StoragePerProject *int64 `json:"storage_per_project,omitempty"` 166 167 // The expiration time of the token for internal Registry, in minutes. 168 TokenExpiration *int64 `json:"token_expiration,omitempty"` 169 170 // The client id of UAA 171 UaaClientID *string `json:"uaa_client_id,omitempty"` 172 173 // The client secret of the UAA 174 UaaClientSecret *string `json:"uaa_client_secret,omitempty"` 175 176 // The endpoint of the UAA 177 UaaEndpoint *string `json:"uaa_endpoint,omitempty"` 178 179 // Verify the certificate in UAA server 180 UaaVerifyCert *bool `json:"uaa_verify_cert,omitempty"` 181 } 182 183 // Validate validates this configurations 184 func (m *Configurations) Validate(formats strfmt.Registry) error { 185 return nil 186 } 187 188 // ContextValidate validates this configurations based on context it is used 189 func (m *Configurations) ContextValidate(ctx context.Context, formats strfmt.Registry) error { 190 return nil 191 } 192 193 // MarshalBinary interface implementation 194 func (m *Configurations) MarshalBinary() ([]byte, error) { 195 if m == nil { 196 return nil, nil 197 } 198 return swag.WriteJSON(m) 199 } 200 201 // UnmarshalBinary interface implementation 202 func (m *Configurations) UnmarshalBinary(b []byte) error { 203 var res Configurations 204 if err := swag.ReadJSON(b, &res); err != nil { 205 return err 206 } 207 *m = res 208 return nil 209 }