2017-05-08 08:35:34 -05:00
|
|
|
|
package api
|
|
|
|
|
|
|
|
|
|
import (
|
2022-03-03 08:05:47 -06:00
|
|
|
|
"context"
|
2021-11-29 03:18:01 -06:00
|
|
|
|
"net/http"
|
2022-01-14 10:55:57 -06:00
|
|
|
|
"strconv"
|
2017-06-21 18:02:03 -05:00
|
|
|
|
"time"
|
|
|
|
|
|
|
|
|
|
"github.com/grafana/grafana/pkg/api/dtos"
|
2021-01-15 07:43:20 -06:00
|
|
|
|
"github.com/grafana/grafana/pkg/api/response"
|
2024-01-24 05:39:11 -06:00
|
|
|
|
"github.com/grafana/grafana/pkg/infra/metrics"
|
2022-03-03 08:05:47 -06:00
|
|
|
|
"github.com/grafana/grafana/pkg/services/accesscontrol"
|
2023-08-24 08:37:54 -05:00
|
|
|
|
"github.com/grafana/grafana/pkg/services/auth/identity"
|
2023-01-27 01:50:36 -06:00
|
|
|
|
contextmodel "github.com/grafana/grafana/pkg/services/contexthandler/model"
|
2023-01-18 06:52:41 -06:00
|
|
|
|
"github.com/grafana/grafana/pkg/services/dashboards"
|
2023-11-22 07:20:22 -06:00
|
|
|
|
"github.com/grafana/grafana/pkg/services/dashboards/dashboardaccess"
|
2023-08-24 08:37:54 -05:00
|
|
|
|
"github.com/grafana/grafana/pkg/services/org"
|
2021-11-29 03:18:01 -06:00
|
|
|
|
"github.com/grafana/grafana/pkg/web"
|
2017-05-08 08:35:34 -05:00
|
|
|
|
)
|
|
|
|
|
|
2022-07-27 08:54:37 -05:00
|
|
|
|
// swagger:route GET /dashboards/uid/{uid}/permissions dashboard_permissions getDashboardPermissionsListByUID
|
|
|
|
|
//
|
|
|
|
|
// Gets all existing permissions for the given dashboard.
|
|
|
|
|
//
|
|
|
|
|
// Responses:
|
|
|
|
|
// 200: getDashboardPermissionsListResponse
|
|
|
|
|
// 401: unauthorisedError
|
|
|
|
|
// 403: forbiddenError
|
|
|
|
|
// 404: notFoundError
|
|
|
|
|
// 500: internalServerError
|
|
|
|
|
|
|
|
|
|
// swagger:route GET /dashboards/id/{DashboardID}/permissions dashboard_permissions getDashboardPermissionsListByID
|
|
|
|
|
//
|
|
|
|
|
// Gets all existing permissions for the given dashboard.
|
|
|
|
|
//
|
|
|
|
|
// Please refer to [updated API](#/dashboard_permissions/getDashboardPermissionsListByUID) instead
|
|
|
|
|
//
|
|
|
|
|
// Deprecated: true
|
|
|
|
|
//
|
|
|
|
|
// Responses:
|
|
|
|
|
// 200: getDashboardPermissionsListResponse
|
|
|
|
|
// 401: unauthorisedError
|
|
|
|
|
// 403: forbiddenError
|
|
|
|
|
// 404: notFoundError
|
|
|
|
|
// 500: internalServerError
|
2023-01-27 01:50:36 -06:00
|
|
|
|
func (hs *HTTPServer) GetDashboardPermissionList(c *contextmodel.ReqContext) response.Response {
|
2022-04-21 09:24:03 -05:00
|
|
|
|
var dashID int64
|
|
|
|
|
var err error
|
|
|
|
|
dashUID := web.Params(c.Req)[":uid"]
|
|
|
|
|
if dashUID == "" {
|
|
|
|
|
dashID, err = strconv.ParseInt(web.Params(c.Req)[":dashboardId"], 10, 64)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return response.Error(http.StatusBadRequest, "dashboardId is invalid", err)
|
|
|
|
|
}
|
2022-01-14 10:55:57 -06:00
|
|
|
|
}
|
2017-05-08 08:35:34 -05:00
|
|
|
|
|
2023-10-06 04:34:36 -05:00
|
|
|
|
dash, rsp := hs.getDashboardHelper(c.Req.Context(), c.SignedInUser.GetOrgID(), dashID, dashUID)
|
2018-02-12 02:26:09 -06:00
|
|
|
|
if rsp != nil {
|
|
|
|
|
return rsp
|
|
|
|
|
}
|
|
|
|
|
|
2023-08-24 08:37:54 -05:00
|
|
|
|
acl, err := hs.getDashboardACL(c.Req.Context(), c.SignedInUser, dash)
|
2017-06-22 16:10:43 -05:00
|
|
|
|
if err != nil {
|
2024-02-27 10:39:51 -06:00
|
|
|
|
return response.Error(http.StatusInternalServerError, "Failed to get dashboard permissions", err)
|
2017-05-08 08:35:34 -05:00
|
|
|
|
}
|
|
|
|
|
|
2023-01-20 07:58:47 -06:00
|
|
|
|
filteredACLs := make([]*dashboards.DashboardACLInfoDTO, 0, len(acl))
|
2018-02-05 07:28:24 -06:00
|
|
|
|
for _, perm := range acl {
|
2023-01-20 07:58:47 -06:00
|
|
|
|
if perm.UserID > 0 && dtos.IsHiddenUser(perm.UserLogin, c.SignedInUser, hs.Cfg) {
|
2020-11-24 05:10:32 -06:00
|
|
|
|
continue
|
|
|
|
|
}
|
|
|
|
|
|
2024-01-23 05:36:22 -06:00
|
|
|
|
perm.UserAvatarURL = dtos.GetGravatarUrl(hs.Cfg, perm.UserEmail)
|
2018-04-04 08:50:45 -05:00
|
|
|
|
|
2023-01-20 07:58:47 -06:00
|
|
|
|
if perm.TeamID > 0 {
|
2024-01-23 05:36:22 -06:00
|
|
|
|
perm.TeamAvatarURL = dtos.GetGravatarUrlWithDefault(hs.Cfg, perm.TeamEmail, perm.Team)
|
2018-04-04 08:50:45 -05:00
|
|
|
|
}
|
2018-02-05 07:28:24 -06:00
|
|
|
|
if perm.Slug != "" {
|
2023-01-20 07:58:47 -06:00
|
|
|
|
perm.URL = dashboards.GetDashboardFolderURL(perm.IsFolder, perm.UID, perm.Slug)
|
2018-02-05 07:28:24 -06:00
|
|
|
|
}
|
2020-11-24 05:10:32 -06:00
|
|
|
|
|
2022-07-18 08:14:58 -05:00
|
|
|
|
filteredACLs = append(filteredACLs, perm)
|
2018-02-05 07:28:24 -06:00
|
|
|
|
}
|
|
|
|
|
|
2022-07-18 08:14:58 -05:00
|
|
|
|
return response.JSON(http.StatusOK, filteredACLs)
|
2017-05-08 08:35:34 -05:00
|
|
|
|
}
|
2017-05-22 03:36:47 -05:00
|
|
|
|
|
2022-07-27 08:54:37 -05:00
|
|
|
|
// swagger:route POST /dashboards/uid/{uid}/permissions dashboard_permissions updateDashboardPermissionsByUID
|
|
|
|
|
//
|
|
|
|
|
// Updates permissions for a dashboard.
|
|
|
|
|
//
|
|
|
|
|
// This operation will remove existing permissions if they’re not included in the request.
|
|
|
|
|
//
|
|
|
|
|
// Responses:
|
|
|
|
|
// 200: okResponse
|
|
|
|
|
// 400: badRequestError
|
|
|
|
|
// 401: unauthorisedError
|
|
|
|
|
// 403: forbiddenError
|
|
|
|
|
// 404: notFoundError
|
|
|
|
|
// 500: internalServerError
|
|
|
|
|
|
|
|
|
|
// swagger:route POST /dashboards/id/{DashboardID}/permissions dashboard_permissions updateDashboardPermissionsByID
|
|
|
|
|
//
|
|
|
|
|
// Updates permissions for a dashboard.
|
|
|
|
|
//
|
|
|
|
|
// Please refer to [updated API](#/dashboard_permissions/updateDashboardPermissionsByUID) instead
|
|
|
|
|
//
|
|
|
|
|
// This operation will remove existing permissions if they’re not included in the request.
|
|
|
|
|
//
|
|
|
|
|
// Deprecated: true
|
|
|
|
|
//
|
|
|
|
|
// Responses:
|
|
|
|
|
// 200: okResponse
|
|
|
|
|
// 400: badRequestError
|
|
|
|
|
// 401: unauthorisedError
|
|
|
|
|
// 403: forbiddenError
|
|
|
|
|
// 404: notFoundError
|
|
|
|
|
// 500: internalServerError
|
2023-01-27 01:50:36 -06:00
|
|
|
|
func (hs *HTTPServer) UpdateDashboardPermissions(c *contextmodel.ReqContext) response.Response {
|
2022-04-21 09:24:03 -05:00
|
|
|
|
var dashID int64
|
|
|
|
|
var err error
|
2022-07-18 08:14:58 -05:00
|
|
|
|
apiCmd := dtos.UpdateDashboardACLCommand{}
|
2021-11-29 03:18:01 -06:00
|
|
|
|
if err := web.Bind(c.Req, &apiCmd); err != nil {
|
|
|
|
|
return response.Error(http.StatusBadRequest, "bad request data", err)
|
|
|
|
|
}
|
2020-11-18 08:36:41 -06:00
|
|
|
|
if err := validatePermissionsUpdate(apiCmd); err != nil {
|
2024-02-27 10:39:51 -06:00
|
|
|
|
return response.Error(http.StatusBadRequest, err.Error(), err)
|
2020-11-18 08:36:41 -06:00
|
|
|
|
}
|
|
|
|
|
|
2022-04-21 09:24:03 -05:00
|
|
|
|
dashUID := web.Params(c.Req)[":uid"]
|
|
|
|
|
if dashUID == "" {
|
|
|
|
|
dashID, err = strconv.ParseInt(web.Params(c.Req)[":dashboardId"], 10, 64)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return response.Error(http.StatusBadRequest, "dashboardId is invalid", err)
|
|
|
|
|
}
|
2022-01-14 10:55:57 -06:00
|
|
|
|
}
|
2017-06-19 12:47:44 -05:00
|
|
|
|
|
2023-10-06 04:34:36 -05:00
|
|
|
|
dash, rsp := hs.getDashboardHelper(c.Req.Context(), c.SignedInUser.GetOrgID(), dashID, dashUID)
|
2018-02-12 02:26:09 -06:00
|
|
|
|
if rsp != nil {
|
|
|
|
|
return rsp
|
|
|
|
|
}
|
|
|
|
|
|
2023-01-20 07:58:47 -06:00
|
|
|
|
items := make([]*dashboards.DashboardACL, 0, len(apiCmd.Items))
|
2017-06-21 18:02:03 -05:00
|
|
|
|
for _, item := range apiCmd.Items {
|
2023-01-20 07:58:47 -06:00
|
|
|
|
items = append(items, &dashboards.DashboardACL{
|
2023-10-06 04:34:36 -05:00
|
|
|
|
OrgID: c.SignedInUser.GetOrgID(),
|
2020-11-17 10:09:14 -06:00
|
|
|
|
DashboardID: dashID,
|
|
|
|
|
UserID: item.UserID,
|
|
|
|
|
TeamID: item.TeamID,
|
2017-06-21 18:02:03 -05:00
|
|
|
|
Role: item.Role,
|
|
|
|
|
Permission: item.Permission,
|
|
|
|
|
Created: time.Now(),
|
|
|
|
|
Updated: time.Now(),
|
|
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
|
2023-08-24 08:37:54 -05:00
|
|
|
|
acl, err := hs.getDashboardACL(c.Req.Context(), c.SignedInUser, dash)
|
2020-11-24 05:10:32 -06:00
|
|
|
|
if err != nil {
|
2023-08-24 08:37:54 -05:00
|
|
|
|
return response.Error(http.StatusInternalServerError, "Error while checking dashboard permissions", err)
|
2020-11-24 05:10:32 -06:00
|
|
|
|
}
|
|
|
|
|
|
2023-08-24 08:37:54 -05:00
|
|
|
|
items = append(items, hs.filterHiddenACL(c.SignedInUser, acl)...)
|
|
|
|
|
|
|
|
|
|
if err := hs.updateDashboardAccessControl(c.Req.Context(), dash.OrgID, dash.UID, false, items, acl); err != nil {
|
|
|
|
|
return response.Error(http.StatusInternalServerError, "Failed to update permissions", err)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return response.Success("Dashboard permissions updated")
|
|
|
|
|
}
|
|
|
|
|
|
2023-11-22 07:20:22 -06:00
|
|
|
|
var dashboardPermissionMap = map[string]dashboardaccess.PermissionType{
|
|
|
|
|
"View": dashboardaccess.PERMISSION_VIEW,
|
|
|
|
|
"Edit": dashboardaccess.PERMISSION_EDIT,
|
|
|
|
|
"Admin": dashboardaccess.PERMISSION_ADMIN,
|
2023-08-24 08:37:54 -05:00
|
|
|
|
}
|
2018-02-26 13:15:57 -06:00
|
|
|
|
|
2023-08-24 08:37:54 -05:00
|
|
|
|
func (hs *HTTPServer) getDashboardACL(ctx context.Context, user identity.Requester, dashboard *dashboards.Dashboard) ([]*dashboards.DashboardACLInfoDTO, error) {
|
|
|
|
|
permissions, err := hs.dashboardPermissionsService.GetPermissions(ctx, user, dashboard.UID)
|
|
|
|
|
if err != nil {
|
|
|
|
|
return nil, err
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
acl := make([]*dashboards.DashboardACLInfoDTO, 0, len(permissions))
|
|
|
|
|
for _, p := range permissions {
|
|
|
|
|
if !p.IsManaged {
|
|
|
|
|
continue
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
var role *org.RoleType
|
|
|
|
|
if p.BuiltInRole != "" {
|
|
|
|
|
tmp := org.RoleType(p.BuiltInRole)
|
|
|
|
|
role = &tmp
|
2018-01-18 07:30:04 -06:00
|
|
|
|
}
|
|
|
|
|
|
2023-08-24 08:37:54 -05:00
|
|
|
|
permission := dashboardPermissionMap[hs.dashboardPermissionsService.MapActions(p)]
|
|
|
|
|
|
2024-01-24 05:39:11 -06:00
|
|
|
|
metrics.MFolderIDsAPICount.WithLabelValues(metrics.GetDashboardACL).Inc()
|
2023-08-24 08:37:54 -05:00
|
|
|
|
acl = append(acl, &dashboards.DashboardACLInfoDTO{
|
|
|
|
|
OrgID: dashboard.OrgID,
|
|
|
|
|
DashboardID: dashboard.ID,
|
2023-11-15 09:28:50 -06:00
|
|
|
|
FolderID: dashboard.FolderID, // nolint:staticcheck
|
2023-08-24 08:37:54 -05:00
|
|
|
|
Created: p.Created,
|
|
|
|
|
Updated: p.Updated,
|
|
|
|
|
UserID: p.UserId,
|
|
|
|
|
UserLogin: p.UserLogin,
|
|
|
|
|
UserEmail: p.UserEmail,
|
|
|
|
|
TeamID: p.TeamId,
|
|
|
|
|
TeamEmail: p.TeamEmail,
|
|
|
|
|
Team: p.Team,
|
|
|
|
|
Role: role,
|
|
|
|
|
Permission: permission,
|
|
|
|
|
PermissionName: permission.String(),
|
|
|
|
|
UID: dashboard.UID,
|
|
|
|
|
Title: dashboard.Title,
|
|
|
|
|
Slug: dashboard.Slug,
|
|
|
|
|
IsFolder: dashboard.IsFolder,
|
|
|
|
|
URL: dashboard.GetURL(),
|
|
|
|
|
Inherited: false,
|
|
|
|
|
})
|
2018-01-18 07:30:04 -06:00
|
|
|
|
}
|
|
|
|
|
|
2023-08-24 08:37:54 -05:00
|
|
|
|
return acl, nil
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (hs *HTTPServer) filterHiddenACL(user identity.Requester, acl []*dashboards.DashboardACLInfoDTO) []*dashboards.DashboardACL {
|
|
|
|
|
var hiddenACL []*dashboards.DashboardACL
|
|
|
|
|
|
|
|
|
|
if user.GetIsGrafanaAdmin() {
|
|
|
|
|
return hiddenACL
|
2022-03-03 08:05:47 -06:00
|
|
|
|
}
|
2023-08-24 08:37:54 -05:00
|
|
|
|
|
|
|
|
|
for _, item := range acl {
|
|
|
|
|
if item.Inherited || item.UserLogin == user.GetLogin() {
|
|
|
|
|
continue
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if _, hidden := hs.Cfg.HiddenUsers[item.UserLogin]; hidden {
|
|
|
|
|
hiddenACL = append(hiddenACL, &dashboards.DashboardACL{
|
|
|
|
|
OrgID: item.OrgID,
|
|
|
|
|
DashboardID: item.DashboardID,
|
|
|
|
|
UserID: item.UserID,
|
|
|
|
|
TeamID: item.TeamID,
|
|
|
|
|
Role: item.Role,
|
|
|
|
|
Permission: item.Permission,
|
|
|
|
|
Created: item.Created,
|
|
|
|
|
Updated: item.Updated,
|
|
|
|
|
})
|
|
|
|
|
}
|
2017-06-09 14:56:13 -05:00
|
|
|
|
}
|
2023-08-24 08:37:54 -05:00
|
|
|
|
|
|
|
|
|
return hiddenACL
|
2017-06-09 14:56:13 -05:00
|
|
|
|
}
|
2020-11-18 08:36:41 -06:00
|
|
|
|
|
2022-03-03 08:05:47 -06:00
|
|
|
|
// updateDashboardAccessControl is used for api backward compatibility
|
2023-01-20 07:58:47 -06:00
|
|
|
|
func (hs *HTTPServer) updateDashboardAccessControl(ctx context.Context, orgID int64, uid string, isFolder bool, items []*dashboards.DashboardACL, old []*dashboards.DashboardACLInfoDTO) error {
|
2022-03-03 08:05:47 -06:00
|
|
|
|
commands := []accesscontrol.SetResourcePermissionCommand{}
|
|
|
|
|
for _, item := range items {
|
|
|
|
|
permissions := item.Permission.String()
|
|
|
|
|
role := ""
|
|
|
|
|
if item.Role != nil {
|
|
|
|
|
role = string(*item.Role)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
commands = append(commands, accesscontrol.SetResourcePermissionCommand{
|
|
|
|
|
UserID: item.UserID,
|
|
|
|
|
TeamID: item.TeamID,
|
|
|
|
|
BuiltinRole: role,
|
|
|
|
|
Permission: permissions,
|
|
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for _, o := range old {
|
|
|
|
|
shouldRemove := true
|
|
|
|
|
for _, item := range items {
|
2023-01-20 07:58:47 -06:00
|
|
|
|
if item.UserID != 0 && item.UserID == o.UserID {
|
2022-03-03 08:05:47 -06:00
|
|
|
|
shouldRemove = false
|
|
|
|
|
break
|
|
|
|
|
}
|
2023-01-20 07:58:47 -06:00
|
|
|
|
if item.TeamID != 0 && item.TeamID == o.TeamID {
|
2022-03-03 08:05:47 -06:00
|
|
|
|
shouldRemove = false
|
|
|
|
|
break
|
|
|
|
|
}
|
|
|
|
|
if item.Role != nil && o.Role != nil && *item.Role == *o.Role {
|
|
|
|
|
shouldRemove = false
|
|
|
|
|
break
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if shouldRemove {
|
|
|
|
|
role := ""
|
|
|
|
|
if o.Role != nil {
|
|
|
|
|
role = string(*o.Role)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
commands = append(commands, accesscontrol.SetResourcePermissionCommand{
|
2023-01-20 07:58:47 -06:00
|
|
|
|
UserID: o.UserID,
|
|
|
|
|
TeamID: o.TeamID,
|
2022-03-03 08:05:47 -06:00
|
|
|
|
BuiltinRole: role,
|
|
|
|
|
Permission: "",
|
|
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if isFolder {
|
2022-05-10 08:48:47 -05:00
|
|
|
|
if _, err := hs.folderPermissionsService.SetPermissions(ctx, orgID, uid, commands...); err != nil {
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
return nil
|
2022-03-03 08:05:47 -06:00
|
|
|
|
}
|
|
|
|
|
|
2022-05-10 08:48:47 -05:00
|
|
|
|
if _, err := hs.dashboardPermissionsService.SetPermissions(ctx, orgID, uid, commands...); err != nil {
|
|
|
|
|
return err
|
|
|
|
|
}
|
|
|
|
|
return nil
|
2022-03-03 08:05:47 -06:00
|
|
|
|
}
|
|
|
|
|
|
2022-07-18 08:14:58 -05:00
|
|
|
|
func validatePermissionsUpdate(apiCmd dtos.UpdateDashboardACLCommand) error {
|
2020-11-18 08:36:41 -06:00
|
|
|
|
for _, item := range apiCmd.Items {
|
2021-10-13 13:16:58 -05:00
|
|
|
|
if item.UserID > 0 && item.TeamID > 0 {
|
2023-11-22 07:20:22 -06:00
|
|
|
|
return dashboardaccess.ErrPermissionsWithUserAndTeamNotAllowed
|
2021-10-13 13:16:58 -05:00
|
|
|
|
}
|
|
|
|
|
|
2020-11-18 09:16:58 -06:00
|
|
|
|
if (item.UserID > 0 || item.TeamID > 0) && item.Role != nil {
|
2023-11-22 07:20:22 -06:00
|
|
|
|
return dashboardaccess.ErrPermissionsWithRoleNotAllowed
|
2020-11-18 08:36:41 -06:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return nil
|
|
|
|
|
}
|
2022-07-27 08:54:37 -05:00
|
|
|
|
|
|
|
|
|
// swagger:parameters getDashboardPermissionsListByUID
|
|
|
|
|
type GetDashboardPermissionsListByUIDParams struct {
|
|
|
|
|
// in:path
|
|
|
|
|
// required:true
|
|
|
|
|
UID string `json:"uid"`
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// swagger:parameters getDashboardPermissionsListByID
|
|
|
|
|
type GetDashboardPermissionsListByIDParams struct {
|
|
|
|
|
// in:path
|
|
|
|
|
DashboardID int64
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// swagger:parameters updateDashboardPermissionsByID
|
|
|
|
|
type UpdateDashboardPermissionsByIDParams struct {
|
|
|
|
|
// in:body
|
|
|
|
|
// required:true
|
|
|
|
|
Body dtos.UpdateDashboardACLCommand
|
|
|
|
|
// in:path
|
|
|
|
|
DashboardID int64
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// swagger:parameters updateDashboardPermissionsByUID
|
|
|
|
|
type UpdateDashboardPermissionsByUIDParams struct {
|
|
|
|
|
// in:body
|
|
|
|
|
// required:true
|
|
|
|
|
Body dtos.UpdateDashboardACLCommand
|
|
|
|
|
// in:path
|
|
|
|
|
// required:true
|
|
|
|
|
// description: The dashboard UID
|
|
|
|
|
UID string `json:"uid"`
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// swagger:response getDashboardPermissionsListResponse
|
|
|
|
|
type GetDashboardPermissionsResponse struct {
|
|
|
|
|
// in: body
|
2023-01-20 07:58:47 -06:00
|
|
|
|
Body []*dashboards.DashboardACLInfoDTO `json:"body"`
|
2022-07-27 08:54:37 -05:00
|
|
|
|
}
|