|
13 | 13 | * [delete\_datasource\_by\_uid](#datasource.Datasource.delete_datasource_by_uid)
|
14 | 14 | * [delete\_datasource\_by\_name](#datasource.Datasource.delete_datasource_by_name)
|
15 | 15 | * [query\_datasource\_by\_id](#datasource.Datasource.query_datasource_by_id)
|
16 |
| - * [enable\_datasource\_permissions](#datasource.Datasource.enable_datasource_permissions) |
17 |
| - * [disable\_datasource\_permissions](#datasource.Datasource.disable_datasource_permissions) |
18 |
| - * [get\_datasource\_permissions](#datasource.Datasource.get_datasource_permissions) |
19 |
| - * [add\_datasource\_permissions](#datasource.Datasource.add_datasource_permissions) |
20 |
| - * [delete\_datasource\_permissions](#datasource.Datasource.delete_datasource_permissions) |
| 16 | + * [DatasourcePermissions](#datasource.DatasourcePermissions) |
| 17 | + * [get\_datasource\_permissions\_by\_uid](#datasource.DatasourcePermissions.get_datasource_permissions_by_uid) |
| 18 | + * [update\_datasource\_user\_access\_by\_uid](#datasource.DatasourcePermissions.update_datasource_user_access_by_uid) |
| 19 | + * [update\_datasource\_team\_access\_by\_uid](#datasource.DatasourcePermissions.update_datasource_team_access_by_uid) |
| 20 | + * [update\_datasource\_basic\_role\_access\_by\_uid](#datasource.DatasourcePermissions.update_datasource_basic_role_access_by_uid) |
| 21 | + * [DatasourceLegacyPermissions](#datasource.DatasourceLegacyPermissions) |
| 22 | + * [enable\_datasource\_permissions](#datasource.DatasourceLegacyPermissions.enable_datasource_permissions) |
| 23 | + * [disable\_datasource\_permissions](#datasource.DatasourceLegacyPermissions.disable_datasource_permissions) |
| 24 | + * [get\_datasource\_permissions](#datasource.DatasourceLegacyPermissions.get_datasource_permissions) |
| 25 | + * [add\_datasource\_permissions](#datasource.DatasourceLegacyPermissions.add_datasource_permissions) |
| 26 | + * [delete\_datasource\_permissions](#datasource.DatasourceLegacyPermissions.delete_datasource_permissions) |
21 | 27 | * [DatasourceQueryResourceCaching](#datasource.DatasourceQueryResourceCaching)
|
22 | 28 | * [get\_datasource\_cache](#datasource.DatasourceQueryResourceCaching.get_datasource_cache)
|
23 | 29 | * [enable\_datasource\_cache](#datasource.DatasourceQueryResourceCaching.enable_datasource_cache)
|
@@ -362,7 +368,175 @@ The method includes a functionality to execute a queries inside the datasource i
|
362 | 368 |
|
363 | 369 | - `api_call` _dict_ - Returns the result of the specified query
|
364 | 370 |
|
365 |
| -<a id="datasource.Datasource.enable_datasource_permissions"></a> |
| 371 | +<a id="datasource.DatasourcePermissions"></a> |
| 372 | + |
| 373 | +## DatasourcePermissions Objects |
| 374 | + |
| 375 | +```python |
| 376 | +class DatasourcePermissions() |
| 377 | +``` |
| 378 | + |
| 379 | +The class includes all necessary methods to access the Grafana datasource permissions API endpoints. It's required that the API token got the corresponding datasource access rights. Please check the used methods docstring for the necessary access rights |
| 380 | + |
| 381 | +HINT: Note Grafana Enterprise API need required permissions if fine-grained access control is enabled |
| 382 | + |
| 383 | +**Arguments**: |
| 384 | + |
| 385 | +- `grafana_api_model` _APIModel_ - Inject a Grafana API model object that includes all necessary values and information |
| 386 | + |
| 387 | + |
| 388 | +**Attributes**: |
| 389 | + |
| 390 | +- `grafana_api_model` _APIModel_ - This is where we store the grafana_api_model |
| 391 | + |
| 392 | +<a id="datasource.DatasourcePermissions.get_datasource_permissions_by_uid"></a> |
| 393 | + |
| 394 | +#### get\_datasource\_permissions\_by\_uid |
| 395 | + |
| 396 | +```python |
| 397 | +def get_datasource_permissions_by_uid(uid: str) -> list |
| 398 | +``` |
| 399 | + |
| 400 | +The method includes a functionality to get the datasource permissions specified by the datasource uid. The functionality is a Grafana ENTERPRISE feature |
| 401 | + |
| 402 | +**Arguments**: |
| 403 | + |
| 404 | +- `uid` _str_ - Specify the uid of the datasource |
| 405 | + |
| 406 | + Required Permissions: |
| 407 | +- `Action` - datasources.permissions:read |
| 408 | +- `Scope` - [datasources:*, datasources:uid:*, datasources:uid:<id>] |
| 409 | + |
| 410 | + |
| 411 | +**Raises**: |
| 412 | + |
| 413 | +- `ValueError` - Missed specifying a necessary value |
| 414 | +- `Exception` - Unspecified error by executing the API call |
| 415 | + |
| 416 | + |
| 417 | +**Returns**: |
| 418 | + |
| 419 | +- `api_call` _list_ - Returns the datasource permissions |
| 420 | + |
| 421 | +<a id="datasource.DatasourcePermissions.update_datasource_user_access_by_uid"></a> |
| 422 | + |
| 423 | +#### update\_datasource\_user\_access\_by\_uid |
| 424 | + |
| 425 | +```python |
| 426 | +def update_datasource_user_access_by_uid( |
| 427 | + uid: str, id: int, datasource_user_permission: DatasourcePermission) |
| 428 | +``` |
| 429 | + |
| 430 | +The method includes a functionality to update the datasource permission specified by the datasource uid and the user id. The functionality is a Grafana ENTERPRISE feature |
| 431 | + |
| 432 | +**Arguments**: |
| 433 | + |
| 434 | +- `uid` _str_ - Specify the uid of the datasource |
| 435 | +- `id` _int_ - Specify the id of the user |
| 436 | +- `datasource_user_permission` _DatasourcePermission_ - Specify the datasource user permission |
| 437 | + |
| 438 | + Required Permissions: |
| 439 | +- `Action` - datasources.permissions:write |
| 440 | +- `Scope` - [datasources:*, datasources:uid:*, datasources:uid:<id>] |
| 441 | + |
| 442 | + |
| 443 | +**Raises**: |
| 444 | + |
| 445 | +- `ValueError` - Missed specifying a necessary value |
| 446 | +- `Exception` - Unspecified error by executing the API call |
| 447 | + |
| 448 | + |
| 449 | +**Returns**: |
| 450 | + |
| 451 | + None |
| 452 | + |
| 453 | +<a id="datasource.DatasourcePermissions.update_datasource_team_access_by_uid"></a> |
| 454 | + |
| 455 | +#### update\_datasource\_team\_access\_by\_uid |
| 456 | + |
| 457 | +```python |
| 458 | +def update_datasource_team_access_by_uid( |
| 459 | + uid: str, id: int, datasource_team_permission: DatasourcePermission) |
| 460 | +``` |
| 461 | + |
| 462 | +The method includes a functionality to update the datasource permission specified by the datasource uid and the team id. The functionality is a Grafana ENTERPRISE feature |
| 463 | + |
| 464 | +**Arguments**: |
| 465 | + |
| 466 | +- `uid` _str_ - Specify the uid of the datasource |
| 467 | +- `id` _int_ - Specify the id of the team |
| 468 | +- `datasource_team_permission` _DatasourcePermission_ - Specify the datasource team permission |
| 469 | + |
| 470 | + Required Permissions: |
| 471 | +- `Action` - datasources.permissions:write |
| 472 | +- `Scope` - [datasources:*, datasources:uid:*, datasources:uid:<id>] |
| 473 | + |
| 474 | + |
| 475 | +**Raises**: |
| 476 | + |
| 477 | +- `ValueError` - Missed specifying a necessary value |
| 478 | +- `Exception` - Unspecified error by executing the API call |
| 479 | + |
| 480 | + |
| 481 | +**Returns**: |
| 482 | + |
| 483 | + None |
| 484 | + |
| 485 | +<a id="datasource.DatasourcePermissions.update_datasource_basic_role_access_by_uid"></a> |
| 486 | + |
| 487 | +#### update\_datasource\_basic\_role\_access\_by\_uid |
| 488 | + |
| 489 | +```python |
| 490 | +def update_datasource_basic_role_access_by_uid( |
| 491 | + uid: str, build_in_role_name: str, |
| 492 | + datasource_team_permission: DatasourcePermission) |
| 493 | +``` |
| 494 | + |
| 495 | +The method includes a functionality to update the datasource permission specified by the datasource uid and the build in role name. The functionality is a Grafana ENTERPRISE feature |
| 496 | + |
| 497 | +**Arguments**: |
| 498 | + |
| 499 | +- `uid` _str_ - Specify the uid of the datasource |
| 500 | +- `build_in_role_name` _str_ - Specify the build in role name |
| 501 | +- `datasource_team_permission` _DatasourcePermission_ - Specify the datasource team permission |
| 502 | + |
| 503 | + Required Permissions: |
| 504 | +- `Action` - datasources.permissions:write |
| 505 | +- `Scope` - [datasources:*, datasources:uid:*, datasources:uid:<id>] |
| 506 | + |
| 507 | + |
| 508 | +**Raises**: |
| 509 | + |
| 510 | +- `ValueError` - Missed specifying a necessary value |
| 511 | +- `Exception` - Unspecified error by executing the API call |
| 512 | + |
| 513 | + |
| 514 | +**Returns**: |
| 515 | + |
| 516 | + None |
| 517 | + |
| 518 | +<a id="datasource.DatasourceLegacyPermissions"></a> |
| 519 | + |
| 520 | +## DatasourceLegacyPermissions Objects |
| 521 | + |
| 522 | +```python |
| 523 | +class DatasourceLegacyPermissions() |
| 524 | +``` |
| 525 | + |
| 526 | +The class includes all necessary methods to access the Grafana legacy datasource permissions API endpoints. It's required that the API token got the corresponding datasource access rights. Please check the used methods docstring for the necessary access rights |
| 527 | + |
| 528 | +HINT: Note Grafana Enterprise API need required permissions if fine-grained access control is enabled |
| 529 | + |
| 530 | +**Arguments**: |
| 531 | + |
| 532 | +- `grafana_api_model` _APIModel_ - Inject a Grafana API model object that includes all necessary values and information |
| 533 | + |
| 534 | + |
| 535 | +**Attributes**: |
| 536 | + |
| 537 | +- `grafana_api_model` _APIModel_ - This is where we store the grafana_api_model |
| 538 | + |
| 539 | +<a id="datasource.DatasourceLegacyPermissions.enable_datasource_permissions"></a> |
366 | 540 |
|
367 | 541 | #### enable\_datasource\_permissions
|
368 | 542 |
|
@@ -391,7 +565,7 @@ The method includes a functionality to enable datasource permissions specified b
|
391 | 565 |
|
392 | 566 | None
|
393 | 567 |
|
394 |
| -<a id="datasource.Datasource.disable_datasource_permissions"></a> |
| 568 | +<a id="datasource.DatasourceLegacyPermissions.disable_datasource_permissions"></a> |
395 | 569 |
|
396 | 570 | #### disable\_datasource\_permissions
|
397 | 571 |
|
@@ -420,7 +594,7 @@ The method includes a functionality to disable datasource permissions specified
|
420 | 594 |
|
421 | 595 | None
|
422 | 596 |
|
423 |
| -<a id="datasource.Datasource.get_datasource_permissions"></a> |
| 597 | +<a id="datasource.DatasourceLegacyPermissions.get_datasource_permissions"></a> |
424 | 598 |
|
425 | 599 | #### get\_datasource\_permissions
|
426 | 600 |
|
@@ -449,7 +623,7 @@ The method includes a functionality to get the datasource permissions specified
|
449 | 623 |
|
450 | 624 | - `api_call` _dict_ - Returns the datasource permissions
|
451 | 625 |
|
452 |
| -<a id="datasource.Datasource.add_datasource_permissions"></a> |
| 626 | +<a id="datasource.DatasourceLegacyPermissions.add_datasource_permissions"></a> |
453 | 627 |
|
454 | 628 | #### add\_datasource\_permissions
|
455 | 629 |
|
@@ -480,7 +654,7 @@ The method includes a functionality to add datasource permission specified by th
|
480 | 654 |
|
481 | 655 | None
|
482 | 656 |
|
483 |
| -<a id="datasource.Datasource.delete_datasource_permissions"></a> |
| 657 | +<a id="datasource.DatasourceLegacyPermissions.delete_datasource_permissions"></a> |
484 | 658 |
|
485 | 659 | #### delete\_datasource\_permissions
|
486 | 660 |
|
|
0 commit comments