You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/dyn/integrations_v1alpha.projects.locations.authConfigs.html
+6-6Lines changed: 6 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -462,7 +462,7 @@ <h3>Method Details</h3>
462
462
},
463
463
},
464
464
"description": "A String", # A description of the auth config.
465
-
"displayName": "A String", # The name of the auth config.
465
+
"displayName": "A String", # Required. The name of the auth config.
466
466
"encryptedCredential": "A String", # Auth credential encrypted by Cloud KMS. Can be decrypted as Credential with proper KMS key.
467
467
"expiryNotificationDuration": [ # User can define the time to receive notification after which the auth config becomes invalid. Support up to 30 days. Support granularity in hours.
468
468
"A String",
@@ -840,7 +840,7 @@ <h3>Method Details</h3>
840
840
},
841
841
},
842
842
"description": "A String", # A description of the auth config.
843
-
"displayName": "A String", # The name of the auth config.
843
+
"displayName": "A String", # Required. The name of the auth config.
844
844
"encryptedCredential": "A String", # Auth credential encrypted by Cloud KMS. Can be decrypted as Credential with proper KMS key.
845
845
"expiryNotificationDuration": [ # User can define the time to receive notification after which the auth config becomes invalid. Support up to 30 days. Support granularity in hours.
846
846
"A String",
@@ -1240,7 +1240,7 @@ <h3>Method Details</h3>
1240
1240
},
1241
1241
},
1242
1242
"description": "A String", # A description of the auth config.
1243
-
"displayName": "A String", # The name of the auth config.
1243
+
"displayName": "A String", # Required. The name of the auth config.
1244
1244
"encryptedCredential": "A String", # Auth credential encrypted by Cloud KMS. Can be decrypted as Credential with proper KMS key.
1245
1245
"expiryNotificationDuration": [ # User can define the time to receive notification after which the auth config becomes invalid. Support up to 30 days. Support granularity in hours.
1246
1246
"A String",
@@ -1628,7 +1628,7 @@ <h3>Method Details</h3>
1628
1628
},
1629
1629
},
1630
1630
"description": "A String", # A description of the auth config.
1631
-
"displayName": "A String", # The name of the auth config.
1631
+
"displayName": "A String", # Required. The name of the auth config.
1632
1632
"encryptedCredential": "A String", # Auth credential encrypted by Cloud KMS. Can be decrypted as Credential with proper KMS key.
1633
1633
"expiryNotificationDuration": [ # User can define the time to receive notification after which the auth config becomes invalid. Support up to 30 days. Support granularity in hours.
1634
1634
"A String",
@@ -2022,7 +2022,7 @@ <h3>Method Details</h3>
2022
2022
},
2023
2023
},
2024
2024
"description": "A String", # A description of the auth config.
2025
-
"displayName": "A String", # The name of the auth config.
2025
+
"displayName": "A String", # Required. The name of the auth config.
2026
2026
"encryptedCredential": "A String", # Auth credential encrypted by Cloud KMS. Can be decrypted as Credential with proper KMS key.
2027
2027
"expiryNotificationDuration": [ # User can define the time to receive notification after which the auth config becomes invalid. Support up to 30 days. Support granularity in hours.
2028
2028
"A String",
@@ -2401,7 +2401,7 @@ <h3>Method Details</h3>
2401
2401
},
2402
2402
},
2403
2403
"description": "A String", # A description of the auth config.
2404
-
"displayName": "A String", # The name of the auth config.
2404
+
"displayName": "A String", # Required. The name of the auth config.
2405
2405
"encryptedCredential": "A String", # Auth credential encrypted by Cloud KMS. Can be decrypted as Credential with proper KMS key.
2406
2406
"expiryNotificationDuration": [ # User can define the time to receive notification after which the auth config becomes invalid. Support up to 30 days. Support granularity in hours.
Copy file name to clipboardExpand all lines: docs/dyn/integrations_v1alpha.projects.locations.connections.html
+117Lines changed: 117 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -229,6 +229,9 @@ <h3>Method Details</h3>
229
229
],
230
230
"connectionRevision": "A String", # Output only. Connection revision. This field is only updated when the connection is created or updated by User.
231
231
"connectorVersion": "A String", # Required. Connector version on which the connection is created. The format is: projects/*/locations/*/providers/*/connectors/*/versions/* Only global location is supported for ConnectorVersion resource.
232
+
"connectorVersionInfraConfig": { # This cofiguration provides infra configs like rate limit threshold which need to be configurable for every connector version # Output only. Infra configs supported by Connector Version.
233
+
"ratelimitThreshold": "A String", # Output only. Max QPS supported by the connector version before throttling of requests.
234
+
},
232
235
"connectorVersionLaunchStage": "A String", # Output only. Flag to mark the version indicating the launch stage.
233
236
"createTime": "A String", # Output only. Created time.
234
237
"description": "A String", # Optional. Description of the resource.
@@ -245,6 +248,120 @@ <h3>Method Details</h3>
245
248
},
246
249
],
247
250
"envoyImageLocation": "A String", # Output only. GCR location where the envoy image is stored. formatted like: gcr.io/{bucketName}/{imageName}
251
+
"eventingConfig": { # Eventing Configuration of a connection # Optional. Eventing config of a connection
252
+
"additionalVariables": [ # Additional eventing related field values
253
+
{ # ConfigVariable represents a configuration variable present in a Connection. or AuthConfig.
254
+
"boolValue": True or False, # Value is a bool.
255
+
"encryptionKeyValue": { # Encryption Key value. # Value is a Encryption Key.
256
+
"kmsKeyName": "A String", # The [KMS key name] with which the content of the Operation is encrypted. The expected format: `projects/*/locations/*/keyRings/*/cryptoKeys/*`. Will be empty string if google managed.
257
+
"type": "A String", # Type.
258
+
},
259
+
"intValue": "A String", # Value is an integer
260
+
"key": "A String", # Key of the config variable.
261
+
"secretValue": { # Secret provides a reference to entries in Secret Manager. # Value is a secret.
262
+
"secretVersion": "A String", # The resource name of the secret version in the format, format as: `projects/*/secrets/*/versions/*`.
263
+
},
264
+
"stringValue": "A String", # Value is a string.
265
+
},
266
+
],
267
+
"authConfig": { # AuthConfig defines details of a authentication type. # Auth details for the webhook adapter.
268
+
"additionalVariables": [ # List containing additional auth configs.
269
+
{ # ConfigVariable represents a configuration variable present in a Connection. or AuthConfig.
270
+
"boolValue": True or False, # Value is a bool.
271
+
"encryptionKeyValue": { # Encryption Key value. # Value is a Encryption Key.
272
+
"kmsKeyName": "A String", # The [KMS key name] with which the content of the Operation is encrypted. The expected format: `projects/*/locations/*/keyRings/*/cryptoKeys/*`. Will be empty string if google managed.
273
+
"type": "A String", # Type.
274
+
},
275
+
"intValue": "A String", # Value is an integer
276
+
"key": "A String", # Key of the config variable.
277
+
"secretValue": { # Secret provides a reference to entries in Secret Manager. # Value is a secret.
278
+
"secretVersion": "A String", # The resource name of the secret version in the format, format as: `projects/*/secrets/*/versions/*`.
279
+
},
280
+
"stringValue": "A String", # Value is a string.
281
+
},
282
+
],
283
+
"authKey": "A String", # Identifier key for auth config
284
+
"authType": "A String", # The type of authentication configured.
285
+
"oauth2AuthCodeFlow": { # Parameters to support Oauth 2.0 Auth Code Grant Authentication. See https://www.rfc-editor.org/rfc/rfc6749#section-1.3.1 for more details. # Oauth2AuthCodeFlow.
286
+
"authCode": "A String", # Authorization code to be exchanged for access and refresh tokens.
287
+
"authUri": "A String", # Auth URL for Authorization Code Flow
288
+
"clientId": "A String", # Client ID for user-provided OAuth app.
289
+
"clientSecret": { # Secret provides a reference to entries in Secret Manager. # Client secret for user-provided OAuth app.
290
+
"secretVersion": "A String", # The resource name of the secret version in the format, format as: `projects/*/secrets/*/versions/*`.
291
+
},
292
+
"enablePkce": True or False, # Whether to enable PKCE when the user performs the auth code flow.
293
+
"pkceVerifier": "A String", # PKCE verifier to be used during the auth code exchange.
294
+
"redirectUri": "A String", # Redirect URI to be provided during the auth code exchange.
295
+
"scopes": [ # Scopes the connection will request when the user performs the auth code flow.
296
+
"A String",
297
+
],
298
+
},
299
+
"oauth2ClientCredentials": { # Parameters to support Oauth 2.0 Client Credentials Grant Authentication. See https://tools.ietf.org/html/rfc6749#section-1.3.4 for more details. # Oauth2ClientCredentials.
300
+
"clientId": "A String", # The client identifier.
301
+
"clientSecret": { # Secret provides a reference to entries in Secret Manager. # Secret version reference containing the client secret.
302
+
"secretVersion": "A String", # The resource name of the secret version in the format, format as: `projects/*/secrets/*/versions/*`.
303
+
},
304
+
},
305
+
"oauth2JwtBearer": { # Parameters to support JSON Web Token (JWT) Profile for Oauth 2.0 Authorization Grant based authentication. See https://tools.ietf.org/html/rfc7523 for more details. # Oauth2JwtBearer.
306
+
"clientKey": { # Secret provides a reference to entries in Secret Manager. # Secret version reference containing a PKCS#8 PEM-encoded private key associated with the Client Certificate. This private key will be used to sign JWTs used for the jwt-bearer authorization grant. Specified in the form as: `projects/*/secrets/*/versions/*`.
307
+
"secretVersion": "A String", # The resource name of the secret version in the format, format as: `projects/*/secrets/*/versions/*`.
308
+
},
309
+
"jwtClaims": { # JWT claims used for the jwt-bearer authorization grant. # JwtClaims providers fields to generate the token.
310
+
"audience": "A String", # Value for the "aud" claim.
311
+
"issuer": "A String", # Value for the "iss" claim.
312
+
"subject": "A String", # Value for the "sub" claim.
313
+
},
314
+
},
315
+
"sshPublicKey": { # Parameters to support Ssh public key Authentication. # SSH Public Key.
316
+
"certType": "A String", # Format of SSH Client cert.
317
+
"sshClientCert": { # Secret provides a reference to entries in Secret Manager. # SSH Client Cert. It should contain both public and private key.
318
+
"secretVersion": "A String", # The resource name of the secret version in the format, format as: `projects/*/secrets/*/versions/*`.
319
+
},
320
+
"sshClientCertPass": { # Secret provides a reference to entries in Secret Manager. # Password (passphrase) for ssh client certificate if it has one.
321
+
"secretVersion": "A String", # The resource name of the secret version in the format, format as: `projects/*/secrets/*/versions/*`.
322
+
},
323
+
"username": "A String", # The user account used to authenticate.
324
+
},
325
+
"userPassword": { # Parameters to support Username and Password Authentication. # UserPassword.
326
+
"password": { # Secret provides a reference to entries in Secret Manager. # Secret version reference containing the password.
327
+
"secretVersion": "A String", # The resource name of the secret version in the format, format as: `projects/*/secrets/*/versions/*`.
"encryptionKey": { # ConfigVariable represents a configuration variable present in a Connection. or AuthConfig. # Encryption key (can be either Google managed or CMEK).
333
+
"boolValue": True or False, # Value is a bool.
334
+
"encryptionKeyValue": { # Encryption Key value. # Value is a Encryption Key.
335
+
"kmsKeyName": "A String", # The [KMS key name] with which the content of the Operation is encrypted. The expected format: `projects/*/locations/*/keyRings/*/cryptoKeys/*`. Will be empty string if google managed.
336
+
"type": "A String", # Type.
337
+
},
338
+
"intValue": "A String", # Value is an integer
339
+
"key": "A String", # Key of the config variable.
340
+
"secretValue": { # Secret provides a reference to entries in Secret Manager. # Value is a secret.
341
+
"secretVersion": "A String", # The resource name of the secret version in the format, format as: `projects/*/secrets/*/versions/*`.
342
+
},
343
+
"stringValue": "A String", # Value is a string.
344
+
},
345
+
"enrichmentEnabled": True or False, # Enrichment Enabled.
346
+
"registrationDestinationConfig": { # Define the Connectors target endpoint. # Registration endpoint for auto regsitration.
347
+
"destinations": [ # The destinations for the key.
348
+
{
349
+
"host": "A String", # For publicly routable host.
350
+
"port": 42, # The port is the target port number that is accepted by the destination.
351
+
"serviceAttachment": "A String", # PSC service attachments. Format: projects/*/regions/*/serviceAttachments/*
352
+
},
353
+
],
354
+
"key": "A String", # The key is the destination identifier that is supported by the Connector.
355
+
},
356
+
},
357
+
"eventingEnablementType": "A String", # Optional. Eventing enablement type. Will be nil if eventing is not enabled.
358
+
"eventingRuntimeData": { # Eventing runtime data has the details related to eventing managed by the system. # Output only. Eventing Runtime Data.
359
+
"eventsListenerEndpoint": "A String", # Output only. Events listener endpoint. The value will populated after provisioning the events listener.
360
+
"status": { # EventingStatus indicates the state of eventing. # Output only. Current status of eventing.
361
+
"description": "A String", # Output only. Description of error if State is set to "ERROR".
"imageLocation": "A String", # Output only. GCR location where the runtime image is stored. formatted like: gcr.io/{bucketName}/{imageName}
249
366
"labels": { # Optional. Resource labels to represent user-provided metadata. Refer to cloud documentation on labels for more details. https://cloud.google.com/compute/docs/labeling-resources
0 commit comments