Fix #24447: Add MSSQL SSL support (#24450)

* Add MSSQL SSL support

* Update generated TypeScript types

* Update generated TypeScript types

* fix: mssql ssl params and sidebar doc

* fix: mssql.md file

* fix: mssql ssl manager tests

* refactor: added mssql connection class converter and mssql.md connection argument description

---------

Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
Co-authored-by: Keshav Mohta <keshavmohta09@gmail.com>
Co-authored-by: Keshav Mohta <68001229+keshavmohta09@users.noreply.github.com>
This commit is contained in:
Sriharsha Chintalapani 2025-11-25 04:06:19 -08:00 committed by GitHub
parent d833941bf5
commit abf3f7b7ca
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
25 changed files with 876 additions and 14 deletions

View File

@ -43,6 +43,9 @@ from metadata.generated.schema.entity.services.connections.database.hiveConnecti
from metadata.generated.schema.entity.services.connections.database.mongoDBConnection import (
MongoDBConnection,
)
from metadata.generated.schema.entity.services.connections.database.mssqlConnection import (
MssqlConnection,
)
from metadata.generated.schema.entity.services.connections.database.mysqlConnection import (
MysqlConnection,
)
@ -275,6 +278,29 @@ class SSLManager:
return connection
@setup_ssl.register(MssqlConnection)
def _(self, connection):
connection = cast(MssqlConnection, connection)
if not connection.connectionArguments:
connection.connectionArguments = init_empty_connection_arguments()
# Handle driver-specific SSL configuration
if connection.scheme.value == "mssql+pyodbc":
# ODBC Driver SSL parameters
if connection.encrypt:
connection.connectionArguments.root["Encrypt"] = "yes"
if connection.trustServerCertificate:
connection.connectionArguments.root["TrustServerCertificate"] = "yes"
elif connection.scheme.value == "mssql+pytds":
# pytds driver SSL parameters
if self.ca_file_path:
connection.connectionArguments.root["cafile"] = self.ca_file_path
return connection
@singledispatch
def check_ssl_and_init(
@ -327,6 +353,21 @@ def _(connection):
return None
@check_ssl_and_init.register(MssqlConnection)
def _(connection):
service_connection = cast(MssqlConnection, connection)
ssl: Optional[
verifySSLConfig.SslConfig
] = service_connection.sslConfig or verifySSLConfig.SslConfig(
**{"caCertificate": None}
)
return SSLManager(
ca=ssl.root.caCertificate,
cert=ssl.root.sslCertificate,
key=ssl.root.sslKey,
)
@check_ssl_and_init.register(MongoDBConnection)
def _(connection):
service_connection = cast(Union[MysqlConnection, DorisConnection], connection)

View File

@ -210,3 +210,166 @@ class CassandraSourceSSLTest(TestCase):
cassandra_source_with_ssl.service_connection.sslConfig.root.sslCertificate.get_secret_value(),
"sslCertificateData",
)
class MssqlSSLManagerTest(TestCase):
"""
Tests for MSSQL SSL Manager functionality
"""
def test_check_ssl_and_init_with_ssl_config(self):
"""Test SSL manager initialization with sslConfig"""
from metadata.generated.schema.entity.services.connections.database.mssqlConnection import (
MssqlConnection,
)
from metadata.utils.ssl_manager import check_ssl_and_init
connection_with_ssl = MssqlConnection(
hostPort="localhost:1433",
database="testdb",
username="sa",
password="password",
encrypt=False,
trustServerCertificate=False,
sslConfig={"caCertificate": "caCertificateData"},
)
ssl_manager = check_ssl_and_init(connection_with_ssl)
self.assertIsNotNone(ssl_manager)
self.assertIsNotNone(ssl_manager.ca_file_path)
ssl_manager.cleanup_temp_files()
def test_check_ssl_and_init_without_ssl_config(self):
"""Test SSL manager initialization without sslConfig"""
from metadata.generated.schema.entity.services.connections.database.mssqlConnection import (
MssqlConnection,
)
from metadata.utils.ssl_manager import check_ssl_and_init
connection_without_ssl = MssqlConnection(
hostPort="localhost:1433",
database="testdb",
username="sa",
password="password",
encrypt=True,
trustServerCertificate=True,
)
ssl_manager = check_ssl_and_init(connection_without_ssl)
self.assertIsNone(ssl_manager.ca_file_path)
def test_setup_ssl_pyodbc_driver(self):
"""Test SSL setup for pyodbc driver"""
from metadata.generated.schema.entity.services.connections.database.mssqlConnection import (
MssqlConnection,
MssqlScheme,
)
connection = MssqlConnection(
hostPort="localhost:1433",
database="testdb",
username="sa",
password="password",
scheme=MssqlScheme.mssql_pyodbc,
encrypt=True,
trustServerCertificate=False,
)
ssl_manager = SSLManager(
ca=SecretStr("CA cert"), cert=SecretStr("Cert"), key=SecretStr("Key")
)
updated_connection = ssl_manager.setup_ssl(connection)
self.assertIsNotNone(updated_connection.connectionArguments)
self.assertEqual(
updated_connection.connectionArguments.root.get("Encrypt"), "yes"
)
self.assertIsNone(
updated_connection.connectionArguments.root.get("TrustServerCertificate")
)
ssl_manager.cleanup_temp_files()
def test_setup_ssl_pyodbc_with_trust_certificate(self):
"""Test SSL setup for pyodbc driver with trustServerCertificate"""
from metadata.generated.schema.entity.services.connections.database.mssqlConnection import (
MssqlConnection,
MssqlScheme,
)
connection = MssqlConnection(
hostPort="localhost:1433",
database="testdb",
username="sa",
password="password",
scheme=MssqlScheme.mssql_pyodbc,
encrypt=True,
trustServerCertificate=True,
)
ssl_manager = SSLManager(
ca=SecretStr("CA cert"), cert=SecretStr("Cert"), key=SecretStr("Key")
)
updated_connection = ssl_manager.setup_ssl(connection)
self.assertIsNotNone(updated_connection.connectionArguments)
self.assertEqual(
updated_connection.connectionArguments.root.get("Encrypt"), "yes"
)
self.assertEqual(
updated_connection.connectionArguments.root.get("TrustServerCertificate"),
"yes",
)
ssl_manager.cleanup_temp_files()
def test_setup_ssl_pytds_driver(self):
"""Test SSL setup for pytds driver"""
from metadata.generated.schema.entity.services.connections.database.mssqlConnection import (
MssqlConnection,
MssqlScheme,
)
from metadata.utils.ssl_manager import check_ssl_and_init
connection = MssqlConnection(
hostPort="localhost:1433",
database="testdb",
username="sa",
password="password",
scheme=MssqlScheme.mssql_pytds,
sslConfig={"caCertificate": "caCertificateData"},
)
ssl_manager = check_ssl_and_init(connection)
updated_connection = ssl_manager.setup_ssl(connection)
self.assertIsNotNone(updated_connection.connectionArguments.root["cafile"])
ssl_manager.cleanup_temp_files()
def test_setup_ssl_pymssql_driver(self):
"""Test SSL setup for pymssql driver"""
from metadata.generated.schema.entity.services.connections.database.mssqlConnection import (
MssqlConnection,
MssqlScheme,
)
connection = MssqlConnection(
hostPort="localhost:1433",
database="testdb",
username="sa",
password="password",
scheme=MssqlScheme.mssql_pymssql,
)
ssl_manager = SSLManager(
ca=SecretStr("CA cert"), cert=SecretStr("Cert"), key=SecretStr("Key")
)
updated_connection = ssl_manager.setup_ssl(connection)
self.assertDictEqual(updated_connection.connectionArguments.root, {})
ssl_manager.cleanup_temp_files()

View File

@ -0,0 +1,23 @@
package org.openmetadata.sdk.services.drives;
import org.openmetadata.schema.api.data.CreateDirectory;
import org.openmetadata.schema.entity.data.Directory;
import org.openmetadata.sdk.exceptions.OpenMetadataException;
import org.openmetadata.sdk.network.HttpClient;
import org.openmetadata.sdk.network.HttpMethod;
import org.openmetadata.sdk.services.EntityServiceBase;
public class DirectoryService extends EntityServiceBase<Directory> {
public DirectoryService(HttpClient httpClient) {
super(httpClient, "/v1/drives/directories");
}
@Override
protected Class<Directory> getEntityClass() {
return Directory.class;
}
public Directory create(CreateDirectory request) throws OpenMetadataException {
return httpClient.execute(HttpMethod.POST, basePath, request, Directory.class);
}
}

View File

@ -0,0 +1,23 @@
package org.openmetadata.sdk.services.drives;
import org.openmetadata.schema.api.data.CreateFile;
import org.openmetadata.schema.entity.data.File;
import org.openmetadata.sdk.exceptions.OpenMetadataException;
import org.openmetadata.sdk.network.HttpClient;
import org.openmetadata.sdk.network.HttpMethod;
import org.openmetadata.sdk.services.EntityServiceBase;
public class FileService extends EntityServiceBase<File> {
public FileService(HttpClient httpClient) {
super(httpClient, "/v1/drives/files");
}
@Override
protected Class<File> getEntityClass() {
return File.class;
}
public File create(CreateFile request) throws OpenMetadataException {
return httpClient.execute(HttpMethod.POST, basePath, request, File.class);
}
}

View File

@ -0,0 +1,23 @@
package org.openmetadata.sdk.services.drives;
import org.openmetadata.schema.api.data.CreateSpreadsheet;
import org.openmetadata.schema.entity.data.Spreadsheet;
import org.openmetadata.sdk.exceptions.OpenMetadataException;
import org.openmetadata.sdk.network.HttpClient;
import org.openmetadata.sdk.network.HttpMethod;
import org.openmetadata.sdk.services.EntityServiceBase;
public class SpreadsheetService extends EntityServiceBase<Spreadsheet> {
public SpreadsheetService(HttpClient httpClient) {
super(httpClient, "/v1/drives/spreadsheets");
}
@Override
protected Class<Spreadsheet> getEntityClass() {
return Spreadsheet.class;
}
public Spreadsheet create(CreateSpreadsheet request) throws OpenMetadataException {
return httpClient.execute(HttpMethod.POST, basePath, request, Spreadsheet.class);
}
}

View File

@ -0,0 +1,23 @@
package org.openmetadata.sdk.services.drives;
import org.openmetadata.schema.api.data.CreateWorksheet;
import org.openmetadata.schema.entity.data.Worksheet;
import org.openmetadata.sdk.exceptions.OpenMetadataException;
import org.openmetadata.sdk.network.HttpClient;
import org.openmetadata.sdk.network.HttpMethod;
import org.openmetadata.sdk.services.EntityServiceBase;
public class WorksheetService extends EntityServiceBase<Worksheet> {
public WorksheetService(HttpClient httpClient) {
super(httpClient, "/v1/drives/worksheets");
}
@Override
protected Class<Worksheet> getEntityClass() {
return Worksheet.class;
}
public Worksheet create(CreateWorksheet request) throws OpenMetadataException {
return httpClient.execute(HttpMethod.POST, basePath, request, Worksheet.class);
}
}

View File

@ -36,6 +36,7 @@ import org.openmetadata.schema.services.connections.database.DeltaLakeConnection
import org.openmetadata.schema.services.connections.database.GreenplumConnection;
import org.openmetadata.schema.services.connections.database.HiveConnection;
import org.openmetadata.schema.services.connections.database.IcebergConnection;
import org.openmetadata.schema.services.connections.database.MssqlConnection;
import org.openmetadata.schema.services.connections.database.MysqlConnection;
import org.openmetadata.schema.services.connections.database.PostgresConnection;
import org.openmetadata.schema.services.connections.database.RedshiftConnection;
@ -87,6 +88,7 @@ public final class ClassConverterFactory {
Map.entry(IcebergConnection.class, new IcebergConnectionClassConverter()),
Map.entry(IcebergFileSystem.class, new IcebergFileSystemClassConverter()),
Map.entry(LookerConnection.class, new LookerConnectionClassConverter()),
Map.entry(MssqlConnection.class, new MssqlConnectionClassConverter()),
Map.entry(MysqlConnection.class, new MysqlConnectionClassConverter()),
Map.entry(RedshiftConnection.class, new RedshiftConnectionClassConverter()),
Map.entry(GreenplumConnection.class, new GreenplumConnectionClassConverter()),

View File

@ -0,0 +1,38 @@
/*
* Copyright 2021 Collate
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
* http://www.apache.org/licenses/LICENSE-2.0
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.openmetadata.service.secrets.converter;
import java.util.List;
import org.openmetadata.schema.security.ssl.ValidateSSLClientConfig;
import org.openmetadata.schema.services.connections.database.MssqlConnection;
import org.openmetadata.schema.utils.JsonUtils;
public class MssqlConnectionClassConverter extends ClassConverter {
private static final List<Class<?>> SSL_SOURCE_CLASS = List.of(ValidateSSLClientConfig.class);
public MssqlConnectionClassConverter() {
super(MssqlConnection.class);
}
@Override
public Object convert(Object object) {
MssqlConnection mssqlConnection = (MssqlConnection) JsonUtils.convertValue(object, this.clazz);
tryToConvert(mssqlConnection.getSslConfig(), SSL_SOURCE_CLASS)
.ifPresent(mssqlConnection::setSslConfig);
return mssqlConnection;
}
}

View File

@ -59,6 +59,23 @@
"type": "string",
"default": "ODBC Driver 18 for SQL Server"
},
"encrypt": {
"title": "Encrypt Connection",
"description": "Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted between the client and server will be encrypted.",
"type": "boolean",
"default": false
},
"trustServerCertificate": {
"title": "Trust Server Certificate",
"description": "Trust the server certificate without validation. Set to false in production to validate server certificates against the certificate authority.",
"type": "boolean",
"default": false
},
"sslConfig": {
"title": "SSL Configuration",
"description": "SSL/TLS certificate configuration for client authentication. Provide CA certificate, client certificate, and private key for mutual TLS authentication.",
"$ref": "../../../../security/ssl/verifySSLConfig.json#/definitions/sslConfig"
},
"ingestAllDatabases": {
"title": "Ingest All Databases",
"description": "Ingest data from all databases in Mssql. You can use databaseFilterPattern on top of this.",

View File

@ -97,6 +97,35 @@ You can download the ODBC driver from <a href="https://learn.microsoft.com/en-us
In case of Docker or Kubernetes deployments, this driver comes out of the box with version `ODBC Driver 18 for SQL Server`.
$$
$$section
### Encrypt Connection $(id="encrypt")
Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted between the client and server will be encrypted.
**Important:**
- Can be configured along with Trust Server Certificate option
- May require additional connection arguments for fine-grained control
- Default value is `false`
$$
$$section
### Trust Server Certificate $(id="trustServerCertificate")
Trust the server certificate without validation When using **pyodbc** scheme.
**Important:**
- Can be combined with Encrypt Connection option
- Default value is `false`
$$
$$section
### SSL Configuration $(id="sslConfig")
SSL/TLS certificate configuration for client authentication. Provide CA certificate for mutual TLS authentication.
**Important:**
- For certificate-based authentication with **pytds** scheme, provide the CA certificate file path in the SSL Configuration
$$
$$section
### Ingest All Databases $(id="ingestAllDatabases")
@ -115,5 +144,7 @@ $$section
Enter the details for any additional connection arguments such as security or protocol configs that can be sent to MSSQL during the connection. These details must be added as Key-Value pairs.
When Connecting to MSSQL via **pyodbc** scheme requires the Connection Arguments Encrypt: No and TrustServerCertificate: Yes.
When Connecting to MSSQL via **pyodbc** scheme requires the Connection Arguments Encrypt: No and TrustServerCertificate: Yes. You can also configure these through the corresponding fields.
When using the pytds connection scheme with a CA certificate, you might need to specify validate_host: false in the connection arguments.
$$

View File

@ -1049,6 +1049,9 @@ export interface ConfigObject {
/**
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* SSL Configuration for OpenMetadata Server
*/
sslConfig?: SSLConfigObject;
@ -1063,6 +1066,16 @@ export interface ConfigObject {
* Authentication mode to connect to Impala.
*/
authMechanism?: AuthMechanismEnum;
/**
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
* between the client and server will be encrypted.
*/
encrypt?: boolean;
/**
* Trust the server certificate without validation. Set to false in production to validate
* server certificates against the certificate authority.
*/
trustServerCertificate?: boolean;
/**
* Use slow logs to extract lineage.
*/
@ -2742,6 +2755,9 @@ export interface QlikCertificatesBy {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
* connection.
*
@ -3373,6 +3389,9 @@ export enum ConnectionScheme {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
* connection.
*
@ -3511,6 +3530,11 @@ export interface DatabaseConnectionClass {
* ODBC driver version in case of pyodbc connection.
*/
driver?: string;
/**
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
* between the client and server will be encrypted.
*/
encrypt?: boolean;
/**
* Host and port of the MSSQL service.
*/
@ -3531,7 +3555,12 @@ export interface DatabaseConnectionClass {
/**
* SQLAlchemy driver scheme options.
*/
scheme?: MssqlScheme;
scheme?: MssqlScheme;
/**
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*/
sslConfig?: ConsumerConfigSSLClass;
supportsDatabase?: boolean;
supportsDataDiff?: boolean;
supportsDBTExtraction?: boolean;
@ -3544,6 +3573,11 @@ export interface DatabaseConnectionClass {
* Regex to only include/exclude tables that matches the pattern.
*/
tableFilterPattern?: FilterPattern;
/**
* Trust the server certificate without validation. Set to false in production to validate
* server certificates against the certificate authority.
*/
trustServerCertificate?: boolean;
/**
* Service Type
*/
@ -4101,6 +4135,9 @@ export enum SpaceType {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
* connection.
*

View File

@ -625,6 +625,9 @@ export interface ConfigObject {
metastoreConnection?: HiveMetastoreConnectionDetails;
/**
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*/
sslConfig?: Config;
/**
@ -638,6 +641,16 @@ export interface ConfigObject {
* Authentication mode to connect to Impala.
*/
authMechanism?: AuthMechanismEnum;
/**
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
* between the client and server will be encrypted.
*/
encrypt?: boolean;
/**
* Trust the server certificate without validation. Set to false in production to validate
* server certificates against the certificate authority.
*/
trustServerCertificate?: boolean;
/**
* Use slow logs to extract lineage.
*/
@ -1911,6 +1924,9 @@ export enum HiveMetastoreConnectionDetailsScheme {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* OpenMetadata Client configured to validate SSL certificates.
*/
export interface Config {

View File

@ -757,6 +757,9 @@ export enum Scheme {
*
* Client SSL configuration
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* OpenMetadata Client configured to validate SSL certificates.
*/
export interface Config {
@ -829,6 +832,11 @@ export interface DatabaseConnectionClass {
* ODBC driver version in case of pyodbc connection.
*/
driver?: string;
/**
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
* between the client and server will be encrypted.
*/
encrypt?: boolean;
/**
* Host and port of the MSSQL service.
*/
@ -849,7 +857,12 @@ export interface DatabaseConnectionClass {
/**
* SQLAlchemy driver scheme options.
*/
scheme?: MssqlScheme;
scheme?: MssqlScheme;
/**
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*/
sslConfig?: Config;
supportsDatabase?: boolean;
supportsDataDiff?: boolean;
supportsDBTExtraction?: boolean;
@ -862,6 +875,11 @@ export interface DatabaseConnectionClass {
* Regex to only include/exclude tables that matches the pattern.
*/
tableFilterPattern?: FilterPattern;
/**
* Trust the server certificate without validation. Set to false in production to validate
* server certificates against the certificate authority.
*/
trustServerCertificate?: boolean;
/**
* Service Type
*/

View File

@ -3139,6 +3139,9 @@ export interface ConfigObject {
/**
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* SSL Configuration for OpenMetadata Server
*/
sslConfig?: SSLConfigObject;
@ -3531,6 +3534,16 @@ export interface ConfigObject {
* Authentication mode to connect to Impala.
*/
authMechanism?: AuthMechanismEnum;
/**
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
* between the client and server will be encrypted.
*/
encrypt?: boolean;
/**
* Trust the server certificate without validation. Set to false in production to validate
* server certificates against the certificate authority.
*/
trustServerCertificate?: boolean;
/**
* Use slow logs to extract lineage.
*/
@ -4870,6 +4883,9 @@ export interface QlikCertificatesBy {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
* connection.
*
@ -5308,6 +5324,9 @@ export enum ConnectionScheme {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
* connection.
*
@ -5446,6 +5465,11 @@ export interface DatabaseConnectionClass {
* ODBC driver version in case of pyodbc connection.
*/
driver?: string;
/**
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
* between the client and server will be encrypted.
*/
encrypt?: boolean;
/**
* Host and port of the MSSQL service.
*/
@ -5466,7 +5490,12 @@ export interface DatabaseConnectionClass {
/**
* SQLAlchemy driver scheme options.
*/
scheme?: MssqlScheme;
scheme?: MssqlScheme;
/**
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*/
sslConfig?: ConsumerConfigSSLClass;
supportsDatabase?: boolean;
supportsDataDiff?: boolean;
supportsDBTExtraction?: boolean;
@ -5479,6 +5508,11 @@ export interface DatabaseConnectionClass {
* Regex to only include/exclude tables that matches the pattern.
*/
tableFilterPattern?: FilterPattern;
/**
* Trust the server certificate without validation. Set to false in production to validate
* server certificates against the certificate authority.
*/
trustServerCertificate?: boolean;
/**
* Service Type
*/
@ -6022,6 +6056,9 @@ export enum SpaceType {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
* connection.
*

View File

@ -931,6 +931,9 @@ export interface ConfigObject {
/**
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* SSL Configuration for OpenMetadata Server
*/
sslConfig?: SSLConfigObject;
@ -945,6 +948,16 @@ export interface ConfigObject {
* Authentication mode to connect to Impala.
*/
authMechanism?: AuthMechanismEnum;
/**
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
* between the client and server will be encrypted.
*/
encrypt?: boolean;
/**
* Trust the server certificate without validation. Set to false in production to validate
* server certificates against the certificate authority.
*/
trustServerCertificate?: boolean;
/**
* Use slow logs to extract lineage.
*/
@ -2624,6 +2637,9 @@ export interface QlikCertificatesBy {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
* connection.
*
@ -3255,6 +3271,9 @@ export enum ConnectionScheme {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
* connection.
*
@ -3393,6 +3412,11 @@ export interface DatabaseConnectionClass {
* ODBC driver version in case of pyodbc connection.
*/
driver?: string;
/**
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
* between the client and server will be encrypted.
*/
encrypt?: boolean;
/**
* Host and port of the MSSQL service.
*/
@ -3413,7 +3437,12 @@ export interface DatabaseConnectionClass {
/**
* SQLAlchemy driver scheme options.
*/
scheme?: MssqlScheme;
scheme?: MssqlScheme;
/**
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*/
sslConfig?: ConsumerConfigSSLClass;
supportsDatabase?: boolean;
supportsDataDiff?: boolean;
supportsDBTExtraction?: boolean;
@ -3426,6 +3455,11 @@ export interface DatabaseConnectionClass {
* Regex to only include/exclude tables that matches the pattern.
*/
tableFilterPattern?: FilterPattern;
/**
* Trust the server certificate without validation. Set to false in production to validate
* server certificates against the certificate authority.
*/
trustServerCertificate?: boolean;
/**
* Service Type
*/
@ -3983,6 +4017,9 @@ export enum SpaceType {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
* connection.
*

View File

@ -501,6 +501,9 @@ export interface OpenMetadataJWTClientConfig {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
* connection.
*
@ -1529,6 +1532,9 @@ export interface ConfigObject {
/**
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* SSL Configuration for OpenMetadata Server
*/
sslConfig?: SSLConfigObject;
@ -1543,6 +1549,16 @@ export interface ConfigObject {
* Authentication mode to connect to Impala.
*/
authMechanism?: AuthMechanismEnum;
/**
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
* between the client and server will be encrypted.
*/
encrypt?: boolean;
/**
* Trust the server certificate without validation. Set to false in production to validate
* server certificates against the certificate authority.
*/
trustServerCertificate?: boolean;
/**
* Use slow logs to extract lineage.
*/
@ -3750,6 +3766,9 @@ export enum ConnectionScheme {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
* connection.
*
@ -3875,6 +3894,11 @@ export interface DatabaseConnectionClass {
* ODBC driver version in case of pyodbc connection.
*/
driver?: string;
/**
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
* between the client and server will be encrypted.
*/
encrypt?: boolean;
/**
* Host and port of the MSSQL service.
*/
@ -3895,7 +3919,12 @@ export interface DatabaseConnectionClass {
/**
* SQLAlchemy driver scheme options.
*/
scheme?: MssqlScheme;
scheme?: MssqlScheme;
/**
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*/
sslConfig?: ConsumerConfigSSLClass;
supportsDatabase?: boolean;
supportsDataDiff?: boolean;
supportsDBTExtraction?: boolean;
@ -3908,6 +3937,11 @@ export interface DatabaseConnectionClass {
* Regex to only include/exclude tables that matches the pattern.
*/
tableFilterPattern?: FilterPattern;
/**
* Trust the server certificate without validation. Set to false in production to validate
* server certificates against the certificate authority.
*/
trustServerCertificate?: boolean;
/**
* Service Type
*/
@ -4422,6 +4456,9 @@ export enum SpaceType {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
* connection.
*

View File

@ -30,6 +30,11 @@ export interface MssqlConnection {
* ODBC driver version in case of pyodbc connection.
*/
driver?: string;
/**
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
* between the client and server will be encrypted.
*/
encrypt?: boolean;
/**
* Host and port of the MSSQL service.
*/
@ -50,7 +55,12 @@ export interface MssqlConnection {
/**
* SQLAlchemy driver scheme options.
*/
scheme?: MssqlScheme;
scheme?: MssqlScheme;
/**
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*/
sslConfig?: Config;
supportsDatabase?: boolean;
supportsDataDiff?: boolean;
supportsDBTExtraction?: boolean;
@ -63,6 +73,11 @@ export interface MssqlConnection {
* Regex to only include/exclude tables that matches the pattern.
*/
tableFilterPattern?: FilterPattern;
/**
* Trust the server certificate without validation. Set to false in production to validate
* server certificates against the certificate authority.
*/
trustServerCertificate?: boolean;
/**
* Service Type
*/
@ -181,6 +196,29 @@ export enum MssqlScheme {
MssqlPytds = "mssql+pytds",
}
/**
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Client SSL configuration
*
* OpenMetadata Client configured to validate SSL certificates.
*/
export interface Config {
/**
* The CA certificate used for SSL validation.
*/
caCertificate?: string;
/**
* The SSL certificate used for client authentication.
*/
sslCertificate?: string;
/**
* The private key associated with the SSL certificate.
*/
sslKey?: string;
}
/**
* Service Type
*

View File

@ -51,6 +51,11 @@ export interface MssqlConnection {
* ODBC driver version in case of pyodbc connection.
*/
driver?: string;
/**
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
* between the client and server will be encrypted.
*/
encrypt?: boolean;
/**
* Host and port of the MSSQL service.
*/
@ -71,7 +76,12 @@ export interface MssqlConnection {
/**
* SQLAlchemy driver scheme options.
*/
scheme?: MssqlScheme;
scheme?: MssqlScheme;
/**
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*/
sslConfig?: Config;
supportsDatabase?: boolean;
supportsDataDiff?: boolean;
supportsDBTExtraction?: boolean;
@ -84,6 +94,11 @@ export interface MssqlConnection {
* Regex to only include/exclude tables that matches the pattern.
*/
tableFilterPattern?: FilterPattern;
/**
* Trust the server certificate without validation. Set to false in production to validate
* server certificates against the certificate authority.
*/
trustServerCertificate?: boolean;
/**
* Service Type
*/
@ -204,6 +219,29 @@ export enum MssqlScheme {
MssqlPytds = "mssql+pytds",
}
/**
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Client SSL configuration
*
* OpenMetadata Client configured to validate SSL certificates.
*/
export interface Config {
/**
* The CA certificate used for SSL validation.
*/
caCertificate?: string;
/**
* The SSL certificate used for client authentication.
*/
sslCertificate?: string;
/**
* The private key associated with the SSL certificate.
*/
sslKey?: string;
}
/**
* Service Type
*

View File

@ -51,6 +51,11 @@ export interface Connection {
* ODBC driver version in case of pyodbc connection.
*/
driver?: string;
/**
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
* between the client and server will be encrypted.
*/
encrypt?: boolean;
/**
* Host and port of the MSSQL service.
*/
@ -71,7 +76,12 @@ export interface Connection {
/**
* SQLAlchemy driver scheme options.
*/
scheme?: MssqlScheme;
scheme?: MssqlScheme;
/**
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*/
sslConfig?: Config;
supportsDatabase?: boolean;
supportsDataDiff?: boolean;
supportsDBTExtraction?: boolean;
@ -84,6 +94,11 @@ export interface Connection {
* Regex to only include/exclude tables that matches the pattern.
*/
tableFilterPattern?: FilterPattern;
/**
* Trust the server certificate without validation. Set to false in production to validate
* server certificates against the certificate authority.
*/
trustServerCertificate?: boolean;
/**
* Service Type
*/
@ -202,6 +217,29 @@ export enum MssqlScheme {
MssqlPytds = "mssql+pytds",
}
/**
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Client SSL configuration
*
* OpenMetadata Client configured to validate SSL certificates.
*/
export interface Config {
/**
* The CA certificate used for SSL validation.
*/
caCertificate?: string;
/**
* The SSL certificate used for client authentication.
*/
sslCertificate?: string;
/**
* The private key associated with the SSL certificate.
*/
sslKey?: string;
}
/**
* Service Type
*

View File

@ -820,6 +820,9 @@ export interface ConfigObject {
/**
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* SSL Configuration for OpenMetadata Server
*/
sslConfig?: SSLConfigObject;
@ -1212,6 +1215,16 @@ export interface ConfigObject {
* Authentication mode to connect to Impala.
*/
authMechanism?: AuthMechanismEnum;
/**
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
* between the client and server will be encrypted.
*/
encrypt?: boolean;
/**
* Trust the server certificate without validation. Set to false in production to validate
* server certificates against the certificate authority.
*/
trustServerCertificate?: boolean;
/**
* Use slow logs to extract lineage.
*/
@ -2607,6 +2620,9 @@ export interface QlikCertificatesBy {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
* connection.
*
@ -3238,6 +3254,9 @@ export enum ConnectionScheme {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
* connection.
*
@ -3376,6 +3395,11 @@ export interface DatabaseConnectionClass {
* ODBC driver version in case of pyodbc connection.
*/
driver?: string;
/**
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
* between the client and server will be encrypted.
*/
encrypt?: boolean;
/**
* Host and port of the MSSQL service.
*/
@ -3396,7 +3420,12 @@ export interface DatabaseConnectionClass {
/**
* SQLAlchemy driver scheme options.
*/
scheme?: MssqlScheme;
scheme?: MssqlScheme;
/**
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*/
sslConfig?: ConsumerConfigSSLClass;
supportsDatabase?: boolean;
supportsDataDiff?: boolean;
supportsDBTExtraction?: boolean;
@ -3409,6 +3438,11 @@ export interface DatabaseConnectionClass {
* Regex to only include/exclude tables that matches the pattern.
*/
tableFilterPattern?: FilterPattern;
/**
* Trust the server certificate without validation. Set to false in production to validate
* server certificates against the certificate authority.
*/
trustServerCertificate?: boolean;
/**
* Service Type
*/
@ -3964,6 +3998,9 @@ export enum SpaceType {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
* connection.
*

View File

@ -748,6 +748,9 @@ export interface ConfigObject {
metastoreConnection?: HiveMetastoreConnectionDetails;
/**
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*/
sslConfig?: Config;
/**
@ -761,6 +764,16 @@ export interface ConfigObject {
* Authentication mode to connect to Impala.
*/
authMechanism?: AuthMechanismEnum;
/**
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
* between the client and server will be encrypted.
*/
encrypt?: boolean;
/**
* Trust the server certificate without validation. Set to false in production to validate
* server certificates against the certificate authority.
*/
trustServerCertificate?: boolean;
/**
* Use slow logs to extract lineage.
*/
@ -2034,6 +2047,9 @@ export enum HiveMetastoreConnectionDetailsScheme {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* OpenMetadata Client configured to validate SSL certificates.
*/
export interface Config {

View File

@ -628,6 +628,9 @@ export interface OpenMetadataJWTClientConfig {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
* connection.
*
@ -3674,6 +3677,9 @@ export interface ConfigObject {
/**
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* SSL Configuration for OpenMetadata Server
*/
sslConfig?: SSLConfigObject;
@ -4066,6 +4072,16 @@ export interface ConfigObject {
* Authentication mode to connect to Impala.
*/
authMechanism?: AuthMechanismEnum;
/**
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
* between the client and server will be encrypted.
*/
encrypt?: boolean;
/**
* Trust the server certificate without validation. Set to false in production to validate
* server certificates against the certificate authority.
*/
trustServerCertificate?: boolean;
/**
* Use slow logs to extract lineage.
*/
@ -5796,6 +5812,9 @@ export enum ConnectionScheme {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
* connection.
*
@ -5921,6 +5940,11 @@ export interface DatabaseConnectionClass {
* ODBC driver version in case of pyodbc connection.
*/
driver?: string;
/**
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
* between the client and server will be encrypted.
*/
encrypt?: boolean;
/**
* Host and port of the MSSQL service.
*/
@ -5941,7 +5965,12 @@ export interface DatabaseConnectionClass {
/**
* SQLAlchemy driver scheme options.
*/
scheme?: MssqlScheme;
scheme?: MssqlScheme;
/**
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*/
sslConfig?: ConsumerConfigSSLClass;
supportsDatabase?: boolean;
supportsDataDiff?: boolean;
supportsDBTExtraction?: boolean;
@ -5954,6 +5983,11 @@ export interface DatabaseConnectionClass {
* Regex to only include/exclude tables that matches the pattern.
*/
tableFilterPattern?: FilterPattern;
/**
* Trust the server certificate without validation. Set to false in production to validate
* server certificates against the certificate authority.
*/
trustServerCertificate?: boolean;
/**
* Service Type
*/
@ -6456,6 +6490,9 @@ export enum SpaceType {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
* connection.
*

View File

@ -871,6 +871,9 @@ export enum Scheme {
*
* Client SSL configuration
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* OpenMetadata Client configured to validate SSL certificates.
*/
export interface Config {
@ -943,6 +946,11 @@ export interface DatabaseConnectionClass {
* ODBC driver version in case of pyodbc connection.
*/
driver?: string;
/**
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
* between the client and server will be encrypted.
*/
encrypt?: boolean;
/**
* Host and port of the MSSQL service.
*/
@ -963,7 +971,12 @@ export interface DatabaseConnectionClass {
/**
* SQLAlchemy driver scheme options.
*/
scheme?: MssqlScheme;
scheme?: MssqlScheme;
/**
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*/
sslConfig?: Config;
supportsDatabase?: boolean;
supportsDataDiff?: boolean;
supportsDBTExtraction?: boolean;
@ -976,6 +989,11 @@ export interface DatabaseConnectionClass {
* Regex to only include/exclude tables that matches the pattern.
*/
tableFilterPattern?: FilterPattern;
/**
* Trust the server certificate without validation. Set to false in production to validate
* server certificates against the certificate authority.
*/
trustServerCertificate?: boolean;
/**
* Service Type
*/

View File

@ -864,6 +864,9 @@ export interface ConfigObject {
/**
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* SSL Configuration for OpenMetadata Server
*/
sslConfig?: SSLConfigObject;
@ -1256,6 +1259,16 @@ export interface ConfigObject {
* Authentication mode to connect to Impala.
*/
authMechanism?: AuthMechanismEnum;
/**
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
* between the client and server will be encrypted.
*/
encrypt?: boolean;
/**
* Trust the server certificate without validation. Set to false in production to validate
* server certificates against the certificate authority.
*/
trustServerCertificate?: boolean;
/**
* Use slow logs to extract lineage.
*/
@ -2651,6 +2664,9 @@ export interface QlikCertificatesBy {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
* connection.
*
@ -3282,6 +3298,9 @@ export enum ConnectionScheme {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
* connection.
*
@ -3420,6 +3439,11 @@ export interface DatabaseConnectionClass {
* ODBC driver version in case of pyodbc connection.
*/
driver?: string;
/**
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
* between the client and server will be encrypted.
*/
encrypt?: boolean;
/**
* Host and port of the MSSQL service.
*/
@ -3440,7 +3464,12 @@ export interface DatabaseConnectionClass {
/**
* SQLAlchemy driver scheme options.
*/
scheme?: MssqlScheme;
scheme?: MssqlScheme;
/**
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*/
sslConfig?: ConsumerConfigSSLClass;
supportsDatabase?: boolean;
supportsDataDiff?: boolean;
supportsDBTExtraction?: boolean;
@ -3453,6 +3482,11 @@ export interface DatabaseConnectionClass {
* Regex to only include/exclude tables that matches the pattern.
*/
tableFilterPattern?: FilterPattern;
/**
* Trust the server certificate without validation. Set to false in production to validate
* server certificates against the certificate authority.
*/
trustServerCertificate?: boolean;
/**
* Service Type
*/
@ -4008,6 +4042,9 @@ export enum SpaceType {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
* connection.
*

View File

@ -904,6 +904,9 @@ export interface ConfigObject {
/**
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* SSL Configuration for OpenMetadata Server
*/
sslConfig?: SSLConfigObject;
@ -1296,6 +1299,16 @@ export interface ConfigObject {
* Authentication mode to connect to Impala.
*/
authMechanism?: AuthMechanismEnum;
/**
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
* between the client and server will be encrypted.
*/
encrypt?: boolean;
/**
* Trust the server certificate without validation. Set to false in production to validate
* server certificates against the certificate authority.
*/
trustServerCertificate?: boolean;
/**
* Use slow logs to extract lineage.
*/
@ -2704,6 +2717,9 @@ export interface QlikCertificatesBy {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
* connection.
*
@ -3335,6 +3351,9 @@ export enum ConnectionScheme {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
* connection.
*
@ -3473,6 +3492,11 @@ export interface DatabaseConnectionClass {
* ODBC driver version in case of pyodbc connection.
*/
driver?: string;
/**
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
* between the client and server will be encrypted.
*/
encrypt?: boolean;
/**
* Host and port of the MSSQL service.
*/
@ -3493,7 +3517,12 @@ export interface DatabaseConnectionClass {
/**
* SQLAlchemy driver scheme options.
*/
scheme?: MssqlScheme;
scheme?: MssqlScheme;
/**
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*/
sslConfig?: ConsumerConfigSSLClass;
supportsDatabase?: boolean;
supportsDataDiff?: boolean;
supportsDBTExtraction?: boolean;
@ -3506,6 +3535,11 @@ export interface DatabaseConnectionClass {
* Regex to only include/exclude tables that matches the pattern.
*/
tableFilterPattern?: FilterPattern;
/**
* Trust the server certificate without validation. Set to false in production to validate
* server certificates against the certificate authority.
*/
trustServerCertificate?: boolean;
/**
* Service Type
*/
@ -4061,6 +4095,9 @@ export enum SpaceType {
*
* SSL Configuration details.
*
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
* client certificate, and private key for mutual TLS authentication.
*
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
* connection.
*