mirror of
https://github.com/open-metadata/OpenMetadata.git
synced 2025-12-12 15:57:44 +00:00
* Add MSSQL SSL support * Update generated TypeScript types * Update generated TypeScript types * fix: mssql ssl params and sidebar doc * fix: mssql.md file * fix: mssql ssl manager tests * refactor: added mssql connection class converter and mssql.md connection argument description --------- Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com> Co-authored-by: Keshav Mohta <keshavmohta09@gmail.com> Co-authored-by: Keshav Mohta <68001229+keshavmohta09@users.noreply.github.com>
This commit is contained in:
parent
d833941bf5
commit
abf3f7b7ca
@ -43,6 +43,9 @@ from metadata.generated.schema.entity.services.connections.database.hiveConnecti
|
||||
from metadata.generated.schema.entity.services.connections.database.mongoDBConnection import (
|
||||
MongoDBConnection,
|
||||
)
|
||||
from metadata.generated.schema.entity.services.connections.database.mssqlConnection import (
|
||||
MssqlConnection,
|
||||
)
|
||||
from metadata.generated.schema.entity.services.connections.database.mysqlConnection import (
|
||||
MysqlConnection,
|
||||
)
|
||||
@ -275,6 +278,29 @@ class SSLManager:
|
||||
|
||||
return connection
|
||||
|
||||
@setup_ssl.register(MssqlConnection)
|
||||
def _(self, connection):
|
||||
connection = cast(MssqlConnection, connection)
|
||||
|
||||
if not connection.connectionArguments:
|
||||
connection.connectionArguments = init_empty_connection_arguments()
|
||||
|
||||
# Handle driver-specific SSL configuration
|
||||
if connection.scheme.value == "mssql+pyodbc":
|
||||
# ODBC Driver SSL parameters
|
||||
if connection.encrypt:
|
||||
connection.connectionArguments.root["Encrypt"] = "yes"
|
||||
|
||||
if connection.trustServerCertificate:
|
||||
connection.connectionArguments.root["TrustServerCertificate"] = "yes"
|
||||
|
||||
elif connection.scheme.value == "mssql+pytds":
|
||||
# pytds driver SSL parameters
|
||||
if self.ca_file_path:
|
||||
connection.connectionArguments.root["cafile"] = self.ca_file_path
|
||||
|
||||
return connection
|
||||
|
||||
|
||||
@singledispatch
|
||||
def check_ssl_and_init(
|
||||
@ -327,6 +353,21 @@ def _(connection):
|
||||
return None
|
||||
|
||||
|
||||
@check_ssl_and_init.register(MssqlConnection)
|
||||
def _(connection):
|
||||
service_connection = cast(MssqlConnection, connection)
|
||||
ssl: Optional[
|
||||
verifySSLConfig.SslConfig
|
||||
] = service_connection.sslConfig or verifySSLConfig.SslConfig(
|
||||
**{"caCertificate": None}
|
||||
)
|
||||
return SSLManager(
|
||||
ca=ssl.root.caCertificate,
|
||||
cert=ssl.root.sslCertificate,
|
||||
key=ssl.root.sslKey,
|
||||
)
|
||||
|
||||
|
||||
@check_ssl_and_init.register(MongoDBConnection)
|
||||
def _(connection):
|
||||
service_connection = cast(Union[MysqlConnection, DorisConnection], connection)
|
||||
|
||||
@ -210,3 +210,166 @@ class CassandraSourceSSLTest(TestCase):
|
||||
cassandra_source_with_ssl.service_connection.sslConfig.root.sslCertificate.get_secret_value(),
|
||||
"sslCertificateData",
|
||||
)
|
||||
|
||||
|
||||
class MssqlSSLManagerTest(TestCase):
|
||||
"""
|
||||
Tests for MSSQL SSL Manager functionality
|
||||
"""
|
||||
|
||||
def test_check_ssl_and_init_with_ssl_config(self):
|
||||
"""Test SSL manager initialization with sslConfig"""
|
||||
from metadata.generated.schema.entity.services.connections.database.mssqlConnection import (
|
||||
MssqlConnection,
|
||||
)
|
||||
from metadata.utils.ssl_manager import check_ssl_and_init
|
||||
|
||||
connection_with_ssl = MssqlConnection(
|
||||
hostPort="localhost:1433",
|
||||
database="testdb",
|
||||
username="sa",
|
||||
password="password",
|
||||
encrypt=False,
|
||||
trustServerCertificate=False,
|
||||
sslConfig={"caCertificate": "caCertificateData"},
|
||||
)
|
||||
|
||||
ssl_manager = check_ssl_and_init(connection_with_ssl)
|
||||
|
||||
self.assertIsNotNone(ssl_manager)
|
||||
self.assertIsNotNone(ssl_manager.ca_file_path)
|
||||
|
||||
ssl_manager.cleanup_temp_files()
|
||||
|
||||
def test_check_ssl_and_init_without_ssl_config(self):
|
||||
"""Test SSL manager initialization without sslConfig"""
|
||||
from metadata.generated.schema.entity.services.connections.database.mssqlConnection import (
|
||||
MssqlConnection,
|
||||
)
|
||||
from metadata.utils.ssl_manager import check_ssl_and_init
|
||||
|
||||
connection_without_ssl = MssqlConnection(
|
||||
hostPort="localhost:1433",
|
||||
database="testdb",
|
||||
username="sa",
|
||||
password="password",
|
||||
encrypt=True,
|
||||
trustServerCertificate=True,
|
||||
)
|
||||
|
||||
ssl_manager = check_ssl_and_init(connection_without_ssl)
|
||||
|
||||
self.assertIsNone(ssl_manager.ca_file_path)
|
||||
|
||||
def test_setup_ssl_pyodbc_driver(self):
|
||||
"""Test SSL setup for pyodbc driver"""
|
||||
from metadata.generated.schema.entity.services.connections.database.mssqlConnection import (
|
||||
MssqlConnection,
|
||||
MssqlScheme,
|
||||
)
|
||||
|
||||
connection = MssqlConnection(
|
||||
hostPort="localhost:1433",
|
||||
database="testdb",
|
||||
username="sa",
|
||||
password="password",
|
||||
scheme=MssqlScheme.mssql_pyodbc,
|
||||
encrypt=True,
|
||||
trustServerCertificate=False,
|
||||
)
|
||||
|
||||
ssl_manager = SSLManager(
|
||||
ca=SecretStr("CA cert"), cert=SecretStr("Cert"), key=SecretStr("Key")
|
||||
)
|
||||
updated_connection = ssl_manager.setup_ssl(connection)
|
||||
|
||||
self.assertIsNotNone(updated_connection.connectionArguments)
|
||||
self.assertEqual(
|
||||
updated_connection.connectionArguments.root.get("Encrypt"), "yes"
|
||||
)
|
||||
self.assertIsNone(
|
||||
updated_connection.connectionArguments.root.get("TrustServerCertificate")
|
||||
)
|
||||
|
||||
ssl_manager.cleanup_temp_files()
|
||||
|
||||
def test_setup_ssl_pyodbc_with_trust_certificate(self):
|
||||
"""Test SSL setup for pyodbc driver with trustServerCertificate"""
|
||||
from metadata.generated.schema.entity.services.connections.database.mssqlConnection import (
|
||||
MssqlConnection,
|
||||
MssqlScheme,
|
||||
)
|
||||
|
||||
connection = MssqlConnection(
|
||||
hostPort="localhost:1433",
|
||||
database="testdb",
|
||||
username="sa",
|
||||
password="password",
|
||||
scheme=MssqlScheme.mssql_pyodbc,
|
||||
encrypt=True,
|
||||
trustServerCertificate=True,
|
||||
)
|
||||
|
||||
ssl_manager = SSLManager(
|
||||
ca=SecretStr("CA cert"), cert=SecretStr("Cert"), key=SecretStr("Key")
|
||||
)
|
||||
updated_connection = ssl_manager.setup_ssl(connection)
|
||||
|
||||
self.assertIsNotNone(updated_connection.connectionArguments)
|
||||
self.assertEqual(
|
||||
updated_connection.connectionArguments.root.get("Encrypt"), "yes"
|
||||
)
|
||||
self.assertEqual(
|
||||
updated_connection.connectionArguments.root.get("TrustServerCertificate"),
|
||||
"yes",
|
||||
)
|
||||
|
||||
ssl_manager.cleanup_temp_files()
|
||||
|
||||
def test_setup_ssl_pytds_driver(self):
|
||||
"""Test SSL setup for pytds driver"""
|
||||
from metadata.generated.schema.entity.services.connections.database.mssqlConnection import (
|
||||
MssqlConnection,
|
||||
MssqlScheme,
|
||||
)
|
||||
from metadata.utils.ssl_manager import check_ssl_and_init
|
||||
|
||||
connection = MssqlConnection(
|
||||
hostPort="localhost:1433",
|
||||
database="testdb",
|
||||
username="sa",
|
||||
password="password",
|
||||
scheme=MssqlScheme.mssql_pytds,
|
||||
sslConfig={"caCertificate": "caCertificateData"},
|
||||
)
|
||||
|
||||
ssl_manager = check_ssl_and_init(connection)
|
||||
updated_connection = ssl_manager.setup_ssl(connection)
|
||||
|
||||
self.assertIsNotNone(updated_connection.connectionArguments.root["cafile"])
|
||||
|
||||
ssl_manager.cleanup_temp_files()
|
||||
|
||||
def test_setup_ssl_pymssql_driver(self):
|
||||
"""Test SSL setup for pymssql driver"""
|
||||
from metadata.generated.schema.entity.services.connections.database.mssqlConnection import (
|
||||
MssqlConnection,
|
||||
MssqlScheme,
|
||||
)
|
||||
|
||||
connection = MssqlConnection(
|
||||
hostPort="localhost:1433",
|
||||
database="testdb",
|
||||
username="sa",
|
||||
password="password",
|
||||
scheme=MssqlScheme.mssql_pymssql,
|
||||
)
|
||||
|
||||
ssl_manager = SSLManager(
|
||||
ca=SecretStr("CA cert"), cert=SecretStr("Cert"), key=SecretStr("Key")
|
||||
)
|
||||
updated_connection = ssl_manager.setup_ssl(connection)
|
||||
|
||||
self.assertDictEqual(updated_connection.connectionArguments.root, {})
|
||||
|
||||
ssl_manager.cleanup_temp_files()
|
||||
|
||||
@ -0,0 +1,23 @@
|
||||
package org.openmetadata.sdk.services.drives;
|
||||
|
||||
import org.openmetadata.schema.api.data.CreateDirectory;
|
||||
import org.openmetadata.schema.entity.data.Directory;
|
||||
import org.openmetadata.sdk.exceptions.OpenMetadataException;
|
||||
import org.openmetadata.sdk.network.HttpClient;
|
||||
import org.openmetadata.sdk.network.HttpMethod;
|
||||
import org.openmetadata.sdk.services.EntityServiceBase;
|
||||
|
||||
public class DirectoryService extends EntityServiceBase<Directory> {
|
||||
public DirectoryService(HttpClient httpClient) {
|
||||
super(httpClient, "/v1/drives/directories");
|
||||
}
|
||||
|
||||
@Override
|
||||
protected Class<Directory> getEntityClass() {
|
||||
return Directory.class;
|
||||
}
|
||||
|
||||
public Directory create(CreateDirectory request) throws OpenMetadataException {
|
||||
return httpClient.execute(HttpMethod.POST, basePath, request, Directory.class);
|
||||
}
|
||||
}
|
||||
@ -0,0 +1,23 @@
|
||||
package org.openmetadata.sdk.services.drives;
|
||||
|
||||
import org.openmetadata.schema.api.data.CreateFile;
|
||||
import org.openmetadata.schema.entity.data.File;
|
||||
import org.openmetadata.sdk.exceptions.OpenMetadataException;
|
||||
import org.openmetadata.sdk.network.HttpClient;
|
||||
import org.openmetadata.sdk.network.HttpMethod;
|
||||
import org.openmetadata.sdk.services.EntityServiceBase;
|
||||
|
||||
public class FileService extends EntityServiceBase<File> {
|
||||
public FileService(HttpClient httpClient) {
|
||||
super(httpClient, "/v1/drives/files");
|
||||
}
|
||||
|
||||
@Override
|
||||
protected Class<File> getEntityClass() {
|
||||
return File.class;
|
||||
}
|
||||
|
||||
public File create(CreateFile request) throws OpenMetadataException {
|
||||
return httpClient.execute(HttpMethod.POST, basePath, request, File.class);
|
||||
}
|
||||
}
|
||||
@ -0,0 +1,23 @@
|
||||
package org.openmetadata.sdk.services.drives;
|
||||
|
||||
import org.openmetadata.schema.api.data.CreateSpreadsheet;
|
||||
import org.openmetadata.schema.entity.data.Spreadsheet;
|
||||
import org.openmetadata.sdk.exceptions.OpenMetadataException;
|
||||
import org.openmetadata.sdk.network.HttpClient;
|
||||
import org.openmetadata.sdk.network.HttpMethod;
|
||||
import org.openmetadata.sdk.services.EntityServiceBase;
|
||||
|
||||
public class SpreadsheetService extends EntityServiceBase<Spreadsheet> {
|
||||
public SpreadsheetService(HttpClient httpClient) {
|
||||
super(httpClient, "/v1/drives/spreadsheets");
|
||||
}
|
||||
|
||||
@Override
|
||||
protected Class<Spreadsheet> getEntityClass() {
|
||||
return Spreadsheet.class;
|
||||
}
|
||||
|
||||
public Spreadsheet create(CreateSpreadsheet request) throws OpenMetadataException {
|
||||
return httpClient.execute(HttpMethod.POST, basePath, request, Spreadsheet.class);
|
||||
}
|
||||
}
|
||||
@ -0,0 +1,23 @@
|
||||
package org.openmetadata.sdk.services.drives;
|
||||
|
||||
import org.openmetadata.schema.api.data.CreateWorksheet;
|
||||
import org.openmetadata.schema.entity.data.Worksheet;
|
||||
import org.openmetadata.sdk.exceptions.OpenMetadataException;
|
||||
import org.openmetadata.sdk.network.HttpClient;
|
||||
import org.openmetadata.sdk.network.HttpMethod;
|
||||
import org.openmetadata.sdk.services.EntityServiceBase;
|
||||
|
||||
public class WorksheetService extends EntityServiceBase<Worksheet> {
|
||||
public WorksheetService(HttpClient httpClient) {
|
||||
super(httpClient, "/v1/drives/worksheets");
|
||||
}
|
||||
|
||||
@Override
|
||||
protected Class<Worksheet> getEntityClass() {
|
||||
return Worksheet.class;
|
||||
}
|
||||
|
||||
public Worksheet create(CreateWorksheet request) throws OpenMetadataException {
|
||||
return httpClient.execute(HttpMethod.POST, basePath, request, Worksheet.class);
|
||||
}
|
||||
}
|
||||
@ -36,6 +36,7 @@ import org.openmetadata.schema.services.connections.database.DeltaLakeConnection
|
||||
import org.openmetadata.schema.services.connections.database.GreenplumConnection;
|
||||
import org.openmetadata.schema.services.connections.database.HiveConnection;
|
||||
import org.openmetadata.schema.services.connections.database.IcebergConnection;
|
||||
import org.openmetadata.schema.services.connections.database.MssqlConnection;
|
||||
import org.openmetadata.schema.services.connections.database.MysqlConnection;
|
||||
import org.openmetadata.schema.services.connections.database.PostgresConnection;
|
||||
import org.openmetadata.schema.services.connections.database.RedshiftConnection;
|
||||
@ -87,6 +88,7 @@ public final class ClassConverterFactory {
|
||||
Map.entry(IcebergConnection.class, new IcebergConnectionClassConverter()),
|
||||
Map.entry(IcebergFileSystem.class, new IcebergFileSystemClassConverter()),
|
||||
Map.entry(LookerConnection.class, new LookerConnectionClassConverter()),
|
||||
Map.entry(MssqlConnection.class, new MssqlConnectionClassConverter()),
|
||||
Map.entry(MysqlConnection.class, new MysqlConnectionClassConverter()),
|
||||
Map.entry(RedshiftConnection.class, new RedshiftConnectionClassConverter()),
|
||||
Map.entry(GreenplumConnection.class, new GreenplumConnectionClassConverter()),
|
||||
|
||||
@ -0,0 +1,38 @@
|
||||
/*
|
||||
* Copyright 2021 Collate
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
package org.openmetadata.service.secrets.converter;
|
||||
|
||||
import java.util.List;
|
||||
import org.openmetadata.schema.security.ssl.ValidateSSLClientConfig;
|
||||
import org.openmetadata.schema.services.connections.database.MssqlConnection;
|
||||
import org.openmetadata.schema.utils.JsonUtils;
|
||||
|
||||
public class MssqlConnectionClassConverter extends ClassConverter {
|
||||
|
||||
private static final List<Class<?>> SSL_SOURCE_CLASS = List.of(ValidateSSLClientConfig.class);
|
||||
|
||||
public MssqlConnectionClassConverter() {
|
||||
super(MssqlConnection.class);
|
||||
}
|
||||
|
||||
@Override
|
||||
public Object convert(Object object) {
|
||||
MssqlConnection mssqlConnection = (MssqlConnection) JsonUtils.convertValue(object, this.clazz);
|
||||
|
||||
tryToConvert(mssqlConnection.getSslConfig(), SSL_SOURCE_CLASS)
|
||||
.ifPresent(mssqlConnection::setSslConfig);
|
||||
|
||||
return mssqlConnection;
|
||||
}
|
||||
}
|
||||
@ -59,6 +59,23 @@
|
||||
"type": "string",
|
||||
"default": "ODBC Driver 18 for SQL Server"
|
||||
},
|
||||
"encrypt": {
|
||||
"title": "Encrypt Connection",
|
||||
"description": "Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted between the client and server will be encrypted.",
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"trustServerCertificate": {
|
||||
"title": "Trust Server Certificate",
|
||||
"description": "Trust the server certificate without validation. Set to false in production to validate server certificates against the certificate authority.",
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"sslConfig": {
|
||||
"title": "SSL Configuration",
|
||||
"description": "SSL/TLS certificate configuration for client authentication. Provide CA certificate, client certificate, and private key for mutual TLS authentication.",
|
||||
"$ref": "../../../../security/ssl/verifySSLConfig.json#/definitions/sslConfig"
|
||||
},
|
||||
"ingestAllDatabases": {
|
||||
"title": "Ingest All Databases",
|
||||
"description": "Ingest data from all databases in Mssql. You can use databaseFilterPattern on top of this.",
|
||||
|
||||
@ -97,6 +97,35 @@ You can download the ODBC driver from <a href="https://learn.microsoft.com/en-us
|
||||
In case of Docker or Kubernetes deployments, this driver comes out of the box with version `ODBC Driver 18 for SQL Server`.
|
||||
$$
|
||||
|
||||
$$section
|
||||
### Encrypt Connection $(id="encrypt")
|
||||
|
||||
Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted between the client and server will be encrypted.
|
||||
|
||||
**Important:**
|
||||
- Can be configured along with Trust Server Certificate option
|
||||
- May require additional connection arguments for fine-grained control
|
||||
- Default value is `false`
|
||||
$$
|
||||
|
||||
$$section
|
||||
### Trust Server Certificate $(id="trustServerCertificate")
|
||||
|
||||
Trust the server certificate without validation When using **pyodbc** scheme.
|
||||
|
||||
**Important:**
|
||||
- Can be combined with Encrypt Connection option
|
||||
- Default value is `false`
|
||||
$$
|
||||
|
||||
$$section
|
||||
### SSL Configuration $(id="sslConfig")
|
||||
|
||||
SSL/TLS certificate configuration for client authentication. Provide CA certificate for mutual TLS authentication.
|
||||
|
||||
**Important:**
|
||||
- For certificate-based authentication with **pytds** scheme, provide the CA certificate file path in the SSL Configuration
|
||||
$$
|
||||
|
||||
$$section
|
||||
### Ingest All Databases $(id="ingestAllDatabases")
|
||||
@ -115,5 +144,7 @@ $$section
|
||||
|
||||
Enter the details for any additional connection arguments such as security or protocol configs that can be sent to MSSQL during the connection. These details must be added as Key-Value pairs.
|
||||
|
||||
When Connecting to MSSQL via **pyodbc** scheme requires the Connection Arguments Encrypt: No and TrustServerCertificate: Yes.
|
||||
When Connecting to MSSQL via **pyodbc** scheme requires the Connection Arguments Encrypt: No and TrustServerCertificate: Yes. You can also configure these through the corresponding fields.
|
||||
|
||||
When using the pytds connection scheme with a CA certificate, you might need to specify validate_host: false in the connection arguments.
|
||||
$$
|
||||
|
||||
@ -1049,6 +1049,9 @@ export interface ConfigObject {
|
||||
/**
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* SSL Configuration for OpenMetadata Server
|
||||
*/
|
||||
sslConfig?: SSLConfigObject;
|
||||
@ -1063,6 +1066,16 @@ export interface ConfigObject {
|
||||
* Authentication mode to connect to Impala.
|
||||
*/
|
||||
authMechanism?: AuthMechanismEnum;
|
||||
/**
|
||||
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
|
||||
* between the client and server will be encrypted.
|
||||
*/
|
||||
encrypt?: boolean;
|
||||
/**
|
||||
* Trust the server certificate without validation. Set to false in production to validate
|
||||
* server certificates against the certificate authority.
|
||||
*/
|
||||
trustServerCertificate?: boolean;
|
||||
/**
|
||||
* Use slow logs to extract lineage.
|
||||
*/
|
||||
@ -2742,6 +2755,9 @@ export interface QlikCertificatesBy {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
|
||||
* connection.
|
||||
*
|
||||
@ -3373,6 +3389,9 @@ export enum ConnectionScheme {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
|
||||
* connection.
|
||||
*
|
||||
@ -3511,6 +3530,11 @@ export interface DatabaseConnectionClass {
|
||||
* ODBC driver version in case of pyodbc connection.
|
||||
*/
|
||||
driver?: string;
|
||||
/**
|
||||
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
|
||||
* between the client and server will be encrypted.
|
||||
*/
|
||||
encrypt?: boolean;
|
||||
/**
|
||||
* Host and port of the MSSQL service.
|
||||
*/
|
||||
@ -3531,7 +3555,12 @@ export interface DatabaseConnectionClass {
|
||||
/**
|
||||
* SQLAlchemy driver scheme options.
|
||||
*/
|
||||
scheme?: MssqlScheme;
|
||||
scheme?: MssqlScheme;
|
||||
/**
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*/
|
||||
sslConfig?: ConsumerConfigSSLClass;
|
||||
supportsDatabase?: boolean;
|
||||
supportsDataDiff?: boolean;
|
||||
supportsDBTExtraction?: boolean;
|
||||
@ -3544,6 +3573,11 @@ export interface DatabaseConnectionClass {
|
||||
* Regex to only include/exclude tables that matches the pattern.
|
||||
*/
|
||||
tableFilterPattern?: FilterPattern;
|
||||
/**
|
||||
* Trust the server certificate without validation. Set to false in production to validate
|
||||
* server certificates against the certificate authority.
|
||||
*/
|
||||
trustServerCertificate?: boolean;
|
||||
/**
|
||||
* Service Type
|
||||
*/
|
||||
@ -4101,6 +4135,9 @@ export enum SpaceType {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
|
||||
* connection.
|
||||
*
|
||||
|
||||
@ -625,6 +625,9 @@ export interface ConfigObject {
|
||||
metastoreConnection?: HiveMetastoreConnectionDetails;
|
||||
/**
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*/
|
||||
sslConfig?: Config;
|
||||
/**
|
||||
@ -638,6 +641,16 @@ export interface ConfigObject {
|
||||
* Authentication mode to connect to Impala.
|
||||
*/
|
||||
authMechanism?: AuthMechanismEnum;
|
||||
/**
|
||||
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
|
||||
* between the client and server will be encrypted.
|
||||
*/
|
||||
encrypt?: boolean;
|
||||
/**
|
||||
* Trust the server certificate without validation. Set to false in production to validate
|
||||
* server certificates against the certificate authority.
|
||||
*/
|
||||
trustServerCertificate?: boolean;
|
||||
/**
|
||||
* Use slow logs to extract lineage.
|
||||
*/
|
||||
@ -1911,6 +1924,9 @@ export enum HiveMetastoreConnectionDetailsScheme {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* OpenMetadata Client configured to validate SSL certificates.
|
||||
*/
|
||||
export interface Config {
|
||||
|
||||
@ -757,6 +757,9 @@ export enum Scheme {
|
||||
*
|
||||
* Client SSL configuration
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* OpenMetadata Client configured to validate SSL certificates.
|
||||
*/
|
||||
export interface Config {
|
||||
@ -829,6 +832,11 @@ export interface DatabaseConnectionClass {
|
||||
* ODBC driver version in case of pyodbc connection.
|
||||
*/
|
||||
driver?: string;
|
||||
/**
|
||||
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
|
||||
* between the client and server will be encrypted.
|
||||
*/
|
||||
encrypt?: boolean;
|
||||
/**
|
||||
* Host and port of the MSSQL service.
|
||||
*/
|
||||
@ -849,7 +857,12 @@ export interface DatabaseConnectionClass {
|
||||
/**
|
||||
* SQLAlchemy driver scheme options.
|
||||
*/
|
||||
scheme?: MssqlScheme;
|
||||
scheme?: MssqlScheme;
|
||||
/**
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*/
|
||||
sslConfig?: Config;
|
||||
supportsDatabase?: boolean;
|
||||
supportsDataDiff?: boolean;
|
||||
supportsDBTExtraction?: boolean;
|
||||
@ -862,6 +875,11 @@ export interface DatabaseConnectionClass {
|
||||
* Regex to only include/exclude tables that matches the pattern.
|
||||
*/
|
||||
tableFilterPattern?: FilterPattern;
|
||||
/**
|
||||
* Trust the server certificate without validation. Set to false in production to validate
|
||||
* server certificates against the certificate authority.
|
||||
*/
|
||||
trustServerCertificate?: boolean;
|
||||
/**
|
||||
* Service Type
|
||||
*/
|
||||
|
||||
@ -3139,6 +3139,9 @@ export interface ConfigObject {
|
||||
/**
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* SSL Configuration for OpenMetadata Server
|
||||
*/
|
||||
sslConfig?: SSLConfigObject;
|
||||
@ -3531,6 +3534,16 @@ export interface ConfigObject {
|
||||
* Authentication mode to connect to Impala.
|
||||
*/
|
||||
authMechanism?: AuthMechanismEnum;
|
||||
/**
|
||||
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
|
||||
* between the client and server will be encrypted.
|
||||
*/
|
||||
encrypt?: boolean;
|
||||
/**
|
||||
* Trust the server certificate without validation. Set to false in production to validate
|
||||
* server certificates against the certificate authority.
|
||||
*/
|
||||
trustServerCertificate?: boolean;
|
||||
/**
|
||||
* Use slow logs to extract lineage.
|
||||
*/
|
||||
@ -4870,6 +4883,9 @@ export interface QlikCertificatesBy {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
|
||||
* connection.
|
||||
*
|
||||
@ -5308,6 +5324,9 @@ export enum ConnectionScheme {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
|
||||
* connection.
|
||||
*
|
||||
@ -5446,6 +5465,11 @@ export interface DatabaseConnectionClass {
|
||||
* ODBC driver version in case of pyodbc connection.
|
||||
*/
|
||||
driver?: string;
|
||||
/**
|
||||
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
|
||||
* between the client and server will be encrypted.
|
||||
*/
|
||||
encrypt?: boolean;
|
||||
/**
|
||||
* Host and port of the MSSQL service.
|
||||
*/
|
||||
@ -5466,7 +5490,12 @@ export interface DatabaseConnectionClass {
|
||||
/**
|
||||
* SQLAlchemy driver scheme options.
|
||||
*/
|
||||
scheme?: MssqlScheme;
|
||||
scheme?: MssqlScheme;
|
||||
/**
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*/
|
||||
sslConfig?: ConsumerConfigSSLClass;
|
||||
supportsDatabase?: boolean;
|
||||
supportsDataDiff?: boolean;
|
||||
supportsDBTExtraction?: boolean;
|
||||
@ -5479,6 +5508,11 @@ export interface DatabaseConnectionClass {
|
||||
* Regex to only include/exclude tables that matches the pattern.
|
||||
*/
|
||||
tableFilterPattern?: FilterPattern;
|
||||
/**
|
||||
* Trust the server certificate without validation. Set to false in production to validate
|
||||
* server certificates against the certificate authority.
|
||||
*/
|
||||
trustServerCertificate?: boolean;
|
||||
/**
|
||||
* Service Type
|
||||
*/
|
||||
@ -6022,6 +6056,9 @@ export enum SpaceType {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
|
||||
* connection.
|
||||
*
|
||||
|
||||
@ -931,6 +931,9 @@ export interface ConfigObject {
|
||||
/**
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* SSL Configuration for OpenMetadata Server
|
||||
*/
|
||||
sslConfig?: SSLConfigObject;
|
||||
@ -945,6 +948,16 @@ export interface ConfigObject {
|
||||
* Authentication mode to connect to Impala.
|
||||
*/
|
||||
authMechanism?: AuthMechanismEnum;
|
||||
/**
|
||||
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
|
||||
* between the client and server will be encrypted.
|
||||
*/
|
||||
encrypt?: boolean;
|
||||
/**
|
||||
* Trust the server certificate without validation. Set to false in production to validate
|
||||
* server certificates against the certificate authority.
|
||||
*/
|
||||
trustServerCertificate?: boolean;
|
||||
/**
|
||||
* Use slow logs to extract lineage.
|
||||
*/
|
||||
@ -2624,6 +2637,9 @@ export interface QlikCertificatesBy {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
|
||||
* connection.
|
||||
*
|
||||
@ -3255,6 +3271,9 @@ export enum ConnectionScheme {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
|
||||
* connection.
|
||||
*
|
||||
@ -3393,6 +3412,11 @@ export interface DatabaseConnectionClass {
|
||||
* ODBC driver version in case of pyodbc connection.
|
||||
*/
|
||||
driver?: string;
|
||||
/**
|
||||
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
|
||||
* between the client and server will be encrypted.
|
||||
*/
|
||||
encrypt?: boolean;
|
||||
/**
|
||||
* Host and port of the MSSQL service.
|
||||
*/
|
||||
@ -3413,7 +3437,12 @@ export interface DatabaseConnectionClass {
|
||||
/**
|
||||
* SQLAlchemy driver scheme options.
|
||||
*/
|
||||
scheme?: MssqlScheme;
|
||||
scheme?: MssqlScheme;
|
||||
/**
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*/
|
||||
sslConfig?: ConsumerConfigSSLClass;
|
||||
supportsDatabase?: boolean;
|
||||
supportsDataDiff?: boolean;
|
||||
supportsDBTExtraction?: boolean;
|
||||
@ -3426,6 +3455,11 @@ export interface DatabaseConnectionClass {
|
||||
* Regex to only include/exclude tables that matches the pattern.
|
||||
*/
|
||||
tableFilterPattern?: FilterPattern;
|
||||
/**
|
||||
* Trust the server certificate without validation. Set to false in production to validate
|
||||
* server certificates against the certificate authority.
|
||||
*/
|
||||
trustServerCertificate?: boolean;
|
||||
/**
|
||||
* Service Type
|
||||
*/
|
||||
@ -3983,6 +4017,9 @@ export enum SpaceType {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
|
||||
* connection.
|
||||
*
|
||||
|
||||
@ -501,6 +501,9 @@ export interface OpenMetadataJWTClientConfig {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
|
||||
* connection.
|
||||
*
|
||||
@ -1529,6 +1532,9 @@ export interface ConfigObject {
|
||||
/**
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* SSL Configuration for OpenMetadata Server
|
||||
*/
|
||||
sslConfig?: SSLConfigObject;
|
||||
@ -1543,6 +1549,16 @@ export interface ConfigObject {
|
||||
* Authentication mode to connect to Impala.
|
||||
*/
|
||||
authMechanism?: AuthMechanismEnum;
|
||||
/**
|
||||
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
|
||||
* between the client and server will be encrypted.
|
||||
*/
|
||||
encrypt?: boolean;
|
||||
/**
|
||||
* Trust the server certificate without validation. Set to false in production to validate
|
||||
* server certificates against the certificate authority.
|
||||
*/
|
||||
trustServerCertificate?: boolean;
|
||||
/**
|
||||
* Use slow logs to extract lineage.
|
||||
*/
|
||||
@ -3750,6 +3766,9 @@ export enum ConnectionScheme {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
|
||||
* connection.
|
||||
*
|
||||
@ -3875,6 +3894,11 @@ export interface DatabaseConnectionClass {
|
||||
* ODBC driver version in case of pyodbc connection.
|
||||
*/
|
||||
driver?: string;
|
||||
/**
|
||||
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
|
||||
* between the client and server will be encrypted.
|
||||
*/
|
||||
encrypt?: boolean;
|
||||
/**
|
||||
* Host and port of the MSSQL service.
|
||||
*/
|
||||
@ -3895,7 +3919,12 @@ export interface DatabaseConnectionClass {
|
||||
/**
|
||||
* SQLAlchemy driver scheme options.
|
||||
*/
|
||||
scheme?: MssqlScheme;
|
||||
scheme?: MssqlScheme;
|
||||
/**
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*/
|
||||
sslConfig?: ConsumerConfigSSLClass;
|
||||
supportsDatabase?: boolean;
|
||||
supportsDataDiff?: boolean;
|
||||
supportsDBTExtraction?: boolean;
|
||||
@ -3908,6 +3937,11 @@ export interface DatabaseConnectionClass {
|
||||
* Regex to only include/exclude tables that matches the pattern.
|
||||
*/
|
||||
tableFilterPattern?: FilterPattern;
|
||||
/**
|
||||
* Trust the server certificate without validation. Set to false in production to validate
|
||||
* server certificates against the certificate authority.
|
||||
*/
|
||||
trustServerCertificate?: boolean;
|
||||
/**
|
||||
* Service Type
|
||||
*/
|
||||
@ -4422,6 +4456,9 @@ export enum SpaceType {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
|
||||
* connection.
|
||||
*
|
||||
|
||||
@ -30,6 +30,11 @@ export interface MssqlConnection {
|
||||
* ODBC driver version in case of pyodbc connection.
|
||||
*/
|
||||
driver?: string;
|
||||
/**
|
||||
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
|
||||
* between the client and server will be encrypted.
|
||||
*/
|
||||
encrypt?: boolean;
|
||||
/**
|
||||
* Host and port of the MSSQL service.
|
||||
*/
|
||||
@ -50,7 +55,12 @@ export interface MssqlConnection {
|
||||
/**
|
||||
* SQLAlchemy driver scheme options.
|
||||
*/
|
||||
scheme?: MssqlScheme;
|
||||
scheme?: MssqlScheme;
|
||||
/**
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*/
|
||||
sslConfig?: Config;
|
||||
supportsDatabase?: boolean;
|
||||
supportsDataDiff?: boolean;
|
||||
supportsDBTExtraction?: boolean;
|
||||
@ -63,6 +73,11 @@ export interface MssqlConnection {
|
||||
* Regex to only include/exclude tables that matches the pattern.
|
||||
*/
|
||||
tableFilterPattern?: FilterPattern;
|
||||
/**
|
||||
* Trust the server certificate without validation. Set to false in production to validate
|
||||
* server certificates against the certificate authority.
|
||||
*/
|
||||
trustServerCertificate?: boolean;
|
||||
/**
|
||||
* Service Type
|
||||
*/
|
||||
@ -181,6 +196,29 @@ export enum MssqlScheme {
|
||||
MssqlPytds = "mssql+pytds",
|
||||
}
|
||||
|
||||
/**
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Client SSL configuration
|
||||
*
|
||||
* OpenMetadata Client configured to validate SSL certificates.
|
||||
*/
|
||||
export interface Config {
|
||||
/**
|
||||
* The CA certificate used for SSL validation.
|
||||
*/
|
||||
caCertificate?: string;
|
||||
/**
|
||||
* The SSL certificate used for client authentication.
|
||||
*/
|
||||
sslCertificate?: string;
|
||||
/**
|
||||
* The private key associated with the SSL certificate.
|
||||
*/
|
||||
sslKey?: string;
|
||||
}
|
||||
|
||||
/**
|
||||
* Service Type
|
||||
*
|
||||
|
||||
@ -51,6 +51,11 @@ export interface MssqlConnection {
|
||||
* ODBC driver version in case of pyodbc connection.
|
||||
*/
|
||||
driver?: string;
|
||||
/**
|
||||
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
|
||||
* between the client and server will be encrypted.
|
||||
*/
|
||||
encrypt?: boolean;
|
||||
/**
|
||||
* Host and port of the MSSQL service.
|
||||
*/
|
||||
@ -71,7 +76,12 @@ export interface MssqlConnection {
|
||||
/**
|
||||
* SQLAlchemy driver scheme options.
|
||||
*/
|
||||
scheme?: MssqlScheme;
|
||||
scheme?: MssqlScheme;
|
||||
/**
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*/
|
||||
sslConfig?: Config;
|
||||
supportsDatabase?: boolean;
|
||||
supportsDataDiff?: boolean;
|
||||
supportsDBTExtraction?: boolean;
|
||||
@ -84,6 +94,11 @@ export interface MssqlConnection {
|
||||
* Regex to only include/exclude tables that matches the pattern.
|
||||
*/
|
||||
tableFilterPattern?: FilterPattern;
|
||||
/**
|
||||
* Trust the server certificate without validation. Set to false in production to validate
|
||||
* server certificates against the certificate authority.
|
||||
*/
|
||||
trustServerCertificate?: boolean;
|
||||
/**
|
||||
* Service Type
|
||||
*/
|
||||
@ -204,6 +219,29 @@ export enum MssqlScheme {
|
||||
MssqlPytds = "mssql+pytds",
|
||||
}
|
||||
|
||||
/**
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Client SSL configuration
|
||||
*
|
||||
* OpenMetadata Client configured to validate SSL certificates.
|
||||
*/
|
||||
export interface Config {
|
||||
/**
|
||||
* The CA certificate used for SSL validation.
|
||||
*/
|
||||
caCertificate?: string;
|
||||
/**
|
||||
* The SSL certificate used for client authentication.
|
||||
*/
|
||||
sslCertificate?: string;
|
||||
/**
|
||||
* The private key associated with the SSL certificate.
|
||||
*/
|
||||
sslKey?: string;
|
||||
}
|
||||
|
||||
/**
|
||||
* Service Type
|
||||
*
|
||||
|
||||
@ -51,6 +51,11 @@ export interface Connection {
|
||||
* ODBC driver version in case of pyodbc connection.
|
||||
*/
|
||||
driver?: string;
|
||||
/**
|
||||
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
|
||||
* between the client and server will be encrypted.
|
||||
*/
|
||||
encrypt?: boolean;
|
||||
/**
|
||||
* Host and port of the MSSQL service.
|
||||
*/
|
||||
@ -71,7 +76,12 @@ export interface Connection {
|
||||
/**
|
||||
* SQLAlchemy driver scheme options.
|
||||
*/
|
||||
scheme?: MssqlScheme;
|
||||
scheme?: MssqlScheme;
|
||||
/**
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*/
|
||||
sslConfig?: Config;
|
||||
supportsDatabase?: boolean;
|
||||
supportsDataDiff?: boolean;
|
||||
supportsDBTExtraction?: boolean;
|
||||
@ -84,6 +94,11 @@ export interface Connection {
|
||||
* Regex to only include/exclude tables that matches the pattern.
|
||||
*/
|
||||
tableFilterPattern?: FilterPattern;
|
||||
/**
|
||||
* Trust the server certificate without validation. Set to false in production to validate
|
||||
* server certificates against the certificate authority.
|
||||
*/
|
||||
trustServerCertificate?: boolean;
|
||||
/**
|
||||
* Service Type
|
||||
*/
|
||||
@ -202,6 +217,29 @@ export enum MssqlScheme {
|
||||
MssqlPytds = "mssql+pytds",
|
||||
}
|
||||
|
||||
/**
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Client SSL configuration
|
||||
*
|
||||
* OpenMetadata Client configured to validate SSL certificates.
|
||||
*/
|
||||
export interface Config {
|
||||
/**
|
||||
* The CA certificate used for SSL validation.
|
||||
*/
|
||||
caCertificate?: string;
|
||||
/**
|
||||
* The SSL certificate used for client authentication.
|
||||
*/
|
||||
sslCertificate?: string;
|
||||
/**
|
||||
* The private key associated with the SSL certificate.
|
||||
*/
|
||||
sslKey?: string;
|
||||
}
|
||||
|
||||
/**
|
||||
* Service Type
|
||||
*
|
||||
|
||||
@ -820,6 +820,9 @@ export interface ConfigObject {
|
||||
/**
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* SSL Configuration for OpenMetadata Server
|
||||
*/
|
||||
sslConfig?: SSLConfigObject;
|
||||
@ -1212,6 +1215,16 @@ export interface ConfigObject {
|
||||
* Authentication mode to connect to Impala.
|
||||
*/
|
||||
authMechanism?: AuthMechanismEnum;
|
||||
/**
|
||||
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
|
||||
* between the client and server will be encrypted.
|
||||
*/
|
||||
encrypt?: boolean;
|
||||
/**
|
||||
* Trust the server certificate without validation. Set to false in production to validate
|
||||
* server certificates against the certificate authority.
|
||||
*/
|
||||
trustServerCertificate?: boolean;
|
||||
/**
|
||||
* Use slow logs to extract lineage.
|
||||
*/
|
||||
@ -2607,6 +2620,9 @@ export interface QlikCertificatesBy {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
|
||||
* connection.
|
||||
*
|
||||
@ -3238,6 +3254,9 @@ export enum ConnectionScheme {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
|
||||
* connection.
|
||||
*
|
||||
@ -3376,6 +3395,11 @@ export interface DatabaseConnectionClass {
|
||||
* ODBC driver version in case of pyodbc connection.
|
||||
*/
|
||||
driver?: string;
|
||||
/**
|
||||
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
|
||||
* between the client and server will be encrypted.
|
||||
*/
|
||||
encrypt?: boolean;
|
||||
/**
|
||||
* Host and port of the MSSQL service.
|
||||
*/
|
||||
@ -3396,7 +3420,12 @@ export interface DatabaseConnectionClass {
|
||||
/**
|
||||
* SQLAlchemy driver scheme options.
|
||||
*/
|
||||
scheme?: MssqlScheme;
|
||||
scheme?: MssqlScheme;
|
||||
/**
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*/
|
||||
sslConfig?: ConsumerConfigSSLClass;
|
||||
supportsDatabase?: boolean;
|
||||
supportsDataDiff?: boolean;
|
||||
supportsDBTExtraction?: boolean;
|
||||
@ -3409,6 +3438,11 @@ export interface DatabaseConnectionClass {
|
||||
* Regex to only include/exclude tables that matches the pattern.
|
||||
*/
|
||||
tableFilterPattern?: FilterPattern;
|
||||
/**
|
||||
* Trust the server certificate without validation. Set to false in production to validate
|
||||
* server certificates against the certificate authority.
|
||||
*/
|
||||
trustServerCertificate?: boolean;
|
||||
/**
|
||||
* Service Type
|
||||
*/
|
||||
@ -3964,6 +3998,9 @@ export enum SpaceType {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
|
||||
* connection.
|
||||
*
|
||||
|
||||
@ -748,6 +748,9 @@ export interface ConfigObject {
|
||||
metastoreConnection?: HiveMetastoreConnectionDetails;
|
||||
/**
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*/
|
||||
sslConfig?: Config;
|
||||
/**
|
||||
@ -761,6 +764,16 @@ export interface ConfigObject {
|
||||
* Authentication mode to connect to Impala.
|
||||
*/
|
||||
authMechanism?: AuthMechanismEnum;
|
||||
/**
|
||||
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
|
||||
* between the client and server will be encrypted.
|
||||
*/
|
||||
encrypt?: boolean;
|
||||
/**
|
||||
* Trust the server certificate without validation. Set to false in production to validate
|
||||
* server certificates against the certificate authority.
|
||||
*/
|
||||
trustServerCertificate?: boolean;
|
||||
/**
|
||||
* Use slow logs to extract lineage.
|
||||
*/
|
||||
@ -2034,6 +2047,9 @@ export enum HiveMetastoreConnectionDetailsScheme {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* OpenMetadata Client configured to validate SSL certificates.
|
||||
*/
|
||||
export interface Config {
|
||||
|
||||
@ -628,6 +628,9 @@ export interface OpenMetadataJWTClientConfig {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
|
||||
* connection.
|
||||
*
|
||||
@ -3674,6 +3677,9 @@ export interface ConfigObject {
|
||||
/**
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* SSL Configuration for OpenMetadata Server
|
||||
*/
|
||||
sslConfig?: SSLConfigObject;
|
||||
@ -4066,6 +4072,16 @@ export interface ConfigObject {
|
||||
* Authentication mode to connect to Impala.
|
||||
*/
|
||||
authMechanism?: AuthMechanismEnum;
|
||||
/**
|
||||
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
|
||||
* between the client and server will be encrypted.
|
||||
*/
|
||||
encrypt?: boolean;
|
||||
/**
|
||||
* Trust the server certificate without validation. Set to false in production to validate
|
||||
* server certificates against the certificate authority.
|
||||
*/
|
||||
trustServerCertificate?: boolean;
|
||||
/**
|
||||
* Use slow logs to extract lineage.
|
||||
*/
|
||||
@ -5796,6 +5812,9 @@ export enum ConnectionScheme {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
|
||||
* connection.
|
||||
*
|
||||
@ -5921,6 +5940,11 @@ export interface DatabaseConnectionClass {
|
||||
* ODBC driver version in case of pyodbc connection.
|
||||
*/
|
||||
driver?: string;
|
||||
/**
|
||||
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
|
||||
* between the client and server will be encrypted.
|
||||
*/
|
||||
encrypt?: boolean;
|
||||
/**
|
||||
* Host and port of the MSSQL service.
|
||||
*/
|
||||
@ -5941,7 +5965,12 @@ export interface DatabaseConnectionClass {
|
||||
/**
|
||||
* SQLAlchemy driver scheme options.
|
||||
*/
|
||||
scheme?: MssqlScheme;
|
||||
scheme?: MssqlScheme;
|
||||
/**
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*/
|
||||
sslConfig?: ConsumerConfigSSLClass;
|
||||
supportsDatabase?: boolean;
|
||||
supportsDataDiff?: boolean;
|
||||
supportsDBTExtraction?: boolean;
|
||||
@ -5954,6 +5983,11 @@ export interface DatabaseConnectionClass {
|
||||
* Regex to only include/exclude tables that matches the pattern.
|
||||
*/
|
||||
tableFilterPattern?: FilterPattern;
|
||||
/**
|
||||
* Trust the server certificate without validation. Set to false in production to validate
|
||||
* server certificates against the certificate authority.
|
||||
*/
|
||||
trustServerCertificate?: boolean;
|
||||
/**
|
||||
* Service Type
|
||||
*/
|
||||
@ -6456,6 +6490,9 @@ export enum SpaceType {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
|
||||
* connection.
|
||||
*
|
||||
|
||||
@ -871,6 +871,9 @@ export enum Scheme {
|
||||
*
|
||||
* Client SSL configuration
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* OpenMetadata Client configured to validate SSL certificates.
|
||||
*/
|
||||
export interface Config {
|
||||
@ -943,6 +946,11 @@ export interface DatabaseConnectionClass {
|
||||
* ODBC driver version in case of pyodbc connection.
|
||||
*/
|
||||
driver?: string;
|
||||
/**
|
||||
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
|
||||
* between the client and server will be encrypted.
|
||||
*/
|
||||
encrypt?: boolean;
|
||||
/**
|
||||
* Host and port of the MSSQL service.
|
||||
*/
|
||||
@ -963,7 +971,12 @@ export interface DatabaseConnectionClass {
|
||||
/**
|
||||
* SQLAlchemy driver scheme options.
|
||||
*/
|
||||
scheme?: MssqlScheme;
|
||||
scheme?: MssqlScheme;
|
||||
/**
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*/
|
||||
sslConfig?: Config;
|
||||
supportsDatabase?: boolean;
|
||||
supportsDataDiff?: boolean;
|
||||
supportsDBTExtraction?: boolean;
|
||||
@ -976,6 +989,11 @@ export interface DatabaseConnectionClass {
|
||||
* Regex to only include/exclude tables that matches the pattern.
|
||||
*/
|
||||
tableFilterPattern?: FilterPattern;
|
||||
/**
|
||||
* Trust the server certificate without validation. Set to false in production to validate
|
||||
* server certificates against the certificate authority.
|
||||
*/
|
||||
trustServerCertificate?: boolean;
|
||||
/**
|
||||
* Service Type
|
||||
*/
|
||||
|
||||
@ -864,6 +864,9 @@ export interface ConfigObject {
|
||||
/**
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* SSL Configuration for OpenMetadata Server
|
||||
*/
|
||||
sslConfig?: SSLConfigObject;
|
||||
@ -1256,6 +1259,16 @@ export interface ConfigObject {
|
||||
* Authentication mode to connect to Impala.
|
||||
*/
|
||||
authMechanism?: AuthMechanismEnum;
|
||||
/**
|
||||
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
|
||||
* between the client and server will be encrypted.
|
||||
*/
|
||||
encrypt?: boolean;
|
||||
/**
|
||||
* Trust the server certificate without validation. Set to false in production to validate
|
||||
* server certificates against the certificate authority.
|
||||
*/
|
||||
trustServerCertificate?: boolean;
|
||||
/**
|
||||
* Use slow logs to extract lineage.
|
||||
*/
|
||||
@ -2651,6 +2664,9 @@ export interface QlikCertificatesBy {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
|
||||
* connection.
|
||||
*
|
||||
@ -3282,6 +3298,9 @@ export enum ConnectionScheme {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
|
||||
* connection.
|
||||
*
|
||||
@ -3420,6 +3439,11 @@ export interface DatabaseConnectionClass {
|
||||
* ODBC driver version in case of pyodbc connection.
|
||||
*/
|
||||
driver?: string;
|
||||
/**
|
||||
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
|
||||
* between the client and server will be encrypted.
|
||||
*/
|
||||
encrypt?: boolean;
|
||||
/**
|
||||
* Host and port of the MSSQL service.
|
||||
*/
|
||||
@ -3440,7 +3464,12 @@ export interface DatabaseConnectionClass {
|
||||
/**
|
||||
* SQLAlchemy driver scheme options.
|
||||
*/
|
||||
scheme?: MssqlScheme;
|
||||
scheme?: MssqlScheme;
|
||||
/**
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*/
|
||||
sslConfig?: ConsumerConfigSSLClass;
|
||||
supportsDatabase?: boolean;
|
||||
supportsDataDiff?: boolean;
|
||||
supportsDBTExtraction?: boolean;
|
||||
@ -3453,6 +3482,11 @@ export interface DatabaseConnectionClass {
|
||||
* Regex to only include/exclude tables that matches the pattern.
|
||||
*/
|
||||
tableFilterPattern?: FilterPattern;
|
||||
/**
|
||||
* Trust the server certificate without validation. Set to false in production to validate
|
||||
* server certificates against the certificate authority.
|
||||
*/
|
||||
trustServerCertificate?: boolean;
|
||||
/**
|
||||
* Service Type
|
||||
*/
|
||||
@ -4008,6 +4042,9 @@ export enum SpaceType {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
|
||||
* connection.
|
||||
*
|
||||
|
||||
@ -904,6 +904,9 @@ export interface ConfigObject {
|
||||
/**
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* SSL Configuration for OpenMetadata Server
|
||||
*/
|
||||
sslConfig?: SSLConfigObject;
|
||||
@ -1296,6 +1299,16 @@ export interface ConfigObject {
|
||||
* Authentication mode to connect to Impala.
|
||||
*/
|
||||
authMechanism?: AuthMechanismEnum;
|
||||
/**
|
||||
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
|
||||
* between the client and server will be encrypted.
|
||||
*/
|
||||
encrypt?: boolean;
|
||||
/**
|
||||
* Trust the server certificate without validation. Set to false in production to validate
|
||||
* server certificates against the certificate authority.
|
||||
*/
|
||||
trustServerCertificate?: boolean;
|
||||
/**
|
||||
* Use slow logs to extract lineage.
|
||||
*/
|
||||
@ -2704,6 +2717,9 @@ export interface QlikCertificatesBy {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
|
||||
* connection.
|
||||
*
|
||||
@ -3335,6 +3351,9 @@ export enum ConnectionScheme {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
|
||||
* connection.
|
||||
*
|
||||
@ -3473,6 +3492,11 @@ export interface DatabaseConnectionClass {
|
||||
* ODBC driver version in case of pyodbc connection.
|
||||
*/
|
||||
driver?: string;
|
||||
/**
|
||||
* Enable SSL/TLS encryption for the MSSQL connection. When enabled, all data transmitted
|
||||
* between the client and server will be encrypted.
|
||||
*/
|
||||
encrypt?: boolean;
|
||||
/**
|
||||
* Host and port of the MSSQL service.
|
||||
*/
|
||||
@ -3493,7 +3517,12 @@ export interface DatabaseConnectionClass {
|
||||
/**
|
||||
* SQLAlchemy driver scheme options.
|
||||
*/
|
||||
scheme?: MssqlScheme;
|
||||
scheme?: MssqlScheme;
|
||||
/**
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*/
|
||||
sslConfig?: ConsumerConfigSSLClass;
|
||||
supportsDatabase?: boolean;
|
||||
supportsDataDiff?: boolean;
|
||||
supportsDBTExtraction?: boolean;
|
||||
@ -3506,6 +3535,11 @@ export interface DatabaseConnectionClass {
|
||||
* Regex to only include/exclude tables that matches the pattern.
|
||||
*/
|
||||
tableFilterPattern?: FilterPattern;
|
||||
/**
|
||||
* Trust the server certificate without validation. Set to false in production to validate
|
||||
* server certificates against the certificate authority.
|
||||
*/
|
||||
trustServerCertificate?: boolean;
|
||||
/**
|
||||
* Service Type
|
||||
*/
|
||||
@ -4061,6 +4095,9 @@ export enum SpaceType {
|
||||
*
|
||||
* SSL Configuration details.
|
||||
*
|
||||
* SSL/TLS certificate configuration for client authentication. Provide CA certificate,
|
||||
* client certificate, and private key for mutual TLS authentication.
|
||||
*
|
||||
* Consumer Config SSL Config. Configuration for enabling SSL for the Consumer Config
|
||||
* connection.
|
||||
*
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user