Skip to content

Commit 60c2529

Browse files
Updating baton config schema and capabilities.
1 parent a91c01f commit 60c2529

File tree

2 files changed

+201
-32
lines changed

2 files changed

+201
-32
lines changed

baton_capabilities.json

Lines changed: 32 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -1,79 +1,79 @@
11
{
2-
"@type": "type.googleapis.com/c1.connector.v2.ConnectorCapabilities",
3-
"resourceTypeCapabilities": [
2+
"@type": "type.googleapis.com/c1.connector.v2.ConnectorCapabilities",
3+
"resourceTypeCapabilities": [
44
{
5-
"resourceType": {
6-
"id": "group",
7-
"displayName": "Group",
8-
"traits": [
5+
"resourceType": {
6+
"id": "group",
7+
"displayName": "Group",
8+
"traits": [
99
"TRAIT_GROUP"
1010
],
11-
"annotations": [
11+
"annotations": [
1212
{
13-
"@type": "type.googleapis.com/c1.connector.v2.V1Identifier",
14-
"id": "group"
13+
"@type": "type.googleapis.com/c1.connector.v2.V1Identifier",
14+
"id": "group"
1515
}
1616
]
1717
},
18-
"capabilities": [
18+
"capabilities": [
1919
"CAPABILITY_SYNC",
2020
"CAPABILITY_PROVISION"
2121
]
2222
},
2323
{
24-
"resourceType": {
25-
"id": "iam_user",
26-
"displayName": "IAM User",
27-
"traits": [
24+
"resourceType": {
25+
"id": "iam_user",
26+
"displayName": "IAM User",
27+
"traits": [
2828
"TRAIT_USER"
2929
],
30-
"annotations": [
30+
"annotations": [
3131
{
32-
"@type": "type.googleapis.com/c1.connector.v2.SkipEntitlementsAndGrants"
32+
"@type": "type.googleapis.com/c1.connector.v2.SkipEntitlementsAndGrants"
3333
},
3434
{
35-
"@type": "type.googleapis.com/c1.connector.v2.V1Identifier",
36-
"id": "iam_user"
35+
"@type": "type.googleapis.com/c1.connector.v2.V1Identifier",
36+
"id": "iam_user"
3737
}
3838
]
3939
},
40-
"capabilities": [
40+
"capabilities": [
4141
"CAPABILITY_SYNC",
4242
"CAPABILITY_ACCOUNT_PROVISIONING",
4343
"CAPABILITY_RESOURCE_DELETE"
4444
]
4545
},
4646
{
47-
"resourceType": {
48-
"id": "role",
49-
"displayName": "IAM Role",
50-
"traits": [
47+
"resourceType": {
48+
"id": "role",
49+
"displayName": "IAM Role",
50+
"traits": [
5151
"TRAIT_ROLE"
5252
],
53-
"annotations": [
53+
"annotations": [
5454
{
55-
"@type": "type.googleapis.com/c1.connector.v2.V1Identifier",
56-
"id": "role"
55+
"@type": "type.googleapis.com/c1.connector.v2.V1Identifier",
56+
"id": "role"
5757
}
5858
]
5959
},
60-
"capabilities": [
60+
"capabilities": [
6161
"CAPABILITY_SYNC"
6262
]
6363
}
6464
],
65-
"connectorCapabilities": [
65+
"connectorCapabilities": [
6666
"CAPABILITY_PROVISION",
6767
"CAPABILITY_SYNC",
6868
"CAPABILITY_ACCOUNT_PROVISIONING",
6969
"CAPABILITY_RESOURCE_DELETE"
7070
],
71-
"credentialDetails": {
72-
"capabilityAccountProvisioning": {
73-
"supportedCredentialOptions": [
71+
"credentialDetails": {
72+
"capabilityAccountProvisioning": {
73+
"supportedCredentialOptions": [
7474
"CAPABILITY_DETAIL_CREDENTIAL_OPTION_NO_PASSWORD"
7575
],
76-
"preferredCredentialOption": "CAPABILITY_DETAIL_CREDENTIAL_OPTION_NO_PASSWORD"
76+
"preferredCredentialOption": "CAPABILITY_DETAIL_CREDENTIAL_OPTION_NO_PASSWORD"
7777
}
7878
}
7979
}

config_schema.json

Lines changed: 169 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,169 @@
1+
{
2+
"fields": [
3+
{
4+
"name": "external-id",
5+
"displayName": "External ID",
6+
"description": "The external id for the aws account",
7+
"stringField": {}
8+
},
9+
{
10+
"name": "global-access-key-id",
11+
"displayName": "Global Access Key",
12+
"description": "The global-access-key-id for the aws account",
13+
"stringField": {}
14+
},
15+
{
16+
"name": "global-aws-orgs-enabled",
17+
"displayName": "Global AWS Orgs Enabled",
18+
"description": "Enable support for AWS Organizations",
19+
"boolField": {}
20+
},
21+
{
22+
"name": "global-aws-sso-enabled",
23+
"displayName": "Global AWS SSO Enabled",
24+
"description": "Enable support for AWS IAM Identity Center",
25+
"boolField": {}
26+
},
27+
{
28+
"name": "global-aws-sso-region",
29+
"displayName": "Global AWS SSO Region",
30+
"description": "The region for the sso identities",
31+
"stringField": {
32+
"defaultValue": "us-east-1"
33+
}
34+
},
35+
{
36+
"name": "global-binding-external-id",
37+
"displayName": "Global Binding External ID",
38+
"description": "The global external id for the aws account",
39+
"stringField": {}
40+
},
41+
{
42+
"name": "global-region",
43+
"displayName": "Global Region",
44+
"description": "The region for the aws account",
45+
"stringField": {}
46+
},
47+
{
48+
"name": "global-role-arn",
49+
"displayName": "Global Role ARN",
50+
"description": "The role arn for the aws account",
51+
"stringField": {}
52+
},
53+
{
54+
"name": "global-secret-access-key",
55+
"displayName": "Global Secret Access Key",
56+
"description": "The global-secret-access-key for the aws account",
57+
"stringField": {}
58+
},
59+
{
60+
"name": "iam-assume-role-name",
61+
"displayName": "IAM Assume Role Name",
62+
"description": "Role name for the IAM role to assume when using the AWS connector",
63+
"stringField": {
64+
"defaultValue": "OrganizationAccountAccessRole"
65+
}
66+
},
67+
{
68+
"name": "log-level",
69+
"description": "The log level: debug, info, warn, error",
70+
"isOps": true,
71+
"stringField": {
72+
"defaultValue": "info"
73+
}
74+
},
75+
{
76+
"name": "log-level-debug-expires-at",
77+
"description": "The timestamp indicating when debug-level logging should expire",
78+
"isOps": true,
79+
"stringField": {}
80+
},
81+
{
82+
"name": "otel-collector-endpoint",
83+
"description": "The endpoint of the OpenTelemetry collector to send observability data to (used for both tracing and logging if specific endpoints are not provided)",
84+
"isOps": true,
85+
"stringField": {}
86+
},
87+
{
88+
"name": "otel-collector-endpoint-tls-cert",
89+
"description": "A PEM-encoded certificate to use as a CA for TLS connections to the OpenTelemetry collector",
90+
"isOps": true,
91+
"stringField": {}
92+
},
93+
{
94+
"name": "otel-collector-endpoint-tls-cert-path",
95+
"description": "Path to a file containing a PEM-encoded certificate to use as a CA for TLS connections to the OpenTelemetry collector",
96+
"isOps": true,
97+
"stringField": {}
98+
},
99+
{
100+
"name": "otel-collector-endpoint-tls-insecure",
101+
"description": "Allow insecure connections to the OpenTelemetry collector",
102+
"isOps": true,
103+
"boolField": {}
104+
},
105+
{
106+
"name": "otel-logging-disabled",
107+
"description": "Disable OpenTelemetry logging",
108+
"isOps": true,
109+
"boolField": {}
110+
},
111+
{
112+
"name": "otel-tracing-disabled",
113+
"description": "Disable OpenTelemetry tracing",
114+
"isOps": true,
115+
"boolField": {}
116+
},
117+
{
118+
"name": "role-arn",
119+
"displayName": "Role ARN",
120+
"description": "The role arn for the aws account",
121+
"stringField": {}
122+
},
123+
{
124+
"name": "scim-enabled",
125+
"displayName": "SCIM Enabled",
126+
"description": "Enable support for pulling SSO User status from the AWS SCIM API",
127+
"boolField": {}
128+
},
129+
{
130+
"name": "scim-endpoint",
131+
"displayName": "SCIM Endpoint",
132+
"description": "The SCIMv2 endpoint for aws identity center",
133+
"stringField": {}
134+
},
135+
{
136+
"name": "scim-token",
137+
"displayName": "SCIM Token",
138+
"description": "The SCIMv2 token for aws identity center",
139+
"stringField": {}
140+
},
141+
{
142+
"name": "sync-secrets",
143+
"displayName": "Sync Secrets",
144+
"description": "Whether to sync secrets or not",
145+
"boolField": {}
146+
},
147+
{
148+
"name": "use-assume",
149+
"displayName": "Use Assume",
150+
"description": "Enable support for assume role",
151+
"boolField": {}
152+
}
153+
],
154+
"constraints": [
155+
{
156+
"kind": "CONSTRAINT_KIND_DEPENDENT_ON",
157+
"fieldNames": [
158+
"use-assume"
159+
],
160+
"secondaryFieldNames": [
161+
"external-id",
162+
"role-arn"
163+
]
164+
}
165+
],
166+
"displayName": "AWS",
167+
"helpUrl": "/docs/baton/aws-v2",
168+
"iconUrl": "/static/app-icons/aws.svg"
169+
}

0 commit comments

Comments
 (0)