|
29 | 29 | class Configuration(object): |
30 | 30 | """NOTE: This class is auto generated by OpenAPI Generator |
31 | 31 |
|
32 | | - Ref: https://openapi-generator.tech |
33 | | - Do not edit the class manually. |
34 | | -
|
35 | | - :param host: Base url |
36 | | - :param api_key: Dict to store API key(s). |
37 | | - Each entry in the dict specifies an API key. |
38 | | - The dict key is the name of the security scheme in the OAS specification. |
39 | | - The dict value is the API key secret. |
40 | | - :param api_key_prefix: Dict to store API prefix (e.g. Bearer) |
41 | | - The dict key is the name of the security scheme in the OAS specification. |
42 | | - The dict value is an API key prefix when generating the auth data. |
43 | | - :param username: Username for HTTP basic authentication |
44 | | - :param password: Password for HTTP basic authentication |
45 | | - :param discard_unknown_keys: Boolean value indicating whether to discard |
46 | | - unknown properties. A server may send a response that includes additional |
47 | | - properties that are not known by the client in the following scenarios: |
48 | | - 1. The OpenAPI document is incomplete, i.e. it does not match the server |
49 | | - implementation. |
50 | | - 2. The client was generated using an older version of the OpenAPI document |
51 | | - and the server has been upgraded since then. |
52 | | - If a schema in the OpenAPI document defines the additionalProperties attribute, |
53 | | - then all undeclared properties received by the server are injected into the |
54 | | - additional properties map. In that case, there are undeclared properties, and |
55 | | - nothing to discard. |
56 | | - :param disabled_client_side_validations (string): Comma-separated list of |
57 | | - JSON schema validation keywords to disable JSON schema structural validation |
58 | | - rules. The following keywords may be specified: multipleOf, maximum, |
59 | | - exclusiveMaximum, minimum, exclusiveMinimum, maxLength, minLength, pattern, |
60 | | - maxItems, minItems. |
61 | | - By default, the validation is performed for data generated locally by the client |
62 | | - and data received from the server, independent of any validation performed by |
63 | | - the server side. If the input data does not satisfy the JSON schema validation |
64 | | - rules specified in the OpenAPI document, an exception is raised. |
65 | | - If disabled_client_side_validations is set, structural validation is |
66 | | - disabled. This can be useful to troubleshoot data validation problem, such as |
67 | | - when the OpenAPI document validation rules do not match the actual API data |
68 | | - received by the server. |
69 | | - :param server_index: Index to servers configuration. |
70 | | - :param server_variables: Mapping with string values to replace variables in |
71 | | - templated server configuration. The validation of enums is performed for |
72 | | - variables with defined enum values before. |
73 | | - :param server_operation_index: Mapping from operation ID to an index to server |
74 | | - configuration. |
75 | | - :param server_operation_variables: Mapping from operation ID to a mapping with |
76 | | - string values to replace variables in templated server configuration. |
77 | | - The validation of enums is performed for variables with defined enum values before. |
78 | | - :param ssl_ca_cert: str - the path to a file of concatenated CA certificates |
79 | | - in PEM format |
80 | | -
|
81 | | - :Example: |
82 | | -
|
83 | | - API Key Authentication Example. |
84 | | - Given the following security scheme in the OpenAPI specification: |
85 | | - components: |
86 | | - securitySchemes: |
87 | | - cookieAuth: # name for the security scheme |
88 | | - type: apiKey |
89 | | - in: cookie |
90 | | - name: JSESSIONID # cookie name |
91 | | -
|
92 | | - You can programmatically set the cookie: |
93 | | -
|
94 | | - conf = hubspot.cms.audit_logs.Configuration( |
95 | | - api_key={'cookieAuth': 'abc123'} |
96 | | - api_key_prefix={'cookieAuth': 'JSESSIONID'} |
97 | | - ) |
98 | | -
|
99 | | - The following cookie will be added to the HTTP request: |
100 | | - Cookie: JSESSIONID abc123 |
| 32 | + Ref: https://openapi-generator.tech |
| 33 | + Do not edit the class manually. |
| 34 | +
|
| 35 | + :param host: Base url |
| 36 | + :param api_key: Dict to store API key(s). |
| 37 | + Each entry in the dict specifies an API key. |
| 38 | + The dict key is the name of the security scheme in the OAS specification. |
| 39 | + The dict value is the API key secret. |
| 40 | + :param api_key_prefix: Dict to store API prefix (e.g. Bearer) |
| 41 | + The dict key is the name of the security scheme in the OAS specification. |
| 42 | + The dict value is an API key prefix when generating the auth data. |
| 43 | + :param username: Username for HTTP basic authentication |
| 44 | + :param password: Password for HTTP basic authentication |
| 45 | + :param discard_unknown_keys: Boolean value indicating whether to discard |
| 46 | + unknown properties. A server may send a response that includes additional |
| 47 | + properties that are not known by the client in the following scenarios: |
| 48 | + 1. The OpenAPI document is incomplete, i.e. it does not match the server |
| 49 | + implementation. |
| 50 | + 2. The client was generated using an older version of the OpenAPI document |
| 51 | + and the server has been upgraded since then. |
| 52 | + If a schema in the OpenAPI document defines the additionalProperties attribute, |
| 53 | + then all undeclared properties received by the server are injected into the |
| 54 | + additional properties map. In that case, there are undeclared properties, and |
| 55 | + nothing to discard. |
| 56 | + :param disabled_client_side_validations (string): Comma-separated list of |
| 57 | + JSON schema validation keywords to disable JSON schema structural validation |
| 58 | + rules. The following keywords may be specified: multipleOf, maximum, |
| 59 | + exclusiveMaximum, minimum, exclusiveMinimum, maxLength, minLength, pattern, |
| 60 | + maxItems, minItems. |
| 61 | + By default, the validation is performed for data generated locally by the client |
| 62 | + and data received from the server, independent of any validation performed by |
| 63 | + the server side. If the input data does not satisfy the JSON schema validation |
| 64 | + rules specified in the OpenAPI document, an exception is raised. |
| 65 | + If disabled_client_side_validations is set, structural validation is |
| 66 | + disabled. This can be useful to troubleshoot data validation problem, such as |
| 67 | + when the OpenAPI document validation rules do not match the actual API data |
| 68 | + received by the server. |
| 69 | + :param server_index: Index to servers configuration. |
| 70 | + :param server_variables: Mapping with string values to replace variables in |
| 71 | + templated server configuration. The validation of enums is performed for |
| 72 | + variables with defined enum values before. |
| 73 | + :param server_operation_index: Mapping from operation ID to an index to server |
| 74 | + configuration. |
| 75 | + :param server_operation_variables: Mapping from operation ID to a mapping with |
| 76 | + string values to replace variables in templated server configuration. |
| 77 | + The validation of enums is performed for variables with defined enum values before. |
| 78 | + :param ssl_ca_cert: str - the path to a file of concatenated CA certificates |
| 79 | + in PEM format |
| 80 | +
|
| 81 | + :Example: |
101 | 82 | """ |
102 | 83 |
|
103 | 84 | _default = None |
@@ -392,15 +373,6 @@ def auth_settings(self): |
392 | 373 | :return: The Auth Settings information dict. |
393 | 374 | """ |
394 | 375 | auth = {} |
395 | | - if "hapikey" in self.api_key: |
396 | | - auth["hapikey"] = { |
397 | | - "type": "api_key", |
398 | | - "in": "query", |
399 | | - "key": "hapikey", |
400 | | - "value": self.get_api_key_with_prefix( |
401 | | - "hapikey", |
402 | | - ), |
403 | | - } |
404 | 376 | if self.access_token is not None: |
405 | 377 | auth["oauth2"] = {"type": "oauth2", "in": "header", "key": "Authorization", "value": "Bearer " + self.access_token} |
406 | 378 | return auth |
|
0 commit comments