@osdk/foundry.connectivity 2.22.0 → 2.23.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -1,5 +1,19 @@
1
1
  # @osdk/foundry.connectivity
2
2
 
3
+ ## 2.23.0
4
+
5
+ ### Minor Changes
6
+
7
+ - da76626: Adding new platform sdks.
8
+
9
+ ### Patch Changes
10
+
11
+ - Updated dependencies [da76626]
12
+ - @osdk/foundry.orchestration@2.23.0
13
+ - @osdk/foundry.filesystem@2.23.0
14
+ - @osdk/foundry.datasets@2.23.0
15
+ - @osdk/foundry.core@2.23.0
16
+
3
17
  ## 2.22.0
4
18
 
5
19
  ### Minor Changes
@@ -14,7 +14,7 @@ export type AgentRid = LooselyBrandedString<"AgentRid">;
14
14
  * The API key used to authenticate to the external system.
15
15
  This can be configured as a header or query parameter.
16
16
  *
17
- * Log Safety: UNSAFE
17
+ * Log Safety: DO_NOT_LOG
18
18
  */
19
19
  export interface ApiKeyAuthentication {
20
20
  location: RestRequestApiKeyLocation;
@@ -39,7 +39,7 @@ Access keys consist of two parts: an access key ID (for example, AKIAIOSFODNN7EX
39
39
  key (for example, wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY). You must use both the access key ID and
40
40
  secret access key together to authenticate your requests.
41
41
  *
42
- * Log Safety: UNSAFE
42
+ * Log Safety: DO_NOT_LOG
43
43
  */
44
44
  export interface AwsAccessKey {
45
45
  accessKeyId: string;
@@ -57,7 +57,7 @@ export interface AwsOidcAuthentication {
57
57
  subject: ConnectionRid;
58
58
  }
59
59
  /**
60
- * Log Safety: UNSAFE
60
+ * Log Safety: DO_NOT_LOG
61
61
  */
62
62
  export interface BasicCredentials {
63
63
  username: string;
@@ -66,7 +66,7 @@ export interface BasicCredentials {
66
66
  /**
67
67
  * The bearer token used to authenticate to the external system.
68
68
  *
69
- * Log Safety: UNSAFE
69
+ * Log Safety: DO_NOT_LOG
70
70
  */
71
71
  export interface BearerToken {
72
72
  bearerToken: EncryptedProperty;
@@ -87,7 +87,7 @@ export interface CloudIdentity {
87
87
  */
88
88
  export type CloudIdentityRid = LooselyBrandedString<"CloudIdentityRid">;
89
89
  /**
90
- * Log Safety: UNSAFE
90
+ * Log Safety: DO_NOT_LOG
91
91
  */
92
92
  export interface Connection {
93
93
  rid: ConnectionRid;
@@ -96,7 +96,7 @@ export interface Connection {
96
96
  configuration: ConnectionConfiguration;
97
97
  }
98
98
  /**
99
- * Log Safety: UNSAFE
99
+ * Log Safety: DO_NOT_LOG
100
100
  */
101
101
  export type ConnectionConfiguration = ({
102
102
  type: "s3";
@@ -120,7 +120,7 @@ export type ConnectionDisplayName = LooselyBrandedString<"ConnectionDisplayName"
120
120
  */
121
121
  export type ConnectionRid = LooselyBrandedString<"ConnectionRid">;
122
122
  /**
123
- * Log Safety: UNSAFE
123
+ * Log Safety: DO_NOT_LOG
124
124
  */
125
125
  export interface CreateConnectionRequest {
126
126
  parentFolderRid: _Filesystem.FolderRid;
@@ -140,7 +140,7 @@ export interface CreateConnectionRequestAsSecretName {
140
140
  value: SecretName;
141
141
  }
142
142
  /**
143
- * Log Safety: UNSAFE
143
+ * Log Safety: DO_NOT_LOG
144
144
  */
145
145
  export interface CreateConnectionRequestAwsAccessKey {
146
146
  accessKeyId: string;
@@ -153,7 +153,7 @@ export interface CreateConnectionRequestAwsOidcAuthentication {
153
153
  audience: string;
154
154
  }
155
155
  /**
156
- * Log Safety: UNSAFE
156
+ * Log Safety: DO_NOT_LOG
157
157
  */
158
158
  export interface CreateConnectionRequestBasicCredentials {
159
159
  password: CreateConnectionRequestEncryptedProperty;
@@ -166,7 +166,7 @@ export interface CreateConnectionRequestCloudIdentity {
166
166
  cloudIdentityRid: CloudIdentityRid;
167
167
  }
168
168
  /**
169
- * Log Safety: UNSAFE
169
+ * Log Safety: DO_NOT_LOG
170
170
  */
171
171
  export type CreateConnectionRequestConnectionConfiguration = ({
172
172
  type: "s3";
@@ -192,7 +192,7 @@ If a plaintext value is passed as an input, the plaintext value will be encrypte
192
192
  If a secret name is passed as an input, the secret name must match the existing secret name of the property
193
193
  and the property will retain its previously encrypted value.
194
194
  *
195
- * Log Safety: UNSAFE
195
+ * Log Safety: DO_NOT_LOG
196
196
  */
197
197
  export type CreateConnectionRequestEncryptedProperty = ({
198
198
  type: "asSecretName";
@@ -200,7 +200,7 @@ export type CreateConnectionRequestEncryptedProperty = ({
200
200
  type: "asPlaintextValue";
201
201
  } & CreateConnectionRequestAsPlaintextValue);
202
202
  /**
203
- * Log Safety: UNSAFE
203
+ * Log Safety: DO_NOT_LOG
204
204
  */
205
205
  export interface CreateConnectionRequestJdbcConnectionConfiguration {
206
206
  credentials?: BasicCredentials;
@@ -212,7 +212,7 @@ export interface CreateConnectionRequestJdbcConnectionConfiguration {
212
212
  * When creating or updating additional secrets, use SecretsWithPlaintextValues.
213
213
  When fetching the RestConnectionConfiguration, SecretsNames will be provided.
214
214
  *
215
- * Log Safety: UNSAFE
215
+ * Log Safety: DO_NOT_LOG
216
216
  */
217
217
  export type CreateConnectionRequestRestConnectionAdditionalSecrets = ({
218
218
  type: "asSecretsWithPlaintextValues";
@@ -220,7 +220,7 @@ export type CreateConnectionRequestRestConnectionAdditionalSecrets = ({
220
220
  type: "asSecretsNames";
221
221
  } & CreateConnectionRequestSecretsNames);
222
222
  /**
223
- * Log Safety: UNSAFE
223
+ * Log Safety: DO_NOT_LOG
224
224
  */
225
225
  export interface CreateConnectionRequestRestConnectionConfiguration {
226
226
  additionalSecrets?: RestConnectionAdditionalSecrets;
@@ -228,7 +228,7 @@ export interface CreateConnectionRequestRestConnectionConfiguration {
228
228
  domains: Array<Domain>;
229
229
  }
230
230
  /**
231
- * Log Safety: UNSAFE
231
+ * Log Safety: DO_NOT_LOG
232
232
  */
233
233
  export type CreateConnectionRequestS3AuthenticationMode = ({
234
234
  type: "awsAccessKey";
@@ -238,7 +238,7 @@ export type CreateConnectionRequestS3AuthenticationMode = ({
238
238
  type: "oidc";
239
239
  } & CreateConnectionRequestAwsOidcAuthentication);
240
240
  /**
241
- * Log Safety: UNSAFE
241
+ * Log Safety: DO_NOT_LOG
242
242
  */
243
243
  export interface CreateConnectionRequestS3ConnectionConfiguration {
244
244
  connectionTimeoutMillis?: string;
@@ -264,7 +264,7 @@ export interface CreateConnectionRequestS3KmsConfiguration {
264
264
  kmsKey: string;
265
265
  }
266
266
  /**
267
- * Log Safety: UNSAFE
267
+ * Log Safety: DO_NOT_LOG
268
268
  */
269
269
  export interface CreateConnectionRequestS3ProxyConfiguration {
270
270
  nonProxyHosts?: Array<string>;
@@ -285,7 +285,7 @@ export interface CreateConnectionRequestSecretsWithPlaintextValues {
285
285
  secrets: Record<SecretName, PlaintextValue>;
286
286
  }
287
287
  /**
288
- * Log Safety: UNSAFE
288
+ * Log Safety: DO_NOT_LOG
289
289
  */
290
290
  export type CreateConnectionRequestSnowflakeAuthenticationMode = ({
291
291
  type: "externalOauth";
@@ -295,7 +295,7 @@ export type CreateConnectionRequestSnowflakeAuthenticationMode = ({
295
295
  type: "basic";
296
296
  } & CreateConnectionRequestBasicCredentials);
297
297
  /**
298
- * Log Safety: UNSAFE
298
+ * Log Safety: DO_NOT_LOG
299
299
  */
300
300
  export interface CreateConnectionRequestSnowflakeConnectionConfiguration {
301
301
  schema?: string;
@@ -312,7 +312,7 @@ export interface CreateConnectionRequestSnowflakeConnectionConfiguration {
312
312
  export interface CreateConnectionRequestSnowflakeExternalOauth {
313
313
  }
314
314
  /**
315
- * Log Safety: UNSAFE
315
+ * Log Safety: DO_NOT_LOG
316
316
  */
317
317
  export interface CreateConnectionRequestSnowflakeKeyPairAuthentication {
318
318
  privateKey: CreateConnectionRequestEncryptedProperty;
@@ -496,7 +496,7 @@ export interface DecimalColumnInitialIncrementalState {
496
496
  /**
497
497
  * The domain that the connection is allowed to access.
498
498
  *
499
- * Log Safety: UNSAFE
499
+ * Log Safety: DO_NOT_LOG
500
500
  */
501
501
  export interface Domain {
502
502
  scheme?: UriScheme;
@@ -512,7 +512,7 @@ If a plaintext value is passed as an input, the plaintext value will be encrypte
512
512
  If a secret name is passed as an input, the secret name must match the existing secret name of the property
513
513
  and the property will retain its previously encrypted value.
514
514
  *
515
- * Log Safety: UNSAFE
515
+ * Log Safety: DO_NOT_LOG
516
516
  */
517
517
  export type EncryptedProperty = ({
518
518
  type: "asSecretName";
@@ -679,7 +679,7 @@ export interface FileSizeFilter {
679
679
  lt?: _Core.SizeBytes;
680
680
  }
681
681
  /**
682
- * Log Safety: SAFE
682
+ * Log Safety: UNSAFE
683
683
  */
684
684
  export interface HeaderApiKey {
685
685
  headerName: string;
@@ -696,7 +696,7 @@ export interface IntegerColumnInitialIncrementalState {
696
696
  /**
697
697
  * The configuration needed to connect to an external system using the JDBC protocol.
698
698
  *
699
- * Log Safety: UNSAFE
699
+ * Log Safety: DO_NOT_LOG
700
700
  */
701
701
  export interface JdbcConnectionConfiguration {
702
702
  url: string;
@@ -789,7 +789,7 @@ export interface PostgreSqlTableImportConfig {
789
789
  */
790
790
  export type Protocol = "HTTP" | "HTTPS";
791
791
  /**
792
- * Log Safety: SAFE
792
+ * Log Safety: UNSAFE
793
793
  */
794
794
  export interface QueryParameterApiKey {
795
795
  queryParameterName: string;
@@ -946,7 +946,7 @@ export interface ReplaceTableImportRequestTimestampColumnInitialIncrementalState
946
946
  /**
947
947
  * The method of authentication for connecting to an external REST system.
948
948
  *
949
- * Log Safety: UNSAFE
949
+ * Log Safety: DO_NOT_LOG
950
950
  */
951
951
  export type RestAuthenticationMode = ({
952
952
  type: "bearerToken";
@@ -961,7 +961,7 @@ export type RestAuthenticationMode = ({
961
961
  * When creating or updating additional secrets, use SecretsWithPlaintextValues.
962
962
  When fetching the RestConnectionConfiguration, SecretsNames will be provided.
963
963
  *
964
- * Log Safety: UNSAFE
964
+ * Log Safety: DO_NOT_LOG
965
965
  */
966
966
  export type RestConnectionAdditionalSecrets = ({
967
967
  type: "asSecretsWithPlaintextValues";
@@ -971,7 +971,7 @@ export type RestConnectionAdditionalSecrets = ({
971
971
  /**
972
972
  * The configuration needed to connect to a REST external system.
973
973
  *
974
- * Log Safety: UNSAFE
974
+ * Log Safety: DO_NOT_LOG
975
975
  */
976
976
  export interface RestConnectionConfiguration {
977
977
  domains: Array<Domain>;
@@ -997,7 +997,7 @@ export type RestRequestApiKeyLocation = ({
997
997
  type: "queryParameter";
998
998
  } & QueryParameterApiKey);
999
999
  /**
1000
- * Log Safety: UNSAFE
1000
+ * Log Safety: DO_NOT_LOG
1001
1001
  */
1002
1002
  export type S3AuthenticationMode = ({
1003
1003
  type: "awsAccessKey";
@@ -1010,7 +1010,7 @@ export type S3AuthenticationMode = ({
1010
1010
  * The configuration needed to connect to an AWS S3 external system (or any other S3-like external systems that
1011
1011
  implement the s3a protocol).
1012
1012
  *
1013
- * Log Safety: UNSAFE
1013
+ * Log Safety: DO_NOT_LOG
1014
1014
  */
1015
1015
  export interface S3ConnectionConfiguration {
1016
1016
  bucketUrl: string;
@@ -1036,7 +1036,7 @@ export interface S3KmsConfiguration {
1036
1036
  kmsRegion?: Region;
1037
1037
  }
1038
1038
  /**
1039
- * Log Safety: UNSAFE
1039
+ * Log Safety: DO_NOT_LOG
1040
1040
  */
1041
1041
  export interface S3ProxyConfiguration {
1042
1042
  host: string;
@@ -1068,7 +1068,7 @@ export interface SecretsWithPlaintextValues {
1068
1068
  secrets: Record<SecretName, PlaintextValue>;
1069
1069
  }
1070
1070
  /**
1071
- * Log Safety: UNSAFE
1071
+ * Log Safety: DO_NOT_LOG
1072
1072
  */
1073
1073
  export type SnowflakeAuthenticationMode = ({
1074
1074
  type: "externalOauth";
@@ -1080,7 +1080,7 @@ export type SnowflakeAuthenticationMode = ({
1080
1080
  /**
1081
1081
  * The configuration needed to connect to a Snowflake database.
1082
1082
  *
1083
- * Log Safety: UNSAFE
1083
+ * Log Safety: DO_NOT_LOG
1084
1084
  */
1085
1085
  export interface SnowflakeConnectionConfiguration {
1086
1086
  accountIdentifier: string;
@@ -1106,7 +1106,7 @@ export interface SnowflakeExternalOauth {
1106
1106
  * Use a key-pair to connect and authenticate to Snowflake.
1107
1107
  See https://docs.snowflake.com/en/user-guide/key-pair-auth
1108
1108
  *
1109
- * Log Safety: UNSAFE
1109
+ * Log Safety: DO_NOT_LOG
1110
1110
  */
1111
1111
  export interface SnowflakeKeyPairAuthentication {
1112
1112
  user: string;
@@ -51,17 +51,14 @@ export declare function get($ctx: $Client | $ClientContext | $OldClient | $OldCl
51
51
  * in-memory handling of secrets. If you do not want your secrets to be temporarily decrypted, you should
52
52
  * use the Foundry UI instead.
53
53
  *
54
- * @beta
54
+ * @public
55
55
  *
56
56
  * Required Scopes: [api:connectivity-connection-write]
57
57
  * URL: /v2/connectivity/connections/{connectionRid}/updateSecrets
58
58
  */
59
59
  export declare function updateSecrets($ctx: $Client | $ClientContext | $OldClient | $OldClientContext, ...args: [
60
60
  connectionRid: _Connectivity.ConnectionRid,
61
- $body: _Connectivity.UpdateSecretsForConnectionRequest,
62
- $queryParams?: {
63
- preview?: _Core.PreviewMode | undefined;
64
- }
61
+ $body: _Connectivity.UpdateSecretsForConnectionRequest
65
62
  ]): Promise<void>;
66
63
  /**
67
64
  * Retrieves the ConnectionConfiguration of the [Connection](https://www.palantir.com/docs/foundry/data-connection/set-up-source/) itself.
@@ -1 +1 @@
1
- {"version":3,"file":"Connection.d.ts","sourceRoot":"","sources":["../../../src/public/Connection.ts"],"names":[],"mappings":"AAgBA,OAAO,KAAK,KAAK,KAAK,MAAM,oBAAoB,CAAC;AACjD,OAAO,KAAK,EACV,YAAY,IAAI,UAAU,EAC1B,mBAAmB,IAAI,iBAAiB,EACzC,MAAM,qBAAqB,CAAC;AAC7B,OAAO,KAAK,EACV,YAAY,IAAI,OAAO,EACvB,mBAAmB,IAAI,cAAc,EACtC,MAAM,sBAAsB,CAAC;AAG9B,OAAO,KAAK,KAAK,aAAa,MAAM,mBAAmB,CAAC;AAWxD;;;;;;;;;;;;;;;GAeG;AACH,wBAAgB,MAAM,CACpB,IAAI,EAAE,OAAO,GAAG,cAAc,GAAG,UAAU,GAAG,iBAAiB,EAC/D,GAAG,IAAI,EAAE;IACP,KAAK,EAAE,aAAa,CAAC,uBAAuB;IAC5C,YAAY,CAAC,EAAE;QAAE,OAAO,CAAC,EAAE,KAAK,CAAC,WAAW,GAAG,SAAS,CAAA;KAAE;CAC3D,GACA,OAAO,CAAC,aAAa,CAAC,UAAU,CAAC,CAEnC;AASD;;;;;;;GAOG;AACH,wBAAgB,GAAG,CACjB,IAAI,EAAE,OAAO,GAAG,cAAc,GAAG,UAAU,GAAG,iBAAiB,EAC/D,GAAG,IAAI,EAAE;IACP,aAAa,EAAE,aAAa,CAAC,aAAa;IAE1C,YAAY,CAAC,EAAE;QAAE,OAAO,CAAC,EAAE,KAAK,CAAC,WAAW,GAAG,SAAS,CAAA;KAAE;CAC3D,GACA,OAAO,CAAC,aAAa,CAAC,UAAU,CAAC,CAEnC;AAUD;;;;;;;;;;;;;;;;;GAiBG;AACH,wBAAgB,aAAa,CAC3B,IAAI,EAAE,OAAO,GAAG,cAAc,GAAG,UAAU,GAAG,iBAAiB,EAC/D,GAAG,IAAI,EAAE;IACP,aAAa,EAAE,aAAa,CAAC,aAAa;IAC1C,KAAK,EAAE,aAAa,CAAC,iCAAiC;IACtD,YAAY,CAAC,EAAE;QAAE,OAAO,CAAC,EAAE,KAAK,CAAC,WAAW,GAAG,SAAS,CAAA;KAAE;CAC3D,GACA,OAAO,CAAC,IAAI,CAAC,CAEf;AASD;;;;;;;;GAQG;AACH,wBAAgB,gBAAgB,CAC9B,IAAI,EAAE,OAAO,GAAG,cAAc,GAAG,UAAU,GAAG,iBAAiB,EAC/D,GAAG,IAAI,EAAE;IACP,aAAa,EAAE,aAAa,CAAC,aAAa;IAE1C,YAAY,CAAC,EAAE;QAAE,OAAO,CAAC,EAAE,KAAK,CAAC,WAAW,GAAG,SAAS,CAAA;KAAE;CAC3D,GACA,OAAO,CAAC,aAAa,CAAC,uBAAuB,CAAC,CAEhD"}
1
+ {"version":3,"file":"Connection.d.ts","sourceRoot":"","sources":["../../../src/public/Connection.ts"],"names":[],"mappings":"AAgBA,OAAO,KAAK,KAAK,KAAK,MAAM,oBAAoB,CAAC;AACjD,OAAO,KAAK,EACV,YAAY,IAAI,UAAU,EAC1B,mBAAmB,IAAI,iBAAiB,EACzC,MAAM,qBAAqB,CAAC;AAC7B,OAAO,KAAK,EACV,YAAY,IAAI,OAAO,EACvB,mBAAmB,IAAI,cAAc,EACtC,MAAM,sBAAsB,CAAC;AAG9B,OAAO,KAAK,KAAK,aAAa,MAAM,mBAAmB,CAAC;AAWxD;;;;;;;;;;;;;;;GAeG;AACH,wBAAgB,MAAM,CACpB,IAAI,EAAE,OAAO,GAAG,cAAc,GAAG,UAAU,GAAG,iBAAiB,EAC/D,GAAG,IAAI,EAAE;IACP,KAAK,EAAE,aAAa,CAAC,uBAAuB;IAC5C,YAAY,CAAC,EAAE;QAAE,OAAO,CAAC,EAAE,KAAK,CAAC,WAAW,GAAG,SAAS,CAAA;KAAE;CAC3D,GACA,OAAO,CAAC,aAAa,CAAC,UAAU,CAAC,CAEnC;AASD;;;;;;;GAOG;AACH,wBAAgB,GAAG,CACjB,IAAI,EAAE,OAAO,GAAG,cAAc,GAAG,UAAU,GAAG,iBAAiB,EAC/D,GAAG,IAAI,EAAE;IACP,aAAa,EAAE,aAAa,CAAC,aAAa;IAE1C,YAAY,CAAC,EAAE;QAAE,OAAO,CAAC,EAAE,KAAK,CAAC,WAAW,GAAG,SAAS,CAAA;KAAE;CAC3D,GACA,OAAO,CAAC,aAAa,CAAC,UAAU,CAAC,CAEnC;AASD;;;;;;;;;;;;;;;;;GAiBG;AACH,wBAAgB,aAAa,CAC3B,IAAI,EAAE,OAAO,GAAG,cAAc,GAAG,UAAU,GAAG,iBAAiB,EAC/D,GAAG,IAAI,EAAE;IACP,aAAa,EAAE,aAAa,CAAC,aAAa;IAC1C,KAAK,EAAE,aAAa,CAAC,iCAAiC;CACvD,GACA,OAAO,CAAC,IAAI,CAAC,CAEf;AASD;;;;;;;;GAQG;AACH,wBAAgB,gBAAgB,CAC9B,IAAI,EAAE,OAAO,GAAG,cAAc,GAAG,UAAU,GAAG,iBAAiB,EAC/D,GAAG,IAAI,EAAE;IACP,aAAa,EAAE,aAAa,CAAC,aAAa;IAE1C,YAAY,CAAC,EAAE;QAAE,OAAO,CAAC,EAAE,KAAK,CAAC,WAAW,GAAG,SAAS,CAAA;KAAE;CAC3D,GACA,OAAO,CAAC,aAAa,CAAC,uBAAuB,CAAC,CAEhD"}
@@ -47,7 +47,7 @@ const _get = [0, "/v2/connectivity/connections/{0}", 2];
47
47
  export function get($ctx, ...args) {
48
48
  return $foundryPlatformFetch($ctx, _get, ...args);
49
49
  }
50
- const _updateSecrets = [1, "/v2/connectivity/connections/{0}/updateSecrets", 3];
50
+ const _updateSecrets = [1, "/v2/connectivity/connections/{0}/updateSecrets", 1];
51
51
  /**
52
52
  * Updates the secrets on the connection to the specified secret values.
53
53
  * Secrets that are currently configured on the connection but are omitted in the request will remain unchanged.
@@ -61,7 +61,7 @@ const _updateSecrets = [1, "/v2/connectivity/connections/{0}/updateSecrets", 3];
61
61
  * in-memory handling of secrets. If you do not want your secrets to be temporarily decrypted, you should
62
62
  * use the Foundry UI instead.
63
63
  *
64
- * @beta
64
+ * @public
65
65
  *
66
66
  * Required Scopes: [api:connectivity-connection-write]
67
67
  * URL: /v2/connectivity/connections/{connectionRid}/updateSecrets
@@ -1 +1 @@
1
- {"version":3,"file":"Connection.js","names":["foundryPlatformFetch","$foundryPlatformFetch","_create","create","$ctx","args","_get","get","_updateSecrets","updateSecrets","_getConfiguration","getConfiguration"],"sources":["Connection.js"],"sourcesContent":["/*\n * Copyright 2024 Palantir Technologies, Inc. All rights reserved.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\nimport { foundryPlatformFetch as $foundryPlatformFetch } from \"@osdk/shared.net.platformapi\";\n//\nconst _create = [1, \"/v2/connectivity/connections\", 3];\n/**\n * Creates a new Connection with a [direct connection](https://www.palantir.com/docs/foundry/data-connection/core-concepts/#direct-connection) runtime.\n *\n * Any secrets specified in the request body are transmitted over the network encrypted using TLS. Once the\n * secrets reach Foundry's servers, they will be temporarily decrypted and remain in plaintext in memory to\n * be processed as needed. They will stay in plaintext in memory until the garbage collection process cleans\n * up the memory. The secrets are always stored encrypted on our servers.\n * By using this endpoint, you acknowledge and accept any potential risks associated with the temporary\n * in-memory handling of secrets. If you do not want your secrets to be temporarily decrypted, you should\n * use the Foundry UI instead.\n *\n * @alpha\n *\n * Required Scopes: [api:connectivity-connection-write]\n * URL: /v2/connectivity/connections\n */\nexport function create($ctx, ...args) {\n return $foundryPlatformFetch($ctx, _create, ...args);\n}\nconst _get = [0, \"/v2/connectivity/connections/{0}\", 2];\n/**\n * Get the Connection with the specified rid.\n *\n * @beta\n *\n * Required Scopes: [api:connectivity-connection-read]\n * URL: /v2/connectivity/connections/{connectionRid}\n */\nexport function get($ctx, ...args) {\n return $foundryPlatformFetch($ctx, _get, ...args);\n}\nconst _updateSecrets = [1, \"/v2/connectivity/connections/{0}/updateSecrets\", 3];\n/**\n * Updates the secrets on the connection to the specified secret values.\n * Secrets that are currently configured on the connection but are omitted in the request will remain unchanged.\n *\n * Secrets are transmitted over the network encrypted using TLS. Once the secrets reach Foundry's servers,\n * they will be temporarily decrypted and remain in plaintext in memory to be processed as needed.\n * They will stay in plaintext in memory until the garbage collection process cleans up the memory.\n * The secrets are always stored encrypted on our servers.\n *\n * By using this endpoint, you acknowledge and accept any potential risks associated with the temporary\n * in-memory handling of secrets. If you do not want your secrets to be temporarily decrypted, you should\n * use the Foundry UI instead.\n *\n * @beta\n *\n * Required Scopes: [api:connectivity-connection-write]\n * URL: /v2/connectivity/connections/{connectionRid}/updateSecrets\n */\nexport function updateSecrets($ctx, ...args) {\n return $foundryPlatformFetch($ctx, _updateSecrets, ...args);\n}\nconst _getConfiguration = [0, \"/v2/connectivity/connections/{0}/getConfiguration\", 2];\n/**\n * Retrieves the ConnectionConfiguration of the [Connection](https://www.palantir.com/docs/foundry/data-connection/set-up-source/) itself.\n * This operation is intended for use when other Connection data is not required, providing a lighter-weight alternative to `getConnection` operation.\n *\n * @beta\n *\n * Required Scopes: [api:connectivity-connection-read]\n * URL: /v2/connectivity/connections/{connectionRid}/getConfiguration\n */\nexport function getConfiguration($ctx, ...args) {\n return $foundryPlatformFetch($ctx, _getConfiguration, ...args);\n}\n"],"mappings":"AAAA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,SAASA,oBAAoB,IAAIC,qBAAqB,QAAQ,8BAA8B;AAC5F;AACA,MAAMC,OAAO,GAAG,CAAC,CAAC,EAAE,8BAA8B,EAAE,CAAC,CAAC;AACtD;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,OAAO,SAASC,MAAMA,CAACC,IAAI,EAAE,GAAGC,IAAI,EAAE;EAClC,OAAOJ,qBAAqB,CAACG,IAAI,EAAEF,OAAO,EAAE,GAAGG,IAAI,CAAC;AACxD;AACA,MAAMC,IAAI,GAAG,CAAC,CAAC,EAAE,kCAAkC,EAAE,CAAC,CAAC;AACvD;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,OAAO,SAASC,GAAGA,CAACH,IAAI,EAAE,GAAGC,IAAI,EAAE;EAC/B,OAAOJ,qBAAqB,CAACG,IAAI,EAAEE,IAAI,EAAE,GAAGD,IAAI,CAAC;AACrD;AACA,MAAMG,cAAc,GAAG,CAAC,CAAC,EAAE,gDAAgD,EAAE,CAAC,CAAC;AAC/E;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,OAAO,SAASC,aAAaA,CAACL,IAAI,EAAE,GAAGC,IAAI,EAAE;EACzC,OAAOJ,qBAAqB,CAACG,IAAI,EAAEI,cAAc,EAAE,GAAGH,IAAI,CAAC;AAC/D;AACA,MAAMK,iBAAiB,GAAG,CAAC,CAAC,EAAE,mDAAmD,EAAE,CAAC,CAAC;AACrF;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,OAAO,SAASC,gBAAgBA,CAACP,IAAI,EAAE,GAAGC,IAAI,EAAE;EAC5C,OAAOJ,qBAAqB,CAACG,IAAI,EAAEM,iBAAiB,EAAE,GAAGL,IAAI,CAAC;AAClE","ignoreList":[]}
1
+ {"version":3,"file":"Connection.js","names":["foundryPlatformFetch","$foundryPlatformFetch","_create","create","$ctx","args","_get","get","_updateSecrets","updateSecrets","_getConfiguration","getConfiguration"],"sources":["Connection.js"],"sourcesContent":["/*\n * Copyright 2024 Palantir Technologies, Inc. All rights reserved.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\nimport { foundryPlatformFetch as $foundryPlatformFetch } from \"@osdk/shared.net.platformapi\";\n//\nconst _create = [1, \"/v2/connectivity/connections\", 3];\n/**\n * Creates a new Connection with a [direct connection](https://www.palantir.com/docs/foundry/data-connection/core-concepts/#direct-connection) runtime.\n *\n * Any secrets specified in the request body are transmitted over the network encrypted using TLS. Once the\n * secrets reach Foundry's servers, they will be temporarily decrypted and remain in plaintext in memory to\n * be processed as needed. They will stay in plaintext in memory until the garbage collection process cleans\n * up the memory. The secrets are always stored encrypted on our servers.\n * By using this endpoint, you acknowledge and accept any potential risks associated with the temporary\n * in-memory handling of secrets. If you do not want your secrets to be temporarily decrypted, you should\n * use the Foundry UI instead.\n *\n * @alpha\n *\n * Required Scopes: [api:connectivity-connection-write]\n * URL: /v2/connectivity/connections\n */\nexport function create($ctx, ...args) {\n return $foundryPlatformFetch($ctx, _create, ...args);\n}\nconst _get = [0, \"/v2/connectivity/connections/{0}\", 2];\n/**\n * Get the Connection with the specified rid.\n *\n * @beta\n *\n * Required Scopes: [api:connectivity-connection-read]\n * URL: /v2/connectivity/connections/{connectionRid}\n */\nexport function get($ctx, ...args) {\n return $foundryPlatformFetch($ctx, _get, ...args);\n}\nconst _updateSecrets = [1, \"/v2/connectivity/connections/{0}/updateSecrets\", 1];\n/**\n * Updates the secrets on the connection to the specified secret values.\n * Secrets that are currently configured on the connection but are omitted in the request will remain unchanged.\n *\n * Secrets are transmitted over the network encrypted using TLS. Once the secrets reach Foundry's servers,\n * they will be temporarily decrypted and remain in plaintext in memory to be processed as needed.\n * They will stay in plaintext in memory until the garbage collection process cleans up the memory.\n * The secrets are always stored encrypted on our servers.\n *\n * By using this endpoint, you acknowledge and accept any potential risks associated with the temporary\n * in-memory handling of secrets. If you do not want your secrets to be temporarily decrypted, you should\n * use the Foundry UI instead.\n *\n * @public\n *\n * Required Scopes: [api:connectivity-connection-write]\n * URL: /v2/connectivity/connections/{connectionRid}/updateSecrets\n */\nexport function updateSecrets($ctx, ...args) {\n return $foundryPlatformFetch($ctx, _updateSecrets, ...args);\n}\nconst _getConfiguration = [0, \"/v2/connectivity/connections/{0}/getConfiguration\", 2];\n/**\n * Retrieves the ConnectionConfiguration of the [Connection](https://www.palantir.com/docs/foundry/data-connection/set-up-source/) itself.\n * This operation is intended for use when other Connection data is not required, providing a lighter-weight alternative to `getConnection` operation.\n *\n * @beta\n *\n * Required Scopes: [api:connectivity-connection-read]\n * URL: /v2/connectivity/connections/{connectionRid}/getConfiguration\n */\nexport function getConfiguration($ctx, ...args) {\n return $foundryPlatformFetch($ctx, _getConfiguration, ...args);\n}\n"],"mappings":"AAAA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,SAASA,oBAAoB,IAAIC,qBAAqB,QAAQ,8BAA8B;AAC5F;AACA,MAAMC,OAAO,GAAG,CAAC,CAAC,EAAE,8BAA8B,EAAE,CAAC,CAAC;AACtD;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,OAAO,SAASC,MAAMA,CAACC,IAAI,EAAE,GAAGC,IAAI,EAAE;EAClC,OAAOJ,qBAAqB,CAACG,IAAI,EAAEF,OAAO,EAAE,GAAGG,IAAI,CAAC;AACxD;AACA,MAAMC,IAAI,GAAG,CAAC,CAAC,EAAE,kCAAkC,EAAE,CAAC,CAAC;AACvD;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,OAAO,SAASC,GAAGA,CAACH,IAAI,EAAE,GAAGC,IAAI,EAAE;EAC/B,OAAOJ,qBAAqB,CAACG,IAAI,EAAEE,IAAI,EAAE,GAAGD,IAAI,CAAC;AACrD;AACA,MAAMG,cAAc,GAAG,CAAC,CAAC,EAAE,gDAAgD,EAAE,CAAC,CAAC;AAC/E;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,OAAO,SAASC,aAAaA,CAACL,IAAI,EAAE,GAAGC,IAAI,EAAE;EACzC,OAAOJ,qBAAqB,CAACG,IAAI,EAAEI,cAAc,EAAE,GAAGH,IAAI,CAAC;AAC/D;AACA,MAAMK,iBAAiB,GAAG,CAAC,CAAC,EAAE,mDAAmD,EAAE,CAAC,CAAC;AACrF;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,OAAO,SAASC,gBAAgBA,CAACP,IAAI,EAAE,GAAGC,IAAI,EAAE;EAC5C,OAAOJ,qBAAqB,CAACG,IAAI,EAAEM,iBAAiB,EAAE,GAAGL,IAAI,CAAC;AAClE","ignoreList":[]}
@@ -14,7 +14,7 @@ export type AgentRid = LooselyBrandedString<"AgentRid">;
14
14
  * The API key used to authenticate to the external system.
15
15
  This can be configured as a header or query parameter.
16
16
  *
17
- * Log Safety: UNSAFE
17
+ * Log Safety: DO_NOT_LOG
18
18
  */
19
19
  export interface ApiKeyAuthentication {
20
20
  location: RestRequestApiKeyLocation;
@@ -39,7 +39,7 @@ Access keys consist of two parts: an access key ID (for example, AKIAIOSFODNN7EX
39
39
  key (for example, wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY). You must use both the access key ID and
40
40
  secret access key together to authenticate your requests.
41
41
  *
42
- * Log Safety: UNSAFE
42
+ * Log Safety: DO_NOT_LOG
43
43
  */
44
44
  export interface AwsAccessKey {
45
45
  accessKeyId: string;
@@ -57,7 +57,7 @@ export interface AwsOidcAuthentication {
57
57
  subject: ConnectionRid;
58
58
  }
59
59
  /**
60
- * Log Safety: UNSAFE
60
+ * Log Safety: DO_NOT_LOG
61
61
  */
62
62
  export interface BasicCredentials {
63
63
  username: string;
@@ -66,7 +66,7 @@ export interface BasicCredentials {
66
66
  /**
67
67
  * The bearer token used to authenticate to the external system.
68
68
  *
69
- * Log Safety: UNSAFE
69
+ * Log Safety: DO_NOT_LOG
70
70
  */
71
71
  export interface BearerToken {
72
72
  bearerToken: EncryptedProperty;
@@ -87,7 +87,7 @@ export interface CloudIdentity {
87
87
  */
88
88
  export type CloudIdentityRid = LooselyBrandedString<"CloudIdentityRid">;
89
89
  /**
90
- * Log Safety: UNSAFE
90
+ * Log Safety: DO_NOT_LOG
91
91
  */
92
92
  export interface Connection {
93
93
  rid: ConnectionRid;
@@ -96,7 +96,7 @@ export interface Connection {
96
96
  configuration: ConnectionConfiguration;
97
97
  }
98
98
  /**
99
- * Log Safety: UNSAFE
99
+ * Log Safety: DO_NOT_LOG
100
100
  */
101
101
  export type ConnectionConfiguration = ({
102
102
  type: "s3";
@@ -120,7 +120,7 @@ export type ConnectionDisplayName = LooselyBrandedString<"ConnectionDisplayName"
120
120
  */
121
121
  export type ConnectionRid = LooselyBrandedString<"ConnectionRid">;
122
122
  /**
123
- * Log Safety: UNSAFE
123
+ * Log Safety: DO_NOT_LOG
124
124
  */
125
125
  export interface CreateConnectionRequest {
126
126
  parentFolderRid: _Filesystem.FolderRid;
@@ -140,7 +140,7 @@ export interface CreateConnectionRequestAsSecretName {
140
140
  value: SecretName;
141
141
  }
142
142
  /**
143
- * Log Safety: UNSAFE
143
+ * Log Safety: DO_NOT_LOG
144
144
  */
145
145
  export interface CreateConnectionRequestAwsAccessKey {
146
146
  accessKeyId: string;
@@ -153,7 +153,7 @@ export interface CreateConnectionRequestAwsOidcAuthentication {
153
153
  audience: string;
154
154
  }
155
155
  /**
156
- * Log Safety: UNSAFE
156
+ * Log Safety: DO_NOT_LOG
157
157
  */
158
158
  export interface CreateConnectionRequestBasicCredentials {
159
159
  password: CreateConnectionRequestEncryptedProperty;
@@ -166,7 +166,7 @@ export interface CreateConnectionRequestCloudIdentity {
166
166
  cloudIdentityRid: CloudIdentityRid;
167
167
  }
168
168
  /**
169
- * Log Safety: UNSAFE
169
+ * Log Safety: DO_NOT_LOG
170
170
  */
171
171
  export type CreateConnectionRequestConnectionConfiguration = ({
172
172
  type: "s3";
@@ -192,7 +192,7 @@ If a plaintext value is passed as an input, the plaintext value will be encrypte
192
192
  If a secret name is passed as an input, the secret name must match the existing secret name of the property
193
193
  and the property will retain its previously encrypted value.
194
194
  *
195
- * Log Safety: UNSAFE
195
+ * Log Safety: DO_NOT_LOG
196
196
  */
197
197
  export type CreateConnectionRequestEncryptedProperty = ({
198
198
  type: "asSecretName";
@@ -200,7 +200,7 @@ export type CreateConnectionRequestEncryptedProperty = ({
200
200
  type: "asPlaintextValue";
201
201
  } & CreateConnectionRequestAsPlaintextValue);
202
202
  /**
203
- * Log Safety: UNSAFE
203
+ * Log Safety: DO_NOT_LOG
204
204
  */
205
205
  export interface CreateConnectionRequestJdbcConnectionConfiguration {
206
206
  credentials?: BasicCredentials;
@@ -212,7 +212,7 @@ export interface CreateConnectionRequestJdbcConnectionConfiguration {
212
212
  * When creating or updating additional secrets, use SecretsWithPlaintextValues.
213
213
  When fetching the RestConnectionConfiguration, SecretsNames will be provided.
214
214
  *
215
- * Log Safety: UNSAFE
215
+ * Log Safety: DO_NOT_LOG
216
216
  */
217
217
  export type CreateConnectionRequestRestConnectionAdditionalSecrets = ({
218
218
  type: "asSecretsWithPlaintextValues";
@@ -220,7 +220,7 @@ export type CreateConnectionRequestRestConnectionAdditionalSecrets = ({
220
220
  type: "asSecretsNames";
221
221
  } & CreateConnectionRequestSecretsNames);
222
222
  /**
223
- * Log Safety: UNSAFE
223
+ * Log Safety: DO_NOT_LOG
224
224
  */
225
225
  export interface CreateConnectionRequestRestConnectionConfiguration {
226
226
  additionalSecrets?: RestConnectionAdditionalSecrets;
@@ -228,7 +228,7 @@ export interface CreateConnectionRequestRestConnectionConfiguration {
228
228
  domains: Array<Domain>;
229
229
  }
230
230
  /**
231
- * Log Safety: UNSAFE
231
+ * Log Safety: DO_NOT_LOG
232
232
  */
233
233
  export type CreateConnectionRequestS3AuthenticationMode = ({
234
234
  type: "awsAccessKey";
@@ -238,7 +238,7 @@ export type CreateConnectionRequestS3AuthenticationMode = ({
238
238
  type: "oidc";
239
239
  } & CreateConnectionRequestAwsOidcAuthentication);
240
240
  /**
241
- * Log Safety: UNSAFE
241
+ * Log Safety: DO_NOT_LOG
242
242
  */
243
243
  export interface CreateConnectionRequestS3ConnectionConfiguration {
244
244
  connectionTimeoutMillis?: string;
@@ -264,7 +264,7 @@ export interface CreateConnectionRequestS3KmsConfiguration {
264
264
  kmsKey: string;
265
265
  }
266
266
  /**
267
- * Log Safety: UNSAFE
267
+ * Log Safety: DO_NOT_LOG
268
268
  */
269
269
  export interface CreateConnectionRequestS3ProxyConfiguration {
270
270
  nonProxyHosts?: Array<string>;
@@ -285,7 +285,7 @@ export interface CreateConnectionRequestSecretsWithPlaintextValues {
285
285
  secrets: Record<SecretName, PlaintextValue>;
286
286
  }
287
287
  /**
288
- * Log Safety: UNSAFE
288
+ * Log Safety: DO_NOT_LOG
289
289
  */
290
290
  export type CreateConnectionRequestSnowflakeAuthenticationMode = ({
291
291
  type: "externalOauth";
@@ -295,7 +295,7 @@ export type CreateConnectionRequestSnowflakeAuthenticationMode = ({
295
295
  type: "basic";
296
296
  } & CreateConnectionRequestBasicCredentials);
297
297
  /**
298
- * Log Safety: UNSAFE
298
+ * Log Safety: DO_NOT_LOG
299
299
  */
300
300
  export interface CreateConnectionRequestSnowflakeConnectionConfiguration {
301
301
  schema?: string;
@@ -312,7 +312,7 @@ export interface CreateConnectionRequestSnowflakeConnectionConfiguration {
312
312
  export interface CreateConnectionRequestSnowflakeExternalOauth {
313
313
  }
314
314
  /**
315
- * Log Safety: UNSAFE
315
+ * Log Safety: DO_NOT_LOG
316
316
  */
317
317
  export interface CreateConnectionRequestSnowflakeKeyPairAuthentication {
318
318
  privateKey: CreateConnectionRequestEncryptedProperty;
@@ -496,7 +496,7 @@ export interface DecimalColumnInitialIncrementalState {
496
496
  /**
497
497
  * The domain that the connection is allowed to access.
498
498
  *
499
- * Log Safety: UNSAFE
499
+ * Log Safety: DO_NOT_LOG
500
500
  */
501
501
  export interface Domain {
502
502
  scheme?: UriScheme;
@@ -512,7 +512,7 @@ If a plaintext value is passed as an input, the plaintext value will be encrypte
512
512
  If a secret name is passed as an input, the secret name must match the existing secret name of the property
513
513
  and the property will retain its previously encrypted value.
514
514
  *
515
- * Log Safety: UNSAFE
515
+ * Log Safety: DO_NOT_LOG
516
516
  */
517
517
  export type EncryptedProperty = ({
518
518
  type: "asSecretName";
@@ -679,7 +679,7 @@ export interface FileSizeFilter {
679
679
  lt?: _Core.SizeBytes;
680
680
  }
681
681
  /**
682
- * Log Safety: SAFE
682
+ * Log Safety: UNSAFE
683
683
  */
684
684
  export interface HeaderApiKey {
685
685
  headerName: string;
@@ -696,7 +696,7 @@ export interface IntegerColumnInitialIncrementalState {
696
696
  /**
697
697
  * The configuration needed to connect to an external system using the JDBC protocol.
698
698
  *
699
- * Log Safety: UNSAFE
699
+ * Log Safety: DO_NOT_LOG
700
700
  */
701
701
  export interface JdbcConnectionConfiguration {
702
702
  url: string;
@@ -789,7 +789,7 @@ export interface PostgreSqlTableImportConfig {
789
789
  */
790
790
  export type Protocol = "HTTP" | "HTTPS";
791
791
  /**
792
- * Log Safety: SAFE
792
+ * Log Safety: UNSAFE
793
793
  */
794
794
  export interface QueryParameterApiKey {
795
795
  queryParameterName: string;
@@ -946,7 +946,7 @@ export interface ReplaceTableImportRequestTimestampColumnInitialIncrementalState
946
946
  /**
947
947
  * The method of authentication for connecting to an external REST system.
948
948
  *
949
- * Log Safety: UNSAFE
949
+ * Log Safety: DO_NOT_LOG
950
950
  */
951
951
  export type RestAuthenticationMode = ({
952
952
  type: "bearerToken";
@@ -961,7 +961,7 @@ export type RestAuthenticationMode = ({
961
961
  * When creating or updating additional secrets, use SecretsWithPlaintextValues.
962
962
  When fetching the RestConnectionConfiguration, SecretsNames will be provided.
963
963
  *
964
- * Log Safety: UNSAFE
964
+ * Log Safety: DO_NOT_LOG
965
965
  */
966
966
  export type RestConnectionAdditionalSecrets = ({
967
967
  type: "asSecretsWithPlaintextValues";
@@ -971,7 +971,7 @@ export type RestConnectionAdditionalSecrets = ({
971
971
  /**
972
972
  * The configuration needed to connect to a REST external system.
973
973
  *
974
- * Log Safety: UNSAFE
974
+ * Log Safety: DO_NOT_LOG
975
975
  */
976
976
  export interface RestConnectionConfiguration {
977
977
  domains: Array<Domain>;
@@ -997,7 +997,7 @@ export type RestRequestApiKeyLocation = ({
997
997
  type: "queryParameter";
998
998
  } & QueryParameterApiKey);
999
999
  /**
1000
- * Log Safety: UNSAFE
1000
+ * Log Safety: DO_NOT_LOG
1001
1001
  */
1002
1002
  export type S3AuthenticationMode = ({
1003
1003
  type: "awsAccessKey";
@@ -1010,7 +1010,7 @@ export type S3AuthenticationMode = ({
1010
1010
  * The configuration needed to connect to an AWS S3 external system (or any other S3-like external systems that
1011
1011
  implement the s3a protocol).
1012
1012
  *
1013
- * Log Safety: UNSAFE
1013
+ * Log Safety: DO_NOT_LOG
1014
1014
  */
1015
1015
  export interface S3ConnectionConfiguration {
1016
1016
  bucketUrl: string;
@@ -1036,7 +1036,7 @@ export interface S3KmsConfiguration {
1036
1036
  kmsRegion?: Region;
1037
1037
  }
1038
1038
  /**
1039
- * Log Safety: UNSAFE
1039
+ * Log Safety: DO_NOT_LOG
1040
1040
  */
1041
1041
  export interface S3ProxyConfiguration {
1042
1042
  host: string;
@@ -1068,7 +1068,7 @@ export interface SecretsWithPlaintextValues {
1068
1068
  secrets: Record<SecretName, PlaintextValue>;
1069
1069
  }
1070
1070
  /**
1071
- * Log Safety: UNSAFE
1071
+ * Log Safety: DO_NOT_LOG
1072
1072
  */
1073
1073
  export type SnowflakeAuthenticationMode = ({
1074
1074
  type: "externalOauth";
@@ -1080,7 +1080,7 @@ export type SnowflakeAuthenticationMode = ({
1080
1080
  /**
1081
1081
  * The configuration needed to connect to a Snowflake database.
1082
1082
  *
1083
- * Log Safety: UNSAFE
1083
+ * Log Safety: DO_NOT_LOG
1084
1084
  */
1085
1085
  export interface SnowflakeConnectionConfiguration {
1086
1086
  accountIdentifier: string;
@@ -1106,7 +1106,7 @@ export interface SnowflakeExternalOauth {
1106
1106
  * Use a key-pair to connect and authenticate to Snowflake.
1107
1107
  See https://docs.snowflake.com/en/user-guide/key-pair-auth
1108
1108
  *
1109
- * Log Safety: UNSAFE
1109
+ * Log Safety: DO_NOT_LOG
1110
1110
  */
1111
1111
  export interface SnowflakeKeyPairAuthentication {
1112
1112
  user: string;
@@ -51,17 +51,14 @@ export declare function get($ctx: $Client | $ClientContext | $OldClient | $OldCl
51
51
  * in-memory handling of secrets. If you do not want your secrets to be temporarily decrypted, you should
52
52
  * use the Foundry UI instead.
53
53
  *
54
- * @beta
54
+ * @public
55
55
  *
56
56
  * Required Scopes: [api:connectivity-connection-write]
57
57
  * URL: /v2/connectivity/connections/{connectionRid}/updateSecrets
58
58
  */
59
59
  export declare function updateSecrets($ctx: $Client | $ClientContext | $OldClient | $OldClientContext, ...args: [
60
60
  connectionRid: _Connectivity.ConnectionRid,
61
- $body: _Connectivity.UpdateSecretsForConnectionRequest,
62
- $queryParams?: {
63
- preview?: _Core.PreviewMode | undefined;
64
- }
61
+ $body: _Connectivity.UpdateSecretsForConnectionRequest
65
62
  ]): Promise<void>;
66
63
  /**
67
64
  * Retrieves the ConnectionConfiguration of the [Connection](https://www.palantir.com/docs/foundry/data-connection/set-up-source/) itself.
@@ -1 +1 @@
1
- {"version":3,"file":"Connection.d.ts","sourceRoot":"","sources":["../../../src/public/Connection.ts"],"names":[],"mappings":"AAgBA,OAAO,KAAK,KAAK,KAAK,MAAM,oBAAoB,CAAC;AACjD,OAAO,KAAK,EACV,YAAY,IAAI,UAAU,EAC1B,mBAAmB,IAAI,iBAAiB,EACzC,MAAM,qBAAqB,CAAC;AAC7B,OAAO,KAAK,EACV,YAAY,IAAI,OAAO,EACvB,mBAAmB,IAAI,cAAc,EACtC,MAAM,sBAAsB,CAAC;AAG9B,OAAO,KAAK,KAAK,aAAa,MAAM,mBAAmB,CAAC;AAWxD;;;;;;;;;;;;;;;GAeG;AACH,wBAAgB,MAAM,CACpB,IAAI,EAAE,OAAO,GAAG,cAAc,GAAG,UAAU,GAAG,iBAAiB,EAC/D,GAAG,IAAI,EAAE;IACP,KAAK,EAAE,aAAa,CAAC,uBAAuB;IAC5C,YAAY,CAAC,EAAE;QAAE,OAAO,CAAC,EAAE,KAAK,CAAC,WAAW,GAAG,SAAS,CAAA;KAAE;CAC3D,GACA,OAAO,CAAC,aAAa,CAAC,UAAU,CAAC,CAEnC;AASD;;;;;;;GAOG;AACH,wBAAgB,GAAG,CACjB,IAAI,EAAE,OAAO,GAAG,cAAc,GAAG,UAAU,GAAG,iBAAiB,EAC/D,GAAG,IAAI,EAAE;IACP,aAAa,EAAE,aAAa,CAAC,aAAa;IAE1C,YAAY,CAAC,EAAE;QAAE,OAAO,CAAC,EAAE,KAAK,CAAC,WAAW,GAAG,SAAS,CAAA;KAAE;CAC3D,GACA,OAAO,CAAC,aAAa,CAAC,UAAU,CAAC,CAEnC;AAUD;;;;;;;;;;;;;;;;;GAiBG;AACH,wBAAgB,aAAa,CAC3B,IAAI,EAAE,OAAO,GAAG,cAAc,GAAG,UAAU,GAAG,iBAAiB,EAC/D,GAAG,IAAI,EAAE;IACP,aAAa,EAAE,aAAa,CAAC,aAAa;IAC1C,KAAK,EAAE,aAAa,CAAC,iCAAiC;IACtD,YAAY,CAAC,EAAE;QAAE,OAAO,CAAC,EAAE,KAAK,CAAC,WAAW,GAAG,SAAS,CAAA;KAAE;CAC3D,GACA,OAAO,CAAC,IAAI,CAAC,CAEf;AASD;;;;;;;;GAQG;AACH,wBAAgB,gBAAgB,CAC9B,IAAI,EAAE,OAAO,GAAG,cAAc,GAAG,UAAU,GAAG,iBAAiB,EAC/D,GAAG,IAAI,EAAE;IACP,aAAa,EAAE,aAAa,CAAC,aAAa;IAE1C,YAAY,CAAC,EAAE;QAAE,OAAO,CAAC,EAAE,KAAK,CAAC,WAAW,GAAG,SAAS,CAAA;KAAE;CAC3D,GACA,OAAO,CAAC,aAAa,CAAC,uBAAuB,CAAC,CAEhD"}
1
+ {"version":3,"file":"Connection.d.ts","sourceRoot":"","sources":["../../../src/public/Connection.ts"],"names":[],"mappings":"AAgBA,OAAO,KAAK,KAAK,KAAK,MAAM,oBAAoB,CAAC;AACjD,OAAO,KAAK,EACV,YAAY,IAAI,UAAU,EAC1B,mBAAmB,IAAI,iBAAiB,EACzC,MAAM,qBAAqB,CAAC;AAC7B,OAAO,KAAK,EACV,YAAY,IAAI,OAAO,EACvB,mBAAmB,IAAI,cAAc,EACtC,MAAM,sBAAsB,CAAC;AAG9B,OAAO,KAAK,KAAK,aAAa,MAAM,mBAAmB,CAAC;AAWxD;;;;;;;;;;;;;;;GAeG;AACH,wBAAgB,MAAM,CACpB,IAAI,EAAE,OAAO,GAAG,cAAc,GAAG,UAAU,GAAG,iBAAiB,EAC/D,GAAG,IAAI,EAAE;IACP,KAAK,EAAE,aAAa,CAAC,uBAAuB;IAC5C,YAAY,CAAC,EAAE;QAAE,OAAO,CAAC,EAAE,KAAK,CAAC,WAAW,GAAG,SAAS,CAAA;KAAE;CAC3D,GACA,OAAO,CAAC,aAAa,CAAC,UAAU,CAAC,CAEnC;AASD;;;;;;;GAOG;AACH,wBAAgB,GAAG,CACjB,IAAI,EAAE,OAAO,GAAG,cAAc,GAAG,UAAU,GAAG,iBAAiB,EAC/D,GAAG,IAAI,EAAE;IACP,aAAa,EAAE,aAAa,CAAC,aAAa;IAE1C,YAAY,CAAC,EAAE;QAAE,OAAO,CAAC,EAAE,KAAK,CAAC,WAAW,GAAG,SAAS,CAAA;KAAE;CAC3D,GACA,OAAO,CAAC,aAAa,CAAC,UAAU,CAAC,CAEnC;AASD;;;;;;;;;;;;;;;;;GAiBG;AACH,wBAAgB,aAAa,CAC3B,IAAI,EAAE,OAAO,GAAG,cAAc,GAAG,UAAU,GAAG,iBAAiB,EAC/D,GAAG,IAAI,EAAE;IACP,aAAa,EAAE,aAAa,CAAC,aAAa;IAC1C,KAAK,EAAE,aAAa,CAAC,iCAAiC;CACvD,GACA,OAAO,CAAC,IAAI,CAAC,CAEf;AASD;;;;;;;;GAQG;AACH,wBAAgB,gBAAgB,CAC9B,IAAI,EAAE,OAAO,GAAG,cAAc,GAAG,UAAU,GAAG,iBAAiB,EAC/D,GAAG,IAAI,EAAE;IACP,aAAa,EAAE,aAAa,CAAC,aAAa;IAE1C,YAAY,CAAC,EAAE;QAAE,OAAO,CAAC,EAAE,KAAK,CAAC,WAAW,GAAG,SAAS,CAAA;KAAE;CAC3D,GACA,OAAO,CAAC,aAAa,CAAC,uBAAuB,CAAC,CAEhD"}
@@ -47,7 +47,7 @@ const _get = [0, "/v2/connectivity/connections/{0}", 2];
47
47
  export function get($ctx, ...args) {
48
48
  return $foundryPlatformFetch($ctx, _get, ...args);
49
49
  }
50
- const _updateSecrets = [1, "/v2/connectivity/connections/{0}/updateSecrets", 3];
50
+ const _updateSecrets = [1, "/v2/connectivity/connections/{0}/updateSecrets", 1];
51
51
  /**
52
52
  * Updates the secrets on the connection to the specified secret values.
53
53
  * Secrets that are currently configured on the connection but are omitted in the request will remain unchanged.
@@ -61,7 +61,7 @@ const _updateSecrets = [1, "/v2/connectivity/connections/{0}/updateSecrets", 3];
61
61
  * in-memory handling of secrets. If you do not want your secrets to be temporarily decrypted, you should
62
62
  * use the Foundry UI instead.
63
63
  *
64
- * @beta
64
+ * @public
65
65
  *
66
66
  * Required Scopes: [api:connectivity-connection-write]
67
67
  * URL: /v2/connectivity/connections/{connectionRid}/updateSecrets
@@ -1 +1 @@
1
- {"version":3,"file":"Connection.js","names":["foundryPlatformFetch","$foundryPlatformFetch","_create","create","$ctx","args","_get","get","_updateSecrets","updateSecrets","_getConfiguration","getConfiguration"],"sources":["Connection.js"],"sourcesContent":["/*\n * Copyright 2024 Palantir Technologies, Inc. All rights reserved.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\nimport { foundryPlatformFetch as $foundryPlatformFetch } from \"@osdk/shared.net.platformapi\";\n//\nconst _create = [1, \"/v2/connectivity/connections\", 3];\n/**\n * Creates a new Connection with a [direct connection](https://www.palantir.com/docs/foundry/data-connection/core-concepts/#direct-connection) runtime.\n *\n * Any secrets specified in the request body are transmitted over the network encrypted using TLS. Once the\n * secrets reach Foundry's servers, they will be temporarily decrypted and remain in plaintext in memory to\n * be processed as needed. They will stay in plaintext in memory until the garbage collection process cleans\n * up the memory. The secrets are always stored encrypted on our servers.\n * By using this endpoint, you acknowledge and accept any potential risks associated with the temporary\n * in-memory handling of secrets. If you do not want your secrets to be temporarily decrypted, you should\n * use the Foundry UI instead.\n *\n * @alpha\n *\n * Required Scopes: [api:connectivity-connection-write]\n * URL: /v2/connectivity/connections\n */\nexport function create($ctx, ...args) {\n return $foundryPlatformFetch($ctx, _create, ...args);\n}\nconst _get = [0, \"/v2/connectivity/connections/{0}\", 2];\n/**\n * Get the Connection with the specified rid.\n *\n * @beta\n *\n * Required Scopes: [api:connectivity-connection-read]\n * URL: /v2/connectivity/connections/{connectionRid}\n */\nexport function get($ctx, ...args) {\n return $foundryPlatformFetch($ctx, _get, ...args);\n}\nconst _updateSecrets = [1, \"/v2/connectivity/connections/{0}/updateSecrets\", 3];\n/**\n * Updates the secrets on the connection to the specified secret values.\n * Secrets that are currently configured on the connection but are omitted in the request will remain unchanged.\n *\n * Secrets are transmitted over the network encrypted using TLS. Once the secrets reach Foundry's servers,\n * they will be temporarily decrypted and remain in plaintext in memory to be processed as needed.\n * They will stay in plaintext in memory until the garbage collection process cleans up the memory.\n * The secrets are always stored encrypted on our servers.\n *\n * By using this endpoint, you acknowledge and accept any potential risks associated with the temporary\n * in-memory handling of secrets. If you do not want your secrets to be temporarily decrypted, you should\n * use the Foundry UI instead.\n *\n * @beta\n *\n * Required Scopes: [api:connectivity-connection-write]\n * URL: /v2/connectivity/connections/{connectionRid}/updateSecrets\n */\nexport function updateSecrets($ctx, ...args) {\n return $foundryPlatformFetch($ctx, _updateSecrets, ...args);\n}\nconst _getConfiguration = [0, \"/v2/connectivity/connections/{0}/getConfiguration\", 2];\n/**\n * Retrieves the ConnectionConfiguration of the [Connection](https://www.palantir.com/docs/foundry/data-connection/set-up-source/) itself.\n * This operation is intended for use when other Connection data is not required, providing a lighter-weight alternative to `getConnection` operation.\n *\n * @beta\n *\n * Required Scopes: [api:connectivity-connection-read]\n * URL: /v2/connectivity/connections/{connectionRid}/getConfiguration\n */\nexport function getConfiguration($ctx, ...args) {\n return $foundryPlatformFetch($ctx, _getConfiguration, ...args);\n}\n"],"mappings":"AAAA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,SAASA,oBAAoB,IAAIC,qBAAqB,QAAQ,8BAA8B;AAC5F;AACA,MAAMC,OAAO,GAAG,CAAC,CAAC,EAAE,8BAA8B,EAAE,CAAC,CAAC;AACtD;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,OAAO,SAASC,MAAMA,CAACC,IAAI,EAAE,GAAGC,IAAI,EAAE;EAClC,OAAOJ,qBAAqB,CAACG,IAAI,EAAEF,OAAO,EAAE,GAAGG,IAAI,CAAC;AACxD;AACA,MAAMC,IAAI,GAAG,CAAC,CAAC,EAAE,kCAAkC,EAAE,CAAC,CAAC;AACvD;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,OAAO,SAASC,GAAGA,CAACH,IAAI,EAAE,GAAGC,IAAI,EAAE;EAC/B,OAAOJ,qBAAqB,CAACG,IAAI,EAAEE,IAAI,EAAE,GAAGD,IAAI,CAAC;AACrD;AACA,MAAMG,cAAc,GAAG,CAAC,CAAC,EAAE,gDAAgD,EAAE,CAAC,CAAC;AAC/E;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,OAAO,SAASC,aAAaA,CAACL,IAAI,EAAE,GAAGC,IAAI,EAAE;EACzC,OAAOJ,qBAAqB,CAACG,IAAI,EAAEI,cAAc,EAAE,GAAGH,IAAI,CAAC;AAC/D;AACA,MAAMK,iBAAiB,GAAG,CAAC,CAAC,EAAE,mDAAmD,EAAE,CAAC,CAAC;AACrF;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,OAAO,SAASC,gBAAgBA,CAACP,IAAI,EAAE,GAAGC,IAAI,EAAE;EAC5C,OAAOJ,qBAAqB,CAACG,IAAI,EAAEM,iBAAiB,EAAE,GAAGL,IAAI,CAAC;AAClE","ignoreList":[]}
1
+ {"version":3,"file":"Connection.js","names":["foundryPlatformFetch","$foundryPlatformFetch","_create","create","$ctx","args","_get","get","_updateSecrets","updateSecrets","_getConfiguration","getConfiguration"],"sources":["Connection.js"],"sourcesContent":["/*\n * Copyright 2024 Palantir Technologies, Inc. All rights reserved.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS,\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n * See the License for the specific language governing permissions and\n * limitations under the License.\n */\nimport { foundryPlatformFetch as $foundryPlatformFetch } from \"@osdk/shared.net.platformapi\";\n//\nconst _create = [1, \"/v2/connectivity/connections\", 3];\n/**\n * Creates a new Connection with a [direct connection](https://www.palantir.com/docs/foundry/data-connection/core-concepts/#direct-connection) runtime.\n *\n * Any secrets specified in the request body are transmitted over the network encrypted using TLS. Once the\n * secrets reach Foundry's servers, they will be temporarily decrypted and remain in plaintext in memory to\n * be processed as needed. They will stay in plaintext in memory until the garbage collection process cleans\n * up the memory. The secrets are always stored encrypted on our servers.\n * By using this endpoint, you acknowledge and accept any potential risks associated with the temporary\n * in-memory handling of secrets. If you do not want your secrets to be temporarily decrypted, you should\n * use the Foundry UI instead.\n *\n * @alpha\n *\n * Required Scopes: [api:connectivity-connection-write]\n * URL: /v2/connectivity/connections\n */\nexport function create($ctx, ...args) {\n return $foundryPlatformFetch($ctx, _create, ...args);\n}\nconst _get = [0, \"/v2/connectivity/connections/{0}\", 2];\n/**\n * Get the Connection with the specified rid.\n *\n * @beta\n *\n * Required Scopes: [api:connectivity-connection-read]\n * URL: /v2/connectivity/connections/{connectionRid}\n */\nexport function get($ctx, ...args) {\n return $foundryPlatformFetch($ctx, _get, ...args);\n}\nconst _updateSecrets = [1, \"/v2/connectivity/connections/{0}/updateSecrets\", 1];\n/**\n * Updates the secrets on the connection to the specified secret values.\n * Secrets that are currently configured on the connection but are omitted in the request will remain unchanged.\n *\n * Secrets are transmitted over the network encrypted using TLS. Once the secrets reach Foundry's servers,\n * they will be temporarily decrypted and remain in plaintext in memory to be processed as needed.\n * They will stay in plaintext in memory until the garbage collection process cleans up the memory.\n * The secrets are always stored encrypted on our servers.\n *\n * By using this endpoint, you acknowledge and accept any potential risks associated with the temporary\n * in-memory handling of secrets. If you do not want your secrets to be temporarily decrypted, you should\n * use the Foundry UI instead.\n *\n * @public\n *\n * Required Scopes: [api:connectivity-connection-write]\n * URL: /v2/connectivity/connections/{connectionRid}/updateSecrets\n */\nexport function updateSecrets($ctx, ...args) {\n return $foundryPlatformFetch($ctx, _updateSecrets, ...args);\n}\nconst _getConfiguration = [0, \"/v2/connectivity/connections/{0}/getConfiguration\", 2];\n/**\n * Retrieves the ConnectionConfiguration of the [Connection](https://www.palantir.com/docs/foundry/data-connection/set-up-source/) itself.\n * This operation is intended for use when other Connection data is not required, providing a lighter-weight alternative to `getConnection` operation.\n *\n * @beta\n *\n * Required Scopes: [api:connectivity-connection-read]\n * URL: /v2/connectivity/connections/{connectionRid}/getConfiguration\n */\nexport function getConfiguration($ctx, ...args) {\n return $foundryPlatformFetch($ctx, _getConfiguration, ...args);\n}\n"],"mappings":"AAAA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,SAASA,oBAAoB,IAAIC,qBAAqB,QAAQ,8BAA8B;AAC5F;AACA,MAAMC,OAAO,GAAG,CAAC,CAAC,EAAE,8BAA8B,EAAE,CAAC,CAAC;AACtD;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,OAAO,SAASC,MAAMA,CAACC,IAAI,EAAE,GAAGC,IAAI,EAAE;EAClC,OAAOJ,qBAAqB,CAACG,IAAI,EAAEF,OAAO,EAAE,GAAGG,IAAI,CAAC;AACxD;AACA,MAAMC,IAAI,GAAG,CAAC,CAAC,EAAE,kCAAkC,EAAE,CAAC,CAAC;AACvD;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,OAAO,SAASC,GAAGA,CAACH,IAAI,EAAE,GAAGC,IAAI,EAAE;EAC/B,OAAOJ,qBAAqB,CAACG,IAAI,EAAEE,IAAI,EAAE,GAAGD,IAAI,CAAC;AACrD;AACA,MAAMG,cAAc,GAAG,CAAC,CAAC,EAAE,gDAAgD,EAAE,CAAC,CAAC;AAC/E;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,OAAO,SAASC,aAAaA,CAACL,IAAI,EAAE,GAAGC,IAAI,EAAE;EACzC,OAAOJ,qBAAqB,CAACG,IAAI,EAAEI,cAAc,EAAE,GAAGH,IAAI,CAAC;AAC/D;AACA,MAAMK,iBAAiB,GAAG,CAAC,CAAC,EAAE,mDAAmD,EAAE,CAAC,CAAC;AACrF;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,OAAO,SAASC,gBAAgBA,CAACP,IAAI,EAAE,GAAGC,IAAI,EAAE;EAC5C,OAAOJ,qBAAqB,CAACG,IAAI,EAAEM,iBAAiB,EAAE,GAAGL,IAAI,CAAC;AAClE","ignoreList":[]}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@osdk/foundry.connectivity",
3
- "version": "2.22.0",
3
+ "version": "2.23.0",
4
4
  "license": "Apache-2.0",
5
5
  "repository": {
6
6
  "type": "git",
@@ -21,11 +21,11 @@
21
21
  "dependencies": {
22
22
  "@osdk/shared.client": "^1.0.1",
23
23
  "@osdk/shared.client2": "^1.0.0",
24
- "@osdk/foundry.core": "2.22.0",
25
- "@osdk/foundry.filesystem": "2.22.0",
26
- "@osdk/foundry.datasets": "2.22.0",
27
- "@osdk/foundry.orchestration": "2.22.0",
28
- "@osdk/shared.net.platformapi": "~1.3.0"
24
+ "@osdk/foundry.core": "2.23.0",
25
+ "@osdk/foundry.filesystem": "2.23.0",
26
+ "@osdk/foundry.orchestration": "2.23.0",
27
+ "@osdk/shared.net.platformapi": "~1.3.0",
28
+ "@osdk/foundry.datasets": "2.23.0"
29
29
  },
30
30
  "devDependencies": {
31
31
  "typescript": "^5.5.4",
@@ -50,7 +50,7 @@
50
50
  "sls": {
51
51
  "dependencies": {
52
52
  "com.palantir.foundry.api:api-gateway": {
53
- "minVersion": "1.1178.0",
53
+ "minVersion": "1.1199.0",
54
54
  "maxVersion": "1.x.x",
55
55
  "optional": false
56
56
  }