|
29 | 29 | class Configuration(object):
|
30 | 30 | """NOTE: This class is auto generated by OpenAPI Generator
|
31 | 31 |
|
32 |
| - Ref: https://openapi-generator.tech |
33 |
| - Do not edit the class manually. |
34 |
| -
|
35 |
| - :param host: Base url |
36 |
| - :param api_key: Dict to store API key(s). |
37 |
| - Each entry in the dict specifies an API key. |
38 |
| - The dict key is the name of the security scheme in the OAS specification. |
39 |
| - The dict value is the API key secret. |
40 |
| - :param api_key_prefix: Dict to store API prefix (e.g. Bearer) |
41 |
| - The dict key is the name of the security scheme in the OAS specification. |
42 |
| - The dict value is an API key prefix when generating the auth data. |
43 |
| - :param username: Username for HTTP basic authentication |
44 |
| - :param password: Password for HTTP basic authentication |
45 |
| - :param discard_unknown_keys: Boolean value indicating whether to discard |
46 |
| - unknown properties. A server may send a response that includes additional |
47 |
| - properties that are not known by the client in the following scenarios: |
48 |
| - 1. The OpenAPI document is incomplete, i.e. it does not match the server |
49 |
| - implementation. |
50 |
| - 2. The client was generated using an older version of the OpenAPI document |
51 |
| - and the server has been upgraded since then. |
52 |
| - If a schema in the OpenAPI document defines the additionalProperties attribute, |
53 |
| - then all undeclared properties received by the server are injected into the |
54 |
| - additional properties map. In that case, there are undeclared properties, and |
55 |
| - nothing to discard. |
56 |
| - :param disabled_client_side_validations (string): Comma-separated list of |
57 |
| - JSON schema validation keywords to disable JSON schema structural validation |
58 |
| - rules. The following keywords may be specified: multipleOf, maximum, |
59 |
| - exclusiveMaximum, minimum, exclusiveMinimum, maxLength, minLength, pattern, |
60 |
| - maxItems, minItems. |
61 |
| - By default, the validation is performed for data generated locally by the client |
62 |
| - and data received from the server, independent of any validation performed by |
63 |
| - the server side. If the input data does not satisfy the JSON schema validation |
64 |
| - rules specified in the OpenAPI document, an exception is raised. |
65 |
| - If disabled_client_side_validations is set, structural validation is |
66 |
| - disabled. This can be useful to troubleshoot data validation problem, such as |
67 |
| - when the OpenAPI document validation rules do not match the actual API data |
68 |
| - received by the server. |
69 |
| - :param server_index: Index to servers configuration. |
70 |
| - :param server_variables: Mapping with string values to replace variables in |
71 |
| - templated server configuration. The validation of enums is performed for |
72 |
| - variables with defined enum values before. |
73 |
| - :param server_operation_index: Mapping from operation ID to an index to server |
74 |
| - configuration. |
75 |
| - :param server_operation_variables: Mapping from operation ID to a mapping with |
76 |
| - string values to replace variables in templated server configuration. |
77 |
| - The validation of enums is performed for variables with defined enum values before. |
78 |
| - :param ssl_ca_cert: str - the path to a file of concatenated CA certificates |
79 |
| - in PEM format |
80 |
| -
|
81 |
| - :Example: |
82 |
| -
|
83 |
| - API Key Authentication Example. |
84 |
| - Given the following security scheme in the OpenAPI specification: |
85 |
| - components: |
86 |
| - securitySchemes: |
87 |
| - cookieAuth: # name for the security scheme |
88 |
| - type: apiKey |
89 |
| - in: cookie |
90 |
| - name: JSESSIONID # cookie name |
91 |
| -
|
92 |
| - You can programmatically set the cookie: |
93 |
| -
|
94 |
| - conf = hubspot.cms.audit_logs.Configuration( |
95 |
| - api_key={'cookieAuth': 'abc123'} |
96 |
| - api_key_prefix={'cookieAuth': 'JSESSIONID'} |
97 |
| - ) |
98 |
| -
|
99 |
| - The following cookie will be added to the HTTP request: |
100 |
| - Cookie: JSESSIONID abc123 |
| 32 | + Ref: https://openapi-generator.tech |
| 33 | + Do not edit the class manually. |
| 34 | +
|
| 35 | + :param host: Base url |
| 36 | + :param api_key: Dict to store API key(s). |
| 37 | + Each entry in the dict specifies an API key. |
| 38 | + The dict key is the name of the security scheme in the OAS specification. |
| 39 | + The dict value is the API key secret. |
| 40 | + :param api_key_prefix: Dict to store API prefix (e.g. Bearer) |
| 41 | + The dict key is the name of the security scheme in the OAS specification. |
| 42 | + The dict value is an API key prefix when generating the auth data. |
| 43 | + :param username: Username for HTTP basic authentication |
| 44 | + :param password: Password for HTTP basic authentication |
| 45 | + :param discard_unknown_keys: Boolean value indicating whether to discard |
| 46 | + unknown properties. A server may send a response that includes additional |
| 47 | + properties that are not known by the client in the following scenarios: |
| 48 | + 1. The OpenAPI document is incomplete, i.e. it does not match the server |
| 49 | + implementation. |
| 50 | + 2. The client was generated using an older version of the OpenAPI document |
| 51 | + and the server has been upgraded since then. |
| 52 | + If a schema in the OpenAPI document defines the additionalProperties attribute, |
| 53 | + then all undeclared properties received by the server are injected into the |
| 54 | + additional properties map. In that case, there are undeclared properties, and |
| 55 | + nothing to discard. |
| 56 | + :param disabled_client_side_validations (string): Comma-separated list of |
| 57 | + JSON schema validation keywords to disable JSON schema structural validation |
| 58 | + rules. The following keywords may be specified: multipleOf, maximum, |
| 59 | + exclusiveMaximum, minimum, exclusiveMinimum, maxLength, minLength, pattern, |
| 60 | + maxItems, minItems. |
| 61 | + By default, the validation is performed for data generated locally by the client |
| 62 | + and data received from the server, independent of any validation performed by |
| 63 | + the server side. If the input data does not satisfy the JSON schema validation |
| 64 | + rules specified in the OpenAPI document, an exception is raised. |
| 65 | + If disabled_client_side_validations is set, structural validation is |
| 66 | + disabled. This can be useful to troubleshoot data validation problem, such as |
| 67 | + when the OpenAPI document validation rules do not match the actual API data |
| 68 | + received by the server. |
| 69 | + :param server_index: Index to servers configuration. |
| 70 | + :param server_variables: Mapping with string values to replace variables in |
| 71 | + templated server configuration. The validation of enums is performed for |
| 72 | + variables with defined enum values before. |
| 73 | + :param server_operation_index: Mapping from operation ID to an index to server |
| 74 | + configuration. |
| 75 | + :param server_operation_variables: Mapping from operation ID to a mapping with |
| 76 | + string values to replace variables in templated server configuration. |
| 77 | + The validation of enums is performed for variables with defined enum values before. |
| 78 | + :param ssl_ca_cert: str - the path to a file of concatenated CA certificates |
| 79 | + in PEM format |
| 80 | +
|
| 81 | + :Example: |
101 | 82 | """
|
102 | 83 |
|
103 | 84 | _default = None
|
@@ -392,15 +373,6 @@ def auth_settings(self):
|
392 | 373 | :return: The Auth Settings information dict.
|
393 | 374 | """
|
394 | 375 | auth = {}
|
395 |
| - if "hapikey" in self.api_key: |
396 |
| - auth["hapikey"] = { |
397 |
| - "type": "api_key", |
398 |
| - "in": "query", |
399 |
| - "key": "hapikey", |
400 |
| - "value": self.get_api_key_with_prefix( |
401 |
| - "hapikey", |
402 |
| - ), |
403 |
| - } |
404 | 376 | if self.access_token is not None:
|
405 | 377 | auth["oauth2"] = {"type": "oauth2", "in": "header", "key": "Authorization", "value": "Bearer " + self.access_token}
|
406 | 378 | return auth
|
|
0 commit comments