gcloud developer-connect connections create

NAME
gcloud developer-connect connections create - create a connection resource
SYNOPSIS
gcloud developer-connect connections createCONNECTION[--annotations=[ANNOTATIONS,…]][--async][--disabled][--etag=ETAG][--git-proxy-config-enabled][--labels=[LABELS,…]][--location=LOCATION][--namespace=NAMESPACE][--request-id=REQUEST_ID][--secret=SECRET][--validate-only][--bitbucket-cloud-config-authorizer-credential-user-token-secret-version=BITBUCKET_CLOUD_CONFIG_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION--bitbucket-cloud-config-read-authorizer-credential-user-token-secret-version=BITBUCKET_CLOUD_CONFIG_READ_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION--bitbucket-cloud-config-webhook-secret-version=BITBUCKET_CLOUD_CONFIG_WEBHOOK_SECRET_VERSION--bitbucket-cloud-config-workspace=BITBUCKET_CLOUD_CONFIG_WORKSPACE    | [--bitbucket-data-center-config-authorizer-credential-user-token-secret-version=BITBUCKET_DATA_CENTER_CONFIG_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION--bitbucket-data-center-config-host-uri=BITBUCKET_DATA_CENTER_CONFIG_HOST_URI--bitbucket-data-center-config-read-authorizer-credential-user-token-secret-version=BITBUCKET_DATA_CENTER_CONFIG_READ_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION--bitbucket-data-center-config-webhook-secret-version=BITBUCKET_DATA_CENTER_CONFIG_WEBHOOK_SECRET_VERSION :--bitbucket-data-center-config-service-directory=BITBUCKET_DATA_CENTER_CONFIG_SERVICE_DIRECTORY--bitbucket-data-center-config-ssl-ca-certificate=BITBUCKET_DATA_CENTER_CONFIG_SSL_CA_CERTIFICATE]    | [--github-config-app=GITHUB_CONFIG_APP :--github-config-app-installation-id=GITHUB_CONFIG_APP_INSTALLATION_ID--github-config-authorizer-credential-oauth-token-secret-version=GITHUB_CONFIG_AUTHORIZER_CREDENTIAL_OAUTH_TOKEN_SECRET_VERSION]    | [--github-enterprise-config-host-uri=GITHUB_ENTERPRISE_CONFIG_HOST_URI :--github-enterprise-config-app-id=GITHUB_ENTERPRISE_CONFIG_APP_ID--github-enterprise-config-app-installation-id=GITHUB_ENTERPRISE_CONFIG_APP_INSTALLATION_ID--github-enterprise-config-private-key-secret-version=GITHUB_ENTERPRISE_CONFIG_PRIVATE_KEY_SECRET_VERSION--github-enterprise-config-service-directory=GITHUB_ENTERPRISE_CONFIG_SERVICE_DIRECTORY--github-enterprise-config-ssl-ca-certificate=GITHUB_ENTERPRISE_CONFIG_SSL_CA_CERTIFICATE--github-enterprise-config-webhook-secret-version=GITHUB_ENTERPRISE_CONFIG_WEBHOOK_SECRET_VERSION]    |--gitlab-config-authorizer-credential-user-token-secret-version=GITLAB_CONFIG_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION--gitlab-config-read-authorizer-credential-user-token-secret-version=GITLAB_CONFIG_READ_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION--gitlab-config-webhook-secret-version=GITLAB_CONFIG_WEBHOOK_SECRET_VERSION    | [--gitlab-enterprise-config-authorizer-credential-user-token-secret-version=GITLAB_ENTERPRISE_CONFIG_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION--gitlab-enterprise-config-host-uri=GITLAB_ENTERPRISE_CONFIG_HOST_URI--gitlab-enterprise-config-read-authorizer-credential-user-token-secret-version=GITLAB_ENTERPRISE_CONFIG_READ_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION--gitlab-enterprise-config-webhook-secret-version=GITLAB_ENTERPRISE_CONFIG_WEBHOOK_SECRET_VERSION :--gitlab-enterprise-config-service-directory=GITLAB_ENTERPRISE_CONFIG_SERVICE_DIRECTORY--gitlab-enterprise-config-ssl-ca-certificate=GITLAB_ENTERPRISE_CONFIG_SSL_CA_CERTIFICATE]][(--crypto-key-config-reference=CRYPTO_KEY_CONFIG_REFERENCE :--key-ring=KEY_RING)][GCLOUD_WIDE_FLAG]
DESCRIPTION
Create a connection resource.
EXAMPLES
To create a GitHub connection namedmy-connection inus-central1 run:
gclouddeveloper-connectconnectionscreatemy-connection--github-config-app=developer-connect--github-config-authorizer-credential-oauth-token-secret-version=projects/my-project/secrets/my-oauth-token/versions/1--github-config-app-installation-id=12345--location=us-central1
POSITIONAL ARGUMENTS
Connection resource - Identifier. The resource name of the connection, in theformatprojects/{project}/locations/{location}/connections/{connection_id}.This represents a Cloud resource. (NOTE) Some attributes are not given argumentsin this group but can be set in other ways.

To set theproject attribute:

  • provide the argumentconnection on the command line with a fullyspecified name;
  • provide the argument--project on the command line;
  • set the propertycore/project.

To set thelocation attribute:

  • provide the argumentconnection on the command line with a fullyspecified name;
  • provide the argument--location on the command line.

This must be specified.

CONNECTION
ID of the connection or fully qualified identifier for the connection.

To set theconnection attribute:

  • provide the argumentconnection on the command line.
FLAGS
--annotations=[ANNOTATIONS,…]
Allows clients to store small amounts of arbitrary data.
KEY
SetsKEY value.
VALUE
SetsVALUE value.
Shorthand Example:
--annotations=string=string

JSON Example:

--annotations='{"string": "string"}'

File Example:

--annotations=path_to_file.(yaml|json)
--async
Return immediately, without waiting for the operation in progress to complete.
--disabled
If disabled is set to true, functionality is disabled for this connection.Repository based API methods and webhooks processing for repositories in thisconnection will be disabled.
--etag=ETAG
This checksum is computed by the server based on the value of other fields, andmay be sent on update and delete requests to ensure the client has an up-to-datevalue before proceeding.
The git proxy configuration.
--git-proxy-config-enabled
Setting this to true allows the git proxy to be used for performing gitoperations on the repositories linked in the connection.
--labels=[LABELS,…]
Labels as key value pairs.
KEY
Keys must start with a lowercase character and contain only hyphens(-), underscores (_), lowercase characters, andnumbers.
VALUE
Values must contain only hyphens (-), underscores (_),lowercase characters, and numbers.
Shorthand Example:
--labels=string=string

JSON Example:

--labels='{"string": "string"}'

File Example:

--labels=path_to_file.(yaml|json)
--location=LOCATION
For resources [connection,bitbucket-cloud-config-authorizer-credential-user-token-secret-version,bitbucket-cloud-config-read-authorizer-credential-user-token-secret-version,bitbucket-cloud-config-webhook-secret-version,bitbucket-data-center-config-authorizer-credential-user-token-secret-version,bitbucket-data-center-config-read-authorizer-credential-user-token-secret-version,bitbucket-data-center-config-service-directory,bitbucket-data-center-config-webhook-secret-version,crypto-key-config-reference,github-config-authorizer-credential-oauth-token-secret-version,github-enterprise-config-private-key-secret-version,github-enterprise-config-service-directory,github-enterprise-config-webhook-secret-version,gitlab-config-authorizer-credential-user-token-secret-version,gitlab-config-read-authorizer-credential-user-token-secret-version,gitlab-config-webhook-secret-version,gitlab-enterprise-config-authorizer-credential-user-token-secret-version,gitlab-enterprise-config-read-authorizer-credential-user-token-secret-version,gitlab-enterprise-config-service-directory,gitlab-enterprise-config-webhook-secret-version,http-config-basic-authentication-password-secret-version,http-config-bearer-token-authentication-secret-version,http-config-service-directory], provides fallback value for resource locationattribute. When the resource's full URI path is not provided, location willfallback to this flag value.
--namespace=NAMESPACE
For resources [bitbucket-data-center-config-service-directory,github-enterprise-config-service-directory,gitlab-enterprise-config-service-directory, http-config-service-directory],provides fallback value for resource namespace attribute. When the resource'sfull URI path is not provided, namespace will fallback to this flag value.
--request-id=REQUEST_ID
An optional request ID to identify requests. Specify a unique request ID so thatif you must retry your request, the server will know to ignore the request if ithas already been completed. The server will guarantee that for at least 60minutes since the first request.

For example, consider a situation where you make an initial request and therequest times out. If you make the request again with the same request ID, theserver can check if original operation with the same request ID was received,and if so, will ignore the second request. This prevents clients fromaccidentally creating duplicate commitments.

The request ID must be a valid UUID with the exception that zero UUID is notsupported (00000000-0000-0000-0000-000000000000).

--secret=SECRET
For resources[bitbucket-cloud-config-authorizer-credential-user-token-secret-version,bitbucket-cloud-config-read-authorizer-credential-user-token-secret-version,bitbucket-cloud-config-webhook-secret-version,bitbucket-data-center-config-authorizer-credential-user-token-secret-version,bitbucket-data-center-config-read-authorizer-credential-user-token-secret-version,bitbucket-data-center-config-webhook-secret-version,github-config-authorizer-credential-oauth-token-secret-version,github-enterprise-config-private-key-secret-version,github-enterprise-config-webhook-secret-version,gitlab-config-authorizer-credential-user-token-secret-version,gitlab-config-read-authorizer-credential-user-token-secret-version,gitlab-config-webhook-secret-version,gitlab-enterprise-config-authorizer-credential-user-token-secret-version,gitlab-enterprise-config-read-authorizer-credential-user-token-secret-version,gitlab-enterprise-config-webhook-secret-version,http-config-basic-authentication-password-secret-version,http-config-bearer-token-authentication-secret-version], provides fallback valuefor resource secret attribute. When the resource's full URI path is notprovided, secret will fallback to this flag value.
--validate-only
If set, validate the request, but do not actually post it.
Arguments for the connection config.

At most one of these can be specified:

Configuration for connections to an instance of Bitbucket Cloud.
Represents a personal access token that authorized the Connection, andassociated metadata.

This must be specified.

SecretVersion resource - A SecretManager resource containing the user token thatauthorizes the Developer Connect connection. Format:projects/*/secrets/*/versions/* orprojects/*/locations/*/secrets/*/versions/* (if regional secretsare supported in that location). This represents a Cloud resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.

To set theproject attribute:

  • provide the argument--bitbucket-cloud-config-authorizer-credential-user-token-secret-versionon the command line with a fully specified name;
  • provide the argument--project on the command line;
  • set the propertycore/project.

To set thelocation attribute:

  • provide the argument--bitbucket-cloud-config-authorizer-credential-user-token-secret-versionon the command line with a fully specified name;
  • provide the argument--location on the command line.

To set thesecret attribute:

  • provide the argument--bitbucket-cloud-config-authorizer-credential-user-token-secret-versionon the command line with a fully specified name;
  • provide the argument--secret on the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].

This must be specified.

--bitbucket-cloud-config-authorizer-credential-user-token-secret-version=BITBUCKET_CLOUD_CONFIG_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION
ID of the secretVersion or fully qualified identifier for the secretVersion.

To set thesecret_version attribute:

  • provide the argument--bitbucket-cloud-config-authorizer-credential-user-token-secret-versionon the command line.
Represents a personal access token that authorized the Connection, andassociated metadata.

This must be specified.

SecretVersion resource - A SecretManager resource containing the user token thatauthorizes the Developer Connect connection. Format:projects/*/secrets/*/versions/* orprojects/*/locations/*/secrets/*/versions/* (if regional secretsare supported in that location). This represents a Cloud resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.

To set theproject attribute:

  • provide the argument--bitbucket-cloud-config-read-authorizer-credential-user-token-secret-versionon the command line with a fully specified name;
  • provide the argument--project on the command line;
  • set the propertycore/project.

To set thelocation attribute:

  • provide the argument--bitbucket-cloud-config-read-authorizer-credential-user-token-secret-versionon the command line with a fully specified name;
  • provide the argument--location on the command line.

To set thesecret attribute:

  • provide the argument--bitbucket-cloud-config-read-authorizer-credential-user-token-secret-versionon the command line with a fully specified name;
  • provide the argument--secret on the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].

This must be specified.

--bitbucket-cloud-config-read-authorizer-credential-user-token-secret-version=BITBUCKET_CLOUD_CONFIG_READ_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION
ID of the secretVersion or fully qualified identifier for the secretVersion.

To set thesecret_version attribute:

  • provide the argument--bitbucket-cloud-config-read-authorizer-credential-user-token-secret-versionon the command line.
SecretVersion resource - SecretManager resource containing the webhook secretused to verify webhook events, formatted asprojects/*/secrets/*/versions/* orprojects/*/locations/*/secrets/*/versions/* (if regional secretsare supported in that location). This is used to validate and create webhooks.This represents a Cloud resource. (NOTE) Some attributes are not given argumentsin this group but can be set in other ways.

To set theproject attribute:

  • provide the argument--bitbucket-cloud-config-webhook-secret-version on the command linewith a fully specified name;
  • provide the argument--project on the command line;
  • set the propertycore/project.

To set thelocation attribute:

  • provide the argument--bitbucket-cloud-config-webhook-secret-version on the command linewith a fully specified name;
  • provide the argument--location on the command line.

To set thesecret attribute:

  • provide the argument--bitbucket-cloud-config-webhook-secret-version on the command linewith a fully specified name;
  • provide the argument--secret on the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].

This must be specified.

--bitbucket-cloud-config-webhook-secret-version=BITBUCKET_CLOUD_CONFIG_WEBHOOK_SECRET_VERSION
ID of the secretVersion or fully qualified identifier for the secretVersion.

To set thesecret_version attribute:

  • provide the argument--bitbucket-cloud-config-webhook-secret-version on the commandline.
--bitbucket-cloud-config-workspace=BITBUCKET_CLOUD_CONFIG_WORKSPACE
The Bitbucket Cloud Workspace ID to be connected to Google Cloud Platform.
Configuration for connections to an instance of Bitbucket Data Center.
Represents a personal access token that authorized the Connection, andassociated metadata.

This must be specified.

SecretVersion resource - A SecretManager resource containing the user token thatauthorizes the Developer Connect connection. Format:projects/*/secrets/*/versions/* orprojects/*/locations/*/secrets/*/versions/* (if regional secretsare supported in that location). This represents a Cloud resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.

To set theproject attribute:

  • provide the argument--bitbucket-data-center-config-authorizer-credential-user-token-secret-versionon the command line with a fully specified name;
  • provide the argument--project on the command line;
  • set the propertycore/project.

To set thelocation attribute:

  • provide the argument--bitbucket-data-center-config-authorizer-credential-user-token-secret-versionon the command line with a fully specified name;
  • provide the argument--location on the command line.

To set thesecret attribute:

  • provide the argument--bitbucket-data-center-config-authorizer-credential-user-token-secret-versionon the command line with a fully specified name;
  • provide the argument--secret on the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].

This must be specified.

--bitbucket-data-center-config-authorizer-credential-user-token-secret-version=BITBUCKET_DATA_CENTER_CONFIG_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION
ID of the secretVersion or fully qualified identifier for the secretVersion.

To set thesecret_version attribute:

  • provide the argument--bitbucket-data-center-config-authorizer-credential-user-token-secret-versionon the command line.
--bitbucket-data-center-config-host-uri=BITBUCKET_DATA_CENTER_CONFIG_HOST_URI
The URI of the Bitbucket Data Center host this connection is for.
Represents a personal access token that authorized the Connection, andassociated metadata.

This must be specified.

SecretVersion resource - A SecretManager resource containing the user token thatauthorizes the Developer Connect connection. Format:projects/*/secrets/*/versions/* orprojects/*/locations/*/secrets/*/versions/* (if regional secretsare supported in that location). This represents a Cloud resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.

To set theproject attribute:

  • provide the argument--bitbucket-data-center-config-read-authorizer-credential-user-token-secret-versionon the command line with a fully specified name;
  • provide the argument--project on the command line;
  • set the propertycore/project.

To set thelocation attribute:

  • provide the argument--bitbucket-data-center-config-read-authorizer-credential-user-token-secret-versionon the command line with a fully specified name;
  • provide the argument--location on the command line.

To set thesecret attribute:

  • provide the argument--bitbucket-data-center-config-read-authorizer-credential-user-token-secret-versionon the command line with a fully specified name;
  • provide the argument--secret on the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].

This must be specified.

--bitbucket-data-center-config-read-authorizer-credential-user-token-secret-version=BITBUCKET_DATA_CENTER_CONFIG_READ_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION
ID of the secretVersion or fully qualified identifier for the secretVersion.

To set thesecret_version attribute:

  • provide the argument--bitbucket-data-center-config-read-authorizer-credential-user-token-secret-versionon the command line.
SecretVersion resource - SecretManager resource containing the webhook secretused to verify webhook events, formatted asprojects/*/secrets/*/versions/* orprojects/*/locations/*/secrets/*/versions/* (if regional secretsare supported in that location). This is used to validate webhooks. Thisrepresents a Cloud resource. (NOTE) Some attributes are not given arguments inthis group but can be set in other ways.

To set theproject attribute:

  • provide the argument--bitbucket-data-center-config-webhook-secret-version on thecommand line with a fully specified name;
  • provide the argument--project on the command line;
  • set the propertycore/project.

To set thelocation attribute:

  • provide the argument--bitbucket-data-center-config-webhook-secret-version on thecommand line with a fully specified name;
  • provide the argument--location on the command line.

To set thesecret attribute:

  • provide the argument--bitbucket-data-center-config-webhook-secret-version on thecommand line with a fully specified name;
  • provide the argument--secret on the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].

This must be specified.

--bitbucket-data-center-config-webhook-secret-version=BITBUCKET_DATA_CENTER_CONFIG_WEBHOOK_SECRET_VERSION
ID of the secretVersion or fully qualified identifier for the secretVersion.

To set thesecret_version attribute:

  • provide the argument--bitbucket-data-center-config-webhook-secret-version on thecommand line.
ServiceDirectoryConfig represents Service Directory configuration for aconnection.
Service resource - The Service Directory service name. Format:projects/{project}/locations/{location}/namespaces/{namespace}/services/{service}.This represents a Cloud resource. (NOTE) Some attributes are not given argumentsin this group but can be set in other ways.

To set theproject attribute:

  • provide the argument--bitbucket-data-center-config-service-directory on the commandline with a fully specified name;
  • provide the argument--project on the command line;
  • set the propertycore/project.

To set thelocation attribute:

  • provide the argument--bitbucket-data-center-config-service-directory on the commandline with a fully specified name;
  • provide the argument--location on the command line.

To set thenamespace attribute:

  • provide the argument--bitbucket-data-center-config-service-directory on the commandline with a fully specified name;
  • provide the argument--namespace on the command line.

This must be specified.

--bitbucket-data-center-config-service-directory=BITBUCKET_DATA_CENTER_CONFIG_SERVICE_DIRECTORY
ID of the service or fully qualified identifier for the service.

To set theservice attribute:

  • provide the argument--bitbucket-data-center-config-service-directory on the commandline.
--bitbucket-data-center-config-ssl-ca-certificate=BITBUCKET_DATA_CENTER_CONFIG_SSL_CA_CERTIFICATE
SSL certificate authority to trust when making requests to Bitbucket DataCenter.
Configuration for connections to github.com.
--github-config-app=GITHUB_CONFIG_APP
The GitHub Application that was installed to the GitHub user or organization.GITHUB_CONFIG_APP must be one of:
developer-connect
The Developer Connect GitHub Application.
firebase
The Firebase GitHub Application.
gemini-code-assist
The Gemini Code Assist Application.
This flag argument must be specified if any of the other arguments in this groupare specified.
--github-config-app-installation-id=GITHUB_CONFIG_APP_INSTALLATION_ID
GitHub App installation id.
Represents an OAuth token of the account that authorized the Connection, andassociated metadata.
SecretVersion resource - A SecretManager resource containing the OAuth tokenthat authorizes the connection. Format:projects/*/secrets/*/versions/* orprojects/*/locations/*/secrets/*/versions/* (if regional secretsare supported in that location). This represents a Cloud resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.

To set theproject attribute:

  • provide the argument--github-config-authorizer-credential-oauth-token-secret-version onthe command line with a fully specified name;
  • provide the argument--project on the command line;
  • set the propertycore/project.

To set thelocation attribute:

  • provide the argument--github-config-authorizer-credential-oauth-token-secret-version onthe command line with a fully specified name;
  • provide the argument--location on the command line.

To set thesecret attribute:

  • provide the argument--github-config-authorizer-credential-oauth-token-secret-version onthe command line with a fully specified name;
  • provide the argument--secret on the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].

This must be specified.

--github-config-authorizer-credential-oauth-token-secret-version=GITHUB_CONFIG_AUTHORIZER_CREDENTIAL_OAUTH_TOKEN_SECRET_VERSION
ID of the secretVersion or fully qualified identifier for the secretVersion.

To set thesecret_version attribute:

  • provide the argument--github-config-authorizer-credential-oauth-token-secret-version onthe command line.
Configuration for connections to an instance of GitHub Enterprise.
--github-enterprise-config-host-uri=GITHUB_ENTERPRISE_CONFIG_HOST_URI
The URI of the GitHub Enterprise host this connection is for.

This flag argument must be specified if any of the other arguments in this groupare specified.

--github-enterprise-config-app-id=GITHUB_ENTERPRISE_CONFIG_APP_ID
ID of the GitHub App created from the manifest.
--github-enterprise-config-app-installation-id=GITHUB_ENTERPRISE_CONFIG_APP_INSTALLATION_ID
ID of the installation of the GitHub App.
SecretVersion resource - SecretManager resource containing the private key ofthe GitHub App, formatted asprojects/*/secrets/*/versions/* orprojects/*/locations/*/secrets/*/versions/* (if regional secretsare supported in that location). This represents a Cloud resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.

To set theproject attribute:

  • provide the argument--github-enterprise-config-private-key-secret-version on thecommand line with a fully specified name;
  • provide the argument--project on the command line;
  • set the propertycore/project.

To set thelocation attribute:

  • provide the argument--github-enterprise-config-private-key-secret-version on thecommand line with a fully specified name;
  • provide the argument--location on the command line.

To set thesecret attribute:

  • provide the argument--github-enterprise-config-private-key-secret-version on thecommand line with a fully specified name;
  • provide the argument--secret on the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].
--github-enterprise-config-private-key-secret-version=GITHUB_ENTERPRISE_CONFIG_PRIVATE_KEY_SECRET_VERSION
ID of the secretVersion or fully qualified identifier for the secretVersion.

To set thesecret_version attribute:

  • provide the argument--github-enterprise-config-private-key-secret-version on thecommand line.
ServiceDirectoryConfig represents Service Directory configuration for aconnection.
Service resource - The Service Directory service name. Format:projects/{project}/locations/{location}/namespaces/{namespace}/services/{service}.This represents a Cloud resource. (NOTE) Some attributes are not given argumentsin this group but can be set in other ways.

To set theproject attribute:

  • provide the argument--github-enterprise-config-service-directoryon the command line with a fully specified name;
  • provide the argument--project on the command line;
  • set the propertycore/project.

To set thelocation attribute:

  • provide the argument--github-enterprise-config-service-directoryon the command line with a fully specified name;
  • provide the argument--location on the command line.

To set thenamespace attribute:

  • provide the argument--github-enterprise-config-service-directoryon the command line with a fully specified name;
  • provide the argument--namespace on the command line.

This must be specified.

--github-enterprise-config-service-directory=GITHUB_ENTERPRISE_CONFIG_SERVICE_DIRECTORY
ID of the service or fully qualified identifier for the service.

To set theservice attribute:

  • provide the argument--github-enterprise-config-service-directoryon the command line.
--github-enterprise-config-ssl-ca-certificate=GITHUB_ENTERPRISE_CONFIG_SSL_CA_CERTIFICATE
SSL certificate to use for requests to GitHub Enterprise.
SecretVersion resource - SecretManager resource containing the webhook secret ofthe GitHub App, formatted asprojects/*/secrets/*/versions/* orprojects/*/locations/*/secrets/*/versions/* (if regional secretsare supported in that location). This represents a Cloud resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.

To set theproject attribute:

  • provide the argument--github-enterprise-config-webhook-secret-version on the commandline with a fully specified name;
  • provide the argument--project on the command line;
  • set the propertycore/project.

To set thelocation attribute:

  • provide the argument--github-enterprise-config-webhook-secret-version on the commandline with a fully specified name;
  • provide the argument--location on the command line.

To set thesecret attribute:

  • provide the argument--github-enterprise-config-webhook-secret-version on the commandline with a fully specified name;
  • provide the argument--secret on the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].
--github-enterprise-config-webhook-secret-version=GITHUB_ENTERPRISE_CONFIG_WEBHOOK_SECRET_VERSION
ID of the secretVersion or fully qualified identifier for the secretVersion.

To set thesecret_version attribute:

  • provide the argument--github-enterprise-config-webhook-secret-version on the commandline.
Configuration for connections to gitlab.com.
Represents a personal access token that authorized the Connection, andassociated metadata.

This must be specified.

SecretVersion resource - A SecretManager resource containing the user token thatauthorizes the Developer Connect connection. Format:projects/*/secrets/*/versions/* orprojects/*/locations/*/secrets/*/versions/* (if regional secretsare supported in that location). This represents a Cloud resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.

To set theproject attribute:

  • provide the argument--gitlab-config-authorizer-credential-user-token-secret-version onthe command line with a fully specified name;
  • provide the argument--project on the command line;
  • set the propertycore/project.

To set thelocation attribute:

  • provide the argument--gitlab-config-authorizer-credential-user-token-secret-version onthe command line with a fully specified name;
  • provide the argument--location on the command line.

To set thesecret attribute:

  • provide the argument--gitlab-config-authorizer-credential-user-token-secret-version onthe command line with a fully specified name;
  • provide the argument--secret on the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].

This must be specified.

--gitlab-config-authorizer-credential-user-token-secret-version=GITLAB_CONFIG_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION
ID of the secretVersion or fully qualified identifier for the secretVersion.

To set thesecret_version attribute:

  • provide the argument--gitlab-config-authorizer-credential-user-token-secret-version onthe command line.
Represents a personal access token that authorized the Connection, andassociated metadata.

This must be specified.

SecretVersion resource - A SecretManager resource containing the user token thatauthorizes the Developer Connect connection. Format:projects/*/secrets/*/versions/* orprojects/*/locations/*/secrets/*/versions/* (if regional secretsare supported in that location). This represents a Cloud resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.

To set theproject attribute:

  • provide the argument--gitlab-config-read-authorizer-credential-user-token-secret-versionon the command line with a fully specified name;
  • provide the argument--project on the command line;
  • set the propertycore/project.

To set thelocation attribute:

  • provide the argument--gitlab-config-read-authorizer-credential-user-token-secret-versionon the command line with a fully specified name;
  • provide the argument--location on the command line.

To set thesecret attribute:

  • provide the argument--gitlab-config-read-authorizer-credential-user-token-secret-versionon the command line with a fully specified name;
  • provide the argument--secret on the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].

This must be specified.

--gitlab-config-read-authorizer-credential-user-token-secret-version=GITLAB_CONFIG_READ_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION
ID of the secretVersion or fully qualified identifier for the secretVersion.

To set thesecret_version attribute:

  • provide the argument--gitlab-config-read-authorizer-credential-user-token-secret-versionon the command line.
SecretVersion resource - SecretManager resource containing the webhook secret ofa GitLab project, formatted asprojects/*/secrets/*/versions/* orprojects/*/locations/*/secrets/*/versions/* (if regional secretsare supported in that location). This is used to validate webhooks. Thisrepresents a Cloud resource. (NOTE) Some attributes are not given arguments inthis group but can be set in other ways.

To set theproject attribute:

  • provide the argument--gitlab-config-webhook-secret-version on thecommand line with a fully specified name;
  • provide the argument--project on the command line;
  • set the propertycore/project.

To set thelocation attribute:

  • provide the argument--gitlab-config-webhook-secret-version on thecommand line with a fully specified name;
  • provide the argument--location on the command line.

To set thesecret attribute:

  • provide the argument--gitlab-config-webhook-secret-version on thecommand line with a fully specified name;
  • provide the argument--secret on the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].

This must be specified.

--gitlab-config-webhook-secret-version=GITLAB_CONFIG_WEBHOOK_SECRET_VERSION
ID of the secretVersion or fully qualified identifier for the secretVersion.

To set thesecret_version attribute:

  • provide the argument--gitlab-config-webhook-secret-version on thecommand line.
Configuration for connections to an instance of GitLab Enterprise.
Represents a personal access token that authorized the Connection, andassociated metadata.

This must be specified.

SecretVersion resource - A SecretManager resource containing the user token thatauthorizes the Developer Connect connection. Format:projects/*/secrets/*/versions/* orprojects/*/locations/*/secrets/*/versions/* (if regional secretsare supported in that location). This represents a Cloud resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.

To set theproject attribute:

  • provide the argument--gitlab-enterprise-config-authorizer-credential-user-token-secret-versionon the command line with a fully specified name;
  • provide the argument--project on the command line;
  • set the propertycore/project.

To set thelocation attribute:

  • provide the argument--gitlab-enterprise-config-authorizer-credential-user-token-secret-versionon the command line with a fully specified name;
  • provide the argument--location on the command line.

To set thesecret attribute:

  • provide the argument--gitlab-enterprise-config-authorizer-credential-user-token-secret-versionon the command line with a fully specified name;
  • provide the argument--secret on the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].

This must be specified.

--gitlab-enterprise-config-authorizer-credential-user-token-secret-version=GITLAB_ENTERPRISE_CONFIG_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION
ID of the secretVersion or fully qualified identifier for the secretVersion.

To set thesecret_version attribute:

  • provide the argument--gitlab-enterprise-config-authorizer-credential-user-token-secret-versionon the command line.
--gitlab-enterprise-config-host-uri=GITLAB_ENTERPRISE_CONFIG_HOST_URI
The URI of the GitLab Enterprise host this connection is for.
Represents a personal access token that authorized the Connection, andassociated metadata.

This must be specified.

SecretVersion resource - A SecretManager resource containing the user token thatauthorizes the Developer Connect connection. Format:projects/*/secrets/*/versions/* orprojects/*/locations/*/secrets/*/versions/* (if regional secretsare supported in that location). This represents a Cloud resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.

To set theproject attribute:

  • provide the argument--gitlab-enterprise-config-read-authorizer-credential-user-token-secret-versionon the command line with a fully specified name;
  • provide the argument--project on the command line;
  • set the propertycore/project.

To set thelocation attribute:

  • provide the argument--gitlab-enterprise-config-read-authorizer-credential-user-token-secret-versionon the command line with a fully specified name;
  • provide the argument--location on the command line.

To set thesecret attribute:

  • provide the argument--gitlab-enterprise-config-read-authorizer-credential-user-token-secret-versionon the command line with a fully specified name;
  • provide the argument--secret on the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].

This must be specified.

--gitlab-enterprise-config-read-authorizer-credential-user-token-secret-version=GITLAB_ENTERPRISE_CONFIG_READ_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION
ID of the secretVersion or fully qualified identifier for the secretVersion.

To set thesecret_version attribute:

  • provide the argument--gitlab-enterprise-config-read-authorizer-credential-user-token-secret-versionon the command line.
SecretVersion resource - SecretManager resource containing the webhook secret ofa GitLab project, formatted asprojects/*/secrets/*/versions/* orprojects/*/locations/*/secrets/*/versions/* (if regional secretsare supported in that location). This is used to validate webhooks. Thisrepresents a Cloud resource. (NOTE) Some attributes are not given arguments inthis group but can be set in other ways.

To set theproject attribute:

  • provide the argument--gitlab-enterprise-config-webhook-secret-version on the commandline with a fully specified name;
  • provide the argument--project on the command line;
  • set the propertycore/project.

To set thelocation attribute:

  • provide the argument--gitlab-enterprise-config-webhook-secret-version on the commandline with a fully specified name;
  • provide the argument--location on the command line.

To set thesecret attribute:

  • provide the argument--gitlab-enterprise-config-webhook-secret-version on the commandline with a fully specified name;
  • provide the argument--secret on the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].

This must be specified.

--gitlab-enterprise-config-webhook-secret-version=GITLAB_ENTERPRISE_CONFIG_WEBHOOK_SECRET_VERSION
ID of the secretVersion or fully qualified identifier for the secretVersion.

To set thesecret_version attribute:

  • provide the argument--gitlab-enterprise-config-webhook-secret-version on the commandline.
ServiceDirectoryConfig represents Service Directory configuration for aconnection.
Service resource - The Service Directory service name. Format:projects/{project}/locations/{location}/namespaces/{namespace}/services/{service}.This represents a Cloud resource. (NOTE) Some attributes are not given argumentsin this group but can be set in other ways.

To set theproject attribute:

  • provide the argument--gitlab-enterprise-config-service-directoryon the command line with a fully specified name;
  • provide the argument--project on the command line;
  • set the propertycore/project.

To set thelocation attribute:

  • provide the argument--gitlab-enterprise-config-service-directoryon the command line with a fully specified name;
  • provide the argument--location on the command line.

To set thenamespace attribute:

  • provide the argument--gitlab-enterprise-config-service-directoryon the command line with a fully specified name;
  • provide the argument--namespace on the command line.

This must be specified.

--gitlab-enterprise-config-service-directory=GITLAB_ENTERPRISE_CONFIG_SERVICE_DIRECTORY
ID of the service or fully qualified identifier for the service.

To set theservice attribute:

  • provide the argument--gitlab-enterprise-config-service-directoryon the command line.
--gitlab-enterprise-config-ssl-ca-certificate=GITLAB_ENTERPRISE_CONFIG_SSL_CA_CERTIFICATE
SSL Certificate Authority certificate to use for requests to GitLab Enterpriseinstance.
The crypto key configuration. This field is used by the Customer-managedencryption keys (CMEK) feature.
CryptoKey resource - The name of the key which is used to encrypt/decryptcustomer data. For key in Cloud KMS, the key should be in the format ofprojects/*/locations/*/keyRings/*/cryptoKeys/*. The arguments inthis group can be used to specify the attributes of this resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.

To set theproject attribute:

  • provide the argument--crypto-key-config-reference on the commandline with a fully specified name;
  • provide the argument--project on the command line;
  • set the propertycore/project.

To set thelocation attribute:

  • provide the argument--crypto-key-config-reference on the commandline with a fully specified name;
  • provide the argument--location on the command line.

This must be specified.

--crypto-key-config-reference=CRYPTO_KEY_CONFIG_REFERENCE
ID of the cryptoKey or fully qualified identifier for the cryptoKey.

To set thecrypto-key attribute:

  • provide the argument--crypto-key-config-reference on the commandline.

This flag argument must be specified if any of the other arguments in this groupare specified.

--key-ring=KEY_RING
The keyRing id of the cryptoKey resource.

To set thekey-ring attribute:

  • provide the argument--crypto-key-config-reference on the commandline with a fully specified name;
  • provide the argument--key-ring on the command line.
GCLOUD WIDE FLAGS
These flags are available to all commands:--access-token-file,--account,--billing-project,--configuration,--flags-file,--flatten,--format,--help,--impersonate-service-account,--log-http,--project,--quiet,--trace-token,--user-output-enabled,--verbosity.

Run$gcloud help for details.

API REFERENCE
This command uses thedeveloperconnect/v1 API. The fulldocumentation for this API can be found at:http://cloud.google.com/developer-connect/docs/overview
NOTES
These variants are also available:
gcloudalphadeveloper-connectconnectionscreate
gcloudbetadeveloper-connectconnectionscreate

Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2025-12-09 UTC.