gcloud developer-connect connections create Stay organized with collections Save and categorize content based on your preferences.
- NAME
- gcloud developer-connect connections create - create a connection resource
- SYNOPSIS
gcloud developer-connect connections createCONNECTION[--annotations=[ANNOTATIONS,…]][--async][--disabled][--etag=ETAG][--git-proxy-config-enabled][--labels=[LABELS,…]][--location=LOCATION][--namespace=NAMESPACE][--request-id=REQUEST_ID][--secret=SECRET][--validate-only][--bitbucket-cloud-config-authorizer-credential-user-token-secret-version=BITBUCKET_CLOUD_CONFIG_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION--bitbucket-cloud-config-read-authorizer-credential-user-token-secret-version=BITBUCKET_CLOUD_CONFIG_READ_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION--bitbucket-cloud-config-webhook-secret-version=BITBUCKET_CLOUD_CONFIG_WEBHOOK_SECRET_VERSION--bitbucket-cloud-config-workspace=BITBUCKET_CLOUD_CONFIG_WORKSPACE| [--bitbucket-data-center-config-authorizer-credential-user-token-secret-version=BITBUCKET_DATA_CENTER_CONFIG_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION--bitbucket-data-center-config-host-uri=BITBUCKET_DATA_CENTER_CONFIG_HOST_URI--bitbucket-data-center-config-read-authorizer-credential-user-token-secret-version=BITBUCKET_DATA_CENTER_CONFIG_READ_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION--bitbucket-data-center-config-webhook-secret-version=BITBUCKET_DATA_CENTER_CONFIG_WEBHOOK_SECRET_VERSION:--bitbucket-data-center-config-service-directory=BITBUCKET_DATA_CENTER_CONFIG_SERVICE_DIRECTORY--bitbucket-data-center-config-ssl-ca-certificate=BITBUCKET_DATA_CENTER_CONFIG_SSL_CA_CERTIFICATE] | [--github-config-app=GITHUB_CONFIG_APP:--github-config-app-installation-id=GITHUB_CONFIG_APP_INSTALLATION_ID--github-config-authorizer-credential-oauth-token-secret-version=GITHUB_CONFIG_AUTHORIZER_CREDENTIAL_OAUTH_TOKEN_SECRET_VERSION] | [--github-enterprise-config-host-uri=GITHUB_ENTERPRISE_CONFIG_HOST_URI:--github-enterprise-config-app-id=GITHUB_ENTERPRISE_CONFIG_APP_ID--github-enterprise-config-app-installation-id=GITHUB_ENTERPRISE_CONFIG_APP_INSTALLATION_ID--github-enterprise-config-private-key-secret-version=GITHUB_ENTERPRISE_CONFIG_PRIVATE_KEY_SECRET_VERSION--github-enterprise-config-service-directory=GITHUB_ENTERPRISE_CONFIG_SERVICE_DIRECTORY--github-enterprise-config-ssl-ca-certificate=GITHUB_ENTERPRISE_CONFIG_SSL_CA_CERTIFICATE--github-enterprise-config-webhook-secret-version=GITHUB_ENTERPRISE_CONFIG_WEBHOOK_SECRET_VERSION] |--gitlab-config-authorizer-credential-user-token-secret-version=GITLAB_CONFIG_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION--gitlab-config-read-authorizer-credential-user-token-secret-version=GITLAB_CONFIG_READ_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION--gitlab-config-webhook-secret-version=GITLAB_CONFIG_WEBHOOK_SECRET_VERSION| [--gitlab-enterprise-config-authorizer-credential-user-token-secret-version=GITLAB_ENTERPRISE_CONFIG_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION--gitlab-enterprise-config-host-uri=GITLAB_ENTERPRISE_CONFIG_HOST_URI--gitlab-enterprise-config-read-authorizer-credential-user-token-secret-version=GITLAB_ENTERPRISE_CONFIG_READ_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION--gitlab-enterprise-config-webhook-secret-version=GITLAB_ENTERPRISE_CONFIG_WEBHOOK_SECRET_VERSION:--gitlab-enterprise-config-service-directory=GITLAB_ENTERPRISE_CONFIG_SERVICE_DIRECTORY--gitlab-enterprise-config-ssl-ca-certificate=GITLAB_ENTERPRISE_CONFIG_SSL_CA_CERTIFICATE]][(--crypto-key-config-reference=CRYPTO_KEY_CONFIG_REFERENCE:--key-ring=KEY_RING)][GCLOUD_WIDE_FLAG …]
- DESCRIPTION
- Create a connection resource.
- EXAMPLES
- To create a GitHub connection named
my-connectioninus-central1run:gclouddeveloper-connectconnectionscreatemy-connection--github-config-app=developer-connect--github-config-authorizer-credential-oauth-token-secret-version=projects/my-project/secrets/my-oauth-token/versions/1--github-config-app-installation-id=12345--location=us-central1 - POSITIONAL ARGUMENTS
- Connection resource - Identifier. The resource name of the connection, in theformat
projects/{project}/locations/{location}/connections/{connection_id}.This represents a Cloud resource. (NOTE) Some attributes are not given argumentsin this group but can be set in other ways.To set the
projectattribute:- provide the argument
connectionon the command line with a fullyspecified name; - provide the argument
--projecton the command line; - set the property
core/project.
To set the
locationattribute:- provide the argument
connectionon the command line with a fullyspecified name; - provide the argument
--locationon the command line.
This must be specified.
CONNECTION- ID of the connection or fully qualified identifier for the connection.
To set the
connectionattribute:- provide the argument
connectionon the command line.
- provide the argument
- provide the argument
- Connection resource - Identifier. The resource name of the connection, in theformat
- FLAGS
--annotations=[ANNOTATIONS,…]- Allows clients to store small amounts of arbitrary data.
KEY- Sets
KEYvalue. VALUE- Sets
VALUEvalue.
Shorthand Example:--annotations=string=string
JSON Example:--annotations='{"string": "string"}'
File Example:--annotations=path_to_file.(yaml|json)
--async- Return immediately, without waiting for the operation in progress to complete.
--disabled- If disabled is set to true, functionality is disabled for this connection.Repository based API methods and webhooks processing for repositories in thisconnection will be disabled.
--etag=ETAG- This checksum is computed by the server based on the value of other fields, andmay be sent on update and delete requests to ensure the client has an up-to-datevalue before proceeding.
- The git proxy configuration.
--git-proxy-config-enabled- Setting this to true allows the git proxy to be used for performing gitoperations on the repositories linked in the connection.
--labels=[LABELS,…]- Labels as key value pairs.
KEY- Keys must start with a lowercase character and contain only hyphens(
-), underscores (_), lowercase characters, andnumbers. VALUE- Values must contain only hyphens (
-), underscores (_),lowercase characters, and numbers.
Shorthand Example:--labels=string=string
JSON Example:--labels='{"string": "string"}'
File Example:--labels=path_to_file.(yaml|json)
--location=LOCATION- For resources [connection,bitbucket-cloud-config-authorizer-credential-user-token-secret-version,bitbucket-cloud-config-read-authorizer-credential-user-token-secret-version,bitbucket-cloud-config-webhook-secret-version,bitbucket-data-center-config-authorizer-credential-user-token-secret-version,bitbucket-data-center-config-read-authorizer-credential-user-token-secret-version,bitbucket-data-center-config-service-directory,bitbucket-data-center-config-webhook-secret-version,crypto-key-config-reference,github-config-authorizer-credential-oauth-token-secret-version,github-enterprise-config-private-key-secret-version,github-enterprise-config-service-directory,github-enterprise-config-webhook-secret-version,gitlab-config-authorizer-credential-user-token-secret-version,gitlab-config-read-authorizer-credential-user-token-secret-version,gitlab-config-webhook-secret-version,gitlab-enterprise-config-authorizer-credential-user-token-secret-version,gitlab-enterprise-config-read-authorizer-credential-user-token-secret-version,gitlab-enterprise-config-service-directory,gitlab-enterprise-config-webhook-secret-version,http-config-basic-authentication-password-secret-version,http-config-bearer-token-authentication-secret-version,http-config-service-directory], provides fallback value for resource locationattribute. When the resource's full URI path is not provided, location willfallback to this flag value.
--namespace=NAMESPACE- For resources [bitbucket-data-center-config-service-directory,github-enterprise-config-service-directory,gitlab-enterprise-config-service-directory, http-config-service-directory],provides fallback value for resource namespace attribute. When the resource'sfull URI path is not provided, namespace will fallback to this flag value.
--request-id=REQUEST_ID- An optional request ID to identify requests. Specify a unique request ID so thatif you must retry your request, the server will know to ignore the request if ithas already been completed. The server will guarantee that for at least 60minutes since the first request.
For example, consider a situation where you make an initial request and therequest times out. If you make the request again with the same request ID, theserver can check if original operation with the same request ID was received,and if so, will ignore the second request. This prevents clients fromaccidentally creating duplicate commitments.
The request ID must be a valid UUID with the exception that zero UUID is notsupported (00000000-0000-0000-0000-000000000000).
--secret=SECRET- For resources[bitbucket-cloud-config-authorizer-credential-user-token-secret-version,bitbucket-cloud-config-read-authorizer-credential-user-token-secret-version,bitbucket-cloud-config-webhook-secret-version,bitbucket-data-center-config-authorizer-credential-user-token-secret-version,bitbucket-data-center-config-read-authorizer-credential-user-token-secret-version,bitbucket-data-center-config-webhook-secret-version,github-config-authorizer-credential-oauth-token-secret-version,github-enterprise-config-private-key-secret-version,github-enterprise-config-webhook-secret-version,gitlab-config-authorizer-credential-user-token-secret-version,gitlab-config-read-authorizer-credential-user-token-secret-version,gitlab-config-webhook-secret-version,gitlab-enterprise-config-authorizer-credential-user-token-secret-version,gitlab-enterprise-config-read-authorizer-credential-user-token-secret-version,gitlab-enterprise-config-webhook-secret-version,http-config-basic-authentication-password-secret-version,http-config-bearer-token-authentication-secret-version], provides fallback valuefor resource secret attribute. When the resource's full URI path is notprovided, secret will fallback to this flag value.
--validate-only- If set, validate the request, but do not actually post it.
- Arguments for the connection config.
At most one of these can be specified:
- Configuration for connections to an instance of Bitbucket Cloud.
- Represents a personal access token that authorized the Connection, andassociated metadata.
This must be specified.
- SecretVersion resource - A SecretManager resource containing the user token thatauthorizes the Developer Connect connection. Format:
projects/*/secrets/*/versions/*orprojects/*/locations/*/secrets/*/versions/*(if regional secretsare supported in that location). This represents a Cloud resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.To set the
projectattribute:- provide the argument
--bitbucket-cloud-config-authorizer-credential-user-token-secret-versionon the command line with a fully specified name; - provide the argument
--projecton the command line; - set the property
core/project.
To set the
locationattribute:- provide the argument
--bitbucket-cloud-config-authorizer-credential-user-token-secret-versionon the command line with a fully specified name; - provide the argument
--locationon the command line.
To set the
secretattribute:- provide the argument
--bitbucket-cloud-config-authorizer-credential-user-token-secret-versionon the command line with a fully specified name; - provide the argument
--secreton the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].
This must be specified.
--bitbucket-cloud-config-authorizer-credential-user-token-secret-version=BITBUCKET_CLOUD_CONFIG_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION- ID of the secretVersion or fully qualified identifier for the secretVersion.
To set the
secret_versionattribute:- provide the argument
--bitbucket-cloud-config-authorizer-credential-user-token-secret-versionon the command line.
- provide the argument
- provide the argument
- SecretVersion resource - A SecretManager resource containing the user token thatauthorizes the Developer Connect connection. Format:
- Represents a personal access token that authorized the Connection, andassociated metadata.
This must be specified.
- SecretVersion resource - A SecretManager resource containing the user token thatauthorizes the Developer Connect connection. Format:
projects/*/secrets/*/versions/*orprojects/*/locations/*/secrets/*/versions/*(if regional secretsare supported in that location). This represents a Cloud resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.To set the
projectattribute:- provide the argument
--bitbucket-cloud-config-read-authorizer-credential-user-token-secret-versionon the command line with a fully specified name; - provide the argument
--projecton the command line; - set the property
core/project.
To set the
locationattribute:- provide the argument
--bitbucket-cloud-config-read-authorizer-credential-user-token-secret-versionon the command line with a fully specified name; - provide the argument
--locationon the command line.
To set the
secretattribute:- provide the argument
--bitbucket-cloud-config-read-authorizer-credential-user-token-secret-versionon the command line with a fully specified name; - provide the argument
--secreton the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].
This must be specified.
--bitbucket-cloud-config-read-authorizer-credential-user-token-secret-version=BITBUCKET_CLOUD_CONFIG_READ_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION- ID of the secretVersion or fully qualified identifier for the secretVersion.
To set the
secret_versionattribute:- provide the argument
--bitbucket-cloud-config-read-authorizer-credential-user-token-secret-versionon the command line.
- provide the argument
- provide the argument
- SecretVersion resource - A SecretManager resource containing the user token thatauthorizes the Developer Connect connection. Format:
- SecretVersion resource - SecretManager resource containing the webhook secretused to verify webhook events, formatted as
projects/*/secrets/*/versions/*orprojects/*/locations/*/secrets/*/versions/*(if regional secretsare supported in that location). This is used to validate and create webhooks.This represents a Cloud resource. (NOTE) Some attributes are not given argumentsin this group but can be set in other ways.To set the
projectattribute:- provide the argument
--bitbucket-cloud-config-webhook-secret-versionon the command linewith a fully specified name; - provide the argument
--projecton the command line; - set the property
core/project.
To set the
locationattribute:- provide the argument
--bitbucket-cloud-config-webhook-secret-versionon the command linewith a fully specified name; - provide the argument
--locationon the command line.
To set the
secretattribute:- provide the argument
--bitbucket-cloud-config-webhook-secret-versionon the command linewith a fully specified name; - provide the argument
--secreton the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].
This must be specified.
--bitbucket-cloud-config-webhook-secret-version=BITBUCKET_CLOUD_CONFIG_WEBHOOK_SECRET_VERSION- ID of the secretVersion or fully qualified identifier for the secretVersion.
To set the
secret_versionattribute:- provide the argument
--bitbucket-cloud-config-webhook-secret-versionon the commandline.
- provide the argument
- provide the argument
--bitbucket-cloud-config-workspace=BITBUCKET_CLOUD_CONFIG_WORKSPACE- The Bitbucket Cloud Workspace ID to be connected to Google Cloud Platform.
- Represents a personal access token that authorized the Connection, andassociated metadata.
- Configuration for connections to an instance of Bitbucket Data Center.
- Represents a personal access token that authorized the Connection, andassociated metadata.
This must be specified.
- SecretVersion resource - A SecretManager resource containing the user token thatauthorizes the Developer Connect connection. Format:
projects/*/secrets/*/versions/*orprojects/*/locations/*/secrets/*/versions/*(if regional secretsare supported in that location). This represents a Cloud resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.To set the
projectattribute:- provide the argument
--bitbucket-data-center-config-authorizer-credential-user-token-secret-versionon the command line with a fully specified name; - provide the argument
--projecton the command line; - set the property
core/project.
To set the
locationattribute:- provide the argument
--bitbucket-data-center-config-authorizer-credential-user-token-secret-versionon the command line with a fully specified name; - provide the argument
--locationon the command line.
To set the
secretattribute:- provide the argument
--bitbucket-data-center-config-authorizer-credential-user-token-secret-versionon the command line with a fully specified name; - provide the argument
--secreton the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].
This must be specified.
--bitbucket-data-center-config-authorizer-credential-user-token-secret-version=BITBUCKET_DATA_CENTER_CONFIG_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION- ID of the secretVersion or fully qualified identifier for the secretVersion.
To set the
secret_versionattribute:- provide the argument
--bitbucket-data-center-config-authorizer-credential-user-token-secret-versionon the command line.
- provide the argument
- provide the argument
- SecretVersion resource - A SecretManager resource containing the user token thatauthorizes the Developer Connect connection. Format:
--bitbucket-data-center-config-host-uri=BITBUCKET_DATA_CENTER_CONFIG_HOST_URI- The URI of the Bitbucket Data Center host this connection is for.
- Represents a personal access token that authorized the Connection, andassociated metadata.
This must be specified.
- SecretVersion resource - A SecretManager resource containing the user token thatauthorizes the Developer Connect connection. Format:
projects/*/secrets/*/versions/*orprojects/*/locations/*/secrets/*/versions/*(if regional secretsare supported in that location). This represents a Cloud resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.To set the
projectattribute:- provide the argument
--bitbucket-data-center-config-read-authorizer-credential-user-token-secret-versionon the command line with a fully specified name; - provide the argument
--projecton the command line; - set the property
core/project.
To set the
locationattribute:- provide the argument
--bitbucket-data-center-config-read-authorizer-credential-user-token-secret-versionon the command line with a fully specified name; - provide the argument
--locationon the command line.
To set the
secretattribute:- provide the argument
--bitbucket-data-center-config-read-authorizer-credential-user-token-secret-versionon the command line with a fully specified name; - provide the argument
--secreton the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].
This must be specified.
--bitbucket-data-center-config-read-authorizer-credential-user-token-secret-version=BITBUCKET_DATA_CENTER_CONFIG_READ_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION- ID of the secretVersion or fully qualified identifier for the secretVersion.
To set the
secret_versionattribute:- provide the argument
--bitbucket-data-center-config-read-authorizer-credential-user-token-secret-versionon the command line.
- provide the argument
- provide the argument
- SecretVersion resource - A SecretManager resource containing the user token thatauthorizes the Developer Connect connection. Format:
- SecretVersion resource - SecretManager resource containing the webhook secretused to verify webhook events, formatted as
projects/*/secrets/*/versions/*orprojects/*/locations/*/secrets/*/versions/*(if regional secretsare supported in that location). This is used to validate webhooks. Thisrepresents a Cloud resource. (NOTE) Some attributes are not given arguments inthis group but can be set in other ways.To set the
projectattribute:- provide the argument
--bitbucket-data-center-config-webhook-secret-versionon thecommand line with a fully specified name; - provide the argument
--projecton the command line; - set the property
core/project.
To set the
locationattribute:- provide the argument
--bitbucket-data-center-config-webhook-secret-versionon thecommand line with a fully specified name; - provide the argument
--locationon the command line.
To set the
secretattribute:- provide the argument
--bitbucket-data-center-config-webhook-secret-versionon thecommand line with a fully specified name; - provide the argument
--secreton the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].
This must be specified.
--bitbucket-data-center-config-webhook-secret-version=BITBUCKET_DATA_CENTER_CONFIG_WEBHOOK_SECRET_VERSION- ID of the secretVersion or fully qualified identifier for the secretVersion.
To set the
secret_versionattribute:- provide the argument
--bitbucket-data-center-config-webhook-secret-versionon thecommand line.
- provide the argument
- provide the argument
- ServiceDirectoryConfig represents Service Directory configuration for aconnection.
- Service resource - The Service Directory service name. Format:projects/{project}/locations/{location}/namespaces/{namespace}/services/{service}.This represents a Cloud resource. (NOTE) Some attributes are not given argumentsin this group but can be set in other ways.
To set the
projectattribute:- provide the argument
--bitbucket-data-center-config-service-directoryon the commandline with a fully specified name; - provide the argument
--projecton the command line; - set the property
core/project.
To set the
locationattribute:- provide the argument
--bitbucket-data-center-config-service-directoryon the commandline with a fully specified name; - provide the argument
--locationon the command line.
To set the
namespaceattribute:- provide the argument
--bitbucket-data-center-config-service-directoryon the commandline with a fully specified name; - provide the argument
--namespaceon the command line.
This must be specified.
--bitbucket-data-center-config-service-directory=BITBUCKET_DATA_CENTER_CONFIG_SERVICE_DIRECTORY- ID of the service or fully qualified identifier for the service.
To set the
serviceattribute:- provide the argument
--bitbucket-data-center-config-service-directoryon the commandline.
- provide the argument
- provide the argument
- Service resource - The Service Directory service name. Format:projects/{project}/locations/{location}/namespaces/{namespace}/services/{service}.This represents a Cloud resource. (NOTE) Some attributes are not given argumentsin this group but can be set in other ways.
--bitbucket-data-center-config-ssl-ca-certificate=BITBUCKET_DATA_CENTER_CONFIG_SSL_CA_CERTIFICATE- SSL certificate authority to trust when making requests to Bitbucket DataCenter.
- Represents a personal access token that authorized the Connection, andassociated metadata.
- Configuration for connections to github.com.
--github-config-app=GITHUB_CONFIG_APP- The GitHub Application that was installed to the GitHub user or organization.
GITHUB_CONFIG_APPmust be one of:developer-connect- The Developer Connect GitHub Application.
firebase- The Firebase GitHub Application.
gemini-code-assist- The Gemini Code Assist Application.
--github-config-app-installation-id=GITHUB_CONFIG_APP_INSTALLATION_ID- GitHub App installation id.
- Represents an OAuth token of the account that authorized the Connection, andassociated metadata.
- SecretVersion resource - A SecretManager resource containing the OAuth tokenthat authorizes the connection. Format:
projects/*/secrets/*/versions/*orprojects/*/locations/*/secrets/*/versions/*(if regional secretsare supported in that location). This represents a Cloud resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.To set the
projectattribute:- provide the argument
--github-config-authorizer-credential-oauth-token-secret-versiononthe command line with a fully specified name; - provide the argument
--projecton the command line; - set the property
core/project.
To set the
locationattribute:- provide the argument
--github-config-authorizer-credential-oauth-token-secret-versiononthe command line with a fully specified name; - provide the argument
--locationon the command line.
To set the
secretattribute:- provide the argument
--github-config-authorizer-credential-oauth-token-secret-versiononthe command line with a fully specified name; - provide the argument
--secreton the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].
This must be specified.
--github-config-authorizer-credential-oauth-token-secret-version=GITHUB_CONFIG_AUTHORIZER_CREDENTIAL_OAUTH_TOKEN_SECRET_VERSION- ID of the secretVersion or fully qualified identifier for the secretVersion.
To set the
secret_versionattribute:- provide the argument
--github-config-authorizer-credential-oauth-token-secret-versiononthe command line.
- provide the argument
- provide the argument
- SecretVersion resource - A SecretManager resource containing the OAuth tokenthat authorizes the connection. Format:
- Configuration for connections to an instance of GitHub Enterprise.
--github-enterprise-config-host-uri=GITHUB_ENTERPRISE_CONFIG_HOST_URI- The URI of the GitHub Enterprise host this connection is for.
This flag argument must be specified if any of the other arguments in this groupare specified.
--github-enterprise-config-app-id=GITHUB_ENTERPRISE_CONFIG_APP_ID- ID of the GitHub App created from the manifest.
--github-enterprise-config-app-installation-id=GITHUB_ENTERPRISE_CONFIG_APP_INSTALLATION_ID- ID of the installation of the GitHub App.
- SecretVersion resource - SecretManager resource containing the private key ofthe GitHub App, formatted as
projects/*/secrets/*/versions/*orprojects/*/locations/*/secrets/*/versions/*(if regional secretsare supported in that location). This represents a Cloud resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.To set the
projectattribute:- provide the argument
--github-enterprise-config-private-key-secret-versionon thecommand line with a fully specified name; - provide the argument
--projecton the command line; - set the property
core/project.
To set the
locationattribute:- provide the argument
--github-enterprise-config-private-key-secret-versionon thecommand line with a fully specified name; - provide the argument
--locationon the command line.
To set the
secretattribute:- provide the argument
--github-enterprise-config-private-key-secret-versionon thecommand line with a fully specified name; - provide the argument
--secreton the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].
--github-enterprise-config-private-key-secret-version=GITHUB_ENTERPRISE_CONFIG_PRIVATE_KEY_SECRET_VERSION- ID of the secretVersion or fully qualified identifier for the secretVersion.
To set the
secret_versionattribute:- provide the argument
--github-enterprise-config-private-key-secret-versionon thecommand line.
- provide the argument
- provide the argument
- ServiceDirectoryConfig represents Service Directory configuration for aconnection.
- Service resource - The Service Directory service name. Format:projects/{project}/locations/{location}/namespaces/{namespace}/services/{service}.This represents a Cloud resource. (NOTE) Some attributes are not given argumentsin this group but can be set in other ways.
To set the
projectattribute:- provide the argument
--github-enterprise-config-service-directoryon the command line with a fully specified name; - provide the argument
--projecton the command line; - set the property
core/project.
To set the
locationattribute:- provide the argument
--github-enterprise-config-service-directoryon the command line with a fully specified name; - provide the argument
--locationon the command line.
To set the
namespaceattribute:- provide the argument
--github-enterprise-config-service-directoryon the command line with a fully specified name; - provide the argument
--namespaceon the command line.
This must be specified.
--github-enterprise-config-service-directory=GITHUB_ENTERPRISE_CONFIG_SERVICE_DIRECTORY- ID of the service or fully qualified identifier for the service.
To set the
serviceattribute:- provide the argument
--github-enterprise-config-service-directoryon the command line.
- provide the argument
- provide the argument
- Service resource - The Service Directory service name. Format:projects/{project}/locations/{location}/namespaces/{namespace}/services/{service}.This represents a Cloud resource. (NOTE) Some attributes are not given argumentsin this group but can be set in other ways.
--github-enterprise-config-ssl-ca-certificate=GITHUB_ENTERPRISE_CONFIG_SSL_CA_CERTIFICATE- SSL certificate to use for requests to GitHub Enterprise.
- SecretVersion resource - SecretManager resource containing the webhook secret ofthe GitHub App, formatted as
projects/*/secrets/*/versions/*orprojects/*/locations/*/secrets/*/versions/*(if regional secretsare supported in that location). This represents a Cloud resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.To set the
projectattribute:- provide the argument
--github-enterprise-config-webhook-secret-versionon the commandline with a fully specified name; - provide the argument
--projecton the command line; - set the property
core/project.
To set the
locationattribute:- provide the argument
--github-enterprise-config-webhook-secret-versionon the commandline with a fully specified name; - provide the argument
--locationon the command line.
To set the
secretattribute:- provide the argument
--github-enterprise-config-webhook-secret-versionon the commandline with a fully specified name; - provide the argument
--secreton the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].
--github-enterprise-config-webhook-secret-version=GITHUB_ENTERPRISE_CONFIG_WEBHOOK_SECRET_VERSION- ID of the secretVersion or fully qualified identifier for the secretVersion.
To set the
secret_versionattribute:- provide the argument
--github-enterprise-config-webhook-secret-versionon the commandline.
- provide the argument
- provide the argument
- Configuration for connections to gitlab.com.
- Represents a personal access token that authorized the Connection, andassociated metadata.
This must be specified.
- SecretVersion resource - A SecretManager resource containing the user token thatauthorizes the Developer Connect connection. Format:
projects/*/secrets/*/versions/*orprojects/*/locations/*/secrets/*/versions/*(if regional secretsare supported in that location). This represents a Cloud resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.To set the
projectattribute:- provide the argument
--gitlab-config-authorizer-credential-user-token-secret-versiononthe command line with a fully specified name; - provide the argument
--projecton the command line; - set the property
core/project.
To set the
locationattribute:- provide the argument
--gitlab-config-authorizer-credential-user-token-secret-versiononthe command line with a fully specified name; - provide the argument
--locationon the command line.
To set the
secretattribute:- provide the argument
--gitlab-config-authorizer-credential-user-token-secret-versiononthe command line with a fully specified name; - provide the argument
--secreton the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].
This must be specified.
--gitlab-config-authorizer-credential-user-token-secret-version=GITLAB_CONFIG_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION- ID of the secretVersion or fully qualified identifier for the secretVersion.
To set the
secret_versionattribute:- provide the argument
--gitlab-config-authorizer-credential-user-token-secret-versiononthe command line.
- provide the argument
- provide the argument
- SecretVersion resource - A SecretManager resource containing the user token thatauthorizes the Developer Connect connection. Format:
- Represents a personal access token that authorized the Connection, andassociated metadata.
This must be specified.
- SecretVersion resource - A SecretManager resource containing the user token thatauthorizes the Developer Connect connection. Format:
projects/*/secrets/*/versions/*orprojects/*/locations/*/secrets/*/versions/*(if regional secretsare supported in that location). This represents a Cloud resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.To set the
projectattribute:- provide the argument
--gitlab-config-read-authorizer-credential-user-token-secret-versionon the command line with a fully specified name; - provide the argument
--projecton the command line; - set the property
core/project.
To set the
locationattribute:- provide the argument
--gitlab-config-read-authorizer-credential-user-token-secret-versionon the command line with a fully specified name; - provide the argument
--locationon the command line.
To set the
secretattribute:- provide the argument
--gitlab-config-read-authorizer-credential-user-token-secret-versionon the command line with a fully specified name; - provide the argument
--secreton the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].
This must be specified.
--gitlab-config-read-authorizer-credential-user-token-secret-version=GITLAB_CONFIG_READ_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION- ID of the secretVersion or fully qualified identifier for the secretVersion.
To set the
secret_versionattribute:- provide the argument
--gitlab-config-read-authorizer-credential-user-token-secret-versionon the command line.
- provide the argument
- provide the argument
- SecretVersion resource - A SecretManager resource containing the user token thatauthorizes the Developer Connect connection. Format:
- SecretVersion resource - SecretManager resource containing the webhook secret ofa GitLab project, formatted as
projects/*/secrets/*/versions/*orprojects/*/locations/*/secrets/*/versions/*(if regional secretsare supported in that location). This is used to validate webhooks. Thisrepresents a Cloud resource. (NOTE) Some attributes are not given arguments inthis group but can be set in other ways.To set the
projectattribute:- provide the argument
--gitlab-config-webhook-secret-versionon thecommand line with a fully specified name; - provide the argument
--projecton the command line; - set the property
core/project.
To set the
locationattribute:- provide the argument
--gitlab-config-webhook-secret-versionon thecommand line with a fully specified name; - provide the argument
--locationon the command line.
To set the
secretattribute:- provide the argument
--gitlab-config-webhook-secret-versionon thecommand line with a fully specified name; - provide the argument
--secreton the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].
This must be specified.
--gitlab-config-webhook-secret-version=GITLAB_CONFIG_WEBHOOK_SECRET_VERSION- ID of the secretVersion or fully qualified identifier for the secretVersion.
To set the
secret_versionattribute:- provide the argument
--gitlab-config-webhook-secret-versionon thecommand line.
- provide the argument
- provide the argument
- Represents a personal access token that authorized the Connection, andassociated metadata.
- Configuration for connections to an instance of GitLab Enterprise.
- Represents a personal access token that authorized the Connection, andassociated metadata.
This must be specified.
- SecretVersion resource - A SecretManager resource containing the user token thatauthorizes the Developer Connect connection. Format:
projects/*/secrets/*/versions/*orprojects/*/locations/*/secrets/*/versions/*(if regional secretsare supported in that location). This represents a Cloud resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.To set the
projectattribute:- provide the argument
--gitlab-enterprise-config-authorizer-credential-user-token-secret-versionon the command line with a fully specified name; - provide the argument
--projecton the command line; - set the property
core/project.
To set the
locationattribute:- provide the argument
--gitlab-enterprise-config-authorizer-credential-user-token-secret-versionon the command line with a fully specified name; - provide the argument
--locationon the command line.
To set the
secretattribute:- provide the argument
--gitlab-enterprise-config-authorizer-credential-user-token-secret-versionon the command line with a fully specified name; - provide the argument
--secreton the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].
This must be specified.
--gitlab-enterprise-config-authorizer-credential-user-token-secret-version=GITLAB_ENTERPRISE_CONFIG_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION- ID of the secretVersion or fully qualified identifier for the secretVersion.
To set the
secret_versionattribute:- provide the argument
--gitlab-enterprise-config-authorizer-credential-user-token-secret-versionon the command line.
- provide the argument
- provide the argument
- SecretVersion resource - A SecretManager resource containing the user token thatauthorizes the Developer Connect connection. Format:
--gitlab-enterprise-config-host-uri=GITLAB_ENTERPRISE_CONFIG_HOST_URI- The URI of the GitLab Enterprise host this connection is for.
- Represents a personal access token that authorized the Connection, andassociated metadata.
This must be specified.
- SecretVersion resource - A SecretManager resource containing the user token thatauthorizes the Developer Connect connection. Format:
projects/*/secrets/*/versions/*orprojects/*/locations/*/secrets/*/versions/*(if regional secretsare supported in that location). This represents a Cloud resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.To set the
projectattribute:- provide the argument
--gitlab-enterprise-config-read-authorizer-credential-user-token-secret-versionon the command line with a fully specified name; - provide the argument
--projecton the command line; - set the property
core/project.
To set the
locationattribute:- provide the argument
--gitlab-enterprise-config-read-authorizer-credential-user-token-secret-versionon the command line with a fully specified name; - provide the argument
--locationon the command line.
To set the
secretattribute:- provide the argument
--gitlab-enterprise-config-read-authorizer-credential-user-token-secret-versionon the command line with a fully specified name; - provide the argument
--secreton the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].
This must be specified.
--gitlab-enterprise-config-read-authorizer-credential-user-token-secret-version=GITLAB_ENTERPRISE_CONFIG_READ_AUTHORIZER_CREDENTIAL_USER_TOKEN_SECRET_VERSION- ID of the secretVersion or fully qualified identifier for the secretVersion.
To set the
secret_versionattribute:- provide the argument
--gitlab-enterprise-config-read-authorizer-credential-user-token-secret-versionon the command line.
- provide the argument
- provide the argument
- SecretVersion resource - A SecretManager resource containing the user token thatauthorizes the Developer Connect connection. Format:
- SecretVersion resource - SecretManager resource containing the webhook secret ofa GitLab project, formatted as
projects/*/secrets/*/versions/*orprojects/*/locations/*/secrets/*/versions/*(if regional secretsare supported in that location). This is used to validate webhooks. Thisrepresents a Cloud resource. (NOTE) Some attributes are not given arguments inthis group but can be set in other ways.To set the
projectattribute:- provide the argument
--gitlab-enterprise-config-webhook-secret-versionon the commandline with a fully specified name; - provide the argument
--projecton the command line; - set the property
core/project.
To set the
locationattribute:- provide the argument
--gitlab-enterprise-config-webhook-secret-versionon the commandline with a fully specified name; - provide the argument
--locationon the command line.
To set the
secretattribute:- provide the argument
--gitlab-enterprise-config-webhook-secret-versionon the commandline with a fully specified name; - provide the argument
--secreton the command line. This resourcecan be one of the following types:[developerconnect.projects.locations.secrets.versions,developerconnect.projects.secrets.versions].
This must be specified.
--gitlab-enterprise-config-webhook-secret-version=GITLAB_ENTERPRISE_CONFIG_WEBHOOK_SECRET_VERSION- ID of the secretVersion or fully qualified identifier for the secretVersion.
To set the
secret_versionattribute:- provide the argument
--gitlab-enterprise-config-webhook-secret-versionon the commandline.
- provide the argument
- provide the argument
- ServiceDirectoryConfig represents Service Directory configuration for aconnection.
- Service resource - The Service Directory service name. Format:projects/{project}/locations/{location}/namespaces/{namespace}/services/{service}.This represents a Cloud resource. (NOTE) Some attributes are not given argumentsin this group but can be set in other ways.
To set the
projectattribute:- provide the argument
--gitlab-enterprise-config-service-directoryon the command line with a fully specified name; - provide the argument
--projecton the command line; - set the property
core/project.
To set the
locationattribute:- provide the argument
--gitlab-enterprise-config-service-directoryon the command line with a fully specified name; - provide the argument
--locationon the command line.
To set the
namespaceattribute:- provide the argument
--gitlab-enterprise-config-service-directoryon the command line with a fully specified name; - provide the argument
--namespaceon the command line.
This must be specified.
--gitlab-enterprise-config-service-directory=GITLAB_ENTERPRISE_CONFIG_SERVICE_DIRECTORY- ID of the service or fully qualified identifier for the service.
To set the
serviceattribute:- provide the argument
--gitlab-enterprise-config-service-directoryon the command line.
- provide the argument
- provide the argument
- Service resource - The Service Directory service name. Format:projects/{project}/locations/{location}/namespaces/{namespace}/services/{service}.This represents a Cloud resource. (NOTE) Some attributes are not given argumentsin this group but can be set in other ways.
--gitlab-enterprise-config-ssl-ca-certificate=GITLAB_ENTERPRISE_CONFIG_SSL_CA_CERTIFICATE- SSL Certificate Authority certificate to use for requests to GitLab Enterpriseinstance.
- Represents a personal access token that authorized the Connection, andassociated metadata.
- Configuration for connections to an instance of Bitbucket Cloud.
- The crypto key configuration. This field is used by the Customer-managedencryption keys (CMEK) feature.
- CryptoKey resource - The name of the key which is used to encrypt/decryptcustomer data. For key in Cloud KMS, the key should be in the format of
projects/*/locations/*/keyRings/*/cryptoKeys/*. The arguments inthis group can be used to specify the attributes of this resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.To set the
projectattribute:- provide the argument
--crypto-key-config-referenceon the commandline with a fully specified name; - provide the argument
--projecton the command line; - set the property
core/project.
To set the
locationattribute:- provide the argument
--crypto-key-config-referenceon the commandline with a fully specified name; - provide the argument
--locationon the command line.
This must be specified.
--crypto-key-config-reference=CRYPTO_KEY_CONFIG_REFERENCE- ID of the cryptoKey or fully qualified identifier for the cryptoKey.
To set the
crypto-keyattribute:- provide the argument
--crypto-key-config-referenceon the commandline.
This flag argument must be specified if any of the other arguments in this groupare specified.
- provide the argument
--key-ring=KEY_RING- The keyRing id of the cryptoKey resource.
To set the
key-ringattribute:- provide the argument
--crypto-key-config-referenceon the commandline with a fully specified name; - provide the argument
--key-ringon the command line.
- provide the argument
- provide the argument
- CryptoKey resource - The name of the key which is used to encrypt/decryptcustomer data. For key in Cloud KMS, the key should be in the format of
- GCLOUD WIDE FLAGS
- These flags are available to all commands:
--access-token-file,--account,--billing-project,--configuration,--flags-file,--flatten,--format,--help,--impersonate-service-account,--log-http,--project,--quiet,--trace-token,--user-output-enabled,--verbosity.Run
$gcloud helpfor details. - API REFERENCE
- This command uses the
developerconnect/v1API. The fulldocumentation for this API can be found at:http://cloud.google.com/developer-connect/docs/overview - NOTES
- These variants are also available:
gcloudalphadeveloper-connectconnectionscreategcloudbetadeveloper-connectconnectionscreate
Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2025-12-09 UTC.