notificationintegration

package
v1.52.0 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Mar 7, 2024 License: Apache-2.0 Imports: 4 Imported by: 0

Documentation

Index

Constants

This section is empty.

Variables

View Source
var NotificationTriggers = struct {
	AttackCandidate NotificationTrigger
	SecurityProblem NotificationTrigger
}{
	"ATTACK_CANDIDATE",
	"SECURITY_PROBLEM",
}
View Source
var NotificationTypes = struct {
	Email   NotificationType
	Jira    NotificationType
	Webhook NotificationType
}{
	"EMAIL",
	"JIRA",
	"WEBHOOK",
}

Functions

This section is empty.

Types

type AttackCandidateBasedEmailPayload

type AttackCandidateBasedEmailPayload struct {
	Body    string `json:"body"`    // The template of the email notifications.  \nIn case a value of a security problem is not set, the placeholder will be replaced by an empty string.. **Note:** Security notifications contain sensitive information. Excessive usage of placeholders in the body might leak information to untrusted parties.  \n  \nAvailable placeholders:  \n**{AttackDisplayId}**: The unique identifier assigned by Dynatrace, for example: \"A-1234\".  \n**{Title}**: Location of the attack, for example: \"com.dynatrace.Class.method():120\"  \n**{Type}**: The type of attack, for example: \"SQL Injection\".  \n**{AttackUrl}**: URL of the attack in Dynatrace.  \n**{ProcessGroupId}**: Details about the process group attacked.  \n**{EntryPoint}**: The entry point of the attack into the process, for example: \"/login\". Can be empty.  \n**{Status}**: The status of the attack, for example: \"Exploited\"  \n**{Timestamp}**: When the attack happened.  \n**{VulnerabilityName}**: Name of the associated code-level vulnerability, for example: \"InMemoryDatabaseCaller.getAccountInfo():51\". Can be empty.
	Subject string `json:"subject"` // The subject of the email notifications.. Available placeholders:  \n**{AttackDisplayId}**: The unique identifier assigned by Dynatrace, for example, \"A-1234\".  \n**{Title}**: Location of the attack, for example: \"com.dynatrace.Class.method():120\"  \n**{Type}**: The type of attack, for example: \"SQL Injection\".  \n**{AttackUrl}**: URL of the attack in Dynatrace.  \n**{ProcessGroupId}**: Details about the process group attacked.  \n**{EntryPoint}**: The entry point of the attack into the process, for example: \"/login\". Can be empty.  \n**{Status}**: The status of the attack, for example: \"Exploited\"  \n**{Timestamp}**: When the attack happened.  \n**{VulnerabilityName}**: Name of the associated code-level vulnerability, for example: \"InMemoryDatabaseCaller.getAccountInfo():51\". Can be empty.
}

func (*AttackCandidateBasedEmailPayload) MarshalHCL

func (me *AttackCandidateBasedEmailPayload) MarshalHCL(properties hcl.Properties) error

func (*AttackCandidateBasedEmailPayload) Schema

func (*AttackCandidateBasedEmailPayload) UnmarshalHCL

func (me *AttackCandidateBasedEmailPayload) UnmarshalHCL(decoder hcl.Decoder) error

type AttackCandidateBasedJiraPayload

type AttackCandidateBasedJiraPayload struct {
	Description string `json:"description"` // The description of the Jira issue to be created by this notification.  \nIn case a value of an attack is not set, the placeholder will be replaced by an empty string.. **Note:** Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.  \n  \nAvailable placeholders:  \n**{AttackDisplayId}**: The unique identifier assigned by Dynatrace, for example: \"A-1234\".  \n**{Title}**: Location of the attack, for example: \"com.dynatrace.Class.method():120\"  \n**{Type}**: The type of attack, for example: \"SQL Injection\".  \n**{AttackUrl}**: URL of the attack in Dynatrace.  \n**{ProcessGroupId}**: Details about the process group attacked.  \n**{EntryPoint}**: The entry point of the attack into the process, for example: \"/login\". Can be empty.  \n**{Status}**: The status of the attack, for example: \"Exploited\"  \n**{Timestamp}**: When the attack happened.  \n**{VulnerabilityName}**: Name of the associated code-level vulnerability, for example: \"InMemoryDatabaseCaller.getAccountInfo():51\". Can be empty.
	Summary     string `json:"summary"`     // The summary of the Jira issue to be created by this notification.. **Note:** The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.  \n  \nAvailable placeholders:  \n**{AttackDisplayId}**: The unique identifier assigned by Dynatrace, for example, \"A-1234\".  \n**{Title}**: Location of the attack, for example: \"com.dynatrace.Class.method():120\"  \n**{Type}**: The type of attack, for example: \"SQL Injection\".  \n**{AttackUrl}**: URL of the attack in Dynatrace.  \n**{ProcessGroupId}**: Details about the process group attacked.  \n**{EntryPoint}**: The entry point of the attack into the process, for example: \"/login\". Can be empty.  \n**{Status}**: The status of the attack, for example: \"Exploited\"  \n**{Timestamp}**: When the attack happened.  \n**{VulnerabilityName}**: Name of the associated code-level vulnerability, for example: \"InMemoryDatabaseCaller.getAccountInfo():51\". Can be empty.
}

func (*AttackCandidateBasedJiraPayload) MarshalHCL

func (me *AttackCandidateBasedJiraPayload) MarshalHCL(properties hcl.Properties) error

func (*AttackCandidateBasedJiraPayload) Schema

func (*AttackCandidateBasedJiraPayload) UnmarshalHCL

func (me *AttackCandidateBasedJiraPayload) UnmarshalHCL(decoder hcl.Decoder) error

type AttackCandidateBasedWebhookPayload

type AttackCandidateBasedWebhookPayload struct {
	Payload string `json:"payload"` // This is the content your notification message will include when users view it.  \nIn case a value of an attack is not set, the placeholder will be replaced by an empty string.. **Note:** Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.  \n  \nAvailable placeholders:  \n**{AttackDisplayId}**: The unique identifier assigned by Dynatrace, for example: \"A-1234\".  \n**{Title}**: Location of the attack, for example: \"com.dynatrace.Class.method():120\"  \n**{Type}**: The type of attack, for example: \"SQL Injection\".  \n**{AttackUrl}**: URL of the attack in Dynatrace.  \n**{ProcessGroupId}**: Details about the process group attacked.  \n**{EntryPoint}**: The entry point of the attack into the process, for example: \"/login\". Can be empty.  \n**{Status}**: The status of the attack, for example: \"Exploited\"  \n**{Timestamp}**: When the attack happened.  \n**{VulnerabilityName}**: Name of the associated code-level vulnerability, for example: \"InMemoryDatabaseCaller.getAccountInfo():51\". Can be empty.
}

func (*AttackCandidateBasedWebhookPayload) MarshalHCL

func (me *AttackCandidateBasedWebhookPayload) MarshalHCL(properties hcl.Properties) error

func (*AttackCandidateBasedWebhookPayload) Schema

func (*AttackCandidateBasedWebhookPayload) UnmarshalHCL

func (me *AttackCandidateBasedWebhookPayload) UnmarshalHCL(decoder hcl.Decoder) error

type EmailConfiguration

type EmailConfiguration struct {
	BccRecipients []string `json:"bccRecipients,omitempty"` // BCC
	CcRecipients  []string `json:"ccRecipients,omitempty"`  // CC
	Recipients    []string `json:"recipients"`              // To
}

func (*EmailConfiguration) MarshalHCL

func (me *EmailConfiguration) MarshalHCL(properties hcl.Properties) error

func (*EmailConfiguration) Schema

func (me *EmailConfiguration) Schema() map[string]*schema.Schema

func (*EmailConfiguration) UnmarshalHCL

func (me *EmailConfiguration) UnmarshalHCL(decoder hcl.Decoder) error

type JiraConfiguration

type JiraConfiguration struct {
	ApiToken   string `json:"apiToken"`   // The API token for the Jira profile. Using password authentication [was deprecated by Jira](https://developer.atlassian.com/cloud/jira/platform/deprecation-notice-basic-auth-and-cookie-based-auth/)
	IssueType  string `json:"issueType"`  // The type of the Jira issue to be created by this notification.\n\nTo find all available issue types or create your own, in Jira, go to Project settings > Issue types.
	ProjectKey string `json:"projectKey"` // The project key of the Jira issue to be created by this notification.
	Url        string `json:"url"`        // The URL of the Jira API endpoint.
	Username   string `json:"username"`   // The username of the Jira profile.
}

func (*JiraConfiguration) MarshalHCL

func (me *JiraConfiguration) MarshalHCL(properties hcl.Properties) error

func (*JiraConfiguration) Schema

func (me *JiraConfiguration) Schema() map[string]*schema.Schema

func (*JiraConfiguration) UnmarshalHCL

func (me *JiraConfiguration) UnmarshalHCL(decoder hcl.Decoder) error

type NotificationTrigger

type NotificationTrigger string

type NotificationType

type NotificationType string

type SecurityProblemBasedEmailPayload

type SecurityProblemBasedEmailPayload struct {
	Body    string `json:"body"`    // The template of the email notifications.  \nIn case a value of a security problem is not set, the placeholder will be replaced by an empty string.. **Note:** Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.  \n  \nAvailable placeholders:  \n**{SecurityProblemId}**: The unique identifier assigned by Dynatrace, for example, \"S-1234\".  \n**{Title}**: A short summary of the type of vulnerability that was found, for example, \"Remote Code Execution\".  \n**{Description}**: A more detailed description of the vulnerability.  \n**{CvssScore}**: CVSS score of the identified vulnerability, for example, \"10.0\". Can be empty. \n**{DavisSecurityScore}**: [Davis Security Score](https://www.dynatrace.com/support/help/how-to-use-dynatrace/application-security/davis-security-score/) is an enhanced risk-calculation score based on the CVSS, for example, \"10.0\".  \n**{Severity}**: The security problem severity, for example, \"Critical\" or \"Medium\".  \n**{SecurityProblemUrl}**: URL of the security problem in Dynatrace.  \n**{AffectedEntities}**: Details about the entities affected by the security problem in a json array.  \n**{ManagementZones}**: Comma-separated list of all management zones affected by the vulnerability at the time of detection.  \n**{Tags}**: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: \"PROD, owner:John\". Assign the tag's key in square brackets: **{Tags[key]}** to get all associated values. For example: \"{Tags[owner]}\" will be resolved as \"John\". Tags without an assigned value will be resolved as empty string.  \n**{Exposed}**: Describes whether one or more affected process is exposed to the public Internet. Can be \"true\" or \"false\".  \n**{DataAssetsReachable}**: Describes whether one or more affected process can reach data assets. Can be \"true\" or \"false\".  \n**{ExploitAvailable}**: Describes whether there's an exploit available for the vulnerability. Can be \"true\" or \"false\".
	Subject string `json:"subject"` // The subject of the email notifications.. Available placeholders:  \n**{SecurityProblemId}**: The unique identifier assigned by Dynatrace, for example, \"S-1234\".  \n**{Title}**: A short summary of the type of vulnerability that was found, for example, \"Remote Code Execution\".  \n**{CvssScore}**: CVSS score of the identified vulnerability, for example, \"10.0\". Can be empty. \n**{DavisSecurityScore}**: [Davis Security Score](https://www.dynatrace.com/support/help/how-to-use-dynatrace/application-security/davis-security-score/) is an enhanced risk-calculation score based on the CVSS, for example, \"10.0\".  \n**{Severity}**: The security problem severity, for example, \"Critical\" or \"Medium\".  \n**{SecurityProblemUrl}**: URL of the security problem in Dynatrace.  \n**{Exposed}**: Describes whether one or more affected process is exposed to the public Internet. Can be \"true\" or \"false\".  \n**{DataAssetsReachable}**: Describes whether one or more affected process can reach data assets. Can be \"true\" or \"false\".  \n**{ExploitAvailable}**: Describes whether there's an exploit available for the vulnerability. Can be \"true\" or \"false\".
}

func (*SecurityProblemBasedEmailPayload) MarshalHCL

func (me *SecurityProblemBasedEmailPayload) MarshalHCL(properties hcl.Properties) error

func (*SecurityProblemBasedEmailPayload) Schema

func (*SecurityProblemBasedEmailPayload) UnmarshalHCL

func (me *SecurityProblemBasedEmailPayload) UnmarshalHCL(decoder hcl.Decoder) error

type SecurityProblemBasedJiraPayload

type SecurityProblemBasedJiraPayload struct {
	Description string `json:"description"` // The description of the Jira issue to be created by this notification.  \nIn case a value of a security problem is not set, the placeholder will be replaced by an empty string.. **Note:** Security notifications contain sensitive information. Excessive usage of placeholders in the description might leak information to untrusted parties.  \n  \nAvailable placeholders:  \n**{SecurityProblemId}**: The unique identifier assigned by Dynatrace, for example, \"S-1234\".  \n**{Title}**: A short summary of the type of vulnerability that was found, for example, \"Remote Code Execution\".  \n**{Description}**: A more detailed description of the vulnerability.  \n**{CvssScore}**: CVSS score of the identified vulnerability, for example, \"10.0\". Can be empty. \n**{DavisSecurityScore}**: [Davis Security Score](https://www.dynatrace.com/support/help/how-to-use-dynatrace/application-security/davis-security-score/) is an enhanced risk-calculation score based on the CVSS, for example, \"10.0\".  \n**{Severity}**: The security problem severity, for example, \"Critical\" or \"Medium\".  \n**{SecurityProblemUrl}**: URL of the security problem in Dynatrace.  \n**{AffectedEntities}**: Details about the entities affected by the security problem in a json array.  \n**{ManagementZones}**: Comma-separated list of all management zones affected by the vulnerability at the time of detection.  \n**{Tags}**: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: \"PROD, owner:John\". Assign the tag's key in square brackets: **{Tags[key]}** to get all associated values. For example: \"{Tags[owner]}\" will be resolved as \"John\". Tags without an assigned value will be resolved as empty string.  \n**{Exposed}**: Describes whether one or more affected process is exposed to the public Internet. Can be \"true\" or \"false\".  \n**{DataAssetsReachable}**: Describes whether one or more affected process can reach data assets. Can be \"true\" or \"false\".  \n**{ExploitAvailable}**: Describes whether there's an exploit available for the vulnerability. Can be \"true\" or \"false\".
	Summary     string `json:"summary"`     // The summary of the Jira issue to be created by this notification.. **Note:** The Jira summary field must contain less than 255 characters. Any content exceeding this limit after evaluating the placeholders will be discarded.  \n  \nAvailable placeholders:  \n**{SecurityProblemId}**: The unique identifier assigned by Dynatrace, for example, \"S-1234\".  \n**{Title}**: A short summary of the type of vulnerability that was found, for example, \"Remote Code Execution\".  \n**{CvssScore}**: CVSS score of the identified vulnerability, for example, \"10.0\". Can be empty. \n**{DavisSecurityScore}**: [Davis Security Score](https://www.dynatrace.com/support/help/how-to-use-dynatrace/application-security/davis-security-score/) is an enhanced risk-calculation score based on the CVSS, for example, \"10.0\".  \n**{Severity}**: The security problem severity, for example, \"Critical\" or \"Medium\".  \n**{SecurityProblemUrl}**: URL of the security problem in Dynatrace.  \n**{Exposed}**: Describes whether one or more affected process is exposed to the public Internet. Can be \"true\" or \"false\".  \n**{DataAssetsReachable}**: Describes whether one or more affected process can reach data assets. Can be \"true\" or \"false\".  \n**{ExploitAvailable}**: Describes whether there's an exploit available for the vulnerability. Can be \"true\" or \"false\".
}

func (*SecurityProblemBasedJiraPayload) MarshalHCL

func (me *SecurityProblemBasedJiraPayload) MarshalHCL(properties hcl.Properties) error

func (*SecurityProblemBasedJiraPayload) Schema

func (*SecurityProblemBasedJiraPayload) UnmarshalHCL

func (me *SecurityProblemBasedJiraPayload) UnmarshalHCL(decoder hcl.Decoder) error

type SecurityProblemBasedWebhookPayload

type SecurityProblemBasedWebhookPayload struct {
	Payload string `json:"payload"` // This is the content your notification message will include when users view it.  \nIn case a value of a security problem is not set, the placeholder will be replaced by an empty string.. **Note:** Security notifications contain sensitive information. Excessive usage of placeholders in the custom payload might leak information to untrusted parties.  \n  \nAvailable placeholders:  \n**{SecurityProblemId}**: The unique identifier assigned by Dynatrace, for example, \"S-1234\".  \n**{Title}**: A short summary of the type of vulnerability that was found, for example, \"Remote Code Execution\".  \n**{Description}**: A more detailed description of the vulnerability.  \n**{CvssScore}**: CVSS score of the identified vulnerability, for example, \"10.0\". Can be empty. \n**{DavisSecurityScore}**: [Davis Security Score](https://www.dynatrace.com/support/help/how-to-use-dynatrace/application-security/davis-security-score/) is an enhanced risk-calculation score based on the CVSS, for example, \"10.0\".  \n**{Severity}**: The security problem severity, for example, \"Critical\" or \"Medium\".  \n**{SecurityProblemUrl}**: URL of the security problem in Dynatrace.  \n**{AffectedEntities}**: Details about the entities affected by the security problem in a json array.  \n**{ManagementZones}**: Comma-separated list of all management zones affected by the vulnerability at the time of detection.  \n**{Tags}**: Comma-separated list of tags that are defined for a vulnerability's affected entities. For example: \"PROD, owner:John\". Assign the tag's key in square brackets: **{Tags[key]}** to get all associated values. For example: \"{Tags[owner]}\" will be resolved as \"John\". Tags without an assigned value will be resolved as empty string.  \n**{Exposed}**: Describes whether one or more affected process is exposed to the public Internet. Can be \"true\" or \"false\".  \n**{DataAssetsReachable}**: Describes whether one or more affected process can reach data assets. Can be \"true\" or \"false\".  \n**{ExploitAvailable}**: Describes whether there's an exploit available for the vulnerability. Can be \"true\" or \"false\".
}

func (*SecurityProblemBasedWebhookPayload) MarshalHCL

func (me *SecurityProblemBasedWebhookPayload) MarshalHCL(properties hcl.Properties) error

func (*SecurityProblemBasedWebhookPayload) Schema

func (*SecurityProblemBasedWebhookPayload) UnmarshalHCL

func (me *SecurityProblemBasedWebhookPayload) UnmarshalHCL(decoder hcl.Decoder) error

type Settings

type Settings struct {
	AttackCandidateBasedAlertingProfile *string                             `json:"attackCandidateBasedAlertingProfile,omitempty"` // For attack candidate alerts, select an [alerting profile](/ui/settings/builtin:appsec.notification-attack-alerting-profile) to control the delivery of security notifications related to this integration.
	AttackCandidateBasedEmailPayload    *AttackCandidateBasedEmailPayload   `json:"attackCandidateBasedEmailPayload,omitempty"`    // Attack candidate based email payload, required when `trigger` equals `ATTACK_CANDIDATE` and `type` equals `EMAIL`
	AttackCandidateBasedJiraPayload     *AttackCandidateBasedJiraPayload    `json:"attackCandidateBasedJiraPayload,omitempty"`     // Attack candidate based Jira payload, required when `trigger` equals `ATTACK_CANDIDATE` and `type` equals `JIRA`
	AttackCandidateBasedWebhookPayload  *AttackCandidateBasedWebhookPayload `json:"attackCandidateBasedWebhookPayload,omitempty"`  // Attack candidate based webhook payload, required when `trigger` equals `ATTACK_CANDIDATE` and `type` equals `WEBHOOK`
	DisplayName                         string                              `json:"displayName"`                                   // Display name of the security notification
	EmailConfiguration                  *EmailConfiguration                 `json:"emailConfiguration,omitempty"`                  // Email configuration, required when `type` equals `EMAIL`
	Enabled                             bool                                `json:"enabled"`                                       // Enable/Disable the security notification, enabled (`true`) or disabled (`false`)
	JiraConfiguration                   *JiraConfiguration                  `json:"jiraConfiguration,omitempty"`                   // Jira configuration, required when `type` equals `JIRA`
	SecurityProblemBasedAlertingProfile *string                             `json:"securityProblemBasedAlertingProfile,omitempty"` // For security problem alerts, select an [alerting profile](/ui/settings/builtin:appsec.notification-alerting-profile) to control the delivery of security notifications related to this integration.
	SecurityProblemBasedEmailPayload    *SecurityProblemBasedEmailPayload   `json:"securityProblemBasedEmailPayload,omitempty"`    // Security problem based email payload, required when `trigger` equals `SECURITY_PROBLEM` and `type` equals `EMAIL`
	SecurityProblemBasedJiraPayload     *SecurityProblemBasedJiraPayload    `json:"securityProblemBasedJiraPayload,omitempty"`     // Security problem based Jira payload, required when `trigger` equals `SECURITY_PROBLEM` and `type` equals `JIRA`
	SecurityProblemBasedWebhookPayload  *SecurityProblemBasedWebhookPayload `json:"securityProblemBasedWebhookPayload,omitempty"`  // Security problem based webhook payload, required when `trigger` equals `SECURITY_PROBLEM` and `type` equals `WEBHOOK`
	Trigger                             NotificationTrigger                 `json:"trigger"`                                       // Security alert type, possible Values: `ATTACK_CANDIDATE`, `SECURITY_PROBLEM`
	Type                                NotificationType                    `json:"type"`                                          // Notification type, possible Values: `EMAIL`, `JIRA`, `WEBHOOK`
	WebhookConfiguration                *WebhookConfiguration               `json:"webhookConfiguration,omitempty"`                // Webhook configuration, required when `type` equals `WEBHOOK`
}

func (*Settings) HandlePreconditions

func (me *Settings) HandlePreconditions() error

func (*Settings) MarshalHCL

func (me *Settings) MarshalHCL(properties hcl.Properties) error

func (*Settings) Schema

func (me *Settings) Schema() map[string]*schema.Schema

func (*Settings) UnmarshalHCL

func (me *Settings) UnmarshalHCL(decoder hcl.Decoder) error

type WebhookConfiguration

type WebhookConfiguration struct {
	AcceptAnyCertificate bool                        `json:"acceptAnyCertificate"` // Accept any SSL certificate (including self-signed and invalid certificates)
	Headers              WebhookConfigurationHeaders `json:"headers,omitempty"`    // Use additional HTTP headers to attach any additional information, for example, configuration, authorization, or metadata.  \n  \nNote that JSON-based webhook endpoints require the addition of the **Content-Type: application/json** header to enable escaping of special characters and to avoid malformed JSON content.
	Url                  string                      `json:"url"`                  // Webhook endpoint URL
}

func (*WebhookConfiguration) MarshalHCL

func (me *WebhookConfiguration) MarshalHCL(properties hcl.Properties) error

func (*WebhookConfiguration) Schema

func (me *WebhookConfiguration) Schema() map[string]*schema.Schema

func (*WebhookConfiguration) UnmarshalHCL

func (me *WebhookConfiguration) UnmarshalHCL(decoder hcl.Decoder) error

type WebhookConfigurationHeader

type WebhookConfigurationHeader struct {
	Name        string  `json:"name"`
	Secret      bool    `json:"secret"`                // Secret HTTP header value
	SecretValue *string `json:"secretValue,omitempty"` // The secret value of the HTTP header. May contain an empty value.
	Value       *string `json:"value,omitempty"`       // The value of the HTTP header. May contain an empty value.
}

func (*WebhookConfigurationHeader) HandlePreconditions

func (me *WebhookConfigurationHeader) HandlePreconditions() error

func (*WebhookConfigurationHeader) MarshalHCL

func (me *WebhookConfigurationHeader) MarshalHCL(properties hcl.Properties) error

func (*WebhookConfigurationHeader) Schema

func (me *WebhookConfigurationHeader) Schema() map[string]*schema.Schema

func (*WebhookConfigurationHeader) UnmarshalHCL

func (me *WebhookConfigurationHeader) UnmarshalHCL(decoder hcl.Decoder) error

type WebhookConfigurationHeaders

type WebhookConfigurationHeaders []*WebhookConfigurationHeader

func (WebhookConfigurationHeaders) MarshalHCL

func (me WebhookConfigurationHeaders) MarshalHCL(properties hcl.Properties) error

func (*WebhookConfigurationHeaders) Schema

func (me *WebhookConfigurationHeaders) Schema() map[string]*schema.Schema

func (*WebhookConfigurationHeaders) UnmarshalHCL

func (me *WebhookConfigurationHeaders) UnmarshalHCL(decoder hcl.Decoder) error

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL