Initiates an OAuth flow for an asset source type that supports OAuth (e.g
Generates a per-request state-bound authorization URL for a source type whose descriptor (see `GET /assets:sourceTypes`) advertises OAuth support. The frontend opens the URL in a popup; on completion the OAuth callback redirects to a success page carrying a single-use credential key that must be exchanged via `GET /assets:oauthCredentials`. Returns 400 for source types that do not support OAuth.
Authorization
Bearer JWT Authorization header using the Bearer scheme. Enter 'Bearer' [space] and then your token.
In: header
Path Parameters
The tenant identifier
The source type to authorize.
The asset source type (e.g. "google_drive").
1 <= lengthResponse Body
curl -X POST "https://api.fruxon.com/v1/tenants/string/assets:authorize" \ -H "Content-Type: application/json" \ -d '{ "sourceType": "string" }'{
"authorizationUrl": "string"
}{
"type": "string",
"title": "string",
"status": 0,
"detail": "string",
"instance": "string",
"property1": null,
"property2": null
}Gets a single ingestion operation by ID.
Returns the full state of one operation: progress counters, error details if it failed, and computed embedding cost based on the asset's current pricing. This is the endpoint that clients should poll after `POST /assets`, `POST /assets:file`, or `POST /assets/{asset}:refresh` to detect completion. Polling cadence of a few seconds is appropriate; the underlying record is updated in place as workers make progress.
Deletes an asset and its indexed documents from the RAG service.
Removes the asset record, its RAG-side index (documents and chunks), and any auto-registered webhook. The operation is synchronous from the caller's perspective but cascades into the RAG service, so in-flight ingestion operations for this asset will fail. Idempotent at the API surface: deleting an already-removed asset returns 404. Any agents that reference the asset will lose access to its knowledge after this call.