Skip to content

Connectors

A connector is an MCP server that the Nimbus Gateway spawns on demand to fetch data from a third-party service. Each connector handles its own authentication (OAuth PKCE or a stored API key / PAT), exposes the standard list / get / search tool surface (write tools such as create, update, move, and delete are available on some connectors but are always gated by HITL consent), and writes its results into your local SQLite index. The Gateway never calls cloud APIs directly — every cloud touchpoint goes through a connector process.


The table below covers every connector that ships in the current release. The Sync interval column shows the default cadence; you can override it per connector in Settings → Connectors (minimum 60 s, enforced inline). The Auth column summarises how credentials are stored — all of them end up in the OS-native Vault (DPAPI on Windows, Keychain on macOS, libsecret on Linux) and are never written to disk in plaintext.

ServiceDefault syncAuthPer-connector docs
Google Drive30 minOAuth PKCE (Google)Connectors overview
Gmail5 minOAuth PKCE (Google)Connectors overview
Google Photos6 hOAuth PKCE (Google)Connectors overview
OneDrive30 minOAuth PKCE (Microsoft)Connectors overview
Outlook5 minOAuth PKCE (Microsoft)Connectors overview
ServiceDefault syncAuthPer-connector docs
Slack5 minOAuth PKCE (Slack)Connectors overview
Microsoft Teams5 minOAuth PKCE (Microsoft)Connectors overview
Discord5 minBot token (opt-in)Connectors overview
ServiceDefault syncAuthPer-connector docs
GitHub1 minPersonal Access Token (PAT)Connectors overview
GitLab1 minPersonal Access Token (PAT)Connectors overview
Bitbucket1 minApp password (username + token)Connectors overview
ServiceDefault syncAuthPer-connector docs
Linear1 minAPI keyConnectors overview
Jira1 minEmail + API token + base URLConnectors overview
Notion5 minOAuth PKCE (Notion)Connectors overview
Confluence10 minEmail + API token + base URLConnectors overview
ServiceDefault syncAuthPer-connector docs
GitHub Actions1 minSame PAT as GitHubConnectors overview
GitLab CI1 minSame PAT as GitLabConnectors overview
CircleCI90 sPersonal API tokenConnectors overview
Jenkins2 minBase URL + username + API tokenConnectors overview
ServiceDefault syncAuthPer-connector docs
Grafana2 minBase URL + API tokenConnectors overview
Sentry2 minAuth token + org slugConnectors overview
New Relic2 minUser API key + account IDConnectors overview
Datadog2 minAPI key + application keyConnectors overview
ServiceDefault syncAuthPer-connector docs
Kubernetes2 minkubeconfig file pathConnectors overview
AWS2 minAccess key + secret + region (or named profile)Connectors overview
Azure2 minService principal (tenant + client ID + secret)Connectors overview
GCP2 minService account JSON key pathConnectors overview
IaC (Terraform / Pulumi)2 minOpt-in for local CLI detectionConnectors overview
ServiceDefault syncAuthPer-connector docs
PagerDuty2 minREST API tokenConnectors overview
ServiceDefault syncAuthPer-connector docs
FilesystemOn changeNone (opt-in via [[filesystem.roots]])Connectors overview

The filesystem connector is disabled by default. Enable it by adding one or more [[filesystem.roots]] blocks to nimbus.toml.


Nimbus follows a strict credential-injection model:

  1. You authenticate a service via nimbus connector auth <service> (or Settings → Connectors → Connect). Nimbus runs the OAuth PKCE flow in a browser window or prompts you for a PAT / API key at the terminal.
  2. The Gateway stores the credential in the OS-native Vault under a service-scoped key. No credential is ever written to disk in plaintext or included in a log line.
  3. When the Gateway spawns a connector process, it reads the credential from the Vault and injects it as an environment variable into the connector’s process environment. The connector reads process.env — it has no Vault access of its own.
  4. When you switch profiles, Nimbus re-binds the Vault namespace for the new profile and re-spawns each connector with the correct credentials.

Every connector reports one of six health states:

StateMeaning
healthyLast sync succeeded within the expected window.
degradedSync is failing intermittently; partial data may be stale.
errorSync has failed enough times to reach the error threshold.
rate_limitedThe upstream API returned a rate-limit response; connector is backing off.
unauthenticatedThe stored token is expired or missing; re-auth required.
pausedConnector is manually paused or waiting for a scheduled window.

The Tauri app tray reflects the worst state across all connectors. The CLI shows per-connector state:

nimbus connector list
github healthy last sync 43s ago
gitlab healthy last sync 1m ago
slack degraded last sync 11m ago (rate limited, retrying in 4m)
jira unauthenticated → re-auth: nimbus connector auth jira

Each connector runs on its default sync cadence (shown in the tables above). Connectors that support delta APIs — Google Drive, Gmail, OneDrive, Outlook — only fetch changes since the last sync token, so each incremental sync is fast regardless of the total corpus size.

Override the interval per connector in Settings → Connectors — click the connector row and adjust the interval field. The minimum is 60 seconds, enforced inline; you cannot set a shorter cadence.


See Connect your first service for the full OAuth flow walkthrough, including how to handle the browser redirect on Windows and WSL.


Go to Settings → Connectors, click the connector row, and choose Remove. The remove action is HITL-gated — you will be prompted to approve it before anything is deleted. On approval, Nimbus:

  1. Removes the connector’s Vault credentials (OAuth tokens or API keys).
  2. Deletes all indexed items that came from that service.
  3. Removes the connector’s sync state and scheduler entry.

The action is logged in the audit log and can be reviewed with nimbus audit verify.