Skip to content

Commit d0b5742

Browse files
chore(dataproc): update the api
1 parent 91ad297 commit d0b5742

16 files changed

+191
-191
lines changed

docs/dyn/dataproc_v1.projects.locations.autoscalingPolicies.html

Lines changed: 3 additions & 3 deletions
Large diffs are not rendered by default.

docs/dyn/dataproc_v1.projects.locations.workflowTemplates.html

Lines changed: 52 additions & 52 deletions
Large diffs are not rendered by default.

docs/dyn/dataproc_v1.projects.regions.autoscalingPolicies.html

Lines changed: 3 additions & 3 deletions
Large diffs are not rendered by default.

docs/dyn/dataproc_v1.projects.regions.clusters.html

Lines changed: 39 additions & 39 deletions
Large diffs are not rendered by default.

docs/dyn/dataproc_v1.projects.regions.jobs.html

Lines changed: 3 additions & 3 deletions
Large diffs are not rendered by default.

docs/dyn/dataproc_v1.projects.regions.operations.html

Lines changed: 3 additions & 3 deletions
Large diffs are not rendered by default.

docs/dyn/dataproc_v1.projects.regions.workflowTemplates.html

Lines changed: 52 additions & 52 deletions
Large diffs are not rendered by default.

docs/dyn/dataproc_v1beta2.projects.locations.autoscalingPolicies.html

Lines changed: 3 additions & 3 deletions
Large diffs are not rendered by default.

docs/dyn/dataproc_v1beta2.projects.locations.workflowTemplates.html

Lines changed: 3 additions & 3 deletions
Large diffs are not rendered by default.

docs/dyn/dataproc_v1beta2.projects.regions.autoscalingPolicies.html

Lines changed: 3 additions & 3 deletions
Large diffs are not rendered by default.

docs/dyn/dataproc_v1beta2.projects.regions.clusters.html

Lines changed: 3 additions & 3 deletions
Large diffs are not rendered by default.

docs/dyn/dataproc_v1beta2.projects.regions.jobs.html

Lines changed: 3 additions & 3 deletions
Large diffs are not rendered by default.

docs/dyn/dataproc_v1beta2.projects.regions.operations.html

Lines changed: 3 additions & 3 deletions
Large diffs are not rendered by default.

docs/dyn/dataproc_v1beta2.projects.regions.workflowTemplates.html

Lines changed: 3 additions & 3 deletions
Large diffs are not rendered by default.

googleapiclient/discovery_cache/documents/dataproc.v1.json

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"oauth2": {
44
"scopes": {
55
"https://www.googleapis.com/auth/cloud-platform": {
6-
"description": "See, edit, configure, and delete your Google Cloud Platform data"
6+
"description": "See, edit, configure, and delete your Google Cloud data and see the email address for your Google Account."
77
}
88
}
99
}
@@ -2301,7 +2301,7 @@
23012301
}
23022302
}
23032303
},
2304-
"revision": "20210715",
2304+
"revision": "20210812",
23052305
"rootUrl": "https://dataproc.googleapis.com/",
23062306
"schemas": {
23072307
"AcceleratorConfig": {
@@ -2490,7 +2490,7 @@
24902490
"type": "object"
24912491
},
24922492
"Cluster": {
2493-
"description": "Describes the identifying information, config, and status of a cluster of Compute Engine instances.",
2493+
"description": "Describes the identifying information, config, and status of a Dataproc cluster",
24942494
"id": "Cluster",
24952495
"properties": {
24962496
"clusterName": {
@@ -2504,7 +2504,7 @@
25042504
},
25052505
"config": {
25062506
"$ref": "ClusterConfig",
2507-
"description": "Required. The cluster config. Note that Dataproc may set default values, and values may change when clusters are updated."
2507+
"description": "Optional. The cluster config for a cluster of Compute Engine Instances. Note that Dataproc may set default values, and values may change when clusters are updated."
25082508
},
25092509
"labels": {
25102510
"additionalProperties": {
@@ -2547,7 +2547,7 @@
25472547
"description": "Optional. Autoscaling config for the policy associated with the cluster. Cluster does not autoscale if this field is unset."
25482548
},
25492549
"configBucket": {
2550-
"description": "Optional. A Cloud Storage bucket used to stage job dependencies, config files, and job driver console output. If you do not specify a staging bucket, Cloud Dataproc will determine a Cloud Storage location (US, ASIA, or EU) for your cluster's staging bucket according to the Compute Engine zone where your cluster is deployed, and then create and manage this project-level, per-location bucket (see Dataproc staging bucket (https://cloud.google.com/dataproc/docs/concepts/configuring-clusters/staging-bucket)). This field requires a Cloud Storage bucket name, not a URI to a Cloud Storage bucket.",
2550+
"description": "Optional. A Cloud Storage bucket used to stage job dependencies, config files, and job driver console output. If you do not specify a staging bucket, Cloud Dataproc will determine a Cloud Storage location (US, ASIA, or EU) for your cluster's staging bucket according to the Compute Engine zone where your cluster is deployed, and then create and manage this project-level, per-location bucket (see Dataproc staging and temp buckets (https://cloud.google.com/dataproc/docs/concepts/configuring-clusters/staging-bucket)). This field requires a Cloud Storage bucket name, not a gs://... URI to a Cloud Storage bucket.",
25512551
"type": "string"
25522552
},
25532553
"encryptionConfig": {
@@ -2579,31 +2579,31 @@
25792579
},
25802580
"masterConfig": {
25812581
"$ref": "InstanceGroupConfig",
2582-
"description": "Optional. The Compute Engine config settings for the master instance in a cluster."
2582+
"description": "Optional. The Compute Engine config settings for the cluster's master instance."
25832583
},
25842584
"metastoreConfig": {
25852585
"$ref": "MetastoreConfig",
25862586
"description": "Optional. Metastore configuration."
25872587
},
25882588
"secondaryWorkerConfig": {
25892589
"$ref": "InstanceGroupConfig",
2590-
"description": "Optional. The Compute Engine config settings for additional worker instances in a cluster."
2590+
"description": "Optional. The Compute Engine config settings for a cluster's secondary worker instances"
25912591
},
25922592
"securityConfig": {
25932593
"$ref": "SecurityConfig",
25942594
"description": "Optional. Security settings for the cluster."
25952595
},
25962596
"softwareConfig": {
25972597
"$ref": "SoftwareConfig",
2598-
"description": "Optional. The config settings for software inside the cluster."
2598+
"description": "Optional. The config settings for cluster software."
25992599
},
26002600
"tempBucket": {
2601-
"description": "Optional. A Cloud Storage bucket used to store ephemeral cluster and jobs data, such as Spark and MapReduce history files. If you do not specify a temp bucket, Dataproc will determine a Cloud Storage location (US, ASIA, or EU) for your cluster's temp bucket according to the Compute Engine zone where your cluster is deployed, and then create and manage this project-level, per-location bucket. The default bucket has a TTL of 90 days, but you can use any TTL (or none) if you specify a bucket. This field requires a Cloud Storage bucket name, not a URI to a Cloud Storage bucket.",
2601+
"description": "Optional. A Cloud Storage bucket used to store ephemeral cluster and jobs data, such as Spark and MapReduce history files. If you do not specify a temp bucket, Dataproc will determine a Cloud Storage location (US, ASIA, or EU) for your cluster's temp bucket according to the Compute Engine zone where your cluster is deployed, and then create and manage this project-level, per-location bucket. The default bucket has a TTL of 90 days, but you can use any TTL (or none) if you specify a bucket (see Dataproc staging and temp buckets (https://cloud.google.com/dataproc/docs/concepts/configuring-clusters/staging-bucket)). This field requires a Cloud Storage bucket name, not a gs://... URI to a Cloud Storage bucket.",
26022602
"type": "string"
26032603
},
26042604
"workerConfig": {
26052605
"$ref": "InstanceGroupConfig",
2606-
"description": "Optional. The Compute Engine config settings for worker instances in a cluster."
2606+
"description": "Optional. The Compute Engine config settings for the cluster's worker instances."
26072607
}
26082608
},
26092609
"type": "object"
@@ -3042,7 +3042,7 @@
30423042
"type": "object"
30433043
},
30443044
"GkeClusterConfig": {
3045-
"description": "The GKE config for this cluster.",
3045+
"description": "The cluster's GKE config.",
30463046
"id": "GkeClusterConfig",
30473047
"properties": {
30483048
"namespacedGkeDeploymentTarget": {
@@ -4041,7 +4041,7 @@
40414041
"type": "object"
40424042
},
40434043
"Policy": {
4044-
"description": "An Identity and Access Management (IAM) policy, which specifies access controls for Google Cloud resources.A Policy is a collection of bindings. A binding binds one or more members to a single role. Members can be user accounts, service accounts, Google groups, and domains (such as G Suite). A role is a named list of permissions; each role can be an IAM predefined role or a user-created custom role.For some types of Google Cloud resources, a binding can also specify a condition, which is a logical expression that allows access to a resource only if the expression evaluates to true. A condition can add constraints based on attributes of the request, the resource, or both. To learn which resources support conditions in their IAM policies, see the IAM documentation (https://cloud.google.com/iam/help/conditions/resource-policies).JSON example: { \"bindings\": [ { \"role\": \"roles/resourcemanager.organizationAdmin\", \"members\": [ \"user:[email protected]\", \"group:[email protected]\", \"domain:google.com\", \"serviceAccount:[email protected]\" ] }, { \"role\": \"roles/resourcemanager.organizationViewer\", \"members\": [ \"user:[email protected]\" ], \"condition\": { \"title\": \"expirable access\", \"description\": \"Does not grant access after Sep 2020\", \"expression\": \"request.time < timestamp('2020-10-01T00:00:00.000Z')\", } } ], \"etag\": \"BwWWja0YfJA=\", \"version\": 3 } YAML example: bindings: - members: - user:[email protected] - group:[email protected] - domain:google.com - serviceAccount:[email protected] role: roles/resourcemanager.organizationAdmin - members: - user:[email protected] role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') - etag: BwWWja0YfJA= - version: 3 For a description of IAM and its features, see the IAM documentation (https://cloud.google.com/iam/docs/).",
4044+
"description": "An Identity and Access Management (IAM) policy, which specifies access controls for Google Cloud resources.A Policy is a collection of bindings. A binding binds one or more members to a single role. Members can be user accounts, service accounts, Google groups, and domains (such as G Suite). A role is a named list of permissions; each role can be an IAM predefined role or a user-created custom role.For some types of Google Cloud resources, a binding can also specify a condition, which is a logical expression that allows access to a resource only if the expression evaluates to true. A condition can add constraints based on attributes of the request, the resource, or both. To learn which resources support conditions in their IAM policies, see the IAM documentation (https://cloud.google.com/iam/help/conditions/resource-policies).JSON example: { \"bindings\": [ { \"role\": \"roles/resourcemanager.organizationAdmin\", \"members\": [ \"user:[email protected]\", \"group:[email protected]\", \"domain:google.com\", \"serviceAccount:[email protected]\" ] }, { \"role\": \"roles/resourcemanager.organizationViewer\", \"members\": [ \"user:[email protected]\" ], \"condition\": { \"title\": \"expirable access\", \"description\": \"Does not grant access after Sep 2020\", \"expression\": \"request.time < timestamp('2020-10-01T00:00:00.000Z')\", } } ], \"etag\": \"BwWWja0YfJA=\", \"version\": 3 } YAML example: bindings: - members: - user:[email protected] - group:[email protected] - domain:google.com - serviceAccount:[email protected] role: roles/resourcemanager.organizationAdmin - members: - user:[email protected] role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a description of IAM and its features, see the IAM documentation (https://cloud.google.com/iam/docs/).",
40454045
"id": "Policy",
40464046
"properties": {
40474047
"bindings": {

googleapiclient/discovery_cache/documents/dataproc.v1beta2.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"oauth2": {
44
"scopes": {
55
"https://www.googleapis.com/auth/cloud-platform": {
6-
"description": "See, edit, configure, and delete your Google Cloud Platform data"
6+
"description": "See, edit, configure, and delete your Google Cloud data and see the email address for your Google Account."
77
}
88
}
99
}
@@ -2291,7 +2291,7 @@
22912291
}
22922292
}
22932293
},
2294-
"revision": "20210715",
2294+
"revision": "20210812",
22952295
"rootUrl": "https://dataproc.googleapis.com/",
22962296
"schemas": {
22972297
"AcceleratorConfig": {
@@ -3940,7 +3940,7 @@
39403940
"type": "object"
39413941
},
39423942
"Policy": {
3943-
"description": "An Identity and Access Management (IAM) policy, which specifies access controls for Google Cloud resources.A Policy is a collection of bindings. A binding binds one or more members to a single role. Members can be user accounts, service accounts, Google groups, and domains (such as G Suite). A role is a named list of permissions; each role can be an IAM predefined role or a user-created custom role.For some types of Google Cloud resources, a binding can also specify a condition, which is a logical expression that allows access to a resource only if the expression evaluates to true. A condition can add constraints based on attributes of the request, the resource, or both. To learn which resources support conditions in their IAM policies, see the IAM documentation (https://cloud.google.com/iam/help/conditions/resource-policies).JSON example: { \"bindings\": [ { \"role\": \"roles/resourcemanager.organizationAdmin\", \"members\": [ \"user:[email protected]\", \"group:[email protected]\", \"domain:google.com\", \"serviceAccount:[email protected]\" ] }, { \"role\": \"roles/resourcemanager.organizationViewer\", \"members\": [ \"user:[email protected]\" ], \"condition\": { \"title\": \"expirable access\", \"description\": \"Does not grant access after Sep 2020\", \"expression\": \"request.time < timestamp('2020-10-01T00:00:00.000Z')\", } } ], \"etag\": \"BwWWja0YfJA=\", \"version\": 3 } YAML example: bindings: - members: - user:[email protected] - group:[email protected] - domain:google.com - serviceAccount:[email protected] role: roles/resourcemanager.organizationAdmin - members: - user:[email protected] role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') - etag: BwWWja0YfJA= - version: 3 For a description of IAM and its features, see the IAM documentation (https://cloud.google.com/iam/docs/).",
3943+
"description": "An Identity and Access Management (IAM) policy, which specifies access controls for Google Cloud resources.A Policy is a collection of bindings. A binding binds one or more members to a single role. Members can be user accounts, service accounts, Google groups, and domains (such as G Suite). A role is a named list of permissions; each role can be an IAM predefined role or a user-created custom role.For some types of Google Cloud resources, a binding can also specify a condition, which is a logical expression that allows access to a resource only if the expression evaluates to true. A condition can add constraints based on attributes of the request, the resource, or both. To learn which resources support conditions in their IAM policies, see the IAM documentation (https://cloud.google.com/iam/help/conditions/resource-policies).JSON example: { \"bindings\": [ { \"role\": \"roles/resourcemanager.organizationAdmin\", \"members\": [ \"user:[email protected]\", \"group:[email protected]\", \"domain:google.com\", \"serviceAccount:[email protected]\" ] }, { \"role\": \"roles/resourcemanager.organizationViewer\", \"members\": [ \"user:[email protected]\" ], \"condition\": { \"title\": \"expirable access\", \"description\": \"Does not grant access after Sep 2020\", \"expression\": \"request.time < timestamp('2020-10-01T00:00:00.000Z')\", } } ], \"etag\": \"BwWWja0YfJA=\", \"version\": 3 } YAML example: bindings: - members: - user:[email protected] - group:[email protected] - domain:google.com - serviceAccount:[email protected] role: roles/resourcemanager.organizationAdmin - members: - user:[email protected] role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a description of IAM and its features, see the IAM documentation (https://cloud.google.com/iam/docs/).",
39443944
"id": "Policy",
39453945
"properties": {
39463946
"bindings": {

0 commit comments

Comments
 (0)