|
3 | 3 | "oauth2": {
|
4 | 4 | "scopes": {
|
5 | 5 | "https://www.googleapis.com/auth/cloud-platform": {
|
6 |
| - "description": "See, edit, configure, and delete your Google Cloud Platform data" |
| 6 | + "description": "See, edit, configure, and delete your Google Cloud data and see the email address for your Google Account." |
7 | 7 | }
|
8 | 8 | }
|
9 | 9 | }
|
|
2301 | 2301 | }
|
2302 | 2302 | }
|
2303 | 2303 | },
|
2304 |
| - "revision": "20210715", |
| 2304 | + "revision": "20210812", |
2305 | 2305 | "rootUrl": "https://dataproc.googleapis.com/",
|
2306 | 2306 | "schemas": {
|
2307 | 2307 | "AcceleratorConfig": {
|
|
2490 | 2490 | "type": "object"
|
2491 | 2491 | },
|
2492 | 2492 | "Cluster": {
|
2493 |
| - "description": "Describes the identifying information, config, and status of a cluster of Compute Engine instances.", |
| 2493 | + "description": "Describes the identifying information, config, and status of a Dataproc cluster", |
2494 | 2494 | "id": "Cluster",
|
2495 | 2495 | "properties": {
|
2496 | 2496 | "clusterName": {
|
|
2504 | 2504 | },
|
2505 | 2505 | "config": {
|
2506 | 2506 | "$ref": "ClusterConfig",
|
2507 |
| - "description": "Required. The cluster config. Note that Dataproc may set default values, and values may change when clusters are updated." |
| 2507 | + "description": "Optional. The cluster config for a cluster of Compute Engine Instances. Note that Dataproc may set default values, and values may change when clusters are updated." |
2508 | 2508 | },
|
2509 | 2509 | "labels": {
|
2510 | 2510 | "additionalProperties": {
|
|
2547 | 2547 | "description": "Optional. Autoscaling config for the policy associated with the cluster. Cluster does not autoscale if this field is unset."
|
2548 | 2548 | },
|
2549 | 2549 | "configBucket": {
|
2550 |
| - "description": "Optional. A Cloud Storage bucket used to stage job dependencies, config files, and job driver console output. If you do not specify a staging bucket, Cloud Dataproc will determine a Cloud Storage location (US, ASIA, or EU) for your cluster's staging bucket according to the Compute Engine zone where your cluster is deployed, and then create and manage this project-level, per-location bucket (see Dataproc staging bucket (https://cloud.google.com/dataproc/docs/concepts/configuring-clusters/staging-bucket)). This field requires a Cloud Storage bucket name, not a URI to a Cloud Storage bucket.", |
| 2550 | + "description": "Optional. A Cloud Storage bucket used to stage job dependencies, config files, and job driver console output. If you do not specify a staging bucket, Cloud Dataproc will determine a Cloud Storage location (US, ASIA, or EU) for your cluster's staging bucket according to the Compute Engine zone where your cluster is deployed, and then create and manage this project-level, per-location bucket (see Dataproc staging and temp buckets (https://cloud.google.com/dataproc/docs/concepts/configuring-clusters/staging-bucket)). This field requires a Cloud Storage bucket name, not a gs://... URI to a Cloud Storage bucket.", |
2551 | 2551 | "type": "string"
|
2552 | 2552 | },
|
2553 | 2553 | "encryptionConfig": {
|
|
2579 | 2579 | },
|
2580 | 2580 | "masterConfig": {
|
2581 | 2581 | "$ref": "InstanceGroupConfig",
|
2582 |
| - "description": "Optional. The Compute Engine config settings for the master instance in a cluster." |
| 2582 | + "description": "Optional. The Compute Engine config settings for the cluster's master instance." |
2583 | 2583 | },
|
2584 | 2584 | "metastoreConfig": {
|
2585 | 2585 | "$ref": "MetastoreConfig",
|
2586 | 2586 | "description": "Optional. Metastore configuration."
|
2587 | 2587 | },
|
2588 | 2588 | "secondaryWorkerConfig": {
|
2589 | 2589 | "$ref": "InstanceGroupConfig",
|
2590 |
| - "description": "Optional. The Compute Engine config settings for additional worker instances in a cluster." |
| 2590 | + "description": "Optional. The Compute Engine config settings for a cluster's secondary worker instances" |
2591 | 2591 | },
|
2592 | 2592 | "securityConfig": {
|
2593 | 2593 | "$ref": "SecurityConfig",
|
2594 | 2594 | "description": "Optional. Security settings for the cluster."
|
2595 | 2595 | },
|
2596 | 2596 | "softwareConfig": {
|
2597 | 2597 | "$ref": "SoftwareConfig",
|
2598 |
| - "description": "Optional. The config settings for software inside the cluster." |
| 2598 | + "description": "Optional. The config settings for cluster software." |
2599 | 2599 | },
|
2600 | 2600 | "tempBucket": {
|
2601 |
| - "description": "Optional. A Cloud Storage bucket used to store ephemeral cluster and jobs data, such as Spark and MapReduce history files. If you do not specify a temp bucket, Dataproc will determine a Cloud Storage location (US, ASIA, or EU) for your cluster's temp bucket according to the Compute Engine zone where your cluster is deployed, and then create and manage this project-level, per-location bucket. The default bucket has a TTL of 90 days, but you can use any TTL (or none) if you specify a bucket. This field requires a Cloud Storage bucket name, not a URI to a Cloud Storage bucket.", |
| 2601 | + "description": "Optional. A Cloud Storage bucket used to store ephemeral cluster and jobs data, such as Spark and MapReduce history files. If you do not specify a temp bucket, Dataproc will determine a Cloud Storage location (US, ASIA, or EU) for your cluster's temp bucket according to the Compute Engine zone where your cluster is deployed, and then create and manage this project-level, per-location bucket. The default bucket has a TTL of 90 days, but you can use any TTL (or none) if you specify a bucket (see Dataproc staging and temp buckets (https://cloud.google.com/dataproc/docs/concepts/configuring-clusters/staging-bucket)). This field requires a Cloud Storage bucket name, not a gs://... URI to a Cloud Storage bucket.", |
2602 | 2602 | "type": "string"
|
2603 | 2603 | },
|
2604 | 2604 | "workerConfig": {
|
2605 | 2605 | "$ref": "InstanceGroupConfig",
|
2606 |
| - "description": "Optional. The Compute Engine config settings for worker instances in a cluster." |
| 2606 | + "description": "Optional. The Compute Engine config settings for the cluster's worker instances." |
2607 | 2607 | }
|
2608 | 2608 | },
|
2609 | 2609 | "type": "object"
|
|
3042 | 3042 | "type": "object"
|
3043 | 3043 | },
|
3044 | 3044 | "GkeClusterConfig": {
|
3045 |
| - "description": "The GKE config for this cluster.", |
| 3045 | + "description": "The cluster's GKE config.", |
3046 | 3046 | "id": "GkeClusterConfig",
|
3047 | 3047 | "properties": {
|
3048 | 3048 | "namespacedGkeDeploymentTarget": {
|
|
4041 | 4041 | "type": "object"
|
4042 | 4042 | },
|
4043 | 4043 | "Policy": {
|
4044 |
| - "description": "An Identity and Access Management (IAM) policy, which specifies access controls for Google Cloud resources.A Policy is a collection of bindings. A binding binds one or more members to a single role. Members can be user accounts, service accounts, Google groups, and domains (such as G Suite). A role is a named list of permissions; each role can be an IAM predefined role or a user-created custom role.For some types of Google Cloud resources, a binding can also specify a condition, which is a logical expression that allows access to a resource only if the expression evaluates to true. A condition can add constraints based on attributes of the request, the resource, or both. To learn which resources support conditions in their IAM policies, see the IAM documentation (https://cloud.google.com/iam/help/conditions/resource-policies).JSON example: { \"bindings\": [ { \"role\": \"roles/resourcemanager.organizationAdmin\", \"members\": [ \"user: [email protected]\", \"group: [email protected]\", \"domain:google.com\", \"serviceAccount: [email protected]\" ] }, { \"role\": \"roles/resourcemanager.organizationViewer\", \"members\": [ \"user: [email protected]\" ], \"condition\": { \"title\": \"expirable access\", \"description\": \"Does not grant access after Sep 2020\", \"expression\": \"request.time < timestamp('2020-10-01T00:00:00.000Z')\", } } ], \"etag\": \"BwWWja0YfJA=\", \"version\": 3 } YAML example: bindings: - members: - user: [email protected] - group: [email protected] - domain:google.com - serviceAccount: [email protected] role: roles/resourcemanager.organizationAdmin - members: - user: [email protected] role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') - etag: BwWWja0YfJA= - version: 3 For a description of IAM and its features, see the IAM documentation (https://cloud.google.com/iam/docs/).", |
| 4044 | + "description": "An Identity and Access Management (IAM) policy, which specifies access controls for Google Cloud resources.A Policy is a collection of bindings. A binding binds one or more members to a single role. Members can be user accounts, service accounts, Google groups, and domains (such as G Suite). A role is a named list of permissions; each role can be an IAM predefined role or a user-created custom role.For some types of Google Cloud resources, a binding can also specify a condition, which is a logical expression that allows access to a resource only if the expression evaluates to true. A condition can add constraints based on attributes of the request, the resource, or both. To learn which resources support conditions in their IAM policies, see the IAM documentation (https://cloud.google.com/iam/help/conditions/resource-policies).JSON example: { \"bindings\": [ { \"role\": \"roles/resourcemanager.organizationAdmin\", \"members\": [ \"user: [email protected]\", \"group: [email protected]\", \"domain:google.com\", \"serviceAccount: [email protected]\" ] }, { \"role\": \"roles/resourcemanager.organizationViewer\", \"members\": [ \"user: [email protected]\" ], \"condition\": { \"title\": \"expirable access\", \"description\": \"Does not grant access after Sep 2020\", \"expression\": \"request.time < timestamp('2020-10-01T00:00:00.000Z')\", } } ], \"etag\": \"BwWWja0YfJA=\", \"version\": 3 } YAML example: bindings: - members: - user: [email protected] - group: [email protected] - domain:google.com - serviceAccount: [email protected] role: roles/resourcemanager.organizationAdmin - members: - user: [email protected] role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a description of IAM and its features, see the IAM documentation (https://cloud.google.com/iam/docs/).", |
4045 | 4045 | "id": "Policy",
|
4046 | 4046 | "properties": {
|
4047 | 4047 | "bindings": {
|
|
0 commit comments