|
144 | 144 | "$ref": "#/$defs/github.com/databricks/databricks-sdk-go/service/apps.GitSource", |
145 | 145 | "x-since-version": "v0.290.0" |
146 | 146 | }, |
| 147 | + "lifecycle": { |
| 148 | + "description": "Lifecycle is a struct that contains the lifecycle settings for a resource. It controls the behavior of the resource when it is deployed or destroyed.", |
| 149 | + "$ref": "#/$defs/github.com/databricks/cli/bundle/config/resources.Lifecycle", |
| 150 | + "x-since-version": "v0.268.0" |
| 151 | + }, |
147 | 152 | "name": { |
148 | 153 | "description": "The name of the app. The name must contain only lowercase alphanumeric characters and hyphens.\nIt must be unique within the workspace.", |
149 | 154 | "$ref": "#/$defs/string", |
|
173 | 178 | "$ref": "#/$defs/string", |
174 | 179 | "x-since-version": "v0.283.0" |
175 | 180 | }, |
176 | | - "lifecycle": { |
177 | | - "description": "Lifecycle is a struct that contains the lifecycle settings for a resource. It controls the behavior of the resource when it is deployed or destroyed.", |
178 | | - "$ref": "#/$defs/github.com/databricks/cli/bundle/config/resources.Lifecycle", |
179 | | - "x-since-version": "v0.268.0" |
180 | | - }, |
181 | 181 | "user_api_scopes": { |
182 | 182 | "$ref": "#/$defs/slice/string", |
183 | 183 | "x-since-version": "v0.246.0" |
|
304 | 304 | "name" |
305 | 305 | ] |
306 | 306 | }, |
307 | | - "resources.CatalogGrantPrivilege": { |
308 | | - "type": "string", |
309 | | - "enum": [ |
310 | | - "ALL_PRIVILEGES", |
311 | | - "APPLY_TAG", |
312 | | - "CREATE_CONNECTION", |
313 | | - "CREATE_EXTERNAL_LOCATION", |
314 | | - "CREATE_EXTERNAL_TABLE", |
315 | | - "CREATE_EXTERNAL_VOLUME", |
316 | | - "CREATE_FOREIGN_CATALOG", |
317 | | - "CREATE_FUNCTION", |
318 | | - "CREATE_MANAGED_STORAGE", |
319 | | - "CREATE_MATERIALIZED_VIEW", |
320 | | - "CREATE_MODEL", |
321 | | - "CREATE_SCHEMA", |
322 | | - "CREATE_STORAGE_CREDENTIAL", |
323 | | - "CREATE_TABLE", |
324 | | - "CREATE_VOLUME", |
325 | | - "EXECUTE", |
326 | | - "MANAGE", |
327 | | - "MODIFY", |
328 | | - "READ_VOLUME", |
329 | | - "REFRESH", |
330 | | - "SELECT", |
331 | | - "USE_CATALOG", |
332 | | - "USE_CONNECTION", |
333 | | - "USE_SCHEMA", |
334 | | - "WRITE_VOLUME" |
335 | | - ] |
336 | | - }, |
337 | 307 | "resources.Cluster": { |
338 | 308 | "type": "object", |
339 | 309 | "description": "Contains a snapshot of the latest user specified settings that were used to create/edit the cluster.", |
|
804 | 774 | "CAN_MANAGE" |
805 | 775 | ] |
806 | 776 | }, |
807 | | -<<<<<<< HEAD |
808 | 777 | "resources.DatabaseProjectPermission": { |
809 | 778 | "type": "object", |
810 | 779 | "properties": { |
|
830 | 799 | "level" |
831 | 800 | ] |
832 | 801 | }, |
833 | | -||||||| parent of 839ba969a (generate) |
834 | | -======= |
835 | | - "resources.DatabaseProjectPermission": { |
836 | | - "type": "object", |
837 | | - "properties": { |
838 | | - "group_name": { |
839 | | - "$ref": "#/$defs/string" |
840 | | - }, |
841 | | - "level": { |
842 | | - "$ref": "#/$defs/github.com/databricks/cli/bundle/config/resources.DatabaseProjectPermissionLevel" |
843 | | - }, |
844 | | - "service_principal_name": { |
845 | | - "$ref": "#/$defs/string" |
846 | | - }, |
847 | | - "user_name": { |
848 | | - "$ref": "#/$defs/string" |
849 | | - } |
850 | | - }, |
851 | | - "additionalProperties": false, |
852 | | - "required": [ |
853 | | - "level" |
| 802 | + "resources.DatabaseProjectPermissionLevel": { |
| 803 | + "type": "string", |
| 804 | + "enum": [ |
| 805 | + "CAN_USE", |
| 806 | + "CAN_MANAGE" |
854 | 807 | ] |
855 | 808 | }, |
856 | | ->>>>>>> 839ba969a (generate) |
857 | | - "resources.DatabaseProjectPermissionLevel": { |
858 | | - "type": "string", |
859 | | - "enum": [ |
860 | | - "CAN_USE", |
861 | | - "CAN_MANAGE" |
862 | | - ] |
863 | | - }, |
864 | 809 | "resources.ExternalLocation": { |
865 | 810 | "type": "object", |
866 | 811 | "properties": { |
|
920 | 865 | "url" |
921 | 866 | ] |
922 | 867 | }, |
923 | | - "resources.ExternalLocationGrantPrivilege": { |
924 | | - "type": "string", |
925 | | - "description": "Privilege to grant on an external location", |
926 | | - "enum": [ |
927 | | - "ALL_PRIVILEGES", |
928 | | - "CREATE_EXTERNAL_TABLE", |
929 | | - "CREATE_EXTERNAL_VOLUME", |
930 | | - "CREATE_MANAGED_STORAGE", |
931 | | - "CREATE_TABLE", |
932 | | - "CREATE_VOLUME", |
933 | | - "MANAGE", |
934 | | - "READ_FILES", |
935 | | - "WRITE_FILES" |
936 | | - ] |
937 | | - }, |
938 | 868 | "resources.Job": { |
939 | 869 | "type": "object", |
940 | 870 | "properties": { |
|
1705 | 1635 | "$ref": "#/$defs/github.com/databricks/cli/bundle/config/resources.Lifecycle", |
1706 | 1636 | "x-since-version": "v0.287.0" |
1707 | 1637 | }, |
1708 | | -<<<<<<< HEAD |
1709 | 1638 | "permissions": { |
1710 | 1639 | "$ref": "#/$defs/slice/github.com/databricks/cli/bundle/config/resources.DatabaseProjectPermission", |
1711 | 1640 | "x-since-version": "v0.292.0" |
1712 | 1641 | }, |
1713 | | -||||||| parent of 839ba969a (generate) |
1714 | | -======= |
1715 | | - "permissions": { |
1716 | | - "$ref": "#/$defs/slice/github.com/databricks/cli/bundle/config/resources.DatabaseProjectPermission" |
1717 | | - }, |
1718 | | ->>>>>>> 839ba969a (generate) |
1719 | 1642 | "pg_version": { |
1720 | | - "$ref": "#/$defs/int", |
1721 | | - "x-since-version": "v0.287.0" |
1722 | | - }, |
| 1643 | + "$ref": "#/$defs/int", |
| 1644 | + "x-since-version": "v0.287.0" |
| 1645 | + }, |
1723 | 1646 | "project_id": { |
1724 | 1647 | "$ref": "#/$defs/string", |
1725 | 1648 | "x-since-version": "v0.287.0" |
|
1943 | 1866 | ], |
1944 | 1867 | "markdownDescription": "The schema resource type allows you to define Unity Catalog [schemas](https://docs.databricks.com/api/workspace/schemas/create) for tables and other assets in your workflows and pipelines created as part of a bundle. A schema, different from other resource types, has the following limitations:\n\n- The owner of a schema resource is always the deployment user, and cannot be changed. If `run_as` is specified in the bundle, it will be ignored by operations on the schema.\n- Only fields supported by the corresponding [Schemas object create API](https://docs.databricks.com/api/workspace/schemas/create) are available for the schema resource. For example, `enable_predictive_optimization` is not supported as it is only available on the [update API](https://docs.databricks.com/api/workspace/schemas/update)." |
1945 | 1868 | }, |
1946 | | - "resources.SchemaGrantPrivilege": { |
1947 | | - "type": "string", |
1948 | | - "enum": [ |
1949 | | - "ALL_PRIVILEGES", |
1950 | | - "APPLY_TAG", |
1951 | | - "CREATE_FUNCTION", |
1952 | | - "CREATE_MATERIALIZED_VIEW", |
1953 | | - "CREATE_MODEL", |
1954 | | - "CREATE_TABLE", |
1955 | | - "CREATE_VOLUME", |
1956 | | - "EXECUTE", |
1957 | | - "EXTERNAL_USE_SCHEMA", |
1958 | | - "MANAGE", |
1959 | | - "MODIFY", |
1960 | | - "READ_VOLUME", |
1961 | | - "REFRESH", |
1962 | | - "SELECT", |
1963 | | - "USE_SCHEMA", |
1964 | | - "WRITE_VOLUME" |
1965 | | - ] |
1966 | | - }, |
1967 | 1869 | "resources.SecretScope": { |
1968 | 1870 | "type": "object", |
1969 | 1871 | "properties": { |
|
3740 | 3642 | "timestamp_col" |
3741 | 3643 | ] |
3742 | 3644 | }, |
| 3645 | + "catalog.Privilege": { |
| 3646 | + "type": "string", |
| 3647 | + "enum": [ |
| 3648 | + "SELECT", |
| 3649 | + "READ_PRIVATE_FILES", |
| 3650 | + "WRITE_PRIVATE_FILES", |
| 3651 | + "CREATE", |
| 3652 | + "USAGE", |
| 3653 | + "USE_CATALOG", |
| 3654 | + "USE_SCHEMA", |
| 3655 | + "CREATE_SCHEMA", |
| 3656 | + "CREATE_VIEW", |
| 3657 | + "CREATE_EXTERNAL_TABLE", |
| 3658 | + "CREATE_MATERIALIZED_VIEW", |
| 3659 | + "CREATE_FUNCTION", |
| 3660 | + "CREATE_MODEL", |
| 3661 | + "CREATE_CATALOG", |
| 3662 | + "CREATE_MANAGED_STORAGE", |
| 3663 | + "CREATE_EXTERNAL_LOCATION", |
| 3664 | + "CREATE_STORAGE_CREDENTIAL", |
| 3665 | + "CREATE_SERVICE_CREDENTIAL", |
| 3666 | + "ACCESS", |
| 3667 | + "CREATE_SHARE", |
| 3668 | + "CREATE_RECIPIENT", |
| 3669 | + "CREATE_PROVIDER", |
| 3670 | + "USE_SHARE", |
| 3671 | + "USE_RECIPIENT", |
| 3672 | + "USE_PROVIDER", |
| 3673 | + "USE_MARKETPLACE_ASSETS", |
| 3674 | + "SET_SHARE_PERMISSION", |
| 3675 | + "MODIFY", |
| 3676 | + "REFRESH", |
| 3677 | + "EXECUTE", |
| 3678 | + "READ_FILES", |
| 3679 | + "WRITE_FILES", |
| 3680 | + "CREATE_TABLE", |
| 3681 | + "ALL_PRIVILEGES", |
| 3682 | + "CREATE_CONNECTION", |
| 3683 | + "USE_CONNECTION", |
| 3684 | + "APPLY_TAG", |
| 3685 | + "CREATE_FOREIGN_CATALOG", |
| 3686 | + "CREATE_FOREIGN_SECURABLE", |
| 3687 | + "MANAGE_ALLOWLIST", |
| 3688 | + "CREATE_VOLUME", |
| 3689 | + "CREATE_EXTERNAL_VOLUME", |
| 3690 | + "READ_VOLUME", |
| 3691 | + "WRITE_VOLUME", |
| 3692 | + "MANAGE", |
| 3693 | + "BROWSE", |
| 3694 | + "CREATE_CLEAN_ROOM", |
| 3695 | + "MODIFY_CLEAN_ROOM", |
| 3696 | + "EXECUTE_CLEAN_ROOM_TASK", |
| 3697 | + "EXTERNAL_USE_SCHEMA" |
| 3698 | + ] |
| 3699 | + }, |
| 3700 | + "catalog.PrivilegeAssignment": { |
| 3701 | + "type": "object", |
| 3702 | + "properties": { |
| 3703 | + "principal": { |
| 3704 | + "description": "The principal (user email address or group name).\nFor deleted principals, `principal` is empty while `principal_id` is populated.", |
| 3705 | + "$ref": "#/$defs/string" |
| 3706 | + }, |
| 3707 | + "privileges": { |
| 3708 | + "description": "The privileges assigned to the principal.", |
| 3709 | + "$ref": "#/$defs/slice/github.com/databricks/databricks-sdk-go/service/catalog.Privilege" |
| 3710 | + } |
| 3711 | + }, |
| 3712 | + "additionalProperties": false |
| 3713 | + }, |
3743 | 3714 | "catalog.RegisteredModelAlias": { |
3744 | 3715 | "type": "object", |
3745 | 3716 | "properties": { |
|
8816 | 8787 | "resource_id" |
8817 | 8788 | ] |
8818 | 8789 | }, |
8819 | | - "catalog.Privilege": { |
8820 | | - "type": "string", |
8821 | | - "enum": [ |
8822 | | - "SELECT", |
8823 | | - "READ_PRIVATE_FILES", |
8824 | | - "WRITE_PRIVATE_FILES", |
8825 | | - "CREATE", |
8826 | | - "USAGE", |
8827 | | - "USE_CATALOG", |
8828 | | - "USE_SCHEMA", |
8829 | | - "CREATE_SCHEMA", |
8830 | | - "CREATE_VIEW", |
8831 | | - "CREATE_EXTERNAL_TABLE", |
8832 | | - "CREATE_MATERIALIZED_VIEW", |
8833 | | - "CREATE_FUNCTION", |
8834 | | - "CREATE_MODEL", |
8835 | | - "CREATE_CATALOG", |
8836 | | - "CREATE_MANAGED_STORAGE", |
8837 | | - "CREATE_EXTERNAL_LOCATION", |
8838 | | - "CREATE_STORAGE_CREDENTIAL", |
8839 | | - "CREATE_SERVICE_CREDENTIAL", |
8840 | | - "ACCESS", |
8841 | | - "CREATE_SHARE", |
8842 | | - "CREATE_RECIPIENT", |
8843 | | - "CREATE_PROVIDER", |
8844 | | - "USE_SHARE", |
8845 | | - "USE_RECIPIENT", |
8846 | | - "USE_PROVIDER", |
8847 | | - "USE_MARKETPLACE_ASSETS", |
8848 | | - "SET_SHARE_PERMISSION", |
8849 | | - "MODIFY", |
8850 | | - "REFRESH", |
8851 | | - "EXECUTE", |
8852 | | - "READ_FILES", |
8853 | | - "WRITE_FILES", |
8854 | | - "CREATE_TABLE", |
8855 | | - "ALL_PRIVILEGES", |
8856 | | - "CREATE_CONNECTION", |
8857 | | - "USE_CONNECTION", |
8858 | | - "APPLY_TAG", |
8859 | | - "CREATE_FOREIGN_CATALOG", |
8860 | | - "CREATE_FOREIGN_SECURABLE", |
8861 | | - "MANAGE_ALLOWLIST", |
8862 | | - "CREATE_VOLUME", |
8863 | | - "CREATE_EXTERNAL_VOLUME", |
8864 | | - "READ_VOLUME", |
8865 | | - "WRITE_VOLUME", |
8866 | | - "MANAGE", |
8867 | | - "BROWSE", |
8868 | | - "CREATE_CLEAN_ROOM", |
8869 | | - "MODIFY_CLEAN_ROOM", |
8870 | | - "EXECUTE_CLEAN_ROOM_TASK", |
8871 | | - "EXTERNAL_USE_SCHEMA" |
8872 | | - ] |
8873 | | - }, |
8874 | | - "catalog.PrivilegeAssignment": { |
8875 | | - "type": "object", |
8876 | | - "properties": { |
8877 | | - "principal": { |
8878 | | - "description": "The principal (user email address or group name).\nFor deleted principals, `principal` is empty while `principal_id` is populated.", |
8879 | | - "$ref": "#/$defs/string" |
8880 | | - }, |
8881 | | - "privileges": { |
8882 | | - "description": "The privileges assigned to the principal.", |
8883 | | - "$ref": "#/$defs/slice/github.com/databricks/databricks-sdk-go/service/catalog.Privilege" |
8884 | | - } |
8885 | | - }, |
8886 | | - "additionalProperties": false |
8887 | | - }, |
8888 | 8790 | "workspace.ScopeBackendType": { |
8889 | 8791 | "type": "string", |
8890 | 8792 | "description": "The types of secret scope backends in the Secret Manager. Azure KeyVault backed secret scopes\nwill be supported in a later release.", |
|
0 commit comments