mirror of https://github.com/databricks/cli.git
Upgrade TF provider to 1.47.0 (#1476)
## Changes This includes a bugfix for provisioning jobs with `num_workers = 0`. Fixes #1472. ## Tests Manually tested this fixes the issue.
This commit is contained in:
parent
41678fa695
commit
311dfa4642
|
@ -1,3 +1,3 @@
|
||||||
package schema
|
package schema
|
||||||
|
|
||||||
const ProviderVersion = "1.46.0"
|
const ProviderVersion = "1.47.0"
|
||||||
|
|
|
@ -0,0 +1,12 @@
|
||||||
|
// Generated from Databricks Terraform provider schema. DO NOT EDIT.
|
||||||
|
|
||||||
|
package schema
|
||||||
|
|
||||||
|
type DataSourceAwsUnityCatalogAssumeRolePolicy struct {
|
||||||
|
AwsAccountId string `json:"aws_account_id"`
|
||||||
|
ExternalId string `json:"external_id"`
|
||||||
|
Id string `json:"id,omitempty"`
|
||||||
|
Json string `json:"json,omitempty"`
|
||||||
|
RoleName string `json:"role_name"`
|
||||||
|
UnityCatalogIamArn string `json:"unity_catalog_iam_arn,omitempty"`
|
||||||
|
}
|
|
@ -6,6 +6,7 @@ type DataSources struct {
|
||||||
AwsAssumeRolePolicy map[string]any `json:"databricks_aws_assume_role_policy,omitempty"`
|
AwsAssumeRolePolicy map[string]any `json:"databricks_aws_assume_role_policy,omitempty"`
|
||||||
AwsBucketPolicy map[string]any `json:"databricks_aws_bucket_policy,omitempty"`
|
AwsBucketPolicy map[string]any `json:"databricks_aws_bucket_policy,omitempty"`
|
||||||
AwsCrossaccountPolicy map[string]any `json:"databricks_aws_crossaccount_policy,omitempty"`
|
AwsCrossaccountPolicy map[string]any `json:"databricks_aws_crossaccount_policy,omitempty"`
|
||||||
|
AwsUnityCatalogAssumeRolePolicy map[string]any `json:"databricks_aws_unity_catalog_assume_role_policy,omitempty"`
|
||||||
AwsUnityCatalogPolicy map[string]any `json:"databricks_aws_unity_catalog_policy,omitempty"`
|
AwsUnityCatalogPolicy map[string]any `json:"databricks_aws_unity_catalog_policy,omitempty"`
|
||||||
Catalog map[string]any `json:"databricks_catalog,omitempty"`
|
Catalog map[string]any `json:"databricks_catalog,omitempty"`
|
||||||
Catalogs map[string]any `json:"databricks_catalogs,omitempty"`
|
Catalogs map[string]any `json:"databricks_catalogs,omitempty"`
|
||||||
|
@ -58,6 +59,7 @@ func NewDataSources() *DataSources {
|
||||||
AwsAssumeRolePolicy: make(map[string]any),
|
AwsAssumeRolePolicy: make(map[string]any),
|
||||||
AwsBucketPolicy: make(map[string]any),
|
AwsBucketPolicy: make(map[string]any),
|
||||||
AwsCrossaccountPolicy: make(map[string]any),
|
AwsCrossaccountPolicy: make(map[string]any),
|
||||||
|
AwsUnityCatalogAssumeRolePolicy: make(map[string]any),
|
||||||
AwsUnityCatalogPolicy: make(map[string]any),
|
AwsUnityCatalogPolicy: make(map[string]any),
|
||||||
Catalog: make(map[string]any),
|
Catalog: make(map[string]any),
|
||||||
Catalogs: make(map[string]any),
|
Catalogs: make(map[string]any),
|
||||||
|
|
|
@ -43,6 +43,7 @@ type ResourceMwsWorkspaces struct {
|
||||||
CustomTags map[string]string `json:"custom_tags,omitempty"`
|
CustomTags map[string]string `json:"custom_tags,omitempty"`
|
||||||
CustomerManagedKeyId string `json:"customer_managed_key_id,omitempty"`
|
CustomerManagedKeyId string `json:"customer_managed_key_id,omitempty"`
|
||||||
DeploymentName string `json:"deployment_name,omitempty"`
|
DeploymentName string `json:"deployment_name,omitempty"`
|
||||||
|
GcpWorkspaceSa string `json:"gcp_workspace_sa,omitempty"`
|
||||||
Id string `json:"id,omitempty"`
|
Id string `json:"id,omitempty"`
|
||||||
IsNoPublicIpEnabled bool `json:"is_no_public_ip_enabled,omitempty"`
|
IsNoPublicIpEnabled bool `json:"is_no_public_ip_enabled,omitempty"`
|
||||||
Location string `json:"location,omitempty"`
|
Location string `json:"location,omitempty"`
|
||||||
|
|
|
@ -41,6 +41,7 @@ type ResourceStorageCredential struct {
|
||||||
Owner string `json:"owner,omitempty"`
|
Owner string `json:"owner,omitempty"`
|
||||||
ReadOnly bool `json:"read_only,omitempty"`
|
ReadOnly bool `json:"read_only,omitempty"`
|
||||||
SkipValidation bool `json:"skip_validation,omitempty"`
|
SkipValidation bool `json:"skip_validation,omitempty"`
|
||||||
|
StorageCredentialId string `json:"storage_credential_id,omitempty"`
|
||||||
AwsIamRole *ResourceStorageCredentialAwsIamRole `json:"aws_iam_role,omitempty"`
|
AwsIamRole *ResourceStorageCredentialAwsIamRole `json:"aws_iam_role,omitempty"`
|
||||||
AzureManagedIdentity *ResourceStorageCredentialAzureManagedIdentity `json:"azure_managed_identity,omitempty"`
|
AzureManagedIdentity *ResourceStorageCredentialAzureManagedIdentity `json:"azure_managed_identity,omitempty"`
|
||||||
AzureServicePrincipal *ResourceStorageCredentialAzureServicePrincipal `json:"azure_service_principal,omitempty"`
|
AzureServicePrincipal *ResourceStorageCredentialAzureServicePrincipal `json:"azure_service_principal,omitempty"`
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
package schema
|
package schema
|
||||||
|
|
||||||
type ResourceSystemSchema struct {
|
type ResourceSystemSchema struct {
|
||||||
|
FullName string `json:"full_name,omitempty"`
|
||||||
Id string `json:"id,omitempty"`
|
Id string `json:"id,omitempty"`
|
||||||
MetastoreId string `json:"metastore_id,omitempty"`
|
MetastoreId string `json:"metastore_id,omitempty"`
|
||||||
Schema string `json:"schema,omitempty"`
|
Schema string `json:"schema,omitempty"`
|
||||||
|
|
|
@ -21,7 +21,7 @@ type Root struct {
|
||||||
|
|
||||||
const ProviderHost = "registry.terraform.io"
|
const ProviderHost = "registry.terraform.io"
|
||||||
const ProviderSource = "databricks/databricks"
|
const ProviderSource = "databricks/databricks"
|
||||||
const ProviderVersion = "1.46.0"
|
const ProviderVersion = "1.47.0"
|
||||||
|
|
||||||
func NewRoot() *Root {
|
func NewRoot() *Root {
|
||||||
return &Root{
|
return &Root{
|
||||||
|
|
Loading…
Reference in New Issue