Upgrade TF provider to 1.47.0 (#1476)

## Changes

This includes a bugfix for provisioning jobs with `num_workers = 0`.

Fixes #1472.

## Tests

Manually tested this fixes the issue.
This commit is contained in:
Pieter Noordhuis 2024-06-05 13:33:43 +02:00 committed by GitHub
parent 41678fa695
commit 311dfa4642
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
7 changed files with 115 additions and 98 deletions

View File

@ -1,3 +1,3 @@
package schema package schema
const ProviderVersion = "1.46.0" const ProviderVersion = "1.47.0"

View File

@ -0,0 +1,12 @@
// Generated from Databricks Terraform provider schema. DO NOT EDIT.
package schema
type DataSourceAwsUnityCatalogAssumeRolePolicy struct {
AwsAccountId string `json:"aws_account_id"`
ExternalId string `json:"external_id"`
Id string `json:"id,omitempty"`
Json string `json:"json,omitempty"`
RoleName string `json:"role_name"`
UnityCatalogIamArn string `json:"unity_catalog_iam_arn,omitempty"`
}

View File

@ -6,6 +6,7 @@ type DataSources struct {
AwsAssumeRolePolicy map[string]any `json:"databricks_aws_assume_role_policy,omitempty"` AwsAssumeRolePolicy map[string]any `json:"databricks_aws_assume_role_policy,omitempty"`
AwsBucketPolicy map[string]any `json:"databricks_aws_bucket_policy,omitempty"` AwsBucketPolicy map[string]any `json:"databricks_aws_bucket_policy,omitempty"`
AwsCrossaccountPolicy map[string]any `json:"databricks_aws_crossaccount_policy,omitempty"` AwsCrossaccountPolicy map[string]any `json:"databricks_aws_crossaccount_policy,omitempty"`
AwsUnityCatalogAssumeRolePolicy map[string]any `json:"databricks_aws_unity_catalog_assume_role_policy,omitempty"`
AwsUnityCatalogPolicy map[string]any `json:"databricks_aws_unity_catalog_policy,omitempty"` AwsUnityCatalogPolicy map[string]any `json:"databricks_aws_unity_catalog_policy,omitempty"`
Catalog map[string]any `json:"databricks_catalog,omitempty"` Catalog map[string]any `json:"databricks_catalog,omitempty"`
Catalogs map[string]any `json:"databricks_catalogs,omitempty"` Catalogs map[string]any `json:"databricks_catalogs,omitempty"`
@ -58,6 +59,7 @@ func NewDataSources() *DataSources {
AwsAssumeRolePolicy: make(map[string]any), AwsAssumeRolePolicy: make(map[string]any),
AwsBucketPolicy: make(map[string]any), AwsBucketPolicy: make(map[string]any),
AwsCrossaccountPolicy: make(map[string]any), AwsCrossaccountPolicy: make(map[string]any),
AwsUnityCatalogAssumeRolePolicy: make(map[string]any),
AwsUnityCatalogPolicy: make(map[string]any), AwsUnityCatalogPolicy: make(map[string]any),
Catalog: make(map[string]any), Catalog: make(map[string]any),
Catalogs: make(map[string]any), Catalogs: make(map[string]any),

View File

@ -43,6 +43,7 @@ type ResourceMwsWorkspaces struct {
CustomTags map[string]string `json:"custom_tags,omitempty"` CustomTags map[string]string `json:"custom_tags,omitempty"`
CustomerManagedKeyId string `json:"customer_managed_key_id,omitempty"` CustomerManagedKeyId string `json:"customer_managed_key_id,omitempty"`
DeploymentName string `json:"deployment_name,omitempty"` DeploymentName string `json:"deployment_name,omitempty"`
GcpWorkspaceSa string `json:"gcp_workspace_sa,omitempty"`
Id string `json:"id,omitempty"` Id string `json:"id,omitempty"`
IsNoPublicIpEnabled bool `json:"is_no_public_ip_enabled,omitempty"` IsNoPublicIpEnabled bool `json:"is_no_public_ip_enabled,omitempty"`
Location string `json:"location,omitempty"` Location string `json:"location,omitempty"`

View File

@ -41,6 +41,7 @@ type ResourceStorageCredential struct {
Owner string `json:"owner,omitempty"` Owner string `json:"owner,omitempty"`
ReadOnly bool `json:"read_only,omitempty"` ReadOnly bool `json:"read_only,omitempty"`
SkipValidation bool `json:"skip_validation,omitempty"` SkipValidation bool `json:"skip_validation,omitempty"`
StorageCredentialId string `json:"storage_credential_id,omitempty"`
AwsIamRole *ResourceStorageCredentialAwsIamRole `json:"aws_iam_role,omitempty"` AwsIamRole *ResourceStorageCredentialAwsIamRole `json:"aws_iam_role,omitempty"`
AzureManagedIdentity *ResourceStorageCredentialAzureManagedIdentity `json:"azure_managed_identity,omitempty"` AzureManagedIdentity *ResourceStorageCredentialAzureManagedIdentity `json:"azure_managed_identity,omitempty"`
AzureServicePrincipal *ResourceStorageCredentialAzureServicePrincipal `json:"azure_service_principal,omitempty"` AzureServicePrincipal *ResourceStorageCredentialAzureServicePrincipal `json:"azure_service_principal,omitempty"`

View File

@ -3,6 +3,7 @@
package schema package schema
type ResourceSystemSchema struct { type ResourceSystemSchema struct {
FullName string `json:"full_name,omitempty"`
Id string `json:"id,omitempty"` Id string `json:"id,omitempty"`
MetastoreId string `json:"metastore_id,omitempty"` MetastoreId string `json:"metastore_id,omitempty"`
Schema string `json:"schema,omitempty"` Schema string `json:"schema,omitempty"`

View File

@ -21,7 +21,7 @@ type Root struct {
const ProviderHost = "registry.terraform.io" const ProviderHost = "registry.terraform.io"
const ProviderSource = "databricks/databricks" const ProviderSource = "databricks/databricks"
const ProviderVersion = "1.46.0" const ProviderVersion = "1.47.0"
func NewRoot() *Root { func NewRoot() *Root {
return &Root{ return &Root{