blob: b47627018ebe858edbefe891d5a23cc5a58224a4 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
|
type: google.api.Service
config_version: 3
name: dataproc.googleapis.com
title: Cloud Dataproc API
apis:
- name: google.cloud.dataproc.v1.AutoscalingPolicyService
- name: google.cloud.dataproc.v1.BatchController
- name: google.cloud.dataproc.v1.ClusterController
- name: google.cloud.dataproc.v1.JobController
- name: google.cloud.dataproc.v1.WorkflowTemplateService
types:
- name: google.cloud.dataproc.v1.BatchOperationMetadata
- name: google.cloud.dataproc.v1.ClusterOperationMetadata
- name: google.cloud.dataproc.v1.DiagnoseClusterResults
- name: google.cloud.dataproc.v1.JobMetadata
- name: google.cloud.dataproc.v1.WorkflowMetadata
documentation:
summary: 'Manages Hadoop-based clusters and jobs on Google Cloud Platform.'
rules:
- selector: google.iam.v1.IAMPolicy.GetIamPolicy
description: |-
Gets the access control policy for a resource. Returns an empty policy
if the resource exists and does not have a policy set.
- selector: google.iam.v1.IAMPolicy.SetIamPolicy
description: |-
Sets the access control policy on the specified resource. Replaces
any existing policy.
Can return `NOT_FOUND`, `INVALID_ARGUMENT`, and `PERMISSION_DENIED`
errors.
- selector: google.iam.v1.IAMPolicy.TestIamPermissions
description: |-
Returns permissions that a caller has on the specified resource. If the
resource does not exist, this will return an empty set of
permissions, not a `NOT_FOUND` error.
Note: This operation is designed to be used for building
permission-aware UIs and command-line tools, not for authorization
checking. This operation may "fail open" without warning.
http:
rules:
- selector: google.iam.v1.IAMPolicy.GetIamPolicy
post: '/v1/{resource=projects/*/regions/*/clusters/*}:getIamPolicy'
body: '*'
additional_bindings:
- post: '/v1/{resource=projects/*/regions/*/jobs/*}:getIamPolicy'
body: '*'
- post: '/v1/{resource=projects/*/regions/*/operations/*}:getIamPolicy'
body: '*'
- post: '/v1/{resource=projects/*/regions/*/workflowTemplates/*}:getIamPolicy'
body: '*'
- post: '/v1/{resource=projects/*/locations/*/workflowTemplates/*}:getIamPolicy'
body: '*'
- post: '/v1/{resource=projects/*/regions/*/autoscalingPolicies/*}:getIamPolicy'
body: '*'
- post: '/v1/{resource=projects/*/locations/*/autoscalingPolicies/*}:getIamPolicy'
body: '*'
- selector: google.iam.v1.IAMPolicy.SetIamPolicy
post: '/v1/{resource=projects/*/regions/*/clusters/*}:setIamPolicy'
body: '*'
additional_bindings:
- post: '/v1/{resource=projects/*/regions/*/jobs/*}:setIamPolicy'
body: '*'
- post: '/v1/{resource=projects/*/regions/*/operations/*}:setIamPolicy'
body: '*'
- post: '/v1/{resource=projects/*/regions/*/workflowTemplates/*}:setIamPolicy'
body: '*'
- post: '/v1/{resource=projects/*/locations/*/workflowTemplates/*}:setIamPolicy'
body: '*'
- post: '/v1/{resource=projects/*/regions/*/autoscalingPolicies/*}:setIamPolicy'
body: '*'
- post: '/v1/{resource=projects/*/locations/*/autoscalingPolicies/*}:setIamPolicy'
body: '*'
- selector: google.iam.v1.IAMPolicy.TestIamPermissions
post: '/v1/{resource=projects/*/regions/*/clusters/*}:testIamPermissions'
body: '*'
additional_bindings:
- post: '/v1/{resource=projects/*/regions/*/jobs/*}:testIamPermissions'
body: '*'
- post: '/v1/{resource=projects/*/regions/*/operations/*}:testIamPermissions'
body: '*'
- post: '/v1/{resource=projects/*/regions/*/workflowTemplates/*}:testIamPermissions'
body: '*'
- post: '/v1/{resource=projects/*/locations/*/workflowTemplates/*}:testIamPermissions'
body: '*'
- post: '/v1/{resource=projects/*/regions/*/autoscalingPolicies/*}:testIamPermissions'
body: '*'
- post: '/v1/{resource=projects/*/locations/*/autoscalingPolicies/*}:testIamPermissions'
body: '*'
- selector: google.longrunning.Operations.CancelOperation
post: '/v1/{name=projects/*/regions/*/operations/*}:cancel'
- selector: google.longrunning.Operations.DeleteOperation
delete: '/v1/{name=projects/*/regions/*/operations/*}'
- selector: google.longrunning.Operations.GetOperation
get: '/v1/{name=projects/*/regions/*/operations/*}'
- selector: google.longrunning.Operations.ListOperations
get: '/v1/{name=projects/*/regions/*/operations}'
authentication:
rules:
- selector: 'google.cloud.dataproc.v1.AutoscalingPolicyService.*'
oauth:
canonical_scopes: |-
https://www.googleapis.com/auth/cloud-platform
- selector: 'google.cloud.dataproc.v1.BatchController.*'
oauth:
canonical_scopes: |-
https://www.googleapis.com/auth/cloud-platform
- selector: 'google.cloud.dataproc.v1.ClusterController.*'
oauth:
canonical_scopes: |-
https://www.googleapis.com/auth/cloud-platform
- selector: 'google.cloud.dataproc.v1.JobController.*'
oauth:
canonical_scopes: |-
https://www.googleapis.com/auth/cloud-platform
- selector: 'google.cloud.dataproc.v1.WorkflowTemplateService.*'
oauth:
canonical_scopes: |-
https://www.googleapis.com/auth/cloud-platform
- selector: 'google.iam.v1.IAMPolicy.*'
oauth:
canonical_scopes: |-
https://www.googleapis.com/auth/cloud-platform
- selector: 'google.longrunning.Operations.*'
oauth:
canonical_scopes: |-
https://www.googleapis.com/auth/cloud-platform
|