Skip to content

Commit

Permalink
feat(bigquery): update the API
Browse files Browse the repository at this point in the history
#### bigquery:v2
The following keys were added:
- schemas.JobConfigurationTableCopy.properties.destinationExpirationTime.description
- schemas.JobConfigurationTableCopy.properties.destinationExpirationTime.type
- schemas.JobConfigurationTableCopy.properties.operationType.description
- schemas.JobConfigurationTableCopy.properties.operationType.type
- schemas.Routine.properties.determinismLevel.description
- schemas.Routine.properties.determinismLevel.enum
- schemas.Routine.properties.determinismLevel.enumDescriptions
- schemas.Routine.properties.determinismLevel.type
- schemas.TrainingOptions.properties.preserveInputStructs.description
- schemas.TrainingOptions.properties.preserveInputStructs.type

The following keys were changed:
- schemas.AuditConfig.description
- schemas.AuditLogConfig.description
- schemas.StandardSqlDataType.properties.typeKind.enum
- schemas.StandardSqlDataType.properties.typeKind.enumDescriptions
  • Loading branch information
yoshi-automation authored and JustinBeckwith committed Jul 10, 2020
1 parent d3e6b4e commit 801f29a
Show file tree
Hide file tree
Showing 2 changed files with 54 additions and 5 deletions.
34 changes: 31 additions & 3 deletions discovery/bigquery-v2.json
Expand Up @@ -1519,7 +1519,7 @@
}
}
},
"revision": "20200603",
"revision": "20200625",
"rootUrl": "https://bigquery.googleapis.com/",
"schemas": {
"AggregateClassificationMetrics": {
Expand Down Expand Up @@ -1773,7 +1773,7 @@
"type": "object"
},
"AuditConfig": {
"description": "Specifies the audit configuration for a service.\nThe configuration determines which permission types are logged, and what\nidentities, if any, are exempted from logging.\nAn AuditConfig must have one or more AuditLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific service,\nthe union of the two AuditConfigs is used for that service: the log_types\nspecified in each AuditConfig are enabled, and the exempted_members in each\nAuditLogConfig are exempted.\n\nExample Policy with multiple AuditConfigs:\n\n {\n \"audit_configs\": [\n {\n \"service\": \"allServices\"\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:jose@example.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n },\n {\n \"log_type\": \"ADMIN_READ\",\n }\n ]\n },\n {\n \"service\": \"sampleservice.googleapis.com\"\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n },\n {\n \"log_type\": \"DATA_WRITE\",\n \"exempted_members\": [\n \"user:aliya@example.com\"\n ]\n }\n ]\n }\n ]\n }\n\nFor sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ\nlogging. It also exempts jose@example.com from DATA_READ logging, and\naliya@example.com from DATA_WRITE logging.",
"description": "Specifies the audit configuration for a service.\nThe configuration determines which permission types are logged, and what\nidentities, if any, are exempted from logging.\nAn AuditConfig must have one or more AuditLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific service,\nthe union of the two AuditConfigs is used for that service: the log_types\nspecified in each AuditConfig are enabled, and the exempted_members in each\nAuditLogConfig are exempted.\n\nExample Policy with multiple AuditConfigs:\n\n {\n \"audit_configs\": [\n {\n \"service\": \"allServices\",\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:jose@example.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\"\n },\n {\n \"log_type\": \"ADMIN_READ\"\n }\n ]\n },\n {\n \"service\": \"sampleservice.googleapis.com\",\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\"\n },\n {\n \"log_type\": \"DATA_WRITE\",\n \"exempted_members\": [\n \"user:aliya@example.com\"\n ]\n }\n ]\n }\n ]\n }\n\nFor sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ\nlogging. It also exempts jose@example.com from DATA_READ logging, and\naliya@example.com from DATA_WRITE logging.",
"id": "AuditConfig",
"properties": {
"auditLogConfigs": {
Expand All @@ -1791,7 +1791,7 @@
"type": "object"
},
"AuditLogConfig": {
"description": "Provides the configuration for logging a type of permissions.\nExample:\n\n {\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:jose@example.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n }\n ]\n }\n\nThis enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting\njose@example.com from DATA_READ logging.",
"description": "Provides the configuration for logging a type of permissions.\nExample:\n\n {\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:jose@example.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\"\n }\n ]\n }\n\nThis enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting\njose@example.com from DATA_READ logging.",
"id": "AuditLogConfig",
"properties": {
"exemptedMembers": {
Expand Down Expand Up @@ -3438,10 +3438,18 @@
"$ref": "EncryptionConfiguration",
"description": "Custom encryption configuration (e.g., Cloud KMS keys)."
},
"destinationExpirationTime": {
"description": "[Optional] The time when the destination table expires. Expired tables will be deleted and their storage reclaimed.",
"type": "any"
},
"destinationTable": {
"$ref": "TableReference",
"description": "[Required] The destination table"
},
"operationType": {
"description": "[Optional] Supported operation types in table copy job.",
"type": "string"
},
"sourceTable": {
"$ref": "TableReference",
"description": "[Pick one] Source table to copy."
Expand Down Expand Up @@ -4584,6 +4592,20 @@
"description": "Optional. [Experimental] The description of the routine if defined.",
"type": "string"
},
"determinismLevel": {
"description": "Optional. [Experimental] The determinism level of the JavaScript UDF if defined.",
"enum": [
"DETERMINISM_LEVEL_UNSPECIFIED",
"DETERMINISTIC",
"NOT_DETERMINISTIC"
],
"enumDescriptions": [
"The determinism of the UDF is unspecified.",
"The UDF is deterministic, meaning that 2 function calls with the same\ninputs always produce the same result, even across 2 query runs.",
"The UDF is not deterministic."
],
"type": "string"
},
"etag": {
"description": "Output only. A hash of this resource.",
"type": "string"
Expand Down Expand Up @@ -4801,6 +4823,7 @@
"DATETIME",
"GEOGRAPHY",
"NUMERIC",
"BIGNUMERIC",
"ARRAY",
"STRUCT"
],
Expand All @@ -4817,6 +4840,7 @@
"Encoded as RFC 3339 full-date \"T\" partial-time: 1985-04-12T23:20:50.52",
"Encoded as WKT",
"Encoded as a decimal string.",
"Encoded as a decimal string.",
"Encoded as a list with types matching Type.array_type.",
"Encoded as a list with fields of type Type.struct_type[i]. List is used\nbecause a JSON object cannot have duplicate field names."
],
Expand Down Expand Up @@ -5588,6 +5612,10 @@
],
"type": "string"
},
"preserveInputStructs": {
"description": "Whether to preserve the input structs in output feature names.\nSuppose there is a struct A with field b.\nWhen false (default), the output feature name is A_b.\nWhen true, the output feature name is A.b.",
"type": "boolean"
},
"subsample": {
"description": "Subsample fraction of the training data to grow tree to prevent\noverfitting for boosted tree models.",
"format": "double",
Expand Down
25 changes: 23 additions & 2 deletions src/apis/bigquery/v2.ts
Expand Up @@ -271,7 +271,7 @@ export namespace bigquery_v2 {
seasonalPeriods?: string[] | null;
}
/**
* Specifies the audit configuration for a service. The configuration determines which permission types are logged, and what identities, if any, are exempted from logging. An AuditConfig must have one or more AuditLogConfigs. If there are AuditConfigs for both `allServices` and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditLogConfig are exempted. Example Policy with multiple AuditConfigs: { "audit_configs": [ { "service": "allServices" "audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [ "user:jose@example.com" ] }, { "log_type": "DATA_WRITE", }, { "log_type": "ADMIN_READ", } ] }, { "service": "sampleservice.googleapis.com" "audit_log_configs": [ { "log_type": "DATA_READ", }, { "log_type": "DATA_WRITE", "exempted_members": [ "user:aliya@example.com" ] } ] } ] } For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts jose@example.com from DATA_READ logging, and aliya@example.com from DATA_WRITE logging.
* Specifies the audit configuration for a service. The configuration determines which permission types are logged, and what identities, if any, are exempted from logging. An AuditConfig must have one or more AuditLogConfigs. If there are AuditConfigs for both `allServices` and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditLogConfig are exempted. Example Policy with multiple AuditConfigs: { "audit_configs": [ { "service": "allServices", "audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [ "user:jose@example.com" ] }, { "log_type": "DATA_WRITE" }, { "log_type": "ADMIN_READ" } ] }, { "service": "sampleservice.googleapis.com", "audit_log_configs": [ { "log_type": "DATA_READ" }, { "log_type": "DATA_WRITE", "exempted_members": [ "user:aliya@example.com" ] } ] } ] } For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts jose@example.com from DATA_READ logging, and aliya@example.com from DATA_WRITE logging.
*/
export interface Schema$AuditConfig {
/**
Expand All @@ -284,7 +284,7 @@ export namespace bigquery_v2 {
service?: string | null;
}
/**
* Provides the configuration for logging a type of permissions. Example: { "audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [ "user:jose@example.com" ] }, { "log_type": "DATA_WRITE", } ] } This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting jose@example.com from DATA_READ logging.
* Provides the configuration for logging a type of permissions. Example: { "audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [ "user:jose@example.com" ] }, { "log_type": "DATA_WRITE" } ] } This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting jose@example.com from DATA_READ logging.
*/
export interface Schema$AuditLogConfig {
/**
Expand Down Expand Up @@ -1494,10 +1494,18 @@ export namespace bigquery_v2 {
* Custom encryption configuration (e.g., Cloud KMS keys).
*/
destinationEncryptionConfiguration?: Schema$EncryptionConfiguration;
/**
* [Optional] The time when the destination table expires. Expired tables will be deleted and their storage reclaimed.
*/
destinationExpirationTime?: any | null;
/**
* [Required] The destination table
*/
destinationTable?: Schema$TableReference;
/**
* [Optional] Supported operation types in table copy job.
*/
operationType?: string | null;
/**
* [Pick one] Source table to copy.
*/
Expand Down Expand Up @@ -2229,6 +2237,10 @@ export namespace bigquery_v2 {
* Optional. [Experimental] The description of the routine if defined.
*/
description?: string | null;
/**
* Optional. [Experimental] The determinism level of the JavaScript UDF if defined.
*/
determinismLevel?: string | null;
/**
* Output only. A hash of this resource.
*/
Expand Down Expand Up @@ -2810,6 +2822,10 @@ export namespace bigquery_v2 {
* Optimization strategy for training linear regression models.
*/
optimizationStrategy?: string | null;
/**
* Whether to preserve the input structs in output feature names. Suppose there is a struct A with field b. When false (default), the output feature name is A_b. When true, the output feature name is A.b.
*/
preserveInputStructs?: boolean | null;
/**
* Subsample fraction of the training data to grow tree to prevent overfitting for boosted tree models.
*/
Expand Down Expand Up @@ -6204,6 +6220,7 @@ export namespace bigquery_v2 {
* // "creationTime": "my_creationTime",
* // "definitionBody": "my_definitionBody",
* // "description": "my_description",
* // "determinismLevel": "my_determinismLevel",
* // "etag": "my_etag",
* // "importedLibraries": [],
* // "language": "my_language",
Expand Down Expand Up @@ -6352,6 +6369,7 @@ export namespace bigquery_v2 {
* // "creationTime": "my_creationTime",
* // "definitionBody": "my_definitionBody",
* // "description": "my_description",
* // "determinismLevel": "my_determinismLevel",
* // "etag": "my_etag",
* // "importedLibraries": [],
* // "language": "my_language",
Expand All @@ -6370,6 +6388,7 @@ export namespace bigquery_v2 {
* // "creationTime": "my_creationTime",
* // "definitionBody": "my_definitionBody",
* // "description": "my_description",
* // "determinismLevel": "my_determinismLevel",
* // "etag": "my_etag",
* // "importedLibraries": [],
* // "language": "my_language",
Expand Down Expand Up @@ -6684,6 +6703,7 @@ export namespace bigquery_v2 {
* // "creationTime": "my_creationTime",
* // "definitionBody": "my_definitionBody",
* // "description": "my_description",
* // "determinismLevel": "my_determinismLevel",
* // "etag": "my_etag",
* // "importedLibraries": [],
* // "language": "my_language",
Expand All @@ -6702,6 +6722,7 @@ export namespace bigquery_v2 {
* // "creationTime": "my_creationTime",
* // "definitionBody": "my_definitionBody",
* // "description": "my_description",
* // "determinismLevel": "my_determinismLevel",
* // "etag": "my_etag",
* // "importedLibraries": [],
* // "language": "my_language",
Expand Down

0 comments on commit 801f29a

Please sign in to comment.