@pulumi/databricks 1.48.0-alpha.1721971593 → 1.48.0-alpha.1722058383
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/artifactAllowlist.d.ts +7 -0
- package/artifactAllowlist.js +7 -0
- package/artifactAllowlist.js.map +1 -1
- package/catalog.d.ts +6 -0
- package/catalog.js +6 -0
- package/catalog.js.map +1 -1
- package/catalogWorkspaceBinding.d.ts +12 -0
- package/catalogWorkspaceBinding.js +12 -0
- package/catalogWorkspaceBinding.js.map +1 -1
- package/cluster.d.ts +9 -0
- package/cluster.js.map +1 -1
- package/dashboard.d.ts +24 -0
- package/dashboard.js +24 -0
- package/dashboard.js.map +1 -1
- package/dbfsFile.d.ts +11 -0
- package/dbfsFile.js +2 -0
- package/dbfsFile.js.map +1 -1
- package/directory.d.ts +38 -0
- package/directory.js +29 -0
- package/directory.js.map +1 -1
- package/file.d.ts +69 -0
- package/file.js +69 -0
- package/file.js.map +1 -1
- package/getCatalog.d.ts +12 -0
- package/getCatalog.js +12 -0
- package/getCatalog.js.map +1 -1
- package/getCatalogs.d.ts +12 -0
- package/getCatalogs.js +12 -0
- package/getCatalogs.js.map +1 -1
- package/getClusters.d.ts +8 -0
- package/getClusters.js +8 -0
- package/getClusters.js.map +1 -1
- package/getCurrentUser.d.ts +4 -4
- package/getCurrentUser.js +4 -4
- package/getExternalLocation.d.ts +8 -0
- package/getExternalLocation.js +8 -0
- package/getExternalLocation.js.map +1 -1
- package/getExternalLocations.d.ts +8 -0
- package/getExternalLocations.js +8 -0
- package/getExternalLocations.js.map +1 -1
- package/getJobs.d.ts +12 -0
- package/getJobs.js +12 -0
- package/getJobs.js.map +1 -1
- package/getMetastore.d.ts +12 -0
- package/getMetastore.js +12 -0
- package/getMetastore.js.map +1 -1
- package/getMetastores.d.ts +12 -0
- package/getMetastores.js +12 -0
- package/getMetastores.js.map +1 -1
- package/getSchema.d.ts +4 -6
- package/getSchema.js +4 -6
- package/getSchema.js.map +1 -1
- package/getSchemas.d.ts +12 -0
- package/getSchemas.js +12 -0
- package/getSchemas.js.map +1 -1
- package/getShare.d.ts +4 -0
- package/getShare.js +4 -0
- package/getShare.js.map +1 -1
- package/getShares.d.ts +4 -0
- package/getShares.js +4 -0
- package/getShares.js.map +1 -1
- package/getSqlWarehouses.d.ts +8 -0
- package/getSqlWarehouses.js +8 -0
- package/getSqlWarehouses.js.map +1 -1
- package/getStorageCredential.d.ts +8 -0
- package/getStorageCredential.js +8 -0
- package/getStorageCredential.js.map +1 -1
- package/getStorageCredentials.d.ts +8 -0
- package/getStorageCredentials.js +8 -0
- package/getStorageCredentials.js.map +1 -1
- package/getTable.d.ts +12 -0
- package/getTable.js +12 -0
- package/getTable.js.map +1 -1
- package/getTables.d.ts +12 -0
- package/getTables.js +12 -0
- package/getTables.js.map +1 -1
- package/getViews.d.ts +4 -4
- package/getViews.js +4 -4
- package/getVolume.d.ts +4 -6
- package/getVolume.js +4 -6
- package/getVolume.js.map +1 -1
- package/getVolumes.d.ts +8 -0
- package/getVolumes.js +8 -0
- package/getVolumes.js.map +1 -1
- package/gitCredential.d.ts +23 -0
- package/gitCredential.js +23 -0
- package/gitCredential.js.map +1 -1
- package/globalInitScript.d.ts +11 -0
- package/globalInitScript.js +2 -0
- package/globalInitScript.js.map +1 -1
- package/grant.d.ts +396 -0
- package/grant.js +396 -0
- package/grant.js.map +1 -1
- package/grants.d.ts +433 -0
- package/grants.js +433 -0
- package/grants.js.map +1 -1
- package/group.d.ts +9 -0
- package/group.js.map +1 -1
- package/job.d.ts +69 -0
- package/job.js +69 -0
- package/job.js.map +1 -1
- package/mlflowWebhook.d.ts +1 -1
- package/mlflowWebhook.js +1 -1
- package/mwsCustomerManagedKeys.d.ts +9 -0
- package/mwsCustomerManagedKeys.js +9 -0
- package/mwsCustomerManagedKeys.js.map +1 -1
- package/mwsVpcEndpoint.d.ts +192 -0
- package/mwsVpcEndpoint.js +192 -0
- package/mwsVpcEndpoint.js.map +1 -1
- package/notebook.d.ts +11 -0
- package/notebook.js +2 -0
- package/notebook.js.map +1 -1
- package/oboToken.d.ts +64 -0
- package/oboToken.js +64 -0
- package/oboToken.js.map +1 -1
- package/package.json +2 -2
- package/permissionAssignment.d.ts +9 -0
- package/permissionAssignment.js.map +1 -1
- package/permissions.d.ts +684 -18
- package/permissions.js +684 -18
- package/permissions.js.map +1 -1
- package/repo.d.ts +32 -0
- package/repo.js +32 -0
- package/repo.js.map +1 -1
- package/servicePrincipal.d.ts +9 -0
- package/servicePrincipal.js.map +1 -1
- package/servicePrincipalSecret.d.ts +8 -0
- package/servicePrincipalSecret.js +8 -0
- package/servicePrincipalSecret.js.map +1 -1
- package/share.d.ts +93 -0
- package/share.js +93 -0
- package/share.js.map +1 -1
- package/sqlPermissions.d.ts +15 -3
- package/sqlPermissions.js +15 -3
- package/sqlPermissions.js.map +1 -1
- package/token.d.ts +2 -2
- package/token.js +2 -2
- package/types/input.d.ts +16 -0
- package/types/output.d.ts +16 -0
- package/user.d.ts +9 -0
- package/user.js.map +1 -1
- package/workspaceBinding.d.ts +12 -0
- package/workspaceBinding.js +12 -0
- package/workspaceBinding.js.map +1 -1
- package/workspaceConf.d.ts +4 -0
- package/workspaceConf.js +4 -0
- package/workspaceConf.js.map +1 -1
- package/workspaceFile.d.ts +11 -0
- package/workspaceFile.js +2 -0
- package/workspaceFile.js.map +1 -1
package/oboToken.d.ts
CHANGED
|
@@ -1,5 +1,69 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
+
* This resource creates [On-Behalf-Of tokens](https://docs.databricks.com/administration-guide/users-groups/service-principals.html#manage-personal-access-tokens-for-a-service-principal) for a databricks.ServicePrincipal in Databricks workspaces on AWS. It is very useful, when you want to provision resources within a workspace through narrowly-scoped service principal, that has no access to other workspaces within the same Databricks Account.
|
|
4
|
+
*
|
|
5
|
+
* ## Example Usage
|
|
6
|
+
*
|
|
7
|
+
* Creating a token for a narrowly-scoped service principal, that would be the only one (besides admins) allowed to use PAT token in this given workspace, keeping your automated deployment highly secure.
|
|
8
|
+
*
|
|
9
|
+
* > **Note** A given declaration of `databricks_permissions.token_usage` would OVERWRITE permissions to use PAT tokens from any existing groups with token usage permissions such as the `users` group. To avoid this, be sure to include any desired groups in additional `accessControl` blocks in the Pulumi configuration file.
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as databricks from "@pulumi/databricks";
|
|
14
|
+
*
|
|
15
|
+
* const _this = new databricks.ServicePrincipal("this", {displayName: "Automation-only SP"});
|
|
16
|
+
* const tokenUsage = new databricks.Permissions("token_usage", {
|
|
17
|
+
* authorization: "tokens",
|
|
18
|
+
* accessControls: [{
|
|
19
|
+
* servicePrincipalName: _this.applicationId,
|
|
20
|
+
* permissionLevel: "CAN_USE",
|
|
21
|
+
* }],
|
|
22
|
+
* });
|
|
23
|
+
* const thisOboToken = new databricks.OboToken("this", {
|
|
24
|
+
* applicationId: _this.applicationId,
|
|
25
|
+
* comment: pulumi.interpolate`PAT on behalf of ${_this.displayName}`,
|
|
26
|
+
* lifetimeSeconds: 3600,
|
|
27
|
+
* }, {
|
|
28
|
+
* dependsOn: [tokenUsage],
|
|
29
|
+
* });
|
|
30
|
+
* export const obo = thisOboToken.tokenValue;
|
|
31
|
+
* ```
|
|
32
|
+
*
|
|
33
|
+
* Creating a token for a service principal with admin privileges
|
|
34
|
+
*
|
|
35
|
+
* ```typescript
|
|
36
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
37
|
+
* import * as databricks from "@pulumi/databricks";
|
|
38
|
+
*
|
|
39
|
+
* const _this = new databricks.ServicePrincipal("this", {displayName: "Pulumi"});
|
|
40
|
+
* const admins = databricks.getGroup({
|
|
41
|
+
* displayName: "admins",
|
|
42
|
+
* });
|
|
43
|
+
* const thisGroupMember = new databricks.GroupMember("this", {
|
|
44
|
+
* groupId: admins.then(admins => admins.id),
|
|
45
|
+
* memberId: _this.id,
|
|
46
|
+
* });
|
|
47
|
+
* const thisOboToken = new databricks.OboToken("this", {
|
|
48
|
+
* applicationId: _this.applicationId,
|
|
49
|
+
* comment: pulumi.interpolate`PAT on behalf of ${_this.displayName}`,
|
|
50
|
+
* lifetimeSeconds: 3600,
|
|
51
|
+
* }, {
|
|
52
|
+
* dependsOn: [thisGroupMember],
|
|
53
|
+
* });
|
|
54
|
+
* ```
|
|
55
|
+
*
|
|
56
|
+
* ## Related Resources
|
|
57
|
+
*
|
|
58
|
+
* The following resources are often used in the same context:
|
|
59
|
+
*
|
|
60
|
+
* * End to end workspace management guide.
|
|
61
|
+
* * databricks.Group data to retrieve information about databricks.Group members, entitlements and instance profiles.
|
|
62
|
+
* * databricks.GroupMember to attach users and groups as group members.
|
|
63
|
+
* * databricks.Permissions to manage [access control](https://docs.databricks.com/security/access-control/index.html) in Databricks workspace.
|
|
64
|
+
* * databricks.ServicePrincipal to manage [Service Principals](https://docs.databricks.com/administration-guide/users-groups/service-principals.html) that could be added to databricks.Group within workspace.
|
|
65
|
+
* * databricks.SqlPermissions to manage data object access control lists in Databricks workspaces for things like tables, views, databases, and [more](https://docs.databricks.com/security/access-control/table-acls/object-privileges.html).
|
|
66
|
+
*
|
|
3
67
|
* ## Import
|
|
4
68
|
*
|
|
5
69
|
* -> **Note** Importing this resource is not currently supported.
|
package/oboToken.js
CHANGED
|
@@ -6,6 +6,70 @@ exports.OboToken = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* This resource creates [On-Behalf-Of tokens](https://docs.databricks.com/administration-guide/users-groups/service-principals.html#manage-personal-access-tokens-for-a-service-principal) for a databricks.ServicePrincipal in Databricks workspaces on AWS. It is very useful, when you want to provision resources within a workspace through narrowly-scoped service principal, that has no access to other workspaces within the same Databricks Account.
|
|
10
|
+
*
|
|
11
|
+
* ## Example Usage
|
|
12
|
+
*
|
|
13
|
+
* Creating a token for a narrowly-scoped service principal, that would be the only one (besides admins) allowed to use PAT token in this given workspace, keeping your automated deployment highly secure.
|
|
14
|
+
*
|
|
15
|
+
* > **Note** A given declaration of `databricks_permissions.token_usage` would OVERWRITE permissions to use PAT tokens from any existing groups with token usage permissions such as the `users` group. To avoid this, be sure to include any desired groups in additional `accessControl` blocks in the Pulumi configuration file.
|
|
16
|
+
*
|
|
17
|
+
* ```typescript
|
|
18
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
19
|
+
* import * as databricks from "@pulumi/databricks";
|
|
20
|
+
*
|
|
21
|
+
* const _this = new databricks.ServicePrincipal("this", {displayName: "Automation-only SP"});
|
|
22
|
+
* const tokenUsage = new databricks.Permissions("token_usage", {
|
|
23
|
+
* authorization: "tokens",
|
|
24
|
+
* accessControls: [{
|
|
25
|
+
* servicePrincipalName: _this.applicationId,
|
|
26
|
+
* permissionLevel: "CAN_USE",
|
|
27
|
+
* }],
|
|
28
|
+
* });
|
|
29
|
+
* const thisOboToken = new databricks.OboToken("this", {
|
|
30
|
+
* applicationId: _this.applicationId,
|
|
31
|
+
* comment: pulumi.interpolate`PAT on behalf of ${_this.displayName}`,
|
|
32
|
+
* lifetimeSeconds: 3600,
|
|
33
|
+
* }, {
|
|
34
|
+
* dependsOn: [tokenUsage],
|
|
35
|
+
* });
|
|
36
|
+
* export const obo = thisOboToken.tokenValue;
|
|
37
|
+
* ```
|
|
38
|
+
*
|
|
39
|
+
* Creating a token for a service principal with admin privileges
|
|
40
|
+
*
|
|
41
|
+
* ```typescript
|
|
42
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
43
|
+
* import * as databricks from "@pulumi/databricks";
|
|
44
|
+
*
|
|
45
|
+
* const _this = new databricks.ServicePrincipal("this", {displayName: "Pulumi"});
|
|
46
|
+
* const admins = databricks.getGroup({
|
|
47
|
+
* displayName: "admins",
|
|
48
|
+
* });
|
|
49
|
+
* const thisGroupMember = new databricks.GroupMember("this", {
|
|
50
|
+
* groupId: admins.then(admins => admins.id),
|
|
51
|
+
* memberId: _this.id,
|
|
52
|
+
* });
|
|
53
|
+
* const thisOboToken = new databricks.OboToken("this", {
|
|
54
|
+
* applicationId: _this.applicationId,
|
|
55
|
+
* comment: pulumi.interpolate`PAT on behalf of ${_this.displayName}`,
|
|
56
|
+
* lifetimeSeconds: 3600,
|
|
57
|
+
* }, {
|
|
58
|
+
* dependsOn: [thisGroupMember],
|
|
59
|
+
* });
|
|
60
|
+
* ```
|
|
61
|
+
*
|
|
62
|
+
* ## Related Resources
|
|
63
|
+
*
|
|
64
|
+
* The following resources are often used in the same context:
|
|
65
|
+
*
|
|
66
|
+
* * End to end workspace management guide.
|
|
67
|
+
* * databricks.Group data to retrieve information about databricks.Group members, entitlements and instance profiles.
|
|
68
|
+
* * databricks.GroupMember to attach users and groups as group members.
|
|
69
|
+
* * databricks.Permissions to manage [access control](https://docs.databricks.com/security/access-control/index.html) in Databricks workspace.
|
|
70
|
+
* * databricks.ServicePrincipal to manage [Service Principals](https://docs.databricks.com/administration-guide/users-groups/service-principals.html) that could be added to databricks.Group within workspace.
|
|
71
|
+
* * databricks.SqlPermissions to manage data object access control lists in Databricks workspaces for things like tables, views, databases, and [more](https://docs.databricks.com/security/access-control/table-acls/object-privileges.html).
|
|
72
|
+
*
|
|
9
73
|
* ## Import
|
|
10
74
|
*
|
|
11
75
|
* -> **Note** Importing this resource is not currently supported.
|
package/oboToken.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"oboToken.js","sourceRoot":"","sources":["../oboToken.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"oboToken.js","sourceRoot":"","sources":["../oboToken.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAoEG;AACH,MAAa,QAAS,SAAQ,MAAM,CAAC,cAAc;IAC/C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAqB,EAAE,IAAmC;QACnH,OAAO,IAAI,QAAQ,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC/D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,QAAQ,CAAC,YAAY,CAAC;IACzD,CAAC;IA2BD,YAAY,IAAY,EAAE,WAA0C,EAAE,IAAmC;QACrG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAwC,CAAC;YACvD,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;SACvE;aAAM;YACH,MAAM,IAAI,GAAG,WAAuC,CAAC;YACrD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1D,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,YAAY,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACpD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,YAAY,CAAC,EAAE,CAAC;QAC/D,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,QAAQ,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7D,CAAC;;AA5EL,4BA6EC;AA/DG,gBAAgB;AACO,qBAAY,GAAG,oCAAoC,CAAC"}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/databricks",
|
|
3
|
-
"version": "1.48.0-alpha.
|
|
3
|
+
"version": "1.48.0-alpha.1722058383",
|
|
4
4
|
"description": "A Pulumi package for creating and managing databricks cloud resources.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"pulumi",
|
|
@@ -24,6 +24,6 @@
|
|
|
24
24
|
"pulumi": {
|
|
25
25
|
"resource": true,
|
|
26
26
|
"name": "databricks",
|
|
27
|
-
"version": "1.48.0-alpha.
|
|
27
|
+
"version": "1.48.0-alpha.1722058383"
|
|
28
28
|
}
|
|
29
29
|
}
|
|
@@ -98,6 +98,9 @@ export declare class PermissionAssignment extends pulumi.CustomResource {
|
|
|
98
98
|
* * `"ADMIN"` - Can access the workspace and has workspace admin privileges to manage users and groups, workspace configurations, and more.
|
|
99
99
|
*/
|
|
100
100
|
readonly permissions: pulumi.Output<string[]>;
|
|
101
|
+
/**
|
|
102
|
+
* Databricks ID of the user, service principal, or group. The principal ID can be retrieved using the account-level SCIM API, or using databricks_user, databricks.ServicePrincipal or databricks.Group data sources with account API (and has to be an account admin). A more sensible approach is to retrieve the list of `principalId` as outputs from another Pulumi stack.
|
|
103
|
+
*/
|
|
101
104
|
readonly principalId: pulumi.Output<string>;
|
|
102
105
|
/**
|
|
103
106
|
* Create a PermissionAssignment resource with the given unique name, arguments, and options.
|
|
@@ -118,6 +121,9 @@ export interface PermissionAssignmentState {
|
|
|
118
121
|
* * `"ADMIN"` - Can access the workspace and has workspace admin privileges to manage users and groups, workspace configurations, and more.
|
|
119
122
|
*/
|
|
120
123
|
permissions?: pulumi.Input<pulumi.Input<string>[]>;
|
|
124
|
+
/**
|
|
125
|
+
* Databricks ID of the user, service principal, or group. The principal ID can be retrieved using the account-level SCIM API, or using databricks_user, databricks.ServicePrincipal or databricks.Group data sources with account API (and has to be an account admin). A more sensible approach is to retrieve the list of `principalId` as outputs from another Pulumi stack.
|
|
126
|
+
*/
|
|
121
127
|
principalId?: pulumi.Input<string>;
|
|
122
128
|
}
|
|
123
129
|
/**
|
|
@@ -130,5 +136,8 @@ export interface PermissionAssignmentArgs {
|
|
|
130
136
|
* * `"ADMIN"` - Can access the workspace and has workspace admin privileges to manage users and groups, workspace configurations, and more.
|
|
131
137
|
*/
|
|
132
138
|
permissions: pulumi.Input<pulumi.Input<string>[]>;
|
|
139
|
+
/**
|
|
140
|
+
* Databricks ID of the user, service principal, or group. The principal ID can be retrieved using the account-level SCIM API, or using databricks_user, databricks.ServicePrincipal or databricks.Group data sources with account API (and has to be an account admin). A more sensible approach is to retrieve the list of `principalId` as outputs from another Pulumi stack.
|
|
141
|
+
*/
|
|
133
142
|
principalId: pulumi.Input<string>;
|
|
134
143
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"permissionAssignment.js","sourceRoot":"","sources":["../permissionAssignment.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4EG;AACH,MAAa,oBAAqB,SAAQ,MAAM,CAAC,cAAc;IAC3D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAiC,EAAE,IAAmC;QAC/H,OAAO,IAAI,oBAAoB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC3E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,oBAAoB,CAAC,YAAY,CAAC;IACrE,CAAC;
|
|
1
|
+
{"version":3,"file":"permissionAssignment.js","sourceRoot":"","sources":["../permissionAssignment.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4EG;AACH,MAAa,oBAAqB,SAAQ,MAAM,CAAC,cAAc;IAC3D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAiC,EAAE,IAAmC;QAC/H,OAAO,IAAI,oBAAoB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC3E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,oBAAoB,CAAC,YAAY,CAAC;IACrE,CAAC;IAqBD,YAAY,IAAY,EAAE,WAAkE,EAAE,IAAmC;QAC7H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAoD,CAAC;YACnE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACzE;aAAM;YACH,MAAM,IAAI,GAAG,WAAmD,CAAC;YACjE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACvE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,oBAAoB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACzE,CAAC;;AAnEL,oDAoEC;AAtDG,gBAAgB;AACO,iCAAY,GAAG,4DAA4D,CAAC"}
|