@pulumi/databricks 1.63.0-alpha.1741493998 → 1.63.0-alpha.1741837019
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/accessControlRuleSet.d.ts +41 -0
- package/accessControlRuleSet.js +38 -0
- package/accessControlRuleSet.js.map +1 -1
- package/app.d.ts +15 -0
- package/app.js.map +1 -1
- package/budgetPolicy.d.ts +5 -1
- package/budgetPolicy.js +5 -1
- package/budgetPolicy.js.map +1 -1
- package/grants.d.ts +9 -7
- package/grants.js +9 -7
- package/grants.js.map +1 -1
- package/package.json +2 -2
- package/systemSchema.d.ts +4 -0
- package/systemSchema.js +4 -0
- package/systemSchema.js.map +1 -1
- package/types/input.d.ts +3 -1
- package/types/output.d.ts +15 -1
|
@@ -157,6 +157,44 @@ import * as outputs from "./types/output";
|
|
|
157
157
|
* });
|
|
158
158
|
* ```
|
|
159
159
|
*
|
|
160
|
+
* ## Budget policy usage
|
|
161
|
+
*
|
|
162
|
+
* Access to budget policies could be controlled with this resource:
|
|
163
|
+
*
|
|
164
|
+
* ```typescript
|
|
165
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
166
|
+
* import * as databricks from "@pulumi/databricks";
|
|
167
|
+
*
|
|
168
|
+
* const accountId = "00000000-0000-0000-0000-000000000000";
|
|
169
|
+
* // account level group
|
|
170
|
+
* const ds = databricks.getGroup({
|
|
171
|
+
* displayName: "Data Science",
|
|
172
|
+
* });
|
|
173
|
+
* const john = databricks.getUser({
|
|
174
|
+
* userName: "john.doe@example.com",
|
|
175
|
+
* });
|
|
176
|
+
* const _this = new databricks.BudgetPolicy("this", {
|
|
177
|
+
* policyName: "data-science-budget-policy",
|
|
178
|
+
* customTags: [{
|
|
179
|
+
* key: "mykey",
|
|
180
|
+
* value: "myvalue",
|
|
181
|
+
* }],
|
|
182
|
+
* });
|
|
183
|
+
* const budgetPolicyUsage = new databricks.AccessControlRuleSet("budget_policy_usage", {
|
|
184
|
+
* name: pulumi.interpolate`accounts/${accountId}/budgetPolicies/${_this.policyId}/ruleSets/default`,
|
|
185
|
+
* grantRules: [
|
|
186
|
+
* {
|
|
187
|
+
* principals: [john.then(john => john.aclPrincipalId)],
|
|
188
|
+
* role: "roles/budgetPolicy.manager",
|
|
189
|
+
* },
|
|
190
|
+
* {
|
|
191
|
+
* principals: [ds.then(ds => ds.aclPrincipalId)],
|
|
192
|
+
* role: "roles/budgetPolicy.user",
|
|
193
|
+
* },
|
|
194
|
+
* ],
|
|
195
|
+
* });
|
|
196
|
+
* ```
|
|
197
|
+
*
|
|
160
198
|
* ## Related Resources
|
|
161
199
|
*
|
|
162
200
|
* The following resources are often used in the same context:
|
|
@@ -193,6 +231,7 @@ export declare class AccessControlRuleSet extends pulumi.CustomResource {
|
|
|
193
231
|
* * `accounts/{account_id}/servicePrincipals/{service_principal_application_id}/ruleSets/default`
|
|
194
232
|
* * `accounts/{account_id}/groups/{group_id}/ruleSets/default`
|
|
195
233
|
* * `accounts/{account_id}/ruleSets/default`
|
|
234
|
+
* * `accounts/{account_id}/budgetPolicies/{budget_policy_id}/ruleSets/default`
|
|
196
235
|
*/
|
|
197
236
|
readonly name: pulumi.Output<string>;
|
|
198
237
|
/**
|
|
@@ -220,6 +259,7 @@ export interface AccessControlRuleSetState {
|
|
|
220
259
|
* * `accounts/{account_id}/servicePrincipals/{service_principal_application_id}/ruleSets/default`
|
|
221
260
|
* * `accounts/{account_id}/groups/{group_id}/ruleSets/default`
|
|
222
261
|
* * `accounts/{account_id}/ruleSets/default`
|
|
262
|
+
* * `accounts/{account_id}/budgetPolicies/{budget_policy_id}/ruleSets/default`
|
|
223
263
|
*/
|
|
224
264
|
name?: pulumi.Input<string>;
|
|
225
265
|
}
|
|
@@ -238,6 +278,7 @@ export interface AccessControlRuleSetArgs {
|
|
|
238
278
|
* * `accounts/{account_id}/servicePrincipals/{service_principal_application_id}/ruleSets/default`
|
|
239
279
|
* * `accounts/{account_id}/groups/{group_id}/ruleSets/default`
|
|
240
280
|
* * `accounts/{account_id}/ruleSets/default`
|
|
281
|
+
* * `accounts/{account_id}/budgetPolicies/{budget_policy_id}/ruleSets/default`
|
|
241
282
|
*/
|
|
242
283
|
name?: pulumi.Input<string>;
|
|
243
284
|
}
|
package/accessControlRuleSet.js
CHANGED
|
@@ -161,6 +161,44 @@ const utilities = require("./utilities");
|
|
|
161
161
|
* });
|
|
162
162
|
* ```
|
|
163
163
|
*
|
|
164
|
+
* ## Budget policy usage
|
|
165
|
+
*
|
|
166
|
+
* Access to budget policies could be controlled with this resource:
|
|
167
|
+
*
|
|
168
|
+
* ```typescript
|
|
169
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
170
|
+
* import * as databricks from "@pulumi/databricks";
|
|
171
|
+
*
|
|
172
|
+
* const accountId = "00000000-0000-0000-0000-000000000000";
|
|
173
|
+
* // account level group
|
|
174
|
+
* const ds = databricks.getGroup({
|
|
175
|
+
* displayName: "Data Science",
|
|
176
|
+
* });
|
|
177
|
+
* const john = databricks.getUser({
|
|
178
|
+
* userName: "john.doe@example.com",
|
|
179
|
+
* });
|
|
180
|
+
* const _this = new databricks.BudgetPolicy("this", {
|
|
181
|
+
* policyName: "data-science-budget-policy",
|
|
182
|
+
* customTags: [{
|
|
183
|
+
* key: "mykey",
|
|
184
|
+
* value: "myvalue",
|
|
185
|
+
* }],
|
|
186
|
+
* });
|
|
187
|
+
* const budgetPolicyUsage = new databricks.AccessControlRuleSet("budget_policy_usage", {
|
|
188
|
+
* name: pulumi.interpolate`accounts/${accountId}/budgetPolicies/${_this.policyId}/ruleSets/default`,
|
|
189
|
+
* grantRules: [
|
|
190
|
+
* {
|
|
191
|
+
* principals: [john.then(john => john.aclPrincipalId)],
|
|
192
|
+
* role: "roles/budgetPolicy.manager",
|
|
193
|
+
* },
|
|
194
|
+
* {
|
|
195
|
+
* principals: [ds.then(ds => ds.aclPrincipalId)],
|
|
196
|
+
* role: "roles/budgetPolicy.user",
|
|
197
|
+
* },
|
|
198
|
+
* ],
|
|
199
|
+
* });
|
|
200
|
+
* ```
|
|
201
|
+
*
|
|
164
202
|
* ## Related Resources
|
|
165
203
|
*
|
|
166
204
|
* The following resources are often used in the same context:
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"accessControlRuleSet.js","sourceRoot":"","sources":["../accessControlRuleSet.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"accessControlRuleSet.js","sourceRoot":"","sources":["../accessControlRuleSet.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAyMG;AACH,MAAa,oBAAqB,SAAQ,MAAM,CAAC,cAAc;IAC3D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAiC,EAAE,IAAmC;QAC/H,OAAO,IAAI,oBAAoB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC3E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,oBAAoB,CAAC,YAAY,CAAC;IACrE,CAAC;IA0BD,YAAY,IAAY,EAAE,WAAkE,EAAE,IAAmC;QAC7H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAoD,CAAC;YACnE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;aAAM;YACH,MAAM,IAAI,GAAG,WAAmD,CAAC;YACjE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC9C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,oBAAoB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACzE,CAAC;;AApEL,oDAqEC;AAvDG,gBAAgB;AACO,iCAAY,GAAG,4DAA4D,CAAC"}
|
package/app.d.ts
CHANGED
|
@@ -49,6 +49,9 @@ export declare class App extends pulumi.CustomResource {
|
|
|
49
49
|
* attribute
|
|
50
50
|
*/
|
|
51
51
|
readonly appStatus: pulumi.Output<outputs.AppAppStatus>;
|
|
52
|
+
/**
|
|
53
|
+
* The optional Budget Policy ID set for this resource.
|
|
54
|
+
*/
|
|
52
55
|
readonly budgetPolicyId: pulumi.Output<string | undefined>;
|
|
53
56
|
/**
|
|
54
57
|
* attribute
|
|
@@ -70,6 +73,9 @@ export declare class App extends pulumi.CustomResource {
|
|
|
70
73
|
* The description of the app.
|
|
71
74
|
*/
|
|
72
75
|
readonly description: pulumi.Output<string | undefined>;
|
|
76
|
+
/**
|
|
77
|
+
* The effective budget policy ID.
|
|
78
|
+
*/
|
|
73
79
|
readonly effectiveBudgetPolicyId: pulumi.Output<string>;
|
|
74
80
|
/**
|
|
75
81
|
* The name of the app. The name must contain only lowercase alphanumeric characters and hyphens. It must be unique within the workspace.
|
|
@@ -120,6 +126,9 @@ export interface AppState {
|
|
|
120
126
|
* attribute
|
|
121
127
|
*/
|
|
122
128
|
appStatus?: pulumi.Input<inputs.AppAppStatus>;
|
|
129
|
+
/**
|
|
130
|
+
* The optional Budget Policy ID set for this resource.
|
|
131
|
+
*/
|
|
123
132
|
budgetPolicyId?: pulumi.Input<string>;
|
|
124
133
|
/**
|
|
125
134
|
* attribute
|
|
@@ -141,6 +150,9 @@ export interface AppState {
|
|
|
141
150
|
* The description of the app.
|
|
142
151
|
*/
|
|
143
152
|
description?: pulumi.Input<string>;
|
|
153
|
+
/**
|
|
154
|
+
* The effective budget policy ID.
|
|
155
|
+
*/
|
|
144
156
|
effectiveBudgetPolicyId?: pulumi.Input<string>;
|
|
145
157
|
/**
|
|
146
158
|
* The name of the app. The name must contain only lowercase alphanumeric characters and hyphens. It must be unique within the workspace.
|
|
@@ -178,6 +190,9 @@ export interface AppState {
|
|
|
178
190
|
* The set of arguments for constructing a App resource.
|
|
179
191
|
*/
|
|
180
192
|
export interface AppArgs {
|
|
193
|
+
/**
|
|
194
|
+
* The optional Budget Policy ID set for this resource.
|
|
195
|
+
*/
|
|
181
196
|
budgetPolicyId?: pulumi.Input<string>;
|
|
182
197
|
/**
|
|
183
198
|
* The description of the app.
|
package/app.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"app.js","sourceRoot":"","sources":["../app.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;GA0BG;AACH,MAAa,GAAI,SAAQ,MAAM,CAAC,cAAc;IAC1C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAgB,EAAE,IAAmC;QAC9G,OAAO,IAAI,GAAG,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC1D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,GAAG,CAAC,YAAY,CAAC;IACpD,CAAC;
|
|
1
|
+
{"version":3,"file":"app.js","sourceRoot":"","sources":["../app.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;GA0BG;AACH,MAAa,GAAI,SAAQ,MAAM,CAAC,cAAc;IAC1C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAgB,EAAE,IAAmC;QAC9G,OAAO,IAAI,GAAG,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC1D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,GAAG,CAAC,YAAY,CAAC;IACpD,CAAC;IA2ED,YAAY,IAAY,EAAE,WAAgC,EAAE,IAAmC;QAC3F,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAmC,CAAC;YAClD,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;aAAM;YACH,MAAM,IAAI,GAAG,WAAkC,CAAC;YAChD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,kBAAkB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACvD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,eAAe,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACpD,cAAc,CAAC,YAAY,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACjD,cAAc,CAAC,SAAS,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC9C,cAAc,CAAC,uBAAuB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC5D,cAAc,CAAC,yBAAyB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC9D,cAAc,CAAC,mBAAmB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACxD,cAAc,CAAC,0BAA0B,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC/D,cAAc,CAAC,oBAAoB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACzD,cAAc,CAAC,sBAAsB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC3D,cAAc,CAAC,YAAY,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACjD,cAAc,CAAC,SAAS,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC9C,cAAc,CAAC,KAAK,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC7C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,GAAG,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACxD,CAAC;;AArJL,kBAsJC;AAxIG,gBAAgB;AACO,gBAAY,GAAG,0BAA0B,CAAC"}
|
package/budgetPolicy.d.ts
CHANGED
|
@@ -4,7 +4,7 @@ import * as outputs from "./types/output";
|
|
|
4
4
|
/**
|
|
5
5
|
* Administrators can use budget policies to ensure that the correct tags appear automatically on serverless resources without depending on users to attach tags manually, allowing for customized cost reporting and chargebacks. Budget policies consist of tags that are applied to any serverless compute activity incurred by a user assigned to the policy. The tags are logged in your billing records, allowing you to attribute serverless usage to specific budgets.
|
|
6
6
|
*
|
|
7
|
-
* >
|
|
7
|
+
* > This resource can only be used with an account-level provider!
|
|
8
8
|
*
|
|
9
9
|
* ## Example Usage
|
|
10
10
|
*
|
|
@@ -21,6 +21,10 @@ import * as outputs from "./types/output";
|
|
|
21
21
|
* });
|
|
22
22
|
* ```
|
|
23
23
|
*
|
|
24
|
+
* ## Access Control
|
|
25
|
+
*
|
|
26
|
+
* * databricks.AccessControlRuleSet can control which groups or individual users can manage or use the given budget policy.
|
|
27
|
+
*
|
|
24
28
|
* ## Import
|
|
25
29
|
*
|
|
26
30
|
* This resource can be imported by ID.
|
package/budgetPolicy.js
CHANGED
|
@@ -8,7 +8,7 @@ const utilities = require("./utilities");
|
|
|
8
8
|
/**
|
|
9
9
|
* Administrators can use budget policies to ensure that the correct tags appear automatically on serverless resources without depending on users to attach tags manually, allowing for customized cost reporting and chargebacks. Budget policies consist of tags that are applied to any serverless compute activity incurred by a user assigned to the policy. The tags are logged in your billing records, allowing you to attribute serverless usage to specific budgets.
|
|
10
10
|
*
|
|
11
|
-
* >
|
|
11
|
+
* > This resource can only be used with an account-level provider!
|
|
12
12
|
*
|
|
13
13
|
* ## Example Usage
|
|
14
14
|
*
|
|
@@ -25,6 +25,10 @@ const utilities = require("./utilities");
|
|
|
25
25
|
* });
|
|
26
26
|
* ```
|
|
27
27
|
*
|
|
28
|
+
* ## Access Control
|
|
29
|
+
*
|
|
30
|
+
* * databricks.AccessControlRuleSet can control which groups or individual users can manage or use the given budget policy.
|
|
31
|
+
*
|
|
28
32
|
* ## Import
|
|
29
33
|
*
|
|
30
34
|
* This resource can be imported by ID.
|
package/budgetPolicy.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"budgetPolicy.js","sourceRoot":"","sources":["../budgetPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"budgetPolicy.js","sourceRoot":"","sources":["../budgetPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+BG;AACH,MAAa,YAAa,SAAQ,MAAM,CAAC,cAAc;IACnD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAyB,EAAE,IAAmC;QACvH,OAAO,IAAI,YAAY,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACnE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,YAAY,CAAC,YAAY,CAAC;IAC7D,CAAC;IAuBD,YAAY,IAAY,EAAE,WAAkD,EAAE,IAAmC;QAC7G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA4C,CAAC;YAC3D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;SACvE;aAAM;YACH,MAAM,IAAI,GAAG,WAA2C,CAAC;YACzD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAClD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,YAAY,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACjE,CAAC;;AAjEL,oCAkEC;AApDG,gBAAgB;AACO,yBAAY,GAAG,4CAA4C,CAAC"}
|
package/grants.d.ts
CHANGED
|
@@ -8,7 +8,7 @@ import * as outputs from "./types/output";
|
|
|
8
8
|
*
|
|
9
9
|
* Two different resources help you manage your Unity Catalog grants for a securable. Each of these resources serves a different use case:
|
|
10
10
|
*
|
|
11
|
-
* - databricks_grants: Authoritative. Sets the grants of a securable and replaces any existing grants defined inside or outside of Pulumi.
|
|
11
|
+
* - databricks_grants: Authoritative. Sets the grants of a securable and *replaces* any existing grants defined inside or outside of Pulumi.
|
|
12
12
|
* - databricks_grant: Authoritative for a given principal. Updates the grants of a securable to a single principal. Other principals within the grants for the securables are preserved.
|
|
13
13
|
*
|
|
14
14
|
* In Unity Catalog all users initially have no access to data. Only Metastore Admins can create objects and can grant/revoke access on individual objects to users and groups. Every securable object in Unity Catalog has an owner. The owner can be any account-level user or group, called principals in general. The principal that creates an object becomes its owner. Owners receive `ALL_PRIVILEGES` on the securable object (e.g., `SELECT` and `MODIFY` on a table), as well as the permission to grant privileges to other principals.
|
|
@@ -24,6 +24,8 @@ import * as outputs from "./types/output";
|
|
|
24
24
|
*
|
|
25
25
|
* Pulumi will handle any configuration drift on every `pulumi up` run, even when grants are changed outside of Pulumi state.
|
|
26
26
|
*
|
|
27
|
+
* When applying grants using an identity with [`MANAGE` permission](https://docs.databricks.com/aws/en/data-governance/unity-catalog/manage-privileges/ownership#ownership-versus-the-manage-privilege), their `MANAGE` permission must also be defined, otherwise Pulumi will remove their permissions, leading to errors.
|
|
28
|
+
*
|
|
27
29
|
* Unlike the [SQL specification](https://docs.databricks.com/sql/language-manual/sql-ref-privileges.html#privilege-types), all privileges to be written with underscore instead of space, e.g. `CREATE_TABLE` and not `CREATE TABLE`. Below summarizes which privilege types apply to each securable object in the catalog:
|
|
28
30
|
*
|
|
29
31
|
* ## Metastore grants
|
|
@@ -106,7 +108,7 @@ import * as outputs from "./types/output";
|
|
|
106
108
|
*
|
|
107
109
|
* ## Schema grants
|
|
108
110
|
*
|
|
109
|
-
* You can grant `ALL_PRIVILEGES`, `APPLY_TAG`, `CREATE_FUNCTION`, `CREATE_TABLE`, `CREATE_VOLUME`, `MANAGE` and `USE_SCHEMA` privileges to
|
|
111
|
+
* You can grant `ALL_PRIVILEGES`, `APPLY_TAG`, `CREATE_FUNCTION`, `CREATE_TABLE`, `CREATE_VOLUME`, `MANAGE` and `USE_SCHEMA` privileges to *`catalog.schema`* specified in the `schema` attribute. You can also grant `EXECUTE`, `MODIFY`, `REFRESH`, `SELECT`, `READ_VOLUME`, `WRITE_VOLUME` at the schema level to apply them to the pertinent current and future securable objects within the schema:
|
|
110
112
|
*
|
|
111
113
|
* ```typescript
|
|
112
114
|
* import * as pulumi from "@pulumi/pulumi";
|
|
@@ -134,7 +136,7 @@ import * as outputs from "./types/output";
|
|
|
134
136
|
*
|
|
135
137
|
* ## Table grants
|
|
136
138
|
*
|
|
137
|
-
* You can grant `ALL_PRIVILEGES`, `APPLY_TAG`, `MANAGE`, `SELECT` and `MODIFY` privileges to
|
|
139
|
+
* You can grant `ALL_PRIVILEGES`, `APPLY_TAG`, `MANAGE`, `SELECT` and `MODIFY` privileges to *`catalog.schema.table`* specified in the `table` attribute.
|
|
138
140
|
*
|
|
139
141
|
* ```typescript
|
|
140
142
|
* import * as pulumi from "@pulumi/pulumi";
|
|
@@ -187,7 +189,7 @@ import * as outputs from "./types/output";
|
|
|
187
189
|
*
|
|
188
190
|
* ## View grants
|
|
189
191
|
*
|
|
190
|
-
* You can grant `ALL_PRIVILEGES`, `APPLY_TAG`, `MANAGE` and `SELECT` privileges to
|
|
192
|
+
* You can grant `ALL_PRIVILEGES`, `APPLY_TAG`, `MANAGE` and `SELECT` privileges to *`catalog.schema.view`* specified in `table` attribute.
|
|
191
193
|
*
|
|
192
194
|
* ```typescript
|
|
193
195
|
* import * as pulumi from "@pulumi/pulumi";
|
|
@@ -231,7 +233,7 @@ import * as outputs from "./types/output";
|
|
|
231
233
|
*
|
|
232
234
|
* ## Volume grants
|
|
233
235
|
*
|
|
234
|
-
* You can grant `ALL_PRIVILEGES`, `MANAGE`, `READ_VOLUME` and `WRITE_VOLUME` privileges to
|
|
236
|
+
* You can grant `ALL_PRIVILEGES`, `MANAGE`, `READ_VOLUME` and `WRITE_VOLUME` privileges to *`catalog.schema.volume`* specified in the `volume` attribute.
|
|
235
237
|
*
|
|
236
238
|
* ```typescript
|
|
237
239
|
* import * as pulumi from "@pulumi/pulumi";
|
|
@@ -256,7 +258,7 @@ import * as outputs from "./types/output";
|
|
|
256
258
|
*
|
|
257
259
|
* ## Registered model grants
|
|
258
260
|
*
|
|
259
|
-
* You can grant `ALL_PRIVILEGES`, `APPLY_TAG`, `EXECUTE`, and `MANAGE` privileges to
|
|
261
|
+
* You can grant `ALL_PRIVILEGES`, `APPLY_TAG`, `EXECUTE`, and `MANAGE` privileges to *`catalog.schema.model`* specified in the `model` attribute.
|
|
260
262
|
*
|
|
261
263
|
* ```typescript
|
|
262
264
|
* import * as pulumi from "@pulumi/pulumi";
|
|
@@ -282,7 +284,7 @@ import * as outputs from "./types/output";
|
|
|
282
284
|
*
|
|
283
285
|
* ## Function grants
|
|
284
286
|
*
|
|
285
|
-
* You can grant `ALL_PRIVILEGES`, `EXECUTE`, and `MANAGE` privileges to
|
|
287
|
+
* You can grant `ALL_PRIVILEGES`, `EXECUTE`, and `MANAGE` privileges to *`catalog.schema.function`* specified in the `function` attribute.
|
|
286
288
|
*
|
|
287
289
|
* ```typescript
|
|
288
290
|
* import * as pulumi from "@pulumi/pulumi";
|
package/grants.js
CHANGED
|
@@ -12,7 +12,7 @@ const utilities = require("./utilities");
|
|
|
12
12
|
*
|
|
13
13
|
* Two different resources help you manage your Unity Catalog grants for a securable. Each of these resources serves a different use case:
|
|
14
14
|
*
|
|
15
|
-
* - databricks_grants: Authoritative. Sets the grants of a securable and replaces any existing grants defined inside or outside of Pulumi.
|
|
15
|
+
* - databricks_grants: Authoritative. Sets the grants of a securable and *replaces* any existing grants defined inside or outside of Pulumi.
|
|
16
16
|
* - databricks_grant: Authoritative for a given principal. Updates the grants of a securable to a single principal. Other principals within the grants for the securables are preserved.
|
|
17
17
|
*
|
|
18
18
|
* In Unity Catalog all users initially have no access to data. Only Metastore Admins can create objects and can grant/revoke access on individual objects to users and groups. Every securable object in Unity Catalog has an owner. The owner can be any account-level user or group, called principals in general. The principal that creates an object becomes its owner. Owners receive `ALL_PRIVILEGES` on the securable object (e.g., `SELECT` and `MODIFY` on a table), as well as the permission to grant privileges to other principals.
|
|
@@ -28,6 +28,8 @@ const utilities = require("./utilities");
|
|
|
28
28
|
*
|
|
29
29
|
* Pulumi will handle any configuration drift on every `pulumi up` run, even when grants are changed outside of Pulumi state.
|
|
30
30
|
*
|
|
31
|
+
* When applying grants using an identity with [`MANAGE` permission](https://docs.databricks.com/aws/en/data-governance/unity-catalog/manage-privileges/ownership#ownership-versus-the-manage-privilege), their `MANAGE` permission must also be defined, otherwise Pulumi will remove their permissions, leading to errors.
|
|
32
|
+
*
|
|
31
33
|
* Unlike the [SQL specification](https://docs.databricks.com/sql/language-manual/sql-ref-privileges.html#privilege-types), all privileges to be written with underscore instead of space, e.g. `CREATE_TABLE` and not `CREATE TABLE`. Below summarizes which privilege types apply to each securable object in the catalog:
|
|
32
34
|
*
|
|
33
35
|
* ## Metastore grants
|
|
@@ -110,7 +112,7 @@ const utilities = require("./utilities");
|
|
|
110
112
|
*
|
|
111
113
|
* ## Schema grants
|
|
112
114
|
*
|
|
113
|
-
* You can grant `ALL_PRIVILEGES`, `APPLY_TAG`, `CREATE_FUNCTION`, `CREATE_TABLE`, `CREATE_VOLUME`, `MANAGE` and `USE_SCHEMA` privileges to
|
|
115
|
+
* You can grant `ALL_PRIVILEGES`, `APPLY_TAG`, `CREATE_FUNCTION`, `CREATE_TABLE`, `CREATE_VOLUME`, `MANAGE` and `USE_SCHEMA` privileges to *`catalog.schema`* specified in the `schema` attribute. You can also grant `EXECUTE`, `MODIFY`, `REFRESH`, `SELECT`, `READ_VOLUME`, `WRITE_VOLUME` at the schema level to apply them to the pertinent current and future securable objects within the schema:
|
|
114
116
|
*
|
|
115
117
|
* ```typescript
|
|
116
118
|
* import * as pulumi from "@pulumi/pulumi";
|
|
@@ -138,7 +140,7 @@ const utilities = require("./utilities");
|
|
|
138
140
|
*
|
|
139
141
|
* ## Table grants
|
|
140
142
|
*
|
|
141
|
-
* You can grant `ALL_PRIVILEGES`, `APPLY_TAG`, `MANAGE`, `SELECT` and `MODIFY` privileges to
|
|
143
|
+
* You can grant `ALL_PRIVILEGES`, `APPLY_TAG`, `MANAGE`, `SELECT` and `MODIFY` privileges to *`catalog.schema.table`* specified in the `table` attribute.
|
|
142
144
|
*
|
|
143
145
|
* ```typescript
|
|
144
146
|
* import * as pulumi from "@pulumi/pulumi";
|
|
@@ -191,7 +193,7 @@ const utilities = require("./utilities");
|
|
|
191
193
|
*
|
|
192
194
|
* ## View grants
|
|
193
195
|
*
|
|
194
|
-
* You can grant `ALL_PRIVILEGES`, `APPLY_TAG`, `MANAGE` and `SELECT` privileges to
|
|
196
|
+
* You can grant `ALL_PRIVILEGES`, `APPLY_TAG`, `MANAGE` and `SELECT` privileges to *`catalog.schema.view`* specified in `table` attribute.
|
|
195
197
|
*
|
|
196
198
|
* ```typescript
|
|
197
199
|
* import * as pulumi from "@pulumi/pulumi";
|
|
@@ -235,7 +237,7 @@ const utilities = require("./utilities");
|
|
|
235
237
|
*
|
|
236
238
|
* ## Volume grants
|
|
237
239
|
*
|
|
238
|
-
* You can grant `ALL_PRIVILEGES`, `MANAGE`, `READ_VOLUME` and `WRITE_VOLUME` privileges to
|
|
240
|
+
* You can grant `ALL_PRIVILEGES`, `MANAGE`, `READ_VOLUME` and `WRITE_VOLUME` privileges to *`catalog.schema.volume`* specified in the `volume` attribute.
|
|
239
241
|
*
|
|
240
242
|
* ```typescript
|
|
241
243
|
* import * as pulumi from "@pulumi/pulumi";
|
|
@@ -260,7 +262,7 @@ const utilities = require("./utilities");
|
|
|
260
262
|
*
|
|
261
263
|
* ## Registered model grants
|
|
262
264
|
*
|
|
263
|
-
* You can grant `ALL_PRIVILEGES`, `APPLY_TAG`, `EXECUTE`, and `MANAGE` privileges to
|
|
265
|
+
* You can grant `ALL_PRIVILEGES`, `APPLY_TAG`, `EXECUTE`, and `MANAGE` privileges to *`catalog.schema.model`* specified in the `model` attribute.
|
|
264
266
|
*
|
|
265
267
|
* ```typescript
|
|
266
268
|
* import * as pulumi from "@pulumi/pulumi";
|
|
@@ -286,7 +288,7 @@ const utilities = require("./utilities");
|
|
|
286
288
|
*
|
|
287
289
|
* ## Function grants
|
|
288
290
|
*
|
|
289
|
-
* You can grant `ALL_PRIVILEGES`, `EXECUTE`, and `MANAGE` privileges to
|
|
291
|
+
* You can grant `ALL_PRIVILEGES`, `EXECUTE`, and `MANAGE` privileges to *`catalog.schema.function`* specified in the `function` attribute.
|
|
290
292
|
*
|
|
291
293
|
* ```typescript
|
|
292
294
|
* import * as pulumi from "@pulumi/pulumi";
|
package/grants.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"grants.js","sourceRoot":"","sources":["../grants.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"grants.js","sourceRoot":"","sources":["../grants.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAodG;AACH,MAAa,MAAO,SAAQ,MAAM,CAAC,cAAc;IAC7C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmB,EAAE,IAAmC;QACjH,OAAO,IAAI,MAAM,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,MAAM,CAAC,YAAY,CAAC;IACvD,CAAC;IA0BD,YAAY,IAAY,EAAE,WAAsC,EAAE,IAAmC;QACjG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsC,CAAC;YACrD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAAqC,CAAC;YACnD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,MAAM,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3D,CAAC;;AA/FL,wBAgGC;AAlFG,gBAAgB;AACO,mBAAY,GAAG,gCAAgC,CAAC"}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/databricks",
|
|
3
|
-
"version": "1.63.0-alpha.
|
|
3
|
+
"version": "1.63.0-alpha.1741837019",
|
|
4
4
|
"description": "A Pulumi package for creating and managing databricks cloud resources.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"pulumi",
|
|
@@ -24,6 +24,6 @@
|
|
|
24
24
|
"pulumi": {
|
|
25
25
|
"resource": true,
|
|
26
26
|
"name": "databricks",
|
|
27
|
-
"version": "1.63.0-alpha.
|
|
27
|
+
"version": "1.63.0-alpha.1741837019"
|
|
28
28
|
}
|
|
29
29
|
}
|
package/systemSchema.d.ts
CHANGED
|
@@ -4,6 +4,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
4
4
|
*
|
|
5
5
|
* > This resource can only be used with a workspace-level provider!
|
|
6
6
|
*
|
|
7
|
+
* > Certain system schemas (such as `billing`) may be auto-enabled once GA and should not be manually declared in Pulumi configurations.
|
|
8
|
+
*
|
|
7
9
|
* Manages system tables enablement. System tables are a Databricks-hosted analytical store of your account’s operational data. System tables can be used for historical observability across your account. System tables must be enabled by an account admin.
|
|
8
10
|
*
|
|
9
11
|
* ## Example Usage
|
|
@@ -43,6 +45,7 @@ export declare class SystemSchema extends pulumi.CustomResource {
|
|
|
43
45
|
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
44
46
|
*/
|
|
45
47
|
static isInstance(obj: any): obj is SystemSchema;
|
|
48
|
+
readonly autoEnabled: pulumi.Output<boolean>;
|
|
46
49
|
/**
|
|
47
50
|
* the full name of the system schema, in form of `system.<schema>`.
|
|
48
51
|
*/
|
|
@@ -69,6 +72,7 @@ export declare class SystemSchema extends pulumi.CustomResource {
|
|
|
69
72
|
* Input properties used for looking up and filtering SystemSchema resources.
|
|
70
73
|
*/
|
|
71
74
|
export interface SystemSchemaState {
|
|
75
|
+
autoEnabled?: pulumi.Input<boolean>;
|
|
72
76
|
/**
|
|
73
77
|
* the full name of the system schema, in form of `system.<schema>`.
|
|
74
78
|
*/
|
package/systemSchema.js
CHANGED
|
@@ -10,6 +10,8 @@ const utilities = require("./utilities");
|
|
|
10
10
|
*
|
|
11
11
|
* > This resource can only be used with a workspace-level provider!
|
|
12
12
|
*
|
|
13
|
+
* > Certain system schemas (such as `billing`) may be auto-enabled once GA and should not be manually declared in Pulumi configurations.
|
|
14
|
+
*
|
|
13
15
|
* Manages system tables enablement. System tables are a Databricks-hosted analytical store of your account’s operational data. System tables can be used for historical observability across your account. System tables must be enabled by an account admin.
|
|
14
16
|
*
|
|
15
17
|
* ## Example Usage
|
|
@@ -61,6 +63,7 @@ class SystemSchema extends pulumi.CustomResource {
|
|
|
61
63
|
opts = opts || {};
|
|
62
64
|
if (opts.id) {
|
|
63
65
|
const state = argsOrState;
|
|
66
|
+
resourceInputs["autoEnabled"] = state ? state.autoEnabled : undefined;
|
|
64
67
|
resourceInputs["fullName"] = state ? state.fullName : undefined;
|
|
65
68
|
resourceInputs["metastoreId"] = state ? state.metastoreId : undefined;
|
|
66
69
|
resourceInputs["schema"] = state ? state.schema : undefined;
|
|
@@ -70,6 +73,7 @@ class SystemSchema extends pulumi.CustomResource {
|
|
|
70
73
|
const args = argsOrState;
|
|
71
74
|
resourceInputs["schema"] = args ? args.schema : undefined;
|
|
72
75
|
resourceInputs["state"] = args ? args.state : undefined;
|
|
76
|
+
resourceInputs["autoEnabled"] = undefined /*out*/;
|
|
73
77
|
resourceInputs["fullName"] = undefined /*out*/;
|
|
74
78
|
resourceInputs["metastoreId"] = undefined /*out*/;
|
|
75
79
|
}
|
package/systemSchema.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"systemSchema.js","sourceRoot":"","sources":["../systemSchema.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"systemSchema.js","sourceRoot":"","sources":["../systemSchema.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6BG;AACH,MAAa,YAAa,SAAQ,MAAM,CAAC,cAAc;IACnD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAyB,EAAE,IAAmC;QACvH,OAAO,IAAI,YAAY,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACnE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,YAAY,CAAC,YAAY,CAAC;IAC7D,CAAC;IAyBD,YAAY,IAAY,EAAE,WAAkD,EAAE,IAAmC;QAC7G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA4C,CAAC;YAC3D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;aAAM;YACH,MAAM,IAAI,GAAG,WAA2C,CAAC;YACzD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAClD,cAAc,CAAC,UAAU,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC/C,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACrD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,YAAY,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACjE,CAAC;;AAvEL,oCAwEC;AA1DG,gBAAgB;AACO,yBAAY,GAAG,4CAA4C,CAAC"}
|
package/types/input.d.ts
CHANGED
|
@@ -9,11 +9,13 @@ export interface AccessControlRuleSetGrantRule {
|
|
|
9
9
|
*/
|
|
10
10
|
principals?: pulumi.Input<pulumi.Input<string>[]>;
|
|
11
11
|
/**
|
|
12
|
-
* Role to be granted. The supported roles are listed below. For more information about these roles, refer to [service principal roles](https://docs.databricks.com/security/auth-authz/access-control/service-principal-acl.html#service-principal-roles), [group roles](https://docs.databricks.com/en/administration-guide/users-groups/groups.html#manage-roles-on-an-account-group-using-the-workspace-admin-settings-page)
|
|
12
|
+
* Role to be granted. The supported roles are listed below. For more information about these roles, refer to [service principal roles](https://docs.databricks.com/security/auth-authz/access-control/service-principal-acl.html#service-principal-roles), [group roles](https://docs.databricks.com/en/administration-guide/users-groups/groups.html#manage-roles-on-an-account-group-using-the-workspace-admin-settings-page), [marketplace roles](https://docs.databricks.com/en/marketplace/get-started-provider.html#assign-the-marketplace-admin-role) or [budget policy permissions](https://docs.databricks.com/aws/en/admin/usage/budget-policies#manage-budget-policy-permissions).
|
|
13
13
|
* * `roles/servicePrincipal.manager` - Manager of a service principal.
|
|
14
14
|
* * `roles/servicePrincipal.user` - User of a service principal.
|
|
15
15
|
* * `roles/group.manager` - Manager of a group.
|
|
16
16
|
* * `roles/marketplace.admin` - Admin of marketplace.
|
|
17
|
+
* * `roles/budgetPolicy.manager` - Manager of a budget policy.
|
|
18
|
+
* * `roles/budgetPolicy.user` - User of a budget policy.
|
|
17
19
|
*/
|
|
18
20
|
role: pulumi.Input<string>;
|
|
19
21
|
}
|
package/types/output.d.ts
CHANGED
|
@@ -8,11 +8,13 @@ export interface AccessControlRuleSetGrantRule {
|
|
|
8
8
|
*/
|
|
9
9
|
principals?: string[];
|
|
10
10
|
/**
|
|
11
|
-
* Role to be granted. The supported roles are listed below. For more information about these roles, refer to [service principal roles](https://docs.databricks.com/security/auth-authz/access-control/service-principal-acl.html#service-principal-roles), [group roles](https://docs.databricks.com/en/administration-guide/users-groups/groups.html#manage-roles-on-an-account-group-using-the-workspace-admin-settings-page)
|
|
11
|
+
* Role to be granted. The supported roles are listed below. For more information about these roles, refer to [service principal roles](https://docs.databricks.com/security/auth-authz/access-control/service-principal-acl.html#service-principal-roles), [group roles](https://docs.databricks.com/en/administration-guide/users-groups/groups.html#manage-roles-on-an-account-group-using-the-workspace-admin-settings-page), [marketplace roles](https://docs.databricks.com/en/marketplace/get-started-provider.html#assign-the-marketplace-admin-role) or [budget policy permissions](https://docs.databricks.com/aws/en/admin/usage/budget-policies#manage-budget-policy-permissions).
|
|
12
12
|
* * `roles/servicePrincipal.manager` - Manager of a service principal.
|
|
13
13
|
* * `roles/servicePrincipal.user` - User of a service principal.
|
|
14
14
|
* * `roles/group.manager` - Manager of a group.
|
|
15
15
|
* * `roles/marketplace.admin` - Admin of marketplace.
|
|
16
|
+
* * `roles/budgetPolicy.manager` - Manager of a budget policy.
|
|
17
|
+
* * `roles/budgetPolicy.user` - User of a budget policy.
|
|
16
18
|
*/
|
|
17
19
|
role: string;
|
|
18
20
|
}
|
|
@@ -844,6 +846,9 @@ export interface GetAppApp {
|
|
|
844
846
|
* attribute
|
|
845
847
|
*/
|
|
846
848
|
appStatus: outputs.GetAppAppAppStatus;
|
|
849
|
+
/**
|
|
850
|
+
* The Budget Policy ID set for this resource.
|
|
851
|
+
*/
|
|
847
852
|
budgetPolicyId?: string;
|
|
848
853
|
/**
|
|
849
854
|
* attribute
|
|
@@ -865,6 +870,9 @@ export interface GetAppApp {
|
|
|
865
870
|
* The description of the resource.
|
|
866
871
|
*/
|
|
867
872
|
description?: string;
|
|
873
|
+
/**
|
|
874
|
+
* The effective budget policy ID.
|
|
875
|
+
*/
|
|
868
876
|
effectiveBudgetPolicyId: string;
|
|
869
877
|
/**
|
|
870
878
|
* Id of the job to grant permission on.
|
|
@@ -1061,6 +1069,9 @@ export interface GetAppsApp {
|
|
|
1061
1069
|
* attribute
|
|
1062
1070
|
*/
|
|
1063
1071
|
appStatus: outputs.GetAppsAppAppStatus;
|
|
1072
|
+
/**
|
|
1073
|
+
* The Budget Policy ID set for this resource.
|
|
1074
|
+
*/
|
|
1064
1075
|
budgetPolicyId?: string;
|
|
1065
1076
|
/**
|
|
1066
1077
|
* attribute
|
|
@@ -1082,6 +1093,9 @@ export interface GetAppsApp {
|
|
|
1082
1093
|
* The description of the resource.
|
|
1083
1094
|
*/
|
|
1084
1095
|
description?: string;
|
|
1096
|
+
/**
|
|
1097
|
+
* The effective budget policy ID.
|
|
1098
|
+
*/
|
|
1085
1099
|
effectiveBudgetPolicyId: string;
|
|
1086
1100
|
/**
|
|
1087
1101
|
* Id of the job to grant permission on.
|