@pulumi/databricks 1.69.0-alpha.1746077864 → 1.69.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/accessControlRuleSet.d.ts +2 -2
- package/accessControlRuleSet.js +2 -2
- package/aibiDashboardEmbeddingAccessPolicySetting.d.ts +2 -2
- package/aibiDashboardEmbeddingAccessPolicySetting.js +2 -2
- package/aibiDashboardEmbeddingApprovedDomainsSetting.d.ts +2 -2
- package/aibiDashboardEmbeddingApprovedDomainsSetting.js +2 -2
- package/alertV2.d.ts +72 -0
- package/alertV2.js +73 -0
- package/alertV2.js.map +1 -0
- package/app.d.ts +3 -1
- package/app.js +3 -1
- package/app.js.map +1 -1
- package/artifactAllowlist.d.ts +2 -2
- package/artifactAllowlist.js +2 -2
- package/budget.d.ts +2 -2
- package/budget.js +2 -2
- package/catalog.d.ts +2 -2
- package/catalog.js +2 -2
- package/clusterPolicy.d.ts +2 -0
- package/clusterPolicy.js +2 -0
- package/clusterPolicy.js.map +1 -1
- package/config/vars.d.ts +1 -0
- package/config/vars.js +6 -0
- package/config/vars.js.map +1 -1
- package/connection.d.ts +2 -2
- package/connection.js +2 -2
- package/credential.d.ts +2 -2
- package/credential.js +2 -2
- package/customAppIntegration.d.ts +2 -2
- package/customAppIntegration.js +2 -2
- package/dashboard.d.ts +2 -0
- package/dashboard.js +2 -0
- package/dashboard.js.map +1 -1
- package/dbfsFile.d.ts +2 -0
- package/dbfsFile.js +2 -0
- package/dbfsFile.js.map +1 -1
- package/defaultNamespaceSetting.d.ts +2 -1
- package/defaultNamespaceSetting.js +2 -1
- package/defaultNamespaceSetting.js.map +1 -1
- package/directory.d.ts +2 -0
- package/directory.js +2 -0
- package/directory.js.map +1 -1
- package/disableLegacyDbfsSetting.d.ts +3 -3
- package/disableLegacyDbfsSetting.js +3 -3
- package/entitlements.d.ts +2 -0
- package/entitlements.js +2 -0
- package/entitlements.js.map +1 -1
- package/externalLocation.d.ts +2 -2
- package/externalLocation.js +2 -2
- package/file.d.ts +4 -3
- package/file.js +4 -3
- package/file.js.map +1 -1
- package/getAlertV2.d.ts +50 -0
- package/getAlertV2.js +38 -0
- package/getAlertV2.js.map +1 -0
- package/getAlertsV2.d.ts +14 -0
- package/getAlertsV2.js +18 -0
- package/getAlertsV2.js.map +1 -0
- package/getApp.d.ts +4 -0
- package/getApp.js +4 -0
- package/getApp.js.map +1 -1
- package/getApps.d.ts +4 -0
- package/getApps.js +4 -0
- package/getApps.js.map +1 -1
- package/getAwsAssumeRolePolicy.d.ts +4 -0
- package/getAwsAssumeRolePolicy.js +4 -0
- package/getAwsAssumeRolePolicy.js.map +1 -1
- package/getAwsBucketPolicy.d.ts +4 -0
- package/getAwsBucketPolicy.js +4 -0
- package/getAwsBucketPolicy.js.map +1 -1
- package/getAwsCrossAccountPolicy.d.ts +4 -4
- package/getAwsCrossAccountPolicy.js +4 -4
- package/getAwsUnityCatalogAssumeRolePolicy.d.ts +8 -4
- package/getAwsUnityCatalogAssumeRolePolicy.js +8 -4
- package/getAwsUnityCatalogAssumeRolePolicy.js.map +1 -1
- package/getAwsUnityCatalogPolicy.d.ts +8 -4
- package/getAwsUnityCatalogPolicy.js +8 -4
- package/getAwsUnityCatalogPolicy.js.map +1 -1
- package/getBudgetPolicies.d.ts +3 -6
- package/getBudgetPolicies.js +2 -2
- package/getBudgetPolicies.js.map +1 -1
- package/getBudgetPolicy.d.ts +2 -2
- package/getBudgetPolicy.js +2 -2
- package/getCatalog.d.ts +4 -8
- package/getCatalog.js +4 -8
- package/getCatalog.js.map +1 -1
- package/getCatalogs.d.ts +4 -8
- package/getCatalogs.js +4 -8
- package/getCatalogs.js.map +1 -1
- package/getCluster.d.ts +4 -4
- package/getCluster.js +4 -4
- package/getClusterPolicy.d.ts +4 -4
- package/getClusterPolicy.js +4 -4
- package/getClusters.d.ts +4 -4
- package/getClusters.js +4 -4
- package/getCurrentConfig.d.ts +4 -0
- package/getCurrentConfig.js +4 -0
- package/getCurrentConfig.js.map +1 -1
- package/getCurrentMetastore.d.ts +2 -6
- package/getCurrentMetastore.js +2 -6
- package/getCurrentMetastore.js.map +1 -1
- package/getCurrentUser.d.ts +4 -4
- package/getCurrentUser.js +4 -4
- package/getDashboards.d.ts +4 -0
- package/getDashboards.js +4 -0
- package/getDashboards.js.map +1 -1
- package/getDbfsFile.d.ts +4 -4
- package/getDbfsFile.js +4 -4
- package/getDbfsFilePaths.d.ts +4 -4
- package/getDbfsFilePaths.js +4 -4
- package/getDirectory.d.ts +4 -4
- package/getDirectory.js +4 -4
- package/getExternalLocation.d.ts +4 -4
- package/getExternalLocation.js +4 -4
- package/getExternalLocations.d.ts +4 -4
- package/getExternalLocations.js +4 -4
- package/getFunctions.d.ts +4 -4
- package/getFunctions.js +4 -4
- package/getGroup.d.ts +4 -4
- package/getGroup.js +4 -4
- package/getInstancePool.d.ts +4 -4
- package/getInstancePool.js +4 -4
- package/getInstanceProfiles.d.ts +4 -0
- package/getInstanceProfiles.js +4 -0
- package/getInstanceProfiles.js.map +1 -1
- package/getJob.d.ts +4 -4
- package/getJob.js +4 -4
- package/getJobs.d.ts +6 -6
- package/getJobs.js +6 -6
- package/getMetastore.d.ts +2 -6
- package/getMetastore.js +2 -6
- package/getMetastore.js.map +1 -1
- package/getMetastores.d.ts +6 -6
- package/getMetastores.js +6 -6
- package/getMlflowExperiment.d.ts +4 -4
- package/getMlflowExperiment.js +4 -4
- package/getMlflowModel.d.ts +4 -4
- package/getMlflowModel.js +4 -4
- package/getMlflowModels.d.ts +4 -4
- package/getMlflowModels.js +4 -4
- package/getMwsCredentials.d.ts +2 -6
- package/getMwsCredentials.js +2 -6
- package/getMwsCredentials.js.map +1 -1
- package/getMwsNetworkConnectivityConfig.d.ts +4 -4
- package/getMwsNetworkConnectivityConfig.js +4 -4
- package/getMwsNetworkConnectivityConfigs.d.ts +4 -4
- package/getMwsNetworkConnectivityConfigs.js +4 -4
- package/getMwsWorkspaces.d.ts +2 -6
- package/getMwsWorkspaces.js +2 -6
- package/getMwsWorkspaces.js.map +1 -1
- package/getNodeType.d.ts +6 -6
- package/getNodeType.js +6 -6
- package/getNotebook.d.ts +4 -4
- package/getNotebook.js +4 -4
- package/getNotebookPaths.d.ts +4 -4
- package/getNotebookPaths.js +4 -4
- package/getNotificationDestinations.d.ts +4 -0
- package/getNotificationDestinations.js +4 -0
- package/getNotificationDestinations.js.map +1 -1
- package/getPipelines.d.ts +4 -4
- package/getPipelines.js +4 -4
- package/getRegisteredModel.d.ts +4 -4
- package/getRegisteredModel.js +4 -4
- package/getRegisteredModelVersions.d.ts +4 -4
- package/getRegisteredModelVersions.js +4 -4
- package/getSchema.d.ts +4 -0
- package/getSchema.js +4 -0
- package/getSchema.js.map +1 -1
- package/getSchemas.d.ts +4 -8
- package/getSchemas.js +4 -8
- package/getSchemas.js.map +1 -1
- package/getServicePrincipal.d.ts +4 -4
- package/getServicePrincipal.js +4 -4
- package/getServicePrincipals.d.ts +4 -4
- package/getServicePrincipals.js +4 -4
- package/getServingEndpoints.d.ts +4 -4
- package/getServingEndpoints.js +4 -4
- package/getShare.d.ts +4 -0
- package/getShare.js +4 -0
- package/getShare.js.map +1 -1
- package/getShares.d.ts +4 -0
- package/getShares.js +4 -0
- package/getShares.js.map +1 -1
- package/getSparkVersion.d.ts +6 -6
- package/getSparkVersion.js +6 -6
- package/getSqlWarehouse.d.ts +4 -4
- package/getSqlWarehouse.js +4 -4
- package/getSqlWarehouses.d.ts +4 -4
- package/getSqlWarehouses.js +4 -4
- package/getStorageCredential.d.ts +4 -4
- package/getStorageCredential.js +4 -4
- package/getStorageCredentials.d.ts +4 -4
- package/getStorageCredentials.js +4 -4
- package/getTable.d.ts +4 -8
- package/getTable.js +4 -8
- package/getTable.js.map +1 -1
- package/getTables.d.ts +4 -8
- package/getTables.js +4 -8
- package/getTables.js.map +1 -1
- package/getUser.d.ts +4 -4
- package/getUser.js +4 -4
- package/getViews.d.ts +4 -4
- package/getViews.js +4 -4
- package/getVolume.d.ts +4 -0
- package/getVolume.js +4 -0
- package/getVolume.js.map +1 -1
- package/getVolumes.d.ts +4 -4
- package/getVolumes.js +4 -4
- package/getZones.d.ts +4 -4
- package/getZones.js +4 -4
- package/gitCredential.d.ts +2 -0
- package/gitCredential.js +2 -0
- package/gitCredential.js.map +1 -1
- package/globalInitScript.d.ts +2 -0
- package/globalInitScript.js +2 -0
- package/globalInitScript.js.map +1 -1
- package/group.d.ts +2 -0
- package/group.js +2 -0
- package/group.js.map +1 -1
- package/groupMember.d.ts +2 -0
- package/groupMember.js +2 -0
- package/groupMember.js.map +1 -1
- package/groupRole.d.ts +2 -0
- package/groupRole.js +2 -0
- package/groupRole.js.map +1 -1
- package/index.d.ts +9 -0
- package/index.js +16 -5
- package/index.js.map +1 -1
- package/instancePool.d.ts +2 -0
- package/instancePool.js +2 -0
- package/instancePool.js.map +1 -1
- package/instanceProfile.d.ts +2 -0
- package/instanceProfile.js +2 -0
- package/instanceProfile.js.map +1 -1
- package/ipAccessList.d.ts +2 -0
- package/ipAccessList.js +2 -0
- package/ipAccessList.js.map +1 -1
- package/job.d.ts +2 -0
- package/job.js +2 -0
- package/job.js.map +1 -1
- package/library.d.ts +2 -0
- package/library.js +2 -0
- package/library.js.map +1 -1
- package/metastoreProvider.d.ts +2 -2
- package/metastoreProvider.js +2 -2
- package/mlflowExperiment.d.ts +2 -0
- package/mlflowExperiment.js +2 -0
- package/mlflowExperiment.js.map +1 -1
- package/mlflowModel.d.ts +2 -0
- package/mlflowModel.js +2 -0
- package/mlflowModel.js.map +1 -1
- package/mlflowWebhook.d.ts +2 -0
- package/mlflowWebhook.js +2 -0
- package/mlflowWebhook.js.map +1 -1
- package/modelServing.d.ts +2 -0
- package/modelServing.js +2 -0
- package/modelServing.js.map +1 -1
- package/mwsLogDelivery.d.ts +2 -2
- package/mwsLogDelivery.js +2 -2
- package/mwsNccBinding.d.ts +3 -3
- package/mwsNccBinding.js +3 -3
- package/mwsNccPrivateEndpointRule.d.ts +6 -3
- package/mwsNccPrivateEndpointRule.js +5 -3
- package/mwsNccPrivateEndpointRule.js.map +1 -1
- package/mwsNetworkConnectivityConfig.d.ts +2 -4
- package/mwsNetworkConnectivityConfig.js +2 -4
- package/mwsNetworkConnectivityConfig.js.map +1 -1
- package/mwsPermissionAssignment.d.ts +3 -1
- package/mwsPermissionAssignment.js +3 -1
- package/mwsPermissionAssignment.js.map +1 -1
- package/mwsPrivateAccessSettings.d.ts +2 -0
- package/mwsPrivateAccessSettings.js +2 -0
- package/mwsPrivateAccessSettings.js.map +1 -1
- package/mwsVpcEndpoint.d.ts +2 -2
- package/mwsVpcEndpoint.js +2 -2
- package/mwsWorkspaces.d.ts +9 -3
- package/mwsWorkspaces.js +6 -0
- package/mwsWorkspaces.js.map +1 -1
- package/notebook.d.ts +2 -0
- package/notebook.js +2 -0
- package/notebook.js.map +1 -1
- package/notificationDestination.d.ts +2 -0
- package/notificationDestination.js +2 -0
- package/notificationDestination.js.map +1 -1
- package/oboToken.d.ts +2 -2
- package/oboToken.js +2 -2
- package/onlineTable.d.ts +2 -2
- package/onlineTable.js +2 -2
- package/package.json +2 -2
- package/permissionAssignment.d.ts +3 -1
- package/permissionAssignment.js +3 -1
- package/permissionAssignment.js.map +1 -1
- package/permissions.d.ts +2 -0
- package/permissions.js +2 -0
- package/permissions.js.map +1 -1
- package/pipeline.d.ts +2 -0
- package/pipeline.js +2 -0
- package/pipeline.js.map +1 -1
- package/provider.d.ts +2 -0
- package/provider.js +1 -0
- package/provider.js.map +1 -1
- package/qualityMonitor.d.ts +2 -0
- package/qualityMonitor.js +2 -0
- package/qualityMonitor.js.map +1 -1
- package/registeredModel.d.ts +2 -2
- package/registeredModel.js +2 -2
- package/repo.d.ts +2 -0
- package/repo.js +2 -0
- package/repo.js.map +1 -1
- package/restrictWorkspaceAdminsSetting.d.ts +2 -2
- package/restrictWorkspaceAdminsSetting.js +2 -2
- package/schema.d.ts +2 -2
- package/schema.js +2 -2
- package/secret.d.ts +2 -0
- package/secret.js +2 -0
- package/secret.js.map +1 -1
- package/secretAcl.d.ts +2 -0
- package/secretAcl.js +2 -0
- package/secretAcl.js.map +1 -1
- package/secretScope.d.ts +2 -0
- package/secretScope.js +2 -0
- package/secretScope.js.map +1 -1
- package/servicePrincipal.d.ts +2 -2
- package/servicePrincipal.js +2 -2
- package/servicePrincipalRole.d.ts +2 -0
- package/servicePrincipalRole.js +2 -0
- package/servicePrincipalRole.js.map +1 -1
- package/servicePrincipalSecret.d.ts +2 -2
- package/servicePrincipalSecret.js +2 -2
- package/share.d.ts +2 -2
- package/share.js +2 -2
- package/sqlEndpoint.d.ts +2 -0
- package/sqlEndpoint.js +2 -0
- package/sqlEndpoint.js.map +1 -1
- package/sqlGlobalConfig.d.ts +2 -0
- package/sqlGlobalConfig.js +2 -0
- package/sqlGlobalConfig.js.map +1 -1
- package/sqlPermissions.d.ts +17 -15
- package/sqlPermissions.js +5 -3
- package/sqlPermissions.js.map +1 -1
- package/storageCredential.d.ts +2 -2
- package/storageCredential.js +2 -2
- package/systemSchema.d.ts +1 -3
- package/systemSchema.js +1 -3
- package/systemSchema.js.map +1 -1
- package/token.d.ts +2 -2
- package/token.js +2 -2
- package/types/input.d.ts +164 -4
- package/types/output.d.ts +182 -7
- package/user.d.ts +2 -0
- package/user.js +2 -0
- package/user.js.map +1 -1
- package/userRole.d.ts +2 -0
- package/userRole.js +2 -0
- package/userRole.js.map +1 -1
- package/vectorSearchEndpoint.d.ts +8 -2
- package/vectorSearchEndpoint.js +6 -2
- package/vectorSearchEndpoint.js.map +1 -1
- package/vectorSearchIndex.d.ts +2 -2
- package/vectorSearchIndex.js +2 -2
- package/volume.d.ts +2 -2
- package/volume.js +2 -2
- package/workspaceBinding.d.ts +2 -2
- package/workspaceBinding.js +2 -2
- package/workspaceConf.d.ts +4 -2
- package/workspaceConf.js +4 -2
- package/workspaceConf.js.map +1 -1
- package/workspaceFile.d.ts +2 -0
- package/workspaceFile.js +2 -0
- package/workspaceFile.js.map +1 -1
package/schema.d.ts
CHANGED
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
-
* > This resource can only be used with a workspace-level provider!
|
|
4
|
-
*
|
|
5
3
|
* Within a metastore, Unity Catalog provides a 3-level namespace for organizing data: Catalogs, Databases (also called Schemas), and Tables / Views.
|
|
6
4
|
*
|
|
5
|
+
* > This resource can only be used with a workspace-level provider!
|
|
6
|
+
*
|
|
7
7
|
* A `databricks.Schema` is contained within databricks.Catalog and can contain tables & views.
|
|
8
8
|
*
|
|
9
9
|
* ## Example Usage
|
package/schema.js
CHANGED
|
@@ -6,10 +6,10 @@ exports.Schema = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
-
* > This resource can only be used with a workspace-level provider!
|
|
10
|
-
*
|
|
11
9
|
* Within a metastore, Unity Catalog provides a 3-level namespace for organizing data: Catalogs, Databases (also called Schemas), and Tables / Views.
|
|
12
10
|
*
|
|
11
|
+
* > This resource can only be used with a workspace-level provider!
|
|
12
|
+
*
|
|
13
13
|
* A `databricks.Schema` is contained within databricks.Catalog and can contain tables & views.
|
|
14
14
|
*
|
|
15
15
|
* ## Example Usage
|
package/secret.d.ts
CHANGED
|
@@ -2,6 +2,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
/**
|
|
3
3
|
* With this resource you can insert a secret under the provided scope with the given name. If a secret already exists with the same name, this command overwrites the existing secret’s value. The server encrypts the secret using the secret scope’s encryption settings before storing it. You must have WRITE or MANAGE permission on the secret scope. The secret key must consist of alphanumeric characters, dashes, underscores, and periods, and cannot exceed 128 characters. The maximum allowed secret value size is 128 KB. The maximum number of secrets in a given scope is 1000. You can read a secret value only from within a command on a cluster (for example, through a notebook); there is no API to read a secret value outside of a cluster. The permission applied is based on who is invoking the command and you must have at least READ permission. Please consult [Secrets User Guide](https://docs.databricks.com/security/secrets/index.html#secrets-user-guide) for more details.
|
|
4
4
|
*
|
|
5
|
+
* > This resource can only be used with a workspace-level provider!
|
|
6
|
+
*
|
|
5
7
|
* ## Example Usage
|
|
6
8
|
*
|
|
7
9
|
* ```typescript
|
package/secret.js
CHANGED
|
@@ -8,6 +8,8 @@ const utilities = require("./utilities");
|
|
|
8
8
|
/**
|
|
9
9
|
* With this resource you can insert a secret under the provided scope with the given name. If a secret already exists with the same name, this command overwrites the existing secret’s value. The server encrypts the secret using the secret scope’s encryption settings before storing it. You must have WRITE or MANAGE permission on the secret scope. The secret key must consist of alphanumeric characters, dashes, underscores, and periods, and cannot exceed 128 characters. The maximum allowed secret value size is 128 KB. The maximum number of secrets in a given scope is 1000. You can read a secret value only from within a command on a cluster (for example, through a notebook); there is no API to read a secret value outside of a cluster. The permission applied is based on who is invoking the command and you must have at least READ permission. Please consult [Secrets User Guide](https://docs.databricks.com/security/secrets/index.html#secrets-user-guide) for more details.
|
|
10
10
|
*
|
|
11
|
+
* > This resource can only be used with a workspace-level provider!
|
|
12
|
+
*
|
|
11
13
|
* ## Example Usage
|
|
12
14
|
*
|
|
13
15
|
* ```typescript
|
package/secret.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secret.js","sourceRoot":"","sources":["../secret.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"secret.js","sourceRoot":"","sources":["../secret.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA0CG;AACH,MAAa,MAAO,SAAQ,MAAM,CAAC,cAAc;IAC7C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmB,EAAE,IAAmC;QACjH,OAAO,IAAI,MAAM,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,MAAM,CAAC,YAAY,CAAC;IACvD,CAAC;IA+BD,YAAY,IAAY,EAAE,WAAsC,EAAE,IAAmC;QACjG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsC,CAAC;YACrD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACzE;aAAM;YACH,MAAM,IAAI,GAAG,WAAqC,CAAC;YACnD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,GAAG,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAChD,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;aACtD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,WAAW,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,iBAAiB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACtD,cAAc,CAAC,sBAAsB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC9D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,aAAa,CAAC,EAAE,CAAC;QAChE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,MAAM,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3D,CAAC;;AAxFL,wBAyFC;AA3EG,gBAAgB;AACO,mBAAY,GAAG,gCAAgC,CAAC"}
|
package/secretAcl.d.ts
CHANGED
|
@@ -2,6 +2,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
/**
|
|
3
3
|
* Create or overwrite the ACL associated with the given principal (user or group) on the specified databricks_secret_scope. Please consult [Secrets User Guide](https://docs.databricks.com/security/secrets/index.html#secrets-user-guide) for more details.
|
|
4
4
|
*
|
|
5
|
+
* > This resource can only be used with a workspace-level provider!
|
|
6
|
+
*
|
|
5
7
|
* ## Example Usage
|
|
6
8
|
*
|
|
7
9
|
* This way, data scientists can read the Publishing API key that is synchronized from, for example, Azure Key Vault.
|
package/secretAcl.js
CHANGED
|
@@ -8,6 +8,8 @@ const utilities = require("./utilities");
|
|
|
8
8
|
/**
|
|
9
9
|
* Create or overwrite the ACL associated with the given principal (user or group) on the specified databricks_secret_scope. Please consult [Secrets User Guide](https://docs.databricks.com/security/secrets/index.html#secrets-user-guide) for more details.
|
|
10
10
|
*
|
|
11
|
+
* > This resource can only be used with a workspace-level provider!
|
|
12
|
+
*
|
|
11
13
|
* ## Example Usage
|
|
12
14
|
*
|
|
13
15
|
* This way, data scientists can read the Publishing API key that is synchronized from, for example, Azure Key Vault.
|
package/secretAcl.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretAcl.js","sourceRoot":"","sources":["../secretAcl.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"secretAcl.js","sourceRoot":"","sources":["../secretAcl.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+CG;AACH,MAAa,SAAU,SAAQ,MAAM,CAAC,cAAc;IAChD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAsB,EAAE,IAAmC;QACpH,OAAO,IAAI,SAAS,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAChE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,SAAS,CAAC,YAAY,CAAC;IAC1D,CAAC;IAuBD,YAAY,IAAY,EAAE,WAA4C,EAAE,IAAmC;QACvG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAyC,CAAC;YACxD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;aAAM;YACH,MAAM,IAAI,GAAG,WAAwC,CAAC;YACtD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,UAAU,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvD,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,SAAS,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC9D,CAAC;;AA1EL,8BA2EC;AA7DG,gBAAgB;AACO,sBAAY,GAAG,sCAAsC,CAAC"}
|
package/secretScope.d.ts
CHANGED
|
@@ -4,6 +4,8 @@ import * as outputs from "./types/output";
|
|
|
4
4
|
/**
|
|
5
5
|
* Sometimes accessing data requires that you authenticate to external data sources through JDBC. Instead of directly entering your credentials into a notebook, use Databricks secrets to store your credentials and reference them in notebooks and jobs. Please consult [Secrets User Guide](https://docs.databricks.com/security/secrets/index.html#secrets-user-guide) for more details.
|
|
6
6
|
*
|
|
7
|
+
* > This resource can only be used with a workspace-level provider!
|
|
8
|
+
*
|
|
7
9
|
* ## Example Usage
|
|
8
10
|
*
|
|
9
11
|
* ```typescript
|
package/secretScope.js
CHANGED
|
@@ -8,6 +8,8 @@ const utilities = require("./utilities");
|
|
|
8
8
|
/**
|
|
9
9
|
* Sometimes accessing data requires that you authenticate to external data sources through JDBC. Instead of directly entering your credentials into a notebook, use Databricks secrets to store your credentials and reference them in notebooks and jobs. Please consult [Secrets User Guide](https://docs.databricks.com/security/secrets/index.html#secrets-user-guide) for more details.
|
|
10
10
|
*
|
|
11
|
+
* > This resource can only be used with a workspace-level provider!
|
|
12
|
+
*
|
|
11
13
|
* ## Example Usage
|
|
12
14
|
*
|
|
13
15
|
* ```typescript
|
package/secretScope.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretScope.js","sourceRoot":"","sources":["../secretScope.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"secretScope.js","sourceRoot":"","sources":["../secretScope.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiCG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAClD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;IAwBD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;;AApEL,kCAqEC;AAvDG,gBAAgB;AACO,wBAAY,GAAG,0CAA0C,CAAC"}
|
package/servicePrincipal.d.ts
CHANGED
|
@@ -2,6 +2,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
/**
|
|
3
3
|
* Directly manage [Service Principals](https://docs.databricks.com/administration-guide/users-groups/service-principals.html) that could be added to databricks.Group in Databricks account or workspace.
|
|
4
4
|
*
|
|
5
|
+
* > This resource can be used with an account or workspace-level provider.
|
|
6
|
+
*
|
|
5
7
|
* There are different types of service principals:
|
|
6
8
|
*
|
|
7
9
|
* * Databricks-managed - exists only inside the Databricks platform (all clouds) and couldn't be used for accessing non-Databricks services.
|
|
@@ -11,8 +13,6 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
11
13
|
*
|
|
12
14
|
* > Entitlements, like, `allowClusterCreate`, `allowInstancePoolCreate`, `databricksSqlAccess`, `workspaceAccess` applicable only for workspace-level service principals. Use databricks.Entitlements resource to assign entitlements inside a workspace to account-level service principals.
|
|
13
15
|
*
|
|
14
|
-
* To create service principals in the Databricks account, the provider must be configured with `host = "https://accounts.cloud.databricks.com"` on AWS deployments or `host = "https://accounts.azuredatabricks.net"` and authenticate using the supported authentication method for account operations.
|
|
15
|
-
*
|
|
16
16
|
* The default behavior when deleting a `databricks.ServicePrincipal` resource depends on whether the provider is configured at the workspace-level or account-level. When the provider is configured at the workspace-level, the service principal will be deleted from the workspace. When the provider is configured at the account-level, the service principal will be deactivated but not deleted. When the provider is configured at the account level, to delete the service principal from the account when the resource is deleted, set `disableAsUserDeletion = false`. Conversely, when the provider is configured at the account-level, to deactivate the service principal when the resource is deleted, set `disableAsUserDeletion = true`.
|
|
17
17
|
*
|
|
18
18
|
* ## Example Usage
|
package/servicePrincipal.js
CHANGED
|
@@ -8,6 +8,8 @@ const utilities = require("./utilities");
|
|
|
8
8
|
/**
|
|
9
9
|
* Directly manage [Service Principals](https://docs.databricks.com/administration-guide/users-groups/service-principals.html) that could be added to databricks.Group in Databricks account or workspace.
|
|
10
10
|
*
|
|
11
|
+
* > This resource can be used with an account or workspace-level provider.
|
|
12
|
+
*
|
|
11
13
|
* There are different types of service principals:
|
|
12
14
|
*
|
|
13
15
|
* * Databricks-managed - exists only inside the Databricks platform (all clouds) and couldn't be used for accessing non-Databricks services.
|
|
@@ -17,8 +19,6 @@ const utilities = require("./utilities");
|
|
|
17
19
|
*
|
|
18
20
|
* > Entitlements, like, `allowClusterCreate`, `allowInstancePoolCreate`, `databricksSqlAccess`, `workspaceAccess` applicable only for workspace-level service principals. Use databricks.Entitlements resource to assign entitlements inside a workspace to account-level service principals.
|
|
19
21
|
*
|
|
20
|
-
* To create service principals in the Databricks account, the provider must be configured with `host = "https://accounts.cloud.databricks.com"` on AWS deployments or `host = "https://accounts.azuredatabricks.net"` and authenticate using the supported authentication method for account operations.
|
|
21
|
-
*
|
|
22
22
|
* The default behavior when deleting a `databricks.ServicePrincipal` resource depends on whether the provider is configured at the workspace-level or account-level. When the provider is configured at the workspace-level, the service principal will be deleted from the workspace. When the provider is configured at the account-level, the service principal will be deactivated but not deleted. When the provider is configured at the account level, to delete the service principal from the account when the resource is deleted, set `disableAsUserDeletion = false`. Conversely, when the provider is configured at the account-level, to deactivate the service principal when the resource is deleted, set `disableAsUserDeletion = true`.
|
|
23
23
|
*
|
|
24
24
|
* ## Example Usage
|
|
@@ -2,6 +2,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
/**
|
|
3
3
|
* This resource allows you to attach a role or databricks.InstanceProfile (AWS) to a databricks_service_principal.
|
|
4
4
|
*
|
|
5
|
+
* > This resource can be used with an account or workspace-level provider.
|
|
6
|
+
*
|
|
5
7
|
* ## Example Usage
|
|
6
8
|
*
|
|
7
9
|
* Granting a service principal access to an instance profile
|
package/servicePrincipalRole.js
CHANGED
|
@@ -8,6 +8,8 @@ const utilities = require("./utilities");
|
|
|
8
8
|
/**
|
|
9
9
|
* This resource allows you to attach a role or databricks.InstanceProfile (AWS) to a databricks_service_principal.
|
|
10
10
|
*
|
|
11
|
+
* > This resource can be used with an account or workspace-level provider.
|
|
12
|
+
*
|
|
11
13
|
* ## Example Usage
|
|
12
14
|
*
|
|
13
15
|
* Granting a service principal access to an instance profile
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"servicePrincipalRole.js","sourceRoot":"","sources":["../servicePrincipalRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"servicePrincipalRole.js","sourceRoot":"","sources":["../servicePrincipalRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkCG;AACH,MAAa,oBAAqB,SAAQ,MAAM,CAAC,cAAc;IAC3D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAiC,EAAE,IAAmC;QAC/H,OAAO,IAAI,oBAAoB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC3E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,oBAAoB,CAAC,YAAY,CAAC;IACrE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAAkE,EAAE,IAAmC;QAC7H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAoD,CAAC;YACnE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;SACvF;aAAM;YACH,MAAM,IAAI,GAAG,WAAmD,CAAC;YACjE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,kBAAkB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC/D,MAAM,IAAI,KAAK,CAAC,gDAAgD,CAAC,CAAC;aACrE;YACD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;SACrF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,oBAAoB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACzE,CAAC;;AAjEL,oDAkEC;AApDG,gBAAgB;AACO,iCAAY,GAAG,4DAA4D,CAAC"}
|
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
-
* > This resource can only be used with an account-level provider.
|
|
4
|
-
*
|
|
5
3
|
* With this resource you can create a secret for a given [Service Principals](https://docs.databricks.com/administration-guide/users-groups/service-principals.html).
|
|
6
4
|
*
|
|
5
|
+
* > This resource can only be used with an account-level provider!
|
|
6
|
+
*
|
|
7
7
|
* This secret can be used to configure the Databricks Pulumi Provider to authenticate with the service principal. See Authenticating with service principal.
|
|
8
8
|
*
|
|
9
9
|
* Additionally, the secret can be used to request OAuth tokens for the service principal, which can be used to authenticate to Databricks REST APIs. See [Authentication using OAuth tokens for service principals](https://docs.databricks.com/dev-tools/authentication-oauth.html).
|
|
@@ -6,10 +6,10 @@ exports.ServicePrincipalSecret = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
-
* > This resource can only be used with an account-level provider.
|
|
10
|
-
*
|
|
11
9
|
* With this resource you can create a secret for a given [Service Principals](https://docs.databricks.com/administration-guide/users-groups/service-principals.html).
|
|
12
10
|
*
|
|
11
|
+
* > This resource can only be used with an account-level provider!
|
|
12
|
+
*
|
|
13
13
|
* This secret can be used to configure the Databricks Pulumi Provider to authenticate with the service principal. See Authenticating with service principal.
|
|
14
14
|
*
|
|
15
15
|
* Additionally, the secret can be used to request OAuth tokens for the service principal, which can be used to authenticate to Databricks REST APIs. See [Authentication using OAuth tokens for service principals](https://docs.databricks.com/dev-tools/authentication-oauth.html).
|
package/share.d.ts
CHANGED
|
@@ -2,10 +2,10 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "./types/input";
|
|
3
3
|
import * as outputs from "./types/output";
|
|
4
4
|
/**
|
|
5
|
-
* > This resource can only be used with a workspace-level provider!
|
|
6
|
-
*
|
|
7
5
|
* In Delta Sharing, a share is a read-only collection of tables and table partitions that a provider wants to share with one or more recipients. If your recipient uses a Unity Catalog-enabled Databricks workspace, you can also include notebook files, views (including dynamic views that restrict access at the row and column level), Unity Catalog volumes, and Unity Catalog models in a share.
|
|
8
6
|
*
|
|
7
|
+
* > This resource can only be used with a workspace-level provider!
|
|
8
|
+
*
|
|
9
9
|
* In a Unity Catalog-enabled Databricks workspace, a share is a securable object registered in Unity Catalog. A `databricks.Share` is contained within a databricks_metastore. If you remove a share from your Unity Catalog metastore, all recipients of that share lose the ability to access it.
|
|
10
10
|
*
|
|
11
11
|
* ## Example Usage
|
package/share.js
CHANGED
|
@@ -6,10 +6,10 @@ exports.Share = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
-
* > This resource can only be used with a workspace-level provider!
|
|
10
|
-
*
|
|
11
9
|
* In Delta Sharing, a share is a read-only collection of tables and table partitions that a provider wants to share with one or more recipients. If your recipient uses a Unity Catalog-enabled Databricks workspace, you can also include notebook files, views (including dynamic views that restrict access at the row and column level), Unity Catalog volumes, and Unity Catalog models in a share.
|
|
12
10
|
*
|
|
11
|
+
* > This resource can only be used with a workspace-level provider!
|
|
12
|
+
*
|
|
13
13
|
* In a Unity Catalog-enabled Databricks workspace, a share is a securable object registered in Unity Catalog. A `databricks.Share` is contained within a databricks_metastore. If you remove a share from your Unity Catalog metastore, all recipients of that share lose the ability to access it.
|
|
14
14
|
*
|
|
15
15
|
* ## Example Usage
|
package/sqlEndpoint.d.ts
CHANGED
|
@@ -4,6 +4,8 @@ import * as outputs from "./types/output";
|
|
|
4
4
|
/**
|
|
5
5
|
* This resource is used to manage [Databricks SQL warehouses](https://docs.databricks.com/sql/admin/sql-endpoints.html). To create [SQL warehouses](https://docs.databricks.com/sql/get-started/concepts.html) you must have `databricksSqlAccess` on your databricks.Group or databricks_user.
|
|
6
6
|
*
|
|
7
|
+
* > This resource can only be used with a workspace-level provider!
|
|
8
|
+
*
|
|
7
9
|
* ## Example Usage
|
|
8
10
|
*
|
|
9
11
|
* ```typescript
|
package/sqlEndpoint.js
CHANGED
|
@@ -8,6 +8,8 @@ const utilities = require("./utilities");
|
|
|
8
8
|
/**
|
|
9
9
|
* This resource is used to manage [Databricks SQL warehouses](https://docs.databricks.com/sql/admin/sql-endpoints.html). To create [SQL warehouses](https://docs.databricks.com/sql/get-started/concepts.html) you must have `databricksSqlAccess` on your databricks.Group or databricks_user.
|
|
10
10
|
*
|
|
11
|
+
* > This resource can only be used with a workspace-level provider!
|
|
12
|
+
*
|
|
11
13
|
* ## Example Usage
|
|
12
14
|
*
|
|
13
15
|
* ```typescript
|
package/sqlEndpoint.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"sqlEndpoint.js","sourceRoot":"","sources":["../sqlEndpoint.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"sqlEndpoint.js","sourceRoot":"","sources":["../sqlEndpoint.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiDG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAClD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;IA4FD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7E;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAClD,cAAc,CAAC,SAAS,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC9C,cAAc,CAAC,SAAS,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC9C,cAAc,CAAC,mBAAmB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAClD,cAAc,CAAC,YAAY,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACjD,cAAc,CAAC,OAAO,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC/C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;;AA3KL,kCA4KC;AA9JG,gBAAgB;AACO,wBAAY,GAAG,0CAA0C,CAAC"}
|
package/sqlGlobalConfig.d.ts
CHANGED
|
@@ -2,6 +2,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
/**
|
|
3
3
|
* This resource configures the security policy, databricks_instance_profile, and [data access properties](https://docs.databricks.com/sql/admin/data-access-configuration.html) for all databricks.SqlEndpoint of workspace. *Please note that changing parameters of this resource will restart all running databricks_sql_endpoint.* To use this resource you need to be an administrator.
|
|
4
4
|
*
|
|
5
|
+
* > This resource can only be used with a workspace-level provider!
|
|
6
|
+
*
|
|
5
7
|
* ## Example Usage
|
|
6
8
|
*
|
|
7
9
|
* ### AWS example
|
package/sqlGlobalConfig.js
CHANGED
|
@@ -8,6 +8,8 @@ const utilities = require("./utilities");
|
|
|
8
8
|
/**
|
|
9
9
|
* This resource configures the security policy, databricks_instance_profile, and [data access properties](https://docs.databricks.com/sql/admin/data-access-configuration.html) for all databricks.SqlEndpoint of workspace. *Please note that changing parameters of this resource will restart all running databricks_sql_endpoint.* To use this resource you need to be an administrator.
|
|
10
10
|
*
|
|
11
|
+
* > This resource can only be used with a workspace-level provider!
|
|
12
|
+
*
|
|
11
13
|
* ## Example Usage
|
|
12
14
|
*
|
|
13
15
|
* ### AWS example
|
package/sqlGlobalConfig.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"sqlGlobalConfig.js","sourceRoot":"","sources":["../sqlGlobalConfig.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"sqlGlobalConfig.js","sourceRoot":"","sources":["../sqlGlobalConfig.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAgEG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IACtD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;IAmCD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/E;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;;AAnFL,0CAoFC;AAtEG,gBAAgB;AACO,4BAAY,GAAG,kDAAkD,CAAC"}
|
package/sqlPermissions.d.ts
CHANGED
|
@@ -2,9 +2,9 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "./types/input";
|
|
3
3
|
import * as outputs from "./types/output";
|
|
4
4
|
/**
|
|
5
|
-
* > Please switch to databricks.Grants with Unity Catalog to manage data access, which provides a better and faster way for managing data security. `databricks.Grants` resource *doesn't require a technical cluster to perform operations*. On workspaces with Unity Catalog enabled, you may run into errors such as `Error: cannot create sql permissions: cannot read current grants: For unity catalog, please specify the catalog name explicitly. E.g. SHOW GRANT ``your.address@email.com`` ON CATALOG main`. This happens if your `defaultCatalogName` was set to a UC catalog instead of `hiveMetastore`. The workaround is to re-assign the metastore again with the default catalog set to
|
|
5
|
+
* > Please switch to databricks.Grants with Unity Catalog to manage data access, which provides a better and faster way for managing data security. `databricks.Grants` resource *doesn't require a technical cluster to perform operations*. On workspaces with Unity Catalog enabled, you may run into errors such as `Error: cannot create sql permissions: cannot read current grants: For unity catalog, please specify the catalog name explicitly. E.g. SHOW GRANT ``your.address@email.com`` ON CATALOG main`. This happens if your `defaultCatalogName` was set to a UC catalog instead of `hiveMetastore`. The workaround is to re-assign the metastore again with the default catalog set to `hiveMetastore`. See databricks_metastore_assignment.
|
|
6
6
|
*
|
|
7
|
-
* This resource manages data object access control lists in Databricks workspaces for things like tables, views, databases, and [more](https://docs.databricks.com/security/access-control/table-acls/object-privileges.html). In order to enable Table Access control, you have to login to the workspace as administrator, go to `Admin Console`, pick `Access Control` tab, click on `Enable` button in `Table Access Control` section, and click `Confirm`. The security guarantees of table access control **will only be effective if cluster access control is also turned on**. Please make sure that no users can create clusters in your workspace and all databricks.Cluster have approximately the following configuration:
|
|
7
|
+
* This resource manages data object access control lists in Databricks workspaces for things like tables, views, databases, and [more](https://docs.databricks.com/security/access-control/table-acls/object-privileges.html). In order to enable Table Access control, you have to login to the workspace as administrator, go to `Admin Console`, pick the `Access Control` tab, click on the `Enable` button in the `Table Access Control` section, and click `Confirm`. The security guarantees of table access control **will only be effective if cluster access control is also turned on**. Please make sure that no users can create clusters in your workspace and all databricks.Cluster have approximately the following configuration:
|
|
8
8
|
*
|
|
9
9
|
* ```typescript
|
|
10
10
|
* import * as pulumi from "@pulumi/pulumi";
|
|
@@ -16,6 +16,8 @@ import * as outputs from "./types/output";
|
|
|
16
16
|
* }});
|
|
17
17
|
* ```
|
|
18
18
|
*
|
|
19
|
+
* > This resource can only be used with a workspace-level provider!
|
|
20
|
+
*
|
|
19
21
|
* It is required to define all permissions for a securable in a single resource, otherwise Pulumi cannot guarantee config drift prevention.
|
|
20
22
|
*
|
|
21
23
|
* ## Example Usage
|
|
@@ -63,7 +65,7 @@ import * as outputs from "./types/output";
|
|
|
63
65
|
*
|
|
64
66
|
* The resource can be imported using a synthetic identifier. Examples of valid synthetic identifiers are:
|
|
65
67
|
*
|
|
66
|
-
* * `table/default.foo` - table `foo` in a `default` database.
|
|
68
|
+
* * `table/default.foo` - table `foo` in a `default` database. The `database` is always mandatory.
|
|
67
69
|
*
|
|
68
70
|
* * `view/bar.foo` - view `foo` in `bar` database.
|
|
69
71
|
*
|
|
@@ -98,7 +100,7 @@ export declare class SqlPermissions extends pulumi.CustomResource {
|
|
|
98
100
|
*/
|
|
99
101
|
static isInstance(obj: any): obj is SqlPermissions;
|
|
100
102
|
/**
|
|
101
|
-
* If this access control for using anonymous function. Defaults to `false`.
|
|
103
|
+
* If this access control for using an anonymous function. Defaults to `false`.
|
|
102
104
|
*/
|
|
103
105
|
readonly anonymousFunction: pulumi.Output<boolean | undefined>;
|
|
104
106
|
/**
|
|
@@ -111,16 +113,16 @@ export declare class SqlPermissions extends pulumi.CustomResource {
|
|
|
111
113
|
readonly catalog: pulumi.Output<boolean | undefined>;
|
|
112
114
|
readonly clusterId: pulumi.Output<string>;
|
|
113
115
|
/**
|
|
114
|
-
* Name of the database. Has default value of `default`.
|
|
116
|
+
* Name of the database. Has a default value of `default`.
|
|
115
117
|
*/
|
|
116
118
|
readonly database: pulumi.Output<string | undefined>;
|
|
117
119
|
readonly privilegeAssignments: pulumi.Output<outputs.SqlPermissionsPrivilegeAssignment[] | undefined>;
|
|
118
120
|
/**
|
|
119
|
-
* Name of the table. Can be combined with `database`.
|
|
121
|
+
* Name of the table. Can be combined with the `database`.
|
|
120
122
|
*/
|
|
121
123
|
readonly table: pulumi.Output<string | undefined>;
|
|
122
124
|
/**
|
|
123
|
-
* Name of the view. Can be combined with `database`.
|
|
125
|
+
* Name of the view. Can be combined with the `database`.
|
|
124
126
|
*/
|
|
125
127
|
readonly view: pulumi.Output<string | undefined>;
|
|
126
128
|
/**
|
|
@@ -137,7 +139,7 @@ export declare class SqlPermissions extends pulumi.CustomResource {
|
|
|
137
139
|
*/
|
|
138
140
|
export interface SqlPermissionsState {
|
|
139
141
|
/**
|
|
140
|
-
* If this access control for using anonymous function. Defaults to `false`.
|
|
142
|
+
* If this access control for using an anonymous function. Defaults to `false`.
|
|
141
143
|
*/
|
|
142
144
|
anonymousFunction?: pulumi.Input<boolean>;
|
|
143
145
|
/**
|
|
@@ -150,16 +152,16 @@ export interface SqlPermissionsState {
|
|
|
150
152
|
catalog?: pulumi.Input<boolean>;
|
|
151
153
|
clusterId?: pulumi.Input<string>;
|
|
152
154
|
/**
|
|
153
|
-
* Name of the database. Has default value of `default`.
|
|
155
|
+
* Name of the database. Has a default value of `default`.
|
|
154
156
|
*/
|
|
155
157
|
database?: pulumi.Input<string>;
|
|
156
158
|
privilegeAssignments?: pulumi.Input<pulumi.Input<inputs.SqlPermissionsPrivilegeAssignment>[]>;
|
|
157
159
|
/**
|
|
158
|
-
* Name of the table. Can be combined with `database`.
|
|
160
|
+
* Name of the table. Can be combined with the `database`.
|
|
159
161
|
*/
|
|
160
162
|
table?: pulumi.Input<string>;
|
|
161
163
|
/**
|
|
162
|
-
* Name of the view. Can be combined with `database`.
|
|
164
|
+
* Name of the view. Can be combined with the `database`.
|
|
163
165
|
*/
|
|
164
166
|
view?: pulumi.Input<string>;
|
|
165
167
|
}
|
|
@@ -168,7 +170,7 @@ export interface SqlPermissionsState {
|
|
|
168
170
|
*/
|
|
169
171
|
export interface SqlPermissionsArgs {
|
|
170
172
|
/**
|
|
171
|
-
* If this access control for using anonymous function. Defaults to `false`.
|
|
173
|
+
* If this access control for using an anonymous function. Defaults to `false`.
|
|
172
174
|
*/
|
|
173
175
|
anonymousFunction?: pulumi.Input<boolean>;
|
|
174
176
|
/**
|
|
@@ -181,16 +183,16 @@ export interface SqlPermissionsArgs {
|
|
|
181
183
|
catalog?: pulumi.Input<boolean>;
|
|
182
184
|
clusterId?: pulumi.Input<string>;
|
|
183
185
|
/**
|
|
184
|
-
* Name of the database. Has default value of `default`.
|
|
186
|
+
* Name of the database. Has a default value of `default`.
|
|
185
187
|
*/
|
|
186
188
|
database?: pulumi.Input<string>;
|
|
187
189
|
privilegeAssignments?: pulumi.Input<pulumi.Input<inputs.SqlPermissionsPrivilegeAssignment>[]>;
|
|
188
190
|
/**
|
|
189
|
-
* Name of the table. Can be combined with `database`.
|
|
191
|
+
* Name of the table. Can be combined with the `database`.
|
|
190
192
|
*/
|
|
191
193
|
table?: pulumi.Input<string>;
|
|
192
194
|
/**
|
|
193
|
-
* Name of the view. Can be combined with `database`.
|
|
195
|
+
* Name of the view. Can be combined with the `database`.
|
|
194
196
|
*/
|
|
195
197
|
view?: pulumi.Input<string>;
|
|
196
198
|
}
|
package/sqlPermissions.js
CHANGED
|
@@ -6,9 +6,9 @@ exports.SqlPermissions = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
-
* > Please switch to databricks.Grants with Unity Catalog to manage data access, which provides a better and faster way for managing data security. `databricks.Grants` resource *doesn't require a technical cluster to perform operations*. On workspaces with Unity Catalog enabled, you may run into errors such as `Error: cannot create sql permissions: cannot read current grants: For unity catalog, please specify the catalog name explicitly. E.g. SHOW GRANT ``your.address@email.com`` ON CATALOG main`. This happens if your `defaultCatalogName` was set to a UC catalog instead of `hiveMetastore`. The workaround is to re-assign the metastore again with the default catalog set to
|
|
9
|
+
* > Please switch to databricks.Grants with Unity Catalog to manage data access, which provides a better and faster way for managing data security. `databricks.Grants` resource *doesn't require a technical cluster to perform operations*. On workspaces with Unity Catalog enabled, you may run into errors such as `Error: cannot create sql permissions: cannot read current grants: For unity catalog, please specify the catalog name explicitly. E.g. SHOW GRANT ``your.address@email.com`` ON CATALOG main`. This happens if your `defaultCatalogName` was set to a UC catalog instead of `hiveMetastore`. The workaround is to re-assign the metastore again with the default catalog set to `hiveMetastore`. See databricks_metastore_assignment.
|
|
10
10
|
*
|
|
11
|
-
* This resource manages data object access control lists in Databricks workspaces for things like tables, views, databases, and [more](https://docs.databricks.com/security/access-control/table-acls/object-privileges.html). In order to enable Table Access control, you have to login to the workspace as administrator, go to `Admin Console`, pick `Access Control` tab, click on `Enable` button in `Table Access Control` section, and click `Confirm`. The security guarantees of table access control **will only be effective if cluster access control is also turned on**. Please make sure that no users can create clusters in your workspace and all databricks.Cluster have approximately the following configuration:
|
|
11
|
+
* This resource manages data object access control lists in Databricks workspaces for things like tables, views, databases, and [more](https://docs.databricks.com/security/access-control/table-acls/object-privileges.html). In order to enable Table Access control, you have to login to the workspace as administrator, go to `Admin Console`, pick the `Access Control` tab, click on the `Enable` button in the `Table Access Control` section, and click `Confirm`. The security guarantees of table access control **will only be effective if cluster access control is also turned on**. Please make sure that no users can create clusters in your workspace and all databricks.Cluster have approximately the following configuration:
|
|
12
12
|
*
|
|
13
13
|
* ```typescript
|
|
14
14
|
* import * as pulumi from "@pulumi/pulumi";
|
|
@@ -20,6 +20,8 @@ const utilities = require("./utilities");
|
|
|
20
20
|
* }});
|
|
21
21
|
* ```
|
|
22
22
|
*
|
|
23
|
+
* > This resource can only be used with a workspace-level provider!
|
|
24
|
+
*
|
|
23
25
|
* It is required to define all permissions for a securable in a single resource, otherwise Pulumi cannot guarantee config drift prevention.
|
|
24
26
|
*
|
|
25
27
|
* ## Example Usage
|
|
@@ -67,7 +69,7 @@ const utilities = require("./utilities");
|
|
|
67
69
|
*
|
|
68
70
|
* The resource can be imported using a synthetic identifier. Examples of valid synthetic identifiers are:
|
|
69
71
|
*
|
|
70
|
-
* * `table/default.foo` - table `foo` in a `default` database.
|
|
72
|
+
* * `table/default.foo` - table `foo` in a `default` database. The `database` is always mandatory.
|
|
71
73
|
*
|
|
72
74
|
* * `view/bar.foo` - view `foo` in `bar` database.
|
|
73
75
|
*
|
package/sqlPermissions.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"sqlPermissions.js","sourceRoot":"","sources":["../sqlPermissions.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"sqlPermissions.js","sourceRoot":"","sources":["../sqlPermissions.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiFG;AACH,MAAa,cAAe,SAAQ,MAAM,CAAC,cAAc;IACrD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA2B,EAAE,IAAmC;QACzH,OAAO,IAAI,cAAc,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACrE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,cAAc,CAAC,YAAY,CAAC;IAC/D,CAAC;IAqCD,YAAY,IAAY,EAAE,WAAsD,EAAE,IAAmC;QACjH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA8C,CAAC;YAC7D,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;aAAM;YACH,MAAM,IAAI,GAAG,WAA6C,CAAC;YAC3D,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,cAAc,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACnE,CAAC;;AAzFL,wCA0FC;AA5EG,gBAAgB;AACO,2BAAY,GAAG,gDAAgD,CAAC"}
|
package/storageCredential.d.ts
CHANGED
|
@@ -2,13 +2,13 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "./types/input";
|
|
3
3
|
import * as outputs from "./types/output";
|
|
4
4
|
/**
|
|
5
|
-
* > This resource can be used with an account or workspace-level provider.
|
|
6
|
-
*
|
|
7
5
|
* To work with external tables, Unity Catalog introduces two new objects to access and work with external cloud storage:
|
|
8
6
|
*
|
|
9
7
|
* - `databricks.StorageCredential` represents authentication methods to access cloud storage (e.g. an IAM role for Amazon S3 or a service principal/managed identity for Azure Storage). Storage credentials are access-controlled to determine which users can use the credential.
|
|
10
8
|
* - databricks.ExternalLocation are objects that combine a cloud storage path with a Storage Credential that can be used to access the location.
|
|
11
9
|
*
|
|
10
|
+
* > This resource can be used with an account or workspace-level provider.
|
|
11
|
+
*
|
|
12
12
|
* On AWS, the IAM role for a storage credential requires a trust policy. See [documentation](https://docs.databricks.com/en/connect/unity-catalog/cloud-storage/storage-credentials.html#step-1-create-an-iam-role) for more details. The data source databricks.getAwsUnityCatalogAssumeRolePolicy can be used to create the necessary AWS Unity Catalog assume role policy.
|
|
13
13
|
*
|
|
14
14
|
* ## Example Usage
|
package/storageCredential.js
CHANGED
|
@@ -6,13 +6,13 @@ exports.StorageCredential = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
-
* > This resource can be used with an account or workspace-level provider.
|
|
10
|
-
*
|
|
11
9
|
* To work with external tables, Unity Catalog introduces two new objects to access and work with external cloud storage:
|
|
12
10
|
*
|
|
13
11
|
* - `databricks.StorageCredential` represents authentication methods to access cloud storage (e.g. an IAM role for Amazon S3 or a service principal/managed identity for Azure Storage). Storage credentials are access-controlled to determine which users can use the credential.
|
|
14
12
|
* - databricks.ExternalLocation are objects that combine a cloud storage path with a Storage Credential that can be used to access the location.
|
|
15
13
|
*
|
|
14
|
+
* > This resource can be used with an account or workspace-level provider.
|
|
15
|
+
*
|
|
16
16
|
* On AWS, the IAM role for a storage credential requires a trust policy. See [documentation](https://docs.databricks.com/en/connect/unity-catalog/cloud-storage/storage-credentials.html#step-1-create-an-iam-role) for more details. The data source databricks.getAwsUnityCatalogAssumeRolePolicy can be used to create the necessary AWS Unity Catalog assume role policy.
|
|
17
17
|
*
|
|
18
18
|
* ## Example Usage
|
package/systemSchema.d.ts
CHANGED
|
@@ -1,13 +1,11 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
-
*
|
|
3
|
+
* Manages system tables enablement. System tables are a Databricks-hosted analytical store of your account’s operational data. System tables can be used for historical observability across your account. System tables must be enabled by an account admin.
|
|
4
4
|
*
|
|
5
5
|
* > This resource can only be used with a workspace-level provider!
|
|
6
6
|
*
|
|
7
7
|
* > Certain system schemas (such as `billing`) may be auto-enabled once GA and should not be manually declared in Pulumi configurations.
|
|
8
8
|
*
|
|
9
|
-
* Manages system tables enablement. System tables are a Databricks-hosted analytical store of your account’s operational data. System tables can be used for historical observability across your account. System tables must be enabled by an account admin.
|
|
10
|
-
*
|
|
11
9
|
* ## Example Usage
|
|
12
10
|
*
|
|
13
11
|
* Enable the system schema `access`
|
package/systemSchema.js
CHANGED
|
@@ -6,14 +6,12 @@ exports.SystemSchema = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
-
*
|
|
9
|
+
* Manages system tables enablement. System tables are a Databricks-hosted analytical store of your account’s operational data. System tables can be used for historical observability across your account. System tables must be enabled by an account admin.
|
|
10
10
|
*
|
|
11
11
|
* > This resource can only be used with a workspace-level provider!
|
|
12
12
|
*
|
|
13
13
|
* > Certain system schemas (such as `billing`) may be auto-enabled once GA and should not be manually declared in Pulumi configurations.
|
|
14
14
|
*
|
|
15
|
-
* Manages system tables enablement. System tables are a Databricks-hosted analytical store of your account’s operational data. System tables can be used for historical observability across your account. System tables must be enabled by an account admin.
|
|
16
|
-
*
|
|
17
15
|
* ## Example Usage
|
|
18
16
|
*
|
|
19
17
|
* Enable the system schema `access`
|
package/systemSchema.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"systemSchema.js","sourceRoot":"","sources":["../systemSchema.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"systemSchema.js","sourceRoot":"","sources":["../systemSchema.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2BG;AACH,MAAa,YAAa,SAAQ,MAAM,CAAC,cAAc;IACnD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAyB,EAAE,IAAmC;QACvH,OAAO,IAAI,YAAY,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACnE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,YAAY,CAAC,YAAY,CAAC;IAC7D,CAAC;IAyBD,YAAY,IAAY,EAAE,WAAkD,EAAE,IAAmC;QAC7G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA4C,CAAC;YAC3D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;aAAM;YACH,MAAM,IAAI,GAAG,WAA2C,CAAC;YACzD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAClD,cAAc,CAAC,UAAU,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC/C,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACrD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,YAAY,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACjE,CAAC;;AAvEL,oCAwEC;AA1DG,gBAAgB;AACO,yBAAY,GAAG,4CAA4C,CAAC"}
|
package/token.d.ts
CHANGED
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
-
* > This resource can only be used with a workspace-level provider!
|
|
4
|
-
*
|
|
5
3
|
* This resource creates [Personal Access Tokens](https://docs.databricks.com/sql/user/security/personal-access-tokens.html) for the same user that is authenticated with the provider. Most likely you should use databricks.OboToken to create [On-Behalf-Of tokens](https://docs.databricks.com/administration-guide/users-groups/service-principals.html#manage-personal-access-tokens-for-a-service-principal) for a databricks.ServicePrincipal in Databricks workspaces on AWS. Databricks workspaces on other clouds use their own native OAuth token flows.
|
|
6
4
|
*
|
|
5
|
+
* > This resource can only be used with a workspace-level provider!
|
|
6
|
+
*
|
|
7
7
|
* ## Example Usage
|
|
8
8
|
*
|
|
9
9
|
* ```typescript
|