@pulumi/snowflake 0.56.0-alpha.1721327760 → 0.56.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/apiAuthenticationIntegrationWithAuthorizationCodeGrant.d.ts +195 -0
- package/apiAuthenticationIntegrationWithAuthorizationCodeGrant.js +91 -0
- package/apiAuthenticationIntegrationWithAuthorizationCodeGrant.js.map +1 -0
- package/apiAuthenticationIntegrationWithClientCredentials.d.ts +183 -0
- package/apiAuthenticationIntegrationWithClientCredentials.js +89 -0
- package/apiAuthenticationIntegrationWithClientCredentials.js.map +1 -0
- package/apiAuthenticationIntegrationWithJwtBearer.d.ts +186 -0
- package/apiAuthenticationIntegrationWithJwtBearer.js +94 -0
- package/apiAuthenticationIntegrationWithJwtBearer.js.map +1 -0
- package/cortexSearchService.d.ts +159 -0
- package/cortexSearchService.js +92 -0
- package/cortexSearchService.js.map +1 -0
- package/database.d.ts +240 -77
- package/database.js +94 -45
- package/database.js.map +1 -1
- package/databaseOld.d.ts +187 -0
- package/databaseOld.js +110 -0
- package/databaseOld.js.map +1 -0
- package/externalOauthIntegration.d.ts +118 -116
- package/externalOauthIntegration.js +43 -55
- package/externalOauthIntegration.js.map +1 -1
- package/failoverGroup.d.ts +1 -1
- package/failoverGroup.js +1 -1
- package/getCortexSearchServices.d.ts +136 -0
- package/getCortexSearchServices.js +83 -0
- package/getCortexSearchServices.js.map +1 -0
- package/getDatabases.d.ts +41 -38
- package/getDatabases.js +8 -17
- package/getDatabases.js.map +1 -1
- package/getSecurityIntegrations.d.ts +61 -0
- package/getSecurityIntegrations.js +31 -0
- package/getSecurityIntegrations.js.map +1 -0
- package/getWarehouses.d.ts +53 -17
- package/getWarehouses.js +13 -18
- package/getWarehouses.js.map +1 -1
- package/grantPrivilegesToDatabaseRole.d.ts +0 -2
- package/grantPrivilegesToDatabaseRole.js +0 -2
- package/grantPrivilegesToDatabaseRole.js.map +1 -1
- package/index.d.ts +37 -82
- package/index.js +60 -139
- package/index.js.map +1 -1
- package/managedAccount.d.ts +3 -3
- package/oauthIntegration.d.ts +2 -0
- package/oauthIntegration.js +2 -0
- package/oauthIntegration.js.map +1 -1
- package/oauthIntegrationForCustomClients.d.ts +274 -0
- package/oauthIntegrationForCustomClients.js +148 -0
- package/oauthIntegrationForCustomClients.js.map +1 -0
- package/oauthIntegrationForPartnerApplications.d.ts +162 -0
- package/oauthIntegrationForPartnerApplications.js +84 -0
- package/oauthIntegrationForPartnerApplications.js.map +1 -0
- package/package.json +2 -2
- package/saml2Integration.d.ts +267 -0
- package/saml2Integration.js +106 -0
- package/saml2Integration.js.map +1 -0
- package/samlIntegration.d.ts +2 -0
- package/samlIntegration.js +2 -0
- package/samlIntegration.js.map +1 -1
- package/scimIntegration.d.ts +67 -33
- package/scimIntegration.js +19 -20
- package/scimIntegration.js.map +1 -1
- package/secondaryDatabase.d.ts +289 -0
- package/secondaryDatabase.js +103 -0
- package/secondaryDatabase.js.map +1 -0
- package/sequence.d.ts +3 -3
- package/sequence.js +3 -3
- package/sharedDatabase.d.ts +251 -0
- package/sharedDatabase.js +95 -0
- package/sharedDatabase.js.map +1 -0
- package/tagAssociation.d.ts +19 -19
- package/tagAssociation.js +19 -19
- package/types/input.d.ts +1015 -75
- package/types/output.d.ts +1835 -280
- package/userPasswordPolicyAttachment.d.ts +18 -0
- package/userPasswordPolicyAttachment.js +18 -0
- package/userPasswordPolicyAttachment.js.map +1 -1
- package/warehouse.d.ts +61 -48
- package/warehouse.js +8 -2
- package/warehouse.js.map +1 -1
- package/accountGrant.d.ts +0 -102
- package/accountGrant.js +0 -82
- package/accountGrant.js.map +0 -1
- package/databaseGrant.d.ts +0 -143
- package/databaseGrant.js +0 -96
- package/databaseGrant.js.map +0 -1
- package/externalTableGrant.d.ts +0 -194
- package/externalTableGrant.js +0 -110
- package/externalTableGrant.js.map +0 -1
- package/failoverGroupGrant.d.ts +0 -102
- package/failoverGroupGrant.js +0 -65
- package/failoverGroupGrant.js.map +0 -1
- package/fileFormatGrant.d.ts +0 -178
- package/fileFormatGrant.js +0 -104
- package/fileFormatGrant.js.map +0 -1
- package/functionGrant.d.ts +0 -210
- package/functionGrant.js +0 -116
- package/functionGrant.js.map +0 -1
- package/grantPrivilegesToRole.d.ts +0 -323
- package/grantPrivilegesToRole.js +0 -255
- package/grantPrivilegesToRole.js.map +0 -1
- package/integrationGrant.d.ts +0 -127
- package/integrationGrant.js +0 -90
- package/integrationGrant.js.map +0 -1
- package/maskingPolicyGrant.d.ts +0 -154
- package/maskingPolicyGrant.js +0 -103
- package/maskingPolicyGrant.js.map +0 -1
- package/materializedViewGrant.d.ts +0 -194
- package/materializedViewGrant.js +0 -107
- package/materializedViewGrant.js.map +0 -1
- package/pipeGrant.d.ts +0 -166
- package/pipeGrant.js +0 -99
- package/pipeGrant.js.map +0 -1
- package/procedureGrant.d.ts +0 -210
- package/procedureGrant.js +0 -116
- package/procedureGrant.js.map +0 -1
- package/resourceMonitorGrant.d.ts +0 -112
- package/resourceMonitorGrant.js +0 -85
- package/resourceMonitorGrant.js.map +0 -1
- package/roleGrants.d.ts +0 -115
- package/roleGrants.js +0 -98
- package/roleGrants.js.map +0 -1
- package/roleOwnershipGrant.d.ts +0 -108
- package/roleOwnershipGrant.js +0 -94
- package/roleOwnershipGrant.js.map +0 -1
- package/rowAccessPolicyGrant.d.ts +0 -153
- package/rowAccessPolicyGrant.js +0 -102
- package/rowAccessPolicyGrant.js.map +0 -1
- package/schemaGrant.d.ts +0 -172
- package/schemaGrant.js +0 -104
- package/schemaGrant.js.map +0 -1
- package/sequenceGrant.d.ts +0 -178
- package/sequenceGrant.js +0 -104
- package/sequenceGrant.js.map +0 -1
- package/stageGrant.d.ts +0 -178
- package/stageGrant.js +0 -104
- package/stageGrant.js.map +0 -1
- package/streamGrant.d.ts +0 -178
- package/streamGrant.js +0 -104
- package/streamGrant.js.map +0 -1
- package/tableGrant.d.ts +0 -188
- package/tableGrant.js +0 -101
- package/tableGrant.js.map +0 -1
- package/tagGrant.d.ts +0 -149
- package/tagGrant.js +0 -98
- package/tagGrant.js.map +0 -1
- package/taskGrant.d.ts +0 -178
- package/taskGrant.js +0 -104
- package/taskGrant.js.map +0 -1
- package/userGrant.d.ts +0 -115
- package/userGrant.js +0 -91
- package/userGrant.js.map +0 -1
- package/userOwnershipGrant.d.ts +0 -78
- package/userOwnershipGrant.js +0 -64
- package/userOwnershipGrant.js.map +0 -1
- package/viewGrant.d.ts +0 -205
- package/viewGrant.js +0 -118
- package/viewGrant.js.map +0 -1
- package/warehouseGrant.d.ts +0 -127
- package/warehouseGrant.js +0 -90
- package/warehouseGrant.js.map +0 -1
package/grantPrivilegesToRole.js
DELETED
|
@@ -1,255 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
-
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
-
exports.GrantPrivilegesToRole = void 0;
|
|
6
|
-
const pulumi = require("@pulumi/pulumi");
|
|
7
|
-
const utilities = require("./utilities");
|
|
8
|
-
/**
|
|
9
|
-
* > **Deprecation** This resource is deprecated and will be removed in a future major version release. Please use snowflake.GrantPrivilegesToAccountRole instead. <deprecation>
|
|
10
|
-
*
|
|
11
|
-
* ## Example Usage
|
|
12
|
-
*
|
|
13
|
-
* ```typescript
|
|
14
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
-
* import * as snowflake from "@pulumi/snowflake";
|
|
16
|
-
*
|
|
17
|
-
* //#################################
|
|
18
|
-
* //## global privileges
|
|
19
|
-
* //#################################
|
|
20
|
-
* // list of privileges
|
|
21
|
-
* const g1 = new snowflake.GrantPrivilegesToRole("g1", {
|
|
22
|
-
* privileges: [
|
|
23
|
-
* "MODIFY",
|
|
24
|
-
* "USAGE",
|
|
25
|
-
* ],
|
|
26
|
-
* roleName: r.name,
|
|
27
|
-
* onAccount: true,
|
|
28
|
-
* });
|
|
29
|
-
* // all privileges + grant option
|
|
30
|
-
* const g2 = new snowflake.GrantPrivilegesToRole("g2", {
|
|
31
|
-
* roleName: r.name,
|
|
32
|
-
* onAccount: true,
|
|
33
|
-
* allPrivileges: true,
|
|
34
|
-
* withGrantOption: true,
|
|
35
|
-
* });
|
|
36
|
-
* //#################################
|
|
37
|
-
* //## account object privileges
|
|
38
|
-
* //#################################
|
|
39
|
-
* // list of privileges
|
|
40
|
-
* const g3 = new snowflake.GrantPrivilegesToRole("g3", {
|
|
41
|
-
* privileges: [
|
|
42
|
-
* "CREATE",
|
|
43
|
-
* "MONITOR",
|
|
44
|
-
* ],
|
|
45
|
-
* roleName: r.name,
|
|
46
|
-
* onAccountObject: {
|
|
47
|
-
* objectType: "DATABASE",
|
|
48
|
-
* objectName: d.name,
|
|
49
|
-
* },
|
|
50
|
-
* });
|
|
51
|
-
* // all privileges + grant option
|
|
52
|
-
* const g4 = new snowflake.GrantPrivilegesToRole("g4", {
|
|
53
|
-
* roleName: r.name,
|
|
54
|
-
* onAccountObject: {
|
|
55
|
-
* objectType: "DATABASE",
|
|
56
|
-
* objectName: d.name,
|
|
57
|
-
* },
|
|
58
|
-
* allPrivileges: true,
|
|
59
|
-
* withGrantOption: true,
|
|
60
|
-
* });
|
|
61
|
-
* //#################################
|
|
62
|
-
* //## schema privileges
|
|
63
|
-
* //#################################
|
|
64
|
-
* // list of privileges
|
|
65
|
-
* const g5 = new snowflake.GrantPrivilegesToRole("g5", {
|
|
66
|
-
* privileges: [
|
|
67
|
-
* "MODIFY",
|
|
68
|
-
* "CREATE TABLE",
|
|
69
|
-
* ],
|
|
70
|
-
* roleName: r.name,
|
|
71
|
-
* onSchema: {
|
|
72
|
-
* schemaName: "\"my_db\".\"my_schema\"",
|
|
73
|
-
* },
|
|
74
|
-
* });
|
|
75
|
-
* // all privileges + grant option
|
|
76
|
-
* const g6 = new snowflake.GrantPrivilegesToRole("g6", {
|
|
77
|
-
* roleName: r.name,
|
|
78
|
-
* onSchema: {
|
|
79
|
-
* schemaName: "\"my_db\".\"my_schema\"",
|
|
80
|
-
* },
|
|
81
|
-
* allPrivileges: true,
|
|
82
|
-
* withGrantOption: true,
|
|
83
|
-
* });
|
|
84
|
-
* // all schemas in database
|
|
85
|
-
* const g7 = new snowflake.GrantPrivilegesToRole("g7", {
|
|
86
|
-
* privileges: [
|
|
87
|
-
* "MODIFY",
|
|
88
|
-
* "CREATE TABLE",
|
|
89
|
-
* ],
|
|
90
|
-
* roleName: r.name,
|
|
91
|
-
* onSchema: {
|
|
92
|
-
* allSchemasInDatabase: d.name,
|
|
93
|
-
* },
|
|
94
|
-
* });
|
|
95
|
-
* // future schemas in database
|
|
96
|
-
* const g8 = new snowflake.GrantPrivilegesToRole("g8", {
|
|
97
|
-
* privileges: [
|
|
98
|
-
* "MODIFY",
|
|
99
|
-
* "CREATE TABLE",
|
|
100
|
-
* ],
|
|
101
|
-
* roleName: r.name,
|
|
102
|
-
* onSchema: {
|
|
103
|
-
* futureSchemasInDatabase: d.name,
|
|
104
|
-
* },
|
|
105
|
-
* });
|
|
106
|
-
* //#################################
|
|
107
|
-
* //## schema object privileges
|
|
108
|
-
* //#################################
|
|
109
|
-
* // list of privileges
|
|
110
|
-
* const g9 = new snowflake.GrantPrivilegesToRole("g9", {
|
|
111
|
-
* privileges: [
|
|
112
|
-
* "SELECT",
|
|
113
|
-
* "REFERENCES",
|
|
114
|
-
* ],
|
|
115
|
-
* roleName: r.name,
|
|
116
|
-
* onSchemaObject: {
|
|
117
|
-
* objectType: "VIEW",
|
|
118
|
-
* objectName: "\"my_db\".\"my_schema\".\"my_view\"",
|
|
119
|
-
* },
|
|
120
|
-
* });
|
|
121
|
-
* // all privileges + grant option
|
|
122
|
-
* const g10 = new snowflake.GrantPrivilegesToRole("g10", {
|
|
123
|
-
* roleName: r.name,
|
|
124
|
-
* onSchemaObject: {
|
|
125
|
-
* objectType: "VIEW",
|
|
126
|
-
* objectName: "\"my_db\".\"my_schema\".\"my_view\"",
|
|
127
|
-
* },
|
|
128
|
-
* allPrivileges: true,
|
|
129
|
-
* withGrantOption: true,
|
|
130
|
-
* });
|
|
131
|
-
* // all in database
|
|
132
|
-
* const g11 = new snowflake.GrantPrivilegesToRole("g11", {
|
|
133
|
-
* privileges: [
|
|
134
|
-
* "SELECT",
|
|
135
|
-
* "INSERT",
|
|
136
|
-
* ],
|
|
137
|
-
* roleName: r.name,
|
|
138
|
-
* onSchemaObject: {
|
|
139
|
-
* all: {
|
|
140
|
-
* objectTypePlural: "TABLES",
|
|
141
|
-
* inDatabase: d.name,
|
|
142
|
-
* },
|
|
143
|
-
* },
|
|
144
|
-
* });
|
|
145
|
-
* // all in schema
|
|
146
|
-
* const g12 = new snowflake.GrantPrivilegesToRole("g12", {
|
|
147
|
-
* privileges: [
|
|
148
|
-
* "SELECT",
|
|
149
|
-
* "INSERT",
|
|
150
|
-
* ],
|
|
151
|
-
* roleName: r.name,
|
|
152
|
-
* onSchemaObject: {
|
|
153
|
-
* all: {
|
|
154
|
-
* objectTypePlural: "TABLES",
|
|
155
|
-
* inSchema: "\"my_db\".\"my_schema\"",
|
|
156
|
-
* },
|
|
157
|
-
* },
|
|
158
|
-
* });
|
|
159
|
-
* // future in database
|
|
160
|
-
* const g13 = new snowflake.GrantPrivilegesToRole("g13", {
|
|
161
|
-
* privileges: [
|
|
162
|
-
* "SELECT",
|
|
163
|
-
* "INSERT",
|
|
164
|
-
* ],
|
|
165
|
-
* roleName: r.name,
|
|
166
|
-
* onSchemaObject: {
|
|
167
|
-
* future: {
|
|
168
|
-
* objectTypePlural: "TABLES",
|
|
169
|
-
* inDatabase: d.name,
|
|
170
|
-
* },
|
|
171
|
-
* },
|
|
172
|
-
* });
|
|
173
|
-
* // future in schema
|
|
174
|
-
* const g14 = new snowflake.GrantPrivilegesToRole("g14", {
|
|
175
|
-
* privileges: [
|
|
176
|
-
* "SELECT",
|
|
177
|
-
* "INSERT",
|
|
178
|
-
* ],
|
|
179
|
-
* roleName: r.name,
|
|
180
|
-
* onSchemaObject: {
|
|
181
|
-
* future: {
|
|
182
|
-
* objectTypePlural: "TABLES",
|
|
183
|
-
* inSchema: "\"my_db\".\"my_schema\"",
|
|
184
|
-
* },
|
|
185
|
-
* },
|
|
186
|
-
* });
|
|
187
|
-
* ```
|
|
188
|
-
*
|
|
189
|
-
* ## Import
|
|
190
|
-
*
|
|
191
|
-
* format is role_name (string) | privileges (comma-delimited string) | all_privileges (bool) |with_grant_option (bool) | on_account (bool) | on_account_object (bool) | on_schema (bool) | on_schema_object (bool) | all (bool) | future (bool) | object_type (string) | object_name (string) | object_type_plural (string) | in_schema (bool) | schema_name (string) | in_database (bool) | database_name (string)
|
|
192
|
-
*
|
|
193
|
-
* ```sh
|
|
194
|
-
* $ pulumi import snowflake:index/grantPrivilegesToRole:GrantPrivilegesToRole "test_role|MANAGE GRANTS,MONITOR USAGE|false|false|true|false|false|false|false|false||||false||false|"
|
|
195
|
-
* ```
|
|
196
|
-
*/
|
|
197
|
-
class GrantPrivilegesToRole extends pulumi.CustomResource {
|
|
198
|
-
/**
|
|
199
|
-
* Get an existing GrantPrivilegesToRole resource's state with the given name, ID, and optional extra
|
|
200
|
-
* properties used to qualify the lookup.
|
|
201
|
-
*
|
|
202
|
-
* @param name The _unique_ name of the resulting resource.
|
|
203
|
-
* @param id The _unique_ provider ID of the resource to lookup.
|
|
204
|
-
* @param state Any extra arguments used during the lookup.
|
|
205
|
-
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
206
|
-
*/
|
|
207
|
-
static get(name, id, state, opts) {
|
|
208
|
-
return new GrantPrivilegesToRole(name, state, Object.assign(Object.assign({}, opts), { id: id }));
|
|
209
|
-
}
|
|
210
|
-
/**
|
|
211
|
-
* Returns true if the given object is an instance of GrantPrivilegesToRole. This is designed to work even
|
|
212
|
-
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
213
|
-
*/
|
|
214
|
-
static isInstance(obj) {
|
|
215
|
-
if (obj === undefined || obj === null) {
|
|
216
|
-
return false;
|
|
217
|
-
}
|
|
218
|
-
return obj['__pulumiType'] === GrantPrivilegesToRole.__pulumiType;
|
|
219
|
-
}
|
|
220
|
-
constructor(name, argsOrState, opts) {
|
|
221
|
-
let resourceInputs = {};
|
|
222
|
-
opts = opts || {};
|
|
223
|
-
if (opts.id) {
|
|
224
|
-
const state = argsOrState;
|
|
225
|
-
resourceInputs["allPrivileges"] = state ? state.allPrivileges : undefined;
|
|
226
|
-
resourceInputs["onAccount"] = state ? state.onAccount : undefined;
|
|
227
|
-
resourceInputs["onAccountObject"] = state ? state.onAccountObject : undefined;
|
|
228
|
-
resourceInputs["onSchema"] = state ? state.onSchema : undefined;
|
|
229
|
-
resourceInputs["onSchemaObject"] = state ? state.onSchemaObject : undefined;
|
|
230
|
-
resourceInputs["privileges"] = state ? state.privileges : undefined;
|
|
231
|
-
resourceInputs["roleName"] = state ? state.roleName : undefined;
|
|
232
|
-
resourceInputs["withGrantOption"] = state ? state.withGrantOption : undefined;
|
|
233
|
-
}
|
|
234
|
-
else {
|
|
235
|
-
const args = argsOrState;
|
|
236
|
-
if ((!args || args.roleName === undefined) && !opts.urn) {
|
|
237
|
-
throw new Error("Missing required property 'roleName'");
|
|
238
|
-
}
|
|
239
|
-
resourceInputs["allPrivileges"] = args ? args.allPrivileges : undefined;
|
|
240
|
-
resourceInputs["onAccount"] = args ? args.onAccount : undefined;
|
|
241
|
-
resourceInputs["onAccountObject"] = args ? args.onAccountObject : undefined;
|
|
242
|
-
resourceInputs["onSchema"] = args ? args.onSchema : undefined;
|
|
243
|
-
resourceInputs["onSchemaObject"] = args ? args.onSchemaObject : undefined;
|
|
244
|
-
resourceInputs["privileges"] = args ? args.privileges : undefined;
|
|
245
|
-
resourceInputs["roleName"] = args ? args.roleName : undefined;
|
|
246
|
-
resourceInputs["withGrantOption"] = args ? args.withGrantOption : undefined;
|
|
247
|
-
}
|
|
248
|
-
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
249
|
-
super(GrantPrivilegesToRole.__pulumiType, name, resourceInputs, opts);
|
|
250
|
-
}
|
|
251
|
-
}
|
|
252
|
-
exports.GrantPrivilegesToRole = GrantPrivilegesToRole;
|
|
253
|
-
/** @internal */
|
|
254
|
-
GrantPrivilegesToRole.__pulumiType = 'snowflake:index/grantPrivilegesToRole:GrantPrivilegesToRole';
|
|
255
|
-
//# sourceMappingURL=grantPrivilegesToRole.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"grantPrivilegesToRole.js","sourceRoot":"","sources":["../grantPrivilegesToRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4LG;AACH,MAAa,qBAAsB,SAAQ,MAAM,CAAC,cAAc;IAC5D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAkC,EAAE,IAAmC;QAChI,OAAO,IAAI,qBAAqB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC5E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,qBAAqB,CAAC,YAAY,CAAC;IACtE,CAAC;IA2CD,YAAY,IAAY,EAAE,WAAoE,EAAE,IAAmC;QAC/H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAqD,CAAC;YACpE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;aAAM;YACH,MAAM,IAAI,GAAG,WAAoD,CAAC;YAClE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/E;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,qBAAqB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC1E,CAAC;;AAlGL,sDAmGC;AArFG,gBAAgB;AACO,kCAAY,GAAG,6DAA6D,CAAC"}
|
package/integrationGrant.d.ts
DELETED
|
@@ -1,127 +0,0 @@
|
|
|
1
|
-
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
-
/**
|
|
3
|
-
* > **Deprecation** This resource is deprecated and will be removed in a future major version release. Please use snowflake.GrantPrivilegesToAccountRole instead. <deprecation>
|
|
4
|
-
*
|
|
5
|
-
* ## Example Usage
|
|
6
|
-
*
|
|
7
|
-
* ```typescript
|
|
8
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
9
|
-
* import * as snowflake from "@pulumi/snowflake";
|
|
10
|
-
*
|
|
11
|
-
* const grant = new snowflake.IntegrationGrant("grant", {
|
|
12
|
-
* integrationName: "integration",
|
|
13
|
-
* privilege: "USAGE",
|
|
14
|
-
* roles: [
|
|
15
|
-
* "role1",
|
|
16
|
-
* "role2",
|
|
17
|
-
* ],
|
|
18
|
-
* withGrantOption: false,
|
|
19
|
-
* });
|
|
20
|
-
* ```
|
|
21
|
-
*
|
|
22
|
-
* ## Import
|
|
23
|
-
*
|
|
24
|
-
* format is integration_name|privilege|with_grant_option|roles
|
|
25
|
-
*
|
|
26
|
-
* ```sh
|
|
27
|
-
* $ pulumi import snowflake:index/integrationGrant:IntegrationGrant example "MY_INTEGRATION|USAGE|false|role1,role2"
|
|
28
|
-
* ```
|
|
29
|
-
*/
|
|
30
|
-
export declare class IntegrationGrant extends pulumi.CustomResource {
|
|
31
|
-
/**
|
|
32
|
-
* Get an existing IntegrationGrant resource's state with the given name, ID, and optional extra
|
|
33
|
-
* properties used to qualify the lookup.
|
|
34
|
-
*
|
|
35
|
-
* @param name The _unique_ name of the resulting resource.
|
|
36
|
-
* @param id The _unique_ provider ID of the resource to lookup.
|
|
37
|
-
* @param state Any extra arguments used during the lookup.
|
|
38
|
-
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
39
|
-
*/
|
|
40
|
-
static get(name: string, id: pulumi.Input<pulumi.ID>, state?: IntegrationGrantState, opts?: pulumi.CustomResourceOptions): IntegrationGrant;
|
|
41
|
-
/**
|
|
42
|
-
* Returns true if the given object is an instance of IntegrationGrant. This is designed to work even
|
|
43
|
-
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
44
|
-
*/
|
|
45
|
-
static isInstance(obj: any): obj is IntegrationGrant;
|
|
46
|
-
readonly enableMultipleGrants: pulumi.Output<boolean | undefined>;
|
|
47
|
-
/**
|
|
48
|
-
* Identifier for the integration; must be unique for your account.
|
|
49
|
-
*/
|
|
50
|
-
readonly integrationName: pulumi.Output<string>;
|
|
51
|
-
/**
|
|
52
|
-
* The privilege to grant on the integration. To grant all privileges, use the value `ALL PRIVILEGES`
|
|
53
|
-
*/
|
|
54
|
-
readonly privilege: pulumi.Output<string | undefined>;
|
|
55
|
-
/**
|
|
56
|
-
* The name of the role to revert ownership to on destroy. Has no effect unless `privilege` is set to `OWNERSHIP`
|
|
57
|
-
*/
|
|
58
|
-
readonly revertOwnershipToRoleName: pulumi.Output<string | undefined>;
|
|
59
|
-
/**
|
|
60
|
-
* Grants privilege to these roles.
|
|
61
|
-
*/
|
|
62
|
-
readonly roles: pulumi.Output<string[] | undefined>;
|
|
63
|
-
/**
|
|
64
|
-
* When this is set to true, allows the recipient role to grant the privileges to other roles.
|
|
65
|
-
*/
|
|
66
|
-
readonly withGrantOption: pulumi.Output<boolean | undefined>;
|
|
67
|
-
/**
|
|
68
|
-
* Create a IntegrationGrant resource with the given unique name, arguments, and options.
|
|
69
|
-
*
|
|
70
|
-
* @param name The _unique_ name of the resource.
|
|
71
|
-
* @param args The arguments to use to populate this resource's properties.
|
|
72
|
-
* @param opts A bag of options that control this resource's behavior.
|
|
73
|
-
*/
|
|
74
|
-
constructor(name: string, args: IntegrationGrantArgs, opts?: pulumi.CustomResourceOptions);
|
|
75
|
-
}
|
|
76
|
-
/**
|
|
77
|
-
* Input properties used for looking up and filtering IntegrationGrant resources.
|
|
78
|
-
*/
|
|
79
|
-
export interface IntegrationGrantState {
|
|
80
|
-
enableMultipleGrants?: pulumi.Input<boolean>;
|
|
81
|
-
/**
|
|
82
|
-
* Identifier for the integration; must be unique for your account.
|
|
83
|
-
*/
|
|
84
|
-
integrationName?: pulumi.Input<string>;
|
|
85
|
-
/**
|
|
86
|
-
* The privilege to grant on the integration. To grant all privileges, use the value `ALL PRIVILEGES`
|
|
87
|
-
*/
|
|
88
|
-
privilege?: pulumi.Input<string>;
|
|
89
|
-
/**
|
|
90
|
-
* The name of the role to revert ownership to on destroy. Has no effect unless `privilege` is set to `OWNERSHIP`
|
|
91
|
-
*/
|
|
92
|
-
revertOwnershipToRoleName?: pulumi.Input<string>;
|
|
93
|
-
/**
|
|
94
|
-
* Grants privilege to these roles.
|
|
95
|
-
*/
|
|
96
|
-
roles?: pulumi.Input<pulumi.Input<string>[]>;
|
|
97
|
-
/**
|
|
98
|
-
* When this is set to true, allows the recipient role to grant the privileges to other roles.
|
|
99
|
-
*/
|
|
100
|
-
withGrantOption?: pulumi.Input<boolean>;
|
|
101
|
-
}
|
|
102
|
-
/**
|
|
103
|
-
* The set of arguments for constructing a IntegrationGrant resource.
|
|
104
|
-
*/
|
|
105
|
-
export interface IntegrationGrantArgs {
|
|
106
|
-
enableMultipleGrants?: pulumi.Input<boolean>;
|
|
107
|
-
/**
|
|
108
|
-
* Identifier for the integration; must be unique for your account.
|
|
109
|
-
*/
|
|
110
|
-
integrationName: pulumi.Input<string>;
|
|
111
|
-
/**
|
|
112
|
-
* The privilege to grant on the integration. To grant all privileges, use the value `ALL PRIVILEGES`
|
|
113
|
-
*/
|
|
114
|
-
privilege?: pulumi.Input<string>;
|
|
115
|
-
/**
|
|
116
|
-
* The name of the role to revert ownership to on destroy. Has no effect unless `privilege` is set to `OWNERSHIP`
|
|
117
|
-
*/
|
|
118
|
-
revertOwnershipToRoleName?: pulumi.Input<string>;
|
|
119
|
-
/**
|
|
120
|
-
* Grants privilege to these roles.
|
|
121
|
-
*/
|
|
122
|
-
roles?: pulumi.Input<pulumi.Input<string>[]>;
|
|
123
|
-
/**
|
|
124
|
-
* When this is set to true, allows the recipient role to grant the privileges to other roles.
|
|
125
|
-
*/
|
|
126
|
-
withGrantOption?: pulumi.Input<boolean>;
|
|
127
|
-
}
|
package/integrationGrant.js
DELETED
|
@@ -1,90 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
-
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
-
exports.IntegrationGrant = void 0;
|
|
6
|
-
const pulumi = require("@pulumi/pulumi");
|
|
7
|
-
const utilities = require("./utilities");
|
|
8
|
-
/**
|
|
9
|
-
* > **Deprecation** This resource is deprecated and will be removed in a future major version release. Please use snowflake.GrantPrivilegesToAccountRole instead. <deprecation>
|
|
10
|
-
*
|
|
11
|
-
* ## Example Usage
|
|
12
|
-
*
|
|
13
|
-
* ```typescript
|
|
14
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
-
* import * as snowflake from "@pulumi/snowflake";
|
|
16
|
-
*
|
|
17
|
-
* const grant = new snowflake.IntegrationGrant("grant", {
|
|
18
|
-
* integrationName: "integration",
|
|
19
|
-
* privilege: "USAGE",
|
|
20
|
-
* roles: [
|
|
21
|
-
* "role1",
|
|
22
|
-
* "role2",
|
|
23
|
-
* ],
|
|
24
|
-
* withGrantOption: false,
|
|
25
|
-
* });
|
|
26
|
-
* ```
|
|
27
|
-
*
|
|
28
|
-
* ## Import
|
|
29
|
-
*
|
|
30
|
-
* format is integration_name|privilege|with_grant_option|roles
|
|
31
|
-
*
|
|
32
|
-
* ```sh
|
|
33
|
-
* $ pulumi import snowflake:index/integrationGrant:IntegrationGrant example "MY_INTEGRATION|USAGE|false|role1,role2"
|
|
34
|
-
* ```
|
|
35
|
-
*/
|
|
36
|
-
class IntegrationGrant extends pulumi.CustomResource {
|
|
37
|
-
/**
|
|
38
|
-
* Get an existing IntegrationGrant resource's state with the given name, ID, and optional extra
|
|
39
|
-
* properties used to qualify the lookup.
|
|
40
|
-
*
|
|
41
|
-
* @param name The _unique_ name of the resulting resource.
|
|
42
|
-
* @param id The _unique_ provider ID of the resource to lookup.
|
|
43
|
-
* @param state Any extra arguments used during the lookup.
|
|
44
|
-
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
45
|
-
*/
|
|
46
|
-
static get(name, id, state, opts) {
|
|
47
|
-
return new IntegrationGrant(name, state, Object.assign(Object.assign({}, opts), { id: id }));
|
|
48
|
-
}
|
|
49
|
-
/**
|
|
50
|
-
* Returns true if the given object is an instance of IntegrationGrant. This is designed to work even
|
|
51
|
-
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
52
|
-
*/
|
|
53
|
-
static isInstance(obj) {
|
|
54
|
-
if (obj === undefined || obj === null) {
|
|
55
|
-
return false;
|
|
56
|
-
}
|
|
57
|
-
return obj['__pulumiType'] === IntegrationGrant.__pulumiType;
|
|
58
|
-
}
|
|
59
|
-
constructor(name, argsOrState, opts) {
|
|
60
|
-
let resourceInputs = {};
|
|
61
|
-
opts = opts || {};
|
|
62
|
-
if (opts.id) {
|
|
63
|
-
const state = argsOrState;
|
|
64
|
-
resourceInputs["enableMultipleGrants"] = state ? state.enableMultipleGrants : undefined;
|
|
65
|
-
resourceInputs["integrationName"] = state ? state.integrationName : undefined;
|
|
66
|
-
resourceInputs["privilege"] = state ? state.privilege : undefined;
|
|
67
|
-
resourceInputs["revertOwnershipToRoleName"] = state ? state.revertOwnershipToRoleName : undefined;
|
|
68
|
-
resourceInputs["roles"] = state ? state.roles : undefined;
|
|
69
|
-
resourceInputs["withGrantOption"] = state ? state.withGrantOption : undefined;
|
|
70
|
-
}
|
|
71
|
-
else {
|
|
72
|
-
const args = argsOrState;
|
|
73
|
-
if ((!args || args.integrationName === undefined) && !opts.urn) {
|
|
74
|
-
throw new Error("Missing required property 'integrationName'");
|
|
75
|
-
}
|
|
76
|
-
resourceInputs["enableMultipleGrants"] = args ? args.enableMultipleGrants : undefined;
|
|
77
|
-
resourceInputs["integrationName"] = args ? args.integrationName : undefined;
|
|
78
|
-
resourceInputs["privilege"] = args ? args.privilege : undefined;
|
|
79
|
-
resourceInputs["revertOwnershipToRoleName"] = args ? args.revertOwnershipToRoleName : undefined;
|
|
80
|
-
resourceInputs["roles"] = args ? args.roles : undefined;
|
|
81
|
-
resourceInputs["withGrantOption"] = args ? args.withGrantOption : undefined;
|
|
82
|
-
}
|
|
83
|
-
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
84
|
-
super(IntegrationGrant.__pulumiType, name, resourceInputs, opts);
|
|
85
|
-
}
|
|
86
|
-
}
|
|
87
|
-
exports.IntegrationGrant = IntegrationGrant;
|
|
88
|
-
/** @internal */
|
|
89
|
-
IntegrationGrant.__pulumiType = 'snowflake:index/integrationGrant:IntegrationGrant';
|
|
90
|
-
//# sourceMappingURL=integrationGrant.js.map
|
package/integrationGrant.js.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"integrationGrant.js","sourceRoot":"","sources":["../integrationGrant.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2BG;AACH,MAAa,gBAAiB,SAAQ,MAAM,CAAC,cAAc;IACvD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA6B,EAAE,IAAmC;QAC3H,OAAO,IAAI,gBAAgB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACvE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,gBAAgB,CAAC,YAAY,CAAC;IACjE,CAAC;IAgCD,YAAY,IAAY,EAAE,WAA0D,EAAE,IAAmC;QACrH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAgD,CAAC;YAC/D,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,2BAA2B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClG,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;aAAM;YACH,MAAM,IAAI,GAAG,WAA+C,CAAC;YAC7D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,eAAe,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC5D,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;aAClE;YACD,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,2BAA2B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/E;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,gBAAgB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACrE,CAAC;;AAnFL,4CAoFC;AAtEG,gBAAgB;AACO,6BAAY,GAAG,mDAAmD,CAAC"}
|
package/maskingPolicyGrant.d.ts
DELETED
|
@@ -1,154 +0,0 @@
|
|
|
1
|
-
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
-
/**
|
|
3
|
-
* > **Deprecation** This resource is deprecated and will be removed in a future major version release. Please use snowflake.GrantPrivilegesToAccountRole instead. <deprecation>
|
|
4
|
-
*
|
|
5
|
-
* ## Example Usage
|
|
6
|
-
*
|
|
7
|
-
* ```typescript
|
|
8
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
9
|
-
* import * as snowflake from "@pulumi/snowflake";
|
|
10
|
-
*
|
|
11
|
-
* const example = new snowflake.MaskingPolicyGrant("example", {
|
|
12
|
-
* maskingPolicyName: "EXAMPLE_MASKING_POLICY_NAME",
|
|
13
|
-
* databaseName: "EXAMPLE_DB_NAME",
|
|
14
|
-
* schemaName: "EXAMPLE_SCHEMA_NAME",
|
|
15
|
-
* privilege: "APPLY",
|
|
16
|
-
* roles: [
|
|
17
|
-
* "ROLE1_NAME",
|
|
18
|
-
* "ROLE2_NAME",
|
|
19
|
-
* ],
|
|
20
|
-
* withGrantOption: true,
|
|
21
|
-
* enableMultipleGrants: true,
|
|
22
|
-
* });
|
|
23
|
-
* ```
|
|
24
|
-
*
|
|
25
|
-
* ## Import
|
|
26
|
-
*
|
|
27
|
-
* format is database_name|schema_name|masking_policy_name|privilege|with_grant_option|roles
|
|
28
|
-
*
|
|
29
|
-
* ```sh
|
|
30
|
-
* $ pulumi import snowflake:index/maskingPolicyGrant:MaskingPolicyGrant example "dbName|schemaName|maskingPolicyName|USAGE|false|role1,role2"
|
|
31
|
-
* ```
|
|
32
|
-
*/
|
|
33
|
-
export declare class MaskingPolicyGrant extends pulumi.CustomResource {
|
|
34
|
-
/**
|
|
35
|
-
* Get an existing MaskingPolicyGrant resource's state with the given name, ID, and optional extra
|
|
36
|
-
* properties used to qualify the lookup.
|
|
37
|
-
*
|
|
38
|
-
* @param name The _unique_ name of the resulting resource.
|
|
39
|
-
* @param id The _unique_ provider ID of the resource to lookup.
|
|
40
|
-
* @param state Any extra arguments used during the lookup.
|
|
41
|
-
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
42
|
-
*/
|
|
43
|
-
static get(name: string, id: pulumi.Input<pulumi.ID>, state?: MaskingPolicyGrantState, opts?: pulumi.CustomResourceOptions): MaskingPolicyGrant;
|
|
44
|
-
/**
|
|
45
|
-
* Returns true if the given object is an instance of MaskingPolicyGrant. This is designed to work even
|
|
46
|
-
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
47
|
-
*/
|
|
48
|
-
static isInstance(obj: any): obj is MaskingPolicyGrant;
|
|
49
|
-
/**
|
|
50
|
-
* The name of the database containing the masking policy on which to grant privileges.
|
|
51
|
-
*/
|
|
52
|
-
readonly databaseName: pulumi.Output<string>;
|
|
53
|
-
readonly enableMultipleGrants: pulumi.Output<boolean | undefined>;
|
|
54
|
-
/**
|
|
55
|
-
* The name of the masking policy on which to grant privileges immediately.
|
|
56
|
-
*/
|
|
57
|
-
readonly maskingPolicyName: pulumi.Output<string>;
|
|
58
|
-
/**
|
|
59
|
-
* The privilege to grant on the masking policy. To grant all privileges, use the value `ALL PRIVILEGES`
|
|
60
|
-
*/
|
|
61
|
-
readonly privilege: pulumi.Output<string | undefined>;
|
|
62
|
-
/**
|
|
63
|
-
* The name of the role to revert ownership to on destroy. Has no effect unless `privilege` is set to `OWNERSHIP`
|
|
64
|
-
*/
|
|
65
|
-
readonly revertOwnershipToRoleName: pulumi.Output<string | undefined>;
|
|
66
|
-
/**
|
|
67
|
-
* Grants privilege to these roles.
|
|
68
|
-
*/
|
|
69
|
-
readonly roles: pulumi.Output<string[] | undefined>;
|
|
70
|
-
/**
|
|
71
|
-
* The name of the schema containing the masking policy on which to grant privileges.
|
|
72
|
-
*/
|
|
73
|
-
readonly schemaName: pulumi.Output<string>;
|
|
74
|
-
/**
|
|
75
|
-
* When this is set to true, allows the recipient role to grant the privileges to other roles.
|
|
76
|
-
*/
|
|
77
|
-
readonly withGrantOption: pulumi.Output<boolean | undefined>;
|
|
78
|
-
/**
|
|
79
|
-
* Create a MaskingPolicyGrant resource with the given unique name, arguments, and options.
|
|
80
|
-
*
|
|
81
|
-
* @param name The _unique_ name of the resource.
|
|
82
|
-
* @param args The arguments to use to populate this resource's properties.
|
|
83
|
-
* @param opts A bag of options that control this resource's behavior.
|
|
84
|
-
*/
|
|
85
|
-
constructor(name: string, args: MaskingPolicyGrantArgs, opts?: pulumi.CustomResourceOptions);
|
|
86
|
-
}
|
|
87
|
-
/**
|
|
88
|
-
* Input properties used for looking up and filtering MaskingPolicyGrant resources.
|
|
89
|
-
*/
|
|
90
|
-
export interface MaskingPolicyGrantState {
|
|
91
|
-
/**
|
|
92
|
-
* The name of the database containing the masking policy on which to grant privileges.
|
|
93
|
-
*/
|
|
94
|
-
databaseName?: pulumi.Input<string>;
|
|
95
|
-
enableMultipleGrants?: pulumi.Input<boolean>;
|
|
96
|
-
/**
|
|
97
|
-
* The name of the masking policy on which to grant privileges immediately.
|
|
98
|
-
*/
|
|
99
|
-
maskingPolicyName?: pulumi.Input<string>;
|
|
100
|
-
/**
|
|
101
|
-
* The privilege to grant on the masking policy. To grant all privileges, use the value `ALL PRIVILEGES`
|
|
102
|
-
*/
|
|
103
|
-
privilege?: pulumi.Input<string>;
|
|
104
|
-
/**
|
|
105
|
-
* The name of the role to revert ownership to on destroy. Has no effect unless `privilege` is set to `OWNERSHIP`
|
|
106
|
-
*/
|
|
107
|
-
revertOwnershipToRoleName?: pulumi.Input<string>;
|
|
108
|
-
/**
|
|
109
|
-
* Grants privilege to these roles.
|
|
110
|
-
*/
|
|
111
|
-
roles?: pulumi.Input<pulumi.Input<string>[]>;
|
|
112
|
-
/**
|
|
113
|
-
* The name of the schema containing the masking policy on which to grant privileges.
|
|
114
|
-
*/
|
|
115
|
-
schemaName?: pulumi.Input<string>;
|
|
116
|
-
/**
|
|
117
|
-
* When this is set to true, allows the recipient role to grant the privileges to other roles.
|
|
118
|
-
*/
|
|
119
|
-
withGrantOption?: pulumi.Input<boolean>;
|
|
120
|
-
}
|
|
121
|
-
/**
|
|
122
|
-
* The set of arguments for constructing a MaskingPolicyGrant resource.
|
|
123
|
-
*/
|
|
124
|
-
export interface MaskingPolicyGrantArgs {
|
|
125
|
-
/**
|
|
126
|
-
* The name of the database containing the masking policy on which to grant privileges.
|
|
127
|
-
*/
|
|
128
|
-
databaseName: pulumi.Input<string>;
|
|
129
|
-
enableMultipleGrants?: pulumi.Input<boolean>;
|
|
130
|
-
/**
|
|
131
|
-
* The name of the masking policy on which to grant privileges immediately.
|
|
132
|
-
*/
|
|
133
|
-
maskingPolicyName: pulumi.Input<string>;
|
|
134
|
-
/**
|
|
135
|
-
* The privilege to grant on the masking policy. To grant all privileges, use the value `ALL PRIVILEGES`
|
|
136
|
-
*/
|
|
137
|
-
privilege?: pulumi.Input<string>;
|
|
138
|
-
/**
|
|
139
|
-
* The name of the role to revert ownership to on destroy. Has no effect unless `privilege` is set to `OWNERSHIP`
|
|
140
|
-
*/
|
|
141
|
-
revertOwnershipToRoleName?: pulumi.Input<string>;
|
|
142
|
-
/**
|
|
143
|
-
* Grants privilege to these roles.
|
|
144
|
-
*/
|
|
145
|
-
roles?: pulumi.Input<pulumi.Input<string>[]>;
|
|
146
|
-
/**
|
|
147
|
-
* The name of the schema containing the masking policy on which to grant privileges.
|
|
148
|
-
*/
|
|
149
|
-
schemaName: pulumi.Input<string>;
|
|
150
|
-
/**
|
|
151
|
-
* When this is set to true, allows the recipient role to grant the privileges to other roles.
|
|
152
|
-
*/
|
|
153
|
-
withGrantOption?: pulumi.Input<boolean>;
|
|
154
|
-
}
|