pulumi-snowflake 0.50.2a1709892015__py3-none-any.whl → 1.2.0a1736835738__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-snowflake might be problematic. Click here for more details.
- pulumi_snowflake/__init__.py +224 -172
- pulumi_snowflake/_inputs.py +52854 -1662
- pulumi_snowflake/_utilities.py +41 -5
- pulumi_snowflake/account.py +188 -214
- pulumi_snowflake/account_authentication_policy_attachment.py +149 -0
- pulumi_snowflake/account_parameter.py +21 -44
- pulumi_snowflake/account_password_policy_attachment.py +7 -28
- pulumi_snowflake/account_role.py +250 -0
- pulumi_snowflake/alert.py +38 -43
- pulumi_snowflake/api_authentication_integration_with_authorization_code_grant.py +704 -0
- pulumi_snowflake/api_authentication_integration_with_client_credentials.py +657 -0
- pulumi_snowflake/api_authentication_integration_with_jwt_bearer.py +692 -0
- pulumi_snowflake/api_integration.py +35 -50
- pulumi_snowflake/authentication_policy.py +622 -0
- pulumi_snowflake/config/__init__.pyi +76 -99
- pulumi_snowflake/config/outputs.py +5 -0
- pulumi_snowflake/config/vars.py +93 -124
- pulumi_snowflake/cortex_search_service.py +596 -0
- pulumi_snowflake/database.py +819 -209
- pulumi_snowflake/database_role.py +81 -40
- pulumi_snowflake/dynamic_table.py +44 -47
- pulumi_snowflake/email_notification_integration.py +35 -26
- pulumi_snowflake/{unsafe_execute.py → execute.py} +36 -139
- pulumi_snowflake/external_function.py +54 -71
- pulumi_snowflake/external_oauth_integration.py +593 -538
- pulumi_snowflake/external_table.py +67 -86
- pulumi_snowflake/external_volume.py +382 -0
- pulumi_snowflake/failover_group.py +59 -96
- pulumi_snowflake/file_format.py +33 -24
- pulumi_snowflake/function_java.py +1211 -0
- pulumi_snowflake/function_javascript.py +882 -0
- pulumi_snowflake/function_python.py +1212 -0
- pulumi_snowflake/function_scala.py +1212 -0
- pulumi_snowflake/function_sql.py +835 -0
- pulumi_snowflake/get_account_roles.py +129 -0
- pulumi_snowflake/get_accounts.py +53 -22
- pulumi_snowflake/get_alerts.py +22 -5
- pulumi_snowflake/get_connections.py +109 -0
- pulumi_snowflake/get_cortex_search_services.py +216 -0
- pulumi_snowflake/get_current_account.py +24 -9
- pulumi_snowflake/get_current_role.py +14 -7
- pulumi_snowflake/get_database.py +25 -5
- pulumi_snowflake/get_database_role.py +162 -0
- pulumi_snowflake/get_database_roles.py +79 -43
- pulumi_snowflake/get_databases.py +91 -69
- pulumi_snowflake/get_dynamic_tables.py +36 -19
- pulumi_snowflake/get_external_functions.py +28 -5
- pulumi_snowflake/get_external_tables.py +28 -5
- pulumi_snowflake/get_failover_groups.py +18 -7
- pulumi_snowflake/get_file_formats.py +28 -5
- pulumi_snowflake/get_functions.py +28 -5
- pulumi_snowflake/get_grants.py +207 -80
- pulumi_snowflake/get_masking_policies.py +91 -47
- pulumi_snowflake/get_materialized_views.py +28 -5
- pulumi_snowflake/get_network_policies.py +129 -0
- pulumi_snowflake/get_parameters.py +38 -11
- pulumi_snowflake/get_pipes.py +28 -5
- pulumi_snowflake/get_procedures.py +28 -5
- pulumi_snowflake/get_resource_monitors.py +37 -20
- pulumi_snowflake/get_row_access_policies.py +91 -47
- pulumi_snowflake/get_schemas.py +145 -37
- pulumi_snowflake/get_secrets.py +200 -0
- pulumi_snowflake/get_security_integrations.py +129 -0
- pulumi_snowflake/get_sequences.py +28 -5
- pulumi_snowflake/get_shares.py +18 -5
- pulumi_snowflake/get_stages.py +28 -5
- pulumi_snowflake/get_storage_integrations.py +16 -5
- pulumi_snowflake/get_streamlits.py +170 -0
- pulumi_snowflake/get_streams.py +114 -50
- pulumi_snowflake/get_system_generate_scim_access_token.py +18 -5
- pulumi_snowflake/get_system_get_aws_sns_iam_policy.py +32 -7
- pulumi_snowflake/get_system_get_private_link_config.py +121 -6
- pulumi_snowflake/get_system_get_snowflake_platform_info.py +15 -7
- pulumi_snowflake/get_tables.py +28 -5
- pulumi_snowflake/get_tags.py +130 -0
- pulumi_snowflake/get_tasks.py +134 -50
- pulumi_snowflake/get_users.py +116 -40
- pulumi_snowflake/get_views.py +114 -50
- pulumi_snowflake/get_warehouses.py +79 -22
- pulumi_snowflake/grant_account_role.py +28 -61
- pulumi_snowflake/grant_application_role.py +257 -0
- pulumi_snowflake/grant_database_role.py +35 -108
- pulumi_snowflake/grant_ownership.py +382 -0
- pulumi_snowflake/grant_privileges_to_account_role.py +42 -78
- pulumi_snowflake/grant_privileges_to_database_role.py +37 -223
- pulumi_snowflake/grant_privileges_to_share.py +96 -44
- pulumi_snowflake/legacy_service_user.py +3670 -0
- pulumi_snowflake/managed_account.py +42 -9
- pulumi_snowflake/masking_policy.py +213 -306
- pulumi_snowflake/materialized_view.py +62 -67
- pulumi_snowflake/network_policy.py +217 -57
- pulumi_snowflake/network_policy_attachment.py +7 -32
- pulumi_snowflake/network_rule.py +473 -0
- pulumi_snowflake/notification_integration.py +51 -82
- pulumi_snowflake/oauth_integration_for_custom_clients.py +906 -0
- pulumi_snowflake/{oauth_integration.py → oauth_integration_for_partner_applications.py} +191 -188
- pulumi_snowflake/object_parameter.py +12 -99
- pulumi_snowflake/outputs.py +49200 -2928
- pulumi_snowflake/password_policy.py +41 -28
- pulumi_snowflake/pipe.py +33 -0
- pulumi_snowflake/primary_connection.py +330 -0
- pulumi_snowflake/procedure_java.py +1273 -0
- pulumi_snowflake/procedure_javascript.py +895 -0
- pulumi_snowflake/procedure_python.py +1226 -0
- pulumi_snowflake/procedure_scala.py +1273 -0
- pulumi_snowflake/procedure_sql.py +895 -0
- pulumi_snowflake/provider.py +378 -613
- pulumi_snowflake/pulumi-plugin.json +2 -1
- pulumi_snowflake/resource_monitor.py +118 -323
- pulumi_snowflake/row_access_policy.py +200 -145
- pulumi_snowflake/{saml_integration.py → saml2_integration.py} +356 -295
- pulumi_snowflake/schema.py +949 -174
- pulumi_snowflake/scim_integration.py +286 -105
- pulumi_snowflake/secondary_connection.py +339 -0
- pulumi_snowflake/secondary_database.py +1080 -0
- pulumi_snowflake/secret_with_authorization_code_grant.py +548 -0
- pulumi_snowflake/secret_with_basic_authentication.py +500 -0
- pulumi_snowflake/secret_with_client_credentials.py +511 -0
- pulumi_snowflake/secret_with_generic_string.py +452 -0
- pulumi_snowflake/sequence.py +9 -30
- pulumi_snowflake/service_user.py +3585 -0
- pulumi_snowflake/share.py +35 -26
- pulumi_snowflake/shared_database.py +939 -0
- pulumi_snowflake/stage.py +95 -80
- pulumi_snowflake/storage_integration.py +48 -2
- pulumi_snowflake/stream_on_directory_table.py +517 -0
- pulumi_snowflake/stream_on_external_table.py +632 -0
- pulumi_snowflake/stream_on_table.py +666 -0
- pulumi_snowflake/stream_on_view.py +666 -0
- pulumi_snowflake/streamlit.py +671 -0
- pulumi_snowflake/table.py +86 -93
- pulumi_snowflake/table_column_masking_policy_application.py +7 -14
- pulumi_snowflake/table_constraint.py +29 -168
- pulumi_snowflake/tag.py +142 -70
- pulumi_snowflake/tag_association.py +40 -211
- pulumi_snowflake/task.py +3048 -414
- pulumi_snowflake/user.py +3351 -380
- pulumi_snowflake/user_authentication_policy_attachment.py +197 -0
- pulumi_snowflake/user_password_policy_attachment.py +7 -6
- pulumi_snowflake/user_public_keys.py +5 -0
- pulumi_snowflake/view.py +466 -211
- pulumi_snowflake/warehouse.py +184 -164
- {pulumi_snowflake-0.50.2a1709892015.dist-info → pulumi_snowflake-1.2.0a1736835738.dist-info}/METADATA +7 -6
- pulumi_snowflake-1.2.0a1736835738.dist-info/RECORD +148 -0
- {pulumi_snowflake-0.50.2a1709892015.dist-info → pulumi_snowflake-1.2.0a1736835738.dist-info}/WHEEL +1 -1
- pulumi_snowflake/account_grant.py +0 -339
- pulumi_snowflake/database_grant.py +0 -491
- pulumi_snowflake/external_table_grant.py +0 -686
- pulumi_snowflake/failover_group_grant.py +0 -388
- pulumi_snowflake/file_format_grant.py +0 -631
- pulumi_snowflake/function.py +0 -868
- pulumi_snowflake/function_grant.py +0 -741
- pulumi_snowflake/get_role.py +0 -117
- pulumi_snowflake/get_roles.py +0 -116
- pulumi_snowflake/grant_privileges_to_role.py +0 -667
- pulumi_snowflake/integration_grant.py +0 -436
- pulumi_snowflake/masking_policy_grant.py +0 -538
- pulumi_snowflake/materialized_view_grant.py +0 -685
- pulumi_snowflake/pipe_grant.py +0 -583
- pulumi_snowflake/procedure.py +0 -883
- pulumi_snowflake/procedure_grant.py +0 -741
- pulumi_snowflake/resource_monitor_grant.py +0 -383
- pulumi_snowflake/role.py +0 -269
- pulumi_snowflake/role_grants.py +0 -348
- pulumi_snowflake/role_ownership_grant.py +0 -334
- pulumi_snowflake/row_access_policy_grant.py +0 -536
- pulumi_snowflake/schema_grant.py +0 -643
- pulumi_snowflake/sequence_grant.py +0 -631
- pulumi_snowflake/session_parameter.py +0 -328
- pulumi_snowflake/stage_grant.py +0 -631
- pulumi_snowflake/stream.py +0 -610
- pulumi_snowflake/stream_grant.py +0 -631
- pulumi_snowflake/table_grant.py +0 -673
- pulumi_snowflake/tag_grant.py +0 -528
- pulumi_snowflake/tag_masking_policy_association.py +0 -210
- pulumi_snowflake/task_grant.py +0 -631
- pulumi_snowflake/user_grant.py +0 -390
- pulumi_snowflake/user_ownership_grant.py +0 -286
- pulumi_snowflake/view_grant.py +0 -701
- pulumi_snowflake/warehouse_grant.py +0 -436
- pulumi_snowflake-0.50.2a1709892015.dist-info/RECORD +0 -136
- {pulumi_snowflake-0.50.2a1709892015.dist-info → pulumi_snowflake-1.2.0a1736835738.dist-info}/top_level.txt +0 -0
|
@@ -1,538 +0,0 @@
|
|
|
1
|
-
# coding=utf-8
|
|
2
|
-
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
-
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
-
|
|
5
|
-
import copy
|
|
6
|
-
import warnings
|
|
7
|
-
import pulumi
|
|
8
|
-
import pulumi.runtime
|
|
9
|
-
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
10
|
-
from . import _utilities
|
|
11
|
-
|
|
12
|
-
__all__ = ['MaskingPolicyGrantArgs', 'MaskingPolicyGrant']
|
|
13
|
-
|
|
14
|
-
@pulumi.input_type
|
|
15
|
-
class MaskingPolicyGrantArgs:
|
|
16
|
-
def __init__(__self__, *,
|
|
17
|
-
database_name: pulumi.Input[str],
|
|
18
|
-
masking_policy_name: pulumi.Input[str],
|
|
19
|
-
schema_name: pulumi.Input[str],
|
|
20
|
-
enable_multiple_grants: Optional[pulumi.Input[bool]] = None,
|
|
21
|
-
privilege: Optional[pulumi.Input[str]] = None,
|
|
22
|
-
revert_ownership_to_role_name: Optional[pulumi.Input[str]] = None,
|
|
23
|
-
roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
24
|
-
with_grant_option: Optional[pulumi.Input[bool]] = None):
|
|
25
|
-
"""
|
|
26
|
-
The set of arguments for constructing a MaskingPolicyGrant resource.
|
|
27
|
-
:param pulumi.Input[str] database_name: The name of the database containing the masking policy on which to grant privileges.
|
|
28
|
-
:param pulumi.Input[str] masking_policy_name: The name of the masking policy on which to grant privileges immediately.
|
|
29
|
-
:param pulumi.Input[str] schema_name: The name of the schema containing the masking policy on which to grant privileges.
|
|
30
|
-
:param pulumi.Input[bool] enable_multiple_grants: When this is set to true, multiple grants of the same type can be created. This will cause Terraform to not revoke
|
|
31
|
-
grants applied to roles and objects outside Terraform.
|
|
32
|
-
:param pulumi.Input[str] privilege: The privilege to grant on the masking policy. To grant all privileges, use the value `ALL PRIVILEGES`
|
|
33
|
-
:param pulumi.Input[str] revert_ownership_to_role_name: The name of the role to revert ownership to on destroy. Has no effect unless `privilege` is set to `OWNERSHIP`
|
|
34
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] roles: Grants privilege to these roles.
|
|
35
|
-
:param pulumi.Input[bool] with_grant_option: When this is set to true, allows the recipient role to grant the privileges to other roles.
|
|
36
|
-
"""
|
|
37
|
-
pulumi.set(__self__, "database_name", database_name)
|
|
38
|
-
pulumi.set(__self__, "masking_policy_name", masking_policy_name)
|
|
39
|
-
pulumi.set(__self__, "schema_name", schema_name)
|
|
40
|
-
if enable_multiple_grants is not None:
|
|
41
|
-
pulumi.set(__self__, "enable_multiple_grants", enable_multiple_grants)
|
|
42
|
-
if privilege is not None:
|
|
43
|
-
pulumi.set(__self__, "privilege", privilege)
|
|
44
|
-
if revert_ownership_to_role_name is not None:
|
|
45
|
-
pulumi.set(__self__, "revert_ownership_to_role_name", revert_ownership_to_role_name)
|
|
46
|
-
if roles is not None:
|
|
47
|
-
pulumi.set(__self__, "roles", roles)
|
|
48
|
-
if with_grant_option is not None:
|
|
49
|
-
pulumi.set(__self__, "with_grant_option", with_grant_option)
|
|
50
|
-
|
|
51
|
-
@property
|
|
52
|
-
@pulumi.getter(name="databaseName")
|
|
53
|
-
def database_name(self) -> pulumi.Input[str]:
|
|
54
|
-
"""
|
|
55
|
-
The name of the database containing the masking policy on which to grant privileges.
|
|
56
|
-
"""
|
|
57
|
-
return pulumi.get(self, "database_name")
|
|
58
|
-
|
|
59
|
-
@database_name.setter
|
|
60
|
-
def database_name(self, value: pulumi.Input[str]):
|
|
61
|
-
pulumi.set(self, "database_name", value)
|
|
62
|
-
|
|
63
|
-
@property
|
|
64
|
-
@pulumi.getter(name="maskingPolicyName")
|
|
65
|
-
def masking_policy_name(self) -> pulumi.Input[str]:
|
|
66
|
-
"""
|
|
67
|
-
The name of the masking policy on which to grant privileges immediately.
|
|
68
|
-
"""
|
|
69
|
-
return pulumi.get(self, "masking_policy_name")
|
|
70
|
-
|
|
71
|
-
@masking_policy_name.setter
|
|
72
|
-
def masking_policy_name(self, value: pulumi.Input[str]):
|
|
73
|
-
pulumi.set(self, "masking_policy_name", value)
|
|
74
|
-
|
|
75
|
-
@property
|
|
76
|
-
@pulumi.getter(name="schemaName")
|
|
77
|
-
def schema_name(self) -> pulumi.Input[str]:
|
|
78
|
-
"""
|
|
79
|
-
The name of the schema containing the masking policy on which to grant privileges.
|
|
80
|
-
"""
|
|
81
|
-
return pulumi.get(self, "schema_name")
|
|
82
|
-
|
|
83
|
-
@schema_name.setter
|
|
84
|
-
def schema_name(self, value: pulumi.Input[str]):
|
|
85
|
-
pulumi.set(self, "schema_name", value)
|
|
86
|
-
|
|
87
|
-
@property
|
|
88
|
-
@pulumi.getter(name="enableMultipleGrants")
|
|
89
|
-
def enable_multiple_grants(self) -> Optional[pulumi.Input[bool]]:
|
|
90
|
-
"""
|
|
91
|
-
When this is set to true, multiple grants of the same type can be created. This will cause Terraform to not revoke
|
|
92
|
-
grants applied to roles and objects outside Terraform.
|
|
93
|
-
"""
|
|
94
|
-
return pulumi.get(self, "enable_multiple_grants")
|
|
95
|
-
|
|
96
|
-
@enable_multiple_grants.setter
|
|
97
|
-
def enable_multiple_grants(self, value: Optional[pulumi.Input[bool]]):
|
|
98
|
-
pulumi.set(self, "enable_multiple_grants", value)
|
|
99
|
-
|
|
100
|
-
@property
|
|
101
|
-
@pulumi.getter
|
|
102
|
-
def privilege(self) -> Optional[pulumi.Input[str]]:
|
|
103
|
-
"""
|
|
104
|
-
The privilege to grant on the masking policy. To grant all privileges, use the value `ALL PRIVILEGES`
|
|
105
|
-
"""
|
|
106
|
-
return pulumi.get(self, "privilege")
|
|
107
|
-
|
|
108
|
-
@privilege.setter
|
|
109
|
-
def privilege(self, value: Optional[pulumi.Input[str]]):
|
|
110
|
-
pulumi.set(self, "privilege", value)
|
|
111
|
-
|
|
112
|
-
@property
|
|
113
|
-
@pulumi.getter(name="revertOwnershipToRoleName")
|
|
114
|
-
def revert_ownership_to_role_name(self) -> Optional[pulumi.Input[str]]:
|
|
115
|
-
"""
|
|
116
|
-
The name of the role to revert ownership to on destroy. Has no effect unless `privilege` is set to `OWNERSHIP`
|
|
117
|
-
"""
|
|
118
|
-
return pulumi.get(self, "revert_ownership_to_role_name")
|
|
119
|
-
|
|
120
|
-
@revert_ownership_to_role_name.setter
|
|
121
|
-
def revert_ownership_to_role_name(self, value: Optional[pulumi.Input[str]]):
|
|
122
|
-
pulumi.set(self, "revert_ownership_to_role_name", value)
|
|
123
|
-
|
|
124
|
-
@property
|
|
125
|
-
@pulumi.getter
|
|
126
|
-
def roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
|
127
|
-
"""
|
|
128
|
-
Grants privilege to these roles.
|
|
129
|
-
"""
|
|
130
|
-
return pulumi.get(self, "roles")
|
|
131
|
-
|
|
132
|
-
@roles.setter
|
|
133
|
-
def roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
|
134
|
-
pulumi.set(self, "roles", value)
|
|
135
|
-
|
|
136
|
-
@property
|
|
137
|
-
@pulumi.getter(name="withGrantOption")
|
|
138
|
-
def with_grant_option(self) -> Optional[pulumi.Input[bool]]:
|
|
139
|
-
"""
|
|
140
|
-
When this is set to true, allows the recipient role to grant the privileges to other roles.
|
|
141
|
-
"""
|
|
142
|
-
return pulumi.get(self, "with_grant_option")
|
|
143
|
-
|
|
144
|
-
@with_grant_option.setter
|
|
145
|
-
def with_grant_option(self, value: Optional[pulumi.Input[bool]]):
|
|
146
|
-
pulumi.set(self, "with_grant_option", value)
|
|
147
|
-
|
|
148
|
-
|
|
149
|
-
@pulumi.input_type
|
|
150
|
-
class _MaskingPolicyGrantState:
|
|
151
|
-
def __init__(__self__, *,
|
|
152
|
-
database_name: Optional[pulumi.Input[str]] = None,
|
|
153
|
-
enable_multiple_grants: Optional[pulumi.Input[bool]] = None,
|
|
154
|
-
masking_policy_name: Optional[pulumi.Input[str]] = None,
|
|
155
|
-
privilege: Optional[pulumi.Input[str]] = None,
|
|
156
|
-
revert_ownership_to_role_name: Optional[pulumi.Input[str]] = None,
|
|
157
|
-
roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
158
|
-
schema_name: Optional[pulumi.Input[str]] = None,
|
|
159
|
-
with_grant_option: Optional[pulumi.Input[bool]] = None):
|
|
160
|
-
"""
|
|
161
|
-
Input properties used for looking up and filtering MaskingPolicyGrant resources.
|
|
162
|
-
:param pulumi.Input[str] database_name: The name of the database containing the masking policy on which to grant privileges.
|
|
163
|
-
:param pulumi.Input[bool] enable_multiple_grants: When this is set to true, multiple grants of the same type can be created. This will cause Terraform to not revoke
|
|
164
|
-
grants applied to roles and objects outside Terraform.
|
|
165
|
-
:param pulumi.Input[str] masking_policy_name: The name of the masking policy on which to grant privileges immediately.
|
|
166
|
-
:param pulumi.Input[str] privilege: The privilege to grant on the masking policy. To grant all privileges, use the value `ALL PRIVILEGES`
|
|
167
|
-
:param pulumi.Input[str] revert_ownership_to_role_name: The name of the role to revert ownership to on destroy. Has no effect unless `privilege` is set to `OWNERSHIP`
|
|
168
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] roles: Grants privilege to these roles.
|
|
169
|
-
:param pulumi.Input[str] schema_name: The name of the schema containing the masking policy on which to grant privileges.
|
|
170
|
-
:param pulumi.Input[bool] with_grant_option: When this is set to true, allows the recipient role to grant the privileges to other roles.
|
|
171
|
-
"""
|
|
172
|
-
if database_name is not None:
|
|
173
|
-
pulumi.set(__self__, "database_name", database_name)
|
|
174
|
-
if enable_multiple_grants is not None:
|
|
175
|
-
pulumi.set(__self__, "enable_multiple_grants", enable_multiple_grants)
|
|
176
|
-
if masking_policy_name is not None:
|
|
177
|
-
pulumi.set(__self__, "masking_policy_name", masking_policy_name)
|
|
178
|
-
if privilege is not None:
|
|
179
|
-
pulumi.set(__self__, "privilege", privilege)
|
|
180
|
-
if revert_ownership_to_role_name is not None:
|
|
181
|
-
pulumi.set(__self__, "revert_ownership_to_role_name", revert_ownership_to_role_name)
|
|
182
|
-
if roles is not None:
|
|
183
|
-
pulumi.set(__self__, "roles", roles)
|
|
184
|
-
if schema_name is not None:
|
|
185
|
-
pulumi.set(__self__, "schema_name", schema_name)
|
|
186
|
-
if with_grant_option is not None:
|
|
187
|
-
pulumi.set(__self__, "with_grant_option", with_grant_option)
|
|
188
|
-
|
|
189
|
-
@property
|
|
190
|
-
@pulumi.getter(name="databaseName")
|
|
191
|
-
def database_name(self) -> Optional[pulumi.Input[str]]:
|
|
192
|
-
"""
|
|
193
|
-
The name of the database containing the masking policy on which to grant privileges.
|
|
194
|
-
"""
|
|
195
|
-
return pulumi.get(self, "database_name")
|
|
196
|
-
|
|
197
|
-
@database_name.setter
|
|
198
|
-
def database_name(self, value: Optional[pulumi.Input[str]]):
|
|
199
|
-
pulumi.set(self, "database_name", value)
|
|
200
|
-
|
|
201
|
-
@property
|
|
202
|
-
@pulumi.getter(name="enableMultipleGrants")
|
|
203
|
-
def enable_multiple_grants(self) -> Optional[pulumi.Input[bool]]:
|
|
204
|
-
"""
|
|
205
|
-
When this is set to true, multiple grants of the same type can be created. This will cause Terraform to not revoke
|
|
206
|
-
grants applied to roles and objects outside Terraform.
|
|
207
|
-
"""
|
|
208
|
-
return pulumi.get(self, "enable_multiple_grants")
|
|
209
|
-
|
|
210
|
-
@enable_multiple_grants.setter
|
|
211
|
-
def enable_multiple_grants(self, value: Optional[pulumi.Input[bool]]):
|
|
212
|
-
pulumi.set(self, "enable_multiple_grants", value)
|
|
213
|
-
|
|
214
|
-
@property
|
|
215
|
-
@pulumi.getter(name="maskingPolicyName")
|
|
216
|
-
def masking_policy_name(self) -> Optional[pulumi.Input[str]]:
|
|
217
|
-
"""
|
|
218
|
-
The name of the masking policy on which to grant privileges immediately.
|
|
219
|
-
"""
|
|
220
|
-
return pulumi.get(self, "masking_policy_name")
|
|
221
|
-
|
|
222
|
-
@masking_policy_name.setter
|
|
223
|
-
def masking_policy_name(self, value: Optional[pulumi.Input[str]]):
|
|
224
|
-
pulumi.set(self, "masking_policy_name", value)
|
|
225
|
-
|
|
226
|
-
@property
|
|
227
|
-
@pulumi.getter
|
|
228
|
-
def privilege(self) -> Optional[pulumi.Input[str]]:
|
|
229
|
-
"""
|
|
230
|
-
The privilege to grant on the masking policy. To grant all privileges, use the value `ALL PRIVILEGES`
|
|
231
|
-
"""
|
|
232
|
-
return pulumi.get(self, "privilege")
|
|
233
|
-
|
|
234
|
-
@privilege.setter
|
|
235
|
-
def privilege(self, value: Optional[pulumi.Input[str]]):
|
|
236
|
-
pulumi.set(self, "privilege", value)
|
|
237
|
-
|
|
238
|
-
@property
|
|
239
|
-
@pulumi.getter(name="revertOwnershipToRoleName")
|
|
240
|
-
def revert_ownership_to_role_name(self) -> Optional[pulumi.Input[str]]:
|
|
241
|
-
"""
|
|
242
|
-
The name of the role to revert ownership to on destroy. Has no effect unless `privilege` is set to `OWNERSHIP`
|
|
243
|
-
"""
|
|
244
|
-
return pulumi.get(self, "revert_ownership_to_role_name")
|
|
245
|
-
|
|
246
|
-
@revert_ownership_to_role_name.setter
|
|
247
|
-
def revert_ownership_to_role_name(self, value: Optional[pulumi.Input[str]]):
|
|
248
|
-
pulumi.set(self, "revert_ownership_to_role_name", value)
|
|
249
|
-
|
|
250
|
-
@property
|
|
251
|
-
@pulumi.getter
|
|
252
|
-
def roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
|
253
|
-
"""
|
|
254
|
-
Grants privilege to these roles.
|
|
255
|
-
"""
|
|
256
|
-
return pulumi.get(self, "roles")
|
|
257
|
-
|
|
258
|
-
@roles.setter
|
|
259
|
-
def roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
|
260
|
-
pulumi.set(self, "roles", value)
|
|
261
|
-
|
|
262
|
-
@property
|
|
263
|
-
@pulumi.getter(name="schemaName")
|
|
264
|
-
def schema_name(self) -> Optional[pulumi.Input[str]]:
|
|
265
|
-
"""
|
|
266
|
-
The name of the schema containing the masking policy on which to grant privileges.
|
|
267
|
-
"""
|
|
268
|
-
return pulumi.get(self, "schema_name")
|
|
269
|
-
|
|
270
|
-
@schema_name.setter
|
|
271
|
-
def schema_name(self, value: Optional[pulumi.Input[str]]):
|
|
272
|
-
pulumi.set(self, "schema_name", value)
|
|
273
|
-
|
|
274
|
-
@property
|
|
275
|
-
@pulumi.getter(name="withGrantOption")
|
|
276
|
-
def with_grant_option(self) -> Optional[pulumi.Input[bool]]:
|
|
277
|
-
"""
|
|
278
|
-
When this is set to true, allows the recipient role to grant the privileges to other roles.
|
|
279
|
-
"""
|
|
280
|
-
return pulumi.get(self, "with_grant_option")
|
|
281
|
-
|
|
282
|
-
@with_grant_option.setter
|
|
283
|
-
def with_grant_option(self, value: Optional[pulumi.Input[bool]]):
|
|
284
|
-
pulumi.set(self, "with_grant_option", value)
|
|
285
|
-
|
|
286
|
-
|
|
287
|
-
class MaskingPolicyGrant(pulumi.CustomResource):
|
|
288
|
-
@overload
|
|
289
|
-
def __init__(__self__,
|
|
290
|
-
resource_name: str,
|
|
291
|
-
opts: Optional[pulumi.ResourceOptions] = None,
|
|
292
|
-
database_name: Optional[pulumi.Input[str]] = None,
|
|
293
|
-
enable_multiple_grants: Optional[pulumi.Input[bool]] = None,
|
|
294
|
-
masking_policy_name: Optional[pulumi.Input[str]] = None,
|
|
295
|
-
privilege: Optional[pulumi.Input[str]] = None,
|
|
296
|
-
revert_ownership_to_role_name: Optional[pulumi.Input[str]] = None,
|
|
297
|
-
roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
298
|
-
schema_name: Optional[pulumi.Input[str]] = None,
|
|
299
|
-
with_grant_option: Optional[pulumi.Input[bool]] = None,
|
|
300
|
-
__props__=None):
|
|
301
|
-
"""
|
|
302
|
-
> **Deprecation** This resource is deprecated and will be removed in a future major version release. Please use GrantPrivilegesToAccountRole instead. <deprecation>
|
|
303
|
-
|
|
304
|
-
## Example Usage
|
|
305
|
-
|
|
306
|
-
```python
|
|
307
|
-
import pulumi
|
|
308
|
-
import pulumi_snowflake as snowflake
|
|
309
|
-
|
|
310
|
-
example = snowflake.MaskingPolicyGrant("example",
|
|
311
|
-
database_name="EXAMPLE_DB_NAME",
|
|
312
|
-
enable_multiple_grants=True,
|
|
313
|
-
masking_policy_name="EXAMPLE_MASKING_POLICY_NAME",
|
|
314
|
-
privilege="APPLY",
|
|
315
|
-
roles=[
|
|
316
|
-
"ROLE1_NAME",
|
|
317
|
-
"ROLE2_NAME",
|
|
318
|
-
],
|
|
319
|
-
schema_name="EXAMPLE_SCHEMA_NAME",
|
|
320
|
-
with_grant_option=True)
|
|
321
|
-
```
|
|
322
|
-
|
|
323
|
-
## Import
|
|
324
|
-
|
|
325
|
-
format is database_name|schema_name|masking_policy_name|privilege|with_grant_option|roles
|
|
326
|
-
|
|
327
|
-
```sh
|
|
328
|
-
$ pulumi import snowflake:index/maskingPolicyGrant:MaskingPolicyGrant example "dbName|schemaName|maskingPolicyName|USAGE|false|role1,role2"
|
|
329
|
-
```
|
|
330
|
-
|
|
331
|
-
:param str resource_name: The name of the resource.
|
|
332
|
-
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
333
|
-
:param pulumi.Input[str] database_name: The name of the database containing the masking policy on which to grant privileges.
|
|
334
|
-
:param pulumi.Input[bool] enable_multiple_grants: When this is set to true, multiple grants of the same type can be created. This will cause Terraform to not revoke
|
|
335
|
-
grants applied to roles and objects outside Terraform.
|
|
336
|
-
:param pulumi.Input[str] masking_policy_name: The name of the masking policy on which to grant privileges immediately.
|
|
337
|
-
:param pulumi.Input[str] privilege: The privilege to grant on the masking policy. To grant all privileges, use the value `ALL PRIVILEGES`
|
|
338
|
-
:param pulumi.Input[str] revert_ownership_to_role_name: The name of the role to revert ownership to on destroy. Has no effect unless `privilege` is set to `OWNERSHIP`
|
|
339
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] roles: Grants privilege to these roles.
|
|
340
|
-
:param pulumi.Input[str] schema_name: The name of the schema containing the masking policy on which to grant privileges.
|
|
341
|
-
:param pulumi.Input[bool] with_grant_option: When this is set to true, allows the recipient role to grant the privileges to other roles.
|
|
342
|
-
"""
|
|
343
|
-
...
|
|
344
|
-
@overload
|
|
345
|
-
def __init__(__self__,
|
|
346
|
-
resource_name: str,
|
|
347
|
-
args: MaskingPolicyGrantArgs,
|
|
348
|
-
opts: Optional[pulumi.ResourceOptions] = None):
|
|
349
|
-
"""
|
|
350
|
-
> **Deprecation** This resource is deprecated and will be removed in a future major version release. Please use GrantPrivilegesToAccountRole instead. <deprecation>
|
|
351
|
-
|
|
352
|
-
## Example Usage
|
|
353
|
-
|
|
354
|
-
```python
|
|
355
|
-
import pulumi
|
|
356
|
-
import pulumi_snowflake as snowflake
|
|
357
|
-
|
|
358
|
-
example = snowflake.MaskingPolicyGrant("example",
|
|
359
|
-
database_name="EXAMPLE_DB_NAME",
|
|
360
|
-
enable_multiple_grants=True,
|
|
361
|
-
masking_policy_name="EXAMPLE_MASKING_POLICY_NAME",
|
|
362
|
-
privilege="APPLY",
|
|
363
|
-
roles=[
|
|
364
|
-
"ROLE1_NAME",
|
|
365
|
-
"ROLE2_NAME",
|
|
366
|
-
],
|
|
367
|
-
schema_name="EXAMPLE_SCHEMA_NAME",
|
|
368
|
-
with_grant_option=True)
|
|
369
|
-
```
|
|
370
|
-
|
|
371
|
-
## Import
|
|
372
|
-
|
|
373
|
-
format is database_name|schema_name|masking_policy_name|privilege|with_grant_option|roles
|
|
374
|
-
|
|
375
|
-
```sh
|
|
376
|
-
$ pulumi import snowflake:index/maskingPolicyGrant:MaskingPolicyGrant example "dbName|schemaName|maskingPolicyName|USAGE|false|role1,role2"
|
|
377
|
-
```
|
|
378
|
-
|
|
379
|
-
:param str resource_name: The name of the resource.
|
|
380
|
-
:param MaskingPolicyGrantArgs args: The arguments to use to populate this resource's properties.
|
|
381
|
-
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
382
|
-
"""
|
|
383
|
-
...
|
|
384
|
-
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
385
|
-
resource_args, opts = _utilities.get_resource_args_opts(MaskingPolicyGrantArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
386
|
-
if resource_args is not None:
|
|
387
|
-
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
388
|
-
else:
|
|
389
|
-
__self__._internal_init(resource_name, *args, **kwargs)
|
|
390
|
-
|
|
391
|
-
def _internal_init(__self__,
|
|
392
|
-
resource_name: str,
|
|
393
|
-
opts: Optional[pulumi.ResourceOptions] = None,
|
|
394
|
-
database_name: Optional[pulumi.Input[str]] = None,
|
|
395
|
-
enable_multiple_grants: Optional[pulumi.Input[bool]] = None,
|
|
396
|
-
masking_policy_name: Optional[pulumi.Input[str]] = None,
|
|
397
|
-
privilege: Optional[pulumi.Input[str]] = None,
|
|
398
|
-
revert_ownership_to_role_name: Optional[pulumi.Input[str]] = None,
|
|
399
|
-
roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
400
|
-
schema_name: Optional[pulumi.Input[str]] = None,
|
|
401
|
-
with_grant_option: Optional[pulumi.Input[bool]] = None,
|
|
402
|
-
__props__=None):
|
|
403
|
-
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
404
|
-
if not isinstance(opts, pulumi.ResourceOptions):
|
|
405
|
-
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
406
|
-
if opts.id is None:
|
|
407
|
-
if __props__ is not None:
|
|
408
|
-
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
409
|
-
__props__ = MaskingPolicyGrantArgs.__new__(MaskingPolicyGrantArgs)
|
|
410
|
-
|
|
411
|
-
if database_name is None and not opts.urn:
|
|
412
|
-
raise TypeError("Missing required property 'database_name'")
|
|
413
|
-
__props__.__dict__["database_name"] = database_name
|
|
414
|
-
__props__.__dict__["enable_multiple_grants"] = enable_multiple_grants
|
|
415
|
-
if masking_policy_name is None and not opts.urn:
|
|
416
|
-
raise TypeError("Missing required property 'masking_policy_name'")
|
|
417
|
-
__props__.__dict__["masking_policy_name"] = masking_policy_name
|
|
418
|
-
__props__.__dict__["privilege"] = privilege
|
|
419
|
-
__props__.__dict__["revert_ownership_to_role_name"] = revert_ownership_to_role_name
|
|
420
|
-
__props__.__dict__["roles"] = roles
|
|
421
|
-
if schema_name is None and not opts.urn:
|
|
422
|
-
raise TypeError("Missing required property 'schema_name'")
|
|
423
|
-
__props__.__dict__["schema_name"] = schema_name
|
|
424
|
-
__props__.__dict__["with_grant_option"] = with_grant_option
|
|
425
|
-
super(MaskingPolicyGrant, __self__).__init__(
|
|
426
|
-
'snowflake:index/maskingPolicyGrant:MaskingPolicyGrant',
|
|
427
|
-
resource_name,
|
|
428
|
-
__props__,
|
|
429
|
-
opts)
|
|
430
|
-
|
|
431
|
-
@staticmethod
|
|
432
|
-
def get(resource_name: str,
|
|
433
|
-
id: pulumi.Input[str],
|
|
434
|
-
opts: Optional[pulumi.ResourceOptions] = None,
|
|
435
|
-
database_name: Optional[pulumi.Input[str]] = None,
|
|
436
|
-
enable_multiple_grants: Optional[pulumi.Input[bool]] = None,
|
|
437
|
-
masking_policy_name: Optional[pulumi.Input[str]] = None,
|
|
438
|
-
privilege: Optional[pulumi.Input[str]] = None,
|
|
439
|
-
revert_ownership_to_role_name: Optional[pulumi.Input[str]] = None,
|
|
440
|
-
roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
441
|
-
schema_name: Optional[pulumi.Input[str]] = None,
|
|
442
|
-
with_grant_option: Optional[pulumi.Input[bool]] = None) -> 'MaskingPolicyGrant':
|
|
443
|
-
"""
|
|
444
|
-
Get an existing MaskingPolicyGrant resource's state with the given name, id, and optional extra
|
|
445
|
-
properties used to qualify the lookup.
|
|
446
|
-
|
|
447
|
-
:param str resource_name: The unique name of the resulting resource.
|
|
448
|
-
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
449
|
-
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
450
|
-
:param pulumi.Input[str] database_name: The name of the database containing the masking policy on which to grant privileges.
|
|
451
|
-
:param pulumi.Input[bool] enable_multiple_grants: When this is set to true, multiple grants of the same type can be created. This will cause Terraform to not revoke
|
|
452
|
-
grants applied to roles and objects outside Terraform.
|
|
453
|
-
:param pulumi.Input[str] masking_policy_name: The name of the masking policy on which to grant privileges immediately.
|
|
454
|
-
:param pulumi.Input[str] privilege: The privilege to grant on the masking policy. To grant all privileges, use the value `ALL PRIVILEGES`
|
|
455
|
-
:param pulumi.Input[str] revert_ownership_to_role_name: The name of the role to revert ownership to on destroy. Has no effect unless `privilege` is set to `OWNERSHIP`
|
|
456
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] roles: Grants privilege to these roles.
|
|
457
|
-
:param pulumi.Input[str] schema_name: The name of the schema containing the masking policy on which to grant privileges.
|
|
458
|
-
:param pulumi.Input[bool] with_grant_option: When this is set to true, allows the recipient role to grant the privileges to other roles.
|
|
459
|
-
"""
|
|
460
|
-
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
461
|
-
|
|
462
|
-
__props__ = _MaskingPolicyGrantState.__new__(_MaskingPolicyGrantState)
|
|
463
|
-
|
|
464
|
-
__props__.__dict__["database_name"] = database_name
|
|
465
|
-
__props__.__dict__["enable_multiple_grants"] = enable_multiple_grants
|
|
466
|
-
__props__.__dict__["masking_policy_name"] = masking_policy_name
|
|
467
|
-
__props__.__dict__["privilege"] = privilege
|
|
468
|
-
__props__.__dict__["revert_ownership_to_role_name"] = revert_ownership_to_role_name
|
|
469
|
-
__props__.__dict__["roles"] = roles
|
|
470
|
-
__props__.__dict__["schema_name"] = schema_name
|
|
471
|
-
__props__.__dict__["with_grant_option"] = with_grant_option
|
|
472
|
-
return MaskingPolicyGrant(resource_name, opts=opts, __props__=__props__)
|
|
473
|
-
|
|
474
|
-
@property
|
|
475
|
-
@pulumi.getter(name="databaseName")
|
|
476
|
-
def database_name(self) -> pulumi.Output[str]:
|
|
477
|
-
"""
|
|
478
|
-
The name of the database containing the masking policy on which to grant privileges.
|
|
479
|
-
"""
|
|
480
|
-
return pulumi.get(self, "database_name")
|
|
481
|
-
|
|
482
|
-
@property
|
|
483
|
-
@pulumi.getter(name="enableMultipleGrants")
|
|
484
|
-
def enable_multiple_grants(self) -> pulumi.Output[Optional[bool]]:
|
|
485
|
-
"""
|
|
486
|
-
When this is set to true, multiple grants of the same type can be created. This will cause Terraform to not revoke
|
|
487
|
-
grants applied to roles and objects outside Terraform.
|
|
488
|
-
"""
|
|
489
|
-
return pulumi.get(self, "enable_multiple_grants")
|
|
490
|
-
|
|
491
|
-
@property
|
|
492
|
-
@pulumi.getter(name="maskingPolicyName")
|
|
493
|
-
def masking_policy_name(self) -> pulumi.Output[str]:
|
|
494
|
-
"""
|
|
495
|
-
The name of the masking policy on which to grant privileges immediately.
|
|
496
|
-
"""
|
|
497
|
-
return pulumi.get(self, "masking_policy_name")
|
|
498
|
-
|
|
499
|
-
@property
|
|
500
|
-
@pulumi.getter
|
|
501
|
-
def privilege(self) -> pulumi.Output[Optional[str]]:
|
|
502
|
-
"""
|
|
503
|
-
The privilege to grant on the masking policy. To grant all privileges, use the value `ALL PRIVILEGES`
|
|
504
|
-
"""
|
|
505
|
-
return pulumi.get(self, "privilege")
|
|
506
|
-
|
|
507
|
-
@property
|
|
508
|
-
@pulumi.getter(name="revertOwnershipToRoleName")
|
|
509
|
-
def revert_ownership_to_role_name(self) -> pulumi.Output[Optional[str]]:
|
|
510
|
-
"""
|
|
511
|
-
The name of the role to revert ownership to on destroy. Has no effect unless `privilege` is set to `OWNERSHIP`
|
|
512
|
-
"""
|
|
513
|
-
return pulumi.get(self, "revert_ownership_to_role_name")
|
|
514
|
-
|
|
515
|
-
@property
|
|
516
|
-
@pulumi.getter
|
|
517
|
-
def roles(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
|
518
|
-
"""
|
|
519
|
-
Grants privilege to these roles.
|
|
520
|
-
"""
|
|
521
|
-
return pulumi.get(self, "roles")
|
|
522
|
-
|
|
523
|
-
@property
|
|
524
|
-
@pulumi.getter(name="schemaName")
|
|
525
|
-
def schema_name(self) -> pulumi.Output[str]:
|
|
526
|
-
"""
|
|
527
|
-
The name of the schema containing the masking policy on which to grant privileges.
|
|
528
|
-
"""
|
|
529
|
-
return pulumi.get(self, "schema_name")
|
|
530
|
-
|
|
531
|
-
@property
|
|
532
|
-
@pulumi.getter(name="withGrantOption")
|
|
533
|
-
def with_grant_option(self) -> pulumi.Output[Optional[bool]]:
|
|
534
|
-
"""
|
|
535
|
-
When this is set to true, allows the recipient role to grant the privileges to other roles.
|
|
536
|
-
"""
|
|
537
|
-
return pulumi.get(self, "with_grant_option")
|
|
538
|
-
|