pulumi-snowflake 0.50.3a1710160126__py3-none-any.whl → 1.2.0a1736835738__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-snowflake might be problematic. Click here for more details.
- pulumi_snowflake/__init__.py +224 -172
- pulumi_snowflake/_inputs.py +52857 -1665
- pulumi_snowflake/_utilities.py +41 -5
- pulumi_snowflake/account.py +188 -218
- pulumi_snowflake/account_authentication_policy_attachment.py +149 -0
- pulumi_snowflake/account_parameter.py +21 -48
- pulumi_snowflake/account_password_policy_attachment.py +7 -32
- pulumi_snowflake/account_role.py +250 -0
- pulumi_snowflake/alert.py +38 -47
- pulumi_snowflake/api_authentication_integration_with_authorization_code_grant.py +704 -0
- pulumi_snowflake/api_authentication_integration_with_client_credentials.py +657 -0
- pulumi_snowflake/api_authentication_integration_with_jwt_bearer.py +692 -0
- pulumi_snowflake/api_integration.py +33 -52
- pulumi_snowflake/authentication_policy.py +622 -0
- pulumi_snowflake/config/__init__.pyi +76 -99
- pulumi_snowflake/config/outputs.py +5 -0
- pulumi_snowflake/config/vars.py +93 -124
- pulumi_snowflake/cortex_search_service.py +596 -0
- pulumi_snowflake/database.py +819 -213
- pulumi_snowflake/database_role.py +81 -44
- pulumi_snowflake/dynamic_table.py +42 -49
- pulumi_snowflake/email_notification_integration.py +33 -28
- pulumi_snowflake/{unsafe_execute.py → execute.py} +36 -39
- pulumi_snowflake/external_function.py +54 -75
- pulumi_snowflake/external_oauth_integration.py +593 -542
- pulumi_snowflake/external_table.py +67 -90
- pulumi_snowflake/external_volume.py +382 -0
- pulumi_snowflake/failover_group.py +57 -98
- pulumi_snowflake/file_format.py +33 -28
- pulumi_snowflake/function_java.py +1211 -0
- pulumi_snowflake/function_javascript.py +882 -0
- pulumi_snowflake/function_python.py +1212 -0
- pulumi_snowflake/function_scala.py +1212 -0
- pulumi_snowflake/function_sql.py +835 -0
- pulumi_snowflake/get_account_roles.py +129 -0
- pulumi_snowflake/get_accounts.py +53 -22
- pulumi_snowflake/get_alerts.py +22 -9
- pulumi_snowflake/get_connections.py +109 -0
- pulumi_snowflake/get_cortex_search_services.py +216 -0
- pulumi_snowflake/get_current_account.py +24 -13
- pulumi_snowflake/get_current_role.py +14 -7
- pulumi_snowflake/get_database.py +25 -9
- pulumi_snowflake/get_database_role.py +162 -0
- pulumi_snowflake/get_database_roles.py +79 -47
- pulumi_snowflake/get_databases.py +91 -73
- pulumi_snowflake/get_dynamic_tables.py +36 -19
- pulumi_snowflake/get_external_functions.py +28 -9
- pulumi_snowflake/get_external_tables.py +28 -9
- pulumi_snowflake/get_failover_groups.py +18 -7
- pulumi_snowflake/get_file_formats.py +28 -9
- pulumi_snowflake/get_functions.py +28 -9
- pulumi_snowflake/get_grants.py +207 -84
- pulumi_snowflake/get_masking_policies.py +91 -51
- pulumi_snowflake/get_materialized_views.py +28 -9
- pulumi_snowflake/get_network_policies.py +129 -0
- pulumi_snowflake/get_parameters.py +38 -15
- pulumi_snowflake/get_pipes.py +28 -9
- pulumi_snowflake/get_procedures.py +28 -9
- pulumi_snowflake/get_resource_monitors.py +37 -24
- pulumi_snowflake/get_row_access_policies.py +91 -51
- pulumi_snowflake/get_schemas.py +145 -41
- pulumi_snowflake/get_secrets.py +200 -0
- pulumi_snowflake/get_security_integrations.py +129 -0
- pulumi_snowflake/get_sequences.py +28 -9
- pulumi_snowflake/get_shares.py +18 -9
- pulumi_snowflake/get_stages.py +28 -9
- pulumi_snowflake/get_storage_integrations.py +16 -9
- pulumi_snowflake/get_streamlits.py +170 -0
- pulumi_snowflake/get_streams.py +114 -54
- pulumi_snowflake/get_system_generate_scim_access_token.py +18 -9
- pulumi_snowflake/get_system_get_aws_sns_iam_policy.py +32 -7
- pulumi_snowflake/get_system_get_private_link_config.py +120 -5
- pulumi_snowflake/get_system_get_snowflake_platform_info.py +15 -7
- pulumi_snowflake/get_tables.py +28 -9
- pulumi_snowflake/get_tags.py +130 -0
- pulumi_snowflake/get_tasks.py +134 -54
- pulumi_snowflake/get_users.py +116 -44
- pulumi_snowflake/get_views.py +114 -54
- pulumi_snowflake/get_warehouses.py +79 -26
- pulumi_snowflake/grant_account_role.py +28 -75
- pulumi_snowflake/grant_application_role.py +257 -0
- pulumi_snowflake/grant_database_role.py +35 -94
- pulumi_snowflake/grant_ownership.py +382 -0
- pulumi_snowflake/grant_privileges_to_account_role.py +42 -78
- pulumi_snowflake/grant_privileges_to_database_role.py +37 -383
- pulumi_snowflake/grant_privileges_to_share.py +96 -44
- pulumi_snowflake/legacy_service_user.py +3670 -0
- pulumi_snowflake/managed_account.py +40 -11
- pulumi_snowflake/masking_policy.py +213 -310
- pulumi_snowflake/materialized_view.py +62 -71
- pulumi_snowflake/network_policy.py +217 -61
- pulumi_snowflake/network_policy_attachment.py +5 -34
- pulumi_snowflake/network_rule.py +473 -0
- pulumi_snowflake/notification_integration.py +49 -84
- pulumi_snowflake/oauth_integration_for_custom_clients.py +906 -0
- pulumi_snowflake/{oauth_integration.py → oauth_integration_for_partner_applications.py} +191 -192
- pulumi_snowflake/object_parameter.py +10 -101
- pulumi_snowflake/outputs.py +49200 -2928
- pulumi_snowflake/password_policy.py +41 -28
- pulumi_snowflake/pipe.py +33 -4
- pulumi_snowflake/primary_connection.py +330 -0
- pulumi_snowflake/procedure_java.py +1273 -0
- pulumi_snowflake/procedure_javascript.py +895 -0
- pulumi_snowflake/procedure_python.py +1226 -0
- pulumi_snowflake/procedure_scala.py +1273 -0
- pulumi_snowflake/procedure_sql.py +895 -0
- pulumi_snowflake/provider.py +378 -613
- pulumi_snowflake/pulumi-plugin.json +2 -1
- pulumi_snowflake/resource_monitor.py +118 -327
- pulumi_snowflake/row_access_policy.py +200 -149
- pulumi_snowflake/{saml_integration.py → saml2_integration.py} +356 -299
- pulumi_snowflake/schema.py +949 -178
- pulumi_snowflake/scim_integration.py +286 -109
- pulumi_snowflake/secondary_connection.py +339 -0
- pulumi_snowflake/secondary_database.py +1080 -0
- pulumi_snowflake/secret_with_authorization_code_grant.py +548 -0
- pulumi_snowflake/secret_with_basic_authentication.py +500 -0
- pulumi_snowflake/secret_with_client_credentials.py +511 -0
- pulumi_snowflake/secret_with_generic_string.py +452 -0
- pulumi_snowflake/sequence.py +9 -34
- pulumi_snowflake/service_user.py +3585 -0
- pulumi_snowflake/share.py +33 -28
- pulumi_snowflake/shared_database.py +939 -0
- pulumi_snowflake/stage.py +95 -84
- pulumi_snowflake/storage_integration.py +46 -4
- pulumi_snowflake/stream_on_directory_table.py +517 -0
- pulumi_snowflake/stream_on_external_table.py +632 -0
- pulumi_snowflake/stream_on_table.py +666 -0
- pulumi_snowflake/stream_on_view.py +666 -0
- pulumi_snowflake/streamlit.py +671 -0
- pulumi_snowflake/table.py +86 -97
- pulumi_snowflake/table_column_masking_policy_application.py +7 -14
- pulumi_snowflake/table_constraint.py +29 -172
- pulumi_snowflake/tag.py +142 -74
- pulumi_snowflake/tag_association.py +40 -215
- pulumi_snowflake/task.py +3048 -418
- pulumi_snowflake/user.py +3351 -384
- pulumi_snowflake/user_authentication_policy_attachment.py +197 -0
- pulumi_snowflake/user_password_policy_attachment.py +5 -4
- pulumi_snowflake/user_public_keys.py +5 -0
- pulumi_snowflake/view.py +466 -215
- pulumi_snowflake/warehouse.py +184 -168
- {pulumi_snowflake-0.50.3a1710160126.dist-info → pulumi_snowflake-1.2.0a1736835738.dist-info}/METADATA +7 -6
- pulumi_snowflake-1.2.0a1736835738.dist-info/RECORD +148 -0
- {pulumi_snowflake-0.50.3a1710160126.dist-info → pulumi_snowflake-1.2.0a1736835738.dist-info}/WHEEL +1 -1
- pulumi_snowflake/account_grant.py +0 -343
- pulumi_snowflake/database_grant.py +0 -495
- pulumi_snowflake/external_table_grant.py +0 -690
- pulumi_snowflake/failover_group_grant.py +0 -388
- pulumi_snowflake/file_format_grant.py +0 -635
- pulumi_snowflake/function.py +0 -872
- pulumi_snowflake/function_grant.py +0 -745
- pulumi_snowflake/get_role.py +0 -121
- pulumi_snowflake/get_roles.py +0 -120
- pulumi_snowflake/grant_privileges_to_role.py +0 -825
- pulumi_snowflake/integration_grant.py +0 -440
- pulumi_snowflake/masking_policy_grant.py +0 -542
- pulumi_snowflake/materialized_view_grant.py +0 -689
- pulumi_snowflake/pipe_grant.py +0 -587
- pulumi_snowflake/procedure.py +0 -887
- pulumi_snowflake/procedure_grant.py +0 -745
- pulumi_snowflake/resource_monitor_grant.py +0 -387
- pulumi_snowflake/role.py +0 -273
- pulumi_snowflake/role_grants.py +0 -352
- pulumi_snowflake/role_ownership_grant.py +0 -338
- pulumi_snowflake/row_access_policy_grant.py +0 -540
- pulumi_snowflake/schema_grant.py +0 -647
- pulumi_snowflake/sequence_grant.py +0 -635
- pulumi_snowflake/session_parameter.py +0 -332
- pulumi_snowflake/stage_grant.py +0 -635
- pulumi_snowflake/stream.py +0 -614
- pulumi_snowflake/stream_grant.py +0 -635
- pulumi_snowflake/table_grant.py +0 -677
- pulumi_snowflake/tag_grant.py +0 -532
- pulumi_snowflake/tag_masking_policy_association.py +0 -210
- pulumi_snowflake/task_grant.py +0 -635
- pulumi_snowflake/user_grant.py +0 -394
- pulumi_snowflake/user_ownership_grant.py +0 -286
- pulumi_snowflake/view_grant.py +0 -705
- pulumi_snowflake/warehouse_grant.py +0 -440
- pulumi_snowflake-0.50.3a1710160126.dist-info/RECORD +0 -136
- {pulumi_snowflake-0.50.3a1710160126.dist-info → pulumi_snowflake-1.2.0a1736835738.dist-info}/top_level.txt +0 -0
pulumi_snowflake/user_grant.py
DELETED
|
@@ -1,394 +0,0 @@
|
|
|
1
|
-
# coding=utf-8
|
|
2
|
-
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
-
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
-
|
|
5
|
-
import copy
|
|
6
|
-
import warnings
|
|
7
|
-
import pulumi
|
|
8
|
-
import pulumi.runtime
|
|
9
|
-
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
10
|
-
from . import _utilities
|
|
11
|
-
|
|
12
|
-
__all__ = ['UserGrantArgs', 'UserGrant']
|
|
13
|
-
|
|
14
|
-
@pulumi.input_type
|
|
15
|
-
class UserGrantArgs:
|
|
16
|
-
def __init__(__self__, *,
|
|
17
|
-
privilege: pulumi.Input[str],
|
|
18
|
-
user_name: pulumi.Input[str],
|
|
19
|
-
enable_multiple_grants: Optional[pulumi.Input[bool]] = None,
|
|
20
|
-
roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
21
|
-
with_grant_option: Optional[pulumi.Input[bool]] = None):
|
|
22
|
-
"""
|
|
23
|
-
The set of arguments for constructing a UserGrant resource.
|
|
24
|
-
:param pulumi.Input[str] privilege: The privilege to grant on the user. To grant all privileges, use the value `ALL PRIVILEGES`.
|
|
25
|
-
:param pulumi.Input[str] user_name: The name of the user on which to grant privileges.
|
|
26
|
-
:param pulumi.Input[bool] enable_multiple_grants: When this is set to true, multiple grants of the same type can be created. This will cause Terraform to not revoke
|
|
27
|
-
grants applied to roles and objects outside Terraform.
|
|
28
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] roles: Grants privilege to these roles.
|
|
29
|
-
:param pulumi.Input[bool] with_grant_option: When this is set to true, allows the recipient role to grant the privileges to other roles.
|
|
30
|
-
"""
|
|
31
|
-
pulumi.set(__self__, "privilege", privilege)
|
|
32
|
-
pulumi.set(__self__, "user_name", user_name)
|
|
33
|
-
if enable_multiple_grants is not None:
|
|
34
|
-
pulumi.set(__self__, "enable_multiple_grants", enable_multiple_grants)
|
|
35
|
-
if roles is not None:
|
|
36
|
-
pulumi.set(__self__, "roles", roles)
|
|
37
|
-
if with_grant_option is not None:
|
|
38
|
-
pulumi.set(__self__, "with_grant_option", with_grant_option)
|
|
39
|
-
|
|
40
|
-
@property
|
|
41
|
-
@pulumi.getter
|
|
42
|
-
def privilege(self) -> pulumi.Input[str]:
|
|
43
|
-
"""
|
|
44
|
-
The privilege to grant on the user. To grant all privileges, use the value `ALL PRIVILEGES`.
|
|
45
|
-
"""
|
|
46
|
-
return pulumi.get(self, "privilege")
|
|
47
|
-
|
|
48
|
-
@privilege.setter
|
|
49
|
-
def privilege(self, value: pulumi.Input[str]):
|
|
50
|
-
pulumi.set(self, "privilege", value)
|
|
51
|
-
|
|
52
|
-
@property
|
|
53
|
-
@pulumi.getter(name="userName")
|
|
54
|
-
def user_name(self) -> pulumi.Input[str]:
|
|
55
|
-
"""
|
|
56
|
-
The name of the user on which to grant privileges.
|
|
57
|
-
"""
|
|
58
|
-
return pulumi.get(self, "user_name")
|
|
59
|
-
|
|
60
|
-
@user_name.setter
|
|
61
|
-
def user_name(self, value: pulumi.Input[str]):
|
|
62
|
-
pulumi.set(self, "user_name", value)
|
|
63
|
-
|
|
64
|
-
@property
|
|
65
|
-
@pulumi.getter(name="enableMultipleGrants")
|
|
66
|
-
def enable_multiple_grants(self) -> Optional[pulumi.Input[bool]]:
|
|
67
|
-
"""
|
|
68
|
-
When this is set to true, multiple grants of the same type can be created. This will cause Terraform to not revoke
|
|
69
|
-
grants applied to roles and objects outside Terraform.
|
|
70
|
-
"""
|
|
71
|
-
return pulumi.get(self, "enable_multiple_grants")
|
|
72
|
-
|
|
73
|
-
@enable_multiple_grants.setter
|
|
74
|
-
def enable_multiple_grants(self, value: Optional[pulumi.Input[bool]]):
|
|
75
|
-
pulumi.set(self, "enable_multiple_grants", value)
|
|
76
|
-
|
|
77
|
-
@property
|
|
78
|
-
@pulumi.getter
|
|
79
|
-
def roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
|
80
|
-
"""
|
|
81
|
-
Grants privilege to these roles.
|
|
82
|
-
"""
|
|
83
|
-
return pulumi.get(self, "roles")
|
|
84
|
-
|
|
85
|
-
@roles.setter
|
|
86
|
-
def roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
|
87
|
-
pulumi.set(self, "roles", value)
|
|
88
|
-
|
|
89
|
-
@property
|
|
90
|
-
@pulumi.getter(name="withGrantOption")
|
|
91
|
-
def with_grant_option(self) -> Optional[pulumi.Input[bool]]:
|
|
92
|
-
"""
|
|
93
|
-
When this is set to true, allows the recipient role to grant the privileges to other roles.
|
|
94
|
-
"""
|
|
95
|
-
return pulumi.get(self, "with_grant_option")
|
|
96
|
-
|
|
97
|
-
@with_grant_option.setter
|
|
98
|
-
def with_grant_option(self, value: Optional[pulumi.Input[bool]]):
|
|
99
|
-
pulumi.set(self, "with_grant_option", value)
|
|
100
|
-
|
|
101
|
-
|
|
102
|
-
@pulumi.input_type
|
|
103
|
-
class _UserGrantState:
|
|
104
|
-
def __init__(__self__, *,
|
|
105
|
-
enable_multiple_grants: Optional[pulumi.Input[bool]] = None,
|
|
106
|
-
privilege: Optional[pulumi.Input[str]] = None,
|
|
107
|
-
roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
108
|
-
user_name: Optional[pulumi.Input[str]] = None,
|
|
109
|
-
with_grant_option: Optional[pulumi.Input[bool]] = None):
|
|
110
|
-
"""
|
|
111
|
-
Input properties used for looking up and filtering UserGrant resources.
|
|
112
|
-
:param pulumi.Input[bool] enable_multiple_grants: When this is set to true, multiple grants of the same type can be created. This will cause Terraform to not revoke
|
|
113
|
-
grants applied to roles and objects outside Terraform.
|
|
114
|
-
:param pulumi.Input[str] privilege: The privilege to grant on the user. To grant all privileges, use the value `ALL PRIVILEGES`.
|
|
115
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] roles: Grants privilege to these roles.
|
|
116
|
-
:param pulumi.Input[str] user_name: The name of the user on which to grant privileges.
|
|
117
|
-
:param pulumi.Input[bool] with_grant_option: When this is set to true, allows the recipient role to grant the privileges to other roles.
|
|
118
|
-
"""
|
|
119
|
-
if enable_multiple_grants is not None:
|
|
120
|
-
pulumi.set(__self__, "enable_multiple_grants", enable_multiple_grants)
|
|
121
|
-
if privilege is not None:
|
|
122
|
-
pulumi.set(__self__, "privilege", privilege)
|
|
123
|
-
if roles is not None:
|
|
124
|
-
pulumi.set(__self__, "roles", roles)
|
|
125
|
-
if user_name is not None:
|
|
126
|
-
pulumi.set(__self__, "user_name", user_name)
|
|
127
|
-
if with_grant_option is not None:
|
|
128
|
-
pulumi.set(__self__, "with_grant_option", with_grant_option)
|
|
129
|
-
|
|
130
|
-
@property
|
|
131
|
-
@pulumi.getter(name="enableMultipleGrants")
|
|
132
|
-
def enable_multiple_grants(self) -> Optional[pulumi.Input[bool]]:
|
|
133
|
-
"""
|
|
134
|
-
When this is set to true, multiple grants of the same type can be created. This will cause Terraform to not revoke
|
|
135
|
-
grants applied to roles and objects outside Terraform.
|
|
136
|
-
"""
|
|
137
|
-
return pulumi.get(self, "enable_multiple_grants")
|
|
138
|
-
|
|
139
|
-
@enable_multiple_grants.setter
|
|
140
|
-
def enable_multiple_grants(self, value: Optional[pulumi.Input[bool]]):
|
|
141
|
-
pulumi.set(self, "enable_multiple_grants", value)
|
|
142
|
-
|
|
143
|
-
@property
|
|
144
|
-
@pulumi.getter
|
|
145
|
-
def privilege(self) -> Optional[pulumi.Input[str]]:
|
|
146
|
-
"""
|
|
147
|
-
The privilege to grant on the user. To grant all privileges, use the value `ALL PRIVILEGES`.
|
|
148
|
-
"""
|
|
149
|
-
return pulumi.get(self, "privilege")
|
|
150
|
-
|
|
151
|
-
@privilege.setter
|
|
152
|
-
def privilege(self, value: Optional[pulumi.Input[str]]):
|
|
153
|
-
pulumi.set(self, "privilege", value)
|
|
154
|
-
|
|
155
|
-
@property
|
|
156
|
-
@pulumi.getter
|
|
157
|
-
def roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
|
158
|
-
"""
|
|
159
|
-
Grants privilege to these roles.
|
|
160
|
-
"""
|
|
161
|
-
return pulumi.get(self, "roles")
|
|
162
|
-
|
|
163
|
-
@roles.setter
|
|
164
|
-
def roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
|
165
|
-
pulumi.set(self, "roles", value)
|
|
166
|
-
|
|
167
|
-
@property
|
|
168
|
-
@pulumi.getter(name="userName")
|
|
169
|
-
def user_name(self) -> Optional[pulumi.Input[str]]:
|
|
170
|
-
"""
|
|
171
|
-
The name of the user on which to grant privileges.
|
|
172
|
-
"""
|
|
173
|
-
return pulumi.get(self, "user_name")
|
|
174
|
-
|
|
175
|
-
@user_name.setter
|
|
176
|
-
def user_name(self, value: Optional[pulumi.Input[str]]):
|
|
177
|
-
pulumi.set(self, "user_name", value)
|
|
178
|
-
|
|
179
|
-
@property
|
|
180
|
-
@pulumi.getter(name="withGrantOption")
|
|
181
|
-
def with_grant_option(self) -> Optional[pulumi.Input[bool]]:
|
|
182
|
-
"""
|
|
183
|
-
When this is set to true, allows the recipient role to grant the privileges to other roles.
|
|
184
|
-
"""
|
|
185
|
-
return pulumi.get(self, "with_grant_option")
|
|
186
|
-
|
|
187
|
-
@with_grant_option.setter
|
|
188
|
-
def with_grant_option(self, value: Optional[pulumi.Input[bool]]):
|
|
189
|
-
pulumi.set(self, "with_grant_option", value)
|
|
190
|
-
|
|
191
|
-
|
|
192
|
-
class UserGrant(pulumi.CustomResource):
|
|
193
|
-
@overload
|
|
194
|
-
def __init__(__self__,
|
|
195
|
-
resource_name: str,
|
|
196
|
-
opts: Optional[pulumi.ResourceOptions] = None,
|
|
197
|
-
enable_multiple_grants: Optional[pulumi.Input[bool]] = None,
|
|
198
|
-
privilege: Optional[pulumi.Input[str]] = None,
|
|
199
|
-
roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
200
|
-
user_name: Optional[pulumi.Input[str]] = None,
|
|
201
|
-
with_grant_option: Optional[pulumi.Input[bool]] = None,
|
|
202
|
-
__props__=None):
|
|
203
|
-
"""
|
|
204
|
-
> **Deprecation** This resource is deprecated and will be removed in a future major version release. Please use GrantPrivilegesToAccountRole instead. <deprecation>
|
|
205
|
-
|
|
206
|
-
## Example Usage
|
|
207
|
-
|
|
208
|
-
<!--Start PulumiCodeChooser -->
|
|
209
|
-
```python
|
|
210
|
-
import pulumi
|
|
211
|
-
import pulumi_snowflake as snowflake
|
|
212
|
-
|
|
213
|
-
grant = snowflake.UserGrant("grant",
|
|
214
|
-
privilege="MONITOR",
|
|
215
|
-
roles=[
|
|
216
|
-
"role1",
|
|
217
|
-
"role2",
|
|
218
|
-
],
|
|
219
|
-
user_name="user",
|
|
220
|
-
with_grant_option=False)
|
|
221
|
-
```
|
|
222
|
-
<!--End PulumiCodeChooser -->
|
|
223
|
-
|
|
224
|
-
## Import
|
|
225
|
-
|
|
226
|
-
format is user_name|privilege|with_grant_option|roles
|
|
227
|
-
|
|
228
|
-
```sh
|
|
229
|
-
$ pulumi import snowflake:index/userGrant:UserGrant example "USERNAME|MONITOR|false|role1,role2"
|
|
230
|
-
```
|
|
231
|
-
|
|
232
|
-
:param str resource_name: The name of the resource.
|
|
233
|
-
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
234
|
-
:param pulumi.Input[bool] enable_multiple_grants: When this is set to true, multiple grants of the same type can be created. This will cause Terraform to not revoke
|
|
235
|
-
grants applied to roles and objects outside Terraform.
|
|
236
|
-
:param pulumi.Input[str] privilege: The privilege to grant on the user. To grant all privileges, use the value `ALL PRIVILEGES`.
|
|
237
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] roles: Grants privilege to these roles.
|
|
238
|
-
:param pulumi.Input[str] user_name: The name of the user on which to grant privileges.
|
|
239
|
-
:param pulumi.Input[bool] with_grant_option: When this is set to true, allows the recipient role to grant the privileges to other roles.
|
|
240
|
-
"""
|
|
241
|
-
...
|
|
242
|
-
@overload
|
|
243
|
-
def __init__(__self__,
|
|
244
|
-
resource_name: str,
|
|
245
|
-
args: UserGrantArgs,
|
|
246
|
-
opts: Optional[pulumi.ResourceOptions] = None):
|
|
247
|
-
"""
|
|
248
|
-
> **Deprecation** This resource is deprecated and will be removed in a future major version release. Please use GrantPrivilegesToAccountRole instead. <deprecation>
|
|
249
|
-
|
|
250
|
-
## Example Usage
|
|
251
|
-
|
|
252
|
-
<!--Start PulumiCodeChooser -->
|
|
253
|
-
```python
|
|
254
|
-
import pulumi
|
|
255
|
-
import pulumi_snowflake as snowflake
|
|
256
|
-
|
|
257
|
-
grant = snowflake.UserGrant("grant",
|
|
258
|
-
privilege="MONITOR",
|
|
259
|
-
roles=[
|
|
260
|
-
"role1",
|
|
261
|
-
"role2",
|
|
262
|
-
],
|
|
263
|
-
user_name="user",
|
|
264
|
-
with_grant_option=False)
|
|
265
|
-
```
|
|
266
|
-
<!--End PulumiCodeChooser -->
|
|
267
|
-
|
|
268
|
-
## Import
|
|
269
|
-
|
|
270
|
-
format is user_name|privilege|with_grant_option|roles
|
|
271
|
-
|
|
272
|
-
```sh
|
|
273
|
-
$ pulumi import snowflake:index/userGrant:UserGrant example "USERNAME|MONITOR|false|role1,role2"
|
|
274
|
-
```
|
|
275
|
-
|
|
276
|
-
:param str resource_name: The name of the resource.
|
|
277
|
-
:param UserGrantArgs args: The arguments to use to populate this resource's properties.
|
|
278
|
-
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
279
|
-
"""
|
|
280
|
-
...
|
|
281
|
-
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
282
|
-
resource_args, opts = _utilities.get_resource_args_opts(UserGrantArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
283
|
-
if resource_args is not None:
|
|
284
|
-
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
285
|
-
else:
|
|
286
|
-
__self__._internal_init(resource_name, *args, **kwargs)
|
|
287
|
-
|
|
288
|
-
def _internal_init(__self__,
|
|
289
|
-
resource_name: str,
|
|
290
|
-
opts: Optional[pulumi.ResourceOptions] = None,
|
|
291
|
-
enable_multiple_grants: Optional[pulumi.Input[bool]] = None,
|
|
292
|
-
privilege: Optional[pulumi.Input[str]] = None,
|
|
293
|
-
roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
294
|
-
user_name: Optional[pulumi.Input[str]] = None,
|
|
295
|
-
with_grant_option: Optional[pulumi.Input[bool]] = None,
|
|
296
|
-
__props__=None):
|
|
297
|
-
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
298
|
-
if not isinstance(opts, pulumi.ResourceOptions):
|
|
299
|
-
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
300
|
-
if opts.id is None:
|
|
301
|
-
if __props__ is not None:
|
|
302
|
-
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
303
|
-
__props__ = UserGrantArgs.__new__(UserGrantArgs)
|
|
304
|
-
|
|
305
|
-
__props__.__dict__["enable_multiple_grants"] = enable_multiple_grants
|
|
306
|
-
if privilege is None and not opts.urn:
|
|
307
|
-
raise TypeError("Missing required property 'privilege'")
|
|
308
|
-
__props__.__dict__["privilege"] = privilege
|
|
309
|
-
__props__.__dict__["roles"] = roles
|
|
310
|
-
if user_name is None and not opts.urn:
|
|
311
|
-
raise TypeError("Missing required property 'user_name'")
|
|
312
|
-
__props__.__dict__["user_name"] = user_name
|
|
313
|
-
__props__.__dict__["with_grant_option"] = with_grant_option
|
|
314
|
-
super(UserGrant, __self__).__init__(
|
|
315
|
-
'snowflake:index/userGrant:UserGrant',
|
|
316
|
-
resource_name,
|
|
317
|
-
__props__,
|
|
318
|
-
opts)
|
|
319
|
-
|
|
320
|
-
@staticmethod
|
|
321
|
-
def get(resource_name: str,
|
|
322
|
-
id: pulumi.Input[str],
|
|
323
|
-
opts: Optional[pulumi.ResourceOptions] = None,
|
|
324
|
-
enable_multiple_grants: Optional[pulumi.Input[bool]] = None,
|
|
325
|
-
privilege: Optional[pulumi.Input[str]] = None,
|
|
326
|
-
roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
327
|
-
user_name: Optional[pulumi.Input[str]] = None,
|
|
328
|
-
with_grant_option: Optional[pulumi.Input[bool]] = None) -> 'UserGrant':
|
|
329
|
-
"""
|
|
330
|
-
Get an existing UserGrant resource's state with the given name, id, and optional extra
|
|
331
|
-
properties used to qualify the lookup.
|
|
332
|
-
|
|
333
|
-
:param str resource_name: The unique name of the resulting resource.
|
|
334
|
-
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
335
|
-
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
336
|
-
:param pulumi.Input[bool] enable_multiple_grants: When this is set to true, multiple grants of the same type can be created. This will cause Terraform to not revoke
|
|
337
|
-
grants applied to roles and objects outside Terraform.
|
|
338
|
-
:param pulumi.Input[str] privilege: The privilege to grant on the user. To grant all privileges, use the value `ALL PRIVILEGES`.
|
|
339
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] roles: Grants privilege to these roles.
|
|
340
|
-
:param pulumi.Input[str] user_name: The name of the user on which to grant privileges.
|
|
341
|
-
:param pulumi.Input[bool] with_grant_option: When this is set to true, allows the recipient role to grant the privileges to other roles.
|
|
342
|
-
"""
|
|
343
|
-
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
344
|
-
|
|
345
|
-
__props__ = _UserGrantState.__new__(_UserGrantState)
|
|
346
|
-
|
|
347
|
-
__props__.__dict__["enable_multiple_grants"] = enable_multiple_grants
|
|
348
|
-
__props__.__dict__["privilege"] = privilege
|
|
349
|
-
__props__.__dict__["roles"] = roles
|
|
350
|
-
__props__.__dict__["user_name"] = user_name
|
|
351
|
-
__props__.__dict__["with_grant_option"] = with_grant_option
|
|
352
|
-
return UserGrant(resource_name, opts=opts, __props__=__props__)
|
|
353
|
-
|
|
354
|
-
@property
|
|
355
|
-
@pulumi.getter(name="enableMultipleGrants")
|
|
356
|
-
def enable_multiple_grants(self) -> pulumi.Output[Optional[bool]]:
|
|
357
|
-
"""
|
|
358
|
-
When this is set to true, multiple grants of the same type can be created. This will cause Terraform to not revoke
|
|
359
|
-
grants applied to roles and objects outside Terraform.
|
|
360
|
-
"""
|
|
361
|
-
return pulumi.get(self, "enable_multiple_grants")
|
|
362
|
-
|
|
363
|
-
@property
|
|
364
|
-
@pulumi.getter
|
|
365
|
-
def privilege(self) -> pulumi.Output[str]:
|
|
366
|
-
"""
|
|
367
|
-
The privilege to grant on the user. To grant all privileges, use the value `ALL PRIVILEGES`.
|
|
368
|
-
"""
|
|
369
|
-
return pulumi.get(self, "privilege")
|
|
370
|
-
|
|
371
|
-
@property
|
|
372
|
-
@pulumi.getter
|
|
373
|
-
def roles(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
|
374
|
-
"""
|
|
375
|
-
Grants privilege to these roles.
|
|
376
|
-
"""
|
|
377
|
-
return pulumi.get(self, "roles")
|
|
378
|
-
|
|
379
|
-
@property
|
|
380
|
-
@pulumi.getter(name="userName")
|
|
381
|
-
def user_name(self) -> pulumi.Output[str]:
|
|
382
|
-
"""
|
|
383
|
-
The name of the user on which to grant privileges.
|
|
384
|
-
"""
|
|
385
|
-
return pulumi.get(self, "user_name")
|
|
386
|
-
|
|
387
|
-
@property
|
|
388
|
-
@pulumi.getter(name="withGrantOption")
|
|
389
|
-
def with_grant_option(self) -> pulumi.Output[Optional[bool]]:
|
|
390
|
-
"""
|
|
391
|
-
When this is set to true, allows the recipient role to grant the privileges to other roles.
|
|
392
|
-
"""
|
|
393
|
-
return pulumi.get(self, "with_grant_option")
|
|
394
|
-
|
|
@@ -1,286 +0,0 @@
|
|
|
1
|
-
# coding=utf-8
|
|
2
|
-
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
-
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
-
|
|
5
|
-
import copy
|
|
6
|
-
import warnings
|
|
7
|
-
import pulumi
|
|
8
|
-
import pulumi.runtime
|
|
9
|
-
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
10
|
-
from . import _utilities
|
|
11
|
-
|
|
12
|
-
__all__ = ['UserOwnershipGrantArgs', 'UserOwnershipGrant']
|
|
13
|
-
|
|
14
|
-
@pulumi.input_type
|
|
15
|
-
class UserOwnershipGrantArgs:
|
|
16
|
-
def __init__(__self__, *,
|
|
17
|
-
on_user_name: pulumi.Input[str],
|
|
18
|
-
to_role_name: pulumi.Input[str],
|
|
19
|
-
current_grants: Optional[pulumi.Input[str]] = None,
|
|
20
|
-
revert_ownership_to_role_name: Optional[pulumi.Input[str]] = None):
|
|
21
|
-
"""
|
|
22
|
-
The set of arguments for constructing a UserOwnershipGrant resource.
|
|
23
|
-
:param pulumi.Input[str] on_user_name: The name of the user ownership is granted on.
|
|
24
|
-
:param pulumi.Input[str] to_role_name: The name of the role to grant ownership. Please ensure that the role that terraform is using is granted access.
|
|
25
|
-
:param pulumi.Input[str] current_grants: Specifies whether to remove or transfer all existing outbound privileges on the object when ownership is transferred to a new role.
|
|
26
|
-
:param pulumi.Input[str] revert_ownership_to_role_name: The name of the role to revert ownership to on destroy.
|
|
27
|
-
"""
|
|
28
|
-
pulumi.set(__self__, "on_user_name", on_user_name)
|
|
29
|
-
pulumi.set(__self__, "to_role_name", to_role_name)
|
|
30
|
-
if current_grants is not None:
|
|
31
|
-
pulumi.set(__self__, "current_grants", current_grants)
|
|
32
|
-
if revert_ownership_to_role_name is not None:
|
|
33
|
-
pulumi.set(__self__, "revert_ownership_to_role_name", revert_ownership_to_role_name)
|
|
34
|
-
|
|
35
|
-
@property
|
|
36
|
-
@pulumi.getter(name="onUserName")
|
|
37
|
-
def on_user_name(self) -> pulumi.Input[str]:
|
|
38
|
-
"""
|
|
39
|
-
The name of the user ownership is granted on.
|
|
40
|
-
"""
|
|
41
|
-
return pulumi.get(self, "on_user_name")
|
|
42
|
-
|
|
43
|
-
@on_user_name.setter
|
|
44
|
-
def on_user_name(self, value: pulumi.Input[str]):
|
|
45
|
-
pulumi.set(self, "on_user_name", value)
|
|
46
|
-
|
|
47
|
-
@property
|
|
48
|
-
@pulumi.getter(name="toRoleName")
|
|
49
|
-
def to_role_name(self) -> pulumi.Input[str]:
|
|
50
|
-
"""
|
|
51
|
-
The name of the role to grant ownership. Please ensure that the role that terraform is using is granted access.
|
|
52
|
-
"""
|
|
53
|
-
return pulumi.get(self, "to_role_name")
|
|
54
|
-
|
|
55
|
-
@to_role_name.setter
|
|
56
|
-
def to_role_name(self, value: pulumi.Input[str]):
|
|
57
|
-
pulumi.set(self, "to_role_name", value)
|
|
58
|
-
|
|
59
|
-
@property
|
|
60
|
-
@pulumi.getter(name="currentGrants")
|
|
61
|
-
def current_grants(self) -> Optional[pulumi.Input[str]]:
|
|
62
|
-
"""
|
|
63
|
-
Specifies whether to remove or transfer all existing outbound privileges on the object when ownership is transferred to a new role.
|
|
64
|
-
"""
|
|
65
|
-
return pulumi.get(self, "current_grants")
|
|
66
|
-
|
|
67
|
-
@current_grants.setter
|
|
68
|
-
def current_grants(self, value: Optional[pulumi.Input[str]]):
|
|
69
|
-
pulumi.set(self, "current_grants", value)
|
|
70
|
-
|
|
71
|
-
@property
|
|
72
|
-
@pulumi.getter(name="revertOwnershipToRoleName")
|
|
73
|
-
def revert_ownership_to_role_name(self) -> Optional[pulumi.Input[str]]:
|
|
74
|
-
"""
|
|
75
|
-
The name of the role to revert ownership to on destroy.
|
|
76
|
-
"""
|
|
77
|
-
return pulumi.get(self, "revert_ownership_to_role_name")
|
|
78
|
-
|
|
79
|
-
@revert_ownership_to_role_name.setter
|
|
80
|
-
def revert_ownership_to_role_name(self, value: Optional[pulumi.Input[str]]):
|
|
81
|
-
pulumi.set(self, "revert_ownership_to_role_name", value)
|
|
82
|
-
|
|
83
|
-
|
|
84
|
-
@pulumi.input_type
|
|
85
|
-
class _UserOwnershipGrantState:
|
|
86
|
-
def __init__(__self__, *,
|
|
87
|
-
current_grants: Optional[pulumi.Input[str]] = None,
|
|
88
|
-
on_user_name: Optional[pulumi.Input[str]] = None,
|
|
89
|
-
revert_ownership_to_role_name: Optional[pulumi.Input[str]] = None,
|
|
90
|
-
to_role_name: Optional[pulumi.Input[str]] = None):
|
|
91
|
-
"""
|
|
92
|
-
Input properties used for looking up and filtering UserOwnershipGrant resources.
|
|
93
|
-
:param pulumi.Input[str] current_grants: Specifies whether to remove or transfer all existing outbound privileges on the object when ownership is transferred to a new role.
|
|
94
|
-
:param pulumi.Input[str] on_user_name: The name of the user ownership is granted on.
|
|
95
|
-
:param pulumi.Input[str] revert_ownership_to_role_name: The name of the role to revert ownership to on destroy.
|
|
96
|
-
:param pulumi.Input[str] to_role_name: The name of the role to grant ownership. Please ensure that the role that terraform is using is granted access.
|
|
97
|
-
"""
|
|
98
|
-
if current_grants is not None:
|
|
99
|
-
pulumi.set(__self__, "current_grants", current_grants)
|
|
100
|
-
if on_user_name is not None:
|
|
101
|
-
pulumi.set(__self__, "on_user_name", on_user_name)
|
|
102
|
-
if revert_ownership_to_role_name is not None:
|
|
103
|
-
pulumi.set(__self__, "revert_ownership_to_role_name", revert_ownership_to_role_name)
|
|
104
|
-
if to_role_name is not None:
|
|
105
|
-
pulumi.set(__self__, "to_role_name", to_role_name)
|
|
106
|
-
|
|
107
|
-
@property
|
|
108
|
-
@pulumi.getter(name="currentGrants")
|
|
109
|
-
def current_grants(self) -> Optional[pulumi.Input[str]]:
|
|
110
|
-
"""
|
|
111
|
-
Specifies whether to remove or transfer all existing outbound privileges on the object when ownership is transferred to a new role.
|
|
112
|
-
"""
|
|
113
|
-
return pulumi.get(self, "current_grants")
|
|
114
|
-
|
|
115
|
-
@current_grants.setter
|
|
116
|
-
def current_grants(self, value: Optional[pulumi.Input[str]]):
|
|
117
|
-
pulumi.set(self, "current_grants", value)
|
|
118
|
-
|
|
119
|
-
@property
|
|
120
|
-
@pulumi.getter(name="onUserName")
|
|
121
|
-
def on_user_name(self) -> Optional[pulumi.Input[str]]:
|
|
122
|
-
"""
|
|
123
|
-
The name of the user ownership is granted on.
|
|
124
|
-
"""
|
|
125
|
-
return pulumi.get(self, "on_user_name")
|
|
126
|
-
|
|
127
|
-
@on_user_name.setter
|
|
128
|
-
def on_user_name(self, value: Optional[pulumi.Input[str]]):
|
|
129
|
-
pulumi.set(self, "on_user_name", value)
|
|
130
|
-
|
|
131
|
-
@property
|
|
132
|
-
@pulumi.getter(name="revertOwnershipToRoleName")
|
|
133
|
-
def revert_ownership_to_role_name(self) -> Optional[pulumi.Input[str]]:
|
|
134
|
-
"""
|
|
135
|
-
The name of the role to revert ownership to on destroy.
|
|
136
|
-
"""
|
|
137
|
-
return pulumi.get(self, "revert_ownership_to_role_name")
|
|
138
|
-
|
|
139
|
-
@revert_ownership_to_role_name.setter
|
|
140
|
-
def revert_ownership_to_role_name(self, value: Optional[pulumi.Input[str]]):
|
|
141
|
-
pulumi.set(self, "revert_ownership_to_role_name", value)
|
|
142
|
-
|
|
143
|
-
@property
|
|
144
|
-
@pulumi.getter(name="toRoleName")
|
|
145
|
-
def to_role_name(self) -> Optional[pulumi.Input[str]]:
|
|
146
|
-
"""
|
|
147
|
-
The name of the role to grant ownership. Please ensure that the role that terraform is using is granted access.
|
|
148
|
-
"""
|
|
149
|
-
return pulumi.get(self, "to_role_name")
|
|
150
|
-
|
|
151
|
-
@to_role_name.setter
|
|
152
|
-
def to_role_name(self, value: Optional[pulumi.Input[str]]):
|
|
153
|
-
pulumi.set(self, "to_role_name", value)
|
|
154
|
-
|
|
155
|
-
|
|
156
|
-
class UserOwnershipGrant(pulumi.CustomResource):
|
|
157
|
-
@overload
|
|
158
|
-
def __init__(__self__,
|
|
159
|
-
resource_name: str,
|
|
160
|
-
opts: Optional[pulumi.ResourceOptions] = None,
|
|
161
|
-
current_grants: Optional[pulumi.Input[str]] = None,
|
|
162
|
-
on_user_name: Optional[pulumi.Input[str]] = None,
|
|
163
|
-
revert_ownership_to_role_name: Optional[pulumi.Input[str]] = None,
|
|
164
|
-
to_role_name: Optional[pulumi.Input[str]] = None,
|
|
165
|
-
__props__=None):
|
|
166
|
-
"""
|
|
167
|
-
Create a UserOwnershipGrant resource with the given unique name, props, and options.
|
|
168
|
-
:param str resource_name: The name of the resource.
|
|
169
|
-
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
170
|
-
:param pulumi.Input[str] current_grants: Specifies whether to remove or transfer all existing outbound privileges on the object when ownership is transferred to a new role.
|
|
171
|
-
:param pulumi.Input[str] on_user_name: The name of the user ownership is granted on.
|
|
172
|
-
:param pulumi.Input[str] revert_ownership_to_role_name: The name of the role to revert ownership to on destroy.
|
|
173
|
-
:param pulumi.Input[str] to_role_name: The name of the role to grant ownership. Please ensure that the role that terraform is using is granted access.
|
|
174
|
-
"""
|
|
175
|
-
...
|
|
176
|
-
@overload
|
|
177
|
-
def __init__(__self__,
|
|
178
|
-
resource_name: str,
|
|
179
|
-
args: UserOwnershipGrantArgs,
|
|
180
|
-
opts: Optional[pulumi.ResourceOptions] = None):
|
|
181
|
-
"""
|
|
182
|
-
Create a UserOwnershipGrant resource with the given unique name, props, and options.
|
|
183
|
-
:param str resource_name: The name of the resource.
|
|
184
|
-
:param UserOwnershipGrantArgs args: The arguments to use to populate this resource's properties.
|
|
185
|
-
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
186
|
-
"""
|
|
187
|
-
...
|
|
188
|
-
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
189
|
-
resource_args, opts = _utilities.get_resource_args_opts(UserOwnershipGrantArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
190
|
-
if resource_args is not None:
|
|
191
|
-
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
192
|
-
else:
|
|
193
|
-
__self__._internal_init(resource_name, *args, **kwargs)
|
|
194
|
-
|
|
195
|
-
def _internal_init(__self__,
|
|
196
|
-
resource_name: str,
|
|
197
|
-
opts: Optional[pulumi.ResourceOptions] = None,
|
|
198
|
-
current_grants: Optional[pulumi.Input[str]] = None,
|
|
199
|
-
on_user_name: Optional[pulumi.Input[str]] = None,
|
|
200
|
-
revert_ownership_to_role_name: Optional[pulumi.Input[str]] = None,
|
|
201
|
-
to_role_name: Optional[pulumi.Input[str]] = None,
|
|
202
|
-
__props__=None):
|
|
203
|
-
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
204
|
-
if not isinstance(opts, pulumi.ResourceOptions):
|
|
205
|
-
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
206
|
-
if opts.id is None:
|
|
207
|
-
if __props__ is not None:
|
|
208
|
-
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
209
|
-
__props__ = UserOwnershipGrantArgs.__new__(UserOwnershipGrantArgs)
|
|
210
|
-
|
|
211
|
-
__props__.__dict__["current_grants"] = current_grants
|
|
212
|
-
if on_user_name is None and not opts.urn:
|
|
213
|
-
raise TypeError("Missing required property 'on_user_name'")
|
|
214
|
-
__props__.__dict__["on_user_name"] = on_user_name
|
|
215
|
-
__props__.__dict__["revert_ownership_to_role_name"] = revert_ownership_to_role_name
|
|
216
|
-
if to_role_name is None and not opts.urn:
|
|
217
|
-
raise TypeError("Missing required property 'to_role_name'")
|
|
218
|
-
__props__.__dict__["to_role_name"] = to_role_name
|
|
219
|
-
super(UserOwnershipGrant, __self__).__init__(
|
|
220
|
-
'snowflake:index/userOwnershipGrant:UserOwnershipGrant',
|
|
221
|
-
resource_name,
|
|
222
|
-
__props__,
|
|
223
|
-
opts)
|
|
224
|
-
|
|
225
|
-
@staticmethod
|
|
226
|
-
def get(resource_name: str,
|
|
227
|
-
id: pulumi.Input[str],
|
|
228
|
-
opts: Optional[pulumi.ResourceOptions] = None,
|
|
229
|
-
current_grants: Optional[pulumi.Input[str]] = None,
|
|
230
|
-
on_user_name: Optional[pulumi.Input[str]] = None,
|
|
231
|
-
revert_ownership_to_role_name: Optional[pulumi.Input[str]] = None,
|
|
232
|
-
to_role_name: Optional[pulumi.Input[str]] = None) -> 'UserOwnershipGrant':
|
|
233
|
-
"""
|
|
234
|
-
Get an existing UserOwnershipGrant resource's state with the given name, id, and optional extra
|
|
235
|
-
properties used to qualify the lookup.
|
|
236
|
-
|
|
237
|
-
:param str resource_name: The unique name of the resulting resource.
|
|
238
|
-
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
239
|
-
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
240
|
-
:param pulumi.Input[str] current_grants: Specifies whether to remove or transfer all existing outbound privileges on the object when ownership is transferred to a new role.
|
|
241
|
-
:param pulumi.Input[str] on_user_name: The name of the user ownership is granted on.
|
|
242
|
-
:param pulumi.Input[str] revert_ownership_to_role_name: The name of the role to revert ownership to on destroy.
|
|
243
|
-
:param pulumi.Input[str] to_role_name: The name of the role to grant ownership. Please ensure that the role that terraform is using is granted access.
|
|
244
|
-
"""
|
|
245
|
-
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
246
|
-
|
|
247
|
-
__props__ = _UserOwnershipGrantState.__new__(_UserOwnershipGrantState)
|
|
248
|
-
|
|
249
|
-
__props__.__dict__["current_grants"] = current_grants
|
|
250
|
-
__props__.__dict__["on_user_name"] = on_user_name
|
|
251
|
-
__props__.__dict__["revert_ownership_to_role_name"] = revert_ownership_to_role_name
|
|
252
|
-
__props__.__dict__["to_role_name"] = to_role_name
|
|
253
|
-
return UserOwnershipGrant(resource_name, opts=opts, __props__=__props__)
|
|
254
|
-
|
|
255
|
-
@property
|
|
256
|
-
@pulumi.getter(name="currentGrants")
|
|
257
|
-
def current_grants(self) -> pulumi.Output[Optional[str]]:
|
|
258
|
-
"""
|
|
259
|
-
Specifies whether to remove or transfer all existing outbound privileges on the object when ownership is transferred to a new role.
|
|
260
|
-
"""
|
|
261
|
-
return pulumi.get(self, "current_grants")
|
|
262
|
-
|
|
263
|
-
@property
|
|
264
|
-
@pulumi.getter(name="onUserName")
|
|
265
|
-
def on_user_name(self) -> pulumi.Output[str]:
|
|
266
|
-
"""
|
|
267
|
-
The name of the user ownership is granted on.
|
|
268
|
-
"""
|
|
269
|
-
return pulumi.get(self, "on_user_name")
|
|
270
|
-
|
|
271
|
-
@property
|
|
272
|
-
@pulumi.getter(name="revertOwnershipToRoleName")
|
|
273
|
-
def revert_ownership_to_role_name(self) -> pulumi.Output[Optional[str]]:
|
|
274
|
-
"""
|
|
275
|
-
The name of the role to revert ownership to on destroy.
|
|
276
|
-
"""
|
|
277
|
-
return pulumi.get(self, "revert_ownership_to_role_name")
|
|
278
|
-
|
|
279
|
-
@property
|
|
280
|
-
@pulumi.getter(name="toRoleName")
|
|
281
|
-
def to_role_name(self) -> pulumi.Output[str]:
|
|
282
|
-
"""
|
|
283
|
-
The name of the role to grant ownership. Please ensure that the role that terraform is using is granted access.
|
|
284
|
-
"""
|
|
285
|
-
return pulumi.get(self, "to_role_name")
|
|
286
|
-
|