pulumi-snowflake 0.50.3a1710160126__py3-none-any.whl → 1.2.0a1736849992__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-snowflake might be problematic. Click here for more details.
- pulumi_snowflake/__init__.py +224 -172
- pulumi_snowflake/_inputs.py +52857 -1665
- pulumi_snowflake/_utilities.py +41 -5
- pulumi_snowflake/account.py +188 -218
- pulumi_snowflake/account_authentication_policy_attachment.py +149 -0
- pulumi_snowflake/account_parameter.py +21 -48
- pulumi_snowflake/account_password_policy_attachment.py +7 -32
- pulumi_snowflake/account_role.py +250 -0
- pulumi_snowflake/alert.py +38 -47
- pulumi_snowflake/api_authentication_integration_with_authorization_code_grant.py +704 -0
- pulumi_snowflake/api_authentication_integration_with_client_credentials.py +657 -0
- pulumi_snowflake/api_authentication_integration_with_jwt_bearer.py +692 -0
- pulumi_snowflake/api_integration.py +33 -52
- pulumi_snowflake/authentication_policy.py +622 -0
- pulumi_snowflake/config/__init__.pyi +76 -99
- pulumi_snowflake/config/outputs.py +5 -0
- pulumi_snowflake/config/vars.py +93 -124
- pulumi_snowflake/cortex_search_service.py +596 -0
- pulumi_snowflake/database.py +819 -213
- pulumi_snowflake/database_role.py +81 -44
- pulumi_snowflake/dynamic_table.py +42 -49
- pulumi_snowflake/email_notification_integration.py +33 -28
- pulumi_snowflake/{unsafe_execute.py → execute.py} +36 -39
- pulumi_snowflake/external_function.py +54 -75
- pulumi_snowflake/external_oauth_integration.py +593 -542
- pulumi_snowflake/external_table.py +67 -90
- pulumi_snowflake/external_volume.py +382 -0
- pulumi_snowflake/failover_group.py +57 -98
- pulumi_snowflake/file_format.py +33 -28
- pulumi_snowflake/function_java.py +1211 -0
- pulumi_snowflake/function_javascript.py +882 -0
- pulumi_snowflake/function_python.py +1212 -0
- pulumi_snowflake/function_scala.py +1212 -0
- pulumi_snowflake/function_sql.py +835 -0
- pulumi_snowflake/get_account_roles.py +129 -0
- pulumi_snowflake/get_accounts.py +53 -22
- pulumi_snowflake/get_alerts.py +22 -9
- pulumi_snowflake/get_connections.py +109 -0
- pulumi_snowflake/get_cortex_search_services.py +216 -0
- pulumi_snowflake/get_current_account.py +24 -13
- pulumi_snowflake/get_current_role.py +14 -7
- pulumi_snowflake/get_database.py +25 -9
- pulumi_snowflake/get_database_role.py +162 -0
- pulumi_snowflake/get_database_roles.py +79 -47
- pulumi_snowflake/get_databases.py +91 -73
- pulumi_snowflake/get_dynamic_tables.py +36 -19
- pulumi_snowflake/get_external_functions.py +28 -9
- pulumi_snowflake/get_external_tables.py +28 -9
- pulumi_snowflake/get_failover_groups.py +18 -7
- pulumi_snowflake/get_file_formats.py +28 -9
- pulumi_snowflake/get_functions.py +28 -9
- pulumi_snowflake/get_grants.py +207 -84
- pulumi_snowflake/get_masking_policies.py +91 -51
- pulumi_snowflake/get_materialized_views.py +28 -9
- pulumi_snowflake/get_network_policies.py +129 -0
- pulumi_snowflake/get_parameters.py +38 -15
- pulumi_snowflake/get_pipes.py +28 -9
- pulumi_snowflake/get_procedures.py +28 -9
- pulumi_snowflake/get_resource_monitors.py +37 -24
- pulumi_snowflake/get_row_access_policies.py +91 -51
- pulumi_snowflake/get_schemas.py +145 -41
- pulumi_snowflake/get_secrets.py +200 -0
- pulumi_snowflake/get_security_integrations.py +129 -0
- pulumi_snowflake/get_sequences.py +28 -9
- pulumi_snowflake/get_shares.py +18 -9
- pulumi_snowflake/get_stages.py +28 -9
- pulumi_snowflake/get_storage_integrations.py +16 -9
- pulumi_snowflake/get_streamlits.py +170 -0
- pulumi_snowflake/get_streams.py +114 -54
- pulumi_snowflake/get_system_generate_scim_access_token.py +18 -9
- pulumi_snowflake/get_system_get_aws_sns_iam_policy.py +32 -7
- pulumi_snowflake/get_system_get_private_link_config.py +120 -5
- pulumi_snowflake/get_system_get_snowflake_platform_info.py +15 -7
- pulumi_snowflake/get_tables.py +28 -9
- pulumi_snowflake/get_tags.py +130 -0
- pulumi_snowflake/get_tasks.py +134 -54
- pulumi_snowflake/get_users.py +116 -44
- pulumi_snowflake/get_views.py +114 -54
- pulumi_snowflake/get_warehouses.py +79 -26
- pulumi_snowflake/grant_account_role.py +28 -75
- pulumi_snowflake/grant_application_role.py +257 -0
- pulumi_snowflake/grant_database_role.py +35 -94
- pulumi_snowflake/grant_ownership.py +382 -0
- pulumi_snowflake/grant_privileges_to_account_role.py +42 -78
- pulumi_snowflake/grant_privileges_to_database_role.py +37 -383
- pulumi_snowflake/grant_privileges_to_share.py +96 -44
- pulumi_snowflake/legacy_service_user.py +3670 -0
- pulumi_snowflake/managed_account.py +40 -11
- pulumi_snowflake/masking_policy.py +213 -310
- pulumi_snowflake/materialized_view.py +62 -71
- pulumi_snowflake/network_policy.py +217 -61
- pulumi_snowflake/network_policy_attachment.py +5 -34
- pulumi_snowflake/network_rule.py +473 -0
- pulumi_snowflake/notification_integration.py +49 -84
- pulumi_snowflake/oauth_integration_for_custom_clients.py +906 -0
- pulumi_snowflake/{oauth_integration.py → oauth_integration_for_partner_applications.py} +191 -192
- pulumi_snowflake/object_parameter.py +10 -101
- pulumi_snowflake/outputs.py +49200 -2928
- pulumi_snowflake/password_policy.py +41 -28
- pulumi_snowflake/pipe.py +33 -4
- pulumi_snowflake/primary_connection.py +330 -0
- pulumi_snowflake/procedure_java.py +1273 -0
- pulumi_snowflake/procedure_javascript.py +895 -0
- pulumi_snowflake/procedure_python.py +1226 -0
- pulumi_snowflake/procedure_scala.py +1273 -0
- pulumi_snowflake/procedure_sql.py +895 -0
- pulumi_snowflake/provider.py +378 -613
- pulumi_snowflake/pulumi-plugin.json +2 -1
- pulumi_snowflake/resource_monitor.py +118 -327
- pulumi_snowflake/row_access_policy.py +200 -149
- pulumi_snowflake/{saml_integration.py → saml2_integration.py} +356 -299
- pulumi_snowflake/schema.py +949 -178
- pulumi_snowflake/scim_integration.py +286 -109
- pulumi_snowflake/secondary_connection.py +339 -0
- pulumi_snowflake/secondary_database.py +1080 -0
- pulumi_snowflake/secret_with_authorization_code_grant.py +548 -0
- pulumi_snowflake/secret_with_basic_authentication.py +500 -0
- pulumi_snowflake/secret_with_client_credentials.py +511 -0
- pulumi_snowflake/secret_with_generic_string.py +452 -0
- pulumi_snowflake/sequence.py +9 -34
- pulumi_snowflake/service_user.py +3585 -0
- pulumi_snowflake/share.py +33 -28
- pulumi_snowflake/shared_database.py +939 -0
- pulumi_snowflake/stage.py +95 -84
- pulumi_snowflake/storage_integration.py +46 -4
- pulumi_snowflake/stream_on_directory_table.py +517 -0
- pulumi_snowflake/stream_on_external_table.py +632 -0
- pulumi_snowflake/stream_on_table.py +666 -0
- pulumi_snowflake/stream_on_view.py +666 -0
- pulumi_snowflake/streamlit.py +671 -0
- pulumi_snowflake/table.py +86 -97
- pulumi_snowflake/table_column_masking_policy_application.py +7 -14
- pulumi_snowflake/table_constraint.py +29 -172
- pulumi_snowflake/tag.py +142 -74
- pulumi_snowflake/tag_association.py +40 -215
- pulumi_snowflake/task.py +3048 -418
- pulumi_snowflake/user.py +3351 -384
- pulumi_snowflake/user_authentication_policy_attachment.py +197 -0
- pulumi_snowflake/user_password_policy_attachment.py +5 -4
- pulumi_snowflake/user_public_keys.py +5 -0
- pulumi_snowflake/view.py +466 -215
- pulumi_snowflake/warehouse.py +184 -168
- {pulumi_snowflake-0.50.3a1710160126.dist-info → pulumi_snowflake-1.2.0a1736849992.dist-info}/METADATA +7 -6
- pulumi_snowflake-1.2.0a1736849992.dist-info/RECORD +148 -0
- {pulumi_snowflake-0.50.3a1710160126.dist-info → pulumi_snowflake-1.2.0a1736849992.dist-info}/WHEEL +1 -1
- pulumi_snowflake/account_grant.py +0 -343
- pulumi_snowflake/database_grant.py +0 -495
- pulumi_snowflake/external_table_grant.py +0 -690
- pulumi_snowflake/failover_group_grant.py +0 -388
- pulumi_snowflake/file_format_grant.py +0 -635
- pulumi_snowflake/function.py +0 -872
- pulumi_snowflake/function_grant.py +0 -745
- pulumi_snowflake/get_role.py +0 -121
- pulumi_snowflake/get_roles.py +0 -120
- pulumi_snowflake/grant_privileges_to_role.py +0 -825
- pulumi_snowflake/integration_grant.py +0 -440
- pulumi_snowflake/masking_policy_grant.py +0 -542
- pulumi_snowflake/materialized_view_grant.py +0 -689
- pulumi_snowflake/pipe_grant.py +0 -587
- pulumi_snowflake/procedure.py +0 -887
- pulumi_snowflake/procedure_grant.py +0 -745
- pulumi_snowflake/resource_monitor_grant.py +0 -387
- pulumi_snowflake/role.py +0 -273
- pulumi_snowflake/role_grants.py +0 -352
- pulumi_snowflake/role_ownership_grant.py +0 -338
- pulumi_snowflake/row_access_policy_grant.py +0 -540
- pulumi_snowflake/schema_grant.py +0 -647
- pulumi_snowflake/sequence_grant.py +0 -635
- pulumi_snowflake/session_parameter.py +0 -332
- pulumi_snowflake/stage_grant.py +0 -635
- pulumi_snowflake/stream.py +0 -614
- pulumi_snowflake/stream_grant.py +0 -635
- pulumi_snowflake/table_grant.py +0 -677
- pulumi_snowflake/tag_grant.py +0 -532
- pulumi_snowflake/tag_masking_policy_association.py +0 -210
- pulumi_snowflake/task_grant.py +0 -635
- pulumi_snowflake/user_grant.py +0 -394
- pulumi_snowflake/user_ownership_grant.py +0 -286
- pulumi_snowflake/view_grant.py +0 -705
- pulumi_snowflake/warehouse_grant.py +0 -440
- pulumi_snowflake-0.50.3a1710160126.dist-info/RECORD +0 -136
- {pulumi_snowflake-0.50.3a1710160126.dist-info → pulumi_snowflake-1.2.0a1736849992.dist-info}/top_level.txt +0 -0
|
@@ -4,9 +4,14 @@
|
|
|
4
4
|
|
|
5
5
|
import copy
|
|
6
6
|
import warnings
|
|
7
|
+
import sys
|
|
7
8
|
import pulumi
|
|
8
9
|
import pulumi.runtime
|
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
10
15
|
from . import _utilities
|
|
11
16
|
from . import outputs
|
|
12
17
|
from ._inputs import *
|
|
@@ -27,15 +32,10 @@ class GrantPrivilegesToDatabaseRoleArgs:
|
|
|
27
32
|
with_grant_option: Optional[pulumi.Input[bool]] = None):
|
|
28
33
|
"""
|
|
29
34
|
The set of arguments for constructing a GrantPrivilegesToDatabaseRole resource.
|
|
30
|
-
:param pulumi.Input[str] database_role_name: The fully qualified name of the database role to which privileges will be granted.
|
|
35
|
+
:param pulumi.Input[str] database_role_name: The fully qualified name of the database role to which privileges will be granted. For more information about this resource, see docs.
|
|
31
36
|
:param pulumi.Input[bool] all_privileges: Grant all privileges on the database role.
|
|
32
|
-
:param pulumi.Input[bool] always_apply: If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
|
|
33
|
-
supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
|
|
34
|
-
X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
|
|
35
|
-
new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
|
|
36
|
-
of the config being eventually convergent (producing an empty plan).
|
|
37
37
|
:param pulumi.Input[str] always_apply_trigger: This is a helper field and should not be set. Its main purpose is to help to achieve the functionality described by the always_apply field.
|
|
38
|
-
:param pulumi.Input[str] on_database: The fully qualified name of the database on which privileges will be granted.
|
|
38
|
+
:param pulumi.Input[str] on_database: The fully qualified name of the database on which privileges will be granted. For more information about this resource, see docs.
|
|
39
39
|
:param pulumi.Input['GrantPrivilegesToDatabaseRoleOnSchemaArgs'] on_schema: Specifies the schema on which privileges will be granted.
|
|
40
40
|
:param pulumi.Input['GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs'] on_schema_object: Specifies the schema object on which privileges will be granted.
|
|
41
41
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] privileges: The privileges to grant on the database role.
|
|
@@ -63,7 +63,7 @@ class GrantPrivilegesToDatabaseRoleArgs:
|
|
|
63
63
|
@pulumi.getter(name="databaseRoleName")
|
|
64
64
|
def database_role_name(self) -> pulumi.Input[str]:
|
|
65
65
|
"""
|
|
66
|
-
The fully qualified name of the database role to which privileges will be granted.
|
|
66
|
+
The fully qualified name of the database role to which privileges will be granted. For more information about this resource, see docs.
|
|
67
67
|
"""
|
|
68
68
|
return pulumi.get(self, "database_role_name")
|
|
69
69
|
|
|
@@ -86,13 +86,6 @@ class GrantPrivilegesToDatabaseRoleArgs:
|
|
|
86
86
|
@property
|
|
87
87
|
@pulumi.getter(name="alwaysApply")
|
|
88
88
|
def always_apply(self) -> Optional[pulumi.Input[bool]]:
|
|
89
|
-
"""
|
|
90
|
-
If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
|
|
91
|
-
supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
|
|
92
|
-
X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
|
|
93
|
-
new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
|
|
94
|
-
of the config being eventually convergent (producing an empty plan).
|
|
95
|
-
"""
|
|
96
89
|
return pulumi.get(self, "always_apply")
|
|
97
90
|
|
|
98
91
|
@always_apply.setter
|
|
@@ -115,7 +108,7 @@ class GrantPrivilegesToDatabaseRoleArgs:
|
|
|
115
108
|
@pulumi.getter(name="onDatabase")
|
|
116
109
|
def on_database(self) -> Optional[pulumi.Input[str]]:
|
|
117
110
|
"""
|
|
118
|
-
The fully qualified name of the database on which privileges will be granted.
|
|
111
|
+
The fully qualified name of the database on which privileges will be granted. For more information about this resource, see docs.
|
|
119
112
|
"""
|
|
120
113
|
return pulumi.get(self, "on_database")
|
|
121
114
|
|
|
@@ -187,14 +180,9 @@ class _GrantPrivilegesToDatabaseRoleState:
|
|
|
187
180
|
"""
|
|
188
181
|
Input properties used for looking up and filtering GrantPrivilegesToDatabaseRole resources.
|
|
189
182
|
:param pulumi.Input[bool] all_privileges: Grant all privileges on the database role.
|
|
190
|
-
:param pulumi.Input[bool] always_apply: If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
|
|
191
|
-
supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
|
|
192
|
-
X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
|
|
193
|
-
new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
|
|
194
|
-
of the config being eventually convergent (producing an empty plan).
|
|
195
183
|
:param pulumi.Input[str] always_apply_trigger: This is a helper field and should not be set. Its main purpose is to help to achieve the functionality described by the always_apply field.
|
|
196
|
-
:param pulumi.Input[str] database_role_name: The fully qualified name of the database role to which privileges will be granted.
|
|
197
|
-
:param pulumi.Input[str] on_database: The fully qualified name of the database on which privileges will be granted.
|
|
184
|
+
:param pulumi.Input[str] database_role_name: The fully qualified name of the database role to which privileges will be granted. For more information about this resource, see docs.
|
|
185
|
+
:param pulumi.Input[str] on_database: The fully qualified name of the database on which privileges will be granted. For more information about this resource, see docs.
|
|
198
186
|
:param pulumi.Input['GrantPrivilegesToDatabaseRoleOnSchemaArgs'] on_schema: Specifies the schema on which privileges will be granted.
|
|
199
187
|
:param pulumi.Input['GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs'] on_schema_object: Specifies the schema object on which privileges will be granted.
|
|
200
188
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] privileges: The privileges to grant on the database role.
|
|
@@ -234,13 +222,6 @@ class _GrantPrivilegesToDatabaseRoleState:
|
|
|
234
222
|
@property
|
|
235
223
|
@pulumi.getter(name="alwaysApply")
|
|
236
224
|
def always_apply(self) -> Optional[pulumi.Input[bool]]:
|
|
237
|
-
"""
|
|
238
|
-
If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
|
|
239
|
-
supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
|
|
240
|
-
X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
|
|
241
|
-
new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
|
|
242
|
-
of the config being eventually convergent (producing an empty plan).
|
|
243
|
-
"""
|
|
244
225
|
return pulumi.get(self, "always_apply")
|
|
245
226
|
|
|
246
227
|
@always_apply.setter
|
|
@@ -263,7 +244,7 @@ class _GrantPrivilegesToDatabaseRoleState:
|
|
|
263
244
|
@pulumi.getter(name="databaseRoleName")
|
|
264
245
|
def database_role_name(self) -> Optional[pulumi.Input[str]]:
|
|
265
246
|
"""
|
|
266
|
-
The fully qualified name of the database role to which privileges will be granted.
|
|
247
|
+
The fully qualified name of the database role to which privileges will be granted. For more information about this resource, see docs.
|
|
267
248
|
"""
|
|
268
249
|
return pulumi.get(self, "database_role_name")
|
|
269
250
|
|
|
@@ -275,7 +256,7 @@ class _GrantPrivilegesToDatabaseRoleState:
|
|
|
275
256
|
@pulumi.getter(name="onDatabase")
|
|
276
257
|
def on_database(self) -> Optional[pulumi.Input[str]]:
|
|
277
258
|
"""
|
|
278
|
-
The fully qualified name of the database on which privileges will be granted.
|
|
259
|
+
The fully qualified name of the database on which privileges will be granted. For more information about this resource, see docs.
|
|
279
260
|
"""
|
|
280
261
|
return pulumi.get(self, "on_database")
|
|
281
262
|
|
|
@@ -342,167 +323,12 @@ class GrantPrivilegesToDatabaseRole(pulumi.CustomResource):
|
|
|
342
323
|
always_apply_trigger: Optional[pulumi.Input[str]] = None,
|
|
343
324
|
database_role_name: Optional[pulumi.Input[str]] = None,
|
|
344
325
|
on_database: Optional[pulumi.Input[str]] = None,
|
|
345
|
-
on_schema: Optional[pulumi.Input[
|
|
346
|
-
on_schema_object: Optional[pulumi.Input[
|
|
326
|
+
on_schema: Optional[pulumi.Input[Union['GrantPrivilegesToDatabaseRoleOnSchemaArgs', 'GrantPrivilegesToDatabaseRoleOnSchemaArgsDict']]] = None,
|
|
327
|
+
on_schema_object: Optional[pulumi.Input[Union['GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs', 'GrantPrivilegesToDatabaseRoleOnSchemaObjectArgsDict']]] = None,
|
|
347
328
|
privileges: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
348
329
|
with_grant_option: Optional[pulumi.Input[bool]] = None,
|
|
349
330
|
__props__=None):
|
|
350
331
|
"""
|
|
351
|
-
> **Note** This is a preview resource. It's ready for general use. In case of any errors, please file an issue in our GitHub repository.
|
|
352
|
-
|
|
353
|
-
!> **Warning** Be careful when using `always_apply` field. It will always produce a plan (even when no changes were made) and can be harmful in some setups. For more details why we decided to introduce it to go our document explaining those design decisions (coming soon).
|
|
354
|
-
|
|
355
|
-
## Example Usage
|
|
356
|
-
|
|
357
|
-
<!--Start PulumiCodeChooser -->
|
|
358
|
-
```python
|
|
359
|
-
import pulumi
|
|
360
|
-
import pulumi_snowflake as snowflake
|
|
361
|
-
|
|
362
|
-
db_role = snowflake.DatabaseRole("dbRole", database="database")
|
|
363
|
-
##################################
|
|
364
|
-
### on database privileges
|
|
365
|
-
##################################
|
|
366
|
-
# list of privileges
|
|
367
|
-
example_grant_privileges_to_database_role = snowflake.GrantPrivilegesToDatabaseRole("exampleGrantPrivilegesToDatabaseRole",
|
|
368
|
-
privileges=[
|
|
369
|
-
"CREATE",
|
|
370
|
-
"MONITOR",
|
|
371
|
-
],
|
|
372
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
373
|
-
on_database=db_role.database)
|
|
374
|
-
# all privileges + grant option
|
|
375
|
-
example_index_grant_privileges_to_database_role_grant_privileges_to_database_role = snowflake.GrantPrivilegesToDatabaseRole("exampleIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole",
|
|
376
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
377
|
-
on_database=db_role.database,
|
|
378
|
-
all_privileges=True,
|
|
379
|
-
with_grant_option=True)
|
|
380
|
-
# all privileges + grant option + always apply
|
|
381
|
-
example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole",
|
|
382
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
383
|
-
on_database=db_role.database,
|
|
384
|
-
always_apply=True,
|
|
385
|
-
all_privileges=True,
|
|
386
|
-
with_grant_option=True)
|
|
387
|
-
##################################
|
|
388
|
-
### schema privileges
|
|
389
|
-
##################################
|
|
390
|
-
# list of privileges
|
|
391
|
-
example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role1 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole1",
|
|
392
|
-
privileges=[
|
|
393
|
-
"MODIFY",
|
|
394
|
-
"CREATE TABLE",
|
|
395
|
-
],
|
|
396
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
397
|
-
on_schema=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaArgs(
|
|
398
|
-
schema_name=db_role.database.apply(lambda database: f"\\"{database}\\".\\"my_schema\\""),
|
|
399
|
-
))
|
|
400
|
-
# all privileges + grant option
|
|
401
|
-
example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role2 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole2",
|
|
402
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
403
|
-
on_schema=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaArgs(
|
|
404
|
-
schema_name=db_role.database.apply(lambda database: f"\\"{database}\\".\\"my_schema\\""),
|
|
405
|
-
),
|
|
406
|
-
all_privileges=True,
|
|
407
|
-
with_grant_option=True)
|
|
408
|
-
# all schemas in database
|
|
409
|
-
example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role3 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole3",
|
|
410
|
-
privileges=[
|
|
411
|
-
"MODIFY",
|
|
412
|
-
"CREATE TABLE",
|
|
413
|
-
],
|
|
414
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
415
|
-
on_schema=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaArgs(
|
|
416
|
-
all_schemas_in_database=db_role.database,
|
|
417
|
-
))
|
|
418
|
-
# future schemas in database
|
|
419
|
-
example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role4 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole4",
|
|
420
|
-
privileges=[
|
|
421
|
-
"MODIFY",
|
|
422
|
-
"CREATE TABLE",
|
|
423
|
-
],
|
|
424
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
425
|
-
on_schema=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaArgs(
|
|
426
|
-
future_schemas_in_database=db_role.database,
|
|
427
|
-
))
|
|
428
|
-
##################################
|
|
429
|
-
### schema object privileges
|
|
430
|
-
##################################
|
|
431
|
-
# list of privileges
|
|
432
|
-
example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role5 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole5",
|
|
433
|
-
privileges=[
|
|
434
|
-
"SELECT",
|
|
435
|
-
"REFERENCES",
|
|
436
|
-
],
|
|
437
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
438
|
-
on_schema_object=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs(
|
|
439
|
-
object_type="VIEW",
|
|
440
|
-
object_name=db_role.database.apply(lambda database: f"\\"{database}\\".\\"my_schema\\".\\"my_view\\""),
|
|
441
|
-
))
|
|
442
|
-
# all privileges + grant option
|
|
443
|
-
example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role6 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole6",
|
|
444
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
445
|
-
on_schema_object=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs(
|
|
446
|
-
object_type="VIEW",
|
|
447
|
-
object_name=db_role.database.apply(lambda database: f"\\"{database}\\".\\"my_schema\\".\\"my_view\\""),
|
|
448
|
-
),
|
|
449
|
-
all_privileges=True,
|
|
450
|
-
with_grant_option=True)
|
|
451
|
-
# all in database
|
|
452
|
-
example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role7 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole7",
|
|
453
|
-
privileges=[
|
|
454
|
-
"SELECT",
|
|
455
|
-
"INSERT",
|
|
456
|
-
],
|
|
457
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
458
|
-
on_schema_object=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs(
|
|
459
|
-
all=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectAllArgs(
|
|
460
|
-
object_type_plural="TABLES",
|
|
461
|
-
in_database=db_role.database,
|
|
462
|
-
),
|
|
463
|
-
))
|
|
464
|
-
# all in schema
|
|
465
|
-
example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role8 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole8",
|
|
466
|
-
privileges=[
|
|
467
|
-
"SELECT",
|
|
468
|
-
"INSERT",
|
|
469
|
-
],
|
|
470
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
471
|
-
on_schema_object=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs(
|
|
472
|
-
all=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectAllArgs(
|
|
473
|
-
object_type_plural="TABLES",
|
|
474
|
-
in_schema=db_role.database.apply(lambda database: f"\\"{database}\\".\\"my_schema\\""),
|
|
475
|
-
),
|
|
476
|
-
))
|
|
477
|
-
# future in database
|
|
478
|
-
example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role9 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole9",
|
|
479
|
-
privileges=[
|
|
480
|
-
"SELECT",
|
|
481
|
-
"INSERT",
|
|
482
|
-
],
|
|
483
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
484
|
-
on_schema_object=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs(
|
|
485
|
-
future=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectFutureArgs(
|
|
486
|
-
object_type_plural="TABLES",
|
|
487
|
-
in_database=db_role.database,
|
|
488
|
-
),
|
|
489
|
-
))
|
|
490
|
-
# future in schema
|
|
491
|
-
example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role10 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole10",
|
|
492
|
-
privileges=[
|
|
493
|
-
"SELECT",
|
|
494
|
-
"INSERT",
|
|
495
|
-
],
|
|
496
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
497
|
-
on_schema_object=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs(
|
|
498
|
-
future=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectFutureArgs(
|
|
499
|
-
object_type_plural="TABLES",
|
|
500
|
-
in_schema=db_role.database.apply(lambda database: f"\\"{database}\\".\\"my_schema\\""),
|
|
501
|
-
),
|
|
502
|
-
))
|
|
503
|
-
```
|
|
504
|
-
<!--End PulumiCodeChooser -->
|
|
505
|
-
|
|
506
332
|
## Import
|
|
507
333
|
|
|
508
334
|
### Import examples
|
|
@@ -510,40 +336,35 @@ class GrantPrivilegesToDatabaseRole(pulumi.CustomResource):
|
|
|
510
336
|
#### Grant all privileges OnDatabase
|
|
511
337
|
|
|
512
338
|
```sh
|
|
513
|
-
$ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole
|
|
339
|
+
$ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole example '"test_db"."test_db_role"|false|false|ALL|OnDatabase|"test_db"'`
|
|
514
340
|
```
|
|
515
341
|
|
|
516
342
|
#### Grant list of privileges OnAllSchemasInDatabase
|
|
517
343
|
|
|
518
344
|
```sh
|
|
519
|
-
$ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole
|
|
345
|
+
$ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole example '"test_db"."test_db_role"|false|false|CREATE TAG,CREATE TABLE|OnSchema|OnAllSchemasInDatabase|"test_db"'`
|
|
520
346
|
```
|
|
521
347
|
|
|
522
348
|
#### Grant list of privileges on table
|
|
523
349
|
|
|
524
350
|
```sh
|
|
525
|
-
$ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole
|
|
351
|
+
$ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole example '"test_db"."test_db_role"|false|false|SELECT,DELETE,INSERT|OnSchemaObject|OnObject|TABLE|"test_db"."test_schema"."test_table"'`
|
|
526
352
|
```
|
|
527
353
|
|
|
528
354
|
#### Grant list of privileges OnAll tables in schema
|
|
529
355
|
|
|
530
356
|
```sh
|
|
531
|
-
$ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole
|
|
357
|
+
$ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole example '"test_db"."test_db_role"|false|false|SELECT,DELETE,INSERT|OnSchemaObject|OnAll|TABLES|InSchema|"test_db"."test_schema"'`
|
|
532
358
|
```
|
|
533
359
|
|
|
534
360
|
:param str resource_name: The name of the resource.
|
|
535
361
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
536
362
|
:param pulumi.Input[bool] all_privileges: Grant all privileges on the database role.
|
|
537
|
-
:param pulumi.Input[bool] always_apply: If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
|
|
538
|
-
supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
|
|
539
|
-
X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
|
|
540
|
-
new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
|
|
541
|
-
of the config being eventually convergent (producing an empty plan).
|
|
542
363
|
:param pulumi.Input[str] always_apply_trigger: This is a helper field and should not be set. Its main purpose is to help to achieve the functionality described by the always_apply field.
|
|
543
|
-
:param pulumi.Input[str] database_role_name: The fully qualified name of the database role to which privileges will be granted.
|
|
544
|
-
:param pulumi.Input[str] on_database: The fully qualified name of the database on which privileges will be granted.
|
|
545
|
-
:param pulumi.Input[
|
|
546
|
-
:param pulumi.Input[
|
|
364
|
+
:param pulumi.Input[str] database_role_name: The fully qualified name of the database role to which privileges will be granted. For more information about this resource, see docs.
|
|
365
|
+
:param pulumi.Input[str] on_database: The fully qualified name of the database on which privileges will be granted. For more information about this resource, see docs.
|
|
366
|
+
:param pulumi.Input[Union['GrantPrivilegesToDatabaseRoleOnSchemaArgs', 'GrantPrivilegesToDatabaseRoleOnSchemaArgsDict']] on_schema: Specifies the schema on which privileges will be granted.
|
|
367
|
+
:param pulumi.Input[Union['GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs', 'GrantPrivilegesToDatabaseRoleOnSchemaObjectArgsDict']] on_schema_object: Specifies the schema object on which privileges will be granted.
|
|
547
368
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] privileges: The privileges to grant on the database role.
|
|
548
369
|
:param pulumi.Input[bool] with_grant_option: If specified, allows the recipient role to grant the privileges to other roles.
|
|
549
370
|
"""
|
|
@@ -554,161 +375,6 @@ class GrantPrivilegesToDatabaseRole(pulumi.CustomResource):
|
|
|
554
375
|
args: GrantPrivilegesToDatabaseRoleArgs,
|
|
555
376
|
opts: Optional[pulumi.ResourceOptions] = None):
|
|
556
377
|
"""
|
|
557
|
-
> **Note** This is a preview resource. It's ready for general use. In case of any errors, please file an issue in our GitHub repository.
|
|
558
|
-
|
|
559
|
-
!> **Warning** Be careful when using `always_apply` field. It will always produce a plan (even when no changes were made) and can be harmful in some setups. For more details why we decided to introduce it to go our document explaining those design decisions (coming soon).
|
|
560
|
-
|
|
561
|
-
## Example Usage
|
|
562
|
-
|
|
563
|
-
<!--Start PulumiCodeChooser -->
|
|
564
|
-
```python
|
|
565
|
-
import pulumi
|
|
566
|
-
import pulumi_snowflake as snowflake
|
|
567
|
-
|
|
568
|
-
db_role = snowflake.DatabaseRole("dbRole", database="database")
|
|
569
|
-
##################################
|
|
570
|
-
### on database privileges
|
|
571
|
-
##################################
|
|
572
|
-
# list of privileges
|
|
573
|
-
example_grant_privileges_to_database_role = snowflake.GrantPrivilegesToDatabaseRole("exampleGrantPrivilegesToDatabaseRole",
|
|
574
|
-
privileges=[
|
|
575
|
-
"CREATE",
|
|
576
|
-
"MONITOR",
|
|
577
|
-
],
|
|
578
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
579
|
-
on_database=db_role.database)
|
|
580
|
-
# all privileges + grant option
|
|
581
|
-
example_index_grant_privileges_to_database_role_grant_privileges_to_database_role = snowflake.GrantPrivilegesToDatabaseRole("exampleIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole",
|
|
582
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
583
|
-
on_database=db_role.database,
|
|
584
|
-
all_privileges=True,
|
|
585
|
-
with_grant_option=True)
|
|
586
|
-
# all privileges + grant option + always apply
|
|
587
|
-
example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole",
|
|
588
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
589
|
-
on_database=db_role.database,
|
|
590
|
-
always_apply=True,
|
|
591
|
-
all_privileges=True,
|
|
592
|
-
with_grant_option=True)
|
|
593
|
-
##################################
|
|
594
|
-
### schema privileges
|
|
595
|
-
##################################
|
|
596
|
-
# list of privileges
|
|
597
|
-
example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role1 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole1",
|
|
598
|
-
privileges=[
|
|
599
|
-
"MODIFY",
|
|
600
|
-
"CREATE TABLE",
|
|
601
|
-
],
|
|
602
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
603
|
-
on_schema=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaArgs(
|
|
604
|
-
schema_name=db_role.database.apply(lambda database: f"\\"{database}\\".\\"my_schema\\""),
|
|
605
|
-
))
|
|
606
|
-
# all privileges + grant option
|
|
607
|
-
example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role2 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole2",
|
|
608
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
609
|
-
on_schema=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaArgs(
|
|
610
|
-
schema_name=db_role.database.apply(lambda database: f"\\"{database}\\".\\"my_schema\\""),
|
|
611
|
-
),
|
|
612
|
-
all_privileges=True,
|
|
613
|
-
with_grant_option=True)
|
|
614
|
-
# all schemas in database
|
|
615
|
-
example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role3 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole3",
|
|
616
|
-
privileges=[
|
|
617
|
-
"MODIFY",
|
|
618
|
-
"CREATE TABLE",
|
|
619
|
-
],
|
|
620
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
621
|
-
on_schema=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaArgs(
|
|
622
|
-
all_schemas_in_database=db_role.database,
|
|
623
|
-
))
|
|
624
|
-
# future schemas in database
|
|
625
|
-
example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role4 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole4",
|
|
626
|
-
privileges=[
|
|
627
|
-
"MODIFY",
|
|
628
|
-
"CREATE TABLE",
|
|
629
|
-
],
|
|
630
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
631
|
-
on_schema=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaArgs(
|
|
632
|
-
future_schemas_in_database=db_role.database,
|
|
633
|
-
))
|
|
634
|
-
##################################
|
|
635
|
-
### schema object privileges
|
|
636
|
-
##################################
|
|
637
|
-
# list of privileges
|
|
638
|
-
example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role5 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole5",
|
|
639
|
-
privileges=[
|
|
640
|
-
"SELECT",
|
|
641
|
-
"REFERENCES",
|
|
642
|
-
],
|
|
643
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
644
|
-
on_schema_object=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs(
|
|
645
|
-
object_type="VIEW",
|
|
646
|
-
object_name=db_role.database.apply(lambda database: f"\\"{database}\\".\\"my_schema\\".\\"my_view\\""),
|
|
647
|
-
))
|
|
648
|
-
# all privileges + grant option
|
|
649
|
-
example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role6 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole6",
|
|
650
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
651
|
-
on_schema_object=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs(
|
|
652
|
-
object_type="VIEW",
|
|
653
|
-
object_name=db_role.database.apply(lambda database: f"\\"{database}\\".\\"my_schema\\".\\"my_view\\""),
|
|
654
|
-
),
|
|
655
|
-
all_privileges=True,
|
|
656
|
-
with_grant_option=True)
|
|
657
|
-
# all in database
|
|
658
|
-
example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role7 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole7",
|
|
659
|
-
privileges=[
|
|
660
|
-
"SELECT",
|
|
661
|
-
"INSERT",
|
|
662
|
-
],
|
|
663
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
664
|
-
on_schema_object=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs(
|
|
665
|
-
all=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectAllArgs(
|
|
666
|
-
object_type_plural="TABLES",
|
|
667
|
-
in_database=db_role.database,
|
|
668
|
-
),
|
|
669
|
-
))
|
|
670
|
-
# all in schema
|
|
671
|
-
example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role8 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole8",
|
|
672
|
-
privileges=[
|
|
673
|
-
"SELECT",
|
|
674
|
-
"INSERT",
|
|
675
|
-
],
|
|
676
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
677
|
-
on_schema_object=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs(
|
|
678
|
-
all=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectAllArgs(
|
|
679
|
-
object_type_plural="TABLES",
|
|
680
|
-
in_schema=db_role.database.apply(lambda database: f"\\"{database}\\".\\"my_schema\\""),
|
|
681
|
-
),
|
|
682
|
-
))
|
|
683
|
-
# future in database
|
|
684
|
-
example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role9 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole9",
|
|
685
|
-
privileges=[
|
|
686
|
-
"SELECT",
|
|
687
|
-
"INSERT",
|
|
688
|
-
],
|
|
689
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
690
|
-
on_schema_object=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs(
|
|
691
|
-
future=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectFutureArgs(
|
|
692
|
-
object_type_plural="TABLES",
|
|
693
|
-
in_database=db_role.database,
|
|
694
|
-
),
|
|
695
|
-
))
|
|
696
|
-
# future in schema
|
|
697
|
-
example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role10 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole10",
|
|
698
|
-
privileges=[
|
|
699
|
-
"SELECT",
|
|
700
|
-
"INSERT",
|
|
701
|
-
],
|
|
702
|
-
database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
|
|
703
|
-
on_schema_object=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs(
|
|
704
|
-
future=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectFutureArgs(
|
|
705
|
-
object_type_plural="TABLES",
|
|
706
|
-
in_schema=db_role.database.apply(lambda database: f"\\"{database}\\".\\"my_schema\\""),
|
|
707
|
-
),
|
|
708
|
-
))
|
|
709
|
-
```
|
|
710
|
-
<!--End PulumiCodeChooser -->
|
|
711
|
-
|
|
712
378
|
## Import
|
|
713
379
|
|
|
714
380
|
### Import examples
|
|
@@ -716,25 +382,25 @@ class GrantPrivilegesToDatabaseRole(pulumi.CustomResource):
|
|
|
716
382
|
#### Grant all privileges OnDatabase
|
|
717
383
|
|
|
718
384
|
```sh
|
|
719
|
-
$ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole
|
|
385
|
+
$ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole example '"test_db"."test_db_role"|false|false|ALL|OnDatabase|"test_db"'`
|
|
720
386
|
```
|
|
721
387
|
|
|
722
388
|
#### Grant list of privileges OnAllSchemasInDatabase
|
|
723
389
|
|
|
724
390
|
```sh
|
|
725
|
-
$ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole
|
|
391
|
+
$ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole example '"test_db"."test_db_role"|false|false|CREATE TAG,CREATE TABLE|OnSchema|OnAllSchemasInDatabase|"test_db"'`
|
|
726
392
|
```
|
|
727
393
|
|
|
728
394
|
#### Grant list of privileges on table
|
|
729
395
|
|
|
730
396
|
```sh
|
|
731
|
-
$ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole
|
|
397
|
+
$ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole example '"test_db"."test_db_role"|false|false|SELECT,DELETE,INSERT|OnSchemaObject|OnObject|TABLE|"test_db"."test_schema"."test_table"'`
|
|
732
398
|
```
|
|
733
399
|
|
|
734
400
|
#### Grant list of privileges OnAll tables in schema
|
|
735
401
|
|
|
736
402
|
```sh
|
|
737
|
-
$ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole
|
|
403
|
+
$ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole example '"test_db"."test_db_role"|false|false|SELECT,DELETE,INSERT|OnSchemaObject|OnAll|TABLES|InSchema|"test_db"."test_schema"'`
|
|
738
404
|
```
|
|
739
405
|
|
|
740
406
|
:param str resource_name: The name of the resource.
|
|
@@ -757,8 +423,8 @@ class GrantPrivilegesToDatabaseRole(pulumi.CustomResource):
|
|
|
757
423
|
always_apply_trigger: Optional[pulumi.Input[str]] = None,
|
|
758
424
|
database_role_name: Optional[pulumi.Input[str]] = None,
|
|
759
425
|
on_database: Optional[pulumi.Input[str]] = None,
|
|
760
|
-
on_schema: Optional[pulumi.Input[
|
|
761
|
-
on_schema_object: Optional[pulumi.Input[
|
|
426
|
+
on_schema: Optional[pulumi.Input[Union['GrantPrivilegesToDatabaseRoleOnSchemaArgs', 'GrantPrivilegesToDatabaseRoleOnSchemaArgsDict']]] = None,
|
|
427
|
+
on_schema_object: Optional[pulumi.Input[Union['GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs', 'GrantPrivilegesToDatabaseRoleOnSchemaObjectArgsDict']]] = None,
|
|
762
428
|
privileges: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
763
429
|
with_grant_option: Optional[pulumi.Input[bool]] = None,
|
|
764
430
|
__props__=None):
|
|
@@ -796,8 +462,8 @@ class GrantPrivilegesToDatabaseRole(pulumi.CustomResource):
|
|
|
796
462
|
always_apply_trigger: Optional[pulumi.Input[str]] = None,
|
|
797
463
|
database_role_name: Optional[pulumi.Input[str]] = None,
|
|
798
464
|
on_database: Optional[pulumi.Input[str]] = None,
|
|
799
|
-
on_schema: Optional[pulumi.Input[
|
|
800
|
-
on_schema_object: Optional[pulumi.Input[
|
|
465
|
+
on_schema: Optional[pulumi.Input[Union['GrantPrivilegesToDatabaseRoleOnSchemaArgs', 'GrantPrivilegesToDatabaseRoleOnSchemaArgsDict']]] = None,
|
|
466
|
+
on_schema_object: Optional[pulumi.Input[Union['GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs', 'GrantPrivilegesToDatabaseRoleOnSchemaObjectArgsDict']]] = None,
|
|
801
467
|
privileges: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
802
468
|
with_grant_option: Optional[pulumi.Input[bool]] = None) -> 'GrantPrivilegesToDatabaseRole':
|
|
803
469
|
"""
|
|
@@ -808,16 +474,11 @@ class GrantPrivilegesToDatabaseRole(pulumi.CustomResource):
|
|
|
808
474
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
809
475
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
810
476
|
:param pulumi.Input[bool] all_privileges: Grant all privileges on the database role.
|
|
811
|
-
:param pulumi.Input[bool] always_apply: If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
|
|
812
|
-
supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
|
|
813
|
-
X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
|
|
814
|
-
new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
|
|
815
|
-
of the config being eventually convergent (producing an empty plan).
|
|
816
477
|
:param pulumi.Input[str] always_apply_trigger: This is a helper field and should not be set. Its main purpose is to help to achieve the functionality described by the always_apply field.
|
|
817
|
-
:param pulumi.Input[str] database_role_name: The fully qualified name of the database role to which privileges will be granted.
|
|
818
|
-
:param pulumi.Input[str] on_database: The fully qualified name of the database on which privileges will be granted.
|
|
819
|
-
:param pulumi.Input[
|
|
820
|
-
:param pulumi.Input[
|
|
478
|
+
:param pulumi.Input[str] database_role_name: The fully qualified name of the database role to which privileges will be granted. For more information about this resource, see docs.
|
|
479
|
+
:param pulumi.Input[str] on_database: The fully qualified name of the database on which privileges will be granted. For more information about this resource, see docs.
|
|
480
|
+
:param pulumi.Input[Union['GrantPrivilegesToDatabaseRoleOnSchemaArgs', 'GrantPrivilegesToDatabaseRoleOnSchemaArgsDict']] on_schema: Specifies the schema on which privileges will be granted.
|
|
481
|
+
:param pulumi.Input[Union['GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs', 'GrantPrivilegesToDatabaseRoleOnSchemaObjectArgsDict']] on_schema_object: Specifies the schema object on which privileges will be granted.
|
|
821
482
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] privileges: The privileges to grant on the database role.
|
|
822
483
|
:param pulumi.Input[bool] with_grant_option: If specified, allows the recipient role to grant the privileges to other roles.
|
|
823
484
|
"""
|
|
@@ -847,13 +508,6 @@ class GrantPrivilegesToDatabaseRole(pulumi.CustomResource):
|
|
|
847
508
|
@property
|
|
848
509
|
@pulumi.getter(name="alwaysApply")
|
|
849
510
|
def always_apply(self) -> pulumi.Output[Optional[bool]]:
|
|
850
|
-
"""
|
|
851
|
-
If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
|
|
852
|
-
supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
|
|
853
|
-
X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
|
|
854
|
-
new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
|
|
855
|
-
of the config being eventually convergent (producing an empty plan).
|
|
856
|
-
"""
|
|
857
511
|
return pulumi.get(self, "always_apply")
|
|
858
512
|
|
|
859
513
|
@property
|
|
@@ -868,7 +522,7 @@ class GrantPrivilegesToDatabaseRole(pulumi.CustomResource):
|
|
|
868
522
|
@pulumi.getter(name="databaseRoleName")
|
|
869
523
|
def database_role_name(self) -> pulumi.Output[str]:
|
|
870
524
|
"""
|
|
871
|
-
The fully qualified name of the database role to which privileges will be granted.
|
|
525
|
+
The fully qualified name of the database role to which privileges will be granted. For more information about this resource, see docs.
|
|
872
526
|
"""
|
|
873
527
|
return pulumi.get(self, "database_role_name")
|
|
874
528
|
|
|
@@ -876,7 +530,7 @@ class GrantPrivilegesToDatabaseRole(pulumi.CustomResource):
|
|
|
876
530
|
@pulumi.getter(name="onDatabase")
|
|
877
531
|
def on_database(self) -> pulumi.Output[Optional[str]]:
|
|
878
532
|
"""
|
|
879
|
-
The fully qualified name of the database on which privileges will be granted.
|
|
533
|
+
The fully qualified name of the database on which privileges will be granted. For more information about this resource, see docs.
|
|
880
534
|
"""
|
|
881
535
|
return pulumi.get(self, "on_database")
|
|
882
536
|
|