pulumi-snowflake 0.50.3a1710160126__py3-none-any.whl → 1.2.0a1736849992__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-snowflake might be problematic. Click here for more details.

Files changed (182) hide show
  1. pulumi_snowflake/__init__.py +224 -172
  2. pulumi_snowflake/_inputs.py +52857 -1665
  3. pulumi_snowflake/_utilities.py +41 -5
  4. pulumi_snowflake/account.py +188 -218
  5. pulumi_snowflake/account_authentication_policy_attachment.py +149 -0
  6. pulumi_snowflake/account_parameter.py +21 -48
  7. pulumi_snowflake/account_password_policy_attachment.py +7 -32
  8. pulumi_snowflake/account_role.py +250 -0
  9. pulumi_snowflake/alert.py +38 -47
  10. pulumi_snowflake/api_authentication_integration_with_authorization_code_grant.py +704 -0
  11. pulumi_snowflake/api_authentication_integration_with_client_credentials.py +657 -0
  12. pulumi_snowflake/api_authentication_integration_with_jwt_bearer.py +692 -0
  13. pulumi_snowflake/api_integration.py +33 -52
  14. pulumi_snowflake/authentication_policy.py +622 -0
  15. pulumi_snowflake/config/__init__.pyi +76 -99
  16. pulumi_snowflake/config/outputs.py +5 -0
  17. pulumi_snowflake/config/vars.py +93 -124
  18. pulumi_snowflake/cortex_search_service.py +596 -0
  19. pulumi_snowflake/database.py +819 -213
  20. pulumi_snowflake/database_role.py +81 -44
  21. pulumi_snowflake/dynamic_table.py +42 -49
  22. pulumi_snowflake/email_notification_integration.py +33 -28
  23. pulumi_snowflake/{unsafe_execute.py → execute.py} +36 -39
  24. pulumi_snowflake/external_function.py +54 -75
  25. pulumi_snowflake/external_oauth_integration.py +593 -542
  26. pulumi_snowflake/external_table.py +67 -90
  27. pulumi_snowflake/external_volume.py +382 -0
  28. pulumi_snowflake/failover_group.py +57 -98
  29. pulumi_snowflake/file_format.py +33 -28
  30. pulumi_snowflake/function_java.py +1211 -0
  31. pulumi_snowflake/function_javascript.py +882 -0
  32. pulumi_snowflake/function_python.py +1212 -0
  33. pulumi_snowflake/function_scala.py +1212 -0
  34. pulumi_snowflake/function_sql.py +835 -0
  35. pulumi_snowflake/get_account_roles.py +129 -0
  36. pulumi_snowflake/get_accounts.py +53 -22
  37. pulumi_snowflake/get_alerts.py +22 -9
  38. pulumi_snowflake/get_connections.py +109 -0
  39. pulumi_snowflake/get_cortex_search_services.py +216 -0
  40. pulumi_snowflake/get_current_account.py +24 -13
  41. pulumi_snowflake/get_current_role.py +14 -7
  42. pulumi_snowflake/get_database.py +25 -9
  43. pulumi_snowflake/get_database_role.py +162 -0
  44. pulumi_snowflake/get_database_roles.py +79 -47
  45. pulumi_snowflake/get_databases.py +91 -73
  46. pulumi_snowflake/get_dynamic_tables.py +36 -19
  47. pulumi_snowflake/get_external_functions.py +28 -9
  48. pulumi_snowflake/get_external_tables.py +28 -9
  49. pulumi_snowflake/get_failover_groups.py +18 -7
  50. pulumi_snowflake/get_file_formats.py +28 -9
  51. pulumi_snowflake/get_functions.py +28 -9
  52. pulumi_snowflake/get_grants.py +207 -84
  53. pulumi_snowflake/get_masking_policies.py +91 -51
  54. pulumi_snowflake/get_materialized_views.py +28 -9
  55. pulumi_snowflake/get_network_policies.py +129 -0
  56. pulumi_snowflake/get_parameters.py +38 -15
  57. pulumi_snowflake/get_pipes.py +28 -9
  58. pulumi_snowflake/get_procedures.py +28 -9
  59. pulumi_snowflake/get_resource_monitors.py +37 -24
  60. pulumi_snowflake/get_row_access_policies.py +91 -51
  61. pulumi_snowflake/get_schemas.py +145 -41
  62. pulumi_snowflake/get_secrets.py +200 -0
  63. pulumi_snowflake/get_security_integrations.py +129 -0
  64. pulumi_snowflake/get_sequences.py +28 -9
  65. pulumi_snowflake/get_shares.py +18 -9
  66. pulumi_snowflake/get_stages.py +28 -9
  67. pulumi_snowflake/get_storage_integrations.py +16 -9
  68. pulumi_snowflake/get_streamlits.py +170 -0
  69. pulumi_snowflake/get_streams.py +114 -54
  70. pulumi_snowflake/get_system_generate_scim_access_token.py +18 -9
  71. pulumi_snowflake/get_system_get_aws_sns_iam_policy.py +32 -7
  72. pulumi_snowflake/get_system_get_private_link_config.py +120 -5
  73. pulumi_snowflake/get_system_get_snowflake_platform_info.py +15 -7
  74. pulumi_snowflake/get_tables.py +28 -9
  75. pulumi_snowflake/get_tags.py +130 -0
  76. pulumi_snowflake/get_tasks.py +134 -54
  77. pulumi_snowflake/get_users.py +116 -44
  78. pulumi_snowflake/get_views.py +114 -54
  79. pulumi_snowflake/get_warehouses.py +79 -26
  80. pulumi_snowflake/grant_account_role.py +28 -75
  81. pulumi_snowflake/grant_application_role.py +257 -0
  82. pulumi_snowflake/grant_database_role.py +35 -94
  83. pulumi_snowflake/grant_ownership.py +382 -0
  84. pulumi_snowflake/grant_privileges_to_account_role.py +42 -78
  85. pulumi_snowflake/grant_privileges_to_database_role.py +37 -383
  86. pulumi_snowflake/grant_privileges_to_share.py +96 -44
  87. pulumi_snowflake/legacy_service_user.py +3670 -0
  88. pulumi_snowflake/managed_account.py +40 -11
  89. pulumi_snowflake/masking_policy.py +213 -310
  90. pulumi_snowflake/materialized_view.py +62 -71
  91. pulumi_snowflake/network_policy.py +217 -61
  92. pulumi_snowflake/network_policy_attachment.py +5 -34
  93. pulumi_snowflake/network_rule.py +473 -0
  94. pulumi_snowflake/notification_integration.py +49 -84
  95. pulumi_snowflake/oauth_integration_for_custom_clients.py +906 -0
  96. pulumi_snowflake/{oauth_integration.py → oauth_integration_for_partner_applications.py} +191 -192
  97. pulumi_snowflake/object_parameter.py +10 -101
  98. pulumi_snowflake/outputs.py +49200 -2928
  99. pulumi_snowflake/password_policy.py +41 -28
  100. pulumi_snowflake/pipe.py +33 -4
  101. pulumi_snowflake/primary_connection.py +330 -0
  102. pulumi_snowflake/procedure_java.py +1273 -0
  103. pulumi_snowflake/procedure_javascript.py +895 -0
  104. pulumi_snowflake/procedure_python.py +1226 -0
  105. pulumi_snowflake/procedure_scala.py +1273 -0
  106. pulumi_snowflake/procedure_sql.py +895 -0
  107. pulumi_snowflake/provider.py +378 -613
  108. pulumi_snowflake/pulumi-plugin.json +2 -1
  109. pulumi_snowflake/resource_monitor.py +118 -327
  110. pulumi_snowflake/row_access_policy.py +200 -149
  111. pulumi_snowflake/{saml_integration.py → saml2_integration.py} +356 -299
  112. pulumi_snowflake/schema.py +949 -178
  113. pulumi_snowflake/scim_integration.py +286 -109
  114. pulumi_snowflake/secondary_connection.py +339 -0
  115. pulumi_snowflake/secondary_database.py +1080 -0
  116. pulumi_snowflake/secret_with_authorization_code_grant.py +548 -0
  117. pulumi_snowflake/secret_with_basic_authentication.py +500 -0
  118. pulumi_snowflake/secret_with_client_credentials.py +511 -0
  119. pulumi_snowflake/secret_with_generic_string.py +452 -0
  120. pulumi_snowflake/sequence.py +9 -34
  121. pulumi_snowflake/service_user.py +3585 -0
  122. pulumi_snowflake/share.py +33 -28
  123. pulumi_snowflake/shared_database.py +939 -0
  124. pulumi_snowflake/stage.py +95 -84
  125. pulumi_snowflake/storage_integration.py +46 -4
  126. pulumi_snowflake/stream_on_directory_table.py +517 -0
  127. pulumi_snowflake/stream_on_external_table.py +632 -0
  128. pulumi_snowflake/stream_on_table.py +666 -0
  129. pulumi_snowflake/stream_on_view.py +666 -0
  130. pulumi_snowflake/streamlit.py +671 -0
  131. pulumi_snowflake/table.py +86 -97
  132. pulumi_snowflake/table_column_masking_policy_application.py +7 -14
  133. pulumi_snowflake/table_constraint.py +29 -172
  134. pulumi_snowflake/tag.py +142 -74
  135. pulumi_snowflake/tag_association.py +40 -215
  136. pulumi_snowflake/task.py +3048 -418
  137. pulumi_snowflake/user.py +3351 -384
  138. pulumi_snowflake/user_authentication_policy_attachment.py +197 -0
  139. pulumi_snowflake/user_password_policy_attachment.py +5 -4
  140. pulumi_snowflake/user_public_keys.py +5 -0
  141. pulumi_snowflake/view.py +466 -215
  142. pulumi_snowflake/warehouse.py +184 -168
  143. {pulumi_snowflake-0.50.3a1710160126.dist-info → pulumi_snowflake-1.2.0a1736849992.dist-info}/METADATA +7 -6
  144. pulumi_snowflake-1.2.0a1736849992.dist-info/RECORD +148 -0
  145. {pulumi_snowflake-0.50.3a1710160126.dist-info → pulumi_snowflake-1.2.0a1736849992.dist-info}/WHEEL +1 -1
  146. pulumi_snowflake/account_grant.py +0 -343
  147. pulumi_snowflake/database_grant.py +0 -495
  148. pulumi_snowflake/external_table_grant.py +0 -690
  149. pulumi_snowflake/failover_group_grant.py +0 -388
  150. pulumi_snowflake/file_format_grant.py +0 -635
  151. pulumi_snowflake/function.py +0 -872
  152. pulumi_snowflake/function_grant.py +0 -745
  153. pulumi_snowflake/get_role.py +0 -121
  154. pulumi_snowflake/get_roles.py +0 -120
  155. pulumi_snowflake/grant_privileges_to_role.py +0 -825
  156. pulumi_snowflake/integration_grant.py +0 -440
  157. pulumi_snowflake/masking_policy_grant.py +0 -542
  158. pulumi_snowflake/materialized_view_grant.py +0 -689
  159. pulumi_snowflake/pipe_grant.py +0 -587
  160. pulumi_snowflake/procedure.py +0 -887
  161. pulumi_snowflake/procedure_grant.py +0 -745
  162. pulumi_snowflake/resource_monitor_grant.py +0 -387
  163. pulumi_snowflake/role.py +0 -273
  164. pulumi_snowflake/role_grants.py +0 -352
  165. pulumi_snowflake/role_ownership_grant.py +0 -338
  166. pulumi_snowflake/row_access_policy_grant.py +0 -540
  167. pulumi_snowflake/schema_grant.py +0 -647
  168. pulumi_snowflake/sequence_grant.py +0 -635
  169. pulumi_snowflake/session_parameter.py +0 -332
  170. pulumi_snowflake/stage_grant.py +0 -635
  171. pulumi_snowflake/stream.py +0 -614
  172. pulumi_snowflake/stream_grant.py +0 -635
  173. pulumi_snowflake/table_grant.py +0 -677
  174. pulumi_snowflake/tag_grant.py +0 -532
  175. pulumi_snowflake/tag_masking_policy_association.py +0 -210
  176. pulumi_snowflake/task_grant.py +0 -635
  177. pulumi_snowflake/user_grant.py +0 -394
  178. pulumi_snowflake/user_ownership_grant.py +0 -286
  179. pulumi_snowflake/view_grant.py +0 -705
  180. pulumi_snowflake/warehouse_grant.py +0 -440
  181. pulumi_snowflake-0.50.3a1710160126.dist-info/RECORD +0 -136
  182. {pulumi_snowflake-0.50.3a1710160126.dist-info → pulumi_snowflake-1.2.0a1736849992.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -27,15 +32,10 @@ class GrantPrivilegesToDatabaseRoleArgs:
27
32
  with_grant_option: Optional[pulumi.Input[bool]] = None):
28
33
  """
29
34
  The set of arguments for constructing a GrantPrivilegesToDatabaseRole resource.
30
- :param pulumi.Input[str] database_role_name: The fully qualified name of the database role to which privileges will be granted.
35
+ :param pulumi.Input[str] database_role_name: The fully qualified name of the database role to which privileges will be granted. For more information about this resource, see docs.
31
36
  :param pulumi.Input[bool] all_privileges: Grant all privileges on the database role.
32
- :param pulumi.Input[bool] always_apply: If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
33
- supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
34
- X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
35
- new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
36
- of the config being eventually convergent (producing an empty plan).
37
37
  :param pulumi.Input[str] always_apply_trigger: This is a helper field and should not be set. Its main purpose is to help to achieve the functionality described by the always_apply field.
38
- :param pulumi.Input[str] on_database: The fully qualified name of the database on which privileges will be granted.
38
+ :param pulumi.Input[str] on_database: The fully qualified name of the database on which privileges will be granted. For more information about this resource, see docs.
39
39
  :param pulumi.Input['GrantPrivilegesToDatabaseRoleOnSchemaArgs'] on_schema: Specifies the schema on which privileges will be granted.
40
40
  :param pulumi.Input['GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs'] on_schema_object: Specifies the schema object on which privileges will be granted.
41
41
  :param pulumi.Input[Sequence[pulumi.Input[str]]] privileges: The privileges to grant on the database role.
@@ -63,7 +63,7 @@ class GrantPrivilegesToDatabaseRoleArgs:
63
63
  @pulumi.getter(name="databaseRoleName")
64
64
  def database_role_name(self) -> pulumi.Input[str]:
65
65
  """
66
- The fully qualified name of the database role to which privileges will be granted.
66
+ The fully qualified name of the database role to which privileges will be granted. For more information about this resource, see docs.
67
67
  """
68
68
  return pulumi.get(self, "database_role_name")
69
69
 
@@ -86,13 +86,6 @@ class GrantPrivilegesToDatabaseRoleArgs:
86
86
  @property
87
87
  @pulumi.getter(name="alwaysApply")
88
88
  def always_apply(self) -> Optional[pulumi.Input[bool]]:
89
- """
90
- If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
91
- supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
92
- X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
93
- new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
94
- of the config being eventually convergent (producing an empty plan).
95
- """
96
89
  return pulumi.get(self, "always_apply")
97
90
 
98
91
  @always_apply.setter
@@ -115,7 +108,7 @@ class GrantPrivilegesToDatabaseRoleArgs:
115
108
  @pulumi.getter(name="onDatabase")
116
109
  def on_database(self) -> Optional[pulumi.Input[str]]:
117
110
  """
118
- The fully qualified name of the database on which privileges will be granted.
111
+ The fully qualified name of the database on which privileges will be granted. For more information about this resource, see docs.
119
112
  """
120
113
  return pulumi.get(self, "on_database")
121
114
 
@@ -187,14 +180,9 @@ class _GrantPrivilegesToDatabaseRoleState:
187
180
  """
188
181
  Input properties used for looking up and filtering GrantPrivilegesToDatabaseRole resources.
189
182
  :param pulumi.Input[bool] all_privileges: Grant all privileges on the database role.
190
- :param pulumi.Input[bool] always_apply: If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
191
- supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
192
- X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
193
- new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
194
- of the config being eventually convergent (producing an empty plan).
195
183
  :param pulumi.Input[str] always_apply_trigger: This is a helper field and should not be set. Its main purpose is to help to achieve the functionality described by the always_apply field.
196
- :param pulumi.Input[str] database_role_name: The fully qualified name of the database role to which privileges will be granted.
197
- :param pulumi.Input[str] on_database: The fully qualified name of the database on which privileges will be granted.
184
+ :param pulumi.Input[str] database_role_name: The fully qualified name of the database role to which privileges will be granted. For more information about this resource, see docs.
185
+ :param pulumi.Input[str] on_database: The fully qualified name of the database on which privileges will be granted. For more information about this resource, see docs.
198
186
  :param pulumi.Input['GrantPrivilegesToDatabaseRoleOnSchemaArgs'] on_schema: Specifies the schema on which privileges will be granted.
199
187
  :param pulumi.Input['GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs'] on_schema_object: Specifies the schema object on which privileges will be granted.
200
188
  :param pulumi.Input[Sequence[pulumi.Input[str]]] privileges: The privileges to grant on the database role.
@@ -234,13 +222,6 @@ class _GrantPrivilegesToDatabaseRoleState:
234
222
  @property
235
223
  @pulumi.getter(name="alwaysApply")
236
224
  def always_apply(self) -> Optional[pulumi.Input[bool]]:
237
- """
238
- If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
239
- supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
240
- X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
241
- new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
242
- of the config being eventually convergent (producing an empty plan).
243
- """
244
225
  return pulumi.get(self, "always_apply")
245
226
 
246
227
  @always_apply.setter
@@ -263,7 +244,7 @@ class _GrantPrivilegesToDatabaseRoleState:
263
244
  @pulumi.getter(name="databaseRoleName")
264
245
  def database_role_name(self) -> Optional[pulumi.Input[str]]:
265
246
  """
266
- The fully qualified name of the database role to which privileges will be granted.
247
+ The fully qualified name of the database role to which privileges will be granted. For more information about this resource, see docs.
267
248
  """
268
249
  return pulumi.get(self, "database_role_name")
269
250
 
@@ -275,7 +256,7 @@ class _GrantPrivilegesToDatabaseRoleState:
275
256
  @pulumi.getter(name="onDatabase")
276
257
  def on_database(self) -> Optional[pulumi.Input[str]]:
277
258
  """
278
- The fully qualified name of the database on which privileges will be granted.
259
+ The fully qualified name of the database on which privileges will be granted. For more information about this resource, see docs.
279
260
  """
280
261
  return pulumi.get(self, "on_database")
281
262
 
@@ -342,167 +323,12 @@ class GrantPrivilegesToDatabaseRole(pulumi.CustomResource):
342
323
  always_apply_trigger: Optional[pulumi.Input[str]] = None,
343
324
  database_role_name: Optional[pulumi.Input[str]] = None,
344
325
  on_database: Optional[pulumi.Input[str]] = None,
345
- on_schema: Optional[pulumi.Input[pulumi.InputType['GrantPrivilegesToDatabaseRoleOnSchemaArgs']]] = None,
346
- on_schema_object: Optional[pulumi.Input[pulumi.InputType['GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs']]] = None,
326
+ on_schema: Optional[pulumi.Input[Union['GrantPrivilegesToDatabaseRoleOnSchemaArgs', 'GrantPrivilegesToDatabaseRoleOnSchemaArgsDict']]] = None,
327
+ on_schema_object: Optional[pulumi.Input[Union['GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs', 'GrantPrivilegesToDatabaseRoleOnSchemaObjectArgsDict']]] = None,
347
328
  privileges: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
348
329
  with_grant_option: Optional[pulumi.Input[bool]] = None,
349
330
  __props__=None):
350
331
  """
351
- > **Note** This is a preview resource. It's ready for general use. In case of any errors, please file an issue in our GitHub repository.
352
-
353
- !> **Warning** Be careful when using `always_apply` field. It will always produce a plan (even when no changes were made) and can be harmful in some setups. For more details why we decided to introduce it to go our document explaining those design decisions (coming soon).
354
-
355
- ## Example Usage
356
-
357
- <!--Start PulumiCodeChooser -->
358
- ```python
359
- import pulumi
360
- import pulumi_snowflake as snowflake
361
-
362
- db_role = snowflake.DatabaseRole("dbRole", database="database")
363
- ##################################
364
- ### on database privileges
365
- ##################################
366
- # list of privileges
367
- example_grant_privileges_to_database_role = snowflake.GrantPrivilegesToDatabaseRole("exampleGrantPrivilegesToDatabaseRole",
368
- privileges=[
369
- "CREATE",
370
- "MONITOR",
371
- ],
372
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
373
- on_database=db_role.database)
374
- # all privileges + grant option
375
- example_index_grant_privileges_to_database_role_grant_privileges_to_database_role = snowflake.GrantPrivilegesToDatabaseRole("exampleIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole",
376
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
377
- on_database=db_role.database,
378
- all_privileges=True,
379
- with_grant_option=True)
380
- # all privileges + grant option + always apply
381
- example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole",
382
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
383
- on_database=db_role.database,
384
- always_apply=True,
385
- all_privileges=True,
386
- with_grant_option=True)
387
- ##################################
388
- ### schema privileges
389
- ##################################
390
- # list of privileges
391
- example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role1 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole1",
392
- privileges=[
393
- "MODIFY",
394
- "CREATE TABLE",
395
- ],
396
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
397
- on_schema=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaArgs(
398
- schema_name=db_role.database.apply(lambda database: f"\\"{database}\\".\\"my_schema\\""),
399
- ))
400
- # all privileges + grant option
401
- example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role2 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole2",
402
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
403
- on_schema=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaArgs(
404
- schema_name=db_role.database.apply(lambda database: f"\\"{database}\\".\\"my_schema\\""),
405
- ),
406
- all_privileges=True,
407
- with_grant_option=True)
408
- # all schemas in database
409
- example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role3 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole3",
410
- privileges=[
411
- "MODIFY",
412
- "CREATE TABLE",
413
- ],
414
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
415
- on_schema=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaArgs(
416
- all_schemas_in_database=db_role.database,
417
- ))
418
- # future schemas in database
419
- example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role4 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole4",
420
- privileges=[
421
- "MODIFY",
422
- "CREATE TABLE",
423
- ],
424
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
425
- on_schema=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaArgs(
426
- future_schemas_in_database=db_role.database,
427
- ))
428
- ##################################
429
- ### schema object privileges
430
- ##################################
431
- # list of privileges
432
- example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role5 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole5",
433
- privileges=[
434
- "SELECT",
435
- "REFERENCES",
436
- ],
437
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
438
- on_schema_object=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs(
439
- object_type="VIEW",
440
- object_name=db_role.database.apply(lambda database: f"\\"{database}\\".\\"my_schema\\".\\"my_view\\""),
441
- ))
442
- # all privileges + grant option
443
- example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role6 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole6",
444
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
445
- on_schema_object=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs(
446
- object_type="VIEW",
447
- object_name=db_role.database.apply(lambda database: f"\\"{database}\\".\\"my_schema\\".\\"my_view\\""),
448
- ),
449
- all_privileges=True,
450
- with_grant_option=True)
451
- # all in database
452
- example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role7 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole7",
453
- privileges=[
454
- "SELECT",
455
- "INSERT",
456
- ],
457
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
458
- on_schema_object=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs(
459
- all=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectAllArgs(
460
- object_type_plural="TABLES",
461
- in_database=db_role.database,
462
- ),
463
- ))
464
- # all in schema
465
- example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role8 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole8",
466
- privileges=[
467
- "SELECT",
468
- "INSERT",
469
- ],
470
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
471
- on_schema_object=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs(
472
- all=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectAllArgs(
473
- object_type_plural="TABLES",
474
- in_schema=db_role.database.apply(lambda database: f"\\"{database}\\".\\"my_schema\\""),
475
- ),
476
- ))
477
- # future in database
478
- example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role9 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole9",
479
- privileges=[
480
- "SELECT",
481
- "INSERT",
482
- ],
483
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
484
- on_schema_object=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs(
485
- future=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectFutureArgs(
486
- object_type_plural="TABLES",
487
- in_database=db_role.database,
488
- ),
489
- ))
490
- # future in schema
491
- example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role10 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole10",
492
- privileges=[
493
- "SELECT",
494
- "INSERT",
495
- ],
496
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
497
- on_schema_object=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs(
498
- future=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectFutureArgs(
499
- object_type_plural="TABLES",
500
- in_schema=db_role.database.apply(lambda database: f"\\"{database}\\".\\"my_schema\\""),
501
- ),
502
- ))
503
- ```
504
- <!--End PulumiCodeChooser -->
505
-
506
332
  ## Import
507
333
 
508
334
  ### Import examples
@@ -510,40 +336,35 @@ class GrantPrivilegesToDatabaseRole(pulumi.CustomResource):
510
336
  #### Grant all privileges OnDatabase
511
337
 
512
338
  ```sh
513
- $ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole \\"test_db_role\\"|false|false|ALL|OnDatabase|\\"test_db\\""`
339
+ $ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole example '"test_db"."test_db_role"|false|false|ALL|OnDatabase|"test_db"'`
514
340
  ```
515
341
 
516
342
  #### Grant list of privileges OnAllSchemasInDatabase
517
343
 
518
344
  ```sh
519
- $ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole \\"test_db_role\\"|false|false|CREATE TAG,CREATE TABLE|OnSchema|OnAllSchemasInDatabase|\\"test_db\\""`
345
+ $ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole example '"test_db"."test_db_role"|false|false|CREATE TAG,CREATE TABLE|OnSchema|OnAllSchemasInDatabase|"test_db"'`
520
346
  ```
521
347
 
522
348
  #### Grant list of privileges on table
523
349
 
524
350
  ```sh
525
- $ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole \\"test_table\\""`
351
+ $ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole example '"test_db"."test_db_role"|false|false|SELECT,DELETE,INSERT|OnSchemaObject|OnObject|TABLE|"test_db"."test_schema"."test_table"'`
526
352
  ```
527
353
 
528
354
  #### Grant list of privileges OnAll tables in schema
529
355
 
530
356
  ```sh
531
- $ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole \\"test_schema\\""`
357
+ $ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole example '"test_db"."test_db_role"|false|false|SELECT,DELETE,INSERT|OnSchemaObject|OnAll|TABLES|InSchema|"test_db"."test_schema"'`
532
358
  ```
533
359
 
534
360
  :param str resource_name: The name of the resource.
535
361
  :param pulumi.ResourceOptions opts: Options for the resource.
536
362
  :param pulumi.Input[bool] all_privileges: Grant all privileges on the database role.
537
- :param pulumi.Input[bool] always_apply: If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
538
- supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
539
- X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
540
- new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
541
- of the config being eventually convergent (producing an empty plan).
542
363
  :param pulumi.Input[str] always_apply_trigger: This is a helper field and should not be set. Its main purpose is to help to achieve the functionality described by the always_apply field.
543
- :param pulumi.Input[str] database_role_name: The fully qualified name of the database role to which privileges will be granted.
544
- :param pulumi.Input[str] on_database: The fully qualified name of the database on which privileges will be granted.
545
- :param pulumi.Input[pulumi.InputType['GrantPrivilegesToDatabaseRoleOnSchemaArgs']] on_schema: Specifies the schema on which privileges will be granted.
546
- :param pulumi.Input[pulumi.InputType['GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs']] on_schema_object: Specifies the schema object on which privileges will be granted.
364
+ :param pulumi.Input[str] database_role_name: The fully qualified name of the database role to which privileges will be granted. For more information about this resource, see docs.
365
+ :param pulumi.Input[str] on_database: The fully qualified name of the database on which privileges will be granted. For more information about this resource, see docs.
366
+ :param pulumi.Input[Union['GrantPrivilegesToDatabaseRoleOnSchemaArgs', 'GrantPrivilegesToDatabaseRoleOnSchemaArgsDict']] on_schema: Specifies the schema on which privileges will be granted.
367
+ :param pulumi.Input[Union['GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs', 'GrantPrivilegesToDatabaseRoleOnSchemaObjectArgsDict']] on_schema_object: Specifies the schema object on which privileges will be granted.
547
368
  :param pulumi.Input[Sequence[pulumi.Input[str]]] privileges: The privileges to grant on the database role.
548
369
  :param pulumi.Input[bool] with_grant_option: If specified, allows the recipient role to grant the privileges to other roles.
549
370
  """
@@ -554,161 +375,6 @@ class GrantPrivilegesToDatabaseRole(pulumi.CustomResource):
554
375
  args: GrantPrivilegesToDatabaseRoleArgs,
555
376
  opts: Optional[pulumi.ResourceOptions] = None):
556
377
  """
557
- > **Note** This is a preview resource. It's ready for general use. In case of any errors, please file an issue in our GitHub repository.
558
-
559
- !> **Warning** Be careful when using `always_apply` field. It will always produce a plan (even when no changes were made) and can be harmful in some setups. For more details why we decided to introduce it to go our document explaining those design decisions (coming soon).
560
-
561
- ## Example Usage
562
-
563
- <!--Start PulumiCodeChooser -->
564
- ```python
565
- import pulumi
566
- import pulumi_snowflake as snowflake
567
-
568
- db_role = snowflake.DatabaseRole("dbRole", database="database")
569
- ##################################
570
- ### on database privileges
571
- ##################################
572
- # list of privileges
573
- example_grant_privileges_to_database_role = snowflake.GrantPrivilegesToDatabaseRole("exampleGrantPrivilegesToDatabaseRole",
574
- privileges=[
575
- "CREATE",
576
- "MONITOR",
577
- ],
578
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
579
- on_database=db_role.database)
580
- # all privileges + grant option
581
- example_index_grant_privileges_to_database_role_grant_privileges_to_database_role = snowflake.GrantPrivilegesToDatabaseRole("exampleIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole",
582
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
583
- on_database=db_role.database,
584
- all_privileges=True,
585
- with_grant_option=True)
586
- # all privileges + grant option + always apply
587
- example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole",
588
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
589
- on_database=db_role.database,
590
- always_apply=True,
591
- all_privileges=True,
592
- with_grant_option=True)
593
- ##################################
594
- ### schema privileges
595
- ##################################
596
- # list of privileges
597
- example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role1 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole1",
598
- privileges=[
599
- "MODIFY",
600
- "CREATE TABLE",
601
- ],
602
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
603
- on_schema=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaArgs(
604
- schema_name=db_role.database.apply(lambda database: f"\\"{database}\\".\\"my_schema\\""),
605
- ))
606
- # all privileges + grant option
607
- example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role2 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole2",
608
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
609
- on_schema=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaArgs(
610
- schema_name=db_role.database.apply(lambda database: f"\\"{database}\\".\\"my_schema\\""),
611
- ),
612
- all_privileges=True,
613
- with_grant_option=True)
614
- # all schemas in database
615
- example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role3 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole3",
616
- privileges=[
617
- "MODIFY",
618
- "CREATE TABLE",
619
- ],
620
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
621
- on_schema=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaArgs(
622
- all_schemas_in_database=db_role.database,
623
- ))
624
- # future schemas in database
625
- example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role4 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole4",
626
- privileges=[
627
- "MODIFY",
628
- "CREATE TABLE",
629
- ],
630
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
631
- on_schema=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaArgs(
632
- future_schemas_in_database=db_role.database,
633
- ))
634
- ##################################
635
- ### schema object privileges
636
- ##################################
637
- # list of privileges
638
- example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role5 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole5",
639
- privileges=[
640
- "SELECT",
641
- "REFERENCES",
642
- ],
643
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
644
- on_schema_object=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs(
645
- object_type="VIEW",
646
- object_name=db_role.database.apply(lambda database: f"\\"{database}\\".\\"my_schema\\".\\"my_view\\""),
647
- ))
648
- # all privileges + grant option
649
- example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role6 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole6",
650
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
651
- on_schema_object=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs(
652
- object_type="VIEW",
653
- object_name=db_role.database.apply(lambda database: f"\\"{database}\\".\\"my_schema\\".\\"my_view\\""),
654
- ),
655
- all_privileges=True,
656
- with_grant_option=True)
657
- # all in database
658
- example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role7 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole7",
659
- privileges=[
660
- "SELECT",
661
- "INSERT",
662
- ],
663
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
664
- on_schema_object=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs(
665
- all=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectAllArgs(
666
- object_type_plural="TABLES",
667
- in_database=db_role.database,
668
- ),
669
- ))
670
- # all in schema
671
- example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role8 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole8",
672
- privileges=[
673
- "SELECT",
674
- "INSERT",
675
- ],
676
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
677
- on_schema_object=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs(
678
- all=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectAllArgs(
679
- object_type_plural="TABLES",
680
- in_schema=db_role.database.apply(lambda database: f"\\"{database}\\".\\"my_schema\\""),
681
- ),
682
- ))
683
- # future in database
684
- example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role9 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole9",
685
- privileges=[
686
- "SELECT",
687
- "INSERT",
688
- ],
689
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
690
- on_schema_object=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs(
691
- future=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectFutureArgs(
692
- object_type_plural="TABLES",
693
- in_database=db_role.database,
694
- ),
695
- ))
696
- # future in schema
697
- example_snowflake_index_grant_privileges_to_database_role_grant_privileges_to_database_role10 = snowflake.GrantPrivilegesToDatabaseRole("exampleSnowflakeIndex/grantPrivilegesToDatabaseRoleGrantPrivilegesToDatabaseRole10",
698
- privileges=[
699
- "SELECT",
700
- "INSERT",
701
- ],
702
- database_role_name=pulumi.Output.all(db_role.database, db_role.name).apply(lambda database, name: f"\\"{database}\\".\\"{name}\\""),
703
- on_schema_object=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs(
704
- future=snowflake.GrantPrivilegesToDatabaseRoleOnSchemaObjectFutureArgs(
705
- object_type_plural="TABLES",
706
- in_schema=db_role.database.apply(lambda database: f"\\"{database}\\".\\"my_schema\\""),
707
- ),
708
- ))
709
- ```
710
- <!--End PulumiCodeChooser -->
711
-
712
378
  ## Import
713
379
 
714
380
  ### Import examples
@@ -716,25 +382,25 @@ class GrantPrivilegesToDatabaseRole(pulumi.CustomResource):
716
382
  #### Grant all privileges OnDatabase
717
383
 
718
384
  ```sh
719
- $ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole \\"test_db_role\\"|false|false|ALL|OnDatabase|\\"test_db\\""`
385
+ $ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole example '"test_db"."test_db_role"|false|false|ALL|OnDatabase|"test_db"'`
720
386
  ```
721
387
 
722
388
  #### Grant list of privileges OnAllSchemasInDatabase
723
389
 
724
390
  ```sh
725
- $ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole \\"test_db_role\\"|false|false|CREATE TAG,CREATE TABLE|OnSchema|OnAllSchemasInDatabase|\\"test_db\\""`
391
+ $ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole example '"test_db"."test_db_role"|false|false|CREATE TAG,CREATE TABLE|OnSchema|OnAllSchemasInDatabase|"test_db"'`
726
392
  ```
727
393
 
728
394
  #### Grant list of privileges on table
729
395
 
730
396
  ```sh
731
- $ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole \\"test_table\\""`
397
+ $ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole example '"test_db"."test_db_role"|false|false|SELECT,DELETE,INSERT|OnSchemaObject|OnObject|TABLE|"test_db"."test_schema"."test_table"'`
732
398
  ```
733
399
 
734
400
  #### Grant list of privileges OnAll tables in schema
735
401
 
736
402
  ```sh
737
- $ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole \\"test_schema\\""`
403
+ $ pulumi import snowflake:index/grantPrivilegesToDatabaseRole:GrantPrivilegesToDatabaseRole example '"test_db"."test_db_role"|false|false|SELECT,DELETE,INSERT|OnSchemaObject|OnAll|TABLES|InSchema|"test_db"."test_schema"'`
738
404
  ```
739
405
 
740
406
  :param str resource_name: The name of the resource.
@@ -757,8 +423,8 @@ class GrantPrivilegesToDatabaseRole(pulumi.CustomResource):
757
423
  always_apply_trigger: Optional[pulumi.Input[str]] = None,
758
424
  database_role_name: Optional[pulumi.Input[str]] = None,
759
425
  on_database: Optional[pulumi.Input[str]] = None,
760
- on_schema: Optional[pulumi.Input[pulumi.InputType['GrantPrivilegesToDatabaseRoleOnSchemaArgs']]] = None,
761
- on_schema_object: Optional[pulumi.Input[pulumi.InputType['GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs']]] = None,
426
+ on_schema: Optional[pulumi.Input[Union['GrantPrivilegesToDatabaseRoleOnSchemaArgs', 'GrantPrivilegesToDatabaseRoleOnSchemaArgsDict']]] = None,
427
+ on_schema_object: Optional[pulumi.Input[Union['GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs', 'GrantPrivilegesToDatabaseRoleOnSchemaObjectArgsDict']]] = None,
762
428
  privileges: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
763
429
  with_grant_option: Optional[pulumi.Input[bool]] = None,
764
430
  __props__=None):
@@ -796,8 +462,8 @@ class GrantPrivilegesToDatabaseRole(pulumi.CustomResource):
796
462
  always_apply_trigger: Optional[pulumi.Input[str]] = None,
797
463
  database_role_name: Optional[pulumi.Input[str]] = None,
798
464
  on_database: Optional[pulumi.Input[str]] = None,
799
- on_schema: Optional[pulumi.Input[pulumi.InputType['GrantPrivilegesToDatabaseRoleOnSchemaArgs']]] = None,
800
- on_schema_object: Optional[pulumi.Input[pulumi.InputType['GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs']]] = None,
465
+ on_schema: Optional[pulumi.Input[Union['GrantPrivilegesToDatabaseRoleOnSchemaArgs', 'GrantPrivilegesToDatabaseRoleOnSchemaArgsDict']]] = None,
466
+ on_schema_object: Optional[pulumi.Input[Union['GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs', 'GrantPrivilegesToDatabaseRoleOnSchemaObjectArgsDict']]] = None,
801
467
  privileges: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
802
468
  with_grant_option: Optional[pulumi.Input[bool]] = None) -> 'GrantPrivilegesToDatabaseRole':
803
469
  """
@@ -808,16 +474,11 @@ class GrantPrivilegesToDatabaseRole(pulumi.CustomResource):
808
474
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
809
475
  :param pulumi.ResourceOptions opts: Options for the resource.
810
476
  :param pulumi.Input[bool] all_privileges: Grant all privileges on the database role.
811
- :param pulumi.Input[bool] always_apply: If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
812
- supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
813
- X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
814
- new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
815
- of the config being eventually convergent (producing an empty plan).
816
477
  :param pulumi.Input[str] always_apply_trigger: This is a helper field and should not be set. Its main purpose is to help to achieve the functionality described by the always_apply field.
817
- :param pulumi.Input[str] database_role_name: The fully qualified name of the database role to which privileges will be granted.
818
- :param pulumi.Input[str] on_database: The fully qualified name of the database on which privileges will be granted.
819
- :param pulumi.Input[pulumi.InputType['GrantPrivilegesToDatabaseRoleOnSchemaArgs']] on_schema: Specifies the schema on which privileges will be granted.
820
- :param pulumi.Input[pulumi.InputType['GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs']] on_schema_object: Specifies the schema object on which privileges will be granted.
478
+ :param pulumi.Input[str] database_role_name: The fully qualified name of the database role to which privileges will be granted. For more information about this resource, see docs.
479
+ :param pulumi.Input[str] on_database: The fully qualified name of the database on which privileges will be granted. For more information about this resource, see docs.
480
+ :param pulumi.Input[Union['GrantPrivilegesToDatabaseRoleOnSchemaArgs', 'GrantPrivilegesToDatabaseRoleOnSchemaArgsDict']] on_schema: Specifies the schema on which privileges will be granted.
481
+ :param pulumi.Input[Union['GrantPrivilegesToDatabaseRoleOnSchemaObjectArgs', 'GrantPrivilegesToDatabaseRoleOnSchemaObjectArgsDict']] on_schema_object: Specifies the schema object on which privileges will be granted.
821
482
  :param pulumi.Input[Sequence[pulumi.Input[str]]] privileges: The privileges to grant on the database role.
822
483
  :param pulumi.Input[bool] with_grant_option: If specified, allows the recipient role to grant the privileges to other roles.
823
484
  """
@@ -847,13 +508,6 @@ class GrantPrivilegesToDatabaseRole(pulumi.CustomResource):
847
508
  @property
848
509
  @pulumi.getter(name="alwaysApply")
849
510
  def always_apply(self) -> pulumi.Output[Optional[bool]]:
850
- """
851
- If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
852
- supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
853
- X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
854
- new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
855
- of the config being eventually convergent (producing an empty plan).
856
- """
857
511
  return pulumi.get(self, "always_apply")
858
512
 
859
513
  @property
@@ -868,7 +522,7 @@ class GrantPrivilegesToDatabaseRole(pulumi.CustomResource):
868
522
  @pulumi.getter(name="databaseRoleName")
869
523
  def database_role_name(self) -> pulumi.Output[str]:
870
524
  """
871
- The fully qualified name of the database role to which privileges will be granted.
525
+ The fully qualified name of the database role to which privileges will be granted. For more information about this resource, see docs.
872
526
  """
873
527
  return pulumi.get(self, "database_role_name")
874
528
 
@@ -876,7 +530,7 @@ class GrantPrivilegesToDatabaseRole(pulumi.CustomResource):
876
530
  @pulumi.getter(name="onDatabase")
877
531
  def on_database(self) -> pulumi.Output[Optional[str]]:
878
532
  """
879
- The fully qualified name of the database on which privileges will be granted.
533
+ The fully qualified name of the database on which privileges will be granted. For more information about this resource, see docs.
880
534
  """
881
535
  return pulumi.get(self, "on_database")
882
536