You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_workspace_admins"></a> [workspace\_admins](#input\_workspace\_admins)| Provide users or service principals to grant them Admin permissions in Workspace. | <pre> object({ <br> user = list(string) <br> service_principal = list(string)<br> }) </pre> | <pre> { <br> user = null <br> service_principal = null <br> } </pre> | no |
66
67
| <aname="input_iam"></a> [iam](#input\_iam)| Used to create workspace group. Map of group name and its parameters, such as users and service principals added to the group. Also possible to configure group entitlements. | <pre> map(object({ <br> user = optional(list(string)) <br> service_principal = optional(list(string)) <br> entitlements = optional(list(string)) <br> }))</pre> | {} | no |
67
68
| <aname="input_iam_permissions"></a> [iam\_permissions](#input\_iam\_permissions)| Map of permission for groups. You can provide certain permission on services to groups. E.g., `'sql_endpoint'={'CAN_USE'=['group1', 'group2'] CAN_MANAGE=['group3']} | <pre> map(object({ <br> CAN_USE = list(string) <br> CAN_MANAGE = list(string)<br> })) </pre> | <pre> { <br> "sql_endpoint" = { <br> "CAN_USE" = ["default"] <br> "CAN_MANAGE" = [] <br> } <br> } </pre> | no |
68
-
| <aname="input_default_cluster_id"></a> [default\_cluster\_id](#input\_default\_cluster\_id)| Single value of default Cluster id created by 'databricks-runtime' module |`string`| "" | no |
69
+
| <aname="input_default_cluster_id"></a> [default\_cluster\_id](#input\_default\_cluster\_id)| Single value of default Cluster id created by 'databricks-runtime' module |`string`| "" | no |
69
70
| <aname="input_cluster_policies_object"></a> [cluster\_policies\_object](#input\_cluster\_policies\_object)|List of objects that provides an ability to grant custom workspace group a permission to use(CAN_USE) cluster policy | <pre>list(object({<br> id = string<br> name = string<br> can_use = list(string)<br>}))</pre> | <pre>[{<br> id = null<br> name = null<br> can_use = null<br>}))</pre> | no |
70
71
| <aname="input_sql_endpoint"></a> [sql\_endpoint](#input\_sql\_endpoint)| Map of SQL Endpoints to be deployed in Databricks Workspace | <pre> map(object({ <br> cluster_size = string <br> min_num_clusters = optional(number) <br> max_num_clusters = optional(number) <br> auto_stop_mins = optional(string) <br> enable_photon = optional(bool) <br> enable_serverless_compute = optional(bool) <br> })) </pre> | {} | no |
| <aname="input_create_metastore"></a> [create\_metastore](#input\_create\_metastore)| Boolean flag for Unity Catalog Metastore current in this environment. One Metastore per region |`bool`| false | no |
73
-
| <aname="input_access_connector_id"></a> [access\_connector\_id](#input\_access\_connector\_id)| Databricks Access Connector Id that lets you to connect managed identities to an Azure Databricks account. Provides an ability to access Unity Catalog with assigned identity |`string`| "" | no |
74
-
| <aname="input_storage_account_id"></a> [storage\_account\_id](#input\_storage\_account\_id)| Storage Account Id where Unity Catalog Metastore would be provisioned |`string`| "" | no |
75
-
| <aname="input_storage_account_name"></a> [storage\_account\_name](#input\_storage\_account\_name)| Storage Account Name where Unity Catalog Metastore would be provisioned |`string`| "" | no |
74
+
| <aname="input_access_connector_id"></a> [access\_connector\_id](#input\_access\_connector\_id)| Databricks Access Connector Id that lets you to connect managed identities to an Azure Databricks account. Provides an ability to access Unity Catalog with assigned identity |`string`| "" | no |
75
+
| <aname="input_storage_account_id"></a> [storage\_account\_id](#input\_storage\_account\_id)| Storage Account Id where Unity Catalog Metastore would be provisioned |`string`| "" | no |
76
+
| <aname="input_storage_account_name"></a> [storage\_account\_name](#input\_storage\_account\_name)| Storage Account Name where Unity Catalog Metastore would be provisioned |`string`| "" | no |
76
77
| <aname="input_catalog"></a> [catalog](#input\_catalog)| Map of SQL Endpoints to be deployed in Databricks Workspace | <pre> map(object({ <br> catalog_grants = optional(map(list(string))) <br> catalog_comment = optional(string) <br> catalog_properties = optional(map(string)) <br> schema_name = optional(list(string)) <br> schema_grants = optional(map(list(string))) <br> schema_comment = optional(string) <br> schema_properties = optional(map(string))<br>})) </pre> | {} | no |
77
-
| <aname="input_suffix"></a> [suffix](#input\_suffix)| Optional suffix that would be added to the end of resources names. |`string`| "" | no |
78
-
| <aname="input_external_metastore_id"></a> [external\_metastore\_id](#input\_external\_metastore\_id)| Unity Catalog Metastore Id that is located in separate environment. Provide this value to associate Databricks Workspace with target Metastore |`string`| "" | no |
79
-
| <aname="input_metastore_grants"></a> [metastore\_grants](#input\_metastore\_grants)| Permissions to give on metastore to group |`map(list(string))`| {} | no |
80
-
78
+
| <aname="input_suffix"></a> [suffix](#input\_suffix)| Optional suffix that would be added to the end of resources names. |`string`| "" | no |
79
+
| <aname="input_external_metastore_id"></a> [external\_metastore\_id](#input\_external\_metastore\_id)| Unity Catalog Metastore Id that is located in separate environment. Provide this value to associate Databricks Workspace with target Metastore |`string`| "" | no |
80
+
| <aname="input_metastore_grants"></a> [metastore\_grants](#input\_metastore\_grants)| Permissions to give on metastore to group |`map(list(string))`| {} | no|
81
+
| <aname="input_secret_scope_object"></a> [secret\_scope\_object](#input\_secret\_scope\_object)| List of objects, where 'scope_name' param is a Secret scope name and 'acl' are list of objects with 'principals' and one of allowed 'permission' ('READ', 'WRITE' or 'MANAGE') | <pre>list(object({<br> scope_name = string<br> acl = list(object({<br> principal = string<br> permission = string<br> }))<br>}))</pre> | <pre>[{<br> scope_name = null<br> acl = null<br>}]</pre> | no |
error_message="Metastore permission validation. The only possible values for permissions are: CREATE_CATALOG, CREATE_EXTERNAL_LOCATION, CREATE_SHARE, CREATE_RECIPIENT, CREATE_PROVIDER"
198
198
}
199
199
}
200
+
201
+
# Secret Scope ACLs variables
202
+
variable"secret_scope_object" {
203
+
type=list(object({
204
+
scope_name =string
205
+
acl =list(object({
206
+
principal =string
207
+
permission =string
208
+
}))
209
+
}))
210
+
description="List of objects, where 'scope_name' param is a Secret scope name and 'acl' are list of objects with 'principals' and one of allowed 'permission' ('READ', 'WRITE' or 'MANAGE')"
0 commit comments