You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_env"></a> [env](#input\_env)| Environment name |`string`| n/a | yes |
47
-
| <aname="input_project"></a> [project](#input\_project)| Project name |`string`| n/a | yes |
48
-
| <aname="input_user_object_ids"></a> [user_object_ids](#input\_user\_object\_ids)| Map of AD usernames and corresponding object IDs |`map(string)`| {} | no |
49
-
| <aname="input_iam"></a> [iam](#input\_iam)| Map of groups and members of users and service principals to be created. You can add you own groups and members. E.g., `'group' = { user = ['user1','user2'] service_principal = ['sp1']}` and etc | <pre> map(object({ <br> user = list(string) <br> service_principal = list(string) <br> }))</pre> | <pre> { <br> "admins" = { <br> "user" = [] <br> "service_principal" = [] <br> } <br> "default" = { <br> "user" = [] <br> "service_principal" = [] <br> } <br> } </pre> | no |
50
-
| <aname="input_iam_permissions"></a> [iam\_permissions](#input\_iam\_permissions)| Map of permission for groups. You can provide certain permission on services to groups. E.g., 'sql_endpoint'={'CAN_USE'=['group1', 'group2'] CAN_MANAGE=['group3']} | <pre> map(object({ <br> CAN_USE = list(string) <br> CAN_MANAGE = list(string)<br> })) </pre> | <pre> { <br> "sql_endpoint" = { <br> "CAN_USE" = ["default"] <br> "CAN_MANAGE" = [] <br> } <br> "token" = { <br> "CAN_USE" = ["default"] <br> "CAN_MANAGE" = [] <br> } <br> } </pre> | no |
51
-
| <aname="input_ip_rules"></a> [ip\_rules](#input\_ip\_rules)| Map of IP addresses permitted for access to DB |`map(string)`| {} | no |
52
-
| <aname="input_sql_endpoint"></a> [sql\_endpoint](#input\_sql\_endpoint)| Map of SQL Endoints to be deployed in Databricks Workspace |`map(map(string))`| {} | no |
| <aname="input_env"></a> [env](#input\_env)| Environment name |`string`| n/a | yes |
46
+
| <aname="input_project"></a> [project](#input\_project)| Project name |`string`| n/a | yes |
47
+
| <aname="input_user_object_ids"></a> [user\_object\_ids](#input\_user\_object\_ids)| Map of AD usernames and corresponding object IDs |`map(string)`| {} | no |
48
+
| <aname="input_workspace_admins"></a> [workspace\_admins](#input\_workspace\_admins)| Provide users or service principals to grant them Admin permissions. | <pre> object({ <br> user = list(string) <br> service_principal = list(string)<br> }) </pre> |<pre> { <br> user = null <br> service_principal = null <br> } </pre> | no |
49
+
| <aname="input_iam"></a> [iam](#input\_iam)| Used to create workspace group. Map of group name and its parameters, such as users and service principals added to the group. Also possible to configure group entitlements. | <pre> map(object({ <br> user = optional(list(string)) <br> service_principal = optional(list(string)) <br> entitlements = optional(list(string)) <br> }))</pre> | {} | no |
50
+
| <aname="input_iam_permissions"></a> [iam\_permissions](#input\_iam\_permissions)| Map of permission for groups. You can provide certain permission on services to groups. E.g., `'sql_endpoint'={'CAN_USE'=['group1', 'group2'] CAN_MANAGE=['group3']} | <pre> map(object({ <br> CAN_USE = list(string) <br> CAN_MANAGE = list(string)<br> })) </pre> | <pre> { <br> "sql_endpoint" = { <br> "CAN_USE" = ["default"] <br> "CAN_MANAGE" = [] <br> } <br> "token" = { <br> "CAN_USE" = ["default"] <br> "CAN_MANAGE" = [] <br> } <br> } </pre> | no |
51
+
| <aname="input_ip_rules"></a> [ip\_rules](#input\_ip\_rules)| Map of IP addresses permitted for access to DB |`map(string)`| {} | no |
52
+
| <aname="input_sql_endpoint"></a> [sql\_endpoint](#input\_sql\_endpoint)| Map of SQL Endoints to be deployed in Databricks Workspace |`map(map(string))`| {} | no |
0 commit comments