You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
acl = [{ principal = "DEVELOPERS", permission = "READ" }] # Only custom workspace group names are allowed. If left empty then only Workspace admins could access these keys
| <aname="input_suffix"></a> [suffix](#input\_suffix)| Optional suffix that would be added to the end of resources names. |`string`| " " | no |
333
328
| <aname="input_external_metastore_id"></a> [external\_metastore\_id](#input\_external\_metastore\_id)| Unity Catalog Metastore Id that is located in separate environment. Provide this value to associate Databricks Workspace with target Metastore |`string`| " " | no |
334
329
| <aname="input_metastore_grants"></a> [metastore\_grants](#input\_metastore\_grants)| Permissions to give on metastore to group |`map(list(string))`| {} | no |
335
-
| <aname="input_secret_scope_object"></a> [secret\_scope\_object](#input\_secret\_scope\_object)| List of objects, where 'scope_name' param is a Secret scope name and 'acl' are list of objects with 'principals' and one of allowed 'permission' ('READ', 'WRITE' or 'MANAGE') | <pre>list(object({<br> scope_name = string<br> acl = list(object({<br> principal = string<br> permission = string<br> }))<br>}))</pre> | <pre>[{<br> scope_name = null<br> acl = null<br>}]</pre> | no |
336
330
| <aname="input_sp_client_id_secret_name"></a> [sp\_client\_id\_secret\_name](#input\_sp\_client\_id\_secret\_name)| The name of Azure Key Vault secret that contains ClientID of Service Principal to access in Azure Key Vault |`string`| n/a | yes |
337
331
| <aname="input_sp_key_secret_name"></a> [sp\_key\_secret\_name](#input\_sp\_key\_secret\_name)| The name of Azure Key Vault secret that contains client secret of Service Principal to access in Azure Key Vault |`string`| n/a | yes |
338
332
| <aname="input_secret_scope"></a> [secret\_scope](#input\_secret\_scope)| Provides an ability to create custom Secret Scope, store secrets in it and assigning ACL for access management | <pre>list(object({<br> scope_name = string<br> acl = optional(list(object({<br> principal = string<br> permission = string<br> })))<br> secrets = optional(list(object({<br> key = string<br> string_value = string<br> })))<br>}))<br></pre> | <pre>default = [{<br> scope_name = null<br> acl = null<br> secrets = null<br>}]<br></pre> | yes |
339
333
| <aname="input_key_vault_id"></a> [key\_vault\_id](#input\_key\_vault\_id)| ID of the Key Vault instance where the Secret resides |`string`| n/a | yes |
340
334
| <aname="input_tenant_id_secret_name"></a> [tenant\_id\_secret\_name](#input\_tenant\_id\_secret\_name)| The name of Azure Key Vault secret that contains tenant ID secret of Service Principal to access in Azure Key Vault |`string`| n/a | yes |
341
335
| <aname="input_mountpoints"></a> [mountpoints](#input\_mountpoints)| Mountpoints for databricks | <pre>map(object({<br> storage_account_name = string<br> container_name = string<br>}))<br></pre> |{}| no |
342
-
| <aname="input_custom_cluster_policies"></a> [custom\_cluster\_policies](#input\_custom\_cluster\_policies)| Provides an ability to create custom cluster policy, assign it to cluster and grant CAN_USE permissions on it to certain custom groups | <pre>list(object({<br> name = string<br> can_use = list(string)<br> definition = any<br> assigned = bool<br>}))<br></pre> |<pre>[{<br> name = null<br> can_use = null<br> definition = null<br> assigned = false<br>}]<br></pre>| no |
336
+
| <aname="input_custom_cluster_policies"></a> [custom\_cluster\_policies](#input\_custom\_cluster\_policies)| Provides an ability to create custom cluster policy, assign it to cluster and grant CAN_USE permissions on it to certain custom groups | <pre>list(object({<br> name = string<br> can_use = list(string)<br> definition = any<br>}))<br></pre> |<pre>[{<br> name = null<br> can_use = null<br> definition = null<br>}]<br></pre>| no |
| <aname="input_pat_token_lifetime_seconds"></a> [pat\_token\_lifetime\_seconds](#input\_pat\_token\_lifetime\_seconds)| The lifetime of the token, in seconds. If no lifetime is specified, the token remains valid indefinitely |`number`| 315569520 | no |
344
339
345
340
346
341
@@ -351,6 +346,7 @@ No modules.
351
346
| <aname="output_sql_endpoint_jdbc_url"></a> [sql\_endpoint\_jdbc\_url](#output\_sql\_endpoint\_jdbc\_url)| JDBC connection string of SQL Endpoint |
352
347
| <aname="output_sql_endpoint_data_source_id"></a> [sql\_endpoint\_data\_source\_id](#output\_sql\_endpoint\_data\_source\_id)| ID of the data source for this endpoint |
353
348
| <aname="output_metastore_id"></a> [metastore\_id](#output\_metastore\_id)| Unity Catalog Metastore Id |
349
+
| <aname="output_token"></a> [token](#output\_token)| Databricks Personal Authorization Token |
0 commit comments