You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_suffix"></a> [suffix](#input\_suffix)| Optional suffix that would be added to the end of resources names. |`string`| " " | no |
333
347
| <aname="input_external_metastore_id"></a> [external\_metastore\_id](#input\_external\_metastore\_id)| Unity Catalog Metastore Id that is located in separate environment. Provide this value to associate Databricks Workspace with target Metastore |`string`| " " | no |
334
348
| <aname="input_metastore_grants"></a> [metastore\_grants](#input\_metastore\_grants)| Permissions to give on metastore to group |`map(list(string))`| {} | no |
335
-
| <aname="input_secret_scope_object"></a> [secret\_scope\_object](#input\_secret\_scope\_object)| List of objects, where 'scope_name' param is a Secret scope name and 'acl' are list of objects with 'principals' and one of allowed 'permission' ('READ', 'WRITE' or 'MANAGE') | <pre>list(object({<br> scope_name = string<br> acl = list(object({<br> principal = string<br> permission = string<br> }))<br>}))</pre> | <pre>[{<br> scope_name = null<br> acl = null<br>}]</pre> | no |
336
349
| <aname="input_sp_client_id_secret_name"></a> [sp\_client\_id\_secret\_name](#input\_sp\_client\_id\_secret\_name)| The name of Azure Key Vault secret that contains ClientID of Service Principal to access in Azure Key Vault |`string`| n/a | yes |
337
350
| <aname="input_sp_key_secret_name"></a> [sp\_key\_secret\_name](#input\_sp\_key\_secret\_name)| The name of Azure Key Vault secret that contains client secret of Service Principal to access in Azure Key Vault |`string`| n/a | yes |
338
351
| <aname="input_secret_scope"></a> [secret\_scope](#input\_secret\_scope)| Provides an ability to create custom Secret Scope, store secrets in it and assigning ACL for access management | <pre>list(object({<br> scope_name = string<br> acl = optional(list(object({<br> principal = string<br> permission = string<br> })))<br> secrets = optional(list(object({<br> key = string<br> string_value = string<br> })))<br>}))<br></pre> | <pre>default = [{<br> scope_name = null<br> acl = null<br> secrets = null<br>}]<br></pre> | yes |
339
352
| <aname="input_key_vault_id"></a> [key\_vault\_id](#input\_key\_vault\_id)| ID of the Key Vault instance where the Secret resides |`string`| n/a | yes |
340
353
| <aname="input_tenant_id_secret_name"></a> [tenant\_id\_secret\_name](#input\_tenant\_id\_secret\_name)| The name of Azure Key Vault secret that contains tenant ID secret of Service Principal to access in Azure Key Vault |`string`| n/a | yes |
341
354
| <aname="input_mountpoints"></a> [mountpoints](#input\_mountpoints)| Mountpoints for databricks | <pre>map(object({<br> storage_account_name = string<br> container_name = string<br>}))<br></pre> |{}| no |
342
-
| <aname="input_custom_cluster_policies"></a> [custom\_cluster\_policies](#input\_custom\_cluster\_policies)| Provides an ability to create custom cluster policy, assign it to cluster and grant CAN_USE permissions on it to certain custom groups | <pre>list(object({<br> name = string<br> can_use = list(string)<br> definition = any<br> assigned = bool<br>}))<br></pre> |<pre>[{<br> name = null<br> can_use = null<br> definition = null<br> assigned = false<br>}]<br></pre>| no |
355
+
| <aname="input_custom_cluster_policies"></a> [custom\_cluster\_policies](#input\_custom\_cluster\_policies)| Provides an ability to create custom cluster policy, assign it to cluster and grant CAN_USE permissions on it to certain custom groups | <pre>list(object({<br> name = string<br> can_use = list(string)<br> definition = any<br>}))<br></pre> |<pre>[{<br> name = null<br> can_use = null<br> definition = null<br>}]<br></pre>| no |
| <aname="output_sql_endpoint_jdbc_url"></a> [sql\_endpoint\_jdbc\_url](#output\_sql\_endpoint\_jdbc\_url)| JDBC connection string of SQL Endpoint |
352
365
| <aname="output_sql_endpoint_data_source_id"></a> [sql\_endpoint\_data\_source\_id](#output\_sql\_endpoint\_data\_source\_id)| ID of the data source for this endpoint |
353
366
| <aname="output_metastore_id"></a> [metastore\_id](#output\_metastore\_id)| Unity Catalog Metastore Id |
367
+
| <aname="output_token"></a> [token](#output\_token)| Databricks Personal Authorization Token |
Copy file name to clipboardExpand all lines: variables.tf
-24Lines changed: 0 additions & 24 deletions
Original file line number
Diff line number
Diff line change
@@ -48,7 +48,6 @@ variable "iam" {
48
48
user =optional(list(string))
49
49
service_principal =optional(list(string))
50
50
entitlements =optional(list(string))
51
-
default_cluster_permission =optional(string)
52
51
}))
53
52
description="Used to create workspace group. Map of group name and its parameters, such as users and service principals added to the group. Also possible to configure group entitlements."
description="List of objects, where 'scope_name' param is a Secret scope name and 'acl' are list of objects with 'principals' and one of allowed 'permission' ('READ', 'WRITE' or 'MANAGE')"
163
-
default=[{
164
-
scope_name =null
165
-
acl =null
166
-
}]
167
-
}
168
-
169
152
variable"sp_client_id_secret_name" {
170
153
type=string
171
154
description="The name of Azure Key Vault secret that contains ClientID of Service Principal to access in Azure Key Vault"
0 commit comments