Skip to content

Commit f6096a0

Browse files
author
dmytro_velychko3
committed
docs: changed readmi
1 parent 9859ab0 commit f6096a0

File tree

2 files changed

+43
-6
lines changed

2 files changed

+43
-6
lines changed

README.md

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -117,8 +117,7 @@ No modules.
117117
| [databricks_token.pat](https://registry.terraform.io/providers/databricks/databricks/latest/docs/resources/token) | resource |
118118
| [databricks_user.this](https://registry.terraform.io/providers/databricks/databricks/latest/docs/resources/user) | resource |
119119
| [azurerm_role_assignment.this](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/role_assignment) | resource |
120-
| [databricks_cluster_policy.this](https://registry.terraform.io/providers/databricks/databricks/latest/docs/resources/cluster_policy) | resource |
121-
| [databricks_cluster.this](https://registry.terraform.io/providers/databricks/databricks/latest/docs/resources/cluster) | resource |
120+
| [databricks_cluster.this](https://registry.terraform.io/providers/databricks/databricks/latest/docs/resources/cluster) | resource |
122121
| [databricks_mount.adls](https://registry.terraform.io/providers/databricks/databricks/latest/docs/resources/mount) | resource |
123122
| [databricks_secret_scope.main](https://registry.terraform.io/providers/databricks/databricks/latest/docs/resources/secret_scope) | resource |
124123
| [databricks_secret.main](https://registry.terraform.io/providers/databricks/databricks/latest/docs/resources/secret) | resource |
@@ -134,11 +133,9 @@ No modules.
134133
| <a name="input_sp_key_secret_name"></a> [sp\_key\_secret\_name](#input\_sp\_key\_secret\_name) | The name of Azure Key Vault secret that contains client secret of Service Principal to access in Azure Key Vault | `string` | n/a | yes |
135134
| <a name="input_tenant_id_secret_name"></a> [tenant\_id\_secret\_name](#input\_tenant\_id\_secret\_name) | The name of Azure Key Vault secret that contains tenant ID secret of Service Principal to access in Azure Key Vault | `string` | n/a | yes |
136135
| <a name="input_key_vault_id"></a> [key\_vault\_id](#input\_key\_vault\_id) | ID of the Key Vault instance where the Secret resides | `string` | n/a | yes |
137-
| <a name="input_sku"></a> [sku](#input\_sku) | The sku to use for the Databricks Workspace: [standard \ premium \ trial] | `string` | "standard" | no |
138136
| <a name="input_pat_token_lifetime_seconds"></a> [pat\_token\_lifetime\_seconds](#input\_pat\_token\_lifetime\_seconds) | The lifetime of the token, in seconds. If no lifetime is specified, the token remains valid indefinitely | `number` | 315569520 | no |
139137
| <a name="input_users"></a> [users](#input\_users) | List of users to access Databricks | `list(string)` | [] | no |
140138
| <a name="input_permissions"></a> [permissions](#input\_permissions) | Databricks Workspace permission maps | `list(map(string))` | <pre> [{ <br> object_id = null <br> role = null <br> }] </pre> | no |
141-
| <a name="input_custom_cluster_policies"></a> [custom\_cluster\_policies](#input\_custom\_cluster\_policies) | Provides an ability to create custom cluster policy, assign it to cluster and grant CAN_USE permissions on it to certain custom groups | <pre>list(object({<br> name = string<br> can_use = list(string)<br> definition = any<br> assigned = bool<br>}))</pre> | <pre>[{<br> name = null<br> can_use = null<br> definition = null<br> assigned = false<br>}]</pre> | no |
142139
| <a name="input_cluster_nodes_availability"></a> [cluster\_nodes\_availability](#input\_cluster\_nodes\_availability) | Availability type used for all subsequent nodes past the first_on_demand ones: [SPOT_AZURE \ SPOT_WITH_FALLBACK_AZURE \ ON_DEMAND_AZURE] | `string` | null | no |
143140
| <a name="input_first_on_demand"></a> [first\_on\_demand](#input\_first\_on\_demand) | The first first_on_demand nodes of the cluster will be placed on on-demand instances: [[ \:number ]] | `number` | 0 | no |
144141
| <a name="input_spot_bid_max_price"></a> [spot\_bid\_max\_price](#input\_spot\_bid\_max\_price) | The max price for Azure spot instances. Use -1 to specify lowest price | `number` | -1 | no |
@@ -163,8 +160,6 @@ No modules.
163160
| ------------------------------------------------------------------------------------------------------------- | --------------------------------------------------------- |
164161
| <a name="output_token"></a> [token](#output\_token) | Databricks Personal Authorization Token |
165162
| <a name="output_cluster_id"></a> [cluster\_id](#output\_cluster\_id) | Databricks Cluster Id |
166-
| <a name="output_cluster_policies_object"></a> [cluster\_policies\_object](#output\_cluster\_policies\_object) | Databricks Cluster Policies object map |
167-
| <a name="output_secret_scope_object"></a> [secret_scope\_object](#output\_secret_scope\_object) | Databricks-managed Secret Scope object map to create ACLs |
168163
<!-- END_TF_DOCS -->
169164

170165
## License

variables.tf

Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -141,3 +141,45 @@ variable "mountpoints" {
141141
description = "Mountpoints for databricks"
142142
default = {}
143143
}
144+
145+
# Secret Scope variables
146+
variable "secret_scope" {
147+
type = list(object({
148+
scope_name = string
149+
acl = optional(list(object({
150+
principal = string
151+
permission = string
152+
})))
153+
secrets = optional(list(object({
154+
key = string
155+
string_value = string
156+
})))
157+
}))
158+
description = <<-EOT
159+
Provides an ability to create custom Secret Scope, store secrets in it and assigning ACL for access management
160+
scope_name - name of Secret Scope to create;
161+
acl - list of objects, where 'principal' custom group name, this group is created in 'Premium' module; 'permission' is one of "READ", "WRITE", "MANAGE";
162+
secrets - list of objects, where object's 'key' param is created key name and 'string_value' is a value for it;
163+
EOT
164+
default = [{
165+
scope_name = null
166+
acl = null
167+
secrets = null
168+
}]
169+
}
170+
171+
# At the nearest future, Azure will allow acquiring AAD tokens by service principals,
172+
# thus providing an ability to create Azure backed Key Vault with Terraform
173+
# https://github.com/databricks/terraform-provider-databricks/pull/1965
174+
175+
#variable "key_vault_secret_scope" {
176+
# type = object({
177+
# key_vault_id = string
178+
# dns_name = string
179+
# })
180+
# description = "Object with Azure Key Vault parameters required for creation of Azure-backed Databricks Secret scope"
181+
# default = {
182+
# key_vault_id = null
183+
# dns_name = null
184+
# }
185+
#}

0 commit comments

Comments
 (0)