Skip to content

Commit 78fce28

Browse files
committed
Release version 0.3.7
1 parent 737000a commit 78fce28

File tree

4 files changed

+5
-5
lines changed

4 files changed

+5
-5
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ terraform {
6868
required_providers {
6969
databricks = {
7070
source = "databrickslabs/databricks"
71-
version = "0.3.6"
71+
version = "0.3.7"
7272
}
7373
}
7474
}

docs/guides/aws-workspace.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ terraform {
5454
required_providers {
5555
databricks = {
5656
source = "databrickslabs/databricks"
57-
version = "0.3.6"
57+
version = "0.3.7"
5858
}
5959
aws = {
6060
source = "hashicorp/aws"

docs/guides/workspace-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ terraform {
1111
required_providers {
1212
databricks = {
1313
source = "databrickslabs/databricks"
14-
version = "0.3.6"
14+
version = "0.3.7"
1515
}
1616
}
1717
}

docs/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ To work with Azure Databricks workspace, the provider must know its `azure_works
180180

181181
### Authenticating with Azure Service Principal
182182

183-
!> **Warning** Please note that the azure service principal authentication currently (since version 0.3.6) uses the AAD token for the authentication (SPN should have **Contributor** role on Databricks workspace). You can restore previous functionality (generating the PAT for service principal) by setting `azure_use_pat_for_spn` to `true` (you can regulate the lifetime of generated PAT with `pat_token_duration_seconds` setting). Azure Databricks does not yet support AAD tokens for [secret scopes](https://docs.microsoft.com/en-us/azure/databricks/dev-tools/api/latest/secrets#--create-secret-scope). Databricks Labs team will refactor it transparently once that support is available. The only impacted field is `pat_token_duration_seconds`, which will be deprecated and fully supported after AAD support.
183+
!> **Warning** Please note that the azure service principal authentication currently (since version 0.3.7) uses the AAD token for the authentication (SPN should have **Contributor** role on Databricks workspace). You can restore previous functionality (generating the PAT for service principal) by setting `azure_use_pat_for_spn` to `true` (you can regulate the lifetime of generated PAT with `pat_token_duration_seconds` setting). Azure Databricks does not yet support AAD tokens for [secret scopes](https://docs.microsoft.com/en-us/azure/databricks/dev-tools/api/latest/secrets#--create-secret-scope). Databricks Labs team will refactor it transparently once that support is available. The only impacted field is `pat_token_duration_seconds`, which will be deprecated and fully supported after AAD support.
184184

185185
```hcl
186186
provider "azurerm" {
@@ -326,7 +326,7 @@ terraform {
326326
required_providers {
327327
databricks = {
328328
source = "databrickslabs/databricks"
329-
version = "0.3.6"
329+
version = "0.3.7"
330330
}
331331
}
332332
}

0 commit comments

Comments
 (0)