Skip to content

Commit 87709cd

Browse files
authored
Release v0.5.3 (#1189)
1 parent c4c8c9b commit 87709cd

File tree

10 files changed

+24
-25
lines changed

10 files changed

+24
-25
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ terraform {
8282
required_providers {
8383
databricks = {
8484
source = "databrickslabs/databricks"
85-
version = "0.5.2"
85+
version = "0.5.3"
8686
}
8787
}
8888
}

catalog/resource_grants_test.go

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -168,22 +168,22 @@ func TestPermissionsList_Diff_ExternallyAddedPrincipal(t *testing.T) {
168168
diff := PermissionsList{ // config
169169
Assignments: []PrivilegeAssignment{
170170
{
171-
Principal: "a",
171+
Principal: "a",
172172
Privileges: []string{"a"},
173173
},
174174
{
175-
Principal: "c",
175+
Principal: "c",
176176
Privileges: []string{"a"},
177177
},
178178
},
179179
}.diff(PermissionsList{
180180
Assignments: []PrivilegeAssignment{ // platform
181181
{
182-
Principal: "a",
182+
Principal: "a",
183183
Privileges: []string{"a"},
184184
},
185185
{
186-
Principal: "b",
186+
Principal: "b",
187187
Privileges: []string{"a"},
188188
},
189189
},
@@ -200,14 +200,14 @@ func TestPermissionsList_Diff_ExternallyAddedPriv(t *testing.T) {
200200
diff := PermissionsList{ // config
201201
Assignments: []PrivilegeAssignment{
202202
{
203-
Principal: "a",
203+
Principal: "a",
204204
Privileges: []string{"a"},
205205
},
206206
},
207207
}.diff(PermissionsList{
208208
Assignments: []PrivilegeAssignment{ // platform
209209
{
210-
Principal: "a",
210+
Principal: "a",
211211
Privileges: []string{"a", "b"},
212212
},
213213
},
@@ -222,14 +222,14 @@ func TestPermissionsList_Diff_LocalRemoteDiff(t *testing.T) {
222222
diff := PermissionsList{ // config
223223
Assignments: []PrivilegeAssignment{
224224
{
225-
Principal: "a",
225+
Principal: "a",
226226
Privileges: []string{"a", "b"},
227227
},
228228
},
229229
}.diff(PermissionsList{
230230
Assignments: []PrivilegeAssignment{ // platform
231231
{
232-
Principal: "a",
232+
Principal: "a",
233233
Privileges: []string{"b", "c"},
234234
},
235235
},
@@ -239,4 +239,4 @@ func TestPermissionsList_Diff_LocalRemoteDiff(t *testing.T) {
239239
assert.Len(t, diff.Changes[0].Remove, 1)
240240
assert.Equal(t, "a", diff.Changes[0].Add[0])
241241
assert.Equal(t, "c", diff.Changes[0].Remove[0])
242-
}
242+
}

clusters/clusters_api.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -613,7 +613,7 @@ func wrapMissingClusterError(err error, id string) error {
613613
return err
614614
}
615615
// https://github.com/databrickslabs/terraform-provider-databricks/issues/1177
616-
// Aligned with Clusters Core team to keep behavior of these workarounds
616+
// Aligned with Clusters Core team to keep behavior of these workarounds
617617
// as is in the longer term, so that this keeps working.
618618
if apiErr.ErrorCode == "INVALID_STATE" {
619619
log.Printf("[WARN] assuming that cluster is removed on backend: %s", apiErr)

clusters/clusters_api_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1206,7 +1206,7 @@ func TestWrapMissingClusterError(t *testing.T) {
12061206
func TestExpiredClusterAssumedAsRemoved(t *testing.T) {
12071207
err := wrapMissingClusterError(common.APIError{
12081208
ErrorCode: "INVALID_STATE",
1209-
Message: "Cannot access cluster X that was terminated or unpinned more than Y days ago.",
1209+
Message: "Cannot access cluster X that was terminated or unpinned more than Y days ago.",
12101210
}, "X")
12111211
ae, _ := err.(common.APIError)
12121212
assert.Equal(t, 404, ae.StatusCode)

docs/guides/unity-catalog-azure.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ locals {
4141
databricks_workspace_name = regex(local.resource_regex, var.databricks_resource_id)[2]
4242
tenant_id = data.azurerm_client_config.current.tenant_id
4343
databricks_workspace_host = data.azurerm_databricks_workspace.this.workspace_url
44-
databricks_workspace_id = data.azurerm_databricks_workspace.this.workspace_id
44+
databricks_workspace_id = data.azurerm_databricks_workspace.this.workspace_id
4545
prefix = replace(replace(lower(data.azurerm_resource_group.this.name), "rg", ""), "-", "")
4646
}
4747
@@ -70,8 +70,7 @@ terraform {
7070
version = "~>2.19.0"
7171
}
7272
databricks = {
73-
source = "databrickslabs/databricks"
74-
version = "~>0.5.2"
73+
source = "databrickslabs/databricks"
7574
}
7675
}
7776
}
@@ -138,7 +137,7 @@ A [databricks_metastore](../resources/metastore.md) is the top level container f
138137

139138
```hcl
140139
resource "databricks_metastore" "this" {
141-
name = "primary"
140+
name = "primary"
142141
storage_root = format("abfss://%s@%s.dfs.core.windows.net/",
143142
azurerm_storage_account.unity_catalog.name,
144143
azurerm_storage_container.unity_catalog.name)
@@ -180,7 +179,7 @@ resource "databricks_catalog" "sandbox" {
180179
}
181180
182181
resource "databricks_grants" "sandbox" {
183-
catalog = databricks_catalog.sandbox.name
182+
catalog = databricks_catalog.sandbox.name
184183
grant {
185184
principal = "Data Scientists"
186185
privileges = ["USAGE", "CREATE"]
@@ -201,7 +200,7 @@ resource "databricks_schema" "things" {
201200
}
202201
203202
resource "databricks_grants" "things" {
204-
schema = databricks_schema.things.id
203+
schema = databricks_schema.things.id
205204
grant {
206205
principal = "Data Engineers"
207206
privileges = ["USAGE"]
@@ -267,7 +266,7 @@ resource "databricks_storage_credential" "external" {
267266
comment = "Managed by TF"
268267
depends_on = [
269268
databricks_metastore_assignment.this
270-
]
269+
]
271270
}
272271
273272
resource "databricks_grants" "external_creds" {
@@ -326,7 +325,7 @@ resource "databricks_cluster" "unity_sql" {
326325
# need to wait until the metastore is assigned
327326
depends_on = [
328327
databricks_metastore_assignment.this
329-
]
328+
]
330329
}
331330
```
332331

@@ -365,7 +364,7 @@ resource "databricks_cluster" "dev" {
365364
# need to wait until the metastore is assigned
366365
depends_on = [
367366
databricks_metastore_assignment.this
368-
]
367+
]
369368
}
370369
371370
resource "databricks_permissions" "dev_restart" {
File renamed without changes.

docs/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -338,7 +338,7 @@ terraform {
338338
required_providers {
339339
databricks = {
340340
source = "databrickslabs/databricks"
341-
version = "0.5.2"
341+
version = "0.5.3"
342342
}
343343
}
344344
}

docs/resources/external_location.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ resource "databricks_storage_credential" "external" {
5151
comment = "Managed by TF"
5252
depends_on = [
5353
databricks_metastore_assignment.this
54-
]
54+
]
5555
}
5656
5757
resource "databricks_external_location" "some" {

docs/resources/metastore.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ For Azure
3131

3232
```hcl
3333
resource "databricks_metastore" "this" {
34-
name = "primary"
34+
name = "primary"
3535
storage_root = format("abfss://%s@%s.dfs.core.windows.net/",
3636
azurerm_storage_account.unity_catalog.name,
3737
azurerm_storage_container.unity_catalog.name)

docs/resources/metastore_data_access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ For Azure
3333

3434
```hcl
3535
resource "databricks_metastore" "this" {
36-
name = "primary"
36+
name = "primary"
3737
storage_root = format("abfss://%s@%s.dfs.core.windows.net/",
3838
azurerm_storage_account.unity_catalog.name,
3939
azurerm_storage_container.unity_catalog.name)

0 commit comments

Comments
 (0)