File tree Expand file tree Collapse file tree 6 files changed +16
-16
lines changed Expand file tree Collapse file tree 6 files changed +16
-16
lines changed Original file line number Diff line number Diff line change @@ -14,12 +14,12 @@ Granting `SELECT` and `MODIFY` to `sensitive` group on all tables a _things_ [da
1414``` hcl
1515data "databricks_tables" "things" {
1616 catalog_name = "sandbox"
17- schema_name = "things"
17+ schema_name = "things"
1818}
1919
2020resource "databricks_grants" "things" {
2121 for_each = data.databricks_tables.things.ids
22-
22+
2323 table = each.value
2424
2525 grant {
Original file line number Diff line number Diff line change @@ -14,12 +14,12 @@ Granting `SELECT` and `MODIFY` to `sensitive` group on all views in a _things_ [
1414``` hcl
1515data "databricks_views" "things" {
1616 catalog_name = "sandbox"
17- schema_name = "things"
17+ schema_name = "things"
1818}
1919
2020resource "databricks_grants" "things" {
2121 for_each = data.databricks_views.things.ids
22-
22+
2323 view = each.value
2424
2525 grant {
Original file line number Diff line number Diff line change @@ -217,10 +217,10 @@ resource "aws_s3_bucket_server_side_encryption_configuration" "root_storage_buck
217217
218218 rule {
219219 apply_server_side_encryption_by_default {
220- sse_algorithm = "AES256"
220+ sse_algorithm = "AES256"
221221 }
222222 }
223- }
223+ }
224224
225225resource "aws_s3_bucket_public_access_block" "root_storage_bucket" {
226226 bucket = aws_s3_bucket.root_storage_bucket.id
Original file line number Diff line number Diff line change @@ -140,7 +140,7 @@ resource "databricks_metastore" "this" {
140140 name = "primary"
141141 storage_root = format("abfss://%s@%s.dfs.core.windows.net/",
142142 azurerm_storage_container.unity_catalog.name,
143- azurerm_storage_account.unity_catalog.name)
143+ azurerm_storage_account.unity_catalog.name)
144144 force_destroy = true
145145}
146146
Original file line number Diff line number Diff line change @@ -95,12 +95,12 @@ You can also apply grants dynamically with [databricks_tables](../data-sources/t
9595``` hcl
9696data "databricks_tables" "things" {
9797 catalog_name = "sandbox"
98- schema_name = "things"
98+ schema_name = "things"
9999}
100100
101101resource "databricks_grants" "things" {
102102 for_each = data.databricks_tables.things.ids
103-
103+
104104 table = each.value
105105
106106 grant {
@@ -129,12 +129,12 @@ You can also apply grants dynamically with [databricks_views](../data-sources/vi
129129``` hcl
130130data "databricks_views" "customers" {
131131 catalog_name = "main"
132- schema_name = "customers"
132+ schema_name = "customers"
133133}
134134
135135resource "databricks_grants" "customers" {
136136 for_each = data.databricks_views.customers.ids
137-
137+
138138 view = each.value
139139
140140 grant {
Original file line number Diff line number Diff line change @@ -146,10 +146,10 @@ resource "aws_s3_bucket_server_side_encryption_configuration" "root_storage_buck
146146
147147 rule {
148148 apply_server_side_encryption_by_default {
149- sse_algorithm = "AES256"
149+ sse_algorithm = "AES256"
150150 }
151151 }
152- }
152+ }
153153
154154resource "aws_s3_bucket_public_access_block" "root_storage_bucket" {
155155 bucket = aws_s3_bucket.root_storage_bucket.id
@@ -165,9 +165,9 @@ data "databricks_aws_bucket_policy" "this" {
165165}
166166
167167resource "aws_s3_bucket_policy" "root_bucket_policy" {
168- bucket = aws_s3_bucket.root_storage_bucket.id
169- policy = data.databricks_aws_bucket_policy.this.json
170- depends_on = [aws_s3_bucket_public_access_block.root_storage_bucket]
168+ bucket = aws_s3_bucket.root_storage_bucket.id
169+ policy = data.databricks_aws_bucket_policy.this.json
170+ depends_on = [aws_s3_bucket_public_access_block.root_storage_bucket]
171171}
172172
173173resource "databricks_mws_storage_configurations" "this" {
You can’t perform that action at this time.
0 commit comments