Permissions
laktory.models.resources.databricks.Permissions
¤
Bases: PermissionsBase
Databricks Permissions
This resource is typically auto-generated by Laktory when you set
access_controls on resources like Cluster, Job, Notebook, etc.
It can also be configured manually when fine-grained control is needed.
Examples:
import io
from laktory import models
perms_yaml = '''
cluster_id: ${resources.cluster-default.id}
access_controls:
- group_name: role-engineers
permission_level: CAN_RESTART
- group_name: account users
permission_level: CAN_ATTACH_TO
'''
perms = models.resources.databricks.Permissions.model_validate_yaml(
io.StringIO(perms_yaml)
)
References
| BASE | DESCRIPTION |
|---|---|
access_control
|
Access controls list
TYPE:
|
alert_v2_id
|
TYPE:
|
app_name
|
TYPE:
|
authorization
|
TYPE:
|
cluster_id
|
TYPE:
|
cluster_policy_id
|
TYPE:
|
dashboard_id
|
TYPE:
|
database_instance_name
|
TYPE:
|
database_project_name
|
TYPE:
|
directory_id
|
TYPE:
|
directory_path
|
TYPE:
|
experiment_id
|
TYPE:
|
instance_pool_id
|
TYPE:
|
job_id
|
TYPE:
|
notebook_id
|
TYPE:
|
notebook_path
|
TYPE:
|
object_type
|
TYPE:
|
pipeline_id
|
TYPE:
|
registered_model_id
|
TYPE:
|
repo_id
|
TYPE:
|
repo_path
|
TYPE:
|
serving_endpoint_id
|
TYPE:
|
sql_alert_id
|
TYPE:
|
sql_dashboard_id
|
TYPE:
|
sql_endpoint_id
|
TYPE:
|
sql_query_id
|
TYPE:
|
vector_search_endpoint_id
|
TYPE:
|
workspace_file_id
|
TYPE:
|
workspace_file_path
|
TYPE:
|
laktory.models.resources.databricks.permissions.PermissionsAccessControl
¤
Bases: BaseModel
| PARAMETER | DESCRIPTION |
|---|---|
group_name
|
TYPE:
|
permission_level
|
TYPE:
|
service_principal_name
|
TYPE:
|
user_name
|
TYPE:
|