SecretScope
laktory.models.resources.databricks.SecretScope
¤
Bases: SecretScopeBase
Databricks secret scope
Examples:
import io
from laktory import models
scope_yaml = '''
name: azure
secrets:
- key: keyvault-url
string_value: https://my-secrets.vault.azure.net/
- key: client-id
string_value: f461daa2-c281-4166-bc3e-538b90223184
permissions:
- permission: READ
principal: role-metastore-admins
- permission: READ
principal: role-workspace-admins
'''
scope = models.resources.databricks.SecretScope.model_validate_yaml(
io.StringIO(scope_yaml)
)
References
| BASE | DESCRIPTION |
|---|---|
backend_type
|
Either
TYPE:
|
initial_manage_principal
|
The principal with the only possible value
TYPE:
|
keyvault_metadata
|
TYPE:
|
name
|
Scope name requested by the user. Must be unique within a workspace. Must consist of alphanumeric characters, dashes, underscores, and periods, and may not exceed 128 characters
TYPE:
|
| LAKTORY | DESCRIPTION |
|---|---|
permissions
|
Permissions given to the secret scope
TYPE:
|
secrets
|
List of secret to add to the scope
TYPE:
|
| ATTRIBUTE | DESCRIPTION |
|---|---|
additional_core_resources |
TYPE:
|
additional_core_resources
property
¤
- secret values
- secret scope permissions (ACL)
laktory.models.resources.databricks.secretscope.SecretScopeKeyvaultMetadata
¤
Bases: BaseModel
| PARAMETER | DESCRIPTION |
|---|---|
dns_name
|
TYPE:
|
resource_id
|
TYPE:
|
laktory.models.resources.databricks.secretscope.SecretScopePermission
¤
Bases: BaseModel
| PARAMETER | DESCRIPTION |
|---|---|
permission
|
Name of the permission to assign
TYPE:
|
principal
|
Name of the service principal to assign the permission to
TYPE:
|