1
1
resource "databricks_secret_acl" "secret_acl_service_principal_terraform_plan" {
2
2
count = var. service_principal_name_terraform_plan == " " ? 0 : 1
3
3
4
- principal = var. databricks_service_principal_terraform_plan_application_id
4
+ principal = var. databricks_service_principal_terraform_plan_details . application_id
5
5
permission = " READ"
6
6
scope = databricks_secret_scope. secret_scope . id
7
7
}
@@ -10,7 +10,7 @@ resource "databricks_grant" "grant_catalog_internal_service_principal_terraform_
10
10
count = var. service_principal_name_terraform_plan == " " ? 0 : 1
11
11
12
12
catalog = databricks_catalog. catalog_internal . id
13
- principal = var. databricks_service_principal_terraform_plan_application_id
13
+ principal = var. databricks_service_principal_terraform_plan_details . application_id
14
14
privileges = [
15
15
# General
16
16
# "ALL_PRIVILIGES", # Use specific permissions instead of allowing all permissions by default
@@ -49,7 +49,7 @@ resource "databricks_grant" "grant_catalog_external_service_principal_terraform_
49
49
count = var. service_principal_name_terraform_plan == " " ? 0 : 1
50
50
51
51
catalog = databricks_catalog. catalog_external . id
52
- principal = var. databricks_service_principal_terraform_plan_application_id
52
+ principal = var. databricks_service_principal_terraform_plan_details . application_id
53
53
privileges = [
54
54
# General
55
55
# "ALL_PRIVILIGES", # Use specific permissions instead of allowing all permissions by default
@@ -88,7 +88,7 @@ resource "databricks_grant" "grant_external_location_external_service_principal_
88
88
for_each = var. service_principal_name_terraform_plan == " " ? {} : var. data_provider_details
89
89
90
90
external_location = databricks_external_location. external_location_external [each . key ]. id
91
- principal = var. databricks_service_principal_terraform_plan_application_id
91
+ principal = var. databricks_service_principal_terraform_plan_details . application_id
92
92
privileges = [
93
93
# General
94
94
# "ALL_PRIVILIGES", # Use specific permissions instead of allowing all permissions by default
@@ -115,7 +115,7 @@ resource "databricks_grant" "grant_external_location_raw_service_principal_terra
115
115
count = var. service_principal_name_terraform_plan == " " ? 0 : 1
116
116
117
117
external_location = databricks_external_location. external_location_raw . id
118
- principal = var. databricks_service_principal_terraform_plan_application_id
118
+ principal = var. databricks_service_principal_terraform_plan_details . application_id
119
119
privileges = [
120
120
# General
121
121
# "ALL_PRIVILIGES", # Use specific permissions instead of allowing all permissions by default
@@ -142,7 +142,7 @@ resource "databricks_grant" "grant_external_location_enriched_service_principal_
142
142
count = var. service_principal_name_terraform_plan == " " ? 0 : 1
143
143
144
144
external_location = databricks_external_location. external_location_enriched . id
145
- principal = var. databricks_service_principal_terraform_plan_application_id
145
+ principal = var. databricks_service_principal_terraform_plan_details . application_id
146
146
privileges = [
147
147
# General
148
148
# "ALL_PRIVILIGES", # Use specific permissions instead of allowing all permissions by default
@@ -169,7 +169,7 @@ resource "databricks_grant" "grant_external_location_curated_service_principal_t
169
169
count = var. service_principal_name_terraform_plan == " " ? 0 : 1
170
170
171
171
external_location = databricks_external_location. external_location_curated . id
172
- principal = var. databricks_service_principal_terraform_plan_application_id
172
+ principal = var. databricks_service_principal_terraform_plan_details . application_id
173
173
privileges = [
174
174
# General
175
175
# "ALL_PRIVILIGES", # Use specific permissions instead of allowing all permissions by default
@@ -196,7 +196,7 @@ resource "databricks_grant" "grant_external_location_workspace_service_principal
196
196
count = var. service_principal_name_terraform_plan == " " ? 0 : 1
197
197
198
198
external_location = databricks_external_location. external_location_workspace . id
199
- principal = var. databricks_service_principal_terraform_plan_application_id
199
+ principal = var. databricks_service_principal_terraform_plan_details . application_id
200
200
privileges = [
201
201
# General
202
202
# "ALL_PRIVILIGES", # Use specific permissions instead of allowing all permissions by default
@@ -223,7 +223,7 @@ resource "databricks_grant" "grant_storage_credential_service_principal_terrafor
223
223
count = var. service_principal_name_terraform_plan == " " ? 0 : 1
224
224
225
225
storage_credential = databricks_storage_credential. storage_credential . id
226
- principal = var. databricks_service_principal_terraform_plan_application_id
226
+ principal = var. databricks_service_principal_terraform_plan_details . application_id
227
227
privileges = [
228
228
# General
229
229
# "ALL_PRIVILIGES", # Use specific permissions instead of allowing all permissions by default
@@ -245,7 +245,7 @@ resource "databricks_grant" "grant_credential_service_principal_terraform_plan"
245
245
count = var. service_principal_name_terraform_plan == " " ? 0 : 1
246
246
247
247
credential = databricks_credential. credential . id
248
- principal = var. databricks_service_principal_terraform_plan_application_id
248
+ principal = var. databricks_service_principal_terraform_plan_details . application_id
249
249
privileges = [
250
250
# General
251
251
# "ALL_PRIVILIGES", # Use specific permissions instead of allowing all permissions by default
0 commit comments