Skip to content

Commit 0027f1b

Browse files
author
dmytro_velychko3
committed
feat: delete resource databricks_secret
1 parent b7c3c18 commit 0027f1b

File tree

5 files changed

+8
-322
lines changed

5 files changed

+8
-322
lines changed

iam.tf

Lines changed: 0 additions & 84 deletions
This file was deleted.

main.tf

Lines changed: 7 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,3 @@
1-
/* Premium
2-
locals {
3-
ip_rules = var.ip_rules == null ? null : values(var.ip_rules)
4-
}
5-
*/
6-
71
data "azurerm_key_vault_secret" "sp_client_id" {
82
name = var.sp_client_id_secret_name
93
key_vault_id = var.key_vault_id
@@ -19,19 +13,18 @@ data "azurerm_key_vault_secret" "tenant_id" {
1913
key_vault_id = var.key_vault_id
2014
}
2115

22-
resource "databricks_token" "pat" { #
16+
resource "databricks_token" "pat" {
2317
comment = "Terraform Provisioning"
2418
lifetime_seconds = var.pat_token_lifetime_seconds
2519
}
2620

27-
#resource "databricks_user" "this" { # Only for 'Standard' SKU type
28-
# #for_each = var.sku == "premium" ? [] : toset(var.users)
29-
# for_each = toset(var.users)
30-
# user_name = each.value
31-
# lifecycle { ignore_changes = [external_id] }
32-
#}
21+
resource "databricks_user" "this" {
22+
for_each = toset(var.users)
23+
user_name = each.value
24+
lifecycle { ignore_changes = [external_id] }
25+
}
3326

34-
resource "azurerm_role_assignment" "this" { ###
27+
resource "azurerm_role_assignment" "this" {
3528
for_each = {
3629
for permission in var.permissions : "${permission.object_id}-${permission.role}" => permission
3730
if permission.role != null
@@ -41,17 +34,6 @@ resource "azurerm_role_assignment" "this" { ###
4134
principal_id = each.value.object_id
4235
}
4336

44-
resource "databricks_cluster_policy" "this" {
45-
#for_each = var.sku == "premium" ? {
46-
for_each = {
47-
for param in var.custom_cluster_policies : (param.name) => param.definition
48-
if param.definition != null
49-
} # : {}
50-
51-
name = each.key
52-
definition = jsonencode(each.value)
53-
}
54-
5537
resource "databricks_cluster" "this" {
5638
cluster_name = var.custom_default_cluster_name == null ? "shared autoscaling" : var.custom_default_cluster_name
5739
spark_version = var.spark_version
@@ -92,22 +74,3 @@ resource "databricks_cluster" "this" {
9274
}
9375
}
9476
}
95-
/* Premium
96-
resource "databricks_workspace_conf" "this" {
97-
count = local.ip_rules == null ? 0 : 1
98-
99-
custom_config = {
100-
"enableIpAccessLists" : true
101-
}
102-
}
103-
104-
resource "databricks_ip_access_list" "this" {
105-
count = local.ip_rules == null ? 0 : 1
106-
107-
label = "allow_in"
108-
list_type = "ALLOW"
109-
ip_addresses = local.ip_rules
110-
111-
depends_on = [databricks_workspace_conf.this]
112-
}
113-
*/

outputs.tf

Lines changed: 0 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -7,21 +7,3 @@ output "cluster_id" {
77
value = databricks_cluster.this.id
88
description = "Databricks Cluster Id"
99
}
10-
11-
output "cluster_policies_object" {
12-
value = [for policy in var.custom_cluster_policies : {
13-
id = databricks_cluster_policy.this[policy.name].id
14-
name = databricks_cluster_policy.this[policy.name].name
15-
can_use = policy.can_use
16-
} if policy.definition != null && var.sku == "premium"]
17-
description = "Databricks Cluster Policies object map"
18-
}
19-
/*
20-
output "secret_scope_object" {
21-
value = [for param in var.secret_scope : {
22-
scope_name = databricks_secret_scope.this[param.scope_name].name
23-
acl = param.acl
24-
} if param.acl != null]
25-
description = "Databricks-managed Secret Scope object map to create ACLs"
26-
}
27-
*/

secrets.tf

Lines changed: 1 addition & 56 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,14 @@
1-
21
locals {
32
sp_secrets = {
43
(var.sp_client_id_secret_name) = { value = data.azurerm_key_vault_secret.sp_client_id.value }
54
(var.sp_key_secret_name) = { value = data.azurerm_key_vault_secret.sp_key.value }
65
}
7-
8-
secrets_objects_list = flatten([for param in var.secret_scope : [
9-
for secret in param.secrets : {
10-
scope_name = param.scope_name, key = secret.key, string_value = secret.string_value
11-
}] if param.secrets != null
12-
])
136
}
147

158
# Secret Scope with SP secrets for mounting Azure Data Lake Storage
169
resource "databricks_secret_scope" "main" {
1710
name = "main"
18-
initial_manage_principal = "users" #var.sku == "premium" ? null : "users"
11+
initial_manage_principal = "users"
1912
}
2013

2114
resource "databricks_secret" "main" {
@@ -25,51 +18,3 @@ resource "databricks_secret" "main" {
2518
string_value = each.value["value"]
2619
scope = databricks_secret_scope.main.id
2720
}
28-
29-
# Custom additional Databricks Secret Scope
30-
resource "databricks_secret_scope" "this" {
31-
for_each = {
32-
for param in var.secret_scope : (param.scope_name) => param
33-
if param.scope_name != null
34-
}
35-
36-
name = each.key
37-
initial_manage_principal = "users"
38-
}
39-
40-
resource "databricks_secret" "this" {
41-
for_each = { for entry in local.secrets_objects_list : "${entry.scope_name}.${entry.key}" => entry }
42-
43-
key = each.value.key
44-
string_value = each.value.string_value
45-
scope = databricks_secret_scope.this[each.value.scope_name].id
46-
}
47-
48-
# At the nearest future, Azure will allow acquiring AAD tokens by service principals,
49-
# thus providing an ability to create Azure backed Key Vault with Terraform
50-
# https://github.com/databricks/terraform-provider-databricks/pull/1965
51-
52-
## Azure Key Vault-backed Scope
53-
#resource "azurerm_key_vault_access_policy" "databricks" {
54-
# count = var.key_vault_secret_scope.key_vault_id != null ? 1 : 0
55-
56-
# key_vault_id = var.key_vault_secret_scope.key_vault_id
57-
# object_id = "9b38785a-6e08-4087-a0c4-20634343f21f" # Global 'AzureDatabricks' SP object id
58-
# tenant_id = data.azurerm_key_vault_secret.tenant_id.value
59-
#
60-
# secret_permissions = [
61-
# "Get",
62-
# "List",
63-
# ]
64-
#}
65-
#
66-
#resource "databricks_secret_scope" "external" {
67-
# count = var.key_vault_secret_scope.key_vault_id != null ? 1 : 0
68-
#
69-
# name = "external"
70-
# keyvault_metadata {
71-
# resource_id = var.key_vault_secret_scope.key_vault_id
72-
# dns_name = var.key_vault_secret_scope.dns_name
73-
# }
74-
# depends_on = [azurerm_key_vault_access_policy.databricks]
75-
#}

0 commit comments

Comments
 (0)