-
Notifications
You must be signed in to change notification settings - Fork 419
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Doc] Added permissions for GCP file events #4415
[Doc] Added permissions for GCP file events #4415
Conversation
1e02973
to
cd6743d
Compare
@nkvuong I finally had time to e2e test this. I have changed the PR to modify the external location setup instead of the metastore setup. I'll follow up on that later if necessary. Please have another look |
@borremosch-db 2 more things please:
|
9c4e599
to
c8b687b
Compare
@nkvuong you're right, added changelog and the service agent role binding. Please have another look! |
If integration tests don't run automatically, an authorized user can run them manually by following the instructions below: Trigger: Inputs:
Checks will be approved automatically on success. |
## Release v1.71.0 ### New Features and Improvements * Mark GKE-related fields for `databricks_mws_workspaces` and `databricks_mws_networks` as deprecated([#4531](#4531)). * Add support for `CAN_VIEW` permission level in `databricks_permissions`, which can be assigned to `databricks_sql_endpoint` ([#4464](#4464)). * Add support for `aws-us-gov-dod` (AWS Govcloud DoD shard) ([#4594](5ac0111)) ### Bug Fixes * Recreate `databricks_access_control_rule_set` when the `name` changes ([#4572](#4572)). * Avoid timeouts during `databricks_mount` state refresh and creation ([#4590](#4590)). ### Documentation * Improve documentation for `databricks_access_control_rule_set` ([#4580](#4580)). * Correct `first_on_demand` documentation for `aws_attributes` in `databricks_cluster`. * Added file events permissions to GCP external location documentation. ([#4415](#4415)). * Improve description of `metric` field in `databricks_job` resource [#4595](#4595) ### Exporter * Add support for special selectors in `-listing` and `-services` [#4573](#4573) * Fix incorrect reference to model serving endpoint [#4588](#4588) * Allow the selective export of `databricks_mws_permission_assignment`, and change its service name to `idfed` instead of `access` ([#4571](#4571)) * Fix panic caused by incorrect values in the cluster policies ([#4585](#4585)) ### Internal Changes * Bump Go SDK version to 0.61.0 ([#4602](#4602))
Changes
Added permissions for GCP file events. As it stands, this is a docs only change, similar to the PR for Azure. I'm wondering if it's possible and/or desirable to wrap the created role into a custom terraform resource as is the case with AWS. Whatever we end up with, I'll need to e2e test this before merging.
Tests
make test
run locallydocs/
folderinternal/acceptance