Skip to content

Conversation

@alexott
Copy link
Contributor

@alexott alexott commented Nov 4, 2025

Changes

This resource provides fine-grained control over permissions by managing a single principal's access to a single object, unlike databricks_permissions, which manages all principals' access to an object at once. This is particularly useful for:

  • Managing permissions for different teams independently
  • Token and password authorization permissions that previously required all principals in one resource
  • Avoiding conflicts when multiple configurations manage different principals on the same object

Caveat: Since we cannot remove an individual permission, the Delete operation is performed as Read/Put, so we need to use a lock around each object.

Tests

  • make test run locally
  • relevant change in docs/ folder
  • covered with integration tests in internal/acceptance
  • using Go SDK
  • using TF Plugin Framework
  • has entry in NEXT_CHANGELOG.md file

@alexott alexott requested review from a team as code owners November 4, 2025 20:31
@alexott alexott requested review from Tejas-Kochar and removed request for a team November 4, 2025 20:31
@alexott alexott temporarily deployed to test-trigger-is November 4, 2025 20:31 — with GitHub Actions Inactive
@alexott alexott requested a review from mgyucht November 4, 2025 20:32
@alexott alexott temporarily deployed to test-trigger-is November 4, 2025 20:32 — with GitHub Actions Inactive
…ndividual principals.

This resource provides fine-grained control over permissions by managing a single
principal's access to a single object, unlike `databricks_permissions` which manages all
principals' access to an object at once. This is particularly useful for:

- Managing permissions for different teams independently
- Token and password authorization permissions that previously required all principals in one resource
- Avoiding conflicts when multiple configurations manage different principals on the same object
…naging permissions for individual principals.

This resource provides fine-grained control over permissions by managing a single principal's access to a single object, unlike `databricks_permissions`, which manages all principals' access to an object at once. This is particularly useful for:

- Managing permissions for different teams independently
- Token and password authorization permissions that previously required all principals in one resource
- Avoiding conflicts when multiple configurations manage different principals on the same object

Caveat: Since we cannot remove an individual permission, the `Delete` operation is performed as `Read/Put`, so we need to use a lock around each object.
@alexott alexott force-pushed the feature/resource-permission-alternative branch from a0e6c1f to c734ddf Compare November 28, 2025 10:36
@alexott alexott changed the base branch from feature/resource-permission to main November 28, 2025 10:52
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants