tencentcloud.DlcUpdateRowFilterOperation
Explore with Pulumi AI
Provides a resource to create a dlc update_row_filter_operation
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as tencentcloud from "@pulumi/tencentcloud";
const updateRowFilterOperation = new tencentcloud.DlcUpdateRowFilterOperation("updateRowFilterOperation", {
policy: {
catalog: "DataLakeCatalog",
column: "",
database: "test_iac_keep",
"function": "",
mode: "SENIOR",
operation: "value!=\"0\"",
policyType: "ROWFILTER",
reAuth: false,
source: "USER",
table: "test_table",
view: "",
},
policyId: 103704,
});
import pulumi
import pulumi_tencentcloud as tencentcloud
update_row_filter_operation = tencentcloud.DlcUpdateRowFilterOperation("updateRowFilterOperation",
policy={
"catalog": "DataLakeCatalog",
"column": "",
"database": "test_iac_keep",
"function": "",
"mode": "SENIOR",
"operation": "value!=\"0\"",
"policy_type": "ROWFILTER",
"re_auth": False,
"source": "USER",
"table": "test_table",
"view": "",
},
policy_id=103704)
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/tencentcloud/tencentcloud"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := tencentcloud.NewDlcUpdateRowFilterOperation(ctx, "updateRowFilterOperation", &tencentcloud.DlcUpdateRowFilterOperationArgs{
Policy: &tencentcloud.DlcUpdateRowFilterOperationPolicyArgs{
Catalog: pulumi.String("DataLakeCatalog"),
Column: pulumi.String(""),
Database: pulumi.String("test_iac_keep"),
Function: pulumi.String(""),
Mode: pulumi.String("SENIOR"),
Operation: pulumi.String("value!=\"0\""),
PolicyType: pulumi.String("ROWFILTER"),
ReAuth: pulumi.Bool(false),
Source: pulumi.String("USER"),
Table: pulumi.String("test_table"),
View: pulumi.String(""),
},
PolicyId: pulumi.Float64(103704),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Tencentcloud = Pulumi.Tencentcloud;
return await Deployment.RunAsync(() =>
{
var updateRowFilterOperation = new Tencentcloud.DlcUpdateRowFilterOperation("updateRowFilterOperation", new()
{
Policy = new Tencentcloud.Inputs.DlcUpdateRowFilterOperationPolicyArgs
{
Catalog = "DataLakeCatalog",
Column = "",
Database = "test_iac_keep",
Function = "",
Mode = "SENIOR",
Operation = "value!=\"0\"",
PolicyType = "ROWFILTER",
ReAuth = false,
Source = "USER",
Table = "test_table",
View = "",
},
PolicyId = 103704,
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.tencentcloud.DlcUpdateRowFilterOperation;
import com.pulumi.tencentcloud.DlcUpdateRowFilterOperationArgs;
import com.pulumi.tencentcloud.inputs.DlcUpdateRowFilterOperationPolicyArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var updateRowFilterOperation = new DlcUpdateRowFilterOperation("updateRowFilterOperation", DlcUpdateRowFilterOperationArgs.builder()
.policy(DlcUpdateRowFilterOperationPolicyArgs.builder()
.catalog("DataLakeCatalog")
.column("")
.database("test_iac_keep")
.function("")
.mode("SENIOR")
.operation("value!=\"0\"")
.policyType("ROWFILTER")
.reAuth(false)
.source("USER")
.table("test_table")
.view("")
.build())
.policyId(103704)
.build());
}
}
resources:
updateRowFilterOperation:
type: tencentcloud:DlcUpdateRowFilterOperation
properties:
policy:
catalog: DataLakeCatalog
column: ""
database: test_iac_keep
function: ""
mode: SENIOR
operation: value!="0"
policyType: ROWFILTER
reAuth: false
source: USER
table: test_table
view: ""
policyId: 103704
Create DlcUpdateRowFilterOperation Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new DlcUpdateRowFilterOperation(name: string, args: DlcUpdateRowFilterOperationArgs, opts?: CustomResourceOptions);
@overload
def DlcUpdateRowFilterOperation(resource_name: str,
args: DlcUpdateRowFilterOperationArgs,
opts: Optional[ResourceOptions] = None)
@overload
def DlcUpdateRowFilterOperation(resource_name: str,
opts: Optional[ResourceOptions] = None,
policy: Optional[DlcUpdateRowFilterOperationPolicyArgs] = None,
policy_id: Optional[float] = None,
dlc_update_row_filter_operation_id: Optional[str] = None)
func NewDlcUpdateRowFilterOperation(ctx *Context, name string, args DlcUpdateRowFilterOperationArgs, opts ...ResourceOption) (*DlcUpdateRowFilterOperation, error)
public DlcUpdateRowFilterOperation(string name, DlcUpdateRowFilterOperationArgs args, CustomResourceOptions? opts = null)
public DlcUpdateRowFilterOperation(String name, DlcUpdateRowFilterOperationArgs args)
public DlcUpdateRowFilterOperation(String name, DlcUpdateRowFilterOperationArgs args, CustomResourceOptions options)
type: tencentcloud:DlcUpdateRowFilterOperation
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args DlcUpdateRowFilterOperationArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args DlcUpdateRowFilterOperationArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args DlcUpdateRowFilterOperationArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args DlcUpdateRowFilterOperationArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args DlcUpdateRowFilterOperationArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
DlcUpdateRowFilterOperation Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The DlcUpdateRowFilterOperation resource accepts the following input properties:
- Policy
Dlc
Update Row Filter Operation Policy - New filtering strategy.
- Policy
Id double - The id of the row filtering policy.
- Dlc
Update stringRow Filter Operation Id - ID of the resource.
- Policy
Dlc
Update Row Filter Operation Policy Args - New filtering strategy.
- Policy
Id float64 - The id of the row filtering policy.
- Dlc
Update stringRow Filter Operation Id - ID of the resource.
- policy
Dlc
Update Row Filter Operation Policy - New filtering strategy.
- policy
Id Double - The id of the row filtering policy.
- dlc
Update StringRow Filter Operation Id - ID of the resource.
- policy
Dlc
Update Row Filter Operation Policy - New filtering strategy.
- policy
Id number - The id of the row filtering policy.
- dlc
Update stringRow Filter Operation Id - ID of the resource.
- policy
Dlc
Update Row Filter Operation Policy Args - New filtering strategy.
- policy_
id float - The id of the row filtering policy.
- dlc_
update_ strrow_ filter_ operation_ id - ID of the resource.
- policy Property Map
- New filtering strategy.
- policy
Id Number - The id of the row filtering policy.
- dlc
Update StringRow Filter Operation Id - ID of the resource.
Outputs
All input properties are implicitly available as output properties. Additionally, the DlcUpdateRowFilterOperation resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing DlcUpdateRowFilterOperation Resource
Get an existing DlcUpdateRowFilterOperation resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: DlcUpdateRowFilterOperationState, opts?: CustomResourceOptions): DlcUpdateRowFilterOperation
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
dlc_update_row_filter_operation_id: Optional[str] = None,
policy: Optional[DlcUpdateRowFilterOperationPolicyArgs] = None,
policy_id: Optional[float] = None) -> DlcUpdateRowFilterOperation
func GetDlcUpdateRowFilterOperation(ctx *Context, name string, id IDInput, state *DlcUpdateRowFilterOperationState, opts ...ResourceOption) (*DlcUpdateRowFilterOperation, error)
public static DlcUpdateRowFilterOperation Get(string name, Input<string> id, DlcUpdateRowFilterOperationState? state, CustomResourceOptions? opts = null)
public static DlcUpdateRowFilterOperation get(String name, Output<String> id, DlcUpdateRowFilterOperationState state, CustomResourceOptions options)
resources: _: type: tencentcloud:DlcUpdateRowFilterOperation get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Dlc
Update stringRow Filter Operation Id - ID of the resource.
- Policy
Dlc
Update Row Filter Operation Policy - New filtering strategy.
- Policy
Id double - The id of the row filtering policy.
- Dlc
Update stringRow Filter Operation Id - ID of the resource.
- Policy
Dlc
Update Row Filter Operation Policy Args - New filtering strategy.
- Policy
Id float64 - The id of the row filtering policy.
- dlc
Update StringRow Filter Operation Id - ID of the resource.
- policy
Dlc
Update Row Filter Operation Policy - New filtering strategy.
- policy
Id Double - The id of the row filtering policy.
- dlc
Update stringRow Filter Operation Id - ID of the resource.
- policy
Dlc
Update Row Filter Operation Policy - New filtering strategy.
- policy
Id number - The id of the row filtering policy.
- dlc_
update_ strrow_ filter_ operation_ id - ID of the resource.
- policy
Dlc
Update Row Filter Operation Policy Args - New filtering strategy.
- policy_
id float - The id of the row filtering policy.
- dlc
Update StringRow Filter Operation Id - ID of the resource.
- policy Property Map
- New filtering strategy.
- policy
Id Number - The id of the row filtering policy.
Supporting Types
DlcUpdateRowFilterOperationPolicy, DlcUpdateRowFilterOperationPolicyArgs
- Catalog string
- For the data source name that requires authorization, only * (representing all resources at this level) is supported under the administrator level; in the case of data source level and database level authentication, only COSDataCatalog or * is supported; in data table level authentication, it is possible Fill in the user-defined data source. If left blank, it defaults to DataLakeCatalog. note: If a user-defined data source is authenticated, the permissions that dlc can manage are a subset of the accounts provided by the user when accessing the data source.
- Database string
- Database name that requires authorization, fill in * to represent all databases under the current catalog. When the authorization type is administrator level, only * is allowed to be filled in. when the authorization type is data connection level, only blanks are allowed to be filled in. For other types, the database can be specified arbitrarily.
- Operation string
- Authorized permission operations provide different operations for different levels of authentication. administrator permissions: ALL, default is ALL if left blank; data connection level authentication: CREATE; database level authentication: ALL, CREATE, ALTER, DROP; data table permissions: ALL, SELECT, INSERT, ALTER, DELETE, DROP, UPDATE. note: under data table permissions, only SELECT operations are supported when the specified data source is not COSDataCatalog.
- Table string
- For the table name that requires authorization, fill in * to represent all tables under the current database. when the authorization type is administrator level, only * is allowed to be filled in. when the authorization type is data connection level or database level, only blanks are allowed to be filled in. For other types, data tables can be specified arbitrarily.
- Column string
- For columns that require authorization, fill in * to represent all current columns. When the authorization type is administrator level, only * is allowed.
- Create
Time string - The time when the permission was created. Leave the input parameter blank.
- Data
Engine string - Data engines that require authorization, fill in * to represent all current engines. when the authorization type is administrator level, only * is allowed.
- Function string
- For the function name that requires authorization, fill in * to represent all functions under the current catalog. when the authorization type is administrator level, only * is allowed to be filled in. When the authorization type is data connection level, only blanks are allowed to be filled in. in other types, functions can be specified arbitrarily.
- Id double
- Policy id.
- Mode string
- Authorization mode, please leave this parameter blank. COMMON: normal mode; SENIOR: advanced mode.
- Operator string
- Operator, do not fill in the input parameters.
- Policy
Type string - Authorization type, currently supports eight authorization types: ADMIN: Administrator level authentication DATASOURCE: data connection level authentication DATABASE: database level authentication TABLE: Table level authentication VIEW: view level authentication FUNCTION: Function level authentication COLUMN: Column level authentication ENGINE: Data engine authentication. if left blank, the default is administrator level authentication.
- Re
Auth bool - Whether the user can perform secondary authorization. when it is true, the authorized user can re-authorize the permissions obtained this time to other sub-users. default is false.
- Source string
- Permission source, please leave it blank. USER: permissions come from the user itself; WORKGROUP: permissions come from the bound workgroup.
- Source
Id double - The id of the workgroup to which the permission belongs. this value only exists when the source of the permission is a workgroup. that is, this field has a value only when the value of the Source field is WORKGROUP.
- Source
Name string - The name of the workgroup to which the permission belongs. this value only exists when the source of the permission is a workgroup. that is, this field has a value only when the value of the source field is WORKGROUP.
- View string
- For views that require authorization, fill in * to represent all views under the current database. When the authorization type is administrator level, only * is allowed to be filled in. when the authorization type is data connection level or database level, only blanks are allowed to be filled in. for other types, the view can be specified arbitrarily.
- Catalog string
- For the data source name that requires authorization, only * (representing all resources at this level) is supported under the administrator level; in the case of data source level and database level authentication, only COSDataCatalog or * is supported; in data table level authentication, it is possible Fill in the user-defined data source. If left blank, it defaults to DataLakeCatalog. note: If a user-defined data source is authenticated, the permissions that dlc can manage are a subset of the accounts provided by the user when accessing the data source.
- Database string
- Database name that requires authorization, fill in * to represent all databases under the current catalog. When the authorization type is administrator level, only * is allowed to be filled in. when the authorization type is data connection level, only blanks are allowed to be filled in. For other types, the database can be specified arbitrarily.
- Operation string
- Authorized permission operations provide different operations for different levels of authentication. administrator permissions: ALL, default is ALL if left blank; data connection level authentication: CREATE; database level authentication: ALL, CREATE, ALTER, DROP; data table permissions: ALL, SELECT, INSERT, ALTER, DELETE, DROP, UPDATE. note: under data table permissions, only SELECT operations are supported when the specified data source is not COSDataCatalog.
- Table string
- For the table name that requires authorization, fill in * to represent all tables under the current database. when the authorization type is administrator level, only * is allowed to be filled in. when the authorization type is data connection level or database level, only blanks are allowed to be filled in. For other types, data tables can be specified arbitrarily.
- Column string
- For columns that require authorization, fill in * to represent all current columns. When the authorization type is administrator level, only * is allowed.
- Create
Time string - The time when the permission was created. Leave the input parameter blank.
- Data
Engine string - Data engines that require authorization, fill in * to represent all current engines. when the authorization type is administrator level, only * is allowed.
- Function string
- For the function name that requires authorization, fill in * to represent all functions under the current catalog. when the authorization type is administrator level, only * is allowed to be filled in. When the authorization type is data connection level, only blanks are allowed to be filled in. in other types, functions can be specified arbitrarily.
- Id float64
- Policy id.
- Mode string
- Authorization mode, please leave this parameter blank. COMMON: normal mode; SENIOR: advanced mode.
- Operator string
- Operator, do not fill in the input parameters.
- Policy
Type string - Authorization type, currently supports eight authorization types: ADMIN: Administrator level authentication DATASOURCE: data connection level authentication DATABASE: database level authentication TABLE: Table level authentication VIEW: view level authentication FUNCTION: Function level authentication COLUMN: Column level authentication ENGINE: Data engine authentication. if left blank, the default is administrator level authentication.
- Re
Auth bool - Whether the user can perform secondary authorization. when it is true, the authorized user can re-authorize the permissions obtained this time to other sub-users. default is false.
- Source string
- Permission source, please leave it blank. USER: permissions come from the user itself; WORKGROUP: permissions come from the bound workgroup.
- Source
Id float64 - The id of the workgroup to which the permission belongs. this value only exists when the source of the permission is a workgroup. that is, this field has a value only when the value of the Source field is WORKGROUP.
- Source
Name string - The name of the workgroup to which the permission belongs. this value only exists when the source of the permission is a workgroup. that is, this field has a value only when the value of the source field is WORKGROUP.
- View string
- For views that require authorization, fill in * to represent all views under the current database. When the authorization type is administrator level, only * is allowed to be filled in. when the authorization type is data connection level or database level, only blanks are allowed to be filled in. for other types, the view can be specified arbitrarily.
- catalog String
- For the data source name that requires authorization, only * (representing all resources at this level) is supported under the administrator level; in the case of data source level and database level authentication, only COSDataCatalog or * is supported; in data table level authentication, it is possible Fill in the user-defined data source. If left blank, it defaults to DataLakeCatalog. note: If a user-defined data source is authenticated, the permissions that dlc can manage are a subset of the accounts provided by the user when accessing the data source.
- database String
- Database name that requires authorization, fill in * to represent all databases under the current catalog. When the authorization type is administrator level, only * is allowed to be filled in. when the authorization type is data connection level, only blanks are allowed to be filled in. For other types, the database can be specified arbitrarily.
- operation String
- Authorized permission operations provide different operations for different levels of authentication. administrator permissions: ALL, default is ALL if left blank; data connection level authentication: CREATE; database level authentication: ALL, CREATE, ALTER, DROP; data table permissions: ALL, SELECT, INSERT, ALTER, DELETE, DROP, UPDATE. note: under data table permissions, only SELECT operations are supported when the specified data source is not COSDataCatalog.
- table String
- For the table name that requires authorization, fill in * to represent all tables under the current database. when the authorization type is administrator level, only * is allowed to be filled in. when the authorization type is data connection level or database level, only blanks are allowed to be filled in. For other types, data tables can be specified arbitrarily.
- column String
- For columns that require authorization, fill in * to represent all current columns. When the authorization type is administrator level, only * is allowed.
- create
Time String - The time when the permission was created. Leave the input parameter blank.
- data
Engine String - Data engines that require authorization, fill in * to represent all current engines. when the authorization type is administrator level, only * is allowed.
- function String
- For the function name that requires authorization, fill in * to represent all functions under the current catalog. when the authorization type is administrator level, only * is allowed to be filled in. When the authorization type is data connection level, only blanks are allowed to be filled in. in other types, functions can be specified arbitrarily.
- id Double
- Policy id.
- mode String
- Authorization mode, please leave this parameter blank. COMMON: normal mode; SENIOR: advanced mode.
- operator String
- Operator, do not fill in the input parameters.
- policy
Type String - Authorization type, currently supports eight authorization types: ADMIN: Administrator level authentication DATASOURCE: data connection level authentication DATABASE: database level authentication TABLE: Table level authentication VIEW: view level authentication FUNCTION: Function level authentication COLUMN: Column level authentication ENGINE: Data engine authentication. if left blank, the default is administrator level authentication.
- re
Auth Boolean - Whether the user can perform secondary authorization. when it is true, the authorized user can re-authorize the permissions obtained this time to other sub-users. default is false.
- source String
- Permission source, please leave it blank. USER: permissions come from the user itself; WORKGROUP: permissions come from the bound workgroup.
- source
Id Double - The id of the workgroup to which the permission belongs. this value only exists when the source of the permission is a workgroup. that is, this field has a value only when the value of the Source field is WORKGROUP.
- source
Name String - The name of the workgroup to which the permission belongs. this value only exists when the source of the permission is a workgroup. that is, this field has a value only when the value of the source field is WORKGROUP.
- view String
- For views that require authorization, fill in * to represent all views under the current database. When the authorization type is administrator level, only * is allowed to be filled in. when the authorization type is data connection level or database level, only blanks are allowed to be filled in. for other types, the view can be specified arbitrarily.
- catalog string
- For the data source name that requires authorization, only * (representing all resources at this level) is supported under the administrator level; in the case of data source level and database level authentication, only COSDataCatalog or * is supported; in data table level authentication, it is possible Fill in the user-defined data source. If left blank, it defaults to DataLakeCatalog. note: If a user-defined data source is authenticated, the permissions that dlc can manage are a subset of the accounts provided by the user when accessing the data source.
- database string
- Database name that requires authorization, fill in * to represent all databases under the current catalog. When the authorization type is administrator level, only * is allowed to be filled in. when the authorization type is data connection level, only blanks are allowed to be filled in. For other types, the database can be specified arbitrarily.
- operation string
- Authorized permission operations provide different operations for different levels of authentication. administrator permissions: ALL, default is ALL if left blank; data connection level authentication: CREATE; database level authentication: ALL, CREATE, ALTER, DROP; data table permissions: ALL, SELECT, INSERT, ALTER, DELETE, DROP, UPDATE. note: under data table permissions, only SELECT operations are supported when the specified data source is not COSDataCatalog.
- table string
- For the table name that requires authorization, fill in * to represent all tables under the current database. when the authorization type is administrator level, only * is allowed to be filled in. when the authorization type is data connection level or database level, only blanks are allowed to be filled in. For other types, data tables can be specified arbitrarily.
- column string
- For columns that require authorization, fill in * to represent all current columns. When the authorization type is administrator level, only * is allowed.
- create
Time string - The time when the permission was created. Leave the input parameter blank.
- data
Engine string - Data engines that require authorization, fill in * to represent all current engines. when the authorization type is administrator level, only * is allowed.
- function string
- For the function name that requires authorization, fill in * to represent all functions under the current catalog. when the authorization type is administrator level, only * is allowed to be filled in. When the authorization type is data connection level, only blanks are allowed to be filled in. in other types, functions can be specified arbitrarily.
- id number
- Policy id.
- mode string
- Authorization mode, please leave this parameter blank. COMMON: normal mode; SENIOR: advanced mode.
- operator string
- Operator, do not fill in the input parameters.
- policy
Type string - Authorization type, currently supports eight authorization types: ADMIN: Administrator level authentication DATASOURCE: data connection level authentication DATABASE: database level authentication TABLE: Table level authentication VIEW: view level authentication FUNCTION: Function level authentication COLUMN: Column level authentication ENGINE: Data engine authentication. if left blank, the default is administrator level authentication.
- re
Auth boolean - Whether the user can perform secondary authorization. when it is true, the authorized user can re-authorize the permissions obtained this time to other sub-users. default is false.
- source string
- Permission source, please leave it blank. USER: permissions come from the user itself; WORKGROUP: permissions come from the bound workgroup.
- source
Id number - The id of the workgroup to which the permission belongs. this value only exists when the source of the permission is a workgroup. that is, this field has a value only when the value of the Source field is WORKGROUP.
- source
Name string - The name of the workgroup to which the permission belongs. this value only exists when the source of the permission is a workgroup. that is, this field has a value only when the value of the source field is WORKGROUP.
- view string
- For views that require authorization, fill in * to represent all views under the current database. When the authorization type is administrator level, only * is allowed to be filled in. when the authorization type is data connection level or database level, only blanks are allowed to be filled in. for other types, the view can be specified arbitrarily.
- catalog str
- For the data source name that requires authorization, only * (representing all resources at this level) is supported under the administrator level; in the case of data source level and database level authentication, only COSDataCatalog or * is supported; in data table level authentication, it is possible Fill in the user-defined data source. If left blank, it defaults to DataLakeCatalog. note: If a user-defined data source is authenticated, the permissions that dlc can manage are a subset of the accounts provided by the user when accessing the data source.
- database str
- Database name that requires authorization, fill in * to represent all databases under the current catalog. When the authorization type is administrator level, only * is allowed to be filled in. when the authorization type is data connection level, only blanks are allowed to be filled in. For other types, the database can be specified arbitrarily.
- operation str
- Authorized permission operations provide different operations for different levels of authentication. administrator permissions: ALL, default is ALL if left blank; data connection level authentication: CREATE; database level authentication: ALL, CREATE, ALTER, DROP; data table permissions: ALL, SELECT, INSERT, ALTER, DELETE, DROP, UPDATE. note: under data table permissions, only SELECT operations are supported when the specified data source is not COSDataCatalog.
- table str
- For the table name that requires authorization, fill in * to represent all tables under the current database. when the authorization type is administrator level, only * is allowed to be filled in. when the authorization type is data connection level or database level, only blanks are allowed to be filled in. For other types, data tables can be specified arbitrarily.
- column str
- For columns that require authorization, fill in * to represent all current columns. When the authorization type is administrator level, only * is allowed.
- create_
time str - The time when the permission was created. Leave the input parameter blank.
- data_
engine str - Data engines that require authorization, fill in * to represent all current engines. when the authorization type is administrator level, only * is allowed.
- function str
- For the function name that requires authorization, fill in * to represent all functions under the current catalog. when the authorization type is administrator level, only * is allowed to be filled in. When the authorization type is data connection level, only blanks are allowed to be filled in. in other types, functions can be specified arbitrarily.
- id float
- Policy id.
- mode str
- Authorization mode, please leave this parameter blank. COMMON: normal mode; SENIOR: advanced mode.
- operator str
- Operator, do not fill in the input parameters.
- policy_
type str - Authorization type, currently supports eight authorization types: ADMIN: Administrator level authentication DATASOURCE: data connection level authentication DATABASE: database level authentication TABLE: Table level authentication VIEW: view level authentication FUNCTION: Function level authentication COLUMN: Column level authentication ENGINE: Data engine authentication. if left blank, the default is administrator level authentication.
- re_
auth bool - Whether the user can perform secondary authorization. when it is true, the authorized user can re-authorize the permissions obtained this time to other sub-users. default is false.
- source str
- Permission source, please leave it blank. USER: permissions come from the user itself; WORKGROUP: permissions come from the bound workgroup.
- source_
id float - The id of the workgroup to which the permission belongs. this value only exists when the source of the permission is a workgroup. that is, this field has a value only when the value of the Source field is WORKGROUP.
- source_
name str - The name of the workgroup to which the permission belongs. this value only exists when the source of the permission is a workgroup. that is, this field has a value only when the value of the source field is WORKGROUP.
- view str
- For views that require authorization, fill in * to represent all views under the current database. When the authorization type is administrator level, only * is allowed to be filled in. when the authorization type is data connection level or database level, only blanks are allowed to be filled in. for other types, the view can be specified arbitrarily.
- catalog String
- For the data source name that requires authorization, only * (representing all resources at this level) is supported under the administrator level; in the case of data source level and database level authentication, only COSDataCatalog or * is supported; in data table level authentication, it is possible Fill in the user-defined data source. If left blank, it defaults to DataLakeCatalog. note: If a user-defined data source is authenticated, the permissions that dlc can manage are a subset of the accounts provided by the user when accessing the data source.
- database String
- Database name that requires authorization, fill in * to represent all databases under the current catalog. When the authorization type is administrator level, only * is allowed to be filled in. when the authorization type is data connection level, only blanks are allowed to be filled in. For other types, the database can be specified arbitrarily.
- operation String
- Authorized permission operations provide different operations for different levels of authentication. administrator permissions: ALL, default is ALL if left blank; data connection level authentication: CREATE; database level authentication: ALL, CREATE, ALTER, DROP; data table permissions: ALL, SELECT, INSERT, ALTER, DELETE, DROP, UPDATE. note: under data table permissions, only SELECT operations are supported when the specified data source is not COSDataCatalog.
- table String
- For the table name that requires authorization, fill in * to represent all tables under the current database. when the authorization type is administrator level, only * is allowed to be filled in. when the authorization type is data connection level or database level, only blanks are allowed to be filled in. For other types, data tables can be specified arbitrarily.
- column String
- For columns that require authorization, fill in * to represent all current columns. When the authorization type is administrator level, only * is allowed.
- create
Time String - The time when the permission was created. Leave the input parameter blank.
- data
Engine String - Data engines that require authorization, fill in * to represent all current engines. when the authorization type is administrator level, only * is allowed.
- function String
- For the function name that requires authorization, fill in * to represent all functions under the current catalog. when the authorization type is administrator level, only * is allowed to be filled in. When the authorization type is data connection level, only blanks are allowed to be filled in. in other types, functions can be specified arbitrarily.
- id Number
- Policy id.
- mode String
- Authorization mode, please leave this parameter blank. COMMON: normal mode; SENIOR: advanced mode.
- operator String
- Operator, do not fill in the input parameters.
- policy
Type String - Authorization type, currently supports eight authorization types: ADMIN: Administrator level authentication DATASOURCE: data connection level authentication DATABASE: database level authentication TABLE: Table level authentication VIEW: view level authentication FUNCTION: Function level authentication COLUMN: Column level authentication ENGINE: Data engine authentication. if left blank, the default is administrator level authentication.
- re
Auth Boolean - Whether the user can perform secondary authorization. when it is true, the authorized user can re-authorize the permissions obtained this time to other sub-users. default is false.
- source String
- Permission source, please leave it blank. USER: permissions come from the user itself; WORKGROUP: permissions come from the bound workgroup.
- source
Id Number - The id of the workgroup to which the permission belongs. this value only exists when the source of the permission is a workgroup. that is, this field has a value only when the value of the Source field is WORKGROUP.
- source
Name String - The name of the workgroup to which the permission belongs. this value only exists when the source of the permission is a workgroup. that is, this field has a value only when the value of the source field is WORKGROUP.
- view String
- For views that require authorization, fill in * to represent all views under the current database. When the authorization type is administrator level, only * is allowed to be filled in. when the authorization type is data connection level or database level, only blanks are allowed to be filled in. for other types, the view can be specified arbitrarily.
Package Details
- Repository
- tencentcloud tencentcloudstack/terraform-provider-tencentcloud
- License
- Notes
- This Pulumi package is based on the
tencentcloud
Terraform Provider.