Documentation ¶
Index ¶
- Constants
- Variables
- type AzureCliCredentials
- type AzureClientSecretCredentials
- type AzureMsiCredentials
- type BasicCredentials
- type Config
- func (c *Config) Authenticate(r *http.Request) error
- func (c *Config) CanonicalHostName() string
- func (c *Config) EnsureResolved() error
- func (c *Config) GetAzureEnvironment() (azureEnvironment, error)
- func (c *Config) IsAccountClient() bool
- func (c *Config) IsAws() bool
- func (c *Config) IsAzure() bool
- func (c *Config) IsGcp() bool
- func (c *Config) WithTesting() *Config
- type ConfigAttribute
- type CredentialsProvider
- type DatabricksCliCredentials
- type DefaultCredentials
- type File
- type GoogleCredentials
- type GoogleDefaultCredentials
- type Loader
- type M2mCredentials
- type MetadataServiceCredentials
- type PatCredentials
Examples ¶
Constants ¶
const MetadataServiceHostHeader = "X-Databricks-Host"
const MetadataServiceVersion = "1"
const MetadataServiceVersionHeader = "X-Databricks-Metadata-Version"
Variables ¶
var ConfigAttributes = loadAttrs()
var ConfigFile = configFileLoader{}
var ErrCannotConfigureAuth = errors.New("cannot configure default credentials")
ErrCannotConfigureAuth (experimental) is returned when no auth is configured
Functions ¶
This section is empty.
Types ¶
type AzureCliCredentials ¶
type AzureCliCredentials struct { }
func (AzureCliCredentials) Name ¶
func (c AzureCliCredentials) Name() string
type AzureClientSecretCredentials ¶
type AzureClientSecretCredentials struct { }
func (AzureClientSecretCredentials) Configure ¶
func (c AzureClientSecretCredentials) Configure(ctx context.Context, cfg *Config) (func(*http.Request) error, error)
TODO: We need to expose which authentication mechanism is used to Terraform, as we cannot create AKV backed secret scopes when authenticated as SP. If we are authenticated as SP and wish to create one we want to fail early. Also see https://github.com/databricks/terraform-provider-databricks/issues/1490.
func (AzureClientSecretCredentials) Name ¶
func (c AzureClientSecretCredentials) Name() string
type AzureMsiCredentials ¶ added in v0.3.0
type AzureMsiCredentials struct { }
func (AzureMsiCredentials) Name ¶ added in v0.3.0
func (c AzureMsiCredentials) Name() string
type BasicCredentials ¶
type BasicCredentials struct { }
func (BasicCredentials) Name ¶
func (c BasicCredentials) Name() string
type Config ¶
type Config struct { // Credentials holds an instance of Credentials Provider to authenticate with Databricks REST APIs. // If no credentials provider is specified, `DefaultCredentials` are implicitly used. Credentials CredentialsProvider // Databricks host (either of workspace endpoint or Accounts API endpoint) Host string `name:"host" env:"DATABRICKS_HOST"` ClusterID string `name:"cluster_id" env:"DATABRICKS_CLUSTER_ID"` WarehouseID string `name:"warehouse_id" env:"DATABRICKS_WAREHOUSE_ID"` // URL of the metadata service that provides authentication credentials. MetadataServiceURL string `name:"metadata_service_url" env:"DATABRICKS_METADATA_SERVICE_URL" auth:"metadata-service,sensitive"` // Databricks Account ID for Accounts API. This field is used in dependencies. AccountID string `name:"account_id" env:"DATABRICKS_ACCOUNT_ID"` Token string `name:"token" env:"DATABRICKS_TOKEN" auth:"pat,sensitive"` Username string `name:"username" env:"DATABRICKS_USERNAME" auth:"basic"` Password string `name:"password" env:"DATABRICKS_PASSWORD" auth:"basic,sensitive"` // Connection profile specified within ~/.databrickscfg. Profile string `name:"profile" env:"DATABRICKS_CONFIG_PROFILE"` // Location of the Databricks CLI credentials file, that is created // by `databricks configure --token` command. By default, it is located // in ~/.databrickscfg. ConfigFile string `name:"config_file" env:"DATABRICKS_CONFIG_FILE"` GoogleServiceAccount string `name:"google_service_account" env:"DATABRICKS_GOOGLE_SERVICE_ACCOUNT" auth:"google"` GoogleCredentials string `name:"google_credentials" env:"GOOGLE_CREDENTIALS" auth:"google,sensitive"` // Azure Resource Manager ID for Azure Databricks workspace, which is exhanged for a Host AzureResourceID string `name:"azure_workspace_resource_id" env:"DATABRICKS_AZURE_RESOURCE_ID" auth:"azure"` AzureUseMSI bool `name:"azure_use_msi" env:"ARM_USE_MSI" auth:"azure"` AzureClientSecret string `name:"azure_client_secret" env:"ARM_CLIENT_SECRET" auth:"azure,sensitive"` AzureClientID string `name:"azure_client_id" env:"ARM_CLIENT_ID" auth:"azure"` AzureTenantID string `name:"azure_tenant_id" env:"ARM_TENANT_ID" auth:"azure"` // AzureEnvironment (Public, UsGov, China, Germany) has specific set of API endpoints. AzureEnvironment string `name:"azure_environment" env:"ARM_ENVIRONMENT"` // Azure Login Application ID. Must be set if authenticating for non-production workspaces. AzureLoginAppID string `name:"azure_login_app_id" env:"DATABRICKS_AZURE_LOGIN_APP_ID" auth:"azure"` ClientID string `name:"client_id" env:"DATABRICKS_CLIENT_ID" auth:"oauth"` ClientSecret string `name:"client_secret" env:"DATABRICKS_CLIENT_SECRET" auth:"oauth,sensitive"` // Path to the Databricks CLI (version >= 0.100.0). DatabricksCliPath string `name:"databricks_cli_path" env:"DATABRICKS_CLI_PATH"` // When multiple auth attributes are available in the environment, use the auth type // specified by this argument. This argument also holds currently selected auth. AuthType string `name:"auth_type" env:"DATABRICKS_AUTH_TYPE" auth:"-"` // Skip SSL certificate verification for HTTP calls. // Use at your own risk or for unit testing purposes. InsecureSkipVerify bool `name:"skip_verify" auth:"-"` // Number of seconds for HTTP timeout HTTPTimeoutSeconds int `name:"http_timeout_seconds" auth:"-"` // Truncate JSON fields in JSON above this limit. Default is 96. DebugTruncateBytes int `name:"debug_truncate_bytes" env:"DATABRICKS_DEBUG_TRUNCATE_BYTES" auth:"-"` // Debug HTTP headers of requests made by the provider. Default is false. DebugHeaders bool `name:"debug_headers" env:"DATABRICKS_DEBUG_HEADERS" auth:"-"` // Maximum number of requests per second made to Databricks REST API. RateLimitPerSecond int `name:"rate_limit" env:"DATABRICKS_RATE_LIMIT" auth:"-"` // Number of seconds to keep retrying HTTP requests. Default is 300 (5 minutes) RetryTimeoutSeconds int `name:"retry_timeout_seconds" auth:"-"` Loaders []Loader // contains filtered or unexported fields }
Config represents configuration for Databricks Connectivity
Example (Accounts) ¶
databricks.Must(databricks.NewWorkspaceClient(&databricks.Config{ Host: "https://accounts.cloud.databricks.com", // env: DATABRICKS_HOST AccountID: "00000000-0000-0000-0000-111122223333", // env: DATABRICKS_ACCOUNT_ID Username: "me@example.com", // env: DATABRICKS_USERNAME Password: "som3thing!S@cret", // env: DATABRICKS_PASSWORD }))
Output:
Example (AzureActiveDirectoryServicePrincipal) ¶
databricks.Must(databricks.NewWorkspaceClient(&databricks.Config{ Host: "https://adb-123.4.azuredatabricks.net", // env: DATABRICKS_HOST AzureResourceID: "/subscriptions/../resourceGroups/...", // env: DATABRICKS_AZURE_RESOURCE_ID AzureTenantID: "00000000-0000-0000-0000-111122223334", // env: ARM_TENANT_ID AzureClientID: "00000000-0000-0000-0000-111122223335", // env: ARM_CLIENT_ID AzureClientSecret: "som3thing!S@cret", // env: ARM_CLIENT_SECRET }))
Output:
Example (Basic) ¶
databricks.Must(databricks.NewWorkspaceClient(&databricks.Config{ Host: "https://abc.cloud.databricks.com", // env: DATABRICKS_HOST Username: "me@example.com", // env: DATABRICKS_USERNAME Password: "som3thing!S@cret", // env: DATABRICKS_PASSWORD }))
Output:
Example (CustomConfigFile) ¶
databricks.Must(databricks.NewWorkspaceClient(&databricks.Config{ ConfigFile: "/path/to/.databrickscfg", // env: DATABRICKS_CONFIG_FILE }))
Output:
Example (CustomProfile) ¶
databricks.Must(databricks.NewWorkspaceClient(&databricks.Config{ Profile: "production", // env: DATABRICKS_CONFIG_PROFILE }))
Output:
Example (Debugging) ¶
databricks.Must(databricks.NewWorkspaceClient(&databricks.Config{ HTTPTimeoutSeconds: 60, DebugTruncateBytes: 96, // env: DATABRICKS_DEBUG_TRUNCATE_BYTES DebugHeaders: false, // env: DATABRICKS_DEBUG_HEADERS RateLimitPerSecond: 15, // env: DATABRICKS_RATE_LIMIT RetryTimeoutSeconds: 300, }))
Output:
Example (ForceAzureActiveDirectoryServicePrincipal) ¶
databricks.Must(databricks.NewWorkspaceClient(&databricks.Config{ Host: "https://adb-123.4.azuredatabricks.net", // env: DATABRICKS_HOST AzureResourceID: "/subscriptions/../resourceGroups/...", // env: DATABRICKS_AZURE_RESOURCE_ID AzureTenantID: "00000000-0000-0000-0000-111122223334", // env: ARM_TENANT_ID AzureClientID: "00000000-0000-0000-0000-111122223335", // env: ARM_CLIENT_ID AzureClientSecret: "som3thing!S@cret", // env: ARM_CLIENT_SECRET Credentials: config.AzureClientSecretCredentials{}, }))
Output:
Example (Pat) ¶
databricks.Must(databricks.NewWorkspaceClient(&databricks.Config{ Host: "https://abc.cloud.databricks.com", // env: DATABRICKS_HOST Token: "dapi0c2a3f4e...", // env: DATABRICKS_TOKEN }))
Output:
func (*Config) Authenticate ¶
Authenticate adds special headers to HTTP request to authorize it to work with Databricks REST API
func (*Config) CanonicalHostName ¶ added in v0.8.1
func (*Config) EnsureResolved ¶
func (*Config) GetAzureEnvironment ¶
func (*Config) IsAccountClient ¶ added in v0.2.0
IsAccountClient returns true if client is configured for Accounts API
func (*Config) WithTesting ¶ added in v0.7.0
type ConfigAttribute ¶
type ConfigAttribute struct { Name string Kind reflect.Kind EnvVars []string Auth string Sensitive bool Internal bool // contains filtered or unexported fields }
ConfigAttribute provides generic way to work with Config configuration attributes and parses `name`, `env`, and `auth` field tags.
Internal: this field can become unexported in the future
func (*ConfigAttribute) GetString ¶
func (a *ConfigAttribute) GetString(cfg *Config) string
func (*ConfigAttribute) IsZero ¶
func (a *ConfigAttribute) IsZero(cfg *Config) bool
func (*ConfigAttribute) ReadEnv ¶
func (a *ConfigAttribute) ReadEnv() string
func (*ConfigAttribute) Set ¶
func (a *ConfigAttribute) Set(cfg *Config, i interface{}) error
type CredentialsProvider ¶
type CredentialsProvider interface { // Name returns human-addressable name of this credentials provider name Name() string // Configure creates HTTP Request Visitor or returns nil if a given credetials // are not configured. It returns an error if credentials are misconfigured. // Takes a context and a pointer to a Config instance, that holds auth mutex. Configure(context.Context, *Config) (func(*http.Request) error, error) }
CredentialsProvider responsible for configuring static or refreshable authentication credentials for Databricks REST APIs
type DatabricksCliCredentials ¶ added in v0.9.0
type DatabricksCliCredentials struct { }
func (DatabricksCliCredentials) Name ¶ added in v0.9.0
func (c DatabricksCliCredentials) Name() string
type DefaultCredentials ¶
type DefaultCredentials struct {
// contains filtered or unexported fields
}
func (*DefaultCredentials) Name ¶
func (c *DefaultCredentials) Name() string
type File ¶ added in v0.6.0
type File struct { *ini.File // contains filtered or unexported fields }
File represents the contents of a databrickscfg file.
type GoogleCredentials ¶
type GoogleCredentials struct { }
func (GoogleCredentials) Name ¶
func (c GoogleCredentials) Name() string
type GoogleDefaultCredentials ¶
type GoogleDefaultCredentials struct {
// contains filtered or unexported fields
}
func (GoogleDefaultCredentials) Name ¶
func (c GoogleDefaultCredentials) Name() string
type M2mCredentials ¶ added in v0.3.0
type M2mCredentials struct { }
func (M2mCredentials) Name ¶ added in v0.3.0
func (c M2mCredentials) Name() string
type MetadataServiceCredentials ¶ added in v0.7.0
type MetadataServiceCredentials struct{}
Credentials provider that fetches a token from a locally running HTTP server
The credentials provider will perform a GET request to the configured URL.
The MUST return 4xx response if the "X-Databricks-Metadata-Version" header is not set or set to a version that the server doesn't support.
The server MUST guarantee stable sessions per URL path. That is, if the server returns a token for a Host on a given URL path, it MUST continue to return tokens for the same Host.
The server MUST return a 4xx response if the Host passed in the "X-Databricks-Host" header doesn't match the token.
The server is expected to return a JSON response with the following fields:
- access_token: The requested access token. - token_type: The type of token, which is a "Bearer" access token. - expires_on: Unix timestamp when the access token expires.
func (MetadataServiceCredentials) Name ¶ added in v0.7.0
func (c MetadataServiceCredentials) Name() string
Source Files ¶
- auth_azure_cli.go
- auth_azure_client_secret.go
- auth_azure_msi.go
- auth_basic.go
- auth_databricks_cli.go
- auth_default.go
- auth_gcp_google_credentials.go
- auth_gcp_google_id.go
- auth_m2m.go
- auth_metadata_service.go
- auth_pat.go
- azure.go
- config.go
- config_attribute.go
- config_attributes.go
- config_file.go
- mock.go
- oauth_visitors.go
- reflect.go