terraform-provider-snowflake
terraform-provider-snowflake copied to clipboard
feat: add snowflake_grant_application_role resource
Adds a new resource for grant_application_role. Also adds some stuff to SDK to make it work. Relies on an app package to exist, which may not exist in the current account. No application resource currently exists to use.
Test Plan
- [x] acceptance tests
- [ ] …
References
https://docs.snowflake.com/en/sql-reference/sql/grant-application-role
Integration tests failure for e778c23b596b62218059350b8ad0a0316703990d
Integration tests failure for b5d4406699857e1f6ad94570c1ccdf5a086ef1ef
Integration tests failure for 1b44738ff10350badc5420afd2fca2dad7a059be
Integration tests failure for f3f9cb6619921bc7e71fa12d318da1169a2a6347
Integration tests failure for 06e559994d5a7155916bf48c61180218e31666a0
Integration tests failure for 40fb6437dad55ad95ad1beff4441b0639990b334
Integration tests failure for ebcce67df826ca9a0030e049d8078822b5834f9f
⚠️ GitGuardian has uncovered 2 secrets following the scan of your pull request.
Please consider investigating the findings and remediating the incidents. Failure to do so may lead to compromising the associated services or software components.
🔎 Detected hardcoded secrets in your pull request
GitGuardian id | GitGuardian status | Secret | Commit | Filename | |
---|---|---|---|---|---|
9467623 | Triggered | Generic Password | 76365d5ed8d5f45ef6ed25db54b7e87b51f43ee7 | pkg/resources/password_policy_acceptance_test.go | View secret |
9467623 | Triggered | Generic Password | 76365d5ed8d5f45ef6ed25db54b7e87b51f43ee7 | pkg/resources/password_policy_acceptance_test.go | View secret |
🛠 Guidelines to remediate hardcoded secrets
- Understand the implications of revoking this secret by investigating where it is used in your code.
- Replace and store your secrets safely. Learn here the best practices.
- Revoke and rotate these secrets.
- If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.
To avoid such incidents in the future consider
- following these best practices for managing and storing secrets including API keys and other credentials
- install secret detection on pre-commit to catch secret before it leaves your machine and ease remediation.
🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.
Integration tests failure for 76365d5ed8d5f45ef6ed25db54b7e87b51f43ee7
Integration tests failure for db8d665d7fe8cdb1ef9811ae4365a4db5c7acb7a
Integration tests failure for 93a1e2f7e091adeb343b5b55020606f73e66cb79
Integration tests failure for 10917e5cc9bbd63d93a63c4b90f87795a5e02712
Integration tests failure for 94833d75ad0eedfb907d4559075744c071b93f2e
Integration tests failure for 5dc9593e9df80c2bd9ee3159e7ce32b9d9ced828
Integration tests failure for 2956f7902d7b296f3aaf71b586dbf096701b9d58
Integration tests failure for 739686a5279b5475c580129542ad2fe32f4199ca
Integration tests failure for 86bb80a879d3b189d8401bde9e6a5d1cc0508b07
Integration tests failure for 6321eee8a0de365bce34c328d852eb94984e6b69
Integration tests success for 6321eee8a0de365bce34c328d852eb94984e6b69