Check whether a role with specific resource permissions already exists.
message RoleExistsRequest {
string grantee_type = 1;
repeated GetRoleMatchingRequest.ResourcePermissions resource_permissions = 2;
}
message RoleExistsResponse {
repeated string grantee_ids = 1;
}{
"grantee_type": "SnowflakeRole",
"resource_permissions": [
{
"node_type": "SnowflakeDatabase",
"node_id": "example-snowflake.com/database/SECURITY_DB",
"raw_permissions": ["USAGE"]
}
]
}{
"grantee_ids": [
"example-snowflake.com/role/SECURITY_READER_ROLE"
]
}{
"grantee_type": "SnowflakeRole",
"resource_permissions": [
{
"node_type": "SnowflakeDatabase",
"node_id": "example-snowflake.com/database/ANALYTICS",
"raw_permissions": ["USAGE"]
},
{
"node_type": "SnowflakeSchema",
"node_id": "example-snowflake.com/database/ANALYTICS/schema/PUBLIC",
"raw_permissions": ["USAGE", "SELECT"]
}
]
}{
"grantee_ids": [
"example-snowflake.com/role/ANALYTICS_READER_ROLE",
"example-snowflake.com/role/REPORTING_USER_ROLE"
]
}{
"grantee_type": "SnowflakeRole",
"resource_permissions": [
{
"node_type": "SnowflakeDatabase",
"node_id": "snowhouse.snowflakecomputing.com/database/RESEARCH_DATA",
"raw_permissions": ["OWNERSHIP"]
},
{
"node_type": "SnowflakeSchema",
"node_id": "snowhouse.snowflakecomputing.com/database/RESEARCH_DATA/schema/EXPERIMENTS",
"raw_permissions": ["CREATE TABLE", "CREATE VIEW", "MODIFY"]
}
]
}{
"grantee_ids": []
}Veza API key for authentication. Generate keys in Administration > API Keys.
OK
Default error response
{
"grantee_ids": [
"text"
]
}POST /api/private/assessments/role_recommendations_role_exists HTTP/1.1
Host: your-tenant.vezacloud.com
Authorization: Bearer YOUR_SECRET_TOKEN
Content-Type: application/json
Accept: */*
Content-Length: 113
{
"grantee_type": "text",
"resource_permissions": [
{
"raw_permissions": [
"text"
],
"node_type": "text",
"node_id": "text"
}
]
}