@pulumi/oci 1.15.0 → 1.16.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (328) hide show
  1. package/databasemanagement/getManagedMySqlDatabase.d.ts +83 -0
  2. package/databasemanagement/getManagedMySqlDatabase.js +51 -0
  3. package/databasemanagement/getManagedMySqlDatabase.js.map +1 -0
  4. package/databasemanagement/getManagedMySqlDatabaseConfigurationData.d.ts +72 -0
  5. package/databasemanagement/getManagedMySqlDatabaseConfigurationData.js +52 -0
  6. package/databasemanagement/getManagedMySqlDatabaseConfigurationData.js.map +1 -0
  7. package/databasemanagement/getManagedMySqlDatabaseSqlData.d.ts +105 -0
  8. package/databasemanagement/getManagedMySqlDatabaseSqlData.js +61 -0
  9. package/databasemanagement/getManagedMySqlDatabaseSqlData.js.map +1 -0
  10. package/databasemanagement/getManagedMySqlDatabases.d.ts +75 -0
  11. package/databasemanagement/getManagedMySqlDatabases.js +52 -0
  12. package/databasemanagement/getManagedMySqlDatabases.js.map +1 -0
  13. package/databasemanagement/index.d.ts +12 -0
  14. package/databasemanagement/index.js +13 -1
  15. package/databasemanagement/index.js.map +1 -1
  16. package/datasafe/databaseSecurityConfig.d.ts +231 -0
  17. package/datasafe/databaseSecurityConfig.js +93 -0
  18. package/datasafe/databaseSecurityConfig.js.map +1 -0
  19. package/datasafe/databaseSecurityConfigManagement.d.ts +90 -0
  20. package/datasafe/databaseSecurityConfigManagement.js +75 -0
  21. package/datasafe/databaseSecurityConfigManagement.js.map +1 -0
  22. package/datasafe/discoveryMod.d.ts +3 -3
  23. package/datasafe/getDatabaseSecurityConfig.d.ts +123 -0
  24. package/datasafe/getDatabaseSecurityConfig.js +51 -0
  25. package/datasafe/getDatabaseSecurityConfig.js.map +1 -0
  26. package/datasafe/getDatabaseSecurityConfigs.d.ts +206 -0
  27. package/datasafe/getDatabaseSecurityConfigs.js +102 -0
  28. package/datasafe/getDatabaseSecurityConfigs.js.map +1 -0
  29. package/datasafe/getDiscoveryJob.d.ts +1 -1
  30. package/datasafe/getDiscoveryJobsResult.d.ts +1 -1
  31. package/datasafe/getDiscoveryJobsResults.d.ts +1 -1
  32. package/datasafe/getMaskingPoliciesMaskingColumn.d.ts +1 -1
  33. package/datasafe/getMaskingPoliciesMaskingColumns.d.ts +1 -1
  34. package/datasafe/getMaskingPolicy.d.ts +1 -1
  35. package/datasafe/getSecurityAssessment.d.ts +3 -3
  36. package/datasafe/getSecurityAssessmentComparison.d.ts +4 -4
  37. package/datasafe/getSecurityAssessmentComparison.js +2 -2
  38. package/datasafe/getSecurityAssessmentFindings.d.ts +6 -6
  39. package/datasafe/getSecurityAssessmentFindings.js +2 -2
  40. package/datasafe/getSecurityAssessments.d.ts +2 -2
  41. package/datasafe/getSecurityPolicies.d.ts +162 -0
  42. package/datasafe/getSecurityPolicies.js +93 -0
  43. package/datasafe/getSecurityPolicies.js.map +1 -0
  44. package/datasafe/getSecurityPolicy.d.ts +109 -0
  45. package/datasafe/getSecurityPolicy.js +51 -0
  46. package/datasafe/getSecurityPolicy.js.map +1 -0
  47. package/datasafe/getSecurityPolicyDeployment.d.ts +117 -0
  48. package/datasafe/getSecurityPolicyDeployment.js +51 -0
  49. package/datasafe/getSecurityPolicyDeployment.js.map +1 -0
  50. package/datasafe/getSecurityPolicyDeploymentSecurityPolicyEntryState.d.ts +90 -0
  51. package/datasafe/getSecurityPolicyDeploymentSecurityPolicyEntryState.js +54 -0
  52. package/datasafe/getSecurityPolicyDeploymentSecurityPolicyEntryState.js.map +1 -0
  53. package/datasafe/getSecurityPolicyDeploymentSecurityPolicyEntryStates.d.ts +107 -0
  54. package/datasafe/getSecurityPolicyDeploymentSecurityPolicyEntryStates.js +62 -0
  55. package/datasafe/getSecurityPolicyDeploymentSecurityPolicyEntryStates.js.map +1 -0
  56. package/datasafe/getSecurityPolicyDeployments.d.ts +190 -0
  57. package/datasafe/getSecurityPolicyDeployments.js +99 -0
  58. package/datasafe/getSecurityPolicyDeployments.js.map +1 -0
  59. package/datasafe/getSensitiveDataModel.d.ts +1 -1
  60. package/datasafe/getSqlCollection.d.ts +138 -0
  61. package/datasafe/getSqlCollection.js +51 -0
  62. package/datasafe/getSqlCollection.js.map +1 -0
  63. package/datasafe/getSqlCollectionAnalytics.d.ts +181 -0
  64. package/datasafe/getSqlCollectionAnalytics.js +99 -0
  65. package/datasafe/getSqlCollectionAnalytics.js.map +1 -0
  66. package/datasafe/getSqlCollectionLogInsights.d.ts +111 -0
  67. package/datasafe/getSqlCollectionLogInsights.js +61 -0
  68. package/datasafe/getSqlCollectionLogInsights.js.map +1 -0
  69. package/datasafe/getSqlCollections.d.ts +220 -0
  70. package/datasafe/getSqlCollections.js +105 -0
  71. package/datasafe/getSqlCollections.js.map +1 -0
  72. package/datasafe/getSqlFirewallAllowedSqlAnalytics.d.ts +146 -0
  73. package/datasafe/getSqlFirewallAllowedSqlAnalytics.js +90 -0
  74. package/datasafe/getSqlFirewallAllowedSqlAnalytics.js.map +1 -0
  75. package/datasafe/getSqlFirewallAllowedSqls.d.ts +138 -0
  76. package/datasafe/getSqlFirewallAllowedSqls.js +87 -0
  77. package/datasafe/getSqlFirewallAllowedSqls.js.map +1 -0
  78. package/datasafe/getSqlFirewallPolicies.d.ts +234 -0
  79. package/datasafe/getSqlFirewallPolicies.js +108 -0
  80. package/datasafe/getSqlFirewallPolicies.js.map +1 -0
  81. package/datasafe/getSqlFirewallPolicy.d.ts +149 -0
  82. package/datasafe/getSqlFirewallPolicy.js +51 -0
  83. package/datasafe/getSqlFirewallPolicy.js.map +1 -0
  84. package/datasafe/getSqlFirewallPolicyAnalytics.d.ts +177 -0
  85. package/datasafe/getSqlFirewallPolicyAnalytics.js +95 -0
  86. package/datasafe/getSqlFirewallPolicyAnalytics.js.map +1 -0
  87. package/datasafe/getSqlFirewallViolationAnalytics.d.ts +170 -0
  88. package/datasafe/getSqlFirewallViolationAnalytics.js +76 -0
  89. package/datasafe/getSqlFirewallViolationAnalytics.js.map +1 -0
  90. package/datasafe/getSqlFirewallViolations.d.ts +112 -0
  91. package/datasafe/getSqlFirewallViolations.js +61 -0
  92. package/datasafe/getSqlFirewallViolations.js.map +1 -0
  93. package/datasafe/getTargetAlertPolicyAssociation.d.ts +1 -1
  94. package/datasafe/getUserAssessment.d.ts +5 -5
  95. package/datasafe/getUserAssessmentComparison.d.ts +2 -2
  96. package/datasafe/getUserAssessmentComparison.js +2 -2
  97. package/datasafe/getUserAssessmentUserAnalytics.d.ts +2 -2
  98. package/datasafe/getUserAssessmentUserAnalytics.js +2 -2
  99. package/datasafe/getUserAssessmentUsers.d.ts +1 -1
  100. package/datasafe/getUserAssessments.d.ts +2 -2
  101. package/datasafe/index.d.ts +84 -0
  102. package/datasafe/index.js +108 -5
  103. package/datasafe/index.js.map +1 -1
  104. package/datasafe/maskingPoliciesMaskingColumn.d.ts +3 -3
  105. package/datasafe/maskingPolicy.d.ts +4 -4
  106. package/datasafe/maskingPolicy.js +1 -1
  107. package/datasafe/securityAssessment.d.ts +6 -6
  108. package/datasafe/securityPolicy.d.ts +189 -0
  109. package/datasafe/securityPolicy.js +85 -0
  110. package/datasafe/securityPolicy.js.map +1 -0
  111. package/datasafe/securityPolicyDeployment.d.ts +205 -0
  112. package/datasafe/securityPolicyDeployment.js +89 -0
  113. package/datasafe/securityPolicyDeployment.js.map +1 -0
  114. package/datasafe/securityPolicyDeploymentManagement.d.ts +82 -0
  115. package/datasafe/securityPolicyDeploymentManagement.js +71 -0
  116. package/datasafe/securityPolicyDeploymentManagement.js.map +1 -0
  117. package/datasafe/securityPolicyManagement.d.ts +80 -0
  118. package/datasafe/securityPolicyManagement.js +69 -0
  119. package/datasafe/securityPolicyManagement.js.map +1 -0
  120. package/datasafe/sensitiveDataModel.d.ts +3 -3
  121. package/datasafe/setSecurityAssessmentBaseline.d.ts +3 -3
  122. package/datasafe/setUserAssessmentBaseline.d.ts +3 -3
  123. package/datasafe/sqlCollection.d.ts +324 -0
  124. package/datasafe/sqlCollection.js +134 -0
  125. package/datasafe/sqlCollection.js.map +1 -0
  126. package/datasafe/sqlFirewallPolicy.d.ts +297 -0
  127. package/datasafe/sqlFirewallPolicy.js +105 -0
  128. package/datasafe/sqlFirewallPolicy.js.map +1 -0
  129. package/datasafe/sqlFirewallPolicyManagement.d.ts +112 -0
  130. package/datasafe/sqlFirewallPolicyManagement.js +91 -0
  131. package/datasafe/sqlFirewallPolicyManagement.js.map +1 -0
  132. package/datasafe/targetAlertPolicyAssociation.d.ts +3 -3
  133. package/datasafe/userAssessment.d.ts +10 -10
  134. package/disasterrecovery/drPlan.d.ts +34 -34
  135. package/disasterrecovery/drPlan.js +1 -1
  136. package/disasterrecovery/drPlanExecution.d.ts +41 -41
  137. package/disasterrecovery/drPlanExecution.js +1 -1
  138. package/disasterrecovery/drProtectionGroup.d.ts +56 -83
  139. package/disasterrecovery/drProtectionGroup.js +13 -46
  140. package/disasterrecovery/drProtectionGroup.js.map +1 -1
  141. package/disasterrecovery/getDrPlan.d.ts +19 -19
  142. package/disasterrecovery/getDrPlan.js +2 -2
  143. package/disasterrecovery/getDrPlanExecution.d.ts +24 -24
  144. package/disasterrecovery/getDrPlanExecution.js +2 -2
  145. package/disasterrecovery/getDrPlanExecutions.d.ts +15 -15
  146. package/disasterrecovery/getDrPlanExecutions.js +2 -2
  147. package/disasterrecovery/getDrPlans.d.ts +15 -15
  148. package/disasterrecovery/getDrPlans.js +2 -2
  149. package/disasterrecovery/getDrProtectionGroup.d.ts +23 -19
  150. package/disasterrecovery/getDrProtectionGroup.js +2 -2
  151. package/disasterrecovery/getDrProtectionGroup.js.map +1 -1
  152. package/disasterrecovery/getDrProtectionGroups.d.ts +30 -16
  153. package/disasterrecovery/getDrProtectionGroups.js +5 -2
  154. package/disasterrecovery/getDrProtectionGroups.js.map +1 -1
  155. package/index.d.ts +2 -1
  156. package/index.js +4 -2
  157. package/index.js.map +1 -1
  158. package/mysql/getMysqlDbSystem.d.ts +4 -0
  159. package/mysql/getMysqlDbSystem.js.map +1 -1
  160. package/mysql/getMysqlDbSystems.d.ts +14 -0
  161. package/mysql/getMysqlDbSystems.js +3 -0
  162. package/mysql/getMysqlDbSystems.js.map +1 -1
  163. package/mysql/mysqlDbSystem.d.ts +13 -0
  164. package/mysql/mysqlDbSystem.js +3 -0
  165. package/mysql/mysqlDbSystem.js.map +1 -1
  166. package/osmanagementhub/getLifecycleEnvironment.d.ts +129 -0
  167. package/osmanagementhub/getLifecycleEnvironment.js +51 -0
  168. package/osmanagementhub/getLifecycleEnvironment.js.map +1 -0
  169. package/osmanagementhub/getLifecycleEnvironments.d.ts +158 -0
  170. package/osmanagementhub/getLifecycleEnvironments.js +73 -0
  171. package/osmanagementhub/getLifecycleEnvironments.js.map +1 -0
  172. package/osmanagementhub/getLifecycleStage.d.ts +130 -0
  173. package/osmanagementhub/getLifecycleStage.js +51 -0
  174. package/osmanagementhub/getLifecycleStage.js.map +1 -0
  175. package/osmanagementhub/getLifecycleStages.d.ts +133 -0
  176. package/osmanagementhub/getLifecycleStages.js +40 -0
  177. package/osmanagementhub/getLifecycleStages.js.map +1 -0
  178. package/osmanagementhub/getManagedInstanceGroup.d.ts +138 -0
  179. package/osmanagementhub/getManagedInstanceGroup.js +51 -0
  180. package/osmanagementhub/getManagedInstanceGroup.js.map +1 -0
  181. package/osmanagementhub/getManagedInstanceGroupAvailableModules.d.ts +110 -0
  182. package/osmanagementhub/getManagedInstanceGroupAvailableModules.js +63 -0
  183. package/osmanagementhub/getManagedInstanceGroupAvailableModules.js.map +1 -0
  184. package/osmanagementhub/getManagedInstanceGroupAvailablePackages.d.ts +124 -0
  185. package/osmanagementhub/getManagedInstanceGroupAvailablePackages.js +66 -0
  186. package/osmanagementhub/getManagedInstanceGroupAvailablePackages.js.map +1 -0
  187. package/osmanagementhub/getManagedInstanceGroupAvailableSoftwareSources.d.ts +113 -0
  188. package/osmanagementhub/getManagedInstanceGroupAvailableSoftwareSources.js +63 -0
  189. package/osmanagementhub/getManagedInstanceGroupAvailableSoftwareSources.js.map +1 -0
  190. package/osmanagementhub/getManagedInstanceGroups.d.ts +166 -0
  191. package/osmanagementhub/getManagedInstanceGroups.js +76 -0
  192. package/osmanagementhub/getManagedInstanceGroups.js.map +1 -0
  193. package/osmanagementhub/getManagementStation.d.ts +142 -0
  194. package/osmanagementhub/getManagementStation.js +51 -0
  195. package/osmanagementhub/getManagementStation.js.map +1 -0
  196. package/osmanagementhub/getManagementStationMirrors.d.ts +108 -0
  197. package/osmanagementhub/getManagementStationMirrors.js +61 -0
  198. package/osmanagementhub/getManagementStationMirrors.js.map +1 -0
  199. package/osmanagementhub/getManagementStations.d.ts +138 -0
  200. package/osmanagementhub/getManagementStations.js +68 -0
  201. package/osmanagementhub/getManagementStations.js.map +1 -0
  202. package/osmanagementhub/getProfile.d.ts +141 -0
  203. package/osmanagementhub/getProfile.js +51 -0
  204. package/osmanagementhub/getProfile.js.map +1 -0
  205. package/osmanagementhub/getProfiles.d.ts +183 -0
  206. package/osmanagementhub/getProfiles.js +79 -0
  207. package/osmanagementhub/getProfiles.js.map +1 -0
  208. package/osmanagementhub/getSoftwareSource.d.ts +166 -0
  209. package/osmanagementhub/getSoftwareSource.js +51 -0
  210. package/osmanagementhub/getSoftwareSource.js.map +1 -0
  211. package/osmanagementhub/getSoftwareSourceModuleStream.d.ts +119 -0
  212. package/osmanagementhub/getSoftwareSourceModuleStream.js +57 -0
  213. package/osmanagementhub/getSoftwareSourceModuleStream.js.map +1 -0
  214. package/osmanagementhub/getSoftwareSourceModuleStreamProfile.d.ts +118 -0
  215. package/osmanagementhub/getSoftwareSourceModuleStreamProfile.js +60 -0
  216. package/osmanagementhub/getSoftwareSourceModuleStreamProfile.js.map +1 -0
  217. package/osmanagementhub/getSoftwareSourceModuleStreamProfiles.d.ts +116 -0
  218. package/osmanagementhub/getSoftwareSourceModuleStreamProfiles.js +63 -0
  219. package/osmanagementhub/getSoftwareSourceModuleStreamProfiles.js.map +1 -0
  220. package/osmanagementhub/getSoftwareSourceModuleStreams.d.ts +130 -0
  221. package/osmanagementhub/getSoftwareSourceModuleStreams.js +66 -0
  222. package/osmanagementhub/getSoftwareSourceModuleStreams.js.map +1 -0
  223. package/osmanagementhub/getSoftwareSourcePackageGroup.d.ts +106 -0
  224. package/osmanagementhub/getSoftwareSourcePackageGroup.js +54 -0
  225. package/osmanagementhub/getSoftwareSourcePackageGroup.js.map +1 -0
  226. package/osmanagementhub/getSoftwareSourcePackageGroups.d.ts +124 -0
  227. package/osmanagementhub/getSoftwareSourcePackageGroups.js +66 -0
  228. package/osmanagementhub/getSoftwareSourcePackageGroups.js.map +1 -0
  229. package/osmanagementhub/getSoftwareSourceSoftwarePackage.d.ts +131 -0
  230. package/osmanagementhub/getSoftwareSourceSoftwarePackage.js +54 -0
  231. package/osmanagementhub/getSoftwareSourceSoftwarePackage.js.map +1 -0
  232. package/osmanagementhub/getSoftwareSourceSoftwarePackages.d.ts +113 -0
  233. package/osmanagementhub/getSoftwareSourceSoftwarePackages.js +63 -0
  234. package/osmanagementhub/getSoftwareSourceSoftwarePackages.js.map +1 -0
  235. package/osmanagementhub/getSoftwareSourceVendors.d.ts +88 -0
  236. package/osmanagementhub/getSoftwareSourceVendors.js +57 -0
  237. package/osmanagementhub/getSoftwareSourceVendors.js.map +1 -0
  238. package/osmanagementhub/getSoftwareSources.d.ts +208 -0
  239. package/osmanagementhub/getSoftwareSources.js +85 -0
  240. package/osmanagementhub/getSoftwareSources.js.map +1 -0
  241. package/osmanagementhub/index.d.ts +90 -0
  242. package/osmanagementhub/index.js +118 -0
  243. package/osmanagementhub/index.js.map +1 -0
  244. package/osmanagementhub/lifecycleEnvironment.d.ts +259 -0
  245. package/osmanagementhub/lifecycleEnvironment.js +138 -0
  246. package/osmanagementhub/lifecycleEnvironment.js.map +1 -0
  247. package/osmanagementhub/managedInstanceGroup.d.ts +279 -0
  248. package/osmanagementhub/managedInstanceGroup.js +136 -0
  249. package/osmanagementhub/managedInstanceGroup.js.map +1 -0
  250. package/osmanagementhub/managementStation.d.ts +275 -0
  251. package/osmanagementhub/managementStation.js +143 -0
  252. package/osmanagementhub/managementStation.js.map +1 -0
  253. package/osmanagementhub/profile.d.ts +320 -0
  254. package/osmanagementhub/profile.js +138 -0
  255. package/osmanagementhub/profile.js.map +1 -0
  256. package/osmanagementhub/softwareSource.d.ts +343 -0
  257. package/osmanagementhub/softwareSource.js +164 -0
  258. package/osmanagementhub/softwareSource.js.map +1 -0
  259. package/package.json +1 -1
  260. package/stackmonitoring/baselineableMetric.d.ts +227 -0
  261. package/stackmonitoring/baselineableMetric.js +116 -0
  262. package/stackmonitoring/baselineableMetric.js.map +1 -0
  263. package/stackmonitoring/config.d.ts +21 -8
  264. package/stackmonitoring/config.js +3 -6
  265. package/stackmonitoring/config.js.map +1 -1
  266. package/stackmonitoring/discoveryJob.d.ts +1 -0
  267. package/stackmonitoring/discoveryJob.js +1 -0
  268. package/stackmonitoring/discoveryJob.js.map +1 -1
  269. package/stackmonitoring/getBaselineableMetric.d.ts +129 -0
  270. package/stackmonitoring/getBaselineableMetric.js +51 -0
  271. package/stackmonitoring/getBaselineableMetric.js.map +1 -0
  272. package/stackmonitoring/getBaselineableMetrics.d.ts +125 -0
  273. package/stackmonitoring/getBaselineableMetrics.js +65 -0
  274. package/stackmonitoring/getBaselineableMetrics.js.map +1 -0
  275. package/stackmonitoring/getBaselineableMetricsEvaluate.d.ts +117 -0
  276. package/stackmonitoring/getBaselineableMetricsEvaluate.js +77 -0
  277. package/stackmonitoring/getBaselineableMetricsEvaluate.js.map +1 -0
  278. package/stackmonitoring/getConfig.d.ts +5 -1
  279. package/stackmonitoring/getConfig.js.map +1 -1
  280. package/stackmonitoring/getMetricExtension.d.ts +141 -0
  281. package/stackmonitoring/getMetricExtension.js +51 -0
  282. package/stackmonitoring/getMetricExtension.js.map +1 -0
  283. package/stackmonitoring/getMetricExtensions.d.ts +142 -0
  284. package/stackmonitoring/getMetricExtensions.js +67 -0
  285. package/stackmonitoring/getMetricExtensions.js.map +1 -0
  286. package/stackmonitoring/getMonitoredResource.d.ts +4 -0
  287. package/stackmonitoring/getMonitoredResource.js.map +1 -1
  288. package/stackmonitoring/getMonitoredResourceTask.d.ts +114 -0
  289. package/stackmonitoring/getMonitoredResourceTask.js +51 -0
  290. package/stackmonitoring/getMonitoredResourceTask.js.map +1 -0
  291. package/stackmonitoring/getMonitoredResourceTasks.d.ts +86 -0
  292. package/stackmonitoring/getMonitoredResourceTasks.js +55 -0
  293. package/stackmonitoring/getMonitoredResourceTasks.js.map +1 -0
  294. package/stackmonitoring/getMonitoredResourceType.d.ts +118 -0
  295. package/stackmonitoring/getMonitoredResourceType.js +51 -0
  296. package/stackmonitoring/getMonitoredResourceType.js.map +1 -0
  297. package/stackmonitoring/getMonitoredResourceTypes.d.ts +161 -0
  298. package/stackmonitoring/getMonitoredResourceTypes.js +80 -0
  299. package/stackmonitoring/getMonitoredResourceTypes.js.map +1 -0
  300. package/stackmonitoring/getMonitoredResources.d.ts +100 -0
  301. package/stackmonitoring/getMonitoredResources.js +58 -0
  302. package/stackmonitoring/getMonitoredResources.js.map +1 -0
  303. package/stackmonitoring/index.d.ts +48 -0
  304. package/stackmonitoring/index.js +61 -1
  305. package/stackmonitoring/index.js.map +1 -1
  306. package/stackmonitoring/metricExtension.d.ts +313 -0
  307. package/stackmonitoring/metricExtension.js +172 -0
  308. package/stackmonitoring/metricExtension.js.map +1 -0
  309. package/stackmonitoring/metricExtensionMetricExtensionOnGivenResourcesManagement.d.ts +102 -0
  310. package/stackmonitoring/metricExtensionMetricExtensionOnGivenResourcesManagement.js +80 -0
  311. package/stackmonitoring/metricExtensionMetricExtensionOnGivenResourcesManagement.js.map +1 -0
  312. package/stackmonitoring/metricExtensionsTestManagement.d.ts +125 -0
  313. package/stackmonitoring/metricExtensionsTestManagement.js +86 -0
  314. package/stackmonitoring/metricExtensionsTestManagement.js.map +1 -0
  315. package/stackmonitoring/monitoredResource.d.ts +13 -0
  316. package/stackmonitoring/monitoredResource.js +3 -0
  317. package/stackmonitoring/monitoredResource.js.map +1 -1
  318. package/stackmonitoring/monitoredResourceTask.d.ts +200 -0
  319. package/stackmonitoring/monitoredResourceTask.js +113 -0
  320. package/stackmonitoring/monitoredResourceTask.js.map +1 -0
  321. package/stackmonitoring/monitoredResourceType.d.ts +238 -0
  322. package/stackmonitoring/monitoredResourceType.js +118 -0
  323. package/stackmonitoring/monitoredResourceType.js.map +1 -0
  324. package/stackmonitoring/monitoredResourcesSearch.d.ts +13 -0
  325. package/stackmonitoring/monitoredResourcesSearch.js +3 -0
  326. package/stackmonitoring/monitoredResourcesSearch.js.map +1 -1
  327. package/types/input.d.ts +1324 -61
  328. package/types/output.d.ts +8971 -4032
@@ -0,0 +1,90 @@
1
+ "use strict";
2
+ // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+ Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.getSqlFirewallAllowedSqlAnalyticsOutput = exports.getSqlFirewallAllowedSqlAnalytics = void 0;
6
+ const pulumi = require("@pulumi/pulumi");
7
+ const utilities = require("../utilities");
8
+ /**
9
+ * This data source provides the list of Sql Firewall Allowed Sql Analytics in Oracle Cloud Infrastructure Data Safe service.
10
+ *
11
+ * Returns the aggregation details of all SQL firewall allowed SQL statements.
12
+ *
13
+ * The ListSqlFirewallAllowedSqlAnalytics operation returns the aggregates of the SQL firewall allowed SQL statements in the specified `compartmentId`.
14
+ *
15
+ * The parameter `accessLevel` specifies whether to return only those compartments for which the
16
+ * requestor has INSPECT permissions on at least one resource directly
17
+ * or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
18
+ * Principal doesn't have access to even one of the child compartments. This is valid only when
19
+ * `compartmentIdInSubtree` is set to `true`.
20
+ *
21
+ * The parameter `compartmentIdInSubtree` applies when you perform ListSqlFirewallAllowedSqlAnalytics on the
22
+ * `compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
23
+ * To get a full list of all compartments and subcompartments in the tenancy (root compartment),
24
+ * set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
25
+ *
26
+ * ## Example Usage
27
+ *
28
+ * ```typescript
29
+ * import * as pulumi from "@pulumi/pulumi";
30
+ * import * as oci from "@pulumi/oci";
31
+ *
32
+ * const testSqlFirewallAllowedSqlAnalytics = oci.DataSafe.getSqlFirewallAllowedSqlAnalytics({
33
+ * compartmentId: _var.compartment_id,
34
+ * accessLevel: _var.sql_firewall_allowed_sql_analytic_access_level,
35
+ * compartmentIdInSubtree: _var.sql_firewall_allowed_sql_analytic_compartment_id_in_subtree,
36
+ * groupBies: _var.sql_firewall_allowed_sql_analytic_group_by,
37
+ * scimQuery: _var.sql_firewall_allowed_sql_analytic_scim_query,
38
+ * });
39
+ * ```
40
+ */
41
+ function getSqlFirewallAllowedSqlAnalytics(args, opts) {
42
+ opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
43
+ return pulumi.runtime.invoke("oci:DataSafe/getSqlFirewallAllowedSqlAnalytics:getSqlFirewallAllowedSqlAnalytics", {
44
+ "accessLevel": args.accessLevel,
45
+ "compartmentId": args.compartmentId,
46
+ "compartmentIdInSubtree": args.compartmentIdInSubtree,
47
+ "filters": args.filters,
48
+ "groupBies": args.groupBies,
49
+ "scimQuery": args.scimQuery,
50
+ }, opts);
51
+ }
52
+ exports.getSqlFirewallAllowedSqlAnalytics = getSqlFirewallAllowedSqlAnalytics;
53
+ /**
54
+ * This data source provides the list of Sql Firewall Allowed Sql Analytics in Oracle Cloud Infrastructure Data Safe service.
55
+ *
56
+ * Returns the aggregation details of all SQL firewall allowed SQL statements.
57
+ *
58
+ * The ListSqlFirewallAllowedSqlAnalytics operation returns the aggregates of the SQL firewall allowed SQL statements in the specified `compartmentId`.
59
+ *
60
+ * The parameter `accessLevel` specifies whether to return only those compartments for which the
61
+ * requestor has INSPECT permissions on at least one resource directly
62
+ * or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
63
+ * Principal doesn't have access to even one of the child compartments. This is valid only when
64
+ * `compartmentIdInSubtree` is set to `true`.
65
+ *
66
+ * The parameter `compartmentIdInSubtree` applies when you perform ListSqlFirewallAllowedSqlAnalytics on the
67
+ * `compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
68
+ * To get a full list of all compartments and subcompartments in the tenancy (root compartment),
69
+ * set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
70
+ *
71
+ * ## Example Usage
72
+ *
73
+ * ```typescript
74
+ * import * as pulumi from "@pulumi/pulumi";
75
+ * import * as oci from "@pulumi/oci";
76
+ *
77
+ * const testSqlFirewallAllowedSqlAnalytics = oci.DataSafe.getSqlFirewallAllowedSqlAnalytics({
78
+ * compartmentId: _var.compartment_id,
79
+ * accessLevel: _var.sql_firewall_allowed_sql_analytic_access_level,
80
+ * compartmentIdInSubtree: _var.sql_firewall_allowed_sql_analytic_compartment_id_in_subtree,
81
+ * groupBies: _var.sql_firewall_allowed_sql_analytic_group_by,
82
+ * scimQuery: _var.sql_firewall_allowed_sql_analytic_scim_query,
83
+ * });
84
+ * ```
85
+ */
86
+ function getSqlFirewallAllowedSqlAnalyticsOutput(args, opts) {
87
+ return pulumi.output(args).apply((a) => getSqlFirewallAllowedSqlAnalytics(a, opts));
88
+ }
89
+ exports.getSqlFirewallAllowedSqlAnalyticsOutput = getSqlFirewallAllowedSqlAnalyticsOutput;
90
+ //# sourceMappingURL=getSqlFirewallAllowedSqlAnalytics.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"getSqlFirewallAllowedSqlAnalytics.js","sourceRoot":"","sources":["../../datasafe/getSqlFirewallAllowedSqlAnalytics.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAgCG;AACH,SAAgB,iCAAiC,CAAC,IAA2C,EAAE,IAA2B;IAEtH,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,kFAAkF,EAAE;QAC7G,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,eAAe,EAAE,IAAI,CAAC,aAAa;QACnC,wBAAwB,EAAE,IAAI,CAAC,sBAAsB;QACrD,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,WAAW,EAAE,IAAI,CAAC,SAAS;KAC9B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAXD,8EAWC;AAkDD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAgCG;AACH,SAAgB,uCAAuC,CAAC,IAAiD,EAAE,IAA2B;IAClI,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,iCAAiC,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AAC5F,CAAC;AAFD,0FAEC"}
@@ -0,0 +1,138 @@
1
+ import * as pulumi from "@pulumi/pulumi";
2
+ import * as inputs from "../types/input";
3
+ import * as outputs from "../types/output";
4
+ /**
5
+ * This data source provides the list of Sql Firewall Allowed Sqls in Oracle Cloud Infrastructure Data Safe service.
6
+ *
7
+ * Retrieves a list of all SQL firewall allowed SQL statements.
8
+ *
9
+ * The ListSqlFirewallAllowedSqls operation returns only the SQL firewall allowed SQL statements in the specified `compartmentId`.
10
+ *
11
+ * The parameter `accessLevel` specifies whether to return only those compartments for which the
12
+ * requestor has INSPECT permissions on at least one resource directly
13
+ * or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
14
+ * Principal doesn't have access to even one of the child compartments. This is valid only when
15
+ * `compartmentIdInSubtree` is set to `true`.
16
+ *
17
+ * The parameter `compartmentIdInSubtree` applies when you perform ListSqlFirewallPolicies on the
18
+ * `compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
19
+ * To get a full list of all compartments and subcompartments in the tenancy (root compartment),
20
+ * set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
21
+ *
22
+ * ## Example Usage
23
+ *
24
+ * ```typescript
25
+ * import * as pulumi from "@pulumi/pulumi";
26
+ * import * as oci from "@pulumi/oci";
27
+ *
28
+ * const testSqlFirewallAllowedSqls = oci.DataSafe.getSqlFirewallAllowedSqls({
29
+ * compartmentId: _var.compartment_id,
30
+ * accessLevel: _var.sql_firewall_allowed_sql_access_level,
31
+ * compartmentIdInSubtree: _var.sql_firewall_allowed_sql_compartment_id_in_subtree,
32
+ * scimQuery: _var.sql_firewall_allowed_sql_scim_query,
33
+ * });
34
+ * ```
35
+ */
36
+ export declare function getSqlFirewallAllowedSqls(args: GetSqlFirewallAllowedSqlsArgs, opts?: pulumi.InvokeOptions): Promise<GetSqlFirewallAllowedSqlsResult>;
37
+ /**
38
+ * A collection of arguments for invoking getSqlFirewallAllowedSqls.
39
+ */
40
+ export interface GetSqlFirewallAllowedSqlsArgs {
41
+ /**
42
+ * Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
43
+ */
44
+ accessLevel?: string;
45
+ /**
46
+ * A filter to return only resources that match the specified compartment OCID.
47
+ */
48
+ compartmentId: string;
49
+ /**
50
+ * Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
51
+ */
52
+ compartmentIdInSubtree?: boolean;
53
+ filters?: inputs.DataSafe.GetSqlFirewallAllowedSqlsFilter[];
54
+ /**
55
+ * The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at [RFC3339](https://tools.ietf.org/html/draft-ietf-scim-api-12). In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
56
+ *
57
+ * **Example:** query=(currentUser eq 'SCOTT') and (topLevel eq 'YES')
58
+ */
59
+ scimQuery?: string;
60
+ }
61
+ /**
62
+ * A collection of values returned by getSqlFirewallAllowedSqls.
63
+ */
64
+ export interface GetSqlFirewallAllowedSqlsResult {
65
+ readonly accessLevel?: string;
66
+ /**
67
+ * The OCID of the compartment containing the SQL firewall allowed SQL.
68
+ */
69
+ readonly compartmentId: string;
70
+ readonly compartmentIdInSubtree?: boolean;
71
+ readonly filters?: outputs.DataSafe.GetSqlFirewallAllowedSqlsFilter[];
72
+ /**
73
+ * The provider-assigned unique ID for this managed resource.
74
+ */
75
+ readonly id: string;
76
+ readonly scimQuery?: string;
77
+ /**
78
+ * The list of sql_firewall_allowed_sql_collection.
79
+ */
80
+ readonly sqlFirewallAllowedSqlCollections: outputs.DataSafe.GetSqlFirewallAllowedSqlsSqlFirewallAllowedSqlCollection[];
81
+ }
82
+ /**
83
+ * This data source provides the list of Sql Firewall Allowed Sqls in Oracle Cloud Infrastructure Data Safe service.
84
+ *
85
+ * Retrieves a list of all SQL firewall allowed SQL statements.
86
+ *
87
+ * The ListSqlFirewallAllowedSqls operation returns only the SQL firewall allowed SQL statements in the specified `compartmentId`.
88
+ *
89
+ * The parameter `accessLevel` specifies whether to return only those compartments for which the
90
+ * requestor has INSPECT permissions on at least one resource directly
91
+ * or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
92
+ * Principal doesn't have access to even one of the child compartments. This is valid only when
93
+ * `compartmentIdInSubtree` is set to `true`.
94
+ *
95
+ * The parameter `compartmentIdInSubtree` applies when you perform ListSqlFirewallPolicies on the
96
+ * `compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
97
+ * To get a full list of all compartments and subcompartments in the tenancy (root compartment),
98
+ * set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
99
+ *
100
+ * ## Example Usage
101
+ *
102
+ * ```typescript
103
+ * import * as pulumi from "@pulumi/pulumi";
104
+ * import * as oci from "@pulumi/oci";
105
+ *
106
+ * const testSqlFirewallAllowedSqls = oci.DataSafe.getSqlFirewallAllowedSqls({
107
+ * compartmentId: _var.compartment_id,
108
+ * accessLevel: _var.sql_firewall_allowed_sql_access_level,
109
+ * compartmentIdInSubtree: _var.sql_firewall_allowed_sql_compartment_id_in_subtree,
110
+ * scimQuery: _var.sql_firewall_allowed_sql_scim_query,
111
+ * });
112
+ * ```
113
+ */
114
+ export declare function getSqlFirewallAllowedSqlsOutput(args: GetSqlFirewallAllowedSqlsOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetSqlFirewallAllowedSqlsResult>;
115
+ /**
116
+ * A collection of arguments for invoking getSqlFirewallAllowedSqls.
117
+ */
118
+ export interface GetSqlFirewallAllowedSqlsOutputArgs {
119
+ /**
120
+ * Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
121
+ */
122
+ accessLevel?: pulumi.Input<string>;
123
+ /**
124
+ * A filter to return only resources that match the specified compartment OCID.
125
+ */
126
+ compartmentId: pulumi.Input<string>;
127
+ /**
128
+ * Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
129
+ */
130
+ compartmentIdInSubtree?: pulumi.Input<boolean>;
131
+ filters?: pulumi.Input<pulumi.Input<inputs.DataSafe.GetSqlFirewallAllowedSqlsFilterArgs>[]>;
132
+ /**
133
+ * The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at [RFC3339](https://tools.ietf.org/html/draft-ietf-scim-api-12). In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
134
+ *
135
+ * **Example:** query=(currentUser eq 'SCOTT') and (topLevel eq 'YES')
136
+ */
137
+ scimQuery?: pulumi.Input<string>;
138
+ }
@@ -0,0 +1,87 @@
1
+ "use strict";
2
+ // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+ Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.getSqlFirewallAllowedSqlsOutput = exports.getSqlFirewallAllowedSqls = void 0;
6
+ const pulumi = require("@pulumi/pulumi");
7
+ const utilities = require("../utilities");
8
+ /**
9
+ * This data source provides the list of Sql Firewall Allowed Sqls in Oracle Cloud Infrastructure Data Safe service.
10
+ *
11
+ * Retrieves a list of all SQL firewall allowed SQL statements.
12
+ *
13
+ * The ListSqlFirewallAllowedSqls operation returns only the SQL firewall allowed SQL statements in the specified `compartmentId`.
14
+ *
15
+ * The parameter `accessLevel` specifies whether to return only those compartments for which the
16
+ * requestor has INSPECT permissions on at least one resource directly
17
+ * or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
18
+ * Principal doesn't have access to even one of the child compartments. This is valid only when
19
+ * `compartmentIdInSubtree` is set to `true`.
20
+ *
21
+ * The parameter `compartmentIdInSubtree` applies when you perform ListSqlFirewallPolicies on the
22
+ * `compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
23
+ * To get a full list of all compartments and subcompartments in the tenancy (root compartment),
24
+ * set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
25
+ *
26
+ * ## Example Usage
27
+ *
28
+ * ```typescript
29
+ * import * as pulumi from "@pulumi/pulumi";
30
+ * import * as oci from "@pulumi/oci";
31
+ *
32
+ * const testSqlFirewallAllowedSqls = oci.DataSafe.getSqlFirewallAllowedSqls({
33
+ * compartmentId: _var.compartment_id,
34
+ * accessLevel: _var.sql_firewall_allowed_sql_access_level,
35
+ * compartmentIdInSubtree: _var.sql_firewall_allowed_sql_compartment_id_in_subtree,
36
+ * scimQuery: _var.sql_firewall_allowed_sql_scim_query,
37
+ * });
38
+ * ```
39
+ */
40
+ function getSqlFirewallAllowedSqls(args, opts) {
41
+ opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
42
+ return pulumi.runtime.invoke("oci:DataSafe/getSqlFirewallAllowedSqls:getSqlFirewallAllowedSqls", {
43
+ "accessLevel": args.accessLevel,
44
+ "compartmentId": args.compartmentId,
45
+ "compartmentIdInSubtree": args.compartmentIdInSubtree,
46
+ "filters": args.filters,
47
+ "scimQuery": args.scimQuery,
48
+ }, opts);
49
+ }
50
+ exports.getSqlFirewallAllowedSqls = getSqlFirewallAllowedSqls;
51
+ /**
52
+ * This data source provides the list of Sql Firewall Allowed Sqls in Oracle Cloud Infrastructure Data Safe service.
53
+ *
54
+ * Retrieves a list of all SQL firewall allowed SQL statements.
55
+ *
56
+ * The ListSqlFirewallAllowedSqls operation returns only the SQL firewall allowed SQL statements in the specified `compartmentId`.
57
+ *
58
+ * The parameter `accessLevel` specifies whether to return only those compartments for which the
59
+ * requestor has INSPECT permissions on at least one resource directly
60
+ * or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
61
+ * Principal doesn't have access to even one of the child compartments. This is valid only when
62
+ * `compartmentIdInSubtree` is set to `true`.
63
+ *
64
+ * The parameter `compartmentIdInSubtree` applies when you perform ListSqlFirewallPolicies on the
65
+ * `compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
66
+ * To get a full list of all compartments and subcompartments in the tenancy (root compartment),
67
+ * set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
68
+ *
69
+ * ## Example Usage
70
+ *
71
+ * ```typescript
72
+ * import * as pulumi from "@pulumi/pulumi";
73
+ * import * as oci from "@pulumi/oci";
74
+ *
75
+ * const testSqlFirewallAllowedSqls = oci.DataSafe.getSqlFirewallAllowedSqls({
76
+ * compartmentId: _var.compartment_id,
77
+ * accessLevel: _var.sql_firewall_allowed_sql_access_level,
78
+ * compartmentIdInSubtree: _var.sql_firewall_allowed_sql_compartment_id_in_subtree,
79
+ * scimQuery: _var.sql_firewall_allowed_sql_scim_query,
80
+ * });
81
+ * ```
82
+ */
83
+ function getSqlFirewallAllowedSqlsOutput(args, opts) {
84
+ return pulumi.output(args).apply((a) => getSqlFirewallAllowedSqls(a, opts));
85
+ }
86
+ exports.getSqlFirewallAllowedSqlsOutput = getSqlFirewallAllowedSqlsOutput;
87
+ //# sourceMappingURL=getSqlFirewallAllowedSqls.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"getSqlFirewallAllowedSqls.js","sourceRoot":"","sources":["../../datasafe/getSqlFirewallAllowedSqls.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+BG;AACH,SAAgB,yBAAyB,CAAC,IAAmC,EAAE,IAA2B;IAEtG,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,kEAAkE,EAAE;QAC7F,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,eAAe,EAAE,IAAI,CAAC,aAAa;QACnC,wBAAwB,EAAE,IAAI,CAAC,sBAAsB;QACrD,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,WAAW,EAAE,IAAI,CAAC,SAAS;KAC9B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAVD,8DAUC;AAgDD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+BG;AACH,SAAgB,+BAA+B,CAAC,IAAyC,EAAE,IAA2B;IAClH,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,yBAAyB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACpF,CAAC;AAFD,0EAEC"}
@@ -0,0 +1,234 @@
1
+ import * as pulumi from "@pulumi/pulumi";
2
+ import * as inputs from "../types/input";
3
+ import * as outputs from "../types/output";
4
+ /**
5
+ * This data source provides the list of Sql Firewall Policies in Oracle Cloud Infrastructure Data Safe service.
6
+ *
7
+ * Retrieves a list of all SQL firewall policies.
8
+ *
9
+ * The ListSqlFirewallPolicies operation returns only the SQL firewall policies in the specified `compartmentId`.
10
+ *
11
+ * The parameter `accessLevel` specifies whether to return only those compartments for which the
12
+ * requestor has INSPECT permissions on at least one resource directly
13
+ * or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
14
+ * Principal doesn't have access to even one of the child compartments. This is valid only when
15
+ * `compartmentIdInSubtree` is set to `true`.
16
+ *
17
+ * The parameter `compartmentIdInSubtree` applies when you perform ListSqlFirewallPolicies on the
18
+ * `compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
19
+ * To get a full list of all compartments and subcompartments in the tenancy (root compartment),
20
+ * set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
21
+ *
22
+ * ## Example Usage
23
+ *
24
+ * ```typescript
25
+ * import * as pulumi from "@pulumi/pulumi";
26
+ * import * as oci from "@pulumi/oci";
27
+ *
28
+ * const testSqlFirewallPolicies = oci.DataSafe.getSqlFirewallPolicies({
29
+ * compartmentId: _var.compartment_id,
30
+ * accessLevel: _var.sql_firewall_policy_access_level,
31
+ * compartmentIdInSubtree: _var.sql_firewall_policy_compartment_id_in_subtree,
32
+ * dbUserName: oci_identity_user.test_user.name,
33
+ * displayName: _var.sql_firewall_policy_display_name,
34
+ * securityPolicyId: oci_data_safe_security_policy.test_security_policy.id,
35
+ * sqlFirewallPolicyId: oci_data_safe_sql_firewall_policy.test_sql_firewall_policy.id,
36
+ * state: _var.sql_firewall_policy_state,
37
+ * timeCreatedGreaterThanOrEqualTo: _var.sql_firewall_policy_time_created_greater_than_or_equal_to,
38
+ * timeCreatedLessThan: _var.sql_firewall_policy_time_created_less_than,
39
+ * violationAction: _var.sql_firewall_policy_violation_action,
40
+ * });
41
+ * ```
42
+ */
43
+ export declare function getSqlFirewallPolicies(args: GetSqlFirewallPoliciesArgs, opts?: pulumi.InvokeOptions): Promise<GetSqlFirewallPoliciesResult>;
44
+ /**
45
+ * A collection of arguments for invoking getSqlFirewallPolicies.
46
+ */
47
+ export interface GetSqlFirewallPoliciesArgs {
48
+ /**
49
+ * Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
50
+ */
51
+ accessLevel?: string;
52
+ /**
53
+ * A filter to return only resources that match the specified compartment OCID.
54
+ */
55
+ compartmentId: string;
56
+ /**
57
+ * Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
58
+ */
59
+ compartmentIdInSubtree?: boolean;
60
+ /**
61
+ * A filter to return only items that match the specified user name.
62
+ */
63
+ dbUserName?: string;
64
+ /**
65
+ * A filter to return only resources that match the specified display name.
66
+ */
67
+ displayName?: string;
68
+ filters?: inputs.DataSafe.GetSqlFirewallPoliciesFilter[];
69
+ /**
70
+ * An optional filter to return only resources that match the specified OCID of the security policy resource.
71
+ */
72
+ securityPolicyId?: string;
73
+ /**
74
+ * An optional filter to return only resources that match the specified OCID of the SQL firewall policy resource.
75
+ */
76
+ sqlFirewallPolicyId?: string;
77
+ /**
78
+ * The current state of the SQL firewall policy.
79
+ */
80
+ state?: string;
81
+ /**
82
+ * A filter to return only the resources that were created after the specified date and time, as defined by [RFC3339](https://tools.ietf.org/html/rfc3339). Using TimeCreatedGreaterThanOrEqualToQueryParam parameter retrieves all resources created after that date.
83
+ *
84
+ * **Example:** 2016-12-19T16:39:57.600Z
85
+ */
86
+ timeCreatedGreaterThanOrEqualTo?: string;
87
+ /**
88
+ * Search for resources that were created before a specific date. Specifying this parameter corresponding `timeCreatedLessThan` parameter will retrieve all resources created before the specified created date, in "YYYY-MM-ddThh:mmZ" format with a Z offset, as defined by RFC 3339.
89
+ *
90
+ * **Example:** 2016-12-19T16:39:57.600Z
91
+ */
92
+ timeCreatedLessThan?: string;
93
+ /**
94
+ * An optional filter to return only resources that match the specified violation action.
95
+ */
96
+ violationAction?: string;
97
+ }
98
+ /**
99
+ * A collection of values returned by getSqlFirewallPolicies.
100
+ */
101
+ export interface GetSqlFirewallPoliciesResult {
102
+ readonly accessLevel?: string;
103
+ /**
104
+ * The OCID of the compartment containing the SQL firewall policy.
105
+ */
106
+ readonly compartmentId: string;
107
+ readonly compartmentIdInSubtree?: boolean;
108
+ /**
109
+ * The database user name.
110
+ */
111
+ readonly dbUserName?: string;
112
+ /**
113
+ * The display name of the SQL firewall policy.
114
+ */
115
+ readonly displayName?: string;
116
+ readonly filters?: outputs.DataSafe.GetSqlFirewallPoliciesFilter[];
117
+ /**
118
+ * The provider-assigned unique ID for this managed resource.
119
+ */
120
+ readonly id: string;
121
+ /**
122
+ * The OCID of the security policy corresponding to the SQL firewall policy.
123
+ */
124
+ readonly securityPolicyId?: string;
125
+ /**
126
+ * The list of sql_firewall_policy_collection.
127
+ */
128
+ readonly sqlFirewallPolicyCollections: outputs.DataSafe.GetSqlFirewallPoliciesSqlFirewallPolicyCollection[];
129
+ readonly sqlFirewallPolicyId?: string;
130
+ /**
131
+ * The current state of the SQL firewall policy.
132
+ */
133
+ readonly state?: string;
134
+ readonly timeCreatedGreaterThanOrEqualTo?: string;
135
+ readonly timeCreatedLessThan?: string;
136
+ /**
137
+ * Specifies the mode in which the SQL firewall policy is enabled.
138
+ */
139
+ readonly violationAction?: string;
140
+ }
141
+ /**
142
+ * This data source provides the list of Sql Firewall Policies in Oracle Cloud Infrastructure Data Safe service.
143
+ *
144
+ * Retrieves a list of all SQL firewall policies.
145
+ *
146
+ * The ListSqlFirewallPolicies operation returns only the SQL firewall policies in the specified `compartmentId`.
147
+ *
148
+ * The parameter `accessLevel` specifies whether to return only those compartments for which the
149
+ * requestor has INSPECT permissions on at least one resource directly
150
+ * or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
151
+ * Principal doesn't have access to even one of the child compartments. This is valid only when
152
+ * `compartmentIdInSubtree` is set to `true`.
153
+ *
154
+ * The parameter `compartmentIdInSubtree` applies when you perform ListSqlFirewallPolicies on the
155
+ * `compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
156
+ * To get a full list of all compartments and subcompartments in the tenancy (root compartment),
157
+ * set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
158
+ *
159
+ * ## Example Usage
160
+ *
161
+ * ```typescript
162
+ * import * as pulumi from "@pulumi/pulumi";
163
+ * import * as oci from "@pulumi/oci";
164
+ *
165
+ * const testSqlFirewallPolicies = oci.DataSafe.getSqlFirewallPolicies({
166
+ * compartmentId: _var.compartment_id,
167
+ * accessLevel: _var.sql_firewall_policy_access_level,
168
+ * compartmentIdInSubtree: _var.sql_firewall_policy_compartment_id_in_subtree,
169
+ * dbUserName: oci_identity_user.test_user.name,
170
+ * displayName: _var.sql_firewall_policy_display_name,
171
+ * securityPolicyId: oci_data_safe_security_policy.test_security_policy.id,
172
+ * sqlFirewallPolicyId: oci_data_safe_sql_firewall_policy.test_sql_firewall_policy.id,
173
+ * state: _var.sql_firewall_policy_state,
174
+ * timeCreatedGreaterThanOrEqualTo: _var.sql_firewall_policy_time_created_greater_than_or_equal_to,
175
+ * timeCreatedLessThan: _var.sql_firewall_policy_time_created_less_than,
176
+ * violationAction: _var.sql_firewall_policy_violation_action,
177
+ * });
178
+ * ```
179
+ */
180
+ export declare function getSqlFirewallPoliciesOutput(args: GetSqlFirewallPoliciesOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetSqlFirewallPoliciesResult>;
181
+ /**
182
+ * A collection of arguments for invoking getSqlFirewallPolicies.
183
+ */
184
+ export interface GetSqlFirewallPoliciesOutputArgs {
185
+ /**
186
+ * Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
187
+ */
188
+ accessLevel?: pulumi.Input<string>;
189
+ /**
190
+ * A filter to return only resources that match the specified compartment OCID.
191
+ */
192
+ compartmentId: pulumi.Input<string>;
193
+ /**
194
+ * Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
195
+ */
196
+ compartmentIdInSubtree?: pulumi.Input<boolean>;
197
+ /**
198
+ * A filter to return only items that match the specified user name.
199
+ */
200
+ dbUserName?: pulumi.Input<string>;
201
+ /**
202
+ * A filter to return only resources that match the specified display name.
203
+ */
204
+ displayName?: pulumi.Input<string>;
205
+ filters?: pulumi.Input<pulumi.Input<inputs.DataSafe.GetSqlFirewallPoliciesFilterArgs>[]>;
206
+ /**
207
+ * An optional filter to return only resources that match the specified OCID of the security policy resource.
208
+ */
209
+ securityPolicyId?: pulumi.Input<string>;
210
+ /**
211
+ * An optional filter to return only resources that match the specified OCID of the SQL firewall policy resource.
212
+ */
213
+ sqlFirewallPolicyId?: pulumi.Input<string>;
214
+ /**
215
+ * The current state of the SQL firewall policy.
216
+ */
217
+ state?: pulumi.Input<string>;
218
+ /**
219
+ * A filter to return only the resources that were created after the specified date and time, as defined by [RFC3339](https://tools.ietf.org/html/rfc3339). Using TimeCreatedGreaterThanOrEqualToQueryParam parameter retrieves all resources created after that date.
220
+ *
221
+ * **Example:** 2016-12-19T16:39:57.600Z
222
+ */
223
+ timeCreatedGreaterThanOrEqualTo?: pulumi.Input<string>;
224
+ /**
225
+ * Search for resources that were created before a specific date. Specifying this parameter corresponding `timeCreatedLessThan` parameter will retrieve all resources created before the specified created date, in "YYYY-MM-ddThh:mmZ" format with a Z offset, as defined by RFC 3339.
226
+ *
227
+ * **Example:** 2016-12-19T16:39:57.600Z
228
+ */
229
+ timeCreatedLessThan?: pulumi.Input<string>;
230
+ /**
231
+ * An optional filter to return only resources that match the specified violation action.
232
+ */
233
+ violationAction?: pulumi.Input<string>;
234
+ }
@@ -0,0 +1,108 @@
1
+ "use strict";
2
+ // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+ Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.getSqlFirewallPoliciesOutput = exports.getSqlFirewallPolicies = void 0;
6
+ const pulumi = require("@pulumi/pulumi");
7
+ const utilities = require("../utilities");
8
+ /**
9
+ * This data source provides the list of Sql Firewall Policies in Oracle Cloud Infrastructure Data Safe service.
10
+ *
11
+ * Retrieves a list of all SQL firewall policies.
12
+ *
13
+ * The ListSqlFirewallPolicies operation returns only the SQL firewall policies in the specified `compartmentId`.
14
+ *
15
+ * The parameter `accessLevel` specifies whether to return only those compartments for which the
16
+ * requestor has INSPECT permissions on at least one resource directly
17
+ * or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
18
+ * Principal doesn't have access to even one of the child compartments. This is valid only when
19
+ * `compartmentIdInSubtree` is set to `true`.
20
+ *
21
+ * The parameter `compartmentIdInSubtree` applies when you perform ListSqlFirewallPolicies on the
22
+ * `compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
23
+ * To get a full list of all compartments and subcompartments in the tenancy (root compartment),
24
+ * set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
25
+ *
26
+ * ## Example Usage
27
+ *
28
+ * ```typescript
29
+ * import * as pulumi from "@pulumi/pulumi";
30
+ * import * as oci from "@pulumi/oci";
31
+ *
32
+ * const testSqlFirewallPolicies = oci.DataSafe.getSqlFirewallPolicies({
33
+ * compartmentId: _var.compartment_id,
34
+ * accessLevel: _var.sql_firewall_policy_access_level,
35
+ * compartmentIdInSubtree: _var.sql_firewall_policy_compartment_id_in_subtree,
36
+ * dbUserName: oci_identity_user.test_user.name,
37
+ * displayName: _var.sql_firewall_policy_display_name,
38
+ * securityPolicyId: oci_data_safe_security_policy.test_security_policy.id,
39
+ * sqlFirewallPolicyId: oci_data_safe_sql_firewall_policy.test_sql_firewall_policy.id,
40
+ * state: _var.sql_firewall_policy_state,
41
+ * timeCreatedGreaterThanOrEqualTo: _var.sql_firewall_policy_time_created_greater_than_or_equal_to,
42
+ * timeCreatedLessThan: _var.sql_firewall_policy_time_created_less_than,
43
+ * violationAction: _var.sql_firewall_policy_violation_action,
44
+ * });
45
+ * ```
46
+ */
47
+ function getSqlFirewallPolicies(args, opts) {
48
+ opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
49
+ return pulumi.runtime.invoke("oci:DataSafe/getSqlFirewallPolicies:getSqlFirewallPolicies", {
50
+ "accessLevel": args.accessLevel,
51
+ "compartmentId": args.compartmentId,
52
+ "compartmentIdInSubtree": args.compartmentIdInSubtree,
53
+ "dbUserName": args.dbUserName,
54
+ "displayName": args.displayName,
55
+ "filters": args.filters,
56
+ "securityPolicyId": args.securityPolicyId,
57
+ "sqlFirewallPolicyId": args.sqlFirewallPolicyId,
58
+ "state": args.state,
59
+ "timeCreatedGreaterThanOrEqualTo": args.timeCreatedGreaterThanOrEqualTo,
60
+ "timeCreatedLessThan": args.timeCreatedLessThan,
61
+ "violationAction": args.violationAction,
62
+ }, opts);
63
+ }
64
+ exports.getSqlFirewallPolicies = getSqlFirewallPolicies;
65
+ /**
66
+ * This data source provides the list of Sql Firewall Policies in Oracle Cloud Infrastructure Data Safe service.
67
+ *
68
+ * Retrieves a list of all SQL firewall policies.
69
+ *
70
+ * The ListSqlFirewallPolicies operation returns only the SQL firewall policies in the specified `compartmentId`.
71
+ *
72
+ * The parameter `accessLevel` specifies whether to return only those compartments for which the
73
+ * requestor has INSPECT permissions on at least one resource directly
74
+ * or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
75
+ * Principal doesn't have access to even one of the child compartments. This is valid only when
76
+ * `compartmentIdInSubtree` is set to `true`.
77
+ *
78
+ * The parameter `compartmentIdInSubtree` applies when you perform ListSqlFirewallPolicies on the
79
+ * `compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
80
+ * To get a full list of all compartments and subcompartments in the tenancy (root compartment),
81
+ * set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
82
+ *
83
+ * ## Example Usage
84
+ *
85
+ * ```typescript
86
+ * import * as pulumi from "@pulumi/pulumi";
87
+ * import * as oci from "@pulumi/oci";
88
+ *
89
+ * const testSqlFirewallPolicies = oci.DataSafe.getSqlFirewallPolicies({
90
+ * compartmentId: _var.compartment_id,
91
+ * accessLevel: _var.sql_firewall_policy_access_level,
92
+ * compartmentIdInSubtree: _var.sql_firewall_policy_compartment_id_in_subtree,
93
+ * dbUserName: oci_identity_user.test_user.name,
94
+ * displayName: _var.sql_firewall_policy_display_name,
95
+ * securityPolicyId: oci_data_safe_security_policy.test_security_policy.id,
96
+ * sqlFirewallPolicyId: oci_data_safe_sql_firewall_policy.test_sql_firewall_policy.id,
97
+ * state: _var.sql_firewall_policy_state,
98
+ * timeCreatedGreaterThanOrEqualTo: _var.sql_firewall_policy_time_created_greater_than_or_equal_to,
99
+ * timeCreatedLessThan: _var.sql_firewall_policy_time_created_less_than,
100
+ * violationAction: _var.sql_firewall_policy_violation_action,
101
+ * });
102
+ * ```
103
+ */
104
+ function getSqlFirewallPoliciesOutput(args, opts) {
105
+ return pulumi.output(args).apply((a) => getSqlFirewallPolicies(a, opts));
106
+ }
107
+ exports.getSqlFirewallPoliciesOutput = getSqlFirewallPoliciesOutput;
108
+ //# sourceMappingURL=getSqlFirewallPolicies.js.map