@pulumi/oci 1.15.0 → 1.16.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/databasemanagement/getManagedMySqlDatabase.d.ts +83 -0
- package/databasemanagement/getManagedMySqlDatabase.js +51 -0
- package/databasemanagement/getManagedMySqlDatabase.js.map +1 -0
- package/databasemanagement/getManagedMySqlDatabaseConfigurationData.d.ts +72 -0
- package/databasemanagement/getManagedMySqlDatabaseConfigurationData.js +52 -0
- package/databasemanagement/getManagedMySqlDatabaseConfigurationData.js.map +1 -0
- package/databasemanagement/getManagedMySqlDatabaseSqlData.d.ts +105 -0
- package/databasemanagement/getManagedMySqlDatabaseSqlData.js +61 -0
- package/databasemanagement/getManagedMySqlDatabaseSqlData.js.map +1 -0
- package/databasemanagement/getManagedMySqlDatabases.d.ts +75 -0
- package/databasemanagement/getManagedMySqlDatabases.js +52 -0
- package/databasemanagement/getManagedMySqlDatabases.js.map +1 -0
- package/databasemanagement/index.d.ts +12 -0
- package/databasemanagement/index.js +13 -1
- package/databasemanagement/index.js.map +1 -1
- package/datasafe/databaseSecurityConfig.d.ts +231 -0
- package/datasafe/databaseSecurityConfig.js +93 -0
- package/datasafe/databaseSecurityConfig.js.map +1 -0
- package/datasafe/databaseSecurityConfigManagement.d.ts +90 -0
- package/datasafe/databaseSecurityConfigManagement.js +75 -0
- package/datasafe/databaseSecurityConfigManagement.js.map +1 -0
- package/datasafe/discoveryMod.d.ts +3 -3
- package/datasafe/getDatabaseSecurityConfig.d.ts +123 -0
- package/datasafe/getDatabaseSecurityConfig.js +51 -0
- package/datasafe/getDatabaseSecurityConfig.js.map +1 -0
- package/datasafe/getDatabaseSecurityConfigs.d.ts +206 -0
- package/datasafe/getDatabaseSecurityConfigs.js +102 -0
- package/datasafe/getDatabaseSecurityConfigs.js.map +1 -0
- package/datasafe/getDiscoveryJob.d.ts +1 -1
- package/datasafe/getDiscoveryJobsResult.d.ts +1 -1
- package/datasafe/getDiscoveryJobsResults.d.ts +1 -1
- package/datasafe/getMaskingPoliciesMaskingColumn.d.ts +1 -1
- package/datasafe/getMaskingPoliciesMaskingColumns.d.ts +1 -1
- package/datasafe/getMaskingPolicy.d.ts +1 -1
- package/datasafe/getSecurityAssessment.d.ts +3 -3
- package/datasafe/getSecurityAssessmentComparison.d.ts +4 -4
- package/datasafe/getSecurityAssessmentComparison.js +2 -2
- package/datasafe/getSecurityAssessmentFindings.d.ts +6 -6
- package/datasafe/getSecurityAssessmentFindings.js +2 -2
- package/datasafe/getSecurityAssessments.d.ts +2 -2
- package/datasafe/getSecurityPolicies.d.ts +162 -0
- package/datasafe/getSecurityPolicies.js +93 -0
- package/datasafe/getSecurityPolicies.js.map +1 -0
- package/datasafe/getSecurityPolicy.d.ts +109 -0
- package/datasafe/getSecurityPolicy.js +51 -0
- package/datasafe/getSecurityPolicy.js.map +1 -0
- package/datasafe/getSecurityPolicyDeployment.d.ts +117 -0
- package/datasafe/getSecurityPolicyDeployment.js +51 -0
- package/datasafe/getSecurityPolicyDeployment.js.map +1 -0
- package/datasafe/getSecurityPolicyDeploymentSecurityPolicyEntryState.d.ts +90 -0
- package/datasafe/getSecurityPolicyDeploymentSecurityPolicyEntryState.js +54 -0
- package/datasafe/getSecurityPolicyDeploymentSecurityPolicyEntryState.js.map +1 -0
- package/datasafe/getSecurityPolicyDeploymentSecurityPolicyEntryStates.d.ts +107 -0
- package/datasafe/getSecurityPolicyDeploymentSecurityPolicyEntryStates.js +62 -0
- package/datasafe/getSecurityPolicyDeploymentSecurityPolicyEntryStates.js.map +1 -0
- package/datasafe/getSecurityPolicyDeployments.d.ts +190 -0
- package/datasafe/getSecurityPolicyDeployments.js +99 -0
- package/datasafe/getSecurityPolicyDeployments.js.map +1 -0
- package/datasafe/getSensitiveDataModel.d.ts +1 -1
- package/datasafe/getSqlCollection.d.ts +138 -0
- package/datasafe/getSqlCollection.js +51 -0
- package/datasafe/getSqlCollection.js.map +1 -0
- package/datasafe/getSqlCollectionAnalytics.d.ts +181 -0
- package/datasafe/getSqlCollectionAnalytics.js +99 -0
- package/datasafe/getSqlCollectionAnalytics.js.map +1 -0
- package/datasafe/getSqlCollectionLogInsights.d.ts +111 -0
- package/datasafe/getSqlCollectionLogInsights.js +61 -0
- package/datasafe/getSqlCollectionLogInsights.js.map +1 -0
- package/datasafe/getSqlCollections.d.ts +220 -0
- package/datasafe/getSqlCollections.js +105 -0
- package/datasafe/getSqlCollections.js.map +1 -0
- package/datasafe/getSqlFirewallAllowedSqlAnalytics.d.ts +146 -0
- package/datasafe/getSqlFirewallAllowedSqlAnalytics.js +90 -0
- package/datasafe/getSqlFirewallAllowedSqlAnalytics.js.map +1 -0
- package/datasafe/getSqlFirewallAllowedSqls.d.ts +138 -0
- package/datasafe/getSqlFirewallAllowedSqls.js +87 -0
- package/datasafe/getSqlFirewallAllowedSqls.js.map +1 -0
- package/datasafe/getSqlFirewallPolicies.d.ts +234 -0
- package/datasafe/getSqlFirewallPolicies.js +108 -0
- package/datasafe/getSqlFirewallPolicies.js.map +1 -0
- package/datasafe/getSqlFirewallPolicy.d.ts +149 -0
- package/datasafe/getSqlFirewallPolicy.js +51 -0
- package/datasafe/getSqlFirewallPolicy.js.map +1 -0
- package/datasafe/getSqlFirewallPolicyAnalytics.d.ts +177 -0
- package/datasafe/getSqlFirewallPolicyAnalytics.js +95 -0
- package/datasafe/getSqlFirewallPolicyAnalytics.js.map +1 -0
- package/datasafe/getSqlFirewallViolationAnalytics.d.ts +170 -0
- package/datasafe/getSqlFirewallViolationAnalytics.js +76 -0
- package/datasafe/getSqlFirewallViolationAnalytics.js.map +1 -0
- package/datasafe/getSqlFirewallViolations.d.ts +112 -0
- package/datasafe/getSqlFirewallViolations.js +61 -0
- package/datasafe/getSqlFirewallViolations.js.map +1 -0
- package/datasafe/getTargetAlertPolicyAssociation.d.ts +1 -1
- package/datasafe/getUserAssessment.d.ts +5 -5
- package/datasafe/getUserAssessmentComparison.d.ts +2 -2
- package/datasafe/getUserAssessmentComparison.js +2 -2
- package/datasafe/getUserAssessmentUserAnalytics.d.ts +2 -2
- package/datasafe/getUserAssessmentUserAnalytics.js +2 -2
- package/datasafe/getUserAssessmentUsers.d.ts +1 -1
- package/datasafe/getUserAssessments.d.ts +2 -2
- package/datasafe/index.d.ts +84 -0
- package/datasafe/index.js +108 -5
- package/datasafe/index.js.map +1 -1
- package/datasafe/maskingPoliciesMaskingColumn.d.ts +3 -3
- package/datasafe/maskingPolicy.d.ts +4 -4
- package/datasafe/maskingPolicy.js +1 -1
- package/datasafe/securityAssessment.d.ts +6 -6
- package/datasafe/securityPolicy.d.ts +189 -0
- package/datasafe/securityPolicy.js +85 -0
- package/datasafe/securityPolicy.js.map +1 -0
- package/datasafe/securityPolicyDeployment.d.ts +205 -0
- package/datasafe/securityPolicyDeployment.js +89 -0
- package/datasafe/securityPolicyDeployment.js.map +1 -0
- package/datasafe/securityPolicyDeploymentManagement.d.ts +82 -0
- package/datasafe/securityPolicyDeploymentManagement.js +71 -0
- package/datasafe/securityPolicyDeploymentManagement.js.map +1 -0
- package/datasafe/securityPolicyManagement.d.ts +80 -0
- package/datasafe/securityPolicyManagement.js +69 -0
- package/datasafe/securityPolicyManagement.js.map +1 -0
- package/datasafe/sensitiveDataModel.d.ts +3 -3
- package/datasafe/setSecurityAssessmentBaseline.d.ts +3 -3
- package/datasafe/setUserAssessmentBaseline.d.ts +3 -3
- package/datasafe/sqlCollection.d.ts +324 -0
- package/datasafe/sqlCollection.js +134 -0
- package/datasafe/sqlCollection.js.map +1 -0
- package/datasafe/sqlFirewallPolicy.d.ts +297 -0
- package/datasafe/sqlFirewallPolicy.js +105 -0
- package/datasafe/sqlFirewallPolicy.js.map +1 -0
- package/datasafe/sqlFirewallPolicyManagement.d.ts +112 -0
- package/datasafe/sqlFirewallPolicyManagement.js +91 -0
- package/datasafe/sqlFirewallPolicyManagement.js.map +1 -0
- package/datasafe/targetAlertPolicyAssociation.d.ts +3 -3
- package/datasafe/userAssessment.d.ts +10 -10
- package/disasterrecovery/drPlan.d.ts +34 -34
- package/disasterrecovery/drPlan.js +1 -1
- package/disasterrecovery/drPlanExecution.d.ts +41 -41
- package/disasterrecovery/drPlanExecution.js +1 -1
- package/disasterrecovery/drProtectionGroup.d.ts +56 -83
- package/disasterrecovery/drProtectionGroup.js +13 -46
- package/disasterrecovery/drProtectionGroup.js.map +1 -1
- package/disasterrecovery/getDrPlan.d.ts +19 -19
- package/disasterrecovery/getDrPlan.js +2 -2
- package/disasterrecovery/getDrPlanExecution.d.ts +24 -24
- package/disasterrecovery/getDrPlanExecution.js +2 -2
- package/disasterrecovery/getDrPlanExecutions.d.ts +15 -15
- package/disasterrecovery/getDrPlanExecutions.js +2 -2
- package/disasterrecovery/getDrPlans.d.ts +15 -15
- package/disasterrecovery/getDrPlans.js +2 -2
- package/disasterrecovery/getDrProtectionGroup.d.ts +23 -19
- package/disasterrecovery/getDrProtectionGroup.js +2 -2
- package/disasterrecovery/getDrProtectionGroup.js.map +1 -1
- package/disasterrecovery/getDrProtectionGroups.d.ts +30 -16
- package/disasterrecovery/getDrProtectionGroups.js +5 -2
- package/disasterrecovery/getDrProtectionGroups.js.map +1 -1
- package/index.d.ts +2 -1
- package/index.js +4 -2
- package/index.js.map +1 -1
- package/mysql/getMysqlDbSystem.d.ts +4 -0
- package/mysql/getMysqlDbSystem.js.map +1 -1
- package/mysql/getMysqlDbSystems.d.ts +14 -0
- package/mysql/getMysqlDbSystems.js +3 -0
- package/mysql/getMysqlDbSystems.js.map +1 -1
- package/mysql/mysqlDbSystem.d.ts +13 -0
- package/mysql/mysqlDbSystem.js +3 -0
- package/mysql/mysqlDbSystem.js.map +1 -1
- package/osmanagementhub/getLifecycleEnvironment.d.ts +129 -0
- package/osmanagementhub/getLifecycleEnvironment.js +51 -0
- package/osmanagementhub/getLifecycleEnvironment.js.map +1 -0
- package/osmanagementhub/getLifecycleEnvironments.d.ts +158 -0
- package/osmanagementhub/getLifecycleEnvironments.js +73 -0
- package/osmanagementhub/getLifecycleEnvironments.js.map +1 -0
- package/osmanagementhub/getLifecycleStage.d.ts +130 -0
- package/osmanagementhub/getLifecycleStage.js +51 -0
- package/osmanagementhub/getLifecycleStage.js.map +1 -0
- package/osmanagementhub/getLifecycleStages.d.ts +133 -0
- package/osmanagementhub/getLifecycleStages.js +40 -0
- package/osmanagementhub/getLifecycleStages.js.map +1 -0
- package/osmanagementhub/getManagedInstanceGroup.d.ts +138 -0
- package/osmanagementhub/getManagedInstanceGroup.js +51 -0
- package/osmanagementhub/getManagedInstanceGroup.js.map +1 -0
- package/osmanagementhub/getManagedInstanceGroupAvailableModules.d.ts +110 -0
- package/osmanagementhub/getManagedInstanceGroupAvailableModules.js +63 -0
- package/osmanagementhub/getManagedInstanceGroupAvailableModules.js.map +1 -0
- package/osmanagementhub/getManagedInstanceGroupAvailablePackages.d.ts +124 -0
- package/osmanagementhub/getManagedInstanceGroupAvailablePackages.js +66 -0
- package/osmanagementhub/getManagedInstanceGroupAvailablePackages.js.map +1 -0
- package/osmanagementhub/getManagedInstanceGroupAvailableSoftwareSources.d.ts +113 -0
- package/osmanagementhub/getManagedInstanceGroupAvailableSoftwareSources.js +63 -0
- package/osmanagementhub/getManagedInstanceGroupAvailableSoftwareSources.js.map +1 -0
- package/osmanagementhub/getManagedInstanceGroups.d.ts +166 -0
- package/osmanagementhub/getManagedInstanceGroups.js +76 -0
- package/osmanagementhub/getManagedInstanceGroups.js.map +1 -0
- package/osmanagementhub/getManagementStation.d.ts +142 -0
- package/osmanagementhub/getManagementStation.js +51 -0
- package/osmanagementhub/getManagementStation.js.map +1 -0
- package/osmanagementhub/getManagementStationMirrors.d.ts +108 -0
- package/osmanagementhub/getManagementStationMirrors.js +61 -0
- package/osmanagementhub/getManagementStationMirrors.js.map +1 -0
- package/osmanagementhub/getManagementStations.d.ts +138 -0
- package/osmanagementhub/getManagementStations.js +68 -0
- package/osmanagementhub/getManagementStations.js.map +1 -0
- package/osmanagementhub/getProfile.d.ts +141 -0
- package/osmanagementhub/getProfile.js +51 -0
- package/osmanagementhub/getProfile.js.map +1 -0
- package/osmanagementhub/getProfiles.d.ts +183 -0
- package/osmanagementhub/getProfiles.js +79 -0
- package/osmanagementhub/getProfiles.js.map +1 -0
- package/osmanagementhub/getSoftwareSource.d.ts +166 -0
- package/osmanagementhub/getSoftwareSource.js +51 -0
- package/osmanagementhub/getSoftwareSource.js.map +1 -0
- package/osmanagementhub/getSoftwareSourceModuleStream.d.ts +119 -0
- package/osmanagementhub/getSoftwareSourceModuleStream.js +57 -0
- package/osmanagementhub/getSoftwareSourceModuleStream.js.map +1 -0
- package/osmanagementhub/getSoftwareSourceModuleStreamProfile.d.ts +118 -0
- package/osmanagementhub/getSoftwareSourceModuleStreamProfile.js +60 -0
- package/osmanagementhub/getSoftwareSourceModuleStreamProfile.js.map +1 -0
- package/osmanagementhub/getSoftwareSourceModuleStreamProfiles.d.ts +116 -0
- package/osmanagementhub/getSoftwareSourceModuleStreamProfiles.js +63 -0
- package/osmanagementhub/getSoftwareSourceModuleStreamProfiles.js.map +1 -0
- package/osmanagementhub/getSoftwareSourceModuleStreams.d.ts +130 -0
- package/osmanagementhub/getSoftwareSourceModuleStreams.js +66 -0
- package/osmanagementhub/getSoftwareSourceModuleStreams.js.map +1 -0
- package/osmanagementhub/getSoftwareSourcePackageGroup.d.ts +106 -0
- package/osmanagementhub/getSoftwareSourcePackageGroup.js +54 -0
- package/osmanagementhub/getSoftwareSourcePackageGroup.js.map +1 -0
- package/osmanagementhub/getSoftwareSourcePackageGroups.d.ts +124 -0
- package/osmanagementhub/getSoftwareSourcePackageGroups.js +66 -0
- package/osmanagementhub/getSoftwareSourcePackageGroups.js.map +1 -0
- package/osmanagementhub/getSoftwareSourceSoftwarePackage.d.ts +131 -0
- package/osmanagementhub/getSoftwareSourceSoftwarePackage.js +54 -0
- package/osmanagementhub/getSoftwareSourceSoftwarePackage.js.map +1 -0
- package/osmanagementhub/getSoftwareSourceSoftwarePackages.d.ts +113 -0
- package/osmanagementhub/getSoftwareSourceSoftwarePackages.js +63 -0
- package/osmanagementhub/getSoftwareSourceSoftwarePackages.js.map +1 -0
- package/osmanagementhub/getSoftwareSourceVendors.d.ts +88 -0
- package/osmanagementhub/getSoftwareSourceVendors.js +57 -0
- package/osmanagementhub/getSoftwareSourceVendors.js.map +1 -0
- package/osmanagementhub/getSoftwareSources.d.ts +208 -0
- package/osmanagementhub/getSoftwareSources.js +85 -0
- package/osmanagementhub/getSoftwareSources.js.map +1 -0
- package/osmanagementhub/index.d.ts +90 -0
- package/osmanagementhub/index.js +118 -0
- package/osmanagementhub/index.js.map +1 -0
- package/osmanagementhub/lifecycleEnvironment.d.ts +259 -0
- package/osmanagementhub/lifecycleEnvironment.js +138 -0
- package/osmanagementhub/lifecycleEnvironment.js.map +1 -0
- package/osmanagementhub/managedInstanceGroup.d.ts +279 -0
- package/osmanagementhub/managedInstanceGroup.js +136 -0
- package/osmanagementhub/managedInstanceGroup.js.map +1 -0
- package/osmanagementhub/managementStation.d.ts +275 -0
- package/osmanagementhub/managementStation.js +143 -0
- package/osmanagementhub/managementStation.js.map +1 -0
- package/osmanagementhub/profile.d.ts +320 -0
- package/osmanagementhub/profile.js +138 -0
- package/osmanagementhub/profile.js.map +1 -0
- package/osmanagementhub/softwareSource.d.ts +343 -0
- package/osmanagementhub/softwareSource.js +164 -0
- package/osmanagementhub/softwareSource.js.map +1 -0
- package/package.json +1 -1
- package/stackmonitoring/baselineableMetric.d.ts +227 -0
- package/stackmonitoring/baselineableMetric.js +116 -0
- package/stackmonitoring/baselineableMetric.js.map +1 -0
- package/stackmonitoring/config.d.ts +21 -8
- package/stackmonitoring/config.js +3 -6
- package/stackmonitoring/config.js.map +1 -1
- package/stackmonitoring/discoveryJob.d.ts +1 -0
- package/stackmonitoring/discoveryJob.js +1 -0
- package/stackmonitoring/discoveryJob.js.map +1 -1
- package/stackmonitoring/getBaselineableMetric.d.ts +129 -0
- package/stackmonitoring/getBaselineableMetric.js +51 -0
- package/stackmonitoring/getBaselineableMetric.js.map +1 -0
- package/stackmonitoring/getBaselineableMetrics.d.ts +125 -0
- package/stackmonitoring/getBaselineableMetrics.js +65 -0
- package/stackmonitoring/getBaselineableMetrics.js.map +1 -0
- package/stackmonitoring/getBaselineableMetricsEvaluate.d.ts +117 -0
- package/stackmonitoring/getBaselineableMetricsEvaluate.js +77 -0
- package/stackmonitoring/getBaselineableMetricsEvaluate.js.map +1 -0
- package/stackmonitoring/getConfig.d.ts +5 -1
- package/stackmonitoring/getConfig.js.map +1 -1
- package/stackmonitoring/getMetricExtension.d.ts +141 -0
- package/stackmonitoring/getMetricExtension.js +51 -0
- package/stackmonitoring/getMetricExtension.js.map +1 -0
- package/stackmonitoring/getMetricExtensions.d.ts +142 -0
- package/stackmonitoring/getMetricExtensions.js +67 -0
- package/stackmonitoring/getMetricExtensions.js.map +1 -0
- package/stackmonitoring/getMonitoredResource.d.ts +4 -0
- package/stackmonitoring/getMonitoredResource.js.map +1 -1
- package/stackmonitoring/getMonitoredResourceTask.d.ts +114 -0
- package/stackmonitoring/getMonitoredResourceTask.js +51 -0
- package/stackmonitoring/getMonitoredResourceTask.js.map +1 -0
- package/stackmonitoring/getMonitoredResourceTasks.d.ts +86 -0
- package/stackmonitoring/getMonitoredResourceTasks.js +55 -0
- package/stackmonitoring/getMonitoredResourceTasks.js.map +1 -0
- package/stackmonitoring/getMonitoredResourceType.d.ts +118 -0
- package/stackmonitoring/getMonitoredResourceType.js +51 -0
- package/stackmonitoring/getMonitoredResourceType.js.map +1 -0
- package/stackmonitoring/getMonitoredResourceTypes.d.ts +161 -0
- package/stackmonitoring/getMonitoredResourceTypes.js +80 -0
- package/stackmonitoring/getMonitoredResourceTypes.js.map +1 -0
- package/stackmonitoring/getMonitoredResources.d.ts +100 -0
- package/stackmonitoring/getMonitoredResources.js +58 -0
- package/stackmonitoring/getMonitoredResources.js.map +1 -0
- package/stackmonitoring/index.d.ts +48 -0
- package/stackmonitoring/index.js +61 -1
- package/stackmonitoring/index.js.map +1 -1
- package/stackmonitoring/metricExtension.d.ts +313 -0
- package/stackmonitoring/metricExtension.js +172 -0
- package/stackmonitoring/metricExtension.js.map +1 -0
- package/stackmonitoring/metricExtensionMetricExtensionOnGivenResourcesManagement.d.ts +102 -0
- package/stackmonitoring/metricExtensionMetricExtensionOnGivenResourcesManagement.js +80 -0
- package/stackmonitoring/metricExtensionMetricExtensionOnGivenResourcesManagement.js.map +1 -0
- package/stackmonitoring/metricExtensionsTestManagement.d.ts +125 -0
- package/stackmonitoring/metricExtensionsTestManagement.js +86 -0
- package/stackmonitoring/metricExtensionsTestManagement.js.map +1 -0
- package/stackmonitoring/monitoredResource.d.ts +13 -0
- package/stackmonitoring/monitoredResource.js +3 -0
- package/stackmonitoring/monitoredResource.js.map +1 -1
- package/stackmonitoring/monitoredResourceTask.d.ts +200 -0
- package/stackmonitoring/monitoredResourceTask.js +113 -0
- package/stackmonitoring/monitoredResourceTask.js.map +1 -0
- package/stackmonitoring/monitoredResourceType.d.ts +238 -0
- package/stackmonitoring/monitoredResourceType.js +118 -0
- package/stackmonitoring/monitoredResourceType.js.map +1 -0
- package/stackmonitoring/monitoredResourcesSearch.d.ts +13 -0
- package/stackmonitoring/monitoredResourcesSearch.js +3 -0
- package/stackmonitoring/monitoredResourcesSearch.js.map +1 -1
- package/types/input.d.ts +1324 -61
- package/types/output.d.ts +8971 -4032
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"getSqlFirewallPolicies.js","sourceRoot":"","sources":["../../datasafe/getSqlFirewallPolicies.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAsCG;AACH,SAAgB,sBAAsB,CAAC,IAAgC,EAAE,IAA2B;IAEhG,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,4DAA4D,EAAE;QACvF,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,eAAe,EAAE,IAAI,CAAC,aAAa;QACnC,wBAAwB,EAAE,IAAI,CAAC,sBAAsB;QACrD,YAAY,EAAE,IAAI,CAAC,UAAU;QAC7B,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,kBAAkB,EAAE,IAAI,CAAC,gBAAgB;QACzC,qBAAqB,EAAE,IAAI,CAAC,mBAAmB;QAC/C,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,iCAAiC,EAAE,IAAI,CAAC,+BAA+B;QACvE,qBAAqB,EAAE,IAAI,CAAC,mBAAmB;QAC/C,iBAAiB,EAAE,IAAI,CAAC,eAAe;KAC1C,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAjBD,wDAiBC;AAoGD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAsCG;AACH,SAAgB,4BAA4B,CAAC,IAAsC,EAAE,IAA2B;IAC5G,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,sBAAsB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACjF,CAAC;AAFD,oEAEC"}
|
|
@@ -0,0 +1,149 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* This data source provides details about a specific Sql Firewall Policy resource in Oracle Cloud Infrastructure Data Safe service.
|
|
4
|
+
*
|
|
5
|
+
* Gets a SQL firewall policy by identifier.
|
|
6
|
+
*
|
|
7
|
+
* ## Example Usage
|
|
8
|
+
*
|
|
9
|
+
* ```typescript
|
|
10
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
11
|
+
* import * as oci from "@pulumi/oci";
|
|
12
|
+
*
|
|
13
|
+
* const testSqlFirewallPolicy = oci.DataSafe.getSqlFirewallPolicy({
|
|
14
|
+
* sqlFirewallPolicyId: oci_data_safe_sql_firewall_policy.test_sql_firewall_policy.id,
|
|
15
|
+
* });
|
|
16
|
+
* ```
|
|
17
|
+
*/
|
|
18
|
+
export declare function getSqlFirewallPolicy(args: GetSqlFirewallPolicyArgs, opts?: pulumi.InvokeOptions): Promise<GetSqlFirewallPolicyResult>;
|
|
19
|
+
/**
|
|
20
|
+
* A collection of arguments for invoking getSqlFirewallPolicy.
|
|
21
|
+
*/
|
|
22
|
+
export interface GetSqlFirewallPolicyArgs {
|
|
23
|
+
/**
|
|
24
|
+
* The OCID of the SQL firewall policy resource.
|
|
25
|
+
*/
|
|
26
|
+
sqlFirewallPolicyId: string;
|
|
27
|
+
}
|
|
28
|
+
/**
|
|
29
|
+
* A collection of values returned by getSqlFirewallPolicy.
|
|
30
|
+
*/
|
|
31
|
+
export interface GetSqlFirewallPolicyResult {
|
|
32
|
+
/**
|
|
33
|
+
* The list of allowed ip addresses for the SQL firewall policy.
|
|
34
|
+
*/
|
|
35
|
+
readonly allowedClientIps: string[];
|
|
36
|
+
/**
|
|
37
|
+
* The list of allowed operating system user names for the SQL firewall policy.
|
|
38
|
+
*/
|
|
39
|
+
readonly allowedClientOsUsernames: string[];
|
|
40
|
+
/**
|
|
41
|
+
* The list of allowed client programs for the SQL firewall policy.
|
|
42
|
+
*/
|
|
43
|
+
readonly allowedClientPrograms: string[];
|
|
44
|
+
/**
|
|
45
|
+
* The OCID of the compartment containing the SQL firewall policy.
|
|
46
|
+
*/
|
|
47
|
+
readonly compartmentId: string;
|
|
48
|
+
/**
|
|
49
|
+
* The database user name.
|
|
50
|
+
*/
|
|
51
|
+
readonly dbUserName: string;
|
|
52
|
+
/**
|
|
53
|
+
* Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see [Resource Tags](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/resourcetags.htm) Example: `{"Operations.CostCenter": "42"}`
|
|
54
|
+
*/
|
|
55
|
+
readonly definedTags: {
|
|
56
|
+
[key: string]: any;
|
|
57
|
+
};
|
|
58
|
+
/**
|
|
59
|
+
* The description of the SQL firewall policy.
|
|
60
|
+
*/
|
|
61
|
+
readonly description: string;
|
|
62
|
+
/**
|
|
63
|
+
* The display name of the SQL firewall policy.
|
|
64
|
+
*/
|
|
65
|
+
readonly displayName: string;
|
|
66
|
+
/**
|
|
67
|
+
* Specifies the SQL firewall policy enforcement option.
|
|
68
|
+
*/
|
|
69
|
+
readonly enforcementScope: string;
|
|
70
|
+
/**
|
|
71
|
+
* Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see [Resource Tags](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/resourcetags.htm) Example: `{"Department": "Finance"}`
|
|
72
|
+
*/
|
|
73
|
+
readonly freeformTags: {
|
|
74
|
+
[key: string]: any;
|
|
75
|
+
};
|
|
76
|
+
/**
|
|
77
|
+
* The OCID of the SQL firewall policy.
|
|
78
|
+
*/
|
|
79
|
+
readonly id: string;
|
|
80
|
+
/**
|
|
81
|
+
* Details about the current state of the SQL firewall policy in Data Safe.
|
|
82
|
+
*/
|
|
83
|
+
readonly lifecycleDetails: string;
|
|
84
|
+
/**
|
|
85
|
+
* The OCID of the security policy corresponding to the SQL firewall policy.
|
|
86
|
+
*/
|
|
87
|
+
readonly securityPolicyId: string;
|
|
88
|
+
readonly sqlFirewallPolicyId: string;
|
|
89
|
+
/**
|
|
90
|
+
* Specifies the level of SQL included for this SQL firewall policy. USER_ISSUED_SQL - User issued SQL statements only. ALL_SQL - Includes all SQL statements including SQL statement issued inside PL/SQL units.
|
|
91
|
+
*/
|
|
92
|
+
readonly sqlLevel: string;
|
|
93
|
+
/**
|
|
94
|
+
* The current state of the SQL firewall policy.
|
|
95
|
+
*/
|
|
96
|
+
readonly state: string;
|
|
97
|
+
/**
|
|
98
|
+
* Specifies whether the SQL firewall policy is enabled or disabled.
|
|
99
|
+
*/
|
|
100
|
+
readonly status: string;
|
|
101
|
+
/**
|
|
102
|
+
* System tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: `{"orcl-cloud.free-tier-retained": "true"}`
|
|
103
|
+
*/
|
|
104
|
+
readonly systemTags: {
|
|
105
|
+
[key: string]: any;
|
|
106
|
+
};
|
|
107
|
+
/**
|
|
108
|
+
* The time that the SQL firewall policy was created, in the format defined by RFC3339.
|
|
109
|
+
*/
|
|
110
|
+
readonly timeCreated: string;
|
|
111
|
+
/**
|
|
112
|
+
* The date and time the SQL firewall policy was last updated, in the format defined by RFC3339.
|
|
113
|
+
*/
|
|
114
|
+
readonly timeUpdated: string;
|
|
115
|
+
/**
|
|
116
|
+
* Specifies the mode in which the SQL firewall policy is enabled.
|
|
117
|
+
*/
|
|
118
|
+
readonly violationAction: string;
|
|
119
|
+
/**
|
|
120
|
+
* Specifies whether a unified audit policy should be enabled for auditing the SQL firewall policy violations.
|
|
121
|
+
*/
|
|
122
|
+
readonly violationAudit: string;
|
|
123
|
+
}
|
|
124
|
+
/**
|
|
125
|
+
* This data source provides details about a specific Sql Firewall Policy resource in Oracle Cloud Infrastructure Data Safe service.
|
|
126
|
+
*
|
|
127
|
+
* Gets a SQL firewall policy by identifier.
|
|
128
|
+
*
|
|
129
|
+
* ## Example Usage
|
|
130
|
+
*
|
|
131
|
+
* ```typescript
|
|
132
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
133
|
+
* import * as oci from "@pulumi/oci";
|
|
134
|
+
*
|
|
135
|
+
* const testSqlFirewallPolicy = oci.DataSafe.getSqlFirewallPolicy({
|
|
136
|
+
* sqlFirewallPolicyId: oci_data_safe_sql_firewall_policy.test_sql_firewall_policy.id,
|
|
137
|
+
* });
|
|
138
|
+
* ```
|
|
139
|
+
*/
|
|
140
|
+
export declare function getSqlFirewallPolicyOutput(args: GetSqlFirewallPolicyOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetSqlFirewallPolicyResult>;
|
|
141
|
+
/**
|
|
142
|
+
* A collection of arguments for invoking getSqlFirewallPolicy.
|
|
143
|
+
*/
|
|
144
|
+
export interface GetSqlFirewallPolicyOutputArgs {
|
|
145
|
+
/**
|
|
146
|
+
* The OCID of the SQL firewall policy resource.
|
|
147
|
+
*/
|
|
148
|
+
sqlFirewallPolicyId: pulumi.Input<string>;
|
|
149
|
+
}
|
|
@@ -0,0 +1,51 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.getSqlFirewallPolicyOutput = exports.getSqlFirewallPolicy = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* This data source provides details about a specific Sql Firewall Policy resource in Oracle Cloud Infrastructure Data Safe service.
|
|
10
|
+
*
|
|
11
|
+
* Gets a SQL firewall policy by identifier.
|
|
12
|
+
*
|
|
13
|
+
* ## Example Usage
|
|
14
|
+
*
|
|
15
|
+
* ```typescript
|
|
16
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
17
|
+
* import * as oci from "@pulumi/oci";
|
|
18
|
+
*
|
|
19
|
+
* const testSqlFirewallPolicy = oci.DataSafe.getSqlFirewallPolicy({
|
|
20
|
+
* sqlFirewallPolicyId: oci_data_safe_sql_firewall_policy.test_sql_firewall_policy.id,
|
|
21
|
+
* });
|
|
22
|
+
* ```
|
|
23
|
+
*/
|
|
24
|
+
function getSqlFirewallPolicy(args, opts) {
|
|
25
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
26
|
+
return pulumi.runtime.invoke("oci:DataSafe/getSqlFirewallPolicy:getSqlFirewallPolicy", {
|
|
27
|
+
"sqlFirewallPolicyId": args.sqlFirewallPolicyId,
|
|
28
|
+
}, opts);
|
|
29
|
+
}
|
|
30
|
+
exports.getSqlFirewallPolicy = getSqlFirewallPolicy;
|
|
31
|
+
/**
|
|
32
|
+
* This data source provides details about a specific Sql Firewall Policy resource in Oracle Cloud Infrastructure Data Safe service.
|
|
33
|
+
*
|
|
34
|
+
* Gets a SQL firewall policy by identifier.
|
|
35
|
+
*
|
|
36
|
+
* ## Example Usage
|
|
37
|
+
*
|
|
38
|
+
* ```typescript
|
|
39
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
40
|
+
* import * as oci from "@pulumi/oci";
|
|
41
|
+
*
|
|
42
|
+
* const testSqlFirewallPolicy = oci.DataSafe.getSqlFirewallPolicy({
|
|
43
|
+
* sqlFirewallPolicyId: oci_data_safe_sql_firewall_policy.test_sql_firewall_policy.id,
|
|
44
|
+
* });
|
|
45
|
+
* ```
|
|
46
|
+
*/
|
|
47
|
+
function getSqlFirewallPolicyOutput(args, opts) {
|
|
48
|
+
return pulumi.output(args).apply((a) => getSqlFirewallPolicy(a, opts));
|
|
49
|
+
}
|
|
50
|
+
exports.getSqlFirewallPolicyOutput = getSqlFirewallPolicyOutput;
|
|
51
|
+
//# sourceMappingURL=getSqlFirewallPolicy.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"getSqlFirewallPolicy.js","sourceRoot":"","sources":["../../datasafe/getSqlFirewallPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;GAeG;AACH,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAE5F,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,wDAAwD,EAAE;QACnF,qBAAqB,EAAE,IAAI,CAAC,mBAAmB;KAClD,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,oDAMC;AAsGD;;;;;;;;;;;;;;;GAeG;AACH,SAAgB,0BAA0B,CAAC,IAAoC,EAAE,IAA2B;IACxG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,oBAAoB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AAC/E,CAAC;AAFD,gEAEC"}
|
|
@@ -0,0 +1,177 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
import * as inputs from "../types/input";
|
|
3
|
+
import * as outputs from "../types/output";
|
|
4
|
+
/**
|
|
5
|
+
* This data source provides the list of Sql Firewall Policy Analytics in Oracle Cloud Infrastructure Data Safe service.
|
|
6
|
+
*
|
|
7
|
+
* Gets a list of aggregated SQL firewall policy details.
|
|
8
|
+
*
|
|
9
|
+
* The parameter `accessLevel` specifies whether to return only those compartments for which the
|
|
10
|
+
* requestor has INSPECT permissions on at least one resource directly
|
|
11
|
+
* or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
|
|
12
|
+
* principal doesn't have access to even one of the child compartments. This is valid only when
|
|
13
|
+
* `compartmentIdInSubtree` is set to `true`.
|
|
14
|
+
*
|
|
15
|
+
* The parameter `compartmentIdInSubtree` applies when you perform SummarizedSqlFirewallPolicyInfo on the specified
|
|
16
|
+
* `compartmentId` and when it is set to true, the entire hierarchy of compartments can be returned.
|
|
17
|
+
* To get a full list of all compartments and subcompartments in the tenancy (root compartment),
|
|
18
|
+
* set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
|
|
19
|
+
*
|
|
20
|
+
* ## Example Usage
|
|
21
|
+
*
|
|
22
|
+
* ```typescript
|
|
23
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
24
|
+
* import * as oci from "@pulumi/oci";
|
|
25
|
+
*
|
|
26
|
+
* const testSqlFirewallPolicyAnalytics = oci.DataSafe.getSqlFirewallPolicyAnalytics({
|
|
27
|
+
* compartmentId: _var.compartment_id,
|
|
28
|
+
* accessLevel: _var.sql_firewall_policy_analytic_access_level,
|
|
29
|
+
* compartmentIdInSubtree: _var.sql_firewall_policy_analytic_compartment_id_in_subtree,
|
|
30
|
+
* groupBies: _var.sql_firewall_policy_analytic_group_by,
|
|
31
|
+
* securityPolicyId: oci_data_safe_security_policy.test_security_policy.id,
|
|
32
|
+
* state: _var.sql_firewall_policy_analytic_state,
|
|
33
|
+
* timeEnded: _var.sql_firewall_policy_analytic_time_ended,
|
|
34
|
+
* timeStarted: _var.sql_firewall_policy_analytic_time_started,
|
|
35
|
+
* });
|
|
36
|
+
* ```
|
|
37
|
+
*/
|
|
38
|
+
export declare function getSqlFirewallPolicyAnalytics(args: GetSqlFirewallPolicyAnalyticsArgs, opts?: pulumi.InvokeOptions): Promise<GetSqlFirewallPolicyAnalyticsResult>;
|
|
39
|
+
/**
|
|
40
|
+
* A collection of arguments for invoking getSqlFirewallPolicyAnalytics.
|
|
41
|
+
*/
|
|
42
|
+
export interface GetSqlFirewallPolicyAnalyticsArgs {
|
|
43
|
+
/**
|
|
44
|
+
* Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
|
45
|
+
*/
|
|
46
|
+
accessLevel?: string;
|
|
47
|
+
/**
|
|
48
|
+
* A filter to return only resources that match the specified compartment OCID.
|
|
49
|
+
*/
|
|
50
|
+
compartmentId: string;
|
|
51
|
+
/**
|
|
52
|
+
* Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
|
53
|
+
*/
|
|
54
|
+
compartmentIdInSubtree?: boolean;
|
|
55
|
+
filters?: inputs.DataSafe.GetSqlFirewallPolicyAnalyticsFilter[];
|
|
56
|
+
/**
|
|
57
|
+
* The group by parameter to summarize SQL firewall policy aggregation.
|
|
58
|
+
*/
|
|
59
|
+
groupBies?: string[];
|
|
60
|
+
/**
|
|
61
|
+
* An optional filter to return only resources that match the specified OCID of the security policy resource.
|
|
62
|
+
*/
|
|
63
|
+
securityPolicyId?: string;
|
|
64
|
+
/**
|
|
65
|
+
* The current state of the SQL firewall policy.
|
|
66
|
+
*/
|
|
67
|
+
state?: string;
|
|
68
|
+
/**
|
|
69
|
+
* An optional filter to return the summary of the SQL firewall policies created before the date-time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
|
|
70
|
+
*/
|
|
71
|
+
timeEnded?: string;
|
|
72
|
+
/**
|
|
73
|
+
* An optional filter to return the summary of the SQL firewall policies created after the date-time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
|
|
74
|
+
*/
|
|
75
|
+
timeStarted?: string;
|
|
76
|
+
}
|
|
77
|
+
/**
|
|
78
|
+
* A collection of values returned by getSqlFirewallPolicyAnalytics.
|
|
79
|
+
*/
|
|
80
|
+
export interface GetSqlFirewallPolicyAnalyticsResult {
|
|
81
|
+
readonly accessLevel?: string;
|
|
82
|
+
readonly compartmentId: string;
|
|
83
|
+
readonly compartmentIdInSubtree?: boolean;
|
|
84
|
+
readonly filters?: outputs.DataSafe.GetSqlFirewallPolicyAnalyticsFilter[];
|
|
85
|
+
readonly groupBies?: string[];
|
|
86
|
+
/**
|
|
87
|
+
* The provider-assigned unique ID for this managed resource.
|
|
88
|
+
*/
|
|
89
|
+
readonly id: string;
|
|
90
|
+
/**
|
|
91
|
+
* The OCID of the security policy corresponding to the SQL firewall policy.
|
|
92
|
+
*/
|
|
93
|
+
readonly securityPolicyId?: string;
|
|
94
|
+
/**
|
|
95
|
+
* The list of sql_firewall_policy_analytics_collection.
|
|
96
|
+
*/
|
|
97
|
+
readonly sqlFirewallPolicyAnalyticsCollections: outputs.DataSafe.GetSqlFirewallPolicyAnalyticsSqlFirewallPolicyAnalyticsCollection[];
|
|
98
|
+
/**
|
|
99
|
+
* The current state of the SQL firewall policy.
|
|
100
|
+
*/
|
|
101
|
+
readonly state?: string;
|
|
102
|
+
readonly timeEnded?: string;
|
|
103
|
+
readonly timeStarted?: string;
|
|
104
|
+
}
|
|
105
|
+
/**
|
|
106
|
+
* This data source provides the list of Sql Firewall Policy Analytics in Oracle Cloud Infrastructure Data Safe service.
|
|
107
|
+
*
|
|
108
|
+
* Gets a list of aggregated SQL firewall policy details.
|
|
109
|
+
*
|
|
110
|
+
* The parameter `accessLevel` specifies whether to return only those compartments for which the
|
|
111
|
+
* requestor has INSPECT permissions on at least one resource directly
|
|
112
|
+
* or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
|
|
113
|
+
* principal doesn't have access to even one of the child compartments. This is valid only when
|
|
114
|
+
* `compartmentIdInSubtree` is set to `true`.
|
|
115
|
+
*
|
|
116
|
+
* The parameter `compartmentIdInSubtree` applies when you perform SummarizedSqlFirewallPolicyInfo on the specified
|
|
117
|
+
* `compartmentId` and when it is set to true, the entire hierarchy of compartments can be returned.
|
|
118
|
+
* To get a full list of all compartments and subcompartments in the tenancy (root compartment),
|
|
119
|
+
* set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
|
|
120
|
+
*
|
|
121
|
+
* ## Example Usage
|
|
122
|
+
*
|
|
123
|
+
* ```typescript
|
|
124
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
125
|
+
* import * as oci from "@pulumi/oci";
|
|
126
|
+
*
|
|
127
|
+
* const testSqlFirewallPolicyAnalytics = oci.DataSafe.getSqlFirewallPolicyAnalytics({
|
|
128
|
+
* compartmentId: _var.compartment_id,
|
|
129
|
+
* accessLevel: _var.sql_firewall_policy_analytic_access_level,
|
|
130
|
+
* compartmentIdInSubtree: _var.sql_firewall_policy_analytic_compartment_id_in_subtree,
|
|
131
|
+
* groupBies: _var.sql_firewall_policy_analytic_group_by,
|
|
132
|
+
* securityPolicyId: oci_data_safe_security_policy.test_security_policy.id,
|
|
133
|
+
* state: _var.sql_firewall_policy_analytic_state,
|
|
134
|
+
* timeEnded: _var.sql_firewall_policy_analytic_time_ended,
|
|
135
|
+
* timeStarted: _var.sql_firewall_policy_analytic_time_started,
|
|
136
|
+
* });
|
|
137
|
+
* ```
|
|
138
|
+
*/
|
|
139
|
+
export declare function getSqlFirewallPolicyAnalyticsOutput(args: GetSqlFirewallPolicyAnalyticsOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetSqlFirewallPolicyAnalyticsResult>;
|
|
140
|
+
/**
|
|
141
|
+
* A collection of arguments for invoking getSqlFirewallPolicyAnalytics.
|
|
142
|
+
*/
|
|
143
|
+
export interface GetSqlFirewallPolicyAnalyticsOutputArgs {
|
|
144
|
+
/**
|
|
145
|
+
* Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
|
146
|
+
*/
|
|
147
|
+
accessLevel?: pulumi.Input<string>;
|
|
148
|
+
/**
|
|
149
|
+
* A filter to return only resources that match the specified compartment OCID.
|
|
150
|
+
*/
|
|
151
|
+
compartmentId: pulumi.Input<string>;
|
|
152
|
+
/**
|
|
153
|
+
* Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
|
154
|
+
*/
|
|
155
|
+
compartmentIdInSubtree?: pulumi.Input<boolean>;
|
|
156
|
+
filters?: pulumi.Input<pulumi.Input<inputs.DataSafe.GetSqlFirewallPolicyAnalyticsFilterArgs>[]>;
|
|
157
|
+
/**
|
|
158
|
+
* The group by parameter to summarize SQL firewall policy aggregation.
|
|
159
|
+
*/
|
|
160
|
+
groupBies?: pulumi.Input<pulumi.Input<string>[]>;
|
|
161
|
+
/**
|
|
162
|
+
* An optional filter to return only resources that match the specified OCID of the security policy resource.
|
|
163
|
+
*/
|
|
164
|
+
securityPolicyId?: pulumi.Input<string>;
|
|
165
|
+
/**
|
|
166
|
+
* The current state of the SQL firewall policy.
|
|
167
|
+
*/
|
|
168
|
+
state?: pulumi.Input<string>;
|
|
169
|
+
/**
|
|
170
|
+
* An optional filter to return the summary of the SQL firewall policies created before the date-time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
|
|
171
|
+
*/
|
|
172
|
+
timeEnded?: pulumi.Input<string>;
|
|
173
|
+
/**
|
|
174
|
+
* An optional filter to return the summary of the SQL firewall policies created after the date-time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
|
|
175
|
+
*/
|
|
176
|
+
timeStarted?: pulumi.Input<string>;
|
|
177
|
+
}
|
|
@@ -0,0 +1,95 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.getSqlFirewallPolicyAnalyticsOutput = exports.getSqlFirewallPolicyAnalytics = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* This data source provides the list of Sql Firewall Policy Analytics in Oracle Cloud Infrastructure Data Safe service.
|
|
10
|
+
*
|
|
11
|
+
* Gets a list of aggregated SQL firewall policy details.
|
|
12
|
+
*
|
|
13
|
+
* The parameter `accessLevel` specifies whether to return only those compartments for which the
|
|
14
|
+
* requestor has INSPECT permissions on at least one resource directly
|
|
15
|
+
* or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
|
|
16
|
+
* principal doesn't have access to even one of the child compartments. This is valid only when
|
|
17
|
+
* `compartmentIdInSubtree` is set to `true`.
|
|
18
|
+
*
|
|
19
|
+
* The parameter `compartmentIdInSubtree` applies when you perform SummarizedSqlFirewallPolicyInfo on the specified
|
|
20
|
+
* `compartmentId` and when it is set to true, the entire hierarchy of compartments can be returned.
|
|
21
|
+
* To get a full list of all compartments and subcompartments in the tenancy (root compartment),
|
|
22
|
+
* set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
|
|
23
|
+
*
|
|
24
|
+
* ## Example Usage
|
|
25
|
+
*
|
|
26
|
+
* ```typescript
|
|
27
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
28
|
+
* import * as oci from "@pulumi/oci";
|
|
29
|
+
*
|
|
30
|
+
* const testSqlFirewallPolicyAnalytics = oci.DataSafe.getSqlFirewallPolicyAnalytics({
|
|
31
|
+
* compartmentId: _var.compartment_id,
|
|
32
|
+
* accessLevel: _var.sql_firewall_policy_analytic_access_level,
|
|
33
|
+
* compartmentIdInSubtree: _var.sql_firewall_policy_analytic_compartment_id_in_subtree,
|
|
34
|
+
* groupBies: _var.sql_firewall_policy_analytic_group_by,
|
|
35
|
+
* securityPolicyId: oci_data_safe_security_policy.test_security_policy.id,
|
|
36
|
+
* state: _var.sql_firewall_policy_analytic_state,
|
|
37
|
+
* timeEnded: _var.sql_firewall_policy_analytic_time_ended,
|
|
38
|
+
* timeStarted: _var.sql_firewall_policy_analytic_time_started,
|
|
39
|
+
* });
|
|
40
|
+
* ```
|
|
41
|
+
*/
|
|
42
|
+
function getSqlFirewallPolicyAnalytics(args, opts) {
|
|
43
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
44
|
+
return pulumi.runtime.invoke("oci:DataSafe/getSqlFirewallPolicyAnalytics:getSqlFirewallPolicyAnalytics", {
|
|
45
|
+
"accessLevel": args.accessLevel,
|
|
46
|
+
"compartmentId": args.compartmentId,
|
|
47
|
+
"compartmentIdInSubtree": args.compartmentIdInSubtree,
|
|
48
|
+
"filters": args.filters,
|
|
49
|
+
"groupBies": args.groupBies,
|
|
50
|
+
"securityPolicyId": args.securityPolicyId,
|
|
51
|
+
"state": args.state,
|
|
52
|
+
"timeEnded": args.timeEnded,
|
|
53
|
+
"timeStarted": args.timeStarted,
|
|
54
|
+
}, opts);
|
|
55
|
+
}
|
|
56
|
+
exports.getSqlFirewallPolicyAnalytics = getSqlFirewallPolicyAnalytics;
|
|
57
|
+
/**
|
|
58
|
+
* This data source provides the list of Sql Firewall Policy Analytics in Oracle Cloud Infrastructure Data Safe service.
|
|
59
|
+
*
|
|
60
|
+
* Gets a list of aggregated SQL firewall policy details.
|
|
61
|
+
*
|
|
62
|
+
* The parameter `accessLevel` specifies whether to return only those compartments for which the
|
|
63
|
+
* requestor has INSPECT permissions on at least one resource directly
|
|
64
|
+
* or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
|
|
65
|
+
* principal doesn't have access to even one of the child compartments. This is valid only when
|
|
66
|
+
* `compartmentIdInSubtree` is set to `true`.
|
|
67
|
+
*
|
|
68
|
+
* The parameter `compartmentIdInSubtree` applies when you perform SummarizedSqlFirewallPolicyInfo on the specified
|
|
69
|
+
* `compartmentId` and when it is set to true, the entire hierarchy of compartments can be returned.
|
|
70
|
+
* To get a full list of all compartments and subcompartments in the tenancy (root compartment),
|
|
71
|
+
* set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
|
|
72
|
+
*
|
|
73
|
+
* ## Example Usage
|
|
74
|
+
*
|
|
75
|
+
* ```typescript
|
|
76
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
77
|
+
* import * as oci from "@pulumi/oci";
|
|
78
|
+
*
|
|
79
|
+
* const testSqlFirewallPolicyAnalytics = oci.DataSafe.getSqlFirewallPolicyAnalytics({
|
|
80
|
+
* compartmentId: _var.compartment_id,
|
|
81
|
+
* accessLevel: _var.sql_firewall_policy_analytic_access_level,
|
|
82
|
+
* compartmentIdInSubtree: _var.sql_firewall_policy_analytic_compartment_id_in_subtree,
|
|
83
|
+
* groupBies: _var.sql_firewall_policy_analytic_group_by,
|
|
84
|
+
* securityPolicyId: oci_data_safe_security_policy.test_security_policy.id,
|
|
85
|
+
* state: _var.sql_firewall_policy_analytic_state,
|
|
86
|
+
* timeEnded: _var.sql_firewall_policy_analytic_time_ended,
|
|
87
|
+
* timeStarted: _var.sql_firewall_policy_analytic_time_started,
|
|
88
|
+
* });
|
|
89
|
+
* ```
|
|
90
|
+
*/
|
|
91
|
+
function getSqlFirewallPolicyAnalyticsOutput(args, opts) {
|
|
92
|
+
return pulumi.output(args).apply((a) => getSqlFirewallPolicyAnalytics(a, opts));
|
|
93
|
+
}
|
|
94
|
+
exports.getSqlFirewallPolicyAnalyticsOutput = getSqlFirewallPolicyAnalyticsOutput;
|
|
95
|
+
//# sourceMappingURL=getSqlFirewallPolicyAnalytics.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"getSqlFirewallPolicyAnalytics.js","sourceRoot":"","sources":["../../datasafe/getSqlFirewallPolicyAnalytics.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiCG;AACH,SAAgB,6BAA6B,CAAC,IAAuC,EAAE,IAA2B;IAE9G,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,0EAA0E,EAAE;QACrG,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,eAAe,EAAE,IAAI,CAAC,aAAa;QACnC,wBAAwB,EAAE,IAAI,CAAC,sBAAsB;QACrD,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,kBAAkB,EAAE,IAAI,CAAC,gBAAgB;QACzC,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,aAAa,EAAE,IAAI,CAAC,WAAW;KAClC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAdD,sEAcC;AAqED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiCG;AACH,SAAgB,mCAAmC,CAAC,IAA6C,EAAE,IAA2B;IAC1H,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,6BAA6B,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACxF,CAAC;AAFD,kFAEC"}
|
|
@@ -0,0 +1,170 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
import * as inputs from "../types/input";
|
|
3
|
+
import * as outputs from "../types/output";
|
|
4
|
+
/**
|
|
5
|
+
* This data source provides the list of Sql Firewall Violation Analytics in Oracle Cloud Infrastructure Data Safe service.
|
|
6
|
+
*
|
|
7
|
+
* Returns the aggregation details of the SQL firewall violations.
|
|
8
|
+
*
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as oci from "@pulumi/oci";
|
|
14
|
+
*
|
|
15
|
+
* const testSqlFirewallViolationAnalytics = oci.DataSafe.getSqlFirewallViolationAnalytics({
|
|
16
|
+
* compartmentId: _var.compartment_id,
|
|
17
|
+
* accessLevel: _var.sql_firewall_violation_analytic_access_level,
|
|
18
|
+
* compartmentIdInSubtree: _var.sql_firewall_violation_analytic_compartment_id_in_subtree,
|
|
19
|
+
* groupBies: _var.sql_firewall_violation_analytic_group_by,
|
|
20
|
+
* queryTimeZone: _var.sql_firewall_violation_analytic_query_time_zone,
|
|
21
|
+
* scimQuery: _var.sql_firewall_violation_analytic_scim_query,
|
|
22
|
+
* summaryFields: _var.sql_firewall_violation_analytic_summary_field,
|
|
23
|
+
* timeEnded: _var.sql_firewall_violation_analytic_time_ended,
|
|
24
|
+
* timeStarted: _var.sql_firewall_violation_analytic_time_started,
|
|
25
|
+
* });
|
|
26
|
+
* ```
|
|
27
|
+
*/
|
|
28
|
+
export declare function getSqlFirewallViolationAnalytics(args: GetSqlFirewallViolationAnalyticsArgs, opts?: pulumi.InvokeOptions): Promise<GetSqlFirewallViolationAnalyticsResult>;
|
|
29
|
+
/**
|
|
30
|
+
* A collection of arguments for invoking getSqlFirewallViolationAnalytics.
|
|
31
|
+
*/
|
|
32
|
+
export interface GetSqlFirewallViolationAnalyticsArgs {
|
|
33
|
+
/**
|
|
34
|
+
* Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
|
35
|
+
*/
|
|
36
|
+
accessLevel?: string;
|
|
37
|
+
/**
|
|
38
|
+
* A filter to return only resources that match the specified compartment OCID.
|
|
39
|
+
*/
|
|
40
|
+
compartmentId: string;
|
|
41
|
+
/**
|
|
42
|
+
* Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
|
43
|
+
*/
|
|
44
|
+
compartmentIdInSubtree?: boolean;
|
|
45
|
+
filters?: inputs.DataSafe.GetSqlFirewallViolationAnalyticsFilter[];
|
|
46
|
+
/**
|
|
47
|
+
* A groupBy can only be used in combination with summaryField parameter. A groupBy value has to be a subset of the values mentioned in summaryField parameter.
|
|
48
|
+
*/
|
|
49
|
+
groupBies?: string[];
|
|
50
|
+
/**
|
|
51
|
+
* Default time zone is UTC if no time zone provided. The date-time considerations of the resource will be in accordance with the specified time zone.
|
|
52
|
+
*/
|
|
53
|
+
queryTimeZone?: string;
|
|
54
|
+
/**
|
|
55
|
+
* The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at [RFC3339](https://tools.ietf.org/html/draft-ietf-scim-api-12). In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
|
|
56
|
+
*
|
|
57
|
+
* **Example:** query=(operationTime ge '2021-06-04T01-00-26') and (violationAction eq 'BLOCKED')
|
|
58
|
+
*/
|
|
59
|
+
scimQuery?: string;
|
|
60
|
+
/**
|
|
61
|
+
* Specifies a subset of summarized fields to be returned in the response.
|
|
62
|
+
*/
|
|
63
|
+
summaryFields?: string[];
|
|
64
|
+
/**
|
|
65
|
+
* An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
|
|
66
|
+
*/
|
|
67
|
+
timeEnded?: string;
|
|
68
|
+
/**
|
|
69
|
+
* An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
|
|
70
|
+
*/
|
|
71
|
+
timeStarted?: string;
|
|
72
|
+
}
|
|
73
|
+
/**
|
|
74
|
+
* A collection of values returned by getSqlFirewallViolationAnalytics.
|
|
75
|
+
*/
|
|
76
|
+
export interface GetSqlFirewallViolationAnalyticsResult {
|
|
77
|
+
readonly accessLevel?: string;
|
|
78
|
+
readonly compartmentId: string;
|
|
79
|
+
readonly compartmentIdInSubtree?: boolean;
|
|
80
|
+
readonly filters?: outputs.DataSafe.GetSqlFirewallViolationAnalyticsFilter[];
|
|
81
|
+
readonly groupBies?: string[];
|
|
82
|
+
/**
|
|
83
|
+
* The provider-assigned unique ID for this managed resource.
|
|
84
|
+
*/
|
|
85
|
+
readonly id: string;
|
|
86
|
+
readonly queryTimeZone?: string;
|
|
87
|
+
readonly scimQuery?: string;
|
|
88
|
+
/**
|
|
89
|
+
* The list of sql_firewall_violation_analytics_collection.
|
|
90
|
+
*/
|
|
91
|
+
readonly sqlFirewallViolationAnalyticsCollections: outputs.DataSafe.GetSqlFirewallViolationAnalyticsSqlFirewallViolationAnalyticsCollection[];
|
|
92
|
+
readonly summaryFields?: string[];
|
|
93
|
+
/**
|
|
94
|
+
* The time at which the aggregation ended.
|
|
95
|
+
*/
|
|
96
|
+
readonly timeEnded?: string;
|
|
97
|
+
/**
|
|
98
|
+
* The time at which the aggregation started.
|
|
99
|
+
*/
|
|
100
|
+
readonly timeStarted?: string;
|
|
101
|
+
}
|
|
102
|
+
/**
|
|
103
|
+
* This data source provides the list of Sql Firewall Violation Analytics in Oracle Cloud Infrastructure Data Safe service.
|
|
104
|
+
*
|
|
105
|
+
* Returns the aggregation details of the SQL firewall violations.
|
|
106
|
+
*
|
|
107
|
+
* ## Example Usage
|
|
108
|
+
*
|
|
109
|
+
* ```typescript
|
|
110
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
111
|
+
* import * as oci from "@pulumi/oci";
|
|
112
|
+
*
|
|
113
|
+
* const testSqlFirewallViolationAnalytics = oci.DataSafe.getSqlFirewallViolationAnalytics({
|
|
114
|
+
* compartmentId: _var.compartment_id,
|
|
115
|
+
* accessLevel: _var.sql_firewall_violation_analytic_access_level,
|
|
116
|
+
* compartmentIdInSubtree: _var.sql_firewall_violation_analytic_compartment_id_in_subtree,
|
|
117
|
+
* groupBies: _var.sql_firewall_violation_analytic_group_by,
|
|
118
|
+
* queryTimeZone: _var.sql_firewall_violation_analytic_query_time_zone,
|
|
119
|
+
* scimQuery: _var.sql_firewall_violation_analytic_scim_query,
|
|
120
|
+
* summaryFields: _var.sql_firewall_violation_analytic_summary_field,
|
|
121
|
+
* timeEnded: _var.sql_firewall_violation_analytic_time_ended,
|
|
122
|
+
* timeStarted: _var.sql_firewall_violation_analytic_time_started,
|
|
123
|
+
* });
|
|
124
|
+
* ```
|
|
125
|
+
*/
|
|
126
|
+
export declare function getSqlFirewallViolationAnalyticsOutput(args: GetSqlFirewallViolationAnalyticsOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetSqlFirewallViolationAnalyticsResult>;
|
|
127
|
+
/**
|
|
128
|
+
* A collection of arguments for invoking getSqlFirewallViolationAnalytics.
|
|
129
|
+
*/
|
|
130
|
+
export interface GetSqlFirewallViolationAnalyticsOutputArgs {
|
|
131
|
+
/**
|
|
132
|
+
* Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
|
133
|
+
*/
|
|
134
|
+
accessLevel?: pulumi.Input<string>;
|
|
135
|
+
/**
|
|
136
|
+
* A filter to return only resources that match the specified compartment OCID.
|
|
137
|
+
*/
|
|
138
|
+
compartmentId: pulumi.Input<string>;
|
|
139
|
+
/**
|
|
140
|
+
* Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
|
141
|
+
*/
|
|
142
|
+
compartmentIdInSubtree?: pulumi.Input<boolean>;
|
|
143
|
+
filters?: pulumi.Input<pulumi.Input<inputs.DataSafe.GetSqlFirewallViolationAnalyticsFilterArgs>[]>;
|
|
144
|
+
/**
|
|
145
|
+
* A groupBy can only be used in combination with summaryField parameter. A groupBy value has to be a subset of the values mentioned in summaryField parameter.
|
|
146
|
+
*/
|
|
147
|
+
groupBies?: pulumi.Input<pulumi.Input<string>[]>;
|
|
148
|
+
/**
|
|
149
|
+
* Default time zone is UTC if no time zone provided. The date-time considerations of the resource will be in accordance with the specified time zone.
|
|
150
|
+
*/
|
|
151
|
+
queryTimeZone?: pulumi.Input<string>;
|
|
152
|
+
/**
|
|
153
|
+
* The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at [RFC3339](https://tools.ietf.org/html/draft-ietf-scim-api-12). In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
|
|
154
|
+
*
|
|
155
|
+
* **Example:** query=(operationTime ge '2021-06-04T01-00-26') and (violationAction eq 'BLOCKED')
|
|
156
|
+
*/
|
|
157
|
+
scimQuery?: pulumi.Input<string>;
|
|
158
|
+
/**
|
|
159
|
+
* Specifies a subset of summarized fields to be returned in the response.
|
|
160
|
+
*/
|
|
161
|
+
summaryFields?: pulumi.Input<pulumi.Input<string>[]>;
|
|
162
|
+
/**
|
|
163
|
+
* An optional filter to return audit events whose creation time in the database is less than and equal to the date-time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
|
|
164
|
+
*/
|
|
165
|
+
timeEnded?: pulumi.Input<string>;
|
|
166
|
+
/**
|
|
167
|
+
* An optional filter to return audit events whose creation time in the database is greater than and equal to the date-time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
|
|
168
|
+
*/
|
|
169
|
+
timeStarted?: pulumi.Input<string>;
|
|
170
|
+
}
|