@pulumi/oci 3.5.0-alpha.1756363728 → 3.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/core/computeGpuMemoryFabric.d.ts +8 -0
- package/core/computeGpuMemoryFabric.js +2 -0
- package/core/computeGpuMemoryFabric.js.map +1 -1
- package/core/getComputeGpuMemoryFabric.d.ts +4 -0
- package/core/getComputeGpuMemoryFabric.js.map +1 -1
- package/database/dataGuardAssociation.d.ts +26 -0
- package/database/dataGuardAssociation.js +6 -0
- package/database/dataGuardAssociation.js.map +1 -1
- package/database/database.d.ts +8 -0
- package/database/database.js +2 -0
- package/database/database.js.map +1 -1
- package/database/dbNode.d.ts +16 -0
- package/database/dbNode.js +4 -0
- package/database/dbNode.js.map +1 -1
- package/database/dbSystem.d.ts +30 -6
- package/database/dbSystem.js +4 -0
- package/database/dbSystem.js.map +1 -1
- package/database/exadbVmCluster.d.ts +13 -0
- package/database/exadbVmCluster.js +3 -0
- package/database/exadbVmCluster.js.map +1 -1
- package/database/exascaleDbStorageVault.d.ts +8 -0
- package/database/exascaleDbStorageVault.js +2 -0
- package/database/exascaleDbStorageVault.js.map +1 -1
- package/database/getDataGuardAssociation.d.ts +2 -0
- package/database/getDataGuardAssociation.js.map +1 -1
- package/database/getDatabase.d.ts +4 -0
- package/database/getDatabase.js.map +1 -1
- package/database/getDbNode.d.ts +8 -0
- package/database/getDbNode.js.map +1 -1
- package/database/getDbSystemShapes.d.ts +11 -0
- package/database/getDbSystemShapes.js +4 -0
- package/database/getDbSystemShapes.js.map +1 -1
- package/database/getDbSystemStoragePerformances.d.ts +9 -0
- package/database/getDbSystemStoragePerformances.js +2 -0
- package/database/getDbSystemStoragePerformances.js.map +1 -1
- package/database/getDbVersions.d.ts +11 -0
- package/database/getDbVersions.js +4 -0
- package/database/getDbVersions.js.map +1 -1
- package/database/getExadbVmCluster.d.ts +4 -0
- package/database/getExadbVmCluster.js.map +1 -1
- package/database/getExascaleDbStorageVault.d.ts +4 -0
- package/database/getExascaleDbStorageVault.js.map +1 -1
- package/database/getExascaleDbStorageVaults.d.ts +47 -0
- package/database/getExascaleDbStorageVaults.js +16 -0
- package/database/getExascaleDbStorageVaults.js.map +1 -1
- package/database/getGiVersions.d.ts +11 -0
- package/database/getGiVersions.js +4 -0
- package/database/getGiVersions.js.map +1 -1
- package/datasafe/attributeSet.d.ts +230 -0
- package/datasafe/attributeSet.js +119 -0
- package/datasafe/attributeSet.js.map +1 -0
- package/datasafe/auditProfile.d.ts +108 -29
- package/datasafe/auditProfile.js +50 -9
- package/datasafe/auditProfile.js.map +1 -1
- package/datasafe/auditProfileManagement.d.ts +129 -49
- package/datasafe/auditProfileManagement.js +39 -9
- package/datasafe/auditProfileManagement.js.map +1 -1
- package/datasafe/auditTrail.d.ts +12 -0
- package/datasafe/auditTrail.js +2 -0
- package/datasafe/auditTrail.js.map +1 -1
- package/datasafe/auditTrailManagement.d.ts +13 -0
- package/datasafe/auditTrailManagement.js +3 -0
- package/datasafe/auditTrailManagement.js.map +1 -1
- package/datasafe/getAlerts.d.ts +2 -2
- package/datasafe/getAttributeSet.d.ts +121 -0
- package/datasafe/getAttributeSet.js +54 -0
- package/datasafe/getAttributeSet.js.map +1 -0
- package/datasafe/getAttributeSetAssociatedResources.d.ts +100 -0
- package/datasafe/getAttributeSetAssociatedResources.js +64 -0
- package/datasafe/getAttributeSetAssociatedResources.js.map +1 -0
- package/datasafe/getAttributeSets.d.ts +204 -0
- package/datasafe/getAttributeSets.js +114 -0
- package/datasafe/getAttributeSets.js.map +1 -0
- package/datasafe/getAuditArchiveRetrievals.d.ts +11 -0
- package/datasafe/getAuditArchiveRetrievals.js +4 -0
- package/datasafe/getAuditArchiveRetrievals.js.map +1 -1
- package/datasafe/getAuditEvents.d.ts +2 -2
- package/datasafe/getAuditPolicies.d.ts +11 -0
- package/datasafe/getAuditPolicies.js +4 -0
- package/datasafe/getAuditPolicies.js.map +1 -1
- package/datasafe/getAuditProfile.d.ts +27 -7
- package/datasafe/getAuditProfile.js.map +1 -1
- package/datasafe/getAuditProfileTargetOverrides.d.ts +83 -0
- package/datasafe/getAuditProfileTargetOverrides.js +60 -0
- package/datasafe/getAuditProfileTargetOverrides.js.map +1 -0
- package/datasafe/getAuditProfiles.d.ts +28 -3
- package/datasafe/getAuditProfiles.js +8 -0
- package/datasafe/getAuditProfiles.js.map +1 -1
- package/datasafe/getAuditTrail.d.ts +4 -0
- package/datasafe/getAuditTrail.js.map +1 -1
- package/datasafe/getAuditTrails.d.ts +11 -0
- package/datasafe/getAuditTrails.js +4 -0
- package/datasafe/getAuditTrails.js.map +1 -1
- package/datasafe/getDatabaseSecurityConfigs.d.ts +11 -0
- package/datasafe/getDatabaseSecurityConfigs.js +4 -0
- package/datasafe/getDatabaseSecurityConfigs.js.map +1 -1
- package/datasafe/getDiscoveryAnalytics.d.ts +22 -0
- package/datasafe/getDiscoveryAnalytics.js +8 -0
- package/datasafe/getDiscoveryAnalytics.js.map +1 -1
- package/datasafe/getMaskingAnalytics.d.ts +25 -0
- package/datasafe/getMaskingAnalytics.js +8 -0
- package/datasafe/getMaskingAnalytics.js.map +1 -1
- package/datasafe/getOnpremConnectors.d.ts +8 -5
- package/datasafe/getOnpremConnectors.js +4 -4
- package/datasafe/getOnpremConnectors.js.map +1 -1
- package/datasafe/getReport.d.ts +12 -0
- package/datasafe/getReport.js.map +1 -1
- package/datasafe/getReports.d.ts +14 -0
- package/datasafe/getReports.js +4 -0
- package/datasafe/getReports.js.map +1 -1
- package/datasafe/getSecurityAssessment.d.ts +25 -1
- package/datasafe/getSecurityAssessment.js.map +1 -1
- package/datasafe/getSecurityAssessmentChecks.d.ts +144 -0
- package/datasafe/getSecurityAssessmentChecks.js +80 -0
- package/datasafe/getSecurityAssessmentChecks.js.map +1 -0
- package/datasafe/getSecurityAssessmentFinding.d.ts +12 -0
- package/datasafe/getSecurityAssessmentFinding.js +8 -0
- package/datasafe/getSecurityAssessmentFinding.js.map +1 -1
- package/datasafe/getSecurityAssessmentFindings.d.ts +29 -2
- package/datasafe/getSecurityAssessmentFindings.js +10 -2
- package/datasafe/getSecurityAssessmentFindings.js.map +1 -1
- package/datasafe/getSecurityAssessmentTemplateAnalytics.d.ts +218 -0
- package/datasafe/getSecurityAssessmentTemplateAnalytics.js +118 -0
- package/datasafe/getSecurityAssessmentTemplateAnalytics.js.map +1 -0
- package/datasafe/getSecurityAssessmentTemplateAssociationAnalytics.d.ts +178 -0
- package/datasafe/getSecurityAssessmentTemplateAssociationAnalytics.js +108 -0
- package/datasafe/getSecurityAssessmentTemplateAssociationAnalytics.js.map +1 -0
- package/datasafe/getSecurityAssessmentTemplateBaselineComparison.d.ts +155 -0
- package/datasafe/getSecurityAssessmentTemplateBaselineComparison.js +70 -0
- package/datasafe/getSecurityAssessmentTemplateBaselineComparison.js.map +1 -0
- package/datasafe/getSecurityAssessments.d.ts +43 -1
- package/datasafe/getSecurityAssessments.js +12 -0
- package/datasafe/getSecurityAssessments.js.map +1 -1
- package/datasafe/getSecurityPolicies.d.ts +14 -0
- package/datasafe/getSecurityPolicies.js +4 -0
- package/datasafe/getSecurityPolicies.js.map +1 -1
- package/datasafe/getSecurityPolicy.d.ts +4 -0
- package/datasafe/getSecurityPolicy.js.map +1 -1
- package/datasafe/getSecurityPolicyConfig.d.ts +122 -0
- package/datasafe/getSecurityPolicyConfig.js +54 -0
- package/datasafe/getSecurityPolicyConfig.js.map +1 -0
- package/datasafe/getSecurityPolicyConfigs.d.ts +206 -0
- package/datasafe/getSecurityPolicyConfigs.js +114 -0
- package/datasafe/getSecurityPolicyConfigs.js.map +1 -0
- package/datasafe/getSecurityPolicyDeployment.d.ts +11 -1
- package/datasafe/getSecurityPolicyDeployment.js.map +1 -1
- package/datasafe/getSecurityPolicyDeploymentSecurityPolicyEntryState.d.ts +15 -0
- package/datasafe/getSecurityPolicyDeploymentSecurityPolicyEntryState.js.map +1 -1
- package/datasafe/getSecurityPolicyDeploymentSecurityPolicyEntryStates.d.ts +25 -0
- package/datasafe/getSecurityPolicyDeploymentSecurityPolicyEntryStates.js +8 -0
- package/datasafe/getSecurityPolicyDeploymentSecurityPolicyEntryStates.js.map +1 -1
- package/datasafe/getSecurityPolicyDeployments.d.ts +15 -1
- package/datasafe/getSecurityPolicyDeployments.js +4 -0
- package/datasafe/getSecurityPolicyDeployments.js.map +1 -1
- package/datasafe/getSensitiveColumnAnalytics.d.ts +11 -0
- package/datasafe/getSensitiveColumnAnalytics.js +4 -0
- package/datasafe/getSensitiveColumnAnalytics.js.map +1 -1
- package/datasafe/getSqlCollectionAnalytics.d.ts +11 -0
- package/datasafe/getSqlCollectionAnalytics.js +4 -0
- package/datasafe/getSqlCollectionAnalytics.js.map +1 -1
- package/datasafe/getSqlCollections.d.ts +11 -0
- package/datasafe/getSqlCollections.js +4 -0
- package/datasafe/getSqlCollections.js.map +1 -1
- package/datasafe/getSqlFirewallAllowedSqlAnalytics.d.ts +2 -2
- package/datasafe/getSqlFirewallAllowedSqls.d.ts +2 -2
- package/datasafe/getSqlFirewallViolationAnalytics.d.ts +2 -2
- package/datasafe/getSqlFirewallViolations.d.ts +2 -2
- package/datasafe/getTargetAlertPolicyAssociations.d.ts +0 -38
- package/datasafe/getTargetAlertPolicyAssociations.js +0 -38
- package/datasafe/getTargetAlertPolicyAssociations.js.map +1 -1
- package/datasafe/getTargetDatabaseGroup.d.ts +122 -0
- package/datasafe/getTargetDatabaseGroup.js +54 -0
- package/datasafe/getTargetDatabaseGroup.js.map +1 -0
- package/datasafe/getTargetDatabaseGroupGroupMember.d.ts +78 -0
- package/datasafe/getTargetDatabaseGroupGroupMember.js +58 -0
- package/datasafe/getTargetDatabaseGroupGroupMember.js.map +1 -0
- package/datasafe/getTargetDatabaseGroups.d.ts +177 -0
- package/datasafe/getTargetDatabaseGroups.js +88 -0
- package/datasafe/getTargetDatabaseGroups.js.map +1 -0
- package/datasafe/getUnifiedAuditPolicies.d.ts +234 -0
- package/datasafe/getUnifiedAuditPolicies.js +122 -0
- package/datasafe/getUnifiedAuditPolicies.js.map +1 -0
- package/datasafe/getUnifiedAuditPolicy.d.ts +134 -0
- package/datasafe/getUnifiedAuditPolicy.js +54 -0
- package/datasafe/getUnifiedAuditPolicy.js.map +1 -0
- package/datasafe/getUnifiedAuditPolicyDefinition.d.ts +125 -0
- package/datasafe/getUnifiedAuditPolicyDefinition.js +54 -0
- package/datasafe/getUnifiedAuditPolicyDefinition.js.map +1 -0
- package/datasafe/getUnifiedAuditPolicyDefinitions.d.ts +198 -0
- package/datasafe/getUnifiedAuditPolicyDefinitions.js +114 -0
- package/datasafe/getUnifiedAuditPolicyDefinitions.js.map +1 -0
- package/datasafe/getUserAssessment.d.ts +8 -0
- package/datasafe/getUserAssessment.js.map +1 -1
- package/datasafe/getUserAssessments.d.ts +28 -0
- package/datasafe/getUserAssessments.js +8 -0
- package/datasafe/getUserAssessments.js.map +1 -1
- package/datasafe/index.d.ts +72 -0
- package/datasafe/index.js +94 -7
- package/datasafe/index.js.map +1 -1
- package/datasafe/report.d.ts +24 -0
- package/datasafe/report.js +6 -0
- package/datasafe/report.js.map +1 -1
- package/datasafe/reportDefinition.d.ts +2 -0
- package/datasafe/reportDefinition.js +2 -0
- package/datasafe/reportDefinition.js.map +1 -1
- package/datasafe/securityAssessment.d.ts +117 -39
- package/datasafe/securityAssessment.js +19 -23
- package/datasafe/securityAssessment.js.map +1 -1
- package/datasafe/securityAssessmentCheck.d.ts +151 -0
- package/datasafe/securityAssessmentCheck.js +98 -0
- package/datasafe/securityAssessmentCheck.js.map +1 -0
- package/datasafe/securityAssessmentFinding.d.ts +254 -0
- package/datasafe/securityAssessmentFinding.js +123 -0
- package/datasafe/securityAssessmentFinding.js.map +1 -0
- package/datasafe/securityPolicy.d.ts +39 -24
- package/datasafe/securityPolicy.js +24 -5
- package/datasafe/securityPolicy.js.map +1 -1
- package/datasafe/securityPolicyConfig.d.ts +231 -0
- package/datasafe/securityPolicyConfig.js +120 -0
- package/datasafe/securityPolicyConfig.js.map +1 -0
- package/datasafe/securityPolicyDeployment.d.ts +76 -14
- package/datasafe/securityPolicyDeployment.js +44 -7
- package/datasafe/securityPolicyDeployment.js.map +1 -1
- package/datasafe/securityPolicyDeploymentManagement.d.ts +76 -14
- package/datasafe/securityPolicyDeploymentManagement.js +25 -3
- package/datasafe/securityPolicyDeploymentManagement.js.map +1 -1
- package/datasafe/securityPolicyManagement.d.ts +29 -9
- package/datasafe/securityPolicyManagement.js +6 -1
- package/datasafe/securityPolicyManagement.js.map +1 -1
- package/datasafe/targetAlertPolicyAssociation.d.ts +3 -37
- package/datasafe/targetAlertPolicyAssociation.js +0 -22
- package/datasafe/targetAlertPolicyAssociation.js.map +1 -1
- package/datasafe/targetDatabase.d.ts +2 -0
- package/datasafe/targetDatabase.js +2 -0
- package/datasafe/targetDatabase.js.map +1 -1
- package/datasafe/targetDatabaseGroup.d.ts +232 -0
- package/datasafe/targetDatabaseGroup.js +132 -0
- package/datasafe/targetDatabaseGroup.js.map +1 -0
- package/datasafe/targetDatabasePeerTargetDatabase.d.ts +1 -0
- package/datasafe/targetDatabasePeerTargetDatabase.js +1 -0
- package/datasafe/targetDatabasePeerTargetDatabase.js.map +1 -1
- package/datasafe/unifiedAuditPolicy.d.ts +273 -0
- package/datasafe/unifiedAuditPolicy.js +137 -0
- package/datasafe/unifiedAuditPolicy.js.map +1 -0
- package/datasafe/unifiedAuditPolicyDefinition.d.ts +221 -0
- package/datasafe/unifiedAuditPolicyDefinition.js +93 -0
- package/datasafe/unifiedAuditPolicyDefinition.js.map +1 -0
- package/datasafe/userAssessment.d.ts +33 -12
- package/datasafe/userAssessment.js +5 -0
- package/datasafe/userAssessment.js.map +1 -1
- package/disasterrecovery/drProtectionGroup.d.ts +12 -0
- package/disasterrecovery/drProtectionGroup.js +12 -0
- package/disasterrecovery/drProtectionGroup.js.map +1 -1
- package/generativeai/agentDataIngestionJob.d.ts +10 -0
- package/generativeai/agentDataIngestionJob.js +4 -0
- package/generativeai/agentDataIngestionJob.js.map +1 -1
- package/generativeai/agentDataSource.d.ts +3 -40
- package/generativeai/agentDataSource.js +0 -31
- package/generativeai/agentDataSource.js.map +1 -1
- package/generativeai/agentKnowledgeBase.d.ts +11 -11
- package/generativeai/agentKnowledgeBase.js +2 -2
- package/generativeai/agentKnowledgeBase.js.map +1 -1
- package/generativeai/agentTool.d.ts +87 -0
- package/generativeai/agentTool.js +87 -0
- package/generativeai/agentTool.js.map +1 -1
- package/generativeai/getAgentDataIngestionJob.d.ts +5 -0
- package/generativeai/getAgentDataIngestionJob.js.map +1 -1
- package/generativeai/getAgentDataSource.d.ts +1 -5
- package/generativeai/getAgentDataSource.js +0 -4
- package/generativeai/getAgentDataSource.js.map +1 -1
- package/generativeai/getAgentDataSources.d.ts +0 -4
- package/generativeai/getAgentDataSources.js +0 -4
- package/generativeai/getAgentDataSources.js.map +1 -1
- package/generativeai/getAgentKnowledgeBase.d.ts +5 -5
- package/generativeai/getAgentKnowledgeBase.js +0 -4
- package/generativeai/getAgentKnowledgeBase.js.map +1 -1
- package/generativeai/getAgentKnowledgeBases.d.ts +0 -4
- package/generativeai/getAgentKnowledgeBases.js +0 -4
- package/generativeai/getAgentKnowledgeBases.js.map +1 -1
- package/goldengate/deployment.d.ts +24 -0
- package/goldengate/deployment.js +4 -0
- package/goldengate/deployment.js.map +1 -1
- package/goldengate/getDeployment.d.ts +8 -0
- package/goldengate/getDeployment.js.map +1 -1
- package/goldengate/getDeployments.d.ts +14 -0
- package/goldengate/getDeployments.js +4 -0
- package/goldengate/getDeployments.js.map +1 -1
- package/oci/getManagedKafkaKafkaCluster.d.ts +146 -0
- package/oci/getManagedKafkaKafkaCluster.js +54 -0
- package/oci/getManagedKafkaKafkaCluster.js.map +1 -0
- package/oci/getManagedKafkaKafkaClusterConfig.d.ts +110 -0
- package/oci/getManagedKafkaKafkaClusterConfig.js +54 -0
- package/oci/getManagedKafkaKafkaClusterConfig.js.map +1 -0
- package/oci/getManagedKafkaKafkaClusterConfigVersion.d.ts +91 -0
- package/oci/getManagedKafkaKafkaClusterConfigVersion.js +58 -0
- package/oci/getManagedKafkaKafkaClusterConfigVersion.js.map +1 -0
- package/oci/getManagedKafkaKafkaClusterConfigVersions.d.ts +72 -0
- package/oci/getManagedKafkaKafkaClusterConfigVersions.js +56 -0
- package/oci/getManagedKafkaKafkaClusterConfigVersions.js.map +1 -0
- package/oci/getManagedKafkaKafkaClusterConfigs.d.ts +113 -0
- package/oci/getManagedKafkaKafkaClusterConfigs.js +70 -0
- package/oci/getManagedKafkaKafkaClusterConfigs.js.map +1 -0
- package/oci/getManagedKafkaKafkaClusters.d.ts +113 -0
- package/oci/getManagedKafkaKafkaClusters.js +70 -0
- package/oci/getManagedKafkaKafkaClusters.js.map +1 -0
- package/oci/index.d.ts +27 -0
- package/oci/index.js +35 -1
- package/oci/index.js.map +1 -1
- package/oci/managedKafkaKafkaCluster.d.ts +311 -0
- package/oci/managedKafkaKafkaCluster.js +154 -0
- package/oci/managedKafkaKafkaCluster.js.map +1 -0
- package/oci/managedKafkaKafkaClusterConfig.d.ts +191 -0
- package/oci/managedKafkaKafkaClusterConfig.js +110 -0
- package/oci/managedKafkaKafkaClusterConfig.js.map +1 -0
- package/oci/managedKafkaKafkaClusterSuperusersManagement.d.ts +115 -0
- package/oci/managedKafkaKafkaClusterSuperusersManagement.js +80 -0
- package/oci/managedKafkaKafkaClusterSuperusersManagement.js.map +1 -0
- package/package.json +2 -2
- package/types/input.d.ts +742 -34
- package/types/output.d.ts +3765 -543
|
@@ -0,0 +1,218 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
import * as inputs from "../types/input";
|
|
3
|
+
import * as outputs from "../types/output";
|
|
4
|
+
/**
|
|
5
|
+
* This data source provides the list of Security Assessment Template Analytics in Oracle Cloud Infrastructure Data Safe service.
|
|
6
|
+
*
|
|
7
|
+
* Gets a list of template aggregated details in the specified compartment. This provides information about the
|
|
8
|
+
* overall template usage, by returning the count of the target databases/target groups using the templates. It also provides information
|
|
9
|
+
* about the statistics for the template baseline and the comparison related. If the comparison is done, it will show if there is any drift,
|
|
10
|
+
* and how many checks have drifts.
|
|
11
|
+
* The dimension field - isGroup identifies if the targetId belongs to a target group or a individual target.
|
|
12
|
+
* The dimension field - isCompared identifies if the comparison between the latest assessment and the template baseline assessment is done or not.
|
|
13
|
+
* The dimension field - isCompliant identifies if the latest assessment is compliant with the template baseline assessment or not.
|
|
14
|
+
* The dimension field - totalChecksFailed identifies how many checks in the template have drifts in the comparison.
|
|
15
|
+
*
|
|
16
|
+
* When you perform the ListTemplateAnalytics operation, if the parameter compartmentIdInSubtree is set to "true," and if the
|
|
17
|
+
* parameter accessLevel is set to ACCESSIBLE, then the operation returns statistics from the compartments in which the requestor has INSPECT
|
|
18
|
+
* permissions on at least one resource, directly or indirectly (in subcompartments). If the operation is performed at the
|
|
19
|
+
* root compartment and the requestor does not have access to at least one subcompartment of the compartment specified by
|
|
20
|
+
* compartmentId, then "Not Authorized" is returned.
|
|
21
|
+
*
|
|
22
|
+
* ## Example Usage
|
|
23
|
+
*
|
|
24
|
+
* ```typescript
|
|
25
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
26
|
+
* import * as oci from "@pulumi/oci";
|
|
27
|
+
*
|
|
28
|
+
* const testSecurityAssessmentTemplateAnalytics = oci.DataSafe.getSecurityAssessmentTemplateAnalytics({
|
|
29
|
+
* compartmentId: compartmentId,
|
|
30
|
+
* accessLevel: securityAssessmentTemplateAnalyticAccessLevel,
|
|
31
|
+
* compartmentIdInSubtree: securityAssessmentTemplateAnalyticCompartmentIdInSubtree,
|
|
32
|
+
* isCompared: securityAssessmentTemplateAnalyticIsCompared,
|
|
33
|
+
* isCompliant: securityAssessmentTemplateAnalyticIsCompliant,
|
|
34
|
+
* isGroup: securityAssessmentTemplateAnalyticIsGroup,
|
|
35
|
+
* targetDatabaseGroupId: testTargetDatabaseGroup.id,
|
|
36
|
+
* targetId: testTarget.id,
|
|
37
|
+
* templateAssessmentId: testTemplateAssessment.id,
|
|
38
|
+
* templateBaselineAssessmentId: testTemplateBaselineAssessment.id,
|
|
39
|
+
* });
|
|
40
|
+
* ```
|
|
41
|
+
*/
|
|
42
|
+
export declare function getSecurityAssessmentTemplateAnalytics(args: GetSecurityAssessmentTemplateAnalyticsArgs, opts?: pulumi.InvokeOptions): Promise<GetSecurityAssessmentTemplateAnalyticsResult>;
|
|
43
|
+
/**
|
|
44
|
+
* A collection of arguments for invoking getSecurityAssessmentTemplateAnalytics.
|
|
45
|
+
*/
|
|
46
|
+
export interface GetSecurityAssessmentTemplateAnalyticsArgs {
|
|
47
|
+
/**
|
|
48
|
+
* Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
|
49
|
+
*/
|
|
50
|
+
accessLevel?: string;
|
|
51
|
+
/**
|
|
52
|
+
* A filter to return only resources that match the specified compartment OCID.
|
|
53
|
+
*/
|
|
54
|
+
compartmentId: string;
|
|
55
|
+
/**
|
|
56
|
+
* Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
|
57
|
+
*/
|
|
58
|
+
compartmentIdInSubtree?: boolean;
|
|
59
|
+
filters?: inputs.DataSafe.GetSecurityAssessmentTemplateAnalyticsFilter[];
|
|
60
|
+
/**
|
|
61
|
+
* A filter to return only the statistics where the comparison between the latest assessment and the template baseline assessment is done.
|
|
62
|
+
*/
|
|
63
|
+
isCompared?: boolean;
|
|
64
|
+
/**
|
|
65
|
+
* A filter to return only the statistics where the latest assessment is compliant with the template baseline assessment.
|
|
66
|
+
*/
|
|
67
|
+
isCompliant?: boolean;
|
|
68
|
+
/**
|
|
69
|
+
* A filter to return only the target group related information if the OCID belongs to a target group.
|
|
70
|
+
*/
|
|
71
|
+
isGroup?: boolean;
|
|
72
|
+
/**
|
|
73
|
+
* A filter to return the target database group that matches the specified OCID.
|
|
74
|
+
*/
|
|
75
|
+
targetDatabaseGroupId?: string;
|
|
76
|
+
/**
|
|
77
|
+
* A filter to return only items related to a specific target OCID.
|
|
78
|
+
*/
|
|
79
|
+
targetId?: string;
|
|
80
|
+
/**
|
|
81
|
+
* The OCID of the security assessment of type TEMPLATE.
|
|
82
|
+
*/
|
|
83
|
+
templateAssessmentId?: string;
|
|
84
|
+
/**
|
|
85
|
+
* The OCID of the security assessment of type TEMPLATE_BASELINE.
|
|
86
|
+
*/
|
|
87
|
+
templateBaselineAssessmentId?: string;
|
|
88
|
+
}
|
|
89
|
+
/**
|
|
90
|
+
* A collection of values returned by getSecurityAssessmentTemplateAnalytics.
|
|
91
|
+
*/
|
|
92
|
+
export interface GetSecurityAssessmentTemplateAnalyticsResult {
|
|
93
|
+
readonly accessLevel?: string;
|
|
94
|
+
readonly compartmentId: string;
|
|
95
|
+
readonly compartmentIdInSubtree?: boolean;
|
|
96
|
+
readonly filters?: outputs.DataSafe.GetSecurityAssessmentTemplateAnalyticsFilter[];
|
|
97
|
+
/**
|
|
98
|
+
* The provider-assigned unique ID for this managed resource.
|
|
99
|
+
*/
|
|
100
|
+
readonly id: string;
|
|
101
|
+
/**
|
|
102
|
+
* Indicates whether or not the comparison between the latest assessment and the template baseline assessment is done. If the value is false, it means the comparison is not done yet.
|
|
103
|
+
*/
|
|
104
|
+
readonly isCompared?: boolean;
|
|
105
|
+
/**
|
|
106
|
+
* Indicates whether or not the latest assessment is compliant with the template baseline assessment. If the value is false, it means there is drift in the comparison report and the totalChecksFailed field will have a non-zero value.
|
|
107
|
+
*/
|
|
108
|
+
readonly isCompliant?: boolean;
|
|
109
|
+
/**
|
|
110
|
+
* Indicates whether or not the template security assessment is applied to a target group. If the value is false, it means the template security assessment is applied to a individual target.
|
|
111
|
+
*/
|
|
112
|
+
readonly isGroup?: boolean;
|
|
113
|
+
/**
|
|
114
|
+
* The OCID of the target database group that the group assessment is created for. This field will be in the response if the template was applied on a target group.
|
|
115
|
+
*/
|
|
116
|
+
readonly targetDatabaseGroupId?: string;
|
|
117
|
+
/**
|
|
118
|
+
* The OCID of the target database. This field will be in the response if the template was applied on an individual target.
|
|
119
|
+
*/
|
|
120
|
+
readonly targetId?: string;
|
|
121
|
+
/**
|
|
122
|
+
* The list of template_analytics_collection.
|
|
123
|
+
*/
|
|
124
|
+
readonly templateAnalyticsCollections: outputs.DataSafe.GetSecurityAssessmentTemplateAnalyticsTemplateAnalyticsCollection[];
|
|
125
|
+
/**
|
|
126
|
+
* The OCID of the security assessment of type TEMPLATE.
|
|
127
|
+
*/
|
|
128
|
+
readonly templateAssessmentId?: string;
|
|
129
|
+
/**
|
|
130
|
+
* The OCID of the security assessment of type TEMPLATE_BASELINE.
|
|
131
|
+
*/
|
|
132
|
+
readonly templateBaselineAssessmentId?: string;
|
|
133
|
+
}
|
|
134
|
+
/**
|
|
135
|
+
* This data source provides the list of Security Assessment Template Analytics in Oracle Cloud Infrastructure Data Safe service.
|
|
136
|
+
*
|
|
137
|
+
* Gets a list of template aggregated details in the specified compartment. This provides information about the
|
|
138
|
+
* overall template usage, by returning the count of the target databases/target groups using the templates. It also provides information
|
|
139
|
+
* about the statistics for the template baseline and the comparison related. If the comparison is done, it will show if there is any drift,
|
|
140
|
+
* and how many checks have drifts.
|
|
141
|
+
* The dimension field - isGroup identifies if the targetId belongs to a target group or a individual target.
|
|
142
|
+
* The dimension field - isCompared identifies if the comparison between the latest assessment and the template baseline assessment is done or not.
|
|
143
|
+
* The dimension field - isCompliant identifies if the latest assessment is compliant with the template baseline assessment or not.
|
|
144
|
+
* The dimension field - totalChecksFailed identifies how many checks in the template have drifts in the comparison.
|
|
145
|
+
*
|
|
146
|
+
* When you perform the ListTemplateAnalytics operation, if the parameter compartmentIdInSubtree is set to "true," and if the
|
|
147
|
+
* parameter accessLevel is set to ACCESSIBLE, then the operation returns statistics from the compartments in which the requestor has INSPECT
|
|
148
|
+
* permissions on at least one resource, directly or indirectly (in subcompartments). If the operation is performed at the
|
|
149
|
+
* root compartment and the requestor does not have access to at least one subcompartment of the compartment specified by
|
|
150
|
+
* compartmentId, then "Not Authorized" is returned.
|
|
151
|
+
*
|
|
152
|
+
* ## Example Usage
|
|
153
|
+
*
|
|
154
|
+
* ```typescript
|
|
155
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
156
|
+
* import * as oci from "@pulumi/oci";
|
|
157
|
+
*
|
|
158
|
+
* const testSecurityAssessmentTemplateAnalytics = oci.DataSafe.getSecurityAssessmentTemplateAnalytics({
|
|
159
|
+
* compartmentId: compartmentId,
|
|
160
|
+
* accessLevel: securityAssessmentTemplateAnalyticAccessLevel,
|
|
161
|
+
* compartmentIdInSubtree: securityAssessmentTemplateAnalyticCompartmentIdInSubtree,
|
|
162
|
+
* isCompared: securityAssessmentTemplateAnalyticIsCompared,
|
|
163
|
+
* isCompliant: securityAssessmentTemplateAnalyticIsCompliant,
|
|
164
|
+
* isGroup: securityAssessmentTemplateAnalyticIsGroup,
|
|
165
|
+
* targetDatabaseGroupId: testTargetDatabaseGroup.id,
|
|
166
|
+
* targetId: testTarget.id,
|
|
167
|
+
* templateAssessmentId: testTemplateAssessment.id,
|
|
168
|
+
* templateBaselineAssessmentId: testTemplateBaselineAssessment.id,
|
|
169
|
+
* });
|
|
170
|
+
* ```
|
|
171
|
+
*/
|
|
172
|
+
export declare function getSecurityAssessmentTemplateAnalyticsOutput(args: GetSecurityAssessmentTemplateAnalyticsOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output<GetSecurityAssessmentTemplateAnalyticsResult>;
|
|
173
|
+
/**
|
|
174
|
+
* A collection of arguments for invoking getSecurityAssessmentTemplateAnalytics.
|
|
175
|
+
*/
|
|
176
|
+
export interface GetSecurityAssessmentTemplateAnalyticsOutputArgs {
|
|
177
|
+
/**
|
|
178
|
+
* Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
|
179
|
+
*/
|
|
180
|
+
accessLevel?: pulumi.Input<string>;
|
|
181
|
+
/**
|
|
182
|
+
* A filter to return only resources that match the specified compartment OCID.
|
|
183
|
+
*/
|
|
184
|
+
compartmentId: pulumi.Input<string>;
|
|
185
|
+
/**
|
|
186
|
+
* Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
|
187
|
+
*/
|
|
188
|
+
compartmentIdInSubtree?: pulumi.Input<boolean>;
|
|
189
|
+
filters?: pulumi.Input<pulumi.Input<inputs.DataSafe.GetSecurityAssessmentTemplateAnalyticsFilterArgs>[]>;
|
|
190
|
+
/**
|
|
191
|
+
* A filter to return only the statistics where the comparison between the latest assessment and the template baseline assessment is done.
|
|
192
|
+
*/
|
|
193
|
+
isCompared?: pulumi.Input<boolean>;
|
|
194
|
+
/**
|
|
195
|
+
* A filter to return only the statistics where the latest assessment is compliant with the template baseline assessment.
|
|
196
|
+
*/
|
|
197
|
+
isCompliant?: pulumi.Input<boolean>;
|
|
198
|
+
/**
|
|
199
|
+
* A filter to return only the target group related information if the OCID belongs to a target group.
|
|
200
|
+
*/
|
|
201
|
+
isGroup?: pulumi.Input<boolean>;
|
|
202
|
+
/**
|
|
203
|
+
* A filter to return the target database group that matches the specified OCID.
|
|
204
|
+
*/
|
|
205
|
+
targetDatabaseGroupId?: pulumi.Input<string>;
|
|
206
|
+
/**
|
|
207
|
+
* A filter to return only items related to a specific target OCID.
|
|
208
|
+
*/
|
|
209
|
+
targetId?: pulumi.Input<string>;
|
|
210
|
+
/**
|
|
211
|
+
* The OCID of the security assessment of type TEMPLATE.
|
|
212
|
+
*/
|
|
213
|
+
templateAssessmentId?: pulumi.Input<string>;
|
|
214
|
+
/**
|
|
215
|
+
* The OCID of the security assessment of type TEMPLATE_BASELINE.
|
|
216
|
+
*/
|
|
217
|
+
templateBaselineAssessmentId?: pulumi.Input<string>;
|
|
218
|
+
}
|
|
@@ -0,0 +1,118 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by pulumi-language-nodejs. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.getSecurityAssessmentTemplateAnalyticsOutput = exports.getSecurityAssessmentTemplateAnalytics = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* This data source provides the list of Security Assessment Template Analytics in Oracle Cloud Infrastructure Data Safe service.
|
|
10
|
+
*
|
|
11
|
+
* Gets a list of template aggregated details in the specified compartment. This provides information about the
|
|
12
|
+
* overall template usage, by returning the count of the target databases/target groups using the templates. It also provides information
|
|
13
|
+
* about the statistics for the template baseline and the comparison related. If the comparison is done, it will show if there is any drift,
|
|
14
|
+
* and how many checks have drifts.
|
|
15
|
+
* The dimension field - isGroup identifies if the targetId belongs to a target group or a individual target.
|
|
16
|
+
* The dimension field - isCompared identifies if the comparison between the latest assessment and the template baseline assessment is done or not.
|
|
17
|
+
* The dimension field - isCompliant identifies if the latest assessment is compliant with the template baseline assessment or not.
|
|
18
|
+
* The dimension field - totalChecksFailed identifies how many checks in the template have drifts in the comparison.
|
|
19
|
+
*
|
|
20
|
+
* When you perform the ListTemplateAnalytics operation, if the parameter compartmentIdInSubtree is set to "true," and if the
|
|
21
|
+
* parameter accessLevel is set to ACCESSIBLE, then the operation returns statistics from the compartments in which the requestor has INSPECT
|
|
22
|
+
* permissions on at least one resource, directly or indirectly (in subcompartments). If the operation is performed at the
|
|
23
|
+
* root compartment and the requestor does not have access to at least one subcompartment of the compartment specified by
|
|
24
|
+
* compartmentId, then "Not Authorized" is returned.
|
|
25
|
+
*
|
|
26
|
+
* ## Example Usage
|
|
27
|
+
*
|
|
28
|
+
* ```typescript
|
|
29
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
30
|
+
* import * as oci from "@pulumi/oci";
|
|
31
|
+
*
|
|
32
|
+
* const testSecurityAssessmentTemplateAnalytics = oci.DataSafe.getSecurityAssessmentTemplateAnalytics({
|
|
33
|
+
* compartmentId: compartmentId,
|
|
34
|
+
* accessLevel: securityAssessmentTemplateAnalyticAccessLevel,
|
|
35
|
+
* compartmentIdInSubtree: securityAssessmentTemplateAnalyticCompartmentIdInSubtree,
|
|
36
|
+
* isCompared: securityAssessmentTemplateAnalyticIsCompared,
|
|
37
|
+
* isCompliant: securityAssessmentTemplateAnalyticIsCompliant,
|
|
38
|
+
* isGroup: securityAssessmentTemplateAnalyticIsGroup,
|
|
39
|
+
* targetDatabaseGroupId: testTargetDatabaseGroup.id,
|
|
40
|
+
* targetId: testTarget.id,
|
|
41
|
+
* templateAssessmentId: testTemplateAssessment.id,
|
|
42
|
+
* templateBaselineAssessmentId: testTemplateBaselineAssessment.id,
|
|
43
|
+
* });
|
|
44
|
+
* ```
|
|
45
|
+
*/
|
|
46
|
+
function getSecurityAssessmentTemplateAnalytics(args, opts) {
|
|
47
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
48
|
+
return pulumi.runtime.invoke("oci:DataSafe/getSecurityAssessmentTemplateAnalytics:getSecurityAssessmentTemplateAnalytics", {
|
|
49
|
+
"accessLevel": args.accessLevel,
|
|
50
|
+
"compartmentId": args.compartmentId,
|
|
51
|
+
"compartmentIdInSubtree": args.compartmentIdInSubtree,
|
|
52
|
+
"filters": args.filters,
|
|
53
|
+
"isCompared": args.isCompared,
|
|
54
|
+
"isCompliant": args.isCompliant,
|
|
55
|
+
"isGroup": args.isGroup,
|
|
56
|
+
"targetDatabaseGroupId": args.targetDatabaseGroupId,
|
|
57
|
+
"targetId": args.targetId,
|
|
58
|
+
"templateAssessmentId": args.templateAssessmentId,
|
|
59
|
+
"templateBaselineAssessmentId": args.templateBaselineAssessmentId,
|
|
60
|
+
}, opts);
|
|
61
|
+
}
|
|
62
|
+
exports.getSecurityAssessmentTemplateAnalytics = getSecurityAssessmentTemplateAnalytics;
|
|
63
|
+
/**
|
|
64
|
+
* This data source provides the list of Security Assessment Template Analytics in Oracle Cloud Infrastructure Data Safe service.
|
|
65
|
+
*
|
|
66
|
+
* Gets a list of template aggregated details in the specified compartment. This provides information about the
|
|
67
|
+
* overall template usage, by returning the count of the target databases/target groups using the templates. It also provides information
|
|
68
|
+
* about the statistics for the template baseline and the comparison related. If the comparison is done, it will show if there is any drift,
|
|
69
|
+
* and how many checks have drifts.
|
|
70
|
+
* The dimension field - isGroup identifies if the targetId belongs to a target group or a individual target.
|
|
71
|
+
* The dimension field - isCompared identifies if the comparison between the latest assessment and the template baseline assessment is done or not.
|
|
72
|
+
* The dimension field - isCompliant identifies if the latest assessment is compliant with the template baseline assessment or not.
|
|
73
|
+
* The dimension field - totalChecksFailed identifies how many checks in the template have drifts in the comparison.
|
|
74
|
+
*
|
|
75
|
+
* When you perform the ListTemplateAnalytics operation, if the parameter compartmentIdInSubtree is set to "true," and if the
|
|
76
|
+
* parameter accessLevel is set to ACCESSIBLE, then the operation returns statistics from the compartments in which the requestor has INSPECT
|
|
77
|
+
* permissions on at least one resource, directly or indirectly (in subcompartments). If the operation is performed at the
|
|
78
|
+
* root compartment and the requestor does not have access to at least one subcompartment of the compartment specified by
|
|
79
|
+
* compartmentId, then "Not Authorized" is returned.
|
|
80
|
+
*
|
|
81
|
+
* ## Example Usage
|
|
82
|
+
*
|
|
83
|
+
* ```typescript
|
|
84
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
85
|
+
* import * as oci from "@pulumi/oci";
|
|
86
|
+
*
|
|
87
|
+
* const testSecurityAssessmentTemplateAnalytics = oci.DataSafe.getSecurityAssessmentTemplateAnalytics({
|
|
88
|
+
* compartmentId: compartmentId,
|
|
89
|
+
* accessLevel: securityAssessmentTemplateAnalyticAccessLevel,
|
|
90
|
+
* compartmentIdInSubtree: securityAssessmentTemplateAnalyticCompartmentIdInSubtree,
|
|
91
|
+
* isCompared: securityAssessmentTemplateAnalyticIsCompared,
|
|
92
|
+
* isCompliant: securityAssessmentTemplateAnalyticIsCompliant,
|
|
93
|
+
* isGroup: securityAssessmentTemplateAnalyticIsGroup,
|
|
94
|
+
* targetDatabaseGroupId: testTargetDatabaseGroup.id,
|
|
95
|
+
* targetId: testTarget.id,
|
|
96
|
+
* templateAssessmentId: testTemplateAssessment.id,
|
|
97
|
+
* templateBaselineAssessmentId: testTemplateBaselineAssessment.id,
|
|
98
|
+
* });
|
|
99
|
+
* ```
|
|
100
|
+
*/
|
|
101
|
+
function getSecurityAssessmentTemplateAnalyticsOutput(args, opts) {
|
|
102
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
103
|
+
return pulumi.runtime.invokeOutput("oci:DataSafe/getSecurityAssessmentTemplateAnalytics:getSecurityAssessmentTemplateAnalytics", {
|
|
104
|
+
"accessLevel": args.accessLevel,
|
|
105
|
+
"compartmentId": args.compartmentId,
|
|
106
|
+
"compartmentIdInSubtree": args.compartmentIdInSubtree,
|
|
107
|
+
"filters": args.filters,
|
|
108
|
+
"isCompared": args.isCompared,
|
|
109
|
+
"isCompliant": args.isCompliant,
|
|
110
|
+
"isGroup": args.isGroup,
|
|
111
|
+
"targetDatabaseGroupId": args.targetDatabaseGroupId,
|
|
112
|
+
"targetId": args.targetId,
|
|
113
|
+
"templateAssessmentId": args.templateAssessmentId,
|
|
114
|
+
"templateBaselineAssessmentId": args.templateBaselineAssessmentId,
|
|
115
|
+
}, opts);
|
|
116
|
+
}
|
|
117
|
+
exports.getSecurityAssessmentTemplateAnalyticsOutput = getSecurityAssessmentTemplateAnalyticsOutput;
|
|
118
|
+
//# sourceMappingURL=getSecurityAssessmentTemplateAnalytics.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"getSecurityAssessmentTemplateAnalytics.js","sourceRoot":"","sources":["../../datasafe/getSecurityAssessmentTemplateAnalytics.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAqCG;AACH,SAAgB,sCAAsC,CAAC,IAAgD,EAAE,IAA2B;IAChI,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,4FAA4F,EAAE;QACvH,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,eAAe,EAAE,IAAI,CAAC,aAAa;QACnC,wBAAwB,EAAE,IAAI,CAAC,sBAAsB;QACrD,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,YAAY,EAAE,IAAI,CAAC,UAAU;QAC7B,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,uBAAuB,EAAE,IAAI,CAAC,qBAAqB;QACnD,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,sBAAsB,EAAE,IAAI,CAAC,oBAAoB;QACjD,8BAA8B,EAAE,IAAI,CAAC,4BAA4B;KACpE,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAfD,wFAeC;AA8FD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAqCG;AACH,SAAgB,4CAA4C,CAAC,IAAsD,EAAE,IAAiC;IAClJ,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,4FAA4F,EAAE;QAC7H,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,eAAe,EAAE,IAAI,CAAC,aAAa;QACnC,wBAAwB,EAAE,IAAI,CAAC,sBAAsB;QACrD,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,YAAY,EAAE,IAAI,CAAC,UAAU;QAC7B,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,uBAAuB,EAAE,IAAI,CAAC,qBAAqB;QACnD,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,sBAAsB,EAAE,IAAI,CAAC,oBAAoB;QACjD,8BAA8B,EAAE,IAAI,CAAC,4BAA4B;KACpE,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAfD,oGAeC"}
|
|
@@ -0,0 +1,178 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
import * as inputs from "../types/input";
|
|
3
|
+
import * as outputs from "../types/output";
|
|
4
|
+
/**
|
|
5
|
+
* This data source provides the list of Security Assessment Template Association Analytics in Oracle Cloud Infrastructure Data Safe service.
|
|
6
|
+
*
|
|
7
|
+
* Gets a list of template association details in the specified compartment. This provides information about the
|
|
8
|
+
* overall template usage, by returning the count of the target databases/target groups using the templates.
|
|
9
|
+
*
|
|
10
|
+
* If the template baseline is created for a target group which contains several targets, we will have each individual target
|
|
11
|
+
* listed there as targetId field together with targetDatabaseGroupId. And if the template baseline is created for an individual target,
|
|
12
|
+
* it will have targetId field only.
|
|
13
|
+
*
|
|
14
|
+
* By leveraging the targetId filter, you will be able to know all the template or template baseline that this target has something to do with.
|
|
15
|
+
* No matter if they are directly applied or created for this target, or they are for the target group the target belongs to.
|
|
16
|
+
*
|
|
17
|
+
* When you perform the ListTemplateAssociationAnalytics operation, if the parameter compartmentIdInSubtree is set to "true," and if the
|
|
18
|
+
* parameter accessLevel is set to ACCESSIBLE, then the operation returns statistics from the compartments in which the requestor has INSPECT
|
|
19
|
+
* permissions on at least one resource, directly or indirectly (in subcompartments). If the operation is performed at the
|
|
20
|
+
* root compartment and the requestor does not have access to at least one subcompartment of the compartment specified by
|
|
21
|
+
* compartmentId, then "Not Authorized" is returned.
|
|
22
|
+
*
|
|
23
|
+
* ## Example Usage
|
|
24
|
+
*
|
|
25
|
+
* ```typescript
|
|
26
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
27
|
+
* import * as oci from "@pulumi/oci";
|
|
28
|
+
*
|
|
29
|
+
* const testSecurityAssessmentTemplateAssociationAnalytics = oci.DataSafe.getSecurityAssessmentTemplateAssociationAnalytics({
|
|
30
|
+
* compartmentId: compartmentId,
|
|
31
|
+
* accessLevel: securityAssessmentTemplateAssociationAnalyticAccessLevel,
|
|
32
|
+
* compartmentIdInSubtree: securityAssessmentTemplateAssociationAnalyticCompartmentIdInSubtree,
|
|
33
|
+
* targetDatabaseGroupId: testTargetDatabaseGroup.id,
|
|
34
|
+
* targetId: testTarget.id,
|
|
35
|
+
* templateAssessmentId: testTemplateAssessment.id,
|
|
36
|
+
* templateBaselineAssessmentId: testTemplateBaselineAssessment.id,
|
|
37
|
+
* });
|
|
38
|
+
* ```
|
|
39
|
+
*/
|
|
40
|
+
export declare function getSecurityAssessmentTemplateAssociationAnalytics(args: GetSecurityAssessmentTemplateAssociationAnalyticsArgs, opts?: pulumi.InvokeOptions): Promise<GetSecurityAssessmentTemplateAssociationAnalyticsResult>;
|
|
41
|
+
/**
|
|
42
|
+
* A collection of arguments for invoking getSecurityAssessmentTemplateAssociationAnalytics.
|
|
43
|
+
*/
|
|
44
|
+
export interface GetSecurityAssessmentTemplateAssociationAnalyticsArgs {
|
|
45
|
+
/**
|
|
46
|
+
* Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
|
47
|
+
*/
|
|
48
|
+
accessLevel?: string;
|
|
49
|
+
/**
|
|
50
|
+
* A filter to return only resources that match the specified compartment OCID.
|
|
51
|
+
*/
|
|
52
|
+
compartmentId: string;
|
|
53
|
+
/**
|
|
54
|
+
* Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
|
55
|
+
*/
|
|
56
|
+
compartmentIdInSubtree?: boolean;
|
|
57
|
+
filters?: inputs.DataSafe.GetSecurityAssessmentTemplateAssociationAnalyticsFilter[];
|
|
58
|
+
/**
|
|
59
|
+
* A filter to return the target database group that matches the specified OCID.
|
|
60
|
+
*/
|
|
61
|
+
targetDatabaseGroupId?: string;
|
|
62
|
+
/**
|
|
63
|
+
* A filter to return only items related to a specific target OCID.
|
|
64
|
+
*/
|
|
65
|
+
targetId?: string;
|
|
66
|
+
/**
|
|
67
|
+
* The OCID of the security assessment of type TEMPLATE.
|
|
68
|
+
*/
|
|
69
|
+
templateAssessmentId?: string;
|
|
70
|
+
/**
|
|
71
|
+
* The OCID of the security assessment of type TEMPLATE_BASELINE.
|
|
72
|
+
*/
|
|
73
|
+
templateBaselineAssessmentId?: string;
|
|
74
|
+
}
|
|
75
|
+
/**
|
|
76
|
+
* A collection of values returned by getSecurityAssessmentTemplateAssociationAnalytics.
|
|
77
|
+
*/
|
|
78
|
+
export interface GetSecurityAssessmentTemplateAssociationAnalyticsResult {
|
|
79
|
+
readonly accessLevel?: string;
|
|
80
|
+
readonly compartmentId: string;
|
|
81
|
+
readonly compartmentIdInSubtree?: boolean;
|
|
82
|
+
readonly filters?: outputs.DataSafe.GetSecurityAssessmentTemplateAssociationAnalyticsFilter[];
|
|
83
|
+
/**
|
|
84
|
+
* The provider-assigned unique ID for this managed resource.
|
|
85
|
+
*/
|
|
86
|
+
readonly id: string;
|
|
87
|
+
/**
|
|
88
|
+
* The OCID of the target database group that the group assessment is created for. This field will be in the response if the template was applied on a target group.
|
|
89
|
+
*/
|
|
90
|
+
readonly targetDatabaseGroupId?: string;
|
|
91
|
+
/**
|
|
92
|
+
* The OCID of the target database. If the template was applied on a target group, this field will be the OCID of the target members of the target group. If the template was applied on an individual target, this field will contain that targetId.
|
|
93
|
+
*/
|
|
94
|
+
readonly targetId?: string;
|
|
95
|
+
/**
|
|
96
|
+
* The OCID of the security assessment of type TEMPLATE.
|
|
97
|
+
*/
|
|
98
|
+
readonly templateAssessmentId?: string;
|
|
99
|
+
/**
|
|
100
|
+
* The list of template_association_analytics_collection.
|
|
101
|
+
*/
|
|
102
|
+
readonly templateAssociationAnalyticsCollections: outputs.DataSafe.GetSecurityAssessmentTemplateAssociationAnalyticsTemplateAssociationAnalyticsCollection[];
|
|
103
|
+
/**
|
|
104
|
+
* The OCID of the security assessment of type TEMPLATE_BASELINE.
|
|
105
|
+
*/
|
|
106
|
+
readonly templateBaselineAssessmentId?: string;
|
|
107
|
+
}
|
|
108
|
+
/**
|
|
109
|
+
* This data source provides the list of Security Assessment Template Association Analytics in Oracle Cloud Infrastructure Data Safe service.
|
|
110
|
+
*
|
|
111
|
+
* Gets a list of template association details in the specified compartment. This provides information about the
|
|
112
|
+
* overall template usage, by returning the count of the target databases/target groups using the templates.
|
|
113
|
+
*
|
|
114
|
+
* If the template baseline is created for a target group which contains several targets, we will have each individual target
|
|
115
|
+
* listed there as targetId field together with targetDatabaseGroupId. And if the template baseline is created for an individual target,
|
|
116
|
+
* it will have targetId field only.
|
|
117
|
+
*
|
|
118
|
+
* By leveraging the targetId filter, you will be able to know all the template or template baseline that this target has something to do with.
|
|
119
|
+
* No matter if they are directly applied or created for this target, or they are for the target group the target belongs to.
|
|
120
|
+
*
|
|
121
|
+
* When you perform the ListTemplateAssociationAnalytics operation, if the parameter compartmentIdInSubtree is set to "true," and if the
|
|
122
|
+
* parameter accessLevel is set to ACCESSIBLE, then the operation returns statistics from the compartments in which the requestor has INSPECT
|
|
123
|
+
* permissions on at least one resource, directly or indirectly (in subcompartments). If the operation is performed at the
|
|
124
|
+
* root compartment and the requestor does not have access to at least one subcompartment of the compartment specified by
|
|
125
|
+
* compartmentId, then "Not Authorized" is returned.
|
|
126
|
+
*
|
|
127
|
+
* ## Example Usage
|
|
128
|
+
*
|
|
129
|
+
* ```typescript
|
|
130
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
131
|
+
* import * as oci from "@pulumi/oci";
|
|
132
|
+
*
|
|
133
|
+
* const testSecurityAssessmentTemplateAssociationAnalytics = oci.DataSafe.getSecurityAssessmentTemplateAssociationAnalytics({
|
|
134
|
+
* compartmentId: compartmentId,
|
|
135
|
+
* accessLevel: securityAssessmentTemplateAssociationAnalyticAccessLevel,
|
|
136
|
+
* compartmentIdInSubtree: securityAssessmentTemplateAssociationAnalyticCompartmentIdInSubtree,
|
|
137
|
+
* targetDatabaseGroupId: testTargetDatabaseGroup.id,
|
|
138
|
+
* targetId: testTarget.id,
|
|
139
|
+
* templateAssessmentId: testTemplateAssessment.id,
|
|
140
|
+
* templateBaselineAssessmentId: testTemplateBaselineAssessment.id,
|
|
141
|
+
* });
|
|
142
|
+
* ```
|
|
143
|
+
*/
|
|
144
|
+
export declare function getSecurityAssessmentTemplateAssociationAnalyticsOutput(args: GetSecurityAssessmentTemplateAssociationAnalyticsOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output<GetSecurityAssessmentTemplateAssociationAnalyticsResult>;
|
|
145
|
+
/**
|
|
146
|
+
* A collection of arguments for invoking getSecurityAssessmentTemplateAssociationAnalytics.
|
|
147
|
+
*/
|
|
148
|
+
export interface GetSecurityAssessmentTemplateAssociationAnalyticsOutputArgs {
|
|
149
|
+
/**
|
|
150
|
+
* Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
|
151
|
+
*/
|
|
152
|
+
accessLevel?: pulumi.Input<string>;
|
|
153
|
+
/**
|
|
154
|
+
* A filter to return only resources that match the specified compartment OCID.
|
|
155
|
+
*/
|
|
156
|
+
compartmentId: pulumi.Input<string>;
|
|
157
|
+
/**
|
|
158
|
+
* Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
|
159
|
+
*/
|
|
160
|
+
compartmentIdInSubtree?: pulumi.Input<boolean>;
|
|
161
|
+
filters?: pulumi.Input<pulumi.Input<inputs.DataSafe.GetSecurityAssessmentTemplateAssociationAnalyticsFilterArgs>[]>;
|
|
162
|
+
/**
|
|
163
|
+
* A filter to return the target database group that matches the specified OCID.
|
|
164
|
+
*/
|
|
165
|
+
targetDatabaseGroupId?: pulumi.Input<string>;
|
|
166
|
+
/**
|
|
167
|
+
* A filter to return only items related to a specific target OCID.
|
|
168
|
+
*/
|
|
169
|
+
targetId?: pulumi.Input<string>;
|
|
170
|
+
/**
|
|
171
|
+
* The OCID of the security assessment of type TEMPLATE.
|
|
172
|
+
*/
|
|
173
|
+
templateAssessmentId?: pulumi.Input<string>;
|
|
174
|
+
/**
|
|
175
|
+
* The OCID of the security assessment of type TEMPLATE_BASELINE.
|
|
176
|
+
*/
|
|
177
|
+
templateBaselineAssessmentId?: pulumi.Input<string>;
|
|
178
|
+
}
|
|
@@ -0,0 +1,108 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by pulumi-language-nodejs. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.getSecurityAssessmentTemplateAssociationAnalyticsOutput = exports.getSecurityAssessmentTemplateAssociationAnalytics = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* This data source provides the list of Security Assessment Template Association Analytics in Oracle Cloud Infrastructure Data Safe service.
|
|
10
|
+
*
|
|
11
|
+
* Gets a list of template association details in the specified compartment. This provides information about the
|
|
12
|
+
* overall template usage, by returning the count of the target databases/target groups using the templates.
|
|
13
|
+
*
|
|
14
|
+
* If the template baseline is created for a target group which contains several targets, we will have each individual target
|
|
15
|
+
* listed there as targetId field together with targetDatabaseGroupId. And if the template baseline is created for an individual target,
|
|
16
|
+
* it will have targetId field only.
|
|
17
|
+
*
|
|
18
|
+
* By leveraging the targetId filter, you will be able to know all the template or template baseline that this target has something to do with.
|
|
19
|
+
* No matter if they are directly applied or created for this target, or they are for the target group the target belongs to.
|
|
20
|
+
*
|
|
21
|
+
* When you perform the ListTemplateAssociationAnalytics operation, if the parameter compartmentIdInSubtree is set to "true," and if the
|
|
22
|
+
* parameter accessLevel is set to ACCESSIBLE, then the operation returns statistics from the compartments in which the requestor has INSPECT
|
|
23
|
+
* permissions on at least one resource, directly or indirectly (in subcompartments). If the operation is performed at the
|
|
24
|
+
* root compartment and the requestor does not have access to at least one subcompartment of the compartment specified by
|
|
25
|
+
* compartmentId, then "Not Authorized" is returned.
|
|
26
|
+
*
|
|
27
|
+
* ## Example Usage
|
|
28
|
+
*
|
|
29
|
+
* ```typescript
|
|
30
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
31
|
+
* import * as oci from "@pulumi/oci";
|
|
32
|
+
*
|
|
33
|
+
* const testSecurityAssessmentTemplateAssociationAnalytics = oci.DataSafe.getSecurityAssessmentTemplateAssociationAnalytics({
|
|
34
|
+
* compartmentId: compartmentId,
|
|
35
|
+
* accessLevel: securityAssessmentTemplateAssociationAnalyticAccessLevel,
|
|
36
|
+
* compartmentIdInSubtree: securityAssessmentTemplateAssociationAnalyticCompartmentIdInSubtree,
|
|
37
|
+
* targetDatabaseGroupId: testTargetDatabaseGroup.id,
|
|
38
|
+
* targetId: testTarget.id,
|
|
39
|
+
* templateAssessmentId: testTemplateAssessment.id,
|
|
40
|
+
* templateBaselineAssessmentId: testTemplateBaselineAssessment.id,
|
|
41
|
+
* });
|
|
42
|
+
* ```
|
|
43
|
+
*/
|
|
44
|
+
function getSecurityAssessmentTemplateAssociationAnalytics(args, opts) {
|
|
45
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
46
|
+
return pulumi.runtime.invoke("oci:DataSafe/getSecurityAssessmentTemplateAssociationAnalytics:getSecurityAssessmentTemplateAssociationAnalytics", {
|
|
47
|
+
"accessLevel": args.accessLevel,
|
|
48
|
+
"compartmentId": args.compartmentId,
|
|
49
|
+
"compartmentIdInSubtree": args.compartmentIdInSubtree,
|
|
50
|
+
"filters": args.filters,
|
|
51
|
+
"targetDatabaseGroupId": args.targetDatabaseGroupId,
|
|
52
|
+
"targetId": args.targetId,
|
|
53
|
+
"templateAssessmentId": args.templateAssessmentId,
|
|
54
|
+
"templateBaselineAssessmentId": args.templateBaselineAssessmentId,
|
|
55
|
+
}, opts);
|
|
56
|
+
}
|
|
57
|
+
exports.getSecurityAssessmentTemplateAssociationAnalytics = getSecurityAssessmentTemplateAssociationAnalytics;
|
|
58
|
+
/**
|
|
59
|
+
* This data source provides the list of Security Assessment Template Association Analytics in Oracle Cloud Infrastructure Data Safe service.
|
|
60
|
+
*
|
|
61
|
+
* Gets a list of template association details in the specified compartment. This provides information about the
|
|
62
|
+
* overall template usage, by returning the count of the target databases/target groups using the templates.
|
|
63
|
+
*
|
|
64
|
+
* If the template baseline is created for a target group which contains several targets, we will have each individual target
|
|
65
|
+
* listed there as targetId field together with targetDatabaseGroupId. And if the template baseline is created for an individual target,
|
|
66
|
+
* it will have targetId field only.
|
|
67
|
+
*
|
|
68
|
+
* By leveraging the targetId filter, you will be able to know all the template or template baseline that this target has something to do with.
|
|
69
|
+
* No matter if they are directly applied or created for this target, or they are for the target group the target belongs to.
|
|
70
|
+
*
|
|
71
|
+
* When you perform the ListTemplateAssociationAnalytics operation, if the parameter compartmentIdInSubtree is set to "true," and if the
|
|
72
|
+
* parameter accessLevel is set to ACCESSIBLE, then the operation returns statistics from the compartments in which the requestor has INSPECT
|
|
73
|
+
* permissions on at least one resource, directly or indirectly (in subcompartments). If the operation is performed at the
|
|
74
|
+
* root compartment and the requestor does not have access to at least one subcompartment of the compartment specified by
|
|
75
|
+
* compartmentId, then "Not Authorized" is returned.
|
|
76
|
+
*
|
|
77
|
+
* ## Example Usage
|
|
78
|
+
*
|
|
79
|
+
* ```typescript
|
|
80
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
81
|
+
* import * as oci from "@pulumi/oci";
|
|
82
|
+
*
|
|
83
|
+
* const testSecurityAssessmentTemplateAssociationAnalytics = oci.DataSafe.getSecurityAssessmentTemplateAssociationAnalytics({
|
|
84
|
+
* compartmentId: compartmentId,
|
|
85
|
+
* accessLevel: securityAssessmentTemplateAssociationAnalyticAccessLevel,
|
|
86
|
+
* compartmentIdInSubtree: securityAssessmentTemplateAssociationAnalyticCompartmentIdInSubtree,
|
|
87
|
+
* targetDatabaseGroupId: testTargetDatabaseGroup.id,
|
|
88
|
+
* targetId: testTarget.id,
|
|
89
|
+
* templateAssessmentId: testTemplateAssessment.id,
|
|
90
|
+
* templateBaselineAssessmentId: testTemplateBaselineAssessment.id,
|
|
91
|
+
* });
|
|
92
|
+
* ```
|
|
93
|
+
*/
|
|
94
|
+
function getSecurityAssessmentTemplateAssociationAnalyticsOutput(args, opts) {
|
|
95
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
96
|
+
return pulumi.runtime.invokeOutput("oci:DataSafe/getSecurityAssessmentTemplateAssociationAnalytics:getSecurityAssessmentTemplateAssociationAnalytics", {
|
|
97
|
+
"accessLevel": args.accessLevel,
|
|
98
|
+
"compartmentId": args.compartmentId,
|
|
99
|
+
"compartmentIdInSubtree": args.compartmentIdInSubtree,
|
|
100
|
+
"filters": args.filters,
|
|
101
|
+
"targetDatabaseGroupId": args.targetDatabaseGroupId,
|
|
102
|
+
"targetId": args.targetId,
|
|
103
|
+
"templateAssessmentId": args.templateAssessmentId,
|
|
104
|
+
"templateBaselineAssessmentId": args.templateBaselineAssessmentId,
|
|
105
|
+
}, opts);
|
|
106
|
+
}
|
|
107
|
+
exports.getSecurityAssessmentTemplateAssociationAnalyticsOutput = getSecurityAssessmentTemplateAssociationAnalyticsOutput;
|
|
108
|
+
//# sourceMappingURL=getSecurityAssessmentTemplateAssociationAnalytics.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"getSecurityAssessmentTemplateAssociationAnalytics.js","sourceRoot":"","sources":["../../datasafe/getSecurityAssessmentTemplateAssociationAnalytics.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAmCG;AACH,SAAgB,iDAAiD,CAAC,IAA2D,EAAE,IAA2B;IACtJ,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,kHAAkH,EAAE;QAC7I,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,eAAe,EAAE,IAAI,CAAC,aAAa;QACnC,wBAAwB,EAAE,IAAI,CAAC,sBAAsB;QACrD,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,uBAAuB,EAAE,IAAI,CAAC,qBAAqB;QACnD,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,sBAAsB,EAAE,IAAI,CAAC,oBAAoB;QACjD,8BAA8B,EAAE,IAAI,CAAC,4BAA4B;KACpE,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAZD,8GAYC;AAsED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAmCG;AACH,SAAgB,uDAAuD,CAAC,IAAiE,EAAE,IAAiC;IACxK,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,kHAAkH,EAAE;QACnJ,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,eAAe,EAAE,IAAI,CAAC,aAAa;QACnC,wBAAwB,EAAE,IAAI,CAAC,sBAAsB;QACrD,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,uBAAuB,EAAE,IAAI,CAAC,qBAAqB;QACnD,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,sBAAsB,EAAE,IAAI,CAAC,oBAAoB;QACjD,8BAA8B,EAAE,IAAI,CAAC,4BAA4B;KACpE,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAZD,0HAYC"}
|