mv-oci-sdk 2.142.0__py3-none-any.whl → 2.142.0.1__py3-none-any.whl
Sign up to get free protection for your applications and to get access to all the features.
- {mv_oci_sdk-2.142.0.dist-info → mv_oci_sdk-2.142.0.1.dist-info}/METADATA +3 -3
- {mv_oci_sdk-2.142.0.dist-info → mv_oci_sdk-2.142.0.1.dist-info}/RECORD +197 -6
- oci/file_storage/__init__.py +14 -0
- oci/file_storage/file_storage_client.py +8601 -0
- oci/file_storage/file_storage_client_composite_operations.py +2068 -0
- oci/file_storage/models/__init__.py +130 -0
- oci/file_storage/models/change_file_system_compartment_details.py +76 -0
- oci/file_storage/models/change_filesystem_snapshot_policy_compartment_details.py +76 -0
- oci/file_storage/models/change_mount_target_compartment_details.py +76 -0
- oci/file_storage/models/change_outbound_connector_compartment_details.py +78 -0
- oci/file_storage/models/change_replication_compartment_details.py +76 -0
- oci/file_storage/models/client_options.py +389 -0
- oci/file_storage/models/create_export_details.py +303 -0
- oci/file_storage/models/create_file_system_details.py +425 -0
- oci/file_storage/models/create_filesystem_snapshot_policy_details.py +337 -0
- oci/file_storage/models/create_kerberos_details.py +200 -0
- oci/file_storage/models/create_ldap_bind_account_details.py +220 -0
- oci/file_storage/models/create_ldap_idmap_details.py +317 -0
- oci/file_storage/models/create_mount_target_details.py +581 -0
- oci/file_storage/models/create_outbound_connector_details.py +309 -0
- oci/file_storage/models/create_replication_details.py +325 -0
- oci/file_storage/models/create_snapshot_details.py +261 -0
- oci/file_storage/models/endpoint.py +103 -0
- oci/file_storage/models/export.py +456 -0
- oci/file_storage/models/export_set.py +411 -0
- oci/file_storage/models/export_set_summary.py +316 -0
- oci/file_storage/models/export_summary.py +343 -0
- oci/file_storage/models/file_system.py +818 -0
- oci/file_storage/models/file_system_summary.py +659 -0
- oci/file_storage/models/filesystem_snapshot_policy.py +473 -0
- oci/file_storage/models/filesystem_snapshot_policy_summary.py +429 -0
- oci/file_storage/models/kerberos.py +200 -0
- oci/file_storage/models/kerberos_keytab_entry.py +166 -0
- oci/file_storage/models/key_tab_secret_details.py +138 -0
- oci/file_storage/models/ldap_bind_account.py +243 -0
- oci/file_storage/models/ldap_bind_account_summary.py +176 -0
- oci/file_storage/models/ldap_idmap.py +317 -0
- oci/file_storage/models/mount_target.py +828 -0
- oci/file_storage/models/mount_target_summary.py +696 -0
- oci/file_storage/models/outbound_connector.py +453 -0
- oci/file_storage/models/outbound_connector_summary.py +438 -0
- oci/file_storage/models/replication.py +740 -0
- oci/file_storage/models/replication_estimate.py +196 -0
- oci/file_storage/models/replication_summary.py +491 -0
- oci/file_storage/models/replication_target.py +679 -0
- oci/file_storage/models/replication_target_summary.py +425 -0
- oci/file_storage/models/resource_lock.py +185 -0
- oci/file_storage/models/schedule_downgrade_shape_mount_target_details.py +78 -0
- oci/file_storage/models/snapshot.py +638 -0
- oci/file_storage/models/snapshot_schedule.py +487 -0
- oci/file_storage/models/snapshot_summary.py +601 -0
- oci/file_storage/models/source_details.py +119 -0
- oci/file_storage/models/update_export_details.py +111 -0
- oci/file_storage/models/update_export_set_details.py +172 -0
- oci/file_storage/models/update_file_system_details.py +246 -0
- oci/file_storage/models/update_filesystem_snapshot_policy_details.py +236 -0
- oci/file_storage/models/update_kerberos_details.py +200 -0
- oci/file_storage/models/update_ldap_idmap_details.py +317 -0
- oci/file_storage/models/update_mount_target_details.py +286 -0
- oci/file_storage/models/update_outbound_connector_details.py +158 -0
- oci/file_storage/models/update_replication_details.py +189 -0
- oci/file_storage/models/update_snapshot_details.py +156 -0
- oci/file_storage/models/upgrade_shape_mount_target_details.py +78 -0
- oci/file_storage/models/validate_key_tabs_details.py +103 -0
- oci/file_storage/models/validate_key_tabs_response_details.py +103 -0
- oci/functions/__init__.py +16 -0
- oci/functions/functions_invoke_client.py +267 -0
- oci/functions/functions_invoke_client_composite_operations.py +26 -0
- oci/functions/functions_management_client.py +2056 -0
- oci/functions/functions_management_client_composite_operations.py +326 -0
- oci/functions/models/__init__.py +74 -0
- oci/functions/models/application.py +628 -0
- oci/functions/models/application_summary.py +512 -0
- oci/functions/models/application_trace_config.py +103 -0
- oci/functions/models/change_application_compartment_details.py +78 -0
- oci/functions/models/config_details.py +134 -0
- oci/functions/models/constant_provisioned_concurrency_config.py +82 -0
- oci/functions/models/create_application_details.py +446 -0
- oci/functions/models/create_function_details.py +437 -0
- oci/functions/models/function.py +734 -0
- oci/functions/models/function_provisioned_concurrency_config.py +109 -0
- oci/functions/models/function_source_details.py +101 -0
- oci/functions/models/function_summary.py +657 -0
- oci/functions/models/function_trace_config.py +72 -0
- oci/functions/models/image_policy_config.py +103 -0
- oci/functions/models/key_details.py +76 -0
- oci/functions/models/none_provisioned_concurrency_config.py +51 -0
- oci/functions/models/pbf_listing.py +408 -0
- oci/functions/models/pbf_listing_summary.py +386 -0
- oci/functions/models/pbf_listing_version.py +467 -0
- oci/functions/models/pbf_listing_version_summary.py +446 -0
- oci/functions/models/pbf_listing_versions_collection.py +73 -0
- oci/functions/models/pbf_listings_collection.py +72 -0
- oci/functions/models/policy_details.py +103 -0
- oci/functions/models/pre_built_function_source_details.py +88 -0
- oci/functions/models/publisher_details.py +72 -0
- oci/functions/models/requirement_details.py +106 -0
- oci/functions/models/trigger.py +72 -0
- oci/functions/models/trigger_summary.py +72 -0
- oci/functions/models/triggers_collection.py +72 -0
- oci/functions/models/update_application_details.py +290 -0
- oci/functions/models/update_function_details.py +346 -0
- oci/load_balancer/__init__.py +14 -0
- oci/load_balancer/load_balancer_client.py +7641 -0
- oci/load_balancer/load_balancer_client_composite_operations.py +1630 -0
- oci/load_balancer/models/__init__.py +186 -0
- oci/load_balancer/models/action.py +97 -0
- oci/load_balancer/models/add_http_request_header_rule.py +134 -0
- oci/load_balancer/models/add_http_response_header_rule.py +137 -0
- oci/load_balancer/models/allow_rule.py +123 -0
- oci/load_balancer/models/backend.py +350 -0
- oci/load_balancer/models/backend_details.py +312 -0
- oci/load_balancer/models/backend_health.py +143 -0
- oci/load_balancer/models/backend_set.py +305 -0
- oci/load_balancer/models/backend_set_details.py +262 -0
- oci/load_balancer/models/backend_set_health.py +265 -0
- oci/load_balancer/models/certificate.py +188 -0
- oci/load_balancer/models/certificate_details.py +270 -0
- oci/load_balancer/models/change_load_balancer_compartment_details.py +78 -0
- oci/load_balancer/models/connection_configuration.py +168 -0
- oci/load_balancer/models/control_access_using_http_methods_rule.py +162 -0
- oci/load_balancer/models/create_backend_details.py +316 -0
- oci/load_balancer/models/create_backend_set_details.py +305 -0
- oci/load_balancer/models/create_certificate_details.py +270 -0
- oci/load_balancer/models/create_hostname_details.py +121 -0
- oci/load_balancer/models/create_listener_details.py +387 -0
- oci/load_balancer/models/create_load_balancer_details.py +895 -0
- oci/load_balancer/models/create_path_route_set_details.py +111 -0
- oci/load_balancer/models/create_routing_policy_details.py +154 -0
- oci/load_balancer/models/create_rule_set_details.py +109 -0
- oci/load_balancer/models/create_ssl_cipher_suite_details.py +606 -0
- oci/load_balancer/models/extend_http_request_header_value_rule.py +181 -0
- oci/load_balancer/models/extend_http_response_header_value_rule.py +181 -0
- oci/load_balancer/models/forward_to_backend_set.py +86 -0
- oci/load_balancer/models/health_check_result.py +219 -0
- oci/load_balancer/models/health_checker.py +381 -0
- oci/load_balancer/models/health_checker_details.py +376 -0
- oci/load_balancer/models/hostname.py +121 -0
- oci/load_balancer/models/hostname_details.py +117 -0
- oci/load_balancer/models/http_header_rule.py +127 -0
- oci/load_balancer/models/ip_address.py +142 -0
- oci/load_balancer/models/ip_based_max_connections_rule.py +118 -0
- oci/load_balancer/models/ip_max_connections.py +111 -0
- oci/load_balancer/models/lb_cookie_session_persistence_configuration_details.py +423 -0
- oci/load_balancer/models/listener.py +383 -0
- oci/load_balancer/models/listener_details.py +344 -0
- oci/load_balancer/models/listener_rule_summary.py +104 -0
- oci/load_balancer/models/load_balancer.py +1023 -0
- oci/load_balancer/models/load_balancer_health.py +281 -0
- oci/load_balancer/models/load_balancer_health_summary.py +167 -0
- oci/load_balancer/models/load_balancer_policy.py +80 -0
- oci/load_balancer/models/load_balancer_protocol.py +76 -0
- oci/load_balancer/models/load_balancer_shape.py +80 -0
- oci/load_balancer/models/path_match_condition.py +166 -0
- oci/load_balancer/models/path_match_type.py +126 -0
- oci/load_balancer/models/path_route.py +156 -0
- oci/load_balancer/models/path_route_set.py +112 -0
- oci/load_balancer/models/path_route_set_details.py +72 -0
- oci/load_balancer/models/redirect_rule.py +173 -0
- oci/load_balancer/models/redirect_uri.py +420 -0
- oci/load_balancer/models/remove_http_request_header_rule.py +90 -0
- oci/load_balancer/models/remove_http_response_header_rule.py +92 -0
- oci/load_balancer/models/reserved_ip.py +90 -0
- oci/load_balancer/models/routing_policy.py +152 -0
- oci/load_balancer/models/routing_policy_details.py +73 -0
- oci/load_balancer/models/routing_rule.py +135 -0
- oci/load_balancer/models/rule.py +177 -0
- oci/load_balancer/models/rule_condition.py +121 -0
- oci/load_balancer/models/rule_set.py +113 -0
- oci/load_balancer/models/rule_set_details.py +72 -0
- oci/load_balancer/models/session_persistence_configuration_details.py +136 -0
- oci/load_balancer/models/shape_details.py +121 -0
- oci/load_balancer/models/source_ip_address_condition.py +90 -0
- oci/load_balancer/models/source_vcn_id_condition.py +98 -0
- oci/load_balancer/models/source_vcn_ip_address_condition.py +97 -0
- oci/load_balancer/models/ssl_cipher_suite.py +606 -0
- oci/load_balancer/models/ssl_cipher_suite_details.py +606 -0
- oci/load_balancer/models/ssl_configuration.py +478 -0
- oci/load_balancer/models/ssl_configuration_details.py +476 -0
- oci/load_balancer/models/update_backend_details.py +242 -0
- oci/load_balancer/models/update_backend_set_details.py +264 -0
- oci/load_balancer/models/update_health_checker_details.py +374 -0
- oci/load_balancer/models/update_hostname_details.py +86 -0
- oci/load_balancer/models/update_listener_details.py +344 -0
- oci/load_balancer/models/update_load_balancer_details.py +356 -0
- oci/load_balancer/models/update_load_balancer_shape_details.py +127 -0
- oci/load_balancer/models/update_network_security_groups_details.py +99 -0
- oci/load_balancer/models/update_path_route_set_details.py +72 -0
- oci/load_balancer/models/update_routing_policy_details.py +115 -0
- oci/load_balancer/models/update_rule_set_details.py +72 -0
- oci/load_balancer/models/update_ssl_cipher_suite_details.py +300 -0
- oci/load_balancer/models/work_request.py +385 -0
- oci/load_balancer/models/work_request_error.py +115 -0
- oci/version.py +1 -1
- {mv_oci_sdk-2.142.0.dist-info → mv_oci_sdk-2.142.0.1.dist-info}/LICENSE.txt +0 -0
- {mv_oci_sdk-2.142.0.dist-info → mv_oci_sdk-2.142.0.1.dist-info}/WHEEL +0 -0
- {mv_oci_sdk-2.142.0.dist-info → mv_oci_sdk-2.142.0.1.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,478 @@
|
|
1
|
+
# coding: utf-8
|
2
|
+
# Copyright (c) 2016, 2025, Oracle and/or its affiliates. All rights reserved.
|
3
|
+
# This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
|
4
|
+
|
5
|
+
# NOTE: This class is auto generated by OracleSDKGenerator. DO NOT EDIT. API Version: 20170115
|
6
|
+
|
7
|
+
|
8
|
+
from oci.util import formatted_flat_dict, NONE_SENTINEL, value_allowed_none_or_none_sentinel # noqa: F401
|
9
|
+
from oci.decorators import init_model_state_from_kwargs
|
10
|
+
|
11
|
+
|
12
|
+
@init_model_state_from_kwargs
|
13
|
+
class SSLConfiguration(object):
|
14
|
+
"""
|
15
|
+
A listener's SSL handling configuration.
|
16
|
+
|
17
|
+
To use SSL, a listener must be associated with a :class:`Certificate`.
|
18
|
+
|
19
|
+
**Warning:** Oracle recommends that you avoid using any confidential information when you supply string values using the API.
|
20
|
+
"""
|
21
|
+
|
22
|
+
#: A constant which can be used with the server_order_preference property of a SSLConfiguration.
|
23
|
+
#: This constant has a value of "ENABLED"
|
24
|
+
SERVER_ORDER_PREFERENCE_ENABLED = "ENABLED"
|
25
|
+
|
26
|
+
#: A constant which can be used with the server_order_preference property of a SSLConfiguration.
|
27
|
+
#: This constant has a value of "DISABLED"
|
28
|
+
SERVER_ORDER_PREFERENCE_DISABLED = "DISABLED"
|
29
|
+
|
30
|
+
def __init__(self, **kwargs):
|
31
|
+
"""
|
32
|
+
Initializes a new SSLConfiguration object with values from keyword arguments.
|
33
|
+
The following keyword arguments are supported (corresponding to the getters/setters of this class):
|
34
|
+
|
35
|
+
:param verify_depth:
|
36
|
+
The value to assign to the verify_depth property of this SSLConfiguration.
|
37
|
+
:type verify_depth: int
|
38
|
+
|
39
|
+
:param verify_peer_certificate:
|
40
|
+
The value to assign to the verify_peer_certificate property of this SSLConfiguration.
|
41
|
+
:type verify_peer_certificate: bool
|
42
|
+
|
43
|
+
:param has_session_resumption:
|
44
|
+
The value to assign to the has_session_resumption property of this SSLConfiguration.
|
45
|
+
:type has_session_resumption: bool
|
46
|
+
|
47
|
+
:param trusted_certificate_authority_ids:
|
48
|
+
The value to assign to the trusted_certificate_authority_ids property of this SSLConfiguration.
|
49
|
+
:type trusted_certificate_authority_ids: list[str]
|
50
|
+
|
51
|
+
:param certificate_ids:
|
52
|
+
The value to assign to the certificate_ids property of this SSLConfiguration.
|
53
|
+
:type certificate_ids: list[str]
|
54
|
+
|
55
|
+
:param certificate_name:
|
56
|
+
The value to assign to the certificate_name property of this SSLConfiguration.
|
57
|
+
:type certificate_name: str
|
58
|
+
|
59
|
+
:param server_order_preference:
|
60
|
+
The value to assign to the server_order_preference property of this SSLConfiguration.
|
61
|
+
Allowed values for this property are: "ENABLED", "DISABLED", 'UNKNOWN_ENUM_VALUE'.
|
62
|
+
Any unrecognized values returned by a service will be mapped to 'UNKNOWN_ENUM_VALUE'.
|
63
|
+
:type server_order_preference: str
|
64
|
+
|
65
|
+
:param cipher_suite_name:
|
66
|
+
The value to assign to the cipher_suite_name property of this SSLConfiguration.
|
67
|
+
:type cipher_suite_name: str
|
68
|
+
|
69
|
+
:param protocols:
|
70
|
+
The value to assign to the protocols property of this SSLConfiguration.
|
71
|
+
:type protocols: list[str]
|
72
|
+
|
73
|
+
"""
|
74
|
+
self.swagger_types = {
|
75
|
+
'verify_depth': 'int',
|
76
|
+
'verify_peer_certificate': 'bool',
|
77
|
+
'has_session_resumption': 'bool',
|
78
|
+
'trusted_certificate_authority_ids': 'list[str]',
|
79
|
+
'certificate_ids': 'list[str]',
|
80
|
+
'certificate_name': 'str',
|
81
|
+
'server_order_preference': 'str',
|
82
|
+
'cipher_suite_name': 'str',
|
83
|
+
'protocols': 'list[str]'
|
84
|
+
}
|
85
|
+
|
86
|
+
self.attribute_map = {
|
87
|
+
'verify_depth': 'verifyDepth',
|
88
|
+
'verify_peer_certificate': 'verifyPeerCertificate',
|
89
|
+
'has_session_resumption': 'hasSessionResumption',
|
90
|
+
'trusted_certificate_authority_ids': 'trustedCertificateAuthorityIds',
|
91
|
+
'certificate_ids': 'certificateIds',
|
92
|
+
'certificate_name': 'certificateName',
|
93
|
+
'server_order_preference': 'serverOrderPreference',
|
94
|
+
'cipher_suite_name': 'cipherSuiteName',
|
95
|
+
'protocols': 'protocols'
|
96
|
+
}
|
97
|
+
|
98
|
+
self._verify_depth = None
|
99
|
+
self._verify_peer_certificate = None
|
100
|
+
self._has_session_resumption = None
|
101
|
+
self._trusted_certificate_authority_ids = None
|
102
|
+
self._certificate_ids = None
|
103
|
+
self._certificate_name = None
|
104
|
+
self._server_order_preference = None
|
105
|
+
self._cipher_suite_name = None
|
106
|
+
self._protocols = None
|
107
|
+
|
108
|
+
@property
|
109
|
+
def verify_depth(self):
|
110
|
+
"""
|
111
|
+
**[Required]** Gets the verify_depth of this SSLConfiguration.
|
112
|
+
The maximum depth for peer certificate chain verification.
|
113
|
+
|
114
|
+
Example: `3`
|
115
|
+
|
116
|
+
|
117
|
+
:return: The verify_depth of this SSLConfiguration.
|
118
|
+
:rtype: int
|
119
|
+
"""
|
120
|
+
return self._verify_depth
|
121
|
+
|
122
|
+
@verify_depth.setter
|
123
|
+
def verify_depth(self, verify_depth):
|
124
|
+
"""
|
125
|
+
Sets the verify_depth of this SSLConfiguration.
|
126
|
+
The maximum depth for peer certificate chain verification.
|
127
|
+
|
128
|
+
Example: `3`
|
129
|
+
|
130
|
+
|
131
|
+
:param verify_depth: The verify_depth of this SSLConfiguration.
|
132
|
+
:type: int
|
133
|
+
"""
|
134
|
+
self._verify_depth = verify_depth
|
135
|
+
|
136
|
+
@property
|
137
|
+
def verify_peer_certificate(self):
|
138
|
+
"""
|
139
|
+
**[Required]** Gets the verify_peer_certificate of this SSLConfiguration.
|
140
|
+
Whether the load balancer listener should verify peer certificates.
|
141
|
+
|
142
|
+
Example: `true`
|
143
|
+
|
144
|
+
|
145
|
+
:return: The verify_peer_certificate of this SSLConfiguration.
|
146
|
+
:rtype: bool
|
147
|
+
"""
|
148
|
+
return self._verify_peer_certificate
|
149
|
+
|
150
|
+
@verify_peer_certificate.setter
|
151
|
+
def verify_peer_certificate(self, verify_peer_certificate):
|
152
|
+
"""
|
153
|
+
Sets the verify_peer_certificate of this SSLConfiguration.
|
154
|
+
Whether the load balancer listener should verify peer certificates.
|
155
|
+
|
156
|
+
Example: `true`
|
157
|
+
|
158
|
+
|
159
|
+
:param verify_peer_certificate: The verify_peer_certificate of this SSLConfiguration.
|
160
|
+
:type: bool
|
161
|
+
"""
|
162
|
+
self._verify_peer_certificate = verify_peer_certificate
|
163
|
+
|
164
|
+
@property
|
165
|
+
def has_session_resumption(self):
|
166
|
+
"""
|
167
|
+
Gets the has_session_resumption of this SSLConfiguration.
|
168
|
+
Whether the load balancer listener should resume an encrypted session by reusing the cryptographic parameters of a previous TLS session, without having to perform a full handshake again.
|
169
|
+
If \"true\", the service resumes the previous TLS encrypted session.
|
170
|
+
If \"false\", the service starts a new TLS encrypted session.
|
171
|
+
Enabling session resumption improves performance but provides a lower level of security. Disabling session resumption improves security but reduces performance.
|
172
|
+
|
173
|
+
Example: `true`
|
174
|
+
|
175
|
+
|
176
|
+
:return: The has_session_resumption of this SSLConfiguration.
|
177
|
+
:rtype: bool
|
178
|
+
"""
|
179
|
+
return self._has_session_resumption
|
180
|
+
|
181
|
+
@has_session_resumption.setter
|
182
|
+
def has_session_resumption(self, has_session_resumption):
|
183
|
+
"""
|
184
|
+
Sets the has_session_resumption of this SSLConfiguration.
|
185
|
+
Whether the load balancer listener should resume an encrypted session by reusing the cryptographic parameters of a previous TLS session, without having to perform a full handshake again.
|
186
|
+
If \"true\", the service resumes the previous TLS encrypted session.
|
187
|
+
If \"false\", the service starts a new TLS encrypted session.
|
188
|
+
Enabling session resumption improves performance but provides a lower level of security. Disabling session resumption improves security but reduces performance.
|
189
|
+
|
190
|
+
Example: `true`
|
191
|
+
|
192
|
+
|
193
|
+
:param has_session_resumption: The has_session_resumption of this SSLConfiguration.
|
194
|
+
:type: bool
|
195
|
+
"""
|
196
|
+
self._has_session_resumption = has_session_resumption
|
197
|
+
|
198
|
+
@property
|
199
|
+
def trusted_certificate_authority_ids(self):
|
200
|
+
"""
|
201
|
+
Gets the trusted_certificate_authority_ids of this SSLConfiguration.
|
202
|
+
Ids for OCI certificates service CA or CA bundles for the load balancer to trust.
|
203
|
+
|
204
|
+
Example: `[ocid1.cabundle.oc1.us-ashburn-1.amaaaaaaav3bgsaagl4zzyqdop5i2vuwoqewdvauuw34llqa74otq2jdsfyq]`
|
205
|
+
|
206
|
+
|
207
|
+
:return: The trusted_certificate_authority_ids of this SSLConfiguration.
|
208
|
+
:rtype: list[str]
|
209
|
+
"""
|
210
|
+
return self._trusted_certificate_authority_ids
|
211
|
+
|
212
|
+
@trusted_certificate_authority_ids.setter
|
213
|
+
def trusted_certificate_authority_ids(self, trusted_certificate_authority_ids):
|
214
|
+
"""
|
215
|
+
Sets the trusted_certificate_authority_ids of this SSLConfiguration.
|
216
|
+
Ids for OCI certificates service CA or CA bundles for the load balancer to trust.
|
217
|
+
|
218
|
+
Example: `[ocid1.cabundle.oc1.us-ashburn-1.amaaaaaaav3bgsaagl4zzyqdop5i2vuwoqewdvauuw34llqa74otq2jdsfyq]`
|
219
|
+
|
220
|
+
|
221
|
+
:param trusted_certificate_authority_ids: The trusted_certificate_authority_ids of this SSLConfiguration.
|
222
|
+
:type: list[str]
|
223
|
+
"""
|
224
|
+
self._trusted_certificate_authority_ids = trusted_certificate_authority_ids
|
225
|
+
|
226
|
+
@property
|
227
|
+
def certificate_ids(self):
|
228
|
+
"""
|
229
|
+
Gets the certificate_ids of this SSLConfiguration.
|
230
|
+
Ids for OCI certificates service certificates. Currently only a single Id may be passed.
|
231
|
+
|
232
|
+
Example: `[ocid1.certificate.oc1.us-ashburn-1.amaaaaaaav3bgsaa5o2q7rh5nfmkkukfkogasqhk6af2opufhjlqg7m6jqzq]`
|
233
|
+
|
234
|
+
|
235
|
+
:return: The certificate_ids of this SSLConfiguration.
|
236
|
+
:rtype: list[str]
|
237
|
+
"""
|
238
|
+
return self._certificate_ids
|
239
|
+
|
240
|
+
@certificate_ids.setter
|
241
|
+
def certificate_ids(self, certificate_ids):
|
242
|
+
"""
|
243
|
+
Sets the certificate_ids of this SSLConfiguration.
|
244
|
+
Ids for OCI certificates service certificates. Currently only a single Id may be passed.
|
245
|
+
|
246
|
+
Example: `[ocid1.certificate.oc1.us-ashburn-1.amaaaaaaav3bgsaa5o2q7rh5nfmkkukfkogasqhk6af2opufhjlqg7m6jqzq]`
|
247
|
+
|
248
|
+
|
249
|
+
:param certificate_ids: The certificate_ids of this SSLConfiguration.
|
250
|
+
:type: list[str]
|
251
|
+
"""
|
252
|
+
self._certificate_ids = certificate_ids
|
253
|
+
|
254
|
+
@property
|
255
|
+
def certificate_name(self):
|
256
|
+
"""
|
257
|
+
Gets the certificate_name of this SSLConfiguration.
|
258
|
+
A friendly name for the certificate bundle. It must be unique and it cannot be changed.
|
259
|
+
Valid certificate bundle names include only alphanumeric characters, dashes, and underscores.
|
260
|
+
Certificate bundle names cannot contain spaces. Avoid entering confidential information.
|
261
|
+
|
262
|
+
Example: `example_certificate_bundle`
|
263
|
+
|
264
|
+
|
265
|
+
:return: The certificate_name of this SSLConfiguration.
|
266
|
+
:rtype: str
|
267
|
+
"""
|
268
|
+
return self._certificate_name
|
269
|
+
|
270
|
+
@certificate_name.setter
|
271
|
+
def certificate_name(self, certificate_name):
|
272
|
+
"""
|
273
|
+
Sets the certificate_name of this SSLConfiguration.
|
274
|
+
A friendly name for the certificate bundle. It must be unique and it cannot be changed.
|
275
|
+
Valid certificate bundle names include only alphanumeric characters, dashes, and underscores.
|
276
|
+
Certificate bundle names cannot contain spaces. Avoid entering confidential information.
|
277
|
+
|
278
|
+
Example: `example_certificate_bundle`
|
279
|
+
|
280
|
+
|
281
|
+
:param certificate_name: The certificate_name of this SSLConfiguration.
|
282
|
+
:type: str
|
283
|
+
"""
|
284
|
+
self._certificate_name = certificate_name
|
285
|
+
|
286
|
+
@property
|
287
|
+
def server_order_preference(self):
|
288
|
+
"""
|
289
|
+
Gets the server_order_preference of this SSLConfiguration.
|
290
|
+
When this attribute is set to ENABLED, the system gives preference to the server ciphers over the client
|
291
|
+
ciphers.
|
292
|
+
|
293
|
+
**Note:** This configuration is applicable only when the load balancer is acting as an SSL/HTTPS server. This
|
294
|
+
field is ignored when the `SSLConfiguration` object is associated with a backend set.
|
295
|
+
|
296
|
+
Allowed values for this property are: "ENABLED", "DISABLED", 'UNKNOWN_ENUM_VALUE'.
|
297
|
+
Any unrecognized values returned by a service will be mapped to 'UNKNOWN_ENUM_VALUE'.
|
298
|
+
|
299
|
+
|
300
|
+
:return: The server_order_preference of this SSLConfiguration.
|
301
|
+
:rtype: str
|
302
|
+
"""
|
303
|
+
return self._server_order_preference
|
304
|
+
|
305
|
+
@server_order_preference.setter
|
306
|
+
def server_order_preference(self, server_order_preference):
|
307
|
+
"""
|
308
|
+
Sets the server_order_preference of this SSLConfiguration.
|
309
|
+
When this attribute is set to ENABLED, the system gives preference to the server ciphers over the client
|
310
|
+
ciphers.
|
311
|
+
|
312
|
+
**Note:** This configuration is applicable only when the load balancer is acting as an SSL/HTTPS server. This
|
313
|
+
field is ignored when the `SSLConfiguration` object is associated with a backend set.
|
314
|
+
|
315
|
+
|
316
|
+
:param server_order_preference: The server_order_preference of this SSLConfiguration.
|
317
|
+
:type: str
|
318
|
+
"""
|
319
|
+
allowed_values = ["ENABLED", "DISABLED"]
|
320
|
+
if not value_allowed_none_or_none_sentinel(server_order_preference, allowed_values):
|
321
|
+
server_order_preference = 'UNKNOWN_ENUM_VALUE'
|
322
|
+
self._server_order_preference = server_order_preference
|
323
|
+
|
324
|
+
@property
|
325
|
+
def cipher_suite_name(self):
|
326
|
+
"""
|
327
|
+
Gets the cipher_suite_name of this SSLConfiguration.
|
328
|
+
The name of the cipher suite to use for HTTPS or SSL connections.
|
329
|
+
|
330
|
+
If this field is not specified, the default is `oci-default-ssl-cipher-suite-v1`.
|
331
|
+
|
332
|
+
**Notes:**
|
333
|
+
|
334
|
+
* You must ensure compatibility between the specified SSL protocols and the ciphers configured in the cipher
|
335
|
+
suite. Clients cannot perform an SSL handshake if there is an incompatible configuration.
|
336
|
+
* You must ensure compatibility between the ciphers configured in the cipher suite and the configured
|
337
|
+
certificates. For example, RSA-based ciphers require RSA certificates and ECDSA-based ciphers require ECDSA
|
338
|
+
certificates.
|
339
|
+
* If the cipher configuration is not modified after load balancer creation, the `GET` operation returns
|
340
|
+
`oci-default-ssl-cipher-suite-v1` as the value of this field in the SSL configuration for existing listeners
|
341
|
+
that predate this feature.
|
342
|
+
* If the cipher configuration was modified using Oracle operations after load balancer creation, the `GET`
|
343
|
+
operation returns `oci-customized-ssl-cipher-suite` as the value of this field in the SSL configuration for
|
344
|
+
existing listeners that predate this feature.
|
345
|
+
* The `GET` operation returns `oci-wider-compatible-ssl-cipher-suite-v1` as the value of this field in the SSL
|
346
|
+
configuration for existing backend sets that predate this feature.
|
347
|
+
* If the `GET` operation on a listener returns `oci-customized-ssl-cipher-suite` as the value of this field,
|
348
|
+
you must specify an appropriate predefined or custom cipher suite name when updating the resource.
|
349
|
+
* The `oci-customized-ssl-cipher-suite` Oracle reserved cipher suite name is not accepted as valid input for
|
350
|
+
this field.
|
351
|
+
|
352
|
+
example: `example_cipher_suite`
|
353
|
+
|
354
|
+
|
355
|
+
:return: The cipher_suite_name of this SSLConfiguration.
|
356
|
+
:rtype: str
|
357
|
+
"""
|
358
|
+
return self._cipher_suite_name
|
359
|
+
|
360
|
+
@cipher_suite_name.setter
|
361
|
+
def cipher_suite_name(self, cipher_suite_name):
|
362
|
+
"""
|
363
|
+
Sets the cipher_suite_name of this SSLConfiguration.
|
364
|
+
The name of the cipher suite to use for HTTPS or SSL connections.
|
365
|
+
|
366
|
+
If this field is not specified, the default is `oci-default-ssl-cipher-suite-v1`.
|
367
|
+
|
368
|
+
**Notes:**
|
369
|
+
|
370
|
+
* You must ensure compatibility between the specified SSL protocols and the ciphers configured in the cipher
|
371
|
+
suite. Clients cannot perform an SSL handshake if there is an incompatible configuration.
|
372
|
+
* You must ensure compatibility between the ciphers configured in the cipher suite and the configured
|
373
|
+
certificates. For example, RSA-based ciphers require RSA certificates and ECDSA-based ciphers require ECDSA
|
374
|
+
certificates.
|
375
|
+
* If the cipher configuration is not modified after load balancer creation, the `GET` operation returns
|
376
|
+
`oci-default-ssl-cipher-suite-v1` as the value of this field in the SSL configuration for existing listeners
|
377
|
+
that predate this feature.
|
378
|
+
* If the cipher configuration was modified using Oracle operations after load balancer creation, the `GET`
|
379
|
+
operation returns `oci-customized-ssl-cipher-suite` as the value of this field in the SSL configuration for
|
380
|
+
existing listeners that predate this feature.
|
381
|
+
* The `GET` operation returns `oci-wider-compatible-ssl-cipher-suite-v1` as the value of this field in the SSL
|
382
|
+
configuration for existing backend sets that predate this feature.
|
383
|
+
* If the `GET` operation on a listener returns `oci-customized-ssl-cipher-suite` as the value of this field,
|
384
|
+
you must specify an appropriate predefined or custom cipher suite name when updating the resource.
|
385
|
+
* The `oci-customized-ssl-cipher-suite` Oracle reserved cipher suite name is not accepted as valid input for
|
386
|
+
this field.
|
387
|
+
|
388
|
+
example: `example_cipher_suite`
|
389
|
+
|
390
|
+
|
391
|
+
:param cipher_suite_name: The cipher_suite_name of this SSLConfiguration.
|
392
|
+
:type: str
|
393
|
+
"""
|
394
|
+
self._cipher_suite_name = cipher_suite_name
|
395
|
+
|
396
|
+
@property
|
397
|
+
def protocols(self):
|
398
|
+
"""
|
399
|
+
Gets the protocols of this SSLConfiguration.
|
400
|
+
A list of SSL protocols the load balancer must support for HTTPS or SSL connections.
|
401
|
+
|
402
|
+
The load balancer uses SSL protocols to establish a secure connection between a client and a server. A secure
|
403
|
+
connection ensures that all data passed between the client and the server is private.
|
404
|
+
|
405
|
+
The Load Balancing service supports the following protocols:
|
406
|
+
|
407
|
+
* TLSv1
|
408
|
+
* TLSv1.1
|
409
|
+
* TLSv1.2
|
410
|
+
* TLSv1.3
|
411
|
+
|
412
|
+
If this field is not specified, TLSv1.2 is the default.
|
413
|
+
|
414
|
+
**Warning:** All SSL listeners created on a given port must use the same set of SSL protocols.
|
415
|
+
|
416
|
+
**Notes:**
|
417
|
+
|
418
|
+
* The handshake to establish an SSL connection fails if the client supports none of the specified protocols.
|
419
|
+
* You must ensure compatibility between the specified SSL protocols and the ciphers configured in the cipher
|
420
|
+
suite.
|
421
|
+
* For all existing load balancer listeners and backend sets that predate this feature, the `GET` operation
|
422
|
+
displays a list of SSL protocols currently used by those resources.
|
423
|
+
|
424
|
+
example: `[\"TLSv1.1\", \"TLSv1.2\"]`
|
425
|
+
|
426
|
+
|
427
|
+
:return: The protocols of this SSLConfiguration.
|
428
|
+
:rtype: list[str]
|
429
|
+
"""
|
430
|
+
return self._protocols
|
431
|
+
|
432
|
+
@protocols.setter
|
433
|
+
def protocols(self, protocols):
|
434
|
+
"""
|
435
|
+
Sets the protocols of this SSLConfiguration.
|
436
|
+
A list of SSL protocols the load balancer must support for HTTPS or SSL connections.
|
437
|
+
|
438
|
+
The load balancer uses SSL protocols to establish a secure connection between a client and a server. A secure
|
439
|
+
connection ensures that all data passed between the client and the server is private.
|
440
|
+
|
441
|
+
The Load Balancing service supports the following protocols:
|
442
|
+
|
443
|
+
* TLSv1
|
444
|
+
* TLSv1.1
|
445
|
+
* TLSv1.2
|
446
|
+
* TLSv1.3
|
447
|
+
|
448
|
+
If this field is not specified, TLSv1.2 is the default.
|
449
|
+
|
450
|
+
**Warning:** All SSL listeners created on a given port must use the same set of SSL protocols.
|
451
|
+
|
452
|
+
**Notes:**
|
453
|
+
|
454
|
+
* The handshake to establish an SSL connection fails if the client supports none of the specified protocols.
|
455
|
+
* You must ensure compatibility between the specified SSL protocols and the ciphers configured in the cipher
|
456
|
+
suite.
|
457
|
+
* For all existing load balancer listeners and backend sets that predate this feature, the `GET` operation
|
458
|
+
displays a list of SSL protocols currently used by those resources.
|
459
|
+
|
460
|
+
example: `[\"TLSv1.1\", \"TLSv1.2\"]`
|
461
|
+
|
462
|
+
|
463
|
+
:param protocols: The protocols of this SSLConfiguration.
|
464
|
+
:type: list[str]
|
465
|
+
"""
|
466
|
+
self._protocols = protocols
|
467
|
+
|
468
|
+
def __repr__(self):
|
469
|
+
return formatted_flat_dict(self)
|
470
|
+
|
471
|
+
def __eq__(self, other):
|
472
|
+
if other is None:
|
473
|
+
return False
|
474
|
+
|
475
|
+
return self.__dict__ == other.__dict__
|
476
|
+
|
477
|
+
def __ne__(self, other):
|
478
|
+
return not self == other
|