pulumi-oci 1.19.0a1705693078__py3-none-any.whl → 1.20.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_oci/__init__.py +59 -0
- pulumi_oci/adm/_inputs.py +99 -18
- pulumi_oci/adm/get_remediation_run_application_dependency_recommendations.py +23 -3
- pulumi_oci/adm/get_vulnerability_audit.py +31 -5
- pulumi_oci/adm/get_vulnerability_audit_application_dependency_vulnerabilities.py +43 -6
- pulumi_oci/adm/get_vulnerability_audit_application_dependency_vulnerability.py +27 -1
- pulumi_oci/adm/get_vulnerability_audits.py +54 -3
- pulumi_oci/adm/outputs.py +296 -31
- pulumi_oci/adm/remediation_recipe.py +2 -0
- pulumi_oci/adm/vulnerability_audit.py +96 -37
- pulumi_oci/database/__init__.py +1 -0
- pulumi_oci/database/_inputs.py +40 -0
- pulumi_oci/database/cloud_vm_cluster.py +22 -1
- pulumi_oci/database/get_system_versions.py +173 -0
- pulumi_oci/database/outputs.py +88 -0
- pulumi_oci/database/vm_cluster.py +22 -1
- pulumi_oci/datasafe/__init__.py +22 -0
- pulumi_oci/datasafe/_inputs.py +1826 -161
- pulumi_oci/datasafe/audit_trail.py +140 -0
- pulumi_oci/datasafe/discovery_mod.py +7 -7
- pulumi_oci/datasafe/get_audit_trail.py +66 -1
- pulumi_oci/datasafe/get_discovery_job.py +1 -1
- pulumi_oci/datasafe/get_discovery_jobs_result.py +1 -1
- pulumi_oci/datasafe/get_discovery_jobs_results.py +1 -1
- pulumi_oci/datasafe/get_masking_policies_masking_column.py +1 -1
- pulumi_oci/datasafe/get_masking_policies_masking_columns.py +1 -1
- pulumi_oci/datasafe/get_masking_policy.py +1 -1
- pulumi_oci/datasafe/get_report.py +1 -1
- pulumi_oci/datasafe/get_security_assessment.py +3 -3
- pulumi_oci/datasafe/get_security_assessment_comparison.py +5 -5
- pulumi_oci/datasafe/get_security_assessment_finding.py +29 -3
- pulumi_oci/datasafe/get_security_assessment_finding_analytics.py +276 -0
- pulumi_oci/datasafe/get_security_assessment_findings.py +43 -7
- pulumi_oci/datasafe/get_security_assessment_findings_change_audit_logs.py +309 -0
- pulumi_oci/datasafe/get_security_assessment_security_feature_analytics.py +198 -0
- pulumi_oci/datasafe/get_security_assessment_security_features.py +377 -0
- pulumi_oci/datasafe/get_security_assessments.py +2 -2
- pulumi_oci/datasafe/get_security_policies.py +253 -0
- pulumi_oci/datasafe/get_security_policy.py +235 -0
- pulumi_oci/datasafe/get_security_policy_deployment.py +261 -0
- pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_state.py +165 -0
- pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_states.py +180 -0
- pulumi_oci/datasafe/get_security_policy_deployments.py +293 -0
- pulumi_oci/datasafe/get_security_policy_report.py +248 -0
- pulumi_oci/datasafe/get_security_policy_report_database_table_access_entries.py +158 -0
- pulumi_oci/datasafe/get_security_policy_report_database_table_access_entry.py +408 -0
- pulumi_oci/datasafe/get_security_policy_report_database_view_access_entries.py +178 -0
- pulumi_oci/datasafe/get_security_policy_report_database_view_access_entry.py +382 -0
- pulumi_oci/datasafe/get_security_policy_report_role_grant_paths.py +177 -0
- pulumi_oci/datasafe/get_security_policy_reports.py +273 -0
- pulumi_oci/datasafe/get_sensitive_data_model.py +1 -1
- pulumi_oci/datasafe/get_target_database.py +27 -4
- pulumi_oci/datasafe/get_target_database_peer_target_database.py +263 -0
- pulumi_oci/datasafe/get_target_database_peer_target_databases.py +133 -0
- pulumi_oci/datasafe/get_target_databases.py +1 -1
- pulumi_oci/datasafe/get_user_assessment.py +5 -5
- pulumi_oci/datasafe/get_user_assessment_comparison.py +2 -2
- pulumi_oci/datasafe/get_user_assessment_user_access_analytics.py +133 -0
- pulumi_oci/datasafe/get_user_assessment_user_analytics.py +2 -2
- pulumi_oci/datasafe/get_user_assessment_users.py +42 -2
- pulumi_oci/datasafe/get_user_assessments.py +2 -2
- pulumi_oci/datasafe/masking_policies_masking_column.py +7 -7
- pulumi_oci/datasafe/masking_policy.py +9 -9
- pulumi_oci/datasafe/outputs.py +16686 -9777
- pulumi_oci/datasafe/report.py +559 -0
- pulumi_oci/datasafe/security_assessment.py +12 -12
- pulumi_oci/datasafe/sensitive_data_model.py +7 -7
- pulumi_oci/datasafe/set_security_assessment_baseline.py +7 -7
- pulumi_oci/datasafe/set_user_assessment_baseline.py +7 -7
- pulumi_oci/datasafe/target_database.py +146 -25
- pulumi_oci/datasafe/target_database_peer_target_database.py +634 -0
- pulumi_oci/datasafe/user_assessment.py +20 -20
- pulumi_oci/generativeai/__init__.py +18 -0
- pulumi_oci/generativeai/_inputs.py +534 -0
- pulumi_oci/generativeai/dedicated_ai_cluster.py +808 -0
- pulumi_oci/generativeai/endpoint.py +717 -0
- pulumi_oci/generativeai/get_dedicated_ai_cluster.py +288 -0
- pulumi_oci/generativeai/get_dedicated_ai_clusters.py +183 -0
- pulumi_oci/generativeai/get_endpoint.py +275 -0
- pulumi_oci/generativeai/get_endpoints.py +183 -0
- pulumi_oci/generativeai/get_model.py +353 -0
- pulumi_oci/generativeai/get_models.py +220 -0
- pulumi_oci/generativeai/model.py +858 -0
- pulumi_oci/generativeai/outputs.py +1721 -0
- pulumi_oci/marketplace/get_publication.py +14 -1
- pulumi_oci/marketplace/outputs.py +11 -0
- pulumi_oci/marketplace/publication.py +28 -0
- pulumi_oci/monitoring/__init__.py +3 -0
- pulumi_oci/monitoring/_inputs.py +82 -4
- pulumi_oci/monitoring/alarm.py +15 -15
- pulumi_oci/monitoring/alarm_suppression.py +745 -0
- pulumi_oci/monitoring/get_alarm.py +5 -5
- pulumi_oci/monitoring/get_alarm_history_collection.py +4 -4
- pulumi_oci/monitoring/get_alarm_statuses.py +3 -1
- pulumi_oci/monitoring/get_alarm_suppression.py +276 -0
- pulumi_oci/monitoring/get_alarm_suppressions.py +192 -0
- pulumi_oci/monitoring/get_metric_data.py +12 -8
- pulumi_oci/monitoring/get_metrics.py +2 -2
- pulumi_oci/monitoring/outputs.py +355 -50
- pulumi_oci/networkfirewall/_inputs.py +25 -20
- pulumi_oci/networkfirewall/outputs.py +40 -30
- pulumi_oci/stackmonitoring/__init__.py +3 -0
- pulumi_oci/stackmonitoring/_inputs.py +143 -0
- pulumi_oci/stackmonitoring/get_process_set.py +236 -0
- pulumi_oci/stackmonitoring/get_process_sets.py +156 -0
- pulumi_oci/stackmonitoring/outputs.py +422 -0
- pulumi_oci/stackmonitoring/process_set.py +548 -0
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/METADATA +1 -1
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/RECORD +111 -70
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/WHEEL +0 -0
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,377 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import pulumi
|
8
|
+
import pulumi.runtime
|
9
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
10
|
+
from .. import _utilities
|
11
|
+
from . import outputs
|
12
|
+
from ._inputs import *
|
13
|
+
|
14
|
+
__all__ = [
|
15
|
+
'GetSecurityAssessmentSecurityFeaturesResult',
|
16
|
+
'AwaitableGetSecurityAssessmentSecurityFeaturesResult',
|
17
|
+
'get_security_assessment_security_features',
|
18
|
+
'get_security_assessment_security_features_output',
|
19
|
+
]
|
20
|
+
|
21
|
+
@pulumi.output_type
|
22
|
+
class GetSecurityAssessmentSecurityFeaturesResult:
|
23
|
+
"""
|
24
|
+
A collection of values returned by getSecurityAssessmentSecurityFeatures.
|
25
|
+
"""
|
26
|
+
def __init__(__self__, access_level=None, compartment_id=None, compartment_id_in_subtree=None, filters=None, id=None, security_feature_collections=None, target_id=None, targets_with_column_encryption=None, targets_with_database_vault=None, targets_with_external_authentication=None, targets_with_fine_grained_audit=None, targets_with_global_authentication=None, targets_with_network_encryption=None, targets_with_password_authentication=None, targets_with_privilege_analysis=None, targets_with_tablespace_encryption=None, targets_with_traditional_audit=None, targets_with_unified_audit=None):
|
27
|
+
if access_level and not isinstance(access_level, str):
|
28
|
+
raise TypeError("Expected argument 'access_level' to be a str")
|
29
|
+
pulumi.set(__self__, "access_level", access_level)
|
30
|
+
if compartment_id and not isinstance(compartment_id, str):
|
31
|
+
raise TypeError("Expected argument 'compartment_id' to be a str")
|
32
|
+
pulumi.set(__self__, "compartment_id", compartment_id)
|
33
|
+
if compartment_id_in_subtree and not isinstance(compartment_id_in_subtree, bool):
|
34
|
+
raise TypeError("Expected argument 'compartment_id_in_subtree' to be a bool")
|
35
|
+
pulumi.set(__self__, "compartment_id_in_subtree", compartment_id_in_subtree)
|
36
|
+
if filters and not isinstance(filters, list):
|
37
|
+
raise TypeError("Expected argument 'filters' to be a list")
|
38
|
+
pulumi.set(__self__, "filters", filters)
|
39
|
+
if id and not isinstance(id, str):
|
40
|
+
raise TypeError("Expected argument 'id' to be a str")
|
41
|
+
pulumi.set(__self__, "id", id)
|
42
|
+
if security_feature_collections and not isinstance(security_feature_collections, list):
|
43
|
+
raise TypeError("Expected argument 'security_feature_collections' to be a list")
|
44
|
+
pulumi.set(__self__, "security_feature_collections", security_feature_collections)
|
45
|
+
if target_id and not isinstance(target_id, str):
|
46
|
+
raise TypeError("Expected argument 'target_id' to be a str")
|
47
|
+
pulumi.set(__self__, "target_id", target_id)
|
48
|
+
if targets_with_column_encryption and not isinstance(targets_with_column_encryption, str):
|
49
|
+
raise TypeError("Expected argument 'targets_with_column_encryption' to be a str")
|
50
|
+
pulumi.set(__self__, "targets_with_column_encryption", targets_with_column_encryption)
|
51
|
+
if targets_with_database_vault and not isinstance(targets_with_database_vault, str):
|
52
|
+
raise TypeError("Expected argument 'targets_with_database_vault' to be a str")
|
53
|
+
pulumi.set(__self__, "targets_with_database_vault", targets_with_database_vault)
|
54
|
+
if targets_with_external_authentication and not isinstance(targets_with_external_authentication, str):
|
55
|
+
raise TypeError("Expected argument 'targets_with_external_authentication' to be a str")
|
56
|
+
pulumi.set(__self__, "targets_with_external_authentication", targets_with_external_authentication)
|
57
|
+
if targets_with_fine_grained_audit and not isinstance(targets_with_fine_grained_audit, str):
|
58
|
+
raise TypeError("Expected argument 'targets_with_fine_grained_audit' to be a str")
|
59
|
+
pulumi.set(__self__, "targets_with_fine_grained_audit", targets_with_fine_grained_audit)
|
60
|
+
if targets_with_global_authentication and not isinstance(targets_with_global_authentication, str):
|
61
|
+
raise TypeError("Expected argument 'targets_with_global_authentication' to be a str")
|
62
|
+
pulumi.set(__self__, "targets_with_global_authentication", targets_with_global_authentication)
|
63
|
+
if targets_with_network_encryption and not isinstance(targets_with_network_encryption, str):
|
64
|
+
raise TypeError("Expected argument 'targets_with_network_encryption' to be a str")
|
65
|
+
pulumi.set(__self__, "targets_with_network_encryption", targets_with_network_encryption)
|
66
|
+
if targets_with_password_authentication and not isinstance(targets_with_password_authentication, str):
|
67
|
+
raise TypeError("Expected argument 'targets_with_password_authentication' to be a str")
|
68
|
+
pulumi.set(__self__, "targets_with_password_authentication", targets_with_password_authentication)
|
69
|
+
if targets_with_privilege_analysis and not isinstance(targets_with_privilege_analysis, str):
|
70
|
+
raise TypeError("Expected argument 'targets_with_privilege_analysis' to be a str")
|
71
|
+
pulumi.set(__self__, "targets_with_privilege_analysis", targets_with_privilege_analysis)
|
72
|
+
if targets_with_tablespace_encryption and not isinstance(targets_with_tablespace_encryption, str):
|
73
|
+
raise TypeError("Expected argument 'targets_with_tablespace_encryption' to be a str")
|
74
|
+
pulumi.set(__self__, "targets_with_tablespace_encryption", targets_with_tablespace_encryption)
|
75
|
+
if targets_with_traditional_audit and not isinstance(targets_with_traditional_audit, str):
|
76
|
+
raise TypeError("Expected argument 'targets_with_traditional_audit' to be a str")
|
77
|
+
pulumi.set(__self__, "targets_with_traditional_audit", targets_with_traditional_audit)
|
78
|
+
if targets_with_unified_audit and not isinstance(targets_with_unified_audit, str):
|
79
|
+
raise TypeError("Expected argument 'targets_with_unified_audit' to be a str")
|
80
|
+
pulumi.set(__self__, "targets_with_unified_audit", targets_with_unified_audit)
|
81
|
+
|
82
|
+
@property
|
83
|
+
@pulumi.getter(name="accessLevel")
|
84
|
+
def access_level(self) -> Optional[str]:
|
85
|
+
return pulumi.get(self, "access_level")
|
86
|
+
|
87
|
+
@property
|
88
|
+
@pulumi.getter(name="compartmentId")
|
89
|
+
def compartment_id(self) -> str:
|
90
|
+
"""
|
91
|
+
The OCID of the compartment.
|
92
|
+
"""
|
93
|
+
return pulumi.get(self, "compartment_id")
|
94
|
+
|
95
|
+
@property
|
96
|
+
@pulumi.getter(name="compartmentIdInSubtree")
|
97
|
+
def compartment_id_in_subtree(self) -> Optional[bool]:
|
98
|
+
return pulumi.get(self, "compartment_id_in_subtree")
|
99
|
+
|
100
|
+
@property
|
101
|
+
@pulumi.getter
|
102
|
+
def filters(self) -> Optional[Sequence['outputs.GetSecurityAssessmentSecurityFeaturesFilterResult']]:
|
103
|
+
return pulumi.get(self, "filters")
|
104
|
+
|
105
|
+
@property
|
106
|
+
@pulumi.getter
|
107
|
+
def id(self) -> str:
|
108
|
+
"""
|
109
|
+
The provider-assigned unique ID for this managed resource.
|
110
|
+
"""
|
111
|
+
return pulumi.get(self, "id")
|
112
|
+
|
113
|
+
@property
|
114
|
+
@pulumi.getter(name="securityFeatureCollections")
|
115
|
+
def security_feature_collections(self) -> Sequence['outputs.GetSecurityAssessmentSecurityFeaturesSecurityFeatureCollectionResult']:
|
116
|
+
"""
|
117
|
+
The list of security_feature_collection.
|
118
|
+
"""
|
119
|
+
return pulumi.get(self, "security_feature_collections")
|
120
|
+
|
121
|
+
@property
|
122
|
+
@pulumi.getter(name="targetId")
|
123
|
+
def target_id(self) -> Optional[str]:
|
124
|
+
"""
|
125
|
+
The OCID of the target database.
|
126
|
+
"""
|
127
|
+
return pulumi.get(self, "target_id")
|
128
|
+
|
129
|
+
@property
|
130
|
+
@pulumi.getter(name="targetsWithColumnEncryption")
|
131
|
+
def targets_with_column_encryption(self) -> Optional[str]:
|
132
|
+
return pulumi.get(self, "targets_with_column_encryption")
|
133
|
+
|
134
|
+
@property
|
135
|
+
@pulumi.getter(name="targetsWithDatabaseVault")
|
136
|
+
def targets_with_database_vault(self) -> Optional[str]:
|
137
|
+
return pulumi.get(self, "targets_with_database_vault")
|
138
|
+
|
139
|
+
@property
|
140
|
+
@pulumi.getter(name="targetsWithExternalAuthentication")
|
141
|
+
def targets_with_external_authentication(self) -> Optional[str]:
|
142
|
+
return pulumi.get(self, "targets_with_external_authentication")
|
143
|
+
|
144
|
+
@property
|
145
|
+
@pulumi.getter(name="targetsWithFineGrainedAudit")
|
146
|
+
def targets_with_fine_grained_audit(self) -> Optional[str]:
|
147
|
+
return pulumi.get(self, "targets_with_fine_grained_audit")
|
148
|
+
|
149
|
+
@property
|
150
|
+
@pulumi.getter(name="targetsWithGlobalAuthentication")
|
151
|
+
def targets_with_global_authentication(self) -> Optional[str]:
|
152
|
+
return pulumi.get(self, "targets_with_global_authentication")
|
153
|
+
|
154
|
+
@property
|
155
|
+
@pulumi.getter(name="targetsWithNetworkEncryption")
|
156
|
+
def targets_with_network_encryption(self) -> Optional[str]:
|
157
|
+
return pulumi.get(self, "targets_with_network_encryption")
|
158
|
+
|
159
|
+
@property
|
160
|
+
@pulumi.getter(name="targetsWithPasswordAuthentication")
|
161
|
+
def targets_with_password_authentication(self) -> Optional[str]:
|
162
|
+
return pulumi.get(self, "targets_with_password_authentication")
|
163
|
+
|
164
|
+
@property
|
165
|
+
@pulumi.getter(name="targetsWithPrivilegeAnalysis")
|
166
|
+
def targets_with_privilege_analysis(self) -> Optional[str]:
|
167
|
+
return pulumi.get(self, "targets_with_privilege_analysis")
|
168
|
+
|
169
|
+
@property
|
170
|
+
@pulumi.getter(name="targetsWithTablespaceEncryption")
|
171
|
+
def targets_with_tablespace_encryption(self) -> Optional[str]:
|
172
|
+
return pulumi.get(self, "targets_with_tablespace_encryption")
|
173
|
+
|
174
|
+
@property
|
175
|
+
@pulumi.getter(name="targetsWithTraditionalAudit")
|
176
|
+
def targets_with_traditional_audit(self) -> Optional[str]:
|
177
|
+
return pulumi.get(self, "targets_with_traditional_audit")
|
178
|
+
|
179
|
+
@property
|
180
|
+
@pulumi.getter(name="targetsWithUnifiedAudit")
|
181
|
+
def targets_with_unified_audit(self) -> Optional[str]:
|
182
|
+
return pulumi.get(self, "targets_with_unified_audit")
|
183
|
+
|
184
|
+
|
185
|
+
class AwaitableGetSecurityAssessmentSecurityFeaturesResult(GetSecurityAssessmentSecurityFeaturesResult):
|
186
|
+
# pylint: disable=using-constant-test
|
187
|
+
def __await__(self):
|
188
|
+
if False:
|
189
|
+
yield self
|
190
|
+
return GetSecurityAssessmentSecurityFeaturesResult(
|
191
|
+
access_level=self.access_level,
|
192
|
+
compartment_id=self.compartment_id,
|
193
|
+
compartment_id_in_subtree=self.compartment_id_in_subtree,
|
194
|
+
filters=self.filters,
|
195
|
+
id=self.id,
|
196
|
+
security_feature_collections=self.security_feature_collections,
|
197
|
+
target_id=self.target_id,
|
198
|
+
targets_with_column_encryption=self.targets_with_column_encryption,
|
199
|
+
targets_with_database_vault=self.targets_with_database_vault,
|
200
|
+
targets_with_external_authentication=self.targets_with_external_authentication,
|
201
|
+
targets_with_fine_grained_audit=self.targets_with_fine_grained_audit,
|
202
|
+
targets_with_global_authentication=self.targets_with_global_authentication,
|
203
|
+
targets_with_network_encryption=self.targets_with_network_encryption,
|
204
|
+
targets_with_password_authentication=self.targets_with_password_authentication,
|
205
|
+
targets_with_privilege_analysis=self.targets_with_privilege_analysis,
|
206
|
+
targets_with_tablespace_encryption=self.targets_with_tablespace_encryption,
|
207
|
+
targets_with_traditional_audit=self.targets_with_traditional_audit,
|
208
|
+
targets_with_unified_audit=self.targets_with_unified_audit)
|
209
|
+
|
210
|
+
|
211
|
+
def get_security_assessment_security_features(access_level: Optional[str] = None,
|
212
|
+
compartment_id: Optional[str] = None,
|
213
|
+
compartment_id_in_subtree: Optional[bool] = None,
|
214
|
+
filters: Optional[Sequence[pulumi.InputType['GetSecurityAssessmentSecurityFeaturesFilterArgs']]] = None,
|
215
|
+
target_id: Optional[str] = None,
|
216
|
+
targets_with_column_encryption: Optional[str] = None,
|
217
|
+
targets_with_database_vault: Optional[str] = None,
|
218
|
+
targets_with_external_authentication: Optional[str] = None,
|
219
|
+
targets_with_fine_grained_audit: Optional[str] = None,
|
220
|
+
targets_with_global_authentication: Optional[str] = None,
|
221
|
+
targets_with_network_encryption: Optional[str] = None,
|
222
|
+
targets_with_password_authentication: Optional[str] = None,
|
223
|
+
targets_with_privilege_analysis: Optional[str] = None,
|
224
|
+
targets_with_tablespace_encryption: Optional[str] = None,
|
225
|
+
targets_with_traditional_audit: Optional[str] = None,
|
226
|
+
targets_with_unified_audit: Optional[str] = None,
|
227
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecurityAssessmentSecurityFeaturesResult:
|
228
|
+
"""
|
229
|
+
This data source provides the list of Security Assessment Security Features in Oracle Cloud Infrastructure Data Safe service.
|
230
|
+
|
231
|
+
Lists the usage of Database security features for a given compartment or a target level, based on the filters provided.
|
232
|
+
|
233
|
+
## Example Usage
|
234
|
+
|
235
|
+
```python
|
236
|
+
import pulumi
|
237
|
+
import pulumi_oci as oci
|
238
|
+
|
239
|
+
test_security_assessment_security_features = oci.DataSafe.get_security_assessment_security_features(compartment_id=var["compartment_id"],
|
240
|
+
access_level=var["security_assessment_security_feature_access_level"],
|
241
|
+
compartment_id_in_subtree=var["security_assessment_security_feature_compartment_id_in_subtree"],
|
242
|
+
target_id=oci_cloud_guard_target["test_target"]["id"],
|
243
|
+
targets_with_column_encryption=var["security_assessment_security_feature_targets_with_column_encryption"],
|
244
|
+
targets_with_database_vault=var["security_assessment_security_feature_targets_with_database_vault"],
|
245
|
+
targets_with_external_authentication=var["security_assessment_security_feature_targets_with_external_authentication"],
|
246
|
+
targets_with_fine_grained_audit=var["security_assessment_security_feature_targets_with_fine_grained_audit"],
|
247
|
+
targets_with_global_authentication=var["security_assessment_security_feature_targets_with_global_authentication"],
|
248
|
+
targets_with_network_encryption=var["security_assessment_security_feature_targets_with_network_encryption"],
|
249
|
+
targets_with_password_authentication=var["security_assessment_security_feature_targets_with_password_authentication"],
|
250
|
+
targets_with_privilege_analysis=var["security_assessment_security_feature_targets_with_privilege_analysis"],
|
251
|
+
targets_with_tablespace_encryption=var["security_assessment_security_feature_targets_with_tablespace_encryption"],
|
252
|
+
targets_with_traditional_audit=var["security_assessment_security_feature_targets_with_traditional_audit"],
|
253
|
+
targets_with_unified_audit=var["security_assessment_security_feature_targets_with_unified_audit"])
|
254
|
+
```
|
255
|
+
|
256
|
+
|
257
|
+
:param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
258
|
+
:param str compartment_id: A filter to return only resources that match the specified compartment OCID.
|
259
|
+
:param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
260
|
+
:param str target_id: A filter to return only items related to a specific target OCID.
|
261
|
+
:param str targets_with_column_encryption: A filter to return only the targets that enable the DB security feature - Column Encryption enabled/disabled.
|
262
|
+
:param str targets_with_database_vault: A filter to return only the targets with the DB security feature - Database Vault enabled/disabled.
|
263
|
+
:param str targets_with_external_authentication: A filter to return only the targets with the DB security feature - External Authentication enabled/disabled.
|
264
|
+
:param str targets_with_fine_grained_audit: A filter to return only the targets with the DB security feature - Fine Grained Audit enabled/disabled.
|
265
|
+
:param str targets_with_global_authentication: A filter to return only the targets with the DB security feature - Global Authentication enabled/disabled.
|
266
|
+
:param str targets_with_network_encryption: A filter to return only the targets with the DB security feature - Network Encryption enabled/disabled.
|
267
|
+
:param str targets_with_password_authentication: A filter to return only the targets with the DB security feature - Password Authentication enabled/disabled.
|
268
|
+
:param str targets_with_privilege_analysis: A filter to return only the targets with the DB security feature - Privilege Analysis enabled/disabled.
|
269
|
+
:param str targets_with_tablespace_encryption: A filter to return only the targets with the DB security feature - Tablespace Encryption enabled/disabled.
|
270
|
+
:param str targets_with_traditional_audit: A filter to return only the targets with the DB security feature - Traditional Audit enabled/disabled.
|
271
|
+
:param str targets_with_unified_audit: A filter to return only the targets with the DB security feature - Unified Audit enabled/disabled.
|
272
|
+
"""
|
273
|
+
__args__ = dict()
|
274
|
+
__args__['accessLevel'] = access_level
|
275
|
+
__args__['compartmentId'] = compartment_id
|
276
|
+
__args__['compartmentIdInSubtree'] = compartment_id_in_subtree
|
277
|
+
__args__['filters'] = filters
|
278
|
+
__args__['targetId'] = target_id
|
279
|
+
__args__['targetsWithColumnEncryption'] = targets_with_column_encryption
|
280
|
+
__args__['targetsWithDatabaseVault'] = targets_with_database_vault
|
281
|
+
__args__['targetsWithExternalAuthentication'] = targets_with_external_authentication
|
282
|
+
__args__['targetsWithFineGrainedAudit'] = targets_with_fine_grained_audit
|
283
|
+
__args__['targetsWithGlobalAuthentication'] = targets_with_global_authentication
|
284
|
+
__args__['targetsWithNetworkEncryption'] = targets_with_network_encryption
|
285
|
+
__args__['targetsWithPasswordAuthentication'] = targets_with_password_authentication
|
286
|
+
__args__['targetsWithPrivilegeAnalysis'] = targets_with_privilege_analysis
|
287
|
+
__args__['targetsWithTablespaceEncryption'] = targets_with_tablespace_encryption
|
288
|
+
__args__['targetsWithTraditionalAudit'] = targets_with_traditional_audit
|
289
|
+
__args__['targetsWithUnifiedAudit'] = targets_with_unified_audit
|
290
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
291
|
+
__ret__ = pulumi.runtime.invoke('oci:DataSafe/getSecurityAssessmentSecurityFeatures:getSecurityAssessmentSecurityFeatures', __args__, opts=opts, typ=GetSecurityAssessmentSecurityFeaturesResult).value
|
292
|
+
|
293
|
+
return AwaitableGetSecurityAssessmentSecurityFeaturesResult(
|
294
|
+
access_level=pulumi.get(__ret__, 'access_level'),
|
295
|
+
compartment_id=pulumi.get(__ret__, 'compartment_id'),
|
296
|
+
compartment_id_in_subtree=pulumi.get(__ret__, 'compartment_id_in_subtree'),
|
297
|
+
filters=pulumi.get(__ret__, 'filters'),
|
298
|
+
id=pulumi.get(__ret__, 'id'),
|
299
|
+
security_feature_collections=pulumi.get(__ret__, 'security_feature_collections'),
|
300
|
+
target_id=pulumi.get(__ret__, 'target_id'),
|
301
|
+
targets_with_column_encryption=pulumi.get(__ret__, 'targets_with_column_encryption'),
|
302
|
+
targets_with_database_vault=pulumi.get(__ret__, 'targets_with_database_vault'),
|
303
|
+
targets_with_external_authentication=pulumi.get(__ret__, 'targets_with_external_authentication'),
|
304
|
+
targets_with_fine_grained_audit=pulumi.get(__ret__, 'targets_with_fine_grained_audit'),
|
305
|
+
targets_with_global_authentication=pulumi.get(__ret__, 'targets_with_global_authentication'),
|
306
|
+
targets_with_network_encryption=pulumi.get(__ret__, 'targets_with_network_encryption'),
|
307
|
+
targets_with_password_authentication=pulumi.get(__ret__, 'targets_with_password_authentication'),
|
308
|
+
targets_with_privilege_analysis=pulumi.get(__ret__, 'targets_with_privilege_analysis'),
|
309
|
+
targets_with_tablespace_encryption=pulumi.get(__ret__, 'targets_with_tablespace_encryption'),
|
310
|
+
targets_with_traditional_audit=pulumi.get(__ret__, 'targets_with_traditional_audit'),
|
311
|
+
targets_with_unified_audit=pulumi.get(__ret__, 'targets_with_unified_audit'))
|
312
|
+
|
313
|
+
|
314
|
+
@_utilities.lift_output_func(get_security_assessment_security_features)
|
315
|
+
def get_security_assessment_security_features_output(access_level: Optional[pulumi.Input[Optional[str]]] = None,
|
316
|
+
compartment_id: Optional[pulumi.Input[str]] = None,
|
317
|
+
compartment_id_in_subtree: Optional[pulumi.Input[Optional[bool]]] = None,
|
318
|
+
filters: Optional[pulumi.Input[Optional[Sequence[pulumi.InputType['GetSecurityAssessmentSecurityFeaturesFilterArgs']]]]] = None,
|
319
|
+
target_id: Optional[pulumi.Input[Optional[str]]] = None,
|
320
|
+
targets_with_column_encryption: Optional[pulumi.Input[Optional[str]]] = None,
|
321
|
+
targets_with_database_vault: Optional[pulumi.Input[Optional[str]]] = None,
|
322
|
+
targets_with_external_authentication: Optional[pulumi.Input[Optional[str]]] = None,
|
323
|
+
targets_with_fine_grained_audit: Optional[pulumi.Input[Optional[str]]] = None,
|
324
|
+
targets_with_global_authentication: Optional[pulumi.Input[Optional[str]]] = None,
|
325
|
+
targets_with_network_encryption: Optional[pulumi.Input[Optional[str]]] = None,
|
326
|
+
targets_with_password_authentication: Optional[pulumi.Input[Optional[str]]] = None,
|
327
|
+
targets_with_privilege_analysis: Optional[pulumi.Input[Optional[str]]] = None,
|
328
|
+
targets_with_tablespace_encryption: Optional[pulumi.Input[Optional[str]]] = None,
|
329
|
+
targets_with_traditional_audit: Optional[pulumi.Input[Optional[str]]] = None,
|
330
|
+
targets_with_unified_audit: Optional[pulumi.Input[Optional[str]]] = None,
|
331
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecurityAssessmentSecurityFeaturesResult]:
|
332
|
+
"""
|
333
|
+
This data source provides the list of Security Assessment Security Features in Oracle Cloud Infrastructure Data Safe service.
|
334
|
+
|
335
|
+
Lists the usage of Database security features for a given compartment or a target level, based on the filters provided.
|
336
|
+
|
337
|
+
## Example Usage
|
338
|
+
|
339
|
+
```python
|
340
|
+
import pulumi
|
341
|
+
import pulumi_oci as oci
|
342
|
+
|
343
|
+
test_security_assessment_security_features = oci.DataSafe.get_security_assessment_security_features(compartment_id=var["compartment_id"],
|
344
|
+
access_level=var["security_assessment_security_feature_access_level"],
|
345
|
+
compartment_id_in_subtree=var["security_assessment_security_feature_compartment_id_in_subtree"],
|
346
|
+
target_id=oci_cloud_guard_target["test_target"]["id"],
|
347
|
+
targets_with_column_encryption=var["security_assessment_security_feature_targets_with_column_encryption"],
|
348
|
+
targets_with_database_vault=var["security_assessment_security_feature_targets_with_database_vault"],
|
349
|
+
targets_with_external_authentication=var["security_assessment_security_feature_targets_with_external_authentication"],
|
350
|
+
targets_with_fine_grained_audit=var["security_assessment_security_feature_targets_with_fine_grained_audit"],
|
351
|
+
targets_with_global_authentication=var["security_assessment_security_feature_targets_with_global_authentication"],
|
352
|
+
targets_with_network_encryption=var["security_assessment_security_feature_targets_with_network_encryption"],
|
353
|
+
targets_with_password_authentication=var["security_assessment_security_feature_targets_with_password_authentication"],
|
354
|
+
targets_with_privilege_analysis=var["security_assessment_security_feature_targets_with_privilege_analysis"],
|
355
|
+
targets_with_tablespace_encryption=var["security_assessment_security_feature_targets_with_tablespace_encryption"],
|
356
|
+
targets_with_traditional_audit=var["security_assessment_security_feature_targets_with_traditional_audit"],
|
357
|
+
targets_with_unified_audit=var["security_assessment_security_feature_targets_with_unified_audit"])
|
358
|
+
```
|
359
|
+
|
360
|
+
|
361
|
+
:param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
362
|
+
:param str compartment_id: A filter to return only resources that match the specified compartment OCID.
|
363
|
+
:param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
364
|
+
:param str target_id: A filter to return only items related to a specific target OCID.
|
365
|
+
:param str targets_with_column_encryption: A filter to return only the targets that enable the DB security feature - Column Encryption enabled/disabled.
|
366
|
+
:param str targets_with_database_vault: A filter to return only the targets with the DB security feature - Database Vault enabled/disabled.
|
367
|
+
:param str targets_with_external_authentication: A filter to return only the targets with the DB security feature - External Authentication enabled/disabled.
|
368
|
+
:param str targets_with_fine_grained_audit: A filter to return only the targets with the DB security feature - Fine Grained Audit enabled/disabled.
|
369
|
+
:param str targets_with_global_authentication: A filter to return only the targets with the DB security feature - Global Authentication enabled/disabled.
|
370
|
+
:param str targets_with_network_encryption: A filter to return only the targets with the DB security feature - Network Encryption enabled/disabled.
|
371
|
+
:param str targets_with_password_authentication: A filter to return only the targets with the DB security feature - Password Authentication enabled/disabled.
|
372
|
+
:param str targets_with_privilege_analysis: A filter to return only the targets with the DB security feature - Privilege Analysis enabled/disabled.
|
373
|
+
:param str targets_with_tablespace_encryption: A filter to return only the targets with the DB security feature - Tablespace Encryption enabled/disabled.
|
374
|
+
:param str targets_with_traditional_audit: A filter to return only the targets with the DB security feature - Traditional Audit enabled/disabled.
|
375
|
+
:param str targets_with_unified_audit: A filter to return only the targets with the DB security feature - Unified Audit enabled/disabled.
|
376
|
+
"""
|
377
|
+
...
|
@@ -262,7 +262,7 @@ def get_security_assessments(access_level: Optional[str] = None,
|
|
262
262
|
:param str compartment_id: A filter to return only resources that match the specified compartment OCID.
|
263
263
|
:param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
264
264
|
:param str display_name: A filter to return only resources that match the specified display name.
|
265
|
-
:param bool is_baseline: A filter to return only security assessments that are set as baseline.
|
265
|
+
:param bool is_baseline: A filter to return only the security assessments that are set as a baseline.
|
266
266
|
:param bool is_schedule_assessment: A filter to return only security assessments of type save schedule.
|
267
267
|
:param str schedule_assessment_id: The OCID of the security assessment of type SAVE_SCHEDULE.
|
268
268
|
:param str state: A filter to return only resources that match the specified lifecycle state.
|
@@ -374,7 +374,7 @@ def get_security_assessments_output(access_level: Optional[pulumi.Input[Optional
|
|
374
374
|
:param str compartment_id: A filter to return only resources that match the specified compartment OCID.
|
375
375
|
:param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
376
376
|
:param str display_name: A filter to return only resources that match the specified display name.
|
377
|
-
:param bool is_baseline: A filter to return only security assessments that are set as baseline.
|
377
|
+
:param bool is_baseline: A filter to return only the security assessments that are set as a baseline.
|
378
378
|
:param bool is_schedule_assessment: A filter to return only security assessments of type save schedule.
|
379
379
|
:param str schedule_assessment_id: The OCID of the security assessment of type SAVE_SCHEDULE.
|
380
380
|
:param str state: A filter to return only resources that match the specified lifecycle state.
|
@@ -0,0 +1,253 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import pulumi
|
8
|
+
import pulumi.runtime
|
9
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
10
|
+
from .. import _utilities
|
11
|
+
from . import outputs
|
12
|
+
from ._inputs import *
|
13
|
+
|
14
|
+
__all__ = [
|
15
|
+
'GetSecurityPoliciesResult',
|
16
|
+
'AwaitableGetSecurityPoliciesResult',
|
17
|
+
'get_security_policies',
|
18
|
+
'get_security_policies_output',
|
19
|
+
]
|
20
|
+
|
21
|
+
@pulumi.output_type
|
22
|
+
class GetSecurityPoliciesResult:
|
23
|
+
"""
|
24
|
+
A collection of values returned by getSecurityPolicies.
|
25
|
+
"""
|
26
|
+
def __init__(__self__, access_level=None, compartment_id=None, compartment_id_in_subtree=None, display_name=None, filters=None, id=None, security_policy_collections=None, security_policy_id=None, state=None):
|
27
|
+
if access_level and not isinstance(access_level, str):
|
28
|
+
raise TypeError("Expected argument 'access_level' to be a str")
|
29
|
+
pulumi.set(__self__, "access_level", access_level)
|
30
|
+
if compartment_id and not isinstance(compartment_id, str):
|
31
|
+
raise TypeError("Expected argument 'compartment_id' to be a str")
|
32
|
+
pulumi.set(__self__, "compartment_id", compartment_id)
|
33
|
+
if compartment_id_in_subtree and not isinstance(compartment_id_in_subtree, bool):
|
34
|
+
raise TypeError("Expected argument 'compartment_id_in_subtree' to be a bool")
|
35
|
+
pulumi.set(__self__, "compartment_id_in_subtree", compartment_id_in_subtree)
|
36
|
+
if display_name and not isinstance(display_name, str):
|
37
|
+
raise TypeError("Expected argument 'display_name' to be a str")
|
38
|
+
pulumi.set(__self__, "display_name", display_name)
|
39
|
+
if filters and not isinstance(filters, list):
|
40
|
+
raise TypeError("Expected argument 'filters' to be a list")
|
41
|
+
pulumi.set(__self__, "filters", filters)
|
42
|
+
if id and not isinstance(id, str):
|
43
|
+
raise TypeError("Expected argument 'id' to be a str")
|
44
|
+
pulumi.set(__self__, "id", id)
|
45
|
+
if security_policy_collections and not isinstance(security_policy_collections, list):
|
46
|
+
raise TypeError("Expected argument 'security_policy_collections' to be a list")
|
47
|
+
pulumi.set(__self__, "security_policy_collections", security_policy_collections)
|
48
|
+
if security_policy_id and not isinstance(security_policy_id, str):
|
49
|
+
raise TypeError("Expected argument 'security_policy_id' to be a str")
|
50
|
+
pulumi.set(__self__, "security_policy_id", security_policy_id)
|
51
|
+
if state and not isinstance(state, str):
|
52
|
+
raise TypeError("Expected argument 'state' to be a str")
|
53
|
+
pulumi.set(__self__, "state", state)
|
54
|
+
|
55
|
+
@property
|
56
|
+
@pulumi.getter(name="accessLevel")
|
57
|
+
def access_level(self) -> Optional[str]:
|
58
|
+
return pulumi.get(self, "access_level")
|
59
|
+
|
60
|
+
@property
|
61
|
+
@pulumi.getter(name="compartmentId")
|
62
|
+
def compartment_id(self) -> str:
|
63
|
+
"""
|
64
|
+
The OCID of the compartment containing the security policy.
|
65
|
+
"""
|
66
|
+
return pulumi.get(self, "compartment_id")
|
67
|
+
|
68
|
+
@property
|
69
|
+
@pulumi.getter(name="compartmentIdInSubtree")
|
70
|
+
def compartment_id_in_subtree(self) -> Optional[bool]:
|
71
|
+
return pulumi.get(self, "compartment_id_in_subtree")
|
72
|
+
|
73
|
+
@property
|
74
|
+
@pulumi.getter(name="displayName")
|
75
|
+
def display_name(self) -> Optional[str]:
|
76
|
+
"""
|
77
|
+
The display name of the security policy.
|
78
|
+
"""
|
79
|
+
return pulumi.get(self, "display_name")
|
80
|
+
|
81
|
+
@property
|
82
|
+
@pulumi.getter
|
83
|
+
def filters(self) -> Optional[Sequence['outputs.GetSecurityPoliciesFilterResult']]:
|
84
|
+
return pulumi.get(self, "filters")
|
85
|
+
|
86
|
+
@property
|
87
|
+
@pulumi.getter
|
88
|
+
def id(self) -> str:
|
89
|
+
"""
|
90
|
+
The provider-assigned unique ID for this managed resource.
|
91
|
+
"""
|
92
|
+
return pulumi.get(self, "id")
|
93
|
+
|
94
|
+
@property
|
95
|
+
@pulumi.getter(name="securityPolicyCollections")
|
96
|
+
def security_policy_collections(self) -> Sequence['outputs.GetSecurityPoliciesSecurityPolicyCollectionResult']:
|
97
|
+
"""
|
98
|
+
The list of security_policy_collection.
|
99
|
+
"""
|
100
|
+
return pulumi.get(self, "security_policy_collections")
|
101
|
+
|
102
|
+
@property
|
103
|
+
@pulumi.getter(name="securityPolicyId")
|
104
|
+
def security_policy_id(self) -> Optional[str]:
|
105
|
+
return pulumi.get(self, "security_policy_id")
|
106
|
+
|
107
|
+
@property
|
108
|
+
@pulumi.getter
|
109
|
+
def state(self) -> Optional[str]:
|
110
|
+
"""
|
111
|
+
The current state of the security policy.
|
112
|
+
"""
|
113
|
+
return pulumi.get(self, "state")
|
114
|
+
|
115
|
+
|
116
|
+
class AwaitableGetSecurityPoliciesResult(GetSecurityPoliciesResult):
|
117
|
+
# pylint: disable=using-constant-test
|
118
|
+
def __await__(self):
|
119
|
+
if False:
|
120
|
+
yield self
|
121
|
+
return GetSecurityPoliciesResult(
|
122
|
+
access_level=self.access_level,
|
123
|
+
compartment_id=self.compartment_id,
|
124
|
+
compartment_id_in_subtree=self.compartment_id_in_subtree,
|
125
|
+
display_name=self.display_name,
|
126
|
+
filters=self.filters,
|
127
|
+
id=self.id,
|
128
|
+
security_policy_collections=self.security_policy_collections,
|
129
|
+
security_policy_id=self.security_policy_id,
|
130
|
+
state=self.state)
|
131
|
+
|
132
|
+
|
133
|
+
def get_security_policies(access_level: Optional[str] = None,
|
134
|
+
compartment_id: Optional[str] = None,
|
135
|
+
compartment_id_in_subtree: Optional[bool] = None,
|
136
|
+
display_name: Optional[str] = None,
|
137
|
+
filters: Optional[Sequence[pulumi.InputType['GetSecurityPoliciesFilterArgs']]] = None,
|
138
|
+
security_policy_id: Optional[str] = None,
|
139
|
+
state: Optional[str] = None,
|
140
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecurityPoliciesResult:
|
141
|
+
"""
|
142
|
+
This data source provides the list of Security Policies in Oracle Cloud Infrastructure Data Safe service.
|
143
|
+
|
144
|
+
Retrieves a list of all security policies in Data Safe.
|
145
|
+
|
146
|
+
The ListSecurityPolicies operation returns only the security policies in the specified `compartmentId`.
|
147
|
+
|
148
|
+
The parameter `accessLevel` specifies whether to return only those compartments for which the
|
149
|
+
requestor has INSPECT permissions on at least one resource directly
|
150
|
+
or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
|
151
|
+
Principal doesn't have access to even one of the child compartments. This is valid only when
|
152
|
+
`compartmentIdInSubtree` is set to `true`.
|
153
|
+
|
154
|
+
The parameter `compartmentIdInSubtree` applies when you perform ListSecurityPolicies on the
|
155
|
+
`compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
|
156
|
+
To get a full list of all compartments and subcompartments in the tenancy (root compartment),
|
157
|
+
set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
|
158
|
+
|
159
|
+
## Example Usage
|
160
|
+
|
161
|
+
```python
|
162
|
+
import pulumi
|
163
|
+
import pulumi_oci as oci
|
164
|
+
|
165
|
+
test_security_policies = oci.DataSafe.get_security_policies(compartment_id=var["compartment_id"],
|
166
|
+
access_level=var["security_policy_access_level"],
|
167
|
+
compartment_id_in_subtree=var["security_policy_compartment_id_in_subtree"],
|
168
|
+
display_name=var["security_policy_display_name"],
|
169
|
+
security_policy_id=oci_data_safe_security_policy["test_security_policy"]["id"],
|
170
|
+
state=var["security_policy_state"])
|
171
|
+
```
|
172
|
+
|
173
|
+
|
174
|
+
:param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
175
|
+
:param str compartment_id: A filter to return only resources that match the specified compartment OCID.
|
176
|
+
:param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
177
|
+
:param str display_name: A filter to return only resources that match the specified display name.
|
178
|
+
:param str security_policy_id: An optional filter to return only resources that match the specified OCID of the security policy resource.
|
179
|
+
:param str state: The current state of the security policy.
|
180
|
+
"""
|
181
|
+
__args__ = dict()
|
182
|
+
__args__['accessLevel'] = access_level
|
183
|
+
__args__['compartmentId'] = compartment_id
|
184
|
+
__args__['compartmentIdInSubtree'] = compartment_id_in_subtree
|
185
|
+
__args__['displayName'] = display_name
|
186
|
+
__args__['filters'] = filters
|
187
|
+
__args__['securityPolicyId'] = security_policy_id
|
188
|
+
__args__['state'] = state
|
189
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
190
|
+
__ret__ = pulumi.runtime.invoke('oci:DataSafe/getSecurityPolicies:getSecurityPolicies', __args__, opts=opts, typ=GetSecurityPoliciesResult).value
|
191
|
+
|
192
|
+
return AwaitableGetSecurityPoliciesResult(
|
193
|
+
access_level=pulumi.get(__ret__, 'access_level'),
|
194
|
+
compartment_id=pulumi.get(__ret__, 'compartment_id'),
|
195
|
+
compartment_id_in_subtree=pulumi.get(__ret__, 'compartment_id_in_subtree'),
|
196
|
+
display_name=pulumi.get(__ret__, 'display_name'),
|
197
|
+
filters=pulumi.get(__ret__, 'filters'),
|
198
|
+
id=pulumi.get(__ret__, 'id'),
|
199
|
+
security_policy_collections=pulumi.get(__ret__, 'security_policy_collections'),
|
200
|
+
security_policy_id=pulumi.get(__ret__, 'security_policy_id'),
|
201
|
+
state=pulumi.get(__ret__, 'state'))
|
202
|
+
|
203
|
+
|
204
|
+
@_utilities.lift_output_func(get_security_policies)
|
205
|
+
def get_security_policies_output(access_level: Optional[pulumi.Input[Optional[str]]] = None,
|
206
|
+
compartment_id: Optional[pulumi.Input[str]] = None,
|
207
|
+
compartment_id_in_subtree: Optional[pulumi.Input[Optional[bool]]] = None,
|
208
|
+
display_name: Optional[pulumi.Input[Optional[str]]] = None,
|
209
|
+
filters: Optional[pulumi.Input[Optional[Sequence[pulumi.InputType['GetSecurityPoliciesFilterArgs']]]]] = None,
|
210
|
+
security_policy_id: Optional[pulumi.Input[Optional[str]]] = None,
|
211
|
+
state: Optional[pulumi.Input[Optional[str]]] = None,
|
212
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecurityPoliciesResult]:
|
213
|
+
"""
|
214
|
+
This data source provides the list of Security Policies in Oracle Cloud Infrastructure Data Safe service.
|
215
|
+
|
216
|
+
Retrieves a list of all security policies in Data Safe.
|
217
|
+
|
218
|
+
The ListSecurityPolicies operation returns only the security policies in the specified `compartmentId`.
|
219
|
+
|
220
|
+
The parameter `accessLevel` specifies whether to return only those compartments for which the
|
221
|
+
requestor has INSPECT permissions on at least one resource directly
|
222
|
+
or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
|
223
|
+
Principal doesn't have access to even one of the child compartments. This is valid only when
|
224
|
+
`compartmentIdInSubtree` is set to `true`.
|
225
|
+
|
226
|
+
The parameter `compartmentIdInSubtree` applies when you perform ListSecurityPolicies on the
|
227
|
+
`compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
|
228
|
+
To get a full list of all compartments and subcompartments in the tenancy (root compartment),
|
229
|
+
set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
|
230
|
+
|
231
|
+
## Example Usage
|
232
|
+
|
233
|
+
```python
|
234
|
+
import pulumi
|
235
|
+
import pulumi_oci as oci
|
236
|
+
|
237
|
+
test_security_policies = oci.DataSafe.get_security_policies(compartment_id=var["compartment_id"],
|
238
|
+
access_level=var["security_policy_access_level"],
|
239
|
+
compartment_id_in_subtree=var["security_policy_compartment_id_in_subtree"],
|
240
|
+
display_name=var["security_policy_display_name"],
|
241
|
+
security_policy_id=oci_data_safe_security_policy["test_security_policy"]["id"],
|
242
|
+
state=var["security_policy_state"])
|
243
|
+
```
|
244
|
+
|
245
|
+
|
246
|
+
:param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
247
|
+
:param str compartment_id: A filter to return only resources that match the specified compartment OCID.
|
248
|
+
:param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
249
|
+
:param str display_name: A filter to return only resources that match the specified display name.
|
250
|
+
:param str security_policy_id: An optional filter to return only resources that match the specified OCID of the security policy resource.
|
251
|
+
:param str state: The current state of the security policy.
|
252
|
+
"""
|
253
|
+
...
|