pulumi-oci 1.19.0a1705693078__py3-none-any.whl → 1.20.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_oci/__init__.py +59 -0
- pulumi_oci/adm/_inputs.py +99 -18
- pulumi_oci/adm/get_remediation_run_application_dependency_recommendations.py +23 -3
- pulumi_oci/adm/get_vulnerability_audit.py +31 -5
- pulumi_oci/adm/get_vulnerability_audit_application_dependency_vulnerabilities.py +43 -6
- pulumi_oci/adm/get_vulnerability_audit_application_dependency_vulnerability.py +27 -1
- pulumi_oci/adm/get_vulnerability_audits.py +54 -3
- pulumi_oci/adm/outputs.py +296 -31
- pulumi_oci/adm/remediation_recipe.py +2 -0
- pulumi_oci/adm/vulnerability_audit.py +96 -37
- pulumi_oci/database/__init__.py +1 -0
- pulumi_oci/database/_inputs.py +40 -0
- pulumi_oci/database/cloud_vm_cluster.py +22 -1
- pulumi_oci/database/get_system_versions.py +173 -0
- pulumi_oci/database/outputs.py +88 -0
- pulumi_oci/database/vm_cluster.py +22 -1
- pulumi_oci/datasafe/__init__.py +22 -0
- pulumi_oci/datasafe/_inputs.py +1826 -161
- pulumi_oci/datasafe/audit_trail.py +140 -0
- pulumi_oci/datasafe/discovery_mod.py +7 -7
- pulumi_oci/datasafe/get_audit_trail.py +66 -1
- pulumi_oci/datasafe/get_discovery_job.py +1 -1
- pulumi_oci/datasafe/get_discovery_jobs_result.py +1 -1
- pulumi_oci/datasafe/get_discovery_jobs_results.py +1 -1
- pulumi_oci/datasafe/get_masking_policies_masking_column.py +1 -1
- pulumi_oci/datasafe/get_masking_policies_masking_columns.py +1 -1
- pulumi_oci/datasafe/get_masking_policy.py +1 -1
- pulumi_oci/datasafe/get_report.py +1 -1
- pulumi_oci/datasafe/get_security_assessment.py +3 -3
- pulumi_oci/datasafe/get_security_assessment_comparison.py +5 -5
- pulumi_oci/datasafe/get_security_assessment_finding.py +29 -3
- pulumi_oci/datasafe/get_security_assessment_finding_analytics.py +276 -0
- pulumi_oci/datasafe/get_security_assessment_findings.py +43 -7
- pulumi_oci/datasafe/get_security_assessment_findings_change_audit_logs.py +309 -0
- pulumi_oci/datasafe/get_security_assessment_security_feature_analytics.py +198 -0
- pulumi_oci/datasafe/get_security_assessment_security_features.py +377 -0
- pulumi_oci/datasafe/get_security_assessments.py +2 -2
- pulumi_oci/datasafe/get_security_policies.py +253 -0
- pulumi_oci/datasafe/get_security_policy.py +235 -0
- pulumi_oci/datasafe/get_security_policy_deployment.py +261 -0
- pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_state.py +165 -0
- pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_states.py +180 -0
- pulumi_oci/datasafe/get_security_policy_deployments.py +293 -0
- pulumi_oci/datasafe/get_security_policy_report.py +248 -0
- pulumi_oci/datasafe/get_security_policy_report_database_table_access_entries.py +158 -0
- pulumi_oci/datasafe/get_security_policy_report_database_table_access_entry.py +408 -0
- pulumi_oci/datasafe/get_security_policy_report_database_view_access_entries.py +178 -0
- pulumi_oci/datasafe/get_security_policy_report_database_view_access_entry.py +382 -0
- pulumi_oci/datasafe/get_security_policy_report_role_grant_paths.py +177 -0
- pulumi_oci/datasafe/get_security_policy_reports.py +273 -0
- pulumi_oci/datasafe/get_sensitive_data_model.py +1 -1
- pulumi_oci/datasafe/get_target_database.py +27 -4
- pulumi_oci/datasafe/get_target_database_peer_target_database.py +263 -0
- pulumi_oci/datasafe/get_target_database_peer_target_databases.py +133 -0
- pulumi_oci/datasafe/get_target_databases.py +1 -1
- pulumi_oci/datasafe/get_user_assessment.py +5 -5
- pulumi_oci/datasafe/get_user_assessment_comparison.py +2 -2
- pulumi_oci/datasafe/get_user_assessment_user_access_analytics.py +133 -0
- pulumi_oci/datasafe/get_user_assessment_user_analytics.py +2 -2
- pulumi_oci/datasafe/get_user_assessment_users.py +42 -2
- pulumi_oci/datasafe/get_user_assessments.py +2 -2
- pulumi_oci/datasafe/masking_policies_masking_column.py +7 -7
- pulumi_oci/datasafe/masking_policy.py +9 -9
- pulumi_oci/datasafe/outputs.py +16686 -9777
- pulumi_oci/datasafe/report.py +559 -0
- pulumi_oci/datasafe/security_assessment.py +12 -12
- pulumi_oci/datasafe/sensitive_data_model.py +7 -7
- pulumi_oci/datasafe/set_security_assessment_baseline.py +7 -7
- pulumi_oci/datasafe/set_user_assessment_baseline.py +7 -7
- pulumi_oci/datasafe/target_database.py +146 -25
- pulumi_oci/datasafe/target_database_peer_target_database.py +634 -0
- pulumi_oci/datasafe/user_assessment.py +20 -20
- pulumi_oci/generativeai/__init__.py +18 -0
- pulumi_oci/generativeai/_inputs.py +534 -0
- pulumi_oci/generativeai/dedicated_ai_cluster.py +808 -0
- pulumi_oci/generativeai/endpoint.py +717 -0
- pulumi_oci/generativeai/get_dedicated_ai_cluster.py +288 -0
- pulumi_oci/generativeai/get_dedicated_ai_clusters.py +183 -0
- pulumi_oci/generativeai/get_endpoint.py +275 -0
- pulumi_oci/generativeai/get_endpoints.py +183 -0
- pulumi_oci/generativeai/get_model.py +353 -0
- pulumi_oci/generativeai/get_models.py +220 -0
- pulumi_oci/generativeai/model.py +858 -0
- pulumi_oci/generativeai/outputs.py +1721 -0
- pulumi_oci/marketplace/get_publication.py +14 -1
- pulumi_oci/marketplace/outputs.py +11 -0
- pulumi_oci/marketplace/publication.py +28 -0
- pulumi_oci/monitoring/__init__.py +3 -0
- pulumi_oci/monitoring/_inputs.py +82 -4
- pulumi_oci/monitoring/alarm.py +15 -15
- pulumi_oci/monitoring/alarm_suppression.py +745 -0
- pulumi_oci/monitoring/get_alarm.py +5 -5
- pulumi_oci/monitoring/get_alarm_history_collection.py +4 -4
- pulumi_oci/monitoring/get_alarm_statuses.py +3 -1
- pulumi_oci/monitoring/get_alarm_suppression.py +276 -0
- pulumi_oci/monitoring/get_alarm_suppressions.py +192 -0
- pulumi_oci/monitoring/get_metric_data.py +12 -8
- pulumi_oci/monitoring/get_metrics.py +2 -2
- pulumi_oci/monitoring/outputs.py +355 -50
- pulumi_oci/networkfirewall/_inputs.py +25 -20
- pulumi_oci/networkfirewall/outputs.py +40 -30
- pulumi_oci/stackmonitoring/__init__.py +3 -0
- pulumi_oci/stackmonitoring/_inputs.py +143 -0
- pulumi_oci/stackmonitoring/get_process_set.py +236 -0
- pulumi_oci/stackmonitoring/get_process_sets.py +156 -0
- pulumi_oci/stackmonitoring/outputs.py +422 -0
- pulumi_oci/stackmonitoring/process_set.py +548 -0
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/METADATA +1 -1
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/RECORD +111 -70
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/WHEEL +0 -0
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,180 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import pulumi
|
8
|
+
import pulumi.runtime
|
9
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
10
|
+
from .. import _utilities
|
11
|
+
from . import outputs
|
12
|
+
from ._inputs import *
|
13
|
+
|
14
|
+
__all__ = [
|
15
|
+
'GetSecurityPolicyDeploymentSecurityPolicyEntryStatesResult',
|
16
|
+
'AwaitableGetSecurityPolicyDeploymentSecurityPolicyEntryStatesResult',
|
17
|
+
'get_security_policy_deployment_security_policy_entry_states',
|
18
|
+
'get_security_policy_deployment_security_policy_entry_states_output',
|
19
|
+
]
|
20
|
+
|
21
|
+
@pulumi.output_type
|
22
|
+
class GetSecurityPolicyDeploymentSecurityPolicyEntryStatesResult:
|
23
|
+
"""
|
24
|
+
A collection of values returned by getSecurityPolicyDeploymentSecurityPolicyEntryStates.
|
25
|
+
"""
|
26
|
+
def __init__(__self__, deployment_status=None, filters=None, id=None, security_policy_deployment_id=None, security_policy_entry_id=None, security_policy_entry_state_collections=None):
|
27
|
+
if deployment_status and not isinstance(deployment_status, str):
|
28
|
+
raise TypeError("Expected argument 'deployment_status' to be a str")
|
29
|
+
pulumi.set(__self__, "deployment_status", deployment_status)
|
30
|
+
if filters and not isinstance(filters, list):
|
31
|
+
raise TypeError("Expected argument 'filters' to be a list")
|
32
|
+
pulumi.set(__self__, "filters", filters)
|
33
|
+
if id and not isinstance(id, str):
|
34
|
+
raise TypeError("Expected argument 'id' to be a str")
|
35
|
+
pulumi.set(__self__, "id", id)
|
36
|
+
if security_policy_deployment_id and not isinstance(security_policy_deployment_id, str):
|
37
|
+
raise TypeError("Expected argument 'security_policy_deployment_id' to be a str")
|
38
|
+
pulumi.set(__self__, "security_policy_deployment_id", security_policy_deployment_id)
|
39
|
+
if security_policy_entry_id and not isinstance(security_policy_entry_id, str):
|
40
|
+
raise TypeError("Expected argument 'security_policy_entry_id' to be a str")
|
41
|
+
pulumi.set(__self__, "security_policy_entry_id", security_policy_entry_id)
|
42
|
+
if security_policy_entry_state_collections and not isinstance(security_policy_entry_state_collections, list):
|
43
|
+
raise TypeError("Expected argument 'security_policy_entry_state_collections' to be a list")
|
44
|
+
pulumi.set(__self__, "security_policy_entry_state_collections", security_policy_entry_state_collections)
|
45
|
+
|
46
|
+
@property
|
47
|
+
@pulumi.getter(name="deploymentStatus")
|
48
|
+
def deployment_status(self) -> Optional[str]:
|
49
|
+
"""
|
50
|
+
The current deployment status of the security policy deployment and the security policy entry associated.
|
51
|
+
"""
|
52
|
+
return pulumi.get(self, "deployment_status")
|
53
|
+
|
54
|
+
@property
|
55
|
+
@pulumi.getter
|
56
|
+
def filters(self) -> Optional[Sequence['outputs.GetSecurityPolicyDeploymentSecurityPolicyEntryStatesFilterResult']]:
|
57
|
+
return pulumi.get(self, "filters")
|
58
|
+
|
59
|
+
@property
|
60
|
+
@pulumi.getter
|
61
|
+
def id(self) -> str:
|
62
|
+
"""
|
63
|
+
The provider-assigned unique ID for this managed resource.
|
64
|
+
"""
|
65
|
+
return pulumi.get(self, "id")
|
66
|
+
|
67
|
+
@property
|
68
|
+
@pulumi.getter(name="securityPolicyDeploymentId")
|
69
|
+
def security_policy_deployment_id(self) -> str:
|
70
|
+
"""
|
71
|
+
The OCID of the security policy deployment associated.
|
72
|
+
"""
|
73
|
+
return pulumi.get(self, "security_policy_deployment_id")
|
74
|
+
|
75
|
+
@property
|
76
|
+
@pulumi.getter(name="securityPolicyEntryId")
|
77
|
+
def security_policy_entry_id(self) -> Optional[str]:
|
78
|
+
"""
|
79
|
+
The OCID of the security policy entry type associated.
|
80
|
+
"""
|
81
|
+
return pulumi.get(self, "security_policy_entry_id")
|
82
|
+
|
83
|
+
@property
|
84
|
+
@pulumi.getter(name="securityPolicyEntryStateCollections")
|
85
|
+
def security_policy_entry_state_collections(self) -> Sequence['outputs.GetSecurityPolicyDeploymentSecurityPolicyEntryStatesSecurityPolicyEntryStateCollectionResult']:
|
86
|
+
"""
|
87
|
+
The list of security_policy_entry_state_collection.
|
88
|
+
"""
|
89
|
+
return pulumi.get(self, "security_policy_entry_state_collections")
|
90
|
+
|
91
|
+
|
92
|
+
class AwaitableGetSecurityPolicyDeploymentSecurityPolicyEntryStatesResult(GetSecurityPolicyDeploymentSecurityPolicyEntryStatesResult):
|
93
|
+
# pylint: disable=using-constant-test
|
94
|
+
def __await__(self):
|
95
|
+
if False:
|
96
|
+
yield self
|
97
|
+
return GetSecurityPolicyDeploymentSecurityPolicyEntryStatesResult(
|
98
|
+
deployment_status=self.deployment_status,
|
99
|
+
filters=self.filters,
|
100
|
+
id=self.id,
|
101
|
+
security_policy_deployment_id=self.security_policy_deployment_id,
|
102
|
+
security_policy_entry_id=self.security_policy_entry_id,
|
103
|
+
security_policy_entry_state_collections=self.security_policy_entry_state_collections)
|
104
|
+
|
105
|
+
|
106
|
+
def get_security_policy_deployment_security_policy_entry_states(deployment_status: Optional[str] = None,
|
107
|
+
filters: Optional[Sequence[pulumi.InputType['GetSecurityPolicyDeploymentSecurityPolicyEntryStatesFilterArgs']]] = None,
|
108
|
+
security_policy_deployment_id: Optional[str] = None,
|
109
|
+
security_policy_entry_id: Optional[str] = None,
|
110
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecurityPolicyDeploymentSecurityPolicyEntryStatesResult:
|
111
|
+
"""
|
112
|
+
This data source provides the list of Security Policy Deployment Security Policy Entry States in Oracle Cloud Infrastructure Data Safe service.
|
113
|
+
|
114
|
+
Retrieves a list of all security policy entry states in Data Safe.
|
115
|
+
|
116
|
+
The ListSecurityPolicyEntryStates operation returns only the security policy entry states for the specified security policy entry.
|
117
|
+
|
118
|
+
## Example Usage
|
119
|
+
|
120
|
+
```python
|
121
|
+
import pulumi
|
122
|
+
import pulumi_oci as oci
|
123
|
+
|
124
|
+
test_security_policy_deployment_security_policy_entry_states = oci.DataSafe.get_security_policy_deployment_security_policy_entry_states(security_policy_deployment_id=oci_data_safe_security_policy_deployment["test_security_policy_deployment"]["id"],
|
125
|
+
deployment_status=var["security_policy_deployment_security_policy_entry_state_deployment_status"],
|
126
|
+
security_policy_entry_id=oci_data_safe_security_policy_entry["test_security_policy_entry"]["id"])
|
127
|
+
```
|
128
|
+
|
129
|
+
|
130
|
+
:param str deployment_status: The current state of the security policy deployment.
|
131
|
+
:param str security_policy_deployment_id: The OCID of the security policy deployment resource.
|
132
|
+
:param str security_policy_entry_id: An optional filter to return only resources that match the specified security policy entry OCID.
|
133
|
+
"""
|
134
|
+
__args__ = dict()
|
135
|
+
__args__['deploymentStatus'] = deployment_status
|
136
|
+
__args__['filters'] = filters
|
137
|
+
__args__['securityPolicyDeploymentId'] = security_policy_deployment_id
|
138
|
+
__args__['securityPolicyEntryId'] = security_policy_entry_id
|
139
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
140
|
+
__ret__ = pulumi.runtime.invoke('oci:DataSafe/getSecurityPolicyDeploymentSecurityPolicyEntryStates:getSecurityPolicyDeploymentSecurityPolicyEntryStates', __args__, opts=opts, typ=GetSecurityPolicyDeploymentSecurityPolicyEntryStatesResult).value
|
141
|
+
|
142
|
+
return AwaitableGetSecurityPolicyDeploymentSecurityPolicyEntryStatesResult(
|
143
|
+
deployment_status=pulumi.get(__ret__, 'deployment_status'),
|
144
|
+
filters=pulumi.get(__ret__, 'filters'),
|
145
|
+
id=pulumi.get(__ret__, 'id'),
|
146
|
+
security_policy_deployment_id=pulumi.get(__ret__, 'security_policy_deployment_id'),
|
147
|
+
security_policy_entry_id=pulumi.get(__ret__, 'security_policy_entry_id'),
|
148
|
+
security_policy_entry_state_collections=pulumi.get(__ret__, 'security_policy_entry_state_collections'))
|
149
|
+
|
150
|
+
|
151
|
+
@_utilities.lift_output_func(get_security_policy_deployment_security_policy_entry_states)
|
152
|
+
def get_security_policy_deployment_security_policy_entry_states_output(deployment_status: Optional[pulumi.Input[Optional[str]]] = None,
|
153
|
+
filters: Optional[pulumi.Input[Optional[Sequence[pulumi.InputType['GetSecurityPolicyDeploymentSecurityPolicyEntryStatesFilterArgs']]]]] = None,
|
154
|
+
security_policy_deployment_id: Optional[pulumi.Input[str]] = None,
|
155
|
+
security_policy_entry_id: Optional[pulumi.Input[Optional[str]]] = None,
|
156
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecurityPolicyDeploymentSecurityPolicyEntryStatesResult]:
|
157
|
+
"""
|
158
|
+
This data source provides the list of Security Policy Deployment Security Policy Entry States in Oracle Cloud Infrastructure Data Safe service.
|
159
|
+
|
160
|
+
Retrieves a list of all security policy entry states in Data Safe.
|
161
|
+
|
162
|
+
The ListSecurityPolicyEntryStates operation returns only the security policy entry states for the specified security policy entry.
|
163
|
+
|
164
|
+
## Example Usage
|
165
|
+
|
166
|
+
```python
|
167
|
+
import pulumi
|
168
|
+
import pulumi_oci as oci
|
169
|
+
|
170
|
+
test_security_policy_deployment_security_policy_entry_states = oci.DataSafe.get_security_policy_deployment_security_policy_entry_states(security_policy_deployment_id=oci_data_safe_security_policy_deployment["test_security_policy_deployment"]["id"],
|
171
|
+
deployment_status=var["security_policy_deployment_security_policy_entry_state_deployment_status"],
|
172
|
+
security_policy_entry_id=oci_data_safe_security_policy_entry["test_security_policy_entry"]["id"])
|
173
|
+
```
|
174
|
+
|
175
|
+
|
176
|
+
:param str deployment_status: The current state of the security policy deployment.
|
177
|
+
:param str security_policy_deployment_id: The OCID of the security policy deployment resource.
|
178
|
+
:param str security_policy_entry_id: An optional filter to return only resources that match the specified security policy entry OCID.
|
179
|
+
"""
|
180
|
+
...
|
@@ -0,0 +1,293 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import pulumi
|
8
|
+
import pulumi.runtime
|
9
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
10
|
+
from .. import _utilities
|
11
|
+
from . import outputs
|
12
|
+
from ._inputs import *
|
13
|
+
|
14
|
+
__all__ = [
|
15
|
+
'GetSecurityPolicyDeploymentsResult',
|
16
|
+
'AwaitableGetSecurityPolicyDeploymentsResult',
|
17
|
+
'get_security_policy_deployments',
|
18
|
+
'get_security_policy_deployments_output',
|
19
|
+
]
|
20
|
+
|
21
|
+
@pulumi.output_type
|
22
|
+
class GetSecurityPolicyDeploymentsResult:
|
23
|
+
"""
|
24
|
+
A collection of values returned by getSecurityPolicyDeployments.
|
25
|
+
"""
|
26
|
+
def __init__(__self__, access_level=None, compartment_id=None, compartment_id_in_subtree=None, display_name=None, filters=None, id=None, security_policy_deployment_collections=None, security_policy_deployment_id=None, security_policy_id=None, state=None, target_id=None):
|
27
|
+
if access_level and not isinstance(access_level, str):
|
28
|
+
raise TypeError("Expected argument 'access_level' to be a str")
|
29
|
+
pulumi.set(__self__, "access_level", access_level)
|
30
|
+
if compartment_id and not isinstance(compartment_id, str):
|
31
|
+
raise TypeError("Expected argument 'compartment_id' to be a str")
|
32
|
+
pulumi.set(__self__, "compartment_id", compartment_id)
|
33
|
+
if compartment_id_in_subtree and not isinstance(compartment_id_in_subtree, bool):
|
34
|
+
raise TypeError("Expected argument 'compartment_id_in_subtree' to be a bool")
|
35
|
+
pulumi.set(__self__, "compartment_id_in_subtree", compartment_id_in_subtree)
|
36
|
+
if display_name and not isinstance(display_name, str):
|
37
|
+
raise TypeError("Expected argument 'display_name' to be a str")
|
38
|
+
pulumi.set(__self__, "display_name", display_name)
|
39
|
+
if filters and not isinstance(filters, list):
|
40
|
+
raise TypeError("Expected argument 'filters' to be a list")
|
41
|
+
pulumi.set(__self__, "filters", filters)
|
42
|
+
if id and not isinstance(id, str):
|
43
|
+
raise TypeError("Expected argument 'id' to be a str")
|
44
|
+
pulumi.set(__self__, "id", id)
|
45
|
+
if security_policy_deployment_collections and not isinstance(security_policy_deployment_collections, list):
|
46
|
+
raise TypeError("Expected argument 'security_policy_deployment_collections' to be a list")
|
47
|
+
pulumi.set(__self__, "security_policy_deployment_collections", security_policy_deployment_collections)
|
48
|
+
if security_policy_deployment_id and not isinstance(security_policy_deployment_id, str):
|
49
|
+
raise TypeError("Expected argument 'security_policy_deployment_id' to be a str")
|
50
|
+
pulumi.set(__self__, "security_policy_deployment_id", security_policy_deployment_id)
|
51
|
+
if security_policy_id and not isinstance(security_policy_id, str):
|
52
|
+
raise TypeError("Expected argument 'security_policy_id' to be a str")
|
53
|
+
pulumi.set(__self__, "security_policy_id", security_policy_id)
|
54
|
+
if state and not isinstance(state, str):
|
55
|
+
raise TypeError("Expected argument 'state' to be a str")
|
56
|
+
pulumi.set(__self__, "state", state)
|
57
|
+
if target_id and not isinstance(target_id, str):
|
58
|
+
raise TypeError("Expected argument 'target_id' to be a str")
|
59
|
+
pulumi.set(__self__, "target_id", target_id)
|
60
|
+
|
61
|
+
@property
|
62
|
+
@pulumi.getter(name="accessLevel")
|
63
|
+
def access_level(self) -> Optional[str]:
|
64
|
+
return pulumi.get(self, "access_level")
|
65
|
+
|
66
|
+
@property
|
67
|
+
@pulumi.getter(name="compartmentId")
|
68
|
+
def compartment_id(self) -> str:
|
69
|
+
"""
|
70
|
+
The OCID of the compartment containing the security policy deployment.
|
71
|
+
"""
|
72
|
+
return pulumi.get(self, "compartment_id")
|
73
|
+
|
74
|
+
@property
|
75
|
+
@pulumi.getter(name="compartmentIdInSubtree")
|
76
|
+
def compartment_id_in_subtree(self) -> Optional[bool]:
|
77
|
+
return pulumi.get(self, "compartment_id_in_subtree")
|
78
|
+
|
79
|
+
@property
|
80
|
+
@pulumi.getter(name="displayName")
|
81
|
+
def display_name(self) -> Optional[str]:
|
82
|
+
"""
|
83
|
+
The display name of the security policy deployment.
|
84
|
+
"""
|
85
|
+
return pulumi.get(self, "display_name")
|
86
|
+
|
87
|
+
@property
|
88
|
+
@pulumi.getter
|
89
|
+
def filters(self) -> Optional[Sequence['outputs.GetSecurityPolicyDeploymentsFilterResult']]:
|
90
|
+
return pulumi.get(self, "filters")
|
91
|
+
|
92
|
+
@property
|
93
|
+
@pulumi.getter
|
94
|
+
def id(self) -> str:
|
95
|
+
"""
|
96
|
+
The provider-assigned unique ID for this managed resource.
|
97
|
+
"""
|
98
|
+
return pulumi.get(self, "id")
|
99
|
+
|
100
|
+
@property
|
101
|
+
@pulumi.getter(name="securityPolicyDeploymentCollections")
|
102
|
+
def security_policy_deployment_collections(self) -> Sequence['outputs.GetSecurityPolicyDeploymentsSecurityPolicyDeploymentCollectionResult']:
|
103
|
+
"""
|
104
|
+
The list of security_policy_deployment_collection.
|
105
|
+
"""
|
106
|
+
return pulumi.get(self, "security_policy_deployment_collections")
|
107
|
+
|
108
|
+
@property
|
109
|
+
@pulumi.getter(name="securityPolicyDeploymentId")
|
110
|
+
def security_policy_deployment_id(self) -> Optional[str]:
|
111
|
+
return pulumi.get(self, "security_policy_deployment_id")
|
112
|
+
|
113
|
+
@property
|
114
|
+
@pulumi.getter(name="securityPolicyId")
|
115
|
+
def security_policy_id(self) -> Optional[str]:
|
116
|
+
"""
|
117
|
+
The OCID of the security policy corresponding to the security policy deployment.
|
118
|
+
"""
|
119
|
+
return pulumi.get(self, "security_policy_id")
|
120
|
+
|
121
|
+
@property
|
122
|
+
@pulumi.getter
|
123
|
+
def state(self) -> Optional[str]:
|
124
|
+
"""
|
125
|
+
The current state of the security policy deployment.
|
126
|
+
"""
|
127
|
+
return pulumi.get(self, "state")
|
128
|
+
|
129
|
+
@property
|
130
|
+
@pulumi.getter(name="targetId")
|
131
|
+
def target_id(self) -> Optional[str]:
|
132
|
+
"""
|
133
|
+
The OCID of the target where the security policy is deployed.
|
134
|
+
"""
|
135
|
+
return pulumi.get(self, "target_id")
|
136
|
+
|
137
|
+
|
138
|
+
class AwaitableGetSecurityPolicyDeploymentsResult(GetSecurityPolicyDeploymentsResult):
|
139
|
+
# pylint: disable=using-constant-test
|
140
|
+
def __await__(self):
|
141
|
+
if False:
|
142
|
+
yield self
|
143
|
+
return GetSecurityPolicyDeploymentsResult(
|
144
|
+
access_level=self.access_level,
|
145
|
+
compartment_id=self.compartment_id,
|
146
|
+
compartment_id_in_subtree=self.compartment_id_in_subtree,
|
147
|
+
display_name=self.display_name,
|
148
|
+
filters=self.filters,
|
149
|
+
id=self.id,
|
150
|
+
security_policy_deployment_collections=self.security_policy_deployment_collections,
|
151
|
+
security_policy_deployment_id=self.security_policy_deployment_id,
|
152
|
+
security_policy_id=self.security_policy_id,
|
153
|
+
state=self.state,
|
154
|
+
target_id=self.target_id)
|
155
|
+
|
156
|
+
|
157
|
+
def get_security_policy_deployments(access_level: Optional[str] = None,
|
158
|
+
compartment_id: Optional[str] = None,
|
159
|
+
compartment_id_in_subtree: Optional[bool] = None,
|
160
|
+
display_name: Optional[str] = None,
|
161
|
+
filters: Optional[Sequence[pulumi.InputType['GetSecurityPolicyDeploymentsFilterArgs']]] = None,
|
162
|
+
security_policy_deployment_id: Optional[str] = None,
|
163
|
+
security_policy_id: Optional[str] = None,
|
164
|
+
state: Optional[str] = None,
|
165
|
+
target_id: Optional[str] = None,
|
166
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecurityPolicyDeploymentsResult:
|
167
|
+
"""
|
168
|
+
This data source provides the list of Security Policy Deployments in Oracle Cloud Infrastructure Data Safe service.
|
169
|
+
|
170
|
+
Retrieves a list of all security policy deployments in Data Safe.
|
171
|
+
|
172
|
+
The ListSecurityPolicyDeployments operation returns only the security policy deployments in the specified `compartmentId`.
|
173
|
+
|
174
|
+
The parameter `accessLevel` specifies whether to return only those compartments for which the
|
175
|
+
requestor has INSPECT permissions on at least one resource directly
|
176
|
+
or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
|
177
|
+
Principal doesn't have access to even one of the child compartments. This is valid only when
|
178
|
+
`compartmentIdInSubtree` is set to `true`.
|
179
|
+
|
180
|
+
The parameter `compartmentIdInSubtree` applies when you perform ListSecurityPolicyDeployments on the
|
181
|
+
`compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
|
182
|
+
To get a full list of all compartments and subcompartments in the tenancy (root compartment),
|
183
|
+
set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
|
184
|
+
|
185
|
+
## Example Usage
|
186
|
+
|
187
|
+
```python
|
188
|
+
import pulumi
|
189
|
+
import pulumi_oci as oci
|
190
|
+
|
191
|
+
test_security_policy_deployments = oci.DataSafe.get_security_policy_deployments(compartment_id=var["compartment_id"],
|
192
|
+
access_level=var["security_policy_deployment_access_level"],
|
193
|
+
compartment_id_in_subtree=var["security_policy_deployment_compartment_id_in_subtree"],
|
194
|
+
display_name=var["security_policy_deployment_display_name"],
|
195
|
+
security_policy_deployment_id=oci_data_safe_security_policy_deployment["test_security_policy_deployment"]["id"],
|
196
|
+
security_policy_id=oci_data_safe_security_policy["test_security_policy"]["id"],
|
197
|
+
state=var["security_policy_deployment_state"],
|
198
|
+
target_id=oci_cloud_guard_target["test_target"]["id"])
|
199
|
+
```
|
200
|
+
|
201
|
+
|
202
|
+
:param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
203
|
+
:param str compartment_id: A filter to return only resources that match the specified compartment OCID.
|
204
|
+
:param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
205
|
+
:param str display_name: A filter to return only resources that match the specified display name.
|
206
|
+
:param str security_policy_deployment_id: An optional filter to return only resources that match the specified OCID of the security policy deployment resource.
|
207
|
+
:param str security_policy_id: An optional filter to return only resources that match the specified OCID of the security policy resource.
|
208
|
+
:param str state: The current state of the security policy deployment.
|
209
|
+
:param str target_id: A filter to return only items related to a specific target OCID.
|
210
|
+
"""
|
211
|
+
__args__ = dict()
|
212
|
+
__args__['accessLevel'] = access_level
|
213
|
+
__args__['compartmentId'] = compartment_id
|
214
|
+
__args__['compartmentIdInSubtree'] = compartment_id_in_subtree
|
215
|
+
__args__['displayName'] = display_name
|
216
|
+
__args__['filters'] = filters
|
217
|
+
__args__['securityPolicyDeploymentId'] = security_policy_deployment_id
|
218
|
+
__args__['securityPolicyId'] = security_policy_id
|
219
|
+
__args__['state'] = state
|
220
|
+
__args__['targetId'] = target_id
|
221
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
222
|
+
__ret__ = pulumi.runtime.invoke('oci:DataSafe/getSecurityPolicyDeployments:getSecurityPolicyDeployments', __args__, opts=opts, typ=GetSecurityPolicyDeploymentsResult).value
|
223
|
+
|
224
|
+
return AwaitableGetSecurityPolicyDeploymentsResult(
|
225
|
+
access_level=pulumi.get(__ret__, 'access_level'),
|
226
|
+
compartment_id=pulumi.get(__ret__, 'compartment_id'),
|
227
|
+
compartment_id_in_subtree=pulumi.get(__ret__, 'compartment_id_in_subtree'),
|
228
|
+
display_name=pulumi.get(__ret__, 'display_name'),
|
229
|
+
filters=pulumi.get(__ret__, 'filters'),
|
230
|
+
id=pulumi.get(__ret__, 'id'),
|
231
|
+
security_policy_deployment_collections=pulumi.get(__ret__, 'security_policy_deployment_collections'),
|
232
|
+
security_policy_deployment_id=pulumi.get(__ret__, 'security_policy_deployment_id'),
|
233
|
+
security_policy_id=pulumi.get(__ret__, 'security_policy_id'),
|
234
|
+
state=pulumi.get(__ret__, 'state'),
|
235
|
+
target_id=pulumi.get(__ret__, 'target_id'))
|
236
|
+
|
237
|
+
|
238
|
+
@_utilities.lift_output_func(get_security_policy_deployments)
|
239
|
+
def get_security_policy_deployments_output(access_level: Optional[pulumi.Input[Optional[str]]] = None,
|
240
|
+
compartment_id: Optional[pulumi.Input[str]] = None,
|
241
|
+
compartment_id_in_subtree: Optional[pulumi.Input[Optional[bool]]] = None,
|
242
|
+
display_name: Optional[pulumi.Input[Optional[str]]] = None,
|
243
|
+
filters: Optional[pulumi.Input[Optional[Sequence[pulumi.InputType['GetSecurityPolicyDeploymentsFilterArgs']]]]] = None,
|
244
|
+
security_policy_deployment_id: Optional[pulumi.Input[Optional[str]]] = None,
|
245
|
+
security_policy_id: Optional[pulumi.Input[Optional[str]]] = None,
|
246
|
+
state: Optional[pulumi.Input[Optional[str]]] = None,
|
247
|
+
target_id: Optional[pulumi.Input[Optional[str]]] = None,
|
248
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecurityPolicyDeploymentsResult]:
|
249
|
+
"""
|
250
|
+
This data source provides the list of Security Policy Deployments in Oracle Cloud Infrastructure Data Safe service.
|
251
|
+
|
252
|
+
Retrieves a list of all security policy deployments in Data Safe.
|
253
|
+
|
254
|
+
The ListSecurityPolicyDeployments operation returns only the security policy deployments in the specified `compartmentId`.
|
255
|
+
|
256
|
+
The parameter `accessLevel` specifies whether to return only those compartments for which the
|
257
|
+
requestor has INSPECT permissions on at least one resource directly
|
258
|
+
or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
|
259
|
+
Principal doesn't have access to even one of the child compartments. This is valid only when
|
260
|
+
`compartmentIdInSubtree` is set to `true`.
|
261
|
+
|
262
|
+
The parameter `compartmentIdInSubtree` applies when you perform ListSecurityPolicyDeployments on the
|
263
|
+
`compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
|
264
|
+
To get a full list of all compartments and subcompartments in the tenancy (root compartment),
|
265
|
+
set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
|
266
|
+
|
267
|
+
## Example Usage
|
268
|
+
|
269
|
+
```python
|
270
|
+
import pulumi
|
271
|
+
import pulumi_oci as oci
|
272
|
+
|
273
|
+
test_security_policy_deployments = oci.DataSafe.get_security_policy_deployments(compartment_id=var["compartment_id"],
|
274
|
+
access_level=var["security_policy_deployment_access_level"],
|
275
|
+
compartment_id_in_subtree=var["security_policy_deployment_compartment_id_in_subtree"],
|
276
|
+
display_name=var["security_policy_deployment_display_name"],
|
277
|
+
security_policy_deployment_id=oci_data_safe_security_policy_deployment["test_security_policy_deployment"]["id"],
|
278
|
+
security_policy_id=oci_data_safe_security_policy["test_security_policy"]["id"],
|
279
|
+
state=var["security_policy_deployment_state"],
|
280
|
+
target_id=oci_cloud_guard_target["test_target"]["id"])
|
281
|
+
```
|
282
|
+
|
283
|
+
|
284
|
+
:param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
285
|
+
:param str compartment_id: A filter to return only resources that match the specified compartment OCID.
|
286
|
+
:param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
287
|
+
:param str display_name: A filter to return only resources that match the specified display name.
|
288
|
+
:param str security_policy_deployment_id: An optional filter to return only resources that match the specified OCID of the security policy deployment resource.
|
289
|
+
:param str security_policy_id: An optional filter to return only resources that match the specified OCID of the security policy resource.
|
290
|
+
:param str state: The current state of the security policy deployment.
|
291
|
+
:param str target_id: A filter to return only items related to a specific target OCID.
|
292
|
+
"""
|
293
|
+
...
|