pulumi-oci 1.19.0a1705693078__py3-none-any.whl → 1.20.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (111) hide show
  1. pulumi_oci/__init__.py +59 -0
  2. pulumi_oci/adm/_inputs.py +99 -18
  3. pulumi_oci/adm/get_remediation_run_application_dependency_recommendations.py +23 -3
  4. pulumi_oci/adm/get_vulnerability_audit.py +31 -5
  5. pulumi_oci/adm/get_vulnerability_audit_application_dependency_vulnerabilities.py +43 -6
  6. pulumi_oci/adm/get_vulnerability_audit_application_dependency_vulnerability.py +27 -1
  7. pulumi_oci/adm/get_vulnerability_audits.py +54 -3
  8. pulumi_oci/adm/outputs.py +296 -31
  9. pulumi_oci/adm/remediation_recipe.py +2 -0
  10. pulumi_oci/adm/vulnerability_audit.py +96 -37
  11. pulumi_oci/database/__init__.py +1 -0
  12. pulumi_oci/database/_inputs.py +40 -0
  13. pulumi_oci/database/cloud_vm_cluster.py +22 -1
  14. pulumi_oci/database/get_system_versions.py +173 -0
  15. pulumi_oci/database/outputs.py +88 -0
  16. pulumi_oci/database/vm_cluster.py +22 -1
  17. pulumi_oci/datasafe/__init__.py +22 -0
  18. pulumi_oci/datasafe/_inputs.py +1826 -161
  19. pulumi_oci/datasafe/audit_trail.py +140 -0
  20. pulumi_oci/datasafe/discovery_mod.py +7 -7
  21. pulumi_oci/datasafe/get_audit_trail.py +66 -1
  22. pulumi_oci/datasafe/get_discovery_job.py +1 -1
  23. pulumi_oci/datasafe/get_discovery_jobs_result.py +1 -1
  24. pulumi_oci/datasafe/get_discovery_jobs_results.py +1 -1
  25. pulumi_oci/datasafe/get_masking_policies_masking_column.py +1 -1
  26. pulumi_oci/datasafe/get_masking_policies_masking_columns.py +1 -1
  27. pulumi_oci/datasafe/get_masking_policy.py +1 -1
  28. pulumi_oci/datasafe/get_report.py +1 -1
  29. pulumi_oci/datasafe/get_security_assessment.py +3 -3
  30. pulumi_oci/datasafe/get_security_assessment_comparison.py +5 -5
  31. pulumi_oci/datasafe/get_security_assessment_finding.py +29 -3
  32. pulumi_oci/datasafe/get_security_assessment_finding_analytics.py +276 -0
  33. pulumi_oci/datasafe/get_security_assessment_findings.py +43 -7
  34. pulumi_oci/datasafe/get_security_assessment_findings_change_audit_logs.py +309 -0
  35. pulumi_oci/datasafe/get_security_assessment_security_feature_analytics.py +198 -0
  36. pulumi_oci/datasafe/get_security_assessment_security_features.py +377 -0
  37. pulumi_oci/datasafe/get_security_assessments.py +2 -2
  38. pulumi_oci/datasafe/get_security_policies.py +253 -0
  39. pulumi_oci/datasafe/get_security_policy.py +235 -0
  40. pulumi_oci/datasafe/get_security_policy_deployment.py +261 -0
  41. pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_state.py +165 -0
  42. pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_states.py +180 -0
  43. pulumi_oci/datasafe/get_security_policy_deployments.py +293 -0
  44. pulumi_oci/datasafe/get_security_policy_report.py +248 -0
  45. pulumi_oci/datasafe/get_security_policy_report_database_table_access_entries.py +158 -0
  46. pulumi_oci/datasafe/get_security_policy_report_database_table_access_entry.py +408 -0
  47. pulumi_oci/datasafe/get_security_policy_report_database_view_access_entries.py +178 -0
  48. pulumi_oci/datasafe/get_security_policy_report_database_view_access_entry.py +382 -0
  49. pulumi_oci/datasafe/get_security_policy_report_role_grant_paths.py +177 -0
  50. pulumi_oci/datasafe/get_security_policy_reports.py +273 -0
  51. pulumi_oci/datasafe/get_sensitive_data_model.py +1 -1
  52. pulumi_oci/datasafe/get_target_database.py +27 -4
  53. pulumi_oci/datasafe/get_target_database_peer_target_database.py +263 -0
  54. pulumi_oci/datasafe/get_target_database_peer_target_databases.py +133 -0
  55. pulumi_oci/datasafe/get_target_databases.py +1 -1
  56. pulumi_oci/datasafe/get_user_assessment.py +5 -5
  57. pulumi_oci/datasafe/get_user_assessment_comparison.py +2 -2
  58. pulumi_oci/datasafe/get_user_assessment_user_access_analytics.py +133 -0
  59. pulumi_oci/datasafe/get_user_assessment_user_analytics.py +2 -2
  60. pulumi_oci/datasafe/get_user_assessment_users.py +42 -2
  61. pulumi_oci/datasafe/get_user_assessments.py +2 -2
  62. pulumi_oci/datasafe/masking_policies_masking_column.py +7 -7
  63. pulumi_oci/datasafe/masking_policy.py +9 -9
  64. pulumi_oci/datasafe/outputs.py +16686 -9777
  65. pulumi_oci/datasafe/report.py +559 -0
  66. pulumi_oci/datasafe/security_assessment.py +12 -12
  67. pulumi_oci/datasafe/sensitive_data_model.py +7 -7
  68. pulumi_oci/datasafe/set_security_assessment_baseline.py +7 -7
  69. pulumi_oci/datasafe/set_user_assessment_baseline.py +7 -7
  70. pulumi_oci/datasafe/target_database.py +146 -25
  71. pulumi_oci/datasafe/target_database_peer_target_database.py +634 -0
  72. pulumi_oci/datasafe/user_assessment.py +20 -20
  73. pulumi_oci/generativeai/__init__.py +18 -0
  74. pulumi_oci/generativeai/_inputs.py +534 -0
  75. pulumi_oci/generativeai/dedicated_ai_cluster.py +808 -0
  76. pulumi_oci/generativeai/endpoint.py +717 -0
  77. pulumi_oci/generativeai/get_dedicated_ai_cluster.py +288 -0
  78. pulumi_oci/generativeai/get_dedicated_ai_clusters.py +183 -0
  79. pulumi_oci/generativeai/get_endpoint.py +275 -0
  80. pulumi_oci/generativeai/get_endpoints.py +183 -0
  81. pulumi_oci/generativeai/get_model.py +353 -0
  82. pulumi_oci/generativeai/get_models.py +220 -0
  83. pulumi_oci/generativeai/model.py +858 -0
  84. pulumi_oci/generativeai/outputs.py +1721 -0
  85. pulumi_oci/marketplace/get_publication.py +14 -1
  86. pulumi_oci/marketplace/outputs.py +11 -0
  87. pulumi_oci/marketplace/publication.py +28 -0
  88. pulumi_oci/monitoring/__init__.py +3 -0
  89. pulumi_oci/monitoring/_inputs.py +82 -4
  90. pulumi_oci/monitoring/alarm.py +15 -15
  91. pulumi_oci/monitoring/alarm_suppression.py +745 -0
  92. pulumi_oci/monitoring/get_alarm.py +5 -5
  93. pulumi_oci/monitoring/get_alarm_history_collection.py +4 -4
  94. pulumi_oci/monitoring/get_alarm_statuses.py +3 -1
  95. pulumi_oci/monitoring/get_alarm_suppression.py +276 -0
  96. pulumi_oci/monitoring/get_alarm_suppressions.py +192 -0
  97. pulumi_oci/monitoring/get_metric_data.py +12 -8
  98. pulumi_oci/monitoring/get_metrics.py +2 -2
  99. pulumi_oci/monitoring/outputs.py +355 -50
  100. pulumi_oci/networkfirewall/_inputs.py +25 -20
  101. pulumi_oci/networkfirewall/outputs.py +40 -30
  102. pulumi_oci/stackmonitoring/__init__.py +3 -0
  103. pulumi_oci/stackmonitoring/_inputs.py +143 -0
  104. pulumi_oci/stackmonitoring/get_process_set.py +236 -0
  105. pulumi_oci/stackmonitoring/get_process_sets.py +156 -0
  106. pulumi_oci/stackmonitoring/outputs.py +422 -0
  107. pulumi_oci/stackmonitoring/process_set.py +548 -0
  108. {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/METADATA +1 -1
  109. {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/RECORD +111 -70
  110. {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/WHEEL +0 -0
  111. {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,408 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import pulumi
8
+ import pulumi.runtime
9
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
10
+ from .. import _utilities
11
+
12
+ __all__ = [
13
+ 'GetSecurityPolicyReportDatabaseTableAccessEntryResult',
14
+ 'AwaitableGetSecurityPolicyReportDatabaseTableAccessEntryResult',
15
+ 'get_security_policy_report_database_table_access_entry',
16
+ 'get_security_policy_report_database_table_access_entry_output',
17
+ ]
18
+
19
+ @pulumi.output_type
20
+ class GetSecurityPolicyReportDatabaseTableAccessEntryResult:
21
+ """
22
+ A collection of values returned by getSecurityPolicyReportDatabaseTableAccessEntry.
23
+ """
24
+ def __init__(__self__, access_through_object=None, access_type=None, are_all_tables_accessible=None, column_name=None, database_table_access_entry_key=None, grant_from_role=None, grantee=None, grantor=None, id=None, is_access_constrained_by_database_vault=None, is_access_constrained_by_label_security=None, is_access_constrained_by_real_application_security=None, is_access_constrained_by_redaction=None, is_access_constrained_by_sql_firewall=None, is_access_constrained_by_view=None, is_access_constrained_by_virtual_private_database=None, is_sensitive=None, key=None, privilege=None, privilege_grantable=None, privilege_type=None, security_policy_report_id=None, table_name=None, table_schema=None, target_id=None):
25
+ if access_through_object and not isinstance(access_through_object, str):
26
+ raise TypeError("Expected argument 'access_through_object' to be a str")
27
+ pulumi.set(__self__, "access_through_object", access_through_object)
28
+ if access_type and not isinstance(access_type, str):
29
+ raise TypeError("Expected argument 'access_type' to be a str")
30
+ pulumi.set(__self__, "access_type", access_type)
31
+ if are_all_tables_accessible and not isinstance(are_all_tables_accessible, bool):
32
+ raise TypeError("Expected argument 'are_all_tables_accessible' to be a bool")
33
+ pulumi.set(__self__, "are_all_tables_accessible", are_all_tables_accessible)
34
+ if column_name and not isinstance(column_name, str):
35
+ raise TypeError("Expected argument 'column_name' to be a str")
36
+ pulumi.set(__self__, "column_name", column_name)
37
+ if database_table_access_entry_key and not isinstance(database_table_access_entry_key, str):
38
+ raise TypeError("Expected argument 'database_table_access_entry_key' to be a str")
39
+ pulumi.set(__self__, "database_table_access_entry_key", database_table_access_entry_key)
40
+ if grant_from_role and not isinstance(grant_from_role, str):
41
+ raise TypeError("Expected argument 'grant_from_role' to be a str")
42
+ pulumi.set(__self__, "grant_from_role", grant_from_role)
43
+ if grantee and not isinstance(grantee, str):
44
+ raise TypeError("Expected argument 'grantee' to be a str")
45
+ pulumi.set(__self__, "grantee", grantee)
46
+ if grantor and not isinstance(grantor, str):
47
+ raise TypeError("Expected argument 'grantor' to be a str")
48
+ pulumi.set(__self__, "grantor", grantor)
49
+ if id and not isinstance(id, str):
50
+ raise TypeError("Expected argument 'id' to be a str")
51
+ pulumi.set(__self__, "id", id)
52
+ if is_access_constrained_by_database_vault and not isinstance(is_access_constrained_by_database_vault, bool):
53
+ raise TypeError("Expected argument 'is_access_constrained_by_database_vault' to be a bool")
54
+ pulumi.set(__self__, "is_access_constrained_by_database_vault", is_access_constrained_by_database_vault)
55
+ if is_access_constrained_by_label_security and not isinstance(is_access_constrained_by_label_security, bool):
56
+ raise TypeError("Expected argument 'is_access_constrained_by_label_security' to be a bool")
57
+ pulumi.set(__self__, "is_access_constrained_by_label_security", is_access_constrained_by_label_security)
58
+ if is_access_constrained_by_real_application_security and not isinstance(is_access_constrained_by_real_application_security, bool):
59
+ raise TypeError("Expected argument 'is_access_constrained_by_real_application_security' to be a bool")
60
+ pulumi.set(__self__, "is_access_constrained_by_real_application_security", is_access_constrained_by_real_application_security)
61
+ if is_access_constrained_by_redaction and not isinstance(is_access_constrained_by_redaction, bool):
62
+ raise TypeError("Expected argument 'is_access_constrained_by_redaction' to be a bool")
63
+ pulumi.set(__self__, "is_access_constrained_by_redaction", is_access_constrained_by_redaction)
64
+ if is_access_constrained_by_sql_firewall and not isinstance(is_access_constrained_by_sql_firewall, bool):
65
+ raise TypeError("Expected argument 'is_access_constrained_by_sql_firewall' to be a bool")
66
+ pulumi.set(__self__, "is_access_constrained_by_sql_firewall", is_access_constrained_by_sql_firewall)
67
+ if is_access_constrained_by_view and not isinstance(is_access_constrained_by_view, bool):
68
+ raise TypeError("Expected argument 'is_access_constrained_by_view' to be a bool")
69
+ pulumi.set(__self__, "is_access_constrained_by_view", is_access_constrained_by_view)
70
+ if is_access_constrained_by_virtual_private_database and not isinstance(is_access_constrained_by_virtual_private_database, bool):
71
+ raise TypeError("Expected argument 'is_access_constrained_by_virtual_private_database' to be a bool")
72
+ pulumi.set(__self__, "is_access_constrained_by_virtual_private_database", is_access_constrained_by_virtual_private_database)
73
+ if is_sensitive and not isinstance(is_sensitive, bool):
74
+ raise TypeError("Expected argument 'is_sensitive' to be a bool")
75
+ pulumi.set(__self__, "is_sensitive", is_sensitive)
76
+ if key and not isinstance(key, str):
77
+ raise TypeError("Expected argument 'key' to be a str")
78
+ pulumi.set(__self__, "key", key)
79
+ if privilege and not isinstance(privilege, str):
80
+ raise TypeError("Expected argument 'privilege' to be a str")
81
+ pulumi.set(__self__, "privilege", privilege)
82
+ if privilege_grantable and not isinstance(privilege_grantable, str):
83
+ raise TypeError("Expected argument 'privilege_grantable' to be a str")
84
+ pulumi.set(__self__, "privilege_grantable", privilege_grantable)
85
+ if privilege_type and not isinstance(privilege_type, str):
86
+ raise TypeError("Expected argument 'privilege_type' to be a str")
87
+ pulumi.set(__self__, "privilege_type", privilege_type)
88
+ if security_policy_report_id and not isinstance(security_policy_report_id, str):
89
+ raise TypeError("Expected argument 'security_policy_report_id' to be a str")
90
+ pulumi.set(__self__, "security_policy_report_id", security_policy_report_id)
91
+ if table_name and not isinstance(table_name, str):
92
+ raise TypeError("Expected argument 'table_name' to be a str")
93
+ pulumi.set(__self__, "table_name", table_name)
94
+ if table_schema and not isinstance(table_schema, str):
95
+ raise TypeError("Expected argument 'table_schema' to be a str")
96
+ pulumi.set(__self__, "table_schema", table_schema)
97
+ if target_id and not isinstance(target_id, str):
98
+ raise TypeError("Expected argument 'target_id' to be a str")
99
+ pulumi.set(__self__, "target_id", target_id)
100
+
101
+ @property
102
+ @pulumi.getter(name="accessThroughObject")
103
+ def access_through_object(self) -> str:
104
+ """
105
+ A non-null value in this field indicates the object through which user has access to table, possible values could be table or view.
106
+ """
107
+ return pulumi.get(self, "access_through_object")
108
+
109
+ @property
110
+ @pulumi.getter(name="accessType")
111
+ def access_type(self) -> str:
112
+ """
113
+ The type of the access the user has on the table, there can be one or more from SELECT, UPDATE, INSERT, OWNER or DELETE.
114
+ """
115
+ return pulumi.get(self, "access_type")
116
+
117
+ @property
118
+ @pulumi.getter(name="areAllTablesAccessible")
119
+ def are_all_tables_accessible(self) -> bool:
120
+ """
121
+ Indicates whether the user has access to all the tables in the schema.
122
+ """
123
+ return pulumi.get(self, "are_all_tables_accessible")
124
+
125
+ @property
126
+ @pulumi.getter(name="columnName")
127
+ def column_name(self) -> str:
128
+ """
129
+ If there are column level privileges on a table or view.
130
+ """
131
+ return pulumi.get(self, "column_name")
132
+
133
+ @property
134
+ @pulumi.getter(name="databaseTableAccessEntryKey")
135
+ def database_table_access_entry_key(self) -> str:
136
+ return pulumi.get(self, "database_table_access_entry_key")
137
+
138
+ @property
139
+ @pulumi.getter(name="grantFromRole")
140
+ def grant_from_role(self) -> str:
141
+ """
142
+ This can be empty in case of direct grant, in case of indirect grant, this attribute displays the name of the role which is granted to the user though which the user has access to the table.
143
+ """
144
+ return pulumi.get(self, "grant_from_role")
145
+
146
+ @property
147
+ @pulumi.getter
148
+ def grantee(self) -> str:
149
+ """
150
+ Grantee is the user who can access the table
151
+ """
152
+ return pulumi.get(self, "grantee")
153
+
154
+ @property
155
+ @pulumi.getter
156
+ def grantor(self) -> str:
157
+ """
158
+ The one who granted this privilege.
159
+ """
160
+ return pulumi.get(self, "grantor")
161
+
162
+ @property
163
+ @pulumi.getter
164
+ def id(self) -> str:
165
+ """
166
+ The provider-assigned unique ID for this managed resource.
167
+ """
168
+ return pulumi.get(self, "id")
169
+
170
+ @property
171
+ @pulumi.getter(name="isAccessConstrainedByDatabaseVault")
172
+ def is_access_constrained_by_database_vault(self) -> bool:
173
+ """
174
+ Indicates whether the table access is constrained via Oracle Database Vault.
175
+ """
176
+ return pulumi.get(self, "is_access_constrained_by_database_vault")
177
+
178
+ @property
179
+ @pulumi.getter(name="isAccessConstrainedByLabelSecurity")
180
+ def is_access_constrained_by_label_security(self) -> bool:
181
+ """
182
+ Indicates whether the table access is constrained via Oracle Label Security.
183
+ """
184
+ return pulumi.get(self, "is_access_constrained_by_label_security")
185
+
186
+ @property
187
+ @pulumi.getter(name="isAccessConstrainedByRealApplicationSecurity")
188
+ def is_access_constrained_by_real_application_security(self) -> bool:
189
+ """
190
+ Indicates whether the table access is constrained via Real Application Security.
191
+ """
192
+ return pulumi.get(self, "is_access_constrained_by_real_application_security")
193
+
194
+ @property
195
+ @pulumi.getter(name="isAccessConstrainedByRedaction")
196
+ def is_access_constrained_by_redaction(self) -> bool:
197
+ """
198
+ Indicates whether the table access is constrained via Oracle Data Redaction.
199
+ """
200
+ return pulumi.get(self, "is_access_constrained_by_redaction")
201
+
202
+ @property
203
+ @pulumi.getter(name="isAccessConstrainedBySqlFirewall")
204
+ def is_access_constrained_by_sql_firewall(self) -> bool:
205
+ """
206
+ Indicates whether the table access is constrained via Oracle Database SQL Firewall.
207
+ """
208
+ return pulumi.get(self, "is_access_constrained_by_sql_firewall")
209
+
210
+ @property
211
+ @pulumi.getter(name="isAccessConstrainedByView")
212
+ def is_access_constrained_by_view(self) -> bool:
213
+ """
214
+ Indicates whether the access is constrained on a table via a view.
215
+ """
216
+ return pulumi.get(self, "is_access_constrained_by_view")
217
+
218
+ @property
219
+ @pulumi.getter(name="isAccessConstrainedByVirtualPrivateDatabase")
220
+ def is_access_constrained_by_virtual_private_database(self) -> bool:
221
+ """
222
+ Indicates whether the table access is constrained via Virtual Private Database.
223
+ """
224
+ return pulumi.get(self, "is_access_constrained_by_virtual_private_database")
225
+
226
+ @property
227
+ @pulumi.getter(name="isSensitive")
228
+ def is_sensitive(self) -> bool:
229
+ """
230
+ Indicates whether the table is marked as sensitive.
231
+ """
232
+ return pulumi.get(self, "is_sensitive")
233
+
234
+ @property
235
+ @pulumi.getter
236
+ def key(self) -> str:
237
+ """
238
+ The unique key that identifies the table access report. It is numeric and unique within a security policy report.
239
+ """
240
+ return pulumi.get(self, "key")
241
+
242
+ @property
243
+ @pulumi.getter
244
+ def privilege(self) -> str:
245
+ """
246
+ Name of the privilege.
247
+ """
248
+ return pulumi.get(self, "privilege")
249
+
250
+ @property
251
+ @pulumi.getter(name="privilegeGrantable")
252
+ def privilege_grantable(self) -> str:
253
+ """
254
+ Indicates whether the grantee can grant this privilege to other users. Privileges can be granted to a user or role with GRANT_OPTION or ADMIN_OPTION
255
+ """
256
+ return pulumi.get(self, "privilege_grantable")
257
+
258
+ @property
259
+ @pulumi.getter(name="privilegeType")
260
+ def privilege_type(self) -> str:
261
+ """
262
+ Type of the privilege user has, this includes System Privilege, Schema Privilege, Object Privilege, Column Privilege, Owner or Schema Privilege on a schema.
263
+ """
264
+ return pulumi.get(self, "privilege_type")
265
+
266
+ @property
267
+ @pulumi.getter(name="securityPolicyReportId")
268
+ def security_policy_report_id(self) -> str:
269
+ return pulumi.get(self, "security_policy_report_id")
270
+
271
+ @property
272
+ @pulumi.getter(name="tableName")
273
+ def table_name(self) -> str:
274
+ """
275
+ The name of the database table the user has access to.
276
+ """
277
+ return pulumi.get(self, "table_name")
278
+
279
+ @property
280
+ @pulumi.getter(name="tableSchema")
281
+ def table_schema(self) -> str:
282
+ """
283
+ The name of the schema the table belongs to.
284
+ """
285
+ return pulumi.get(self, "table_schema")
286
+
287
+ @property
288
+ @pulumi.getter(name="targetId")
289
+ def target_id(self) -> str:
290
+ """
291
+ The OCID of the of the target database.
292
+ """
293
+ return pulumi.get(self, "target_id")
294
+
295
+
296
+ class AwaitableGetSecurityPolicyReportDatabaseTableAccessEntryResult(GetSecurityPolicyReportDatabaseTableAccessEntryResult):
297
+ # pylint: disable=using-constant-test
298
+ def __await__(self):
299
+ if False:
300
+ yield self
301
+ return GetSecurityPolicyReportDatabaseTableAccessEntryResult(
302
+ access_through_object=self.access_through_object,
303
+ access_type=self.access_type,
304
+ are_all_tables_accessible=self.are_all_tables_accessible,
305
+ column_name=self.column_name,
306
+ database_table_access_entry_key=self.database_table_access_entry_key,
307
+ grant_from_role=self.grant_from_role,
308
+ grantee=self.grantee,
309
+ grantor=self.grantor,
310
+ id=self.id,
311
+ is_access_constrained_by_database_vault=self.is_access_constrained_by_database_vault,
312
+ is_access_constrained_by_label_security=self.is_access_constrained_by_label_security,
313
+ is_access_constrained_by_real_application_security=self.is_access_constrained_by_real_application_security,
314
+ is_access_constrained_by_redaction=self.is_access_constrained_by_redaction,
315
+ is_access_constrained_by_sql_firewall=self.is_access_constrained_by_sql_firewall,
316
+ is_access_constrained_by_view=self.is_access_constrained_by_view,
317
+ is_access_constrained_by_virtual_private_database=self.is_access_constrained_by_virtual_private_database,
318
+ is_sensitive=self.is_sensitive,
319
+ key=self.key,
320
+ privilege=self.privilege,
321
+ privilege_grantable=self.privilege_grantable,
322
+ privilege_type=self.privilege_type,
323
+ security_policy_report_id=self.security_policy_report_id,
324
+ table_name=self.table_name,
325
+ table_schema=self.table_schema,
326
+ target_id=self.target_id)
327
+
328
+
329
+ def get_security_policy_report_database_table_access_entry(database_table_access_entry_key: Optional[str] = None,
330
+ security_policy_report_id: Optional[str] = None,
331
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecurityPolicyReportDatabaseTableAccessEntryResult:
332
+ """
333
+ This data source provides details about a specific Security Policy Report Database Table Access Entry resource in Oracle Cloud Infrastructure Data Safe service.
334
+
335
+ Gets a database table access entry object by identifier.
336
+
337
+ ## Example Usage
338
+
339
+ ```python
340
+ import pulumi
341
+ import pulumi_oci as oci
342
+
343
+ test_security_policy_report_database_table_access_entry = oci.DataSafe.get_security_policy_report_database_table_access_entry(database_table_access_entry_key=var["security_policy_report_database_table_access_entry_database_table_access_entry_key"],
344
+ security_policy_report_id=oci_data_safe_security_policy_report["test_security_policy_report"]["id"])
345
+ ```
346
+
347
+
348
+ :param str database_table_access_entry_key: The unique key that identifies the table access object. This is a system-generated identifier.
349
+ :param str security_policy_report_id: The OCID of the security policy report resource.
350
+ """
351
+ __args__ = dict()
352
+ __args__['databaseTableAccessEntryKey'] = database_table_access_entry_key
353
+ __args__['securityPolicyReportId'] = security_policy_report_id
354
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
355
+ __ret__ = pulumi.runtime.invoke('oci:DataSafe/getSecurityPolicyReportDatabaseTableAccessEntry:getSecurityPolicyReportDatabaseTableAccessEntry', __args__, opts=opts, typ=GetSecurityPolicyReportDatabaseTableAccessEntryResult).value
356
+
357
+ return AwaitableGetSecurityPolicyReportDatabaseTableAccessEntryResult(
358
+ access_through_object=pulumi.get(__ret__, 'access_through_object'),
359
+ access_type=pulumi.get(__ret__, 'access_type'),
360
+ are_all_tables_accessible=pulumi.get(__ret__, 'are_all_tables_accessible'),
361
+ column_name=pulumi.get(__ret__, 'column_name'),
362
+ database_table_access_entry_key=pulumi.get(__ret__, 'database_table_access_entry_key'),
363
+ grant_from_role=pulumi.get(__ret__, 'grant_from_role'),
364
+ grantee=pulumi.get(__ret__, 'grantee'),
365
+ grantor=pulumi.get(__ret__, 'grantor'),
366
+ id=pulumi.get(__ret__, 'id'),
367
+ is_access_constrained_by_database_vault=pulumi.get(__ret__, 'is_access_constrained_by_database_vault'),
368
+ is_access_constrained_by_label_security=pulumi.get(__ret__, 'is_access_constrained_by_label_security'),
369
+ is_access_constrained_by_real_application_security=pulumi.get(__ret__, 'is_access_constrained_by_real_application_security'),
370
+ is_access_constrained_by_redaction=pulumi.get(__ret__, 'is_access_constrained_by_redaction'),
371
+ is_access_constrained_by_sql_firewall=pulumi.get(__ret__, 'is_access_constrained_by_sql_firewall'),
372
+ is_access_constrained_by_view=pulumi.get(__ret__, 'is_access_constrained_by_view'),
373
+ is_access_constrained_by_virtual_private_database=pulumi.get(__ret__, 'is_access_constrained_by_virtual_private_database'),
374
+ is_sensitive=pulumi.get(__ret__, 'is_sensitive'),
375
+ key=pulumi.get(__ret__, 'key'),
376
+ privilege=pulumi.get(__ret__, 'privilege'),
377
+ privilege_grantable=pulumi.get(__ret__, 'privilege_grantable'),
378
+ privilege_type=pulumi.get(__ret__, 'privilege_type'),
379
+ security_policy_report_id=pulumi.get(__ret__, 'security_policy_report_id'),
380
+ table_name=pulumi.get(__ret__, 'table_name'),
381
+ table_schema=pulumi.get(__ret__, 'table_schema'),
382
+ target_id=pulumi.get(__ret__, 'target_id'))
383
+
384
+
385
+ @_utilities.lift_output_func(get_security_policy_report_database_table_access_entry)
386
+ def get_security_policy_report_database_table_access_entry_output(database_table_access_entry_key: Optional[pulumi.Input[str]] = None,
387
+ security_policy_report_id: Optional[pulumi.Input[str]] = None,
388
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecurityPolicyReportDatabaseTableAccessEntryResult]:
389
+ """
390
+ This data source provides details about a specific Security Policy Report Database Table Access Entry resource in Oracle Cloud Infrastructure Data Safe service.
391
+
392
+ Gets a database table access entry object by identifier.
393
+
394
+ ## Example Usage
395
+
396
+ ```python
397
+ import pulumi
398
+ import pulumi_oci as oci
399
+
400
+ test_security_policy_report_database_table_access_entry = oci.DataSafe.get_security_policy_report_database_table_access_entry(database_table_access_entry_key=var["security_policy_report_database_table_access_entry_database_table_access_entry_key"],
401
+ security_policy_report_id=oci_data_safe_security_policy_report["test_security_policy_report"]["id"])
402
+ ```
403
+
404
+
405
+ :param str database_table_access_entry_key: The unique key that identifies the table access object. This is a system-generated identifier.
406
+ :param str security_policy_report_id: The OCID of the security policy report resource.
407
+ """
408
+ ...
@@ -0,0 +1,178 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import pulumi
8
+ import pulumi.runtime
9
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
10
+ from .. import _utilities
11
+ from . import outputs
12
+ from ._inputs import *
13
+
14
+ __all__ = [
15
+ 'GetSecurityPolicyReportDatabaseViewAccessEntriesResult',
16
+ 'AwaitableGetSecurityPolicyReportDatabaseViewAccessEntriesResult',
17
+ 'get_security_policy_report_database_view_access_entries',
18
+ 'get_security_policy_report_database_view_access_entries_output',
19
+ ]
20
+
21
+ @pulumi.output_type
22
+ class GetSecurityPolicyReportDatabaseViewAccessEntriesResult:
23
+ """
24
+ A collection of values returned by getSecurityPolicyReportDatabaseViewAccessEntries.
25
+ """
26
+ def __init__(__self__, database_view_access_entry_collections=None, filters=None, id=None, scim_query=None, security_policy_report_id=None, target_id=None):
27
+ if database_view_access_entry_collections and not isinstance(database_view_access_entry_collections, list):
28
+ raise TypeError("Expected argument 'database_view_access_entry_collections' to be a list")
29
+ pulumi.set(__self__, "database_view_access_entry_collections", database_view_access_entry_collections)
30
+ if filters and not isinstance(filters, list):
31
+ raise TypeError("Expected argument 'filters' to be a list")
32
+ pulumi.set(__self__, "filters", filters)
33
+ if id and not isinstance(id, str):
34
+ raise TypeError("Expected argument 'id' to be a str")
35
+ pulumi.set(__self__, "id", id)
36
+ if scim_query and not isinstance(scim_query, str):
37
+ raise TypeError("Expected argument 'scim_query' to be a str")
38
+ pulumi.set(__self__, "scim_query", scim_query)
39
+ if security_policy_report_id and not isinstance(security_policy_report_id, str):
40
+ raise TypeError("Expected argument 'security_policy_report_id' to be a str")
41
+ pulumi.set(__self__, "security_policy_report_id", security_policy_report_id)
42
+ if target_id and not isinstance(target_id, str):
43
+ raise TypeError("Expected argument 'target_id' to be a str")
44
+ pulumi.set(__self__, "target_id", target_id)
45
+
46
+ @property
47
+ @pulumi.getter(name="databaseViewAccessEntryCollections")
48
+ def database_view_access_entry_collections(self) -> Sequence['outputs.GetSecurityPolicyReportDatabaseViewAccessEntriesDatabaseViewAccessEntryCollectionResult']:
49
+ """
50
+ The list of database_view_access_entry_collection.
51
+ """
52
+ return pulumi.get(self, "database_view_access_entry_collections")
53
+
54
+ @property
55
+ @pulumi.getter
56
+ def filters(self) -> Optional[Sequence['outputs.GetSecurityPolicyReportDatabaseViewAccessEntriesFilterResult']]:
57
+ return pulumi.get(self, "filters")
58
+
59
+ @property
60
+ @pulumi.getter
61
+ def id(self) -> str:
62
+ """
63
+ The provider-assigned unique ID for this managed resource.
64
+ """
65
+ return pulumi.get(self, "id")
66
+
67
+ @property
68
+ @pulumi.getter(name="scimQuery")
69
+ def scim_query(self) -> Optional[str]:
70
+ return pulumi.get(self, "scim_query")
71
+
72
+ @property
73
+ @pulumi.getter(name="securityPolicyReportId")
74
+ def security_policy_report_id(self) -> str:
75
+ return pulumi.get(self, "security_policy_report_id")
76
+
77
+ @property
78
+ @pulumi.getter(name="targetId")
79
+ def target_id(self) -> Optional[str]:
80
+ """
81
+ The OCID of the of the target database.
82
+ """
83
+ return pulumi.get(self, "target_id")
84
+
85
+
86
+ class AwaitableGetSecurityPolicyReportDatabaseViewAccessEntriesResult(GetSecurityPolicyReportDatabaseViewAccessEntriesResult):
87
+ # pylint: disable=using-constant-test
88
+ def __await__(self):
89
+ if False:
90
+ yield self
91
+ return GetSecurityPolicyReportDatabaseViewAccessEntriesResult(
92
+ database_view_access_entry_collections=self.database_view_access_entry_collections,
93
+ filters=self.filters,
94
+ id=self.id,
95
+ scim_query=self.scim_query,
96
+ security_policy_report_id=self.security_policy_report_id,
97
+ target_id=self.target_id)
98
+
99
+
100
+ def get_security_policy_report_database_view_access_entries(filters: Optional[Sequence[pulumi.InputType['GetSecurityPolicyReportDatabaseViewAccessEntriesFilterArgs']]] = None,
101
+ scim_query: Optional[str] = None,
102
+ security_policy_report_id: Optional[str] = None,
103
+ target_id: Optional[str] = None,
104
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecurityPolicyReportDatabaseViewAccessEntriesResult:
105
+ """
106
+ This data source provides the list of Security Policy Report Database View Access Entries in Oracle Cloud Infrastructure Data Safe service.
107
+
108
+ Retrieves a list of all database view access entries in Data Safe.
109
+
110
+ The ListDatabaseViewAccessEntries operation returns only the database view access objects for the specified security policy report.
111
+
112
+ ## Example Usage
113
+
114
+ ```python
115
+ import pulumi
116
+ import pulumi_oci as oci
117
+
118
+ test_security_policy_report_database_view_access_entries = oci.DataSafe.get_security_policy_report_database_view_access_entries(security_policy_report_id=oci_data_safe_security_policy_report["test_security_policy_report"]["id"],
119
+ scim_query=var["security_policy_report_database_view_access_entry_scim_query"],
120
+ target_id=oci_cloud_guard_target["test_target"]["id"])
121
+ ```
122
+
123
+
124
+ :param str scim_query: The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at [RFC3339](https://tools.ietf.org/html/draft-ietf-scim-api-12). In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
125
+
126
+ **Example:** query=(accessType eq 'SELECT') and (grantee eq 'ADMIN')
127
+ :param str security_policy_report_id: The OCID of the security policy report resource.
128
+ :param str target_id: A filter to return only items related to a specific target OCID.
129
+ """
130
+ __args__ = dict()
131
+ __args__['filters'] = filters
132
+ __args__['scimQuery'] = scim_query
133
+ __args__['securityPolicyReportId'] = security_policy_report_id
134
+ __args__['targetId'] = target_id
135
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
136
+ __ret__ = pulumi.runtime.invoke('oci:DataSafe/getSecurityPolicyReportDatabaseViewAccessEntries:getSecurityPolicyReportDatabaseViewAccessEntries', __args__, opts=opts, typ=GetSecurityPolicyReportDatabaseViewAccessEntriesResult).value
137
+
138
+ return AwaitableGetSecurityPolicyReportDatabaseViewAccessEntriesResult(
139
+ database_view_access_entry_collections=pulumi.get(__ret__, 'database_view_access_entry_collections'),
140
+ filters=pulumi.get(__ret__, 'filters'),
141
+ id=pulumi.get(__ret__, 'id'),
142
+ scim_query=pulumi.get(__ret__, 'scim_query'),
143
+ security_policy_report_id=pulumi.get(__ret__, 'security_policy_report_id'),
144
+ target_id=pulumi.get(__ret__, 'target_id'))
145
+
146
+
147
+ @_utilities.lift_output_func(get_security_policy_report_database_view_access_entries)
148
+ def get_security_policy_report_database_view_access_entries_output(filters: Optional[pulumi.Input[Optional[Sequence[pulumi.InputType['GetSecurityPolicyReportDatabaseViewAccessEntriesFilterArgs']]]]] = None,
149
+ scim_query: Optional[pulumi.Input[Optional[str]]] = None,
150
+ security_policy_report_id: Optional[pulumi.Input[str]] = None,
151
+ target_id: Optional[pulumi.Input[Optional[str]]] = None,
152
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecurityPolicyReportDatabaseViewAccessEntriesResult]:
153
+ """
154
+ This data source provides the list of Security Policy Report Database View Access Entries in Oracle Cloud Infrastructure Data Safe service.
155
+
156
+ Retrieves a list of all database view access entries in Data Safe.
157
+
158
+ The ListDatabaseViewAccessEntries operation returns only the database view access objects for the specified security policy report.
159
+
160
+ ## Example Usage
161
+
162
+ ```python
163
+ import pulumi
164
+ import pulumi_oci as oci
165
+
166
+ test_security_policy_report_database_view_access_entries = oci.DataSafe.get_security_policy_report_database_view_access_entries(security_policy_report_id=oci_data_safe_security_policy_report["test_security_policy_report"]["id"],
167
+ scim_query=var["security_policy_report_database_view_access_entry_scim_query"],
168
+ target_id=oci_cloud_guard_target["test_target"]["id"])
169
+ ```
170
+
171
+
172
+ :param str scim_query: The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at [RFC3339](https://tools.ietf.org/html/draft-ietf-scim-api-12). In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
173
+
174
+ **Example:** query=(accessType eq 'SELECT') and (grantee eq 'ADMIN')
175
+ :param str security_policy_report_id: The OCID of the security policy report resource.
176
+ :param str target_id: A filter to return only items related to a specific target OCID.
177
+ """
178
+ ...