pulumi-oci 1.19.0a1705693078__py3-none-any.whl → 1.20.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_oci/__init__.py +59 -0
- pulumi_oci/adm/_inputs.py +99 -18
- pulumi_oci/adm/get_remediation_run_application_dependency_recommendations.py +23 -3
- pulumi_oci/adm/get_vulnerability_audit.py +31 -5
- pulumi_oci/adm/get_vulnerability_audit_application_dependency_vulnerabilities.py +43 -6
- pulumi_oci/adm/get_vulnerability_audit_application_dependency_vulnerability.py +27 -1
- pulumi_oci/adm/get_vulnerability_audits.py +54 -3
- pulumi_oci/adm/outputs.py +296 -31
- pulumi_oci/adm/remediation_recipe.py +2 -0
- pulumi_oci/adm/vulnerability_audit.py +96 -37
- pulumi_oci/database/__init__.py +1 -0
- pulumi_oci/database/_inputs.py +40 -0
- pulumi_oci/database/cloud_vm_cluster.py +22 -1
- pulumi_oci/database/get_system_versions.py +173 -0
- pulumi_oci/database/outputs.py +88 -0
- pulumi_oci/database/vm_cluster.py +22 -1
- pulumi_oci/datasafe/__init__.py +22 -0
- pulumi_oci/datasafe/_inputs.py +1826 -161
- pulumi_oci/datasafe/audit_trail.py +140 -0
- pulumi_oci/datasafe/discovery_mod.py +7 -7
- pulumi_oci/datasafe/get_audit_trail.py +66 -1
- pulumi_oci/datasafe/get_discovery_job.py +1 -1
- pulumi_oci/datasafe/get_discovery_jobs_result.py +1 -1
- pulumi_oci/datasafe/get_discovery_jobs_results.py +1 -1
- pulumi_oci/datasafe/get_masking_policies_masking_column.py +1 -1
- pulumi_oci/datasafe/get_masking_policies_masking_columns.py +1 -1
- pulumi_oci/datasafe/get_masking_policy.py +1 -1
- pulumi_oci/datasafe/get_report.py +1 -1
- pulumi_oci/datasafe/get_security_assessment.py +3 -3
- pulumi_oci/datasafe/get_security_assessment_comparison.py +5 -5
- pulumi_oci/datasafe/get_security_assessment_finding.py +29 -3
- pulumi_oci/datasafe/get_security_assessment_finding_analytics.py +276 -0
- pulumi_oci/datasafe/get_security_assessment_findings.py +43 -7
- pulumi_oci/datasafe/get_security_assessment_findings_change_audit_logs.py +309 -0
- pulumi_oci/datasafe/get_security_assessment_security_feature_analytics.py +198 -0
- pulumi_oci/datasafe/get_security_assessment_security_features.py +377 -0
- pulumi_oci/datasafe/get_security_assessments.py +2 -2
- pulumi_oci/datasafe/get_security_policies.py +253 -0
- pulumi_oci/datasafe/get_security_policy.py +235 -0
- pulumi_oci/datasafe/get_security_policy_deployment.py +261 -0
- pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_state.py +165 -0
- pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_states.py +180 -0
- pulumi_oci/datasafe/get_security_policy_deployments.py +293 -0
- pulumi_oci/datasafe/get_security_policy_report.py +248 -0
- pulumi_oci/datasafe/get_security_policy_report_database_table_access_entries.py +158 -0
- pulumi_oci/datasafe/get_security_policy_report_database_table_access_entry.py +408 -0
- pulumi_oci/datasafe/get_security_policy_report_database_view_access_entries.py +178 -0
- pulumi_oci/datasafe/get_security_policy_report_database_view_access_entry.py +382 -0
- pulumi_oci/datasafe/get_security_policy_report_role_grant_paths.py +177 -0
- pulumi_oci/datasafe/get_security_policy_reports.py +273 -0
- pulumi_oci/datasafe/get_sensitive_data_model.py +1 -1
- pulumi_oci/datasafe/get_target_database.py +27 -4
- pulumi_oci/datasafe/get_target_database_peer_target_database.py +263 -0
- pulumi_oci/datasafe/get_target_database_peer_target_databases.py +133 -0
- pulumi_oci/datasafe/get_target_databases.py +1 -1
- pulumi_oci/datasafe/get_user_assessment.py +5 -5
- pulumi_oci/datasafe/get_user_assessment_comparison.py +2 -2
- pulumi_oci/datasafe/get_user_assessment_user_access_analytics.py +133 -0
- pulumi_oci/datasafe/get_user_assessment_user_analytics.py +2 -2
- pulumi_oci/datasafe/get_user_assessment_users.py +42 -2
- pulumi_oci/datasafe/get_user_assessments.py +2 -2
- pulumi_oci/datasafe/masking_policies_masking_column.py +7 -7
- pulumi_oci/datasafe/masking_policy.py +9 -9
- pulumi_oci/datasafe/outputs.py +16686 -9777
- pulumi_oci/datasafe/report.py +559 -0
- pulumi_oci/datasafe/security_assessment.py +12 -12
- pulumi_oci/datasafe/sensitive_data_model.py +7 -7
- pulumi_oci/datasafe/set_security_assessment_baseline.py +7 -7
- pulumi_oci/datasafe/set_user_assessment_baseline.py +7 -7
- pulumi_oci/datasafe/target_database.py +146 -25
- pulumi_oci/datasafe/target_database_peer_target_database.py +634 -0
- pulumi_oci/datasafe/user_assessment.py +20 -20
- pulumi_oci/generativeai/__init__.py +18 -0
- pulumi_oci/generativeai/_inputs.py +534 -0
- pulumi_oci/generativeai/dedicated_ai_cluster.py +808 -0
- pulumi_oci/generativeai/endpoint.py +717 -0
- pulumi_oci/generativeai/get_dedicated_ai_cluster.py +288 -0
- pulumi_oci/generativeai/get_dedicated_ai_clusters.py +183 -0
- pulumi_oci/generativeai/get_endpoint.py +275 -0
- pulumi_oci/generativeai/get_endpoints.py +183 -0
- pulumi_oci/generativeai/get_model.py +353 -0
- pulumi_oci/generativeai/get_models.py +220 -0
- pulumi_oci/generativeai/model.py +858 -0
- pulumi_oci/generativeai/outputs.py +1721 -0
- pulumi_oci/marketplace/get_publication.py +14 -1
- pulumi_oci/marketplace/outputs.py +11 -0
- pulumi_oci/marketplace/publication.py +28 -0
- pulumi_oci/monitoring/__init__.py +3 -0
- pulumi_oci/monitoring/_inputs.py +82 -4
- pulumi_oci/monitoring/alarm.py +15 -15
- pulumi_oci/monitoring/alarm_suppression.py +745 -0
- pulumi_oci/monitoring/get_alarm.py +5 -5
- pulumi_oci/monitoring/get_alarm_history_collection.py +4 -4
- pulumi_oci/monitoring/get_alarm_statuses.py +3 -1
- pulumi_oci/monitoring/get_alarm_suppression.py +276 -0
- pulumi_oci/monitoring/get_alarm_suppressions.py +192 -0
- pulumi_oci/monitoring/get_metric_data.py +12 -8
- pulumi_oci/monitoring/get_metrics.py +2 -2
- pulumi_oci/monitoring/outputs.py +355 -50
- pulumi_oci/networkfirewall/_inputs.py +25 -20
- pulumi_oci/networkfirewall/outputs.py +40 -30
- pulumi_oci/stackmonitoring/__init__.py +3 -0
- pulumi_oci/stackmonitoring/_inputs.py +143 -0
- pulumi_oci/stackmonitoring/get_process_set.py +236 -0
- pulumi_oci/stackmonitoring/get_process_sets.py +156 -0
- pulumi_oci/stackmonitoring/outputs.py +422 -0
- pulumi_oci/stackmonitoring/process_set.py +548 -0
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/METADATA +1 -1
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/RECORD +111 -70
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/WHEEL +0 -0
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,408 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import pulumi
|
8
|
+
import pulumi.runtime
|
9
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
10
|
+
from .. import _utilities
|
11
|
+
|
12
|
+
__all__ = [
|
13
|
+
'GetSecurityPolicyReportDatabaseTableAccessEntryResult',
|
14
|
+
'AwaitableGetSecurityPolicyReportDatabaseTableAccessEntryResult',
|
15
|
+
'get_security_policy_report_database_table_access_entry',
|
16
|
+
'get_security_policy_report_database_table_access_entry_output',
|
17
|
+
]
|
18
|
+
|
19
|
+
@pulumi.output_type
|
20
|
+
class GetSecurityPolicyReportDatabaseTableAccessEntryResult:
|
21
|
+
"""
|
22
|
+
A collection of values returned by getSecurityPolicyReportDatabaseTableAccessEntry.
|
23
|
+
"""
|
24
|
+
def __init__(__self__, access_through_object=None, access_type=None, are_all_tables_accessible=None, column_name=None, database_table_access_entry_key=None, grant_from_role=None, grantee=None, grantor=None, id=None, is_access_constrained_by_database_vault=None, is_access_constrained_by_label_security=None, is_access_constrained_by_real_application_security=None, is_access_constrained_by_redaction=None, is_access_constrained_by_sql_firewall=None, is_access_constrained_by_view=None, is_access_constrained_by_virtual_private_database=None, is_sensitive=None, key=None, privilege=None, privilege_grantable=None, privilege_type=None, security_policy_report_id=None, table_name=None, table_schema=None, target_id=None):
|
25
|
+
if access_through_object and not isinstance(access_through_object, str):
|
26
|
+
raise TypeError("Expected argument 'access_through_object' to be a str")
|
27
|
+
pulumi.set(__self__, "access_through_object", access_through_object)
|
28
|
+
if access_type and not isinstance(access_type, str):
|
29
|
+
raise TypeError("Expected argument 'access_type' to be a str")
|
30
|
+
pulumi.set(__self__, "access_type", access_type)
|
31
|
+
if are_all_tables_accessible and not isinstance(are_all_tables_accessible, bool):
|
32
|
+
raise TypeError("Expected argument 'are_all_tables_accessible' to be a bool")
|
33
|
+
pulumi.set(__self__, "are_all_tables_accessible", are_all_tables_accessible)
|
34
|
+
if column_name and not isinstance(column_name, str):
|
35
|
+
raise TypeError("Expected argument 'column_name' to be a str")
|
36
|
+
pulumi.set(__self__, "column_name", column_name)
|
37
|
+
if database_table_access_entry_key and not isinstance(database_table_access_entry_key, str):
|
38
|
+
raise TypeError("Expected argument 'database_table_access_entry_key' to be a str")
|
39
|
+
pulumi.set(__self__, "database_table_access_entry_key", database_table_access_entry_key)
|
40
|
+
if grant_from_role and not isinstance(grant_from_role, str):
|
41
|
+
raise TypeError("Expected argument 'grant_from_role' to be a str")
|
42
|
+
pulumi.set(__self__, "grant_from_role", grant_from_role)
|
43
|
+
if grantee and not isinstance(grantee, str):
|
44
|
+
raise TypeError("Expected argument 'grantee' to be a str")
|
45
|
+
pulumi.set(__self__, "grantee", grantee)
|
46
|
+
if grantor and not isinstance(grantor, str):
|
47
|
+
raise TypeError("Expected argument 'grantor' to be a str")
|
48
|
+
pulumi.set(__self__, "grantor", grantor)
|
49
|
+
if id and not isinstance(id, str):
|
50
|
+
raise TypeError("Expected argument 'id' to be a str")
|
51
|
+
pulumi.set(__self__, "id", id)
|
52
|
+
if is_access_constrained_by_database_vault and not isinstance(is_access_constrained_by_database_vault, bool):
|
53
|
+
raise TypeError("Expected argument 'is_access_constrained_by_database_vault' to be a bool")
|
54
|
+
pulumi.set(__self__, "is_access_constrained_by_database_vault", is_access_constrained_by_database_vault)
|
55
|
+
if is_access_constrained_by_label_security and not isinstance(is_access_constrained_by_label_security, bool):
|
56
|
+
raise TypeError("Expected argument 'is_access_constrained_by_label_security' to be a bool")
|
57
|
+
pulumi.set(__self__, "is_access_constrained_by_label_security", is_access_constrained_by_label_security)
|
58
|
+
if is_access_constrained_by_real_application_security and not isinstance(is_access_constrained_by_real_application_security, bool):
|
59
|
+
raise TypeError("Expected argument 'is_access_constrained_by_real_application_security' to be a bool")
|
60
|
+
pulumi.set(__self__, "is_access_constrained_by_real_application_security", is_access_constrained_by_real_application_security)
|
61
|
+
if is_access_constrained_by_redaction and not isinstance(is_access_constrained_by_redaction, bool):
|
62
|
+
raise TypeError("Expected argument 'is_access_constrained_by_redaction' to be a bool")
|
63
|
+
pulumi.set(__self__, "is_access_constrained_by_redaction", is_access_constrained_by_redaction)
|
64
|
+
if is_access_constrained_by_sql_firewall and not isinstance(is_access_constrained_by_sql_firewall, bool):
|
65
|
+
raise TypeError("Expected argument 'is_access_constrained_by_sql_firewall' to be a bool")
|
66
|
+
pulumi.set(__self__, "is_access_constrained_by_sql_firewall", is_access_constrained_by_sql_firewall)
|
67
|
+
if is_access_constrained_by_view and not isinstance(is_access_constrained_by_view, bool):
|
68
|
+
raise TypeError("Expected argument 'is_access_constrained_by_view' to be a bool")
|
69
|
+
pulumi.set(__self__, "is_access_constrained_by_view", is_access_constrained_by_view)
|
70
|
+
if is_access_constrained_by_virtual_private_database and not isinstance(is_access_constrained_by_virtual_private_database, bool):
|
71
|
+
raise TypeError("Expected argument 'is_access_constrained_by_virtual_private_database' to be a bool")
|
72
|
+
pulumi.set(__self__, "is_access_constrained_by_virtual_private_database", is_access_constrained_by_virtual_private_database)
|
73
|
+
if is_sensitive and not isinstance(is_sensitive, bool):
|
74
|
+
raise TypeError("Expected argument 'is_sensitive' to be a bool")
|
75
|
+
pulumi.set(__self__, "is_sensitive", is_sensitive)
|
76
|
+
if key and not isinstance(key, str):
|
77
|
+
raise TypeError("Expected argument 'key' to be a str")
|
78
|
+
pulumi.set(__self__, "key", key)
|
79
|
+
if privilege and not isinstance(privilege, str):
|
80
|
+
raise TypeError("Expected argument 'privilege' to be a str")
|
81
|
+
pulumi.set(__self__, "privilege", privilege)
|
82
|
+
if privilege_grantable and not isinstance(privilege_grantable, str):
|
83
|
+
raise TypeError("Expected argument 'privilege_grantable' to be a str")
|
84
|
+
pulumi.set(__self__, "privilege_grantable", privilege_grantable)
|
85
|
+
if privilege_type and not isinstance(privilege_type, str):
|
86
|
+
raise TypeError("Expected argument 'privilege_type' to be a str")
|
87
|
+
pulumi.set(__self__, "privilege_type", privilege_type)
|
88
|
+
if security_policy_report_id and not isinstance(security_policy_report_id, str):
|
89
|
+
raise TypeError("Expected argument 'security_policy_report_id' to be a str")
|
90
|
+
pulumi.set(__self__, "security_policy_report_id", security_policy_report_id)
|
91
|
+
if table_name and not isinstance(table_name, str):
|
92
|
+
raise TypeError("Expected argument 'table_name' to be a str")
|
93
|
+
pulumi.set(__self__, "table_name", table_name)
|
94
|
+
if table_schema and not isinstance(table_schema, str):
|
95
|
+
raise TypeError("Expected argument 'table_schema' to be a str")
|
96
|
+
pulumi.set(__self__, "table_schema", table_schema)
|
97
|
+
if target_id and not isinstance(target_id, str):
|
98
|
+
raise TypeError("Expected argument 'target_id' to be a str")
|
99
|
+
pulumi.set(__self__, "target_id", target_id)
|
100
|
+
|
101
|
+
@property
|
102
|
+
@pulumi.getter(name="accessThroughObject")
|
103
|
+
def access_through_object(self) -> str:
|
104
|
+
"""
|
105
|
+
A non-null value in this field indicates the object through which user has access to table, possible values could be table or view.
|
106
|
+
"""
|
107
|
+
return pulumi.get(self, "access_through_object")
|
108
|
+
|
109
|
+
@property
|
110
|
+
@pulumi.getter(name="accessType")
|
111
|
+
def access_type(self) -> str:
|
112
|
+
"""
|
113
|
+
The type of the access the user has on the table, there can be one or more from SELECT, UPDATE, INSERT, OWNER or DELETE.
|
114
|
+
"""
|
115
|
+
return pulumi.get(self, "access_type")
|
116
|
+
|
117
|
+
@property
|
118
|
+
@pulumi.getter(name="areAllTablesAccessible")
|
119
|
+
def are_all_tables_accessible(self) -> bool:
|
120
|
+
"""
|
121
|
+
Indicates whether the user has access to all the tables in the schema.
|
122
|
+
"""
|
123
|
+
return pulumi.get(self, "are_all_tables_accessible")
|
124
|
+
|
125
|
+
@property
|
126
|
+
@pulumi.getter(name="columnName")
|
127
|
+
def column_name(self) -> str:
|
128
|
+
"""
|
129
|
+
If there are column level privileges on a table or view.
|
130
|
+
"""
|
131
|
+
return pulumi.get(self, "column_name")
|
132
|
+
|
133
|
+
@property
|
134
|
+
@pulumi.getter(name="databaseTableAccessEntryKey")
|
135
|
+
def database_table_access_entry_key(self) -> str:
|
136
|
+
return pulumi.get(self, "database_table_access_entry_key")
|
137
|
+
|
138
|
+
@property
|
139
|
+
@pulumi.getter(name="grantFromRole")
|
140
|
+
def grant_from_role(self) -> str:
|
141
|
+
"""
|
142
|
+
This can be empty in case of direct grant, in case of indirect grant, this attribute displays the name of the role which is granted to the user though which the user has access to the table.
|
143
|
+
"""
|
144
|
+
return pulumi.get(self, "grant_from_role")
|
145
|
+
|
146
|
+
@property
|
147
|
+
@pulumi.getter
|
148
|
+
def grantee(self) -> str:
|
149
|
+
"""
|
150
|
+
Grantee is the user who can access the table
|
151
|
+
"""
|
152
|
+
return pulumi.get(self, "grantee")
|
153
|
+
|
154
|
+
@property
|
155
|
+
@pulumi.getter
|
156
|
+
def grantor(self) -> str:
|
157
|
+
"""
|
158
|
+
The one who granted this privilege.
|
159
|
+
"""
|
160
|
+
return pulumi.get(self, "grantor")
|
161
|
+
|
162
|
+
@property
|
163
|
+
@pulumi.getter
|
164
|
+
def id(self) -> str:
|
165
|
+
"""
|
166
|
+
The provider-assigned unique ID for this managed resource.
|
167
|
+
"""
|
168
|
+
return pulumi.get(self, "id")
|
169
|
+
|
170
|
+
@property
|
171
|
+
@pulumi.getter(name="isAccessConstrainedByDatabaseVault")
|
172
|
+
def is_access_constrained_by_database_vault(self) -> bool:
|
173
|
+
"""
|
174
|
+
Indicates whether the table access is constrained via Oracle Database Vault.
|
175
|
+
"""
|
176
|
+
return pulumi.get(self, "is_access_constrained_by_database_vault")
|
177
|
+
|
178
|
+
@property
|
179
|
+
@pulumi.getter(name="isAccessConstrainedByLabelSecurity")
|
180
|
+
def is_access_constrained_by_label_security(self) -> bool:
|
181
|
+
"""
|
182
|
+
Indicates whether the table access is constrained via Oracle Label Security.
|
183
|
+
"""
|
184
|
+
return pulumi.get(self, "is_access_constrained_by_label_security")
|
185
|
+
|
186
|
+
@property
|
187
|
+
@pulumi.getter(name="isAccessConstrainedByRealApplicationSecurity")
|
188
|
+
def is_access_constrained_by_real_application_security(self) -> bool:
|
189
|
+
"""
|
190
|
+
Indicates whether the table access is constrained via Real Application Security.
|
191
|
+
"""
|
192
|
+
return pulumi.get(self, "is_access_constrained_by_real_application_security")
|
193
|
+
|
194
|
+
@property
|
195
|
+
@pulumi.getter(name="isAccessConstrainedByRedaction")
|
196
|
+
def is_access_constrained_by_redaction(self) -> bool:
|
197
|
+
"""
|
198
|
+
Indicates whether the table access is constrained via Oracle Data Redaction.
|
199
|
+
"""
|
200
|
+
return pulumi.get(self, "is_access_constrained_by_redaction")
|
201
|
+
|
202
|
+
@property
|
203
|
+
@pulumi.getter(name="isAccessConstrainedBySqlFirewall")
|
204
|
+
def is_access_constrained_by_sql_firewall(self) -> bool:
|
205
|
+
"""
|
206
|
+
Indicates whether the table access is constrained via Oracle Database SQL Firewall.
|
207
|
+
"""
|
208
|
+
return pulumi.get(self, "is_access_constrained_by_sql_firewall")
|
209
|
+
|
210
|
+
@property
|
211
|
+
@pulumi.getter(name="isAccessConstrainedByView")
|
212
|
+
def is_access_constrained_by_view(self) -> bool:
|
213
|
+
"""
|
214
|
+
Indicates whether the access is constrained on a table via a view.
|
215
|
+
"""
|
216
|
+
return pulumi.get(self, "is_access_constrained_by_view")
|
217
|
+
|
218
|
+
@property
|
219
|
+
@pulumi.getter(name="isAccessConstrainedByVirtualPrivateDatabase")
|
220
|
+
def is_access_constrained_by_virtual_private_database(self) -> bool:
|
221
|
+
"""
|
222
|
+
Indicates whether the table access is constrained via Virtual Private Database.
|
223
|
+
"""
|
224
|
+
return pulumi.get(self, "is_access_constrained_by_virtual_private_database")
|
225
|
+
|
226
|
+
@property
|
227
|
+
@pulumi.getter(name="isSensitive")
|
228
|
+
def is_sensitive(self) -> bool:
|
229
|
+
"""
|
230
|
+
Indicates whether the table is marked as sensitive.
|
231
|
+
"""
|
232
|
+
return pulumi.get(self, "is_sensitive")
|
233
|
+
|
234
|
+
@property
|
235
|
+
@pulumi.getter
|
236
|
+
def key(self) -> str:
|
237
|
+
"""
|
238
|
+
The unique key that identifies the table access report. It is numeric and unique within a security policy report.
|
239
|
+
"""
|
240
|
+
return pulumi.get(self, "key")
|
241
|
+
|
242
|
+
@property
|
243
|
+
@pulumi.getter
|
244
|
+
def privilege(self) -> str:
|
245
|
+
"""
|
246
|
+
Name of the privilege.
|
247
|
+
"""
|
248
|
+
return pulumi.get(self, "privilege")
|
249
|
+
|
250
|
+
@property
|
251
|
+
@pulumi.getter(name="privilegeGrantable")
|
252
|
+
def privilege_grantable(self) -> str:
|
253
|
+
"""
|
254
|
+
Indicates whether the grantee can grant this privilege to other users. Privileges can be granted to a user or role with GRANT_OPTION or ADMIN_OPTION
|
255
|
+
"""
|
256
|
+
return pulumi.get(self, "privilege_grantable")
|
257
|
+
|
258
|
+
@property
|
259
|
+
@pulumi.getter(name="privilegeType")
|
260
|
+
def privilege_type(self) -> str:
|
261
|
+
"""
|
262
|
+
Type of the privilege user has, this includes System Privilege, Schema Privilege, Object Privilege, Column Privilege, Owner or Schema Privilege on a schema.
|
263
|
+
"""
|
264
|
+
return pulumi.get(self, "privilege_type")
|
265
|
+
|
266
|
+
@property
|
267
|
+
@pulumi.getter(name="securityPolicyReportId")
|
268
|
+
def security_policy_report_id(self) -> str:
|
269
|
+
return pulumi.get(self, "security_policy_report_id")
|
270
|
+
|
271
|
+
@property
|
272
|
+
@pulumi.getter(name="tableName")
|
273
|
+
def table_name(self) -> str:
|
274
|
+
"""
|
275
|
+
The name of the database table the user has access to.
|
276
|
+
"""
|
277
|
+
return pulumi.get(self, "table_name")
|
278
|
+
|
279
|
+
@property
|
280
|
+
@pulumi.getter(name="tableSchema")
|
281
|
+
def table_schema(self) -> str:
|
282
|
+
"""
|
283
|
+
The name of the schema the table belongs to.
|
284
|
+
"""
|
285
|
+
return pulumi.get(self, "table_schema")
|
286
|
+
|
287
|
+
@property
|
288
|
+
@pulumi.getter(name="targetId")
|
289
|
+
def target_id(self) -> str:
|
290
|
+
"""
|
291
|
+
The OCID of the of the target database.
|
292
|
+
"""
|
293
|
+
return pulumi.get(self, "target_id")
|
294
|
+
|
295
|
+
|
296
|
+
class AwaitableGetSecurityPolicyReportDatabaseTableAccessEntryResult(GetSecurityPolicyReportDatabaseTableAccessEntryResult):
|
297
|
+
# pylint: disable=using-constant-test
|
298
|
+
def __await__(self):
|
299
|
+
if False:
|
300
|
+
yield self
|
301
|
+
return GetSecurityPolicyReportDatabaseTableAccessEntryResult(
|
302
|
+
access_through_object=self.access_through_object,
|
303
|
+
access_type=self.access_type,
|
304
|
+
are_all_tables_accessible=self.are_all_tables_accessible,
|
305
|
+
column_name=self.column_name,
|
306
|
+
database_table_access_entry_key=self.database_table_access_entry_key,
|
307
|
+
grant_from_role=self.grant_from_role,
|
308
|
+
grantee=self.grantee,
|
309
|
+
grantor=self.grantor,
|
310
|
+
id=self.id,
|
311
|
+
is_access_constrained_by_database_vault=self.is_access_constrained_by_database_vault,
|
312
|
+
is_access_constrained_by_label_security=self.is_access_constrained_by_label_security,
|
313
|
+
is_access_constrained_by_real_application_security=self.is_access_constrained_by_real_application_security,
|
314
|
+
is_access_constrained_by_redaction=self.is_access_constrained_by_redaction,
|
315
|
+
is_access_constrained_by_sql_firewall=self.is_access_constrained_by_sql_firewall,
|
316
|
+
is_access_constrained_by_view=self.is_access_constrained_by_view,
|
317
|
+
is_access_constrained_by_virtual_private_database=self.is_access_constrained_by_virtual_private_database,
|
318
|
+
is_sensitive=self.is_sensitive,
|
319
|
+
key=self.key,
|
320
|
+
privilege=self.privilege,
|
321
|
+
privilege_grantable=self.privilege_grantable,
|
322
|
+
privilege_type=self.privilege_type,
|
323
|
+
security_policy_report_id=self.security_policy_report_id,
|
324
|
+
table_name=self.table_name,
|
325
|
+
table_schema=self.table_schema,
|
326
|
+
target_id=self.target_id)
|
327
|
+
|
328
|
+
|
329
|
+
def get_security_policy_report_database_table_access_entry(database_table_access_entry_key: Optional[str] = None,
|
330
|
+
security_policy_report_id: Optional[str] = None,
|
331
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecurityPolicyReportDatabaseTableAccessEntryResult:
|
332
|
+
"""
|
333
|
+
This data source provides details about a specific Security Policy Report Database Table Access Entry resource in Oracle Cloud Infrastructure Data Safe service.
|
334
|
+
|
335
|
+
Gets a database table access entry object by identifier.
|
336
|
+
|
337
|
+
## Example Usage
|
338
|
+
|
339
|
+
```python
|
340
|
+
import pulumi
|
341
|
+
import pulumi_oci as oci
|
342
|
+
|
343
|
+
test_security_policy_report_database_table_access_entry = oci.DataSafe.get_security_policy_report_database_table_access_entry(database_table_access_entry_key=var["security_policy_report_database_table_access_entry_database_table_access_entry_key"],
|
344
|
+
security_policy_report_id=oci_data_safe_security_policy_report["test_security_policy_report"]["id"])
|
345
|
+
```
|
346
|
+
|
347
|
+
|
348
|
+
:param str database_table_access_entry_key: The unique key that identifies the table access object. This is a system-generated identifier.
|
349
|
+
:param str security_policy_report_id: The OCID of the security policy report resource.
|
350
|
+
"""
|
351
|
+
__args__ = dict()
|
352
|
+
__args__['databaseTableAccessEntryKey'] = database_table_access_entry_key
|
353
|
+
__args__['securityPolicyReportId'] = security_policy_report_id
|
354
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
355
|
+
__ret__ = pulumi.runtime.invoke('oci:DataSafe/getSecurityPolicyReportDatabaseTableAccessEntry:getSecurityPolicyReportDatabaseTableAccessEntry', __args__, opts=opts, typ=GetSecurityPolicyReportDatabaseTableAccessEntryResult).value
|
356
|
+
|
357
|
+
return AwaitableGetSecurityPolicyReportDatabaseTableAccessEntryResult(
|
358
|
+
access_through_object=pulumi.get(__ret__, 'access_through_object'),
|
359
|
+
access_type=pulumi.get(__ret__, 'access_type'),
|
360
|
+
are_all_tables_accessible=pulumi.get(__ret__, 'are_all_tables_accessible'),
|
361
|
+
column_name=pulumi.get(__ret__, 'column_name'),
|
362
|
+
database_table_access_entry_key=pulumi.get(__ret__, 'database_table_access_entry_key'),
|
363
|
+
grant_from_role=pulumi.get(__ret__, 'grant_from_role'),
|
364
|
+
grantee=pulumi.get(__ret__, 'grantee'),
|
365
|
+
grantor=pulumi.get(__ret__, 'grantor'),
|
366
|
+
id=pulumi.get(__ret__, 'id'),
|
367
|
+
is_access_constrained_by_database_vault=pulumi.get(__ret__, 'is_access_constrained_by_database_vault'),
|
368
|
+
is_access_constrained_by_label_security=pulumi.get(__ret__, 'is_access_constrained_by_label_security'),
|
369
|
+
is_access_constrained_by_real_application_security=pulumi.get(__ret__, 'is_access_constrained_by_real_application_security'),
|
370
|
+
is_access_constrained_by_redaction=pulumi.get(__ret__, 'is_access_constrained_by_redaction'),
|
371
|
+
is_access_constrained_by_sql_firewall=pulumi.get(__ret__, 'is_access_constrained_by_sql_firewall'),
|
372
|
+
is_access_constrained_by_view=pulumi.get(__ret__, 'is_access_constrained_by_view'),
|
373
|
+
is_access_constrained_by_virtual_private_database=pulumi.get(__ret__, 'is_access_constrained_by_virtual_private_database'),
|
374
|
+
is_sensitive=pulumi.get(__ret__, 'is_sensitive'),
|
375
|
+
key=pulumi.get(__ret__, 'key'),
|
376
|
+
privilege=pulumi.get(__ret__, 'privilege'),
|
377
|
+
privilege_grantable=pulumi.get(__ret__, 'privilege_grantable'),
|
378
|
+
privilege_type=pulumi.get(__ret__, 'privilege_type'),
|
379
|
+
security_policy_report_id=pulumi.get(__ret__, 'security_policy_report_id'),
|
380
|
+
table_name=pulumi.get(__ret__, 'table_name'),
|
381
|
+
table_schema=pulumi.get(__ret__, 'table_schema'),
|
382
|
+
target_id=pulumi.get(__ret__, 'target_id'))
|
383
|
+
|
384
|
+
|
385
|
+
@_utilities.lift_output_func(get_security_policy_report_database_table_access_entry)
|
386
|
+
def get_security_policy_report_database_table_access_entry_output(database_table_access_entry_key: Optional[pulumi.Input[str]] = None,
|
387
|
+
security_policy_report_id: Optional[pulumi.Input[str]] = None,
|
388
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecurityPolicyReportDatabaseTableAccessEntryResult]:
|
389
|
+
"""
|
390
|
+
This data source provides details about a specific Security Policy Report Database Table Access Entry resource in Oracle Cloud Infrastructure Data Safe service.
|
391
|
+
|
392
|
+
Gets a database table access entry object by identifier.
|
393
|
+
|
394
|
+
## Example Usage
|
395
|
+
|
396
|
+
```python
|
397
|
+
import pulumi
|
398
|
+
import pulumi_oci as oci
|
399
|
+
|
400
|
+
test_security_policy_report_database_table_access_entry = oci.DataSafe.get_security_policy_report_database_table_access_entry(database_table_access_entry_key=var["security_policy_report_database_table_access_entry_database_table_access_entry_key"],
|
401
|
+
security_policy_report_id=oci_data_safe_security_policy_report["test_security_policy_report"]["id"])
|
402
|
+
```
|
403
|
+
|
404
|
+
|
405
|
+
:param str database_table_access_entry_key: The unique key that identifies the table access object. This is a system-generated identifier.
|
406
|
+
:param str security_policy_report_id: The OCID of the security policy report resource.
|
407
|
+
"""
|
408
|
+
...
|
@@ -0,0 +1,178 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import pulumi
|
8
|
+
import pulumi.runtime
|
9
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
10
|
+
from .. import _utilities
|
11
|
+
from . import outputs
|
12
|
+
from ._inputs import *
|
13
|
+
|
14
|
+
__all__ = [
|
15
|
+
'GetSecurityPolicyReportDatabaseViewAccessEntriesResult',
|
16
|
+
'AwaitableGetSecurityPolicyReportDatabaseViewAccessEntriesResult',
|
17
|
+
'get_security_policy_report_database_view_access_entries',
|
18
|
+
'get_security_policy_report_database_view_access_entries_output',
|
19
|
+
]
|
20
|
+
|
21
|
+
@pulumi.output_type
|
22
|
+
class GetSecurityPolicyReportDatabaseViewAccessEntriesResult:
|
23
|
+
"""
|
24
|
+
A collection of values returned by getSecurityPolicyReportDatabaseViewAccessEntries.
|
25
|
+
"""
|
26
|
+
def __init__(__self__, database_view_access_entry_collections=None, filters=None, id=None, scim_query=None, security_policy_report_id=None, target_id=None):
|
27
|
+
if database_view_access_entry_collections and not isinstance(database_view_access_entry_collections, list):
|
28
|
+
raise TypeError("Expected argument 'database_view_access_entry_collections' to be a list")
|
29
|
+
pulumi.set(__self__, "database_view_access_entry_collections", database_view_access_entry_collections)
|
30
|
+
if filters and not isinstance(filters, list):
|
31
|
+
raise TypeError("Expected argument 'filters' to be a list")
|
32
|
+
pulumi.set(__self__, "filters", filters)
|
33
|
+
if id and not isinstance(id, str):
|
34
|
+
raise TypeError("Expected argument 'id' to be a str")
|
35
|
+
pulumi.set(__self__, "id", id)
|
36
|
+
if scim_query and not isinstance(scim_query, str):
|
37
|
+
raise TypeError("Expected argument 'scim_query' to be a str")
|
38
|
+
pulumi.set(__self__, "scim_query", scim_query)
|
39
|
+
if security_policy_report_id and not isinstance(security_policy_report_id, str):
|
40
|
+
raise TypeError("Expected argument 'security_policy_report_id' to be a str")
|
41
|
+
pulumi.set(__self__, "security_policy_report_id", security_policy_report_id)
|
42
|
+
if target_id and not isinstance(target_id, str):
|
43
|
+
raise TypeError("Expected argument 'target_id' to be a str")
|
44
|
+
pulumi.set(__self__, "target_id", target_id)
|
45
|
+
|
46
|
+
@property
|
47
|
+
@pulumi.getter(name="databaseViewAccessEntryCollections")
|
48
|
+
def database_view_access_entry_collections(self) -> Sequence['outputs.GetSecurityPolicyReportDatabaseViewAccessEntriesDatabaseViewAccessEntryCollectionResult']:
|
49
|
+
"""
|
50
|
+
The list of database_view_access_entry_collection.
|
51
|
+
"""
|
52
|
+
return pulumi.get(self, "database_view_access_entry_collections")
|
53
|
+
|
54
|
+
@property
|
55
|
+
@pulumi.getter
|
56
|
+
def filters(self) -> Optional[Sequence['outputs.GetSecurityPolicyReportDatabaseViewAccessEntriesFilterResult']]:
|
57
|
+
return pulumi.get(self, "filters")
|
58
|
+
|
59
|
+
@property
|
60
|
+
@pulumi.getter
|
61
|
+
def id(self) -> str:
|
62
|
+
"""
|
63
|
+
The provider-assigned unique ID for this managed resource.
|
64
|
+
"""
|
65
|
+
return pulumi.get(self, "id")
|
66
|
+
|
67
|
+
@property
|
68
|
+
@pulumi.getter(name="scimQuery")
|
69
|
+
def scim_query(self) -> Optional[str]:
|
70
|
+
return pulumi.get(self, "scim_query")
|
71
|
+
|
72
|
+
@property
|
73
|
+
@pulumi.getter(name="securityPolicyReportId")
|
74
|
+
def security_policy_report_id(self) -> str:
|
75
|
+
return pulumi.get(self, "security_policy_report_id")
|
76
|
+
|
77
|
+
@property
|
78
|
+
@pulumi.getter(name="targetId")
|
79
|
+
def target_id(self) -> Optional[str]:
|
80
|
+
"""
|
81
|
+
The OCID of the of the target database.
|
82
|
+
"""
|
83
|
+
return pulumi.get(self, "target_id")
|
84
|
+
|
85
|
+
|
86
|
+
class AwaitableGetSecurityPolicyReportDatabaseViewAccessEntriesResult(GetSecurityPolicyReportDatabaseViewAccessEntriesResult):
|
87
|
+
# pylint: disable=using-constant-test
|
88
|
+
def __await__(self):
|
89
|
+
if False:
|
90
|
+
yield self
|
91
|
+
return GetSecurityPolicyReportDatabaseViewAccessEntriesResult(
|
92
|
+
database_view_access_entry_collections=self.database_view_access_entry_collections,
|
93
|
+
filters=self.filters,
|
94
|
+
id=self.id,
|
95
|
+
scim_query=self.scim_query,
|
96
|
+
security_policy_report_id=self.security_policy_report_id,
|
97
|
+
target_id=self.target_id)
|
98
|
+
|
99
|
+
|
100
|
+
def get_security_policy_report_database_view_access_entries(filters: Optional[Sequence[pulumi.InputType['GetSecurityPolicyReportDatabaseViewAccessEntriesFilterArgs']]] = None,
|
101
|
+
scim_query: Optional[str] = None,
|
102
|
+
security_policy_report_id: Optional[str] = None,
|
103
|
+
target_id: Optional[str] = None,
|
104
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecurityPolicyReportDatabaseViewAccessEntriesResult:
|
105
|
+
"""
|
106
|
+
This data source provides the list of Security Policy Report Database View Access Entries in Oracle Cloud Infrastructure Data Safe service.
|
107
|
+
|
108
|
+
Retrieves a list of all database view access entries in Data Safe.
|
109
|
+
|
110
|
+
The ListDatabaseViewAccessEntries operation returns only the database view access objects for the specified security policy report.
|
111
|
+
|
112
|
+
## Example Usage
|
113
|
+
|
114
|
+
```python
|
115
|
+
import pulumi
|
116
|
+
import pulumi_oci as oci
|
117
|
+
|
118
|
+
test_security_policy_report_database_view_access_entries = oci.DataSafe.get_security_policy_report_database_view_access_entries(security_policy_report_id=oci_data_safe_security_policy_report["test_security_policy_report"]["id"],
|
119
|
+
scim_query=var["security_policy_report_database_view_access_entry_scim_query"],
|
120
|
+
target_id=oci_cloud_guard_target["test_target"]["id"])
|
121
|
+
```
|
122
|
+
|
123
|
+
|
124
|
+
:param str scim_query: The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at [RFC3339](https://tools.ietf.org/html/draft-ietf-scim-api-12). In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
|
125
|
+
|
126
|
+
**Example:** query=(accessType eq 'SELECT') and (grantee eq 'ADMIN')
|
127
|
+
:param str security_policy_report_id: The OCID of the security policy report resource.
|
128
|
+
:param str target_id: A filter to return only items related to a specific target OCID.
|
129
|
+
"""
|
130
|
+
__args__ = dict()
|
131
|
+
__args__['filters'] = filters
|
132
|
+
__args__['scimQuery'] = scim_query
|
133
|
+
__args__['securityPolicyReportId'] = security_policy_report_id
|
134
|
+
__args__['targetId'] = target_id
|
135
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
136
|
+
__ret__ = pulumi.runtime.invoke('oci:DataSafe/getSecurityPolicyReportDatabaseViewAccessEntries:getSecurityPolicyReportDatabaseViewAccessEntries', __args__, opts=opts, typ=GetSecurityPolicyReportDatabaseViewAccessEntriesResult).value
|
137
|
+
|
138
|
+
return AwaitableGetSecurityPolicyReportDatabaseViewAccessEntriesResult(
|
139
|
+
database_view_access_entry_collections=pulumi.get(__ret__, 'database_view_access_entry_collections'),
|
140
|
+
filters=pulumi.get(__ret__, 'filters'),
|
141
|
+
id=pulumi.get(__ret__, 'id'),
|
142
|
+
scim_query=pulumi.get(__ret__, 'scim_query'),
|
143
|
+
security_policy_report_id=pulumi.get(__ret__, 'security_policy_report_id'),
|
144
|
+
target_id=pulumi.get(__ret__, 'target_id'))
|
145
|
+
|
146
|
+
|
147
|
+
@_utilities.lift_output_func(get_security_policy_report_database_view_access_entries)
|
148
|
+
def get_security_policy_report_database_view_access_entries_output(filters: Optional[pulumi.Input[Optional[Sequence[pulumi.InputType['GetSecurityPolicyReportDatabaseViewAccessEntriesFilterArgs']]]]] = None,
|
149
|
+
scim_query: Optional[pulumi.Input[Optional[str]]] = None,
|
150
|
+
security_policy_report_id: Optional[pulumi.Input[str]] = None,
|
151
|
+
target_id: Optional[pulumi.Input[Optional[str]]] = None,
|
152
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecurityPolicyReportDatabaseViewAccessEntriesResult]:
|
153
|
+
"""
|
154
|
+
This data source provides the list of Security Policy Report Database View Access Entries in Oracle Cloud Infrastructure Data Safe service.
|
155
|
+
|
156
|
+
Retrieves a list of all database view access entries in Data Safe.
|
157
|
+
|
158
|
+
The ListDatabaseViewAccessEntries operation returns only the database view access objects for the specified security policy report.
|
159
|
+
|
160
|
+
## Example Usage
|
161
|
+
|
162
|
+
```python
|
163
|
+
import pulumi
|
164
|
+
import pulumi_oci as oci
|
165
|
+
|
166
|
+
test_security_policy_report_database_view_access_entries = oci.DataSafe.get_security_policy_report_database_view_access_entries(security_policy_report_id=oci_data_safe_security_policy_report["test_security_policy_report"]["id"],
|
167
|
+
scim_query=var["security_policy_report_database_view_access_entry_scim_query"],
|
168
|
+
target_id=oci_cloud_guard_target["test_target"]["id"])
|
169
|
+
```
|
170
|
+
|
171
|
+
|
172
|
+
:param str scim_query: The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at [RFC3339](https://tools.ietf.org/html/draft-ietf-scim-api-12). In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
|
173
|
+
|
174
|
+
**Example:** query=(accessType eq 'SELECT') and (grantee eq 'ADMIN')
|
175
|
+
:param str security_policy_report_id: The OCID of the security policy report resource.
|
176
|
+
:param str target_id: A filter to return only items related to a specific target OCID.
|
177
|
+
"""
|
178
|
+
...
|