pulumi-oci 1.19.0a1705693078__py3-none-any.whl → 1.20.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_oci/__init__.py +59 -0
- pulumi_oci/adm/_inputs.py +99 -18
- pulumi_oci/adm/get_remediation_run_application_dependency_recommendations.py +23 -3
- pulumi_oci/adm/get_vulnerability_audit.py +31 -5
- pulumi_oci/adm/get_vulnerability_audit_application_dependency_vulnerabilities.py +43 -6
- pulumi_oci/adm/get_vulnerability_audit_application_dependency_vulnerability.py +27 -1
- pulumi_oci/adm/get_vulnerability_audits.py +54 -3
- pulumi_oci/adm/outputs.py +296 -31
- pulumi_oci/adm/remediation_recipe.py +2 -0
- pulumi_oci/adm/vulnerability_audit.py +96 -37
- pulumi_oci/database/__init__.py +1 -0
- pulumi_oci/database/_inputs.py +40 -0
- pulumi_oci/database/cloud_vm_cluster.py +22 -1
- pulumi_oci/database/get_system_versions.py +173 -0
- pulumi_oci/database/outputs.py +88 -0
- pulumi_oci/database/vm_cluster.py +22 -1
- pulumi_oci/datasafe/__init__.py +22 -0
- pulumi_oci/datasafe/_inputs.py +1826 -161
- pulumi_oci/datasafe/audit_trail.py +140 -0
- pulumi_oci/datasafe/discovery_mod.py +7 -7
- pulumi_oci/datasafe/get_audit_trail.py +66 -1
- pulumi_oci/datasafe/get_discovery_job.py +1 -1
- pulumi_oci/datasafe/get_discovery_jobs_result.py +1 -1
- pulumi_oci/datasafe/get_discovery_jobs_results.py +1 -1
- pulumi_oci/datasafe/get_masking_policies_masking_column.py +1 -1
- pulumi_oci/datasafe/get_masking_policies_masking_columns.py +1 -1
- pulumi_oci/datasafe/get_masking_policy.py +1 -1
- pulumi_oci/datasafe/get_report.py +1 -1
- pulumi_oci/datasafe/get_security_assessment.py +3 -3
- pulumi_oci/datasafe/get_security_assessment_comparison.py +5 -5
- pulumi_oci/datasafe/get_security_assessment_finding.py +29 -3
- pulumi_oci/datasafe/get_security_assessment_finding_analytics.py +276 -0
- pulumi_oci/datasafe/get_security_assessment_findings.py +43 -7
- pulumi_oci/datasafe/get_security_assessment_findings_change_audit_logs.py +309 -0
- pulumi_oci/datasafe/get_security_assessment_security_feature_analytics.py +198 -0
- pulumi_oci/datasafe/get_security_assessment_security_features.py +377 -0
- pulumi_oci/datasafe/get_security_assessments.py +2 -2
- pulumi_oci/datasafe/get_security_policies.py +253 -0
- pulumi_oci/datasafe/get_security_policy.py +235 -0
- pulumi_oci/datasafe/get_security_policy_deployment.py +261 -0
- pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_state.py +165 -0
- pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_states.py +180 -0
- pulumi_oci/datasafe/get_security_policy_deployments.py +293 -0
- pulumi_oci/datasafe/get_security_policy_report.py +248 -0
- pulumi_oci/datasafe/get_security_policy_report_database_table_access_entries.py +158 -0
- pulumi_oci/datasafe/get_security_policy_report_database_table_access_entry.py +408 -0
- pulumi_oci/datasafe/get_security_policy_report_database_view_access_entries.py +178 -0
- pulumi_oci/datasafe/get_security_policy_report_database_view_access_entry.py +382 -0
- pulumi_oci/datasafe/get_security_policy_report_role_grant_paths.py +177 -0
- pulumi_oci/datasafe/get_security_policy_reports.py +273 -0
- pulumi_oci/datasafe/get_sensitive_data_model.py +1 -1
- pulumi_oci/datasafe/get_target_database.py +27 -4
- pulumi_oci/datasafe/get_target_database_peer_target_database.py +263 -0
- pulumi_oci/datasafe/get_target_database_peer_target_databases.py +133 -0
- pulumi_oci/datasafe/get_target_databases.py +1 -1
- pulumi_oci/datasafe/get_user_assessment.py +5 -5
- pulumi_oci/datasafe/get_user_assessment_comparison.py +2 -2
- pulumi_oci/datasafe/get_user_assessment_user_access_analytics.py +133 -0
- pulumi_oci/datasafe/get_user_assessment_user_analytics.py +2 -2
- pulumi_oci/datasafe/get_user_assessment_users.py +42 -2
- pulumi_oci/datasafe/get_user_assessments.py +2 -2
- pulumi_oci/datasafe/masking_policies_masking_column.py +7 -7
- pulumi_oci/datasafe/masking_policy.py +9 -9
- pulumi_oci/datasafe/outputs.py +16686 -9777
- pulumi_oci/datasafe/report.py +559 -0
- pulumi_oci/datasafe/security_assessment.py +12 -12
- pulumi_oci/datasafe/sensitive_data_model.py +7 -7
- pulumi_oci/datasafe/set_security_assessment_baseline.py +7 -7
- pulumi_oci/datasafe/set_user_assessment_baseline.py +7 -7
- pulumi_oci/datasafe/target_database.py +146 -25
- pulumi_oci/datasafe/target_database_peer_target_database.py +634 -0
- pulumi_oci/datasafe/user_assessment.py +20 -20
- pulumi_oci/generativeai/__init__.py +18 -0
- pulumi_oci/generativeai/_inputs.py +534 -0
- pulumi_oci/generativeai/dedicated_ai_cluster.py +808 -0
- pulumi_oci/generativeai/endpoint.py +717 -0
- pulumi_oci/generativeai/get_dedicated_ai_cluster.py +288 -0
- pulumi_oci/generativeai/get_dedicated_ai_clusters.py +183 -0
- pulumi_oci/generativeai/get_endpoint.py +275 -0
- pulumi_oci/generativeai/get_endpoints.py +183 -0
- pulumi_oci/generativeai/get_model.py +353 -0
- pulumi_oci/generativeai/get_models.py +220 -0
- pulumi_oci/generativeai/model.py +858 -0
- pulumi_oci/generativeai/outputs.py +1721 -0
- pulumi_oci/marketplace/get_publication.py +14 -1
- pulumi_oci/marketplace/outputs.py +11 -0
- pulumi_oci/marketplace/publication.py +28 -0
- pulumi_oci/monitoring/__init__.py +3 -0
- pulumi_oci/monitoring/_inputs.py +82 -4
- pulumi_oci/monitoring/alarm.py +15 -15
- pulumi_oci/monitoring/alarm_suppression.py +745 -0
- pulumi_oci/monitoring/get_alarm.py +5 -5
- pulumi_oci/monitoring/get_alarm_history_collection.py +4 -4
- pulumi_oci/monitoring/get_alarm_statuses.py +3 -1
- pulumi_oci/monitoring/get_alarm_suppression.py +276 -0
- pulumi_oci/monitoring/get_alarm_suppressions.py +192 -0
- pulumi_oci/monitoring/get_metric_data.py +12 -8
- pulumi_oci/monitoring/get_metrics.py +2 -2
- pulumi_oci/monitoring/outputs.py +355 -50
- pulumi_oci/networkfirewall/_inputs.py +25 -20
- pulumi_oci/networkfirewall/outputs.py +40 -30
- pulumi_oci/stackmonitoring/__init__.py +3 -0
- pulumi_oci/stackmonitoring/_inputs.py +143 -0
- pulumi_oci/stackmonitoring/get_process_set.py +236 -0
- pulumi_oci/stackmonitoring/get_process_sets.py +156 -0
- pulumi_oci/stackmonitoring/outputs.py +422 -0
- pulumi_oci/stackmonitoring/process_set.py +548 -0
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/METADATA +1 -1
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/RECORD +111 -70
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/WHEEL +0 -0
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,382 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import pulumi
|
8
|
+
import pulumi.runtime
|
9
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
10
|
+
from .. import _utilities
|
11
|
+
|
12
|
+
__all__ = [
|
13
|
+
'GetSecurityPolicyReportDatabaseViewAccessEntryResult',
|
14
|
+
'AwaitableGetSecurityPolicyReportDatabaseViewAccessEntryResult',
|
15
|
+
'get_security_policy_report_database_view_access_entry',
|
16
|
+
'get_security_policy_report_database_view_access_entry_output',
|
17
|
+
]
|
18
|
+
|
19
|
+
@pulumi.output_type
|
20
|
+
class GetSecurityPolicyReportDatabaseViewAccessEntryResult:
|
21
|
+
"""
|
22
|
+
A collection of values returned by getSecurityPolicyReportDatabaseViewAccessEntry.
|
23
|
+
"""
|
24
|
+
def __init__(__self__, access_type=None, column_name=None, database_view_access_entry_key=None, grant_from_role=None, grantee=None, grantor=None, id=None, is_access_constrained_by_database_vault=None, is_access_constrained_by_real_application_security=None, is_access_constrained_by_redaction=None, is_access_constrained_by_sql_firewall=None, is_access_constrained_by_virtual_private_database=None, key=None, privilege=None, privilege_grantable=None, privilege_type=None, security_policy_report_id=None, table_name=None, table_schema=None, target_id=None, view_name=None, view_schema=None, view_text=None):
|
25
|
+
if access_type and not isinstance(access_type, str):
|
26
|
+
raise TypeError("Expected argument 'access_type' to be a str")
|
27
|
+
pulumi.set(__self__, "access_type", access_type)
|
28
|
+
if column_name and not isinstance(column_name, str):
|
29
|
+
raise TypeError("Expected argument 'column_name' to be a str")
|
30
|
+
pulumi.set(__self__, "column_name", column_name)
|
31
|
+
if database_view_access_entry_key and not isinstance(database_view_access_entry_key, str):
|
32
|
+
raise TypeError("Expected argument 'database_view_access_entry_key' to be a str")
|
33
|
+
pulumi.set(__self__, "database_view_access_entry_key", database_view_access_entry_key)
|
34
|
+
if grant_from_role and not isinstance(grant_from_role, str):
|
35
|
+
raise TypeError("Expected argument 'grant_from_role' to be a str")
|
36
|
+
pulumi.set(__self__, "grant_from_role", grant_from_role)
|
37
|
+
if grantee and not isinstance(grantee, str):
|
38
|
+
raise TypeError("Expected argument 'grantee' to be a str")
|
39
|
+
pulumi.set(__self__, "grantee", grantee)
|
40
|
+
if grantor and not isinstance(grantor, str):
|
41
|
+
raise TypeError("Expected argument 'grantor' to be a str")
|
42
|
+
pulumi.set(__self__, "grantor", grantor)
|
43
|
+
if id and not isinstance(id, str):
|
44
|
+
raise TypeError("Expected argument 'id' to be a str")
|
45
|
+
pulumi.set(__self__, "id", id)
|
46
|
+
if is_access_constrained_by_database_vault and not isinstance(is_access_constrained_by_database_vault, bool):
|
47
|
+
raise TypeError("Expected argument 'is_access_constrained_by_database_vault' to be a bool")
|
48
|
+
pulumi.set(__self__, "is_access_constrained_by_database_vault", is_access_constrained_by_database_vault)
|
49
|
+
if is_access_constrained_by_real_application_security and not isinstance(is_access_constrained_by_real_application_security, bool):
|
50
|
+
raise TypeError("Expected argument 'is_access_constrained_by_real_application_security' to be a bool")
|
51
|
+
pulumi.set(__self__, "is_access_constrained_by_real_application_security", is_access_constrained_by_real_application_security)
|
52
|
+
if is_access_constrained_by_redaction and not isinstance(is_access_constrained_by_redaction, bool):
|
53
|
+
raise TypeError("Expected argument 'is_access_constrained_by_redaction' to be a bool")
|
54
|
+
pulumi.set(__self__, "is_access_constrained_by_redaction", is_access_constrained_by_redaction)
|
55
|
+
if is_access_constrained_by_sql_firewall and not isinstance(is_access_constrained_by_sql_firewall, bool):
|
56
|
+
raise TypeError("Expected argument 'is_access_constrained_by_sql_firewall' to be a bool")
|
57
|
+
pulumi.set(__self__, "is_access_constrained_by_sql_firewall", is_access_constrained_by_sql_firewall)
|
58
|
+
if is_access_constrained_by_virtual_private_database and not isinstance(is_access_constrained_by_virtual_private_database, bool):
|
59
|
+
raise TypeError("Expected argument 'is_access_constrained_by_virtual_private_database' to be a bool")
|
60
|
+
pulumi.set(__self__, "is_access_constrained_by_virtual_private_database", is_access_constrained_by_virtual_private_database)
|
61
|
+
if key and not isinstance(key, str):
|
62
|
+
raise TypeError("Expected argument 'key' to be a str")
|
63
|
+
pulumi.set(__self__, "key", key)
|
64
|
+
if privilege and not isinstance(privilege, str):
|
65
|
+
raise TypeError("Expected argument 'privilege' to be a str")
|
66
|
+
pulumi.set(__self__, "privilege", privilege)
|
67
|
+
if privilege_grantable and not isinstance(privilege_grantable, str):
|
68
|
+
raise TypeError("Expected argument 'privilege_grantable' to be a str")
|
69
|
+
pulumi.set(__self__, "privilege_grantable", privilege_grantable)
|
70
|
+
if privilege_type and not isinstance(privilege_type, str):
|
71
|
+
raise TypeError("Expected argument 'privilege_type' to be a str")
|
72
|
+
pulumi.set(__self__, "privilege_type", privilege_type)
|
73
|
+
if security_policy_report_id and not isinstance(security_policy_report_id, str):
|
74
|
+
raise TypeError("Expected argument 'security_policy_report_id' to be a str")
|
75
|
+
pulumi.set(__self__, "security_policy_report_id", security_policy_report_id)
|
76
|
+
if table_name and not isinstance(table_name, str):
|
77
|
+
raise TypeError("Expected argument 'table_name' to be a str")
|
78
|
+
pulumi.set(__self__, "table_name", table_name)
|
79
|
+
if table_schema and not isinstance(table_schema, str):
|
80
|
+
raise TypeError("Expected argument 'table_schema' to be a str")
|
81
|
+
pulumi.set(__self__, "table_schema", table_schema)
|
82
|
+
if target_id and not isinstance(target_id, str):
|
83
|
+
raise TypeError("Expected argument 'target_id' to be a str")
|
84
|
+
pulumi.set(__self__, "target_id", target_id)
|
85
|
+
if view_name and not isinstance(view_name, str):
|
86
|
+
raise TypeError("Expected argument 'view_name' to be a str")
|
87
|
+
pulumi.set(__self__, "view_name", view_name)
|
88
|
+
if view_schema and not isinstance(view_schema, str):
|
89
|
+
raise TypeError("Expected argument 'view_schema' to be a str")
|
90
|
+
pulumi.set(__self__, "view_schema", view_schema)
|
91
|
+
if view_text and not isinstance(view_text, str):
|
92
|
+
raise TypeError("Expected argument 'view_text' to be a str")
|
93
|
+
pulumi.set(__self__, "view_text", view_text)
|
94
|
+
|
95
|
+
@property
|
96
|
+
@pulumi.getter(name="accessType")
|
97
|
+
def access_type(self) -> str:
|
98
|
+
"""
|
99
|
+
The type of the access the user has on the table, there can be one or more from SELECT, UPDATE, INSERT or DELETE.
|
100
|
+
"""
|
101
|
+
return pulumi.get(self, "access_type")
|
102
|
+
|
103
|
+
@property
|
104
|
+
@pulumi.getter(name="columnName")
|
105
|
+
def column_name(self) -> str:
|
106
|
+
"""
|
107
|
+
If there are column level privileges on a table or view.
|
108
|
+
"""
|
109
|
+
return pulumi.get(self, "column_name")
|
110
|
+
|
111
|
+
@property
|
112
|
+
@pulumi.getter(name="databaseViewAccessEntryKey")
|
113
|
+
def database_view_access_entry_key(self) -> str:
|
114
|
+
return pulumi.get(self, "database_view_access_entry_key")
|
115
|
+
|
116
|
+
@property
|
117
|
+
@pulumi.getter(name="grantFromRole")
|
118
|
+
def grant_from_role(self) -> str:
|
119
|
+
"""
|
120
|
+
This can be empty in case of direct grant, in case of indirect grant, this attribute displays the name of the role which is granted to the user though which the user has access to the table.
|
121
|
+
"""
|
122
|
+
return pulumi.get(self, "grant_from_role")
|
123
|
+
|
124
|
+
@property
|
125
|
+
@pulumi.getter
|
126
|
+
def grantee(self) -> str:
|
127
|
+
"""
|
128
|
+
Grantee is the user who can access the table or view
|
129
|
+
"""
|
130
|
+
return pulumi.get(self, "grantee")
|
131
|
+
|
132
|
+
@property
|
133
|
+
@pulumi.getter
|
134
|
+
def grantor(self) -> str:
|
135
|
+
"""
|
136
|
+
The user who granted the privilege.
|
137
|
+
"""
|
138
|
+
return pulumi.get(self, "grantor")
|
139
|
+
|
140
|
+
@property
|
141
|
+
@pulumi.getter
|
142
|
+
def id(self) -> str:
|
143
|
+
"""
|
144
|
+
The provider-assigned unique ID for this managed resource.
|
145
|
+
"""
|
146
|
+
return pulumi.get(self, "id")
|
147
|
+
|
148
|
+
@property
|
149
|
+
@pulumi.getter(name="isAccessConstrainedByDatabaseVault")
|
150
|
+
def is_access_constrained_by_database_vault(self) -> bool:
|
151
|
+
"""
|
152
|
+
Indicates whether the table access is constrained via Oracle Database Vault.
|
153
|
+
"""
|
154
|
+
return pulumi.get(self, "is_access_constrained_by_database_vault")
|
155
|
+
|
156
|
+
@property
|
157
|
+
@pulumi.getter(name="isAccessConstrainedByRealApplicationSecurity")
|
158
|
+
def is_access_constrained_by_real_application_security(self) -> bool:
|
159
|
+
"""
|
160
|
+
Indicates whether the view access is constrained via Real Application Security.
|
161
|
+
"""
|
162
|
+
return pulumi.get(self, "is_access_constrained_by_real_application_security")
|
163
|
+
|
164
|
+
@property
|
165
|
+
@pulumi.getter(name="isAccessConstrainedByRedaction")
|
166
|
+
def is_access_constrained_by_redaction(self) -> bool:
|
167
|
+
"""
|
168
|
+
Indicates whether the view access is constrained via Oracle Data Redaction.
|
169
|
+
"""
|
170
|
+
return pulumi.get(self, "is_access_constrained_by_redaction")
|
171
|
+
|
172
|
+
@property
|
173
|
+
@pulumi.getter(name="isAccessConstrainedBySqlFirewall")
|
174
|
+
def is_access_constrained_by_sql_firewall(self) -> bool:
|
175
|
+
"""
|
176
|
+
Indicates whether the view access is constrained via Oracle Database SQL Firewall.
|
177
|
+
"""
|
178
|
+
return pulumi.get(self, "is_access_constrained_by_sql_firewall")
|
179
|
+
|
180
|
+
@property
|
181
|
+
@pulumi.getter(name="isAccessConstrainedByVirtualPrivateDatabase")
|
182
|
+
def is_access_constrained_by_virtual_private_database(self) -> bool:
|
183
|
+
"""
|
184
|
+
Indicates whether the view access is constrained via Virtual Private Database.
|
185
|
+
"""
|
186
|
+
return pulumi.get(self, "is_access_constrained_by_virtual_private_database")
|
187
|
+
|
188
|
+
@property
|
189
|
+
@pulumi.getter
|
190
|
+
def key(self) -> str:
|
191
|
+
"""
|
192
|
+
The unique key that identifies the table access report. It is numeric and unique within a security policy report.
|
193
|
+
"""
|
194
|
+
return pulumi.get(self, "key")
|
195
|
+
|
196
|
+
@property
|
197
|
+
@pulumi.getter
|
198
|
+
def privilege(self) -> str:
|
199
|
+
"""
|
200
|
+
The name of the privilege.
|
201
|
+
"""
|
202
|
+
return pulumi.get(self, "privilege")
|
203
|
+
|
204
|
+
@property
|
205
|
+
@pulumi.getter(name="privilegeGrantable")
|
206
|
+
def privilege_grantable(self) -> str:
|
207
|
+
"""
|
208
|
+
Indicates whether the grantee can grant this privilege to other users. Privileges can be granted to a user or role with GRANT_OPTION or ADMIN_OPTION
|
209
|
+
"""
|
210
|
+
return pulumi.get(self, "privilege_grantable")
|
211
|
+
|
212
|
+
@property
|
213
|
+
@pulumi.getter(name="privilegeType")
|
214
|
+
def privilege_type(self) -> str:
|
215
|
+
"""
|
216
|
+
Type of the privilege user has, this includes System Privilege, Schema Privilege, Object Privilege, Column Privilege, Owner or Schema Privilege on a schema.
|
217
|
+
"""
|
218
|
+
return pulumi.get(self, "privilege_type")
|
219
|
+
|
220
|
+
@property
|
221
|
+
@pulumi.getter(name="securityPolicyReportId")
|
222
|
+
def security_policy_report_id(self) -> str:
|
223
|
+
return pulumi.get(self, "security_policy_report_id")
|
224
|
+
|
225
|
+
@property
|
226
|
+
@pulumi.getter(name="tableName")
|
227
|
+
def table_name(self) -> str:
|
228
|
+
"""
|
229
|
+
The name of the database table the user has access to.
|
230
|
+
"""
|
231
|
+
return pulumi.get(self, "table_name")
|
232
|
+
|
233
|
+
@property
|
234
|
+
@pulumi.getter(name="tableSchema")
|
235
|
+
def table_schema(self) -> str:
|
236
|
+
"""
|
237
|
+
The name of the schema the table belongs to.
|
238
|
+
"""
|
239
|
+
return pulumi.get(self, "table_schema")
|
240
|
+
|
241
|
+
@property
|
242
|
+
@pulumi.getter(name="targetId")
|
243
|
+
def target_id(self) -> str:
|
244
|
+
"""
|
245
|
+
The OCID of the of the target database.
|
246
|
+
"""
|
247
|
+
return pulumi.get(self, "target_id")
|
248
|
+
|
249
|
+
@property
|
250
|
+
@pulumi.getter(name="viewName")
|
251
|
+
def view_name(self) -> str:
|
252
|
+
"""
|
253
|
+
The name of the view.
|
254
|
+
"""
|
255
|
+
return pulumi.get(self, "view_name")
|
256
|
+
|
257
|
+
@property
|
258
|
+
@pulumi.getter(name="viewSchema")
|
259
|
+
def view_schema(self) -> str:
|
260
|
+
"""
|
261
|
+
The name of the schema.
|
262
|
+
"""
|
263
|
+
return pulumi.get(self, "view_schema")
|
264
|
+
|
265
|
+
@property
|
266
|
+
@pulumi.getter(name="viewText")
|
267
|
+
def view_text(self) -> str:
|
268
|
+
"""
|
269
|
+
Definition of the view.
|
270
|
+
"""
|
271
|
+
return pulumi.get(self, "view_text")
|
272
|
+
|
273
|
+
|
274
|
+
class AwaitableGetSecurityPolicyReportDatabaseViewAccessEntryResult(GetSecurityPolicyReportDatabaseViewAccessEntryResult):
|
275
|
+
# pylint: disable=using-constant-test
|
276
|
+
def __await__(self):
|
277
|
+
if False:
|
278
|
+
yield self
|
279
|
+
return GetSecurityPolicyReportDatabaseViewAccessEntryResult(
|
280
|
+
access_type=self.access_type,
|
281
|
+
column_name=self.column_name,
|
282
|
+
database_view_access_entry_key=self.database_view_access_entry_key,
|
283
|
+
grant_from_role=self.grant_from_role,
|
284
|
+
grantee=self.grantee,
|
285
|
+
grantor=self.grantor,
|
286
|
+
id=self.id,
|
287
|
+
is_access_constrained_by_database_vault=self.is_access_constrained_by_database_vault,
|
288
|
+
is_access_constrained_by_real_application_security=self.is_access_constrained_by_real_application_security,
|
289
|
+
is_access_constrained_by_redaction=self.is_access_constrained_by_redaction,
|
290
|
+
is_access_constrained_by_sql_firewall=self.is_access_constrained_by_sql_firewall,
|
291
|
+
is_access_constrained_by_virtual_private_database=self.is_access_constrained_by_virtual_private_database,
|
292
|
+
key=self.key,
|
293
|
+
privilege=self.privilege,
|
294
|
+
privilege_grantable=self.privilege_grantable,
|
295
|
+
privilege_type=self.privilege_type,
|
296
|
+
security_policy_report_id=self.security_policy_report_id,
|
297
|
+
table_name=self.table_name,
|
298
|
+
table_schema=self.table_schema,
|
299
|
+
target_id=self.target_id,
|
300
|
+
view_name=self.view_name,
|
301
|
+
view_schema=self.view_schema,
|
302
|
+
view_text=self.view_text)
|
303
|
+
|
304
|
+
|
305
|
+
def get_security_policy_report_database_view_access_entry(database_view_access_entry_key: Optional[str] = None,
|
306
|
+
security_policy_report_id: Optional[str] = None,
|
307
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecurityPolicyReportDatabaseViewAccessEntryResult:
|
308
|
+
"""
|
309
|
+
This data source provides details about a specific Security Policy Report Database View Access Entry resource in Oracle Cloud Infrastructure Data Safe service.
|
310
|
+
|
311
|
+
Gets a database view access object by identifier.
|
312
|
+
|
313
|
+
## Example Usage
|
314
|
+
|
315
|
+
```python
|
316
|
+
import pulumi
|
317
|
+
import pulumi_oci as oci
|
318
|
+
|
319
|
+
test_security_policy_report_database_view_access_entry = oci.DataSafe.get_security_policy_report_database_view_access_entry(database_view_access_entry_key=var["security_policy_report_database_view_access_entry_database_view_access_entry_key"],
|
320
|
+
security_policy_report_id=oci_data_safe_security_policy_report["test_security_policy_report"]["id"])
|
321
|
+
```
|
322
|
+
|
323
|
+
|
324
|
+
:param str database_view_access_entry_key: The unique key that identifies the view access object. This is a system-generated identifier.
|
325
|
+
:param str security_policy_report_id: The OCID of the security policy report resource.
|
326
|
+
"""
|
327
|
+
__args__ = dict()
|
328
|
+
__args__['databaseViewAccessEntryKey'] = database_view_access_entry_key
|
329
|
+
__args__['securityPolicyReportId'] = security_policy_report_id
|
330
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
331
|
+
__ret__ = pulumi.runtime.invoke('oci:DataSafe/getSecurityPolicyReportDatabaseViewAccessEntry:getSecurityPolicyReportDatabaseViewAccessEntry', __args__, opts=opts, typ=GetSecurityPolicyReportDatabaseViewAccessEntryResult).value
|
332
|
+
|
333
|
+
return AwaitableGetSecurityPolicyReportDatabaseViewAccessEntryResult(
|
334
|
+
access_type=pulumi.get(__ret__, 'access_type'),
|
335
|
+
column_name=pulumi.get(__ret__, 'column_name'),
|
336
|
+
database_view_access_entry_key=pulumi.get(__ret__, 'database_view_access_entry_key'),
|
337
|
+
grant_from_role=pulumi.get(__ret__, 'grant_from_role'),
|
338
|
+
grantee=pulumi.get(__ret__, 'grantee'),
|
339
|
+
grantor=pulumi.get(__ret__, 'grantor'),
|
340
|
+
id=pulumi.get(__ret__, 'id'),
|
341
|
+
is_access_constrained_by_database_vault=pulumi.get(__ret__, 'is_access_constrained_by_database_vault'),
|
342
|
+
is_access_constrained_by_real_application_security=pulumi.get(__ret__, 'is_access_constrained_by_real_application_security'),
|
343
|
+
is_access_constrained_by_redaction=pulumi.get(__ret__, 'is_access_constrained_by_redaction'),
|
344
|
+
is_access_constrained_by_sql_firewall=pulumi.get(__ret__, 'is_access_constrained_by_sql_firewall'),
|
345
|
+
is_access_constrained_by_virtual_private_database=pulumi.get(__ret__, 'is_access_constrained_by_virtual_private_database'),
|
346
|
+
key=pulumi.get(__ret__, 'key'),
|
347
|
+
privilege=pulumi.get(__ret__, 'privilege'),
|
348
|
+
privilege_grantable=pulumi.get(__ret__, 'privilege_grantable'),
|
349
|
+
privilege_type=pulumi.get(__ret__, 'privilege_type'),
|
350
|
+
security_policy_report_id=pulumi.get(__ret__, 'security_policy_report_id'),
|
351
|
+
table_name=pulumi.get(__ret__, 'table_name'),
|
352
|
+
table_schema=pulumi.get(__ret__, 'table_schema'),
|
353
|
+
target_id=pulumi.get(__ret__, 'target_id'),
|
354
|
+
view_name=pulumi.get(__ret__, 'view_name'),
|
355
|
+
view_schema=pulumi.get(__ret__, 'view_schema'),
|
356
|
+
view_text=pulumi.get(__ret__, 'view_text'))
|
357
|
+
|
358
|
+
|
359
|
+
@_utilities.lift_output_func(get_security_policy_report_database_view_access_entry)
|
360
|
+
def get_security_policy_report_database_view_access_entry_output(database_view_access_entry_key: Optional[pulumi.Input[str]] = None,
|
361
|
+
security_policy_report_id: Optional[pulumi.Input[str]] = None,
|
362
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecurityPolicyReportDatabaseViewAccessEntryResult]:
|
363
|
+
"""
|
364
|
+
This data source provides details about a specific Security Policy Report Database View Access Entry resource in Oracle Cloud Infrastructure Data Safe service.
|
365
|
+
|
366
|
+
Gets a database view access object by identifier.
|
367
|
+
|
368
|
+
## Example Usage
|
369
|
+
|
370
|
+
```python
|
371
|
+
import pulumi
|
372
|
+
import pulumi_oci as oci
|
373
|
+
|
374
|
+
test_security_policy_report_database_view_access_entry = oci.DataSafe.get_security_policy_report_database_view_access_entry(database_view_access_entry_key=var["security_policy_report_database_view_access_entry_database_view_access_entry_key"],
|
375
|
+
security_policy_report_id=oci_data_safe_security_policy_report["test_security_policy_report"]["id"])
|
376
|
+
```
|
377
|
+
|
378
|
+
|
379
|
+
:param str database_view_access_entry_key: The unique key that identifies the view access object. This is a system-generated identifier.
|
380
|
+
:param str security_policy_report_id: The OCID of the security policy report resource.
|
381
|
+
"""
|
382
|
+
...
|
@@ -0,0 +1,177 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import pulumi
|
8
|
+
import pulumi.runtime
|
9
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
10
|
+
from .. import _utilities
|
11
|
+
from . import outputs
|
12
|
+
from ._inputs import *
|
13
|
+
|
14
|
+
__all__ = [
|
15
|
+
'GetSecurityPolicyReportRoleGrantPathsResult',
|
16
|
+
'AwaitableGetSecurityPolicyReportRoleGrantPathsResult',
|
17
|
+
'get_security_policy_report_role_grant_paths',
|
18
|
+
'get_security_policy_report_role_grant_paths_output',
|
19
|
+
]
|
20
|
+
|
21
|
+
@pulumi.output_type
|
22
|
+
class GetSecurityPolicyReportRoleGrantPathsResult:
|
23
|
+
"""
|
24
|
+
A collection of values returned by getSecurityPolicyReportRoleGrantPaths.
|
25
|
+
"""
|
26
|
+
def __init__(__self__, filters=None, granted_role=None, grantee=None, id=None, role_grant_path_collections=None, security_policy_report_id=None):
|
27
|
+
if filters and not isinstance(filters, list):
|
28
|
+
raise TypeError("Expected argument 'filters' to be a list")
|
29
|
+
pulumi.set(__self__, "filters", filters)
|
30
|
+
if granted_role and not isinstance(granted_role, str):
|
31
|
+
raise TypeError("Expected argument 'granted_role' to be a str")
|
32
|
+
pulumi.set(__self__, "granted_role", granted_role)
|
33
|
+
if grantee and not isinstance(grantee, str):
|
34
|
+
raise TypeError("Expected argument 'grantee' to be a str")
|
35
|
+
pulumi.set(__self__, "grantee", grantee)
|
36
|
+
if id and not isinstance(id, str):
|
37
|
+
raise TypeError("Expected argument 'id' to be a str")
|
38
|
+
pulumi.set(__self__, "id", id)
|
39
|
+
if role_grant_path_collections and not isinstance(role_grant_path_collections, list):
|
40
|
+
raise TypeError("Expected argument 'role_grant_path_collections' to be a list")
|
41
|
+
pulumi.set(__self__, "role_grant_path_collections", role_grant_path_collections)
|
42
|
+
if security_policy_report_id and not isinstance(security_policy_report_id, str):
|
43
|
+
raise TypeError("Expected argument 'security_policy_report_id' to be a str")
|
44
|
+
pulumi.set(__self__, "security_policy_report_id", security_policy_report_id)
|
45
|
+
|
46
|
+
@property
|
47
|
+
@pulumi.getter
|
48
|
+
def filters(self) -> Optional[Sequence['outputs.GetSecurityPolicyReportRoleGrantPathsFilterResult']]:
|
49
|
+
return pulumi.get(self, "filters")
|
50
|
+
|
51
|
+
@property
|
52
|
+
@pulumi.getter(name="grantedRole")
|
53
|
+
def granted_role(self) -> str:
|
54
|
+
"""
|
55
|
+
The name of the role.
|
56
|
+
"""
|
57
|
+
return pulumi.get(self, "granted_role")
|
58
|
+
|
59
|
+
@property
|
60
|
+
@pulumi.getter
|
61
|
+
def grantee(self) -> str:
|
62
|
+
"""
|
63
|
+
Grantee is the user who can access the table.
|
64
|
+
"""
|
65
|
+
return pulumi.get(self, "grantee")
|
66
|
+
|
67
|
+
@property
|
68
|
+
@pulumi.getter
|
69
|
+
def id(self) -> str:
|
70
|
+
"""
|
71
|
+
The provider-assigned unique ID for this managed resource.
|
72
|
+
"""
|
73
|
+
return pulumi.get(self, "id")
|
74
|
+
|
75
|
+
@property
|
76
|
+
@pulumi.getter(name="roleGrantPathCollections")
|
77
|
+
def role_grant_path_collections(self) -> Sequence['outputs.GetSecurityPolicyReportRoleGrantPathsRoleGrantPathCollectionResult']:
|
78
|
+
"""
|
79
|
+
The list of role_grant_path_collection.
|
80
|
+
"""
|
81
|
+
return pulumi.get(self, "role_grant_path_collections")
|
82
|
+
|
83
|
+
@property
|
84
|
+
@pulumi.getter(name="securityPolicyReportId")
|
85
|
+
def security_policy_report_id(self) -> str:
|
86
|
+
return pulumi.get(self, "security_policy_report_id")
|
87
|
+
|
88
|
+
|
89
|
+
class AwaitableGetSecurityPolicyReportRoleGrantPathsResult(GetSecurityPolicyReportRoleGrantPathsResult):
|
90
|
+
# pylint: disable=using-constant-test
|
91
|
+
def __await__(self):
|
92
|
+
if False:
|
93
|
+
yield self
|
94
|
+
return GetSecurityPolicyReportRoleGrantPathsResult(
|
95
|
+
filters=self.filters,
|
96
|
+
granted_role=self.granted_role,
|
97
|
+
grantee=self.grantee,
|
98
|
+
id=self.id,
|
99
|
+
role_grant_path_collections=self.role_grant_path_collections,
|
100
|
+
security_policy_report_id=self.security_policy_report_id)
|
101
|
+
|
102
|
+
|
103
|
+
def get_security_policy_report_role_grant_paths(filters: Optional[Sequence[pulumi.InputType['GetSecurityPolicyReportRoleGrantPathsFilterArgs']]] = None,
|
104
|
+
granted_role: Optional[str] = None,
|
105
|
+
grantee: Optional[str] = None,
|
106
|
+
security_policy_report_id: Optional[str] = None,
|
107
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecurityPolicyReportRoleGrantPathsResult:
|
108
|
+
"""
|
109
|
+
This data source provides the list of Security Policy Report Role Grant Paths in Oracle Cloud Infrastructure Data Safe service.
|
110
|
+
|
111
|
+
Retrieves a list of all role grant paths for a particular user.
|
112
|
+
|
113
|
+
The ListRoleGrantPaths operation returns only the role grant paths for the specified security policy report.
|
114
|
+
|
115
|
+
## Example Usage
|
116
|
+
|
117
|
+
```python
|
118
|
+
import pulumi
|
119
|
+
import pulumi_oci as oci
|
120
|
+
|
121
|
+
test_security_policy_report_role_grant_paths = oci.DataSafe.get_security_policy_report_role_grant_paths(granted_role=var["security_policy_report_role_grant_path_granted_role"],
|
122
|
+
grantee=var["security_policy_report_role_grant_path_grantee"],
|
123
|
+
security_policy_report_id=oci_data_safe_security_policy_report["test_security_policy_report"]["id"])
|
124
|
+
```
|
125
|
+
|
126
|
+
|
127
|
+
:param str granted_role: A filter to return only items that match the specified role.
|
128
|
+
:param str grantee: A filter to return only items that match the specified grantee.
|
129
|
+
:param str security_policy_report_id: The OCID of the security policy report resource.
|
130
|
+
"""
|
131
|
+
__args__ = dict()
|
132
|
+
__args__['filters'] = filters
|
133
|
+
__args__['grantedRole'] = granted_role
|
134
|
+
__args__['grantee'] = grantee
|
135
|
+
__args__['securityPolicyReportId'] = security_policy_report_id
|
136
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
137
|
+
__ret__ = pulumi.runtime.invoke('oci:DataSafe/getSecurityPolicyReportRoleGrantPaths:getSecurityPolicyReportRoleGrantPaths', __args__, opts=opts, typ=GetSecurityPolicyReportRoleGrantPathsResult).value
|
138
|
+
|
139
|
+
return AwaitableGetSecurityPolicyReportRoleGrantPathsResult(
|
140
|
+
filters=pulumi.get(__ret__, 'filters'),
|
141
|
+
granted_role=pulumi.get(__ret__, 'granted_role'),
|
142
|
+
grantee=pulumi.get(__ret__, 'grantee'),
|
143
|
+
id=pulumi.get(__ret__, 'id'),
|
144
|
+
role_grant_path_collections=pulumi.get(__ret__, 'role_grant_path_collections'),
|
145
|
+
security_policy_report_id=pulumi.get(__ret__, 'security_policy_report_id'))
|
146
|
+
|
147
|
+
|
148
|
+
@_utilities.lift_output_func(get_security_policy_report_role_grant_paths)
|
149
|
+
def get_security_policy_report_role_grant_paths_output(filters: Optional[pulumi.Input[Optional[Sequence[pulumi.InputType['GetSecurityPolicyReportRoleGrantPathsFilterArgs']]]]] = None,
|
150
|
+
granted_role: Optional[pulumi.Input[str]] = None,
|
151
|
+
grantee: Optional[pulumi.Input[str]] = None,
|
152
|
+
security_policy_report_id: Optional[pulumi.Input[str]] = None,
|
153
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecurityPolicyReportRoleGrantPathsResult]:
|
154
|
+
"""
|
155
|
+
This data source provides the list of Security Policy Report Role Grant Paths in Oracle Cloud Infrastructure Data Safe service.
|
156
|
+
|
157
|
+
Retrieves a list of all role grant paths for a particular user.
|
158
|
+
|
159
|
+
The ListRoleGrantPaths operation returns only the role grant paths for the specified security policy report.
|
160
|
+
|
161
|
+
## Example Usage
|
162
|
+
|
163
|
+
```python
|
164
|
+
import pulumi
|
165
|
+
import pulumi_oci as oci
|
166
|
+
|
167
|
+
test_security_policy_report_role_grant_paths = oci.DataSafe.get_security_policy_report_role_grant_paths(granted_role=var["security_policy_report_role_grant_path_granted_role"],
|
168
|
+
grantee=var["security_policy_report_role_grant_path_grantee"],
|
169
|
+
security_policy_report_id=oci_data_safe_security_policy_report["test_security_policy_report"]["id"])
|
170
|
+
```
|
171
|
+
|
172
|
+
|
173
|
+
:param str granted_role: A filter to return only items that match the specified role.
|
174
|
+
:param str grantee: A filter to return only items that match the specified grantee.
|
175
|
+
:param str security_policy_report_id: The OCID of the security policy report resource.
|
176
|
+
"""
|
177
|
+
...
|