pulumi-oci 1.19.0a1705693078__py3-none-any.whl → 1.20.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (111) hide show
  1. pulumi_oci/__init__.py +59 -0
  2. pulumi_oci/adm/_inputs.py +99 -18
  3. pulumi_oci/adm/get_remediation_run_application_dependency_recommendations.py +23 -3
  4. pulumi_oci/adm/get_vulnerability_audit.py +31 -5
  5. pulumi_oci/adm/get_vulnerability_audit_application_dependency_vulnerabilities.py +43 -6
  6. pulumi_oci/adm/get_vulnerability_audit_application_dependency_vulnerability.py +27 -1
  7. pulumi_oci/adm/get_vulnerability_audits.py +54 -3
  8. pulumi_oci/adm/outputs.py +296 -31
  9. pulumi_oci/adm/remediation_recipe.py +2 -0
  10. pulumi_oci/adm/vulnerability_audit.py +96 -37
  11. pulumi_oci/database/__init__.py +1 -0
  12. pulumi_oci/database/_inputs.py +40 -0
  13. pulumi_oci/database/cloud_vm_cluster.py +22 -1
  14. pulumi_oci/database/get_system_versions.py +173 -0
  15. pulumi_oci/database/outputs.py +88 -0
  16. pulumi_oci/database/vm_cluster.py +22 -1
  17. pulumi_oci/datasafe/__init__.py +22 -0
  18. pulumi_oci/datasafe/_inputs.py +1826 -161
  19. pulumi_oci/datasafe/audit_trail.py +140 -0
  20. pulumi_oci/datasafe/discovery_mod.py +7 -7
  21. pulumi_oci/datasafe/get_audit_trail.py +66 -1
  22. pulumi_oci/datasafe/get_discovery_job.py +1 -1
  23. pulumi_oci/datasafe/get_discovery_jobs_result.py +1 -1
  24. pulumi_oci/datasafe/get_discovery_jobs_results.py +1 -1
  25. pulumi_oci/datasafe/get_masking_policies_masking_column.py +1 -1
  26. pulumi_oci/datasafe/get_masking_policies_masking_columns.py +1 -1
  27. pulumi_oci/datasafe/get_masking_policy.py +1 -1
  28. pulumi_oci/datasafe/get_report.py +1 -1
  29. pulumi_oci/datasafe/get_security_assessment.py +3 -3
  30. pulumi_oci/datasafe/get_security_assessment_comparison.py +5 -5
  31. pulumi_oci/datasafe/get_security_assessment_finding.py +29 -3
  32. pulumi_oci/datasafe/get_security_assessment_finding_analytics.py +276 -0
  33. pulumi_oci/datasafe/get_security_assessment_findings.py +43 -7
  34. pulumi_oci/datasafe/get_security_assessment_findings_change_audit_logs.py +309 -0
  35. pulumi_oci/datasafe/get_security_assessment_security_feature_analytics.py +198 -0
  36. pulumi_oci/datasafe/get_security_assessment_security_features.py +377 -0
  37. pulumi_oci/datasafe/get_security_assessments.py +2 -2
  38. pulumi_oci/datasafe/get_security_policies.py +253 -0
  39. pulumi_oci/datasafe/get_security_policy.py +235 -0
  40. pulumi_oci/datasafe/get_security_policy_deployment.py +261 -0
  41. pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_state.py +165 -0
  42. pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_states.py +180 -0
  43. pulumi_oci/datasafe/get_security_policy_deployments.py +293 -0
  44. pulumi_oci/datasafe/get_security_policy_report.py +248 -0
  45. pulumi_oci/datasafe/get_security_policy_report_database_table_access_entries.py +158 -0
  46. pulumi_oci/datasafe/get_security_policy_report_database_table_access_entry.py +408 -0
  47. pulumi_oci/datasafe/get_security_policy_report_database_view_access_entries.py +178 -0
  48. pulumi_oci/datasafe/get_security_policy_report_database_view_access_entry.py +382 -0
  49. pulumi_oci/datasafe/get_security_policy_report_role_grant_paths.py +177 -0
  50. pulumi_oci/datasafe/get_security_policy_reports.py +273 -0
  51. pulumi_oci/datasafe/get_sensitive_data_model.py +1 -1
  52. pulumi_oci/datasafe/get_target_database.py +27 -4
  53. pulumi_oci/datasafe/get_target_database_peer_target_database.py +263 -0
  54. pulumi_oci/datasafe/get_target_database_peer_target_databases.py +133 -0
  55. pulumi_oci/datasafe/get_target_databases.py +1 -1
  56. pulumi_oci/datasafe/get_user_assessment.py +5 -5
  57. pulumi_oci/datasafe/get_user_assessment_comparison.py +2 -2
  58. pulumi_oci/datasafe/get_user_assessment_user_access_analytics.py +133 -0
  59. pulumi_oci/datasafe/get_user_assessment_user_analytics.py +2 -2
  60. pulumi_oci/datasafe/get_user_assessment_users.py +42 -2
  61. pulumi_oci/datasafe/get_user_assessments.py +2 -2
  62. pulumi_oci/datasafe/masking_policies_masking_column.py +7 -7
  63. pulumi_oci/datasafe/masking_policy.py +9 -9
  64. pulumi_oci/datasafe/outputs.py +16686 -9777
  65. pulumi_oci/datasafe/report.py +559 -0
  66. pulumi_oci/datasafe/security_assessment.py +12 -12
  67. pulumi_oci/datasafe/sensitive_data_model.py +7 -7
  68. pulumi_oci/datasafe/set_security_assessment_baseline.py +7 -7
  69. pulumi_oci/datasafe/set_user_assessment_baseline.py +7 -7
  70. pulumi_oci/datasafe/target_database.py +146 -25
  71. pulumi_oci/datasafe/target_database_peer_target_database.py +634 -0
  72. pulumi_oci/datasafe/user_assessment.py +20 -20
  73. pulumi_oci/generativeai/__init__.py +18 -0
  74. pulumi_oci/generativeai/_inputs.py +534 -0
  75. pulumi_oci/generativeai/dedicated_ai_cluster.py +808 -0
  76. pulumi_oci/generativeai/endpoint.py +717 -0
  77. pulumi_oci/generativeai/get_dedicated_ai_cluster.py +288 -0
  78. pulumi_oci/generativeai/get_dedicated_ai_clusters.py +183 -0
  79. pulumi_oci/generativeai/get_endpoint.py +275 -0
  80. pulumi_oci/generativeai/get_endpoints.py +183 -0
  81. pulumi_oci/generativeai/get_model.py +353 -0
  82. pulumi_oci/generativeai/get_models.py +220 -0
  83. pulumi_oci/generativeai/model.py +858 -0
  84. pulumi_oci/generativeai/outputs.py +1721 -0
  85. pulumi_oci/marketplace/get_publication.py +14 -1
  86. pulumi_oci/marketplace/outputs.py +11 -0
  87. pulumi_oci/marketplace/publication.py +28 -0
  88. pulumi_oci/monitoring/__init__.py +3 -0
  89. pulumi_oci/monitoring/_inputs.py +82 -4
  90. pulumi_oci/monitoring/alarm.py +15 -15
  91. pulumi_oci/monitoring/alarm_suppression.py +745 -0
  92. pulumi_oci/monitoring/get_alarm.py +5 -5
  93. pulumi_oci/monitoring/get_alarm_history_collection.py +4 -4
  94. pulumi_oci/monitoring/get_alarm_statuses.py +3 -1
  95. pulumi_oci/monitoring/get_alarm_suppression.py +276 -0
  96. pulumi_oci/monitoring/get_alarm_suppressions.py +192 -0
  97. pulumi_oci/monitoring/get_metric_data.py +12 -8
  98. pulumi_oci/monitoring/get_metrics.py +2 -2
  99. pulumi_oci/monitoring/outputs.py +355 -50
  100. pulumi_oci/networkfirewall/_inputs.py +25 -20
  101. pulumi_oci/networkfirewall/outputs.py +40 -30
  102. pulumi_oci/stackmonitoring/__init__.py +3 -0
  103. pulumi_oci/stackmonitoring/_inputs.py +143 -0
  104. pulumi_oci/stackmonitoring/get_process_set.py +236 -0
  105. pulumi_oci/stackmonitoring/get_process_sets.py +156 -0
  106. pulumi_oci/stackmonitoring/outputs.py +422 -0
  107. pulumi_oci/stackmonitoring/process_set.py +548 -0
  108. {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/METADATA +1 -1
  109. {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/RECORD +111 -70
  110. {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/WHEEL +0 -0
  111. {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,382 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import pulumi
8
+ import pulumi.runtime
9
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
10
+ from .. import _utilities
11
+
12
+ __all__ = [
13
+ 'GetSecurityPolicyReportDatabaseViewAccessEntryResult',
14
+ 'AwaitableGetSecurityPolicyReportDatabaseViewAccessEntryResult',
15
+ 'get_security_policy_report_database_view_access_entry',
16
+ 'get_security_policy_report_database_view_access_entry_output',
17
+ ]
18
+
19
+ @pulumi.output_type
20
+ class GetSecurityPolicyReportDatabaseViewAccessEntryResult:
21
+ """
22
+ A collection of values returned by getSecurityPolicyReportDatabaseViewAccessEntry.
23
+ """
24
+ def __init__(__self__, access_type=None, column_name=None, database_view_access_entry_key=None, grant_from_role=None, grantee=None, grantor=None, id=None, is_access_constrained_by_database_vault=None, is_access_constrained_by_real_application_security=None, is_access_constrained_by_redaction=None, is_access_constrained_by_sql_firewall=None, is_access_constrained_by_virtual_private_database=None, key=None, privilege=None, privilege_grantable=None, privilege_type=None, security_policy_report_id=None, table_name=None, table_schema=None, target_id=None, view_name=None, view_schema=None, view_text=None):
25
+ if access_type and not isinstance(access_type, str):
26
+ raise TypeError("Expected argument 'access_type' to be a str")
27
+ pulumi.set(__self__, "access_type", access_type)
28
+ if column_name and not isinstance(column_name, str):
29
+ raise TypeError("Expected argument 'column_name' to be a str")
30
+ pulumi.set(__self__, "column_name", column_name)
31
+ if database_view_access_entry_key and not isinstance(database_view_access_entry_key, str):
32
+ raise TypeError("Expected argument 'database_view_access_entry_key' to be a str")
33
+ pulumi.set(__self__, "database_view_access_entry_key", database_view_access_entry_key)
34
+ if grant_from_role and not isinstance(grant_from_role, str):
35
+ raise TypeError("Expected argument 'grant_from_role' to be a str")
36
+ pulumi.set(__self__, "grant_from_role", grant_from_role)
37
+ if grantee and not isinstance(grantee, str):
38
+ raise TypeError("Expected argument 'grantee' to be a str")
39
+ pulumi.set(__self__, "grantee", grantee)
40
+ if grantor and not isinstance(grantor, str):
41
+ raise TypeError("Expected argument 'grantor' to be a str")
42
+ pulumi.set(__self__, "grantor", grantor)
43
+ if id and not isinstance(id, str):
44
+ raise TypeError("Expected argument 'id' to be a str")
45
+ pulumi.set(__self__, "id", id)
46
+ if is_access_constrained_by_database_vault and not isinstance(is_access_constrained_by_database_vault, bool):
47
+ raise TypeError("Expected argument 'is_access_constrained_by_database_vault' to be a bool")
48
+ pulumi.set(__self__, "is_access_constrained_by_database_vault", is_access_constrained_by_database_vault)
49
+ if is_access_constrained_by_real_application_security and not isinstance(is_access_constrained_by_real_application_security, bool):
50
+ raise TypeError("Expected argument 'is_access_constrained_by_real_application_security' to be a bool")
51
+ pulumi.set(__self__, "is_access_constrained_by_real_application_security", is_access_constrained_by_real_application_security)
52
+ if is_access_constrained_by_redaction and not isinstance(is_access_constrained_by_redaction, bool):
53
+ raise TypeError("Expected argument 'is_access_constrained_by_redaction' to be a bool")
54
+ pulumi.set(__self__, "is_access_constrained_by_redaction", is_access_constrained_by_redaction)
55
+ if is_access_constrained_by_sql_firewall and not isinstance(is_access_constrained_by_sql_firewall, bool):
56
+ raise TypeError("Expected argument 'is_access_constrained_by_sql_firewall' to be a bool")
57
+ pulumi.set(__self__, "is_access_constrained_by_sql_firewall", is_access_constrained_by_sql_firewall)
58
+ if is_access_constrained_by_virtual_private_database and not isinstance(is_access_constrained_by_virtual_private_database, bool):
59
+ raise TypeError("Expected argument 'is_access_constrained_by_virtual_private_database' to be a bool")
60
+ pulumi.set(__self__, "is_access_constrained_by_virtual_private_database", is_access_constrained_by_virtual_private_database)
61
+ if key and not isinstance(key, str):
62
+ raise TypeError("Expected argument 'key' to be a str")
63
+ pulumi.set(__self__, "key", key)
64
+ if privilege and not isinstance(privilege, str):
65
+ raise TypeError("Expected argument 'privilege' to be a str")
66
+ pulumi.set(__self__, "privilege", privilege)
67
+ if privilege_grantable and not isinstance(privilege_grantable, str):
68
+ raise TypeError("Expected argument 'privilege_grantable' to be a str")
69
+ pulumi.set(__self__, "privilege_grantable", privilege_grantable)
70
+ if privilege_type and not isinstance(privilege_type, str):
71
+ raise TypeError("Expected argument 'privilege_type' to be a str")
72
+ pulumi.set(__self__, "privilege_type", privilege_type)
73
+ if security_policy_report_id and not isinstance(security_policy_report_id, str):
74
+ raise TypeError("Expected argument 'security_policy_report_id' to be a str")
75
+ pulumi.set(__self__, "security_policy_report_id", security_policy_report_id)
76
+ if table_name and not isinstance(table_name, str):
77
+ raise TypeError("Expected argument 'table_name' to be a str")
78
+ pulumi.set(__self__, "table_name", table_name)
79
+ if table_schema and not isinstance(table_schema, str):
80
+ raise TypeError("Expected argument 'table_schema' to be a str")
81
+ pulumi.set(__self__, "table_schema", table_schema)
82
+ if target_id and not isinstance(target_id, str):
83
+ raise TypeError("Expected argument 'target_id' to be a str")
84
+ pulumi.set(__self__, "target_id", target_id)
85
+ if view_name and not isinstance(view_name, str):
86
+ raise TypeError("Expected argument 'view_name' to be a str")
87
+ pulumi.set(__self__, "view_name", view_name)
88
+ if view_schema and not isinstance(view_schema, str):
89
+ raise TypeError("Expected argument 'view_schema' to be a str")
90
+ pulumi.set(__self__, "view_schema", view_schema)
91
+ if view_text and not isinstance(view_text, str):
92
+ raise TypeError("Expected argument 'view_text' to be a str")
93
+ pulumi.set(__self__, "view_text", view_text)
94
+
95
+ @property
96
+ @pulumi.getter(name="accessType")
97
+ def access_type(self) -> str:
98
+ """
99
+ The type of the access the user has on the table, there can be one or more from SELECT, UPDATE, INSERT or DELETE.
100
+ """
101
+ return pulumi.get(self, "access_type")
102
+
103
+ @property
104
+ @pulumi.getter(name="columnName")
105
+ def column_name(self) -> str:
106
+ """
107
+ If there are column level privileges on a table or view.
108
+ """
109
+ return pulumi.get(self, "column_name")
110
+
111
+ @property
112
+ @pulumi.getter(name="databaseViewAccessEntryKey")
113
+ def database_view_access_entry_key(self) -> str:
114
+ return pulumi.get(self, "database_view_access_entry_key")
115
+
116
+ @property
117
+ @pulumi.getter(name="grantFromRole")
118
+ def grant_from_role(self) -> str:
119
+ """
120
+ This can be empty in case of direct grant, in case of indirect grant, this attribute displays the name of the role which is granted to the user though which the user has access to the table.
121
+ """
122
+ return pulumi.get(self, "grant_from_role")
123
+
124
+ @property
125
+ @pulumi.getter
126
+ def grantee(self) -> str:
127
+ """
128
+ Grantee is the user who can access the table or view
129
+ """
130
+ return pulumi.get(self, "grantee")
131
+
132
+ @property
133
+ @pulumi.getter
134
+ def grantor(self) -> str:
135
+ """
136
+ The user who granted the privilege.
137
+ """
138
+ return pulumi.get(self, "grantor")
139
+
140
+ @property
141
+ @pulumi.getter
142
+ def id(self) -> str:
143
+ """
144
+ The provider-assigned unique ID for this managed resource.
145
+ """
146
+ return pulumi.get(self, "id")
147
+
148
+ @property
149
+ @pulumi.getter(name="isAccessConstrainedByDatabaseVault")
150
+ def is_access_constrained_by_database_vault(self) -> bool:
151
+ """
152
+ Indicates whether the table access is constrained via Oracle Database Vault.
153
+ """
154
+ return pulumi.get(self, "is_access_constrained_by_database_vault")
155
+
156
+ @property
157
+ @pulumi.getter(name="isAccessConstrainedByRealApplicationSecurity")
158
+ def is_access_constrained_by_real_application_security(self) -> bool:
159
+ """
160
+ Indicates whether the view access is constrained via Real Application Security.
161
+ """
162
+ return pulumi.get(self, "is_access_constrained_by_real_application_security")
163
+
164
+ @property
165
+ @pulumi.getter(name="isAccessConstrainedByRedaction")
166
+ def is_access_constrained_by_redaction(self) -> bool:
167
+ """
168
+ Indicates whether the view access is constrained via Oracle Data Redaction.
169
+ """
170
+ return pulumi.get(self, "is_access_constrained_by_redaction")
171
+
172
+ @property
173
+ @pulumi.getter(name="isAccessConstrainedBySqlFirewall")
174
+ def is_access_constrained_by_sql_firewall(self) -> bool:
175
+ """
176
+ Indicates whether the view access is constrained via Oracle Database SQL Firewall.
177
+ """
178
+ return pulumi.get(self, "is_access_constrained_by_sql_firewall")
179
+
180
+ @property
181
+ @pulumi.getter(name="isAccessConstrainedByVirtualPrivateDatabase")
182
+ def is_access_constrained_by_virtual_private_database(self) -> bool:
183
+ """
184
+ Indicates whether the view access is constrained via Virtual Private Database.
185
+ """
186
+ return pulumi.get(self, "is_access_constrained_by_virtual_private_database")
187
+
188
+ @property
189
+ @pulumi.getter
190
+ def key(self) -> str:
191
+ """
192
+ The unique key that identifies the table access report. It is numeric and unique within a security policy report.
193
+ """
194
+ return pulumi.get(self, "key")
195
+
196
+ @property
197
+ @pulumi.getter
198
+ def privilege(self) -> str:
199
+ """
200
+ The name of the privilege.
201
+ """
202
+ return pulumi.get(self, "privilege")
203
+
204
+ @property
205
+ @pulumi.getter(name="privilegeGrantable")
206
+ def privilege_grantable(self) -> str:
207
+ """
208
+ Indicates whether the grantee can grant this privilege to other users. Privileges can be granted to a user or role with GRANT_OPTION or ADMIN_OPTION
209
+ """
210
+ return pulumi.get(self, "privilege_grantable")
211
+
212
+ @property
213
+ @pulumi.getter(name="privilegeType")
214
+ def privilege_type(self) -> str:
215
+ """
216
+ Type of the privilege user has, this includes System Privilege, Schema Privilege, Object Privilege, Column Privilege, Owner or Schema Privilege on a schema.
217
+ """
218
+ return pulumi.get(self, "privilege_type")
219
+
220
+ @property
221
+ @pulumi.getter(name="securityPolicyReportId")
222
+ def security_policy_report_id(self) -> str:
223
+ return pulumi.get(self, "security_policy_report_id")
224
+
225
+ @property
226
+ @pulumi.getter(name="tableName")
227
+ def table_name(self) -> str:
228
+ """
229
+ The name of the database table the user has access to.
230
+ """
231
+ return pulumi.get(self, "table_name")
232
+
233
+ @property
234
+ @pulumi.getter(name="tableSchema")
235
+ def table_schema(self) -> str:
236
+ """
237
+ The name of the schema the table belongs to.
238
+ """
239
+ return pulumi.get(self, "table_schema")
240
+
241
+ @property
242
+ @pulumi.getter(name="targetId")
243
+ def target_id(self) -> str:
244
+ """
245
+ The OCID of the of the target database.
246
+ """
247
+ return pulumi.get(self, "target_id")
248
+
249
+ @property
250
+ @pulumi.getter(name="viewName")
251
+ def view_name(self) -> str:
252
+ """
253
+ The name of the view.
254
+ """
255
+ return pulumi.get(self, "view_name")
256
+
257
+ @property
258
+ @pulumi.getter(name="viewSchema")
259
+ def view_schema(self) -> str:
260
+ """
261
+ The name of the schema.
262
+ """
263
+ return pulumi.get(self, "view_schema")
264
+
265
+ @property
266
+ @pulumi.getter(name="viewText")
267
+ def view_text(self) -> str:
268
+ """
269
+ Definition of the view.
270
+ """
271
+ return pulumi.get(self, "view_text")
272
+
273
+
274
+ class AwaitableGetSecurityPolicyReportDatabaseViewAccessEntryResult(GetSecurityPolicyReportDatabaseViewAccessEntryResult):
275
+ # pylint: disable=using-constant-test
276
+ def __await__(self):
277
+ if False:
278
+ yield self
279
+ return GetSecurityPolicyReportDatabaseViewAccessEntryResult(
280
+ access_type=self.access_type,
281
+ column_name=self.column_name,
282
+ database_view_access_entry_key=self.database_view_access_entry_key,
283
+ grant_from_role=self.grant_from_role,
284
+ grantee=self.grantee,
285
+ grantor=self.grantor,
286
+ id=self.id,
287
+ is_access_constrained_by_database_vault=self.is_access_constrained_by_database_vault,
288
+ is_access_constrained_by_real_application_security=self.is_access_constrained_by_real_application_security,
289
+ is_access_constrained_by_redaction=self.is_access_constrained_by_redaction,
290
+ is_access_constrained_by_sql_firewall=self.is_access_constrained_by_sql_firewall,
291
+ is_access_constrained_by_virtual_private_database=self.is_access_constrained_by_virtual_private_database,
292
+ key=self.key,
293
+ privilege=self.privilege,
294
+ privilege_grantable=self.privilege_grantable,
295
+ privilege_type=self.privilege_type,
296
+ security_policy_report_id=self.security_policy_report_id,
297
+ table_name=self.table_name,
298
+ table_schema=self.table_schema,
299
+ target_id=self.target_id,
300
+ view_name=self.view_name,
301
+ view_schema=self.view_schema,
302
+ view_text=self.view_text)
303
+
304
+
305
+ def get_security_policy_report_database_view_access_entry(database_view_access_entry_key: Optional[str] = None,
306
+ security_policy_report_id: Optional[str] = None,
307
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecurityPolicyReportDatabaseViewAccessEntryResult:
308
+ """
309
+ This data source provides details about a specific Security Policy Report Database View Access Entry resource in Oracle Cloud Infrastructure Data Safe service.
310
+
311
+ Gets a database view access object by identifier.
312
+
313
+ ## Example Usage
314
+
315
+ ```python
316
+ import pulumi
317
+ import pulumi_oci as oci
318
+
319
+ test_security_policy_report_database_view_access_entry = oci.DataSafe.get_security_policy_report_database_view_access_entry(database_view_access_entry_key=var["security_policy_report_database_view_access_entry_database_view_access_entry_key"],
320
+ security_policy_report_id=oci_data_safe_security_policy_report["test_security_policy_report"]["id"])
321
+ ```
322
+
323
+
324
+ :param str database_view_access_entry_key: The unique key that identifies the view access object. This is a system-generated identifier.
325
+ :param str security_policy_report_id: The OCID of the security policy report resource.
326
+ """
327
+ __args__ = dict()
328
+ __args__['databaseViewAccessEntryKey'] = database_view_access_entry_key
329
+ __args__['securityPolicyReportId'] = security_policy_report_id
330
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
331
+ __ret__ = pulumi.runtime.invoke('oci:DataSafe/getSecurityPolicyReportDatabaseViewAccessEntry:getSecurityPolicyReportDatabaseViewAccessEntry', __args__, opts=opts, typ=GetSecurityPolicyReportDatabaseViewAccessEntryResult).value
332
+
333
+ return AwaitableGetSecurityPolicyReportDatabaseViewAccessEntryResult(
334
+ access_type=pulumi.get(__ret__, 'access_type'),
335
+ column_name=pulumi.get(__ret__, 'column_name'),
336
+ database_view_access_entry_key=pulumi.get(__ret__, 'database_view_access_entry_key'),
337
+ grant_from_role=pulumi.get(__ret__, 'grant_from_role'),
338
+ grantee=pulumi.get(__ret__, 'grantee'),
339
+ grantor=pulumi.get(__ret__, 'grantor'),
340
+ id=pulumi.get(__ret__, 'id'),
341
+ is_access_constrained_by_database_vault=pulumi.get(__ret__, 'is_access_constrained_by_database_vault'),
342
+ is_access_constrained_by_real_application_security=pulumi.get(__ret__, 'is_access_constrained_by_real_application_security'),
343
+ is_access_constrained_by_redaction=pulumi.get(__ret__, 'is_access_constrained_by_redaction'),
344
+ is_access_constrained_by_sql_firewall=pulumi.get(__ret__, 'is_access_constrained_by_sql_firewall'),
345
+ is_access_constrained_by_virtual_private_database=pulumi.get(__ret__, 'is_access_constrained_by_virtual_private_database'),
346
+ key=pulumi.get(__ret__, 'key'),
347
+ privilege=pulumi.get(__ret__, 'privilege'),
348
+ privilege_grantable=pulumi.get(__ret__, 'privilege_grantable'),
349
+ privilege_type=pulumi.get(__ret__, 'privilege_type'),
350
+ security_policy_report_id=pulumi.get(__ret__, 'security_policy_report_id'),
351
+ table_name=pulumi.get(__ret__, 'table_name'),
352
+ table_schema=pulumi.get(__ret__, 'table_schema'),
353
+ target_id=pulumi.get(__ret__, 'target_id'),
354
+ view_name=pulumi.get(__ret__, 'view_name'),
355
+ view_schema=pulumi.get(__ret__, 'view_schema'),
356
+ view_text=pulumi.get(__ret__, 'view_text'))
357
+
358
+
359
+ @_utilities.lift_output_func(get_security_policy_report_database_view_access_entry)
360
+ def get_security_policy_report_database_view_access_entry_output(database_view_access_entry_key: Optional[pulumi.Input[str]] = None,
361
+ security_policy_report_id: Optional[pulumi.Input[str]] = None,
362
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecurityPolicyReportDatabaseViewAccessEntryResult]:
363
+ """
364
+ This data source provides details about a specific Security Policy Report Database View Access Entry resource in Oracle Cloud Infrastructure Data Safe service.
365
+
366
+ Gets a database view access object by identifier.
367
+
368
+ ## Example Usage
369
+
370
+ ```python
371
+ import pulumi
372
+ import pulumi_oci as oci
373
+
374
+ test_security_policy_report_database_view_access_entry = oci.DataSafe.get_security_policy_report_database_view_access_entry(database_view_access_entry_key=var["security_policy_report_database_view_access_entry_database_view_access_entry_key"],
375
+ security_policy_report_id=oci_data_safe_security_policy_report["test_security_policy_report"]["id"])
376
+ ```
377
+
378
+
379
+ :param str database_view_access_entry_key: The unique key that identifies the view access object. This is a system-generated identifier.
380
+ :param str security_policy_report_id: The OCID of the security policy report resource.
381
+ """
382
+ ...
@@ -0,0 +1,177 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import pulumi
8
+ import pulumi.runtime
9
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
10
+ from .. import _utilities
11
+ from . import outputs
12
+ from ._inputs import *
13
+
14
+ __all__ = [
15
+ 'GetSecurityPolicyReportRoleGrantPathsResult',
16
+ 'AwaitableGetSecurityPolicyReportRoleGrantPathsResult',
17
+ 'get_security_policy_report_role_grant_paths',
18
+ 'get_security_policy_report_role_grant_paths_output',
19
+ ]
20
+
21
+ @pulumi.output_type
22
+ class GetSecurityPolicyReportRoleGrantPathsResult:
23
+ """
24
+ A collection of values returned by getSecurityPolicyReportRoleGrantPaths.
25
+ """
26
+ def __init__(__self__, filters=None, granted_role=None, grantee=None, id=None, role_grant_path_collections=None, security_policy_report_id=None):
27
+ if filters and not isinstance(filters, list):
28
+ raise TypeError("Expected argument 'filters' to be a list")
29
+ pulumi.set(__self__, "filters", filters)
30
+ if granted_role and not isinstance(granted_role, str):
31
+ raise TypeError("Expected argument 'granted_role' to be a str")
32
+ pulumi.set(__self__, "granted_role", granted_role)
33
+ if grantee and not isinstance(grantee, str):
34
+ raise TypeError("Expected argument 'grantee' to be a str")
35
+ pulumi.set(__self__, "grantee", grantee)
36
+ if id and not isinstance(id, str):
37
+ raise TypeError("Expected argument 'id' to be a str")
38
+ pulumi.set(__self__, "id", id)
39
+ if role_grant_path_collections and not isinstance(role_grant_path_collections, list):
40
+ raise TypeError("Expected argument 'role_grant_path_collections' to be a list")
41
+ pulumi.set(__self__, "role_grant_path_collections", role_grant_path_collections)
42
+ if security_policy_report_id and not isinstance(security_policy_report_id, str):
43
+ raise TypeError("Expected argument 'security_policy_report_id' to be a str")
44
+ pulumi.set(__self__, "security_policy_report_id", security_policy_report_id)
45
+
46
+ @property
47
+ @pulumi.getter
48
+ def filters(self) -> Optional[Sequence['outputs.GetSecurityPolicyReportRoleGrantPathsFilterResult']]:
49
+ return pulumi.get(self, "filters")
50
+
51
+ @property
52
+ @pulumi.getter(name="grantedRole")
53
+ def granted_role(self) -> str:
54
+ """
55
+ The name of the role.
56
+ """
57
+ return pulumi.get(self, "granted_role")
58
+
59
+ @property
60
+ @pulumi.getter
61
+ def grantee(self) -> str:
62
+ """
63
+ Grantee is the user who can access the table.
64
+ """
65
+ return pulumi.get(self, "grantee")
66
+
67
+ @property
68
+ @pulumi.getter
69
+ def id(self) -> str:
70
+ """
71
+ The provider-assigned unique ID for this managed resource.
72
+ """
73
+ return pulumi.get(self, "id")
74
+
75
+ @property
76
+ @pulumi.getter(name="roleGrantPathCollections")
77
+ def role_grant_path_collections(self) -> Sequence['outputs.GetSecurityPolicyReportRoleGrantPathsRoleGrantPathCollectionResult']:
78
+ """
79
+ The list of role_grant_path_collection.
80
+ """
81
+ return pulumi.get(self, "role_grant_path_collections")
82
+
83
+ @property
84
+ @pulumi.getter(name="securityPolicyReportId")
85
+ def security_policy_report_id(self) -> str:
86
+ return pulumi.get(self, "security_policy_report_id")
87
+
88
+
89
+ class AwaitableGetSecurityPolicyReportRoleGrantPathsResult(GetSecurityPolicyReportRoleGrantPathsResult):
90
+ # pylint: disable=using-constant-test
91
+ def __await__(self):
92
+ if False:
93
+ yield self
94
+ return GetSecurityPolicyReportRoleGrantPathsResult(
95
+ filters=self.filters,
96
+ granted_role=self.granted_role,
97
+ grantee=self.grantee,
98
+ id=self.id,
99
+ role_grant_path_collections=self.role_grant_path_collections,
100
+ security_policy_report_id=self.security_policy_report_id)
101
+
102
+
103
+ def get_security_policy_report_role_grant_paths(filters: Optional[Sequence[pulumi.InputType['GetSecurityPolicyReportRoleGrantPathsFilterArgs']]] = None,
104
+ granted_role: Optional[str] = None,
105
+ grantee: Optional[str] = None,
106
+ security_policy_report_id: Optional[str] = None,
107
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecurityPolicyReportRoleGrantPathsResult:
108
+ """
109
+ This data source provides the list of Security Policy Report Role Grant Paths in Oracle Cloud Infrastructure Data Safe service.
110
+
111
+ Retrieves a list of all role grant paths for a particular user.
112
+
113
+ The ListRoleGrantPaths operation returns only the role grant paths for the specified security policy report.
114
+
115
+ ## Example Usage
116
+
117
+ ```python
118
+ import pulumi
119
+ import pulumi_oci as oci
120
+
121
+ test_security_policy_report_role_grant_paths = oci.DataSafe.get_security_policy_report_role_grant_paths(granted_role=var["security_policy_report_role_grant_path_granted_role"],
122
+ grantee=var["security_policy_report_role_grant_path_grantee"],
123
+ security_policy_report_id=oci_data_safe_security_policy_report["test_security_policy_report"]["id"])
124
+ ```
125
+
126
+
127
+ :param str granted_role: A filter to return only items that match the specified role.
128
+ :param str grantee: A filter to return only items that match the specified grantee.
129
+ :param str security_policy_report_id: The OCID of the security policy report resource.
130
+ """
131
+ __args__ = dict()
132
+ __args__['filters'] = filters
133
+ __args__['grantedRole'] = granted_role
134
+ __args__['grantee'] = grantee
135
+ __args__['securityPolicyReportId'] = security_policy_report_id
136
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
137
+ __ret__ = pulumi.runtime.invoke('oci:DataSafe/getSecurityPolicyReportRoleGrantPaths:getSecurityPolicyReportRoleGrantPaths', __args__, opts=opts, typ=GetSecurityPolicyReportRoleGrantPathsResult).value
138
+
139
+ return AwaitableGetSecurityPolicyReportRoleGrantPathsResult(
140
+ filters=pulumi.get(__ret__, 'filters'),
141
+ granted_role=pulumi.get(__ret__, 'granted_role'),
142
+ grantee=pulumi.get(__ret__, 'grantee'),
143
+ id=pulumi.get(__ret__, 'id'),
144
+ role_grant_path_collections=pulumi.get(__ret__, 'role_grant_path_collections'),
145
+ security_policy_report_id=pulumi.get(__ret__, 'security_policy_report_id'))
146
+
147
+
148
+ @_utilities.lift_output_func(get_security_policy_report_role_grant_paths)
149
+ def get_security_policy_report_role_grant_paths_output(filters: Optional[pulumi.Input[Optional[Sequence[pulumi.InputType['GetSecurityPolicyReportRoleGrantPathsFilterArgs']]]]] = None,
150
+ granted_role: Optional[pulumi.Input[str]] = None,
151
+ grantee: Optional[pulumi.Input[str]] = None,
152
+ security_policy_report_id: Optional[pulumi.Input[str]] = None,
153
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecurityPolicyReportRoleGrantPathsResult]:
154
+ """
155
+ This data source provides the list of Security Policy Report Role Grant Paths in Oracle Cloud Infrastructure Data Safe service.
156
+
157
+ Retrieves a list of all role grant paths for a particular user.
158
+
159
+ The ListRoleGrantPaths operation returns only the role grant paths for the specified security policy report.
160
+
161
+ ## Example Usage
162
+
163
+ ```python
164
+ import pulumi
165
+ import pulumi_oci as oci
166
+
167
+ test_security_policy_report_role_grant_paths = oci.DataSafe.get_security_policy_report_role_grant_paths(granted_role=var["security_policy_report_role_grant_path_granted_role"],
168
+ grantee=var["security_policy_report_role_grant_path_grantee"],
169
+ security_policy_report_id=oci_data_safe_security_policy_report["test_security_policy_report"]["id"])
170
+ ```
171
+
172
+
173
+ :param str granted_role: A filter to return only items that match the specified role.
174
+ :param str grantee: A filter to return only items that match the specified grantee.
175
+ :param str security_policy_report_id: The OCID of the security policy report resource.
176
+ """
177
+ ...