pulumi-oci 1.19.0a1705693078__py3-none-any.whl → 1.20.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_oci/__init__.py +59 -0
- pulumi_oci/adm/_inputs.py +99 -18
- pulumi_oci/adm/get_remediation_run_application_dependency_recommendations.py +23 -3
- pulumi_oci/adm/get_vulnerability_audit.py +31 -5
- pulumi_oci/adm/get_vulnerability_audit_application_dependency_vulnerabilities.py +43 -6
- pulumi_oci/adm/get_vulnerability_audit_application_dependency_vulnerability.py +27 -1
- pulumi_oci/adm/get_vulnerability_audits.py +54 -3
- pulumi_oci/adm/outputs.py +296 -31
- pulumi_oci/adm/remediation_recipe.py +2 -0
- pulumi_oci/adm/vulnerability_audit.py +96 -37
- pulumi_oci/database/__init__.py +1 -0
- pulumi_oci/database/_inputs.py +40 -0
- pulumi_oci/database/cloud_vm_cluster.py +22 -1
- pulumi_oci/database/get_system_versions.py +173 -0
- pulumi_oci/database/outputs.py +88 -0
- pulumi_oci/database/vm_cluster.py +22 -1
- pulumi_oci/datasafe/__init__.py +22 -0
- pulumi_oci/datasafe/_inputs.py +1826 -161
- pulumi_oci/datasafe/audit_trail.py +140 -0
- pulumi_oci/datasafe/discovery_mod.py +7 -7
- pulumi_oci/datasafe/get_audit_trail.py +66 -1
- pulumi_oci/datasafe/get_discovery_job.py +1 -1
- pulumi_oci/datasafe/get_discovery_jobs_result.py +1 -1
- pulumi_oci/datasafe/get_discovery_jobs_results.py +1 -1
- pulumi_oci/datasafe/get_masking_policies_masking_column.py +1 -1
- pulumi_oci/datasafe/get_masking_policies_masking_columns.py +1 -1
- pulumi_oci/datasafe/get_masking_policy.py +1 -1
- pulumi_oci/datasafe/get_report.py +1 -1
- pulumi_oci/datasafe/get_security_assessment.py +3 -3
- pulumi_oci/datasafe/get_security_assessment_comparison.py +5 -5
- pulumi_oci/datasafe/get_security_assessment_finding.py +29 -3
- pulumi_oci/datasafe/get_security_assessment_finding_analytics.py +276 -0
- pulumi_oci/datasafe/get_security_assessment_findings.py +43 -7
- pulumi_oci/datasafe/get_security_assessment_findings_change_audit_logs.py +309 -0
- pulumi_oci/datasafe/get_security_assessment_security_feature_analytics.py +198 -0
- pulumi_oci/datasafe/get_security_assessment_security_features.py +377 -0
- pulumi_oci/datasafe/get_security_assessments.py +2 -2
- pulumi_oci/datasafe/get_security_policies.py +253 -0
- pulumi_oci/datasafe/get_security_policy.py +235 -0
- pulumi_oci/datasafe/get_security_policy_deployment.py +261 -0
- pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_state.py +165 -0
- pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_states.py +180 -0
- pulumi_oci/datasafe/get_security_policy_deployments.py +293 -0
- pulumi_oci/datasafe/get_security_policy_report.py +248 -0
- pulumi_oci/datasafe/get_security_policy_report_database_table_access_entries.py +158 -0
- pulumi_oci/datasafe/get_security_policy_report_database_table_access_entry.py +408 -0
- pulumi_oci/datasafe/get_security_policy_report_database_view_access_entries.py +178 -0
- pulumi_oci/datasafe/get_security_policy_report_database_view_access_entry.py +382 -0
- pulumi_oci/datasafe/get_security_policy_report_role_grant_paths.py +177 -0
- pulumi_oci/datasafe/get_security_policy_reports.py +273 -0
- pulumi_oci/datasafe/get_sensitive_data_model.py +1 -1
- pulumi_oci/datasafe/get_target_database.py +27 -4
- pulumi_oci/datasafe/get_target_database_peer_target_database.py +263 -0
- pulumi_oci/datasafe/get_target_database_peer_target_databases.py +133 -0
- pulumi_oci/datasafe/get_target_databases.py +1 -1
- pulumi_oci/datasafe/get_user_assessment.py +5 -5
- pulumi_oci/datasafe/get_user_assessment_comparison.py +2 -2
- pulumi_oci/datasafe/get_user_assessment_user_access_analytics.py +133 -0
- pulumi_oci/datasafe/get_user_assessment_user_analytics.py +2 -2
- pulumi_oci/datasafe/get_user_assessment_users.py +42 -2
- pulumi_oci/datasafe/get_user_assessments.py +2 -2
- pulumi_oci/datasafe/masking_policies_masking_column.py +7 -7
- pulumi_oci/datasafe/masking_policy.py +9 -9
- pulumi_oci/datasafe/outputs.py +16686 -9777
- pulumi_oci/datasafe/report.py +559 -0
- pulumi_oci/datasafe/security_assessment.py +12 -12
- pulumi_oci/datasafe/sensitive_data_model.py +7 -7
- pulumi_oci/datasafe/set_security_assessment_baseline.py +7 -7
- pulumi_oci/datasafe/set_user_assessment_baseline.py +7 -7
- pulumi_oci/datasafe/target_database.py +146 -25
- pulumi_oci/datasafe/target_database_peer_target_database.py +634 -0
- pulumi_oci/datasafe/user_assessment.py +20 -20
- pulumi_oci/generativeai/__init__.py +18 -0
- pulumi_oci/generativeai/_inputs.py +534 -0
- pulumi_oci/generativeai/dedicated_ai_cluster.py +808 -0
- pulumi_oci/generativeai/endpoint.py +717 -0
- pulumi_oci/generativeai/get_dedicated_ai_cluster.py +288 -0
- pulumi_oci/generativeai/get_dedicated_ai_clusters.py +183 -0
- pulumi_oci/generativeai/get_endpoint.py +275 -0
- pulumi_oci/generativeai/get_endpoints.py +183 -0
- pulumi_oci/generativeai/get_model.py +353 -0
- pulumi_oci/generativeai/get_models.py +220 -0
- pulumi_oci/generativeai/model.py +858 -0
- pulumi_oci/generativeai/outputs.py +1721 -0
- pulumi_oci/marketplace/get_publication.py +14 -1
- pulumi_oci/marketplace/outputs.py +11 -0
- pulumi_oci/marketplace/publication.py +28 -0
- pulumi_oci/monitoring/__init__.py +3 -0
- pulumi_oci/monitoring/_inputs.py +82 -4
- pulumi_oci/monitoring/alarm.py +15 -15
- pulumi_oci/monitoring/alarm_suppression.py +745 -0
- pulumi_oci/monitoring/get_alarm.py +5 -5
- pulumi_oci/monitoring/get_alarm_history_collection.py +4 -4
- pulumi_oci/monitoring/get_alarm_statuses.py +3 -1
- pulumi_oci/monitoring/get_alarm_suppression.py +276 -0
- pulumi_oci/monitoring/get_alarm_suppressions.py +192 -0
- pulumi_oci/monitoring/get_metric_data.py +12 -8
- pulumi_oci/monitoring/get_metrics.py +2 -2
- pulumi_oci/monitoring/outputs.py +355 -50
- pulumi_oci/networkfirewall/_inputs.py +25 -20
- pulumi_oci/networkfirewall/outputs.py +40 -30
- pulumi_oci/stackmonitoring/__init__.py +3 -0
- pulumi_oci/stackmonitoring/_inputs.py +143 -0
- pulumi_oci/stackmonitoring/get_process_set.py +236 -0
- pulumi_oci/stackmonitoring/get_process_sets.py +156 -0
- pulumi_oci/stackmonitoring/outputs.py +422 -0
- pulumi_oci/stackmonitoring/process_set.py +548 -0
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/METADATA +1 -1
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/RECORD +111 -70
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/WHEEL +0 -0
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/top_level.txt +0 -0
@@ -23,7 +23,7 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilitiesResult:
|
|
23
23
|
"""
|
24
24
|
A collection of values returned by getVulnerabilityAuditApplicationDependencyVulnerabilities.
|
25
25
|
"""
|
26
|
-
def __init__(__self__, application_dependency_vulnerability_collections=None, cvss_v2greater_than_or_equal=None, cvss_v3greater_than_or_equal=None, depth=None, filters=None, gav=None, id=None, root_node_id=None, sort_by=None, vulnerability_audit_id=None, vulnerability_id=None):
|
26
|
+
def __init__(__self__, application_dependency_vulnerability_collections=None, cvss_v2greater_than_or_equal=None, cvss_v3greater_than_or_equal=None, depth=None, filters=None, gav=None, id=None, purl=None, root_node_id=None, severity_greater_than_or_equal=None, sort_by=None, vulnerability_audit_id=None, vulnerability_id=None):
|
27
27
|
if application_dependency_vulnerability_collections and not isinstance(application_dependency_vulnerability_collections, list):
|
28
28
|
raise TypeError("Expected argument 'application_dependency_vulnerability_collections' to be a list")
|
29
29
|
pulumi.set(__self__, "application_dependency_vulnerability_collections", application_dependency_vulnerability_collections)
|
@@ -45,9 +45,15 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilitiesResult:
|
|
45
45
|
if id and not isinstance(id, str):
|
46
46
|
raise TypeError("Expected argument 'id' to be a str")
|
47
47
|
pulumi.set(__self__, "id", id)
|
48
|
+
if purl and not isinstance(purl, str):
|
49
|
+
raise TypeError("Expected argument 'purl' to be a str")
|
50
|
+
pulumi.set(__self__, "purl", purl)
|
48
51
|
if root_node_id and not isinstance(root_node_id, str):
|
49
52
|
raise TypeError("Expected argument 'root_node_id' to be a str")
|
50
53
|
pulumi.set(__self__, "root_node_id", root_node_id)
|
54
|
+
if severity_greater_than_or_equal and not isinstance(severity_greater_than_or_equal, str):
|
55
|
+
raise TypeError("Expected argument 'severity_greater_than_or_equal' to be a str")
|
56
|
+
pulumi.set(__self__, "severity_greater_than_or_equal", severity_greater_than_or_equal)
|
51
57
|
if sort_by and not isinstance(sort_by, str):
|
52
58
|
raise TypeError("Expected argument 'sort_by' to be a str")
|
53
59
|
pulumi.set(__self__, "sort_by", sort_by)
|
@@ -90,7 +96,7 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilitiesResult:
|
|
90
96
|
@pulumi.getter
|
91
97
|
def gav(self) -> Optional[str]:
|
92
98
|
"""
|
93
|
-
Group Artifact Version (GAV) identifier (Group:Artifact:Version)
|
99
|
+
Group Artifact Version (GAV) identifier (Group:Artifact:Version). Example: org.graalvm.nativeimage:svm:21.1.0. "N/A" for non-maven artifacts.
|
94
100
|
"""
|
95
101
|
return pulumi.get(self, "gav")
|
96
102
|
|
@@ -102,11 +108,24 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilitiesResult:
|
|
102
108
|
"""
|
103
109
|
return pulumi.get(self, "id")
|
104
110
|
|
111
|
+
@property
|
112
|
+
@pulumi.getter
|
113
|
+
def purl(self) -> Optional[str]:
|
114
|
+
"""
|
115
|
+
Package URL defined in https://github.com/package-url/purl-spec, e.g. pkg:maven/org.graalvm.nativeimage/svm@21.1.0
|
116
|
+
"""
|
117
|
+
return pulumi.get(self, "purl")
|
118
|
+
|
105
119
|
@property
|
106
120
|
@pulumi.getter(name="rootNodeId")
|
107
121
|
def root_node_id(self) -> Optional[str]:
|
108
122
|
return pulumi.get(self, "root_node_id")
|
109
123
|
|
124
|
+
@property
|
125
|
+
@pulumi.getter(name="severityGreaterThanOrEqual")
|
126
|
+
def severity_greater_than_or_equal(self) -> Optional[str]:
|
127
|
+
return pulumi.get(self, "severity_greater_than_or_equal")
|
128
|
+
|
110
129
|
@property
|
111
130
|
@pulumi.getter(name="sortBy")
|
112
131
|
def sort_by(self) -> Optional[str]:
|
@@ -136,7 +155,9 @@ class AwaitableGetVulnerabilityAuditApplicationDependencyVulnerabilitiesResult(G
|
|
136
155
|
filters=self.filters,
|
137
156
|
gav=self.gav,
|
138
157
|
id=self.id,
|
158
|
+
purl=self.purl,
|
139
159
|
root_node_id=self.root_node_id,
|
160
|
+
severity_greater_than_or_equal=self.severity_greater_than_or_equal,
|
140
161
|
sort_by=self.sort_by,
|
141
162
|
vulnerability_audit_id=self.vulnerability_audit_id,
|
142
163
|
vulnerability_id=self.vulnerability_id)
|
@@ -147,7 +168,9 @@ def get_vulnerability_audit_application_dependency_vulnerabilities(cvss_v2greate
|
|
147
168
|
depth: Optional[int] = None,
|
148
169
|
filters: Optional[Sequence[pulumi.InputType['GetVulnerabilityAuditApplicationDependencyVulnerabilitiesFilterArgs']]] = None,
|
149
170
|
gav: Optional[str] = None,
|
171
|
+
purl: Optional[str] = None,
|
150
172
|
root_node_id: Optional[str] = None,
|
173
|
+
severity_greater_than_or_equal: Optional[str] = None,
|
151
174
|
sort_by: Optional[str] = None,
|
152
175
|
vulnerability_audit_id: Optional[str] = None,
|
153
176
|
vulnerability_id: Optional[str] = None,
|
@@ -168,16 +191,20 @@ def get_vulnerability_audit_application_dependency_vulnerabilities(cvss_v2greate
|
|
168
191
|
cvss_v3greater_than_or_equal=var["vulnerability_audit_application_dependency_vulnerability_cvss_v3greater_than_or_equal"],
|
169
192
|
depth=var["vulnerability_audit_application_dependency_vulnerability_depth"],
|
170
193
|
gav=var["vulnerability_audit_application_dependency_vulnerability_gav"],
|
194
|
+
purl=var["vulnerability_audit_application_dependency_vulnerability_purl"],
|
171
195
|
root_node_id=oci_adm_root_node["test_root_node"]["id"],
|
196
|
+
severity_greater_than_or_equal=var["vulnerability_audit_application_dependency_vulnerability_severity_greater_than_or_equal"],
|
172
197
|
vulnerability_id=oci_adm_vulnerability["test_vulnerability"]["id"])
|
173
198
|
```
|
174
199
|
|
175
200
|
|
176
|
-
:param float cvss_v2greater_than_or_equal: A filter that returns only
|
177
|
-
:param float cvss_v3greater_than_or_equal: A filter that returns only
|
201
|
+
:param float cvss_v2greater_than_or_equal: A filter that returns only Vulnerabilities that have a Common Vulnerability Scoring System Version 2 (CVSS V2) greater than or equal to the specified value.
|
202
|
+
:param float cvss_v3greater_than_or_equal: A filter that returns only Vulnerabilities that have a Common Vulnerability Scoring System Version 3 (CVSS V3) greater than or equal to the specified value.
|
178
203
|
:param int depth: A filter to limit depth of the application dependencies tree traversal. Additionally query parameters such as "cvssV2GreaterThanOrEqual", "cvssV3GreaterThanOrEqual", "gav" and "vulnerabilityId" can't be used in conjunction with this latter.
|
179
204
|
:param str gav: A filter to return only resources that match the entire GAV (Group Artifact Version) identifier given.
|
205
|
+
:param str purl: A filter to return only resources that match the entire PURL given (https://github.com/package-url/purl-spec/).
|
180
206
|
:param str root_node_id: A filter to override the top level root identifier with the new given value. The application dependency tree will only be traversed from the given node. Query parameters "cvssV2GreaterThanOrEqual", "cvssV3GreaterThanOrEqual", "gav" and "vulnerabilityId" cannot be used in conjunction with this parameter.
|
207
|
+
:param str severity_greater_than_or_equal: A filter that returns only Vulnerabilities that have a severity greater than or equal to the specified value.
|
181
208
|
:param str vulnerability_audit_id: Unique Vulnerability Audit identifier path parameter.
|
182
209
|
:param str vulnerability_id: A filter to return only Vulnerability Audits that match the specified id.
|
183
210
|
"""
|
@@ -187,7 +214,9 @@ def get_vulnerability_audit_application_dependency_vulnerabilities(cvss_v2greate
|
|
187
214
|
__args__['depth'] = depth
|
188
215
|
__args__['filters'] = filters
|
189
216
|
__args__['gav'] = gav
|
217
|
+
__args__['purl'] = purl
|
190
218
|
__args__['rootNodeId'] = root_node_id
|
219
|
+
__args__['severityGreaterThanOrEqual'] = severity_greater_than_or_equal
|
191
220
|
__args__['sortBy'] = sort_by
|
192
221
|
__args__['vulnerabilityAuditId'] = vulnerability_audit_id
|
193
222
|
__args__['vulnerabilityId'] = vulnerability_id
|
@@ -202,7 +231,9 @@ def get_vulnerability_audit_application_dependency_vulnerabilities(cvss_v2greate
|
|
202
231
|
filters=pulumi.get(__ret__, 'filters'),
|
203
232
|
gav=pulumi.get(__ret__, 'gav'),
|
204
233
|
id=pulumi.get(__ret__, 'id'),
|
234
|
+
purl=pulumi.get(__ret__, 'purl'),
|
205
235
|
root_node_id=pulumi.get(__ret__, 'root_node_id'),
|
236
|
+
severity_greater_than_or_equal=pulumi.get(__ret__, 'severity_greater_than_or_equal'),
|
206
237
|
sort_by=pulumi.get(__ret__, 'sort_by'),
|
207
238
|
vulnerability_audit_id=pulumi.get(__ret__, 'vulnerability_audit_id'),
|
208
239
|
vulnerability_id=pulumi.get(__ret__, 'vulnerability_id'))
|
@@ -214,7 +245,9 @@ def get_vulnerability_audit_application_dependency_vulnerabilities_output(cvss_v
|
|
214
245
|
depth: Optional[pulumi.Input[Optional[int]]] = None,
|
215
246
|
filters: Optional[pulumi.Input[Optional[Sequence[pulumi.InputType['GetVulnerabilityAuditApplicationDependencyVulnerabilitiesFilterArgs']]]]] = None,
|
216
247
|
gav: Optional[pulumi.Input[Optional[str]]] = None,
|
248
|
+
purl: Optional[pulumi.Input[Optional[str]]] = None,
|
217
249
|
root_node_id: Optional[pulumi.Input[Optional[str]]] = None,
|
250
|
+
severity_greater_than_or_equal: Optional[pulumi.Input[Optional[str]]] = None,
|
218
251
|
sort_by: Optional[pulumi.Input[Optional[str]]] = None,
|
219
252
|
vulnerability_audit_id: Optional[pulumi.Input[str]] = None,
|
220
253
|
vulnerability_id: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -235,16 +268,20 @@ def get_vulnerability_audit_application_dependency_vulnerabilities_output(cvss_v
|
|
235
268
|
cvss_v3greater_than_or_equal=var["vulnerability_audit_application_dependency_vulnerability_cvss_v3greater_than_or_equal"],
|
236
269
|
depth=var["vulnerability_audit_application_dependency_vulnerability_depth"],
|
237
270
|
gav=var["vulnerability_audit_application_dependency_vulnerability_gav"],
|
271
|
+
purl=var["vulnerability_audit_application_dependency_vulnerability_purl"],
|
238
272
|
root_node_id=oci_adm_root_node["test_root_node"]["id"],
|
273
|
+
severity_greater_than_or_equal=var["vulnerability_audit_application_dependency_vulnerability_severity_greater_than_or_equal"],
|
239
274
|
vulnerability_id=oci_adm_vulnerability["test_vulnerability"]["id"])
|
240
275
|
```
|
241
276
|
|
242
277
|
|
243
|
-
:param float cvss_v2greater_than_or_equal: A filter that returns only
|
244
|
-
:param float cvss_v3greater_than_or_equal: A filter that returns only
|
278
|
+
:param float cvss_v2greater_than_or_equal: A filter that returns only Vulnerabilities that have a Common Vulnerability Scoring System Version 2 (CVSS V2) greater than or equal to the specified value.
|
279
|
+
:param float cvss_v3greater_than_or_equal: A filter that returns only Vulnerabilities that have a Common Vulnerability Scoring System Version 3 (CVSS V3) greater than or equal to the specified value.
|
245
280
|
:param int depth: A filter to limit depth of the application dependencies tree traversal. Additionally query parameters such as "cvssV2GreaterThanOrEqual", "cvssV3GreaterThanOrEqual", "gav" and "vulnerabilityId" can't be used in conjunction with this latter.
|
246
281
|
:param str gav: A filter to return only resources that match the entire GAV (Group Artifact Version) identifier given.
|
282
|
+
:param str purl: A filter to return only resources that match the entire PURL given (https://github.com/package-url/purl-spec/).
|
247
283
|
:param str root_node_id: A filter to override the top level root identifier with the new given value. The application dependency tree will only be traversed from the given node. Query parameters "cvssV2GreaterThanOrEqual", "cvssV3GreaterThanOrEqual", "gav" and "vulnerabilityId" cannot be used in conjunction with this parameter.
|
284
|
+
:param str severity_greater_than_or_equal: A filter that returns only Vulnerabilities that have a severity greater than or equal to the specified value.
|
248
285
|
:param str vulnerability_audit_id: Unique Vulnerability Audit identifier path parameter.
|
249
286
|
:param str vulnerability_id: A filter to return only Vulnerability Audits that match the specified id.
|
250
287
|
"""
|
@@ -22,7 +22,7 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilityResult:
|
|
22
22
|
"""
|
23
23
|
A collection of values returned by getVulnerabilityAuditApplicationDependencyVulnerability.
|
24
24
|
"""
|
25
|
-
def __init__(__self__, cvss_v2greater_than_or_equal=None, cvss_v3greater_than_or_equal=None, depth=None, gav=None, id=None, items=None, root_node_id=None, sort_by=None, vulnerability_audit_id=None, vulnerability_id=None):
|
25
|
+
def __init__(__self__, cvss_v2greater_than_or_equal=None, cvss_v3greater_than_or_equal=None, depth=None, gav=None, id=None, items=None, purl=None, root_node_id=None, severity_greater_than_or_equal=None, sort_by=None, vulnerability_audit_id=None, vulnerability_id=None):
|
26
26
|
if cvss_v2greater_than_or_equal and not isinstance(cvss_v2greater_than_or_equal, float):
|
27
27
|
raise TypeError("Expected argument 'cvss_v2greater_than_or_equal' to be a float")
|
28
28
|
pulumi.set(__self__, "cvss_v2greater_than_or_equal", cvss_v2greater_than_or_equal)
|
@@ -41,9 +41,15 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilityResult:
|
|
41
41
|
if items and not isinstance(items, list):
|
42
42
|
raise TypeError("Expected argument 'items' to be a list")
|
43
43
|
pulumi.set(__self__, "items", items)
|
44
|
+
if purl and not isinstance(purl, str):
|
45
|
+
raise TypeError("Expected argument 'purl' to be a str")
|
46
|
+
pulumi.set(__self__, "purl", purl)
|
44
47
|
if root_node_id and not isinstance(root_node_id, str):
|
45
48
|
raise TypeError("Expected argument 'root_node_id' to be a str")
|
46
49
|
pulumi.set(__self__, "root_node_id", root_node_id)
|
50
|
+
if severity_greater_than_or_equal and not isinstance(severity_greater_than_or_equal, str):
|
51
|
+
raise TypeError("Expected argument 'severity_greater_than_or_equal' to be a str")
|
52
|
+
pulumi.set(__self__, "severity_greater_than_or_equal", severity_greater_than_or_equal)
|
47
53
|
if sort_by and not isinstance(sort_by, str):
|
48
54
|
raise TypeError("Expected argument 'sort_by' to be a str")
|
49
55
|
pulumi.set(__self__, "sort_by", sort_by)
|
@@ -93,11 +99,21 @@ class GetVulnerabilityAuditApplicationDependencyVulnerabilityResult:
|
|
93
99
|
"""
|
94
100
|
return pulumi.get(self, "items")
|
95
101
|
|
102
|
+
@property
|
103
|
+
@pulumi.getter
|
104
|
+
def purl(self) -> Optional[str]:
|
105
|
+
return pulumi.get(self, "purl")
|
106
|
+
|
96
107
|
@property
|
97
108
|
@pulumi.getter(name="rootNodeId")
|
98
109
|
def root_node_id(self) -> Optional[str]:
|
99
110
|
return pulumi.get(self, "root_node_id")
|
100
111
|
|
112
|
+
@property
|
113
|
+
@pulumi.getter(name="severityGreaterThanOrEqual")
|
114
|
+
def severity_greater_than_or_equal(self) -> Optional[str]:
|
115
|
+
return pulumi.get(self, "severity_greater_than_or_equal")
|
116
|
+
|
101
117
|
@property
|
102
118
|
@pulumi.getter(name="sortBy")
|
103
119
|
def sort_by(self) -> Optional[str]:
|
@@ -126,7 +142,9 @@ class AwaitableGetVulnerabilityAuditApplicationDependencyVulnerabilityResult(Get
|
|
126
142
|
gav=self.gav,
|
127
143
|
id=self.id,
|
128
144
|
items=self.items,
|
145
|
+
purl=self.purl,
|
129
146
|
root_node_id=self.root_node_id,
|
147
|
+
severity_greater_than_or_equal=self.severity_greater_than_or_equal,
|
130
148
|
sort_by=self.sort_by,
|
131
149
|
vulnerability_audit_id=self.vulnerability_audit_id,
|
132
150
|
vulnerability_id=self.vulnerability_id)
|
@@ -136,7 +154,9 @@ def get_vulnerability_audit_application_dependency_vulnerability(cvss_v2greater_
|
|
136
154
|
cvss_v3greater_than_or_equal: Optional[float] = None,
|
137
155
|
depth: Optional[int] = None,
|
138
156
|
gav: Optional[str] = None,
|
157
|
+
purl: Optional[str] = None,
|
139
158
|
root_node_id: Optional[str] = None,
|
159
|
+
severity_greater_than_or_equal: Optional[str] = None,
|
140
160
|
sort_by: Optional[str] = None,
|
141
161
|
vulnerability_audit_id: Optional[str] = None,
|
142
162
|
vulnerability_id: Optional[str] = None,
|
@@ -175,7 +195,9 @@ def get_vulnerability_audit_application_dependency_vulnerability(cvss_v2greater_
|
|
175
195
|
__args__['cvssV3greaterThanOrEqual'] = cvss_v3greater_than_or_equal
|
176
196
|
__args__['depth'] = depth
|
177
197
|
__args__['gav'] = gav
|
198
|
+
__args__['purl'] = purl
|
178
199
|
__args__['rootNodeId'] = root_node_id
|
200
|
+
__args__['severityGreaterThanOrEqual'] = severity_greater_than_or_equal
|
179
201
|
__args__['sortBy'] = sort_by
|
180
202
|
__args__['vulnerabilityAuditId'] = vulnerability_audit_id
|
181
203
|
__args__['vulnerabilityId'] = vulnerability_id
|
@@ -189,7 +211,9 @@ def get_vulnerability_audit_application_dependency_vulnerability(cvss_v2greater_
|
|
189
211
|
gav=pulumi.get(__ret__, 'gav'),
|
190
212
|
id=pulumi.get(__ret__, 'id'),
|
191
213
|
items=pulumi.get(__ret__, 'items'),
|
214
|
+
purl=pulumi.get(__ret__, 'purl'),
|
192
215
|
root_node_id=pulumi.get(__ret__, 'root_node_id'),
|
216
|
+
severity_greater_than_or_equal=pulumi.get(__ret__, 'severity_greater_than_or_equal'),
|
193
217
|
sort_by=pulumi.get(__ret__, 'sort_by'),
|
194
218
|
vulnerability_audit_id=pulumi.get(__ret__, 'vulnerability_audit_id'),
|
195
219
|
vulnerability_id=pulumi.get(__ret__, 'vulnerability_id'))
|
@@ -200,7 +224,9 @@ def get_vulnerability_audit_application_dependency_vulnerability_output(cvss_v2g
|
|
200
224
|
cvss_v3greater_than_or_equal: Optional[pulumi.Input[Optional[float]]] = None,
|
201
225
|
depth: Optional[pulumi.Input[Optional[int]]] = None,
|
202
226
|
gav: Optional[pulumi.Input[Optional[str]]] = None,
|
227
|
+
purl: Optional[pulumi.Input[Optional[str]]] = None,
|
203
228
|
root_node_id: Optional[pulumi.Input[Optional[str]]] = None,
|
229
|
+
severity_greater_than_or_equal: Optional[pulumi.Input[Optional[str]]] = None,
|
204
230
|
sort_by: Optional[pulumi.Input[Optional[str]]] = None,
|
205
231
|
vulnerability_audit_id: Optional[pulumi.Input[str]] = None,
|
206
232
|
vulnerability_id: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -23,7 +23,7 @@ class GetVulnerabilityAuditsResult:
|
|
23
23
|
"""
|
24
24
|
A collection of values returned by getVulnerabilityAudits.
|
25
25
|
"""
|
26
|
-
def __init__(__self__, compartment_id=None, display_name=None, filters=None, id=None, is_success=None, knowledge_base_id=None, state=None, vulnerability_audit_collections=None):
|
26
|
+
def __init__(__self__, compartment_id=None, display_name=None, filters=None, id=None, is_success=None, knowledge_base_id=None, max_observed_severity_greater_than_or_equal_to=None, state=None, time_created_greater_than_or_equal_to=None, time_created_less_than_or_equal_to=None, vulnerability_audit_collections=None):
|
27
27
|
if compartment_id and not isinstance(compartment_id, str):
|
28
28
|
raise TypeError("Expected argument 'compartment_id' to be a str")
|
29
29
|
pulumi.set(__self__, "compartment_id", compartment_id)
|
@@ -42,9 +42,18 @@ class GetVulnerabilityAuditsResult:
|
|
42
42
|
if knowledge_base_id and not isinstance(knowledge_base_id, str):
|
43
43
|
raise TypeError("Expected argument 'knowledge_base_id' to be a str")
|
44
44
|
pulumi.set(__self__, "knowledge_base_id", knowledge_base_id)
|
45
|
+
if max_observed_severity_greater_than_or_equal_to and not isinstance(max_observed_severity_greater_than_or_equal_to, str):
|
46
|
+
raise TypeError("Expected argument 'max_observed_severity_greater_than_or_equal_to' to be a str")
|
47
|
+
pulumi.set(__self__, "max_observed_severity_greater_than_or_equal_to", max_observed_severity_greater_than_or_equal_to)
|
45
48
|
if state and not isinstance(state, str):
|
46
49
|
raise TypeError("Expected argument 'state' to be a str")
|
47
50
|
pulumi.set(__self__, "state", state)
|
51
|
+
if time_created_greater_than_or_equal_to and not isinstance(time_created_greater_than_or_equal_to, str):
|
52
|
+
raise TypeError("Expected argument 'time_created_greater_than_or_equal_to' to be a str")
|
53
|
+
pulumi.set(__self__, "time_created_greater_than_or_equal_to", time_created_greater_than_or_equal_to)
|
54
|
+
if time_created_less_than_or_equal_to and not isinstance(time_created_less_than_or_equal_to, str):
|
55
|
+
raise TypeError("Expected argument 'time_created_less_than_or_equal_to' to be a str")
|
56
|
+
pulumi.set(__self__, "time_created_less_than_or_equal_to", time_created_less_than_or_equal_to)
|
48
57
|
if vulnerability_audit_collections and not isinstance(vulnerability_audit_collections, list):
|
49
58
|
raise TypeError("Expected argument 'vulnerability_audit_collections' to be a list")
|
50
59
|
pulumi.set(__self__, "vulnerability_audit_collections", vulnerability_audit_collections)
|
@@ -94,6 +103,11 @@ class GetVulnerabilityAuditsResult:
|
|
94
103
|
"""
|
95
104
|
return pulumi.get(self, "knowledge_base_id")
|
96
105
|
|
106
|
+
@property
|
107
|
+
@pulumi.getter(name="maxObservedSeverityGreaterThanOrEqualTo")
|
108
|
+
def max_observed_severity_greater_than_or_equal_to(self) -> Optional[str]:
|
109
|
+
return pulumi.get(self, "max_observed_severity_greater_than_or_equal_to")
|
110
|
+
|
97
111
|
@property
|
98
112
|
@pulumi.getter
|
99
113
|
def state(self) -> Optional[str]:
|
@@ -102,6 +116,16 @@ class GetVulnerabilityAuditsResult:
|
|
102
116
|
"""
|
103
117
|
return pulumi.get(self, "state")
|
104
118
|
|
119
|
+
@property
|
120
|
+
@pulumi.getter(name="timeCreatedGreaterThanOrEqualTo")
|
121
|
+
def time_created_greater_than_or_equal_to(self) -> Optional[str]:
|
122
|
+
return pulumi.get(self, "time_created_greater_than_or_equal_to")
|
123
|
+
|
124
|
+
@property
|
125
|
+
@pulumi.getter(name="timeCreatedLessThanOrEqualTo")
|
126
|
+
def time_created_less_than_or_equal_to(self) -> Optional[str]:
|
127
|
+
return pulumi.get(self, "time_created_less_than_or_equal_to")
|
128
|
+
|
105
129
|
@property
|
106
130
|
@pulumi.getter(name="vulnerabilityAuditCollections")
|
107
131
|
def vulnerability_audit_collections(self) -> Sequence['outputs.GetVulnerabilityAuditsVulnerabilityAuditCollectionResult']:
|
@@ -123,7 +147,10 @@ class AwaitableGetVulnerabilityAuditsResult(GetVulnerabilityAuditsResult):
|
|
123
147
|
id=self.id,
|
124
148
|
is_success=self.is_success,
|
125
149
|
knowledge_base_id=self.knowledge_base_id,
|
150
|
+
max_observed_severity_greater_than_or_equal_to=self.max_observed_severity_greater_than_or_equal_to,
|
126
151
|
state=self.state,
|
152
|
+
time_created_greater_than_or_equal_to=self.time_created_greater_than_or_equal_to,
|
153
|
+
time_created_less_than_or_equal_to=self.time_created_less_than_or_equal_to,
|
127
154
|
vulnerability_audit_collections=self.vulnerability_audit_collections)
|
128
155
|
|
129
156
|
|
@@ -133,7 +160,10 @@ def get_vulnerability_audits(compartment_id: Optional[str] = None,
|
|
133
160
|
id: Optional[str] = None,
|
134
161
|
is_success: Optional[bool] = None,
|
135
162
|
knowledge_base_id: Optional[str] = None,
|
163
|
+
max_observed_severity_greater_than_or_equal_to: Optional[str] = None,
|
136
164
|
state: Optional[str] = None,
|
165
|
+
time_created_greater_than_or_equal_to: Optional[str] = None,
|
166
|
+
time_created_less_than_or_equal_to: Optional[str] = None,
|
137
167
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetVulnerabilityAuditsResult:
|
138
168
|
"""
|
139
169
|
This data source provides the list of Vulnerability Audits in Oracle Cloud Infrastructure ADM service.
|
@@ -152,7 +182,10 @@ def get_vulnerability_audits(compartment_id: Optional[str] = None,
|
|
152
182
|
id=var["vulnerability_audit_id"],
|
153
183
|
is_success=var["vulnerability_audit_is_success"],
|
154
184
|
knowledge_base_id=oci_adm_knowledge_base["test_knowledge_base"]["id"],
|
155
|
-
|
185
|
+
max_observed_severity_greater_than_or_equal_to=var["vulnerability_audit_max_observed_severity_greater_than_or_equal_to"],
|
186
|
+
state=var["vulnerability_audit_state"],
|
187
|
+
time_created_greater_than_or_equal_to=var["vulnerability_audit_time_created_greater_than_or_equal_to"],
|
188
|
+
time_created_less_than_or_equal_to=var["vulnerability_audit_time_created_less_than_or_equal_to"])
|
156
189
|
```
|
157
190
|
|
158
191
|
|
@@ -161,7 +194,10 @@ def get_vulnerability_audits(compartment_id: Optional[str] = None,
|
|
161
194
|
:param str id: A filter to return only resources that match the specified identifier. Required only if the compartmentId query parameter is not specified.
|
162
195
|
:param bool is_success: A filter to return only successful or failed Vulnerability Audits.
|
163
196
|
:param str knowledge_base_id: A filter to return only Vulnerability Audits that were created against the specified knowledge base.
|
197
|
+
:param str max_observed_severity_greater_than_or_equal_to: A filter that returns only Vulnerability Audits that have a maximum observed Severity greater than or equal to the specified value.
|
164
198
|
:param str state: A filter to return only Vulnerability Audits that match the specified lifecycleState.
|
199
|
+
:param str time_created_greater_than_or_equal_to: A filter to return only Vulnerability Audits with timeCreated greater or equal to the specified value.
|
200
|
+
:param str time_created_less_than_or_equal_to: A filter to return only Vulnerability Audits with timeCreated less or equal to the specified value.
|
165
201
|
"""
|
166
202
|
__args__ = dict()
|
167
203
|
__args__['compartmentId'] = compartment_id
|
@@ -170,7 +206,10 @@ def get_vulnerability_audits(compartment_id: Optional[str] = None,
|
|
170
206
|
__args__['id'] = id
|
171
207
|
__args__['isSuccess'] = is_success
|
172
208
|
__args__['knowledgeBaseId'] = knowledge_base_id
|
209
|
+
__args__['maxObservedSeverityGreaterThanOrEqualTo'] = max_observed_severity_greater_than_or_equal_to
|
173
210
|
__args__['state'] = state
|
211
|
+
__args__['timeCreatedGreaterThanOrEqualTo'] = time_created_greater_than_or_equal_to
|
212
|
+
__args__['timeCreatedLessThanOrEqualTo'] = time_created_less_than_or_equal_to
|
174
213
|
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
175
214
|
__ret__ = pulumi.runtime.invoke('oci:Adm/getVulnerabilityAudits:getVulnerabilityAudits', __args__, opts=opts, typ=GetVulnerabilityAuditsResult).value
|
176
215
|
|
@@ -181,7 +220,10 @@ def get_vulnerability_audits(compartment_id: Optional[str] = None,
|
|
181
220
|
id=pulumi.get(__ret__, 'id'),
|
182
221
|
is_success=pulumi.get(__ret__, 'is_success'),
|
183
222
|
knowledge_base_id=pulumi.get(__ret__, 'knowledge_base_id'),
|
223
|
+
max_observed_severity_greater_than_or_equal_to=pulumi.get(__ret__, 'max_observed_severity_greater_than_or_equal_to'),
|
184
224
|
state=pulumi.get(__ret__, 'state'),
|
225
|
+
time_created_greater_than_or_equal_to=pulumi.get(__ret__, 'time_created_greater_than_or_equal_to'),
|
226
|
+
time_created_less_than_or_equal_to=pulumi.get(__ret__, 'time_created_less_than_or_equal_to'),
|
185
227
|
vulnerability_audit_collections=pulumi.get(__ret__, 'vulnerability_audit_collections'))
|
186
228
|
|
187
229
|
|
@@ -192,7 +234,10 @@ def get_vulnerability_audits_output(compartment_id: Optional[pulumi.Input[Option
|
|
192
234
|
id: Optional[pulumi.Input[Optional[str]]] = None,
|
193
235
|
is_success: Optional[pulumi.Input[Optional[bool]]] = None,
|
194
236
|
knowledge_base_id: Optional[pulumi.Input[Optional[str]]] = None,
|
237
|
+
max_observed_severity_greater_than_or_equal_to: Optional[pulumi.Input[Optional[str]]] = None,
|
195
238
|
state: Optional[pulumi.Input[Optional[str]]] = None,
|
239
|
+
time_created_greater_than_or_equal_to: Optional[pulumi.Input[Optional[str]]] = None,
|
240
|
+
time_created_less_than_or_equal_to: Optional[pulumi.Input[Optional[str]]] = None,
|
196
241
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetVulnerabilityAuditsResult]:
|
197
242
|
"""
|
198
243
|
This data source provides the list of Vulnerability Audits in Oracle Cloud Infrastructure ADM service.
|
@@ -211,7 +256,10 @@ def get_vulnerability_audits_output(compartment_id: Optional[pulumi.Input[Option
|
|
211
256
|
id=var["vulnerability_audit_id"],
|
212
257
|
is_success=var["vulnerability_audit_is_success"],
|
213
258
|
knowledge_base_id=oci_adm_knowledge_base["test_knowledge_base"]["id"],
|
214
|
-
|
259
|
+
max_observed_severity_greater_than_or_equal_to=var["vulnerability_audit_max_observed_severity_greater_than_or_equal_to"],
|
260
|
+
state=var["vulnerability_audit_state"],
|
261
|
+
time_created_greater_than_or_equal_to=var["vulnerability_audit_time_created_greater_than_or_equal_to"],
|
262
|
+
time_created_less_than_or_equal_to=var["vulnerability_audit_time_created_less_than_or_equal_to"])
|
215
263
|
```
|
216
264
|
|
217
265
|
|
@@ -220,6 +268,9 @@ def get_vulnerability_audits_output(compartment_id: Optional[pulumi.Input[Option
|
|
220
268
|
:param str id: A filter to return only resources that match the specified identifier. Required only if the compartmentId query parameter is not specified.
|
221
269
|
:param bool is_success: A filter to return only successful or failed Vulnerability Audits.
|
222
270
|
:param str knowledge_base_id: A filter to return only Vulnerability Audits that were created against the specified knowledge base.
|
271
|
+
:param str max_observed_severity_greater_than_or_equal_to: A filter that returns only Vulnerability Audits that have a maximum observed Severity greater than or equal to the specified value.
|
223
272
|
:param str state: A filter to return only Vulnerability Audits that match the specified lifecycleState.
|
273
|
+
:param str time_created_greater_than_or_equal_to: A filter to return only Vulnerability Audits with timeCreated greater or equal to the specified value.
|
274
|
+
:param str time_created_less_than_or_equal_to: A filter to return only Vulnerability Audits with timeCreated less or equal to the specified value.
|
224
275
|
"""
|
225
276
|
...
|