pulumi-oci 1.19.0a1705693078__py3-none-any.whl → 1.20.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_oci/__init__.py +59 -0
- pulumi_oci/adm/_inputs.py +99 -18
- pulumi_oci/adm/get_remediation_run_application_dependency_recommendations.py +23 -3
- pulumi_oci/adm/get_vulnerability_audit.py +31 -5
- pulumi_oci/adm/get_vulnerability_audit_application_dependency_vulnerabilities.py +43 -6
- pulumi_oci/adm/get_vulnerability_audit_application_dependency_vulnerability.py +27 -1
- pulumi_oci/adm/get_vulnerability_audits.py +54 -3
- pulumi_oci/adm/outputs.py +296 -31
- pulumi_oci/adm/remediation_recipe.py +2 -0
- pulumi_oci/adm/vulnerability_audit.py +96 -37
- pulumi_oci/database/__init__.py +1 -0
- pulumi_oci/database/_inputs.py +40 -0
- pulumi_oci/database/cloud_vm_cluster.py +22 -1
- pulumi_oci/database/get_system_versions.py +173 -0
- pulumi_oci/database/outputs.py +88 -0
- pulumi_oci/database/vm_cluster.py +22 -1
- pulumi_oci/datasafe/__init__.py +22 -0
- pulumi_oci/datasafe/_inputs.py +1826 -161
- pulumi_oci/datasafe/audit_trail.py +140 -0
- pulumi_oci/datasafe/discovery_mod.py +7 -7
- pulumi_oci/datasafe/get_audit_trail.py +66 -1
- pulumi_oci/datasafe/get_discovery_job.py +1 -1
- pulumi_oci/datasafe/get_discovery_jobs_result.py +1 -1
- pulumi_oci/datasafe/get_discovery_jobs_results.py +1 -1
- pulumi_oci/datasafe/get_masking_policies_masking_column.py +1 -1
- pulumi_oci/datasafe/get_masking_policies_masking_columns.py +1 -1
- pulumi_oci/datasafe/get_masking_policy.py +1 -1
- pulumi_oci/datasafe/get_report.py +1 -1
- pulumi_oci/datasafe/get_security_assessment.py +3 -3
- pulumi_oci/datasafe/get_security_assessment_comparison.py +5 -5
- pulumi_oci/datasafe/get_security_assessment_finding.py +29 -3
- pulumi_oci/datasafe/get_security_assessment_finding_analytics.py +276 -0
- pulumi_oci/datasafe/get_security_assessment_findings.py +43 -7
- pulumi_oci/datasafe/get_security_assessment_findings_change_audit_logs.py +309 -0
- pulumi_oci/datasafe/get_security_assessment_security_feature_analytics.py +198 -0
- pulumi_oci/datasafe/get_security_assessment_security_features.py +377 -0
- pulumi_oci/datasafe/get_security_assessments.py +2 -2
- pulumi_oci/datasafe/get_security_policies.py +253 -0
- pulumi_oci/datasafe/get_security_policy.py +235 -0
- pulumi_oci/datasafe/get_security_policy_deployment.py +261 -0
- pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_state.py +165 -0
- pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_states.py +180 -0
- pulumi_oci/datasafe/get_security_policy_deployments.py +293 -0
- pulumi_oci/datasafe/get_security_policy_report.py +248 -0
- pulumi_oci/datasafe/get_security_policy_report_database_table_access_entries.py +158 -0
- pulumi_oci/datasafe/get_security_policy_report_database_table_access_entry.py +408 -0
- pulumi_oci/datasafe/get_security_policy_report_database_view_access_entries.py +178 -0
- pulumi_oci/datasafe/get_security_policy_report_database_view_access_entry.py +382 -0
- pulumi_oci/datasafe/get_security_policy_report_role_grant_paths.py +177 -0
- pulumi_oci/datasafe/get_security_policy_reports.py +273 -0
- pulumi_oci/datasafe/get_sensitive_data_model.py +1 -1
- pulumi_oci/datasafe/get_target_database.py +27 -4
- pulumi_oci/datasafe/get_target_database_peer_target_database.py +263 -0
- pulumi_oci/datasafe/get_target_database_peer_target_databases.py +133 -0
- pulumi_oci/datasafe/get_target_databases.py +1 -1
- pulumi_oci/datasafe/get_user_assessment.py +5 -5
- pulumi_oci/datasafe/get_user_assessment_comparison.py +2 -2
- pulumi_oci/datasafe/get_user_assessment_user_access_analytics.py +133 -0
- pulumi_oci/datasafe/get_user_assessment_user_analytics.py +2 -2
- pulumi_oci/datasafe/get_user_assessment_users.py +42 -2
- pulumi_oci/datasafe/get_user_assessments.py +2 -2
- pulumi_oci/datasafe/masking_policies_masking_column.py +7 -7
- pulumi_oci/datasafe/masking_policy.py +9 -9
- pulumi_oci/datasafe/outputs.py +16686 -9777
- pulumi_oci/datasafe/report.py +559 -0
- pulumi_oci/datasafe/security_assessment.py +12 -12
- pulumi_oci/datasafe/sensitive_data_model.py +7 -7
- pulumi_oci/datasafe/set_security_assessment_baseline.py +7 -7
- pulumi_oci/datasafe/set_user_assessment_baseline.py +7 -7
- pulumi_oci/datasafe/target_database.py +146 -25
- pulumi_oci/datasafe/target_database_peer_target_database.py +634 -0
- pulumi_oci/datasafe/user_assessment.py +20 -20
- pulumi_oci/generativeai/__init__.py +18 -0
- pulumi_oci/generativeai/_inputs.py +534 -0
- pulumi_oci/generativeai/dedicated_ai_cluster.py +808 -0
- pulumi_oci/generativeai/endpoint.py +717 -0
- pulumi_oci/generativeai/get_dedicated_ai_cluster.py +288 -0
- pulumi_oci/generativeai/get_dedicated_ai_clusters.py +183 -0
- pulumi_oci/generativeai/get_endpoint.py +275 -0
- pulumi_oci/generativeai/get_endpoints.py +183 -0
- pulumi_oci/generativeai/get_model.py +353 -0
- pulumi_oci/generativeai/get_models.py +220 -0
- pulumi_oci/generativeai/model.py +858 -0
- pulumi_oci/generativeai/outputs.py +1721 -0
- pulumi_oci/marketplace/get_publication.py +14 -1
- pulumi_oci/marketplace/outputs.py +11 -0
- pulumi_oci/marketplace/publication.py +28 -0
- pulumi_oci/monitoring/__init__.py +3 -0
- pulumi_oci/monitoring/_inputs.py +82 -4
- pulumi_oci/monitoring/alarm.py +15 -15
- pulumi_oci/monitoring/alarm_suppression.py +745 -0
- pulumi_oci/monitoring/get_alarm.py +5 -5
- pulumi_oci/monitoring/get_alarm_history_collection.py +4 -4
- pulumi_oci/monitoring/get_alarm_statuses.py +3 -1
- pulumi_oci/monitoring/get_alarm_suppression.py +276 -0
- pulumi_oci/monitoring/get_alarm_suppressions.py +192 -0
- pulumi_oci/monitoring/get_metric_data.py +12 -8
- pulumi_oci/monitoring/get_metrics.py +2 -2
- pulumi_oci/monitoring/outputs.py +355 -50
- pulumi_oci/networkfirewall/_inputs.py +25 -20
- pulumi_oci/networkfirewall/outputs.py +40 -30
- pulumi_oci/stackmonitoring/__init__.py +3 -0
- pulumi_oci/stackmonitoring/_inputs.py +143 -0
- pulumi_oci/stackmonitoring/get_process_set.py +236 -0
- pulumi_oci/stackmonitoring/get_process_sets.py +156 -0
- pulumi_oci/stackmonitoring/outputs.py +422 -0
- pulumi_oci/stackmonitoring/process_set.py +548 -0
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/METADATA +1 -1
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/RECORD +111 -70
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/WHEEL +0 -0
- {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,309 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import pulumi
|
8
|
+
import pulumi.runtime
|
9
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
10
|
+
from .. import _utilities
|
11
|
+
from . import outputs
|
12
|
+
from ._inputs import *
|
13
|
+
|
14
|
+
__all__ = [
|
15
|
+
'GetSecurityAssessmentFindingsChangeAuditLogsResult',
|
16
|
+
'AwaitableGetSecurityAssessmentFindingsChangeAuditLogsResult',
|
17
|
+
'get_security_assessment_findings_change_audit_logs',
|
18
|
+
'get_security_assessment_findings_change_audit_logs_output',
|
19
|
+
]
|
20
|
+
|
21
|
+
@pulumi.output_type
|
22
|
+
class GetSecurityAssessmentFindingsChangeAuditLogsResult:
|
23
|
+
"""
|
24
|
+
A collection of values returned by getSecurityAssessmentFindingsChangeAuditLogs.
|
25
|
+
"""
|
26
|
+
def __init__(__self__, filters=None, finding_key=None, finding_title=None, findings_change_audit_log_collections=None, id=None, is_risk_deferred=None, modified_by=None, security_assessment_id=None, severity=None, time_updated_greater_than_or_equal_to=None, time_updated_less_than=None, time_valid_until_greater_than_or_equal_to=None, time_valid_until_less_than=None):
|
27
|
+
if filters and not isinstance(filters, list):
|
28
|
+
raise TypeError("Expected argument 'filters' to be a list")
|
29
|
+
pulumi.set(__self__, "filters", filters)
|
30
|
+
if finding_key and not isinstance(finding_key, str):
|
31
|
+
raise TypeError("Expected argument 'finding_key' to be a str")
|
32
|
+
pulumi.set(__self__, "finding_key", finding_key)
|
33
|
+
if finding_title and not isinstance(finding_title, str):
|
34
|
+
raise TypeError("Expected argument 'finding_title' to be a str")
|
35
|
+
pulumi.set(__self__, "finding_title", finding_title)
|
36
|
+
if findings_change_audit_log_collections and not isinstance(findings_change_audit_log_collections, list):
|
37
|
+
raise TypeError("Expected argument 'findings_change_audit_log_collections' to be a list")
|
38
|
+
pulumi.set(__self__, "findings_change_audit_log_collections", findings_change_audit_log_collections)
|
39
|
+
if id and not isinstance(id, str):
|
40
|
+
raise TypeError("Expected argument 'id' to be a str")
|
41
|
+
pulumi.set(__self__, "id", id)
|
42
|
+
if is_risk_deferred and not isinstance(is_risk_deferred, bool):
|
43
|
+
raise TypeError("Expected argument 'is_risk_deferred' to be a bool")
|
44
|
+
pulumi.set(__self__, "is_risk_deferred", is_risk_deferred)
|
45
|
+
if modified_by and not isinstance(modified_by, str):
|
46
|
+
raise TypeError("Expected argument 'modified_by' to be a str")
|
47
|
+
pulumi.set(__self__, "modified_by", modified_by)
|
48
|
+
if security_assessment_id and not isinstance(security_assessment_id, str):
|
49
|
+
raise TypeError("Expected argument 'security_assessment_id' to be a str")
|
50
|
+
pulumi.set(__self__, "security_assessment_id", security_assessment_id)
|
51
|
+
if severity and not isinstance(severity, str):
|
52
|
+
raise TypeError("Expected argument 'severity' to be a str")
|
53
|
+
pulumi.set(__self__, "severity", severity)
|
54
|
+
if time_updated_greater_than_or_equal_to and not isinstance(time_updated_greater_than_or_equal_to, str):
|
55
|
+
raise TypeError("Expected argument 'time_updated_greater_than_or_equal_to' to be a str")
|
56
|
+
pulumi.set(__self__, "time_updated_greater_than_or_equal_to", time_updated_greater_than_or_equal_to)
|
57
|
+
if time_updated_less_than and not isinstance(time_updated_less_than, str):
|
58
|
+
raise TypeError("Expected argument 'time_updated_less_than' to be a str")
|
59
|
+
pulumi.set(__self__, "time_updated_less_than", time_updated_less_than)
|
60
|
+
if time_valid_until_greater_than_or_equal_to and not isinstance(time_valid_until_greater_than_or_equal_to, str):
|
61
|
+
raise TypeError("Expected argument 'time_valid_until_greater_than_or_equal_to' to be a str")
|
62
|
+
pulumi.set(__self__, "time_valid_until_greater_than_or_equal_to", time_valid_until_greater_than_or_equal_to)
|
63
|
+
if time_valid_until_less_than and not isinstance(time_valid_until_less_than, str):
|
64
|
+
raise TypeError("Expected argument 'time_valid_until_less_than' to be a str")
|
65
|
+
pulumi.set(__self__, "time_valid_until_less_than", time_valid_until_less_than)
|
66
|
+
|
67
|
+
@property
|
68
|
+
@pulumi.getter
|
69
|
+
def filters(self) -> Optional[Sequence['outputs.GetSecurityAssessmentFindingsChangeAuditLogsFilterResult']]:
|
70
|
+
return pulumi.get(self, "filters")
|
71
|
+
|
72
|
+
@property
|
73
|
+
@pulumi.getter(name="findingKey")
|
74
|
+
def finding_key(self) -> Optional[str]:
|
75
|
+
"""
|
76
|
+
The unique key that identifies the finding.
|
77
|
+
"""
|
78
|
+
return pulumi.get(self, "finding_key")
|
79
|
+
|
80
|
+
@property
|
81
|
+
@pulumi.getter(name="findingTitle")
|
82
|
+
def finding_title(self) -> Optional[str]:
|
83
|
+
"""
|
84
|
+
The short title for the finding whose risk is being modified.
|
85
|
+
"""
|
86
|
+
return pulumi.get(self, "finding_title")
|
87
|
+
|
88
|
+
@property
|
89
|
+
@pulumi.getter(name="findingsChangeAuditLogCollections")
|
90
|
+
def findings_change_audit_log_collections(self) -> Sequence['outputs.GetSecurityAssessmentFindingsChangeAuditLogsFindingsChangeAuditLogCollectionResult']:
|
91
|
+
"""
|
92
|
+
The list of findings_change_audit_log_collection.
|
93
|
+
"""
|
94
|
+
return pulumi.get(self, "findings_change_audit_log_collections")
|
95
|
+
|
96
|
+
@property
|
97
|
+
@pulumi.getter
|
98
|
+
def id(self) -> str:
|
99
|
+
"""
|
100
|
+
The provider-assigned unique ID for this managed resource.
|
101
|
+
"""
|
102
|
+
return pulumi.get(self, "id")
|
103
|
+
|
104
|
+
@property
|
105
|
+
@pulumi.getter(name="isRiskDeferred")
|
106
|
+
def is_risk_deferred(self) -> Optional[bool]:
|
107
|
+
"""
|
108
|
+
Determines if the user has deferred the risk level of this finding when he is ok with it and does not plan to do anything about it.
|
109
|
+
"""
|
110
|
+
return pulumi.get(self, "is_risk_deferred")
|
111
|
+
|
112
|
+
@property
|
113
|
+
@pulumi.getter(name="modifiedBy")
|
114
|
+
def modified_by(self) -> Optional[str]:
|
115
|
+
"""
|
116
|
+
The user who initiated change of risk level of the finding
|
117
|
+
"""
|
118
|
+
return pulumi.get(self, "modified_by")
|
119
|
+
|
120
|
+
@property
|
121
|
+
@pulumi.getter(name="securityAssessmentId")
|
122
|
+
def security_assessment_id(self) -> str:
|
123
|
+
return pulumi.get(self, "security_assessment_id")
|
124
|
+
|
125
|
+
@property
|
126
|
+
@pulumi.getter
|
127
|
+
def severity(self) -> Optional[str]:
|
128
|
+
"""
|
129
|
+
The original severity / risk level of the finding as determined by security assessment.
|
130
|
+
"""
|
131
|
+
return pulumi.get(self, "severity")
|
132
|
+
|
133
|
+
@property
|
134
|
+
@pulumi.getter(name="timeUpdatedGreaterThanOrEqualTo")
|
135
|
+
def time_updated_greater_than_or_equal_to(self) -> Optional[str]:
|
136
|
+
return pulumi.get(self, "time_updated_greater_than_or_equal_to")
|
137
|
+
|
138
|
+
@property
|
139
|
+
@pulumi.getter(name="timeUpdatedLessThan")
|
140
|
+
def time_updated_less_than(self) -> Optional[str]:
|
141
|
+
return pulumi.get(self, "time_updated_less_than")
|
142
|
+
|
143
|
+
@property
|
144
|
+
@pulumi.getter(name="timeValidUntilGreaterThanOrEqualTo")
|
145
|
+
def time_valid_until_greater_than_or_equal_to(self) -> Optional[str]:
|
146
|
+
return pulumi.get(self, "time_valid_until_greater_than_or_equal_to")
|
147
|
+
|
148
|
+
@property
|
149
|
+
@pulumi.getter(name="timeValidUntilLessThan")
|
150
|
+
def time_valid_until_less_than(self) -> Optional[str]:
|
151
|
+
return pulumi.get(self, "time_valid_until_less_than")
|
152
|
+
|
153
|
+
|
154
|
+
class AwaitableGetSecurityAssessmentFindingsChangeAuditLogsResult(GetSecurityAssessmentFindingsChangeAuditLogsResult):
|
155
|
+
# pylint: disable=using-constant-test
|
156
|
+
def __await__(self):
|
157
|
+
if False:
|
158
|
+
yield self
|
159
|
+
return GetSecurityAssessmentFindingsChangeAuditLogsResult(
|
160
|
+
filters=self.filters,
|
161
|
+
finding_key=self.finding_key,
|
162
|
+
finding_title=self.finding_title,
|
163
|
+
findings_change_audit_log_collections=self.findings_change_audit_log_collections,
|
164
|
+
id=self.id,
|
165
|
+
is_risk_deferred=self.is_risk_deferred,
|
166
|
+
modified_by=self.modified_by,
|
167
|
+
security_assessment_id=self.security_assessment_id,
|
168
|
+
severity=self.severity,
|
169
|
+
time_updated_greater_than_or_equal_to=self.time_updated_greater_than_or_equal_to,
|
170
|
+
time_updated_less_than=self.time_updated_less_than,
|
171
|
+
time_valid_until_greater_than_or_equal_to=self.time_valid_until_greater_than_or_equal_to,
|
172
|
+
time_valid_until_less_than=self.time_valid_until_less_than)
|
173
|
+
|
174
|
+
|
175
|
+
def get_security_assessment_findings_change_audit_logs(filters: Optional[Sequence[pulumi.InputType['GetSecurityAssessmentFindingsChangeAuditLogsFilterArgs']]] = None,
|
176
|
+
finding_key: Optional[str] = None,
|
177
|
+
finding_title: Optional[str] = None,
|
178
|
+
is_risk_deferred: Optional[bool] = None,
|
179
|
+
modified_by: Optional[str] = None,
|
180
|
+
security_assessment_id: Optional[str] = None,
|
181
|
+
severity: Optional[str] = None,
|
182
|
+
time_updated_greater_than_or_equal_to: Optional[str] = None,
|
183
|
+
time_updated_less_than: Optional[str] = None,
|
184
|
+
time_valid_until_greater_than_or_equal_to: Optional[str] = None,
|
185
|
+
time_valid_until_less_than: Optional[str] = None,
|
186
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecurityAssessmentFindingsChangeAuditLogsResult:
|
187
|
+
"""
|
188
|
+
This data source provides the list of Security Assessment Findings Change Audit Logs in Oracle Cloud Infrastructure Data Safe service.
|
189
|
+
|
190
|
+
List all changes made by user to risk level of findings of the specified assessment.
|
191
|
+
|
192
|
+
## Example Usage
|
193
|
+
|
194
|
+
```python
|
195
|
+
import pulumi
|
196
|
+
import pulumi_oci as oci
|
197
|
+
|
198
|
+
test_security_assessment_findings_change_audit_logs = oci.DataSafe.get_security_assessment_findings_change_audit_logs(security_assessment_id=oci_data_safe_security_assessment["test_security_assessment"]["id"],
|
199
|
+
finding_key=var["security_assessment_findings_change_audit_log_finding_key"],
|
200
|
+
finding_title=var["security_assessment_findings_change_audit_log_finding_title"],
|
201
|
+
is_risk_deferred=var["security_assessment_findings_change_audit_log_is_risk_deferred"],
|
202
|
+
modified_by=var["security_assessment_findings_change_audit_log_modified_by"],
|
203
|
+
severity=var["security_assessment_findings_change_audit_log_severity"],
|
204
|
+
time_updated_greater_than_or_equal_to=var["security_assessment_findings_change_audit_log_time_updated_greater_than_or_equal_to"],
|
205
|
+
time_updated_less_than=var["security_assessment_findings_change_audit_log_time_updated_less_than"],
|
206
|
+
time_valid_until_greater_than_or_equal_to=var["security_assessment_findings_change_audit_log_time_valid_until_greater_than_or_equal_to"],
|
207
|
+
time_valid_until_less_than=var["security_assessment_findings_change_audit_log_time_valid_until_less_than"])
|
208
|
+
```
|
209
|
+
|
210
|
+
|
211
|
+
:param str finding_key: The unique key that identifies the finding. It is a string and unique within a security assessment.
|
212
|
+
:param str finding_title: The unique title that identifies the finding. It is a string and unique within a security assessment.
|
213
|
+
:param bool is_risk_deferred: A filter to check findings whose risks were deferred by the user.
|
214
|
+
:param str modified_by: A filter to check which user modified the risk level of the finding.
|
215
|
+
:param str security_assessment_id: The OCID of the security assessment.
|
216
|
+
:param str severity: A filter to return only findings of a particular risk level.
|
217
|
+
:param str time_updated_greater_than_or_equal_to: Search for resources that were updated after a specific date. Specifying this parameter corresponding `timeUpdatedGreaterThanOrEqualTo` parameter will retrieve all resources updated after the specified created date, in "YYYY-MM-ddThh:mmZ" format with a Z offset, as defined by RFC 3339.
|
218
|
+
:param str time_updated_less_than: Search for resources that were updated before a specific date. Specifying this parameter corresponding `timeUpdatedLessThan` parameter will retrieve all resources updated before the specified created date, in "YYYY-MM-ddThh:mmZ" format with a Z offset, as defined by RFC 3339.
|
219
|
+
:param str time_valid_until_greater_than_or_equal_to: Specifying `TimeValidUntilGreaterThanOrEqualToQueryParam` parameter will retrieve all items for which the risk level modification by user will no longer be valid greater than the date and time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
|
220
|
+
|
221
|
+
**Example:** 2016-12-19T00:00:00.000Z
|
222
|
+
:param str time_valid_until_less_than: Specifying `TimeValidUntilLessThanQueryParam` parameter will retrieve all items for which the risk level modification by user will be valid until less than the date and time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
|
223
|
+
|
224
|
+
**Example:** 2016-12-19T00:00:00.000Z
|
225
|
+
"""
|
226
|
+
__args__ = dict()
|
227
|
+
__args__['filters'] = filters
|
228
|
+
__args__['findingKey'] = finding_key
|
229
|
+
__args__['findingTitle'] = finding_title
|
230
|
+
__args__['isRiskDeferred'] = is_risk_deferred
|
231
|
+
__args__['modifiedBy'] = modified_by
|
232
|
+
__args__['securityAssessmentId'] = security_assessment_id
|
233
|
+
__args__['severity'] = severity
|
234
|
+
__args__['timeUpdatedGreaterThanOrEqualTo'] = time_updated_greater_than_or_equal_to
|
235
|
+
__args__['timeUpdatedLessThan'] = time_updated_less_than
|
236
|
+
__args__['timeValidUntilGreaterThanOrEqualTo'] = time_valid_until_greater_than_or_equal_to
|
237
|
+
__args__['timeValidUntilLessThan'] = time_valid_until_less_than
|
238
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
239
|
+
__ret__ = pulumi.runtime.invoke('oci:DataSafe/getSecurityAssessmentFindingsChangeAuditLogs:getSecurityAssessmentFindingsChangeAuditLogs', __args__, opts=opts, typ=GetSecurityAssessmentFindingsChangeAuditLogsResult).value
|
240
|
+
|
241
|
+
return AwaitableGetSecurityAssessmentFindingsChangeAuditLogsResult(
|
242
|
+
filters=pulumi.get(__ret__, 'filters'),
|
243
|
+
finding_key=pulumi.get(__ret__, 'finding_key'),
|
244
|
+
finding_title=pulumi.get(__ret__, 'finding_title'),
|
245
|
+
findings_change_audit_log_collections=pulumi.get(__ret__, 'findings_change_audit_log_collections'),
|
246
|
+
id=pulumi.get(__ret__, 'id'),
|
247
|
+
is_risk_deferred=pulumi.get(__ret__, 'is_risk_deferred'),
|
248
|
+
modified_by=pulumi.get(__ret__, 'modified_by'),
|
249
|
+
security_assessment_id=pulumi.get(__ret__, 'security_assessment_id'),
|
250
|
+
severity=pulumi.get(__ret__, 'severity'),
|
251
|
+
time_updated_greater_than_or_equal_to=pulumi.get(__ret__, 'time_updated_greater_than_or_equal_to'),
|
252
|
+
time_updated_less_than=pulumi.get(__ret__, 'time_updated_less_than'),
|
253
|
+
time_valid_until_greater_than_or_equal_to=pulumi.get(__ret__, 'time_valid_until_greater_than_or_equal_to'),
|
254
|
+
time_valid_until_less_than=pulumi.get(__ret__, 'time_valid_until_less_than'))
|
255
|
+
|
256
|
+
|
257
|
+
@_utilities.lift_output_func(get_security_assessment_findings_change_audit_logs)
|
258
|
+
def get_security_assessment_findings_change_audit_logs_output(filters: Optional[pulumi.Input[Optional[Sequence[pulumi.InputType['GetSecurityAssessmentFindingsChangeAuditLogsFilterArgs']]]]] = None,
|
259
|
+
finding_key: Optional[pulumi.Input[Optional[str]]] = None,
|
260
|
+
finding_title: Optional[pulumi.Input[Optional[str]]] = None,
|
261
|
+
is_risk_deferred: Optional[pulumi.Input[Optional[bool]]] = None,
|
262
|
+
modified_by: Optional[pulumi.Input[Optional[str]]] = None,
|
263
|
+
security_assessment_id: Optional[pulumi.Input[str]] = None,
|
264
|
+
severity: Optional[pulumi.Input[Optional[str]]] = None,
|
265
|
+
time_updated_greater_than_or_equal_to: Optional[pulumi.Input[Optional[str]]] = None,
|
266
|
+
time_updated_less_than: Optional[pulumi.Input[Optional[str]]] = None,
|
267
|
+
time_valid_until_greater_than_or_equal_to: Optional[pulumi.Input[Optional[str]]] = None,
|
268
|
+
time_valid_until_less_than: Optional[pulumi.Input[Optional[str]]] = None,
|
269
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecurityAssessmentFindingsChangeAuditLogsResult]:
|
270
|
+
"""
|
271
|
+
This data source provides the list of Security Assessment Findings Change Audit Logs in Oracle Cloud Infrastructure Data Safe service.
|
272
|
+
|
273
|
+
List all changes made by user to risk level of findings of the specified assessment.
|
274
|
+
|
275
|
+
## Example Usage
|
276
|
+
|
277
|
+
```python
|
278
|
+
import pulumi
|
279
|
+
import pulumi_oci as oci
|
280
|
+
|
281
|
+
test_security_assessment_findings_change_audit_logs = oci.DataSafe.get_security_assessment_findings_change_audit_logs(security_assessment_id=oci_data_safe_security_assessment["test_security_assessment"]["id"],
|
282
|
+
finding_key=var["security_assessment_findings_change_audit_log_finding_key"],
|
283
|
+
finding_title=var["security_assessment_findings_change_audit_log_finding_title"],
|
284
|
+
is_risk_deferred=var["security_assessment_findings_change_audit_log_is_risk_deferred"],
|
285
|
+
modified_by=var["security_assessment_findings_change_audit_log_modified_by"],
|
286
|
+
severity=var["security_assessment_findings_change_audit_log_severity"],
|
287
|
+
time_updated_greater_than_or_equal_to=var["security_assessment_findings_change_audit_log_time_updated_greater_than_or_equal_to"],
|
288
|
+
time_updated_less_than=var["security_assessment_findings_change_audit_log_time_updated_less_than"],
|
289
|
+
time_valid_until_greater_than_or_equal_to=var["security_assessment_findings_change_audit_log_time_valid_until_greater_than_or_equal_to"],
|
290
|
+
time_valid_until_less_than=var["security_assessment_findings_change_audit_log_time_valid_until_less_than"])
|
291
|
+
```
|
292
|
+
|
293
|
+
|
294
|
+
:param str finding_key: The unique key that identifies the finding. It is a string and unique within a security assessment.
|
295
|
+
:param str finding_title: The unique title that identifies the finding. It is a string and unique within a security assessment.
|
296
|
+
:param bool is_risk_deferred: A filter to check findings whose risks were deferred by the user.
|
297
|
+
:param str modified_by: A filter to check which user modified the risk level of the finding.
|
298
|
+
:param str security_assessment_id: The OCID of the security assessment.
|
299
|
+
:param str severity: A filter to return only findings of a particular risk level.
|
300
|
+
:param str time_updated_greater_than_or_equal_to: Search for resources that were updated after a specific date. Specifying this parameter corresponding `timeUpdatedGreaterThanOrEqualTo` parameter will retrieve all resources updated after the specified created date, in "YYYY-MM-ddThh:mmZ" format with a Z offset, as defined by RFC 3339.
|
301
|
+
:param str time_updated_less_than: Search for resources that were updated before a specific date. Specifying this parameter corresponding `timeUpdatedLessThan` parameter will retrieve all resources updated before the specified created date, in "YYYY-MM-ddThh:mmZ" format with a Z offset, as defined by RFC 3339.
|
302
|
+
:param str time_valid_until_greater_than_or_equal_to: Specifying `TimeValidUntilGreaterThanOrEqualToQueryParam` parameter will retrieve all items for which the risk level modification by user will no longer be valid greater than the date and time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
|
303
|
+
|
304
|
+
**Example:** 2016-12-19T00:00:00.000Z
|
305
|
+
:param str time_valid_until_less_than: Specifying `TimeValidUntilLessThanQueryParam` parameter will retrieve all items for which the risk level modification by user will be valid until less than the date and time specified, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
|
306
|
+
|
307
|
+
**Example:** 2016-12-19T00:00:00.000Z
|
308
|
+
"""
|
309
|
+
...
|
@@ -0,0 +1,198 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import pulumi
|
8
|
+
import pulumi.runtime
|
9
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
10
|
+
from .. import _utilities
|
11
|
+
from . import outputs
|
12
|
+
from ._inputs import *
|
13
|
+
|
14
|
+
__all__ = [
|
15
|
+
'GetSecurityAssessmentSecurityFeatureAnalyticsResult',
|
16
|
+
'AwaitableGetSecurityAssessmentSecurityFeatureAnalyticsResult',
|
17
|
+
'get_security_assessment_security_feature_analytics',
|
18
|
+
'get_security_assessment_security_feature_analytics_output',
|
19
|
+
]
|
20
|
+
|
21
|
+
@pulumi.output_type
|
22
|
+
class GetSecurityAssessmentSecurityFeatureAnalyticsResult:
|
23
|
+
"""
|
24
|
+
A collection of values returned by getSecurityAssessmentSecurityFeatureAnalytics.
|
25
|
+
"""
|
26
|
+
def __init__(__self__, access_level=None, compartment_id=None, compartment_id_in_subtree=None, filters=None, id=None, security_feature_analytics_collections=None, target_id=None):
|
27
|
+
if access_level and not isinstance(access_level, str):
|
28
|
+
raise TypeError("Expected argument 'access_level' to be a str")
|
29
|
+
pulumi.set(__self__, "access_level", access_level)
|
30
|
+
if compartment_id and not isinstance(compartment_id, str):
|
31
|
+
raise TypeError("Expected argument 'compartment_id' to be a str")
|
32
|
+
pulumi.set(__self__, "compartment_id", compartment_id)
|
33
|
+
if compartment_id_in_subtree and not isinstance(compartment_id_in_subtree, bool):
|
34
|
+
raise TypeError("Expected argument 'compartment_id_in_subtree' to be a bool")
|
35
|
+
pulumi.set(__self__, "compartment_id_in_subtree", compartment_id_in_subtree)
|
36
|
+
if filters and not isinstance(filters, list):
|
37
|
+
raise TypeError("Expected argument 'filters' to be a list")
|
38
|
+
pulumi.set(__self__, "filters", filters)
|
39
|
+
if id and not isinstance(id, str):
|
40
|
+
raise TypeError("Expected argument 'id' to be a str")
|
41
|
+
pulumi.set(__self__, "id", id)
|
42
|
+
if security_feature_analytics_collections and not isinstance(security_feature_analytics_collections, list):
|
43
|
+
raise TypeError("Expected argument 'security_feature_analytics_collections' to be a list")
|
44
|
+
pulumi.set(__self__, "security_feature_analytics_collections", security_feature_analytics_collections)
|
45
|
+
if target_id and not isinstance(target_id, str):
|
46
|
+
raise TypeError("Expected argument 'target_id' to be a str")
|
47
|
+
pulumi.set(__self__, "target_id", target_id)
|
48
|
+
|
49
|
+
@property
|
50
|
+
@pulumi.getter(name="accessLevel")
|
51
|
+
def access_level(self) -> Optional[str]:
|
52
|
+
return pulumi.get(self, "access_level")
|
53
|
+
|
54
|
+
@property
|
55
|
+
@pulumi.getter(name="compartmentId")
|
56
|
+
def compartment_id(self) -> str:
|
57
|
+
return pulumi.get(self, "compartment_id")
|
58
|
+
|
59
|
+
@property
|
60
|
+
@pulumi.getter(name="compartmentIdInSubtree")
|
61
|
+
def compartment_id_in_subtree(self) -> Optional[bool]:
|
62
|
+
return pulumi.get(self, "compartment_id_in_subtree")
|
63
|
+
|
64
|
+
@property
|
65
|
+
@pulumi.getter
|
66
|
+
def filters(self) -> Optional[Sequence['outputs.GetSecurityAssessmentSecurityFeatureAnalyticsFilterResult']]:
|
67
|
+
return pulumi.get(self, "filters")
|
68
|
+
|
69
|
+
@property
|
70
|
+
@pulumi.getter
|
71
|
+
def id(self) -> str:
|
72
|
+
"""
|
73
|
+
The provider-assigned unique ID for this managed resource.
|
74
|
+
"""
|
75
|
+
return pulumi.get(self, "id")
|
76
|
+
|
77
|
+
@property
|
78
|
+
@pulumi.getter(name="securityFeatureAnalyticsCollections")
|
79
|
+
def security_feature_analytics_collections(self) -> Sequence['outputs.GetSecurityAssessmentSecurityFeatureAnalyticsSecurityFeatureAnalyticsCollectionResult']:
|
80
|
+
"""
|
81
|
+
The list of security_feature_analytics_collection.
|
82
|
+
"""
|
83
|
+
return pulumi.get(self, "security_feature_analytics_collections")
|
84
|
+
|
85
|
+
@property
|
86
|
+
@pulumi.getter(name="targetId")
|
87
|
+
def target_id(self) -> Optional[str]:
|
88
|
+
return pulumi.get(self, "target_id")
|
89
|
+
|
90
|
+
|
91
|
+
class AwaitableGetSecurityAssessmentSecurityFeatureAnalyticsResult(GetSecurityAssessmentSecurityFeatureAnalyticsResult):
|
92
|
+
# pylint: disable=using-constant-test
|
93
|
+
def __await__(self):
|
94
|
+
if False:
|
95
|
+
yield self
|
96
|
+
return GetSecurityAssessmentSecurityFeatureAnalyticsResult(
|
97
|
+
access_level=self.access_level,
|
98
|
+
compartment_id=self.compartment_id,
|
99
|
+
compartment_id_in_subtree=self.compartment_id_in_subtree,
|
100
|
+
filters=self.filters,
|
101
|
+
id=self.id,
|
102
|
+
security_feature_analytics_collections=self.security_feature_analytics_collections,
|
103
|
+
target_id=self.target_id)
|
104
|
+
|
105
|
+
|
106
|
+
def get_security_assessment_security_feature_analytics(access_level: Optional[str] = None,
|
107
|
+
compartment_id: Optional[str] = None,
|
108
|
+
compartment_id_in_subtree: Optional[bool] = None,
|
109
|
+
filters: Optional[Sequence[pulumi.InputType['GetSecurityAssessmentSecurityFeatureAnalyticsFilterArgs']]] = None,
|
110
|
+
target_id: Optional[str] = None,
|
111
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecurityAssessmentSecurityFeatureAnalyticsResult:
|
112
|
+
"""
|
113
|
+
This data source provides the list of Security Assessment Security Feature Analytics in Oracle Cloud Infrastructure Data Safe service.
|
114
|
+
|
115
|
+
Gets a list of Database security feature usage aggregated details in the specified compartment. This provides information about the
|
116
|
+
overall security controls, by returning the counting number of the target databases using the security features.
|
117
|
+
|
118
|
+
When you perform the ListSecurityFeatureAnalytics operation, if the parameter compartmentIdInSubtree is set to "true," and if the
|
119
|
+
parameter accessLevel is set to ACCESSIBLE, then the operation returns statistics from the compartments in which the requestor has INSPECT
|
120
|
+
permissions on at least one resource, directly or indirectly (in subcompartments). If the operation is performed at the
|
121
|
+
root compartment and the requestor does not have access to at least one subcompartment of the compartment specified by
|
122
|
+
compartmentId, then "Not Authorized" is returned.
|
123
|
+
|
124
|
+
## Example Usage
|
125
|
+
|
126
|
+
```python
|
127
|
+
import pulumi
|
128
|
+
import pulumi_oci as oci
|
129
|
+
|
130
|
+
test_security_assessment_security_feature_analytics = oci.DataSafe.get_security_assessment_security_feature_analytics(compartment_id=var["compartment_id"],
|
131
|
+
access_level=var["security_assessment_security_feature_analytic_access_level"],
|
132
|
+
compartment_id_in_subtree=var["security_assessment_security_feature_analytic_compartment_id_in_subtree"],
|
133
|
+
target_id=oci_cloud_guard_target["test_target"]["id"])
|
134
|
+
```
|
135
|
+
|
136
|
+
|
137
|
+
:param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
138
|
+
:param str compartment_id: A filter to return only resources that match the specified compartment OCID.
|
139
|
+
:param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
140
|
+
:param str target_id: A filter to return only items related to a specific target OCID.
|
141
|
+
"""
|
142
|
+
__args__ = dict()
|
143
|
+
__args__['accessLevel'] = access_level
|
144
|
+
__args__['compartmentId'] = compartment_id
|
145
|
+
__args__['compartmentIdInSubtree'] = compartment_id_in_subtree
|
146
|
+
__args__['filters'] = filters
|
147
|
+
__args__['targetId'] = target_id
|
148
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
149
|
+
__ret__ = pulumi.runtime.invoke('oci:DataSafe/getSecurityAssessmentSecurityFeatureAnalytics:getSecurityAssessmentSecurityFeatureAnalytics', __args__, opts=opts, typ=GetSecurityAssessmentSecurityFeatureAnalyticsResult).value
|
150
|
+
|
151
|
+
return AwaitableGetSecurityAssessmentSecurityFeatureAnalyticsResult(
|
152
|
+
access_level=pulumi.get(__ret__, 'access_level'),
|
153
|
+
compartment_id=pulumi.get(__ret__, 'compartment_id'),
|
154
|
+
compartment_id_in_subtree=pulumi.get(__ret__, 'compartment_id_in_subtree'),
|
155
|
+
filters=pulumi.get(__ret__, 'filters'),
|
156
|
+
id=pulumi.get(__ret__, 'id'),
|
157
|
+
security_feature_analytics_collections=pulumi.get(__ret__, 'security_feature_analytics_collections'),
|
158
|
+
target_id=pulumi.get(__ret__, 'target_id'))
|
159
|
+
|
160
|
+
|
161
|
+
@_utilities.lift_output_func(get_security_assessment_security_feature_analytics)
|
162
|
+
def get_security_assessment_security_feature_analytics_output(access_level: Optional[pulumi.Input[Optional[str]]] = None,
|
163
|
+
compartment_id: Optional[pulumi.Input[str]] = None,
|
164
|
+
compartment_id_in_subtree: Optional[pulumi.Input[Optional[bool]]] = None,
|
165
|
+
filters: Optional[pulumi.Input[Optional[Sequence[pulumi.InputType['GetSecurityAssessmentSecurityFeatureAnalyticsFilterArgs']]]]] = None,
|
166
|
+
target_id: Optional[pulumi.Input[Optional[str]]] = None,
|
167
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecurityAssessmentSecurityFeatureAnalyticsResult]:
|
168
|
+
"""
|
169
|
+
This data source provides the list of Security Assessment Security Feature Analytics in Oracle Cloud Infrastructure Data Safe service.
|
170
|
+
|
171
|
+
Gets a list of Database security feature usage aggregated details in the specified compartment. This provides information about the
|
172
|
+
overall security controls, by returning the counting number of the target databases using the security features.
|
173
|
+
|
174
|
+
When you perform the ListSecurityFeatureAnalytics operation, if the parameter compartmentIdInSubtree is set to "true," and if the
|
175
|
+
parameter accessLevel is set to ACCESSIBLE, then the operation returns statistics from the compartments in which the requestor has INSPECT
|
176
|
+
permissions on at least one resource, directly or indirectly (in subcompartments). If the operation is performed at the
|
177
|
+
root compartment and the requestor does not have access to at least one subcompartment of the compartment specified by
|
178
|
+
compartmentId, then "Not Authorized" is returned.
|
179
|
+
|
180
|
+
## Example Usage
|
181
|
+
|
182
|
+
```python
|
183
|
+
import pulumi
|
184
|
+
import pulumi_oci as oci
|
185
|
+
|
186
|
+
test_security_assessment_security_feature_analytics = oci.DataSafe.get_security_assessment_security_feature_analytics(compartment_id=var["compartment_id"],
|
187
|
+
access_level=var["security_assessment_security_feature_analytic_access_level"],
|
188
|
+
compartment_id_in_subtree=var["security_assessment_security_feature_analytic_compartment_id_in_subtree"],
|
189
|
+
target_id=oci_cloud_guard_target["test_target"]["id"])
|
190
|
+
```
|
191
|
+
|
192
|
+
|
193
|
+
:param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
194
|
+
:param str compartment_id: A filter to return only resources that match the specified compartment OCID.
|
195
|
+
:param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
196
|
+
:param str target_id: A filter to return only items related to a specific target OCID.
|
197
|
+
"""
|
198
|
+
...
|