pulumi-oci 2.12.0a1728593306__py3-none-any.whl → 2.12.0a1728642710__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_oci/__init__.py +145 -0
- pulumi_oci/analytics/analytics_instance.py +54 -5
- pulumi_oci/analytics/get_analytics_instance.py +18 -4
- pulumi_oci/analytics/outputs.py +12 -1
- pulumi_oci/core/_inputs.py +648 -159
- pulumi_oci/core/cluster_network.py +7 -7
- pulumi_oci/core/get_instance.py +29 -1
- pulumi_oci/core/get_vcn.py +15 -1
- pulumi_oci/core/get_vnic.py +15 -1
- pulumi_oci/core/instance.py +87 -0
- pulumi_oci/core/instance_configuration.py +12 -0
- pulumi_oci/core/ipsec.py +183 -23
- pulumi_oci/core/network_security_group_security_rule.py +2 -2
- pulumi_oci/core/outputs.py +709 -107
- pulumi_oci/core/service_gateway.py +13 -7
- pulumi_oci/core/vcn.py +65 -23
- pulumi_oci/core/virtual_network.py +35 -1
- pulumi_oci/core/vnic_attachment.py +2 -0
- pulumi_oci/database/_inputs.py +905 -27
- pulumi_oci/database/autonomous_database.py +48 -28
- pulumi_oci/database/autonomous_database_backup.py +12 -12
- pulumi_oci/database/autonomous_exadata_infrastructure.py +2 -0
- pulumi_oci/database/autonomous_vm_cluster.py +2 -0
- pulumi_oci/database/backup.py +12 -12
- pulumi_oci/database/cloud_autonomous_vm_cluster.py +2 -0
- pulumi_oci/database/cloud_exadata_infrastructure.py +2 -0
- pulumi_oci/database/cloud_vm_cluster.py +71 -0
- pulumi_oci/database/database.py +15 -15
- pulumi_oci/database/database_upgrade.py +12 -12
- pulumi_oci/database/db_system.py +9 -9
- pulumi_oci/database/exadata_infrastructure.py +2 -0
- pulumi_oci/database/get_autonomous_container_database.py +1 -1
- pulumi_oci/database/get_autonomous_database.py +18 -4
- pulumi_oci/database/get_autonomous_database_backup.py +3 -3
- pulumi_oci/database/get_autonomous_databases.py +88 -5
- pulumi_oci/database/get_cloud_vm_cluster.py +15 -1
- pulumi_oci/database/get_database.py +3 -3
- pulumi_oci/database/get_pluggable_database.py +12 -1
- pulumi_oci/database/get_vm_cluster.py +15 -1
- pulumi_oci/database/outputs.py +1431 -74
- pulumi_oci/database/pluggable_database.py +34 -0
- pulumi_oci/database/vm_cluster.py +71 -0
- pulumi_oci/database/vm_cluster_add_virtual_network.py +28 -0
- pulumi_oci/database/vm_cluster_remove_virtual_machine.py +28 -0
- pulumi_oci/datasafe/__init__.py +12 -0
- pulumi_oci/datasafe/_inputs.py +441 -0
- pulumi_oci/datasafe/get_reports.py +23 -1
- pulumi_oci/datasafe/get_sql_collection.py +392 -0
- pulumi_oci/datasafe/get_sql_collection_analytics.py +309 -0
- pulumi_oci/datasafe/get_sql_collection_log_insights.py +207 -0
- pulumi_oci/datasafe/get_sql_collections.py +364 -0
- pulumi_oci/datasafe/get_sql_firewall_allowed_sql.py +337 -0
- pulumi_oci/datasafe/get_sql_firewall_allowed_sql_analytics.py +250 -0
- pulumi_oci/datasafe/get_sql_firewall_allowed_sqls.py +234 -0
- pulumi_oci/datasafe/get_sql_firewall_policies.py +386 -0
- pulumi_oci/datasafe/get_sql_firewall_policy.py +393 -0
- pulumi_oci/datasafe/get_sql_firewall_policy_analytics.py +305 -0
- pulumi_oci/datasafe/get_sql_firewall_violation_analytics.py +306 -0
- pulumi_oci/datasafe/get_sql_firewall_violations.py +208 -0
- pulumi_oci/datasafe/outputs.py +1808 -2
- pulumi_oci/desktops/_inputs.py +223 -7
- pulumi_oci/desktops/desktop_pool.py +186 -21
- pulumi_oci/desktops/get_desktop_pool.py +47 -5
- pulumi_oci/desktops/outputs.py +480 -19
- pulumi_oci/fleetappsmanagement/__init__.py +43 -0
- pulumi_oci/fleetappsmanagement/_inputs.py +2057 -0
- pulumi_oci/fleetappsmanagement/fleet.py +955 -0
- pulumi_oci/fleetappsmanagement/fleet_credential.py +615 -0
- pulumi_oci/fleetappsmanagement/fleet_property.py +585 -0
- pulumi_oci/fleetappsmanagement/fleet_resource.py +851 -0
- pulumi_oci/fleetappsmanagement/get_announcements.py +166 -0
- pulumi_oci/fleetappsmanagement/get_fleet.py +394 -0
- pulumi_oci/fleetappsmanagement/get_fleet_compliance_report.py +164 -0
- pulumi_oci/fleetappsmanagement/get_fleet_credential.py +273 -0
- pulumi_oci/fleetappsmanagement/get_fleet_credentials.py +240 -0
- pulumi_oci/fleetappsmanagement/get_fleet_products.py +232 -0
- pulumi_oci/fleetappsmanagement/get_fleet_properties.py +218 -0
- pulumi_oci/fleetappsmanagement/get_fleet_property.py +286 -0
- pulumi_oci/fleetappsmanagement/get_fleet_resource.py +398 -0
- pulumi_oci/fleetappsmanagement/get_fleet_resources.py +237 -0
- pulumi_oci/fleetappsmanagement/get_fleet_targets.py +232 -0
- pulumi_oci/fleetappsmanagement/get_fleets.py +284 -0
- pulumi_oci/fleetappsmanagement/get_inventory_resources.py +311 -0
- pulumi_oci/fleetappsmanagement/get_maintenance_window.py +365 -0
- pulumi_oci/fleetappsmanagement/get_maintenance_windows.py +199 -0
- pulumi_oci/fleetappsmanagement/get_onboarding_policies.py +123 -0
- pulumi_oci/fleetappsmanagement/get_onboardings.py +177 -0
- pulumi_oci/fleetappsmanagement/get_properties.py +221 -0
- pulumi_oci/fleetappsmanagement/get_property.py +323 -0
- pulumi_oci/fleetappsmanagement/get_runbook.py +377 -0
- pulumi_oci/fleetappsmanagement/get_runbooks.py +284 -0
- pulumi_oci/fleetappsmanagement/get_scheduler_definition.py +436 -0
- pulumi_oci/fleetappsmanagement/get_scheduler_definition_scheduled_fleets.py +185 -0
- pulumi_oci/fleetappsmanagement/get_scheduler_definitions.py +262 -0
- pulumi_oci/fleetappsmanagement/get_task_record.py +307 -0
- pulumi_oci/fleetappsmanagement/get_task_records.py +240 -0
- pulumi_oci/fleetappsmanagement/maintenance_window.py +935 -0
- pulumi_oci/fleetappsmanagement/onboarding.py +477 -0
- pulumi_oci/fleetappsmanagement/outputs.py +8128 -0
- pulumi_oci/fleetappsmanagement/property.py +697 -0
- pulumi_oci/fleetappsmanagement/scheduler_definition.py +1035 -0
- pulumi_oci/functions/get_fusion_environment_refresh_activity.py +15 -1
- pulumi_oci/functions/outputs.py +11 -0
- pulumi_oci/fusionapps/_inputs.py +21 -20
- pulumi_oci/fusionapps/fusion_environment.py +2 -2
- pulumi_oci/fusionapps/fusion_environment_admin_user.py +21 -22
- pulumi_oci/fusionapps/fusion_environment_refresh_activity.py +48 -51
- pulumi_oci/fusionapps/outputs.py +11 -10
- pulumi_oci/integration/__init__.py +1 -0
- pulumi_oci/integration/_inputs.py +289 -2
- pulumi_oci/integration/get_integration_instance.py +65 -1
- pulumi_oci/integration/integration_instance.py +172 -0
- pulumi_oci/integration/oracle_managed_custom_endpoint.py +307 -0
- pulumi_oci/integration/outputs.py +587 -19
- pulumi_oci/loadbalancer/_inputs.py +20 -0
- pulumi_oci/loadbalancer/listener.py +4 -2
- pulumi_oci/loadbalancer/outputs.py +16 -2
- pulumi_oci/monitoring/_inputs.py +137 -16
- pulumi_oci/monitoring/alarm_suppression.py +164 -35
- pulumi_oci/monitoring/get_alarm_statuses.py +5 -3
- pulumi_oci/monitoring/get_alarm_suppression.py +33 -3
- pulumi_oci/monitoring/get_alarm_suppressions.py +137 -14
- pulumi_oci/monitoring/outputs.py +291 -18
- pulumi_oci/mysql/mysql_db_system.py +7 -7
- pulumi_oci/objectstorage/__init__.py +3 -0
- pulumi_oci/objectstorage/_inputs.py +97 -0
- pulumi_oci/objectstorage/get_object_versions.py +6 -6
- pulumi_oci/objectstorage/get_objects.py +6 -6
- pulumi_oci/objectstorage/get_private_endpoint.py +263 -0
- pulumi_oci/objectstorage/get_private_endpoint_summaries.py +128 -0
- pulumi_oci/objectstorage/outputs.py +258 -0
- pulumi_oci/objectstorage/private_endpoint.py +630 -0
- pulumi_oci/objectstorage/storage_object.py +7 -7
- pulumi_oci/opsi/_inputs.py +268 -114
- pulumi_oci/opsi/database_insight.py +162 -21
- pulumi_oci/opsi/exadata_insight.py +44 -0
- pulumi_oci/opsi/get_database_insight.py +40 -1
- pulumi_oci/opsi/get_host_insights.py +2 -2
- pulumi_oci/opsi/host_insight.py +0 -48
- pulumi_oci/opsi/outputs.py +405 -109
- pulumi_oci/pulumi-plugin.json +1 -1
- pulumi_oci/securityattribute/__init__.py +15 -0
- pulumi_oci/securityattribute/_inputs.py +209 -0
- pulumi_oci/securityattribute/get_security_attribute.py +262 -0
- pulumi_oci/securityattribute/get_security_attribute_namespace.py +253 -0
- pulumi_oci/securityattribute/get_security_attribute_namespaces.py +210 -0
- pulumi_oci/securityattribute/get_security_attributes.py +169 -0
- pulumi_oci/securityattribute/outputs.py +466 -0
- pulumi_oci/securityattribute/security_attribute.py +588 -0
- pulumi_oci/securityattribute/security_attribute_namespace.py +609 -0
- pulumi_oci/stackmonitoring/__init__.py +5 -0
- pulumi_oci/stackmonitoring/_inputs.py +330 -0
- pulumi_oci/stackmonitoring/get_maintenance_window.py +254 -0
- pulumi_oci/stackmonitoring/get_maintenance_windows.py +210 -0
- pulumi_oci/stackmonitoring/maintenance_window.py +551 -0
- pulumi_oci/stackmonitoring/maintenance_windows_retry_failed_operation.py +217 -0
- pulumi_oci/stackmonitoring/maintenance_windows_stop.py +217 -0
- pulumi_oci/stackmonitoring/outputs.py +603 -0
- pulumi_oci/zpr/__init__.py +14 -0
- pulumi_oci/zpr/_inputs.py +79 -0
- pulumi_oci/zpr/configuration.py +516 -0
- pulumi_oci/zpr/get_configuration.py +230 -0
- pulumi_oci/zpr/get_zpr_policies.py +191 -0
- pulumi_oci/zpr/get_zpr_policy.py +264 -0
- pulumi_oci/zpr/outputs.py +203 -0
- pulumi_oci/zpr/zpr_policy.py +614 -0
- {pulumi_oci-2.12.0a1728593306.dist-info → pulumi_oci-2.12.0a1728642710.dist-info}/METADATA +1 -1
- {pulumi_oci-2.12.0a1728593306.dist-info → pulumi_oci-2.12.0a1728642710.dist-info}/RECORD +170 -95
- {pulumi_oci-2.12.0a1728593306.dist-info → pulumi_oci-2.12.0a1728642710.dist-info}/WHEEL +0 -0
- {pulumi_oci-2.12.0a1728593306.dist-info → pulumi_oci-2.12.0a1728642710.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,337 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import sys
|
8
|
+
import pulumi
|
9
|
+
import pulumi.runtime
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
|
+
from .. import _utilities
|
16
|
+
|
17
|
+
__all__ = [
|
18
|
+
'GetSqlFirewallAllowedSqlResult',
|
19
|
+
'AwaitableGetSqlFirewallAllowedSqlResult',
|
20
|
+
'get_sql_firewall_allowed_sql',
|
21
|
+
'get_sql_firewall_allowed_sql_output',
|
22
|
+
]
|
23
|
+
|
24
|
+
@pulumi.output_type
|
25
|
+
class GetSqlFirewallAllowedSqlResult:
|
26
|
+
"""
|
27
|
+
A collection of values returned by getSqlFirewallAllowedSql.
|
28
|
+
"""
|
29
|
+
def __init__(__self__, compartment_id=None, current_user=None, db_user_name=None, defined_tags=None, description=None, display_name=None, freeform_tags=None, id=None, sql_accessed_objects=None, sql_firewall_allowed_sql_id=None, sql_firewall_policy_id=None, sql_level=None, sql_text=None, state=None, system_tags=None, time_collected=None, time_updated=None, version=None):
|
30
|
+
if compartment_id and not isinstance(compartment_id, str):
|
31
|
+
raise TypeError("Expected argument 'compartment_id' to be a str")
|
32
|
+
pulumi.set(__self__, "compartment_id", compartment_id)
|
33
|
+
if current_user and not isinstance(current_user, str):
|
34
|
+
raise TypeError("Expected argument 'current_user' to be a str")
|
35
|
+
pulumi.set(__self__, "current_user", current_user)
|
36
|
+
if db_user_name and not isinstance(db_user_name, str):
|
37
|
+
raise TypeError("Expected argument 'db_user_name' to be a str")
|
38
|
+
pulumi.set(__self__, "db_user_name", db_user_name)
|
39
|
+
if defined_tags and not isinstance(defined_tags, dict):
|
40
|
+
raise TypeError("Expected argument 'defined_tags' to be a dict")
|
41
|
+
pulumi.set(__self__, "defined_tags", defined_tags)
|
42
|
+
if description and not isinstance(description, str):
|
43
|
+
raise TypeError("Expected argument 'description' to be a str")
|
44
|
+
pulumi.set(__self__, "description", description)
|
45
|
+
if display_name and not isinstance(display_name, str):
|
46
|
+
raise TypeError("Expected argument 'display_name' to be a str")
|
47
|
+
pulumi.set(__self__, "display_name", display_name)
|
48
|
+
if freeform_tags and not isinstance(freeform_tags, dict):
|
49
|
+
raise TypeError("Expected argument 'freeform_tags' to be a dict")
|
50
|
+
pulumi.set(__self__, "freeform_tags", freeform_tags)
|
51
|
+
if id and not isinstance(id, str):
|
52
|
+
raise TypeError("Expected argument 'id' to be a str")
|
53
|
+
pulumi.set(__self__, "id", id)
|
54
|
+
if sql_accessed_objects and not isinstance(sql_accessed_objects, list):
|
55
|
+
raise TypeError("Expected argument 'sql_accessed_objects' to be a list")
|
56
|
+
pulumi.set(__self__, "sql_accessed_objects", sql_accessed_objects)
|
57
|
+
if sql_firewall_allowed_sql_id and not isinstance(sql_firewall_allowed_sql_id, str):
|
58
|
+
raise TypeError("Expected argument 'sql_firewall_allowed_sql_id' to be a str")
|
59
|
+
pulumi.set(__self__, "sql_firewall_allowed_sql_id", sql_firewall_allowed_sql_id)
|
60
|
+
if sql_firewall_policy_id and not isinstance(sql_firewall_policy_id, str):
|
61
|
+
raise TypeError("Expected argument 'sql_firewall_policy_id' to be a str")
|
62
|
+
pulumi.set(__self__, "sql_firewall_policy_id", sql_firewall_policy_id)
|
63
|
+
if sql_level and not isinstance(sql_level, str):
|
64
|
+
raise TypeError("Expected argument 'sql_level' to be a str")
|
65
|
+
pulumi.set(__self__, "sql_level", sql_level)
|
66
|
+
if sql_text and not isinstance(sql_text, str):
|
67
|
+
raise TypeError("Expected argument 'sql_text' to be a str")
|
68
|
+
pulumi.set(__self__, "sql_text", sql_text)
|
69
|
+
if state and not isinstance(state, str):
|
70
|
+
raise TypeError("Expected argument 'state' to be a str")
|
71
|
+
pulumi.set(__self__, "state", state)
|
72
|
+
if system_tags and not isinstance(system_tags, dict):
|
73
|
+
raise TypeError("Expected argument 'system_tags' to be a dict")
|
74
|
+
pulumi.set(__self__, "system_tags", system_tags)
|
75
|
+
if time_collected and not isinstance(time_collected, str):
|
76
|
+
raise TypeError("Expected argument 'time_collected' to be a str")
|
77
|
+
pulumi.set(__self__, "time_collected", time_collected)
|
78
|
+
if time_updated and not isinstance(time_updated, str):
|
79
|
+
raise TypeError("Expected argument 'time_updated' to be a str")
|
80
|
+
pulumi.set(__self__, "time_updated", time_updated)
|
81
|
+
if version and not isinstance(version, float):
|
82
|
+
raise TypeError("Expected argument 'version' to be a float")
|
83
|
+
pulumi.set(__self__, "version", version)
|
84
|
+
|
85
|
+
@property
|
86
|
+
@pulumi.getter(name="compartmentId")
|
87
|
+
def compartment_id(self) -> str:
|
88
|
+
"""
|
89
|
+
The OCID of the compartment containing the SQL Firewall allowed SQL.
|
90
|
+
"""
|
91
|
+
return pulumi.get(self, "compartment_id")
|
92
|
+
|
93
|
+
@property
|
94
|
+
@pulumi.getter(name="currentUser")
|
95
|
+
def current_user(self) -> str:
|
96
|
+
"""
|
97
|
+
The name of the user that SQL was executed as.
|
98
|
+
"""
|
99
|
+
return pulumi.get(self, "current_user")
|
100
|
+
|
101
|
+
@property
|
102
|
+
@pulumi.getter(name="dbUserName")
|
103
|
+
def db_user_name(self) -> str:
|
104
|
+
"""
|
105
|
+
The database user name.
|
106
|
+
"""
|
107
|
+
return pulumi.get(self, "db_user_name")
|
108
|
+
|
109
|
+
@property
|
110
|
+
@pulumi.getter(name="definedTags")
|
111
|
+
def defined_tags(self) -> Mapping[str, str]:
|
112
|
+
"""
|
113
|
+
Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see [Resource Tags](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/resourcetags.htm) Example: `{"Operations.CostCenter": "42"}`
|
114
|
+
"""
|
115
|
+
return pulumi.get(self, "defined_tags")
|
116
|
+
|
117
|
+
@property
|
118
|
+
@pulumi.getter
|
119
|
+
def description(self) -> str:
|
120
|
+
"""
|
121
|
+
The description of the SQL Firewall allowed SQL.
|
122
|
+
"""
|
123
|
+
return pulumi.get(self, "description")
|
124
|
+
|
125
|
+
@property
|
126
|
+
@pulumi.getter(name="displayName")
|
127
|
+
def display_name(self) -> str:
|
128
|
+
"""
|
129
|
+
The display name of the SQL Firewall allowed SQL.
|
130
|
+
"""
|
131
|
+
return pulumi.get(self, "display_name")
|
132
|
+
|
133
|
+
@property
|
134
|
+
@pulumi.getter(name="freeformTags")
|
135
|
+
def freeform_tags(self) -> Mapping[str, str]:
|
136
|
+
"""
|
137
|
+
Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see [Resource Tags](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/resourcetags.htm) Example: `{"Department": "Finance"}`
|
138
|
+
"""
|
139
|
+
return pulumi.get(self, "freeform_tags")
|
140
|
+
|
141
|
+
@property
|
142
|
+
@pulumi.getter
|
143
|
+
def id(self) -> str:
|
144
|
+
"""
|
145
|
+
The provider-assigned unique ID for this managed resource.
|
146
|
+
"""
|
147
|
+
return pulumi.get(self, "id")
|
148
|
+
|
149
|
+
@property
|
150
|
+
@pulumi.getter(name="sqlAccessedObjects")
|
151
|
+
def sql_accessed_objects(self) -> Sequence[str]:
|
152
|
+
"""
|
153
|
+
The objects accessed by the SQL.
|
154
|
+
"""
|
155
|
+
return pulumi.get(self, "sql_accessed_objects")
|
156
|
+
|
157
|
+
@property
|
158
|
+
@pulumi.getter(name="sqlFirewallAllowedSqlId")
|
159
|
+
def sql_firewall_allowed_sql_id(self) -> str:
|
160
|
+
return pulumi.get(self, "sql_firewall_allowed_sql_id")
|
161
|
+
|
162
|
+
@property
|
163
|
+
@pulumi.getter(name="sqlFirewallPolicyId")
|
164
|
+
def sql_firewall_policy_id(self) -> str:
|
165
|
+
"""
|
166
|
+
The OCID of the SQL Firewall policy corresponding to the SQL Firewall allowed SQL.
|
167
|
+
"""
|
168
|
+
return pulumi.get(self, "sql_firewall_policy_id")
|
169
|
+
|
170
|
+
@property
|
171
|
+
@pulumi.getter(name="sqlLevel")
|
172
|
+
def sql_level(self) -> str:
|
173
|
+
"""
|
174
|
+
Specifies the level of SQL included for this SQL Firewall policy. USER_ISSUED_SQL - User issued SQL statements only. ALL_SQL - Includes all SQL statements including SQL statement issued inside PL/SQL units.
|
175
|
+
"""
|
176
|
+
return pulumi.get(self, "sql_level")
|
177
|
+
|
178
|
+
@property
|
179
|
+
@pulumi.getter(name="sqlText")
|
180
|
+
def sql_text(self) -> str:
|
181
|
+
"""
|
182
|
+
The SQL text of the SQL Firewall allowed SQL.
|
183
|
+
"""
|
184
|
+
return pulumi.get(self, "sql_text")
|
185
|
+
|
186
|
+
@property
|
187
|
+
@pulumi.getter
|
188
|
+
def state(self) -> str:
|
189
|
+
"""
|
190
|
+
The current state of the SQL Firewall allowed SQL.
|
191
|
+
"""
|
192
|
+
return pulumi.get(self, "state")
|
193
|
+
|
194
|
+
@property
|
195
|
+
@pulumi.getter(name="systemTags")
|
196
|
+
def system_tags(self) -> Mapping[str, str]:
|
197
|
+
"""
|
198
|
+
System tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: `{"orcl-cloud.free-tier-retained": "true"}`
|
199
|
+
"""
|
200
|
+
return pulumi.get(self, "system_tags")
|
201
|
+
|
202
|
+
@property
|
203
|
+
@pulumi.getter(name="timeCollected")
|
204
|
+
def time_collected(self) -> str:
|
205
|
+
"""
|
206
|
+
The time the the SQL Firewall allowed SQL was collected from the target database, in the format defined by RFC3339.
|
207
|
+
"""
|
208
|
+
return pulumi.get(self, "time_collected")
|
209
|
+
|
210
|
+
@property
|
211
|
+
@pulumi.getter(name="timeUpdated")
|
212
|
+
def time_updated(self) -> str:
|
213
|
+
"""
|
214
|
+
The last date and time the SQL Firewall allowed SQL was updated, in the format defined by RFC3339.
|
215
|
+
"""
|
216
|
+
return pulumi.get(self, "time_updated")
|
217
|
+
|
218
|
+
@property
|
219
|
+
@pulumi.getter
|
220
|
+
def version(self) -> float:
|
221
|
+
"""
|
222
|
+
Version of the associated SQL Firewall policy. This identifies whether the allowed SQLs were added in the same batch or not.
|
223
|
+
"""
|
224
|
+
return pulumi.get(self, "version")
|
225
|
+
|
226
|
+
|
227
|
+
class AwaitableGetSqlFirewallAllowedSqlResult(GetSqlFirewallAllowedSqlResult):
|
228
|
+
# pylint: disable=using-constant-test
|
229
|
+
def __await__(self):
|
230
|
+
if False:
|
231
|
+
yield self
|
232
|
+
return GetSqlFirewallAllowedSqlResult(
|
233
|
+
compartment_id=self.compartment_id,
|
234
|
+
current_user=self.current_user,
|
235
|
+
db_user_name=self.db_user_name,
|
236
|
+
defined_tags=self.defined_tags,
|
237
|
+
description=self.description,
|
238
|
+
display_name=self.display_name,
|
239
|
+
freeform_tags=self.freeform_tags,
|
240
|
+
id=self.id,
|
241
|
+
sql_accessed_objects=self.sql_accessed_objects,
|
242
|
+
sql_firewall_allowed_sql_id=self.sql_firewall_allowed_sql_id,
|
243
|
+
sql_firewall_policy_id=self.sql_firewall_policy_id,
|
244
|
+
sql_level=self.sql_level,
|
245
|
+
sql_text=self.sql_text,
|
246
|
+
state=self.state,
|
247
|
+
system_tags=self.system_tags,
|
248
|
+
time_collected=self.time_collected,
|
249
|
+
time_updated=self.time_updated,
|
250
|
+
version=self.version)
|
251
|
+
|
252
|
+
|
253
|
+
def get_sql_firewall_allowed_sql(sql_firewall_allowed_sql_id: Optional[str] = None,
|
254
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSqlFirewallAllowedSqlResult:
|
255
|
+
"""
|
256
|
+
This data source provides details about a specific Sql Firewall Allowed Sql resource in Oracle Cloud Infrastructure Data Safe service.
|
257
|
+
|
258
|
+
Gets a SQL firewall allowed SQL by identifier.
|
259
|
+
|
260
|
+
## Example Usage
|
261
|
+
|
262
|
+
```python
|
263
|
+
import pulumi
|
264
|
+
import pulumi_oci as oci
|
265
|
+
|
266
|
+
test_sql_firewall_allowed_sql = oci.DataSafe.get_sql_firewall_allowed_sql(sql_firewall_allowed_sql_id=test_sql_firewall_allowed_sql_oci_data_safe_sql_firewall_allowed_sql["id"])
|
267
|
+
```
|
268
|
+
|
269
|
+
|
270
|
+
:param str sql_firewall_allowed_sql_id: The OCID of the sqlFirewallAllowedSql resource.
|
271
|
+
"""
|
272
|
+
__args__ = dict()
|
273
|
+
__args__['sqlFirewallAllowedSqlId'] = sql_firewall_allowed_sql_id
|
274
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
275
|
+
__ret__ = pulumi.runtime.invoke('oci:DataSafe/getSqlFirewallAllowedSql:getSqlFirewallAllowedSql', __args__, opts=opts, typ=GetSqlFirewallAllowedSqlResult).value
|
276
|
+
|
277
|
+
return AwaitableGetSqlFirewallAllowedSqlResult(
|
278
|
+
compartment_id=pulumi.get(__ret__, 'compartment_id'),
|
279
|
+
current_user=pulumi.get(__ret__, 'current_user'),
|
280
|
+
db_user_name=pulumi.get(__ret__, 'db_user_name'),
|
281
|
+
defined_tags=pulumi.get(__ret__, 'defined_tags'),
|
282
|
+
description=pulumi.get(__ret__, 'description'),
|
283
|
+
display_name=pulumi.get(__ret__, 'display_name'),
|
284
|
+
freeform_tags=pulumi.get(__ret__, 'freeform_tags'),
|
285
|
+
id=pulumi.get(__ret__, 'id'),
|
286
|
+
sql_accessed_objects=pulumi.get(__ret__, 'sql_accessed_objects'),
|
287
|
+
sql_firewall_allowed_sql_id=pulumi.get(__ret__, 'sql_firewall_allowed_sql_id'),
|
288
|
+
sql_firewall_policy_id=pulumi.get(__ret__, 'sql_firewall_policy_id'),
|
289
|
+
sql_level=pulumi.get(__ret__, 'sql_level'),
|
290
|
+
sql_text=pulumi.get(__ret__, 'sql_text'),
|
291
|
+
state=pulumi.get(__ret__, 'state'),
|
292
|
+
system_tags=pulumi.get(__ret__, 'system_tags'),
|
293
|
+
time_collected=pulumi.get(__ret__, 'time_collected'),
|
294
|
+
time_updated=pulumi.get(__ret__, 'time_updated'),
|
295
|
+
version=pulumi.get(__ret__, 'version'))
|
296
|
+
def get_sql_firewall_allowed_sql_output(sql_firewall_allowed_sql_id: Optional[pulumi.Input[str]] = None,
|
297
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSqlFirewallAllowedSqlResult]:
|
298
|
+
"""
|
299
|
+
This data source provides details about a specific Sql Firewall Allowed Sql resource in Oracle Cloud Infrastructure Data Safe service.
|
300
|
+
|
301
|
+
Gets a SQL firewall allowed SQL by identifier.
|
302
|
+
|
303
|
+
## Example Usage
|
304
|
+
|
305
|
+
```python
|
306
|
+
import pulumi
|
307
|
+
import pulumi_oci as oci
|
308
|
+
|
309
|
+
test_sql_firewall_allowed_sql = oci.DataSafe.get_sql_firewall_allowed_sql(sql_firewall_allowed_sql_id=test_sql_firewall_allowed_sql_oci_data_safe_sql_firewall_allowed_sql["id"])
|
310
|
+
```
|
311
|
+
|
312
|
+
|
313
|
+
:param str sql_firewall_allowed_sql_id: The OCID of the sqlFirewallAllowedSql resource.
|
314
|
+
"""
|
315
|
+
__args__ = dict()
|
316
|
+
__args__['sqlFirewallAllowedSqlId'] = sql_firewall_allowed_sql_id
|
317
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
318
|
+
__ret__ = pulumi.runtime.invoke_output('oci:DataSafe/getSqlFirewallAllowedSql:getSqlFirewallAllowedSql', __args__, opts=opts, typ=GetSqlFirewallAllowedSqlResult)
|
319
|
+
return __ret__.apply(lambda __response__: GetSqlFirewallAllowedSqlResult(
|
320
|
+
compartment_id=pulumi.get(__response__, 'compartment_id'),
|
321
|
+
current_user=pulumi.get(__response__, 'current_user'),
|
322
|
+
db_user_name=pulumi.get(__response__, 'db_user_name'),
|
323
|
+
defined_tags=pulumi.get(__response__, 'defined_tags'),
|
324
|
+
description=pulumi.get(__response__, 'description'),
|
325
|
+
display_name=pulumi.get(__response__, 'display_name'),
|
326
|
+
freeform_tags=pulumi.get(__response__, 'freeform_tags'),
|
327
|
+
id=pulumi.get(__response__, 'id'),
|
328
|
+
sql_accessed_objects=pulumi.get(__response__, 'sql_accessed_objects'),
|
329
|
+
sql_firewall_allowed_sql_id=pulumi.get(__response__, 'sql_firewall_allowed_sql_id'),
|
330
|
+
sql_firewall_policy_id=pulumi.get(__response__, 'sql_firewall_policy_id'),
|
331
|
+
sql_level=pulumi.get(__response__, 'sql_level'),
|
332
|
+
sql_text=pulumi.get(__response__, 'sql_text'),
|
333
|
+
state=pulumi.get(__response__, 'state'),
|
334
|
+
system_tags=pulumi.get(__response__, 'system_tags'),
|
335
|
+
time_collected=pulumi.get(__response__, 'time_collected'),
|
336
|
+
time_updated=pulumi.get(__response__, 'time_updated'),
|
337
|
+
version=pulumi.get(__response__, 'version')))
|
@@ -0,0 +1,250 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import sys
|
8
|
+
import pulumi
|
9
|
+
import pulumi.runtime
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
|
+
from .. import _utilities
|
16
|
+
from . import outputs
|
17
|
+
from ._inputs import *
|
18
|
+
|
19
|
+
__all__ = [
|
20
|
+
'GetSqlFirewallAllowedSqlAnalyticsResult',
|
21
|
+
'AwaitableGetSqlFirewallAllowedSqlAnalyticsResult',
|
22
|
+
'get_sql_firewall_allowed_sql_analytics',
|
23
|
+
'get_sql_firewall_allowed_sql_analytics_output',
|
24
|
+
]
|
25
|
+
|
26
|
+
@pulumi.output_type
|
27
|
+
class GetSqlFirewallAllowedSqlAnalyticsResult:
|
28
|
+
"""
|
29
|
+
A collection of values returned by getSqlFirewallAllowedSqlAnalytics.
|
30
|
+
"""
|
31
|
+
def __init__(__self__, access_level=None, compartment_id=None, compartment_id_in_subtree=None, filters=None, group_bies=None, id=None, scim_query=None, sql_firewall_allowed_sql_analytics_collections=None):
|
32
|
+
if access_level and not isinstance(access_level, str):
|
33
|
+
raise TypeError("Expected argument 'access_level' to be a str")
|
34
|
+
pulumi.set(__self__, "access_level", access_level)
|
35
|
+
if compartment_id and not isinstance(compartment_id, str):
|
36
|
+
raise TypeError("Expected argument 'compartment_id' to be a str")
|
37
|
+
pulumi.set(__self__, "compartment_id", compartment_id)
|
38
|
+
if compartment_id_in_subtree and not isinstance(compartment_id_in_subtree, bool):
|
39
|
+
raise TypeError("Expected argument 'compartment_id_in_subtree' to be a bool")
|
40
|
+
pulumi.set(__self__, "compartment_id_in_subtree", compartment_id_in_subtree)
|
41
|
+
if filters and not isinstance(filters, list):
|
42
|
+
raise TypeError("Expected argument 'filters' to be a list")
|
43
|
+
pulumi.set(__self__, "filters", filters)
|
44
|
+
if group_bies and not isinstance(group_bies, list):
|
45
|
+
raise TypeError("Expected argument 'group_bies' to be a list")
|
46
|
+
pulumi.set(__self__, "group_bies", group_bies)
|
47
|
+
if id and not isinstance(id, str):
|
48
|
+
raise TypeError("Expected argument 'id' to be a str")
|
49
|
+
pulumi.set(__self__, "id", id)
|
50
|
+
if scim_query and not isinstance(scim_query, str):
|
51
|
+
raise TypeError("Expected argument 'scim_query' to be a str")
|
52
|
+
pulumi.set(__self__, "scim_query", scim_query)
|
53
|
+
if sql_firewall_allowed_sql_analytics_collections and not isinstance(sql_firewall_allowed_sql_analytics_collections, list):
|
54
|
+
raise TypeError("Expected argument 'sql_firewall_allowed_sql_analytics_collections' to be a list")
|
55
|
+
pulumi.set(__self__, "sql_firewall_allowed_sql_analytics_collections", sql_firewall_allowed_sql_analytics_collections)
|
56
|
+
|
57
|
+
@property
|
58
|
+
@pulumi.getter(name="accessLevel")
|
59
|
+
def access_level(self) -> Optional[str]:
|
60
|
+
return pulumi.get(self, "access_level")
|
61
|
+
|
62
|
+
@property
|
63
|
+
@pulumi.getter(name="compartmentId")
|
64
|
+
def compartment_id(self) -> str:
|
65
|
+
return pulumi.get(self, "compartment_id")
|
66
|
+
|
67
|
+
@property
|
68
|
+
@pulumi.getter(name="compartmentIdInSubtree")
|
69
|
+
def compartment_id_in_subtree(self) -> Optional[bool]:
|
70
|
+
return pulumi.get(self, "compartment_id_in_subtree")
|
71
|
+
|
72
|
+
@property
|
73
|
+
@pulumi.getter
|
74
|
+
def filters(self) -> Optional[Sequence['outputs.GetSqlFirewallAllowedSqlAnalyticsFilterResult']]:
|
75
|
+
return pulumi.get(self, "filters")
|
76
|
+
|
77
|
+
@property
|
78
|
+
@pulumi.getter(name="groupBies")
|
79
|
+
def group_bies(self) -> Optional[Sequence[str]]:
|
80
|
+
return pulumi.get(self, "group_bies")
|
81
|
+
|
82
|
+
@property
|
83
|
+
@pulumi.getter
|
84
|
+
def id(self) -> str:
|
85
|
+
"""
|
86
|
+
The provider-assigned unique ID for this managed resource.
|
87
|
+
"""
|
88
|
+
return pulumi.get(self, "id")
|
89
|
+
|
90
|
+
@property
|
91
|
+
@pulumi.getter(name="scimQuery")
|
92
|
+
def scim_query(self) -> Optional[str]:
|
93
|
+
return pulumi.get(self, "scim_query")
|
94
|
+
|
95
|
+
@property
|
96
|
+
@pulumi.getter(name="sqlFirewallAllowedSqlAnalyticsCollections")
|
97
|
+
def sql_firewall_allowed_sql_analytics_collections(self) -> Sequence['outputs.GetSqlFirewallAllowedSqlAnalyticsSqlFirewallAllowedSqlAnalyticsCollectionResult']:
|
98
|
+
"""
|
99
|
+
The list of sql_firewall_allowed_sql_analytics_collection.
|
100
|
+
"""
|
101
|
+
return pulumi.get(self, "sql_firewall_allowed_sql_analytics_collections")
|
102
|
+
|
103
|
+
|
104
|
+
class AwaitableGetSqlFirewallAllowedSqlAnalyticsResult(GetSqlFirewallAllowedSqlAnalyticsResult):
|
105
|
+
# pylint: disable=using-constant-test
|
106
|
+
def __await__(self):
|
107
|
+
if False:
|
108
|
+
yield self
|
109
|
+
return GetSqlFirewallAllowedSqlAnalyticsResult(
|
110
|
+
access_level=self.access_level,
|
111
|
+
compartment_id=self.compartment_id,
|
112
|
+
compartment_id_in_subtree=self.compartment_id_in_subtree,
|
113
|
+
filters=self.filters,
|
114
|
+
group_bies=self.group_bies,
|
115
|
+
id=self.id,
|
116
|
+
scim_query=self.scim_query,
|
117
|
+
sql_firewall_allowed_sql_analytics_collections=self.sql_firewall_allowed_sql_analytics_collections)
|
118
|
+
|
119
|
+
|
120
|
+
def get_sql_firewall_allowed_sql_analytics(access_level: Optional[str] = None,
|
121
|
+
compartment_id: Optional[str] = None,
|
122
|
+
compartment_id_in_subtree: Optional[bool] = None,
|
123
|
+
filters: Optional[Sequence[Union['GetSqlFirewallAllowedSqlAnalyticsFilterArgs', 'GetSqlFirewallAllowedSqlAnalyticsFilterArgsDict']]] = None,
|
124
|
+
group_bies: Optional[Sequence[str]] = None,
|
125
|
+
scim_query: Optional[str] = None,
|
126
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSqlFirewallAllowedSqlAnalyticsResult:
|
127
|
+
"""
|
128
|
+
This data source provides the list of Sql Firewall Allowed Sql Analytics in Oracle Cloud Infrastructure Data Safe service.
|
129
|
+
|
130
|
+
Returns the aggregation details of all SQL Firewall allowed SQL statements.
|
131
|
+
|
132
|
+
The ListSqlFirewallAllowedSqlAnalytics operation returns the aggregates of the SQL Firewall allowed SQL statements in the specified `compartmentId`.
|
133
|
+
|
134
|
+
The parameter `accessLevel` specifies whether to return only those compartments for which the
|
135
|
+
requestor has INSPECT permissions on at least one resource directly
|
136
|
+
or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
|
137
|
+
Principal doesn't have access to even one of the child compartments. This is valid only when
|
138
|
+
`compartmentIdInSubtree` is set to `true`.
|
139
|
+
|
140
|
+
The parameter `compartmentIdInSubtree` applies when you perform ListSqlFirewallAllowedSqlAnalytics on the
|
141
|
+
`compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
|
142
|
+
To get a full list of all compartments and subcompartments in the tenancy (root compartment),
|
143
|
+
set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
|
144
|
+
|
145
|
+
## Example Usage
|
146
|
+
|
147
|
+
```python
|
148
|
+
import pulumi
|
149
|
+
import pulumi_oci as oci
|
150
|
+
|
151
|
+
test_sql_firewall_allowed_sql_analytics = oci.DataSafe.get_sql_firewall_allowed_sql_analytics(compartment_id=compartment_id,
|
152
|
+
access_level=sql_firewall_allowed_sql_analytic_access_level,
|
153
|
+
compartment_id_in_subtree=sql_firewall_allowed_sql_analytic_compartment_id_in_subtree,
|
154
|
+
group_bies=sql_firewall_allowed_sql_analytic_group_by,
|
155
|
+
scim_query=sql_firewall_allowed_sql_analytic_scim_query)
|
156
|
+
```
|
157
|
+
|
158
|
+
|
159
|
+
:param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
160
|
+
:param str compartment_id: A filter to return only resources that match the specified compartment OCID.
|
161
|
+
:param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
162
|
+
:param Sequence[str] group_bies: The group by parameter to summarize the allowed SQL aggregation.
|
163
|
+
:param str scim_query: The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at [RFC3339](https://tools.ietf.org/html/draft-ietf-scim-api-12). In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
|
164
|
+
|
165
|
+
**Example:** query=(currentUser eq 'SCOTT') and (topLevel eq 'YES')
|
166
|
+
"""
|
167
|
+
__args__ = dict()
|
168
|
+
__args__['accessLevel'] = access_level
|
169
|
+
__args__['compartmentId'] = compartment_id
|
170
|
+
__args__['compartmentIdInSubtree'] = compartment_id_in_subtree
|
171
|
+
__args__['filters'] = filters
|
172
|
+
__args__['groupBies'] = group_bies
|
173
|
+
__args__['scimQuery'] = scim_query
|
174
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
175
|
+
__ret__ = pulumi.runtime.invoke('oci:DataSafe/getSqlFirewallAllowedSqlAnalytics:getSqlFirewallAllowedSqlAnalytics', __args__, opts=opts, typ=GetSqlFirewallAllowedSqlAnalyticsResult).value
|
176
|
+
|
177
|
+
return AwaitableGetSqlFirewallAllowedSqlAnalyticsResult(
|
178
|
+
access_level=pulumi.get(__ret__, 'access_level'),
|
179
|
+
compartment_id=pulumi.get(__ret__, 'compartment_id'),
|
180
|
+
compartment_id_in_subtree=pulumi.get(__ret__, 'compartment_id_in_subtree'),
|
181
|
+
filters=pulumi.get(__ret__, 'filters'),
|
182
|
+
group_bies=pulumi.get(__ret__, 'group_bies'),
|
183
|
+
id=pulumi.get(__ret__, 'id'),
|
184
|
+
scim_query=pulumi.get(__ret__, 'scim_query'),
|
185
|
+
sql_firewall_allowed_sql_analytics_collections=pulumi.get(__ret__, 'sql_firewall_allowed_sql_analytics_collections'))
|
186
|
+
def get_sql_firewall_allowed_sql_analytics_output(access_level: Optional[pulumi.Input[Optional[str]]] = None,
|
187
|
+
compartment_id: Optional[pulumi.Input[str]] = None,
|
188
|
+
compartment_id_in_subtree: Optional[pulumi.Input[Optional[bool]]] = None,
|
189
|
+
filters: Optional[pulumi.Input[Optional[Sequence[Union['GetSqlFirewallAllowedSqlAnalyticsFilterArgs', 'GetSqlFirewallAllowedSqlAnalyticsFilterArgsDict']]]]] = None,
|
190
|
+
group_bies: Optional[pulumi.Input[Optional[Sequence[str]]]] = None,
|
191
|
+
scim_query: Optional[pulumi.Input[Optional[str]]] = None,
|
192
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSqlFirewallAllowedSqlAnalyticsResult]:
|
193
|
+
"""
|
194
|
+
This data source provides the list of Sql Firewall Allowed Sql Analytics in Oracle Cloud Infrastructure Data Safe service.
|
195
|
+
|
196
|
+
Returns the aggregation details of all SQL Firewall allowed SQL statements.
|
197
|
+
|
198
|
+
The ListSqlFirewallAllowedSqlAnalytics operation returns the aggregates of the SQL Firewall allowed SQL statements in the specified `compartmentId`.
|
199
|
+
|
200
|
+
The parameter `accessLevel` specifies whether to return only those compartments for which the
|
201
|
+
requestor has INSPECT permissions on at least one resource directly
|
202
|
+
or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
|
203
|
+
Principal doesn't have access to even one of the child compartments. This is valid only when
|
204
|
+
`compartmentIdInSubtree` is set to `true`.
|
205
|
+
|
206
|
+
The parameter `compartmentIdInSubtree` applies when you perform ListSqlFirewallAllowedSqlAnalytics on the
|
207
|
+
`compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
|
208
|
+
To get a full list of all compartments and subcompartments in the tenancy (root compartment),
|
209
|
+
set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
|
210
|
+
|
211
|
+
## Example Usage
|
212
|
+
|
213
|
+
```python
|
214
|
+
import pulumi
|
215
|
+
import pulumi_oci as oci
|
216
|
+
|
217
|
+
test_sql_firewall_allowed_sql_analytics = oci.DataSafe.get_sql_firewall_allowed_sql_analytics(compartment_id=compartment_id,
|
218
|
+
access_level=sql_firewall_allowed_sql_analytic_access_level,
|
219
|
+
compartment_id_in_subtree=sql_firewall_allowed_sql_analytic_compartment_id_in_subtree,
|
220
|
+
group_bies=sql_firewall_allowed_sql_analytic_group_by,
|
221
|
+
scim_query=sql_firewall_allowed_sql_analytic_scim_query)
|
222
|
+
```
|
223
|
+
|
224
|
+
|
225
|
+
:param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
226
|
+
:param str compartment_id: A filter to return only resources that match the specified compartment OCID.
|
227
|
+
:param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
228
|
+
:param Sequence[str] group_bies: The group by parameter to summarize the allowed SQL aggregation.
|
229
|
+
:param str scim_query: The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at [RFC3339](https://tools.ietf.org/html/draft-ietf-scim-api-12). In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
|
230
|
+
|
231
|
+
**Example:** query=(currentUser eq 'SCOTT') and (topLevel eq 'YES')
|
232
|
+
"""
|
233
|
+
__args__ = dict()
|
234
|
+
__args__['accessLevel'] = access_level
|
235
|
+
__args__['compartmentId'] = compartment_id
|
236
|
+
__args__['compartmentIdInSubtree'] = compartment_id_in_subtree
|
237
|
+
__args__['filters'] = filters
|
238
|
+
__args__['groupBies'] = group_bies
|
239
|
+
__args__['scimQuery'] = scim_query
|
240
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
241
|
+
__ret__ = pulumi.runtime.invoke_output('oci:DataSafe/getSqlFirewallAllowedSqlAnalytics:getSqlFirewallAllowedSqlAnalytics', __args__, opts=opts, typ=GetSqlFirewallAllowedSqlAnalyticsResult)
|
242
|
+
return __ret__.apply(lambda __response__: GetSqlFirewallAllowedSqlAnalyticsResult(
|
243
|
+
access_level=pulumi.get(__response__, 'access_level'),
|
244
|
+
compartment_id=pulumi.get(__response__, 'compartment_id'),
|
245
|
+
compartment_id_in_subtree=pulumi.get(__response__, 'compartment_id_in_subtree'),
|
246
|
+
filters=pulumi.get(__response__, 'filters'),
|
247
|
+
group_bies=pulumi.get(__response__, 'group_bies'),
|
248
|
+
id=pulumi.get(__response__, 'id'),
|
249
|
+
scim_query=pulumi.get(__response__, 'scim_query'),
|
250
|
+
sql_firewall_allowed_sql_analytics_collections=pulumi.get(__response__, 'sql_firewall_allowed_sql_analytics_collections')))
|