pulumi-oci 2.12.0a1728593306__py3-none-any.whl → 2.13.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_oci/__init__.py +169 -19
- pulumi_oci/analytics/analytics_instance.py +54 -5
- pulumi_oci/analytics/get_analytics_instance.py +18 -4
- pulumi_oci/analytics/outputs.py +12 -1
- pulumi_oci/containerengine/_inputs.py +341 -0
- pulumi_oci/containerengine/cluster.py +64 -0
- pulumi_oci/containerengine/get_cluster.py +12 -1
- pulumi_oci/containerengine/outputs.py +582 -0
- pulumi_oci/core/_inputs.py +947 -196
- pulumi_oci/core/boot_volume.py +90 -5
- pulumi_oci/core/cluster_network.py +7 -7
- pulumi_oci/core/get_block_volume_replica.py +15 -1
- pulumi_oci/core/get_boot_volume.py +15 -4
- pulumi_oci/core/get_boot_volume_replica.py +15 -1
- pulumi_oci/core/get_instance.py +29 -1
- pulumi_oci/core/get_vcn.py +15 -1
- pulumi_oci/core/get_vnic.py +15 -1
- pulumi_oci/core/get_volume.py +18 -4
- pulumi_oci/core/instance.py +87 -0
- pulumi_oci/core/instance_configuration.py +16 -0
- pulumi_oci/core/ipsec.py +183 -23
- pulumi_oci/core/network_security_group_security_rule.py +2 -2
- pulumi_oci/core/outputs.py +1282 -153
- pulumi_oci/core/service_gateway.py +13 -7
- pulumi_oci/core/vcn.py +65 -23
- pulumi_oci/core/virtual_network.py +35 -1
- pulumi_oci/core/vnic_attachment.py +2 -0
- pulumi_oci/core/volume.py +110 -12
- pulumi_oci/core/volume_backup_policy_assignment.py +68 -19
- pulumi_oci/core/volume_group.py +56 -5
- pulumi_oci/database/_inputs.py +905 -27
- pulumi_oci/database/autonomous_database.py +48 -28
- pulumi_oci/database/autonomous_database_backup.py +12 -12
- pulumi_oci/database/autonomous_exadata_infrastructure.py +2 -0
- pulumi_oci/database/autonomous_vm_cluster.py +2 -0
- pulumi_oci/database/backup.py +12 -12
- pulumi_oci/database/cloud_autonomous_vm_cluster.py +2 -0
- pulumi_oci/database/cloud_exadata_infrastructure.py +2 -0
- pulumi_oci/database/cloud_vm_cluster.py +71 -0
- pulumi_oci/database/database.py +15 -15
- pulumi_oci/database/database_upgrade.py +12 -12
- pulumi_oci/database/db_system.py +9 -9
- pulumi_oci/database/exadata_infrastructure.py +2 -0
- pulumi_oci/database/get_autonomous_container_database.py +1 -1
- pulumi_oci/database/get_autonomous_database.py +18 -4
- pulumi_oci/database/get_autonomous_database_backup.py +3 -3
- pulumi_oci/database/get_autonomous_databases.py +88 -5
- pulumi_oci/database/get_cloud_vm_cluster.py +15 -1
- pulumi_oci/database/get_database.py +3 -3
- pulumi_oci/database/get_pluggable_database.py +12 -1
- pulumi_oci/database/get_vm_cluster.py +15 -1
- pulumi_oci/database/outputs.py +1431 -74
- pulumi_oci/database/pluggable_database.py +34 -0
- pulumi_oci/database/vm_cluster.py +71 -0
- pulumi_oci/database/vm_cluster_add_virtual_network.py +28 -0
- pulumi_oci/database/vm_cluster_remove_virtual_machine.py +28 -0
- pulumi_oci/datasafe/__init__.py +13 -0
- pulumi_oci/datasafe/_inputs.py +441 -0
- pulumi_oci/datasafe/generate_on_prem_connector_configuration.py +271 -0
- pulumi_oci/datasafe/get_reports.py +23 -1
- pulumi_oci/datasafe/get_sql_collection.py +392 -0
- pulumi_oci/datasafe/get_sql_collection_analytics.py +309 -0
- pulumi_oci/datasafe/get_sql_collection_log_insights.py +207 -0
- pulumi_oci/datasafe/get_sql_collections.py +364 -0
- pulumi_oci/datasafe/get_sql_firewall_allowed_sql.py +337 -0
- pulumi_oci/datasafe/get_sql_firewall_allowed_sql_analytics.py +250 -0
- pulumi_oci/datasafe/get_sql_firewall_allowed_sqls.py +234 -0
- pulumi_oci/datasafe/get_sql_firewall_policies.py +386 -0
- pulumi_oci/datasafe/get_sql_firewall_policy.py +393 -0
- pulumi_oci/datasafe/get_sql_firewall_policy_analytics.py +305 -0
- pulumi_oci/datasafe/get_sql_firewall_violation_analytics.py +306 -0
- pulumi_oci/datasafe/get_sql_firewall_violations.py +208 -0
- pulumi_oci/datasafe/outputs.py +1808 -2
- pulumi_oci/desktops/_inputs.py +395 -17
- pulumi_oci/desktops/desktop_pool.py +253 -21
- pulumi_oci/desktops/get_desktop_pool.py +62 -5
- pulumi_oci/desktops/outputs.py +807 -25
- pulumi_oci/dns/__init__.py +2 -0
- pulumi_oci/dns/_inputs.py +1157 -12
- pulumi_oci/dns/action_create_zone_from_zone_file.py +42 -2
- pulumi_oci/dns/get_records.py +45 -13
- pulumi_oci/dns/get_resolver.py +8 -6
- pulumi_oci/dns/get_resolver_endpoint.py +8 -6
- pulumi_oci/dns/get_resolver_endpoints.py +2 -2
- pulumi_oci/dns/get_resolvers.py +12 -12
- pulumi_oci/dns/get_rrset.py +16 -16
- pulumi_oci/dns/get_rrsets.py +12 -10
- pulumi_oci/dns/get_view.py +8 -4
- pulumi_oci/dns/get_views.py +12 -12
- pulumi_oci/dns/get_zones.py +33 -13
- pulumi_oci/dns/outputs.py +1388 -79
- pulumi_oci/dns/record.py +12 -12
- pulumi_oci/dns/resolver.py +7 -7
- pulumi_oci/dns/resolver_endpoint.py +2 -2
- pulumi_oci/dns/rrset.py +50 -41
- pulumi_oci/dns/zone.py +176 -17
- pulumi_oci/dns/zone_promote_dnssec_key_version.py +328 -0
- pulumi_oci/dns/zone_stage_dnssec_key_version.py +318 -0
- pulumi_oci/fleetappsmanagement/__init__.py +43 -0
- pulumi_oci/fleetappsmanagement/_inputs.py +2057 -0
- pulumi_oci/fleetappsmanagement/fleet.py +955 -0
- pulumi_oci/fleetappsmanagement/fleet_credential.py +615 -0
- pulumi_oci/fleetappsmanagement/fleet_property.py +585 -0
- pulumi_oci/fleetappsmanagement/fleet_resource.py +851 -0
- pulumi_oci/fleetappsmanagement/get_announcements.py +166 -0
- pulumi_oci/fleetappsmanagement/get_fleet.py +394 -0
- pulumi_oci/fleetappsmanagement/get_fleet_compliance_report.py +164 -0
- pulumi_oci/fleetappsmanagement/get_fleet_credential.py +273 -0
- pulumi_oci/fleetappsmanagement/get_fleet_credentials.py +240 -0
- pulumi_oci/fleetappsmanagement/get_fleet_products.py +232 -0
- pulumi_oci/fleetappsmanagement/get_fleet_properties.py +218 -0
- pulumi_oci/fleetappsmanagement/get_fleet_property.py +286 -0
- pulumi_oci/fleetappsmanagement/get_fleet_resource.py +398 -0
- pulumi_oci/fleetappsmanagement/get_fleet_resources.py +237 -0
- pulumi_oci/fleetappsmanagement/get_fleet_targets.py +232 -0
- pulumi_oci/fleetappsmanagement/get_fleets.py +284 -0
- pulumi_oci/fleetappsmanagement/get_inventory_resources.py +311 -0
- pulumi_oci/fleetappsmanagement/get_maintenance_window.py +365 -0
- pulumi_oci/fleetappsmanagement/get_maintenance_windows.py +199 -0
- pulumi_oci/fleetappsmanagement/get_onboarding_policies.py +123 -0
- pulumi_oci/fleetappsmanagement/get_onboardings.py +177 -0
- pulumi_oci/fleetappsmanagement/get_properties.py +221 -0
- pulumi_oci/fleetappsmanagement/get_property.py +323 -0
- pulumi_oci/fleetappsmanagement/get_runbook.py +377 -0
- pulumi_oci/fleetappsmanagement/get_runbooks.py +284 -0
- pulumi_oci/fleetappsmanagement/get_scheduler_definition.py +436 -0
- pulumi_oci/fleetappsmanagement/get_scheduler_definition_scheduled_fleets.py +185 -0
- pulumi_oci/fleetappsmanagement/get_scheduler_definitions.py +262 -0
- pulumi_oci/fleetappsmanagement/get_task_record.py +307 -0
- pulumi_oci/fleetappsmanagement/get_task_records.py +240 -0
- pulumi_oci/fleetappsmanagement/maintenance_window.py +935 -0
- pulumi_oci/fleetappsmanagement/onboarding.py +477 -0
- pulumi_oci/fleetappsmanagement/outputs.py +8128 -0
- pulumi_oci/fleetappsmanagement/property.py +697 -0
- pulumi_oci/fleetappsmanagement/scheduler_definition.py +1035 -0
- pulumi_oci/functions/get_fusion_environment_refresh_activity.py +15 -1
- pulumi_oci/functions/outputs.py +11 -0
- pulumi_oci/fusionapps/_inputs.py +21 -20
- pulumi_oci/fusionapps/fusion_environment.py +2 -2
- pulumi_oci/fusionapps/fusion_environment_admin_user.py +21 -22
- pulumi_oci/fusionapps/fusion_environment_refresh_activity.py +48 -51
- pulumi_oci/fusionapps/outputs.py +11 -10
- pulumi_oci/goldengate/__init__.py +1 -0
- pulumi_oci/goldengate/_inputs.py +165 -0
- pulumi_oci/goldengate/connection.py +49 -35
- pulumi_oci/goldengate/database_registration.py +7 -7
- pulumi_oci/goldengate/deployment.py +79 -4
- pulumi_oci/goldengate/get_deployment.py +30 -2
- pulumi_oci/goldengate/get_deployment_environments.py +144 -0
- pulumi_oci/goldengate/outputs.py +409 -2
- pulumi_oci/integration/__init__.py +1 -0
- pulumi_oci/integration/_inputs.py +289 -2
- pulumi_oci/integration/get_integration_instance.py +65 -1
- pulumi_oci/integration/integration_instance.py +172 -0
- pulumi_oci/integration/oracle_managed_custom_endpoint.py +307 -0
- pulumi_oci/integration/outputs.py +587 -19
- pulumi_oci/loadbalancer/_inputs.py +20 -0
- pulumi_oci/loadbalancer/listener.py +4 -2
- pulumi_oci/loadbalancer/outputs.py +16 -2
- pulumi_oci/monitoring/_inputs.py +137 -16
- pulumi_oci/monitoring/alarm_suppression.py +164 -35
- pulumi_oci/monitoring/get_alarm_statuses.py +5 -3
- pulumi_oci/monitoring/get_alarm_suppression.py +33 -3
- pulumi_oci/monitoring/get_alarm_suppressions.py +137 -14
- pulumi_oci/monitoring/outputs.py +291 -18
- pulumi_oci/mysql/mysql_db_system.py +7 -7
- pulumi_oci/objectstorage/__init__.py +3 -0
- pulumi_oci/objectstorage/_inputs.py +97 -0
- pulumi_oci/objectstorage/get_object_versions.py +6 -6
- pulumi_oci/objectstorage/get_objects.py +6 -6
- pulumi_oci/objectstorage/get_private_endpoint.py +263 -0
- pulumi_oci/objectstorage/get_private_endpoint_summaries.py +128 -0
- pulumi_oci/objectstorage/outputs.py +258 -0
- pulumi_oci/objectstorage/private_endpoint.py +630 -0
- pulumi_oci/objectstorage/storage_object.py +7 -7
- pulumi_oci/opsi/_inputs.py +268 -114
- pulumi_oci/opsi/database_insight.py +162 -21
- pulumi_oci/opsi/exadata_insight.py +44 -0
- pulumi_oci/opsi/get_database_insight.py +40 -1
- pulumi_oci/opsi/get_host_insights.py +2 -2
- pulumi_oci/opsi/host_insight.py +0 -48
- pulumi_oci/opsi/outputs.py +405 -109
- pulumi_oci/pulumi-plugin.json +1 -1
- pulumi_oci/securityattribute/__init__.py +15 -0
- pulumi_oci/securityattribute/_inputs.py +209 -0
- pulumi_oci/securityattribute/get_security_attribute.py +262 -0
- pulumi_oci/securityattribute/get_security_attribute_namespace.py +253 -0
- pulumi_oci/securityattribute/get_security_attribute_namespaces.py +210 -0
- pulumi_oci/securityattribute/get_security_attributes.py +169 -0
- pulumi_oci/securityattribute/outputs.py +466 -0
- pulumi_oci/securityattribute/security_attribute.py +588 -0
- pulumi_oci/securityattribute/security_attribute_namespace.py +609 -0
- pulumi_oci/stackmonitoring/__init__.py +5 -0
- pulumi_oci/stackmonitoring/_inputs.py +330 -0
- pulumi_oci/stackmonitoring/get_maintenance_window.py +254 -0
- pulumi_oci/stackmonitoring/get_maintenance_windows.py +210 -0
- pulumi_oci/stackmonitoring/maintenance_window.py +551 -0
- pulumi_oci/stackmonitoring/maintenance_windows_retry_failed_operation.py +217 -0
- pulumi_oci/stackmonitoring/maintenance_windows_stop.py +217 -0
- pulumi_oci/stackmonitoring/outputs.py +603 -0
- pulumi_oci/{globallydistributeddatabase → zpr}/__init__.py +5 -6
- pulumi_oci/zpr/_inputs.py +79 -0
- pulumi_oci/zpr/configuration.py +516 -0
- pulumi_oci/zpr/get_configuration.py +230 -0
- pulumi_oci/zpr/get_zpr_policies.py +191 -0
- pulumi_oci/zpr/get_zpr_policy.py +264 -0
- pulumi_oci/zpr/outputs.py +203 -0
- pulumi_oci/zpr/zpr_policy.py +614 -0
- {pulumi_oci-2.12.0a1728593306.dist-info → pulumi_oci-2.13.0.dist-info}/METADATA +1 -1
- {pulumi_oci-2.12.0a1728593306.dist-info → pulumi_oci-2.13.0.dist-info}/RECORD +212 -142
- {pulumi_oci-2.12.0a1728593306.dist-info → pulumi_oci-2.13.0.dist-info}/WHEEL +1 -1
- pulumi_oci/globallydistributeddatabase/_inputs.py +0 -1289
- pulumi_oci/globallydistributeddatabase/get_private_endpoint.py +0 -323
- pulumi_oci/globallydistributeddatabase/get_private_endpoints.py +0 -191
- pulumi_oci/globallydistributeddatabase/get_sharded_database.py +0 -660
- pulumi_oci/globallydistributeddatabase/get_sharded_databases.py +0 -191
- pulumi_oci/globallydistributeddatabase/outputs.py +0 -2063
- pulumi_oci/globallydistributeddatabase/private_endpoint.py +0 -747
- pulumi_oci/globallydistributeddatabase/sharded_database.py +0 -1821
- {pulumi_oci-2.12.0a1728593306.dist-info → pulumi_oci-2.13.0.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,234 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import sys
|
8
|
+
import pulumi
|
9
|
+
import pulumi.runtime
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
|
+
from .. import _utilities
|
16
|
+
from . import outputs
|
17
|
+
from ._inputs import *
|
18
|
+
|
19
|
+
__all__ = [
|
20
|
+
'GetSqlFirewallAllowedSqlsResult',
|
21
|
+
'AwaitableGetSqlFirewallAllowedSqlsResult',
|
22
|
+
'get_sql_firewall_allowed_sqls',
|
23
|
+
'get_sql_firewall_allowed_sqls_output',
|
24
|
+
]
|
25
|
+
|
26
|
+
@pulumi.output_type
|
27
|
+
class GetSqlFirewallAllowedSqlsResult:
|
28
|
+
"""
|
29
|
+
A collection of values returned by getSqlFirewallAllowedSqls.
|
30
|
+
"""
|
31
|
+
def __init__(__self__, access_level=None, compartment_id=None, compartment_id_in_subtree=None, filters=None, id=None, scim_query=None, sql_firewall_allowed_sql_collections=None):
|
32
|
+
if access_level and not isinstance(access_level, str):
|
33
|
+
raise TypeError("Expected argument 'access_level' to be a str")
|
34
|
+
pulumi.set(__self__, "access_level", access_level)
|
35
|
+
if compartment_id and not isinstance(compartment_id, str):
|
36
|
+
raise TypeError("Expected argument 'compartment_id' to be a str")
|
37
|
+
pulumi.set(__self__, "compartment_id", compartment_id)
|
38
|
+
if compartment_id_in_subtree and not isinstance(compartment_id_in_subtree, bool):
|
39
|
+
raise TypeError("Expected argument 'compartment_id_in_subtree' to be a bool")
|
40
|
+
pulumi.set(__self__, "compartment_id_in_subtree", compartment_id_in_subtree)
|
41
|
+
if filters and not isinstance(filters, list):
|
42
|
+
raise TypeError("Expected argument 'filters' to be a list")
|
43
|
+
pulumi.set(__self__, "filters", filters)
|
44
|
+
if id and not isinstance(id, str):
|
45
|
+
raise TypeError("Expected argument 'id' to be a str")
|
46
|
+
pulumi.set(__self__, "id", id)
|
47
|
+
if scim_query and not isinstance(scim_query, str):
|
48
|
+
raise TypeError("Expected argument 'scim_query' to be a str")
|
49
|
+
pulumi.set(__self__, "scim_query", scim_query)
|
50
|
+
if sql_firewall_allowed_sql_collections and not isinstance(sql_firewall_allowed_sql_collections, list):
|
51
|
+
raise TypeError("Expected argument 'sql_firewall_allowed_sql_collections' to be a list")
|
52
|
+
pulumi.set(__self__, "sql_firewall_allowed_sql_collections", sql_firewall_allowed_sql_collections)
|
53
|
+
|
54
|
+
@property
|
55
|
+
@pulumi.getter(name="accessLevel")
|
56
|
+
def access_level(self) -> Optional[str]:
|
57
|
+
return pulumi.get(self, "access_level")
|
58
|
+
|
59
|
+
@property
|
60
|
+
@pulumi.getter(name="compartmentId")
|
61
|
+
def compartment_id(self) -> str:
|
62
|
+
"""
|
63
|
+
The OCID of the compartment containing the SQL Firewall allowed SQL.
|
64
|
+
"""
|
65
|
+
return pulumi.get(self, "compartment_id")
|
66
|
+
|
67
|
+
@property
|
68
|
+
@pulumi.getter(name="compartmentIdInSubtree")
|
69
|
+
def compartment_id_in_subtree(self) -> Optional[bool]:
|
70
|
+
return pulumi.get(self, "compartment_id_in_subtree")
|
71
|
+
|
72
|
+
@property
|
73
|
+
@pulumi.getter
|
74
|
+
def filters(self) -> Optional[Sequence['outputs.GetSqlFirewallAllowedSqlsFilterResult']]:
|
75
|
+
return pulumi.get(self, "filters")
|
76
|
+
|
77
|
+
@property
|
78
|
+
@pulumi.getter
|
79
|
+
def id(self) -> str:
|
80
|
+
"""
|
81
|
+
The provider-assigned unique ID for this managed resource.
|
82
|
+
"""
|
83
|
+
return pulumi.get(self, "id")
|
84
|
+
|
85
|
+
@property
|
86
|
+
@pulumi.getter(name="scimQuery")
|
87
|
+
def scim_query(self) -> Optional[str]:
|
88
|
+
return pulumi.get(self, "scim_query")
|
89
|
+
|
90
|
+
@property
|
91
|
+
@pulumi.getter(name="sqlFirewallAllowedSqlCollections")
|
92
|
+
def sql_firewall_allowed_sql_collections(self) -> Sequence['outputs.GetSqlFirewallAllowedSqlsSqlFirewallAllowedSqlCollectionResult']:
|
93
|
+
"""
|
94
|
+
The list of sql_firewall_allowed_sql_collection.
|
95
|
+
"""
|
96
|
+
return pulumi.get(self, "sql_firewall_allowed_sql_collections")
|
97
|
+
|
98
|
+
|
99
|
+
class AwaitableGetSqlFirewallAllowedSqlsResult(GetSqlFirewallAllowedSqlsResult):
|
100
|
+
# pylint: disable=using-constant-test
|
101
|
+
def __await__(self):
|
102
|
+
if False:
|
103
|
+
yield self
|
104
|
+
return GetSqlFirewallAllowedSqlsResult(
|
105
|
+
access_level=self.access_level,
|
106
|
+
compartment_id=self.compartment_id,
|
107
|
+
compartment_id_in_subtree=self.compartment_id_in_subtree,
|
108
|
+
filters=self.filters,
|
109
|
+
id=self.id,
|
110
|
+
scim_query=self.scim_query,
|
111
|
+
sql_firewall_allowed_sql_collections=self.sql_firewall_allowed_sql_collections)
|
112
|
+
|
113
|
+
|
114
|
+
def get_sql_firewall_allowed_sqls(access_level: Optional[str] = None,
|
115
|
+
compartment_id: Optional[str] = None,
|
116
|
+
compartment_id_in_subtree: Optional[bool] = None,
|
117
|
+
filters: Optional[Sequence[Union['GetSqlFirewallAllowedSqlsFilterArgs', 'GetSqlFirewallAllowedSqlsFilterArgsDict']]] = None,
|
118
|
+
scim_query: Optional[str] = None,
|
119
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSqlFirewallAllowedSqlsResult:
|
120
|
+
"""
|
121
|
+
This data source provides the list of Sql Firewall Allowed Sqls in Oracle Cloud Infrastructure Data Safe service.
|
122
|
+
|
123
|
+
Retrieves a list of all SQL Firewall allowed SQL statements.
|
124
|
+
|
125
|
+
The ListSqlFirewallAllowedSqls operation returns only the SQL Firewall allowed SQL statements in the specified `compartmentId`.
|
126
|
+
|
127
|
+
The parameter `accessLevel` specifies whether to return only those compartments for which the
|
128
|
+
requestor has INSPECT permissions on at least one resource directly
|
129
|
+
or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
|
130
|
+
Principal doesn't have access to even one of the child compartments. This is valid only when
|
131
|
+
`compartmentIdInSubtree` is set to `true`.
|
132
|
+
|
133
|
+
The parameter `compartmentIdInSubtree` applies when you perform ListSqlFirewallPolicies on the
|
134
|
+
`compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
|
135
|
+
To get a full list of all compartments and subcompartments in the tenancy (root compartment),
|
136
|
+
set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
|
137
|
+
|
138
|
+
## Example Usage
|
139
|
+
|
140
|
+
```python
|
141
|
+
import pulumi
|
142
|
+
import pulumi_oci as oci
|
143
|
+
|
144
|
+
test_sql_firewall_allowed_sqls = oci.DataSafe.get_sql_firewall_allowed_sqls(compartment_id=compartment_id,
|
145
|
+
access_level=sql_firewall_allowed_sql_access_level,
|
146
|
+
compartment_id_in_subtree=sql_firewall_allowed_sql_compartment_id_in_subtree,
|
147
|
+
scim_query=sql_firewall_allowed_sql_scim_query)
|
148
|
+
```
|
149
|
+
|
150
|
+
|
151
|
+
:param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
152
|
+
:param str compartment_id: A filter to return only resources that match the specified compartment OCID.
|
153
|
+
:param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
154
|
+
:param str scim_query: The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at [RFC3339](https://tools.ietf.org/html/draft-ietf-scim-api-12). In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
|
155
|
+
|
156
|
+
**Example:** query=(currentUser eq 'SCOTT') and (topLevel eq 'YES')
|
157
|
+
"""
|
158
|
+
__args__ = dict()
|
159
|
+
__args__['accessLevel'] = access_level
|
160
|
+
__args__['compartmentId'] = compartment_id
|
161
|
+
__args__['compartmentIdInSubtree'] = compartment_id_in_subtree
|
162
|
+
__args__['filters'] = filters
|
163
|
+
__args__['scimQuery'] = scim_query
|
164
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
165
|
+
__ret__ = pulumi.runtime.invoke('oci:DataSafe/getSqlFirewallAllowedSqls:getSqlFirewallAllowedSqls', __args__, opts=opts, typ=GetSqlFirewallAllowedSqlsResult).value
|
166
|
+
|
167
|
+
return AwaitableGetSqlFirewallAllowedSqlsResult(
|
168
|
+
access_level=pulumi.get(__ret__, 'access_level'),
|
169
|
+
compartment_id=pulumi.get(__ret__, 'compartment_id'),
|
170
|
+
compartment_id_in_subtree=pulumi.get(__ret__, 'compartment_id_in_subtree'),
|
171
|
+
filters=pulumi.get(__ret__, 'filters'),
|
172
|
+
id=pulumi.get(__ret__, 'id'),
|
173
|
+
scim_query=pulumi.get(__ret__, 'scim_query'),
|
174
|
+
sql_firewall_allowed_sql_collections=pulumi.get(__ret__, 'sql_firewall_allowed_sql_collections'))
|
175
|
+
def get_sql_firewall_allowed_sqls_output(access_level: Optional[pulumi.Input[Optional[str]]] = None,
|
176
|
+
compartment_id: Optional[pulumi.Input[str]] = None,
|
177
|
+
compartment_id_in_subtree: Optional[pulumi.Input[Optional[bool]]] = None,
|
178
|
+
filters: Optional[pulumi.Input[Optional[Sequence[Union['GetSqlFirewallAllowedSqlsFilterArgs', 'GetSqlFirewallAllowedSqlsFilterArgsDict']]]]] = None,
|
179
|
+
scim_query: Optional[pulumi.Input[Optional[str]]] = None,
|
180
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSqlFirewallAllowedSqlsResult]:
|
181
|
+
"""
|
182
|
+
This data source provides the list of Sql Firewall Allowed Sqls in Oracle Cloud Infrastructure Data Safe service.
|
183
|
+
|
184
|
+
Retrieves a list of all SQL Firewall allowed SQL statements.
|
185
|
+
|
186
|
+
The ListSqlFirewallAllowedSqls operation returns only the SQL Firewall allowed SQL statements in the specified `compartmentId`.
|
187
|
+
|
188
|
+
The parameter `accessLevel` specifies whether to return only those compartments for which the
|
189
|
+
requestor has INSPECT permissions on at least one resource directly
|
190
|
+
or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
|
191
|
+
Principal doesn't have access to even one of the child compartments. This is valid only when
|
192
|
+
`compartmentIdInSubtree` is set to `true`.
|
193
|
+
|
194
|
+
The parameter `compartmentIdInSubtree` applies when you perform ListSqlFirewallPolicies on the
|
195
|
+
`compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
|
196
|
+
To get a full list of all compartments and subcompartments in the tenancy (root compartment),
|
197
|
+
set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
|
198
|
+
|
199
|
+
## Example Usage
|
200
|
+
|
201
|
+
```python
|
202
|
+
import pulumi
|
203
|
+
import pulumi_oci as oci
|
204
|
+
|
205
|
+
test_sql_firewall_allowed_sqls = oci.DataSafe.get_sql_firewall_allowed_sqls(compartment_id=compartment_id,
|
206
|
+
access_level=sql_firewall_allowed_sql_access_level,
|
207
|
+
compartment_id_in_subtree=sql_firewall_allowed_sql_compartment_id_in_subtree,
|
208
|
+
scim_query=sql_firewall_allowed_sql_scim_query)
|
209
|
+
```
|
210
|
+
|
211
|
+
|
212
|
+
:param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
213
|
+
:param str compartment_id: A filter to return only resources that match the specified compartment OCID.
|
214
|
+
:param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
215
|
+
:param str scim_query: The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at [RFC3339](https://tools.ietf.org/html/draft-ietf-scim-api-12). In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
|
216
|
+
|
217
|
+
**Example:** query=(currentUser eq 'SCOTT') and (topLevel eq 'YES')
|
218
|
+
"""
|
219
|
+
__args__ = dict()
|
220
|
+
__args__['accessLevel'] = access_level
|
221
|
+
__args__['compartmentId'] = compartment_id
|
222
|
+
__args__['compartmentIdInSubtree'] = compartment_id_in_subtree
|
223
|
+
__args__['filters'] = filters
|
224
|
+
__args__['scimQuery'] = scim_query
|
225
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
226
|
+
__ret__ = pulumi.runtime.invoke_output('oci:DataSafe/getSqlFirewallAllowedSqls:getSqlFirewallAllowedSqls', __args__, opts=opts, typ=GetSqlFirewallAllowedSqlsResult)
|
227
|
+
return __ret__.apply(lambda __response__: GetSqlFirewallAllowedSqlsResult(
|
228
|
+
access_level=pulumi.get(__response__, 'access_level'),
|
229
|
+
compartment_id=pulumi.get(__response__, 'compartment_id'),
|
230
|
+
compartment_id_in_subtree=pulumi.get(__response__, 'compartment_id_in_subtree'),
|
231
|
+
filters=pulumi.get(__response__, 'filters'),
|
232
|
+
id=pulumi.get(__response__, 'id'),
|
233
|
+
scim_query=pulumi.get(__response__, 'scim_query'),
|
234
|
+
sql_firewall_allowed_sql_collections=pulumi.get(__response__, 'sql_firewall_allowed_sql_collections')))
|
@@ -0,0 +1,386 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import sys
|
8
|
+
import pulumi
|
9
|
+
import pulumi.runtime
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
|
+
from .. import _utilities
|
16
|
+
from . import outputs
|
17
|
+
from ._inputs import *
|
18
|
+
|
19
|
+
__all__ = [
|
20
|
+
'GetSqlFirewallPoliciesResult',
|
21
|
+
'AwaitableGetSqlFirewallPoliciesResult',
|
22
|
+
'get_sql_firewall_policies',
|
23
|
+
'get_sql_firewall_policies_output',
|
24
|
+
]
|
25
|
+
|
26
|
+
@pulumi.output_type
|
27
|
+
class GetSqlFirewallPoliciesResult:
|
28
|
+
"""
|
29
|
+
A collection of values returned by getSqlFirewallPolicies.
|
30
|
+
"""
|
31
|
+
def __init__(__self__, access_level=None, compartment_id=None, compartment_id_in_subtree=None, db_user_name=None, display_name=None, filters=None, id=None, security_policy_id=None, sql_firewall_policy_collections=None, sql_firewall_policy_id=None, state=None, time_created_greater_than_or_equal_to=None, time_created_less_than=None, violation_action=None):
|
32
|
+
if access_level and not isinstance(access_level, str):
|
33
|
+
raise TypeError("Expected argument 'access_level' to be a str")
|
34
|
+
pulumi.set(__self__, "access_level", access_level)
|
35
|
+
if compartment_id and not isinstance(compartment_id, str):
|
36
|
+
raise TypeError("Expected argument 'compartment_id' to be a str")
|
37
|
+
pulumi.set(__self__, "compartment_id", compartment_id)
|
38
|
+
if compartment_id_in_subtree and not isinstance(compartment_id_in_subtree, bool):
|
39
|
+
raise TypeError("Expected argument 'compartment_id_in_subtree' to be a bool")
|
40
|
+
pulumi.set(__self__, "compartment_id_in_subtree", compartment_id_in_subtree)
|
41
|
+
if db_user_name and not isinstance(db_user_name, str):
|
42
|
+
raise TypeError("Expected argument 'db_user_name' to be a str")
|
43
|
+
pulumi.set(__self__, "db_user_name", db_user_name)
|
44
|
+
if display_name and not isinstance(display_name, str):
|
45
|
+
raise TypeError("Expected argument 'display_name' to be a str")
|
46
|
+
pulumi.set(__self__, "display_name", display_name)
|
47
|
+
if filters and not isinstance(filters, list):
|
48
|
+
raise TypeError("Expected argument 'filters' to be a list")
|
49
|
+
pulumi.set(__self__, "filters", filters)
|
50
|
+
if id and not isinstance(id, str):
|
51
|
+
raise TypeError("Expected argument 'id' to be a str")
|
52
|
+
pulumi.set(__self__, "id", id)
|
53
|
+
if security_policy_id and not isinstance(security_policy_id, str):
|
54
|
+
raise TypeError("Expected argument 'security_policy_id' to be a str")
|
55
|
+
pulumi.set(__self__, "security_policy_id", security_policy_id)
|
56
|
+
if sql_firewall_policy_collections and not isinstance(sql_firewall_policy_collections, list):
|
57
|
+
raise TypeError("Expected argument 'sql_firewall_policy_collections' to be a list")
|
58
|
+
pulumi.set(__self__, "sql_firewall_policy_collections", sql_firewall_policy_collections)
|
59
|
+
if sql_firewall_policy_id and not isinstance(sql_firewall_policy_id, str):
|
60
|
+
raise TypeError("Expected argument 'sql_firewall_policy_id' to be a str")
|
61
|
+
pulumi.set(__self__, "sql_firewall_policy_id", sql_firewall_policy_id)
|
62
|
+
if state and not isinstance(state, str):
|
63
|
+
raise TypeError("Expected argument 'state' to be a str")
|
64
|
+
pulumi.set(__self__, "state", state)
|
65
|
+
if time_created_greater_than_or_equal_to and not isinstance(time_created_greater_than_or_equal_to, str):
|
66
|
+
raise TypeError("Expected argument 'time_created_greater_than_or_equal_to' to be a str")
|
67
|
+
pulumi.set(__self__, "time_created_greater_than_or_equal_to", time_created_greater_than_or_equal_to)
|
68
|
+
if time_created_less_than and not isinstance(time_created_less_than, str):
|
69
|
+
raise TypeError("Expected argument 'time_created_less_than' to be a str")
|
70
|
+
pulumi.set(__self__, "time_created_less_than", time_created_less_than)
|
71
|
+
if violation_action and not isinstance(violation_action, str):
|
72
|
+
raise TypeError("Expected argument 'violation_action' to be a str")
|
73
|
+
pulumi.set(__self__, "violation_action", violation_action)
|
74
|
+
|
75
|
+
@property
|
76
|
+
@pulumi.getter(name="accessLevel")
|
77
|
+
def access_level(self) -> Optional[str]:
|
78
|
+
return pulumi.get(self, "access_level")
|
79
|
+
|
80
|
+
@property
|
81
|
+
@pulumi.getter(name="compartmentId")
|
82
|
+
def compartment_id(self) -> str:
|
83
|
+
"""
|
84
|
+
The OCID of the compartment containing the SQL Firewall policy.
|
85
|
+
"""
|
86
|
+
return pulumi.get(self, "compartment_id")
|
87
|
+
|
88
|
+
@property
|
89
|
+
@pulumi.getter(name="compartmentIdInSubtree")
|
90
|
+
def compartment_id_in_subtree(self) -> Optional[bool]:
|
91
|
+
return pulumi.get(self, "compartment_id_in_subtree")
|
92
|
+
|
93
|
+
@property
|
94
|
+
@pulumi.getter(name="dbUserName")
|
95
|
+
def db_user_name(self) -> Optional[str]:
|
96
|
+
"""
|
97
|
+
The database user name.
|
98
|
+
"""
|
99
|
+
return pulumi.get(self, "db_user_name")
|
100
|
+
|
101
|
+
@property
|
102
|
+
@pulumi.getter(name="displayName")
|
103
|
+
def display_name(self) -> Optional[str]:
|
104
|
+
"""
|
105
|
+
The display name of the SQL Firewall policy.
|
106
|
+
"""
|
107
|
+
return pulumi.get(self, "display_name")
|
108
|
+
|
109
|
+
@property
|
110
|
+
@pulumi.getter
|
111
|
+
def filters(self) -> Optional[Sequence['outputs.GetSqlFirewallPoliciesFilterResult']]:
|
112
|
+
return pulumi.get(self, "filters")
|
113
|
+
|
114
|
+
@property
|
115
|
+
@pulumi.getter
|
116
|
+
def id(self) -> str:
|
117
|
+
"""
|
118
|
+
The provider-assigned unique ID for this managed resource.
|
119
|
+
"""
|
120
|
+
return pulumi.get(self, "id")
|
121
|
+
|
122
|
+
@property
|
123
|
+
@pulumi.getter(name="securityPolicyId")
|
124
|
+
def security_policy_id(self) -> Optional[str]:
|
125
|
+
"""
|
126
|
+
The OCID of the security policy corresponding to the SQL Firewall policy.
|
127
|
+
"""
|
128
|
+
return pulumi.get(self, "security_policy_id")
|
129
|
+
|
130
|
+
@property
|
131
|
+
@pulumi.getter(name="sqlFirewallPolicyCollections")
|
132
|
+
def sql_firewall_policy_collections(self) -> Sequence['outputs.GetSqlFirewallPoliciesSqlFirewallPolicyCollectionResult']:
|
133
|
+
"""
|
134
|
+
The list of sql_firewall_policy_collection.
|
135
|
+
"""
|
136
|
+
return pulumi.get(self, "sql_firewall_policy_collections")
|
137
|
+
|
138
|
+
@property
|
139
|
+
@pulumi.getter(name="sqlFirewallPolicyId")
|
140
|
+
def sql_firewall_policy_id(self) -> Optional[str]:
|
141
|
+
return pulumi.get(self, "sql_firewall_policy_id")
|
142
|
+
|
143
|
+
@property
|
144
|
+
@pulumi.getter
|
145
|
+
def state(self) -> Optional[str]:
|
146
|
+
"""
|
147
|
+
The current state of the SQL Firewall policy.
|
148
|
+
"""
|
149
|
+
return pulumi.get(self, "state")
|
150
|
+
|
151
|
+
@property
|
152
|
+
@pulumi.getter(name="timeCreatedGreaterThanOrEqualTo")
|
153
|
+
def time_created_greater_than_or_equal_to(self) -> Optional[str]:
|
154
|
+
return pulumi.get(self, "time_created_greater_than_or_equal_to")
|
155
|
+
|
156
|
+
@property
|
157
|
+
@pulumi.getter(name="timeCreatedLessThan")
|
158
|
+
def time_created_less_than(self) -> Optional[str]:
|
159
|
+
return pulumi.get(self, "time_created_less_than")
|
160
|
+
|
161
|
+
@property
|
162
|
+
@pulumi.getter(name="violationAction")
|
163
|
+
def violation_action(self) -> Optional[str]:
|
164
|
+
"""
|
165
|
+
Specifies the mode in which the SQL Firewall policy is enabled.
|
166
|
+
"""
|
167
|
+
return pulumi.get(self, "violation_action")
|
168
|
+
|
169
|
+
|
170
|
+
class AwaitableGetSqlFirewallPoliciesResult(GetSqlFirewallPoliciesResult):
|
171
|
+
# pylint: disable=using-constant-test
|
172
|
+
def __await__(self):
|
173
|
+
if False:
|
174
|
+
yield self
|
175
|
+
return GetSqlFirewallPoliciesResult(
|
176
|
+
access_level=self.access_level,
|
177
|
+
compartment_id=self.compartment_id,
|
178
|
+
compartment_id_in_subtree=self.compartment_id_in_subtree,
|
179
|
+
db_user_name=self.db_user_name,
|
180
|
+
display_name=self.display_name,
|
181
|
+
filters=self.filters,
|
182
|
+
id=self.id,
|
183
|
+
security_policy_id=self.security_policy_id,
|
184
|
+
sql_firewall_policy_collections=self.sql_firewall_policy_collections,
|
185
|
+
sql_firewall_policy_id=self.sql_firewall_policy_id,
|
186
|
+
state=self.state,
|
187
|
+
time_created_greater_than_or_equal_to=self.time_created_greater_than_or_equal_to,
|
188
|
+
time_created_less_than=self.time_created_less_than,
|
189
|
+
violation_action=self.violation_action)
|
190
|
+
|
191
|
+
|
192
|
+
def get_sql_firewall_policies(access_level: Optional[str] = None,
|
193
|
+
compartment_id: Optional[str] = None,
|
194
|
+
compartment_id_in_subtree: Optional[bool] = None,
|
195
|
+
db_user_name: Optional[str] = None,
|
196
|
+
display_name: Optional[str] = None,
|
197
|
+
filters: Optional[Sequence[Union['GetSqlFirewallPoliciesFilterArgs', 'GetSqlFirewallPoliciesFilterArgsDict']]] = None,
|
198
|
+
security_policy_id: Optional[str] = None,
|
199
|
+
sql_firewall_policy_id: Optional[str] = None,
|
200
|
+
state: Optional[str] = None,
|
201
|
+
time_created_greater_than_or_equal_to: Optional[str] = None,
|
202
|
+
time_created_less_than: Optional[str] = None,
|
203
|
+
violation_action: Optional[str] = None,
|
204
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSqlFirewallPoliciesResult:
|
205
|
+
"""
|
206
|
+
This data source provides the list of Sql Firewall Policies in Oracle Cloud Infrastructure Data Safe service.
|
207
|
+
|
208
|
+
Retrieves a list of all SQL Firewall policies.
|
209
|
+
|
210
|
+
The ListSqlFirewallPolicies operation returns only the SQL Firewall policies in the specified `compartmentId`.
|
211
|
+
|
212
|
+
The parameter `accessLevel` specifies whether to return only those compartments for which the
|
213
|
+
requestor has INSPECT permissions on at least one resource directly
|
214
|
+
or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
|
215
|
+
Principal doesn't have access to even one of the child compartments. This is valid only when
|
216
|
+
`compartmentIdInSubtree` is set to `true`.
|
217
|
+
|
218
|
+
The parameter `compartmentIdInSubtree` applies when you perform ListSqlFirewallPolicies on the
|
219
|
+
`compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
|
220
|
+
To get a full list of all compartments and subcompartments in the tenancy (root compartment),
|
221
|
+
set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
|
222
|
+
|
223
|
+
## Example Usage
|
224
|
+
|
225
|
+
```python
|
226
|
+
import pulumi
|
227
|
+
import pulumi_oci as oci
|
228
|
+
|
229
|
+
test_sql_firewall_policies = oci.DataSafe.get_sql_firewall_policies(compartment_id=compartment_id,
|
230
|
+
access_level=sql_firewall_policy_access_level,
|
231
|
+
compartment_id_in_subtree=sql_firewall_policy_compartment_id_in_subtree,
|
232
|
+
db_user_name=test_user["name"],
|
233
|
+
display_name=sql_firewall_policy_display_name,
|
234
|
+
security_policy_id=test_security_policy["id"],
|
235
|
+
sql_firewall_policy_id=test_sql_firewall_policy["id"],
|
236
|
+
state=sql_firewall_policy_state,
|
237
|
+
time_created_greater_than_or_equal_to=sql_firewall_policy_time_created_greater_than_or_equal_to,
|
238
|
+
time_created_less_than=sql_firewall_policy_time_created_less_than,
|
239
|
+
violation_action=sql_firewall_policy_violation_action)
|
240
|
+
```
|
241
|
+
|
242
|
+
|
243
|
+
:param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
244
|
+
:param str compartment_id: A filter to return only resources that match the specified compartment OCID.
|
245
|
+
:param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
246
|
+
:param str db_user_name: A filter to return only items that match the specified user name.
|
247
|
+
:param str display_name: A filter to return only resources that match the specified display name.
|
248
|
+
:param str security_policy_id: An optional filter to return only resources that match the specified OCID of the security policy resource.
|
249
|
+
:param str sql_firewall_policy_id: An optional filter to return only resources that match the specified OCID of the SQL Firewall policy resource.
|
250
|
+
:param str state: The current state of the SQL Firewall policy.
|
251
|
+
:param str time_created_greater_than_or_equal_to: A filter to return only the resources that were created after the specified date and time, as defined by [RFC3339](https://tools.ietf.org/html/rfc3339). Using TimeCreatedGreaterThanOrEqualToQueryParam parameter retrieves all resources created after that date.
|
252
|
+
|
253
|
+
**Example:** 2016-12-19T16:39:57.600Z
|
254
|
+
:param str time_created_less_than: Search for resources that were created before a specific date. Specifying this parameter corresponding `timeCreatedLessThan` parameter will retrieve all resources created before the specified created date, in "YYYY-MM-ddThh:mmZ" format with a Z offset, as defined by RFC 3339.
|
255
|
+
|
256
|
+
**Example:** 2016-12-19T16:39:57.600Z
|
257
|
+
:param str violation_action: An optional filter to return only resources that match the specified violation action.
|
258
|
+
"""
|
259
|
+
__args__ = dict()
|
260
|
+
__args__['accessLevel'] = access_level
|
261
|
+
__args__['compartmentId'] = compartment_id
|
262
|
+
__args__['compartmentIdInSubtree'] = compartment_id_in_subtree
|
263
|
+
__args__['dbUserName'] = db_user_name
|
264
|
+
__args__['displayName'] = display_name
|
265
|
+
__args__['filters'] = filters
|
266
|
+
__args__['securityPolicyId'] = security_policy_id
|
267
|
+
__args__['sqlFirewallPolicyId'] = sql_firewall_policy_id
|
268
|
+
__args__['state'] = state
|
269
|
+
__args__['timeCreatedGreaterThanOrEqualTo'] = time_created_greater_than_or_equal_to
|
270
|
+
__args__['timeCreatedLessThan'] = time_created_less_than
|
271
|
+
__args__['violationAction'] = violation_action
|
272
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
273
|
+
__ret__ = pulumi.runtime.invoke('oci:DataSafe/getSqlFirewallPolicies:getSqlFirewallPolicies', __args__, opts=opts, typ=GetSqlFirewallPoliciesResult).value
|
274
|
+
|
275
|
+
return AwaitableGetSqlFirewallPoliciesResult(
|
276
|
+
access_level=pulumi.get(__ret__, 'access_level'),
|
277
|
+
compartment_id=pulumi.get(__ret__, 'compartment_id'),
|
278
|
+
compartment_id_in_subtree=pulumi.get(__ret__, 'compartment_id_in_subtree'),
|
279
|
+
db_user_name=pulumi.get(__ret__, 'db_user_name'),
|
280
|
+
display_name=pulumi.get(__ret__, 'display_name'),
|
281
|
+
filters=pulumi.get(__ret__, 'filters'),
|
282
|
+
id=pulumi.get(__ret__, 'id'),
|
283
|
+
security_policy_id=pulumi.get(__ret__, 'security_policy_id'),
|
284
|
+
sql_firewall_policy_collections=pulumi.get(__ret__, 'sql_firewall_policy_collections'),
|
285
|
+
sql_firewall_policy_id=pulumi.get(__ret__, 'sql_firewall_policy_id'),
|
286
|
+
state=pulumi.get(__ret__, 'state'),
|
287
|
+
time_created_greater_than_or_equal_to=pulumi.get(__ret__, 'time_created_greater_than_or_equal_to'),
|
288
|
+
time_created_less_than=pulumi.get(__ret__, 'time_created_less_than'),
|
289
|
+
violation_action=pulumi.get(__ret__, 'violation_action'))
|
290
|
+
def get_sql_firewall_policies_output(access_level: Optional[pulumi.Input[Optional[str]]] = None,
|
291
|
+
compartment_id: Optional[pulumi.Input[str]] = None,
|
292
|
+
compartment_id_in_subtree: Optional[pulumi.Input[Optional[bool]]] = None,
|
293
|
+
db_user_name: Optional[pulumi.Input[Optional[str]]] = None,
|
294
|
+
display_name: Optional[pulumi.Input[Optional[str]]] = None,
|
295
|
+
filters: Optional[pulumi.Input[Optional[Sequence[Union['GetSqlFirewallPoliciesFilterArgs', 'GetSqlFirewallPoliciesFilterArgsDict']]]]] = None,
|
296
|
+
security_policy_id: Optional[pulumi.Input[Optional[str]]] = None,
|
297
|
+
sql_firewall_policy_id: Optional[pulumi.Input[Optional[str]]] = None,
|
298
|
+
state: Optional[pulumi.Input[Optional[str]]] = None,
|
299
|
+
time_created_greater_than_or_equal_to: Optional[pulumi.Input[Optional[str]]] = None,
|
300
|
+
time_created_less_than: Optional[pulumi.Input[Optional[str]]] = None,
|
301
|
+
violation_action: Optional[pulumi.Input[Optional[str]]] = None,
|
302
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSqlFirewallPoliciesResult]:
|
303
|
+
"""
|
304
|
+
This data source provides the list of Sql Firewall Policies in Oracle Cloud Infrastructure Data Safe service.
|
305
|
+
|
306
|
+
Retrieves a list of all SQL Firewall policies.
|
307
|
+
|
308
|
+
The ListSqlFirewallPolicies operation returns only the SQL Firewall policies in the specified `compartmentId`.
|
309
|
+
|
310
|
+
The parameter `accessLevel` specifies whether to return only those compartments for which the
|
311
|
+
requestor has INSPECT permissions on at least one resource directly
|
312
|
+
or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
|
313
|
+
Principal doesn't have access to even one of the child compartments. This is valid only when
|
314
|
+
`compartmentIdInSubtree` is set to `true`.
|
315
|
+
|
316
|
+
The parameter `compartmentIdInSubtree` applies when you perform ListSqlFirewallPolicies on the
|
317
|
+
`compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
|
318
|
+
To get a full list of all compartments and subcompartments in the tenancy (root compartment),
|
319
|
+
set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
|
320
|
+
|
321
|
+
## Example Usage
|
322
|
+
|
323
|
+
```python
|
324
|
+
import pulumi
|
325
|
+
import pulumi_oci as oci
|
326
|
+
|
327
|
+
test_sql_firewall_policies = oci.DataSafe.get_sql_firewall_policies(compartment_id=compartment_id,
|
328
|
+
access_level=sql_firewall_policy_access_level,
|
329
|
+
compartment_id_in_subtree=sql_firewall_policy_compartment_id_in_subtree,
|
330
|
+
db_user_name=test_user["name"],
|
331
|
+
display_name=sql_firewall_policy_display_name,
|
332
|
+
security_policy_id=test_security_policy["id"],
|
333
|
+
sql_firewall_policy_id=test_sql_firewall_policy["id"],
|
334
|
+
state=sql_firewall_policy_state,
|
335
|
+
time_created_greater_than_or_equal_to=sql_firewall_policy_time_created_greater_than_or_equal_to,
|
336
|
+
time_created_less_than=sql_firewall_policy_time_created_less_than,
|
337
|
+
violation_action=sql_firewall_policy_violation_action)
|
338
|
+
```
|
339
|
+
|
340
|
+
|
341
|
+
:param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
342
|
+
:param str compartment_id: A filter to return only resources that match the specified compartment OCID.
|
343
|
+
:param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
344
|
+
:param str db_user_name: A filter to return only items that match the specified user name.
|
345
|
+
:param str display_name: A filter to return only resources that match the specified display name.
|
346
|
+
:param str security_policy_id: An optional filter to return only resources that match the specified OCID of the security policy resource.
|
347
|
+
:param str sql_firewall_policy_id: An optional filter to return only resources that match the specified OCID of the SQL Firewall policy resource.
|
348
|
+
:param str state: The current state of the SQL Firewall policy.
|
349
|
+
:param str time_created_greater_than_or_equal_to: A filter to return only the resources that were created after the specified date and time, as defined by [RFC3339](https://tools.ietf.org/html/rfc3339). Using TimeCreatedGreaterThanOrEqualToQueryParam parameter retrieves all resources created after that date.
|
350
|
+
|
351
|
+
**Example:** 2016-12-19T16:39:57.600Z
|
352
|
+
:param str time_created_less_than: Search for resources that were created before a specific date. Specifying this parameter corresponding `timeCreatedLessThan` parameter will retrieve all resources created before the specified created date, in "YYYY-MM-ddThh:mmZ" format with a Z offset, as defined by RFC 3339.
|
353
|
+
|
354
|
+
**Example:** 2016-12-19T16:39:57.600Z
|
355
|
+
:param str violation_action: An optional filter to return only resources that match the specified violation action.
|
356
|
+
"""
|
357
|
+
__args__ = dict()
|
358
|
+
__args__['accessLevel'] = access_level
|
359
|
+
__args__['compartmentId'] = compartment_id
|
360
|
+
__args__['compartmentIdInSubtree'] = compartment_id_in_subtree
|
361
|
+
__args__['dbUserName'] = db_user_name
|
362
|
+
__args__['displayName'] = display_name
|
363
|
+
__args__['filters'] = filters
|
364
|
+
__args__['securityPolicyId'] = security_policy_id
|
365
|
+
__args__['sqlFirewallPolicyId'] = sql_firewall_policy_id
|
366
|
+
__args__['state'] = state
|
367
|
+
__args__['timeCreatedGreaterThanOrEqualTo'] = time_created_greater_than_or_equal_to
|
368
|
+
__args__['timeCreatedLessThan'] = time_created_less_than
|
369
|
+
__args__['violationAction'] = violation_action
|
370
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
371
|
+
__ret__ = pulumi.runtime.invoke_output('oci:DataSafe/getSqlFirewallPolicies:getSqlFirewallPolicies', __args__, opts=opts, typ=GetSqlFirewallPoliciesResult)
|
372
|
+
return __ret__.apply(lambda __response__: GetSqlFirewallPoliciesResult(
|
373
|
+
access_level=pulumi.get(__response__, 'access_level'),
|
374
|
+
compartment_id=pulumi.get(__response__, 'compartment_id'),
|
375
|
+
compartment_id_in_subtree=pulumi.get(__response__, 'compartment_id_in_subtree'),
|
376
|
+
db_user_name=pulumi.get(__response__, 'db_user_name'),
|
377
|
+
display_name=pulumi.get(__response__, 'display_name'),
|
378
|
+
filters=pulumi.get(__response__, 'filters'),
|
379
|
+
id=pulumi.get(__response__, 'id'),
|
380
|
+
security_policy_id=pulumi.get(__response__, 'security_policy_id'),
|
381
|
+
sql_firewall_policy_collections=pulumi.get(__response__, 'sql_firewall_policy_collections'),
|
382
|
+
sql_firewall_policy_id=pulumi.get(__response__, 'sql_firewall_policy_id'),
|
383
|
+
state=pulumi.get(__response__, 'state'),
|
384
|
+
time_created_greater_than_or_equal_to=pulumi.get(__response__, 'time_created_greater_than_or_equal_to'),
|
385
|
+
time_created_less_than=pulumi.get(__response__, 'time_created_less_than'),
|
386
|
+
violation_action=pulumi.get(__response__, 'violation_action')))
|