pulumi-oci 2.12.0a1728593306__py3-none-any.whl → 2.13.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (220) hide show
  1. pulumi_oci/__init__.py +169 -19
  2. pulumi_oci/analytics/analytics_instance.py +54 -5
  3. pulumi_oci/analytics/get_analytics_instance.py +18 -4
  4. pulumi_oci/analytics/outputs.py +12 -1
  5. pulumi_oci/containerengine/_inputs.py +341 -0
  6. pulumi_oci/containerengine/cluster.py +64 -0
  7. pulumi_oci/containerengine/get_cluster.py +12 -1
  8. pulumi_oci/containerengine/outputs.py +582 -0
  9. pulumi_oci/core/_inputs.py +947 -196
  10. pulumi_oci/core/boot_volume.py +90 -5
  11. pulumi_oci/core/cluster_network.py +7 -7
  12. pulumi_oci/core/get_block_volume_replica.py +15 -1
  13. pulumi_oci/core/get_boot_volume.py +15 -4
  14. pulumi_oci/core/get_boot_volume_replica.py +15 -1
  15. pulumi_oci/core/get_instance.py +29 -1
  16. pulumi_oci/core/get_vcn.py +15 -1
  17. pulumi_oci/core/get_vnic.py +15 -1
  18. pulumi_oci/core/get_volume.py +18 -4
  19. pulumi_oci/core/instance.py +87 -0
  20. pulumi_oci/core/instance_configuration.py +16 -0
  21. pulumi_oci/core/ipsec.py +183 -23
  22. pulumi_oci/core/network_security_group_security_rule.py +2 -2
  23. pulumi_oci/core/outputs.py +1282 -153
  24. pulumi_oci/core/service_gateway.py +13 -7
  25. pulumi_oci/core/vcn.py +65 -23
  26. pulumi_oci/core/virtual_network.py +35 -1
  27. pulumi_oci/core/vnic_attachment.py +2 -0
  28. pulumi_oci/core/volume.py +110 -12
  29. pulumi_oci/core/volume_backup_policy_assignment.py +68 -19
  30. pulumi_oci/core/volume_group.py +56 -5
  31. pulumi_oci/database/_inputs.py +905 -27
  32. pulumi_oci/database/autonomous_database.py +48 -28
  33. pulumi_oci/database/autonomous_database_backup.py +12 -12
  34. pulumi_oci/database/autonomous_exadata_infrastructure.py +2 -0
  35. pulumi_oci/database/autonomous_vm_cluster.py +2 -0
  36. pulumi_oci/database/backup.py +12 -12
  37. pulumi_oci/database/cloud_autonomous_vm_cluster.py +2 -0
  38. pulumi_oci/database/cloud_exadata_infrastructure.py +2 -0
  39. pulumi_oci/database/cloud_vm_cluster.py +71 -0
  40. pulumi_oci/database/database.py +15 -15
  41. pulumi_oci/database/database_upgrade.py +12 -12
  42. pulumi_oci/database/db_system.py +9 -9
  43. pulumi_oci/database/exadata_infrastructure.py +2 -0
  44. pulumi_oci/database/get_autonomous_container_database.py +1 -1
  45. pulumi_oci/database/get_autonomous_database.py +18 -4
  46. pulumi_oci/database/get_autonomous_database_backup.py +3 -3
  47. pulumi_oci/database/get_autonomous_databases.py +88 -5
  48. pulumi_oci/database/get_cloud_vm_cluster.py +15 -1
  49. pulumi_oci/database/get_database.py +3 -3
  50. pulumi_oci/database/get_pluggable_database.py +12 -1
  51. pulumi_oci/database/get_vm_cluster.py +15 -1
  52. pulumi_oci/database/outputs.py +1431 -74
  53. pulumi_oci/database/pluggable_database.py +34 -0
  54. pulumi_oci/database/vm_cluster.py +71 -0
  55. pulumi_oci/database/vm_cluster_add_virtual_network.py +28 -0
  56. pulumi_oci/database/vm_cluster_remove_virtual_machine.py +28 -0
  57. pulumi_oci/datasafe/__init__.py +13 -0
  58. pulumi_oci/datasafe/_inputs.py +441 -0
  59. pulumi_oci/datasafe/generate_on_prem_connector_configuration.py +271 -0
  60. pulumi_oci/datasafe/get_reports.py +23 -1
  61. pulumi_oci/datasafe/get_sql_collection.py +392 -0
  62. pulumi_oci/datasafe/get_sql_collection_analytics.py +309 -0
  63. pulumi_oci/datasafe/get_sql_collection_log_insights.py +207 -0
  64. pulumi_oci/datasafe/get_sql_collections.py +364 -0
  65. pulumi_oci/datasafe/get_sql_firewall_allowed_sql.py +337 -0
  66. pulumi_oci/datasafe/get_sql_firewall_allowed_sql_analytics.py +250 -0
  67. pulumi_oci/datasafe/get_sql_firewall_allowed_sqls.py +234 -0
  68. pulumi_oci/datasafe/get_sql_firewall_policies.py +386 -0
  69. pulumi_oci/datasafe/get_sql_firewall_policy.py +393 -0
  70. pulumi_oci/datasafe/get_sql_firewall_policy_analytics.py +305 -0
  71. pulumi_oci/datasafe/get_sql_firewall_violation_analytics.py +306 -0
  72. pulumi_oci/datasafe/get_sql_firewall_violations.py +208 -0
  73. pulumi_oci/datasafe/outputs.py +1808 -2
  74. pulumi_oci/desktops/_inputs.py +395 -17
  75. pulumi_oci/desktops/desktop_pool.py +253 -21
  76. pulumi_oci/desktops/get_desktop_pool.py +62 -5
  77. pulumi_oci/desktops/outputs.py +807 -25
  78. pulumi_oci/dns/__init__.py +2 -0
  79. pulumi_oci/dns/_inputs.py +1157 -12
  80. pulumi_oci/dns/action_create_zone_from_zone_file.py +42 -2
  81. pulumi_oci/dns/get_records.py +45 -13
  82. pulumi_oci/dns/get_resolver.py +8 -6
  83. pulumi_oci/dns/get_resolver_endpoint.py +8 -6
  84. pulumi_oci/dns/get_resolver_endpoints.py +2 -2
  85. pulumi_oci/dns/get_resolvers.py +12 -12
  86. pulumi_oci/dns/get_rrset.py +16 -16
  87. pulumi_oci/dns/get_rrsets.py +12 -10
  88. pulumi_oci/dns/get_view.py +8 -4
  89. pulumi_oci/dns/get_views.py +12 -12
  90. pulumi_oci/dns/get_zones.py +33 -13
  91. pulumi_oci/dns/outputs.py +1388 -79
  92. pulumi_oci/dns/record.py +12 -12
  93. pulumi_oci/dns/resolver.py +7 -7
  94. pulumi_oci/dns/resolver_endpoint.py +2 -2
  95. pulumi_oci/dns/rrset.py +50 -41
  96. pulumi_oci/dns/zone.py +176 -17
  97. pulumi_oci/dns/zone_promote_dnssec_key_version.py +328 -0
  98. pulumi_oci/dns/zone_stage_dnssec_key_version.py +318 -0
  99. pulumi_oci/fleetappsmanagement/__init__.py +43 -0
  100. pulumi_oci/fleetappsmanagement/_inputs.py +2057 -0
  101. pulumi_oci/fleetappsmanagement/fleet.py +955 -0
  102. pulumi_oci/fleetappsmanagement/fleet_credential.py +615 -0
  103. pulumi_oci/fleetappsmanagement/fleet_property.py +585 -0
  104. pulumi_oci/fleetappsmanagement/fleet_resource.py +851 -0
  105. pulumi_oci/fleetappsmanagement/get_announcements.py +166 -0
  106. pulumi_oci/fleetappsmanagement/get_fleet.py +394 -0
  107. pulumi_oci/fleetappsmanagement/get_fleet_compliance_report.py +164 -0
  108. pulumi_oci/fleetappsmanagement/get_fleet_credential.py +273 -0
  109. pulumi_oci/fleetappsmanagement/get_fleet_credentials.py +240 -0
  110. pulumi_oci/fleetappsmanagement/get_fleet_products.py +232 -0
  111. pulumi_oci/fleetappsmanagement/get_fleet_properties.py +218 -0
  112. pulumi_oci/fleetappsmanagement/get_fleet_property.py +286 -0
  113. pulumi_oci/fleetappsmanagement/get_fleet_resource.py +398 -0
  114. pulumi_oci/fleetappsmanagement/get_fleet_resources.py +237 -0
  115. pulumi_oci/fleetappsmanagement/get_fleet_targets.py +232 -0
  116. pulumi_oci/fleetappsmanagement/get_fleets.py +284 -0
  117. pulumi_oci/fleetappsmanagement/get_inventory_resources.py +311 -0
  118. pulumi_oci/fleetappsmanagement/get_maintenance_window.py +365 -0
  119. pulumi_oci/fleetappsmanagement/get_maintenance_windows.py +199 -0
  120. pulumi_oci/fleetappsmanagement/get_onboarding_policies.py +123 -0
  121. pulumi_oci/fleetappsmanagement/get_onboardings.py +177 -0
  122. pulumi_oci/fleetappsmanagement/get_properties.py +221 -0
  123. pulumi_oci/fleetappsmanagement/get_property.py +323 -0
  124. pulumi_oci/fleetappsmanagement/get_runbook.py +377 -0
  125. pulumi_oci/fleetappsmanagement/get_runbooks.py +284 -0
  126. pulumi_oci/fleetappsmanagement/get_scheduler_definition.py +436 -0
  127. pulumi_oci/fleetappsmanagement/get_scheduler_definition_scheduled_fleets.py +185 -0
  128. pulumi_oci/fleetappsmanagement/get_scheduler_definitions.py +262 -0
  129. pulumi_oci/fleetappsmanagement/get_task_record.py +307 -0
  130. pulumi_oci/fleetappsmanagement/get_task_records.py +240 -0
  131. pulumi_oci/fleetappsmanagement/maintenance_window.py +935 -0
  132. pulumi_oci/fleetappsmanagement/onboarding.py +477 -0
  133. pulumi_oci/fleetappsmanagement/outputs.py +8128 -0
  134. pulumi_oci/fleetappsmanagement/property.py +697 -0
  135. pulumi_oci/fleetappsmanagement/scheduler_definition.py +1035 -0
  136. pulumi_oci/functions/get_fusion_environment_refresh_activity.py +15 -1
  137. pulumi_oci/functions/outputs.py +11 -0
  138. pulumi_oci/fusionapps/_inputs.py +21 -20
  139. pulumi_oci/fusionapps/fusion_environment.py +2 -2
  140. pulumi_oci/fusionapps/fusion_environment_admin_user.py +21 -22
  141. pulumi_oci/fusionapps/fusion_environment_refresh_activity.py +48 -51
  142. pulumi_oci/fusionapps/outputs.py +11 -10
  143. pulumi_oci/goldengate/__init__.py +1 -0
  144. pulumi_oci/goldengate/_inputs.py +165 -0
  145. pulumi_oci/goldengate/connection.py +49 -35
  146. pulumi_oci/goldengate/database_registration.py +7 -7
  147. pulumi_oci/goldengate/deployment.py +79 -4
  148. pulumi_oci/goldengate/get_deployment.py +30 -2
  149. pulumi_oci/goldengate/get_deployment_environments.py +144 -0
  150. pulumi_oci/goldengate/outputs.py +409 -2
  151. pulumi_oci/integration/__init__.py +1 -0
  152. pulumi_oci/integration/_inputs.py +289 -2
  153. pulumi_oci/integration/get_integration_instance.py +65 -1
  154. pulumi_oci/integration/integration_instance.py +172 -0
  155. pulumi_oci/integration/oracle_managed_custom_endpoint.py +307 -0
  156. pulumi_oci/integration/outputs.py +587 -19
  157. pulumi_oci/loadbalancer/_inputs.py +20 -0
  158. pulumi_oci/loadbalancer/listener.py +4 -2
  159. pulumi_oci/loadbalancer/outputs.py +16 -2
  160. pulumi_oci/monitoring/_inputs.py +137 -16
  161. pulumi_oci/monitoring/alarm_suppression.py +164 -35
  162. pulumi_oci/monitoring/get_alarm_statuses.py +5 -3
  163. pulumi_oci/monitoring/get_alarm_suppression.py +33 -3
  164. pulumi_oci/monitoring/get_alarm_suppressions.py +137 -14
  165. pulumi_oci/monitoring/outputs.py +291 -18
  166. pulumi_oci/mysql/mysql_db_system.py +7 -7
  167. pulumi_oci/objectstorage/__init__.py +3 -0
  168. pulumi_oci/objectstorage/_inputs.py +97 -0
  169. pulumi_oci/objectstorage/get_object_versions.py +6 -6
  170. pulumi_oci/objectstorage/get_objects.py +6 -6
  171. pulumi_oci/objectstorage/get_private_endpoint.py +263 -0
  172. pulumi_oci/objectstorage/get_private_endpoint_summaries.py +128 -0
  173. pulumi_oci/objectstorage/outputs.py +258 -0
  174. pulumi_oci/objectstorage/private_endpoint.py +630 -0
  175. pulumi_oci/objectstorage/storage_object.py +7 -7
  176. pulumi_oci/opsi/_inputs.py +268 -114
  177. pulumi_oci/opsi/database_insight.py +162 -21
  178. pulumi_oci/opsi/exadata_insight.py +44 -0
  179. pulumi_oci/opsi/get_database_insight.py +40 -1
  180. pulumi_oci/opsi/get_host_insights.py +2 -2
  181. pulumi_oci/opsi/host_insight.py +0 -48
  182. pulumi_oci/opsi/outputs.py +405 -109
  183. pulumi_oci/pulumi-plugin.json +1 -1
  184. pulumi_oci/securityattribute/__init__.py +15 -0
  185. pulumi_oci/securityattribute/_inputs.py +209 -0
  186. pulumi_oci/securityattribute/get_security_attribute.py +262 -0
  187. pulumi_oci/securityattribute/get_security_attribute_namespace.py +253 -0
  188. pulumi_oci/securityattribute/get_security_attribute_namespaces.py +210 -0
  189. pulumi_oci/securityattribute/get_security_attributes.py +169 -0
  190. pulumi_oci/securityattribute/outputs.py +466 -0
  191. pulumi_oci/securityattribute/security_attribute.py +588 -0
  192. pulumi_oci/securityattribute/security_attribute_namespace.py +609 -0
  193. pulumi_oci/stackmonitoring/__init__.py +5 -0
  194. pulumi_oci/stackmonitoring/_inputs.py +330 -0
  195. pulumi_oci/stackmonitoring/get_maintenance_window.py +254 -0
  196. pulumi_oci/stackmonitoring/get_maintenance_windows.py +210 -0
  197. pulumi_oci/stackmonitoring/maintenance_window.py +551 -0
  198. pulumi_oci/stackmonitoring/maintenance_windows_retry_failed_operation.py +217 -0
  199. pulumi_oci/stackmonitoring/maintenance_windows_stop.py +217 -0
  200. pulumi_oci/stackmonitoring/outputs.py +603 -0
  201. pulumi_oci/{globallydistributeddatabase → zpr}/__init__.py +5 -6
  202. pulumi_oci/zpr/_inputs.py +79 -0
  203. pulumi_oci/zpr/configuration.py +516 -0
  204. pulumi_oci/zpr/get_configuration.py +230 -0
  205. pulumi_oci/zpr/get_zpr_policies.py +191 -0
  206. pulumi_oci/zpr/get_zpr_policy.py +264 -0
  207. pulumi_oci/zpr/outputs.py +203 -0
  208. pulumi_oci/zpr/zpr_policy.py +614 -0
  209. {pulumi_oci-2.12.0a1728593306.dist-info → pulumi_oci-2.13.0.dist-info}/METADATA +1 -1
  210. {pulumi_oci-2.12.0a1728593306.dist-info → pulumi_oci-2.13.0.dist-info}/RECORD +212 -142
  211. {pulumi_oci-2.12.0a1728593306.dist-info → pulumi_oci-2.13.0.dist-info}/WHEEL +1 -1
  212. pulumi_oci/globallydistributeddatabase/_inputs.py +0 -1289
  213. pulumi_oci/globallydistributeddatabase/get_private_endpoint.py +0 -323
  214. pulumi_oci/globallydistributeddatabase/get_private_endpoints.py +0 -191
  215. pulumi_oci/globallydistributeddatabase/get_sharded_database.py +0 -660
  216. pulumi_oci/globallydistributeddatabase/get_sharded_databases.py +0 -191
  217. pulumi_oci/globallydistributeddatabase/outputs.py +0 -2063
  218. pulumi_oci/globallydistributeddatabase/private_endpoint.py +0 -747
  219. pulumi_oci/globallydistributeddatabase/sharded_database.py +0 -1821
  220. {pulumi_oci-2.12.0a1728593306.dist-info → pulumi_oci-2.13.0.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,234 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+ from ._inputs import *
18
+
19
+ __all__ = [
20
+ 'GetSqlFirewallAllowedSqlsResult',
21
+ 'AwaitableGetSqlFirewallAllowedSqlsResult',
22
+ 'get_sql_firewall_allowed_sqls',
23
+ 'get_sql_firewall_allowed_sqls_output',
24
+ ]
25
+
26
+ @pulumi.output_type
27
+ class GetSqlFirewallAllowedSqlsResult:
28
+ """
29
+ A collection of values returned by getSqlFirewallAllowedSqls.
30
+ """
31
+ def __init__(__self__, access_level=None, compartment_id=None, compartment_id_in_subtree=None, filters=None, id=None, scim_query=None, sql_firewall_allowed_sql_collections=None):
32
+ if access_level and not isinstance(access_level, str):
33
+ raise TypeError("Expected argument 'access_level' to be a str")
34
+ pulumi.set(__self__, "access_level", access_level)
35
+ if compartment_id and not isinstance(compartment_id, str):
36
+ raise TypeError("Expected argument 'compartment_id' to be a str")
37
+ pulumi.set(__self__, "compartment_id", compartment_id)
38
+ if compartment_id_in_subtree and not isinstance(compartment_id_in_subtree, bool):
39
+ raise TypeError("Expected argument 'compartment_id_in_subtree' to be a bool")
40
+ pulumi.set(__self__, "compartment_id_in_subtree", compartment_id_in_subtree)
41
+ if filters and not isinstance(filters, list):
42
+ raise TypeError("Expected argument 'filters' to be a list")
43
+ pulumi.set(__self__, "filters", filters)
44
+ if id and not isinstance(id, str):
45
+ raise TypeError("Expected argument 'id' to be a str")
46
+ pulumi.set(__self__, "id", id)
47
+ if scim_query and not isinstance(scim_query, str):
48
+ raise TypeError("Expected argument 'scim_query' to be a str")
49
+ pulumi.set(__self__, "scim_query", scim_query)
50
+ if sql_firewall_allowed_sql_collections and not isinstance(sql_firewall_allowed_sql_collections, list):
51
+ raise TypeError("Expected argument 'sql_firewall_allowed_sql_collections' to be a list")
52
+ pulumi.set(__self__, "sql_firewall_allowed_sql_collections", sql_firewall_allowed_sql_collections)
53
+
54
+ @property
55
+ @pulumi.getter(name="accessLevel")
56
+ def access_level(self) -> Optional[str]:
57
+ return pulumi.get(self, "access_level")
58
+
59
+ @property
60
+ @pulumi.getter(name="compartmentId")
61
+ def compartment_id(self) -> str:
62
+ """
63
+ The OCID of the compartment containing the SQL Firewall allowed SQL.
64
+ """
65
+ return pulumi.get(self, "compartment_id")
66
+
67
+ @property
68
+ @pulumi.getter(name="compartmentIdInSubtree")
69
+ def compartment_id_in_subtree(self) -> Optional[bool]:
70
+ return pulumi.get(self, "compartment_id_in_subtree")
71
+
72
+ @property
73
+ @pulumi.getter
74
+ def filters(self) -> Optional[Sequence['outputs.GetSqlFirewallAllowedSqlsFilterResult']]:
75
+ return pulumi.get(self, "filters")
76
+
77
+ @property
78
+ @pulumi.getter
79
+ def id(self) -> str:
80
+ """
81
+ The provider-assigned unique ID for this managed resource.
82
+ """
83
+ return pulumi.get(self, "id")
84
+
85
+ @property
86
+ @pulumi.getter(name="scimQuery")
87
+ def scim_query(self) -> Optional[str]:
88
+ return pulumi.get(self, "scim_query")
89
+
90
+ @property
91
+ @pulumi.getter(name="sqlFirewallAllowedSqlCollections")
92
+ def sql_firewall_allowed_sql_collections(self) -> Sequence['outputs.GetSqlFirewallAllowedSqlsSqlFirewallAllowedSqlCollectionResult']:
93
+ """
94
+ The list of sql_firewall_allowed_sql_collection.
95
+ """
96
+ return pulumi.get(self, "sql_firewall_allowed_sql_collections")
97
+
98
+
99
+ class AwaitableGetSqlFirewallAllowedSqlsResult(GetSqlFirewallAllowedSqlsResult):
100
+ # pylint: disable=using-constant-test
101
+ def __await__(self):
102
+ if False:
103
+ yield self
104
+ return GetSqlFirewallAllowedSqlsResult(
105
+ access_level=self.access_level,
106
+ compartment_id=self.compartment_id,
107
+ compartment_id_in_subtree=self.compartment_id_in_subtree,
108
+ filters=self.filters,
109
+ id=self.id,
110
+ scim_query=self.scim_query,
111
+ sql_firewall_allowed_sql_collections=self.sql_firewall_allowed_sql_collections)
112
+
113
+
114
+ def get_sql_firewall_allowed_sqls(access_level: Optional[str] = None,
115
+ compartment_id: Optional[str] = None,
116
+ compartment_id_in_subtree: Optional[bool] = None,
117
+ filters: Optional[Sequence[Union['GetSqlFirewallAllowedSqlsFilterArgs', 'GetSqlFirewallAllowedSqlsFilterArgsDict']]] = None,
118
+ scim_query: Optional[str] = None,
119
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSqlFirewallAllowedSqlsResult:
120
+ """
121
+ This data source provides the list of Sql Firewall Allowed Sqls in Oracle Cloud Infrastructure Data Safe service.
122
+
123
+ Retrieves a list of all SQL Firewall allowed SQL statements.
124
+
125
+ The ListSqlFirewallAllowedSqls operation returns only the SQL Firewall allowed SQL statements in the specified `compartmentId`.
126
+
127
+ The parameter `accessLevel` specifies whether to return only those compartments for which the
128
+ requestor has INSPECT permissions on at least one resource directly
129
+ or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
130
+ Principal doesn't have access to even one of the child compartments. This is valid only when
131
+ `compartmentIdInSubtree` is set to `true`.
132
+
133
+ The parameter `compartmentIdInSubtree` applies when you perform ListSqlFirewallPolicies on the
134
+ `compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
135
+ To get a full list of all compartments and subcompartments in the tenancy (root compartment),
136
+ set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
137
+
138
+ ## Example Usage
139
+
140
+ ```python
141
+ import pulumi
142
+ import pulumi_oci as oci
143
+
144
+ test_sql_firewall_allowed_sqls = oci.DataSafe.get_sql_firewall_allowed_sqls(compartment_id=compartment_id,
145
+ access_level=sql_firewall_allowed_sql_access_level,
146
+ compartment_id_in_subtree=sql_firewall_allowed_sql_compartment_id_in_subtree,
147
+ scim_query=sql_firewall_allowed_sql_scim_query)
148
+ ```
149
+
150
+
151
+ :param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
152
+ :param str compartment_id: A filter to return only resources that match the specified compartment OCID.
153
+ :param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
154
+ :param str scim_query: The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at [RFC3339](https://tools.ietf.org/html/draft-ietf-scim-api-12). In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
155
+
156
+ **Example:** query=(currentUser eq 'SCOTT') and (topLevel eq 'YES')
157
+ """
158
+ __args__ = dict()
159
+ __args__['accessLevel'] = access_level
160
+ __args__['compartmentId'] = compartment_id
161
+ __args__['compartmentIdInSubtree'] = compartment_id_in_subtree
162
+ __args__['filters'] = filters
163
+ __args__['scimQuery'] = scim_query
164
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
165
+ __ret__ = pulumi.runtime.invoke('oci:DataSafe/getSqlFirewallAllowedSqls:getSqlFirewallAllowedSqls', __args__, opts=opts, typ=GetSqlFirewallAllowedSqlsResult).value
166
+
167
+ return AwaitableGetSqlFirewallAllowedSqlsResult(
168
+ access_level=pulumi.get(__ret__, 'access_level'),
169
+ compartment_id=pulumi.get(__ret__, 'compartment_id'),
170
+ compartment_id_in_subtree=pulumi.get(__ret__, 'compartment_id_in_subtree'),
171
+ filters=pulumi.get(__ret__, 'filters'),
172
+ id=pulumi.get(__ret__, 'id'),
173
+ scim_query=pulumi.get(__ret__, 'scim_query'),
174
+ sql_firewall_allowed_sql_collections=pulumi.get(__ret__, 'sql_firewall_allowed_sql_collections'))
175
+ def get_sql_firewall_allowed_sqls_output(access_level: Optional[pulumi.Input[Optional[str]]] = None,
176
+ compartment_id: Optional[pulumi.Input[str]] = None,
177
+ compartment_id_in_subtree: Optional[pulumi.Input[Optional[bool]]] = None,
178
+ filters: Optional[pulumi.Input[Optional[Sequence[Union['GetSqlFirewallAllowedSqlsFilterArgs', 'GetSqlFirewallAllowedSqlsFilterArgsDict']]]]] = None,
179
+ scim_query: Optional[pulumi.Input[Optional[str]]] = None,
180
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSqlFirewallAllowedSqlsResult]:
181
+ """
182
+ This data source provides the list of Sql Firewall Allowed Sqls in Oracle Cloud Infrastructure Data Safe service.
183
+
184
+ Retrieves a list of all SQL Firewall allowed SQL statements.
185
+
186
+ The ListSqlFirewallAllowedSqls operation returns only the SQL Firewall allowed SQL statements in the specified `compartmentId`.
187
+
188
+ The parameter `accessLevel` specifies whether to return only those compartments for which the
189
+ requestor has INSPECT permissions on at least one resource directly
190
+ or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
191
+ Principal doesn't have access to even one of the child compartments. This is valid only when
192
+ `compartmentIdInSubtree` is set to `true`.
193
+
194
+ The parameter `compartmentIdInSubtree` applies when you perform ListSqlFirewallPolicies on the
195
+ `compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
196
+ To get a full list of all compartments and subcompartments in the tenancy (root compartment),
197
+ set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
198
+
199
+ ## Example Usage
200
+
201
+ ```python
202
+ import pulumi
203
+ import pulumi_oci as oci
204
+
205
+ test_sql_firewall_allowed_sqls = oci.DataSafe.get_sql_firewall_allowed_sqls(compartment_id=compartment_id,
206
+ access_level=sql_firewall_allowed_sql_access_level,
207
+ compartment_id_in_subtree=sql_firewall_allowed_sql_compartment_id_in_subtree,
208
+ scim_query=sql_firewall_allowed_sql_scim_query)
209
+ ```
210
+
211
+
212
+ :param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
213
+ :param str compartment_id: A filter to return only resources that match the specified compartment OCID.
214
+ :param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
215
+ :param str scim_query: The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at [RFC3339](https://tools.ietf.org/html/draft-ietf-scim-api-12). In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
216
+
217
+ **Example:** query=(currentUser eq 'SCOTT') and (topLevel eq 'YES')
218
+ """
219
+ __args__ = dict()
220
+ __args__['accessLevel'] = access_level
221
+ __args__['compartmentId'] = compartment_id
222
+ __args__['compartmentIdInSubtree'] = compartment_id_in_subtree
223
+ __args__['filters'] = filters
224
+ __args__['scimQuery'] = scim_query
225
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
226
+ __ret__ = pulumi.runtime.invoke_output('oci:DataSafe/getSqlFirewallAllowedSqls:getSqlFirewallAllowedSqls', __args__, opts=opts, typ=GetSqlFirewallAllowedSqlsResult)
227
+ return __ret__.apply(lambda __response__: GetSqlFirewallAllowedSqlsResult(
228
+ access_level=pulumi.get(__response__, 'access_level'),
229
+ compartment_id=pulumi.get(__response__, 'compartment_id'),
230
+ compartment_id_in_subtree=pulumi.get(__response__, 'compartment_id_in_subtree'),
231
+ filters=pulumi.get(__response__, 'filters'),
232
+ id=pulumi.get(__response__, 'id'),
233
+ scim_query=pulumi.get(__response__, 'scim_query'),
234
+ sql_firewall_allowed_sql_collections=pulumi.get(__response__, 'sql_firewall_allowed_sql_collections')))
@@ -0,0 +1,386 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+ from ._inputs import *
18
+
19
+ __all__ = [
20
+ 'GetSqlFirewallPoliciesResult',
21
+ 'AwaitableGetSqlFirewallPoliciesResult',
22
+ 'get_sql_firewall_policies',
23
+ 'get_sql_firewall_policies_output',
24
+ ]
25
+
26
+ @pulumi.output_type
27
+ class GetSqlFirewallPoliciesResult:
28
+ """
29
+ A collection of values returned by getSqlFirewallPolicies.
30
+ """
31
+ def __init__(__self__, access_level=None, compartment_id=None, compartment_id_in_subtree=None, db_user_name=None, display_name=None, filters=None, id=None, security_policy_id=None, sql_firewall_policy_collections=None, sql_firewall_policy_id=None, state=None, time_created_greater_than_or_equal_to=None, time_created_less_than=None, violation_action=None):
32
+ if access_level and not isinstance(access_level, str):
33
+ raise TypeError("Expected argument 'access_level' to be a str")
34
+ pulumi.set(__self__, "access_level", access_level)
35
+ if compartment_id and not isinstance(compartment_id, str):
36
+ raise TypeError("Expected argument 'compartment_id' to be a str")
37
+ pulumi.set(__self__, "compartment_id", compartment_id)
38
+ if compartment_id_in_subtree and not isinstance(compartment_id_in_subtree, bool):
39
+ raise TypeError("Expected argument 'compartment_id_in_subtree' to be a bool")
40
+ pulumi.set(__self__, "compartment_id_in_subtree", compartment_id_in_subtree)
41
+ if db_user_name and not isinstance(db_user_name, str):
42
+ raise TypeError("Expected argument 'db_user_name' to be a str")
43
+ pulumi.set(__self__, "db_user_name", db_user_name)
44
+ if display_name and not isinstance(display_name, str):
45
+ raise TypeError("Expected argument 'display_name' to be a str")
46
+ pulumi.set(__self__, "display_name", display_name)
47
+ if filters and not isinstance(filters, list):
48
+ raise TypeError("Expected argument 'filters' to be a list")
49
+ pulumi.set(__self__, "filters", filters)
50
+ if id and not isinstance(id, str):
51
+ raise TypeError("Expected argument 'id' to be a str")
52
+ pulumi.set(__self__, "id", id)
53
+ if security_policy_id and not isinstance(security_policy_id, str):
54
+ raise TypeError("Expected argument 'security_policy_id' to be a str")
55
+ pulumi.set(__self__, "security_policy_id", security_policy_id)
56
+ if sql_firewall_policy_collections and not isinstance(sql_firewall_policy_collections, list):
57
+ raise TypeError("Expected argument 'sql_firewall_policy_collections' to be a list")
58
+ pulumi.set(__self__, "sql_firewall_policy_collections", sql_firewall_policy_collections)
59
+ if sql_firewall_policy_id and not isinstance(sql_firewall_policy_id, str):
60
+ raise TypeError("Expected argument 'sql_firewall_policy_id' to be a str")
61
+ pulumi.set(__self__, "sql_firewall_policy_id", sql_firewall_policy_id)
62
+ if state and not isinstance(state, str):
63
+ raise TypeError("Expected argument 'state' to be a str")
64
+ pulumi.set(__self__, "state", state)
65
+ if time_created_greater_than_or_equal_to and not isinstance(time_created_greater_than_or_equal_to, str):
66
+ raise TypeError("Expected argument 'time_created_greater_than_or_equal_to' to be a str")
67
+ pulumi.set(__self__, "time_created_greater_than_or_equal_to", time_created_greater_than_or_equal_to)
68
+ if time_created_less_than and not isinstance(time_created_less_than, str):
69
+ raise TypeError("Expected argument 'time_created_less_than' to be a str")
70
+ pulumi.set(__self__, "time_created_less_than", time_created_less_than)
71
+ if violation_action and not isinstance(violation_action, str):
72
+ raise TypeError("Expected argument 'violation_action' to be a str")
73
+ pulumi.set(__self__, "violation_action", violation_action)
74
+
75
+ @property
76
+ @pulumi.getter(name="accessLevel")
77
+ def access_level(self) -> Optional[str]:
78
+ return pulumi.get(self, "access_level")
79
+
80
+ @property
81
+ @pulumi.getter(name="compartmentId")
82
+ def compartment_id(self) -> str:
83
+ """
84
+ The OCID of the compartment containing the SQL Firewall policy.
85
+ """
86
+ return pulumi.get(self, "compartment_id")
87
+
88
+ @property
89
+ @pulumi.getter(name="compartmentIdInSubtree")
90
+ def compartment_id_in_subtree(self) -> Optional[bool]:
91
+ return pulumi.get(self, "compartment_id_in_subtree")
92
+
93
+ @property
94
+ @pulumi.getter(name="dbUserName")
95
+ def db_user_name(self) -> Optional[str]:
96
+ """
97
+ The database user name.
98
+ """
99
+ return pulumi.get(self, "db_user_name")
100
+
101
+ @property
102
+ @pulumi.getter(name="displayName")
103
+ def display_name(self) -> Optional[str]:
104
+ """
105
+ The display name of the SQL Firewall policy.
106
+ """
107
+ return pulumi.get(self, "display_name")
108
+
109
+ @property
110
+ @pulumi.getter
111
+ def filters(self) -> Optional[Sequence['outputs.GetSqlFirewallPoliciesFilterResult']]:
112
+ return pulumi.get(self, "filters")
113
+
114
+ @property
115
+ @pulumi.getter
116
+ def id(self) -> str:
117
+ """
118
+ The provider-assigned unique ID for this managed resource.
119
+ """
120
+ return pulumi.get(self, "id")
121
+
122
+ @property
123
+ @pulumi.getter(name="securityPolicyId")
124
+ def security_policy_id(self) -> Optional[str]:
125
+ """
126
+ The OCID of the security policy corresponding to the SQL Firewall policy.
127
+ """
128
+ return pulumi.get(self, "security_policy_id")
129
+
130
+ @property
131
+ @pulumi.getter(name="sqlFirewallPolicyCollections")
132
+ def sql_firewall_policy_collections(self) -> Sequence['outputs.GetSqlFirewallPoliciesSqlFirewallPolicyCollectionResult']:
133
+ """
134
+ The list of sql_firewall_policy_collection.
135
+ """
136
+ return pulumi.get(self, "sql_firewall_policy_collections")
137
+
138
+ @property
139
+ @pulumi.getter(name="sqlFirewallPolicyId")
140
+ def sql_firewall_policy_id(self) -> Optional[str]:
141
+ return pulumi.get(self, "sql_firewall_policy_id")
142
+
143
+ @property
144
+ @pulumi.getter
145
+ def state(self) -> Optional[str]:
146
+ """
147
+ The current state of the SQL Firewall policy.
148
+ """
149
+ return pulumi.get(self, "state")
150
+
151
+ @property
152
+ @pulumi.getter(name="timeCreatedGreaterThanOrEqualTo")
153
+ def time_created_greater_than_or_equal_to(self) -> Optional[str]:
154
+ return pulumi.get(self, "time_created_greater_than_or_equal_to")
155
+
156
+ @property
157
+ @pulumi.getter(name="timeCreatedLessThan")
158
+ def time_created_less_than(self) -> Optional[str]:
159
+ return pulumi.get(self, "time_created_less_than")
160
+
161
+ @property
162
+ @pulumi.getter(name="violationAction")
163
+ def violation_action(self) -> Optional[str]:
164
+ """
165
+ Specifies the mode in which the SQL Firewall policy is enabled.
166
+ """
167
+ return pulumi.get(self, "violation_action")
168
+
169
+
170
+ class AwaitableGetSqlFirewallPoliciesResult(GetSqlFirewallPoliciesResult):
171
+ # pylint: disable=using-constant-test
172
+ def __await__(self):
173
+ if False:
174
+ yield self
175
+ return GetSqlFirewallPoliciesResult(
176
+ access_level=self.access_level,
177
+ compartment_id=self.compartment_id,
178
+ compartment_id_in_subtree=self.compartment_id_in_subtree,
179
+ db_user_name=self.db_user_name,
180
+ display_name=self.display_name,
181
+ filters=self.filters,
182
+ id=self.id,
183
+ security_policy_id=self.security_policy_id,
184
+ sql_firewall_policy_collections=self.sql_firewall_policy_collections,
185
+ sql_firewall_policy_id=self.sql_firewall_policy_id,
186
+ state=self.state,
187
+ time_created_greater_than_or_equal_to=self.time_created_greater_than_or_equal_to,
188
+ time_created_less_than=self.time_created_less_than,
189
+ violation_action=self.violation_action)
190
+
191
+
192
+ def get_sql_firewall_policies(access_level: Optional[str] = None,
193
+ compartment_id: Optional[str] = None,
194
+ compartment_id_in_subtree: Optional[bool] = None,
195
+ db_user_name: Optional[str] = None,
196
+ display_name: Optional[str] = None,
197
+ filters: Optional[Sequence[Union['GetSqlFirewallPoliciesFilterArgs', 'GetSqlFirewallPoliciesFilterArgsDict']]] = None,
198
+ security_policy_id: Optional[str] = None,
199
+ sql_firewall_policy_id: Optional[str] = None,
200
+ state: Optional[str] = None,
201
+ time_created_greater_than_or_equal_to: Optional[str] = None,
202
+ time_created_less_than: Optional[str] = None,
203
+ violation_action: Optional[str] = None,
204
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSqlFirewallPoliciesResult:
205
+ """
206
+ This data source provides the list of Sql Firewall Policies in Oracle Cloud Infrastructure Data Safe service.
207
+
208
+ Retrieves a list of all SQL Firewall policies.
209
+
210
+ The ListSqlFirewallPolicies operation returns only the SQL Firewall policies in the specified `compartmentId`.
211
+
212
+ The parameter `accessLevel` specifies whether to return only those compartments for which the
213
+ requestor has INSPECT permissions on at least one resource directly
214
+ or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
215
+ Principal doesn't have access to even one of the child compartments. This is valid only when
216
+ `compartmentIdInSubtree` is set to `true`.
217
+
218
+ The parameter `compartmentIdInSubtree` applies when you perform ListSqlFirewallPolicies on the
219
+ `compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
220
+ To get a full list of all compartments and subcompartments in the tenancy (root compartment),
221
+ set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
222
+
223
+ ## Example Usage
224
+
225
+ ```python
226
+ import pulumi
227
+ import pulumi_oci as oci
228
+
229
+ test_sql_firewall_policies = oci.DataSafe.get_sql_firewall_policies(compartment_id=compartment_id,
230
+ access_level=sql_firewall_policy_access_level,
231
+ compartment_id_in_subtree=sql_firewall_policy_compartment_id_in_subtree,
232
+ db_user_name=test_user["name"],
233
+ display_name=sql_firewall_policy_display_name,
234
+ security_policy_id=test_security_policy["id"],
235
+ sql_firewall_policy_id=test_sql_firewall_policy["id"],
236
+ state=sql_firewall_policy_state,
237
+ time_created_greater_than_or_equal_to=sql_firewall_policy_time_created_greater_than_or_equal_to,
238
+ time_created_less_than=sql_firewall_policy_time_created_less_than,
239
+ violation_action=sql_firewall_policy_violation_action)
240
+ ```
241
+
242
+
243
+ :param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
244
+ :param str compartment_id: A filter to return only resources that match the specified compartment OCID.
245
+ :param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
246
+ :param str db_user_name: A filter to return only items that match the specified user name.
247
+ :param str display_name: A filter to return only resources that match the specified display name.
248
+ :param str security_policy_id: An optional filter to return only resources that match the specified OCID of the security policy resource.
249
+ :param str sql_firewall_policy_id: An optional filter to return only resources that match the specified OCID of the SQL Firewall policy resource.
250
+ :param str state: The current state of the SQL Firewall policy.
251
+ :param str time_created_greater_than_or_equal_to: A filter to return only the resources that were created after the specified date and time, as defined by [RFC3339](https://tools.ietf.org/html/rfc3339). Using TimeCreatedGreaterThanOrEqualToQueryParam parameter retrieves all resources created after that date.
252
+
253
+ **Example:** 2016-12-19T16:39:57.600Z
254
+ :param str time_created_less_than: Search for resources that were created before a specific date. Specifying this parameter corresponding `timeCreatedLessThan` parameter will retrieve all resources created before the specified created date, in "YYYY-MM-ddThh:mmZ" format with a Z offset, as defined by RFC 3339.
255
+
256
+ **Example:** 2016-12-19T16:39:57.600Z
257
+ :param str violation_action: An optional filter to return only resources that match the specified violation action.
258
+ """
259
+ __args__ = dict()
260
+ __args__['accessLevel'] = access_level
261
+ __args__['compartmentId'] = compartment_id
262
+ __args__['compartmentIdInSubtree'] = compartment_id_in_subtree
263
+ __args__['dbUserName'] = db_user_name
264
+ __args__['displayName'] = display_name
265
+ __args__['filters'] = filters
266
+ __args__['securityPolicyId'] = security_policy_id
267
+ __args__['sqlFirewallPolicyId'] = sql_firewall_policy_id
268
+ __args__['state'] = state
269
+ __args__['timeCreatedGreaterThanOrEqualTo'] = time_created_greater_than_or_equal_to
270
+ __args__['timeCreatedLessThan'] = time_created_less_than
271
+ __args__['violationAction'] = violation_action
272
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
273
+ __ret__ = pulumi.runtime.invoke('oci:DataSafe/getSqlFirewallPolicies:getSqlFirewallPolicies', __args__, opts=opts, typ=GetSqlFirewallPoliciesResult).value
274
+
275
+ return AwaitableGetSqlFirewallPoliciesResult(
276
+ access_level=pulumi.get(__ret__, 'access_level'),
277
+ compartment_id=pulumi.get(__ret__, 'compartment_id'),
278
+ compartment_id_in_subtree=pulumi.get(__ret__, 'compartment_id_in_subtree'),
279
+ db_user_name=pulumi.get(__ret__, 'db_user_name'),
280
+ display_name=pulumi.get(__ret__, 'display_name'),
281
+ filters=pulumi.get(__ret__, 'filters'),
282
+ id=pulumi.get(__ret__, 'id'),
283
+ security_policy_id=pulumi.get(__ret__, 'security_policy_id'),
284
+ sql_firewall_policy_collections=pulumi.get(__ret__, 'sql_firewall_policy_collections'),
285
+ sql_firewall_policy_id=pulumi.get(__ret__, 'sql_firewall_policy_id'),
286
+ state=pulumi.get(__ret__, 'state'),
287
+ time_created_greater_than_or_equal_to=pulumi.get(__ret__, 'time_created_greater_than_or_equal_to'),
288
+ time_created_less_than=pulumi.get(__ret__, 'time_created_less_than'),
289
+ violation_action=pulumi.get(__ret__, 'violation_action'))
290
+ def get_sql_firewall_policies_output(access_level: Optional[pulumi.Input[Optional[str]]] = None,
291
+ compartment_id: Optional[pulumi.Input[str]] = None,
292
+ compartment_id_in_subtree: Optional[pulumi.Input[Optional[bool]]] = None,
293
+ db_user_name: Optional[pulumi.Input[Optional[str]]] = None,
294
+ display_name: Optional[pulumi.Input[Optional[str]]] = None,
295
+ filters: Optional[pulumi.Input[Optional[Sequence[Union['GetSqlFirewallPoliciesFilterArgs', 'GetSqlFirewallPoliciesFilterArgsDict']]]]] = None,
296
+ security_policy_id: Optional[pulumi.Input[Optional[str]]] = None,
297
+ sql_firewall_policy_id: Optional[pulumi.Input[Optional[str]]] = None,
298
+ state: Optional[pulumi.Input[Optional[str]]] = None,
299
+ time_created_greater_than_or_equal_to: Optional[pulumi.Input[Optional[str]]] = None,
300
+ time_created_less_than: Optional[pulumi.Input[Optional[str]]] = None,
301
+ violation_action: Optional[pulumi.Input[Optional[str]]] = None,
302
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSqlFirewallPoliciesResult]:
303
+ """
304
+ This data source provides the list of Sql Firewall Policies in Oracle Cloud Infrastructure Data Safe service.
305
+
306
+ Retrieves a list of all SQL Firewall policies.
307
+
308
+ The ListSqlFirewallPolicies operation returns only the SQL Firewall policies in the specified `compartmentId`.
309
+
310
+ The parameter `accessLevel` specifies whether to return only those compartments for which the
311
+ requestor has INSPECT permissions on at least one resource directly
312
+ or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
313
+ Principal doesn't have access to even one of the child compartments. This is valid only when
314
+ `compartmentIdInSubtree` is set to `true`.
315
+
316
+ The parameter `compartmentIdInSubtree` applies when you perform ListSqlFirewallPolicies on the
317
+ `compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
318
+ To get a full list of all compartments and subcompartments in the tenancy (root compartment),
319
+ set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
320
+
321
+ ## Example Usage
322
+
323
+ ```python
324
+ import pulumi
325
+ import pulumi_oci as oci
326
+
327
+ test_sql_firewall_policies = oci.DataSafe.get_sql_firewall_policies(compartment_id=compartment_id,
328
+ access_level=sql_firewall_policy_access_level,
329
+ compartment_id_in_subtree=sql_firewall_policy_compartment_id_in_subtree,
330
+ db_user_name=test_user["name"],
331
+ display_name=sql_firewall_policy_display_name,
332
+ security_policy_id=test_security_policy["id"],
333
+ sql_firewall_policy_id=test_sql_firewall_policy["id"],
334
+ state=sql_firewall_policy_state,
335
+ time_created_greater_than_or_equal_to=sql_firewall_policy_time_created_greater_than_or_equal_to,
336
+ time_created_less_than=sql_firewall_policy_time_created_less_than,
337
+ violation_action=sql_firewall_policy_violation_action)
338
+ ```
339
+
340
+
341
+ :param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
342
+ :param str compartment_id: A filter to return only resources that match the specified compartment OCID.
343
+ :param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
344
+ :param str db_user_name: A filter to return only items that match the specified user name.
345
+ :param str display_name: A filter to return only resources that match the specified display name.
346
+ :param str security_policy_id: An optional filter to return only resources that match the specified OCID of the security policy resource.
347
+ :param str sql_firewall_policy_id: An optional filter to return only resources that match the specified OCID of the SQL Firewall policy resource.
348
+ :param str state: The current state of the SQL Firewall policy.
349
+ :param str time_created_greater_than_or_equal_to: A filter to return only the resources that were created after the specified date and time, as defined by [RFC3339](https://tools.ietf.org/html/rfc3339). Using TimeCreatedGreaterThanOrEqualToQueryParam parameter retrieves all resources created after that date.
350
+
351
+ **Example:** 2016-12-19T16:39:57.600Z
352
+ :param str time_created_less_than: Search for resources that were created before a specific date. Specifying this parameter corresponding `timeCreatedLessThan` parameter will retrieve all resources created before the specified created date, in "YYYY-MM-ddThh:mmZ" format with a Z offset, as defined by RFC 3339.
353
+
354
+ **Example:** 2016-12-19T16:39:57.600Z
355
+ :param str violation_action: An optional filter to return only resources that match the specified violation action.
356
+ """
357
+ __args__ = dict()
358
+ __args__['accessLevel'] = access_level
359
+ __args__['compartmentId'] = compartment_id
360
+ __args__['compartmentIdInSubtree'] = compartment_id_in_subtree
361
+ __args__['dbUserName'] = db_user_name
362
+ __args__['displayName'] = display_name
363
+ __args__['filters'] = filters
364
+ __args__['securityPolicyId'] = security_policy_id
365
+ __args__['sqlFirewallPolicyId'] = sql_firewall_policy_id
366
+ __args__['state'] = state
367
+ __args__['timeCreatedGreaterThanOrEqualTo'] = time_created_greater_than_or_equal_to
368
+ __args__['timeCreatedLessThan'] = time_created_less_than
369
+ __args__['violationAction'] = violation_action
370
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
371
+ __ret__ = pulumi.runtime.invoke_output('oci:DataSafe/getSqlFirewallPolicies:getSqlFirewallPolicies', __args__, opts=opts, typ=GetSqlFirewallPoliciesResult)
372
+ return __ret__.apply(lambda __response__: GetSqlFirewallPoliciesResult(
373
+ access_level=pulumi.get(__response__, 'access_level'),
374
+ compartment_id=pulumi.get(__response__, 'compartment_id'),
375
+ compartment_id_in_subtree=pulumi.get(__response__, 'compartment_id_in_subtree'),
376
+ db_user_name=pulumi.get(__response__, 'db_user_name'),
377
+ display_name=pulumi.get(__response__, 'display_name'),
378
+ filters=pulumi.get(__response__, 'filters'),
379
+ id=pulumi.get(__response__, 'id'),
380
+ security_policy_id=pulumi.get(__response__, 'security_policy_id'),
381
+ sql_firewall_policy_collections=pulumi.get(__response__, 'sql_firewall_policy_collections'),
382
+ sql_firewall_policy_id=pulumi.get(__response__, 'sql_firewall_policy_id'),
383
+ state=pulumi.get(__response__, 'state'),
384
+ time_created_greater_than_or_equal_to=pulumi.get(__response__, 'time_created_greater_than_or_equal_to'),
385
+ time_created_less_than=pulumi.get(__response__, 'time_created_less_than'),
386
+ violation_action=pulumi.get(__response__, 'violation_action')))