pulumi-oci 2.13.0__py3-none-any.whl → 2.13.0a1729059403__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_oci/__init__.py +19 -24
- pulumi_oci/containerengine/_inputs.py +0 -341
- pulumi_oci/containerengine/cluster.py +0 -64
- pulumi_oci/containerengine/get_cluster.py +1 -12
- pulumi_oci/containerengine/outputs.py +0 -582
- pulumi_oci/core/_inputs.py +37 -299
- pulumi_oci/core/boot_volume.py +5 -90
- pulumi_oci/core/get_block_volume_replica.py +1 -15
- pulumi_oci/core/get_boot_volume.py +4 -15
- pulumi_oci/core/get_boot_volume_replica.py +1 -15
- pulumi_oci/core/get_volume.py +4 -18
- pulumi_oci/core/instance_configuration.py +0 -4
- pulumi_oci/core/outputs.py +46 -573
- pulumi_oci/core/volume.py +12 -110
- pulumi_oci/core/volume_backup_policy_assignment.py +19 -68
- pulumi_oci/core/volume_group.py +5 -56
- pulumi_oci/datasafe/__init__.py +0 -1
- pulumi_oci/desktops/_inputs.py +13 -175
- pulumi_oci/desktops/desktop_pool.py +0 -67
- pulumi_oci/desktops/get_desktop_pool.py +1 -16
- pulumi_oci/desktops/outputs.py +18 -339
- pulumi_oci/dns/__init__.py +0 -2
- pulumi_oci/dns/_inputs.py +12 -1157
- pulumi_oci/dns/action_create_zone_from_zone_file.py +2 -42
- pulumi_oci/dns/get_records.py +13 -45
- pulumi_oci/dns/get_resolver.py +6 -8
- pulumi_oci/dns/get_resolver_endpoint.py +6 -8
- pulumi_oci/dns/get_resolver_endpoints.py +2 -2
- pulumi_oci/dns/get_resolvers.py +12 -12
- pulumi_oci/dns/get_rrset.py +16 -16
- pulumi_oci/dns/get_rrsets.py +10 -12
- pulumi_oci/dns/get_view.py +4 -8
- pulumi_oci/dns/get_views.py +12 -12
- pulumi_oci/dns/get_zones.py +13 -33
- pulumi_oci/dns/outputs.py +79 -1388
- pulumi_oci/dns/record.py +12 -12
- pulumi_oci/dns/resolver.py +7 -7
- pulumi_oci/dns/resolver_endpoint.py +2 -2
- pulumi_oci/dns/rrset.py +41 -50
- pulumi_oci/dns/zone.py +17 -176
- pulumi_oci/globallydistributeddatabase/__init__.py +15 -0
- pulumi_oci/globallydistributeddatabase/_inputs.py +1289 -0
- pulumi_oci/globallydistributeddatabase/get_private_endpoint.py +323 -0
- pulumi_oci/globallydistributeddatabase/get_private_endpoints.py +191 -0
- pulumi_oci/globallydistributeddatabase/get_sharded_database.py +660 -0
- pulumi_oci/globallydistributeddatabase/get_sharded_databases.py +191 -0
- pulumi_oci/globallydistributeddatabase/outputs.py +2063 -0
- pulumi_oci/globallydistributeddatabase/private_endpoint.py +747 -0
- pulumi_oci/globallydistributeddatabase/sharded_database.py +1821 -0
- pulumi_oci/goldengate/__init__.py +0 -1
- pulumi_oci/goldengate/_inputs.py +0 -165
- pulumi_oci/goldengate/connection.py +35 -49
- pulumi_oci/goldengate/database_registration.py +7 -7
- pulumi_oci/goldengate/deployment.py +4 -79
- pulumi_oci/goldengate/get_deployment.py +2 -30
- pulumi_oci/goldengate/outputs.py +2 -409
- pulumi_oci/pulumi-plugin.json +1 -1
- {pulumi_oci-2.13.0.dist-info → pulumi_oci-2.13.0a1729059403.dist-info}/METADATA +1 -1
- {pulumi_oci-2.13.0.dist-info → pulumi_oci-2.13.0a1729059403.dist-info}/RECORD +61 -56
- {pulumi_oci-2.13.0.dist-info → pulumi_oci-2.13.0a1729059403.dist-info}/WHEEL +1 -1
- pulumi_oci/datasafe/generate_on_prem_connector_configuration.py +0 -271
- pulumi_oci/dns/zone_promote_dnssec_key_version.py +0 -328
- pulumi_oci/dns/zone_stage_dnssec_key_version.py +0 -318
- pulumi_oci/goldengate/get_deployment_environments.py +0 -144
- {pulumi_oci-2.13.0.dist-info → pulumi_oci-2.13.0a1729059403.dist-info}/top_level.txt +0 -0
pulumi_oci/dns/zone.py
CHANGED
@@ -24,7 +24,6 @@ class ZoneArgs:
|
|
24
24
|
compartment_id: pulumi.Input[str],
|
25
25
|
zone_type: pulumi.Input[str],
|
26
26
|
defined_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
27
|
-
dnssec_state: Optional[pulumi.Input[str]] = None,
|
28
27
|
external_downstreams: Optional[pulumi.Input[Sequence[pulumi.Input['ZoneExternalDownstreamArgs']]]] = None,
|
29
28
|
external_masters: Optional[pulumi.Input[Sequence[pulumi.Input['ZoneExternalMasterArgs']]]] = None,
|
30
29
|
freeform_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
@@ -33,7 +32,7 @@ class ZoneArgs:
|
|
33
32
|
view_id: Optional[pulumi.Input[str]] = None):
|
34
33
|
"""
|
35
34
|
The set of arguments for constructing a Zone resource.
|
36
|
-
:param pulumi.Input[str] compartment_id: (Updatable) The OCID of the compartment
|
35
|
+
:param pulumi.Input[str] compartment_id: (Updatable) The OCID of the compartment the resource belongs to.
|
37
36
|
:param pulumi.Input[str] zone_type: The type of the zone. Must be either `PRIMARY` or `SECONDARY`. `SECONDARY` is only supported for GLOBAL zones.
|
38
37
|
|
39
38
|
|
@@ -42,19 +41,6 @@ class ZoneArgs:
|
|
42
41
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] defined_tags: (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see [Resource Tags](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/resourcetags.htm).
|
43
42
|
|
44
43
|
**Example:** `{"Operations": {"CostCenter": "42"}}`
|
45
|
-
:param pulumi.Input[str] dnssec_state: (Updatable) The state of DNSSEC on the zone.
|
46
|
-
|
47
|
-
For DNSSEC to function, every parent zone in the DNS tree up to the top-level domain (or an independent trust anchor) must also have DNSSEC correctly set up. After enabling DNSSEC, you must add a DS record to the zone's parent zone containing the `KskDnssecKeyVersion` data. You can find the DS data in the `dsData` attribute of the `KskDnssecKeyVersion`. Then, use the `PromoteZoneDnssecKeyVersion` operation to promote the `KskDnssecKeyVersion`.
|
48
|
-
|
49
|
-
New `KskDnssecKeyVersion`s are generated annually, a week before the existing `KskDnssecKeyVersion`'s expiration. To rollover a `KskDnssecKeyVersion`, you must replace the parent zone's DS record containing the old `KskDnssecKeyVersion` data with the data from the new `KskDnssecKeyVersion`.
|
50
|
-
|
51
|
-
To remove the old DS record without causing service disruption, wait until the old DS record's TTL has expired, and the new DS record has propagated. After the DS replacement has been completed, then the `PromoteZoneDnssecKeyVersion` operation must be called.
|
52
|
-
|
53
|
-
Metrics are emitted in the `oci_dns` namespace daily for each `KskDnssecKeyVersion` indicating how many days are left until expiration. We recommend that you set up alarms and notifications for KskDnssecKeyVersion expiration so that the necessary parent zone updates can be made and the `PromoteZoneDnssecKeyVersion` operation can be called.
|
54
|
-
|
55
|
-
Enabling DNSSEC results in additional records in DNS responses which increases their size and can cause higher response latency.
|
56
|
-
|
57
|
-
For more information, see [DNSSEC](https://docs.cloud.oracle.com/iaas/Content/DNS/Concepts/dnssec.htm).
|
58
44
|
:param pulumi.Input[Sequence[pulumi.Input['ZoneExternalDownstreamArgs']]] external_downstreams: (Updatable) External secondary servers for the zone. This field is currently not supported when `zoneType` is `SECONDARY` or `scope` is `PRIVATE`.
|
59
45
|
:param pulumi.Input[Sequence[pulumi.Input['ZoneExternalMasterArgs']]] external_masters: (Updatable) External master servers for the zone. `externalMasters` becomes a required parameter when the `zoneType` value is `SECONDARY`.
|
60
46
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] freeform_tags: (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see [Resource Tags](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/resourcetags.htm).
|
@@ -69,8 +55,6 @@ class ZoneArgs:
|
|
69
55
|
pulumi.set(__self__, "zone_type", zone_type)
|
70
56
|
if defined_tags is not None:
|
71
57
|
pulumi.set(__self__, "defined_tags", defined_tags)
|
72
|
-
if dnssec_state is not None:
|
73
|
-
pulumi.set(__self__, "dnssec_state", dnssec_state)
|
74
58
|
if external_downstreams is not None:
|
75
59
|
pulumi.set(__self__, "external_downstreams", external_downstreams)
|
76
60
|
if external_masters is not None:
|
@@ -88,7 +72,7 @@ class ZoneArgs:
|
|
88
72
|
@pulumi.getter(name="compartmentId")
|
89
73
|
def compartment_id(self) -> pulumi.Input[str]:
|
90
74
|
"""
|
91
|
-
(Updatable) The OCID of the compartment
|
75
|
+
(Updatable) The OCID of the compartment the resource belongs to.
|
92
76
|
"""
|
93
77
|
return pulumi.get(self, "compartment_id")
|
94
78
|
|
@@ -126,30 +110,6 @@ class ZoneArgs:
|
|
126
110
|
def defined_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
127
111
|
pulumi.set(self, "defined_tags", value)
|
128
112
|
|
129
|
-
@property
|
130
|
-
@pulumi.getter(name="dnssecState")
|
131
|
-
def dnssec_state(self) -> Optional[pulumi.Input[str]]:
|
132
|
-
"""
|
133
|
-
(Updatable) The state of DNSSEC on the zone.
|
134
|
-
|
135
|
-
For DNSSEC to function, every parent zone in the DNS tree up to the top-level domain (or an independent trust anchor) must also have DNSSEC correctly set up. After enabling DNSSEC, you must add a DS record to the zone's parent zone containing the `KskDnssecKeyVersion` data. You can find the DS data in the `dsData` attribute of the `KskDnssecKeyVersion`. Then, use the `PromoteZoneDnssecKeyVersion` operation to promote the `KskDnssecKeyVersion`.
|
136
|
-
|
137
|
-
New `KskDnssecKeyVersion`s are generated annually, a week before the existing `KskDnssecKeyVersion`'s expiration. To rollover a `KskDnssecKeyVersion`, you must replace the parent zone's DS record containing the old `KskDnssecKeyVersion` data with the data from the new `KskDnssecKeyVersion`.
|
138
|
-
|
139
|
-
To remove the old DS record without causing service disruption, wait until the old DS record's TTL has expired, and the new DS record has propagated. After the DS replacement has been completed, then the `PromoteZoneDnssecKeyVersion` operation must be called.
|
140
|
-
|
141
|
-
Metrics are emitted in the `oci_dns` namespace daily for each `KskDnssecKeyVersion` indicating how many days are left until expiration. We recommend that you set up alarms and notifications for KskDnssecKeyVersion expiration so that the necessary parent zone updates can be made and the `PromoteZoneDnssecKeyVersion` operation can be called.
|
142
|
-
|
143
|
-
Enabling DNSSEC results in additional records in DNS responses which increases their size and can cause higher response latency.
|
144
|
-
|
145
|
-
For more information, see [DNSSEC](https://docs.cloud.oracle.com/iaas/Content/DNS/Concepts/dnssec.htm).
|
146
|
-
"""
|
147
|
-
return pulumi.get(self, "dnssec_state")
|
148
|
-
|
149
|
-
@dnssec_state.setter
|
150
|
-
def dnssec_state(self, value: Optional[pulumi.Input[str]]):
|
151
|
-
pulumi.set(self, "dnssec_state", value)
|
152
|
-
|
153
113
|
@property
|
154
114
|
@pulumi.getter(name="externalDownstreams")
|
155
115
|
def external_downstreams(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['ZoneExternalDownstreamArgs']]]]:
|
@@ -231,8 +191,6 @@ class _ZoneState:
|
|
231
191
|
def __init__(__self__, *,
|
232
192
|
compartment_id: Optional[pulumi.Input[str]] = None,
|
233
193
|
defined_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
234
|
-
dnssec_configs: Optional[pulumi.Input[Sequence[pulumi.Input['ZoneDnssecConfigArgs']]]] = None,
|
235
|
-
dnssec_state: Optional[pulumi.Input[str]] = None,
|
236
194
|
external_downstreams: Optional[pulumi.Input[Sequence[pulumi.Input['ZoneExternalDownstreamArgs']]]] = None,
|
237
195
|
external_masters: Optional[pulumi.Input[Sequence[pulumi.Input['ZoneExternalMasterArgs']]]] = None,
|
238
196
|
freeform_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
@@ -250,24 +208,10 @@ class _ZoneState:
|
|
250
208
|
zone_type: Optional[pulumi.Input[str]] = None):
|
251
209
|
"""
|
252
210
|
Input properties used for looking up and filtering Zone resources.
|
253
|
-
:param pulumi.Input[str] compartment_id: (Updatable) The OCID of the compartment
|
211
|
+
:param pulumi.Input[str] compartment_id: (Updatable) The OCID of the compartment the resource belongs to.
|
254
212
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] defined_tags: (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see [Resource Tags](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/resourcetags.htm).
|
255
213
|
|
256
214
|
**Example:** `{"Operations": {"CostCenter": "42"}}`
|
257
|
-
:param pulumi.Input[Sequence[pulumi.Input['ZoneDnssecConfigArgs']]] dnssec_configs: DNSSEC configuration data.
|
258
|
-
:param pulumi.Input[str] dnssec_state: (Updatable) The state of DNSSEC on the zone.
|
259
|
-
|
260
|
-
For DNSSEC to function, every parent zone in the DNS tree up to the top-level domain (or an independent trust anchor) must also have DNSSEC correctly set up. After enabling DNSSEC, you must add a DS record to the zone's parent zone containing the `KskDnssecKeyVersion` data. You can find the DS data in the `dsData` attribute of the `KskDnssecKeyVersion`. Then, use the `PromoteZoneDnssecKeyVersion` operation to promote the `KskDnssecKeyVersion`.
|
261
|
-
|
262
|
-
New `KskDnssecKeyVersion`s are generated annually, a week before the existing `KskDnssecKeyVersion`'s expiration. To rollover a `KskDnssecKeyVersion`, you must replace the parent zone's DS record containing the old `KskDnssecKeyVersion` data with the data from the new `KskDnssecKeyVersion`.
|
263
|
-
|
264
|
-
To remove the old DS record without causing service disruption, wait until the old DS record's TTL has expired, and the new DS record has propagated. After the DS replacement has been completed, then the `PromoteZoneDnssecKeyVersion` operation must be called.
|
265
|
-
|
266
|
-
Metrics are emitted in the `oci_dns` namespace daily for each `KskDnssecKeyVersion` indicating how many days are left until expiration. We recommend that you set up alarms and notifications for KskDnssecKeyVersion expiration so that the necessary parent zone updates can be made and the `PromoteZoneDnssecKeyVersion` operation can be called.
|
267
|
-
|
268
|
-
Enabling DNSSEC results in additional records in DNS responses which increases their size and can cause higher response latency.
|
269
|
-
|
270
|
-
For more information, see [DNSSEC](https://docs.cloud.oracle.com/iaas/Content/DNS/Concepts/dnssec.htm).
|
271
215
|
:param pulumi.Input[Sequence[pulumi.Input['ZoneExternalDownstreamArgs']]] external_downstreams: (Updatable) External secondary servers for the zone. This field is currently not supported when `zoneType` is `SECONDARY` or `scope` is `PRIVATE`.
|
272
216
|
:param pulumi.Input[Sequence[pulumi.Input['ZoneExternalMasterArgs']]] external_masters: (Updatable) External master servers for the zone. `externalMasters` becomes a required parameter when the `zoneType` value is `SECONDARY`.
|
273
217
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] freeform_tags: (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see [Resource Tags](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/resourcetags.htm).
|
@@ -295,10 +239,6 @@ class _ZoneState:
|
|
295
239
|
pulumi.set(__self__, "compartment_id", compartment_id)
|
296
240
|
if defined_tags is not None:
|
297
241
|
pulumi.set(__self__, "defined_tags", defined_tags)
|
298
|
-
if dnssec_configs is not None:
|
299
|
-
pulumi.set(__self__, "dnssec_configs", dnssec_configs)
|
300
|
-
if dnssec_state is not None:
|
301
|
-
pulumi.set(__self__, "dnssec_state", dnssec_state)
|
302
242
|
if external_downstreams is not None:
|
303
243
|
pulumi.set(__self__, "external_downstreams", external_downstreams)
|
304
244
|
if external_masters is not None:
|
@@ -334,7 +274,7 @@ class _ZoneState:
|
|
334
274
|
@pulumi.getter(name="compartmentId")
|
335
275
|
def compartment_id(self) -> Optional[pulumi.Input[str]]:
|
336
276
|
"""
|
337
|
-
(Updatable) The OCID of the compartment
|
277
|
+
(Updatable) The OCID of the compartment the resource belongs to.
|
338
278
|
"""
|
339
279
|
return pulumi.get(self, "compartment_id")
|
340
280
|
|
@@ -356,42 +296,6 @@ class _ZoneState:
|
|
356
296
|
def defined_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
357
297
|
pulumi.set(self, "defined_tags", value)
|
358
298
|
|
359
|
-
@property
|
360
|
-
@pulumi.getter(name="dnssecConfigs")
|
361
|
-
def dnssec_configs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['ZoneDnssecConfigArgs']]]]:
|
362
|
-
"""
|
363
|
-
DNSSEC configuration data.
|
364
|
-
"""
|
365
|
-
return pulumi.get(self, "dnssec_configs")
|
366
|
-
|
367
|
-
@dnssec_configs.setter
|
368
|
-
def dnssec_configs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['ZoneDnssecConfigArgs']]]]):
|
369
|
-
pulumi.set(self, "dnssec_configs", value)
|
370
|
-
|
371
|
-
@property
|
372
|
-
@pulumi.getter(name="dnssecState")
|
373
|
-
def dnssec_state(self) -> Optional[pulumi.Input[str]]:
|
374
|
-
"""
|
375
|
-
(Updatable) The state of DNSSEC on the zone.
|
376
|
-
|
377
|
-
For DNSSEC to function, every parent zone in the DNS tree up to the top-level domain (or an independent trust anchor) must also have DNSSEC correctly set up. After enabling DNSSEC, you must add a DS record to the zone's parent zone containing the `KskDnssecKeyVersion` data. You can find the DS data in the `dsData` attribute of the `KskDnssecKeyVersion`. Then, use the `PromoteZoneDnssecKeyVersion` operation to promote the `KskDnssecKeyVersion`.
|
378
|
-
|
379
|
-
New `KskDnssecKeyVersion`s are generated annually, a week before the existing `KskDnssecKeyVersion`'s expiration. To rollover a `KskDnssecKeyVersion`, you must replace the parent zone's DS record containing the old `KskDnssecKeyVersion` data with the data from the new `KskDnssecKeyVersion`.
|
380
|
-
|
381
|
-
To remove the old DS record without causing service disruption, wait until the old DS record's TTL has expired, and the new DS record has propagated. After the DS replacement has been completed, then the `PromoteZoneDnssecKeyVersion` operation must be called.
|
382
|
-
|
383
|
-
Metrics are emitted in the `oci_dns` namespace daily for each `KskDnssecKeyVersion` indicating how many days are left until expiration. We recommend that you set up alarms and notifications for KskDnssecKeyVersion expiration so that the necessary parent zone updates can be made and the `PromoteZoneDnssecKeyVersion` operation can be called.
|
384
|
-
|
385
|
-
Enabling DNSSEC results in additional records in DNS responses which increases their size and can cause higher response latency.
|
386
|
-
|
387
|
-
For more information, see [DNSSEC](https://docs.cloud.oracle.com/iaas/Content/DNS/Concepts/dnssec.htm).
|
388
|
-
"""
|
389
|
-
return pulumi.get(self, "dnssec_state")
|
390
|
-
|
391
|
-
@dnssec_state.setter
|
392
|
-
def dnssec_state(self, value: Optional[pulumi.Input[str]]):
|
393
|
-
pulumi.set(self, "dnssec_state", value)
|
394
|
-
|
395
299
|
@property
|
396
300
|
@pulumi.getter(name="externalDownstreams")
|
397
301
|
def external_downstreams(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['ZoneExternalDownstreamArgs']]]]:
|
@@ -587,7 +491,6 @@ class Zone(pulumi.CustomResource):
|
|
587
491
|
opts: Optional[pulumi.ResourceOptions] = None,
|
588
492
|
compartment_id: Optional[pulumi.Input[str]] = None,
|
589
493
|
defined_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
590
|
-
dnssec_state: Optional[pulumi.Input[str]] = None,
|
591
494
|
external_downstreams: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ZoneExternalDownstreamArgs', 'ZoneExternalDownstreamArgsDict']]]]] = None,
|
592
495
|
external_masters: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ZoneExternalMasterArgs', 'ZoneExternalMasterArgsDict']]]]] = None,
|
593
496
|
freeform_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
@@ -599,10 +502,11 @@ class Zone(pulumi.CustomResource):
|
|
599
502
|
"""
|
600
503
|
This resource provides the Zone resource in Oracle Cloud Infrastructure DNS service.
|
601
504
|
|
602
|
-
Creates a new zone in the specified compartment.
|
603
|
-
|
604
|
-
|
605
|
-
|
505
|
+
Creates a new zone in the specified compartment. For global zones, if the `Content-Type` header for the request
|
506
|
+
is `text/dns`, the `compartmentId` query parameter is required. `text/dns` for the `Content-Type` header is
|
507
|
+
not supported for private zones. Query parameter scope with a value of `PRIVATE` is required when creating a
|
508
|
+
private zone. Private zones must have a zone type of `PRIMARY`. Creating a private zone at or under
|
509
|
+
`oraclevcn.com` within the default protected view of a VCN-dedicated resolver is not permitted.
|
606
510
|
|
607
511
|
## Example Usage
|
608
512
|
|
@@ -615,7 +519,6 @@ class Zone(pulumi.CustomResource):
|
|
615
519
|
name=zone_name,
|
616
520
|
zone_type=zone_zone_type,
|
617
521
|
defined_tags=zone_defined_tags,
|
618
|
-
dnssec_state=zone_dnssec_state,
|
619
522
|
external_downstreams=[{
|
620
523
|
"address": zone_external_downstreams_address,
|
621
524
|
"port": zone_external_downstreams_port,
|
@@ -641,23 +544,10 @@ class Zone(pulumi.CustomResource):
|
|
641
544
|
|
642
545
|
:param str resource_name: The name of the resource.
|
643
546
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
644
|
-
:param pulumi.Input[str] compartment_id: (Updatable) The OCID of the compartment
|
547
|
+
:param pulumi.Input[str] compartment_id: (Updatable) The OCID of the compartment the resource belongs to.
|
645
548
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] defined_tags: (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see [Resource Tags](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/resourcetags.htm).
|
646
549
|
|
647
550
|
**Example:** `{"Operations": {"CostCenter": "42"}}`
|
648
|
-
:param pulumi.Input[str] dnssec_state: (Updatable) The state of DNSSEC on the zone.
|
649
|
-
|
650
|
-
For DNSSEC to function, every parent zone in the DNS tree up to the top-level domain (or an independent trust anchor) must also have DNSSEC correctly set up. After enabling DNSSEC, you must add a DS record to the zone's parent zone containing the `KskDnssecKeyVersion` data. You can find the DS data in the `dsData` attribute of the `KskDnssecKeyVersion`. Then, use the `PromoteZoneDnssecKeyVersion` operation to promote the `KskDnssecKeyVersion`.
|
651
|
-
|
652
|
-
New `KskDnssecKeyVersion`s are generated annually, a week before the existing `KskDnssecKeyVersion`'s expiration. To rollover a `KskDnssecKeyVersion`, you must replace the parent zone's DS record containing the old `KskDnssecKeyVersion` data with the data from the new `KskDnssecKeyVersion`.
|
653
|
-
|
654
|
-
To remove the old DS record without causing service disruption, wait until the old DS record's TTL has expired, and the new DS record has propagated. After the DS replacement has been completed, then the `PromoteZoneDnssecKeyVersion` operation must be called.
|
655
|
-
|
656
|
-
Metrics are emitted in the `oci_dns` namespace daily for each `KskDnssecKeyVersion` indicating how many days are left until expiration. We recommend that you set up alarms and notifications for KskDnssecKeyVersion expiration so that the necessary parent zone updates can be made and the `PromoteZoneDnssecKeyVersion` operation can be called.
|
657
|
-
|
658
|
-
Enabling DNSSEC results in additional records in DNS responses which increases their size and can cause higher response latency.
|
659
|
-
|
660
|
-
For more information, see [DNSSEC](https://docs.cloud.oracle.com/iaas/Content/DNS/Concepts/dnssec.htm).
|
661
551
|
:param pulumi.Input[Sequence[pulumi.Input[Union['ZoneExternalDownstreamArgs', 'ZoneExternalDownstreamArgsDict']]]] external_downstreams: (Updatable) External secondary servers for the zone. This field is currently not supported when `zoneType` is `SECONDARY` or `scope` is `PRIVATE`.
|
662
552
|
:param pulumi.Input[Sequence[pulumi.Input[Union['ZoneExternalMasterArgs', 'ZoneExternalMasterArgsDict']]]] external_masters: (Updatable) External master servers for the zone. `externalMasters` becomes a required parameter when the `zoneType` value is `SECONDARY`.
|
663
553
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] freeform_tags: (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see [Resource Tags](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/resourcetags.htm).
|
@@ -682,10 +572,11 @@ class Zone(pulumi.CustomResource):
|
|
682
572
|
"""
|
683
573
|
This resource provides the Zone resource in Oracle Cloud Infrastructure DNS service.
|
684
574
|
|
685
|
-
Creates a new zone in the specified compartment.
|
686
|
-
|
687
|
-
|
688
|
-
|
575
|
+
Creates a new zone in the specified compartment. For global zones, if the `Content-Type` header for the request
|
576
|
+
is `text/dns`, the `compartmentId` query parameter is required. `text/dns` for the `Content-Type` header is
|
577
|
+
not supported for private zones. Query parameter scope with a value of `PRIVATE` is required when creating a
|
578
|
+
private zone. Private zones must have a zone type of `PRIMARY`. Creating a private zone at or under
|
579
|
+
`oraclevcn.com` within the default protected view of a VCN-dedicated resolver is not permitted.
|
689
580
|
|
690
581
|
## Example Usage
|
691
582
|
|
@@ -698,7 +589,6 @@ class Zone(pulumi.CustomResource):
|
|
698
589
|
name=zone_name,
|
699
590
|
zone_type=zone_zone_type,
|
700
591
|
defined_tags=zone_defined_tags,
|
701
|
-
dnssec_state=zone_dnssec_state,
|
702
592
|
external_downstreams=[{
|
703
593
|
"address": zone_external_downstreams_address,
|
704
594
|
"port": zone_external_downstreams_port,
|
@@ -739,7 +629,6 @@ class Zone(pulumi.CustomResource):
|
|
739
629
|
opts: Optional[pulumi.ResourceOptions] = None,
|
740
630
|
compartment_id: Optional[pulumi.Input[str]] = None,
|
741
631
|
defined_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
742
|
-
dnssec_state: Optional[pulumi.Input[str]] = None,
|
743
632
|
external_downstreams: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ZoneExternalDownstreamArgs', 'ZoneExternalDownstreamArgsDict']]]]] = None,
|
744
633
|
external_masters: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ZoneExternalMasterArgs', 'ZoneExternalMasterArgsDict']]]]] = None,
|
745
634
|
freeform_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
@@ -760,7 +649,6 @@ class Zone(pulumi.CustomResource):
|
|
760
649
|
raise TypeError("Missing required property 'compartment_id'")
|
761
650
|
__props__.__dict__["compartment_id"] = compartment_id
|
762
651
|
__props__.__dict__["defined_tags"] = defined_tags
|
763
|
-
__props__.__dict__["dnssec_state"] = dnssec_state
|
764
652
|
__props__.__dict__["external_downstreams"] = external_downstreams
|
765
653
|
__props__.__dict__["external_masters"] = external_masters
|
766
654
|
__props__.__dict__["freeform_tags"] = freeform_tags
|
@@ -770,7 +658,6 @@ class Zone(pulumi.CustomResource):
|
|
770
658
|
if zone_type is None and not opts.urn:
|
771
659
|
raise TypeError("Missing required property 'zone_type'")
|
772
660
|
__props__.__dict__["zone_type"] = zone_type
|
773
|
-
__props__.__dict__["dnssec_configs"] = None
|
774
661
|
__props__.__dict__["is_protected"] = None
|
775
662
|
__props__.__dict__["nameservers"] = None
|
776
663
|
__props__.__dict__["self"] = None
|
@@ -791,8 +678,6 @@ class Zone(pulumi.CustomResource):
|
|
791
678
|
opts: Optional[pulumi.ResourceOptions] = None,
|
792
679
|
compartment_id: Optional[pulumi.Input[str]] = None,
|
793
680
|
defined_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
794
|
-
dnssec_configs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ZoneDnssecConfigArgs', 'ZoneDnssecConfigArgsDict']]]]] = None,
|
795
|
-
dnssec_state: Optional[pulumi.Input[str]] = None,
|
796
681
|
external_downstreams: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ZoneExternalDownstreamArgs', 'ZoneExternalDownstreamArgsDict']]]]] = None,
|
797
682
|
external_masters: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ZoneExternalMasterArgs', 'ZoneExternalMasterArgsDict']]]]] = None,
|
798
683
|
freeform_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
@@ -815,24 +700,10 @@ class Zone(pulumi.CustomResource):
|
|
815
700
|
:param str resource_name: The unique name of the resulting resource.
|
816
701
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
817
702
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
818
|
-
:param pulumi.Input[str] compartment_id: (Updatable) The OCID of the compartment
|
703
|
+
:param pulumi.Input[str] compartment_id: (Updatable) The OCID of the compartment the resource belongs to.
|
819
704
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] defined_tags: (Updatable) Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see [Resource Tags](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/resourcetags.htm).
|
820
705
|
|
821
706
|
**Example:** `{"Operations": {"CostCenter": "42"}}`
|
822
|
-
:param pulumi.Input[Sequence[pulumi.Input[Union['ZoneDnssecConfigArgs', 'ZoneDnssecConfigArgsDict']]]] dnssec_configs: DNSSEC configuration data.
|
823
|
-
:param pulumi.Input[str] dnssec_state: (Updatable) The state of DNSSEC on the zone.
|
824
|
-
|
825
|
-
For DNSSEC to function, every parent zone in the DNS tree up to the top-level domain (or an independent trust anchor) must also have DNSSEC correctly set up. After enabling DNSSEC, you must add a DS record to the zone's parent zone containing the `KskDnssecKeyVersion` data. You can find the DS data in the `dsData` attribute of the `KskDnssecKeyVersion`. Then, use the `PromoteZoneDnssecKeyVersion` operation to promote the `KskDnssecKeyVersion`.
|
826
|
-
|
827
|
-
New `KskDnssecKeyVersion`s are generated annually, a week before the existing `KskDnssecKeyVersion`'s expiration. To rollover a `KskDnssecKeyVersion`, you must replace the parent zone's DS record containing the old `KskDnssecKeyVersion` data with the data from the new `KskDnssecKeyVersion`.
|
828
|
-
|
829
|
-
To remove the old DS record without causing service disruption, wait until the old DS record's TTL has expired, and the new DS record has propagated. After the DS replacement has been completed, then the `PromoteZoneDnssecKeyVersion` operation must be called.
|
830
|
-
|
831
|
-
Metrics are emitted in the `oci_dns` namespace daily for each `KskDnssecKeyVersion` indicating how many days are left until expiration. We recommend that you set up alarms and notifications for KskDnssecKeyVersion expiration so that the necessary parent zone updates can be made and the `PromoteZoneDnssecKeyVersion` operation can be called.
|
832
|
-
|
833
|
-
Enabling DNSSEC results in additional records in DNS responses which increases their size and can cause higher response latency.
|
834
|
-
|
835
|
-
For more information, see [DNSSEC](https://docs.cloud.oracle.com/iaas/Content/DNS/Concepts/dnssec.htm).
|
836
707
|
:param pulumi.Input[Sequence[pulumi.Input[Union['ZoneExternalDownstreamArgs', 'ZoneExternalDownstreamArgsDict']]]] external_downstreams: (Updatable) External secondary servers for the zone. This field is currently not supported when `zoneType` is `SECONDARY` or `scope` is `PRIVATE`.
|
837
708
|
:param pulumi.Input[Sequence[pulumi.Input[Union['ZoneExternalMasterArgs', 'ZoneExternalMasterArgsDict']]]] external_masters: (Updatable) External master servers for the zone. `externalMasters` becomes a required parameter when the `zoneType` value is `SECONDARY`.
|
838
709
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] freeform_tags: (Updatable) Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see [Resource Tags](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/resourcetags.htm).
|
@@ -862,8 +733,6 @@ class Zone(pulumi.CustomResource):
|
|
862
733
|
|
863
734
|
__props__.__dict__["compartment_id"] = compartment_id
|
864
735
|
__props__.__dict__["defined_tags"] = defined_tags
|
865
|
-
__props__.__dict__["dnssec_configs"] = dnssec_configs
|
866
|
-
__props__.__dict__["dnssec_state"] = dnssec_state
|
867
736
|
__props__.__dict__["external_downstreams"] = external_downstreams
|
868
737
|
__props__.__dict__["external_masters"] = external_masters
|
869
738
|
__props__.__dict__["freeform_tags"] = freeform_tags
|
@@ -885,7 +754,7 @@ class Zone(pulumi.CustomResource):
|
|
885
754
|
@pulumi.getter(name="compartmentId")
|
886
755
|
def compartment_id(self) -> pulumi.Output[str]:
|
887
756
|
"""
|
888
|
-
(Updatable) The OCID of the compartment
|
757
|
+
(Updatable) The OCID of the compartment the resource belongs to.
|
889
758
|
"""
|
890
759
|
return pulumi.get(self, "compartment_id")
|
891
760
|
|
@@ -899,34 +768,6 @@ class Zone(pulumi.CustomResource):
|
|
899
768
|
"""
|
900
769
|
return pulumi.get(self, "defined_tags")
|
901
770
|
|
902
|
-
@property
|
903
|
-
@pulumi.getter(name="dnssecConfigs")
|
904
|
-
def dnssec_configs(self) -> pulumi.Output[Sequence['outputs.ZoneDnssecConfig']]:
|
905
|
-
"""
|
906
|
-
DNSSEC configuration data.
|
907
|
-
"""
|
908
|
-
return pulumi.get(self, "dnssec_configs")
|
909
|
-
|
910
|
-
@property
|
911
|
-
@pulumi.getter(name="dnssecState")
|
912
|
-
def dnssec_state(self) -> pulumi.Output[str]:
|
913
|
-
"""
|
914
|
-
(Updatable) The state of DNSSEC on the zone.
|
915
|
-
|
916
|
-
For DNSSEC to function, every parent zone in the DNS tree up to the top-level domain (or an independent trust anchor) must also have DNSSEC correctly set up. After enabling DNSSEC, you must add a DS record to the zone's parent zone containing the `KskDnssecKeyVersion` data. You can find the DS data in the `dsData` attribute of the `KskDnssecKeyVersion`. Then, use the `PromoteZoneDnssecKeyVersion` operation to promote the `KskDnssecKeyVersion`.
|
917
|
-
|
918
|
-
New `KskDnssecKeyVersion`s are generated annually, a week before the existing `KskDnssecKeyVersion`'s expiration. To rollover a `KskDnssecKeyVersion`, you must replace the parent zone's DS record containing the old `KskDnssecKeyVersion` data with the data from the new `KskDnssecKeyVersion`.
|
919
|
-
|
920
|
-
To remove the old DS record without causing service disruption, wait until the old DS record's TTL has expired, and the new DS record has propagated. After the DS replacement has been completed, then the `PromoteZoneDnssecKeyVersion` operation must be called.
|
921
|
-
|
922
|
-
Metrics are emitted in the `oci_dns` namespace daily for each `KskDnssecKeyVersion` indicating how many days are left until expiration. We recommend that you set up alarms and notifications for KskDnssecKeyVersion expiration so that the necessary parent zone updates can be made and the `PromoteZoneDnssecKeyVersion` operation can be called.
|
923
|
-
|
924
|
-
Enabling DNSSEC results in additional records in DNS responses which increases their size and can cause higher response latency.
|
925
|
-
|
926
|
-
For more information, see [DNSSEC](https://docs.cloud.oracle.com/iaas/Content/DNS/Concepts/dnssec.htm).
|
927
|
-
"""
|
928
|
-
return pulumi.get(self, "dnssec_state")
|
929
|
-
|
930
771
|
@property
|
931
772
|
@pulumi.getter(name="externalDownstreams")
|
932
773
|
def external_downstreams(self) -> pulumi.Output[Sequence['outputs.ZoneExternalDownstream']]:
|
@@ -0,0 +1,15 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
from .. import _utilities
|
6
|
+
import typing
|
7
|
+
# Export this package's modules as members:
|
8
|
+
from .get_private_endpoint import *
|
9
|
+
from .get_private_endpoints import *
|
10
|
+
from .get_sharded_database import *
|
11
|
+
from .get_sharded_databases import *
|
12
|
+
from .private_endpoint import *
|
13
|
+
from .sharded_database import *
|
14
|
+
from ._inputs import *
|
15
|
+
from . import outputs
|