pulumi-oci 2.26.0a1741415311__py3-none-any.whl → 2.26.0a1741943394__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_oci/__init__.py +67 -0
- pulumi_oci/containerengine/_inputs.py +34 -35
- pulumi_oci/containerengine/cluster.py +2 -0
- pulumi_oci/containerengine/container_instance.py +2 -4
- pulumi_oci/containerengine/outputs.py +110 -21
- pulumi_oci/containerinstances/outputs.py +0 -14
- pulumi_oci/core/_inputs.py +21 -33
- pulumi_oci/core/outputs.py +13 -21
- pulumi_oci/database/__init__.py +1 -0
- pulumi_oci/database/_inputs.py +704 -0
- pulumi_oci/database/application_vip.py +59 -10
- pulumi_oci/database/autonomous_database.py +7 -28
- pulumi_oci/database/backup.py +153 -5
- pulumi_oci/database/cloud_exadata_infrastructure.py +126 -0
- pulumi_oci/database/cloud_vm_cluster.py +163 -30
- pulumi_oci/database/db_node.py +64 -8
- pulumi_oci/database/exadata_infrastructure.py +157 -3
- pulumi_oci/database/exadata_infrastructure_configure_exascale_management.py +1615 -0
- pulumi_oci/database/exadb_vm_cluster.py +84 -7
- pulumi_oci/database/exascale_db_storage_vault.py +147 -0
- pulumi_oci/database/external_container_database.py +4 -4
- pulumi_oci/database/external_non_container_database.py +4 -4
- pulumi_oci/database/external_pluggable_database.py +4 -4
- pulumi_oci/database/get_application_vip.py +16 -2
- pulumi_oci/database/get_autonomous_database.py +0 -3
- pulumi_oci/database/get_backups.py +136 -10
- pulumi_oci/database/get_cloud_exadata_infrastructure.py +43 -1
- pulumi_oci/database/get_cloud_vm_cluster.py +59 -3
- pulumi_oci/database/get_cloud_vm_clusters.py +28 -6
- pulumi_oci/database/get_database_software_images.py +20 -1
- pulumi_oci/database/get_db_node.py +31 -4
- pulumi_oci/database/get_db_server.py +15 -1
- pulumi_oci/database/get_exadata_infrastructure.py +57 -1
- pulumi_oci/database/get_exadb_vm_cluster.py +29 -1
- pulumi_oci/database/get_exadb_vm_clusters.py +25 -3
- pulumi_oci/database/get_exascale_db_storage_vault.py +43 -1
- pulumi_oci/database/get_exascale_db_storage_vaults.py +47 -3
- pulumi_oci/database/get_external_container_database.py +1 -1
- pulumi_oci/database/get_external_non_container_database.py +1 -1
- pulumi_oci/database/get_external_pluggable_database.py +1 -1
- pulumi_oci/database/get_flex_components.py +28 -6
- pulumi_oci/database/get_vm_cluster.py +60 -4
- pulumi_oci/database/get_vm_clusters.py +25 -3
- pulumi_oci/database/outputs.py +1084 -42
- pulumi_oci/database/pluggable_database.py +13 -13
- pulumi_oci/database/vm_cluster.py +172 -18
- pulumi_oci/database/vm_cluster_add_virtual_network.py +114 -2
- pulumi_oci/database/vm_cluster_remove_virtual_machine.py +114 -2
- pulumi_oci/datasafe/__init__.py +7 -0
- pulumi_oci/datasafe/_inputs.py +301 -0
- pulumi_oci/datasafe/discovery_mod.py +49 -0
- pulumi_oci/datasafe/get_discovery_job.py +15 -1
- pulumi_oci/datasafe/get_masking_report.py +46 -4
- pulumi_oci/datasafe/get_masking_report_masking_errors.py +166 -0
- pulumi_oci/datasafe/get_security_assessment_finding.py +31 -1
- pulumi_oci/datasafe/get_security_assessment_findings.py +43 -3
- pulumi_oci/datasafe/get_sensitive_column_analytics.py +370 -0
- pulumi_oci/datasafe/get_sensitive_data_model.py +15 -1
- pulumi_oci/datasafe/get_sensitive_type_group.py +253 -0
- pulumi_oci/datasafe/get_sensitive_type_group_grouped_sensitive_types.py +166 -0
- pulumi_oci/datasafe/get_sensitive_type_groups.py +294 -0
- pulumi_oci/datasafe/outputs.py +676 -3
- pulumi_oci/datasafe/sensitive_data_model.py +49 -0
- pulumi_oci/datasafe/sensitive_type_group.py +563 -0
- pulumi_oci/datasafe/sensitive_type_group_grouped_sensitive_type.py +287 -0
- pulumi_oci/datascience/__init__.py +4 -0
- pulumi_oci/datascience/_inputs.py +1160 -41
- pulumi_oci/datascience/get_model.py +29 -1
- pulumi_oci/datascience/get_model_custom_metadata_artifact_content.py +151 -0
- pulumi_oci/datascience/get_model_defined_metadata_artifact_content.py +151 -0
- pulumi_oci/datascience/get_model_version_set.py +15 -1
- pulumi_oci/datascience/get_model_version_sets.py +25 -3
- pulumi_oci/datascience/get_models.py +25 -3
- pulumi_oci/datascience/get_pipeline.py +15 -1
- pulumi_oci/datascience/model.py +64 -0
- pulumi_oci/datascience/model_custom_metadata_artifact.py +418 -0
- pulumi_oci/datascience/model_defined_metadata_artifact.py +418 -0
- pulumi_oci/datascience/model_version_set.py +28 -0
- pulumi_oci/datascience/outputs.py +4343 -2164
- pulumi_oci/datascience/pipeline.py +48 -141
- pulumi_oci/datascience/pipeline_run.py +32 -0
- pulumi_oci/dblm/__init__.py +17 -0
- pulumi_oci/dblm/_inputs.py +275 -0
- pulumi_oci/dblm/get_vulnerability.py +242 -0
- pulumi_oci/dblm/get_vulnerability_aggregated_vulnerability_data.py +220 -0
- pulumi_oci/dblm/get_vulnerability_notifications.py +144 -0
- pulumi_oci/dblm/get_vulnerability_resources.py +258 -0
- pulumi_oci/dblm/get_vulnerability_scan.py +267 -0
- pulumi_oci/dblm/get_vulnerability_scans.py +270 -0
- pulumi_oci/dblm/get_vulnerability_vulnerabilities.py +258 -0
- pulumi_oci/dblm/outputs.py +1294 -0
- pulumi_oci/dblm/vulnerability_scan.py +521 -0
- pulumi_oci/email/dkim.py +120 -20
- pulumi_oci/email/get_dkim.py +40 -1
- pulumi_oci/email/outputs.py +29 -0
- pulumi_oci/filestorage/__init__.py +3 -0
- pulumi_oci/filestorage/_inputs.py +49 -0
- pulumi_oci/filestorage/file_system.py +105 -0
- pulumi_oci/filestorage/file_system_quota_rule.py +593 -0
- pulumi_oci/filestorage/get_file_system_quota_rule.py +248 -0
- pulumi_oci/filestorage/get_file_system_quota_rules.py +210 -0
- pulumi_oci/filestorage/outputs.py +186 -0
- pulumi_oci/mysql/_inputs.py +1239 -10
- pulumi_oci/mysql/channel.py +28 -0
- pulumi_oci/mysql/get_channel.py +15 -1
- pulumi_oci/mysql/get_mysql_backup.py +15 -1
- pulumi_oci/mysql/get_mysql_configuration.py +15 -1
- pulumi_oci/mysql/get_mysql_db_system.py +15 -1
- pulumi_oci/mysql/mysql_backup.py +28 -0
- pulumi_oci/mysql/mysql_configuration.py +106 -0
- pulumi_oci/mysql/mysql_db_system.py +36 -0
- pulumi_oci/mysql/outputs.py +2008 -35
- pulumi_oci/opensearch/__init__.py +3 -0
- pulumi_oci/opensearch/_inputs.py +101 -0
- pulumi_oci/opensearch/cluster.py +76 -29
- pulumi_oci/opensearch/get_opensearch_cluster.py +12 -1
- pulumi_oci/opensearch/get_opensearch_cluster_pipeline.py +433 -0
- pulumi_oci/opensearch/get_opensearch_cluster_pipelines.py +218 -0
- pulumi_oci/opensearch/opensearch_cluster_pipeline.py +1172 -0
- pulumi_oci/opensearch/outputs.py +425 -0
- pulumi_oci/psql/_inputs.py +258 -0
- pulumi_oci/psql/backup.py +129 -28
- pulumi_oci/psql/db_system.py +10 -0
- pulumi_oci/psql/get_backup.py +47 -2
- pulumi_oci/psql/get_backups.py +3 -0
- pulumi_oci/psql/get_configurations.py +23 -1
- pulumi_oci/psql/get_db_system.py +1 -1
- pulumi_oci/psql/get_db_systems.py +1 -1
- pulumi_oci/psql/outputs.py +541 -5
- pulumi_oci/pulumi-plugin.json +1 -1
- pulumi_oci/redis/redis_cluster.py +7 -7
- {pulumi_oci-2.26.0a1741415311.dist-info → pulumi_oci-2.26.0a1741943394.dist-info}/METADATA +1 -1
- {pulumi_oci-2.26.0a1741415311.dist-info → pulumi_oci-2.26.0a1741943394.dist-info}/RECORD +135 -106
- {pulumi_oci-2.26.0a1741415311.dist-info → pulumi_oci-2.26.0a1741943394.dist-info}/WHEEL +1 -1
- {pulumi_oci-2.26.0a1741415311.dist-info → pulumi_oci-2.26.0a1741943394.dist-info}/top_level.txt +0 -0
@@ -1004,6 +1004,8 @@ class ClusterOptionsOpenIdConnectTokenAuthenticationConfig(dict):
|
|
1004
1004
|
suggest = "ca_certificate"
|
1005
1005
|
elif key == "clientId":
|
1006
1006
|
suggest = "client_id"
|
1007
|
+
elif key == "configurationFile":
|
1008
|
+
suggest = "configuration_file"
|
1007
1009
|
elif key == "groupsClaim":
|
1008
1010
|
suggest = "groups_claim"
|
1009
1011
|
elif key == "groupsPrefix":
|
@@ -1034,6 +1036,7 @@ class ClusterOptionsOpenIdConnectTokenAuthenticationConfig(dict):
|
|
1034
1036
|
is_open_id_connect_auth_enabled: bool,
|
1035
1037
|
ca_certificate: Optional[str] = None,
|
1036
1038
|
client_id: Optional[str] = None,
|
1039
|
+
configuration_file: Optional[str] = None,
|
1037
1040
|
groups_claim: Optional[str] = None,
|
1038
1041
|
groups_prefix: Optional[str] = None,
|
1039
1042
|
issuer_url: Optional[str] = None,
|
@@ -1045,6 +1048,7 @@ class ClusterOptionsOpenIdConnectTokenAuthenticationConfig(dict):
|
|
1045
1048
|
:param bool is_open_id_connect_auth_enabled: (Updatable) Whether the cluster has OIDC Auth Config enabled. Defaults to false.
|
1046
1049
|
:param str ca_certificate: (Updatable) A Base64 encoded public RSA or ECDSA certificates used to signed your identity provider's web certificate.
|
1047
1050
|
:param str client_id: (Updatable) A client id that all tokens must be issued for.
|
1051
|
+
:param str configuration_file: (Updatable) A Base64 encoded string of a Kubernetes OIDC Auth Config file. More info [here](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#using-authentication-configuration)
|
1048
1052
|
:param str groups_claim: (Updatable) JWT claim to use as the user's group. If the claim is present it must be an array of strings.
|
1049
1053
|
:param str groups_prefix: (Updatable) Prefix prepended to group claims to prevent clashes with existing names (such as system:groups).
|
1050
1054
|
:param str issuer_url: (Updatable) URL of the provider that allows the API server to discover public signing keys. Only URLs that use the https:// scheme are accepted. This is typically the provider's discovery URL, changed to have an empty path.
|
@@ -1058,6 +1062,8 @@ class ClusterOptionsOpenIdConnectTokenAuthenticationConfig(dict):
|
|
1058
1062
|
pulumi.set(__self__, "ca_certificate", ca_certificate)
|
1059
1063
|
if client_id is not None:
|
1060
1064
|
pulumi.set(__self__, "client_id", client_id)
|
1065
|
+
if configuration_file is not None:
|
1066
|
+
pulumi.set(__self__, "configuration_file", configuration_file)
|
1061
1067
|
if groups_claim is not None:
|
1062
1068
|
pulumi.set(__self__, "groups_claim", groups_claim)
|
1063
1069
|
if groups_prefix is not None:
|
@@ -1097,6 +1103,14 @@ class ClusterOptionsOpenIdConnectTokenAuthenticationConfig(dict):
|
|
1097
1103
|
"""
|
1098
1104
|
return pulumi.get(self, "client_id")
|
1099
1105
|
|
1106
|
+
@property
|
1107
|
+
@pulumi.getter(name="configurationFile")
|
1108
|
+
def configuration_file(self) -> Optional[str]:
|
1109
|
+
"""
|
1110
|
+
(Updatable) A Base64 encoded string of a Kubernetes OIDC Auth Config file. More info [here](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#using-authentication-configuration)
|
1111
|
+
"""
|
1112
|
+
return pulumi.get(self, "configuration_file")
|
1113
|
+
|
1100
1114
|
@property
|
1101
1115
|
@pulumi.getter(name="groupsClaim")
|
1102
1116
|
def groups_claim(self) -> Optional[str]:
|
@@ -1394,7 +1408,7 @@ class ContainerInstanceContainer(dict):
|
|
1394
1408
|
The total size of all environment variables combined, name and values, must be 64 KB or smaller.
|
1395
1409
|
:param str fault_domain: The fault domain where the container instance runs.
|
1396
1410
|
:param Mapping[str, str] freeform_tags: Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example: `{"bar-key": "value"}`
|
1397
|
-
:param Sequence['ContainerInstanceContainerHealthCheckArgs'] health_checks: list of container health checks to check container status and take appropriate action if container status is failed. There are
|
1411
|
+
:param Sequence['ContainerInstanceContainerHealthCheckArgs'] health_checks: list of container health checks to check container status and take appropriate action if container status is failed. There are two types of health checks that we currently support HTTP and TCP.
|
1398
1412
|
:param bool is_resource_principal_disabled: Determines if the container will have access to the container instance resource principal.
|
1399
1413
|
|
1400
1414
|
This method utilizes resource principal version 2.2. For information on how to use the exposed resource principal elements, see https://docs.oracle.com/en-us/iaas/Content/API/Concepts/sdk_authentication_methods.htm#sdk_authentication_methods_resource_principal.
|
@@ -1574,7 +1588,7 @@ class ContainerInstanceContainer(dict):
|
|
1574
1588
|
@pulumi.getter(name="healthChecks")
|
1575
1589
|
def health_checks(self) -> Optional[Sequence['outputs.ContainerInstanceContainerHealthCheck']]:
|
1576
1590
|
"""
|
1577
|
-
list of container health checks to check container status and take appropriate action if container status is failed. There are
|
1591
|
+
list of container health checks to check container status and take appropriate action if container status is failed. There are two types of health checks that we currently support HTTP and TCP.
|
1578
1592
|
"""
|
1579
1593
|
return pulumi.get(self, "health_checks")
|
1580
1594
|
|
@@ -1705,7 +1719,7 @@ class ContainerInstanceContainerHealthCheck(dict):
|
|
1705
1719
|
|
1706
1720
|
def __init__(__self__, *,
|
1707
1721
|
health_check_type: str,
|
1708
|
-
|
1722
|
+
port: int,
|
1709
1723
|
failure_action: Optional[str] = None,
|
1710
1724
|
failure_threshold: Optional[int] = None,
|
1711
1725
|
headers: Optional[Sequence['outputs.ContainerInstanceContainerHealthCheckHeader']] = None,
|
@@ -1713,14 +1727,13 @@ class ContainerInstanceContainerHealthCheck(dict):
|
|
1713
1727
|
interval_in_seconds: Optional[int] = None,
|
1714
1728
|
name: Optional[str] = None,
|
1715
1729
|
path: Optional[str] = None,
|
1716
|
-
port: Optional[int] = None,
|
1717
1730
|
status: Optional[str] = None,
|
1718
1731
|
status_details: Optional[str] = None,
|
1719
1732
|
success_threshold: Optional[int] = None,
|
1720
1733
|
timeout_in_seconds: Optional[int] = None):
|
1721
1734
|
"""
|
1722
1735
|
:param str health_check_type: Container health check type.
|
1723
|
-
:param
|
1736
|
+
:param int port: Container health check HTTP port.
|
1724
1737
|
:param str failure_action: The action will be triggered when the container health check fails. There are two types of action: KILL or NONE. The default action is KILL. If failure action is KILL, the container will be subject to the container restart policy.
|
1725
1738
|
:param int failure_threshold: Number of consecutive failures at which we consider the check failed.
|
1726
1739
|
:param Sequence['ContainerInstanceContainerHealthCheckHeaderArgs'] headers: Container health check HTTP headers.
|
@@ -1728,13 +1741,11 @@ class ContainerInstanceContainerHealthCheck(dict):
|
|
1728
1741
|
:param int interval_in_seconds: Number of seconds between two consecutive runs for checking container health.
|
1729
1742
|
:param str name: Health check name.
|
1730
1743
|
:param str path: Container health check HTTP path.
|
1731
|
-
:param int port: Container health check HTTP port.
|
1732
1744
|
:param int success_threshold: Number of consecutive successes at which we consider the check succeeded again after it was in failure state.
|
1733
1745
|
:param int timeout_in_seconds: Length of waiting time in seconds before marking health check failed.
|
1734
1746
|
"""
|
1735
1747
|
pulumi.set(__self__, "health_check_type", health_check_type)
|
1736
|
-
|
1737
|
-
pulumi.set(__self__, "commands", commands)
|
1748
|
+
pulumi.set(__self__, "port", port)
|
1738
1749
|
if failure_action is not None:
|
1739
1750
|
pulumi.set(__self__, "failure_action", failure_action)
|
1740
1751
|
if failure_threshold is not None:
|
@@ -1749,8 +1760,6 @@ class ContainerInstanceContainerHealthCheck(dict):
|
|
1749
1760
|
pulumi.set(__self__, "name", name)
|
1750
1761
|
if path is not None:
|
1751
1762
|
pulumi.set(__self__, "path", path)
|
1752
|
-
if port is not None:
|
1753
|
-
pulumi.set(__self__, "port", port)
|
1754
1763
|
if status is not None:
|
1755
1764
|
pulumi.set(__self__, "status", status)
|
1756
1765
|
if status_details is not None:
|
@@ -1770,11 +1779,11 @@ class ContainerInstanceContainerHealthCheck(dict):
|
|
1770
1779
|
|
1771
1780
|
@property
|
1772
1781
|
@pulumi.getter
|
1773
|
-
def
|
1782
|
+
def port(self) -> int:
|
1774
1783
|
"""
|
1775
|
-
|
1784
|
+
Container health check HTTP port.
|
1776
1785
|
"""
|
1777
|
-
return pulumi.get(self, "
|
1786
|
+
return pulumi.get(self, "port")
|
1778
1787
|
|
1779
1788
|
@property
|
1780
1789
|
@pulumi.getter(name="failureAction")
|
@@ -1832,14 +1841,6 @@ class ContainerInstanceContainerHealthCheck(dict):
|
|
1832
1841
|
"""
|
1833
1842
|
return pulumi.get(self, "path")
|
1834
1843
|
|
1835
|
-
@property
|
1836
|
-
@pulumi.getter
|
1837
|
-
def port(self) -> Optional[int]:
|
1838
|
-
"""
|
1839
|
-
Container health check HTTP port.
|
1840
|
-
"""
|
1841
|
-
return pulumi.get(self, "port")
|
1842
|
-
|
1843
1844
|
@property
|
1844
1845
|
@pulumi.getter
|
1845
1846
|
def status(self) -> Optional[str]:
|
@@ -4812,6 +4813,8 @@ class GetClusterOptionResult(dict):
|
|
4812
4813
|
:param Sequence['GetClusterOptionAdmissionControllerOptionArgs'] admission_controller_options: Configurable cluster admission controllers
|
4813
4814
|
:param Sequence[str] ip_families: IP family to use for single stack or define the order of IP families for dual-stack
|
4814
4815
|
:param Sequence['GetClusterOptionKubernetesNetworkConfigArgs'] kubernetes_network_configs: Network configuration for Kubernetes.
|
4816
|
+
:param Sequence['GetClusterOptionOpenIdConnectDiscoveryArgs'] open_id_connect_discoveries: The property that define the status of the OIDC Discovery feature for a cluster.
|
4817
|
+
:param Sequence['GetClusterOptionOpenIdConnectTokenAuthenticationConfigArgs'] open_id_connect_token_authentication_configs: The properties that configure OIDC token authentication in kube-apiserver. For more information, see [Configuring the API Server](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#using-flags).
|
4815
4818
|
:param Sequence['GetClusterOptionPersistentVolumeConfigArgs'] persistent_volume_configs: Configuration to be applied to block volumes created by Kubernetes Persistent Volume Claims (PVC)
|
4816
4819
|
:param Sequence['GetClusterOptionServiceLbConfigArgs'] service_lb_configs: Configuration to be applied to load balancers created by Kubernetes services
|
4817
4820
|
:param Sequence[str] service_lb_subnet_ids: The OCIDs of the subnets used for Kubernetes services load balancers.
|
@@ -4861,11 +4864,17 @@ class GetClusterOptionResult(dict):
|
|
4861
4864
|
@property
|
4862
4865
|
@pulumi.getter(name="openIdConnectDiscoveries")
|
4863
4866
|
def open_id_connect_discoveries(self) -> Sequence['outputs.GetClusterOptionOpenIdConnectDiscoveryResult']:
|
4867
|
+
"""
|
4868
|
+
The property that define the status of the OIDC Discovery feature for a cluster.
|
4869
|
+
"""
|
4864
4870
|
return pulumi.get(self, "open_id_connect_discoveries")
|
4865
4871
|
|
4866
4872
|
@property
|
4867
4873
|
@pulumi.getter(name="openIdConnectTokenAuthenticationConfigs")
|
4868
4874
|
def open_id_connect_token_authentication_configs(self) -> Sequence['outputs.GetClusterOptionOpenIdConnectTokenAuthenticationConfigResult']:
|
4875
|
+
"""
|
4876
|
+
The properties that configure OIDC token authentication in kube-apiserver. For more information, see [Configuring the API Server](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#using-flags).
|
4877
|
+
"""
|
4869
4878
|
return pulumi.get(self, "open_id_connect_token_authentication_configs")
|
4870
4879
|
|
4871
4880
|
@property
|
@@ -4991,11 +5000,17 @@ class GetClusterOptionKubernetesNetworkConfigResult(dict):
|
|
4991
5000
|
class GetClusterOptionOpenIdConnectDiscoveryResult(dict):
|
4992
5001
|
def __init__(__self__, *,
|
4993
5002
|
is_open_id_connect_discovery_enabled: bool):
|
5003
|
+
"""
|
5004
|
+
:param bool is_open_id_connect_discovery_enabled: Whether the cluster has OIDC Discovery enabled. Defaults to false. If set to true, the cluster will be assigned a public OIDC Discovery endpoint.
|
5005
|
+
"""
|
4994
5006
|
pulumi.set(__self__, "is_open_id_connect_discovery_enabled", is_open_id_connect_discovery_enabled)
|
4995
5007
|
|
4996
5008
|
@property
|
4997
5009
|
@pulumi.getter(name="isOpenIdConnectDiscoveryEnabled")
|
4998
5010
|
def is_open_id_connect_discovery_enabled(self) -> bool:
|
5011
|
+
"""
|
5012
|
+
Whether the cluster has OIDC Discovery enabled. Defaults to false. If set to true, the cluster will be assigned a public OIDC Discovery endpoint.
|
5013
|
+
"""
|
4999
5014
|
return pulumi.get(self, "is_open_id_connect_discovery_enabled")
|
5000
5015
|
|
5001
5016
|
|
@@ -5004,6 +5019,7 @@ class GetClusterOptionOpenIdConnectTokenAuthenticationConfigResult(dict):
|
|
5004
5019
|
def __init__(__self__, *,
|
5005
5020
|
ca_certificate: str,
|
5006
5021
|
client_id: str,
|
5022
|
+
configuration_file: str,
|
5007
5023
|
groups_claim: str,
|
5008
5024
|
groups_prefix: str,
|
5009
5025
|
is_open_id_connect_auth_enabled: bool,
|
@@ -5012,8 +5028,22 @@ class GetClusterOptionOpenIdConnectTokenAuthenticationConfigResult(dict):
|
|
5012
5028
|
signing_algorithms: Sequence[str],
|
5013
5029
|
username_claim: str,
|
5014
5030
|
username_prefix: str):
|
5031
|
+
"""
|
5032
|
+
:param str ca_certificate: A Base64 encoded public RSA or ECDSA certificates used to signed your identity provider's web certificate.
|
5033
|
+
:param str client_id: A client id that all tokens must be issued for.
|
5034
|
+
:param str configuration_file: A Base64 encoded string of a Kubernetes OIDC Auth Config file. More info [here](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#using-authentication-configuration)
|
5035
|
+
:param str groups_claim: JWT claim to use as the user's group. If the claim is present it must be an array of strings.
|
5036
|
+
:param str groups_prefix: Prefix prepended to group claims to prevent clashes with existing names (such as system:groups).
|
5037
|
+
:param bool is_open_id_connect_auth_enabled: Whether the cluster has OIDC Auth Config enabled. Defaults to false.
|
5038
|
+
:param str issuer_url: URL of the provider that allows the API server to discover public signing keys. Only URLs that use the https:// scheme are accepted. This is typically the provider's discovery URL, changed to have an empty path.
|
5039
|
+
:param Sequence['GetClusterOptionOpenIdConnectTokenAuthenticationConfigRequiredClaimArgs'] required_claims: A key=value pair that describes a required claim in the ID Token. If set, the claim is verified to be present in the ID Token with a matching value. Repeat this flag to specify multiple claims.
|
5040
|
+
:param Sequence[str] signing_algorithms: The signing algorithms accepted. Default is ["RS256"].
|
5041
|
+
:param str username_claim: JWT claim to use as the user name. By default sub, which is expected to be a unique identifier of the end user. Admins can choose other claims, such as email or name, depending on their provider. However, claims other than email will be prefixed with the issuer URL to prevent naming clashes with other plugins.
|
5042
|
+
:param str username_prefix: Prefix prepended to username claims to prevent clashes with existing names (such as system:users). For example, the value oidc: will create usernames like oidc:jane.doe. If this flag isn't provided and --oidc-username-claim is a value other than email the prefix defaults to ( Issuer URL )# where ( Issuer URL ) is the value of --oidc-issuer-url. The value - can be used to disable all prefixing.
|
5043
|
+
"""
|
5015
5044
|
pulumi.set(__self__, "ca_certificate", ca_certificate)
|
5016
5045
|
pulumi.set(__self__, "client_id", client_id)
|
5046
|
+
pulumi.set(__self__, "configuration_file", configuration_file)
|
5017
5047
|
pulumi.set(__self__, "groups_claim", groups_claim)
|
5018
5048
|
pulumi.set(__self__, "groups_prefix", groups_prefix)
|
5019
5049
|
pulumi.set(__self__, "is_open_id_connect_auth_enabled", is_open_id_connect_auth_enabled)
|
@@ -5026,51 +5056,89 @@ class GetClusterOptionOpenIdConnectTokenAuthenticationConfigResult(dict):
|
|
5026
5056
|
@property
|
5027
5057
|
@pulumi.getter(name="caCertificate")
|
5028
5058
|
def ca_certificate(self) -> str:
|
5059
|
+
"""
|
5060
|
+
A Base64 encoded public RSA or ECDSA certificates used to signed your identity provider's web certificate.
|
5061
|
+
"""
|
5029
5062
|
return pulumi.get(self, "ca_certificate")
|
5030
5063
|
|
5031
5064
|
@property
|
5032
5065
|
@pulumi.getter(name="clientId")
|
5033
5066
|
def client_id(self) -> str:
|
5067
|
+
"""
|
5068
|
+
A client id that all tokens must be issued for.
|
5069
|
+
"""
|
5034
5070
|
return pulumi.get(self, "client_id")
|
5035
5071
|
|
5072
|
+
@property
|
5073
|
+
@pulumi.getter(name="configurationFile")
|
5074
|
+
def configuration_file(self) -> str:
|
5075
|
+
"""
|
5076
|
+
A Base64 encoded string of a Kubernetes OIDC Auth Config file. More info [here](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#using-authentication-configuration)
|
5077
|
+
"""
|
5078
|
+
return pulumi.get(self, "configuration_file")
|
5079
|
+
|
5036
5080
|
@property
|
5037
5081
|
@pulumi.getter(name="groupsClaim")
|
5038
5082
|
def groups_claim(self) -> str:
|
5083
|
+
"""
|
5084
|
+
JWT claim to use as the user's group. If the claim is present it must be an array of strings.
|
5085
|
+
"""
|
5039
5086
|
return pulumi.get(self, "groups_claim")
|
5040
5087
|
|
5041
5088
|
@property
|
5042
5089
|
@pulumi.getter(name="groupsPrefix")
|
5043
5090
|
def groups_prefix(self) -> str:
|
5091
|
+
"""
|
5092
|
+
Prefix prepended to group claims to prevent clashes with existing names (such as system:groups).
|
5093
|
+
"""
|
5044
5094
|
return pulumi.get(self, "groups_prefix")
|
5045
5095
|
|
5046
5096
|
@property
|
5047
5097
|
@pulumi.getter(name="isOpenIdConnectAuthEnabled")
|
5048
5098
|
def is_open_id_connect_auth_enabled(self) -> bool:
|
5099
|
+
"""
|
5100
|
+
Whether the cluster has OIDC Auth Config enabled. Defaults to false.
|
5101
|
+
"""
|
5049
5102
|
return pulumi.get(self, "is_open_id_connect_auth_enabled")
|
5050
5103
|
|
5051
5104
|
@property
|
5052
5105
|
@pulumi.getter(name="issuerUrl")
|
5053
5106
|
def issuer_url(self) -> str:
|
5107
|
+
"""
|
5108
|
+
URL of the provider that allows the API server to discover public signing keys. Only URLs that use the https:// scheme are accepted. This is typically the provider's discovery URL, changed to have an empty path.
|
5109
|
+
"""
|
5054
5110
|
return pulumi.get(self, "issuer_url")
|
5055
5111
|
|
5056
5112
|
@property
|
5057
5113
|
@pulumi.getter(name="requiredClaims")
|
5058
5114
|
def required_claims(self) -> Sequence['outputs.GetClusterOptionOpenIdConnectTokenAuthenticationConfigRequiredClaimResult']:
|
5115
|
+
"""
|
5116
|
+
A key=value pair that describes a required claim in the ID Token. If set, the claim is verified to be present in the ID Token with a matching value. Repeat this flag to specify multiple claims.
|
5117
|
+
"""
|
5059
5118
|
return pulumi.get(self, "required_claims")
|
5060
5119
|
|
5061
5120
|
@property
|
5062
5121
|
@pulumi.getter(name="signingAlgorithms")
|
5063
5122
|
def signing_algorithms(self) -> Sequence[str]:
|
5123
|
+
"""
|
5124
|
+
The signing algorithms accepted. Default is ["RS256"].
|
5125
|
+
"""
|
5064
5126
|
return pulumi.get(self, "signing_algorithms")
|
5065
5127
|
|
5066
5128
|
@property
|
5067
5129
|
@pulumi.getter(name="usernameClaim")
|
5068
5130
|
def username_claim(self) -> str:
|
5131
|
+
"""
|
5132
|
+
JWT claim to use as the user name. By default sub, which is expected to be a unique identifier of the end user. Admins can choose other claims, such as email or name, depending on their provider. However, claims other than email will be prefixed with the issuer URL to prevent naming clashes with other plugins.
|
5133
|
+
"""
|
5069
5134
|
return pulumi.get(self, "username_claim")
|
5070
5135
|
|
5071
5136
|
@property
|
5072
5137
|
@pulumi.getter(name="usernamePrefix")
|
5073
5138
|
def username_prefix(self) -> str:
|
5139
|
+
"""
|
5140
|
+
Prefix prepended to username claims to prevent clashes with existing names (such as system:users). For example, the value oidc: will create usernames like oidc:jane.doe. If this flag isn't provided and --oidc-username-claim is a value other than email the prefix defaults to ( Issuer URL )# where ( Issuer URL ) is the value of --oidc-issuer-url. The value - can be used to disable all prefixing.
|
5141
|
+
"""
|
5074
5142
|
return pulumi.get(self, "username_prefix")
|
5075
5143
|
|
5076
5144
|
|
@@ -5079,17 +5147,27 @@ class GetClusterOptionOpenIdConnectTokenAuthenticationConfigRequiredClaimResult(
|
|
5079
5147
|
def __init__(__self__, *,
|
5080
5148
|
key: str,
|
5081
5149
|
value: str):
|
5150
|
+
"""
|
5151
|
+
:param str key: The key of the pair.
|
5152
|
+
:param str value: The value of the pair.
|
5153
|
+
"""
|
5082
5154
|
pulumi.set(__self__, "key", key)
|
5083
5155
|
pulumi.set(__self__, "value", value)
|
5084
5156
|
|
5085
5157
|
@property
|
5086
5158
|
@pulumi.getter
|
5087
5159
|
def key(self) -> str:
|
5160
|
+
"""
|
5161
|
+
The key of the pair.
|
5162
|
+
"""
|
5088
5163
|
return pulumi.get(self, "key")
|
5089
5164
|
|
5090
5165
|
@property
|
5091
5166
|
@pulumi.getter
|
5092
5167
|
def value(self) -> str:
|
5168
|
+
"""
|
5169
|
+
The value of the pair.
|
5170
|
+
"""
|
5093
5171
|
return pulumi.get(self, "value")
|
5094
5172
|
|
5095
5173
|
|
@@ -5989,6 +6067,7 @@ class GetClustersClusterOptionOpenIdConnectTokenAuthenticationConfigResult(dict)
|
|
5989
6067
|
def __init__(__self__, *,
|
5990
6068
|
ca_certificate: str,
|
5991
6069
|
client_id: str,
|
6070
|
+
configuration_file: str,
|
5992
6071
|
groups_claim: str,
|
5993
6072
|
groups_prefix: str,
|
5994
6073
|
is_open_id_connect_auth_enabled: bool,
|
@@ -6000,6 +6079,7 @@ class GetClustersClusterOptionOpenIdConnectTokenAuthenticationConfigResult(dict)
|
|
6000
6079
|
"""
|
6001
6080
|
:param str ca_certificate: A Base64 encoded public RSA or ECDSA certificates used to signed your identity provider's web certificate.
|
6002
6081
|
:param str client_id: A client id that all tokens must be issued for.
|
6082
|
+
:param str configuration_file: A Base64 encoded string of a Kubernetes OIDC Auth Config file. More info [here](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#using-authentication-configuration)
|
6003
6083
|
:param str groups_claim: JWT claim to use as the user's group. If the claim is present it must be an array of strings.
|
6004
6084
|
:param str groups_prefix: Prefix prepended to group claims to prevent clashes with existing names (such as system:groups).
|
6005
6085
|
:param bool is_open_id_connect_auth_enabled: Whether the cluster has OIDC Auth Config enabled. Defaults to false.
|
@@ -6011,6 +6091,7 @@ class GetClustersClusterOptionOpenIdConnectTokenAuthenticationConfigResult(dict)
|
|
6011
6091
|
"""
|
6012
6092
|
pulumi.set(__self__, "ca_certificate", ca_certificate)
|
6013
6093
|
pulumi.set(__self__, "client_id", client_id)
|
6094
|
+
pulumi.set(__self__, "configuration_file", configuration_file)
|
6014
6095
|
pulumi.set(__self__, "groups_claim", groups_claim)
|
6015
6096
|
pulumi.set(__self__, "groups_prefix", groups_prefix)
|
6016
6097
|
pulumi.set(__self__, "is_open_id_connect_auth_enabled", is_open_id_connect_auth_enabled)
|
@@ -6036,6 +6117,14 @@ class GetClustersClusterOptionOpenIdConnectTokenAuthenticationConfigResult(dict)
|
|
6036
6117
|
"""
|
6037
6118
|
return pulumi.get(self, "client_id")
|
6038
6119
|
|
6120
|
+
@property
|
6121
|
+
@pulumi.getter(name="configurationFile")
|
6122
|
+
def configuration_file(self) -> str:
|
6123
|
+
"""
|
6124
|
+
A Base64 encoded string of a Kubernetes OIDC Auth Config file. More info [here](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#using-authentication-configuration)
|
6125
|
+
"""
|
6126
|
+
return pulumi.get(self, "configuration_file")
|
6127
|
+
|
6039
6128
|
@property
|
6040
6129
|
@pulumi.getter(name="groupsClaim")
|
6041
6130
|
def groups_claim(self) -> str:
|
@@ -294,7 +294,6 @@ class GetContainerInstanceContainerResult(dict):
|
|
294
294
|
@pulumi.output_type
|
295
295
|
class GetContainerInstanceContainerHealthCheckResult(dict):
|
296
296
|
def __init__(__self__, *,
|
297
|
-
commands: Sequence[str],
|
298
297
|
failure_action: str,
|
299
298
|
failure_threshold: int,
|
300
299
|
headers: Sequence['outputs.GetContainerInstanceContainerHealthCheckHeaderResult'],
|
@@ -312,7 +311,6 @@ class GetContainerInstanceContainerHealthCheckResult(dict):
|
|
312
311
|
:param str name: The name of the volume. This must be unique within a single container instance.
|
313
312
|
:param str path: (Optional) Relative path for this file inside the volume mount directory. By default, the file is presented at the root of the volume mount path.
|
314
313
|
"""
|
315
|
-
pulumi.set(__self__, "commands", commands)
|
316
314
|
pulumi.set(__self__, "failure_action", failure_action)
|
317
315
|
pulumi.set(__self__, "failure_threshold", failure_threshold)
|
318
316
|
pulumi.set(__self__, "headers", headers)
|
@@ -327,11 +325,6 @@ class GetContainerInstanceContainerHealthCheckResult(dict):
|
|
327
325
|
pulumi.set(__self__, "success_threshold", success_threshold)
|
328
326
|
pulumi.set(__self__, "timeout_in_seconds", timeout_in_seconds)
|
329
327
|
|
330
|
-
@property
|
331
|
-
@pulumi.getter
|
332
|
-
def commands(self) -> Sequence[str]:
|
333
|
-
return pulumi.get(self, "commands")
|
334
|
-
|
335
328
|
@property
|
336
329
|
@pulumi.getter(name="failureAction")
|
337
330
|
def failure_action(self) -> str:
|
@@ -1825,7 +1818,6 @@ class GetContainerInstancesContainerInstanceCollectionItemContainerResult(dict):
|
|
1825
1818
|
@pulumi.output_type
|
1826
1819
|
class GetContainerInstancesContainerInstanceCollectionItemContainerHealthCheckResult(dict):
|
1827
1820
|
def __init__(__self__, *,
|
1828
|
-
commands: Sequence[str],
|
1829
1821
|
failure_action: str,
|
1830
1822
|
failure_threshold: int,
|
1831
1823
|
headers: Sequence['outputs.GetContainerInstancesContainerInstanceCollectionItemContainerHealthCheckHeaderResult'],
|
@@ -1843,7 +1835,6 @@ class GetContainerInstancesContainerInstanceCollectionItemContainerHealthCheckRe
|
|
1843
1835
|
:param str name: The name of the volume. This must be unique within a single container instance.
|
1844
1836
|
:param str path: (Optional) Relative path for this file inside the volume mount directory. By default, the file is presented at the root of the volume mount path.
|
1845
1837
|
"""
|
1846
|
-
pulumi.set(__self__, "commands", commands)
|
1847
1838
|
pulumi.set(__self__, "failure_action", failure_action)
|
1848
1839
|
pulumi.set(__self__, "failure_threshold", failure_threshold)
|
1849
1840
|
pulumi.set(__self__, "headers", headers)
|
@@ -1858,11 +1849,6 @@ class GetContainerInstancesContainerInstanceCollectionItemContainerHealthCheckRe
|
|
1858
1849
|
pulumi.set(__self__, "success_threshold", success_threshold)
|
1859
1850
|
pulumi.set(__self__, "timeout_in_seconds", timeout_in_seconds)
|
1860
1851
|
|
1861
|
-
@property
|
1862
|
-
@pulumi.getter
|
1863
|
-
def commands(self) -> Sequence[str]:
|
1864
|
-
return pulumi.get(self, "commands")
|
1865
|
-
|
1866
1852
|
@property
|
1867
1853
|
@pulumi.getter(name="failureAction")
|
1868
1854
|
def failure_action(self) -> str:
|
pulumi_oci/core/_inputs.py
CHANGED
@@ -3955,22 +3955,22 @@ if not MYPY:
|
|
3955
3955
|
connectivity_association_key_secret_id: pulumi.Input[str]
|
3956
3956
|
"""
|
3957
3957
|
(Updatable) Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity Association Key (CAK) of this MACsec key.
|
3958
|
-
|
3959
|
-
NOTE: Only the latest secret version will be used.
|
3960
3958
|
"""
|
3961
3959
|
connectivity_association_name_secret_id: pulumi.Input[str]
|
3962
3960
|
"""
|
3963
3961
|
(Updatable) Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity association Key Name (CKN) of this MACsec key.
|
3964
|
-
|
3965
|
-
NOTE: Only the latest secret version will be used.
|
3966
3962
|
"""
|
3967
3963
|
connectivity_association_key_secret_version: NotRequired[pulumi.Input[str]]
|
3968
3964
|
"""
|
3969
|
-
The secret version of the `
|
3965
|
+
(Updatable) The secret version of the `connectivity_association_key_secret_id` secret in Vault.
|
3966
|
+
|
3967
|
+
NOTE: Only the latest secret version will be used.
|
3970
3968
|
"""
|
3971
3969
|
connectivity_association_name_secret_version: NotRequired[pulumi.Input[str]]
|
3972
3970
|
"""
|
3973
|
-
The secret version of the
|
3971
|
+
(Updatable) The secret version of the `connectivity_association_name_secret_id` secret in Vault.
|
3972
|
+
|
3973
|
+
NOTE: Only the latest secret version will be used.
|
3974
3974
|
"""
|
3975
3975
|
elif False:
|
3976
3976
|
CrossConnectGroupMacsecPropertiesPrimaryKeyArgsDict: TypeAlias = Mapping[str, Any]
|
@@ -3984,13 +3984,13 @@ class CrossConnectGroupMacsecPropertiesPrimaryKeyArgs:
|
|
3984
3984
|
connectivity_association_name_secret_version: Optional[pulumi.Input[str]] = None):
|
3985
3985
|
"""
|
3986
3986
|
:param pulumi.Input[str] connectivity_association_key_secret_id: (Updatable) Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity Association Key (CAK) of this MACsec key.
|
3987
|
+
:param pulumi.Input[str] connectivity_association_name_secret_id: (Updatable) Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity association Key Name (CKN) of this MACsec key.
|
3988
|
+
:param pulumi.Input[str] connectivity_association_key_secret_version: (Updatable) The secret version of the `connectivity_association_key_secret_id` secret in Vault.
|
3987
3989
|
|
3988
3990
|
NOTE: Only the latest secret version will be used.
|
3989
|
-
:param pulumi.Input[str]
|
3991
|
+
:param pulumi.Input[str] connectivity_association_name_secret_version: (Updatable) The secret version of the `connectivity_association_name_secret_id` secret in Vault.
|
3990
3992
|
|
3991
3993
|
NOTE: Only the latest secret version will be used.
|
3992
|
-
:param pulumi.Input[str] connectivity_association_key_secret_version: The secret version of the `connectivityAssociationKey` secret in Vault.
|
3993
|
-
:param pulumi.Input[str] connectivity_association_name_secret_version: The secret version of the connectivity association name secret in Vault.
|
3994
3994
|
"""
|
3995
3995
|
pulumi.set(__self__, "connectivity_association_key_secret_id", connectivity_association_key_secret_id)
|
3996
3996
|
pulumi.set(__self__, "connectivity_association_name_secret_id", connectivity_association_name_secret_id)
|
@@ -4004,8 +4004,6 @@ class CrossConnectGroupMacsecPropertiesPrimaryKeyArgs:
|
|
4004
4004
|
def connectivity_association_key_secret_id(self) -> pulumi.Input[str]:
|
4005
4005
|
"""
|
4006
4006
|
(Updatable) Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity Association Key (CAK) of this MACsec key.
|
4007
|
-
|
4008
|
-
NOTE: Only the latest secret version will be used.
|
4009
4007
|
"""
|
4010
4008
|
return pulumi.get(self, "connectivity_association_key_secret_id")
|
4011
4009
|
|
@@ -4018,8 +4016,6 @@ class CrossConnectGroupMacsecPropertiesPrimaryKeyArgs:
|
|
4018
4016
|
def connectivity_association_name_secret_id(self) -> pulumi.Input[str]:
|
4019
4017
|
"""
|
4020
4018
|
(Updatable) Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity association Key Name (CKN) of this MACsec key.
|
4021
|
-
|
4022
|
-
NOTE: Only the latest secret version will be used.
|
4023
4019
|
"""
|
4024
4020
|
return pulumi.get(self, "connectivity_association_name_secret_id")
|
4025
4021
|
|
@@ -4031,7 +4027,9 @@ class CrossConnectGroupMacsecPropertiesPrimaryKeyArgs:
|
|
4031
4027
|
@pulumi.getter(name="connectivityAssociationKeySecretVersion")
|
4032
4028
|
def connectivity_association_key_secret_version(self) -> Optional[pulumi.Input[str]]:
|
4033
4029
|
"""
|
4034
|
-
The secret version of the `
|
4030
|
+
(Updatable) The secret version of the `connectivity_association_key_secret_id` secret in Vault.
|
4031
|
+
|
4032
|
+
NOTE: Only the latest secret version will be used.
|
4035
4033
|
"""
|
4036
4034
|
return pulumi.get(self, "connectivity_association_key_secret_version")
|
4037
4035
|
|
@@ -4043,7 +4041,9 @@ class CrossConnectGroupMacsecPropertiesPrimaryKeyArgs:
|
|
4043
4041
|
@pulumi.getter(name="connectivityAssociationNameSecretVersion")
|
4044
4042
|
def connectivity_association_name_secret_version(self) -> Optional[pulumi.Input[str]]:
|
4045
4043
|
"""
|
4046
|
-
The secret version of the
|
4044
|
+
(Updatable) The secret version of the `connectivity_association_name_secret_id` secret in Vault.
|
4045
|
+
|
4046
|
+
NOTE: Only the latest secret version will be used.
|
4047
4047
|
"""
|
4048
4048
|
return pulumi.get(self, "connectivity_association_name_secret_version")
|
4049
4049
|
|
@@ -4056,7 +4056,7 @@ if not MYPY:
|
|
4056
4056
|
class CrossConnectMacsecPropertiesArgsDict(TypedDict):
|
4057
4057
|
state: pulumi.Input[str]
|
4058
4058
|
"""
|
4059
|
-
|
4059
|
+
The cross-connect's current state.
|
4060
4060
|
"""
|
4061
4061
|
encryption_cipher: NotRequired[pulumi.Input[str]]
|
4062
4062
|
"""
|
@@ -4081,7 +4081,7 @@ class CrossConnectMacsecPropertiesArgs:
|
|
4081
4081
|
is_unprotected_traffic_allowed: Optional[pulumi.Input[bool]] = None,
|
4082
4082
|
primary_key: Optional[pulumi.Input['CrossConnectMacsecPropertiesPrimaryKeyArgs']] = None):
|
4083
4083
|
"""
|
4084
|
-
:param pulumi.Input[str] state:
|
4084
|
+
:param pulumi.Input[str] state: The cross-connect's current state.
|
4085
4085
|
:param pulumi.Input[str] encryption_cipher: (Updatable) Type of encryption cipher suite to use for the MACsec connection.
|
4086
4086
|
:param pulumi.Input[bool] is_unprotected_traffic_allowed: (Updatable) Indicates whether unencrypted traffic is allowed if MACsec Key Agreement protocol (MKA) fails.
|
4087
4087
|
:param pulumi.Input['CrossConnectMacsecPropertiesPrimaryKeyArgs'] primary_key: (Updatable) Defines the secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm)s held in Vault that represent the MACsec key.
|
@@ -4098,7 +4098,7 @@ class CrossConnectMacsecPropertiesArgs:
|
|
4098
4098
|
@pulumi.getter
|
4099
4099
|
def state(self) -> pulumi.Input[str]:
|
4100
4100
|
"""
|
4101
|
-
|
4101
|
+
The cross-connect's current state.
|
4102
4102
|
"""
|
4103
4103
|
return pulumi.get(self, "state")
|
4104
4104
|
|
@@ -4148,14 +4148,10 @@ if not MYPY:
|
|
4148
4148
|
connectivity_association_key_secret_id: pulumi.Input[str]
|
4149
4149
|
"""
|
4150
4150
|
(Updatable) Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity Association Key (CAK) of this MACsec key.
|
4151
|
-
|
4152
|
-
NOTE: Only the latest secret version will be used.
|
4153
4151
|
"""
|
4154
4152
|
connectivity_association_name_secret_id: pulumi.Input[str]
|
4155
4153
|
"""
|
4156
|
-
|
4157
|
-
|
4158
|
-
NOTE: Only the latest secret version will be used.
|
4154
|
+
Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity association Key Name (CKN) of this MACsec key.
|
4159
4155
|
"""
|
4160
4156
|
connectivity_association_key_secret_version: NotRequired[pulumi.Input[str]]
|
4161
4157
|
"""
|
@@ -4177,11 +4173,7 @@ class CrossConnectMacsecPropertiesPrimaryKeyArgs:
|
|
4177
4173
|
connectivity_association_name_secret_version: Optional[pulumi.Input[str]] = None):
|
4178
4174
|
"""
|
4179
4175
|
:param pulumi.Input[str] connectivity_association_key_secret_id: (Updatable) Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity Association Key (CAK) of this MACsec key.
|
4180
|
-
|
4181
|
-
NOTE: Only the latest secret version will be used.
|
4182
|
-
:param pulumi.Input[str] connectivity_association_name_secret_id: (Updatable) Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity association Key Name (CKN) of this MACsec key.
|
4183
|
-
|
4184
|
-
NOTE: Only the latest secret version will be used.
|
4176
|
+
:param pulumi.Input[str] connectivity_association_name_secret_id: Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity association Key Name (CKN) of this MACsec key.
|
4185
4177
|
:param pulumi.Input[str] connectivity_association_key_secret_version: The secret version of the `connectivityAssociationKey` secret in Vault.
|
4186
4178
|
:param pulumi.Input[str] connectivity_association_name_secret_version: The secret version of the connectivity association name secret in Vault.
|
4187
4179
|
"""
|
@@ -4197,8 +4189,6 @@ class CrossConnectMacsecPropertiesPrimaryKeyArgs:
|
|
4197
4189
|
def connectivity_association_key_secret_id(self) -> pulumi.Input[str]:
|
4198
4190
|
"""
|
4199
4191
|
(Updatable) Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity Association Key (CAK) of this MACsec key.
|
4200
|
-
|
4201
|
-
NOTE: Only the latest secret version will be used.
|
4202
4192
|
"""
|
4203
4193
|
return pulumi.get(self, "connectivity_association_key_secret_id")
|
4204
4194
|
|
@@ -4210,9 +4200,7 @@ class CrossConnectMacsecPropertiesPrimaryKeyArgs:
|
|
4210
4200
|
@pulumi.getter(name="connectivityAssociationNameSecretId")
|
4211
4201
|
def connectivity_association_name_secret_id(self) -> pulumi.Input[str]:
|
4212
4202
|
"""
|
4213
|
-
|
4214
|
-
|
4215
|
-
NOTE: Only the latest secret version will be used.
|
4203
|
+
Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity association Key Name (CKN) of this MACsec key.
|
4216
4204
|
"""
|
4217
4205
|
return pulumi.get(self, "connectivity_association_name_secret_id")
|
4218
4206
|
|