pulumi-oci 2.26.0a1741415311__py3-none-any.whl → 2.26.0a1741943394__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (135) hide show
  1. pulumi_oci/__init__.py +67 -0
  2. pulumi_oci/containerengine/_inputs.py +34 -35
  3. pulumi_oci/containerengine/cluster.py +2 -0
  4. pulumi_oci/containerengine/container_instance.py +2 -4
  5. pulumi_oci/containerengine/outputs.py +110 -21
  6. pulumi_oci/containerinstances/outputs.py +0 -14
  7. pulumi_oci/core/_inputs.py +21 -33
  8. pulumi_oci/core/outputs.py +13 -21
  9. pulumi_oci/database/__init__.py +1 -0
  10. pulumi_oci/database/_inputs.py +704 -0
  11. pulumi_oci/database/application_vip.py +59 -10
  12. pulumi_oci/database/autonomous_database.py +7 -28
  13. pulumi_oci/database/backup.py +153 -5
  14. pulumi_oci/database/cloud_exadata_infrastructure.py +126 -0
  15. pulumi_oci/database/cloud_vm_cluster.py +163 -30
  16. pulumi_oci/database/db_node.py +64 -8
  17. pulumi_oci/database/exadata_infrastructure.py +157 -3
  18. pulumi_oci/database/exadata_infrastructure_configure_exascale_management.py +1615 -0
  19. pulumi_oci/database/exadb_vm_cluster.py +84 -7
  20. pulumi_oci/database/exascale_db_storage_vault.py +147 -0
  21. pulumi_oci/database/external_container_database.py +4 -4
  22. pulumi_oci/database/external_non_container_database.py +4 -4
  23. pulumi_oci/database/external_pluggable_database.py +4 -4
  24. pulumi_oci/database/get_application_vip.py +16 -2
  25. pulumi_oci/database/get_autonomous_database.py +0 -3
  26. pulumi_oci/database/get_backups.py +136 -10
  27. pulumi_oci/database/get_cloud_exadata_infrastructure.py +43 -1
  28. pulumi_oci/database/get_cloud_vm_cluster.py +59 -3
  29. pulumi_oci/database/get_cloud_vm_clusters.py +28 -6
  30. pulumi_oci/database/get_database_software_images.py +20 -1
  31. pulumi_oci/database/get_db_node.py +31 -4
  32. pulumi_oci/database/get_db_server.py +15 -1
  33. pulumi_oci/database/get_exadata_infrastructure.py +57 -1
  34. pulumi_oci/database/get_exadb_vm_cluster.py +29 -1
  35. pulumi_oci/database/get_exadb_vm_clusters.py +25 -3
  36. pulumi_oci/database/get_exascale_db_storage_vault.py +43 -1
  37. pulumi_oci/database/get_exascale_db_storage_vaults.py +47 -3
  38. pulumi_oci/database/get_external_container_database.py +1 -1
  39. pulumi_oci/database/get_external_non_container_database.py +1 -1
  40. pulumi_oci/database/get_external_pluggable_database.py +1 -1
  41. pulumi_oci/database/get_flex_components.py +28 -6
  42. pulumi_oci/database/get_vm_cluster.py +60 -4
  43. pulumi_oci/database/get_vm_clusters.py +25 -3
  44. pulumi_oci/database/outputs.py +1084 -42
  45. pulumi_oci/database/pluggable_database.py +13 -13
  46. pulumi_oci/database/vm_cluster.py +172 -18
  47. pulumi_oci/database/vm_cluster_add_virtual_network.py +114 -2
  48. pulumi_oci/database/vm_cluster_remove_virtual_machine.py +114 -2
  49. pulumi_oci/datasafe/__init__.py +7 -0
  50. pulumi_oci/datasafe/_inputs.py +301 -0
  51. pulumi_oci/datasafe/discovery_mod.py +49 -0
  52. pulumi_oci/datasafe/get_discovery_job.py +15 -1
  53. pulumi_oci/datasafe/get_masking_report.py +46 -4
  54. pulumi_oci/datasafe/get_masking_report_masking_errors.py +166 -0
  55. pulumi_oci/datasafe/get_security_assessment_finding.py +31 -1
  56. pulumi_oci/datasafe/get_security_assessment_findings.py +43 -3
  57. pulumi_oci/datasafe/get_sensitive_column_analytics.py +370 -0
  58. pulumi_oci/datasafe/get_sensitive_data_model.py +15 -1
  59. pulumi_oci/datasafe/get_sensitive_type_group.py +253 -0
  60. pulumi_oci/datasafe/get_sensitive_type_group_grouped_sensitive_types.py +166 -0
  61. pulumi_oci/datasafe/get_sensitive_type_groups.py +294 -0
  62. pulumi_oci/datasafe/outputs.py +676 -3
  63. pulumi_oci/datasafe/sensitive_data_model.py +49 -0
  64. pulumi_oci/datasafe/sensitive_type_group.py +563 -0
  65. pulumi_oci/datasafe/sensitive_type_group_grouped_sensitive_type.py +287 -0
  66. pulumi_oci/datascience/__init__.py +4 -0
  67. pulumi_oci/datascience/_inputs.py +1160 -41
  68. pulumi_oci/datascience/get_model.py +29 -1
  69. pulumi_oci/datascience/get_model_custom_metadata_artifact_content.py +151 -0
  70. pulumi_oci/datascience/get_model_defined_metadata_artifact_content.py +151 -0
  71. pulumi_oci/datascience/get_model_version_set.py +15 -1
  72. pulumi_oci/datascience/get_model_version_sets.py +25 -3
  73. pulumi_oci/datascience/get_models.py +25 -3
  74. pulumi_oci/datascience/get_pipeline.py +15 -1
  75. pulumi_oci/datascience/model.py +64 -0
  76. pulumi_oci/datascience/model_custom_metadata_artifact.py +418 -0
  77. pulumi_oci/datascience/model_defined_metadata_artifact.py +418 -0
  78. pulumi_oci/datascience/model_version_set.py +28 -0
  79. pulumi_oci/datascience/outputs.py +4343 -2164
  80. pulumi_oci/datascience/pipeline.py +48 -141
  81. pulumi_oci/datascience/pipeline_run.py +32 -0
  82. pulumi_oci/dblm/__init__.py +17 -0
  83. pulumi_oci/dblm/_inputs.py +275 -0
  84. pulumi_oci/dblm/get_vulnerability.py +242 -0
  85. pulumi_oci/dblm/get_vulnerability_aggregated_vulnerability_data.py +220 -0
  86. pulumi_oci/dblm/get_vulnerability_notifications.py +144 -0
  87. pulumi_oci/dblm/get_vulnerability_resources.py +258 -0
  88. pulumi_oci/dblm/get_vulnerability_scan.py +267 -0
  89. pulumi_oci/dblm/get_vulnerability_scans.py +270 -0
  90. pulumi_oci/dblm/get_vulnerability_vulnerabilities.py +258 -0
  91. pulumi_oci/dblm/outputs.py +1294 -0
  92. pulumi_oci/dblm/vulnerability_scan.py +521 -0
  93. pulumi_oci/email/dkim.py +120 -20
  94. pulumi_oci/email/get_dkim.py +40 -1
  95. pulumi_oci/email/outputs.py +29 -0
  96. pulumi_oci/filestorage/__init__.py +3 -0
  97. pulumi_oci/filestorage/_inputs.py +49 -0
  98. pulumi_oci/filestorage/file_system.py +105 -0
  99. pulumi_oci/filestorage/file_system_quota_rule.py +593 -0
  100. pulumi_oci/filestorage/get_file_system_quota_rule.py +248 -0
  101. pulumi_oci/filestorage/get_file_system_quota_rules.py +210 -0
  102. pulumi_oci/filestorage/outputs.py +186 -0
  103. pulumi_oci/mysql/_inputs.py +1239 -10
  104. pulumi_oci/mysql/channel.py +28 -0
  105. pulumi_oci/mysql/get_channel.py +15 -1
  106. pulumi_oci/mysql/get_mysql_backup.py +15 -1
  107. pulumi_oci/mysql/get_mysql_configuration.py +15 -1
  108. pulumi_oci/mysql/get_mysql_db_system.py +15 -1
  109. pulumi_oci/mysql/mysql_backup.py +28 -0
  110. pulumi_oci/mysql/mysql_configuration.py +106 -0
  111. pulumi_oci/mysql/mysql_db_system.py +36 -0
  112. pulumi_oci/mysql/outputs.py +2008 -35
  113. pulumi_oci/opensearch/__init__.py +3 -0
  114. pulumi_oci/opensearch/_inputs.py +101 -0
  115. pulumi_oci/opensearch/cluster.py +76 -29
  116. pulumi_oci/opensearch/get_opensearch_cluster.py +12 -1
  117. pulumi_oci/opensearch/get_opensearch_cluster_pipeline.py +433 -0
  118. pulumi_oci/opensearch/get_opensearch_cluster_pipelines.py +218 -0
  119. pulumi_oci/opensearch/opensearch_cluster_pipeline.py +1172 -0
  120. pulumi_oci/opensearch/outputs.py +425 -0
  121. pulumi_oci/psql/_inputs.py +258 -0
  122. pulumi_oci/psql/backup.py +129 -28
  123. pulumi_oci/psql/db_system.py +10 -0
  124. pulumi_oci/psql/get_backup.py +47 -2
  125. pulumi_oci/psql/get_backups.py +3 -0
  126. pulumi_oci/psql/get_configurations.py +23 -1
  127. pulumi_oci/psql/get_db_system.py +1 -1
  128. pulumi_oci/psql/get_db_systems.py +1 -1
  129. pulumi_oci/psql/outputs.py +541 -5
  130. pulumi_oci/pulumi-plugin.json +1 -1
  131. pulumi_oci/redis/redis_cluster.py +7 -7
  132. {pulumi_oci-2.26.0a1741415311.dist-info → pulumi_oci-2.26.0a1741943394.dist-info}/METADATA +1 -1
  133. {pulumi_oci-2.26.0a1741415311.dist-info → pulumi_oci-2.26.0a1741943394.dist-info}/RECORD +135 -106
  134. {pulumi_oci-2.26.0a1741415311.dist-info → pulumi_oci-2.26.0a1741943394.dist-info}/WHEEL +1 -1
  135. {pulumi_oci-2.26.0a1741415311.dist-info → pulumi_oci-2.26.0a1741943394.dist-info}/top_level.txt +0 -0
@@ -26,7 +26,7 @@ class GetMaskingReportResult:
26
26
  """
27
27
  A collection of values returned by getMaskingReport.
28
28
  """
29
- def __init__(__self__, compartment_id=None, id=None, is_drop_temp_tables_enabled=None, is_redo_logging_enabled=None, is_refresh_stats_enabled=None, masking_policy_id=None, masking_report_id=None, masking_work_request_id=None, parallel_degree=None, recompile=None, state=None, target_id=None, time_created=None, time_masking_finished=None, time_masking_started=None, total_masked_columns=None, total_masked_objects=None, total_masked_schemas=None, total_masked_sensitive_types=None, total_masked_values=None):
29
+ def __init__(__self__, compartment_id=None, id=None, is_drop_temp_tables_enabled=None, is_redo_logging_enabled=None, is_refresh_stats_enabled=None, masking_policy_id=None, masking_report_id=None, masking_status=None, masking_work_request_id=None, parallel_degree=None, recompile=None, state=None, target_id=None, time_created=None, time_masking_finished=None, time_masking_started=None, total_masked_columns=None, total_masked_objects=None, total_masked_schemas=None, total_masked_sensitive_types=None, total_masked_values=None, total_post_masking_script_errors=None, total_pre_masking_script_errors=None):
30
30
  if compartment_id and not isinstance(compartment_id, str):
31
31
  raise TypeError("Expected argument 'compartment_id' to be a str")
32
32
  pulumi.set(__self__, "compartment_id", compartment_id)
@@ -48,6 +48,9 @@ class GetMaskingReportResult:
48
48
  if masking_report_id and not isinstance(masking_report_id, str):
49
49
  raise TypeError("Expected argument 'masking_report_id' to be a str")
50
50
  pulumi.set(__self__, "masking_report_id", masking_report_id)
51
+ if masking_status and not isinstance(masking_status, str):
52
+ raise TypeError("Expected argument 'masking_status' to be a str")
53
+ pulumi.set(__self__, "masking_status", masking_status)
51
54
  if masking_work_request_id and not isinstance(masking_work_request_id, str):
52
55
  raise TypeError("Expected argument 'masking_work_request_id' to be a str")
53
56
  pulumi.set(__self__, "masking_work_request_id", masking_work_request_id)
@@ -87,6 +90,12 @@ class GetMaskingReportResult:
87
90
  if total_masked_values and not isinstance(total_masked_values, str):
88
91
  raise TypeError("Expected argument 'total_masked_values' to be a str")
89
92
  pulumi.set(__self__, "total_masked_values", total_masked_values)
93
+ if total_post_masking_script_errors and not isinstance(total_post_masking_script_errors, str):
94
+ raise TypeError("Expected argument 'total_post_masking_script_errors' to be a str")
95
+ pulumi.set(__self__, "total_post_masking_script_errors", total_post_masking_script_errors)
96
+ if total_pre_masking_script_errors and not isinstance(total_pre_masking_script_errors, str):
97
+ raise TypeError("Expected argument 'total_pre_masking_script_errors' to be a str")
98
+ pulumi.set(__self__, "total_pre_masking_script_errors", total_pre_masking_script_errors)
90
99
 
91
100
  @property
92
101
  @pulumi.getter(name="compartmentId")
@@ -141,6 +150,14 @@ class GetMaskingReportResult:
141
150
  def masking_report_id(self) -> str:
142
151
  return pulumi.get(self, "masking_report_id")
143
152
 
153
+ @property
154
+ @pulumi.getter(name="maskingStatus")
155
+ def masking_status(self) -> str:
156
+ """
157
+ The status of the masking job.
158
+ """
159
+ return pulumi.get(self, "masking_status")
160
+
144
161
  @property
145
162
  @pulumi.getter(name="maskingWorkRequestId")
146
163
  def masking_work_request_id(self) -> str:
@@ -245,6 +262,22 @@ class GetMaskingReportResult:
245
262
  """
246
263
  return pulumi.get(self, "total_masked_values")
247
264
 
265
+ @property
266
+ @pulumi.getter(name="totalPostMaskingScriptErrors")
267
+ def total_post_masking_script_errors(self) -> str:
268
+ """
269
+ The total number of errors in post-masking script.
270
+ """
271
+ return pulumi.get(self, "total_post_masking_script_errors")
272
+
273
+ @property
274
+ @pulumi.getter(name="totalPreMaskingScriptErrors")
275
+ def total_pre_masking_script_errors(self) -> str:
276
+ """
277
+ The total number of errors in pre-masking script.
278
+ """
279
+ return pulumi.get(self, "total_pre_masking_script_errors")
280
+
248
281
 
249
282
  class AwaitableGetMaskingReportResult(GetMaskingReportResult):
250
283
  # pylint: disable=using-constant-test
@@ -259,6 +292,7 @@ class AwaitableGetMaskingReportResult(GetMaskingReportResult):
259
292
  is_refresh_stats_enabled=self.is_refresh_stats_enabled,
260
293
  masking_policy_id=self.masking_policy_id,
261
294
  masking_report_id=self.masking_report_id,
295
+ masking_status=self.masking_status,
262
296
  masking_work_request_id=self.masking_work_request_id,
263
297
  parallel_degree=self.parallel_degree,
264
298
  recompile=self.recompile,
@@ -271,7 +305,9 @@ class AwaitableGetMaskingReportResult(GetMaskingReportResult):
271
305
  total_masked_objects=self.total_masked_objects,
272
306
  total_masked_schemas=self.total_masked_schemas,
273
307
  total_masked_sensitive_types=self.total_masked_sensitive_types,
274
- total_masked_values=self.total_masked_values)
308
+ total_masked_values=self.total_masked_values,
309
+ total_post_masking_script_errors=self.total_post_masking_script_errors,
310
+ total_pre_masking_script_errors=self.total_pre_masking_script_errors)
275
311
 
276
312
 
277
313
  def get_masking_report(masking_report_id: Optional[str] = None,
@@ -306,6 +342,7 @@ def get_masking_report(masking_report_id: Optional[str] = None,
306
342
  is_refresh_stats_enabled=pulumi.get(__ret__, 'is_refresh_stats_enabled'),
307
343
  masking_policy_id=pulumi.get(__ret__, 'masking_policy_id'),
308
344
  masking_report_id=pulumi.get(__ret__, 'masking_report_id'),
345
+ masking_status=pulumi.get(__ret__, 'masking_status'),
309
346
  masking_work_request_id=pulumi.get(__ret__, 'masking_work_request_id'),
310
347
  parallel_degree=pulumi.get(__ret__, 'parallel_degree'),
311
348
  recompile=pulumi.get(__ret__, 'recompile'),
@@ -318,7 +355,9 @@ def get_masking_report(masking_report_id: Optional[str] = None,
318
355
  total_masked_objects=pulumi.get(__ret__, 'total_masked_objects'),
319
356
  total_masked_schemas=pulumi.get(__ret__, 'total_masked_schemas'),
320
357
  total_masked_sensitive_types=pulumi.get(__ret__, 'total_masked_sensitive_types'),
321
- total_masked_values=pulumi.get(__ret__, 'total_masked_values'))
358
+ total_masked_values=pulumi.get(__ret__, 'total_masked_values'),
359
+ total_post_masking_script_errors=pulumi.get(__ret__, 'total_post_masking_script_errors'),
360
+ total_pre_masking_script_errors=pulumi.get(__ret__, 'total_pre_masking_script_errors'))
322
361
  def get_masking_report_output(masking_report_id: Optional[pulumi.Input[str]] = None,
323
362
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetMaskingReportResult]:
324
363
  """
@@ -350,6 +389,7 @@ def get_masking_report_output(masking_report_id: Optional[pulumi.Input[str]] = N
350
389
  is_refresh_stats_enabled=pulumi.get(__response__, 'is_refresh_stats_enabled'),
351
390
  masking_policy_id=pulumi.get(__response__, 'masking_policy_id'),
352
391
  masking_report_id=pulumi.get(__response__, 'masking_report_id'),
392
+ masking_status=pulumi.get(__response__, 'masking_status'),
353
393
  masking_work_request_id=pulumi.get(__response__, 'masking_work_request_id'),
354
394
  parallel_degree=pulumi.get(__response__, 'parallel_degree'),
355
395
  recompile=pulumi.get(__response__, 'recompile'),
@@ -362,4 +402,6 @@ def get_masking_report_output(masking_report_id: Optional[pulumi.Input[str]] = N
362
402
  total_masked_objects=pulumi.get(__response__, 'total_masked_objects'),
363
403
  total_masked_schemas=pulumi.get(__response__, 'total_masked_schemas'),
364
404
  total_masked_sensitive_types=pulumi.get(__response__, 'total_masked_sensitive_types'),
365
- total_masked_values=pulumi.get(__response__, 'total_masked_values')))
405
+ total_masked_values=pulumi.get(__response__, 'total_masked_values'),
406
+ total_post_masking_script_errors=pulumi.get(__response__, 'total_post_masking_script_errors'),
407
+ total_pre_masking_script_errors=pulumi.get(__response__, 'total_pre_masking_script_errors')))
@@ -0,0 +1,166 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+ from ._inputs import *
18
+
19
+ __all__ = [
20
+ 'GetMaskingReportMaskingErrorsResult',
21
+ 'AwaitableGetMaskingReportMaskingErrorsResult',
22
+ 'get_masking_report_masking_errors',
23
+ 'get_masking_report_masking_errors_output',
24
+ ]
25
+
26
+ @pulumi.output_type
27
+ class GetMaskingReportMaskingErrorsResult:
28
+ """
29
+ A collection of values returned by getMaskingReportMaskingErrors.
30
+ """
31
+ def __init__(__self__, filters=None, id=None, masking_error_collections=None, masking_report_id=None, step_name=None):
32
+ if filters and not isinstance(filters, list):
33
+ raise TypeError("Expected argument 'filters' to be a list")
34
+ pulumi.set(__self__, "filters", filters)
35
+ if id and not isinstance(id, str):
36
+ raise TypeError("Expected argument 'id' to be a str")
37
+ pulumi.set(__self__, "id", id)
38
+ if masking_error_collections and not isinstance(masking_error_collections, list):
39
+ raise TypeError("Expected argument 'masking_error_collections' to be a list")
40
+ pulumi.set(__self__, "masking_error_collections", masking_error_collections)
41
+ if masking_report_id and not isinstance(masking_report_id, str):
42
+ raise TypeError("Expected argument 'masking_report_id' to be a str")
43
+ pulumi.set(__self__, "masking_report_id", masking_report_id)
44
+ if step_name and not isinstance(step_name, str):
45
+ raise TypeError("Expected argument 'step_name' to be a str")
46
+ pulumi.set(__self__, "step_name", step_name)
47
+
48
+ @property
49
+ @pulumi.getter
50
+ def filters(self) -> Optional[Sequence['outputs.GetMaskingReportMaskingErrorsFilterResult']]:
51
+ return pulumi.get(self, "filters")
52
+
53
+ @property
54
+ @pulumi.getter
55
+ def id(self) -> str:
56
+ """
57
+ The provider-assigned unique ID for this managed resource.
58
+ """
59
+ return pulumi.get(self, "id")
60
+
61
+ @property
62
+ @pulumi.getter(name="maskingErrorCollections")
63
+ def masking_error_collections(self) -> Sequence['outputs.GetMaskingReportMaskingErrorsMaskingErrorCollectionResult']:
64
+ """
65
+ The list of masking_error_collection.
66
+ """
67
+ return pulumi.get(self, "masking_error_collections")
68
+
69
+ @property
70
+ @pulumi.getter(name="maskingReportId")
71
+ def masking_report_id(self) -> str:
72
+ return pulumi.get(self, "masking_report_id")
73
+
74
+ @property
75
+ @pulumi.getter(name="stepName")
76
+ def step_name(self) -> Optional[str]:
77
+ """
78
+ The stepName of the masking error.
79
+ """
80
+ return pulumi.get(self, "step_name")
81
+
82
+
83
+ class AwaitableGetMaskingReportMaskingErrorsResult(GetMaskingReportMaskingErrorsResult):
84
+ # pylint: disable=using-constant-test
85
+ def __await__(self):
86
+ if False:
87
+ yield self
88
+ return GetMaskingReportMaskingErrorsResult(
89
+ filters=self.filters,
90
+ id=self.id,
91
+ masking_error_collections=self.masking_error_collections,
92
+ masking_report_id=self.masking_report_id,
93
+ step_name=self.step_name)
94
+
95
+
96
+ def get_masking_report_masking_errors(filters: Optional[Sequence[Union['GetMaskingReportMaskingErrorsFilterArgs', 'GetMaskingReportMaskingErrorsFilterArgsDict']]] = None,
97
+ masking_report_id: Optional[str] = None,
98
+ step_name: Optional[str] = None,
99
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetMaskingReportMaskingErrorsResult:
100
+ """
101
+ This data source provides the list of Masking Report Masking Errors in Oracle Cloud Infrastructure Data Safe service.
102
+
103
+ Gets a list of masking errors in a masking run based on the specified query parameters.
104
+
105
+ ## Example Usage
106
+
107
+ ```python
108
+ import pulumi
109
+ import pulumi_oci as oci
110
+
111
+ test_masking_report_masking_errors = oci.DataSafe.get_masking_report_masking_errors(masking_report_id=test_masking_report["id"],
112
+ step_name=masking_report_masking_error_step_name)
113
+ ```
114
+
115
+
116
+ :param str masking_report_id: The OCID of the masking report.
117
+ :param str step_name: A filter to return only masking errors that match the specified step name.
118
+ """
119
+ __args__ = dict()
120
+ __args__['filters'] = filters
121
+ __args__['maskingReportId'] = masking_report_id
122
+ __args__['stepName'] = step_name
123
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
124
+ __ret__ = pulumi.runtime.invoke('oci:DataSafe/getMaskingReportMaskingErrors:getMaskingReportMaskingErrors', __args__, opts=opts, typ=GetMaskingReportMaskingErrorsResult).value
125
+
126
+ return AwaitableGetMaskingReportMaskingErrorsResult(
127
+ filters=pulumi.get(__ret__, 'filters'),
128
+ id=pulumi.get(__ret__, 'id'),
129
+ masking_error_collections=pulumi.get(__ret__, 'masking_error_collections'),
130
+ masking_report_id=pulumi.get(__ret__, 'masking_report_id'),
131
+ step_name=pulumi.get(__ret__, 'step_name'))
132
+ def get_masking_report_masking_errors_output(filters: Optional[pulumi.Input[Optional[Sequence[Union['GetMaskingReportMaskingErrorsFilterArgs', 'GetMaskingReportMaskingErrorsFilterArgsDict']]]]] = None,
133
+ masking_report_id: Optional[pulumi.Input[str]] = None,
134
+ step_name: Optional[pulumi.Input[Optional[str]]] = None,
135
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetMaskingReportMaskingErrorsResult]:
136
+ """
137
+ This data source provides the list of Masking Report Masking Errors in Oracle Cloud Infrastructure Data Safe service.
138
+
139
+ Gets a list of masking errors in a masking run based on the specified query parameters.
140
+
141
+ ## Example Usage
142
+
143
+ ```python
144
+ import pulumi
145
+ import pulumi_oci as oci
146
+
147
+ test_masking_report_masking_errors = oci.DataSafe.get_masking_report_masking_errors(masking_report_id=test_masking_report["id"],
148
+ step_name=masking_report_masking_error_step_name)
149
+ ```
150
+
151
+
152
+ :param str masking_report_id: The OCID of the masking report.
153
+ :param str step_name: A filter to return only masking errors that match the specified step name.
154
+ """
155
+ __args__ = dict()
156
+ __args__['filters'] = filters
157
+ __args__['maskingReportId'] = masking_report_id
158
+ __args__['stepName'] = step_name
159
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
160
+ __ret__ = pulumi.runtime.invoke_output('oci:DataSafe/getMaskingReportMaskingErrors:getMaskingReportMaskingErrors', __args__, opts=opts, typ=GetMaskingReportMaskingErrorsResult)
161
+ return __ret__.apply(lambda __response__: GetMaskingReportMaskingErrorsResult(
162
+ filters=pulumi.get(__response__, 'filters'),
163
+ id=pulumi.get(__response__, 'id'),
164
+ masking_error_collections=pulumi.get(__response__, 'masking_error_collections'),
165
+ masking_report_id=pulumi.get(__response__, 'masking_report_id'),
166
+ step_name=pulumi.get(__response__, 'step_name')))
@@ -28,13 +28,16 @@ class GetSecurityAssessmentFindingResult:
28
28
  """
29
29
  A collection of values returned by getSecurityAssessmentFinding.
30
30
  """
31
- def __init__(__self__, access_level=None, compartment_id_in_subtree=None, filters=None, finding_key=None, findings=None, id=None, is_top_finding=None, references=None, security_assessment_id=None, severity=None, state=None, target_id=None):
31
+ def __init__(__self__, access_level=None, compartment_id_in_subtree=None, fields=None, filters=None, finding_key=None, findings=None, id=None, is_top_finding=None, references=None, scim_query=None, security_assessment_id=None, severity=None, state=None, target_id=None):
32
32
  if access_level and not isinstance(access_level, str):
33
33
  raise TypeError("Expected argument 'access_level' to be a str")
34
34
  pulumi.set(__self__, "access_level", access_level)
35
35
  if compartment_id_in_subtree and not isinstance(compartment_id_in_subtree, bool):
36
36
  raise TypeError("Expected argument 'compartment_id_in_subtree' to be a bool")
37
37
  pulumi.set(__self__, "compartment_id_in_subtree", compartment_id_in_subtree)
38
+ if fields and not isinstance(fields, list):
39
+ raise TypeError("Expected argument 'fields' to be a list")
40
+ pulumi.set(__self__, "fields", fields)
38
41
  if filters and not isinstance(filters, list):
39
42
  raise TypeError("Expected argument 'filters' to be a list")
40
43
  pulumi.set(__self__, "filters", filters)
@@ -53,6 +56,9 @@ class GetSecurityAssessmentFindingResult:
53
56
  if references and not isinstance(references, str):
54
57
  raise TypeError("Expected argument 'references' to be a str")
55
58
  pulumi.set(__self__, "references", references)
59
+ if scim_query and not isinstance(scim_query, str):
60
+ raise TypeError("Expected argument 'scim_query' to be a str")
61
+ pulumi.set(__self__, "scim_query", scim_query)
56
62
  if security_assessment_id and not isinstance(security_assessment_id, str):
57
63
  raise TypeError("Expected argument 'security_assessment_id' to be a str")
58
64
  pulumi.set(__self__, "security_assessment_id", security_assessment_id)
@@ -76,6 +82,11 @@ class GetSecurityAssessmentFindingResult:
76
82
  def compartment_id_in_subtree(self) -> Optional[bool]:
77
83
  return pulumi.get(self, "compartment_id_in_subtree")
78
84
 
85
+ @property
86
+ @pulumi.getter
87
+ def fields(self) -> Optional[Sequence[str]]:
88
+ return pulumi.get(self, "fields")
89
+
79
90
  @property
80
91
  @pulumi.getter
81
92
  def filters(self) -> Optional[Sequence['outputs.GetSecurityAssessmentFindingFilterResult']]:
@@ -109,6 +120,11 @@ class GetSecurityAssessmentFindingResult:
109
120
  def references(self) -> Optional[str]:
110
121
  return pulumi.get(self, "references")
111
122
 
123
+ @property
124
+ @pulumi.getter(name="scimQuery")
125
+ def scim_query(self) -> Optional[str]:
126
+ return pulumi.get(self, "scim_query")
127
+
112
128
  @property
113
129
  @pulumi.getter(name="securityAssessmentId")
114
130
  def security_assessment_id(self) -> str:
@@ -138,12 +154,14 @@ class AwaitableGetSecurityAssessmentFindingResult(GetSecurityAssessmentFindingRe
138
154
  return GetSecurityAssessmentFindingResult(
139
155
  access_level=self.access_level,
140
156
  compartment_id_in_subtree=self.compartment_id_in_subtree,
157
+ fields=self.fields,
141
158
  filters=self.filters,
142
159
  finding_key=self.finding_key,
143
160
  findings=self.findings,
144
161
  id=self.id,
145
162
  is_top_finding=self.is_top_finding,
146
163
  references=self.references,
164
+ scim_query=self.scim_query,
147
165
  security_assessment_id=self.security_assessment_id,
148
166
  severity=self.severity,
149
167
  state=self.state,
@@ -152,10 +170,12 @@ class AwaitableGetSecurityAssessmentFindingResult(GetSecurityAssessmentFindingRe
152
170
 
153
171
  def get_security_assessment_finding(access_level: Optional[str] = None,
154
172
  compartment_id_in_subtree: Optional[bool] = None,
173
+ fields: Optional[Sequence[str]] = None,
155
174
  filters: Optional[Sequence[Union['GetSecurityAssessmentFindingFilterArgs', 'GetSecurityAssessmentFindingFilterArgsDict']]] = None,
156
175
  finding_key: Optional[str] = None,
157
176
  is_top_finding: Optional[bool] = None,
158
177
  references: Optional[str] = None,
178
+ scim_query: Optional[str] = None,
159
179
  security_assessment_id: Optional[str] = None,
160
180
  severity: Optional[str] = None,
161
181
  state: Optional[str] = None,
@@ -167,10 +187,12 @@ def get_security_assessment_finding(access_level: Optional[str] = None,
167
187
  __args__ = dict()
168
188
  __args__['accessLevel'] = access_level
169
189
  __args__['compartmentIdInSubtree'] = compartment_id_in_subtree
190
+ __args__['fields'] = fields
170
191
  __args__['filters'] = filters
171
192
  __args__['findingKey'] = finding_key
172
193
  __args__['isTopFinding'] = is_top_finding
173
194
  __args__['references'] = references
195
+ __args__['scimQuery'] = scim_query
174
196
  __args__['securityAssessmentId'] = security_assessment_id
175
197
  __args__['severity'] = severity
176
198
  __args__['state'] = state
@@ -181,22 +203,26 @@ def get_security_assessment_finding(access_level: Optional[str] = None,
181
203
  return AwaitableGetSecurityAssessmentFindingResult(
182
204
  access_level=pulumi.get(__ret__, 'access_level'),
183
205
  compartment_id_in_subtree=pulumi.get(__ret__, 'compartment_id_in_subtree'),
206
+ fields=pulumi.get(__ret__, 'fields'),
184
207
  filters=pulumi.get(__ret__, 'filters'),
185
208
  finding_key=pulumi.get(__ret__, 'finding_key'),
186
209
  findings=pulumi.get(__ret__, 'findings'),
187
210
  id=pulumi.get(__ret__, 'id'),
188
211
  is_top_finding=pulumi.get(__ret__, 'is_top_finding'),
189
212
  references=pulumi.get(__ret__, 'references'),
213
+ scim_query=pulumi.get(__ret__, 'scim_query'),
190
214
  security_assessment_id=pulumi.get(__ret__, 'security_assessment_id'),
191
215
  severity=pulumi.get(__ret__, 'severity'),
192
216
  state=pulumi.get(__ret__, 'state'),
193
217
  target_id=pulumi.get(__ret__, 'target_id'))
194
218
  def get_security_assessment_finding_output(access_level: Optional[pulumi.Input[Optional[str]]] = None,
195
219
  compartment_id_in_subtree: Optional[pulumi.Input[Optional[bool]]] = None,
220
+ fields: Optional[pulumi.Input[Optional[Sequence[str]]]] = None,
196
221
  filters: Optional[pulumi.Input[Optional[Sequence[Union['GetSecurityAssessmentFindingFilterArgs', 'GetSecurityAssessmentFindingFilterArgsDict']]]]] = None,
197
222
  finding_key: Optional[pulumi.Input[Optional[str]]] = None,
198
223
  is_top_finding: Optional[pulumi.Input[Optional[bool]]] = None,
199
224
  references: Optional[pulumi.Input[Optional[str]]] = None,
225
+ scim_query: Optional[pulumi.Input[Optional[str]]] = None,
200
226
  security_assessment_id: Optional[pulumi.Input[str]] = None,
201
227
  severity: Optional[pulumi.Input[Optional[str]]] = None,
202
228
  state: Optional[pulumi.Input[Optional[str]]] = None,
@@ -208,10 +234,12 @@ def get_security_assessment_finding_output(access_level: Optional[pulumi.Input[O
208
234
  __args__ = dict()
209
235
  __args__['accessLevel'] = access_level
210
236
  __args__['compartmentIdInSubtree'] = compartment_id_in_subtree
237
+ __args__['fields'] = fields
211
238
  __args__['filters'] = filters
212
239
  __args__['findingKey'] = finding_key
213
240
  __args__['isTopFinding'] = is_top_finding
214
241
  __args__['references'] = references
242
+ __args__['scimQuery'] = scim_query
215
243
  __args__['securityAssessmentId'] = security_assessment_id
216
244
  __args__['severity'] = severity
217
245
  __args__['state'] = state
@@ -221,12 +249,14 @@ def get_security_assessment_finding_output(access_level: Optional[pulumi.Input[O
221
249
  return __ret__.apply(lambda __response__: GetSecurityAssessmentFindingResult(
222
250
  access_level=pulumi.get(__response__, 'access_level'),
223
251
  compartment_id_in_subtree=pulumi.get(__response__, 'compartment_id_in_subtree'),
252
+ fields=pulumi.get(__response__, 'fields'),
224
253
  filters=pulumi.get(__response__, 'filters'),
225
254
  finding_key=pulumi.get(__response__, 'finding_key'),
226
255
  findings=pulumi.get(__response__, 'findings'),
227
256
  id=pulumi.get(__response__, 'id'),
228
257
  is_top_finding=pulumi.get(__response__, 'is_top_finding'),
229
258
  references=pulumi.get(__response__, 'references'),
259
+ scim_query=pulumi.get(__response__, 'scim_query'),
230
260
  security_assessment_id=pulumi.get(__response__, 'security_assessment_id'),
231
261
  severity=pulumi.get(__response__, 'severity'),
232
262
  state=pulumi.get(__response__, 'state'),
@@ -28,13 +28,16 @@ class GetSecurityAssessmentFindingsResult:
28
28
  """
29
29
  A collection of values returned by getSecurityAssessmentFindings.
30
30
  """
31
- def __init__(__self__, access_level=None, compartment_id_in_subtree=None, filters=None, finding_key=None, findings=None, id=None, is_top_finding=None, references=None, security_assessment_id=None, severity=None, state=None, target_id=None):
31
+ def __init__(__self__, access_level=None, compartment_id_in_subtree=None, fields=None, filters=None, finding_key=None, findings=None, id=None, is_top_finding=None, references=None, scim_query=None, security_assessment_id=None, severity=None, state=None, target_id=None):
32
32
  if access_level and not isinstance(access_level, str):
33
33
  raise TypeError("Expected argument 'access_level' to be a str")
34
34
  pulumi.set(__self__, "access_level", access_level)
35
35
  if compartment_id_in_subtree and not isinstance(compartment_id_in_subtree, bool):
36
36
  raise TypeError("Expected argument 'compartment_id_in_subtree' to be a bool")
37
37
  pulumi.set(__self__, "compartment_id_in_subtree", compartment_id_in_subtree)
38
+ if fields and not isinstance(fields, list):
39
+ raise TypeError("Expected argument 'fields' to be a list")
40
+ pulumi.set(__self__, "fields", fields)
38
41
  if filters and not isinstance(filters, list):
39
42
  raise TypeError("Expected argument 'filters' to be a list")
40
43
  pulumi.set(__self__, "filters", filters)
@@ -53,6 +56,9 @@ class GetSecurityAssessmentFindingsResult:
53
56
  if references and not isinstance(references, str):
54
57
  raise TypeError("Expected argument 'references' to be a str")
55
58
  pulumi.set(__self__, "references", references)
59
+ if scim_query and not isinstance(scim_query, str):
60
+ raise TypeError("Expected argument 'scim_query' to be a str")
61
+ pulumi.set(__self__, "scim_query", scim_query)
56
62
  if security_assessment_id and not isinstance(security_assessment_id, str):
57
63
  raise TypeError("Expected argument 'security_assessment_id' to be a str")
58
64
  pulumi.set(__self__, "security_assessment_id", security_assessment_id)
@@ -76,6 +82,11 @@ class GetSecurityAssessmentFindingsResult:
76
82
  def compartment_id_in_subtree(self) -> Optional[bool]:
77
83
  return pulumi.get(self, "compartment_id_in_subtree")
78
84
 
85
+ @property
86
+ @pulumi.getter
87
+ def fields(self) -> Optional[Sequence[str]]:
88
+ return pulumi.get(self, "fields")
89
+
79
90
  @property
80
91
  @pulumi.getter
81
92
  def filters(self) -> Optional[Sequence['outputs.GetSecurityAssessmentFindingsFilterResult']]:
@@ -118,6 +129,11 @@ class GetSecurityAssessmentFindingsResult:
118
129
  """
119
130
  return pulumi.get(self, "references")
120
131
 
132
+ @property
133
+ @pulumi.getter(name="scimQuery")
134
+ def scim_query(self) -> Optional[str]:
135
+ return pulumi.get(self, "scim_query")
136
+
121
137
  @property
122
138
  @pulumi.getter(name="securityAssessmentId")
123
139
  def security_assessment_id(self) -> str:
@@ -156,12 +172,14 @@ class AwaitableGetSecurityAssessmentFindingsResult(GetSecurityAssessmentFindings
156
172
  return GetSecurityAssessmentFindingsResult(
157
173
  access_level=self.access_level,
158
174
  compartment_id_in_subtree=self.compartment_id_in_subtree,
175
+ fields=self.fields,
159
176
  filters=self.filters,
160
177
  finding_key=self.finding_key,
161
178
  findings=self.findings,
162
179
  id=self.id,
163
180
  is_top_finding=self.is_top_finding,
164
181
  references=self.references,
182
+ scim_query=self.scim_query,
165
183
  security_assessment_id=self.security_assessment_id,
166
184
  severity=self.severity,
167
185
  state=self.state,
@@ -170,10 +188,12 @@ class AwaitableGetSecurityAssessmentFindingsResult(GetSecurityAssessmentFindings
170
188
 
171
189
  def get_security_assessment_findings(access_level: Optional[str] = None,
172
190
  compartment_id_in_subtree: Optional[bool] = None,
191
+ fields: Optional[Sequence[str]] = None,
173
192
  filters: Optional[Sequence[Union['GetSecurityAssessmentFindingsFilterArgs', 'GetSecurityAssessmentFindingsFilterArgsDict']]] = None,
174
193
  finding_key: Optional[str] = None,
175
194
  is_top_finding: Optional[bool] = None,
176
195
  references: Optional[str] = None,
196
+ scim_query: Optional[str] = None,
177
197
  security_assessment_id: Optional[str] = None,
178
198
  severity: Optional[str] = None,
179
199
  state: Optional[str] = None,
@@ -187,9 +207,14 @@ def get_security_assessment_findings(access_level: Optional[str] = None,
187
207
 
188
208
  :param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
189
209
  :param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
210
+ :param Sequence[str] fields: Specifies a subset of fields to be returned in the response.
190
211
  :param str finding_key: Each finding in security assessment has an associated key (think of key as a finding's name). For a given finding, the key will be the same across targets. The user can use these keys to filter the findings.
191
212
  :param bool is_top_finding: A filter to return only the findings that are marked as top findings.
192
- :param str references: An optional filter to return only findings containing the specified reference.
213
+ :param str references: An optional filter to return only findings that match the specified reference.
214
+ :param str scim_query: The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at [RFC3339](https://tools.ietf.org/html/draft-ietf-scim-api-12). In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
215
+
216
+ **Example:** | scimQuery=(severity eq 'high') and (targetId eq 'target_1') scimQuery=(category eq "Users") and (targetId eq "target_1") scimQuery=(reference eq 'CIS') and (targetId eq 'target_1')
217
+ Supported fields: severity findingKey reference targetId isTopFinding title category remarks details summary isRiskModified
193
218
  :param str security_assessment_id: The OCID of the security assessment.
194
219
  :param str severity: A filter to return only findings of a particular risk level.
195
220
  :param str state: A filter to return only the findings that match the specified lifecycle states.
@@ -198,10 +223,12 @@ def get_security_assessment_findings(access_level: Optional[str] = None,
198
223
  __args__ = dict()
199
224
  __args__['accessLevel'] = access_level
200
225
  __args__['compartmentIdInSubtree'] = compartment_id_in_subtree
226
+ __args__['fields'] = fields
201
227
  __args__['filters'] = filters
202
228
  __args__['findingKey'] = finding_key
203
229
  __args__['isTopFinding'] = is_top_finding
204
230
  __args__['references'] = references
231
+ __args__['scimQuery'] = scim_query
205
232
  __args__['securityAssessmentId'] = security_assessment_id
206
233
  __args__['severity'] = severity
207
234
  __args__['state'] = state
@@ -212,22 +239,26 @@ def get_security_assessment_findings(access_level: Optional[str] = None,
212
239
  return AwaitableGetSecurityAssessmentFindingsResult(
213
240
  access_level=pulumi.get(__ret__, 'access_level'),
214
241
  compartment_id_in_subtree=pulumi.get(__ret__, 'compartment_id_in_subtree'),
242
+ fields=pulumi.get(__ret__, 'fields'),
215
243
  filters=pulumi.get(__ret__, 'filters'),
216
244
  finding_key=pulumi.get(__ret__, 'finding_key'),
217
245
  findings=pulumi.get(__ret__, 'findings'),
218
246
  id=pulumi.get(__ret__, 'id'),
219
247
  is_top_finding=pulumi.get(__ret__, 'is_top_finding'),
220
248
  references=pulumi.get(__ret__, 'references'),
249
+ scim_query=pulumi.get(__ret__, 'scim_query'),
221
250
  security_assessment_id=pulumi.get(__ret__, 'security_assessment_id'),
222
251
  severity=pulumi.get(__ret__, 'severity'),
223
252
  state=pulumi.get(__ret__, 'state'),
224
253
  target_id=pulumi.get(__ret__, 'target_id'))
225
254
  def get_security_assessment_findings_output(access_level: Optional[pulumi.Input[Optional[str]]] = None,
226
255
  compartment_id_in_subtree: Optional[pulumi.Input[Optional[bool]]] = None,
256
+ fields: Optional[pulumi.Input[Optional[Sequence[str]]]] = None,
227
257
  filters: Optional[pulumi.Input[Optional[Sequence[Union['GetSecurityAssessmentFindingsFilterArgs', 'GetSecurityAssessmentFindingsFilterArgsDict']]]]] = None,
228
258
  finding_key: Optional[pulumi.Input[Optional[str]]] = None,
229
259
  is_top_finding: Optional[pulumi.Input[Optional[bool]]] = None,
230
260
  references: Optional[pulumi.Input[Optional[str]]] = None,
261
+ scim_query: Optional[pulumi.Input[Optional[str]]] = None,
231
262
  security_assessment_id: Optional[pulumi.Input[str]] = None,
232
263
  severity: Optional[pulumi.Input[Optional[str]]] = None,
233
264
  state: Optional[pulumi.Input[Optional[str]]] = None,
@@ -241,9 +272,14 @@ def get_security_assessment_findings_output(access_level: Optional[pulumi.Input[
241
272
 
242
273
  :param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
243
274
  :param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
275
+ :param Sequence[str] fields: Specifies a subset of fields to be returned in the response.
244
276
  :param str finding_key: Each finding in security assessment has an associated key (think of key as a finding's name). For a given finding, the key will be the same across targets. The user can use these keys to filter the findings.
245
277
  :param bool is_top_finding: A filter to return only the findings that are marked as top findings.
246
- :param str references: An optional filter to return only findings containing the specified reference.
278
+ :param str references: An optional filter to return only findings that match the specified reference.
279
+ :param str scim_query: The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at [RFC3339](https://tools.ietf.org/html/draft-ietf-scim-api-12). In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
280
+
281
+ **Example:** | scimQuery=(severity eq 'high') and (targetId eq 'target_1') scimQuery=(category eq "Users") and (targetId eq "target_1") scimQuery=(reference eq 'CIS') and (targetId eq 'target_1')
282
+ Supported fields: severity findingKey reference targetId isTopFinding title category remarks details summary isRiskModified
247
283
  :param str security_assessment_id: The OCID of the security assessment.
248
284
  :param str severity: A filter to return only findings of a particular risk level.
249
285
  :param str state: A filter to return only the findings that match the specified lifecycle states.
@@ -252,10 +288,12 @@ def get_security_assessment_findings_output(access_level: Optional[pulumi.Input[
252
288
  __args__ = dict()
253
289
  __args__['accessLevel'] = access_level
254
290
  __args__['compartmentIdInSubtree'] = compartment_id_in_subtree
291
+ __args__['fields'] = fields
255
292
  __args__['filters'] = filters
256
293
  __args__['findingKey'] = finding_key
257
294
  __args__['isTopFinding'] = is_top_finding
258
295
  __args__['references'] = references
296
+ __args__['scimQuery'] = scim_query
259
297
  __args__['securityAssessmentId'] = security_assessment_id
260
298
  __args__['severity'] = severity
261
299
  __args__['state'] = state
@@ -265,12 +303,14 @@ def get_security_assessment_findings_output(access_level: Optional[pulumi.Input[
265
303
  return __ret__.apply(lambda __response__: GetSecurityAssessmentFindingsResult(
266
304
  access_level=pulumi.get(__response__, 'access_level'),
267
305
  compartment_id_in_subtree=pulumi.get(__response__, 'compartment_id_in_subtree'),
306
+ fields=pulumi.get(__response__, 'fields'),
268
307
  filters=pulumi.get(__response__, 'filters'),
269
308
  finding_key=pulumi.get(__response__, 'finding_key'),
270
309
  findings=pulumi.get(__response__, 'findings'),
271
310
  id=pulumi.get(__response__, 'id'),
272
311
  is_top_finding=pulumi.get(__response__, 'is_top_finding'),
273
312
  references=pulumi.get(__response__, 'references'),
313
+ scim_query=pulumi.get(__response__, 'scim_query'),
274
314
  security_assessment_id=pulumi.get(__response__, 'security_assessment_id'),
275
315
  severity=pulumi.get(__response__, 'severity'),
276
316
  state=pulumi.get(__response__, 'state'),