pulumi-oci 2.26.0a1741847591__py3-none-any.whl → 2.27.0a1742000109__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (135) hide show
  1. pulumi_oci/__init__.py +67 -0
  2. pulumi_oci/containerengine/_inputs.py +34 -35
  3. pulumi_oci/containerengine/cluster.py +2 -0
  4. pulumi_oci/containerengine/container_instance.py +2 -4
  5. pulumi_oci/containerengine/outputs.py +110 -21
  6. pulumi_oci/containerinstances/outputs.py +0 -14
  7. pulumi_oci/core/_inputs.py +21 -33
  8. pulumi_oci/core/outputs.py +13 -21
  9. pulumi_oci/database/__init__.py +1 -0
  10. pulumi_oci/database/_inputs.py +704 -0
  11. pulumi_oci/database/application_vip.py +59 -10
  12. pulumi_oci/database/autonomous_database.py +7 -28
  13. pulumi_oci/database/backup.py +153 -5
  14. pulumi_oci/database/cloud_exadata_infrastructure.py +126 -0
  15. pulumi_oci/database/cloud_vm_cluster.py +163 -30
  16. pulumi_oci/database/db_node.py +64 -8
  17. pulumi_oci/database/exadata_infrastructure.py +157 -3
  18. pulumi_oci/database/exadata_infrastructure_configure_exascale_management.py +1615 -0
  19. pulumi_oci/database/exadb_vm_cluster.py +84 -7
  20. pulumi_oci/database/exascale_db_storage_vault.py +147 -0
  21. pulumi_oci/database/external_container_database.py +4 -4
  22. pulumi_oci/database/external_non_container_database.py +4 -4
  23. pulumi_oci/database/external_pluggable_database.py +4 -4
  24. pulumi_oci/database/get_application_vip.py +16 -2
  25. pulumi_oci/database/get_autonomous_database.py +0 -3
  26. pulumi_oci/database/get_backups.py +136 -10
  27. pulumi_oci/database/get_cloud_exadata_infrastructure.py +43 -1
  28. pulumi_oci/database/get_cloud_vm_cluster.py +59 -3
  29. pulumi_oci/database/get_cloud_vm_clusters.py +28 -6
  30. pulumi_oci/database/get_database_software_images.py +20 -1
  31. pulumi_oci/database/get_db_node.py +31 -4
  32. pulumi_oci/database/get_db_server.py +15 -1
  33. pulumi_oci/database/get_exadata_infrastructure.py +57 -1
  34. pulumi_oci/database/get_exadb_vm_cluster.py +29 -1
  35. pulumi_oci/database/get_exadb_vm_clusters.py +25 -3
  36. pulumi_oci/database/get_exascale_db_storage_vault.py +43 -1
  37. pulumi_oci/database/get_exascale_db_storage_vaults.py +47 -3
  38. pulumi_oci/database/get_external_container_database.py +1 -1
  39. pulumi_oci/database/get_external_non_container_database.py +1 -1
  40. pulumi_oci/database/get_external_pluggable_database.py +1 -1
  41. pulumi_oci/database/get_flex_components.py +28 -6
  42. pulumi_oci/database/get_vm_cluster.py +60 -4
  43. pulumi_oci/database/get_vm_clusters.py +25 -3
  44. pulumi_oci/database/outputs.py +1084 -42
  45. pulumi_oci/database/pluggable_database.py +13 -13
  46. pulumi_oci/database/vm_cluster.py +172 -18
  47. pulumi_oci/database/vm_cluster_add_virtual_network.py +114 -2
  48. pulumi_oci/database/vm_cluster_remove_virtual_machine.py +114 -2
  49. pulumi_oci/datasafe/__init__.py +7 -0
  50. pulumi_oci/datasafe/_inputs.py +301 -0
  51. pulumi_oci/datasafe/discovery_mod.py +49 -0
  52. pulumi_oci/datasafe/get_discovery_job.py +15 -1
  53. pulumi_oci/datasafe/get_masking_report.py +46 -4
  54. pulumi_oci/datasafe/get_masking_report_masking_errors.py +166 -0
  55. pulumi_oci/datasafe/get_security_assessment_finding.py +31 -1
  56. pulumi_oci/datasafe/get_security_assessment_findings.py +43 -3
  57. pulumi_oci/datasafe/get_sensitive_column_analytics.py +370 -0
  58. pulumi_oci/datasafe/get_sensitive_data_model.py +15 -1
  59. pulumi_oci/datasafe/get_sensitive_type_group.py +253 -0
  60. pulumi_oci/datasafe/get_sensitive_type_group_grouped_sensitive_types.py +166 -0
  61. pulumi_oci/datasafe/get_sensitive_type_groups.py +294 -0
  62. pulumi_oci/datasafe/outputs.py +676 -3
  63. pulumi_oci/datasafe/sensitive_data_model.py +49 -0
  64. pulumi_oci/datasafe/sensitive_type_group.py +563 -0
  65. pulumi_oci/datasafe/sensitive_type_group_grouped_sensitive_type.py +287 -0
  66. pulumi_oci/datascience/__init__.py +4 -0
  67. pulumi_oci/datascience/_inputs.py +1160 -41
  68. pulumi_oci/datascience/get_model.py +29 -1
  69. pulumi_oci/datascience/get_model_custom_metadata_artifact_content.py +151 -0
  70. pulumi_oci/datascience/get_model_defined_metadata_artifact_content.py +151 -0
  71. pulumi_oci/datascience/get_model_version_set.py +15 -1
  72. pulumi_oci/datascience/get_model_version_sets.py +25 -3
  73. pulumi_oci/datascience/get_models.py +25 -3
  74. pulumi_oci/datascience/get_pipeline.py +15 -1
  75. pulumi_oci/datascience/model.py +64 -0
  76. pulumi_oci/datascience/model_custom_metadata_artifact.py +418 -0
  77. pulumi_oci/datascience/model_defined_metadata_artifact.py +418 -0
  78. pulumi_oci/datascience/model_version_set.py +28 -0
  79. pulumi_oci/datascience/outputs.py +4343 -2164
  80. pulumi_oci/datascience/pipeline.py +48 -141
  81. pulumi_oci/datascience/pipeline_run.py +32 -0
  82. pulumi_oci/dblm/__init__.py +17 -0
  83. pulumi_oci/dblm/_inputs.py +275 -0
  84. pulumi_oci/dblm/get_vulnerability.py +242 -0
  85. pulumi_oci/dblm/get_vulnerability_aggregated_vulnerability_data.py +220 -0
  86. pulumi_oci/dblm/get_vulnerability_notifications.py +144 -0
  87. pulumi_oci/dblm/get_vulnerability_resources.py +258 -0
  88. pulumi_oci/dblm/get_vulnerability_scan.py +267 -0
  89. pulumi_oci/dblm/get_vulnerability_scans.py +270 -0
  90. pulumi_oci/dblm/get_vulnerability_vulnerabilities.py +258 -0
  91. pulumi_oci/dblm/outputs.py +1294 -0
  92. pulumi_oci/dblm/vulnerability_scan.py +521 -0
  93. pulumi_oci/email/dkim.py +120 -20
  94. pulumi_oci/email/get_dkim.py +40 -1
  95. pulumi_oci/email/outputs.py +29 -0
  96. pulumi_oci/filestorage/__init__.py +3 -0
  97. pulumi_oci/filestorage/_inputs.py +49 -0
  98. pulumi_oci/filestorage/file_system.py +105 -0
  99. pulumi_oci/filestorage/file_system_quota_rule.py +593 -0
  100. pulumi_oci/filestorage/get_file_system_quota_rule.py +248 -0
  101. pulumi_oci/filestorage/get_file_system_quota_rules.py +210 -0
  102. pulumi_oci/filestorage/outputs.py +186 -0
  103. pulumi_oci/mysql/_inputs.py +1239 -10
  104. pulumi_oci/mysql/channel.py +28 -0
  105. pulumi_oci/mysql/get_channel.py +15 -1
  106. pulumi_oci/mysql/get_mysql_backup.py +15 -1
  107. pulumi_oci/mysql/get_mysql_configuration.py +15 -1
  108. pulumi_oci/mysql/get_mysql_db_system.py +15 -1
  109. pulumi_oci/mysql/mysql_backup.py +28 -0
  110. pulumi_oci/mysql/mysql_configuration.py +106 -0
  111. pulumi_oci/mysql/mysql_db_system.py +36 -0
  112. pulumi_oci/mysql/outputs.py +2008 -35
  113. pulumi_oci/opensearch/__init__.py +3 -0
  114. pulumi_oci/opensearch/_inputs.py +101 -0
  115. pulumi_oci/opensearch/cluster.py +76 -29
  116. pulumi_oci/opensearch/get_opensearch_cluster.py +12 -1
  117. pulumi_oci/opensearch/get_opensearch_cluster_pipeline.py +433 -0
  118. pulumi_oci/opensearch/get_opensearch_cluster_pipelines.py +218 -0
  119. pulumi_oci/opensearch/opensearch_cluster_pipeline.py +1172 -0
  120. pulumi_oci/opensearch/outputs.py +425 -0
  121. pulumi_oci/psql/_inputs.py +258 -0
  122. pulumi_oci/psql/backup.py +129 -28
  123. pulumi_oci/psql/db_system.py +10 -0
  124. pulumi_oci/psql/get_backup.py +47 -2
  125. pulumi_oci/psql/get_backups.py +3 -0
  126. pulumi_oci/psql/get_configurations.py +23 -1
  127. pulumi_oci/psql/get_db_system.py +1 -1
  128. pulumi_oci/psql/get_db_systems.py +1 -1
  129. pulumi_oci/psql/outputs.py +541 -5
  130. pulumi_oci/pulumi-plugin.json +1 -1
  131. pulumi_oci/redis/redis_cluster.py +7 -7
  132. {pulumi_oci-2.26.0a1741847591.dist-info → pulumi_oci-2.27.0a1742000109.dist-info}/METADATA +1 -1
  133. {pulumi_oci-2.26.0a1741847591.dist-info → pulumi_oci-2.27.0a1742000109.dist-info}/RECORD +135 -106
  134. {pulumi_oci-2.26.0a1741847591.dist-info → pulumi_oci-2.27.0a1742000109.dist-info}/WHEEL +0 -0
  135. {pulumi_oci-2.26.0a1741847591.dist-info → pulumi_oci-2.27.0a1742000109.dist-info}/top_level.txt +0 -0
@@ -1004,6 +1004,8 @@ class ClusterOptionsOpenIdConnectTokenAuthenticationConfig(dict):
1004
1004
  suggest = "ca_certificate"
1005
1005
  elif key == "clientId":
1006
1006
  suggest = "client_id"
1007
+ elif key == "configurationFile":
1008
+ suggest = "configuration_file"
1007
1009
  elif key == "groupsClaim":
1008
1010
  suggest = "groups_claim"
1009
1011
  elif key == "groupsPrefix":
@@ -1034,6 +1036,7 @@ class ClusterOptionsOpenIdConnectTokenAuthenticationConfig(dict):
1034
1036
  is_open_id_connect_auth_enabled: bool,
1035
1037
  ca_certificate: Optional[str] = None,
1036
1038
  client_id: Optional[str] = None,
1039
+ configuration_file: Optional[str] = None,
1037
1040
  groups_claim: Optional[str] = None,
1038
1041
  groups_prefix: Optional[str] = None,
1039
1042
  issuer_url: Optional[str] = None,
@@ -1045,6 +1048,7 @@ class ClusterOptionsOpenIdConnectTokenAuthenticationConfig(dict):
1045
1048
  :param bool is_open_id_connect_auth_enabled: (Updatable) Whether the cluster has OIDC Auth Config enabled. Defaults to false.
1046
1049
  :param str ca_certificate: (Updatable) A Base64 encoded public RSA or ECDSA certificates used to signed your identity provider's web certificate.
1047
1050
  :param str client_id: (Updatable) A client id that all tokens must be issued for.
1051
+ :param str configuration_file: (Updatable) A Base64 encoded string of a Kubernetes OIDC Auth Config file. More info [here](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#using-authentication-configuration)
1048
1052
  :param str groups_claim: (Updatable) JWT claim to use as the user's group. If the claim is present it must be an array of strings.
1049
1053
  :param str groups_prefix: (Updatable) Prefix prepended to group claims to prevent clashes with existing names (such as system:groups).
1050
1054
  :param str issuer_url: (Updatable) URL of the provider that allows the API server to discover public signing keys. Only URLs that use the https:// scheme are accepted. This is typically the provider's discovery URL, changed to have an empty path.
@@ -1058,6 +1062,8 @@ class ClusterOptionsOpenIdConnectTokenAuthenticationConfig(dict):
1058
1062
  pulumi.set(__self__, "ca_certificate", ca_certificate)
1059
1063
  if client_id is not None:
1060
1064
  pulumi.set(__self__, "client_id", client_id)
1065
+ if configuration_file is not None:
1066
+ pulumi.set(__self__, "configuration_file", configuration_file)
1061
1067
  if groups_claim is not None:
1062
1068
  pulumi.set(__self__, "groups_claim", groups_claim)
1063
1069
  if groups_prefix is not None:
@@ -1097,6 +1103,14 @@ class ClusterOptionsOpenIdConnectTokenAuthenticationConfig(dict):
1097
1103
  """
1098
1104
  return pulumi.get(self, "client_id")
1099
1105
 
1106
+ @property
1107
+ @pulumi.getter(name="configurationFile")
1108
+ def configuration_file(self) -> Optional[str]:
1109
+ """
1110
+ (Updatable) A Base64 encoded string of a Kubernetes OIDC Auth Config file. More info [here](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#using-authentication-configuration)
1111
+ """
1112
+ return pulumi.get(self, "configuration_file")
1113
+
1100
1114
  @property
1101
1115
  @pulumi.getter(name="groupsClaim")
1102
1116
  def groups_claim(self) -> Optional[str]:
@@ -1394,7 +1408,7 @@ class ContainerInstanceContainer(dict):
1394
1408
  The total size of all environment variables combined, name and values, must be 64 KB or smaller.
1395
1409
  :param str fault_domain: The fault domain where the container instance runs.
1396
1410
  :param Mapping[str, str] freeform_tags: Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only. Example: `{"bar-key": "value"}`
1397
- :param Sequence['ContainerInstanceContainerHealthCheckArgs'] health_checks: list of container health checks to check container status and take appropriate action if container status is failed. There are three types of health checks that we currently support HTTP, TCP, and Command.
1411
+ :param Sequence['ContainerInstanceContainerHealthCheckArgs'] health_checks: list of container health checks to check container status and take appropriate action if container status is failed. There are two types of health checks that we currently support HTTP and TCP.
1398
1412
  :param bool is_resource_principal_disabled: Determines if the container will have access to the container instance resource principal.
1399
1413
 
1400
1414
  This method utilizes resource principal version 2.2. For information on how to use the exposed resource principal elements, see https://docs.oracle.com/en-us/iaas/Content/API/Concepts/sdk_authentication_methods.htm#sdk_authentication_methods_resource_principal.
@@ -1574,7 +1588,7 @@ class ContainerInstanceContainer(dict):
1574
1588
  @pulumi.getter(name="healthChecks")
1575
1589
  def health_checks(self) -> Optional[Sequence['outputs.ContainerInstanceContainerHealthCheck']]:
1576
1590
  """
1577
- list of container health checks to check container status and take appropriate action if container status is failed. There are three types of health checks that we currently support HTTP, TCP, and Command.
1591
+ list of container health checks to check container status and take appropriate action if container status is failed. There are two types of health checks that we currently support HTTP and TCP.
1578
1592
  """
1579
1593
  return pulumi.get(self, "health_checks")
1580
1594
 
@@ -1705,7 +1719,7 @@ class ContainerInstanceContainerHealthCheck(dict):
1705
1719
 
1706
1720
  def __init__(__self__, *,
1707
1721
  health_check_type: str,
1708
- commands: Optional[Sequence[str]] = None,
1722
+ port: int,
1709
1723
  failure_action: Optional[str] = None,
1710
1724
  failure_threshold: Optional[int] = None,
1711
1725
  headers: Optional[Sequence['outputs.ContainerInstanceContainerHealthCheckHeader']] = None,
@@ -1713,14 +1727,13 @@ class ContainerInstanceContainerHealthCheck(dict):
1713
1727
  interval_in_seconds: Optional[int] = None,
1714
1728
  name: Optional[str] = None,
1715
1729
  path: Optional[str] = None,
1716
- port: Optional[int] = None,
1717
1730
  status: Optional[str] = None,
1718
1731
  status_details: Optional[str] = None,
1719
1732
  success_threshold: Optional[int] = None,
1720
1733
  timeout_in_seconds: Optional[int] = None):
1721
1734
  """
1722
1735
  :param str health_check_type: Container health check type.
1723
- :param Sequence[str] commands: The list of strings that will be simplified to a single command for checking the status of the container.
1736
+ :param int port: Container health check HTTP port.
1724
1737
  :param str failure_action: The action will be triggered when the container health check fails. There are two types of action: KILL or NONE. The default action is KILL. If failure action is KILL, the container will be subject to the container restart policy.
1725
1738
  :param int failure_threshold: Number of consecutive failures at which we consider the check failed.
1726
1739
  :param Sequence['ContainerInstanceContainerHealthCheckHeaderArgs'] headers: Container health check HTTP headers.
@@ -1728,13 +1741,11 @@ class ContainerInstanceContainerHealthCheck(dict):
1728
1741
  :param int interval_in_seconds: Number of seconds between two consecutive runs for checking container health.
1729
1742
  :param str name: Health check name.
1730
1743
  :param str path: Container health check HTTP path.
1731
- :param int port: Container health check HTTP port.
1732
1744
  :param int success_threshold: Number of consecutive successes at which we consider the check succeeded again after it was in failure state.
1733
1745
  :param int timeout_in_seconds: Length of waiting time in seconds before marking health check failed.
1734
1746
  """
1735
1747
  pulumi.set(__self__, "health_check_type", health_check_type)
1736
- if commands is not None:
1737
- pulumi.set(__self__, "commands", commands)
1748
+ pulumi.set(__self__, "port", port)
1738
1749
  if failure_action is not None:
1739
1750
  pulumi.set(__self__, "failure_action", failure_action)
1740
1751
  if failure_threshold is not None:
@@ -1749,8 +1760,6 @@ class ContainerInstanceContainerHealthCheck(dict):
1749
1760
  pulumi.set(__self__, "name", name)
1750
1761
  if path is not None:
1751
1762
  pulumi.set(__self__, "path", path)
1752
- if port is not None:
1753
- pulumi.set(__self__, "port", port)
1754
1763
  if status is not None:
1755
1764
  pulumi.set(__self__, "status", status)
1756
1765
  if status_details is not None:
@@ -1770,11 +1779,11 @@ class ContainerInstanceContainerHealthCheck(dict):
1770
1779
 
1771
1780
  @property
1772
1781
  @pulumi.getter
1773
- def commands(self) -> Optional[Sequence[str]]:
1782
+ def port(self) -> int:
1774
1783
  """
1775
- The list of strings that will be simplified to a single command for checking the status of the container.
1784
+ Container health check HTTP port.
1776
1785
  """
1777
- return pulumi.get(self, "commands")
1786
+ return pulumi.get(self, "port")
1778
1787
 
1779
1788
  @property
1780
1789
  @pulumi.getter(name="failureAction")
@@ -1832,14 +1841,6 @@ class ContainerInstanceContainerHealthCheck(dict):
1832
1841
  """
1833
1842
  return pulumi.get(self, "path")
1834
1843
 
1835
- @property
1836
- @pulumi.getter
1837
- def port(self) -> Optional[int]:
1838
- """
1839
- Container health check HTTP port.
1840
- """
1841
- return pulumi.get(self, "port")
1842
-
1843
1844
  @property
1844
1845
  @pulumi.getter
1845
1846
  def status(self) -> Optional[str]:
@@ -4812,6 +4813,8 @@ class GetClusterOptionResult(dict):
4812
4813
  :param Sequence['GetClusterOptionAdmissionControllerOptionArgs'] admission_controller_options: Configurable cluster admission controllers
4813
4814
  :param Sequence[str] ip_families: IP family to use for single stack or define the order of IP families for dual-stack
4814
4815
  :param Sequence['GetClusterOptionKubernetesNetworkConfigArgs'] kubernetes_network_configs: Network configuration for Kubernetes.
4816
+ :param Sequence['GetClusterOptionOpenIdConnectDiscoveryArgs'] open_id_connect_discoveries: The property that define the status of the OIDC Discovery feature for a cluster.
4817
+ :param Sequence['GetClusterOptionOpenIdConnectTokenAuthenticationConfigArgs'] open_id_connect_token_authentication_configs: The properties that configure OIDC token authentication in kube-apiserver. For more information, see [Configuring the API Server](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#using-flags).
4815
4818
  :param Sequence['GetClusterOptionPersistentVolumeConfigArgs'] persistent_volume_configs: Configuration to be applied to block volumes created by Kubernetes Persistent Volume Claims (PVC)
4816
4819
  :param Sequence['GetClusterOptionServiceLbConfigArgs'] service_lb_configs: Configuration to be applied to load balancers created by Kubernetes services
4817
4820
  :param Sequence[str] service_lb_subnet_ids: The OCIDs of the subnets used for Kubernetes services load balancers.
@@ -4861,11 +4864,17 @@ class GetClusterOptionResult(dict):
4861
4864
  @property
4862
4865
  @pulumi.getter(name="openIdConnectDiscoveries")
4863
4866
  def open_id_connect_discoveries(self) -> Sequence['outputs.GetClusterOptionOpenIdConnectDiscoveryResult']:
4867
+ """
4868
+ The property that define the status of the OIDC Discovery feature for a cluster.
4869
+ """
4864
4870
  return pulumi.get(self, "open_id_connect_discoveries")
4865
4871
 
4866
4872
  @property
4867
4873
  @pulumi.getter(name="openIdConnectTokenAuthenticationConfigs")
4868
4874
  def open_id_connect_token_authentication_configs(self) -> Sequence['outputs.GetClusterOptionOpenIdConnectTokenAuthenticationConfigResult']:
4875
+ """
4876
+ The properties that configure OIDC token authentication in kube-apiserver. For more information, see [Configuring the API Server](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#using-flags).
4877
+ """
4869
4878
  return pulumi.get(self, "open_id_connect_token_authentication_configs")
4870
4879
 
4871
4880
  @property
@@ -4991,11 +5000,17 @@ class GetClusterOptionKubernetesNetworkConfigResult(dict):
4991
5000
  class GetClusterOptionOpenIdConnectDiscoveryResult(dict):
4992
5001
  def __init__(__self__, *,
4993
5002
  is_open_id_connect_discovery_enabled: bool):
5003
+ """
5004
+ :param bool is_open_id_connect_discovery_enabled: Whether the cluster has OIDC Discovery enabled. Defaults to false. If set to true, the cluster will be assigned a public OIDC Discovery endpoint.
5005
+ """
4994
5006
  pulumi.set(__self__, "is_open_id_connect_discovery_enabled", is_open_id_connect_discovery_enabled)
4995
5007
 
4996
5008
  @property
4997
5009
  @pulumi.getter(name="isOpenIdConnectDiscoveryEnabled")
4998
5010
  def is_open_id_connect_discovery_enabled(self) -> bool:
5011
+ """
5012
+ Whether the cluster has OIDC Discovery enabled. Defaults to false. If set to true, the cluster will be assigned a public OIDC Discovery endpoint.
5013
+ """
4999
5014
  return pulumi.get(self, "is_open_id_connect_discovery_enabled")
5000
5015
 
5001
5016
 
@@ -5004,6 +5019,7 @@ class GetClusterOptionOpenIdConnectTokenAuthenticationConfigResult(dict):
5004
5019
  def __init__(__self__, *,
5005
5020
  ca_certificate: str,
5006
5021
  client_id: str,
5022
+ configuration_file: str,
5007
5023
  groups_claim: str,
5008
5024
  groups_prefix: str,
5009
5025
  is_open_id_connect_auth_enabled: bool,
@@ -5012,8 +5028,22 @@ class GetClusterOptionOpenIdConnectTokenAuthenticationConfigResult(dict):
5012
5028
  signing_algorithms: Sequence[str],
5013
5029
  username_claim: str,
5014
5030
  username_prefix: str):
5031
+ """
5032
+ :param str ca_certificate: A Base64 encoded public RSA or ECDSA certificates used to signed your identity provider's web certificate.
5033
+ :param str client_id: A client id that all tokens must be issued for.
5034
+ :param str configuration_file: A Base64 encoded string of a Kubernetes OIDC Auth Config file. More info [here](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#using-authentication-configuration)
5035
+ :param str groups_claim: JWT claim to use as the user's group. If the claim is present it must be an array of strings.
5036
+ :param str groups_prefix: Prefix prepended to group claims to prevent clashes with existing names (such as system:groups).
5037
+ :param bool is_open_id_connect_auth_enabled: Whether the cluster has OIDC Auth Config enabled. Defaults to false.
5038
+ :param str issuer_url: URL of the provider that allows the API server to discover public signing keys. Only URLs that use the https:// scheme are accepted. This is typically the provider's discovery URL, changed to have an empty path.
5039
+ :param Sequence['GetClusterOptionOpenIdConnectTokenAuthenticationConfigRequiredClaimArgs'] required_claims: A key=value pair that describes a required claim in the ID Token. If set, the claim is verified to be present in the ID Token with a matching value. Repeat this flag to specify multiple claims.
5040
+ :param Sequence[str] signing_algorithms: The signing algorithms accepted. Default is ["RS256"].
5041
+ :param str username_claim: JWT claim to use as the user name. By default sub, which is expected to be a unique identifier of the end user. Admins can choose other claims, such as email or name, depending on their provider. However, claims other than email will be prefixed with the issuer URL to prevent naming clashes with other plugins.
5042
+ :param str username_prefix: Prefix prepended to username claims to prevent clashes with existing names (such as system:users). For example, the value oidc: will create usernames like oidc:jane.doe. If this flag isn't provided and --oidc-username-claim is a value other than email the prefix defaults to ( Issuer URL )# where ( Issuer URL ) is the value of --oidc-issuer-url. The value - can be used to disable all prefixing.
5043
+ """
5015
5044
  pulumi.set(__self__, "ca_certificate", ca_certificate)
5016
5045
  pulumi.set(__self__, "client_id", client_id)
5046
+ pulumi.set(__self__, "configuration_file", configuration_file)
5017
5047
  pulumi.set(__self__, "groups_claim", groups_claim)
5018
5048
  pulumi.set(__self__, "groups_prefix", groups_prefix)
5019
5049
  pulumi.set(__self__, "is_open_id_connect_auth_enabled", is_open_id_connect_auth_enabled)
@@ -5026,51 +5056,89 @@ class GetClusterOptionOpenIdConnectTokenAuthenticationConfigResult(dict):
5026
5056
  @property
5027
5057
  @pulumi.getter(name="caCertificate")
5028
5058
  def ca_certificate(self) -> str:
5059
+ """
5060
+ A Base64 encoded public RSA or ECDSA certificates used to signed your identity provider's web certificate.
5061
+ """
5029
5062
  return pulumi.get(self, "ca_certificate")
5030
5063
 
5031
5064
  @property
5032
5065
  @pulumi.getter(name="clientId")
5033
5066
  def client_id(self) -> str:
5067
+ """
5068
+ A client id that all tokens must be issued for.
5069
+ """
5034
5070
  return pulumi.get(self, "client_id")
5035
5071
 
5072
+ @property
5073
+ @pulumi.getter(name="configurationFile")
5074
+ def configuration_file(self) -> str:
5075
+ """
5076
+ A Base64 encoded string of a Kubernetes OIDC Auth Config file. More info [here](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#using-authentication-configuration)
5077
+ """
5078
+ return pulumi.get(self, "configuration_file")
5079
+
5036
5080
  @property
5037
5081
  @pulumi.getter(name="groupsClaim")
5038
5082
  def groups_claim(self) -> str:
5083
+ """
5084
+ JWT claim to use as the user's group. If the claim is present it must be an array of strings.
5085
+ """
5039
5086
  return pulumi.get(self, "groups_claim")
5040
5087
 
5041
5088
  @property
5042
5089
  @pulumi.getter(name="groupsPrefix")
5043
5090
  def groups_prefix(self) -> str:
5091
+ """
5092
+ Prefix prepended to group claims to prevent clashes with existing names (such as system:groups).
5093
+ """
5044
5094
  return pulumi.get(self, "groups_prefix")
5045
5095
 
5046
5096
  @property
5047
5097
  @pulumi.getter(name="isOpenIdConnectAuthEnabled")
5048
5098
  def is_open_id_connect_auth_enabled(self) -> bool:
5099
+ """
5100
+ Whether the cluster has OIDC Auth Config enabled. Defaults to false.
5101
+ """
5049
5102
  return pulumi.get(self, "is_open_id_connect_auth_enabled")
5050
5103
 
5051
5104
  @property
5052
5105
  @pulumi.getter(name="issuerUrl")
5053
5106
  def issuer_url(self) -> str:
5107
+ """
5108
+ URL of the provider that allows the API server to discover public signing keys. Only URLs that use the https:// scheme are accepted. This is typically the provider's discovery URL, changed to have an empty path.
5109
+ """
5054
5110
  return pulumi.get(self, "issuer_url")
5055
5111
 
5056
5112
  @property
5057
5113
  @pulumi.getter(name="requiredClaims")
5058
5114
  def required_claims(self) -> Sequence['outputs.GetClusterOptionOpenIdConnectTokenAuthenticationConfigRequiredClaimResult']:
5115
+ """
5116
+ A key=value pair that describes a required claim in the ID Token. If set, the claim is verified to be present in the ID Token with a matching value. Repeat this flag to specify multiple claims.
5117
+ """
5059
5118
  return pulumi.get(self, "required_claims")
5060
5119
 
5061
5120
  @property
5062
5121
  @pulumi.getter(name="signingAlgorithms")
5063
5122
  def signing_algorithms(self) -> Sequence[str]:
5123
+ """
5124
+ The signing algorithms accepted. Default is ["RS256"].
5125
+ """
5064
5126
  return pulumi.get(self, "signing_algorithms")
5065
5127
 
5066
5128
  @property
5067
5129
  @pulumi.getter(name="usernameClaim")
5068
5130
  def username_claim(self) -> str:
5131
+ """
5132
+ JWT claim to use as the user name. By default sub, which is expected to be a unique identifier of the end user. Admins can choose other claims, such as email or name, depending on their provider. However, claims other than email will be prefixed with the issuer URL to prevent naming clashes with other plugins.
5133
+ """
5069
5134
  return pulumi.get(self, "username_claim")
5070
5135
 
5071
5136
  @property
5072
5137
  @pulumi.getter(name="usernamePrefix")
5073
5138
  def username_prefix(self) -> str:
5139
+ """
5140
+ Prefix prepended to username claims to prevent clashes with existing names (such as system:users). For example, the value oidc: will create usernames like oidc:jane.doe. If this flag isn't provided and --oidc-username-claim is a value other than email the prefix defaults to ( Issuer URL )# where ( Issuer URL ) is the value of --oidc-issuer-url. The value - can be used to disable all prefixing.
5141
+ """
5074
5142
  return pulumi.get(self, "username_prefix")
5075
5143
 
5076
5144
 
@@ -5079,17 +5147,27 @@ class GetClusterOptionOpenIdConnectTokenAuthenticationConfigRequiredClaimResult(
5079
5147
  def __init__(__self__, *,
5080
5148
  key: str,
5081
5149
  value: str):
5150
+ """
5151
+ :param str key: The key of the pair.
5152
+ :param str value: The value of the pair.
5153
+ """
5082
5154
  pulumi.set(__self__, "key", key)
5083
5155
  pulumi.set(__self__, "value", value)
5084
5156
 
5085
5157
  @property
5086
5158
  @pulumi.getter
5087
5159
  def key(self) -> str:
5160
+ """
5161
+ The key of the pair.
5162
+ """
5088
5163
  return pulumi.get(self, "key")
5089
5164
 
5090
5165
  @property
5091
5166
  @pulumi.getter
5092
5167
  def value(self) -> str:
5168
+ """
5169
+ The value of the pair.
5170
+ """
5093
5171
  return pulumi.get(self, "value")
5094
5172
 
5095
5173
 
@@ -5989,6 +6067,7 @@ class GetClustersClusterOptionOpenIdConnectTokenAuthenticationConfigResult(dict)
5989
6067
  def __init__(__self__, *,
5990
6068
  ca_certificate: str,
5991
6069
  client_id: str,
6070
+ configuration_file: str,
5992
6071
  groups_claim: str,
5993
6072
  groups_prefix: str,
5994
6073
  is_open_id_connect_auth_enabled: bool,
@@ -6000,6 +6079,7 @@ class GetClustersClusterOptionOpenIdConnectTokenAuthenticationConfigResult(dict)
6000
6079
  """
6001
6080
  :param str ca_certificate: A Base64 encoded public RSA or ECDSA certificates used to signed your identity provider's web certificate.
6002
6081
  :param str client_id: A client id that all tokens must be issued for.
6082
+ :param str configuration_file: A Base64 encoded string of a Kubernetes OIDC Auth Config file. More info [here](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#using-authentication-configuration)
6003
6083
  :param str groups_claim: JWT claim to use as the user's group. If the claim is present it must be an array of strings.
6004
6084
  :param str groups_prefix: Prefix prepended to group claims to prevent clashes with existing names (such as system:groups).
6005
6085
  :param bool is_open_id_connect_auth_enabled: Whether the cluster has OIDC Auth Config enabled. Defaults to false.
@@ -6011,6 +6091,7 @@ class GetClustersClusterOptionOpenIdConnectTokenAuthenticationConfigResult(dict)
6011
6091
  """
6012
6092
  pulumi.set(__self__, "ca_certificate", ca_certificate)
6013
6093
  pulumi.set(__self__, "client_id", client_id)
6094
+ pulumi.set(__self__, "configuration_file", configuration_file)
6014
6095
  pulumi.set(__self__, "groups_claim", groups_claim)
6015
6096
  pulumi.set(__self__, "groups_prefix", groups_prefix)
6016
6097
  pulumi.set(__self__, "is_open_id_connect_auth_enabled", is_open_id_connect_auth_enabled)
@@ -6036,6 +6117,14 @@ class GetClustersClusterOptionOpenIdConnectTokenAuthenticationConfigResult(dict)
6036
6117
  """
6037
6118
  return pulumi.get(self, "client_id")
6038
6119
 
6120
+ @property
6121
+ @pulumi.getter(name="configurationFile")
6122
+ def configuration_file(self) -> str:
6123
+ """
6124
+ A Base64 encoded string of a Kubernetes OIDC Auth Config file. More info [here](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#using-authentication-configuration)
6125
+ """
6126
+ return pulumi.get(self, "configuration_file")
6127
+
6039
6128
  @property
6040
6129
  @pulumi.getter(name="groupsClaim")
6041
6130
  def groups_claim(self) -> str:
@@ -294,7 +294,6 @@ class GetContainerInstanceContainerResult(dict):
294
294
  @pulumi.output_type
295
295
  class GetContainerInstanceContainerHealthCheckResult(dict):
296
296
  def __init__(__self__, *,
297
- commands: Sequence[str],
298
297
  failure_action: str,
299
298
  failure_threshold: int,
300
299
  headers: Sequence['outputs.GetContainerInstanceContainerHealthCheckHeaderResult'],
@@ -312,7 +311,6 @@ class GetContainerInstanceContainerHealthCheckResult(dict):
312
311
  :param str name: The name of the volume. This must be unique within a single container instance.
313
312
  :param str path: (Optional) Relative path for this file inside the volume mount directory. By default, the file is presented at the root of the volume mount path.
314
313
  """
315
- pulumi.set(__self__, "commands", commands)
316
314
  pulumi.set(__self__, "failure_action", failure_action)
317
315
  pulumi.set(__self__, "failure_threshold", failure_threshold)
318
316
  pulumi.set(__self__, "headers", headers)
@@ -327,11 +325,6 @@ class GetContainerInstanceContainerHealthCheckResult(dict):
327
325
  pulumi.set(__self__, "success_threshold", success_threshold)
328
326
  pulumi.set(__self__, "timeout_in_seconds", timeout_in_seconds)
329
327
 
330
- @property
331
- @pulumi.getter
332
- def commands(self) -> Sequence[str]:
333
- return pulumi.get(self, "commands")
334
-
335
328
  @property
336
329
  @pulumi.getter(name="failureAction")
337
330
  def failure_action(self) -> str:
@@ -1825,7 +1818,6 @@ class GetContainerInstancesContainerInstanceCollectionItemContainerResult(dict):
1825
1818
  @pulumi.output_type
1826
1819
  class GetContainerInstancesContainerInstanceCollectionItemContainerHealthCheckResult(dict):
1827
1820
  def __init__(__self__, *,
1828
- commands: Sequence[str],
1829
1821
  failure_action: str,
1830
1822
  failure_threshold: int,
1831
1823
  headers: Sequence['outputs.GetContainerInstancesContainerInstanceCollectionItemContainerHealthCheckHeaderResult'],
@@ -1843,7 +1835,6 @@ class GetContainerInstancesContainerInstanceCollectionItemContainerHealthCheckRe
1843
1835
  :param str name: The name of the volume. This must be unique within a single container instance.
1844
1836
  :param str path: (Optional) Relative path for this file inside the volume mount directory. By default, the file is presented at the root of the volume mount path.
1845
1837
  """
1846
- pulumi.set(__self__, "commands", commands)
1847
1838
  pulumi.set(__self__, "failure_action", failure_action)
1848
1839
  pulumi.set(__self__, "failure_threshold", failure_threshold)
1849
1840
  pulumi.set(__self__, "headers", headers)
@@ -1858,11 +1849,6 @@ class GetContainerInstancesContainerInstanceCollectionItemContainerHealthCheckRe
1858
1849
  pulumi.set(__self__, "success_threshold", success_threshold)
1859
1850
  pulumi.set(__self__, "timeout_in_seconds", timeout_in_seconds)
1860
1851
 
1861
- @property
1862
- @pulumi.getter
1863
- def commands(self) -> Sequence[str]:
1864
- return pulumi.get(self, "commands")
1865
-
1866
1852
  @property
1867
1853
  @pulumi.getter(name="failureAction")
1868
1854
  def failure_action(self) -> str:
@@ -3955,22 +3955,22 @@ if not MYPY:
3955
3955
  connectivity_association_key_secret_id: pulumi.Input[str]
3956
3956
  """
3957
3957
  (Updatable) Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity Association Key (CAK) of this MACsec key.
3958
-
3959
- NOTE: Only the latest secret version will be used.
3960
3958
  """
3961
3959
  connectivity_association_name_secret_id: pulumi.Input[str]
3962
3960
  """
3963
3961
  (Updatable) Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity association Key Name (CKN) of this MACsec key.
3964
-
3965
- NOTE: Only the latest secret version will be used.
3966
3962
  """
3967
3963
  connectivity_association_key_secret_version: NotRequired[pulumi.Input[str]]
3968
3964
  """
3969
- The secret version of the `connectivityAssociationKey` secret in Vault.
3965
+ (Updatable) The secret version of the `connectivity_association_key_secret_id` secret in Vault.
3966
+
3967
+ NOTE: Only the latest secret version will be used.
3970
3968
  """
3971
3969
  connectivity_association_name_secret_version: NotRequired[pulumi.Input[str]]
3972
3970
  """
3973
- The secret version of the connectivity association name secret in Vault.
3971
+ (Updatable) The secret version of the `connectivity_association_name_secret_id` secret in Vault.
3972
+
3973
+ NOTE: Only the latest secret version will be used.
3974
3974
  """
3975
3975
  elif False:
3976
3976
  CrossConnectGroupMacsecPropertiesPrimaryKeyArgsDict: TypeAlias = Mapping[str, Any]
@@ -3984,13 +3984,13 @@ class CrossConnectGroupMacsecPropertiesPrimaryKeyArgs:
3984
3984
  connectivity_association_name_secret_version: Optional[pulumi.Input[str]] = None):
3985
3985
  """
3986
3986
  :param pulumi.Input[str] connectivity_association_key_secret_id: (Updatable) Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity Association Key (CAK) of this MACsec key.
3987
+ :param pulumi.Input[str] connectivity_association_name_secret_id: (Updatable) Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity association Key Name (CKN) of this MACsec key.
3988
+ :param pulumi.Input[str] connectivity_association_key_secret_version: (Updatable) The secret version of the `connectivity_association_key_secret_id` secret in Vault.
3987
3989
 
3988
3990
  NOTE: Only the latest secret version will be used.
3989
- :param pulumi.Input[str] connectivity_association_name_secret_id: (Updatable) Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity association Key Name (CKN) of this MACsec key.
3991
+ :param pulumi.Input[str] connectivity_association_name_secret_version: (Updatable) The secret version of the `connectivity_association_name_secret_id` secret in Vault.
3990
3992
 
3991
3993
  NOTE: Only the latest secret version will be used.
3992
- :param pulumi.Input[str] connectivity_association_key_secret_version: The secret version of the `connectivityAssociationKey` secret in Vault.
3993
- :param pulumi.Input[str] connectivity_association_name_secret_version: The secret version of the connectivity association name secret in Vault.
3994
3994
  """
3995
3995
  pulumi.set(__self__, "connectivity_association_key_secret_id", connectivity_association_key_secret_id)
3996
3996
  pulumi.set(__self__, "connectivity_association_name_secret_id", connectivity_association_name_secret_id)
@@ -4004,8 +4004,6 @@ class CrossConnectGroupMacsecPropertiesPrimaryKeyArgs:
4004
4004
  def connectivity_association_key_secret_id(self) -> pulumi.Input[str]:
4005
4005
  """
4006
4006
  (Updatable) Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity Association Key (CAK) of this MACsec key.
4007
-
4008
- NOTE: Only the latest secret version will be used.
4009
4007
  """
4010
4008
  return pulumi.get(self, "connectivity_association_key_secret_id")
4011
4009
 
@@ -4018,8 +4016,6 @@ class CrossConnectGroupMacsecPropertiesPrimaryKeyArgs:
4018
4016
  def connectivity_association_name_secret_id(self) -> pulumi.Input[str]:
4019
4017
  """
4020
4018
  (Updatable) Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity association Key Name (CKN) of this MACsec key.
4021
-
4022
- NOTE: Only the latest secret version will be used.
4023
4019
  """
4024
4020
  return pulumi.get(self, "connectivity_association_name_secret_id")
4025
4021
 
@@ -4031,7 +4027,9 @@ class CrossConnectGroupMacsecPropertiesPrimaryKeyArgs:
4031
4027
  @pulumi.getter(name="connectivityAssociationKeySecretVersion")
4032
4028
  def connectivity_association_key_secret_version(self) -> Optional[pulumi.Input[str]]:
4033
4029
  """
4034
- The secret version of the `connectivityAssociationKey` secret in Vault.
4030
+ (Updatable) The secret version of the `connectivity_association_key_secret_id` secret in Vault.
4031
+
4032
+ NOTE: Only the latest secret version will be used.
4035
4033
  """
4036
4034
  return pulumi.get(self, "connectivity_association_key_secret_version")
4037
4035
 
@@ -4043,7 +4041,9 @@ class CrossConnectGroupMacsecPropertiesPrimaryKeyArgs:
4043
4041
  @pulumi.getter(name="connectivityAssociationNameSecretVersion")
4044
4042
  def connectivity_association_name_secret_version(self) -> Optional[pulumi.Input[str]]:
4045
4043
  """
4046
- The secret version of the connectivity association name secret in Vault.
4044
+ (Updatable) The secret version of the `connectivity_association_name_secret_id` secret in Vault.
4045
+
4046
+ NOTE: Only the latest secret version will be used.
4047
4047
  """
4048
4048
  return pulumi.get(self, "connectivity_association_name_secret_version")
4049
4049
 
@@ -4056,7 +4056,7 @@ if not MYPY:
4056
4056
  class CrossConnectMacsecPropertiesArgsDict(TypedDict):
4057
4057
  state: pulumi.Input[str]
4058
4058
  """
4059
- (Updatable) Indicates whether or not MACsec is enabled.
4059
+ The cross-connect's current state.
4060
4060
  """
4061
4061
  encryption_cipher: NotRequired[pulumi.Input[str]]
4062
4062
  """
@@ -4081,7 +4081,7 @@ class CrossConnectMacsecPropertiesArgs:
4081
4081
  is_unprotected_traffic_allowed: Optional[pulumi.Input[bool]] = None,
4082
4082
  primary_key: Optional[pulumi.Input['CrossConnectMacsecPropertiesPrimaryKeyArgs']] = None):
4083
4083
  """
4084
- :param pulumi.Input[str] state: (Updatable) Indicates whether or not MACsec is enabled.
4084
+ :param pulumi.Input[str] state: The cross-connect's current state.
4085
4085
  :param pulumi.Input[str] encryption_cipher: (Updatable) Type of encryption cipher suite to use for the MACsec connection.
4086
4086
  :param pulumi.Input[bool] is_unprotected_traffic_allowed: (Updatable) Indicates whether unencrypted traffic is allowed if MACsec Key Agreement protocol (MKA) fails.
4087
4087
  :param pulumi.Input['CrossConnectMacsecPropertiesPrimaryKeyArgs'] primary_key: (Updatable) Defines the secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm)s held in Vault that represent the MACsec key.
@@ -4098,7 +4098,7 @@ class CrossConnectMacsecPropertiesArgs:
4098
4098
  @pulumi.getter
4099
4099
  def state(self) -> pulumi.Input[str]:
4100
4100
  """
4101
- (Updatable) Indicates whether or not MACsec is enabled.
4101
+ The cross-connect's current state.
4102
4102
  """
4103
4103
  return pulumi.get(self, "state")
4104
4104
 
@@ -4148,14 +4148,10 @@ if not MYPY:
4148
4148
  connectivity_association_key_secret_id: pulumi.Input[str]
4149
4149
  """
4150
4150
  (Updatable) Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity Association Key (CAK) of this MACsec key.
4151
-
4152
- NOTE: Only the latest secret version will be used.
4153
4151
  """
4154
4152
  connectivity_association_name_secret_id: pulumi.Input[str]
4155
4153
  """
4156
- (Updatable) Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity association Key Name (CKN) of this MACsec key.
4157
-
4158
- NOTE: Only the latest secret version will be used.
4154
+ Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity association Key Name (CKN) of this MACsec key.
4159
4155
  """
4160
4156
  connectivity_association_key_secret_version: NotRequired[pulumi.Input[str]]
4161
4157
  """
@@ -4177,11 +4173,7 @@ class CrossConnectMacsecPropertiesPrimaryKeyArgs:
4177
4173
  connectivity_association_name_secret_version: Optional[pulumi.Input[str]] = None):
4178
4174
  """
4179
4175
  :param pulumi.Input[str] connectivity_association_key_secret_id: (Updatable) Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity Association Key (CAK) of this MACsec key.
4180
-
4181
- NOTE: Only the latest secret version will be used.
4182
- :param pulumi.Input[str] connectivity_association_name_secret_id: (Updatable) Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity association Key Name (CKN) of this MACsec key.
4183
-
4184
- NOTE: Only the latest secret version will be used.
4176
+ :param pulumi.Input[str] connectivity_association_name_secret_id: Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity association Key Name (CKN) of this MACsec key.
4185
4177
  :param pulumi.Input[str] connectivity_association_key_secret_version: The secret version of the `connectivityAssociationKey` secret in Vault.
4186
4178
  :param pulumi.Input[str] connectivity_association_name_secret_version: The secret version of the connectivity association name secret in Vault.
4187
4179
  """
@@ -4197,8 +4189,6 @@ class CrossConnectMacsecPropertiesPrimaryKeyArgs:
4197
4189
  def connectivity_association_key_secret_id(self) -> pulumi.Input[str]:
4198
4190
  """
4199
4191
  (Updatable) Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity Association Key (CAK) of this MACsec key.
4200
-
4201
- NOTE: Only the latest secret version will be used.
4202
4192
  """
4203
4193
  return pulumi.get(self, "connectivity_association_key_secret_id")
4204
4194
 
@@ -4210,9 +4200,7 @@ class CrossConnectMacsecPropertiesPrimaryKeyArgs:
4210
4200
  @pulumi.getter(name="connectivityAssociationNameSecretId")
4211
4201
  def connectivity_association_name_secret_id(self) -> pulumi.Input[str]:
4212
4202
  """
4213
- (Updatable) Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity association Key Name (CKN) of this MACsec key.
4214
-
4215
- NOTE: Only the latest secret version will be used.
4203
+ Secret [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) containing the Connectivity association Key Name (CKN) of this MACsec key.
4216
4204
  """
4217
4205
  return pulumi.get(self, "connectivity_association_name_secret_id")
4218
4206