pulumi-oci 2.4.0a1721933648__py3-none-any.whl → 2.5.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_oci/__init__.py +59 -32
- pulumi_oci/_utilities.py +2 -0
- pulumi_oci/bigdataservice/bds_instance.py +47 -0
- pulumi_oci/bigdataservice/get_bds_instance.py +11 -1
- pulumi_oci/bigdataservice/outputs.py +7 -0
- pulumi_oci/core/__init__.py +3 -0
- pulumi_oci/core/_inputs.py +40 -0
- pulumi_oci/core/get_instance_maintenance_event.py +414 -0
- pulumi_oci/core/get_instance_maintenance_events.py +250 -0
- pulumi_oci/core/instance_maintenance_event.py +1022 -0
- pulumi_oci/core/outputs.py +314 -0
- pulumi_oci/database/autonomous_database.py +28 -0
- pulumi_oci/database/get_autonomous_database.py +14 -1
- pulumi_oci/database/outputs.py +22 -0
- pulumi_oci/databasemigration/_inputs.py +184 -0
- pulumi_oci/databasemigration/job.py +99 -24
- pulumi_oci/databasemigration/outputs.py +171 -0
- pulumi_oci/datasafe/__init__.py +2 -4
- pulumi_oci/datasafe/_inputs.py +55 -0
- pulumi_oci/datasafe/alert.py +56 -0
- pulumi_oci/datasafe/alert_policy.py +745 -0
- pulumi_oci/datasafe/alert_policy_rule.py +446 -0
- pulumi_oci/datasafe/get_alert.py +27 -1
- pulumi_oci/datasafe/get_alert_policy.py +26 -2
- pulumi_oci/datasafe/get_alert_policy_rule.py +94 -18
- pulumi_oci/datasafe/get_report.py +14 -1
- pulumi_oci/datasafe/get_report_definition.py +14 -1
- pulumi_oci/datasafe/get_target_alert_policy_association.py +15 -2
- pulumi_oci/datasafe/outputs.py +231 -27
- pulumi_oci/datasafe/report.py +28 -0
- pulumi_oci/datasafe/report_definition.py +28 -0
- pulumi_oci/datasafe/target_alert_policy_association.py +28 -0
- pulumi_oci/fleetsoftwareupdate/__init__.py +15 -0
- pulumi_oci/fleetsoftwareupdate/_inputs.py +553 -0
- pulumi_oci/fleetsoftwareupdate/fsu_collection.py +514 -0
- pulumi_oci/fleetsoftwareupdate/fsu_cycle.py +812 -0
- pulumi_oci/fleetsoftwareupdate/get_fsu_collection.py +225 -0
- pulumi_oci/fleetsoftwareupdate/get_fsu_collections.py +141 -0
- pulumi_oci/fleetsoftwareupdate/get_fsu_cycle.py +325 -0
- pulumi_oci/fleetsoftwareupdate/get_fsu_cycles.py +167 -0
- pulumi_oci/fleetsoftwareupdate/outputs.py +1481 -0
- pulumi_oci/generativeai/get_dedicated_ai_cluster.py +3 -0
- pulumi_oci/generativeai/get_dedicated_ai_clusters.py +3 -0
- pulumi_oci/generativeai/get_endpoint.py +6 -9
- pulumi_oci/generativeai/get_endpoints.py +3 -3
- pulumi_oci/generativeai/get_model.py +36 -6
- pulumi_oci/generativeai/get_models.py +6 -0
- pulumi_oci/generativeai/outputs.py +228 -16
- pulumi_oci/identity/__init__.py +3 -0
- pulumi_oci/identity/_inputs.py +1029 -0
- pulumi_oci/identity/domains_social_identity_provider.py +4628 -0
- pulumi_oci/identity/get_domains_social_identity_provider.py +664 -0
- pulumi_oci/identity/get_domains_social_identity_providers.py +276 -0
- pulumi_oci/identity/outputs.py +19544 -17378
- pulumi_oci/networkfirewall/__init__.py +3 -0
- pulumi_oci/networkfirewall/_inputs.py +150 -0
- pulumi_oci/networkfirewall/get_network_firewall_policy_tunnel_inspection_rule.py +227 -0
- pulumi_oci/networkfirewall/get_network_firewall_policy_tunnel_inspection_rules.py +167 -0
- pulumi_oci/networkfirewall/network_firewall_policy_tunnel_inspection_rule.py +605 -0
- pulumi_oci/networkfirewall/outputs.py +457 -0
- pulumi_oci/pulumi-plugin.json +1 -1
- pulumi_oci/redis/get_redis_cluster.py +1 -1
- pulumi_oci/redis/outputs.py +2 -2
- pulumi_oci/redis/redis_cluster.py +7 -7
- pulumi_oci/stackmonitoring/_inputs.py +2 -2
- pulumi_oci/stackmonitoring/baselineable_metric.py +76 -28
- pulumi_oci/stackmonitoring/get_baselineable_metric.py +14 -1
- pulumi_oci/stackmonitoring/get_baselineable_metrics.py +45 -5
- pulumi_oci/stackmonitoring/outputs.py +19 -8
- {pulumi_oci-2.4.0a1721933648.dist-info → pulumi_oci-2.5.0.dist-info}/METADATA +1 -1
- {pulumi_oci-2.4.0a1721933648.dist-info → pulumi_oci-2.5.0.dist-info}/RECORD +73 -57
- {pulumi_oci-2.4.0a1721933648.dist-info → pulumi_oci-2.5.0.dist-info}/WHEEL +1 -1
- pulumi_oci/datasafe/masking_policy_health_report_management.py +0 -453
- pulumi_oci/datasafe/masking_report_management.py +0 -693
- pulumi_oci/datasafe/set_security_assessment_baseline_management.py +0 -304
- pulumi_oci/datasafe/set_user_assessment_baseline_management.py +0 -304
- {pulumi_oci-2.4.0a1721933648.dist-info → pulumi_oci-2.5.0.dist-info}/top_level.txt +0 -0
@@ -26,6 +26,8 @@ from .get_network_firewall_policy_service import *
|
|
26
26
|
from .get_network_firewall_policy_service_list import *
|
27
27
|
from .get_network_firewall_policy_service_lists import *
|
28
28
|
from .get_network_firewall_policy_services import *
|
29
|
+
from .get_network_firewall_policy_tunnel_inspection_rule import *
|
30
|
+
from .get_network_firewall_policy_tunnel_inspection_rules import *
|
29
31
|
from .get_network_firewall_policy_url_list import *
|
30
32
|
from .get_network_firewall_policy_url_lists import *
|
31
33
|
from .get_network_firewalls import *
|
@@ -40,6 +42,7 @@ from .network_firewall_policy_mapped_secret import *
|
|
40
42
|
from .network_firewall_policy_security_rule import *
|
41
43
|
from .network_firewall_policy_service import *
|
42
44
|
from .network_firewall_policy_service_list import *
|
45
|
+
from .network_firewall_policy_tunnel_inspection_rule import *
|
43
46
|
from .network_firewall_policy_url_list import *
|
44
47
|
from ._inputs import *
|
45
48
|
from . import outputs
|
@@ -15,6 +15,9 @@ __all__ = [
|
|
15
15
|
'NetworkFirewallPolicySecurityRuleConditionArgs',
|
16
16
|
'NetworkFirewallPolicySecurityRulePositionArgs',
|
17
17
|
'NetworkFirewallPolicyServicePortRangeArgs',
|
18
|
+
'NetworkFirewallPolicyTunnelInspectionRuleConditionArgs',
|
19
|
+
'NetworkFirewallPolicyTunnelInspectionRulePositionArgs',
|
20
|
+
'NetworkFirewallPolicyTunnelInspectionRuleProfileArgs',
|
18
21
|
'NetworkFirewallPolicyUrlListUrlArgs',
|
19
22
|
'GetNetworkFirewallPoliciesFilterArgs',
|
20
23
|
'GetNetworkFirewallPolicyAddressListsFilterArgs',
|
@@ -25,6 +28,7 @@ __all__ = [
|
|
25
28
|
'GetNetworkFirewallPolicySecurityRulesFilterArgs',
|
26
29
|
'GetNetworkFirewallPolicyServiceListsFilterArgs',
|
27
30
|
'GetNetworkFirewallPolicyServicesFilterArgs',
|
31
|
+
'GetNetworkFirewallPolicyTunnelInspectionRulesFilterArgs',
|
28
32
|
'GetNetworkFirewallPolicyUrlListsFilterArgs',
|
29
33
|
'GetNetworkFirewallsFilterArgs',
|
30
34
|
]
|
@@ -287,6 +291,107 @@ class NetworkFirewallPolicyServicePortRangeArgs:
|
|
287
291
|
pulumi.set(self, "maximum_port", value)
|
288
292
|
|
289
293
|
|
294
|
+
@pulumi.input_type
|
295
|
+
class NetworkFirewallPolicyTunnelInspectionRuleConditionArgs:
|
296
|
+
def __init__(__self__, *,
|
297
|
+
destination_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
298
|
+
source_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
299
|
+
"""
|
300
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] destination_addresses: (Updatable) An array of address list names to be evaluated against the traffic destination address.
|
301
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] source_addresses: (Updatable) An array of address list names to be evaluated against the traffic source address.
|
302
|
+
"""
|
303
|
+
if destination_addresses is not None:
|
304
|
+
pulumi.set(__self__, "destination_addresses", destination_addresses)
|
305
|
+
if source_addresses is not None:
|
306
|
+
pulumi.set(__self__, "source_addresses", source_addresses)
|
307
|
+
|
308
|
+
@property
|
309
|
+
@pulumi.getter(name="destinationAddresses")
|
310
|
+
def destination_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
311
|
+
"""
|
312
|
+
(Updatable) An array of address list names to be evaluated against the traffic destination address.
|
313
|
+
"""
|
314
|
+
return pulumi.get(self, "destination_addresses")
|
315
|
+
|
316
|
+
@destination_addresses.setter
|
317
|
+
def destination_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
318
|
+
pulumi.set(self, "destination_addresses", value)
|
319
|
+
|
320
|
+
@property
|
321
|
+
@pulumi.getter(name="sourceAddresses")
|
322
|
+
def source_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
323
|
+
"""
|
324
|
+
(Updatable) An array of address list names to be evaluated against the traffic source address.
|
325
|
+
"""
|
326
|
+
return pulumi.get(self, "source_addresses")
|
327
|
+
|
328
|
+
@source_addresses.setter
|
329
|
+
def source_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
330
|
+
pulumi.set(self, "source_addresses", value)
|
331
|
+
|
332
|
+
|
333
|
+
@pulumi.input_type
|
334
|
+
class NetworkFirewallPolicyTunnelInspectionRulePositionArgs:
|
335
|
+
def __init__(__self__, *,
|
336
|
+
after_rule: Optional[pulumi.Input[str]] = None,
|
337
|
+
before_rule: Optional[pulumi.Input[str]] = None):
|
338
|
+
"""
|
339
|
+
:param pulumi.Input[str] after_rule: (Updatable) Identifier for rule after which this rule lies.
|
340
|
+
:param pulumi.Input[str] before_rule: (Updatable) Identifier for rule before which this rule lies.
|
341
|
+
"""
|
342
|
+
if after_rule is not None:
|
343
|
+
pulumi.set(__self__, "after_rule", after_rule)
|
344
|
+
if before_rule is not None:
|
345
|
+
pulumi.set(__self__, "before_rule", before_rule)
|
346
|
+
|
347
|
+
@property
|
348
|
+
@pulumi.getter(name="afterRule")
|
349
|
+
def after_rule(self) -> Optional[pulumi.Input[str]]:
|
350
|
+
"""
|
351
|
+
(Updatable) Identifier for rule after which this rule lies.
|
352
|
+
"""
|
353
|
+
return pulumi.get(self, "after_rule")
|
354
|
+
|
355
|
+
@after_rule.setter
|
356
|
+
def after_rule(self, value: Optional[pulumi.Input[str]]):
|
357
|
+
pulumi.set(self, "after_rule", value)
|
358
|
+
|
359
|
+
@property
|
360
|
+
@pulumi.getter(name="beforeRule")
|
361
|
+
def before_rule(self) -> Optional[pulumi.Input[str]]:
|
362
|
+
"""
|
363
|
+
(Updatable) Identifier for rule before which this rule lies.
|
364
|
+
"""
|
365
|
+
return pulumi.get(self, "before_rule")
|
366
|
+
|
367
|
+
@before_rule.setter
|
368
|
+
def before_rule(self, value: Optional[pulumi.Input[str]]):
|
369
|
+
pulumi.set(self, "before_rule", value)
|
370
|
+
|
371
|
+
|
372
|
+
@pulumi.input_type
|
373
|
+
class NetworkFirewallPolicyTunnelInspectionRuleProfileArgs:
|
374
|
+
def __init__(__self__, *,
|
375
|
+
must_return_traffic_to_source: Optional[pulumi.Input[bool]] = None):
|
376
|
+
"""
|
377
|
+
:param pulumi.Input[bool] must_return_traffic_to_source: (Updatable) Return scanned VXLAN tunnel traffic to source.
|
378
|
+
"""
|
379
|
+
if must_return_traffic_to_source is not None:
|
380
|
+
pulumi.set(__self__, "must_return_traffic_to_source", must_return_traffic_to_source)
|
381
|
+
|
382
|
+
@property
|
383
|
+
@pulumi.getter(name="mustReturnTrafficToSource")
|
384
|
+
def must_return_traffic_to_source(self) -> Optional[pulumi.Input[bool]]:
|
385
|
+
"""
|
386
|
+
(Updatable) Return scanned VXLAN tunnel traffic to source.
|
387
|
+
"""
|
388
|
+
return pulumi.get(self, "must_return_traffic_to_source")
|
389
|
+
|
390
|
+
@must_return_traffic_to_source.setter
|
391
|
+
def must_return_traffic_to_source(self, value: Optional[pulumi.Input[bool]]):
|
392
|
+
pulumi.set(self, "must_return_traffic_to_source", value)
|
393
|
+
|
394
|
+
|
290
395
|
@pulumi.input_type
|
291
396
|
class NetworkFirewallPolicyUrlListUrlArgs:
|
292
397
|
def __init__(__self__, *,
|
@@ -733,6 +838,51 @@ class GetNetworkFirewallPolicyServicesFilterArgs:
|
|
733
838
|
pulumi.set(self, "regex", value)
|
734
839
|
|
735
840
|
|
841
|
+
@pulumi.input_type
|
842
|
+
class GetNetworkFirewallPolicyTunnelInspectionRulesFilterArgs:
|
843
|
+
def __init__(__self__, *,
|
844
|
+
name: str,
|
845
|
+
values: Sequence[str],
|
846
|
+
regex: Optional[bool] = None):
|
847
|
+
"""
|
848
|
+
:param str name: Name for the Tunnel Inspection Rule, must be unique within the policy.
|
849
|
+
"""
|
850
|
+
pulumi.set(__self__, "name", name)
|
851
|
+
pulumi.set(__self__, "values", values)
|
852
|
+
if regex is not None:
|
853
|
+
pulumi.set(__self__, "regex", regex)
|
854
|
+
|
855
|
+
@property
|
856
|
+
@pulumi.getter
|
857
|
+
def name(self) -> str:
|
858
|
+
"""
|
859
|
+
Name for the Tunnel Inspection Rule, must be unique within the policy.
|
860
|
+
"""
|
861
|
+
return pulumi.get(self, "name")
|
862
|
+
|
863
|
+
@name.setter
|
864
|
+
def name(self, value: str):
|
865
|
+
pulumi.set(self, "name", value)
|
866
|
+
|
867
|
+
@property
|
868
|
+
@pulumi.getter
|
869
|
+
def values(self) -> Sequence[str]:
|
870
|
+
return pulumi.get(self, "values")
|
871
|
+
|
872
|
+
@values.setter
|
873
|
+
def values(self, value: Sequence[str]):
|
874
|
+
pulumi.set(self, "values", value)
|
875
|
+
|
876
|
+
@property
|
877
|
+
@pulumi.getter
|
878
|
+
def regex(self) -> Optional[bool]:
|
879
|
+
return pulumi.get(self, "regex")
|
880
|
+
|
881
|
+
@regex.setter
|
882
|
+
def regex(self, value: Optional[bool]):
|
883
|
+
pulumi.set(self, "regex", value)
|
884
|
+
|
885
|
+
|
736
886
|
@pulumi.input_type
|
737
887
|
class GetNetworkFirewallPolicyUrlListsFilterArgs:
|
738
888
|
def __init__(__self__, *,
|
@@ -0,0 +1,227 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import pulumi
|
8
|
+
import pulumi.runtime
|
9
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
10
|
+
from .. import _utilities
|
11
|
+
from . import outputs
|
12
|
+
|
13
|
+
__all__ = [
|
14
|
+
'GetNetworkFirewallPolicyTunnelInspectionRuleResult',
|
15
|
+
'AwaitableGetNetworkFirewallPolicyTunnelInspectionRuleResult',
|
16
|
+
'get_network_firewall_policy_tunnel_inspection_rule',
|
17
|
+
'get_network_firewall_policy_tunnel_inspection_rule_output',
|
18
|
+
]
|
19
|
+
|
20
|
+
@pulumi.output_type
|
21
|
+
class GetNetworkFirewallPolicyTunnelInspectionRuleResult:
|
22
|
+
"""
|
23
|
+
A collection of values returned by getNetworkFirewallPolicyTunnelInspectionRule.
|
24
|
+
"""
|
25
|
+
def __init__(__self__, action=None, conditions=None, id=None, name=None, network_firewall_policy_id=None, parent_resource_id=None, positions=None, priority_order=None, profiles=None, protocol=None, tunnel_inspection_rule_name=None):
|
26
|
+
if action and not isinstance(action, str):
|
27
|
+
raise TypeError("Expected argument 'action' to be a str")
|
28
|
+
pulumi.set(__self__, "action", action)
|
29
|
+
if conditions and not isinstance(conditions, list):
|
30
|
+
raise TypeError("Expected argument 'conditions' to be a list")
|
31
|
+
pulumi.set(__self__, "conditions", conditions)
|
32
|
+
if id and not isinstance(id, str):
|
33
|
+
raise TypeError("Expected argument 'id' to be a str")
|
34
|
+
pulumi.set(__self__, "id", id)
|
35
|
+
if name and not isinstance(name, str):
|
36
|
+
raise TypeError("Expected argument 'name' to be a str")
|
37
|
+
pulumi.set(__self__, "name", name)
|
38
|
+
if network_firewall_policy_id and not isinstance(network_firewall_policy_id, str):
|
39
|
+
raise TypeError("Expected argument 'network_firewall_policy_id' to be a str")
|
40
|
+
pulumi.set(__self__, "network_firewall_policy_id", network_firewall_policy_id)
|
41
|
+
if parent_resource_id and not isinstance(parent_resource_id, str):
|
42
|
+
raise TypeError("Expected argument 'parent_resource_id' to be a str")
|
43
|
+
pulumi.set(__self__, "parent_resource_id", parent_resource_id)
|
44
|
+
if positions and not isinstance(positions, list):
|
45
|
+
raise TypeError("Expected argument 'positions' to be a list")
|
46
|
+
pulumi.set(__self__, "positions", positions)
|
47
|
+
if priority_order and not isinstance(priority_order, str):
|
48
|
+
raise TypeError("Expected argument 'priority_order' to be a str")
|
49
|
+
pulumi.set(__self__, "priority_order", priority_order)
|
50
|
+
if profiles and not isinstance(profiles, list):
|
51
|
+
raise TypeError("Expected argument 'profiles' to be a list")
|
52
|
+
pulumi.set(__self__, "profiles", profiles)
|
53
|
+
if protocol and not isinstance(protocol, str):
|
54
|
+
raise TypeError("Expected argument 'protocol' to be a str")
|
55
|
+
pulumi.set(__self__, "protocol", protocol)
|
56
|
+
if tunnel_inspection_rule_name and not isinstance(tunnel_inspection_rule_name, str):
|
57
|
+
raise TypeError("Expected argument 'tunnel_inspection_rule_name' to be a str")
|
58
|
+
pulumi.set(__self__, "tunnel_inspection_rule_name", tunnel_inspection_rule_name)
|
59
|
+
|
60
|
+
@property
|
61
|
+
@pulumi.getter
|
62
|
+
def action(self) -> str:
|
63
|
+
"""
|
64
|
+
Types of Inspect Action on the Traffic flow.
|
65
|
+
* INSPECT - Inspect the traffic.
|
66
|
+
* INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
|
67
|
+
"""
|
68
|
+
return pulumi.get(self, "action")
|
69
|
+
|
70
|
+
@property
|
71
|
+
@pulumi.getter
|
72
|
+
def conditions(self) -> Sequence['outputs.GetNetworkFirewallPolicyTunnelInspectionRuleConditionResult']:
|
73
|
+
"""
|
74
|
+
Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
|
75
|
+
"""
|
76
|
+
return pulumi.get(self, "conditions")
|
77
|
+
|
78
|
+
@property
|
79
|
+
@pulumi.getter
|
80
|
+
def id(self) -> str:
|
81
|
+
return pulumi.get(self, "id")
|
82
|
+
|
83
|
+
@property
|
84
|
+
@pulumi.getter
|
85
|
+
def name(self) -> str:
|
86
|
+
"""
|
87
|
+
Name for the Tunnel Inspection Rule, must be unique within the policy.
|
88
|
+
"""
|
89
|
+
return pulumi.get(self, "name")
|
90
|
+
|
91
|
+
@property
|
92
|
+
@pulumi.getter(name="networkFirewallPolicyId")
|
93
|
+
def network_firewall_policy_id(self) -> str:
|
94
|
+
return pulumi.get(self, "network_firewall_policy_id")
|
95
|
+
|
96
|
+
@property
|
97
|
+
@pulumi.getter(name="parentResourceId")
|
98
|
+
def parent_resource_id(self) -> str:
|
99
|
+
"""
|
100
|
+
OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
|
101
|
+
"""
|
102
|
+
return pulumi.get(self, "parent_resource_id")
|
103
|
+
|
104
|
+
@property
|
105
|
+
@pulumi.getter
|
106
|
+
def positions(self) -> Sequence['outputs.GetNetworkFirewallPolicyTunnelInspectionRulePositionResult']:
|
107
|
+
"""
|
108
|
+
An object which defines the position of the rule.
|
109
|
+
"""
|
110
|
+
return pulumi.get(self, "positions")
|
111
|
+
|
112
|
+
@property
|
113
|
+
@pulumi.getter(name="priorityOrder")
|
114
|
+
def priority_order(self) -> str:
|
115
|
+
"""
|
116
|
+
The priority order in which this rule should be evaluated
|
117
|
+
"""
|
118
|
+
return pulumi.get(self, "priority_order")
|
119
|
+
|
120
|
+
@property
|
121
|
+
@pulumi.getter
|
122
|
+
def profiles(self) -> Sequence['outputs.GetNetworkFirewallPolicyTunnelInspectionRuleProfileResult']:
|
123
|
+
"""
|
124
|
+
Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
|
125
|
+
"""
|
126
|
+
return pulumi.get(self, "profiles")
|
127
|
+
|
128
|
+
@property
|
129
|
+
@pulumi.getter
|
130
|
+
def protocol(self) -> str:
|
131
|
+
"""
|
132
|
+
Types of Tunnel Inspection Protocol to be applied on the traffic.
|
133
|
+
* VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
|
134
|
+
"""
|
135
|
+
return pulumi.get(self, "protocol")
|
136
|
+
|
137
|
+
@property
|
138
|
+
@pulumi.getter(name="tunnelInspectionRuleName")
|
139
|
+
def tunnel_inspection_rule_name(self) -> str:
|
140
|
+
return pulumi.get(self, "tunnel_inspection_rule_name")
|
141
|
+
|
142
|
+
|
143
|
+
class AwaitableGetNetworkFirewallPolicyTunnelInspectionRuleResult(GetNetworkFirewallPolicyTunnelInspectionRuleResult):
|
144
|
+
# pylint: disable=using-constant-test
|
145
|
+
def __await__(self):
|
146
|
+
if False:
|
147
|
+
yield self
|
148
|
+
return GetNetworkFirewallPolicyTunnelInspectionRuleResult(
|
149
|
+
action=self.action,
|
150
|
+
conditions=self.conditions,
|
151
|
+
id=self.id,
|
152
|
+
name=self.name,
|
153
|
+
network_firewall_policy_id=self.network_firewall_policy_id,
|
154
|
+
parent_resource_id=self.parent_resource_id,
|
155
|
+
positions=self.positions,
|
156
|
+
priority_order=self.priority_order,
|
157
|
+
profiles=self.profiles,
|
158
|
+
protocol=self.protocol,
|
159
|
+
tunnel_inspection_rule_name=self.tunnel_inspection_rule_name)
|
160
|
+
|
161
|
+
|
162
|
+
def get_network_firewall_policy_tunnel_inspection_rule(network_firewall_policy_id: Optional[str] = None,
|
163
|
+
tunnel_inspection_rule_name: Optional[str] = None,
|
164
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetNetworkFirewallPolicyTunnelInspectionRuleResult:
|
165
|
+
"""
|
166
|
+
This data source provides details about a specific Network Firewall Policy Tunnel Inspection Rule resource in Oracle Cloud Infrastructure Network Firewall service.
|
167
|
+
|
168
|
+
Get tunnel inspection rule by the given name in the context of network firewall policy.
|
169
|
+
|
170
|
+
## Example Usage
|
171
|
+
|
172
|
+
```python
|
173
|
+
import pulumi
|
174
|
+
import pulumi_oci as oci
|
175
|
+
|
176
|
+
test_network_firewall_policy_tunnel_inspection_rule = oci.NetworkFirewall.get_network_firewall_policy_tunnel_inspection_rule(network_firewall_policy_id=test_network_firewall_policy["id"],
|
177
|
+
tunnel_inspection_rule_name=test_rule["name"])
|
178
|
+
```
|
179
|
+
|
180
|
+
|
181
|
+
:param str network_firewall_policy_id: Unique Network Firewall Policy identifier
|
182
|
+
:param str tunnel_inspection_rule_name: Unique identifier for Tunnel Inspection Rules in the network firewall policy.
|
183
|
+
"""
|
184
|
+
__args__ = dict()
|
185
|
+
__args__['networkFirewallPolicyId'] = network_firewall_policy_id
|
186
|
+
__args__['tunnelInspectionRuleName'] = tunnel_inspection_rule_name
|
187
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
188
|
+
__ret__ = pulumi.runtime.invoke('oci:NetworkFirewall/getNetworkFirewallPolicyTunnelInspectionRule:getNetworkFirewallPolicyTunnelInspectionRule', __args__, opts=opts, typ=GetNetworkFirewallPolicyTunnelInspectionRuleResult).value
|
189
|
+
|
190
|
+
return AwaitableGetNetworkFirewallPolicyTunnelInspectionRuleResult(
|
191
|
+
action=pulumi.get(__ret__, 'action'),
|
192
|
+
conditions=pulumi.get(__ret__, 'conditions'),
|
193
|
+
id=pulumi.get(__ret__, 'id'),
|
194
|
+
name=pulumi.get(__ret__, 'name'),
|
195
|
+
network_firewall_policy_id=pulumi.get(__ret__, 'network_firewall_policy_id'),
|
196
|
+
parent_resource_id=pulumi.get(__ret__, 'parent_resource_id'),
|
197
|
+
positions=pulumi.get(__ret__, 'positions'),
|
198
|
+
priority_order=pulumi.get(__ret__, 'priority_order'),
|
199
|
+
profiles=pulumi.get(__ret__, 'profiles'),
|
200
|
+
protocol=pulumi.get(__ret__, 'protocol'),
|
201
|
+
tunnel_inspection_rule_name=pulumi.get(__ret__, 'tunnel_inspection_rule_name'))
|
202
|
+
|
203
|
+
|
204
|
+
@_utilities.lift_output_func(get_network_firewall_policy_tunnel_inspection_rule)
|
205
|
+
def get_network_firewall_policy_tunnel_inspection_rule_output(network_firewall_policy_id: Optional[pulumi.Input[str]] = None,
|
206
|
+
tunnel_inspection_rule_name: Optional[pulumi.Input[str]] = None,
|
207
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNetworkFirewallPolicyTunnelInspectionRuleResult]:
|
208
|
+
"""
|
209
|
+
This data source provides details about a specific Network Firewall Policy Tunnel Inspection Rule resource in Oracle Cloud Infrastructure Network Firewall service.
|
210
|
+
|
211
|
+
Get tunnel inspection rule by the given name in the context of network firewall policy.
|
212
|
+
|
213
|
+
## Example Usage
|
214
|
+
|
215
|
+
```python
|
216
|
+
import pulumi
|
217
|
+
import pulumi_oci as oci
|
218
|
+
|
219
|
+
test_network_firewall_policy_tunnel_inspection_rule = oci.NetworkFirewall.get_network_firewall_policy_tunnel_inspection_rule(network_firewall_policy_id=test_network_firewall_policy["id"],
|
220
|
+
tunnel_inspection_rule_name=test_rule["name"])
|
221
|
+
```
|
222
|
+
|
223
|
+
|
224
|
+
:param str network_firewall_policy_id: Unique Network Firewall Policy identifier
|
225
|
+
:param str tunnel_inspection_rule_name: Unique identifier for Tunnel Inspection Rules in the network firewall policy.
|
226
|
+
"""
|
227
|
+
...
|
@@ -0,0 +1,167 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import pulumi
|
8
|
+
import pulumi.runtime
|
9
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
10
|
+
from .. import _utilities
|
11
|
+
from . import outputs
|
12
|
+
from ._inputs import *
|
13
|
+
|
14
|
+
__all__ = [
|
15
|
+
'GetNetworkFirewallPolicyTunnelInspectionRulesResult',
|
16
|
+
'AwaitableGetNetworkFirewallPolicyTunnelInspectionRulesResult',
|
17
|
+
'get_network_firewall_policy_tunnel_inspection_rules',
|
18
|
+
'get_network_firewall_policy_tunnel_inspection_rules_output',
|
19
|
+
]
|
20
|
+
|
21
|
+
@pulumi.output_type
|
22
|
+
class GetNetworkFirewallPolicyTunnelInspectionRulesResult:
|
23
|
+
"""
|
24
|
+
A collection of values returned by getNetworkFirewallPolicyTunnelInspectionRules.
|
25
|
+
"""
|
26
|
+
def __init__(__self__, display_name=None, filters=None, id=None, network_firewall_policy_id=None, tunnel_inspection_rule_priority_order=None, tunnel_inspection_rule_summary_collections=None):
|
27
|
+
if display_name and not isinstance(display_name, str):
|
28
|
+
raise TypeError("Expected argument 'display_name' to be a str")
|
29
|
+
pulumi.set(__self__, "display_name", display_name)
|
30
|
+
if filters and not isinstance(filters, list):
|
31
|
+
raise TypeError("Expected argument 'filters' to be a list")
|
32
|
+
pulumi.set(__self__, "filters", filters)
|
33
|
+
if id and not isinstance(id, str):
|
34
|
+
raise TypeError("Expected argument 'id' to be a str")
|
35
|
+
pulumi.set(__self__, "id", id)
|
36
|
+
if network_firewall_policy_id and not isinstance(network_firewall_policy_id, str):
|
37
|
+
raise TypeError("Expected argument 'network_firewall_policy_id' to be a str")
|
38
|
+
pulumi.set(__self__, "network_firewall_policy_id", network_firewall_policy_id)
|
39
|
+
if tunnel_inspection_rule_priority_order and not isinstance(tunnel_inspection_rule_priority_order, int):
|
40
|
+
raise TypeError("Expected argument 'tunnel_inspection_rule_priority_order' to be a int")
|
41
|
+
pulumi.set(__self__, "tunnel_inspection_rule_priority_order", tunnel_inspection_rule_priority_order)
|
42
|
+
if tunnel_inspection_rule_summary_collections and not isinstance(tunnel_inspection_rule_summary_collections, list):
|
43
|
+
raise TypeError("Expected argument 'tunnel_inspection_rule_summary_collections' to be a list")
|
44
|
+
pulumi.set(__self__, "tunnel_inspection_rule_summary_collections", tunnel_inspection_rule_summary_collections)
|
45
|
+
|
46
|
+
@property
|
47
|
+
@pulumi.getter(name="displayName")
|
48
|
+
def display_name(self) -> Optional[str]:
|
49
|
+
return pulumi.get(self, "display_name")
|
50
|
+
|
51
|
+
@property
|
52
|
+
@pulumi.getter
|
53
|
+
def filters(self) -> Optional[Sequence['outputs.GetNetworkFirewallPolicyTunnelInspectionRulesFilterResult']]:
|
54
|
+
return pulumi.get(self, "filters")
|
55
|
+
|
56
|
+
@property
|
57
|
+
@pulumi.getter
|
58
|
+
def id(self) -> str:
|
59
|
+
"""
|
60
|
+
The provider-assigned unique ID for this managed resource.
|
61
|
+
"""
|
62
|
+
return pulumi.get(self, "id")
|
63
|
+
|
64
|
+
@property
|
65
|
+
@pulumi.getter(name="networkFirewallPolicyId")
|
66
|
+
def network_firewall_policy_id(self) -> str:
|
67
|
+
return pulumi.get(self, "network_firewall_policy_id")
|
68
|
+
|
69
|
+
@property
|
70
|
+
@pulumi.getter(name="tunnelInspectionRulePriorityOrder")
|
71
|
+
def tunnel_inspection_rule_priority_order(self) -> Optional[int]:
|
72
|
+
return pulumi.get(self, "tunnel_inspection_rule_priority_order")
|
73
|
+
|
74
|
+
@property
|
75
|
+
@pulumi.getter(name="tunnelInspectionRuleSummaryCollections")
|
76
|
+
def tunnel_inspection_rule_summary_collections(self) -> Sequence['outputs.GetNetworkFirewallPolicyTunnelInspectionRulesTunnelInspectionRuleSummaryCollectionResult']:
|
77
|
+
"""
|
78
|
+
The list of tunnel_inspection_rule_summary_collection.
|
79
|
+
"""
|
80
|
+
return pulumi.get(self, "tunnel_inspection_rule_summary_collections")
|
81
|
+
|
82
|
+
|
83
|
+
class AwaitableGetNetworkFirewallPolicyTunnelInspectionRulesResult(GetNetworkFirewallPolicyTunnelInspectionRulesResult):
|
84
|
+
# pylint: disable=using-constant-test
|
85
|
+
def __await__(self):
|
86
|
+
if False:
|
87
|
+
yield self
|
88
|
+
return GetNetworkFirewallPolicyTunnelInspectionRulesResult(
|
89
|
+
display_name=self.display_name,
|
90
|
+
filters=self.filters,
|
91
|
+
id=self.id,
|
92
|
+
network_firewall_policy_id=self.network_firewall_policy_id,
|
93
|
+
tunnel_inspection_rule_priority_order=self.tunnel_inspection_rule_priority_order,
|
94
|
+
tunnel_inspection_rule_summary_collections=self.tunnel_inspection_rule_summary_collections)
|
95
|
+
|
96
|
+
|
97
|
+
def get_network_firewall_policy_tunnel_inspection_rules(display_name: Optional[str] = None,
|
98
|
+
filters: Optional[Sequence[pulumi.InputType['GetNetworkFirewallPolicyTunnelInspectionRulesFilterArgs']]] = None,
|
99
|
+
network_firewall_policy_id: Optional[str] = None,
|
100
|
+
tunnel_inspection_rule_priority_order: Optional[int] = None,
|
101
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetNetworkFirewallPolicyTunnelInspectionRulesResult:
|
102
|
+
"""
|
103
|
+
This data source provides the list of Network Firewall Policy Tunnel Inspection Rules in Oracle Cloud Infrastructure Network Firewall service.
|
104
|
+
|
105
|
+
Returns a list of tunnel inspection rules for the network firewall policy.
|
106
|
+
|
107
|
+
## Example Usage
|
108
|
+
|
109
|
+
```python
|
110
|
+
import pulumi
|
111
|
+
import pulumi_oci as oci
|
112
|
+
|
113
|
+
test_network_firewall_policy_tunnel_inspection_rules = oci.NetworkFirewall.get_network_firewall_policy_tunnel_inspection_rules(network_firewall_policy_id=test_network_firewall_policy["id"],
|
114
|
+
display_name=network_firewall_policy_tunnel_inspection_rule_display_name,
|
115
|
+
tunnel_inspection_rule_priority_order=network_firewall_policy_tunnel_inspection_rule_tunnel_inspection_rule_priority_order)
|
116
|
+
```
|
117
|
+
|
118
|
+
|
119
|
+
:param str display_name: A filter to return only resources that match the entire display name given.
|
120
|
+
:param str network_firewall_policy_id: Unique Network Firewall Policy identifier
|
121
|
+
:param int tunnel_inspection_rule_priority_order: Unique priority order for Tunnel Inspection rules in the network firewall policy.
|
122
|
+
"""
|
123
|
+
__args__ = dict()
|
124
|
+
__args__['displayName'] = display_name
|
125
|
+
__args__['filters'] = filters
|
126
|
+
__args__['networkFirewallPolicyId'] = network_firewall_policy_id
|
127
|
+
__args__['tunnelInspectionRulePriorityOrder'] = tunnel_inspection_rule_priority_order
|
128
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
129
|
+
__ret__ = pulumi.runtime.invoke('oci:NetworkFirewall/getNetworkFirewallPolicyTunnelInspectionRules:getNetworkFirewallPolicyTunnelInspectionRules', __args__, opts=opts, typ=GetNetworkFirewallPolicyTunnelInspectionRulesResult).value
|
130
|
+
|
131
|
+
return AwaitableGetNetworkFirewallPolicyTunnelInspectionRulesResult(
|
132
|
+
display_name=pulumi.get(__ret__, 'display_name'),
|
133
|
+
filters=pulumi.get(__ret__, 'filters'),
|
134
|
+
id=pulumi.get(__ret__, 'id'),
|
135
|
+
network_firewall_policy_id=pulumi.get(__ret__, 'network_firewall_policy_id'),
|
136
|
+
tunnel_inspection_rule_priority_order=pulumi.get(__ret__, 'tunnel_inspection_rule_priority_order'),
|
137
|
+
tunnel_inspection_rule_summary_collections=pulumi.get(__ret__, 'tunnel_inspection_rule_summary_collections'))
|
138
|
+
|
139
|
+
|
140
|
+
@_utilities.lift_output_func(get_network_firewall_policy_tunnel_inspection_rules)
|
141
|
+
def get_network_firewall_policy_tunnel_inspection_rules_output(display_name: Optional[pulumi.Input[Optional[str]]] = None,
|
142
|
+
filters: Optional[pulumi.Input[Optional[Sequence[pulumi.InputType['GetNetworkFirewallPolicyTunnelInspectionRulesFilterArgs']]]]] = None,
|
143
|
+
network_firewall_policy_id: Optional[pulumi.Input[str]] = None,
|
144
|
+
tunnel_inspection_rule_priority_order: Optional[pulumi.Input[Optional[int]]] = None,
|
145
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNetworkFirewallPolicyTunnelInspectionRulesResult]:
|
146
|
+
"""
|
147
|
+
This data source provides the list of Network Firewall Policy Tunnel Inspection Rules in Oracle Cloud Infrastructure Network Firewall service.
|
148
|
+
|
149
|
+
Returns a list of tunnel inspection rules for the network firewall policy.
|
150
|
+
|
151
|
+
## Example Usage
|
152
|
+
|
153
|
+
```python
|
154
|
+
import pulumi
|
155
|
+
import pulumi_oci as oci
|
156
|
+
|
157
|
+
test_network_firewall_policy_tunnel_inspection_rules = oci.NetworkFirewall.get_network_firewall_policy_tunnel_inspection_rules(network_firewall_policy_id=test_network_firewall_policy["id"],
|
158
|
+
display_name=network_firewall_policy_tunnel_inspection_rule_display_name,
|
159
|
+
tunnel_inspection_rule_priority_order=network_firewall_policy_tunnel_inspection_rule_tunnel_inspection_rule_priority_order)
|
160
|
+
```
|
161
|
+
|
162
|
+
|
163
|
+
:param str display_name: A filter to return only resources that match the entire display name given.
|
164
|
+
:param str network_firewall_policy_id: Unique Network Firewall Policy identifier
|
165
|
+
:param int tunnel_inspection_rule_priority_order: Unique priority order for Tunnel Inspection rules in the network firewall policy.
|
166
|
+
"""
|
167
|
+
...
|