pulumi-oci 2.5.0a1722062014__py3-none-any.whl → 2.6.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (129) hide show
  1. pulumi_oci/__init__.py +91 -32
  2. pulumi_oci/bigdataservice/_inputs.py +157 -14
  3. pulumi_oci/bigdataservice/bds_instance.py +175 -0
  4. pulumi_oci/bigdataservice/bds_instance_patch_action.py +64 -3
  5. pulumi_oci/bigdataservice/get_bds_instance.py +41 -1
  6. pulumi_oci/bigdataservice/outputs.py +264 -30
  7. pulumi_oci/core/__init__.py +3 -0
  8. pulumi_oci/core/_inputs.py +40 -0
  9. pulumi_oci/core/get_instance_maintenance_event.py +414 -0
  10. pulumi_oci/core/get_instance_maintenance_events.py +250 -0
  11. pulumi_oci/core/instance_maintenance_event.py +1022 -0
  12. pulumi_oci/core/outputs.py +314 -0
  13. pulumi_oci/database/autonomous_database.py +28 -0
  14. pulumi_oci/database/get_autonomous_database.py +14 -1
  15. pulumi_oci/database/outputs.py +22 -0
  16. pulumi_oci/databasemigration/_inputs.py +184 -0
  17. pulumi_oci/databasemigration/job.py +99 -24
  18. pulumi_oci/databasemigration/outputs.py +171 -0
  19. pulumi_oci/datasafe/__init__.py +2 -4
  20. pulumi_oci/datasafe/_inputs.py +55 -0
  21. pulumi_oci/datasafe/alert.py +56 -0
  22. pulumi_oci/datasafe/alert_policy.py +745 -0
  23. pulumi_oci/datasafe/alert_policy_rule.py +446 -0
  24. pulumi_oci/datasafe/get_alert.py +27 -1
  25. pulumi_oci/datasafe/get_alert_policy.py +26 -2
  26. pulumi_oci/datasafe/get_alert_policy_rule.py +94 -18
  27. pulumi_oci/datasafe/get_report.py +14 -1
  28. pulumi_oci/datasafe/get_report_definition.py +14 -1
  29. pulumi_oci/datasafe/get_target_alert_policy_association.py +15 -2
  30. pulumi_oci/datasafe/outputs.py +231 -27
  31. pulumi_oci/datasafe/report.py +28 -0
  32. pulumi_oci/datasafe/report_definition.py +28 -0
  33. pulumi_oci/datasafe/target_alert_policy_association.py +28 -0
  34. pulumi_oci/devops/__init__.py +6 -0
  35. pulumi_oci/devops/_inputs.py +531 -32
  36. pulumi_oci/devops/get_build_runs.py +0 -5
  37. pulumi_oci/devops/get_project_repository_setting.py +129 -0
  38. pulumi_oci/devops/get_repositories.py +1 -1
  39. pulumi_oci/devops/get_repository.py +17 -4
  40. pulumi_oci/devops/get_repository_diffs.py +20 -3
  41. pulumi_oci/devops/get_repository_protected_branches.py +150 -0
  42. pulumi_oci/devops/get_repository_ref.py +2 -2
  43. pulumi_oci/devops/get_repository_setting.py +142 -0
  44. pulumi_oci/devops/get_triggers.py +0 -5
  45. pulumi_oci/devops/outputs.py +1216 -180
  46. pulumi_oci/devops/project_repository_setting.py +338 -0
  47. pulumi_oci/devops/repository.py +66 -75
  48. pulumi_oci/devops/repository_protected_branch_management.py +333 -0
  49. pulumi_oci/devops/repository_ref.py +2 -2
  50. pulumi_oci/devops/repository_setting.py +391 -0
  51. pulumi_oci/fleetsoftwareupdate/__init__.py +15 -0
  52. pulumi_oci/fleetsoftwareupdate/_inputs.py +553 -0
  53. pulumi_oci/fleetsoftwareupdate/fsu_collection.py +514 -0
  54. pulumi_oci/fleetsoftwareupdate/fsu_cycle.py +812 -0
  55. pulumi_oci/fleetsoftwareupdate/get_fsu_collection.py +225 -0
  56. pulumi_oci/fleetsoftwareupdate/get_fsu_collections.py +141 -0
  57. pulumi_oci/fleetsoftwareupdate/get_fsu_cycle.py +325 -0
  58. pulumi_oci/fleetsoftwareupdate/get_fsu_cycles.py +167 -0
  59. pulumi_oci/fleetsoftwareupdate/outputs.py +1481 -0
  60. pulumi_oci/generativeai/get_dedicated_ai_cluster.py +3 -0
  61. pulumi_oci/generativeai/get_dedicated_ai_clusters.py +3 -0
  62. pulumi_oci/generativeai/get_endpoint.py +6 -9
  63. pulumi_oci/generativeai/get_endpoints.py +3 -3
  64. pulumi_oci/generativeai/get_model.py +36 -6
  65. pulumi_oci/generativeai/get_models.py +6 -0
  66. pulumi_oci/generativeai/outputs.py +228 -16
  67. pulumi_oci/identity/__init__.py +3 -0
  68. pulumi_oci/identity/_inputs.py +1029 -0
  69. pulumi_oci/identity/domains_social_identity_provider.py +4628 -0
  70. pulumi_oci/identity/get_domains_social_identity_provider.py +664 -0
  71. pulumi_oci/identity/get_domains_social_identity_providers.py +276 -0
  72. pulumi_oci/identity/outputs.py +19544 -17378
  73. pulumi_oci/jms/__init__.py +4 -0
  74. pulumi_oci/jms/_inputs.py +80 -0
  75. pulumi_oci/jms/get_agent_installers.py +190 -0
  76. pulumi_oci/jms/get_fleet_blocklists.py +2 -2
  77. pulumi_oci/jms/get_fleet_crypto_analysis_result.py +29 -3
  78. pulumi_oci/jms/get_fleet_crypto_analysis_results.py +97 -3
  79. pulumi_oci/jms/get_fleet_export_setting.py +3 -3
  80. pulumi_oci/jms/get_fleet_export_status.py +2 -2
  81. pulumi_oci/jms/get_fleet_java_migration_analysis_result.py +2 -2
  82. pulumi_oci/jms/get_fleet_java_migration_analysis_results.py +45 -5
  83. pulumi_oci/jms/get_fleet_performance_tuning_analysis_result.py +4 -4
  84. pulumi_oci/jms/get_fleet_performance_tuning_analysis_results.py +25 -5
  85. pulumi_oci/jms/get_fleets.py +2 -2
  86. pulumi_oci/jms/get_installation_site.py +4 -4
  87. pulumi_oci/jms/get_installation_sites.py +4 -4
  88. pulumi_oci/jms/get_java_downloads_java_download_tokens.py +2 -2
  89. pulumi_oci/jms/get_java_downloads_java_license_acceptance_records.py +2 -2
  90. pulumi_oci/jms/get_java_family.py +14 -1
  91. pulumi_oci/jms/get_jms_plugin.py +313 -0
  92. pulumi_oci/jms/get_jms_plugins.py +291 -0
  93. pulumi_oci/jms/jms_plugin.py +731 -0
  94. pulumi_oci/jms/outputs.py +488 -32
  95. pulumi_oci/networkfirewall/__init__.py +3 -0
  96. pulumi_oci/networkfirewall/_inputs.py +150 -0
  97. pulumi_oci/networkfirewall/get_network_firewall_policy_tunnel_inspection_rule.py +227 -0
  98. pulumi_oci/networkfirewall/get_network_firewall_policy_tunnel_inspection_rules.py +167 -0
  99. pulumi_oci/networkfirewall/network_firewall_policy_tunnel_inspection_rule.py +605 -0
  100. pulumi_oci/networkfirewall/outputs.py +457 -0
  101. pulumi_oci/osmanagementhub/get_software_source.py +19 -1
  102. pulumi_oci/osmanagementhub/software_source.py +82 -0
  103. pulumi_oci/psql/_inputs.py +8 -4
  104. pulumi_oci/psql/backup.py +4 -4
  105. pulumi_oci/psql/configuration.py +141 -38
  106. pulumi_oci/psql/db_system.py +53 -55
  107. pulumi_oci/psql/get_backup.py +1 -1
  108. pulumi_oci/psql/get_configuration.py +27 -1
  109. pulumi_oci/psql/get_configurations.py +2 -2
  110. pulumi_oci/psql/get_default_configuration.py +15 -2
  111. pulumi_oci/psql/get_default_configurations.py +2 -2
  112. pulumi_oci/psql/outputs.py +176 -13
  113. pulumi_oci/pulumi-plugin.json +1 -1
  114. pulumi_oci/redis/get_redis_cluster.py +1 -1
  115. pulumi_oci/redis/outputs.py +2 -2
  116. pulumi_oci/redis/redis_cluster.py +7 -7
  117. pulumi_oci/stackmonitoring/_inputs.py +2 -2
  118. pulumi_oci/stackmonitoring/baselineable_metric.py +76 -28
  119. pulumi_oci/stackmonitoring/get_baselineable_metric.py +14 -1
  120. pulumi_oci/stackmonitoring/get_baselineable_metrics.py +45 -5
  121. pulumi_oci/stackmonitoring/outputs.py +19 -8
  122. {pulumi_oci-2.5.0a1722062014.dist-info → pulumi_oci-2.6.0.dist-info}/METADATA +1 -1
  123. {pulumi_oci-2.5.0a1722062014.dist-info → pulumi_oci-2.6.0.dist-info}/RECORD +125 -99
  124. {pulumi_oci-2.5.0a1722062014.dist-info → pulumi_oci-2.6.0.dist-info}/WHEEL +1 -1
  125. pulumi_oci/datasafe/masking_policy_health_report_management.py +0 -453
  126. pulumi_oci/datasafe/masking_report_management.py +0 -693
  127. pulumi_oci/datasafe/set_security_assessment_baseline_management.py +0 -304
  128. pulumi_oci/datasafe/set_user_assessment_baseline_management.py +0 -304
  129. {pulumi_oci-2.5.0a1722062014.dist-info → pulumi_oci-2.6.0.dist-info}/top_level.txt +0 -0
@@ -26,6 +26,8 @@ from .get_network_firewall_policy_service import *
26
26
  from .get_network_firewall_policy_service_list import *
27
27
  from .get_network_firewall_policy_service_lists import *
28
28
  from .get_network_firewall_policy_services import *
29
+ from .get_network_firewall_policy_tunnel_inspection_rule import *
30
+ from .get_network_firewall_policy_tunnel_inspection_rules import *
29
31
  from .get_network_firewall_policy_url_list import *
30
32
  from .get_network_firewall_policy_url_lists import *
31
33
  from .get_network_firewalls import *
@@ -40,6 +42,7 @@ from .network_firewall_policy_mapped_secret import *
40
42
  from .network_firewall_policy_security_rule import *
41
43
  from .network_firewall_policy_service import *
42
44
  from .network_firewall_policy_service_list import *
45
+ from .network_firewall_policy_tunnel_inspection_rule import *
43
46
  from .network_firewall_policy_url_list import *
44
47
  from ._inputs import *
45
48
  from . import outputs
@@ -15,6 +15,9 @@ __all__ = [
15
15
  'NetworkFirewallPolicySecurityRuleConditionArgs',
16
16
  'NetworkFirewallPolicySecurityRulePositionArgs',
17
17
  'NetworkFirewallPolicyServicePortRangeArgs',
18
+ 'NetworkFirewallPolicyTunnelInspectionRuleConditionArgs',
19
+ 'NetworkFirewallPolicyTunnelInspectionRulePositionArgs',
20
+ 'NetworkFirewallPolicyTunnelInspectionRuleProfileArgs',
18
21
  'NetworkFirewallPolicyUrlListUrlArgs',
19
22
  'GetNetworkFirewallPoliciesFilterArgs',
20
23
  'GetNetworkFirewallPolicyAddressListsFilterArgs',
@@ -25,6 +28,7 @@ __all__ = [
25
28
  'GetNetworkFirewallPolicySecurityRulesFilterArgs',
26
29
  'GetNetworkFirewallPolicyServiceListsFilterArgs',
27
30
  'GetNetworkFirewallPolicyServicesFilterArgs',
31
+ 'GetNetworkFirewallPolicyTunnelInspectionRulesFilterArgs',
28
32
  'GetNetworkFirewallPolicyUrlListsFilterArgs',
29
33
  'GetNetworkFirewallsFilterArgs',
30
34
  ]
@@ -287,6 +291,107 @@ class NetworkFirewallPolicyServicePortRangeArgs:
287
291
  pulumi.set(self, "maximum_port", value)
288
292
 
289
293
 
294
+ @pulumi.input_type
295
+ class NetworkFirewallPolicyTunnelInspectionRuleConditionArgs:
296
+ def __init__(__self__, *,
297
+ destination_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
298
+ source_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
299
+ """
300
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] destination_addresses: (Updatable) An array of address list names to be evaluated against the traffic destination address.
301
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] source_addresses: (Updatable) An array of address list names to be evaluated against the traffic source address.
302
+ """
303
+ if destination_addresses is not None:
304
+ pulumi.set(__self__, "destination_addresses", destination_addresses)
305
+ if source_addresses is not None:
306
+ pulumi.set(__self__, "source_addresses", source_addresses)
307
+
308
+ @property
309
+ @pulumi.getter(name="destinationAddresses")
310
+ def destination_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
311
+ """
312
+ (Updatable) An array of address list names to be evaluated against the traffic destination address.
313
+ """
314
+ return pulumi.get(self, "destination_addresses")
315
+
316
+ @destination_addresses.setter
317
+ def destination_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
318
+ pulumi.set(self, "destination_addresses", value)
319
+
320
+ @property
321
+ @pulumi.getter(name="sourceAddresses")
322
+ def source_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
323
+ """
324
+ (Updatable) An array of address list names to be evaluated against the traffic source address.
325
+ """
326
+ return pulumi.get(self, "source_addresses")
327
+
328
+ @source_addresses.setter
329
+ def source_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
330
+ pulumi.set(self, "source_addresses", value)
331
+
332
+
333
+ @pulumi.input_type
334
+ class NetworkFirewallPolicyTunnelInspectionRulePositionArgs:
335
+ def __init__(__self__, *,
336
+ after_rule: Optional[pulumi.Input[str]] = None,
337
+ before_rule: Optional[pulumi.Input[str]] = None):
338
+ """
339
+ :param pulumi.Input[str] after_rule: (Updatable) Identifier for rule after which this rule lies.
340
+ :param pulumi.Input[str] before_rule: (Updatable) Identifier for rule before which this rule lies.
341
+ """
342
+ if after_rule is not None:
343
+ pulumi.set(__self__, "after_rule", after_rule)
344
+ if before_rule is not None:
345
+ pulumi.set(__self__, "before_rule", before_rule)
346
+
347
+ @property
348
+ @pulumi.getter(name="afterRule")
349
+ def after_rule(self) -> Optional[pulumi.Input[str]]:
350
+ """
351
+ (Updatable) Identifier for rule after which this rule lies.
352
+ """
353
+ return pulumi.get(self, "after_rule")
354
+
355
+ @after_rule.setter
356
+ def after_rule(self, value: Optional[pulumi.Input[str]]):
357
+ pulumi.set(self, "after_rule", value)
358
+
359
+ @property
360
+ @pulumi.getter(name="beforeRule")
361
+ def before_rule(self) -> Optional[pulumi.Input[str]]:
362
+ """
363
+ (Updatable) Identifier for rule before which this rule lies.
364
+ """
365
+ return pulumi.get(self, "before_rule")
366
+
367
+ @before_rule.setter
368
+ def before_rule(self, value: Optional[pulumi.Input[str]]):
369
+ pulumi.set(self, "before_rule", value)
370
+
371
+
372
+ @pulumi.input_type
373
+ class NetworkFirewallPolicyTunnelInspectionRuleProfileArgs:
374
+ def __init__(__self__, *,
375
+ must_return_traffic_to_source: Optional[pulumi.Input[bool]] = None):
376
+ """
377
+ :param pulumi.Input[bool] must_return_traffic_to_source: (Updatable) Return scanned VXLAN tunnel traffic to source.
378
+ """
379
+ if must_return_traffic_to_source is not None:
380
+ pulumi.set(__self__, "must_return_traffic_to_source", must_return_traffic_to_source)
381
+
382
+ @property
383
+ @pulumi.getter(name="mustReturnTrafficToSource")
384
+ def must_return_traffic_to_source(self) -> Optional[pulumi.Input[bool]]:
385
+ """
386
+ (Updatable) Return scanned VXLAN tunnel traffic to source.
387
+ """
388
+ return pulumi.get(self, "must_return_traffic_to_source")
389
+
390
+ @must_return_traffic_to_source.setter
391
+ def must_return_traffic_to_source(self, value: Optional[pulumi.Input[bool]]):
392
+ pulumi.set(self, "must_return_traffic_to_source", value)
393
+
394
+
290
395
  @pulumi.input_type
291
396
  class NetworkFirewallPolicyUrlListUrlArgs:
292
397
  def __init__(__self__, *,
@@ -733,6 +838,51 @@ class GetNetworkFirewallPolicyServicesFilterArgs:
733
838
  pulumi.set(self, "regex", value)
734
839
 
735
840
 
841
+ @pulumi.input_type
842
+ class GetNetworkFirewallPolicyTunnelInspectionRulesFilterArgs:
843
+ def __init__(__self__, *,
844
+ name: str,
845
+ values: Sequence[str],
846
+ regex: Optional[bool] = None):
847
+ """
848
+ :param str name: Name for the Tunnel Inspection Rule, must be unique within the policy.
849
+ """
850
+ pulumi.set(__self__, "name", name)
851
+ pulumi.set(__self__, "values", values)
852
+ if regex is not None:
853
+ pulumi.set(__self__, "regex", regex)
854
+
855
+ @property
856
+ @pulumi.getter
857
+ def name(self) -> str:
858
+ """
859
+ Name for the Tunnel Inspection Rule, must be unique within the policy.
860
+ """
861
+ return pulumi.get(self, "name")
862
+
863
+ @name.setter
864
+ def name(self, value: str):
865
+ pulumi.set(self, "name", value)
866
+
867
+ @property
868
+ @pulumi.getter
869
+ def values(self) -> Sequence[str]:
870
+ return pulumi.get(self, "values")
871
+
872
+ @values.setter
873
+ def values(self, value: Sequence[str]):
874
+ pulumi.set(self, "values", value)
875
+
876
+ @property
877
+ @pulumi.getter
878
+ def regex(self) -> Optional[bool]:
879
+ return pulumi.get(self, "regex")
880
+
881
+ @regex.setter
882
+ def regex(self, value: Optional[bool]):
883
+ pulumi.set(self, "regex", value)
884
+
885
+
736
886
  @pulumi.input_type
737
887
  class GetNetworkFirewallPolicyUrlListsFilterArgs:
738
888
  def __init__(__self__, *,
@@ -0,0 +1,227 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import pulumi
8
+ import pulumi.runtime
9
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
10
+ from .. import _utilities
11
+ from . import outputs
12
+
13
+ __all__ = [
14
+ 'GetNetworkFirewallPolicyTunnelInspectionRuleResult',
15
+ 'AwaitableGetNetworkFirewallPolicyTunnelInspectionRuleResult',
16
+ 'get_network_firewall_policy_tunnel_inspection_rule',
17
+ 'get_network_firewall_policy_tunnel_inspection_rule_output',
18
+ ]
19
+
20
+ @pulumi.output_type
21
+ class GetNetworkFirewallPolicyTunnelInspectionRuleResult:
22
+ """
23
+ A collection of values returned by getNetworkFirewallPolicyTunnelInspectionRule.
24
+ """
25
+ def __init__(__self__, action=None, conditions=None, id=None, name=None, network_firewall_policy_id=None, parent_resource_id=None, positions=None, priority_order=None, profiles=None, protocol=None, tunnel_inspection_rule_name=None):
26
+ if action and not isinstance(action, str):
27
+ raise TypeError("Expected argument 'action' to be a str")
28
+ pulumi.set(__self__, "action", action)
29
+ if conditions and not isinstance(conditions, list):
30
+ raise TypeError("Expected argument 'conditions' to be a list")
31
+ pulumi.set(__self__, "conditions", conditions)
32
+ if id and not isinstance(id, str):
33
+ raise TypeError("Expected argument 'id' to be a str")
34
+ pulumi.set(__self__, "id", id)
35
+ if name and not isinstance(name, str):
36
+ raise TypeError("Expected argument 'name' to be a str")
37
+ pulumi.set(__self__, "name", name)
38
+ if network_firewall_policy_id and not isinstance(network_firewall_policy_id, str):
39
+ raise TypeError("Expected argument 'network_firewall_policy_id' to be a str")
40
+ pulumi.set(__self__, "network_firewall_policy_id", network_firewall_policy_id)
41
+ if parent_resource_id and not isinstance(parent_resource_id, str):
42
+ raise TypeError("Expected argument 'parent_resource_id' to be a str")
43
+ pulumi.set(__self__, "parent_resource_id", parent_resource_id)
44
+ if positions and not isinstance(positions, list):
45
+ raise TypeError("Expected argument 'positions' to be a list")
46
+ pulumi.set(__self__, "positions", positions)
47
+ if priority_order and not isinstance(priority_order, str):
48
+ raise TypeError("Expected argument 'priority_order' to be a str")
49
+ pulumi.set(__self__, "priority_order", priority_order)
50
+ if profiles and not isinstance(profiles, list):
51
+ raise TypeError("Expected argument 'profiles' to be a list")
52
+ pulumi.set(__self__, "profiles", profiles)
53
+ if protocol and not isinstance(protocol, str):
54
+ raise TypeError("Expected argument 'protocol' to be a str")
55
+ pulumi.set(__self__, "protocol", protocol)
56
+ if tunnel_inspection_rule_name and not isinstance(tunnel_inspection_rule_name, str):
57
+ raise TypeError("Expected argument 'tunnel_inspection_rule_name' to be a str")
58
+ pulumi.set(__self__, "tunnel_inspection_rule_name", tunnel_inspection_rule_name)
59
+
60
+ @property
61
+ @pulumi.getter
62
+ def action(self) -> str:
63
+ """
64
+ Types of Inspect Action on the Traffic flow.
65
+ * INSPECT - Inspect the traffic.
66
+ * INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
67
+ """
68
+ return pulumi.get(self, "action")
69
+
70
+ @property
71
+ @pulumi.getter
72
+ def conditions(self) -> Sequence['outputs.GetNetworkFirewallPolicyTunnelInspectionRuleConditionResult']:
73
+ """
74
+ Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
75
+ """
76
+ return pulumi.get(self, "conditions")
77
+
78
+ @property
79
+ @pulumi.getter
80
+ def id(self) -> str:
81
+ return pulumi.get(self, "id")
82
+
83
+ @property
84
+ @pulumi.getter
85
+ def name(self) -> str:
86
+ """
87
+ Name for the Tunnel Inspection Rule, must be unique within the policy.
88
+ """
89
+ return pulumi.get(self, "name")
90
+
91
+ @property
92
+ @pulumi.getter(name="networkFirewallPolicyId")
93
+ def network_firewall_policy_id(self) -> str:
94
+ return pulumi.get(self, "network_firewall_policy_id")
95
+
96
+ @property
97
+ @pulumi.getter(name="parentResourceId")
98
+ def parent_resource_id(self) -> str:
99
+ """
100
+ OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
101
+ """
102
+ return pulumi.get(self, "parent_resource_id")
103
+
104
+ @property
105
+ @pulumi.getter
106
+ def positions(self) -> Sequence['outputs.GetNetworkFirewallPolicyTunnelInspectionRulePositionResult']:
107
+ """
108
+ An object which defines the position of the rule.
109
+ """
110
+ return pulumi.get(self, "positions")
111
+
112
+ @property
113
+ @pulumi.getter(name="priorityOrder")
114
+ def priority_order(self) -> str:
115
+ """
116
+ The priority order in which this rule should be evaluated
117
+ """
118
+ return pulumi.get(self, "priority_order")
119
+
120
+ @property
121
+ @pulumi.getter
122
+ def profiles(self) -> Sequence['outputs.GetNetworkFirewallPolicyTunnelInspectionRuleProfileResult']:
123
+ """
124
+ Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
125
+ """
126
+ return pulumi.get(self, "profiles")
127
+
128
+ @property
129
+ @pulumi.getter
130
+ def protocol(self) -> str:
131
+ """
132
+ Types of Tunnel Inspection Protocol to be applied on the traffic.
133
+ * VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
134
+ """
135
+ return pulumi.get(self, "protocol")
136
+
137
+ @property
138
+ @pulumi.getter(name="tunnelInspectionRuleName")
139
+ def tunnel_inspection_rule_name(self) -> str:
140
+ return pulumi.get(self, "tunnel_inspection_rule_name")
141
+
142
+
143
+ class AwaitableGetNetworkFirewallPolicyTunnelInspectionRuleResult(GetNetworkFirewallPolicyTunnelInspectionRuleResult):
144
+ # pylint: disable=using-constant-test
145
+ def __await__(self):
146
+ if False:
147
+ yield self
148
+ return GetNetworkFirewallPolicyTunnelInspectionRuleResult(
149
+ action=self.action,
150
+ conditions=self.conditions,
151
+ id=self.id,
152
+ name=self.name,
153
+ network_firewall_policy_id=self.network_firewall_policy_id,
154
+ parent_resource_id=self.parent_resource_id,
155
+ positions=self.positions,
156
+ priority_order=self.priority_order,
157
+ profiles=self.profiles,
158
+ protocol=self.protocol,
159
+ tunnel_inspection_rule_name=self.tunnel_inspection_rule_name)
160
+
161
+
162
+ def get_network_firewall_policy_tunnel_inspection_rule(network_firewall_policy_id: Optional[str] = None,
163
+ tunnel_inspection_rule_name: Optional[str] = None,
164
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetNetworkFirewallPolicyTunnelInspectionRuleResult:
165
+ """
166
+ This data source provides details about a specific Network Firewall Policy Tunnel Inspection Rule resource in Oracle Cloud Infrastructure Network Firewall service.
167
+
168
+ Get tunnel inspection rule by the given name in the context of network firewall policy.
169
+
170
+ ## Example Usage
171
+
172
+ ```python
173
+ import pulumi
174
+ import pulumi_oci as oci
175
+
176
+ test_network_firewall_policy_tunnel_inspection_rule = oci.NetworkFirewall.get_network_firewall_policy_tunnel_inspection_rule(network_firewall_policy_id=test_network_firewall_policy["id"],
177
+ tunnel_inspection_rule_name=test_rule["name"])
178
+ ```
179
+
180
+
181
+ :param str network_firewall_policy_id: Unique Network Firewall Policy identifier
182
+ :param str tunnel_inspection_rule_name: Unique identifier for Tunnel Inspection Rules in the network firewall policy.
183
+ """
184
+ __args__ = dict()
185
+ __args__['networkFirewallPolicyId'] = network_firewall_policy_id
186
+ __args__['tunnelInspectionRuleName'] = tunnel_inspection_rule_name
187
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
188
+ __ret__ = pulumi.runtime.invoke('oci:NetworkFirewall/getNetworkFirewallPolicyTunnelInspectionRule:getNetworkFirewallPolicyTunnelInspectionRule', __args__, opts=opts, typ=GetNetworkFirewallPolicyTunnelInspectionRuleResult).value
189
+
190
+ return AwaitableGetNetworkFirewallPolicyTunnelInspectionRuleResult(
191
+ action=pulumi.get(__ret__, 'action'),
192
+ conditions=pulumi.get(__ret__, 'conditions'),
193
+ id=pulumi.get(__ret__, 'id'),
194
+ name=pulumi.get(__ret__, 'name'),
195
+ network_firewall_policy_id=pulumi.get(__ret__, 'network_firewall_policy_id'),
196
+ parent_resource_id=pulumi.get(__ret__, 'parent_resource_id'),
197
+ positions=pulumi.get(__ret__, 'positions'),
198
+ priority_order=pulumi.get(__ret__, 'priority_order'),
199
+ profiles=pulumi.get(__ret__, 'profiles'),
200
+ protocol=pulumi.get(__ret__, 'protocol'),
201
+ tunnel_inspection_rule_name=pulumi.get(__ret__, 'tunnel_inspection_rule_name'))
202
+
203
+
204
+ @_utilities.lift_output_func(get_network_firewall_policy_tunnel_inspection_rule)
205
+ def get_network_firewall_policy_tunnel_inspection_rule_output(network_firewall_policy_id: Optional[pulumi.Input[str]] = None,
206
+ tunnel_inspection_rule_name: Optional[pulumi.Input[str]] = None,
207
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNetworkFirewallPolicyTunnelInspectionRuleResult]:
208
+ """
209
+ This data source provides details about a specific Network Firewall Policy Tunnel Inspection Rule resource in Oracle Cloud Infrastructure Network Firewall service.
210
+
211
+ Get tunnel inspection rule by the given name in the context of network firewall policy.
212
+
213
+ ## Example Usage
214
+
215
+ ```python
216
+ import pulumi
217
+ import pulumi_oci as oci
218
+
219
+ test_network_firewall_policy_tunnel_inspection_rule = oci.NetworkFirewall.get_network_firewall_policy_tunnel_inspection_rule(network_firewall_policy_id=test_network_firewall_policy["id"],
220
+ tunnel_inspection_rule_name=test_rule["name"])
221
+ ```
222
+
223
+
224
+ :param str network_firewall_policy_id: Unique Network Firewall Policy identifier
225
+ :param str tunnel_inspection_rule_name: Unique identifier for Tunnel Inspection Rules in the network firewall policy.
226
+ """
227
+ ...
@@ -0,0 +1,167 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import pulumi
8
+ import pulumi.runtime
9
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
10
+ from .. import _utilities
11
+ from . import outputs
12
+ from ._inputs import *
13
+
14
+ __all__ = [
15
+ 'GetNetworkFirewallPolicyTunnelInspectionRulesResult',
16
+ 'AwaitableGetNetworkFirewallPolicyTunnelInspectionRulesResult',
17
+ 'get_network_firewall_policy_tunnel_inspection_rules',
18
+ 'get_network_firewall_policy_tunnel_inspection_rules_output',
19
+ ]
20
+
21
+ @pulumi.output_type
22
+ class GetNetworkFirewallPolicyTunnelInspectionRulesResult:
23
+ """
24
+ A collection of values returned by getNetworkFirewallPolicyTunnelInspectionRules.
25
+ """
26
+ def __init__(__self__, display_name=None, filters=None, id=None, network_firewall_policy_id=None, tunnel_inspection_rule_priority_order=None, tunnel_inspection_rule_summary_collections=None):
27
+ if display_name and not isinstance(display_name, str):
28
+ raise TypeError("Expected argument 'display_name' to be a str")
29
+ pulumi.set(__self__, "display_name", display_name)
30
+ if filters and not isinstance(filters, list):
31
+ raise TypeError("Expected argument 'filters' to be a list")
32
+ pulumi.set(__self__, "filters", filters)
33
+ if id and not isinstance(id, str):
34
+ raise TypeError("Expected argument 'id' to be a str")
35
+ pulumi.set(__self__, "id", id)
36
+ if network_firewall_policy_id and not isinstance(network_firewall_policy_id, str):
37
+ raise TypeError("Expected argument 'network_firewall_policy_id' to be a str")
38
+ pulumi.set(__self__, "network_firewall_policy_id", network_firewall_policy_id)
39
+ if tunnel_inspection_rule_priority_order and not isinstance(tunnel_inspection_rule_priority_order, int):
40
+ raise TypeError("Expected argument 'tunnel_inspection_rule_priority_order' to be a int")
41
+ pulumi.set(__self__, "tunnel_inspection_rule_priority_order", tunnel_inspection_rule_priority_order)
42
+ if tunnel_inspection_rule_summary_collections and not isinstance(tunnel_inspection_rule_summary_collections, list):
43
+ raise TypeError("Expected argument 'tunnel_inspection_rule_summary_collections' to be a list")
44
+ pulumi.set(__self__, "tunnel_inspection_rule_summary_collections", tunnel_inspection_rule_summary_collections)
45
+
46
+ @property
47
+ @pulumi.getter(name="displayName")
48
+ def display_name(self) -> Optional[str]:
49
+ return pulumi.get(self, "display_name")
50
+
51
+ @property
52
+ @pulumi.getter
53
+ def filters(self) -> Optional[Sequence['outputs.GetNetworkFirewallPolicyTunnelInspectionRulesFilterResult']]:
54
+ return pulumi.get(self, "filters")
55
+
56
+ @property
57
+ @pulumi.getter
58
+ def id(self) -> str:
59
+ """
60
+ The provider-assigned unique ID for this managed resource.
61
+ """
62
+ return pulumi.get(self, "id")
63
+
64
+ @property
65
+ @pulumi.getter(name="networkFirewallPolicyId")
66
+ def network_firewall_policy_id(self) -> str:
67
+ return pulumi.get(self, "network_firewall_policy_id")
68
+
69
+ @property
70
+ @pulumi.getter(name="tunnelInspectionRulePriorityOrder")
71
+ def tunnel_inspection_rule_priority_order(self) -> Optional[int]:
72
+ return pulumi.get(self, "tunnel_inspection_rule_priority_order")
73
+
74
+ @property
75
+ @pulumi.getter(name="tunnelInspectionRuleSummaryCollections")
76
+ def tunnel_inspection_rule_summary_collections(self) -> Sequence['outputs.GetNetworkFirewallPolicyTunnelInspectionRulesTunnelInspectionRuleSummaryCollectionResult']:
77
+ """
78
+ The list of tunnel_inspection_rule_summary_collection.
79
+ """
80
+ return pulumi.get(self, "tunnel_inspection_rule_summary_collections")
81
+
82
+
83
+ class AwaitableGetNetworkFirewallPolicyTunnelInspectionRulesResult(GetNetworkFirewallPolicyTunnelInspectionRulesResult):
84
+ # pylint: disable=using-constant-test
85
+ def __await__(self):
86
+ if False:
87
+ yield self
88
+ return GetNetworkFirewallPolicyTunnelInspectionRulesResult(
89
+ display_name=self.display_name,
90
+ filters=self.filters,
91
+ id=self.id,
92
+ network_firewall_policy_id=self.network_firewall_policy_id,
93
+ tunnel_inspection_rule_priority_order=self.tunnel_inspection_rule_priority_order,
94
+ tunnel_inspection_rule_summary_collections=self.tunnel_inspection_rule_summary_collections)
95
+
96
+
97
+ def get_network_firewall_policy_tunnel_inspection_rules(display_name: Optional[str] = None,
98
+ filters: Optional[Sequence[pulumi.InputType['GetNetworkFirewallPolicyTunnelInspectionRulesFilterArgs']]] = None,
99
+ network_firewall_policy_id: Optional[str] = None,
100
+ tunnel_inspection_rule_priority_order: Optional[int] = None,
101
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetNetworkFirewallPolicyTunnelInspectionRulesResult:
102
+ """
103
+ This data source provides the list of Network Firewall Policy Tunnel Inspection Rules in Oracle Cloud Infrastructure Network Firewall service.
104
+
105
+ Returns a list of tunnel inspection rules for the network firewall policy.
106
+
107
+ ## Example Usage
108
+
109
+ ```python
110
+ import pulumi
111
+ import pulumi_oci as oci
112
+
113
+ test_network_firewall_policy_tunnel_inspection_rules = oci.NetworkFirewall.get_network_firewall_policy_tunnel_inspection_rules(network_firewall_policy_id=test_network_firewall_policy["id"],
114
+ display_name=network_firewall_policy_tunnel_inspection_rule_display_name,
115
+ tunnel_inspection_rule_priority_order=network_firewall_policy_tunnel_inspection_rule_tunnel_inspection_rule_priority_order)
116
+ ```
117
+
118
+
119
+ :param str display_name: A filter to return only resources that match the entire display name given.
120
+ :param str network_firewall_policy_id: Unique Network Firewall Policy identifier
121
+ :param int tunnel_inspection_rule_priority_order: Unique priority order for Tunnel Inspection rules in the network firewall policy.
122
+ """
123
+ __args__ = dict()
124
+ __args__['displayName'] = display_name
125
+ __args__['filters'] = filters
126
+ __args__['networkFirewallPolicyId'] = network_firewall_policy_id
127
+ __args__['tunnelInspectionRulePriorityOrder'] = tunnel_inspection_rule_priority_order
128
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
129
+ __ret__ = pulumi.runtime.invoke('oci:NetworkFirewall/getNetworkFirewallPolicyTunnelInspectionRules:getNetworkFirewallPolicyTunnelInspectionRules', __args__, opts=opts, typ=GetNetworkFirewallPolicyTunnelInspectionRulesResult).value
130
+
131
+ return AwaitableGetNetworkFirewallPolicyTunnelInspectionRulesResult(
132
+ display_name=pulumi.get(__ret__, 'display_name'),
133
+ filters=pulumi.get(__ret__, 'filters'),
134
+ id=pulumi.get(__ret__, 'id'),
135
+ network_firewall_policy_id=pulumi.get(__ret__, 'network_firewall_policy_id'),
136
+ tunnel_inspection_rule_priority_order=pulumi.get(__ret__, 'tunnel_inspection_rule_priority_order'),
137
+ tunnel_inspection_rule_summary_collections=pulumi.get(__ret__, 'tunnel_inspection_rule_summary_collections'))
138
+
139
+
140
+ @_utilities.lift_output_func(get_network_firewall_policy_tunnel_inspection_rules)
141
+ def get_network_firewall_policy_tunnel_inspection_rules_output(display_name: Optional[pulumi.Input[Optional[str]]] = None,
142
+ filters: Optional[pulumi.Input[Optional[Sequence[pulumi.InputType['GetNetworkFirewallPolicyTunnelInspectionRulesFilterArgs']]]]] = None,
143
+ network_firewall_policy_id: Optional[pulumi.Input[str]] = None,
144
+ tunnel_inspection_rule_priority_order: Optional[pulumi.Input[Optional[int]]] = None,
145
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNetworkFirewallPolicyTunnelInspectionRulesResult]:
146
+ """
147
+ This data source provides the list of Network Firewall Policy Tunnel Inspection Rules in Oracle Cloud Infrastructure Network Firewall service.
148
+
149
+ Returns a list of tunnel inspection rules for the network firewall policy.
150
+
151
+ ## Example Usage
152
+
153
+ ```python
154
+ import pulumi
155
+ import pulumi_oci as oci
156
+
157
+ test_network_firewall_policy_tunnel_inspection_rules = oci.NetworkFirewall.get_network_firewall_policy_tunnel_inspection_rules(network_firewall_policy_id=test_network_firewall_policy["id"],
158
+ display_name=network_firewall_policy_tunnel_inspection_rule_display_name,
159
+ tunnel_inspection_rule_priority_order=network_firewall_policy_tunnel_inspection_rule_tunnel_inspection_rule_priority_order)
160
+ ```
161
+
162
+
163
+ :param str display_name: A filter to return only resources that match the entire display name given.
164
+ :param str network_firewall_policy_id: Unique Network Firewall Policy identifier
165
+ :param int tunnel_inspection_rule_priority_order: Unique priority order for Tunnel Inspection rules in the network firewall policy.
166
+ """
167
+ ...