pulumi-oci 2.5.0a1722062014__py3-none-any.whl → 2.6.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (129) hide show
  1. pulumi_oci/__init__.py +91 -32
  2. pulumi_oci/bigdataservice/_inputs.py +157 -14
  3. pulumi_oci/bigdataservice/bds_instance.py +175 -0
  4. pulumi_oci/bigdataservice/bds_instance_patch_action.py +64 -3
  5. pulumi_oci/bigdataservice/get_bds_instance.py +41 -1
  6. pulumi_oci/bigdataservice/outputs.py +264 -30
  7. pulumi_oci/core/__init__.py +3 -0
  8. pulumi_oci/core/_inputs.py +40 -0
  9. pulumi_oci/core/get_instance_maintenance_event.py +414 -0
  10. pulumi_oci/core/get_instance_maintenance_events.py +250 -0
  11. pulumi_oci/core/instance_maintenance_event.py +1022 -0
  12. pulumi_oci/core/outputs.py +314 -0
  13. pulumi_oci/database/autonomous_database.py +28 -0
  14. pulumi_oci/database/get_autonomous_database.py +14 -1
  15. pulumi_oci/database/outputs.py +22 -0
  16. pulumi_oci/databasemigration/_inputs.py +184 -0
  17. pulumi_oci/databasemigration/job.py +99 -24
  18. pulumi_oci/databasemigration/outputs.py +171 -0
  19. pulumi_oci/datasafe/__init__.py +2 -4
  20. pulumi_oci/datasafe/_inputs.py +55 -0
  21. pulumi_oci/datasafe/alert.py +56 -0
  22. pulumi_oci/datasafe/alert_policy.py +745 -0
  23. pulumi_oci/datasafe/alert_policy_rule.py +446 -0
  24. pulumi_oci/datasafe/get_alert.py +27 -1
  25. pulumi_oci/datasafe/get_alert_policy.py +26 -2
  26. pulumi_oci/datasafe/get_alert_policy_rule.py +94 -18
  27. pulumi_oci/datasafe/get_report.py +14 -1
  28. pulumi_oci/datasafe/get_report_definition.py +14 -1
  29. pulumi_oci/datasafe/get_target_alert_policy_association.py +15 -2
  30. pulumi_oci/datasafe/outputs.py +231 -27
  31. pulumi_oci/datasafe/report.py +28 -0
  32. pulumi_oci/datasafe/report_definition.py +28 -0
  33. pulumi_oci/datasafe/target_alert_policy_association.py +28 -0
  34. pulumi_oci/devops/__init__.py +6 -0
  35. pulumi_oci/devops/_inputs.py +531 -32
  36. pulumi_oci/devops/get_build_runs.py +0 -5
  37. pulumi_oci/devops/get_project_repository_setting.py +129 -0
  38. pulumi_oci/devops/get_repositories.py +1 -1
  39. pulumi_oci/devops/get_repository.py +17 -4
  40. pulumi_oci/devops/get_repository_diffs.py +20 -3
  41. pulumi_oci/devops/get_repository_protected_branches.py +150 -0
  42. pulumi_oci/devops/get_repository_ref.py +2 -2
  43. pulumi_oci/devops/get_repository_setting.py +142 -0
  44. pulumi_oci/devops/get_triggers.py +0 -5
  45. pulumi_oci/devops/outputs.py +1216 -180
  46. pulumi_oci/devops/project_repository_setting.py +338 -0
  47. pulumi_oci/devops/repository.py +66 -75
  48. pulumi_oci/devops/repository_protected_branch_management.py +333 -0
  49. pulumi_oci/devops/repository_ref.py +2 -2
  50. pulumi_oci/devops/repository_setting.py +391 -0
  51. pulumi_oci/fleetsoftwareupdate/__init__.py +15 -0
  52. pulumi_oci/fleetsoftwareupdate/_inputs.py +553 -0
  53. pulumi_oci/fleetsoftwareupdate/fsu_collection.py +514 -0
  54. pulumi_oci/fleetsoftwareupdate/fsu_cycle.py +812 -0
  55. pulumi_oci/fleetsoftwareupdate/get_fsu_collection.py +225 -0
  56. pulumi_oci/fleetsoftwareupdate/get_fsu_collections.py +141 -0
  57. pulumi_oci/fleetsoftwareupdate/get_fsu_cycle.py +325 -0
  58. pulumi_oci/fleetsoftwareupdate/get_fsu_cycles.py +167 -0
  59. pulumi_oci/fleetsoftwareupdate/outputs.py +1481 -0
  60. pulumi_oci/generativeai/get_dedicated_ai_cluster.py +3 -0
  61. pulumi_oci/generativeai/get_dedicated_ai_clusters.py +3 -0
  62. pulumi_oci/generativeai/get_endpoint.py +6 -9
  63. pulumi_oci/generativeai/get_endpoints.py +3 -3
  64. pulumi_oci/generativeai/get_model.py +36 -6
  65. pulumi_oci/generativeai/get_models.py +6 -0
  66. pulumi_oci/generativeai/outputs.py +228 -16
  67. pulumi_oci/identity/__init__.py +3 -0
  68. pulumi_oci/identity/_inputs.py +1029 -0
  69. pulumi_oci/identity/domains_social_identity_provider.py +4628 -0
  70. pulumi_oci/identity/get_domains_social_identity_provider.py +664 -0
  71. pulumi_oci/identity/get_domains_social_identity_providers.py +276 -0
  72. pulumi_oci/identity/outputs.py +19544 -17378
  73. pulumi_oci/jms/__init__.py +4 -0
  74. pulumi_oci/jms/_inputs.py +80 -0
  75. pulumi_oci/jms/get_agent_installers.py +190 -0
  76. pulumi_oci/jms/get_fleet_blocklists.py +2 -2
  77. pulumi_oci/jms/get_fleet_crypto_analysis_result.py +29 -3
  78. pulumi_oci/jms/get_fleet_crypto_analysis_results.py +97 -3
  79. pulumi_oci/jms/get_fleet_export_setting.py +3 -3
  80. pulumi_oci/jms/get_fleet_export_status.py +2 -2
  81. pulumi_oci/jms/get_fleet_java_migration_analysis_result.py +2 -2
  82. pulumi_oci/jms/get_fleet_java_migration_analysis_results.py +45 -5
  83. pulumi_oci/jms/get_fleet_performance_tuning_analysis_result.py +4 -4
  84. pulumi_oci/jms/get_fleet_performance_tuning_analysis_results.py +25 -5
  85. pulumi_oci/jms/get_fleets.py +2 -2
  86. pulumi_oci/jms/get_installation_site.py +4 -4
  87. pulumi_oci/jms/get_installation_sites.py +4 -4
  88. pulumi_oci/jms/get_java_downloads_java_download_tokens.py +2 -2
  89. pulumi_oci/jms/get_java_downloads_java_license_acceptance_records.py +2 -2
  90. pulumi_oci/jms/get_java_family.py +14 -1
  91. pulumi_oci/jms/get_jms_plugin.py +313 -0
  92. pulumi_oci/jms/get_jms_plugins.py +291 -0
  93. pulumi_oci/jms/jms_plugin.py +731 -0
  94. pulumi_oci/jms/outputs.py +488 -32
  95. pulumi_oci/networkfirewall/__init__.py +3 -0
  96. pulumi_oci/networkfirewall/_inputs.py +150 -0
  97. pulumi_oci/networkfirewall/get_network_firewall_policy_tunnel_inspection_rule.py +227 -0
  98. pulumi_oci/networkfirewall/get_network_firewall_policy_tunnel_inspection_rules.py +167 -0
  99. pulumi_oci/networkfirewall/network_firewall_policy_tunnel_inspection_rule.py +605 -0
  100. pulumi_oci/networkfirewall/outputs.py +457 -0
  101. pulumi_oci/osmanagementhub/get_software_source.py +19 -1
  102. pulumi_oci/osmanagementhub/software_source.py +82 -0
  103. pulumi_oci/psql/_inputs.py +8 -4
  104. pulumi_oci/psql/backup.py +4 -4
  105. pulumi_oci/psql/configuration.py +141 -38
  106. pulumi_oci/psql/db_system.py +53 -55
  107. pulumi_oci/psql/get_backup.py +1 -1
  108. pulumi_oci/psql/get_configuration.py +27 -1
  109. pulumi_oci/psql/get_configurations.py +2 -2
  110. pulumi_oci/psql/get_default_configuration.py +15 -2
  111. pulumi_oci/psql/get_default_configurations.py +2 -2
  112. pulumi_oci/psql/outputs.py +176 -13
  113. pulumi_oci/pulumi-plugin.json +1 -1
  114. pulumi_oci/redis/get_redis_cluster.py +1 -1
  115. pulumi_oci/redis/outputs.py +2 -2
  116. pulumi_oci/redis/redis_cluster.py +7 -7
  117. pulumi_oci/stackmonitoring/_inputs.py +2 -2
  118. pulumi_oci/stackmonitoring/baselineable_metric.py +76 -28
  119. pulumi_oci/stackmonitoring/get_baselineable_metric.py +14 -1
  120. pulumi_oci/stackmonitoring/get_baselineable_metrics.py +45 -5
  121. pulumi_oci/stackmonitoring/outputs.py +19 -8
  122. {pulumi_oci-2.5.0a1722062014.dist-info → pulumi_oci-2.6.0.dist-info}/METADATA +1 -1
  123. {pulumi_oci-2.5.0a1722062014.dist-info → pulumi_oci-2.6.0.dist-info}/RECORD +125 -99
  124. {pulumi_oci-2.5.0a1722062014.dist-info → pulumi_oci-2.6.0.dist-info}/WHEEL +1 -1
  125. pulumi_oci/datasafe/masking_policy_health_report_management.py +0 -453
  126. pulumi_oci/datasafe/masking_report_management.py +0 -693
  127. pulumi_oci/datasafe/set_security_assessment_baseline_management.py +0 -304
  128. pulumi_oci/datasafe/set_user_assessment_baseline_management.py +0 -304
  129. {pulumi_oci-2.5.0a1722062014.dist-info → pulumi_oci-2.6.0.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,605 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import pulumi
8
+ import pulumi.runtime
9
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
10
+ from .. import _utilities
11
+ from . import outputs
12
+ from ._inputs import *
13
+
14
+ __all__ = ['NetworkFirewallPolicyTunnelInspectionRuleArgs', 'NetworkFirewallPolicyTunnelInspectionRule']
15
+
16
+ @pulumi.input_type
17
+ class NetworkFirewallPolicyTunnelInspectionRuleArgs:
18
+ def __init__(__self__, *,
19
+ condition: pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs'],
20
+ network_firewall_policy_id: pulumi.Input[str],
21
+ protocol: pulumi.Input[str],
22
+ action: Optional[pulumi.Input[str]] = None,
23
+ name: Optional[pulumi.Input[str]] = None,
24
+ position: Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRulePositionArgs']] = None,
25
+ profile: Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs']] = None):
26
+ """
27
+ The set of arguments for constructing a NetworkFirewallPolicyTunnelInspectionRule resource.
28
+ :param pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs'] condition: (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
29
+ :param pulumi.Input[str] network_firewall_policy_id: Unique Network Firewall Policy identifier
30
+ :param pulumi.Input[str] protocol: (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
31
+ * VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
32
+
33
+
34
+ ** IMPORTANT **
35
+ Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
36
+ :param pulumi.Input[str] action: (Updatable) Types of Inspect Action on the traffic flow.
37
+ * INSPECT - Inspect the traffic.
38
+ * INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
39
+ :param pulumi.Input[str] name: Name for the Tunnel Inspection Rule, must be unique within the policy.
40
+ :param pulumi.Input['NetworkFirewallPolicyTunnelInspectionRulePositionArgs'] position: (Updatable) An object which defines the position of the rule.
41
+ :param pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs'] profile: (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
42
+ """
43
+ pulumi.set(__self__, "condition", condition)
44
+ pulumi.set(__self__, "network_firewall_policy_id", network_firewall_policy_id)
45
+ pulumi.set(__self__, "protocol", protocol)
46
+ if action is not None:
47
+ pulumi.set(__self__, "action", action)
48
+ if name is not None:
49
+ pulumi.set(__self__, "name", name)
50
+ if position is not None:
51
+ pulumi.set(__self__, "position", position)
52
+ if profile is not None:
53
+ pulumi.set(__self__, "profile", profile)
54
+
55
+ @property
56
+ @pulumi.getter
57
+ def condition(self) -> pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs']:
58
+ """
59
+ (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
60
+ """
61
+ return pulumi.get(self, "condition")
62
+
63
+ @condition.setter
64
+ def condition(self, value: pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs']):
65
+ pulumi.set(self, "condition", value)
66
+
67
+ @property
68
+ @pulumi.getter(name="networkFirewallPolicyId")
69
+ def network_firewall_policy_id(self) -> pulumi.Input[str]:
70
+ """
71
+ Unique Network Firewall Policy identifier
72
+ """
73
+ return pulumi.get(self, "network_firewall_policy_id")
74
+
75
+ @network_firewall_policy_id.setter
76
+ def network_firewall_policy_id(self, value: pulumi.Input[str]):
77
+ pulumi.set(self, "network_firewall_policy_id", value)
78
+
79
+ @property
80
+ @pulumi.getter
81
+ def protocol(self) -> pulumi.Input[str]:
82
+ """
83
+ (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
84
+ * VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
85
+
86
+
87
+ ** IMPORTANT **
88
+ Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
89
+ """
90
+ return pulumi.get(self, "protocol")
91
+
92
+ @protocol.setter
93
+ def protocol(self, value: pulumi.Input[str]):
94
+ pulumi.set(self, "protocol", value)
95
+
96
+ @property
97
+ @pulumi.getter
98
+ def action(self) -> Optional[pulumi.Input[str]]:
99
+ """
100
+ (Updatable) Types of Inspect Action on the traffic flow.
101
+ * INSPECT - Inspect the traffic.
102
+ * INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
103
+ """
104
+ return pulumi.get(self, "action")
105
+
106
+ @action.setter
107
+ def action(self, value: Optional[pulumi.Input[str]]):
108
+ pulumi.set(self, "action", value)
109
+
110
+ @property
111
+ @pulumi.getter
112
+ def name(self) -> Optional[pulumi.Input[str]]:
113
+ """
114
+ Name for the Tunnel Inspection Rule, must be unique within the policy.
115
+ """
116
+ return pulumi.get(self, "name")
117
+
118
+ @name.setter
119
+ def name(self, value: Optional[pulumi.Input[str]]):
120
+ pulumi.set(self, "name", value)
121
+
122
+ @property
123
+ @pulumi.getter
124
+ def position(self) -> Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRulePositionArgs']]:
125
+ """
126
+ (Updatable) An object which defines the position of the rule.
127
+ """
128
+ return pulumi.get(self, "position")
129
+
130
+ @position.setter
131
+ def position(self, value: Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRulePositionArgs']]):
132
+ pulumi.set(self, "position", value)
133
+
134
+ @property
135
+ @pulumi.getter
136
+ def profile(self) -> Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs']]:
137
+ """
138
+ (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
139
+ """
140
+ return pulumi.get(self, "profile")
141
+
142
+ @profile.setter
143
+ def profile(self, value: Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs']]):
144
+ pulumi.set(self, "profile", value)
145
+
146
+
147
+ @pulumi.input_type
148
+ class _NetworkFirewallPolicyTunnelInspectionRuleState:
149
+ def __init__(__self__, *,
150
+ action: Optional[pulumi.Input[str]] = None,
151
+ condition: Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs']] = None,
152
+ name: Optional[pulumi.Input[str]] = None,
153
+ network_firewall_policy_id: Optional[pulumi.Input[str]] = None,
154
+ parent_resource_id: Optional[pulumi.Input[str]] = None,
155
+ position: Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRulePositionArgs']] = None,
156
+ priority_order: Optional[pulumi.Input[str]] = None,
157
+ profile: Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs']] = None,
158
+ protocol: Optional[pulumi.Input[str]] = None):
159
+ """
160
+ Input properties used for looking up and filtering NetworkFirewallPolicyTunnelInspectionRule resources.
161
+ :param pulumi.Input[str] action: (Updatable) Types of Inspect Action on the traffic flow.
162
+ * INSPECT - Inspect the traffic.
163
+ * INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
164
+ :param pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs'] condition: (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
165
+ :param pulumi.Input[str] name: Name for the Tunnel Inspection Rule, must be unique within the policy.
166
+ :param pulumi.Input[str] network_firewall_policy_id: Unique Network Firewall Policy identifier
167
+ :param pulumi.Input[str] parent_resource_id: OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
168
+ :param pulumi.Input['NetworkFirewallPolicyTunnelInspectionRulePositionArgs'] position: (Updatable) An object which defines the position of the rule.
169
+ :param pulumi.Input[str] priority_order: The priority order in which this rule should be evaluated
170
+ :param pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs'] profile: (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
171
+ :param pulumi.Input[str] protocol: (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
172
+ * VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
173
+
174
+
175
+ ** IMPORTANT **
176
+ Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
177
+ """
178
+ if action is not None:
179
+ pulumi.set(__self__, "action", action)
180
+ if condition is not None:
181
+ pulumi.set(__self__, "condition", condition)
182
+ if name is not None:
183
+ pulumi.set(__self__, "name", name)
184
+ if network_firewall_policy_id is not None:
185
+ pulumi.set(__self__, "network_firewall_policy_id", network_firewall_policy_id)
186
+ if parent_resource_id is not None:
187
+ pulumi.set(__self__, "parent_resource_id", parent_resource_id)
188
+ if position is not None:
189
+ pulumi.set(__self__, "position", position)
190
+ if priority_order is not None:
191
+ pulumi.set(__self__, "priority_order", priority_order)
192
+ if profile is not None:
193
+ pulumi.set(__self__, "profile", profile)
194
+ if protocol is not None:
195
+ pulumi.set(__self__, "protocol", protocol)
196
+
197
+ @property
198
+ @pulumi.getter
199
+ def action(self) -> Optional[pulumi.Input[str]]:
200
+ """
201
+ (Updatable) Types of Inspect Action on the traffic flow.
202
+ * INSPECT - Inspect the traffic.
203
+ * INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
204
+ """
205
+ return pulumi.get(self, "action")
206
+
207
+ @action.setter
208
+ def action(self, value: Optional[pulumi.Input[str]]):
209
+ pulumi.set(self, "action", value)
210
+
211
+ @property
212
+ @pulumi.getter
213
+ def condition(self) -> Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs']]:
214
+ """
215
+ (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
216
+ """
217
+ return pulumi.get(self, "condition")
218
+
219
+ @condition.setter
220
+ def condition(self, value: Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs']]):
221
+ pulumi.set(self, "condition", value)
222
+
223
+ @property
224
+ @pulumi.getter
225
+ def name(self) -> Optional[pulumi.Input[str]]:
226
+ """
227
+ Name for the Tunnel Inspection Rule, must be unique within the policy.
228
+ """
229
+ return pulumi.get(self, "name")
230
+
231
+ @name.setter
232
+ def name(self, value: Optional[pulumi.Input[str]]):
233
+ pulumi.set(self, "name", value)
234
+
235
+ @property
236
+ @pulumi.getter(name="networkFirewallPolicyId")
237
+ def network_firewall_policy_id(self) -> Optional[pulumi.Input[str]]:
238
+ """
239
+ Unique Network Firewall Policy identifier
240
+ """
241
+ return pulumi.get(self, "network_firewall_policy_id")
242
+
243
+ @network_firewall_policy_id.setter
244
+ def network_firewall_policy_id(self, value: Optional[pulumi.Input[str]]):
245
+ pulumi.set(self, "network_firewall_policy_id", value)
246
+
247
+ @property
248
+ @pulumi.getter(name="parentResourceId")
249
+ def parent_resource_id(self) -> Optional[pulumi.Input[str]]:
250
+ """
251
+ OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
252
+ """
253
+ return pulumi.get(self, "parent_resource_id")
254
+
255
+ @parent_resource_id.setter
256
+ def parent_resource_id(self, value: Optional[pulumi.Input[str]]):
257
+ pulumi.set(self, "parent_resource_id", value)
258
+
259
+ @property
260
+ @pulumi.getter
261
+ def position(self) -> Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRulePositionArgs']]:
262
+ """
263
+ (Updatable) An object which defines the position of the rule.
264
+ """
265
+ return pulumi.get(self, "position")
266
+
267
+ @position.setter
268
+ def position(self, value: Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRulePositionArgs']]):
269
+ pulumi.set(self, "position", value)
270
+
271
+ @property
272
+ @pulumi.getter(name="priorityOrder")
273
+ def priority_order(self) -> Optional[pulumi.Input[str]]:
274
+ """
275
+ The priority order in which this rule should be evaluated
276
+ """
277
+ return pulumi.get(self, "priority_order")
278
+
279
+ @priority_order.setter
280
+ def priority_order(self, value: Optional[pulumi.Input[str]]):
281
+ pulumi.set(self, "priority_order", value)
282
+
283
+ @property
284
+ @pulumi.getter
285
+ def profile(self) -> Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs']]:
286
+ """
287
+ (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
288
+ """
289
+ return pulumi.get(self, "profile")
290
+
291
+ @profile.setter
292
+ def profile(self, value: Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs']]):
293
+ pulumi.set(self, "profile", value)
294
+
295
+ @property
296
+ @pulumi.getter
297
+ def protocol(self) -> Optional[pulumi.Input[str]]:
298
+ """
299
+ (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
300
+ * VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
301
+
302
+
303
+ ** IMPORTANT **
304
+ Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
305
+ """
306
+ return pulumi.get(self, "protocol")
307
+
308
+ @protocol.setter
309
+ def protocol(self, value: Optional[pulumi.Input[str]]):
310
+ pulumi.set(self, "protocol", value)
311
+
312
+
313
+ class NetworkFirewallPolicyTunnelInspectionRule(pulumi.CustomResource):
314
+ @overload
315
+ def __init__(__self__,
316
+ resource_name: str,
317
+ opts: Optional[pulumi.ResourceOptions] = None,
318
+ action: Optional[pulumi.Input[str]] = None,
319
+ condition: Optional[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs']]] = None,
320
+ name: Optional[pulumi.Input[str]] = None,
321
+ network_firewall_policy_id: Optional[pulumi.Input[str]] = None,
322
+ position: Optional[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRulePositionArgs']]] = None,
323
+ profile: Optional[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs']]] = None,
324
+ protocol: Optional[pulumi.Input[str]] = None,
325
+ __props__=None):
326
+ """
327
+ This resource provides the Network Firewall Policy Tunnel Inspection Rule resource in Oracle Cloud Infrastructure Network Firewall service.
328
+
329
+ Creates a new tunnel inspection rule for the network firewall policy.
330
+
331
+ ## Example Usage
332
+
333
+ ```python
334
+ import pulumi
335
+ import pulumi_oci as oci
336
+
337
+ test_network_firewall_policy_tunnel_inspection_rule = oci.network_firewall.NetworkFirewallPolicyTunnelInspectionRule("test_network_firewall_policy_tunnel_inspection_rule",
338
+ condition=oci.network_firewall.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs(
339
+ destination_addresses=network_firewall_policy_tunnel_inspection_rule_condition_destination_address,
340
+ source_addresses=network_firewall_policy_tunnel_inspection_rule_condition_source_address,
341
+ ),
342
+ name=network_firewall_policy_tunnel_inspection_rule_name,
343
+ network_firewall_policy_id=test_network_firewall_policy["id"],
344
+ protocol=network_firewall_policy_tunnel_inspection_rule_protocol,
345
+ action=network_firewall_policy_tunnel_inspection_rule_action,
346
+ position=oci.network_firewall.NetworkFirewallPolicyTunnelInspectionRulePositionArgs(
347
+ after_rule=network_firewall_policy_tunnel_inspection_rule_position_after_rule,
348
+ before_rule=network_firewall_policy_tunnel_inspection_rule_position_before_rule,
349
+ ),
350
+ profile=oci.network_firewall.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs(
351
+ must_return_traffic_to_source=network_firewall_policy_tunnel_inspection_rule_profile_must_return_traffic_to_source,
352
+ ))
353
+ ```
354
+
355
+ ## Import
356
+
357
+ NetworkFirewallPolicyTunnelInspectionRules can be imported using the `id`, e.g.
358
+
359
+ ```sh
360
+ $ pulumi import oci:NetworkFirewall/networkFirewallPolicyTunnelInspectionRule:NetworkFirewallPolicyTunnelInspectionRule test_network_firewall_policy_tunnel_inspection_rule "networkFirewallPolicies/{networkFirewallPolicyId}/tunnelInspectionRules/{tunnelInspectionRuleName}"
361
+ ```
362
+
363
+ :param str resource_name: The name of the resource.
364
+ :param pulumi.ResourceOptions opts: Options for the resource.
365
+ :param pulumi.Input[str] action: (Updatable) Types of Inspect Action on the traffic flow.
366
+ * INSPECT - Inspect the traffic.
367
+ * INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
368
+ :param pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs']] condition: (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
369
+ :param pulumi.Input[str] name: Name for the Tunnel Inspection Rule, must be unique within the policy.
370
+ :param pulumi.Input[str] network_firewall_policy_id: Unique Network Firewall Policy identifier
371
+ :param pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRulePositionArgs']] position: (Updatable) An object which defines the position of the rule.
372
+ :param pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs']] profile: (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
373
+ :param pulumi.Input[str] protocol: (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
374
+ * VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
375
+
376
+
377
+ ** IMPORTANT **
378
+ Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
379
+ """
380
+ ...
381
+ @overload
382
+ def __init__(__self__,
383
+ resource_name: str,
384
+ args: NetworkFirewallPolicyTunnelInspectionRuleArgs,
385
+ opts: Optional[pulumi.ResourceOptions] = None):
386
+ """
387
+ This resource provides the Network Firewall Policy Tunnel Inspection Rule resource in Oracle Cloud Infrastructure Network Firewall service.
388
+
389
+ Creates a new tunnel inspection rule for the network firewall policy.
390
+
391
+ ## Example Usage
392
+
393
+ ```python
394
+ import pulumi
395
+ import pulumi_oci as oci
396
+
397
+ test_network_firewall_policy_tunnel_inspection_rule = oci.network_firewall.NetworkFirewallPolicyTunnelInspectionRule("test_network_firewall_policy_tunnel_inspection_rule",
398
+ condition=oci.network_firewall.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs(
399
+ destination_addresses=network_firewall_policy_tunnel_inspection_rule_condition_destination_address,
400
+ source_addresses=network_firewall_policy_tunnel_inspection_rule_condition_source_address,
401
+ ),
402
+ name=network_firewall_policy_tunnel_inspection_rule_name,
403
+ network_firewall_policy_id=test_network_firewall_policy["id"],
404
+ protocol=network_firewall_policy_tunnel_inspection_rule_protocol,
405
+ action=network_firewall_policy_tunnel_inspection_rule_action,
406
+ position=oci.network_firewall.NetworkFirewallPolicyTunnelInspectionRulePositionArgs(
407
+ after_rule=network_firewall_policy_tunnel_inspection_rule_position_after_rule,
408
+ before_rule=network_firewall_policy_tunnel_inspection_rule_position_before_rule,
409
+ ),
410
+ profile=oci.network_firewall.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs(
411
+ must_return_traffic_to_source=network_firewall_policy_tunnel_inspection_rule_profile_must_return_traffic_to_source,
412
+ ))
413
+ ```
414
+
415
+ ## Import
416
+
417
+ NetworkFirewallPolicyTunnelInspectionRules can be imported using the `id`, e.g.
418
+
419
+ ```sh
420
+ $ pulumi import oci:NetworkFirewall/networkFirewallPolicyTunnelInspectionRule:NetworkFirewallPolicyTunnelInspectionRule test_network_firewall_policy_tunnel_inspection_rule "networkFirewallPolicies/{networkFirewallPolicyId}/tunnelInspectionRules/{tunnelInspectionRuleName}"
421
+ ```
422
+
423
+ :param str resource_name: The name of the resource.
424
+ :param NetworkFirewallPolicyTunnelInspectionRuleArgs args: The arguments to use to populate this resource's properties.
425
+ :param pulumi.ResourceOptions opts: Options for the resource.
426
+ """
427
+ ...
428
+ def __init__(__self__, resource_name: str, *args, **kwargs):
429
+ resource_args, opts = _utilities.get_resource_args_opts(NetworkFirewallPolicyTunnelInspectionRuleArgs, pulumi.ResourceOptions, *args, **kwargs)
430
+ if resource_args is not None:
431
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
432
+ else:
433
+ __self__._internal_init(resource_name, *args, **kwargs)
434
+
435
+ def _internal_init(__self__,
436
+ resource_name: str,
437
+ opts: Optional[pulumi.ResourceOptions] = None,
438
+ action: Optional[pulumi.Input[str]] = None,
439
+ condition: Optional[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs']]] = None,
440
+ name: Optional[pulumi.Input[str]] = None,
441
+ network_firewall_policy_id: Optional[pulumi.Input[str]] = None,
442
+ position: Optional[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRulePositionArgs']]] = None,
443
+ profile: Optional[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs']]] = None,
444
+ protocol: Optional[pulumi.Input[str]] = None,
445
+ __props__=None):
446
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
447
+ if not isinstance(opts, pulumi.ResourceOptions):
448
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
449
+ if opts.id is None:
450
+ if __props__ is not None:
451
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
452
+ __props__ = NetworkFirewallPolicyTunnelInspectionRuleArgs.__new__(NetworkFirewallPolicyTunnelInspectionRuleArgs)
453
+
454
+ __props__.__dict__["action"] = action
455
+ if condition is None and not opts.urn:
456
+ raise TypeError("Missing required property 'condition'")
457
+ __props__.__dict__["condition"] = condition
458
+ __props__.__dict__["name"] = name
459
+ if network_firewall_policy_id is None and not opts.urn:
460
+ raise TypeError("Missing required property 'network_firewall_policy_id'")
461
+ __props__.__dict__["network_firewall_policy_id"] = network_firewall_policy_id
462
+ __props__.__dict__["position"] = position
463
+ __props__.__dict__["profile"] = profile
464
+ if protocol is None and not opts.urn:
465
+ raise TypeError("Missing required property 'protocol'")
466
+ __props__.__dict__["protocol"] = protocol
467
+ __props__.__dict__["parent_resource_id"] = None
468
+ __props__.__dict__["priority_order"] = None
469
+ super(NetworkFirewallPolicyTunnelInspectionRule, __self__).__init__(
470
+ 'oci:NetworkFirewall/networkFirewallPolicyTunnelInspectionRule:NetworkFirewallPolicyTunnelInspectionRule',
471
+ resource_name,
472
+ __props__,
473
+ opts)
474
+
475
+ @staticmethod
476
+ def get(resource_name: str,
477
+ id: pulumi.Input[str],
478
+ opts: Optional[pulumi.ResourceOptions] = None,
479
+ action: Optional[pulumi.Input[str]] = None,
480
+ condition: Optional[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs']]] = None,
481
+ name: Optional[pulumi.Input[str]] = None,
482
+ network_firewall_policy_id: Optional[pulumi.Input[str]] = None,
483
+ parent_resource_id: Optional[pulumi.Input[str]] = None,
484
+ position: Optional[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRulePositionArgs']]] = None,
485
+ priority_order: Optional[pulumi.Input[str]] = None,
486
+ profile: Optional[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs']]] = None,
487
+ protocol: Optional[pulumi.Input[str]] = None) -> 'NetworkFirewallPolicyTunnelInspectionRule':
488
+ """
489
+ Get an existing NetworkFirewallPolicyTunnelInspectionRule resource's state with the given name, id, and optional extra
490
+ properties used to qualify the lookup.
491
+
492
+ :param str resource_name: The unique name of the resulting resource.
493
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
494
+ :param pulumi.ResourceOptions opts: Options for the resource.
495
+ :param pulumi.Input[str] action: (Updatable) Types of Inspect Action on the traffic flow.
496
+ * INSPECT - Inspect the traffic.
497
+ * INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
498
+ :param pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs']] condition: (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
499
+ :param pulumi.Input[str] name: Name for the Tunnel Inspection Rule, must be unique within the policy.
500
+ :param pulumi.Input[str] network_firewall_policy_id: Unique Network Firewall Policy identifier
501
+ :param pulumi.Input[str] parent_resource_id: OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
502
+ :param pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRulePositionArgs']] position: (Updatable) An object which defines the position of the rule.
503
+ :param pulumi.Input[str] priority_order: The priority order in which this rule should be evaluated
504
+ :param pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs']] profile: (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
505
+ :param pulumi.Input[str] protocol: (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
506
+ * VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
507
+
508
+
509
+ ** IMPORTANT **
510
+ Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
511
+ """
512
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
513
+
514
+ __props__ = _NetworkFirewallPolicyTunnelInspectionRuleState.__new__(_NetworkFirewallPolicyTunnelInspectionRuleState)
515
+
516
+ __props__.__dict__["action"] = action
517
+ __props__.__dict__["condition"] = condition
518
+ __props__.__dict__["name"] = name
519
+ __props__.__dict__["network_firewall_policy_id"] = network_firewall_policy_id
520
+ __props__.__dict__["parent_resource_id"] = parent_resource_id
521
+ __props__.__dict__["position"] = position
522
+ __props__.__dict__["priority_order"] = priority_order
523
+ __props__.__dict__["profile"] = profile
524
+ __props__.__dict__["protocol"] = protocol
525
+ return NetworkFirewallPolicyTunnelInspectionRule(resource_name, opts=opts, __props__=__props__)
526
+
527
+ @property
528
+ @pulumi.getter
529
+ def action(self) -> pulumi.Output[str]:
530
+ """
531
+ (Updatable) Types of Inspect Action on the traffic flow.
532
+ * INSPECT - Inspect the traffic.
533
+ * INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
534
+ """
535
+ return pulumi.get(self, "action")
536
+
537
+ @property
538
+ @pulumi.getter
539
+ def condition(self) -> pulumi.Output['outputs.NetworkFirewallPolicyTunnelInspectionRuleCondition']:
540
+ """
541
+ (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
542
+ """
543
+ return pulumi.get(self, "condition")
544
+
545
+ @property
546
+ @pulumi.getter
547
+ def name(self) -> pulumi.Output[str]:
548
+ """
549
+ Name for the Tunnel Inspection Rule, must be unique within the policy.
550
+ """
551
+ return pulumi.get(self, "name")
552
+
553
+ @property
554
+ @pulumi.getter(name="networkFirewallPolicyId")
555
+ def network_firewall_policy_id(self) -> pulumi.Output[str]:
556
+ """
557
+ Unique Network Firewall Policy identifier
558
+ """
559
+ return pulumi.get(self, "network_firewall_policy_id")
560
+
561
+ @property
562
+ @pulumi.getter(name="parentResourceId")
563
+ def parent_resource_id(self) -> pulumi.Output[str]:
564
+ """
565
+ OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
566
+ """
567
+ return pulumi.get(self, "parent_resource_id")
568
+
569
+ @property
570
+ @pulumi.getter
571
+ def position(self) -> pulumi.Output['outputs.NetworkFirewallPolicyTunnelInspectionRulePosition']:
572
+ """
573
+ (Updatable) An object which defines the position of the rule.
574
+ """
575
+ return pulumi.get(self, "position")
576
+
577
+ @property
578
+ @pulumi.getter(name="priorityOrder")
579
+ def priority_order(self) -> pulumi.Output[str]:
580
+ """
581
+ The priority order in which this rule should be evaluated
582
+ """
583
+ return pulumi.get(self, "priority_order")
584
+
585
+ @property
586
+ @pulumi.getter
587
+ def profile(self) -> pulumi.Output['outputs.NetworkFirewallPolicyTunnelInspectionRuleProfile']:
588
+ """
589
+ (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
590
+ """
591
+ return pulumi.get(self, "profile")
592
+
593
+ @property
594
+ @pulumi.getter
595
+ def protocol(self) -> pulumi.Output[str]:
596
+ """
597
+ (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
598
+ * VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
599
+
600
+
601
+ ** IMPORTANT **
602
+ Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
603
+ """
604
+ return pulumi.get(self, "protocol")
605
+