pulumi-oci 3.4.0a1755714728__py3-none-any.whl → 3.5.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (313) hide show
  1. pulumi_oci/__init__.py +248 -43
  2. pulumi_oci/aidocument/__init__.py +1 -0
  3. pulumi_oci/aidocument/_inputs.py +476 -6
  4. pulumi_oci/aidocument/get_model.py +63 -2
  5. pulumi_oci/aidocument/get_model_type.py +179 -0
  6. pulumi_oci/aidocument/get_models.py +1 -1
  7. pulumi_oci/aidocument/get_project.py +17 -2
  8. pulumi_oci/aidocument/get_projects.py +1 -1
  9. pulumi_oci/aidocument/model.py +188 -0
  10. pulumi_oci/aidocument/outputs.py +883 -8
  11. pulumi_oci/aidocument/processor_job.py +22 -4
  12. pulumi_oci/aidocument/project.py +50 -1
  13. pulumi_oci/apigateway/_inputs.py +608 -12
  14. pulumi_oci/apigateway/api.py +127 -38
  15. pulumi_oci/apigateway/certificate.py +122 -3
  16. pulumi_oci/apigateway/deployment.py +120 -3
  17. pulumi_oci/apigateway/gateway.py +124 -7
  18. pulumi_oci/apigateway/get_api.py +40 -1
  19. pulumi_oci/apigateway/get_certificate.py +41 -1
  20. pulumi_oci/apigateway/get_deployment.py +40 -1
  21. pulumi_oci/apigateway/get_gateway.py +40 -1
  22. pulumi_oci/apigateway/get_subscriber.py +40 -1
  23. pulumi_oci/apigateway/get_usage_plan.py +40 -1
  24. pulumi_oci/apigateway/outputs.py +1413 -39
  25. pulumi_oci/apigateway/subscriber.py +120 -3
  26. pulumi_oci/apigateway/usage_plan.py +127 -38
  27. pulumi_oci/apmconfig/_inputs.py +199 -15
  28. pulumi_oci/apmconfig/config.py +535 -17
  29. pulumi_oci/apmconfig/get_config.py +141 -1
  30. pulumi_oci/apmconfig/get_configs.py +2 -2
  31. pulumi_oci/apmconfig/outputs.py +509 -13
  32. pulumi_oci/apmtraces/__init__.py +5 -0
  33. pulumi_oci/apmtraces/_inputs.py +413 -0
  34. pulumi_oci/apmtraces/get_attribute_auto_activate_status.py +160 -0
  35. pulumi_oci/apmtraces/get_log.py +356 -0
  36. pulumi_oci/apmtraces/get_scheduled_queries.py +163 -0
  37. pulumi_oci/apmtraces/get_scheduled_query.py +368 -0
  38. pulumi_oci/apmtraces/get_trace.py +4 -4
  39. pulumi_oci/apmtraces/outputs.py +971 -0
  40. pulumi_oci/apmtraces/scheduled_query.py +925 -0
  41. pulumi_oci/autoscaling/_inputs.py +177 -13
  42. pulumi_oci/autoscaling/auto_scaling_configuration.py +12 -0
  43. pulumi_oci/autoscaling/outputs.py +269 -23
  44. pulumi_oci/core/_inputs.py +184 -0
  45. pulumi_oci/core/compute_gpu_memory_fabric.py +28 -0
  46. pulumi_oci/core/get_compute_gpu_memory_fabric.py +15 -1
  47. pulumi_oci/core/get_ipv6.py +15 -1
  48. pulumi_oci/core/ipv6.py +49 -0
  49. pulumi_oci/core/outputs.py +376 -0
  50. pulumi_oci/database/__init__.py +3 -0
  51. pulumi_oci/database/_inputs.py +396 -19
  52. pulumi_oci/database/autonomous_container_database.py +94 -0
  53. pulumi_oci/database/autonomous_container_database_add_standby.py +28 -0
  54. pulumi_oci/database/autonomous_database.py +578 -568
  55. pulumi_oci/database/autonomous_database_saas_admin_user.py +43 -60
  56. pulumi_oci/database/data_guard_association.py +98 -0
  57. pulumi_oci/database/database.py +28 -0
  58. pulumi_oci/database/db_node.py +56 -0
  59. pulumi_oci/database/db_system.py +108 -14
  60. pulumi_oci/database/exadb_vm_cluster.py +49 -0
  61. pulumi_oci/database/exascale_db_storage_vault.py +28 -0
  62. pulumi_oci/database/get_autonomous_container_database.py +29 -1
  63. pulumi_oci/database/get_autonomous_database.py +65 -1
  64. pulumi_oci/database/get_autonomous_databases.py +6 -1
  65. pulumi_oci/database/get_data_guard_association.py +23 -1
  66. pulumi_oci/database/get_database.py +15 -1
  67. pulumi_oci/database/get_db_node.py +29 -1
  68. pulumi_oci/database/get_db_system_shapes.py +25 -6
  69. pulumi_oci/database/get_db_system_storage_performances.py +20 -3
  70. pulumi_oci/database/get_db_versions.py +20 -1
  71. pulumi_oci/database/get_exadb_vm_cluster.py +15 -1
  72. pulumi_oci/database/get_exascale_db_storage_vault.py +15 -1
  73. pulumi_oci/database/get_exascale_db_storage_vaults.py +87 -8
  74. pulumi_oci/database/get_gi_versions.py +25 -6
  75. pulumi_oci/database/get_pluggable_database_snapshot.py +253 -0
  76. pulumi_oci/database/get_pluggable_database_snapshots.py +235 -0
  77. pulumi_oci/database/outputs.py +1045 -83
  78. pulumi_oci/database/pluggable_database.py +0 -14
  79. pulumi_oci/database/pluggable_database_snapshot.py +539 -0
  80. pulumi_oci/databasemanagement/__init__.py +37 -0
  81. pulumi_oci/databasemanagement/_inputs.py +9516 -3414
  82. pulumi_oci/databasemanagement/cloud_asm.py +791 -0
  83. pulumi_oci/databasemanagement/cloud_asm_instance.py +686 -0
  84. pulumi_oci/databasemanagement/cloud_cluster.py +847 -0
  85. pulumi_oci/databasemanagement/cloud_cluster_instance.py +789 -0
  86. pulumi_oci/databasemanagement/cloud_db_home.py +630 -0
  87. pulumi_oci/databasemanagement/cloud_db_node.py +761 -0
  88. pulumi_oci/databasemanagement/cloud_db_system.py +789 -0
  89. pulumi_oci/databasemanagement/cloud_db_system_cloud_database_managements_management.py +354 -0
  90. pulumi_oci/databasemanagement/cloud_db_system_cloud_stack_monitorings_management.py +354 -0
  91. pulumi_oci/databasemanagement/cloud_db_system_connector.py +761 -0
  92. pulumi_oci/databasemanagement/cloud_db_system_discovery.py +754 -0
  93. pulumi_oci/databasemanagement/cloud_listener.py +1043 -0
  94. pulumi_oci/databasemanagement/get_cloud_asm.py +380 -0
  95. pulumi_oci/databasemanagement/get_cloud_asm_configuration.py +147 -0
  96. pulumi_oci/databasemanagement/get_cloud_asm_disk_groups.py +163 -0
  97. pulumi_oci/databasemanagement/get_cloud_asm_instance.py +337 -0
  98. pulumi_oci/databasemanagement/get_cloud_asm_instances.py +191 -0
  99. pulumi_oci/databasemanagement/get_cloud_asm_users.py +163 -0
  100. pulumi_oci/databasemanagement/get_cloud_asms.py +191 -0
  101. pulumi_oci/databasemanagement/get_cloud_cluster.py +408 -0
  102. pulumi_oci/databasemanagement/get_cloud_cluster_instance.py +379 -0
  103. pulumi_oci/databasemanagement/get_cloud_cluster_instances.py +191 -0
  104. pulumi_oci/databasemanagement/get_cloud_clusters.py +191 -0
  105. pulumi_oci/databasemanagement/get_cloud_databases.py +188 -0
  106. pulumi_oci/databasemanagement/get_cloud_db_home.py +309 -0
  107. pulumi_oci/databasemanagement/get_cloud_db_homes.py +191 -0
  108. pulumi_oci/databasemanagement/get_cloud_db_node.py +365 -0
  109. pulumi_oci/databasemanagement/get_cloud_db_nodes.py +191 -0
  110. pulumi_oci/databasemanagement/get_cloud_db_system.py +352 -0
  111. pulumi_oci/databasemanagement/get_cloud_db_system_connector.py +338 -0
  112. pulumi_oci/databasemanagement/get_cloud_db_system_connectors.py +191 -0
  113. pulumi_oci/databasemanagement/get_cloud_db_system_discoveries.py +169 -0
  114. pulumi_oci/databasemanagement/get_cloud_db_system_discovery.py +335 -0
  115. pulumi_oci/databasemanagement/get_cloud_db_systems.py +235 -0
  116. pulumi_oci/databasemanagement/get_cloud_listener.py +506 -0
  117. pulumi_oci/databasemanagement/get_cloud_listener_services.py +187 -0
  118. pulumi_oci/databasemanagement/get_cloud_listeners.py +191 -0
  119. pulumi_oci/databasemanagement/get_managed_database.py +2 -2
  120. pulumi_oci/databasemanagement/get_managed_database_group.py +2 -2
  121. pulumi_oci/databasemanagement/get_managed_my_sql_database_binary_log_information.py +6 -6
  122. pulumi_oci/databasemanagement/get_managed_my_sql_database_general_replication_information.py +5 -5
  123. pulumi_oci/databasemanagement/get_managed_my_sql_database_high_availability_members.py +2 -2
  124. pulumi_oci/databasemanagement/get_managed_my_sql_database_outbound_replications.py +2 -2
  125. pulumi_oci/databasemanagement/outputs.py +18049 -4222
  126. pulumi_oci/datasafe/__init__.py +24 -0
  127. pulumi_oci/datasafe/_inputs.py +3669 -1537
  128. pulumi_oci/datasafe/attribute_set.py +693 -0
  129. pulumi_oci/datasafe/audit_profile.py +356 -95
  130. pulumi_oci/datasafe/audit_profile_management.py +389 -129
  131. pulumi_oci/datasafe/audit_trail.py +47 -0
  132. pulumi_oci/datasafe/audit_trail_management.py +49 -0
  133. pulumi_oci/datasafe/get_alerts.py +2 -2
  134. pulumi_oci/datasafe/get_attribute_set.py +295 -0
  135. pulumi_oci/datasafe/get_attribute_set_associated_resources.py +188 -0
  136. pulumi_oci/datasafe/get_attribute_sets.py +340 -0
  137. pulumi_oci/datasafe/get_audit_archive_retrievals.py +20 -1
  138. pulumi_oci/datasafe/get_audit_events.py +2 -2
  139. pulumi_oci/datasafe/get_audit_policies.py +20 -1
  140. pulumi_oci/datasafe/get_audit_profile.py +78 -8
  141. pulumi_oci/datasafe/get_audit_profile_target_overrides.py +163 -0
  142. pulumi_oci/datasafe/get_audit_profiles.py +50 -9
  143. pulumi_oci/datasafe/get_audit_trail.py +15 -1
  144. pulumi_oci/datasafe/get_audit_trails.py +20 -1
  145. pulumi_oci/datasafe/get_database_security_configs.py +20 -1
  146. pulumi_oci/datasafe/get_discovery_analytics.py +39 -1
  147. pulumi_oci/datasafe/get_masking_analytics.py +42 -1
  148. pulumi_oci/datasafe/get_onprem_connectors.py +26 -23
  149. pulumi_oci/datasafe/get_report.py +43 -1
  150. pulumi_oci/datasafe/get_reports.py +23 -1
  151. pulumi_oci/datasafe/get_security_assessment.py +116 -2
  152. pulumi_oci/datasafe/get_security_assessment_checks.py +264 -0
  153. pulumi_oci/datasafe/get_security_assessment_finding.py +64 -4
  154. pulumi_oci/datasafe/get_security_assessment_finding_analytics.py +22 -1
  155. pulumi_oci/datasafe/get_security_assessment_findings.py +75 -8
  156. pulumi_oci/datasafe/get_security_assessment_template_analytics.py +362 -0
  157. pulumi_oci/datasafe/get_security_assessment_template_association_analytics.py +298 -0
  158. pulumi_oci/datasafe/get_security_assessment_template_baseline_comparison.py +347 -0
  159. pulumi_oci/datasafe/get_security_assessments.py +70 -4
  160. pulumi_oci/datasafe/get_security_policies.py +23 -1
  161. pulumi_oci/datasafe/get_security_policy.py +15 -1
  162. pulumi_oci/datasafe/get_security_policy_config.py +296 -0
  163. pulumi_oci/datasafe/get_security_policy_configs.py +342 -0
  164. pulumi_oci/datasafe/get_security_policy_deployment.py +52 -2
  165. pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_state.py +49 -4
  166. pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_states.py +47 -6
  167. pulumi_oci/datasafe/get_security_policy_deployments.py +29 -7
  168. pulumi_oci/datasafe/get_sensitive_column_analytics.py +20 -1
  169. pulumi_oci/datasafe/get_sql_collection_analytics.py +20 -1
  170. pulumi_oci/datasafe/get_sql_collections.py +20 -1
  171. pulumi_oci/datasafe/get_sql_firewall_allowed_sql_analytics.py +2 -2
  172. pulumi_oci/datasafe/get_sql_firewall_allowed_sqls.py +2 -2
  173. pulumi_oci/datasafe/get_sql_firewall_violation_analytics.py +2 -2
  174. pulumi_oci/datasafe/get_sql_firewall_violations.py +2 -2
  175. pulumi_oci/datasafe/get_target_alert_policy_associations.py +0 -34
  176. pulumi_oci/datasafe/get_target_database_group.py +296 -0
  177. pulumi_oci/datasafe/get_target_database_group_group_member.py +146 -0
  178. pulumi_oci/datasafe/get_target_database_groups.py +313 -0
  179. pulumi_oci/datasafe/get_unified_audit_policies.py +386 -0
  180. pulumi_oci/datasafe/get_unified_audit_policy.py +338 -0
  181. pulumi_oci/datasafe/get_unified_audit_policy_definition.py +309 -0
  182. pulumi_oci/datasafe/get_unified_audit_policy_definitions.py +334 -0
  183. pulumi_oci/datasafe/get_user_assessment.py +29 -1
  184. pulumi_oci/datasafe/get_user_assessments.py +45 -1
  185. pulumi_oci/datasafe/outputs.py +7975 -1013
  186. pulumi_oci/datasafe/report.py +84 -0
  187. pulumi_oci/datasafe/report_definition.py +4 -0
  188. pulumi_oci/datasafe/security_assessment.py +425 -82
  189. pulumi_oci/datasafe/security_assessment_check.py +456 -0
  190. pulumi_oci/datasafe/security_assessment_finding.py +818 -0
  191. pulumi_oci/datasafe/security_policy.py +94 -77
  192. pulumi_oci/datasafe/security_policy_config.py +698 -0
  193. pulumi_oci/datasafe/security_policy_deployment.py +272 -67
  194. pulumi_oci/datasafe/security_policy_deployment_management.py +266 -42
  195. pulumi_oci/datasafe/security_policy_management.py +87 -30
  196. pulumi_oci/datasafe/target_alert_policy_association.py +7 -77
  197. pulumi_oci/datasafe/target_database.py +4 -0
  198. pulumi_oci/datasafe/target_database_group.py +679 -0
  199. pulumi_oci/datasafe/target_database_peer_target_database.py +2 -0
  200. pulumi_oci/datasafe/unified_audit_policy.py +836 -0
  201. pulumi_oci/datasafe/unified_audit_policy_definition.py +687 -0
  202. pulumi_oci/datasafe/user_assessment.py +105 -28
  203. pulumi_oci/datascience/__init__.py +10 -0
  204. pulumi_oci/datascience/_inputs.py +6760 -2206
  205. pulumi_oci/datascience/get_job.py +15 -1
  206. pulumi_oci/datascience/get_job_run.py +44 -2
  207. pulumi_oci/datascience/get_model_deployment_model_states.py +251 -0
  208. pulumi_oci/datascience/get_model_group.py +405 -0
  209. pulumi_oci/datascience/get_model_group_artifact_content.py +132 -0
  210. pulumi_oci/datascience/get_model_group_models.py +240 -0
  211. pulumi_oci/datascience/get_model_group_version_histories.py +243 -0
  212. pulumi_oci/{aianomalydetection/get_detection_model.py → datascience/get_model_group_version_history.py} +73 -74
  213. pulumi_oci/datascience/get_model_groups.py +265 -0
  214. pulumi_oci/datascience/get_pipeline_run.py +15 -1
  215. pulumi_oci/datascience/job.py +81 -154
  216. pulumi_oci/datascience/job_run.py +250 -4
  217. pulumi_oci/datascience/model_group.py +1111 -0
  218. pulumi_oci/datascience/model_group_artifact.py +369 -0
  219. pulumi_oci/{aianomalydetection/model.py → datascience/model_group_version_history.py} +172 -187
  220. pulumi_oci/datascience/notebook_session.py +4 -0
  221. pulumi_oci/datascience/outputs.py +17168 -8021
  222. pulumi_oci/datascience/pipeline_run.py +87 -0
  223. pulumi_oci/disasterrecovery/_inputs.py +231 -3
  224. pulumi_oci/disasterrecovery/dr_protection_group.py +24 -0
  225. pulumi_oci/disasterrecovery/outputs.py +446 -12
  226. pulumi_oci/generativeai/_inputs.py +572 -63
  227. pulumi_oci/generativeai/agent_data_ingestion_job.py +48 -0
  228. pulumi_oci/generativeai/agent_data_source.py +7 -81
  229. pulumi_oci/generativeai/agent_knowledge_base.py +35 -25
  230. pulumi_oci/generativeai/agent_tool.py +172 -0
  231. pulumi_oci/generativeai/get_agent_data_ingestion_job.py +26 -1
  232. pulumi_oci/generativeai/get_agent_data_source.py +1 -5
  233. pulumi_oci/generativeai/get_agent_data_sources.py +0 -4
  234. pulumi_oci/generativeai/get_agent_knowledge_base.py +16 -6
  235. pulumi_oci/generativeai/get_agent_knowledge_bases.py +0 -4
  236. pulumi_oci/generativeai/outputs.py +1128 -106
  237. pulumi_oci/goldengate/_inputs.py +3 -3
  238. pulumi_oci/goldengate/connection.py +175 -56
  239. pulumi_oci/goldengate/deployment.py +94 -0
  240. pulumi_oci/goldengate/get_connection.py +20 -4
  241. pulumi_oci/goldengate/get_deployment.py +29 -1
  242. pulumi_oci/goldengate/get_deployments.py +23 -1
  243. pulumi_oci/goldengate/outputs.py +62 -10
  244. pulumi_oci/managementagent/__init__.py +4 -0
  245. pulumi_oci/managementagent/_inputs.py +129 -0
  246. pulumi_oci/managementagent/get_management_agent.py +26 -1
  247. pulumi_oci/managementagent/get_management_agent_install_key.py +43 -1
  248. pulumi_oci/managementagent/get_management_agent_named_credentials_metadata.py +147 -0
  249. pulumi_oci/managementagent/get_named_credential.py +268 -0
  250. pulumi_oci/managementagent/get_named_credentials.py +221 -0
  251. pulumi_oci/managementagent/management_agent.py +48 -0
  252. pulumi_oci/managementagent/management_agent_install_key.py +84 -0
  253. pulumi_oci/managementagent/named_credential.py +706 -0
  254. pulumi_oci/managementagent/outputs.py +515 -0
  255. pulumi_oci/managementdashboard/management_dashboards_import.py +178 -20
  256. pulumi_oci/oci/__init__.py +12 -0
  257. pulumi_oci/oci/_inputs.py +566 -0
  258. pulumi_oci/{aianomalydetection/project.py → oci/api_platform_api_platform_instance.py} +204 -118
  259. pulumi_oci/oci/get_api_platform_api_platform_instance.py +282 -0
  260. pulumi_oci/oci/get_api_platform_api_platform_instances.py +199 -0
  261. pulumi_oci/oci/get_managed_kafka_kafka_cluster.py +380 -0
  262. pulumi_oci/{aianomalydetection/get_ai_private_endpoint.py → oci/get_managed_kafka_kafka_cluster_config.py} +63 -90
  263. pulumi_oci/oci/get_managed_kafka_kafka_cluster_config_version.py +177 -0
  264. pulumi_oci/oci/get_managed_kafka_kafka_cluster_config_versions.py +144 -0
  265. pulumi_oci/oci/get_managed_kafka_kafka_cluster_configs.py +199 -0
  266. pulumi_oci/oci/get_managed_kafka_kafka_clusters.py +199 -0
  267. pulumi_oci/oci/managed_kafka_kafka_cluster.py +984 -0
  268. pulumi_oci/{aianomalydetection/ai_private_endpoint.py → oci/managed_kafka_kafka_cluster_config.py} +138 -232
  269. pulumi_oci/oci/managed_kafka_kafka_cluster_superusers_management.py +352 -0
  270. pulumi_oci/oci/outputs.py +1540 -164
  271. pulumi_oci/opsi/_inputs.py +1001 -149
  272. pulumi_oci/opsi/database_insight.py +22 -3
  273. pulumi_oci/opsi/exadata_insight.py +86 -6
  274. pulumi_oci/opsi/outputs.py +1438 -178
  275. pulumi_oci/psql/configuration.py +109 -19
  276. pulumi_oci/psql/db_system.py +7 -7
  277. pulumi_oci/psql/get_configuration.py +30 -2
  278. pulumi_oci/psql/get_configurations.py +49 -5
  279. pulumi_oci/psql/get_db_system.py +1 -1
  280. pulumi_oci/psql/get_default_configuration.py +30 -4
  281. pulumi_oci/psql/get_default_configurations.py +49 -5
  282. pulumi_oci/psql/outputs.py +47 -14
  283. pulumi_oci/pulumi-plugin.json +1 -1
  284. pulumi_oci/redis/__init__.py +6 -0
  285. pulumi_oci/redis/_inputs.py +217 -0
  286. pulumi_oci/{aianomalydetection/get_detection_data_asset.py → redis/get_oci_cache_config_set.py} +74 -74
  287. pulumi_oci/redis/get_oci_cache_config_sets.py +221 -0
  288. pulumi_oci/redis/get_oci_cache_default_config_set.py +217 -0
  289. pulumi_oci/redis/get_oci_cache_default_config_sets.py +218 -0
  290. pulumi_oci/redis/get_redis_cluster.py +15 -1
  291. pulumi_oci/{aianomalydetection/data_asset.py → redis/oci_cache_config_set.py} +190 -254
  292. pulumi_oci/redis/oci_cache_config_setlist_associated_oci_cache_cluster.py +240 -0
  293. pulumi_oci/redis/outputs.py +713 -0
  294. pulumi_oci/redis/redis_cluster.py +49 -0
  295. pulumi_oci/vault/_inputs.py +198 -0
  296. pulumi_oci/vault/get_secret.py +43 -1
  297. pulumi_oci/vault/outputs.py +434 -0
  298. pulumi_oci/vault/secret.py +103 -0
  299. {pulumi_oci-3.4.0a1755714728.dist-info → pulumi_oci-3.5.0.dist-info}/METADATA +1 -1
  300. {pulumi_oci-3.4.0a1755714728.dist-info → pulumi_oci-3.5.0.dist-info}/RECORD +302 -218
  301. pulumi_oci/aianomalydetection/__init__.py +0 -25
  302. pulumi_oci/aianomalydetection/_inputs.py +0 -1742
  303. pulumi_oci/aianomalydetection/detect_anomaly_job.py +0 -739
  304. pulumi_oci/aianomalydetection/get_ai_private_endpoints.py +0 -199
  305. pulumi_oci/aianomalydetection/get_detect_anomaly_job.py +0 -338
  306. pulumi_oci/aianomalydetection/get_detect_anomaly_jobs.py +0 -254
  307. pulumi_oci/aianomalydetection/get_detection_data_assets.py +0 -213
  308. pulumi_oci/aianomalydetection/get_detection_models.py +0 -213
  309. pulumi_oci/aianomalydetection/get_detection_project.py +0 -239
  310. pulumi_oci/aianomalydetection/get_detection_projects.py +0 -191
  311. pulumi_oci/aianomalydetection/outputs.py +0 -3699
  312. {pulumi_oci-3.4.0a1755714728.dist-info → pulumi_oci-3.5.0.dist-info}/WHEEL +0 -0
  313. {pulumi_oci-3.4.0a1755714728.dist-info → pulumi_oci-3.5.0.dist-info}/top_level.txt +0 -0
@@ -28,13 +28,22 @@ class GetSecurityAssessmentFindingResult:
28
28
  """
29
29
  A collection of values returned by getSecurityAssessmentFinding.
30
30
  """
31
- def __init__(__self__, access_level=None, compartment_id_in_subtree=None, fields=None, filters=None, finding_key=None, findings=None, id=None, is_top_finding=None, references=None, scim_query=None, security_assessment_id=None, severity=None, state=None, target_id=None):
31
+ def __init__(__self__, access_level=None, category=None, compartment_id_in_subtree=None, contains_references=None, contains_severities=None, fields=None, filters=None, finding_key=None, findings=None, id=None, is_top_finding=None, references=None, scim_query=None, security_assessment_id=None, severity=None, state=None, target_id=None, target_ids=None):
32
32
  if access_level and not isinstance(access_level, str):
33
33
  raise TypeError("Expected argument 'access_level' to be a str")
34
34
  pulumi.set(__self__, "access_level", access_level)
35
+ if category and not isinstance(category, str):
36
+ raise TypeError("Expected argument 'category' to be a str")
37
+ pulumi.set(__self__, "category", category)
35
38
  if compartment_id_in_subtree and not isinstance(compartment_id_in_subtree, bool):
36
39
  raise TypeError("Expected argument 'compartment_id_in_subtree' to be a bool")
37
40
  pulumi.set(__self__, "compartment_id_in_subtree", compartment_id_in_subtree)
41
+ if contains_references and not isinstance(contains_references, list):
42
+ raise TypeError("Expected argument 'contains_references' to be a list")
43
+ pulumi.set(__self__, "contains_references", contains_references)
44
+ if contains_severities and not isinstance(contains_severities, list):
45
+ raise TypeError("Expected argument 'contains_severities' to be a list")
46
+ pulumi.set(__self__, "contains_severities", contains_severities)
38
47
  if fields and not isinstance(fields, list):
39
48
  raise TypeError("Expected argument 'fields' to be a list")
40
49
  pulumi.set(__self__, "fields", fields)
@@ -71,17 +80,35 @@ class GetSecurityAssessmentFindingResult:
71
80
  if target_id and not isinstance(target_id, str):
72
81
  raise TypeError("Expected argument 'target_id' to be a str")
73
82
  pulumi.set(__self__, "target_id", target_id)
83
+ if target_ids and not isinstance(target_ids, list):
84
+ raise TypeError("Expected argument 'target_ids' to be a list")
85
+ pulumi.set(__self__, "target_ids", target_ids)
74
86
 
75
87
  @_builtins.property
76
88
  @pulumi.getter(name="accessLevel")
77
89
  def access_level(self) -> Optional[_builtins.str]:
78
90
  return pulumi.get(self, "access_level")
79
91
 
92
+ @_builtins.property
93
+ @pulumi.getter
94
+ def category(self) -> Optional[_builtins.str]:
95
+ return pulumi.get(self, "category")
96
+
80
97
  @_builtins.property
81
98
  @pulumi.getter(name="compartmentIdInSubtree")
82
99
  def compartment_id_in_subtree(self) -> Optional[_builtins.bool]:
83
100
  return pulumi.get(self, "compartment_id_in_subtree")
84
101
 
102
+ @_builtins.property
103
+ @pulumi.getter(name="containsReferences")
104
+ def contains_references(self) -> Optional[Sequence[_builtins.str]]:
105
+ return pulumi.get(self, "contains_references")
106
+
107
+ @_builtins.property
108
+ @pulumi.getter(name="containsSeverities")
109
+ def contains_severities(self) -> Optional[Sequence[_builtins.str]]:
110
+ return pulumi.get(self, "contains_severities")
111
+
85
112
  @_builtins.property
86
113
  @pulumi.getter
87
114
  def fields(self) -> Optional[Sequence[_builtins.str]]:
@@ -145,6 +172,11 @@ class GetSecurityAssessmentFindingResult:
145
172
  def target_id(self) -> Optional[_builtins.str]:
146
173
  return pulumi.get(self, "target_id")
147
174
 
175
+ @_builtins.property
176
+ @pulumi.getter(name="targetIds")
177
+ def target_ids(self) -> Optional[Sequence[_builtins.str]]:
178
+ return pulumi.get(self, "target_ids")
179
+
148
180
 
149
181
  class AwaitableGetSecurityAssessmentFindingResult(GetSecurityAssessmentFindingResult):
150
182
  # pylint: disable=using-constant-test
@@ -153,7 +185,10 @@ class AwaitableGetSecurityAssessmentFindingResult(GetSecurityAssessmentFindingRe
153
185
  yield self
154
186
  return GetSecurityAssessmentFindingResult(
155
187
  access_level=self.access_level,
188
+ category=self.category,
156
189
  compartment_id_in_subtree=self.compartment_id_in_subtree,
190
+ contains_references=self.contains_references,
191
+ contains_severities=self.contains_severities,
157
192
  fields=self.fields,
158
193
  filters=self.filters,
159
194
  finding_key=self.finding_key,
@@ -165,11 +200,15 @@ class AwaitableGetSecurityAssessmentFindingResult(GetSecurityAssessmentFindingRe
165
200
  security_assessment_id=self.security_assessment_id,
166
201
  severity=self.severity,
167
202
  state=self.state,
168
- target_id=self.target_id)
203
+ target_id=self.target_id,
204
+ target_ids=self.target_ids)
169
205
 
170
206
 
171
207
  def get_security_assessment_finding(access_level: Optional[_builtins.str] = None,
208
+ category: Optional[_builtins.str] = None,
172
209
  compartment_id_in_subtree: Optional[_builtins.bool] = None,
210
+ contains_references: Optional[Sequence[_builtins.str]] = None,
211
+ contains_severities: Optional[Sequence[_builtins.str]] = None,
173
212
  fields: Optional[Sequence[_builtins.str]] = None,
174
213
  filters: Optional[Sequence[Union['GetSecurityAssessmentFindingFilterArgs', 'GetSecurityAssessmentFindingFilterArgsDict']]] = None,
175
214
  finding_key: Optional[_builtins.str] = None,
@@ -180,13 +219,17 @@ def get_security_assessment_finding(access_level: Optional[_builtins.str] = None
180
219
  severity: Optional[_builtins.str] = None,
181
220
  state: Optional[_builtins.str] = None,
182
221
  target_id: Optional[_builtins.str] = None,
222
+ target_ids: Optional[Sequence[_builtins.str]] = None,
183
223
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecurityAssessmentFindingResult:
184
224
  """
185
225
  Use this data source to access information about an existing resource.
186
226
  """
187
227
  __args__ = dict()
188
228
  __args__['accessLevel'] = access_level
229
+ __args__['category'] = category
189
230
  __args__['compartmentIdInSubtree'] = compartment_id_in_subtree
231
+ __args__['containsReferences'] = contains_references
232
+ __args__['containsSeverities'] = contains_severities
190
233
  __args__['fields'] = fields
191
234
  __args__['filters'] = filters
192
235
  __args__['findingKey'] = finding_key
@@ -197,12 +240,16 @@ def get_security_assessment_finding(access_level: Optional[_builtins.str] = None
197
240
  __args__['severity'] = severity
198
241
  __args__['state'] = state
199
242
  __args__['targetId'] = target_id
243
+ __args__['targetIds'] = target_ids
200
244
  opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
201
245
  __ret__ = pulumi.runtime.invoke('oci:DataSafe/getSecurityAssessmentFinding:getSecurityAssessmentFinding', __args__, opts=opts, typ=GetSecurityAssessmentFindingResult).value
202
246
 
203
247
  return AwaitableGetSecurityAssessmentFindingResult(
204
248
  access_level=pulumi.get(__ret__, 'access_level'),
249
+ category=pulumi.get(__ret__, 'category'),
205
250
  compartment_id_in_subtree=pulumi.get(__ret__, 'compartment_id_in_subtree'),
251
+ contains_references=pulumi.get(__ret__, 'contains_references'),
252
+ contains_severities=pulumi.get(__ret__, 'contains_severities'),
206
253
  fields=pulumi.get(__ret__, 'fields'),
207
254
  filters=pulumi.get(__ret__, 'filters'),
208
255
  finding_key=pulumi.get(__ret__, 'finding_key'),
@@ -214,9 +261,13 @@ def get_security_assessment_finding(access_level: Optional[_builtins.str] = None
214
261
  security_assessment_id=pulumi.get(__ret__, 'security_assessment_id'),
215
262
  severity=pulumi.get(__ret__, 'severity'),
216
263
  state=pulumi.get(__ret__, 'state'),
217
- target_id=pulumi.get(__ret__, 'target_id'))
264
+ target_id=pulumi.get(__ret__, 'target_id'),
265
+ target_ids=pulumi.get(__ret__, 'target_ids'))
218
266
  def get_security_assessment_finding_output(access_level: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
267
+ category: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
219
268
  compartment_id_in_subtree: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
269
+ contains_references: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
270
+ contains_severities: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
220
271
  fields: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
221
272
  filters: Optional[pulumi.Input[Optional[Sequence[Union['GetSecurityAssessmentFindingFilterArgs', 'GetSecurityAssessmentFindingFilterArgsDict']]]]] = None,
222
273
  finding_key: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
@@ -227,13 +278,17 @@ def get_security_assessment_finding_output(access_level: Optional[pulumi.Input[O
227
278
  severity: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
228
279
  state: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
229
280
  target_id: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
281
+ target_ids: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
230
282
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecurityAssessmentFindingResult]:
231
283
  """
232
284
  Use this data source to access information about an existing resource.
233
285
  """
234
286
  __args__ = dict()
235
287
  __args__['accessLevel'] = access_level
288
+ __args__['category'] = category
236
289
  __args__['compartmentIdInSubtree'] = compartment_id_in_subtree
290
+ __args__['containsReferences'] = contains_references
291
+ __args__['containsSeverities'] = contains_severities
237
292
  __args__['fields'] = fields
238
293
  __args__['filters'] = filters
239
294
  __args__['findingKey'] = finding_key
@@ -244,11 +299,15 @@ def get_security_assessment_finding_output(access_level: Optional[pulumi.Input[O
244
299
  __args__['severity'] = severity
245
300
  __args__['state'] = state
246
301
  __args__['targetId'] = target_id
302
+ __args__['targetIds'] = target_ids
247
303
  opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
248
304
  __ret__ = pulumi.runtime.invoke_output('oci:DataSafe/getSecurityAssessmentFinding:getSecurityAssessmentFinding', __args__, opts=opts, typ=GetSecurityAssessmentFindingResult)
249
305
  return __ret__.apply(lambda __response__: GetSecurityAssessmentFindingResult(
250
306
  access_level=pulumi.get(__response__, 'access_level'),
307
+ category=pulumi.get(__response__, 'category'),
251
308
  compartment_id_in_subtree=pulumi.get(__response__, 'compartment_id_in_subtree'),
309
+ contains_references=pulumi.get(__response__, 'contains_references'),
310
+ contains_severities=pulumi.get(__response__, 'contains_severities'),
252
311
  fields=pulumi.get(__response__, 'fields'),
253
312
  filters=pulumi.get(__response__, 'filters'),
254
313
  finding_key=pulumi.get(__response__, 'finding_key'),
@@ -260,4 +319,5 @@ def get_security_assessment_finding_output(access_level: Optional[pulumi.Input[O
260
319
  security_assessment_id=pulumi.get(__response__, 'security_assessment_id'),
261
320
  severity=pulumi.get(__response__, 'severity'),
262
321
  state=pulumi.get(__response__, 'state'),
263
- target_id=pulumi.get(__response__, 'target_id')))
322
+ target_id=pulumi.get(__response__, 'target_id'),
323
+ target_ids=pulumi.get(__response__, 'target_ids')))
@@ -28,7 +28,7 @@ class GetSecurityAssessmentFindingAnalyticsResult:
28
28
  """
29
29
  A collection of values returned by getSecurityAssessmentFindingAnalytics.
30
30
  """
31
- def __init__(__self__, access_level=None, compartment_id=None, compartment_id_in_subtree=None, filters=None, finding_analytics_collections=None, finding_key=None, group_by=None, id=None, is_top_finding=None, severity=None, top_finding_status=None):
31
+ def __init__(__self__, access_level=None, compartment_id=None, compartment_id_in_subtree=None, filters=None, finding_analytics_collections=None, finding_key=None, group_by=None, id=None, is_top_finding=None, scim_query=None, severity=None, top_finding_status=None):
32
32
  if access_level and not isinstance(access_level, str):
33
33
  raise TypeError("Expected argument 'access_level' to be a str")
34
34
  pulumi.set(__self__, "access_level", access_level)
@@ -56,6 +56,9 @@ class GetSecurityAssessmentFindingAnalyticsResult:
56
56
  if is_top_finding and not isinstance(is_top_finding, bool):
57
57
  raise TypeError("Expected argument 'is_top_finding' to be a bool")
58
58
  pulumi.set(__self__, "is_top_finding", is_top_finding)
59
+ if scim_query and not isinstance(scim_query, str):
60
+ raise TypeError("Expected argument 'scim_query' to be a str")
61
+ pulumi.set(__self__, "scim_query", scim_query)
59
62
  if severity and not isinstance(severity, str):
60
63
  raise TypeError("Expected argument 'severity' to be a str")
61
64
  pulumi.set(__self__, "severity", severity)
@@ -114,6 +117,11 @@ class GetSecurityAssessmentFindingAnalyticsResult:
114
117
  def is_top_finding(self) -> Optional[_builtins.bool]:
115
118
  return pulumi.get(self, "is_top_finding")
116
119
 
120
+ @_builtins.property
121
+ @pulumi.getter(name="scimQuery")
122
+ def scim_query(self) -> Optional[_builtins.str]:
123
+ return pulumi.get(self, "scim_query")
124
+
117
125
  @_builtins.property
118
126
  @pulumi.getter
119
127
  def severity(self) -> Optional[_builtins.str]:
@@ -146,6 +154,7 @@ class AwaitableGetSecurityAssessmentFindingAnalyticsResult(GetSecurityAssessment
146
154
  group_by=self.group_by,
147
155
  id=self.id,
148
156
  is_top_finding=self.is_top_finding,
157
+ scim_query=self.scim_query,
149
158
  severity=self.severity,
150
159
  top_finding_status=self.top_finding_status)
151
160
 
@@ -157,6 +166,7 @@ def get_security_assessment_finding_analytics(access_level: Optional[_builtins.s
157
166
  finding_key: Optional[_builtins.str] = None,
158
167
  group_by: Optional[_builtins.str] = None,
159
168
  is_top_finding: Optional[_builtins.bool] = None,
169
+ scim_query: Optional[_builtins.str] = None,
160
170
  severity: Optional[_builtins.str] = None,
161
171
  top_finding_status: Optional[_builtins.str] = None,
162
172
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecurityAssessmentFindingAnalyticsResult:
@@ -197,6 +207,9 @@ def get_security_assessment_finding_analytics(access_level: Optional[_builtins.s
197
207
  :param _builtins.str finding_key: The unique key that identifies the finding. It is a string and unique within a security assessment.
198
208
  :param _builtins.str group_by: Attribute by which the finding analytics data should be grouped.
199
209
  :param _builtins.bool is_top_finding: A filter to return only the findings that are marked as top findings.
210
+ :param _builtins.str scim_query: The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at [RFC3339](https://tools.ietf.org/html/draft-ietf-scim-api-12). In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
211
+ **Example:** | scimQuery=(severity eq 'high') and (targetId eq 'target_1') scimQuery=(category eq "Users") and (targetId eq "target_1") scimQuery=(reference eq 'CIS') and (targetId eq 'target_1')
212
+ Supported fields: severity reference title category targetId targetName
200
213
  :param _builtins.str severity: A filter to return only findings of a particular risk level.
201
214
  :param _builtins.str top_finding_status: An optional filter to return only the top finding that match the specified status.
202
215
  """
@@ -208,6 +221,7 @@ def get_security_assessment_finding_analytics(access_level: Optional[_builtins.s
208
221
  __args__['findingKey'] = finding_key
209
222
  __args__['groupBy'] = group_by
210
223
  __args__['isTopFinding'] = is_top_finding
224
+ __args__['scimQuery'] = scim_query
211
225
  __args__['severity'] = severity
212
226
  __args__['topFindingStatus'] = top_finding_status
213
227
  opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
@@ -223,6 +237,7 @@ def get_security_assessment_finding_analytics(access_level: Optional[_builtins.s
223
237
  group_by=pulumi.get(__ret__, 'group_by'),
224
238
  id=pulumi.get(__ret__, 'id'),
225
239
  is_top_finding=pulumi.get(__ret__, 'is_top_finding'),
240
+ scim_query=pulumi.get(__ret__, 'scim_query'),
226
241
  severity=pulumi.get(__ret__, 'severity'),
227
242
  top_finding_status=pulumi.get(__ret__, 'top_finding_status'))
228
243
  def get_security_assessment_finding_analytics_output(access_level: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
@@ -232,6 +247,7 @@ def get_security_assessment_finding_analytics_output(access_level: Optional[pulu
232
247
  finding_key: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
233
248
  group_by: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
234
249
  is_top_finding: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
250
+ scim_query: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
235
251
  severity: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
236
252
  top_finding_status: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
237
253
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecurityAssessmentFindingAnalyticsResult]:
@@ -272,6 +288,9 @@ def get_security_assessment_finding_analytics_output(access_level: Optional[pulu
272
288
  :param _builtins.str finding_key: The unique key that identifies the finding. It is a string and unique within a security assessment.
273
289
  :param _builtins.str group_by: Attribute by which the finding analytics data should be grouped.
274
290
  :param _builtins.bool is_top_finding: A filter to return only the findings that are marked as top findings.
291
+ :param _builtins.str scim_query: The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at [RFC3339](https://tools.ietf.org/html/draft-ietf-scim-api-12). In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
292
+ **Example:** | scimQuery=(severity eq 'high') and (targetId eq 'target_1') scimQuery=(category eq "Users") and (targetId eq "target_1") scimQuery=(reference eq 'CIS') and (targetId eq 'target_1')
293
+ Supported fields: severity reference title category targetId targetName
275
294
  :param _builtins.str severity: A filter to return only findings of a particular risk level.
276
295
  :param _builtins.str top_finding_status: An optional filter to return only the top finding that match the specified status.
277
296
  """
@@ -283,6 +302,7 @@ def get_security_assessment_finding_analytics_output(access_level: Optional[pulu
283
302
  __args__['findingKey'] = finding_key
284
303
  __args__['groupBy'] = group_by
285
304
  __args__['isTopFinding'] = is_top_finding
305
+ __args__['scimQuery'] = scim_query
286
306
  __args__['severity'] = severity
287
307
  __args__['topFindingStatus'] = top_finding_status
288
308
  opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
@@ -297,5 +317,6 @@ def get_security_assessment_finding_analytics_output(access_level: Optional[pulu
297
317
  group_by=pulumi.get(__response__, 'group_by'),
298
318
  id=pulumi.get(__response__, 'id'),
299
319
  is_top_finding=pulumi.get(__response__, 'is_top_finding'),
320
+ scim_query=pulumi.get(__response__, 'scim_query'),
300
321
  severity=pulumi.get(__response__, 'severity'),
301
322
  top_finding_status=pulumi.get(__response__, 'top_finding_status')))
@@ -28,13 +28,22 @@ class GetSecurityAssessmentFindingsResult:
28
28
  """
29
29
  A collection of values returned by getSecurityAssessmentFindings.
30
30
  """
31
- def __init__(__self__, access_level=None, compartment_id_in_subtree=None, fields=None, filters=None, finding_key=None, findings=None, id=None, is_top_finding=None, references=None, scim_query=None, security_assessment_id=None, severity=None, state=None, target_id=None):
31
+ def __init__(__self__, access_level=None, category=None, compartment_id_in_subtree=None, contains_references=None, contains_severities=None, fields=None, filters=None, finding_key=None, findings=None, id=None, is_top_finding=None, references=None, scim_query=None, security_assessment_id=None, severity=None, state=None, target_id=None, target_ids=None):
32
32
  if access_level and not isinstance(access_level, str):
33
33
  raise TypeError("Expected argument 'access_level' to be a str")
34
34
  pulumi.set(__self__, "access_level", access_level)
35
+ if category and not isinstance(category, str):
36
+ raise TypeError("Expected argument 'category' to be a str")
37
+ pulumi.set(__self__, "category", category)
35
38
  if compartment_id_in_subtree and not isinstance(compartment_id_in_subtree, bool):
36
39
  raise TypeError("Expected argument 'compartment_id_in_subtree' to be a bool")
37
40
  pulumi.set(__self__, "compartment_id_in_subtree", compartment_id_in_subtree)
41
+ if contains_references and not isinstance(contains_references, list):
42
+ raise TypeError("Expected argument 'contains_references' to be a list")
43
+ pulumi.set(__self__, "contains_references", contains_references)
44
+ if contains_severities and not isinstance(contains_severities, list):
45
+ raise TypeError("Expected argument 'contains_severities' to be a list")
46
+ pulumi.set(__self__, "contains_severities", contains_severities)
38
47
  if fields and not isinstance(fields, list):
39
48
  raise TypeError("Expected argument 'fields' to be a list")
40
49
  pulumi.set(__self__, "fields", fields)
@@ -71,17 +80,38 @@ class GetSecurityAssessmentFindingsResult:
71
80
  if target_id and not isinstance(target_id, str):
72
81
  raise TypeError("Expected argument 'target_id' to be a str")
73
82
  pulumi.set(__self__, "target_id", target_id)
83
+ if target_ids and not isinstance(target_ids, list):
84
+ raise TypeError("Expected argument 'target_ids' to be a list")
85
+ pulumi.set(__self__, "target_ids", target_ids)
74
86
 
75
87
  @_builtins.property
76
88
  @pulumi.getter(name="accessLevel")
77
89
  def access_level(self) -> Optional[_builtins.str]:
78
90
  return pulumi.get(self, "access_level")
79
91
 
92
+ @_builtins.property
93
+ @pulumi.getter
94
+ def category(self) -> Optional[_builtins.str]:
95
+ """
96
+ The category to which the finding belongs to.
97
+ """
98
+ return pulumi.get(self, "category")
99
+
80
100
  @_builtins.property
81
101
  @pulumi.getter(name="compartmentIdInSubtree")
82
102
  def compartment_id_in_subtree(self) -> Optional[_builtins.bool]:
83
103
  return pulumi.get(self, "compartment_id_in_subtree")
84
104
 
105
+ @_builtins.property
106
+ @pulumi.getter(name="containsReferences")
107
+ def contains_references(self) -> Optional[Sequence[_builtins.str]]:
108
+ return pulumi.get(self, "contains_references")
109
+
110
+ @_builtins.property
111
+ @pulumi.getter(name="containsSeverities")
112
+ def contains_severities(self) -> Optional[Sequence[_builtins.str]]:
113
+ return pulumi.get(self, "contains_severities")
114
+
85
115
  @_builtins.property
86
116
  @pulumi.getter
87
117
  def fields(self) -> Optional[Sequence[_builtins.str]]:
@@ -163,6 +193,11 @@ class GetSecurityAssessmentFindingsResult:
163
193
  """
164
194
  return pulumi.get(self, "target_id")
165
195
 
196
+ @_builtins.property
197
+ @pulumi.getter(name="targetIds")
198
+ def target_ids(self) -> Optional[Sequence[_builtins.str]]:
199
+ return pulumi.get(self, "target_ids")
200
+
166
201
 
167
202
  class AwaitableGetSecurityAssessmentFindingsResult(GetSecurityAssessmentFindingsResult):
168
203
  # pylint: disable=using-constant-test
@@ -171,7 +206,10 @@ class AwaitableGetSecurityAssessmentFindingsResult(GetSecurityAssessmentFindings
171
206
  yield self
172
207
  return GetSecurityAssessmentFindingsResult(
173
208
  access_level=self.access_level,
209
+ category=self.category,
174
210
  compartment_id_in_subtree=self.compartment_id_in_subtree,
211
+ contains_references=self.contains_references,
212
+ contains_severities=self.contains_severities,
175
213
  fields=self.fields,
176
214
  filters=self.filters,
177
215
  finding_key=self.finding_key,
@@ -183,11 +221,15 @@ class AwaitableGetSecurityAssessmentFindingsResult(GetSecurityAssessmentFindings
183
221
  security_assessment_id=self.security_assessment_id,
184
222
  severity=self.severity,
185
223
  state=self.state,
186
- target_id=self.target_id)
224
+ target_id=self.target_id,
225
+ target_ids=self.target_ids)
187
226
 
188
227
 
189
228
  def get_security_assessment_findings(access_level: Optional[_builtins.str] = None,
229
+ category: Optional[_builtins.str] = None,
190
230
  compartment_id_in_subtree: Optional[_builtins.bool] = None,
231
+ contains_references: Optional[Sequence[_builtins.str]] = None,
232
+ contains_severities: Optional[Sequence[_builtins.str]] = None,
191
233
  fields: Optional[Sequence[_builtins.str]] = None,
192
234
  filters: Optional[Sequence[Union['GetSecurityAssessmentFindingsFilterArgs', 'GetSecurityAssessmentFindingsFilterArgsDict']]] = None,
193
235
  finding_key: Optional[_builtins.str] = None,
@@ -198,14 +240,16 @@ def get_security_assessment_findings(access_level: Optional[_builtins.str] = Non
198
240
  severity: Optional[_builtins.str] = None,
199
241
  state: Optional[_builtins.str] = None,
200
242
  target_id: Optional[_builtins.str] = None,
243
+ target_ids: Optional[Sequence[_builtins.str]] = None,
201
244
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecurityAssessmentFindingsResult:
202
245
  """
203
246
  This data source provides the list of Security Assessment Findings in Oracle Cloud Infrastructure Data Safe service.
204
247
 
205
- List all the findings from all the targets in the specified compartment.
248
+ Lists all the findings for the specified assessment except for type TEMPLATE. If the assessment is of type TEMPLATE_BASELINE, the findings returned are the security checks with the user-defined severity from the template.
206
249
 
207
250
 
208
251
  :param _builtins.str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
252
+ :param _builtins.str category: The category of the finding.
209
253
  :param _builtins.bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
210
254
  :param Sequence[_builtins.str] fields: Specifies a subset of fields to be returned in the response.
211
255
  :param _builtins.str finding_key: Each finding in security assessment has an associated key (think of key as a finding's name). For a given finding, the key will be the same across targets. The user can use these keys to filter the findings.
@@ -214,15 +258,19 @@ def get_security_assessment_findings(access_level: Optional[_builtins.str] = Non
214
258
  :param _builtins.str scim_query: The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at [RFC3339](https://tools.ietf.org/html/draft-ietf-scim-api-12). In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
215
259
 
216
260
  **Example:** | scimQuery=(severity eq 'high') and (targetId eq 'target_1') scimQuery=(category eq "Users") and (targetId eq "target_1") scimQuery=(reference eq 'CIS') and (targetId eq 'target_1')
217
- Supported fields: severity findingKey reference targetId isTopFinding title category remarks details summary isRiskModified
261
+ Supported fields: severity findingKey reference targetId targetName isTopFinding title category remarks details summary isRiskModified
218
262
  :param _builtins.str security_assessment_id: The OCID of the security assessment.
219
263
  :param _builtins.str severity: A filter to return only findings of a particular risk level.
220
264
  :param _builtins.str state: A filter to return only the findings that match the specified lifecycle states.
221
265
  :param _builtins.str target_id: A filter to return only items related to a specific target OCID.
266
+ :param Sequence[_builtins.str] target_ids: An optional filter to return only findings that match the specified target ids. Use this parameter to filter by multiple target ids.
222
267
  """
223
268
  __args__ = dict()
224
269
  __args__['accessLevel'] = access_level
270
+ __args__['category'] = category
225
271
  __args__['compartmentIdInSubtree'] = compartment_id_in_subtree
272
+ __args__['containsReferences'] = contains_references
273
+ __args__['containsSeverities'] = contains_severities
226
274
  __args__['fields'] = fields
227
275
  __args__['filters'] = filters
228
276
  __args__['findingKey'] = finding_key
@@ -233,12 +281,16 @@ def get_security_assessment_findings(access_level: Optional[_builtins.str] = Non
233
281
  __args__['severity'] = severity
234
282
  __args__['state'] = state
235
283
  __args__['targetId'] = target_id
284
+ __args__['targetIds'] = target_ids
236
285
  opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
237
286
  __ret__ = pulumi.runtime.invoke('oci:DataSafe/getSecurityAssessmentFindings:getSecurityAssessmentFindings', __args__, opts=opts, typ=GetSecurityAssessmentFindingsResult).value
238
287
 
239
288
  return AwaitableGetSecurityAssessmentFindingsResult(
240
289
  access_level=pulumi.get(__ret__, 'access_level'),
290
+ category=pulumi.get(__ret__, 'category'),
241
291
  compartment_id_in_subtree=pulumi.get(__ret__, 'compartment_id_in_subtree'),
292
+ contains_references=pulumi.get(__ret__, 'contains_references'),
293
+ contains_severities=pulumi.get(__ret__, 'contains_severities'),
242
294
  fields=pulumi.get(__ret__, 'fields'),
243
295
  filters=pulumi.get(__ret__, 'filters'),
244
296
  finding_key=pulumi.get(__ret__, 'finding_key'),
@@ -250,9 +302,13 @@ def get_security_assessment_findings(access_level: Optional[_builtins.str] = Non
250
302
  security_assessment_id=pulumi.get(__ret__, 'security_assessment_id'),
251
303
  severity=pulumi.get(__ret__, 'severity'),
252
304
  state=pulumi.get(__ret__, 'state'),
253
- target_id=pulumi.get(__ret__, 'target_id'))
305
+ target_id=pulumi.get(__ret__, 'target_id'),
306
+ target_ids=pulumi.get(__ret__, 'target_ids'))
254
307
  def get_security_assessment_findings_output(access_level: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
308
+ category: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
255
309
  compartment_id_in_subtree: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
310
+ contains_references: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
311
+ contains_severities: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
256
312
  fields: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
257
313
  filters: Optional[pulumi.Input[Optional[Sequence[Union['GetSecurityAssessmentFindingsFilterArgs', 'GetSecurityAssessmentFindingsFilterArgsDict']]]]] = None,
258
314
  finding_key: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
@@ -263,14 +319,16 @@ def get_security_assessment_findings_output(access_level: Optional[pulumi.Input[
263
319
  severity: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
264
320
  state: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
265
321
  target_id: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
322
+ target_ids: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
266
323
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecurityAssessmentFindingsResult]:
267
324
  """
268
325
  This data source provides the list of Security Assessment Findings in Oracle Cloud Infrastructure Data Safe service.
269
326
 
270
- List all the findings from all the targets in the specified compartment.
327
+ Lists all the findings for the specified assessment except for type TEMPLATE. If the assessment is of type TEMPLATE_BASELINE, the findings returned are the security checks with the user-defined severity from the template.
271
328
 
272
329
 
273
330
  :param _builtins.str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
331
+ :param _builtins.str category: The category of the finding.
274
332
  :param _builtins.bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
275
333
  :param Sequence[_builtins.str] fields: Specifies a subset of fields to be returned in the response.
276
334
  :param _builtins.str finding_key: Each finding in security assessment has an associated key (think of key as a finding's name). For a given finding, the key will be the same across targets. The user can use these keys to filter the findings.
@@ -279,15 +337,19 @@ def get_security_assessment_findings_output(access_level: Optional[pulumi.Input[
279
337
  :param _builtins.str scim_query: The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at [RFC3339](https://tools.ietf.org/html/draft-ietf-scim-api-12). In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)
280
338
 
281
339
  **Example:** | scimQuery=(severity eq 'high') and (targetId eq 'target_1') scimQuery=(category eq "Users") and (targetId eq "target_1") scimQuery=(reference eq 'CIS') and (targetId eq 'target_1')
282
- Supported fields: severity findingKey reference targetId isTopFinding title category remarks details summary isRiskModified
340
+ Supported fields: severity findingKey reference targetId targetName isTopFinding title category remarks details summary isRiskModified
283
341
  :param _builtins.str security_assessment_id: The OCID of the security assessment.
284
342
  :param _builtins.str severity: A filter to return only findings of a particular risk level.
285
343
  :param _builtins.str state: A filter to return only the findings that match the specified lifecycle states.
286
344
  :param _builtins.str target_id: A filter to return only items related to a specific target OCID.
345
+ :param Sequence[_builtins.str] target_ids: An optional filter to return only findings that match the specified target ids. Use this parameter to filter by multiple target ids.
287
346
  """
288
347
  __args__ = dict()
289
348
  __args__['accessLevel'] = access_level
349
+ __args__['category'] = category
290
350
  __args__['compartmentIdInSubtree'] = compartment_id_in_subtree
351
+ __args__['containsReferences'] = contains_references
352
+ __args__['containsSeverities'] = contains_severities
291
353
  __args__['fields'] = fields
292
354
  __args__['filters'] = filters
293
355
  __args__['findingKey'] = finding_key
@@ -298,11 +360,15 @@ def get_security_assessment_findings_output(access_level: Optional[pulumi.Input[
298
360
  __args__['severity'] = severity
299
361
  __args__['state'] = state
300
362
  __args__['targetId'] = target_id
363
+ __args__['targetIds'] = target_ids
301
364
  opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
302
365
  __ret__ = pulumi.runtime.invoke_output('oci:DataSafe/getSecurityAssessmentFindings:getSecurityAssessmentFindings', __args__, opts=opts, typ=GetSecurityAssessmentFindingsResult)
303
366
  return __ret__.apply(lambda __response__: GetSecurityAssessmentFindingsResult(
304
367
  access_level=pulumi.get(__response__, 'access_level'),
368
+ category=pulumi.get(__response__, 'category'),
305
369
  compartment_id_in_subtree=pulumi.get(__response__, 'compartment_id_in_subtree'),
370
+ contains_references=pulumi.get(__response__, 'contains_references'),
371
+ contains_severities=pulumi.get(__response__, 'contains_severities'),
306
372
  fields=pulumi.get(__response__, 'fields'),
307
373
  filters=pulumi.get(__response__, 'filters'),
308
374
  finding_key=pulumi.get(__response__, 'finding_key'),
@@ -314,4 +380,5 @@ def get_security_assessment_findings_output(access_level: Optional[pulumi.Input[
314
380
  security_assessment_id=pulumi.get(__response__, 'security_assessment_id'),
315
381
  severity=pulumi.get(__response__, 'severity'),
316
382
  state=pulumi.get(__response__, 'state'),
317
- target_id=pulumi.get(__response__, 'target_id')))
383
+ target_id=pulumi.get(__response__, 'target_id'),
384
+ target_ids=pulumi.get(__response__, 'target_ids')))