pulumi-oci 3.5.0a1756363728__py3-none-any.whl → 3.6.0a1756509375__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (136) hide show
  1. pulumi_oci/__init__.py +80 -0
  2. pulumi_oci/config/__init__.pyi +12 -17
  3. pulumi_oci/config/vars.py +12 -17
  4. pulumi_oci/core/compute_gpu_memory_fabric.py +28 -0
  5. pulumi_oci/core/get_compute_gpu_memory_fabric.py +15 -1
  6. pulumi_oci/core/outputs.py +11 -0
  7. pulumi_oci/database/_inputs.py +257 -12
  8. pulumi_oci/database/data_guard_association.py +98 -0
  9. pulumi_oci/database/database.py +28 -0
  10. pulumi_oci/database/db_node.py +56 -0
  11. pulumi_oci/database/db_system.py +108 -14
  12. pulumi_oci/database/exadb_vm_cluster.py +49 -0
  13. pulumi_oci/database/exascale_db_storage_vault.py +28 -0
  14. pulumi_oci/database/get_data_guard_association.py +23 -1
  15. pulumi_oci/database/get_database.py +15 -1
  16. pulumi_oci/database/get_db_node.py +29 -1
  17. pulumi_oci/database/get_db_system_shapes.py +25 -6
  18. pulumi_oci/database/get_db_system_storage_performances.py +20 -3
  19. pulumi_oci/database/get_db_versions.py +20 -1
  20. pulumi_oci/database/get_exadb_vm_cluster.py +15 -1
  21. pulumi_oci/database/get_exascale_db_storage_vault.py +15 -1
  22. pulumi_oci/database/get_exascale_db_storage_vaults.py +87 -8
  23. pulumi_oci/database/get_gi_versions.py +25 -6
  24. pulumi_oci/database/outputs.py +575 -8
  25. pulumi_oci/datasafe/__init__.py +24 -0
  26. pulumi_oci/datasafe/_inputs.py +3669 -1537
  27. pulumi_oci/datasafe/attribute_set.py +693 -0
  28. pulumi_oci/datasafe/audit_profile.py +356 -95
  29. pulumi_oci/datasafe/audit_profile_management.py +389 -129
  30. pulumi_oci/datasafe/audit_trail.py +47 -0
  31. pulumi_oci/datasafe/audit_trail_management.py +49 -0
  32. pulumi_oci/datasafe/get_alerts.py +2 -2
  33. pulumi_oci/datasafe/get_attribute_set.py +295 -0
  34. pulumi_oci/datasafe/get_attribute_set_associated_resources.py +188 -0
  35. pulumi_oci/datasafe/get_attribute_sets.py +340 -0
  36. pulumi_oci/datasafe/get_audit_archive_retrievals.py +20 -1
  37. pulumi_oci/datasafe/get_audit_events.py +2 -2
  38. pulumi_oci/datasafe/get_audit_policies.py +20 -1
  39. pulumi_oci/datasafe/get_audit_profile.py +78 -8
  40. pulumi_oci/datasafe/get_audit_profile_target_overrides.py +163 -0
  41. pulumi_oci/datasafe/get_audit_profiles.py +50 -9
  42. pulumi_oci/datasafe/get_audit_trail.py +15 -1
  43. pulumi_oci/datasafe/get_audit_trails.py +20 -1
  44. pulumi_oci/datasafe/get_database_security_configs.py +20 -1
  45. pulumi_oci/datasafe/get_discovery_analytics.py +39 -1
  46. pulumi_oci/datasafe/get_masking_analytics.py +42 -1
  47. pulumi_oci/datasafe/get_onprem_connectors.py +26 -23
  48. pulumi_oci/datasafe/get_report.py +43 -1
  49. pulumi_oci/datasafe/get_reports.py +23 -1
  50. pulumi_oci/datasafe/get_security_assessment.py +116 -2
  51. pulumi_oci/datasafe/get_security_assessment_checks.py +264 -0
  52. pulumi_oci/datasafe/get_security_assessment_finding.py +64 -4
  53. pulumi_oci/datasafe/get_security_assessment_findings.py +73 -6
  54. pulumi_oci/datasafe/get_security_assessment_template_analytics.py +362 -0
  55. pulumi_oci/datasafe/get_security_assessment_template_association_analytics.py +298 -0
  56. pulumi_oci/datasafe/get_security_assessment_template_baseline_comparison.py +347 -0
  57. pulumi_oci/datasafe/get_security_assessments.py +68 -2
  58. pulumi_oci/datasafe/get_security_policies.py +23 -1
  59. pulumi_oci/datasafe/get_security_policy.py +15 -1
  60. pulumi_oci/datasafe/get_security_policy_config.py +296 -0
  61. pulumi_oci/datasafe/get_security_policy_configs.py +342 -0
  62. pulumi_oci/datasafe/get_security_policy_deployment.py +52 -2
  63. pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_state.py +49 -4
  64. pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_states.py +47 -6
  65. pulumi_oci/datasafe/get_security_policy_deployments.py +29 -7
  66. pulumi_oci/datasafe/get_sensitive_column_analytics.py +20 -1
  67. pulumi_oci/datasafe/get_sql_collection_analytics.py +20 -1
  68. pulumi_oci/datasafe/get_sql_collections.py +20 -1
  69. pulumi_oci/datasafe/get_sql_firewall_allowed_sql_analytics.py +2 -2
  70. pulumi_oci/datasafe/get_sql_firewall_allowed_sqls.py +2 -2
  71. pulumi_oci/datasafe/get_sql_firewall_violation_analytics.py +2 -2
  72. pulumi_oci/datasafe/get_sql_firewall_violations.py +2 -2
  73. pulumi_oci/datasafe/get_target_alert_policy_associations.py +0 -34
  74. pulumi_oci/datasafe/get_target_database_group.py +296 -0
  75. pulumi_oci/datasafe/get_target_database_group_group_member.py +146 -0
  76. pulumi_oci/datasafe/get_target_database_groups.py +313 -0
  77. pulumi_oci/datasafe/get_unified_audit_policies.py +386 -0
  78. pulumi_oci/datasafe/get_unified_audit_policy.py +338 -0
  79. pulumi_oci/datasafe/get_unified_audit_policy_definition.py +309 -0
  80. pulumi_oci/datasafe/get_unified_audit_policy_definitions.py +334 -0
  81. pulumi_oci/datasafe/get_user_assessment.py +29 -1
  82. pulumi_oci/datasafe/get_user_assessments.py +45 -1
  83. pulumi_oci/datasafe/outputs.py +6964 -192
  84. pulumi_oci/datasafe/report.py +84 -0
  85. pulumi_oci/datasafe/report_definition.py +4 -0
  86. pulumi_oci/datasafe/security_assessment.py +425 -82
  87. pulumi_oci/datasafe/security_assessment_check.py +456 -0
  88. pulumi_oci/datasafe/security_assessment_finding.py +818 -0
  89. pulumi_oci/datasafe/security_policy.py +94 -77
  90. pulumi_oci/datasafe/security_policy_config.py +698 -0
  91. pulumi_oci/datasafe/security_policy_deployment.py +272 -67
  92. pulumi_oci/datasafe/security_policy_deployment_management.py +266 -42
  93. pulumi_oci/datasafe/security_policy_management.py +87 -30
  94. pulumi_oci/datasafe/target_alert_policy_association.py +7 -77
  95. pulumi_oci/datasafe/target_database.py +4 -0
  96. pulumi_oci/datasafe/target_database_group.py +679 -0
  97. pulumi_oci/datasafe/target_database_peer_target_database.py +2 -0
  98. pulumi_oci/datasafe/unified_audit_policy.py +836 -0
  99. pulumi_oci/datasafe/unified_audit_policy_definition.py +687 -0
  100. pulumi_oci/datasafe/user_assessment.py +105 -28
  101. pulumi_oci/disasterrecovery/_inputs.py +231 -3
  102. pulumi_oci/disasterrecovery/dr_protection_group.py +24 -0
  103. pulumi_oci/disasterrecovery/outputs.py +446 -12
  104. pulumi_oci/generativeai/_inputs.py +572 -63
  105. pulumi_oci/generativeai/agent_data_ingestion_job.py +48 -0
  106. pulumi_oci/generativeai/agent_data_source.py +7 -81
  107. pulumi_oci/generativeai/agent_knowledge_base.py +35 -25
  108. pulumi_oci/generativeai/agent_tool.py +172 -0
  109. pulumi_oci/generativeai/get_agent_data_ingestion_job.py +26 -1
  110. pulumi_oci/generativeai/get_agent_data_source.py +1 -5
  111. pulumi_oci/generativeai/get_agent_data_sources.py +0 -4
  112. pulumi_oci/generativeai/get_agent_knowledge_base.py +16 -6
  113. pulumi_oci/generativeai/get_agent_knowledge_bases.py +0 -4
  114. pulumi_oci/generativeai/outputs.py +1128 -106
  115. pulumi_oci/goldengate/deployment.py +94 -0
  116. pulumi_oci/goldengate/get_deployment.py +29 -1
  117. pulumi_oci/goldengate/get_deployments.py +23 -1
  118. pulumi_oci/goldengate/outputs.py +35 -2
  119. pulumi_oci/oci/__init__.py +9 -0
  120. pulumi_oci/oci/_inputs.py +420 -0
  121. pulumi_oci/oci/get_managed_kafka_kafka_cluster.py +380 -0
  122. pulumi_oci/oci/get_managed_kafka_kafka_cluster_config.py +254 -0
  123. pulumi_oci/oci/get_managed_kafka_kafka_cluster_config_version.py +177 -0
  124. pulumi_oci/oci/get_managed_kafka_kafka_cluster_config_versions.py +144 -0
  125. pulumi_oci/oci/get_managed_kafka_kafka_cluster_configs.py +199 -0
  126. pulumi_oci/oci/get_managed_kafka_kafka_clusters.py +199 -0
  127. pulumi_oci/oci/managed_kafka_kafka_cluster.py +984 -0
  128. pulumi_oci/oci/managed_kafka_kafka_cluster_config.py +549 -0
  129. pulumi_oci/oci/managed_kafka_kafka_cluster_superusers_management.py +352 -0
  130. pulumi_oci/oci/outputs.py +1009 -0
  131. pulumi_oci/provider.py +44 -63
  132. pulumi_oci/pulumi-plugin.json +1 -1
  133. {pulumi_oci-3.5.0a1756363728.dist-info → pulumi_oci-3.6.0a1756509375.dist-info}/METADATA +1 -1
  134. {pulumi_oci-3.5.0a1756363728.dist-info → pulumi_oci-3.6.0a1756509375.dist-info}/RECORD +136 -103
  135. {pulumi_oci-3.5.0a1756363728.dist-info → pulumi_oci-3.6.0a1756509375.dist-info}/WHEEL +0 -0
  136. {pulumi_oci-3.5.0a1756363728.dist-info → pulumi_oci-3.6.0a1756509375.dist-info}/top_level.txt +0 -0
@@ -28,13 +28,22 @@ class GetSecurityAssessmentFindingResult:
28
28
  """
29
29
  A collection of values returned by getSecurityAssessmentFinding.
30
30
  """
31
- def __init__(__self__, access_level=None, compartment_id_in_subtree=None, fields=None, filters=None, finding_key=None, findings=None, id=None, is_top_finding=None, references=None, scim_query=None, security_assessment_id=None, severity=None, state=None, target_id=None):
31
+ def __init__(__self__, access_level=None, category=None, compartment_id_in_subtree=None, contains_references=None, contains_severities=None, fields=None, filters=None, finding_key=None, findings=None, id=None, is_top_finding=None, references=None, scim_query=None, security_assessment_id=None, severity=None, state=None, target_id=None, target_ids=None):
32
32
  if access_level and not isinstance(access_level, str):
33
33
  raise TypeError("Expected argument 'access_level' to be a str")
34
34
  pulumi.set(__self__, "access_level", access_level)
35
+ if category and not isinstance(category, str):
36
+ raise TypeError("Expected argument 'category' to be a str")
37
+ pulumi.set(__self__, "category", category)
35
38
  if compartment_id_in_subtree and not isinstance(compartment_id_in_subtree, bool):
36
39
  raise TypeError("Expected argument 'compartment_id_in_subtree' to be a bool")
37
40
  pulumi.set(__self__, "compartment_id_in_subtree", compartment_id_in_subtree)
41
+ if contains_references and not isinstance(contains_references, list):
42
+ raise TypeError("Expected argument 'contains_references' to be a list")
43
+ pulumi.set(__self__, "contains_references", contains_references)
44
+ if contains_severities and not isinstance(contains_severities, list):
45
+ raise TypeError("Expected argument 'contains_severities' to be a list")
46
+ pulumi.set(__self__, "contains_severities", contains_severities)
38
47
  if fields and not isinstance(fields, list):
39
48
  raise TypeError("Expected argument 'fields' to be a list")
40
49
  pulumi.set(__self__, "fields", fields)
@@ -71,17 +80,35 @@ class GetSecurityAssessmentFindingResult:
71
80
  if target_id and not isinstance(target_id, str):
72
81
  raise TypeError("Expected argument 'target_id' to be a str")
73
82
  pulumi.set(__self__, "target_id", target_id)
83
+ if target_ids and not isinstance(target_ids, list):
84
+ raise TypeError("Expected argument 'target_ids' to be a list")
85
+ pulumi.set(__self__, "target_ids", target_ids)
74
86
 
75
87
  @_builtins.property
76
88
  @pulumi.getter(name="accessLevel")
77
89
  def access_level(self) -> Optional[_builtins.str]:
78
90
  return pulumi.get(self, "access_level")
79
91
 
92
+ @_builtins.property
93
+ @pulumi.getter
94
+ def category(self) -> Optional[_builtins.str]:
95
+ return pulumi.get(self, "category")
96
+
80
97
  @_builtins.property
81
98
  @pulumi.getter(name="compartmentIdInSubtree")
82
99
  def compartment_id_in_subtree(self) -> Optional[_builtins.bool]:
83
100
  return pulumi.get(self, "compartment_id_in_subtree")
84
101
 
102
+ @_builtins.property
103
+ @pulumi.getter(name="containsReferences")
104
+ def contains_references(self) -> Optional[Sequence[_builtins.str]]:
105
+ return pulumi.get(self, "contains_references")
106
+
107
+ @_builtins.property
108
+ @pulumi.getter(name="containsSeverities")
109
+ def contains_severities(self) -> Optional[Sequence[_builtins.str]]:
110
+ return pulumi.get(self, "contains_severities")
111
+
85
112
  @_builtins.property
86
113
  @pulumi.getter
87
114
  def fields(self) -> Optional[Sequence[_builtins.str]]:
@@ -145,6 +172,11 @@ class GetSecurityAssessmentFindingResult:
145
172
  def target_id(self) -> Optional[_builtins.str]:
146
173
  return pulumi.get(self, "target_id")
147
174
 
175
+ @_builtins.property
176
+ @pulumi.getter(name="targetIds")
177
+ def target_ids(self) -> Optional[Sequence[_builtins.str]]:
178
+ return pulumi.get(self, "target_ids")
179
+
148
180
 
149
181
  class AwaitableGetSecurityAssessmentFindingResult(GetSecurityAssessmentFindingResult):
150
182
  # pylint: disable=using-constant-test
@@ -153,7 +185,10 @@ class AwaitableGetSecurityAssessmentFindingResult(GetSecurityAssessmentFindingRe
153
185
  yield self
154
186
  return GetSecurityAssessmentFindingResult(
155
187
  access_level=self.access_level,
188
+ category=self.category,
156
189
  compartment_id_in_subtree=self.compartment_id_in_subtree,
190
+ contains_references=self.contains_references,
191
+ contains_severities=self.contains_severities,
157
192
  fields=self.fields,
158
193
  filters=self.filters,
159
194
  finding_key=self.finding_key,
@@ -165,11 +200,15 @@ class AwaitableGetSecurityAssessmentFindingResult(GetSecurityAssessmentFindingRe
165
200
  security_assessment_id=self.security_assessment_id,
166
201
  severity=self.severity,
167
202
  state=self.state,
168
- target_id=self.target_id)
203
+ target_id=self.target_id,
204
+ target_ids=self.target_ids)
169
205
 
170
206
 
171
207
  def get_security_assessment_finding(access_level: Optional[_builtins.str] = None,
208
+ category: Optional[_builtins.str] = None,
172
209
  compartment_id_in_subtree: Optional[_builtins.bool] = None,
210
+ contains_references: Optional[Sequence[_builtins.str]] = None,
211
+ contains_severities: Optional[Sequence[_builtins.str]] = None,
173
212
  fields: Optional[Sequence[_builtins.str]] = None,
174
213
  filters: Optional[Sequence[Union['GetSecurityAssessmentFindingFilterArgs', 'GetSecurityAssessmentFindingFilterArgsDict']]] = None,
175
214
  finding_key: Optional[_builtins.str] = None,
@@ -180,13 +219,17 @@ def get_security_assessment_finding(access_level: Optional[_builtins.str] = None
180
219
  severity: Optional[_builtins.str] = None,
181
220
  state: Optional[_builtins.str] = None,
182
221
  target_id: Optional[_builtins.str] = None,
222
+ target_ids: Optional[Sequence[_builtins.str]] = None,
183
223
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecurityAssessmentFindingResult:
184
224
  """
185
225
  Use this data source to access information about an existing resource.
186
226
  """
187
227
  __args__ = dict()
188
228
  __args__['accessLevel'] = access_level
229
+ __args__['category'] = category
189
230
  __args__['compartmentIdInSubtree'] = compartment_id_in_subtree
231
+ __args__['containsReferences'] = contains_references
232
+ __args__['containsSeverities'] = contains_severities
190
233
  __args__['fields'] = fields
191
234
  __args__['filters'] = filters
192
235
  __args__['findingKey'] = finding_key
@@ -197,12 +240,16 @@ def get_security_assessment_finding(access_level: Optional[_builtins.str] = None
197
240
  __args__['severity'] = severity
198
241
  __args__['state'] = state
199
242
  __args__['targetId'] = target_id
243
+ __args__['targetIds'] = target_ids
200
244
  opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
201
245
  __ret__ = pulumi.runtime.invoke('oci:DataSafe/getSecurityAssessmentFinding:getSecurityAssessmentFinding', __args__, opts=opts, typ=GetSecurityAssessmentFindingResult).value
202
246
 
203
247
  return AwaitableGetSecurityAssessmentFindingResult(
204
248
  access_level=pulumi.get(__ret__, 'access_level'),
249
+ category=pulumi.get(__ret__, 'category'),
205
250
  compartment_id_in_subtree=pulumi.get(__ret__, 'compartment_id_in_subtree'),
251
+ contains_references=pulumi.get(__ret__, 'contains_references'),
252
+ contains_severities=pulumi.get(__ret__, 'contains_severities'),
206
253
  fields=pulumi.get(__ret__, 'fields'),
207
254
  filters=pulumi.get(__ret__, 'filters'),
208
255
  finding_key=pulumi.get(__ret__, 'finding_key'),
@@ -214,9 +261,13 @@ def get_security_assessment_finding(access_level: Optional[_builtins.str] = None
214
261
  security_assessment_id=pulumi.get(__ret__, 'security_assessment_id'),
215
262
  severity=pulumi.get(__ret__, 'severity'),
216
263
  state=pulumi.get(__ret__, 'state'),
217
- target_id=pulumi.get(__ret__, 'target_id'))
264
+ target_id=pulumi.get(__ret__, 'target_id'),
265
+ target_ids=pulumi.get(__ret__, 'target_ids'))
218
266
  def get_security_assessment_finding_output(access_level: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
267
+ category: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
219
268
  compartment_id_in_subtree: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
269
+ contains_references: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
270
+ contains_severities: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
220
271
  fields: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
221
272
  filters: Optional[pulumi.Input[Optional[Sequence[Union['GetSecurityAssessmentFindingFilterArgs', 'GetSecurityAssessmentFindingFilterArgsDict']]]]] = None,
222
273
  finding_key: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
@@ -227,13 +278,17 @@ def get_security_assessment_finding_output(access_level: Optional[pulumi.Input[O
227
278
  severity: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
228
279
  state: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
229
280
  target_id: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
281
+ target_ids: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
230
282
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecurityAssessmentFindingResult]:
231
283
  """
232
284
  Use this data source to access information about an existing resource.
233
285
  """
234
286
  __args__ = dict()
235
287
  __args__['accessLevel'] = access_level
288
+ __args__['category'] = category
236
289
  __args__['compartmentIdInSubtree'] = compartment_id_in_subtree
290
+ __args__['containsReferences'] = contains_references
291
+ __args__['containsSeverities'] = contains_severities
237
292
  __args__['fields'] = fields
238
293
  __args__['filters'] = filters
239
294
  __args__['findingKey'] = finding_key
@@ -244,11 +299,15 @@ def get_security_assessment_finding_output(access_level: Optional[pulumi.Input[O
244
299
  __args__['severity'] = severity
245
300
  __args__['state'] = state
246
301
  __args__['targetId'] = target_id
302
+ __args__['targetIds'] = target_ids
247
303
  opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
248
304
  __ret__ = pulumi.runtime.invoke_output('oci:DataSafe/getSecurityAssessmentFinding:getSecurityAssessmentFinding', __args__, opts=opts, typ=GetSecurityAssessmentFindingResult)
249
305
  return __ret__.apply(lambda __response__: GetSecurityAssessmentFindingResult(
250
306
  access_level=pulumi.get(__response__, 'access_level'),
307
+ category=pulumi.get(__response__, 'category'),
251
308
  compartment_id_in_subtree=pulumi.get(__response__, 'compartment_id_in_subtree'),
309
+ contains_references=pulumi.get(__response__, 'contains_references'),
310
+ contains_severities=pulumi.get(__response__, 'contains_severities'),
252
311
  fields=pulumi.get(__response__, 'fields'),
253
312
  filters=pulumi.get(__response__, 'filters'),
254
313
  finding_key=pulumi.get(__response__, 'finding_key'),
@@ -260,4 +319,5 @@ def get_security_assessment_finding_output(access_level: Optional[pulumi.Input[O
260
319
  security_assessment_id=pulumi.get(__response__, 'security_assessment_id'),
261
320
  severity=pulumi.get(__response__, 'severity'),
262
321
  state=pulumi.get(__response__, 'state'),
263
- target_id=pulumi.get(__response__, 'target_id')))
322
+ target_id=pulumi.get(__response__, 'target_id'),
323
+ target_ids=pulumi.get(__response__, 'target_ids')))
@@ -28,13 +28,22 @@ class GetSecurityAssessmentFindingsResult:
28
28
  """
29
29
  A collection of values returned by getSecurityAssessmentFindings.
30
30
  """
31
- def __init__(__self__, access_level=None, compartment_id_in_subtree=None, fields=None, filters=None, finding_key=None, findings=None, id=None, is_top_finding=None, references=None, scim_query=None, security_assessment_id=None, severity=None, state=None, target_id=None):
31
+ def __init__(__self__, access_level=None, category=None, compartment_id_in_subtree=None, contains_references=None, contains_severities=None, fields=None, filters=None, finding_key=None, findings=None, id=None, is_top_finding=None, references=None, scim_query=None, security_assessment_id=None, severity=None, state=None, target_id=None, target_ids=None):
32
32
  if access_level and not isinstance(access_level, str):
33
33
  raise TypeError("Expected argument 'access_level' to be a str")
34
34
  pulumi.set(__self__, "access_level", access_level)
35
+ if category and not isinstance(category, str):
36
+ raise TypeError("Expected argument 'category' to be a str")
37
+ pulumi.set(__self__, "category", category)
35
38
  if compartment_id_in_subtree and not isinstance(compartment_id_in_subtree, bool):
36
39
  raise TypeError("Expected argument 'compartment_id_in_subtree' to be a bool")
37
40
  pulumi.set(__self__, "compartment_id_in_subtree", compartment_id_in_subtree)
41
+ if contains_references and not isinstance(contains_references, list):
42
+ raise TypeError("Expected argument 'contains_references' to be a list")
43
+ pulumi.set(__self__, "contains_references", contains_references)
44
+ if contains_severities and not isinstance(contains_severities, list):
45
+ raise TypeError("Expected argument 'contains_severities' to be a list")
46
+ pulumi.set(__self__, "contains_severities", contains_severities)
38
47
  if fields and not isinstance(fields, list):
39
48
  raise TypeError("Expected argument 'fields' to be a list")
40
49
  pulumi.set(__self__, "fields", fields)
@@ -71,17 +80,38 @@ class GetSecurityAssessmentFindingsResult:
71
80
  if target_id and not isinstance(target_id, str):
72
81
  raise TypeError("Expected argument 'target_id' to be a str")
73
82
  pulumi.set(__self__, "target_id", target_id)
83
+ if target_ids and not isinstance(target_ids, list):
84
+ raise TypeError("Expected argument 'target_ids' to be a list")
85
+ pulumi.set(__self__, "target_ids", target_ids)
74
86
 
75
87
  @_builtins.property
76
88
  @pulumi.getter(name="accessLevel")
77
89
  def access_level(self) -> Optional[_builtins.str]:
78
90
  return pulumi.get(self, "access_level")
79
91
 
92
+ @_builtins.property
93
+ @pulumi.getter
94
+ def category(self) -> Optional[_builtins.str]:
95
+ """
96
+ The category to which the finding belongs to.
97
+ """
98
+ return pulumi.get(self, "category")
99
+
80
100
  @_builtins.property
81
101
  @pulumi.getter(name="compartmentIdInSubtree")
82
102
  def compartment_id_in_subtree(self) -> Optional[_builtins.bool]:
83
103
  return pulumi.get(self, "compartment_id_in_subtree")
84
104
 
105
+ @_builtins.property
106
+ @pulumi.getter(name="containsReferences")
107
+ def contains_references(self) -> Optional[Sequence[_builtins.str]]:
108
+ return pulumi.get(self, "contains_references")
109
+
110
+ @_builtins.property
111
+ @pulumi.getter(name="containsSeverities")
112
+ def contains_severities(self) -> Optional[Sequence[_builtins.str]]:
113
+ return pulumi.get(self, "contains_severities")
114
+
85
115
  @_builtins.property
86
116
  @pulumi.getter
87
117
  def fields(self) -> Optional[Sequence[_builtins.str]]:
@@ -163,6 +193,11 @@ class GetSecurityAssessmentFindingsResult:
163
193
  """
164
194
  return pulumi.get(self, "target_id")
165
195
 
196
+ @_builtins.property
197
+ @pulumi.getter(name="targetIds")
198
+ def target_ids(self) -> Optional[Sequence[_builtins.str]]:
199
+ return pulumi.get(self, "target_ids")
200
+
166
201
 
167
202
  class AwaitableGetSecurityAssessmentFindingsResult(GetSecurityAssessmentFindingsResult):
168
203
  # pylint: disable=using-constant-test
@@ -171,7 +206,10 @@ class AwaitableGetSecurityAssessmentFindingsResult(GetSecurityAssessmentFindings
171
206
  yield self
172
207
  return GetSecurityAssessmentFindingsResult(
173
208
  access_level=self.access_level,
209
+ category=self.category,
174
210
  compartment_id_in_subtree=self.compartment_id_in_subtree,
211
+ contains_references=self.contains_references,
212
+ contains_severities=self.contains_severities,
175
213
  fields=self.fields,
176
214
  filters=self.filters,
177
215
  finding_key=self.finding_key,
@@ -183,11 +221,15 @@ class AwaitableGetSecurityAssessmentFindingsResult(GetSecurityAssessmentFindings
183
221
  security_assessment_id=self.security_assessment_id,
184
222
  severity=self.severity,
185
223
  state=self.state,
186
- target_id=self.target_id)
224
+ target_id=self.target_id,
225
+ target_ids=self.target_ids)
187
226
 
188
227
 
189
228
  def get_security_assessment_findings(access_level: Optional[_builtins.str] = None,
229
+ category: Optional[_builtins.str] = None,
190
230
  compartment_id_in_subtree: Optional[_builtins.bool] = None,
231
+ contains_references: Optional[Sequence[_builtins.str]] = None,
232
+ contains_severities: Optional[Sequence[_builtins.str]] = None,
191
233
  fields: Optional[Sequence[_builtins.str]] = None,
192
234
  filters: Optional[Sequence[Union['GetSecurityAssessmentFindingsFilterArgs', 'GetSecurityAssessmentFindingsFilterArgsDict']]] = None,
193
235
  finding_key: Optional[_builtins.str] = None,
@@ -198,14 +240,16 @@ def get_security_assessment_findings(access_level: Optional[_builtins.str] = Non
198
240
  severity: Optional[_builtins.str] = None,
199
241
  state: Optional[_builtins.str] = None,
200
242
  target_id: Optional[_builtins.str] = None,
243
+ target_ids: Optional[Sequence[_builtins.str]] = None,
201
244
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecurityAssessmentFindingsResult:
202
245
  """
203
246
  This data source provides the list of Security Assessment Findings in Oracle Cloud Infrastructure Data Safe service.
204
247
 
205
- List all the findings from all the targets in the specified compartment.
248
+ Lists all the findings for the specified assessment except for type TEMPLATE. If the assessment is of type TEMPLATE_BASELINE, the findings returned are the security checks with the user-defined severity from the template.
206
249
 
207
250
 
208
251
  :param _builtins.str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
252
+ :param _builtins.str category: The category of the finding.
209
253
  :param _builtins.bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
210
254
  :param Sequence[_builtins.str] fields: Specifies a subset of fields to be returned in the response.
211
255
  :param _builtins.str finding_key: Each finding in security assessment has an associated key (think of key as a finding's name). For a given finding, the key will be the same across targets. The user can use these keys to filter the findings.
@@ -219,10 +263,14 @@ def get_security_assessment_findings(access_level: Optional[_builtins.str] = Non
219
263
  :param _builtins.str severity: A filter to return only findings of a particular risk level.
220
264
  :param _builtins.str state: A filter to return only the findings that match the specified lifecycle states.
221
265
  :param _builtins.str target_id: A filter to return only items related to a specific target OCID.
266
+ :param Sequence[_builtins.str] target_ids: An optional filter to return only findings that match the specified target ids. Use this parameter to filter by multiple target ids.
222
267
  """
223
268
  __args__ = dict()
224
269
  __args__['accessLevel'] = access_level
270
+ __args__['category'] = category
225
271
  __args__['compartmentIdInSubtree'] = compartment_id_in_subtree
272
+ __args__['containsReferences'] = contains_references
273
+ __args__['containsSeverities'] = contains_severities
226
274
  __args__['fields'] = fields
227
275
  __args__['filters'] = filters
228
276
  __args__['findingKey'] = finding_key
@@ -233,12 +281,16 @@ def get_security_assessment_findings(access_level: Optional[_builtins.str] = Non
233
281
  __args__['severity'] = severity
234
282
  __args__['state'] = state
235
283
  __args__['targetId'] = target_id
284
+ __args__['targetIds'] = target_ids
236
285
  opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
237
286
  __ret__ = pulumi.runtime.invoke('oci:DataSafe/getSecurityAssessmentFindings:getSecurityAssessmentFindings', __args__, opts=opts, typ=GetSecurityAssessmentFindingsResult).value
238
287
 
239
288
  return AwaitableGetSecurityAssessmentFindingsResult(
240
289
  access_level=pulumi.get(__ret__, 'access_level'),
290
+ category=pulumi.get(__ret__, 'category'),
241
291
  compartment_id_in_subtree=pulumi.get(__ret__, 'compartment_id_in_subtree'),
292
+ contains_references=pulumi.get(__ret__, 'contains_references'),
293
+ contains_severities=pulumi.get(__ret__, 'contains_severities'),
242
294
  fields=pulumi.get(__ret__, 'fields'),
243
295
  filters=pulumi.get(__ret__, 'filters'),
244
296
  finding_key=pulumi.get(__ret__, 'finding_key'),
@@ -250,9 +302,13 @@ def get_security_assessment_findings(access_level: Optional[_builtins.str] = Non
250
302
  security_assessment_id=pulumi.get(__ret__, 'security_assessment_id'),
251
303
  severity=pulumi.get(__ret__, 'severity'),
252
304
  state=pulumi.get(__ret__, 'state'),
253
- target_id=pulumi.get(__ret__, 'target_id'))
305
+ target_id=pulumi.get(__ret__, 'target_id'),
306
+ target_ids=pulumi.get(__ret__, 'target_ids'))
254
307
  def get_security_assessment_findings_output(access_level: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
308
+ category: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
255
309
  compartment_id_in_subtree: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
310
+ contains_references: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
311
+ contains_severities: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
256
312
  fields: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
257
313
  filters: Optional[pulumi.Input[Optional[Sequence[Union['GetSecurityAssessmentFindingsFilterArgs', 'GetSecurityAssessmentFindingsFilterArgsDict']]]]] = None,
258
314
  finding_key: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
@@ -263,14 +319,16 @@ def get_security_assessment_findings_output(access_level: Optional[pulumi.Input[
263
319
  severity: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
264
320
  state: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
265
321
  target_id: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
322
+ target_ids: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
266
323
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecurityAssessmentFindingsResult]:
267
324
  """
268
325
  This data source provides the list of Security Assessment Findings in Oracle Cloud Infrastructure Data Safe service.
269
326
 
270
- List all the findings from all the targets in the specified compartment.
327
+ Lists all the findings for the specified assessment except for type TEMPLATE. If the assessment is of type TEMPLATE_BASELINE, the findings returned are the security checks with the user-defined severity from the template.
271
328
 
272
329
 
273
330
  :param _builtins.str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
331
+ :param _builtins.str category: The category of the finding.
274
332
  :param _builtins.bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
275
333
  :param Sequence[_builtins.str] fields: Specifies a subset of fields to be returned in the response.
276
334
  :param _builtins.str finding_key: Each finding in security assessment has an associated key (think of key as a finding's name). For a given finding, the key will be the same across targets. The user can use these keys to filter the findings.
@@ -284,10 +342,14 @@ def get_security_assessment_findings_output(access_level: Optional[pulumi.Input[
284
342
  :param _builtins.str severity: A filter to return only findings of a particular risk level.
285
343
  :param _builtins.str state: A filter to return only the findings that match the specified lifecycle states.
286
344
  :param _builtins.str target_id: A filter to return only items related to a specific target OCID.
345
+ :param Sequence[_builtins.str] target_ids: An optional filter to return only findings that match the specified target ids. Use this parameter to filter by multiple target ids.
287
346
  """
288
347
  __args__ = dict()
289
348
  __args__['accessLevel'] = access_level
349
+ __args__['category'] = category
290
350
  __args__['compartmentIdInSubtree'] = compartment_id_in_subtree
351
+ __args__['containsReferences'] = contains_references
352
+ __args__['containsSeverities'] = contains_severities
291
353
  __args__['fields'] = fields
292
354
  __args__['filters'] = filters
293
355
  __args__['findingKey'] = finding_key
@@ -298,11 +360,15 @@ def get_security_assessment_findings_output(access_level: Optional[pulumi.Input[
298
360
  __args__['severity'] = severity
299
361
  __args__['state'] = state
300
362
  __args__['targetId'] = target_id
363
+ __args__['targetIds'] = target_ids
301
364
  opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
302
365
  __ret__ = pulumi.runtime.invoke_output('oci:DataSafe/getSecurityAssessmentFindings:getSecurityAssessmentFindings', __args__, opts=opts, typ=GetSecurityAssessmentFindingsResult)
303
366
  return __ret__.apply(lambda __response__: GetSecurityAssessmentFindingsResult(
304
367
  access_level=pulumi.get(__response__, 'access_level'),
368
+ category=pulumi.get(__response__, 'category'),
305
369
  compartment_id_in_subtree=pulumi.get(__response__, 'compartment_id_in_subtree'),
370
+ contains_references=pulumi.get(__response__, 'contains_references'),
371
+ contains_severities=pulumi.get(__response__, 'contains_severities'),
306
372
  fields=pulumi.get(__response__, 'fields'),
307
373
  filters=pulumi.get(__response__, 'filters'),
308
374
  finding_key=pulumi.get(__response__, 'finding_key'),
@@ -314,4 +380,5 @@ def get_security_assessment_findings_output(access_level: Optional[pulumi.Input[
314
380
  security_assessment_id=pulumi.get(__response__, 'security_assessment_id'),
315
381
  severity=pulumi.get(__response__, 'severity'),
316
382
  state=pulumi.get(__response__, 'state'),
317
- target_id=pulumi.get(__response__, 'target_id')))
383
+ target_id=pulumi.get(__response__, 'target_id'),
384
+ target_ids=pulumi.get(__response__, 'target_ids')))