1. Packages
  2. Oracle Cloud Infrastructure
  3. API Docs
  4. DataSafe
  5. getSecurityPolicyReportDatabaseTableAccessEntries
Oracle Cloud Infrastructure v1.41.0 published on Wednesday, Jun 19, 2024 by Pulumi

oci.DataSafe.getSecurityPolicyReportDatabaseTableAccessEntries

Explore with Pulumi AI

oci logo
Oracle Cloud Infrastructure v1.41.0 published on Wednesday, Jun 19, 2024 by Pulumi

    This data source provides the list of Security Policy Report Database Table Access Entries in Oracle Cloud Infrastructure Data Safe service.

    Retrieves a list of all database table access entries in Data Safe.

    The ListDatabaseTableAccessEntries operation returns only the database table access reports for the specified security policy report.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as oci from "@pulumi/oci";
    
    const testSecurityPolicyReportDatabaseTableAccessEntries = oci.DataSafe.getSecurityPolicyReportDatabaseTableAccessEntries({
        securityPolicyReportId: testSecurityPolicyReport.id,
        scimQuery: securityPolicyReportDatabaseTableAccessEntryScimQuery,
    });
    
    import pulumi
    import pulumi_oci as oci
    
    test_security_policy_report_database_table_access_entries = oci.DataSafe.get_security_policy_report_database_table_access_entries(security_policy_report_id=test_security_policy_report["id"],
        scim_query=security_policy_report_database_table_access_entry_scim_query)
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-oci/sdk/go/oci/DataSafe"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := DataSafe.GetSecurityPolicyReportDatabaseTableAccessEntries(ctx, &datasafe.GetSecurityPolicyReportDatabaseTableAccessEntriesArgs{
    			SecurityPolicyReportId: testSecurityPolicyReport.Id,
    			ScimQuery:              pulumi.StringRef(securityPolicyReportDatabaseTableAccessEntryScimQuery),
    		}, nil)
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Oci = Pulumi.Oci;
    
    return await Deployment.RunAsync(() => 
    {
        var testSecurityPolicyReportDatabaseTableAccessEntries = Oci.DataSafe.GetSecurityPolicyReportDatabaseTableAccessEntries.Invoke(new()
        {
            SecurityPolicyReportId = testSecurityPolicyReport.Id,
            ScimQuery = securityPolicyReportDatabaseTableAccessEntryScimQuery,
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.oci.DataSafe.DataSafeFunctions;
    import com.pulumi.oci.DataSafe.inputs.GetSecurityPolicyReportDatabaseTableAccessEntriesArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            final var testSecurityPolicyReportDatabaseTableAccessEntries = DataSafeFunctions.getSecurityPolicyReportDatabaseTableAccessEntries(GetSecurityPolicyReportDatabaseTableAccessEntriesArgs.builder()
                .securityPolicyReportId(testSecurityPolicyReport.id())
                .scimQuery(securityPolicyReportDatabaseTableAccessEntryScimQuery)
                .build());
    
        }
    }
    
    variables:
      testSecurityPolicyReportDatabaseTableAccessEntries:
        fn::invoke:
          Function: oci:DataSafe:getSecurityPolicyReportDatabaseTableAccessEntries
          Arguments:
            securityPolicyReportId: ${testSecurityPolicyReport.id}
            scimQuery: ${securityPolicyReportDatabaseTableAccessEntryScimQuery}
    

    Using getSecurityPolicyReportDatabaseTableAccessEntries

    Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.

    function getSecurityPolicyReportDatabaseTableAccessEntries(args: GetSecurityPolicyReportDatabaseTableAccessEntriesArgs, opts?: InvokeOptions): Promise<GetSecurityPolicyReportDatabaseTableAccessEntriesResult>
    function getSecurityPolicyReportDatabaseTableAccessEntriesOutput(args: GetSecurityPolicyReportDatabaseTableAccessEntriesOutputArgs, opts?: InvokeOptions): Output<GetSecurityPolicyReportDatabaseTableAccessEntriesResult>
    def get_security_policy_report_database_table_access_entries(filters: Optional[Sequence[_datasafe.GetSecurityPolicyReportDatabaseTableAccessEntriesFilter]] = None,
                                                                 scim_query: Optional[str] = None,
                                                                 security_policy_report_id: Optional[str] = None,
                                                                 opts: Optional[InvokeOptions] = None) -> GetSecurityPolicyReportDatabaseTableAccessEntriesResult
    def get_security_policy_report_database_table_access_entries_output(filters: Optional[pulumi.Input[Sequence[pulumi.Input[_datasafe.GetSecurityPolicyReportDatabaseTableAccessEntriesFilterArgs]]]] = None,
                                                                 scim_query: Optional[pulumi.Input[str]] = None,
                                                                 security_policy_report_id: Optional[pulumi.Input[str]] = None,
                                                                 opts: Optional[InvokeOptions] = None) -> Output[GetSecurityPolicyReportDatabaseTableAccessEntriesResult]
    func GetSecurityPolicyReportDatabaseTableAccessEntries(ctx *Context, args *GetSecurityPolicyReportDatabaseTableAccessEntriesArgs, opts ...InvokeOption) (*GetSecurityPolicyReportDatabaseTableAccessEntriesResult, error)
    func GetSecurityPolicyReportDatabaseTableAccessEntriesOutput(ctx *Context, args *GetSecurityPolicyReportDatabaseTableAccessEntriesOutputArgs, opts ...InvokeOption) GetSecurityPolicyReportDatabaseTableAccessEntriesResultOutput

    > Note: This function is named GetSecurityPolicyReportDatabaseTableAccessEntries in the Go SDK.

    public static class GetSecurityPolicyReportDatabaseTableAccessEntries 
    {
        public static Task<GetSecurityPolicyReportDatabaseTableAccessEntriesResult> InvokeAsync(GetSecurityPolicyReportDatabaseTableAccessEntriesArgs args, InvokeOptions? opts = null)
        public static Output<GetSecurityPolicyReportDatabaseTableAccessEntriesResult> Invoke(GetSecurityPolicyReportDatabaseTableAccessEntriesInvokeArgs args, InvokeOptions? opts = null)
    }
    public static CompletableFuture<GetSecurityPolicyReportDatabaseTableAccessEntriesResult> getSecurityPolicyReportDatabaseTableAccessEntries(GetSecurityPolicyReportDatabaseTableAccessEntriesArgs args, InvokeOptions options)
    // Output-based functions aren't available in Java yet
    
    fn::invoke:
      function: oci:DataSafe/getSecurityPolicyReportDatabaseTableAccessEntries:getSecurityPolicyReportDatabaseTableAccessEntries
      arguments:
        # arguments dictionary

    The following arguments are supported:

    SecurityPolicyReportId string
    The OCID of the security policy report resource.
    Filters List<GetSecurityPolicyReportDatabaseTableAccessEntriesFilter>
    ScimQuery string

    The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)

    Example: query=(accessType eq 'SELECT') and (grantee eq 'ADMIN')

    SecurityPolicyReportId string
    The OCID of the security policy report resource.
    Filters []GetSecurityPolicyReportDatabaseTableAccessEntriesFilter
    ScimQuery string

    The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)

    Example: query=(accessType eq 'SELECT') and (grantee eq 'ADMIN')

    securityPolicyReportId String
    The OCID of the security policy report resource.
    filters List<GetSecurityPolicyReportDatabaseTableAccessEntriesFilter>
    scimQuery String

    The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)

    Example: query=(accessType eq 'SELECT') and (grantee eq 'ADMIN')

    securityPolicyReportId string
    The OCID of the security policy report resource.
    filters GetSecurityPolicyReportDatabaseTableAccessEntriesFilter[]
    scimQuery string

    The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)

    Example: query=(accessType eq 'SELECT') and (grantee eq 'ADMIN')

    security_policy_report_id str
    The OCID of the security policy report resource.
    filters Sequence[datasafe.GetSecurityPolicyReportDatabaseTableAccessEntriesFilter]
    scim_query str

    The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)

    Example: query=(accessType eq 'SELECT') and (grantee eq 'ADMIN')

    securityPolicyReportId String
    The OCID of the security policy report resource.
    filters List<Property Map>
    scimQuery String

    The scimQuery query parameter accepts filter expressions that use the syntax described in Section 3.2.2.2 of the System for Cross-Domain Identity Management (SCIM) specification, which is available at RFC3339. In SCIM filtering expressions, text, date, and time values must be enclosed in quotation marks, with date and time values using ISO-8601 format. (Numeric and boolean values should not be quoted.)

    Example: query=(accessType eq 'SELECT') and (grantee eq 'ADMIN')

    getSecurityPolicyReportDatabaseTableAccessEntries Result

    The following output properties are available:

    databaseTableAccessEntryCollections List<Property Map>
    The list of database_table_access_entry_collection.
    id String
    The provider-assigned unique ID for this managed resource.
    securityPolicyReportId String
    filters List<Property Map>
    scimQuery String

    Supporting Types

    GetSecurityPolicyReportDatabaseTableAccessEntriesDatabaseTableAccessEntryCollection

    GetSecurityPolicyReportDatabaseTableAccessEntriesDatabaseTableAccessEntryCollectionItem

    AccessThroughObject string
    A non-null value in this field indicates the object through which user has access to table, possible values could be table or view.
    AccessType string
    The type of the access the user has on the table, there can be one or more from SELECT, UPDATE, INSERT, OWNER or DELETE.
    AreAllTablesAccessible bool
    Indicates whether the user has access to all the tables in the schema.
    ColumnName string
    If there are column level privileges on a table or view.
    GrantFromRole string
    This can be empty in case of direct grant, in case of indirect grant, this attribute displays the name of the role which is granted to the user though which the user has access to the table.
    Grantee string
    Grantee is the user who can access the table
    Grantor string
    The one who granted this privilege.
    IsAccessConstrainedByDatabaseVault bool
    Indicates whether the table access is constrained via Oracle Database Vault.
    IsAccessConstrainedByLabelSecurity bool
    Indicates whether the table access is constrained via Oracle Label Security.
    IsAccessConstrainedByRealApplicationSecurity bool
    Indicates whether the table access is constrained via Real Application Security.
    IsAccessConstrainedByRedaction bool
    Indicates whether the table access is constrained via Oracle Data Redaction.
    IsAccessConstrainedBySqlFirewall bool
    Indicates whether the table access is constrained via Oracle Database SQL Firewall.
    IsAccessConstrainedByView bool
    Indicates whether the access is constrained on a table via a view.
    IsAccessConstrainedByVirtualPrivateDatabase bool
    Indicates whether the table access is constrained via Virtual Private Database.
    IsSensitive bool
    Indicates whether the table is marked as sensitive.
    Key string
    The unique key that identifies the table access report. It is numeric and unique within a security policy report.
    Privilege string
    Name of the privilege.
    PrivilegeGrantable string
    Indicates whether the grantee can grant this privilege to other users. Privileges can be granted to a user or role with GRANT_OPTION or ADMIN_OPTION
    PrivilegeType string
    Type of the privilege user has, this includes System Privilege, Schema Privilege, Object Privilege, Column Privilege, Owner or Schema Privilege on a schema.
    TableName string
    The name of the database table the user has access to.
    TableSchema string
    The name of the schema the table belongs to.
    TargetId string
    The OCID of the of the target database.
    AccessThroughObject string
    A non-null value in this field indicates the object through which user has access to table, possible values could be table or view.
    AccessType string
    The type of the access the user has on the table, there can be one or more from SELECT, UPDATE, INSERT, OWNER or DELETE.
    AreAllTablesAccessible bool
    Indicates whether the user has access to all the tables in the schema.
    ColumnName string
    If there are column level privileges on a table or view.
    GrantFromRole string
    This can be empty in case of direct grant, in case of indirect grant, this attribute displays the name of the role which is granted to the user though which the user has access to the table.
    Grantee string
    Grantee is the user who can access the table
    Grantor string
    The one who granted this privilege.
    IsAccessConstrainedByDatabaseVault bool
    Indicates whether the table access is constrained via Oracle Database Vault.
    IsAccessConstrainedByLabelSecurity bool
    Indicates whether the table access is constrained via Oracle Label Security.
    IsAccessConstrainedByRealApplicationSecurity bool
    Indicates whether the table access is constrained via Real Application Security.
    IsAccessConstrainedByRedaction bool
    Indicates whether the table access is constrained via Oracle Data Redaction.
    IsAccessConstrainedBySqlFirewall bool
    Indicates whether the table access is constrained via Oracle Database SQL Firewall.
    IsAccessConstrainedByView bool
    Indicates whether the access is constrained on a table via a view.
    IsAccessConstrainedByVirtualPrivateDatabase bool
    Indicates whether the table access is constrained via Virtual Private Database.
    IsSensitive bool
    Indicates whether the table is marked as sensitive.
    Key string
    The unique key that identifies the table access report. It is numeric and unique within a security policy report.
    Privilege string
    Name of the privilege.
    PrivilegeGrantable string
    Indicates whether the grantee can grant this privilege to other users. Privileges can be granted to a user or role with GRANT_OPTION or ADMIN_OPTION
    PrivilegeType string
    Type of the privilege user has, this includes System Privilege, Schema Privilege, Object Privilege, Column Privilege, Owner or Schema Privilege on a schema.
    TableName string
    The name of the database table the user has access to.
    TableSchema string
    The name of the schema the table belongs to.
    TargetId string
    The OCID of the of the target database.
    accessThroughObject String
    A non-null value in this field indicates the object through which user has access to table, possible values could be table or view.
    accessType String
    The type of the access the user has on the table, there can be one or more from SELECT, UPDATE, INSERT, OWNER or DELETE.
    areAllTablesAccessible Boolean
    Indicates whether the user has access to all the tables in the schema.
    columnName String
    If there are column level privileges on a table or view.
    grantFromRole String
    This can be empty in case of direct grant, in case of indirect grant, this attribute displays the name of the role which is granted to the user though which the user has access to the table.
    grantee String
    Grantee is the user who can access the table
    grantor String
    The one who granted this privilege.
    isAccessConstrainedByDatabaseVault Boolean
    Indicates whether the table access is constrained via Oracle Database Vault.
    isAccessConstrainedByLabelSecurity Boolean
    Indicates whether the table access is constrained via Oracle Label Security.
    isAccessConstrainedByRealApplicationSecurity Boolean
    Indicates whether the table access is constrained via Real Application Security.
    isAccessConstrainedByRedaction Boolean
    Indicates whether the table access is constrained via Oracle Data Redaction.
    isAccessConstrainedBySqlFirewall Boolean
    Indicates whether the table access is constrained via Oracle Database SQL Firewall.
    isAccessConstrainedByView Boolean
    Indicates whether the access is constrained on a table via a view.
    isAccessConstrainedByVirtualPrivateDatabase Boolean
    Indicates whether the table access is constrained via Virtual Private Database.
    isSensitive Boolean
    Indicates whether the table is marked as sensitive.
    key String
    The unique key that identifies the table access report. It is numeric and unique within a security policy report.
    privilege String
    Name of the privilege.
    privilegeGrantable String
    Indicates whether the grantee can grant this privilege to other users. Privileges can be granted to a user or role with GRANT_OPTION or ADMIN_OPTION
    privilegeType String
    Type of the privilege user has, this includes System Privilege, Schema Privilege, Object Privilege, Column Privilege, Owner or Schema Privilege on a schema.
    tableName String
    The name of the database table the user has access to.
    tableSchema String
    The name of the schema the table belongs to.
    targetId String
    The OCID of the of the target database.
    accessThroughObject string
    A non-null value in this field indicates the object through which user has access to table, possible values could be table or view.
    accessType string
    The type of the access the user has on the table, there can be one or more from SELECT, UPDATE, INSERT, OWNER or DELETE.
    areAllTablesAccessible boolean
    Indicates whether the user has access to all the tables in the schema.
    columnName string
    If there are column level privileges on a table or view.
    grantFromRole string
    This can be empty in case of direct grant, in case of indirect grant, this attribute displays the name of the role which is granted to the user though which the user has access to the table.
    grantee string
    Grantee is the user who can access the table
    grantor string
    The one who granted this privilege.
    isAccessConstrainedByDatabaseVault boolean
    Indicates whether the table access is constrained via Oracle Database Vault.
    isAccessConstrainedByLabelSecurity boolean
    Indicates whether the table access is constrained via Oracle Label Security.
    isAccessConstrainedByRealApplicationSecurity boolean
    Indicates whether the table access is constrained via Real Application Security.
    isAccessConstrainedByRedaction boolean
    Indicates whether the table access is constrained via Oracle Data Redaction.
    isAccessConstrainedBySqlFirewall boolean
    Indicates whether the table access is constrained via Oracle Database SQL Firewall.
    isAccessConstrainedByView boolean
    Indicates whether the access is constrained on a table via a view.
    isAccessConstrainedByVirtualPrivateDatabase boolean
    Indicates whether the table access is constrained via Virtual Private Database.
    isSensitive boolean
    Indicates whether the table is marked as sensitive.
    key string
    The unique key that identifies the table access report. It is numeric and unique within a security policy report.
    privilege string
    Name of the privilege.
    privilegeGrantable string
    Indicates whether the grantee can grant this privilege to other users. Privileges can be granted to a user or role with GRANT_OPTION or ADMIN_OPTION
    privilegeType string
    Type of the privilege user has, this includes System Privilege, Schema Privilege, Object Privilege, Column Privilege, Owner or Schema Privilege on a schema.
    tableName string
    The name of the database table the user has access to.
    tableSchema string
    The name of the schema the table belongs to.
    targetId string
    The OCID of the of the target database.
    access_through_object str
    A non-null value in this field indicates the object through which user has access to table, possible values could be table or view.
    access_type str
    The type of the access the user has on the table, there can be one or more from SELECT, UPDATE, INSERT, OWNER or DELETE.
    are_all_tables_accessible bool
    Indicates whether the user has access to all the tables in the schema.
    column_name str
    If there are column level privileges on a table or view.
    grant_from_role str
    This can be empty in case of direct grant, in case of indirect grant, this attribute displays the name of the role which is granted to the user though which the user has access to the table.
    grantee str
    Grantee is the user who can access the table
    grantor str
    The one who granted this privilege.
    is_access_constrained_by_database_vault bool
    Indicates whether the table access is constrained via Oracle Database Vault.
    is_access_constrained_by_label_security bool
    Indicates whether the table access is constrained via Oracle Label Security.
    is_access_constrained_by_real_application_security bool
    Indicates whether the table access is constrained via Real Application Security.
    is_access_constrained_by_redaction bool
    Indicates whether the table access is constrained via Oracle Data Redaction.
    is_access_constrained_by_sql_firewall bool
    Indicates whether the table access is constrained via Oracle Database SQL Firewall.
    is_access_constrained_by_view bool
    Indicates whether the access is constrained on a table via a view.
    is_access_constrained_by_virtual_private_database bool
    Indicates whether the table access is constrained via Virtual Private Database.
    is_sensitive bool
    Indicates whether the table is marked as sensitive.
    key str
    The unique key that identifies the table access report. It is numeric and unique within a security policy report.
    privilege str
    Name of the privilege.
    privilege_grantable str
    Indicates whether the grantee can grant this privilege to other users. Privileges can be granted to a user or role with GRANT_OPTION or ADMIN_OPTION
    privilege_type str
    Type of the privilege user has, this includes System Privilege, Schema Privilege, Object Privilege, Column Privilege, Owner or Schema Privilege on a schema.
    table_name str
    The name of the database table the user has access to.
    table_schema str
    The name of the schema the table belongs to.
    target_id str
    The OCID of the of the target database.
    accessThroughObject String
    A non-null value in this field indicates the object through which user has access to table, possible values could be table or view.
    accessType String
    The type of the access the user has on the table, there can be one or more from SELECT, UPDATE, INSERT, OWNER or DELETE.
    areAllTablesAccessible Boolean
    Indicates whether the user has access to all the tables in the schema.
    columnName String
    If there are column level privileges on a table or view.
    grantFromRole String
    This can be empty in case of direct grant, in case of indirect grant, this attribute displays the name of the role which is granted to the user though which the user has access to the table.
    grantee String
    Grantee is the user who can access the table
    grantor String
    The one who granted this privilege.
    isAccessConstrainedByDatabaseVault Boolean
    Indicates whether the table access is constrained via Oracle Database Vault.
    isAccessConstrainedByLabelSecurity Boolean
    Indicates whether the table access is constrained via Oracle Label Security.
    isAccessConstrainedByRealApplicationSecurity Boolean
    Indicates whether the table access is constrained via Real Application Security.
    isAccessConstrainedByRedaction Boolean
    Indicates whether the table access is constrained via Oracle Data Redaction.
    isAccessConstrainedBySqlFirewall Boolean
    Indicates whether the table access is constrained via Oracle Database SQL Firewall.
    isAccessConstrainedByView Boolean
    Indicates whether the access is constrained on a table via a view.
    isAccessConstrainedByVirtualPrivateDatabase Boolean
    Indicates whether the table access is constrained via Virtual Private Database.
    isSensitive Boolean
    Indicates whether the table is marked as sensitive.
    key String
    The unique key that identifies the table access report. It is numeric and unique within a security policy report.
    privilege String
    Name of the privilege.
    privilegeGrantable String
    Indicates whether the grantee can grant this privilege to other users. Privileges can be granted to a user or role with GRANT_OPTION or ADMIN_OPTION
    privilegeType String
    Type of the privilege user has, this includes System Privilege, Schema Privilege, Object Privilege, Column Privilege, Owner or Schema Privilege on a schema.
    tableName String
    The name of the database table the user has access to.
    tableSchema String
    The name of the schema the table belongs to.
    targetId String
    The OCID of the of the target database.

    GetSecurityPolicyReportDatabaseTableAccessEntriesFilter

    Name string
    Values List<string>
    Regex bool
    Name string
    Values []string
    Regex bool
    name String
    values List<String>
    regex Boolean
    name string
    values string[]
    regex boolean
    name str
    values Sequence[str]
    regex bool
    name String
    values List<String>
    regex Boolean

    Package Details

    Repository
    oci pulumi/pulumi-oci
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the oci Terraform Provider.
    oci logo
    Oracle Cloud Infrastructure v1.41.0 published on Wednesday, Jun 19, 2024 by Pulumi