@cdktf-providers/aviatrixsystems-aviatrix 8.1.10 → 8.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (335) hide show
  1. package/README.md +3 -3
  2. package/dist/account/index.d.ts +80 -69
  3. package/dist/account/index.js +29 -6
  4. package/dist/account-user/index.d.ts +7 -7
  5. package/dist/account-user/index.js +6 -6
  6. package/dist/aws-guard-duty/index.d.ts +7 -7
  7. package/dist/aws-guard-duty/index.js +6 -6
  8. package/dist/aws-peer/index.d.ts +12 -12
  9. package/dist/aws-peer/index.js +6 -6
  10. package/dist/aws-tgw/index.d.ts +12 -12
  11. package/dist/aws-tgw/index.js +6 -6
  12. package/dist/aws-tgw-connect/index.d.ts +8 -8
  13. package/dist/aws-tgw-connect/index.js +6 -6
  14. package/dist/aws-tgw-connect-peer/index.d.ts +12 -12
  15. package/dist/aws-tgw-connect-peer/index.js +6 -6
  16. package/dist/aws-tgw-directconnect/index.d.ts +10 -10
  17. package/dist/aws-tgw-directconnect/index.js +6 -6
  18. package/dist/aws-tgw-intra-domain-inspection/index.d.ts +7 -7
  19. package/dist/aws-tgw-intra-domain-inspection/index.js +6 -6
  20. package/dist/aws-tgw-network-domain/index.d.ts +9 -9
  21. package/dist/aws-tgw-network-domain/index.js +6 -6
  22. package/dist/aws-tgw-peering/index.d.ts +6 -6
  23. package/dist/aws-tgw-peering/index.js +6 -6
  24. package/dist/aws-tgw-peering-domain-conn/index.d.ts +8 -8
  25. package/dist/aws-tgw-peering-domain-conn/index.js +6 -6
  26. package/dist/aws-tgw-transit-gateway-attachment/index.d.ts +9 -9
  27. package/dist/aws-tgw-transit-gateway-attachment/index.js +6 -6
  28. package/dist/aws-tgw-vpc-attachment/index.d.ts +15 -15
  29. package/dist/aws-tgw-vpc-attachment/index.js +6 -6
  30. package/dist/aws-tgw-vpn-conn/index.d.ts +17 -17
  31. package/dist/aws-tgw-vpn-conn/index.js +6 -6
  32. package/dist/azure-peer/index.d.ts +10 -10
  33. package/dist/azure-peer/index.js +6 -6
  34. package/dist/azure-spoke-native-peering/index.d.ts +8 -8
  35. package/dist/azure-spoke-native-peering/index.js +6 -6
  36. package/dist/azure-vng-conn/index.d.ts +6 -6
  37. package/dist/azure-vng-conn/index.js +6 -6
  38. package/dist/centralized-transit-firenet/index.d.ts +6 -6
  39. package/dist/centralized-transit-firenet/index.js +6 -6
  40. package/dist/cloudwatch-agent/index.d.ts +8 -8
  41. package/dist/cloudwatch-agent/index.js +6 -6
  42. package/dist/controller-access-allow-list-config/index.d.ts +8 -8
  43. package/dist/controller-access-allow-list-config/index.js +6 -6
  44. package/dist/controller-bgp-communities-auto-cloud-config/index.d.ts +6 -6
  45. package/dist/controller-bgp-communities-auto-cloud-config/index.js +6 -6
  46. package/dist/controller-bgp-communities-global-config/index.d.ts +5 -5
  47. package/dist/controller-bgp-communities-global-config/index.js +6 -6
  48. package/dist/controller-bgp-max-as-limit-config/index.d.ts +5 -5
  49. package/dist/controller-bgp-max-as-limit-config/index.js +6 -6
  50. package/dist/controller-cert-domain-config/index.d.ts +5 -5
  51. package/dist/controller-cert-domain-config/index.js +6 -6
  52. package/dist/controller-config/index.d.ts +24 -24
  53. package/dist/controller-config/index.js +6 -6
  54. package/dist/controller-email-config/index.d.ts +9 -9
  55. package/dist/controller-email-config/index.js +6 -6
  56. package/dist/controller-email-exception-notification-config/index.d.ts +5 -5
  57. package/dist/controller-email-exception-notification-config/index.js +6 -6
  58. package/dist/controller-gateway-keepalive-config/index.d.ts +5 -5
  59. package/dist/controller-gateway-keepalive-config/index.js +6 -6
  60. package/dist/controller-private-mode-config/index.d.ts +6 -6
  61. package/dist/controller-private-mode-config/index.js +6 -6
  62. package/dist/controller-private-oob/index.d.ts +5 -5
  63. package/dist/controller-private-oob/index.js +6 -6
  64. package/dist/controller-security-group-management-config/index.d.ts +6 -6
  65. package/dist/controller-security-group-management-config/index.js +6 -6
  66. package/dist/copilot-association/index.d.ts +5 -5
  67. package/dist/copilot-association/index.js +6 -6
  68. package/dist/copilot-fault-tolerant-deployment/index.d.ts +17 -17
  69. package/dist/copilot-fault-tolerant-deployment/index.js +6 -6
  70. package/dist/copilot-security-group-management-config/index.d.ts +11 -11
  71. package/dist/copilot-security-group-management-config/index.js +6 -6
  72. package/dist/copilot-simple-deployment/index.d.ts +13 -13
  73. package/dist/copilot-simple-deployment/index.js +6 -6
  74. package/dist/data-aviatrix-account/index.d.ts +5 -5
  75. package/dist/data-aviatrix-account/index.js +6 -6
  76. package/dist/data-aviatrix-caller-identity/index.d.ts +4 -4
  77. package/dist/data-aviatrix-caller-identity/index.js +6 -6
  78. package/dist/data-aviatrix-controller-metadata/index.d.ts +4 -4
  79. package/dist/data-aviatrix-controller-metadata/index.js +6 -6
  80. package/dist/data-aviatrix-dcf-attachment-point/index.d.ts +55 -0
  81. package/dist/data-aviatrix-dcf-attachment-point/index.js +115 -0
  82. package/dist/data-aviatrix-dcf-log-profile/index.d.ts +57 -0
  83. package/dist/data-aviatrix-dcf-log-profile/index.js +123 -0
  84. package/dist/data-aviatrix-dcf-trustbundle/index.d.ts +57 -0
  85. package/dist/data-aviatrix-dcf-trustbundle/index.js +123 -0
  86. package/dist/data-aviatrix-device-interfaces/index.d.ts +5 -5
  87. package/dist/data-aviatrix-device-interfaces/index.js +6 -6
  88. package/dist/data-aviatrix-edge-gateway-wan-interface-discovery/index.d.ts +6 -6
  89. package/dist/data-aviatrix-edge-gateway-wan-interface-discovery/index.js +6 -6
  90. package/dist/data-aviatrix-firenet/index.d.ts +5 -5
  91. package/dist/data-aviatrix-firenet/index.js +6 -6
  92. package/dist/data-aviatrix-firenet-firewall-manager/index.d.ts +17 -17
  93. package/dist/data-aviatrix-firenet-firewall-manager/index.js +6 -6
  94. package/dist/data-aviatrix-firenet-vendor-integration/index.d.ts +18 -18
  95. package/dist/data-aviatrix-firenet-vendor-integration/index.js +6 -6
  96. package/dist/data-aviatrix-firewall/index.d.ts +5 -5
  97. package/dist/data-aviatrix-firewall/index.js +6 -6
  98. package/dist/data-aviatrix-firewall-instance-images/index.d.ts +5 -5
  99. package/dist/data-aviatrix-firewall-instance-images/index.js +6 -6
  100. package/dist/data-aviatrix-gateway/index.d.ts +5 -5
  101. package/dist/data-aviatrix-gateway/index.js +6 -6
  102. package/dist/data-aviatrix-gateway-image/index.d.ts +6 -6
  103. package/dist/data-aviatrix-gateway-image/index.js +6 -6
  104. package/dist/data-aviatrix-network-domains/index.d.ts +4 -4
  105. package/dist/data-aviatrix-network-domains/index.js +6 -6
  106. package/dist/data-aviatrix-smart-groups/index.d.ts +4 -4
  107. package/dist/data-aviatrix-smart-groups/index.js +6 -6
  108. package/dist/data-aviatrix-spoke-gateway/index.d.ts +5 -5
  109. package/dist/data-aviatrix-spoke-gateway/index.js +6 -6
  110. package/dist/data-aviatrix-spoke-gateway-inspection-subnets/index.d.ts +5 -5
  111. package/dist/data-aviatrix-spoke-gateway-inspection-subnets/index.js +6 -6
  112. package/dist/data-aviatrix-spoke-gateways/index.d.ts +4 -4
  113. package/dist/data-aviatrix-spoke-gateways/index.js +6 -6
  114. package/dist/data-aviatrix-transit-gateway/index.d.ts +5 -5
  115. package/dist/data-aviatrix-transit-gateway/index.js +6 -6
  116. package/dist/data-aviatrix-transit-gateways/index.d.ts +4 -4
  117. package/dist/data-aviatrix-transit-gateways/index.js +6 -6
  118. package/dist/data-aviatrix-vpc/index.d.ts +6 -6
  119. package/dist/data-aviatrix-vpc/index.js +6 -6
  120. package/dist/data-aviatrix-vpc-tracker/index.d.ts +8 -8
  121. package/dist/data-aviatrix-vpc-tracker/index.js +6 -6
  122. package/dist/data-aviatrix-web-group/index.d.ts +123 -0
  123. package/dist/data-aviatrix-web-group/index.js +265 -0
  124. package/dist/datadog-agent/index.d.ts +8 -8
  125. package/dist/datadog-agent/index.js +6 -6
  126. package/dist/dcf-ips-profile/index.d.ts +127 -0
  127. package/dist/dcf-ips-profile/index.js +275 -0
  128. package/dist/dcf-ips-profile-vpc/index.d.ts +64 -0
  129. package/dist/dcf-ips-profile-vpc/index.js +131 -0
  130. package/dist/dcf-ips-rule-feed/index.d.ts +67 -0
  131. package/dist/dcf-ips-rule-feed/index.js +143 -0
  132. package/dist/dcf-policy-group/index.d.ts +260 -0
  133. package/dist/dcf-policy-group/index.js +605 -0
  134. package/dist/dcf-ruleset/index.d.ts +325 -0
  135. package/dist/dcf-ruleset/index.js +783 -0
  136. package/dist/dcf-tls-profile/index.d.ts +86 -0
  137. package/dist/dcf-tls-profile/index.js +178 -0
  138. package/dist/dcf-trustbundle/index.d.ts +66 -0
  139. package/dist/dcf-trustbundle/index.js +139 -0
  140. package/dist/device-interface-config/index.d.ts +7 -7
  141. package/dist/device-interface-config/index.js +6 -6
  142. package/dist/distributed-firewalling-config/index.d.ts +5 -5
  143. package/dist/distributed-firewalling-config/index.js +6 -6
  144. package/dist/distributed-firewalling-default-action-rule/index.d.ts +17 -6
  145. package/dist/distributed-firewalling-default-action-rule/index.js +29 -6
  146. package/dist/distributed-firewalling-deployment-policy/index.d.ts +66 -0
  147. package/dist/distributed-firewalling-deployment-policy/index.js +137 -0
  148. package/dist/distributed-firewalling-intra-vpc/index.d.ts +8 -8
  149. package/dist/distributed-firewalling-intra-vpc/index.js +6 -6
  150. package/dist/distributed-firewalling-origin-cert-enforcement-config/index.d.ts +5 -5
  151. package/dist/distributed-firewalling-origin-cert-enforcement-config/index.js +6 -6
  152. package/dist/distributed-firewalling-policy-list/index.d.ts +32 -21
  153. package/dist/distributed-firewalling-policy-list/index.js +34 -6
  154. package/dist/distributed-firewalling-proxy-ca-config/index.d.ts +6 -6
  155. package/dist/distributed-firewalling-proxy-ca-config/index.js +6 -6
  156. package/dist/edge-csp/index.d.ts +58 -58
  157. package/dist/edge-csp/index.js +6 -6
  158. package/dist/edge-csp-ha/index.d.ts +18 -18
  159. package/dist/edge-csp-ha/index.js +6 -6
  160. package/dist/edge-equinix/index.d.ts +54 -54
  161. package/dist/edge-equinix/index.js +6 -6
  162. package/dist/edge-equinix-ha/index.d.ts +18 -18
  163. package/dist/edge-equinix-ha/index.js +6 -6
  164. package/dist/edge-gateway-selfmanaged/index.d.ts +94 -50
  165. package/dist/edge-gateway-selfmanaged/index.js +108 -6
  166. package/dist/edge-gateway-selfmanaged-ha/index.d.ts +42 -20
  167. package/dist/edge-gateway-selfmanaged-ha/index.js +62 -6
  168. package/dist/edge-megaport/index.d.ts +56 -56
  169. package/dist/edge-megaport/index.js +6 -6
  170. package/dist/edge-megaport-ha/index.d.ts +16 -16
  171. package/dist/edge-megaport-ha/index.js +6 -6
  172. package/dist/edge-neo/index.d.ts +56 -56
  173. package/dist/edge-neo/index.js +6 -6
  174. package/dist/edge-neo-device-onboarding/index.d.ts +17 -17
  175. package/dist/edge-neo-device-onboarding/index.js +6 -6
  176. package/dist/edge-neo-ha/index.d.ts +18 -18
  177. package/dist/edge-neo-ha/index.js +6 -6
  178. package/dist/edge-platform/index.d.ts +80 -58
  179. package/dist/edge-platform/index.js +62 -6
  180. package/dist/edge-platform-device-onboarding/index.d.ts +17 -17
  181. package/dist/edge-platform-device-onboarding/index.js +6 -6
  182. package/dist/edge-platform-ha/index.d.ts +40 -18
  183. package/dist/edge-platform-ha/index.js +62 -6
  184. package/dist/edge-proxy-profile/index.d.ts +9 -9
  185. package/dist/edge-proxy-profile/index.js +6 -6
  186. package/dist/edge-spoke/index.d.ts +37 -37
  187. package/dist/edge-spoke/index.js +6 -6
  188. package/dist/edge-spoke-external-device-conn/index.d.ts +66 -33
  189. package/dist/edge-spoke-external-device-conn/index.js +75 -6
  190. package/dist/edge-spoke-transit-attachment/index.d.ts +29 -18
  191. package/dist/edge-spoke-transit-attachment/index.js +29 -6
  192. package/dist/edge-vm-selfmanaged/index.d.ts +36 -36
  193. package/dist/edge-vm-selfmanaged/index.js +6 -6
  194. package/dist/edge-vm-selfmanaged-ha/index.d.ts +16 -16
  195. package/dist/edge-vm-selfmanaged-ha/index.js +6 -6
  196. package/dist/edge-zededa/index.d.ts +58 -58
  197. package/dist/edge-zededa/index.js +6 -6
  198. package/dist/edge-zededa-ha/index.d.ts +18 -18
  199. package/dist/edge-zededa-ha/index.js +6 -6
  200. package/dist/filebeat-forwarder/index.d.ts +9 -9
  201. package/dist/filebeat-forwarder/index.js +6 -6
  202. package/dist/firenet/index.d.ts +11 -11
  203. package/dist/firenet/index.js +6 -6
  204. package/dist/firewall/index.d.ts +16 -16
  205. package/dist/firewall/index.js +6 -6
  206. package/dist/firewall-instance/index.d.ts +34 -34
  207. package/dist/firewall-instance/index.js +6 -6
  208. package/dist/firewall-instance-association/index.d.ts +13 -13
  209. package/dist/firewall-instance-association/index.js +6 -6
  210. package/dist/firewall-management-access/index.d.ts +6 -6
  211. package/dist/firewall-management-access/index.js +6 -6
  212. package/dist/firewall-policy/index.d.ts +13 -13
  213. package/dist/firewall-policy/index.js +6 -6
  214. package/dist/firewall-tag/index.d.ts +8 -8
  215. package/dist/firewall-tag/index.js +6 -6
  216. package/dist/fqdn/index.d.ts +16 -16
  217. package/dist/fqdn/index.js +6 -6
  218. package/dist/fqdn-global-config/index.d.ts +10 -10
  219. package/dist/fqdn-global-config/index.js +6 -6
  220. package/dist/fqdn-pass-through/index.d.ts +6 -6
  221. package/dist/fqdn-pass-through/index.js +6 -6
  222. package/dist/fqdn-tag-rule/index.d.ts +9 -9
  223. package/dist/fqdn-tag-rule/index.js +6 -6
  224. package/dist/gateway/index.d.ts +82 -82
  225. package/dist/gateway/index.js +6 -6
  226. package/dist/gateway-certificate-config/index.d.ts +6 -6
  227. package/dist/gateway-certificate-config/index.js +6 -6
  228. package/dist/gateway-dnat/index.d.ts +18 -18
  229. package/dist/gateway-dnat/index.js +6 -6
  230. package/dist/gateway-snat/index.d.ts +20 -20
  231. package/dist/gateway-snat/index.js +6 -6
  232. package/dist/geo-vpn/index.d.ts +9 -9
  233. package/dist/geo-vpn/index.js +6 -6
  234. package/dist/global-vpc-excluded-instance/index.d.ts +7 -7
  235. package/dist/global-vpc-excluded-instance/index.js +6 -6
  236. package/dist/global-vpc-tagging-settings/index.d.ts +6 -6
  237. package/dist/global-vpc-tagging-settings/index.js +6 -6
  238. package/dist/index.d.ts +15 -0
  239. package/dist/index.js +15 -0
  240. package/dist/k8s-config/index.d.ts +66 -0
  241. package/dist/k8s-config/index.js +137 -0
  242. package/dist/kubernetes-cluster/index.d.ts +20 -20
  243. package/dist/kubernetes-cluster/index.js +6 -6
  244. package/dist/lazy-index.js +15 -0
  245. package/dist/link-hierarchy/index.d.ts +9 -9
  246. package/dist/link-hierarchy/index.js +6 -6
  247. package/dist/netflow-agent/index.d.ts +9 -9
  248. package/dist/netflow-agent/index.js +6 -6
  249. package/dist/periodic-ping/index.d.ts +7 -7
  250. package/dist/periodic-ping/index.js +6 -6
  251. package/dist/private-mode-lb/index.d.ts +12 -12
  252. package/dist/private-mode-lb/index.js +6 -6
  253. package/dist/private-mode-multicloud-endpoint/index.d.ts +8 -8
  254. package/dist/private-mode-multicloud-endpoint/index.js +6 -6
  255. package/dist/provider/index.d.ts +13 -13
  256. package/dist/provider/index.js +6 -6
  257. package/dist/proxy-config/index.d.ts +7 -7
  258. package/dist/proxy-config/index.js +6 -6
  259. package/dist/qos-class/index.d.ts +6 -6
  260. package/dist/qos-class/index.js +6 -6
  261. package/dist/qos-policy-list/index.d.ts +8 -8
  262. package/dist/qos-policy-list/index.js +6 -6
  263. package/dist/rbac-group/index.d.ts +6 -6
  264. package/dist/rbac-group/index.js +6 -6
  265. package/dist/rbac-group-access-account-attachment/index.d.ts +6 -6
  266. package/dist/rbac-group-access-account-attachment/index.js +6 -6
  267. package/dist/rbac-group-access-account-membership/index.d.ts +75 -0
  268. package/dist/rbac-group-access-account-membership/index.js +154 -0
  269. package/dist/rbac-group-permission-attachment/index.d.ts +6 -6
  270. package/dist/rbac-group-permission-attachment/index.js +6 -6
  271. package/dist/rbac-group-user-attachment/index.d.ts +6 -6
  272. package/dist/rbac-group-user-attachment/index.js +6 -6
  273. package/dist/rbac-group-user-membership/index.d.ts +75 -0
  274. package/dist/rbac-group-user-membership/index.js +154 -0
  275. package/dist/remote-syslog/index.d.ts +14 -14
  276. package/dist/remote-syslog/index.js +6 -6
  277. package/dist/saml-endpoint/index.d.ts +14 -14
  278. package/dist/saml-endpoint/index.js +6 -6
  279. package/dist/segmentation-network-domain/index.d.ts +5 -5
  280. package/dist/segmentation-network-domain/index.js +6 -6
  281. package/dist/segmentation-network-domain-association/index.d.ts +7 -7
  282. package/dist/segmentation-network-domain-association/index.js +6 -6
  283. package/dist/segmentation-network-domain-connection-policy/index.d.ts +6 -6
  284. package/dist/segmentation-network-domain-connection-policy/index.js +6 -6
  285. package/dist/site2cloud/index.d.ts +59 -59
  286. package/dist/site2cloud/index.js +6 -6
  287. package/dist/site2cloud-ca-cert-tag/index.d.ts +7 -7
  288. package/dist/site2cloud-ca-cert-tag/index.js +6 -6
  289. package/dist/sla-class/index.d.ts +8 -8
  290. package/dist/sla-class/index.js +6 -6
  291. package/dist/smart-group/index.d.ts +25 -25
  292. package/dist/smart-group/index.js +6 -6
  293. package/dist/splunk-logging/index.d.ts +9 -9
  294. package/dist/splunk-logging/index.js +6 -6
  295. package/dist/spoke-external-device-conn/index.d.ts +112 -57
  296. package/dist/spoke-external-device-conn/index.js +121 -6
  297. package/dist/spoke-gateway/index.d.ts +158 -81
  298. package/dist/spoke-gateway/index.js +167 -6
  299. package/dist/spoke-gateway-subnet-group/index.d.ts +7 -7
  300. package/dist/spoke-gateway-subnet-group/index.js +6 -6
  301. package/dist/spoke-ha-gateway/index.d.ts +26 -15
  302. package/dist/spoke-ha-gateway/index.js +29 -6
  303. package/dist/spoke-transit-attachment/index.d.ts +12 -12
  304. package/dist/spoke-transit-attachment/index.js +6 -6
  305. package/dist/sumologic-forwarder/index.d.ts +9 -9
  306. package/dist/sumologic-forwarder/index.js +6 -6
  307. package/dist/traffic-classifier/index.d.ts +16 -16
  308. package/dist/traffic-classifier/index.js +6 -6
  309. package/dist/trans-peer/index.d.ts +7 -7
  310. package/dist/trans-peer/index.js +6 -6
  311. package/dist/transit-external-device-conn/index.d.ts +117 -62
  312. package/dist/transit-external-device-conn/index.js +122 -7
  313. package/dist/transit-firenet-policy/index.d.ts +6 -6
  314. package/dist/transit-firenet-policy/index.js +6 -6
  315. package/dist/transit-gateway/index.d.ts +201 -124
  316. package/dist/transit-gateway/index.js +177 -6
  317. package/dist/transit-gateway-peering/index.d.ts +22 -22
  318. package/dist/transit-gateway-peering/index.js +7 -7
  319. package/dist/tunnel/index.d.ts +7 -7
  320. package/dist/tunnel/index.js +6 -6
  321. package/dist/vgw-conn/index.d.ts +15 -15
  322. package/dist/vgw-conn/index.js +6 -6
  323. package/dist/vpc/index.d.ts +46 -21
  324. package/dist/vpc/index.js +64 -6
  325. package/dist/vpn-cert-download/index.d.ts +6 -6
  326. package/dist/vpn-cert-download/index.js +6 -6
  327. package/dist/vpn-profile/index.d.ts +13 -13
  328. package/dist/vpn-profile/index.js +6 -6
  329. package/dist/vpn-user/index.d.ts +12 -12
  330. package/dist/vpn-user/index.js +6 -6
  331. package/dist/vpn-user-accelerator/index.d.ts +5 -5
  332. package/dist/vpn-user-accelerator/index.js +6 -6
  333. package/dist/web-group/index.d.ts +9 -9
  334. package/dist/web-group/index.js +6 -6
  335. package/package.json +2 -2
@@ -4,29 +4,29 @@ export interface FirewallPolicyAConfig extends cdktf.TerraformMetaArguments {
4
4
  /**
5
5
  * Valid values: 'allow', 'deny' or 'force-drop'(in stateful firewall rule to allow immediate packet dropping on established sessions).
6
6
  *
7
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_policy#action FirewallPolicyA#action}
7
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_policy#action FirewallPolicyA#action}
8
8
  */
9
9
  readonly action: string;
10
10
  /**
11
11
  * Description of this firewall policy.
12
12
  *
13
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_policy#description FirewallPolicyA#description}
13
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_policy#description FirewallPolicyA#description}
14
14
  */
15
15
  readonly description?: string;
16
16
  /**
17
17
  * CIDRs separated by comma or tag names such 'HR' or 'marketing' etc.
18
18
  *
19
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_policy#dst_ip FirewallPolicyA#dst_ip}
19
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_policy#dst_ip FirewallPolicyA#dst_ip}
20
20
  */
21
21
  readonly dstIp: string;
22
22
  /**
23
23
  * The name of gateway.
24
24
  *
25
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_policy#gw_name FirewallPolicyA#gw_name}
25
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_policy#gw_name FirewallPolicyA#gw_name}
26
26
  */
27
27
  readonly gwName: string;
28
28
  /**
29
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_policy#id FirewallPolicyA#id}
29
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_policy#id FirewallPolicyA#id}
30
30
  *
31
31
  * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
32
32
  * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -35,36 +35,36 @@ export interface FirewallPolicyAConfig extends cdktf.TerraformMetaArguments {
35
35
  /**
36
36
  * Valid values: true or false.
37
37
  *
38
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_policy#log_enabled FirewallPolicyA#log_enabled}
38
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_policy#log_enabled FirewallPolicyA#log_enabled}
39
39
  */
40
40
  readonly logEnabled?: boolean | cdktf.IResolvable;
41
41
  /**
42
42
  * A single port or a range of port numbers.
43
43
  *
44
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_policy#port FirewallPolicyA#port}
44
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_policy#port FirewallPolicyA#port}
45
45
  */
46
46
  readonly port: string;
47
47
  /**
48
48
  * Position in the policy list, where the firewall policy will be inserted to.
49
49
  *
50
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_policy#position FirewallPolicyA#position}
50
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_policy#position FirewallPolicyA#position}
51
51
  */
52
52
  readonly position?: number;
53
53
  /**
54
54
  * 'all', 'tcp', 'udp', 'icmp', 'sctp', 'rdp', 'dccp'.
55
55
  *
56
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_policy#protocol FirewallPolicyA#protocol}
56
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_policy#protocol FirewallPolicyA#protocol}
57
57
  */
58
58
  readonly protocol?: string;
59
59
  /**
60
60
  * CIDRs separated by comma or tag names such 'HR' or 'marketing' etc.
61
61
  *
62
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_policy#src_ip FirewallPolicyA#src_ip}
62
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_policy#src_ip FirewallPolicyA#src_ip}
63
63
  */
64
64
  readonly srcIp: string;
65
65
  }
66
66
  /**
67
- * Represents a {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_policy aviatrix_firewall_policy}
67
+ * Represents a {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_policy aviatrix_firewall_policy}
68
68
  */
69
69
  export declare class FirewallPolicyA extends cdktf.TerraformResource {
70
70
  static readonly tfResourceType = "aviatrix_firewall_policy";
@@ -72,12 +72,12 @@ export declare class FirewallPolicyA extends cdktf.TerraformResource {
72
72
  * Generates CDKTF code for importing a FirewallPolicyA resource upon running "cdktf plan <stack-name>"
73
73
  * @param scope The scope in which to define this construct
74
74
  * @param importToId The construct id used in the generated config for the FirewallPolicyA to import
75
- * @param importFromId The id of the existing FirewallPolicyA that should be imported. Refer to the {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_policy#import import section} in the documentation of this resource for the id to use
75
+ * @param importFromId The id of the existing FirewallPolicyA that should be imported. Refer to the {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_policy#import import section} in the documentation of this resource for the id to use
76
76
  * @param provider? Optional instance of the provider where the FirewallPolicyA to import is found
77
77
  */
78
78
  static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider): any;
79
79
  /**
80
- * Create a new {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_policy aviatrix_firewall_policy} Resource
80
+ * Create a new {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_policy aviatrix_firewall_policy} Resource
81
81
  *
82
82
  * @param scope The scope in which to define this construct
83
83
  * @param id The scoped construct ID. Must be unique amongst siblings in the same scope
@@ -1,8 +1,8 @@
1
- // https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_policy
1
+ // https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_policy
2
2
  // generated from terraform resource schema
3
3
  import * as cdktf from 'cdktf';
4
4
  /**
5
- * Represents a {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_policy aviatrix_firewall_policy}
5
+ * Represents a {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_policy aviatrix_firewall_policy}
6
6
  */
7
7
  export class FirewallPolicyA extends cdktf.TerraformResource {
8
8
  // =================
@@ -16,7 +16,7 @@ export class FirewallPolicyA extends cdktf.TerraformResource {
16
16
  * Generates CDKTF code for importing a FirewallPolicyA resource upon running "cdktf plan <stack-name>"
17
17
  * @param scope The scope in which to define this construct
18
18
  * @param importToId The construct id used in the generated config for the FirewallPolicyA to import
19
- * @param importFromId The id of the existing FirewallPolicyA that should be imported. Refer to the {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_policy#import import section} in the documentation of this resource for the id to use
19
+ * @param importFromId The id of the existing FirewallPolicyA that should be imported. Refer to the {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_policy#import import section} in the documentation of this resource for the id to use
20
20
  * @param provider? Optional instance of the provider where the FirewallPolicyA to import is found
21
21
  */
22
22
  static generateConfigForImport(scope, importToId, importFromId, provider) {
@@ -26,7 +26,7 @@ export class FirewallPolicyA extends cdktf.TerraformResource {
26
26
  // INITIALIZER
27
27
  // ===========
28
28
  /**
29
- * Create a new {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_policy aviatrix_firewall_policy} Resource
29
+ * Create a new {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_policy aviatrix_firewall_policy} Resource
30
30
  *
31
31
  * @param scope The scope in which to define this construct
32
32
  * @param id The scoped construct ID. Must be unique amongst siblings in the same scope
@@ -37,8 +37,8 @@ export class FirewallPolicyA extends cdktf.TerraformResource {
37
37
  terraformResourceType: 'aviatrix_firewall_policy',
38
38
  terraformGeneratorMetadata: {
39
39
  providerName: 'aviatrix',
40
- providerVersion: '8.1.10',
41
- providerVersionConstraint: '8.1.10'
40
+ providerVersion: '8.2.0',
41
+ providerVersionConstraint: '8.2.0'
42
42
  },
43
43
  provider: config.provider,
44
44
  dependsOn: config.dependsOn,
@@ -4,11 +4,11 @@ export interface FirewallTagConfig extends cdktf.TerraformMetaArguments {
4
4
  /**
5
5
  * This parameter represents the name of a Cloud-Account in Aviatrix controller.
6
6
  *
7
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_tag#firewall_tag FirewallTag#firewall_tag}
7
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_tag#firewall_tag FirewallTag#firewall_tag}
8
8
  */
9
9
  readonly firewallTag: string;
10
10
  /**
11
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_tag#id FirewallTag#id}
11
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_tag#id FirewallTag#id}
12
12
  *
13
13
  * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
14
14
  * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -17,7 +17,7 @@ export interface FirewallTagConfig extends cdktf.TerraformMetaArguments {
17
17
  /**
18
18
  * cidr_list block
19
19
  *
20
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_tag#cidr_list FirewallTag#cidr_list}
20
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_tag#cidr_list FirewallTag#cidr_list}
21
21
  */
22
22
  readonly cidrList?: FirewallTagCidrListStruct[] | cdktf.IResolvable;
23
23
  }
@@ -25,13 +25,13 @@ export interface FirewallTagCidrListStruct {
25
25
  /**
26
26
  * The CIDR attribute of a policy.
27
27
  *
28
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_tag#cidr FirewallTag#cidr}
28
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_tag#cidr FirewallTag#cidr}
29
29
  */
30
30
  readonly cidr: string;
31
31
  /**
32
32
  * The name attribute of a policy.
33
33
  *
34
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_tag#cidr_tag_name FirewallTag#cidr_tag_name}
34
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_tag#cidr_tag_name FirewallTag#cidr_tag_name}
35
35
  */
36
36
  readonly cidrTagName: string;
37
37
  }
@@ -75,7 +75,7 @@ export declare class FirewallTagCidrListStructList extends cdktf.ComplexList {
75
75
  get(index: number): FirewallTagCidrListStructOutputReference;
76
76
  }
77
77
  /**
78
- * Represents a {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_tag aviatrix_firewall_tag}
78
+ * Represents a {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_tag aviatrix_firewall_tag}
79
79
  */
80
80
  export declare class FirewallTag extends cdktf.TerraformResource {
81
81
  static readonly tfResourceType = "aviatrix_firewall_tag";
@@ -83,12 +83,12 @@ export declare class FirewallTag extends cdktf.TerraformResource {
83
83
  * Generates CDKTF code for importing a FirewallTag resource upon running "cdktf plan <stack-name>"
84
84
  * @param scope The scope in which to define this construct
85
85
  * @param importToId The construct id used in the generated config for the FirewallTag to import
86
- * @param importFromId The id of the existing FirewallTag that should be imported. Refer to the {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_tag#import import section} in the documentation of this resource for the id to use
86
+ * @param importFromId The id of the existing FirewallTag that should be imported. Refer to the {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_tag#import import section} in the documentation of this resource for the id to use
87
87
  * @param provider? Optional instance of the provider where the FirewallTag to import is found
88
88
  */
89
89
  static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider): any;
90
90
  /**
91
- * Create a new {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_tag aviatrix_firewall_tag} Resource
91
+ * Create a new {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_tag aviatrix_firewall_tag} Resource
92
92
  *
93
93
  * @param scope The scope in which to define this construct
94
94
  * @param id The scoped construct ID. Must be unique amongst siblings in the same scope
@@ -1,4 +1,4 @@
1
- // https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_tag
1
+ // https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_tag
2
2
  // generated from terraform resource schema
3
3
  import * as cdktf from 'cdktf';
4
4
  export function firewallTagCidrListStructToTerraform(struct) {
@@ -132,7 +132,7 @@ export class FirewallTagCidrListStructList extends cdktf.ComplexList {
132
132
  }
133
133
  }
134
134
  /**
135
- * Represents a {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_tag aviatrix_firewall_tag}
135
+ * Represents a {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_tag aviatrix_firewall_tag}
136
136
  */
137
137
  export class FirewallTag extends cdktf.TerraformResource {
138
138
  // =================
@@ -146,7 +146,7 @@ export class FirewallTag extends cdktf.TerraformResource {
146
146
  * Generates CDKTF code for importing a FirewallTag resource upon running "cdktf plan <stack-name>"
147
147
  * @param scope The scope in which to define this construct
148
148
  * @param importToId The construct id used in the generated config for the FirewallTag to import
149
- * @param importFromId The id of the existing FirewallTag that should be imported. Refer to the {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_tag#import import section} in the documentation of this resource for the id to use
149
+ * @param importFromId The id of the existing FirewallTag that should be imported. Refer to the {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_tag#import import section} in the documentation of this resource for the id to use
150
150
  * @param provider? Optional instance of the provider where the FirewallTag to import is found
151
151
  */
152
152
  static generateConfigForImport(scope, importToId, importFromId, provider) {
@@ -156,7 +156,7 @@ export class FirewallTag extends cdktf.TerraformResource {
156
156
  // INITIALIZER
157
157
  // ===========
158
158
  /**
159
- * Create a new {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/firewall_tag aviatrix_firewall_tag} Resource
159
+ * Create a new {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/firewall_tag aviatrix_firewall_tag} Resource
160
160
  *
161
161
  * @param scope The scope in which to define this construct
162
162
  * @param id The scoped construct ID. Must be unique amongst siblings in the same scope
@@ -167,8 +167,8 @@ export class FirewallTag extends cdktf.TerraformResource {
167
167
  terraformResourceType: 'aviatrix_firewall_tag',
168
168
  terraformGeneratorMetadata: {
169
169
  providerName: 'aviatrix',
170
- providerVersion: '8.1.10',
171
- providerVersionConstraint: '8.1.10'
170
+ providerVersion: '8.2.0',
171
+ providerVersionConstraint: '8.2.0'
172
172
  },
173
173
  provider: config.provider,
174
174
  dependsOn: config.dependsOn,
@@ -4,23 +4,23 @@ export interface FqdnConfig extends cdktf.TerraformMetaArguments {
4
4
  /**
5
5
  * FQDN Filter Tag Status. Valid values: true or false.
6
6
  *
7
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn#fqdn_enabled Fqdn#fqdn_enabled}
7
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn#fqdn_enabled Fqdn#fqdn_enabled}
8
8
  */
9
9
  readonly fqdnEnabled?: boolean | cdktf.IResolvable;
10
10
  /**
11
11
  * Specify the tag color to be a white-list tag or black-list tag. 'white' or 'black'
12
12
  *
13
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn#fqdn_mode Fqdn#fqdn_mode}
13
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn#fqdn_mode Fqdn#fqdn_mode}
14
14
  */
15
15
  readonly fqdnMode?: string;
16
16
  /**
17
17
  * FQDN Filter Tag Name.
18
18
  *
19
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn#fqdn_tag Fqdn#fqdn_tag}
19
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn#fqdn_tag Fqdn#fqdn_tag}
20
20
  */
21
21
  readonly fqdnTag: string;
22
22
  /**
23
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn#id Fqdn#id}
23
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn#id Fqdn#id}
24
24
  *
25
25
  * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
26
26
  * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -29,19 +29,19 @@ export interface FqdnConfig extends cdktf.TerraformMetaArguments {
29
29
  /**
30
30
  * Enable to manage domain name rules in-line. If false, domain name rules must be managed using `aviatrix_fqdn_tag_rule` resources.
31
31
  *
32
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn#manage_domain_names Fqdn#manage_domain_names}
32
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn#manage_domain_names Fqdn#manage_domain_names}
33
33
  */
34
34
  readonly manageDomainNames?: boolean | cdktf.IResolvable;
35
35
  /**
36
36
  * domain_names block
37
37
  *
38
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn#domain_names Fqdn#domain_names}
38
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn#domain_names Fqdn#domain_names}
39
39
  */
40
40
  readonly domainNames?: FqdnDomainNames[] | cdktf.IResolvable;
41
41
  /**
42
42
  * gw_filter_tag_list block
43
43
  *
44
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn#gw_filter_tag_list Fqdn#gw_filter_tag_list}
44
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn#gw_filter_tag_list Fqdn#gw_filter_tag_list}
45
45
  */
46
46
  readonly gwFilterTagList?: FqdnGwFilterTagListStruct[] | cdktf.IResolvable;
47
47
  }
@@ -49,25 +49,25 @@ export interface FqdnDomainNames {
49
49
  /**
50
50
  * What action should happen to matching requests. Possible values are: 'Base Policy', 'Allow' or 'Deny'. Defaults to 'Base Policy' if no value is provided.
51
51
  *
52
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn#action Fqdn#action}
52
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn#action Fqdn#action}
53
53
  */
54
54
  readonly action?: string;
55
55
  /**
56
56
  * FQDN.
57
57
  *
58
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn#fqdn Fqdn#fqdn}
58
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn#fqdn Fqdn#fqdn}
59
59
  */
60
60
  readonly fqdn: string;
61
61
  /**
62
62
  * Port.
63
63
  *
64
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn#port Fqdn#port}
64
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn#port Fqdn#port}
65
65
  */
66
66
  readonly port: string;
67
67
  /**
68
68
  * Protocol.
69
69
  *
70
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn#proto Fqdn#proto}
70
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn#proto Fqdn#proto}
71
71
  */
72
72
  readonly proto: string;
73
73
  }
@@ -123,13 +123,13 @@ export interface FqdnGwFilterTagListStruct {
123
123
  /**
124
124
  * Name of the gateway to attach to the specific tag.
125
125
  *
126
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn#gw_name Fqdn#gw_name}
126
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn#gw_name Fqdn#gw_name}
127
127
  */
128
128
  readonly gwName: string;
129
129
  /**
130
130
  * List of source IPs in the VPC qualified for a specific tag.
131
131
  *
132
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn#source_ip_list Fqdn#source_ip_list}
132
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn#source_ip_list Fqdn#source_ip_list}
133
133
  */
134
134
  readonly sourceIpList?: string[];
135
135
  }
@@ -174,7 +174,7 @@ export declare class FqdnGwFilterTagListStructList extends cdktf.ComplexList {
174
174
  get(index: number): FqdnGwFilterTagListStructOutputReference;
175
175
  }
176
176
  /**
177
- * Represents a {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn aviatrix_fqdn}
177
+ * Represents a {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn aviatrix_fqdn}
178
178
  */
179
179
  export declare class Fqdn extends cdktf.TerraformResource {
180
180
  static readonly tfResourceType = "aviatrix_fqdn";
@@ -182,12 +182,12 @@ export declare class Fqdn extends cdktf.TerraformResource {
182
182
  * Generates CDKTF code for importing a Fqdn resource upon running "cdktf plan <stack-name>"
183
183
  * @param scope The scope in which to define this construct
184
184
  * @param importToId The construct id used in the generated config for the Fqdn to import
185
- * @param importFromId The id of the existing Fqdn that should be imported. Refer to the {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn#import import section} in the documentation of this resource for the id to use
185
+ * @param importFromId The id of the existing Fqdn that should be imported. Refer to the {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn#import import section} in the documentation of this resource for the id to use
186
186
  * @param provider? Optional instance of the provider where the Fqdn to import is found
187
187
  */
188
188
  static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider): any;
189
189
  /**
190
- * Create a new {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn aviatrix_fqdn} Resource
190
+ * Create a new {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn aviatrix_fqdn} Resource
191
191
  *
192
192
  * @param scope The scope in which to define this construct
193
193
  * @param id The scoped construct ID. Must be unique amongst siblings in the same scope
@@ -1,4 +1,4 @@
1
- // https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn
1
+ // https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn
2
2
  // generated from terraform resource schema
3
3
  import * as cdktf from 'cdktf';
4
4
  export function fqdnDomainNamesToTerraform(struct) {
@@ -318,7 +318,7 @@ export class FqdnGwFilterTagListStructList extends cdktf.ComplexList {
318
318
  }
319
319
  }
320
320
  /**
321
- * Represents a {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn aviatrix_fqdn}
321
+ * Represents a {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn aviatrix_fqdn}
322
322
  */
323
323
  export class Fqdn extends cdktf.TerraformResource {
324
324
  // =================
@@ -332,7 +332,7 @@ export class Fqdn extends cdktf.TerraformResource {
332
332
  * Generates CDKTF code for importing a Fqdn resource upon running "cdktf plan <stack-name>"
333
333
  * @param scope The scope in which to define this construct
334
334
  * @param importToId The construct id used in the generated config for the Fqdn to import
335
- * @param importFromId The id of the existing Fqdn that should be imported. Refer to the {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn#import import section} in the documentation of this resource for the id to use
335
+ * @param importFromId The id of the existing Fqdn that should be imported. Refer to the {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn#import import section} in the documentation of this resource for the id to use
336
336
  * @param provider? Optional instance of the provider where the Fqdn to import is found
337
337
  */
338
338
  static generateConfigForImport(scope, importToId, importFromId, provider) {
@@ -342,7 +342,7 @@ export class Fqdn extends cdktf.TerraformResource {
342
342
  // INITIALIZER
343
343
  // ===========
344
344
  /**
345
- * Create a new {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn aviatrix_fqdn} Resource
345
+ * Create a new {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn aviatrix_fqdn} Resource
346
346
  *
347
347
  * @param scope The scope in which to define this construct
348
348
  * @param id The scoped construct ID. Must be unique amongst siblings in the same scope
@@ -353,8 +353,8 @@ export class Fqdn extends cdktf.TerraformResource {
353
353
  terraformResourceType: 'aviatrix_fqdn',
354
354
  terraformGeneratorMetadata: {
355
355
  providerName: 'aviatrix',
356
- providerVersion: '8.1.10',
357
- providerVersionConstraint: '8.1.10'
356
+ providerVersion: '8.2.0',
357
+ providerVersionConstraint: '8.2.0'
358
358
  },
359
359
  provider: config.provider,
360
360
  dependsOn: config.dependsOn,
@@ -4,41 +4,41 @@ export interface FqdnGlobalConfigConfig extends cdktf.TerraformMetaArguments {
4
4
  /**
5
5
  * Customized packet destination address ranges not to be filtered by FQDN. Can be selected from pre-defined RFC 1918 range, or own network range.
6
6
  *
7
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn_global_config#configured_ips FqdnGlobalConfig#configured_ips}
7
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn_global_config#configured_ips FqdnGlobalConfig#configured_ips}
8
8
  */
9
9
  readonly configuredIps?: string[];
10
10
  /**
11
11
  * If enabled, it caches the resolved IP address from FQDN filter.
12
12
  *
13
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn_global_config#enable_caching FqdnGlobalConfig#enable_caching}
13
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn_global_config#enable_caching FqdnGlobalConfig#enable_caching}
14
14
  */
15
15
  readonly enableCaching?: boolean | cdktf.IResolvable;
16
16
  /**
17
17
  * If enabled, it customizes packet destination address ranges not to be filtered by FQDN.
18
18
  *
19
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn_global_config#enable_custom_network_filtering FqdnGlobalConfig#enable_custom_network_filtering}
19
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn_global_config#enable_custom_network_filtering FqdnGlobalConfig#enable_custom_network_filtering}
20
20
  */
21
21
  readonly enableCustomNetworkFiltering?: boolean | cdktf.IResolvable;
22
22
  /**
23
23
  * If enabled, the resolved IP address from FQDN filter is cached so that if subsequent TCP session matches the cached IP address list, FQDN domain name is not checked and the session is allowed to pass.
24
24
  *
25
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn_global_config#enable_exact_match FqdnGlobalConfig#enable_exact_match}
25
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn_global_config#enable_exact_match FqdnGlobalConfig#enable_exact_match}
26
26
  */
27
27
  readonly enableExactMatch?: boolean | cdktf.IResolvable;
28
28
  /**
29
29
  * If enabled, it allows packets passing through the gateway without an SNI field. Only applies to whitelist.
30
30
  *
31
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn_global_config#enable_exception_rule FqdnGlobalConfig#enable_exception_rule}
31
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn_global_config#enable_exception_rule FqdnGlobalConfig#enable_exception_rule}
32
32
  */
33
33
  readonly enableExceptionRule?: boolean | cdktf.IResolvable;
34
34
  /**
35
35
  * If enabled, destination FQDN names that translate to private IP address range (RFC 1918) are subject to FQDN whitelist filtering function.
36
36
  *
37
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn_global_config#enable_private_network_filtering FqdnGlobalConfig#enable_private_network_filtering}
37
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn_global_config#enable_private_network_filtering FqdnGlobalConfig#enable_private_network_filtering}
38
38
  */
39
39
  readonly enablePrivateNetworkFiltering?: boolean | cdktf.IResolvable;
40
40
  /**
41
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn_global_config#id FqdnGlobalConfig#id}
41
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn_global_config#id FqdnGlobalConfig#id}
42
42
  *
43
43
  * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
44
44
  * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -46,7 +46,7 @@ export interface FqdnGlobalConfigConfig extends cdktf.TerraformMetaArguments {
46
46
  readonly id?: string;
47
47
  }
48
48
  /**
49
- * Represents a {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn_global_config aviatrix_fqdn_global_config}
49
+ * Represents a {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn_global_config aviatrix_fqdn_global_config}
50
50
  */
51
51
  export declare class FqdnGlobalConfig extends cdktf.TerraformResource {
52
52
  static readonly tfResourceType = "aviatrix_fqdn_global_config";
@@ -54,12 +54,12 @@ export declare class FqdnGlobalConfig extends cdktf.TerraformResource {
54
54
  * Generates CDKTF code for importing a FqdnGlobalConfig resource upon running "cdktf plan <stack-name>"
55
55
  * @param scope The scope in which to define this construct
56
56
  * @param importToId The construct id used in the generated config for the FqdnGlobalConfig to import
57
- * @param importFromId The id of the existing FqdnGlobalConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn_global_config#import import section} in the documentation of this resource for the id to use
57
+ * @param importFromId The id of the existing FqdnGlobalConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn_global_config#import import section} in the documentation of this resource for the id to use
58
58
  * @param provider? Optional instance of the provider where the FqdnGlobalConfig to import is found
59
59
  */
60
60
  static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider): any;
61
61
  /**
62
- * Create a new {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn_global_config aviatrix_fqdn_global_config} Resource
62
+ * Create a new {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn_global_config aviatrix_fqdn_global_config} Resource
63
63
  *
64
64
  * @param scope The scope in which to define this construct
65
65
  * @param id The scoped construct ID. Must be unique amongst siblings in the same scope
@@ -1,8 +1,8 @@
1
- // https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn_global_config
1
+ // https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn_global_config
2
2
  // generated from terraform resource schema
3
3
  import * as cdktf from 'cdktf';
4
4
  /**
5
- * Represents a {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn_global_config aviatrix_fqdn_global_config}
5
+ * Represents a {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn_global_config aviatrix_fqdn_global_config}
6
6
  */
7
7
  export class FqdnGlobalConfig extends cdktf.TerraformResource {
8
8
  // =================
@@ -16,7 +16,7 @@ export class FqdnGlobalConfig extends cdktf.TerraformResource {
16
16
  * Generates CDKTF code for importing a FqdnGlobalConfig resource upon running "cdktf plan <stack-name>"
17
17
  * @param scope The scope in which to define this construct
18
18
  * @param importToId The construct id used in the generated config for the FqdnGlobalConfig to import
19
- * @param importFromId The id of the existing FqdnGlobalConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn_global_config#import import section} in the documentation of this resource for the id to use
19
+ * @param importFromId The id of the existing FqdnGlobalConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn_global_config#import import section} in the documentation of this resource for the id to use
20
20
  * @param provider? Optional instance of the provider where the FqdnGlobalConfig to import is found
21
21
  */
22
22
  static generateConfigForImport(scope, importToId, importFromId, provider) {
@@ -26,7 +26,7 @@ export class FqdnGlobalConfig extends cdktf.TerraformResource {
26
26
  // INITIALIZER
27
27
  // ===========
28
28
  /**
29
- * Create a new {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn_global_config aviatrix_fqdn_global_config} Resource
29
+ * Create a new {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn_global_config aviatrix_fqdn_global_config} Resource
30
30
  *
31
31
  * @param scope The scope in which to define this construct
32
32
  * @param id The scoped construct ID. Must be unique amongst siblings in the same scope
@@ -37,8 +37,8 @@ export class FqdnGlobalConfig extends cdktf.TerraformResource {
37
37
  terraformResourceType: 'aviatrix_fqdn_global_config',
38
38
  terraformGeneratorMetadata: {
39
39
  providerName: 'aviatrix',
40
- providerVersion: '8.1.10',
41
- providerVersionConstraint: '8.1.10'
40
+ providerVersion: '8.2.0',
41
+ providerVersionConstraint: '8.2.0'
42
42
  },
43
43
  provider: config.provider,
44
44
  dependsOn: config.dependsOn,
@@ -4,11 +4,11 @@ export interface FqdnPassThroughConfig extends cdktf.TerraformMetaArguments {
4
4
  /**
5
5
  * Gateway to apply FQDN pass-through rules to.
6
6
  *
7
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn_pass_through#gw_name FqdnPassThrough#gw_name}
7
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn_pass_through#gw_name FqdnPassThrough#gw_name}
8
8
  */
9
9
  readonly gwName: string;
10
10
  /**
11
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn_pass_through#id FqdnPassThrough#id}
11
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn_pass_through#id FqdnPassThrough#id}
12
12
  *
13
13
  * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
14
14
  * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -17,12 +17,12 @@ export interface FqdnPassThroughConfig extends cdktf.TerraformMetaArguments {
17
17
  /**
18
18
  * CIDRs to allow originating requests to ignore FQDN filtering rules.
19
19
  *
20
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn_pass_through#pass_through_cidrs FqdnPassThrough#pass_through_cidrs}
20
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn_pass_through#pass_through_cidrs FqdnPassThrough#pass_through_cidrs}
21
21
  */
22
22
  readonly passThroughCidrs: string[];
23
23
  }
24
24
  /**
25
- * Represents a {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn_pass_through aviatrix_fqdn_pass_through}
25
+ * Represents a {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn_pass_through aviatrix_fqdn_pass_through}
26
26
  */
27
27
  export declare class FqdnPassThrough extends cdktf.TerraformResource {
28
28
  static readonly tfResourceType = "aviatrix_fqdn_pass_through";
@@ -30,12 +30,12 @@ export declare class FqdnPassThrough extends cdktf.TerraformResource {
30
30
  * Generates CDKTF code for importing a FqdnPassThrough resource upon running "cdktf plan <stack-name>"
31
31
  * @param scope The scope in which to define this construct
32
32
  * @param importToId The construct id used in the generated config for the FqdnPassThrough to import
33
- * @param importFromId The id of the existing FqdnPassThrough that should be imported. Refer to the {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn_pass_through#import import section} in the documentation of this resource for the id to use
33
+ * @param importFromId The id of the existing FqdnPassThrough that should be imported. Refer to the {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn_pass_through#import import section} in the documentation of this resource for the id to use
34
34
  * @param provider? Optional instance of the provider where the FqdnPassThrough to import is found
35
35
  */
36
36
  static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider): any;
37
37
  /**
38
- * Create a new {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.1.10/docs/resources/fqdn_pass_through aviatrix_fqdn_pass_through} Resource
38
+ * Create a new {@link https://registry.terraform.io/providers/aviatrixsystems/aviatrix/8.2.0/docs/resources/fqdn_pass_through aviatrix_fqdn_pass_through} Resource
39
39
  *
40
40
  * @param scope The scope in which to define this construct
41
41
  * @param id The scoped construct ID. Must be unique amongst siblings in the same scope