cdktf-cdktf-provider-upcloud 14.1.0__py3-none-any.whl → 14.2.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +10 -3
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +5 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.2.1.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +10 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +10 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +10 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +25 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +16 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +33 -30
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +25 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +13 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +10 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +16 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +28 -25
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +10 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +13 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +13 -10
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +44 -41
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +22 -19
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +254 -29
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +1279 -0
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +1337 -0
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +34 -31
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +50 -47
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +45 -42
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +67 -64
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +19 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +31 -28
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +19 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +42 -39
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +196 -193
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +19 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +22 -19
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +34 -31
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +31 -28
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +22 -19
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +259 -205
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +5227 -660
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +1240 -338
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +176 -127
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +53 -50
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +33 -30
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +22 -19
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +16 -13
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +19 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +19 -16
- cdktf_cdktf_provider_upcloud/network/__init__.py +43 -40
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +33 -30
- cdktf_cdktf_provider_upcloud/provider/__init__.py +28 -25
- cdktf_cdktf_provider_upcloud/router/__init__.py +22 -19
- cdktf_cdktf_provider_upcloud/server/__init__.py +150 -147
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +25 -22
- cdktf_cdktf_provider_upcloud/storage/__init__.py +61 -58
- cdktf_cdktf_provider_upcloud/tag/__init__.py +19 -16
- {cdktf_cdktf_provider_upcloud-14.1.0.dist-info → cdktf_cdktf_provider_upcloud-14.2.1.dist-info}/METADATA +5 -5
- cdktf_cdktf_provider_upcloud-14.2.1.dist-info/RECORD +60 -0
- {cdktf_cdktf_provider_upcloud-14.1.0.dist-info → cdktf_cdktf_provider_upcloud-14.2.1.dist-info}/WHEEL +1 -1
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.1.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-14.1.0.dist-info/RECORD +0 -58
- {cdktf_cdktf_provider_upcloud-14.1.0.dist-info → cdktf_cdktf_provider_upcloud-14.2.1.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-14.1.0.dist-info → cdktf_cdktf_provider_upcloud-14.2.1.dist-info}/top_level.txt +0 -0
|
@@ -1,8 +1,11 @@
|
|
|
1
1
|
'''
|
|
2
2
|
# `upcloud_firewall_rules`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_firewall_rules`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_firewall_rules`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules).
|
|
5
5
|
'''
|
|
6
|
+
from pkgutil import extend_path
|
|
7
|
+
__path__ = extend_path(__path__, __name__)
|
|
8
|
+
|
|
6
9
|
import abc
|
|
7
10
|
import builtins
|
|
8
11
|
import datetime
|
|
@@ -26,7 +29,7 @@ class FirewallRules(
|
|
|
26
29
|
metaclass=jsii.JSIIMeta,
|
|
27
30
|
jsii_type="@cdktf/provider-upcloud.firewallRules.FirewallRules",
|
|
28
31
|
):
|
|
29
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
32
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules upcloud_firewall_rules}.'''
|
|
30
33
|
|
|
31
34
|
def __init__(
|
|
32
35
|
self,
|
|
@@ -44,13 +47,13 @@ class FirewallRules(
|
|
|
44
47
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
45
48
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
46
49
|
) -> None:
|
|
47
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
50
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules upcloud_firewall_rules} Resource.
|
|
48
51
|
|
|
49
52
|
:param scope: The scope in which to define this construct.
|
|
50
53
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
51
|
-
:param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
52
|
-
:param server_id: The unique id of the server to be protected the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
53
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
54
|
+
:param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
|
|
55
|
+
:param server_id: The unique id of the server to be protected the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#server_id FirewallRules#server_id}
|
|
56
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#id FirewallRules#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
54
57
|
:param connection:
|
|
55
58
|
:param count:
|
|
56
59
|
:param depends_on:
|
|
@@ -91,7 +94,7 @@ class FirewallRules(
|
|
|
91
94
|
|
|
92
95
|
:param scope: The scope in which to define this construct.
|
|
93
96
|
:param import_to_id: The construct id used in the generated config for the FirewallRules to import.
|
|
94
|
-
:param import_from_id: The id of the existing FirewallRules that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
97
|
+
:param import_from_id: The id of the existing FirewallRules that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#import import section} in the documentation of this resource for the id to use
|
|
95
98
|
:param provider: ? Optional instance of the provider where the FirewallRules to import is found.
|
|
96
99
|
'''
|
|
97
100
|
if __debug__:
|
|
@@ -218,9 +221,9 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
218
221
|
:param lifecycle:
|
|
219
222
|
:param provider:
|
|
220
223
|
:param provisioners:
|
|
221
|
-
:param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
222
|
-
:param server_id: The unique id of the server to be protected the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
223
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
224
|
+
:param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
|
|
225
|
+
:param server_id: The unique id of the server to be protected the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#server_id FirewallRules#server_id}
|
|
226
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#id FirewallRules#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
224
227
|
'''
|
|
225
228
|
if isinstance(lifecycle, dict):
|
|
226
229
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -327,7 +330,7 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
327
330
|
) -> typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]]:
|
|
328
331
|
'''firewall_rule block.
|
|
329
332
|
|
|
330
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
333
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
|
|
331
334
|
'''
|
|
332
335
|
result = self._values.get("firewall_rule")
|
|
333
336
|
assert result is not None, "Required property 'firewall_rule' is missing"
|
|
@@ -337,7 +340,7 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
337
340
|
def server_id(self) -> builtins.str:
|
|
338
341
|
'''The unique id of the server to be protected the firewall rules.
|
|
339
342
|
|
|
340
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
343
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#server_id FirewallRules#server_id}
|
|
341
344
|
'''
|
|
342
345
|
result = self._values.get("server_id")
|
|
343
346
|
assert result is not None, "Required property 'server_id' is missing"
|
|
@@ -345,7 +348,7 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
345
348
|
|
|
346
349
|
@builtins.property
|
|
347
350
|
def id(self) -> typing.Optional[builtins.str]:
|
|
348
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
351
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#id FirewallRules#id}.
|
|
349
352
|
|
|
350
353
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
351
354
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -405,20 +408,20 @@ class FirewallRulesFirewallRule:
|
|
|
405
408
|
source_port_start: typing.Optional[builtins.str] = None,
|
|
406
409
|
) -> None:
|
|
407
410
|
'''
|
|
408
|
-
:param action: Action to take if the rule conditions are met. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
409
|
-
:param direction: The direction of network traffic this rule will be applied to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
410
|
-
:param comment: Freeform comment string for the rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
411
|
-
:param destination_address_end: The destination address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
412
|
-
:param destination_address_start: The destination address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
413
|
-
:param destination_port_end: The destination port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
414
|
-
:param destination_port_start: The destination port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
415
|
-
:param family: The address family of new firewall rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
416
|
-
:param icmp_type: The ICMP type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
417
|
-
:param protocol: The protocol this rule will be applied to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
418
|
-
:param source_address_end: The source address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
419
|
-
:param source_address_start: The source address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
420
|
-
:param source_port_end: The source port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
421
|
-
:param source_port_start: The source port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
411
|
+
:param action: Action to take if the rule conditions are met. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#action FirewallRules#action}
|
|
412
|
+
:param direction: The direction of network traffic this rule will be applied to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#direction FirewallRules#direction}
|
|
413
|
+
:param comment: Freeform comment string for the rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#comment FirewallRules#comment}
|
|
414
|
+
:param destination_address_end: The destination address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
|
|
415
|
+
:param destination_address_start: The destination address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
|
|
416
|
+
:param destination_port_end: The destination port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
|
|
417
|
+
:param destination_port_start: The destination port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
|
|
418
|
+
:param family: The address family of new firewall rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#family FirewallRules#family}
|
|
419
|
+
:param icmp_type: The ICMP type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
|
|
420
|
+
:param protocol: The protocol this rule will be applied to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#protocol FirewallRules#protocol}
|
|
421
|
+
:param source_address_end: The source address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
|
|
422
|
+
:param source_address_start: The source address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
|
|
423
|
+
:param source_port_end: The source port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
|
|
424
|
+
:param source_port_start: The source port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
|
|
422
425
|
'''
|
|
423
426
|
if __debug__:
|
|
424
427
|
type_hints = typing.get_type_hints(_typecheckingstub__9b77e978fb66d25b46f06da19493b15c4f42527dec58b7335729cf86141901af)
|
|
@@ -469,7 +472,7 @@ class FirewallRulesFirewallRule:
|
|
|
469
472
|
def action(self) -> builtins.str:
|
|
470
473
|
'''Action to take if the rule conditions are met.
|
|
471
474
|
|
|
472
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
475
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#action FirewallRules#action}
|
|
473
476
|
'''
|
|
474
477
|
result = self._values.get("action")
|
|
475
478
|
assert result is not None, "Required property 'action' is missing"
|
|
@@ -479,7 +482,7 @@ class FirewallRulesFirewallRule:
|
|
|
479
482
|
def direction(self) -> builtins.str:
|
|
480
483
|
'''The direction of network traffic this rule will be applied to.
|
|
481
484
|
|
|
482
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
485
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#direction FirewallRules#direction}
|
|
483
486
|
'''
|
|
484
487
|
result = self._values.get("direction")
|
|
485
488
|
assert result is not None, "Required property 'direction' is missing"
|
|
@@ -489,7 +492,7 @@ class FirewallRulesFirewallRule:
|
|
|
489
492
|
def comment(self) -> typing.Optional[builtins.str]:
|
|
490
493
|
'''Freeform comment string for the rule.
|
|
491
494
|
|
|
492
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
495
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#comment FirewallRules#comment}
|
|
493
496
|
'''
|
|
494
497
|
result = self._values.get("comment")
|
|
495
498
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -498,7 +501,7 @@ class FirewallRulesFirewallRule:
|
|
|
498
501
|
def destination_address_end(self) -> typing.Optional[builtins.str]:
|
|
499
502
|
'''The destination address range ends from this address.
|
|
500
503
|
|
|
501
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
504
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
|
|
502
505
|
'''
|
|
503
506
|
result = self._values.get("destination_address_end")
|
|
504
507
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -507,7 +510,7 @@ class FirewallRulesFirewallRule:
|
|
|
507
510
|
def destination_address_start(self) -> typing.Optional[builtins.str]:
|
|
508
511
|
'''The destination address range starts from this address.
|
|
509
512
|
|
|
510
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
513
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
|
|
511
514
|
'''
|
|
512
515
|
result = self._values.get("destination_address_start")
|
|
513
516
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -516,7 +519,7 @@ class FirewallRulesFirewallRule:
|
|
|
516
519
|
def destination_port_end(self) -> typing.Optional[builtins.str]:
|
|
517
520
|
'''The destination port range ends from this port number.
|
|
518
521
|
|
|
519
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
522
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
|
|
520
523
|
'''
|
|
521
524
|
result = self._values.get("destination_port_end")
|
|
522
525
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -525,7 +528,7 @@ class FirewallRulesFirewallRule:
|
|
|
525
528
|
def destination_port_start(self) -> typing.Optional[builtins.str]:
|
|
526
529
|
'''The destination port range starts from this port number.
|
|
527
530
|
|
|
528
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
531
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
|
|
529
532
|
'''
|
|
530
533
|
result = self._values.get("destination_port_start")
|
|
531
534
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -534,7 +537,7 @@ class FirewallRulesFirewallRule:
|
|
|
534
537
|
def family(self) -> typing.Optional[builtins.str]:
|
|
535
538
|
'''The address family of new firewall rule.
|
|
536
539
|
|
|
537
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
540
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#family FirewallRules#family}
|
|
538
541
|
'''
|
|
539
542
|
result = self._values.get("family")
|
|
540
543
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -543,7 +546,7 @@ class FirewallRulesFirewallRule:
|
|
|
543
546
|
def icmp_type(self) -> typing.Optional[builtins.str]:
|
|
544
547
|
'''The ICMP type.
|
|
545
548
|
|
|
546
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
549
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
|
|
547
550
|
'''
|
|
548
551
|
result = self._values.get("icmp_type")
|
|
549
552
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -552,7 +555,7 @@ class FirewallRulesFirewallRule:
|
|
|
552
555
|
def protocol(self) -> typing.Optional[builtins.str]:
|
|
553
556
|
'''The protocol this rule will be applied to.
|
|
554
557
|
|
|
555
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
558
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#protocol FirewallRules#protocol}
|
|
556
559
|
'''
|
|
557
560
|
result = self._values.get("protocol")
|
|
558
561
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -561,7 +564,7 @@ class FirewallRulesFirewallRule:
|
|
|
561
564
|
def source_address_end(self) -> typing.Optional[builtins.str]:
|
|
562
565
|
'''The source address range ends from this address.
|
|
563
566
|
|
|
564
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
567
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
|
|
565
568
|
'''
|
|
566
569
|
result = self._values.get("source_address_end")
|
|
567
570
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -570,7 +573,7 @@ class FirewallRulesFirewallRule:
|
|
|
570
573
|
def source_address_start(self) -> typing.Optional[builtins.str]:
|
|
571
574
|
'''The source address range starts from this address.
|
|
572
575
|
|
|
573
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
576
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
|
|
574
577
|
'''
|
|
575
578
|
result = self._values.get("source_address_start")
|
|
576
579
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -579,7 +582,7 @@ class FirewallRulesFirewallRule:
|
|
|
579
582
|
def source_port_end(self) -> typing.Optional[builtins.str]:
|
|
580
583
|
'''The source port range ends from this port number.
|
|
581
584
|
|
|
582
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
585
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
|
|
583
586
|
'''
|
|
584
587
|
result = self._values.get("source_port_end")
|
|
585
588
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -588,7 +591,7 @@ class FirewallRulesFirewallRule:
|
|
|
588
591
|
def source_port_start(self) -> typing.Optional[builtins.str]:
|
|
589
592
|
'''The source port range starts from this port number.
|
|
590
593
|
|
|
591
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
594
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
|
|
592
595
|
'''
|
|
593
596
|
result = self._values.get("source_port_start")
|
|
594
597
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -1,8 +1,11 @@
|
|
|
1
1
|
'''
|
|
2
2
|
# `upcloud_floating_ip_address`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_floating_ip_address`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_floating_ip_address`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/floating_ip_address).
|
|
5
5
|
'''
|
|
6
|
+
from pkgutil import extend_path
|
|
7
|
+
__path__ = extend_path(__path__, __name__)
|
|
8
|
+
|
|
6
9
|
import abc
|
|
7
10
|
import builtins
|
|
8
11
|
import datetime
|
|
@@ -26,7 +29,7 @@ class FloatingIpAddress(
|
|
|
26
29
|
metaclass=jsii.JSIIMeta,
|
|
27
30
|
jsii_type="@cdktf/provider-upcloud.floatingIpAddress.FloatingIpAddress",
|
|
28
31
|
):
|
|
29
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
32
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/floating_ip_address upcloud_floating_ip_address}.'''
|
|
30
33
|
|
|
31
34
|
def __init__(
|
|
32
35
|
self,
|
|
@@ -46,15 +49,15 @@ class FloatingIpAddress(
|
|
|
46
49
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
47
50
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
48
51
|
) -> None:
|
|
49
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
52
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/floating_ip_address upcloud_floating_ip_address} Resource.
|
|
50
53
|
|
|
51
54
|
:param scope: The scope in which to define this construct.
|
|
52
55
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
53
|
-
:param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
54
|
-
:param family: The address family of new IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
55
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
56
|
-
:param mac_address: MAC address of server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
57
|
-
:param zone: Zone of address, required when assigning a detached floating IP address, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
56
|
+
:param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/floating_ip_address#access FloatingIpAddress#access}
|
|
57
|
+
:param family: The address family of new IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/floating_ip_address#family FloatingIpAddress#family}
|
|
58
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/floating_ip_address#id FloatingIpAddress#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
59
|
+
:param mac_address: MAC address of server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
|
|
60
|
+
:param zone: Zone of address, required when assigning a detached floating IP address, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
|
|
58
61
|
:param connection:
|
|
59
62
|
:param count:
|
|
60
63
|
:param depends_on:
|
|
@@ -97,7 +100,7 @@ class FloatingIpAddress(
|
|
|
97
100
|
|
|
98
101
|
:param scope: The scope in which to define this construct.
|
|
99
102
|
:param import_to_id: The construct id used in the generated config for the FloatingIpAddress to import.
|
|
100
|
-
:param import_from_id: The id of the existing FloatingIpAddress that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
103
|
+
:param import_from_id: The id of the existing FloatingIpAddress that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/floating_ip_address#import import section} in the documentation of this resource for the id to use
|
|
101
104
|
:param provider: ? Optional instance of the provider where the FloatingIpAddress to import is found.
|
|
102
105
|
'''
|
|
103
106
|
if __debug__:
|
|
@@ -275,11 +278,11 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
275
278
|
:param lifecycle:
|
|
276
279
|
:param provider:
|
|
277
280
|
:param provisioners:
|
|
278
|
-
:param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
279
|
-
:param family: The address family of new IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
280
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
281
|
-
:param mac_address: MAC address of server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
282
|
-
:param zone: Zone of address, required when assigning a detached floating IP address, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
281
|
+
:param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/floating_ip_address#access FloatingIpAddress#access}
|
|
282
|
+
:param family: The address family of new IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/floating_ip_address#family FloatingIpAddress#family}
|
|
283
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/floating_ip_address#id FloatingIpAddress#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
284
|
+
:param mac_address: MAC address of server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
|
|
285
|
+
:param zone: Zone of address, required when assigning a detached floating IP address, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
|
|
283
286
|
'''
|
|
284
287
|
if isinstance(lifecycle, dict):
|
|
285
288
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -391,7 +394,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
391
394
|
def access(self) -> typing.Optional[builtins.str]:
|
|
392
395
|
'''Network access for the floating IP address. Supported value: ``public``.
|
|
393
396
|
|
|
394
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
397
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/floating_ip_address#access FloatingIpAddress#access}
|
|
395
398
|
'''
|
|
396
399
|
result = self._values.get("access")
|
|
397
400
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -400,14 +403,14 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
400
403
|
def family(self) -> typing.Optional[builtins.str]:
|
|
401
404
|
'''The address family of new IP address.
|
|
402
405
|
|
|
403
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
406
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/floating_ip_address#family FloatingIpAddress#family}
|
|
404
407
|
'''
|
|
405
408
|
result = self._values.get("family")
|
|
406
409
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
407
410
|
|
|
408
411
|
@builtins.property
|
|
409
412
|
def id(self) -> typing.Optional[builtins.str]:
|
|
410
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
413
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/floating_ip_address#id FloatingIpAddress#id}.
|
|
411
414
|
|
|
412
415
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
413
416
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -419,7 +422,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
419
422
|
def mac_address(self) -> typing.Optional[builtins.str]:
|
|
420
423
|
'''MAC address of server interface to assign address to.
|
|
421
424
|
|
|
422
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
425
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
|
|
423
426
|
'''
|
|
424
427
|
result = self._values.get("mac_address")
|
|
425
428
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -428,7 +431,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
428
431
|
def zone(self) -> typing.Optional[builtins.str]:
|
|
429
432
|
'''Zone of address, required when assigning a detached floating IP address, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``.
|
|
430
433
|
|
|
431
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.1
|
|
434
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
|
|
432
435
|
'''
|
|
433
436
|
result = self._values.get("zone")
|
|
434
437
|
return typing.cast(typing.Optional[builtins.str], result)
|