cdktf-cdktf-provider-upcloud 14.10.1__py3-none-any.whl → 14.11.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +23 -4
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +18 -3
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.11.1.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +23 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +23 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +23 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_load_balancer_dns_challenge_domain/__init__.py +319 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +38 -23
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +29 -14
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +46 -31
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +38 -23
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +26 -11
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +23 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +29 -14
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +131 -54
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +23 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +26 -11
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +23 -8
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +57 -42
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +32 -17
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +53 -38
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +50 -35
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +77 -62
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +47 -32
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +74 -59
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +58 -43
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +245 -175
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +29 -14
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +44 -29
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +29 -14
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +49 -34
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +209 -194
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +29 -14
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +32 -17
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +47 -32
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +44 -29
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +35 -20
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +211 -196
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +457 -442
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +325 -310
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +139 -124
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +66 -51
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +46 -31
- cdktf_cdktf_provider_upcloud/managed_object_storage_custom_domain/__init__.py +446 -0
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +32 -17
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +29 -14
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +32 -17
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +32 -17
- cdktf_cdktf_provider_upcloud/network/__init__.py +49 -34
- cdktf_cdktf_provider_upcloud/network_peering/__init__.py +39 -24
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +46 -31
- cdktf_cdktf_provider_upcloud/provider/__init__.py +41 -26
- cdktf_cdktf_provider_upcloud/router/__init__.py +35 -20
- cdktf_cdktf_provider_upcloud/server/__init__.py +169 -154
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +35 -20
- cdktf_cdktf_provider_upcloud/storage/__init__.py +70 -53
- cdktf_cdktf_provider_upcloud/storage_template/__init__.py +29 -14
- cdktf_cdktf_provider_upcloud/tag/__init__.py +32 -17
- {cdktf_cdktf_provider_upcloud-14.10.1.dist-info → cdktf_cdktf_provider_upcloud-14.11.1.dist-info}/METADATA +6 -6
- cdktf_cdktf_provider_upcloud-14.11.1.dist-info/RECORD +64 -0
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.10.1.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-14.10.1.dist-info/RECORD +0 -62
- {cdktf_cdktf_provider_upcloud-14.10.1.dist-info → cdktf_cdktf_provider_upcloud-14.11.1.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-14.10.1.dist-info → cdktf_cdktf_provider_upcloud-14.11.1.dist-info}/WHEEL +0 -0
- {cdktf_cdktf_provider_upcloud-14.10.1.dist-info → cdktf_cdktf_provider_upcloud-14.11.1.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_gateway_connection_tunnel`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_gateway_connection_tunnel`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_gateway_connection_tunnel`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -16,7 +16,22 @@ import jsii
|
|
|
16
16
|
import publication
|
|
17
17
|
import typing_extensions
|
|
18
18
|
|
|
19
|
-
|
|
19
|
+
import typeguard
|
|
20
|
+
from importlib.metadata import version as _metadata_package_version
|
|
21
|
+
TYPEGUARD_MAJOR_VERSION = int(_metadata_package_version('typeguard').split('.')[0])
|
|
22
|
+
|
|
23
|
+
def check_type(argname: str, value: object, expected_type: typing.Any) -> typing.Any:
|
|
24
|
+
if TYPEGUARD_MAJOR_VERSION <= 2:
|
|
25
|
+
return typeguard.check_type(argname=argname, value=value, expected_type=expected_type) # type:ignore
|
|
26
|
+
else:
|
|
27
|
+
if isinstance(value, jsii._reference_map.InterfaceDynamicProxy): # pyright: ignore [reportAttributeAccessIssue]
|
|
28
|
+
pass
|
|
29
|
+
else:
|
|
30
|
+
if TYPEGUARD_MAJOR_VERSION == 3:
|
|
31
|
+
typeguard.config.collection_check_strategy = typeguard.CollectionCheckStrategy.ALL_ITEMS # type:ignore
|
|
32
|
+
typeguard.check_type(value=value, expected_type=expected_type) # type:ignore
|
|
33
|
+
else:
|
|
34
|
+
typeguard.check_type(value=value, expected_type=expected_type, collection_check_strategy=typeguard.CollectionCheckStrategy.ALL_ITEMS) # type:ignore
|
|
20
35
|
|
|
21
36
|
from .._jsii import *
|
|
22
37
|
|
|
@@ -29,7 +44,7 @@ class GatewayConnectionTunnel(
|
|
|
29
44
|
metaclass=jsii.JSIIMeta,
|
|
30
45
|
jsii_type="@cdktf/provider-upcloud.gatewayConnectionTunnel.GatewayConnectionTunnel",
|
|
31
46
|
):
|
|
32
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
47
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel upcloud_gateway_connection_tunnel}.'''
|
|
33
48
|
|
|
34
49
|
def __init__(
|
|
35
50
|
self,
|
|
@@ -51,17 +66,17 @@ class GatewayConnectionTunnel(
|
|
|
51
66
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
52
67
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
53
68
|
) -> None:
|
|
54
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
69
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel upcloud_gateway_connection_tunnel} Resource.
|
|
55
70
|
|
|
56
71
|
:param scope: The scope in which to define this construct.
|
|
57
72
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
58
|
-
:param connection_id: ID of the upcloud_gateway_connection resource to which the tunnel belongs. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
59
|
-
:param ipsec_auth_psk: ipsec_auth_psk block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
60
|
-
:param local_address_name: Public (UpCloud) endpoint address of this tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
61
|
-
:param name: The name of the tunnel, should be unique within the connection. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
62
|
-
:param remote_address: Remote public IP address of the tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
63
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
64
|
-
:param ipsec_properties: ipsec_properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
73
|
+
:param connection_id: ID of the upcloud_gateway_connection resource to which the tunnel belongs. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#connection_id GatewayConnectionTunnel#connection_id}
|
|
74
|
+
:param ipsec_auth_psk: ipsec_auth_psk block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#ipsec_auth_psk GatewayConnectionTunnel#ipsec_auth_psk}
|
|
75
|
+
:param local_address_name: Public (UpCloud) endpoint address of this tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#local_address_name GatewayConnectionTunnel#local_address_name}
|
|
76
|
+
:param name: The name of the tunnel, should be unique within the connection. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#name GatewayConnectionTunnel#name}
|
|
77
|
+
:param remote_address: Remote public IP address of the tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#remote_address GatewayConnectionTunnel#remote_address}
|
|
78
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#id GatewayConnectionTunnel#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
79
|
+
:param ipsec_properties: ipsec_properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#ipsec_properties GatewayConnectionTunnel#ipsec_properties}
|
|
65
80
|
:param connection:
|
|
66
81
|
:param count:
|
|
67
82
|
:param depends_on:
|
|
@@ -106,7 +121,7 @@ class GatewayConnectionTunnel(
|
|
|
106
121
|
|
|
107
122
|
:param scope: The scope in which to define this construct.
|
|
108
123
|
:param import_to_id: The construct id used in the generated config for the GatewayConnectionTunnel to import.
|
|
109
|
-
:param import_from_id: The id of the existing GatewayConnectionTunnel that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
124
|
+
:param import_from_id: The id of the existing GatewayConnectionTunnel that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#import import section} in the documentation of this resource for the id to use
|
|
110
125
|
:param provider: ? Optional instance of the provider where the GatewayConnectionTunnel to import is found.
|
|
111
126
|
'''
|
|
112
127
|
if __debug__:
|
|
@@ -120,7 +135,7 @@ class GatewayConnectionTunnel(
|
|
|
120
135
|
@jsii.member(jsii_name="putIpsecAuthPsk")
|
|
121
136
|
def put_ipsec_auth_psk(self, *, psk: builtins.str) -> None:
|
|
122
137
|
'''
|
|
123
|
-
:param psk: The pre-shared key. This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
138
|
+
:param psk: The pre-shared key. This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#psk GatewayConnectionTunnel#psk}
|
|
124
139
|
'''
|
|
125
140
|
value = GatewayConnectionTunnelIpsecAuthPsk(psk=psk)
|
|
126
141
|
|
|
@@ -143,17 +158,17 @@ class GatewayConnectionTunnel(
|
|
|
143
158
|
rekey_time: typing.Optional[jsii.Number] = None,
|
|
144
159
|
) -> None:
|
|
145
160
|
'''
|
|
146
|
-
:param child_rekey_time: IKE child SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
147
|
-
:param dpd_delay: Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
148
|
-
:param dpd_timeout: Timeout period for DPD reply before considering the peer to be dead, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
149
|
-
:param ike_lifetime: Maximum IKE SA lifetime in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
150
|
-
:param phase1_algorithms: List of Phase 1: Proposal algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
151
|
-
:param phase1_dh_group_numbers: List of Phase 1 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
152
|
-
:param phase1_integrity_algorithms: List of Phase 1 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
153
|
-
:param phase2_algorithms: List of Phase 2: Security Association algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
154
|
-
:param phase2_dh_group_numbers: List of Phase 2 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
155
|
-
:param phase2_integrity_algorithms: List of Phase 2 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
156
|
-
:param rekey_time: IKE SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
161
|
+
:param child_rekey_time: IKE child SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#child_rekey_time GatewayConnectionTunnel#child_rekey_time}
|
|
162
|
+
:param dpd_delay: Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#dpd_delay GatewayConnectionTunnel#dpd_delay}
|
|
163
|
+
:param dpd_timeout: Timeout period for DPD reply before considering the peer to be dead, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#dpd_timeout GatewayConnectionTunnel#dpd_timeout}
|
|
164
|
+
:param ike_lifetime: Maximum IKE SA lifetime in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#ike_lifetime GatewayConnectionTunnel#ike_lifetime}
|
|
165
|
+
:param phase1_algorithms: List of Phase 1: Proposal algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#phase1_algorithms GatewayConnectionTunnel#phase1_algorithms}
|
|
166
|
+
:param phase1_dh_group_numbers: List of Phase 1 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#phase1_dh_group_numbers GatewayConnectionTunnel#phase1_dh_group_numbers}
|
|
167
|
+
:param phase1_integrity_algorithms: List of Phase 1 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#phase1_integrity_algorithms GatewayConnectionTunnel#phase1_integrity_algorithms}
|
|
168
|
+
:param phase2_algorithms: List of Phase 2: Security Association algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#phase2_algorithms GatewayConnectionTunnel#phase2_algorithms}
|
|
169
|
+
:param phase2_dh_group_numbers: List of Phase 2 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#phase2_dh_group_numbers GatewayConnectionTunnel#phase2_dh_group_numbers}
|
|
170
|
+
:param phase2_integrity_algorithms: List of Phase 2 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#phase2_integrity_algorithms GatewayConnectionTunnel#phase2_integrity_algorithms}
|
|
171
|
+
:param rekey_time: IKE SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#rekey_time GatewayConnectionTunnel#rekey_time}
|
|
157
172
|
'''
|
|
158
173
|
value = GatewayConnectionTunnelIpsecProperties(
|
|
159
174
|
child_rekey_time=child_rekey_time,
|
|
@@ -361,13 +376,13 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
361
376
|
:param lifecycle:
|
|
362
377
|
:param provider:
|
|
363
378
|
:param provisioners:
|
|
364
|
-
:param connection_id: ID of the upcloud_gateway_connection resource to which the tunnel belongs. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
365
|
-
:param ipsec_auth_psk: ipsec_auth_psk block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
366
|
-
:param local_address_name: Public (UpCloud) endpoint address of this tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
367
|
-
:param name: The name of the tunnel, should be unique within the connection. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
368
|
-
:param remote_address: Remote public IP address of the tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
369
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
370
|
-
:param ipsec_properties: ipsec_properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
379
|
+
:param connection_id: ID of the upcloud_gateway_connection resource to which the tunnel belongs. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#connection_id GatewayConnectionTunnel#connection_id}
|
|
380
|
+
:param ipsec_auth_psk: ipsec_auth_psk block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#ipsec_auth_psk GatewayConnectionTunnel#ipsec_auth_psk}
|
|
381
|
+
:param local_address_name: Public (UpCloud) endpoint address of this tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#local_address_name GatewayConnectionTunnel#local_address_name}
|
|
382
|
+
:param name: The name of the tunnel, should be unique within the connection. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#name GatewayConnectionTunnel#name}
|
|
383
|
+
:param remote_address: Remote public IP address of the tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#remote_address GatewayConnectionTunnel#remote_address}
|
|
384
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#id GatewayConnectionTunnel#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
385
|
+
:param ipsec_properties: ipsec_properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#ipsec_properties GatewayConnectionTunnel#ipsec_properties}
|
|
371
386
|
'''
|
|
372
387
|
if isinstance(lifecycle, dict):
|
|
373
388
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -485,7 +500,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
485
500
|
def connection_id(self) -> builtins.str:
|
|
486
501
|
'''ID of the upcloud_gateway_connection resource to which the tunnel belongs.
|
|
487
502
|
|
|
488
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
503
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#connection_id GatewayConnectionTunnel#connection_id}
|
|
489
504
|
'''
|
|
490
505
|
result = self._values.get("connection_id")
|
|
491
506
|
assert result is not None, "Required property 'connection_id' is missing"
|
|
@@ -495,7 +510,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
495
510
|
def ipsec_auth_psk(self) -> "GatewayConnectionTunnelIpsecAuthPsk":
|
|
496
511
|
'''ipsec_auth_psk block.
|
|
497
512
|
|
|
498
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
513
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#ipsec_auth_psk GatewayConnectionTunnel#ipsec_auth_psk}
|
|
499
514
|
'''
|
|
500
515
|
result = self._values.get("ipsec_auth_psk")
|
|
501
516
|
assert result is not None, "Required property 'ipsec_auth_psk' is missing"
|
|
@@ -505,7 +520,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
505
520
|
def local_address_name(self) -> builtins.str:
|
|
506
521
|
'''Public (UpCloud) endpoint address of this tunnel.
|
|
507
522
|
|
|
508
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
523
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#local_address_name GatewayConnectionTunnel#local_address_name}
|
|
509
524
|
'''
|
|
510
525
|
result = self._values.get("local_address_name")
|
|
511
526
|
assert result is not None, "Required property 'local_address_name' is missing"
|
|
@@ -515,7 +530,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
515
530
|
def name(self) -> builtins.str:
|
|
516
531
|
'''The name of the tunnel, should be unique within the connection.
|
|
517
532
|
|
|
518
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
533
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#name GatewayConnectionTunnel#name}
|
|
519
534
|
'''
|
|
520
535
|
result = self._values.get("name")
|
|
521
536
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -525,7 +540,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
525
540
|
def remote_address(self) -> builtins.str:
|
|
526
541
|
'''Remote public IP address of the tunnel.
|
|
527
542
|
|
|
528
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
543
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#remote_address GatewayConnectionTunnel#remote_address}
|
|
529
544
|
'''
|
|
530
545
|
result = self._values.get("remote_address")
|
|
531
546
|
assert result is not None, "Required property 'remote_address' is missing"
|
|
@@ -533,7 +548,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
533
548
|
|
|
534
549
|
@builtins.property
|
|
535
550
|
def id(self) -> typing.Optional[builtins.str]:
|
|
536
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
551
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#id GatewayConnectionTunnel#id}.
|
|
537
552
|
|
|
538
553
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
539
554
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -547,7 +562,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
547
562
|
) -> typing.Optional["GatewayConnectionTunnelIpsecProperties"]:
|
|
548
563
|
'''ipsec_properties block.
|
|
549
564
|
|
|
550
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
565
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#ipsec_properties GatewayConnectionTunnel#ipsec_properties}
|
|
551
566
|
'''
|
|
552
567
|
result = self._values.get("ipsec_properties")
|
|
553
568
|
return typing.cast(typing.Optional["GatewayConnectionTunnelIpsecProperties"], result)
|
|
@@ -572,7 +587,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
572
587
|
class GatewayConnectionTunnelIpsecAuthPsk:
|
|
573
588
|
def __init__(self, *, psk: builtins.str) -> None:
|
|
574
589
|
'''
|
|
575
|
-
:param psk: The pre-shared key. This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
590
|
+
:param psk: The pre-shared key. This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#psk GatewayConnectionTunnel#psk}
|
|
576
591
|
'''
|
|
577
592
|
if __debug__:
|
|
578
593
|
type_hints = typing.get_type_hints(_typecheckingstub__87c835e7d7c5605931c1ca38462874908e77d68cd5b951debc157a3d43ca979a)
|
|
@@ -587,7 +602,7 @@ class GatewayConnectionTunnelIpsecAuthPsk:
|
|
|
587
602
|
|
|
588
603
|
This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one.
|
|
589
604
|
|
|
590
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
605
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#psk GatewayConnectionTunnel#psk}
|
|
591
606
|
'''
|
|
592
607
|
result = self._values.get("psk")
|
|
593
608
|
assert result is not None, "Required property 'psk' is missing"
|
|
@@ -692,17 +707,17 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
692
707
|
rekey_time: typing.Optional[jsii.Number] = None,
|
|
693
708
|
) -> None:
|
|
694
709
|
'''
|
|
695
|
-
:param child_rekey_time: IKE child SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
696
|
-
:param dpd_delay: Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
697
|
-
:param dpd_timeout: Timeout period for DPD reply before considering the peer to be dead, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
698
|
-
:param ike_lifetime: Maximum IKE SA lifetime in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
699
|
-
:param phase1_algorithms: List of Phase 1: Proposal algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
700
|
-
:param phase1_dh_group_numbers: List of Phase 1 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
701
|
-
:param phase1_integrity_algorithms: List of Phase 1 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
702
|
-
:param phase2_algorithms: List of Phase 2: Security Association algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
703
|
-
:param phase2_dh_group_numbers: List of Phase 2 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
704
|
-
:param phase2_integrity_algorithms: List of Phase 2 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
705
|
-
:param rekey_time: IKE SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
710
|
+
:param child_rekey_time: IKE child SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#child_rekey_time GatewayConnectionTunnel#child_rekey_time}
|
|
711
|
+
:param dpd_delay: Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#dpd_delay GatewayConnectionTunnel#dpd_delay}
|
|
712
|
+
:param dpd_timeout: Timeout period for DPD reply before considering the peer to be dead, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#dpd_timeout GatewayConnectionTunnel#dpd_timeout}
|
|
713
|
+
:param ike_lifetime: Maximum IKE SA lifetime in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#ike_lifetime GatewayConnectionTunnel#ike_lifetime}
|
|
714
|
+
:param phase1_algorithms: List of Phase 1: Proposal algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#phase1_algorithms GatewayConnectionTunnel#phase1_algorithms}
|
|
715
|
+
:param phase1_dh_group_numbers: List of Phase 1 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#phase1_dh_group_numbers GatewayConnectionTunnel#phase1_dh_group_numbers}
|
|
716
|
+
:param phase1_integrity_algorithms: List of Phase 1 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#phase1_integrity_algorithms GatewayConnectionTunnel#phase1_integrity_algorithms}
|
|
717
|
+
:param phase2_algorithms: List of Phase 2: Security Association algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#phase2_algorithms GatewayConnectionTunnel#phase2_algorithms}
|
|
718
|
+
:param phase2_dh_group_numbers: List of Phase 2 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#phase2_dh_group_numbers GatewayConnectionTunnel#phase2_dh_group_numbers}
|
|
719
|
+
:param phase2_integrity_algorithms: List of Phase 2 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#phase2_integrity_algorithms GatewayConnectionTunnel#phase2_integrity_algorithms}
|
|
720
|
+
:param rekey_time: IKE SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#rekey_time GatewayConnectionTunnel#rekey_time}
|
|
706
721
|
'''
|
|
707
722
|
if __debug__:
|
|
708
723
|
type_hints = typing.get_type_hints(_typecheckingstub__a50b18894047098027d5d6be1b8a41d8e32b22c4297ebea79c281f4c838921f4)
|
|
@@ -745,7 +760,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
745
760
|
def child_rekey_time(self) -> typing.Optional[jsii.Number]:
|
|
746
761
|
'''IKE child SA rekey time in seconds.
|
|
747
762
|
|
|
748
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
763
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#child_rekey_time GatewayConnectionTunnel#child_rekey_time}
|
|
749
764
|
'''
|
|
750
765
|
result = self._values.get("child_rekey_time")
|
|
751
766
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -754,7 +769,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
754
769
|
def dpd_delay(self) -> typing.Optional[jsii.Number]:
|
|
755
770
|
'''Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds.
|
|
756
771
|
|
|
757
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
772
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#dpd_delay GatewayConnectionTunnel#dpd_delay}
|
|
758
773
|
'''
|
|
759
774
|
result = self._values.get("dpd_delay")
|
|
760
775
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -763,7 +778,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
763
778
|
def dpd_timeout(self) -> typing.Optional[jsii.Number]:
|
|
764
779
|
'''Timeout period for DPD reply before considering the peer to be dead, in seconds.
|
|
765
780
|
|
|
766
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
781
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#dpd_timeout GatewayConnectionTunnel#dpd_timeout}
|
|
767
782
|
'''
|
|
768
783
|
result = self._values.get("dpd_timeout")
|
|
769
784
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -772,7 +787,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
772
787
|
def ike_lifetime(self) -> typing.Optional[jsii.Number]:
|
|
773
788
|
'''Maximum IKE SA lifetime in seconds.
|
|
774
789
|
|
|
775
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
790
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#ike_lifetime GatewayConnectionTunnel#ike_lifetime}
|
|
776
791
|
'''
|
|
777
792
|
result = self._values.get("ike_lifetime")
|
|
778
793
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -781,7 +796,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
781
796
|
def phase1_algorithms(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
782
797
|
'''List of Phase 1: Proposal algorithms.
|
|
783
798
|
|
|
784
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
799
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#phase1_algorithms GatewayConnectionTunnel#phase1_algorithms}
|
|
785
800
|
'''
|
|
786
801
|
result = self._values.get("phase1_algorithms")
|
|
787
802
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -790,7 +805,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
790
805
|
def phase1_dh_group_numbers(self) -> typing.Optional[typing.List[jsii.Number]]:
|
|
791
806
|
'''List of Phase 1 Diffie-Hellman group numbers.
|
|
792
807
|
|
|
793
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
808
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#phase1_dh_group_numbers GatewayConnectionTunnel#phase1_dh_group_numbers}
|
|
794
809
|
'''
|
|
795
810
|
result = self._values.get("phase1_dh_group_numbers")
|
|
796
811
|
return typing.cast(typing.Optional[typing.List[jsii.Number]], result)
|
|
@@ -799,7 +814,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
799
814
|
def phase1_integrity_algorithms(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
800
815
|
'''List of Phase 1 integrity algorithms.
|
|
801
816
|
|
|
802
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
817
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#phase1_integrity_algorithms GatewayConnectionTunnel#phase1_integrity_algorithms}
|
|
803
818
|
'''
|
|
804
819
|
result = self._values.get("phase1_integrity_algorithms")
|
|
805
820
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -808,7 +823,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
808
823
|
def phase2_algorithms(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
809
824
|
'''List of Phase 2: Security Association algorithms.
|
|
810
825
|
|
|
811
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
826
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#phase2_algorithms GatewayConnectionTunnel#phase2_algorithms}
|
|
812
827
|
'''
|
|
813
828
|
result = self._values.get("phase2_algorithms")
|
|
814
829
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -817,7 +832,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
817
832
|
def phase2_dh_group_numbers(self) -> typing.Optional[typing.List[jsii.Number]]:
|
|
818
833
|
'''List of Phase 2 Diffie-Hellman group numbers.
|
|
819
834
|
|
|
820
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
835
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#phase2_dh_group_numbers GatewayConnectionTunnel#phase2_dh_group_numbers}
|
|
821
836
|
'''
|
|
822
837
|
result = self._values.get("phase2_dh_group_numbers")
|
|
823
838
|
return typing.cast(typing.Optional[typing.List[jsii.Number]], result)
|
|
@@ -826,7 +841,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
826
841
|
def phase2_integrity_algorithms(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
827
842
|
'''List of Phase 2 integrity algorithms.
|
|
828
843
|
|
|
829
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
844
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#phase2_integrity_algorithms GatewayConnectionTunnel#phase2_integrity_algorithms}
|
|
830
845
|
'''
|
|
831
846
|
result = self._values.get("phase2_integrity_algorithms")
|
|
832
847
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -835,7 +850,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
835
850
|
def rekey_time(self) -> typing.Optional[jsii.Number]:
|
|
836
851
|
'''IKE SA rekey time in seconds.
|
|
837
852
|
|
|
838
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
853
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/gateway_connection_tunnel#rekey_time GatewayConnectionTunnel#rekey_time}
|
|
839
854
|
'''
|
|
840
855
|
result = self._values.get("rekey_time")
|
|
841
856
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_kubernetes_cluster`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -16,7 +16,22 @@ import jsii
|
|
|
16
16
|
import publication
|
|
17
17
|
import typing_extensions
|
|
18
18
|
|
|
19
|
-
|
|
19
|
+
import typeguard
|
|
20
|
+
from importlib.metadata import version as _metadata_package_version
|
|
21
|
+
TYPEGUARD_MAJOR_VERSION = int(_metadata_package_version('typeguard').split('.')[0])
|
|
22
|
+
|
|
23
|
+
def check_type(argname: str, value: object, expected_type: typing.Any) -> typing.Any:
|
|
24
|
+
if TYPEGUARD_MAJOR_VERSION <= 2:
|
|
25
|
+
return typeguard.check_type(argname=argname, value=value, expected_type=expected_type) # type:ignore
|
|
26
|
+
else:
|
|
27
|
+
if isinstance(value, jsii._reference_map.InterfaceDynamicProxy): # pyright: ignore [reportAttributeAccessIssue]
|
|
28
|
+
pass
|
|
29
|
+
else:
|
|
30
|
+
if TYPEGUARD_MAJOR_VERSION == 3:
|
|
31
|
+
typeguard.config.collection_check_strategy = typeguard.CollectionCheckStrategy.ALL_ITEMS # type:ignore
|
|
32
|
+
typeguard.check_type(value=value, expected_type=expected_type) # type:ignore
|
|
33
|
+
else:
|
|
34
|
+
typeguard.check_type(value=value, expected_type=expected_type, collection_check_strategy=typeguard.CollectionCheckStrategy.ALL_ITEMS) # type:ignore
|
|
20
35
|
|
|
21
36
|
from .._jsii import *
|
|
22
37
|
|
|
@@ -29,7 +44,7 @@ class KubernetesCluster(
|
|
|
29
44
|
metaclass=jsii.JSIIMeta,
|
|
30
45
|
jsii_type="@cdktf/provider-upcloud.kubernetesCluster.KubernetesCluster",
|
|
31
46
|
):
|
|
32
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
47
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
|
|
33
48
|
|
|
34
49
|
def __init__(
|
|
35
50
|
self,
|
|
@@ -53,19 +68,19 @@ class KubernetesCluster(
|
|
|
53
68
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
54
69
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
55
70
|
) -> None:
|
|
56
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
71
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
|
|
57
72
|
|
|
58
73
|
:param scope: The scope in which to define this construct.
|
|
59
74
|
:param id: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
60
|
-
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
61
|
-
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
62
|
-
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
63
|
-
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
64
|
-
:param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
65
|
-
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
66
|
-
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
67
|
-
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
68
|
-
:param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
75
|
+
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
76
|
+
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
77
|
+
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
78
|
+
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
79
|
+
:param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
80
|
+
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
81
|
+
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
82
|
+
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
|
|
83
|
+
:param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
69
84
|
:param connection:
|
|
70
85
|
:param count:
|
|
71
86
|
:param depends_on:
|
|
@@ -112,7 +127,7 @@ class KubernetesCluster(
|
|
|
112
127
|
|
|
113
128
|
:param scope: The scope in which to define this construct.
|
|
114
129
|
:param import_to_id: The construct id used in the generated config for the KubernetesCluster to import.
|
|
115
|
-
:param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
130
|
+
:param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
|
|
116
131
|
:param provider: ? Optional instance of the provider where the KubernetesCluster to import is found.
|
|
117
132
|
'''
|
|
118
133
|
if __debug__:
|
|
@@ -392,15 +407,15 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
392
407
|
:param lifecycle:
|
|
393
408
|
:param provider:
|
|
394
409
|
:param provisioners:
|
|
395
|
-
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
396
|
-
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
397
|
-
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
398
|
-
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
399
|
-
:param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
400
|
-
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
401
|
-
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
402
|
-
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
403
|
-
:param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
410
|
+
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
411
|
+
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
412
|
+
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
413
|
+
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
414
|
+
:param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
415
|
+
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
416
|
+
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
417
|
+
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
|
|
418
|
+
:param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
404
419
|
'''
|
|
405
420
|
if isinstance(lifecycle, dict):
|
|
406
421
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -523,7 +538,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
523
538
|
|
|
524
539
|
To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services.
|
|
525
540
|
|
|
526
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
541
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
527
542
|
'''
|
|
528
543
|
result = self._values.get("control_plane_ip_filter")
|
|
529
544
|
assert result is not None, "Required property 'control_plane_ip_filter' is missing"
|
|
@@ -533,7 +548,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
533
548
|
def name(self) -> builtins.str:
|
|
534
549
|
'''Cluster name. Needs to be unique within the account.
|
|
535
550
|
|
|
536
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
551
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
537
552
|
'''
|
|
538
553
|
result = self._values.get("name")
|
|
539
554
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -543,7 +558,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
543
558
|
def network(self) -> builtins.str:
|
|
544
559
|
'''Network ID for the cluster to run in.
|
|
545
560
|
|
|
546
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
561
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
547
562
|
'''
|
|
548
563
|
result = self._values.get("network")
|
|
549
564
|
assert result is not None, "Required property 'network' is missing"
|
|
@@ -553,7 +568,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
553
568
|
def zone(self) -> builtins.str:
|
|
554
569
|
'''Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``.
|
|
555
570
|
|
|
556
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
571
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
557
572
|
'''
|
|
558
573
|
result = self._values.get("zone")
|
|
559
574
|
assert result is not None, "Required property 'zone' is missing"
|
|
@@ -563,7 +578,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
563
578
|
def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
|
|
564
579
|
'''User defined key-value pairs to classify the cluster.
|
|
565
580
|
|
|
566
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
581
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
567
582
|
'''
|
|
568
583
|
result = self._values.get("labels")
|
|
569
584
|
return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
|
|
@@ -574,7 +589,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
574
589
|
|
|
575
590
|
Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``.
|
|
576
591
|
|
|
577
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
592
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
578
593
|
'''
|
|
579
594
|
result = self._values.get("plan")
|
|
580
595
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -585,7 +600,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
585
600
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
586
601
|
'''Enable private node groups. Private node groups requires a network that is routed through NAT gateway.
|
|
587
602
|
|
|
588
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
603
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
589
604
|
'''
|
|
590
605
|
result = self._values.get("private_node_groups")
|
|
591
606
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -594,7 +609,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
594
609
|
def storage_encryption(self) -> typing.Optional[builtins.str]:
|
|
595
610
|
'''Set default storage encryption strategy for all nodes in the cluster.
|
|
596
611
|
|
|
597
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
612
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
|
|
598
613
|
'''
|
|
599
614
|
result = self._values.get("storage_encryption")
|
|
600
615
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -603,7 +618,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
603
618
|
def version(self) -> typing.Optional[builtins.str]:
|
|
604
619
|
'''Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``.
|
|
605
620
|
|
|
606
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
621
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
607
622
|
'''
|
|
608
623
|
result = self._values.get("version")
|
|
609
624
|
return typing.cast(typing.Optional[builtins.str], result)
|