cdktf-cdktf-provider-upcloud 14.22.0__py3-none-any.whl → 15.0.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +3 -3
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.0.1.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +9 -9
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_load_balancer_dns_challenge_domain/__init__.py +4 -4
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_valkey_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +71 -110
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +37 -37
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +34 -34
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +61 -61
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +34 -34
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +58 -58
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +39 -39
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +46 -46
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +33 -33
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +228 -228
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +201 -201
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +555 -555
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +360 -360
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +132 -132
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +65 -65
- cdktf_cdktf_provider_upcloud/managed_database_valkey/__init__.py +135 -135
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/managed_object_storage_bucket/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/managed_object_storage_custom_domain/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/network/__init__.py +33 -33
- cdktf_cdktf_provider_upcloud/network_peering/__init__.py +23 -23
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/provider/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/server/__init__.py +139 -139
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/storage/__init__.py +51 -51
- cdktf_cdktf_provider_upcloud/storage_backup/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/storage_template/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
- {cdktf_cdktf_provider_upcloud-14.22.0.dist-info → cdktf_cdktf_provider_upcloud-15.0.1.dist-info}/METADATA +6 -6
- cdktf_cdktf_provider_upcloud-15.0.1.dist-info/RECORD +68 -0
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.22.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-14.22.0.dist-info/RECORD +0 -68
- {cdktf_cdktf_provider_upcloud-14.22.0.dist-info → cdktf_cdktf_provider_upcloud-15.0.1.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-14.22.0.dist-info → cdktf_cdktf_provider_upcloud-15.0.1.dist-info}/WHEEL +0 -0
- {cdktf_cdktf_provider_upcloud-14.22.0.dist-info → cdktf_cdktf_provider_upcloud-15.0.1.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_firewall_rules`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_firewall_rules`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_firewall_rules`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -44,16 +44,15 @@ class FirewallRules(
|
|
|
44
44
|
metaclass=jsii.JSIIMeta,
|
|
45
45
|
jsii_type="@cdktf/provider-upcloud.firewallRules.FirewallRules",
|
|
46
46
|
):
|
|
47
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
47
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules upcloud_firewall_rules}.'''
|
|
48
48
|
|
|
49
49
|
def __init__(
|
|
50
50
|
self,
|
|
51
51
|
scope: _constructs_77d1e7e8.Construct,
|
|
52
|
-
|
|
52
|
+
id: builtins.str,
|
|
53
53
|
*,
|
|
54
|
-
firewall_rule: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["FirewallRulesFirewallRule", typing.Dict[builtins.str, typing.Any]]]],
|
|
55
54
|
server_id: builtins.str,
|
|
56
|
-
|
|
55
|
+
firewall_rule: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["FirewallRulesFirewallRule", typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
57
56
|
connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
58
57
|
count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
|
|
59
58
|
depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
|
|
@@ -62,13 +61,12 @@ class FirewallRules(
|
|
|
62
61
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
63
62
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
64
63
|
) -> None:
|
|
65
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
64
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules upcloud_firewall_rules} Resource.
|
|
66
65
|
|
|
67
66
|
:param scope: The scope in which to define this construct.
|
|
68
|
-
:param
|
|
69
|
-
:param
|
|
70
|
-
:param
|
|
71
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#id FirewallRules#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
67
|
+
:param id: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
68
|
+
:param server_id: The UUID of the server to be protected with the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#server_id FirewallRules#server_id}
|
|
69
|
+
:param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
|
|
72
70
|
:param connection:
|
|
73
71
|
:param count:
|
|
74
72
|
:param depends_on:
|
|
@@ -80,11 +78,10 @@ class FirewallRules(
|
|
|
80
78
|
if __debug__:
|
|
81
79
|
type_hints = typing.get_type_hints(_typecheckingstub__3dd7e6461a1cb9b9f531749add09b10411da35a685dbccc19e6eae9f39484aba)
|
|
82
80
|
check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
|
|
83
|
-
check_type(argname="argument
|
|
81
|
+
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
84
82
|
config = FirewallRulesConfig(
|
|
85
|
-
firewall_rule=firewall_rule,
|
|
86
83
|
server_id=server_id,
|
|
87
|
-
|
|
84
|
+
firewall_rule=firewall_rule,
|
|
88
85
|
connection=connection,
|
|
89
86
|
count=count,
|
|
90
87
|
depends_on=depends_on,
|
|
@@ -94,7 +91,7 @@ class FirewallRules(
|
|
|
94
91
|
provisioners=provisioners,
|
|
95
92
|
)
|
|
96
93
|
|
|
97
|
-
jsii.create(self.__class__, self, [scope,
|
|
94
|
+
jsii.create(self.__class__, self, [scope, id, config])
|
|
98
95
|
|
|
99
96
|
@jsii.member(jsii_name="generateConfigForImport")
|
|
100
97
|
@builtins.classmethod
|
|
@@ -109,7 +106,7 @@ class FirewallRules(
|
|
|
109
106
|
|
|
110
107
|
:param scope: The scope in which to define this construct.
|
|
111
108
|
:param import_to_id: The construct id used in the generated config for the FirewallRules to import.
|
|
112
|
-
:param import_from_id: The id of the existing FirewallRules that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
109
|
+
:param import_from_id: The id of the existing FirewallRules that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#import import section} in the documentation of this resource for the id to use
|
|
113
110
|
:param provider: ? Optional instance of the provider where the FirewallRules to import is found.
|
|
114
111
|
'''
|
|
115
112
|
if __debug__:
|
|
@@ -133,9 +130,9 @@ class FirewallRules(
|
|
|
133
130
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
134
131
|
return typing.cast(None, jsii.invoke(self, "putFirewallRule", [value]))
|
|
135
132
|
|
|
136
|
-
@jsii.member(jsii_name="
|
|
137
|
-
def
|
|
138
|
-
return typing.cast(None, jsii.invoke(self, "
|
|
133
|
+
@jsii.member(jsii_name="resetFirewallRule")
|
|
134
|
+
def reset_firewall_rule(self) -> None:
|
|
135
|
+
return typing.cast(None, jsii.invoke(self, "resetFirewallRule", []))
|
|
139
136
|
|
|
140
137
|
@jsii.member(jsii_name="synthesizeAttributes")
|
|
141
138
|
def _synthesize_attributes(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
@@ -155,6 +152,11 @@ class FirewallRules(
|
|
|
155
152
|
def firewall_rule(self) -> "FirewallRulesFirewallRuleList":
|
|
156
153
|
return typing.cast("FirewallRulesFirewallRuleList", jsii.get(self, "firewallRule"))
|
|
157
154
|
|
|
155
|
+
@builtins.property
|
|
156
|
+
@jsii.member(jsii_name="id")
|
|
157
|
+
def id(self) -> builtins.str:
|
|
158
|
+
return typing.cast(builtins.str, jsii.get(self, "id"))
|
|
159
|
+
|
|
158
160
|
@builtins.property
|
|
159
161
|
@jsii.member(jsii_name="firewallRuleInput")
|
|
160
162
|
def firewall_rule_input(
|
|
@@ -162,28 +164,11 @@ class FirewallRules(
|
|
|
162
164
|
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]]]:
|
|
163
165
|
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]]], jsii.get(self, "firewallRuleInput"))
|
|
164
166
|
|
|
165
|
-
@builtins.property
|
|
166
|
-
@jsii.member(jsii_name="idInput")
|
|
167
|
-
def id_input(self) -> typing.Optional[builtins.str]:
|
|
168
|
-
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "idInput"))
|
|
169
|
-
|
|
170
167
|
@builtins.property
|
|
171
168
|
@jsii.member(jsii_name="serverIdInput")
|
|
172
169
|
def server_id_input(self) -> typing.Optional[builtins.str]:
|
|
173
170
|
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "serverIdInput"))
|
|
174
171
|
|
|
175
|
-
@builtins.property
|
|
176
|
-
@jsii.member(jsii_name="id")
|
|
177
|
-
def id(self) -> builtins.str:
|
|
178
|
-
return typing.cast(builtins.str, jsii.get(self, "id"))
|
|
179
|
-
|
|
180
|
-
@id.setter
|
|
181
|
-
def id(self, value: builtins.str) -> None:
|
|
182
|
-
if __debug__:
|
|
183
|
-
type_hints = typing.get_type_hints(_typecheckingstub__c5b4186580649c1167af5344e5016a17428872cece6b2e01cd0eb7db97a7aa0e)
|
|
184
|
-
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
185
|
-
jsii.set(self, "id", value) # pyright: ignore[reportArgumentType]
|
|
186
|
-
|
|
187
172
|
@builtins.property
|
|
188
173
|
@jsii.member(jsii_name="serverId")
|
|
189
174
|
def server_id(self) -> builtins.str:
|
|
@@ -208,9 +193,8 @@ class FirewallRules(
|
|
|
208
193
|
"lifecycle": "lifecycle",
|
|
209
194
|
"provider": "provider",
|
|
210
195
|
"provisioners": "provisioners",
|
|
211
|
-
"firewall_rule": "firewallRule",
|
|
212
196
|
"server_id": "serverId",
|
|
213
|
-
"
|
|
197
|
+
"firewall_rule": "firewallRule",
|
|
214
198
|
},
|
|
215
199
|
)
|
|
216
200
|
class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
@@ -224,9 +208,8 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
224
208
|
lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
225
209
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
226
210
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
227
|
-
firewall_rule: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["FirewallRulesFirewallRule", typing.Dict[builtins.str, typing.Any]]]],
|
|
228
211
|
server_id: builtins.str,
|
|
229
|
-
|
|
212
|
+
firewall_rule: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["FirewallRulesFirewallRule", typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
230
213
|
) -> None:
|
|
231
214
|
'''
|
|
232
215
|
:param connection:
|
|
@@ -236,9 +219,8 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
236
219
|
:param lifecycle:
|
|
237
220
|
:param provider:
|
|
238
221
|
:param provisioners:
|
|
239
|
-
:param
|
|
240
|
-
:param
|
|
241
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#id FirewallRules#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
222
|
+
:param server_id: The UUID of the server to be protected with the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#server_id FirewallRules#server_id}
|
|
223
|
+
:param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
|
|
242
224
|
'''
|
|
243
225
|
if isinstance(lifecycle, dict):
|
|
244
226
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -251,11 +233,9 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
251
233
|
check_type(argname="argument lifecycle", value=lifecycle, expected_type=type_hints["lifecycle"])
|
|
252
234
|
check_type(argname="argument provider", value=provider, expected_type=type_hints["provider"])
|
|
253
235
|
check_type(argname="argument provisioners", value=provisioners, expected_type=type_hints["provisioners"])
|
|
254
|
-
check_type(argname="argument firewall_rule", value=firewall_rule, expected_type=type_hints["firewall_rule"])
|
|
255
236
|
check_type(argname="argument server_id", value=server_id, expected_type=type_hints["server_id"])
|
|
256
|
-
check_type(argname="argument
|
|
237
|
+
check_type(argname="argument firewall_rule", value=firewall_rule, expected_type=type_hints["firewall_rule"])
|
|
257
238
|
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
258
|
-
"firewall_rule": firewall_rule,
|
|
259
239
|
"server_id": server_id,
|
|
260
240
|
}
|
|
261
241
|
if connection is not None:
|
|
@@ -272,8 +252,8 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
272
252
|
self._values["provider"] = provider
|
|
273
253
|
if provisioners is not None:
|
|
274
254
|
self._values["provisioners"] = provisioners
|
|
275
|
-
if
|
|
276
|
-
self._values["
|
|
255
|
+
if firewall_rule is not None:
|
|
256
|
+
self._values["firewall_rule"] = firewall_rule
|
|
277
257
|
|
|
278
258
|
@builtins.property
|
|
279
259
|
def connection(
|
|
@@ -339,37 +319,26 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
339
319
|
result = self._values.get("provisioners")
|
|
340
320
|
return typing.cast(typing.Optional[typing.List[typing.Union[_cdktf_9a9027ec.FileProvisioner, _cdktf_9a9027ec.LocalExecProvisioner, _cdktf_9a9027ec.RemoteExecProvisioner]]], result)
|
|
341
321
|
|
|
342
|
-
@builtins.property
|
|
343
|
-
def firewall_rule(
|
|
344
|
-
self,
|
|
345
|
-
) -> typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]]:
|
|
346
|
-
'''firewall_rule block.
|
|
347
|
-
|
|
348
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
|
|
349
|
-
'''
|
|
350
|
-
result = self._values.get("firewall_rule")
|
|
351
|
-
assert result is not None, "Required property 'firewall_rule' is missing"
|
|
352
|
-
return typing.cast(typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]], result)
|
|
353
|
-
|
|
354
322
|
@builtins.property
|
|
355
323
|
def server_id(self) -> builtins.str:
|
|
356
|
-
'''The
|
|
324
|
+
'''The UUID of the server to be protected with the firewall rules.
|
|
357
325
|
|
|
358
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
326
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#server_id FirewallRules#server_id}
|
|
359
327
|
'''
|
|
360
328
|
result = self._values.get("server_id")
|
|
361
329
|
assert result is not None, "Required property 'server_id' is missing"
|
|
362
330
|
return typing.cast(builtins.str, result)
|
|
363
331
|
|
|
364
332
|
@builtins.property
|
|
365
|
-
def
|
|
366
|
-
|
|
333
|
+
def firewall_rule(
|
|
334
|
+
self,
|
|
335
|
+
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]]]:
|
|
336
|
+
'''firewall_rule block.
|
|
367
337
|
|
|
368
|
-
|
|
369
|
-
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
338
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
|
|
370
339
|
'''
|
|
371
|
-
result = self._values.get("
|
|
372
|
-
return typing.cast(typing.Optional[
|
|
340
|
+
result = self._values.get("firewall_rule")
|
|
341
|
+
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]]], result)
|
|
373
342
|
|
|
374
343
|
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
375
344
|
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
@@ -423,20 +392,20 @@ class FirewallRulesFirewallRule:
|
|
|
423
392
|
source_port_start: typing.Optional[builtins.str] = None,
|
|
424
393
|
) -> None:
|
|
425
394
|
'''
|
|
426
|
-
:param action: Action to take if the rule conditions are met. Valid values ``accept | drop``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
427
|
-
:param direction: The direction of network traffic this rule will be applied to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
428
|
-
:param comment:
|
|
429
|
-
:param destination_address_end: The destination address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
430
|
-
:param destination_address_start: The destination address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
431
|
-
:param destination_port_end: The destination port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
432
|
-
:param destination_port_start: The destination port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
433
|
-
:param family: The address family of new firewall rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
434
|
-
:param icmp_type: The ICMP type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
435
|
-
:param protocol: The protocol
|
|
436
|
-
:param source_address_end: The source address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
437
|
-
:param source_address_start: The source address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
438
|
-
:param source_port_end: The source port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
439
|
-
:param source_port_start: The source port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
395
|
+
:param action: Action to take if the rule conditions are met. Valid values ``accept | drop``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#action FirewallRules#action}
|
|
396
|
+
:param direction: The direction of network traffic this rule will be applied to. Valid values are ``in`` and ``out``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#direction FirewallRules#direction}
|
|
397
|
+
:param comment: A comment for the rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#comment FirewallRules#comment}
|
|
398
|
+
:param destination_address_end: The destination address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
|
|
399
|
+
:param destination_address_start: The destination address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
|
|
400
|
+
:param destination_port_end: The destination port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
|
|
401
|
+
:param destination_port_start: The destination port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
|
|
402
|
+
:param family: The address family of new firewall rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#family FirewallRules#family}
|
|
403
|
+
:param icmp_type: The ICMP type of the rule. Only valid if protocol is ICMP. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
|
|
404
|
+
:param protocol: The protocol of the rule. Possible values are `` (empty), ``tcp``, ``udp``, ``icmp``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#protocol FirewallRules#protocol}
|
|
405
|
+
:param source_address_end: The source address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
|
|
406
|
+
:param source_address_start: The source address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
|
|
407
|
+
:param source_port_end: The source port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
|
|
408
|
+
:param source_port_start: The source port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
|
|
440
409
|
'''
|
|
441
410
|
if __debug__:
|
|
442
411
|
type_hints = typing.get_type_hints(_typecheckingstub__9b77e978fb66d25b46f06da19493b15c4f42527dec58b7335729cf86141901af)
|
|
@@ -487,7 +456,7 @@ class FirewallRulesFirewallRule:
|
|
|
487
456
|
def action(self) -> builtins.str:
|
|
488
457
|
'''Action to take if the rule conditions are met. Valid values ``accept | drop``.
|
|
489
458
|
|
|
490
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
459
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#action FirewallRules#action}
|
|
491
460
|
'''
|
|
492
461
|
result = self._values.get("action")
|
|
493
462
|
assert result is not None, "Required property 'action' is missing"
|
|
@@ -495,9 +464,9 @@ class FirewallRulesFirewallRule:
|
|
|
495
464
|
|
|
496
465
|
@builtins.property
|
|
497
466
|
def direction(self) -> builtins.str:
|
|
498
|
-
'''The direction of network traffic this rule will be applied to.
|
|
467
|
+
'''The direction of network traffic this rule will be applied to. Valid values are ``in`` and ``out``.
|
|
499
468
|
|
|
500
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
469
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#direction FirewallRules#direction}
|
|
501
470
|
'''
|
|
502
471
|
result = self._values.get("direction")
|
|
503
472
|
assert result is not None, "Required property 'direction' is missing"
|
|
@@ -505,9 +474,9 @@ class FirewallRulesFirewallRule:
|
|
|
505
474
|
|
|
506
475
|
@builtins.property
|
|
507
476
|
def comment(self) -> typing.Optional[builtins.str]:
|
|
508
|
-
'''
|
|
477
|
+
'''A comment for the rule.
|
|
509
478
|
|
|
510
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
479
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#comment FirewallRules#comment}
|
|
511
480
|
'''
|
|
512
481
|
result = self._values.get("comment")
|
|
513
482
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -516,7 +485,7 @@ class FirewallRulesFirewallRule:
|
|
|
516
485
|
def destination_address_end(self) -> typing.Optional[builtins.str]:
|
|
517
486
|
'''The destination address range ends from this address.
|
|
518
487
|
|
|
519
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
488
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
|
|
520
489
|
'''
|
|
521
490
|
result = self._values.get("destination_address_end")
|
|
522
491
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -525,7 +494,7 @@ class FirewallRulesFirewallRule:
|
|
|
525
494
|
def destination_address_start(self) -> typing.Optional[builtins.str]:
|
|
526
495
|
'''The destination address range starts from this address.
|
|
527
496
|
|
|
528
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
497
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
|
|
529
498
|
'''
|
|
530
499
|
result = self._values.get("destination_address_start")
|
|
531
500
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -534,7 +503,7 @@ class FirewallRulesFirewallRule:
|
|
|
534
503
|
def destination_port_end(self) -> typing.Optional[builtins.str]:
|
|
535
504
|
'''The destination port range ends from this port number.
|
|
536
505
|
|
|
537
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
506
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
|
|
538
507
|
'''
|
|
539
508
|
result = self._values.get("destination_port_end")
|
|
540
509
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -543,7 +512,7 @@ class FirewallRulesFirewallRule:
|
|
|
543
512
|
def destination_port_start(self) -> typing.Optional[builtins.str]:
|
|
544
513
|
'''The destination port range starts from this port number.
|
|
545
514
|
|
|
546
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
515
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
|
|
547
516
|
'''
|
|
548
517
|
result = self._values.get("destination_port_start")
|
|
549
518
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -552,25 +521,25 @@ class FirewallRulesFirewallRule:
|
|
|
552
521
|
def family(self) -> typing.Optional[builtins.str]:
|
|
553
522
|
'''The address family of new firewall rule.
|
|
554
523
|
|
|
555
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
524
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#family FirewallRules#family}
|
|
556
525
|
'''
|
|
557
526
|
result = self._values.get("family")
|
|
558
527
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
559
528
|
|
|
560
529
|
@builtins.property
|
|
561
530
|
def icmp_type(self) -> typing.Optional[builtins.str]:
|
|
562
|
-
'''The ICMP type.
|
|
531
|
+
'''The ICMP type of the rule. Only valid if protocol is ICMP.
|
|
563
532
|
|
|
564
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
533
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
|
|
565
534
|
'''
|
|
566
535
|
result = self._values.get("icmp_type")
|
|
567
536
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
568
537
|
|
|
569
538
|
@builtins.property
|
|
570
539
|
def protocol(self) -> typing.Optional[builtins.str]:
|
|
571
|
-
'''The protocol
|
|
540
|
+
'''The protocol of the rule. Possible values are `` (empty), ``tcp``, ``udp``, ``icmp``.
|
|
572
541
|
|
|
573
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
542
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#protocol FirewallRules#protocol}
|
|
574
543
|
'''
|
|
575
544
|
result = self._values.get("protocol")
|
|
576
545
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -579,7 +548,7 @@ class FirewallRulesFirewallRule:
|
|
|
579
548
|
def source_address_end(self) -> typing.Optional[builtins.str]:
|
|
580
549
|
'''The source address range ends from this address.
|
|
581
550
|
|
|
582
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
551
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
|
|
583
552
|
'''
|
|
584
553
|
result = self._values.get("source_address_end")
|
|
585
554
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -588,7 +557,7 @@ class FirewallRulesFirewallRule:
|
|
|
588
557
|
def source_address_start(self) -> typing.Optional[builtins.str]:
|
|
589
558
|
'''The source address range starts from this address.
|
|
590
559
|
|
|
591
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
560
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
|
|
592
561
|
'''
|
|
593
562
|
result = self._values.get("source_address_start")
|
|
594
563
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -597,7 +566,7 @@ class FirewallRulesFirewallRule:
|
|
|
597
566
|
def source_port_end(self) -> typing.Optional[builtins.str]:
|
|
598
567
|
'''The source port range ends from this port number.
|
|
599
568
|
|
|
600
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
569
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
|
|
601
570
|
'''
|
|
602
571
|
result = self._values.get("source_port_end")
|
|
603
572
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -606,7 +575,7 @@ class FirewallRulesFirewallRule:
|
|
|
606
575
|
def source_port_start(self) -> typing.Optional[builtins.str]:
|
|
607
576
|
'''The source port range starts from this port number.
|
|
608
577
|
|
|
609
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
578
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
|
|
610
579
|
'''
|
|
611
580
|
result = self._values.get("source_port_start")
|
|
612
581
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -1055,11 +1024,10 @@ publication.publish()
|
|
|
1055
1024
|
|
|
1056
1025
|
def _typecheckingstub__3dd7e6461a1cb9b9f531749add09b10411da35a685dbccc19e6eae9f39484aba(
|
|
1057
1026
|
scope: _constructs_77d1e7e8.Construct,
|
|
1058
|
-
|
|
1027
|
+
id: builtins.str,
|
|
1059
1028
|
*,
|
|
1060
|
-
firewall_rule: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[FirewallRulesFirewallRule, typing.Dict[builtins.str, typing.Any]]]],
|
|
1061
1029
|
server_id: builtins.str,
|
|
1062
|
-
|
|
1030
|
+
firewall_rule: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[FirewallRulesFirewallRule, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
1063
1031
|
connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
1064
1032
|
count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
|
|
1065
1033
|
depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
|
|
@@ -1086,12 +1054,6 @@ def _typecheckingstub__a2bed86233110e50c69609c787a79a37508bd2b39f8c7dd910fe89f65
|
|
|
1086
1054
|
"""Type checking stubs"""
|
|
1087
1055
|
pass
|
|
1088
1056
|
|
|
1089
|
-
def _typecheckingstub__c5b4186580649c1167af5344e5016a17428872cece6b2e01cd0eb7db97a7aa0e(
|
|
1090
|
-
value: builtins.str,
|
|
1091
|
-
) -> None:
|
|
1092
|
-
"""Type checking stubs"""
|
|
1093
|
-
pass
|
|
1094
|
-
|
|
1095
1057
|
def _typecheckingstub__58d36060cbaa53ac44e8eee4a67ae3fb2b894aa4b92b5809a705a5d3073ea15f(
|
|
1096
1058
|
value: builtins.str,
|
|
1097
1059
|
) -> None:
|
|
@@ -1107,9 +1069,8 @@ def _typecheckingstub__1ead3fa66c8a64e9f8e657b68d25827ef2a936835b7d7dd2169abd3f3
|
|
|
1107
1069
|
lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
1108
1070
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
1109
1071
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
1110
|
-
firewall_rule: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[FirewallRulesFirewallRule, typing.Dict[builtins.str, typing.Any]]]],
|
|
1111
1072
|
server_id: builtins.str,
|
|
1112
|
-
|
|
1073
|
+
firewall_rule: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[FirewallRulesFirewallRule, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
1113
1074
|
) -> None:
|
|
1114
1075
|
"""Type checking stubs"""
|
|
1115
1076
|
pass
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_floating_ip_address`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_floating_ip_address`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_floating_ip_address`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -44,7 +44,7 @@ class FloatingIpAddress(
|
|
|
44
44
|
metaclass=jsii.JSIIMeta,
|
|
45
45
|
jsii_type="@cdktf/provider-upcloud.floatingIpAddress.FloatingIpAddress",
|
|
46
46
|
):
|
|
47
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
47
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address upcloud_floating_ip_address}.'''
|
|
48
48
|
|
|
49
49
|
def __init__(
|
|
50
50
|
self,
|
|
@@ -63,14 +63,14 @@ class FloatingIpAddress(
|
|
|
63
63
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
64
64
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
65
65
|
) -> None:
|
|
66
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
66
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address upcloud_floating_ip_address} Resource.
|
|
67
67
|
|
|
68
68
|
:param scope: The scope in which to define this construct.
|
|
69
69
|
:param id: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
70
|
-
:param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
71
|
-
:param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
72
|
-
:param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
73
|
-
:param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
70
|
+
:param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#access FloatingIpAddress#access}
|
|
71
|
+
:param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#family FloatingIpAddress#family}
|
|
72
|
+
:param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
|
|
73
|
+
:param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
|
|
74
74
|
:param connection:
|
|
75
75
|
:param count:
|
|
76
76
|
:param depends_on:
|
|
@@ -112,7 +112,7 @@ class FloatingIpAddress(
|
|
|
112
112
|
|
|
113
113
|
:param scope: The scope in which to define this construct.
|
|
114
114
|
:param import_to_id: The construct id used in the generated config for the FloatingIpAddress to import.
|
|
115
|
-
:param import_from_id: The id of the existing FloatingIpAddress that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
115
|
+
:param import_from_id: The id of the existing FloatingIpAddress that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#import import section} in the documentation of this resource for the id to use
|
|
116
116
|
:param provider: ? Optional instance of the provider where the FloatingIpAddress to import is found.
|
|
117
117
|
'''
|
|
118
118
|
if __debug__:
|
|
@@ -272,10 +272,10 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
272
272
|
:param lifecycle:
|
|
273
273
|
:param provider:
|
|
274
274
|
:param provisioners:
|
|
275
|
-
:param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
276
|
-
:param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
277
|
-
:param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
278
|
-
:param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
275
|
+
:param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#access FloatingIpAddress#access}
|
|
276
|
+
:param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#family FloatingIpAddress#family}
|
|
277
|
+
:param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
|
|
278
|
+
:param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
|
|
279
279
|
'''
|
|
280
280
|
if isinstance(lifecycle, dict):
|
|
281
281
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -384,7 +384,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
384
384
|
def access(self) -> typing.Optional[builtins.str]:
|
|
385
385
|
'''Network access for the floating IP address. Supported value: ``public``.
|
|
386
386
|
|
|
387
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
387
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#access FloatingIpAddress#access}
|
|
388
388
|
'''
|
|
389
389
|
result = self._values.get("access")
|
|
390
390
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -393,7 +393,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
393
393
|
def family(self) -> typing.Optional[builtins.str]:
|
|
394
394
|
'''The address family of the floating IP address.
|
|
395
395
|
|
|
396
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
396
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#family FloatingIpAddress#family}
|
|
397
397
|
'''
|
|
398
398
|
result = self._values.get("family")
|
|
399
399
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -402,7 +402,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
402
402
|
def mac_address(self) -> typing.Optional[builtins.str]:
|
|
403
403
|
'''MAC address of a server interface to assign address to.
|
|
404
404
|
|
|
405
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
405
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
|
|
406
406
|
'''
|
|
407
407
|
result = self._values.get("mac_address")
|
|
408
408
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -411,7 +411,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
411
411
|
def zone(self) -> typing.Optional[builtins.str]:
|
|
412
412
|
'''Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``.
|
|
413
413
|
|
|
414
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.
|
|
414
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
|
|
415
415
|
'''
|
|
416
416
|
result = self._values.get("zone")
|
|
417
417
|
return typing.cast(typing.Optional[builtins.str], result)
|