cdktf-cdktf-provider-upcloud 14.4.0__py3-none-any.whl → 14.6.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +4 -4
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.6.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +8 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +8 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +8 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +23 -23
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +14 -14
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +31 -31
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +23 -23
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +11 -11
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +8 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +14 -14
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +26 -26
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +8 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +42 -30
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +11 -11
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +42 -42
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +30 -73
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +38 -38
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +40 -35
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +67 -62
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +35 -35
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +66 -66
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +43 -43
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +65 -65
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +17 -17
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +29 -29
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +17 -17
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +40 -40
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +194 -194
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +17 -17
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +29 -29
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +190 -190
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +331 -331
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +346 -346
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +118 -118
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +51 -51
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +31 -31
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +14 -14
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +17 -17
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +17 -17
- cdktf_cdktf_provider_upcloud/network/__init__.py +80 -31
- cdktf_cdktf_provider_upcloud/network_peering/__init__.py +24 -24
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +31 -31
- cdktf_cdktf_provider_upcloud/provider/__init__.py +26 -26
- cdktf_cdktf_provider_upcloud/router/__init__.py +60 -54
- cdktf_cdktf_provider_upcloud/server/__init__.py +154 -154
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +23 -23
- cdktf_cdktf_provider_upcloud/storage/__init__.py +59 -59
- cdktf_cdktf_provider_upcloud/tag/__init__.py +17 -17
- {cdktf_cdktf_provider_upcloud-14.4.0.dist-info → cdktf_cdktf_provider_upcloud-14.6.0.dist-info}/METADATA +5 -5
- cdktf_cdktf_provider_upcloud-14.6.0.dist-info/RECORD +61 -0
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.4.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-14.4.0.dist-info/RECORD +0 -61
- {cdktf_cdktf_provider_upcloud-14.4.0.dist-info → cdktf_cdktf_provider_upcloud-14.6.0.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-14.4.0.dist-info → cdktf_cdktf_provider_upcloud-14.6.0.dist-info}/WHEEL +0 -0
- {cdktf_cdktf_provider_upcloud-14.4.0.dist-info → cdktf_cdktf_provider_upcloud-14.6.0.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
|
-
'''
|
|
1
|
+
r'''
|
|
2
2
|
# `upcloud_firewall_rules`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_firewall_rules`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_firewall_rules`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -29,7 +29,7 @@ class FirewallRules(
|
|
|
29
29
|
metaclass=jsii.JSIIMeta,
|
|
30
30
|
jsii_type="@cdktf/provider-upcloud.firewallRules.FirewallRules",
|
|
31
31
|
):
|
|
32
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
32
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules upcloud_firewall_rules}.'''
|
|
33
33
|
|
|
34
34
|
def __init__(
|
|
35
35
|
self,
|
|
@@ -47,13 +47,13 @@ class FirewallRules(
|
|
|
47
47
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
48
48
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
49
49
|
) -> None:
|
|
50
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
50
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules upcloud_firewall_rules} Resource.
|
|
51
51
|
|
|
52
52
|
:param scope: The scope in which to define this construct.
|
|
53
53
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
54
|
-
:param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
55
|
-
:param server_id: The unique id of the server to be protected the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
56
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
54
|
+
:param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
|
|
55
|
+
:param server_id: The unique id of the server to be protected the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
|
|
56
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#id FirewallRules#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
57
57
|
:param connection:
|
|
58
58
|
:param count:
|
|
59
59
|
:param depends_on:
|
|
@@ -94,7 +94,7 @@ class FirewallRules(
|
|
|
94
94
|
|
|
95
95
|
:param scope: The scope in which to define this construct.
|
|
96
96
|
:param import_to_id: The construct id used in the generated config for the FirewallRules to import.
|
|
97
|
-
:param import_from_id: The id of the existing FirewallRules that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
97
|
+
:param import_from_id: The id of the existing FirewallRules that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#import import section} in the documentation of this resource for the id to use
|
|
98
98
|
:param provider: ? Optional instance of the provider where the FirewallRules to import is found.
|
|
99
99
|
'''
|
|
100
100
|
if __debug__:
|
|
@@ -221,9 +221,9 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
221
221
|
:param lifecycle:
|
|
222
222
|
:param provider:
|
|
223
223
|
:param provisioners:
|
|
224
|
-
:param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
225
|
-
:param server_id: The unique id of the server to be protected the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
226
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
224
|
+
:param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
|
|
225
|
+
:param server_id: The unique id of the server to be protected the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
|
|
226
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#id FirewallRules#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
227
227
|
'''
|
|
228
228
|
if isinstance(lifecycle, dict):
|
|
229
229
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -330,7 +330,7 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
330
330
|
) -> typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]]:
|
|
331
331
|
'''firewall_rule block.
|
|
332
332
|
|
|
333
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
333
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
|
|
334
334
|
'''
|
|
335
335
|
result = self._values.get("firewall_rule")
|
|
336
336
|
assert result is not None, "Required property 'firewall_rule' is missing"
|
|
@@ -340,7 +340,7 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
340
340
|
def server_id(self) -> builtins.str:
|
|
341
341
|
'''The unique id of the server to be protected the firewall rules.
|
|
342
342
|
|
|
343
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
343
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
|
|
344
344
|
'''
|
|
345
345
|
result = self._values.get("server_id")
|
|
346
346
|
assert result is not None, "Required property 'server_id' is missing"
|
|
@@ -348,7 +348,7 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
348
348
|
|
|
349
349
|
@builtins.property
|
|
350
350
|
def id(self) -> typing.Optional[builtins.str]:
|
|
351
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
351
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#id FirewallRules#id}.
|
|
352
352
|
|
|
353
353
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
354
354
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -408,20 +408,20 @@ class FirewallRulesFirewallRule:
|
|
|
408
408
|
source_port_start: typing.Optional[builtins.str] = None,
|
|
409
409
|
) -> None:
|
|
410
410
|
'''
|
|
411
|
-
:param action: Action to take if the rule conditions are met. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
412
|
-
:param direction: The direction of network traffic this rule will be applied to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
413
|
-
:param comment: Freeform comment string for the rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
414
|
-
:param destination_address_end: The destination address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
415
|
-
:param destination_address_start: The destination address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
416
|
-
:param destination_port_end: The destination port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
417
|
-
:param destination_port_start: The destination port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
418
|
-
:param family: The address family of new firewall rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
419
|
-
:param icmp_type: The ICMP type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
420
|
-
:param protocol: The protocol this rule will be applied to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
421
|
-
:param source_address_end: The source address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
422
|
-
:param source_address_start: The source address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
423
|
-
:param source_port_end: The source port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
424
|
-
:param source_port_start: The source port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
411
|
+
:param action: Action to take if the rule conditions are met. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#action FirewallRules#action}
|
|
412
|
+
:param direction: The direction of network traffic this rule will be applied to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#direction FirewallRules#direction}
|
|
413
|
+
:param comment: Freeform comment string for the rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#comment FirewallRules#comment}
|
|
414
|
+
:param destination_address_end: The destination address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
|
|
415
|
+
:param destination_address_start: The destination address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
|
|
416
|
+
:param destination_port_end: The destination port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
|
|
417
|
+
:param destination_port_start: The destination port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
|
|
418
|
+
:param family: The address family of new firewall rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#family FirewallRules#family}
|
|
419
|
+
:param icmp_type: The ICMP type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
|
|
420
|
+
:param protocol: The protocol this rule will be applied to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#protocol FirewallRules#protocol}
|
|
421
|
+
:param source_address_end: The source address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
|
|
422
|
+
:param source_address_start: The source address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
|
|
423
|
+
:param source_port_end: The source port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
|
|
424
|
+
:param source_port_start: The source port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
|
|
425
425
|
'''
|
|
426
426
|
if __debug__:
|
|
427
427
|
type_hints = typing.get_type_hints(_typecheckingstub__9b77e978fb66d25b46f06da19493b15c4f42527dec58b7335729cf86141901af)
|
|
@@ -472,7 +472,7 @@ class FirewallRulesFirewallRule:
|
|
|
472
472
|
def action(self) -> builtins.str:
|
|
473
473
|
'''Action to take if the rule conditions are met.
|
|
474
474
|
|
|
475
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
475
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#action FirewallRules#action}
|
|
476
476
|
'''
|
|
477
477
|
result = self._values.get("action")
|
|
478
478
|
assert result is not None, "Required property 'action' is missing"
|
|
@@ -482,7 +482,7 @@ class FirewallRulesFirewallRule:
|
|
|
482
482
|
def direction(self) -> builtins.str:
|
|
483
483
|
'''The direction of network traffic this rule will be applied to.
|
|
484
484
|
|
|
485
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
485
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#direction FirewallRules#direction}
|
|
486
486
|
'''
|
|
487
487
|
result = self._values.get("direction")
|
|
488
488
|
assert result is not None, "Required property 'direction' is missing"
|
|
@@ -492,7 +492,7 @@ class FirewallRulesFirewallRule:
|
|
|
492
492
|
def comment(self) -> typing.Optional[builtins.str]:
|
|
493
493
|
'''Freeform comment string for the rule.
|
|
494
494
|
|
|
495
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
495
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#comment FirewallRules#comment}
|
|
496
496
|
'''
|
|
497
497
|
result = self._values.get("comment")
|
|
498
498
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -501,7 +501,7 @@ class FirewallRulesFirewallRule:
|
|
|
501
501
|
def destination_address_end(self) -> typing.Optional[builtins.str]:
|
|
502
502
|
'''The destination address range ends from this address.
|
|
503
503
|
|
|
504
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
504
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
|
|
505
505
|
'''
|
|
506
506
|
result = self._values.get("destination_address_end")
|
|
507
507
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -510,7 +510,7 @@ class FirewallRulesFirewallRule:
|
|
|
510
510
|
def destination_address_start(self) -> typing.Optional[builtins.str]:
|
|
511
511
|
'''The destination address range starts from this address.
|
|
512
512
|
|
|
513
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
513
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
|
|
514
514
|
'''
|
|
515
515
|
result = self._values.get("destination_address_start")
|
|
516
516
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -519,7 +519,7 @@ class FirewallRulesFirewallRule:
|
|
|
519
519
|
def destination_port_end(self) -> typing.Optional[builtins.str]:
|
|
520
520
|
'''The destination port range ends from this port number.
|
|
521
521
|
|
|
522
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
522
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
|
|
523
523
|
'''
|
|
524
524
|
result = self._values.get("destination_port_end")
|
|
525
525
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -528,7 +528,7 @@ class FirewallRulesFirewallRule:
|
|
|
528
528
|
def destination_port_start(self) -> typing.Optional[builtins.str]:
|
|
529
529
|
'''The destination port range starts from this port number.
|
|
530
530
|
|
|
531
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
531
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
|
|
532
532
|
'''
|
|
533
533
|
result = self._values.get("destination_port_start")
|
|
534
534
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -537,7 +537,7 @@ class FirewallRulesFirewallRule:
|
|
|
537
537
|
def family(self) -> typing.Optional[builtins.str]:
|
|
538
538
|
'''The address family of new firewall rule.
|
|
539
539
|
|
|
540
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
540
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#family FirewallRules#family}
|
|
541
541
|
'''
|
|
542
542
|
result = self._values.get("family")
|
|
543
543
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -546,7 +546,7 @@ class FirewallRulesFirewallRule:
|
|
|
546
546
|
def icmp_type(self) -> typing.Optional[builtins.str]:
|
|
547
547
|
'''The ICMP type.
|
|
548
548
|
|
|
549
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
549
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
|
|
550
550
|
'''
|
|
551
551
|
result = self._values.get("icmp_type")
|
|
552
552
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -555,7 +555,7 @@ class FirewallRulesFirewallRule:
|
|
|
555
555
|
def protocol(self) -> typing.Optional[builtins.str]:
|
|
556
556
|
'''The protocol this rule will be applied to.
|
|
557
557
|
|
|
558
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
558
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#protocol FirewallRules#protocol}
|
|
559
559
|
'''
|
|
560
560
|
result = self._values.get("protocol")
|
|
561
561
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -564,7 +564,7 @@ class FirewallRulesFirewallRule:
|
|
|
564
564
|
def source_address_end(self) -> typing.Optional[builtins.str]:
|
|
565
565
|
'''The source address range ends from this address.
|
|
566
566
|
|
|
567
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
567
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
|
|
568
568
|
'''
|
|
569
569
|
result = self._values.get("source_address_end")
|
|
570
570
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -573,7 +573,7 @@ class FirewallRulesFirewallRule:
|
|
|
573
573
|
def source_address_start(self) -> typing.Optional[builtins.str]:
|
|
574
574
|
'''The source address range starts from this address.
|
|
575
575
|
|
|
576
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
576
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
|
|
577
577
|
'''
|
|
578
578
|
result = self._values.get("source_address_start")
|
|
579
579
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -582,7 +582,7 @@ class FirewallRulesFirewallRule:
|
|
|
582
582
|
def source_port_end(self) -> typing.Optional[builtins.str]:
|
|
583
583
|
'''The source port range ends from this port number.
|
|
584
584
|
|
|
585
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
585
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
|
|
586
586
|
'''
|
|
587
587
|
result = self._values.get("source_port_end")
|
|
588
588
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -591,7 +591,7 @@ class FirewallRulesFirewallRule:
|
|
|
591
591
|
def source_port_start(self) -> typing.Optional[builtins.str]:
|
|
592
592
|
'''The source port range starts from this port number.
|
|
593
593
|
|
|
594
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
594
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
|
|
595
595
|
'''
|
|
596
596
|
result = self._values.get("source_port_start")
|
|
597
597
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -1,7 +1,7 @@
|
|
|
1
|
-
'''
|
|
1
|
+
r'''
|
|
2
2
|
# `upcloud_floating_ip_address`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_floating_ip_address`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_floating_ip_address`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -29,16 +29,15 @@ class FloatingIpAddress(
|
|
|
29
29
|
metaclass=jsii.JSIIMeta,
|
|
30
30
|
jsii_type="@cdktf/provider-upcloud.floatingIpAddress.FloatingIpAddress",
|
|
31
31
|
):
|
|
32
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
32
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address upcloud_floating_ip_address}.'''
|
|
33
33
|
|
|
34
34
|
def __init__(
|
|
35
35
|
self,
|
|
36
36
|
scope: _constructs_77d1e7e8.Construct,
|
|
37
|
-
|
|
37
|
+
id: builtins.str,
|
|
38
38
|
*,
|
|
39
39
|
access: typing.Optional[builtins.str] = None,
|
|
40
40
|
family: typing.Optional[builtins.str] = None,
|
|
41
|
-
id: typing.Optional[builtins.str] = None,
|
|
42
41
|
mac_address: typing.Optional[builtins.str] = None,
|
|
43
42
|
zone: typing.Optional[builtins.str] = None,
|
|
44
43
|
connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
@@ -49,15 +48,14 @@ class FloatingIpAddress(
|
|
|
49
48
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
50
49
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
51
50
|
) -> None:
|
|
52
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
51
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address upcloud_floating_ip_address} Resource.
|
|
53
52
|
|
|
54
53
|
:param scope: The scope in which to define this construct.
|
|
55
|
-
:param
|
|
56
|
-
:param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
57
|
-
:param family: The address family of
|
|
58
|
-
:param
|
|
59
|
-
:param
|
|
60
|
-
:param zone: Zone of address, required when assigning a detached floating IP address, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
|
|
54
|
+
:param id: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
55
|
+
:param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#access FloatingIpAddress#access}
|
|
56
|
+
:param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#family FloatingIpAddress#family}
|
|
57
|
+
:param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
|
|
58
|
+
:param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
|
|
61
59
|
:param connection:
|
|
62
60
|
:param count:
|
|
63
61
|
:param depends_on:
|
|
@@ -69,11 +67,10 @@ class FloatingIpAddress(
|
|
|
69
67
|
if __debug__:
|
|
70
68
|
type_hints = typing.get_type_hints(_typecheckingstub__7a3a86334a576ee93e97cd5fa8f741a8da8f869742ea13315b33ceeecf76c4d0)
|
|
71
69
|
check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
|
|
72
|
-
check_type(argname="argument
|
|
70
|
+
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
73
71
|
config = FloatingIpAddressConfig(
|
|
74
72
|
access=access,
|
|
75
73
|
family=family,
|
|
76
|
-
id=id,
|
|
77
74
|
mac_address=mac_address,
|
|
78
75
|
zone=zone,
|
|
79
76
|
connection=connection,
|
|
@@ -85,7 +82,7 @@ class FloatingIpAddress(
|
|
|
85
82
|
provisioners=provisioners,
|
|
86
83
|
)
|
|
87
84
|
|
|
88
|
-
jsii.create(self.__class__, self, [scope,
|
|
85
|
+
jsii.create(self.__class__, self, [scope, id, config])
|
|
89
86
|
|
|
90
87
|
@jsii.member(jsii_name="generateConfigForImport")
|
|
91
88
|
@builtins.classmethod
|
|
@@ -100,7 +97,7 @@ class FloatingIpAddress(
|
|
|
100
97
|
|
|
101
98
|
:param scope: The scope in which to define this construct.
|
|
102
99
|
:param import_to_id: The construct id used in the generated config for the FloatingIpAddress to import.
|
|
103
|
-
:param import_from_id: The id of the existing FloatingIpAddress that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
100
|
+
:param import_from_id: The id of the existing FloatingIpAddress that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#import import section} in the documentation of this resource for the id to use
|
|
104
101
|
:param provider: ? Optional instance of the provider where the FloatingIpAddress to import is found.
|
|
105
102
|
'''
|
|
106
103
|
if __debug__:
|
|
@@ -119,10 +116,6 @@ class FloatingIpAddress(
|
|
|
119
116
|
def reset_family(self) -> None:
|
|
120
117
|
return typing.cast(None, jsii.invoke(self, "resetFamily", []))
|
|
121
118
|
|
|
122
|
-
@jsii.member(jsii_name="resetId")
|
|
123
|
-
def reset_id(self) -> None:
|
|
124
|
-
return typing.cast(None, jsii.invoke(self, "resetId", []))
|
|
125
|
-
|
|
126
119
|
@jsii.member(jsii_name="resetMacAddress")
|
|
127
120
|
def reset_mac_address(self) -> None:
|
|
128
121
|
return typing.cast(None, jsii.invoke(self, "resetMacAddress", []))
|
|
@@ -144,6 +137,11 @@ class FloatingIpAddress(
|
|
|
144
137
|
def TF_RESOURCE_TYPE(cls) -> builtins.str:
|
|
145
138
|
return typing.cast(builtins.str, jsii.sget(cls, "tfResourceType"))
|
|
146
139
|
|
|
140
|
+
@builtins.property
|
|
141
|
+
@jsii.member(jsii_name="id")
|
|
142
|
+
def id(self) -> builtins.str:
|
|
143
|
+
return typing.cast(builtins.str, jsii.get(self, "id"))
|
|
144
|
+
|
|
147
145
|
@builtins.property
|
|
148
146
|
@jsii.member(jsii_name="ipAddress")
|
|
149
147
|
def ip_address(self) -> builtins.str:
|
|
@@ -159,11 +157,6 @@ class FloatingIpAddress(
|
|
|
159
157
|
def family_input(self) -> typing.Optional[builtins.str]:
|
|
160
158
|
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "familyInput"))
|
|
161
159
|
|
|
162
|
-
@builtins.property
|
|
163
|
-
@jsii.member(jsii_name="idInput")
|
|
164
|
-
def id_input(self) -> typing.Optional[builtins.str]:
|
|
165
|
-
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "idInput"))
|
|
166
|
-
|
|
167
160
|
@builtins.property
|
|
168
161
|
@jsii.member(jsii_name="macAddressInput")
|
|
169
162
|
def mac_address_input(self) -> typing.Optional[builtins.str]:
|
|
@@ -198,18 +191,6 @@ class FloatingIpAddress(
|
|
|
198
191
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
199
192
|
jsii.set(self, "family", value)
|
|
200
193
|
|
|
201
|
-
@builtins.property
|
|
202
|
-
@jsii.member(jsii_name="id")
|
|
203
|
-
def id(self) -> builtins.str:
|
|
204
|
-
return typing.cast(builtins.str, jsii.get(self, "id"))
|
|
205
|
-
|
|
206
|
-
@id.setter
|
|
207
|
-
def id(self, value: builtins.str) -> None:
|
|
208
|
-
if __debug__:
|
|
209
|
-
type_hints = typing.get_type_hints(_typecheckingstub__b2c7eb1c0f785647011680f92783b1dda023b0ec4439bacb7df488a4c9d0daf3)
|
|
210
|
-
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
211
|
-
jsii.set(self, "id", value)
|
|
212
|
-
|
|
213
194
|
@builtins.property
|
|
214
195
|
@jsii.member(jsii_name="macAddress")
|
|
215
196
|
def mac_address(self) -> builtins.str:
|
|
@@ -248,7 +229,6 @@ class FloatingIpAddress(
|
|
|
248
229
|
"provisioners": "provisioners",
|
|
249
230
|
"access": "access",
|
|
250
231
|
"family": "family",
|
|
251
|
-
"id": "id",
|
|
252
232
|
"mac_address": "macAddress",
|
|
253
233
|
"zone": "zone",
|
|
254
234
|
},
|
|
@@ -266,7 +246,6 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
266
246
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
267
247
|
access: typing.Optional[builtins.str] = None,
|
|
268
248
|
family: typing.Optional[builtins.str] = None,
|
|
269
|
-
id: typing.Optional[builtins.str] = None,
|
|
270
249
|
mac_address: typing.Optional[builtins.str] = None,
|
|
271
250
|
zone: typing.Optional[builtins.str] = None,
|
|
272
251
|
) -> None:
|
|
@@ -278,11 +257,10 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
278
257
|
:param lifecycle:
|
|
279
258
|
:param provider:
|
|
280
259
|
:param provisioners:
|
|
281
|
-
:param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
282
|
-
:param family: The address family of
|
|
283
|
-
:param
|
|
284
|
-
:param
|
|
285
|
-
:param zone: Zone of address, required when assigning a detached floating IP address, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
|
|
260
|
+
:param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#access FloatingIpAddress#access}
|
|
261
|
+
:param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#family FloatingIpAddress#family}
|
|
262
|
+
:param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
|
|
263
|
+
:param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
|
|
286
264
|
'''
|
|
287
265
|
if isinstance(lifecycle, dict):
|
|
288
266
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -297,7 +275,6 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
297
275
|
check_type(argname="argument provisioners", value=provisioners, expected_type=type_hints["provisioners"])
|
|
298
276
|
check_type(argname="argument access", value=access, expected_type=type_hints["access"])
|
|
299
277
|
check_type(argname="argument family", value=family, expected_type=type_hints["family"])
|
|
300
|
-
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
301
278
|
check_type(argname="argument mac_address", value=mac_address, expected_type=type_hints["mac_address"])
|
|
302
279
|
check_type(argname="argument zone", value=zone, expected_type=type_hints["zone"])
|
|
303
280
|
self._values: typing.Dict[builtins.str, typing.Any] = {}
|
|
@@ -319,8 +296,6 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
319
296
|
self._values["access"] = access
|
|
320
297
|
if family is not None:
|
|
321
298
|
self._values["family"] = family
|
|
322
|
-
if id is not None:
|
|
323
|
-
self._values["id"] = id
|
|
324
299
|
if mac_address is not None:
|
|
325
300
|
self._values["mac_address"] = mac_address
|
|
326
301
|
if zone is not None:
|
|
@@ -394,44 +369,34 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
394
369
|
def access(self) -> typing.Optional[builtins.str]:
|
|
395
370
|
'''Network access for the floating IP address. Supported value: ``public``.
|
|
396
371
|
|
|
397
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
372
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#access FloatingIpAddress#access}
|
|
398
373
|
'''
|
|
399
374
|
result = self._values.get("access")
|
|
400
375
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
401
376
|
|
|
402
377
|
@builtins.property
|
|
403
378
|
def family(self) -> typing.Optional[builtins.str]:
|
|
404
|
-
'''The address family of
|
|
379
|
+
'''The address family of the floating IP address.
|
|
405
380
|
|
|
406
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
381
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#family FloatingIpAddress#family}
|
|
407
382
|
'''
|
|
408
383
|
result = self._values.get("family")
|
|
409
384
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
410
385
|
|
|
411
|
-
@builtins.property
|
|
412
|
-
def id(self) -> typing.Optional[builtins.str]:
|
|
413
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/floating_ip_address#id FloatingIpAddress#id}.
|
|
414
|
-
|
|
415
|
-
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
416
|
-
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
417
|
-
'''
|
|
418
|
-
result = self._values.get("id")
|
|
419
|
-
return typing.cast(typing.Optional[builtins.str], result)
|
|
420
|
-
|
|
421
386
|
@builtins.property
|
|
422
387
|
def mac_address(self) -> typing.Optional[builtins.str]:
|
|
423
|
-
'''MAC address of server interface to assign address to.
|
|
388
|
+
'''MAC address of a server interface to assign address to.
|
|
424
389
|
|
|
425
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
390
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
|
|
426
391
|
'''
|
|
427
392
|
result = self._values.get("mac_address")
|
|
428
393
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
429
394
|
|
|
430
395
|
@builtins.property
|
|
431
396
|
def zone(self) -> typing.Optional[builtins.str]:
|
|
432
|
-
'''Zone of address,
|
|
397
|
+
'''Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``.
|
|
433
398
|
|
|
434
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
399
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
|
|
435
400
|
'''
|
|
436
401
|
result = self._values.get("zone")
|
|
437
402
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -457,11 +422,10 @@ publication.publish()
|
|
|
457
422
|
|
|
458
423
|
def _typecheckingstub__7a3a86334a576ee93e97cd5fa8f741a8da8f869742ea13315b33ceeecf76c4d0(
|
|
459
424
|
scope: _constructs_77d1e7e8.Construct,
|
|
460
|
-
|
|
425
|
+
id: builtins.str,
|
|
461
426
|
*,
|
|
462
427
|
access: typing.Optional[builtins.str] = None,
|
|
463
428
|
family: typing.Optional[builtins.str] = None,
|
|
464
|
-
id: typing.Optional[builtins.str] = None,
|
|
465
429
|
mac_address: typing.Optional[builtins.str] = None,
|
|
466
430
|
zone: typing.Optional[builtins.str] = None,
|
|
467
431
|
connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
@@ -496,12 +460,6 @@ def _typecheckingstub__ac4d2dcfe2d1d01d7514c7cd7f22d5b4a1cb39d7fcf66b3670b4a5c7d
|
|
|
496
460
|
"""Type checking stubs"""
|
|
497
461
|
pass
|
|
498
462
|
|
|
499
|
-
def _typecheckingstub__b2c7eb1c0f785647011680f92783b1dda023b0ec4439bacb7df488a4c9d0daf3(
|
|
500
|
-
value: builtins.str,
|
|
501
|
-
) -> None:
|
|
502
|
-
"""Type checking stubs"""
|
|
503
|
-
pass
|
|
504
|
-
|
|
505
463
|
def _typecheckingstub__3a3d0104fe4b695d7b1611f86c494909bc09134ac2baddb967a1813ed3ced4f7(
|
|
506
464
|
value: builtins.str,
|
|
507
465
|
) -> None:
|
|
@@ -525,7 +483,6 @@ def _typecheckingstub__d77934c8fe141a2f7da0915ddfad6f183a3295e3e3e9c279b458e3a16
|
|
|
525
483
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
526
484
|
access: typing.Optional[builtins.str] = None,
|
|
527
485
|
family: typing.Optional[builtins.str] = None,
|
|
528
|
-
id: typing.Optional[builtins.str] = None,
|
|
529
486
|
mac_address: typing.Optional[builtins.str] = None,
|
|
530
487
|
zone: typing.Optional[builtins.str] = None,
|
|
531
488
|
) -> None:
|