cdktf-cdktf-provider-upcloud 14.4.0__py3-none-any.whl → 14.6.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.

Files changed (62) hide show
  1. cdktf_cdktf_provider_upcloud/__init__.py +4 -4
  2. cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
  3. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.6.0.jsii.tgz +0 -0
  4. cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +8 -8
  5. cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +8 -8
  6. cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +8 -8
  7. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +23 -23
  8. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +14 -14
  9. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +31 -31
  10. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +23 -23
  11. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +11 -11
  12. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +8 -8
  13. cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +14 -14
  14. cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +26 -26
  15. cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +8 -8
  16. cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +42 -30
  17. cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +11 -11
  18. cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +42 -42
  19. cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +30 -73
  20. cdktf_cdktf_provider_upcloud/gateway/__init__.py +38 -38
  21. cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +40 -35
  22. cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +67 -62
  23. cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +35 -35
  24. cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +66 -66
  25. cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +43 -43
  26. cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +65 -65
  27. cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +17 -17
  28. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +29 -29
  29. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +17 -17
  30. cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +40 -40
  31. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +194 -194
  32. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +17 -17
  33. cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +20 -20
  34. cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +32 -32
  35. cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +29 -29
  36. cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +20 -20
  37. cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +190 -190
  38. cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +331 -331
  39. cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +346 -346
  40. cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +118 -118
  41. cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +51 -51
  42. cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +31 -31
  43. cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +20 -20
  44. cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +14 -14
  45. cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +17 -17
  46. cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +17 -17
  47. cdktf_cdktf_provider_upcloud/network/__init__.py +80 -31
  48. cdktf_cdktf_provider_upcloud/network_peering/__init__.py +24 -24
  49. cdktf_cdktf_provider_upcloud/object_storage/__init__.py +31 -31
  50. cdktf_cdktf_provider_upcloud/provider/__init__.py +26 -26
  51. cdktf_cdktf_provider_upcloud/router/__init__.py +60 -54
  52. cdktf_cdktf_provider_upcloud/server/__init__.py +154 -154
  53. cdktf_cdktf_provider_upcloud/server_group/__init__.py +23 -23
  54. cdktf_cdktf_provider_upcloud/storage/__init__.py +59 -59
  55. cdktf_cdktf_provider_upcloud/tag/__init__.py +17 -17
  56. {cdktf_cdktf_provider_upcloud-14.4.0.dist-info → cdktf_cdktf_provider_upcloud-14.6.0.dist-info}/METADATA +5 -5
  57. cdktf_cdktf_provider_upcloud-14.6.0.dist-info/RECORD +61 -0
  58. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.4.0.jsii.tgz +0 -0
  59. cdktf_cdktf_provider_upcloud-14.4.0.dist-info/RECORD +0 -61
  60. {cdktf_cdktf_provider_upcloud-14.4.0.dist-info → cdktf_cdktf_provider_upcloud-14.6.0.dist-info}/LICENSE +0 -0
  61. {cdktf_cdktf_provider_upcloud-14.4.0.dist-info → cdktf_cdktf_provider_upcloud-14.6.0.dist-info}/WHEEL +0 -0
  62. {cdktf_cdktf_provider_upcloud-14.4.0.dist-info → cdktf_cdktf_provider_upcloud-14.6.0.dist-info}/top_level.txt +0 -0
@@ -1,7 +1,7 @@
1
- '''
1
+ r'''
2
2
  # `upcloud_firewall_rules`
3
3
 
4
- Refer to the Terraform Registry for docs: [`upcloud_firewall_rules`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules).
4
+ Refer to the Terraform Registry for docs: [`upcloud_firewall_rules`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -29,7 +29,7 @@ class FirewallRules(
29
29
  metaclass=jsii.JSIIMeta,
30
30
  jsii_type="@cdktf/provider-upcloud.firewallRules.FirewallRules",
31
31
  ):
32
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules upcloud_firewall_rules}.'''
32
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules upcloud_firewall_rules}.'''
33
33
 
34
34
  def __init__(
35
35
  self,
@@ -47,13 +47,13 @@ class FirewallRules(
47
47
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
48
48
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
49
49
  ) -> None:
50
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules upcloud_firewall_rules} Resource.
50
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules upcloud_firewall_rules} Resource.
51
51
 
52
52
  :param scope: The scope in which to define this construct.
53
53
  :param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
54
- :param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
55
- :param server_id: The unique id of the server to be protected the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
56
- :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#id FirewallRules#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
54
+ :param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
55
+ :param server_id: The unique id of the server to be protected the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
56
+ :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#id FirewallRules#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
57
57
  :param connection:
58
58
  :param count:
59
59
  :param depends_on:
@@ -94,7 +94,7 @@ class FirewallRules(
94
94
 
95
95
  :param scope: The scope in which to define this construct.
96
96
  :param import_to_id: The construct id used in the generated config for the FirewallRules to import.
97
- :param import_from_id: The id of the existing FirewallRules that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#import import section} in the documentation of this resource for the id to use
97
+ :param import_from_id: The id of the existing FirewallRules that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#import import section} in the documentation of this resource for the id to use
98
98
  :param provider: ? Optional instance of the provider where the FirewallRules to import is found.
99
99
  '''
100
100
  if __debug__:
@@ -221,9 +221,9 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
221
221
  :param lifecycle:
222
222
  :param provider:
223
223
  :param provisioners:
224
- :param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
225
- :param server_id: The unique id of the server to be protected the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
226
- :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#id FirewallRules#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
224
+ :param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
225
+ :param server_id: The unique id of the server to be protected the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
226
+ :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#id FirewallRules#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
227
227
  '''
228
228
  if isinstance(lifecycle, dict):
229
229
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -330,7 +330,7 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
330
330
  ) -> typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]]:
331
331
  '''firewall_rule block.
332
332
 
333
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
333
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
334
334
  '''
335
335
  result = self._values.get("firewall_rule")
336
336
  assert result is not None, "Required property 'firewall_rule' is missing"
@@ -340,7 +340,7 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
340
340
  def server_id(self) -> builtins.str:
341
341
  '''The unique id of the server to be protected the firewall rules.
342
342
 
343
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
343
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
344
344
  '''
345
345
  result = self._values.get("server_id")
346
346
  assert result is not None, "Required property 'server_id' is missing"
@@ -348,7 +348,7 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
348
348
 
349
349
  @builtins.property
350
350
  def id(self) -> typing.Optional[builtins.str]:
351
- '''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#id FirewallRules#id}.
351
+ '''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#id FirewallRules#id}.
352
352
 
353
353
  Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
354
354
  If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -408,20 +408,20 @@ class FirewallRulesFirewallRule:
408
408
  source_port_start: typing.Optional[builtins.str] = None,
409
409
  ) -> None:
410
410
  '''
411
- :param action: Action to take if the rule conditions are met. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#action FirewallRules#action}
412
- :param direction: The direction of network traffic this rule will be applied to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#direction FirewallRules#direction}
413
- :param comment: Freeform comment string for the rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#comment FirewallRules#comment}
414
- :param destination_address_end: The destination address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
415
- :param destination_address_start: The destination address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
416
- :param destination_port_end: The destination port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
417
- :param destination_port_start: The destination port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
418
- :param family: The address family of new firewall rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#family FirewallRules#family}
419
- :param icmp_type: The ICMP type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
420
- :param protocol: The protocol this rule will be applied to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#protocol FirewallRules#protocol}
421
- :param source_address_end: The source address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
422
- :param source_address_start: The source address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
423
- :param source_port_end: The source port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
424
- :param source_port_start: The source port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
411
+ :param action: Action to take if the rule conditions are met. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#action FirewallRules#action}
412
+ :param direction: The direction of network traffic this rule will be applied to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#direction FirewallRules#direction}
413
+ :param comment: Freeform comment string for the rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#comment FirewallRules#comment}
414
+ :param destination_address_end: The destination address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
415
+ :param destination_address_start: The destination address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
416
+ :param destination_port_end: The destination port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
417
+ :param destination_port_start: The destination port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
418
+ :param family: The address family of new firewall rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#family FirewallRules#family}
419
+ :param icmp_type: The ICMP type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
420
+ :param protocol: The protocol this rule will be applied to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#protocol FirewallRules#protocol}
421
+ :param source_address_end: The source address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
422
+ :param source_address_start: The source address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
423
+ :param source_port_end: The source port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
424
+ :param source_port_start: The source port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
425
425
  '''
426
426
  if __debug__:
427
427
  type_hints = typing.get_type_hints(_typecheckingstub__9b77e978fb66d25b46f06da19493b15c4f42527dec58b7335729cf86141901af)
@@ -472,7 +472,7 @@ class FirewallRulesFirewallRule:
472
472
  def action(self) -> builtins.str:
473
473
  '''Action to take if the rule conditions are met.
474
474
 
475
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#action FirewallRules#action}
475
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#action FirewallRules#action}
476
476
  '''
477
477
  result = self._values.get("action")
478
478
  assert result is not None, "Required property 'action' is missing"
@@ -482,7 +482,7 @@ class FirewallRulesFirewallRule:
482
482
  def direction(self) -> builtins.str:
483
483
  '''The direction of network traffic this rule will be applied to.
484
484
 
485
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#direction FirewallRules#direction}
485
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#direction FirewallRules#direction}
486
486
  '''
487
487
  result = self._values.get("direction")
488
488
  assert result is not None, "Required property 'direction' is missing"
@@ -492,7 +492,7 @@ class FirewallRulesFirewallRule:
492
492
  def comment(self) -> typing.Optional[builtins.str]:
493
493
  '''Freeform comment string for the rule.
494
494
 
495
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#comment FirewallRules#comment}
495
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#comment FirewallRules#comment}
496
496
  '''
497
497
  result = self._values.get("comment")
498
498
  return typing.cast(typing.Optional[builtins.str], result)
@@ -501,7 +501,7 @@ class FirewallRulesFirewallRule:
501
501
  def destination_address_end(self) -> typing.Optional[builtins.str]:
502
502
  '''The destination address range ends from this address.
503
503
 
504
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
504
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
505
505
  '''
506
506
  result = self._values.get("destination_address_end")
507
507
  return typing.cast(typing.Optional[builtins.str], result)
@@ -510,7 +510,7 @@ class FirewallRulesFirewallRule:
510
510
  def destination_address_start(self) -> typing.Optional[builtins.str]:
511
511
  '''The destination address range starts from this address.
512
512
 
513
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
513
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
514
514
  '''
515
515
  result = self._values.get("destination_address_start")
516
516
  return typing.cast(typing.Optional[builtins.str], result)
@@ -519,7 +519,7 @@ class FirewallRulesFirewallRule:
519
519
  def destination_port_end(self) -> typing.Optional[builtins.str]:
520
520
  '''The destination port range ends from this port number.
521
521
 
522
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
522
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
523
523
  '''
524
524
  result = self._values.get("destination_port_end")
525
525
  return typing.cast(typing.Optional[builtins.str], result)
@@ -528,7 +528,7 @@ class FirewallRulesFirewallRule:
528
528
  def destination_port_start(self) -> typing.Optional[builtins.str]:
529
529
  '''The destination port range starts from this port number.
530
530
 
531
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
531
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
532
532
  '''
533
533
  result = self._values.get("destination_port_start")
534
534
  return typing.cast(typing.Optional[builtins.str], result)
@@ -537,7 +537,7 @@ class FirewallRulesFirewallRule:
537
537
  def family(self) -> typing.Optional[builtins.str]:
538
538
  '''The address family of new firewall rule.
539
539
 
540
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#family FirewallRules#family}
540
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#family FirewallRules#family}
541
541
  '''
542
542
  result = self._values.get("family")
543
543
  return typing.cast(typing.Optional[builtins.str], result)
@@ -546,7 +546,7 @@ class FirewallRulesFirewallRule:
546
546
  def icmp_type(self) -> typing.Optional[builtins.str]:
547
547
  '''The ICMP type.
548
548
 
549
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
549
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
550
550
  '''
551
551
  result = self._values.get("icmp_type")
552
552
  return typing.cast(typing.Optional[builtins.str], result)
@@ -555,7 +555,7 @@ class FirewallRulesFirewallRule:
555
555
  def protocol(self) -> typing.Optional[builtins.str]:
556
556
  '''The protocol this rule will be applied to.
557
557
 
558
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#protocol FirewallRules#protocol}
558
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#protocol FirewallRules#protocol}
559
559
  '''
560
560
  result = self._values.get("protocol")
561
561
  return typing.cast(typing.Optional[builtins.str], result)
@@ -564,7 +564,7 @@ class FirewallRulesFirewallRule:
564
564
  def source_address_end(self) -> typing.Optional[builtins.str]:
565
565
  '''The source address range ends from this address.
566
566
 
567
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
567
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
568
568
  '''
569
569
  result = self._values.get("source_address_end")
570
570
  return typing.cast(typing.Optional[builtins.str], result)
@@ -573,7 +573,7 @@ class FirewallRulesFirewallRule:
573
573
  def source_address_start(self) -> typing.Optional[builtins.str]:
574
574
  '''The source address range starts from this address.
575
575
 
576
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
576
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
577
577
  '''
578
578
  result = self._values.get("source_address_start")
579
579
  return typing.cast(typing.Optional[builtins.str], result)
@@ -582,7 +582,7 @@ class FirewallRulesFirewallRule:
582
582
  def source_port_end(self) -> typing.Optional[builtins.str]:
583
583
  '''The source port range ends from this port number.
584
584
 
585
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
585
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
586
586
  '''
587
587
  result = self._values.get("source_port_end")
588
588
  return typing.cast(typing.Optional[builtins.str], result)
@@ -591,7 +591,7 @@ class FirewallRulesFirewallRule:
591
591
  def source_port_start(self) -> typing.Optional[builtins.str]:
592
592
  '''The source port range starts from this port number.
593
593
 
594
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
594
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
595
595
  '''
596
596
  result = self._values.get("source_port_start")
597
597
  return typing.cast(typing.Optional[builtins.str], result)
@@ -1,7 +1,7 @@
1
- '''
1
+ r'''
2
2
  # `upcloud_floating_ip_address`
3
3
 
4
- Refer to the Terraform Registry for docs: [`upcloud_floating_ip_address`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/floating_ip_address).
4
+ Refer to the Terraform Registry for docs: [`upcloud_floating_ip_address`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -29,16 +29,15 @@ class FloatingIpAddress(
29
29
  metaclass=jsii.JSIIMeta,
30
30
  jsii_type="@cdktf/provider-upcloud.floatingIpAddress.FloatingIpAddress",
31
31
  ):
32
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/floating_ip_address upcloud_floating_ip_address}.'''
32
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address upcloud_floating_ip_address}.'''
33
33
 
34
34
  def __init__(
35
35
  self,
36
36
  scope: _constructs_77d1e7e8.Construct,
37
- id_: builtins.str,
37
+ id: builtins.str,
38
38
  *,
39
39
  access: typing.Optional[builtins.str] = None,
40
40
  family: typing.Optional[builtins.str] = None,
41
- id: typing.Optional[builtins.str] = None,
42
41
  mac_address: typing.Optional[builtins.str] = None,
43
42
  zone: typing.Optional[builtins.str] = None,
44
43
  connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
@@ -49,15 +48,14 @@ class FloatingIpAddress(
49
48
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
50
49
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
51
50
  ) -> None:
52
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/floating_ip_address upcloud_floating_ip_address} Resource.
51
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address upcloud_floating_ip_address} Resource.
53
52
 
54
53
  :param scope: The scope in which to define this construct.
55
- :param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
56
- :param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/floating_ip_address#access FloatingIpAddress#access}
57
- :param family: The address family of new IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/floating_ip_address#family FloatingIpAddress#family}
58
- :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/floating_ip_address#id FloatingIpAddress#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
59
- :param mac_address: MAC address of server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
60
- :param zone: Zone of address, required when assigning a detached floating IP address, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
54
+ :param id: The scoped construct ID. Must be unique amongst siblings in the same scope
55
+ :param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#access FloatingIpAddress#access}
56
+ :param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#family FloatingIpAddress#family}
57
+ :param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
58
+ :param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
61
59
  :param connection:
62
60
  :param count:
63
61
  :param depends_on:
@@ -69,11 +67,10 @@ class FloatingIpAddress(
69
67
  if __debug__:
70
68
  type_hints = typing.get_type_hints(_typecheckingstub__7a3a86334a576ee93e97cd5fa8f741a8da8f869742ea13315b33ceeecf76c4d0)
71
69
  check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
72
- check_type(argname="argument id_", value=id_, expected_type=type_hints["id_"])
70
+ check_type(argname="argument id", value=id, expected_type=type_hints["id"])
73
71
  config = FloatingIpAddressConfig(
74
72
  access=access,
75
73
  family=family,
76
- id=id,
77
74
  mac_address=mac_address,
78
75
  zone=zone,
79
76
  connection=connection,
@@ -85,7 +82,7 @@ class FloatingIpAddress(
85
82
  provisioners=provisioners,
86
83
  )
87
84
 
88
- jsii.create(self.__class__, self, [scope, id_, config])
85
+ jsii.create(self.__class__, self, [scope, id, config])
89
86
 
90
87
  @jsii.member(jsii_name="generateConfigForImport")
91
88
  @builtins.classmethod
@@ -100,7 +97,7 @@ class FloatingIpAddress(
100
97
 
101
98
  :param scope: The scope in which to define this construct.
102
99
  :param import_to_id: The construct id used in the generated config for the FloatingIpAddress to import.
103
- :param import_from_id: The id of the existing FloatingIpAddress that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/floating_ip_address#import import section} in the documentation of this resource for the id to use
100
+ :param import_from_id: The id of the existing FloatingIpAddress that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#import import section} in the documentation of this resource for the id to use
104
101
  :param provider: ? Optional instance of the provider where the FloatingIpAddress to import is found.
105
102
  '''
106
103
  if __debug__:
@@ -119,10 +116,6 @@ class FloatingIpAddress(
119
116
  def reset_family(self) -> None:
120
117
  return typing.cast(None, jsii.invoke(self, "resetFamily", []))
121
118
 
122
- @jsii.member(jsii_name="resetId")
123
- def reset_id(self) -> None:
124
- return typing.cast(None, jsii.invoke(self, "resetId", []))
125
-
126
119
  @jsii.member(jsii_name="resetMacAddress")
127
120
  def reset_mac_address(self) -> None:
128
121
  return typing.cast(None, jsii.invoke(self, "resetMacAddress", []))
@@ -144,6 +137,11 @@ class FloatingIpAddress(
144
137
  def TF_RESOURCE_TYPE(cls) -> builtins.str:
145
138
  return typing.cast(builtins.str, jsii.sget(cls, "tfResourceType"))
146
139
 
140
+ @builtins.property
141
+ @jsii.member(jsii_name="id")
142
+ def id(self) -> builtins.str:
143
+ return typing.cast(builtins.str, jsii.get(self, "id"))
144
+
147
145
  @builtins.property
148
146
  @jsii.member(jsii_name="ipAddress")
149
147
  def ip_address(self) -> builtins.str:
@@ -159,11 +157,6 @@ class FloatingIpAddress(
159
157
  def family_input(self) -> typing.Optional[builtins.str]:
160
158
  return typing.cast(typing.Optional[builtins.str], jsii.get(self, "familyInput"))
161
159
 
162
- @builtins.property
163
- @jsii.member(jsii_name="idInput")
164
- def id_input(self) -> typing.Optional[builtins.str]:
165
- return typing.cast(typing.Optional[builtins.str], jsii.get(self, "idInput"))
166
-
167
160
  @builtins.property
168
161
  @jsii.member(jsii_name="macAddressInput")
169
162
  def mac_address_input(self) -> typing.Optional[builtins.str]:
@@ -198,18 +191,6 @@ class FloatingIpAddress(
198
191
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
199
192
  jsii.set(self, "family", value)
200
193
 
201
- @builtins.property
202
- @jsii.member(jsii_name="id")
203
- def id(self) -> builtins.str:
204
- return typing.cast(builtins.str, jsii.get(self, "id"))
205
-
206
- @id.setter
207
- def id(self, value: builtins.str) -> None:
208
- if __debug__:
209
- type_hints = typing.get_type_hints(_typecheckingstub__b2c7eb1c0f785647011680f92783b1dda023b0ec4439bacb7df488a4c9d0daf3)
210
- check_type(argname="argument value", value=value, expected_type=type_hints["value"])
211
- jsii.set(self, "id", value)
212
-
213
194
  @builtins.property
214
195
  @jsii.member(jsii_name="macAddress")
215
196
  def mac_address(self) -> builtins.str:
@@ -248,7 +229,6 @@ class FloatingIpAddress(
248
229
  "provisioners": "provisioners",
249
230
  "access": "access",
250
231
  "family": "family",
251
- "id": "id",
252
232
  "mac_address": "macAddress",
253
233
  "zone": "zone",
254
234
  },
@@ -266,7 +246,6 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
266
246
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
267
247
  access: typing.Optional[builtins.str] = None,
268
248
  family: typing.Optional[builtins.str] = None,
269
- id: typing.Optional[builtins.str] = None,
270
249
  mac_address: typing.Optional[builtins.str] = None,
271
250
  zone: typing.Optional[builtins.str] = None,
272
251
  ) -> None:
@@ -278,11 +257,10 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
278
257
  :param lifecycle:
279
258
  :param provider:
280
259
  :param provisioners:
281
- :param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/floating_ip_address#access FloatingIpAddress#access}
282
- :param family: The address family of new IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/floating_ip_address#family FloatingIpAddress#family}
283
- :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/floating_ip_address#id FloatingIpAddress#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
284
- :param mac_address: MAC address of server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
285
- :param zone: Zone of address, required when assigning a detached floating IP address, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
260
+ :param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#access FloatingIpAddress#access}
261
+ :param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#family FloatingIpAddress#family}
262
+ :param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
263
+ :param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
286
264
  '''
287
265
  if isinstance(lifecycle, dict):
288
266
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -297,7 +275,6 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
297
275
  check_type(argname="argument provisioners", value=provisioners, expected_type=type_hints["provisioners"])
298
276
  check_type(argname="argument access", value=access, expected_type=type_hints["access"])
299
277
  check_type(argname="argument family", value=family, expected_type=type_hints["family"])
300
- check_type(argname="argument id", value=id, expected_type=type_hints["id"])
301
278
  check_type(argname="argument mac_address", value=mac_address, expected_type=type_hints["mac_address"])
302
279
  check_type(argname="argument zone", value=zone, expected_type=type_hints["zone"])
303
280
  self._values: typing.Dict[builtins.str, typing.Any] = {}
@@ -319,8 +296,6 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
319
296
  self._values["access"] = access
320
297
  if family is not None:
321
298
  self._values["family"] = family
322
- if id is not None:
323
- self._values["id"] = id
324
299
  if mac_address is not None:
325
300
  self._values["mac_address"] = mac_address
326
301
  if zone is not None:
@@ -394,44 +369,34 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
394
369
  def access(self) -> typing.Optional[builtins.str]:
395
370
  '''Network access for the floating IP address. Supported value: ``public``.
396
371
 
397
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/floating_ip_address#access FloatingIpAddress#access}
372
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#access FloatingIpAddress#access}
398
373
  '''
399
374
  result = self._values.get("access")
400
375
  return typing.cast(typing.Optional[builtins.str], result)
401
376
 
402
377
  @builtins.property
403
378
  def family(self) -> typing.Optional[builtins.str]:
404
- '''The address family of new IP address.
379
+ '''The address family of the floating IP address.
405
380
 
406
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/floating_ip_address#family FloatingIpAddress#family}
381
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#family FloatingIpAddress#family}
407
382
  '''
408
383
  result = self._values.get("family")
409
384
  return typing.cast(typing.Optional[builtins.str], result)
410
385
 
411
- @builtins.property
412
- def id(self) -> typing.Optional[builtins.str]:
413
- '''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/floating_ip_address#id FloatingIpAddress#id}.
414
-
415
- Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
416
- If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
417
- '''
418
- result = self._values.get("id")
419
- return typing.cast(typing.Optional[builtins.str], result)
420
-
421
386
  @builtins.property
422
387
  def mac_address(self) -> typing.Optional[builtins.str]:
423
- '''MAC address of server interface to assign address to.
388
+ '''MAC address of a server interface to assign address to.
424
389
 
425
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
390
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
426
391
  '''
427
392
  result = self._values.get("mac_address")
428
393
  return typing.cast(typing.Optional[builtins.str], result)
429
394
 
430
395
  @builtins.property
431
396
  def zone(self) -> typing.Optional[builtins.str]:
432
- '''Zone of address, required when assigning a detached floating IP address, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``.
397
+ '''Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``.
433
398
 
434
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
399
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
435
400
  '''
436
401
  result = self._values.get("zone")
437
402
  return typing.cast(typing.Optional[builtins.str], result)
@@ -457,11 +422,10 @@ publication.publish()
457
422
 
458
423
  def _typecheckingstub__7a3a86334a576ee93e97cd5fa8f741a8da8f869742ea13315b33ceeecf76c4d0(
459
424
  scope: _constructs_77d1e7e8.Construct,
460
- id_: builtins.str,
425
+ id: builtins.str,
461
426
  *,
462
427
  access: typing.Optional[builtins.str] = None,
463
428
  family: typing.Optional[builtins.str] = None,
464
- id: typing.Optional[builtins.str] = None,
465
429
  mac_address: typing.Optional[builtins.str] = None,
466
430
  zone: typing.Optional[builtins.str] = None,
467
431
  connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
@@ -496,12 +460,6 @@ def _typecheckingstub__ac4d2dcfe2d1d01d7514c7cd7f22d5b4a1cb39d7fcf66b3670b4a5c7d
496
460
  """Type checking stubs"""
497
461
  pass
498
462
 
499
- def _typecheckingstub__b2c7eb1c0f785647011680f92783b1dda023b0ec4439bacb7df488a4c9d0daf3(
500
- value: builtins.str,
501
- ) -> None:
502
- """Type checking stubs"""
503
- pass
504
-
505
463
  def _typecheckingstub__3a3d0104fe4b695d7b1611f86c494909bc09134ac2baddb967a1813ed3ced4f7(
506
464
  value: builtins.str,
507
465
  ) -> None:
@@ -525,7 +483,6 @@ def _typecheckingstub__d77934c8fe141a2f7da0915ddfad6f183a3295e3e3e9c279b458e3a16
525
483
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
526
484
  access: typing.Optional[builtins.str] = None,
527
485
  family: typing.Optional[builtins.str] = None,
528
- id: typing.Optional[builtins.str] = None,
529
486
  mac_address: typing.Optional[builtins.str] = None,
530
487
  zone: typing.Optional[builtins.str] = None,
531
488
  ) -> None: