cdktf-cdktf-provider-upcloud 14.4.0__py3-none-any.whl → 14.6.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +4 -4
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.6.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +8 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +8 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +8 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +23 -23
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +14 -14
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +31 -31
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +23 -23
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +11 -11
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +8 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +14 -14
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +26 -26
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +8 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +42 -30
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +11 -11
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +42 -42
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +30 -73
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +38 -38
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +40 -35
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +67 -62
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +35 -35
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +66 -66
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +43 -43
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +65 -65
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +17 -17
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +29 -29
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +17 -17
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +40 -40
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +194 -194
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +17 -17
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +29 -29
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +190 -190
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +331 -331
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +346 -346
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +118 -118
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +51 -51
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +31 -31
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +14 -14
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +17 -17
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +17 -17
- cdktf_cdktf_provider_upcloud/network/__init__.py +80 -31
- cdktf_cdktf_provider_upcloud/network_peering/__init__.py +24 -24
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +31 -31
- cdktf_cdktf_provider_upcloud/provider/__init__.py +26 -26
- cdktf_cdktf_provider_upcloud/router/__init__.py +60 -54
- cdktf_cdktf_provider_upcloud/server/__init__.py +154 -154
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +23 -23
- cdktf_cdktf_provider_upcloud/storage/__init__.py +59 -59
- cdktf_cdktf_provider_upcloud/tag/__init__.py +17 -17
- {cdktf_cdktf_provider_upcloud-14.4.0.dist-info → cdktf_cdktf_provider_upcloud-14.6.0.dist-info}/METADATA +5 -5
- cdktf_cdktf_provider_upcloud-14.6.0.dist-info/RECORD +61 -0
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.4.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-14.4.0.dist-info/RECORD +0 -61
- {cdktf_cdktf_provider_upcloud-14.4.0.dist-info → cdktf_cdktf_provider_upcloud-14.6.0.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-14.4.0.dist-info → cdktf_cdktf_provider_upcloud-14.6.0.dist-info}/WHEEL +0 -0
- {cdktf_cdktf_provider_upcloud-14.4.0.dist-info → cdktf_cdktf_provider_upcloud-14.6.0.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
|
-
'''
|
|
1
|
+
r'''
|
|
2
2
|
# `upcloud_gateway_connection_tunnel`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_gateway_connection_tunnel`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_gateway_connection_tunnel`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -29,7 +29,7 @@ class GatewayConnectionTunnel(
|
|
|
29
29
|
metaclass=jsii.JSIIMeta,
|
|
30
30
|
jsii_type="@cdktf/provider-upcloud.gatewayConnectionTunnel.GatewayConnectionTunnel",
|
|
31
31
|
):
|
|
32
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
32
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel upcloud_gateway_connection_tunnel}.'''
|
|
33
33
|
|
|
34
34
|
def __init__(
|
|
35
35
|
self,
|
|
@@ -51,17 +51,17 @@ class GatewayConnectionTunnel(
|
|
|
51
51
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
52
52
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
53
53
|
) -> None:
|
|
54
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
54
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel upcloud_gateway_connection_tunnel} Resource.
|
|
55
55
|
|
|
56
56
|
:param scope: The scope in which to define this construct.
|
|
57
57
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
58
|
-
:param connection_id: ID of the upcloud_gateway_connection resource to which the tunnel belongs. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
59
|
-
:param ipsec_auth_psk: ipsec_auth_psk block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
60
|
-
:param local_address_name: Public (UpCloud) endpoint address of this tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
61
|
-
:param name: The name of the tunnel, should be unique within the connection. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
62
|
-
:param remote_address: Remote public IP address of the tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
63
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
64
|
-
:param ipsec_properties: ipsec_properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
58
|
+
:param connection_id: ID of the upcloud_gateway_connection resource to which the tunnel belongs. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#connection_id GatewayConnectionTunnel#connection_id}
|
|
59
|
+
:param ipsec_auth_psk: ipsec_auth_psk block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#ipsec_auth_psk GatewayConnectionTunnel#ipsec_auth_psk}
|
|
60
|
+
:param local_address_name: Public (UpCloud) endpoint address of this tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#local_address_name GatewayConnectionTunnel#local_address_name}
|
|
61
|
+
:param name: The name of the tunnel, should be unique within the connection. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#name GatewayConnectionTunnel#name}
|
|
62
|
+
:param remote_address: Remote public IP address of the tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#remote_address GatewayConnectionTunnel#remote_address}
|
|
63
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#id GatewayConnectionTunnel#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
64
|
+
:param ipsec_properties: ipsec_properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#ipsec_properties GatewayConnectionTunnel#ipsec_properties}
|
|
65
65
|
:param connection:
|
|
66
66
|
:param count:
|
|
67
67
|
:param depends_on:
|
|
@@ -106,7 +106,7 @@ class GatewayConnectionTunnel(
|
|
|
106
106
|
|
|
107
107
|
:param scope: The scope in which to define this construct.
|
|
108
108
|
:param import_to_id: The construct id used in the generated config for the GatewayConnectionTunnel to import.
|
|
109
|
-
:param import_from_id: The id of the existing GatewayConnectionTunnel that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
109
|
+
:param import_from_id: The id of the existing GatewayConnectionTunnel that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#import import section} in the documentation of this resource for the id to use
|
|
110
110
|
:param provider: ? Optional instance of the provider where the GatewayConnectionTunnel to import is found.
|
|
111
111
|
'''
|
|
112
112
|
if __debug__:
|
|
@@ -120,7 +120,7 @@ class GatewayConnectionTunnel(
|
|
|
120
120
|
@jsii.member(jsii_name="putIpsecAuthPsk")
|
|
121
121
|
def put_ipsec_auth_psk(self, *, psk: builtins.str) -> None:
|
|
122
122
|
'''
|
|
123
|
-
:param psk: The pre-shared key. This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
123
|
+
:param psk: The pre-shared key. This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#psk GatewayConnectionTunnel#psk}
|
|
124
124
|
'''
|
|
125
125
|
value = GatewayConnectionTunnelIpsecAuthPsk(psk=psk)
|
|
126
126
|
|
|
@@ -143,17 +143,17 @@ class GatewayConnectionTunnel(
|
|
|
143
143
|
rekey_time: typing.Optional[jsii.Number] = None,
|
|
144
144
|
) -> None:
|
|
145
145
|
'''
|
|
146
|
-
:param child_rekey_time: IKE child SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
147
|
-
:param dpd_delay: Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
148
|
-
:param dpd_timeout: Timeout period for DPD reply before considering the peer to be dead, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
149
|
-
:param ike_lifetime: Maximum IKE SA lifetime in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
150
|
-
:param phase1_algorithms: List of Phase 1: Proposal algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
151
|
-
:param phase1_dh_group_numbers: List of Phase 1 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
152
|
-
:param phase1_integrity_algorithms: List of Phase 1 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
153
|
-
:param phase2_algorithms: List of Phase 2: Security Association algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
154
|
-
:param phase2_dh_group_numbers: List of Phase 2 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
155
|
-
:param phase2_integrity_algorithms: List of Phase 2 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
156
|
-
:param rekey_time: IKE SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
146
|
+
:param child_rekey_time: IKE child SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#child_rekey_time GatewayConnectionTunnel#child_rekey_time}
|
|
147
|
+
:param dpd_delay: Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#dpd_delay GatewayConnectionTunnel#dpd_delay}
|
|
148
|
+
:param dpd_timeout: Timeout period for DPD reply before considering the peer to be dead, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#dpd_timeout GatewayConnectionTunnel#dpd_timeout}
|
|
149
|
+
:param ike_lifetime: Maximum IKE SA lifetime in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#ike_lifetime GatewayConnectionTunnel#ike_lifetime}
|
|
150
|
+
:param phase1_algorithms: List of Phase 1: Proposal algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#phase1_algorithms GatewayConnectionTunnel#phase1_algorithms}
|
|
151
|
+
:param phase1_dh_group_numbers: List of Phase 1 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#phase1_dh_group_numbers GatewayConnectionTunnel#phase1_dh_group_numbers}
|
|
152
|
+
:param phase1_integrity_algorithms: List of Phase 1 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#phase1_integrity_algorithms GatewayConnectionTunnel#phase1_integrity_algorithms}
|
|
153
|
+
:param phase2_algorithms: List of Phase 2: Security Association algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#phase2_algorithms GatewayConnectionTunnel#phase2_algorithms}
|
|
154
|
+
:param phase2_dh_group_numbers: List of Phase 2 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#phase2_dh_group_numbers GatewayConnectionTunnel#phase2_dh_group_numbers}
|
|
155
|
+
:param phase2_integrity_algorithms: List of Phase 2 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#phase2_integrity_algorithms GatewayConnectionTunnel#phase2_integrity_algorithms}
|
|
156
|
+
:param rekey_time: IKE SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#rekey_time GatewayConnectionTunnel#rekey_time}
|
|
157
157
|
'''
|
|
158
158
|
value = GatewayConnectionTunnelIpsecProperties(
|
|
159
159
|
child_rekey_time=child_rekey_time,
|
|
@@ -209,6 +209,11 @@ class GatewayConnectionTunnel(
|
|
|
209
209
|
def operational_state(self) -> builtins.str:
|
|
210
210
|
return typing.cast(builtins.str, jsii.get(self, "operationalState"))
|
|
211
211
|
|
|
212
|
+
@builtins.property
|
|
213
|
+
@jsii.member(jsii_name="uuid")
|
|
214
|
+
def uuid(self) -> builtins.str:
|
|
215
|
+
return typing.cast(builtins.str, jsii.get(self, "uuid"))
|
|
216
|
+
|
|
212
217
|
@builtins.property
|
|
213
218
|
@jsii.member(jsii_name="connectionIdInput")
|
|
214
219
|
def connection_id_input(self) -> typing.Optional[builtins.str]:
|
|
@@ -356,13 +361,13 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
356
361
|
:param lifecycle:
|
|
357
362
|
:param provider:
|
|
358
363
|
:param provisioners:
|
|
359
|
-
:param connection_id: ID of the upcloud_gateway_connection resource to which the tunnel belongs. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
360
|
-
:param ipsec_auth_psk: ipsec_auth_psk block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
361
|
-
:param local_address_name: Public (UpCloud) endpoint address of this tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
362
|
-
:param name: The name of the tunnel, should be unique within the connection. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
363
|
-
:param remote_address: Remote public IP address of the tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
364
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
365
|
-
:param ipsec_properties: ipsec_properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
364
|
+
:param connection_id: ID of the upcloud_gateway_connection resource to which the tunnel belongs. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#connection_id GatewayConnectionTunnel#connection_id}
|
|
365
|
+
:param ipsec_auth_psk: ipsec_auth_psk block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#ipsec_auth_psk GatewayConnectionTunnel#ipsec_auth_psk}
|
|
366
|
+
:param local_address_name: Public (UpCloud) endpoint address of this tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#local_address_name GatewayConnectionTunnel#local_address_name}
|
|
367
|
+
:param name: The name of the tunnel, should be unique within the connection. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#name GatewayConnectionTunnel#name}
|
|
368
|
+
:param remote_address: Remote public IP address of the tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#remote_address GatewayConnectionTunnel#remote_address}
|
|
369
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#id GatewayConnectionTunnel#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
370
|
+
:param ipsec_properties: ipsec_properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#ipsec_properties GatewayConnectionTunnel#ipsec_properties}
|
|
366
371
|
'''
|
|
367
372
|
if isinstance(lifecycle, dict):
|
|
368
373
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -480,7 +485,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
480
485
|
def connection_id(self) -> builtins.str:
|
|
481
486
|
'''ID of the upcloud_gateway_connection resource to which the tunnel belongs.
|
|
482
487
|
|
|
483
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
488
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#connection_id GatewayConnectionTunnel#connection_id}
|
|
484
489
|
'''
|
|
485
490
|
result = self._values.get("connection_id")
|
|
486
491
|
assert result is not None, "Required property 'connection_id' is missing"
|
|
@@ -490,7 +495,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
490
495
|
def ipsec_auth_psk(self) -> "GatewayConnectionTunnelIpsecAuthPsk":
|
|
491
496
|
'''ipsec_auth_psk block.
|
|
492
497
|
|
|
493
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
498
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#ipsec_auth_psk GatewayConnectionTunnel#ipsec_auth_psk}
|
|
494
499
|
'''
|
|
495
500
|
result = self._values.get("ipsec_auth_psk")
|
|
496
501
|
assert result is not None, "Required property 'ipsec_auth_psk' is missing"
|
|
@@ -500,7 +505,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
500
505
|
def local_address_name(self) -> builtins.str:
|
|
501
506
|
'''Public (UpCloud) endpoint address of this tunnel.
|
|
502
507
|
|
|
503
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
508
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#local_address_name GatewayConnectionTunnel#local_address_name}
|
|
504
509
|
'''
|
|
505
510
|
result = self._values.get("local_address_name")
|
|
506
511
|
assert result is not None, "Required property 'local_address_name' is missing"
|
|
@@ -510,7 +515,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
510
515
|
def name(self) -> builtins.str:
|
|
511
516
|
'''The name of the tunnel, should be unique within the connection.
|
|
512
517
|
|
|
513
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
518
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#name GatewayConnectionTunnel#name}
|
|
514
519
|
'''
|
|
515
520
|
result = self._values.get("name")
|
|
516
521
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -520,7 +525,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
520
525
|
def remote_address(self) -> builtins.str:
|
|
521
526
|
'''Remote public IP address of the tunnel.
|
|
522
527
|
|
|
523
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
528
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#remote_address GatewayConnectionTunnel#remote_address}
|
|
524
529
|
'''
|
|
525
530
|
result = self._values.get("remote_address")
|
|
526
531
|
assert result is not None, "Required property 'remote_address' is missing"
|
|
@@ -528,7 +533,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
528
533
|
|
|
529
534
|
@builtins.property
|
|
530
535
|
def id(self) -> typing.Optional[builtins.str]:
|
|
531
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
536
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#id GatewayConnectionTunnel#id}.
|
|
532
537
|
|
|
533
538
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
534
539
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -542,7 +547,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
542
547
|
) -> typing.Optional["GatewayConnectionTunnelIpsecProperties"]:
|
|
543
548
|
'''ipsec_properties block.
|
|
544
549
|
|
|
545
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
550
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#ipsec_properties GatewayConnectionTunnel#ipsec_properties}
|
|
546
551
|
'''
|
|
547
552
|
result = self._values.get("ipsec_properties")
|
|
548
553
|
return typing.cast(typing.Optional["GatewayConnectionTunnelIpsecProperties"], result)
|
|
@@ -567,7 +572,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
567
572
|
class GatewayConnectionTunnelIpsecAuthPsk:
|
|
568
573
|
def __init__(self, *, psk: builtins.str) -> None:
|
|
569
574
|
'''
|
|
570
|
-
:param psk: The pre-shared key. This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
575
|
+
:param psk: The pre-shared key. This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#psk GatewayConnectionTunnel#psk}
|
|
571
576
|
'''
|
|
572
577
|
if __debug__:
|
|
573
578
|
type_hints = typing.get_type_hints(_typecheckingstub__87c835e7d7c5605931c1ca38462874908e77d68cd5b951debc157a3d43ca979a)
|
|
@@ -582,7 +587,7 @@ class GatewayConnectionTunnelIpsecAuthPsk:
|
|
|
582
587
|
|
|
583
588
|
This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one.
|
|
584
589
|
|
|
585
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
590
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#psk GatewayConnectionTunnel#psk}
|
|
586
591
|
'''
|
|
587
592
|
result = self._values.get("psk")
|
|
588
593
|
assert result is not None, "Required property 'psk' is missing"
|
|
@@ -687,17 +692,17 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
687
692
|
rekey_time: typing.Optional[jsii.Number] = None,
|
|
688
693
|
) -> None:
|
|
689
694
|
'''
|
|
690
|
-
:param child_rekey_time: IKE child SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
691
|
-
:param dpd_delay: Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
692
|
-
:param dpd_timeout: Timeout period for DPD reply before considering the peer to be dead, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
693
|
-
:param ike_lifetime: Maximum IKE SA lifetime in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
694
|
-
:param phase1_algorithms: List of Phase 1: Proposal algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
695
|
-
:param phase1_dh_group_numbers: List of Phase 1 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
696
|
-
:param phase1_integrity_algorithms: List of Phase 1 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
697
|
-
:param phase2_algorithms: List of Phase 2: Security Association algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
698
|
-
:param phase2_dh_group_numbers: List of Phase 2 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
699
|
-
:param phase2_integrity_algorithms: List of Phase 2 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
700
|
-
:param rekey_time: IKE SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
695
|
+
:param child_rekey_time: IKE child SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#child_rekey_time GatewayConnectionTunnel#child_rekey_time}
|
|
696
|
+
:param dpd_delay: Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#dpd_delay GatewayConnectionTunnel#dpd_delay}
|
|
697
|
+
:param dpd_timeout: Timeout period for DPD reply before considering the peer to be dead, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#dpd_timeout GatewayConnectionTunnel#dpd_timeout}
|
|
698
|
+
:param ike_lifetime: Maximum IKE SA lifetime in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#ike_lifetime GatewayConnectionTunnel#ike_lifetime}
|
|
699
|
+
:param phase1_algorithms: List of Phase 1: Proposal algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#phase1_algorithms GatewayConnectionTunnel#phase1_algorithms}
|
|
700
|
+
:param phase1_dh_group_numbers: List of Phase 1 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#phase1_dh_group_numbers GatewayConnectionTunnel#phase1_dh_group_numbers}
|
|
701
|
+
:param phase1_integrity_algorithms: List of Phase 1 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#phase1_integrity_algorithms GatewayConnectionTunnel#phase1_integrity_algorithms}
|
|
702
|
+
:param phase2_algorithms: List of Phase 2: Security Association algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#phase2_algorithms GatewayConnectionTunnel#phase2_algorithms}
|
|
703
|
+
:param phase2_dh_group_numbers: List of Phase 2 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#phase2_dh_group_numbers GatewayConnectionTunnel#phase2_dh_group_numbers}
|
|
704
|
+
:param phase2_integrity_algorithms: List of Phase 2 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#phase2_integrity_algorithms GatewayConnectionTunnel#phase2_integrity_algorithms}
|
|
705
|
+
:param rekey_time: IKE SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#rekey_time GatewayConnectionTunnel#rekey_time}
|
|
701
706
|
'''
|
|
702
707
|
if __debug__:
|
|
703
708
|
type_hints = typing.get_type_hints(_typecheckingstub__a50b18894047098027d5d6be1b8a41d8e32b22c4297ebea79c281f4c838921f4)
|
|
@@ -740,7 +745,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
740
745
|
def child_rekey_time(self) -> typing.Optional[jsii.Number]:
|
|
741
746
|
'''IKE child SA rekey time in seconds.
|
|
742
747
|
|
|
743
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
748
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#child_rekey_time GatewayConnectionTunnel#child_rekey_time}
|
|
744
749
|
'''
|
|
745
750
|
result = self._values.get("child_rekey_time")
|
|
746
751
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -749,7 +754,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
749
754
|
def dpd_delay(self) -> typing.Optional[jsii.Number]:
|
|
750
755
|
'''Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds.
|
|
751
756
|
|
|
752
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
757
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#dpd_delay GatewayConnectionTunnel#dpd_delay}
|
|
753
758
|
'''
|
|
754
759
|
result = self._values.get("dpd_delay")
|
|
755
760
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -758,7 +763,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
758
763
|
def dpd_timeout(self) -> typing.Optional[jsii.Number]:
|
|
759
764
|
'''Timeout period for DPD reply before considering the peer to be dead, in seconds.
|
|
760
765
|
|
|
761
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
766
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#dpd_timeout GatewayConnectionTunnel#dpd_timeout}
|
|
762
767
|
'''
|
|
763
768
|
result = self._values.get("dpd_timeout")
|
|
764
769
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -767,7 +772,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
767
772
|
def ike_lifetime(self) -> typing.Optional[jsii.Number]:
|
|
768
773
|
'''Maximum IKE SA lifetime in seconds.
|
|
769
774
|
|
|
770
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
775
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#ike_lifetime GatewayConnectionTunnel#ike_lifetime}
|
|
771
776
|
'''
|
|
772
777
|
result = self._values.get("ike_lifetime")
|
|
773
778
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -776,7 +781,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
776
781
|
def phase1_algorithms(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
777
782
|
'''List of Phase 1: Proposal algorithms.
|
|
778
783
|
|
|
779
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
784
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#phase1_algorithms GatewayConnectionTunnel#phase1_algorithms}
|
|
780
785
|
'''
|
|
781
786
|
result = self._values.get("phase1_algorithms")
|
|
782
787
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -785,7 +790,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
785
790
|
def phase1_dh_group_numbers(self) -> typing.Optional[typing.List[jsii.Number]]:
|
|
786
791
|
'''List of Phase 1 Diffie-Hellman group numbers.
|
|
787
792
|
|
|
788
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
793
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#phase1_dh_group_numbers GatewayConnectionTunnel#phase1_dh_group_numbers}
|
|
789
794
|
'''
|
|
790
795
|
result = self._values.get("phase1_dh_group_numbers")
|
|
791
796
|
return typing.cast(typing.Optional[typing.List[jsii.Number]], result)
|
|
@@ -794,7 +799,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
794
799
|
def phase1_integrity_algorithms(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
795
800
|
'''List of Phase 1 integrity algorithms.
|
|
796
801
|
|
|
797
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
802
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#phase1_integrity_algorithms GatewayConnectionTunnel#phase1_integrity_algorithms}
|
|
798
803
|
'''
|
|
799
804
|
result = self._values.get("phase1_integrity_algorithms")
|
|
800
805
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -803,7 +808,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
803
808
|
def phase2_algorithms(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
804
809
|
'''List of Phase 2: Security Association algorithms.
|
|
805
810
|
|
|
806
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
811
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#phase2_algorithms GatewayConnectionTunnel#phase2_algorithms}
|
|
807
812
|
'''
|
|
808
813
|
result = self._values.get("phase2_algorithms")
|
|
809
814
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -812,7 +817,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
812
817
|
def phase2_dh_group_numbers(self) -> typing.Optional[typing.List[jsii.Number]]:
|
|
813
818
|
'''List of Phase 2 Diffie-Hellman group numbers.
|
|
814
819
|
|
|
815
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
820
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#phase2_dh_group_numbers GatewayConnectionTunnel#phase2_dh_group_numbers}
|
|
816
821
|
'''
|
|
817
822
|
result = self._values.get("phase2_dh_group_numbers")
|
|
818
823
|
return typing.cast(typing.Optional[typing.List[jsii.Number]], result)
|
|
@@ -821,7 +826,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
821
826
|
def phase2_integrity_algorithms(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
822
827
|
'''List of Phase 2 integrity algorithms.
|
|
823
828
|
|
|
824
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
829
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#phase2_integrity_algorithms GatewayConnectionTunnel#phase2_integrity_algorithms}
|
|
825
830
|
'''
|
|
826
831
|
result = self._values.get("phase2_integrity_algorithms")
|
|
827
832
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -830,7 +835,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
830
835
|
def rekey_time(self) -> typing.Optional[jsii.Number]:
|
|
831
836
|
'''IKE SA rekey time in seconds.
|
|
832
837
|
|
|
833
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
838
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/gateway_connection_tunnel#rekey_time GatewayConnectionTunnel#rekey_time}
|
|
834
839
|
'''
|
|
835
840
|
result = self._values.get("rekey_time")
|
|
836
841
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -1,7 +1,7 @@
|
|
|
1
|
-
'''
|
|
1
|
+
r'''
|
|
2
2
|
# `upcloud_kubernetes_cluster`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -29,7 +29,7 @@ class KubernetesCluster(
|
|
|
29
29
|
metaclass=jsii.JSIIMeta,
|
|
30
30
|
jsii_type="@cdktf/provider-upcloud.kubernetesCluster.KubernetesCluster",
|
|
31
31
|
):
|
|
32
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
32
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
|
|
33
33
|
|
|
34
34
|
def __init__(
|
|
35
35
|
self,
|
|
@@ -54,20 +54,20 @@ class KubernetesCluster(
|
|
|
54
54
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
55
55
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
56
56
|
) -> None:
|
|
57
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
57
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
|
|
58
58
|
|
|
59
59
|
:param scope: The scope in which to define this construct.
|
|
60
60
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
61
|
-
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
62
|
-
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
63
|
-
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
64
|
-
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
65
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
66
|
-
:param labels: Key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
67
|
-
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
68
|
-
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
69
|
-
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
70
|
-
:param version: Kubernetes version ID, e.g. ``1.27``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
61
|
+
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
62
|
+
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
63
|
+
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
64
|
+
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
65
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#id KubernetesCluster#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
66
|
+
:param labels: Key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
67
|
+
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
68
|
+
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
69
|
+
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
|
|
70
|
+
:param version: Kubernetes version ID, e.g. ``1.27``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
71
71
|
:param connection:
|
|
72
72
|
:param count:
|
|
73
73
|
:param depends_on:
|
|
@@ -115,7 +115,7 @@ class KubernetesCluster(
|
|
|
115
115
|
|
|
116
116
|
:param scope: The scope in which to define this construct.
|
|
117
117
|
:param import_to_id: The construct id used in the generated config for the KubernetesCluster to import.
|
|
118
|
-
:param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
118
|
+
:param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
|
|
119
119
|
:param provider: ? Optional instance of the provider where the KubernetesCluster to import is found.
|
|
120
120
|
'''
|
|
121
121
|
if __debug__:
|
|
@@ -413,16 +413,16 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
413
413
|
:param lifecycle:
|
|
414
414
|
:param provider:
|
|
415
415
|
:param provisioners:
|
|
416
|
-
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
417
|
-
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
418
|
-
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
419
|
-
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
420
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
421
|
-
:param labels: Key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
422
|
-
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
423
|
-
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
424
|
-
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
425
|
-
:param version: Kubernetes version ID, e.g. ``1.27``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
416
|
+
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
417
|
+
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
418
|
+
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
419
|
+
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
420
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#id KubernetesCluster#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
421
|
+
:param labels: Key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
422
|
+
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
423
|
+
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
424
|
+
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
|
|
425
|
+
:param version: Kubernetes version ID, e.g. ``1.27``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
426
426
|
'''
|
|
427
427
|
if isinstance(lifecycle, dict):
|
|
428
428
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -548,7 +548,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
548
548
|
|
|
549
549
|
To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services.
|
|
550
550
|
|
|
551
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
551
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
552
552
|
'''
|
|
553
553
|
result = self._values.get("control_plane_ip_filter")
|
|
554
554
|
assert result is not None, "Required property 'control_plane_ip_filter' is missing"
|
|
@@ -558,7 +558,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
558
558
|
def name(self) -> builtins.str:
|
|
559
559
|
'''Cluster name. Needs to be unique within the account.
|
|
560
560
|
|
|
561
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
561
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
562
562
|
'''
|
|
563
563
|
result = self._values.get("name")
|
|
564
564
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -568,7 +568,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
568
568
|
def network(self) -> builtins.str:
|
|
569
569
|
'''Network ID for the cluster to run in.
|
|
570
570
|
|
|
571
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
571
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
572
572
|
'''
|
|
573
573
|
result = self._values.get("network")
|
|
574
574
|
assert result is not None, "Required property 'network' is missing"
|
|
@@ -578,7 +578,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
578
578
|
def zone(self) -> builtins.str:
|
|
579
579
|
'''Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``.
|
|
580
580
|
|
|
581
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
581
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
582
582
|
'''
|
|
583
583
|
result = self._values.get("zone")
|
|
584
584
|
assert result is not None, "Required property 'zone' is missing"
|
|
@@ -586,7 +586,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
586
586
|
|
|
587
587
|
@builtins.property
|
|
588
588
|
def id(self) -> typing.Optional[builtins.str]:
|
|
589
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
589
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#id KubernetesCluster#id}.
|
|
590
590
|
|
|
591
591
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
592
592
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -598,7 +598,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
598
598
|
def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
|
|
599
599
|
'''Key-value pairs to classify the cluster.
|
|
600
600
|
|
|
601
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
601
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
602
602
|
'''
|
|
603
603
|
result = self._values.get("labels")
|
|
604
604
|
return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
|
|
@@ -609,7 +609,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
609
609
|
|
|
610
610
|
Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``.
|
|
611
611
|
|
|
612
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
612
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
613
613
|
'''
|
|
614
614
|
result = self._values.get("plan")
|
|
615
615
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -620,7 +620,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
620
620
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
621
621
|
'''Enable private node groups. Private node groups requires a network that is routed through NAT gateway.
|
|
622
622
|
|
|
623
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
623
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
624
624
|
'''
|
|
625
625
|
result = self._values.get("private_node_groups")
|
|
626
626
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -629,7 +629,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
629
629
|
def storage_encryption(self) -> typing.Optional[builtins.str]:
|
|
630
630
|
'''Set default storage encryption strategy for all nodes in the cluster.
|
|
631
631
|
|
|
632
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
632
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
|
|
633
633
|
'''
|
|
634
634
|
result = self._values.get("storage_encryption")
|
|
635
635
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -638,7 +638,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
638
638
|
def version(self) -> typing.Optional[builtins.str]:
|
|
639
639
|
'''Kubernetes version ID, e.g. ``1.27``. You can list available version IDs with ``upctl kubernetes versions``.
|
|
640
640
|
|
|
641
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
641
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
642
642
|
'''
|
|
643
643
|
result = self._values.get("version")
|
|
644
644
|
return typing.cast(typing.Optional[builtins.str], result)
|