cdktf-cdktf-provider-upcloud 14.9.0__py3-none-any.whl → 14.10.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.

Files changed (63) hide show
  1. cdktf_cdktf_provider_upcloud/__init__.py +5 -3
  2. cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
  3. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.10.0.jsii.tgz +0 -0
  4. cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +12 -12
  5. cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +12 -12
  6. cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +8 -8
  7. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +32 -32
  8. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +20 -20
  9. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +44 -44
  10. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +32 -32
  11. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +16 -16
  12. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +12 -12
  13. cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +28 -28
  14. cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +32 -32
  15. cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +12 -12
  16. cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +12 -12
  17. cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +8 -8
  18. cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +62 -62
  19. cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +20 -20
  20. cdktf_cdktf_provider_upcloud/gateway/__init__.py +53 -53
  21. cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +54 -54
  22. cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +80 -80
  23. cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +41 -41
  24. cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +271 -176
  25. cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +73 -73
  26. cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +84 -84
  27. cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +27 -70
  28. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +36 -36
  29. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +27 -70
  30. cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +52 -52
  31. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +351 -351
  32. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +27 -70
  33. cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +34 -77
  34. cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +40 -40
  35. cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +36 -36
  36. cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +24 -24
  37. cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +315 -269
  38. cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +2670 -655
  39. cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +511 -417
  40. cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +219 -173
  41. cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +70 -70
  42. cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +49 -49
  43. cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +32 -73
  44. cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +16 -16
  45. cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +20 -20
  46. cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +20 -20
  47. cdktf_cdktf_provider_upcloud/network/__init__.py +50 -50
  48. cdktf_cdktf_provider_upcloud/network_peering/__init__.py +39 -39
  49. cdktf_cdktf_provider_upcloud/object_storage/__init__.py +43 -43
  50. cdktf_cdktf_provider_upcloud/provider/__init__.py +32 -32
  51. cdktf_cdktf_provider_upcloud/router/__init__.py +34 -34
  52. cdktf_cdktf_provider_upcloud/server/__init__.py +220 -220
  53. cdktf_cdktf_provider_upcloud/server_group/__init__.py +25 -25
  54. cdktf_cdktf_provider_upcloud/storage/__init__.py +648 -187
  55. cdktf_cdktf_provider_upcloud/storage_template/__init__.py +463 -0
  56. cdktf_cdktf_provider_upcloud/tag/__init__.py +20 -20
  57. {cdktf_cdktf_provider_upcloud-14.9.0.dist-info → cdktf_cdktf_provider_upcloud-14.10.0.dist-info}/METADATA +9 -9
  58. cdktf_cdktf_provider_upcloud-14.10.0.dist-info/RECORD +62 -0
  59. {cdktf_cdktf_provider_upcloud-14.9.0.dist-info → cdktf_cdktf_provider_upcloud-14.10.0.dist-info}/WHEEL +1 -1
  60. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.9.0.jsii.tgz +0 -0
  61. cdktf_cdktf_provider_upcloud-14.9.0.dist-info/RECORD +0 -61
  62. {cdktf_cdktf_provider_upcloud-14.9.0.dist-info → cdktf_cdktf_provider_upcloud-14.10.0.dist-info}/LICENSE +0 -0
  63. {cdktf_cdktf_provider_upcloud-14.9.0.dist-info → cdktf_cdktf_provider_upcloud-14.10.0.dist-info}/top_level.txt +0 -0
@@ -1,7 +1,7 @@
1
1
  r'''
2
2
  # `data_upcloud_zone`
3
3
 
4
- Refer to the Terraform Registry for docs: [`data_upcloud_zone`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/data-sources/zone).
4
+ Refer to the Terraform Registry for docs: [`data_upcloud_zone`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zone).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -29,7 +29,7 @@ class DataUpcloudZone(
29
29
  metaclass=jsii.JSIIMeta,
30
30
  jsii_type="@cdktf/provider-upcloud.dataUpcloudZone.DataUpcloudZone",
31
31
  ):
32
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/data-sources/zone upcloud_zone}.'''
32
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zone upcloud_zone}.'''
33
33
 
34
34
  def __init__(
35
35
  self,
@@ -46,12 +46,12 @@ class DataUpcloudZone(
46
46
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
47
47
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
48
48
  ) -> None:
49
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/data-sources/zone upcloud_zone} Data Source.
49
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zone upcloud_zone} Data Source.
50
50
 
51
51
  :param scope: The scope in which to define this construct.
52
52
  :param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
53
- :param id: Identifier of the zone. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/data-sources/zone#id DataUpcloudZone#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
54
- :param name: Identifier of the zone. Contains the same value as ``id``. If both ``id`` and ``name`` are set, ``id`` takes precedence. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/data-sources/zone#name DataUpcloudZone#name}
53
+ :param id: Identifier of the zone. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zone#id DataUpcloudZone#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
54
+ :param name: Identifier of the zone. Contains the same value as ``id``. If both ``id`` and ``name`` are set, ``id`` takes precedence. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zone#name DataUpcloudZone#name}
55
55
  :param connection:
56
56
  :param count:
57
57
  :param depends_on:
@@ -91,7 +91,7 @@ class DataUpcloudZone(
91
91
 
92
92
  :param scope: The scope in which to define this construct.
93
93
  :param import_to_id: The construct id used in the generated config for the DataUpcloudZone to import.
94
- :param import_from_id: The id of the existing DataUpcloudZone that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/data-sources/zone#import import section} in the documentation of this resource for the id to use
94
+ :param import_from_id: The id of the existing DataUpcloudZone that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zone#import import section} in the documentation of this resource for the id to use
95
95
  :param provider: ? Optional instance of the provider where the DataUpcloudZone to import is found.
96
96
  '''
97
97
  if __debug__:
@@ -158,7 +158,7 @@ class DataUpcloudZone(
158
158
  if __debug__:
159
159
  type_hints = typing.get_type_hints(_typecheckingstub__51db402eb935265a629c882efd0c87ea881b185d6142ff68da2d4ca392d51265)
160
160
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
161
- jsii.set(self, "id", value)
161
+ jsii.set(self, "id", value) # pyright: ignore[reportArgumentType]
162
162
 
163
163
  @builtins.property
164
164
  @jsii.member(jsii_name="name")
@@ -170,7 +170,7 @@ class DataUpcloudZone(
170
170
  if __debug__:
171
171
  type_hints = typing.get_type_hints(_typecheckingstub__f07d349386c24c8ff423cc6d4eabea7c2bc9d28e100eb15d4be91e779fc328cf)
172
172
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
173
- jsii.set(self, "name", value)
173
+ jsii.set(self, "name", value) # pyright: ignore[reportArgumentType]
174
174
 
175
175
 
176
176
  @jsii.data_type(
@@ -210,8 +210,8 @@ class DataUpcloudZoneConfig(_cdktf_9a9027ec.TerraformMetaArguments):
210
210
  :param lifecycle:
211
211
  :param provider:
212
212
  :param provisioners:
213
- :param id: Identifier of the zone. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/data-sources/zone#id DataUpcloudZone#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
214
- :param name: Identifier of the zone. Contains the same value as ``id``. If both ``id`` and ``name`` are set, ``id`` takes precedence. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/data-sources/zone#name DataUpcloudZone#name}
213
+ :param id: Identifier of the zone. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zone#id DataUpcloudZone#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
214
+ :param name: Identifier of the zone. Contains the same value as ``id``. If both ``id`` and ``name`` are set, ``id`` takes precedence. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zone#name DataUpcloudZone#name}
215
215
  '''
216
216
  if isinstance(lifecycle, dict):
217
217
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -314,7 +314,7 @@ class DataUpcloudZoneConfig(_cdktf_9a9027ec.TerraformMetaArguments):
314
314
  def id(self) -> typing.Optional[builtins.str]:
315
315
  '''Identifier of the zone.
316
316
 
317
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/data-sources/zone#id DataUpcloudZone#id}
317
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zone#id DataUpcloudZone#id}
318
318
 
319
319
  Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
320
320
  If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -328,7 +328,7 @@ class DataUpcloudZoneConfig(_cdktf_9a9027ec.TerraformMetaArguments):
328
328
 
329
329
  Contains the same value as ``id``. If both ``id`` and ``name`` are set, ``id`` takes precedence.
330
330
 
331
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/data-sources/zone#name DataUpcloudZone#name}
331
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zone#name DataUpcloudZone#name}
332
332
  '''
333
333
  result = self._values.get("name")
334
334
  return typing.cast(typing.Optional[builtins.str], result)
@@ -1,7 +1,7 @@
1
1
  r'''
2
2
  # `data_upcloud_zones`
3
3
 
4
- Refer to the Terraform Registry for docs: [`data_upcloud_zones`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/data-sources/zones).
4
+ Refer to the Terraform Registry for docs: [`data_upcloud_zones`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zones).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -29,7 +29,7 @@ class DataUpcloudZones(
29
29
  metaclass=jsii.JSIIMeta,
30
30
  jsii_type="@cdktf/provider-upcloud.dataUpcloudZones.DataUpcloudZones",
31
31
  ):
32
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/data-sources/zones upcloud_zones}.'''
32
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zones upcloud_zones}.'''
33
33
 
34
34
  def __init__(
35
35
  self,
@@ -45,11 +45,11 @@ class DataUpcloudZones(
45
45
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
46
46
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
47
47
  ) -> None:
48
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/data-sources/zones upcloud_zones} Data Source.
48
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zones upcloud_zones} Data Source.
49
49
 
50
50
  :param scope: The scope in which to define this construct.
51
51
  :param id: The scoped construct ID. Must be unique amongst siblings in the same scope
52
- :param filter_type: Filter zones by type. Possible values are "all", "public" and "private". Default is "public". Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/data-sources/zones#filter_type DataUpcloudZones#filter_type}
52
+ :param filter_type: Filter zones by type. Possible values are "all", "public" and "private". Default is "public". Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zones#filter_type DataUpcloudZones#filter_type}
53
53
  :param connection:
54
54
  :param count:
55
55
  :param depends_on:
@@ -88,7 +88,7 @@ class DataUpcloudZones(
88
88
 
89
89
  :param scope: The scope in which to define this construct.
90
90
  :param import_to_id: The construct id used in the generated config for the DataUpcloudZones to import.
91
- :param import_from_id: The id of the existing DataUpcloudZones that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/data-sources/zones#import import section} in the documentation of this resource for the id to use
91
+ :param import_from_id: The id of the existing DataUpcloudZones that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zones#import import section} in the documentation of this resource for the id to use
92
92
  :param provider: ? Optional instance of the provider where the DataUpcloudZones to import is found.
93
93
  '''
94
94
  if __debug__:
@@ -141,7 +141,7 @@ class DataUpcloudZones(
141
141
  if __debug__:
142
142
  type_hints = typing.get_type_hints(_typecheckingstub__b34ebe3d44f243cf49fe377a365d9dc4f4d014c9ca8a2b3c0581e65b7b0786f8)
143
143
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
144
- jsii.set(self, "filterType", value)
144
+ jsii.set(self, "filterType", value) # pyright: ignore[reportArgumentType]
145
145
 
146
146
 
147
147
  @jsii.data_type(
@@ -179,7 +179,7 @@ class DataUpcloudZonesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
179
179
  :param lifecycle:
180
180
  :param provider:
181
181
  :param provisioners:
182
- :param filter_type: Filter zones by type. Possible values are "all", "public" and "private". Default is "public". Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/data-sources/zones#filter_type DataUpcloudZones#filter_type}
182
+ :param filter_type: Filter zones by type. Possible values are "all", "public" and "private". Default is "public". Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zones#filter_type DataUpcloudZones#filter_type}
183
183
  '''
184
184
  if isinstance(lifecycle, dict):
185
185
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -279,7 +279,7 @@ class DataUpcloudZonesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
279
279
  def filter_type(self) -> typing.Optional[builtins.str]:
280
280
  '''Filter zones by type. Possible values are "all", "public" and "private". Default is "public".
281
281
 
282
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/data-sources/zones#filter_type DataUpcloudZones#filter_type}
282
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zones#filter_type DataUpcloudZones#filter_type}
283
283
  '''
284
284
  result = self._values.get("filter_type")
285
285
  return typing.cast(typing.Optional[builtins.str], result)
@@ -1,7 +1,7 @@
1
1
  r'''
2
2
  # `upcloud_firewall_rules`
3
3
 
4
- Refer to the Terraform Registry for docs: [`upcloud_firewall_rules`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules).
4
+ Refer to the Terraform Registry for docs: [`upcloud_firewall_rules`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -29,7 +29,7 @@ class FirewallRules(
29
29
  metaclass=jsii.JSIIMeta,
30
30
  jsii_type="@cdktf/provider-upcloud.firewallRules.FirewallRules",
31
31
  ):
32
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules upcloud_firewall_rules}.'''
32
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules upcloud_firewall_rules}.'''
33
33
 
34
34
  def __init__(
35
35
  self,
@@ -47,13 +47,13 @@ class FirewallRules(
47
47
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
48
48
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
49
49
  ) -> None:
50
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules upcloud_firewall_rules} Resource.
50
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules upcloud_firewall_rules} Resource.
51
51
 
52
52
  :param scope: The scope in which to define this construct.
53
53
  :param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
54
- :param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
55
- :param server_id: The unique id of the server to be protected the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
56
- :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#id FirewallRules#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
54
+ :param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
55
+ :param server_id: The unique id of the server to be protected the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
56
+ :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#id FirewallRules#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
57
57
  :param connection:
58
58
  :param count:
59
59
  :param depends_on:
@@ -94,7 +94,7 @@ class FirewallRules(
94
94
 
95
95
  :param scope: The scope in which to define this construct.
96
96
  :param import_to_id: The construct id used in the generated config for the FirewallRules to import.
97
- :param import_from_id: The id of the existing FirewallRules that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#import import section} in the documentation of this resource for the id to use
97
+ :param import_from_id: The id of the existing FirewallRules that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#import import section} in the documentation of this resource for the id to use
98
98
  :param provider: ? Optional instance of the provider where the FirewallRules to import is found.
99
99
  '''
100
100
  if __debug__:
@@ -167,7 +167,7 @@ class FirewallRules(
167
167
  if __debug__:
168
168
  type_hints = typing.get_type_hints(_typecheckingstub__c5b4186580649c1167af5344e5016a17428872cece6b2e01cd0eb7db97a7aa0e)
169
169
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
170
- jsii.set(self, "id", value)
170
+ jsii.set(self, "id", value) # pyright: ignore[reportArgumentType]
171
171
 
172
172
  @builtins.property
173
173
  @jsii.member(jsii_name="serverId")
@@ -179,7 +179,7 @@ class FirewallRules(
179
179
  if __debug__:
180
180
  type_hints = typing.get_type_hints(_typecheckingstub__58d36060cbaa53ac44e8eee4a67ae3fb2b894aa4b92b5809a705a5d3073ea15f)
181
181
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
182
- jsii.set(self, "serverId", value)
182
+ jsii.set(self, "serverId", value) # pyright: ignore[reportArgumentType]
183
183
 
184
184
 
185
185
  @jsii.data_type(
@@ -221,9 +221,9 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
221
221
  :param lifecycle:
222
222
  :param provider:
223
223
  :param provisioners:
224
- :param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
225
- :param server_id: The unique id of the server to be protected the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
226
- :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#id FirewallRules#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
224
+ :param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
225
+ :param server_id: The unique id of the server to be protected the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
226
+ :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#id FirewallRules#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
227
227
  '''
228
228
  if isinstance(lifecycle, dict):
229
229
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -330,7 +330,7 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
330
330
  ) -> typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]]:
331
331
  '''firewall_rule block.
332
332
 
333
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
333
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
334
334
  '''
335
335
  result = self._values.get("firewall_rule")
336
336
  assert result is not None, "Required property 'firewall_rule' is missing"
@@ -340,7 +340,7 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
340
340
  def server_id(self) -> builtins.str:
341
341
  '''The unique id of the server to be protected the firewall rules.
342
342
 
343
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
343
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
344
344
  '''
345
345
  result = self._values.get("server_id")
346
346
  assert result is not None, "Required property 'server_id' is missing"
@@ -348,7 +348,7 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
348
348
 
349
349
  @builtins.property
350
350
  def id(self) -> typing.Optional[builtins.str]:
351
- '''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#id FirewallRules#id}.
351
+ '''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#id FirewallRules#id}.
352
352
 
353
353
  Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
354
354
  If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -408,20 +408,20 @@ class FirewallRulesFirewallRule:
408
408
  source_port_start: typing.Optional[builtins.str] = None,
409
409
  ) -> None:
410
410
  '''
411
- :param action: Action to take if the rule conditions are met. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#action FirewallRules#action}
412
- :param direction: The direction of network traffic this rule will be applied to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#direction FirewallRules#direction}
413
- :param comment: Freeform comment string for the rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#comment FirewallRules#comment}
414
- :param destination_address_end: The destination address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
415
- :param destination_address_start: The destination address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
416
- :param destination_port_end: The destination port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
417
- :param destination_port_start: The destination port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
418
- :param family: The address family of new firewall rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#family FirewallRules#family}
419
- :param icmp_type: The ICMP type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
420
- :param protocol: The protocol this rule will be applied to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#protocol FirewallRules#protocol}
421
- :param source_address_end: The source address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
422
- :param source_address_start: The source address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
423
- :param source_port_end: The source port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
424
- :param source_port_start: The source port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
411
+ :param action: Action to take if the rule conditions are met. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#action FirewallRules#action}
412
+ :param direction: The direction of network traffic this rule will be applied to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#direction FirewallRules#direction}
413
+ :param comment: Freeform comment string for the rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#comment FirewallRules#comment}
414
+ :param destination_address_end: The destination address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
415
+ :param destination_address_start: The destination address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
416
+ :param destination_port_end: The destination port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
417
+ :param destination_port_start: The destination port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
418
+ :param family: The address family of new firewall rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#family FirewallRules#family}
419
+ :param icmp_type: The ICMP type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
420
+ :param protocol: The protocol this rule will be applied to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#protocol FirewallRules#protocol}
421
+ :param source_address_end: The source address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
422
+ :param source_address_start: The source address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
423
+ :param source_port_end: The source port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
424
+ :param source_port_start: The source port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
425
425
  '''
426
426
  if __debug__:
427
427
  type_hints = typing.get_type_hints(_typecheckingstub__9b77e978fb66d25b46f06da19493b15c4f42527dec58b7335729cf86141901af)
@@ -472,7 +472,7 @@ class FirewallRulesFirewallRule:
472
472
  def action(self) -> builtins.str:
473
473
  '''Action to take if the rule conditions are met.
474
474
 
475
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#action FirewallRules#action}
475
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#action FirewallRules#action}
476
476
  '''
477
477
  result = self._values.get("action")
478
478
  assert result is not None, "Required property 'action' is missing"
@@ -482,7 +482,7 @@ class FirewallRulesFirewallRule:
482
482
  def direction(self) -> builtins.str:
483
483
  '''The direction of network traffic this rule will be applied to.
484
484
 
485
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#direction FirewallRules#direction}
485
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#direction FirewallRules#direction}
486
486
  '''
487
487
  result = self._values.get("direction")
488
488
  assert result is not None, "Required property 'direction' is missing"
@@ -492,7 +492,7 @@ class FirewallRulesFirewallRule:
492
492
  def comment(self) -> typing.Optional[builtins.str]:
493
493
  '''Freeform comment string for the rule.
494
494
 
495
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#comment FirewallRules#comment}
495
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#comment FirewallRules#comment}
496
496
  '''
497
497
  result = self._values.get("comment")
498
498
  return typing.cast(typing.Optional[builtins.str], result)
@@ -501,7 +501,7 @@ class FirewallRulesFirewallRule:
501
501
  def destination_address_end(self) -> typing.Optional[builtins.str]:
502
502
  '''The destination address range ends from this address.
503
503
 
504
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
504
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
505
505
  '''
506
506
  result = self._values.get("destination_address_end")
507
507
  return typing.cast(typing.Optional[builtins.str], result)
@@ -510,7 +510,7 @@ class FirewallRulesFirewallRule:
510
510
  def destination_address_start(self) -> typing.Optional[builtins.str]:
511
511
  '''The destination address range starts from this address.
512
512
 
513
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
513
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
514
514
  '''
515
515
  result = self._values.get("destination_address_start")
516
516
  return typing.cast(typing.Optional[builtins.str], result)
@@ -519,7 +519,7 @@ class FirewallRulesFirewallRule:
519
519
  def destination_port_end(self) -> typing.Optional[builtins.str]:
520
520
  '''The destination port range ends from this port number.
521
521
 
522
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
522
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
523
523
  '''
524
524
  result = self._values.get("destination_port_end")
525
525
  return typing.cast(typing.Optional[builtins.str], result)
@@ -528,7 +528,7 @@ class FirewallRulesFirewallRule:
528
528
  def destination_port_start(self) -> typing.Optional[builtins.str]:
529
529
  '''The destination port range starts from this port number.
530
530
 
531
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
531
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
532
532
  '''
533
533
  result = self._values.get("destination_port_start")
534
534
  return typing.cast(typing.Optional[builtins.str], result)
@@ -537,7 +537,7 @@ class FirewallRulesFirewallRule:
537
537
  def family(self) -> typing.Optional[builtins.str]:
538
538
  '''The address family of new firewall rule.
539
539
 
540
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#family FirewallRules#family}
540
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#family FirewallRules#family}
541
541
  '''
542
542
  result = self._values.get("family")
543
543
  return typing.cast(typing.Optional[builtins.str], result)
@@ -546,7 +546,7 @@ class FirewallRulesFirewallRule:
546
546
  def icmp_type(self) -> typing.Optional[builtins.str]:
547
547
  '''The ICMP type.
548
548
 
549
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
549
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
550
550
  '''
551
551
  result = self._values.get("icmp_type")
552
552
  return typing.cast(typing.Optional[builtins.str], result)
@@ -555,7 +555,7 @@ class FirewallRulesFirewallRule:
555
555
  def protocol(self) -> typing.Optional[builtins.str]:
556
556
  '''The protocol this rule will be applied to.
557
557
 
558
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#protocol FirewallRules#protocol}
558
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#protocol FirewallRules#protocol}
559
559
  '''
560
560
  result = self._values.get("protocol")
561
561
  return typing.cast(typing.Optional[builtins.str], result)
@@ -564,7 +564,7 @@ class FirewallRulesFirewallRule:
564
564
  def source_address_end(self) -> typing.Optional[builtins.str]:
565
565
  '''The source address range ends from this address.
566
566
 
567
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
567
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
568
568
  '''
569
569
  result = self._values.get("source_address_end")
570
570
  return typing.cast(typing.Optional[builtins.str], result)
@@ -573,7 +573,7 @@ class FirewallRulesFirewallRule:
573
573
  def source_address_start(self) -> typing.Optional[builtins.str]:
574
574
  '''The source address range starts from this address.
575
575
 
576
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
576
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
577
577
  '''
578
578
  result = self._values.get("source_address_start")
579
579
  return typing.cast(typing.Optional[builtins.str], result)
@@ -582,7 +582,7 @@ class FirewallRulesFirewallRule:
582
582
  def source_port_end(self) -> typing.Optional[builtins.str]:
583
583
  '''The source port range ends from this port number.
584
584
 
585
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
585
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
586
586
  '''
587
587
  result = self._values.get("source_port_end")
588
588
  return typing.cast(typing.Optional[builtins.str], result)
@@ -591,7 +591,7 @@ class FirewallRulesFirewallRule:
591
591
  def source_port_start(self) -> typing.Optional[builtins.str]:
592
592
  '''The source port range starts from this port number.
593
593
 
594
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
594
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
595
595
  '''
596
596
  result = self._values.get("source_port_start")
597
597
  return typing.cast(typing.Optional[builtins.str], result)
@@ -652,7 +652,7 @@ class FirewallRulesFirewallRuleList(
652
652
  if __debug__:
653
653
  type_hints = typing.get_type_hints(_typecheckingstub__b8c0667b5246b36656b65a0197f71b1be7dd4913264b18a8f964bb03d46e0f31)
654
654
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
655
- jsii.set(self, "terraformAttribute", value)
655
+ jsii.set(self, "terraformAttribute", value) # pyright: ignore[reportArgumentType]
656
656
 
657
657
  @builtins.property
658
658
  @jsii.member(jsii_name="terraformResource")
@@ -665,7 +665,7 @@ class FirewallRulesFirewallRuleList(
665
665
  if __debug__:
666
666
  type_hints = typing.get_type_hints(_typecheckingstub__2f485ce2be519a06464be51456be1a6082db33afb0dc146c5295a7ce6327267a)
667
667
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
668
- jsii.set(self, "terraformResource", value)
668
+ jsii.set(self, "terraformResource", value) # pyright: ignore[reportArgumentType]
669
669
 
670
670
  @builtins.property
671
671
  @jsii.member(jsii_name="wrapsSet")
@@ -678,7 +678,7 @@ class FirewallRulesFirewallRuleList(
678
678
  if __debug__:
679
679
  type_hints = typing.get_type_hints(_typecheckingstub__b5ed2e7c1ca8241abef1bcdfd639eda4a1c8b13b12614419551aba8da56714d1)
680
680
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
681
- jsii.set(self, "wrapsSet", value)
681
+ jsii.set(self, "wrapsSet", value) # pyright: ignore[reportArgumentType]
682
682
 
683
683
  @builtins.property
684
684
  @jsii.member(jsii_name="internalValue")
@@ -695,7 +695,7 @@ class FirewallRulesFirewallRuleList(
695
695
  if __debug__:
696
696
  type_hints = typing.get_type_hints(_typecheckingstub__86aa44126bbd5ae12ad54058822b7caba978de31968f8df12c8a012a7642896c)
697
697
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
698
- jsii.set(self, "internalValue", value)
698
+ jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
699
699
 
700
700
 
701
701
  class FirewallRulesFirewallRuleOutputReference(
@@ -852,7 +852,7 @@ class FirewallRulesFirewallRuleOutputReference(
852
852
  if __debug__:
853
853
  type_hints = typing.get_type_hints(_typecheckingstub__cf5d77e9b808a5b2988f3a6654c3e9139819ac431e2f95c9e5cff41dde9c5f94)
854
854
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
855
- jsii.set(self, "action", value)
855
+ jsii.set(self, "action", value) # pyright: ignore[reportArgumentType]
856
856
 
857
857
  @builtins.property
858
858
  @jsii.member(jsii_name="comment")
@@ -864,7 +864,7 @@ class FirewallRulesFirewallRuleOutputReference(
864
864
  if __debug__:
865
865
  type_hints = typing.get_type_hints(_typecheckingstub__7b91f92cb088fa23c430b161883c5372b64c80e7695a5dc0d56709ff8b250595)
866
866
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
867
- jsii.set(self, "comment", value)
867
+ jsii.set(self, "comment", value) # pyright: ignore[reportArgumentType]
868
868
 
869
869
  @builtins.property
870
870
  @jsii.member(jsii_name="destinationAddressEnd")
@@ -876,7 +876,7 @@ class FirewallRulesFirewallRuleOutputReference(
876
876
  if __debug__:
877
877
  type_hints = typing.get_type_hints(_typecheckingstub__0f7eb292b90d80a698dd8379cf4a1b7720cbb26f3218dd2c5628a524de2c37d0)
878
878
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
879
- jsii.set(self, "destinationAddressEnd", value)
879
+ jsii.set(self, "destinationAddressEnd", value) # pyright: ignore[reportArgumentType]
880
880
 
881
881
  @builtins.property
882
882
  @jsii.member(jsii_name="destinationAddressStart")
@@ -888,7 +888,7 @@ class FirewallRulesFirewallRuleOutputReference(
888
888
  if __debug__:
889
889
  type_hints = typing.get_type_hints(_typecheckingstub__20587ec84eb611c98035fea7ea314b6143d56185b4a64fbc8230a2c4a0fbafa2)
890
890
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
891
- jsii.set(self, "destinationAddressStart", value)
891
+ jsii.set(self, "destinationAddressStart", value) # pyright: ignore[reportArgumentType]
892
892
 
893
893
  @builtins.property
894
894
  @jsii.member(jsii_name="destinationPortEnd")
@@ -900,7 +900,7 @@ class FirewallRulesFirewallRuleOutputReference(
900
900
  if __debug__:
901
901
  type_hints = typing.get_type_hints(_typecheckingstub__dabf172600ce549d515b972b8ea8e7805bd96e407de84a02cf2fceff3f8c3a83)
902
902
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
903
- jsii.set(self, "destinationPortEnd", value)
903
+ jsii.set(self, "destinationPortEnd", value) # pyright: ignore[reportArgumentType]
904
904
 
905
905
  @builtins.property
906
906
  @jsii.member(jsii_name="destinationPortStart")
@@ -912,7 +912,7 @@ class FirewallRulesFirewallRuleOutputReference(
912
912
  if __debug__:
913
913
  type_hints = typing.get_type_hints(_typecheckingstub__0d88e34c4e91fb7cdbc15f89e46e2e94fff59570bf5406589c1a3e23f26b49b6)
914
914
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
915
- jsii.set(self, "destinationPortStart", value)
915
+ jsii.set(self, "destinationPortStart", value) # pyright: ignore[reportArgumentType]
916
916
 
917
917
  @builtins.property
918
918
  @jsii.member(jsii_name="direction")
@@ -924,7 +924,7 @@ class FirewallRulesFirewallRuleOutputReference(
924
924
  if __debug__:
925
925
  type_hints = typing.get_type_hints(_typecheckingstub__532bebe01b1fe3ad35f6fecfcb8b05d23ff4766c67436324b523c33c46172fd1)
926
926
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
927
- jsii.set(self, "direction", value)
927
+ jsii.set(self, "direction", value) # pyright: ignore[reportArgumentType]
928
928
 
929
929
  @builtins.property
930
930
  @jsii.member(jsii_name="family")
@@ -936,7 +936,7 @@ class FirewallRulesFirewallRuleOutputReference(
936
936
  if __debug__:
937
937
  type_hints = typing.get_type_hints(_typecheckingstub__bc82326e5f373043d64665f6c6a8a3cf83c2b0bedc6592edef0116bf89ced524)
938
938
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
939
- jsii.set(self, "family", value)
939
+ jsii.set(self, "family", value) # pyright: ignore[reportArgumentType]
940
940
 
941
941
  @builtins.property
942
942
  @jsii.member(jsii_name="icmpType")
@@ -948,7 +948,7 @@ class FirewallRulesFirewallRuleOutputReference(
948
948
  if __debug__:
949
949
  type_hints = typing.get_type_hints(_typecheckingstub__7c98da5a7a41b0a2eb46eaa7d3a966c5f1f56dfa2c275c6ba075aeffa7383fc3)
950
950
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
951
- jsii.set(self, "icmpType", value)
951
+ jsii.set(self, "icmpType", value) # pyright: ignore[reportArgumentType]
952
952
 
953
953
  @builtins.property
954
954
  @jsii.member(jsii_name="protocol")
@@ -960,7 +960,7 @@ class FirewallRulesFirewallRuleOutputReference(
960
960
  if __debug__:
961
961
  type_hints = typing.get_type_hints(_typecheckingstub__90dd48388c4582e71016f824db682a0e6badaaa68192d2f75fd11df31454bcec)
962
962
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
963
- jsii.set(self, "protocol", value)
963
+ jsii.set(self, "protocol", value) # pyright: ignore[reportArgumentType]
964
964
 
965
965
  @builtins.property
966
966
  @jsii.member(jsii_name="sourceAddressEnd")
@@ -972,7 +972,7 @@ class FirewallRulesFirewallRuleOutputReference(
972
972
  if __debug__:
973
973
  type_hints = typing.get_type_hints(_typecheckingstub__64e12a12a20cdee9fd9c4ab584665fd7d2c5e0ef17a986482ca1ffc3ccd2e8d5)
974
974
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
975
- jsii.set(self, "sourceAddressEnd", value)
975
+ jsii.set(self, "sourceAddressEnd", value) # pyright: ignore[reportArgumentType]
976
976
 
977
977
  @builtins.property
978
978
  @jsii.member(jsii_name="sourceAddressStart")
@@ -984,7 +984,7 @@ class FirewallRulesFirewallRuleOutputReference(
984
984
  if __debug__:
985
985
  type_hints = typing.get_type_hints(_typecheckingstub__65e8b63f6139968901f5dd1be0e577d5020648bf37a8cfc699f60b84ec4f1925)
986
986
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
987
- jsii.set(self, "sourceAddressStart", value)
987
+ jsii.set(self, "sourceAddressStart", value) # pyright: ignore[reportArgumentType]
988
988
 
989
989
  @builtins.property
990
990
  @jsii.member(jsii_name="sourcePortEnd")
@@ -996,7 +996,7 @@ class FirewallRulesFirewallRuleOutputReference(
996
996
  if __debug__:
997
997
  type_hints = typing.get_type_hints(_typecheckingstub__49eacef077b5828707589d620d969195fb255d20caf3d33a2091f58f3d299733)
998
998
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
999
- jsii.set(self, "sourcePortEnd", value)
999
+ jsii.set(self, "sourcePortEnd", value) # pyright: ignore[reportArgumentType]
1000
1000
 
1001
1001
  @builtins.property
1002
1002
  @jsii.member(jsii_name="sourcePortStart")
@@ -1008,7 +1008,7 @@ class FirewallRulesFirewallRuleOutputReference(
1008
1008
  if __debug__:
1009
1009
  type_hints = typing.get_type_hints(_typecheckingstub__b4e448528c042dda5a3679431eace4acbc8a79820637256ca64a7cb946c21d9f)
1010
1010
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1011
- jsii.set(self, "sourcePortStart", value)
1011
+ jsii.set(self, "sourcePortStart", value) # pyright: ignore[reportArgumentType]
1012
1012
 
1013
1013
  @builtins.property
1014
1014
  @jsii.member(jsii_name="internalValue")
@@ -1025,7 +1025,7 @@ class FirewallRulesFirewallRuleOutputReference(
1025
1025
  if __debug__:
1026
1026
  type_hints = typing.get_type_hints(_typecheckingstub__caf76bc209bb05575c5fe33f2a065f78e22a3cad53fce656b4371ab3233464d7)
1027
1027
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1028
- jsii.set(self, "internalValue", value)
1028
+ jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
1029
1029
 
1030
1030
 
1031
1031
  __all__ = [