cdktf-cdktf-provider-upcloud 14.9.0__py3-none-any.whl → 14.10.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +5 -3
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.10.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +8 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +44 -44
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +8 -8
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +62 -62
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +53 -53
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +54 -54
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +80 -80
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +41 -41
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +271 -176
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +73 -73
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +84 -84
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +27 -70
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +36 -36
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +27 -70
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +52 -52
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +351 -351
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +27 -70
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +34 -77
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +40 -40
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +36 -36
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +24 -24
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +315 -269
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +2670 -655
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +511 -417
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +219 -173
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +70 -70
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +49 -49
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +32 -73
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/network/__init__.py +50 -50
- cdktf_cdktf_provider_upcloud/network_peering/__init__.py +39 -39
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +43 -43
- cdktf_cdktf_provider_upcloud/provider/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/router/__init__.py +34 -34
- cdktf_cdktf_provider_upcloud/server/__init__.py +220 -220
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/storage/__init__.py +648 -187
- cdktf_cdktf_provider_upcloud/storage_template/__init__.py +463 -0
- cdktf_cdktf_provider_upcloud/tag/__init__.py +20 -20
- {cdktf_cdktf_provider_upcloud-14.9.0.dist-info → cdktf_cdktf_provider_upcloud-14.10.0.dist-info}/METADATA +9 -9
- cdktf_cdktf_provider_upcloud-14.10.0.dist-info/RECORD +62 -0
- {cdktf_cdktf_provider_upcloud-14.9.0.dist-info → cdktf_cdktf_provider_upcloud-14.10.0.dist-info}/WHEEL +1 -1
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.9.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-14.9.0.dist-info/RECORD +0 -61
- {cdktf_cdktf_provider_upcloud-14.9.0.dist-info → cdktf_cdktf_provider_upcloud-14.10.0.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-14.9.0.dist-info → cdktf_cdktf_provider_upcloud-14.10.0.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `data_upcloud_zone`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`data_upcloud_zone`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`data_upcloud_zone`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zone).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -29,7 +29,7 @@ class DataUpcloudZone(
|
|
|
29
29
|
metaclass=jsii.JSIIMeta,
|
|
30
30
|
jsii_type="@cdktf/provider-upcloud.dataUpcloudZone.DataUpcloudZone",
|
|
31
31
|
):
|
|
32
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
32
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zone upcloud_zone}.'''
|
|
33
33
|
|
|
34
34
|
def __init__(
|
|
35
35
|
self,
|
|
@@ -46,12 +46,12 @@ class DataUpcloudZone(
|
|
|
46
46
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
47
47
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
48
48
|
) -> None:
|
|
49
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
49
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zone upcloud_zone} Data Source.
|
|
50
50
|
|
|
51
51
|
:param scope: The scope in which to define this construct.
|
|
52
52
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
53
|
-
:param id: Identifier of the zone. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
54
|
-
:param name: Identifier of the zone. Contains the same value as ``id``. If both ``id`` and ``name`` are set, ``id`` takes precedence. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
53
|
+
:param id: Identifier of the zone. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zone#id DataUpcloudZone#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
54
|
+
:param name: Identifier of the zone. Contains the same value as ``id``. If both ``id`` and ``name`` are set, ``id`` takes precedence. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zone#name DataUpcloudZone#name}
|
|
55
55
|
:param connection:
|
|
56
56
|
:param count:
|
|
57
57
|
:param depends_on:
|
|
@@ -91,7 +91,7 @@ class DataUpcloudZone(
|
|
|
91
91
|
|
|
92
92
|
:param scope: The scope in which to define this construct.
|
|
93
93
|
:param import_to_id: The construct id used in the generated config for the DataUpcloudZone to import.
|
|
94
|
-
:param import_from_id: The id of the existing DataUpcloudZone that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
94
|
+
:param import_from_id: The id of the existing DataUpcloudZone that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zone#import import section} in the documentation of this resource for the id to use
|
|
95
95
|
:param provider: ? Optional instance of the provider where the DataUpcloudZone to import is found.
|
|
96
96
|
'''
|
|
97
97
|
if __debug__:
|
|
@@ -158,7 +158,7 @@ class DataUpcloudZone(
|
|
|
158
158
|
if __debug__:
|
|
159
159
|
type_hints = typing.get_type_hints(_typecheckingstub__51db402eb935265a629c882efd0c87ea881b185d6142ff68da2d4ca392d51265)
|
|
160
160
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
161
|
-
jsii.set(self, "id", value)
|
|
161
|
+
jsii.set(self, "id", value) # pyright: ignore[reportArgumentType]
|
|
162
162
|
|
|
163
163
|
@builtins.property
|
|
164
164
|
@jsii.member(jsii_name="name")
|
|
@@ -170,7 +170,7 @@ class DataUpcloudZone(
|
|
|
170
170
|
if __debug__:
|
|
171
171
|
type_hints = typing.get_type_hints(_typecheckingstub__f07d349386c24c8ff423cc6d4eabea7c2bc9d28e100eb15d4be91e779fc328cf)
|
|
172
172
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
173
|
-
jsii.set(self, "name", value)
|
|
173
|
+
jsii.set(self, "name", value) # pyright: ignore[reportArgumentType]
|
|
174
174
|
|
|
175
175
|
|
|
176
176
|
@jsii.data_type(
|
|
@@ -210,8 +210,8 @@ class DataUpcloudZoneConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
210
210
|
:param lifecycle:
|
|
211
211
|
:param provider:
|
|
212
212
|
:param provisioners:
|
|
213
|
-
:param id: Identifier of the zone. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
214
|
-
:param name: Identifier of the zone. Contains the same value as ``id``. If both ``id`` and ``name`` are set, ``id`` takes precedence. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
213
|
+
:param id: Identifier of the zone. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zone#id DataUpcloudZone#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
214
|
+
:param name: Identifier of the zone. Contains the same value as ``id``. If both ``id`` and ``name`` are set, ``id`` takes precedence. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zone#name DataUpcloudZone#name}
|
|
215
215
|
'''
|
|
216
216
|
if isinstance(lifecycle, dict):
|
|
217
217
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -314,7 +314,7 @@ class DataUpcloudZoneConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
314
314
|
def id(self) -> typing.Optional[builtins.str]:
|
|
315
315
|
'''Identifier of the zone.
|
|
316
316
|
|
|
317
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
317
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zone#id DataUpcloudZone#id}
|
|
318
318
|
|
|
319
319
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
320
320
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -328,7 +328,7 @@ class DataUpcloudZoneConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
328
328
|
|
|
329
329
|
Contains the same value as ``id``. If both ``id`` and ``name`` are set, ``id`` takes precedence.
|
|
330
330
|
|
|
331
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
331
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zone#name DataUpcloudZone#name}
|
|
332
332
|
'''
|
|
333
333
|
result = self._values.get("name")
|
|
334
334
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `data_upcloud_zones`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`data_upcloud_zones`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`data_upcloud_zones`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zones).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -29,7 +29,7 @@ class DataUpcloudZones(
|
|
|
29
29
|
metaclass=jsii.JSIIMeta,
|
|
30
30
|
jsii_type="@cdktf/provider-upcloud.dataUpcloudZones.DataUpcloudZones",
|
|
31
31
|
):
|
|
32
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
32
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zones upcloud_zones}.'''
|
|
33
33
|
|
|
34
34
|
def __init__(
|
|
35
35
|
self,
|
|
@@ -45,11 +45,11 @@ class DataUpcloudZones(
|
|
|
45
45
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
46
46
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
47
47
|
) -> None:
|
|
48
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
48
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zones upcloud_zones} Data Source.
|
|
49
49
|
|
|
50
50
|
:param scope: The scope in which to define this construct.
|
|
51
51
|
:param id: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
52
|
-
:param filter_type: Filter zones by type. Possible values are "all", "public" and "private". Default is "public". Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
52
|
+
:param filter_type: Filter zones by type. Possible values are "all", "public" and "private". Default is "public". Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zones#filter_type DataUpcloudZones#filter_type}
|
|
53
53
|
:param connection:
|
|
54
54
|
:param count:
|
|
55
55
|
:param depends_on:
|
|
@@ -88,7 +88,7 @@ class DataUpcloudZones(
|
|
|
88
88
|
|
|
89
89
|
:param scope: The scope in which to define this construct.
|
|
90
90
|
:param import_to_id: The construct id used in the generated config for the DataUpcloudZones to import.
|
|
91
|
-
:param import_from_id: The id of the existing DataUpcloudZones that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
91
|
+
:param import_from_id: The id of the existing DataUpcloudZones that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zones#import import section} in the documentation of this resource for the id to use
|
|
92
92
|
:param provider: ? Optional instance of the provider where the DataUpcloudZones to import is found.
|
|
93
93
|
'''
|
|
94
94
|
if __debug__:
|
|
@@ -141,7 +141,7 @@ class DataUpcloudZones(
|
|
|
141
141
|
if __debug__:
|
|
142
142
|
type_hints = typing.get_type_hints(_typecheckingstub__b34ebe3d44f243cf49fe377a365d9dc4f4d014c9ca8a2b3c0581e65b7b0786f8)
|
|
143
143
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
144
|
-
jsii.set(self, "filterType", value)
|
|
144
|
+
jsii.set(self, "filterType", value) # pyright: ignore[reportArgumentType]
|
|
145
145
|
|
|
146
146
|
|
|
147
147
|
@jsii.data_type(
|
|
@@ -179,7 +179,7 @@ class DataUpcloudZonesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
179
179
|
:param lifecycle:
|
|
180
180
|
:param provider:
|
|
181
181
|
:param provisioners:
|
|
182
|
-
:param filter_type: Filter zones by type. Possible values are "all", "public" and "private". Default is "public". Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
182
|
+
:param filter_type: Filter zones by type. Possible values are "all", "public" and "private". Default is "public". Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zones#filter_type DataUpcloudZones#filter_type}
|
|
183
183
|
'''
|
|
184
184
|
if isinstance(lifecycle, dict):
|
|
185
185
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -279,7 +279,7 @@ class DataUpcloudZonesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
279
279
|
def filter_type(self) -> typing.Optional[builtins.str]:
|
|
280
280
|
'''Filter zones by type. Possible values are "all", "public" and "private". Default is "public".
|
|
281
281
|
|
|
282
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
282
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/data-sources/zones#filter_type DataUpcloudZones#filter_type}
|
|
283
283
|
'''
|
|
284
284
|
result = self._values.get("filter_type")
|
|
285
285
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_firewall_rules`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_firewall_rules`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_firewall_rules`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -29,7 +29,7 @@ class FirewallRules(
|
|
|
29
29
|
metaclass=jsii.JSIIMeta,
|
|
30
30
|
jsii_type="@cdktf/provider-upcloud.firewallRules.FirewallRules",
|
|
31
31
|
):
|
|
32
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
32
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules upcloud_firewall_rules}.'''
|
|
33
33
|
|
|
34
34
|
def __init__(
|
|
35
35
|
self,
|
|
@@ -47,13 +47,13 @@ class FirewallRules(
|
|
|
47
47
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
48
48
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
49
49
|
) -> None:
|
|
50
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
50
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules upcloud_firewall_rules} Resource.
|
|
51
51
|
|
|
52
52
|
:param scope: The scope in which to define this construct.
|
|
53
53
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
54
|
-
:param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
55
|
-
:param server_id: The unique id of the server to be protected the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
56
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
54
|
+
:param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
|
|
55
|
+
:param server_id: The unique id of the server to be protected the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
|
|
56
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#id FirewallRules#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
57
57
|
:param connection:
|
|
58
58
|
:param count:
|
|
59
59
|
:param depends_on:
|
|
@@ -94,7 +94,7 @@ class FirewallRules(
|
|
|
94
94
|
|
|
95
95
|
:param scope: The scope in which to define this construct.
|
|
96
96
|
:param import_to_id: The construct id used in the generated config for the FirewallRules to import.
|
|
97
|
-
:param import_from_id: The id of the existing FirewallRules that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
97
|
+
:param import_from_id: The id of the existing FirewallRules that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#import import section} in the documentation of this resource for the id to use
|
|
98
98
|
:param provider: ? Optional instance of the provider where the FirewallRules to import is found.
|
|
99
99
|
'''
|
|
100
100
|
if __debug__:
|
|
@@ -167,7 +167,7 @@ class FirewallRules(
|
|
|
167
167
|
if __debug__:
|
|
168
168
|
type_hints = typing.get_type_hints(_typecheckingstub__c5b4186580649c1167af5344e5016a17428872cece6b2e01cd0eb7db97a7aa0e)
|
|
169
169
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
170
|
-
jsii.set(self, "id", value)
|
|
170
|
+
jsii.set(self, "id", value) # pyright: ignore[reportArgumentType]
|
|
171
171
|
|
|
172
172
|
@builtins.property
|
|
173
173
|
@jsii.member(jsii_name="serverId")
|
|
@@ -179,7 +179,7 @@ class FirewallRules(
|
|
|
179
179
|
if __debug__:
|
|
180
180
|
type_hints = typing.get_type_hints(_typecheckingstub__58d36060cbaa53ac44e8eee4a67ae3fb2b894aa4b92b5809a705a5d3073ea15f)
|
|
181
181
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
182
|
-
jsii.set(self, "serverId", value)
|
|
182
|
+
jsii.set(self, "serverId", value) # pyright: ignore[reportArgumentType]
|
|
183
183
|
|
|
184
184
|
|
|
185
185
|
@jsii.data_type(
|
|
@@ -221,9 +221,9 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
221
221
|
:param lifecycle:
|
|
222
222
|
:param provider:
|
|
223
223
|
:param provisioners:
|
|
224
|
-
:param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
225
|
-
:param server_id: The unique id of the server to be protected the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
226
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
224
|
+
:param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
|
|
225
|
+
:param server_id: The unique id of the server to be protected the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
|
|
226
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#id FirewallRules#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
227
227
|
'''
|
|
228
228
|
if isinstance(lifecycle, dict):
|
|
229
229
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -330,7 +330,7 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
330
330
|
) -> typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]]:
|
|
331
331
|
'''firewall_rule block.
|
|
332
332
|
|
|
333
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
333
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
|
|
334
334
|
'''
|
|
335
335
|
result = self._values.get("firewall_rule")
|
|
336
336
|
assert result is not None, "Required property 'firewall_rule' is missing"
|
|
@@ -340,7 +340,7 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
340
340
|
def server_id(self) -> builtins.str:
|
|
341
341
|
'''The unique id of the server to be protected the firewall rules.
|
|
342
342
|
|
|
343
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
343
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
|
|
344
344
|
'''
|
|
345
345
|
result = self._values.get("server_id")
|
|
346
346
|
assert result is not None, "Required property 'server_id' is missing"
|
|
@@ -348,7 +348,7 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
348
348
|
|
|
349
349
|
@builtins.property
|
|
350
350
|
def id(self) -> typing.Optional[builtins.str]:
|
|
351
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
351
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#id FirewallRules#id}.
|
|
352
352
|
|
|
353
353
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
354
354
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -408,20 +408,20 @@ class FirewallRulesFirewallRule:
|
|
|
408
408
|
source_port_start: typing.Optional[builtins.str] = None,
|
|
409
409
|
) -> None:
|
|
410
410
|
'''
|
|
411
|
-
:param action: Action to take if the rule conditions are met. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
412
|
-
:param direction: The direction of network traffic this rule will be applied to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
413
|
-
:param comment: Freeform comment string for the rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
414
|
-
:param destination_address_end: The destination address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
415
|
-
:param destination_address_start: The destination address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
416
|
-
:param destination_port_end: The destination port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
417
|
-
:param destination_port_start: The destination port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
418
|
-
:param family: The address family of new firewall rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
419
|
-
:param icmp_type: The ICMP type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
420
|
-
:param protocol: The protocol this rule will be applied to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
421
|
-
:param source_address_end: The source address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
422
|
-
:param source_address_start: The source address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
423
|
-
:param source_port_end: The source port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
424
|
-
:param source_port_start: The source port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
411
|
+
:param action: Action to take if the rule conditions are met. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#action FirewallRules#action}
|
|
412
|
+
:param direction: The direction of network traffic this rule will be applied to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#direction FirewallRules#direction}
|
|
413
|
+
:param comment: Freeform comment string for the rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#comment FirewallRules#comment}
|
|
414
|
+
:param destination_address_end: The destination address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
|
|
415
|
+
:param destination_address_start: The destination address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
|
|
416
|
+
:param destination_port_end: The destination port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
|
|
417
|
+
:param destination_port_start: The destination port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
|
|
418
|
+
:param family: The address family of new firewall rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#family FirewallRules#family}
|
|
419
|
+
:param icmp_type: The ICMP type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
|
|
420
|
+
:param protocol: The protocol this rule will be applied to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#protocol FirewallRules#protocol}
|
|
421
|
+
:param source_address_end: The source address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
|
|
422
|
+
:param source_address_start: The source address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
|
|
423
|
+
:param source_port_end: The source port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
|
|
424
|
+
:param source_port_start: The source port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
|
|
425
425
|
'''
|
|
426
426
|
if __debug__:
|
|
427
427
|
type_hints = typing.get_type_hints(_typecheckingstub__9b77e978fb66d25b46f06da19493b15c4f42527dec58b7335729cf86141901af)
|
|
@@ -472,7 +472,7 @@ class FirewallRulesFirewallRule:
|
|
|
472
472
|
def action(self) -> builtins.str:
|
|
473
473
|
'''Action to take if the rule conditions are met.
|
|
474
474
|
|
|
475
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
475
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#action FirewallRules#action}
|
|
476
476
|
'''
|
|
477
477
|
result = self._values.get("action")
|
|
478
478
|
assert result is not None, "Required property 'action' is missing"
|
|
@@ -482,7 +482,7 @@ class FirewallRulesFirewallRule:
|
|
|
482
482
|
def direction(self) -> builtins.str:
|
|
483
483
|
'''The direction of network traffic this rule will be applied to.
|
|
484
484
|
|
|
485
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
485
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#direction FirewallRules#direction}
|
|
486
486
|
'''
|
|
487
487
|
result = self._values.get("direction")
|
|
488
488
|
assert result is not None, "Required property 'direction' is missing"
|
|
@@ -492,7 +492,7 @@ class FirewallRulesFirewallRule:
|
|
|
492
492
|
def comment(self) -> typing.Optional[builtins.str]:
|
|
493
493
|
'''Freeform comment string for the rule.
|
|
494
494
|
|
|
495
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
495
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#comment FirewallRules#comment}
|
|
496
496
|
'''
|
|
497
497
|
result = self._values.get("comment")
|
|
498
498
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -501,7 +501,7 @@ class FirewallRulesFirewallRule:
|
|
|
501
501
|
def destination_address_end(self) -> typing.Optional[builtins.str]:
|
|
502
502
|
'''The destination address range ends from this address.
|
|
503
503
|
|
|
504
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
504
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
|
|
505
505
|
'''
|
|
506
506
|
result = self._values.get("destination_address_end")
|
|
507
507
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -510,7 +510,7 @@ class FirewallRulesFirewallRule:
|
|
|
510
510
|
def destination_address_start(self) -> typing.Optional[builtins.str]:
|
|
511
511
|
'''The destination address range starts from this address.
|
|
512
512
|
|
|
513
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
513
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
|
|
514
514
|
'''
|
|
515
515
|
result = self._values.get("destination_address_start")
|
|
516
516
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -519,7 +519,7 @@ class FirewallRulesFirewallRule:
|
|
|
519
519
|
def destination_port_end(self) -> typing.Optional[builtins.str]:
|
|
520
520
|
'''The destination port range ends from this port number.
|
|
521
521
|
|
|
522
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
522
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
|
|
523
523
|
'''
|
|
524
524
|
result = self._values.get("destination_port_end")
|
|
525
525
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -528,7 +528,7 @@ class FirewallRulesFirewallRule:
|
|
|
528
528
|
def destination_port_start(self) -> typing.Optional[builtins.str]:
|
|
529
529
|
'''The destination port range starts from this port number.
|
|
530
530
|
|
|
531
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
531
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
|
|
532
532
|
'''
|
|
533
533
|
result = self._values.get("destination_port_start")
|
|
534
534
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -537,7 +537,7 @@ class FirewallRulesFirewallRule:
|
|
|
537
537
|
def family(self) -> typing.Optional[builtins.str]:
|
|
538
538
|
'''The address family of new firewall rule.
|
|
539
539
|
|
|
540
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
540
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#family FirewallRules#family}
|
|
541
541
|
'''
|
|
542
542
|
result = self._values.get("family")
|
|
543
543
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -546,7 +546,7 @@ class FirewallRulesFirewallRule:
|
|
|
546
546
|
def icmp_type(self) -> typing.Optional[builtins.str]:
|
|
547
547
|
'''The ICMP type.
|
|
548
548
|
|
|
549
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
549
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
|
|
550
550
|
'''
|
|
551
551
|
result = self._values.get("icmp_type")
|
|
552
552
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -555,7 +555,7 @@ class FirewallRulesFirewallRule:
|
|
|
555
555
|
def protocol(self) -> typing.Optional[builtins.str]:
|
|
556
556
|
'''The protocol this rule will be applied to.
|
|
557
557
|
|
|
558
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
558
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#protocol FirewallRules#protocol}
|
|
559
559
|
'''
|
|
560
560
|
result = self._values.get("protocol")
|
|
561
561
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -564,7 +564,7 @@ class FirewallRulesFirewallRule:
|
|
|
564
564
|
def source_address_end(self) -> typing.Optional[builtins.str]:
|
|
565
565
|
'''The source address range ends from this address.
|
|
566
566
|
|
|
567
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
567
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
|
|
568
568
|
'''
|
|
569
569
|
result = self._values.get("source_address_end")
|
|
570
570
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -573,7 +573,7 @@ class FirewallRulesFirewallRule:
|
|
|
573
573
|
def source_address_start(self) -> typing.Optional[builtins.str]:
|
|
574
574
|
'''The source address range starts from this address.
|
|
575
575
|
|
|
576
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
576
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
|
|
577
577
|
'''
|
|
578
578
|
result = self._values.get("source_address_start")
|
|
579
579
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -582,7 +582,7 @@ class FirewallRulesFirewallRule:
|
|
|
582
582
|
def source_port_end(self) -> typing.Optional[builtins.str]:
|
|
583
583
|
'''The source port range ends from this port number.
|
|
584
584
|
|
|
585
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
585
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
|
|
586
586
|
'''
|
|
587
587
|
result = self._values.get("source_port_end")
|
|
588
588
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -591,7 +591,7 @@ class FirewallRulesFirewallRule:
|
|
|
591
591
|
def source_port_start(self) -> typing.Optional[builtins.str]:
|
|
592
592
|
'''The source port range starts from this port number.
|
|
593
593
|
|
|
594
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
594
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
|
|
595
595
|
'''
|
|
596
596
|
result = self._values.get("source_port_start")
|
|
597
597
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -652,7 +652,7 @@ class FirewallRulesFirewallRuleList(
|
|
|
652
652
|
if __debug__:
|
|
653
653
|
type_hints = typing.get_type_hints(_typecheckingstub__b8c0667b5246b36656b65a0197f71b1be7dd4913264b18a8f964bb03d46e0f31)
|
|
654
654
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
655
|
-
jsii.set(self, "terraformAttribute", value)
|
|
655
|
+
jsii.set(self, "terraformAttribute", value) # pyright: ignore[reportArgumentType]
|
|
656
656
|
|
|
657
657
|
@builtins.property
|
|
658
658
|
@jsii.member(jsii_name="terraformResource")
|
|
@@ -665,7 +665,7 @@ class FirewallRulesFirewallRuleList(
|
|
|
665
665
|
if __debug__:
|
|
666
666
|
type_hints = typing.get_type_hints(_typecheckingstub__2f485ce2be519a06464be51456be1a6082db33afb0dc146c5295a7ce6327267a)
|
|
667
667
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
668
|
-
jsii.set(self, "terraformResource", value)
|
|
668
|
+
jsii.set(self, "terraformResource", value) # pyright: ignore[reportArgumentType]
|
|
669
669
|
|
|
670
670
|
@builtins.property
|
|
671
671
|
@jsii.member(jsii_name="wrapsSet")
|
|
@@ -678,7 +678,7 @@ class FirewallRulesFirewallRuleList(
|
|
|
678
678
|
if __debug__:
|
|
679
679
|
type_hints = typing.get_type_hints(_typecheckingstub__b5ed2e7c1ca8241abef1bcdfd639eda4a1c8b13b12614419551aba8da56714d1)
|
|
680
680
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
681
|
-
jsii.set(self, "wrapsSet", value)
|
|
681
|
+
jsii.set(self, "wrapsSet", value) # pyright: ignore[reportArgumentType]
|
|
682
682
|
|
|
683
683
|
@builtins.property
|
|
684
684
|
@jsii.member(jsii_name="internalValue")
|
|
@@ -695,7 +695,7 @@ class FirewallRulesFirewallRuleList(
|
|
|
695
695
|
if __debug__:
|
|
696
696
|
type_hints = typing.get_type_hints(_typecheckingstub__86aa44126bbd5ae12ad54058822b7caba978de31968f8df12c8a012a7642896c)
|
|
697
697
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
698
|
-
jsii.set(self, "internalValue", value)
|
|
698
|
+
jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
|
|
699
699
|
|
|
700
700
|
|
|
701
701
|
class FirewallRulesFirewallRuleOutputReference(
|
|
@@ -852,7 +852,7 @@ class FirewallRulesFirewallRuleOutputReference(
|
|
|
852
852
|
if __debug__:
|
|
853
853
|
type_hints = typing.get_type_hints(_typecheckingstub__cf5d77e9b808a5b2988f3a6654c3e9139819ac431e2f95c9e5cff41dde9c5f94)
|
|
854
854
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
855
|
-
jsii.set(self, "action", value)
|
|
855
|
+
jsii.set(self, "action", value) # pyright: ignore[reportArgumentType]
|
|
856
856
|
|
|
857
857
|
@builtins.property
|
|
858
858
|
@jsii.member(jsii_name="comment")
|
|
@@ -864,7 +864,7 @@ class FirewallRulesFirewallRuleOutputReference(
|
|
|
864
864
|
if __debug__:
|
|
865
865
|
type_hints = typing.get_type_hints(_typecheckingstub__7b91f92cb088fa23c430b161883c5372b64c80e7695a5dc0d56709ff8b250595)
|
|
866
866
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
867
|
-
jsii.set(self, "comment", value)
|
|
867
|
+
jsii.set(self, "comment", value) # pyright: ignore[reportArgumentType]
|
|
868
868
|
|
|
869
869
|
@builtins.property
|
|
870
870
|
@jsii.member(jsii_name="destinationAddressEnd")
|
|
@@ -876,7 +876,7 @@ class FirewallRulesFirewallRuleOutputReference(
|
|
|
876
876
|
if __debug__:
|
|
877
877
|
type_hints = typing.get_type_hints(_typecheckingstub__0f7eb292b90d80a698dd8379cf4a1b7720cbb26f3218dd2c5628a524de2c37d0)
|
|
878
878
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
879
|
-
jsii.set(self, "destinationAddressEnd", value)
|
|
879
|
+
jsii.set(self, "destinationAddressEnd", value) # pyright: ignore[reportArgumentType]
|
|
880
880
|
|
|
881
881
|
@builtins.property
|
|
882
882
|
@jsii.member(jsii_name="destinationAddressStart")
|
|
@@ -888,7 +888,7 @@ class FirewallRulesFirewallRuleOutputReference(
|
|
|
888
888
|
if __debug__:
|
|
889
889
|
type_hints = typing.get_type_hints(_typecheckingstub__20587ec84eb611c98035fea7ea314b6143d56185b4a64fbc8230a2c4a0fbafa2)
|
|
890
890
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
891
|
-
jsii.set(self, "destinationAddressStart", value)
|
|
891
|
+
jsii.set(self, "destinationAddressStart", value) # pyright: ignore[reportArgumentType]
|
|
892
892
|
|
|
893
893
|
@builtins.property
|
|
894
894
|
@jsii.member(jsii_name="destinationPortEnd")
|
|
@@ -900,7 +900,7 @@ class FirewallRulesFirewallRuleOutputReference(
|
|
|
900
900
|
if __debug__:
|
|
901
901
|
type_hints = typing.get_type_hints(_typecheckingstub__dabf172600ce549d515b972b8ea8e7805bd96e407de84a02cf2fceff3f8c3a83)
|
|
902
902
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
903
|
-
jsii.set(self, "destinationPortEnd", value)
|
|
903
|
+
jsii.set(self, "destinationPortEnd", value) # pyright: ignore[reportArgumentType]
|
|
904
904
|
|
|
905
905
|
@builtins.property
|
|
906
906
|
@jsii.member(jsii_name="destinationPortStart")
|
|
@@ -912,7 +912,7 @@ class FirewallRulesFirewallRuleOutputReference(
|
|
|
912
912
|
if __debug__:
|
|
913
913
|
type_hints = typing.get_type_hints(_typecheckingstub__0d88e34c4e91fb7cdbc15f89e46e2e94fff59570bf5406589c1a3e23f26b49b6)
|
|
914
914
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
915
|
-
jsii.set(self, "destinationPortStart", value)
|
|
915
|
+
jsii.set(self, "destinationPortStart", value) # pyright: ignore[reportArgumentType]
|
|
916
916
|
|
|
917
917
|
@builtins.property
|
|
918
918
|
@jsii.member(jsii_name="direction")
|
|
@@ -924,7 +924,7 @@ class FirewallRulesFirewallRuleOutputReference(
|
|
|
924
924
|
if __debug__:
|
|
925
925
|
type_hints = typing.get_type_hints(_typecheckingstub__532bebe01b1fe3ad35f6fecfcb8b05d23ff4766c67436324b523c33c46172fd1)
|
|
926
926
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
927
|
-
jsii.set(self, "direction", value)
|
|
927
|
+
jsii.set(self, "direction", value) # pyright: ignore[reportArgumentType]
|
|
928
928
|
|
|
929
929
|
@builtins.property
|
|
930
930
|
@jsii.member(jsii_name="family")
|
|
@@ -936,7 +936,7 @@ class FirewallRulesFirewallRuleOutputReference(
|
|
|
936
936
|
if __debug__:
|
|
937
937
|
type_hints = typing.get_type_hints(_typecheckingstub__bc82326e5f373043d64665f6c6a8a3cf83c2b0bedc6592edef0116bf89ced524)
|
|
938
938
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
939
|
-
jsii.set(self, "family", value)
|
|
939
|
+
jsii.set(self, "family", value) # pyright: ignore[reportArgumentType]
|
|
940
940
|
|
|
941
941
|
@builtins.property
|
|
942
942
|
@jsii.member(jsii_name="icmpType")
|
|
@@ -948,7 +948,7 @@ class FirewallRulesFirewallRuleOutputReference(
|
|
|
948
948
|
if __debug__:
|
|
949
949
|
type_hints = typing.get_type_hints(_typecheckingstub__7c98da5a7a41b0a2eb46eaa7d3a966c5f1f56dfa2c275c6ba075aeffa7383fc3)
|
|
950
950
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
951
|
-
jsii.set(self, "icmpType", value)
|
|
951
|
+
jsii.set(self, "icmpType", value) # pyright: ignore[reportArgumentType]
|
|
952
952
|
|
|
953
953
|
@builtins.property
|
|
954
954
|
@jsii.member(jsii_name="protocol")
|
|
@@ -960,7 +960,7 @@ class FirewallRulesFirewallRuleOutputReference(
|
|
|
960
960
|
if __debug__:
|
|
961
961
|
type_hints = typing.get_type_hints(_typecheckingstub__90dd48388c4582e71016f824db682a0e6badaaa68192d2f75fd11df31454bcec)
|
|
962
962
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
963
|
-
jsii.set(self, "protocol", value)
|
|
963
|
+
jsii.set(self, "protocol", value) # pyright: ignore[reportArgumentType]
|
|
964
964
|
|
|
965
965
|
@builtins.property
|
|
966
966
|
@jsii.member(jsii_name="sourceAddressEnd")
|
|
@@ -972,7 +972,7 @@ class FirewallRulesFirewallRuleOutputReference(
|
|
|
972
972
|
if __debug__:
|
|
973
973
|
type_hints = typing.get_type_hints(_typecheckingstub__64e12a12a20cdee9fd9c4ab584665fd7d2c5e0ef17a986482ca1ffc3ccd2e8d5)
|
|
974
974
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
975
|
-
jsii.set(self, "sourceAddressEnd", value)
|
|
975
|
+
jsii.set(self, "sourceAddressEnd", value) # pyright: ignore[reportArgumentType]
|
|
976
976
|
|
|
977
977
|
@builtins.property
|
|
978
978
|
@jsii.member(jsii_name="sourceAddressStart")
|
|
@@ -984,7 +984,7 @@ class FirewallRulesFirewallRuleOutputReference(
|
|
|
984
984
|
if __debug__:
|
|
985
985
|
type_hints = typing.get_type_hints(_typecheckingstub__65e8b63f6139968901f5dd1be0e577d5020648bf37a8cfc699f60b84ec4f1925)
|
|
986
986
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
987
|
-
jsii.set(self, "sourceAddressStart", value)
|
|
987
|
+
jsii.set(self, "sourceAddressStart", value) # pyright: ignore[reportArgumentType]
|
|
988
988
|
|
|
989
989
|
@builtins.property
|
|
990
990
|
@jsii.member(jsii_name="sourcePortEnd")
|
|
@@ -996,7 +996,7 @@ class FirewallRulesFirewallRuleOutputReference(
|
|
|
996
996
|
if __debug__:
|
|
997
997
|
type_hints = typing.get_type_hints(_typecheckingstub__49eacef077b5828707589d620d969195fb255d20caf3d33a2091f58f3d299733)
|
|
998
998
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
999
|
-
jsii.set(self, "sourcePortEnd", value)
|
|
999
|
+
jsii.set(self, "sourcePortEnd", value) # pyright: ignore[reportArgumentType]
|
|
1000
1000
|
|
|
1001
1001
|
@builtins.property
|
|
1002
1002
|
@jsii.member(jsii_name="sourcePortStart")
|
|
@@ -1008,7 +1008,7 @@ class FirewallRulesFirewallRuleOutputReference(
|
|
|
1008
1008
|
if __debug__:
|
|
1009
1009
|
type_hints = typing.get_type_hints(_typecheckingstub__b4e448528c042dda5a3679431eace4acbc8a79820637256ca64a7cb946c21d9f)
|
|
1010
1010
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1011
|
-
jsii.set(self, "sourcePortStart", value)
|
|
1011
|
+
jsii.set(self, "sourcePortStart", value) # pyright: ignore[reportArgumentType]
|
|
1012
1012
|
|
|
1013
1013
|
@builtins.property
|
|
1014
1014
|
@jsii.member(jsii_name="internalValue")
|
|
@@ -1025,7 +1025,7 @@ class FirewallRulesFirewallRuleOutputReference(
|
|
|
1025
1025
|
if __debug__:
|
|
1026
1026
|
type_hints = typing.get_type_hints(_typecheckingstub__caf76bc209bb05575c5fe33f2a065f78e22a3cad53fce656b4371ab3233464d7)
|
|
1027
1027
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1028
|
-
jsii.set(self, "internalValue", value)
|
|
1028
|
+
jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
|
|
1029
1029
|
|
|
1030
1030
|
|
|
1031
1031
|
__all__ = [
|