cdktf-cdktf-provider-upcloud 15.0.0__py3-none-any.whl → 15.0.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.

Files changed (69) hide show
  1. cdktf_cdktf_provider_upcloud/__init__.py +3 -3
  2. cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
  3. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.0.1.jsii.tgz +0 -0
  4. cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +9 -9
  5. cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +7 -7
  6. cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +7 -7
  7. cdktf_cdktf_provider_upcloud/data_upcloud_load_balancer_dns_challenge_domain/__init__.py +4 -4
  8. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
  9. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
  10. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
  11. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
  12. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_valkey_sessions/__init__.py +22 -22
  13. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +10 -10
  14. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
  15. cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
  16. cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +28 -28
  17. cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
  18. cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
  19. cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +7 -7
  20. cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +71 -110
  21. cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +16 -16
  22. cdktf_cdktf_provider_upcloud/gateway/__init__.py +37 -37
  23. cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +34 -34
  24. cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +61 -61
  25. cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +34 -34
  26. cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +58 -58
  27. cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +39 -39
  28. cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +46 -46
  29. cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +13 -13
  30. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +25 -25
  31. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +13 -13
  32. cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +33 -33
  33. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +228 -228
  34. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +13 -13
  35. cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +16 -16
  36. cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +28 -28
  37. cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +25 -25
  38. cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
  39. cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +201 -201
  40. cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +555 -555
  41. cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +360 -360
  42. cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +132 -132
  43. cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +65 -65
  44. cdktf_cdktf_provider_upcloud/managed_database_valkey/__init__.py +135 -135
  45. cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +30 -30
  46. cdktf_cdktf_provider_upcloud/managed_object_storage_bucket/__init__.py +10 -10
  47. cdktf_cdktf_provider_upcloud/managed_object_storage_custom_domain/__init__.py +13 -13
  48. cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +16 -16
  49. cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +13 -13
  50. cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +16 -16
  51. cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +16 -16
  52. cdktf_cdktf_provider_upcloud/network/__init__.py +33 -33
  53. cdktf_cdktf_provider_upcloud/network_peering/__init__.py +23 -23
  54. cdktf_cdktf_provider_upcloud/object_storage/__init__.py +30 -30
  55. cdktf_cdktf_provider_upcloud/provider/__init__.py +28 -28
  56. cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
  57. cdktf_cdktf_provider_upcloud/server/__init__.py +139 -139
  58. cdktf_cdktf_provider_upcloud/server_group/__init__.py +19 -19
  59. cdktf_cdktf_provider_upcloud/storage/__init__.py +51 -51
  60. cdktf_cdktf_provider_upcloud/storage_backup/__init__.py +13 -13
  61. cdktf_cdktf_provider_upcloud/storage_template/__init__.py +13 -13
  62. cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
  63. {cdktf_cdktf_provider_upcloud-15.0.0.dist-info → cdktf_cdktf_provider_upcloud-15.0.1.dist-info}/METADATA +4 -4
  64. cdktf_cdktf_provider_upcloud-15.0.1.dist-info/RECORD +68 -0
  65. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.0.0.jsii.tgz +0 -0
  66. cdktf_cdktf_provider_upcloud-15.0.0.dist-info/RECORD +0 -68
  67. {cdktf_cdktf_provider_upcloud-15.0.0.dist-info → cdktf_cdktf_provider_upcloud-15.0.1.dist-info}/LICENSE +0 -0
  68. {cdktf_cdktf_provider_upcloud-15.0.0.dist-info → cdktf_cdktf_provider_upcloud-15.0.1.dist-info}/WHEEL +0 -0
  69. {cdktf_cdktf_provider_upcloud-15.0.0.dist-info → cdktf_cdktf_provider_upcloud-15.0.1.dist-info}/top_level.txt +0 -0
@@ -1,7 +1,7 @@
1
1
  r'''
2
2
  # `upcloud_firewall_rules`
3
3
 
4
- Refer to the Terraform Registry for docs: [`upcloud_firewall_rules`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules).
4
+ Refer to the Terraform Registry for docs: [`upcloud_firewall_rules`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -44,16 +44,15 @@ class FirewallRules(
44
44
  metaclass=jsii.JSIIMeta,
45
45
  jsii_type="@cdktf/provider-upcloud.firewallRules.FirewallRules",
46
46
  ):
47
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules upcloud_firewall_rules}.'''
47
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules upcloud_firewall_rules}.'''
48
48
 
49
49
  def __init__(
50
50
  self,
51
51
  scope: _constructs_77d1e7e8.Construct,
52
- id_: builtins.str,
52
+ id: builtins.str,
53
53
  *,
54
- firewall_rule: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["FirewallRulesFirewallRule", typing.Dict[builtins.str, typing.Any]]]],
55
54
  server_id: builtins.str,
56
- id: typing.Optional[builtins.str] = None,
55
+ firewall_rule: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["FirewallRulesFirewallRule", typing.Dict[builtins.str, typing.Any]]]]] = None,
57
56
  connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
58
57
  count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
59
58
  depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
@@ -62,13 +61,12 @@ class FirewallRules(
62
61
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
63
62
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
64
63
  ) -> None:
65
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules upcloud_firewall_rules} Resource.
64
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules upcloud_firewall_rules} Resource.
66
65
 
67
66
  :param scope: The scope in which to define this construct.
68
- :param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
69
- :param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
70
- :param server_id: The unique id of the server to be protected the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
71
- :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#id FirewallRules#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
67
+ :param id: The scoped construct ID. Must be unique amongst siblings in the same scope
68
+ :param server_id: The UUID of the server to be protected with the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#server_id FirewallRules#server_id}
69
+ :param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
72
70
  :param connection:
73
71
  :param count:
74
72
  :param depends_on:
@@ -80,11 +78,10 @@ class FirewallRules(
80
78
  if __debug__:
81
79
  type_hints = typing.get_type_hints(_typecheckingstub__3dd7e6461a1cb9b9f531749add09b10411da35a685dbccc19e6eae9f39484aba)
82
80
  check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
83
- check_type(argname="argument id_", value=id_, expected_type=type_hints["id_"])
81
+ check_type(argname="argument id", value=id, expected_type=type_hints["id"])
84
82
  config = FirewallRulesConfig(
85
- firewall_rule=firewall_rule,
86
83
  server_id=server_id,
87
- id=id,
84
+ firewall_rule=firewall_rule,
88
85
  connection=connection,
89
86
  count=count,
90
87
  depends_on=depends_on,
@@ -94,7 +91,7 @@ class FirewallRules(
94
91
  provisioners=provisioners,
95
92
  )
96
93
 
97
- jsii.create(self.__class__, self, [scope, id_, config])
94
+ jsii.create(self.__class__, self, [scope, id, config])
98
95
 
99
96
  @jsii.member(jsii_name="generateConfigForImport")
100
97
  @builtins.classmethod
@@ -109,7 +106,7 @@ class FirewallRules(
109
106
 
110
107
  :param scope: The scope in which to define this construct.
111
108
  :param import_to_id: The construct id used in the generated config for the FirewallRules to import.
112
- :param import_from_id: The id of the existing FirewallRules that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#import import section} in the documentation of this resource for the id to use
109
+ :param import_from_id: The id of the existing FirewallRules that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#import import section} in the documentation of this resource for the id to use
113
110
  :param provider: ? Optional instance of the provider where the FirewallRules to import is found.
114
111
  '''
115
112
  if __debug__:
@@ -133,9 +130,9 @@ class FirewallRules(
133
130
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
134
131
  return typing.cast(None, jsii.invoke(self, "putFirewallRule", [value]))
135
132
 
136
- @jsii.member(jsii_name="resetId")
137
- def reset_id(self) -> None:
138
- return typing.cast(None, jsii.invoke(self, "resetId", []))
133
+ @jsii.member(jsii_name="resetFirewallRule")
134
+ def reset_firewall_rule(self) -> None:
135
+ return typing.cast(None, jsii.invoke(self, "resetFirewallRule", []))
139
136
 
140
137
  @jsii.member(jsii_name="synthesizeAttributes")
141
138
  def _synthesize_attributes(self) -> typing.Mapping[builtins.str, typing.Any]:
@@ -155,6 +152,11 @@ class FirewallRules(
155
152
  def firewall_rule(self) -> "FirewallRulesFirewallRuleList":
156
153
  return typing.cast("FirewallRulesFirewallRuleList", jsii.get(self, "firewallRule"))
157
154
 
155
+ @builtins.property
156
+ @jsii.member(jsii_name="id")
157
+ def id(self) -> builtins.str:
158
+ return typing.cast(builtins.str, jsii.get(self, "id"))
159
+
158
160
  @builtins.property
159
161
  @jsii.member(jsii_name="firewallRuleInput")
160
162
  def firewall_rule_input(
@@ -162,28 +164,11 @@ class FirewallRules(
162
164
  ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]]]:
163
165
  return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]]], jsii.get(self, "firewallRuleInput"))
164
166
 
165
- @builtins.property
166
- @jsii.member(jsii_name="idInput")
167
- def id_input(self) -> typing.Optional[builtins.str]:
168
- return typing.cast(typing.Optional[builtins.str], jsii.get(self, "idInput"))
169
-
170
167
  @builtins.property
171
168
  @jsii.member(jsii_name="serverIdInput")
172
169
  def server_id_input(self) -> typing.Optional[builtins.str]:
173
170
  return typing.cast(typing.Optional[builtins.str], jsii.get(self, "serverIdInput"))
174
171
 
175
- @builtins.property
176
- @jsii.member(jsii_name="id")
177
- def id(self) -> builtins.str:
178
- return typing.cast(builtins.str, jsii.get(self, "id"))
179
-
180
- @id.setter
181
- def id(self, value: builtins.str) -> None:
182
- if __debug__:
183
- type_hints = typing.get_type_hints(_typecheckingstub__c5b4186580649c1167af5344e5016a17428872cece6b2e01cd0eb7db97a7aa0e)
184
- check_type(argname="argument value", value=value, expected_type=type_hints["value"])
185
- jsii.set(self, "id", value) # pyright: ignore[reportArgumentType]
186
-
187
172
  @builtins.property
188
173
  @jsii.member(jsii_name="serverId")
189
174
  def server_id(self) -> builtins.str:
@@ -208,9 +193,8 @@ class FirewallRules(
208
193
  "lifecycle": "lifecycle",
209
194
  "provider": "provider",
210
195
  "provisioners": "provisioners",
211
- "firewall_rule": "firewallRule",
212
196
  "server_id": "serverId",
213
- "id": "id",
197
+ "firewall_rule": "firewallRule",
214
198
  },
215
199
  )
216
200
  class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
@@ -224,9 +208,8 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
224
208
  lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
225
209
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
226
210
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
227
- firewall_rule: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["FirewallRulesFirewallRule", typing.Dict[builtins.str, typing.Any]]]],
228
211
  server_id: builtins.str,
229
- id: typing.Optional[builtins.str] = None,
212
+ firewall_rule: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["FirewallRulesFirewallRule", typing.Dict[builtins.str, typing.Any]]]]] = None,
230
213
  ) -> None:
231
214
  '''
232
215
  :param connection:
@@ -236,9 +219,8 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
236
219
  :param lifecycle:
237
220
  :param provider:
238
221
  :param provisioners:
239
- :param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
240
- :param server_id: The unique id of the server to be protected the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
241
- :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#id FirewallRules#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
222
+ :param server_id: The UUID of the server to be protected with the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#server_id FirewallRules#server_id}
223
+ :param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
242
224
  '''
243
225
  if isinstance(lifecycle, dict):
244
226
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -251,11 +233,9 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
251
233
  check_type(argname="argument lifecycle", value=lifecycle, expected_type=type_hints["lifecycle"])
252
234
  check_type(argname="argument provider", value=provider, expected_type=type_hints["provider"])
253
235
  check_type(argname="argument provisioners", value=provisioners, expected_type=type_hints["provisioners"])
254
- check_type(argname="argument firewall_rule", value=firewall_rule, expected_type=type_hints["firewall_rule"])
255
236
  check_type(argname="argument server_id", value=server_id, expected_type=type_hints["server_id"])
256
- check_type(argname="argument id", value=id, expected_type=type_hints["id"])
237
+ check_type(argname="argument firewall_rule", value=firewall_rule, expected_type=type_hints["firewall_rule"])
257
238
  self._values: typing.Dict[builtins.str, typing.Any] = {
258
- "firewall_rule": firewall_rule,
259
239
  "server_id": server_id,
260
240
  }
261
241
  if connection is not None:
@@ -272,8 +252,8 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
272
252
  self._values["provider"] = provider
273
253
  if provisioners is not None:
274
254
  self._values["provisioners"] = provisioners
275
- if id is not None:
276
- self._values["id"] = id
255
+ if firewall_rule is not None:
256
+ self._values["firewall_rule"] = firewall_rule
277
257
 
278
258
  @builtins.property
279
259
  def connection(
@@ -339,37 +319,26 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
339
319
  result = self._values.get("provisioners")
340
320
  return typing.cast(typing.Optional[typing.List[typing.Union[_cdktf_9a9027ec.FileProvisioner, _cdktf_9a9027ec.LocalExecProvisioner, _cdktf_9a9027ec.RemoteExecProvisioner]]], result)
341
321
 
342
- @builtins.property
343
- def firewall_rule(
344
- self,
345
- ) -> typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]]:
346
- '''firewall_rule block.
347
-
348
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
349
- '''
350
- result = self._values.get("firewall_rule")
351
- assert result is not None, "Required property 'firewall_rule' is missing"
352
- return typing.cast(typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]], result)
353
-
354
322
  @builtins.property
355
323
  def server_id(self) -> builtins.str:
356
- '''The unique id of the server to be protected the firewall rules.
324
+ '''The UUID of the server to be protected with the firewall rules.
357
325
 
358
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
326
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#server_id FirewallRules#server_id}
359
327
  '''
360
328
  result = self._values.get("server_id")
361
329
  assert result is not None, "Required property 'server_id' is missing"
362
330
  return typing.cast(builtins.str, result)
363
331
 
364
332
  @builtins.property
365
- def id(self) -> typing.Optional[builtins.str]:
366
- '''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#id FirewallRules#id}.
333
+ def firewall_rule(
334
+ self,
335
+ ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]]]:
336
+ '''firewall_rule block.
367
337
 
368
- Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
369
- If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
338
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
370
339
  '''
371
- result = self._values.get("id")
372
- return typing.cast(typing.Optional[builtins.str], result)
340
+ result = self._values.get("firewall_rule")
341
+ return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]]], result)
373
342
 
374
343
  def __eq__(self, rhs: typing.Any) -> builtins.bool:
375
344
  return isinstance(rhs, self.__class__) and rhs._values == self._values
@@ -423,20 +392,20 @@ class FirewallRulesFirewallRule:
423
392
  source_port_start: typing.Optional[builtins.str] = None,
424
393
  ) -> None:
425
394
  '''
426
- :param action: Action to take if the rule conditions are met. Valid values ``accept | drop``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#action FirewallRules#action}
427
- :param direction: The direction of network traffic this rule will be applied to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#direction FirewallRules#direction}
428
- :param comment: Freeform comment string for the rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#comment FirewallRules#comment}
429
- :param destination_address_end: The destination address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
430
- :param destination_address_start: The destination address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
431
- :param destination_port_end: The destination port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
432
- :param destination_port_start: The destination port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
433
- :param family: The address family of new firewall rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#family FirewallRules#family}
434
- :param icmp_type: The ICMP type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
435
- :param protocol: The protocol this rule will be applied to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#protocol FirewallRules#protocol}
436
- :param source_address_end: The source address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
437
- :param source_address_start: The source address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
438
- :param source_port_end: The source port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
439
- :param source_port_start: The source port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
395
+ :param action: Action to take if the rule conditions are met. Valid values ``accept | drop``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#action FirewallRules#action}
396
+ :param direction: The direction of network traffic this rule will be applied to. Valid values are ``in`` and ``out``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#direction FirewallRules#direction}
397
+ :param comment: A comment for the rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#comment FirewallRules#comment}
398
+ :param destination_address_end: The destination address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
399
+ :param destination_address_start: The destination address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
400
+ :param destination_port_end: The destination port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
401
+ :param destination_port_start: The destination port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
402
+ :param family: The address family of new firewall rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#family FirewallRules#family}
403
+ :param icmp_type: The ICMP type of the rule. Only valid if protocol is ICMP. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
404
+ :param protocol: The protocol of the rule. Possible values are `` (empty), ``tcp``, ``udp``, ``icmp``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#protocol FirewallRules#protocol}
405
+ :param source_address_end: The source address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
406
+ :param source_address_start: The source address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
407
+ :param source_port_end: The source port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
408
+ :param source_port_start: The source port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
440
409
  '''
441
410
  if __debug__:
442
411
  type_hints = typing.get_type_hints(_typecheckingstub__9b77e978fb66d25b46f06da19493b15c4f42527dec58b7335729cf86141901af)
@@ -487,7 +456,7 @@ class FirewallRulesFirewallRule:
487
456
  def action(self) -> builtins.str:
488
457
  '''Action to take if the rule conditions are met. Valid values ``accept | drop``.
489
458
 
490
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#action FirewallRules#action}
459
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#action FirewallRules#action}
491
460
  '''
492
461
  result = self._values.get("action")
493
462
  assert result is not None, "Required property 'action' is missing"
@@ -495,9 +464,9 @@ class FirewallRulesFirewallRule:
495
464
 
496
465
  @builtins.property
497
466
  def direction(self) -> builtins.str:
498
- '''The direction of network traffic this rule will be applied to.
467
+ '''The direction of network traffic this rule will be applied to. Valid values are ``in`` and ``out``.
499
468
 
500
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#direction FirewallRules#direction}
469
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#direction FirewallRules#direction}
501
470
  '''
502
471
  result = self._values.get("direction")
503
472
  assert result is not None, "Required property 'direction' is missing"
@@ -505,9 +474,9 @@ class FirewallRulesFirewallRule:
505
474
 
506
475
  @builtins.property
507
476
  def comment(self) -> typing.Optional[builtins.str]:
508
- '''Freeform comment string for the rule.
477
+ '''A comment for the rule.
509
478
 
510
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#comment FirewallRules#comment}
479
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#comment FirewallRules#comment}
511
480
  '''
512
481
  result = self._values.get("comment")
513
482
  return typing.cast(typing.Optional[builtins.str], result)
@@ -516,7 +485,7 @@ class FirewallRulesFirewallRule:
516
485
  def destination_address_end(self) -> typing.Optional[builtins.str]:
517
486
  '''The destination address range ends from this address.
518
487
 
519
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
488
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
520
489
  '''
521
490
  result = self._values.get("destination_address_end")
522
491
  return typing.cast(typing.Optional[builtins.str], result)
@@ -525,7 +494,7 @@ class FirewallRulesFirewallRule:
525
494
  def destination_address_start(self) -> typing.Optional[builtins.str]:
526
495
  '''The destination address range starts from this address.
527
496
 
528
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
497
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
529
498
  '''
530
499
  result = self._values.get("destination_address_start")
531
500
  return typing.cast(typing.Optional[builtins.str], result)
@@ -534,7 +503,7 @@ class FirewallRulesFirewallRule:
534
503
  def destination_port_end(self) -> typing.Optional[builtins.str]:
535
504
  '''The destination port range ends from this port number.
536
505
 
537
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
506
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
538
507
  '''
539
508
  result = self._values.get("destination_port_end")
540
509
  return typing.cast(typing.Optional[builtins.str], result)
@@ -543,7 +512,7 @@ class FirewallRulesFirewallRule:
543
512
  def destination_port_start(self) -> typing.Optional[builtins.str]:
544
513
  '''The destination port range starts from this port number.
545
514
 
546
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
515
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
547
516
  '''
548
517
  result = self._values.get("destination_port_start")
549
518
  return typing.cast(typing.Optional[builtins.str], result)
@@ -552,25 +521,25 @@ class FirewallRulesFirewallRule:
552
521
  def family(self) -> typing.Optional[builtins.str]:
553
522
  '''The address family of new firewall rule.
554
523
 
555
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#family FirewallRules#family}
524
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#family FirewallRules#family}
556
525
  '''
557
526
  result = self._values.get("family")
558
527
  return typing.cast(typing.Optional[builtins.str], result)
559
528
 
560
529
  @builtins.property
561
530
  def icmp_type(self) -> typing.Optional[builtins.str]:
562
- '''The ICMP type.
531
+ '''The ICMP type of the rule. Only valid if protocol is ICMP.
563
532
 
564
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
533
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
565
534
  '''
566
535
  result = self._values.get("icmp_type")
567
536
  return typing.cast(typing.Optional[builtins.str], result)
568
537
 
569
538
  @builtins.property
570
539
  def protocol(self) -> typing.Optional[builtins.str]:
571
- '''The protocol this rule will be applied to.
540
+ '''The protocol of the rule. Possible values are `` (empty), ``tcp``, ``udp``, ``icmp``.
572
541
 
573
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#protocol FirewallRules#protocol}
542
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#protocol FirewallRules#protocol}
574
543
  '''
575
544
  result = self._values.get("protocol")
576
545
  return typing.cast(typing.Optional[builtins.str], result)
@@ -579,7 +548,7 @@ class FirewallRulesFirewallRule:
579
548
  def source_address_end(self) -> typing.Optional[builtins.str]:
580
549
  '''The source address range ends from this address.
581
550
 
582
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
551
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
583
552
  '''
584
553
  result = self._values.get("source_address_end")
585
554
  return typing.cast(typing.Optional[builtins.str], result)
@@ -588,7 +557,7 @@ class FirewallRulesFirewallRule:
588
557
  def source_address_start(self) -> typing.Optional[builtins.str]:
589
558
  '''The source address range starts from this address.
590
559
 
591
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
560
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
592
561
  '''
593
562
  result = self._values.get("source_address_start")
594
563
  return typing.cast(typing.Optional[builtins.str], result)
@@ -597,7 +566,7 @@ class FirewallRulesFirewallRule:
597
566
  def source_port_end(self) -> typing.Optional[builtins.str]:
598
567
  '''The source port range ends from this port number.
599
568
 
600
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
569
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
601
570
  '''
602
571
  result = self._values.get("source_port_end")
603
572
  return typing.cast(typing.Optional[builtins.str], result)
@@ -606,7 +575,7 @@ class FirewallRulesFirewallRule:
606
575
  def source_port_start(self) -> typing.Optional[builtins.str]:
607
576
  '''The source port range starts from this port number.
608
577
 
609
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
578
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
610
579
  '''
611
580
  result = self._values.get("source_port_start")
612
581
  return typing.cast(typing.Optional[builtins.str], result)
@@ -1055,11 +1024,10 @@ publication.publish()
1055
1024
 
1056
1025
  def _typecheckingstub__3dd7e6461a1cb9b9f531749add09b10411da35a685dbccc19e6eae9f39484aba(
1057
1026
  scope: _constructs_77d1e7e8.Construct,
1058
- id_: builtins.str,
1027
+ id: builtins.str,
1059
1028
  *,
1060
- firewall_rule: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[FirewallRulesFirewallRule, typing.Dict[builtins.str, typing.Any]]]],
1061
1029
  server_id: builtins.str,
1062
- id: typing.Optional[builtins.str] = None,
1030
+ firewall_rule: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[FirewallRulesFirewallRule, typing.Dict[builtins.str, typing.Any]]]]] = None,
1063
1031
  connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
1064
1032
  count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
1065
1033
  depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
@@ -1086,12 +1054,6 @@ def _typecheckingstub__a2bed86233110e50c69609c787a79a37508bd2b39f8c7dd910fe89f65
1086
1054
  """Type checking stubs"""
1087
1055
  pass
1088
1056
 
1089
- def _typecheckingstub__c5b4186580649c1167af5344e5016a17428872cece6b2e01cd0eb7db97a7aa0e(
1090
- value: builtins.str,
1091
- ) -> None:
1092
- """Type checking stubs"""
1093
- pass
1094
-
1095
1057
  def _typecheckingstub__58d36060cbaa53ac44e8eee4a67ae3fb2b894aa4b92b5809a705a5d3073ea15f(
1096
1058
  value: builtins.str,
1097
1059
  ) -> None:
@@ -1107,9 +1069,8 @@ def _typecheckingstub__1ead3fa66c8a64e9f8e657b68d25827ef2a936835b7d7dd2169abd3f3
1107
1069
  lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
1108
1070
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
1109
1071
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
1110
- firewall_rule: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[FirewallRulesFirewallRule, typing.Dict[builtins.str, typing.Any]]]],
1111
1072
  server_id: builtins.str,
1112
- id: typing.Optional[builtins.str] = None,
1073
+ firewall_rule: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[FirewallRulesFirewallRule, typing.Dict[builtins.str, typing.Any]]]]] = None,
1113
1074
  ) -> None:
1114
1075
  """Type checking stubs"""
1115
1076
  pass
@@ -1,7 +1,7 @@
1
1
  r'''
2
2
  # `upcloud_floating_ip_address`
3
3
 
4
- Refer to the Terraform Registry for docs: [`upcloud_floating_ip_address`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/floating_ip_address).
4
+ Refer to the Terraform Registry for docs: [`upcloud_floating_ip_address`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -44,7 +44,7 @@ class FloatingIpAddress(
44
44
  metaclass=jsii.JSIIMeta,
45
45
  jsii_type="@cdktf/provider-upcloud.floatingIpAddress.FloatingIpAddress",
46
46
  ):
47
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/floating_ip_address upcloud_floating_ip_address}.'''
47
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address upcloud_floating_ip_address}.'''
48
48
 
49
49
  def __init__(
50
50
  self,
@@ -63,14 +63,14 @@ class FloatingIpAddress(
63
63
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
64
64
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
65
65
  ) -> None:
66
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/floating_ip_address upcloud_floating_ip_address} Resource.
66
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address upcloud_floating_ip_address} Resource.
67
67
 
68
68
  :param scope: The scope in which to define this construct.
69
69
  :param id: The scoped construct ID. Must be unique amongst siblings in the same scope
70
- :param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/floating_ip_address#access FloatingIpAddress#access}
71
- :param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/floating_ip_address#family FloatingIpAddress#family}
72
- :param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
73
- :param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
70
+ :param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#access FloatingIpAddress#access}
71
+ :param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#family FloatingIpAddress#family}
72
+ :param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
73
+ :param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
74
74
  :param connection:
75
75
  :param count:
76
76
  :param depends_on:
@@ -112,7 +112,7 @@ class FloatingIpAddress(
112
112
 
113
113
  :param scope: The scope in which to define this construct.
114
114
  :param import_to_id: The construct id used in the generated config for the FloatingIpAddress to import.
115
- :param import_from_id: The id of the existing FloatingIpAddress that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/floating_ip_address#import import section} in the documentation of this resource for the id to use
115
+ :param import_from_id: The id of the existing FloatingIpAddress that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#import import section} in the documentation of this resource for the id to use
116
116
  :param provider: ? Optional instance of the provider where the FloatingIpAddress to import is found.
117
117
  '''
118
118
  if __debug__:
@@ -272,10 +272,10 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
272
272
  :param lifecycle:
273
273
  :param provider:
274
274
  :param provisioners:
275
- :param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/floating_ip_address#access FloatingIpAddress#access}
276
- :param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/floating_ip_address#family FloatingIpAddress#family}
277
- :param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
278
- :param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
275
+ :param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#access FloatingIpAddress#access}
276
+ :param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#family FloatingIpAddress#family}
277
+ :param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
278
+ :param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
279
279
  '''
280
280
  if isinstance(lifecycle, dict):
281
281
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -384,7 +384,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
384
384
  def access(self) -> typing.Optional[builtins.str]:
385
385
  '''Network access for the floating IP address. Supported value: ``public``.
386
386
 
387
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/floating_ip_address#access FloatingIpAddress#access}
387
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#access FloatingIpAddress#access}
388
388
  '''
389
389
  result = self._values.get("access")
390
390
  return typing.cast(typing.Optional[builtins.str], result)
@@ -393,7 +393,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
393
393
  def family(self) -> typing.Optional[builtins.str]:
394
394
  '''The address family of the floating IP address.
395
395
 
396
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/floating_ip_address#family FloatingIpAddress#family}
396
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#family FloatingIpAddress#family}
397
397
  '''
398
398
  result = self._values.get("family")
399
399
  return typing.cast(typing.Optional[builtins.str], result)
@@ -402,7 +402,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
402
402
  def mac_address(self) -> typing.Optional[builtins.str]:
403
403
  '''MAC address of a server interface to assign address to.
404
404
 
405
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
405
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
406
406
  '''
407
407
  result = self._values.get("mac_address")
408
408
  return typing.cast(typing.Optional[builtins.str], result)
@@ -411,7 +411,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
411
411
  def zone(self) -> typing.Optional[builtins.str]:
412
412
  '''Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``.
413
413
 
414
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
414
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.22.1/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
415
415
  '''
416
416
  result = self._values.get("zone")
417
417
  return typing.cast(typing.Optional[builtins.str], result)