cdktf-cdktf-provider-upcloud 15.2.2__py3-none-any.whl → 15.3.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.

Files changed (69) hide show
  1. cdktf_cdktf_provider_upcloud/__init__.py +3 -3
  2. cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
  3. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.3.0.jsii.tgz +0 -0
  4. cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +9 -9
  5. cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +12 -7
  6. cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +7 -7
  7. cdktf_cdktf_provider_upcloud/data_upcloud_load_balancer_dns_challenge_domain/__init__.py +4 -4
  8. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
  9. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
  10. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
  11. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
  12. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_valkey_sessions/__init__.py +22 -22
  13. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +10 -10
  14. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
  15. cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
  16. cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +28 -28
  17. cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
  18. cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
  19. cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +7 -7
  20. cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +38 -38
  21. cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +63 -16
  22. cdktf_cdktf_provider_upcloud/gateway/__init__.py +37 -37
  23. cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +34 -34
  24. cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +61 -61
  25. cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +34 -34
  26. cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +72 -72
  27. cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +392 -39
  28. cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +46 -46
  29. cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +13 -13
  30. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +25 -25
  31. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +13 -13
  32. cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +33 -33
  33. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +228 -228
  34. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +13 -13
  35. cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +16 -16
  36. cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +28 -28
  37. cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +25 -25
  38. cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
  39. cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +210 -210
  40. cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +594 -594
  41. cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +366 -366
  42. cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +132 -132
  43. cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +65 -65
  44. cdktf_cdktf_provider_upcloud/managed_database_valkey/__init__.py +135 -135
  45. cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +30 -30
  46. cdktf_cdktf_provider_upcloud/managed_object_storage_bucket/__init__.py +10 -10
  47. cdktf_cdktf_provider_upcloud/managed_object_storage_custom_domain/__init__.py +13 -13
  48. cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +16 -16
  49. cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +13 -13
  50. cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +16 -16
  51. cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +16 -16
  52. cdktf_cdktf_provider_upcloud/network/__init__.py +33 -33
  53. cdktf_cdktf_provider_upcloud/network_peering/__init__.py +23 -23
  54. cdktf_cdktf_provider_upcloud/object_storage/__init__.py +30 -30
  55. cdktf_cdktf_provider_upcloud/provider/__init__.py +28 -28
  56. cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
  57. cdktf_cdktf_provider_upcloud/server/__init__.py +139 -139
  58. cdktf_cdktf_provider_upcloud/server_group/__init__.py +19 -19
  59. cdktf_cdktf_provider_upcloud/storage/__init__.py +51 -51
  60. cdktf_cdktf_provider_upcloud/storage_backup/__init__.py +13 -13
  61. cdktf_cdktf_provider_upcloud/storage_template/__init__.py +13 -13
  62. cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
  63. {cdktf_cdktf_provider_upcloud-15.2.2.dist-info → cdktf_cdktf_provider_upcloud-15.3.0.dist-info}/METADATA +5 -5
  64. cdktf_cdktf_provider_upcloud-15.3.0.dist-info/RECORD +68 -0
  65. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.2.2.jsii.tgz +0 -0
  66. cdktf_cdktf_provider_upcloud-15.2.2.dist-info/RECORD +0 -68
  67. {cdktf_cdktf_provider_upcloud-15.2.2.dist-info → cdktf_cdktf_provider_upcloud-15.3.0.dist-info}/LICENSE +0 -0
  68. {cdktf_cdktf_provider_upcloud-15.2.2.dist-info → cdktf_cdktf_provider_upcloud-15.3.0.dist-info}/WHEEL +0 -0
  69. {cdktf_cdktf_provider_upcloud-15.2.2.dist-info → cdktf_cdktf_provider_upcloud-15.3.0.dist-info}/top_level.txt +0 -0
@@ -1,7 +1,7 @@
1
1
  r'''
2
2
  # `upcloud_firewall_rules`
3
3
 
4
- Refer to the Terraform Registry for docs: [`upcloud_firewall_rules`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules).
4
+ Refer to the Terraform Registry for docs: [`upcloud_firewall_rules`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -44,7 +44,7 @@ class FirewallRules(
44
44
  metaclass=jsii.JSIIMeta,
45
45
  jsii_type="@cdktf/provider-upcloud.firewallRules.FirewallRules",
46
46
  ):
47
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules upcloud_firewall_rules}.'''
47
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules upcloud_firewall_rules}.'''
48
48
 
49
49
  def __init__(
50
50
  self,
@@ -61,12 +61,12 @@ class FirewallRules(
61
61
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
62
62
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
63
63
  ) -> None:
64
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules upcloud_firewall_rules} Resource.
64
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules upcloud_firewall_rules} Resource.
65
65
 
66
66
  :param scope: The scope in which to define this construct.
67
67
  :param id: The scoped construct ID. Must be unique amongst siblings in the same scope
68
- :param server_id: The UUID of the server to be protected with the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#server_id FirewallRules#server_id}
69
- :param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
68
+ :param server_id: The UUID of the server to be protected with the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
69
+ :param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
70
70
  :param connection:
71
71
  :param count:
72
72
  :param depends_on:
@@ -106,7 +106,7 @@ class FirewallRules(
106
106
 
107
107
  :param scope: The scope in which to define this construct.
108
108
  :param import_to_id: The construct id used in the generated config for the FirewallRules to import.
109
- :param import_from_id: The id of the existing FirewallRules that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#import import section} in the documentation of this resource for the id to use
109
+ :param import_from_id: The id of the existing FirewallRules that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#import import section} in the documentation of this resource for the id to use
110
110
  :param provider: ? Optional instance of the provider where the FirewallRules to import is found.
111
111
  '''
112
112
  if __debug__:
@@ -219,8 +219,8 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
219
219
  :param lifecycle:
220
220
  :param provider:
221
221
  :param provisioners:
222
- :param server_id: The UUID of the server to be protected with the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#server_id FirewallRules#server_id}
223
- :param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
222
+ :param server_id: The UUID of the server to be protected with the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
223
+ :param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
224
224
  '''
225
225
  if isinstance(lifecycle, dict):
226
226
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -323,7 +323,7 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
323
323
  def server_id(self) -> builtins.str:
324
324
  '''The UUID of the server to be protected with the firewall rules.
325
325
 
326
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#server_id FirewallRules#server_id}
326
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
327
327
  '''
328
328
  result = self._values.get("server_id")
329
329
  assert result is not None, "Required property 'server_id' is missing"
@@ -335,7 +335,7 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
335
335
  ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]]]:
336
336
  '''firewall_rule block.
337
337
 
338
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
338
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
339
339
  '''
340
340
  result = self._values.get("firewall_rule")
341
341
  return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]]], result)
@@ -392,20 +392,20 @@ class FirewallRulesFirewallRule:
392
392
  source_port_start: typing.Optional[builtins.str] = None,
393
393
  ) -> None:
394
394
  '''
395
- :param action: Action to take if the rule conditions are met. Valid values ``accept | drop``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#action FirewallRules#action}
396
- :param direction: The direction of network traffic this rule will be applied to. Valid values are ``in`` and ``out``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#direction FirewallRules#direction}
397
- :param comment: A comment for the rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#comment FirewallRules#comment}
398
- :param destination_address_end: The destination address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
399
- :param destination_address_start: The destination address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
400
- :param destination_port_end: The destination port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
401
- :param destination_port_start: The destination port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
402
- :param family: The address family of new firewall rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#family FirewallRules#family}
403
- :param icmp_type: The ICMP type of the rule. Only valid if protocol is ICMP. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
404
- :param protocol: The protocol of the rule. Possible values are `` (empty), ``tcp``, ``udp``, ``icmp``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#protocol FirewallRules#protocol}
405
- :param source_address_end: The source address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
406
- :param source_address_start: The source address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
407
- :param source_port_end: The source port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
408
- :param source_port_start: The source port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
395
+ :param action: Action to take if the rule conditions are met. Valid values ``accept | drop``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#action FirewallRules#action}
396
+ :param direction: The direction of network traffic this rule will be applied to. Valid values are ``in`` and ``out``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#direction FirewallRules#direction}
397
+ :param comment: A comment for the rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#comment FirewallRules#comment}
398
+ :param destination_address_end: The destination address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
399
+ :param destination_address_start: The destination address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
400
+ :param destination_port_end: The destination port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
401
+ :param destination_port_start: The destination port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
402
+ :param family: The address family of new firewall rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#family FirewallRules#family}
403
+ :param icmp_type: The ICMP type of the rule. Only valid if protocol is ICMP. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
404
+ :param protocol: The protocol of the rule. Possible values are `` (empty), ``tcp``, ``udp``, ``icmp``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#protocol FirewallRules#protocol}
405
+ :param source_address_end: The source address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
406
+ :param source_address_start: The source address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
407
+ :param source_port_end: The source port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
408
+ :param source_port_start: The source port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
409
409
  '''
410
410
  if __debug__:
411
411
  type_hints = typing.get_type_hints(_typecheckingstub__9b77e978fb66d25b46f06da19493b15c4f42527dec58b7335729cf86141901af)
@@ -456,7 +456,7 @@ class FirewallRulesFirewallRule:
456
456
  def action(self) -> builtins.str:
457
457
  '''Action to take if the rule conditions are met. Valid values ``accept | drop``.
458
458
 
459
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#action FirewallRules#action}
459
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#action FirewallRules#action}
460
460
  '''
461
461
  result = self._values.get("action")
462
462
  assert result is not None, "Required property 'action' is missing"
@@ -466,7 +466,7 @@ class FirewallRulesFirewallRule:
466
466
  def direction(self) -> builtins.str:
467
467
  '''The direction of network traffic this rule will be applied to. Valid values are ``in`` and ``out``.
468
468
 
469
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#direction FirewallRules#direction}
469
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#direction FirewallRules#direction}
470
470
  '''
471
471
  result = self._values.get("direction")
472
472
  assert result is not None, "Required property 'direction' is missing"
@@ -476,7 +476,7 @@ class FirewallRulesFirewallRule:
476
476
  def comment(self) -> typing.Optional[builtins.str]:
477
477
  '''A comment for the rule.
478
478
 
479
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#comment FirewallRules#comment}
479
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#comment FirewallRules#comment}
480
480
  '''
481
481
  result = self._values.get("comment")
482
482
  return typing.cast(typing.Optional[builtins.str], result)
@@ -485,7 +485,7 @@ class FirewallRulesFirewallRule:
485
485
  def destination_address_end(self) -> typing.Optional[builtins.str]:
486
486
  '''The destination address range ends from this address.
487
487
 
488
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
488
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
489
489
  '''
490
490
  result = self._values.get("destination_address_end")
491
491
  return typing.cast(typing.Optional[builtins.str], result)
@@ -494,7 +494,7 @@ class FirewallRulesFirewallRule:
494
494
  def destination_address_start(self) -> typing.Optional[builtins.str]:
495
495
  '''The destination address range starts from this address.
496
496
 
497
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
497
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
498
498
  '''
499
499
  result = self._values.get("destination_address_start")
500
500
  return typing.cast(typing.Optional[builtins.str], result)
@@ -503,7 +503,7 @@ class FirewallRulesFirewallRule:
503
503
  def destination_port_end(self) -> typing.Optional[builtins.str]:
504
504
  '''The destination port range ends from this port number.
505
505
 
506
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
506
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
507
507
  '''
508
508
  result = self._values.get("destination_port_end")
509
509
  return typing.cast(typing.Optional[builtins.str], result)
@@ -512,7 +512,7 @@ class FirewallRulesFirewallRule:
512
512
  def destination_port_start(self) -> typing.Optional[builtins.str]:
513
513
  '''The destination port range starts from this port number.
514
514
 
515
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
515
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
516
516
  '''
517
517
  result = self._values.get("destination_port_start")
518
518
  return typing.cast(typing.Optional[builtins.str], result)
@@ -521,7 +521,7 @@ class FirewallRulesFirewallRule:
521
521
  def family(self) -> typing.Optional[builtins.str]:
522
522
  '''The address family of new firewall rule.
523
523
 
524
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#family FirewallRules#family}
524
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#family FirewallRules#family}
525
525
  '''
526
526
  result = self._values.get("family")
527
527
  return typing.cast(typing.Optional[builtins.str], result)
@@ -530,7 +530,7 @@ class FirewallRulesFirewallRule:
530
530
  def icmp_type(self) -> typing.Optional[builtins.str]:
531
531
  '''The ICMP type of the rule. Only valid if protocol is ICMP.
532
532
 
533
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
533
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
534
534
  '''
535
535
  result = self._values.get("icmp_type")
536
536
  return typing.cast(typing.Optional[builtins.str], result)
@@ -539,7 +539,7 @@ class FirewallRulesFirewallRule:
539
539
  def protocol(self) -> typing.Optional[builtins.str]:
540
540
  '''The protocol of the rule. Possible values are `` (empty), ``tcp``, ``udp``, ``icmp``.
541
541
 
542
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#protocol FirewallRules#protocol}
542
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#protocol FirewallRules#protocol}
543
543
  '''
544
544
  result = self._values.get("protocol")
545
545
  return typing.cast(typing.Optional[builtins.str], result)
@@ -548,7 +548,7 @@ class FirewallRulesFirewallRule:
548
548
  def source_address_end(self) -> typing.Optional[builtins.str]:
549
549
  '''The source address range ends from this address.
550
550
 
551
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
551
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
552
552
  '''
553
553
  result = self._values.get("source_address_end")
554
554
  return typing.cast(typing.Optional[builtins.str], result)
@@ -557,7 +557,7 @@ class FirewallRulesFirewallRule:
557
557
  def source_address_start(self) -> typing.Optional[builtins.str]:
558
558
  '''The source address range starts from this address.
559
559
 
560
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
560
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
561
561
  '''
562
562
  result = self._values.get("source_address_start")
563
563
  return typing.cast(typing.Optional[builtins.str], result)
@@ -566,7 +566,7 @@ class FirewallRulesFirewallRule:
566
566
  def source_port_end(self) -> typing.Optional[builtins.str]:
567
567
  '''The source port range ends from this port number.
568
568
 
569
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
569
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
570
570
  '''
571
571
  result = self._values.get("source_port_end")
572
572
  return typing.cast(typing.Optional[builtins.str], result)
@@ -575,7 +575,7 @@ class FirewallRulesFirewallRule:
575
575
  def source_port_start(self) -> typing.Optional[builtins.str]:
576
576
  '''The source port range starts from this port number.
577
577
 
578
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
578
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
579
579
  '''
580
580
  result = self._values.get("source_port_start")
581
581
  return typing.cast(typing.Optional[builtins.str], result)
@@ -1,7 +1,7 @@
1
1
  r'''
2
2
  # `upcloud_floating_ip_address`
3
3
 
4
- Refer to the Terraform Registry for docs: [`upcloud_floating_ip_address`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/floating_ip_address).
4
+ Refer to the Terraform Registry for docs: [`upcloud_floating_ip_address`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/floating_ip_address).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -44,7 +44,7 @@ class FloatingIpAddress(
44
44
  metaclass=jsii.JSIIMeta,
45
45
  jsii_type="@cdktf/provider-upcloud.floatingIpAddress.FloatingIpAddress",
46
46
  ):
47
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/floating_ip_address upcloud_floating_ip_address}.'''
47
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/floating_ip_address upcloud_floating_ip_address}.'''
48
48
 
49
49
  def __init__(
50
50
  self,
@@ -54,6 +54,7 @@ class FloatingIpAddress(
54
54
  access: typing.Optional[builtins.str] = None,
55
55
  family: typing.Optional[builtins.str] = None,
56
56
  mac_address: typing.Optional[builtins.str] = None,
57
+ release_policy: typing.Optional[builtins.str] = None,
57
58
  zone: typing.Optional[builtins.str] = None,
58
59
  connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
59
60
  count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
@@ -63,14 +64,15 @@ class FloatingIpAddress(
63
64
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
64
65
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
65
66
  ) -> None:
66
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/floating_ip_address upcloud_floating_ip_address} Resource.
67
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/floating_ip_address upcloud_floating_ip_address} Resource.
67
68
 
68
69
  :param scope: The scope in which to define this construct.
69
70
  :param id: The scoped construct ID. Must be unique amongst siblings in the same scope
70
- :param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/floating_ip_address#access FloatingIpAddress#access}
71
- :param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/floating_ip_address#family FloatingIpAddress#family}
72
- :param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
73
- :param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
71
+ :param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/floating_ip_address#access FloatingIpAddress#access}
72
+ :param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/floating_ip_address#family FloatingIpAddress#family}
73
+ :param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
74
+ :param release_policy: The release policy of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/floating_ip_address#release_policy FloatingIpAddress#release_policy}
75
+ :param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
74
76
  :param connection:
75
77
  :param count:
76
78
  :param depends_on:
@@ -87,6 +89,7 @@ class FloatingIpAddress(
87
89
  access=access,
88
90
  family=family,
89
91
  mac_address=mac_address,
92
+ release_policy=release_policy,
90
93
  zone=zone,
91
94
  connection=connection,
92
95
  count=count,
@@ -112,7 +115,7 @@ class FloatingIpAddress(
112
115
 
113
116
  :param scope: The scope in which to define this construct.
114
117
  :param import_to_id: The construct id used in the generated config for the FloatingIpAddress to import.
115
- :param import_from_id: The id of the existing FloatingIpAddress that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/floating_ip_address#import import section} in the documentation of this resource for the id to use
118
+ :param import_from_id: The id of the existing FloatingIpAddress that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/floating_ip_address#import import section} in the documentation of this resource for the id to use
116
119
  :param provider: ? Optional instance of the provider where the FloatingIpAddress to import is found.
117
120
  '''
118
121
  if __debug__:
@@ -135,6 +138,10 @@ class FloatingIpAddress(
135
138
  def reset_mac_address(self) -> None:
136
139
  return typing.cast(None, jsii.invoke(self, "resetMacAddress", []))
137
140
 
141
+ @jsii.member(jsii_name="resetReleasePolicy")
142
+ def reset_release_policy(self) -> None:
143
+ return typing.cast(None, jsii.invoke(self, "resetReleasePolicy", []))
144
+
138
145
  @jsii.member(jsii_name="resetZone")
139
146
  def reset_zone(self) -> None:
140
147
  return typing.cast(None, jsii.invoke(self, "resetZone", []))
@@ -177,6 +184,11 @@ class FloatingIpAddress(
177
184
  def mac_address_input(self) -> typing.Optional[builtins.str]:
178
185
  return typing.cast(typing.Optional[builtins.str], jsii.get(self, "macAddressInput"))
179
186
 
187
+ @builtins.property
188
+ @jsii.member(jsii_name="releasePolicyInput")
189
+ def release_policy_input(self) -> typing.Optional[builtins.str]:
190
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "releasePolicyInput"))
191
+
180
192
  @builtins.property
181
193
  @jsii.member(jsii_name="zoneInput")
182
194
  def zone_input(self) -> typing.Optional[builtins.str]:
@@ -218,6 +230,18 @@ class FloatingIpAddress(
218
230
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
219
231
  jsii.set(self, "macAddress", value) # pyright: ignore[reportArgumentType]
220
232
 
233
+ @builtins.property
234
+ @jsii.member(jsii_name="releasePolicy")
235
+ def release_policy(self) -> builtins.str:
236
+ return typing.cast(builtins.str, jsii.get(self, "releasePolicy"))
237
+
238
+ @release_policy.setter
239
+ def release_policy(self, value: builtins.str) -> None:
240
+ if __debug__:
241
+ type_hints = typing.get_type_hints(_typecheckingstub__42859f40a28fa6a19b1a2952d7b0b525adb0b1eb3cb67e389cbc4eb13934cb05)
242
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
243
+ jsii.set(self, "releasePolicy", value) # pyright: ignore[reportArgumentType]
244
+
221
245
  @builtins.property
222
246
  @jsii.member(jsii_name="zone")
223
247
  def zone(self) -> builtins.str:
@@ -245,6 +269,7 @@ class FloatingIpAddress(
245
269
  "access": "access",
246
270
  "family": "family",
247
271
  "mac_address": "macAddress",
272
+ "release_policy": "releasePolicy",
248
273
  "zone": "zone",
249
274
  },
250
275
  )
@@ -262,6 +287,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
262
287
  access: typing.Optional[builtins.str] = None,
263
288
  family: typing.Optional[builtins.str] = None,
264
289
  mac_address: typing.Optional[builtins.str] = None,
290
+ release_policy: typing.Optional[builtins.str] = None,
265
291
  zone: typing.Optional[builtins.str] = None,
266
292
  ) -> None:
267
293
  '''
@@ -272,10 +298,11 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
272
298
  :param lifecycle:
273
299
  :param provider:
274
300
  :param provisioners:
275
- :param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/floating_ip_address#access FloatingIpAddress#access}
276
- :param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/floating_ip_address#family FloatingIpAddress#family}
277
- :param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
278
- :param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
301
+ :param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/floating_ip_address#access FloatingIpAddress#access}
302
+ :param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/floating_ip_address#family FloatingIpAddress#family}
303
+ :param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
304
+ :param release_policy: The release policy of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/floating_ip_address#release_policy FloatingIpAddress#release_policy}
305
+ :param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
279
306
  '''
280
307
  if isinstance(lifecycle, dict):
281
308
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -291,6 +318,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
291
318
  check_type(argname="argument access", value=access, expected_type=type_hints["access"])
292
319
  check_type(argname="argument family", value=family, expected_type=type_hints["family"])
293
320
  check_type(argname="argument mac_address", value=mac_address, expected_type=type_hints["mac_address"])
321
+ check_type(argname="argument release_policy", value=release_policy, expected_type=type_hints["release_policy"])
294
322
  check_type(argname="argument zone", value=zone, expected_type=type_hints["zone"])
295
323
  self._values: typing.Dict[builtins.str, typing.Any] = {}
296
324
  if connection is not None:
@@ -313,6 +341,8 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
313
341
  self._values["family"] = family
314
342
  if mac_address is not None:
315
343
  self._values["mac_address"] = mac_address
344
+ if release_policy is not None:
345
+ self._values["release_policy"] = release_policy
316
346
  if zone is not None:
317
347
  self._values["zone"] = zone
318
348
 
@@ -384,7 +414,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
384
414
  def access(self) -> typing.Optional[builtins.str]:
385
415
  '''Network access for the floating IP address. Supported value: ``public``.
386
416
 
387
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/floating_ip_address#access FloatingIpAddress#access}
417
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/floating_ip_address#access FloatingIpAddress#access}
388
418
  '''
389
419
  result = self._values.get("access")
390
420
  return typing.cast(typing.Optional[builtins.str], result)
@@ -393,7 +423,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
393
423
  def family(self) -> typing.Optional[builtins.str]:
394
424
  '''The address family of the floating IP address.
395
425
 
396
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/floating_ip_address#family FloatingIpAddress#family}
426
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/floating_ip_address#family FloatingIpAddress#family}
397
427
  '''
398
428
  result = self._values.get("family")
399
429
  return typing.cast(typing.Optional[builtins.str], result)
@@ -402,16 +432,25 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
402
432
  def mac_address(self) -> typing.Optional[builtins.str]:
403
433
  '''MAC address of a server interface to assign address to.
404
434
 
405
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
435
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
406
436
  '''
407
437
  result = self._values.get("mac_address")
408
438
  return typing.cast(typing.Optional[builtins.str], result)
409
439
 
440
+ @builtins.property
441
+ def release_policy(self) -> typing.Optional[builtins.str]:
442
+ '''The release policy of the floating IP address.
443
+
444
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/floating_ip_address#release_policy FloatingIpAddress#release_policy}
445
+ '''
446
+ result = self._values.get("release_policy")
447
+ return typing.cast(typing.Optional[builtins.str], result)
448
+
410
449
  @builtins.property
411
450
  def zone(self) -> typing.Optional[builtins.str]:
412
451
  '''Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``.
413
452
 
414
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
453
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
415
454
  '''
416
455
  result = self._values.get("zone")
417
456
  return typing.cast(typing.Optional[builtins.str], result)
@@ -442,6 +481,7 @@ def _typecheckingstub__7a3a86334a576ee93e97cd5fa8f741a8da8f869742ea13315b33ceeec
442
481
  access: typing.Optional[builtins.str] = None,
443
482
  family: typing.Optional[builtins.str] = None,
444
483
  mac_address: typing.Optional[builtins.str] = None,
484
+ release_policy: typing.Optional[builtins.str] = None,
445
485
  zone: typing.Optional[builtins.str] = None,
446
486
  connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
447
487
  count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
@@ -481,6 +521,12 @@ def _typecheckingstub__3a3d0104fe4b695d7b1611f86c494909bc09134ac2baddb967a1813ed
481
521
  """Type checking stubs"""
482
522
  pass
483
523
 
524
+ def _typecheckingstub__42859f40a28fa6a19b1a2952d7b0b525adb0b1eb3cb67e389cbc4eb13934cb05(
525
+ value: builtins.str,
526
+ ) -> None:
527
+ """Type checking stubs"""
528
+ pass
529
+
484
530
  def _typecheckingstub__9fde6c724c2f94096e73a2a357f4481f0bd702fb413194265669772572245090(
485
531
  value: builtins.str,
486
532
  ) -> None:
@@ -499,6 +545,7 @@ def _typecheckingstub__d77934c8fe141a2f7da0915ddfad6f183a3295e3e3e9c279b458e3a16
499
545
  access: typing.Optional[builtins.str] = None,
500
546
  family: typing.Optional[builtins.str] = None,
501
547
  mac_address: typing.Optional[builtins.str] = None,
548
+ release_policy: typing.Optional[builtins.str] = None,
502
549
  zone: typing.Optional[builtins.str] = None,
503
550
  ) -> None:
504
551
  """Type checking stubs"""