cdktf-cdktf-provider-upcloud 15.2.2__py3-none-any.whl → 15.3.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +3 -3
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.3.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +9 -9
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +12 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_load_balancer_dns_challenge_domain/__init__.py +4 -4
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_valkey_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +38 -38
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +63 -16
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +37 -37
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +34 -34
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +61 -61
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +34 -34
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +72 -72
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +392 -39
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +46 -46
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +33 -33
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +228 -228
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +210 -210
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +594 -594
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +366 -366
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +132 -132
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +65 -65
- cdktf_cdktf_provider_upcloud/managed_database_valkey/__init__.py +135 -135
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/managed_object_storage_bucket/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/managed_object_storage_custom_domain/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/network/__init__.py +33 -33
- cdktf_cdktf_provider_upcloud/network_peering/__init__.py +23 -23
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/provider/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/server/__init__.py +139 -139
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/storage/__init__.py +51 -51
- cdktf_cdktf_provider_upcloud/storage_backup/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/storage_template/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
- {cdktf_cdktf_provider_upcloud-15.2.2.dist-info → cdktf_cdktf_provider_upcloud-15.3.0.dist-info}/METADATA +5 -5
- cdktf_cdktf_provider_upcloud-15.3.0.dist-info/RECORD +68 -0
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.2.2.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-15.2.2.dist-info/RECORD +0 -68
- {cdktf_cdktf_provider_upcloud-15.2.2.dist-info → cdktf_cdktf_provider_upcloud-15.3.0.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-15.2.2.dist-info → cdktf_cdktf_provider_upcloud-15.3.0.dist-info}/WHEEL +0 -0
- {cdktf_cdktf_provider_upcloud-15.2.2.dist-info → cdktf_cdktf_provider_upcloud-15.3.0.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_gateway_connection_tunnel`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_gateway_connection_tunnel`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_gateway_connection_tunnel`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -44,7 +44,7 @@ class GatewayConnectionTunnel(
|
|
|
44
44
|
metaclass=jsii.JSIIMeta,
|
|
45
45
|
jsii_type="@cdktf/provider-upcloud.gatewayConnectionTunnel.GatewayConnectionTunnel",
|
|
46
46
|
):
|
|
47
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
47
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel upcloud_gateway_connection_tunnel}.'''
|
|
48
48
|
|
|
49
49
|
def __init__(
|
|
50
50
|
self,
|
|
@@ -66,17 +66,17 @@ class GatewayConnectionTunnel(
|
|
|
66
66
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
67
67
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
68
68
|
) -> None:
|
|
69
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
69
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel upcloud_gateway_connection_tunnel} Resource.
|
|
70
70
|
|
|
71
71
|
:param scope: The scope in which to define this construct.
|
|
72
72
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
73
|
-
:param connection_id: ID of the upcloud_gateway_connection resource to which the tunnel belongs. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
74
|
-
:param ipsec_auth_psk: ipsec_auth_psk block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
75
|
-
:param local_address_name: Public (UpCloud) endpoint address of this tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
76
|
-
:param name: The name of the tunnel, should be unique within the connection. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
77
|
-
:param remote_address: Remote public IP address of the tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
78
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
79
|
-
:param ipsec_properties: ipsec_properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
73
|
+
:param connection_id: ID of the upcloud_gateway_connection resource to which the tunnel belongs. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#connection_id GatewayConnectionTunnel#connection_id}
|
|
74
|
+
:param ipsec_auth_psk: ipsec_auth_psk block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#ipsec_auth_psk GatewayConnectionTunnel#ipsec_auth_psk}
|
|
75
|
+
:param local_address_name: Public (UpCloud) endpoint address of this tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#local_address_name GatewayConnectionTunnel#local_address_name}
|
|
76
|
+
:param name: The name of the tunnel, should be unique within the connection. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#name GatewayConnectionTunnel#name}
|
|
77
|
+
:param remote_address: Remote public IP address of the tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#remote_address GatewayConnectionTunnel#remote_address}
|
|
78
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#id GatewayConnectionTunnel#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
79
|
+
:param ipsec_properties: ipsec_properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#ipsec_properties GatewayConnectionTunnel#ipsec_properties}
|
|
80
80
|
:param connection:
|
|
81
81
|
:param count:
|
|
82
82
|
:param depends_on:
|
|
@@ -121,7 +121,7 @@ class GatewayConnectionTunnel(
|
|
|
121
121
|
|
|
122
122
|
:param scope: The scope in which to define this construct.
|
|
123
123
|
:param import_to_id: The construct id used in the generated config for the GatewayConnectionTunnel to import.
|
|
124
|
-
:param import_from_id: The id of the existing GatewayConnectionTunnel that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
124
|
+
:param import_from_id: The id of the existing GatewayConnectionTunnel that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#import import section} in the documentation of this resource for the id to use
|
|
125
125
|
:param provider: ? Optional instance of the provider where the GatewayConnectionTunnel to import is found.
|
|
126
126
|
'''
|
|
127
127
|
if __debug__:
|
|
@@ -135,7 +135,7 @@ class GatewayConnectionTunnel(
|
|
|
135
135
|
@jsii.member(jsii_name="putIpsecAuthPsk")
|
|
136
136
|
def put_ipsec_auth_psk(self, *, psk: builtins.str) -> None:
|
|
137
137
|
'''
|
|
138
|
-
:param psk: The pre-shared key. This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
138
|
+
:param psk: The pre-shared key. This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#psk GatewayConnectionTunnel#psk}
|
|
139
139
|
'''
|
|
140
140
|
value = GatewayConnectionTunnelIpsecAuthPsk(psk=psk)
|
|
141
141
|
|
|
@@ -158,17 +158,17 @@ class GatewayConnectionTunnel(
|
|
|
158
158
|
rekey_time: typing.Optional[jsii.Number] = None,
|
|
159
159
|
) -> None:
|
|
160
160
|
'''
|
|
161
|
-
:param child_rekey_time: IKE child SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
162
|
-
:param dpd_delay: Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
163
|
-
:param dpd_timeout: Timeout period for DPD reply before considering the peer to be dead, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
164
|
-
:param ike_lifetime: Maximum IKE SA lifetime in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
165
|
-
:param phase1_algorithms: List of Phase 1: Proposal algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
166
|
-
:param phase1_dh_group_numbers: List of Phase 1 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
167
|
-
:param phase1_integrity_algorithms: List of Phase 1 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
168
|
-
:param phase2_algorithms: List of Phase 2: Security Association algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
169
|
-
:param phase2_dh_group_numbers: List of Phase 2 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
170
|
-
:param phase2_integrity_algorithms: List of Phase 2 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
171
|
-
:param rekey_time: IKE SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
161
|
+
:param child_rekey_time: IKE child SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#child_rekey_time GatewayConnectionTunnel#child_rekey_time}
|
|
162
|
+
:param dpd_delay: Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#dpd_delay GatewayConnectionTunnel#dpd_delay}
|
|
163
|
+
:param dpd_timeout: Timeout period for DPD reply before considering the peer to be dead, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#dpd_timeout GatewayConnectionTunnel#dpd_timeout}
|
|
164
|
+
:param ike_lifetime: Maximum IKE SA lifetime in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#ike_lifetime GatewayConnectionTunnel#ike_lifetime}
|
|
165
|
+
:param phase1_algorithms: List of Phase 1: Proposal algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase1_algorithms GatewayConnectionTunnel#phase1_algorithms}
|
|
166
|
+
:param phase1_dh_group_numbers: List of Phase 1 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase1_dh_group_numbers GatewayConnectionTunnel#phase1_dh_group_numbers}
|
|
167
|
+
:param phase1_integrity_algorithms: List of Phase 1 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase1_integrity_algorithms GatewayConnectionTunnel#phase1_integrity_algorithms}
|
|
168
|
+
:param phase2_algorithms: List of Phase 2: Security Association algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase2_algorithms GatewayConnectionTunnel#phase2_algorithms}
|
|
169
|
+
:param phase2_dh_group_numbers: List of Phase 2 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase2_dh_group_numbers GatewayConnectionTunnel#phase2_dh_group_numbers}
|
|
170
|
+
:param phase2_integrity_algorithms: List of Phase 2 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase2_integrity_algorithms GatewayConnectionTunnel#phase2_integrity_algorithms}
|
|
171
|
+
:param rekey_time: IKE SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#rekey_time GatewayConnectionTunnel#rekey_time}
|
|
172
172
|
'''
|
|
173
173
|
value = GatewayConnectionTunnelIpsecProperties(
|
|
174
174
|
child_rekey_time=child_rekey_time,
|
|
@@ -376,13 +376,13 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
376
376
|
:param lifecycle:
|
|
377
377
|
:param provider:
|
|
378
378
|
:param provisioners:
|
|
379
|
-
:param connection_id: ID of the upcloud_gateway_connection resource to which the tunnel belongs. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
380
|
-
:param ipsec_auth_psk: ipsec_auth_psk block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
381
|
-
:param local_address_name: Public (UpCloud) endpoint address of this tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
382
|
-
:param name: The name of the tunnel, should be unique within the connection. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
383
|
-
:param remote_address: Remote public IP address of the tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
384
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
385
|
-
:param ipsec_properties: ipsec_properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
379
|
+
:param connection_id: ID of the upcloud_gateway_connection resource to which the tunnel belongs. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#connection_id GatewayConnectionTunnel#connection_id}
|
|
380
|
+
:param ipsec_auth_psk: ipsec_auth_psk block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#ipsec_auth_psk GatewayConnectionTunnel#ipsec_auth_psk}
|
|
381
|
+
:param local_address_name: Public (UpCloud) endpoint address of this tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#local_address_name GatewayConnectionTunnel#local_address_name}
|
|
382
|
+
:param name: The name of the tunnel, should be unique within the connection. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#name GatewayConnectionTunnel#name}
|
|
383
|
+
:param remote_address: Remote public IP address of the tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#remote_address GatewayConnectionTunnel#remote_address}
|
|
384
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#id GatewayConnectionTunnel#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
385
|
+
:param ipsec_properties: ipsec_properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#ipsec_properties GatewayConnectionTunnel#ipsec_properties}
|
|
386
386
|
'''
|
|
387
387
|
if isinstance(lifecycle, dict):
|
|
388
388
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -500,7 +500,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
500
500
|
def connection_id(self) -> builtins.str:
|
|
501
501
|
'''ID of the upcloud_gateway_connection resource to which the tunnel belongs.
|
|
502
502
|
|
|
503
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
503
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#connection_id GatewayConnectionTunnel#connection_id}
|
|
504
504
|
'''
|
|
505
505
|
result = self._values.get("connection_id")
|
|
506
506
|
assert result is not None, "Required property 'connection_id' is missing"
|
|
@@ -510,7 +510,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
510
510
|
def ipsec_auth_psk(self) -> "GatewayConnectionTunnelIpsecAuthPsk":
|
|
511
511
|
'''ipsec_auth_psk block.
|
|
512
512
|
|
|
513
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
513
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#ipsec_auth_psk GatewayConnectionTunnel#ipsec_auth_psk}
|
|
514
514
|
'''
|
|
515
515
|
result = self._values.get("ipsec_auth_psk")
|
|
516
516
|
assert result is not None, "Required property 'ipsec_auth_psk' is missing"
|
|
@@ -520,7 +520,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
520
520
|
def local_address_name(self) -> builtins.str:
|
|
521
521
|
'''Public (UpCloud) endpoint address of this tunnel.
|
|
522
522
|
|
|
523
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
523
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#local_address_name GatewayConnectionTunnel#local_address_name}
|
|
524
524
|
'''
|
|
525
525
|
result = self._values.get("local_address_name")
|
|
526
526
|
assert result is not None, "Required property 'local_address_name' is missing"
|
|
@@ -530,7 +530,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
530
530
|
def name(self) -> builtins.str:
|
|
531
531
|
'''The name of the tunnel, should be unique within the connection.
|
|
532
532
|
|
|
533
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
533
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#name GatewayConnectionTunnel#name}
|
|
534
534
|
'''
|
|
535
535
|
result = self._values.get("name")
|
|
536
536
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -540,7 +540,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
540
540
|
def remote_address(self) -> builtins.str:
|
|
541
541
|
'''Remote public IP address of the tunnel.
|
|
542
542
|
|
|
543
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
543
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#remote_address GatewayConnectionTunnel#remote_address}
|
|
544
544
|
'''
|
|
545
545
|
result = self._values.get("remote_address")
|
|
546
546
|
assert result is not None, "Required property 'remote_address' is missing"
|
|
@@ -548,7 +548,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
548
548
|
|
|
549
549
|
@builtins.property
|
|
550
550
|
def id(self) -> typing.Optional[builtins.str]:
|
|
551
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
551
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#id GatewayConnectionTunnel#id}.
|
|
552
552
|
|
|
553
553
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
554
554
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -562,7 +562,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
562
562
|
) -> typing.Optional["GatewayConnectionTunnelIpsecProperties"]:
|
|
563
563
|
'''ipsec_properties block.
|
|
564
564
|
|
|
565
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
565
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#ipsec_properties GatewayConnectionTunnel#ipsec_properties}
|
|
566
566
|
'''
|
|
567
567
|
result = self._values.get("ipsec_properties")
|
|
568
568
|
return typing.cast(typing.Optional["GatewayConnectionTunnelIpsecProperties"], result)
|
|
@@ -587,7 +587,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
587
587
|
class GatewayConnectionTunnelIpsecAuthPsk:
|
|
588
588
|
def __init__(self, *, psk: builtins.str) -> None:
|
|
589
589
|
'''
|
|
590
|
-
:param psk: The pre-shared key. This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
590
|
+
:param psk: The pre-shared key. This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#psk GatewayConnectionTunnel#psk}
|
|
591
591
|
'''
|
|
592
592
|
if __debug__:
|
|
593
593
|
type_hints = typing.get_type_hints(_typecheckingstub__87c835e7d7c5605931c1ca38462874908e77d68cd5b951debc157a3d43ca979a)
|
|
@@ -602,7 +602,7 @@ class GatewayConnectionTunnelIpsecAuthPsk:
|
|
|
602
602
|
|
|
603
603
|
This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one.
|
|
604
604
|
|
|
605
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
605
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#psk GatewayConnectionTunnel#psk}
|
|
606
606
|
'''
|
|
607
607
|
result = self._values.get("psk")
|
|
608
608
|
assert result is not None, "Required property 'psk' is missing"
|
|
@@ -707,17 +707,17 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
707
707
|
rekey_time: typing.Optional[jsii.Number] = None,
|
|
708
708
|
) -> None:
|
|
709
709
|
'''
|
|
710
|
-
:param child_rekey_time: IKE child SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
711
|
-
:param dpd_delay: Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
712
|
-
:param dpd_timeout: Timeout period for DPD reply before considering the peer to be dead, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
713
|
-
:param ike_lifetime: Maximum IKE SA lifetime in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
714
|
-
:param phase1_algorithms: List of Phase 1: Proposal algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
715
|
-
:param phase1_dh_group_numbers: List of Phase 1 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
716
|
-
:param phase1_integrity_algorithms: List of Phase 1 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
717
|
-
:param phase2_algorithms: List of Phase 2: Security Association algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
718
|
-
:param phase2_dh_group_numbers: List of Phase 2 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
719
|
-
:param phase2_integrity_algorithms: List of Phase 2 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
720
|
-
:param rekey_time: IKE SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
710
|
+
:param child_rekey_time: IKE child SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#child_rekey_time GatewayConnectionTunnel#child_rekey_time}
|
|
711
|
+
:param dpd_delay: Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#dpd_delay GatewayConnectionTunnel#dpd_delay}
|
|
712
|
+
:param dpd_timeout: Timeout period for DPD reply before considering the peer to be dead, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#dpd_timeout GatewayConnectionTunnel#dpd_timeout}
|
|
713
|
+
:param ike_lifetime: Maximum IKE SA lifetime in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#ike_lifetime GatewayConnectionTunnel#ike_lifetime}
|
|
714
|
+
:param phase1_algorithms: List of Phase 1: Proposal algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase1_algorithms GatewayConnectionTunnel#phase1_algorithms}
|
|
715
|
+
:param phase1_dh_group_numbers: List of Phase 1 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase1_dh_group_numbers GatewayConnectionTunnel#phase1_dh_group_numbers}
|
|
716
|
+
:param phase1_integrity_algorithms: List of Phase 1 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase1_integrity_algorithms GatewayConnectionTunnel#phase1_integrity_algorithms}
|
|
717
|
+
:param phase2_algorithms: List of Phase 2: Security Association algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase2_algorithms GatewayConnectionTunnel#phase2_algorithms}
|
|
718
|
+
:param phase2_dh_group_numbers: List of Phase 2 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase2_dh_group_numbers GatewayConnectionTunnel#phase2_dh_group_numbers}
|
|
719
|
+
:param phase2_integrity_algorithms: List of Phase 2 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase2_integrity_algorithms GatewayConnectionTunnel#phase2_integrity_algorithms}
|
|
720
|
+
:param rekey_time: IKE SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#rekey_time GatewayConnectionTunnel#rekey_time}
|
|
721
721
|
'''
|
|
722
722
|
if __debug__:
|
|
723
723
|
type_hints = typing.get_type_hints(_typecheckingstub__a50b18894047098027d5d6be1b8a41d8e32b22c4297ebea79c281f4c838921f4)
|
|
@@ -760,7 +760,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
760
760
|
def child_rekey_time(self) -> typing.Optional[jsii.Number]:
|
|
761
761
|
'''IKE child SA rekey time in seconds.
|
|
762
762
|
|
|
763
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
763
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#child_rekey_time GatewayConnectionTunnel#child_rekey_time}
|
|
764
764
|
'''
|
|
765
765
|
result = self._values.get("child_rekey_time")
|
|
766
766
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -769,7 +769,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
769
769
|
def dpd_delay(self) -> typing.Optional[jsii.Number]:
|
|
770
770
|
'''Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds.
|
|
771
771
|
|
|
772
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
772
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#dpd_delay GatewayConnectionTunnel#dpd_delay}
|
|
773
773
|
'''
|
|
774
774
|
result = self._values.get("dpd_delay")
|
|
775
775
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -778,7 +778,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
778
778
|
def dpd_timeout(self) -> typing.Optional[jsii.Number]:
|
|
779
779
|
'''Timeout period for DPD reply before considering the peer to be dead, in seconds.
|
|
780
780
|
|
|
781
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
781
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#dpd_timeout GatewayConnectionTunnel#dpd_timeout}
|
|
782
782
|
'''
|
|
783
783
|
result = self._values.get("dpd_timeout")
|
|
784
784
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -787,7 +787,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
787
787
|
def ike_lifetime(self) -> typing.Optional[jsii.Number]:
|
|
788
788
|
'''Maximum IKE SA lifetime in seconds.
|
|
789
789
|
|
|
790
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
790
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#ike_lifetime GatewayConnectionTunnel#ike_lifetime}
|
|
791
791
|
'''
|
|
792
792
|
result = self._values.get("ike_lifetime")
|
|
793
793
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -796,7 +796,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
796
796
|
def phase1_algorithms(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
797
797
|
'''List of Phase 1: Proposal algorithms.
|
|
798
798
|
|
|
799
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
799
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase1_algorithms GatewayConnectionTunnel#phase1_algorithms}
|
|
800
800
|
'''
|
|
801
801
|
result = self._values.get("phase1_algorithms")
|
|
802
802
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -805,7 +805,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
805
805
|
def phase1_dh_group_numbers(self) -> typing.Optional[typing.List[jsii.Number]]:
|
|
806
806
|
'''List of Phase 1 Diffie-Hellman group numbers.
|
|
807
807
|
|
|
808
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
808
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase1_dh_group_numbers GatewayConnectionTunnel#phase1_dh_group_numbers}
|
|
809
809
|
'''
|
|
810
810
|
result = self._values.get("phase1_dh_group_numbers")
|
|
811
811
|
return typing.cast(typing.Optional[typing.List[jsii.Number]], result)
|
|
@@ -814,7 +814,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
814
814
|
def phase1_integrity_algorithms(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
815
815
|
'''List of Phase 1 integrity algorithms.
|
|
816
816
|
|
|
817
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
817
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase1_integrity_algorithms GatewayConnectionTunnel#phase1_integrity_algorithms}
|
|
818
818
|
'''
|
|
819
819
|
result = self._values.get("phase1_integrity_algorithms")
|
|
820
820
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -823,7 +823,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
823
823
|
def phase2_algorithms(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
824
824
|
'''List of Phase 2: Security Association algorithms.
|
|
825
825
|
|
|
826
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
826
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase2_algorithms GatewayConnectionTunnel#phase2_algorithms}
|
|
827
827
|
'''
|
|
828
828
|
result = self._values.get("phase2_algorithms")
|
|
829
829
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -832,7 +832,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
832
832
|
def phase2_dh_group_numbers(self) -> typing.Optional[typing.List[jsii.Number]]:
|
|
833
833
|
'''List of Phase 2 Diffie-Hellman group numbers.
|
|
834
834
|
|
|
835
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
835
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase2_dh_group_numbers GatewayConnectionTunnel#phase2_dh_group_numbers}
|
|
836
836
|
'''
|
|
837
837
|
result = self._values.get("phase2_dh_group_numbers")
|
|
838
838
|
return typing.cast(typing.Optional[typing.List[jsii.Number]], result)
|
|
@@ -841,7 +841,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
841
841
|
def phase2_integrity_algorithms(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
842
842
|
'''List of Phase 2 integrity algorithms.
|
|
843
843
|
|
|
844
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
844
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase2_integrity_algorithms GatewayConnectionTunnel#phase2_integrity_algorithms}
|
|
845
845
|
'''
|
|
846
846
|
result = self._values.get("phase2_integrity_algorithms")
|
|
847
847
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -850,7 +850,7 @@ class GatewayConnectionTunnelIpsecProperties:
|
|
|
850
850
|
def rekey_time(self) -> typing.Optional[jsii.Number]:
|
|
851
851
|
'''IKE SA rekey time in seconds.
|
|
852
852
|
|
|
853
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
853
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#rekey_time GatewayConnectionTunnel#rekey_time}
|
|
854
854
|
'''
|
|
855
855
|
result = self._values.get("rekey_time")
|
|
856
856
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_kubernetes_cluster`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -44,7 +44,7 @@ class KubernetesCluster(
|
|
|
44
44
|
metaclass=jsii.JSIIMeta,
|
|
45
45
|
jsii_type="@cdktf/provider-upcloud.kubernetesCluster.KubernetesCluster",
|
|
46
46
|
):
|
|
47
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
47
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
|
|
48
48
|
|
|
49
49
|
def __init__(
|
|
50
50
|
self,
|
|
@@ -69,20 +69,20 @@ class KubernetesCluster(
|
|
|
69
69
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
70
70
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
71
71
|
) -> None:
|
|
72
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
72
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
|
|
73
73
|
|
|
74
74
|
:param scope: The scope in which to define this construct.
|
|
75
75
|
:param id: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
76
|
-
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
77
|
-
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
78
|
-
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
79
|
-
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
80
|
-
:param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
81
|
-
:param plan: The pricing plan used for the cluster. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
82
|
-
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
83
|
-
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
84
|
-
:param upgrade_strategy_type: The upgrade strategy to use when changing the cluster ``version``. If not set, ``manual`` strategy will be used by default. When using ``manual`` strategy, you must replace the existing node-groups to update them. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
85
|
-
:param version: Kubernetes version ID, e.g. ``1.31``. You can list available version IDs with ``upctl kubernetes versions``. Note that when changing the cluster version, ``upgrade_strategy`` will be taken into account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
76
|
+
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
77
|
+
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
78
|
+
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
79
|
+
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
80
|
+
:param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
81
|
+
:param plan: The pricing plan used for the cluster. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
82
|
+
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
83
|
+
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
|
|
84
|
+
:param upgrade_strategy_type: The upgrade strategy to use when changing the cluster ``version``. If not set, ``manual`` strategy will be used by default. When using ``manual`` strategy, you must replace the existing node-groups to update them. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#upgrade_strategy_type KubernetesCluster#upgrade_strategy_type}
|
|
85
|
+
:param version: Kubernetes version ID, e.g. ``1.31``. You can list available version IDs with ``upctl kubernetes versions``. Note that when changing the cluster version, ``upgrade_strategy`` will be taken into account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
86
86
|
:param connection:
|
|
87
87
|
:param count:
|
|
88
88
|
:param depends_on:
|
|
@@ -130,7 +130,7 @@ class KubernetesCluster(
|
|
|
130
130
|
|
|
131
131
|
:param scope: The scope in which to define this construct.
|
|
132
132
|
:param import_to_id: The construct id used in the generated config for the KubernetesCluster to import.
|
|
133
|
-
:param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
133
|
+
:param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
|
|
134
134
|
:param provider: ? Optional instance of the provider where the KubernetesCluster to import is found.
|
|
135
135
|
'''
|
|
136
136
|
if __debug__:
|
|
@@ -433,16 +433,16 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
433
433
|
:param lifecycle:
|
|
434
434
|
:param provider:
|
|
435
435
|
:param provisioners:
|
|
436
|
-
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
437
|
-
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
438
|
-
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
439
|
-
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
440
|
-
:param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
441
|
-
:param plan: The pricing plan used for the cluster. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
442
|
-
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
443
|
-
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
444
|
-
:param upgrade_strategy_type: The upgrade strategy to use when changing the cluster ``version``. If not set, ``manual`` strategy will be used by default. When using ``manual`` strategy, you must replace the existing node-groups to update them. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
445
|
-
:param version: Kubernetes version ID, e.g. ``1.31``. You can list available version IDs with ``upctl kubernetes versions``. Note that when changing the cluster version, ``upgrade_strategy`` will be taken into account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
436
|
+
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
437
|
+
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
438
|
+
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
439
|
+
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
440
|
+
:param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
441
|
+
:param plan: The pricing plan used for the cluster. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
442
|
+
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
443
|
+
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
|
|
444
|
+
:param upgrade_strategy_type: The upgrade strategy to use when changing the cluster ``version``. If not set, ``manual`` strategy will be used by default. When using ``manual`` strategy, you must replace the existing node-groups to update them. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#upgrade_strategy_type KubernetesCluster#upgrade_strategy_type}
|
|
445
|
+
:param version: Kubernetes version ID, e.g. ``1.31``. You can list available version IDs with ``upctl kubernetes versions``. Note that when changing the cluster version, ``upgrade_strategy`` will be taken into account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
446
446
|
'''
|
|
447
447
|
if isinstance(lifecycle, dict):
|
|
448
448
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -568,7 +568,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
568
568
|
|
|
569
569
|
To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services.
|
|
570
570
|
|
|
571
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
571
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
572
572
|
'''
|
|
573
573
|
result = self._values.get("control_plane_ip_filter")
|
|
574
574
|
assert result is not None, "Required property 'control_plane_ip_filter' is missing"
|
|
@@ -578,7 +578,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
578
578
|
def name(self) -> builtins.str:
|
|
579
579
|
'''Cluster name. Needs to be unique within the account.
|
|
580
580
|
|
|
581
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
581
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
582
582
|
'''
|
|
583
583
|
result = self._values.get("name")
|
|
584
584
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -588,7 +588,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
588
588
|
def network(self) -> builtins.str:
|
|
589
589
|
'''Network ID for the cluster to run in.
|
|
590
590
|
|
|
591
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
591
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
592
592
|
'''
|
|
593
593
|
result = self._values.get("network")
|
|
594
594
|
assert result is not None, "Required property 'network' is missing"
|
|
@@ -598,7 +598,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
598
598
|
def zone(self) -> builtins.str:
|
|
599
599
|
'''Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``.
|
|
600
600
|
|
|
601
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
601
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
602
602
|
'''
|
|
603
603
|
result = self._values.get("zone")
|
|
604
604
|
assert result is not None, "Required property 'zone' is missing"
|
|
@@ -608,7 +608,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
608
608
|
def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
|
|
609
609
|
'''User defined key-value pairs to classify the cluster.
|
|
610
610
|
|
|
611
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
611
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
612
612
|
'''
|
|
613
613
|
result = self._values.get("labels")
|
|
614
614
|
return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
|
|
@@ -617,7 +617,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
617
617
|
def plan(self) -> typing.Optional[builtins.str]:
|
|
618
618
|
'''The pricing plan used for the cluster. You can list available plans with ``upctl kubernetes plans``.
|
|
619
619
|
|
|
620
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
620
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
621
621
|
'''
|
|
622
622
|
result = self._values.get("plan")
|
|
623
623
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -628,7 +628,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
628
628
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
629
629
|
'''Enable private node groups. Private node groups requires a network that is routed through NAT gateway.
|
|
630
630
|
|
|
631
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
631
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
632
632
|
'''
|
|
633
633
|
result = self._values.get("private_node_groups")
|
|
634
634
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -637,7 +637,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
637
637
|
def storage_encryption(self) -> typing.Optional[builtins.str]:
|
|
638
638
|
'''Set default storage encryption strategy for all nodes in the cluster.
|
|
639
639
|
|
|
640
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
640
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
|
|
641
641
|
'''
|
|
642
642
|
result = self._values.get("storage_encryption")
|
|
643
643
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -648,7 +648,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
648
648
|
|
|
649
649
|
If not set, ``manual`` strategy will be used by default. When using ``manual`` strategy, you must replace the existing node-groups to update them.
|
|
650
650
|
|
|
651
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
651
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#upgrade_strategy_type KubernetesCluster#upgrade_strategy_type}
|
|
652
652
|
'''
|
|
653
653
|
result = self._values.get("upgrade_strategy_type")
|
|
654
654
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -659,7 +659,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
659
659
|
|
|
660
660
|
Note that when changing the cluster version, ``upgrade_strategy`` will be taken into account.
|
|
661
661
|
|
|
662
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
662
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
663
663
|
'''
|
|
664
664
|
result = self._values.get("version")
|
|
665
665
|
return typing.cast(typing.Optional[builtins.str], result)
|