cdktf-cdktf-provider-upcloud 15.2.2__py3-none-any.whl → 15.3.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +3 -3
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.3.1.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +9 -9
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +12 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_load_balancer_dns_challenge_domain/__init__.py +4 -4
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_valkey_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +38 -38
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +63 -16
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +37 -37
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +34 -34
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +61 -61
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +35 -35
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +73 -73
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +392 -39
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +46 -46
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +33 -33
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +228 -228
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +210 -210
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +691 -599
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +401 -383
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +132 -132
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +65 -65
- cdktf_cdktf_provider_upcloud/managed_database_valkey/__init__.py +135 -135
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/managed_object_storage_bucket/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/managed_object_storage_custom_domain/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/network/__init__.py +501 -33
- cdktf_cdktf_provider_upcloud/network_peering/__init__.py +23 -23
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/provider/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/server/__init__.py +139 -139
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/storage/__init__.py +51 -51
- cdktf_cdktf_provider_upcloud/storage_backup/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/storage_template/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
- {cdktf_cdktf_provider_upcloud-15.2.2.dist-info → cdktf_cdktf_provider_upcloud-15.3.1.dist-info}/METADATA +5 -5
- cdktf_cdktf_provider_upcloud-15.3.1.dist-info/RECORD +68 -0
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.2.2.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-15.2.2.dist-info/RECORD +0 -68
- {cdktf_cdktf_provider_upcloud-15.2.2.dist-info → cdktf_cdktf_provider_upcloud-15.3.1.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-15.2.2.dist-info → cdktf_cdktf_provider_upcloud-15.3.1.dist-info}/WHEEL +0 -0
- {cdktf_cdktf_provider_upcloud-15.2.2.dist-info → cdktf_cdktf_provider_upcloud-15.3.1.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_firewall_rules`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_firewall_rules`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_firewall_rules`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -44,7 +44,7 @@ class FirewallRules(
|
|
|
44
44
|
metaclass=jsii.JSIIMeta,
|
|
45
45
|
jsii_type="@cdktf/provider-upcloud.firewallRules.FirewallRules",
|
|
46
46
|
):
|
|
47
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
47
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules upcloud_firewall_rules}.'''
|
|
48
48
|
|
|
49
49
|
def __init__(
|
|
50
50
|
self,
|
|
@@ -61,12 +61,12 @@ class FirewallRules(
|
|
|
61
61
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
62
62
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
63
63
|
) -> None:
|
|
64
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
64
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules upcloud_firewall_rules} Resource.
|
|
65
65
|
|
|
66
66
|
:param scope: The scope in which to define this construct.
|
|
67
67
|
:param id: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
68
|
-
:param server_id: The UUID of the server to be protected with the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
69
|
-
:param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
68
|
+
:param server_id: The UUID of the server to be protected with the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
|
|
69
|
+
:param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
|
|
70
70
|
:param connection:
|
|
71
71
|
:param count:
|
|
72
72
|
:param depends_on:
|
|
@@ -106,7 +106,7 @@ class FirewallRules(
|
|
|
106
106
|
|
|
107
107
|
:param scope: The scope in which to define this construct.
|
|
108
108
|
:param import_to_id: The construct id used in the generated config for the FirewallRules to import.
|
|
109
|
-
:param import_from_id: The id of the existing FirewallRules that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
109
|
+
:param import_from_id: The id of the existing FirewallRules that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#import import section} in the documentation of this resource for the id to use
|
|
110
110
|
:param provider: ? Optional instance of the provider where the FirewallRules to import is found.
|
|
111
111
|
'''
|
|
112
112
|
if __debug__:
|
|
@@ -219,8 +219,8 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
219
219
|
:param lifecycle:
|
|
220
220
|
:param provider:
|
|
221
221
|
:param provisioners:
|
|
222
|
-
:param server_id: The UUID of the server to be protected with the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
223
|
-
:param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
222
|
+
:param server_id: The UUID of the server to be protected with the firewall rules. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
|
|
223
|
+
:param firewall_rule: firewall_rule block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
|
|
224
224
|
'''
|
|
225
225
|
if isinstance(lifecycle, dict):
|
|
226
226
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -323,7 +323,7 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
323
323
|
def server_id(self) -> builtins.str:
|
|
324
324
|
'''The UUID of the server to be protected with the firewall rules.
|
|
325
325
|
|
|
326
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
326
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#server_id FirewallRules#server_id}
|
|
327
327
|
'''
|
|
328
328
|
result = self._values.get("server_id")
|
|
329
329
|
assert result is not None, "Required property 'server_id' is missing"
|
|
@@ -335,7 +335,7 @@ class FirewallRulesConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
335
335
|
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]]]:
|
|
336
336
|
'''firewall_rule block.
|
|
337
337
|
|
|
338
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
338
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#firewall_rule FirewallRules#firewall_rule}
|
|
339
339
|
'''
|
|
340
340
|
result = self._values.get("firewall_rule")
|
|
341
341
|
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["FirewallRulesFirewallRule"]]], result)
|
|
@@ -392,20 +392,20 @@ class FirewallRulesFirewallRule:
|
|
|
392
392
|
source_port_start: typing.Optional[builtins.str] = None,
|
|
393
393
|
) -> None:
|
|
394
394
|
'''
|
|
395
|
-
:param action: Action to take if the rule conditions are met. Valid values ``accept | drop``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
396
|
-
:param direction: The direction of network traffic this rule will be applied to. Valid values are ``in`` and ``out``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
397
|
-
:param comment: A comment for the rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
398
|
-
:param destination_address_end: The destination address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
399
|
-
:param destination_address_start: The destination address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
400
|
-
:param destination_port_end: The destination port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
401
|
-
:param destination_port_start: The destination port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
402
|
-
:param family: The address family of new firewall rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
403
|
-
:param icmp_type: The ICMP type of the rule. Only valid if protocol is ICMP. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
404
|
-
:param protocol: The protocol of the rule. Possible values are `` (empty), ``tcp``, ``udp``, ``icmp``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
405
|
-
:param source_address_end: The source address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
406
|
-
:param source_address_start: The source address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
407
|
-
:param source_port_end: The source port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
408
|
-
:param source_port_start: The source port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
395
|
+
:param action: Action to take if the rule conditions are met. Valid values ``accept | drop``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#action FirewallRules#action}
|
|
396
|
+
:param direction: The direction of network traffic this rule will be applied to. Valid values are ``in`` and ``out``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#direction FirewallRules#direction}
|
|
397
|
+
:param comment: A comment for the rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#comment FirewallRules#comment}
|
|
398
|
+
:param destination_address_end: The destination address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
|
|
399
|
+
:param destination_address_start: The destination address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
|
|
400
|
+
:param destination_port_end: The destination port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
|
|
401
|
+
:param destination_port_start: The destination port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
|
|
402
|
+
:param family: The address family of new firewall rule. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#family FirewallRules#family}
|
|
403
|
+
:param icmp_type: The ICMP type of the rule. Only valid if protocol is ICMP. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
|
|
404
|
+
:param protocol: The protocol of the rule. Possible values are `` (empty), ``tcp``, ``udp``, ``icmp``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#protocol FirewallRules#protocol}
|
|
405
|
+
:param source_address_end: The source address range ends from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
|
|
406
|
+
:param source_address_start: The source address range starts from this address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
|
|
407
|
+
:param source_port_end: The source port range ends from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
|
|
408
|
+
:param source_port_start: The source port range starts from this port number. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
|
|
409
409
|
'''
|
|
410
410
|
if __debug__:
|
|
411
411
|
type_hints = typing.get_type_hints(_typecheckingstub__9b77e978fb66d25b46f06da19493b15c4f42527dec58b7335729cf86141901af)
|
|
@@ -456,7 +456,7 @@ class FirewallRulesFirewallRule:
|
|
|
456
456
|
def action(self) -> builtins.str:
|
|
457
457
|
'''Action to take if the rule conditions are met. Valid values ``accept | drop``.
|
|
458
458
|
|
|
459
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
459
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#action FirewallRules#action}
|
|
460
460
|
'''
|
|
461
461
|
result = self._values.get("action")
|
|
462
462
|
assert result is not None, "Required property 'action' is missing"
|
|
@@ -466,7 +466,7 @@ class FirewallRulesFirewallRule:
|
|
|
466
466
|
def direction(self) -> builtins.str:
|
|
467
467
|
'''The direction of network traffic this rule will be applied to. Valid values are ``in`` and ``out``.
|
|
468
468
|
|
|
469
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
469
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#direction FirewallRules#direction}
|
|
470
470
|
'''
|
|
471
471
|
result = self._values.get("direction")
|
|
472
472
|
assert result is not None, "Required property 'direction' is missing"
|
|
@@ -476,7 +476,7 @@ class FirewallRulesFirewallRule:
|
|
|
476
476
|
def comment(self) -> typing.Optional[builtins.str]:
|
|
477
477
|
'''A comment for the rule.
|
|
478
478
|
|
|
479
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
479
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#comment FirewallRules#comment}
|
|
480
480
|
'''
|
|
481
481
|
result = self._values.get("comment")
|
|
482
482
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -485,7 +485,7 @@ class FirewallRulesFirewallRule:
|
|
|
485
485
|
def destination_address_end(self) -> typing.Optional[builtins.str]:
|
|
486
486
|
'''The destination address range ends from this address.
|
|
487
487
|
|
|
488
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
488
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#destination_address_end FirewallRules#destination_address_end}
|
|
489
489
|
'''
|
|
490
490
|
result = self._values.get("destination_address_end")
|
|
491
491
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -494,7 +494,7 @@ class FirewallRulesFirewallRule:
|
|
|
494
494
|
def destination_address_start(self) -> typing.Optional[builtins.str]:
|
|
495
495
|
'''The destination address range starts from this address.
|
|
496
496
|
|
|
497
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
497
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#destination_address_start FirewallRules#destination_address_start}
|
|
498
498
|
'''
|
|
499
499
|
result = self._values.get("destination_address_start")
|
|
500
500
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -503,7 +503,7 @@ class FirewallRulesFirewallRule:
|
|
|
503
503
|
def destination_port_end(self) -> typing.Optional[builtins.str]:
|
|
504
504
|
'''The destination port range ends from this port number.
|
|
505
505
|
|
|
506
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
506
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#destination_port_end FirewallRules#destination_port_end}
|
|
507
507
|
'''
|
|
508
508
|
result = self._values.get("destination_port_end")
|
|
509
509
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -512,7 +512,7 @@ class FirewallRulesFirewallRule:
|
|
|
512
512
|
def destination_port_start(self) -> typing.Optional[builtins.str]:
|
|
513
513
|
'''The destination port range starts from this port number.
|
|
514
514
|
|
|
515
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
515
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#destination_port_start FirewallRules#destination_port_start}
|
|
516
516
|
'''
|
|
517
517
|
result = self._values.get("destination_port_start")
|
|
518
518
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -521,7 +521,7 @@ class FirewallRulesFirewallRule:
|
|
|
521
521
|
def family(self) -> typing.Optional[builtins.str]:
|
|
522
522
|
'''The address family of new firewall rule.
|
|
523
523
|
|
|
524
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
524
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#family FirewallRules#family}
|
|
525
525
|
'''
|
|
526
526
|
result = self._values.get("family")
|
|
527
527
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -530,7 +530,7 @@ class FirewallRulesFirewallRule:
|
|
|
530
530
|
def icmp_type(self) -> typing.Optional[builtins.str]:
|
|
531
531
|
'''The ICMP type of the rule. Only valid if protocol is ICMP.
|
|
532
532
|
|
|
533
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
533
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#icmp_type FirewallRules#icmp_type}
|
|
534
534
|
'''
|
|
535
535
|
result = self._values.get("icmp_type")
|
|
536
536
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -539,7 +539,7 @@ class FirewallRulesFirewallRule:
|
|
|
539
539
|
def protocol(self) -> typing.Optional[builtins.str]:
|
|
540
540
|
'''The protocol of the rule. Possible values are `` (empty), ``tcp``, ``udp``, ``icmp``.
|
|
541
541
|
|
|
542
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
542
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#protocol FirewallRules#protocol}
|
|
543
543
|
'''
|
|
544
544
|
result = self._values.get("protocol")
|
|
545
545
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -548,7 +548,7 @@ class FirewallRulesFirewallRule:
|
|
|
548
548
|
def source_address_end(self) -> typing.Optional[builtins.str]:
|
|
549
549
|
'''The source address range ends from this address.
|
|
550
550
|
|
|
551
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
551
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#source_address_end FirewallRules#source_address_end}
|
|
552
552
|
'''
|
|
553
553
|
result = self._values.get("source_address_end")
|
|
554
554
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -557,7 +557,7 @@ class FirewallRulesFirewallRule:
|
|
|
557
557
|
def source_address_start(self) -> typing.Optional[builtins.str]:
|
|
558
558
|
'''The source address range starts from this address.
|
|
559
559
|
|
|
560
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
560
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#source_address_start FirewallRules#source_address_start}
|
|
561
561
|
'''
|
|
562
562
|
result = self._values.get("source_address_start")
|
|
563
563
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -566,7 +566,7 @@ class FirewallRulesFirewallRule:
|
|
|
566
566
|
def source_port_end(self) -> typing.Optional[builtins.str]:
|
|
567
567
|
'''The source port range ends from this port number.
|
|
568
568
|
|
|
569
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
569
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#source_port_end FirewallRules#source_port_end}
|
|
570
570
|
'''
|
|
571
571
|
result = self._values.get("source_port_end")
|
|
572
572
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -575,7 +575,7 @@ class FirewallRulesFirewallRule:
|
|
|
575
575
|
def source_port_start(self) -> typing.Optional[builtins.str]:
|
|
576
576
|
'''The source port range starts from this port number.
|
|
577
577
|
|
|
578
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
578
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/firewall_rules#source_port_start FirewallRules#source_port_start}
|
|
579
579
|
'''
|
|
580
580
|
result = self._values.get("source_port_start")
|
|
581
581
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_floating_ip_address`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_floating_ip_address`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_floating_ip_address`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/floating_ip_address).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -44,7 +44,7 @@ class FloatingIpAddress(
|
|
|
44
44
|
metaclass=jsii.JSIIMeta,
|
|
45
45
|
jsii_type="@cdktf/provider-upcloud.floatingIpAddress.FloatingIpAddress",
|
|
46
46
|
):
|
|
47
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
47
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/floating_ip_address upcloud_floating_ip_address}.'''
|
|
48
48
|
|
|
49
49
|
def __init__(
|
|
50
50
|
self,
|
|
@@ -54,6 +54,7 @@ class FloatingIpAddress(
|
|
|
54
54
|
access: typing.Optional[builtins.str] = None,
|
|
55
55
|
family: typing.Optional[builtins.str] = None,
|
|
56
56
|
mac_address: typing.Optional[builtins.str] = None,
|
|
57
|
+
release_policy: typing.Optional[builtins.str] = None,
|
|
57
58
|
zone: typing.Optional[builtins.str] = None,
|
|
58
59
|
connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
59
60
|
count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
|
|
@@ -63,14 +64,15 @@ class FloatingIpAddress(
|
|
|
63
64
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
64
65
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
65
66
|
) -> None:
|
|
66
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
67
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/floating_ip_address upcloud_floating_ip_address} Resource.
|
|
67
68
|
|
|
68
69
|
:param scope: The scope in which to define this construct.
|
|
69
70
|
:param id: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
70
|
-
:param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
71
|
-
:param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
72
|
-
:param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
73
|
-
:param
|
|
71
|
+
:param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/floating_ip_address#access FloatingIpAddress#access}
|
|
72
|
+
:param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/floating_ip_address#family FloatingIpAddress#family}
|
|
73
|
+
:param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
|
|
74
|
+
:param release_policy: The release policy of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/floating_ip_address#release_policy FloatingIpAddress#release_policy}
|
|
75
|
+
:param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
|
|
74
76
|
:param connection:
|
|
75
77
|
:param count:
|
|
76
78
|
:param depends_on:
|
|
@@ -87,6 +89,7 @@ class FloatingIpAddress(
|
|
|
87
89
|
access=access,
|
|
88
90
|
family=family,
|
|
89
91
|
mac_address=mac_address,
|
|
92
|
+
release_policy=release_policy,
|
|
90
93
|
zone=zone,
|
|
91
94
|
connection=connection,
|
|
92
95
|
count=count,
|
|
@@ -112,7 +115,7 @@ class FloatingIpAddress(
|
|
|
112
115
|
|
|
113
116
|
:param scope: The scope in which to define this construct.
|
|
114
117
|
:param import_to_id: The construct id used in the generated config for the FloatingIpAddress to import.
|
|
115
|
-
:param import_from_id: The id of the existing FloatingIpAddress that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
118
|
+
:param import_from_id: The id of the existing FloatingIpAddress that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/floating_ip_address#import import section} in the documentation of this resource for the id to use
|
|
116
119
|
:param provider: ? Optional instance of the provider where the FloatingIpAddress to import is found.
|
|
117
120
|
'''
|
|
118
121
|
if __debug__:
|
|
@@ -135,6 +138,10 @@ class FloatingIpAddress(
|
|
|
135
138
|
def reset_mac_address(self) -> None:
|
|
136
139
|
return typing.cast(None, jsii.invoke(self, "resetMacAddress", []))
|
|
137
140
|
|
|
141
|
+
@jsii.member(jsii_name="resetReleasePolicy")
|
|
142
|
+
def reset_release_policy(self) -> None:
|
|
143
|
+
return typing.cast(None, jsii.invoke(self, "resetReleasePolicy", []))
|
|
144
|
+
|
|
138
145
|
@jsii.member(jsii_name="resetZone")
|
|
139
146
|
def reset_zone(self) -> None:
|
|
140
147
|
return typing.cast(None, jsii.invoke(self, "resetZone", []))
|
|
@@ -177,6 +184,11 @@ class FloatingIpAddress(
|
|
|
177
184
|
def mac_address_input(self) -> typing.Optional[builtins.str]:
|
|
178
185
|
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "macAddressInput"))
|
|
179
186
|
|
|
187
|
+
@builtins.property
|
|
188
|
+
@jsii.member(jsii_name="releasePolicyInput")
|
|
189
|
+
def release_policy_input(self) -> typing.Optional[builtins.str]:
|
|
190
|
+
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "releasePolicyInput"))
|
|
191
|
+
|
|
180
192
|
@builtins.property
|
|
181
193
|
@jsii.member(jsii_name="zoneInput")
|
|
182
194
|
def zone_input(self) -> typing.Optional[builtins.str]:
|
|
@@ -218,6 +230,18 @@ class FloatingIpAddress(
|
|
|
218
230
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
219
231
|
jsii.set(self, "macAddress", value) # pyright: ignore[reportArgumentType]
|
|
220
232
|
|
|
233
|
+
@builtins.property
|
|
234
|
+
@jsii.member(jsii_name="releasePolicy")
|
|
235
|
+
def release_policy(self) -> builtins.str:
|
|
236
|
+
return typing.cast(builtins.str, jsii.get(self, "releasePolicy"))
|
|
237
|
+
|
|
238
|
+
@release_policy.setter
|
|
239
|
+
def release_policy(self, value: builtins.str) -> None:
|
|
240
|
+
if __debug__:
|
|
241
|
+
type_hints = typing.get_type_hints(_typecheckingstub__42859f40a28fa6a19b1a2952d7b0b525adb0b1eb3cb67e389cbc4eb13934cb05)
|
|
242
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
243
|
+
jsii.set(self, "releasePolicy", value) # pyright: ignore[reportArgumentType]
|
|
244
|
+
|
|
221
245
|
@builtins.property
|
|
222
246
|
@jsii.member(jsii_name="zone")
|
|
223
247
|
def zone(self) -> builtins.str:
|
|
@@ -245,6 +269,7 @@ class FloatingIpAddress(
|
|
|
245
269
|
"access": "access",
|
|
246
270
|
"family": "family",
|
|
247
271
|
"mac_address": "macAddress",
|
|
272
|
+
"release_policy": "releasePolicy",
|
|
248
273
|
"zone": "zone",
|
|
249
274
|
},
|
|
250
275
|
)
|
|
@@ -262,6 +287,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
262
287
|
access: typing.Optional[builtins.str] = None,
|
|
263
288
|
family: typing.Optional[builtins.str] = None,
|
|
264
289
|
mac_address: typing.Optional[builtins.str] = None,
|
|
290
|
+
release_policy: typing.Optional[builtins.str] = None,
|
|
265
291
|
zone: typing.Optional[builtins.str] = None,
|
|
266
292
|
) -> None:
|
|
267
293
|
'''
|
|
@@ -272,10 +298,11 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
272
298
|
:param lifecycle:
|
|
273
299
|
:param provider:
|
|
274
300
|
:param provisioners:
|
|
275
|
-
:param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
276
|
-
:param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
277
|
-
:param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
278
|
-
:param
|
|
301
|
+
:param access: Network access for the floating IP address. Supported value: ``public``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/floating_ip_address#access FloatingIpAddress#access}
|
|
302
|
+
:param family: The address family of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/floating_ip_address#family FloatingIpAddress#family}
|
|
303
|
+
:param mac_address: MAC address of a server interface to assign address to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
|
|
304
|
+
:param release_policy: The release policy of the floating IP address. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/floating_ip_address#release_policy FloatingIpAddress#release_policy}
|
|
305
|
+
:param zone: Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
|
|
279
306
|
'''
|
|
280
307
|
if isinstance(lifecycle, dict):
|
|
281
308
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -291,6 +318,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
291
318
|
check_type(argname="argument access", value=access, expected_type=type_hints["access"])
|
|
292
319
|
check_type(argname="argument family", value=family, expected_type=type_hints["family"])
|
|
293
320
|
check_type(argname="argument mac_address", value=mac_address, expected_type=type_hints["mac_address"])
|
|
321
|
+
check_type(argname="argument release_policy", value=release_policy, expected_type=type_hints["release_policy"])
|
|
294
322
|
check_type(argname="argument zone", value=zone, expected_type=type_hints["zone"])
|
|
295
323
|
self._values: typing.Dict[builtins.str, typing.Any] = {}
|
|
296
324
|
if connection is not None:
|
|
@@ -313,6 +341,8 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
313
341
|
self._values["family"] = family
|
|
314
342
|
if mac_address is not None:
|
|
315
343
|
self._values["mac_address"] = mac_address
|
|
344
|
+
if release_policy is not None:
|
|
345
|
+
self._values["release_policy"] = release_policy
|
|
316
346
|
if zone is not None:
|
|
317
347
|
self._values["zone"] = zone
|
|
318
348
|
|
|
@@ -384,7 +414,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
384
414
|
def access(self) -> typing.Optional[builtins.str]:
|
|
385
415
|
'''Network access for the floating IP address. Supported value: ``public``.
|
|
386
416
|
|
|
387
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
417
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/floating_ip_address#access FloatingIpAddress#access}
|
|
388
418
|
'''
|
|
389
419
|
result = self._values.get("access")
|
|
390
420
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -393,7 +423,7 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
393
423
|
def family(self) -> typing.Optional[builtins.str]:
|
|
394
424
|
'''The address family of the floating IP address.
|
|
395
425
|
|
|
396
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
426
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/floating_ip_address#family FloatingIpAddress#family}
|
|
397
427
|
'''
|
|
398
428
|
result = self._values.get("family")
|
|
399
429
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -402,16 +432,25 @@ class FloatingIpAddressConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
402
432
|
def mac_address(self) -> typing.Optional[builtins.str]:
|
|
403
433
|
'''MAC address of a server interface to assign address to.
|
|
404
434
|
|
|
405
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
435
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/floating_ip_address#mac_address FloatingIpAddress#mac_address}
|
|
406
436
|
'''
|
|
407
437
|
result = self._values.get("mac_address")
|
|
408
438
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
409
439
|
|
|
440
|
+
@builtins.property
|
|
441
|
+
def release_policy(self) -> typing.Optional[builtins.str]:
|
|
442
|
+
'''The release policy of the floating IP address.
|
|
443
|
+
|
|
444
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/floating_ip_address#release_policy FloatingIpAddress#release_policy}
|
|
445
|
+
'''
|
|
446
|
+
result = self._values.get("release_policy")
|
|
447
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
448
|
+
|
|
410
449
|
@builtins.property
|
|
411
450
|
def zone(self) -> typing.Optional[builtins.str]:
|
|
412
451
|
'''Zone of the address, e.g. ``de-fra1``. Required when assigning a detached floating IP address. You can list available zones with ``upctl zone list``.
|
|
413
452
|
|
|
414
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
453
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.26.0/docs/resources/floating_ip_address#zone FloatingIpAddress#zone}
|
|
415
454
|
'''
|
|
416
455
|
result = self._values.get("zone")
|
|
417
456
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -442,6 +481,7 @@ def _typecheckingstub__7a3a86334a576ee93e97cd5fa8f741a8da8f869742ea13315b33ceeec
|
|
|
442
481
|
access: typing.Optional[builtins.str] = None,
|
|
443
482
|
family: typing.Optional[builtins.str] = None,
|
|
444
483
|
mac_address: typing.Optional[builtins.str] = None,
|
|
484
|
+
release_policy: typing.Optional[builtins.str] = None,
|
|
445
485
|
zone: typing.Optional[builtins.str] = None,
|
|
446
486
|
connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
447
487
|
count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
|
|
@@ -481,6 +521,12 @@ def _typecheckingstub__3a3d0104fe4b695d7b1611f86c494909bc09134ac2baddb967a1813ed
|
|
|
481
521
|
"""Type checking stubs"""
|
|
482
522
|
pass
|
|
483
523
|
|
|
524
|
+
def _typecheckingstub__42859f40a28fa6a19b1a2952d7b0b525adb0b1eb3cb67e389cbc4eb13934cb05(
|
|
525
|
+
value: builtins.str,
|
|
526
|
+
) -> None:
|
|
527
|
+
"""Type checking stubs"""
|
|
528
|
+
pass
|
|
529
|
+
|
|
484
530
|
def _typecheckingstub__9fde6c724c2f94096e73a2a357f4481f0bd702fb413194265669772572245090(
|
|
485
531
|
value: builtins.str,
|
|
486
532
|
) -> None:
|
|
@@ -499,6 +545,7 @@ def _typecheckingstub__d77934c8fe141a2f7da0915ddfad6f183a3295e3e3e9c279b458e3a16
|
|
|
499
545
|
access: typing.Optional[builtins.str] = None,
|
|
500
546
|
family: typing.Optional[builtins.str] = None,
|
|
501
547
|
mac_address: typing.Optional[builtins.str] = None,
|
|
548
|
+
release_policy: typing.Optional[builtins.str] = None,
|
|
502
549
|
zone: typing.Optional[builtins.str] = None,
|
|
503
550
|
) -> None:
|
|
504
551
|
"""Type checking stubs"""
|