Skip to content

fix(vpn): [137186499] tencentcloud_vpn_ssl_server update doc #3271

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 5 commits into from
Apr 8, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions .changelog/3271.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:enhancement
resource/tencentcloud_vpn_ssl_server: update doc
```
16 changes: 8 additions & 8 deletions tencentcloud/services/vpn/resource_tc_vpn_ssl_server.go
Original file line number Diff line number Diff line change
Expand Up @@ -60,24 +60,24 @@ func ResourceTencentCloudVpnSslServer() *schema.Resource {
"ssl_vpn_port": {
Type: schema.TypeInt,
Optional: true,
Description: "The port of ssl vpn. Default value: 1194.",
Description: "The port of ssl vpn. Currently only supports UDP. Default value: 1194.",
},
"integrity_algorithm": {
Type: schema.TypeString,
Optional: true,
Description: "The integrity algorithm. Valid values: SHA1, MD5 and NONE. Default value: NONE.",
Description: "The integrity algorithm. Valid values: SHA1. Default value: SHA1.",
},
"encrypt_algorithm": {
Type: schema.TypeString,
Optional: true,
Description: "The encrypt algorithm. Valid values: AES-128-CBC, AES-192-CBC, AES-256-CBC, NONE." +
"Default value: NONE.",
Description: "The encrypt algorithm. Valid values: AES-128-CBC, AES-192-CBC, AES-256-CBC." +
"Default value: AES-128-CBC.",
},
"compress": {
Type: schema.TypeBool,
Optional: true,
Default: svccvm.FALSE,
Description: "need compressed. Default value: False.",
Description: "Need compressed. Currently is not supports compress. Default value: False.",
},
},
}
Expand Down Expand Up @@ -114,7 +114,7 @@ func resourceTencentCloudVpnSslServerCreate(d *schema.ResourceData, meta interfa
if v, ok := d.GetOk("ssl_vpn_protocol"); ok {
request.SslVpnProtocol = helper.String(v.(string))
}
if v, ok := d.GetOk("ssl_vpn_port"); ok {
if v, ok := d.GetOkExists("ssl_vpn_port"); ok {
request.SslVpnPort = helper.IntInt64(v.(int))
}
if v, ok := d.GetOk("integrity_algorithm"); ok {
Expand All @@ -123,7 +123,7 @@ func resourceTencentCloudVpnSslServerCreate(d *schema.ResourceData, meta interfa
if v, ok := d.GetOk("encrypt_algorithm"); ok {
request.EncryptAlgorithm = helper.String(v.(string))
}
if v, ok := d.GetOk("compress"); ok {
if v, ok := d.GetOkExists("compress"); ok {
request.Compress = helper.Bool(v.(bool))
}

Expand Down Expand Up @@ -244,7 +244,7 @@ func resourceTencentCloudVpnSslServerUpdate(d *schema.ResourceData, meta interfa
if v, ok := d.GetOk("ssl_vpn_protocol"); ok {
request.SslVpnProtocol = helper.String(v.(string))
}
if v, ok := d.GetOk("ssl_vpn_port"); ok {
if v, ok := d.GetOkExists("ssl_vpn_port"); ok {
request.SslVpnPort = helper.IntInt64(v.(int))
}
if v, ok := d.GetOk("integrity_algorithm"); ok {
Expand Down
14 changes: 7 additions & 7 deletions tencentcloud/services/vpn/resource_tc_vpn_ssl_server.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,18 +3,18 @@ Provide a resource to create a VPN SSL Server.
Example Usage

```hcl
resource "tencentcloud_vpn_ssl_server" "server" {
local_address = [
resource "tencentcloud_vpn_ssl_server" "example" {
local_address = [
"10.0.0.0/17",
]
remote_address = "11.0.0.0/16"
ssl_vpn_server_name = "helloworld"
vpn_gateway_id = "vpngw-335lwf7d"
ssl_vpn_protocol = "UDP"
ssl_vpn_port = 1194
ssl_vpn_protocol = "UDP"
ssl_vpn_port = 1194
integrity_algorithm = "MD5"
encrypt_algorithm = "AES-128-CBC"
compress = true
encrypt_algorithm = "AES-128-CBC"
compress = true
}
```

Expand All @@ -23,5 +23,5 @@ Import
VPN SSL Server can be imported, e.g.

```
$ terraform import tencentcloud_vpn_ssl_server.server vpn-server-id
$ terraform import tencentcloud_vpn_ssl_server.example vpns-cik6bjct
```
12 changes: 6 additions & 6 deletions website/docs/r/vpn_ssl_server.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ Provide a resource to create a VPN SSL Server.
## Example Usage

```hcl
resource "tencentcloud_vpn_ssl_server" "server" {
resource "tencentcloud_vpn_ssl_server" "example" {
local_address = [
"10.0.0.0/17",
]
Expand All @@ -37,10 +37,10 @@ The following arguments are supported:
* `remote_address` - (Required, String) Remote CIDR for client.
* `ssl_vpn_server_name` - (Required, String) The name of ssl vpn server to be created.
* `vpn_gateway_id` - (Required, String, ForceNew) VPN gateway ID.
* `compress` - (Optional, Bool) need compressed. Default value: False.
* `encrypt_algorithm` - (Optional, String) The encrypt algorithm. Valid values: AES-128-CBC, AES-192-CBC, AES-256-CBC, NONE.Default value: NONE.
* `integrity_algorithm` - (Optional, String) The integrity algorithm. Valid values: SHA1, MD5 and NONE. Default value: NONE.
* `ssl_vpn_port` - (Optional, Int) The port of ssl vpn. Default value: 1194.
* `compress` - (Optional, Bool) Need compressed. Currently is not supports compress. Default value: False.
* `encrypt_algorithm` - (Optional, String) The encrypt algorithm. Valid values: AES-128-CBC, AES-192-CBC, AES-256-CBC.Default value: AES-128-CBC.
* `integrity_algorithm` - (Optional, String) The integrity algorithm. Valid values: SHA1. Default value: SHA1.
* `ssl_vpn_port` - (Optional, Int) The port of ssl vpn. Currently only supports UDP. Default value: 1194.
* `ssl_vpn_protocol` - (Optional, String) The protocol of ssl vpn. Default value: UDP.

## Attributes Reference
Expand All @@ -56,6 +56,6 @@ In addition to all arguments above, the following attributes are exported:
VPN SSL Server can be imported, e.g.

```
$ terraform import tencentcloud_vpn_ssl_server.server vpn-server-id
$ terraform import tencentcloud_vpn_ssl_server.example vpns-cik6bjct
```

Loading