@cdktn/provider-docker 13.0.0 → 13.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (39) hide show
  1. package/.jsii +8294 -2676
  2. package/README.md +3 -3
  3. package/lib/buildx-builder/index.d.ts +60 -60
  4. package/lib/buildx-builder/index.js +12 -12
  5. package/lib/config/index.d.ts +6 -6
  6. package/lib/config/index.js +6 -6
  7. package/lib/container/index.d.ts +148 -126
  8. package/lib/container/index.js +80 -33
  9. package/lib/data-docker-image/index.d.ts +5 -5
  10. package/lib/data-docker-image/index.js +6 -6
  11. package/lib/data-docker-logs/index.d.ts +15 -15
  12. package/lib/data-docker-logs/index.js +6 -6
  13. package/lib/data-docker-network/index.d.ts +4 -4
  14. package/lib/data-docker-network/index.js +8 -8
  15. package/lib/data-docker-plugin/index.d.ts +5 -5
  16. package/lib/data-docker-plugin/index.js +6 -6
  17. package/lib/data-docker-registry-image/index.d.ts +6 -6
  18. package/lib/data-docker-registry-image/index.js +6 -6
  19. package/lib/data-docker-registry-image-manifests/index.d.ts +10 -10
  20. package/lib/data-docker-registry-image-manifests/index.js +9 -9
  21. package/lib/image/index.d.ts +88 -66
  22. package/lib/image/index.js +66 -14
  23. package/lib/network/index.d.ts +22 -22
  24. package/lib/network/index.js +10 -10
  25. package/lib/plugin/index.d.ts +15 -15
  26. package/lib/plugin/index.js +8 -8
  27. package/lib/provider/index.d.ts +19 -19
  28. package/lib/provider/index.js +6 -6
  29. package/lib/registry-image/index.d.ts +793 -12
  30. package/lib/registry-image/index.js +1858 -10
  31. package/lib/secret/index.d.ts +9 -9
  32. package/lib/secret/index.js +8 -8
  33. package/lib/service/index.d.ts +148 -147
  34. package/lib/service/index.js +53 -50
  35. package/lib/tag/index.d.ts +7 -7
  36. package/lib/tag/index.js +6 -6
  37. package/lib/volume/index.d.ts +135 -10
  38. package/lib/volume/index.js +324 -13
  39. package/package.json +12 -5
@@ -8,125 +8,125 @@ export interface ContainerConfig extends cdktn.TerraformMetaArguments {
8
8
  /**
9
9
  * If `true` attach to the container after its creation and waits the end of its execution. Defaults to `false`.
10
10
  *
11
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#attach Container#attach}
11
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#attach Container#attach}
12
12
  */
13
13
  readonly attach?: boolean | cdktn.IResolvable;
14
14
  /**
15
15
  * Optional parent cgroup for the container
16
16
  *
17
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#cgroup_parent Container#cgroup_parent}
17
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#cgroup_parent Container#cgroup_parent}
18
18
  */
19
19
  readonly cgroupParent?: string;
20
20
  /**
21
21
  * Cgroup namespace mode to use for the container. Possible values are: `private`, `host`.
22
22
  *
23
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#cgroupns_mode Container#cgroupns_mode}
23
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#cgroupns_mode Container#cgroupns_mode}
24
24
  */
25
25
  readonly cgroupnsMode?: string;
26
26
  /**
27
27
  * The command to use to start the container. For example, to run `/usr/bin/myprogram -f baz.conf` set the command to be `["/usr/bin/myprogram","-f","baz.conf"]`.
28
28
  *
29
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#command Container#command}
29
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#command Container#command}
30
30
  */
31
31
  readonly command?: string[];
32
32
  /**
33
33
  * The total number of milliseconds to wait for the container to reach status 'running'
34
34
  *
35
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#container_read_refresh_timeout_milliseconds Container#container_read_refresh_timeout_milliseconds}
35
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#container_read_refresh_timeout_milliseconds Container#container_read_refresh_timeout_milliseconds}
36
36
  */
37
37
  readonly containerReadRefreshTimeoutMilliseconds?: number;
38
38
  /**
39
39
  * Specify the CPU CFS scheduler period (in microseconds), which is used alongside `cpu-quota`. Is ignored if `cpus` is set.
40
40
  *
41
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#cpu_period Container#cpu_period}
41
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#cpu_period Container#cpu_period}
42
42
  */
43
43
  readonly cpuPeriod?: number;
44
44
  /**
45
45
  * Impose a CPU CFS quota on the container (in microseconds). The number of microseconds per `cpu-period` that the container is limited to before throttled. Is ignored if `cpus` is set.
46
46
  *
47
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#cpu_quota Container#cpu_quota}
47
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#cpu_quota Container#cpu_quota}
48
48
  */
49
49
  readonly cpuQuota?: number;
50
50
  /**
51
51
  * A comma-separated list or hyphen-separated range of CPUs a container can use, e.g. `0-1`.
52
52
  *
53
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#cpu_set Container#cpu_set}
53
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#cpu_set Container#cpu_set}
54
54
  */
55
55
  readonly cpuSet?: string;
56
56
  /**
57
57
  * CPU shares (relative weight) for the container.
58
58
  *
59
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#cpu_shares Container#cpu_shares}
59
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#cpu_shares Container#cpu_shares}
60
60
  */
61
61
  readonly cpuShares?: number;
62
62
  /**
63
63
  * Specify how much of the available CPU resources a container can use. e.g a value of 1.5 means the container is guaranteed at most one and a half of the CPUs. Has precedence over `cpu_period` and `cpu_quota`.
64
64
  *
65
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#cpus Container#cpus}
65
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#cpus Container#cpus}
66
66
  */
67
67
  readonly cpus?: string;
68
68
  /**
69
69
  * If defined will attempt to stop the container before destroying. Container will be destroyed after `n` seconds or on successful stop.
70
70
  *
71
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#destroy_grace_seconds Container#destroy_grace_seconds}
71
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#destroy_grace_seconds Container#destroy_grace_seconds}
72
72
  */
73
73
  readonly destroyGraceSeconds?: number;
74
74
  /**
75
75
  * DNS servers to use.
76
76
  *
77
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#dns Container#dns}
77
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#dns Container#dns}
78
78
  */
79
79
  readonly dns?: string[];
80
80
  /**
81
81
  * DNS options used by the DNS provider(s), see `resolv.conf` documentation for valid list of options.
82
82
  *
83
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#dns_opts Container#dns_opts}
83
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#dns_opts Container#dns_opts}
84
84
  */
85
85
  readonly dnsOpts?: string[];
86
86
  /**
87
87
  * DNS search domains that are used when bare unqualified hostnames are used inside of the container.
88
88
  *
89
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#dns_search Container#dns_search}
89
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#dns_search Container#dns_search}
90
90
  */
91
91
  readonly dnsSearch?: string[];
92
92
  /**
93
93
  * Domain name of the container.
94
94
  *
95
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#domainname Container#domainname}
95
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#domainname Container#domainname}
96
96
  */
97
97
  readonly domainname?: string;
98
98
  /**
99
99
  * The command to use as the Entrypoint for the container. The Entrypoint allows you to configure a container to run as an executable. For example, to run `/usr/bin/myprogram` when starting a container, set the entrypoint to be `"/usr/bin/myprogram"]`.
100
100
  *
101
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#entrypoint Container#entrypoint}
101
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#entrypoint Container#entrypoint}
102
102
  */
103
103
  readonly entrypoint?: string[];
104
104
  /**
105
105
  * Environment variables to set in the form of `KEY=VALUE`, e.g. `DEBUG=0`
106
106
  *
107
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#env Container#env}
107
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#env Container#env}
108
108
  */
109
109
  readonly env?: string[];
110
110
  /**
111
111
  * GPU devices to add to the container. Currently, only the value `all` is supported. Passing any other value will result in unexpected behavior.
112
112
  *
113
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#gpus Container#gpus}
113
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#gpus Container#gpus}
114
114
  */
115
115
  readonly gpus?: string;
116
116
  /**
117
117
  * Additional groups for the container user
118
118
  *
119
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#group_add Container#group_add}
119
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#group_add Container#group_add}
120
120
  */
121
121
  readonly groupAdd?: string[];
122
122
  /**
123
123
  * Hostname of the container.
124
124
  *
125
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#hostname Container#hostname}
125
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#hostname Container#hostname}
126
126
  */
127
127
  readonly hostname?: string;
128
128
  /**
129
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#id Container#id}
129
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#id Container#id}
130
130
  *
131
131
  * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
132
132
  * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -135,31 +135,31 @@ export interface ContainerConfig extends cdktn.TerraformMetaArguments {
135
135
  /**
136
136
  * The ID of the image to back this container. The easiest way to get this value is to use the `image_id` attribute of the `docker_image` resource as is shown in the example.
137
137
  *
138
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#image Container#image}
138
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#image Container#image}
139
139
  */
140
140
  readonly image: string;
141
141
  /**
142
142
  * Configured whether an init process should be injected for this container. If unset this will default to the `dockerd` defaults.
143
143
  *
144
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#init Container#init}
144
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#init Container#init}
145
145
  */
146
146
  readonly init?: boolean | cdktn.IResolvable;
147
147
  /**
148
148
  * IPC sharing mode for the container. Possible values are: `none`, `private`, `shareable`, `container:<name|id>` or `host`.
149
149
  *
150
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#ipc_mode Container#ipc_mode}
150
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#ipc_mode Container#ipc_mode}
151
151
  */
152
152
  readonly ipcMode?: string;
153
153
  /**
154
154
  * The logging driver to use for the container.
155
155
  *
156
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#log_driver Container#log_driver}
156
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#log_driver Container#log_driver}
157
157
  */
158
158
  readonly logDriver?: string;
159
159
  /**
160
160
  * Key/value pairs to use as options for the logging driver.
161
161
  *
162
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#log_opts Container#log_opts}
162
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#log_opts Container#log_opts}
163
163
  */
164
164
  readonly logOpts?: {
165
165
  [key: string]: string;
@@ -167,133 +167,139 @@ export interface ContainerConfig extends cdktn.TerraformMetaArguments {
167
167
  /**
168
168
  * Save the container logs (`attach` must be enabled). Defaults to `false`.
169
169
  *
170
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#logs Container#logs}
170
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#logs Container#logs}
171
171
  */
172
172
  readonly logs?: boolean | cdktn.IResolvable;
173
173
  /**
174
174
  * The maximum amount of times to an attempt a restart when `restart` is set to 'on-failure'.
175
175
  *
176
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#max_retry_count Container#max_retry_count}
176
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#max_retry_count Container#max_retry_count}
177
177
  */
178
178
  readonly maxRetryCount?: number;
179
179
  /**
180
180
  * The memory limit for the container in MBs.
181
181
  *
182
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#memory Container#memory}
182
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#memory Container#memory}
183
183
  */
184
184
  readonly memory?: number;
185
185
  /**
186
+ * The memory-resveration for the container in MBs. Defaults to 0. Allows you to specify a soft limit smaller than `memory` which is activated when Docker detects contention or low memory on the host machine. If you use `memory-reservation`, it must be set lower than `memory` for it to take precedence. Because it is a soft limit, it doesn't guarantee that the container doesn't exceed the limit.
187
+ *
188
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#memory_reservation Container#memory_reservation}
189
+ */
190
+ readonly memoryReservation?: number;
191
+ /**
186
192
  * The total memory limit (memory + swap) for the container in MBs. This setting may compute to `-1` after `terraform apply` if the target host doesn't support memory swap, when that is the case docker will use a soft limitation.
187
193
  *
188
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#memory_swap Container#memory_swap}
194
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#memory_swap Container#memory_swap}
189
195
  */
190
196
  readonly memorySwap?: number;
191
197
  /**
192
198
  * If `true`, then the Docker container will be kept running. If `false`, then as long as the container exists, Terraform assumes it is successful. Defaults to `true`.
193
199
  *
194
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#must_run Container#must_run}
200
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#must_run Container#must_run}
195
201
  */
196
202
  readonly mustRun?: boolean | cdktn.IResolvable;
197
203
  /**
198
204
  * The name of the container.
199
205
  *
200
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#name Container#name}
206
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#name Container#name}
201
207
  */
202
208
  readonly name: string;
203
209
  /**
204
- * Network mode of the container. See https://docs.docker.com/engine/network/ for more information.
210
+ * Network mode of the container. Defaults to `bridge`. If your host OS is any other OS, you need to set this value explicitly, e.g. `nat` when your container will be running on an Windows host. See https://docs.docker.com/engine/network/ for more information.
205
211
  *
206
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#network_mode Container#network_mode}
212
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#network_mode Container#network_mode}
207
213
  */
208
214
  readonly networkMode?: string;
209
215
  /**
210
216
  * he PID (Process) Namespace mode for the container. Either `container:<name|id>` or `host`.
211
217
  *
212
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#pid_mode Container#pid_mode}
218
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#pid_mode Container#pid_mode}
213
219
  */
214
220
  readonly pidMode?: string;
215
221
  /**
216
222
  * If `true`, the container runs in privileged mode.
217
223
  *
218
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#privileged Container#privileged}
224
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#privileged Container#privileged}
219
225
  */
220
226
  readonly privileged?: boolean | cdktn.IResolvable;
221
227
  /**
222
228
  * Publish all ports of the container.
223
229
  *
224
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#publish_all_ports Container#publish_all_ports}
230
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#publish_all_ports Container#publish_all_ports}
225
231
  */
226
232
  readonly publishAllPorts?: boolean | cdktn.IResolvable;
227
233
  /**
228
234
  * If `true`, the container will be started as readonly. Defaults to `false`.
229
235
  *
230
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#read_only Container#read_only}
236
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#read_only Container#read_only}
231
237
  */
232
238
  readonly readOnly?: boolean | cdktn.IResolvable;
233
239
  /**
234
240
  * If `true`, it will remove anonymous volumes associated with the container. Defaults to `true`.
235
241
  *
236
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#remove_volumes Container#remove_volumes}
242
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#remove_volumes Container#remove_volumes}
237
243
  */
238
244
  readonly removeVolumes?: boolean | cdktn.IResolvable;
239
245
  /**
240
246
  * The restart policy for the container. Must be one of 'no', 'on-failure', 'always', 'unless-stopped'. Defaults to `no`.
241
247
  *
242
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#restart Container#restart}
248
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#restart Container#restart}
243
249
  */
244
250
  readonly restart?: string;
245
251
  /**
246
252
  * If `true`, then the container will be automatically removed when it exits. Defaults to `false`.
247
253
  *
248
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#rm Container#rm}
254
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#rm Container#rm}
249
255
  */
250
256
  readonly rm?: boolean | cdktn.IResolvable;
251
257
  /**
252
258
  * Runtime to use for the container.
253
259
  *
254
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#runtime Container#runtime}
260
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#runtime Container#runtime}
255
261
  */
256
262
  readonly runtime?: string;
257
263
  /**
258
264
  * List of string values to customize labels for MLS systems, such as SELinux. See https://docs.docker.com/engine/reference/run/#security-configuration.
259
265
  *
260
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#security_opts Container#security_opts}
266
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#security_opts Container#security_opts}
261
267
  */
262
268
  readonly securityOpts?: string[];
263
269
  /**
264
270
  * Size of `/dev/shm` in MBs.
265
271
  *
266
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#shm_size Container#shm_size}
272
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#shm_size Container#shm_size}
267
273
  */
268
274
  readonly shmSize?: number;
269
275
  /**
270
276
  * If `true`, then the Docker container will be started after creation. If `false`, then the container is only created. Defaults to `true`.
271
277
  *
272
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#start Container#start}
278
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#start Container#start}
273
279
  */
274
280
  readonly start?: boolean | cdktn.IResolvable;
275
281
  /**
276
282
  * If `true`, keep STDIN open even if not attached (`docker run -i`). Defaults to `false`.
277
283
  *
278
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#stdin_open Container#stdin_open}
284
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#stdin_open Container#stdin_open}
279
285
  */
280
286
  readonly stdinOpen?: boolean | cdktn.IResolvable;
281
287
  /**
282
288
  * Signal to stop a container (default `SIGTERM`).
283
289
  *
284
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#stop_signal Container#stop_signal}
290
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#stop_signal Container#stop_signal}
285
291
  */
286
292
  readonly stopSignal?: string;
287
293
  /**
288
294
  * Timeout (in seconds) to stop a container.
289
295
  *
290
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#stop_timeout Container#stop_timeout}
296
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#stop_timeout Container#stop_timeout}
291
297
  */
292
298
  readonly stopTimeout?: number;
293
299
  /**
294
300
  * Key/value pairs for the storage driver options, e.g. `size`: `120G`
295
301
  *
296
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#storage_opts Container#storage_opts}
302
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#storage_opts Container#storage_opts}
297
303
  */
298
304
  readonly storageOpts?: {
299
305
  [key: string]: string;
@@ -301,7 +307,7 @@ export interface ContainerConfig extends cdktn.TerraformMetaArguments {
301
307
  /**
302
308
  * A map of kernel parameters (sysctls) to set in the container.
303
309
  *
304
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#sysctls Container#sysctls}
310
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#sysctls Container#sysctls}
305
311
  */
306
312
  readonly sysctls?: {
307
313
  [key: string]: string;
@@ -309,7 +315,7 @@ export interface ContainerConfig extends cdktn.TerraformMetaArguments {
309
315
  /**
310
316
  * A map of container directories which should be replaced by `tmpfs mounts`, and their corresponding mount options.
311
317
  *
312
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#tmpfs Container#tmpfs}
318
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#tmpfs Container#tmpfs}
313
319
  */
314
320
  readonly tmpfs?: {
315
321
  [key: string]: string;
@@ -317,103 +323,103 @@ export interface ContainerConfig extends cdktn.TerraformMetaArguments {
317
323
  /**
318
324
  * If `true`, allocate a pseudo-tty (`docker run -t`). Defaults to `false`.
319
325
  *
320
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#tty Container#tty}
326
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#tty Container#tty}
321
327
  */
322
328
  readonly tty?: boolean | cdktn.IResolvable;
323
329
  /**
324
330
  * User used for run the first process. Format is `user` or `user:group` which user and group can be passed literraly or by name.
325
331
  *
326
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#user Container#user}
332
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#user Container#user}
327
333
  */
328
334
  readonly user?: string;
329
335
  /**
330
336
  * Sets the usernamespace mode for the container when usernamespace remapping option is enabled.
331
337
  *
332
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#userns_mode Container#userns_mode}
338
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#userns_mode Container#userns_mode}
333
339
  */
334
340
  readonly usernsMode?: string;
335
341
  /**
336
342
  * If `true`, then the Docker container is waited for being healthy state after creation. This requires your container to have a healthcheck, otherwise this provider will error. If `false`, then the container health state is not checked. Defaults to `false`.
337
343
  *
338
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#wait Container#wait}
344
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#wait Container#wait}
339
345
  */
340
346
  readonly wait?: boolean | cdktn.IResolvable;
341
347
  /**
342
348
  * The timeout in seconds to wait the container to be healthy after creation. Defaults to `60`.
343
349
  *
344
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#wait_timeout Container#wait_timeout}
350
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#wait_timeout Container#wait_timeout}
345
351
  */
346
352
  readonly waitTimeout?: number;
347
353
  /**
348
354
  * The working directory for commands to run in.
349
355
  *
350
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#working_dir Container#working_dir}
356
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#working_dir Container#working_dir}
351
357
  */
352
358
  readonly workingDir?: string;
353
359
  /**
354
360
  * capabilities block
355
361
  *
356
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#capabilities Container#capabilities}
362
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#capabilities Container#capabilities}
357
363
  */
358
364
  readonly capabilities?: ContainerCapabilities;
359
365
  /**
360
366
  * devices block
361
367
  *
362
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#devices Container#devices}
368
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#devices Container#devices}
363
369
  */
364
370
  readonly devices?: ContainerDevices[] | cdktn.IResolvable;
365
371
  /**
366
372
  * healthcheck block
367
373
  *
368
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#healthcheck Container#healthcheck}
374
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#healthcheck Container#healthcheck}
369
375
  */
370
376
  readonly healthcheck?: ContainerHealthcheck;
371
377
  /**
372
378
  * host block
373
379
  *
374
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#host Container#host}
380
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#host Container#host}
375
381
  */
376
382
  readonly host?: ContainerHost[] | cdktn.IResolvable;
377
383
  /**
378
384
  * labels block
379
385
  *
380
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#labels Container#labels}
386
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#labels Container#labels}
381
387
  */
382
388
  readonly labels?: ContainerLabels[] | cdktn.IResolvable;
383
389
  /**
384
390
  * mounts block
385
391
  *
386
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#mounts Container#mounts}
392
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#mounts Container#mounts}
387
393
  */
388
394
  readonly mounts?: ContainerMounts[] | cdktn.IResolvable;
389
395
  /**
390
396
  * networks_advanced block
391
397
  *
392
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#networks_advanced Container#networks_advanced}
398
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#networks_advanced Container#networks_advanced}
393
399
  */
394
400
  readonly networksAdvanced?: ContainerNetworksAdvanced[] | cdktn.IResolvable;
395
401
  /**
396
402
  * ports block
397
403
  *
398
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#ports Container#ports}
404
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#ports Container#ports}
399
405
  */
400
406
  readonly ports?: ContainerPorts[] | cdktn.IResolvable;
401
407
  /**
402
408
  * ulimit block
403
409
  *
404
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#ulimit Container#ulimit}
410
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#ulimit Container#ulimit}
405
411
  */
406
412
  readonly ulimit?: ContainerUlimit[] | cdktn.IResolvable;
407
413
  /**
408
414
  * upload block
409
415
  *
410
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#upload Container#upload}
416
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#upload Container#upload}
411
417
  */
412
418
  readonly upload?: ContainerUpload[] | cdktn.IResolvable;
413
419
  /**
414
420
  * volumes block
415
421
  *
416
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#volumes Container#volumes}
422
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#volumes Container#volumes}
417
423
  */
418
424
  readonly volumes?: ContainerVolumes[] | cdktn.IResolvable;
419
425
  }
@@ -460,13 +466,13 @@ export interface ContainerCapabilities {
460
466
  /**
461
467
  * List of linux capabilities to add.
462
468
  *
463
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#add Container#add}
469
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#add Container#add}
464
470
  */
465
471
  readonly add?: string[];
466
472
  /**
467
473
  * List of linux capabilities to drop.
468
474
  *
469
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#drop Container#drop}
475
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#drop Container#drop}
470
476
  */
471
477
  readonly drop?: string[];
472
478
  }
@@ -496,19 +502,19 @@ export interface ContainerDevices {
496
502
  /**
497
503
  * The path in the container where the device will be bound.
498
504
  *
499
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#container_path Container#container_path}
505
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#container_path Container#container_path}
500
506
  */
501
507
  readonly containerPath?: string;
502
508
  /**
503
509
  * The path on the host where the device is located.
504
510
  *
505
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#host_path Container#host_path}
511
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#host_path Container#host_path}
506
512
  */
507
513
  readonly hostPath: string;
508
514
  /**
509
515
  * The cgroup permissions given to the container to access the device. Defaults to `rwm`.
510
516
  *
511
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#permissions Container#permissions}
517
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#permissions Container#permissions}
512
518
  */
513
519
  readonly permissions?: string;
514
520
  }
@@ -561,37 +567,37 @@ export interface ContainerHealthcheck {
561
567
  /**
562
568
  * Time between running the check (ms|s|m|h). Defaults to `0s`.
563
569
  *
564
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#interval Container#interval}
570
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#interval Container#interval}
565
571
  */
566
572
  readonly interval?: string;
567
573
  /**
568
574
  * Consecutive failures needed to report unhealthy. Defaults to `0`.
569
575
  *
570
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#retries Container#retries}
576
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#retries Container#retries}
571
577
  */
572
578
  readonly retries?: number;
573
579
  /**
574
580
  * Interval before the healthcheck starts (ms|s|m|h). Defaults to `0s`.
575
581
  *
576
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#start_interval Container#start_interval}
582
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#start_interval Container#start_interval}
577
583
  */
578
584
  readonly startInterval?: string;
579
585
  /**
580
586
  * Start period for the container to initialize before counting retries towards unstable (ms|s|m|h). Defaults to `0s`.
581
587
  *
582
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#start_period Container#start_period}
588
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#start_period Container#start_period}
583
589
  */
584
590
  readonly startPeriod?: string;
585
591
  /**
586
592
  * Command to run to check health. For example, to run `curl -f localhost/health` set the command to be `["CMD", "curl", "-f", "localhost/health"]`.
587
593
  *
588
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#test Container#test}
594
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#test Container#test}
589
595
  */
590
596
  readonly test: string[];
591
597
  /**
592
598
  * Maximum time to allow one check to run (ms|s|m|h). Defaults to `0s`.
593
599
  *
594
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#timeout Container#timeout}
600
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#timeout Container#timeout}
595
601
  */
596
602
  readonly timeout?: string;
597
603
  }
@@ -640,13 +646,13 @@ export interface ContainerHost {
640
646
  /**
641
647
  * Hostname to add
642
648
  *
643
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#host Container#host}
649
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#host Container#host}
644
650
  */
645
651
  readonly host: string;
646
652
  /**
647
653
  * IP address this hostname should resolve to.
648
654
  *
649
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#ip Container#ip}
655
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#ip Container#ip}
650
656
  */
651
657
  readonly ip: string;
652
658
  }
@@ -693,13 +699,13 @@ export interface ContainerLabels {
693
699
  /**
694
700
  * Name of the label
695
701
  *
696
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#label Container#label}
702
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#label Container#label}
697
703
  */
698
704
  readonly label: string;
699
705
  /**
700
706
  * Value of the label
701
707
  *
702
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#value Container#value}
708
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#value Container#value}
703
709
  */
704
710
  readonly value: string;
705
711
  }
@@ -746,7 +752,7 @@ export interface ContainerMountsBindOptions {
746
752
  /**
747
753
  * A propagation mode with the value.
748
754
  *
749
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#propagation Container#propagation}
755
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#propagation Container#propagation}
750
756
  */
751
757
  readonly propagation?: string;
752
758
  }
@@ -771,13 +777,13 @@ export interface ContainerMountsTmpfsOptions {
771
777
  /**
772
778
  * The permission mode for the tmpfs mount in an integer.
773
779
  *
774
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#mode Container#mode}
780
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#mode Container#mode}
775
781
  */
776
782
  readonly mode?: number;
777
783
  /**
778
784
  * The size for the tmpfs mount in bytes.
779
785
  *
780
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#size_bytes Container#size_bytes}
786
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#size_bytes Container#size_bytes}
781
787
  */
782
788
  readonly sizeBytes?: number;
783
789
  }
@@ -807,13 +813,13 @@ export interface ContainerMountsVolumeOptionsLabels {
807
813
  /**
808
814
  * Name of the label
809
815
  *
810
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#label Container#label}
816
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#label Container#label}
811
817
  */
812
818
  readonly label: string;
813
819
  /**
814
820
  * Value of the label
815
821
  *
816
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#value Container#value}
822
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#value Container#value}
817
823
  */
818
824
  readonly value: string;
819
825
  }
@@ -860,13 +866,13 @@ export interface ContainerMountsVolumeOptions {
860
866
  /**
861
867
  * Name of the driver to use to create the volume.
862
868
  *
863
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#driver_name Container#driver_name}
869
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#driver_name Container#driver_name}
864
870
  */
865
871
  readonly driverName?: string;
866
872
  /**
867
873
  * key/value map of driver specific options.
868
874
  *
869
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#driver_options Container#driver_options}
875
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#driver_options Container#driver_options}
870
876
  */
871
877
  readonly driverOptions?: {
872
878
  [key: string]: string;
@@ -874,19 +880,19 @@ export interface ContainerMountsVolumeOptions {
874
880
  /**
875
881
  * Populate volume with data from the target.
876
882
  *
877
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#no_copy Container#no_copy}
883
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#no_copy Container#no_copy}
878
884
  */
879
885
  readonly noCopy?: boolean | cdktn.IResolvable;
880
886
  /**
881
887
  * Path within the volume to mount. Requires docker server version 1.45 or higher.
882
888
  *
883
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#subpath Container#subpath}
889
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#subpath Container#subpath}
884
890
  */
885
891
  readonly subpath?: string;
886
892
  /**
887
893
  * labels block
888
894
  *
889
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#labels Container#labels}
895
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#labels Container#labels}
890
896
  */
891
897
  readonly labels?: ContainerMountsVolumeOptionsLabels[] | cdktn.IResolvable;
892
898
  }
@@ -937,43 +943,43 @@ export interface ContainerMounts {
937
943
  /**
938
944
  * Whether the mount should be read-only.
939
945
  *
940
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#read_only Container#read_only}
946
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#read_only Container#read_only}
941
947
  */
942
948
  readonly readOnly?: boolean | cdktn.IResolvable;
943
949
  /**
944
950
  * Mount source (e.g. a volume name, a host path).
945
951
  *
946
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#source Container#source}
952
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#source Container#source}
947
953
  */
948
954
  readonly source?: string;
949
955
  /**
950
956
  * Container path
951
957
  *
952
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#target Container#target}
958
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#target Container#target}
953
959
  */
954
960
  readonly target: string;
955
961
  /**
956
962
  * The mount type
957
963
  *
958
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#type Container#type}
964
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#type Container#type}
959
965
  */
960
966
  readonly type: string;
961
967
  /**
962
968
  * bind_options block
963
969
  *
964
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#bind_options Container#bind_options}
970
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#bind_options Container#bind_options}
965
971
  */
966
972
  readonly bindOptions?: ContainerMountsBindOptions;
967
973
  /**
968
974
  * tmpfs_options block
969
975
  *
970
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#tmpfs_options Container#tmpfs_options}
976
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#tmpfs_options Container#tmpfs_options}
971
977
  */
972
978
  readonly tmpfsOptions?: ContainerMountsTmpfsOptions;
973
979
  /**
974
980
  * volume_options block
975
981
  *
976
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#volume_options Container#volume_options}
982
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#volume_options Container#volume_options}
977
983
  */
978
984
  readonly volumeOptions?: ContainerMountsVolumeOptions;
979
985
  }
@@ -1045,25 +1051,31 @@ export interface ContainerNetworksAdvanced {
1045
1051
  /**
1046
1052
  * The network aliases of the container in the specific network.
1047
1053
  *
1048
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#aliases Container#aliases}
1054
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#aliases Container#aliases}
1049
1055
  */
1050
1056
  readonly aliases?: string[];
1051
1057
  /**
1052
1058
  * The IPV4 address of the container in the specific network.
1053
1059
  *
1054
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#ipv4_address Container#ipv4_address}
1060
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#ipv4_address Container#ipv4_address}
1055
1061
  */
1056
1062
  readonly ipv4Address?: string;
1057
1063
  /**
1058
1064
  * The IPV6 address of the container in the specific network.
1059
1065
  *
1060
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#ipv6_address Container#ipv6_address}
1066
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#ipv6_address Container#ipv6_address}
1061
1067
  */
1062
1068
  readonly ipv6Address?: string;
1063
1069
  /**
1070
+ * The MAC address of the container in the specific network.
1071
+ *
1072
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#mac_address Container#mac_address}
1073
+ */
1074
+ readonly macAddress?: string;
1075
+ /**
1064
1076
  * The name or id of the network to use. You can use `name` or `id` attribute from a `docker_network` resource.
1065
1077
  *
1066
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#name Container#name}
1078
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#name Container#name}
1067
1079
  */
1068
1080
  readonly name: string;
1069
1081
  }
@@ -1096,6 +1108,11 @@ export declare class ContainerNetworksAdvancedOutputReference extends cdktn.Comp
1096
1108
  set ipv6Address(value: string);
1097
1109
  resetIpv6Address(): void;
1098
1110
  get ipv6AddressInput(): string | undefined;
1111
+ private _macAddress?;
1112
+ get macAddress(): string;
1113
+ set macAddress(value: string);
1114
+ resetMacAddress(): void;
1115
+ get macAddressInput(): string | undefined;
1099
1116
  private _name?;
1100
1117
  get name(): string;
1101
1118
  set name(value: string);
@@ -1121,25 +1138,25 @@ export interface ContainerPorts {
1121
1138
  /**
1122
1139
  * Port exposed out of the container. If not given a free random port `>= 32768` will be used.
1123
1140
  *
1124
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#external Container#external}
1141
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#external Container#external}
1125
1142
  */
1126
1143
  readonly external?: number;
1127
1144
  /**
1128
1145
  * Port within the container.
1129
1146
  *
1130
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#internal Container#internal}
1147
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#internal Container#internal}
1131
1148
  */
1132
1149
  readonly internal: number;
1133
1150
  /**
1134
1151
  * IP address/mask that can access this port. Defaults to `0.0.0.0`.
1135
1152
  *
1136
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#ip Container#ip}
1153
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#ip Container#ip}
1137
1154
  */
1138
1155
  readonly ip?: string;
1139
1156
  /**
1140
1157
  * Protocol that can be used over this port. Defaults to `tcp`.
1141
1158
  *
1142
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#protocol Container#protocol}
1159
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#protocol Container#protocol}
1143
1160
  */
1144
1161
  readonly protocol?: string;
1145
1162
  }
@@ -1197,19 +1214,19 @@ export interface ContainerUlimit {
1197
1214
  /**
1198
1215
  * The hard limit
1199
1216
  *
1200
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#hard Container#hard}
1217
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#hard Container#hard}
1201
1218
  */
1202
1219
  readonly hard: number;
1203
1220
  /**
1204
1221
  * The name of the ulimit
1205
1222
  *
1206
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#name Container#name}
1223
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#name Container#name}
1207
1224
  */
1208
1225
  readonly name: string;
1209
1226
  /**
1210
1227
  * The soft limit
1211
1228
  *
1212
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#soft Container#soft}
1229
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#soft Container#soft}
1213
1230
  */
1214
1231
  readonly soft: number;
1215
1232
  }
@@ -1260,43 +1277,43 @@ export interface ContainerUpload {
1260
1277
  /**
1261
1278
  * Literal string value to use as the object content, which will be uploaded as UTF-8-encoded text. Conflicts with `content_base64` & `source`
1262
1279
  *
1263
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#content Container#content}
1280
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#content Container#content}
1264
1281
  */
1265
1282
  readonly content?: string;
1266
1283
  /**
1267
1284
  * Base64-encoded data that will be decoded and uploaded as raw bytes for the object content. This allows safely uploading non-UTF8 binary data, but is recommended only for larger binary content such as the result of the `base64encode` interpolation function. See [here](https://github.com/terraform-providers/terraform-provider-docker/issues/48#issuecomment-374174588) for the reason. Conflicts with `content` & `source`
1268
1285
  *
1269
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#content_base64 Container#content_base64}
1286
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#content_base64 Container#content_base64}
1270
1287
  */
1271
1288
  readonly contentBase64?: string;
1272
1289
  /**
1273
1290
  * If `true`, the file will be uploaded with user executable permission. Defaults to `false`.
1274
1291
  *
1275
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#executable Container#executable}
1292
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#executable Container#executable}
1276
1293
  */
1277
1294
  readonly executable?: boolean | cdktn.IResolvable;
1278
1295
  /**
1279
1296
  * Path to the file in the container where is upload goes to
1280
1297
  *
1281
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#file Container#file}
1298
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#file Container#file}
1282
1299
  */
1283
1300
  readonly file: string;
1284
1301
  /**
1285
1302
  * The permission mode for the file in the container. Has precedence over `executable`.
1286
1303
  *
1287
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#permissions Container#permissions}
1304
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#permissions Container#permissions}
1288
1305
  */
1289
1306
  readonly permissions?: string;
1290
1307
  /**
1291
1308
  * A filename that references a file which will be uploaded as the object content. This allows for large file uploads that do not get stored in state. Conflicts with `content` & `content_base64`
1292
1309
  *
1293
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#source Container#source}
1310
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#source Container#source}
1294
1311
  */
1295
1312
  readonly source?: string;
1296
1313
  /**
1297
1314
  * If using `source`, this will force an update if the file content has updated but the filename has not.
1298
1315
  *
1299
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#source_hash Container#source_hash}
1316
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#source_hash Container#source_hash}
1300
1317
  */
1301
1318
  readonly sourceHash?: string;
1302
1319
  }
@@ -1369,31 +1386,31 @@ export interface ContainerVolumes {
1369
1386
  /**
1370
1387
  * The path in the container where the volume will be mounted.
1371
1388
  *
1372
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#container_path Container#container_path}
1389
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#container_path Container#container_path}
1373
1390
  */
1374
1391
  readonly containerPath?: string;
1375
1392
  /**
1376
1393
  * The container where the volume is coming from.
1377
1394
  *
1378
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#from_container Container#from_container}
1395
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#from_container Container#from_container}
1379
1396
  */
1380
1397
  readonly fromContainer?: string;
1381
1398
  /**
1382
1399
  * The path on the host where the volume is coming from.
1383
1400
  *
1384
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#host_path Container#host_path}
1401
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#host_path Container#host_path}
1385
1402
  */
1386
1403
  readonly hostPath?: string;
1387
1404
  /**
1388
1405
  * If `true`, this volume will be readonly. Defaults to `false`.
1389
1406
  *
1390
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#read_only Container#read_only}
1407
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#read_only Container#read_only}
1391
1408
  */
1392
1409
  readonly readOnly?: boolean | cdktn.IResolvable;
1393
1410
  /**
1394
1411
  * The name of the docker volume which should be mounted.
1395
1412
  *
1396
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#volume_name Container#volume_name}
1413
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#volume_name Container#volume_name}
1397
1414
  */
1398
1415
  readonly volumeName?: string;
1399
1416
  }
@@ -1454,7 +1471,7 @@ export declare class ContainerVolumesList extends cdktn.ComplexList {
1454
1471
  get(index: number): ContainerVolumesOutputReference;
1455
1472
  }
1456
1473
  /**
1457
- * Represents a {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container docker_container}
1474
+ * Represents a {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container docker_container}
1458
1475
  */
1459
1476
  export declare class Container extends cdktn.TerraformResource {
1460
1477
  static readonly tfResourceType = "docker_container";
@@ -1462,12 +1479,12 @@ export declare class Container extends cdktn.TerraformResource {
1462
1479
  * Generates CDKTN code for importing a Container resource upon running "cdktn plan <stack-name>"
1463
1480
  * @param scope The scope in which to define this construct
1464
1481
  * @param importToId The construct id used in the generated config for the Container to import
1465
- * @param importFromId The id of the existing Container that should be imported. Refer to the {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container#import import section} in the documentation of this resource for the id to use
1482
+ * @param importFromId The id of the existing Container that should be imported. Refer to the {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container#import import section} in the documentation of this resource for the id to use
1466
1483
  * @param provider? Optional instance of the provider where the Container to import is found
1467
1484
  */
1468
1485
  static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktn.TerraformProvider): cdktn.ImportableResource;
1469
1486
  /**
1470
- * Create a new {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/resources/container docker_container} Resource
1487
+ * Create a new {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.9.0/docs/resources/container docker_container} Resource
1471
1488
  *
1472
1489
  * @param scope The scope in which to define this construct
1473
1490
  * @param id The scoped construct ID. Must be unique amongst siblings in the same scope
@@ -1627,6 +1644,11 @@ export declare class Container extends cdktn.TerraformResource {
1627
1644
  set memory(value: number);
1628
1645
  resetMemory(): void;
1629
1646
  get memoryInput(): number | undefined;
1647
+ private _memoryReservation?;
1648
+ get memoryReservation(): number;
1649
+ set memoryReservation(value: number);
1650
+ resetMemoryReservation(): void;
1651
+ get memoryReservationInput(): number | undefined;
1630
1652
  private _memorySwap?;
1631
1653
  get memorySwap(): number;
1632
1654
  set memorySwap(value: number);