cdktf-cdktf-provider-upcloud 11.0.3__py3-none-any.whl → 11.1.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.

Files changed (55) hide show
  1. cdktf_cdktf_provider_upcloud/__init__.py +3 -3
  2. cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
  3. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@11.1.0.jsii.tgz +0 -0
  4. cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +7 -7
  5. cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +7 -7
  6. cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +7 -7
  7. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
  8. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
  9. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
  10. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
  11. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
  12. cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
  13. cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +25 -25
  14. cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
  15. cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
  16. cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +10 -10
  17. cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +41 -41
  18. cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +19 -19
  19. cdktf_cdktf_provider_upcloud/gateway/__init__.py +28 -28
  20. cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +28 -28
  21. cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +47 -47
  22. cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +36 -36
  23. cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +64 -64
  24. cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +16 -16
  25. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +28 -28
  26. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +16 -16
  27. cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +39 -39
  28. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +165 -165
  29. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +16 -16
  30. cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +19 -19
  31. cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +31 -31
  32. cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +28 -28
  33. cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
  34. cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +175 -175
  35. cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +73 -73
  36. cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +292 -292
  37. cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +100 -100
  38. cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +50 -50
  39. cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +73 -30
  40. cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +19 -19
  41. cdktf_cdktf_provider_upcloud/network/__init__.py +40 -40
  42. cdktf_cdktf_provider_upcloud/object_storage/__init__.py +30 -30
  43. cdktf_cdktf_provider_upcloud/provider/__init__.py +25 -25
  44. cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
  45. cdktf_cdktf_provider_upcloud/server/__init__.py +141 -141
  46. cdktf_cdktf_provider_upcloud/server_group/__init__.py +19 -19
  47. cdktf_cdktf_provider_upcloud/storage/__init__.py +55 -55
  48. cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
  49. {cdktf_cdktf_provider_upcloud-11.0.3.dist-info → cdktf_cdktf_provider_upcloud-11.1.0.dist-info}/METADATA +4 -4
  50. cdktf_cdktf_provider_upcloud-11.1.0.dist-info/RECORD +54 -0
  51. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@11.0.3.jsii.tgz +0 -0
  52. cdktf_cdktf_provider_upcloud-11.0.3.dist-info/RECORD +0 -54
  53. {cdktf_cdktf_provider_upcloud-11.0.3.dist-info → cdktf_cdktf_provider_upcloud-11.1.0.dist-info}/LICENSE +0 -0
  54. {cdktf_cdktf_provider_upcloud-11.0.3.dist-info → cdktf_cdktf_provider_upcloud-11.1.0.dist-info}/WHEEL +0 -0
  55. {cdktf_cdktf_provider_upcloud-11.0.3.dist-info → cdktf_cdktf_provider_upcloud-11.1.0.dist-info}/top_level.txt +0 -0
@@ -1,7 +1,7 @@
1
1
  '''
2
2
  # `upcloud_managed_database_user`
3
3
 
4
- Refer to the Terraform Registory for docs: [`upcloud_managed_database_user`](https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user).
4
+ Refer to the Terraform Registory for docs: [`upcloud_managed_database_user`](https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user).
5
5
  '''
6
6
  import abc
7
7
  import builtins
@@ -26,7 +26,7 @@ class ManagedDatabaseUser(
26
26
  metaclass=jsii.JSIIMeta,
27
27
  jsii_type="@cdktf/provider-upcloud.managedDatabaseUser.ManagedDatabaseUser",
28
28
  ):
29
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user upcloud_managed_database_user}.'''
29
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user upcloud_managed_database_user}.'''
30
30
 
31
31
  def __init__(
32
32
  self,
@@ -49,18 +49,18 @@ class ManagedDatabaseUser(
49
49
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
50
50
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
51
51
  ) -> None:
52
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user upcloud_managed_database_user} Resource.
52
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user upcloud_managed_database_user} Resource.
53
53
 
54
54
  :param scope: The scope in which to define this construct.
55
55
  :param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
56
- :param service: Service's UUID for which this user belongs to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#service ManagedDatabaseUser#service}
57
- :param username: Name of the database user. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#username ManagedDatabaseUser#username}
58
- :param authentication: MySQL only, authentication type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#authentication ManagedDatabaseUser#authentication}
59
- :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#id ManagedDatabaseUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
60
- :param opensearch_access_control: opensearch_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#opensearch_access_control ManagedDatabaseUser#opensearch_access_control}
61
- :param password: Password for the database user. Defaults to a random value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#password ManagedDatabaseUser#password}
62
- :param pg_access_control: pg_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#pg_access_control ManagedDatabaseUser#pg_access_control}
63
- :param redis_access_control: redis_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#redis_access_control ManagedDatabaseUser#redis_access_control}
56
+ :param service: Service's UUID for which this user belongs to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#service ManagedDatabaseUser#service}
57
+ :param username: Name of the database user. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#username ManagedDatabaseUser#username}
58
+ :param authentication: MySQL only, authentication type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#authentication ManagedDatabaseUser#authentication}
59
+ :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#id ManagedDatabaseUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
60
+ :param opensearch_access_control: opensearch_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#opensearch_access_control ManagedDatabaseUser#opensearch_access_control}
61
+ :param password: Password for the database user. Defaults to a random value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#password ManagedDatabaseUser#password}
62
+ :param pg_access_control: pg_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#pg_access_control ManagedDatabaseUser#pg_access_control}
63
+ :param redis_access_control: redis_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#redis_access_control ManagedDatabaseUser#redis_access_control}
64
64
  :param connection:
65
65
  :param count:
66
66
  :param depends_on:
@@ -106,7 +106,7 @@ class ManagedDatabaseUser(
106
106
 
107
107
  :param scope: The scope in which to define this construct.
108
108
  :param import_to_id: The construct id used in the generated config for the ManagedDatabaseUser to import.
109
- :param import_from_id: The id of the existing ManagedDatabaseUser that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#import import section} in the documentation of this resource for the id to use
109
+ :param import_from_id: The id of the existing ManagedDatabaseUser that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#import import section} in the documentation of this resource for the id to use
110
110
  :param provider: ? Optional instance of the provider where the ManagedDatabaseUser to import is found.
111
111
  '''
112
112
  if __debug__:
@@ -124,7 +124,7 @@ class ManagedDatabaseUser(
124
124
  rules: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["ManagedDatabaseUserOpensearchAccessControlRules", typing.Dict[builtins.str, typing.Any]]]],
125
125
  ) -> None:
126
126
  '''
127
- :param rules: rules block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#rules ManagedDatabaseUser#rules}
127
+ :param rules: rules block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#rules ManagedDatabaseUser#rules}
128
128
  '''
129
129
  value = ManagedDatabaseUserOpensearchAccessControl(rules=rules)
130
130
 
@@ -137,7 +137,7 @@ class ManagedDatabaseUser(
137
137
  allow_replication: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
138
138
  ) -> None:
139
139
  '''
140
- :param allow_replication: Grant replication privilege. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#allow_replication ManagedDatabaseUser#allow_replication}
140
+ :param allow_replication: Grant replication privilege. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#allow_replication ManagedDatabaseUser#allow_replication}
141
141
  '''
142
142
  value = ManagedDatabaseUserPgAccessControl(allow_replication=allow_replication)
143
143
 
@@ -153,10 +153,10 @@ class ManagedDatabaseUser(
153
153
  keys: typing.Optional[typing.Sequence[builtins.str]] = None,
154
154
  ) -> None:
155
155
  '''
156
- :param categories: Set access control to all commands in specified categories. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
157
- :param channels: Set access control to Pub/Sub channels. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
158
- :param commands: Set access control to commands. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
159
- :param keys: Set access control to keys. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
156
+ :param categories: Set access control to all commands in specified categories. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
157
+ :param channels: Set access control to Pub/Sub channels. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
158
+ :param commands: Set access control to commands. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
159
+ :param keys: Set access control to keys. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
160
160
  '''
161
161
  value = ManagedDatabaseUserRedisAccessControl(
162
162
  categories=categories, channels=channels, commands=commands, keys=keys
@@ -377,14 +377,14 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
377
377
  :param lifecycle:
378
378
  :param provider:
379
379
  :param provisioners:
380
- :param service: Service's UUID for which this user belongs to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#service ManagedDatabaseUser#service}
381
- :param username: Name of the database user. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#username ManagedDatabaseUser#username}
382
- :param authentication: MySQL only, authentication type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#authentication ManagedDatabaseUser#authentication}
383
- :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#id ManagedDatabaseUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
384
- :param opensearch_access_control: opensearch_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#opensearch_access_control ManagedDatabaseUser#opensearch_access_control}
385
- :param password: Password for the database user. Defaults to a random value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#password ManagedDatabaseUser#password}
386
- :param pg_access_control: pg_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#pg_access_control ManagedDatabaseUser#pg_access_control}
387
- :param redis_access_control: redis_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#redis_access_control ManagedDatabaseUser#redis_access_control}
380
+ :param service: Service's UUID for which this user belongs to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#service ManagedDatabaseUser#service}
381
+ :param username: Name of the database user. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#username ManagedDatabaseUser#username}
382
+ :param authentication: MySQL only, authentication type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#authentication ManagedDatabaseUser#authentication}
383
+ :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#id ManagedDatabaseUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
384
+ :param opensearch_access_control: opensearch_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#opensearch_access_control ManagedDatabaseUser#opensearch_access_control}
385
+ :param password: Password for the database user. Defaults to a random value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#password ManagedDatabaseUser#password}
386
+ :param pg_access_control: pg_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#pg_access_control ManagedDatabaseUser#pg_access_control}
387
+ :param redis_access_control: redis_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#redis_access_control ManagedDatabaseUser#redis_access_control}
388
388
  '''
389
389
  if isinstance(lifecycle, dict):
390
390
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -510,7 +510,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
510
510
  def service(self) -> builtins.str:
511
511
  '''Service's UUID for which this user belongs to.
512
512
 
513
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#service ManagedDatabaseUser#service}
513
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#service ManagedDatabaseUser#service}
514
514
  '''
515
515
  result = self._values.get("service")
516
516
  assert result is not None, "Required property 'service' is missing"
@@ -520,7 +520,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
520
520
  def username(self) -> builtins.str:
521
521
  '''Name of the database user.
522
522
 
523
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#username ManagedDatabaseUser#username}
523
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#username ManagedDatabaseUser#username}
524
524
  '''
525
525
  result = self._values.get("username")
526
526
  assert result is not None, "Required property 'username' is missing"
@@ -530,14 +530,14 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
530
530
  def authentication(self) -> typing.Optional[builtins.str]:
531
531
  '''MySQL only, authentication type.
532
532
 
533
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#authentication ManagedDatabaseUser#authentication}
533
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#authentication ManagedDatabaseUser#authentication}
534
534
  '''
535
535
  result = self._values.get("authentication")
536
536
  return typing.cast(typing.Optional[builtins.str], result)
537
537
 
538
538
  @builtins.property
539
539
  def id(self) -> typing.Optional[builtins.str]:
540
- '''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#id ManagedDatabaseUser#id}.
540
+ '''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#id ManagedDatabaseUser#id}.
541
541
 
542
542
  Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
543
543
  If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -551,7 +551,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
551
551
  ) -> typing.Optional["ManagedDatabaseUserOpensearchAccessControl"]:
552
552
  '''opensearch_access_control block.
553
553
 
554
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#opensearch_access_control ManagedDatabaseUser#opensearch_access_control}
554
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#opensearch_access_control ManagedDatabaseUser#opensearch_access_control}
555
555
  '''
556
556
  result = self._values.get("opensearch_access_control")
557
557
  return typing.cast(typing.Optional["ManagedDatabaseUserOpensearchAccessControl"], result)
@@ -560,7 +560,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
560
560
  def password(self) -> typing.Optional[builtins.str]:
561
561
  '''Password for the database user. Defaults to a random value.
562
562
 
563
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#password ManagedDatabaseUser#password}
563
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#password ManagedDatabaseUser#password}
564
564
  '''
565
565
  result = self._values.get("password")
566
566
  return typing.cast(typing.Optional[builtins.str], result)
@@ -571,7 +571,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
571
571
  ) -> typing.Optional["ManagedDatabaseUserPgAccessControl"]:
572
572
  '''pg_access_control block.
573
573
 
574
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#pg_access_control ManagedDatabaseUser#pg_access_control}
574
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#pg_access_control ManagedDatabaseUser#pg_access_control}
575
575
  '''
576
576
  result = self._values.get("pg_access_control")
577
577
  return typing.cast(typing.Optional["ManagedDatabaseUserPgAccessControl"], result)
@@ -582,7 +582,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
582
582
  ) -> typing.Optional["ManagedDatabaseUserRedisAccessControl"]:
583
583
  '''redis_access_control block.
584
584
 
585
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#redis_access_control ManagedDatabaseUser#redis_access_control}
585
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#redis_access_control ManagedDatabaseUser#redis_access_control}
586
586
  '''
587
587
  result = self._values.get("redis_access_control")
588
588
  return typing.cast(typing.Optional["ManagedDatabaseUserRedisAccessControl"], result)
@@ -611,7 +611,7 @@ class ManagedDatabaseUserOpensearchAccessControl:
611
611
  rules: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["ManagedDatabaseUserOpensearchAccessControlRules", typing.Dict[builtins.str, typing.Any]]]],
612
612
  ) -> None:
613
613
  '''
614
- :param rules: rules block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#rules ManagedDatabaseUser#rules}
614
+ :param rules: rules block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#rules ManagedDatabaseUser#rules}
615
615
  '''
616
616
  if __debug__:
617
617
  type_hints = typing.get_type_hints(_typecheckingstub__72db216f4a07b0d61090bf6cee72765d201a2daf9f3d0177b70ceadc0e0b4950)
@@ -626,7 +626,7 @@ class ManagedDatabaseUserOpensearchAccessControl:
626
626
  ) -> typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["ManagedDatabaseUserOpensearchAccessControlRules"]]:
627
627
  '''rules block.
628
628
 
629
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#rules ManagedDatabaseUser#rules}
629
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#rules ManagedDatabaseUser#rules}
630
630
  '''
631
631
  result = self._values.get("rules")
632
632
  assert result is not None, "Required property 'rules' is missing"
@@ -715,8 +715,8 @@ class ManagedDatabaseUserOpensearchAccessControlOutputReference(
715
715
  class ManagedDatabaseUserOpensearchAccessControlRules:
716
716
  def __init__(self, *, index: builtins.str, permission: builtins.str) -> None:
717
717
  '''
718
- :param index: Set index name, pattern or top level API. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#index ManagedDatabaseUser#index}
719
- :param permission: Set permission access. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#permission ManagedDatabaseUser#permission}
718
+ :param index: Set index name, pattern or top level API. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#index ManagedDatabaseUser#index}
719
+ :param permission: Set permission access. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#permission ManagedDatabaseUser#permission}
720
720
  '''
721
721
  if __debug__:
722
722
  type_hints = typing.get_type_hints(_typecheckingstub__037bf6ae1cf4ccc5175cd9f327782b4c274be6c4d8dcbbf42b47b3e0d87e86ea)
@@ -731,7 +731,7 @@ class ManagedDatabaseUserOpensearchAccessControlRules:
731
731
  def index(self) -> builtins.str:
732
732
  '''Set index name, pattern or top level API.
733
733
 
734
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#index ManagedDatabaseUser#index}
734
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#index ManagedDatabaseUser#index}
735
735
  '''
736
736
  result = self._values.get("index")
737
737
  assert result is not None, "Required property 'index' is missing"
@@ -741,7 +741,7 @@ class ManagedDatabaseUserOpensearchAccessControlRules:
741
741
  def permission(self) -> builtins.str:
742
742
  '''Set permission access.
743
743
 
744
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#permission ManagedDatabaseUser#permission}
744
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#permission ManagedDatabaseUser#permission}
745
745
  '''
746
746
  result = self._values.get("permission")
747
747
  assert result is not None, "Required property 'permission' is missing"
@@ -942,7 +942,7 @@ class ManagedDatabaseUserPgAccessControl:
942
942
  allow_replication: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
943
943
  ) -> None:
944
944
  '''
945
- :param allow_replication: Grant replication privilege. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#allow_replication ManagedDatabaseUser#allow_replication}
945
+ :param allow_replication: Grant replication privilege. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#allow_replication ManagedDatabaseUser#allow_replication}
946
946
  '''
947
947
  if __debug__:
948
948
  type_hints = typing.get_type_hints(_typecheckingstub__f34e6b56dbd319319ed29790d55c8592357d86f9b7c8e8c14a5c4d70a6787a4f)
@@ -957,7 +957,7 @@ class ManagedDatabaseUserPgAccessControl:
957
957
  ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
958
958
  '''Grant replication privilege.
959
959
 
960
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#allow_replication ManagedDatabaseUser#allow_replication}
960
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#allow_replication ManagedDatabaseUser#allow_replication}
961
961
  '''
962
962
  result = self._values.get("allow_replication")
963
963
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
@@ -1058,10 +1058,10 @@ class ManagedDatabaseUserRedisAccessControl:
1058
1058
  keys: typing.Optional[typing.Sequence[builtins.str]] = None,
1059
1059
  ) -> None:
1060
1060
  '''
1061
- :param categories: Set access control to all commands in specified categories. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
1062
- :param channels: Set access control to Pub/Sub channels. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
1063
- :param commands: Set access control to commands. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
1064
- :param keys: Set access control to keys. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
1061
+ :param categories: Set access control to all commands in specified categories. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
1062
+ :param channels: Set access control to Pub/Sub channels. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
1063
+ :param commands: Set access control to commands. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
1064
+ :param keys: Set access control to keys. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
1065
1065
  '''
1066
1066
  if __debug__:
1067
1067
  type_hints = typing.get_type_hints(_typecheckingstub__27204462f8812754fabbce2e4daa3352d018e15b121d6d94fd8c33a5f838827b)
@@ -1083,7 +1083,7 @@ class ManagedDatabaseUserRedisAccessControl:
1083
1083
  def categories(self) -> typing.Optional[typing.List[builtins.str]]:
1084
1084
  '''Set access control to all commands in specified categories.
1085
1085
 
1086
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
1086
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
1087
1087
  '''
1088
1088
  result = self._values.get("categories")
1089
1089
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
@@ -1092,7 +1092,7 @@ class ManagedDatabaseUserRedisAccessControl:
1092
1092
  def channels(self) -> typing.Optional[typing.List[builtins.str]]:
1093
1093
  '''Set access control to Pub/Sub channels.
1094
1094
 
1095
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
1095
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
1096
1096
  '''
1097
1097
  result = self._values.get("channels")
1098
1098
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
@@ -1101,7 +1101,7 @@ class ManagedDatabaseUserRedisAccessControl:
1101
1101
  def commands(self) -> typing.Optional[typing.List[builtins.str]]:
1102
1102
  '''Set access control to commands.
1103
1103
 
1104
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
1104
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
1105
1105
  '''
1106
1106
  result = self._values.get("commands")
1107
1107
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
@@ -1110,7 +1110,7 @@ class ManagedDatabaseUserRedisAccessControl:
1110
1110
  def keys(self) -> typing.Optional[typing.List[builtins.str]]:
1111
1111
  '''Set access control to keys.
1112
1112
 
1113
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.2.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
1113
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
1114
1114
  '''
1115
1115
  result = self._values.get("keys")
1116
1116
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)