cdktf-cdktf-provider-upcloud 14.10.0__py3-none-any.whl → 14.11.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.

Files changed (65) hide show
  1. cdktf_cdktf_provider_upcloud/__init__.py +23 -4
  2. cdktf_cdktf_provider_upcloud/_jsii/__init__.py +18 -3
  3. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.11.0.jsii.tgz +0 -0
  4. cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +23 -8
  5. cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +23 -8
  6. cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +23 -8
  7. cdktf_cdktf_provider_upcloud/data_upcloud_load_balancer_dns_challenge_domain/__init__.py +319 -0
  8. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +38 -23
  9. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +29 -14
  10. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +46 -31
  11. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +38 -23
  12. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +26 -11
  13. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +23 -8
  14. cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +29 -14
  15. cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +131 -54
  16. cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +23 -8
  17. cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +26 -11
  18. cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +23 -8
  19. cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +57 -42
  20. cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +32 -17
  21. cdktf_cdktf_provider_upcloud/gateway/__init__.py +53 -38
  22. cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +50 -35
  23. cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +77 -62
  24. cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +47 -32
  25. cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +74 -59
  26. cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +58 -43
  27. cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +245 -175
  28. cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +29 -14
  29. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +44 -29
  30. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +29 -14
  31. cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +49 -34
  32. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +209 -194
  33. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +29 -14
  34. cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +32 -17
  35. cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +47 -32
  36. cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +44 -29
  37. cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +35 -20
  38. cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +211 -196
  39. cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +457 -442
  40. cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +325 -310
  41. cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +139 -124
  42. cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +66 -51
  43. cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +46 -31
  44. cdktf_cdktf_provider_upcloud/managed_object_storage_custom_domain/__init__.py +446 -0
  45. cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +32 -17
  46. cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +29 -14
  47. cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +32 -17
  48. cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +32 -17
  49. cdktf_cdktf_provider_upcloud/network/__init__.py +49 -34
  50. cdktf_cdktf_provider_upcloud/network_peering/__init__.py +39 -24
  51. cdktf_cdktf_provider_upcloud/object_storage/__init__.py +46 -31
  52. cdktf_cdktf_provider_upcloud/provider/__init__.py +41 -26
  53. cdktf_cdktf_provider_upcloud/router/__init__.py +35 -20
  54. cdktf_cdktf_provider_upcloud/server/__init__.py +169 -154
  55. cdktf_cdktf_provider_upcloud/server_group/__init__.py +35 -20
  56. cdktf_cdktf_provider_upcloud/storage/__init__.py +70 -53
  57. cdktf_cdktf_provider_upcloud/storage_template/__init__.py +29 -14
  58. cdktf_cdktf_provider_upcloud/tag/__init__.py +32 -17
  59. {cdktf_cdktf_provider_upcloud-14.10.0.dist-info → cdktf_cdktf_provider_upcloud-14.11.0.dist-info}/METADATA +6 -6
  60. cdktf_cdktf_provider_upcloud-14.11.0.dist-info/RECORD +64 -0
  61. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.10.0.jsii.tgz +0 -0
  62. cdktf_cdktf_provider_upcloud-14.10.0.dist-info/RECORD +0 -62
  63. {cdktf_cdktf_provider_upcloud-14.10.0.dist-info → cdktf_cdktf_provider_upcloud-14.11.0.dist-info}/LICENSE +0 -0
  64. {cdktf_cdktf_provider_upcloud-14.10.0.dist-info → cdktf_cdktf_provider_upcloud-14.11.0.dist-info}/WHEEL +0 -0
  65. {cdktf_cdktf_provider_upcloud-14.10.0.dist-info → cdktf_cdktf_provider_upcloud-14.11.0.dist-info}/top_level.txt +0 -0
@@ -1,7 +1,7 @@
1
1
  r'''
2
2
  # `upcloud_gateway_connection_tunnel`
3
3
 
4
- Refer to the Terraform Registry for docs: [`upcloud_gateway_connection_tunnel`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel).
4
+ Refer to the Terraform Registry for docs: [`upcloud_gateway_connection_tunnel`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -16,7 +16,22 @@ import jsii
16
16
  import publication
17
17
  import typing_extensions
18
18
 
19
- from typeguard import check_type
19
+ import typeguard
20
+ from importlib.metadata import version as _metadata_package_version
21
+ TYPEGUARD_MAJOR_VERSION = int(_metadata_package_version('typeguard').split('.')[0])
22
+
23
+ def check_type(argname: str, value: object, expected_type: typing.Any) -> typing.Any:
24
+ if TYPEGUARD_MAJOR_VERSION <= 2:
25
+ return typeguard.check_type(argname=argname, value=value, expected_type=expected_type) # type:ignore
26
+ else:
27
+ if isinstance(value, jsii._reference_map.InterfaceDynamicProxy): # pyright: ignore [reportAttributeAccessIssue]
28
+ pass
29
+ else:
30
+ if TYPEGUARD_MAJOR_VERSION == 3:
31
+ typeguard.config.collection_check_strategy = typeguard.CollectionCheckStrategy.ALL_ITEMS # type:ignore
32
+ typeguard.check_type(value=value, expected_type=expected_type) # type:ignore
33
+ else:
34
+ typeguard.check_type(value=value, expected_type=expected_type, collection_check_strategy=typeguard.CollectionCheckStrategy.ALL_ITEMS) # type:ignore
20
35
 
21
36
  from .._jsii import *
22
37
 
@@ -29,7 +44,7 @@ class GatewayConnectionTunnel(
29
44
  metaclass=jsii.JSIIMeta,
30
45
  jsii_type="@cdktf/provider-upcloud.gatewayConnectionTunnel.GatewayConnectionTunnel",
31
46
  ):
32
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel upcloud_gateway_connection_tunnel}.'''
47
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel upcloud_gateway_connection_tunnel}.'''
33
48
 
34
49
  def __init__(
35
50
  self,
@@ -51,17 +66,17 @@ class GatewayConnectionTunnel(
51
66
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
52
67
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
53
68
  ) -> None:
54
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel upcloud_gateway_connection_tunnel} Resource.
69
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel upcloud_gateway_connection_tunnel} Resource.
55
70
 
56
71
  :param scope: The scope in which to define this construct.
57
72
  :param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
58
- :param connection_id: ID of the upcloud_gateway_connection resource to which the tunnel belongs. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#connection_id GatewayConnectionTunnel#connection_id}
59
- :param ipsec_auth_psk: ipsec_auth_psk block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#ipsec_auth_psk GatewayConnectionTunnel#ipsec_auth_psk}
60
- :param local_address_name: Public (UpCloud) endpoint address of this tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#local_address_name GatewayConnectionTunnel#local_address_name}
61
- :param name: The name of the tunnel, should be unique within the connection. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#name GatewayConnectionTunnel#name}
62
- :param remote_address: Remote public IP address of the tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#remote_address GatewayConnectionTunnel#remote_address}
63
- :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#id GatewayConnectionTunnel#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
64
- :param ipsec_properties: ipsec_properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#ipsec_properties GatewayConnectionTunnel#ipsec_properties}
73
+ :param connection_id: ID of the upcloud_gateway_connection resource to which the tunnel belongs. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#connection_id GatewayConnectionTunnel#connection_id}
74
+ :param ipsec_auth_psk: ipsec_auth_psk block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#ipsec_auth_psk GatewayConnectionTunnel#ipsec_auth_psk}
75
+ :param local_address_name: Public (UpCloud) endpoint address of this tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#local_address_name GatewayConnectionTunnel#local_address_name}
76
+ :param name: The name of the tunnel, should be unique within the connection. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#name GatewayConnectionTunnel#name}
77
+ :param remote_address: Remote public IP address of the tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#remote_address GatewayConnectionTunnel#remote_address}
78
+ :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#id GatewayConnectionTunnel#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
79
+ :param ipsec_properties: ipsec_properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#ipsec_properties GatewayConnectionTunnel#ipsec_properties}
65
80
  :param connection:
66
81
  :param count:
67
82
  :param depends_on:
@@ -106,7 +121,7 @@ class GatewayConnectionTunnel(
106
121
 
107
122
  :param scope: The scope in which to define this construct.
108
123
  :param import_to_id: The construct id used in the generated config for the GatewayConnectionTunnel to import.
109
- :param import_from_id: The id of the existing GatewayConnectionTunnel that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#import import section} in the documentation of this resource for the id to use
124
+ :param import_from_id: The id of the existing GatewayConnectionTunnel that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#import import section} in the documentation of this resource for the id to use
110
125
  :param provider: ? Optional instance of the provider where the GatewayConnectionTunnel to import is found.
111
126
  '''
112
127
  if __debug__:
@@ -120,7 +135,7 @@ class GatewayConnectionTunnel(
120
135
  @jsii.member(jsii_name="putIpsecAuthPsk")
121
136
  def put_ipsec_auth_psk(self, *, psk: builtins.str) -> None:
122
137
  '''
123
- :param psk: The pre-shared key. This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#psk GatewayConnectionTunnel#psk}
138
+ :param psk: The pre-shared key. This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#psk GatewayConnectionTunnel#psk}
124
139
  '''
125
140
  value = GatewayConnectionTunnelIpsecAuthPsk(psk=psk)
126
141
 
@@ -143,17 +158,17 @@ class GatewayConnectionTunnel(
143
158
  rekey_time: typing.Optional[jsii.Number] = None,
144
159
  ) -> None:
145
160
  '''
146
- :param child_rekey_time: IKE child SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#child_rekey_time GatewayConnectionTunnel#child_rekey_time}
147
- :param dpd_delay: Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#dpd_delay GatewayConnectionTunnel#dpd_delay}
148
- :param dpd_timeout: Timeout period for DPD reply before considering the peer to be dead, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#dpd_timeout GatewayConnectionTunnel#dpd_timeout}
149
- :param ike_lifetime: Maximum IKE SA lifetime in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#ike_lifetime GatewayConnectionTunnel#ike_lifetime}
150
- :param phase1_algorithms: List of Phase 1: Proposal algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#phase1_algorithms GatewayConnectionTunnel#phase1_algorithms}
151
- :param phase1_dh_group_numbers: List of Phase 1 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#phase1_dh_group_numbers GatewayConnectionTunnel#phase1_dh_group_numbers}
152
- :param phase1_integrity_algorithms: List of Phase 1 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#phase1_integrity_algorithms GatewayConnectionTunnel#phase1_integrity_algorithms}
153
- :param phase2_algorithms: List of Phase 2: Security Association algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#phase2_algorithms GatewayConnectionTunnel#phase2_algorithms}
154
- :param phase2_dh_group_numbers: List of Phase 2 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#phase2_dh_group_numbers GatewayConnectionTunnel#phase2_dh_group_numbers}
155
- :param phase2_integrity_algorithms: List of Phase 2 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#phase2_integrity_algorithms GatewayConnectionTunnel#phase2_integrity_algorithms}
156
- :param rekey_time: IKE SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#rekey_time GatewayConnectionTunnel#rekey_time}
161
+ :param child_rekey_time: IKE child SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#child_rekey_time GatewayConnectionTunnel#child_rekey_time}
162
+ :param dpd_delay: Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#dpd_delay GatewayConnectionTunnel#dpd_delay}
163
+ :param dpd_timeout: Timeout period for DPD reply before considering the peer to be dead, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#dpd_timeout GatewayConnectionTunnel#dpd_timeout}
164
+ :param ike_lifetime: Maximum IKE SA lifetime in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#ike_lifetime GatewayConnectionTunnel#ike_lifetime}
165
+ :param phase1_algorithms: List of Phase 1: Proposal algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#phase1_algorithms GatewayConnectionTunnel#phase1_algorithms}
166
+ :param phase1_dh_group_numbers: List of Phase 1 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#phase1_dh_group_numbers GatewayConnectionTunnel#phase1_dh_group_numbers}
167
+ :param phase1_integrity_algorithms: List of Phase 1 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#phase1_integrity_algorithms GatewayConnectionTunnel#phase1_integrity_algorithms}
168
+ :param phase2_algorithms: List of Phase 2: Security Association algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#phase2_algorithms GatewayConnectionTunnel#phase2_algorithms}
169
+ :param phase2_dh_group_numbers: List of Phase 2 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#phase2_dh_group_numbers GatewayConnectionTunnel#phase2_dh_group_numbers}
170
+ :param phase2_integrity_algorithms: List of Phase 2 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#phase2_integrity_algorithms GatewayConnectionTunnel#phase2_integrity_algorithms}
171
+ :param rekey_time: IKE SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#rekey_time GatewayConnectionTunnel#rekey_time}
157
172
  '''
158
173
  value = GatewayConnectionTunnelIpsecProperties(
159
174
  child_rekey_time=child_rekey_time,
@@ -361,13 +376,13 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
361
376
  :param lifecycle:
362
377
  :param provider:
363
378
  :param provisioners:
364
- :param connection_id: ID of the upcloud_gateway_connection resource to which the tunnel belongs. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#connection_id GatewayConnectionTunnel#connection_id}
365
- :param ipsec_auth_psk: ipsec_auth_psk block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#ipsec_auth_psk GatewayConnectionTunnel#ipsec_auth_psk}
366
- :param local_address_name: Public (UpCloud) endpoint address of this tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#local_address_name GatewayConnectionTunnel#local_address_name}
367
- :param name: The name of the tunnel, should be unique within the connection. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#name GatewayConnectionTunnel#name}
368
- :param remote_address: Remote public IP address of the tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#remote_address GatewayConnectionTunnel#remote_address}
369
- :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#id GatewayConnectionTunnel#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
370
- :param ipsec_properties: ipsec_properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#ipsec_properties GatewayConnectionTunnel#ipsec_properties}
379
+ :param connection_id: ID of the upcloud_gateway_connection resource to which the tunnel belongs. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#connection_id GatewayConnectionTunnel#connection_id}
380
+ :param ipsec_auth_psk: ipsec_auth_psk block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#ipsec_auth_psk GatewayConnectionTunnel#ipsec_auth_psk}
381
+ :param local_address_name: Public (UpCloud) endpoint address of this tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#local_address_name GatewayConnectionTunnel#local_address_name}
382
+ :param name: The name of the tunnel, should be unique within the connection. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#name GatewayConnectionTunnel#name}
383
+ :param remote_address: Remote public IP address of the tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#remote_address GatewayConnectionTunnel#remote_address}
384
+ :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#id GatewayConnectionTunnel#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
385
+ :param ipsec_properties: ipsec_properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#ipsec_properties GatewayConnectionTunnel#ipsec_properties}
371
386
  '''
372
387
  if isinstance(lifecycle, dict):
373
388
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -485,7 +500,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
485
500
  def connection_id(self) -> builtins.str:
486
501
  '''ID of the upcloud_gateway_connection resource to which the tunnel belongs.
487
502
 
488
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#connection_id GatewayConnectionTunnel#connection_id}
503
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#connection_id GatewayConnectionTunnel#connection_id}
489
504
  '''
490
505
  result = self._values.get("connection_id")
491
506
  assert result is not None, "Required property 'connection_id' is missing"
@@ -495,7 +510,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
495
510
  def ipsec_auth_psk(self) -> "GatewayConnectionTunnelIpsecAuthPsk":
496
511
  '''ipsec_auth_psk block.
497
512
 
498
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#ipsec_auth_psk GatewayConnectionTunnel#ipsec_auth_psk}
513
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#ipsec_auth_psk GatewayConnectionTunnel#ipsec_auth_psk}
499
514
  '''
500
515
  result = self._values.get("ipsec_auth_psk")
501
516
  assert result is not None, "Required property 'ipsec_auth_psk' is missing"
@@ -505,7 +520,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
505
520
  def local_address_name(self) -> builtins.str:
506
521
  '''Public (UpCloud) endpoint address of this tunnel.
507
522
 
508
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#local_address_name GatewayConnectionTunnel#local_address_name}
523
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#local_address_name GatewayConnectionTunnel#local_address_name}
509
524
  '''
510
525
  result = self._values.get("local_address_name")
511
526
  assert result is not None, "Required property 'local_address_name' is missing"
@@ -515,7 +530,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
515
530
  def name(self) -> builtins.str:
516
531
  '''The name of the tunnel, should be unique within the connection.
517
532
 
518
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#name GatewayConnectionTunnel#name}
533
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#name GatewayConnectionTunnel#name}
519
534
  '''
520
535
  result = self._values.get("name")
521
536
  assert result is not None, "Required property 'name' is missing"
@@ -525,7 +540,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
525
540
  def remote_address(self) -> builtins.str:
526
541
  '''Remote public IP address of the tunnel.
527
542
 
528
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#remote_address GatewayConnectionTunnel#remote_address}
543
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#remote_address GatewayConnectionTunnel#remote_address}
529
544
  '''
530
545
  result = self._values.get("remote_address")
531
546
  assert result is not None, "Required property 'remote_address' is missing"
@@ -533,7 +548,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
533
548
 
534
549
  @builtins.property
535
550
  def id(self) -> typing.Optional[builtins.str]:
536
- '''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#id GatewayConnectionTunnel#id}.
551
+ '''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#id GatewayConnectionTunnel#id}.
537
552
 
538
553
  Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
539
554
  If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -547,7 +562,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
547
562
  ) -> typing.Optional["GatewayConnectionTunnelIpsecProperties"]:
548
563
  '''ipsec_properties block.
549
564
 
550
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#ipsec_properties GatewayConnectionTunnel#ipsec_properties}
565
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#ipsec_properties GatewayConnectionTunnel#ipsec_properties}
551
566
  '''
552
567
  result = self._values.get("ipsec_properties")
553
568
  return typing.cast(typing.Optional["GatewayConnectionTunnelIpsecProperties"], result)
@@ -572,7 +587,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
572
587
  class GatewayConnectionTunnelIpsecAuthPsk:
573
588
  def __init__(self, *, psk: builtins.str) -> None:
574
589
  '''
575
- :param psk: The pre-shared key. This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#psk GatewayConnectionTunnel#psk}
590
+ :param psk: The pre-shared key. This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#psk GatewayConnectionTunnel#psk}
576
591
  '''
577
592
  if __debug__:
578
593
  type_hints = typing.get_type_hints(_typecheckingstub__87c835e7d7c5605931c1ca38462874908e77d68cd5b951debc157a3d43ca979a)
@@ -587,7 +602,7 @@ class GatewayConnectionTunnelIpsecAuthPsk:
587
602
 
588
603
  This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one.
589
604
 
590
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#psk GatewayConnectionTunnel#psk}
605
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#psk GatewayConnectionTunnel#psk}
591
606
  '''
592
607
  result = self._values.get("psk")
593
608
  assert result is not None, "Required property 'psk' is missing"
@@ -692,17 +707,17 @@ class GatewayConnectionTunnelIpsecProperties:
692
707
  rekey_time: typing.Optional[jsii.Number] = None,
693
708
  ) -> None:
694
709
  '''
695
- :param child_rekey_time: IKE child SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#child_rekey_time GatewayConnectionTunnel#child_rekey_time}
696
- :param dpd_delay: Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#dpd_delay GatewayConnectionTunnel#dpd_delay}
697
- :param dpd_timeout: Timeout period for DPD reply before considering the peer to be dead, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#dpd_timeout GatewayConnectionTunnel#dpd_timeout}
698
- :param ike_lifetime: Maximum IKE SA lifetime in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#ike_lifetime GatewayConnectionTunnel#ike_lifetime}
699
- :param phase1_algorithms: List of Phase 1: Proposal algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#phase1_algorithms GatewayConnectionTunnel#phase1_algorithms}
700
- :param phase1_dh_group_numbers: List of Phase 1 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#phase1_dh_group_numbers GatewayConnectionTunnel#phase1_dh_group_numbers}
701
- :param phase1_integrity_algorithms: List of Phase 1 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#phase1_integrity_algorithms GatewayConnectionTunnel#phase1_integrity_algorithms}
702
- :param phase2_algorithms: List of Phase 2: Security Association algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#phase2_algorithms GatewayConnectionTunnel#phase2_algorithms}
703
- :param phase2_dh_group_numbers: List of Phase 2 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#phase2_dh_group_numbers GatewayConnectionTunnel#phase2_dh_group_numbers}
704
- :param phase2_integrity_algorithms: List of Phase 2 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#phase2_integrity_algorithms GatewayConnectionTunnel#phase2_integrity_algorithms}
705
- :param rekey_time: IKE SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#rekey_time GatewayConnectionTunnel#rekey_time}
710
+ :param child_rekey_time: IKE child SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#child_rekey_time GatewayConnectionTunnel#child_rekey_time}
711
+ :param dpd_delay: Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#dpd_delay GatewayConnectionTunnel#dpd_delay}
712
+ :param dpd_timeout: Timeout period for DPD reply before considering the peer to be dead, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#dpd_timeout GatewayConnectionTunnel#dpd_timeout}
713
+ :param ike_lifetime: Maximum IKE SA lifetime in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#ike_lifetime GatewayConnectionTunnel#ike_lifetime}
714
+ :param phase1_algorithms: List of Phase 1: Proposal algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#phase1_algorithms GatewayConnectionTunnel#phase1_algorithms}
715
+ :param phase1_dh_group_numbers: List of Phase 1 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#phase1_dh_group_numbers GatewayConnectionTunnel#phase1_dh_group_numbers}
716
+ :param phase1_integrity_algorithms: List of Phase 1 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#phase1_integrity_algorithms GatewayConnectionTunnel#phase1_integrity_algorithms}
717
+ :param phase2_algorithms: List of Phase 2: Security Association algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#phase2_algorithms GatewayConnectionTunnel#phase2_algorithms}
718
+ :param phase2_dh_group_numbers: List of Phase 2 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#phase2_dh_group_numbers GatewayConnectionTunnel#phase2_dh_group_numbers}
719
+ :param phase2_integrity_algorithms: List of Phase 2 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#phase2_integrity_algorithms GatewayConnectionTunnel#phase2_integrity_algorithms}
720
+ :param rekey_time: IKE SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#rekey_time GatewayConnectionTunnel#rekey_time}
706
721
  '''
707
722
  if __debug__:
708
723
  type_hints = typing.get_type_hints(_typecheckingstub__a50b18894047098027d5d6be1b8a41d8e32b22c4297ebea79c281f4c838921f4)
@@ -745,7 +760,7 @@ class GatewayConnectionTunnelIpsecProperties:
745
760
  def child_rekey_time(self) -> typing.Optional[jsii.Number]:
746
761
  '''IKE child SA rekey time in seconds.
747
762
 
748
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#child_rekey_time GatewayConnectionTunnel#child_rekey_time}
763
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#child_rekey_time GatewayConnectionTunnel#child_rekey_time}
749
764
  '''
750
765
  result = self._values.get("child_rekey_time")
751
766
  return typing.cast(typing.Optional[jsii.Number], result)
@@ -754,7 +769,7 @@ class GatewayConnectionTunnelIpsecProperties:
754
769
  def dpd_delay(self) -> typing.Optional[jsii.Number]:
755
770
  '''Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds.
756
771
 
757
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#dpd_delay GatewayConnectionTunnel#dpd_delay}
772
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#dpd_delay GatewayConnectionTunnel#dpd_delay}
758
773
  '''
759
774
  result = self._values.get("dpd_delay")
760
775
  return typing.cast(typing.Optional[jsii.Number], result)
@@ -763,7 +778,7 @@ class GatewayConnectionTunnelIpsecProperties:
763
778
  def dpd_timeout(self) -> typing.Optional[jsii.Number]:
764
779
  '''Timeout period for DPD reply before considering the peer to be dead, in seconds.
765
780
 
766
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#dpd_timeout GatewayConnectionTunnel#dpd_timeout}
781
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#dpd_timeout GatewayConnectionTunnel#dpd_timeout}
767
782
  '''
768
783
  result = self._values.get("dpd_timeout")
769
784
  return typing.cast(typing.Optional[jsii.Number], result)
@@ -772,7 +787,7 @@ class GatewayConnectionTunnelIpsecProperties:
772
787
  def ike_lifetime(self) -> typing.Optional[jsii.Number]:
773
788
  '''Maximum IKE SA lifetime in seconds.
774
789
 
775
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#ike_lifetime GatewayConnectionTunnel#ike_lifetime}
790
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#ike_lifetime GatewayConnectionTunnel#ike_lifetime}
776
791
  '''
777
792
  result = self._values.get("ike_lifetime")
778
793
  return typing.cast(typing.Optional[jsii.Number], result)
@@ -781,7 +796,7 @@ class GatewayConnectionTunnelIpsecProperties:
781
796
  def phase1_algorithms(self) -> typing.Optional[typing.List[builtins.str]]:
782
797
  '''List of Phase 1: Proposal algorithms.
783
798
 
784
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#phase1_algorithms GatewayConnectionTunnel#phase1_algorithms}
799
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#phase1_algorithms GatewayConnectionTunnel#phase1_algorithms}
785
800
  '''
786
801
  result = self._values.get("phase1_algorithms")
787
802
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
@@ -790,7 +805,7 @@ class GatewayConnectionTunnelIpsecProperties:
790
805
  def phase1_dh_group_numbers(self) -> typing.Optional[typing.List[jsii.Number]]:
791
806
  '''List of Phase 1 Diffie-Hellman group numbers.
792
807
 
793
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#phase1_dh_group_numbers GatewayConnectionTunnel#phase1_dh_group_numbers}
808
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#phase1_dh_group_numbers GatewayConnectionTunnel#phase1_dh_group_numbers}
794
809
  '''
795
810
  result = self._values.get("phase1_dh_group_numbers")
796
811
  return typing.cast(typing.Optional[typing.List[jsii.Number]], result)
@@ -799,7 +814,7 @@ class GatewayConnectionTunnelIpsecProperties:
799
814
  def phase1_integrity_algorithms(self) -> typing.Optional[typing.List[builtins.str]]:
800
815
  '''List of Phase 1 integrity algorithms.
801
816
 
802
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#phase1_integrity_algorithms GatewayConnectionTunnel#phase1_integrity_algorithms}
817
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#phase1_integrity_algorithms GatewayConnectionTunnel#phase1_integrity_algorithms}
803
818
  '''
804
819
  result = self._values.get("phase1_integrity_algorithms")
805
820
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
@@ -808,7 +823,7 @@ class GatewayConnectionTunnelIpsecProperties:
808
823
  def phase2_algorithms(self) -> typing.Optional[typing.List[builtins.str]]:
809
824
  '''List of Phase 2: Security Association algorithms.
810
825
 
811
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#phase2_algorithms GatewayConnectionTunnel#phase2_algorithms}
826
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#phase2_algorithms GatewayConnectionTunnel#phase2_algorithms}
812
827
  '''
813
828
  result = self._values.get("phase2_algorithms")
814
829
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
@@ -817,7 +832,7 @@ class GatewayConnectionTunnelIpsecProperties:
817
832
  def phase2_dh_group_numbers(self) -> typing.Optional[typing.List[jsii.Number]]:
818
833
  '''List of Phase 2 Diffie-Hellman group numbers.
819
834
 
820
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#phase2_dh_group_numbers GatewayConnectionTunnel#phase2_dh_group_numbers}
835
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#phase2_dh_group_numbers GatewayConnectionTunnel#phase2_dh_group_numbers}
821
836
  '''
822
837
  result = self._values.get("phase2_dh_group_numbers")
823
838
  return typing.cast(typing.Optional[typing.List[jsii.Number]], result)
@@ -826,7 +841,7 @@ class GatewayConnectionTunnelIpsecProperties:
826
841
  def phase2_integrity_algorithms(self) -> typing.Optional[typing.List[builtins.str]]:
827
842
  '''List of Phase 2 integrity algorithms.
828
843
 
829
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#phase2_integrity_algorithms GatewayConnectionTunnel#phase2_integrity_algorithms}
844
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#phase2_integrity_algorithms GatewayConnectionTunnel#phase2_integrity_algorithms}
830
845
  '''
831
846
  result = self._values.get("phase2_integrity_algorithms")
832
847
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
@@ -835,7 +850,7 @@ class GatewayConnectionTunnelIpsecProperties:
835
850
  def rekey_time(self) -> typing.Optional[jsii.Number]:
836
851
  '''IKE SA rekey time in seconds.
837
852
 
838
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/gateway_connection_tunnel#rekey_time GatewayConnectionTunnel#rekey_time}
853
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/gateway_connection_tunnel#rekey_time GatewayConnectionTunnel#rekey_time}
839
854
  '''
840
855
  result = self._values.get("rekey_time")
841
856
  return typing.cast(typing.Optional[jsii.Number], result)
@@ -1,7 +1,7 @@
1
1
  r'''
2
2
  # `upcloud_kubernetes_cluster`
3
3
 
4
- Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster).
4
+ Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -16,7 +16,22 @@ import jsii
16
16
  import publication
17
17
  import typing_extensions
18
18
 
19
- from typeguard import check_type
19
+ import typeguard
20
+ from importlib.metadata import version as _metadata_package_version
21
+ TYPEGUARD_MAJOR_VERSION = int(_metadata_package_version('typeguard').split('.')[0])
22
+
23
+ def check_type(argname: str, value: object, expected_type: typing.Any) -> typing.Any:
24
+ if TYPEGUARD_MAJOR_VERSION <= 2:
25
+ return typeguard.check_type(argname=argname, value=value, expected_type=expected_type) # type:ignore
26
+ else:
27
+ if isinstance(value, jsii._reference_map.InterfaceDynamicProxy): # pyright: ignore [reportAttributeAccessIssue]
28
+ pass
29
+ else:
30
+ if TYPEGUARD_MAJOR_VERSION == 3:
31
+ typeguard.config.collection_check_strategy = typeguard.CollectionCheckStrategy.ALL_ITEMS # type:ignore
32
+ typeguard.check_type(value=value, expected_type=expected_type) # type:ignore
33
+ else:
34
+ typeguard.check_type(value=value, expected_type=expected_type, collection_check_strategy=typeguard.CollectionCheckStrategy.ALL_ITEMS) # type:ignore
20
35
 
21
36
  from .._jsii import *
22
37
 
@@ -29,7 +44,7 @@ class KubernetesCluster(
29
44
  metaclass=jsii.JSIIMeta,
30
45
  jsii_type="@cdktf/provider-upcloud.kubernetesCluster.KubernetesCluster",
31
46
  ):
32
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
47
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
33
48
 
34
49
  def __init__(
35
50
  self,
@@ -53,19 +68,19 @@ class KubernetesCluster(
53
68
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
54
69
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
55
70
  ) -> None:
56
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
71
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
57
72
 
58
73
  :param scope: The scope in which to define this construct.
59
74
  :param id: The scoped construct ID. Must be unique amongst siblings in the same scope
60
- :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
61
- :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
62
- :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
63
- :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
64
- :param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
65
- :param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
66
- :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
67
- :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
68
- :param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
75
+ :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
76
+ :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
77
+ :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
78
+ :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
79
+ :param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
80
+ :param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
81
+ :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
82
+ :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
83
+ :param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
69
84
  :param connection:
70
85
  :param count:
71
86
  :param depends_on:
@@ -112,7 +127,7 @@ class KubernetesCluster(
112
127
 
113
128
  :param scope: The scope in which to define this construct.
114
129
  :param import_to_id: The construct id used in the generated config for the KubernetesCluster to import.
115
- :param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
130
+ :param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
116
131
  :param provider: ? Optional instance of the provider where the KubernetesCluster to import is found.
117
132
  '''
118
133
  if __debug__:
@@ -392,15 +407,15 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
392
407
  :param lifecycle:
393
408
  :param provider:
394
409
  :param provisioners:
395
- :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
396
- :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
397
- :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
398
- :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
399
- :param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
400
- :param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
401
- :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
402
- :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
403
- :param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
410
+ :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
411
+ :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
412
+ :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
413
+ :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
414
+ :param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
415
+ :param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
416
+ :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
417
+ :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
418
+ :param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
404
419
  '''
405
420
  if isinstance(lifecycle, dict):
406
421
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -523,7 +538,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
523
538
 
524
539
  To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services.
525
540
 
526
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
541
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
527
542
  '''
528
543
  result = self._values.get("control_plane_ip_filter")
529
544
  assert result is not None, "Required property 'control_plane_ip_filter' is missing"
@@ -533,7 +548,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
533
548
  def name(self) -> builtins.str:
534
549
  '''Cluster name. Needs to be unique within the account.
535
550
 
536
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
551
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
537
552
  '''
538
553
  result = self._values.get("name")
539
554
  assert result is not None, "Required property 'name' is missing"
@@ -543,7 +558,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
543
558
  def network(self) -> builtins.str:
544
559
  '''Network ID for the cluster to run in.
545
560
 
546
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
561
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
547
562
  '''
548
563
  result = self._values.get("network")
549
564
  assert result is not None, "Required property 'network' is missing"
@@ -553,7 +568,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
553
568
  def zone(self) -> builtins.str:
554
569
  '''Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``.
555
570
 
556
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
571
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
557
572
  '''
558
573
  result = self._values.get("zone")
559
574
  assert result is not None, "Required property 'zone' is missing"
@@ -563,7 +578,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
563
578
  def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
564
579
  '''User defined key-value pairs to classify the cluster.
565
580
 
566
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
581
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
567
582
  '''
568
583
  result = self._values.get("labels")
569
584
  return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
@@ -574,7 +589,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
574
589
 
575
590
  Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``.
576
591
 
577
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
592
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
578
593
  '''
579
594
  result = self._values.get("plan")
580
595
  return typing.cast(typing.Optional[builtins.str], result)
@@ -585,7 +600,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
585
600
  ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
586
601
  '''Enable private node groups. Private node groups requires a network that is routed through NAT gateway.
587
602
 
588
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
603
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
589
604
  '''
590
605
  result = self._values.get("private_node_groups")
591
606
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
@@ -594,7 +609,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
594
609
  def storage_encryption(self) -> typing.Optional[builtins.str]:
595
610
  '''Set default storage encryption strategy for all nodes in the cluster.
596
611
 
597
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
612
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
598
613
  '''
599
614
  result = self._values.get("storage_encryption")
600
615
  return typing.cast(typing.Optional[builtins.str], result)
@@ -603,7 +618,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
603
618
  def version(self) -> typing.Optional[builtins.str]:
604
619
  '''Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``.
605
620
 
606
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
621
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
607
622
  '''
608
623
  result = self._values.get("version")
609
624
  return typing.cast(typing.Optional[builtins.str], result)