cdktf-cdktf-provider-upcloud 14.14.0__py3-none-any.whl → 14.16.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.

Files changed (68) hide show
  1. cdktf_cdktf_provider_upcloud/__init__.py +9 -3
  2. cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
  3. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.16.0.jsii.tgz +0 -0
  4. cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +7 -7
  5. cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +7 -7
  6. cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +7 -7
  7. cdktf_cdktf_provider_upcloud/data_upcloud_load_balancer_dns_challenge_domain/__init__.py +4 -4
  8. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
  9. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
  10. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
  11. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
  12. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_valkey_sessions/__init__.py +898 -0
  13. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +10 -10
  14. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
  15. cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
  16. cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +28 -28
  17. cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
  18. cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
  19. cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +7 -7
  20. cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +41 -41
  21. cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +16 -16
  22. cdktf_cdktf_provider_upcloud/gateway/__init__.py +37 -37
  23. cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +34 -34
  24. cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +61 -61
  25. cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +31 -31
  26. cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +58 -58
  27. cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +39 -39
  28. cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +46 -46
  29. cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +13 -13
  30. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +25 -25
  31. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +13 -13
  32. cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +33 -33
  33. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +226 -226
  34. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +13 -13
  35. cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +16 -16
  36. cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +28 -28
  37. cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +25 -25
  38. cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
  39. cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +301 -199
  40. cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +4203 -1016
  41. cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +365 -309
  42. cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +275 -123
  43. cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +371 -50
  44. cdktf_cdktf_provider_upcloud/managed_database_valkey/__init__.py +3203 -0
  45. cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +30 -30
  46. cdktf_cdktf_provider_upcloud/managed_object_storage_bucket/__init__.py +409 -0
  47. cdktf_cdktf_provider_upcloud/managed_object_storage_custom_domain/__init__.py +13 -13
  48. cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +16 -16
  49. cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +13 -13
  50. cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +16 -16
  51. cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +16 -16
  52. cdktf_cdktf_provider_upcloud/network/__init__.py +33 -33
  53. cdktf_cdktf_provider_upcloud/network_peering/__init__.py +23 -23
  54. cdktf_cdktf_provider_upcloud/object_storage/__init__.py +30 -30
  55. cdktf_cdktf_provider_upcloud/provider/__init__.py +25 -25
  56. cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
  57. cdktf_cdktf_provider_upcloud/server/__init__.py +196 -153
  58. cdktf_cdktf_provider_upcloud/server_group/__init__.py +19 -19
  59. cdktf_cdktf_provider_upcloud/storage/__init__.py +51 -51
  60. cdktf_cdktf_provider_upcloud/storage_template/__init__.py +13 -13
  61. cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
  62. {cdktf_cdktf_provider_upcloud-14.14.0.dist-info → cdktf_cdktf_provider_upcloud-14.16.0.dist-info}/METADATA +5 -5
  63. cdktf_cdktf_provider_upcloud-14.16.0.dist-info/RECORD +67 -0
  64. {cdktf_cdktf_provider_upcloud-14.14.0.dist-info → cdktf_cdktf_provider_upcloud-14.16.0.dist-info}/WHEEL +1 -1
  65. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.14.0.jsii.tgz +0 -0
  66. cdktf_cdktf_provider_upcloud-14.14.0.dist-info/RECORD +0 -64
  67. {cdktf_cdktf_provider_upcloud-14.14.0.dist-info → cdktf_cdktf_provider_upcloud-14.16.0.dist-info}/LICENSE +0 -0
  68. {cdktf_cdktf_provider_upcloud-14.14.0.dist-info → cdktf_cdktf_provider_upcloud-14.16.0.dist-info}/top_level.txt +0 -0
@@ -1,7 +1,7 @@
1
1
  r'''
2
2
  # `upcloud_managed_database_user`
3
3
 
4
- Refer to the Terraform Registry for docs: [`upcloud_managed_database_user`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user).
4
+ Refer to the Terraform Registry for docs: [`upcloud_managed_database_user`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -44,7 +44,7 @@ class ManagedDatabaseUser(
44
44
  metaclass=jsii.JSIIMeta,
45
45
  jsii_type="@cdktf/provider-upcloud.managedDatabaseUser.ManagedDatabaseUser",
46
46
  ):
47
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user upcloud_managed_database_user}.'''
47
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user upcloud_managed_database_user}.'''
48
48
 
49
49
  def __init__(
50
50
  self,
@@ -59,6 +59,7 @@ class ManagedDatabaseUser(
59
59
  password: typing.Optional[builtins.str] = None,
60
60
  pg_access_control: typing.Optional[typing.Union["ManagedDatabaseUserPgAccessControl", typing.Dict[builtins.str, typing.Any]]] = None,
61
61
  redis_access_control: typing.Optional[typing.Union["ManagedDatabaseUserRedisAccessControl", typing.Dict[builtins.str, typing.Any]]] = None,
62
+ valkey_access_control: typing.Optional[typing.Union["ManagedDatabaseUserValkeyAccessControl", typing.Dict[builtins.str, typing.Any]]] = None,
62
63
  connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
63
64
  count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
64
65
  depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
@@ -67,18 +68,19 @@ class ManagedDatabaseUser(
67
68
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
68
69
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
69
70
  ) -> None:
70
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user upcloud_managed_database_user} Resource.
71
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user upcloud_managed_database_user} Resource.
71
72
 
72
73
  :param scope: The scope in which to define this construct.
73
74
  :param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
74
- :param service: Service's UUID for which this user belongs to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#service ManagedDatabaseUser#service}
75
- :param username: Name of the database user. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#username ManagedDatabaseUser#username}
76
- :param authentication: MySQL only, authentication type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#authentication ManagedDatabaseUser#authentication}
77
- :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#id ManagedDatabaseUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
78
- :param opensearch_access_control: opensearch_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#opensearch_access_control ManagedDatabaseUser#opensearch_access_control}
79
- :param password: Password for the database user. Defaults to a random value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#password ManagedDatabaseUser#password}
80
- :param pg_access_control: pg_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#pg_access_control ManagedDatabaseUser#pg_access_control}
81
- :param redis_access_control: redis_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#redis_access_control ManagedDatabaseUser#redis_access_control}
75
+ :param service: Service's UUID for which this user belongs to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#service ManagedDatabaseUser#service}
76
+ :param username: Name of the database user. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#username ManagedDatabaseUser#username}
77
+ :param authentication: MySQL only, authentication type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#authentication ManagedDatabaseUser#authentication}
78
+ :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#id ManagedDatabaseUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
79
+ :param opensearch_access_control: opensearch_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#opensearch_access_control ManagedDatabaseUser#opensearch_access_control}
80
+ :param password: Password for the database user. Defaults to a random value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#password ManagedDatabaseUser#password}
81
+ :param pg_access_control: pg_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#pg_access_control ManagedDatabaseUser#pg_access_control}
82
+ :param redis_access_control: redis_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#redis_access_control ManagedDatabaseUser#redis_access_control}
83
+ :param valkey_access_control: valkey_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#valkey_access_control ManagedDatabaseUser#valkey_access_control}
82
84
  :param connection:
83
85
  :param count:
84
86
  :param depends_on:
@@ -100,6 +102,7 @@ class ManagedDatabaseUser(
100
102
  password=password,
101
103
  pg_access_control=pg_access_control,
102
104
  redis_access_control=redis_access_control,
105
+ valkey_access_control=valkey_access_control,
103
106
  connection=connection,
104
107
  count=count,
105
108
  depends_on=depends_on,
@@ -124,7 +127,7 @@ class ManagedDatabaseUser(
124
127
 
125
128
  :param scope: The scope in which to define this construct.
126
129
  :param import_to_id: The construct id used in the generated config for the ManagedDatabaseUser to import.
127
- :param import_from_id: The id of the existing ManagedDatabaseUser that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#import import section} in the documentation of this resource for the id to use
130
+ :param import_from_id: The id of the existing ManagedDatabaseUser that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#import import section} in the documentation of this resource for the id to use
128
131
  :param provider: ? Optional instance of the provider where the ManagedDatabaseUser to import is found.
129
132
  '''
130
133
  if __debug__:
@@ -142,7 +145,7 @@ class ManagedDatabaseUser(
142
145
  rules: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["ManagedDatabaseUserOpensearchAccessControlRules", typing.Dict[builtins.str, typing.Any]]]],
143
146
  ) -> None:
144
147
  '''
145
- :param rules: rules block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#rules ManagedDatabaseUser#rules}
148
+ :param rules: rules block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#rules ManagedDatabaseUser#rules}
146
149
  '''
147
150
  value = ManagedDatabaseUserOpensearchAccessControl(rules=rules)
148
151
 
@@ -155,7 +158,7 @@ class ManagedDatabaseUser(
155
158
  allow_replication: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
156
159
  ) -> None:
157
160
  '''
158
- :param allow_replication: Grant replication privilege. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#allow_replication ManagedDatabaseUser#allow_replication}
161
+ :param allow_replication: Grant replication privilege. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#allow_replication ManagedDatabaseUser#allow_replication}
159
162
  '''
160
163
  value = ManagedDatabaseUserPgAccessControl(allow_replication=allow_replication)
161
164
 
@@ -171,10 +174,10 @@ class ManagedDatabaseUser(
171
174
  keys: typing.Optional[typing.Sequence[builtins.str]] = None,
172
175
  ) -> None:
173
176
  '''
174
- :param categories: Set access control to all commands in specified categories. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
175
- :param channels: Set access control to Pub/Sub channels. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
176
- :param commands: Set access control to commands. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
177
- :param keys: Set access control to keys. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
177
+ :param categories: Set access control to all commands in specified categories. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
178
+ :param channels: Set access control to Pub/Sub channels. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
179
+ :param commands: Set access control to commands. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
180
+ :param keys: Set access control to keys. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
178
181
  '''
179
182
  value = ManagedDatabaseUserRedisAccessControl(
180
183
  categories=categories, channels=channels, commands=commands, keys=keys
@@ -182,6 +185,27 @@ class ManagedDatabaseUser(
182
185
 
183
186
  return typing.cast(None, jsii.invoke(self, "putRedisAccessControl", [value]))
184
187
 
188
+ @jsii.member(jsii_name="putValkeyAccessControl")
189
+ def put_valkey_access_control(
190
+ self,
191
+ *,
192
+ categories: typing.Optional[typing.Sequence[builtins.str]] = None,
193
+ channels: typing.Optional[typing.Sequence[builtins.str]] = None,
194
+ commands: typing.Optional[typing.Sequence[builtins.str]] = None,
195
+ keys: typing.Optional[typing.Sequence[builtins.str]] = None,
196
+ ) -> None:
197
+ '''
198
+ :param categories: Set access control to all commands in specified categories. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
199
+ :param channels: Set access control to Pub/Sub channels. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
200
+ :param commands: Set access control to commands. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
201
+ :param keys: Set access control to keys. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
202
+ '''
203
+ value = ManagedDatabaseUserValkeyAccessControl(
204
+ categories=categories, channels=channels, commands=commands, keys=keys
205
+ )
206
+
207
+ return typing.cast(None, jsii.invoke(self, "putValkeyAccessControl", [value]))
208
+
185
209
  @jsii.member(jsii_name="resetAuthentication")
186
210
  def reset_authentication(self) -> None:
187
211
  return typing.cast(None, jsii.invoke(self, "resetAuthentication", []))
@@ -206,6 +230,10 @@ class ManagedDatabaseUser(
206
230
  def reset_redis_access_control(self) -> None:
207
231
  return typing.cast(None, jsii.invoke(self, "resetRedisAccessControl", []))
208
232
 
233
+ @jsii.member(jsii_name="resetValkeyAccessControl")
234
+ def reset_valkey_access_control(self) -> None:
235
+ return typing.cast(None, jsii.invoke(self, "resetValkeyAccessControl", []))
236
+
209
237
  @jsii.member(jsii_name="synthesizeAttributes")
210
238
  def _synthesize_attributes(self) -> typing.Mapping[builtins.str, typing.Any]:
211
239
  return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "synthesizeAttributes", []))
@@ -243,6 +271,13 @@ class ManagedDatabaseUser(
243
271
  def type(self) -> builtins.str:
244
272
  return typing.cast(builtins.str, jsii.get(self, "type"))
245
273
 
274
+ @builtins.property
275
+ @jsii.member(jsii_name="valkeyAccessControl")
276
+ def valkey_access_control(
277
+ self,
278
+ ) -> "ManagedDatabaseUserValkeyAccessControlOutputReference":
279
+ return typing.cast("ManagedDatabaseUserValkeyAccessControlOutputReference", jsii.get(self, "valkeyAccessControl"))
280
+
246
281
  @builtins.property
247
282
  @jsii.member(jsii_name="authenticationInput")
248
283
  def authentication_input(self) -> typing.Optional[builtins.str]:
@@ -289,6 +324,13 @@ class ManagedDatabaseUser(
289
324
  def username_input(self) -> typing.Optional[builtins.str]:
290
325
  return typing.cast(typing.Optional[builtins.str], jsii.get(self, "usernameInput"))
291
326
 
327
+ @builtins.property
328
+ @jsii.member(jsii_name="valkeyAccessControlInput")
329
+ def valkey_access_control_input(
330
+ self,
331
+ ) -> typing.Optional["ManagedDatabaseUserValkeyAccessControl"]:
332
+ return typing.cast(typing.Optional["ManagedDatabaseUserValkeyAccessControl"], jsii.get(self, "valkeyAccessControlInput"))
333
+
292
334
  @builtins.property
293
335
  @jsii.member(jsii_name="authentication")
294
336
  def authentication(self) -> builtins.str:
@@ -369,6 +411,7 @@ class ManagedDatabaseUser(
369
411
  "password": "password",
370
412
  "pg_access_control": "pgAccessControl",
371
413
  "redis_access_control": "redisAccessControl",
414
+ "valkey_access_control": "valkeyAccessControl",
372
415
  },
373
416
  )
374
417
  class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
@@ -390,6 +433,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
390
433
  password: typing.Optional[builtins.str] = None,
391
434
  pg_access_control: typing.Optional[typing.Union["ManagedDatabaseUserPgAccessControl", typing.Dict[builtins.str, typing.Any]]] = None,
392
435
  redis_access_control: typing.Optional[typing.Union["ManagedDatabaseUserRedisAccessControl", typing.Dict[builtins.str, typing.Any]]] = None,
436
+ valkey_access_control: typing.Optional[typing.Union["ManagedDatabaseUserValkeyAccessControl", typing.Dict[builtins.str, typing.Any]]] = None,
393
437
  ) -> None:
394
438
  '''
395
439
  :param connection:
@@ -399,14 +443,15 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
399
443
  :param lifecycle:
400
444
  :param provider:
401
445
  :param provisioners:
402
- :param service: Service's UUID for which this user belongs to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#service ManagedDatabaseUser#service}
403
- :param username: Name of the database user. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#username ManagedDatabaseUser#username}
404
- :param authentication: MySQL only, authentication type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#authentication ManagedDatabaseUser#authentication}
405
- :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#id ManagedDatabaseUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
406
- :param opensearch_access_control: opensearch_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#opensearch_access_control ManagedDatabaseUser#opensearch_access_control}
407
- :param password: Password for the database user. Defaults to a random value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#password ManagedDatabaseUser#password}
408
- :param pg_access_control: pg_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#pg_access_control ManagedDatabaseUser#pg_access_control}
409
- :param redis_access_control: redis_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#redis_access_control ManagedDatabaseUser#redis_access_control}
446
+ :param service: Service's UUID for which this user belongs to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#service ManagedDatabaseUser#service}
447
+ :param username: Name of the database user. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#username ManagedDatabaseUser#username}
448
+ :param authentication: MySQL only, authentication type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#authentication ManagedDatabaseUser#authentication}
449
+ :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#id ManagedDatabaseUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
450
+ :param opensearch_access_control: opensearch_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#opensearch_access_control ManagedDatabaseUser#opensearch_access_control}
451
+ :param password: Password for the database user. Defaults to a random value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#password ManagedDatabaseUser#password}
452
+ :param pg_access_control: pg_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#pg_access_control ManagedDatabaseUser#pg_access_control}
453
+ :param redis_access_control: redis_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#redis_access_control ManagedDatabaseUser#redis_access_control}
454
+ :param valkey_access_control: valkey_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#valkey_access_control ManagedDatabaseUser#valkey_access_control}
410
455
  '''
411
456
  if isinstance(lifecycle, dict):
412
457
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -416,6 +461,8 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
416
461
  pg_access_control = ManagedDatabaseUserPgAccessControl(**pg_access_control)
417
462
  if isinstance(redis_access_control, dict):
418
463
  redis_access_control = ManagedDatabaseUserRedisAccessControl(**redis_access_control)
464
+ if isinstance(valkey_access_control, dict):
465
+ valkey_access_control = ManagedDatabaseUserValkeyAccessControl(**valkey_access_control)
419
466
  if __debug__:
420
467
  type_hints = typing.get_type_hints(_typecheckingstub__07a7f5c785cc0e125e8ded59bfd094c26884e099fe8129734900f6faab61a108)
421
468
  check_type(argname="argument connection", value=connection, expected_type=type_hints["connection"])
@@ -433,6 +480,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
433
480
  check_type(argname="argument password", value=password, expected_type=type_hints["password"])
434
481
  check_type(argname="argument pg_access_control", value=pg_access_control, expected_type=type_hints["pg_access_control"])
435
482
  check_type(argname="argument redis_access_control", value=redis_access_control, expected_type=type_hints["redis_access_control"])
483
+ check_type(argname="argument valkey_access_control", value=valkey_access_control, expected_type=type_hints["valkey_access_control"])
436
484
  self._values: typing.Dict[builtins.str, typing.Any] = {
437
485
  "service": service,
438
486
  "username": username,
@@ -463,6 +511,8 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
463
511
  self._values["pg_access_control"] = pg_access_control
464
512
  if redis_access_control is not None:
465
513
  self._values["redis_access_control"] = redis_access_control
514
+ if valkey_access_control is not None:
515
+ self._values["valkey_access_control"] = valkey_access_control
466
516
 
467
517
  @builtins.property
468
518
  def connection(
@@ -532,7 +582,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
532
582
  def service(self) -> builtins.str:
533
583
  '''Service's UUID for which this user belongs to.
534
584
 
535
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#service ManagedDatabaseUser#service}
585
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#service ManagedDatabaseUser#service}
536
586
  '''
537
587
  result = self._values.get("service")
538
588
  assert result is not None, "Required property 'service' is missing"
@@ -542,7 +592,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
542
592
  def username(self) -> builtins.str:
543
593
  '''Name of the database user.
544
594
 
545
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#username ManagedDatabaseUser#username}
595
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#username ManagedDatabaseUser#username}
546
596
  '''
547
597
  result = self._values.get("username")
548
598
  assert result is not None, "Required property 'username' is missing"
@@ -552,14 +602,14 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
552
602
  def authentication(self) -> typing.Optional[builtins.str]:
553
603
  '''MySQL only, authentication type.
554
604
 
555
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#authentication ManagedDatabaseUser#authentication}
605
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#authentication ManagedDatabaseUser#authentication}
556
606
  '''
557
607
  result = self._values.get("authentication")
558
608
  return typing.cast(typing.Optional[builtins.str], result)
559
609
 
560
610
  @builtins.property
561
611
  def id(self) -> typing.Optional[builtins.str]:
562
- '''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#id ManagedDatabaseUser#id}.
612
+ '''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#id ManagedDatabaseUser#id}.
563
613
 
564
614
  Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
565
615
  If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -573,7 +623,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
573
623
  ) -> typing.Optional["ManagedDatabaseUserOpensearchAccessControl"]:
574
624
  '''opensearch_access_control block.
575
625
 
576
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#opensearch_access_control ManagedDatabaseUser#opensearch_access_control}
626
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#opensearch_access_control ManagedDatabaseUser#opensearch_access_control}
577
627
  '''
578
628
  result = self._values.get("opensearch_access_control")
579
629
  return typing.cast(typing.Optional["ManagedDatabaseUserOpensearchAccessControl"], result)
@@ -582,7 +632,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
582
632
  def password(self) -> typing.Optional[builtins.str]:
583
633
  '''Password for the database user. Defaults to a random value.
584
634
 
585
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#password ManagedDatabaseUser#password}
635
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#password ManagedDatabaseUser#password}
586
636
  '''
587
637
  result = self._values.get("password")
588
638
  return typing.cast(typing.Optional[builtins.str], result)
@@ -593,7 +643,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
593
643
  ) -> typing.Optional["ManagedDatabaseUserPgAccessControl"]:
594
644
  '''pg_access_control block.
595
645
 
596
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#pg_access_control ManagedDatabaseUser#pg_access_control}
646
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#pg_access_control ManagedDatabaseUser#pg_access_control}
597
647
  '''
598
648
  result = self._values.get("pg_access_control")
599
649
  return typing.cast(typing.Optional["ManagedDatabaseUserPgAccessControl"], result)
@@ -604,11 +654,22 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
604
654
  ) -> typing.Optional["ManagedDatabaseUserRedisAccessControl"]:
605
655
  '''redis_access_control block.
606
656
 
607
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#redis_access_control ManagedDatabaseUser#redis_access_control}
657
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#redis_access_control ManagedDatabaseUser#redis_access_control}
608
658
  '''
609
659
  result = self._values.get("redis_access_control")
610
660
  return typing.cast(typing.Optional["ManagedDatabaseUserRedisAccessControl"], result)
611
661
 
662
+ @builtins.property
663
+ def valkey_access_control(
664
+ self,
665
+ ) -> typing.Optional["ManagedDatabaseUserValkeyAccessControl"]:
666
+ '''valkey_access_control block.
667
+
668
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#valkey_access_control ManagedDatabaseUser#valkey_access_control}
669
+ '''
670
+ result = self._values.get("valkey_access_control")
671
+ return typing.cast(typing.Optional["ManagedDatabaseUserValkeyAccessControl"], result)
672
+
612
673
  def __eq__(self, rhs: typing.Any) -> builtins.bool:
613
674
  return isinstance(rhs, self.__class__) and rhs._values == self._values
614
675
 
@@ -633,7 +694,7 @@ class ManagedDatabaseUserOpensearchAccessControl:
633
694
  rules: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["ManagedDatabaseUserOpensearchAccessControlRules", typing.Dict[builtins.str, typing.Any]]]],
634
695
  ) -> None:
635
696
  '''
636
- :param rules: rules block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#rules ManagedDatabaseUser#rules}
697
+ :param rules: rules block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#rules ManagedDatabaseUser#rules}
637
698
  '''
638
699
  if __debug__:
639
700
  type_hints = typing.get_type_hints(_typecheckingstub__72db216f4a07b0d61090bf6cee72765d201a2daf9f3d0177b70ceadc0e0b4950)
@@ -648,7 +709,7 @@ class ManagedDatabaseUserOpensearchAccessControl:
648
709
  ) -> typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["ManagedDatabaseUserOpensearchAccessControlRules"]]:
649
710
  '''rules block.
650
711
 
651
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#rules ManagedDatabaseUser#rules}
712
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#rules ManagedDatabaseUser#rules}
652
713
  '''
653
714
  result = self._values.get("rules")
654
715
  assert result is not None, "Required property 'rules' is missing"
@@ -737,8 +798,8 @@ class ManagedDatabaseUserOpensearchAccessControlOutputReference(
737
798
  class ManagedDatabaseUserOpensearchAccessControlRules:
738
799
  def __init__(self, *, index: builtins.str, permission: builtins.str) -> None:
739
800
  '''
740
- :param index: Set index name, pattern or top level API. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#index ManagedDatabaseUser#index}
741
- :param permission: Set permission access. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#permission ManagedDatabaseUser#permission}
801
+ :param index: Set index name, pattern or top level API. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#index ManagedDatabaseUser#index}
802
+ :param permission: Set permission access. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#permission ManagedDatabaseUser#permission}
742
803
  '''
743
804
  if __debug__:
744
805
  type_hints = typing.get_type_hints(_typecheckingstub__037bf6ae1cf4ccc5175cd9f327782b4c274be6c4d8dcbbf42b47b3e0d87e86ea)
@@ -753,7 +814,7 @@ class ManagedDatabaseUserOpensearchAccessControlRules:
753
814
  def index(self) -> builtins.str:
754
815
  '''Set index name, pattern or top level API.
755
816
 
756
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#index ManagedDatabaseUser#index}
817
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#index ManagedDatabaseUser#index}
757
818
  '''
758
819
  result = self._values.get("index")
759
820
  assert result is not None, "Required property 'index' is missing"
@@ -763,7 +824,7 @@ class ManagedDatabaseUserOpensearchAccessControlRules:
763
824
  def permission(self) -> builtins.str:
764
825
  '''Set permission access.
765
826
 
766
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#permission ManagedDatabaseUser#permission}
827
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#permission ManagedDatabaseUser#permission}
767
828
  '''
768
829
  result = self._values.get("permission")
769
830
  assert result is not None, "Required property 'permission' is missing"
@@ -964,7 +1025,7 @@ class ManagedDatabaseUserPgAccessControl:
964
1025
  allow_replication: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
965
1026
  ) -> None:
966
1027
  '''
967
- :param allow_replication: Grant replication privilege. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#allow_replication ManagedDatabaseUser#allow_replication}
1028
+ :param allow_replication: Grant replication privilege. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#allow_replication ManagedDatabaseUser#allow_replication}
968
1029
  '''
969
1030
  if __debug__:
970
1031
  type_hints = typing.get_type_hints(_typecheckingstub__f34e6b56dbd319319ed29790d55c8592357d86f9b7c8e8c14a5c4d70a6787a4f)
@@ -979,7 +1040,7 @@ class ManagedDatabaseUserPgAccessControl:
979
1040
  ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
980
1041
  '''Grant replication privilege.
981
1042
 
982
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#allow_replication ManagedDatabaseUser#allow_replication}
1043
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#allow_replication ManagedDatabaseUser#allow_replication}
983
1044
  '''
984
1045
  result = self._values.get("allow_replication")
985
1046
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
@@ -1080,10 +1141,10 @@ class ManagedDatabaseUserRedisAccessControl:
1080
1141
  keys: typing.Optional[typing.Sequence[builtins.str]] = None,
1081
1142
  ) -> None:
1082
1143
  '''
1083
- :param categories: Set access control to all commands in specified categories. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
1084
- :param channels: Set access control to Pub/Sub channels. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
1085
- :param commands: Set access control to commands. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
1086
- :param keys: Set access control to keys. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
1144
+ :param categories: Set access control to all commands in specified categories. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
1145
+ :param channels: Set access control to Pub/Sub channels. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
1146
+ :param commands: Set access control to commands. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
1147
+ :param keys: Set access control to keys. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
1087
1148
  '''
1088
1149
  if __debug__:
1089
1150
  type_hints = typing.get_type_hints(_typecheckingstub__27204462f8812754fabbce2e4daa3352d018e15b121d6d94fd8c33a5f838827b)
@@ -1105,7 +1166,7 @@ class ManagedDatabaseUserRedisAccessControl:
1105
1166
  def categories(self) -> typing.Optional[typing.List[builtins.str]]:
1106
1167
  '''Set access control to all commands in specified categories.
1107
1168
 
1108
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
1169
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
1109
1170
  '''
1110
1171
  result = self._values.get("categories")
1111
1172
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
@@ -1114,7 +1175,7 @@ class ManagedDatabaseUserRedisAccessControl:
1114
1175
  def channels(self) -> typing.Optional[typing.List[builtins.str]]:
1115
1176
  '''Set access control to Pub/Sub channels.
1116
1177
 
1117
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
1178
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
1118
1179
  '''
1119
1180
  result = self._values.get("channels")
1120
1181
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
@@ -1123,7 +1184,7 @@ class ManagedDatabaseUserRedisAccessControl:
1123
1184
  def commands(self) -> typing.Optional[typing.List[builtins.str]]:
1124
1185
  '''Set access control to commands.
1125
1186
 
1126
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
1187
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
1127
1188
  '''
1128
1189
  result = self._values.get("commands")
1129
1190
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
@@ -1132,7 +1193,7 @@ class ManagedDatabaseUserRedisAccessControl:
1132
1193
  def keys(self) -> typing.Optional[typing.List[builtins.str]]:
1133
1194
  '''Set access control to keys.
1134
1195
 
1135
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.14.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
1196
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
1136
1197
  '''
1137
1198
  result = self._values.get("keys")
1138
1199
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
@@ -1269,6 +1330,215 @@ class ManagedDatabaseUserRedisAccessControlOutputReference(
1269
1330
  jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
1270
1331
 
1271
1332
 
1333
+ @jsii.data_type(
1334
+ jsii_type="@cdktf/provider-upcloud.managedDatabaseUser.ManagedDatabaseUserValkeyAccessControl",
1335
+ jsii_struct_bases=[],
1336
+ name_mapping={
1337
+ "categories": "categories",
1338
+ "channels": "channels",
1339
+ "commands": "commands",
1340
+ "keys": "keys",
1341
+ },
1342
+ )
1343
+ class ManagedDatabaseUserValkeyAccessControl:
1344
+ def __init__(
1345
+ self,
1346
+ *,
1347
+ categories: typing.Optional[typing.Sequence[builtins.str]] = None,
1348
+ channels: typing.Optional[typing.Sequence[builtins.str]] = None,
1349
+ commands: typing.Optional[typing.Sequence[builtins.str]] = None,
1350
+ keys: typing.Optional[typing.Sequence[builtins.str]] = None,
1351
+ ) -> None:
1352
+ '''
1353
+ :param categories: Set access control to all commands in specified categories. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
1354
+ :param channels: Set access control to Pub/Sub channels. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
1355
+ :param commands: Set access control to commands. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
1356
+ :param keys: Set access control to keys. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
1357
+ '''
1358
+ if __debug__:
1359
+ type_hints = typing.get_type_hints(_typecheckingstub__2f1493b4bca5854170cbde576964405bb43c4a65a1f4134e3fdb249bbe20358d)
1360
+ check_type(argname="argument categories", value=categories, expected_type=type_hints["categories"])
1361
+ check_type(argname="argument channels", value=channels, expected_type=type_hints["channels"])
1362
+ check_type(argname="argument commands", value=commands, expected_type=type_hints["commands"])
1363
+ check_type(argname="argument keys", value=keys, expected_type=type_hints["keys"])
1364
+ self._values: typing.Dict[builtins.str, typing.Any] = {}
1365
+ if categories is not None:
1366
+ self._values["categories"] = categories
1367
+ if channels is not None:
1368
+ self._values["channels"] = channels
1369
+ if commands is not None:
1370
+ self._values["commands"] = commands
1371
+ if keys is not None:
1372
+ self._values["keys"] = keys
1373
+
1374
+ @builtins.property
1375
+ def categories(self) -> typing.Optional[typing.List[builtins.str]]:
1376
+ '''Set access control to all commands in specified categories.
1377
+
1378
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
1379
+ '''
1380
+ result = self._values.get("categories")
1381
+ return typing.cast(typing.Optional[typing.List[builtins.str]], result)
1382
+
1383
+ @builtins.property
1384
+ def channels(self) -> typing.Optional[typing.List[builtins.str]]:
1385
+ '''Set access control to Pub/Sub channels.
1386
+
1387
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
1388
+ '''
1389
+ result = self._values.get("channels")
1390
+ return typing.cast(typing.Optional[typing.List[builtins.str]], result)
1391
+
1392
+ @builtins.property
1393
+ def commands(self) -> typing.Optional[typing.List[builtins.str]]:
1394
+ '''Set access control to commands.
1395
+
1396
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
1397
+ '''
1398
+ result = self._values.get("commands")
1399
+ return typing.cast(typing.Optional[typing.List[builtins.str]], result)
1400
+
1401
+ @builtins.property
1402
+ def keys(self) -> typing.Optional[typing.List[builtins.str]]:
1403
+ '''Set access control to keys.
1404
+
1405
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
1406
+ '''
1407
+ result = self._values.get("keys")
1408
+ return typing.cast(typing.Optional[typing.List[builtins.str]], result)
1409
+
1410
+ def __eq__(self, rhs: typing.Any) -> builtins.bool:
1411
+ return isinstance(rhs, self.__class__) and rhs._values == self._values
1412
+
1413
+ def __ne__(self, rhs: typing.Any) -> builtins.bool:
1414
+ return not (rhs == self)
1415
+
1416
+ def __repr__(self) -> str:
1417
+ return "ManagedDatabaseUserValkeyAccessControl(%s)" % ", ".join(
1418
+ k + "=" + repr(v) for k, v in self._values.items()
1419
+ )
1420
+
1421
+
1422
+ class ManagedDatabaseUserValkeyAccessControlOutputReference(
1423
+ _cdktf_9a9027ec.ComplexObject,
1424
+ metaclass=jsii.JSIIMeta,
1425
+ jsii_type="@cdktf/provider-upcloud.managedDatabaseUser.ManagedDatabaseUserValkeyAccessControlOutputReference",
1426
+ ):
1427
+ def __init__(
1428
+ self,
1429
+ terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
1430
+ terraform_attribute: builtins.str,
1431
+ ) -> None:
1432
+ '''
1433
+ :param terraform_resource: The parent resource.
1434
+ :param terraform_attribute: The attribute on the parent resource this class is referencing.
1435
+ '''
1436
+ if __debug__:
1437
+ type_hints = typing.get_type_hints(_typecheckingstub__60e811bb7552f5b604095a5015d4c3f3505ab56452fbbcbaf69a6a51d0f46768)
1438
+ check_type(argname="argument terraform_resource", value=terraform_resource, expected_type=type_hints["terraform_resource"])
1439
+ check_type(argname="argument terraform_attribute", value=terraform_attribute, expected_type=type_hints["terraform_attribute"])
1440
+ jsii.create(self.__class__, self, [terraform_resource, terraform_attribute])
1441
+
1442
+ @jsii.member(jsii_name="resetCategories")
1443
+ def reset_categories(self) -> None:
1444
+ return typing.cast(None, jsii.invoke(self, "resetCategories", []))
1445
+
1446
+ @jsii.member(jsii_name="resetChannels")
1447
+ def reset_channels(self) -> None:
1448
+ return typing.cast(None, jsii.invoke(self, "resetChannels", []))
1449
+
1450
+ @jsii.member(jsii_name="resetCommands")
1451
+ def reset_commands(self) -> None:
1452
+ return typing.cast(None, jsii.invoke(self, "resetCommands", []))
1453
+
1454
+ @jsii.member(jsii_name="resetKeys")
1455
+ def reset_keys(self) -> None:
1456
+ return typing.cast(None, jsii.invoke(self, "resetKeys", []))
1457
+
1458
+ @builtins.property
1459
+ @jsii.member(jsii_name="categoriesInput")
1460
+ def categories_input(self) -> typing.Optional[typing.List[builtins.str]]:
1461
+ return typing.cast(typing.Optional[typing.List[builtins.str]], jsii.get(self, "categoriesInput"))
1462
+
1463
+ @builtins.property
1464
+ @jsii.member(jsii_name="channelsInput")
1465
+ def channels_input(self) -> typing.Optional[typing.List[builtins.str]]:
1466
+ return typing.cast(typing.Optional[typing.List[builtins.str]], jsii.get(self, "channelsInput"))
1467
+
1468
+ @builtins.property
1469
+ @jsii.member(jsii_name="commandsInput")
1470
+ def commands_input(self) -> typing.Optional[typing.List[builtins.str]]:
1471
+ return typing.cast(typing.Optional[typing.List[builtins.str]], jsii.get(self, "commandsInput"))
1472
+
1473
+ @builtins.property
1474
+ @jsii.member(jsii_name="keysInput")
1475
+ def keys_input(self) -> typing.Optional[typing.List[builtins.str]]:
1476
+ return typing.cast(typing.Optional[typing.List[builtins.str]], jsii.get(self, "keysInput"))
1477
+
1478
+ @builtins.property
1479
+ @jsii.member(jsii_name="categories")
1480
+ def categories(self) -> typing.List[builtins.str]:
1481
+ return typing.cast(typing.List[builtins.str], jsii.get(self, "categories"))
1482
+
1483
+ @categories.setter
1484
+ def categories(self, value: typing.List[builtins.str]) -> None:
1485
+ if __debug__:
1486
+ type_hints = typing.get_type_hints(_typecheckingstub__ccd299ae68222ffa9a194acbf7a81cc6852825ca93271fd388a8cd6121ed4f19)
1487
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1488
+ jsii.set(self, "categories", value) # pyright: ignore[reportArgumentType]
1489
+
1490
+ @builtins.property
1491
+ @jsii.member(jsii_name="channels")
1492
+ def channels(self) -> typing.List[builtins.str]:
1493
+ return typing.cast(typing.List[builtins.str], jsii.get(self, "channels"))
1494
+
1495
+ @channels.setter
1496
+ def channels(self, value: typing.List[builtins.str]) -> None:
1497
+ if __debug__:
1498
+ type_hints = typing.get_type_hints(_typecheckingstub__d3b52ad193f7883921cbb74ab75e9b78c1fbce4f8095f08603bbc19c8a429872)
1499
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1500
+ jsii.set(self, "channels", value) # pyright: ignore[reportArgumentType]
1501
+
1502
+ @builtins.property
1503
+ @jsii.member(jsii_name="commands")
1504
+ def commands(self) -> typing.List[builtins.str]:
1505
+ return typing.cast(typing.List[builtins.str], jsii.get(self, "commands"))
1506
+
1507
+ @commands.setter
1508
+ def commands(self, value: typing.List[builtins.str]) -> None:
1509
+ if __debug__:
1510
+ type_hints = typing.get_type_hints(_typecheckingstub__75d52995b6d04add9841ba35e2f51734fdb294de2b4075236624eeac70dbc284)
1511
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1512
+ jsii.set(self, "commands", value) # pyright: ignore[reportArgumentType]
1513
+
1514
+ @builtins.property
1515
+ @jsii.member(jsii_name="keys")
1516
+ def keys(self) -> typing.List[builtins.str]:
1517
+ return typing.cast(typing.List[builtins.str], jsii.get(self, "keys"))
1518
+
1519
+ @keys.setter
1520
+ def keys(self, value: typing.List[builtins.str]) -> None:
1521
+ if __debug__:
1522
+ type_hints = typing.get_type_hints(_typecheckingstub__4d2d78c3e1a8bba65f5829af1ac02a433782d32b8ae35a1f8159c5e851eac810)
1523
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1524
+ jsii.set(self, "keys", value) # pyright: ignore[reportArgumentType]
1525
+
1526
+ @builtins.property
1527
+ @jsii.member(jsii_name="internalValue")
1528
+ def internal_value(self) -> typing.Optional[ManagedDatabaseUserValkeyAccessControl]:
1529
+ return typing.cast(typing.Optional[ManagedDatabaseUserValkeyAccessControl], jsii.get(self, "internalValue"))
1530
+
1531
+ @internal_value.setter
1532
+ def internal_value(
1533
+ self,
1534
+ value: typing.Optional[ManagedDatabaseUserValkeyAccessControl],
1535
+ ) -> None:
1536
+ if __debug__:
1537
+ type_hints = typing.get_type_hints(_typecheckingstub__cec487a59a2b9bbfdc8f9f8aeeb285858a68a44c95f58c1b7e4379f578adae99)
1538
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1539
+ jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
1540
+
1541
+
1272
1542
  __all__ = [
1273
1543
  "ManagedDatabaseUser",
1274
1544
  "ManagedDatabaseUserConfig",
@@ -1281,6 +1551,8 @@ __all__ = [
1281
1551
  "ManagedDatabaseUserPgAccessControlOutputReference",
1282
1552
  "ManagedDatabaseUserRedisAccessControl",
1283
1553
  "ManagedDatabaseUserRedisAccessControlOutputReference",
1554
+ "ManagedDatabaseUserValkeyAccessControl",
1555
+ "ManagedDatabaseUserValkeyAccessControlOutputReference",
1284
1556
  ]
1285
1557
 
1286
1558
  publication.publish()
@@ -1297,6 +1569,7 @@ def _typecheckingstub__284705db217200be03c68231d6206d89ab6b5c942fa6aa0a91e5f854d
1297
1569
  password: typing.Optional[builtins.str] = None,
1298
1570
  pg_access_control: typing.Optional[typing.Union[ManagedDatabaseUserPgAccessControl, typing.Dict[builtins.str, typing.Any]]] = None,
1299
1571
  redis_access_control: typing.Optional[typing.Union[ManagedDatabaseUserRedisAccessControl, typing.Dict[builtins.str, typing.Any]]] = None,
1572
+ valkey_access_control: typing.Optional[typing.Union[ManagedDatabaseUserValkeyAccessControl, typing.Dict[builtins.str, typing.Any]]] = None,
1300
1573
  connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
1301
1574
  count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
1302
1575
  depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
@@ -1364,6 +1637,7 @@ def _typecheckingstub__07a7f5c785cc0e125e8ded59bfd094c26884e099fe8129734900f6faa
1364
1637
  password: typing.Optional[builtins.str] = None,
1365
1638
  pg_access_control: typing.Optional[typing.Union[ManagedDatabaseUserPgAccessControl, typing.Dict[builtins.str, typing.Any]]] = None,
1366
1639
  redis_access_control: typing.Optional[typing.Union[ManagedDatabaseUserRedisAccessControl, typing.Dict[builtins.str, typing.Any]]] = None,
1640
+ valkey_access_control: typing.Optional[typing.Union[ManagedDatabaseUserValkeyAccessControl, typing.Dict[builtins.str, typing.Any]]] = None,
1367
1641
  ) -> None:
1368
1642
  """Type checking stubs"""
1369
1643
  pass
@@ -1539,3 +1813,50 @@ def _typecheckingstub__339df3f9580cdaa83ea424d213c30eb13df0c7142e732aa0a5fa3d7a2
1539
1813
  ) -> None:
1540
1814
  """Type checking stubs"""
1541
1815
  pass
1816
+
1817
+ def _typecheckingstub__2f1493b4bca5854170cbde576964405bb43c4a65a1f4134e3fdb249bbe20358d(
1818
+ *,
1819
+ categories: typing.Optional[typing.Sequence[builtins.str]] = None,
1820
+ channels: typing.Optional[typing.Sequence[builtins.str]] = None,
1821
+ commands: typing.Optional[typing.Sequence[builtins.str]] = None,
1822
+ keys: typing.Optional[typing.Sequence[builtins.str]] = None,
1823
+ ) -> None:
1824
+ """Type checking stubs"""
1825
+ pass
1826
+
1827
+ def _typecheckingstub__60e811bb7552f5b604095a5015d4c3f3505ab56452fbbcbaf69a6a51d0f46768(
1828
+ terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
1829
+ terraform_attribute: builtins.str,
1830
+ ) -> None:
1831
+ """Type checking stubs"""
1832
+ pass
1833
+
1834
+ def _typecheckingstub__ccd299ae68222ffa9a194acbf7a81cc6852825ca93271fd388a8cd6121ed4f19(
1835
+ value: typing.List[builtins.str],
1836
+ ) -> None:
1837
+ """Type checking stubs"""
1838
+ pass
1839
+
1840
+ def _typecheckingstub__d3b52ad193f7883921cbb74ab75e9b78c1fbce4f8095f08603bbc19c8a429872(
1841
+ value: typing.List[builtins.str],
1842
+ ) -> None:
1843
+ """Type checking stubs"""
1844
+ pass
1845
+
1846
+ def _typecheckingstub__75d52995b6d04add9841ba35e2f51734fdb294de2b4075236624eeac70dbc284(
1847
+ value: typing.List[builtins.str],
1848
+ ) -> None:
1849
+ """Type checking stubs"""
1850
+ pass
1851
+
1852
+ def _typecheckingstub__4d2d78c3e1a8bba65f5829af1ac02a433782d32b8ae35a1f8159c5e851eac810(
1853
+ value: typing.List[builtins.str],
1854
+ ) -> None:
1855
+ """Type checking stubs"""
1856
+ pass
1857
+
1858
+ def _typecheckingstub__cec487a59a2b9bbfdc8f9f8aeeb285858a68a44c95f58c1b7e4379f578adae99(
1859
+ value: typing.Optional[ManagedDatabaseUserValkeyAccessControl],
1860
+ ) -> None:
1861
+ """Type checking stubs"""
1862
+ pass