cdktf-cdktf-provider-upcloud 14.3.0__py3-none-any.whl → 14.4.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.

Files changed (62) hide show
  1. cdktf_cdktf_provider_upcloud/__init__.py +3 -3
  2. cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
  3. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.4.0.jsii.tgz +0 -0
  4. cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +7 -7
  5. cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +7 -7
  6. cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +7 -7
  7. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
  8. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
  9. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
  10. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
  11. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +10 -10
  12. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
  13. cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
  14. cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +25 -25
  15. cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
  16. cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
  17. cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +10 -10
  18. cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +41 -41
  19. cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +19 -19
  20. cdktf_cdktf_provider_upcloud/gateway/__init__.py +37 -37
  21. cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +34 -34
  22. cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +61 -61
  23. cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +78 -31
  24. cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +403 -47
  25. cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +42 -42
  26. cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +64 -64
  27. cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +16 -16
  28. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +28 -28
  29. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +16 -16
  30. cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +39 -39
  31. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +193 -193
  32. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +16 -16
  33. cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +19 -19
  34. cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +31 -31
  35. cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +28 -28
  36. cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
  37. cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +189 -189
  38. cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +330 -330
  39. cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +345 -345
  40. cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +117 -117
  41. cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +50 -50
  42. cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +30 -30
  43. cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +19 -19
  44. cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +13 -13
  45. cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +16 -16
  46. cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +16 -16
  47. cdktf_cdktf_provider_upcloud/network/__init__.py +30 -30
  48. cdktf_cdktf_provider_upcloud/network_peering/__init__.py +23 -23
  49. cdktf_cdktf_provider_upcloud/object_storage/__init__.py +30 -30
  50. cdktf_cdktf_provider_upcloud/provider/__init__.py +25 -25
  51. cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
  52. cdktf_cdktf_provider_upcloud/server/__init__.py +153 -153
  53. cdktf_cdktf_provider_upcloud/server_group/__init__.py +22 -22
  54. cdktf_cdktf_provider_upcloud/storage/__init__.py +58 -58
  55. cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
  56. {cdktf_cdktf_provider_upcloud-14.3.0.dist-info → cdktf_cdktf_provider_upcloud-14.4.0.dist-info}/METADATA +4 -4
  57. cdktf_cdktf_provider_upcloud-14.4.0.dist-info/RECORD +61 -0
  58. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.3.0.jsii.tgz +0 -0
  59. cdktf_cdktf_provider_upcloud-14.3.0.dist-info/RECORD +0 -61
  60. {cdktf_cdktf_provider_upcloud-14.3.0.dist-info → cdktf_cdktf_provider_upcloud-14.4.0.dist-info}/LICENSE +0 -0
  61. {cdktf_cdktf_provider_upcloud-14.3.0.dist-info → cdktf_cdktf_provider_upcloud-14.4.0.dist-info}/WHEEL +0 -0
  62. {cdktf_cdktf_provider_upcloud-14.3.0.dist-info → cdktf_cdktf_provider_upcloud-14.4.0.dist-info}/top_level.txt +0 -0
@@ -1,7 +1,7 @@
1
1
  '''
2
2
  # `upcloud_kubernetes_node_group`
3
3
 
4
- Refer to the Terraform Registry for docs: [`upcloud_kubernetes_node_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group).
4
+ Refer to the Terraform Registry for docs: [`upcloud_kubernetes_node_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -29,7 +29,7 @@ class KubernetesNodeGroup(
29
29
  metaclass=jsii.JSIIMeta,
30
30
  jsii_type="@cdktf/provider-upcloud.kubernetesNodeGroup.KubernetesNodeGroup",
31
31
  ):
32
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group}.'''
32
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group}.'''
33
33
 
34
34
  def __init__(
35
35
  self,
@@ -41,10 +41,12 @@ class KubernetesNodeGroup(
41
41
  node_count: jsii.Number,
42
42
  plan: builtins.str,
43
43
  anti_affinity: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
44
+ custom_plan: typing.Optional[typing.Union["KubernetesNodeGroupCustomPlan", typing.Dict[builtins.str, typing.Any]]] = None,
44
45
  id: typing.Optional[builtins.str] = None,
45
46
  kubelet_args: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["KubernetesNodeGroupKubeletArgs", typing.Dict[builtins.str, typing.Any]]]]] = None,
46
47
  labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
47
48
  ssh_keys: typing.Optional[typing.Sequence[builtins.str]] = None,
49
+ storage_encryption: typing.Optional[builtins.str] = None,
48
50
  taint: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["KubernetesNodeGroupTaint", typing.Dict[builtins.str, typing.Any]]]]] = None,
49
51
  utility_network_access: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
50
52
  connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
@@ -55,21 +57,23 @@ class KubernetesNodeGroup(
55
57
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
56
58
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
57
59
  ) -> None:
58
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group} Resource.
60
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group} Resource.
59
61
 
60
62
  :param scope: The scope in which to define this construct.
61
63
  :param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
62
- :param cluster: Cluster ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
63
- :param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
64
- :param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
65
- :param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
66
- :param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
67
- :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#id KubernetesNodeGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
68
- :param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
69
- :param labels: Key-value pairs to classify the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
70
- :param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
71
- :param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
72
- :param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
64
+ :param cluster: Cluster ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
65
+ :param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
66
+ :param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
67
+ :param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
68
+ :param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
69
+ :param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
70
+ :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#id KubernetesNodeGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
71
+ :param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
72
+ :param labels: Key-value pairs to classify the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
73
+ :param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
74
+ :param storage_encryption: Storage encryption strategy for the nodes in this group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
75
+ :param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
76
+ :param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
73
77
  :param connection:
74
78
  :param count:
75
79
  :param depends_on:
@@ -88,10 +92,12 @@ class KubernetesNodeGroup(
88
92
  node_count=node_count,
89
93
  plan=plan,
90
94
  anti_affinity=anti_affinity,
95
+ custom_plan=custom_plan,
91
96
  id=id,
92
97
  kubelet_args=kubelet_args,
93
98
  labels=labels,
94
99
  ssh_keys=ssh_keys,
100
+ storage_encryption=storage_encryption,
95
101
  taint=taint,
96
102
  utility_network_access=utility_network_access,
97
103
  connection=connection,
@@ -118,7 +124,7 @@ class KubernetesNodeGroup(
118
124
 
119
125
  :param scope: The scope in which to define this construct.
120
126
  :param import_to_id: The construct id used in the generated config for the KubernetesNodeGroup to import.
121
- :param import_from_id: The id of the existing KubernetesNodeGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#import import section} in the documentation of this resource for the id to use
127
+ :param import_from_id: The id of the existing KubernetesNodeGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#import import section} in the documentation of this resource for the id to use
122
128
  :param provider: ? Optional instance of the provider where the KubernetesNodeGroup to import is found.
123
129
  '''
124
130
  if __debug__:
@@ -129,6 +135,30 @@ class KubernetesNodeGroup(
129
135
  check_type(argname="argument provider", value=provider, expected_type=type_hints["provider"])
130
136
  return typing.cast(_cdktf_9a9027ec.ImportableResource, jsii.sinvoke(cls, "generateConfigForImport", [scope, import_to_id, import_from_id, provider]))
131
137
 
138
+ @jsii.member(jsii_name="putCustomPlan")
139
+ def put_custom_plan(
140
+ self,
141
+ *,
142
+ cores: jsii.Number,
143
+ memory: jsii.Number,
144
+ storage_size: jsii.Number,
145
+ storage_tier: typing.Optional[builtins.str] = None,
146
+ ) -> None:
147
+ '''
148
+ :param cores: The number of CPU cores dedicated to individual node group nodes when using custom plan. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
149
+ :param memory: The amount of memory in megabytes to assign to individual node group node when using custom plan. Value needs to be divisible by 1024. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
150
+ :param storage_size: The size of the storage device in gigabytes. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
151
+ :param storage_tier: The storage tier to use. Defaults to maxiops. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
152
+ '''
153
+ value = KubernetesNodeGroupCustomPlan(
154
+ cores=cores,
155
+ memory=memory,
156
+ storage_size=storage_size,
157
+ storage_tier=storage_tier,
158
+ )
159
+
160
+ return typing.cast(None, jsii.invoke(self, "putCustomPlan", [value]))
161
+
132
162
  @jsii.member(jsii_name="putKubeletArgs")
133
163
  def put_kubelet_args(
134
164
  self,
@@ -159,6 +189,10 @@ class KubernetesNodeGroup(
159
189
  def reset_anti_affinity(self) -> None:
160
190
  return typing.cast(None, jsii.invoke(self, "resetAntiAffinity", []))
161
191
 
192
+ @jsii.member(jsii_name="resetCustomPlan")
193
+ def reset_custom_plan(self) -> None:
194
+ return typing.cast(None, jsii.invoke(self, "resetCustomPlan", []))
195
+
162
196
  @jsii.member(jsii_name="resetId")
163
197
  def reset_id(self) -> None:
164
198
  return typing.cast(None, jsii.invoke(self, "resetId", []))
@@ -175,6 +209,10 @@ class KubernetesNodeGroup(
175
209
  def reset_ssh_keys(self) -> None:
176
210
  return typing.cast(None, jsii.invoke(self, "resetSshKeys", []))
177
211
 
212
+ @jsii.member(jsii_name="resetStorageEncryption")
213
+ def reset_storage_encryption(self) -> None:
214
+ return typing.cast(None, jsii.invoke(self, "resetStorageEncryption", []))
215
+
178
216
  @jsii.member(jsii_name="resetTaint")
179
217
  def reset_taint(self) -> None:
180
218
  return typing.cast(None, jsii.invoke(self, "resetTaint", []))
@@ -196,6 +234,11 @@ class KubernetesNodeGroup(
196
234
  def TF_RESOURCE_TYPE(cls) -> builtins.str:
197
235
  return typing.cast(builtins.str, jsii.sget(cls, "tfResourceType"))
198
236
 
237
+ @builtins.property
238
+ @jsii.member(jsii_name="customPlan")
239
+ def custom_plan(self) -> "KubernetesNodeGroupCustomPlanOutputReference":
240
+ return typing.cast("KubernetesNodeGroupCustomPlanOutputReference", jsii.get(self, "customPlan"))
241
+
199
242
  @builtins.property
200
243
  @jsii.member(jsii_name="kubeletArgs")
201
244
  def kubelet_args(self) -> "KubernetesNodeGroupKubeletArgsList":
@@ -218,6 +261,11 @@ class KubernetesNodeGroup(
218
261
  def cluster_input(self) -> typing.Optional[builtins.str]:
219
262
  return typing.cast(typing.Optional[builtins.str], jsii.get(self, "clusterInput"))
220
263
 
264
+ @builtins.property
265
+ @jsii.member(jsii_name="customPlanInput")
266
+ def custom_plan_input(self) -> typing.Optional["KubernetesNodeGroupCustomPlan"]:
267
+ return typing.cast(typing.Optional["KubernetesNodeGroupCustomPlan"], jsii.get(self, "customPlanInput"))
268
+
221
269
  @builtins.property
222
270
  @jsii.member(jsii_name="idInput")
223
271
  def id_input(self) -> typing.Optional[builtins.str]:
@@ -257,6 +305,11 @@ class KubernetesNodeGroup(
257
305
  def ssh_keys_input(self) -> typing.Optional[typing.List[builtins.str]]:
258
306
  return typing.cast(typing.Optional[typing.List[builtins.str]], jsii.get(self, "sshKeysInput"))
259
307
 
308
+ @builtins.property
309
+ @jsii.member(jsii_name="storageEncryptionInput")
310
+ def storage_encryption_input(self) -> typing.Optional[builtins.str]:
311
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "storageEncryptionInput"))
312
+
260
313
  @builtins.property
261
314
  @jsii.member(jsii_name="taintInput")
262
315
  def taint_input(
@@ -370,6 +423,18 @@ class KubernetesNodeGroup(
370
423
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
371
424
  jsii.set(self, "sshKeys", value)
372
425
 
426
+ @builtins.property
427
+ @jsii.member(jsii_name="storageEncryption")
428
+ def storage_encryption(self) -> builtins.str:
429
+ return typing.cast(builtins.str, jsii.get(self, "storageEncryption"))
430
+
431
+ @storage_encryption.setter
432
+ def storage_encryption(self, value: builtins.str) -> None:
433
+ if __debug__:
434
+ type_hints = typing.get_type_hints(_typecheckingstub__b4b669e48a3836306fe80e34225d241ad384a8351e76d8d7b17ffdd8544edf45)
435
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
436
+ jsii.set(self, "storageEncryption", value)
437
+
373
438
  @builtins.property
374
439
  @jsii.member(jsii_name="utilityNetworkAccess")
375
440
  def utility_network_access(
@@ -404,10 +469,12 @@ class KubernetesNodeGroup(
404
469
  "node_count": "nodeCount",
405
470
  "plan": "plan",
406
471
  "anti_affinity": "antiAffinity",
472
+ "custom_plan": "customPlan",
407
473
  "id": "id",
408
474
  "kubelet_args": "kubeletArgs",
409
475
  "labels": "labels",
410
476
  "ssh_keys": "sshKeys",
477
+ "storage_encryption": "storageEncryption",
411
478
  "taint": "taint",
412
479
  "utility_network_access": "utilityNetworkAccess",
413
480
  },
@@ -428,10 +495,12 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
428
495
  node_count: jsii.Number,
429
496
  plan: builtins.str,
430
497
  anti_affinity: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
498
+ custom_plan: typing.Optional[typing.Union["KubernetesNodeGroupCustomPlan", typing.Dict[builtins.str, typing.Any]]] = None,
431
499
  id: typing.Optional[builtins.str] = None,
432
500
  kubelet_args: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["KubernetesNodeGroupKubeletArgs", typing.Dict[builtins.str, typing.Any]]]]] = None,
433
501
  labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
434
502
  ssh_keys: typing.Optional[typing.Sequence[builtins.str]] = None,
503
+ storage_encryption: typing.Optional[builtins.str] = None,
435
504
  taint: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["KubernetesNodeGroupTaint", typing.Dict[builtins.str, typing.Any]]]]] = None,
436
505
  utility_network_access: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
437
506
  ) -> None:
@@ -443,20 +512,24 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
443
512
  :param lifecycle:
444
513
  :param provider:
445
514
  :param provisioners:
446
- :param cluster: Cluster ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
447
- :param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
448
- :param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
449
- :param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
450
- :param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
451
- :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#id KubernetesNodeGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
452
- :param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
453
- :param labels: Key-value pairs to classify the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
454
- :param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
455
- :param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
456
- :param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
515
+ :param cluster: Cluster ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
516
+ :param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
517
+ :param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
518
+ :param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
519
+ :param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
520
+ :param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
521
+ :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#id KubernetesNodeGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
522
+ :param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
523
+ :param labels: Key-value pairs to classify the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
524
+ :param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
525
+ :param storage_encryption: Storage encryption strategy for the nodes in this group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
526
+ :param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
527
+ :param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
457
528
  '''
458
529
  if isinstance(lifecycle, dict):
459
530
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
531
+ if isinstance(custom_plan, dict):
532
+ custom_plan = KubernetesNodeGroupCustomPlan(**custom_plan)
460
533
  if __debug__:
461
534
  type_hints = typing.get_type_hints(_typecheckingstub__2489ae5bd3c17ee9de104387734150d3686d0bce3df0c0db5244751c51da43c4)
462
535
  check_type(argname="argument connection", value=connection, expected_type=type_hints["connection"])
@@ -471,10 +544,12 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
471
544
  check_type(argname="argument node_count", value=node_count, expected_type=type_hints["node_count"])
472
545
  check_type(argname="argument plan", value=plan, expected_type=type_hints["plan"])
473
546
  check_type(argname="argument anti_affinity", value=anti_affinity, expected_type=type_hints["anti_affinity"])
547
+ check_type(argname="argument custom_plan", value=custom_plan, expected_type=type_hints["custom_plan"])
474
548
  check_type(argname="argument id", value=id, expected_type=type_hints["id"])
475
549
  check_type(argname="argument kubelet_args", value=kubelet_args, expected_type=type_hints["kubelet_args"])
476
550
  check_type(argname="argument labels", value=labels, expected_type=type_hints["labels"])
477
551
  check_type(argname="argument ssh_keys", value=ssh_keys, expected_type=type_hints["ssh_keys"])
552
+ check_type(argname="argument storage_encryption", value=storage_encryption, expected_type=type_hints["storage_encryption"])
478
553
  check_type(argname="argument taint", value=taint, expected_type=type_hints["taint"])
479
554
  check_type(argname="argument utility_network_access", value=utility_network_access, expected_type=type_hints["utility_network_access"])
480
555
  self._values: typing.Dict[builtins.str, typing.Any] = {
@@ -499,6 +574,8 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
499
574
  self._values["provisioners"] = provisioners
500
575
  if anti_affinity is not None:
501
576
  self._values["anti_affinity"] = anti_affinity
577
+ if custom_plan is not None:
578
+ self._values["custom_plan"] = custom_plan
502
579
  if id is not None:
503
580
  self._values["id"] = id
504
581
  if kubelet_args is not None:
@@ -507,6 +584,8 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
507
584
  self._values["labels"] = labels
508
585
  if ssh_keys is not None:
509
586
  self._values["ssh_keys"] = ssh_keys
587
+ if storage_encryption is not None:
588
+ self._values["storage_encryption"] = storage_encryption
510
589
  if taint is not None:
511
590
  self._values["taint"] = taint
512
591
  if utility_network_access is not None:
@@ -580,7 +659,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
580
659
  def cluster(self) -> builtins.str:
581
660
  '''Cluster ID.
582
661
 
583
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
662
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
584
663
  '''
585
664
  result = self._values.get("cluster")
586
665
  assert result is not None, "Required property 'cluster' is missing"
@@ -590,7 +669,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
590
669
  def name(self) -> builtins.str:
591
670
  '''The name of the node group. Needs to be unique within a cluster.
592
671
 
593
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
672
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
594
673
  '''
595
674
  result = self._values.get("name")
596
675
  assert result is not None, "Required property 'name' is missing"
@@ -600,7 +679,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
600
679
  def node_count(self) -> jsii.Number:
601
680
  '''Amount of nodes to provision in the node group.
602
681
 
603
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
682
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
604
683
  '''
605
684
  result = self._values.get("node_count")
606
685
  assert result is not None, "Required property 'node_count' is missing"
@@ -610,7 +689,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
610
689
  def plan(self) -> builtins.str:
611
690
  '''The server plan used for the node group. You can list available plans with ``upctl server plans``.
612
691
 
613
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
692
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
614
693
  '''
615
694
  result = self._values.get("plan")
616
695
  assert result is not None, "Required property 'plan' is missing"
@@ -624,14 +703,23 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
624
703
 
625
704
  Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware.
626
705
 
627
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
706
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
628
707
  '''
629
708
  result = self._values.get("anti_affinity")
630
709
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
631
710
 
711
+ @builtins.property
712
+ def custom_plan(self) -> typing.Optional["KubernetesNodeGroupCustomPlan"]:
713
+ '''custom_plan block.
714
+
715
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
716
+ '''
717
+ result = self._values.get("custom_plan")
718
+ return typing.cast(typing.Optional["KubernetesNodeGroupCustomPlan"], result)
719
+
632
720
  @builtins.property
633
721
  def id(self) -> typing.Optional[builtins.str]:
634
- '''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#id KubernetesNodeGroup#id}.
722
+ '''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#id KubernetesNodeGroup#id}.
635
723
 
636
724
  Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
637
725
  If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -645,7 +733,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
645
733
  ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupKubeletArgs"]]]:
646
734
  '''kubelet_args block.
647
735
 
648
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
736
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
649
737
  '''
650
738
  result = self._values.get("kubelet_args")
651
739
  return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupKubeletArgs"]]], result)
@@ -654,7 +742,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
654
742
  def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
655
743
  '''Key-value pairs to classify the node group.
656
744
 
657
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
745
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
658
746
  '''
659
747
  result = self._values.get("labels")
660
748
  return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
@@ -665,18 +753,27 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
665
753
 
666
754
  This allows you to connect to the nodes via SSH once they are running.
667
755
 
668
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
756
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
669
757
  '''
670
758
  result = self._values.get("ssh_keys")
671
759
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
672
760
 
761
+ @builtins.property
762
+ def storage_encryption(self) -> typing.Optional[builtins.str]:
763
+ '''Storage encryption strategy for the nodes in this group.
764
+
765
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
766
+ '''
767
+ result = self._values.get("storage_encryption")
768
+ return typing.cast(typing.Optional[builtins.str], result)
769
+
673
770
  @builtins.property
674
771
  def taint(
675
772
  self,
676
773
  ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupTaint"]]]:
677
774
  '''taint block.
678
775
 
679
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
776
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
680
777
  '''
681
778
  result = self._values.get("taint")
682
779
  return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupTaint"]]], result)
@@ -687,7 +784,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
687
784
  ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
688
785
  '''If set to false, nodes in this group will not have access to utility network.
689
786
 
690
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
787
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
691
788
  '''
692
789
  result = self._values.get("utility_network_access")
693
790
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
@@ -704,6 +801,206 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
704
801
  )
705
802
 
706
803
 
804
+ @jsii.data_type(
805
+ jsii_type="@cdktf/provider-upcloud.kubernetesNodeGroup.KubernetesNodeGroupCustomPlan",
806
+ jsii_struct_bases=[],
807
+ name_mapping={
808
+ "cores": "cores",
809
+ "memory": "memory",
810
+ "storage_size": "storageSize",
811
+ "storage_tier": "storageTier",
812
+ },
813
+ )
814
+ class KubernetesNodeGroupCustomPlan:
815
+ def __init__(
816
+ self,
817
+ *,
818
+ cores: jsii.Number,
819
+ memory: jsii.Number,
820
+ storage_size: jsii.Number,
821
+ storage_tier: typing.Optional[builtins.str] = None,
822
+ ) -> None:
823
+ '''
824
+ :param cores: The number of CPU cores dedicated to individual node group nodes when using custom plan. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
825
+ :param memory: The amount of memory in megabytes to assign to individual node group node when using custom plan. Value needs to be divisible by 1024. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
826
+ :param storage_size: The size of the storage device in gigabytes. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
827
+ :param storage_tier: The storage tier to use. Defaults to maxiops. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
828
+ '''
829
+ if __debug__:
830
+ type_hints = typing.get_type_hints(_typecheckingstub__73a7225f6a5b39ce9f22f470a4b39f4020d9c2babc3a4001d90f5a255e45917c)
831
+ check_type(argname="argument cores", value=cores, expected_type=type_hints["cores"])
832
+ check_type(argname="argument memory", value=memory, expected_type=type_hints["memory"])
833
+ check_type(argname="argument storage_size", value=storage_size, expected_type=type_hints["storage_size"])
834
+ check_type(argname="argument storage_tier", value=storage_tier, expected_type=type_hints["storage_tier"])
835
+ self._values: typing.Dict[builtins.str, typing.Any] = {
836
+ "cores": cores,
837
+ "memory": memory,
838
+ "storage_size": storage_size,
839
+ }
840
+ if storage_tier is not None:
841
+ self._values["storage_tier"] = storage_tier
842
+
843
+ @builtins.property
844
+ def cores(self) -> jsii.Number:
845
+ '''The number of CPU cores dedicated to individual node group nodes when using custom plan.
846
+
847
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
848
+ '''
849
+ result = self._values.get("cores")
850
+ assert result is not None, "Required property 'cores' is missing"
851
+ return typing.cast(jsii.Number, result)
852
+
853
+ @builtins.property
854
+ def memory(self) -> jsii.Number:
855
+ '''The amount of memory in megabytes to assign to individual node group node when using custom plan.
856
+
857
+ Value needs to be divisible by 1024.
858
+
859
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
860
+ '''
861
+ result = self._values.get("memory")
862
+ assert result is not None, "Required property 'memory' is missing"
863
+ return typing.cast(jsii.Number, result)
864
+
865
+ @builtins.property
866
+ def storage_size(self) -> jsii.Number:
867
+ '''The size of the storage device in gigabytes.
868
+
869
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
870
+ '''
871
+ result = self._values.get("storage_size")
872
+ assert result is not None, "Required property 'storage_size' is missing"
873
+ return typing.cast(jsii.Number, result)
874
+
875
+ @builtins.property
876
+ def storage_tier(self) -> typing.Optional[builtins.str]:
877
+ '''The storage tier to use. Defaults to maxiops.
878
+
879
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
880
+ '''
881
+ result = self._values.get("storage_tier")
882
+ return typing.cast(typing.Optional[builtins.str], result)
883
+
884
+ def __eq__(self, rhs: typing.Any) -> builtins.bool:
885
+ return isinstance(rhs, self.__class__) and rhs._values == self._values
886
+
887
+ def __ne__(self, rhs: typing.Any) -> builtins.bool:
888
+ return not (rhs == self)
889
+
890
+ def __repr__(self) -> str:
891
+ return "KubernetesNodeGroupCustomPlan(%s)" % ", ".join(
892
+ k + "=" + repr(v) for k, v in self._values.items()
893
+ )
894
+
895
+
896
+ class KubernetesNodeGroupCustomPlanOutputReference(
897
+ _cdktf_9a9027ec.ComplexObject,
898
+ metaclass=jsii.JSIIMeta,
899
+ jsii_type="@cdktf/provider-upcloud.kubernetesNodeGroup.KubernetesNodeGroupCustomPlanOutputReference",
900
+ ):
901
+ def __init__(
902
+ self,
903
+ terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
904
+ terraform_attribute: builtins.str,
905
+ ) -> None:
906
+ '''
907
+ :param terraform_resource: The parent resource.
908
+ :param terraform_attribute: The attribute on the parent resource this class is referencing.
909
+ '''
910
+ if __debug__:
911
+ type_hints = typing.get_type_hints(_typecheckingstub__8d2b117bf11d56c5c2ad00b1177ef138495c9f14ccd650ff5fcac5bedc510e7f)
912
+ check_type(argname="argument terraform_resource", value=terraform_resource, expected_type=type_hints["terraform_resource"])
913
+ check_type(argname="argument terraform_attribute", value=terraform_attribute, expected_type=type_hints["terraform_attribute"])
914
+ jsii.create(self.__class__, self, [terraform_resource, terraform_attribute])
915
+
916
+ @jsii.member(jsii_name="resetStorageTier")
917
+ def reset_storage_tier(self) -> None:
918
+ return typing.cast(None, jsii.invoke(self, "resetStorageTier", []))
919
+
920
+ @builtins.property
921
+ @jsii.member(jsii_name="coresInput")
922
+ def cores_input(self) -> typing.Optional[jsii.Number]:
923
+ return typing.cast(typing.Optional[jsii.Number], jsii.get(self, "coresInput"))
924
+
925
+ @builtins.property
926
+ @jsii.member(jsii_name="memoryInput")
927
+ def memory_input(self) -> typing.Optional[jsii.Number]:
928
+ return typing.cast(typing.Optional[jsii.Number], jsii.get(self, "memoryInput"))
929
+
930
+ @builtins.property
931
+ @jsii.member(jsii_name="storageSizeInput")
932
+ def storage_size_input(self) -> typing.Optional[jsii.Number]:
933
+ return typing.cast(typing.Optional[jsii.Number], jsii.get(self, "storageSizeInput"))
934
+
935
+ @builtins.property
936
+ @jsii.member(jsii_name="storageTierInput")
937
+ def storage_tier_input(self) -> typing.Optional[builtins.str]:
938
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "storageTierInput"))
939
+
940
+ @builtins.property
941
+ @jsii.member(jsii_name="cores")
942
+ def cores(self) -> jsii.Number:
943
+ return typing.cast(jsii.Number, jsii.get(self, "cores"))
944
+
945
+ @cores.setter
946
+ def cores(self, value: jsii.Number) -> None:
947
+ if __debug__:
948
+ type_hints = typing.get_type_hints(_typecheckingstub__15878cdb5de9a8700102ae207bdd26c19d28bebbb88e918a78101ee82831a764)
949
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
950
+ jsii.set(self, "cores", value)
951
+
952
+ @builtins.property
953
+ @jsii.member(jsii_name="memory")
954
+ def memory(self) -> jsii.Number:
955
+ return typing.cast(jsii.Number, jsii.get(self, "memory"))
956
+
957
+ @memory.setter
958
+ def memory(self, value: jsii.Number) -> None:
959
+ if __debug__:
960
+ type_hints = typing.get_type_hints(_typecheckingstub__c63d931f4ac068dc3819c8179015a8c83a41a8032a345678fcc3e6da49734aeb)
961
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
962
+ jsii.set(self, "memory", value)
963
+
964
+ @builtins.property
965
+ @jsii.member(jsii_name="storageSize")
966
+ def storage_size(self) -> jsii.Number:
967
+ return typing.cast(jsii.Number, jsii.get(self, "storageSize"))
968
+
969
+ @storage_size.setter
970
+ def storage_size(self, value: jsii.Number) -> None:
971
+ if __debug__:
972
+ type_hints = typing.get_type_hints(_typecheckingstub__5657fcbc706cb9657327d1390116d8b8349d44ebea2c09586646bfd32bee67b2)
973
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
974
+ jsii.set(self, "storageSize", value)
975
+
976
+ @builtins.property
977
+ @jsii.member(jsii_name="storageTier")
978
+ def storage_tier(self) -> builtins.str:
979
+ return typing.cast(builtins.str, jsii.get(self, "storageTier"))
980
+
981
+ @storage_tier.setter
982
+ def storage_tier(self, value: builtins.str) -> None:
983
+ if __debug__:
984
+ type_hints = typing.get_type_hints(_typecheckingstub__7b087d3351ca31ac1af59c32711d8f4d022346ac4bccf9ec972df910ff8c4e5a)
985
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
986
+ jsii.set(self, "storageTier", value)
987
+
988
+ @builtins.property
989
+ @jsii.member(jsii_name="internalValue")
990
+ def internal_value(self) -> typing.Optional[KubernetesNodeGroupCustomPlan]:
991
+ return typing.cast(typing.Optional[KubernetesNodeGroupCustomPlan], jsii.get(self, "internalValue"))
992
+
993
+ @internal_value.setter
994
+ def internal_value(
995
+ self,
996
+ value: typing.Optional[KubernetesNodeGroupCustomPlan],
997
+ ) -> None:
998
+ if __debug__:
999
+ type_hints = typing.get_type_hints(_typecheckingstub__c7a11f561e4b919a685206286a7eed09483e309fbeeea066dff67583e94f0c7a)
1000
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1001
+ jsii.set(self, "internalValue", value)
1002
+
1003
+
707
1004
  @jsii.data_type(
708
1005
  jsii_type="@cdktf/provider-upcloud.kubernetesNodeGroup.KubernetesNodeGroupKubeletArgs",
709
1006
  jsii_struct_bases=[],
@@ -712,8 +1009,8 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
712
1009
  class KubernetesNodeGroupKubeletArgs:
713
1010
  def __init__(self, *, key: builtins.str, value: builtins.str) -> None:
714
1011
  '''
715
- :param key: Kubelet argument key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
716
- :param value: Kubelet argument value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1012
+ :param key: Kubelet argument key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1013
+ :param value: Kubelet argument value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
717
1014
  '''
718
1015
  if __debug__:
719
1016
  type_hints = typing.get_type_hints(_typecheckingstub__842da686c29c5adfe37f8e21bb7186ee26ad8d4d70cd1e8579de468f13543803)
@@ -728,7 +1025,7 @@ class KubernetesNodeGroupKubeletArgs:
728
1025
  def key(self) -> builtins.str:
729
1026
  '''Kubelet argument key.
730
1027
 
731
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1028
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
732
1029
  '''
733
1030
  result = self._values.get("key")
734
1031
  assert result is not None, "Required property 'key' is missing"
@@ -738,7 +1035,7 @@ class KubernetesNodeGroupKubeletArgs:
738
1035
  def value(self) -> builtins.str:
739
1036
  '''Kubelet argument value.
740
1037
 
741
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1038
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
742
1039
  '''
743
1040
  result = self._values.get("value")
744
1041
  assert result is not None, "Required property 'value' is missing"
@@ -941,9 +1238,9 @@ class KubernetesNodeGroupTaint:
941
1238
  value: builtins.str,
942
1239
  ) -> None:
943
1240
  '''
944
- :param effect: Taint effect. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
945
- :param key: Taint key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
946
- :param value: Taint value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1241
+ :param effect: Taint effect. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
1242
+ :param key: Taint key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1243
+ :param value: Taint value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
947
1244
  '''
948
1245
  if __debug__:
949
1246
  type_hints = typing.get_type_hints(_typecheckingstub__ea59ebf2232eca6d3573e469ce94ebcc61818a93352ae4370837428874ad8b8e)
@@ -960,7 +1257,7 @@ class KubernetesNodeGroupTaint:
960
1257
  def effect(self) -> builtins.str:
961
1258
  '''Taint effect.
962
1259
 
963
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
1260
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
964
1261
  '''
965
1262
  result = self._values.get("effect")
966
1263
  assert result is not None, "Required property 'effect' is missing"
@@ -970,7 +1267,7 @@ class KubernetesNodeGroupTaint:
970
1267
  def key(self) -> builtins.str:
971
1268
  '''Taint key.
972
1269
 
973
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1270
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
974
1271
  '''
975
1272
  result = self._values.get("key")
976
1273
  assert result is not None, "Required property 'key' is missing"
@@ -980,7 +1277,7 @@ class KubernetesNodeGroupTaint:
980
1277
  def value(self) -> builtins.str:
981
1278
  '''Taint value.
982
1279
 
983
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.3.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1280
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
984
1281
  '''
985
1282
  result = self._values.get("value")
986
1283
  assert result is not None, "Required property 'value' is missing"
@@ -1186,6 +1483,8 @@ class KubernetesNodeGroupTaintOutputReference(
1186
1483
  __all__ = [
1187
1484
  "KubernetesNodeGroup",
1188
1485
  "KubernetesNodeGroupConfig",
1486
+ "KubernetesNodeGroupCustomPlan",
1487
+ "KubernetesNodeGroupCustomPlanOutputReference",
1189
1488
  "KubernetesNodeGroupKubeletArgs",
1190
1489
  "KubernetesNodeGroupKubeletArgsList",
1191
1490
  "KubernetesNodeGroupKubeletArgsOutputReference",
@@ -1205,10 +1504,12 @@ def _typecheckingstub__8bbcd241d9ab4cfd557f0a030c928c51f93c7d6d9f343e0bcdbdda3cb
1205
1504
  node_count: jsii.Number,
1206
1505
  plan: builtins.str,
1207
1506
  anti_affinity: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
1507
+ custom_plan: typing.Optional[typing.Union[KubernetesNodeGroupCustomPlan, typing.Dict[builtins.str, typing.Any]]] = None,
1208
1508
  id: typing.Optional[builtins.str] = None,
1209
1509
  kubelet_args: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[KubernetesNodeGroupKubeletArgs, typing.Dict[builtins.str, typing.Any]]]]] = None,
1210
1510
  labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
1211
1511
  ssh_keys: typing.Optional[typing.Sequence[builtins.str]] = None,
1512
+ storage_encryption: typing.Optional[builtins.str] = None,
1212
1513
  taint: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[KubernetesNodeGroupTaint, typing.Dict[builtins.str, typing.Any]]]]] = None,
1213
1514
  utility_network_access: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
1214
1515
  connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
@@ -1291,6 +1592,12 @@ def _typecheckingstub__3caf64b524bd36e4019e89ade967c6b4e62d55fddf7a8f9e9ed8118d3
1291
1592
  """Type checking stubs"""
1292
1593
  pass
1293
1594
 
1595
+ def _typecheckingstub__b4b669e48a3836306fe80e34225d241ad384a8351e76d8d7b17ffdd8544edf45(
1596
+ value: builtins.str,
1597
+ ) -> None:
1598
+ """Type checking stubs"""
1599
+ pass
1600
+
1294
1601
  def _typecheckingstub__1c2a3afca29e180734047644aa682bae1b7fbd5aacc3d234ed7616ba415f5fb6(
1295
1602
  value: typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable],
1296
1603
  ) -> None:
@@ -1311,16 +1618,65 @@ def _typecheckingstub__2489ae5bd3c17ee9de104387734150d3686d0bce3df0c0db5244751c5
1311
1618
  node_count: jsii.Number,
1312
1619
  plan: builtins.str,
1313
1620
  anti_affinity: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
1621
+ custom_plan: typing.Optional[typing.Union[KubernetesNodeGroupCustomPlan, typing.Dict[builtins.str, typing.Any]]] = None,
1314
1622
  id: typing.Optional[builtins.str] = None,
1315
1623
  kubelet_args: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[KubernetesNodeGroupKubeletArgs, typing.Dict[builtins.str, typing.Any]]]]] = None,
1316
1624
  labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
1317
1625
  ssh_keys: typing.Optional[typing.Sequence[builtins.str]] = None,
1626
+ storage_encryption: typing.Optional[builtins.str] = None,
1318
1627
  taint: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[KubernetesNodeGroupTaint, typing.Dict[builtins.str, typing.Any]]]]] = None,
1319
1628
  utility_network_access: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
1320
1629
  ) -> None:
1321
1630
  """Type checking stubs"""
1322
1631
  pass
1323
1632
 
1633
+ def _typecheckingstub__73a7225f6a5b39ce9f22f470a4b39f4020d9c2babc3a4001d90f5a255e45917c(
1634
+ *,
1635
+ cores: jsii.Number,
1636
+ memory: jsii.Number,
1637
+ storage_size: jsii.Number,
1638
+ storage_tier: typing.Optional[builtins.str] = None,
1639
+ ) -> None:
1640
+ """Type checking stubs"""
1641
+ pass
1642
+
1643
+ def _typecheckingstub__8d2b117bf11d56c5c2ad00b1177ef138495c9f14ccd650ff5fcac5bedc510e7f(
1644
+ terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
1645
+ terraform_attribute: builtins.str,
1646
+ ) -> None:
1647
+ """Type checking stubs"""
1648
+ pass
1649
+
1650
+ def _typecheckingstub__15878cdb5de9a8700102ae207bdd26c19d28bebbb88e918a78101ee82831a764(
1651
+ value: jsii.Number,
1652
+ ) -> None:
1653
+ """Type checking stubs"""
1654
+ pass
1655
+
1656
+ def _typecheckingstub__c63d931f4ac068dc3819c8179015a8c83a41a8032a345678fcc3e6da49734aeb(
1657
+ value: jsii.Number,
1658
+ ) -> None:
1659
+ """Type checking stubs"""
1660
+ pass
1661
+
1662
+ def _typecheckingstub__5657fcbc706cb9657327d1390116d8b8349d44ebea2c09586646bfd32bee67b2(
1663
+ value: jsii.Number,
1664
+ ) -> None:
1665
+ """Type checking stubs"""
1666
+ pass
1667
+
1668
+ def _typecheckingstub__7b087d3351ca31ac1af59c32711d8f4d022346ac4bccf9ec972df910ff8c4e5a(
1669
+ value: builtins.str,
1670
+ ) -> None:
1671
+ """Type checking stubs"""
1672
+ pass
1673
+
1674
+ def _typecheckingstub__c7a11f561e4b919a685206286a7eed09483e309fbeeea066dff67583e94f0c7a(
1675
+ value: typing.Optional[KubernetesNodeGroupCustomPlan],
1676
+ ) -> None:
1677
+ """Type checking stubs"""
1678
+ pass
1679
+
1324
1680
  def _typecheckingstub__842da686c29c5adfe37f8e21bb7186ee26ad8d4d70cd1e8579de468f13543803(
1325
1681
  *,
1326
1682
  key: builtins.str,