cdktf-cdktf-provider-upcloud 14.6.0__py3-none-any.whl → 14.7.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.

Files changed (62) hide show
  1. cdktf_cdktf_provider_upcloud/__init__.py +3 -3
  2. cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
  3. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.7.0.jsii.tgz +0 -0
  4. cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +7 -7
  5. cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +7 -7
  6. cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +8 -8
  7. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
  8. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
  9. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
  10. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
  11. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +10 -10
  12. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
  13. cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
  14. cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +25 -25
  15. cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
  16. cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
  17. cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +10 -10
  18. cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +41 -41
  19. cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +16 -16
  20. cdktf_cdktf_provider_upcloud/gateway/__init__.py +37 -37
  21. cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +34 -34
  22. cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +61 -61
  23. cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +42 -85
  24. cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +66 -66
  25. cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +42 -42
  26. cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +64 -64
  27. cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +16 -16
  28. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +28 -28
  29. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +16 -16
  30. cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +39 -39
  31. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +193 -193
  32. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +16 -16
  33. cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +19 -19
  34. cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +31 -31
  35. cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +28 -28
  36. cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
  37. cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +189 -189
  38. cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +330 -330
  39. cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +301 -1155
  40. cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +118 -118
  41. cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +50 -50
  42. cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +30 -30
  43. cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +19 -19
  44. cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +13 -13
  45. cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +16 -16
  46. cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +16 -16
  47. cdktf_cdktf_provider_upcloud/network/__init__.py +33 -33
  48. cdktf_cdktf_provider_upcloud/network_peering/__init__.py +23 -23
  49. cdktf_cdktf_provider_upcloud/object_storage/__init__.py +30 -30
  50. cdktf_cdktf_provider_upcloud/provider/__init__.py +25 -25
  51. cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
  52. cdktf_cdktf_provider_upcloud/server/__init__.py +153 -153
  53. cdktf_cdktf_provider_upcloud/server_group/__init__.py +22 -22
  54. cdktf_cdktf_provider_upcloud/storage/__init__.py +58 -58
  55. cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
  56. {cdktf_cdktf_provider_upcloud-14.6.0.dist-info → cdktf_cdktf_provider_upcloud-14.7.0.dist-info}/METADATA +5 -5
  57. cdktf_cdktf_provider_upcloud-14.7.0.dist-info/RECORD +61 -0
  58. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.6.0.jsii.tgz +0 -0
  59. cdktf_cdktf_provider_upcloud-14.6.0.dist-info/RECORD +0 -61
  60. {cdktf_cdktf_provider_upcloud-14.6.0.dist-info → cdktf_cdktf_provider_upcloud-14.7.0.dist-info}/LICENSE +0 -0
  61. {cdktf_cdktf_provider_upcloud-14.6.0.dist-info → cdktf_cdktf_provider_upcloud-14.7.0.dist-info}/WHEEL +0 -0
  62. {cdktf_cdktf_provider_upcloud-14.6.0.dist-info → cdktf_cdktf_provider_upcloud-14.7.0.dist-info}/top_level.txt +0 -0
@@ -1,7 +1,7 @@
1
1
  r'''
2
2
  # `upcloud_kubernetes_cluster`
3
3
 
4
- Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster).
4
+ Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -29,18 +29,17 @@ class KubernetesCluster(
29
29
  metaclass=jsii.JSIIMeta,
30
30
  jsii_type="@cdktf/provider-upcloud.kubernetesCluster.KubernetesCluster",
31
31
  ):
32
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
32
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
33
33
 
34
34
  def __init__(
35
35
  self,
36
36
  scope: _constructs_77d1e7e8.Construct,
37
- id_: builtins.str,
37
+ id: builtins.str,
38
38
  *,
39
39
  control_plane_ip_filter: typing.Sequence[builtins.str],
40
40
  name: builtins.str,
41
41
  network: builtins.str,
42
42
  zone: builtins.str,
43
- id: typing.Optional[builtins.str] = None,
44
43
  labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
45
44
  plan: typing.Optional[builtins.str] = None,
46
45
  private_node_groups: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
@@ -54,20 +53,19 @@ class KubernetesCluster(
54
53
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
55
54
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
56
55
  ) -> None:
57
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
56
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
58
57
 
59
58
  :param scope: The scope in which to define this construct.
60
- :param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
61
- :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
62
- :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
63
- :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
64
- :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
65
- :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#id KubernetesCluster#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
66
- :param labels: Key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
67
- :param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
68
- :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
69
- :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
70
- :param version: Kubernetes version ID, e.g. ``1.27``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
59
+ :param id: The scoped construct ID. Must be unique amongst siblings in the same scope
60
+ :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
61
+ :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
62
+ :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
63
+ :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
64
+ :param labels: Key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
65
+ :param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
66
+ :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
67
+ :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
68
+ :param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
71
69
  :param connection:
72
70
  :param count:
73
71
  :param depends_on:
@@ -79,13 +77,12 @@ class KubernetesCluster(
79
77
  if __debug__:
80
78
  type_hints = typing.get_type_hints(_typecheckingstub__8a9b711fc0d4f95af1581b8c47ef51571908b57197927d077ddbf475a99293e0)
81
79
  check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
82
- check_type(argname="argument id_", value=id_, expected_type=type_hints["id_"])
80
+ check_type(argname="argument id", value=id, expected_type=type_hints["id"])
83
81
  config = KubernetesClusterConfig(
84
82
  control_plane_ip_filter=control_plane_ip_filter,
85
83
  name=name,
86
84
  network=network,
87
85
  zone=zone,
88
- id=id,
89
86
  labels=labels,
90
87
  plan=plan,
91
88
  private_node_groups=private_node_groups,
@@ -100,7 +97,7 @@ class KubernetesCluster(
100
97
  provisioners=provisioners,
101
98
  )
102
99
 
103
- jsii.create(self.__class__, self, [scope, id_, config])
100
+ jsii.create(self.__class__, self, [scope, id, config])
104
101
 
105
102
  @jsii.member(jsii_name="generateConfigForImport")
106
103
  @builtins.classmethod
@@ -115,7 +112,7 @@ class KubernetesCluster(
115
112
 
116
113
  :param scope: The scope in which to define this construct.
117
114
  :param import_to_id: The construct id used in the generated config for the KubernetesCluster to import.
118
- :param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
115
+ :param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
119
116
  :param provider: ? Optional instance of the provider where the KubernetesCluster to import is found.
120
117
  '''
121
118
  if __debug__:
@@ -126,10 +123,6 @@ class KubernetesCluster(
126
123
  check_type(argname="argument provider", value=provider, expected_type=type_hints["provider"])
127
124
  return typing.cast(_cdktf_9a9027ec.ImportableResource, jsii.sinvoke(cls, "generateConfigForImport", [scope, import_to_id, import_from_id, provider]))
128
125
 
129
- @jsii.member(jsii_name="resetId")
130
- def reset_id(self) -> None:
131
- return typing.cast(None, jsii.invoke(self, "resetId", []))
132
-
133
126
  @jsii.member(jsii_name="resetLabels")
134
127
  def reset_labels(self) -> None:
135
128
  return typing.cast(None, jsii.invoke(self, "resetLabels", []))
@@ -163,6 +156,11 @@ class KubernetesCluster(
163
156
  def TF_RESOURCE_TYPE(cls) -> builtins.str:
164
157
  return typing.cast(builtins.str, jsii.sget(cls, "tfResourceType"))
165
158
 
159
+ @builtins.property
160
+ @jsii.member(jsii_name="id")
161
+ def id(self) -> builtins.str:
162
+ return typing.cast(builtins.str, jsii.get(self, "id"))
163
+
166
164
  @builtins.property
167
165
  @jsii.member(jsii_name="networkCidr")
168
166
  def network_cidr(self) -> builtins.str:
@@ -185,11 +183,6 @@ class KubernetesCluster(
185
183
  ) -> typing.Optional[typing.List[builtins.str]]:
186
184
  return typing.cast(typing.Optional[typing.List[builtins.str]], jsii.get(self, "controlPlaneIpFilterInput"))
187
185
 
188
- @builtins.property
189
- @jsii.member(jsii_name="idInput")
190
- def id_input(self) -> typing.Optional[builtins.str]:
191
- return typing.cast(typing.Optional[builtins.str], jsii.get(self, "idInput"))
192
-
193
186
  @builtins.property
194
187
  @jsii.member(jsii_name="labelsInput")
195
188
  def labels_input(
@@ -246,18 +239,6 @@ class KubernetesCluster(
246
239
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
247
240
  jsii.set(self, "controlPlaneIpFilter", value)
248
241
 
249
- @builtins.property
250
- @jsii.member(jsii_name="id")
251
- def id(self) -> builtins.str:
252
- return typing.cast(builtins.str, jsii.get(self, "id"))
253
-
254
- @id.setter
255
- def id(self, value: builtins.str) -> None:
256
- if __debug__:
257
- type_hints = typing.get_type_hints(_typecheckingstub__f78fce845db53a9c80ea63aab3e2cb839deb5afb0d1201080c6f0426df83e94c)
258
- check_type(argname="argument value", value=value, expected_type=type_hints["value"])
259
- jsii.set(self, "id", value)
260
-
261
242
  @builtins.property
262
243
  @jsii.member(jsii_name="labels")
263
244
  def labels(self) -> typing.Mapping[builtins.str, builtins.str]:
@@ -375,7 +356,6 @@ class KubernetesCluster(
375
356
  "name": "name",
376
357
  "network": "network",
377
358
  "zone": "zone",
378
- "id": "id",
379
359
  "labels": "labels",
380
360
  "plan": "plan",
381
361
  "private_node_groups": "privateNodeGroups",
@@ -398,7 +378,6 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
398
378
  name: builtins.str,
399
379
  network: builtins.str,
400
380
  zone: builtins.str,
401
- id: typing.Optional[builtins.str] = None,
402
381
  labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
403
382
  plan: typing.Optional[builtins.str] = None,
404
383
  private_node_groups: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
@@ -413,16 +392,15 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
413
392
  :param lifecycle:
414
393
  :param provider:
415
394
  :param provisioners:
416
- :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
417
- :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
418
- :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
419
- :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
420
- :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#id KubernetesCluster#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
421
- :param labels: Key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
422
- :param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
423
- :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
424
- :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
425
- :param version: Kubernetes version ID, e.g. ``1.27``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
395
+ :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
396
+ :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
397
+ :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
398
+ :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
399
+ :param labels: Key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
400
+ :param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
401
+ :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
402
+ :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
403
+ :param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
426
404
  '''
427
405
  if isinstance(lifecycle, dict):
428
406
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -439,7 +417,6 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
439
417
  check_type(argname="argument name", value=name, expected_type=type_hints["name"])
440
418
  check_type(argname="argument network", value=network, expected_type=type_hints["network"])
441
419
  check_type(argname="argument zone", value=zone, expected_type=type_hints["zone"])
442
- check_type(argname="argument id", value=id, expected_type=type_hints["id"])
443
420
  check_type(argname="argument labels", value=labels, expected_type=type_hints["labels"])
444
421
  check_type(argname="argument plan", value=plan, expected_type=type_hints["plan"])
445
422
  check_type(argname="argument private_node_groups", value=private_node_groups, expected_type=type_hints["private_node_groups"])
@@ -465,8 +442,6 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
465
442
  self._values["provider"] = provider
466
443
  if provisioners is not None:
467
444
  self._values["provisioners"] = provisioners
468
- if id is not None:
469
- self._values["id"] = id
470
445
  if labels is not None:
471
446
  self._values["labels"] = labels
472
447
  if plan is not None:
@@ -548,7 +523,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
548
523
 
549
524
  To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services.
550
525
 
551
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
526
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
552
527
  '''
553
528
  result = self._values.get("control_plane_ip_filter")
554
529
  assert result is not None, "Required property 'control_plane_ip_filter' is missing"
@@ -558,7 +533,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
558
533
  def name(self) -> builtins.str:
559
534
  '''Cluster name. Needs to be unique within the account.
560
535
 
561
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
536
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
562
537
  '''
563
538
  result = self._values.get("name")
564
539
  assert result is not None, "Required property 'name' is missing"
@@ -568,7 +543,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
568
543
  def network(self) -> builtins.str:
569
544
  '''Network ID for the cluster to run in.
570
545
 
571
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
546
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
572
547
  '''
573
548
  result = self._values.get("network")
574
549
  assert result is not None, "Required property 'network' is missing"
@@ -578,27 +553,17 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
578
553
  def zone(self) -> builtins.str:
579
554
  '''Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``.
580
555
 
581
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
556
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
582
557
  '''
583
558
  result = self._values.get("zone")
584
559
  assert result is not None, "Required property 'zone' is missing"
585
560
  return typing.cast(builtins.str, result)
586
561
 
587
- @builtins.property
588
- def id(self) -> typing.Optional[builtins.str]:
589
- '''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#id KubernetesCluster#id}.
590
-
591
- Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
592
- If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
593
- '''
594
- result = self._values.get("id")
595
- return typing.cast(typing.Optional[builtins.str], result)
596
-
597
562
  @builtins.property
598
563
  def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
599
564
  '''Key-value pairs to classify the cluster.
600
565
 
601
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
566
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
602
567
  '''
603
568
  result = self._values.get("labels")
604
569
  return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
@@ -609,7 +574,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
609
574
 
610
575
  Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``.
611
576
 
612
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
577
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
613
578
  '''
614
579
  result = self._values.get("plan")
615
580
  return typing.cast(typing.Optional[builtins.str], result)
@@ -620,7 +585,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
620
585
  ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
621
586
  '''Enable private node groups. Private node groups requires a network that is routed through NAT gateway.
622
587
 
623
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
588
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
624
589
  '''
625
590
  result = self._values.get("private_node_groups")
626
591
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
@@ -629,16 +594,16 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
629
594
  def storage_encryption(self) -> typing.Optional[builtins.str]:
630
595
  '''Set default storage encryption strategy for all nodes in the cluster.
631
596
 
632
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
597
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
633
598
  '''
634
599
  result = self._values.get("storage_encryption")
635
600
  return typing.cast(typing.Optional[builtins.str], result)
636
601
 
637
602
  @builtins.property
638
603
  def version(self) -> typing.Optional[builtins.str]:
639
- '''Kubernetes version ID, e.g. ``1.27``. You can list available version IDs with ``upctl kubernetes versions``.
604
+ '''Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``.
640
605
 
641
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
606
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.7.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
642
607
  '''
643
608
  result = self._values.get("version")
644
609
  return typing.cast(typing.Optional[builtins.str], result)
@@ -664,13 +629,12 @@ publication.publish()
664
629
 
665
630
  def _typecheckingstub__8a9b711fc0d4f95af1581b8c47ef51571908b57197927d077ddbf475a99293e0(
666
631
  scope: _constructs_77d1e7e8.Construct,
667
- id_: builtins.str,
632
+ id: builtins.str,
668
633
  *,
669
634
  control_plane_ip_filter: typing.Sequence[builtins.str],
670
635
  name: builtins.str,
671
636
  network: builtins.str,
672
637
  zone: builtins.str,
673
- id: typing.Optional[builtins.str] = None,
674
638
  labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
675
639
  plan: typing.Optional[builtins.str] = None,
676
640
  private_node_groups: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
@@ -702,12 +666,6 @@ def _typecheckingstub__93a87bbc915dd5fa01b944063ae4f03861f927743d8bd0e811ded1b50
702
666
  """Type checking stubs"""
703
667
  pass
704
668
 
705
- def _typecheckingstub__f78fce845db53a9c80ea63aab3e2cb839deb5afb0d1201080c6f0426df83e94c(
706
- value: builtins.str,
707
- ) -> None:
708
- """Type checking stubs"""
709
- pass
710
-
711
669
  def _typecheckingstub__7b9fb1189cc7bea21771f655e6f7d40e2b84a7ccedb6b706bd861ad34f2a71e8(
712
670
  value: typing.Mapping[builtins.str, builtins.str],
713
671
  ) -> None:
@@ -769,7 +727,6 @@ def _typecheckingstub__e268687db9e34ae4b03f85f7b2bdf19564690fdaacf69cdb2c9bd3f76
769
727
  name: builtins.str,
770
728
  network: builtins.str,
771
729
  zone: builtins.str,
772
- id: typing.Optional[builtins.str] = None,
773
730
  labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
774
731
  plan: typing.Optional[builtins.str] = None,
775
732
  private_node_groups: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,