cdktf-cdktf-provider-upcloud 14.9.0__py3-none-any.whl → 14.10.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +5 -3
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.10.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +8 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +44 -44
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +8 -8
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +62 -62
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +53 -53
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +54 -54
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +80 -80
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +41 -41
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +271 -176
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +73 -73
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +84 -84
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +27 -70
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +36 -36
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +27 -70
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +52 -52
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +351 -351
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +27 -70
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +34 -77
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +40 -40
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +36 -36
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +24 -24
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +315 -269
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +2670 -655
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +511 -417
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +219 -173
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +70 -70
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +49 -49
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +32 -73
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/network/__init__.py +50 -50
- cdktf_cdktf_provider_upcloud/network_peering/__init__.py +39 -39
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +43 -43
- cdktf_cdktf_provider_upcloud/provider/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/router/__init__.py +34 -34
- cdktf_cdktf_provider_upcloud/server/__init__.py +220 -220
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/storage/__init__.py +648 -187
- cdktf_cdktf_provider_upcloud/storage_template/__init__.py +463 -0
- cdktf_cdktf_provider_upcloud/tag/__init__.py +20 -20
- {cdktf_cdktf_provider_upcloud-14.9.0.dist-info → cdktf_cdktf_provider_upcloud-14.10.0.dist-info}/METADATA +9 -9
- cdktf_cdktf_provider_upcloud-14.10.0.dist-info/RECORD +62 -0
- {cdktf_cdktf_provider_upcloud-14.9.0.dist-info → cdktf_cdktf_provider_upcloud-14.10.0.dist-info}/WHEEL +1 -1
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.9.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-14.9.0.dist-info/RECORD +0 -61
- {cdktf_cdktf_provider_upcloud-14.9.0.dist-info → cdktf_cdktf_provider_upcloud-14.10.0.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-14.9.0.dist-info → cdktf_cdktf_provider_upcloud-14.10.0.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_kubernetes_node_group`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_node_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_node_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -29,20 +29,19 @@ class KubernetesNodeGroup(
|
|
|
29
29
|
metaclass=jsii.JSIIMeta,
|
|
30
30
|
jsii_type="@cdktf/provider-upcloud.kubernetesNodeGroup.KubernetesNodeGroup",
|
|
31
31
|
):
|
|
32
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
32
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group}.'''
|
|
33
33
|
|
|
34
34
|
def __init__(
|
|
35
35
|
self,
|
|
36
36
|
scope: _constructs_77d1e7e8.Construct,
|
|
37
|
-
|
|
37
|
+
id: builtins.str,
|
|
38
38
|
*,
|
|
39
39
|
cluster: builtins.str,
|
|
40
40
|
name: builtins.str,
|
|
41
41
|
node_count: jsii.Number,
|
|
42
42
|
plan: builtins.str,
|
|
43
43
|
anti_affinity: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
44
|
-
custom_plan: typing.Optional[typing.Union["KubernetesNodeGroupCustomPlan", typing.Dict[builtins.str, typing.Any]]] = None,
|
|
45
|
-
id: typing.Optional[builtins.str] = None,
|
|
44
|
+
custom_plan: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["KubernetesNodeGroupCustomPlan", typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
46
45
|
kubelet_args: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["KubernetesNodeGroupKubeletArgs", typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
47
46
|
labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
48
47
|
ssh_keys: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
@@ -57,23 +56,22 @@ class KubernetesNodeGroup(
|
|
|
57
56
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
58
57
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
59
58
|
) -> None:
|
|
60
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
59
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group} Resource.
|
|
61
60
|
|
|
62
61
|
:param scope: The scope in which to define this construct.
|
|
63
|
-
:param
|
|
64
|
-
:param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
65
|
-
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
66
|
-
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
67
|
-
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
68
|
-
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered
|
|
69
|
-
:param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
70
|
-
:param
|
|
71
|
-
:param
|
|
72
|
-
:param
|
|
73
|
-
:param
|
|
74
|
-
:param
|
|
75
|
-
:param
|
|
76
|
-
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
62
|
+
:param id: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
63
|
+
:param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
|
|
64
|
+
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
|
|
65
|
+
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
|
|
66
|
+
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
|
|
67
|
+
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
|
|
68
|
+
:param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
|
|
69
|
+
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
|
|
70
|
+
:param labels: User defined key-value pairs to classify the node_group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
|
|
71
|
+
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
|
|
72
|
+
:param storage_encryption: The storage encryption strategy to use for the nodes in this group. If not set, the cluster's storage encryption strategy will be used, if applicable. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
|
|
73
|
+
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
|
|
74
|
+
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
77
75
|
:param connection:
|
|
78
76
|
:param count:
|
|
79
77
|
:param depends_on:
|
|
@@ -85,7 +83,7 @@ class KubernetesNodeGroup(
|
|
|
85
83
|
if __debug__:
|
|
86
84
|
type_hints = typing.get_type_hints(_typecheckingstub__8bbcd241d9ab4cfd557f0a030c928c51f93c7d6d9f343e0bcdbdda3cbc8065e3)
|
|
87
85
|
check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
|
|
88
|
-
check_type(argname="argument
|
|
86
|
+
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
89
87
|
config = KubernetesNodeGroupConfig(
|
|
90
88
|
cluster=cluster,
|
|
91
89
|
name=name,
|
|
@@ -93,7 +91,6 @@ class KubernetesNodeGroup(
|
|
|
93
91
|
plan=plan,
|
|
94
92
|
anti_affinity=anti_affinity,
|
|
95
93
|
custom_plan=custom_plan,
|
|
96
|
-
id=id,
|
|
97
94
|
kubelet_args=kubelet_args,
|
|
98
95
|
labels=labels,
|
|
99
96
|
ssh_keys=ssh_keys,
|
|
@@ -109,7 +106,7 @@ class KubernetesNodeGroup(
|
|
|
109
106
|
provisioners=provisioners,
|
|
110
107
|
)
|
|
111
108
|
|
|
112
|
-
jsii.create(self.__class__, self, [scope,
|
|
109
|
+
jsii.create(self.__class__, self, [scope, id, config])
|
|
113
110
|
|
|
114
111
|
@jsii.member(jsii_name="generateConfigForImport")
|
|
115
112
|
@builtins.classmethod
|
|
@@ -124,7 +121,7 @@ class KubernetesNodeGroup(
|
|
|
124
121
|
|
|
125
122
|
:param scope: The scope in which to define this construct.
|
|
126
123
|
:param import_to_id: The construct id used in the generated config for the KubernetesNodeGroup to import.
|
|
127
|
-
:param import_from_id: The id of the existing KubernetesNodeGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
124
|
+
:param import_from_id: The id of the existing KubernetesNodeGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#import import section} in the documentation of this resource for the id to use
|
|
128
125
|
:param provider: ? Optional instance of the provider where the KubernetesNodeGroup to import is found.
|
|
129
126
|
'''
|
|
130
127
|
if __debug__:
|
|
@@ -138,25 +135,14 @@ class KubernetesNodeGroup(
|
|
|
138
135
|
@jsii.member(jsii_name="putCustomPlan")
|
|
139
136
|
def put_custom_plan(
|
|
140
137
|
self,
|
|
141
|
-
|
|
142
|
-
cores: jsii.Number,
|
|
143
|
-
memory: jsii.Number,
|
|
144
|
-
storage_size: jsii.Number,
|
|
145
|
-
storage_tier: typing.Optional[builtins.str] = None,
|
|
138
|
+
value: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["KubernetesNodeGroupCustomPlan", typing.Dict[builtins.str, typing.Any]]]],
|
|
146
139
|
) -> None:
|
|
147
140
|
'''
|
|
148
|
-
:param
|
|
149
|
-
:param memory: The amount of memory in megabytes to assign to individual node group node when using custom plan. Value needs to be divisible by 1024. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
|
|
150
|
-
:param storage_size: The size of the storage device in gigabytes. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
|
|
151
|
-
:param storage_tier: The storage tier to use. Defaults to maxiops. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
|
|
141
|
+
:param value: -
|
|
152
142
|
'''
|
|
153
|
-
|
|
154
|
-
|
|
155
|
-
|
|
156
|
-
storage_size=storage_size,
|
|
157
|
-
storage_tier=storage_tier,
|
|
158
|
-
)
|
|
159
|
-
|
|
143
|
+
if __debug__:
|
|
144
|
+
type_hints = typing.get_type_hints(_typecheckingstub__710eeb24e681bc1abd473c02c09c72cd25116f5c53784cd07b46e161d215c56f)
|
|
145
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
160
146
|
return typing.cast(None, jsii.invoke(self, "putCustomPlan", [value]))
|
|
161
147
|
|
|
162
148
|
@jsii.member(jsii_name="putKubeletArgs")
|
|
@@ -193,10 +179,6 @@ class KubernetesNodeGroup(
|
|
|
193
179
|
def reset_custom_plan(self) -> None:
|
|
194
180
|
return typing.cast(None, jsii.invoke(self, "resetCustomPlan", []))
|
|
195
181
|
|
|
196
|
-
@jsii.member(jsii_name="resetId")
|
|
197
|
-
def reset_id(self) -> None:
|
|
198
|
-
return typing.cast(None, jsii.invoke(self, "resetId", []))
|
|
199
|
-
|
|
200
182
|
@jsii.member(jsii_name="resetKubeletArgs")
|
|
201
183
|
def reset_kubelet_args(self) -> None:
|
|
202
184
|
return typing.cast(None, jsii.invoke(self, "resetKubeletArgs", []))
|
|
@@ -236,8 +218,13 @@ class KubernetesNodeGroup(
|
|
|
236
218
|
|
|
237
219
|
@builtins.property
|
|
238
220
|
@jsii.member(jsii_name="customPlan")
|
|
239
|
-
def custom_plan(self) -> "
|
|
240
|
-
return typing.cast("
|
|
221
|
+
def custom_plan(self) -> "KubernetesNodeGroupCustomPlanList":
|
|
222
|
+
return typing.cast("KubernetesNodeGroupCustomPlanList", jsii.get(self, "customPlan"))
|
|
223
|
+
|
|
224
|
+
@builtins.property
|
|
225
|
+
@jsii.member(jsii_name="id")
|
|
226
|
+
def id(self) -> builtins.str:
|
|
227
|
+
return typing.cast(builtins.str, jsii.get(self, "id"))
|
|
241
228
|
|
|
242
229
|
@builtins.property
|
|
243
230
|
@jsii.member(jsii_name="kubeletArgs")
|
|
@@ -263,13 +250,10 @@ class KubernetesNodeGroup(
|
|
|
263
250
|
|
|
264
251
|
@builtins.property
|
|
265
252
|
@jsii.member(jsii_name="customPlanInput")
|
|
266
|
-
def custom_plan_input(
|
|
267
|
-
|
|
268
|
-
|
|
269
|
-
|
|
270
|
-
@jsii.member(jsii_name="idInput")
|
|
271
|
-
def id_input(self) -> typing.Optional[builtins.str]:
|
|
272
|
-
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "idInput"))
|
|
253
|
+
def custom_plan_input(
|
|
254
|
+
self,
|
|
255
|
+
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupCustomPlan"]]]:
|
|
256
|
+
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupCustomPlan"]]], jsii.get(self, "customPlanInput"))
|
|
273
257
|
|
|
274
258
|
@builtins.property
|
|
275
259
|
@jsii.member(jsii_name="kubeletArgsInput")
|
|
@@ -337,7 +321,7 @@ class KubernetesNodeGroup(
|
|
|
337
321
|
if __debug__:
|
|
338
322
|
type_hints = typing.get_type_hints(_typecheckingstub__e621946f83e58f50c483b681d6a00e44ec81d2dccf1a4f8dafde9e0fb59d55b4)
|
|
339
323
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
340
|
-
jsii.set(self, "antiAffinity", value)
|
|
324
|
+
jsii.set(self, "antiAffinity", value) # pyright: ignore[reportArgumentType]
|
|
341
325
|
|
|
342
326
|
@builtins.property
|
|
343
327
|
@jsii.member(jsii_name="cluster")
|
|
@@ -349,19 +333,7 @@ class KubernetesNodeGroup(
|
|
|
349
333
|
if __debug__:
|
|
350
334
|
type_hints = typing.get_type_hints(_typecheckingstub__251ecefce0fab4086841f5905fdd68a5182667a221b0cf9910dbc14eee214671)
|
|
351
335
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
352
|
-
jsii.set(self, "cluster", value)
|
|
353
|
-
|
|
354
|
-
@builtins.property
|
|
355
|
-
@jsii.member(jsii_name="id")
|
|
356
|
-
def id(self) -> builtins.str:
|
|
357
|
-
return typing.cast(builtins.str, jsii.get(self, "id"))
|
|
358
|
-
|
|
359
|
-
@id.setter
|
|
360
|
-
def id(self, value: builtins.str) -> None:
|
|
361
|
-
if __debug__:
|
|
362
|
-
type_hints = typing.get_type_hints(_typecheckingstub__ee7527cb3aa5a925a82a9e87349717ac3d3a6787a09bf36f1f31df75fa2af7f6)
|
|
363
|
-
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
364
|
-
jsii.set(self, "id", value)
|
|
336
|
+
jsii.set(self, "cluster", value) # pyright: ignore[reportArgumentType]
|
|
365
337
|
|
|
366
338
|
@builtins.property
|
|
367
339
|
@jsii.member(jsii_name="labels")
|
|
@@ -373,7 +345,7 @@ class KubernetesNodeGroup(
|
|
|
373
345
|
if __debug__:
|
|
374
346
|
type_hints = typing.get_type_hints(_typecheckingstub__fccb7b922d5d84e539f4c8817753636ee4b2f0dec095ea9ff13030c9d7a17d58)
|
|
375
347
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
376
|
-
jsii.set(self, "labels", value)
|
|
348
|
+
jsii.set(self, "labels", value) # pyright: ignore[reportArgumentType]
|
|
377
349
|
|
|
378
350
|
@builtins.property
|
|
379
351
|
@jsii.member(jsii_name="name")
|
|
@@ -385,7 +357,7 @@ class KubernetesNodeGroup(
|
|
|
385
357
|
if __debug__:
|
|
386
358
|
type_hints = typing.get_type_hints(_typecheckingstub__02535264f80e698e5cf251336456b8c83e944521501b454ed690a5d74067c620)
|
|
387
359
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
388
|
-
jsii.set(self, "name", value)
|
|
360
|
+
jsii.set(self, "name", value) # pyright: ignore[reportArgumentType]
|
|
389
361
|
|
|
390
362
|
@builtins.property
|
|
391
363
|
@jsii.member(jsii_name="nodeCount")
|
|
@@ -397,7 +369,7 @@ class KubernetesNodeGroup(
|
|
|
397
369
|
if __debug__:
|
|
398
370
|
type_hints = typing.get_type_hints(_typecheckingstub__8670cbb382adf592bc5d0f3e42c4e96d4326983d0e4fe93743648b2ff3d09e74)
|
|
399
371
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
400
|
-
jsii.set(self, "nodeCount", value)
|
|
372
|
+
jsii.set(self, "nodeCount", value) # pyright: ignore[reportArgumentType]
|
|
401
373
|
|
|
402
374
|
@builtins.property
|
|
403
375
|
@jsii.member(jsii_name="plan")
|
|
@@ -409,7 +381,7 @@ class KubernetesNodeGroup(
|
|
|
409
381
|
if __debug__:
|
|
410
382
|
type_hints = typing.get_type_hints(_typecheckingstub__bd9b94a7a760e7688eaafae17051a6d3f96c6ab95a43f2ccc57fa9c2e964189b)
|
|
411
383
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
412
|
-
jsii.set(self, "plan", value)
|
|
384
|
+
jsii.set(self, "plan", value) # pyright: ignore[reportArgumentType]
|
|
413
385
|
|
|
414
386
|
@builtins.property
|
|
415
387
|
@jsii.member(jsii_name="sshKeys")
|
|
@@ -421,7 +393,7 @@ class KubernetesNodeGroup(
|
|
|
421
393
|
if __debug__:
|
|
422
394
|
type_hints = typing.get_type_hints(_typecheckingstub__3caf64b524bd36e4019e89ade967c6b4e62d55fddf7a8f9e9ed8118d38383759)
|
|
423
395
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
424
|
-
jsii.set(self, "sshKeys", value)
|
|
396
|
+
jsii.set(self, "sshKeys", value) # pyright: ignore[reportArgumentType]
|
|
425
397
|
|
|
426
398
|
@builtins.property
|
|
427
399
|
@jsii.member(jsii_name="storageEncryption")
|
|
@@ -433,7 +405,7 @@ class KubernetesNodeGroup(
|
|
|
433
405
|
if __debug__:
|
|
434
406
|
type_hints = typing.get_type_hints(_typecheckingstub__b4b669e48a3836306fe80e34225d241ad384a8351e76d8d7b17ffdd8544edf45)
|
|
435
407
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
436
|
-
jsii.set(self, "storageEncryption", value)
|
|
408
|
+
jsii.set(self, "storageEncryption", value) # pyright: ignore[reportArgumentType]
|
|
437
409
|
|
|
438
410
|
@builtins.property
|
|
439
411
|
@jsii.member(jsii_name="utilityNetworkAccess")
|
|
@@ -450,7 +422,7 @@ class KubernetesNodeGroup(
|
|
|
450
422
|
if __debug__:
|
|
451
423
|
type_hints = typing.get_type_hints(_typecheckingstub__1c2a3afca29e180734047644aa682bae1b7fbd5aacc3d234ed7616ba415f5fb6)
|
|
452
424
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
453
|
-
jsii.set(self, "utilityNetworkAccess", value)
|
|
425
|
+
jsii.set(self, "utilityNetworkAccess", value) # pyright: ignore[reportArgumentType]
|
|
454
426
|
|
|
455
427
|
|
|
456
428
|
@jsii.data_type(
|
|
@@ -470,7 +442,6 @@ class KubernetesNodeGroup(
|
|
|
470
442
|
"plan": "plan",
|
|
471
443
|
"anti_affinity": "antiAffinity",
|
|
472
444
|
"custom_plan": "customPlan",
|
|
473
|
-
"id": "id",
|
|
474
445
|
"kubelet_args": "kubeletArgs",
|
|
475
446
|
"labels": "labels",
|
|
476
447
|
"ssh_keys": "sshKeys",
|
|
@@ -495,8 +466,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
495
466
|
node_count: jsii.Number,
|
|
496
467
|
plan: builtins.str,
|
|
497
468
|
anti_affinity: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
498
|
-
custom_plan: typing.Optional[typing.Union["KubernetesNodeGroupCustomPlan", typing.Dict[builtins.str, typing.Any]]] = None,
|
|
499
|
-
id: typing.Optional[builtins.str] = None,
|
|
469
|
+
custom_plan: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["KubernetesNodeGroupCustomPlan", typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
500
470
|
kubelet_args: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["KubernetesNodeGroupKubeletArgs", typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
501
471
|
labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
502
472
|
ssh_keys: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
@@ -512,24 +482,21 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
512
482
|
:param lifecycle:
|
|
513
483
|
:param provider:
|
|
514
484
|
:param provisioners:
|
|
515
|
-
:param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
516
|
-
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
517
|
-
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
518
|
-
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
519
|
-
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered
|
|
520
|
-
:param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
521
|
-
:param
|
|
522
|
-
:param
|
|
523
|
-
:param
|
|
524
|
-
:param
|
|
525
|
-
:param
|
|
526
|
-
:param
|
|
527
|
-
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
485
|
+
:param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
|
|
486
|
+
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
|
|
487
|
+
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
|
|
488
|
+
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
|
|
489
|
+
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
|
|
490
|
+
:param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
|
|
491
|
+
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
|
|
492
|
+
:param labels: User defined key-value pairs to classify the node_group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
|
|
493
|
+
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
|
|
494
|
+
:param storage_encryption: The storage encryption strategy to use for the nodes in this group. If not set, the cluster's storage encryption strategy will be used, if applicable. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
|
|
495
|
+
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
|
|
496
|
+
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
528
497
|
'''
|
|
529
498
|
if isinstance(lifecycle, dict):
|
|
530
499
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
531
|
-
if isinstance(custom_plan, dict):
|
|
532
|
-
custom_plan = KubernetesNodeGroupCustomPlan(**custom_plan)
|
|
533
500
|
if __debug__:
|
|
534
501
|
type_hints = typing.get_type_hints(_typecheckingstub__2489ae5bd3c17ee9de104387734150d3686d0bce3df0c0db5244751c51da43c4)
|
|
535
502
|
check_type(argname="argument connection", value=connection, expected_type=type_hints["connection"])
|
|
@@ -545,7 +512,6 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
545
512
|
check_type(argname="argument plan", value=plan, expected_type=type_hints["plan"])
|
|
546
513
|
check_type(argname="argument anti_affinity", value=anti_affinity, expected_type=type_hints["anti_affinity"])
|
|
547
514
|
check_type(argname="argument custom_plan", value=custom_plan, expected_type=type_hints["custom_plan"])
|
|
548
|
-
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
549
515
|
check_type(argname="argument kubelet_args", value=kubelet_args, expected_type=type_hints["kubelet_args"])
|
|
550
516
|
check_type(argname="argument labels", value=labels, expected_type=type_hints["labels"])
|
|
551
517
|
check_type(argname="argument ssh_keys", value=ssh_keys, expected_type=type_hints["ssh_keys"])
|
|
@@ -576,8 +542,6 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
576
542
|
self._values["anti_affinity"] = anti_affinity
|
|
577
543
|
if custom_plan is not None:
|
|
578
544
|
self._values["custom_plan"] = custom_plan
|
|
579
|
-
if id is not None:
|
|
580
|
-
self._values["id"] = id
|
|
581
545
|
if kubelet_args is not None:
|
|
582
546
|
self._values["kubelet_args"] = kubelet_args
|
|
583
547
|
if labels is not None:
|
|
@@ -659,7 +623,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
659
623
|
def cluster(self) -> builtins.str:
|
|
660
624
|
'''UUID of the cluster.
|
|
661
625
|
|
|
662
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
626
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
|
|
663
627
|
'''
|
|
664
628
|
result = self._values.get("cluster")
|
|
665
629
|
assert result is not None, "Required property 'cluster' is missing"
|
|
@@ -669,7 +633,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
669
633
|
def name(self) -> builtins.str:
|
|
670
634
|
'''The name of the node group. Needs to be unique within a cluster.
|
|
671
635
|
|
|
672
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
636
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
|
|
673
637
|
'''
|
|
674
638
|
result = self._values.get("name")
|
|
675
639
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -679,7 +643,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
679
643
|
def node_count(self) -> jsii.Number:
|
|
680
644
|
'''Amount of nodes to provision in the node group.
|
|
681
645
|
|
|
682
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
646
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
|
|
683
647
|
'''
|
|
684
648
|
result = self._values.get("node_count")
|
|
685
649
|
assert result is not None, "Required property 'node_count' is missing"
|
|
@@ -689,7 +653,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
689
653
|
def plan(self) -> builtins.str:
|
|
690
654
|
'''The server plan used for the node group. You can list available plans with ``upctl server plans``.
|
|
691
655
|
|
|
692
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
656
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
|
|
693
657
|
'''
|
|
694
658
|
result = self._values.get("plan")
|
|
695
659
|
assert result is not None, "Required property 'plan' is missing"
|
|
@@ -701,31 +665,23 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
701
665
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
702
666
|
'''If set to true, nodes in this group will be placed on separate compute hosts.
|
|
703
667
|
|
|
704
|
-
Please note that anti-affinity policy is considered
|
|
668
|
+
Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware.
|
|
705
669
|
|
|
706
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
670
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
|
|
707
671
|
'''
|
|
708
672
|
result = self._values.get("anti_affinity")
|
|
709
673
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
710
674
|
|
|
711
675
|
@builtins.property
|
|
712
|
-
def custom_plan(
|
|
676
|
+
def custom_plan(
|
|
677
|
+
self,
|
|
678
|
+
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupCustomPlan"]]]:
|
|
713
679
|
'''custom_plan block.
|
|
714
680
|
|
|
715
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
681
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
|
|
716
682
|
'''
|
|
717
683
|
result = self._values.get("custom_plan")
|
|
718
|
-
return typing.cast(typing.Optional["KubernetesNodeGroupCustomPlan"], result)
|
|
719
|
-
|
|
720
|
-
@builtins.property
|
|
721
|
-
def id(self) -> typing.Optional[builtins.str]:
|
|
722
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/kubernetes_node_group#id KubernetesNodeGroup#id}.
|
|
723
|
-
|
|
724
|
-
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
725
|
-
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
726
|
-
'''
|
|
727
|
-
result = self._values.get("id")
|
|
728
|
-
return typing.cast(typing.Optional[builtins.str], result)
|
|
684
|
+
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupCustomPlan"]]], result)
|
|
729
685
|
|
|
730
686
|
@builtins.property
|
|
731
687
|
def kubelet_args(
|
|
@@ -733,16 +689,16 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
733
689
|
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupKubeletArgs"]]]:
|
|
734
690
|
'''kubelet_args block.
|
|
735
691
|
|
|
736
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
692
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
|
|
737
693
|
'''
|
|
738
694
|
result = self._values.get("kubelet_args")
|
|
739
695
|
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupKubeletArgs"]]], result)
|
|
740
696
|
|
|
741
697
|
@builtins.property
|
|
742
698
|
def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
|
|
743
|
-
'''
|
|
699
|
+
'''User defined key-value pairs to classify the node_group.
|
|
744
700
|
|
|
745
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
701
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
|
|
746
702
|
'''
|
|
747
703
|
result = self._values.get("labels")
|
|
748
704
|
return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
|
|
@@ -753,16 +709,18 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
753
709
|
|
|
754
710
|
This allows you to connect to the nodes via SSH once they are running.
|
|
755
711
|
|
|
756
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
712
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
|
|
757
713
|
'''
|
|
758
714
|
result = self._values.get("ssh_keys")
|
|
759
715
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
760
716
|
|
|
761
717
|
@builtins.property
|
|
762
718
|
def storage_encryption(self) -> typing.Optional[builtins.str]:
|
|
763
|
-
'''
|
|
719
|
+
'''The storage encryption strategy to use for the nodes in this group.
|
|
764
720
|
|
|
765
|
-
|
|
721
|
+
If not set, the cluster's storage encryption strategy will be used, if applicable.
|
|
722
|
+
|
|
723
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
|
|
766
724
|
'''
|
|
767
725
|
result = self._values.get("storage_encryption")
|
|
768
726
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -773,7 +731,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
773
731
|
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupTaint"]]]:
|
|
774
732
|
'''taint block.
|
|
775
733
|
|
|
776
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
734
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
|
|
777
735
|
'''
|
|
778
736
|
result = self._values.get("taint")
|
|
779
737
|
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupTaint"]]], result)
|
|
@@ -784,7 +742,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
784
742
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
785
743
|
'''If set to false, nodes in this group will not have access to utility network.
|
|
786
744
|
|
|
787
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
745
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
788
746
|
'''
|
|
789
747
|
result = self._values.get("utility_network_access")
|
|
790
748
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -821,10 +779,10 @@ class KubernetesNodeGroupCustomPlan:
|
|
|
821
779
|
storage_tier: typing.Optional[builtins.str] = None,
|
|
822
780
|
) -> None:
|
|
823
781
|
'''
|
|
824
|
-
:param cores: The number of CPU cores dedicated to individual node group nodes when using custom plan. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
825
|
-
:param memory: The amount of memory in megabytes to assign to individual node group node when using custom plan. Value needs to be divisible by 1024. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
826
|
-
:param storage_size: The size of the storage device in gigabytes. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
827
|
-
:param storage_tier: The storage tier to use. Defaults to maxiops. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
782
|
+
:param cores: The number of CPU cores dedicated to individual node group nodes when using custom plan. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
|
|
783
|
+
:param memory: The amount of memory in megabytes to assign to individual node group node when using custom plan. Value needs to be divisible by 1024. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
|
|
784
|
+
:param storage_size: The size of the storage device in gigabytes. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
|
|
785
|
+
:param storage_tier: The storage tier to use. Defaults to maxiops. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
|
|
828
786
|
'''
|
|
829
787
|
if __debug__:
|
|
830
788
|
type_hints = typing.get_type_hints(_typecheckingstub__73a7225f6a5b39ce9f22f470a4b39f4020d9c2babc3a4001d90f5a255e45917c)
|
|
@@ -844,7 +802,7 @@ class KubernetesNodeGroupCustomPlan:
|
|
|
844
802
|
def cores(self) -> jsii.Number:
|
|
845
803
|
'''The number of CPU cores dedicated to individual node group nodes when using custom plan.
|
|
846
804
|
|
|
847
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
805
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
|
|
848
806
|
'''
|
|
849
807
|
result = self._values.get("cores")
|
|
850
808
|
assert result is not None, "Required property 'cores' is missing"
|
|
@@ -856,7 +814,7 @@ class KubernetesNodeGroupCustomPlan:
|
|
|
856
814
|
|
|
857
815
|
Value needs to be divisible by 1024.
|
|
858
816
|
|
|
859
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
817
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
|
|
860
818
|
'''
|
|
861
819
|
result = self._values.get("memory")
|
|
862
820
|
assert result is not None, "Required property 'memory' is missing"
|
|
@@ -866,7 +824,7 @@ class KubernetesNodeGroupCustomPlan:
|
|
|
866
824
|
def storage_size(self) -> jsii.Number:
|
|
867
825
|
'''The size of the storage device in gigabytes.
|
|
868
826
|
|
|
869
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
827
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
|
|
870
828
|
'''
|
|
871
829
|
result = self._values.get("storage_size")
|
|
872
830
|
assert result is not None, "Required property 'storage_size' is missing"
|
|
@@ -876,7 +834,7 @@ class KubernetesNodeGroupCustomPlan:
|
|
|
876
834
|
def storage_tier(self) -> typing.Optional[builtins.str]:
|
|
877
835
|
'''The storage tier to use. Defaults to maxiops.
|
|
878
836
|
|
|
879
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
837
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
|
|
880
838
|
'''
|
|
881
839
|
result = self._values.get("storage_tier")
|
|
882
840
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -893,6 +851,96 @@ class KubernetesNodeGroupCustomPlan:
|
|
|
893
851
|
)
|
|
894
852
|
|
|
895
853
|
|
|
854
|
+
class KubernetesNodeGroupCustomPlanList(
|
|
855
|
+
_cdktf_9a9027ec.ComplexList,
|
|
856
|
+
metaclass=jsii.JSIIMeta,
|
|
857
|
+
jsii_type="@cdktf/provider-upcloud.kubernetesNodeGroup.KubernetesNodeGroupCustomPlanList",
|
|
858
|
+
):
|
|
859
|
+
def __init__(
|
|
860
|
+
self,
|
|
861
|
+
terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
|
|
862
|
+
terraform_attribute: builtins.str,
|
|
863
|
+
wraps_set: builtins.bool,
|
|
864
|
+
) -> None:
|
|
865
|
+
'''
|
|
866
|
+
:param terraform_resource: The parent resource.
|
|
867
|
+
:param terraform_attribute: The attribute on the parent resource this class is referencing.
|
|
868
|
+
:param wraps_set: whether the list is wrapping a set (will add tolist() to be able to access an item via an index).
|
|
869
|
+
'''
|
|
870
|
+
if __debug__:
|
|
871
|
+
type_hints = typing.get_type_hints(_typecheckingstub__b550730c152cdd521877d4cd4a76b2d1f548d64a196dbde61f47c82b091e854a)
|
|
872
|
+
check_type(argname="argument terraform_resource", value=terraform_resource, expected_type=type_hints["terraform_resource"])
|
|
873
|
+
check_type(argname="argument terraform_attribute", value=terraform_attribute, expected_type=type_hints["terraform_attribute"])
|
|
874
|
+
check_type(argname="argument wraps_set", value=wraps_set, expected_type=type_hints["wraps_set"])
|
|
875
|
+
jsii.create(self.__class__, self, [terraform_resource, terraform_attribute, wraps_set])
|
|
876
|
+
|
|
877
|
+
@jsii.member(jsii_name="get")
|
|
878
|
+
def get(self, index: jsii.Number) -> "KubernetesNodeGroupCustomPlanOutputReference":
|
|
879
|
+
'''
|
|
880
|
+
:param index: the index of the item to return.
|
|
881
|
+
'''
|
|
882
|
+
if __debug__:
|
|
883
|
+
type_hints = typing.get_type_hints(_typecheckingstub__ad2db79018ca305418ade3285985b0c22792d72ade4279a8d56d4cc611707192)
|
|
884
|
+
check_type(argname="argument index", value=index, expected_type=type_hints["index"])
|
|
885
|
+
return typing.cast("KubernetesNodeGroupCustomPlanOutputReference", jsii.invoke(self, "get", [index]))
|
|
886
|
+
|
|
887
|
+
@builtins.property
|
|
888
|
+
@jsii.member(jsii_name="terraformAttribute")
|
|
889
|
+
def _terraform_attribute(self) -> builtins.str:
|
|
890
|
+
'''The attribute on the parent resource this class is referencing.'''
|
|
891
|
+
return typing.cast(builtins.str, jsii.get(self, "terraformAttribute"))
|
|
892
|
+
|
|
893
|
+
@_terraform_attribute.setter
|
|
894
|
+
def _terraform_attribute(self, value: builtins.str) -> None:
|
|
895
|
+
if __debug__:
|
|
896
|
+
type_hints = typing.get_type_hints(_typecheckingstub__146491c26357a66d3726100bdae7a85cd1ce3f9d133170c7b888e4371863e15b)
|
|
897
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
898
|
+
jsii.set(self, "terraformAttribute", value) # pyright: ignore[reportArgumentType]
|
|
899
|
+
|
|
900
|
+
@builtins.property
|
|
901
|
+
@jsii.member(jsii_name="terraformResource")
|
|
902
|
+
def _terraform_resource(self) -> _cdktf_9a9027ec.IInterpolatingParent:
|
|
903
|
+
'''The parent resource.'''
|
|
904
|
+
return typing.cast(_cdktf_9a9027ec.IInterpolatingParent, jsii.get(self, "terraformResource"))
|
|
905
|
+
|
|
906
|
+
@_terraform_resource.setter
|
|
907
|
+
def _terraform_resource(self, value: _cdktf_9a9027ec.IInterpolatingParent) -> None:
|
|
908
|
+
if __debug__:
|
|
909
|
+
type_hints = typing.get_type_hints(_typecheckingstub__981f0a78ff74ee055d79706678f7855b237a9c0e1fa4f77d6f528bc29b193924)
|
|
910
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
911
|
+
jsii.set(self, "terraformResource", value) # pyright: ignore[reportArgumentType]
|
|
912
|
+
|
|
913
|
+
@builtins.property
|
|
914
|
+
@jsii.member(jsii_name="wrapsSet")
|
|
915
|
+
def _wraps_set(self) -> builtins.bool:
|
|
916
|
+
'''whether the list is wrapping a set (will add tolist() to be able to access an item via an index).'''
|
|
917
|
+
return typing.cast(builtins.bool, jsii.get(self, "wrapsSet"))
|
|
918
|
+
|
|
919
|
+
@_wraps_set.setter
|
|
920
|
+
def _wraps_set(self, value: builtins.bool) -> None:
|
|
921
|
+
if __debug__:
|
|
922
|
+
type_hints = typing.get_type_hints(_typecheckingstub__de8e36f34a796164d1d848fa9ee03d21d32d20da9d69b2969c70bd64366fc15e)
|
|
923
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
924
|
+
jsii.set(self, "wrapsSet", value) # pyright: ignore[reportArgumentType]
|
|
925
|
+
|
|
926
|
+
@builtins.property
|
|
927
|
+
@jsii.member(jsii_name="internalValue")
|
|
928
|
+
def internal_value(
|
|
929
|
+
self,
|
|
930
|
+
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List[KubernetesNodeGroupCustomPlan]]]:
|
|
931
|
+
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List[KubernetesNodeGroupCustomPlan]]], jsii.get(self, "internalValue"))
|
|
932
|
+
|
|
933
|
+
@internal_value.setter
|
|
934
|
+
def internal_value(
|
|
935
|
+
self,
|
|
936
|
+
value: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List[KubernetesNodeGroupCustomPlan]]],
|
|
937
|
+
) -> None:
|
|
938
|
+
if __debug__:
|
|
939
|
+
type_hints = typing.get_type_hints(_typecheckingstub__15bf7d5bcd50f8e0b7df457f502a8bb9362ca3bf6ab8c3190246a91e31ac4fb9)
|
|
940
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
941
|
+
jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
|
|
942
|
+
|
|
943
|
+
|
|
896
944
|
class KubernetesNodeGroupCustomPlanOutputReference(
|
|
897
945
|
_cdktf_9a9027ec.ComplexObject,
|
|
898
946
|
metaclass=jsii.JSIIMeta,
|
|
@@ -902,16 +950,22 @@ class KubernetesNodeGroupCustomPlanOutputReference(
|
|
|
902
950
|
self,
|
|
903
951
|
terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
|
|
904
952
|
terraform_attribute: builtins.str,
|
|
953
|
+
complex_object_index: jsii.Number,
|
|
954
|
+
complex_object_is_from_set: builtins.bool,
|
|
905
955
|
) -> None:
|
|
906
956
|
'''
|
|
907
957
|
:param terraform_resource: The parent resource.
|
|
908
958
|
:param terraform_attribute: The attribute on the parent resource this class is referencing.
|
|
959
|
+
:param complex_object_index: the index of this item in the list.
|
|
960
|
+
:param complex_object_is_from_set: whether the list is wrapping a set (will add tolist() to be able to access an item via an index).
|
|
909
961
|
'''
|
|
910
962
|
if __debug__:
|
|
911
963
|
type_hints = typing.get_type_hints(_typecheckingstub__8d2b117bf11d56c5c2ad00b1177ef138495c9f14ccd650ff5fcac5bedc510e7f)
|
|
912
964
|
check_type(argname="argument terraform_resource", value=terraform_resource, expected_type=type_hints["terraform_resource"])
|
|
913
965
|
check_type(argname="argument terraform_attribute", value=terraform_attribute, expected_type=type_hints["terraform_attribute"])
|
|
914
|
-
|
|
966
|
+
check_type(argname="argument complex_object_index", value=complex_object_index, expected_type=type_hints["complex_object_index"])
|
|
967
|
+
check_type(argname="argument complex_object_is_from_set", value=complex_object_is_from_set, expected_type=type_hints["complex_object_is_from_set"])
|
|
968
|
+
jsii.create(self.__class__, self, [terraform_resource, terraform_attribute, complex_object_index, complex_object_is_from_set])
|
|
915
969
|
|
|
916
970
|
@jsii.member(jsii_name="resetStorageTier")
|
|
917
971
|
def reset_storage_tier(self) -> None:
|
|
@@ -947,7 +1001,7 @@ class KubernetesNodeGroupCustomPlanOutputReference(
|
|
|
947
1001
|
if __debug__:
|
|
948
1002
|
type_hints = typing.get_type_hints(_typecheckingstub__15878cdb5de9a8700102ae207bdd26c19d28bebbb88e918a78101ee82831a764)
|
|
949
1003
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
950
|
-
jsii.set(self, "cores", value)
|
|
1004
|
+
jsii.set(self, "cores", value) # pyright: ignore[reportArgumentType]
|
|
951
1005
|
|
|
952
1006
|
@builtins.property
|
|
953
1007
|
@jsii.member(jsii_name="memory")
|
|
@@ -959,7 +1013,7 @@ class KubernetesNodeGroupCustomPlanOutputReference(
|
|
|
959
1013
|
if __debug__:
|
|
960
1014
|
type_hints = typing.get_type_hints(_typecheckingstub__c63d931f4ac068dc3819c8179015a8c83a41a8032a345678fcc3e6da49734aeb)
|
|
961
1015
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
962
|
-
jsii.set(self, "memory", value)
|
|
1016
|
+
jsii.set(self, "memory", value) # pyright: ignore[reportArgumentType]
|
|
963
1017
|
|
|
964
1018
|
@builtins.property
|
|
965
1019
|
@jsii.member(jsii_name="storageSize")
|
|
@@ -971,7 +1025,7 @@ class KubernetesNodeGroupCustomPlanOutputReference(
|
|
|
971
1025
|
if __debug__:
|
|
972
1026
|
type_hints = typing.get_type_hints(_typecheckingstub__5657fcbc706cb9657327d1390116d8b8349d44ebea2c09586646bfd32bee67b2)
|
|
973
1027
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
974
|
-
jsii.set(self, "storageSize", value)
|
|
1028
|
+
jsii.set(self, "storageSize", value) # pyright: ignore[reportArgumentType]
|
|
975
1029
|
|
|
976
1030
|
@builtins.property
|
|
977
1031
|
@jsii.member(jsii_name="storageTier")
|
|
@@ -983,22 +1037,24 @@ class KubernetesNodeGroupCustomPlanOutputReference(
|
|
|
983
1037
|
if __debug__:
|
|
984
1038
|
type_hints = typing.get_type_hints(_typecheckingstub__7b087d3351ca31ac1af59c32711d8f4d022346ac4bccf9ec972df910ff8c4e5a)
|
|
985
1039
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
986
|
-
jsii.set(self, "storageTier", value)
|
|
1040
|
+
jsii.set(self, "storageTier", value) # pyright: ignore[reportArgumentType]
|
|
987
1041
|
|
|
988
1042
|
@builtins.property
|
|
989
1043
|
@jsii.member(jsii_name="internalValue")
|
|
990
|
-
def internal_value(
|
|
991
|
-
|
|
1044
|
+
def internal_value(
|
|
1045
|
+
self,
|
|
1046
|
+
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, KubernetesNodeGroupCustomPlan]]:
|
|
1047
|
+
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, KubernetesNodeGroupCustomPlan]], jsii.get(self, "internalValue"))
|
|
992
1048
|
|
|
993
1049
|
@internal_value.setter
|
|
994
1050
|
def internal_value(
|
|
995
1051
|
self,
|
|
996
|
-
value: typing.Optional[KubernetesNodeGroupCustomPlan],
|
|
1052
|
+
value: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, KubernetesNodeGroupCustomPlan]],
|
|
997
1053
|
) -> None:
|
|
998
1054
|
if __debug__:
|
|
999
1055
|
type_hints = typing.get_type_hints(_typecheckingstub__c7a11f561e4b919a685206286a7eed09483e309fbeeea066dff67583e94f0c7a)
|
|
1000
1056
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1001
|
-
jsii.set(self, "internalValue", value)
|
|
1057
|
+
jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
|
|
1002
1058
|
|
|
1003
1059
|
|
|
1004
1060
|
@jsii.data_type(
|
|
@@ -1009,8 +1065,8 @@ class KubernetesNodeGroupCustomPlanOutputReference(
|
|
|
1009
1065
|
class KubernetesNodeGroupKubeletArgs:
|
|
1010
1066
|
def __init__(self, *, key: builtins.str, value: builtins.str) -> None:
|
|
1011
1067
|
'''
|
|
1012
|
-
:param key: Kubelet argument key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1013
|
-
:param value: Kubelet argument value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1068
|
+
:param key: Kubelet argument key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
1069
|
+
:param value: Kubelet argument value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
1014
1070
|
'''
|
|
1015
1071
|
if __debug__:
|
|
1016
1072
|
type_hints = typing.get_type_hints(_typecheckingstub__842da686c29c5adfe37f8e21bb7186ee26ad8d4d70cd1e8579de468f13543803)
|
|
@@ -1025,7 +1081,7 @@ class KubernetesNodeGroupKubeletArgs:
|
|
|
1025
1081
|
def key(self) -> builtins.str:
|
|
1026
1082
|
'''Kubelet argument key.
|
|
1027
1083
|
|
|
1028
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1084
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
1029
1085
|
'''
|
|
1030
1086
|
result = self._values.get("key")
|
|
1031
1087
|
assert result is not None, "Required property 'key' is missing"
|
|
@@ -1035,7 +1091,7 @@ class KubernetesNodeGroupKubeletArgs:
|
|
|
1035
1091
|
def value(self) -> builtins.str:
|
|
1036
1092
|
'''Kubelet argument value.
|
|
1037
1093
|
|
|
1038
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1094
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
1039
1095
|
'''
|
|
1040
1096
|
result = self._values.get("value")
|
|
1041
1097
|
assert result is not None, "Required property 'value' is missing"
|
|
@@ -1100,7 +1156,7 @@ class KubernetesNodeGroupKubeletArgsList(
|
|
|
1100
1156
|
if __debug__:
|
|
1101
1157
|
type_hints = typing.get_type_hints(_typecheckingstub__d60a7931de3e6139c97132bbd4c81870d3180a358bed18644632ac607d888e3f)
|
|
1102
1158
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1103
|
-
jsii.set(self, "terraformAttribute", value)
|
|
1159
|
+
jsii.set(self, "terraformAttribute", value) # pyright: ignore[reportArgumentType]
|
|
1104
1160
|
|
|
1105
1161
|
@builtins.property
|
|
1106
1162
|
@jsii.member(jsii_name="terraformResource")
|
|
@@ -1113,7 +1169,7 @@ class KubernetesNodeGroupKubeletArgsList(
|
|
|
1113
1169
|
if __debug__:
|
|
1114
1170
|
type_hints = typing.get_type_hints(_typecheckingstub__b5025cd233c716e72c1b250acb3ef1951eb10755b75d25b900bb1ea9665b5824)
|
|
1115
1171
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1116
|
-
jsii.set(self, "terraformResource", value)
|
|
1172
|
+
jsii.set(self, "terraformResource", value) # pyright: ignore[reportArgumentType]
|
|
1117
1173
|
|
|
1118
1174
|
@builtins.property
|
|
1119
1175
|
@jsii.member(jsii_name="wrapsSet")
|
|
@@ -1126,7 +1182,7 @@ class KubernetesNodeGroupKubeletArgsList(
|
|
|
1126
1182
|
if __debug__:
|
|
1127
1183
|
type_hints = typing.get_type_hints(_typecheckingstub__1da00c07635920f592f81dd8a1b5edbf670c685a0f0da4b6eab167085109616b)
|
|
1128
1184
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1129
|
-
jsii.set(self, "wrapsSet", value)
|
|
1185
|
+
jsii.set(self, "wrapsSet", value) # pyright: ignore[reportArgumentType]
|
|
1130
1186
|
|
|
1131
1187
|
@builtins.property
|
|
1132
1188
|
@jsii.member(jsii_name="internalValue")
|
|
@@ -1143,7 +1199,7 @@ class KubernetesNodeGroupKubeletArgsList(
|
|
|
1143
1199
|
if __debug__:
|
|
1144
1200
|
type_hints = typing.get_type_hints(_typecheckingstub__a532fbf34887c150c2e5b1c80c46135e3c5fc280956c03a0f00097f4441c53f7)
|
|
1145
1201
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1146
|
-
jsii.set(self, "internalValue", value)
|
|
1202
|
+
jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
|
|
1147
1203
|
|
|
1148
1204
|
|
|
1149
1205
|
class KubernetesNodeGroupKubeletArgsOutputReference(
|
|
@@ -1192,7 +1248,7 @@ class KubernetesNodeGroupKubeletArgsOutputReference(
|
|
|
1192
1248
|
if __debug__:
|
|
1193
1249
|
type_hints = typing.get_type_hints(_typecheckingstub__a0ca93e23304fb9d3092b6e042d7017f88c72f85e9ad92d73052c5eea4030011)
|
|
1194
1250
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1195
|
-
jsii.set(self, "key", value)
|
|
1251
|
+
jsii.set(self, "key", value) # pyright: ignore[reportArgumentType]
|
|
1196
1252
|
|
|
1197
1253
|
@builtins.property
|
|
1198
1254
|
@jsii.member(jsii_name="value")
|
|
@@ -1204,7 +1260,7 @@ class KubernetesNodeGroupKubeletArgsOutputReference(
|
|
|
1204
1260
|
if __debug__:
|
|
1205
1261
|
type_hints = typing.get_type_hints(_typecheckingstub__190c6fb08627f568dbff911b8ba8f0a445d8de7960b43dbcd5b8df5a922d2537)
|
|
1206
1262
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1207
|
-
jsii.set(self, "value", value)
|
|
1263
|
+
jsii.set(self, "value", value) # pyright: ignore[reportArgumentType]
|
|
1208
1264
|
|
|
1209
1265
|
@builtins.property
|
|
1210
1266
|
@jsii.member(jsii_name="internalValue")
|
|
@@ -1221,7 +1277,7 @@ class KubernetesNodeGroupKubeletArgsOutputReference(
|
|
|
1221
1277
|
if __debug__:
|
|
1222
1278
|
type_hints = typing.get_type_hints(_typecheckingstub__5e8923d78289695708ec2e55a09b1595632c8cae49ff31863f2e4bbde79aac87)
|
|
1223
1279
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1224
|
-
jsii.set(self, "internalValue", value)
|
|
1280
|
+
jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
|
|
1225
1281
|
|
|
1226
1282
|
|
|
1227
1283
|
@jsii.data_type(
|
|
@@ -1238,9 +1294,9 @@ class KubernetesNodeGroupTaint:
|
|
|
1238
1294
|
value: builtins.str,
|
|
1239
1295
|
) -> None:
|
|
1240
1296
|
'''
|
|
1241
|
-
:param effect: Taint effect. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1242
|
-
:param key: Taint key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1243
|
-
:param value: Taint value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1297
|
+
:param effect: Taint effect. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
|
|
1298
|
+
:param key: Taint key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
1299
|
+
:param value: Taint value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
1244
1300
|
'''
|
|
1245
1301
|
if __debug__:
|
|
1246
1302
|
type_hints = typing.get_type_hints(_typecheckingstub__ea59ebf2232eca6d3573e469ce94ebcc61818a93352ae4370837428874ad8b8e)
|
|
@@ -1257,7 +1313,7 @@ class KubernetesNodeGroupTaint:
|
|
|
1257
1313
|
def effect(self) -> builtins.str:
|
|
1258
1314
|
'''Taint effect.
|
|
1259
1315
|
|
|
1260
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1316
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
|
|
1261
1317
|
'''
|
|
1262
1318
|
result = self._values.get("effect")
|
|
1263
1319
|
assert result is not None, "Required property 'effect' is missing"
|
|
@@ -1267,7 +1323,7 @@ class KubernetesNodeGroupTaint:
|
|
|
1267
1323
|
def key(self) -> builtins.str:
|
|
1268
1324
|
'''Taint key.
|
|
1269
1325
|
|
|
1270
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1326
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
1271
1327
|
'''
|
|
1272
1328
|
result = self._values.get("key")
|
|
1273
1329
|
assert result is not None, "Required property 'key' is missing"
|
|
@@ -1277,7 +1333,7 @@ class KubernetesNodeGroupTaint:
|
|
|
1277
1333
|
def value(self) -> builtins.str:
|
|
1278
1334
|
'''Taint value.
|
|
1279
1335
|
|
|
1280
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1336
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
1281
1337
|
'''
|
|
1282
1338
|
result = self._values.get("value")
|
|
1283
1339
|
assert result is not None, "Required property 'value' is missing"
|
|
@@ -1339,7 +1395,7 @@ class KubernetesNodeGroupTaintList(
|
|
|
1339
1395
|
if __debug__:
|
|
1340
1396
|
type_hints = typing.get_type_hints(_typecheckingstub__a653dbd7825419038762384e3dd6c1d35788318e615eb2113999140ca65d66af)
|
|
1341
1397
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1342
|
-
jsii.set(self, "terraformAttribute", value)
|
|
1398
|
+
jsii.set(self, "terraformAttribute", value) # pyright: ignore[reportArgumentType]
|
|
1343
1399
|
|
|
1344
1400
|
@builtins.property
|
|
1345
1401
|
@jsii.member(jsii_name="terraformResource")
|
|
@@ -1352,7 +1408,7 @@ class KubernetesNodeGroupTaintList(
|
|
|
1352
1408
|
if __debug__:
|
|
1353
1409
|
type_hints = typing.get_type_hints(_typecheckingstub__b4ee5f41b3ba7599860324eea4d5d76c6689c846f4d728520696478cdf35c51c)
|
|
1354
1410
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1355
|
-
jsii.set(self, "terraformResource", value)
|
|
1411
|
+
jsii.set(self, "terraformResource", value) # pyright: ignore[reportArgumentType]
|
|
1356
1412
|
|
|
1357
1413
|
@builtins.property
|
|
1358
1414
|
@jsii.member(jsii_name="wrapsSet")
|
|
@@ -1365,7 +1421,7 @@ class KubernetesNodeGroupTaintList(
|
|
|
1365
1421
|
if __debug__:
|
|
1366
1422
|
type_hints = typing.get_type_hints(_typecheckingstub__a54ae18ac5c83380be8ee636436df8ec2171a507975c17e6b26b5fe263cf4680)
|
|
1367
1423
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1368
|
-
jsii.set(self, "wrapsSet", value)
|
|
1424
|
+
jsii.set(self, "wrapsSet", value) # pyright: ignore[reportArgumentType]
|
|
1369
1425
|
|
|
1370
1426
|
@builtins.property
|
|
1371
1427
|
@jsii.member(jsii_name="internalValue")
|
|
@@ -1382,7 +1438,7 @@ class KubernetesNodeGroupTaintList(
|
|
|
1382
1438
|
if __debug__:
|
|
1383
1439
|
type_hints = typing.get_type_hints(_typecheckingstub__f2b3c89670f740885f361407f1e60afdaa764dae180511c09280eee471d90ae7)
|
|
1384
1440
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1385
|
-
jsii.set(self, "internalValue", value)
|
|
1441
|
+
jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
|
|
1386
1442
|
|
|
1387
1443
|
|
|
1388
1444
|
class KubernetesNodeGroupTaintOutputReference(
|
|
@@ -1436,7 +1492,7 @@ class KubernetesNodeGroupTaintOutputReference(
|
|
|
1436
1492
|
if __debug__:
|
|
1437
1493
|
type_hints = typing.get_type_hints(_typecheckingstub__aae6c80211b753dde976506b8fdaaaeb52317752c965fa8f71e691ab195c694a)
|
|
1438
1494
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1439
|
-
jsii.set(self, "effect", value)
|
|
1495
|
+
jsii.set(self, "effect", value) # pyright: ignore[reportArgumentType]
|
|
1440
1496
|
|
|
1441
1497
|
@builtins.property
|
|
1442
1498
|
@jsii.member(jsii_name="key")
|
|
@@ -1448,7 +1504,7 @@ class KubernetesNodeGroupTaintOutputReference(
|
|
|
1448
1504
|
if __debug__:
|
|
1449
1505
|
type_hints = typing.get_type_hints(_typecheckingstub__55a026e007716eba12ee4e36307b091738d1cfd97602f2c5522ad02b04e0f132)
|
|
1450
1506
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1451
|
-
jsii.set(self, "key", value)
|
|
1507
|
+
jsii.set(self, "key", value) # pyright: ignore[reportArgumentType]
|
|
1452
1508
|
|
|
1453
1509
|
@builtins.property
|
|
1454
1510
|
@jsii.member(jsii_name="value")
|
|
@@ -1460,7 +1516,7 @@ class KubernetesNodeGroupTaintOutputReference(
|
|
|
1460
1516
|
if __debug__:
|
|
1461
1517
|
type_hints = typing.get_type_hints(_typecheckingstub__60c2f44434e8c966994b706bcde3d60ee6d488bc1150d9deb3e9a555a19dee0b)
|
|
1462
1518
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1463
|
-
jsii.set(self, "value", value)
|
|
1519
|
+
jsii.set(self, "value", value) # pyright: ignore[reportArgumentType]
|
|
1464
1520
|
|
|
1465
1521
|
@builtins.property
|
|
1466
1522
|
@jsii.member(jsii_name="internalValue")
|
|
@@ -1477,13 +1533,14 @@ class KubernetesNodeGroupTaintOutputReference(
|
|
|
1477
1533
|
if __debug__:
|
|
1478
1534
|
type_hints = typing.get_type_hints(_typecheckingstub__8a11735bbf7d5e4dd383fb927e6bf80821b4d25f117c173b310cfc837a25c7f4)
|
|
1479
1535
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1480
|
-
jsii.set(self, "internalValue", value)
|
|
1536
|
+
jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
|
|
1481
1537
|
|
|
1482
1538
|
|
|
1483
1539
|
__all__ = [
|
|
1484
1540
|
"KubernetesNodeGroup",
|
|
1485
1541
|
"KubernetesNodeGroupConfig",
|
|
1486
1542
|
"KubernetesNodeGroupCustomPlan",
|
|
1543
|
+
"KubernetesNodeGroupCustomPlanList",
|
|
1487
1544
|
"KubernetesNodeGroupCustomPlanOutputReference",
|
|
1488
1545
|
"KubernetesNodeGroupKubeletArgs",
|
|
1489
1546
|
"KubernetesNodeGroupKubeletArgsList",
|
|
@@ -1497,15 +1554,14 @@ publication.publish()
|
|
|
1497
1554
|
|
|
1498
1555
|
def _typecheckingstub__8bbcd241d9ab4cfd557f0a030c928c51f93c7d6d9f343e0bcdbdda3cbc8065e3(
|
|
1499
1556
|
scope: _constructs_77d1e7e8.Construct,
|
|
1500
|
-
|
|
1557
|
+
id: builtins.str,
|
|
1501
1558
|
*,
|
|
1502
1559
|
cluster: builtins.str,
|
|
1503
1560
|
name: builtins.str,
|
|
1504
1561
|
node_count: jsii.Number,
|
|
1505
1562
|
plan: builtins.str,
|
|
1506
1563
|
anti_affinity: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
1507
|
-
custom_plan: typing.Optional[typing.Union[KubernetesNodeGroupCustomPlan, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
1508
|
-
id: typing.Optional[builtins.str] = None,
|
|
1564
|
+
custom_plan: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[KubernetesNodeGroupCustomPlan, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
1509
1565
|
kubelet_args: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[KubernetesNodeGroupKubeletArgs, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
1510
1566
|
labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
1511
1567
|
ssh_keys: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
@@ -1532,6 +1588,12 @@ def _typecheckingstub__8e4418f3bc7d50550f1d889edee827b87fd9884602972643c6b82f110
|
|
|
1532
1588
|
"""Type checking stubs"""
|
|
1533
1589
|
pass
|
|
1534
1590
|
|
|
1591
|
+
def _typecheckingstub__710eeb24e681bc1abd473c02c09c72cd25116f5c53784cd07b46e161d215c56f(
|
|
1592
|
+
value: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[KubernetesNodeGroupCustomPlan, typing.Dict[builtins.str, typing.Any]]]],
|
|
1593
|
+
) -> None:
|
|
1594
|
+
"""Type checking stubs"""
|
|
1595
|
+
pass
|
|
1596
|
+
|
|
1535
1597
|
def _typecheckingstub__32e3828076130e1cbd29ccb900f4d6ed322c27ffe5fa92f4dab04d41c7227a1f(
|
|
1536
1598
|
value: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[KubernetesNodeGroupKubeletArgs, typing.Dict[builtins.str, typing.Any]]]],
|
|
1537
1599
|
) -> None:
|
|
@@ -1556,12 +1618,6 @@ def _typecheckingstub__251ecefce0fab4086841f5905fdd68a5182667a221b0cf9910dbc14ee
|
|
|
1556
1618
|
"""Type checking stubs"""
|
|
1557
1619
|
pass
|
|
1558
1620
|
|
|
1559
|
-
def _typecheckingstub__ee7527cb3aa5a925a82a9e87349717ac3d3a6787a09bf36f1f31df75fa2af7f6(
|
|
1560
|
-
value: builtins.str,
|
|
1561
|
-
) -> None:
|
|
1562
|
-
"""Type checking stubs"""
|
|
1563
|
-
pass
|
|
1564
|
-
|
|
1565
1621
|
def _typecheckingstub__fccb7b922d5d84e539f4c8817753636ee4b2f0dec095ea9ff13030c9d7a17d58(
|
|
1566
1622
|
value: typing.Mapping[builtins.str, builtins.str],
|
|
1567
1623
|
) -> None:
|
|
@@ -1618,8 +1674,7 @@ def _typecheckingstub__2489ae5bd3c17ee9de104387734150d3686d0bce3df0c0db5244751c5
|
|
|
1618
1674
|
node_count: jsii.Number,
|
|
1619
1675
|
plan: builtins.str,
|
|
1620
1676
|
anti_affinity: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
1621
|
-
custom_plan: typing.Optional[typing.Union[KubernetesNodeGroupCustomPlan, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
1622
|
-
id: typing.Optional[builtins.str] = None,
|
|
1677
|
+
custom_plan: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[KubernetesNodeGroupCustomPlan, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
1623
1678
|
kubelet_args: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[KubernetesNodeGroupKubeletArgs, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
1624
1679
|
labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
1625
1680
|
ssh_keys: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
@@ -1640,9 +1695,49 @@ def _typecheckingstub__73a7225f6a5b39ce9f22f470a4b39f4020d9c2babc3a4001d90f5a255
|
|
|
1640
1695
|
"""Type checking stubs"""
|
|
1641
1696
|
pass
|
|
1642
1697
|
|
|
1698
|
+
def _typecheckingstub__b550730c152cdd521877d4cd4a76b2d1f548d64a196dbde61f47c82b091e854a(
|
|
1699
|
+
terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
|
|
1700
|
+
terraform_attribute: builtins.str,
|
|
1701
|
+
wraps_set: builtins.bool,
|
|
1702
|
+
) -> None:
|
|
1703
|
+
"""Type checking stubs"""
|
|
1704
|
+
pass
|
|
1705
|
+
|
|
1706
|
+
def _typecheckingstub__ad2db79018ca305418ade3285985b0c22792d72ade4279a8d56d4cc611707192(
|
|
1707
|
+
index: jsii.Number,
|
|
1708
|
+
) -> None:
|
|
1709
|
+
"""Type checking stubs"""
|
|
1710
|
+
pass
|
|
1711
|
+
|
|
1712
|
+
def _typecheckingstub__146491c26357a66d3726100bdae7a85cd1ce3f9d133170c7b888e4371863e15b(
|
|
1713
|
+
value: builtins.str,
|
|
1714
|
+
) -> None:
|
|
1715
|
+
"""Type checking stubs"""
|
|
1716
|
+
pass
|
|
1717
|
+
|
|
1718
|
+
def _typecheckingstub__981f0a78ff74ee055d79706678f7855b237a9c0e1fa4f77d6f528bc29b193924(
|
|
1719
|
+
value: _cdktf_9a9027ec.IInterpolatingParent,
|
|
1720
|
+
) -> None:
|
|
1721
|
+
"""Type checking stubs"""
|
|
1722
|
+
pass
|
|
1723
|
+
|
|
1724
|
+
def _typecheckingstub__de8e36f34a796164d1d848fa9ee03d21d32d20da9d69b2969c70bd64366fc15e(
|
|
1725
|
+
value: builtins.bool,
|
|
1726
|
+
) -> None:
|
|
1727
|
+
"""Type checking stubs"""
|
|
1728
|
+
pass
|
|
1729
|
+
|
|
1730
|
+
def _typecheckingstub__15bf7d5bcd50f8e0b7df457f502a8bb9362ca3bf6ab8c3190246a91e31ac4fb9(
|
|
1731
|
+
value: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List[KubernetesNodeGroupCustomPlan]]],
|
|
1732
|
+
) -> None:
|
|
1733
|
+
"""Type checking stubs"""
|
|
1734
|
+
pass
|
|
1735
|
+
|
|
1643
1736
|
def _typecheckingstub__8d2b117bf11d56c5c2ad00b1177ef138495c9f14ccd650ff5fcac5bedc510e7f(
|
|
1644
1737
|
terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
|
|
1645
1738
|
terraform_attribute: builtins.str,
|
|
1739
|
+
complex_object_index: jsii.Number,
|
|
1740
|
+
complex_object_is_from_set: builtins.bool,
|
|
1646
1741
|
) -> None:
|
|
1647
1742
|
"""Type checking stubs"""
|
|
1648
1743
|
pass
|
|
@@ -1672,7 +1767,7 @@ def _typecheckingstub__7b087d3351ca31ac1af59c32711d8f4d022346ac4bccf9ec972df910f
|
|
|
1672
1767
|
pass
|
|
1673
1768
|
|
|
1674
1769
|
def _typecheckingstub__c7a11f561e4b919a685206286a7eed09483e309fbeeea066dff67583e94f0c7a(
|
|
1675
|
-
value: typing.Optional[KubernetesNodeGroupCustomPlan],
|
|
1770
|
+
value: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, KubernetesNodeGroupCustomPlan]],
|
|
1676
1771
|
) -> None:
|
|
1677
1772
|
"""Type checking stubs"""
|
|
1678
1773
|
pass
|