cdktf-cdktf-provider-upcloud 14.9.0__py3-none-any.whl → 14.10.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.

Files changed (63) hide show
  1. cdktf_cdktf_provider_upcloud/__init__.py +5 -3
  2. cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
  3. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.10.0.jsii.tgz +0 -0
  4. cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +12 -12
  5. cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +12 -12
  6. cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +8 -8
  7. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +32 -32
  8. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +20 -20
  9. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +44 -44
  10. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +32 -32
  11. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +16 -16
  12. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +12 -12
  13. cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +28 -28
  14. cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +32 -32
  15. cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +12 -12
  16. cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +12 -12
  17. cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +8 -8
  18. cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +62 -62
  19. cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +20 -20
  20. cdktf_cdktf_provider_upcloud/gateway/__init__.py +53 -53
  21. cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +54 -54
  22. cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +80 -80
  23. cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +41 -41
  24. cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +271 -176
  25. cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +73 -73
  26. cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +84 -84
  27. cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +27 -70
  28. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +36 -36
  29. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +27 -70
  30. cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +52 -52
  31. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +351 -351
  32. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +27 -70
  33. cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +34 -77
  34. cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +40 -40
  35. cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +36 -36
  36. cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +24 -24
  37. cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +315 -269
  38. cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +2670 -655
  39. cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +511 -417
  40. cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +219 -173
  41. cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +70 -70
  42. cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +49 -49
  43. cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +32 -73
  44. cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +16 -16
  45. cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +20 -20
  46. cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +20 -20
  47. cdktf_cdktf_provider_upcloud/network/__init__.py +50 -50
  48. cdktf_cdktf_provider_upcloud/network_peering/__init__.py +39 -39
  49. cdktf_cdktf_provider_upcloud/object_storage/__init__.py +43 -43
  50. cdktf_cdktf_provider_upcloud/provider/__init__.py +32 -32
  51. cdktf_cdktf_provider_upcloud/router/__init__.py +34 -34
  52. cdktf_cdktf_provider_upcloud/server/__init__.py +220 -220
  53. cdktf_cdktf_provider_upcloud/server_group/__init__.py +25 -25
  54. cdktf_cdktf_provider_upcloud/storage/__init__.py +648 -187
  55. cdktf_cdktf_provider_upcloud/storage_template/__init__.py +463 -0
  56. cdktf_cdktf_provider_upcloud/tag/__init__.py +20 -20
  57. {cdktf_cdktf_provider_upcloud-14.9.0.dist-info → cdktf_cdktf_provider_upcloud-14.10.0.dist-info}/METADATA +9 -9
  58. cdktf_cdktf_provider_upcloud-14.10.0.dist-info/RECORD +62 -0
  59. {cdktf_cdktf_provider_upcloud-14.9.0.dist-info → cdktf_cdktf_provider_upcloud-14.10.0.dist-info}/WHEEL +1 -1
  60. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.9.0.jsii.tgz +0 -0
  61. cdktf_cdktf_provider_upcloud-14.9.0.dist-info/RECORD +0 -61
  62. {cdktf_cdktf_provider_upcloud-14.9.0.dist-info → cdktf_cdktf_provider_upcloud-14.10.0.dist-info}/LICENSE +0 -0
  63. {cdktf_cdktf_provider_upcloud-14.9.0.dist-info → cdktf_cdktf_provider_upcloud-14.10.0.dist-info}/top_level.txt +0 -0
@@ -1,7 +1,7 @@
1
1
  r'''
2
2
  # `upcloud_managed_database_user`
3
3
 
4
- Refer to the Terraform Registry for docs: [`upcloud_managed_database_user`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user).
4
+ Refer to the Terraform Registry for docs: [`upcloud_managed_database_user`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -29,7 +29,7 @@ class ManagedDatabaseUser(
29
29
  metaclass=jsii.JSIIMeta,
30
30
  jsii_type="@cdktf/provider-upcloud.managedDatabaseUser.ManagedDatabaseUser",
31
31
  ):
32
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user upcloud_managed_database_user}.'''
32
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user upcloud_managed_database_user}.'''
33
33
 
34
34
  def __init__(
35
35
  self,
@@ -52,18 +52,18 @@ class ManagedDatabaseUser(
52
52
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
53
53
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
54
54
  ) -> None:
55
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user upcloud_managed_database_user} Resource.
55
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user upcloud_managed_database_user} Resource.
56
56
 
57
57
  :param scope: The scope in which to define this construct.
58
58
  :param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
59
- :param service: Service's UUID for which this user belongs to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#service ManagedDatabaseUser#service}
60
- :param username: Name of the database user. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#username ManagedDatabaseUser#username}
61
- :param authentication: MySQL only, authentication type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#authentication ManagedDatabaseUser#authentication}
62
- :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#id ManagedDatabaseUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
63
- :param opensearch_access_control: opensearch_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#opensearch_access_control ManagedDatabaseUser#opensearch_access_control}
64
- :param password: Password for the database user. Defaults to a random value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#password ManagedDatabaseUser#password}
65
- :param pg_access_control: pg_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#pg_access_control ManagedDatabaseUser#pg_access_control}
66
- :param redis_access_control: redis_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#redis_access_control ManagedDatabaseUser#redis_access_control}
59
+ :param service: Service's UUID for which this user belongs to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#service ManagedDatabaseUser#service}
60
+ :param username: Name of the database user. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#username ManagedDatabaseUser#username}
61
+ :param authentication: MySQL only, authentication type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#authentication ManagedDatabaseUser#authentication}
62
+ :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#id ManagedDatabaseUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
63
+ :param opensearch_access_control: opensearch_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#opensearch_access_control ManagedDatabaseUser#opensearch_access_control}
64
+ :param password: Password for the database user. Defaults to a random value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#password ManagedDatabaseUser#password}
65
+ :param pg_access_control: pg_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#pg_access_control ManagedDatabaseUser#pg_access_control}
66
+ :param redis_access_control: redis_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#redis_access_control ManagedDatabaseUser#redis_access_control}
67
67
  :param connection:
68
68
  :param count:
69
69
  :param depends_on:
@@ -109,7 +109,7 @@ class ManagedDatabaseUser(
109
109
 
110
110
  :param scope: The scope in which to define this construct.
111
111
  :param import_to_id: The construct id used in the generated config for the ManagedDatabaseUser to import.
112
- :param import_from_id: The id of the existing ManagedDatabaseUser that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#import import section} in the documentation of this resource for the id to use
112
+ :param import_from_id: The id of the existing ManagedDatabaseUser that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#import import section} in the documentation of this resource for the id to use
113
113
  :param provider: ? Optional instance of the provider where the ManagedDatabaseUser to import is found.
114
114
  '''
115
115
  if __debug__:
@@ -127,7 +127,7 @@ class ManagedDatabaseUser(
127
127
  rules: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["ManagedDatabaseUserOpensearchAccessControlRules", typing.Dict[builtins.str, typing.Any]]]],
128
128
  ) -> None:
129
129
  '''
130
- :param rules: rules block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#rules ManagedDatabaseUser#rules}
130
+ :param rules: rules block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#rules ManagedDatabaseUser#rules}
131
131
  '''
132
132
  value = ManagedDatabaseUserOpensearchAccessControl(rules=rules)
133
133
 
@@ -140,7 +140,7 @@ class ManagedDatabaseUser(
140
140
  allow_replication: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
141
141
  ) -> None:
142
142
  '''
143
- :param allow_replication: Grant replication privilege. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#allow_replication ManagedDatabaseUser#allow_replication}
143
+ :param allow_replication: Grant replication privilege. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#allow_replication ManagedDatabaseUser#allow_replication}
144
144
  '''
145
145
  value = ManagedDatabaseUserPgAccessControl(allow_replication=allow_replication)
146
146
 
@@ -156,10 +156,10 @@ class ManagedDatabaseUser(
156
156
  keys: typing.Optional[typing.Sequence[builtins.str]] = None,
157
157
  ) -> None:
158
158
  '''
159
- :param categories: Set access control to all commands in specified categories. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
160
- :param channels: Set access control to Pub/Sub channels. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
161
- :param commands: Set access control to commands. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
162
- :param keys: Set access control to keys. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
159
+ :param categories: Set access control to all commands in specified categories. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
160
+ :param channels: Set access control to Pub/Sub channels. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
161
+ :param commands: Set access control to commands. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
162
+ :param keys: Set access control to keys. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
163
163
  '''
164
164
  value = ManagedDatabaseUserRedisAccessControl(
165
165
  categories=categories, channels=channels, commands=commands, keys=keys
@@ -284,7 +284,7 @@ class ManagedDatabaseUser(
284
284
  if __debug__:
285
285
  type_hints = typing.get_type_hints(_typecheckingstub__b59524d6ec28e1e91e2660a7a825733751c8f6ccf1b6b7ace9eacc505d796901)
286
286
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
287
- jsii.set(self, "authentication", value)
287
+ jsii.set(self, "authentication", value) # pyright: ignore[reportArgumentType]
288
288
 
289
289
  @builtins.property
290
290
  @jsii.member(jsii_name="id")
@@ -296,7 +296,7 @@ class ManagedDatabaseUser(
296
296
  if __debug__:
297
297
  type_hints = typing.get_type_hints(_typecheckingstub__279d5d1ce136b75e6c2fe00e42d73f303c19db8b2a872db680552e387797902c)
298
298
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
299
- jsii.set(self, "id", value)
299
+ jsii.set(self, "id", value) # pyright: ignore[reportArgumentType]
300
300
 
301
301
  @builtins.property
302
302
  @jsii.member(jsii_name="password")
@@ -308,7 +308,7 @@ class ManagedDatabaseUser(
308
308
  if __debug__:
309
309
  type_hints = typing.get_type_hints(_typecheckingstub__e0bc67b2dd690e0235e63664dc77e9295886fea48c10eba2f30b039f0b5f455b)
310
310
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
311
- jsii.set(self, "password", value)
311
+ jsii.set(self, "password", value) # pyright: ignore[reportArgumentType]
312
312
 
313
313
  @builtins.property
314
314
  @jsii.member(jsii_name="service")
@@ -320,7 +320,7 @@ class ManagedDatabaseUser(
320
320
  if __debug__:
321
321
  type_hints = typing.get_type_hints(_typecheckingstub__cb1244dc41c138e20749cc2e50d2739b25a0c3a573a7655784fe3a48e8b7c2a4)
322
322
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
323
- jsii.set(self, "service", value)
323
+ jsii.set(self, "service", value) # pyright: ignore[reportArgumentType]
324
324
 
325
325
  @builtins.property
326
326
  @jsii.member(jsii_name="username")
@@ -332,7 +332,7 @@ class ManagedDatabaseUser(
332
332
  if __debug__:
333
333
  type_hints = typing.get_type_hints(_typecheckingstub__9047a597e672fcf3a034119577335b53b918a8ad3b654540e8d13c08a894eeb3)
334
334
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
335
- jsii.set(self, "username", value)
335
+ jsii.set(self, "username", value) # pyright: ignore[reportArgumentType]
336
336
 
337
337
 
338
338
  @jsii.data_type(
@@ -384,14 +384,14 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
384
384
  :param lifecycle:
385
385
  :param provider:
386
386
  :param provisioners:
387
- :param service: Service's UUID for which this user belongs to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#service ManagedDatabaseUser#service}
388
- :param username: Name of the database user. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#username ManagedDatabaseUser#username}
389
- :param authentication: MySQL only, authentication type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#authentication ManagedDatabaseUser#authentication}
390
- :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#id ManagedDatabaseUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
391
- :param opensearch_access_control: opensearch_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#opensearch_access_control ManagedDatabaseUser#opensearch_access_control}
392
- :param password: Password for the database user. Defaults to a random value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#password ManagedDatabaseUser#password}
393
- :param pg_access_control: pg_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#pg_access_control ManagedDatabaseUser#pg_access_control}
394
- :param redis_access_control: redis_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#redis_access_control ManagedDatabaseUser#redis_access_control}
387
+ :param service: Service's UUID for which this user belongs to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#service ManagedDatabaseUser#service}
388
+ :param username: Name of the database user. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#username ManagedDatabaseUser#username}
389
+ :param authentication: MySQL only, authentication type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#authentication ManagedDatabaseUser#authentication}
390
+ :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#id ManagedDatabaseUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
391
+ :param opensearch_access_control: opensearch_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#opensearch_access_control ManagedDatabaseUser#opensearch_access_control}
392
+ :param password: Password for the database user. Defaults to a random value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#password ManagedDatabaseUser#password}
393
+ :param pg_access_control: pg_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#pg_access_control ManagedDatabaseUser#pg_access_control}
394
+ :param redis_access_control: redis_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#redis_access_control ManagedDatabaseUser#redis_access_control}
395
395
  '''
396
396
  if isinstance(lifecycle, dict):
397
397
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -517,7 +517,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
517
517
  def service(self) -> builtins.str:
518
518
  '''Service's UUID for which this user belongs to.
519
519
 
520
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#service ManagedDatabaseUser#service}
520
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#service ManagedDatabaseUser#service}
521
521
  '''
522
522
  result = self._values.get("service")
523
523
  assert result is not None, "Required property 'service' is missing"
@@ -527,7 +527,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
527
527
  def username(self) -> builtins.str:
528
528
  '''Name of the database user.
529
529
 
530
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#username ManagedDatabaseUser#username}
530
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#username ManagedDatabaseUser#username}
531
531
  '''
532
532
  result = self._values.get("username")
533
533
  assert result is not None, "Required property 'username' is missing"
@@ -537,14 +537,14 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
537
537
  def authentication(self) -> typing.Optional[builtins.str]:
538
538
  '''MySQL only, authentication type.
539
539
 
540
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#authentication ManagedDatabaseUser#authentication}
540
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#authentication ManagedDatabaseUser#authentication}
541
541
  '''
542
542
  result = self._values.get("authentication")
543
543
  return typing.cast(typing.Optional[builtins.str], result)
544
544
 
545
545
  @builtins.property
546
546
  def id(self) -> typing.Optional[builtins.str]:
547
- '''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#id ManagedDatabaseUser#id}.
547
+ '''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#id ManagedDatabaseUser#id}.
548
548
 
549
549
  Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
550
550
  If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -558,7 +558,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
558
558
  ) -> typing.Optional["ManagedDatabaseUserOpensearchAccessControl"]:
559
559
  '''opensearch_access_control block.
560
560
 
561
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#opensearch_access_control ManagedDatabaseUser#opensearch_access_control}
561
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#opensearch_access_control ManagedDatabaseUser#opensearch_access_control}
562
562
  '''
563
563
  result = self._values.get("opensearch_access_control")
564
564
  return typing.cast(typing.Optional["ManagedDatabaseUserOpensearchAccessControl"], result)
@@ -567,7 +567,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
567
567
  def password(self) -> typing.Optional[builtins.str]:
568
568
  '''Password for the database user. Defaults to a random value.
569
569
 
570
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#password ManagedDatabaseUser#password}
570
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#password ManagedDatabaseUser#password}
571
571
  '''
572
572
  result = self._values.get("password")
573
573
  return typing.cast(typing.Optional[builtins.str], result)
@@ -578,7 +578,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
578
578
  ) -> typing.Optional["ManagedDatabaseUserPgAccessControl"]:
579
579
  '''pg_access_control block.
580
580
 
581
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#pg_access_control ManagedDatabaseUser#pg_access_control}
581
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#pg_access_control ManagedDatabaseUser#pg_access_control}
582
582
  '''
583
583
  result = self._values.get("pg_access_control")
584
584
  return typing.cast(typing.Optional["ManagedDatabaseUserPgAccessControl"], result)
@@ -589,7 +589,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
589
589
  ) -> typing.Optional["ManagedDatabaseUserRedisAccessControl"]:
590
590
  '''redis_access_control block.
591
591
 
592
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#redis_access_control ManagedDatabaseUser#redis_access_control}
592
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#redis_access_control ManagedDatabaseUser#redis_access_control}
593
593
  '''
594
594
  result = self._values.get("redis_access_control")
595
595
  return typing.cast(typing.Optional["ManagedDatabaseUserRedisAccessControl"], result)
@@ -618,7 +618,7 @@ class ManagedDatabaseUserOpensearchAccessControl:
618
618
  rules: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["ManagedDatabaseUserOpensearchAccessControlRules", typing.Dict[builtins.str, typing.Any]]]],
619
619
  ) -> None:
620
620
  '''
621
- :param rules: rules block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#rules ManagedDatabaseUser#rules}
621
+ :param rules: rules block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#rules ManagedDatabaseUser#rules}
622
622
  '''
623
623
  if __debug__:
624
624
  type_hints = typing.get_type_hints(_typecheckingstub__72db216f4a07b0d61090bf6cee72765d201a2daf9f3d0177b70ceadc0e0b4950)
@@ -633,7 +633,7 @@ class ManagedDatabaseUserOpensearchAccessControl:
633
633
  ) -> typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["ManagedDatabaseUserOpensearchAccessControlRules"]]:
634
634
  '''rules block.
635
635
 
636
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#rules ManagedDatabaseUser#rules}
636
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#rules ManagedDatabaseUser#rules}
637
637
  '''
638
638
  result = self._values.get("rules")
639
639
  assert result is not None, "Required property 'rules' is missing"
@@ -711,7 +711,7 @@ class ManagedDatabaseUserOpensearchAccessControlOutputReference(
711
711
  if __debug__:
712
712
  type_hints = typing.get_type_hints(_typecheckingstub__6f2043b59277b76c0c76f326072fbc42fd640a5568ab1320f7cc8d737f67e3da)
713
713
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
714
- jsii.set(self, "internalValue", value)
714
+ jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
715
715
 
716
716
 
717
717
  @jsii.data_type(
@@ -722,8 +722,8 @@ class ManagedDatabaseUserOpensearchAccessControlOutputReference(
722
722
  class ManagedDatabaseUserOpensearchAccessControlRules:
723
723
  def __init__(self, *, index: builtins.str, permission: builtins.str) -> None:
724
724
  '''
725
- :param index: Set index name, pattern or top level API. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#index ManagedDatabaseUser#index}
726
- :param permission: Set permission access. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#permission ManagedDatabaseUser#permission}
725
+ :param index: Set index name, pattern or top level API. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#index ManagedDatabaseUser#index}
726
+ :param permission: Set permission access. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#permission ManagedDatabaseUser#permission}
727
727
  '''
728
728
  if __debug__:
729
729
  type_hints = typing.get_type_hints(_typecheckingstub__037bf6ae1cf4ccc5175cd9f327782b4c274be6c4d8dcbbf42b47b3e0d87e86ea)
@@ -738,7 +738,7 @@ class ManagedDatabaseUserOpensearchAccessControlRules:
738
738
  def index(self) -> builtins.str:
739
739
  '''Set index name, pattern or top level API.
740
740
 
741
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#index ManagedDatabaseUser#index}
741
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#index ManagedDatabaseUser#index}
742
742
  '''
743
743
  result = self._values.get("index")
744
744
  assert result is not None, "Required property 'index' is missing"
@@ -748,7 +748,7 @@ class ManagedDatabaseUserOpensearchAccessControlRules:
748
748
  def permission(self) -> builtins.str:
749
749
  '''Set permission access.
750
750
 
751
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#permission ManagedDatabaseUser#permission}
751
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#permission ManagedDatabaseUser#permission}
752
752
  '''
753
753
  result = self._values.get("permission")
754
754
  assert result is not None, "Required property 'permission' is missing"
@@ -813,7 +813,7 @@ class ManagedDatabaseUserOpensearchAccessControlRulesList(
813
813
  if __debug__:
814
814
  type_hints = typing.get_type_hints(_typecheckingstub__819a3aa89c9c1206aa9c2a863c363f11b8a66bd9b8497cfee924eca988197fcb)
815
815
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
816
- jsii.set(self, "terraformAttribute", value)
816
+ jsii.set(self, "terraformAttribute", value) # pyright: ignore[reportArgumentType]
817
817
 
818
818
  @builtins.property
819
819
  @jsii.member(jsii_name="terraformResource")
@@ -826,7 +826,7 @@ class ManagedDatabaseUserOpensearchAccessControlRulesList(
826
826
  if __debug__:
827
827
  type_hints = typing.get_type_hints(_typecheckingstub__9035a2506767e4f58f5e63793c32afb1e7d291560717108cec71bf2c6deb579f)
828
828
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
829
- jsii.set(self, "terraformResource", value)
829
+ jsii.set(self, "terraformResource", value) # pyright: ignore[reportArgumentType]
830
830
 
831
831
  @builtins.property
832
832
  @jsii.member(jsii_name="wrapsSet")
@@ -839,7 +839,7 @@ class ManagedDatabaseUserOpensearchAccessControlRulesList(
839
839
  if __debug__:
840
840
  type_hints = typing.get_type_hints(_typecheckingstub__1b3fe316a8770435bbdac3dfecd6e58cc0f51b70c77adf586b8d3b4d6ff04d74)
841
841
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
842
- jsii.set(self, "wrapsSet", value)
842
+ jsii.set(self, "wrapsSet", value) # pyright: ignore[reportArgumentType]
843
843
 
844
844
  @builtins.property
845
845
  @jsii.member(jsii_name="internalValue")
@@ -856,7 +856,7 @@ class ManagedDatabaseUserOpensearchAccessControlRulesList(
856
856
  if __debug__:
857
857
  type_hints = typing.get_type_hints(_typecheckingstub__3e8caca91ec82f03099665dab3a8d90b2a77f89960ed729ae582c6cbf3fc3a7a)
858
858
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
859
- jsii.set(self, "internalValue", value)
859
+ jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
860
860
 
861
861
 
862
862
  class ManagedDatabaseUserOpensearchAccessControlRulesOutputReference(
@@ -905,7 +905,7 @@ class ManagedDatabaseUserOpensearchAccessControlRulesOutputReference(
905
905
  if __debug__:
906
906
  type_hints = typing.get_type_hints(_typecheckingstub__bf31bc12b7f94a526e7e41226e6e9296881b18ff36410291f9f4964a64acf62f)
907
907
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
908
- jsii.set(self, "index", value)
908
+ jsii.set(self, "index", value) # pyright: ignore[reportArgumentType]
909
909
 
910
910
  @builtins.property
911
911
  @jsii.member(jsii_name="permission")
@@ -917,7 +917,7 @@ class ManagedDatabaseUserOpensearchAccessControlRulesOutputReference(
917
917
  if __debug__:
918
918
  type_hints = typing.get_type_hints(_typecheckingstub__a8078f0d2a5b371825e053b9bd3d3b431480d8a53a502928b258020d66840f0b)
919
919
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
920
- jsii.set(self, "permission", value)
920
+ jsii.set(self, "permission", value) # pyright: ignore[reportArgumentType]
921
921
 
922
922
  @builtins.property
923
923
  @jsii.member(jsii_name="internalValue")
@@ -934,7 +934,7 @@ class ManagedDatabaseUserOpensearchAccessControlRulesOutputReference(
934
934
  if __debug__:
935
935
  type_hints = typing.get_type_hints(_typecheckingstub__13b1b4f9dcb8775caf7897bb1366e6419bc653fc18161596852f846170e69f1c)
936
936
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
937
- jsii.set(self, "internalValue", value)
937
+ jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
938
938
 
939
939
 
940
940
  @jsii.data_type(
@@ -949,7 +949,7 @@ class ManagedDatabaseUserPgAccessControl:
949
949
  allow_replication: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
950
950
  ) -> None:
951
951
  '''
952
- :param allow_replication: Grant replication privilege. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#allow_replication ManagedDatabaseUser#allow_replication}
952
+ :param allow_replication: Grant replication privilege. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#allow_replication ManagedDatabaseUser#allow_replication}
953
953
  '''
954
954
  if __debug__:
955
955
  type_hints = typing.get_type_hints(_typecheckingstub__f34e6b56dbd319319ed29790d55c8592357d86f9b7c8e8c14a5c4d70a6787a4f)
@@ -964,7 +964,7 @@ class ManagedDatabaseUserPgAccessControl:
964
964
  ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
965
965
  '''Grant replication privilege.
966
966
 
967
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#allow_replication ManagedDatabaseUser#allow_replication}
967
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#allow_replication ManagedDatabaseUser#allow_replication}
968
968
  '''
969
969
  result = self._values.get("allow_replication")
970
970
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
@@ -1027,7 +1027,7 @@ class ManagedDatabaseUserPgAccessControlOutputReference(
1027
1027
  if __debug__:
1028
1028
  type_hints = typing.get_type_hints(_typecheckingstub__d64766b07261271a83f0b99c9b5994c07b319be03b24ec0486adc7ddcb458552)
1029
1029
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1030
- jsii.set(self, "allowReplication", value)
1030
+ jsii.set(self, "allowReplication", value) # pyright: ignore[reportArgumentType]
1031
1031
 
1032
1032
  @builtins.property
1033
1033
  @jsii.member(jsii_name="internalValue")
@@ -1042,7 +1042,7 @@ class ManagedDatabaseUserPgAccessControlOutputReference(
1042
1042
  if __debug__:
1043
1043
  type_hints = typing.get_type_hints(_typecheckingstub__3ef37ebe78b06916a552ac2271f6287ba8f91f8248730c96c7d6d23c8258132c)
1044
1044
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1045
- jsii.set(self, "internalValue", value)
1045
+ jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
1046
1046
 
1047
1047
 
1048
1048
  @jsii.data_type(
@@ -1065,10 +1065,10 @@ class ManagedDatabaseUserRedisAccessControl:
1065
1065
  keys: typing.Optional[typing.Sequence[builtins.str]] = None,
1066
1066
  ) -> None:
1067
1067
  '''
1068
- :param categories: Set access control to all commands in specified categories. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
1069
- :param channels: Set access control to Pub/Sub channels. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
1070
- :param commands: Set access control to commands. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
1071
- :param keys: Set access control to keys. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
1068
+ :param categories: Set access control to all commands in specified categories. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
1069
+ :param channels: Set access control to Pub/Sub channels. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
1070
+ :param commands: Set access control to commands. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
1071
+ :param keys: Set access control to keys. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
1072
1072
  '''
1073
1073
  if __debug__:
1074
1074
  type_hints = typing.get_type_hints(_typecheckingstub__27204462f8812754fabbce2e4daa3352d018e15b121d6d94fd8c33a5f838827b)
@@ -1090,7 +1090,7 @@ class ManagedDatabaseUserRedisAccessControl:
1090
1090
  def categories(self) -> typing.Optional[typing.List[builtins.str]]:
1091
1091
  '''Set access control to all commands in specified categories.
1092
1092
 
1093
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
1093
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
1094
1094
  '''
1095
1095
  result = self._values.get("categories")
1096
1096
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
@@ -1099,7 +1099,7 @@ class ManagedDatabaseUserRedisAccessControl:
1099
1099
  def channels(self) -> typing.Optional[typing.List[builtins.str]]:
1100
1100
  '''Set access control to Pub/Sub channels.
1101
1101
 
1102
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
1102
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
1103
1103
  '''
1104
1104
  result = self._values.get("channels")
1105
1105
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
@@ -1108,7 +1108,7 @@ class ManagedDatabaseUserRedisAccessControl:
1108
1108
  def commands(self) -> typing.Optional[typing.List[builtins.str]]:
1109
1109
  '''Set access control to commands.
1110
1110
 
1111
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
1111
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
1112
1112
  '''
1113
1113
  result = self._values.get("commands")
1114
1114
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
@@ -1117,7 +1117,7 @@ class ManagedDatabaseUserRedisAccessControl:
1117
1117
  def keys(self) -> typing.Optional[typing.List[builtins.str]]:
1118
1118
  '''Set access control to keys.
1119
1119
 
1120
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
1120
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
1121
1121
  '''
1122
1122
  result = self._values.get("keys")
1123
1123
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
@@ -1200,7 +1200,7 @@ class ManagedDatabaseUserRedisAccessControlOutputReference(
1200
1200
  if __debug__:
1201
1201
  type_hints = typing.get_type_hints(_typecheckingstub__9db6bd21eb82626e594a17d964f006f6367c63796a9e1fcf5900809d75d75495)
1202
1202
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1203
- jsii.set(self, "categories", value)
1203
+ jsii.set(self, "categories", value) # pyright: ignore[reportArgumentType]
1204
1204
 
1205
1205
  @builtins.property
1206
1206
  @jsii.member(jsii_name="channels")
@@ -1212,7 +1212,7 @@ class ManagedDatabaseUserRedisAccessControlOutputReference(
1212
1212
  if __debug__:
1213
1213
  type_hints = typing.get_type_hints(_typecheckingstub__c8835379e24928fde409b267f4d2324f2f982d9481187765ee87591af7141b3b)
1214
1214
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1215
- jsii.set(self, "channels", value)
1215
+ jsii.set(self, "channels", value) # pyright: ignore[reportArgumentType]
1216
1216
 
1217
1217
  @builtins.property
1218
1218
  @jsii.member(jsii_name="commands")
@@ -1224,7 +1224,7 @@ class ManagedDatabaseUserRedisAccessControlOutputReference(
1224
1224
  if __debug__:
1225
1225
  type_hints = typing.get_type_hints(_typecheckingstub__ea598cedaad8f42680bdfe823440cac795ce1b73a7d8eb3122c1765355bf47cc)
1226
1226
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1227
- jsii.set(self, "commands", value)
1227
+ jsii.set(self, "commands", value) # pyright: ignore[reportArgumentType]
1228
1228
 
1229
1229
  @builtins.property
1230
1230
  @jsii.member(jsii_name="keys")
@@ -1236,7 +1236,7 @@ class ManagedDatabaseUserRedisAccessControlOutputReference(
1236
1236
  if __debug__:
1237
1237
  type_hints = typing.get_type_hints(_typecheckingstub__cbe3f4c7b7b94e1cef4f758a0146dd6b964648a85bbcb4676d7f99c66ef9069d)
1238
1238
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1239
- jsii.set(self, "keys", value)
1239
+ jsii.set(self, "keys", value) # pyright: ignore[reportArgumentType]
1240
1240
 
1241
1241
  @builtins.property
1242
1242
  @jsii.member(jsii_name="internalValue")
@@ -1251,7 +1251,7 @@ class ManagedDatabaseUserRedisAccessControlOutputReference(
1251
1251
  if __debug__:
1252
1252
  type_hints = typing.get_type_hints(_typecheckingstub__339df3f9580cdaa83ea424d213c30eb13df0c7142e732aa0a5fa3d7a2238d0b8)
1253
1253
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1254
- jsii.set(self, "internalValue", value)
1254
+ jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
1255
1255
 
1256
1256
 
1257
1257
  __all__ = [