cdktf-cdktf-provider-upcloud 14.9.1__py3-none-any.whl → 14.10.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.

Files changed (63) hide show
  1. cdktf_cdktf_provider_upcloud/__init__.py +5 -3
  2. cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
  3. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.10.1.jsii.tgz +0 -0
  4. cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +7 -7
  5. cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +7 -7
  6. cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +7 -7
  7. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
  8. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
  9. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
  10. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
  11. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +10 -10
  12. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
  13. cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
  14. cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +25 -25
  15. cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
  16. cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
  17. cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +7 -7
  18. cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +41 -41
  19. cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +16 -16
  20. cdktf_cdktf_provider_upcloud/gateway/__init__.py +38 -38
  21. cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +34 -34
  22. cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +61 -61
  23. cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +32 -32
  24. cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +242 -147
  25. cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +43 -43
  26. cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +64 -64
  27. cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +24 -67
  28. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +28 -28
  29. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +24 -67
  30. cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +33 -33
  31. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +193 -193
  32. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +24 -67
  33. cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +30 -73
  34. cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +31 -31
  35. cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +28 -28
  36. cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
  37. cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +196 -196
  38. cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +2543 -528
  39. cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +310 -310
  40. cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +124 -124
  41. cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +50 -50
  42. cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +31 -31
  43. cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +28 -69
  44. cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +13 -13
  45. cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +16 -16
  46. cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +16 -16
  47. cdktf_cdktf_provider_upcloud/network/__init__.py +34 -34
  48. cdktf_cdktf_provider_upcloud/network_peering/__init__.py +24 -24
  49. cdktf_cdktf_provider_upcloud/object_storage/__init__.py +30 -30
  50. cdktf_cdktf_provider_upcloud/provider/__init__.py +25 -25
  51. cdktf_cdktf_provider_upcloud/router/__init__.py +20 -20
  52. cdktf_cdktf_provider_upcloud/server/__init__.py +154 -154
  53. cdktf_cdktf_provider_upcloud/server_group/__init__.py +20 -20
  54. cdktf_cdktf_provider_upcloud/storage/__init__.py +631 -170
  55. cdktf_cdktf_provider_upcloud/storage_template/__init__.py +463 -0
  56. cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
  57. {cdktf_cdktf_provider_upcloud-14.9.1.dist-info → cdktf_cdktf_provider_upcloud-14.10.1.dist-info}/METADATA +4 -4
  58. cdktf_cdktf_provider_upcloud-14.10.1.dist-info/RECORD +62 -0
  59. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.9.1.jsii.tgz +0 -0
  60. cdktf_cdktf_provider_upcloud-14.9.1.dist-info/RECORD +0 -61
  61. {cdktf_cdktf_provider_upcloud-14.9.1.dist-info → cdktf_cdktf_provider_upcloud-14.10.1.dist-info}/LICENSE +0 -0
  62. {cdktf_cdktf_provider_upcloud-14.9.1.dist-info → cdktf_cdktf_provider_upcloud-14.10.1.dist-info}/WHEEL +0 -0
  63. {cdktf_cdktf_provider_upcloud-14.9.1.dist-info → cdktf_cdktf_provider_upcloud-14.10.1.dist-info}/top_level.txt +0 -0
@@ -1,7 +1,7 @@
1
1
  r'''
2
2
  # `upcloud_kubernetes_node_group`
3
3
 
4
- Refer to the Terraform Registry for docs: [`upcloud_kubernetes_node_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group).
4
+ Refer to the Terraform Registry for docs: [`upcloud_kubernetes_node_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -29,20 +29,19 @@ class KubernetesNodeGroup(
29
29
  metaclass=jsii.JSIIMeta,
30
30
  jsii_type="@cdktf/provider-upcloud.kubernetesNodeGroup.KubernetesNodeGroup",
31
31
  ):
32
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group}.'''
32
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group}.'''
33
33
 
34
34
  def __init__(
35
35
  self,
36
36
  scope: _constructs_77d1e7e8.Construct,
37
- id_: builtins.str,
37
+ id: builtins.str,
38
38
  *,
39
39
  cluster: builtins.str,
40
40
  name: builtins.str,
41
41
  node_count: jsii.Number,
42
42
  plan: builtins.str,
43
43
  anti_affinity: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
44
- custom_plan: typing.Optional[typing.Union["KubernetesNodeGroupCustomPlan", typing.Dict[builtins.str, typing.Any]]] = None,
45
- id: typing.Optional[builtins.str] = None,
44
+ custom_plan: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["KubernetesNodeGroupCustomPlan", typing.Dict[builtins.str, typing.Any]]]]] = None,
46
45
  kubelet_args: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["KubernetesNodeGroupKubeletArgs", typing.Dict[builtins.str, typing.Any]]]]] = None,
47
46
  labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
48
47
  ssh_keys: typing.Optional[typing.Sequence[builtins.str]] = None,
@@ -57,23 +56,22 @@ class KubernetesNodeGroup(
57
56
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
58
57
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
59
58
  ) -> None:
60
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group} Resource.
59
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group} Resource.
61
60
 
62
61
  :param scope: The scope in which to define this construct.
63
- :param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
64
- :param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
65
- :param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
66
- :param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
67
- :param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
68
- :param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
69
- :param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
70
- :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#id KubernetesNodeGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
71
- :param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
72
- :param labels: Key-value pairs to classify the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
73
- :param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
74
- :param storage_encryption: Storage encryption strategy for the nodes in this group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
75
- :param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
76
- :param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
62
+ :param id: The scoped construct ID. Must be unique amongst siblings in the same scope
63
+ :param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
64
+ :param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
65
+ :param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
66
+ :param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
67
+ :param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
68
+ :param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
69
+ :param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
70
+ :param labels: User defined key-value pairs to classify the node_group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
71
+ :param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
72
+ :param storage_encryption: The storage encryption strategy to use for the nodes in this group. If not set, the cluster's storage encryption strategy will be used, if applicable. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
73
+ :param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
74
+ :param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
77
75
  :param connection:
78
76
  :param count:
79
77
  :param depends_on:
@@ -85,7 +83,7 @@ class KubernetesNodeGroup(
85
83
  if __debug__:
86
84
  type_hints = typing.get_type_hints(_typecheckingstub__8bbcd241d9ab4cfd557f0a030c928c51f93c7d6d9f343e0bcdbdda3cbc8065e3)
87
85
  check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
88
- check_type(argname="argument id_", value=id_, expected_type=type_hints["id_"])
86
+ check_type(argname="argument id", value=id, expected_type=type_hints["id"])
89
87
  config = KubernetesNodeGroupConfig(
90
88
  cluster=cluster,
91
89
  name=name,
@@ -93,7 +91,6 @@ class KubernetesNodeGroup(
93
91
  plan=plan,
94
92
  anti_affinity=anti_affinity,
95
93
  custom_plan=custom_plan,
96
- id=id,
97
94
  kubelet_args=kubelet_args,
98
95
  labels=labels,
99
96
  ssh_keys=ssh_keys,
@@ -109,7 +106,7 @@ class KubernetesNodeGroup(
109
106
  provisioners=provisioners,
110
107
  )
111
108
 
112
- jsii.create(self.__class__, self, [scope, id_, config])
109
+ jsii.create(self.__class__, self, [scope, id, config])
113
110
 
114
111
  @jsii.member(jsii_name="generateConfigForImport")
115
112
  @builtins.classmethod
@@ -124,7 +121,7 @@ class KubernetesNodeGroup(
124
121
 
125
122
  :param scope: The scope in which to define this construct.
126
123
  :param import_to_id: The construct id used in the generated config for the KubernetesNodeGroup to import.
127
- :param import_from_id: The id of the existing KubernetesNodeGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#import import section} in the documentation of this resource for the id to use
124
+ :param import_from_id: The id of the existing KubernetesNodeGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#import import section} in the documentation of this resource for the id to use
128
125
  :param provider: ? Optional instance of the provider where the KubernetesNodeGroup to import is found.
129
126
  '''
130
127
  if __debug__:
@@ -138,25 +135,14 @@ class KubernetesNodeGroup(
138
135
  @jsii.member(jsii_name="putCustomPlan")
139
136
  def put_custom_plan(
140
137
  self,
141
- *,
142
- cores: jsii.Number,
143
- memory: jsii.Number,
144
- storage_size: jsii.Number,
145
- storage_tier: typing.Optional[builtins.str] = None,
138
+ value: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["KubernetesNodeGroupCustomPlan", typing.Dict[builtins.str, typing.Any]]]],
146
139
  ) -> None:
147
140
  '''
148
- :param cores: The number of CPU cores dedicated to individual node group nodes when using custom plan. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
149
- :param memory: The amount of memory in megabytes to assign to individual node group node when using custom plan. Value needs to be divisible by 1024. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
150
- :param storage_size: The size of the storage device in gigabytes. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
151
- :param storage_tier: The storage tier to use. Defaults to maxiops. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
141
+ :param value: -
152
142
  '''
153
- value = KubernetesNodeGroupCustomPlan(
154
- cores=cores,
155
- memory=memory,
156
- storage_size=storage_size,
157
- storage_tier=storage_tier,
158
- )
159
-
143
+ if __debug__:
144
+ type_hints = typing.get_type_hints(_typecheckingstub__710eeb24e681bc1abd473c02c09c72cd25116f5c53784cd07b46e161d215c56f)
145
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
160
146
  return typing.cast(None, jsii.invoke(self, "putCustomPlan", [value]))
161
147
 
162
148
  @jsii.member(jsii_name="putKubeletArgs")
@@ -193,10 +179,6 @@ class KubernetesNodeGroup(
193
179
  def reset_custom_plan(self) -> None:
194
180
  return typing.cast(None, jsii.invoke(self, "resetCustomPlan", []))
195
181
 
196
- @jsii.member(jsii_name="resetId")
197
- def reset_id(self) -> None:
198
- return typing.cast(None, jsii.invoke(self, "resetId", []))
199
-
200
182
  @jsii.member(jsii_name="resetKubeletArgs")
201
183
  def reset_kubelet_args(self) -> None:
202
184
  return typing.cast(None, jsii.invoke(self, "resetKubeletArgs", []))
@@ -236,8 +218,13 @@ class KubernetesNodeGroup(
236
218
 
237
219
  @builtins.property
238
220
  @jsii.member(jsii_name="customPlan")
239
- def custom_plan(self) -> "KubernetesNodeGroupCustomPlanOutputReference":
240
- return typing.cast("KubernetesNodeGroupCustomPlanOutputReference", jsii.get(self, "customPlan"))
221
+ def custom_plan(self) -> "KubernetesNodeGroupCustomPlanList":
222
+ return typing.cast("KubernetesNodeGroupCustomPlanList", jsii.get(self, "customPlan"))
223
+
224
+ @builtins.property
225
+ @jsii.member(jsii_name="id")
226
+ def id(self) -> builtins.str:
227
+ return typing.cast(builtins.str, jsii.get(self, "id"))
241
228
 
242
229
  @builtins.property
243
230
  @jsii.member(jsii_name="kubeletArgs")
@@ -263,13 +250,10 @@ class KubernetesNodeGroup(
263
250
 
264
251
  @builtins.property
265
252
  @jsii.member(jsii_name="customPlanInput")
266
- def custom_plan_input(self) -> typing.Optional["KubernetesNodeGroupCustomPlan"]:
267
- return typing.cast(typing.Optional["KubernetesNodeGroupCustomPlan"], jsii.get(self, "customPlanInput"))
268
-
269
- @builtins.property
270
- @jsii.member(jsii_name="idInput")
271
- def id_input(self) -> typing.Optional[builtins.str]:
272
- return typing.cast(typing.Optional[builtins.str], jsii.get(self, "idInput"))
253
+ def custom_plan_input(
254
+ self,
255
+ ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupCustomPlan"]]]:
256
+ return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupCustomPlan"]]], jsii.get(self, "customPlanInput"))
273
257
 
274
258
  @builtins.property
275
259
  @jsii.member(jsii_name="kubeletArgsInput")
@@ -351,18 +335,6 @@ class KubernetesNodeGroup(
351
335
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
352
336
  jsii.set(self, "cluster", value) # pyright: ignore[reportArgumentType]
353
337
 
354
- @builtins.property
355
- @jsii.member(jsii_name="id")
356
- def id(self) -> builtins.str:
357
- return typing.cast(builtins.str, jsii.get(self, "id"))
358
-
359
- @id.setter
360
- def id(self, value: builtins.str) -> None:
361
- if __debug__:
362
- type_hints = typing.get_type_hints(_typecheckingstub__ee7527cb3aa5a925a82a9e87349717ac3d3a6787a09bf36f1f31df75fa2af7f6)
363
- check_type(argname="argument value", value=value, expected_type=type_hints["value"])
364
- jsii.set(self, "id", value) # pyright: ignore[reportArgumentType]
365
-
366
338
  @builtins.property
367
339
  @jsii.member(jsii_name="labels")
368
340
  def labels(self) -> typing.Mapping[builtins.str, builtins.str]:
@@ -470,7 +442,6 @@ class KubernetesNodeGroup(
470
442
  "plan": "plan",
471
443
  "anti_affinity": "antiAffinity",
472
444
  "custom_plan": "customPlan",
473
- "id": "id",
474
445
  "kubelet_args": "kubeletArgs",
475
446
  "labels": "labels",
476
447
  "ssh_keys": "sshKeys",
@@ -495,8 +466,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
495
466
  node_count: jsii.Number,
496
467
  plan: builtins.str,
497
468
  anti_affinity: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
498
- custom_plan: typing.Optional[typing.Union["KubernetesNodeGroupCustomPlan", typing.Dict[builtins.str, typing.Any]]] = None,
499
- id: typing.Optional[builtins.str] = None,
469
+ custom_plan: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["KubernetesNodeGroupCustomPlan", typing.Dict[builtins.str, typing.Any]]]]] = None,
500
470
  kubelet_args: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["KubernetesNodeGroupKubeletArgs", typing.Dict[builtins.str, typing.Any]]]]] = None,
501
471
  labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
502
472
  ssh_keys: typing.Optional[typing.Sequence[builtins.str]] = None,
@@ -512,24 +482,21 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
512
482
  :param lifecycle:
513
483
  :param provider:
514
484
  :param provisioners:
515
- :param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
516
- :param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
517
- :param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
518
- :param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
519
- :param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
520
- :param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
521
- :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#id KubernetesNodeGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
522
- :param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
523
- :param labels: Key-value pairs to classify the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
524
- :param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
525
- :param storage_encryption: Storage encryption strategy for the nodes in this group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
526
- :param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
527
- :param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
485
+ :param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
486
+ :param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
487
+ :param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
488
+ :param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
489
+ :param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
490
+ :param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
491
+ :param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
492
+ :param labels: User defined key-value pairs to classify the node_group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
493
+ :param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
494
+ :param storage_encryption: The storage encryption strategy to use for the nodes in this group. If not set, the cluster's storage encryption strategy will be used, if applicable. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
495
+ :param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
496
+ :param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
528
497
  '''
529
498
  if isinstance(lifecycle, dict):
530
499
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
531
- if isinstance(custom_plan, dict):
532
- custom_plan = KubernetesNodeGroupCustomPlan(**custom_plan)
533
500
  if __debug__:
534
501
  type_hints = typing.get_type_hints(_typecheckingstub__2489ae5bd3c17ee9de104387734150d3686d0bce3df0c0db5244751c51da43c4)
535
502
  check_type(argname="argument connection", value=connection, expected_type=type_hints["connection"])
@@ -545,7 +512,6 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
545
512
  check_type(argname="argument plan", value=plan, expected_type=type_hints["plan"])
546
513
  check_type(argname="argument anti_affinity", value=anti_affinity, expected_type=type_hints["anti_affinity"])
547
514
  check_type(argname="argument custom_plan", value=custom_plan, expected_type=type_hints["custom_plan"])
548
- check_type(argname="argument id", value=id, expected_type=type_hints["id"])
549
515
  check_type(argname="argument kubelet_args", value=kubelet_args, expected_type=type_hints["kubelet_args"])
550
516
  check_type(argname="argument labels", value=labels, expected_type=type_hints["labels"])
551
517
  check_type(argname="argument ssh_keys", value=ssh_keys, expected_type=type_hints["ssh_keys"])
@@ -576,8 +542,6 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
576
542
  self._values["anti_affinity"] = anti_affinity
577
543
  if custom_plan is not None:
578
544
  self._values["custom_plan"] = custom_plan
579
- if id is not None:
580
- self._values["id"] = id
581
545
  if kubelet_args is not None:
582
546
  self._values["kubelet_args"] = kubelet_args
583
547
  if labels is not None:
@@ -659,7 +623,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
659
623
  def cluster(self) -> builtins.str:
660
624
  '''UUID of the cluster.
661
625
 
662
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
626
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
663
627
  '''
664
628
  result = self._values.get("cluster")
665
629
  assert result is not None, "Required property 'cluster' is missing"
@@ -669,7 +633,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
669
633
  def name(self) -> builtins.str:
670
634
  '''The name of the node group. Needs to be unique within a cluster.
671
635
 
672
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
636
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
673
637
  '''
674
638
  result = self._values.get("name")
675
639
  assert result is not None, "Required property 'name' is missing"
@@ -679,7 +643,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
679
643
  def node_count(self) -> jsii.Number:
680
644
  '''Amount of nodes to provision in the node group.
681
645
 
682
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
646
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
683
647
  '''
684
648
  result = self._values.get("node_count")
685
649
  assert result is not None, "Required property 'node_count' is missing"
@@ -689,7 +653,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
689
653
  def plan(self) -> builtins.str:
690
654
  '''The server plan used for the node group. You can list available plans with ``upctl server plans``.
691
655
 
692
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
656
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
693
657
  '''
694
658
  result = self._values.get("plan")
695
659
  assert result is not None, "Required property 'plan' is missing"
@@ -701,31 +665,23 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
701
665
  ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
702
666
  '''If set to true, nodes in this group will be placed on separate compute hosts.
703
667
 
704
- Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware.
668
+ Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware.
705
669
 
706
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
670
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
707
671
  '''
708
672
  result = self._values.get("anti_affinity")
709
673
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
710
674
 
711
675
  @builtins.property
712
- def custom_plan(self) -> typing.Optional["KubernetesNodeGroupCustomPlan"]:
676
+ def custom_plan(
677
+ self,
678
+ ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupCustomPlan"]]]:
713
679
  '''custom_plan block.
714
680
 
715
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
681
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
716
682
  '''
717
683
  result = self._values.get("custom_plan")
718
- return typing.cast(typing.Optional["KubernetesNodeGroupCustomPlan"], result)
719
-
720
- @builtins.property
721
- def id(self) -> typing.Optional[builtins.str]:
722
- '''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#id KubernetesNodeGroup#id}.
723
-
724
- Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
725
- If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
726
- '''
727
- result = self._values.get("id")
728
- return typing.cast(typing.Optional[builtins.str], result)
684
+ return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupCustomPlan"]]], result)
729
685
 
730
686
  @builtins.property
731
687
  def kubelet_args(
@@ -733,16 +689,16 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
733
689
  ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupKubeletArgs"]]]:
734
690
  '''kubelet_args block.
735
691
 
736
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
692
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
737
693
  '''
738
694
  result = self._values.get("kubelet_args")
739
695
  return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupKubeletArgs"]]], result)
740
696
 
741
697
  @builtins.property
742
698
  def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
743
- '''Key-value pairs to classify the node group.
699
+ '''User defined key-value pairs to classify the node_group.
744
700
 
745
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
701
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
746
702
  '''
747
703
  result = self._values.get("labels")
748
704
  return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
@@ -753,16 +709,18 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
753
709
 
754
710
  This allows you to connect to the nodes via SSH once they are running.
755
711
 
756
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
712
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
757
713
  '''
758
714
  result = self._values.get("ssh_keys")
759
715
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
760
716
 
761
717
  @builtins.property
762
718
  def storage_encryption(self) -> typing.Optional[builtins.str]:
763
- '''Storage encryption strategy for the nodes in this group.
719
+ '''The storage encryption strategy to use for the nodes in this group.
720
+
721
+ If not set, the cluster's storage encryption strategy will be used, if applicable.
764
722
 
765
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
723
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
766
724
  '''
767
725
  result = self._values.get("storage_encryption")
768
726
  return typing.cast(typing.Optional[builtins.str], result)
@@ -773,7 +731,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
773
731
  ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupTaint"]]]:
774
732
  '''taint block.
775
733
 
776
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
734
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
777
735
  '''
778
736
  result = self._values.get("taint")
779
737
  return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupTaint"]]], result)
@@ -784,7 +742,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
784
742
  ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
785
743
  '''If set to false, nodes in this group will not have access to utility network.
786
744
 
787
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
745
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
788
746
  '''
789
747
  result = self._values.get("utility_network_access")
790
748
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
@@ -821,10 +779,10 @@ class KubernetesNodeGroupCustomPlan:
821
779
  storage_tier: typing.Optional[builtins.str] = None,
822
780
  ) -> None:
823
781
  '''
824
- :param cores: The number of CPU cores dedicated to individual node group nodes when using custom plan. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
825
- :param memory: The amount of memory in megabytes to assign to individual node group node when using custom plan. Value needs to be divisible by 1024. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
826
- :param storage_size: The size of the storage device in gigabytes. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
827
- :param storage_tier: The storage tier to use. Defaults to maxiops. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
782
+ :param cores: The number of CPU cores dedicated to individual node group nodes when using custom plan. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
783
+ :param memory: The amount of memory in megabytes to assign to individual node group node when using custom plan. Value needs to be divisible by 1024. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
784
+ :param storage_size: The size of the storage device in gigabytes. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
785
+ :param storage_tier: The storage tier to use. Defaults to maxiops. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
828
786
  '''
829
787
  if __debug__:
830
788
  type_hints = typing.get_type_hints(_typecheckingstub__73a7225f6a5b39ce9f22f470a4b39f4020d9c2babc3a4001d90f5a255e45917c)
@@ -844,7 +802,7 @@ class KubernetesNodeGroupCustomPlan:
844
802
  def cores(self) -> jsii.Number:
845
803
  '''The number of CPU cores dedicated to individual node group nodes when using custom plan.
846
804
 
847
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
805
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
848
806
  '''
849
807
  result = self._values.get("cores")
850
808
  assert result is not None, "Required property 'cores' is missing"
@@ -856,7 +814,7 @@ class KubernetesNodeGroupCustomPlan:
856
814
 
857
815
  Value needs to be divisible by 1024.
858
816
 
859
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
817
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
860
818
  '''
861
819
  result = self._values.get("memory")
862
820
  assert result is not None, "Required property 'memory' is missing"
@@ -866,7 +824,7 @@ class KubernetesNodeGroupCustomPlan:
866
824
  def storage_size(self) -> jsii.Number:
867
825
  '''The size of the storage device in gigabytes.
868
826
 
869
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
827
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
870
828
  '''
871
829
  result = self._values.get("storage_size")
872
830
  assert result is not None, "Required property 'storage_size' is missing"
@@ -876,7 +834,7 @@ class KubernetesNodeGroupCustomPlan:
876
834
  def storage_tier(self) -> typing.Optional[builtins.str]:
877
835
  '''The storage tier to use. Defaults to maxiops.
878
836
 
879
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
837
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
880
838
  '''
881
839
  result = self._values.get("storage_tier")
882
840
  return typing.cast(typing.Optional[builtins.str], result)
@@ -893,6 +851,96 @@ class KubernetesNodeGroupCustomPlan:
893
851
  )
894
852
 
895
853
 
854
+ class KubernetesNodeGroupCustomPlanList(
855
+ _cdktf_9a9027ec.ComplexList,
856
+ metaclass=jsii.JSIIMeta,
857
+ jsii_type="@cdktf/provider-upcloud.kubernetesNodeGroup.KubernetesNodeGroupCustomPlanList",
858
+ ):
859
+ def __init__(
860
+ self,
861
+ terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
862
+ terraform_attribute: builtins.str,
863
+ wraps_set: builtins.bool,
864
+ ) -> None:
865
+ '''
866
+ :param terraform_resource: The parent resource.
867
+ :param terraform_attribute: The attribute on the parent resource this class is referencing.
868
+ :param wraps_set: whether the list is wrapping a set (will add tolist() to be able to access an item via an index).
869
+ '''
870
+ if __debug__:
871
+ type_hints = typing.get_type_hints(_typecheckingstub__b550730c152cdd521877d4cd4a76b2d1f548d64a196dbde61f47c82b091e854a)
872
+ check_type(argname="argument terraform_resource", value=terraform_resource, expected_type=type_hints["terraform_resource"])
873
+ check_type(argname="argument terraform_attribute", value=terraform_attribute, expected_type=type_hints["terraform_attribute"])
874
+ check_type(argname="argument wraps_set", value=wraps_set, expected_type=type_hints["wraps_set"])
875
+ jsii.create(self.__class__, self, [terraform_resource, terraform_attribute, wraps_set])
876
+
877
+ @jsii.member(jsii_name="get")
878
+ def get(self, index: jsii.Number) -> "KubernetesNodeGroupCustomPlanOutputReference":
879
+ '''
880
+ :param index: the index of the item to return.
881
+ '''
882
+ if __debug__:
883
+ type_hints = typing.get_type_hints(_typecheckingstub__ad2db79018ca305418ade3285985b0c22792d72ade4279a8d56d4cc611707192)
884
+ check_type(argname="argument index", value=index, expected_type=type_hints["index"])
885
+ return typing.cast("KubernetesNodeGroupCustomPlanOutputReference", jsii.invoke(self, "get", [index]))
886
+
887
+ @builtins.property
888
+ @jsii.member(jsii_name="terraformAttribute")
889
+ def _terraform_attribute(self) -> builtins.str:
890
+ '''The attribute on the parent resource this class is referencing.'''
891
+ return typing.cast(builtins.str, jsii.get(self, "terraformAttribute"))
892
+
893
+ @_terraform_attribute.setter
894
+ def _terraform_attribute(self, value: builtins.str) -> None:
895
+ if __debug__:
896
+ type_hints = typing.get_type_hints(_typecheckingstub__146491c26357a66d3726100bdae7a85cd1ce3f9d133170c7b888e4371863e15b)
897
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
898
+ jsii.set(self, "terraformAttribute", value) # pyright: ignore[reportArgumentType]
899
+
900
+ @builtins.property
901
+ @jsii.member(jsii_name="terraformResource")
902
+ def _terraform_resource(self) -> _cdktf_9a9027ec.IInterpolatingParent:
903
+ '''The parent resource.'''
904
+ return typing.cast(_cdktf_9a9027ec.IInterpolatingParent, jsii.get(self, "terraformResource"))
905
+
906
+ @_terraform_resource.setter
907
+ def _terraform_resource(self, value: _cdktf_9a9027ec.IInterpolatingParent) -> None:
908
+ if __debug__:
909
+ type_hints = typing.get_type_hints(_typecheckingstub__981f0a78ff74ee055d79706678f7855b237a9c0e1fa4f77d6f528bc29b193924)
910
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
911
+ jsii.set(self, "terraformResource", value) # pyright: ignore[reportArgumentType]
912
+
913
+ @builtins.property
914
+ @jsii.member(jsii_name="wrapsSet")
915
+ def _wraps_set(self) -> builtins.bool:
916
+ '''whether the list is wrapping a set (will add tolist() to be able to access an item via an index).'''
917
+ return typing.cast(builtins.bool, jsii.get(self, "wrapsSet"))
918
+
919
+ @_wraps_set.setter
920
+ def _wraps_set(self, value: builtins.bool) -> None:
921
+ if __debug__:
922
+ type_hints = typing.get_type_hints(_typecheckingstub__de8e36f34a796164d1d848fa9ee03d21d32d20da9d69b2969c70bd64366fc15e)
923
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
924
+ jsii.set(self, "wrapsSet", value) # pyright: ignore[reportArgumentType]
925
+
926
+ @builtins.property
927
+ @jsii.member(jsii_name="internalValue")
928
+ def internal_value(
929
+ self,
930
+ ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List[KubernetesNodeGroupCustomPlan]]]:
931
+ return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List[KubernetesNodeGroupCustomPlan]]], jsii.get(self, "internalValue"))
932
+
933
+ @internal_value.setter
934
+ def internal_value(
935
+ self,
936
+ value: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List[KubernetesNodeGroupCustomPlan]]],
937
+ ) -> None:
938
+ if __debug__:
939
+ type_hints = typing.get_type_hints(_typecheckingstub__15bf7d5bcd50f8e0b7df457f502a8bb9362ca3bf6ab8c3190246a91e31ac4fb9)
940
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
941
+ jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
942
+
943
+
896
944
  class KubernetesNodeGroupCustomPlanOutputReference(
897
945
  _cdktf_9a9027ec.ComplexObject,
898
946
  metaclass=jsii.JSIIMeta,
@@ -902,16 +950,22 @@ class KubernetesNodeGroupCustomPlanOutputReference(
902
950
  self,
903
951
  terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
904
952
  terraform_attribute: builtins.str,
953
+ complex_object_index: jsii.Number,
954
+ complex_object_is_from_set: builtins.bool,
905
955
  ) -> None:
906
956
  '''
907
957
  :param terraform_resource: The parent resource.
908
958
  :param terraform_attribute: The attribute on the parent resource this class is referencing.
959
+ :param complex_object_index: the index of this item in the list.
960
+ :param complex_object_is_from_set: whether the list is wrapping a set (will add tolist() to be able to access an item via an index).
909
961
  '''
910
962
  if __debug__:
911
963
  type_hints = typing.get_type_hints(_typecheckingstub__8d2b117bf11d56c5c2ad00b1177ef138495c9f14ccd650ff5fcac5bedc510e7f)
912
964
  check_type(argname="argument terraform_resource", value=terraform_resource, expected_type=type_hints["terraform_resource"])
913
965
  check_type(argname="argument terraform_attribute", value=terraform_attribute, expected_type=type_hints["terraform_attribute"])
914
- jsii.create(self.__class__, self, [terraform_resource, terraform_attribute])
966
+ check_type(argname="argument complex_object_index", value=complex_object_index, expected_type=type_hints["complex_object_index"])
967
+ check_type(argname="argument complex_object_is_from_set", value=complex_object_is_from_set, expected_type=type_hints["complex_object_is_from_set"])
968
+ jsii.create(self.__class__, self, [terraform_resource, terraform_attribute, complex_object_index, complex_object_is_from_set])
915
969
 
916
970
  @jsii.member(jsii_name="resetStorageTier")
917
971
  def reset_storage_tier(self) -> None:
@@ -987,13 +1041,15 @@ class KubernetesNodeGroupCustomPlanOutputReference(
987
1041
 
988
1042
  @builtins.property
989
1043
  @jsii.member(jsii_name="internalValue")
990
- def internal_value(self) -> typing.Optional[KubernetesNodeGroupCustomPlan]:
991
- return typing.cast(typing.Optional[KubernetesNodeGroupCustomPlan], jsii.get(self, "internalValue"))
1044
+ def internal_value(
1045
+ self,
1046
+ ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, KubernetesNodeGroupCustomPlan]]:
1047
+ return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, KubernetesNodeGroupCustomPlan]], jsii.get(self, "internalValue"))
992
1048
 
993
1049
  @internal_value.setter
994
1050
  def internal_value(
995
1051
  self,
996
- value: typing.Optional[KubernetesNodeGroupCustomPlan],
1052
+ value: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, KubernetesNodeGroupCustomPlan]],
997
1053
  ) -> None:
998
1054
  if __debug__:
999
1055
  type_hints = typing.get_type_hints(_typecheckingstub__c7a11f561e4b919a685206286a7eed09483e309fbeeea066dff67583e94f0c7a)
@@ -1009,8 +1065,8 @@ class KubernetesNodeGroupCustomPlanOutputReference(
1009
1065
  class KubernetesNodeGroupKubeletArgs:
1010
1066
  def __init__(self, *, key: builtins.str, value: builtins.str) -> None:
1011
1067
  '''
1012
- :param key: Kubelet argument key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1013
- :param value: Kubelet argument value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1068
+ :param key: Kubelet argument key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1069
+ :param value: Kubelet argument value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1014
1070
  '''
1015
1071
  if __debug__:
1016
1072
  type_hints = typing.get_type_hints(_typecheckingstub__842da686c29c5adfe37f8e21bb7186ee26ad8d4d70cd1e8579de468f13543803)
@@ -1025,7 +1081,7 @@ class KubernetesNodeGroupKubeletArgs:
1025
1081
  def key(self) -> builtins.str:
1026
1082
  '''Kubelet argument key.
1027
1083
 
1028
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1084
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1029
1085
  '''
1030
1086
  result = self._values.get("key")
1031
1087
  assert result is not None, "Required property 'key' is missing"
@@ -1035,7 +1091,7 @@ class KubernetesNodeGroupKubeletArgs:
1035
1091
  def value(self) -> builtins.str:
1036
1092
  '''Kubelet argument value.
1037
1093
 
1038
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1094
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1039
1095
  '''
1040
1096
  result = self._values.get("value")
1041
1097
  assert result is not None, "Required property 'value' is missing"
@@ -1238,9 +1294,9 @@ class KubernetesNodeGroupTaint:
1238
1294
  value: builtins.str,
1239
1295
  ) -> None:
1240
1296
  '''
1241
- :param effect: Taint effect. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
1242
- :param key: Taint key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1243
- :param value: Taint value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1297
+ :param effect: Taint effect. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
1298
+ :param key: Taint key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1299
+ :param value: Taint value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1244
1300
  '''
1245
1301
  if __debug__:
1246
1302
  type_hints = typing.get_type_hints(_typecheckingstub__ea59ebf2232eca6d3573e469ce94ebcc61818a93352ae4370837428874ad8b8e)
@@ -1257,7 +1313,7 @@ class KubernetesNodeGroupTaint:
1257
1313
  def effect(self) -> builtins.str:
1258
1314
  '''Taint effect.
1259
1315
 
1260
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
1316
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
1261
1317
  '''
1262
1318
  result = self._values.get("effect")
1263
1319
  assert result is not None, "Required property 'effect' is missing"
@@ -1267,7 +1323,7 @@ class KubernetesNodeGroupTaint:
1267
1323
  def key(self) -> builtins.str:
1268
1324
  '''Taint key.
1269
1325
 
1270
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1326
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1271
1327
  '''
1272
1328
  result = self._values.get("key")
1273
1329
  assert result is not None, "Required property 'key' is missing"
@@ -1277,7 +1333,7 @@ class KubernetesNodeGroupTaint:
1277
1333
  def value(self) -> builtins.str:
1278
1334
  '''Taint value.
1279
1335
 
1280
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1336
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1281
1337
  '''
1282
1338
  result = self._values.get("value")
1283
1339
  assert result is not None, "Required property 'value' is missing"
@@ -1484,6 +1540,7 @@ __all__ = [
1484
1540
  "KubernetesNodeGroup",
1485
1541
  "KubernetesNodeGroupConfig",
1486
1542
  "KubernetesNodeGroupCustomPlan",
1543
+ "KubernetesNodeGroupCustomPlanList",
1487
1544
  "KubernetesNodeGroupCustomPlanOutputReference",
1488
1545
  "KubernetesNodeGroupKubeletArgs",
1489
1546
  "KubernetesNodeGroupKubeletArgsList",
@@ -1497,15 +1554,14 @@ publication.publish()
1497
1554
 
1498
1555
  def _typecheckingstub__8bbcd241d9ab4cfd557f0a030c928c51f93c7d6d9f343e0bcdbdda3cbc8065e3(
1499
1556
  scope: _constructs_77d1e7e8.Construct,
1500
- id_: builtins.str,
1557
+ id: builtins.str,
1501
1558
  *,
1502
1559
  cluster: builtins.str,
1503
1560
  name: builtins.str,
1504
1561
  node_count: jsii.Number,
1505
1562
  plan: builtins.str,
1506
1563
  anti_affinity: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
1507
- custom_plan: typing.Optional[typing.Union[KubernetesNodeGroupCustomPlan, typing.Dict[builtins.str, typing.Any]]] = None,
1508
- id: typing.Optional[builtins.str] = None,
1564
+ custom_plan: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[KubernetesNodeGroupCustomPlan, typing.Dict[builtins.str, typing.Any]]]]] = None,
1509
1565
  kubelet_args: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[KubernetesNodeGroupKubeletArgs, typing.Dict[builtins.str, typing.Any]]]]] = None,
1510
1566
  labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
1511
1567
  ssh_keys: typing.Optional[typing.Sequence[builtins.str]] = None,
@@ -1532,6 +1588,12 @@ def _typecheckingstub__8e4418f3bc7d50550f1d889edee827b87fd9884602972643c6b82f110
1532
1588
  """Type checking stubs"""
1533
1589
  pass
1534
1590
 
1591
+ def _typecheckingstub__710eeb24e681bc1abd473c02c09c72cd25116f5c53784cd07b46e161d215c56f(
1592
+ value: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[KubernetesNodeGroupCustomPlan, typing.Dict[builtins.str, typing.Any]]]],
1593
+ ) -> None:
1594
+ """Type checking stubs"""
1595
+ pass
1596
+
1535
1597
  def _typecheckingstub__32e3828076130e1cbd29ccb900f4d6ed322c27ffe5fa92f4dab04d41c7227a1f(
1536
1598
  value: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[KubernetesNodeGroupKubeletArgs, typing.Dict[builtins.str, typing.Any]]]],
1537
1599
  ) -> None:
@@ -1556,12 +1618,6 @@ def _typecheckingstub__251ecefce0fab4086841f5905fdd68a5182667a221b0cf9910dbc14ee
1556
1618
  """Type checking stubs"""
1557
1619
  pass
1558
1620
 
1559
- def _typecheckingstub__ee7527cb3aa5a925a82a9e87349717ac3d3a6787a09bf36f1f31df75fa2af7f6(
1560
- value: builtins.str,
1561
- ) -> None:
1562
- """Type checking stubs"""
1563
- pass
1564
-
1565
1621
  def _typecheckingstub__fccb7b922d5d84e539f4c8817753636ee4b2f0dec095ea9ff13030c9d7a17d58(
1566
1622
  value: typing.Mapping[builtins.str, builtins.str],
1567
1623
  ) -> None:
@@ -1618,8 +1674,7 @@ def _typecheckingstub__2489ae5bd3c17ee9de104387734150d3686d0bce3df0c0db5244751c5
1618
1674
  node_count: jsii.Number,
1619
1675
  plan: builtins.str,
1620
1676
  anti_affinity: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
1621
- custom_plan: typing.Optional[typing.Union[KubernetesNodeGroupCustomPlan, typing.Dict[builtins.str, typing.Any]]] = None,
1622
- id: typing.Optional[builtins.str] = None,
1677
+ custom_plan: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[KubernetesNodeGroupCustomPlan, typing.Dict[builtins.str, typing.Any]]]]] = None,
1623
1678
  kubelet_args: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[KubernetesNodeGroupKubeletArgs, typing.Dict[builtins.str, typing.Any]]]]] = None,
1624
1679
  labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
1625
1680
  ssh_keys: typing.Optional[typing.Sequence[builtins.str]] = None,
@@ -1640,9 +1695,49 @@ def _typecheckingstub__73a7225f6a5b39ce9f22f470a4b39f4020d9c2babc3a4001d90f5a255
1640
1695
  """Type checking stubs"""
1641
1696
  pass
1642
1697
 
1698
+ def _typecheckingstub__b550730c152cdd521877d4cd4a76b2d1f548d64a196dbde61f47c82b091e854a(
1699
+ terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
1700
+ terraform_attribute: builtins.str,
1701
+ wraps_set: builtins.bool,
1702
+ ) -> None:
1703
+ """Type checking stubs"""
1704
+ pass
1705
+
1706
+ def _typecheckingstub__ad2db79018ca305418ade3285985b0c22792d72ade4279a8d56d4cc611707192(
1707
+ index: jsii.Number,
1708
+ ) -> None:
1709
+ """Type checking stubs"""
1710
+ pass
1711
+
1712
+ def _typecheckingstub__146491c26357a66d3726100bdae7a85cd1ce3f9d133170c7b888e4371863e15b(
1713
+ value: builtins.str,
1714
+ ) -> None:
1715
+ """Type checking stubs"""
1716
+ pass
1717
+
1718
+ def _typecheckingstub__981f0a78ff74ee055d79706678f7855b237a9c0e1fa4f77d6f528bc29b193924(
1719
+ value: _cdktf_9a9027ec.IInterpolatingParent,
1720
+ ) -> None:
1721
+ """Type checking stubs"""
1722
+ pass
1723
+
1724
+ def _typecheckingstub__de8e36f34a796164d1d848fa9ee03d21d32d20da9d69b2969c70bd64366fc15e(
1725
+ value: builtins.bool,
1726
+ ) -> None:
1727
+ """Type checking stubs"""
1728
+ pass
1729
+
1730
+ def _typecheckingstub__15bf7d5bcd50f8e0b7df457f502a8bb9362ca3bf6ab8c3190246a91e31ac4fb9(
1731
+ value: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List[KubernetesNodeGroupCustomPlan]]],
1732
+ ) -> None:
1733
+ """Type checking stubs"""
1734
+ pass
1735
+
1643
1736
  def _typecheckingstub__8d2b117bf11d56c5c2ad00b1177ef138495c9f14ccd650ff5fcac5bedc510e7f(
1644
1737
  terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
1645
1738
  terraform_attribute: builtins.str,
1739
+ complex_object_index: jsii.Number,
1740
+ complex_object_is_from_set: builtins.bool,
1646
1741
  ) -> None:
1647
1742
  """Type checking stubs"""
1648
1743
  pass
@@ -1672,7 +1767,7 @@ def _typecheckingstub__7b087d3351ca31ac1af59c32711d8f4d022346ac4bccf9ec972df910f
1672
1767
  pass
1673
1768
 
1674
1769
  def _typecheckingstub__c7a11f561e4b919a685206286a7eed09483e309fbeeea066dff67583e94f0c7a(
1675
- value: typing.Optional[KubernetesNodeGroupCustomPlan],
1770
+ value: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, KubernetesNodeGroupCustomPlan]],
1676
1771
  ) -> None:
1677
1772
  """Type checking stubs"""
1678
1773
  pass