cdktf-cdktf-provider-upcloud 15.2.2__py3-none-any.whl → 15.3.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.

Files changed (69) hide show
  1. cdktf_cdktf_provider_upcloud/__init__.py +3 -3
  2. cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
  3. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.3.0.jsii.tgz +0 -0
  4. cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +9 -9
  5. cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +12 -7
  6. cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +7 -7
  7. cdktf_cdktf_provider_upcloud/data_upcloud_load_balancer_dns_challenge_domain/__init__.py +4 -4
  8. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
  9. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
  10. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
  11. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
  12. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_valkey_sessions/__init__.py +22 -22
  13. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +10 -10
  14. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
  15. cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
  16. cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +28 -28
  17. cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
  18. cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
  19. cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +7 -7
  20. cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +38 -38
  21. cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +63 -16
  22. cdktf_cdktf_provider_upcloud/gateway/__init__.py +37 -37
  23. cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +34 -34
  24. cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +61 -61
  25. cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +34 -34
  26. cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +72 -72
  27. cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +392 -39
  28. cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +46 -46
  29. cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +13 -13
  30. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +25 -25
  31. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +13 -13
  32. cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +33 -33
  33. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +228 -228
  34. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +13 -13
  35. cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +16 -16
  36. cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +28 -28
  37. cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +25 -25
  38. cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
  39. cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +210 -210
  40. cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +594 -594
  41. cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +366 -366
  42. cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +132 -132
  43. cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +65 -65
  44. cdktf_cdktf_provider_upcloud/managed_database_valkey/__init__.py +135 -135
  45. cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +30 -30
  46. cdktf_cdktf_provider_upcloud/managed_object_storage_bucket/__init__.py +10 -10
  47. cdktf_cdktf_provider_upcloud/managed_object_storage_custom_domain/__init__.py +13 -13
  48. cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +16 -16
  49. cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +13 -13
  50. cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +16 -16
  51. cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +16 -16
  52. cdktf_cdktf_provider_upcloud/network/__init__.py +33 -33
  53. cdktf_cdktf_provider_upcloud/network_peering/__init__.py +23 -23
  54. cdktf_cdktf_provider_upcloud/object_storage/__init__.py +30 -30
  55. cdktf_cdktf_provider_upcloud/provider/__init__.py +28 -28
  56. cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
  57. cdktf_cdktf_provider_upcloud/server/__init__.py +139 -139
  58. cdktf_cdktf_provider_upcloud/server_group/__init__.py +19 -19
  59. cdktf_cdktf_provider_upcloud/storage/__init__.py +51 -51
  60. cdktf_cdktf_provider_upcloud/storage_backup/__init__.py +13 -13
  61. cdktf_cdktf_provider_upcloud/storage_template/__init__.py +13 -13
  62. cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
  63. {cdktf_cdktf_provider_upcloud-15.2.2.dist-info → cdktf_cdktf_provider_upcloud-15.3.0.dist-info}/METADATA +5 -5
  64. cdktf_cdktf_provider_upcloud-15.3.0.dist-info/RECORD +68 -0
  65. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.2.2.jsii.tgz +0 -0
  66. cdktf_cdktf_provider_upcloud-15.2.2.dist-info/RECORD +0 -68
  67. {cdktf_cdktf_provider_upcloud-15.2.2.dist-info → cdktf_cdktf_provider_upcloud-15.3.0.dist-info}/LICENSE +0 -0
  68. {cdktf_cdktf_provider_upcloud-15.2.2.dist-info → cdktf_cdktf_provider_upcloud-15.3.0.dist-info}/WHEEL +0 -0
  69. {cdktf_cdktf_provider_upcloud-15.2.2.dist-info → cdktf_cdktf_provider_upcloud-15.3.0.dist-info}/top_level.txt +0 -0
@@ -1,7 +1,7 @@
1
1
  r'''
2
2
  # `upcloud_gateway_connection_tunnel`
3
3
 
4
- Refer to the Terraform Registry for docs: [`upcloud_gateway_connection_tunnel`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel).
4
+ Refer to the Terraform Registry for docs: [`upcloud_gateway_connection_tunnel`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -44,7 +44,7 @@ class GatewayConnectionTunnel(
44
44
  metaclass=jsii.JSIIMeta,
45
45
  jsii_type="@cdktf/provider-upcloud.gatewayConnectionTunnel.GatewayConnectionTunnel",
46
46
  ):
47
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel upcloud_gateway_connection_tunnel}.'''
47
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel upcloud_gateway_connection_tunnel}.'''
48
48
 
49
49
  def __init__(
50
50
  self,
@@ -66,17 +66,17 @@ class GatewayConnectionTunnel(
66
66
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
67
67
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
68
68
  ) -> None:
69
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel upcloud_gateway_connection_tunnel} Resource.
69
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel upcloud_gateway_connection_tunnel} Resource.
70
70
 
71
71
  :param scope: The scope in which to define this construct.
72
72
  :param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
73
- :param connection_id: ID of the upcloud_gateway_connection resource to which the tunnel belongs. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#connection_id GatewayConnectionTunnel#connection_id}
74
- :param ipsec_auth_psk: ipsec_auth_psk block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#ipsec_auth_psk GatewayConnectionTunnel#ipsec_auth_psk}
75
- :param local_address_name: Public (UpCloud) endpoint address of this tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#local_address_name GatewayConnectionTunnel#local_address_name}
76
- :param name: The name of the tunnel, should be unique within the connection. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#name GatewayConnectionTunnel#name}
77
- :param remote_address: Remote public IP address of the tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#remote_address GatewayConnectionTunnel#remote_address}
78
- :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#id GatewayConnectionTunnel#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
79
- :param ipsec_properties: ipsec_properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#ipsec_properties GatewayConnectionTunnel#ipsec_properties}
73
+ :param connection_id: ID of the upcloud_gateway_connection resource to which the tunnel belongs. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#connection_id GatewayConnectionTunnel#connection_id}
74
+ :param ipsec_auth_psk: ipsec_auth_psk block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#ipsec_auth_psk GatewayConnectionTunnel#ipsec_auth_psk}
75
+ :param local_address_name: Public (UpCloud) endpoint address of this tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#local_address_name GatewayConnectionTunnel#local_address_name}
76
+ :param name: The name of the tunnel, should be unique within the connection. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#name GatewayConnectionTunnel#name}
77
+ :param remote_address: Remote public IP address of the tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#remote_address GatewayConnectionTunnel#remote_address}
78
+ :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#id GatewayConnectionTunnel#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
79
+ :param ipsec_properties: ipsec_properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#ipsec_properties GatewayConnectionTunnel#ipsec_properties}
80
80
  :param connection:
81
81
  :param count:
82
82
  :param depends_on:
@@ -121,7 +121,7 @@ class GatewayConnectionTunnel(
121
121
 
122
122
  :param scope: The scope in which to define this construct.
123
123
  :param import_to_id: The construct id used in the generated config for the GatewayConnectionTunnel to import.
124
- :param import_from_id: The id of the existing GatewayConnectionTunnel that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#import import section} in the documentation of this resource for the id to use
124
+ :param import_from_id: The id of the existing GatewayConnectionTunnel that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#import import section} in the documentation of this resource for the id to use
125
125
  :param provider: ? Optional instance of the provider where the GatewayConnectionTunnel to import is found.
126
126
  '''
127
127
  if __debug__:
@@ -135,7 +135,7 @@ class GatewayConnectionTunnel(
135
135
  @jsii.member(jsii_name="putIpsecAuthPsk")
136
136
  def put_ipsec_auth_psk(self, *, psk: builtins.str) -> None:
137
137
  '''
138
- :param psk: The pre-shared key. This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#psk GatewayConnectionTunnel#psk}
138
+ :param psk: The pre-shared key. This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#psk GatewayConnectionTunnel#psk}
139
139
  '''
140
140
  value = GatewayConnectionTunnelIpsecAuthPsk(psk=psk)
141
141
 
@@ -158,17 +158,17 @@ class GatewayConnectionTunnel(
158
158
  rekey_time: typing.Optional[jsii.Number] = None,
159
159
  ) -> None:
160
160
  '''
161
- :param child_rekey_time: IKE child SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#child_rekey_time GatewayConnectionTunnel#child_rekey_time}
162
- :param dpd_delay: Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#dpd_delay GatewayConnectionTunnel#dpd_delay}
163
- :param dpd_timeout: Timeout period for DPD reply before considering the peer to be dead, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#dpd_timeout GatewayConnectionTunnel#dpd_timeout}
164
- :param ike_lifetime: Maximum IKE SA lifetime in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#ike_lifetime GatewayConnectionTunnel#ike_lifetime}
165
- :param phase1_algorithms: List of Phase 1: Proposal algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#phase1_algorithms GatewayConnectionTunnel#phase1_algorithms}
166
- :param phase1_dh_group_numbers: List of Phase 1 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#phase1_dh_group_numbers GatewayConnectionTunnel#phase1_dh_group_numbers}
167
- :param phase1_integrity_algorithms: List of Phase 1 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#phase1_integrity_algorithms GatewayConnectionTunnel#phase1_integrity_algorithms}
168
- :param phase2_algorithms: List of Phase 2: Security Association algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#phase2_algorithms GatewayConnectionTunnel#phase2_algorithms}
169
- :param phase2_dh_group_numbers: List of Phase 2 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#phase2_dh_group_numbers GatewayConnectionTunnel#phase2_dh_group_numbers}
170
- :param phase2_integrity_algorithms: List of Phase 2 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#phase2_integrity_algorithms GatewayConnectionTunnel#phase2_integrity_algorithms}
171
- :param rekey_time: IKE SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#rekey_time GatewayConnectionTunnel#rekey_time}
161
+ :param child_rekey_time: IKE child SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#child_rekey_time GatewayConnectionTunnel#child_rekey_time}
162
+ :param dpd_delay: Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#dpd_delay GatewayConnectionTunnel#dpd_delay}
163
+ :param dpd_timeout: Timeout period for DPD reply before considering the peer to be dead, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#dpd_timeout GatewayConnectionTunnel#dpd_timeout}
164
+ :param ike_lifetime: Maximum IKE SA lifetime in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#ike_lifetime GatewayConnectionTunnel#ike_lifetime}
165
+ :param phase1_algorithms: List of Phase 1: Proposal algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase1_algorithms GatewayConnectionTunnel#phase1_algorithms}
166
+ :param phase1_dh_group_numbers: List of Phase 1 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase1_dh_group_numbers GatewayConnectionTunnel#phase1_dh_group_numbers}
167
+ :param phase1_integrity_algorithms: List of Phase 1 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase1_integrity_algorithms GatewayConnectionTunnel#phase1_integrity_algorithms}
168
+ :param phase2_algorithms: List of Phase 2: Security Association algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase2_algorithms GatewayConnectionTunnel#phase2_algorithms}
169
+ :param phase2_dh_group_numbers: List of Phase 2 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase2_dh_group_numbers GatewayConnectionTunnel#phase2_dh_group_numbers}
170
+ :param phase2_integrity_algorithms: List of Phase 2 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase2_integrity_algorithms GatewayConnectionTunnel#phase2_integrity_algorithms}
171
+ :param rekey_time: IKE SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#rekey_time GatewayConnectionTunnel#rekey_time}
172
172
  '''
173
173
  value = GatewayConnectionTunnelIpsecProperties(
174
174
  child_rekey_time=child_rekey_time,
@@ -376,13 +376,13 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
376
376
  :param lifecycle:
377
377
  :param provider:
378
378
  :param provisioners:
379
- :param connection_id: ID of the upcloud_gateway_connection resource to which the tunnel belongs. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#connection_id GatewayConnectionTunnel#connection_id}
380
- :param ipsec_auth_psk: ipsec_auth_psk block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#ipsec_auth_psk GatewayConnectionTunnel#ipsec_auth_psk}
381
- :param local_address_name: Public (UpCloud) endpoint address of this tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#local_address_name GatewayConnectionTunnel#local_address_name}
382
- :param name: The name of the tunnel, should be unique within the connection. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#name GatewayConnectionTunnel#name}
383
- :param remote_address: Remote public IP address of the tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#remote_address GatewayConnectionTunnel#remote_address}
384
- :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#id GatewayConnectionTunnel#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
385
- :param ipsec_properties: ipsec_properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#ipsec_properties GatewayConnectionTunnel#ipsec_properties}
379
+ :param connection_id: ID of the upcloud_gateway_connection resource to which the tunnel belongs. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#connection_id GatewayConnectionTunnel#connection_id}
380
+ :param ipsec_auth_psk: ipsec_auth_psk block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#ipsec_auth_psk GatewayConnectionTunnel#ipsec_auth_psk}
381
+ :param local_address_name: Public (UpCloud) endpoint address of this tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#local_address_name GatewayConnectionTunnel#local_address_name}
382
+ :param name: The name of the tunnel, should be unique within the connection. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#name GatewayConnectionTunnel#name}
383
+ :param remote_address: Remote public IP address of the tunnel. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#remote_address GatewayConnectionTunnel#remote_address}
384
+ :param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#id GatewayConnectionTunnel#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
385
+ :param ipsec_properties: ipsec_properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#ipsec_properties GatewayConnectionTunnel#ipsec_properties}
386
386
  '''
387
387
  if isinstance(lifecycle, dict):
388
388
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -500,7 +500,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
500
500
  def connection_id(self) -> builtins.str:
501
501
  '''ID of the upcloud_gateway_connection resource to which the tunnel belongs.
502
502
 
503
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#connection_id GatewayConnectionTunnel#connection_id}
503
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#connection_id GatewayConnectionTunnel#connection_id}
504
504
  '''
505
505
  result = self._values.get("connection_id")
506
506
  assert result is not None, "Required property 'connection_id' is missing"
@@ -510,7 +510,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
510
510
  def ipsec_auth_psk(self) -> "GatewayConnectionTunnelIpsecAuthPsk":
511
511
  '''ipsec_auth_psk block.
512
512
 
513
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#ipsec_auth_psk GatewayConnectionTunnel#ipsec_auth_psk}
513
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#ipsec_auth_psk GatewayConnectionTunnel#ipsec_auth_psk}
514
514
  '''
515
515
  result = self._values.get("ipsec_auth_psk")
516
516
  assert result is not None, "Required property 'ipsec_auth_psk' is missing"
@@ -520,7 +520,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
520
520
  def local_address_name(self) -> builtins.str:
521
521
  '''Public (UpCloud) endpoint address of this tunnel.
522
522
 
523
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#local_address_name GatewayConnectionTunnel#local_address_name}
523
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#local_address_name GatewayConnectionTunnel#local_address_name}
524
524
  '''
525
525
  result = self._values.get("local_address_name")
526
526
  assert result is not None, "Required property 'local_address_name' is missing"
@@ -530,7 +530,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
530
530
  def name(self) -> builtins.str:
531
531
  '''The name of the tunnel, should be unique within the connection.
532
532
 
533
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#name GatewayConnectionTunnel#name}
533
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#name GatewayConnectionTunnel#name}
534
534
  '''
535
535
  result = self._values.get("name")
536
536
  assert result is not None, "Required property 'name' is missing"
@@ -540,7 +540,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
540
540
  def remote_address(self) -> builtins.str:
541
541
  '''Remote public IP address of the tunnel.
542
542
 
543
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#remote_address GatewayConnectionTunnel#remote_address}
543
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#remote_address GatewayConnectionTunnel#remote_address}
544
544
  '''
545
545
  result = self._values.get("remote_address")
546
546
  assert result is not None, "Required property 'remote_address' is missing"
@@ -548,7 +548,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
548
548
 
549
549
  @builtins.property
550
550
  def id(self) -> typing.Optional[builtins.str]:
551
- '''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#id GatewayConnectionTunnel#id}.
551
+ '''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#id GatewayConnectionTunnel#id}.
552
552
 
553
553
  Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
554
554
  If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
@@ -562,7 +562,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
562
562
  ) -> typing.Optional["GatewayConnectionTunnelIpsecProperties"]:
563
563
  '''ipsec_properties block.
564
564
 
565
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#ipsec_properties GatewayConnectionTunnel#ipsec_properties}
565
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#ipsec_properties GatewayConnectionTunnel#ipsec_properties}
566
566
  '''
567
567
  result = self._values.get("ipsec_properties")
568
568
  return typing.cast(typing.Optional["GatewayConnectionTunnelIpsecProperties"], result)
@@ -587,7 +587,7 @@ class GatewayConnectionTunnelConfig(_cdktf_9a9027ec.TerraformMetaArguments):
587
587
  class GatewayConnectionTunnelIpsecAuthPsk:
588
588
  def __init__(self, *, psk: builtins.str) -> None:
589
589
  '''
590
- :param psk: The pre-shared key. This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#psk GatewayConnectionTunnel#psk}
590
+ :param psk: The pre-shared key. This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#psk GatewayConnectionTunnel#psk}
591
591
  '''
592
592
  if __debug__:
593
593
  type_hints = typing.get_type_hints(_typecheckingstub__87c835e7d7c5605931c1ca38462874908e77d68cd5b951debc157a3d43ca979a)
@@ -602,7 +602,7 @@ class GatewayConnectionTunnelIpsecAuthPsk:
602
602
 
603
603
  This value is only used during resource creation and is not returned in the state. It is not possible to update this value. If you need to update it, delete the connection and create a new one.
604
604
 
605
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#psk GatewayConnectionTunnel#psk}
605
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#psk GatewayConnectionTunnel#psk}
606
606
  '''
607
607
  result = self._values.get("psk")
608
608
  assert result is not None, "Required property 'psk' is missing"
@@ -707,17 +707,17 @@ class GatewayConnectionTunnelIpsecProperties:
707
707
  rekey_time: typing.Optional[jsii.Number] = None,
708
708
  ) -> None:
709
709
  '''
710
- :param child_rekey_time: IKE child SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#child_rekey_time GatewayConnectionTunnel#child_rekey_time}
711
- :param dpd_delay: Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#dpd_delay GatewayConnectionTunnel#dpd_delay}
712
- :param dpd_timeout: Timeout period for DPD reply before considering the peer to be dead, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#dpd_timeout GatewayConnectionTunnel#dpd_timeout}
713
- :param ike_lifetime: Maximum IKE SA lifetime in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#ike_lifetime GatewayConnectionTunnel#ike_lifetime}
714
- :param phase1_algorithms: List of Phase 1: Proposal algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#phase1_algorithms GatewayConnectionTunnel#phase1_algorithms}
715
- :param phase1_dh_group_numbers: List of Phase 1 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#phase1_dh_group_numbers GatewayConnectionTunnel#phase1_dh_group_numbers}
716
- :param phase1_integrity_algorithms: List of Phase 1 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#phase1_integrity_algorithms GatewayConnectionTunnel#phase1_integrity_algorithms}
717
- :param phase2_algorithms: List of Phase 2: Security Association algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#phase2_algorithms GatewayConnectionTunnel#phase2_algorithms}
718
- :param phase2_dh_group_numbers: List of Phase 2 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#phase2_dh_group_numbers GatewayConnectionTunnel#phase2_dh_group_numbers}
719
- :param phase2_integrity_algorithms: List of Phase 2 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#phase2_integrity_algorithms GatewayConnectionTunnel#phase2_integrity_algorithms}
720
- :param rekey_time: IKE SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#rekey_time GatewayConnectionTunnel#rekey_time}
710
+ :param child_rekey_time: IKE child SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#child_rekey_time GatewayConnectionTunnel#child_rekey_time}
711
+ :param dpd_delay: Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#dpd_delay GatewayConnectionTunnel#dpd_delay}
712
+ :param dpd_timeout: Timeout period for DPD reply before considering the peer to be dead, in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#dpd_timeout GatewayConnectionTunnel#dpd_timeout}
713
+ :param ike_lifetime: Maximum IKE SA lifetime in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#ike_lifetime GatewayConnectionTunnel#ike_lifetime}
714
+ :param phase1_algorithms: List of Phase 1: Proposal algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase1_algorithms GatewayConnectionTunnel#phase1_algorithms}
715
+ :param phase1_dh_group_numbers: List of Phase 1 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase1_dh_group_numbers GatewayConnectionTunnel#phase1_dh_group_numbers}
716
+ :param phase1_integrity_algorithms: List of Phase 1 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase1_integrity_algorithms GatewayConnectionTunnel#phase1_integrity_algorithms}
717
+ :param phase2_algorithms: List of Phase 2: Security Association algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase2_algorithms GatewayConnectionTunnel#phase2_algorithms}
718
+ :param phase2_dh_group_numbers: List of Phase 2 Diffie-Hellman group numbers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase2_dh_group_numbers GatewayConnectionTunnel#phase2_dh_group_numbers}
719
+ :param phase2_integrity_algorithms: List of Phase 2 integrity algorithms. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase2_integrity_algorithms GatewayConnectionTunnel#phase2_integrity_algorithms}
720
+ :param rekey_time: IKE SA rekey time in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#rekey_time GatewayConnectionTunnel#rekey_time}
721
721
  '''
722
722
  if __debug__:
723
723
  type_hints = typing.get_type_hints(_typecheckingstub__a50b18894047098027d5d6be1b8a41d8e32b22c4297ebea79c281f4c838921f4)
@@ -760,7 +760,7 @@ class GatewayConnectionTunnelIpsecProperties:
760
760
  def child_rekey_time(self) -> typing.Optional[jsii.Number]:
761
761
  '''IKE child SA rekey time in seconds.
762
762
 
763
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#child_rekey_time GatewayConnectionTunnel#child_rekey_time}
763
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#child_rekey_time GatewayConnectionTunnel#child_rekey_time}
764
764
  '''
765
765
  result = self._values.get("child_rekey_time")
766
766
  return typing.cast(typing.Optional[jsii.Number], result)
@@ -769,7 +769,7 @@ class GatewayConnectionTunnelIpsecProperties:
769
769
  def dpd_delay(self) -> typing.Optional[jsii.Number]:
770
770
  '''Delay before sending Dead Peer Detection packets if no traffic is detected, in seconds.
771
771
 
772
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#dpd_delay GatewayConnectionTunnel#dpd_delay}
772
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#dpd_delay GatewayConnectionTunnel#dpd_delay}
773
773
  '''
774
774
  result = self._values.get("dpd_delay")
775
775
  return typing.cast(typing.Optional[jsii.Number], result)
@@ -778,7 +778,7 @@ class GatewayConnectionTunnelIpsecProperties:
778
778
  def dpd_timeout(self) -> typing.Optional[jsii.Number]:
779
779
  '''Timeout period for DPD reply before considering the peer to be dead, in seconds.
780
780
 
781
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#dpd_timeout GatewayConnectionTunnel#dpd_timeout}
781
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#dpd_timeout GatewayConnectionTunnel#dpd_timeout}
782
782
  '''
783
783
  result = self._values.get("dpd_timeout")
784
784
  return typing.cast(typing.Optional[jsii.Number], result)
@@ -787,7 +787,7 @@ class GatewayConnectionTunnelIpsecProperties:
787
787
  def ike_lifetime(self) -> typing.Optional[jsii.Number]:
788
788
  '''Maximum IKE SA lifetime in seconds.
789
789
 
790
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#ike_lifetime GatewayConnectionTunnel#ike_lifetime}
790
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#ike_lifetime GatewayConnectionTunnel#ike_lifetime}
791
791
  '''
792
792
  result = self._values.get("ike_lifetime")
793
793
  return typing.cast(typing.Optional[jsii.Number], result)
@@ -796,7 +796,7 @@ class GatewayConnectionTunnelIpsecProperties:
796
796
  def phase1_algorithms(self) -> typing.Optional[typing.List[builtins.str]]:
797
797
  '''List of Phase 1: Proposal algorithms.
798
798
 
799
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#phase1_algorithms GatewayConnectionTunnel#phase1_algorithms}
799
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase1_algorithms GatewayConnectionTunnel#phase1_algorithms}
800
800
  '''
801
801
  result = self._values.get("phase1_algorithms")
802
802
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
@@ -805,7 +805,7 @@ class GatewayConnectionTunnelIpsecProperties:
805
805
  def phase1_dh_group_numbers(self) -> typing.Optional[typing.List[jsii.Number]]:
806
806
  '''List of Phase 1 Diffie-Hellman group numbers.
807
807
 
808
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#phase1_dh_group_numbers GatewayConnectionTunnel#phase1_dh_group_numbers}
808
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase1_dh_group_numbers GatewayConnectionTunnel#phase1_dh_group_numbers}
809
809
  '''
810
810
  result = self._values.get("phase1_dh_group_numbers")
811
811
  return typing.cast(typing.Optional[typing.List[jsii.Number]], result)
@@ -814,7 +814,7 @@ class GatewayConnectionTunnelIpsecProperties:
814
814
  def phase1_integrity_algorithms(self) -> typing.Optional[typing.List[builtins.str]]:
815
815
  '''List of Phase 1 integrity algorithms.
816
816
 
817
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#phase1_integrity_algorithms GatewayConnectionTunnel#phase1_integrity_algorithms}
817
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase1_integrity_algorithms GatewayConnectionTunnel#phase1_integrity_algorithms}
818
818
  '''
819
819
  result = self._values.get("phase1_integrity_algorithms")
820
820
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
@@ -823,7 +823,7 @@ class GatewayConnectionTunnelIpsecProperties:
823
823
  def phase2_algorithms(self) -> typing.Optional[typing.List[builtins.str]]:
824
824
  '''List of Phase 2: Security Association algorithms.
825
825
 
826
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#phase2_algorithms GatewayConnectionTunnel#phase2_algorithms}
826
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase2_algorithms GatewayConnectionTunnel#phase2_algorithms}
827
827
  '''
828
828
  result = self._values.get("phase2_algorithms")
829
829
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
@@ -832,7 +832,7 @@ class GatewayConnectionTunnelIpsecProperties:
832
832
  def phase2_dh_group_numbers(self) -> typing.Optional[typing.List[jsii.Number]]:
833
833
  '''List of Phase 2 Diffie-Hellman group numbers.
834
834
 
835
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#phase2_dh_group_numbers GatewayConnectionTunnel#phase2_dh_group_numbers}
835
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase2_dh_group_numbers GatewayConnectionTunnel#phase2_dh_group_numbers}
836
836
  '''
837
837
  result = self._values.get("phase2_dh_group_numbers")
838
838
  return typing.cast(typing.Optional[typing.List[jsii.Number]], result)
@@ -841,7 +841,7 @@ class GatewayConnectionTunnelIpsecProperties:
841
841
  def phase2_integrity_algorithms(self) -> typing.Optional[typing.List[builtins.str]]:
842
842
  '''List of Phase 2 integrity algorithms.
843
843
 
844
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#phase2_integrity_algorithms GatewayConnectionTunnel#phase2_integrity_algorithms}
844
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#phase2_integrity_algorithms GatewayConnectionTunnel#phase2_integrity_algorithms}
845
845
  '''
846
846
  result = self._values.get("phase2_integrity_algorithms")
847
847
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
@@ -850,7 +850,7 @@ class GatewayConnectionTunnelIpsecProperties:
850
850
  def rekey_time(self) -> typing.Optional[jsii.Number]:
851
851
  '''IKE SA rekey time in seconds.
852
852
 
853
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/gateway_connection_tunnel#rekey_time GatewayConnectionTunnel#rekey_time}
853
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/gateway_connection_tunnel#rekey_time GatewayConnectionTunnel#rekey_time}
854
854
  '''
855
855
  result = self._values.get("rekey_time")
856
856
  return typing.cast(typing.Optional[jsii.Number], result)
@@ -1,7 +1,7 @@
1
1
  r'''
2
2
  # `upcloud_kubernetes_cluster`
3
3
 
4
- Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster).
4
+ Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -44,7 +44,7 @@ class KubernetesCluster(
44
44
  metaclass=jsii.JSIIMeta,
45
45
  jsii_type="@cdktf/provider-upcloud.kubernetesCluster.KubernetesCluster",
46
46
  ):
47
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
47
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
48
48
 
49
49
  def __init__(
50
50
  self,
@@ -69,20 +69,20 @@ class KubernetesCluster(
69
69
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
70
70
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
71
71
  ) -> None:
72
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
72
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
73
73
 
74
74
  :param scope: The scope in which to define this construct.
75
75
  :param id: The scoped construct ID. Must be unique amongst siblings in the same scope
76
- :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
77
- :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
78
- :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
79
- :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
80
- :param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
81
- :param plan: The pricing plan used for the cluster. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
82
- :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
83
- :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
84
- :param upgrade_strategy_type: The upgrade strategy to use when changing the cluster ``version``. If not set, ``manual`` strategy will be used by default. When using ``manual`` strategy, you must replace the existing node-groups to update them. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#upgrade_strategy_type KubernetesCluster#upgrade_strategy_type}
85
- :param version: Kubernetes version ID, e.g. ``1.31``. You can list available version IDs with ``upctl kubernetes versions``. Note that when changing the cluster version, ``upgrade_strategy`` will be taken into account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
76
+ :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
77
+ :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
78
+ :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
79
+ :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
80
+ :param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
81
+ :param plan: The pricing plan used for the cluster. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
82
+ :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
83
+ :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
84
+ :param upgrade_strategy_type: The upgrade strategy to use when changing the cluster ``version``. If not set, ``manual`` strategy will be used by default. When using ``manual`` strategy, you must replace the existing node-groups to update them. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#upgrade_strategy_type KubernetesCluster#upgrade_strategy_type}
85
+ :param version: Kubernetes version ID, e.g. ``1.31``. You can list available version IDs with ``upctl kubernetes versions``. Note that when changing the cluster version, ``upgrade_strategy`` will be taken into account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
86
86
  :param connection:
87
87
  :param count:
88
88
  :param depends_on:
@@ -130,7 +130,7 @@ class KubernetesCluster(
130
130
 
131
131
  :param scope: The scope in which to define this construct.
132
132
  :param import_to_id: The construct id used in the generated config for the KubernetesCluster to import.
133
- :param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
133
+ :param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
134
134
  :param provider: ? Optional instance of the provider where the KubernetesCluster to import is found.
135
135
  '''
136
136
  if __debug__:
@@ -433,16 +433,16 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
433
433
  :param lifecycle:
434
434
  :param provider:
435
435
  :param provisioners:
436
- :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
437
- :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
438
- :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
439
- :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
440
- :param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
441
- :param plan: The pricing plan used for the cluster. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
442
- :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
443
- :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
444
- :param upgrade_strategy_type: The upgrade strategy to use when changing the cluster ``version``. If not set, ``manual`` strategy will be used by default. When using ``manual`` strategy, you must replace the existing node-groups to update them. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#upgrade_strategy_type KubernetesCluster#upgrade_strategy_type}
445
- :param version: Kubernetes version ID, e.g. ``1.31``. You can list available version IDs with ``upctl kubernetes versions``. Note that when changing the cluster version, ``upgrade_strategy`` will be taken into account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
436
+ :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
437
+ :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
438
+ :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
439
+ :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
440
+ :param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
441
+ :param plan: The pricing plan used for the cluster. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
442
+ :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
443
+ :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
444
+ :param upgrade_strategy_type: The upgrade strategy to use when changing the cluster ``version``. If not set, ``manual`` strategy will be used by default. When using ``manual`` strategy, you must replace the existing node-groups to update them. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#upgrade_strategy_type KubernetesCluster#upgrade_strategy_type}
445
+ :param version: Kubernetes version ID, e.g. ``1.31``. You can list available version IDs with ``upctl kubernetes versions``. Note that when changing the cluster version, ``upgrade_strategy`` will be taken into account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
446
446
  '''
447
447
  if isinstance(lifecycle, dict):
448
448
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -568,7 +568,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
568
568
 
569
569
  To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services.
570
570
 
571
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
571
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
572
572
  '''
573
573
  result = self._values.get("control_plane_ip_filter")
574
574
  assert result is not None, "Required property 'control_plane_ip_filter' is missing"
@@ -578,7 +578,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
578
578
  def name(self) -> builtins.str:
579
579
  '''Cluster name. Needs to be unique within the account.
580
580
 
581
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
581
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
582
582
  '''
583
583
  result = self._values.get("name")
584
584
  assert result is not None, "Required property 'name' is missing"
@@ -588,7 +588,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
588
588
  def network(self) -> builtins.str:
589
589
  '''Network ID for the cluster to run in.
590
590
 
591
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
591
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
592
592
  '''
593
593
  result = self._values.get("network")
594
594
  assert result is not None, "Required property 'network' is missing"
@@ -598,7 +598,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
598
598
  def zone(self) -> builtins.str:
599
599
  '''Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``.
600
600
 
601
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
601
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
602
602
  '''
603
603
  result = self._values.get("zone")
604
604
  assert result is not None, "Required property 'zone' is missing"
@@ -608,7 +608,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
608
608
  def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
609
609
  '''User defined key-value pairs to classify the cluster.
610
610
 
611
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
611
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
612
612
  '''
613
613
  result = self._values.get("labels")
614
614
  return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
@@ -617,7 +617,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
617
617
  def plan(self) -> typing.Optional[builtins.str]:
618
618
  '''The pricing plan used for the cluster. You can list available plans with ``upctl kubernetes plans``.
619
619
 
620
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
620
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
621
621
  '''
622
622
  result = self._values.get("plan")
623
623
  return typing.cast(typing.Optional[builtins.str], result)
@@ -628,7 +628,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
628
628
  ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
629
629
  '''Enable private node groups. Private node groups requires a network that is routed through NAT gateway.
630
630
 
631
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
631
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
632
632
  '''
633
633
  result = self._values.get("private_node_groups")
634
634
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
@@ -637,7 +637,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
637
637
  def storage_encryption(self) -> typing.Optional[builtins.str]:
638
638
  '''Set default storage encryption strategy for all nodes in the cluster.
639
639
 
640
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
640
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
641
641
  '''
642
642
  result = self._values.get("storage_encryption")
643
643
  return typing.cast(typing.Optional[builtins.str], result)
@@ -648,7 +648,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
648
648
 
649
649
  If not set, ``manual`` strategy will be used by default. When using ``manual`` strategy, you must replace the existing node-groups to update them.
650
650
 
651
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#upgrade_strategy_type KubernetesCluster#upgrade_strategy_type}
651
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#upgrade_strategy_type KubernetesCluster#upgrade_strategy_type}
652
652
  '''
653
653
  result = self._values.get("upgrade_strategy_type")
654
654
  return typing.cast(typing.Optional[builtins.str], result)
@@ -659,7 +659,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
659
659
 
660
660
  Note that when changing the cluster version, ``upgrade_strategy`` will be taken into account.
661
661
 
662
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.24.2/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
662
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.25.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
663
663
  '''
664
664
  result = self._values.get("version")
665
665
  return typing.cast(typing.Optional[builtins.str], result)