cdktf-cdktf-provider-upcloud 15.5.0__py3-none-any.whl → 15.6.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.

Files changed (69) hide show
  1. cdktf_cdktf_provider_upcloud/__init__.py +3 -5
  2. cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
  3. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.6.1.jsii.tgz +0 -0
  4. cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +9 -9
  5. cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +7 -7
  6. cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +7 -7
  7. cdktf_cdktf_provider_upcloud/data_upcloud_load_balancer_dns_challenge_domain/__init__.py +4 -4
  8. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
  9. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
  10. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
  11. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
  12. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_valkey_sessions/__init__.py +22 -22
  13. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +10 -10
  14. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
  15. cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
  16. cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +28 -28
  17. cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
  18. cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
  19. cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +7 -7
  20. cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +38 -38
  21. cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +19 -19
  22. cdktf_cdktf_provider_upcloud/gateway/__init__.py +37 -37
  23. cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +34 -34
  24. cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +61 -61
  25. cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +34 -34
  26. cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +72 -72
  27. cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +46 -46
  28. cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +46 -46
  29. cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +13 -13
  30. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +25 -25
  31. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +13 -13
  32. cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +33 -33
  33. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +228 -228
  34. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +13 -13
  35. cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +16 -16
  36. cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +28 -28
  37. cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +25 -25
  38. cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
  39. cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +260 -211
  40. cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +650 -601
  41. cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +416 -367
  42. cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +180 -133
  43. cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +65 -65
  44. cdktf_cdktf_provider_upcloud/managed_database_valkey/__init__.py +183 -136
  45. cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +30 -30
  46. cdktf_cdktf_provider_upcloud/managed_object_storage_bucket/__init__.py +10 -10
  47. cdktf_cdktf_provider_upcloud/managed_object_storage_custom_domain/__init__.py +13 -13
  48. cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +16 -16
  49. cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +13 -13
  50. cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +16 -16
  51. cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +16 -16
  52. cdktf_cdktf_provider_upcloud/network/__init__.py +50 -50
  53. cdktf_cdktf_provider_upcloud/network_peering/__init__.py +23 -23
  54. cdktf_cdktf_provider_upcloud/provider/__init__.py +28 -28
  55. cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
  56. cdktf_cdktf_provider_upcloud/server/__init__.py +139 -139
  57. cdktf_cdktf_provider_upcloud/server_group/__init__.py +19 -19
  58. cdktf_cdktf_provider_upcloud/storage/__init__.py +51 -51
  59. cdktf_cdktf_provider_upcloud/storage_backup/__init__.py +13 -13
  60. cdktf_cdktf_provider_upcloud/storage_template/__init__.py +13 -13
  61. cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
  62. {cdktf_cdktf_provider_upcloud-15.5.0.dist-info → cdktf_cdktf_provider_upcloud-15.6.1.dist-info}/METADATA +5 -5
  63. cdktf_cdktf_provider_upcloud-15.6.1.dist-info/RECORD +67 -0
  64. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.5.0.jsii.tgz +0 -0
  65. cdktf_cdktf_provider_upcloud/object_storage/__init__.py +0 -966
  66. cdktf_cdktf_provider_upcloud-15.5.0.dist-info/RECORD +0 -68
  67. {cdktf_cdktf_provider_upcloud-15.5.0.dist-info → cdktf_cdktf_provider_upcloud-15.6.1.dist-info}/LICENSE +0 -0
  68. {cdktf_cdktf_provider_upcloud-15.5.0.dist-info → cdktf_cdktf_provider_upcloud-15.6.1.dist-info}/WHEEL +0 -0
  69. {cdktf_cdktf_provider_upcloud-15.5.0.dist-info → cdktf_cdktf_provider_upcloud-15.6.1.dist-info}/top_level.txt +0 -0
@@ -1,7 +1,7 @@
1
1
  r'''
2
2
  # `upcloud_kubernetes_cluster`
3
3
 
4
- Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster).
4
+ Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -44,7 +44,7 @@ class KubernetesCluster(
44
44
  metaclass=jsii.JSIIMeta,
45
45
  jsii_type="@cdktf/provider-upcloud.kubernetesCluster.KubernetesCluster",
46
46
  ):
47
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
47
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
48
48
 
49
49
  def __init__(
50
50
  self,
@@ -69,20 +69,20 @@ class KubernetesCluster(
69
69
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
70
70
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
71
71
  ) -> None:
72
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
72
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
73
73
 
74
74
  :param scope: The scope in which to define this construct.
75
75
  :param id: The scoped construct ID. Must be unique amongst siblings in the same scope
76
- :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
77
- :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
78
- :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
79
- :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
80
- :param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
81
- :param plan: The pricing plan used for the cluster. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
82
- :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
83
- :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Valid values are ``data-at-rest`` and ``none``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
84
- :param upgrade_strategy_type: The upgrade strategy to use when changing the cluster ``version``. If not set, ``manual`` strategy will be used by default. When using ``manual`` strategy, you must replace the existing node-groups to update them. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#upgrade_strategy_type KubernetesCluster#upgrade_strategy_type}
85
- :param version: Kubernetes version ID, e.g. ``1.31``. You can list available version IDs with ``upctl kubernetes versions``. Note that when changing the cluster version, ``upgrade_strategy`` will be taken into account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
76
+ :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
77
+ :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
78
+ :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
79
+ :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
80
+ :param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
81
+ :param plan: The pricing plan used for the cluster. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
82
+ :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
83
+ :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Valid values are ``data-at-rest`` and ``none``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
84
+ :param upgrade_strategy_type: The upgrade strategy to use when changing the cluster ``version``. If not set, ``manual`` strategy will be used by default. When using ``manual`` strategy, you must replace the existing node-groups to update them. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#upgrade_strategy_type KubernetesCluster#upgrade_strategy_type}
85
+ :param version: Kubernetes version ID, e.g. ``1.31``. You can list available version IDs with ``upctl kubernetes versions``. Note that when changing the cluster version, ``upgrade_strategy`` will be taken into account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
86
86
  :param connection:
87
87
  :param count:
88
88
  :param depends_on:
@@ -130,7 +130,7 @@ class KubernetesCluster(
130
130
 
131
131
  :param scope: The scope in which to define this construct.
132
132
  :param import_to_id: The construct id used in the generated config for the KubernetesCluster to import.
133
- :param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
133
+ :param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
134
134
  :param provider: ? Optional instance of the provider where the KubernetesCluster to import is found.
135
135
  '''
136
136
  if __debug__:
@@ -433,16 +433,16 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
433
433
  :param lifecycle:
434
434
  :param provider:
435
435
  :param provisioners:
436
- :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
437
- :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
438
- :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
439
- :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
440
- :param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
441
- :param plan: The pricing plan used for the cluster. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
442
- :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
443
- :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Valid values are ``data-at-rest`` and ``none``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
444
- :param upgrade_strategy_type: The upgrade strategy to use when changing the cluster ``version``. If not set, ``manual`` strategy will be used by default. When using ``manual`` strategy, you must replace the existing node-groups to update them. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#upgrade_strategy_type KubernetesCluster#upgrade_strategy_type}
445
- :param version: Kubernetes version ID, e.g. ``1.31``. You can list available version IDs with ``upctl kubernetes versions``. Note that when changing the cluster version, ``upgrade_strategy`` will be taken into account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
436
+ :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
437
+ :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
438
+ :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
439
+ :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
440
+ :param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
441
+ :param plan: The pricing plan used for the cluster. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
442
+ :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
443
+ :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Valid values are ``data-at-rest`` and ``none``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
444
+ :param upgrade_strategy_type: The upgrade strategy to use when changing the cluster ``version``. If not set, ``manual`` strategy will be used by default. When using ``manual`` strategy, you must replace the existing node-groups to update them. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#upgrade_strategy_type KubernetesCluster#upgrade_strategy_type}
445
+ :param version: Kubernetes version ID, e.g. ``1.31``. You can list available version IDs with ``upctl kubernetes versions``. Note that when changing the cluster version, ``upgrade_strategy`` will be taken into account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
446
446
  '''
447
447
  if isinstance(lifecycle, dict):
448
448
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -568,7 +568,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
568
568
 
569
569
  To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services.
570
570
 
571
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
571
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
572
572
  '''
573
573
  result = self._values.get("control_plane_ip_filter")
574
574
  assert result is not None, "Required property 'control_plane_ip_filter' is missing"
@@ -578,7 +578,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
578
578
  def name(self) -> builtins.str:
579
579
  '''Cluster name. Needs to be unique within the account.
580
580
 
581
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
581
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
582
582
  '''
583
583
  result = self._values.get("name")
584
584
  assert result is not None, "Required property 'name' is missing"
@@ -588,7 +588,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
588
588
  def network(self) -> builtins.str:
589
589
  '''Network ID for the cluster to run in.
590
590
 
591
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
591
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
592
592
  '''
593
593
  result = self._values.get("network")
594
594
  assert result is not None, "Required property 'network' is missing"
@@ -598,7 +598,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
598
598
  def zone(self) -> builtins.str:
599
599
  '''Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``.
600
600
 
601
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
601
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
602
602
  '''
603
603
  result = self._values.get("zone")
604
604
  assert result is not None, "Required property 'zone' is missing"
@@ -608,7 +608,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
608
608
  def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
609
609
  '''User defined key-value pairs to classify the cluster.
610
610
 
611
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
611
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
612
612
  '''
613
613
  result = self._values.get("labels")
614
614
  return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
@@ -617,7 +617,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
617
617
  def plan(self) -> typing.Optional[builtins.str]:
618
618
  '''The pricing plan used for the cluster. You can list available plans with ``upctl kubernetes plans``.
619
619
 
620
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
620
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
621
621
  '''
622
622
  result = self._values.get("plan")
623
623
  return typing.cast(typing.Optional[builtins.str], result)
@@ -628,7 +628,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
628
628
  ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
629
629
  '''Enable private node groups. Private node groups requires a network that is routed through NAT gateway.
630
630
 
631
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
631
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
632
632
  '''
633
633
  result = self._values.get("private_node_groups")
634
634
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
@@ -637,7 +637,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
637
637
  def storage_encryption(self) -> typing.Optional[builtins.str]:
638
638
  '''Set default storage encryption strategy for all nodes in the cluster. Valid values are ``data-at-rest`` and ``none``.
639
639
 
640
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
640
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
641
641
  '''
642
642
  result = self._values.get("storage_encryption")
643
643
  return typing.cast(typing.Optional[builtins.str], result)
@@ -648,7 +648,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
648
648
 
649
649
  If not set, ``manual`` strategy will be used by default. When using ``manual`` strategy, you must replace the existing node-groups to update them.
650
650
 
651
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#upgrade_strategy_type KubernetesCluster#upgrade_strategy_type}
651
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#upgrade_strategy_type KubernetesCluster#upgrade_strategy_type}
652
652
  '''
653
653
  result = self._values.get("upgrade_strategy_type")
654
654
  return typing.cast(typing.Optional[builtins.str], result)
@@ -659,7 +659,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
659
659
 
660
660
  Note that when changing the cluster version, ``upgrade_strategy`` will be taken into account.
661
661
 
662
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.28.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
662
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.29.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
663
663
  '''
664
664
  result = self._values.get("version")
665
665
  return typing.cast(typing.Optional[builtins.str], result)