cdktf-cdktf-provider-upcloud 11.0.3__py3-none-any.whl → 12.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +3 -3
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@12.0.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +11 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +11 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +11 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +26 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +17 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +34 -30
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +26 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +11 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +17 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +29 -25
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +11 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +14 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +14 -10
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +45 -41
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +23 -19
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +32 -28
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +32 -28
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +51 -47
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +40 -36
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +68 -64
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +20 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +32 -28
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +20 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +43 -39
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +169 -165
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +20 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +23 -19
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +35 -31
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +32 -28
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +23 -19
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +179 -175
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +77 -73
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +296 -292
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +104 -100
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +54 -50
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +77 -30
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +23 -19
- cdktf_cdktf_provider_upcloud/network/__init__.py +44 -40
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +34 -30
- cdktf_cdktf_provider_upcloud/provider/__init__.py +29 -25
- cdktf_cdktf_provider_upcloud/router/__init__.py +23 -19
- cdktf_cdktf_provider_upcloud/server/__init__.py +145 -141
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +23 -19
- cdktf_cdktf_provider_upcloud/storage/__init__.py +59 -55
- cdktf_cdktf_provider_upcloud/tag/__init__.py +20 -16
- {cdktf_cdktf_provider_upcloud-11.0.3.dist-info → cdktf_cdktf_provider_upcloud-12.0.0.dist-info}/LICENSE +1 -1
- {cdktf_cdktf_provider_upcloud-11.0.3.dist-info → cdktf_cdktf_provider_upcloud-12.0.0.dist-info}/METADATA +5 -5
- cdktf_cdktf_provider_upcloud-12.0.0.dist-info/RECORD +54 -0
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@11.0.3.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-11.0.3.dist-info/RECORD +0 -54
- {cdktf_cdktf_provider_upcloud-11.0.3.dist-info → cdktf_cdktf_provider_upcloud-12.0.0.dist-info}/WHEEL +0 -0
- {cdktf_cdktf_provider_upcloud-11.0.3.dist-info → cdktf_cdktf_provider_upcloud-12.0.0.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
'''
|
|
2
2
|
# `upcloud_loadbalancer`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_loadbalancer`](https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer).
|
|
5
5
|
'''
|
|
6
6
|
import abc
|
|
7
7
|
import builtins
|
|
@@ -26,7 +26,7 @@ class Loadbalancer(
|
|
|
26
26
|
metaclass=jsii.JSIIMeta,
|
|
27
27
|
jsii_type="@cdktf/provider-upcloud.loadbalancer.Loadbalancer",
|
|
28
28
|
):
|
|
29
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
29
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer upcloud_loadbalancer}.'''
|
|
30
30
|
|
|
31
31
|
def __init__(
|
|
32
32
|
self,
|
|
@@ -49,18 +49,18 @@ class Loadbalancer(
|
|
|
49
49
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
50
50
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
51
51
|
) -> None:
|
|
52
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
52
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer upcloud_loadbalancer} Resource.
|
|
53
53
|
|
|
54
54
|
:param scope: The scope in which to define this construct.
|
|
55
55
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
56
|
-
:param name: The name of the service must be unique within customer account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
57
|
-
:param plan: Plan which the service will have. You can list available loadbalancer plans with ``upctl loadbalancer plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
58
|
-
:param zone: Zone in which the service will be hosted, e.g. ``fi-hel1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
59
|
-
:param configured_status: The service configured status indicates the service's current intended status. Managed by the customer. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
60
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
61
|
-
:param labels: Key-value pairs to classify the load balancer. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
62
|
-
:param network: Private network UUID where traffic will be routed. Must reside in load balancer zone. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
63
|
-
:param networks: networks block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
56
|
+
:param name: The name of the service must be unique within customer account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#name Loadbalancer#name}
|
|
57
|
+
:param plan: Plan which the service will have. You can list available loadbalancer plans with ``upctl loadbalancer plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#plan Loadbalancer#plan}
|
|
58
|
+
:param zone: Zone in which the service will be hosted, e.g. ``fi-hel1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#zone Loadbalancer#zone}
|
|
59
|
+
:param configured_status: The service configured status indicates the service's current intended status. Managed by the customer. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#configured_status Loadbalancer#configured_status}
|
|
60
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#id Loadbalancer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
61
|
+
:param labels: Key-value pairs to classify the load balancer. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#labels Loadbalancer#labels}
|
|
62
|
+
:param network: Private network UUID where traffic will be routed. Must reside in load balancer zone. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#network Loadbalancer#network}
|
|
63
|
+
:param networks: networks block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#networks Loadbalancer#networks}
|
|
64
64
|
:param connection:
|
|
65
65
|
:param count:
|
|
66
66
|
:param depends_on:
|
|
@@ -106,7 +106,7 @@ class Loadbalancer(
|
|
|
106
106
|
|
|
107
107
|
:param scope: The scope in which to define this construct.
|
|
108
108
|
:param import_to_id: The construct id used in the generated config for the Loadbalancer to import.
|
|
109
|
-
:param import_from_id: The id of the existing Loadbalancer that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
109
|
+
:param import_from_id: The id of the existing Loadbalancer that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#import import section} in the documentation of this resource for the id to use
|
|
110
110
|
:param provider: ? Optional instance of the provider where the Loadbalancer to import is found.
|
|
111
111
|
'''
|
|
112
112
|
if __debug__:
|
|
@@ -154,6 +154,10 @@ class Loadbalancer(
|
|
|
154
154
|
def _synthesize_attributes(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
155
155
|
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "synthesizeAttributes", []))
|
|
156
156
|
|
|
157
|
+
@jsii.member(jsii_name="synthesizeHclAttributes")
|
|
158
|
+
def _synthesize_hcl_attributes(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
159
|
+
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "synthesizeHclAttributes", []))
|
|
160
|
+
|
|
157
161
|
@jsii.python.classproperty
|
|
158
162
|
@jsii.member(jsii_name="tfResourceType")
|
|
159
163
|
def TF_RESOURCE_TYPE(cls) -> builtins.str:
|
|
@@ -372,14 +376,14 @@ class LoadbalancerConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
372
376
|
:param lifecycle:
|
|
373
377
|
:param provider:
|
|
374
378
|
:param provisioners:
|
|
375
|
-
:param name: The name of the service must be unique within customer account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
376
|
-
:param plan: Plan which the service will have. You can list available loadbalancer plans with ``upctl loadbalancer plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
377
|
-
:param zone: Zone in which the service will be hosted, e.g. ``fi-hel1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
378
|
-
:param configured_status: The service configured status indicates the service's current intended status. Managed by the customer. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
379
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
380
|
-
:param labels: Key-value pairs to classify the load balancer. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
381
|
-
:param network: Private network UUID where traffic will be routed. Must reside in load balancer zone. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
382
|
-
:param networks: networks block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
379
|
+
:param name: The name of the service must be unique within customer account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#name Loadbalancer#name}
|
|
380
|
+
:param plan: Plan which the service will have. You can list available loadbalancer plans with ``upctl loadbalancer plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#plan Loadbalancer#plan}
|
|
381
|
+
:param zone: Zone in which the service will be hosted, e.g. ``fi-hel1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#zone Loadbalancer#zone}
|
|
382
|
+
:param configured_status: The service configured status indicates the service's current intended status. Managed by the customer. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#configured_status Loadbalancer#configured_status}
|
|
383
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#id Loadbalancer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
384
|
+
:param labels: Key-value pairs to classify the load balancer. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#labels Loadbalancer#labels}
|
|
385
|
+
:param network: Private network UUID where traffic will be routed. Must reside in load balancer zone. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#network Loadbalancer#network}
|
|
386
|
+
:param networks: networks block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#networks Loadbalancer#networks}
|
|
383
387
|
'''
|
|
384
388
|
if isinstance(lifecycle, dict):
|
|
385
389
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -498,7 +502,7 @@ class LoadbalancerConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
498
502
|
def name(self) -> builtins.str:
|
|
499
503
|
'''The name of the service must be unique within customer account.
|
|
500
504
|
|
|
501
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
505
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#name Loadbalancer#name}
|
|
502
506
|
'''
|
|
503
507
|
result = self._values.get("name")
|
|
504
508
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -508,7 +512,7 @@ class LoadbalancerConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
508
512
|
def plan(self) -> builtins.str:
|
|
509
513
|
'''Plan which the service will have. You can list available loadbalancer plans with ``upctl loadbalancer plans``.
|
|
510
514
|
|
|
511
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
515
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#plan Loadbalancer#plan}
|
|
512
516
|
'''
|
|
513
517
|
result = self._values.get("plan")
|
|
514
518
|
assert result is not None, "Required property 'plan' is missing"
|
|
@@ -518,7 +522,7 @@ class LoadbalancerConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
518
522
|
def zone(self) -> builtins.str:
|
|
519
523
|
'''Zone in which the service will be hosted, e.g. ``fi-hel1``. You can list available zones with ``upctl zone list``.
|
|
520
524
|
|
|
521
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
525
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#zone Loadbalancer#zone}
|
|
522
526
|
'''
|
|
523
527
|
result = self._values.get("zone")
|
|
524
528
|
assert result is not None, "Required property 'zone' is missing"
|
|
@@ -528,14 +532,14 @@ class LoadbalancerConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
528
532
|
def configured_status(self) -> typing.Optional[builtins.str]:
|
|
529
533
|
'''The service configured status indicates the service's current intended status. Managed by the customer.
|
|
530
534
|
|
|
531
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
535
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#configured_status Loadbalancer#configured_status}
|
|
532
536
|
'''
|
|
533
537
|
result = self._values.get("configured_status")
|
|
534
538
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
535
539
|
|
|
536
540
|
@builtins.property
|
|
537
541
|
def id(self) -> typing.Optional[builtins.str]:
|
|
538
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
542
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#id Loadbalancer#id}.
|
|
539
543
|
|
|
540
544
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
541
545
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -547,7 +551,7 @@ class LoadbalancerConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
547
551
|
def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
|
|
548
552
|
'''Key-value pairs to classify the load balancer.
|
|
549
553
|
|
|
550
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
554
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#labels Loadbalancer#labels}
|
|
551
555
|
'''
|
|
552
556
|
result = self._values.get("labels")
|
|
553
557
|
return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
|
|
@@ -556,7 +560,7 @@ class LoadbalancerConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
556
560
|
def network(self) -> typing.Optional[builtins.str]:
|
|
557
561
|
'''Private network UUID where traffic will be routed. Must reside in load balancer zone.
|
|
558
562
|
|
|
559
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
563
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#network Loadbalancer#network}
|
|
560
564
|
'''
|
|
561
565
|
result = self._values.get("network")
|
|
562
566
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -567,7 +571,7 @@ class LoadbalancerConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
567
571
|
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["LoadbalancerNetworks"]]]:
|
|
568
572
|
'''networks block.
|
|
569
573
|
|
|
570
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
574
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#networks Loadbalancer#networks}
|
|
571
575
|
'''
|
|
572
576
|
result = self._values.get("networks")
|
|
573
577
|
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["LoadbalancerNetworks"]]], result)
|
|
@@ -604,10 +608,10 @@ class LoadbalancerNetworks:
|
|
|
604
608
|
network: typing.Optional[builtins.str] = None,
|
|
605
609
|
) -> None:
|
|
606
610
|
'''
|
|
607
|
-
:param family: Network family. Currently only ``IPv4`` is supported. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
608
|
-
:param name: The name of the network must be unique within the service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
609
|
-
:param type: The type of the network. Only one public network can be attached and at least one private network must be attached. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
610
|
-
:param network: Private network UUID. Required for private networks and must reside in loadbalancer zone. For public network the field should be omitted. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
611
|
+
:param family: Network family. Currently only ``IPv4`` is supported. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#family Loadbalancer#family}
|
|
612
|
+
:param name: The name of the network must be unique within the service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#name Loadbalancer#name}
|
|
613
|
+
:param type: The type of the network. Only one public network can be attached and at least one private network must be attached. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#type Loadbalancer#type}
|
|
614
|
+
:param network: Private network UUID. Required for private networks and must reside in loadbalancer zone. For public network the field should be omitted. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#network Loadbalancer#network}
|
|
611
615
|
'''
|
|
612
616
|
if __debug__:
|
|
613
617
|
type_hints = typing.get_type_hints(_typecheckingstub__f7bc3b31db01be8fcdb6dd15ccf511434856f0866752f9ec14fbf89082bb48ed)
|
|
@@ -627,7 +631,7 @@ class LoadbalancerNetworks:
|
|
|
627
631
|
def family(self) -> builtins.str:
|
|
628
632
|
'''Network family. Currently only ``IPv4`` is supported.
|
|
629
633
|
|
|
630
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
634
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#family Loadbalancer#family}
|
|
631
635
|
'''
|
|
632
636
|
result = self._values.get("family")
|
|
633
637
|
assert result is not None, "Required property 'family' is missing"
|
|
@@ -637,7 +641,7 @@ class LoadbalancerNetworks:
|
|
|
637
641
|
def name(self) -> builtins.str:
|
|
638
642
|
'''The name of the network must be unique within the service.
|
|
639
643
|
|
|
640
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
644
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#name Loadbalancer#name}
|
|
641
645
|
'''
|
|
642
646
|
result = self._values.get("name")
|
|
643
647
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -649,7 +653,7 @@ class LoadbalancerNetworks:
|
|
|
649
653
|
|
|
650
654
|
Only one public network can be attached and at least one private network must be attached.
|
|
651
655
|
|
|
652
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
656
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#type Loadbalancer#type}
|
|
653
657
|
'''
|
|
654
658
|
result = self._values.get("type")
|
|
655
659
|
assert result is not None, "Required property 'type' is missing"
|
|
@@ -661,7 +665,7 @@ class LoadbalancerNetworks:
|
|
|
661
665
|
|
|
662
666
|
Required for private networks and must reside in loadbalancer zone. For public network the field should be omitted.
|
|
663
667
|
|
|
664
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
668
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#network Loadbalancer#network}
|
|
665
669
|
'''
|
|
666
670
|
result = self._values.get("network")
|
|
667
671
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
'''
|
|
2
2
|
# `upcloud_loadbalancer_backend`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_loadbalancer_backend`](https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend).
|
|
5
5
|
'''
|
|
6
6
|
import abc
|
|
7
7
|
import builtins
|
|
@@ -26,7 +26,7 @@ class LoadbalancerBackend(
|
|
|
26
26
|
metaclass=jsii.JSIIMeta,
|
|
27
27
|
jsii_type="@cdktf/provider-upcloud.loadbalancerBackend.LoadbalancerBackend",
|
|
28
28
|
):
|
|
29
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
29
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend upcloud_loadbalancer_backend}.'''
|
|
30
30
|
|
|
31
31
|
def __init__(
|
|
32
32
|
self,
|
|
@@ -46,15 +46,15 @@ class LoadbalancerBackend(
|
|
|
46
46
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
47
47
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
48
48
|
) -> None:
|
|
49
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
49
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend upcloud_loadbalancer_backend} Resource.
|
|
50
50
|
|
|
51
51
|
:param scope: The scope in which to define this construct.
|
|
52
52
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
53
|
-
:param loadbalancer: ID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
54
|
-
:param name: The name of the backend must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
55
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
56
|
-
:param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
57
|
-
:param resolver_name: Domain Name Resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
53
|
+
:param loadbalancer: ID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#loadbalancer LoadbalancerBackend#loadbalancer}
|
|
54
|
+
:param name: The name of the backend must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#name LoadbalancerBackend#name}
|
|
55
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#id LoadbalancerBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
56
|
+
:param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#properties LoadbalancerBackend#properties}
|
|
57
|
+
:param resolver_name: Domain Name Resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
|
|
58
58
|
:param connection:
|
|
59
59
|
:param count:
|
|
60
60
|
:param depends_on:
|
|
@@ -97,7 +97,7 @@ class LoadbalancerBackend(
|
|
|
97
97
|
|
|
98
98
|
:param scope: The scope in which to define this construct.
|
|
99
99
|
:param import_to_id: The construct id used in the generated config for the LoadbalancerBackend to import.
|
|
100
|
-
:param import_from_id: The id of the existing LoadbalancerBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
100
|
+
:param import_from_id: The id of the existing LoadbalancerBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#import import section} in the documentation of this resource for the id to use
|
|
101
101
|
:param provider: ? Optional instance of the provider where the LoadbalancerBackend to import is found.
|
|
102
102
|
'''
|
|
103
103
|
if __debug__:
|
|
@@ -129,21 +129,21 @@ class LoadbalancerBackend(
|
|
|
129
129
|
tls_verify: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
130
130
|
) -> None:
|
|
131
131
|
'''
|
|
132
|
-
:param health_check_expected_status: Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
133
|
-
:param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
134
|
-
:param health_check_interval: Interval between health checks. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
135
|
-
:param health_check_rise: Sets how many passing checks there must be before returning the backend member to the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
136
|
-
:param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
137
|
-
:param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
138
|
-
:param health_check_url: Target path for health check HTTP GET requests. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
139
|
-
:param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
140
|
-
:param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
141
|
-
:param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
142
|
-
:param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
143
|
-
:param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
144
|
-
:param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
145
|
-
:param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
146
|
-
:param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
132
|
+
:param health_check_expected_status: Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_expected_status LoadbalancerBackend#health_check_expected_status}
|
|
133
|
+
:param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_fall LoadbalancerBackend#health_check_fall}
|
|
134
|
+
:param health_check_interval: Interval between health checks. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_interval LoadbalancerBackend#health_check_interval}
|
|
135
|
+
:param health_check_rise: Sets how many passing checks there must be before returning the backend member to the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_rise LoadbalancerBackend#health_check_rise}
|
|
136
|
+
:param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_tls_verify LoadbalancerBackend#health_check_tls_verify}
|
|
137
|
+
:param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_type LoadbalancerBackend#health_check_type}
|
|
138
|
+
:param health_check_url: Target path for health check HTTP GET requests. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_url LoadbalancerBackend#health_check_url}
|
|
139
|
+
:param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#http2_enabled LoadbalancerBackend#http2_enabled}
|
|
140
|
+
:param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#outbound_proxy_protocol LoadbalancerBackend#outbound_proxy_protocol}
|
|
141
|
+
:param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#sticky_session_cookie_name LoadbalancerBackend#sticky_session_cookie_name}
|
|
142
|
+
:param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#timeout_server LoadbalancerBackend#timeout_server}
|
|
143
|
+
:param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#timeout_tunnel LoadbalancerBackend#timeout_tunnel}
|
|
144
|
+
:param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#tls_enabled LoadbalancerBackend#tls_enabled}
|
|
145
|
+
:param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#tls_use_system_ca LoadbalancerBackend#tls_use_system_ca}
|
|
146
|
+
:param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#tls_verify LoadbalancerBackend#tls_verify}
|
|
147
147
|
'''
|
|
148
148
|
value = LoadbalancerBackendProperties(
|
|
149
149
|
health_check_expected_status=health_check_expected_status,
|
|
@@ -181,6 +181,10 @@ class LoadbalancerBackend(
|
|
|
181
181
|
def _synthesize_attributes(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
182
182
|
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "synthesizeAttributes", []))
|
|
183
183
|
|
|
184
|
+
@jsii.member(jsii_name="synthesizeHclAttributes")
|
|
185
|
+
def _synthesize_hcl_attributes(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
186
|
+
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "synthesizeHclAttributes", []))
|
|
187
|
+
|
|
184
188
|
@jsii.python.classproperty
|
|
185
189
|
@jsii.member(jsii_name="tfResourceType")
|
|
186
190
|
def TF_RESOURCE_TYPE(cls) -> builtins.str:
|
|
@@ -318,11 +322,11 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
318
322
|
:param lifecycle:
|
|
319
323
|
:param provider:
|
|
320
324
|
:param provisioners:
|
|
321
|
-
:param loadbalancer: ID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
322
|
-
:param name: The name of the backend must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
323
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
324
|
-
:param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
325
|
-
:param resolver_name: Domain Name Resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
325
|
+
:param loadbalancer: ID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#loadbalancer LoadbalancerBackend#loadbalancer}
|
|
326
|
+
:param name: The name of the backend must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#name LoadbalancerBackend#name}
|
|
327
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#id LoadbalancerBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
328
|
+
:param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#properties LoadbalancerBackend#properties}
|
|
329
|
+
:param resolver_name: Domain Name Resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
|
|
326
330
|
'''
|
|
327
331
|
if isinstance(lifecycle, dict):
|
|
328
332
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -435,7 +439,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
435
439
|
def loadbalancer(self) -> builtins.str:
|
|
436
440
|
'''ID of the load balancer to which the backend is connected.
|
|
437
441
|
|
|
438
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
442
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#loadbalancer LoadbalancerBackend#loadbalancer}
|
|
439
443
|
'''
|
|
440
444
|
result = self._values.get("loadbalancer")
|
|
441
445
|
assert result is not None, "Required property 'loadbalancer' is missing"
|
|
@@ -445,7 +449,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
445
449
|
def name(self) -> builtins.str:
|
|
446
450
|
'''The name of the backend must be unique within the load balancer service.
|
|
447
451
|
|
|
448
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
452
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#name LoadbalancerBackend#name}
|
|
449
453
|
'''
|
|
450
454
|
result = self._values.get("name")
|
|
451
455
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -453,7 +457,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
453
457
|
|
|
454
458
|
@builtins.property
|
|
455
459
|
def id(self) -> typing.Optional[builtins.str]:
|
|
456
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
460
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#id LoadbalancerBackend#id}.
|
|
457
461
|
|
|
458
462
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
459
463
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -465,7 +469,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
465
469
|
def properties(self) -> typing.Optional["LoadbalancerBackendProperties"]:
|
|
466
470
|
'''properties block.
|
|
467
471
|
|
|
468
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
472
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#properties LoadbalancerBackend#properties}
|
|
469
473
|
'''
|
|
470
474
|
result = self._values.get("properties")
|
|
471
475
|
return typing.cast(typing.Optional["LoadbalancerBackendProperties"], result)
|
|
@@ -474,7 +478,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
474
478
|
def resolver_name(self) -> typing.Optional[builtins.str]:
|
|
475
479
|
'''Domain Name Resolver used with dynamic type members.
|
|
476
480
|
|
|
477
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
481
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
|
|
478
482
|
'''
|
|
479
483
|
result = self._values.get("resolver_name")
|
|
480
484
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -533,21 +537,21 @@ class LoadbalancerBackendProperties:
|
|
|
533
537
|
tls_verify: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
534
538
|
) -> None:
|
|
535
539
|
'''
|
|
536
|
-
:param health_check_expected_status: Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
537
|
-
:param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
538
|
-
:param health_check_interval: Interval between health checks. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
539
|
-
:param health_check_rise: Sets how many passing checks there must be before returning the backend member to the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
540
|
-
:param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
541
|
-
:param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
542
|
-
:param health_check_url: Target path for health check HTTP GET requests. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
543
|
-
:param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
544
|
-
:param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
545
|
-
:param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
546
|
-
:param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
547
|
-
:param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
548
|
-
:param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
549
|
-
:param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
550
|
-
:param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
540
|
+
:param health_check_expected_status: Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_expected_status LoadbalancerBackend#health_check_expected_status}
|
|
541
|
+
:param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_fall LoadbalancerBackend#health_check_fall}
|
|
542
|
+
:param health_check_interval: Interval between health checks. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_interval LoadbalancerBackend#health_check_interval}
|
|
543
|
+
:param health_check_rise: Sets how many passing checks there must be before returning the backend member to the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_rise LoadbalancerBackend#health_check_rise}
|
|
544
|
+
:param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_tls_verify LoadbalancerBackend#health_check_tls_verify}
|
|
545
|
+
:param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_type LoadbalancerBackend#health_check_type}
|
|
546
|
+
:param health_check_url: Target path for health check HTTP GET requests. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_url LoadbalancerBackend#health_check_url}
|
|
547
|
+
:param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#http2_enabled LoadbalancerBackend#http2_enabled}
|
|
548
|
+
:param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#outbound_proxy_protocol LoadbalancerBackend#outbound_proxy_protocol}
|
|
549
|
+
:param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#sticky_session_cookie_name LoadbalancerBackend#sticky_session_cookie_name}
|
|
550
|
+
:param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#timeout_server LoadbalancerBackend#timeout_server}
|
|
551
|
+
:param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#timeout_tunnel LoadbalancerBackend#timeout_tunnel}
|
|
552
|
+
:param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#tls_enabled LoadbalancerBackend#tls_enabled}
|
|
553
|
+
:param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#tls_use_system_ca LoadbalancerBackend#tls_use_system_ca}
|
|
554
|
+
:param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#tls_verify LoadbalancerBackend#tls_verify}
|
|
551
555
|
'''
|
|
552
556
|
if __debug__:
|
|
553
557
|
type_hints = typing.get_type_hints(_typecheckingstub__eb5988403ea7b17ea78d8a97176e2db70e4258ead0d52fc7ab7102412ecccf40)
|
|
@@ -602,7 +606,7 @@ class LoadbalancerBackendProperties:
|
|
|
602
606
|
def health_check_expected_status(self) -> typing.Optional[jsii.Number]:
|
|
603
607
|
'''Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type.
|
|
604
608
|
|
|
605
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
609
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_expected_status LoadbalancerBackend#health_check_expected_status}
|
|
606
610
|
'''
|
|
607
611
|
result = self._values.get("health_check_expected_status")
|
|
608
612
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -611,7 +615,7 @@ class LoadbalancerBackendProperties:
|
|
|
611
615
|
def health_check_fall(self) -> typing.Optional[jsii.Number]:
|
|
612
616
|
'''Sets how many failed health checks are allowed until the backend member is taken off from the rotation.
|
|
613
617
|
|
|
614
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
618
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_fall LoadbalancerBackend#health_check_fall}
|
|
615
619
|
'''
|
|
616
620
|
result = self._values.get("health_check_fall")
|
|
617
621
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -620,7 +624,7 @@ class LoadbalancerBackendProperties:
|
|
|
620
624
|
def health_check_interval(self) -> typing.Optional[jsii.Number]:
|
|
621
625
|
'''Interval between health checks.
|
|
622
626
|
|
|
623
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
627
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_interval LoadbalancerBackend#health_check_interval}
|
|
624
628
|
'''
|
|
625
629
|
result = self._values.get("health_check_interval")
|
|
626
630
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -629,7 +633,7 @@ class LoadbalancerBackendProperties:
|
|
|
629
633
|
def health_check_rise(self) -> typing.Optional[jsii.Number]:
|
|
630
634
|
'''Sets how many passing checks there must be before returning the backend member to the rotation.
|
|
631
635
|
|
|
632
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
636
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_rise LoadbalancerBackend#health_check_rise}
|
|
633
637
|
'''
|
|
634
638
|
result = self._values.get("health_check_rise")
|
|
635
639
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -640,7 +644,7 @@ class LoadbalancerBackendProperties:
|
|
|
640
644
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
641
645
|
'''Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored.
|
|
642
646
|
|
|
643
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
647
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_tls_verify LoadbalancerBackend#health_check_tls_verify}
|
|
644
648
|
'''
|
|
645
649
|
result = self._values.get("health_check_tls_verify")
|
|
646
650
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -649,7 +653,7 @@ class LoadbalancerBackendProperties:
|
|
|
649
653
|
def health_check_type(self) -> typing.Optional[builtins.str]:
|
|
650
654
|
'''Health check type.
|
|
651
655
|
|
|
652
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
656
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_type LoadbalancerBackend#health_check_type}
|
|
653
657
|
'''
|
|
654
658
|
result = self._values.get("health_check_type")
|
|
655
659
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -658,7 +662,7 @@ class LoadbalancerBackendProperties:
|
|
|
658
662
|
def health_check_url(self) -> typing.Optional[builtins.str]:
|
|
659
663
|
'''Target path for health check HTTP GET requests. Ignored for tcp type.
|
|
660
664
|
|
|
661
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
665
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_url LoadbalancerBackend#health_check_url}
|
|
662
666
|
'''
|
|
663
667
|
result = self._values.get("health_check_url")
|
|
664
668
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -671,7 +675,7 @@ class LoadbalancerBackendProperties:
|
|
|
671
675
|
|
|
672
676
|
Note: members should support HTTP/2 for this setting to work.
|
|
673
677
|
|
|
674
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
678
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#http2_enabled LoadbalancerBackend#http2_enabled}
|
|
675
679
|
'''
|
|
676
680
|
result = self._values.get("http2_enabled")
|
|
677
681
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -680,7 +684,7 @@ class LoadbalancerBackendProperties:
|
|
|
680
684
|
def outbound_proxy_protocol(self) -> typing.Optional[builtins.str]:
|
|
681
685
|
'''Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol.
|
|
682
686
|
|
|
683
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
687
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#outbound_proxy_protocol LoadbalancerBackend#outbound_proxy_protocol}
|
|
684
688
|
'''
|
|
685
689
|
result = self._values.get("outbound_proxy_protocol")
|
|
686
690
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -689,7 +693,7 @@ class LoadbalancerBackendProperties:
|
|
|
689
693
|
def sticky_session_cookie_name(self) -> typing.Optional[builtins.str]:
|
|
690
694
|
'''Sets sticky session cookie name. Empty string disables sticky session.
|
|
691
695
|
|
|
692
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
696
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#sticky_session_cookie_name LoadbalancerBackend#sticky_session_cookie_name}
|
|
693
697
|
'''
|
|
694
698
|
result = self._values.get("sticky_session_cookie_name")
|
|
695
699
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -698,7 +702,7 @@ class LoadbalancerBackendProperties:
|
|
|
698
702
|
def timeout_server(self) -> typing.Optional[jsii.Number]:
|
|
699
703
|
'''Backend server timeout in seconds.
|
|
700
704
|
|
|
701
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
705
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#timeout_server LoadbalancerBackend#timeout_server}
|
|
702
706
|
'''
|
|
703
707
|
result = self._values.get("timeout_server")
|
|
704
708
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -707,7 +711,7 @@ class LoadbalancerBackendProperties:
|
|
|
707
711
|
def timeout_tunnel(self) -> typing.Optional[jsii.Number]:
|
|
708
712
|
'''Maximum inactivity time on the client and server side for tunnels in seconds.
|
|
709
713
|
|
|
710
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
714
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#timeout_tunnel LoadbalancerBackend#timeout_tunnel}
|
|
711
715
|
'''
|
|
712
716
|
result = self._values.get("timeout_tunnel")
|
|
713
717
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -718,7 +722,7 @@ class LoadbalancerBackendProperties:
|
|
|
718
722
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
719
723
|
'''Enables TLS connection from the load balancer to backend servers.
|
|
720
724
|
|
|
721
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
725
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#tls_enabled LoadbalancerBackend#tls_enabled}
|
|
722
726
|
'''
|
|
723
727
|
result = self._values.get("tls_enabled")
|
|
724
728
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -729,7 +733,7 @@ class LoadbalancerBackendProperties:
|
|
|
729
733
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
730
734
|
'''If enabled, then the system CA certificate bundle will be used for the certificate verification.
|
|
731
735
|
|
|
732
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
736
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#tls_use_system_ca LoadbalancerBackend#tls_use_system_ca}
|
|
733
737
|
'''
|
|
734
738
|
result = self._values.get("tls_use_system_ca")
|
|
735
739
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -742,7 +746,7 @@ class LoadbalancerBackendProperties:
|
|
|
742
746
|
|
|
743
747
|
Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true.
|
|
744
748
|
|
|
745
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
749
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#tls_verify LoadbalancerBackend#tls_verify}
|
|
746
750
|
'''
|
|
747
751
|
result = self._values.get("tls_verify")
|
|
748
752
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|