cdktf-cdktf-provider-upcloud 13.0.0__py3-none-any.whl → 14.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +12 -4
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.0.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +629 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +41 -41
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +77 -28
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +47 -47
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +134 -36
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +64 -64
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +39 -39
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +193 -193
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +31 -31
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +175 -175
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +73 -73
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +286 -286
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +103 -103
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +50 -50
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +40 -79
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +544 -0
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +436 -0
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +51 -104
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +467 -0
- cdktf_cdktf_provider_upcloud/network/__init__.py +40 -40
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/provider/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/server/__init__.py +148 -148
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/storage/__init__.py +58 -58
- cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
- {cdktf_cdktf_provider_upcloud-13.0.0.dist-info → cdktf_cdktf_provider_upcloud-14.0.0.dist-info}/METADATA +5 -5
- cdktf_cdktf_provider_upcloud-14.0.0.dist-info/RECORD +58 -0
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@13.0.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-13.0.0.dist-info/RECORD +0 -54
- {cdktf_cdktf_provider_upcloud-13.0.0.dist-info → cdktf_cdktf_provider_upcloud-14.0.0.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-13.0.0.dist-info → cdktf_cdktf_provider_upcloud-14.0.0.dist-info}/WHEEL +0 -0
- {cdktf_cdktf_provider_upcloud-13.0.0.dist-info → cdktf_cdktf_provider_upcloud-14.0.0.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
'''
|
|
2
2
|
# `upcloud_loadbalancer_backend`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_loadbalancer_backend`](https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_loadbalancer_backend`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend).
|
|
5
5
|
'''
|
|
6
6
|
import abc
|
|
7
7
|
import builtins
|
|
@@ -26,7 +26,7 @@ class LoadbalancerBackend(
|
|
|
26
26
|
metaclass=jsii.JSIIMeta,
|
|
27
27
|
jsii_type="@cdktf/provider-upcloud.loadbalancerBackend.LoadbalancerBackend",
|
|
28
28
|
):
|
|
29
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
29
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend upcloud_loadbalancer_backend}.'''
|
|
30
30
|
|
|
31
31
|
def __init__(
|
|
32
32
|
self,
|
|
@@ -46,15 +46,15 @@ class LoadbalancerBackend(
|
|
|
46
46
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
47
47
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
48
48
|
) -> None:
|
|
49
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
49
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend upcloud_loadbalancer_backend} Resource.
|
|
50
50
|
|
|
51
51
|
:param scope: The scope in which to define this construct.
|
|
52
52
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
53
|
-
:param loadbalancer: ID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
54
|
-
:param name: The name of the backend must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
55
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
56
|
-
:param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
57
|
-
:param resolver_name: Domain Name Resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
53
|
+
:param loadbalancer: ID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#loadbalancer LoadbalancerBackend#loadbalancer}
|
|
54
|
+
:param name: The name of the backend must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#name LoadbalancerBackend#name}
|
|
55
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#id LoadbalancerBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
56
|
+
:param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#properties LoadbalancerBackend#properties}
|
|
57
|
+
:param resolver_name: Domain Name Resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
|
|
58
58
|
:param connection:
|
|
59
59
|
:param count:
|
|
60
60
|
:param depends_on:
|
|
@@ -97,7 +97,7 @@ class LoadbalancerBackend(
|
|
|
97
97
|
|
|
98
98
|
:param scope: The scope in which to define this construct.
|
|
99
99
|
:param import_to_id: The construct id used in the generated config for the LoadbalancerBackend to import.
|
|
100
|
-
:param import_from_id: The id of the existing LoadbalancerBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
100
|
+
:param import_from_id: The id of the existing LoadbalancerBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#import import section} in the documentation of this resource for the id to use
|
|
101
101
|
:param provider: ? Optional instance of the provider where the LoadbalancerBackend to import is found.
|
|
102
102
|
'''
|
|
103
103
|
if __debug__:
|
|
@@ -129,21 +129,21 @@ class LoadbalancerBackend(
|
|
|
129
129
|
tls_verify: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
130
130
|
) -> None:
|
|
131
131
|
'''
|
|
132
|
-
:param health_check_expected_status: Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
133
|
-
:param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
134
|
-
:param health_check_interval: Interval between health checks. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
135
|
-
:param health_check_rise: Sets how many passing checks there must be before returning the backend member to the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
136
|
-
:param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
137
|
-
:param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
138
|
-
:param health_check_url: Target path for health check HTTP GET requests. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
139
|
-
:param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
140
|
-
:param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
141
|
-
:param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
142
|
-
:param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
143
|
-
:param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
144
|
-
:param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
145
|
-
:param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
146
|
-
:param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
132
|
+
:param health_check_expected_status: Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#health_check_expected_status LoadbalancerBackend#health_check_expected_status}
|
|
133
|
+
:param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#health_check_fall LoadbalancerBackend#health_check_fall}
|
|
134
|
+
:param health_check_interval: Interval between health checks. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#health_check_interval LoadbalancerBackend#health_check_interval}
|
|
135
|
+
:param health_check_rise: Sets how many passing checks there must be before returning the backend member to the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#health_check_rise LoadbalancerBackend#health_check_rise}
|
|
136
|
+
:param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#health_check_tls_verify LoadbalancerBackend#health_check_tls_verify}
|
|
137
|
+
:param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#health_check_type LoadbalancerBackend#health_check_type}
|
|
138
|
+
:param health_check_url: Target path for health check HTTP GET requests. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#health_check_url LoadbalancerBackend#health_check_url}
|
|
139
|
+
:param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#http2_enabled LoadbalancerBackend#http2_enabled}
|
|
140
|
+
:param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#outbound_proxy_protocol LoadbalancerBackend#outbound_proxy_protocol}
|
|
141
|
+
:param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#sticky_session_cookie_name LoadbalancerBackend#sticky_session_cookie_name}
|
|
142
|
+
:param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#timeout_server LoadbalancerBackend#timeout_server}
|
|
143
|
+
:param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#timeout_tunnel LoadbalancerBackend#timeout_tunnel}
|
|
144
|
+
:param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#tls_enabled LoadbalancerBackend#tls_enabled}
|
|
145
|
+
:param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#tls_use_system_ca LoadbalancerBackend#tls_use_system_ca}
|
|
146
|
+
:param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#tls_verify LoadbalancerBackend#tls_verify}
|
|
147
147
|
'''
|
|
148
148
|
value = LoadbalancerBackendProperties(
|
|
149
149
|
health_check_expected_status=health_check_expected_status,
|
|
@@ -322,11 +322,11 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
322
322
|
:param lifecycle:
|
|
323
323
|
:param provider:
|
|
324
324
|
:param provisioners:
|
|
325
|
-
:param loadbalancer: ID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
326
|
-
:param name: The name of the backend must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
327
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
328
|
-
:param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
329
|
-
:param resolver_name: Domain Name Resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
325
|
+
:param loadbalancer: ID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#loadbalancer LoadbalancerBackend#loadbalancer}
|
|
326
|
+
:param name: The name of the backend must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#name LoadbalancerBackend#name}
|
|
327
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#id LoadbalancerBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
328
|
+
:param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#properties LoadbalancerBackend#properties}
|
|
329
|
+
:param resolver_name: Domain Name Resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
|
|
330
330
|
'''
|
|
331
331
|
if isinstance(lifecycle, dict):
|
|
332
332
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -439,7 +439,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
439
439
|
def loadbalancer(self) -> builtins.str:
|
|
440
440
|
'''ID of the load balancer to which the backend is connected.
|
|
441
441
|
|
|
442
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
442
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#loadbalancer LoadbalancerBackend#loadbalancer}
|
|
443
443
|
'''
|
|
444
444
|
result = self._values.get("loadbalancer")
|
|
445
445
|
assert result is not None, "Required property 'loadbalancer' is missing"
|
|
@@ -449,7 +449,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
449
449
|
def name(self) -> builtins.str:
|
|
450
450
|
'''The name of the backend must be unique within the load balancer service.
|
|
451
451
|
|
|
452
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
452
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#name LoadbalancerBackend#name}
|
|
453
453
|
'''
|
|
454
454
|
result = self._values.get("name")
|
|
455
455
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -457,7 +457,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
457
457
|
|
|
458
458
|
@builtins.property
|
|
459
459
|
def id(self) -> typing.Optional[builtins.str]:
|
|
460
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
460
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#id LoadbalancerBackend#id}.
|
|
461
461
|
|
|
462
462
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
463
463
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -469,7 +469,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
469
469
|
def properties(self) -> typing.Optional["LoadbalancerBackendProperties"]:
|
|
470
470
|
'''properties block.
|
|
471
471
|
|
|
472
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
472
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#properties LoadbalancerBackend#properties}
|
|
473
473
|
'''
|
|
474
474
|
result = self._values.get("properties")
|
|
475
475
|
return typing.cast(typing.Optional["LoadbalancerBackendProperties"], result)
|
|
@@ -478,7 +478,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
478
478
|
def resolver_name(self) -> typing.Optional[builtins.str]:
|
|
479
479
|
'''Domain Name Resolver used with dynamic type members.
|
|
480
480
|
|
|
481
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
481
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
|
|
482
482
|
'''
|
|
483
483
|
result = self._values.get("resolver_name")
|
|
484
484
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -537,21 +537,21 @@ class LoadbalancerBackendProperties:
|
|
|
537
537
|
tls_verify: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
538
538
|
) -> None:
|
|
539
539
|
'''
|
|
540
|
-
:param health_check_expected_status: Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
541
|
-
:param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
542
|
-
:param health_check_interval: Interval between health checks. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
543
|
-
:param health_check_rise: Sets how many passing checks there must be before returning the backend member to the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
544
|
-
:param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
545
|
-
:param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
546
|
-
:param health_check_url: Target path for health check HTTP GET requests. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
547
|
-
:param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
548
|
-
:param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
549
|
-
:param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
550
|
-
:param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
551
|
-
:param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
552
|
-
:param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
553
|
-
:param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
554
|
-
:param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
540
|
+
:param health_check_expected_status: Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#health_check_expected_status LoadbalancerBackend#health_check_expected_status}
|
|
541
|
+
:param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#health_check_fall LoadbalancerBackend#health_check_fall}
|
|
542
|
+
:param health_check_interval: Interval between health checks. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#health_check_interval LoadbalancerBackend#health_check_interval}
|
|
543
|
+
:param health_check_rise: Sets how many passing checks there must be before returning the backend member to the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#health_check_rise LoadbalancerBackend#health_check_rise}
|
|
544
|
+
:param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#health_check_tls_verify LoadbalancerBackend#health_check_tls_verify}
|
|
545
|
+
:param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#health_check_type LoadbalancerBackend#health_check_type}
|
|
546
|
+
:param health_check_url: Target path for health check HTTP GET requests. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#health_check_url LoadbalancerBackend#health_check_url}
|
|
547
|
+
:param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#http2_enabled LoadbalancerBackend#http2_enabled}
|
|
548
|
+
:param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#outbound_proxy_protocol LoadbalancerBackend#outbound_proxy_protocol}
|
|
549
|
+
:param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#sticky_session_cookie_name LoadbalancerBackend#sticky_session_cookie_name}
|
|
550
|
+
:param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#timeout_server LoadbalancerBackend#timeout_server}
|
|
551
|
+
:param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#timeout_tunnel LoadbalancerBackend#timeout_tunnel}
|
|
552
|
+
:param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#tls_enabled LoadbalancerBackend#tls_enabled}
|
|
553
|
+
:param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#tls_use_system_ca LoadbalancerBackend#tls_use_system_ca}
|
|
554
|
+
:param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#tls_verify LoadbalancerBackend#tls_verify}
|
|
555
555
|
'''
|
|
556
556
|
if __debug__:
|
|
557
557
|
type_hints = typing.get_type_hints(_typecheckingstub__eb5988403ea7b17ea78d8a97176e2db70e4258ead0d52fc7ab7102412ecccf40)
|
|
@@ -606,7 +606,7 @@ class LoadbalancerBackendProperties:
|
|
|
606
606
|
def health_check_expected_status(self) -> typing.Optional[jsii.Number]:
|
|
607
607
|
'''Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type.
|
|
608
608
|
|
|
609
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
609
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#health_check_expected_status LoadbalancerBackend#health_check_expected_status}
|
|
610
610
|
'''
|
|
611
611
|
result = self._values.get("health_check_expected_status")
|
|
612
612
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -615,7 +615,7 @@ class LoadbalancerBackendProperties:
|
|
|
615
615
|
def health_check_fall(self) -> typing.Optional[jsii.Number]:
|
|
616
616
|
'''Sets how many failed health checks are allowed until the backend member is taken off from the rotation.
|
|
617
617
|
|
|
618
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
618
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#health_check_fall LoadbalancerBackend#health_check_fall}
|
|
619
619
|
'''
|
|
620
620
|
result = self._values.get("health_check_fall")
|
|
621
621
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -624,7 +624,7 @@ class LoadbalancerBackendProperties:
|
|
|
624
624
|
def health_check_interval(self) -> typing.Optional[jsii.Number]:
|
|
625
625
|
'''Interval between health checks.
|
|
626
626
|
|
|
627
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
627
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#health_check_interval LoadbalancerBackend#health_check_interval}
|
|
628
628
|
'''
|
|
629
629
|
result = self._values.get("health_check_interval")
|
|
630
630
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -633,7 +633,7 @@ class LoadbalancerBackendProperties:
|
|
|
633
633
|
def health_check_rise(self) -> typing.Optional[jsii.Number]:
|
|
634
634
|
'''Sets how many passing checks there must be before returning the backend member to the rotation.
|
|
635
635
|
|
|
636
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
636
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#health_check_rise LoadbalancerBackend#health_check_rise}
|
|
637
637
|
'''
|
|
638
638
|
result = self._values.get("health_check_rise")
|
|
639
639
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -644,7 +644,7 @@ class LoadbalancerBackendProperties:
|
|
|
644
644
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
645
645
|
'''Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored.
|
|
646
646
|
|
|
647
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
647
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#health_check_tls_verify LoadbalancerBackend#health_check_tls_verify}
|
|
648
648
|
'''
|
|
649
649
|
result = self._values.get("health_check_tls_verify")
|
|
650
650
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -653,7 +653,7 @@ class LoadbalancerBackendProperties:
|
|
|
653
653
|
def health_check_type(self) -> typing.Optional[builtins.str]:
|
|
654
654
|
'''Health check type.
|
|
655
655
|
|
|
656
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
656
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#health_check_type LoadbalancerBackend#health_check_type}
|
|
657
657
|
'''
|
|
658
658
|
result = self._values.get("health_check_type")
|
|
659
659
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -662,7 +662,7 @@ class LoadbalancerBackendProperties:
|
|
|
662
662
|
def health_check_url(self) -> typing.Optional[builtins.str]:
|
|
663
663
|
'''Target path for health check HTTP GET requests. Ignored for tcp type.
|
|
664
664
|
|
|
665
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
665
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#health_check_url LoadbalancerBackend#health_check_url}
|
|
666
666
|
'''
|
|
667
667
|
result = self._values.get("health_check_url")
|
|
668
668
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -675,7 +675,7 @@ class LoadbalancerBackendProperties:
|
|
|
675
675
|
|
|
676
676
|
Note: members should support HTTP/2 for this setting to work.
|
|
677
677
|
|
|
678
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
678
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#http2_enabled LoadbalancerBackend#http2_enabled}
|
|
679
679
|
'''
|
|
680
680
|
result = self._values.get("http2_enabled")
|
|
681
681
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -684,7 +684,7 @@ class LoadbalancerBackendProperties:
|
|
|
684
684
|
def outbound_proxy_protocol(self) -> typing.Optional[builtins.str]:
|
|
685
685
|
'''Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol.
|
|
686
686
|
|
|
687
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
687
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#outbound_proxy_protocol LoadbalancerBackend#outbound_proxy_protocol}
|
|
688
688
|
'''
|
|
689
689
|
result = self._values.get("outbound_proxy_protocol")
|
|
690
690
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -693,7 +693,7 @@ class LoadbalancerBackendProperties:
|
|
|
693
693
|
def sticky_session_cookie_name(self) -> typing.Optional[builtins.str]:
|
|
694
694
|
'''Sets sticky session cookie name. Empty string disables sticky session.
|
|
695
695
|
|
|
696
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
696
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#sticky_session_cookie_name LoadbalancerBackend#sticky_session_cookie_name}
|
|
697
697
|
'''
|
|
698
698
|
result = self._values.get("sticky_session_cookie_name")
|
|
699
699
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -702,7 +702,7 @@ class LoadbalancerBackendProperties:
|
|
|
702
702
|
def timeout_server(self) -> typing.Optional[jsii.Number]:
|
|
703
703
|
'''Backend server timeout in seconds.
|
|
704
704
|
|
|
705
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
705
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#timeout_server LoadbalancerBackend#timeout_server}
|
|
706
706
|
'''
|
|
707
707
|
result = self._values.get("timeout_server")
|
|
708
708
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -711,7 +711,7 @@ class LoadbalancerBackendProperties:
|
|
|
711
711
|
def timeout_tunnel(self) -> typing.Optional[jsii.Number]:
|
|
712
712
|
'''Maximum inactivity time on the client and server side for tunnels in seconds.
|
|
713
713
|
|
|
714
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
714
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#timeout_tunnel LoadbalancerBackend#timeout_tunnel}
|
|
715
715
|
'''
|
|
716
716
|
result = self._values.get("timeout_tunnel")
|
|
717
717
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -722,7 +722,7 @@ class LoadbalancerBackendProperties:
|
|
|
722
722
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
723
723
|
'''Enables TLS connection from the load balancer to backend servers.
|
|
724
724
|
|
|
725
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
725
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#tls_enabled LoadbalancerBackend#tls_enabled}
|
|
726
726
|
'''
|
|
727
727
|
result = self._values.get("tls_enabled")
|
|
728
728
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -733,7 +733,7 @@ class LoadbalancerBackendProperties:
|
|
|
733
733
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
734
734
|
'''If enabled, then the system CA certificate bundle will be used for the certificate verification.
|
|
735
735
|
|
|
736
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
736
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#tls_use_system_ca LoadbalancerBackend#tls_use_system_ca}
|
|
737
737
|
'''
|
|
738
738
|
result = self._values.get("tls_use_system_ca")
|
|
739
739
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -746,7 +746,7 @@ class LoadbalancerBackendProperties:
|
|
|
746
746
|
|
|
747
747
|
Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true.
|
|
748
748
|
|
|
749
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
749
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend#tls_verify LoadbalancerBackend#tls_verify}
|
|
750
750
|
'''
|
|
751
751
|
result = self._values.get("tls_verify")
|
|
752
752
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
'''
|
|
2
2
|
# `upcloud_loadbalancer_backend_tls_config`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_loadbalancer_backend_tls_config`](https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_loadbalancer_backend_tls_config`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend_tls_config).
|
|
5
5
|
'''
|
|
6
6
|
import abc
|
|
7
7
|
import builtins
|
|
@@ -26,7 +26,7 @@ class LoadbalancerBackendTlsConfig(
|
|
|
26
26
|
metaclass=jsii.JSIIMeta,
|
|
27
27
|
jsii_type="@cdktf/provider-upcloud.loadbalancerBackendTlsConfig.LoadbalancerBackendTlsConfig",
|
|
28
28
|
):
|
|
29
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
29
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend_tls_config upcloud_loadbalancer_backend_tls_config}.'''
|
|
30
30
|
|
|
31
31
|
def __init__(
|
|
32
32
|
self,
|
|
@@ -45,14 +45,14 @@ class LoadbalancerBackendTlsConfig(
|
|
|
45
45
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
46
46
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
47
47
|
) -> None:
|
|
48
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
48
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend_tls_config upcloud_loadbalancer_backend_tls_config} Resource.
|
|
49
49
|
|
|
50
50
|
:param scope: The scope in which to define this construct.
|
|
51
51
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
52
|
-
:param backend: ID of the load balancer backend to which the TLS config is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
53
|
-
:param certificate_bundle: Reference to certificate bundle ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
54
|
-
:param name: The name of the TLS config must be unique within service backend. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
55
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
52
|
+
:param backend: ID of the load balancer backend to which the TLS config is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend_tls_config#backend LoadbalancerBackendTlsConfig#backend}
|
|
53
|
+
:param certificate_bundle: Reference to certificate bundle ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend_tls_config#certificate_bundle LoadbalancerBackendTlsConfig#certificate_bundle}
|
|
54
|
+
:param name: The name of the TLS config must be unique within service backend. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend_tls_config#name LoadbalancerBackendTlsConfig#name}
|
|
55
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend_tls_config#id LoadbalancerBackendTlsConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
56
56
|
:param connection:
|
|
57
57
|
:param count:
|
|
58
58
|
:param depends_on:
|
|
@@ -94,7 +94,7 @@ class LoadbalancerBackendTlsConfig(
|
|
|
94
94
|
|
|
95
95
|
:param scope: The scope in which to define this construct.
|
|
96
96
|
:param import_to_id: The construct id used in the generated config for the LoadbalancerBackendTlsConfig to import.
|
|
97
|
-
:param import_from_id: The id of the existing LoadbalancerBackendTlsConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
97
|
+
:param import_from_id: The id of the existing LoadbalancerBackendTlsConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend_tls_config#import import section} in the documentation of this resource for the id to use
|
|
98
98
|
:param provider: ? Optional instance of the provider where the LoadbalancerBackendTlsConfig to import is found.
|
|
99
99
|
'''
|
|
100
100
|
if __debug__:
|
|
@@ -232,10 +232,10 @@ class LoadbalancerBackendTlsConfigConfig(_cdktf_9a9027ec.TerraformMetaArguments)
|
|
|
232
232
|
:param lifecycle:
|
|
233
233
|
:param provider:
|
|
234
234
|
:param provisioners:
|
|
235
|
-
:param backend: ID of the load balancer backend to which the TLS config is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
236
|
-
:param certificate_bundle: Reference to certificate bundle ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
237
|
-
:param name: The name of the TLS config must be unique within service backend. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
238
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
235
|
+
:param backend: ID of the load balancer backend to which the TLS config is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend_tls_config#backend LoadbalancerBackendTlsConfig#backend}
|
|
236
|
+
:param certificate_bundle: Reference to certificate bundle ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend_tls_config#certificate_bundle LoadbalancerBackendTlsConfig#certificate_bundle}
|
|
237
|
+
:param name: The name of the TLS config must be unique within service backend. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend_tls_config#name LoadbalancerBackendTlsConfig#name}
|
|
238
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend_tls_config#id LoadbalancerBackendTlsConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
239
239
|
'''
|
|
240
240
|
if isinstance(lifecycle, dict):
|
|
241
241
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -342,7 +342,7 @@ class LoadbalancerBackendTlsConfigConfig(_cdktf_9a9027ec.TerraformMetaArguments)
|
|
|
342
342
|
def backend(self) -> builtins.str:
|
|
343
343
|
'''ID of the load balancer backend to which the TLS config is connected.
|
|
344
344
|
|
|
345
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
345
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend_tls_config#backend LoadbalancerBackendTlsConfig#backend}
|
|
346
346
|
'''
|
|
347
347
|
result = self._values.get("backend")
|
|
348
348
|
assert result is not None, "Required property 'backend' is missing"
|
|
@@ -352,7 +352,7 @@ class LoadbalancerBackendTlsConfigConfig(_cdktf_9a9027ec.TerraformMetaArguments)
|
|
|
352
352
|
def certificate_bundle(self) -> builtins.str:
|
|
353
353
|
'''Reference to certificate bundle ID.
|
|
354
354
|
|
|
355
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
355
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend_tls_config#certificate_bundle LoadbalancerBackendTlsConfig#certificate_bundle}
|
|
356
356
|
'''
|
|
357
357
|
result = self._values.get("certificate_bundle")
|
|
358
358
|
assert result is not None, "Required property 'certificate_bundle' is missing"
|
|
@@ -362,7 +362,7 @@ class LoadbalancerBackendTlsConfigConfig(_cdktf_9a9027ec.TerraformMetaArguments)
|
|
|
362
362
|
def name(self) -> builtins.str:
|
|
363
363
|
'''The name of the TLS config must be unique within service backend.
|
|
364
364
|
|
|
365
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
365
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend_tls_config#name LoadbalancerBackendTlsConfig#name}
|
|
366
366
|
'''
|
|
367
367
|
result = self._values.get("name")
|
|
368
368
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -370,7 +370,7 @@ class LoadbalancerBackendTlsConfigConfig(_cdktf_9a9027ec.TerraformMetaArguments)
|
|
|
370
370
|
|
|
371
371
|
@builtins.property
|
|
372
372
|
def id(self) -> typing.Optional[builtins.str]:
|
|
373
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
373
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/loadbalancer_backend_tls_config#id LoadbalancerBackendTlsConfig#id}.
|
|
374
374
|
|
|
375
375
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
376
376
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|