cdktf-cdktf-provider-upcloud 14.1.1__py3-none-any.whl → 14.2.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +10 -3
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +5 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.2.1.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +10 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +10 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +10 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +25 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +16 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +33 -30
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +25 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +13 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +10 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +16 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +28 -25
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +10 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +13 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +13 -10
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +44 -41
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +22 -19
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +254 -29
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +1279 -0
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +1337 -0
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +34 -31
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +50 -47
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +45 -42
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +67 -64
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +19 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +31 -28
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +19 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +42 -39
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +196 -193
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +19 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +22 -19
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +34 -31
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +31 -28
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +22 -19
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +192 -189
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +336 -333
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +348 -345
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +120 -117
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +53 -50
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +33 -30
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +22 -19
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +16 -13
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +19 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +19 -16
- cdktf_cdktf_provider_upcloud/network/__init__.py +43 -40
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +33 -30
- cdktf_cdktf_provider_upcloud/provider/__init__.py +28 -25
- cdktf_cdktf_provider_upcloud/router/__init__.py +22 -19
- cdktf_cdktf_provider_upcloud/server/__init__.py +150 -147
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +25 -22
- cdktf_cdktf_provider_upcloud/storage/__init__.py +61 -58
- cdktf_cdktf_provider_upcloud/tag/__init__.py +19 -16
- {cdktf_cdktf_provider_upcloud-14.1.1.dist-info → cdktf_cdktf_provider_upcloud-14.2.1.dist-info}/METADATA +5 -5
- cdktf_cdktf_provider_upcloud-14.2.1.dist-info/RECORD +60 -0
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.1.1.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-14.1.1.dist-info/RECORD +0 -58
- {cdktf_cdktf_provider_upcloud-14.1.1.dist-info → cdktf_cdktf_provider_upcloud-14.2.1.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-14.1.1.dist-info → cdktf_cdktf_provider_upcloud-14.2.1.dist-info}/WHEEL +0 -0
- {cdktf_cdktf_provider_upcloud-14.1.1.dist-info → cdktf_cdktf_provider_upcloud-14.2.1.dist-info}/top_level.txt +0 -0
|
@@ -1,8 +1,11 @@
|
|
|
1
1
|
'''
|
|
2
2
|
# `upcloud_loadbalancer_backend`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_loadbalancer_backend`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_loadbalancer_backend`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend).
|
|
5
5
|
'''
|
|
6
|
+
from pkgutil import extend_path
|
|
7
|
+
__path__ = extend_path(__path__, __name__)
|
|
8
|
+
|
|
6
9
|
import abc
|
|
7
10
|
import builtins
|
|
8
11
|
import datetime
|
|
@@ -26,7 +29,7 @@ class LoadbalancerBackend(
|
|
|
26
29
|
metaclass=jsii.JSIIMeta,
|
|
27
30
|
jsii_type="@cdktf/provider-upcloud.loadbalancerBackend.LoadbalancerBackend",
|
|
28
31
|
):
|
|
29
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
32
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend upcloud_loadbalancer_backend}.'''
|
|
30
33
|
|
|
31
34
|
def __init__(
|
|
32
35
|
self,
|
|
@@ -46,15 +49,15 @@ class LoadbalancerBackend(
|
|
|
46
49
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
47
50
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
48
51
|
) -> None:
|
|
49
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
52
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend upcloud_loadbalancer_backend} Resource.
|
|
50
53
|
|
|
51
54
|
:param scope: The scope in which to define this construct.
|
|
52
55
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
53
|
-
:param loadbalancer: ID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
54
|
-
:param name: The name of the backend must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
55
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
56
|
-
:param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
57
|
-
:param resolver_name: Domain Name Resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
56
|
+
:param loadbalancer: ID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#loadbalancer LoadbalancerBackend#loadbalancer}
|
|
57
|
+
:param name: The name of the backend must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#name LoadbalancerBackend#name}
|
|
58
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#id LoadbalancerBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
59
|
+
:param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#properties LoadbalancerBackend#properties}
|
|
60
|
+
:param resolver_name: Domain Name Resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
|
|
58
61
|
:param connection:
|
|
59
62
|
:param count:
|
|
60
63
|
:param depends_on:
|
|
@@ -97,7 +100,7 @@ class LoadbalancerBackend(
|
|
|
97
100
|
|
|
98
101
|
:param scope: The scope in which to define this construct.
|
|
99
102
|
:param import_to_id: The construct id used in the generated config for the LoadbalancerBackend to import.
|
|
100
|
-
:param import_from_id: The id of the existing LoadbalancerBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
103
|
+
:param import_from_id: The id of the existing LoadbalancerBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#import import section} in the documentation of this resource for the id to use
|
|
101
104
|
:param provider: ? Optional instance of the provider where the LoadbalancerBackend to import is found.
|
|
102
105
|
'''
|
|
103
106
|
if __debug__:
|
|
@@ -129,21 +132,21 @@ class LoadbalancerBackend(
|
|
|
129
132
|
tls_verify: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
130
133
|
) -> None:
|
|
131
134
|
'''
|
|
132
|
-
:param health_check_expected_status: Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
133
|
-
:param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
134
|
-
:param health_check_interval: Interval between health checks. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
135
|
-
:param health_check_rise: Sets how many passing checks there must be before returning the backend member to the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
136
|
-
:param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
137
|
-
:param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
138
|
-
:param health_check_url: Target path for health check HTTP GET requests. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
139
|
-
:param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
140
|
-
:param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
141
|
-
:param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
142
|
-
:param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
143
|
-
:param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
144
|
-
:param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
145
|
-
:param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
146
|
-
:param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
135
|
+
:param health_check_expected_status: Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#health_check_expected_status LoadbalancerBackend#health_check_expected_status}
|
|
136
|
+
:param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#health_check_fall LoadbalancerBackend#health_check_fall}
|
|
137
|
+
:param health_check_interval: Interval between health checks. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#health_check_interval LoadbalancerBackend#health_check_interval}
|
|
138
|
+
:param health_check_rise: Sets how many passing checks there must be before returning the backend member to the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#health_check_rise LoadbalancerBackend#health_check_rise}
|
|
139
|
+
:param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#health_check_tls_verify LoadbalancerBackend#health_check_tls_verify}
|
|
140
|
+
:param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#health_check_type LoadbalancerBackend#health_check_type}
|
|
141
|
+
:param health_check_url: Target path for health check HTTP GET requests. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#health_check_url LoadbalancerBackend#health_check_url}
|
|
142
|
+
:param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#http2_enabled LoadbalancerBackend#http2_enabled}
|
|
143
|
+
:param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#outbound_proxy_protocol LoadbalancerBackend#outbound_proxy_protocol}
|
|
144
|
+
:param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#sticky_session_cookie_name LoadbalancerBackend#sticky_session_cookie_name}
|
|
145
|
+
:param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#timeout_server LoadbalancerBackend#timeout_server}
|
|
146
|
+
:param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#timeout_tunnel LoadbalancerBackend#timeout_tunnel}
|
|
147
|
+
:param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#tls_enabled LoadbalancerBackend#tls_enabled}
|
|
148
|
+
:param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#tls_use_system_ca LoadbalancerBackend#tls_use_system_ca}
|
|
149
|
+
:param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#tls_verify LoadbalancerBackend#tls_verify}
|
|
147
150
|
'''
|
|
148
151
|
value = LoadbalancerBackendProperties(
|
|
149
152
|
health_check_expected_status=health_check_expected_status,
|
|
@@ -322,11 +325,11 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
322
325
|
:param lifecycle:
|
|
323
326
|
:param provider:
|
|
324
327
|
:param provisioners:
|
|
325
|
-
:param loadbalancer: ID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
326
|
-
:param name: The name of the backend must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
327
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
328
|
-
:param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
329
|
-
:param resolver_name: Domain Name Resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
328
|
+
:param loadbalancer: ID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#loadbalancer LoadbalancerBackend#loadbalancer}
|
|
329
|
+
:param name: The name of the backend must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#name LoadbalancerBackend#name}
|
|
330
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#id LoadbalancerBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
331
|
+
:param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#properties LoadbalancerBackend#properties}
|
|
332
|
+
:param resolver_name: Domain Name Resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
|
|
330
333
|
'''
|
|
331
334
|
if isinstance(lifecycle, dict):
|
|
332
335
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -439,7 +442,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
439
442
|
def loadbalancer(self) -> builtins.str:
|
|
440
443
|
'''ID of the load balancer to which the backend is connected.
|
|
441
444
|
|
|
442
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
445
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#loadbalancer LoadbalancerBackend#loadbalancer}
|
|
443
446
|
'''
|
|
444
447
|
result = self._values.get("loadbalancer")
|
|
445
448
|
assert result is not None, "Required property 'loadbalancer' is missing"
|
|
@@ -449,7 +452,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
449
452
|
def name(self) -> builtins.str:
|
|
450
453
|
'''The name of the backend must be unique within the load balancer service.
|
|
451
454
|
|
|
452
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
455
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#name LoadbalancerBackend#name}
|
|
453
456
|
'''
|
|
454
457
|
result = self._values.get("name")
|
|
455
458
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -457,7 +460,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
457
460
|
|
|
458
461
|
@builtins.property
|
|
459
462
|
def id(self) -> typing.Optional[builtins.str]:
|
|
460
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
463
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#id LoadbalancerBackend#id}.
|
|
461
464
|
|
|
462
465
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
463
466
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -469,7 +472,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
469
472
|
def properties(self) -> typing.Optional["LoadbalancerBackendProperties"]:
|
|
470
473
|
'''properties block.
|
|
471
474
|
|
|
472
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
475
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#properties LoadbalancerBackend#properties}
|
|
473
476
|
'''
|
|
474
477
|
result = self._values.get("properties")
|
|
475
478
|
return typing.cast(typing.Optional["LoadbalancerBackendProperties"], result)
|
|
@@ -478,7 +481,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
478
481
|
def resolver_name(self) -> typing.Optional[builtins.str]:
|
|
479
482
|
'''Domain Name Resolver used with dynamic type members.
|
|
480
483
|
|
|
481
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
484
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
|
|
482
485
|
'''
|
|
483
486
|
result = self._values.get("resolver_name")
|
|
484
487
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -537,21 +540,21 @@ class LoadbalancerBackendProperties:
|
|
|
537
540
|
tls_verify: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
538
541
|
) -> None:
|
|
539
542
|
'''
|
|
540
|
-
:param health_check_expected_status: Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
541
|
-
:param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
542
|
-
:param health_check_interval: Interval between health checks. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
543
|
-
:param health_check_rise: Sets how many passing checks there must be before returning the backend member to the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
544
|
-
:param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
545
|
-
:param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
546
|
-
:param health_check_url: Target path for health check HTTP GET requests. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
547
|
-
:param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
548
|
-
:param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
549
|
-
:param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
550
|
-
:param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
551
|
-
:param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
552
|
-
:param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
553
|
-
:param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
554
|
-
:param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
543
|
+
:param health_check_expected_status: Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#health_check_expected_status LoadbalancerBackend#health_check_expected_status}
|
|
544
|
+
:param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#health_check_fall LoadbalancerBackend#health_check_fall}
|
|
545
|
+
:param health_check_interval: Interval between health checks. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#health_check_interval LoadbalancerBackend#health_check_interval}
|
|
546
|
+
:param health_check_rise: Sets how many passing checks there must be before returning the backend member to the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#health_check_rise LoadbalancerBackend#health_check_rise}
|
|
547
|
+
:param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#health_check_tls_verify LoadbalancerBackend#health_check_tls_verify}
|
|
548
|
+
:param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#health_check_type LoadbalancerBackend#health_check_type}
|
|
549
|
+
:param health_check_url: Target path for health check HTTP GET requests. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#health_check_url LoadbalancerBackend#health_check_url}
|
|
550
|
+
:param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#http2_enabled LoadbalancerBackend#http2_enabled}
|
|
551
|
+
:param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#outbound_proxy_protocol LoadbalancerBackend#outbound_proxy_protocol}
|
|
552
|
+
:param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#sticky_session_cookie_name LoadbalancerBackend#sticky_session_cookie_name}
|
|
553
|
+
:param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#timeout_server LoadbalancerBackend#timeout_server}
|
|
554
|
+
:param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#timeout_tunnel LoadbalancerBackend#timeout_tunnel}
|
|
555
|
+
:param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#tls_enabled LoadbalancerBackend#tls_enabled}
|
|
556
|
+
:param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#tls_use_system_ca LoadbalancerBackend#tls_use_system_ca}
|
|
557
|
+
:param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#tls_verify LoadbalancerBackend#tls_verify}
|
|
555
558
|
'''
|
|
556
559
|
if __debug__:
|
|
557
560
|
type_hints = typing.get_type_hints(_typecheckingstub__eb5988403ea7b17ea78d8a97176e2db70e4258ead0d52fc7ab7102412ecccf40)
|
|
@@ -606,7 +609,7 @@ class LoadbalancerBackendProperties:
|
|
|
606
609
|
def health_check_expected_status(self) -> typing.Optional[jsii.Number]:
|
|
607
610
|
'''Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type.
|
|
608
611
|
|
|
609
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
612
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#health_check_expected_status LoadbalancerBackend#health_check_expected_status}
|
|
610
613
|
'''
|
|
611
614
|
result = self._values.get("health_check_expected_status")
|
|
612
615
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -615,7 +618,7 @@ class LoadbalancerBackendProperties:
|
|
|
615
618
|
def health_check_fall(self) -> typing.Optional[jsii.Number]:
|
|
616
619
|
'''Sets how many failed health checks are allowed until the backend member is taken off from the rotation.
|
|
617
620
|
|
|
618
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
621
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#health_check_fall LoadbalancerBackend#health_check_fall}
|
|
619
622
|
'''
|
|
620
623
|
result = self._values.get("health_check_fall")
|
|
621
624
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -624,7 +627,7 @@ class LoadbalancerBackendProperties:
|
|
|
624
627
|
def health_check_interval(self) -> typing.Optional[jsii.Number]:
|
|
625
628
|
'''Interval between health checks.
|
|
626
629
|
|
|
627
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
630
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#health_check_interval LoadbalancerBackend#health_check_interval}
|
|
628
631
|
'''
|
|
629
632
|
result = self._values.get("health_check_interval")
|
|
630
633
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -633,7 +636,7 @@ class LoadbalancerBackendProperties:
|
|
|
633
636
|
def health_check_rise(self) -> typing.Optional[jsii.Number]:
|
|
634
637
|
'''Sets how many passing checks there must be before returning the backend member to the rotation.
|
|
635
638
|
|
|
636
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
639
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#health_check_rise LoadbalancerBackend#health_check_rise}
|
|
637
640
|
'''
|
|
638
641
|
result = self._values.get("health_check_rise")
|
|
639
642
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -644,7 +647,7 @@ class LoadbalancerBackendProperties:
|
|
|
644
647
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
645
648
|
'''Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored.
|
|
646
649
|
|
|
647
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
650
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#health_check_tls_verify LoadbalancerBackend#health_check_tls_verify}
|
|
648
651
|
'''
|
|
649
652
|
result = self._values.get("health_check_tls_verify")
|
|
650
653
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -653,7 +656,7 @@ class LoadbalancerBackendProperties:
|
|
|
653
656
|
def health_check_type(self) -> typing.Optional[builtins.str]:
|
|
654
657
|
'''Health check type.
|
|
655
658
|
|
|
656
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
659
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#health_check_type LoadbalancerBackend#health_check_type}
|
|
657
660
|
'''
|
|
658
661
|
result = self._values.get("health_check_type")
|
|
659
662
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -662,7 +665,7 @@ class LoadbalancerBackendProperties:
|
|
|
662
665
|
def health_check_url(self) -> typing.Optional[builtins.str]:
|
|
663
666
|
'''Target path for health check HTTP GET requests. Ignored for tcp type.
|
|
664
667
|
|
|
665
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
668
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#health_check_url LoadbalancerBackend#health_check_url}
|
|
666
669
|
'''
|
|
667
670
|
result = self._values.get("health_check_url")
|
|
668
671
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -675,7 +678,7 @@ class LoadbalancerBackendProperties:
|
|
|
675
678
|
|
|
676
679
|
Note: members should support HTTP/2 for this setting to work.
|
|
677
680
|
|
|
678
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
681
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#http2_enabled LoadbalancerBackend#http2_enabled}
|
|
679
682
|
'''
|
|
680
683
|
result = self._values.get("http2_enabled")
|
|
681
684
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -684,7 +687,7 @@ class LoadbalancerBackendProperties:
|
|
|
684
687
|
def outbound_proxy_protocol(self) -> typing.Optional[builtins.str]:
|
|
685
688
|
'''Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol.
|
|
686
689
|
|
|
687
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
690
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#outbound_proxy_protocol LoadbalancerBackend#outbound_proxy_protocol}
|
|
688
691
|
'''
|
|
689
692
|
result = self._values.get("outbound_proxy_protocol")
|
|
690
693
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -693,7 +696,7 @@ class LoadbalancerBackendProperties:
|
|
|
693
696
|
def sticky_session_cookie_name(self) -> typing.Optional[builtins.str]:
|
|
694
697
|
'''Sets sticky session cookie name. Empty string disables sticky session.
|
|
695
698
|
|
|
696
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
699
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#sticky_session_cookie_name LoadbalancerBackend#sticky_session_cookie_name}
|
|
697
700
|
'''
|
|
698
701
|
result = self._values.get("sticky_session_cookie_name")
|
|
699
702
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -702,7 +705,7 @@ class LoadbalancerBackendProperties:
|
|
|
702
705
|
def timeout_server(self) -> typing.Optional[jsii.Number]:
|
|
703
706
|
'''Backend server timeout in seconds.
|
|
704
707
|
|
|
705
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
708
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#timeout_server LoadbalancerBackend#timeout_server}
|
|
706
709
|
'''
|
|
707
710
|
result = self._values.get("timeout_server")
|
|
708
711
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -711,7 +714,7 @@ class LoadbalancerBackendProperties:
|
|
|
711
714
|
def timeout_tunnel(self) -> typing.Optional[jsii.Number]:
|
|
712
715
|
'''Maximum inactivity time on the client and server side for tunnels in seconds.
|
|
713
716
|
|
|
714
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
717
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#timeout_tunnel LoadbalancerBackend#timeout_tunnel}
|
|
715
718
|
'''
|
|
716
719
|
result = self._values.get("timeout_tunnel")
|
|
717
720
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -722,7 +725,7 @@ class LoadbalancerBackendProperties:
|
|
|
722
725
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
723
726
|
'''Enables TLS connection from the load balancer to backend servers.
|
|
724
727
|
|
|
725
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
728
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#tls_enabled LoadbalancerBackend#tls_enabled}
|
|
726
729
|
'''
|
|
727
730
|
result = self._values.get("tls_enabled")
|
|
728
731
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -733,7 +736,7 @@ class LoadbalancerBackendProperties:
|
|
|
733
736
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
734
737
|
'''If enabled, then the system CA certificate bundle will be used for the certificate verification.
|
|
735
738
|
|
|
736
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
739
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#tls_use_system_ca LoadbalancerBackend#tls_use_system_ca}
|
|
737
740
|
'''
|
|
738
741
|
result = self._values.get("tls_use_system_ca")
|
|
739
742
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -746,7 +749,7 @@ class LoadbalancerBackendProperties:
|
|
|
746
749
|
|
|
747
750
|
Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true.
|
|
748
751
|
|
|
749
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
752
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend#tls_verify LoadbalancerBackend#tls_verify}
|
|
750
753
|
'''
|
|
751
754
|
result = self._values.get("tls_verify")
|
|
752
755
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -1,8 +1,11 @@
|
|
|
1
1
|
'''
|
|
2
2
|
# `upcloud_loadbalancer_backend_tls_config`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_loadbalancer_backend_tls_config`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_loadbalancer_backend_tls_config`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend_tls_config).
|
|
5
5
|
'''
|
|
6
|
+
from pkgutil import extend_path
|
|
7
|
+
__path__ = extend_path(__path__, __name__)
|
|
8
|
+
|
|
6
9
|
import abc
|
|
7
10
|
import builtins
|
|
8
11
|
import datetime
|
|
@@ -26,7 +29,7 @@ class LoadbalancerBackendTlsConfig(
|
|
|
26
29
|
metaclass=jsii.JSIIMeta,
|
|
27
30
|
jsii_type="@cdktf/provider-upcloud.loadbalancerBackendTlsConfig.LoadbalancerBackendTlsConfig",
|
|
28
31
|
):
|
|
29
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
32
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend_tls_config upcloud_loadbalancer_backend_tls_config}.'''
|
|
30
33
|
|
|
31
34
|
def __init__(
|
|
32
35
|
self,
|
|
@@ -45,14 +48,14 @@ class LoadbalancerBackendTlsConfig(
|
|
|
45
48
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
46
49
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
47
50
|
) -> None:
|
|
48
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
51
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend_tls_config upcloud_loadbalancer_backend_tls_config} Resource.
|
|
49
52
|
|
|
50
53
|
:param scope: The scope in which to define this construct.
|
|
51
54
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
52
|
-
:param backend: ID of the load balancer backend to which the TLS config is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
53
|
-
:param certificate_bundle: Reference to certificate bundle ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
54
|
-
:param name: The name of the TLS config must be unique within service backend. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
55
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
55
|
+
:param backend: ID of the load balancer backend to which the TLS config is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend_tls_config#backend LoadbalancerBackendTlsConfig#backend}
|
|
56
|
+
:param certificate_bundle: Reference to certificate bundle ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend_tls_config#certificate_bundle LoadbalancerBackendTlsConfig#certificate_bundle}
|
|
57
|
+
:param name: The name of the TLS config must be unique within service backend. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend_tls_config#name LoadbalancerBackendTlsConfig#name}
|
|
58
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend_tls_config#id LoadbalancerBackendTlsConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
56
59
|
:param connection:
|
|
57
60
|
:param count:
|
|
58
61
|
:param depends_on:
|
|
@@ -94,7 +97,7 @@ class LoadbalancerBackendTlsConfig(
|
|
|
94
97
|
|
|
95
98
|
:param scope: The scope in which to define this construct.
|
|
96
99
|
:param import_to_id: The construct id used in the generated config for the LoadbalancerBackendTlsConfig to import.
|
|
97
|
-
:param import_from_id: The id of the existing LoadbalancerBackendTlsConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
100
|
+
:param import_from_id: The id of the existing LoadbalancerBackendTlsConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend_tls_config#import import section} in the documentation of this resource for the id to use
|
|
98
101
|
:param provider: ? Optional instance of the provider where the LoadbalancerBackendTlsConfig to import is found.
|
|
99
102
|
'''
|
|
100
103
|
if __debug__:
|
|
@@ -232,10 +235,10 @@ class LoadbalancerBackendTlsConfigConfig(_cdktf_9a9027ec.TerraformMetaArguments)
|
|
|
232
235
|
:param lifecycle:
|
|
233
236
|
:param provider:
|
|
234
237
|
:param provisioners:
|
|
235
|
-
:param backend: ID of the load balancer backend to which the TLS config is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
236
|
-
:param certificate_bundle: Reference to certificate bundle ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
237
|
-
:param name: The name of the TLS config must be unique within service backend. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
238
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
238
|
+
:param backend: ID of the load balancer backend to which the TLS config is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend_tls_config#backend LoadbalancerBackendTlsConfig#backend}
|
|
239
|
+
:param certificate_bundle: Reference to certificate bundle ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend_tls_config#certificate_bundle LoadbalancerBackendTlsConfig#certificate_bundle}
|
|
240
|
+
:param name: The name of the TLS config must be unique within service backend. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend_tls_config#name LoadbalancerBackendTlsConfig#name}
|
|
241
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend_tls_config#id LoadbalancerBackendTlsConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
239
242
|
'''
|
|
240
243
|
if isinstance(lifecycle, dict):
|
|
241
244
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -342,7 +345,7 @@ class LoadbalancerBackendTlsConfigConfig(_cdktf_9a9027ec.TerraformMetaArguments)
|
|
|
342
345
|
def backend(self) -> builtins.str:
|
|
343
346
|
'''ID of the load balancer backend to which the TLS config is connected.
|
|
344
347
|
|
|
345
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
348
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend_tls_config#backend LoadbalancerBackendTlsConfig#backend}
|
|
346
349
|
'''
|
|
347
350
|
result = self._values.get("backend")
|
|
348
351
|
assert result is not None, "Required property 'backend' is missing"
|
|
@@ -352,7 +355,7 @@ class LoadbalancerBackendTlsConfigConfig(_cdktf_9a9027ec.TerraformMetaArguments)
|
|
|
352
355
|
def certificate_bundle(self) -> builtins.str:
|
|
353
356
|
'''Reference to certificate bundle ID.
|
|
354
357
|
|
|
355
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
358
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend_tls_config#certificate_bundle LoadbalancerBackendTlsConfig#certificate_bundle}
|
|
356
359
|
'''
|
|
357
360
|
result = self._values.get("certificate_bundle")
|
|
358
361
|
assert result is not None, "Required property 'certificate_bundle' is missing"
|
|
@@ -362,7 +365,7 @@ class LoadbalancerBackendTlsConfigConfig(_cdktf_9a9027ec.TerraformMetaArguments)
|
|
|
362
365
|
def name(self) -> builtins.str:
|
|
363
366
|
'''The name of the TLS config must be unique within service backend.
|
|
364
367
|
|
|
365
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
368
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend_tls_config#name LoadbalancerBackendTlsConfig#name}
|
|
366
369
|
'''
|
|
367
370
|
result = self._values.get("name")
|
|
368
371
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -370,7 +373,7 @@ class LoadbalancerBackendTlsConfigConfig(_cdktf_9a9027ec.TerraformMetaArguments)
|
|
|
370
373
|
|
|
371
374
|
@builtins.property
|
|
372
375
|
def id(self) -> typing.Optional[builtins.str]:
|
|
373
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
376
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/loadbalancer_backend_tls_config#id LoadbalancerBackendTlsConfig#id}.
|
|
374
377
|
|
|
375
378
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
376
379
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|