cdktf-cdktf-provider-upcloud 14.10.1__py3-none-any.whl → 14.11.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +23 -4
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +18 -3
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.11.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +23 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +23 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +23 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_load_balancer_dns_challenge_domain/__init__.py +319 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +38 -23
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +29 -14
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +46 -31
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +38 -23
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +26 -11
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +23 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +29 -14
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +131 -54
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +23 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +26 -11
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +23 -8
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +57 -42
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +32 -17
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +53 -38
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +50 -35
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +77 -62
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +47 -32
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +74 -59
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +58 -43
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +245 -175
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +29 -14
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +44 -29
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +29 -14
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +49 -34
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +209 -194
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +29 -14
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +32 -17
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +47 -32
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +44 -29
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +35 -20
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +211 -196
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +457 -442
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +325 -310
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +139 -124
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +66 -51
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +46 -31
- cdktf_cdktf_provider_upcloud/managed_object_storage_custom_domain/__init__.py +446 -0
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +32 -17
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +29 -14
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +32 -17
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +32 -17
- cdktf_cdktf_provider_upcloud/network/__init__.py +49 -34
- cdktf_cdktf_provider_upcloud/network_peering/__init__.py +39 -24
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +46 -31
- cdktf_cdktf_provider_upcloud/provider/__init__.py +41 -26
- cdktf_cdktf_provider_upcloud/router/__init__.py +35 -20
- cdktf_cdktf_provider_upcloud/server/__init__.py +169 -154
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +35 -20
- cdktf_cdktf_provider_upcloud/storage/__init__.py +70 -53
- cdktf_cdktf_provider_upcloud/storage_template/__init__.py +29 -14
- cdktf_cdktf_provider_upcloud/tag/__init__.py +32 -17
- {cdktf_cdktf_provider_upcloud-14.10.1.dist-info → cdktf_cdktf_provider_upcloud-14.11.0.dist-info}/METADATA +6 -6
- cdktf_cdktf_provider_upcloud-14.11.0.dist-info/RECORD +64 -0
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.10.1.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-14.10.1.dist-info/RECORD +0 -62
- {cdktf_cdktf_provider_upcloud-14.10.1.dist-info → cdktf_cdktf_provider_upcloud-14.11.0.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-14.10.1.dist-info → cdktf_cdktf_provider_upcloud-14.11.0.dist-info}/WHEEL +0 -0
- {cdktf_cdktf_provider_upcloud-14.10.1.dist-info → cdktf_cdktf_provider_upcloud-14.11.0.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_loadbalancer_backend`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_loadbalancer_backend`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_loadbalancer_backend`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -16,7 +16,22 @@ import jsii
|
|
|
16
16
|
import publication
|
|
17
17
|
import typing_extensions
|
|
18
18
|
|
|
19
|
-
|
|
19
|
+
import typeguard
|
|
20
|
+
from importlib.metadata import version as _metadata_package_version
|
|
21
|
+
TYPEGUARD_MAJOR_VERSION = int(_metadata_package_version('typeguard').split('.')[0])
|
|
22
|
+
|
|
23
|
+
def check_type(argname: str, value: object, expected_type: typing.Any) -> typing.Any:
|
|
24
|
+
if TYPEGUARD_MAJOR_VERSION <= 2:
|
|
25
|
+
return typeguard.check_type(argname=argname, value=value, expected_type=expected_type) # type:ignore
|
|
26
|
+
else:
|
|
27
|
+
if isinstance(value, jsii._reference_map.InterfaceDynamicProxy): # pyright: ignore [reportAttributeAccessIssue]
|
|
28
|
+
pass
|
|
29
|
+
else:
|
|
30
|
+
if TYPEGUARD_MAJOR_VERSION == 3:
|
|
31
|
+
typeguard.config.collection_check_strategy = typeguard.CollectionCheckStrategy.ALL_ITEMS # type:ignore
|
|
32
|
+
typeguard.check_type(value=value, expected_type=expected_type) # type:ignore
|
|
33
|
+
else:
|
|
34
|
+
typeguard.check_type(value=value, expected_type=expected_type, collection_check_strategy=typeguard.CollectionCheckStrategy.ALL_ITEMS) # type:ignore
|
|
20
35
|
|
|
21
36
|
from .._jsii import *
|
|
22
37
|
|
|
@@ -29,17 +44,16 @@ class LoadbalancerBackend(
|
|
|
29
44
|
metaclass=jsii.JSIIMeta,
|
|
30
45
|
jsii_type="@cdktf/provider-upcloud.loadbalancerBackend.LoadbalancerBackend",
|
|
31
46
|
):
|
|
32
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
47
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend upcloud_loadbalancer_backend}.'''
|
|
33
48
|
|
|
34
49
|
def __init__(
|
|
35
50
|
self,
|
|
36
51
|
scope: _constructs_77d1e7e8.Construct,
|
|
37
|
-
|
|
52
|
+
id: builtins.str,
|
|
38
53
|
*,
|
|
39
54
|
loadbalancer: builtins.str,
|
|
40
55
|
name: builtins.str,
|
|
41
|
-
|
|
42
|
-
properties: typing.Optional[typing.Union["LoadbalancerBackendProperties", typing.Dict[builtins.str, typing.Any]]] = None,
|
|
56
|
+
properties: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["LoadbalancerBackendProperties", typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
43
57
|
resolver_name: typing.Optional[builtins.str] = None,
|
|
44
58
|
connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
45
59
|
count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
|
|
@@ -49,15 +63,14 @@ class LoadbalancerBackend(
|
|
|
49
63
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
50
64
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
51
65
|
) -> None:
|
|
52
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
66
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend upcloud_loadbalancer_backend} Resource.
|
|
53
67
|
|
|
54
68
|
:param scope: The scope in which to define this construct.
|
|
55
|
-
:param
|
|
56
|
-
:param loadbalancer:
|
|
57
|
-
:param name: The name of the backend
|
|
58
|
-
:param
|
|
59
|
-
:param
|
|
60
|
-
:param resolver_name: Domain Name Resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
|
|
69
|
+
:param id: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
70
|
+
:param loadbalancer: UUID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#loadbalancer LoadbalancerBackend#loadbalancer}
|
|
71
|
+
:param name: The name of the backend. Must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#name LoadbalancerBackend#name}
|
|
72
|
+
:param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#properties LoadbalancerBackend#properties}
|
|
73
|
+
:param resolver_name: Domain name resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
|
|
61
74
|
:param connection:
|
|
62
75
|
:param count:
|
|
63
76
|
:param depends_on:
|
|
@@ -69,11 +82,10 @@ class LoadbalancerBackend(
|
|
|
69
82
|
if __debug__:
|
|
70
83
|
type_hints = typing.get_type_hints(_typecheckingstub__a57ef11b06133e84b2cf13365b88e7f2dd34adb8674508adcf3a305129d291be)
|
|
71
84
|
check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
|
|
72
|
-
check_type(argname="argument
|
|
85
|
+
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
73
86
|
config = LoadbalancerBackendConfig(
|
|
74
87
|
loadbalancer=loadbalancer,
|
|
75
88
|
name=name,
|
|
76
|
-
id=id,
|
|
77
89
|
properties=properties,
|
|
78
90
|
resolver_name=resolver_name,
|
|
79
91
|
connection=connection,
|
|
@@ -85,7 +97,7 @@ class LoadbalancerBackend(
|
|
|
85
97
|
provisioners=provisioners,
|
|
86
98
|
)
|
|
87
99
|
|
|
88
|
-
jsii.create(self.__class__, self, [scope,
|
|
100
|
+
jsii.create(self.__class__, self, [scope, id, config])
|
|
89
101
|
|
|
90
102
|
@jsii.member(jsii_name="generateConfigForImport")
|
|
91
103
|
@builtins.classmethod
|
|
@@ -100,7 +112,7 @@ class LoadbalancerBackend(
|
|
|
100
112
|
|
|
101
113
|
:param scope: The scope in which to define this construct.
|
|
102
114
|
:param import_to_id: The construct id used in the generated config for the LoadbalancerBackend to import.
|
|
103
|
-
:param import_from_id: The id of the existing LoadbalancerBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
115
|
+
:param import_from_id: The id of the existing LoadbalancerBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#import import section} in the documentation of this resource for the id to use
|
|
104
116
|
:param provider: ? Optional instance of the provider where the LoadbalancerBackend to import is found.
|
|
105
117
|
'''
|
|
106
118
|
if __debug__:
|
|
@@ -114,64 +126,16 @@ class LoadbalancerBackend(
|
|
|
114
126
|
@jsii.member(jsii_name="putProperties")
|
|
115
127
|
def put_properties(
|
|
116
128
|
self,
|
|
117
|
-
|
|
118
|
-
health_check_expected_status: typing.Optional[jsii.Number] = None,
|
|
119
|
-
health_check_fall: typing.Optional[jsii.Number] = None,
|
|
120
|
-
health_check_interval: typing.Optional[jsii.Number] = None,
|
|
121
|
-
health_check_rise: typing.Optional[jsii.Number] = None,
|
|
122
|
-
health_check_tls_verify: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
123
|
-
health_check_type: typing.Optional[builtins.str] = None,
|
|
124
|
-
health_check_url: typing.Optional[builtins.str] = None,
|
|
125
|
-
http2_enabled: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
126
|
-
outbound_proxy_protocol: typing.Optional[builtins.str] = None,
|
|
127
|
-
sticky_session_cookie_name: typing.Optional[builtins.str] = None,
|
|
128
|
-
timeout_server: typing.Optional[jsii.Number] = None,
|
|
129
|
-
timeout_tunnel: typing.Optional[jsii.Number] = None,
|
|
130
|
-
tls_enabled: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
131
|
-
tls_use_system_ca: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
132
|
-
tls_verify: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
129
|
+
value: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["LoadbalancerBackendProperties", typing.Dict[builtins.str, typing.Any]]]],
|
|
133
130
|
) -> None:
|
|
134
131
|
'''
|
|
135
|
-
:param
|
|
136
|
-
:param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/loadbalancer_backend#health_check_fall LoadbalancerBackend#health_check_fall}
|
|
137
|
-
:param health_check_interval: Interval between health checks. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/loadbalancer_backend#health_check_interval LoadbalancerBackend#health_check_interval}
|
|
138
|
-
:param health_check_rise: Sets how many passing checks there must be before returning the backend member to the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/loadbalancer_backend#health_check_rise LoadbalancerBackend#health_check_rise}
|
|
139
|
-
:param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/loadbalancer_backend#health_check_tls_verify LoadbalancerBackend#health_check_tls_verify}
|
|
140
|
-
:param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/loadbalancer_backend#health_check_type LoadbalancerBackend#health_check_type}
|
|
141
|
-
:param health_check_url: Target path for health check HTTP GET requests. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/loadbalancer_backend#health_check_url LoadbalancerBackend#health_check_url}
|
|
142
|
-
:param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/loadbalancer_backend#http2_enabled LoadbalancerBackend#http2_enabled}
|
|
143
|
-
:param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/loadbalancer_backend#outbound_proxy_protocol LoadbalancerBackend#outbound_proxy_protocol}
|
|
144
|
-
:param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/loadbalancer_backend#sticky_session_cookie_name LoadbalancerBackend#sticky_session_cookie_name}
|
|
145
|
-
:param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/loadbalancer_backend#timeout_server LoadbalancerBackend#timeout_server}
|
|
146
|
-
:param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/loadbalancer_backend#timeout_tunnel LoadbalancerBackend#timeout_tunnel}
|
|
147
|
-
:param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/loadbalancer_backend#tls_enabled LoadbalancerBackend#tls_enabled}
|
|
148
|
-
:param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/loadbalancer_backend#tls_use_system_ca LoadbalancerBackend#tls_use_system_ca}
|
|
149
|
-
:param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/loadbalancer_backend#tls_verify LoadbalancerBackend#tls_verify}
|
|
132
|
+
:param value: -
|
|
150
133
|
'''
|
|
151
|
-
|
|
152
|
-
|
|
153
|
-
|
|
154
|
-
health_check_interval=health_check_interval,
|
|
155
|
-
health_check_rise=health_check_rise,
|
|
156
|
-
health_check_tls_verify=health_check_tls_verify,
|
|
157
|
-
health_check_type=health_check_type,
|
|
158
|
-
health_check_url=health_check_url,
|
|
159
|
-
http2_enabled=http2_enabled,
|
|
160
|
-
outbound_proxy_protocol=outbound_proxy_protocol,
|
|
161
|
-
sticky_session_cookie_name=sticky_session_cookie_name,
|
|
162
|
-
timeout_server=timeout_server,
|
|
163
|
-
timeout_tunnel=timeout_tunnel,
|
|
164
|
-
tls_enabled=tls_enabled,
|
|
165
|
-
tls_use_system_ca=tls_use_system_ca,
|
|
166
|
-
tls_verify=tls_verify,
|
|
167
|
-
)
|
|
168
|
-
|
|
134
|
+
if __debug__:
|
|
135
|
+
type_hints = typing.get_type_hints(_typecheckingstub__425dcb0894c6def77121cea82a4b7926cb641081761e4828ac7bf13b99d8c4b4)
|
|
136
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
169
137
|
return typing.cast(None, jsii.invoke(self, "putProperties", [value]))
|
|
170
138
|
|
|
171
|
-
@jsii.member(jsii_name="resetId")
|
|
172
|
-
def reset_id(self) -> None:
|
|
173
|
-
return typing.cast(None, jsii.invoke(self, "resetId", []))
|
|
174
|
-
|
|
175
139
|
@jsii.member(jsii_name="resetProperties")
|
|
176
140
|
def reset_properties(self) -> None:
|
|
177
141
|
return typing.cast(None, jsii.invoke(self, "resetProperties", []))
|
|
@@ -193,6 +157,11 @@ class LoadbalancerBackend(
|
|
|
193
157
|
def TF_RESOURCE_TYPE(cls) -> builtins.str:
|
|
194
158
|
return typing.cast(builtins.str, jsii.sget(cls, "tfResourceType"))
|
|
195
159
|
|
|
160
|
+
@builtins.property
|
|
161
|
+
@jsii.member(jsii_name="id")
|
|
162
|
+
def id(self) -> builtins.str:
|
|
163
|
+
return typing.cast(builtins.str, jsii.get(self, "id"))
|
|
164
|
+
|
|
196
165
|
@builtins.property
|
|
197
166
|
@jsii.member(jsii_name="members")
|
|
198
167
|
def members(self) -> typing.List[builtins.str]:
|
|
@@ -200,19 +169,14 @@ class LoadbalancerBackend(
|
|
|
200
169
|
|
|
201
170
|
@builtins.property
|
|
202
171
|
@jsii.member(jsii_name="properties")
|
|
203
|
-
def properties(self) -> "
|
|
204
|
-
return typing.cast("
|
|
172
|
+
def properties(self) -> "LoadbalancerBackendPropertiesList":
|
|
173
|
+
return typing.cast("LoadbalancerBackendPropertiesList", jsii.get(self, "properties"))
|
|
205
174
|
|
|
206
175
|
@builtins.property
|
|
207
176
|
@jsii.member(jsii_name="tlsConfigs")
|
|
208
177
|
def tls_configs(self) -> typing.List[builtins.str]:
|
|
209
178
|
return typing.cast(typing.List[builtins.str], jsii.get(self, "tlsConfigs"))
|
|
210
179
|
|
|
211
|
-
@builtins.property
|
|
212
|
-
@jsii.member(jsii_name="idInput")
|
|
213
|
-
def id_input(self) -> typing.Optional[builtins.str]:
|
|
214
|
-
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "idInput"))
|
|
215
|
-
|
|
216
180
|
@builtins.property
|
|
217
181
|
@jsii.member(jsii_name="loadbalancerInput")
|
|
218
182
|
def loadbalancer_input(self) -> typing.Optional[builtins.str]:
|
|
@@ -225,26 +189,16 @@ class LoadbalancerBackend(
|
|
|
225
189
|
|
|
226
190
|
@builtins.property
|
|
227
191
|
@jsii.member(jsii_name="propertiesInput")
|
|
228
|
-
def properties_input(
|
|
229
|
-
|
|
192
|
+
def properties_input(
|
|
193
|
+
self,
|
|
194
|
+
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["LoadbalancerBackendProperties"]]]:
|
|
195
|
+
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["LoadbalancerBackendProperties"]]], jsii.get(self, "propertiesInput"))
|
|
230
196
|
|
|
231
197
|
@builtins.property
|
|
232
198
|
@jsii.member(jsii_name="resolverNameInput")
|
|
233
199
|
def resolver_name_input(self) -> typing.Optional[builtins.str]:
|
|
234
200
|
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "resolverNameInput"))
|
|
235
201
|
|
|
236
|
-
@builtins.property
|
|
237
|
-
@jsii.member(jsii_name="id")
|
|
238
|
-
def id(self) -> builtins.str:
|
|
239
|
-
return typing.cast(builtins.str, jsii.get(self, "id"))
|
|
240
|
-
|
|
241
|
-
@id.setter
|
|
242
|
-
def id(self, value: builtins.str) -> None:
|
|
243
|
-
if __debug__:
|
|
244
|
-
type_hints = typing.get_type_hints(_typecheckingstub__c835523790ac551a02697db72f5840bcd0c25216cf3e02860635676f92dfc234)
|
|
245
|
-
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
246
|
-
jsii.set(self, "id", value) # pyright: ignore[reportArgumentType]
|
|
247
|
-
|
|
248
202
|
@builtins.property
|
|
249
203
|
@jsii.member(jsii_name="loadbalancer")
|
|
250
204
|
def loadbalancer(self) -> builtins.str:
|
|
@@ -295,7 +249,6 @@ class LoadbalancerBackend(
|
|
|
295
249
|
"provisioners": "provisioners",
|
|
296
250
|
"loadbalancer": "loadbalancer",
|
|
297
251
|
"name": "name",
|
|
298
|
-
"id": "id",
|
|
299
252
|
"properties": "properties",
|
|
300
253
|
"resolver_name": "resolverName",
|
|
301
254
|
},
|
|
@@ -313,8 +266,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
313
266
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
314
267
|
loadbalancer: builtins.str,
|
|
315
268
|
name: builtins.str,
|
|
316
|
-
|
|
317
|
-
properties: typing.Optional[typing.Union["LoadbalancerBackendProperties", typing.Dict[builtins.str, typing.Any]]] = None,
|
|
269
|
+
properties: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["LoadbalancerBackendProperties", typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
318
270
|
resolver_name: typing.Optional[builtins.str] = None,
|
|
319
271
|
) -> None:
|
|
320
272
|
'''
|
|
@@ -325,16 +277,13 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
325
277
|
:param lifecycle:
|
|
326
278
|
:param provider:
|
|
327
279
|
:param provisioners:
|
|
328
|
-
:param loadbalancer:
|
|
329
|
-
:param name: The name of the backend
|
|
330
|
-
:param
|
|
331
|
-
:param
|
|
332
|
-
:param resolver_name: Domain Name Resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
|
|
280
|
+
:param loadbalancer: UUID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#loadbalancer LoadbalancerBackend#loadbalancer}
|
|
281
|
+
:param name: The name of the backend. Must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#name LoadbalancerBackend#name}
|
|
282
|
+
:param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#properties LoadbalancerBackend#properties}
|
|
283
|
+
:param resolver_name: Domain name resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
|
|
333
284
|
'''
|
|
334
285
|
if isinstance(lifecycle, dict):
|
|
335
286
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
336
|
-
if isinstance(properties, dict):
|
|
337
|
-
properties = LoadbalancerBackendProperties(**properties)
|
|
338
287
|
if __debug__:
|
|
339
288
|
type_hints = typing.get_type_hints(_typecheckingstub__6200f98d574a6cde907c9b763cf17de76dec005cc13d69bf52a284d828392061)
|
|
340
289
|
check_type(argname="argument connection", value=connection, expected_type=type_hints["connection"])
|
|
@@ -346,7 +295,6 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
346
295
|
check_type(argname="argument provisioners", value=provisioners, expected_type=type_hints["provisioners"])
|
|
347
296
|
check_type(argname="argument loadbalancer", value=loadbalancer, expected_type=type_hints["loadbalancer"])
|
|
348
297
|
check_type(argname="argument name", value=name, expected_type=type_hints["name"])
|
|
349
|
-
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
350
298
|
check_type(argname="argument properties", value=properties, expected_type=type_hints["properties"])
|
|
351
299
|
check_type(argname="argument resolver_name", value=resolver_name, expected_type=type_hints["resolver_name"])
|
|
352
300
|
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
@@ -367,8 +315,6 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
367
315
|
self._values["provider"] = provider
|
|
368
316
|
if provisioners is not None:
|
|
369
317
|
self._values["provisioners"] = provisioners
|
|
370
|
-
if id is not None:
|
|
371
|
-
self._values["id"] = id
|
|
372
318
|
if properties is not None:
|
|
373
319
|
self._values["properties"] = properties
|
|
374
320
|
if resolver_name is not None:
|
|
@@ -440,9 +386,9 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
440
386
|
|
|
441
387
|
@builtins.property
|
|
442
388
|
def loadbalancer(self) -> builtins.str:
|
|
443
|
-
'''
|
|
389
|
+
'''UUID of the load balancer to which the backend is connected.
|
|
444
390
|
|
|
445
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
391
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#loadbalancer LoadbalancerBackend#loadbalancer}
|
|
446
392
|
'''
|
|
447
393
|
result = self._values.get("loadbalancer")
|
|
448
394
|
assert result is not None, "Required property 'loadbalancer' is missing"
|
|
@@ -450,38 +396,30 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
450
396
|
|
|
451
397
|
@builtins.property
|
|
452
398
|
def name(self) -> builtins.str:
|
|
453
|
-
'''The name of the backend
|
|
399
|
+
'''The name of the backend. Must be unique within the load balancer service.
|
|
454
400
|
|
|
455
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
401
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#name LoadbalancerBackend#name}
|
|
456
402
|
'''
|
|
457
403
|
result = self._values.get("name")
|
|
458
404
|
assert result is not None, "Required property 'name' is missing"
|
|
459
405
|
return typing.cast(builtins.str, result)
|
|
460
406
|
|
|
461
407
|
@builtins.property
|
|
462
|
-
def
|
|
463
|
-
|
|
464
|
-
|
|
465
|
-
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
466
|
-
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
467
|
-
'''
|
|
468
|
-
result = self._values.get("id")
|
|
469
|
-
return typing.cast(typing.Optional[builtins.str], result)
|
|
470
|
-
|
|
471
|
-
@builtins.property
|
|
472
|
-
def properties(self) -> typing.Optional["LoadbalancerBackendProperties"]:
|
|
408
|
+
def properties(
|
|
409
|
+
self,
|
|
410
|
+
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["LoadbalancerBackendProperties"]]]:
|
|
473
411
|
'''properties block.
|
|
474
412
|
|
|
475
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
413
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#properties LoadbalancerBackend#properties}
|
|
476
414
|
'''
|
|
477
415
|
result = self._values.get("properties")
|
|
478
|
-
return typing.cast(typing.Optional["LoadbalancerBackendProperties"], result)
|
|
416
|
+
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["LoadbalancerBackendProperties"]]], result)
|
|
479
417
|
|
|
480
418
|
@builtins.property
|
|
481
419
|
def resolver_name(self) -> typing.Optional[builtins.str]:
|
|
482
|
-
'''Domain
|
|
420
|
+
'''Domain name resolver used with dynamic type members.
|
|
483
421
|
|
|
484
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
422
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
|
|
485
423
|
'''
|
|
486
424
|
result = self._values.get("resolver_name")
|
|
487
425
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -540,21 +478,21 @@ class LoadbalancerBackendProperties:
|
|
|
540
478
|
tls_verify: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
541
479
|
) -> None:
|
|
542
480
|
'''
|
|
543
|
-
:param health_check_expected_status: Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp
|
|
544
|
-
:param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
545
|
-
:param health_check_interval: Interval between health checks. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
546
|
-
:param health_check_rise: Sets how many
|
|
547
|
-
:param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
548
|
-
:param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
549
|
-
:param health_check_url: Target path for health check HTTP GET requests. Ignored for tcp
|
|
550
|
-
:param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
551
|
-
:param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
552
|
-
:param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
553
|
-
:param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
554
|
-
:param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
555
|
-
:param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
556
|
-
:param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
557
|
-
:param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
481
|
+
:param health_check_expected_status: Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for ``tcp`` ``health_check_type``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#health_check_expected_status LoadbalancerBackend#health_check_expected_status}
|
|
482
|
+
:param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#health_check_fall LoadbalancerBackend#health_check_fall}
|
|
483
|
+
:param health_check_interval: Interval between health checks in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#health_check_interval LoadbalancerBackend#health_check_interval}
|
|
484
|
+
:param health_check_rise: Sets how many successful health checks are required to put the backend member back into rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#health_check_rise LoadbalancerBackend#health_check_rise}
|
|
485
|
+
:param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#health_check_tls_verify LoadbalancerBackend#health_check_tls_verify}
|
|
486
|
+
:param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#health_check_type LoadbalancerBackend#health_check_type}
|
|
487
|
+
:param health_check_url: Target path for health check HTTP GET requests. Ignored for ``tcp`` ``health_check_type``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#health_check_url LoadbalancerBackend#health_check_url}
|
|
488
|
+
:param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#http2_enabled LoadbalancerBackend#http2_enabled}
|
|
489
|
+
:param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Defaults to empty string. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#outbound_proxy_protocol LoadbalancerBackend#outbound_proxy_protocol}
|
|
490
|
+
:param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#sticky_session_cookie_name LoadbalancerBackend#sticky_session_cookie_name}
|
|
491
|
+
:param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#timeout_server LoadbalancerBackend#timeout_server}
|
|
492
|
+
:param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#timeout_tunnel LoadbalancerBackend#timeout_tunnel}
|
|
493
|
+
:param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#tls_enabled LoadbalancerBackend#tls_enabled}
|
|
494
|
+
:param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#tls_use_system_ca LoadbalancerBackend#tls_use_system_ca}
|
|
495
|
+
:param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#tls_verify LoadbalancerBackend#tls_verify}
|
|
558
496
|
'''
|
|
559
497
|
if __debug__:
|
|
560
498
|
type_hints = typing.get_type_hints(_typecheckingstub__eb5988403ea7b17ea78d8a97176e2db70e4258ead0d52fc7ab7102412ecccf40)
|
|
@@ -607,9 +545,9 @@ class LoadbalancerBackendProperties:
|
|
|
607
545
|
|
|
608
546
|
@builtins.property
|
|
609
547
|
def health_check_expected_status(self) -> typing.Optional[jsii.Number]:
|
|
610
|
-
'''Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp
|
|
548
|
+
'''Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for ``tcp`` ``health_check_type``.
|
|
611
549
|
|
|
612
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
550
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#health_check_expected_status LoadbalancerBackend#health_check_expected_status}
|
|
613
551
|
'''
|
|
614
552
|
result = self._values.get("health_check_expected_status")
|
|
615
553
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -618,25 +556,25 @@ class LoadbalancerBackendProperties:
|
|
|
618
556
|
def health_check_fall(self) -> typing.Optional[jsii.Number]:
|
|
619
557
|
'''Sets how many failed health checks are allowed until the backend member is taken off from the rotation.
|
|
620
558
|
|
|
621
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
559
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#health_check_fall LoadbalancerBackend#health_check_fall}
|
|
622
560
|
'''
|
|
623
561
|
result = self._values.get("health_check_fall")
|
|
624
562
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
625
563
|
|
|
626
564
|
@builtins.property
|
|
627
565
|
def health_check_interval(self) -> typing.Optional[jsii.Number]:
|
|
628
|
-
'''Interval between health checks.
|
|
566
|
+
'''Interval between health checks in seconds.
|
|
629
567
|
|
|
630
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
568
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#health_check_interval LoadbalancerBackend#health_check_interval}
|
|
631
569
|
'''
|
|
632
570
|
result = self._values.get("health_check_interval")
|
|
633
571
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
634
572
|
|
|
635
573
|
@builtins.property
|
|
636
574
|
def health_check_rise(self) -> typing.Optional[jsii.Number]:
|
|
637
|
-
'''Sets how many
|
|
575
|
+
'''Sets how many successful health checks are required to put the backend member back into rotation.
|
|
638
576
|
|
|
639
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
577
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#health_check_rise LoadbalancerBackend#health_check_rise}
|
|
640
578
|
'''
|
|
641
579
|
result = self._values.get("health_check_rise")
|
|
642
580
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -647,7 +585,7 @@ class LoadbalancerBackendProperties:
|
|
|
647
585
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
648
586
|
'''Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored.
|
|
649
587
|
|
|
650
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
588
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#health_check_tls_verify LoadbalancerBackend#health_check_tls_verify}
|
|
651
589
|
'''
|
|
652
590
|
result = self._values.get("health_check_tls_verify")
|
|
653
591
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -656,16 +594,16 @@ class LoadbalancerBackendProperties:
|
|
|
656
594
|
def health_check_type(self) -> typing.Optional[builtins.str]:
|
|
657
595
|
'''Health check type.
|
|
658
596
|
|
|
659
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
597
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#health_check_type LoadbalancerBackend#health_check_type}
|
|
660
598
|
'''
|
|
661
599
|
result = self._values.get("health_check_type")
|
|
662
600
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
663
601
|
|
|
664
602
|
@builtins.property
|
|
665
603
|
def health_check_url(self) -> typing.Optional[builtins.str]:
|
|
666
|
-
'''Target path for health check HTTP GET requests. Ignored for tcp
|
|
604
|
+
'''Target path for health check HTTP GET requests. Ignored for ``tcp`` ``health_check_type``.
|
|
667
605
|
|
|
668
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
606
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#health_check_url LoadbalancerBackend#health_check_url}
|
|
669
607
|
'''
|
|
670
608
|
result = self._values.get("health_check_url")
|
|
671
609
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -678,16 +616,16 @@ class LoadbalancerBackendProperties:
|
|
|
678
616
|
|
|
679
617
|
Note: members should support HTTP/2 for this setting to work.
|
|
680
618
|
|
|
681
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
619
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#http2_enabled LoadbalancerBackend#http2_enabled}
|
|
682
620
|
'''
|
|
683
621
|
result = self._values.get("http2_enabled")
|
|
684
622
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
685
623
|
|
|
686
624
|
@builtins.property
|
|
687
625
|
def outbound_proxy_protocol(self) -> typing.Optional[builtins.str]:
|
|
688
|
-
'''Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol.
|
|
626
|
+
'''Enable outbound proxy protocol by setting the desired version. Defaults to empty string. Empty string disables proxy protocol.
|
|
689
627
|
|
|
690
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
628
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#outbound_proxy_protocol LoadbalancerBackend#outbound_proxy_protocol}
|
|
691
629
|
'''
|
|
692
630
|
result = self._values.get("outbound_proxy_protocol")
|
|
693
631
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -696,7 +634,7 @@ class LoadbalancerBackendProperties:
|
|
|
696
634
|
def sticky_session_cookie_name(self) -> typing.Optional[builtins.str]:
|
|
697
635
|
'''Sets sticky session cookie name. Empty string disables sticky session.
|
|
698
636
|
|
|
699
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
637
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#sticky_session_cookie_name LoadbalancerBackend#sticky_session_cookie_name}
|
|
700
638
|
'''
|
|
701
639
|
result = self._values.get("sticky_session_cookie_name")
|
|
702
640
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -705,7 +643,7 @@ class LoadbalancerBackendProperties:
|
|
|
705
643
|
def timeout_server(self) -> typing.Optional[jsii.Number]:
|
|
706
644
|
'''Backend server timeout in seconds.
|
|
707
645
|
|
|
708
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
646
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#timeout_server LoadbalancerBackend#timeout_server}
|
|
709
647
|
'''
|
|
710
648
|
result = self._values.get("timeout_server")
|
|
711
649
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -714,7 +652,7 @@ class LoadbalancerBackendProperties:
|
|
|
714
652
|
def timeout_tunnel(self) -> typing.Optional[jsii.Number]:
|
|
715
653
|
'''Maximum inactivity time on the client and server side for tunnels in seconds.
|
|
716
654
|
|
|
717
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
655
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#timeout_tunnel LoadbalancerBackend#timeout_tunnel}
|
|
718
656
|
'''
|
|
719
657
|
result = self._values.get("timeout_tunnel")
|
|
720
658
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -725,7 +663,7 @@ class LoadbalancerBackendProperties:
|
|
|
725
663
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
726
664
|
'''Enables TLS connection from the load balancer to backend servers.
|
|
727
665
|
|
|
728
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
666
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#tls_enabled LoadbalancerBackend#tls_enabled}
|
|
729
667
|
'''
|
|
730
668
|
result = self._values.get("tls_enabled")
|
|
731
669
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -736,7 +674,7 @@ class LoadbalancerBackendProperties:
|
|
|
736
674
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
737
675
|
'''If enabled, then the system CA certificate bundle will be used for the certificate verification.
|
|
738
676
|
|
|
739
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
677
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#tls_use_system_ca LoadbalancerBackend#tls_use_system_ca}
|
|
740
678
|
'''
|
|
741
679
|
result = self._values.get("tls_use_system_ca")
|
|
742
680
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -749,7 +687,7 @@ class LoadbalancerBackendProperties:
|
|
|
749
687
|
|
|
750
688
|
Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true.
|
|
751
689
|
|
|
752
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
690
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.11.0/docs/resources/loadbalancer_backend#tls_verify LoadbalancerBackend#tls_verify}
|
|
753
691
|
'''
|
|
754
692
|
result = self._values.get("tls_verify")
|
|
755
693
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -766,6 +704,96 @@ class LoadbalancerBackendProperties:
|
|
|
766
704
|
)
|
|
767
705
|
|
|
768
706
|
|
|
707
|
+
class LoadbalancerBackendPropertiesList(
|
|
708
|
+
_cdktf_9a9027ec.ComplexList,
|
|
709
|
+
metaclass=jsii.JSIIMeta,
|
|
710
|
+
jsii_type="@cdktf/provider-upcloud.loadbalancerBackend.LoadbalancerBackendPropertiesList",
|
|
711
|
+
):
|
|
712
|
+
def __init__(
|
|
713
|
+
self,
|
|
714
|
+
terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
|
|
715
|
+
terraform_attribute: builtins.str,
|
|
716
|
+
wraps_set: builtins.bool,
|
|
717
|
+
) -> None:
|
|
718
|
+
'''
|
|
719
|
+
:param terraform_resource: The parent resource.
|
|
720
|
+
:param terraform_attribute: The attribute on the parent resource this class is referencing.
|
|
721
|
+
:param wraps_set: whether the list is wrapping a set (will add tolist() to be able to access an item via an index).
|
|
722
|
+
'''
|
|
723
|
+
if __debug__:
|
|
724
|
+
type_hints = typing.get_type_hints(_typecheckingstub__6466001e8d1ef72578f27d793b879e51bb3e572eaef9521b980d493595bc42c3)
|
|
725
|
+
check_type(argname="argument terraform_resource", value=terraform_resource, expected_type=type_hints["terraform_resource"])
|
|
726
|
+
check_type(argname="argument terraform_attribute", value=terraform_attribute, expected_type=type_hints["terraform_attribute"])
|
|
727
|
+
check_type(argname="argument wraps_set", value=wraps_set, expected_type=type_hints["wraps_set"])
|
|
728
|
+
jsii.create(self.__class__, self, [terraform_resource, terraform_attribute, wraps_set])
|
|
729
|
+
|
|
730
|
+
@jsii.member(jsii_name="get")
|
|
731
|
+
def get(self, index: jsii.Number) -> "LoadbalancerBackendPropertiesOutputReference":
|
|
732
|
+
'''
|
|
733
|
+
:param index: the index of the item to return.
|
|
734
|
+
'''
|
|
735
|
+
if __debug__:
|
|
736
|
+
type_hints = typing.get_type_hints(_typecheckingstub__79f867fbff964aa075654e4e8af16ff600c59120999a45f0bb5d4eebbf7df082)
|
|
737
|
+
check_type(argname="argument index", value=index, expected_type=type_hints["index"])
|
|
738
|
+
return typing.cast("LoadbalancerBackendPropertiesOutputReference", jsii.invoke(self, "get", [index]))
|
|
739
|
+
|
|
740
|
+
@builtins.property
|
|
741
|
+
@jsii.member(jsii_name="terraformAttribute")
|
|
742
|
+
def _terraform_attribute(self) -> builtins.str:
|
|
743
|
+
'''The attribute on the parent resource this class is referencing.'''
|
|
744
|
+
return typing.cast(builtins.str, jsii.get(self, "terraformAttribute"))
|
|
745
|
+
|
|
746
|
+
@_terraform_attribute.setter
|
|
747
|
+
def _terraform_attribute(self, value: builtins.str) -> None:
|
|
748
|
+
if __debug__:
|
|
749
|
+
type_hints = typing.get_type_hints(_typecheckingstub__9951e06afb155147ab301d7a3de3cd2fdf2af7a2dd07afb0107d1f31f5a9afe1)
|
|
750
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
751
|
+
jsii.set(self, "terraformAttribute", value) # pyright: ignore[reportArgumentType]
|
|
752
|
+
|
|
753
|
+
@builtins.property
|
|
754
|
+
@jsii.member(jsii_name="terraformResource")
|
|
755
|
+
def _terraform_resource(self) -> _cdktf_9a9027ec.IInterpolatingParent:
|
|
756
|
+
'''The parent resource.'''
|
|
757
|
+
return typing.cast(_cdktf_9a9027ec.IInterpolatingParent, jsii.get(self, "terraformResource"))
|
|
758
|
+
|
|
759
|
+
@_terraform_resource.setter
|
|
760
|
+
def _terraform_resource(self, value: _cdktf_9a9027ec.IInterpolatingParent) -> None:
|
|
761
|
+
if __debug__:
|
|
762
|
+
type_hints = typing.get_type_hints(_typecheckingstub__1f8a6b5225ae6d3e8dbe934b52f44ed3cf6e1d733e66b15339254b7710ecc1bc)
|
|
763
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
764
|
+
jsii.set(self, "terraformResource", value) # pyright: ignore[reportArgumentType]
|
|
765
|
+
|
|
766
|
+
@builtins.property
|
|
767
|
+
@jsii.member(jsii_name="wrapsSet")
|
|
768
|
+
def _wraps_set(self) -> builtins.bool:
|
|
769
|
+
'''whether the list is wrapping a set (will add tolist() to be able to access an item via an index).'''
|
|
770
|
+
return typing.cast(builtins.bool, jsii.get(self, "wrapsSet"))
|
|
771
|
+
|
|
772
|
+
@_wraps_set.setter
|
|
773
|
+
def _wraps_set(self, value: builtins.bool) -> None:
|
|
774
|
+
if __debug__:
|
|
775
|
+
type_hints = typing.get_type_hints(_typecheckingstub__2b068ef6542bae20782fcaa4e350a92c8cd34d45062fcf493a138e97a0b38f86)
|
|
776
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
777
|
+
jsii.set(self, "wrapsSet", value) # pyright: ignore[reportArgumentType]
|
|
778
|
+
|
|
779
|
+
@builtins.property
|
|
780
|
+
@jsii.member(jsii_name="internalValue")
|
|
781
|
+
def internal_value(
|
|
782
|
+
self,
|
|
783
|
+
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List[LoadbalancerBackendProperties]]]:
|
|
784
|
+
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List[LoadbalancerBackendProperties]]], jsii.get(self, "internalValue"))
|
|
785
|
+
|
|
786
|
+
@internal_value.setter
|
|
787
|
+
def internal_value(
|
|
788
|
+
self,
|
|
789
|
+
value: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List[LoadbalancerBackendProperties]]],
|
|
790
|
+
) -> None:
|
|
791
|
+
if __debug__:
|
|
792
|
+
type_hints = typing.get_type_hints(_typecheckingstub__f8e732b3935e5c2c284f9e0a1a9b80014417767d3cb70421fd39ff444d5c67bf)
|
|
793
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
794
|
+
jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
|
|
795
|
+
|
|
796
|
+
|
|
769
797
|
class LoadbalancerBackendPropertiesOutputReference(
|
|
770
798
|
_cdktf_9a9027ec.ComplexObject,
|
|
771
799
|
metaclass=jsii.JSIIMeta,
|
|
@@ -775,16 +803,22 @@ class LoadbalancerBackendPropertiesOutputReference(
|
|
|
775
803
|
self,
|
|
776
804
|
terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
|
|
777
805
|
terraform_attribute: builtins.str,
|
|
806
|
+
complex_object_index: jsii.Number,
|
|
807
|
+
complex_object_is_from_set: builtins.bool,
|
|
778
808
|
) -> None:
|
|
779
809
|
'''
|
|
780
810
|
:param terraform_resource: The parent resource.
|
|
781
811
|
:param terraform_attribute: The attribute on the parent resource this class is referencing.
|
|
812
|
+
:param complex_object_index: the index of this item in the list.
|
|
813
|
+
:param complex_object_is_from_set: whether the list is wrapping a set (will add tolist() to be able to access an item via an index).
|
|
782
814
|
'''
|
|
783
815
|
if __debug__:
|
|
784
816
|
type_hints = typing.get_type_hints(_typecheckingstub__0c083897711e36589f6551ae9e4bc07921aadcee7d8ec5d8bee78e03d6160dda)
|
|
785
817
|
check_type(argname="argument terraform_resource", value=terraform_resource, expected_type=type_hints["terraform_resource"])
|
|
786
818
|
check_type(argname="argument terraform_attribute", value=terraform_attribute, expected_type=type_hints["terraform_attribute"])
|
|
787
|
-
|
|
819
|
+
check_type(argname="argument complex_object_index", value=complex_object_index, expected_type=type_hints["complex_object_index"])
|
|
820
|
+
check_type(argname="argument complex_object_is_from_set", value=complex_object_is_from_set, expected_type=type_hints["complex_object_is_from_set"])
|
|
821
|
+
jsii.create(self.__class__, self, [terraform_resource, terraform_attribute, complex_object_index, complex_object_is_from_set])
|
|
788
822
|
|
|
789
823
|
@jsii.member(jsii_name="resetHealthCheckExpectedStatus")
|
|
790
824
|
def reset_health_check_expected_status(self) -> None:
|
|
@@ -846,11 +880,6 @@ class LoadbalancerBackendPropertiesOutputReference(
|
|
|
846
880
|
def reset_tls_verify(self) -> None:
|
|
847
881
|
return typing.cast(None, jsii.invoke(self, "resetTlsVerify", []))
|
|
848
882
|
|
|
849
|
-
@builtins.property
|
|
850
|
-
@jsii.member(jsii_name="tlsConfigs")
|
|
851
|
-
def tls_configs(self) -> typing.List[builtins.str]:
|
|
852
|
-
return typing.cast(typing.List[builtins.str], jsii.get(self, "tlsConfigs"))
|
|
853
|
-
|
|
854
883
|
@builtins.property
|
|
855
884
|
@jsii.member(jsii_name="healthCheckExpectedStatusInput")
|
|
856
885
|
def health_check_expected_status_input(self) -> typing.Optional[jsii.Number]:
|
|
@@ -1137,13 +1166,15 @@ class LoadbalancerBackendPropertiesOutputReference(
|
|
|
1137
1166
|
|
|
1138
1167
|
@builtins.property
|
|
1139
1168
|
@jsii.member(jsii_name="internalValue")
|
|
1140
|
-
def internal_value(
|
|
1141
|
-
|
|
1169
|
+
def internal_value(
|
|
1170
|
+
self,
|
|
1171
|
+
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, LoadbalancerBackendProperties]]:
|
|
1172
|
+
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, LoadbalancerBackendProperties]], jsii.get(self, "internalValue"))
|
|
1142
1173
|
|
|
1143
1174
|
@internal_value.setter
|
|
1144
1175
|
def internal_value(
|
|
1145
1176
|
self,
|
|
1146
|
-
value: typing.Optional[LoadbalancerBackendProperties],
|
|
1177
|
+
value: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, LoadbalancerBackendProperties]],
|
|
1147
1178
|
) -> None:
|
|
1148
1179
|
if __debug__:
|
|
1149
1180
|
type_hints = typing.get_type_hints(_typecheckingstub__c8c6fb57a71c2e0e202ceab15eb8b409d80557a71150004a0caaf083b5bb1cb5)
|
|
@@ -1155,6 +1186,7 @@ __all__ = [
|
|
|
1155
1186
|
"LoadbalancerBackend",
|
|
1156
1187
|
"LoadbalancerBackendConfig",
|
|
1157
1188
|
"LoadbalancerBackendProperties",
|
|
1189
|
+
"LoadbalancerBackendPropertiesList",
|
|
1158
1190
|
"LoadbalancerBackendPropertiesOutputReference",
|
|
1159
1191
|
]
|
|
1160
1192
|
|
|
@@ -1162,12 +1194,11 @@ publication.publish()
|
|
|
1162
1194
|
|
|
1163
1195
|
def _typecheckingstub__a57ef11b06133e84b2cf13365b88e7f2dd34adb8674508adcf3a305129d291be(
|
|
1164
1196
|
scope: _constructs_77d1e7e8.Construct,
|
|
1165
|
-
|
|
1197
|
+
id: builtins.str,
|
|
1166
1198
|
*,
|
|
1167
1199
|
loadbalancer: builtins.str,
|
|
1168
1200
|
name: builtins.str,
|
|
1169
|
-
|
|
1170
|
-
properties: typing.Optional[typing.Union[LoadbalancerBackendProperties, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
1201
|
+
properties: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[LoadbalancerBackendProperties, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
1171
1202
|
resolver_name: typing.Optional[builtins.str] = None,
|
|
1172
1203
|
connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
1173
1204
|
count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
|
|
@@ -1189,8 +1220,8 @@ def _typecheckingstub__a39303f6431c9b45110a25cf70f07bd7d65ab86e3d142d38f4c3a889e
|
|
|
1189
1220
|
"""Type checking stubs"""
|
|
1190
1221
|
pass
|
|
1191
1222
|
|
|
1192
|
-
def
|
|
1193
|
-
value: builtins.str,
|
|
1223
|
+
def _typecheckingstub__425dcb0894c6def77121cea82a4b7926cb641081761e4828ac7bf13b99d8c4b4(
|
|
1224
|
+
value: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[LoadbalancerBackendProperties, typing.Dict[builtins.str, typing.Any]]]],
|
|
1194
1225
|
) -> None:
|
|
1195
1226
|
"""Type checking stubs"""
|
|
1196
1227
|
pass
|
|
@@ -1224,8 +1255,7 @@ def _typecheckingstub__6200f98d574a6cde907c9b763cf17de76dec005cc13d69bf52a284d82
|
|
|
1224
1255
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
1225
1256
|
loadbalancer: builtins.str,
|
|
1226
1257
|
name: builtins.str,
|
|
1227
|
-
|
|
1228
|
-
properties: typing.Optional[typing.Union[LoadbalancerBackendProperties, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
1258
|
+
properties: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[LoadbalancerBackendProperties, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
1229
1259
|
resolver_name: typing.Optional[builtins.str] = None,
|
|
1230
1260
|
) -> None:
|
|
1231
1261
|
"""Type checking stubs"""
|
|
@@ -1252,9 +1282,49 @@ def _typecheckingstub__eb5988403ea7b17ea78d8a97176e2db70e4258ead0d52fc7ab7102412
|
|
|
1252
1282
|
"""Type checking stubs"""
|
|
1253
1283
|
pass
|
|
1254
1284
|
|
|
1285
|
+
def _typecheckingstub__6466001e8d1ef72578f27d793b879e51bb3e572eaef9521b980d493595bc42c3(
|
|
1286
|
+
terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
|
|
1287
|
+
terraform_attribute: builtins.str,
|
|
1288
|
+
wraps_set: builtins.bool,
|
|
1289
|
+
) -> None:
|
|
1290
|
+
"""Type checking stubs"""
|
|
1291
|
+
pass
|
|
1292
|
+
|
|
1293
|
+
def _typecheckingstub__79f867fbff964aa075654e4e8af16ff600c59120999a45f0bb5d4eebbf7df082(
|
|
1294
|
+
index: jsii.Number,
|
|
1295
|
+
) -> None:
|
|
1296
|
+
"""Type checking stubs"""
|
|
1297
|
+
pass
|
|
1298
|
+
|
|
1299
|
+
def _typecheckingstub__9951e06afb155147ab301d7a3de3cd2fdf2af7a2dd07afb0107d1f31f5a9afe1(
|
|
1300
|
+
value: builtins.str,
|
|
1301
|
+
) -> None:
|
|
1302
|
+
"""Type checking stubs"""
|
|
1303
|
+
pass
|
|
1304
|
+
|
|
1305
|
+
def _typecheckingstub__1f8a6b5225ae6d3e8dbe934b52f44ed3cf6e1d733e66b15339254b7710ecc1bc(
|
|
1306
|
+
value: _cdktf_9a9027ec.IInterpolatingParent,
|
|
1307
|
+
) -> None:
|
|
1308
|
+
"""Type checking stubs"""
|
|
1309
|
+
pass
|
|
1310
|
+
|
|
1311
|
+
def _typecheckingstub__2b068ef6542bae20782fcaa4e350a92c8cd34d45062fcf493a138e97a0b38f86(
|
|
1312
|
+
value: builtins.bool,
|
|
1313
|
+
) -> None:
|
|
1314
|
+
"""Type checking stubs"""
|
|
1315
|
+
pass
|
|
1316
|
+
|
|
1317
|
+
def _typecheckingstub__f8e732b3935e5c2c284f9e0a1a9b80014417767d3cb70421fd39ff444d5c67bf(
|
|
1318
|
+
value: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List[LoadbalancerBackendProperties]]],
|
|
1319
|
+
) -> None:
|
|
1320
|
+
"""Type checking stubs"""
|
|
1321
|
+
pass
|
|
1322
|
+
|
|
1255
1323
|
def _typecheckingstub__0c083897711e36589f6551ae9e4bc07921aadcee7d8ec5d8bee78e03d6160dda(
|
|
1256
1324
|
terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
|
|
1257
1325
|
terraform_attribute: builtins.str,
|
|
1326
|
+
complex_object_index: jsii.Number,
|
|
1327
|
+
complex_object_is_from_set: builtins.bool,
|
|
1258
1328
|
) -> None:
|
|
1259
1329
|
"""Type checking stubs"""
|
|
1260
1330
|
pass
|
|
@@ -1350,7 +1420,7 @@ def _typecheckingstub__0d060a9595c4cfc7ea56c1c33bf629d6166ba1a8b052484fd102442b5
|
|
|
1350
1420
|
pass
|
|
1351
1421
|
|
|
1352
1422
|
def _typecheckingstub__c8c6fb57a71c2e0e202ceab15eb8b409d80557a71150004a0caaf083b5bb1cb5(
|
|
1353
|
-
value: typing.Optional[LoadbalancerBackendProperties],
|
|
1423
|
+
value: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, LoadbalancerBackendProperties]],
|
|
1354
1424
|
) -> None:
|
|
1355
1425
|
"""Type checking stubs"""
|
|
1356
1426
|
pass
|