cdktf-cdktf-provider-upcloud 14.14.0__py3-none-any.whl → 14.16.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +9 -3
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.16.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_load_balancer_dns_challenge_domain/__init__.py +4 -4
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_valkey_sessions/__init__.py +898 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +41 -41
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +37 -37
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +34 -34
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +61 -61
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +31 -31
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +58 -58
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +39 -39
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +46 -46
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +33 -33
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +226 -226
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +301 -199
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +4203 -1016
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +365 -309
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +275 -123
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +371 -50
- cdktf_cdktf_provider_upcloud/managed_database_valkey/__init__.py +3203 -0
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/managed_object_storage_bucket/__init__.py +409 -0
- cdktf_cdktf_provider_upcloud/managed_object_storage_custom_domain/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/network/__init__.py +33 -33
- cdktf_cdktf_provider_upcloud/network_peering/__init__.py +23 -23
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/provider/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/server/__init__.py +196 -153
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/storage/__init__.py +51 -51
- cdktf_cdktf_provider_upcloud/storage_template/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
- {cdktf_cdktf_provider_upcloud-14.14.0.dist-info → cdktf_cdktf_provider_upcloud-14.16.0.dist-info}/METADATA +5 -5
- cdktf_cdktf_provider_upcloud-14.16.0.dist-info/RECORD +67 -0
- {cdktf_cdktf_provider_upcloud-14.14.0.dist-info → cdktf_cdktf_provider_upcloud-14.16.0.dist-info}/WHEEL +1 -1
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.14.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-14.14.0.dist-info/RECORD +0 -64
- {cdktf_cdktf_provider_upcloud-14.14.0.dist-info → cdktf_cdktf_provider_upcloud-14.16.0.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-14.14.0.dist-info → cdktf_cdktf_provider_upcloud-14.16.0.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_managed_database_user`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_managed_database_user`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_managed_database_user`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -44,7 +44,7 @@ class ManagedDatabaseUser(
|
|
|
44
44
|
metaclass=jsii.JSIIMeta,
|
|
45
45
|
jsii_type="@cdktf/provider-upcloud.managedDatabaseUser.ManagedDatabaseUser",
|
|
46
46
|
):
|
|
47
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
47
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user upcloud_managed_database_user}.'''
|
|
48
48
|
|
|
49
49
|
def __init__(
|
|
50
50
|
self,
|
|
@@ -59,6 +59,7 @@ class ManagedDatabaseUser(
|
|
|
59
59
|
password: typing.Optional[builtins.str] = None,
|
|
60
60
|
pg_access_control: typing.Optional[typing.Union["ManagedDatabaseUserPgAccessControl", typing.Dict[builtins.str, typing.Any]]] = None,
|
|
61
61
|
redis_access_control: typing.Optional[typing.Union["ManagedDatabaseUserRedisAccessControl", typing.Dict[builtins.str, typing.Any]]] = None,
|
|
62
|
+
valkey_access_control: typing.Optional[typing.Union["ManagedDatabaseUserValkeyAccessControl", typing.Dict[builtins.str, typing.Any]]] = None,
|
|
62
63
|
connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
63
64
|
count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
|
|
64
65
|
depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
|
|
@@ -67,18 +68,19 @@ class ManagedDatabaseUser(
|
|
|
67
68
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
68
69
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
69
70
|
) -> None:
|
|
70
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
71
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user upcloud_managed_database_user} Resource.
|
|
71
72
|
|
|
72
73
|
:param scope: The scope in which to define this construct.
|
|
73
74
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
74
|
-
:param service: Service's UUID for which this user belongs to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
75
|
-
:param username: Name of the database user. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
76
|
-
:param authentication: MySQL only, authentication type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
77
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
78
|
-
:param opensearch_access_control: opensearch_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
79
|
-
:param password: Password for the database user. Defaults to a random value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
80
|
-
:param pg_access_control: pg_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
81
|
-
:param redis_access_control: redis_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
75
|
+
:param service: Service's UUID for which this user belongs to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#service ManagedDatabaseUser#service}
|
|
76
|
+
:param username: Name of the database user. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#username ManagedDatabaseUser#username}
|
|
77
|
+
:param authentication: MySQL only, authentication type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#authentication ManagedDatabaseUser#authentication}
|
|
78
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#id ManagedDatabaseUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
79
|
+
:param opensearch_access_control: opensearch_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#opensearch_access_control ManagedDatabaseUser#opensearch_access_control}
|
|
80
|
+
:param password: Password for the database user. Defaults to a random value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#password ManagedDatabaseUser#password}
|
|
81
|
+
:param pg_access_control: pg_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#pg_access_control ManagedDatabaseUser#pg_access_control}
|
|
82
|
+
:param redis_access_control: redis_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#redis_access_control ManagedDatabaseUser#redis_access_control}
|
|
83
|
+
:param valkey_access_control: valkey_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#valkey_access_control ManagedDatabaseUser#valkey_access_control}
|
|
82
84
|
:param connection:
|
|
83
85
|
:param count:
|
|
84
86
|
:param depends_on:
|
|
@@ -100,6 +102,7 @@ class ManagedDatabaseUser(
|
|
|
100
102
|
password=password,
|
|
101
103
|
pg_access_control=pg_access_control,
|
|
102
104
|
redis_access_control=redis_access_control,
|
|
105
|
+
valkey_access_control=valkey_access_control,
|
|
103
106
|
connection=connection,
|
|
104
107
|
count=count,
|
|
105
108
|
depends_on=depends_on,
|
|
@@ -124,7 +127,7 @@ class ManagedDatabaseUser(
|
|
|
124
127
|
|
|
125
128
|
:param scope: The scope in which to define this construct.
|
|
126
129
|
:param import_to_id: The construct id used in the generated config for the ManagedDatabaseUser to import.
|
|
127
|
-
:param import_from_id: The id of the existing ManagedDatabaseUser that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
130
|
+
:param import_from_id: The id of the existing ManagedDatabaseUser that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#import import section} in the documentation of this resource for the id to use
|
|
128
131
|
:param provider: ? Optional instance of the provider where the ManagedDatabaseUser to import is found.
|
|
129
132
|
'''
|
|
130
133
|
if __debug__:
|
|
@@ -142,7 +145,7 @@ class ManagedDatabaseUser(
|
|
|
142
145
|
rules: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["ManagedDatabaseUserOpensearchAccessControlRules", typing.Dict[builtins.str, typing.Any]]]],
|
|
143
146
|
) -> None:
|
|
144
147
|
'''
|
|
145
|
-
:param rules: rules block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
148
|
+
:param rules: rules block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#rules ManagedDatabaseUser#rules}
|
|
146
149
|
'''
|
|
147
150
|
value = ManagedDatabaseUserOpensearchAccessControl(rules=rules)
|
|
148
151
|
|
|
@@ -155,7 +158,7 @@ class ManagedDatabaseUser(
|
|
|
155
158
|
allow_replication: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
156
159
|
) -> None:
|
|
157
160
|
'''
|
|
158
|
-
:param allow_replication: Grant replication privilege. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
161
|
+
:param allow_replication: Grant replication privilege. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#allow_replication ManagedDatabaseUser#allow_replication}
|
|
159
162
|
'''
|
|
160
163
|
value = ManagedDatabaseUserPgAccessControl(allow_replication=allow_replication)
|
|
161
164
|
|
|
@@ -171,10 +174,10 @@ class ManagedDatabaseUser(
|
|
|
171
174
|
keys: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
172
175
|
) -> None:
|
|
173
176
|
'''
|
|
174
|
-
:param categories: Set access control to all commands in specified categories. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
175
|
-
:param channels: Set access control to Pub/Sub channels. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
176
|
-
:param commands: Set access control to commands. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
177
|
-
:param keys: Set access control to keys. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
177
|
+
:param categories: Set access control to all commands in specified categories. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
|
|
178
|
+
:param channels: Set access control to Pub/Sub channels. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
|
|
179
|
+
:param commands: Set access control to commands. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
|
|
180
|
+
:param keys: Set access control to keys. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
|
|
178
181
|
'''
|
|
179
182
|
value = ManagedDatabaseUserRedisAccessControl(
|
|
180
183
|
categories=categories, channels=channels, commands=commands, keys=keys
|
|
@@ -182,6 +185,27 @@ class ManagedDatabaseUser(
|
|
|
182
185
|
|
|
183
186
|
return typing.cast(None, jsii.invoke(self, "putRedisAccessControl", [value]))
|
|
184
187
|
|
|
188
|
+
@jsii.member(jsii_name="putValkeyAccessControl")
|
|
189
|
+
def put_valkey_access_control(
|
|
190
|
+
self,
|
|
191
|
+
*,
|
|
192
|
+
categories: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
193
|
+
channels: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
194
|
+
commands: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
195
|
+
keys: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
196
|
+
) -> None:
|
|
197
|
+
'''
|
|
198
|
+
:param categories: Set access control to all commands in specified categories. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
|
|
199
|
+
:param channels: Set access control to Pub/Sub channels. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
|
|
200
|
+
:param commands: Set access control to commands. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
|
|
201
|
+
:param keys: Set access control to keys. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
|
|
202
|
+
'''
|
|
203
|
+
value = ManagedDatabaseUserValkeyAccessControl(
|
|
204
|
+
categories=categories, channels=channels, commands=commands, keys=keys
|
|
205
|
+
)
|
|
206
|
+
|
|
207
|
+
return typing.cast(None, jsii.invoke(self, "putValkeyAccessControl", [value]))
|
|
208
|
+
|
|
185
209
|
@jsii.member(jsii_name="resetAuthentication")
|
|
186
210
|
def reset_authentication(self) -> None:
|
|
187
211
|
return typing.cast(None, jsii.invoke(self, "resetAuthentication", []))
|
|
@@ -206,6 +230,10 @@ class ManagedDatabaseUser(
|
|
|
206
230
|
def reset_redis_access_control(self) -> None:
|
|
207
231
|
return typing.cast(None, jsii.invoke(self, "resetRedisAccessControl", []))
|
|
208
232
|
|
|
233
|
+
@jsii.member(jsii_name="resetValkeyAccessControl")
|
|
234
|
+
def reset_valkey_access_control(self) -> None:
|
|
235
|
+
return typing.cast(None, jsii.invoke(self, "resetValkeyAccessControl", []))
|
|
236
|
+
|
|
209
237
|
@jsii.member(jsii_name="synthesizeAttributes")
|
|
210
238
|
def _synthesize_attributes(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
211
239
|
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "synthesizeAttributes", []))
|
|
@@ -243,6 +271,13 @@ class ManagedDatabaseUser(
|
|
|
243
271
|
def type(self) -> builtins.str:
|
|
244
272
|
return typing.cast(builtins.str, jsii.get(self, "type"))
|
|
245
273
|
|
|
274
|
+
@builtins.property
|
|
275
|
+
@jsii.member(jsii_name="valkeyAccessControl")
|
|
276
|
+
def valkey_access_control(
|
|
277
|
+
self,
|
|
278
|
+
) -> "ManagedDatabaseUserValkeyAccessControlOutputReference":
|
|
279
|
+
return typing.cast("ManagedDatabaseUserValkeyAccessControlOutputReference", jsii.get(self, "valkeyAccessControl"))
|
|
280
|
+
|
|
246
281
|
@builtins.property
|
|
247
282
|
@jsii.member(jsii_name="authenticationInput")
|
|
248
283
|
def authentication_input(self) -> typing.Optional[builtins.str]:
|
|
@@ -289,6 +324,13 @@ class ManagedDatabaseUser(
|
|
|
289
324
|
def username_input(self) -> typing.Optional[builtins.str]:
|
|
290
325
|
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "usernameInput"))
|
|
291
326
|
|
|
327
|
+
@builtins.property
|
|
328
|
+
@jsii.member(jsii_name="valkeyAccessControlInput")
|
|
329
|
+
def valkey_access_control_input(
|
|
330
|
+
self,
|
|
331
|
+
) -> typing.Optional["ManagedDatabaseUserValkeyAccessControl"]:
|
|
332
|
+
return typing.cast(typing.Optional["ManagedDatabaseUserValkeyAccessControl"], jsii.get(self, "valkeyAccessControlInput"))
|
|
333
|
+
|
|
292
334
|
@builtins.property
|
|
293
335
|
@jsii.member(jsii_name="authentication")
|
|
294
336
|
def authentication(self) -> builtins.str:
|
|
@@ -369,6 +411,7 @@ class ManagedDatabaseUser(
|
|
|
369
411
|
"password": "password",
|
|
370
412
|
"pg_access_control": "pgAccessControl",
|
|
371
413
|
"redis_access_control": "redisAccessControl",
|
|
414
|
+
"valkey_access_control": "valkeyAccessControl",
|
|
372
415
|
},
|
|
373
416
|
)
|
|
374
417
|
class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
@@ -390,6 +433,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
390
433
|
password: typing.Optional[builtins.str] = None,
|
|
391
434
|
pg_access_control: typing.Optional[typing.Union["ManagedDatabaseUserPgAccessControl", typing.Dict[builtins.str, typing.Any]]] = None,
|
|
392
435
|
redis_access_control: typing.Optional[typing.Union["ManagedDatabaseUserRedisAccessControl", typing.Dict[builtins.str, typing.Any]]] = None,
|
|
436
|
+
valkey_access_control: typing.Optional[typing.Union["ManagedDatabaseUserValkeyAccessControl", typing.Dict[builtins.str, typing.Any]]] = None,
|
|
393
437
|
) -> None:
|
|
394
438
|
'''
|
|
395
439
|
:param connection:
|
|
@@ -399,14 +443,15 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
399
443
|
:param lifecycle:
|
|
400
444
|
:param provider:
|
|
401
445
|
:param provisioners:
|
|
402
|
-
:param service: Service's UUID for which this user belongs to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
403
|
-
:param username: Name of the database user. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
404
|
-
:param authentication: MySQL only, authentication type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
405
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
406
|
-
:param opensearch_access_control: opensearch_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
407
|
-
:param password: Password for the database user. Defaults to a random value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
408
|
-
:param pg_access_control: pg_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
409
|
-
:param redis_access_control: redis_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
446
|
+
:param service: Service's UUID for which this user belongs to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#service ManagedDatabaseUser#service}
|
|
447
|
+
:param username: Name of the database user. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#username ManagedDatabaseUser#username}
|
|
448
|
+
:param authentication: MySQL only, authentication type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#authentication ManagedDatabaseUser#authentication}
|
|
449
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#id ManagedDatabaseUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
450
|
+
:param opensearch_access_control: opensearch_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#opensearch_access_control ManagedDatabaseUser#opensearch_access_control}
|
|
451
|
+
:param password: Password for the database user. Defaults to a random value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#password ManagedDatabaseUser#password}
|
|
452
|
+
:param pg_access_control: pg_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#pg_access_control ManagedDatabaseUser#pg_access_control}
|
|
453
|
+
:param redis_access_control: redis_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#redis_access_control ManagedDatabaseUser#redis_access_control}
|
|
454
|
+
:param valkey_access_control: valkey_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#valkey_access_control ManagedDatabaseUser#valkey_access_control}
|
|
410
455
|
'''
|
|
411
456
|
if isinstance(lifecycle, dict):
|
|
412
457
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -416,6 +461,8 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
416
461
|
pg_access_control = ManagedDatabaseUserPgAccessControl(**pg_access_control)
|
|
417
462
|
if isinstance(redis_access_control, dict):
|
|
418
463
|
redis_access_control = ManagedDatabaseUserRedisAccessControl(**redis_access_control)
|
|
464
|
+
if isinstance(valkey_access_control, dict):
|
|
465
|
+
valkey_access_control = ManagedDatabaseUserValkeyAccessControl(**valkey_access_control)
|
|
419
466
|
if __debug__:
|
|
420
467
|
type_hints = typing.get_type_hints(_typecheckingstub__07a7f5c785cc0e125e8ded59bfd094c26884e099fe8129734900f6faab61a108)
|
|
421
468
|
check_type(argname="argument connection", value=connection, expected_type=type_hints["connection"])
|
|
@@ -433,6 +480,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
433
480
|
check_type(argname="argument password", value=password, expected_type=type_hints["password"])
|
|
434
481
|
check_type(argname="argument pg_access_control", value=pg_access_control, expected_type=type_hints["pg_access_control"])
|
|
435
482
|
check_type(argname="argument redis_access_control", value=redis_access_control, expected_type=type_hints["redis_access_control"])
|
|
483
|
+
check_type(argname="argument valkey_access_control", value=valkey_access_control, expected_type=type_hints["valkey_access_control"])
|
|
436
484
|
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
437
485
|
"service": service,
|
|
438
486
|
"username": username,
|
|
@@ -463,6 +511,8 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
463
511
|
self._values["pg_access_control"] = pg_access_control
|
|
464
512
|
if redis_access_control is not None:
|
|
465
513
|
self._values["redis_access_control"] = redis_access_control
|
|
514
|
+
if valkey_access_control is not None:
|
|
515
|
+
self._values["valkey_access_control"] = valkey_access_control
|
|
466
516
|
|
|
467
517
|
@builtins.property
|
|
468
518
|
def connection(
|
|
@@ -532,7 +582,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
532
582
|
def service(self) -> builtins.str:
|
|
533
583
|
'''Service's UUID for which this user belongs to.
|
|
534
584
|
|
|
535
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
585
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#service ManagedDatabaseUser#service}
|
|
536
586
|
'''
|
|
537
587
|
result = self._values.get("service")
|
|
538
588
|
assert result is not None, "Required property 'service' is missing"
|
|
@@ -542,7 +592,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
542
592
|
def username(self) -> builtins.str:
|
|
543
593
|
'''Name of the database user.
|
|
544
594
|
|
|
545
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
595
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#username ManagedDatabaseUser#username}
|
|
546
596
|
'''
|
|
547
597
|
result = self._values.get("username")
|
|
548
598
|
assert result is not None, "Required property 'username' is missing"
|
|
@@ -552,14 +602,14 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
552
602
|
def authentication(self) -> typing.Optional[builtins.str]:
|
|
553
603
|
'''MySQL only, authentication type.
|
|
554
604
|
|
|
555
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
605
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#authentication ManagedDatabaseUser#authentication}
|
|
556
606
|
'''
|
|
557
607
|
result = self._values.get("authentication")
|
|
558
608
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
559
609
|
|
|
560
610
|
@builtins.property
|
|
561
611
|
def id(self) -> typing.Optional[builtins.str]:
|
|
562
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
612
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#id ManagedDatabaseUser#id}.
|
|
563
613
|
|
|
564
614
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
565
615
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -573,7 +623,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
573
623
|
) -> typing.Optional["ManagedDatabaseUserOpensearchAccessControl"]:
|
|
574
624
|
'''opensearch_access_control block.
|
|
575
625
|
|
|
576
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
626
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#opensearch_access_control ManagedDatabaseUser#opensearch_access_control}
|
|
577
627
|
'''
|
|
578
628
|
result = self._values.get("opensearch_access_control")
|
|
579
629
|
return typing.cast(typing.Optional["ManagedDatabaseUserOpensearchAccessControl"], result)
|
|
@@ -582,7 +632,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
582
632
|
def password(self) -> typing.Optional[builtins.str]:
|
|
583
633
|
'''Password for the database user. Defaults to a random value.
|
|
584
634
|
|
|
585
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
635
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#password ManagedDatabaseUser#password}
|
|
586
636
|
'''
|
|
587
637
|
result = self._values.get("password")
|
|
588
638
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -593,7 +643,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
593
643
|
) -> typing.Optional["ManagedDatabaseUserPgAccessControl"]:
|
|
594
644
|
'''pg_access_control block.
|
|
595
645
|
|
|
596
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
646
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#pg_access_control ManagedDatabaseUser#pg_access_control}
|
|
597
647
|
'''
|
|
598
648
|
result = self._values.get("pg_access_control")
|
|
599
649
|
return typing.cast(typing.Optional["ManagedDatabaseUserPgAccessControl"], result)
|
|
@@ -604,11 +654,22 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
604
654
|
) -> typing.Optional["ManagedDatabaseUserRedisAccessControl"]:
|
|
605
655
|
'''redis_access_control block.
|
|
606
656
|
|
|
607
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
657
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#redis_access_control ManagedDatabaseUser#redis_access_control}
|
|
608
658
|
'''
|
|
609
659
|
result = self._values.get("redis_access_control")
|
|
610
660
|
return typing.cast(typing.Optional["ManagedDatabaseUserRedisAccessControl"], result)
|
|
611
661
|
|
|
662
|
+
@builtins.property
|
|
663
|
+
def valkey_access_control(
|
|
664
|
+
self,
|
|
665
|
+
) -> typing.Optional["ManagedDatabaseUserValkeyAccessControl"]:
|
|
666
|
+
'''valkey_access_control block.
|
|
667
|
+
|
|
668
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#valkey_access_control ManagedDatabaseUser#valkey_access_control}
|
|
669
|
+
'''
|
|
670
|
+
result = self._values.get("valkey_access_control")
|
|
671
|
+
return typing.cast(typing.Optional["ManagedDatabaseUserValkeyAccessControl"], result)
|
|
672
|
+
|
|
612
673
|
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
613
674
|
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
614
675
|
|
|
@@ -633,7 +694,7 @@ class ManagedDatabaseUserOpensearchAccessControl:
|
|
|
633
694
|
rules: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["ManagedDatabaseUserOpensearchAccessControlRules", typing.Dict[builtins.str, typing.Any]]]],
|
|
634
695
|
) -> None:
|
|
635
696
|
'''
|
|
636
|
-
:param rules: rules block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
697
|
+
:param rules: rules block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#rules ManagedDatabaseUser#rules}
|
|
637
698
|
'''
|
|
638
699
|
if __debug__:
|
|
639
700
|
type_hints = typing.get_type_hints(_typecheckingstub__72db216f4a07b0d61090bf6cee72765d201a2daf9f3d0177b70ceadc0e0b4950)
|
|
@@ -648,7 +709,7 @@ class ManagedDatabaseUserOpensearchAccessControl:
|
|
|
648
709
|
) -> typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["ManagedDatabaseUserOpensearchAccessControlRules"]]:
|
|
649
710
|
'''rules block.
|
|
650
711
|
|
|
651
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
712
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#rules ManagedDatabaseUser#rules}
|
|
652
713
|
'''
|
|
653
714
|
result = self._values.get("rules")
|
|
654
715
|
assert result is not None, "Required property 'rules' is missing"
|
|
@@ -737,8 +798,8 @@ class ManagedDatabaseUserOpensearchAccessControlOutputReference(
|
|
|
737
798
|
class ManagedDatabaseUserOpensearchAccessControlRules:
|
|
738
799
|
def __init__(self, *, index: builtins.str, permission: builtins.str) -> None:
|
|
739
800
|
'''
|
|
740
|
-
:param index: Set index name, pattern or top level API. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
741
|
-
:param permission: Set permission access. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
801
|
+
:param index: Set index name, pattern or top level API. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#index ManagedDatabaseUser#index}
|
|
802
|
+
:param permission: Set permission access. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#permission ManagedDatabaseUser#permission}
|
|
742
803
|
'''
|
|
743
804
|
if __debug__:
|
|
744
805
|
type_hints = typing.get_type_hints(_typecheckingstub__037bf6ae1cf4ccc5175cd9f327782b4c274be6c4d8dcbbf42b47b3e0d87e86ea)
|
|
@@ -753,7 +814,7 @@ class ManagedDatabaseUserOpensearchAccessControlRules:
|
|
|
753
814
|
def index(self) -> builtins.str:
|
|
754
815
|
'''Set index name, pattern or top level API.
|
|
755
816
|
|
|
756
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
817
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#index ManagedDatabaseUser#index}
|
|
757
818
|
'''
|
|
758
819
|
result = self._values.get("index")
|
|
759
820
|
assert result is not None, "Required property 'index' is missing"
|
|
@@ -763,7 +824,7 @@ class ManagedDatabaseUserOpensearchAccessControlRules:
|
|
|
763
824
|
def permission(self) -> builtins.str:
|
|
764
825
|
'''Set permission access.
|
|
765
826
|
|
|
766
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
827
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#permission ManagedDatabaseUser#permission}
|
|
767
828
|
'''
|
|
768
829
|
result = self._values.get("permission")
|
|
769
830
|
assert result is not None, "Required property 'permission' is missing"
|
|
@@ -964,7 +1025,7 @@ class ManagedDatabaseUserPgAccessControl:
|
|
|
964
1025
|
allow_replication: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
965
1026
|
) -> None:
|
|
966
1027
|
'''
|
|
967
|
-
:param allow_replication: Grant replication privilege. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1028
|
+
:param allow_replication: Grant replication privilege. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#allow_replication ManagedDatabaseUser#allow_replication}
|
|
968
1029
|
'''
|
|
969
1030
|
if __debug__:
|
|
970
1031
|
type_hints = typing.get_type_hints(_typecheckingstub__f34e6b56dbd319319ed29790d55c8592357d86f9b7c8e8c14a5c4d70a6787a4f)
|
|
@@ -979,7 +1040,7 @@ class ManagedDatabaseUserPgAccessControl:
|
|
|
979
1040
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
980
1041
|
'''Grant replication privilege.
|
|
981
1042
|
|
|
982
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1043
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#allow_replication ManagedDatabaseUser#allow_replication}
|
|
983
1044
|
'''
|
|
984
1045
|
result = self._values.get("allow_replication")
|
|
985
1046
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -1080,10 +1141,10 @@ class ManagedDatabaseUserRedisAccessControl:
|
|
|
1080
1141
|
keys: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
1081
1142
|
) -> None:
|
|
1082
1143
|
'''
|
|
1083
|
-
:param categories: Set access control to all commands in specified categories. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1084
|
-
:param channels: Set access control to Pub/Sub channels. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1085
|
-
:param commands: Set access control to commands. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1086
|
-
:param keys: Set access control to keys. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1144
|
+
:param categories: Set access control to all commands in specified categories. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
|
|
1145
|
+
:param channels: Set access control to Pub/Sub channels. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
|
|
1146
|
+
:param commands: Set access control to commands. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
|
|
1147
|
+
:param keys: Set access control to keys. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
|
|
1087
1148
|
'''
|
|
1088
1149
|
if __debug__:
|
|
1089
1150
|
type_hints = typing.get_type_hints(_typecheckingstub__27204462f8812754fabbce2e4daa3352d018e15b121d6d94fd8c33a5f838827b)
|
|
@@ -1105,7 +1166,7 @@ class ManagedDatabaseUserRedisAccessControl:
|
|
|
1105
1166
|
def categories(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
1106
1167
|
'''Set access control to all commands in specified categories.
|
|
1107
1168
|
|
|
1108
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1169
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
|
|
1109
1170
|
'''
|
|
1110
1171
|
result = self._values.get("categories")
|
|
1111
1172
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -1114,7 +1175,7 @@ class ManagedDatabaseUserRedisAccessControl:
|
|
|
1114
1175
|
def channels(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
1115
1176
|
'''Set access control to Pub/Sub channels.
|
|
1116
1177
|
|
|
1117
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1178
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
|
|
1118
1179
|
'''
|
|
1119
1180
|
result = self._values.get("channels")
|
|
1120
1181
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -1123,7 +1184,7 @@ class ManagedDatabaseUserRedisAccessControl:
|
|
|
1123
1184
|
def commands(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
1124
1185
|
'''Set access control to commands.
|
|
1125
1186
|
|
|
1126
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1187
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
|
|
1127
1188
|
'''
|
|
1128
1189
|
result = self._values.get("commands")
|
|
1129
1190
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -1132,7 +1193,7 @@ class ManagedDatabaseUserRedisAccessControl:
|
|
|
1132
1193
|
def keys(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
1133
1194
|
'''Set access control to keys.
|
|
1134
1195
|
|
|
1135
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1196
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
|
|
1136
1197
|
'''
|
|
1137
1198
|
result = self._values.get("keys")
|
|
1138
1199
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -1269,6 +1330,215 @@ class ManagedDatabaseUserRedisAccessControlOutputReference(
|
|
|
1269
1330
|
jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
|
|
1270
1331
|
|
|
1271
1332
|
|
|
1333
|
+
@jsii.data_type(
|
|
1334
|
+
jsii_type="@cdktf/provider-upcloud.managedDatabaseUser.ManagedDatabaseUserValkeyAccessControl",
|
|
1335
|
+
jsii_struct_bases=[],
|
|
1336
|
+
name_mapping={
|
|
1337
|
+
"categories": "categories",
|
|
1338
|
+
"channels": "channels",
|
|
1339
|
+
"commands": "commands",
|
|
1340
|
+
"keys": "keys",
|
|
1341
|
+
},
|
|
1342
|
+
)
|
|
1343
|
+
class ManagedDatabaseUserValkeyAccessControl:
|
|
1344
|
+
def __init__(
|
|
1345
|
+
self,
|
|
1346
|
+
*,
|
|
1347
|
+
categories: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
1348
|
+
channels: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
1349
|
+
commands: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
1350
|
+
keys: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
1351
|
+
) -> None:
|
|
1352
|
+
'''
|
|
1353
|
+
:param categories: Set access control to all commands in specified categories. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
|
|
1354
|
+
:param channels: Set access control to Pub/Sub channels. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
|
|
1355
|
+
:param commands: Set access control to commands. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
|
|
1356
|
+
:param keys: Set access control to keys. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
|
|
1357
|
+
'''
|
|
1358
|
+
if __debug__:
|
|
1359
|
+
type_hints = typing.get_type_hints(_typecheckingstub__2f1493b4bca5854170cbde576964405bb43c4a65a1f4134e3fdb249bbe20358d)
|
|
1360
|
+
check_type(argname="argument categories", value=categories, expected_type=type_hints["categories"])
|
|
1361
|
+
check_type(argname="argument channels", value=channels, expected_type=type_hints["channels"])
|
|
1362
|
+
check_type(argname="argument commands", value=commands, expected_type=type_hints["commands"])
|
|
1363
|
+
check_type(argname="argument keys", value=keys, expected_type=type_hints["keys"])
|
|
1364
|
+
self._values: typing.Dict[builtins.str, typing.Any] = {}
|
|
1365
|
+
if categories is not None:
|
|
1366
|
+
self._values["categories"] = categories
|
|
1367
|
+
if channels is not None:
|
|
1368
|
+
self._values["channels"] = channels
|
|
1369
|
+
if commands is not None:
|
|
1370
|
+
self._values["commands"] = commands
|
|
1371
|
+
if keys is not None:
|
|
1372
|
+
self._values["keys"] = keys
|
|
1373
|
+
|
|
1374
|
+
@builtins.property
|
|
1375
|
+
def categories(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
1376
|
+
'''Set access control to all commands in specified categories.
|
|
1377
|
+
|
|
1378
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
|
|
1379
|
+
'''
|
|
1380
|
+
result = self._values.get("categories")
|
|
1381
|
+
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
1382
|
+
|
|
1383
|
+
@builtins.property
|
|
1384
|
+
def channels(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
1385
|
+
'''Set access control to Pub/Sub channels.
|
|
1386
|
+
|
|
1387
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
|
|
1388
|
+
'''
|
|
1389
|
+
result = self._values.get("channels")
|
|
1390
|
+
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
1391
|
+
|
|
1392
|
+
@builtins.property
|
|
1393
|
+
def commands(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
1394
|
+
'''Set access control to commands.
|
|
1395
|
+
|
|
1396
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
|
|
1397
|
+
'''
|
|
1398
|
+
result = self._values.get("commands")
|
|
1399
|
+
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
1400
|
+
|
|
1401
|
+
@builtins.property
|
|
1402
|
+
def keys(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
1403
|
+
'''Set access control to keys.
|
|
1404
|
+
|
|
1405
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.16.0/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
|
|
1406
|
+
'''
|
|
1407
|
+
result = self._values.get("keys")
|
|
1408
|
+
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
1409
|
+
|
|
1410
|
+
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
1411
|
+
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
1412
|
+
|
|
1413
|
+
def __ne__(self, rhs: typing.Any) -> builtins.bool:
|
|
1414
|
+
return not (rhs == self)
|
|
1415
|
+
|
|
1416
|
+
def __repr__(self) -> str:
|
|
1417
|
+
return "ManagedDatabaseUserValkeyAccessControl(%s)" % ", ".join(
|
|
1418
|
+
k + "=" + repr(v) for k, v in self._values.items()
|
|
1419
|
+
)
|
|
1420
|
+
|
|
1421
|
+
|
|
1422
|
+
class ManagedDatabaseUserValkeyAccessControlOutputReference(
|
|
1423
|
+
_cdktf_9a9027ec.ComplexObject,
|
|
1424
|
+
metaclass=jsii.JSIIMeta,
|
|
1425
|
+
jsii_type="@cdktf/provider-upcloud.managedDatabaseUser.ManagedDatabaseUserValkeyAccessControlOutputReference",
|
|
1426
|
+
):
|
|
1427
|
+
def __init__(
|
|
1428
|
+
self,
|
|
1429
|
+
terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
|
|
1430
|
+
terraform_attribute: builtins.str,
|
|
1431
|
+
) -> None:
|
|
1432
|
+
'''
|
|
1433
|
+
:param terraform_resource: The parent resource.
|
|
1434
|
+
:param terraform_attribute: The attribute on the parent resource this class is referencing.
|
|
1435
|
+
'''
|
|
1436
|
+
if __debug__:
|
|
1437
|
+
type_hints = typing.get_type_hints(_typecheckingstub__60e811bb7552f5b604095a5015d4c3f3505ab56452fbbcbaf69a6a51d0f46768)
|
|
1438
|
+
check_type(argname="argument terraform_resource", value=terraform_resource, expected_type=type_hints["terraform_resource"])
|
|
1439
|
+
check_type(argname="argument terraform_attribute", value=terraform_attribute, expected_type=type_hints["terraform_attribute"])
|
|
1440
|
+
jsii.create(self.__class__, self, [terraform_resource, terraform_attribute])
|
|
1441
|
+
|
|
1442
|
+
@jsii.member(jsii_name="resetCategories")
|
|
1443
|
+
def reset_categories(self) -> None:
|
|
1444
|
+
return typing.cast(None, jsii.invoke(self, "resetCategories", []))
|
|
1445
|
+
|
|
1446
|
+
@jsii.member(jsii_name="resetChannels")
|
|
1447
|
+
def reset_channels(self) -> None:
|
|
1448
|
+
return typing.cast(None, jsii.invoke(self, "resetChannels", []))
|
|
1449
|
+
|
|
1450
|
+
@jsii.member(jsii_name="resetCommands")
|
|
1451
|
+
def reset_commands(self) -> None:
|
|
1452
|
+
return typing.cast(None, jsii.invoke(self, "resetCommands", []))
|
|
1453
|
+
|
|
1454
|
+
@jsii.member(jsii_name="resetKeys")
|
|
1455
|
+
def reset_keys(self) -> None:
|
|
1456
|
+
return typing.cast(None, jsii.invoke(self, "resetKeys", []))
|
|
1457
|
+
|
|
1458
|
+
@builtins.property
|
|
1459
|
+
@jsii.member(jsii_name="categoriesInput")
|
|
1460
|
+
def categories_input(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
1461
|
+
return typing.cast(typing.Optional[typing.List[builtins.str]], jsii.get(self, "categoriesInput"))
|
|
1462
|
+
|
|
1463
|
+
@builtins.property
|
|
1464
|
+
@jsii.member(jsii_name="channelsInput")
|
|
1465
|
+
def channels_input(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
1466
|
+
return typing.cast(typing.Optional[typing.List[builtins.str]], jsii.get(self, "channelsInput"))
|
|
1467
|
+
|
|
1468
|
+
@builtins.property
|
|
1469
|
+
@jsii.member(jsii_name="commandsInput")
|
|
1470
|
+
def commands_input(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
1471
|
+
return typing.cast(typing.Optional[typing.List[builtins.str]], jsii.get(self, "commandsInput"))
|
|
1472
|
+
|
|
1473
|
+
@builtins.property
|
|
1474
|
+
@jsii.member(jsii_name="keysInput")
|
|
1475
|
+
def keys_input(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
1476
|
+
return typing.cast(typing.Optional[typing.List[builtins.str]], jsii.get(self, "keysInput"))
|
|
1477
|
+
|
|
1478
|
+
@builtins.property
|
|
1479
|
+
@jsii.member(jsii_name="categories")
|
|
1480
|
+
def categories(self) -> typing.List[builtins.str]:
|
|
1481
|
+
return typing.cast(typing.List[builtins.str], jsii.get(self, "categories"))
|
|
1482
|
+
|
|
1483
|
+
@categories.setter
|
|
1484
|
+
def categories(self, value: typing.List[builtins.str]) -> None:
|
|
1485
|
+
if __debug__:
|
|
1486
|
+
type_hints = typing.get_type_hints(_typecheckingstub__ccd299ae68222ffa9a194acbf7a81cc6852825ca93271fd388a8cd6121ed4f19)
|
|
1487
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1488
|
+
jsii.set(self, "categories", value) # pyright: ignore[reportArgumentType]
|
|
1489
|
+
|
|
1490
|
+
@builtins.property
|
|
1491
|
+
@jsii.member(jsii_name="channels")
|
|
1492
|
+
def channels(self) -> typing.List[builtins.str]:
|
|
1493
|
+
return typing.cast(typing.List[builtins.str], jsii.get(self, "channels"))
|
|
1494
|
+
|
|
1495
|
+
@channels.setter
|
|
1496
|
+
def channels(self, value: typing.List[builtins.str]) -> None:
|
|
1497
|
+
if __debug__:
|
|
1498
|
+
type_hints = typing.get_type_hints(_typecheckingstub__d3b52ad193f7883921cbb74ab75e9b78c1fbce4f8095f08603bbc19c8a429872)
|
|
1499
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1500
|
+
jsii.set(self, "channels", value) # pyright: ignore[reportArgumentType]
|
|
1501
|
+
|
|
1502
|
+
@builtins.property
|
|
1503
|
+
@jsii.member(jsii_name="commands")
|
|
1504
|
+
def commands(self) -> typing.List[builtins.str]:
|
|
1505
|
+
return typing.cast(typing.List[builtins.str], jsii.get(self, "commands"))
|
|
1506
|
+
|
|
1507
|
+
@commands.setter
|
|
1508
|
+
def commands(self, value: typing.List[builtins.str]) -> None:
|
|
1509
|
+
if __debug__:
|
|
1510
|
+
type_hints = typing.get_type_hints(_typecheckingstub__75d52995b6d04add9841ba35e2f51734fdb294de2b4075236624eeac70dbc284)
|
|
1511
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1512
|
+
jsii.set(self, "commands", value) # pyright: ignore[reportArgumentType]
|
|
1513
|
+
|
|
1514
|
+
@builtins.property
|
|
1515
|
+
@jsii.member(jsii_name="keys")
|
|
1516
|
+
def keys(self) -> typing.List[builtins.str]:
|
|
1517
|
+
return typing.cast(typing.List[builtins.str], jsii.get(self, "keys"))
|
|
1518
|
+
|
|
1519
|
+
@keys.setter
|
|
1520
|
+
def keys(self, value: typing.List[builtins.str]) -> None:
|
|
1521
|
+
if __debug__:
|
|
1522
|
+
type_hints = typing.get_type_hints(_typecheckingstub__4d2d78c3e1a8bba65f5829af1ac02a433782d32b8ae35a1f8159c5e851eac810)
|
|
1523
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1524
|
+
jsii.set(self, "keys", value) # pyright: ignore[reportArgumentType]
|
|
1525
|
+
|
|
1526
|
+
@builtins.property
|
|
1527
|
+
@jsii.member(jsii_name="internalValue")
|
|
1528
|
+
def internal_value(self) -> typing.Optional[ManagedDatabaseUserValkeyAccessControl]:
|
|
1529
|
+
return typing.cast(typing.Optional[ManagedDatabaseUserValkeyAccessControl], jsii.get(self, "internalValue"))
|
|
1530
|
+
|
|
1531
|
+
@internal_value.setter
|
|
1532
|
+
def internal_value(
|
|
1533
|
+
self,
|
|
1534
|
+
value: typing.Optional[ManagedDatabaseUserValkeyAccessControl],
|
|
1535
|
+
) -> None:
|
|
1536
|
+
if __debug__:
|
|
1537
|
+
type_hints = typing.get_type_hints(_typecheckingstub__cec487a59a2b9bbfdc8f9f8aeeb285858a68a44c95f58c1b7e4379f578adae99)
|
|
1538
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1539
|
+
jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
|
|
1540
|
+
|
|
1541
|
+
|
|
1272
1542
|
__all__ = [
|
|
1273
1543
|
"ManagedDatabaseUser",
|
|
1274
1544
|
"ManagedDatabaseUserConfig",
|
|
@@ -1281,6 +1551,8 @@ __all__ = [
|
|
|
1281
1551
|
"ManagedDatabaseUserPgAccessControlOutputReference",
|
|
1282
1552
|
"ManagedDatabaseUserRedisAccessControl",
|
|
1283
1553
|
"ManagedDatabaseUserRedisAccessControlOutputReference",
|
|
1554
|
+
"ManagedDatabaseUserValkeyAccessControl",
|
|
1555
|
+
"ManagedDatabaseUserValkeyAccessControlOutputReference",
|
|
1284
1556
|
]
|
|
1285
1557
|
|
|
1286
1558
|
publication.publish()
|
|
@@ -1297,6 +1569,7 @@ def _typecheckingstub__284705db217200be03c68231d6206d89ab6b5c942fa6aa0a91e5f854d
|
|
|
1297
1569
|
password: typing.Optional[builtins.str] = None,
|
|
1298
1570
|
pg_access_control: typing.Optional[typing.Union[ManagedDatabaseUserPgAccessControl, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
1299
1571
|
redis_access_control: typing.Optional[typing.Union[ManagedDatabaseUserRedisAccessControl, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
1572
|
+
valkey_access_control: typing.Optional[typing.Union[ManagedDatabaseUserValkeyAccessControl, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
1300
1573
|
connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
1301
1574
|
count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
|
|
1302
1575
|
depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
|
|
@@ -1364,6 +1637,7 @@ def _typecheckingstub__07a7f5c785cc0e125e8ded59bfd094c26884e099fe8129734900f6faa
|
|
|
1364
1637
|
password: typing.Optional[builtins.str] = None,
|
|
1365
1638
|
pg_access_control: typing.Optional[typing.Union[ManagedDatabaseUserPgAccessControl, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
1366
1639
|
redis_access_control: typing.Optional[typing.Union[ManagedDatabaseUserRedisAccessControl, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
1640
|
+
valkey_access_control: typing.Optional[typing.Union[ManagedDatabaseUserValkeyAccessControl, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
1367
1641
|
) -> None:
|
|
1368
1642
|
"""Type checking stubs"""
|
|
1369
1643
|
pass
|
|
@@ -1539,3 +1813,50 @@ def _typecheckingstub__339df3f9580cdaa83ea424d213c30eb13df0c7142e732aa0a5fa3d7a2
|
|
|
1539
1813
|
) -> None:
|
|
1540
1814
|
"""Type checking stubs"""
|
|
1541
1815
|
pass
|
|
1816
|
+
|
|
1817
|
+
def _typecheckingstub__2f1493b4bca5854170cbde576964405bb43c4a65a1f4134e3fdb249bbe20358d(
|
|
1818
|
+
*,
|
|
1819
|
+
categories: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
1820
|
+
channels: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
1821
|
+
commands: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
1822
|
+
keys: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
1823
|
+
) -> None:
|
|
1824
|
+
"""Type checking stubs"""
|
|
1825
|
+
pass
|
|
1826
|
+
|
|
1827
|
+
def _typecheckingstub__60e811bb7552f5b604095a5015d4c3f3505ab56452fbbcbaf69a6a51d0f46768(
|
|
1828
|
+
terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
|
|
1829
|
+
terraform_attribute: builtins.str,
|
|
1830
|
+
) -> None:
|
|
1831
|
+
"""Type checking stubs"""
|
|
1832
|
+
pass
|
|
1833
|
+
|
|
1834
|
+
def _typecheckingstub__ccd299ae68222ffa9a194acbf7a81cc6852825ca93271fd388a8cd6121ed4f19(
|
|
1835
|
+
value: typing.List[builtins.str],
|
|
1836
|
+
) -> None:
|
|
1837
|
+
"""Type checking stubs"""
|
|
1838
|
+
pass
|
|
1839
|
+
|
|
1840
|
+
def _typecheckingstub__d3b52ad193f7883921cbb74ab75e9b78c1fbce4f8095f08603bbc19c8a429872(
|
|
1841
|
+
value: typing.List[builtins.str],
|
|
1842
|
+
) -> None:
|
|
1843
|
+
"""Type checking stubs"""
|
|
1844
|
+
pass
|
|
1845
|
+
|
|
1846
|
+
def _typecheckingstub__75d52995b6d04add9841ba35e2f51734fdb294de2b4075236624eeac70dbc284(
|
|
1847
|
+
value: typing.List[builtins.str],
|
|
1848
|
+
) -> None:
|
|
1849
|
+
"""Type checking stubs"""
|
|
1850
|
+
pass
|
|
1851
|
+
|
|
1852
|
+
def _typecheckingstub__4d2d78c3e1a8bba65f5829af1ac02a433782d32b8ae35a1f8159c5e851eac810(
|
|
1853
|
+
value: typing.List[builtins.str],
|
|
1854
|
+
) -> None:
|
|
1855
|
+
"""Type checking stubs"""
|
|
1856
|
+
pass
|
|
1857
|
+
|
|
1858
|
+
def _typecheckingstub__cec487a59a2b9bbfdc8f9f8aeeb285858a68a44c95f58c1b7e4379f578adae99(
|
|
1859
|
+
value: typing.Optional[ManagedDatabaseUserValkeyAccessControl],
|
|
1860
|
+
) -> None:
|
|
1861
|
+
"""Type checking stubs"""
|
|
1862
|
+
pass
|