cdktf-cdktf-provider-upcloud 14.8.1__py3-none-any.whl → 14.9.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +3 -3
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.9.1.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +8 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +44 -44
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +8 -8
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +62 -62
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +52 -52
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +54 -54
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +80 -80
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +40 -40
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +95 -95
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +72 -72
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +84 -84
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +36 -36
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +52 -52
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +351 -351
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +24 -24
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +40 -40
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +36 -36
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +24 -24
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +359 -264
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +509 -460
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +555 -412
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +263 -168
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +70 -70
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +48 -48
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +24 -24
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/network/__init__.py +49 -49
- cdktf_cdktf_provider_upcloud/network_peering/__init__.py +38 -38
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +43 -43
- cdktf_cdktf_provider_upcloud/provider/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/router/__init__.py +242 -29
- cdktf_cdktf_provider_upcloud/server/__init__.py +219 -219
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +34 -77
- cdktf_cdktf_provider_upcloud/storage/__init__.py +76 -76
- cdktf_cdktf_provider_upcloud/tag/__init__.py +20 -20
- {cdktf_cdktf_provider_upcloud-14.8.1.dist-info → cdktf_cdktf_provider_upcloud-14.9.1.dist-info}/METADATA +9 -9
- cdktf_cdktf_provider_upcloud-14.9.1.dist-info/RECORD +61 -0
- {cdktf_cdktf_provider_upcloud-14.8.1.dist-info → cdktf_cdktf_provider_upcloud-14.9.1.dist-info}/WHEEL +1 -1
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.8.1.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-14.8.1.dist-info/RECORD +0 -61
- {cdktf_cdktf_provider_upcloud-14.8.1.dist-info → cdktf_cdktf_provider_upcloud-14.9.1.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-14.8.1.dist-info → cdktf_cdktf_provider_upcloud-14.9.1.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_loadbalancer_backend`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_loadbalancer_backend`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_loadbalancer_backend`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -29,7 +29,7 @@ class LoadbalancerBackend(
|
|
|
29
29
|
metaclass=jsii.JSIIMeta,
|
|
30
30
|
jsii_type="@cdktf/provider-upcloud.loadbalancerBackend.LoadbalancerBackend",
|
|
31
31
|
):
|
|
32
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
32
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend upcloud_loadbalancer_backend}.'''
|
|
33
33
|
|
|
34
34
|
def __init__(
|
|
35
35
|
self,
|
|
@@ -49,15 +49,15 @@ class LoadbalancerBackend(
|
|
|
49
49
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
50
50
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
51
51
|
) -> None:
|
|
52
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
52
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend upcloud_loadbalancer_backend} Resource.
|
|
53
53
|
|
|
54
54
|
:param scope: The scope in which to define this construct.
|
|
55
55
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
56
|
-
:param loadbalancer: ID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
57
|
-
:param name: The name of the backend must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
58
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
59
|
-
:param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
60
|
-
:param resolver_name: Domain Name Resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
56
|
+
:param loadbalancer: ID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#loadbalancer LoadbalancerBackend#loadbalancer}
|
|
57
|
+
:param name: The name of the backend must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#name LoadbalancerBackend#name}
|
|
58
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#id LoadbalancerBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
59
|
+
:param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#properties LoadbalancerBackend#properties}
|
|
60
|
+
:param resolver_name: Domain Name Resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
|
|
61
61
|
:param connection:
|
|
62
62
|
:param count:
|
|
63
63
|
:param depends_on:
|
|
@@ -100,7 +100,7 @@ class LoadbalancerBackend(
|
|
|
100
100
|
|
|
101
101
|
:param scope: The scope in which to define this construct.
|
|
102
102
|
:param import_to_id: The construct id used in the generated config for the LoadbalancerBackend to import.
|
|
103
|
-
:param import_from_id: The id of the existing LoadbalancerBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
103
|
+
:param import_from_id: The id of the existing LoadbalancerBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#import import section} in the documentation of this resource for the id to use
|
|
104
104
|
:param provider: ? Optional instance of the provider where the LoadbalancerBackend to import is found.
|
|
105
105
|
'''
|
|
106
106
|
if __debug__:
|
|
@@ -132,21 +132,21 @@ class LoadbalancerBackend(
|
|
|
132
132
|
tls_verify: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
133
133
|
) -> None:
|
|
134
134
|
'''
|
|
135
|
-
:param health_check_expected_status: Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
136
|
-
:param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
137
|
-
:param health_check_interval: Interval between health checks. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
138
|
-
:param health_check_rise: Sets how many passing checks there must be before returning the backend member to the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
139
|
-
:param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
140
|
-
:param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
141
|
-
:param health_check_url: Target path for health check HTTP GET requests. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
142
|
-
:param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
143
|
-
:param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
144
|
-
:param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
145
|
-
:param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
146
|
-
:param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
147
|
-
:param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
148
|
-
:param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
149
|
-
:param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
135
|
+
:param health_check_expected_status: Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#health_check_expected_status LoadbalancerBackend#health_check_expected_status}
|
|
136
|
+
:param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#health_check_fall LoadbalancerBackend#health_check_fall}
|
|
137
|
+
:param health_check_interval: Interval between health checks. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#health_check_interval LoadbalancerBackend#health_check_interval}
|
|
138
|
+
:param health_check_rise: Sets how many passing checks there must be before returning the backend member to the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#health_check_rise LoadbalancerBackend#health_check_rise}
|
|
139
|
+
:param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#health_check_tls_verify LoadbalancerBackend#health_check_tls_verify}
|
|
140
|
+
:param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#health_check_type LoadbalancerBackend#health_check_type}
|
|
141
|
+
:param health_check_url: Target path for health check HTTP GET requests. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#health_check_url LoadbalancerBackend#health_check_url}
|
|
142
|
+
:param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#http2_enabled LoadbalancerBackend#http2_enabled}
|
|
143
|
+
:param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#outbound_proxy_protocol LoadbalancerBackend#outbound_proxy_protocol}
|
|
144
|
+
:param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#sticky_session_cookie_name LoadbalancerBackend#sticky_session_cookie_name}
|
|
145
|
+
:param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#timeout_server LoadbalancerBackend#timeout_server}
|
|
146
|
+
:param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#timeout_tunnel LoadbalancerBackend#timeout_tunnel}
|
|
147
|
+
:param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#tls_enabled LoadbalancerBackend#tls_enabled}
|
|
148
|
+
:param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#tls_use_system_ca LoadbalancerBackend#tls_use_system_ca}
|
|
149
|
+
:param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#tls_verify LoadbalancerBackend#tls_verify}
|
|
150
150
|
'''
|
|
151
151
|
value = LoadbalancerBackendProperties(
|
|
152
152
|
health_check_expected_status=health_check_expected_status,
|
|
@@ -243,7 +243,7 @@ class LoadbalancerBackend(
|
|
|
243
243
|
if __debug__:
|
|
244
244
|
type_hints = typing.get_type_hints(_typecheckingstub__c835523790ac551a02697db72f5840bcd0c25216cf3e02860635676f92dfc234)
|
|
245
245
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
246
|
-
jsii.set(self, "id", value)
|
|
246
|
+
jsii.set(self, "id", value) # pyright: ignore[reportArgumentType]
|
|
247
247
|
|
|
248
248
|
@builtins.property
|
|
249
249
|
@jsii.member(jsii_name="loadbalancer")
|
|
@@ -255,7 +255,7 @@ class LoadbalancerBackend(
|
|
|
255
255
|
if __debug__:
|
|
256
256
|
type_hints = typing.get_type_hints(_typecheckingstub__758a0ce0d7c7b27aef039a1ababb5170b2dcdca319a675ca5481e137f044e6e5)
|
|
257
257
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
258
|
-
jsii.set(self, "loadbalancer", value)
|
|
258
|
+
jsii.set(self, "loadbalancer", value) # pyright: ignore[reportArgumentType]
|
|
259
259
|
|
|
260
260
|
@builtins.property
|
|
261
261
|
@jsii.member(jsii_name="name")
|
|
@@ -267,7 +267,7 @@ class LoadbalancerBackend(
|
|
|
267
267
|
if __debug__:
|
|
268
268
|
type_hints = typing.get_type_hints(_typecheckingstub__de7b9fba80a9bd9724064ce7ebd66895bd34dfa89b05268124ea8a52d91572a5)
|
|
269
269
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
270
|
-
jsii.set(self, "name", value)
|
|
270
|
+
jsii.set(self, "name", value) # pyright: ignore[reportArgumentType]
|
|
271
271
|
|
|
272
272
|
@builtins.property
|
|
273
273
|
@jsii.member(jsii_name="resolverName")
|
|
@@ -279,7 +279,7 @@ class LoadbalancerBackend(
|
|
|
279
279
|
if __debug__:
|
|
280
280
|
type_hints = typing.get_type_hints(_typecheckingstub__8d83b8ad74717dbbf2ec7a84d12d1c3f9b89191c4cd0c797584da512a2560f3b)
|
|
281
281
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
282
|
-
jsii.set(self, "resolverName", value)
|
|
282
|
+
jsii.set(self, "resolverName", value) # pyright: ignore[reportArgumentType]
|
|
283
283
|
|
|
284
284
|
|
|
285
285
|
@jsii.data_type(
|
|
@@ -325,11 +325,11 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
325
325
|
:param lifecycle:
|
|
326
326
|
:param provider:
|
|
327
327
|
:param provisioners:
|
|
328
|
-
:param loadbalancer: ID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
329
|
-
:param name: The name of the backend must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
330
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
331
|
-
:param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
332
|
-
:param resolver_name: Domain Name Resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
328
|
+
:param loadbalancer: ID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#loadbalancer LoadbalancerBackend#loadbalancer}
|
|
329
|
+
:param name: The name of the backend must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#name LoadbalancerBackend#name}
|
|
330
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#id LoadbalancerBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
331
|
+
:param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#properties LoadbalancerBackend#properties}
|
|
332
|
+
:param resolver_name: Domain Name Resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
|
|
333
333
|
'''
|
|
334
334
|
if isinstance(lifecycle, dict):
|
|
335
335
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -442,7 +442,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
442
442
|
def loadbalancer(self) -> builtins.str:
|
|
443
443
|
'''ID of the load balancer to which the backend is connected.
|
|
444
444
|
|
|
445
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
445
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#loadbalancer LoadbalancerBackend#loadbalancer}
|
|
446
446
|
'''
|
|
447
447
|
result = self._values.get("loadbalancer")
|
|
448
448
|
assert result is not None, "Required property 'loadbalancer' is missing"
|
|
@@ -452,7 +452,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
452
452
|
def name(self) -> builtins.str:
|
|
453
453
|
'''The name of the backend must be unique within the load balancer service.
|
|
454
454
|
|
|
455
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
455
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#name LoadbalancerBackend#name}
|
|
456
456
|
'''
|
|
457
457
|
result = self._values.get("name")
|
|
458
458
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -460,7 +460,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
460
460
|
|
|
461
461
|
@builtins.property
|
|
462
462
|
def id(self) -> typing.Optional[builtins.str]:
|
|
463
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
463
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#id LoadbalancerBackend#id}.
|
|
464
464
|
|
|
465
465
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
466
466
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -472,7 +472,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
472
472
|
def properties(self) -> typing.Optional["LoadbalancerBackendProperties"]:
|
|
473
473
|
'''properties block.
|
|
474
474
|
|
|
475
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
475
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#properties LoadbalancerBackend#properties}
|
|
476
476
|
'''
|
|
477
477
|
result = self._values.get("properties")
|
|
478
478
|
return typing.cast(typing.Optional["LoadbalancerBackendProperties"], result)
|
|
@@ -481,7 +481,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
481
481
|
def resolver_name(self) -> typing.Optional[builtins.str]:
|
|
482
482
|
'''Domain Name Resolver used with dynamic type members.
|
|
483
483
|
|
|
484
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
484
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
|
|
485
485
|
'''
|
|
486
486
|
result = self._values.get("resolver_name")
|
|
487
487
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -540,21 +540,21 @@ class LoadbalancerBackendProperties:
|
|
|
540
540
|
tls_verify: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
541
541
|
) -> None:
|
|
542
542
|
'''
|
|
543
|
-
:param health_check_expected_status: Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
544
|
-
:param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
545
|
-
:param health_check_interval: Interval between health checks. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
546
|
-
:param health_check_rise: Sets how many passing checks there must be before returning the backend member to the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
547
|
-
:param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
548
|
-
:param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
549
|
-
:param health_check_url: Target path for health check HTTP GET requests. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
550
|
-
:param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
551
|
-
:param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
552
|
-
:param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
553
|
-
:param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
554
|
-
:param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
555
|
-
:param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
556
|
-
:param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
557
|
-
:param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
543
|
+
:param health_check_expected_status: Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#health_check_expected_status LoadbalancerBackend#health_check_expected_status}
|
|
544
|
+
:param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#health_check_fall LoadbalancerBackend#health_check_fall}
|
|
545
|
+
:param health_check_interval: Interval between health checks. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#health_check_interval LoadbalancerBackend#health_check_interval}
|
|
546
|
+
:param health_check_rise: Sets how many passing checks there must be before returning the backend member to the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#health_check_rise LoadbalancerBackend#health_check_rise}
|
|
547
|
+
:param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#health_check_tls_verify LoadbalancerBackend#health_check_tls_verify}
|
|
548
|
+
:param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#health_check_type LoadbalancerBackend#health_check_type}
|
|
549
|
+
:param health_check_url: Target path for health check HTTP GET requests. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#health_check_url LoadbalancerBackend#health_check_url}
|
|
550
|
+
:param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#http2_enabled LoadbalancerBackend#http2_enabled}
|
|
551
|
+
:param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#outbound_proxy_protocol LoadbalancerBackend#outbound_proxy_protocol}
|
|
552
|
+
:param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#sticky_session_cookie_name LoadbalancerBackend#sticky_session_cookie_name}
|
|
553
|
+
:param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#timeout_server LoadbalancerBackend#timeout_server}
|
|
554
|
+
:param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#timeout_tunnel LoadbalancerBackend#timeout_tunnel}
|
|
555
|
+
:param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#tls_enabled LoadbalancerBackend#tls_enabled}
|
|
556
|
+
:param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#tls_use_system_ca LoadbalancerBackend#tls_use_system_ca}
|
|
557
|
+
:param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#tls_verify LoadbalancerBackend#tls_verify}
|
|
558
558
|
'''
|
|
559
559
|
if __debug__:
|
|
560
560
|
type_hints = typing.get_type_hints(_typecheckingstub__eb5988403ea7b17ea78d8a97176e2db70e4258ead0d52fc7ab7102412ecccf40)
|
|
@@ -609,7 +609,7 @@ class LoadbalancerBackendProperties:
|
|
|
609
609
|
def health_check_expected_status(self) -> typing.Optional[jsii.Number]:
|
|
610
610
|
'''Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type.
|
|
611
611
|
|
|
612
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
612
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#health_check_expected_status LoadbalancerBackend#health_check_expected_status}
|
|
613
613
|
'''
|
|
614
614
|
result = self._values.get("health_check_expected_status")
|
|
615
615
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -618,7 +618,7 @@ class LoadbalancerBackendProperties:
|
|
|
618
618
|
def health_check_fall(self) -> typing.Optional[jsii.Number]:
|
|
619
619
|
'''Sets how many failed health checks are allowed until the backend member is taken off from the rotation.
|
|
620
620
|
|
|
621
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
621
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#health_check_fall LoadbalancerBackend#health_check_fall}
|
|
622
622
|
'''
|
|
623
623
|
result = self._values.get("health_check_fall")
|
|
624
624
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -627,7 +627,7 @@ class LoadbalancerBackendProperties:
|
|
|
627
627
|
def health_check_interval(self) -> typing.Optional[jsii.Number]:
|
|
628
628
|
'''Interval between health checks.
|
|
629
629
|
|
|
630
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
630
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#health_check_interval LoadbalancerBackend#health_check_interval}
|
|
631
631
|
'''
|
|
632
632
|
result = self._values.get("health_check_interval")
|
|
633
633
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -636,7 +636,7 @@ class LoadbalancerBackendProperties:
|
|
|
636
636
|
def health_check_rise(self) -> typing.Optional[jsii.Number]:
|
|
637
637
|
'''Sets how many passing checks there must be before returning the backend member to the rotation.
|
|
638
638
|
|
|
639
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
639
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#health_check_rise LoadbalancerBackend#health_check_rise}
|
|
640
640
|
'''
|
|
641
641
|
result = self._values.get("health_check_rise")
|
|
642
642
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -647,7 +647,7 @@ class LoadbalancerBackendProperties:
|
|
|
647
647
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
648
648
|
'''Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored.
|
|
649
649
|
|
|
650
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
650
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#health_check_tls_verify LoadbalancerBackend#health_check_tls_verify}
|
|
651
651
|
'''
|
|
652
652
|
result = self._values.get("health_check_tls_verify")
|
|
653
653
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -656,7 +656,7 @@ class LoadbalancerBackendProperties:
|
|
|
656
656
|
def health_check_type(self) -> typing.Optional[builtins.str]:
|
|
657
657
|
'''Health check type.
|
|
658
658
|
|
|
659
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
659
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#health_check_type LoadbalancerBackend#health_check_type}
|
|
660
660
|
'''
|
|
661
661
|
result = self._values.get("health_check_type")
|
|
662
662
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -665,7 +665,7 @@ class LoadbalancerBackendProperties:
|
|
|
665
665
|
def health_check_url(self) -> typing.Optional[builtins.str]:
|
|
666
666
|
'''Target path for health check HTTP GET requests. Ignored for tcp type.
|
|
667
667
|
|
|
668
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
668
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#health_check_url LoadbalancerBackend#health_check_url}
|
|
669
669
|
'''
|
|
670
670
|
result = self._values.get("health_check_url")
|
|
671
671
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -678,7 +678,7 @@ class LoadbalancerBackendProperties:
|
|
|
678
678
|
|
|
679
679
|
Note: members should support HTTP/2 for this setting to work.
|
|
680
680
|
|
|
681
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
681
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#http2_enabled LoadbalancerBackend#http2_enabled}
|
|
682
682
|
'''
|
|
683
683
|
result = self._values.get("http2_enabled")
|
|
684
684
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -687,7 +687,7 @@ class LoadbalancerBackendProperties:
|
|
|
687
687
|
def outbound_proxy_protocol(self) -> typing.Optional[builtins.str]:
|
|
688
688
|
'''Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol.
|
|
689
689
|
|
|
690
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
690
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#outbound_proxy_protocol LoadbalancerBackend#outbound_proxy_protocol}
|
|
691
691
|
'''
|
|
692
692
|
result = self._values.get("outbound_proxy_protocol")
|
|
693
693
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -696,7 +696,7 @@ class LoadbalancerBackendProperties:
|
|
|
696
696
|
def sticky_session_cookie_name(self) -> typing.Optional[builtins.str]:
|
|
697
697
|
'''Sets sticky session cookie name. Empty string disables sticky session.
|
|
698
698
|
|
|
699
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
699
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#sticky_session_cookie_name LoadbalancerBackend#sticky_session_cookie_name}
|
|
700
700
|
'''
|
|
701
701
|
result = self._values.get("sticky_session_cookie_name")
|
|
702
702
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -705,7 +705,7 @@ class LoadbalancerBackendProperties:
|
|
|
705
705
|
def timeout_server(self) -> typing.Optional[jsii.Number]:
|
|
706
706
|
'''Backend server timeout in seconds.
|
|
707
707
|
|
|
708
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
708
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#timeout_server LoadbalancerBackend#timeout_server}
|
|
709
709
|
'''
|
|
710
710
|
result = self._values.get("timeout_server")
|
|
711
711
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -714,7 +714,7 @@ class LoadbalancerBackendProperties:
|
|
|
714
714
|
def timeout_tunnel(self) -> typing.Optional[jsii.Number]:
|
|
715
715
|
'''Maximum inactivity time on the client and server side for tunnels in seconds.
|
|
716
716
|
|
|
717
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
717
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#timeout_tunnel LoadbalancerBackend#timeout_tunnel}
|
|
718
718
|
'''
|
|
719
719
|
result = self._values.get("timeout_tunnel")
|
|
720
720
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -725,7 +725,7 @@ class LoadbalancerBackendProperties:
|
|
|
725
725
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
726
726
|
'''Enables TLS connection from the load balancer to backend servers.
|
|
727
727
|
|
|
728
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
728
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#tls_enabled LoadbalancerBackend#tls_enabled}
|
|
729
729
|
'''
|
|
730
730
|
result = self._values.get("tls_enabled")
|
|
731
731
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -736,7 +736,7 @@ class LoadbalancerBackendProperties:
|
|
|
736
736
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
737
737
|
'''If enabled, then the system CA certificate bundle will be used for the certificate verification.
|
|
738
738
|
|
|
739
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
739
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#tls_use_system_ca LoadbalancerBackend#tls_use_system_ca}
|
|
740
740
|
'''
|
|
741
741
|
result = self._values.get("tls_use_system_ca")
|
|
742
742
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -749,7 +749,7 @@ class LoadbalancerBackendProperties:
|
|
|
749
749
|
|
|
750
750
|
Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true.
|
|
751
751
|
|
|
752
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
752
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/loadbalancer_backend#tls_verify LoadbalancerBackend#tls_verify}
|
|
753
753
|
'''
|
|
754
754
|
result = self._values.get("tls_verify")
|
|
755
755
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -946,7 +946,7 @@ class LoadbalancerBackendPropertiesOutputReference(
|
|
|
946
946
|
if __debug__:
|
|
947
947
|
type_hints = typing.get_type_hints(_typecheckingstub__7dc3f08a62f7f1c1d999cf41443e8d00ab201864398241c00de9cc77da1c2342)
|
|
948
948
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
949
|
-
jsii.set(self, "healthCheckExpectedStatus", value)
|
|
949
|
+
jsii.set(self, "healthCheckExpectedStatus", value) # pyright: ignore[reportArgumentType]
|
|
950
950
|
|
|
951
951
|
@builtins.property
|
|
952
952
|
@jsii.member(jsii_name="healthCheckFall")
|
|
@@ -958,7 +958,7 @@ class LoadbalancerBackendPropertiesOutputReference(
|
|
|
958
958
|
if __debug__:
|
|
959
959
|
type_hints = typing.get_type_hints(_typecheckingstub__8a74c22cd3b86c3c486e323569b855be74e55b4f1661df85a24cd150f9700581)
|
|
960
960
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
961
|
-
jsii.set(self, "healthCheckFall", value)
|
|
961
|
+
jsii.set(self, "healthCheckFall", value) # pyright: ignore[reportArgumentType]
|
|
962
962
|
|
|
963
963
|
@builtins.property
|
|
964
964
|
@jsii.member(jsii_name="healthCheckInterval")
|
|
@@ -970,7 +970,7 @@ class LoadbalancerBackendPropertiesOutputReference(
|
|
|
970
970
|
if __debug__:
|
|
971
971
|
type_hints = typing.get_type_hints(_typecheckingstub__bc4a5fcdf1d72f3f8e196e0b9fe2c716f66386010cf2bcefe94884b091dd1099)
|
|
972
972
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
973
|
-
jsii.set(self, "healthCheckInterval", value)
|
|
973
|
+
jsii.set(self, "healthCheckInterval", value) # pyright: ignore[reportArgumentType]
|
|
974
974
|
|
|
975
975
|
@builtins.property
|
|
976
976
|
@jsii.member(jsii_name="healthCheckRise")
|
|
@@ -982,7 +982,7 @@ class LoadbalancerBackendPropertiesOutputReference(
|
|
|
982
982
|
if __debug__:
|
|
983
983
|
type_hints = typing.get_type_hints(_typecheckingstub__5a005b6a89678311ae87bf7a8226f1b8b8341f6f7dbe94f53264244eec7b1941)
|
|
984
984
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
985
|
-
jsii.set(self, "healthCheckRise", value)
|
|
985
|
+
jsii.set(self, "healthCheckRise", value) # pyright: ignore[reportArgumentType]
|
|
986
986
|
|
|
987
987
|
@builtins.property
|
|
988
988
|
@jsii.member(jsii_name="healthCheckTlsVerify")
|
|
@@ -999,7 +999,7 @@ class LoadbalancerBackendPropertiesOutputReference(
|
|
|
999
999
|
if __debug__:
|
|
1000
1000
|
type_hints = typing.get_type_hints(_typecheckingstub__7a1f0408301a8ed0464e766b76ea9c173a85a6c5972f17c867955e8f12d24892)
|
|
1001
1001
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1002
|
-
jsii.set(self, "healthCheckTlsVerify", value)
|
|
1002
|
+
jsii.set(self, "healthCheckTlsVerify", value) # pyright: ignore[reportArgumentType]
|
|
1003
1003
|
|
|
1004
1004
|
@builtins.property
|
|
1005
1005
|
@jsii.member(jsii_name="healthCheckType")
|
|
@@ -1011,7 +1011,7 @@ class LoadbalancerBackendPropertiesOutputReference(
|
|
|
1011
1011
|
if __debug__:
|
|
1012
1012
|
type_hints = typing.get_type_hints(_typecheckingstub__8069e619c5eafcd61405a9b14ccbb5acc557f594802c36aa8bfd7d0fd8ff0219)
|
|
1013
1013
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1014
|
-
jsii.set(self, "healthCheckType", value)
|
|
1014
|
+
jsii.set(self, "healthCheckType", value) # pyright: ignore[reportArgumentType]
|
|
1015
1015
|
|
|
1016
1016
|
@builtins.property
|
|
1017
1017
|
@jsii.member(jsii_name="healthCheckUrl")
|
|
@@ -1023,7 +1023,7 @@ class LoadbalancerBackendPropertiesOutputReference(
|
|
|
1023
1023
|
if __debug__:
|
|
1024
1024
|
type_hints = typing.get_type_hints(_typecheckingstub__39f4a5b6a60297078707410bf16c529278fa67e401d14af087347f4acdc4f238)
|
|
1025
1025
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1026
|
-
jsii.set(self, "healthCheckUrl", value)
|
|
1026
|
+
jsii.set(self, "healthCheckUrl", value) # pyright: ignore[reportArgumentType]
|
|
1027
1027
|
|
|
1028
1028
|
@builtins.property
|
|
1029
1029
|
@jsii.member(jsii_name="http2Enabled")
|
|
@@ -1038,7 +1038,7 @@ class LoadbalancerBackendPropertiesOutputReference(
|
|
|
1038
1038
|
if __debug__:
|
|
1039
1039
|
type_hints = typing.get_type_hints(_typecheckingstub__c0ed74c710cac92ea40127eb8683ef34d63adf6cf079484e9ba4e70ae1d9c121)
|
|
1040
1040
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1041
|
-
jsii.set(self, "http2Enabled", value)
|
|
1041
|
+
jsii.set(self, "http2Enabled", value) # pyright: ignore[reportArgumentType]
|
|
1042
1042
|
|
|
1043
1043
|
@builtins.property
|
|
1044
1044
|
@jsii.member(jsii_name="outboundProxyProtocol")
|
|
@@ -1050,7 +1050,7 @@ class LoadbalancerBackendPropertiesOutputReference(
|
|
|
1050
1050
|
if __debug__:
|
|
1051
1051
|
type_hints = typing.get_type_hints(_typecheckingstub__643632d762dde3bfa52ccccc383516eae69f64de4c971e85aaa719e291c1c0fa)
|
|
1052
1052
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1053
|
-
jsii.set(self, "outboundProxyProtocol", value)
|
|
1053
|
+
jsii.set(self, "outboundProxyProtocol", value) # pyright: ignore[reportArgumentType]
|
|
1054
1054
|
|
|
1055
1055
|
@builtins.property
|
|
1056
1056
|
@jsii.member(jsii_name="stickySessionCookieName")
|
|
@@ -1062,7 +1062,7 @@ class LoadbalancerBackendPropertiesOutputReference(
|
|
|
1062
1062
|
if __debug__:
|
|
1063
1063
|
type_hints = typing.get_type_hints(_typecheckingstub__da3ab1d8ffd0ee740d498a68367ab415a83ea5bb95a96b7bca9efb4ce8d99490)
|
|
1064
1064
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1065
|
-
jsii.set(self, "stickySessionCookieName", value)
|
|
1065
|
+
jsii.set(self, "stickySessionCookieName", value) # pyright: ignore[reportArgumentType]
|
|
1066
1066
|
|
|
1067
1067
|
@builtins.property
|
|
1068
1068
|
@jsii.member(jsii_name="timeoutServer")
|
|
@@ -1074,7 +1074,7 @@ class LoadbalancerBackendPropertiesOutputReference(
|
|
|
1074
1074
|
if __debug__:
|
|
1075
1075
|
type_hints = typing.get_type_hints(_typecheckingstub__62977787f77a98958c7b1c163fc10ef2d04d5473932b93993b385e7a7f4725a2)
|
|
1076
1076
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1077
|
-
jsii.set(self, "timeoutServer", value)
|
|
1077
|
+
jsii.set(self, "timeoutServer", value) # pyright: ignore[reportArgumentType]
|
|
1078
1078
|
|
|
1079
1079
|
@builtins.property
|
|
1080
1080
|
@jsii.member(jsii_name="timeoutTunnel")
|
|
@@ -1086,7 +1086,7 @@ class LoadbalancerBackendPropertiesOutputReference(
|
|
|
1086
1086
|
if __debug__:
|
|
1087
1087
|
type_hints = typing.get_type_hints(_typecheckingstub__cd7554673f8db1f54b33f3b8832599eb58807a0023a40109ca959f715cf36c9b)
|
|
1088
1088
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1089
|
-
jsii.set(self, "timeoutTunnel", value)
|
|
1089
|
+
jsii.set(self, "timeoutTunnel", value) # pyright: ignore[reportArgumentType]
|
|
1090
1090
|
|
|
1091
1091
|
@builtins.property
|
|
1092
1092
|
@jsii.member(jsii_name="tlsEnabled")
|
|
@@ -1101,7 +1101,7 @@ class LoadbalancerBackendPropertiesOutputReference(
|
|
|
1101
1101
|
if __debug__:
|
|
1102
1102
|
type_hints = typing.get_type_hints(_typecheckingstub__a3971da5b5c90f1fd23ac2242c668f5d56a0071530ac27f4ec552f8ec4ce9ee2)
|
|
1103
1103
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1104
|
-
jsii.set(self, "tlsEnabled", value)
|
|
1104
|
+
jsii.set(self, "tlsEnabled", value) # pyright: ignore[reportArgumentType]
|
|
1105
1105
|
|
|
1106
1106
|
@builtins.property
|
|
1107
1107
|
@jsii.member(jsii_name="tlsUseSystemCa")
|
|
@@ -1118,7 +1118,7 @@ class LoadbalancerBackendPropertiesOutputReference(
|
|
|
1118
1118
|
if __debug__:
|
|
1119
1119
|
type_hints = typing.get_type_hints(_typecheckingstub__97f6e28d7e94f7b38cfe76b70291b8c0170c52b48c78b10dc8f76b4703c093e9)
|
|
1120
1120
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1121
|
-
jsii.set(self, "tlsUseSystemCa", value)
|
|
1121
|
+
jsii.set(self, "tlsUseSystemCa", value) # pyright: ignore[reportArgumentType]
|
|
1122
1122
|
|
|
1123
1123
|
@builtins.property
|
|
1124
1124
|
@jsii.member(jsii_name="tlsVerify")
|
|
@@ -1133,7 +1133,7 @@ class LoadbalancerBackendPropertiesOutputReference(
|
|
|
1133
1133
|
if __debug__:
|
|
1134
1134
|
type_hints = typing.get_type_hints(_typecheckingstub__0d060a9595c4cfc7ea56c1c33bf629d6166ba1a8b052484fd102442b53a67224)
|
|
1135
1135
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1136
|
-
jsii.set(self, "tlsVerify", value)
|
|
1136
|
+
jsii.set(self, "tlsVerify", value) # pyright: ignore[reportArgumentType]
|
|
1137
1137
|
|
|
1138
1138
|
@builtins.property
|
|
1139
1139
|
@jsii.member(jsii_name="internalValue")
|
|
@@ -1148,7 +1148,7 @@ class LoadbalancerBackendPropertiesOutputReference(
|
|
|
1148
1148
|
if __debug__:
|
|
1149
1149
|
type_hints = typing.get_type_hints(_typecheckingstub__c8c6fb57a71c2e0e202ceab15eb8b409d80557a71150004a0caaf083b5bb1cb5)
|
|
1150
1150
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1151
|
-
jsii.set(self, "internalValue", value)
|
|
1151
|
+
jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
|
|
1152
1152
|
|
|
1153
1153
|
|
|
1154
1154
|
__all__ = [
|