cdktf-cdktf-provider-upcloud 14.9.0__py3-none-any.whl → 14.9.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +3 -3
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.9.1.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +8 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +44 -44
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +8 -8
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +62 -62
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +52 -52
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +54 -54
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +80 -80
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +40 -40
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +95 -95
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +72 -72
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +84 -84
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +36 -36
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +52 -52
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +351 -351
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +24 -24
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +40 -40
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +36 -36
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +24 -24
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +314 -268
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +464 -464
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +510 -416
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +218 -172
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +70 -70
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +48 -48
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +24 -24
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/network/__init__.py +49 -49
- cdktf_cdktf_provider_upcloud/network_peering/__init__.py +38 -38
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +43 -43
- cdktf_cdktf_provider_upcloud/provider/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/router/__init__.py +33 -33
- cdktf_cdktf_provider_upcloud/server/__init__.py +219 -219
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +24 -24
- cdktf_cdktf_provider_upcloud/storage/__init__.py +76 -76
- cdktf_cdktf_provider_upcloud/tag/__init__.py +20 -20
- {cdktf_cdktf_provider_upcloud-14.9.0.dist-info → cdktf_cdktf_provider_upcloud-14.9.1.dist-info}/METADATA +9 -9
- cdktf_cdktf_provider_upcloud-14.9.1.dist-info/RECORD +61 -0
- {cdktf_cdktf_provider_upcloud-14.9.0.dist-info → cdktf_cdktf_provider_upcloud-14.9.1.dist-info}/WHEEL +1 -1
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.9.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-14.9.0.dist-info/RECORD +0 -61
- {cdktf_cdktf_provider_upcloud-14.9.0.dist-info → cdktf_cdktf_provider_upcloud-14.9.1.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-14.9.0.dist-info → cdktf_cdktf_provider_upcloud-14.9.1.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_managed_database_user`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_managed_database_user`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_managed_database_user`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -29,7 +29,7 @@ class ManagedDatabaseUser(
|
|
|
29
29
|
metaclass=jsii.JSIIMeta,
|
|
30
30
|
jsii_type="@cdktf/provider-upcloud.managedDatabaseUser.ManagedDatabaseUser",
|
|
31
31
|
):
|
|
32
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
32
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user upcloud_managed_database_user}.'''
|
|
33
33
|
|
|
34
34
|
def __init__(
|
|
35
35
|
self,
|
|
@@ -52,18 +52,18 @@ class ManagedDatabaseUser(
|
|
|
52
52
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
53
53
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
54
54
|
) -> None:
|
|
55
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
55
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user upcloud_managed_database_user} Resource.
|
|
56
56
|
|
|
57
57
|
:param scope: The scope in which to define this construct.
|
|
58
58
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
59
|
-
:param service: Service's UUID for which this user belongs to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
60
|
-
:param username: Name of the database user. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
61
|
-
:param authentication: MySQL only, authentication type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
62
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
63
|
-
:param opensearch_access_control: opensearch_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
64
|
-
:param password: Password for the database user. Defaults to a random value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
65
|
-
:param pg_access_control: pg_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
66
|
-
:param redis_access_control: redis_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
59
|
+
:param service: Service's UUID for which this user belongs to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#service ManagedDatabaseUser#service}
|
|
60
|
+
:param username: Name of the database user. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#username ManagedDatabaseUser#username}
|
|
61
|
+
:param authentication: MySQL only, authentication type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#authentication ManagedDatabaseUser#authentication}
|
|
62
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#id ManagedDatabaseUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
63
|
+
:param opensearch_access_control: opensearch_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#opensearch_access_control ManagedDatabaseUser#opensearch_access_control}
|
|
64
|
+
:param password: Password for the database user. Defaults to a random value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#password ManagedDatabaseUser#password}
|
|
65
|
+
:param pg_access_control: pg_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#pg_access_control ManagedDatabaseUser#pg_access_control}
|
|
66
|
+
:param redis_access_control: redis_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#redis_access_control ManagedDatabaseUser#redis_access_control}
|
|
67
67
|
:param connection:
|
|
68
68
|
:param count:
|
|
69
69
|
:param depends_on:
|
|
@@ -109,7 +109,7 @@ class ManagedDatabaseUser(
|
|
|
109
109
|
|
|
110
110
|
:param scope: The scope in which to define this construct.
|
|
111
111
|
:param import_to_id: The construct id used in the generated config for the ManagedDatabaseUser to import.
|
|
112
|
-
:param import_from_id: The id of the existing ManagedDatabaseUser that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
112
|
+
:param import_from_id: The id of the existing ManagedDatabaseUser that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#import import section} in the documentation of this resource for the id to use
|
|
113
113
|
:param provider: ? Optional instance of the provider where the ManagedDatabaseUser to import is found.
|
|
114
114
|
'''
|
|
115
115
|
if __debug__:
|
|
@@ -127,7 +127,7 @@ class ManagedDatabaseUser(
|
|
|
127
127
|
rules: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["ManagedDatabaseUserOpensearchAccessControlRules", typing.Dict[builtins.str, typing.Any]]]],
|
|
128
128
|
) -> None:
|
|
129
129
|
'''
|
|
130
|
-
:param rules: rules block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
130
|
+
:param rules: rules block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#rules ManagedDatabaseUser#rules}
|
|
131
131
|
'''
|
|
132
132
|
value = ManagedDatabaseUserOpensearchAccessControl(rules=rules)
|
|
133
133
|
|
|
@@ -140,7 +140,7 @@ class ManagedDatabaseUser(
|
|
|
140
140
|
allow_replication: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
141
141
|
) -> None:
|
|
142
142
|
'''
|
|
143
|
-
:param allow_replication: Grant replication privilege. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
143
|
+
:param allow_replication: Grant replication privilege. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#allow_replication ManagedDatabaseUser#allow_replication}
|
|
144
144
|
'''
|
|
145
145
|
value = ManagedDatabaseUserPgAccessControl(allow_replication=allow_replication)
|
|
146
146
|
|
|
@@ -156,10 +156,10 @@ class ManagedDatabaseUser(
|
|
|
156
156
|
keys: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
157
157
|
) -> None:
|
|
158
158
|
'''
|
|
159
|
-
:param categories: Set access control to all commands in specified categories. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
160
|
-
:param channels: Set access control to Pub/Sub channels. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
161
|
-
:param commands: Set access control to commands. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
162
|
-
:param keys: Set access control to keys. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
159
|
+
:param categories: Set access control to all commands in specified categories. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
|
|
160
|
+
:param channels: Set access control to Pub/Sub channels. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
|
|
161
|
+
:param commands: Set access control to commands. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
|
|
162
|
+
:param keys: Set access control to keys. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
|
|
163
163
|
'''
|
|
164
164
|
value = ManagedDatabaseUserRedisAccessControl(
|
|
165
165
|
categories=categories, channels=channels, commands=commands, keys=keys
|
|
@@ -284,7 +284,7 @@ class ManagedDatabaseUser(
|
|
|
284
284
|
if __debug__:
|
|
285
285
|
type_hints = typing.get_type_hints(_typecheckingstub__b59524d6ec28e1e91e2660a7a825733751c8f6ccf1b6b7ace9eacc505d796901)
|
|
286
286
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
287
|
-
jsii.set(self, "authentication", value)
|
|
287
|
+
jsii.set(self, "authentication", value) # pyright: ignore[reportArgumentType]
|
|
288
288
|
|
|
289
289
|
@builtins.property
|
|
290
290
|
@jsii.member(jsii_name="id")
|
|
@@ -296,7 +296,7 @@ class ManagedDatabaseUser(
|
|
|
296
296
|
if __debug__:
|
|
297
297
|
type_hints = typing.get_type_hints(_typecheckingstub__279d5d1ce136b75e6c2fe00e42d73f303c19db8b2a872db680552e387797902c)
|
|
298
298
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
299
|
-
jsii.set(self, "id", value)
|
|
299
|
+
jsii.set(self, "id", value) # pyright: ignore[reportArgumentType]
|
|
300
300
|
|
|
301
301
|
@builtins.property
|
|
302
302
|
@jsii.member(jsii_name="password")
|
|
@@ -308,7 +308,7 @@ class ManagedDatabaseUser(
|
|
|
308
308
|
if __debug__:
|
|
309
309
|
type_hints = typing.get_type_hints(_typecheckingstub__e0bc67b2dd690e0235e63664dc77e9295886fea48c10eba2f30b039f0b5f455b)
|
|
310
310
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
311
|
-
jsii.set(self, "password", value)
|
|
311
|
+
jsii.set(self, "password", value) # pyright: ignore[reportArgumentType]
|
|
312
312
|
|
|
313
313
|
@builtins.property
|
|
314
314
|
@jsii.member(jsii_name="service")
|
|
@@ -320,7 +320,7 @@ class ManagedDatabaseUser(
|
|
|
320
320
|
if __debug__:
|
|
321
321
|
type_hints = typing.get_type_hints(_typecheckingstub__cb1244dc41c138e20749cc2e50d2739b25a0c3a573a7655784fe3a48e8b7c2a4)
|
|
322
322
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
323
|
-
jsii.set(self, "service", value)
|
|
323
|
+
jsii.set(self, "service", value) # pyright: ignore[reportArgumentType]
|
|
324
324
|
|
|
325
325
|
@builtins.property
|
|
326
326
|
@jsii.member(jsii_name="username")
|
|
@@ -332,7 +332,7 @@ class ManagedDatabaseUser(
|
|
|
332
332
|
if __debug__:
|
|
333
333
|
type_hints = typing.get_type_hints(_typecheckingstub__9047a597e672fcf3a034119577335b53b918a8ad3b654540e8d13c08a894eeb3)
|
|
334
334
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
335
|
-
jsii.set(self, "username", value)
|
|
335
|
+
jsii.set(self, "username", value) # pyright: ignore[reportArgumentType]
|
|
336
336
|
|
|
337
337
|
|
|
338
338
|
@jsii.data_type(
|
|
@@ -384,14 +384,14 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
384
384
|
:param lifecycle:
|
|
385
385
|
:param provider:
|
|
386
386
|
:param provisioners:
|
|
387
|
-
:param service: Service's UUID for which this user belongs to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
388
|
-
:param username: Name of the database user. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
389
|
-
:param authentication: MySQL only, authentication type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
390
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
391
|
-
:param opensearch_access_control: opensearch_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
392
|
-
:param password: Password for the database user. Defaults to a random value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
393
|
-
:param pg_access_control: pg_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
394
|
-
:param redis_access_control: redis_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
387
|
+
:param service: Service's UUID for which this user belongs to. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#service ManagedDatabaseUser#service}
|
|
388
|
+
:param username: Name of the database user. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#username ManagedDatabaseUser#username}
|
|
389
|
+
:param authentication: MySQL only, authentication type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#authentication ManagedDatabaseUser#authentication}
|
|
390
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#id ManagedDatabaseUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
391
|
+
:param opensearch_access_control: opensearch_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#opensearch_access_control ManagedDatabaseUser#opensearch_access_control}
|
|
392
|
+
:param password: Password for the database user. Defaults to a random value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#password ManagedDatabaseUser#password}
|
|
393
|
+
:param pg_access_control: pg_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#pg_access_control ManagedDatabaseUser#pg_access_control}
|
|
394
|
+
:param redis_access_control: redis_access_control block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#redis_access_control ManagedDatabaseUser#redis_access_control}
|
|
395
395
|
'''
|
|
396
396
|
if isinstance(lifecycle, dict):
|
|
397
397
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -517,7 +517,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
517
517
|
def service(self) -> builtins.str:
|
|
518
518
|
'''Service's UUID for which this user belongs to.
|
|
519
519
|
|
|
520
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
520
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#service ManagedDatabaseUser#service}
|
|
521
521
|
'''
|
|
522
522
|
result = self._values.get("service")
|
|
523
523
|
assert result is not None, "Required property 'service' is missing"
|
|
@@ -527,7 +527,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
527
527
|
def username(self) -> builtins.str:
|
|
528
528
|
'''Name of the database user.
|
|
529
529
|
|
|
530
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
530
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#username ManagedDatabaseUser#username}
|
|
531
531
|
'''
|
|
532
532
|
result = self._values.get("username")
|
|
533
533
|
assert result is not None, "Required property 'username' is missing"
|
|
@@ -537,14 +537,14 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
537
537
|
def authentication(self) -> typing.Optional[builtins.str]:
|
|
538
538
|
'''MySQL only, authentication type.
|
|
539
539
|
|
|
540
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
540
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#authentication ManagedDatabaseUser#authentication}
|
|
541
541
|
'''
|
|
542
542
|
result = self._values.get("authentication")
|
|
543
543
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
544
544
|
|
|
545
545
|
@builtins.property
|
|
546
546
|
def id(self) -> typing.Optional[builtins.str]:
|
|
547
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
547
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#id ManagedDatabaseUser#id}.
|
|
548
548
|
|
|
549
549
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
550
550
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -558,7 +558,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
558
558
|
) -> typing.Optional["ManagedDatabaseUserOpensearchAccessControl"]:
|
|
559
559
|
'''opensearch_access_control block.
|
|
560
560
|
|
|
561
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
561
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#opensearch_access_control ManagedDatabaseUser#opensearch_access_control}
|
|
562
562
|
'''
|
|
563
563
|
result = self._values.get("opensearch_access_control")
|
|
564
564
|
return typing.cast(typing.Optional["ManagedDatabaseUserOpensearchAccessControl"], result)
|
|
@@ -567,7 +567,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
567
567
|
def password(self) -> typing.Optional[builtins.str]:
|
|
568
568
|
'''Password for the database user. Defaults to a random value.
|
|
569
569
|
|
|
570
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
570
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#password ManagedDatabaseUser#password}
|
|
571
571
|
'''
|
|
572
572
|
result = self._values.get("password")
|
|
573
573
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -578,7 +578,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
578
578
|
) -> typing.Optional["ManagedDatabaseUserPgAccessControl"]:
|
|
579
579
|
'''pg_access_control block.
|
|
580
580
|
|
|
581
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
581
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#pg_access_control ManagedDatabaseUser#pg_access_control}
|
|
582
582
|
'''
|
|
583
583
|
result = self._values.get("pg_access_control")
|
|
584
584
|
return typing.cast(typing.Optional["ManagedDatabaseUserPgAccessControl"], result)
|
|
@@ -589,7 +589,7 @@ class ManagedDatabaseUserConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
589
589
|
) -> typing.Optional["ManagedDatabaseUserRedisAccessControl"]:
|
|
590
590
|
'''redis_access_control block.
|
|
591
591
|
|
|
592
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
592
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#redis_access_control ManagedDatabaseUser#redis_access_control}
|
|
593
593
|
'''
|
|
594
594
|
result = self._values.get("redis_access_control")
|
|
595
595
|
return typing.cast(typing.Optional["ManagedDatabaseUserRedisAccessControl"], result)
|
|
@@ -618,7 +618,7 @@ class ManagedDatabaseUserOpensearchAccessControl:
|
|
|
618
618
|
rules: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["ManagedDatabaseUserOpensearchAccessControlRules", typing.Dict[builtins.str, typing.Any]]]],
|
|
619
619
|
) -> None:
|
|
620
620
|
'''
|
|
621
|
-
:param rules: rules block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
621
|
+
:param rules: rules block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#rules ManagedDatabaseUser#rules}
|
|
622
622
|
'''
|
|
623
623
|
if __debug__:
|
|
624
624
|
type_hints = typing.get_type_hints(_typecheckingstub__72db216f4a07b0d61090bf6cee72765d201a2daf9f3d0177b70ceadc0e0b4950)
|
|
@@ -633,7 +633,7 @@ class ManagedDatabaseUserOpensearchAccessControl:
|
|
|
633
633
|
) -> typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["ManagedDatabaseUserOpensearchAccessControlRules"]]:
|
|
634
634
|
'''rules block.
|
|
635
635
|
|
|
636
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
636
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#rules ManagedDatabaseUser#rules}
|
|
637
637
|
'''
|
|
638
638
|
result = self._values.get("rules")
|
|
639
639
|
assert result is not None, "Required property 'rules' is missing"
|
|
@@ -711,7 +711,7 @@ class ManagedDatabaseUserOpensearchAccessControlOutputReference(
|
|
|
711
711
|
if __debug__:
|
|
712
712
|
type_hints = typing.get_type_hints(_typecheckingstub__6f2043b59277b76c0c76f326072fbc42fd640a5568ab1320f7cc8d737f67e3da)
|
|
713
713
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
714
|
-
jsii.set(self, "internalValue", value)
|
|
714
|
+
jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
|
|
715
715
|
|
|
716
716
|
|
|
717
717
|
@jsii.data_type(
|
|
@@ -722,8 +722,8 @@ class ManagedDatabaseUserOpensearchAccessControlOutputReference(
|
|
|
722
722
|
class ManagedDatabaseUserOpensearchAccessControlRules:
|
|
723
723
|
def __init__(self, *, index: builtins.str, permission: builtins.str) -> None:
|
|
724
724
|
'''
|
|
725
|
-
:param index: Set index name, pattern or top level API. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
726
|
-
:param permission: Set permission access. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
725
|
+
:param index: Set index name, pattern or top level API. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#index ManagedDatabaseUser#index}
|
|
726
|
+
:param permission: Set permission access. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#permission ManagedDatabaseUser#permission}
|
|
727
727
|
'''
|
|
728
728
|
if __debug__:
|
|
729
729
|
type_hints = typing.get_type_hints(_typecheckingstub__037bf6ae1cf4ccc5175cd9f327782b4c274be6c4d8dcbbf42b47b3e0d87e86ea)
|
|
@@ -738,7 +738,7 @@ class ManagedDatabaseUserOpensearchAccessControlRules:
|
|
|
738
738
|
def index(self) -> builtins.str:
|
|
739
739
|
'''Set index name, pattern or top level API.
|
|
740
740
|
|
|
741
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
741
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#index ManagedDatabaseUser#index}
|
|
742
742
|
'''
|
|
743
743
|
result = self._values.get("index")
|
|
744
744
|
assert result is not None, "Required property 'index' is missing"
|
|
@@ -748,7 +748,7 @@ class ManagedDatabaseUserOpensearchAccessControlRules:
|
|
|
748
748
|
def permission(self) -> builtins.str:
|
|
749
749
|
'''Set permission access.
|
|
750
750
|
|
|
751
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
751
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#permission ManagedDatabaseUser#permission}
|
|
752
752
|
'''
|
|
753
753
|
result = self._values.get("permission")
|
|
754
754
|
assert result is not None, "Required property 'permission' is missing"
|
|
@@ -813,7 +813,7 @@ class ManagedDatabaseUserOpensearchAccessControlRulesList(
|
|
|
813
813
|
if __debug__:
|
|
814
814
|
type_hints = typing.get_type_hints(_typecheckingstub__819a3aa89c9c1206aa9c2a863c363f11b8a66bd9b8497cfee924eca988197fcb)
|
|
815
815
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
816
|
-
jsii.set(self, "terraformAttribute", value)
|
|
816
|
+
jsii.set(self, "terraformAttribute", value) # pyright: ignore[reportArgumentType]
|
|
817
817
|
|
|
818
818
|
@builtins.property
|
|
819
819
|
@jsii.member(jsii_name="terraformResource")
|
|
@@ -826,7 +826,7 @@ class ManagedDatabaseUserOpensearchAccessControlRulesList(
|
|
|
826
826
|
if __debug__:
|
|
827
827
|
type_hints = typing.get_type_hints(_typecheckingstub__9035a2506767e4f58f5e63793c32afb1e7d291560717108cec71bf2c6deb579f)
|
|
828
828
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
829
|
-
jsii.set(self, "terraformResource", value)
|
|
829
|
+
jsii.set(self, "terraformResource", value) # pyright: ignore[reportArgumentType]
|
|
830
830
|
|
|
831
831
|
@builtins.property
|
|
832
832
|
@jsii.member(jsii_name="wrapsSet")
|
|
@@ -839,7 +839,7 @@ class ManagedDatabaseUserOpensearchAccessControlRulesList(
|
|
|
839
839
|
if __debug__:
|
|
840
840
|
type_hints = typing.get_type_hints(_typecheckingstub__1b3fe316a8770435bbdac3dfecd6e58cc0f51b70c77adf586b8d3b4d6ff04d74)
|
|
841
841
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
842
|
-
jsii.set(self, "wrapsSet", value)
|
|
842
|
+
jsii.set(self, "wrapsSet", value) # pyright: ignore[reportArgumentType]
|
|
843
843
|
|
|
844
844
|
@builtins.property
|
|
845
845
|
@jsii.member(jsii_name="internalValue")
|
|
@@ -856,7 +856,7 @@ class ManagedDatabaseUserOpensearchAccessControlRulesList(
|
|
|
856
856
|
if __debug__:
|
|
857
857
|
type_hints = typing.get_type_hints(_typecheckingstub__3e8caca91ec82f03099665dab3a8d90b2a77f89960ed729ae582c6cbf3fc3a7a)
|
|
858
858
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
859
|
-
jsii.set(self, "internalValue", value)
|
|
859
|
+
jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
|
|
860
860
|
|
|
861
861
|
|
|
862
862
|
class ManagedDatabaseUserOpensearchAccessControlRulesOutputReference(
|
|
@@ -905,7 +905,7 @@ class ManagedDatabaseUserOpensearchAccessControlRulesOutputReference(
|
|
|
905
905
|
if __debug__:
|
|
906
906
|
type_hints = typing.get_type_hints(_typecheckingstub__bf31bc12b7f94a526e7e41226e6e9296881b18ff36410291f9f4964a64acf62f)
|
|
907
907
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
908
|
-
jsii.set(self, "index", value)
|
|
908
|
+
jsii.set(self, "index", value) # pyright: ignore[reportArgumentType]
|
|
909
909
|
|
|
910
910
|
@builtins.property
|
|
911
911
|
@jsii.member(jsii_name="permission")
|
|
@@ -917,7 +917,7 @@ class ManagedDatabaseUserOpensearchAccessControlRulesOutputReference(
|
|
|
917
917
|
if __debug__:
|
|
918
918
|
type_hints = typing.get_type_hints(_typecheckingstub__a8078f0d2a5b371825e053b9bd3d3b431480d8a53a502928b258020d66840f0b)
|
|
919
919
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
920
|
-
jsii.set(self, "permission", value)
|
|
920
|
+
jsii.set(self, "permission", value) # pyright: ignore[reportArgumentType]
|
|
921
921
|
|
|
922
922
|
@builtins.property
|
|
923
923
|
@jsii.member(jsii_name="internalValue")
|
|
@@ -934,7 +934,7 @@ class ManagedDatabaseUserOpensearchAccessControlRulesOutputReference(
|
|
|
934
934
|
if __debug__:
|
|
935
935
|
type_hints = typing.get_type_hints(_typecheckingstub__13b1b4f9dcb8775caf7897bb1366e6419bc653fc18161596852f846170e69f1c)
|
|
936
936
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
937
|
-
jsii.set(self, "internalValue", value)
|
|
937
|
+
jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
|
|
938
938
|
|
|
939
939
|
|
|
940
940
|
@jsii.data_type(
|
|
@@ -949,7 +949,7 @@ class ManagedDatabaseUserPgAccessControl:
|
|
|
949
949
|
allow_replication: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
950
950
|
) -> None:
|
|
951
951
|
'''
|
|
952
|
-
:param allow_replication: Grant replication privilege. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
952
|
+
:param allow_replication: Grant replication privilege. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#allow_replication ManagedDatabaseUser#allow_replication}
|
|
953
953
|
'''
|
|
954
954
|
if __debug__:
|
|
955
955
|
type_hints = typing.get_type_hints(_typecheckingstub__f34e6b56dbd319319ed29790d55c8592357d86f9b7c8e8c14a5c4d70a6787a4f)
|
|
@@ -964,7 +964,7 @@ class ManagedDatabaseUserPgAccessControl:
|
|
|
964
964
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
965
965
|
'''Grant replication privilege.
|
|
966
966
|
|
|
967
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
967
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#allow_replication ManagedDatabaseUser#allow_replication}
|
|
968
968
|
'''
|
|
969
969
|
result = self._values.get("allow_replication")
|
|
970
970
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -1027,7 +1027,7 @@ class ManagedDatabaseUserPgAccessControlOutputReference(
|
|
|
1027
1027
|
if __debug__:
|
|
1028
1028
|
type_hints = typing.get_type_hints(_typecheckingstub__d64766b07261271a83f0b99c9b5994c07b319be03b24ec0486adc7ddcb458552)
|
|
1029
1029
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1030
|
-
jsii.set(self, "allowReplication", value)
|
|
1030
|
+
jsii.set(self, "allowReplication", value) # pyright: ignore[reportArgumentType]
|
|
1031
1031
|
|
|
1032
1032
|
@builtins.property
|
|
1033
1033
|
@jsii.member(jsii_name="internalValue")
|
|
@@ -1042,7 +1042,7 @@ class ManagedDatabaseUserPgAccessControlOutputReference(
|
|
|
1042
1042
|
if __debug__:
|
|
1043
1043
|
type_hints = typing.get_type_hints(_typecheckingstub__3ef37ebe78b06916a552ac2271f6287ba8f91f8248730c96c7d6d23c8258132c)
|
|
1044
1044
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1045
|
-
jsii.set(self, "internalValue", value)
|
|
1045
|
+
jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
|
|
1046
1046
|
|
|
1047
1047
|
|
|
1048
1048
|
@jsii.data_type(
|
|
@@ -1065,10 +1065,10 @@ class ManagedDatabaseUserRedisAccessControl:
|
|
|
1065
1065
|
keys: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
1066
1066
|
) -> None:
|
|
1067
1067
|
'''
|
|
1068
|
-
:param categories: Set access control to all commands in specified categories. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
1069
|
-
:param channels: Set access control to Pub/Sub channels. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
1070
|
-
:param commands: Set access control to commands. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
1071
|
-
:param keys: Set access control to keys. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
1068
|
+
:param categories: Set access control to all commands in specified categories. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
|
|
1069
|
+
:param channels: Set access control to Pub/Sub channels. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
|
|
1070
|
+
:param commands: Set access control to commands. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
|
|
1071
|
+
:param keys: Set access control to keys. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
|
|
1072
1072
|
'''
|
|
1073
1073
|
if __debug__:
|
|
1074
1074
|
type_hints = typing.get_type_hints(_typecheckingstub__27204462f8812754fabbce2e4daa3352d018e15b121d6d94fd8c33a5f838827b)
|
|
@@ -1090,7 +1090,7 @@ class ManagedDatabaseUserRedisAccessControl:
|
|
|
1090
1090
|
def categories(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
1091
1091
|
'''Set access control to all commands in specified categories.
|
|
1092
1092
|
|
|
1093
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
1093
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#categories ManagedDatabaseUser#categories}
|
|
1094
1094
|
'''
|
|
1095
1095
|
result = self._values.get("categories")
|
|
1096
1096
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -1099,7 +1099,7 @@ class ManagedDatabaseUserRedisAccessControl:
|
|
|
1099
1099
|
def channels(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
1100
1100
|
'''Set access control to Pub/Sub channels.
|
|
1101
1101
|
|
|
1102
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
1102
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#channels ManagedDatabaseUser#channels}
|
|
1103
1103
|
'''
|
|
1104
1104
|
result = self._values.get("channels")
|
|
1105
1105
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -1108,7 +1108,7 @@ class ManagedDatabaseUserRedisAccessControl:
|
|
|
1108
1108
|
def commands(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
1109
1109
|
'''Set access control to commands.
|
|
1110
1110
|
|
|
1111
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
1111
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#commands ManagedDatabaseUser#commands}
|
|
1112
1112
|
'''
|
|
1113
1113
|
result = self._values.get("commands")
|
|
1114
1114
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -1117,7 +1117,7 @@ class ManagedDatabaseUserRedisAccessControl:
|
|
|
1117
1117
|
def keys(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
1118
1118
|
'''Set access control to keys.
|
|
1119
1119
|
|
|
1120
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
1120
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/managed_database_user#keys ManagedDatabaseUser#keys}
|
|
1121
1121
|
'''
|
|
1122
1122
|
result = self._values.get("keys")
|
|
1123
1123
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -1200,7 +1200,7 @@ class ManagedDatabaseUserRedisAccessControlOutputReference(
|
|
|
1200
1200
|
if __debug__:
|
|
1201
1201
|
type_hints = typing.get_type_hints(_typecheckingstub__9db6bd21eb82626e594a17d964f006f6367c63796a9e1fcf5900809d75d75495)
|
|
1202
1202
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1203
|
-
jsii.set(self, "categories", value)
|
|
1203
|
+
jsii.set(self, "categories", value) # pyright: ignore[reportArgumentType]
|
|
1204
1204
|
|
|
1205
1205
|
@builtins.property
|
|
1206
1206
|
@jsii.member(jsii_name="channels")
|
|
@@ -1212,7 +1212,7 @@ class ManagedDatabaseUserRedisAccessControlOutputReference(
|
|
|
1212
1212
|
if __debug__:
|
|
1213
1213
|
type_hints = typing.get_type_hints(_typecheckingstub__c8835379e24928fde409b267f4d2324f2f982d9481187765ee87591af7141b3b)
|
|
1214
1214
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1215
|
-
jsii.set(self, "channels", value)
|
|
1215
|
+
jsii.set(self, "channels", value) # pyright: ignore[reportArgumentType]
|
|
1216
1216
|
|
|
1217
1217
|
@builtins.property
|
|
1218
1218
|
@jsii.member(jsii_name="commands")
|
|
@@ -1224,7 +1224,7 @@ class ManagedDatabaseUserRedisAccessControlOutputReference(
|
|
|
1224
1224
|
if __debug__:
|
|
1225
1225
|
type_hints = typing.get_type_hints(_typecheckingstub__ea598cedaad8f42680bdfe823440cac795ce1b73a7d8eb3122c1765355bf47cc)
|
|
1226
1226
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1227
|
-
jsii.set(self, "commands", value)
|
|
1227
|
+
jsii.set(self, "commands", value) # pyright: ignore[reportArgumentType]
|
|
1228
1228
|
|
|
1229
1229
|
@builtins.property
|
|
1230
1230
|
@jsii.member(jsii_name="keys")
|
|
@@ -1236,7 +1236,7 @@ class ManagedDatabaseUserRedisAccessControlOutputReference(
|
|
|
1236
1236
|
if __debug__:
|
|
1237
1237
|
type_hints = typing.get_type_hints(_typecheckingstub__cbe3f4c7b7b94e1cef4f758a0146dd6b964648a85bbcb4676d7f99c66ef9069d)
|
|
1238
1238
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1239
|
-
jsii.set(self, "keys", value)
|
|
1239
|
+
jsii.set(self, "keys", value) # pyright: ignore[reportArgumentType]
|
|
1240
1240
|
|
|
1241
1241
|
@builtins.property
|
|
1242
1242
|
@jsii.member(jsii_name="internalValue")
|
|
@@ -1251,7 +1251,7 @@ class ManagedDatabaseUserRedisAccessControlOutputReference(
|
|
|
1251
1251
|
if __debug__:
|
|
1252
1252
|
type_hints = typing.get_type_hints(_typecheckingstub__339df3f9580cdaa83ea424d213c30eb13df0c7142e732aa0a5fa3d7a2238d0b8)
|
|
1253
1253
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1254
|
-
jsii.set(self, "internalValue", value)
|
|
1254
|
+
jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
|
|
1255
1255
|
|
|
1256
1256
|
|
|
1257
1257
|
__all__ = [
|