cdktf-cdktf-provider-upcloud 15.8.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (66) hide show
  1. cdktf_cdktf_provider_upcloud/__init__.py +247 -0
  2. cdktf_cdktf_provider_upcloud/_jsii/__init__.py +45 -0
  3. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.8.0.jsii.tgz +0 -0
  4. cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +894 -0
  5. cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +633 -0
  6. cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +384 -0
  7. cdktf_cdktf_provider_upcloud/data_upcloud_load_balancer_dns_challenge_domain/__init__.py +319 -0
  8. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +853 -0
  9. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +717 -0
  10. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +1084 -0
  11. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_valkey_sessions/__init__.py +898 -0
  12. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +647 -0
  13. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +600 -0
  14. cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +1093 -0
  15. cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +725 -0
  16. cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +558 -0
  17. cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +421 -0
  18. cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +364 -0
  19. cdktf_cdktf_provider_upcloud/file_storage/__init__.py +1683 -0
  20. cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +1233 -0
  21. cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +552 -0
  22. cdktf_cdktf_provider_upcloud/gateway/__init__.py +1167 -0
  23. cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +1299 -0
  24. cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +1357 -0
  25. cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +801 -0
  26. cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +2674 -0
  27. cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +2113 -0
  28. cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +1426 -0
  29. cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +442 -0
  30. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +633 -0
  31. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +459 -0
  32. cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +1290 -0
  33. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +11486 -0
  34. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +442 -0
  35. cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +504 -0
  36. cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +659 -0
  37. cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +633 -0
  38. cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +536 -0
  39. cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +4644 -0
  40. cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +13812 -0
  41. cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +7734 -0
  42. cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +1541 -0
  43. cdktf_cdktf_provider_upcloud/managed_database_valkey/__init__.py +3355 -0
  44. cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +1198 -0
  45. cdktf_cdktf_provider_upcloud/managed_object_storage_bucket/__init__.py +409 -0
  46. cdktf_cdktf_provider_upcloud/managed_object_storage_custom_domain/__init__.py +446 -0
  47. cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +521 -0
  48. cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +454 -0
  49. cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +505 -0
  50. cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +485 -0
  51. cdktf_cdktf_provider_upcloud/network/__init__.py +1554 -0
  52. cdktf_cdktf_provider_upcloud/network_peering/__init__.py +1084 -0
  53. cdktf_cdktf_provider_upcloud/provider/__init__.py +544 -0
  54. cdktf_cdktf_provider_upcloud/py.typed +1 -0
  55. cdktf_cdktf_provider_upcloud/router/__init__.py +1030 -0
  56. cdktf_cdktf_provider_upcloud/server/__init__.py +4542 -0
  57. cdktf_cdktf_provider_upcloud/server_group/__init__.py +571 -0
  58. cdktf_cdktf_provider_upcloud/storage/__init__.py +1850 -0
  59. cdktf_cdktf_provider_upcloud/storage_backup/__init__.py +483 -0
  60. cdktf_cdktf_provider_upcloud/storage_template/__init__.py +478 -0
  61. cdktf_cdktf_provider_upcloud/tag/__init__.py +493 -0
  62. cdktf_cdktf_provider_upcloud-15.8.0.dist-info/LICENSE +355 -0
  63. cdktf_cdktf_provider_upcloud-15.8.0.dist-info/METADATA +120 -0
  64. cdktf_cdktf_provider_upcloud-15.8.0.dist-info/RECORD +66 -0
  65. cdktf_cdktf_provider_upcloud-15.8.0.dist-info/WHEEL +5 -0
  66. cdktf_cdktf_provider_upcloud-15.8.0.dist-info/top_level.txt +1 -0
@@ -0,0 +1,1426 @@
1
+ r'''
2
+ # `upcloud_loadbalancer_backend`
3
+
4
+ Refer to the Terraform Registry for docs: [`upcloud_loadbalancer_backend`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend).
5
+ '''
6
+ from pkgutil import extend_path
7
+ __path__ = extend_path(__path__, __name__)
8
+
9
+ import abc
10
+ import builtins
11
+ import datetime
12
+ import enum
13
+ import typing
14
+
15
+ import jsii
16
+ import publication
17
+ import typing_extensions
18
+
19
+ import typeguard
20
+ from importlib.metadata import version as _metadata_package_version
21
+ TYPEGUARD_MAJOR_VERSION = int(_metadata_package_version('typeguard').split('.')[0])
22
+
23
+ def check_type(argname: str, value: object, expected_type: typing.Any) -> typing.Any:
24
+ if TYPEGUARD_MAJOR_VERSION <= 2:
25
+ return typeguard.check_type(argname=argname, value=value, expected_type=expected_type) # type:ignore
26
+ else:
27
+ if isinstance(value, jsii._reference_map.InterfaceDynamicProxy): # pyright: ignore [reportAttributeAccessIssue]
28
+ pass
29
+ else:
30
+ if TYPEGUARD_MAJOR_VERSION == 3:
31
+ typeguard.config.collection_check_strategy = typeguard.CollectionCheckStrategy.ALL_ITEMS # type:ignore
32
+ typeguard.check_type(value=value, expected_type=expected_type) # type:ignore
33
+ else:
34
+ typeguard.check_type(value=value, expected_type=expected_type, collection_check_strategy=typeguard.CollectionCheckStrategy.ALL_ITEMS) # type:ignore
35
+
36
+ from .._jsii import *
37
+
38
+ import cdktf as _cdktf_9a9027ec
39
+ import constructs as _constructs_77d1e7e8
40
+
41
+
42
+ class LoadbalancerBackend(
43
+ _cdktf_9a9027ec.TerraformResource,
44
+ metaclass=jsii.JSIIMeta,
45
+ jsii_type="@cdktf/provider-upcloud.loadbalancerBackend.LoadbalancerBackend",
46
+ ):
47
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend upcloud_loadbalancer_backend}.'''
48
+
49
+ def __init__(
50
+ self,
51
+ scope: _constructs_77d1e7e8.Construct,
52
+ id: builtins.str,
53
+ *,
54
+ loadbalancer: builtins.str,
55
+ name: builtins.str,
56
+ properties: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["LoadbalancerBackendProperties", typing.Dict[builtins.str, typing.Any]]]]] = None,
57
+ resolver_name: typing.Optional[builtins.str] = None,
58
+ connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
59
+ count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
60
+ depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
61
+ for_each: typing.Optional[_cdktf_9a9027ec.ITerraformIterator] = None,
62
+ lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
63
+ provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
64
+ provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
65
+ ) -> None:
66
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend upcloud_loadbalancer_backend} Resource.
67
+
68
+ :param scope: The scope in which to define this construct.
69
+ :param id: The scoped construct ID. Must be unique amongst siblings in the same scope
70
+ :param loadbalancer: UUID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#loadbalancer LoadbalancerBackend#loadbalancer}
71
+ :param name: The name of the backend. Must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#name LoadbalancerBackend#name}
72
+ :param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#properties LoadbalancerBackend#properties}
73
+ :param resolver_name: Domain name resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
74
+ :param connection:
75
+ :param count:
76
+ :param depends_on:
77
+ :param for_each:
78
+ :param lifecycle:
79
+ :param provider:
80
+ :param provisioners:
81
+ '''
82
+ if __debug__:
83
+ type_hints = typing.get_type_hints(_typecheckingstub__a57ef11b06133e84b2cf13365b88e7f2dd34adb8674508adcf3a305129d291be)
84
+ check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
85
+ check_type(argname="argument id", value=id, expected_type=type_hints["id"])
86
+ config = LoadbalancerBackendConfig(
87
+ loadbalancer=loadbalancer,
88
+ name=name,
89
+ properties=properties,
90
+ resolver_name=resolver_name,
91
+ connection=connection,
92
+ count=count,
93
+ depends_on=depends_on,
94
+ for_each=for_each,
95
+ lifecycle=lifecycle,
96
+ provider=provider,
97
+ provisioners=provisioners,
98
+ )
99
+
100
+ jsii.create(self.__class__, self, [scope, id, config])
101
+
102
+ @jsii.member(jsii_name="generateConfigForImport")
103
+ @builtins.classmethod
104
+ def generate_config_for_import(
105
+ cls,
106
+ scope: _constructs_77d1e7e8.Construct,
107
+ import_to_id: builtins.str,
108
+ import_from_id: builtins.str,
109
+ provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
110
+ ) -> _cdktf_9a9027ec.ImportableResource:
111
+ '''Generates CDKTF code for importing a LoadbalancerBackend resource upon running "cdktf plan ".
112
+
113
+ :param scope: The scope in which to define this construct.
114
+ :param import_to_id: The construct id used in the generated config for the LoadbalancerBackend to import.
115
+ :param import_from_id: The id of the existing LoadbalancerBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#import import section} in the documentation of this resource for the id to use
116
+ :param provider: ? Optional instance of the provider where the LoadbalancerBackend to import is found.
117
+ '''
118
+ if __debug__:
119
+ type_hints = typing.get_type_hints(_typecheckingstub__a39303f6431c9b45110a25cf70f07bd7d65ab86e3d142d38f4c3a889e9439f80)
120
+ check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
121
+ check_type(argname="argument import_to_id", value=import_to_id, expected_type=type_hints["import_to_id"])
122
+ check_type(argname="argument import_from_id", value=import_from_id, expected_type=type_hints["import_from_id"])
123
+ check_type(argname="argument provider", value=provider, expected_type=type_hints["provider"])
124
+ return typing.cast(_cdktf_9a9027ec.ImportableResource, jsii.sinvoke(cls, "generateConfigForImport", [scope, import_to_id, import_from_id, provider]))
125
+
126
+ @jsii.member(jsii_name="putProperties")
127
+ def put_properties(
128
+ self,
129
+ value: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["LoadbalancerBackendProperties", typing.Dict[builtins.str, typing.Any]]]],
130
+ ) -> None:
131
+ '''
132
+ :param value: -
133
+ '''
134
+ if __debug__:
135
+ type_hints = typing.get_type_hints(_typecheckingstub__425dcb0894c6def77121cea82a4b7926cb641081761e4828ac7bf13b99d8c4b4)
136
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
137
+ return typing.cast(None, jsii.invoke(self, "putProperties", [value]))
138
+
139
+ @jsii.member(jsii_name="resetProperties")
140
+ def reset_properties(self) -> None:
141
+ return typing.cast(None, jsii.invoke(self, "resetProperties", []))
142
+
143
+ @jsii.member(jsii_name="resetResolverName")
144
+ def reset_resolver_name(self) -> None:
145
+ return typing.cast(None, jsii.invoke(self, "resetResolverName", []))
146
+
147
+ @jsii.member(jsii_name="synthesizeAttributes")
148
+ def _synthesize_attributes(self) -> typing.Mapping[builtins.str, typing.Any]:
149
+ return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "synthesizeAttributes", []))
150
+
151
+ @jsii.member(jsii_name="synthesizeHclAttributes")
152
+ def _synthesize_hcl_attributes(self) -> typing.Mapping[builtins.str, typing.Any]:
153
+ return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "synthesizeHclAttributes", []))
154
+
155
+ @jsii.python.classproperty
156
+ @jsii.member(jsii_name="tfResourceType")
157
+ def TF_RESOURCE_TYPE(cls) -> builtins.str:
158
+ return typing.cast(builtins.str, jsii.sget(cls, "tfResourceType"))
159
+
160
+ @builtins.property
161
+ @jsii.member(jsii_name="id")
162
+ def id(self) -> builtins.str:
163
+ return typing.cast(builtins.str, jsii.get(self, "id"))
164
+
165
+ @builtins.property
166
+ @jsii.member(jsii_name="members")
167
+ def members(self) -> typing.List[builtins.str]:
168
+ return typing.cast(typing.List[builtins.str], jsii.get(self, "members"))
169
+
170
+ @builtins.property
171
+ @jsii.member(jsii_name="properties")
172
+ def properties(self) -> "LoadbalancerBackendPropertiesList":
173
+ return typing.cast("LoadbalancerBackendPropertiesList", jsii.get(self, "properties"))
174
+
175
+ @builtins.property
176
+ @jsii.member(jsii_name="tlsConfigs")
177
+ def tls_configs(self) -> typing.List[builtins.str]:
178
+ return typing.cast(typing.List[builtins.str], jsii.get(self, "tlsConfigs"))
179
+
180
+ @builtins.property
181
+ @jsii.member(jsii_name="loadbalancerInput")
182
+ def loadbalancer_input(self) -> typing.Optional[builtins.str]:
183
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "loadbalancerInput"))
184
+
185
+ @builtins.property
186
+ @jsii.member(jsii_name="nameInput")
187
+ def name_input(self) -> typing.Optional[builtins.str]:
188
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "nameInput"))
189
+
190
+ @builtins.property
191
+ @jsii.member(jsii_name="propertiesInput")
192
+ def properties_input(
193
+ self,
194
+ ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["LoadbalancerBackendProperties"]]]:
195
+ return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["LoadbalancerBackendProperties"]]], jsii.get(self, "propertiesInput"))
196
+
197
+ @builtins.property
198
+ @jsii.member(jsii_name="resolverNameInput")
199
+ def resolver_name_input(self) -> typing.Optional[builtins.str]:
200
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "resolverNameInput"))
201
+
202
+ @builtins.property
203
+ @jsii.member(jsii_name="loadbalancer")
204
+ def loadbalancer(self) -> builtins.str:
205
+ return typing.cast(builtins.str, jsii.get(self, "loadbalancer"))
206
+
207
+ @loadbalancer.setter
208
+ def loadbalancer(self, value: builtins.str) -> None:
209
+ if __debug__:
210
+ type_hints = typing.get_type_hints(_typecheckingstub__758a0ce0d7c7b27aef039a1ababb5170b2dcdca319a675ca5481e137f044e6e5)
211
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
212
+ jsii.set(self, "loadbalancer", value) # pyright: ignore[reportArgumentType]
213
+
214
+ @builtins.property
215
+ @jsii.member(jsii_name="name")
216
+ def name(self) -> builtins.str:
217
+ return typing.cast(builtins.str, jsii.get(self, "name"))
218
+
219
+ @name.setter
220
+ def name(self, value: builtins.str) -> None:
221
+ if __debug__:
222
+ type_hints = typing.get_type_hints(_typecheckingstub__de7b9fba80a9bd9724064ce7ebd66895bd34dfa89b05268124ea8a52d91572a5)
223
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
224
+ jsii.set(self, "name", value) # pyright: ignore[reportArgumentType]
225
+
226
+ @builtins.property
227
+ @jsii.member(jsii_name="resolverName")
228
+ def resolver_name(self) -> builtins.str:
229
+ return typing.cast(builtins.str, jsii.get(self, "resolverName"))
230
+
231
+ @resolver_name.setter
232
+ def resolver_name(self, value: builtins.str) -> None:
233
+ if __debug__:
234
+ type_hints = typing.get_type_hints(_typecheckingstub__8d83b8ad74717dbbf2ec7a84d12d1c3f9b89191c4cd0c797584da512a2560f3b)
235
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
236
+ jsii.set(self, "resolverName", value) # pyright: ignore[reportArgumentType]
237
+
238
+
239
+ @jsii.data_type(
240
+ jsii_type="@cdktf/provider-upcloud.loadbalancerBackend.LoadbalancerBackendConfig",
241
+ jsii_struct_bases=[_cdktf_9a9027ec.TerraformMetaArguments],
242
+ name_mapping={
243
+ "connection": "connection",
244
+ "count": "count",
245
+ "depends_on": "dependsOn",
246
+ "for_each": "forEach",
247
+ "lifecycle": "lifecycle",
248
+ "provider": "provider",
249
+ "provisioners": "provisioners",
250
+ "loadbalancer": "loadbalancer",
251
+ "name": "name",
252
+ "properties": "properties",
253
+ "resolver_name": "resolverName",
254
+ },
255
+ )
256
+ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
257
+ def __init__(
258
+ self,
259
+ *,
260
+ connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
261
+ count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
262
+ depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
263
+ for_each: typing.Optional[_cdktf_9a9027ec.ITerraformIterator] = None,
264
+ lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
265
+ provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
266
+ provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
267
+ loadbalancer: builtins.str,
268
+ name: builtins.str,
269
+ properties: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["LoadbalancerBackendProperties", typing.Dict[builtins.str, typing.Any]]]]] = None,
270
+ resolver_name: typing.Optional[builtins.str] = None,
271
+ ) -> None:
272
+ '''
273
+ :param connection:
274
+ :param count:
275
+ :param depends_on:
276
+ :param for_each:
277
+ :param lifecycle:
278
+ :param provider:
279
+ :param provisioners:
280
+ :param loadbalancer: UUID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#loadbalancer LoadbalancerBackend#loadbalancer}
281
+ :param name: The name of the backend. Must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#name LoadbalancerBackend#name}
282
+ :param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#properties LoadbalancerBackend#properties}
283
+ :param resolver_name: Domain name resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
284
+ '''
285
+ if isinstance(lifecycle, dict):
286
+ lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
287
+ if __debug__:
288
+ type_hints = typing.get_type_hints(_typecheckingstub__6200f98d574a6cde907c9b763cf17de76dec005cc13d69bf52a284d828392061)
289
+ check_type(argname="argument connection", value=connection, expected_type=type_hints["connection"])
290
+ check_type(argname="argument count", value=count, expected_type=type_hints["count"])
291
+ check_type(argname="argument depends_on", value=depends_on, expected_type=type_hints["depends_on"])
292
+ check_type(argname="argument for_each", value=for_each, expected_type=type_hints["for_each"])
293
+ check_type(argname="argument lifecycle", value=lifecycle, expected_type=type_hints["lifecycle"])
294
+ check_type(argname="argument provider", value=provider, expected_type=type_hints["provider"])
295
+ check_type(argname="argument provisioners", value=provisioners, expected_type=type_hints["provisioners"])
296
+ check_type(argname="argument loadbalancer", value=loadbalancer, expected_type=type_hints["loadbalancer"])
297
+ check_type(argname="argument name", value=name, expected_type=type_hints["name"])
298
+ check_type(argname="argument properties", value=properties, expected_type=type_hints["properties"])
299
+ check_type(argname="argument resolver_name", value=resolver_name, expected_type=type_hints["resolver_name"])
300
+ self._values: typing.Dict[builtins.str, typing.Any] = {
301
+ "loadbalancer": loadbalancer,
302
+ "name": name,
303
+ }
304
+ if connection is not None:
305
+ self._values["connection"] = connection
306
+ if count is not None:
307
+ self._values["count"] = count
308
+ if depends_on is not None:
309
+ self._values["depends_on"] = depends_on
310
+ if for_each is not None:
311
+ self._values["for_each"] = for_each
312
+ if lifecycle is not None:
313
+ self._values["lifecycle"] = lifecycle
314
+ if provider is not None:
315
+ self._values["provider"] = provider
316
+ if provisioners is not None:
317
+ self._values["provisioners"] = provisioners
318
+ if properties is not None:
319
+ self._values["properties"] = properties
320
+ if resolver_name is not None:
321
+ self._values["resolver_name"] = resolver_name
322
+
323
+ @builtins.property
324
+ def connection(
325
+ self,
326
+ ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, _cdktf_9a9027ec.WinrmProvisionerConnection]]:
327
+ '''
328
+ :stability: experimental
329
+ '''
330
+ result = self._values.get("connection")
331
+ return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, _cdktf_9a9027ec.WinrmProvisionerConnection]], result)
332
+
333
+ @builtins.property
334
+ def count(
335
+ self,
336
+ ) -> typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]]:
337
+ '''
338
+ :stability: experimental
339
+ '''
340
+ result = self._values.get("count")
341
+ return typing.cast(typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]], result)
342
+
343
+ @builtins.property
344
+ def depends_on(
345
+ self,
346
+ ) -> typing.Optional[typing.List[_cdktf_9a9027ec.ITerraformDependable]]:
347
+ '''
348
+ :stability: experimental
349
+ '''
350
+ result = self._values.get("depends_on")
351
+ return typing.cast(typing.Optional[typing.List[_cdktf_9a9027ec.ITerraformDependable]], result)
352
+
353
+ @builtins.property
354
+ def for_each(self) -> typing.Optional[_cdktf_9a9027ec.ITerraformIterator]:
355
+ '''
356
+ :stability: experimental
357
+ '''
358
+ result = self._values.get("for_each")
359
+ return typing.cast(typing.Optional[_cdktf_9a9027ec.ITerraformIterator], result)
360
+
361
+ @builtins.property
362
+ def lifecycle(self) -> typing.Optional[_cdktf_9a9027ec.TerraformResourceLifecycle]:
363
+ '''
364
+ :stability: experimental
365
+ '''
366
+ result = self._values.get("lifecycle")
367
+ return typing.cast(typing.Optional[_cdktf_9a9027ec.TerraformResourceLifecycle], result)
368
+
369
+ @builtins.property
370
+ def provider(self) -> typing.Optional[_cdktf_9a9027ec.TerraformProvider]:
371
+ '''
372
+ :stability: experimental
373
+ '''
374
+ result = self._values.get("provider")
375
+ return typing.cast(typing.Optional[_cdktf_9a9027ec.TerraformProvider], result)
376
+
377
+ @builtins.property
378
+ def provisioners(
379
+ self,
380
+ ) -> typing.Optional[typing.List[typing.Union[_cdktf_9a9027ec.FileProvisioner, _cdktf_9a9027ec.LocalExecProvisioner, _cdktf_9a9027ec.RemoteExecProvisioner]]]:
381
+ '''
382
+ :stability: experimental
383
+ '''
384
+ result = self._values.get("provisioners")
385
+ return typing.cast(typing.Optional[typing.List[typing.Union[_cdktf_9a9027ec.FileProvisioner, _cdktf_9a9027ec.LocalExecProvisioner, _cdktf_9a9027ec.RemoteExecProvisioner]]], result)
386
+
387
+ @builtins.property
388
+ def loadbalancer(self) -> builtins.str:
389
+ '''UUID of the load balancer to which the backend is connected.
390
+
391
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#loadbalancer LoadbalancerBackend#loadbalancer}
392
+ '''
393
+ result = self._values.get("loadbalancer")
394
+ assert result is not None, "Required property 'loadbalancer' is missing"
395
+ return typing.cast(builtins.str, result)
396
+
397
+ @builtins.property
398
+ def name(self) -> builtins.str:
399
+ '''The name of the backend. Must be unique within the load balancer service.
400
+
401
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#name LoadbalancerBackend#name}
402
+ '''
403
+ result = self._values.get("name")
404
+ assert result is not None, "Required property 'name' is missing"
405
+ return typing.cast(builtins.str, result)
406
+
407
+ @builtins.property
408
+ def properties(
409
+ self,
410
+ ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["LoadbalancerBackendProperties"]]]:
411
+ '''properties block.
412
+
413
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#properties LoadbalancerBackend#properties}
414
+ '''
415
+ result = self._values.get("properties")
416
+ return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["LoadbalancerBackendProperties"]]], result)
417
+
418
+ @builtins.property
419
+ def resolver_name(self) -> typing.Optional[builtins.str]:
420
+ '''Domain name resolver used with dynamic type members.
421
+
422
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
423
+ '''
424
+ result = self._values.get("resolver_name")
425
+ return typing.cast(typing.Optional[builtins.str], result)
426
+
427
+ def __eq__(self, rhs: typing.Any) -> builtins.bool:
428
+ return isinstance(rhs, self.__class__) and rhs._values == self._values
429
+
430
+ def __ne__(self, rhs: typing.Any) -> builtins.bool:
431
+ return not (rhs == self)
432
+
433
+ def __repr__(self) -> str:
434
+ return "LoadbalancerBackendConfig(%s)" % ", ".join(
435
+ k + "=" + repr(v) for k, v in self._values.items()
436
+ )
437
+
438
+
439
+ @jsii.data_type(
440
+ jsii_type="@cdktf/provider-upcloud.loadbalancerBackend.LoadbalancerBackendProperties",
441
+ jsii_struct_bases=[],
442
+ name_mapping={
443
+ "health_check_expected_status": "healthCheckExpectedStatus",
444
+ "health_check_fall": "healthCheckFall",
445
+ "health_check_interval": "healthCheckInterval",
446
+ "health_check_rise": "healthCheckRise",
447
+ "health_check_tls_verify": "healthCheckTlsVerify",
448
+ "health_check_type": "healthCheckType",
449
+ "health_check_url": "healthCheckUrl",
450
+ "http2_enabled": "http2Enabled",
451
+ "outbound_proxy_protocol": "outboundProxyProtocol",
452
+ "sticky_session_cookie_name": "stickySessionCookieName",
453
+ "timeout_server": "timeoutServer",
454
+ "timeout_tunnel": "timeoutTunnel",
455
+ "tls_enabled": "tlsEnabled",
456
+ "tls_use_system_ca": "tlsUseSystemCa",
457
+ "tls_verify": "tlsVerify",
458
+ },
459
+ )
460
+ class LoadbalancerBackendProperties:
461
+ def __init__(
462
+ self,
463
+ *,
464
+ health_check_expected_status: typing.Optional[jsii.Number] = None,
465
+ health_check_fall: typing.Optional[jsii.Number] = None,
466
+ health_check_interval: typing.Optional[jsii.Number] = None,
467
+ health_check_rise: typing.Optional[jsii.Number] = None,
468
+ health_check_tls_verify: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
469
+ health_check_type: typing.Optional[builtins.str] = None,
470
+ health_check_url: typing.Optional[builtins.str] = None,
471
+ http2_enabled: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
472
+ outbound_proxy_protocol: typing.Optional[builtins.str] = None,
473
+ sticky_session_cookie_name: typing.Optional[builtins.str] = None,
474
+ timeout_server: typing.Optional[jsii.Number] = None,
475
+ timeout_tunnel: typing.Optional[jsii.Number] = None,
476
+ tls_enabled: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
477
+ tls_use_system_ca: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
478
+ tls_verify: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
479
+ ) -> None:
480
+ '''
481
+ :param health_check_expected_status: Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for ``tcp`` ``health_check_type``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_expected_status LoadbalancerBackend#health_check_expected_status}
482
+ :param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_fall LoadbalancerBackend#health_check_fall}
483
+ :param health_check_interval: Interval between health checks in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_interval LoadbalancerBackend#health_check_interval}
484
+ :param health_check_rise: Sets how many successful health checks are required to put the backend member back into rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_rise LoadbalancerBackend#health_check_rise}
485
+ :param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_tls_verify LoadbalancerBackend#health_check_tls_verify}
486
+ :param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_type LoadbalancerBackend#health_check_type}
487
+ :param health_check_url: Target path for health check HTTP GET requests. Ignored for ``tcp`` ``health_check_type``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_url LoadbalancerBackend#health_check_url}
488
+ :param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#http2_enabled LoadbalancerBackend#http2_enabled}
489
+ :param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Defaults to empty string. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#outbound_proxy_protocol LoadbalancerBackend#outbound_proxy_protocol}
490
+ :param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#sticky_session_cookie_name LoadbalancerBackend#sticky_session_cookie_name}
491
+ :param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#timeout_server LoadbalancerBackend#timeout_server}
492
+ :param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#timeout_tunnel LoadbalancerBackend#timeout_tunnel}
493
+ :param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#tls_enabled LoadbalancerBackend#tls_enabled}
494
+ :param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#tls_use_system_ca LoadbalancerBackend#tls_use_system_ca}
495
+ :param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#tls_verify LoadbalancerBackend#tls_verify}
496
+ '''
497
+ if __debug__:
498
+ type_hints = typing.get_type_hints(_typecheckingstub__eb5988403ea7b17ea78d8a97176e2db70e4258ead0d52fc7ab7102412ecccf40)
499
+ check_type(argname="argument health_check_expected_status", value=health_check_expected_status, expected_type=type_hints["health_check_expected_status"])
500
+ check_type(argname="argument health_check_fall", value=health_check_fall, expected_type=type_hints["health_check_fall"])
501
+ check_type(argname="argument health_check_interval", value=health_check_interval, expected_type=type_hints["health_check_interval"])
502
+ check_type(argname="argument health_check_rise", value=health_check_rise, expected_type=type_hints["health_check_rise"])
503
+ check_type(argname="argument health_check_tls_verify", value=health_check_tls_verify, expected_type=type_hints["health_check_tls_verify"])
504
+ check_type(argname="argument health_check_type", value=health_check_type, expected_type=type_hints["health_check_type"])
505
+ check_type(argname="argument health_check_url", value=health_check_url, expected_type=type_hints["health_check_url"])
506
+ check_type(argname="argument http2_enabled", value=http2_enabled, expected_type=type_hints["http2_enabled"])
507
+ check_type(argname="argument outbound_proxy_protocol", value=outbound_proxy_protocol, expected_type=type_hints["outbound_proxy_protocol"])
508
+ check_type(argname="argument sticky_session_cookie_name", value=sticky_session_cookie_name, expected_type=type_hints["sticky_session_cookie_name"])
509
+ check_type(argname="argument timeout_server", value=timeout_server, expected_type=type_hints["timeout_server"])
510
+ check_type(argname="argument timeout_tunnel", value=timeout_tunnel, expected_type=type_hints["timeout_tunnel"])
511
+ check_type(argname="argument tls_enabled", value=tls_enabled, expected_type=type_hints["tls_enabled"])
512
+ check_type(argname="argument tls_use_system_ca", value=tls_use_system_ca, expected_type=type_hints["tls_use_system_ca"])
513
+ check_type(argname="argument tls_verify", value=tls_verify, expected_type=type_hints["tls_verify"])
514
+ self._values: typing.Dict[builtins.str, typing.Any] = {}
515
+ if health_check_expected_status is not None:
516
+ self._values["health_check_expected_status"] = health_check_expected_status
517
+ if health_check_fall is not None:
518
+ self._values["health_check_fall"] = health_check_fall
519
+ if health_check_interval is not None:
520
+ self._values["health_check_interval"] = health_check_interval
521
+ if health_check_rise is not None:
522
+ self._values["health_check_rise"] = health_check_rise
523
+ if health_check_tls_verify is not None:
524
+ self._values["health_check_tls_verify"] = health_check_tls_verify
525
+ if health_check_type is not None:
526
+ self._values["health_check_type"] = health_check_type
527
+ if health_check_url is not None:
528
+ self._values["health_check_url"] = health_check_url
529
+ if http2_enabled is not None:
530
+ self._values["http2_enabled"] = http2_enabled
531
+ if outbound_proxy_protocol is not None:
532
+ self._values["outbound_proxy_protocol"] = outbound_proxy_protocol
533
+ if sticky_session_cookie_name is not None:
534
+ self._values["sticky_session_cookie_name"] = sticky_session_cookie_name
535
+ if timeout_server is not None:
536
+ self._values["timeout_server"] = timeout_server
537
+ if timeout_tunnel is not None:
538
+ self._values["timeout_tunnel"] = timeout_tunnel
539
+ if tls_enabled is not None:
540
+ self._values["tls_enabled"] = tls_enabled
541
+ if tls_use_system_ca is not None:
542
+ self._values["tls_use_system_ca"] = tls_use_system_ca
543
+ if tls_verify is not None:
544
+ self._values["tls_verify"] = tls_verify
545
+
546
+ @builtins.property
547
+ def health_check_expected_status(self) -> typing.Optional[jsii.Number]:
548
+ '''Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for ``tcp`` ``health_check_type``.
549
+
550
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_expected_status LoadbalancerBackend#health_check_expected_status}
551
+ '''
552
+ result = self._values.get("health_check_expected_status")
553
+ return typing.cast(typing.Optional[jsii.Number], result)
554
+
555
+ @builtins.property
556
+ def health_check_fall(self) -> typing.Optional[jsii.Number]:
557
+ '''Sets how many failed health checks are allowed until the backend member is taken off from the rotation.
558
+
559
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_fall LoadbalancerBackend#health_check_fall}
560
+ '''
561
+ result = self._values.get("health_check_fall")
562
+ return typing.cast(typing.Optional[jsii.Number], result)
563
+
564
+ @builtins.property
565
+ def health_check_interval(self) -> typing.Optional[jsii.Number]:
566
+ '''Interval between health checks in seconds.
567
+
568
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_interval LoadbalancerBackend#health_check_interval}
569
+ '''
570
+ result = self._values.get("health_check_interval")
571
+ return typing.cast(typing.Optional[jsii.Number], result)
572
+
573
+ @builtins.property
574
+ def health_check_rise(self) -> typing.Optional[jsii.Number]:
575
+ '''Sets how many successful health checks are required to put the backend member back into rotation.
576
+
577
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_rise LoadbalancerBackend#health_check_rise}
578
+ '''
579
+ result = self._values.get("health_check_rise")
580
+ return typing.cast(typing.Optional[jsii.Number], result)
581
+
582
+ @builtins.property
583
+ def health_check_tls_verify(
584
+ self,
585
+ ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
586
+ '''Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored.
587
+
588
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_tls_verify LoadbalancerBackend#health_check_tls_verify}
589
+ '''
590
+ result = self._values.get("health_check_tls_verify")
591
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
592
+
593
+ @builtins.property
594
+ def health_check_type(self) -> typing.Optional[builtins.str]:
595
+ '''Health check type.
596
+
597
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_type LoadbalancerBackend#health_check_type}
598
+ '''
599
+ result = self._values.get("health_check_type")
600
+ return typing.cast(typing.Optional[builtins.str], result)
601
+
602
+ @builtins.property
603
+ def health_check_url(self) -> typing.Optional[builtins.str]:
604
+ '''Target path for health check HTTP GET requests. Ignored for ``tcp`` ``health_check_type``.
605
+
606
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_url LoadbalancerBackend#health_check_url}
607
+ '''
608
+ result = self._values.get("health_check_url")
609
+ return typing.cast(typing.Optional[builtins.str], result)
610
+
611
+ @builtins.property
612
+ def http2_enabled(
613
+ self,
614
+ ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
615
+ '''Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true.
616
+
617
+ Note: members should support HTTP/2 for this setting to work.
618
+
619
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#http2_enabled LoadbalancerBackend#http2_enabled}
620
+ '''
621
+ result = self._values.get("http2_enabled")
622
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
623
+
624
+ @builtins.property
625
+ def outbound_proxy_protocol(self) -> typing.Optional[builtins.str]:
626
+ '''Enable outbound proxy protocol by setting the desired version. Defaults to empty string. Empty string disables proxy protocol.
627
+
628
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#outbound_proxy_protocol LoadbalancerBackend#outbound_proxy_protocol}
629
+ '''
630
+ result = self._values.get("outbound_proxy_protocol")
631
+ return typing.cast(typing.Optional[builtins.str], result)
632
+
633
+ @builtins.property
634
+ def sticky_session_cookie_name(self) -> typing.Optional[builtins.str]:
635
+ '''Sets sticky session cookie name. Empty string disables sticky session.
636
+
637
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#sticky_session_cookie_name LoadbalancerBackend#sticky_session_cookie_name}
638
+ '''
639
+ result = self._values.get("sticky_session_cookie_name")
640
+ return typing.cast(typing.Optional[builtins.str], result)
641
+
642
+ @builtins.property
643
+ def timeout_server(self) -> typing.Optional[jsii.Number]:
644
+ '''Backend server timeout in seconds.
645
+
646
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#timeout_server LoadbalancerBackend#timeout_server}
647
+ '''
648
+ result = self._values.get("timeout_server")
649
+ return typing.cast(typing.Optional[jsii.Number], result)
650
+
651
+ @builtins.property
652
+ def timeout_tunnel(self) -> typing.Optional[jsii.Number]:
653
+ '''Maximum inactivity time on the client and server side for tunnels in seconds.
654
+
655
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#timeout_tunnel LoadbalancerBackend#timeout_tunnel}
656
+ '''
657
+ result = self._values.get("timeout_tunnel")
658
+ return typing.cast(typing.Optional[jsii.Number], result)
659
+
660
+ @builtins.property
661
+ def tls_enabled(
662
+ self,
663
+ ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
664
+ '''Enables TLS connection from the load balancer to backend servers.
665
+
666
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#tls_enabled LoadbalancerBackend#tls_enabled}
667
+ '''
668
+ result = self._values.get("tls_enabled")
669
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
670
+
671
+ @builtins.property
672
+ def tls_use_system_ca(
673
+ self,
674
+ ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
675
+ '''If enabled, then the system CA certificate bundle will be used for the certificate verification.
676
+
677
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#tls_use_system_ca LoadbalancerBackend#tls_use_system_ca}
678
+ '''
679
+ result = self._values.get("tls_use_system_ca")
680
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
681
+
682
+ @builtins.property
683
+ def tls_verify(
684
+ self,
685
+ ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
686
+ '''Enables backend servers certificate verification.
687
+
688
+ Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true.
689
+
690
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#tls_verify LoadbalancerBackend#tls_verify}
691
+ '''
692
+ result = self._values.get("tls_verify")
693
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
694
+
695
+ def __eq__(self, rhs: typing.Any) -> builtins.bool:
696
+ return isinstance(rhs, self.__class__) and rhs._values == self._values
697
+
698
+ def __ne__(self, rhs: typing.Any) -> builtins.bool:
699
+ return not (rhs == self)
700
+
701
+ def __repr__(self) -> str:
702
+ return "LoadbalancerBackendProperties(%s)" % ", ".join(
703
+ k + "=" + repr(v) for k, v in self._values.items()
704
+ )
705
+
706
+
707
+ class LoadbalancerBackendPropertiesList(
708
+ _cdktf_9a9027ec.ComplexList,
709
+ metaclass=jsii.JSIIMeta,
710
+ jsii_type="@cdktf/provider-upcloud.loadbalancerBackend.LoadbalancerBackendPropertiesList",
711
+ ):
712
+ def __init__(
713
+ self,
714
+ terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
715
+ terraform_attribute: builtins.str,
716
+ wraps_set: builtins.bool,
717
+ ) -> None:
718
+ '''
719
+ :param terraform_resource: The parent resource.
720
+ :param terraform_attribute: The attribute on the parent resource this class is referencing.
721
+ :param wraps_set: whether the list is wrapping a set (will add tolist() to be able to access an item via an index).
722
+ '''
723
+ if __debug__:
724
+ type_hints = typing.get_type_hints(_typecheckingstub__6466001e8d1ef72578f27d793b879e51bb3e572eaef9521b980d493595bc42c3)
725
+ check_type(argname="argument terraform_resource", value=terraform_resource, expected_type=type_hints["terraform_resource"])
726
+ check_type(argname="argument terraform_attribute", value=terraform_attribute, expected_type=type_hints["terraform_attribute"])
727
+ check_type(argname="argument wraps_set", value=wraps_set, expected_type=type_hints["wraps_set"])
728
+ jsii.create(self.__class__, self, [terraform_resource, terraform_attribute, wraps_set])
729
+
730
+ @jsii.member(jsii_name="get")
731
+ def get(self, index: jsii.Number) -> "LoadbalancerBackendPropertiesOutputReference":
732
+ '''
733
+ :param index: the index of the item to return.
734
+ '''
735
+ if __debug__:
736
+ type_hints = typing.get_type_hints(_typecheckingstub__79f867fbff964aa075654e4e8af16ff600c59120999a45f0bb5d4eebbf7df082)
737
+ check_type(argname="argument index", value=index, expected_type=type_hints["index"])
738
+ return typing.cast("LoadbalancerBackendPropertiesOutputReference", jsii.invoke(self, "get", [index]))
739
+
740
+ @builtins.property
741
+ @jsii.member(jsii_name="terraformAttribute")
742
+ def _terraform_attribute(self) -> builtins.str:
743
+ '''The attribute on the parent resource this class is referencing.'''
744
+ return typing.cast(builtins.str, jsii.get(self, "terraformAttribute"))
745
+
746
+ @_terraform_attribute.setter
747
+ def _terraform_attribute(self, value: builtins.str) -> None:
748
+ if __debug__:
749
+ type_hints = typing.get_type_hints(_typecheckingstub__9951e06afb155147ab301d7a3de3cd2fdf2af7a2dd07afb0107d1f31f5a9afe1)
750
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
751
+ jsii.set(self, "terraformAttribute", value) # pyright: ignore[reportArgumentType]
752
+
753
+ @builtins.property
754
+ @jsii.member(jsii_name="terraformResource")
755
+ def _terraform_resource(self) -> _cdktf_9a9027ec.IInterpolatingParent:
756
+ '''The parent resource.'''
757
+ return typing.cast(_cdktf_9a9027ec.IInterpolatingParent, jsii.get(self, "terraformResource"))
758
+
759
+ @_terraform_resource.setter
760
+ def _terraform_resource(self, value: _cdktf_9a9027ec.IInterpolatingParent) -> None:
761
+ if __debug__:
762
+ type_hints = typing.get_type_hints(_typecheckingstub__1f8a6b5225ae6d3e8dbe934b52f44ed3cf6e1d733e66b15339254b7710ecc1bc)
763
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
764
+ jsii.set(self, "terraformResource", value) # pyright: ignore[reportArgumentType]
765
+
766
+ @builtins.property
767
+ @jsii.member(jsii_name="wrapsSet")
768
+ def _wraps_set(self) -> builtins.bool:
769
+ '''whether the list is wrapping a set (will add tolist() to be able to access an item via an index).'''
770
+ return typing.cast(builtins.bool, jsii.get(self, "wrapsSet"))
771
+
772
+ @_wraps_set.setter
773
+ def _wraps_set(self, value: builtins.bool) -> None:
774
+ if __debug__:
775
+ type_hints = typing.get_type_hints(_typecheckingstub__2b068ef6542bae20782fcaa4e350a92c8cd34d45062fcf493a138e97a0b38f86)
776
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
777
+ jsii.set(self, "wrapsSet", value) # pyright: ignore[reportArgumentType]
778
+
779
+ @builtins.property
780
+ @jsii.member(jsii_name="internalValue")
781
+ def internal_value(
782
+ self,
783
+ ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List[LoadbalancerBackendProperties]]]:
784
+ return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List[LoadbalancerBackendProperties]]], jsii.get(self, "internalValue"))
785
+
786
+ @internal_value.setter
787
+ def internal_value(
788
+ self,
789
+ value: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List[LoadbalancerBackendProperties]]],
790
+ ) -> None:
791
+ if __debug__:
792
+ type_hints = typing.get_type_hints(_typecheckingstub__f8e732b3935e5c2c284f9e0a1a9b80014417767d3cb70421fd39ff444d5c67bf)
793
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
794
+ jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
795
+
796
+
797
+ class LoadbalancerBackendPropertiesOutputReference(
798
+ _cdktf_9a9027ec.ComplexObject,
799
+ metaclass=jsii.JSIIMeta,
800
+ jsii_type="@cdktf/provider-upcloud.loadbalancerBackend.LoadbalancerBackendPropertiesOutputReference",
801
+ ):
802
+ def __init__(
803
+ self,
804
+ terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
805
+ terraform_attribute: builtins.str,
806
+ complex_object_index: jsii.Number,
807
+ complex_object_is_from_set: builtins.bool,
808
+ ) -> None:
809
+ '''
810
+ :param terraform_resource: The parent resource.
811
+ :param terraform_attribute: The attribute on the parent resource this class is referencing.
812
+ :param complex_object_index: the index of this item in the list.
813
+ :param complex_object_is_from_set: whether the list is wrapping a set (will add tolist() to be able to access an item via an index).
814
+ '''
815
+ if __debug__:
816
+ type_hints = typing.get_type_hints(_typecheckingstub__0c083897711e36589f6551ae9e4bc07921aadcee7d8ec5d8bee78e03d6160dda)
817
+ check_type(argname="argument terraform_resource", value=terraform_resource, expected_type=type_hints["terraform_resource"])
818
+ check_type(argname="argument terraform_attribute", value=terraform_attribute, expected_type=type_hints["terraform_attribute"])
819
+ check_type(argname="argument complex_object_index", value=complex_object_index, expected_type=type_hints["complex_object_index"])
820
+ check_type(argname="argument complex_object_is_from_set", value=complex_object_is_from_set, expected_type=type_hints["complex_object_is_from_set"])
821
+ jsii.create(self.__class__, self, [terraform_resource, terraform_attribute, complex_object_index, complex_object_is_from_set])
822
+
823
+ @jsii.member(jsii_name="resetHealthCheckExpectedStatus")
824
+ def reset_health_check_expected_status(self) -> None:
825
+ return typing.cast(None, jsii.invoke(self, "resetHealthCheckExpectedStatus", []))
826
+
827
+ @jsii.member(jsii_name="resetHealthCheckFall")
828
+ def reset_health_check_fall(self) -> None:
829
+ return typing.cast(None, jsii.invoke(self, "resetHealthCheckFall", []))
830
+
831
+ @jsii.member(jsii_name="resetHealthCheckInterval")
832
+ def reset_health_check_interval(self) -> None:
833
+ return typing.cast(None, jsii.invoke(self, "resetHealthCheckInterval", []))
834
+
835
+ @jsii.member(jsii_name="resetHealthCheckRise")
836
+ def reset_health_check_rise(self) -> None:
837
+ return typing.cast(None, jsii.invoke(self, "resetHealthCheckRise", []))
838
+
839
+ @jsii.member(jsii_name="resetHealthCheckTlsVerify")
840
+ def reset_health_check_tls_verify(self) -> None:
841
+ return typing.cast(None, jsii.invoke(self, "resetHealthCheckTlsVerify", []))
842
+
843
+ @jsii.member(jsii_name="resetHealthCheckType")
844
+ def reset_health_check_type(self) -> None:
845
+ return typing.cast(None, jsii.invoke(self, "resetHealthCheckType", []))
846
+
847
+ @jsii.member(jsii_name="resetHealthCheckUrl")
848
+ def reset_health_check_url(self) -> None:
849
+ return typing.cast(None, jsii.invoke(self, "resetHealthCheckUrl", []))
850
+
851
+ @jsii.member(jsii_name="resetHttp2Enabled")
852
+ def reset_http2_enabled(self) -> None:
853
+ return typing.cast(None, jsii.invoke(self, "resetHttp2Enabled", []))
854
+
855
+ @jsii.member(jsii_name="resetOutboundProxyProtocol")
856
+ def reset_outbound_proxy_protocol(self) -> None:
857
+ return typing.cast(None, jsii.invoke(self, "resetOutboundProxyProtocol", []))
858
+
859
+ @jsii.member(jsii_name="resetStickySessionCookieName")
860
+ def reset_sticky_session_cookie_name(self) -> None:
861
+ return typing.cast(None, jsii.invoke(self, "resetStickySessionCookieName", []))
862
+
863
+ @jsii.member(jsii_name="resetTimeoutServer")
864
+ def reset_timeout_server(self) -> None:
865
+ return typing.cast(None, jsii.invoke(self, "resetTimeoutServer", []))
866
+
867
+ @jsii.member(jsii_name="resetTimeoutTunnel")
868
+ def reset_timeout_tunnel(self) -> None:
869
+ return typing.cast(None, jsii.invoke(self, "resetTimeoutTunnel", []))
870
+
871
+ @jsii.member(jsii_name="resetTlsEnabled")
872
+ def reset_tls_enabled(self) -> None:
873
+ return typing.cast(None, jsii.invoke(self, "resetTlsEnabled", []))
874
+
875
+ @jsii.member(jsii_name="resetTlsUseSystemCa")
876
+ def reset_tls_use_system_ca(self) -> None:
877
+ return typing.cast(None, jsii.invoke(self, "resetTlsUseSystemCa", []))
878
+
879
+ @jsii.member(jsii_name="resetTlsVerify")
880
+ def reset_tls_verify(self) -> None:
881
+ return typing.cast(None, jsii.invoke(self, "resetTlsVerify", []))
882
+
883
+ @builtins.property
884
+ @jsii.member(jsii_name="healthCheckExpectedStatusInput")
885
+ def health_check_expected_status_input(self) -> typing.Optional[jsii.Number]:
886
+ return typing.cast(typing.Optional[jsii.Number], jsii.get(self, "healthCheckExpectedStatusInput"))
887
+
888
+ @builtins.property
889
+ @jsii.member(jsii_name="healthCheckFallInput")
890
+ def health_check_fall_input(self) -> typing.Optional[jsii.Number]:
891
+ return typing.cast(typing.Optional[jsii.Number], jsii.get(self, "healthCheckFallInput"))
892
+
893
+ @builtins.property
894
+ @jsii.member(jsii_name="healthCheckIntervalInput")
895
+ def health_check_interval_input(self) -> typing.Optional[jsii.Number]:
896
+ return typing.cast(typing.Optional[jsii.Number], jsii.get(self, "healthCheckIntervalInput"))
897
+
898
+ @builtins.property
899
+ @jsii.member(jsii_name="healthCheckRiseInput")
900
+ def health_check_rise_input(self) -> typing.Optional[jsii.Number]:
901
+ return typing.cast(typing.Optional[jsii.Number], jsii.get(self, "healthCheckRiseInput"))
902
+
903
+ @builtins.property
904
+ @jsii.member(jsii_name="healthCheckTlsVerifyInput")
905
+ def health_check_tls_verify_input(
906
+ self,
907
+ ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
908
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], jsii.get(self, "healthCheckTlsVerifyInput"))
909
+
910
+ @builtins.property
911
+ @jsii.member(jsii_name="healthCheckTypeInput")
912
+ def health_check_type_input(self) -> typing.Optional[builtins.str]:
913
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "healthCheckTypeInput"))
914
+
915
+ @builtins.property
916
+ @jsii.member(jsii_name="healthCheckUrlInput")
917
+ def health_check_url_input(self) -> typing.Optional[builtins.str]:
918
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "healthCheckUrlInput"))
919
+
920
+ @builtins.property
921
+ @jsii.member(jsii_name="http2EnabledInput")
922
+ def http2_enabled_input(
923
+ self,
924
+ ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
925
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], jsii.get(self, "http2EnabledInput"))
926
+
927
+ @builtins.property
928
+ @jsii.member(jsii_name="outboundProxyProtocolInput")
929
+ def outbound_proxy_protocol_input(self) -> typing.Optional[builtins.str]:
930
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "outboundProxyProtocolInput"))
931
+
932
+ @builtins.property
933
+ @jsii.member(jsii_name="stickySessionCookieNameInput")
934
+ def sticky_session_cookie_name_input(self) -> typing.Optional[builtins.str]:
935
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "stickySessionCookieNameInput"))
936
+
937
+ @builtins.property
938
+ @jsii.member(jsii_name="timeoutServerInput")
939
+ def timeout_server_input(self) -> typing.Optional[jsii.Number]:
940
+ return typing.cast(typing.Optional[jsii.Number], jsii.get(self, "timeoutServerInput"))
941
+
942
+ @builtins.property
943
+ @jsii.member(jsii_name="timeoutTunnelInput")
944
+ def timeout_tunnel_input(self) -> typing.Optional[jsii.Number]:
945
+ return typing.cast(typing.Optional[jsii.Number], jsii.get(self, "timeoutTunnelInput"))
946
+
947
+ @builtins.property
948
+ @jsii.member(jsii_name="tlsEnabledInput")
949
+ def tls_enabled_input(
950
+ self,
951
+ ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
952
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], jsii.get(self, "tlsEnabledInput"))
953
+
954
+ @builtins.property
955
+ @jsii.member(jsii_name="tlsUseSystemCaInput")
956
+ def tls_use_system_ca_input(
957
+ self,
958
+ ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
959
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], jsii.get(self, "tlsUseSystemCaInput"))
960
+
961
+ @builtins.property
962
+ @jsii.member(jsii_name="tlsVerifyInput")
963
+ def tls_verify_input(
964
+ self,
965
+ ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
966
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], jsii.get(self, "tlsVerifyInput"))
967
+
968
+ @builtins.property
969
+ @jsii.member(jsii_name="healthCheckExpectedStatus")
970
+ def health_check_expected_status(self) -> jsii.Number:
971
+ return typing.cast(jsii.Number, jsii.get(self, "healthCheckExpectedStatus"))
972
+
973
+ @health_check_expected_status.setter
974
+ def health_check_expected_status(self, value: jsii.Number) -> None:
975
+ if __debug__:
976
+ type_hints = typing.get_type_hints(_typecheckingstub__7dc3f08a62f7f1c1d999cf41443e8d00ab201864398241c00de9cc77da1c2342)
977
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
978
+ jsii.set(self, "healthCheckExpectedStatus", value) # pyright: ignore[reportArgumentType]
979
+
980
+ @builtins.property
981
+ @jsii.member(jsii_name="healthCheckFall")
982
+ def health_check_fall(self) -> jsii.Number:
983
+ return typing.cast(jsii.Number, jsii.get(self, "healthCheckFall"))
984
+
985
+ @health_check_fall.setter
986
+ def health_check_fall(self, value: jsii.Number) -> None:
987
+ if __debug__:
988
+ type_hints = typing.get_type_hints(_typecheckingstub__8a74c22cd3b86c3c486e323569b855be74e55b4f1661df85a24cd150f9700581)
989
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
990
+ jsii.set(self, "healthCheckFall", value) # pyright: ignore[reportArgumentType]
991
+
992
+ @builtins.property
993
+ @jsii.member(jsii_name="healthCheckInterval")
994
+ def health_check_interval(self) -> jsii.Number:
995
+ return typing.cast(jsii.Number, jsii.get(self, "healthCheckInterval"))
996
+
997
+ @health_check_interval.setter
998
+ def health_check_interval(self, value: jsii.Number) -> None:
999
+ if __debug__:
1000
+ type_hints = typing.get_type_hints(_typecheckingstub__bc4a5fcdf1d72f3f8e196e0b9fe2c716f66386010cf2bcefe94884b091dd1099)
1001
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1002
+ jsii.set(self, "healthCheckInterval", value) # pyright: ignore[reportArgumentType]
1003
+
1004
+ @builtins.property
1005
+ @jsii.member(jsii_name="healthCheckRise")
1006
+ def health_check_rise(self) -> jsii.Number:
1007
+ return typing.cast(jsii.Number, jsii.get(self, "healthCheckRise"))
1008
+
1009
+ @health_check_rise.setter
1010
+ def health_check_rise(self, value: jsii.Number) -> None:
1011
+ if __debug__:
1012
+ type_hints = typing.get_type_hints(_typecheckingstub__5a005b6a89678311ae87bf7a8226f1b8b8341f6f7dbe94f53264244eec7b1941)
1013
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1014
+ jsii.set(self, "healthCheckRise", value) # pyright: ignore[reportArgumentType]
1015
+
1016
+ @builtins.property
1017
+ @jsii.member(jsii_name="healthCheckTlsVerify")
1018
+ def health_check_tls_verify(
1019
+ self,
1020
+ ) -> typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]:
1021
+ return typing.cast(typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable], jsii.get(self, "healthCheckTlsVerify"))
1022
+
1023
+ @health_check_tls_verify.setter
1024
+ def health_check_tls_verify(
1025
+ self,
1026
+ value: typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable],
1027
+ ) -> None:
1028
+ if __debug__:
1029
+ type_hints = typing.get_type_hints(_typecheckingstub__7a1f0408301a8ed0464e766b76ea9c173a85a6c5972f17c867955e8f12d24892)
1030
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1031
+ jsii.set(self, "healthCheckTlsVerify", value) # pyright: ignore[reportArgumentType]
1032
+
1033
+ @builtins.property
1034
+ @jsii.member(jsii_name="healthCheckType")
1035
+ def health_check_type(self) -> builtins.str:
1036
+ return typing.cast(builtins.str, jsii.get(self, "healthCheckType"))
1037
+
1038
+ @health_check_type.setter
1039
+ def health_check_type(self, value: builtins.str) -> None:
1040
+ if __debug__:
1041
+ type_hints = typing.get_type_hints(_typecheckingstub__8069e619c5eafcd61405a9b14ccbb5acc557f594802c36aa8bfd7d0fd8ff0219)
1042
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1043
+ jsii.set(self, "healthCheckType", value) # pyright: ignore[reportArgumentType]
1044
+
1045
+ @builtins.property
1046
+ @jsii.member(jsii_name="healthCheckUrl")
1047
+ def health_check_url(self) -> builtins.str:
1048
+ return typing.cast(builtins.str, jsii.get(self, "healthCheckUrl"))
1049
+
1050
+ @health_check_url.setter
1051
+ def health_check_url(self, value: builtins.str) -> None:
1052
+ if __debug__:
1053
+ type_hints = typing.get_type_hints(_typecheckingstub__39f4a5b6a60297078707410bf16c529278fa67e401d14af087347f4acdc4f238)
1054
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1055
+ jsii.set(self, "healthCheckUrl", value) # pyright: ignore[reportArgumentType]
1056
+
1057
+ @builtins.property
1058
+ @jsii.member(jsii_name="http2Enabled")
1059
+ def http2_enabled(self) -> typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]:
1060
+ return typing.cast(typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable], jsii.get(self, "http2Enabled"))
1061
+
1062
+ @http2_enabled.setter
1063
+ def http2_enabled(
1064
+ self,
1065
+ value: typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable],
1066
+ ) -> None:
1067
+ if __debug__:
1068
+ type_hints = typing.get_type_hints(_typecheckingstub__c0ed74c710cac92ea40127eb8683ef34d63adf6cf079484e9ba4e70ae1d9c121)
1069
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1070
+ jsii.set(self, "http2Enabled", value) # pyright: ignore[reportArgumentType]
1071
+
1072
+ @builtins.property
1073
+ @jsii.member(jsii_name="outboundProxyProtocol")
1074
+ def outbound_proxy_protocol(self) -> builtins.str:
1075
+ return typing.cast(builtins.str, jsii.get(self, "outboundProxyProtocol"))
1076
+
1077
+ @outbound_proxy_protocol.setter
1078
+ def outbound_proxy_protocol(self, value: builtins.str) -> None:
1079
+ if __debug__:
1080
+ type_hints = typing.get_type_hints(_typecheckingstub__643632d762dde3bfa52ccccc383516eae69f64de4c971e85aaa719e291c1c0fa)
1081
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1082
+ jsii.set(self, "outboundProxyProtocol", value) # pyright: ignore[reportArgumentType]
1083
+
1084
+ @builtins.property
1085
+ @jsii.member(jsii_name="stickySessionCookieName")
1086
+ def sticky_session_cookie_name(self) -> builtins.str:
1087
+ return typing.cast(builtins.str, jsii.get(self, "stickySessionCookieName"))
1088
+
1089
+ @sticky_session_cookie_name.setter
1090
+ def sticky_session_cookie_name(self, value: builtins.str) -> None:
1091
+ if __debug__:
1092
+ type_hints = typing.get_type_hints(_typecheckingstub__da3ab1d8ffd0ee740d498a68367ab415a83ea5bb95a96b7bca9efb4ce8d99490)
1093
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1094
+ jsii.set(self, "stickySessionCookieName", value) # pyright: ignore[reportArgumentType]
1095
+
1096
+ @builtins.property
1097
+ @jsii.member(jsii_name="timeoutServer")
1098
+ def timeout_server(self) -> jsii.Number:
1099
+ return typing.cast(jsii.Number, jsii.get(self, "timeoutServer"))
1100
+
1101
+ @timeout_server.setter
1102
+ def timeout_server(self, value: jsii.Number) -> None:
1103
+ if __debug__:
1104
+ type_hints = typing.get_type_hints(_typecheckingstub__62977787f77a98958c7b1c163fc10ef2d04d5473932b93993b385e7a7f4725a2)
1105
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1106
+ jsii.set(self, "timeoutServer", value) # pyright: ignore[reportArgumentType]
1107
+
1108
+ @builtins.property
1109
+ @jsii.member(jsii_name="timeoutTunnel")
1110
+ def timeout_tunnel(self) -> jsii.Number:
1111
+ return typing.cast(jsii.Number, jsii.get(self, "timeoutTunnel"))
1112
+
1113
+ @timeout_tunnel.setter
1114
+ def timeout_tunnel(self, value: jsii.Number) -> None:
1115
+ if __debug__:
1116
+ type_hints = typing.get_type_hints(_typecheckingstub__cd7554673f8db1f54b33f3b8832599eb58807a0023a40109ca959f715cf36c9b)
1117
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1118
+ jsii.set(self, "timeoutTunnel", value) # pyright: ignore[reportArgumentType]
1119
+
1120
+ @builtins.property
1121
+ @jsii.member(jsii_name="tlsEnabled")
1122
+ def tls_enabled(self) -> typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]:
1123
+ return typing.cast(typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable], jsii.get(self, "tlsEnabled"))
1124
+
1125
+ @tls_enabled.setter
1126
+ def tls_enabled(
1127
+ self,
1128
+ value: typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable],
1129
+ ) -> None:
1130
+ if __debug__:
1131
+ type_hints = typing.get_type_hints(_typecheckingstub__a3971da5b5c90f1fd23ac2242c668f5d56a0071530ac27f4ec552f8ec4ce9ee2)
1132
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1133
+ jsii.set(self, "tlsEnabled", value) # pyright: ignore[reportArgumentType]
1134
+
1135
+ @builtins.property
1136
+ @jsii.member(jsii_name="tlsUseSystemCa")
1137
+ def tls_use_system_ca(
1138
+ self,
1139
+ ) -> typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]:
1140
+ return typing.cast(typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable], jsii.get(self, "tlsUseSystemCa"))
1141
+
1142
+ @tls_use_system_ca.setter
1143
+ def tls_use_system_ca(
1144
+ self,
1145
+ value: typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable],
1146
+ ) -> None:
1147
+ if __debug__:
1148
+ type_hints = typing.get_type_hints(_typecheckingstub__97f6e28d7e94f7b38cfe76b70291b8c0170c52b48c78b10dc8f76b4703c093e9)
1149
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1150
+ jsii.set(self, "tlsUseSystemCa", value) # pyright: ignore[reportArgumentType]
1151
+
1152
+ @builtins.property
1153
+ @jsii.member(jsii_name="tlsVerify")
1154
+ def tls_verify(self) -> typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]:
1155
+ return typing.cast(typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable], jsii.get(self, "tlsVerify"))
1156
+
1157
+ @tls_verify.setter
1158
+ def tls_verify(
1159
+ self,
1160
+ value: typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable],
1161
+ ) -> None:
1162
+ if __debug__:
1163
+ type_hints = typing.get_type_hints(_typecheckingstub__0d060a9595c4cfc7ea56c1c33bf629d6166ba1a8b052484fd102442b53a67224)
1164
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1165
+ jsii.set(self, "tlsVerify", value) # pyright: ignore[reportArgumentType]
1166
+
1167
+ @builtins.property
1168
+ @jsii.member(jsii_name="internalValue")
1169
+ def internal_value(
1170
+ self,
1171
+ ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, LoadbalancerBackendProperties]]:
1172
+ return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, LoadbalancerBackendProperties]], jsii.get(self, "internalValue"))
1173
+
1174
+ @internal_value.setter
1175
+ def internal_value(
1176
+ self,
1177
+ value: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, LoadbalancerBackendProperties]],
1178
+ ) -> None:
1179
+ if __debug__:
1180
+ type_hints = typing.get_type_hints(_typecheckingstub__c8c6fb57a71c2e0e202ceab15eb8b409d80557a71150004a0caaf083b5bb1cb5)
1181
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
1182
+ jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
1183
+
1184
+
1185
+ __all__ = [
1186
+ "LoadbalancerBackend",
1187
+ "LoadbalancerBackendConfig",
1188
+ "LoadbalancerBackendProperties",
1189
+ "LoadbalancerBackendPropertiesList",
1190
+ "LoadbalancerBackendPropertiesOutputReference",
1191
+ ]
1192
+
1193
+ publication.publish()
1194
+
1195
+ def _typecheckingstub__a57ef11b06133e84b2cf13365b88e7f2dd34adb8674508adcf3a305129d291be(
1196
+ scope: _constructs_77d1e7e8.Construct,
1197
+ id: builtins.str,
1198
+ *,
1199
+ loadbalancer: builtins.str,
1200
+ name: builtins.str,
1201
+ properties: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[LoadbalancerBackendProperties, typing.Dict[builtins.str, typing.Any]]]]] = None,
1202
+ resolver_name: typing.Optional[builtins.str] = None,
1203
+ connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
1204
+ count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
1205
+ depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
1206
+ for_each: typing.Optional[_cdktf_9a9027ec.ITerraformIterator] = None,
1207
+ lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
1208
+ provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
1209
+ provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
1210
+ ) -> None:
1211
+ """Type checking stubs"""
1212
+ pass
1213
+
1214
+ def _typecheckingstub__a39303f6431c9b45110a25cf70f07bd7d65ab86e3d142d38f4c3a889e9439f80(
1215
+ scope: _constructs_77d1e7e8.Construct,
1216
+ import_to_id: builtins.str,
1217
+ import_from_id: builtins.str,
1218
+ provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
1219
+ ) -> None:
1220
+ """Type checking stubs"""
1221
+ pass
1222
+
1223
+ def _typecheckingstub__425dcb0894c6def77121cea82a4b7926cb641081761e4828ac7bf13b99d8c4b4(
1224
+ value: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[LoadbalancerBackendProperties, typing.Dict[builtins.str, typing.Any]]]],
1225
+ ) -> None:
1226
+ """Type checking stubs"""
1227
+ pass
1228
+
1229
+ def _typecheckingstub__758a0ce0d7c7b27aef039a1ababb5170b2dcdca319a675ca5481e137f044e6e5(
1230
+ value: builtins.str,
1231
+ ) -> None:
1232
+ """Type checking stubs"""
1233
+ pass
1234
+
1235
+ def _typecheckingstub__de7b9fba80a9bd9724064ce7ebd66895bd34dfa89b05268124ea8a52d91572a5(
1236
+ value: builtins.str,
1237
+ ) -> None:
1238
+ """Type checking stubs"""
1239
+ pass
1240
+
1241
+ def _typecheckingstub__8d83b8ad74717dbbf2ec7a84d12d1c3f9b89191c4cd0c797584da512a2560f3b(
1242
+ value: builtins.str,
1243
+ ) -> None:
1244
+ """Type checking stubs"""
1245
+ pass
1246
+
1247
+ def _typecheckingstub__6200f98d574a6cde907c9b763cf17de76dec005cc13d69bf52a284d828392061(
1248
+ *,
1249
+ connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
1250
+ count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
1251
+ depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
1252
+ for_each: typing.Optional[_cdktf_9a9027ec.ITerraformIterator] = None,
1253
+ lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
1254
+ provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
1255
+ provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
1256
+ loadbalancer: builtins.str,
1257
+ name: builtins.str,
1258
+ properties: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[LoadbalancerBackendProperties, typing.Dict[builtins.str, typing.Any]]]]] = None,
1259
+ resolver_name: typing.Optional[builtins.str] = None,
1260
+ ) -> None:
1261
+ """Type checking stubs"""
1262
+ pass
1263
+
1264
+ def _typecheckingstub__eb5988403ea7b17ea78d8a97176e2db70e4258ead0d52fc7ab7102412ecccf40(
1265
+ *,
1266
+ health_check_expected_status: typing.Optional[jsii.Number] = None,
1267
+ health_check_fall: typing.Optional[jsii.Number] = None,
1268
+ health_check_interval: typing.Optional[jsii.Number] = None,
1269
+ health_check_rise: typing.Optional[jsii.Number] = None,
1270
+ health_check_tls_verify: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
1271
+ health_check_type: typing.Optional[builtins.str] = None,
1272
+ health_check_url: typing.Optional[builtins.str] = None,
1273
+ http2_enabled: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
1274
+ outbound_proxy_protocol: typing.Optional[builtins.str] = None,
1275
+ sticky_session_cookie_name: typing.Optional[builtins.str] = None,
1276
+ timeout_server: typing.Optional[jsii.Number] = None,
1277
+ timeout_tunnel: typing.Optional[jsii.Number] = None,
1278
+ tls_enabled: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
1279
+ tls_use_system_ca: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
1280
+ tls_verify: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
1281
+ ) -> None:
1282
+ """Type checking stubs"""
1283
+ pass
1284
+
1285
+ def _typecheckingstub__6466001e8d1ef72578f27d793b879e51bb3e572eaef9521b980d493595bc42c3(
1286
+ terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
1287
+ terraform_attribute: builtins.str,
1288
+ wraps_set: builtins.bool,
1289
+ ) -> None:
1290
+ """Type checking stubs"""
1291
+ pass
1292
+
1293
+ def _typecheckingstub__79f867fbff964aa075654e4e8af16ff600c59120999a45f0bb5d4eebbf7df082(
1294
+ index: jsii.Number,
1295
+ ) -> None:
1296
+ """Type checking stubs"""
1297
+ pass
1298
+
1299
+ def _typecheckingstub__9951e06afb155147ab301d7a3de3cd2fdf2af7a2dd07afb0107d1f31f5a9afe1(
1300
+ value: builtins.str,
1301
+ ) -> None:
1302
+ """Type checking stubs"""
1303
+ pass
1304
+
1305
+ def _typecheckingstub__1f8a6b5225ae6d3e8dbe934b52f44ed3cf6e1d733e66b15339254b7710ecc1bc(
1306
+ value: _cdktf_9a9027ec.IInterpolatingParent,
1307
+ ) -> None:
1308
+ """Type checking stubs"""
1309
+ pass
1310
+
1311
+ def _typecheckingstub__2b068ef6542bae20782fcaa4e350a92c8cd34d45062fcf493a138e97a0b38f86(
1312
+ value: builtins.bool,
1313
+ ) -> None:
1314
+ """Type checking stubs"""
1315
+ pass
1316
+
1317
+ def _typecheckingstub__f8e732b3935e5c2c284f9e0a1a9b80014417767d3cb70421fd39ff444d5c67bf(
1318
+ value: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List[LoadbalancerBackendProperties]]],
1319
+ ) -> None:
1320
+ """Type checking stubs"""
1321
+ pass
1322
+
1323
+ def _typecheckingstub__0c083897711e36589f6551ae9e4bc07921aadcee7d8ec5d8bee78e03d6160dda(
1324
+ terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
1325
+ terraform_attribute: builtins.str,
1326
+ complex_object_index: jsii.Number,
1327
+ complex_object_is_from_set: builtins.bool,
1328
+ ) -> None:
1329
+ """Type checking stubs"""
1330
+ pass
1331
+
1332
+ def _typecheckingstub__7dc3f08a62f7f1c1d999cf41443e8d00ab201864398241c00de9cc77da1c2342(
1333
+ value: jsii.Number,
1334
+ ) -> None:
1335
+ """Type checking stubs"""
1336
+ pass
1337
+
1338
+ def _typecheckingstub__8a74c22cd3b86c3c486e323569b855be74e55b4f1661df85a24cd150f9700581(
1339
+ value: jsii.Number,
1340
+ ) -> None:
1341
+ """Type checking stubs"""
1342
+ pass
1343
+
1344
+ def _typecheckingstub__bc4a5fcdf1d72f3f8e196e0b9fe2c716f66386010cf2bcefe94884b091dd1099(
1345
+ value: jsii.Number,
1346
+ ) -> None:
1347
+ """Type checking stubs"""
1348
+ pass
1349
+
1350
+ def _typecheckingstub__5a005b6a89678311ae87bf7a8226f1b8b8341f6f7dbe94f53264244eec7b1941(
1351
+ value: jsii.Number,
1352
+ ) -> None:
1353
+ """Type checking stubs"""
1354
+ pass
1355
+
1356
+ def _typecheckingstub__7a1f0408301a8ed0464e766b76ea9c173a85a6c5972f17c867955e8f12d24892(
1357
+ value: typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable],
1358
+ ) -> None:
1359
+ """Type checking stubs"""
1360
+ pass
1361
+
1362
+ def _typecheckingstub__8069e619c5eafcd61405a9b14ccbb5acc557f594802c36aa8bfd7d0fd8ff0219(
1363
+ value: builtins.str,
1364
+ ) -> None:
1365
+ """Type checking stubs"""
1366
+ pass
1367
+
1368
+ def _typecheckingstub__39f4a5b6a60297078707410bf16c529278fa67e401d14af087347f4acdc4f238(
1369
+ value: builtins.str,
1370
+ ) -> None:
1371
+ """Type checking stubs"""
1372
+ pass
1373
+
1374
+ def _typecheckingstub__c0ed74c710cac92ea40127eb8683ef34d63adf6cf079484e9ba4e70ae1d9c121(
1375
+ value: typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable],
1376
+ ) -> None:
1377
+ """Type checking stubs"""
1378
+ pass
1379
+
1380
+ def _typecheckingstub__643632d762dde3bfa52ccccc383516eae69f64de4c971e85aaa719e291c1c0fa(
1381
+ value: builtins.str,
1382
+ ) -> None:
1383
+ """Type checking stubs"""
1384
+ pass
1385
+
1386
+ def _typecheckingstub__da3ab1d8ffd0ee740d498a68367ab415a83ea5bb95a96b7bca9efb4ce8d99490(
1387
+ value: builtins.str,
1388
+ ) -> None:
1389
+ """Type checking stubs"""
1390
+ pass
1391
+
1392
+ def _typecheckingstub__62977787f77a98958c7b1c163fc10ef2d04d5473932b93993b385e7a7f4725a2(
1393
+ value: jsii.Number,
1394
+ ) -> None:
1395
+ """Type checking stubs"""
1396
+ pass
1397
+
1398
+ def _typecheckingstub__cd7554673f8db1f54b33f3b8832599eb58807a0023a40109ca959f715cf36c9b(
1399
+ value: jsii.Number,
1400
+ ) -> None:
1401
+ """Type checking stubs"""
1402
+ pass
1403
+
1404
+ def _typecheckingstub__a3971da5b5c90f1fd23ac2242c668f5d56a0071530ac27f4ec552f8ec4ce9ee2(
1405
+ value: typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable],
1406
+ ) -> None:
1407
+ """Type checking stubs"""
1408
+ pass
1409
+
1410
+ def _typecheckingstub__97f6e28d7e94f7b38cfe76b70291b8c0170c52b48c78b10dc8f76b4703c093e9(
1411
+ value: typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable],
1412
+ ) -> None:
1413
+ """Type checking stubs"""
1414
+ pass
1415
+
1416
+ def _typecheckingstub__0d060a9595c4cfc7ea56c1c33bf629d6166ba1a8b052484fd102442b53a67224(
1417
+ value: typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable],
1418
+ ) -> None:
1419
+ """Type checking stubs"""
1420
+ pass
1421
+
1422
+ def _typecheckingstub__c8c6fb57a71c2e0e202ceab15eb8b409d80557a71150004a0caaf083b5bb1cb5(
1423
+ value: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, LoadbalancerBackendProperties]],
1424
+ ) -> None:
1425
+ """Type checking stubs"""
1426
+ pass