cdktf-cdktf-provider-upcloud 15.8.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- cdktf_cdktf_provider_upcloud/__init__.py +247 -0
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +45 -0
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.8.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +894 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +633 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +384 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_load_balancer_dns_challenge_domain/__init__.py +319 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +853 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +717 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +1084 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_valkey_sessions/__init__.py +898 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +647 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +600 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +1093 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +725 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +558 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +421 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +364 -0
- cdktf_cdktf_provider_upcloud/file_storage/__init__.py +1683 -0
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +1233 -0
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +552 -0
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +1167 -0
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +1299 -0
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +1357 -0
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +801 -0
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +2674 -0
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +2113 -0
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +1426 -0
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +442 -0
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +633 -0
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +459 -0
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +1290 -0
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +11486 -0
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +442 -0
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +504 -0
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +659 -0
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +633 -0
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +536 -0
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +4644 -0
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +13812 -0
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +7734 -0
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +1541 -0
- cdktf_cdktf_provider_upcloud/managed_database_valkey/__init__.py +3355 -0
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +1198 -0
- cdktf_cdktf_provider_upcloud/managed_object_storage_bucket/__init__.py +409 -0
- cdktf_cdktf_provider_upcloud/managed_object_storage_custom_domain/__init__.py +446 -0
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +521 -0
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +454 -0
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +505 -0
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +485 -0
- cdktf_cdktf_provider_upcloud/network/__init__.py +1554 -0
- cdktf_cdktf_provider_upcloud/network_peering/__init__.py +1084 -0
- cdktf_cdktf_provider_upcloud/provider/__init__.py +544 -0
- cdktf_cdktf_provider_upcloud/py.typed +1 -0
- cdktf_cdktf_provider_upcloud/router/__init__.py +1030 -0
- cdktf_cdktf_provider_upcloud/server/__init__.py +4542 -0
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +571 -0
- cdktf_cdktf_provider_upcloud/storage/__init__.py +1850 -0
- cdktf_cdktf_provider_upcloud/storage_backup/__init__.py +483 -0
- cdktf_cdktf_provider_upcloud/storage_template/__init__.py +478 -0
- cdktf_cdktf_provider_upcloud/tag/__init__.py +493 -0
- cdktf_cdktf_provider_upcloud-15.8.0.dist-info/LICENSE +355 -0
- cdktf_cdktf_provider_upcloud-15.8.0.dist-info/METADATA +120 -0
- cdktf_cdktf_provider_upcloud-15.8.0.dist-info/RECORD +66 -0
- cdktf_cdktf_provider_upcloud-15.8.0.dist-info/WHEEL +5 -0
- cdktf_cdktf_provider_upcloud-15.8.0.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,1426 @@
|
|
|
1
|
+
r'''
|
|
2
|
+
# `upcloud_loadbalancer_backend`
|
|
3
|
+
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_loadbalancer_backend`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend).
|
|
5
|
+
'''
|
|
6
|
+
from pkgutil import extend_path
|
|
7
|
+
__path__ = extend_path(__path__, __name__)
|
|
8
|
+
|
|
9
|
+
import abc
|
|
10
|
+
import builtins
|
|
11
|
+
import datetime
|
|
12
|
+
import enum
|
|
13
|
+
import typing
|
|
14
|
+
|
|
15
|
+
import jsii
|
|
16
|
+
import publication
|
|
17
|
+
import typing_extensions
|
|
18
|
+
|
|
19
|
+
import typeguard
|
|
20
|
+
from importlib.metadata import version as _metadata_package_version
|
|
21
|
+
TYPEGUARD_MAJOR_VERSION = int(_metadata_package_version('typeguard').split('.')[0])
|
|
22
|
+
|
|
23
|
+
def check_type(argname: str, value: object, expected_type: typing.Any) -> typing.Any:
|
|
24
|
+
if TYPEGUARD_MAJOR_VERSION <= 2:
|
|
25
|
+
return typeguard.check_type(argname=argname, value=value, expected_type=expected_type) # type:ignore
|
|
26
|
+
else:
|
|
27
|
+
if isinstance(value, jsii._reference_map.InterfaceDynamicProxy): # pyright: ignore [reportAttributeAccessIssue]
|
|
28
|
+
pass
|
|
29
|
+
else:
|
|
30
|
+
if TYPEGUARD_MAJOR_VERSION == 3:
|
|
31
|
+
typeguard.config.collection_check_strategy = typeguard.CollectionCheckStrategy.ALL_ITEMS # type:ignore
|
|
32
|
+
typeguard.check_type(value=value, expected_type=expected_type) # type:ignore
|
|
33
|
+
else:
|
|
34
|
+
typeguard.check_type(value=value, expected_type=expected_type, collection_check_strategy=typeguard.CollectionCheckStrategy.ALL_ITEMS) # type:ignore
|
|
35
|
+
|
|
36
|
+
from .._jsii import *
|
|
37
|
+
|
|
38
|
+
import cdktf as _cdktf_9a9027ec
|
|
39
|
+
import constructs as _constructs_77d1e7e8
|
|
40
|
+
|
|
41
|
+
|
|
42
|
+
class LoadbalancerBackend(
|
|
43
|
+
_cdktf_9a9027ec.TerraformResource,
|
|
44
|
+
metaclass=jsii.JSIIMeta,
|
|
45
|
+
jsii_type="@cdktf/provider-upcloud.loadbalancerBackend.LoadbalancerBackend",
|
|
46
|
+
):
|
|
47
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend upcloud_loadbalancer_backend}.'''
|
|
48
|
+
|
|
49
|
+
def __init__(
|
|
50
|
+
self,
|
|
51
|
+
scope: _constructs_77d1e7e8.Construct,
|
|
52
|
+
id: builtins.str,
|
|
53
|
+
*,
|
|
54
|
+
loadbalancer: builtins.str,
|
|
55
|
+
name: builtins.str,
|
|
56
|
+
properties: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["LoadbalancerBackendProperties", typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
57
|
+
resolver_name: typing.Optional[builtins.str] = None,
|
|
58
|
+
connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
59
|
+
count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
|
|
60
|
+
depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
|
|
61
|
+
for_each: typing.Optional[_cdktf_9a9027ec.ITerraformIterator] = None,
|
|
62
|
+
lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
63
|
+
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
64
|
+
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
65
|
+
) -> None:
|
|
66
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend upcloud_loadbalancer_backend} Resource.
|
|
67
|
+
|
|
68
|
+
:param scope: The scope in which to define this construct.
|
|
69
|
+
:param id: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
70
|
+
:param loadbalancer: UUID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#loadbalancer LoadbalancerBackend#loadbalancer}
|
|
71
|
+
:param name: The name of the backend. Must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#name LoadbalancerBackend#name}
|
|
72
|
+
:param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#properties LoadbalancerBackend#properties}
|
|
73
|
+
:param resolver_name: Domain name resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
|
|
74
|
+
:param connection:
|
|
75
|
+
:param count:
|
|
76
|
+
:param depends_on:
|
|
77
|
+
:param for_each:
|
|
78
|
+
:param lifecycle:
|
|
79
|
+
:param provider:
|
|
80
|
+
:param provisioners:
|
|
81
|
+
'''
|
|
82
|
+
if __debug__:
|
|
83
|
+
type_hints = typing.get_type_hints(_typecheckingstub__a57ef11b06133e84b2cf13365b88e7f2dd34adb8674508adcf3a305129d291be)
|
|
84
|
+
check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
|
|
85
|
+
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
86
|
+
config = LoadbalancerBackendConfig(
|
|
87
|
+
loadbalancer=loadbalancer,
|
|
88
|
+
name=name,
|
|
89
|
+
properties=properties,
|
|
90
|
+
resolver_name=resolver_name,
|
|
91
|
+
connection=connection,
|
|
92
|
+
count=count,
|
|
93
|
+
depends_on=depends_on,
|
|
94
|
+
for_each=for_each,
|
|
95
|
+
lifecycle=lifecycle,
|
|
96
|
+
provider=provider,
|
|
97
|
+
provisioners=provisioners,
|
|
98
|
+
)
|
|
99
|
+
|
|
100
|
+
jsii.create(self.__class__, self, [scope, id, config])
|
|
101
|
+
|
|
102
|
+
@jsii.member(jsii_name="generateConfigForImport")
|
|
103
|
+
@builtins.classmethod
|
|
104
|
+
def generate_config_for_import(
|
|
105
|
+
cls,
|
|
106
|
+
scope: _constructs_77d1e7e8.Construct,
|
|
107
|
+
import_to_id: builtins.str,
|
|
108
|
+
import_from_id: builtins.str,
|
|
109
|
+
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
110
|
+
) -> _cdktf_9a9027ec.ImportableResource:
|
|
111
|
+
'''Generates CDKTF code for importing a LoadbalancerBackend resource upon running "cdktf plan ".
|
|
112
|
+
|
|
113
|
+
:param scope: The scope in which to define this construct.
|
|
114
|
+
:param import_to_id: The construct id used in the generated config for the LoadbalancerBackend to import.
|
|
115
|
+
:param import_from_id: The id of the existing LoadbalancerBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#import import section} in the documentation of this resource for the id to use
|
|
116
|
+
:param provider: ? Optional instance of the provider where the LoadbalancerBackend to import is found.
|
|
117
|
+
'''
|
|
118
|
+
if __debug__:
|
|
119
|
+
type_hints = typing.get_type_hints(_typecheckingstub__a39303f6431c9b45110a25cf70f07bd7d65ab86e3d142d38f4c3a889e9439f80)
|
|
120
|
+
check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
|
|
121
|
+
check_type(argname="argument import_to_id", value=import_to_id, expected_type=type_hints["import_to_id"])
|
|
122
|
+
check_type(argname="argument import_from_id", value=import_from_id, expected_type=type_hints["import_from_id"])
|
|
123
|
+
check_type(argname="argument provider", value=provider, expected_type=type_hints["provider"])
|
|
124
|
+
return typing.cast(_cdktf_9a9027ec.ImportableResource, jsii.sinvoke(cls, "generateConfigForImport", [scope, import_to_id, import_from_id, provider]))
|
|
125
|
+
|
|
126
|
+
@jsii.member(jsii_name="putProperties")
|
|
127
|
+
def put_properties(
|
|
128
|
+
self,
|
|
129
|
+
value: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["LoadbalancerBackendProperties", typing.Dict[builtins.str, typing.Any]]]],
|
|
130
|
+
) -> None:
|
|
131
|
+
'''
|
|
132
|
+
:param value: -
|
|
133
|
+
'''
|
|
134
|
+
if __debug__:
|
|
135
|
+
type_hints = typing.get_type_hints(_typecheckingstub__425dcb0894c6def77121cea82a4b7926cb641081761e4828ac7bf13b99d8c4b4)
|
|
136
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
137
|
+
return typing.cast(None, jsii.invoke(self, "putProperties", [value]))
|
|
138
|
+
|
|
139
|
+
@jsii.member(jsii_name="resetProperties")
|
|
140
|
+
def reset_properties(self) -> None:
|
|
141
|
+
return typing.cast(None, jsii.invoke(self, "resetProperties", []))
|
|
142
|
+
|
|
143
|
+
@jsii.member(jsii_name="resetResolverName")
|
|
144
|
+
def reset_resolver_name(self) -> None:
|
|
145
|
+
return typing.cast(None, jsii.invoke(self, "resetResolverName", []))
|
|
146
|
+
|
|
147
|
+
@jsii.member(jsii_name="synthesizeAttributes")
|
|
148
|
+
def _synthesize_attributes(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
149
|
+
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "synthesizeAttributes", []))
|
|
150
|
+
|
|
151
|
+
@jsii.member(jsii_name="synthesizeHclAttributes")
|
|
152
|
+
def _synthesize_hcl_attributes(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
153
|
+
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "synthesizeHclAttributes", []))
|
|
154
|
+
|
|
155
|
+
@jsii.python.classproperty
|
|
156
|
+
@jsii.member(jsii_name="tfResourceType")
|
|
157
|
+
def TF_RESOURCE_TYPE(cls) -> builtins.str:
|
|
158
|
+
return typing.cast(builtins.str, jsii.sget(cls, "tfResourceType"))
|
|
159
|
+
|
|
160
|
+
@builtins.property
|
|
161
|
+
@jsii.member(jsii_name="id")
|
|
162
|
+
def id(self) -> builtins.str:
|
|
163
|
+
return typing.cast(builtins.str, jsii.get(self, "id"))
|
|
164
|
+
|
|
165
|
+
@builtins.property
|
|
166
|
+
@jsii.member(jsii_name="members")
|
|
167
|
+
def members(self) -> typing.List[builtins.str]:
|
|
168
|
+
return typing.cast(typing.List[builtins.str], jsii.get(self, "members"))
|
|
169
|
+
|
|
170
|
+
@builtins.property
|
|
171
|
+
@jsii.member(jsii_name="properties")
|
|
172
|
+
def properties(self) -> "LoadbalancerBackendPropertiesList":
|
|
173
|
+
return typing.cast("LoadbalancerBackendPropertiesList", jsii.get(self, "properties"))
|
|
174
|
+
|
|
175
|
+
@builtins.property
|
|
176
|
+
@jsii.member(jsii_name="tlsConfigs")
|
|
177
|
+
def tls_configs(self) -> typing.List[builtins.str]:
|
|
178
|
+
return typing.cast(typing.List[builtins.str], jsii.get(self, "tlsConfigs"))
|
|
179
|
+
|
|
180
|
+
@builtins.property
|
|
181
|
+
@jsii.member(jsii_name="loadbalancerInput")
|
|
182
|
+
def loadbalancer_input(self) -> typing.Optional[builtins.str]:
|
|
183
|
+
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "loadbalancerInput"))
|
|
184
|
+
|
|
185
|
+
@builtins.property
|
|
186
|
+
@jsii.member(jsii_name="nameInput")
|
|
187
|
+
def name_input(self) -> typing.Optional[builtins.str]:
|
|
188
|
+
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "nameInput"))
|
|
189
|
+
|
|
190
|
+
@builtins.property
|
|
191
|
+
@jsii.member(jsii_name="propertiesInput")
|
|
192
|
+
def properties_input(
|
|
193
|
+
self,
|
|
194
|
+
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["LoadbalancerBackendProperties"]]]:
|
|
195
|
+
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["LoadbalancerBackendProperties"]]], jsii.get(self, "propertiesInput"))
|
|
196
|
+
|
|
197
|
+
@builtins.property
|
|
198
|
+
@jsii.member(jsii_name="resolverNameInput")
|
|
199
|
+
def resolver_name_input(self) -> typing.Optional[builtins.str]:
|
|
200
|
+
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "resolverNameInput"))
|
|
201
|
+
|
|
202
|
+
@builtins.property
|
|
203
|
+
@jsii.member(jsii_name="loadbalancer")
|
|
204
|
+
def loadbalancer(self) -> builtins.str:
|
|
205
|
+
return typing.cast(builtins.str, jsii.get(self, "loadbalancer"))
|
|
206
|
+
|
|
207
|
+
@loadbalancer.setter
|
|
208
|
+
def loadbalancer(self, value: builtins.str) -> None:
|
|
209
|
+
if __debug__:
|
|
210
|
+
type_hints = typing.get_type_hints(_typecheckingstub__758a0ce0d7c7b27aef039a1ababb5170b2dcdca319a675ca5481e137f044e6e5)
|
|
211
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
212
|
+
jsii.set(self, "loadbalancer", value) # pyright: ignore[reportArgumentType]
|
|
213
|
+
|
|
214
|
+
@builtins.property
|
|
215
|
+
@jsii.member(jsii_name="name")
|
|
216
|
+
def name(self) -> builtins.str:
|
|
217
|
+
return typing.cast(builtins.str, jsii.get(self, "name"))
|
|
218
|
+
|
|
219
|
+
@name.setter
|
|
220
|
+
def name(self, value: builtins.str) -> None:
|
|
221
|
+
if __debug__:
|
|
222
|
+
type_hints = typing.get_type_hints(_typecheckingstub__de7b9fba80a9bd9724064ce7ebd66895bd34dfa89b05268124ea8a52d91572a5)
|
|
223
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
224
|
+
jsii.set(self, "name", value) # pyright: ignore[reportArgumentType]
|
|
225
|
+
|
|
226
|
+
@builtins.property
|
|
227
|
+
@jsii.member(jsii_name="resolverName")
|
|
228
|
+
def resolver_name(self) -> builtins.str:
|
|
229
|
+
return typing.cast(builtins.str, jsii.get(self, "resolverName"))
|
|
230
|
+
|
|
231
|
+
@resolver_name.setter
|
|
232
|
+
def resolver_name(self, value: builtins.str) -> None:
|
|
233
|
+
if __debug__:
|
|
234
|
+
type_hints = typing.get_type_hints(_typecheckingstub__8d83b8ad74717dbbf2ec7a84d12d1c3f9b89191c4cd0c797584da512a2560f3b)
|
|
235
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
236
|
+
jsii.set(self, "resolverName", value) # pyright: ignore[reportArgumentType]
|
|
237
|
+
|
|
238
|
+
|
|
239
|
+
@jsii.data_type(
|
|
240
|
+
jsii_type="@cdktf/provider-upcloud.loadbalancerBackend.LoadbalancerBackendConfig",
|
|
241
|
+
jsii_struct_bases=[_cdktf_9a9027ec.TerraformMetaArguments],
|
|
242
|
+
name_mapping={
|
|
243
|
+
"connection": "connection",
|
|
244
|
+
"count": "count",
|
|
245
|
+
"depends_on": "dependsOn",
|
|
246
|
+
"for_each": "forEach",
|
|
247
|
+
"lifecycle": "lifecycle",
|
|
248
|
+
"provider": "provider",
|
|
249
|
+
"provisioners": "provisioners",
|
|
250
|
+
"loadbalancer": "loadbalancer",
|
|
251
|
+
"name": "name",
|
|
252
|
+
"properties": "properties",
|
|
253
|
+
"resolver_name": "resolverName",
|
|
254
|
+
},
|
|
255
|
+
)
|
|
256
|
+
class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
257
|
+
def __init__(
|
|
258
|
+
self,
|
|
259
|
+
*,
|
|
260
|
+
connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
261
|
+
count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
|
|
262
|
+
depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
|
|
263
|
+
for_each: typing.Optional[_cdktf_9a9027ec.ITerraformIterator] = None,
|
|
264
|
+
lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
265
|
+
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
266
|
+
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
267
|
+
loadbalancer: builtins.str,
|
|
268
|
+
name: builtins.str,
|
|
269
|
+
properties: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["LoadbalancerBackendProperties", typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
270
|
+
resolver_name: typing.Optional[builtins.str] = None,
|
|
271
|
+
) -> None:
|
|
272
|
+
'''
|
|
273
|
+
:param connection:
|
|
274
|
+
:param count:
|
|
275
|
+
:param depends_on:
|
|
276
|
+
:param for_each:
|
|
277
|
+
:param lifecycle:
|
|
278
|
+
:param provider:
|
|
279
|
+
:param provisioners:
|
|
280
|
+
:param loadbalancer: UUID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#loadbalancer LoadbalancerBackend#loadbalancer}
|
|
281
|
+
:param name: The name of the backend. Must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#name LoadbalancerBackend#name}
|
|
282
|
+
:param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#properties LoadbalancerBackend#properties}
|
|
283
|
+
:param resolver_name: Domain name resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
|
|
284
|
+
'''
|
|
285
|
+
if isinstance(lifecycle, dict):
|
|
286
|
+
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
287
|
+
if __debug__:
|
|
288
|
+
type_hints = typing.get_type_hints(_typecheckingstub__6200f98d574a6cde907c9b763cf17de76dec005cc13d69bf52a284d828392061)
|
|
289
|
+
check_type(argname="argument connection", value=connection, expected_type=type_hints["connection"])
|
|
290
|
+
check_type(argname="argument count", value=count, expected_type=type_hints["count"])
|
|
291
|
+
check_type(argname="argument depends_on", value=depends_on, expected_type=type_hints["depends_on"])
|
|
292
|
+
check_type(argname="argument for_each", value=for_each, expected_type=type_hints["for_each"])
|
|
293
|
+
check_type(argname="argument lifecycle", value=lifecycle, expected_type=type_hints["lifecycle"])
|
|
294
|
+
check_type(argname="argument provider", value=provider, expected_type=type_hints["provider"])
|
|
295
|
+
check_type(argname="argument provisioners", value=provisioners, expected_type=type_hints["provisioners"])
|
|
296
|
+
check_type(argname="argument loadbalancer", value=loadbalancer, expected_type=type_hints["loadbalancer"])
|
|
297
|
+
check_type(argname="argument name", value=name, expected_type=type_hints["name"])
|
|
298
|
+
check_type(argname="argument properties", value=properties, expected_type=type_hints["properties"])
|
|
299
|
+
check_type(argname="argument resolver_name", value=resolver_name, expected_type=type_hints["resolver_name"])
|
|
300
|
+
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
301
|
+
"loadbalancer": loadbalancer,
|
|
302
|
+
"name": name,
|
|
303
|
+
}
|
|
304
|
+
if connection is not None:
|
|
305
|
+
self._values["connection"] = connection
|
|
306
|
+
if count is not None:
|
|
307
|
+
self._values["count"] = count
|
|
308
|
+
if depends_on is not None:
|
|
309
|
+
self._values["depends_on"] = depends_on
|
|
310
|
+
if for_each is not None:
|
|
311
|
+
self._values["for_each"] = for_each
|
|
312
|
+
if lifecycle is not None:
|
|
313
|
+
self._values["lifecycle"] = lifecycle
|
|
314
|
+
if provider is not None:
|
|
315
|
+
self._values["provider"] = provider
|
|
316
|
+
if provisioners is not None:
|
|
317
|
+
self._values["provisioners"] = provisioners
|
|
318
|
+
if properties is not None:
|
|
319
|
+
self._values["properties"] = properties
|
|
320
|
+
if resolver_name is not None:
|
|
321
|
+
self._values["resolver_name"] = resolver_name
|
|
322
|
+
|
|
323
|
+
@builtins.property
|
|
324
|
+
def connection(
|
|
325
|
+
self,
|
|
326
|
+
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, _cdktf_9a9027ec.WinrmProvisionerConnection]]:
|
|
327
|
+
'''
|
|
328
|
+
:stability: experimental
|
|
329
|
+
'''
|
|
330
|
+
result = self._values.get("connection")
|
|
331
|
+
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, _cdktf_9a9027ec.WinrmProvisionerConnection]], result)
|
|
332
|
+
|
|
333
|
+
@builtins.property
|
|
334
|
+
def count(
|
|
335
|
+
self,
|
|
336
|
+
) -> typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]]:
|
|
337
|
+
'''
|
|
338
|
+
:stability: experimental
|
|
339
|
+
'''
|
|
340
|
+
result = self._values.get("count")
|
|
341
|
+
return typing.cast(typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]], result)
|
|
342
|
+
|
|
343
|
+
@builtins.property
|
|
344
|
+
def depends_on(
|
|
345
|
+
self,
|
|
346
|
+
) -> typing.Optional[typing.List[_cdktf_9a9027ec.ITerraformDependable]]:
|
|
347
|
+
'''
|
|
348
|
+
:stability: experimental
|
|
349
|
+
'''
|
|
350
|
+
result = self._values.get("depends_on")
|
|
351
|
+
return typing.cast(typing.Optional[typing.List[_cdktf_9a9027ec.ITerraformDependable]], result)
|
|
352
|
+
|
|
353
|
+
@builtins.property
|
|
354
|
+
def for_each(self) -> typing.Optional[_cdktf_9a9027ec.ITerraformIterator]:
|
|
355
|
+
'''
|
|
356
|
+
:stability: experimental
|
|
357
|
+
'''
|
|
358
|
+
result = self._values.get("for_each")
|
|
359
|
+
return typing.cast(typing.Optional[_cdktf_9a9027ec.ITerraformIterator], result)
|
|
360
|
+
|
|
361
|
+
@builtins.property
|
|
362
|
+
def lifecycle(self) -> typing.Optional[_cdktf_9a9027ec.TerraformResourceLifecycle]:
|
|
363
|
+
'''
|
|
364
|
+
:stability: experimental
|
|
365
|
+
'''
|
|
366
|
+
result = self._values.get("lifecycle")
|
|
367
|
+
return typing.cast(typing.Optional[_cdktf_9a9027ec.TerraformResourceLifecycle], result)
|
|
368
|
+
|
|
369
|
+
@builtins.property
|
|
370
|
+
def provider(self) -> typing.Optional[_cdktf_9a9027ec.TerraformProvider]:
|
|
371
|
+
'''
|
|
372
|
+
:stability: experimental
|
|
373
|
+
'''
|
|
374
|
+
result = self._values.get("provider")
|
|
375
|
+
return typing.cast(typing.Optional[_cdktf_9a9027ec.TerraformProvider], result)
|
|
376
|
+
|
|
377
|
+
@builtins.property
|
|
378
|
+
def provisioners(
|
|
379
|
+
self,
|
|
380
|
+
) -> typing.Optional[typing.List[typing.Union[_cdktf_9a9027ec.FileProvisioner, _cdktf_9a9027ec.LocalExecProvisioner, _cdktf_9a9027ec.RemoteExecProvisioner]]]:
|
|
381
|
+
'''
|
|
382
|
+
:stability: experimental
|
|
383
|
+
'''
|
|
384
|
+
result = self._values.get("provisioners")
|
|
385
|
+
return typing.cast(typing.Optional[typing.List[typing.Union[_cdktf_9a9027ec.FileProvisioner, _cdktf_9a9027ec.LocalExecProvisioner, _cdktf_9a9027ec.RemoteExecProvisioner]]], result)
|
|
386
|
+
|
|
387
|
+
@builtins.property
|
|
388
|
+
def loadbalancer(self) -> builtins.str:
|
|
389
|
+
'''UUID of the load balancer to which the backend is connected.
|
|
390
|
+
|
|
391
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#loadbalancer LoadbalancerBackend#loadbalancer}
|
|
392
|
+
'''
|
|
393
|
+
result = self._values.get("loadbalancer")
|
|
394
|
+
assert result is not None, "Required property 'loadbalancer' is missing"
|
|
395
|
+
return typing.cast(builtins.str, result)
|
|
396
|
+
|
|
397
|
+
@builtins.property
|
|
398
|
+
def name(self) -> builtins.str:
|
|
399
|
+
'''The name of the backend. Must be unique within the load balancer service.
|
|
400
|
+
|
|
401
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#name LoadbalancerBackend#name}
|
|
402
|
+
'''
|
|
403
|
+
result = self._values.get("name")
|
|
404
|
+
assert result is not None, "Required property 'name' is missing"
|
|
405
|
+
return typing.cast(builtins.str, result)
|
|
406
|
+
|
|
407
|
+
@builtins.property
|
|
408
|
+
def properties(
|
|
409
|
+
self,
|
|
410
|
+
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["LoadbalancerBackendProperties"]]]:
|
|
411
|
+
'''properties block.
|
|
412
|
+
|
|
413
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#properties LoadbalancerBackend#properties}
|
|
414
|
+
'''
|
|
415
|
+
result = self._values.get("properties")
|
|
416
|
+
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["LoadbalancerBackendProperties"]]], result)
|
|
417
|
+
|
|
418
|
+
@builtins.property
|
|
419
|
+
def resolver_name(self) -> typing.Optional[builtins.str]:
|
|
420
|
+
'''Domain name resolver used with dynamic type members.
|
|
421
|
+
|
|
422
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
|
|
423
|
+
'''
|
|
424
|
+
result = self._values.get("resolver_name")
|
|
425
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
426
|
+
|
|
427
|
+
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
428
|
+
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
429
|
+
|
|
430
|
+
def __ne__(self, rhs: typing.Any) -> builtins.bool:
|
|
431
|
+
return not (rhs == self)
|
|
432
|
+
|
|
433
|
+
def __repr__(self) -> str:
|
|
434
|
+
return "LoadbalancerBackendConfig(%s)" % ", ".join(
|
|
435
|
+
k + "=" + repr(v) for k, v in self._values.items()
|
|
436
|
+
)
|
|
437
|
+
|
|
438
|
+
|
|
439
|
+
@jsii.data_type(
|
|
440
|
+
jsii_type="@cdktf/provider-upcloud.loadbalancerBackend.LoadbalancerBackendProperties",
|
|
441
|
+
jsii_struct_bases=[],
|
|
442
|
+
name_mapping={
|
|
443
|
+
"health_check_expected_status": "healthCheckExpectedStatus",
|
|
444
|
+
"health_check_fall": "healthCheckFall",
|
|
445
|
+
"health_check_interval": "healthCheckInterval",
|
|
446
|
+
"health_check_rise": "healthCheckRise",
|
|
447
|
+
"health_check_tls_verify": "healthCheckTlsVerify",
|
|
448
|
+
"health_check_type": "healthCheckType",
|
|
449
|
+
"health_check_url": "healthCheckUrl",
|
|
450
|
+
"http2_enabled": "http2Enabled",
|
|
451
|
+
"outbound_proxy_protocol": "outboundProxyProtocol",
|
|
452
|
+
"sticky_session_cookie_name": "stickySessionCookieName",
|
|
453
|
+
"timeout_server": "timeoutServer",
|
|
454
|
+
"timeout_tunnel": "timeoutTunnel",
|
|
455
|
+
"tls_enabled": "tlsEnabled",
|
|
456
|
+
"tls_use_system_ca": "tlsUseSystemCa",
|
|
457
|
+
"tls_verify": "tlsVerify",
|
|
458
|
+
},
|
|
459
|
+
)
|
|
460
|
+
class LoadbalancerBackendProperties:
|
|
461
|
+
def __init__(
|
|
462
|
+
self,
|
|
463
|
+
*,
|
|
464
|
+
health_check_expected_status: typing.Optional[jsii.Number] = None,
|
|
465
|
+
health_check_fall: typing.Optional[jsii.Number] = None,
|
|
466
|
+
health_check_interval: typing.Optional[jsii.Number] = None,
|
|
467
|
+
health_check_rise: typing.Optional[jsii.Number] = None,
|
|
468
|
+
health_check_tls_verify: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
469
|
+
health_check_type: typing.Optional[builtins.str] = None,
|
|
470
|
+
health_check_url: typing.Optional[builtins.str] = None,
|
|
471
|
+
http2_enabled: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
472
|
+
outbound_proxy_protocol: typing.Optional[builtins.str] = None,
|
|
473
|
+
sticky_session_cookie_name: typing.Optional[builtins.str] = None,
|
|
474
|
+
timeout_server: typing.Optional[jsii.Number] = None,
|
|
475
|
+
timeout_tunnel: typing.Optional[jsii.Number] = None,
|
|
476
|
+
tls_enabled: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
477
|
+
tls_use_system_ca: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
478
|
+
tls_verify: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
479
|
+
) -> None:
|
|
480
|
+
'''
|
|
481
|
+
:param health_check_expected_status: Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for ``tcp`` ``health_check_type``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_expected_status LoadbalancerBackend#health_check_expected_status}
|
|
482
|
+
:param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_fall LoadbalancerBackend#health_check_fall}
|
|
483
|
+
:param health_check_interval: Interval between health checks in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_interval LoadbalancerBackend#health_check_interval}
|
|
484
|
+
:param health_check_rise: Sets how many successful health checks are required to put the backend member back into rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_rise LoadbalancerBackend#health_check_rise}
|
|
485
|
+
:param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_tls_verify LoadbalancerBackend#health_check_tls_verify}
|
|
486
|
+
:param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_type LoadbalancerBackend#health_check_type}
|
|
487
|
+
:param health_check_url: Target path for health check HTTP GET requests. Ignored for ``tcp`` ``health_check_type``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_url LoadbalancerBackend#health_check_url}
|
|
488
|
+
:param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#http2_enabled LoadbalancerBackend#http2_enabled}
|
|
489
|
+
:param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Defaults to empty string. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#outbound_proxy_protocol LoadbalancerBackend#outbound_proxy_protocol}
|
|
490
|
+
:param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#sticky_session_cookie_name LoadbalancerBackend#sticky_session_cookie_name}
|
|
491
|
+
:param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#timeout_server LoadbalancerBackend#timeout_server}
|
|
492
|
+
:param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#timeout_tunnel LoadbalancerBackend#timeout_tunnel}
|
|
493
|
+
:param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#tls_enabled LoadbalancerBackend#tls_enabled}
|
|
494
|
+
:param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#tls_use_system_ca LoadbalancerBackend#tls_use_system_ca}
|
|
495
|
+
:param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#tls_verify LoadbalancerBackend#tls_verify}
|
|
496
|
+
'''
|
|
497
|
+
if __debug__:
|
|
498
|
+
type_hints = typing.get_type_hints(_typecheckingstub__eb5988403ea7b17ea78d8a97176e2db70e4258ead0d52fc7ab7102412ecccf40)
|
|
499
|
+
check_type(argname="argument health_check_expected_status", value=health_check_expected_status, expected_type=type_hints["health_check_expected_status"])
|
|
500
|
+
check_type(argname="argument health_check_fall", value=health_check_fall, expected_type=type_hints["health_check_fall"])
|
|
501
|
+
check_type(argname="argument health_check_interval", value=health_check_interval, expected_type=type_hints["health_check_interval"])
|
|
502
|
+
check_type(argname="argument health_check_rise", value=health_check_rise, expected_type=type_hints["health_check_rise"])
|
|
503
|
+
check_type(argname="argument health_check_tls_verify", value=health_check_tls_verify, expected_type=type_hints["health_check_tls_verify"])
|
|
504
|
+
check_type(argname="argument health_check_type", value=health_check_type, expected_type=type_hints["health_check_type"])
|
|
505
|
+
check_type(argname="argument health_check_url", value=health_check_url, expected_type=type_hints["health_check_url"])
|
|
506
|
+
check_type(argname="argument http2_enabled", value=http2_enabled, expected_type=type_hints["http2_enabled"])
|
|
507
|
+
check_type(argname="argument outbound_proxy_protocol", value=outbound_proxy_protocol, expected_type=type_hints["outbound_proxy_protocol"])
|
|
508
|
+
check_type(argname="argument sticky_session_cookie_name", value=sticky_session_cookie_name, expected_type=type_hints["sticky_session_cookie_name"])
|
|
509
|
+
check_type(argname="argument timeout_server", value=timeout_server, expected_type=type_hints["timeout_server"])
|
|
510
|
+
check_type(argname="argument timeout_tunnel", value=timeout_tunnel, expected_type=type_hints["timeout_tunnel"])
|
|
511
|
+
check_type(argname="argument tls_enabled", value=tls_enabled, expected_type=type_hints["tls_enabled"])
|
|
512
|
+
check_type(argname="argument tls_use_system_ca", value=tls_use_system_ca, expected_type=type_hints["tls_use_system_ca"])
|
|
513
|
+
check_type(argname="argument tls_verify", value=tls_verify, expected_type=type_hints["tls_verify"])
|
|
514
|
+
self._values: typing.Dict[builtins.str, typing.Any] = {}
|
|
515
|
+
if health_check_expected_status is not None:
|
|
516
|
+
self._values["health_check_expected_status"] = health_check_expected_status
|
|
517
|
+
if health_check_fall is not None:
|
|
518
|
+
self._values["health_check_fall"] = health_check_fall
|
|
519
|
+
if health_check_interval is not None:
|
|
520
|
+
self._values["health_check_interval"] = health_check_interval
|
|
521
|
+
if health_check_rise is not None:
|
|
522
|
+
self._values["health_check_rise"] = health_check_rise
|
|
523
|
+
if health_check_tls_verify is not None:
|
|
524
|
+
self._values["health_check_tls_verify"] = health_check_tls_verify
|
|
525
|
+
if health_check_type is not None:
|
|
526
|
+
self._values["health_check_type"] = health_check_type
|
|
527
|
+
if health_check_url is not None:
|
|
528
|
+
self._values["health_check_url"] = health_check_url
|
|
529
|
+
if http2_enabled is not None:
|
|
530
|
+
self._values["http2_enabled"] = http2_enabled
|
|
531
|
+
if outbound_proxy_protocol is not None:
|
|
532
|
+
self._values["outbound_proxy_protocol"] = outbound_proxy_protocol
|
|
533
|
+
if sticky_session_cookie_name is not None:
|
|
534
|
+
self._values["sticky_session_cookie_name"] = sticky_session_cookie_name
|
|
535
|
+
if timeout_server is not None:
|
|
536
|
+
self._values["timeout_server"] = timeout_server
|
|
537
|
+
if timeout_tunnel is not None:
|
|
538
|
+
self._values["timeout_tunnel"] = timeout_tunnel
|
|
539
|
+
if tls_enabled is not None:
|
|
540
|
+
self._values["tls_enabled"] = tls_enabled
|
|
541
|
+
if tls_use_system_ca is not None:
|
|
542
|
+
self._values["tls_use_system_ca"] = tls_use_system_ca
|
|
543
|
+
if tls_verify is not None:
|
|
544
|
+
self._values["tls_verify"] = tls_verify
|
|
545
|
+
|
|
546
|
+
@builtins.property
|
|
547
|
+
def health_check_expected_status(self) -> typing.Optional[jsii.Number]:
|
|
548
|
+
'''Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for ``tcp`` ``health_check_type``.
|
|
549
|
+
|
|
550
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_expected_status LoadbalancerBackend#health_check_expected_status}
|
|
551
|
+
'''
|
|
552
|
+
result = self._values.get("health_check_expected_status")
|
|
553
|
+
return typing.cast(typing.Optional[jsii.Number], result)
|
|
554
|
+
|
|
555
|
+
@builtins.property
|
|
556
|
+
def health_check_fall(self) -> typing.Optional[jsii.Number]:
|
|
557
|
+
'''Sets how many failed health checks are allowed until the backend member is taken off from the rotation.
|
|
558
|
+
|
|
559
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_fall LoadbalancerBackend#health_check_fall}
|
|
560
|
+
'''
|
|
561
|
+
result = self._values.get("health_check_fall")
|
|
562
|
+
return typing.cast(typing.Optional[jsii.Number], result)
|
|
563
|
+
|
|
564
|
+
@builtins.property
|
|
565
|
+
def health_check_interval(self) -> typing.Optional[jsii.Number]:
|
|
566
|
+
'''Interval between health checks in seconds.
|
|
567
|
+
|
|
568
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_interval LoadbalancerBackend#health_check_interval}
|
|
569
|
+
'''
|
|
570
|
+
result = self._values.get("health_check_interval")
|
|
571
|
+
return typing.cast(typing.Optional[jsii.Number], result)
|
|
572
|
+
|
|
573
|
+
@builtins.property
|
|
574
|
+
def health_check_rise(self) -> typing.Optional[jsii.Number]:
|
|
575
|
+
'''Sets how many successful health checks are required to put the backend member back into rotation.
|
|
576
|
+
|
|
577
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_rise LoadbalancerBackend#health_check_rise}
|
|
578
|
+
'''
|
|
579
|
+
result = self._values.get("health_check_rise")
|
|
580
|
+
return typing.cast(typing.Optional[jsii.Number], result)
|
|
581
|
+
|
|
582
|
+
@builtins.property
|
|
583
|
+
def health_check_tls_verify(
|
|
584
|
+
self,
|
|
585
|
+
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
586
|
+
'''Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored.
|
|
587
|
+
|
|
588
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_tls_verify LoadbalancerBackend#health_check_tls_verify}
|
|
589
|
+
'''
|
|
590
|
+
result = self._values.get("health_check_tls_verify")
|
|
591
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
592
|
+
|
|
593
|
+
@builtins.property
|
|
594
|
+
def health_check_type(self) -> typing.Optional[builtins.str]:
|
|
595
|
+
'''Health check type.
|
|
596
|
+
|
|
597
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_type LoadbalancerBackend#health_check_type}
|
|
598
|
+
'''
|
|
599
|
+
result = self._values.get("health_check_type")
|
|
600
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
601
|
+
|
|
602
|
+
@builtins.property
|
|
603
|
+
def health_check_url(self) -> typing.Optional[builtins.str]:
|
|
604
|
+
'''Target path for health check HTTP GET requests. Ignored for ``tcp`` ``health_check_type``.
|
|
605
|
+
|
|
606
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#health_check_url LoadbalancerBackend#health_check_url}
|
|
607
|
+
'''
|
|
608
|
+
result = self._values.get("health_check_url")
|
|
609
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
610
|
+
|
|
611
|
+
@builtins.property
|
|
612
|
+
def http2_enabled(
|
|
613
|
+
self,
|
|
614
|
+
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
615
|
+
'''Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true.
|
|
616
|
+
|
|
617
|
+
Note: members should support HTTP/2 for this setting to work.
|
|
618
|
+
|
|
619
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#http2_enabled LoadbalancerBackend#http2_enabled}
|
|
620
|
+
'''
|
|
621
|
+
result = self._values.get("http2_enabled")
|
|
622
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
623
|
+
|
|
624
|
+
@builtins.property
|
|
625
|
+
def outbound_proxy_protocol(self) -> typing.Optional[builtins.str]:
|
|
626
|
+
'''Enable outbound proxy protocol by setting the desired version. Defaults to empty string. Empty string disables proxy protocol.
|
|
627
|
+
|
|
628
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#outbound_proxy_protocol LoadbalancerBackend#outbound_proxy_protocol}
|
|
629
|
+
'''
|
|
630
|
+
result = self._values.get("outbound_proxy_protocol")
|
|
631
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
632
|
+
|
|
633
|
+
@builtins.property
|
|
634
|
+
def sticky_session_cookie_name(self) -> typing.Optional[builtins.str]:
|
|
635
|
+
'''Sets sticky session cookie name. Empty string disables sticky session.
|
|
636
|
+
|
|
637
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#sticky_session_cookie_name LoadbalancerBackend#sticky_session_cookie_name}
|
|
638
|
+
'''
|
|
639
|
+
result = self._values.get("sticky_session_cookie_name")
|
|
640
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
641
|
+
|
|
642
|
+
@builtins.property
|
|
643
|
+
def timeout_server(self) -> typing.Optional[jsii.Number]:
|
|
644
|
+
'''Backend server timeout in seconds.
|
|
645
|
+
|
|
646
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#timeout_server LoadbalancerBackend#timeout_server}
|
|
647
|
+
'''
|
|
648
|
+
result = self._values.get("timeout_server")
|
|
649
|
+
return typing.cast(typing.Optional[jsii.Number], result)
|
|
650
|
+
|
|
651
|
+
@builtins.property
|
|
652
|
+
def timeout_tunnel(self) -> typing.Optional[jsii.Number]:
|
|
653
|
+
'''Maximum inactivity time on the client and server side for tunnels in seconds.
|
|
654
|
+
|
|
655
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#timeout_tunnel LoadbalancerBackend#timeout_tunnel}
|
|
656
|
+
'''
|
|
657
|
+
result = self._values.get("timeout_tunnel")
|
|
658
|
+
return typing.cast(typing.Optional[jsii.Number], result)
|
|
659
|
+
|
|
660
|
+
@builtins.property
|
|
661
|
+
def tls_enabled(
|
|
662
|
+
self,
|
|
663
|
+
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
664
|
+
'''Enables TLS connection from the load balancer to backend servers.
|
|
665
|
+
|
|
666
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#tls_enabled LoadbalancerBackend#tls_enabled}
|
|
667
|
+
'''
|
|
668
|
+
result = self._values.get("tls_enabled")
|
|
669
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
670
|
+
|
|
671
|
+
@builtins.property
|
|
672
|
+
def tls_use_system_ca(
|
|
673
|
+
self,
|
|
674
|
+
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
675
|
+
'''If enabled, then the system CA certificate bundle will be used for the certificate verification.
|
|
676
|
+
|
|
677
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#tls_use_system_ca LoadbalancerBackend#tls_use_system_ca}
|
|
678
|
+
'''
|
|
679
|
+
result = self._values.get("tls_use_system_ca")
|
|
680
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
681
|
+
|
|
682
|
+
@builtins.property
|
|
683
|
+
def tls_verify(
|
|
684
|
+
self,
|
|
685
|
+
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
686
|
+
'''Enables backend servers certificate verification.
|
|
687
|
+
|
|
688
|
+
Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true.
|
|
689
|
+
|
|
690
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend#tls_verify LoadbalancerBackend#tls_verify}
|
|
691
|
+
'''
|
|
692
|
+
result = self._values.get("tls_verify")
|
|
693
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
694
|
+
|
|
695
|
+
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
696
|
+
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
697
|
+
|
|
698
|
+
def __ne__(self, rhs: typing.Any) -> builtins.bool:
|
|
699
|
+
return not (rhs == self)
|
|
700
|
+
|
|
701
|
+
def __repr__(self) -> str:
|
|
702
|
+
return "LoadbalancerBackendProperties(%s)" % ", ".join(
|
|
703
|
+
k + "=" + repr(v) for k, v in self._values.items()
|
|
704
|
+
)
|
|
705
|
+
|
|
706
|
+
|
|
707
|
+
class LoadbalancerBackendPropertiesList(
|
|
708
|
+
_cdktf_9a9027ec.ComplexList,
|
|
709
|
+
metaclass=jsii.JSIIMeta,
|
|
710
|
+
jsii_type="@cdktf/provider-upcloud.loadbalancerBackend.LoadbalancerBackendPropertiesList",
|
|
711
|
+
):
|
|
712
|
+
def __init__(
|
|
713
|
+
self,
|
|
714
|
+
terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
|
|
715
|
+
terraform_attribute: builtins.str,
|
|
716
|
+
wraps_set: builtins.bool,
|
|
717
|
+
) -> None:
|
|
718
|
+
'''
|
|
719
|
+
:param terraform_resource: The parent resource.
|
|
720
|
+
:param terraform_attribute: The attribute on the parent resource this class is referencing.
|
|
721
|
+
:param wraps_set: whether the list is wrapping a set (will add tolist() to be able to access an item via an index).
|
|
722
|
+
'''
|
|
723
|
+
if __debug__:
|
|
724
|
+
type_hints = typing.get_type_hints(_typecheckingstub__6466001e8d1ef72578f27d793b879e51bb3e572eaef9521b980d493595bc42c3)
|
|
725
|
+
check_type(argname="argument terraform_resource", value=terraform_resource, expected_type=type_hints["terraform_resource"])
|
|
726
|
+
check_type(argname="argument terraform_attribute", value=terraform_attribute, expected_type=type_hints["terraform_attribute"])
|
|
727
|
+
check_type(argname="argument wraps_set", value=wraps_set, expected_type=type_hints["wraps_set"])
|
|
728
|
+
jsii.create(self.__class__, self, [terraform_resource, terraform_attribute, wraps_set])
|
|
729
|
+
|
|
730
|
+
@jsii.member(jsii_name="get")
|
|
731
|
+
def get(self, index: jsii.Number) -> "LoadbalancerBackendPropertiesOutputReference":
|
|
732
|
+
'''
|
|
733
|
+
:param index: the index of the item to return.
|
|
734
|
+
'''
|
|
735
|
+
if __debug__:
|
|
736
|
+
type_hints = typing.get_type_hints(_typecheckingstub__79f867fbff964aa075654e4e8af16ff600c59120999a45f0bb5d4eebbf7df082)
|
|
737
|
+
check_type(argname="argument index", value=index, expected_type=type_hints["index"])
|
|
738
|
+
return typing.cast("LoadbalancerBackendPropertiesOutputReference", jsii.invoke(self, "get", [index]))
|
|
739
|
+
|
|
740
|
+
@builtins.property
|
|
741
|
+
@jsii.member(jsii_name="terraformAttribute")
|
|
742
|
+
def _terraform_attribute(self) -> builtins.str:
|
|
743
|
+
'''The attribute on the parent resource this class is referencing.'''
|
|
744
|
+
return typing.cast(builtins.str, jsii.get(self, "terraformAttribute"))
|
|
745
|
+
|
|
746
|
+
@_terraform_attribute.setter
|
|
747
|
+
def _terraform_attribute(self, value: builtins.str) -> None:
|
|
748
|
+
if __debug__:
|
|
749
|
+
type_hints = typing.get_type_hints(_typecheckingstub__9951e06afb155147ab301d7a3de3cd2fdf2af7a2dd07afb0107d1f31f5a9afe1)
|
|
750
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
751
|
+
jsii.set(self, "terraformAttribute", value) # pyright: ignore[reportArgumentType]
|
|
752
|
+
|
|
753
|
+
@builtins.property
|
|
754
|
+
@jsii.member(jsii_name="terraformResource")
|
|
755
|
+
def _terraform_resource(self) -> _cdktf_9a9027ec.IInterpolatingParent:
|
|
756
|
+
'''The parent resource.'''
|
|
757
|
+
return typing.cast(_cdktf_9a9027ec.IInterpolatingParent, jsii.get(self, "terraformResource"))
|
|
758
|
+
|
|
759
|
+
@_terraform_resource.setter
|
|
760
|
+
def _terraform_resource(self, value: _cdktf_9a9027ec.IInterpolatingParent) -> None:
|
|
761
|
+
if __debug__:
|
|
762
|
+
type_hints = typing.get_type_hints(_typecheckingstub__1f8a6b5225ae6d3e8dbe934b52f44ed3cf6e1d733e66b15339254b7710ecc1bc)
|
|
763
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
764
|
+
jsii.set(self, "terraformResource", value) # pyright: ignore[reportArgumentType]
|
|
765
|
+
|
|
766
|
+
@builtins.property
|
|
767
|
+
@jsii.member(jsii_name="wrapsSet")
|
|
768
|
+
def _wraps_set(self) -> builtins.bool:
|
|
769
|
+
'''whether the list is wrapping a set (will add tolist() to be able to access an item via an index).'''
|
|
770
|
+
return typing.cast(builtins.bool, jsii.get(self, "wrapsSet"))
|
|
771
|
+
|
|
772
|
+
@_wraps_set.setter
|
|
773
|
+
def _wraps_set(self, value: builtins.bool) -> None:
|
|
774
|
+
if __debug__:
|
|
775
|
+
type_hints = typing.get_type_hints(_typecheckingstub__2b068ef6542bae20782fcaa4e350a92c8cd34d45062fcf493a138e97a0b38f86)
|
|
776
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
777
|
+
jsii.set(self, "wrapsSet", value) # pyright: ignore[reportArgumentType]
|
|
778
|
+
|
|
779
|
+
@builtins.property
|
|
780
|
+
@jsii.member(jsii_name="internalValue")
|
|
781
|
+
def internal_value(
|
|
782
|
+
self,
|
|
783
|
+
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List[LoadbalancerBackendProperties]]]:
|
|
784
|
+
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List[LoadbalancerBackendProperties]]], jsii.get(self, "internalValue"))
|
|
785
|
+
|
|
786
|
+
@internal_value.setter
|
|
787
|
+
def internal_value(
|
|
788
|
+
self,
|
|
789
|
+
value: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List[LoadbalancerBackendProperties]]],
|
|
790
|
+
) -> None:
|
|
791
|
+
if __debug__:
|
|
792
|
+
type_hints = typing.get_type_hints(_typecheckingstub__f8e732b3935e5c2c284f9e0a1a9b80014417767d3cb70421fd39ff444d5c67bf)
|
|
793
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
794
|
+
jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
|
|
795
|
+
|
|
796
|
+
|
|
797
|
+
class LoadbalancerBackendPropertiesOutputReference(
|
|
798
|
+
_cdktf_9a9027ec.ComplexObject,
|
|
799
|
+
metaclass=jsii.JSIIMeta,
|
|
800
|
+
jsii_type="@cdktf/provider-upcloud.loadbalancerBackend.LoadbalancerBackendPropertiesOutputReference",
|
|
801
|
+
):
|
|
802
|
+
def __init__(
|
|
803
|
+
self,
|
|
804
|
+
terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
|
|
805
|
+
terraform_attribute: builtins.str,
|
|
806
|
+
complex_object_index: jsii.Number,
|
|
807
|
+
complex_object_is_from_set: builtins.bool,
|
|
808
|
+
) -> None:
|
|
809
|
+
'''
|
|
810
|
+
:param terraform_resource: The parent resource.
|
|
811
|
+
:param terraform_attribute: The attribute on the parent resource this class is referencing.
|
|
812
|
+
:param complex_object_index: the index of this item in the list.
|
|
813
|
+
:param complex_object_is_from_set: whether the list is wrapping a set (will add tolist() to be able to access an item via an index).
|
|
814
|
+
'''
|
|
815
|
+
if __debug__:
|
|
816
|
+
type_hints = typing.get_type_hints(_typecheckingstub__0c083897711e36589f6551ae9e4bc07921aadcee7d8ec5d8bee78e03d6160dda)
|
|
817
|
+
check_type(argname="argument terraform_resource", value=terraform_resource, expected_type=type_hints["terraform_resource"])
|
|
818
|
+
check_type(argname="argument terraform_attribute", value=terraform_attribute, expected_type=type_hints["terraform_attribute"])
|
|
819
|
+
check_type(argname="argument complex_object_index", value=complex_object_index, expected_type=type_hints["complex_object_index"])
|
|
820
|
+
check_type(argname="argument complex_object_is_from_set", value=complex_object_is_from_set, expected_type=type_hints["complex_object_is_from_set"])
|
|
821
|
+
jsii.create(self.__class__, self, [terraform_resource, terraform_attribute, complex_object_index, complex_object_is_from_set])
|
|
822
|
+
|
|
823
|
+
@jsii.member(jsii_name="resetHealthCheckExpectedStatus")
|
|
824
|
+
def reset_health_check_expected_status(self) -> None:
|
|
825
|
+
return typing.cast(None, jsii.invoke(self, "resetHealthCheckExpectedStatus", []))
|
|
826
|
+
|
|
827
|
+
@jsii.member(jsii_name="resetHealthCheckFall")
|
|
828
|
+
def reset_health_check_fall(self) -> None:
|
|
829
|
+
return typing.cast(None, jsii.invoke(self, "resetHealthCheckFall", []))
|
|
830
|
+
|
|
831
|
+
@jsii.member(jsii_name="resetHealthCheckInterval")
|
|
832
|
+
def reset_health_check_interval(self) -> None:
|
|
833
|
+
return typing.cast(None, jsii.invoke(self, "resetHealthCheckInterval", []))
|
|
834
|
+
|
|
835
|
+
@jsii.member(jsii_name="resetHealthCheckRise")
|
|
836
|
+
def reset_health_check_rise(self) -> None:
|
|
837
|
+
return typing.cast(None, jsii.invoke(self, "resetHealthCheckRise", []))
|
|
838
|
+
|
|
839
|
+
@jsii.member(jsii_name="resetHealthCheckTlsVerify")
|
|
840
|
+
def reset_health_check_tls_verify(self) -> None:
|
|
841
|
+
return typing.cast(None, jsii.invoke(self, "resetHealthCheckTlsVerify", []))
|
|
842
|
+
|
|
843
|
+
@jsii.member(jsii_name="resetHealthCheckType")
|
|
844
|
+
def reset_health_check_type(self) -> None:
|
|
845
|
+
return typing.cast(None, jsii.invoke(self, "resetHealthCheckType", []))
|
|
846
|
+
|
|
847
|
+
@jsii.member(jsii_name="resetHealthCheckUrl")
|
|
848
|
+
def reset_health_check_url(self) -> None:
|
|
849
|
+
return typing.cast(None, jsii.invoke(self, "resetHealthCheckUrl", []))
|
|
850
|
+
|
|
851
|
+
@jsii.member(jsii_name="resetHttp2Enabled")
|
|
852
|
+
def reset_http2_enabled(self) -> None:
|
|
853
|
+
return typing.cast(None, jsii.invoke(self, "resetHttp2Enabled", []))
|
|
854
|
+
|
|
855
|
+
@jsii.member(jsii_name="resetOutboundProxyProtocol")
|
|
856
|
+
def reset_outbound_proxy_protocol(self) -> None:
|
|
857
|
+
return typing.cast(None, jsii.invoke(self, "resetOutboundProxyProtocol", []))
|
|
858
|
+
|
|
859
|
+
@jsii.member(jsii_name="resetStickySessionCookieName")
|
|
860
|
+
def reset_sticky_session_cookie_name(self) -> None:
|
|
861
|
+
return typing.cast(None, jsii.invoke(self, "resetStickySessionCookieName", []))
|
|
862
|
+
|
|
863
|
+
@jsii.member(jsii_name="resetTimeoutServer")
|
|
864
|
+
def reset_timeout_server(self) -> None:
|
|
865
|
+
return typing.cast(None, jsii.invoke(self, "resetTimeoutServer", []))
|
|
866
|
+
|
|
867
|
+
@jsii.member(jsii_name="resetTimeoutTunnel")
|
|
868
|
+
def reset_timeout_tunnel(self) -> None:
|
|
869
|
+
return typing.cast(None, jsii.invoke(self, "resetTimeoutTunnel", []))
|
|
870
|
+
|
|
871
|
+
@jsii.member(jsii_name="resetTlsEnabled")
|
|
872
|
+
def reset_tls_enabled(self) -> None:
|
|
873
|
+
return typing.cast(None, jsii.invoke(self, "resetTlsEnabled", []))
|
|
874
|
+
|
|
875
|
+
@jsii.member(jsii_name="resetTlsUseSystemCa")
|
|
876
|
+
def reset_tls_use_system_ca(self) -> None:
|
|
877
|
+
return typing.cast(None, jsii.invoke(self, "resetTlsUseSystemCa", []))
|
|
878
|
+
|
|
879
|
+
@jsii.member(jsii_name="resetTlsVerify")
|
|
880
|
+
def reset_tls_verify(self) -> None:
|
|
881
|
+
return typing.cast(None, jsii.invoke(self, "resetTlsVerify", []))
|
|
882
|
+
|
|
883
|
+
@builtins.property
|
|
884
|
+
@jsii.member(jsii_name="healthCheckExpectedStatusInput")
|
|
885
|
+
def health_check_expected_status_input(self) -> typing.Optional[jsii.Number]:
|
|
886
|
+
return typing.cast(typing.Optional[jsii.Number], jsii.get(self, "healthCheckExpectedStatusInput"))
|
|
887
|
+
|
|
888
|
+
@builtins.property
|
|
889
|
+
@jsii.member(jsii_name="healthCheckFallInput")
|
|
890
|
+
def health_check_fall_input(self) -> typing.Optional[jsii.Number]:
|
|
891
|
+
return typing.cast(typing.Optional[jsii.Number], jsii.get(self, "healthCheckFallInput"))
|
|
892
|
+
|
|
893
|
+
@builtins.property
|
|
894
|
+
@jsii.member(jsii_name="healthCheckIntervalInput")
|
|
895
|
+
def health_check_interval_input(self) -> typing.Optional[jsii.Number]:
|
|
896
|
+
return typing.cast(typing.Optional[jsii.Number], jsii.get(self, "healthCheckIntervalInput"))
|
|
897
|
+
|
|
898
|
+
@builtins.property
|
|
899
|
+
@jsii.member(jsii_name="healthCheckRiseInput")
|
|
900
|
+
def health_check_rise_input(self) -> typing.Optional[jsii.Number]:
|
|
901
|
+
return typing.cast(typing.Optional[jsii.Number], jsii.get(self, "healthCheckRiseInput"))
|
|
902
|
+
|
|
903
|
+
@builtins.property
|
|
904
|
+
@jsii.member(jsii_name="healthCheckTlsVerifyInput")
|
|
905
|
+
def health_check_tls_verify_input(
|
|
906
|
+
self,
|
|
907
|
+
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
908
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], jsii.get(self, "healthCheckTlsVerifyInput"))
|
|
909
|
+
|
|
910
|
+
@builtins.property
|
|
911
|
+
@jsii.member(jsii_name="healthCheckTypeInput")
|
|
912
|
+
def health_check_type_input(self) -> typing.Optional[builtins.str]:
|
|
913
|
+
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "healthCheckTypeInput"))
|
|
914
|
+
|
|
915
|
+
@builtins.property
|
|
916
|
+
@jsii.member(jsii_name="healthCheckUrlInput")
|
|
917
|
+
def health_check_url_input(self) -> typing.Optional[builtins.str]:
|
|
918
|
+
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "healthCheckUrlInput"))
|
|
919
|
+
|
|
920
|
+
@builtins.property
|
|
921
|
+
@jsii.member(jsii_name="http2EnabledInput")
|
|
922
|
+
def http2_enabled_input(
|
|
923
|
+
self,
|
|
924
|
+
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
925
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], jsii.get(self, "http2EnabledInput"))
|
|
926
|
+
|
|
927
|
+
@builtins.property
|
|
928
|
+
@jsii.member(jsii_name="outboundProxyProtocolInput")
|
|
929
|
+
def outbound_proxy_protocol_input(self) -> typing.Optional[builtins.str]:
|
|
930
|
+
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "outboundProxyProtocolInput"))
|
|
931
|
+
|
|
932
|
+
@builtins.property
|
|
933
|
+
@jsii.member(jsii_name="stickySessionCookieNameInput")
|
|
934
|
+
def sticky_session_cookie_name_input(self) -> typing.Optional[builtins.str]:
|
|
935
|
+
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "stickySessionCookieNameInput"))
|
|
936
|
+
|
|
937
|
+
@builtins.property
|
|
938
|
+
@jsii.member(jsii_name="timeoutServerInput")
|
|
939
|
+
def timeout_server_input(self) -> typing.Optional[jsii.Number]:
|
|
940
|
+
return typing.cast(typing.Optional[jsii.Number], jsii.get(self, "timeoutServerInput"))
|
|
941
|
+
|
|
942
|
+
@builtins.property
|
|
943
|
+
@jsii.member(jsii_name="timeoutTunnelInput")
|
|
944
|
+
def timeout_tunnel_input(self) -> typing.Optional[jsii.Number]:
|
|
945
|
+
return typing.cast(typing.Optional[jsii.Number], jsii.get(self, "timeoutTunnelInput"))
|
|
946
|
+
|
|
947
|
+
@builtins.property
|
|
948
|
+
@jsii.member(jsii_name="tlsEnabledInput")
|
|
949
|
+
def tls_enabled_input(
|
|
950
|
+
self,
|
|
951
|
+
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
952
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], jsii.get(self, "tlsEnabledInput"))
|
|
953
|
+
|
|
954
|
+
@builtins.property
|
|
955
|
+
@jsii.member(jsii_name="tlsUseSystemCaInput")
|
|
956
|
+
def tls_use_system_ca_input(
|
|
957
|
+
self,
|
|
958
|
+
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
959
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], jsii.get(self, "tlsUseSystemCaInput"))
|
|
960
|
+
|
|
961
|
+
@builtins.property
|
|
962
|
+
@jsii.member(jsii_name="tlsVerifyInput")
|
|
963
|
+
def tls_verify_input(
|
|
964
|
+
self,
|
|
965
|
+
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
966
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], jsii.get(self, "tlsVerifyInput"))
|
|
967
|
+
|
|
968
|
+
@builtins.property
|
|
969
|
+
@jsii.member(jsii_name="healthCheckExpectedStatus")
|
|
970
|
+
def health_check_expected_status(self) -> jsii.Number:
|
|
971
|
+
return typing.cast(jsii.Number, jsii.get(self, "healthCheckExpectedStatus"))
|
|
972
|
+
|
|
973
|
+
@health_check_expected_status.setter
|
|
974
|
+
def health_check_expected_status(self, value: jsii.Number) -> None:
|
|
975
|
+
if __debug__:
|
|
976
|
+
type_hints = typing.get_type_hints(_typecheckingstub__7dc3f08a62f7f1c1d999cf41443e8d00ab201864398241c00de9cc77da1c2342)
|
|
977
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
978
|
+
jsii.set(self, "healthCheckExpectedStatus", value) # pyright: ignore[reportArgumentType]
|
|
979
|
+
|
|
980
|
+
@builtins.property
|
|
981
|
+
@jsii.member(jsii_name="healthCheckFall")
|
|
982
|
+
def health_check_fall(self) -> jsii.Number:
|
|
983
|
+
return typing.cast(jsii.Number, jsii.get(self, "healthCheckFall"))
|
|
984
|
+
|
|
985
|
+
@health_check_fall.setter
|
|
986
|
+
def health_check_fall(self, value: jsii.Number) -> None:
|
|
987
|
+
if __debug__:
|
|
988
|
+
type_hints = typing.get_type_hints(_typecheckingstub__8a74c22cd3b86c3c486e323569b855be74e55b4f1661df85a24cd150f9700581)
|
|
989
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
990
|
+
jsii.set(self, "healthCheckFall", value) # pyright: ignore[reportArgumentType]
|
|
991
|
+
|
|
992
|
+
@builtins.property
|
|
993
|
+
@jsii.member(jsii_name="healthCheckInterval")
|
|
994
|
+
def health_check_interval(self) -> jsii.Number:
|
|
995
|
+
return typing.cast(jsii.Number, jsii.get(self, "healthCheckInterval"))
|
|
996
|
+
|
|
997
|
+
@health_check_interval.setter
|
|
998
|
+
def health_check_interval(self, value: jsii.Number) -> None:
|
|
999
|
+
if __debug__:
|
|
1000
|
+
type_hints = typing.get_type_hints(_typecheckingstub__bc4a5fcdf1d72f3f8e196e0b9fe2c716f66386010cf2bcefe94884b091dd1099)
|
|
1001
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1002
|
+
jsii.set(self, "healthCheckInterval", value) # pyright: ignore[reportArgumentType]
|
|
1003
|
+
|
|
1004
|
+
@builtins.property
|
|
1005
|
+
@jsii.member(jsii_name="healthCheckRise")
|
|
1006
|
+
def health_check_rise(self) -> jsii.Number:
|
|
1007
|
+
return typing.cast(jsii.Number, jsii.get(self, "healthCheckRise"))
|
|
1008
|
+
|
|
1009
|
+
@health_check_rise.setter
|
|
1010
|
+
def health_check_rise(self, value: jsii.Number) -> None:
|
|
1011
|
+
if __debug__:
|
|
1012
|
+
type_hints = typing.get_type_hints(_typecheckingstub__5a005b6a89678311ae87bf7a8226f1b8b8341f6f7dbe94f53264244eec7b1941)
|
|
1013
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1014
|
+
jsii.set(self, "healthCheckRise", value) # pyright: ignore[reportArgumentType]
|
|
1015
|
+
|
|
1016
|
+
@builtins.property
|
|
1017
|
+
@jsii.member(jsii_name="healthCheckTlsVerify")
|
|
1018
|
+
def health_check_tls_verify(
|
|
1019
|
+
self,
|
|
1020
|
+
) -> typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]:
|
|
1021
|
+
return typing.cast(typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable], jsii.get(self, "healthCheckTlsVerify"))
|
|
1022
|
+
|
|
1023
|
+
@health_check_tls_verify.setter
|
|
1024
|
+
def health_check_tls_verify(
|
|
1025
|
+
self,
|
|
1026
|
+
value: typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable],
|
|
1027
|
+
) -> None:
|
|
1028
|
+
if __debug__:
|
|
1029
|
+
type_hints = typing.get_type_hints(_typecheckingstub__7a1f0408301a8ed0464e766b76ea9c173a85a6c5972f17c867955e8f12d24892)
|
|
1030
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1031
|
+
jsii.set(self, "healthCheckTlsVerify", value) # pyright: ignore[reportArgumentType]
|
|
1032
|
+
|
|
1033
|
+
@builtins.property
|
|
1034
|
+
@jsii.member(jsii_name="healthCheckType")
|
|
1035
|
+
def health_check_type(self) -> builtins.str:
|
|
1036
|
+
return typing.cast(builtins.str, jsii.get(self, "healthCheckType"))
|
|
1037
|
+
|
|
1038
|
+
@health_check_type.setter
|
|
1039
|
+
def health_check_type(self, value: builtins.str) -> None:
|
|
1040
|
+
if __debug__:
|
|
1041
|
+
type_hints = typing.get_type_hints(_typecheckingstub__8069e619c5eafcd61405a9b14ccbb5acc557f594802c36aa8bfd7d0fd8ff0219)
|
|
1042
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1043
|
+
jsii.set(self, "healthCheckType", value) # pyright: ignore[reportArgumentType]
|
|
1044
|
+
|
|
1045
|
+
@builtins.property
|
|
1046
|
+
@jsii.member(jsii_name="healthCheckUrl")
|
|
1047
|
+
def health_check_url(self) -> builtins.str:
|
|
1048
|
+
return typing.cast(builtins.str, jsii.get(self, "healthCheckUrl"))
|
|
1049
|
+
|
|
1050
|
+
@health_check_url.setter
|
|
1051
|
+
def health_check_url(self, value: builtins.str) -> None:
|
|
1052
|
+
if __debug__:
|
|
1053
|
+
type_hints = typing.get_type_hints(_typecheckingstub__39f4a5b6a60297078707410bf16c529278fa67e401d14af087347f4acdc4f238)
|
|
1054
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1055
|
+
jsii.set(self, "healthCheckUrl", value) # pyright: ignore[reportArgumentType]
|
|
1056
|
+
|
|
1057
|
+
@builtins.property
|
|
1058
|
+
@jsii.member(jsii_name="http2Enabled")
|
|
1059
|
+
def http2_enabled(self) -> typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]:
|
|
1060
|
+
return typing.cast(typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable], jsii.get(self, "http2Enabled"))
|
|
1061
|
+
|
|
1062
|
+
@http2_enabled.setter
|
|
1063
|
+
def http2_enabled(
|
|
1064
|
+
self,
|
|
1065
|
+
value: typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable],
|
|
1066
|
+
) -> None:
|
|
1067
|
+
if __debug__:
|
|
1068
|
+
type_hints = typing.get_type_hints(_typecheckingstub__c0ed74c710cac92ea40127eb8683ef34d63adf6cf079484e9ba4e70ae1d9c121)
|
|
1069
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1070
|
+
jsii.set(self, "http2Enabled", value) # pyright: ignore[reportArgumentType]
|
|
1071
|
+
|
|
1072
|
+
@builtins.property
|
|
1073
|
+
@jsii.member(jsii_name="outboundProxyProtocol")
|
|
1074
|
+
def outbound_proxy_protocol(self) -> builtins.str:
|
|
1075
|
+
return typing.cast(builtins.str, jsii.get(self, "outboundProxyProtocol"))
|
|
1076
|
+
|
|
1077
|
+
@outbound_proxy_protocol.setter
|
|
1078
|
+
def outbound_proxy_protocol(self, value: builtins.str) -> None:
|
|
1079
|
+
if __debug__:
|
|
1080
|
+
type_hints = typing.get_type_hints(_typecheckingstub__643632d762dde3bfa52ccccc383516eae69f64de4c971e85aaa719e291c1c0fa)
|
|
1081
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1082
|
+
jsii.set(self, "outboundProxyProtocol", value) # pyright: ignore[reportArgumentType]
|
|
1083
|
+
|
|
1084
|
+
@builtins.property
|
|
1085
|
+
@jsii.member(jsii_name="stickySessionCookieName")
|
|
1086
|
+
def sticky_session_cookie_name(self) -> builtins.str:
|
|
1087
|
+
return typing.cast(builtins.str, jsii.get(self, "stickySessionCookieName"))
|
|
1088
|
+
|
|
1089
|
+
@sticky_session_cookie_name.setter
|
|
1090
|
+
def sticky_session_cookie_name(self, value: builtins.str) -> None:
|
|
1091
|
+
if __debug__:
|
|
1092
|
+
type_hints = typing.get_type_hints(_typecheckingstub__da3ab1d8ffd0ee740d498a68367ab415a83ea5bb95a96b7bca9efb4ce8d99490)
|
|
1093
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1094
|
+
jsii.set(self, "stickySessionCookieName", value) # pyright: ignore[reportArgumentType]
|
|
1095
|
+
|
|
1096
|
+
@builtins.property
|
|
1097
|
+
@jsii.member(jsii_name="timeoutServer")
|
|
1098
|
+
def timeout_server(self) -> jsii.Number:
|
|
1099
|
+
return typing.cast(jsii.Number, jsii.get(self, "timeoutServer"))
|
|
1100
|
+
|
|
1101
|
+
@timeout_server.setter
|
|
1102
|
+
def timeout_server(self, value: jsii.Number) -> None:
|
|
1103
|
+
if __debug__:
|
|
1104
|
+
type_hints = typing.get_type_hints(_typecheckingstub__62977787f77a98958c7b1c163fc10ef2d04d5473932b93993b385e7a7f4725a2)
|
|
1105
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1106
|
+
jsii.set(self, "timeoutServer", value) # pyright: ignore[reportArgumentType]
|
|
1107
|
+
|
|
1108
|
+
@builtins.property
|
|
1109
|
+
@jsii.member(jsii_name="timeoutTunnel")
|
|
1110
|
+
def timeout_tunnel(self) -> jsii.Number:
|
|
1111
|
+
return typing.cast(jsii.Number, jsii.get(self, "timeoutTunnel"))
|
|
1112
|
+
|
|
1113
|
+
@timeout_tunnel.setter
|
|
1114
|
+
def timeout_tunnel(self, value: jsii.Number) -> None:
|
|
1115
|
+
if __debug__:
|
|
1116
|
+
type_hints = typing.get_type_hints(_typecheckingstub__cd7554673f8db1f54b33f3b8832599eb58807a0023a40109ca959f715cf36c9b)
|
|
1117
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1118
|
+
jsii.set(self, "timeoutTunnel", value) # pyright: ignore[reportArgumentType]
|
|
1119
|
+
|
|
1120
|
+
@builtins.property
|
|
1121
|
+
@jsii.member(jsii_name="tlsEnabled")
|
|
1122
|
+
def tls_enabled(self) -> typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]:
|
|
1123
|
+
return typing.cast(typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable], jsii.get(self, "tlsEnabled"))
|
|
1124
|
+
|
|
1125
|
+
@tls_enabled.setter
|
|
1126
|
+
def tls_enabled(
|
|
1127
|
+
self,
|
|
1128
|
+
value: typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable],
|
|
1129
|
+
) -> None:
|
|
1130
|
+
if __debug__:
|
|
1131
|
+
type_hints = typing.get_type_hints(_typecheckingstub__a3971da5b5c90f1fd23ac2242c668f5d56a0071530ac27f4ec552f8ec4ce9ee2)
|
|
1132
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1133
|
+
jsii.set(self, "tlsEnabled", value) # pyright: ignore[reportArgumentType]
|
|
1134
|
+
|
|
1135
|
+
@builtins.property
|
|
1136
|
+
@jsii.member(jsii_name="tlsUseSystemCa")
|
|
1137
|
+
def tls_use_system_ca(
|
|
1138
|
+
self,
|
|
1139
|
+
) -> typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]:
|
|
1140
|
+
return typing.cast(typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable], jsii.get(self, "tlsUseSystemCa"))
|
|
1141
|
+
|
|
1142
|
+
@tls_use_system_ca.setter
|
|
1143
|
+
def tls_use_system_ca(
|
|
1144
|
+
self,
|
|
1145
|
+
value: typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable],
|
|
1146
|
+
) -> None:
|
|
1147
|
+
if __debug__:
|
|
1148
|
+
type_hints = typing.get_type_hints(_typecheckingstub__97f6e28d7e94f7b38cfe76b70291b8c0170c52b48c78b10dc8f76b4703c093e9)
|
|
1149
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1150
|
+
jsii.set(self, "tlsUseSystemCa", value) # pyright: ignore[reportArgumentType]
|
|
1151
|
+
|
|
1152
|
+
@builtins.property
|
|
1153
|
+
@jsii.member(jsii_name="tlsVerify")
|
|
1154
|
+
def tls_verify(self) -> typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]:
|
|
1155
|
+
return typing.cast(typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable], jsii.get(self, "tlsVerify"))
|
|
1156
|
+
|
|
1157
|
+
@tls_verify.setter
|
|
1158
|
+
def tls_verify(
|
|
1159
|
+
self,
|
|
1160
|
+
value: typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable],
|
|
1161
|
+
) -> None:
|
|
1162
|
+
if __debug__:
|
|
1163
|
+
type_hints = typing.get_type_hints(_typecheckingstub__0d060a9595c4cfc7ea56c1c33bf629d6166ba1a8b052484fd102442b53a67224)
|
|
1164
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1165
|
+
jsii.set(self, "tlsVerify", value) # pyright: ignore[reportArgumentType]
|
|
1166
|
+
|
|
1167
|
+
@builtins.property
|
|
1168
|
+
@jsii.member(jsii_name="internalValue")
|
|
1169
|
+
def internal_value(
|
|
1170
|
+
self,
|
|
1171
|
+
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, LoadbalancerBackendProperties]]:
|
|
1172
|
+
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, LoadbalancerBackendProperties]], jsii.get(self, "internalValue"))
|
|
1173
|
+
|
|
1174
|
+
@internal_value.setter
|
|
1175
|
+
def internal_value(
|
|
1176
|
+
self,
|
|
1177
|
+
value: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, LoadbalancerBackendProperties]],
|
|
1178
|
+
) -> None:
|
|
1179
|
+
if __debug__:
|
|
1180
|
+
type_hints = typing.get_type_hints(_typecheckingstub__c8c6fb57a71c2e0e202ceab15eb8b409d80557a71150004a0caaf083b5bb1cb5)
|
|
1181
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1182
|
+
jsii.set(self, "internalValue", value) # pyright: ignore[reportArgumentType]
|
|
1183
|
+
|
|
1184
|
+
|
|
1185
|
+
__all__ = [
|
|
1186
|
+
"LoadbalancerBackend",
|
|
1187
|
+
"LoadbalancerBackendConfig",
|
|
1188
|
+
"LoadbalancerBackendProperties",
|
|
1189
|
+
"LoadbalancerBackendPropertiesList",
|
|
1190
|
+
"LoadbalancerBackendPropertiesOutputReference",
|
|
1191
|
+
]
|
|
1192
|
+
|
|
1193
|
+
publication.publish()
|
|
1194
|
+
|
|
1195
|
+
def _typecheckingstub__a57ef11b06133e84b2cf13365b88e7f2dd34adb8674508adcf3a305129d291be(
|
|
1196
|
+
scope: _constructs_77d1e7e8.Construct,
|
|
1197
|
+
id: builtins.str,
|
|
1198
|
+
*,
|
|
1199
|
+
loadbalancer: builtins.str,
|
|
1200
|
+
name: builtins.str,
|
|
1201
|
+
properties: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[LoadbalancerBackendProperties, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
1202
|
+
resolver_name: typing.Optional[builtins.str] = None,
|
|
1203
|
+
connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
1204
|
+
count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
|
|
1205
|
+
depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
|
|
1206
|
+
for_each: typing.Optional[_cdktf_9a9027ec.ITerraformIterator] = None,
|
|
1207
|
+
lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
1208
|
+
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
1209
|
+
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
1210
|
+
) -> None:
|
|
1211
|
+
"""Type checking stubs"""
|
|
1212
|
+
pass
|
|
1213
|
+
|
|
1214
|
+
def _typecheckingstub__a39303f6431c9b45110a25cf70f07bd7d65ab86e3d142d38f4c3a889e9439f80(
|
|
1215
|
+
scope: _constructs_77d1e7e8.Construct,
|
|
1216
|
+
import_to_id: builtins.str,
|
|
1217
|
+
import_from_id: builtins.str,
|
|
1218
|
+
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
1219
|
+
) -> None:
|
|
1220
|
+
"""Type checking stubs"""
|
|
1221
|
+
pass
|
|
1222
|
+
|
|
1223
|
+
def _typecheckingstub__425dcb0894c6def77121cea82a4b7926cb641081761e4828ac7bf13b99d8c4b4(
|
|
1224
|
+
value: typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[LoadbalancerBackendProperties, typing.Dict[builtins.str, typing.Any]]]],
|
|
1225
|
+
) -> None:
|
|
1226
|
+
"""Type checking stubs"""
|
|
1227
|
+
pass
|
|
1228
|
+
|
|
1229
|
+
def _typecheckingstub__758a0ce0d7c7b27aef039a1ababb5170b2dcdca319a675ca5481e137f044e6e5(
|
|
1230
|
+
value: builtins.str,
|
|
1231
|
+
) -> None:
|
|
1232
|
+
"""Type checking stubs"""
|
|
1233
|
+
pass
|
|
1234
|
+
|
|
1235
|
+
def _typecheckingstub__de7b9fba80a9bd9724064ce7ebd66895bd34dfa89b05268124ea8a52d91572a5(
|
|
1236
|
+
value: builtins.str,
|
|
1237
|
+
) -> None:
|
|
1238
|
+
"""Type checking stubs"""
|
|
1239
|
+
pass
|
|
1240
|
+
|
|
1241
|
+
def _typecheckingstub__8d83b8ad74717dbbf2ec7a84d12d1c3f9b89191c4cd0c797584da512a2560f3b(
|
|
1242
|
+
value: builtins.str,
|
|
1243
|
+
) -> None:
|
|
1244
|
+
"""Type checking stubs"""
|
|
1245
|
+
pass
|
|
1246
|
+
|
|
1247
|
+
def _typecheckingstub__6200f98d574a6cde907c9b763cf17de76dec005cc13d69bf52a284d828392061(
|
|
1248
|
+
*,
|
|
1249
|
+
connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
1250
|
+
count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
|
|
1251
|
+
depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
|
|
1252
|
+
for_each: typing.Optional[_cdktf_9a9027ec.ITerraformIterator] = None,
|
|
1253
|
+
lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
1254
|
+
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
1255
|
+
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
1256
|
+
loadbalancer: builtins.str,
|
|
1257
|
+
name: builtins.str,
|
|
1258
|
+
properties: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[LoadbalancerBackendProperties, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
1259
|
+
resolver_name: typing.Optional[builtins.str] = None,
|
|
1260
|
+
) -> None:
|
|
1261
|
+
"""Type checking stubs"""
|
|
1262
|
+
pass
|
|
1263
|
+
|
|
1264
|
+
def _typecheckingstub__eb5988403ea7b17ea78d8a97176e2db70e4258ead0d52fc7ab7102412ecccf40(
|
|
1265
|
+
*,
|
|
1266
|
+
health_check_expected_status: typing.Optional[jsii.Number] = None,
|
|
1267
|
+
health_check_fall: typing.Optional[jsii.Number] = None,
|
|
1268
|
+
health_check_interval: typing.Optional[jsii.Number] = None,
|
|
1269
|
+
health_check_rise: typing.Optional[jsii.Number] = None,
|
|
1270
|
+
health_check_tls_verify: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
1271
|
+
health_check_type: typing.Optional[builtins.str] = None,
|
|
1272
|
+
health_check_url: typing.Optional[builtins.str] = None,
|
|
1273
|
+
http2_enabled: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
1274
|
+
outbound_proxy_protocol: typing.Optional[builtins.str] = None,
|
|
1275
|
+
sticky_session_cookie_name: typing.Optional[builtins.str] = None,
|
|
1276
|
+
timeout_server: typing.Optional[jsii.Number] = None,
|
|
1277
|
+
timeout_tunnel: typing.Optional[jsii.Number] = None,
|
|
1278
|
+
tls_enabled: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
1279
|
+
tls_use_system_ca: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
1280
|
+
tls_verify: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
1281
|
+
) -> None:
|
|
1282
|
+
"""Type checking stubs"""
|
|
1283
|
+
pass
|
|
1284
|
+
|
|
1285
|
+
def _typecheckingstub__6466001e8d1ef72578f27d793b879e51bb3e572eaef9521b980d493595bc42c3(
|
|
1286
|
+
terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
|
|
1287
|
+
terraform_attribute: builtins.str,
|
|
1288
|
+
wraps_set: builtins.bool,
|
|
1289
|
+
) -> None:
|
|
1290
|
+
"""Type checking stubs"""
|
|
1291
|
+
pass
|
|
1292
|
+
|
|
1293
|
+
def _typecheckingstub__79f867fbff964aa075654e4e8af16ff600c59120999a45f0bb5d4eebbf7df082(
|
|
1294
|
+
index: jsii.Number,
|
|
1295
|
+
) -> None:
|
|
1296
|
+
"""Type checking stubs"""
|
|
1297
|
+
pass
|
|
1298
|
+
|
|
1299
|
+
def _typecheckingstub__9951e06afb155147ab301d7a3de3cd2fdf2af7a2dd07afb0107d1f31f5a9afe1(
|
|
1300
|
+
value: builtins.str,
|
|
1301
|
+
) -> None:
|
|
1302
|
+
"""Type checking stubs"""
|
|
1303
|
+
pass
|
|
1304
|
+
|
|
1305
|
+
def _typecheckingstub__1f8a6b5225ae6d3e8dbe934b52f44ed3cf6e1d733e66b15339254b7710ecc1bc(
|
|
1306
|
+
value: _cdktf_9a9027ec.IInterpolatingParent,
|
|
1307
|
+
) -> None:
|
|
1308
|
+
"""Type checking stubs"""
|
|
1309
|
+
pass
|
|
1310
|
+
|
|
1311
|
+
def _typecheckingstub__2b068ef6542bae20782fcaa4e350a92c8cd34d45062fcf493a138e97a0b38f86(
|
|
1312
|
+
value: builtins.bool,
|
|
1313
|
+
) -> None:
|
|
1314
|
+
"""Type checking stubs"""
|
|
1315
|
+
pass
|
|
1316
|
+
|
|
1317
|
+
def _typecheckingstub__f8e732b3935e5c2c284f9e0a1a9b80014417767d3cb70421fd39ff444d5c67bf(
|
|
1318
|
+
value: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List[LoadbalancerBackendProperties]]],
|
|
1319
|
+
) -> None:
|
|
1320
|
+
"""Type checking stubs"""
|
|
1321
|
+
pass
|
|
1322
|
+
|
|
1323
|
+
def _typecheckingstub__0c083897711e36589f6551ae9e4bc07921aadcee7d8ec5d8bee78e03d6160dda(
|
|
1324
|
+
terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
|
|
1325
|
+
terraform_attribute: builtins.str,
|
|
1326
|
+
complex_object_index: jsii.Number,
|
|
1327
|
+
complex_object_is_from_set: builtins.bool,
|
|
1328
|
+
) -> None:
|
|
1329
|
+
"""Type checking stubs"""
|
|
1330
|
+
pass
|
|
1331
|
+
|
|
1332
|
+
def _typecheckingstub__7dc3f08a62f7f1c1d999cf41443e8d00ab201864398241c00de9cc77da1c2342(
|
|
1333
|
+
value: jsii.Number,
|
|
1334
|
+
) -> None:
|
|
1335
|
+
"""Type checking stubs"""
|
|
1336
|
+
pass
|
|
1337
|
+
|
|
1338
|
+
def _typecheckingstub__8a74c22cd3b86c3c486e323569b855be74e55b4f1661df85a24cd150f9700581(
|
|
1339
|
+
value: jsii.Number,
|
|
1340
|
+
) -> None:
|
|
1341
|
+
"""Type checking stubs"""
|
|
1342
|
+
pass
|
|
1343
|
+
|
|
1344
|
+
def _typecheckingstub__bc4a5fcdf1d72f3f8e196e0b9fe2c716f66386010cf2bcefe94884b091dd1099(
|
|
1345
|
+
value: jsii.Number,
|
|
1346
|
+
) -> None:
|
|
1347
|
+
"""Type checking stubs"""
|
|
1348
|
+
pass
|
|
1349
|
+
|
|
1350
|
+
def _typecheckingstub__5a005b6a89678311ae87bf7a8226f1b8b8341f6f7dbe94f53264244eec7b1941(
|
|
1351
|
+
value: jsii.Number,
|
|
1352
|
+
) -> None:
|
|
1353
|
+
"""Type checking stubs"""
|
|
1354
|
+
pass
|
|
1355
|
+
|
|
1356
|
+
def _typecheckingstub__7a1f0408301a8ed0464e766b76ea9c173a85a6c5972f17c867955e8f12d24892(
|
|
1357
|
+
value: typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable],
|
|
1358
|
+
) -> None:
|
|
1359
|
+
"""Type checking stubs"""
|
|
1360
|
+
pass
|
|
1361
|
+
|
|
1362
|
+
def _typecheckingstub__8069e619c5eafcd61405a9b14ccbb5acc557f594802c36aa8bfd7d0fd8ff0219(
|
|
1363
|
+
value: builtins.str,
|
|
1364
|
+
) -> None:
|
|
1365
|
+
"""Type checking stubs"""
|
|
1366
|
+
pass
|
|
1367
|
+
|
|
1368
|
+
def _typecheckingstub__39f4a5b6a60297078707410bf16c529278fa67e401d14af087347f4acdc4f238(
|
|
1369
|
+
value: builtins.str,
|
|
1370
|
+
) -> None:
|
|
1371
|
+
"""Type checking stubs"""
|
|
1372
|
+
pass
|
|
1373
|
+
|
|
1374
|
+
def _typecheckingstub__c0ed74c710cac92ea40127eb8683ef34d63adf6cf079484e9ba4e70ae1d9c121(
|
|
1375
|
+
value: typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable],
|
|
1376
|
+
) -> None:
|
|
1377
|
+
"""Type checking stubs"""
|
|
1378
|
+
pass
|
|
1379
|
+
|
|
1380
|
+
def _typecheckingstub__643632d762dde3bfa52ccccc383516eae69f64de4c971e85aaa719e291c1c0fa(
|
|
1381
|
+
value: builtins.str,
|
|
1382
|
+
) -> None:
|
|
1383
|
+
"""Type checking stubs"""
|
|
1384
|
+
pass
|
|
1385
|
+
|
|
1386
|
+
def _typecheckingstub__da3ab1d8ffd0ee740d498a68367ab415a83ea5bb95a96b7bca9efb4ce8d99490(
|
|
1387
|
+
value: builtins.str,
|
|
1388
|
+
) -> None:
|
|
1389
|
+
"""Type checking stubs"""
|
|
1390
|
+
pass
|
|
1391
|
+
|
|
1392
|
+
def _typecheckingstub__62977787f77a98958c7b1c163fc10ef2d04d5473932b93993b385e7a7f4725a2(
|
|
1393
|
+
value: jsii.Number,
|
|
1394
|
+
) -> None:
|
|
1395
|
+
"""Type checking stubs"""
|
|
1396
|
+
pass
|
|
1397
|
+
|
|
1398
|
+
def _typecheckingstub__cd7554673f8db1f54b33f3b8832599eb58807a0023a40109ca959f715cf36c9b(
|
|
1399
|
+
value: jsii.Number,
|
|
1400
|
+
) -> None:
|
|
1401
|
+
"""Type checking stubs"""
|
|
1402
|
+
pass
|
|
1403
|
+
|
|
1404
|
+
def _typecheckingstub__a3971da5b5c90f1fd23ac2242c668f5d56a0071530ac27f4ec552f8ec4ce9ee2(
|
|
1405
|
+
value: typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable],
|
|
1406
|
+
) -> None:
|
|
1407
|
+
"""Type checking stubs"""
|
|
1408
|
+
pass
|
|
1409
|
+
|
|
1410
|
+
def _typecheckingstub__97f6e28d7e94f7b38cfe76b70291b8c0170c52b48c78b10dc8f76b4703c093e9(
|
|
1411
|
+
value: typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable],
|
|
1412
|
+
) -> None:
|
|
1413
|
+
"""Type checking stubs"""
|
|
1414
|
+
pass
|
|
1415
|
+
|
|
1416
|
+
def _typecheckingstub__0d060a9595c4cfc7ea56c1c33bf629d6166ba1a8b052484fd102442b53a67224(
|
|
1417
|
+
value: typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable],
|
|
1418
|
+
) -> None:
|
|
1419
|
+
"""Type checking stubs"""
|
|
1420
|
+
pass
|
|
1421
|
+
|
|
1422
|
+
def _typecheckingstub__c8c6fb57a71c2e0e202ceab15eb8b409d80557a71150004a0caaf083b5bb1cb5(
|
|
1423
|
+
value: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, LoadbalancerBackendProperties]],
|
|
1424
|
+
) -> None:
|
|
1425
|
+
"""Type checking stubs"""
|
|
1426
|
+
pass
|