cdktf-cdktf-provider-upcloud 15.8.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (66) hide show
  1. cdktf_cdktf_provider_upcloud/__init__.py +247 -0
  2. cdktf_cdktf_provider_upcloud/_jsii/__init__.py +45 -0
  3. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.8.0.jsii.tgz +0 -0
  4. cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +894 -0
  5. cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +633 -0
  6. cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +384 -0
  7. cdktf_cdktf_provider_upcloud/data_upcloud_load_balancer_dns_challenge_domain/__init__.py +319 -0
  8. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +853 -0
  9. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +717 -0
  10. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +1084 -0
  11. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_valkey_sessions/__init__.py +898 -0
  12. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +647 -0
  13. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +600 -0
  14. cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +1093 -0
  15. cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +725 -0
  16. cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +558 -0
  17. cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +421 -0
  18. cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +364 -0
  19. cdktf_cdktf_provider_upcloud/file_storage/__init__.py +1683 -0
  20. cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +1233 -0
  21. cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +552 -0
  22. cdktf_cdktf_provider_upcloud/gateway/__init__.py +1167 -0
  23. cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +1299 -0
  24. cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +1357 -0
  25. cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +801 -0
  26. cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +2674 -0
  27. cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +2113 -0
  28. cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +1426 -0
  29. cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +442 -0
  30. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +633 -0
  31. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +459 -0
  32. cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +1290 -0
  33. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +11486 -0
  34. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +442 -0
  35. cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +504 -0
  36. cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +659 -0
  37. cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +633 -0
  38. cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +536 -0
  39. cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +4644 -0
  40. cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +13812 -0
  41. cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +7734 -0
  42. cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +1541 -0
  43. cdktf_cdktf_provider_upcloud/managed_database_valkey/__init__.py +3355 -0
  44. cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +1198 -0
  45. cdktf_cdktf_provider_upcloud/managed_object_storage_bucket/__init__.py +409 -0
  46. cdktf_cdktf_provider_upcloud/managed_object_storage_custom_domain/__init__.py +446 -0
  47. cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +521 -0
  48. cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +454 -0
  49. cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +505 -0
  50. cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +485 -0
  51. cdktf_cdktf_provider_upcloud/network/__init__.py +1554 -0
  52. cdktf_cdktf_provider_upcloud/network_peering/__init__.py +1084 -0
  53. cdktf_cdktf_provider_upcloud/provider/__init__.py +544 -0
  54. cdktf_cdktf_provider_upcloud/py.typed +1 -0
  55. cdktf_cdktf_provider_upcloud/router/__init__.py +1030 -0
  56. cdktf_cdktf_provider_upcloud/server/__init__.py +4542 -0
  57. cdktf_cdktf_provider_upcloud/server_group/__init__.py +571 -0
  58. cdktf_cdktf_provider_upcloud/storage/__init__.py +1850 -0
  59. cdktf_cdktf_provider_upcloud/storage_backup/__init__.py +483 -0
  60. cdktf_cdktf_provider_upcloud/storage_template/__init__.py +478 -0
  61. cdktf_cdktf_provider_upcloud/tag/__init__.py +493 -0
  62. cdktf_cdktf_provider_upcloud-15.8.0.dist-info/LICENSE +355 -0
  63. cdktf_cdktf_provider_upcloud-15.8.0.dist-info/METADATA +120 -0
  64. cdktf_cdktf_provider_upcloud-15.8.0.dist-info/RECORD +66 -0
  65. cdktf_cdktf_provider_upcloud-15.8.0.dist-info/WHEEL +5 -0
  66. cdktf_cdktf_provider_upcloud-15.8.0.dist-info/top_level.txt +1 -0
@@ -0,0 +1,442 @@
1
+ r'''
2
+ # `upcloud_loadbalancer_backend_tls_config`
3
+
4
+ Refer to the Terraform Registry for docs: [`upcloud_loadbalancer_backend_tls_config`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend_tls_config).
5
+ '''
6
+ from pkgutil import extend_path
7
+ __path__ = extend_path(__path__, __name__)
8
+
9
+ import abc
10
+ import builtins
11
+ import datetime
12
+ import enum
13
+ import typing
14
+
15
+ import jsii
16
+ import publication
17
+ import typing_extensions
18
+
19
+ import typeguard
20
+ from importlib.metadata import version as _metadata_package_version
21
+ TYPEGUARD_MAJOR_VERSION = int(_metadata_package_version('typeguard').split('.')[0])
22
+
23
+ def check_type(argname: str, value: object, expected_type: typing.Any) -> typing.Any:
24
+ if TYPEGUARD_MAJOR_VERSION <= 2:
25
+ return typeguard.check_type(argname=argname, value=value, expected_type=expected_type) # type:ignore
26
+ else:
27
+ if isinstance(value, jsii._reference_map.InterfaceDynamicProxy): # pyright: ignore [reportAttributeAccessIssue]
28
+ pass
29
+ else:
30
+ if TYPEGUARD_MAJOR_VERSION == 3:
31
+ typeguard.config.collection_check_strategy = typeguard.CollectionCheckStrategy.ALL_ITEMS # type:ignore
32
+ typeguard.check_type(value=value, expected_type=expected_type) # type:ignore
33
+ else:
34
+ typeguard.check_type(value=value, expected_type=expected_type, collection_check_strategy=typeguard.CollectionCheckStrategy.ALL_ITEMS) # type:ignore
35
+
36
+ from .._jsii import *
37
+
38
+ import cdktf as _cdktf_9a9027ec
39
+ import constructs as _constructs_77d1e7e8
40
+
41
+
42
+ class LoadbalancerBackendTlsConfig(
43
+ _cdktf_9a9027ec.TerraformResource,
44
+ metaclass=jsii.JSIIMeta,
45
+ jsii_type="@cdktf/provider-upcloud.loadbalancerBackendTlsConfig.LoadbalancerBackendTlsConfig",
46
+ ):
47
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend_tls_config upcloud_loadbalancer_backend_tls_config}.'''
48
+
49
+ def __init__(
50
+ self,
51
+ scope: _constructs_77d1e7e8.Construct,
52
+ id: builtins.str,
53
+ *,
54
+ backend: builtins.str,
55
+ certificate_bundle: builtins.str,
56
+ name: builtins.str,
57
+ connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
58
+ count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
59
+ depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
60
+ for_each: typing.Optional[_cdktf_9a9027ec.ITerraformIterator] = None,
61
+ lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
62
+ provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
63
+ provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
64
+ ) -> None:
65
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend_tls_config upcloud_loadbalancer_backend_tls_config} Resource.
66
+
67
+ :param scope: The scope in which to define this construct.
68
+ :param id: The scoped construct ID. Must be unique amongst siblings in the same scope
69
+ :param backend: ID of the load balancer backend to which the TLS config is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend_tls_config#backend LoadbalancerBackendTlsConfig#backend}
70
+ :param certificate_bundle: Reference to certificate bundle ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend_tls_config#certificate_bundle LoadbalancerBackendTlsConfig#certificate_bundle}
71
+ :param name: The name of the TLS config. Must be unique within customer account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend_tls_config#name LoadbalancerBackendTlsConfig#name}
72
+ :param connection:
73
+ :param count:
74
+ :param depends_on:
75
+ :param for_each:
76
+ :param lifecycle:
77
+ :param provider:
78
+ :param provisioners:
79
+ '''
80
+ if __debug__:
81
+ type_hints = typing.get_type_hints(_typecheckingstub__3d96c92083db198ebd100f7c2446806611498beeca1184629335c6f025a42e7d)
82
+ check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
83
+ check_type(argname="argument id", value=id, expected_type=type_hints["id"])
84
+ config = LoadbalancerBackendTlsConfigConfig(
85
+ backend=backend,
86
+ certificate_bundle=certificate_bundle,
87
+ name=name,
88
+ connection=connection,
89
+ count=count,
90
+ depends_on=depends_on,
91
+ for_each=for_each,
92
+ lifecycle=lifecycle,
93
+ provider=provider,
94
+ provisioners=provisioners,
95
+ )
96
+
97
+ jsii.create(self.__class__, self, [scope, id, config])
98
+
99
+ @jsii.member(jsii_name="generateConfigForImport")
100
+ @builtins.classmethod
101
+ def generate_config_for_import(
102
+ cls,
103
+ scope: _constructs_77d1e7e8.Construct,
104
+ import_to_id: builtins.str,
105
+ import_from_id: builtins.str,
106
+ provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
107
+ ) -> _cdktf_9a9027ec.ImportableResource:
108
+ '''Generates CDKTF code for importing a LoadbalancerBackendTlsConfig resource upon running "cdktf plan ".
109
+
110
+ :param scope: The scope in which to define this construct.
111
+ :param import_to_id: The construct id used in the generated config for the LoadbalancerBackendTlsConfig to import.
112
+ :param import_from_id: The id of the existing LoadbalancerBackendTlsConfig that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend_tls_config#import import section} in the documentation of this resource for the id to use
113
+ :param provider: ? Optional instance of the provider where the LoadbalancerBackendTlsConfig to import is found.
114
+ '''
115
+ if __debug__:
116
+ type_hints = typing.get_type_hints(_typecheckingstub__c0b3b9bb16ffaabc57b4b364fd3fe377153b61ea5027e1c6d7dc250bc21faaeb)
117
+ check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
118
+ check_type(argname="argument import_to_id", value=import_to_id, expected_type=type_hints["import_to_id"])
119
+ check_type(argname="argument import_from_id", value=import_from_id, expected_type=type_hints["import_from_id"])
120
+ check_type(argname="argument provider", value=provider, expected_type=type_hints["provider"])
121
+ return typing.cast(_cdktf_9a9027ec.ImportableResource, jsii.sinvoke(cls, "generateConfigForImport", [scope, import_to_id, import_from_id, provider]))
122
+
123
+ @jsii.member(jsii_name="synthesizeAttributes")
124
+ def _synthesize_attributes(self) -> typing.Mapping[builtins.str, typing.Any]:
125
+ return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "synthesizeAttributes", []))
126
+
127
+ @jsii.member(jsii_name="synthesizeHclAttributes")
128
+ def _synthesize_hcl_attributes(self) -> typing.Mapping[builtins.str, typing.Any]:
129
+ return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "synthesizeHclAttributes", []))
130
+
131
+ @jsii.python.classproperty
132
+ @jsii.member(jsii_name="tfResourceType")
133
+ def TF_RESOURCE_TYPE(cls) -> builtins.str:
134
+ return typing.cast(builtins.str, jsii.sget(cls, "tfResourceType"))
135
+
136
+ @builtins.property
137
+ @jsii.member(jsii_name="id")
138
+ def id(self) -> builtins.str:
139
+ return typing.cast(builtins.str, jsii.get(self, "id"))
140
+
141
+ @builtins.property
142
+ @jsii.member(jsii_name="backendInput")
143
+ def backend_input(self) -> typing.Optional[builtins.str]:
144
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "backendInput"))
145
+
146
+ @builtins.property
147
+ @jsii.member(jsii_name="certificateBundleInput")
148
+ def certificate_bundle_input(self) -> typing.Optional[builtins.str]:
149
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "certificateBundleInput"))
150
+
151
+ @builtins.property
152
+ @jsii.member(jsii_name="nameInput")
153
+ def name_input(self) -> typing.Optional[builtins.str]:
154
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "nameInput"))
155
+
156
+ @builtins.property
157
+ @jsii.member(jsii_name="backend")
158
+ def backend(self) -> builtins.str:
159
+ return typing.cast(builtins.str, jsii.get(self, "backend"))
160
+
161
+ @backend.setter
162
+ def backend(self, value: builtins.str) -> None:
163
+ if __debug__:
164
+ type_hints = typing.get_type_hints(_typecheckingstub__4fbea50b7b566b3e389da9797856acdc9090ee8b47644d6c8314d871aaa6f4e5)
165
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
166
+ jsii.set(self, "backend", value) # pyright: ignore[reportArgumentType]
167
+
168
+ @builtins.property
169
+ @jsii.member(jsii_name="certificateBundle")
170
+ def certificate_bundle(self) -> builtins.str:
171
+ return typing.cast(builtins.str, jsii.get(self, "certificateBundle"))
172
+
173
+ @certificate_bundle.setter
174
+ def certificate_bundle(self, value: builtins.str) -> None:
175
+ if __debug__:
176
+ type_hints = typing.get_type_hints(_typecheckingstub__3d11372f2999ed6c8e1782e6ee18de8f4070691da020c6b1928828afe7bcfcec)
177
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
178
+ jsii.set(self, "certificateBundle", value) # pyright: ignore[reportArgumentType]
179
+
180
+ @builtins.property
181
+ @jsii.member(jsii_name="name")
182
+ def name(self) -> builtins.str:
183
+ return typing.cast(builtins.str, jsii.get(self, "name"))
184
+
185
+ @name.setter
186
+ def name(self, value: builtins.str) -> None:
187
+ if __debug__:
188
+ type_hints = typing.get_type_hints(_typecheckingstub__4e1fb569400cf70a3017adc22d8ea1d63edb075417f7ef9be9d5324b29b5ccb0)
189
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
190
+ jsii.set(self, "name", value) # pyright: ignore[reportArgumentType]
191
+
192
+
193
+ @jsii.data_type(
194
+ jsii_type="@cdktf/provider-upcloud.loadbalancerBackendTlsConfig.LoadbalancerBackendTlsConfigConfig",
195
+ jsii_struct_bases=[_cdktf_9a9027ec.TerraformMetaArguments],
196
+ name_mapping={
197
+ "connection": "connection",
198
+ "count": "count",
199
+ "depends_on": "dependsOn",
200
+ "for_each": "forEach",
201
+ "lifecycle": "lifecycle",
202
+ "provider": "provider",
203
+ "provisioners": "provisioners",
204
+ "backend": "backend",
205
+ "certificate_bundle": "certificateBundle",
206
+ "name": "name",
207
+ },
208
+ )
209
+ class LoadbalancerBackendTlsConfigConfig(_cdktf_9a9027ec.TerraformMetaArguments):
210
+ def __init__(
211
+ self,
212
+ *,
213
+ connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
214
+ count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
215
+ depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
216
+ for_each: typing.Optional[_cdktf_9a9027ec.ITerraformIterator] = None,
217
+ lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
218
+ provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
219
+ provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
220
+ backend: builtins.str,
221
+ certificate_bundle: builtins.str,
222
+ name: builtins.str,
223
+ ) -> None:
224
+ '''
225
+ :param connection:
226
+ :param count:
227
+ :param depends_on:
228
+ :param for_each:
229
+ :param lifecycle:
230
+ :param provider:
231
+ :param provisioners:
232
+ :param backend: ID of the load balancer backend to which the TLS config is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend_tls_config#backend LoadbalancerBackendTlsConfig#backend}
233
+ :param certificate_bundle: Reference to certificate bundle ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend_tls_config#certificate_bundle LoadbalancerBackendTlsConfig#certificate_bundle}
234
+ :param name: The name of the TLS config. Must be unique within customer account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend_tls_config#name LoadbalancerBackendTlsConfig#name}
235
+ '''
236
+ if isinstance(lifecycle, dict):
237
+ lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
238
+ if __debug__:
239
+ type_hints = typing.get_type_hints(_typecheckingstub__b6a57f42bcde485030383192ea3d675982617870d8a33aa37f4bbf14a34c7800)
240
+ check_type(argname="argument connection", value=connection, expected_type=type_hints["connection"])
241
+ check_type(argname="argument count", value=count, expected_type=type_hints["count"])
242
+ check_type(argname="argument depends_on", value=depends_on, expected_type=type_hints["depends_on"])
243
+ check_type(argname="argument for_each", value=for_each, expected_type=type_hints["for_each"])
244
+ check_type(argname="argument lifecycle", value=lifecycle, expected_type=type_hints["lifecycle"])
245
+ check_type(argname="argument provider", value=provider, expected_type=type_hints["provider"])
246
+ check_type(argname="argument provisioners", value=provisioners, expected_type=type_hints["provisioners"])
247
+ check_type(argname="argument backend", value=backend, expected_type=type_hints["backend"])
248
+ check_type(argname="argument certificate_bundle", value=certificate_bundle, expected_type=type_hints["certificate_bundle"])
249
+ check_type(argname="argument name", value=name, expected_type=type_hints["name"])
250
+ self._values: typing.Dict[builtins.str, typing.Any] = {
251
+ "backend": backend,
252
+ "certificate_bundle": certificate_bundle,
253
+ "name": name,
254
+ }
255
+ if connection is not None:
256
+ self._values["connection"] = connection
257
+ if count is not None:
258
+ self._values["count"] = count
259
+ if depends_on is not None:
260
+ self._values["depends_on"] = depends_on
261
+ if for_each is not None:
262
+ self._values["for_each"] = for_each
263
+ if lifecycle is not None:
264
+ self._values["lifecycle"] = lifecycle
265
+ if provider is not None:
266
+ self._values["provider"] = provider
267
+ if provisioners is not None:
268
+ self._values["provisioners"] = provisioners
269
+
270
+ @builtins.property
271
+ def connection(
272
+ self,
273
+ ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, _cdktf_9a9027ec.WinrmProvisionerConnection]]:
274
+ '''
275
+ :stability: experimental
276
+ '''
277
+ result = self._values.get("connection")
278
+ return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, _cdktf_9a9027ec.WinrmProvisionerConnection]], result)
279
+
280
+ @builtins.property
281
+ def count(
282
+ self,
283
+ ) -> typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]]:
284
+ '''
285
+ :stability: experimental
286
+ '''
287
+ result = self._values.get("count")
288
+ return typing.cast(typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]], result)
289
+
290
+ @builtins.property
291
+ def depends_on(
292
+ self,
293
+ ) -> typing.Optional[typing.List[_cdktf_9a9027ec.ITerraformDependable]]:
294
+ '''
295
+ :stability: experimental
296
+ '''
297
+ result = self._values.get("depends_on")
298
+ return typing.cast(typing.Optional[typing.List[_cdktf_9a9027ec.ITerraformDependable]], result)
299
+
300
+ @builtins.property
301
+ def for_each(self) -> typing.Optional[_cdktf_9a9027ec.ITerraformIterator]:
302
+ '''
303
+ :stability: experimental
304
+ '''
305
+ result = self._values.get("for_each")
306
+ return typing.cast(typing.Optional[_cdktf_9a9027ec.ITerraformIterator], result)
307
+
308
+ @builtins.property
309
+ def lifecycle(self) -> typing.Optional[_cdktf_9a9027ec.TerraformResourceLifecycle]:
310
+ '''
311
+ :stability: experimental
312
+ '''
313
+ result = self._values.get("lifecycle")
314
+ return typing.cast(typing.Optional[_cdktf_9a9027ec.TerraformResourceLifecycle], result)
315
+
316
+ @builtins.property
317
+ def provider(self) -> typing.Optional[_cdktf_9a9027ec.TerraformProvider]:
318
+ '''
319
+ :stability: experimental
320
+ '''
321
+ result = self._values.get("provider")
322
+ return typing.cast(typing.Optional[_cdktf_9a9027ec.TerraformProvider], result)
323
+
324
+ @builtins.property
325
+ def provisioners(
326
+ self,
327
+ ) -> typing.Optional[typing.List[typing.Union[_cdktf_9a9027ec.FileProvisioner, _cdktf_9a9027ec.LocalExecProvisioner, _cdktf_9a9027ec.RemoteExecProvisioner]]]:
328
+ '''
329
+ :stability: experimental
330
+ '''
331
+ result = self._values.get("provisioners")
332
+ return typing.cast(typing.Optional[typing.List[typing.Union[_cdktf_9a9027ec.FileProvisioner, _cdktf_9a9027ec.LocalExecProvisioner, _cdktf_9a9027ec.RemoteExecProvisioner]]], result)
333
+
334
+ @builtins.property
335
+ def backend(self) -> builtins.str:
336
+ '''ID of the load balancer backend to which the TLS config is connected.
337
+
338
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend_tls_config#backend LoadbalancerBackendTlsConfig#backend}
339
+ '''
340
+ result = self._values.get("backend")
341
+ assert result is not None, "Required property 'backend' is missing"
342
+ return typing.cast(builtins.str, result)
343
+
344
+ @builtins.property
345
+ def certificate_bundle(self) -> builtins.str:
346
+ '''Reference to certificate bundle ID.
347
+
348
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend_tls_config#certificate_bundle LoadbalancerBackendTlsConfig#certificate_bundle}
349
+ '''
350
+ result = self._values.get("certificate_bundle")
351
+ assert result is not None, "Required property 'certificate_bundle' is missing"
352
+ return typing.cast(builtins.str, result)
353
+
354
+ @builtins.property
355
+ def name(self) -> builtins.str:
356
+ '''The name of the TLS config. Must be unique within customer account.
357
+
358
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_backend_tls_config#name LoadbalancerBackendTlsConfig#name}
359
+ '''
360
+ result = self._values.get("name")
361
+ assert result is not None, "Required property 'name' is missing"
362
+ return typing.cast(builtins.str, result)
363
+
364
+ def __eq__(self, rhs: typing.Any) -> builtins.bool:
365
+ return isinstance(rhs, self.__class__) and rhs._values == self._values
366
+
367
+ def __ne__(self, rhs: typing.Any) -> builtins.bool:
368
+ return not (rhs == self)
369
+
370
+ def __repr__(self) -> str:
371
+ return "LoadbalancerBackendTlsConfigConfig(%s)" % ", ".join(
372
+ k + "=" + repr(v) for k, v in self._values.items()
373
+ )
374
+
375
+
376
+ __all__ = [
377
+ "LoadbalancerBackendTlsConfig",
378
+ "LoadbalancerBackendTlsConfigConfig",
379
+ ]
380
+
381
+ publication.publish()
382
+
383
+ def _typecheckingstub__3d96c92083db198ebd100f7c2446806611498beeca1184629335c6f025a42e7d(
384
+ scope: _constructs_77d1e7e8.Construct,
385
+ id: builtins.str,
386
+ *,
387
+ backend: builtins.str,
388
+ certificate_bundle: builtins.str,
389
+ name: builtins.str,
390
+ connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
391
+ count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
392
+ depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
393
+ for_each: typing.Optional[_cdktf_9a9027ec.ITerraformIterator] = None,
394
+ lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
395
+ provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
396
+ provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
397
+ ) -> None:
398
+ """Type checking stubs"""
399
+ pass
400
+
401
+ def _typecheckingstub__c0b3b9bb16ffaabc57b4b364fd3fe377153b61ea5027e1c6d7dc250bc21faaeb(
402
+ scope: _constructs_77d1e7e8.Construct,
403
+ import_to_id: builtins.str,
404
+ import_from_id: builtins.str,
405
+ provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
406
+ ) -> None:
407
+ """Type checking stubs"""
408
+ pass
409
+
410
+ def _typecheckingstub__4fbea50b7b566b3e389da9797856acdc9090ee8b47644d6c8314d871aaa6f4e5(
411
+ value: builtins.str,
412
+ ) -> None:
413
+ """Type checking stubs"""
414
+ pass
415
+
416
+ def _typecheckingstub__3d11372f2999ed6c8e1782e6ee18de8f4070691da020c6b1928828afe7bcfcec(
417
+ value: builtins.str,
418
+ ) -> None:
419
+ """Type checking stubs"""
420
+ pass
421
+
422
+ def _typecheckingstub__4e1fb569400cf70a3017adc22d8ea1d63edb075417f7ef9be9d5324b29b5ccb0(
423
+ value: builtins.str,
424
+ ) -> None:
425
+ """Type checking stubs"""
426
+ pass
427
+
428
+ def _typecheckingstub__b6a57f42bcde485030383192ea3d675982617870d8a33aa37f4bbf14a34c7800(
429
+ *,
430
+ connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
431
+ count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
432
+ depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
433
+ for_each: typing.Optional[_cdktf_9a9027ec.ITerraformIterator] = None,
434
+ lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
435
+ provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
436
+ provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
437
+ backend: builtins.str,
438
+ certificate_bundle: builtins.str,
439
+ name: builtins.str,
440
+ ) -> None:
441
+ """Type checking stubs"""
442
+ pass