cdktf-cdktf-provider-upcloud 15.8.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (66) hide show
  1. cdktf_cdktf_provider_upcloud/__init__.py +247 -0
  2. cdktf_cdktf_provider_upcloud/_jsii/__init__.py +45 -0
  3. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.8.0.jsii.tgz +0 -0
  4. cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +894 -0
  5. cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +633 -0
  6. cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +384 -0
  7. cdktf_cdktf_provider_upcloud/data_upcloud_load_balancer_dns_challenge_domain/__init__.py +319 -0
  8. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +853 -0
  9. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +717 -0
  10. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +1084 -0
  11. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_valkey_sessions/__init__.py +898 -0
  12. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +647 -0
  13. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +600 -0
  14. cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +1093 -0
  15. cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +725 -0
  16. cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +558 -0
  17. cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +421 -0
  18. cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +364 -0
  19. cdktf_cdktf_provider_upcloud/file_storage/__init__.py +1683 -0
  20. cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +1233 -0
  21. cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +552 -0
  22. cdktf_cdktf_provider_upcloud/gateway/__init__.py +1167 -0
  23. cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +1299 -0
  24. cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +1357 -0
  25. cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +801 -0
  26. cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +2674 -0
  27. cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +2113 -0
  28. cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +1426 -0
  29. cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +442 -0
  30. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +633 -0
  31. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +459 -0
  32. cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +1290 -0
  33. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +11486 -0
  34. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +442 -0
  35. cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +504 -0
  36. cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +659 -0
  37. cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +633 -0
  38. cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +536 -0
  39. cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +4644 -0
  40. cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +13812 -0
  41. cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +7734 -0
  42. cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +1541 -0
  43. cdktf_cdktf_provider_upcloud/managed_database_valkey/__init__.py +3355 -0
  44. cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +1198 -0
  45. cdktf_cdktf_provider_upcloud/managed_object_storage_bucket/__init__.py +409 -0
  46. cdktf_cdktf_provider_upcloud/managed_object_storage_custom_domain/__init__.py +446 -0
  47. cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +521 -0
  48. cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +454 -0
  49. cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +505 -0
  50. cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +485 -0
  51. cdktf_cdktf_provider_upcloud/network/__init__.py +1554 -0
  52. cdktf_cdktf_provider_upcloud/network_peering/__init__.py +1084 -0
  53. cdktf_cdktf_provider_upcloud/provider/__init__.py +544 -0
  54. cdktf_cdktf_provider_upcloud/py.typed +1 -0
  55. cdktf_cdktf_provider_upcloud/router/__init__.py +1030 -0
  56. cdktf_cdktf_provider_upcloud/server/__init__.py +4542 -0
  57. cdktf_cdktf_provider_upcloud/server_group/__init__.py +571 -0
  58. cdktf_cdktf_provider_upcloud/storage/__init__.py +1850 -0
  59. cdktf_cdktf_provider_upcloud/storage_backup/__init__.py +483 -0
  60. cdktf_cdktf_provider_upcloud/storage_template/__init__.py +478 -0
  61. cdktf_cdktf_provider_upcloud/tag/__init__.py +493 -0
  62. cdktf_cdktf_provider_upcloud-15.8.0.dist-info/LICENSE +355 -0
  63. cdktf_cdktf_provider_upcloud-15.8.0.dist-info/METADATA +120 -0
  64. cdktf_cdktf_provider_upcloud-15.8.0.dist-info/RECORD +66 -0
  65. cdktf_cdktf_provider_upcloud-15.8.0.dist-info/WHEEL +5 -0
  66. cdktf_cdktf_provider_upcloud-15.8.0.dist-info/top_level.txt +1 -0
@@ -0,0 +1,459 @@
1
+ r'''
2
+ # `upcloud_loadbalancer_dynamic_certificate_bundle`
3
+
4
+ Refer to the Terraform Registry for docs: [`upcloud_loadbalancer_dynamic_certificate_bundle`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_dynamic_certificate_bundle).
5
+ '''
6
+ from pkgutil import extend_path
7
+ __path__ = extend_path(__path__, __name__)
8
+
9
+ import abc
10
+ import builtins
11
+ import datetime
12
+ import enum
13
+ import typing
14
+
15
+ import jsii
16
+ import publication
17
+ import typing_extensions
18
+
19
+ import typeguard
20
+ from importlib.metadata import version as _metadata_package_version
21
+ TYPEGUARD_MAJOR_VERSION = int(_metadata_package_version('typeguard').split('.')[0])
22
+
23
+ def check_type(argname: str, value: object, expected_type: typing.Any) -> typing.Any:
24
+ if TYPEGUARD_MAJOR_VERSION <= 2:
25
+ return typeguard.check_type(argname=argname, value=value, expected_type=expected_type) # type:ignore
26
+ else:
27
+ if isinstance(value, jsii._reference_map.InterfaceDynamicProxy): # pyright: ignore [reportAttributeAccessIssue]
28
+ pass
29
+ else:
30
+ if TYPEGUARD_MAJOR_VERSION == 3:
31
+ typeguard.config.collection_check_strategy = typeguard.CollectionCheckStrategy.ALL_ITEMS # type:ignore
32
+ typeguard.check_type(value=value, expected_type=expected_type) # type:ignore
33
+ else:
34
+ typeguard.check_type(value=value, expected_type=expected_type, collection_check_strategy=typeguard.CollectionCheckStrategy.ALL_ITEMS) # type:ignore
35
+
36
+ from .._jsii import *
37
+
38
+ import cdktf as _cdktf_9a9027ec
39
+ import constructs as _constructs_77d1e7e8
40
+
41
+
42
+ class LoadbalancerDynamicCertificateBundle(
43
+ _cdktf_9a9027ec.TerraformResource,
44
+ metaclass=jsii.JSIIMeta,
45
+ jsii_type="@cdktf/provider-upcloud.loadbalancerDynamicCertificateBundle.LoadbalancerDynamicCertificateBundle",
46
+ ):
47
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_dynamic_certificate_bundle upcloud_loadbalancer_dynamic_certificate_bundle}.'''
48
+
49
+ def __init__(
50
+ self,
51
+ scope: _constructs_77d1e7e8.Construct,
52
+ id: builtins.str,
53
+ *,
54
+ hostnames: typing.Sequence[builtins.str],
55
+ key_type: builtins.str,
56
+ name: builtins.str,
57
+ connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
58
+ count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
59
+ depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
60
+ for_each: typing.Optional[_cdktf_9a9027ec.ITerraformIterator] = None,
61
+ lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
62
+ provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
63
+ provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
64
+ ) -> None:
65
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_dynamic_certificate_bundle upcloud_loadbalancer_dynamic_certificate_bundle} Resource.
66
+
67
+ :param scope: The scope in which to define this construct.
68
+ :param id: The scoped construct ID. Must be unique amongst siblings in the same scope
69
+ :param hostnames: Certificate hostnames. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_dynamic_certificate_bundle#hostnames LoadbalancerDynamicCertificateBundle#hostnames}
70
+ :param key_type: Private key type (``rsa`` / ``ecdsa``). Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_dynamic_certificate_bundle#key_type LoadbalancerDynamicCertificateBundle#key_type}
71
+ :param name: The name of the certificate bundle. Must be unique within customer account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_dynamic_certificate_bundle#name LoadbalancerDynamicCertificateBundle#name}
72
+ :param connection:
73
+ :param count:
74
+ :param depends_on:
75
+ :param for_each:
76
+ :param lifecycle:
77
+ :param provider:
78
+ :param provisioners:
79
+ '''
80
+ if __debug__:
81
+ type_hints = typing.get_type_hints(_typecheckingstub__2a46181dda53da2f4cda4b7c23ce6023fe4616e4966b031bfce2e26b23bc7689)
82
+ check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
83
+ check_type(argname="argument id", value=id, expected_type=type_hints["id"])
84
+ config = LoadbalancerDynamicCertificateBundleConfig(
85
+ hostnames=hostnames,
86
+ key_type=key_type,
87
+ name=name,
88
+ connection=connection,
89
+ count=count,
90
+ depends_on=depends_on,
91
+ for_each=for_each,
92
+ lifecycle=lifecycle,
93
+ provider=provider,
94
+ provisioners=provisioners,
95
+ )
96
+
97
+ jsii.create(self.__class__, self, [scope, id, config])
98
+
99
+ @jsii.member(jsii_name="generateConfigForImport")
100
+ @builtins.classmethod
101
+ def generate_config_for_import(
102
+ cls,
103
+ scope: _constructs_77d1e7e8.Construct,
104
+ import_to_id: builtins.str,
105
+ import_from_id: builtins.str,
106
+ provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
107
+ ) -> _cdktf_9a9027ec.ImportableResource:
108
+ '''Generates CDKTF code for importing a LoadbalancerDynamicCertificateBundle resource upon running "cdktf plan ".
109
+
110
+ :param scope: The scope in which to define this construct.
111
+ :param import_to_id: The construct id used in the generated config for the LoadbalancerDynamicCertificateBundle to import.
112
+ :param import_from_id: The id of the existing LoadbalancerDynamicCertificateBundle that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_dynamic_certificate_bundle#import import section} in the documentation of this resource for the id to use
113
+ :param provider: ? Optional instance of the provider where the LoadbalancerDynamicCertificateBundle to import is found.
114
+ '''
115
+ if __debug__:
116
+ type_hints = typing.get_type_hints(_typecheckingstub__517311c00ab7f60cd0c1cbdcb53e08db996310df98249cde15e4319b5438f9c1)
117
+ check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
118
+ check_type(argname="argument import_to_id", value=import_to_id, expected_type=type_hints["import_to_id"])
119
+ check_type(argname="argument import_from_id", value=import_from_id, expected_type=type_hints["import_from_id"])
120
+ check_type(argname="argument provider", value=provider, expected_type=type_hints["provider"])
121
+ return typing.cast(_cdktf_9a9027ec.ImportableResource, jsii.sinvoke(cls, "generateConfigForImport", [scope, import_to_id, import_from_id, provider]))
122
+
123
+ @jsii.member(jsii_name="synthesizeAttributes")
124
+ def _synthesize_attributes(self) -> typing.Mapping[builtins.str, typing.Any]:
125
+ return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "synthesizeAttributes", []))
126
+
127
+ @jsii.member(jsii_name="synthesizeHclAttributes")
128
+ def _synthesize_hcl_attributes(self) -> typing.Mapping[builtins.str, typing.Any]:
129
+ return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "synthesizeHclAttributes", []))
130
+
131
+ @jsii.python.classproperty
132
+ @jsii.member(jsii_name="tfResourceType")
133
+ def TF_RESOURCE_TYPE(cls) -> builtins.str:
134
+ return typing.cast(builtins.str, jsii.sget(cls, "tfResourceType"))
135
+
136
+ @builtins.property
137
+ @jsii.member(jsii_name="id")
138
+ def id(self) -> builtins.str:
139
+ return typing.cast(builtins.str, jsii.get(self, "id"))
140
+
141
+ @builtins.property
142
+ @jsii.member(jsii_name="notAfter")
143
+ def not_after(self) -> builtins.str:
144
+ return typing.cast(builtins.str, jsii.get(self, "notAfter"))
145
+
146
+ @builtins.property
147
+ @jsii.member(jsii_name="notBefore")
148
+ def not_before(self) -> builtins.str:
149
+ return typing.cast(builtins.str, jsii.get(self, "notBefore"))
150
+
151
+ @builtins.property
152
+ @jsii.member(jsii_name="operationalState")
153
+ def operational_state(self) -> builtins.str:
154
+ return typing.cast(builtins.str, jsii.get(self, "operationalState"))
155
+
156
+ @builtins.property
157
+ @jsii.member(jsii_name="hostnamesInput")
158
+ def hostnames_input(self) -> typing.Optional[typing.List[builtins.str]]:
159
+ return typing.cast(typing.Optional[typing.List[builtins.str]], jsii.get(self, "hostnamesInput"))
160
+
161
+ @builtins.property
162
+ @jsii.member(jsii_name="keyTypeInput")
163
+ def key_type_input(self) -> typing.Optional[builtins.str]:
164
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "keyTypeInput"))
165
+
166
+ @builtins.property
167
+ @jsii.member(jsii_name="nameInput")
168
+ def name_input(self) -> typing.Optional[builtins.str]:
169
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "nameInput"))
170
+
171
+ @builtins.property
172
+ @jsii.member(jsii_name="hostnames")
173
+ def hostnames(self) -> typing.List[builtins.str]:
174
+ return typing.cast(typing.List[builtins.str], jsii.get(self, "hostnames"))
175
+
176
+ @hostnames.setter
177
+ def hostnames(self, value: typing.List[builtins.str]) -> None:
178
+ if __debug__:
179
+ type_hints = typing.get_type_hints(_typecheckingstub__af6b13bbea6e5016ed8fbc3a8239b43d57f52871a76598feb5c15975d1af77c7)
180
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
181
+ jsii.set(self, "hostnames", value) # pyright: ignore[reportArgumentType]
182
+
183
+ @builtins.property
184
+ @jsii.member(jsii_name="keyType")
185
+ def key_type(self) -> builtins.str:
186
+ return typing.cast(builtins.str, jsii.get(self, "keyType"))
187
+
188
+ @key_type.setter
189
+ def key_type(self, value: builtins.str) -> None:
190
+ if __debug__:
191
+ type_hints = typing.get_type_hints(_typecheckingstub__b0c5408231a1e82fc5396a17275dcd2c0244a0cd1db650288a104fea3d12abf8)
192
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
193
+ jsii.set(self, "keyType", value) # pyright: ignore[reportArgumentType]
194
+
195
+ @builtins.property
196
+ @jsii.member(jsii_name="name")
197
+ def name(self) -> builtins.str:
198
+ return typing.cast(builtins.str, jsii.get(self, "name"))
199
+
200
+ @name.setter
201
+ def name(self, value: builtins.str) -> None:
202
+ if __debug__:
203
+ type_hints = typing.get_type_hints(_typecheckingstub__471522ca789842f463f90f4e3258eff20d765fb5181d1cd901479ee389e2e83a)
204
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
205
+ jsii.set(self, "name", value) # pyright: ignore[reportArgumentType]
206
+
207
+
208
+ @jsii.data_type(
209
+ jsii_type="@cdktf/provider-upcloud.loadbalancerDynamicCertificateBundle.LoadbalancerDynamicCertificateBundleConfig",
210
+ jsii_struct_bases=[_cdktf_9a9027ec.TerraformMetaArguments],
211
+ name_mapping={
212
+ "connection": "connection",
213
+ "count": "count",
214
+ "depends_on": "dependsOn",
215
+ "for_each": "forEach",
216
+ "lifecycle": "lifecycle",
217
+ "provider": "provider",
218
+ "provisioners": "provisioners",
219
+ "hostnames": "hostnames",
220
+ "key_type": "keyType",
221
+ "name": "name",
222
+ },
223
+ )
224
+ class LoadbalancerDynamicCertificateBundleConfig(
225
+ _cdktf_9a9027ec.TerraformMetaArguments,
226
+ ):
227
+ def __init__(
228
+ self,
229
+ *,
230
+ connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
231
+ count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
232
+ depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
233
+ for_each: typing.Optional[_cdktf_9a9027ec.ITerraformIterator] = None,
234
+ lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
235
+ provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
236
+ provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
237
+ hostnames: typing.Sequence[builtins.str],
238
+ key_type: builtins.str,
239
+ name: builtins.str,
240
+ ) -> None:
241
+ '''
242
+ :param connection:
243
+ :param count:
244
+ :param depends_on:
245
+ :param for_each:
246
+ :param lifecycle:
247
+ :param provider:
248
+ :param provisioners:
249
+ :param hostnames: Certificate hostnames. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_dynamic_certificate_bundle#hostnames LoadbalancerDynamicCertificateBundle#hostnames}
250
+ :param key_type: Private key type (``rsa`` / ``ecdsa``). Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_dynamic_certificate_bundle#key_type LoadbalancerDynamicCertificateBundle#key_type}
251
+ :param name: The name of the certificate bundle. Must be unique within customer account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_dynamic_certificate_bundle#name LoadbalancerDynamicCertificateBundle#name}
252
+ '''
253
+ if isinstance(lifecycle, dict):
254
+ lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
255
+ if __debug__:
256
+ type_hints = typing.get_type_hints(_typecheckingstub__148c515a5ea72589538d574c71e6abefd303b776be3bf3d37f6a63f610422096)
257
+ check_type(argname="argument connection", value=connection, expected_type=type_hints["connection"])
258
+ check_type(argname="argument count", value=count, expected_type=type_hints["count"])
259
+ check_type(argname="argument depends_on", value=depends_on, expected_type=type_hints["depends_on"])
260
+ check_type(argname="argument for_each", value=for_each, expected_type=type_hints["for_each"])
261
+ check_type(argname="argument lifecycle", value=lifecycle, expected_type=type_hints["lifecycle"])
262
+ check_type(argname="argument provider", value=provider, expected_type=type_hints["provider"])
263
+ check_type(argname="argument provisioners", value=provisioners, expected_type=type_hints["provisioners"])
264
+ check_type(argname="argument hostnames", value=hostnames, expected_type=type_hints["hostnames"])
265
+ check_type(argname="argument key_type", value=key_type, expected_type=type_hints["key_type"])
266
+ check_type(argname="argument name", value=name, expected_type=type_hints["name"])
267
+ self._values: typing.Dict[builtins.str, typing.Any] = {
268
+ "hostnames": hostnames,
269
+ "key_type": key_type,
270
+ "name": name,
271
+ }
272
+ if connection is not None:
273
+ self._values["connection"] = connection
274
+ if count is not None:
275
+ self._values["count"] = count
276
+ if depends_on is not None:
277
+ self._values["depends_on"] = depends_on
278
+ if for_each is not None:
279
+ self._values["for_each"] = for_each
280
+ if lifecycle is not None:
281
+ self._values["lifecycle"] = lifecycle
282
+ if provider is not None:
283
+ self._values["provider"] = provider
284
+ if provisioners is not None:
285
+ self._values["provisioners"] = provisioners
286
+
287
+ @builtins.property
288
+ def connection(
289
+ self,
290
+ ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, _cdktf_9a9027ec.WinrmProvisionerConnection]]:
291
+ '''
292
+ :stability: experimental
293
+ '''
294
+ result = self._values.get("connection")
295
+ return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, _cdktf_9a9027ec.WinrmProvisionerConnection]], result)
296
+
297
+ @builtins.property
298
+ def count(
299
+ self,
300
+ ) -> typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]]:
301
+ '''
302
+ :stability: experimental
303
+ '''
304
+ result = self._values.get("count")
305
+ return typing.cast(typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]], result)
306
+
307
+ @builtins.property
308
+ def depends_on(
309
+ self,
310
+ ) -> typing.Optional[typing.List[_cdktf_9a9027ec.ITerraformDependable]]:
311
+ '''
312
+ :stability: experimental
313
+ '''
314
+ result = self._values.get("depends_on")
315
+ return typing.cast(typing.Optional[typing.List[_cdktf_9a9027ec.ITerraformDependable]], result)
316
+
317
+ @builtins.property
318
+ def for_each(self) -> typing.Optional[_cdktf_9a9027ec.ITerraformIterator]:
319
+ '''
320
+ :stability: experimental
321
+ '''
322
+ result = self._values.get("for_each")
323
+ return typing.cast(typing.Optional[_cdktf_9a9027ec.ITerraformIterator], result)
324
+
325
+ @builtins.property
326
+ def lifecycle(self) -> typing.Optional[_cdktf_9a9027ec.TerraformResourceLifecycle]:
327
+ '''
328
+ :stability: experimental
329
+ '''
330
+ result = self._values.get("lifecycle")
331
+ return typing.cast(typing.Optional[_cdktf_9a9027ec.TerraformResourceLifecycle], result)
332
+
333
+ @builtins.property
334
+ def provider(self) -> typing.Optional[_cdktf_9a9027ec.TerraformProvider]:
335
+ '''
336
+ :stability: experimental
337
+ '''
338
+ result = self._values.get("provider")
339
+ return typing.cast(typing.Optional[_cdktf_9a9027ec.TerraformProvider], result)
340
+
341
+ @builtins.property
342
+ def provisioners(
343
+ self,
344
+ ) -> typing.Optional[typing.List[typing.Union[_cdktf_9a9027ec.FileProvisioner, _cdktf_9a9027ec.LocalExecProvisioner, _cdktf_9a9027ec.RemoteExecProvisioner]]]:
345
+ '''
346
+ :stability: experimental
347
+ '''
348
+ result = self._values.get("provisioners")
349
+ return typing.cast(typing.Optional[typing.List[typing.Union[_cdktf_9a9027ec.FileProvisioner, _cdktf_9a9027ec.LocalExecProvisioner, _cdktf_9a9027ec.RemoteExecProvisioner]]], result)
350
+
351
+ @builtins.property
352
+ def hostnames(self) -> typing.List[builtins.str]:
353
+ '''Certificate hostnames.
354
+
355
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_dynamic_certificate_bundle#hostnames LoadbalancerDynamicCertificateBundle#hostnames}
356
+ '''
357
+ result = self._values.get("hostnames")
358
+ assert result is not None, "Required property 'hostnames' is missing"
359
+ return typing.cast(typing.List[builtins.str], result)
360
+
361
+ @builtins.property
362
+ def key_type(self) -> builtins.str:
363
+ '''Private key type (``rsa`` / ``ecdsa``).
364
+
365
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_dynamic_certificate_bundle#key_type LoadbalancerDynamicCertificateBundle#key_type}
366
+ '''
367
+ result = self._values.get("key_type")
368
+ assert result is not None, "Required property 'key_type' is missing"
369
+ return typing.cast(builtins.str, result)
370
+
371
+ @builtins.property
372
+ def name(self) -> builtins.str:
373
+ '''The name of the certificate bundle. Must be unique within customer account.
374
+
375
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_dynamic_certificate_bundle#name LoadbalancerDynamicCertificateBundle#name}
376
+ '''
377
+ result = self._values.get("name")
378
+ assert result is not None, "Required property 'name' is missing"
379
+ return typing.cast(builtins.str, result)
380
+
381
+ def __eq__(self, rhs: typing.Any) -> builtins.bool:
382
+ return isinstance(rhs, self.__class__) and rhs._values == self._values
383
+
384
+ def __ne__(self, rhs: typing.Any) -> builtins.bool:
385
+ return not (rhs == self)
386
+
387
+ def __repr__(self) -> str:
388
+ return "LoadbalancerDynamicCertificateBundleConfig(%s)" % ", ".join(
389
+ k + "=" + repr(v) for k, v in self._values.items()
390
+ )
391
+
392
+
393
+ __all__ = [
394
+ "LoadbalancerDynamicCertificateBundle",
395
+ "LoadbalancerDynamicCertificateBundleConfig",
396
+ ]
397
+
398
+ publication.publish()
399
+
400
+ def _typecheckingstub__2a46181dda53da2f4cda4b7c23ce6023fe4616e4966b031bfce2e26b23bc7689(
401
+ scope: _constructs_77d1e7e8.Construct,
402
+ id: builtins.str,
403
+ *,
404
+ hostnames: typing.Sequence[builtins.str],
405
+ key_type: builtins.str,
406
+ name: builtins.str,
407
+ connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
408
+ count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
409
+ depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
410
+ for_each: typing.Optional[_cdktf_9a9027ec.ITerraformIterator] = None,
411
+ lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
412
+ provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
413
+ provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
414
+ ) -> None:
415
+ """Type checking stubs"""
416
+ pass
417
+
418
+ def _typecheckingstub__517311c00ab7f60cd0c1cbdcb53e08db996310df98249cde15e4319b5438f9c1(
419
+ scope: _constructs_77d1e7e8.Construct,
420
+ import_to_id: builtins.str,
421
+ import_from_id: builtins.str,
422
+ provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
423
+ ) -> None:
424
+ """Type checking stubs"""
425
+ pass
426
+
427
+ def _typecheckingstub__af6b13bbea6e5016ed8fbc3a8239b43d57f52871a76598feb5c15975d1af77c7(
428
+ value: typing.List[builtins.str],
429
+ ) -> None:
430
+ """Type checking stubs"""
431
+ pass
432
+
433
+ def _typecheckingstub__b0c5408231a1e82fc5396a17275dcd2c0244a0cd1db650288a104fea3d12abf8(
434
+ value: builtins.str,
435
+ ) -> None:
436
+ """Type checking stubs"""
437
+ pass
438
+
439
+ def _typecheckingstub__471522ca789842f463f90f4e3258eff20d765fb5181d1cd901479ee389e2e83a(
440
+ value: builtins.str,
441
+ ) -> None:
442
+ """Type checking stubs"""
443
+ pass
444
+
445
+ def _typecheckingstub__148c515a5ea72589538d574c71e6abefd303b776be3bf3d37f6a63f610422096(
446
+ *,
447
+ connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
448
+ count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
449
+ depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
450
+ for_each: typing.Optional[_cdktf_9a9027ec.ITerraformIterator] = None,
451
+ lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
452
+ provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
453
+ provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
454
+ hostnames: typing.Sequence[builtins.str],
455
+ key_type: builtins.str,
456
+ name: builtins.str,
457
+ ) -> None:
458
+ """Type checking stubs"""
459
+ pass