cdktf-cdktf-provider-upcloud 15.8.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- cdktf_cdktf_provider_upcloud/__init__.py +247 -0
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +45 -0
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.8.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +894 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +633 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +384 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_load_balancer_dns_challenge_domain/__init__.py +319 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +853 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +717 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +1084 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_valkey_sessions/__init__.py +898 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +647 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +600 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +1093 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +725 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +558 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +421 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +364 -0
- cdktf_cdktf_provider_upcloud/file_storage/__init__.py +1683 -0
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +1233 -0
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +552 -0
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +1167 -0
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +1299 -0
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +1357 -0
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +801 -0
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +2674 -0
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +2113 -0
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +1426 -0
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +442 -0
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +633 -0
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +459 -0
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +1290 -0
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +11486 -0
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +442 -0
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +504 -0
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +659 -0
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +633 -0
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +536 -0
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +4644 -0
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +13812 -0
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +7734 -0
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +1541 -0
- cdktf_cdktf_provider_upcloud/managed_database_valkey/__init__.py +3355 -0
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +1198 -0
- cdktf_cdktf_provider_upcloud/managed_object_storage_bucket/__init__.py +409 -0
- cdktf_cdktf_provider_upcloud/managed_object_storage_custom_domain/__init__.py +446 -0
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +521 -0
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +454 -0
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +505 -0
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +485 -0
- cdktf_cdktf_provider_upcloud/network/__init__.py +1554 -0
- cdktf_cdktf_provider_upcloud/network_peering/__init__.py +1084 -0
- cdktf_cdktf_provider_upcloud/provider/__init__.py +544 -0
- cdktf_cdktf_provider_upcloud/py.typed +1 -0
- cdktf_cdktf_provider_upcloud/router/__init__.py +1030 -0
- cdktf_cdktf_provider_upcloud/server/__init__.py +4542 -0
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +571 -0
- cdktf_cdktf_provider_upcloud/storage/__init__.py +1850 -0
- cdktf_cdktf_provider_upcloud/storage_backup/__init__.py +483 -0
- cdktf_cdktf_provider_upcloud/storage_template/__init__.py +478 -0
- cdktf_cdktf_provider_upcloud/tag/__init__.py +493 -0
- cdktf_cdktf_provider_upcloud-15.8.0.dist-info/LICENSE +355 -0
- cdktf_cdktf_provider_upcloud-15.8.0.dist-info/METADATA +120 -0
- cdktf_cdktf_provider_upcloud-15.8.0.dist-info/RECORD +66 -0
- cdktf_cdktf_provider_upcloud-15.8.0.dist-info/WHEEL +5 -0
- cdktf_cdktf_provider_upcloud-15.8.0.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,504 @@
|
|
|
1
|
+
r'''
|
|
2
|
+
# `upcloud_loadbalancer_manual_certificate_bundle`
|
|
3
|
+
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_loadbalancer_manual_certificate_bundle`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle).
|
|
5
|
+
'''
|
|
6
|
+
from pkgutil import extend_path
|
|
7
|
+
__path__ = extend_path(__path__, __name__)
|
|
8
|
+
|
|
9
|
+
import abc
|
|
10
|
+
import builtins
|
|
11
|
+
import datetime
|
|
12
|
+
import enum
|
|
13
|
+
import typing
|
|
14
|
+
|
|
15
|
+
import jsii
|
|
16
|
+
import publication
|
|
17
|
+
import typing_extensions
|
|
18
|
+
|
|
19
|
+
import typeguard
|
|
20
|
+
from importlib.metadata import version as _metadata_package_version
|
|
21
|
+
TYPEGUARD_MAJOR_VERSION = int(_metadata_package_version('typeguard').split('.')[0])
|
|
22
|
+
|
|
23
|
+
def check_type(argname: str, value: object, expected_type: typing.Any) -> typing.Any:
|
|
24
|
+
if TYPEGUARD_MAJOR_VERSION <= 2:
|
|
25
|
+
return typeguard.check_type(argname=argname, value=value, expected_type=expected_type) # type:ignore
|
|
26
|
+
else:
|
|
27
|
+
if isinstance(value, jsii._reference_map.InterfaceDynamicProxy): # pyright: ignore [reportAttributeAccessIssue]
|
|
28
|
+
pass
|
|
29
|
+
else:
|
|
30
|
+
if TYPEGUARD_MAJOR_VERSION == 3:
|
|
31
|
+
typeguard.config.collection_check_strategy = typeguard.CollectionCheckStrategy.ALL_ITEMS # type:ignore
|
|
32
|
+
typeguard.check_type(value=value, expected_type=expected_type) # type:ignore
|
|
33
|
+
else:
|
|
34
|
+
typeguard.check_type(value=value, expected_type=expected_type, collection_check_strategy=typeguard.CollectionCheckStrategy.ALL_ITEMS) # type:ignore
|
|
35
|
+
|
|
36
|
+
from .._jsii import *
|
|
37
|
+
|
|
38
|
+
import cdktf as _cdktf_9a9027ec
|
|
39
|
+
import constructs as _constructs_77d1e7e8
|
|
40
|
+
|
|
41
|
+
|
|
42
|
+
class LoadbalancerManualCertificateBundle(
|
|
43
|
+
_cdktf_9a9027ec.TerraformResource,
|
|
44
|
+
metaclass=jsii.JSIIMeta,
|
|
45
|
+
jsii_type="@cdktf/provider-upcloud.loadbalancerManualCertificateBundle.LoadbalancerManualCertificateBundle",
|
|
46
|
+
):
|
|
47
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle upcloud_loadbalancer_manual_certificate_bundle}.'''
|
|
48
|
+
|
|
49
|
+
def __init__(
|
|
50
|
+
self,
|
|
51
|
+
scope: _constructs_77d1e7e8.Construct,
|
|
52
|
+
id: builtins.str,
|
|
53
|
+
*,
|
|
54
|
+
certificate: builtins.str,
|
|
55
|
+
name: builtins.str,
|
|
56
|
+
private_key: builtins.str,
|
|
57
|
+
intermediates: typing.Optional[builtins.str] = None,
|
|
58
|
+
connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
59
|
+
count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
|
|
60
|
+
depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
|
|
61
|
+
for_each: typing.Optional[_cdktf_9a9027ec.ITerraformIterator] = None,
|
|
62
|
+
lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
63
|
+
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
64
|
+
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
65
|
+
) -> None:
|
|
66
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle upcloud_loadbalancer_manual_certificate_bundle} Resource.
|
|
67
|
+
|
|
68
|
+
:param scope: The scope in which to define this construct.
|
|
69
|
+
:param id: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
70
|
+
:param certificate: Certificate as base64 encoded string. Must be in PEM format. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#certificate LoadbalancerManualCertificateBundle#certificate}
|
|
71
|
+
:param name: The name of the certificate bundle. Must be unique within customer account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#name LoadbalancerManualCertificateBundle#name}
|
|
72
|
+
:param private_key: Private key as base64 encoded string. Must be in PEM format. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#private_key LoadbalancerManualCertificateBundle#private_key}
|
|
73
|
+
:param intermediates: Intermediate certificates as base64 encoded string. Must be in PEM format. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#intermediates LoadbalancerManualCertificateBundle#intermediates}
|
|
74
|
+
:param connection:
|
|
75
|
+
:param count:
|
|
76
|
+
:param depends_on:
|
|
77
|
+
:param for_each:
|
|
78
|
+
:param lifecycle:
|
|
79
|
+
:param provider:
|
|
80
|
+
:param provisioners:
|
|
81
|
+
'''
|
|
82
|
+
if __debug__:
|
|
83
|
+
type_hints = typing.get_type_hints(_typecheckingstub__8906ddb93a852403edd26f83476b5132bbbba47dd80ae1e09a217b89c2c5ebfd)
|
|
84
|
+
check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
|
|
85
|
+
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
86
|
+
config = LoadbalancerManualCertificateBundleConfig(
|
|
87
|
+
certificate=certificate,
|
|
88
|
+
name=name,
|
|
89
|
+
private_key=private_key,
|
|
90
|
+
intermediates=intermediates,
|
|
91
|
+
connection=connection,
|
|
92
|
+
count=count,
|
|
93
|
+
depends_on=depends_on,
|
|
94
|
+
for_each=for_each,
|
|
95
|
+
lifecycle=lifecycle,
|
|
96
|
+
provider=provider,
|
|
97
|
+
provisioners=provisioners,
|
|
98
|
+
)
|
|
99
|
+
|
|
100
|
+
jsii.create(self.__class__, self, [scope, id, config])
|
|
101
|
+
|
|
102
|
+
@jsii.member(jsii_name="generateConfigForImport")
|
|
103
|
+
@builtins.classmethod
|
|
104
|
+
def generate_config_for_import(
|
|
105
|
+
cls,
|
|
106
|
+
scope: _constructs_77d1e7e8.Construct,
|
|
107
|
+
import_to_id: builtins.str,
|
|
108
|
+
import_from_id: builtins.str,
|
|
109
|
+
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
110
|
+
) -> _cdktf_9a9027ec.ImportableResource:
|
|
111
|
+
'''Generates CDKTF code for importing a LoadbalancerManualCertificateBundle resource upon running "cdktf plan ".
|
|
112
|
+
|
|
113
|
+
:param scope: The scope in which to define this construct.
|
|
114
|
+
:param import_to_id: The construct id used in the generated config for the LoadbalancerManualCertificateBundle to import.
|
|
115
|
+
:param import_from_id: The id of the existing LoadbalancerManualCertificateBundle that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#import import section} in the documentation of this resource for the id to use
|
|
116
|
+
:param provider: ? Optional instance of the provider where the LoadbalancerManualCertificateBundle to import is found.
|
|
117
|
+
'''
|
|
118
|
+
if __debug__:
|
|
119
|
+
type_hints = typing.get_type_hints(_typecheckingstub__3bc3fd322061a3b93a7c3acda941dc668429808f66c506d87838d906321328c2)
|
|
120
|
+
check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
|
|
121
|
+
check_type(argname="argument import_to_id", value=import_to_id, expected_type=type_hints["import_to_id"])
|
|
122
|
+
check_type(argname="argument import_from_id", value=import_from_id, expected_type=type_hints["import_from_id"])
|
|
123
|
+
check_type(argname="argument provider", value=provider, expected_type=type_hints["provider"])
|
|
124
|
+
return typing.cast(_cdktf_9a9027ec.ImportableResource, jsii.sinvoke(cls, "generateConfigForImport", [scope, import_to_id, import_from_id, provider]))
|
|
125
|
+
|
|
126
|
+
@jsii.member(jsii_name="resetIntermediates")
|
|
127
|
+
def reset_intermediates(self) -> None:
|
|
128
|
+
return typing.cast(None, jsii.invoke(self, "resetIntermediates", []))
|
|
129
|
+
|
|
130
|
+
@jsii.member(jsii_name="synthesizeAttributes")
|
|
131
|
+
def _synthesize_attributes(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
132
|
+
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "synthesizeAttributes", []))
|
|
133
|
+
|
|
134
|
+
@jsii.member(jsii_name="synthesizeHclAttributes")
|
|
135
|
+
def _synthesize_hcl_attributes(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
136
|
+
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "synthesizeHclAttributes", []))
|
|
137
|
+
|
|
138
|
+
@jsii.python.classproperty
|
|
139
|
+
@jsii.member(jsii_name="tfResourceType")
|
|
140
|
+
def TF_RESOURCE_TYPE(cls) -> builtins.str:
|
|
141
|
+
return typing.cast(builtins.str, jsii.sget(cls, "tfResourceType"))
|
|
142
|
+
|
|
143
|
+
@builtins.property
|
|
144
|
+
@jsii.member(jsii_name="id")
|
|
145
|
+
def id(self) -> builtins.str:
|
|
146
|
+
return typing.cast(builtins.str, jsii.get(self, "id"))
|
|
147
|
+
|
|
148
|
+
@builtins.property
|
|
149
|
+
@jsii.member(jsii_name="notAfter")
|
|
150
|
+
def not_after(self) -> builtins.str:
|
|
151
|
+
return typing.cast(builtins.str, jsii.get(self, "notAfter"))
|
|
152
|
+
|
|
153
|
+
@builtins.property
|
|
154
|
+
@jsii.member(jsii_name="notBefore")
|
|
155
|
+
def not_before(self) -> builtins.str:
|
|
156
|
+
return typing.cast(builtins.str, jsii.get(self, "notBefore"))
|
|
157
|
+
|
|
158
|
+
@builtins.property
|
|
159
|
+
@jsii.member(jsii_name="operationalState")
|
|
160
|
+
def operational_state(self) -> builtins.str:
|
|
161
|
+
return typing.cast(builtins.str, jsii.get(self, "operationalState"))
|
|
162
|
+
|
|
163
|
+
@builtins.property
|
|
164
|
+
@jsii.member(jsii_name="certificateInput")
|
|
165
|
+
def certificate_input(self) -> typing.Optional[builtins.str]:
|
|
166
|
+
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "certificateInput"))
|
|
167
|
+
|
|
168
|
+
@builtins.property
|
|
169
|
+
@jsii.member(jsii_name="intermediatesInput")
|
|
170
|
+
def intermediates_input(self) -> typing.Optional[builtins.str]:
|
|
171
|
+
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "intermediatesInput"))
|
|
172
|
+
|
|
173
|
+
@builtins.property
|
|
174
|
+
@jsii.member(jsii_name="nameInput")
|
|
175
|
+
def name_input(self) -> typing.Optional[builtins.str]:
|
|
176
|
+
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "nameInput"))
|
|
177
|
+
|
|
178
|
+
@builtins.property
|
|
179
|
+
@jsii.member(jsii_name="privateKeyInput")
|
|
180
|
+
def private_key_input(self) -> typing.Optional[builtins.str]:
|
|
181
|
+
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "privateKeyInput"))
|
|
182
|
+
|
|
183
|
+
@builtins.property
|
|
184
|
+
@jsii.member(jsii_name="certificate")
|
|
185
|
+
def certificate(self) -> builtins.str:
|
|
186
|
+
return typing.cast(builtins.str, jsii.get(self, "certificate"))
|
|
187
|
+
|
|
188
|
+
@certificate.setter
|
|
189
|
+
def certificate(self, value: builtins.str) -> None:
|
|
190
|
+
if __debug__:
|
|
191
|
+
type_hints = typing.get_type_hints(_typecheckingstub__96ef382025a29a51866d84f2dc3c17b41f82b79a4bb094d894fcbaf95740f9b6)
|
|
192
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
193
|
+
jsii.set(self, "certificate", value) # pyright: ignore[reportArgumentType]
|
|
194
|
+
|
|
195
|
+
@builtins.property
|
|
196
|
+
@jsii.member(jsii_name="intermediates")
|
|
197
|
+
def intermediates(self) -> builtins.str:
|
|
198
|
+
return typing.cast(builtins.str, jsii.get(self, "intermediates"))
|
|
199
|
+
|
|
200
|
+
@intermediates.setter
|
|
201
|
+
def intermediates(self, value: builtins.str) -> None:
|
|
202
|
+
if __debug__:
|
|
203
|
+
type_hints = typing.get_type_hints(_typecheckingstub__8cc04ae1e4912a17e803a537f4509f2830feb5c54873cd177838664b3e1e46e1)
|
|
204
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
205
|
+
jsii.set(self, "intermediates", value) # pyright: ignore[reportArgumentType]
|
|
206
|
+
|
|
207
|
+
@builtins.property
|
|
208
|
+
@jsii.member(jsii_name="name")
|
|
209
|
+
def name(self) -> builtins.str:
|
|
210
|
+
return typing.cast(builtins.str, jsii.get(self, "name"))
|
|
211
|
+
|
|
212
|
+
@name.setter
|
|
213
|
+
def name(self, value: builtins.str) -> None:
|
|
214
|
+
if __debug__:
|
|
215
|
+
type_hints = typing.get_type_hints(_typecheckingstub__8d66c7d6519ee5d57272acf4d2eae061b67d8d68f40564783650e1b3f4d951be)
|
|
216
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
217
|
+
jsii.set(self, "name", value) # pyright: ignore[reportArgumentType]
|
|
218
|
+
|
|
219
|
+
@builtins.property
|
|
220
|
+
@jsii.member(jsii_name="privateKey")
|
|
221
|
+
def private_key(self) -> builtins.str:
|
|
222
|
+
return typing.cast(builtins.str, jsii.get(self, "privateKey"))
|
|
223
|
+
|
|
224
|
+
@private_key.setter
|
|
225
|
+
def private_key(self, value: builtins.str) -> None:
|
|
226
|
+
if __debug__:
|
|
227
|
+
type_hints = typing.get_type_hints(_typecheckingstub__e9824200c17143549c0edae9af888590e7e454d121cdd68ed34d4dec38264f88)
|
|
228
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
229
|
+
jsii.set(self, "privateKey", value) # pyright: ignore[reportArgumentType]
|
|
230
|
+
|
|
231
|
+
|
|
232
|
+
@jsii.data_type(
|
|
233
|
+
jsii_type="@cdktf/provider-upcloud.loadbalancerManualCertificateBundle.LoadbalancerManualCertificateBundleConfig",
|
|
234
|
+
jsii_struct_bases=[_cdktf_9a9027ec.TerraformMetaArguments],
|
|
235
|
+
name_mapping={
|
|
236
|
+
"connection": "connection",
|
|
237
|
+
"count": "count",
|
|
238
|
+
"depends_on": "dependsOn",
|
|
239
|
+
"for_each": "forEach",
|
|
240
|
+
"lifecycle": "lifecycle",
|
|
241
|
+
"provider": "provider",
|
|
242
|
+
"provisioners": "provisioners",
|
|
243
|
+
"certificate": "certificate",
|
|
244
|
+
"name": "name",
|
|
245
|
+
"private_key": "privateKey",
|
|
246
|
+
"intermediates": "intermediates",
|
|
247
|
+
},
|
|
248
|
+
)
|
|
249
|
+
class LoadbalancerManualCertificateBundleConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
250
|
+
def __init__(
|
|
251
|
+
self,
|
|
252
|
+
*,
|
|
253
|
+
connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
254
|
+
count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
|
|
255
|
+
depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
|
|
256
|
+
for_each: typing.Optional[_cdktf_9a9027ec.ITerraformIterator] = None,
|
|
257
|
+
lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
258
|
+
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
259
|
+
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
260
|
+
certificate: builtins.str,
|
|
261
|
+
name: builtins.str,
|
|
262
|
+
private_key: builtins.str,
|
|
263
|
+
intermediates: typing.Optional[builtins.str] = None,
|
|
264
|
+
) -> None:
|
|
265
|
+
'''
|
|
266
|
+
:param connection:
|
|
267
|
+
:param count:
|
|
268
|
+
:param depends_on:
|
|
269
|
+
:param for_each:
|
|
270
|
+
:param lifecycle:
|
|
271
|
+
:param provider:
|
|
272
|
+
:param provisioners:
|
|
273
|
+
:param certificate: Certificate as base64 encoded string. Must be in PEM format. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#certificate LoadbalancerManualCertificateBundle#certificate}
|
|
274
|
+
:param name: The name of the certificate bundle. Must be unique within customer account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#name LoadbalancerManualCertificateBundle#name}
|
|
275
|
+
:param private_key: Private key as base64 encoded string. Must be in PEM format. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#private_key LoadbalancerManualCertificateBundle#private_key}
|
|
276
|
+
:param intermediates: Intermediate certificates as base64 encoded string. Must be in PEM format. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#intermediates LoadbalancerManualCertificateBundle#intermediates}
|
|
277
|
+
'''
|
|
278
|
+
if isinstance(lifecycle, dict):
|
|
279
|
+
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
280
|
+
if __debug__:
|
|
281
|
+
type_hints = typing.get_type_hints(_typecheckingstub__1dedb301979f3a607f94d3098b5a66a8ce5efacc67dd9840b2ee617b9db0f818)
|
|
282
|
+
check_type(argname="argument connection", value=connection, expected_type=type_hints["connection"])
|
|
283
|
+
check_type(argname="argument count", value=count, expected_type=type_hints["count"])
|
|
284
|
+
check_type(argname="argument depends_on", value=depends_on, expected_type=type_hints["depends_on"])
|
|
285
|
+
check_type(argname="argument for_each", value=for_each, expected_type=type_hints["for_each"])
|
|
286
|
+
check_type(argname="argument lifecycle", value=lifecycle, expected_type=type_hints["lifecycle"])
|
|
287
|
+
check_type(argname="argument provider", value=provider, expected_type=type_hints["provider"])
|
|
288
|
+
check_type(argname="argument provisioners", value=provisioners, expected_type=type_hints["provisioners"])
|
|
289
|
+
check_type(argname="argument certificate", value=certificate, expected_type=type_hints["certificate"])
|
|
290
|
+
check_type(argname="argument name", value=name, expected_type=type_hints["name"])
|
|
291
|
+
check_type(argname="argument private_key", value=private_key, expected_type=type_hints["private_key"])
|
|
292
|
+
check_type(argname="argument intermediates", value=intermediates, expected_type=type_hints["intermediates"])
|
|
293
|
+
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
294
|
+
"certificate": certificate,
|
|
295
|
+
"name": name,
|
|
296
|
+
"private_key": private_key,
|
|
297
|
+
}
|
|
298
|
+
if connection is not None:
|
|
299
|
+
self._values["connection"] = connection
|
|
300
|
+
if count is not None:
|
|
301
|
+
self._values["count"] = count
|
|
302
|
+
if depends_on is not None:
|
|
303
|
+
self._values["depends_on"] = depends_on
|
|
304
|
+
if for_each is not None:
|
|
305
|
+
self._values["for_each"] = for_each
|
|
306
|
+
if lifecycle is not None:
|
|
307
|
+
self._values["lifecycle"] = lifecycle
|
|
308
|
+
if provider is not None:
|
|
309
|
+
self._values["provider"] = provider
|
|
310
|
+
if provisioners is not None:
|
|
311
|
+
self._values["provisioners"] = provisioners
|
|
312
|
+
if intermediates is not None:
|
|
313
|
+
self._values["intermediates"] = intermediates
|
|
314
|
+
|
|
315
|
+
@builtins.property
|
|
316
|
+
def connection(
|
|
317
|
+
self,
|
|
318
|
+
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, _cdktf_9a9027ec.WinrmProvisionerConnection]]:
|
|
319
|
+
'''
|
|
320
|
+
:stability: experimental
|
|
321
|
+
'''
|
|
322
|
+
result = self._values.get("connection")
|
|
323
|
+
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, _cdktf_9a9027ec.WinrmProvisionerConnection]], result)
|
|
324
|
+
|
|
325
|
+
@builtins.property
|
|
326
|
+
def count(
|
|
327
|
+
self,
|
|
328
|
+
) -> typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]]:
|
|
329
|
+
'''
|
|
330
|
+
:stability: experimental
|
|
331
|
+
'''
|
|
332
|
+
result = self._values.get("count")
|
|
333
|
+
return typing.cast(typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]], result)
|
|
334
|
+
|
|
335
|
+
@builtins.property
|
|
336
|
+
def depends_on(
|
|
337
|
+
self,
|
|
338
|
+
) -> typing.Optional[typing.List[_cdktf_9a9027ec.ITerraformDependable]]:
|
|
339
|
+
'''
|
|
340
|
+
:stability: experimental
|
|
341
|
+
'''
|
|
342
|
+
result = self._values.get("depends_on")
|
|
343
|
+
return typing.cast(typing.Optional[typing.List[_cdktf_9a9027ec.ITerraformDependable]], result)
|
|
344
|
+
|
|
345
|
+
@builtins.property
|
|
346
|
+
def for_each(self) -> typing.Optional[_cdktf_9a9027ec.ITerraformIterator]:
|
|
347
|
+
'''
|
|
348
|
+
:stability: experimental
|
|
349
|
+
'''
|
|
350
|
+
result = self._values.get("for_each")
|
|
351
|
+
return typing.cast(typing.Optional[_cdktf_9a9027ec.ITerraformIterator], result)
|
|
352
|
+
|
|
353
|
+
@builtins.property
|
|
354
|
+
def lifecycle(self) -> typing.Optional[_cdktf_9a9027ec.TerraformResourceLifecycle]:
|
|
355
|
+
'''
|
|
356
|
+
:stability: experimental
|
|
357
|
+
'''
|
|
358
|
+
result = self._values.get("lifecycle")
|
|
359
|
+
return typing.cast(typing.Optional[_cdktf_9a9027ec.TerraformResourceLifecycle], result)
|
|
360
|
+
|
|
361
|
+
@builtins.property
|
|
362
|
+
def provider(self) -> typing.Optional[_cdktf_9a9027ec.TerraformProvider]:
|
|
363
|
+
'''
|
|
364
|
+
:stability: experimental
|
|
365
|
+
'''
|
|
366
|
+
result = self._values.get("provider")
|
|
367
|
+
return typing.cast(typing.Optional[_cdktf_9a9027ec.TerraformProvider], result)
|
|
368
|
+
|
|
369
|
+
@builtins.property
|
|
370
|
+
def provisioners(
|
|
371
|
+
self,
|
|
372
|
+
) -> typing.Optional[typing.List[typing.Union[_cdktf_9a9027ec.FileProvisioner, _cdktf_9a9027ec.LocalExecProvisioner, _cdktf_9a9027ec.RemoteExecProvisioner]]]:
|
|
373
|
+
'''
|
|
374
|
+
:stability: experimental
|
|
375
|
+
'''
|
|
376
|
+
result = self._values.get("provisioners")
|
|
377
|
+
return typing.cast(typing.Optional[typing.List[typing.Union[_cdktf_9a9027ec.FileProvisioner, _cdktf_9a9027ec.LocalExecProvisioner, _cdktf_9a9027ec.RemoteExecProvisioner]]], result)
|
|
378
|
+
|
|
379
|
+
@builtins.property
|
|
380
|
+
def certificate(self) -> builtins.str:
|
|
381
|
+
'''Certificate as base64 encoded string. Must be in PEM format.
|
|
382
|
+
|
|
383
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#certificate LoadbalancerManualCertificateBundle#certificate}
|
|
384
|
+
'''
|
|
385
|
+
result = self._values.get("certificate")
|
|
386
|
+
assert result is not None, "Required property 'certificate' is missing"
|
|
387
|
+
return typing.cast(builtins.str, result)
|
|
388
|
+
|
|
389
|
+
@builtins.property
|
|
390
|
+
def name(self) -> builtins.str:
|
|
391
|
+
'''The name of the certificate bundle. Must be unique within customer account.
|
|
392
|
+
|
|
393
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#name LoadbalancerManualCertificateBundle#name}
|
|
394
|
+
'''
|
|
395
|
+
result = self._values.get("name")
|
|
396
|
+
assert result is not None, "Required property 'name' is missing"
|
|
397
|
+
return typing.cast(builtins.str, result)
|
|
398
|
+
|
|
399
|
+
@builtins.property
|
|
400
|
+
def private_key(self) -> builtins.str:
|
|
401
|
+
'''Private key as base64 encoded string. Must be in PEM format.
|
|
402
|
+
|
|
403
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#private_key LoadbalancerManualCertificateBundle#private_key}
|
|
404
|
+
'''
|
|
405
|
+
result = self._values.get("private_key")
|
|
406
|
+
assert result is not None, "Required property 'private_key' is missing"
|
|
407
|
+
return typing.cast(builtins.str, result)
|
|
408
|
+
|
|
409
|
+
@builtins.property
|
|
410
|
+
def intermediates(self) -> typing.Optional[builtins.str]:
|
|
411
|
+
'''Intermediate certificates as base64 encoded string. Must be in PEM format.
|
|
412
|
+
|
|
413
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#intermediates LoadbalancerManualCertificateBundle#intermediates}
|
|
414
|
+
'''
|
|
415
|
+
result = self._values.get("intermediates")
|
|
416
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
417
|
+
|
|
418
|
+
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
419
|
+
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
420
|
+
|
|
421
|
+
def __ne__(self, rhs: typing.Any) -> builtins.bool:
|
|
422
|
+
return not (rhs == self)
|
|
423
|
+
|
|
424
|
+
def __repr__(self) -> str:
|
|
425
|
+
return "LoadbalancerManualCertificateBundleConfig(%s)" % ", ".join(
|
|
426
|
+
k + "=" + repr(v) for k, v in self._values.items()
|
|
427
|
+
)
|
|
428
|
+
|
|
429
|
+
|
|
430
|
+
__all__ = [
|
|
431
|
+
"LoadbalancerManualCertificateBundle",
|
|
432
|
+
"LoadbalancerManualCertificateBundleConfig",
|
|
433
|
+
]
|
|
434
|
+
|
|
435
|
+
publication.publish()
|
|
436
|
+
|
|
437
|
+
def _typecheckingstub__8906ddb93a852403edd26f83476b5132bbbba47dd80ae1e09a217b89c2c5ebfd(
|
|
438
|
+
scope: _constructs_77d1e7e8.Construct,
|
|
439
|
+
id: builtins.str,
|
|
440
|
+
*,
|
|
441
|
+
certificate: builtins.str,
|
|
442
|
+
name: builtins.str,
|
|
443
|
+
private_key: builtins.str,
|
|
444
|
+
intermediates: typing.Optional[builtins.str] = None,
|
|
445
|
+
connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
446
|
+
count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
|
|
447
|
+
depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
|
|
448
|
+
for_each: typing.Optional[_cdktf_9a9027ec.ITerraformIterator] = None,
|
|
449
|
+
lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
450
|
+
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
451
|
+
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
452
|
+
) -> None:
|
|
453
|
+
"""Type checking stubs"""
|
|
454
|
+
pass
|
|
455
|
+
|
|
456
|
+
def _typecheckingstub__3bc3fd322061a3b93a7c3acda941dc668429808f66c506d87838d906321328c2(
|
|
457
|
+
scope: _constructs_77d1e7e8.Construct,
|
|
458
|
+
import_to_id: builtins.str,
|
|
459
|
+
import_from_id: builtins.str,
|
|
460
|
+
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
461
|
+
) -> None:
|
|
462
|
+
"""Type checking stubs"""
|
|
463
|
+
pass
|
|
464
|
+
|
|
465
|
+
def _typecheckingstub__96ef382025a29a51866d84f2dc3c17b41f82b79a4bb094d894fcbaf95740f9b6(
|
|
466
|
+
value: builtins.str,
|
|
467
|
+
) -> None:
|
|
468
|
+
"""Type checking stubs"""
|
|
469
|
+
pass
|
|
470
|
+
|
|
471
|
+
def _typecheckingstub__8cc04ae1e4912a17e803a537f4509f2830feb5c54873cd177838664b3e1e46e1(
|
|
472
|
+
value: builtins.str,
|
|
473
|
+
) -> None:
|
|
474
|
+
"""Type checking stubs"""
|
|
475
|
+
pass
|
|
476
|
+
|
|
477
|
+
def _typecheckingstub__8d66c7d6519ee5d57272acf4d2eae061b67d8d68f40564783650e1b3f4d951be(
|
|
478
|
+
value: builtins.str,
|
|
479
|
+
) -> None:
|
|
480
|
+
"""Type checking stubs"""
|
|
481
|
+
pass
|
|
482
|
+
|
|
483
|
+
def _typecheckingstub__e9824200c17143549c0edae9af888590e7e454d121cdd68ed34d4dec38264f88(
|
|
484
|
+
value: builtins.str,
|
|
485
|
+
) -> None:
|
|
486
|
+
"""Type checking stubs"""
|
|
487
|
+
pass
|
|
488
|
+
|
|
489
|
+
def _typecheckingstub__1dedb301979f3a607f94d3098b5a66a8ce5efacc67dd9840b2ee617b9db0f818(
|
|
490
|
+
*,
|
|
491
|
+
connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
492
|
+
count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
|
|
493
|
+
depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
|
|
494
|
+
for_each: typing.Optional[_cdktf_9a9027ec.ITerraformIterator] = None,
|
|
495
|
+
lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
496
|
+
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
497
|
+
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
498
|
+
certificate: builtins.str,
|
|
499
|
+
name: builtins.str,
|
|
500
|
+
private_key: builtins.str,
|
|
501
|
+
intermediates: typing.Optional[builtins.str] = None,
|
|
502
|
+
) -> None:
|
|
503
|
+
"""Type checking stubs"""
|
|
504
|
+
pass
|