cdktf-cdktf-provider-upcloud 15.8.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (66) hide show
  1. cdktf_cdktf_provider_upcloud/__init__.py +247 -0
  2. cdktf_cdktf_provider_upcloud/_jsii/__init__.py +45 -0
  3. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.8.0.jsii.tgz +0 -0
  4. cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +894 -0
  5. cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +633 -0
  6. cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +384 -0
  7. cdktf_cdktf_provider_upcloud/data_upcloud_load_balancer_dns_challenge_domain/__init__.py +319 -0
  8. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +853 -0
  9. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +717 -0
  10. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +1084 -0
  11. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_valkey_sessions/__init__.py +898 -0
  12. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +647 -0
  13. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +600 -0
  14. cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +1093 -0
  15. cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +725 -0
  16. cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +558 -0
  17. cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +421 -0
  18. cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +364 -0
  19. cdktf_cdktf_provider_upcloud/file_storage/__init__.py +1683 -0
  20. cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +1233 -0
  21. cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +552 -0
  22. cdktf_cdktf_provider_upcloud/gateway/__init__.py +1167 -0
  23. cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +1299 -0
  24. cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +1357 -0
  25. cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +801 -0
  26. cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +2674 -0
  27. cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +2113 -0
  28. cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +1426 -0
  29. cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +442 -0
  30. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +633 -0
  31. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +459 -0
  32. cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +1290 -0
  33. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +11486 -0
  34. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +442 -0
  35. cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +504 -0
  36. cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +659 -0
  37. cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +633 -0
  38. cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +536 -0
  39. cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +4644 -0
  40. cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +13812 -0
  41. cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +7734 -0
  42. cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +1541 -0
  43. cdktf_cdktf_provider_upcloud/managed_database_valkey/__init__.py +3355 -0
  44. cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +1198 -0
  45. cdktf_cdktf_provider_upcloud/managed_object_storage_bucket/__init__.py +409 -0
  46. cdktf_cdktf_provider_upcloud/managed_object_storage_custom_domain/__init__.py +446 -0
  47. cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +521 -0
  48. cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +454 -0
  49. cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +505 -0
  50. cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +485 -0
  51. cdktf_cdktf_provider_upcloud/network/__init__.py +1554 -0
  52. cdktf_cdktf_provider_upcloud/network_peering/__init__.py +1084 -0
  53. cdktf_cdktf_provider_upcloud/provider/__init__.py +544 -0
  54. cdktf_cdktf_provider_upcloud/py.typed +1 -0
  55. cdktf_cdktf_provider_upcloud/router/__init__.py +1030 -0
  56. cdktf_cdktf_provider_upcloud/server/__init__.py +4542 -0
  57. cdktf_cdktf_provider_upcloud/server_group/__init__.py +571 -0
  58. cdktf_cdktf_provider_upcloud/storage/__init__.py +1850 -0
  59. cdktf_cdktf_provider_upcloud/storage_backup/__init__.py +483 -0
  60. cdktf_cdktf_provider_upcloud/storage_template/__init__.py +478 -0
  61. cdktf_cdktf_provider_upcloud/tag/__init__.py +493 -0
  62. cdktf_cdktf_provider_upcloud-15.8.0.dist-info/LICENSE +355 -0
  63. cdktf_cdktf_provider_upcloud-15.8.0.dist-info/METADATA +120 -0
  64. cdktf_cdktf_provider_upcloud-15.8.0.dist-info/RECORD +66 -0
  65. cdktf_cdktf_provider_upcloud-15.8.0.dist-info/WHEEL +5 -0
  66. cdktf_cdktf_provider_upcloud-15.8.0.dist-info/top_level.txt +1 -0
@@ -0,0 +1,504 @@
1
+ r'''
2
+ # `upcloud_loadbalancer_manual_certificate_bundle`
3
+
4
+ Refer to the Terraform Registry for docs: [`upcloud_loadbalancer_manual_certificate_bundle`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle).
5
+ '''
6
+ from pkgutil import extend_path
7
+ __path__ = extend_path(__path__, __name__)
8
+
9
+ import abc
10
+ import builtins
11
+ import datetime
12
+ import enum
13
+ import typing
14
+
15
+ import jsii
16
+ import publication
17
+ import typing_extensions
18
+
19
+ import typeguard
20
+ from importlib.metadata import version as _metadata_package_version
21
+ TYPEGUARD_MAJOR_VERSION = int(_metadata_package_version('typeguard').split('.')[0])
22
+
23
+ def check_type(argname: str, value: object, expected_type: typing.Any) -> typing.Any:
24
+ if TYPEGUARD_MAJOR_VERSION <= 2:
25
+ return typeguard.check_type(argname=argname, value=value, expected_type=expected_type) # type:ignore
26
+ else:
27
+ if isinstance(value, jsii._reference_map.InterfaceDynamicProxy): # pyright: ignore [reportAttributeAccessIssue]
28
+ pass
29
+ else:
30
+ if TYPEGUARD_MAJOR_VERSION == 3:
31
+ typeguard.config.collection_check_strategy = typeguard.CollectionCheckStrategy.ALL_ITEMS # type:ignore
32
+ typeguard.check_type(value=value, expected_type=expected_type) # type:ignore
33
+ else:
34
+ typeguard.check_type(value=value, expected_type=expected_type, collection_check_strategy=typeguard.CollectionCheckStrategy.ALL_ITEMS) # type:ignore
35
+
36
+ from .._jsii import *
37
+
38
+ import cdktf as _cdktf_9a9027ec
39
+ import constructs as _constructs_77d1e7e8
40
+
41
+
42
+ class LoadbalancerManualCertificateBundle(
43
+ _cdktf_9a9027ec.TerraformResource,
44
+ metaclass=jsii.JSIIMeta,
45
+ jsii_type="@cdktf/provider-upcloud.loadbalancerManualCertificateBundle.LoadbalancerManualCertificateBundle",
46
+ ):
47
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle upcloud_loadbalancer_manual_certificate_bundle}.'''
48
+
49
+ def __init__(
50
+ self,
51
+ scope: _constructs_77d1e7e8.Construct,
52
+ id: builtins.str,
53
+ *,
54
+ certificate: builtins.str,
55
+ name: builtins.str,
56
+ private_key: builtins.str,
57
+ intermediates: typing.Optional[builtins.str] = None,
58
+ connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
59
+ count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
60
+ depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
61
+ for_each: typing.Optional[_cdktf_9a9027ec.ITerraformIterator] = None,
62
+ lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
63
+ provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
64
+ provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
65
+ ) -> None:
66
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle upcloud_loadbalancer_manual_certificate_bundle} Resource.
67
+
68
+ :param scope: The scope in which to define this construct.
69
+ :param id: The scoped construct ID. Must be unique amongst siblings in the same scope
70
+ :param certificate: Certificate as base64 encoded string. Must be in PEM format. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#certificate LoadbalancerManualCertificateBundle#certificate}
71
+ :param name: The name of the certificate bundle. Must be unique within customer account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#name LoadbalancerManualCertificateBundle#name}
72
+ :param private_key: Private key as base64 encoded string. Must be in PEM format. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#private_key LoadbalancerManualCertificateBundle#private_key}
73
+ :param intermediates: Intermediate certificates as base64 encoded string. Must be in PEM format. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#intermediates LoadbalancerManualCertificateBundle#intermediates}
74
+ :param connection:
75
+ :param count:
76
+ :param depends_on:
77
+ :param for_each:
78
+ :param lifecycle:
79
+ :param provider:
80
+ :param provisioners:
81
+ '''
82
+ if __debug__:
83
+ type_hints = typing.get_type_hints(_typecheckingstub__8906ddb93a852403edd26f83476b5132bbbba47dd80ae1e09a217b89c2c5ebfd)
84
+ check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
85
+ check_type(argname="argument id", value=id, expected_type=type_hints["id"])
86
+ config = LoadbalancerManualCertificateBundleConfig(
87
+ certificate=certificate,
88
+ name=name,
89
+ private_key=private_key,
90
+ intermediates=intermediates,
91
+ connection=connection,
92
+ count=count,
93
+ depends_on=depends_on,
94
+ for_each=for_each,
95
+ lifecycle=lifecycle,
96
+ provider=provider,
97
+ provisioners=provisioners,
98
+ )
99
+
100
+ jsii.create(self.__class__, self, [scope, id, config])
101
+
102
+ @jsii.member(jsii_name="generateConfigForImport")
103
+ @builtins.classmethod
104
+ def generate_config_for_import(
105
+ cls,
106
+ scope: _constructs_77d1e7e8.Construct,
107
+ import_to_id: builtins.str,
108
+ import_from_id: builtins.str,
109
+ provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
110
+ ) -> _cdktf_9a9027ec.ImportableResource:
111
+ '''Generates CDKTF code for importing a LoadbalancerManualCertificateBundle resource upon running "cdktf plan ".
112
+
113
+ :param scope: The scope in which to define this construct.
114
+ :param import_to_id: The construct id used in the generated config for the LoadbalancerManualCertificateBundle to import.
115
+ :param import_from_id: The id of the existing LoadbalancerManualCertificateBundle that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#import import section} in the documentation of this resource for the id to use
116
+ :param provider: ? Optional instance of the provider where the LoadbalancerManualCertificateBundle to import is found.
117
+ '''
118
+ if __debug__:
119
+ type_hints = typing.get_type_hints(_typecheckingstub__3bc3fd322061a3b93a7c3acda941dc668429808f66c506d87838d906321328c2)
120
+ check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
121
+ check_type(argname="argument import_to_id", value=import_to_id, expected_type=type_hints["import_to_id"])
122
+ check_type(argname="argument import_from_id", value=import_from_id, expected_type=type_hints["import_from_id"])
123
+ check_type(argname="argument provider", value=provider, expected_type=type_hints["provider"])
124
+ return typing.cast(_cdktf_9a9027ec.ImportableResource, jsii.sinvoke(cls, "generateConfigForImport", [scope, import_to_id, import_from_id, provider]))
125
+
126
+ @jsii.member(jsii_name="resetIntermediates")
127
+ def reset_intermediates(self) -> None:
128
+ return typing.cast(None, jsii.invoke(self, "resetIntermediates", []))
129
+
130
+ @jsii.member(jsii_name="synthesizeAttributes")
131
+ def _synthesize_attributes(self) -> typing.Mapping[builtins.str, typing.Any]:
132
+ return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "synthesizeAttributes", []))
133
+
134
+ @jsii.member(jsii_name="synthesizeHclAttributes")
135
+ def _synthesize_hcl_attributes(self) -> typing.Mapping[builtins.str, typing.Any]:
136
+ return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "synthesizeHclAttributes", []))
137
+
138
+ @jsii.python.classproperty
139
+ @jsii.member(jsii_name="tfResourceType")
140
+ def TF_RESOURCE_TYPE(cls) -> builtins.str:
141
+ return typing.cast(builtins.str, jsii.sget(cls, "tfResourceType"))
142
+
143
+ @builtins.property
144
+ @jsii.member(jsii_name="id")
145
+ def id(self) -> builtins.str:
146
+ return typing.cast(builtins.str, jsii.get(self, "id"))
147
+
148
+ @builtins.property
149
+ @jsii.member(jsii_name="notAfter")
150
+ def not_after(self) -> builtins.str:
151
+ return typing.cast(builtins.str, jsii.get(self, "notAfter"))
152
+
153
+ @builtins.property
154
+ @jsii.member(jsii_name="notBefore")
155
+ def not_before(self) -> builtins.str:
156
+ return typing.cast(builtins.str, jsii.get(self, "notBefore"))
157
+
158
+ @builtins.property
159
+ @jsii.member(jsii_name="operationalState")
160
+ def operational_state(self) -> builtins.str:
161
+ return typing.cast(builtins.str, jsii.get(self, "operationalState"))
162
+
163
+ @builtins.property
164
+ @jsii.member(jsii_name="certificateInput")
165
+ def certificate_input(self) -> typing.Optional[builtins.str]:
166
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "certificateInput"))
167
+
168
+ @builtins.property
169
+ @jsii.member(jsii_name="intermediatesInput")
170
+ def intermediates_input(self) -> typing.Optional[builtins.str]:
171
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "intermediatesInput"))
172
+
173
+ @builtins.property
174
+ @jsii.member(jsii_name="nameInput")
175
+ def name_input(self) -> typing.Optional[builtins.str]:
176
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "nameInput"))
177
+
178
+ @builtins.property
179
+ @jsii.member(jsii_name="privateKeyInput")
180
+ def private_key_input(self) -> typing.Optional[builtins.str]:
181
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "privateKeyInput"))
182
+
183
+ @builtins.property
184
+ @jsii.member(jsii_name="certificate")
185
+ def certificate(self) -> builtins.str:
186
+ return typing.cast(builtins.str, jsii.get(self, "certificate"))
187
+
188
+ @certificate.setter
189
+ def certificate(self, value: builtins.str) -> None:
190
+ if __debug__:
191
+ type_hints = typing.get_type_hints(_typecheckingstub__96ef382025a29a51866d84f2dc3c17b41f82b79a4bb094d894fcbaf95740f9b6)
192
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
193
+ jsii.set(self, "certificate", value) # pyright: ignore[reportArgumentType]
194
+
195
+ @builtins.property
196
+ @jsii.member(jsii_name="intermediates")
197
+ def intermediates(self) -> builtins.str:
198
+ return typing.cast(builtins.str, jsii.get(self, "intermediates"))
199
+
200
+ @intermediates.setter
201
+ def intermediates(self, value: builtins.str) -> None:
202
+ if __debug__:
203
+ type_hints = typing.get_type_hints(_typecheckingstub__8cc04ae1e4912a17e803a537f4509f2830feb5c54873cd177838664b3e1e46e1)
204
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
205
+ jsii.set(self, "intermediates", value) # pyright: ignore[reportArgumentType]
206
+
207
+ @builtins.property
208
+ @jsii.member(jsii_name="name")
209
+ def name(self) -> builtins.str:
210
+ return typing.cast(builtins.str, jsii.get(self, "name"))
211
+
212
+ @name.setter
213
+ def name(self, value: builtins.str) -> None:
214
+ if __debug__:
215
+ type_hints = typing.get_type_hints(_typecheckingstub__8d66c7d6519ee5d57272acf4d2eae061b67d8d68f40564783650e1b3f4d951be)
216
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
217
+ jsii.set(self, "name", value) # pyright: ignore[reportArgumentType]
218
+
219
+ @builtins.property
220
+ @jsii.member(jsii_name="privateKey")
221
+ def private_key(self) -> builtins.str:
222
+ return typing.cast(builtins.str, jsii.get(self, "privateKey"))
223
+
224
+ @private_key.setter
225
+ def private_key(self, value: builtins.str) -> None:
226
+ if __debug__:
227
+ type_hints = typing.get_type_hints(_typecheckingstub__e9824200c17143549c0edae9af888590e7e454d121cdd68ed34d4dec38264f88)
228
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
229
+ jsii.set(self, "privateKey", value) # pyright: ignore[reportArgumentType]
230
+
231
+
232
+ @jsii.data_type(
233
+ jsii_type="@cdktf/provider-upcloud.loadbalancerManualCertificateBundle.LoadbalancerManualCertificateBundleConfig",
234
+ jsii_struct_bases=[_cdktf_9a9027ec.TerraformMetaArguments],
235
+ name_mapping={
236
+ "connection": "connection",
237
+ "count": "count",
238
+ "depends_on": "dependsOn",
239
+ "for_each": "forEach",
240
+ "lifecycle": "lifecycle",
241
+ "provider": "provider",
242
+ "provisioners": "provisioners",
243
+ "certificate": "certificate",
244
+ "name": "name",
245
+ "private_key": "privateKey",
246
+ "intermediates": "intermediates",
247
+ },
248
+ )
249
+ class LoadbalancerManualCertificateBundleConfig(_cdktf_9a9027ec.TerraformMetaArguments):
250
+ def __init__(
251
+ self,
252
+ *,
253
+ connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
254
+ count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
255
+ depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
256
+ for_each: typing.Optional[_cdktf_9a9027ec.ITerraformIterator] = None,
257
+ lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
258
+ provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
259
+ provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
260
+ certificate: builtins.str,
261
+ name: builtins.str,
262
+ private_key: builtins.str,
263
+ intermediates: typing.Optional[builtins.str] = None,
264
+ ) -> None:
265
+ '''
266
+ :param connection:
267
+ :param count:
268
+ :param depends_on:
269
+ :param for_each:
270
+ :param lifecycle:
271
+ :param provider:
272
+ :param provisioners:
273
+ :param certificate: Certificate as base64 encoded string. Must be in PEM format. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#certificate LoadbalancerManualCertificateBundle#certificate}
274
+ :param name: The name of the certificate bundle. Must be unique within customer account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#name LoadbalancerManualCertificateBundle#name}
275
+ :param private_key: Private key as base64 encoded string. Must be in PEM format. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#private_key LoadbalancerManualCertificateBundle#private_key}
276
+ :param intermediates: Intermediate certificates as base64 encoded string. Must be in PEM format. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#intermediates LoadbalancerManualCertificateBundle#intermediates}
277
+ '''
278
+ if isinstance(lifecycle, dict):
279
+ lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
280
+ if __debug__:
281
+ type_hints = typing.get_type_hints(_typecheckingstub__1dedb301979f3a607f94d3098b5a66a8ce5efacc67dd9840b2ee617b9db0f818)
282
+ check_type(argname="argument connection", value=connection, expected_type=type_hints["connection"])
283
+ check_type(argname="argument count", value=count, expected_type=type_hints["count"])
284
+ check_type(argname="argument depends_on", value=depends_on, expected_type=type_hints["depends_on"])
285
+ check_type(argname="argument for_each", value=for_each, expected_type=type_hints["for_each"])
286
+ check_type(argname="argument lifecycle", value=lifecycle, expected_type=type_hints["lifecycle"])
287
+ check_type(argname="argument provider", value=provider, expected_type=type_hints["provider"])
288
+ check_type(argname="argument provisioners", value=provisioners, expected_type=type_hints["provisioners"])
289
+ check_type(argname="argument certificate", value=certificate, expected_type=type_hints["certificate"])
290
+ check_type(argname="argument name", value=name, expected_type=type_hints["name"])
291
+ check_type(argname="argument private_key", value=private_key, expected_type=type_hints["private_key"])
292
+ check_type(argname="argument intermediates", value=intermediates, expected_type=type_hints["intermediates"])
293
+ self._values: typing.Dict[builtins.str, typing.Any] = {
294
+ "certificate": certificate,
295
+ "name": name,
296
+ "private_key": private_key,
297
+ }
298
+ if connection is not None:
299
+ self._values["connection"] = connection
300
+ if count is not None:
301
+ self._values["count"] = count
302
+ if depends_on is not None:
303
+ self._values["depends_on"] = depends_on
304
+ if for_each is not None:
305
+ self._values["for_each"] = for_each
306
+ if lifecycle is not None:
307
+ self._values["lifecycle"] = lifecycle
308
+ if provider is not None:
309
+ self._values["provider"] = provider
310
+ if provisioners is not None:
311
+ self._values["provisioners"] = provisioners
312
+ if intermediates is not None:
313
+ self._values["intermediates"] = intermediates
314
+
315
+ @builtins.property
316
+ def connection(
317
+ self,
318
+ ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, _cdktf_9a9027ec.WinrmProvisionerConnection]]:
319
+ '''
320
+ :stability: experimental
321
+ '''
322
+ result = self._values.get("connection")
323
+ return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, _cdktf_9a9027ec.WinrmProvisionerConnection]], result)
324
+
325
+ @builtins.property
326
+ def count(
327
+ self,
328
+ ) -> typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]]:
329
+ '''
330
+ :stability: experimental
331
+ '''
332
+ result = self._values.get("count")
333
+ return typing.cast(typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]], result)
334
+
335
+ @builtins.property
336
+ def depends_on(
337
+ self,
338
+ ) -> typing.Optional[typing.List[_cdktf_9a9027ec.ITerraformDependable]]:
339
+ '''
340
+ :stability: experimental
341
+ '''
342
+ result = self._values.get("depends_on")
343
+ return typing.cast(typing.Optional[typing.List[_cdktf_9a9027ec.ITerraformDependable]], result)
344
+
345
+ @builtins.property
346
+ def for_each(self) -> typing.Optional[_cdktf_9a9027ec.ITerraformIterator]:
347
+ '''
348
+ :stability: experimental
349
+ '''
350
+ result = self._values.get("for_each")
351
+ return typing.cast(typing.Optional[_cdktf_9a9027ec.ITerraformIterator], result)
352
+
353
+ @builtins.property
354
+ def lifecycle(self) -> typing.Optional[_cdktf_9a9027ec.TerraformResourceLifecycle]:
355
+ '''
356
+ :stability: experimental
357
+ '''
358
+ result = self._values.get("lifecycle")
359
+ return typing.cast(typing.Optional[_cdktf_9a9027ec.TerraformResourceLifecycle], result)
360
+
361
+ @builtins.property
362
+ def provider(self) -> typing.Optional[_cdktf_9a9027ec.TerraformProvider]:
363
+ '''
364
+ :stability: experimental
365
+ '''
366
+ result = self._values.get("provider")
367
+ return typing.cast(typing.Optional[_cdktf_9a9027ec.TerraformProvider], result)
368
+
369
+ @builtins.property
370
+ def provisioners(
371
+ self,
372
+ ) -> typing.Optional[typing.List[typing.Union[_cdktf_9a9027ec.FileProvisioner, _cdktf_9a9027ec.LocalExecProvisioner, _cdktf_9a9027ec.RemoteExecProvisioner]]]:
373
+ '''
374
+ :stability: experimental
375
+ '''
376
+ result = self._values.get("provisioners")
377
+ return typing.cast(typing.Optional[typing.List[typing.Union[_cdktf_9a9027ec.FileProvisioner, _cdktf_9a9027ec.LocalExecProvisioner, _cdktf_9a9027ec.RemoteExecProvisioner]]], result)
378
+
379
+ @builtins.property
380
+ def certificate(self) -> builtins.str:
381
+ '''Certificate as base64 encoded string. Must be in PEM format.
382
+
383
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#certificate LoadbalancerManualCertificateBundle#certificate}
384
+ '''
385
+ result = self._values.get("certificate")
386
+ assert result is not None, "Required property 'certificate' is missing"
387
+ return typing.cast(builtins.str, result)
388
+
389
+ @builtins.property
390
+ def name(self) -> builtins.str:
391
+ '''The name of the certificate bundle. Must be unique within customer account.
392
+
393
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#name LoadbalancerManualCertificateBundle#name}
394
+ '''
395
+ result = self._values.get("name")
396
+ assert result is not None, "Required property 'name' is missing"
397
+ return typing.cast(builtins.str, result)
398
+
399
+ @builtins.property
400
+ def private_key(self) -> builtins.str:
401
+ '''Private key as base64 encoded string. Must be in PEM format.
402
+
403
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#private_key LoadbalancerManualCertificateBundle#private_key}
404
+ '''
405
+ result = self._values.get("private_key")
406
+ assert result is not None, "Required property 'private_key' is missing"
407
+ return typing.cast(builtins.str, result)
408
+
409
+ @builtins.property
410
+ def intermediates(self) -> typing.Optional[builtins.str]:
411
+ '''Intermediate certificates as base64 encoded string. Must be in PEM format.
412
+
413
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.31.0/docs/resources/loadbalancer_manual_certificate_bundle#intermediates LoadbalancerManualCertificateBundle#intermediates}
414
+ '''
415
+ result = self._values.get("intermediates")
416
+ return typing.cast(typing.Optional[builtins.str], result)
417
+
418
+ def __eq__(self, rhs: typing.Any) -> builtins.bool:
419
+ return isinstance(rhs, self.__class__) and rhs._values == self._values
420
+
421
+ def __ne__(self, rhs: typing.Any) -> builtins.bool:
422
+ return not (rhs == self)
423
+
424
+ def __repr__(self) -> str:
425
+ return "LoadbalancerManualCertificateBundleConfig(%s)" % ", ".join(
426
+ k + "=" + repr(v) for k, v in self._values.items()
427
+ )
428
+
429
+
430
+ __all__ = [
431
+ "LoadbalancerManualCertificateBundle",
432
+ "LoadbalancerManualCertificateBundleConfig",
433
+ ]
434
+
435
+ publication.publish()
436
+
437
+ def _typecheckingstub__8906ddb93a852403edd26f83476b5132bbbba47dd80ae1e09a217b89c2c5ebfd(
438
+ scope: _constructs_77d1e7e8.Construct,
439
+ id: builtins.str,
440
+ *,
441
+ certificate: builtins.str,
442
+ name: builtins.str,
443
+ private_key: builtins.str,
444
+ intermediates: typing.Optional[builtins.str] = None,
445
+ connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
446
+ count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
447
+ depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
448
+ for_each: typing.Optional[_cdktf_9a9027ec.ITerraformIterator] = None,
449
+ lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
450
+ provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
451
+ provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
452
+ ) -> None:
453
+ """Type checking stubs"""
454
+ pass
455
+
456
+ def _typecheckingstub__3bc3fd322061a3b93a7c3acda941dc668429808f66c506d87838d906321328c2(
457
+ scope: _constructs_77d1e7e8.Construct,
458
+ import_to_id: builtins.str,
459
+ import_from_id: builtins.str,
460
+ provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
461
+ ) -> None:
462
+ """Type checking stubs"""
463
+ pass
464
+
465
+ def _typecheckingstub__96ef382025a29a51866d84f2dc3c17b41f82b79a4bb094d894fcbaf95740f9b6(
466
+ value: builtins.str,
467
+ ) -> None:
468
+ """Type checking stubs"""
469
+ pass
470
+
471
+ def _typecheckingstub__8cc04ae1e4912a17e803a537f4509f2830feb5c54873cd177838664b3e1e46e1(
472
+ value: builtins.str,
473
+ ) -> None:
474
+ """Type checking stubs"""
475
+ pass
476
+
477
+ def _typecheckingstub__8d66c7d6519ee5d57272acf4d2eae061b67d8d68f40564783650e1b3f4d951be(
478
+ value: builtins.str,
479
+ ) -> None:
480
+ """Type checking stubs"""
481
+ pass
482
+
483
+ def _typecheckingstub__e9824200c17143549c0edae9af888590e7e454d121cdd68ed34d4dec38264f88(
484
+ value: builtins.str,
485
+ ) -> None:
486
+ """Type checking stubs"""
487
+ pass
488
+
489
+ def _typecheckingstub__1dedb301979f3a607f94d3098b5a66a8ce5efacc67dd9840b2ee617b9db0f818(
490
+ *,
491
+ connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
492
+ count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
493
+ depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
494
+ for_each: typing.Optional[_cdktf_9a9027ec.ITerraformIterator] = None,
495
+ lifecycle: typing.Optional[typing.Union[_cdktf_9a9027ec.TerraformResourceLifecycle, typing.Dict[builtins.str, typing.Any]]] = None,
496
+ provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
497
+ provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
498
+ certificate: builtins.str,
499
+ name: builtins.str,
500
+ private_key: builtins.str,
501
+ intermediates: typing.Optional[builtins.str] = None,
502
+ ) -> None:
503
+ """Type checking stubs"""
504
+ pass