diff --git a/README.md b/README.md
index bf9f8754..873b5e73 100644
--- a/README.md
+++ b/README.md
@@ -1,7 +1,7 @@
-# CDKTF prebuilt bindings for hashicorp/local provider version 2.5.1
+# CDKTF prebuilt bindings for hashicorp/local provider version 2.5.2
-This repo builds and publishes the [Terraform local provider](https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs) bindings for [CDK for Terraform](https://cdk.tf).
+This repo builds and publishes the [Terraform local provider](https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs) bindings for [CDK for Terraform](https://cdk.tf).
## Available Packages
@@ -63,7 +63,7 @@ This project is explicitly not tracking the Terraform local provider version 1:1
These are the upstream dependencies:
- [CDK for Terraform](https://cdk.tf)
-- [Terraform local provider](https://registry.terraform.io/providers/hashicorp/local/2.5.1)
+- [Terraform local provider](https://registry.terraform.io/providers/hashicorp/local/2.5.2)
- [Terraform Engine](https://terraform.io)
If there are breaking changes (backward incompatible) in any of the above, the major version of this project will be bumped.
diff --git a/docs/dataLocalFile.csharp.md b/docs/dataLocalFile.csharp.md
index fdb75a13..98a371d2 100644
--- a/docs/dataLocalFile.csharp.md
+++ b/docs/dataLocalFile.csharp.md
@@ -4,7 +4,7 @@
### DataLocalFile
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file local_file}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file local_file}.
#### Initializers
@@ -365,7 +365,7 @@ The construct id used in the generated config for the DataLocalFile to import.
The id of the existing DataLocalFile that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#import import section} in the documentation of this resource for the id to use
---
@@ -775,7 +775,7 @@ Path to the file that will be read.
The data source will return an error if the file does not exist.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#filename DataLocalFile#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#filename DataLocalFile#filename}
---
diff --git a/docs/dataLocalFile.go.md b/docs/dataLocalFile.go.md
index 1dea1b63..6c628e2e 100644
--- a/docs/dataLocalFile.go.md
+++ b/docs/dataLocalFile.go.md
@@ -4,7 +4,7 @@
### DataLocalFile
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file local_file}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file local_file}.
#### Initializers
@@ -365,7 +365,7 @@ The construct id used in the generated config for the DataLocalFile to import.
The id of the existing DataLocalFile that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#import import section} in the documentation of this resource for the id to use
---
@@ -775,7 +775,7 @@ Path to the file that will be read.
The data source will return an error if the file does not exist.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#filename DataLocalFile#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#filename DataLocalFile#filename}
---
diff --git a/docs/dataLocalFile.java.md b/docs/dataLocalFile.java.md
index 9ed6cf84..3b175ded 100644
--- a/docs/dataLocalFile.java.md
+++ b/docs/dataLocalFile.java.md
@@ -4,7 +4,7 @@
### DataLocalFile
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file local_file}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file local_file}.
#### Initializers
@@ -110,7 +110,7 @@ Path to the file that will be read.
The data source will return an error if the file does not exist.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#filename DataLocalFile#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#filename DataLocalFile#filename}
---
@@ -433,7 +433,7 @@ The construct id used in the generated config for the DataLocalFile to import.
The id of the existing DataLocalFile that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#import import section} in the documentation of this resource for the id to use
---
@@ -847,7 +847,7 @@ Path to the file that will be read.
The data source will return an error if the file does not exist.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#filename DataLocalFile#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#filename DataLocalFile#filename}
---
diff --git a/docs/dataLocalFile.python.md b/docs/dataLocalFile.python.md
index fa973b74..cfb70466 100644
--- a/docs/dataLocalFile.python.md
+++ b/docs/dataLocalFile.python.md
@@ -4,7 +4,7 @@
### DataLocalFile
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file local_file}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file local_file}.
#### Initializers
@@ -108,7 +108,7 @@ Path to the file that will be read.
The data source will return an error if the file does not exist.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#filename DataLocalFile#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#filename DataLocalFile#filename}
---
@@ -467,7 +467,7 @@ The construct id used in the generated config for the DataLocalFile to import.
The id of the existing DataLocalFile that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#import import section} in the documentation of this resource for the id to use
---
@@ -877,7 +877,7 @@ Path to the file that will be read.
The data source will return an error if the file does not exist.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#filename DataLocalFile#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#filename DataLocalFile#filename}
---
diff --git a/docs/dataLocalFile.typescript.md b/docs/dataLocalFile.typescript.md
index 88c46b09..bedc1ec0 100644
--- a/docs/dataLocalFile.typescript.md
+++ b/docs/dataLocalFile.typescript.md
@@ -4,7 +4,7 @@
### DataLocalFile
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file local_file}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file local_file}.
#### Initializers
@@ -365,7 +365,7 @@ The construct id used in the generated config for the DataLocalFile to import.
The id of the existing DataLocalFile that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#import import section} in the documentation of this resource for the id to use
---
@@ -766,7 +766,7 @@ Path to the file that will be read.
The data source will return an error if the file does not exist.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#filename DataLocalFile#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#filename DataLocalFile#filename}
---
diff --git a/docs/dataLocalSensitiveFile.csharp.md b/docs/dataLocalSensitiveFile.csharp.md
index 9a6a14d7..e972d095 100644
--- a/docs/dataLocalSensitiveFile.csharp.md
+++ b/docs/dataLocalSensitiveFile.csharp.md
@@ -4,7 +4,7 @@
### DataLocalSensitiveFile
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file local_sensitive_file}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file local_sensitive_file}.
#### Initializers
@@ -365,7 +365,7 @@ The construct id used in the generated config for the DataLocalSensitiveFile to
The id of the existing DataLocalSensitiveFile that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#import import section} in the documentation of this resource for the id to use
---
@@ -775,7 +775,7 @@ Path to the file that will be read.
The data source will return an error if the file does not exist.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename}
---
diff --git a/docs/dataLocalSensitiveFile.go.md b/docs/dataLocalSensitiveFile.go.md
index f718c974..4307ba32 100644
--- a/docs/dataLocalSensitiveFile.go.md
+++ b/docs/dataLocalSensitiveFile.go.md
@@ -4,7 +4,7 @@
### DataLocalSensitiveFile
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file local_sensitive_file}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file local_sensitive_file}.
#### Initializers
@@ -365,7 +365,7 @@ The construct id used in the generated config for the DataLocalSensitiveFile to
The id of the existing DataLocalSensitiveFile that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#import import section} in the documentation of this resource for the id to use
---
@@ -775,7 +775,7 @@ Path to the file that will be read.
The data source will return an error if the file does not exist.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename}
---
diff --git a/docs/dataLocalSensitiveFile.java.md b/docs/dataLocalSensitiveFile.java.md
index 64b0e427..57a5f9cd 100644
--- a/docs/dataLocalSensitiveFile.java.md
+++ b/docs/dataLocalSensitiveFile.java.md
@@ -4,7 +4,7 @@
### DataLocalSensitiveFile
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file local_sensitive_file}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file local_sensitive_file}.
#### Initializers
@@ -110,7 +110,7 @@ Path to the file that will be read.
The data source will return an error if the file does not exist.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename}
---
@@ -433,7 +433,7 @@ The construct id used in the generated config for the DataLocalSensitiveFile to
The id of the existing DataLocalSensitiveFile that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#import import section} in the documentation of this resource for the id to use
---
@@ -847,7 +847,7 @@ Path to the file that will be read.
The data source will return an error if the file does not exist.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename}
---
diff --git a/docs/dataLocalSensitiveFile.python.md b/docs/dataLocalSensitiveFile.python.md
index efdbc51d..d4f1ea61 100644
--- a/docs/dataLocalSensitiveFile.python.md
+++ b/docs/dataLocalSensitiveFile.python.md
@@ -4,7 +4,7 @@
### DataLocalSensitiveFile
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file local_sensitive_file}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file local_sensitive_file}.
#### Initializers
@@ -108,7 +108,7 @@ Path to the file that will be read.
The data source will return an error if the file does not exist.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename}
---
@@ -467,7 +467,7 @@ The construct id used in the generated config for the DataLocalSensitiveFile to
The id of the existing DataLocalSensitiveFile that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#import import section} in the documentation of this resource for the id to use
---
@@ -877,7 +877,7 @@ Path to the file that will be read.
The data source will return an error if the file does not exist.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename}
---
diff --git a/docs/dataLocalSensitiveFile.typescript.md b/docs/dataLocalSensitiveFile.typescript.md
index 67591d45..076eefdc 100644
--- a/docs/dataLocalSensitiveFile.typescript.md
+++ b/docs/dataLocalSensitiveFile.typescript.md
@@ -4,7 +4,7 @@
### DataLocalSensitiveFile
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file local_sensitive_file}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file local_sensitive_file}.
#### Initializers
@@ -365,7 +365,7 @@ The construct id used in the generated config for the DataLocalSensitiveFile to
The id of the existing DataLocalSensitiveFile that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#import import section} in the documentation of this resource for the id to use
---
@@ -766,7 +766,7 @@ Path to the file that will be read.
The data source will return an error if the file does not exist.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename}
---
diff --git a/docs/file.csharp.md b/docs/file.csharp.md
index 02f7122a..d77aa58b 100644
--- a/docs/file.csharp.md
+++ b/docs/file.csharp.md
@@ -4,7 +4,7 @@
### File
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file local_file}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file local_file}.
#### Initializers
@@ -509,7 +509,7 @@ The construct id used in the generated config for the File to import.
The id of the existing File that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#import import section} in the documentation of this resource for the id to use
---
@@ -1064,7 +1064,7 @@ The path to the file that will be created.
Missing parent directories will be created.
If the file already exists, it will be overridden with the given content.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#filename File#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#filename File#filename}
---
@@ -1081,7 +1081,7 @@ Content to store in the file, expected to be a UTF-8 encoded string.
Conflicts with `sensitive_content`, `content_base64` and `source`.
Exactly one of these four arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content File#content}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content File#content}
---
@@ -1098,7 +1098,7 @@ Content to store in the file, expected to be binary encoded as base64 string.
Conflicts with `content`, `sensitive_content` and `source`.
Exactly one of these four arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content_base64 File#content_base64}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content_base64 File#content_base64}
---
@@ -1112,7 +1112,7 @@ public string DirectoryPermission { get; set; }
Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#directory_permission File#directory_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#directory_permission File#directory_permission}
---
@@ -1126,7 +1126,7 @@ public string FilePermission { get; set; }
Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#file_permission File#file_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#file_permission File#file_permission}
---
@@ -1146,7 +1146,7 @@ Exactly one of these four arguments must be specified.
If in need to use *sensitive* content, please use the [`local_sensitive_file`](./sensitive_file.html)
resource instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#sensitive_content File#sensitive_content}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#sensitive_content File#sensitive_content}
---
@@ -1163,7 +1163,7 @@ Path to file to use as source for the one we are creating.
Conflicts with `content`, `sensitive_content` and `content_base64`.
Exactly one of these four arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#source File#source}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#source File#source}
---
diff --git a/docs/file.go.md b/docs/file.go.md
index fa745066..5af00cc2 100644
--- a/docs/file.go.md
+++ b/docs/file.go.md
@@ -4,7 +4,7 @@
### File
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file local_file}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file local_file}.
#### Initializers
@@ -509,7 +509,7 @@ The construct id used in the generated config for the File to import.
The id of the existing File that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#import import section} in the documentation of this resource for the id to use
---
@@ -1064,7 +1064,7 @@ The path to the file that will be created.
Missing parent directories will be created.
If the file already exists, it will be overridden with the given content.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#filename File#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#filename File#filename}
---
@@ -1081,7 +1081,7 @@ Content to store in the file, expected to be a UTF-8 encoded string.
Conflicts with `sensitive_content`, `content_base64` and `source`.
Exactly one of these four arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content File#content}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content File#content}
---
@@ -1098,7 +1098,7 @@ Content to store in the file, expected to be binary encoded as base64 string.
Conflicts with `content`, `sensitive_content` and `source`.
Exactly one of these four arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content_base64 File#content_base64}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content_base64 File#content_base64}
---
@@ -1112,7 +1112,7 @@ DirectoryPermission *string
Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#directory_permission File#directory_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#directory_permission File#directory_permission}
---
@@ -1126,7 +1126,7 @@ FilePermission *string
Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#file_permission File#file_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#file_permission File#file_permission}
---
@@ -1146,7 +1146,7 @@ Exactly one of these four arguments must be specified.
If in need to use *sensitive* content, please use the [`local_sensitive_file`](./sensitive_file.html)
resource instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#sensitive_content File#sensitive_content}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#sensitive_content File#sensitive_content}
---
@@ -1163,7 +1163,7 @@ Path to file to use as source for the one we are creating.
Conflicts with `content`, `sensitive_content` and `content_base64`.
Exactly one of these four arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#source File#source}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#source File#source}
---
diff --git a/docs/file.java.md b/docs/file.java.md
index f44c6767..11b5070c 100644
--- a/docs/file.java.md
+++ b/docs/file.java.md
@@ -4,7 +4,7 @@
### File
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file local_file}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file local_file}.
#### Initializers
@@ -123,7 +123,7 @@ The path to the file that will be created.
Missing parent directories will be created.
If the file already exists, it will be overridden with the given content.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#filename File#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#filename File#filename}
---
@@ -136,7 +136,7 @@ Content to store in the file, expected to be a UTF-8 encoded string.
Conflicts with `sensitive_content`, `content_base64` and `source`.
Exactly one of these four arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content File#content}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content File#content}
---
@@ -149,7 +149,7 @@ Content to store in the file, expected to be binary encoded as base64 string.
Conflicts with `content`, `sensitive_content` and `source`.
Exactly one of these four arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content_base64 File#content_base64}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content_base64 File#content_base64}
---
@@ -159,7 +159,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#directory_permission File#directory_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#directory_permission File#directory_permission}
---
@@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#file_permission File#file_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#file_permission File#file_permission}
---
@@ -185,7 +185,7 @@ Exactly one of these four arguments must be specified.
If in need to use *sensitive* content, please use the [`local_sensitive_file`](./sensitive_file.html)
resource instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#sensitive_content File#sensitive_content}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#sensitive_content File#sensitive_content}
---
@@ -198,7 +198,7 @@ Path to file to use as source for the one we are creating.
Conflicts with `content`, `sensitive_content` and `content_base64`.
Exactly one of these four arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#source File#source}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#source File#source}
---
@@ -667,7 +667,7 @@ The construct id used in the generated config for the File to import.
The id of the existing File that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#import import section} in the documentation of this resource for the id to use
---
@@ -1226,7 +1226,7 @@ The path to the file that will be created.
Missing parent directories will be created.
If the file already exists, it will be overridden with the given content.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#filename File#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#filename File#filename}
---
@@ -1243,7 +1243,7 @@ Content to store in the file, expected to be a UTF-8 encoded string.
Conflicts with `sensitive_content`, `content_base64` and `source`.
Exactly one of these four arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content File#content}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content File#content}
---
@@ -1260,7 +1260,7 @@ Content to store in the file, expected to be binary encoded as base64 string.
Conflicts with `content`, `sensitive_content` and `source`.
Exactly one of these four arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content_base64 File#content_base64}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content_base64 File#content_base64}
---
@@ -1274,7 +1274,7 @@ public java.lang.String getDirectoryPermission();
Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#directory_permission File#directory_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#directory_permission File#directory_permission}
---
@@ -1288,7 +1288,7 @@ public java.lang.String getFilePermission();
Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#file_permission File#file_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#file_permission File#file_permission}
---
@@ -1308,7 +1308,7 @@ Exactly one of these four arguments must be specified.
If in need to use *sensitive* content, please use the [`local_sensitive_file`](./sensitive_file.html)
resource instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#sensitive_content File#sensitive_content}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#sensitive_content File#sensitive_content}
---
@@ -1325,7 +1325,7 @@ Path to file to use as source for the one we are creating.
Conflicts with `content`, `sensitive_content` and `content_base64`.
Exactly one of these four arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#source File#source}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#source File#source}
---
diff --git a/docs/file.python.md b/docs/file.python.md
index 23b9fcf6..d727d879 100644
--- a/docs/file.python.md
+++ b/docs/file.python.md
@@ -4,7 +4,7 @@
### File
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file local_file}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file local_file}.
#### Initializers
@@ -121,7 +121,7 @@ The path to the file that will be created.
Missing parent directories will be created.
If the file already exists, it will be overridden with the given content.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#filename File#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#filename File#filename}
---
@@ -134,7 +134,7 @@ Content to store in the file, expected to be a UTF-8 encoded string.
Conflicts with `sensitive_content`, `content_base64` and `source`.
Exactly one of these four arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content File#content}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content File#content}
---
@@ -147,7 +147,7 @@ Content to store in the file, expected to be binary encoded as base64 string.
Conflicts with `content`, `sensitive_content` and `source`.
Exactly one of these four arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content_base64 File#content_base64}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content_base64 File#content_base64}
---
@@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#directory_permission File#directory_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#directory_permission File#directory_permission}
---
@@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#file_permission File#file_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#file_permission File#file_permission}
---
@@ -183,7 +183,7 @@ Exactly one of these four arguments must be specified.
If in need to use *sensitive* content, please use the [`local_sensitive_file`](./sensitive_file.html)
resource instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#sensitive_content File#sensitive_content}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#sensitive_content File#sensitive_content}
---
@@ -196,7 +196,7 @@ Path to file to use as source for the one we are creating.
Conflicts with `content`, `sensitive_content` and `content_base64`.
Exactly one of these four arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#source File#source}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#source File#source}
---
@@ -711,7 +711,7 @@ The construct id used in the generated config for the File to import.
The id of the existing File that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#import import section} in the documentation of this resource for the id to use
---
@@ -1266,7 +1266,7 @@ The path to the file that will be created.
Missing parent directories will be created.
If the file already exists, it will be overridden with the given content.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#filename File#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#filename File#filename}
---
@@ -1283,7 +1283,7 @@ Content to store in the file, expected to be a UTF-8 encoded string.
Conflicts with `sensitive_content`, `content_base64` and `source`.
Exactly one of these four arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content File#content}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content File#content}
---
@@ -1300,7 +1300,7 @@ Content to store in the file, expected to be binary encoded as base64 string.
Conflicts with `content`, `sensitive_content` and `source`.
Exactly one of these four arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content_base64 File#content_base64}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content_base64 File#content_base64}
---
@@ -1314,7 +1314,7 @@ directory_permission: str
Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#directory_permission File#directory_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#directory_permission File#directory_permission}
---
@@ -1328,7 +1328,7 @@ file_permission: str
Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#file_permission File#file_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#file_permission File#file_permission}
---
@@ -1348,7 +1348,7 @@ Exactly one of these four arguments must be specified.
If in need to use *sensitive* content, please use the [`local_sensitive_file`](./sensitive_file.html)
resource instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#sensitive_content File#sensitive_content}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#sensitive_content File#sensitive_content}
---
@@ -1365,7 +1365,7 @@ Path to file to use as source for the one we are creating.
Conflicts with `content`, `sensitive_content` and `content_base64`.
Exactly one of these four arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#source File#source}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#source File#source}
---
diff --git a/docs/file.typescript.md b/docs/file.typescript.md
index ea7f0a3d..4e5534b5 100644
--- a/docs/file.typescript.md
+++ b/docs/file.typescript.md
@@ -4,7 +4,7 @@
### File
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file local_file}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file local_file}.
#### Initializers
@@ -509,7 +509,7 @@ The construct id used in the generated config for the File to import.
The id of the existing File that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#import import section} in the documentation of this resource for the id to use
---
@@ -1049,7 +1049,7 @@ The path to the file that will be created.
Missing parent directories will be created.
If the file already exists, it will be overridden with the given content.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#filename File#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#filename File#filename}
---
@@ -1066,7 +1066,7 @@ Content to store in the file, expected to be a UTF-8 encoded string.
Conflicts with `sensitive_content`, `content_base64` and `source`.
Exactly one of these four arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content File#content}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content File#content}
---
@@ -1083,7 +1083,7 @@ Content to store in the file, expected to be binary encoded as base64 string.
Conflicts with `content`, `sensitive_content` and `source`.
Exactly one of these four arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content_base64 File#content_base64}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content_base64 File#content_base64}
---
@@ -1097,7 +1097,7 @@ public readonly directoryPermission: string;
Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#directory_permission File#directory_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#directory_permission File#directory_permission}
---
@@ -1111,7 +1111,7 @@ public readonly filePermission: string;
Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#file_permission File#file_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#file_permission File#file_permission}
---
@@ -1131,7 +1131,7 @@ Will not be displayed in diffs.
If in need to use _sensitive_ content, please use the [`local_sensitive_file`](./sensitive_file.html)
resource instead.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#sensitive_content File#sensitive_content}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#sensitive_content File#sensitive_content}
---
@@ -1148,7 +1148,7 @@ Path to file to use as source for the one we are creating.
Conflicts with `content`, `sensitive_content` and `content_base64`.
Exactly one of these four arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#source File#source}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#source File#source}
---
diff --git a/docs/provider.csharp.md b/docs/provider.csharp.md
index bef2a282..d5b81c25 100644
--- a/docs/provider.csharp.md
+++ b/docs/provider.csharp.md
@@ -4,7 +4,7 @@
### LocalProvider
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs local}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs local}.
#### Initializers
@@ -240,7 +240,7 @@ The construct id used in the generated config for the LocalProvider to import.
The id of the existing LocalProvider that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#import import section} in the documentation of this resource for the id to use
---
@@ -421,7 +421,7 @@ public string Alias { get; set; }
Alias name.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#alias LocalProvider#alias}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#alias LocalProvider#alias}
---
diff --git a/docs/provider.go.md b/docs/provider.go.md
index aee56c00..711d3e5f 100644
--- a/docs/provider.go.md
+++ b/docs/provider.go.md
@@ -4,7 +4,7 @@
### LocalProvider
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs local}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs local}.
#### Initializers
@@ -240,7 +240,7 @@ The construct id used in the generated config for the LocalProvider to import.
The id of the existing LocalProvider that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#import import section} in the documentation of this resource for the id to use
---
@@ -421,7 +421,7 @@ Alias *string
Alias name.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#alias LocalProvider#alias}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#alias LocalProvider#alias}
---
diff --git a/docs/provider.java.md b/docs/provider.java.md
index 428b65dd..604ae1e0 100644
--- a/docs/provider.java.md
+++ b/docs/provider.java.md
@@ -4,7 +4,7 @@
### LocalProvider
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs local}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs local}.
#### Initializers
@@ -48,7 +48,7 @@ Must be unique amongst siblings in the same scope
Alias name.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#alias LocalProvider#alias}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#alias LocalProvider#alias}
---
@@ -246,7 +246,7 @@ The construct id used in the generated config for the LocalProvider to import.
The id of the existing LocalProvider that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#import import section} in the documentation of this resource for the id to use
---
@@ -427,7 +427,7 @@ public java.lang.String getAlias();
Alias name.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#alias LocalProvider#alias}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#alias LocalProvider#alias}
---
diff --git a/docs/provider.python.md b/docs/provider.python.md
index efbab1e2..b596c09b 100644
--- a/docs/provider.python.md
+++ b/docs/provider.python.md
@@ -4,7 +4,7 @@
### LocalProvider
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs local}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs local}.
#### Initializers
@@ -50,7 +50,7 @@ Must be unique amongst siblings in the same scope
Alias name.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#alias LocalProvider#alias}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#alias LocalProvider#alias}
---
@@ -264,7 +264,7 @@ The construct id used in the generated config for the LocalProvider to import.
The id of the existing LocalProvider that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#import import section} in the documentation of this resource for the id to use
---
@@ -445,7 +445,7 @@ alias: str
Alias name.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#alias LocalProvider#alias}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#alias LocalProvider#alias}
---
diff --git a/docs/provider.typescript.md b/docs/provider.typescript.md
index 7d6c95f4..9861a9fd 100644
--- a/docs/provider.typescript.md
+++ b/docs/provider.typescript.md
@@ -4,7 +4,7 @@
### LocalProvider
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs local}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs local}.
#### Initializers
@@ -240,7 +240,7 @@ The construct id used in the generated config for the LocalProvider to import.
The id of the existing LocalProvider that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#import import section} in the documentation of this resource for the id to use
---
@@ -419,7 +419,7 @@ public readonly alias: string;
Alias name.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#alias LocalProvider#alias}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#alias LocalProvider#alias}
---
diff --git a/docs/sensitiveFile.csharp.md b/docs/sensitiveFile.csharp.md
index 24087700..8b64f12a 100644
--- a/docs/sensitiveFile.csharp.md
+++ b/docs/sensitiveFile.csharp.md
@@ -4,7 +4,7 @@
### SensitiveFile
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file local_sensitive_file}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file local_sensitive_file}.
#### Initializers
@@ -502,7 +502,7 @@ The construct id used in the generated config for the SensitiveFile to import.
The id of the existing SensitiveFile that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#import import section} in the documentation of this resource for the id to use
---
@@ -1033,7 +1033,7 @@ The path to the file that will be created.
Missing parent directories will be created.
If the file already exists, it will be overridden with the given content.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#filename SensitiveFile#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#filename SensitiveFile#filename}
---
@@ -1050,7 +1050,7 @@ Sensitive Content to store in the file, expected to be a UTF-8 encoded string.
Conflicts with `content_base64` and `source`.
Exactly one of these three arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content SensitiveFile#content}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content SensitiveFile#content}
---
@@ -1067,7 +1067,7 @@ Sensitive Content to store in the file, expected to be binary encoded as base64
Conflicts with `content` and `source`.
Exactly one of these three arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64}
---
@@ -1081,7 +1081,7 @@ public string DirectoryPermission { get; set; }
Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission}
---
@@ -1095,7 +1095,7 @@ public string FilePermission { get; set; }
Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission}
---
@@ -1112,7 +1112,7 @@ Path to file to use as source for the one we are creating.
Conflicts with `content` and `content_base64`.
Exactly one of these three arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#source SensitiveFile#source}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#source SensitiveFile#source}
---
diff --git a/docs/sensitiveFile.go.md b/docs/sensitiveFile.go.md
index a033430c..d4954651 100644
--- a/docs/sensitiveFile.go.md
+++ b/docs/sensitiveFile.go.md
@@ -4,7 +4,7 @@
### SensitiveFile
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file local_sensitive_file}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file local_sensitive_file}.
#### Initializers
@@ -502,7 +502,7 @@ The construct id used in the generated config for the SensitiveFile to import.
The id of the existing SensitiveFile that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#import import section} in the documentation of this resource for the id to use
---
@@ -1033,7 +1033,7 @@ The path to the file that will be created.
Missing parent directories will be created.
If the file already exists, it will be overridden with the given content.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#filename SensitiveFile#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#filename SensitiveFile#filename}
---
@@ -1050,7 +1050,7 @@ Sensitive Content to store in the file, expected to be a UTF-8 encoded string.
Conflicts with `content_base64` and `source`.
Exactly one of these three arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content SensitiveFile#content}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content SensitiveFile#content}
---
@@ -1067,7 +1067,7 @@ Sensitive Content to store in the file, expected to be binary encoded as base64
Conflicts with `content` and `source`.
Exactly one of these three arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64}
---
@@ -1081,7 +1081,7 @@ DirectoryPermission *string
Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission}
---
@@ -1095,7 +1095,7 @@ FilePermission *string
Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission}
---
@@ -1112,7 +1112,7 @@ Path to file to use as source for the one we are creating.
Conflicts with `content` and `content_base64`.
Exactly one of these three arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#source SensitiveFile#source}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#source SensitiveFile#source}
---
diff --git a/docs/sensitiveFile.java.md b/docs/sensitiveFile.java.md
index 6c589899..395bd8ef 100644
--- a/docs/sensitiveFile.java.md
+++ b/docs/sensitiveFile.java.md
@@ -4,7 +4,7 @@
### SensitiveFile
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file local_sensitive_file}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file local_sensitive_file}.
#### Initializers
@@ -121,7 +121,7 @@ The path to the file that will be created.
Missing parent directories will be created.
If the file already exists, it will be overridden with the given content.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#filename SensitiveFile#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#filename SensitiveFile#filename}
---
@@ -134,7 +134,7 @@ Sensitive Content to store in the file, expected to be a UTF-8 encoded string.
Conflicts with `content_base64` and `source`.
Exactly one of these three arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content SensitiveFile#content}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content SensitiveFile#content}
---
@@ -147,7 +147,7 @@ Sensitive Content to store in the file, expected to be binary encoded as base64
Conflicts with `content` and `source`.
Exactly one of these three arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64}
---
@@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission}
---
@@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission}
---
@@ -180,7 +180,7 @@ Path to file to use as source for the one we are creating.
Conflicts with `content` and `content_base64`.
Exactly one of these three arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#source SensitiveFile#source}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#source SensitiveFile#source}
---
@@ -642,7 +642,7 @@ The construct id used in the generated config for the SensitiveFile to import.
The id of the existing SensitiveFile that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#import import section} in the documentation of this resource for the id to use
---
@@ -1177,7 +1177,7 @@ The path to the file that will be created.
Missing parent directories will be created.
If the file already exists, it will be overridden with the given content.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#filename SensitiveFile#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#filename SensitiveFile#filename}
---
@@ -1194,7 +1194,7 @@ Sensitive Content to store in the file, expected to be a UTF-8 encoded string.
Conflicts with `content_base64` and `source`.
Exactly one of these three arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content SensitiveFile#content}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content SensitiveFile#content}
---
@@ -1211,7 +1211,7 @@ Sensitive Content to store in the file, expected to be binary encoded as base64
Conflicts with `content` and `source`.
Exactly one of these three arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64}
---
@@ -1225,7 +1225,7 @@ public java.lang.String getDirectoryPermission();
Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission}
---
@@ -1239,7 +1239,7 @@ public java.lang.String getFilePermission();
Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission}
---
@@ -1256,7 +1256,7 @@ Path to file to use as source for the one we are creating.
Conflicts with `content` and `content_base64`.
Exactly one of these three arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#source SensitiveFile#source}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#source SensitiveFile#source}
---
diff --git a/docs/sensitiveFile.python.md b/docs/sensitiveFile.python.md
index ddc93263..e1d6e84e 100644
--- a/docs/sensitiveFile.python.md
+++ b/docs/sensitiveFile.python.md
@@ -4,7 +4,7 @@
### SensitiveFile
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file local_sensitive_file}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file local_sensitive_file}.
#### Initializers
@@ -119,7 +119,7 @@ The path to the file that will be created.
Missing parent directories will be created.
If the file already exists, it will be overridden with the given content.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#filename SensitiveFile#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#filename SensitiveFile#filename}
---
@@ -132,7 +132,7 @@ Sensitive Content to store in the file, expected to be a UTF-8 encoded string.
Conflicts with `content_base64` and `source`.
Exactly one of these three arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content SensitiveFile#content}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content SensitiveFile#content}
---
@@ -145,7 +145,7 @@ Sensitive Content to store in the file, expected to be binary encoded as base64
Conflicts with `content` and `source`.
Exactly one of these three arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64}
---
@@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission}
---
@@ -165,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi
Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission}
---
@@ -178,7 +178,7 @@ Path to file to use as source for the one we are creating.
Conflicts with `content` and `content_base64`.
Exactly one of these three arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#source SensitiveFile#source}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#source SensitiveFile#source}
---
@@ -686,7 +686,7 @@ The construct id used in the generated config for the SensitiveFile to import.
The id of the existing SensitiveFile that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#import import section} in the documentation of this resource for the id to use
---
@@ -1217,7 +1217,7 @@ The path to the file that will be created.
Missing parent directories will be created.
If the file already exists, it will be overridden with the given content.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#filename SensitiveFile#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#filename SensitiveFile#filename}
---
@@ -1234,7 +1234,7 @@ Sensitive Content to store in the file, expected to be a UTF-8 encoded string.
Conflicts with `content_base64` and `source`.
Exactly one of these three arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content SensitiveFile#content}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content SensitiveFile#content}
---
@@ -1251,7 +1251,7 @@ Sensitive Content to store in the file, expected to be binary encoded as base64
Conflicts with `content` and `source`.
Exactly one of these three arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64}
---
@@ -1265,7 +1265,7 @@ directory_permission: str
Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission}
---
@@ -1279,7 +1279,7 @@ file_permission: str
Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission}
---
@@ -1296,7 +1296,7 @@ Path to file to use as source for the one we are creating.
Conflicts with `content` and `content_base64`.
Exactly one of these three arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#source SensitiveFile#source}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#source SensitiveFile#source}
---
diff --git a/docs/sensitiveFile.typescript.md b/docs/sensitiveFile.typescript.md
index ba96c174..3425517a 100644
--- a/docs/sensitiveFile.typescript.md
+++ b/docs/sensitiveFile.typescript.md
@@ -4,7 +4,7 @@
### SensitiveFile
-Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file local_sensitive_file}.
+Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file local_sensitive_file}.
#### Initializers
@@ -502,7 +502,7 @@ The construct id used in the generated config for the SensitiveFile to import.
The id of the existing SensitiveFile that should be imported.
-Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#import import section} in the documentation of this resource for the id to use
+Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#import import section} in the documentation of this resource for the id to use
---
@@ -1019,7 +1019,7 @@ The path to the file that will be created.
Missing parent directories will be created.
If the file already exists, it will be overridden with the given content.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#filename SensitiveFile#filename}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#filename SensitiveFile#filename}
---
@@ -1036,7 +1036,7 @@ Sensitive Content to store in the file, expected to be a UTF-8 encoded string.
Conflicts with `content_base64` and `source`.
Exactly one of these three arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content SensitiveFile#content}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content SensitiveFile#content}
---
@@ -1053,7 +1053,7 @@ Sensitive Content to store in the file, expected to be binary encoded as base64
Conflicts with `content` and `source`.
Exactly one of these three arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64}
---
@@ -1067,7 +1067,7 @@ public readonly directoryPermission: string;
Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission}
---
@@ -1081,7 +1081,7 @@ public readonly filePermission: string;
Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission}
---
@@ -1098,7 +1098,7 @@ Path to file to use as source for the one we are creating.
Conflicts with `content` and `content_base64`.
Exactly one of these three arguments must be specified.
-Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#source SensitiveFile#source}
+Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#source SensitiveFile#source}
---
diff --git a/package.json b/package.json
index 5eedbad4..53c98348 100644
--- a/package.json
+++ b/package.json
@@ -157,7 +157,7 @@
"isDeprecated": false,
"provider": {
"name": "registry.terraform.io/hashicorp/local",
- "version": "2.5.1"
+ "version": "2.5.2"
}
},
"//": "~~ Generated by projen. To modify, edit .projenrc.js and run \"npx projen\"."
diff --git a/src/data-local-file/README.md b/src/data-local-file/README.md
index e797443e..87602638 100644
--- a/src/data-local-file/README.md
+++ b/src/data-local-file/README.md
@@ -1,3 +1,3 @@
# `data_local_file`
-Refer to the Terraform Registry for docs: [`data_local_file`](https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file).
+Refer to the Terraform Registry for docs: [`data_local_file`](https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file).
diff --git a/src/data-local-file/index.ts b/src/data-local-file/index.ts
index 3c5bda59..29957613 100644
--- a/src/data-local-file/index.ts
+++ b/src/data-local-file/index.ts
@@ -3,7 +3,7 @@
* SPDX-License-Identifier: MPL-2.0
*/
-// https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file
+// https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file
// generated from terraform resource schema
import { Construct } from 'constructs';
@@ -15,13 +15,13 @@ export interface DataLocalFileConfig extends cdktf.TerraformMetaArguments {
/**
* Path to the file that will be read. The data source will return an error if the file does not exist.
*
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#filename DataLocalFile#filename}
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#filename DataLocalFile#filename}
*/
readonly filename: string;
}
/**
-* Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file local_file}
+* Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file local_file}
*/
export class DataLocalFile extends cdktf.TerraformDataSource {
@@ -37,7 +37,7 @@ export class DataLocalFile extends cdktf.TerraformDataSource {
* Generates CDKTF code for importing a DataLocalFile resource upon running "cdktf plan "
* @param scope The scope in which to define this construct
* @param importToId The construct id used in the generated config for the DataLocalFile to import
- * @param importFromId The id of the existing DataLocalFile that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#import import section} in the documentation of this resource for the id to use
+ * @param importFromId The id of the existing DataLocalFile that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#import import section} in the documentation of this resource for the id to use
* @param provider? Optional instance of the provider where the DataLocalFile to import is found
*/
public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) {
@@ -49,7 +49,7 @@ export class DataLocalFile extends cdktf.TerraformDataSource {
// ===========
/**
- * Create a new {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file local_file} Data Source
+ * Create a new {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file local_file} Data Source
*
* @param scope The scope in which to define this construct
* @param id The scoped construct ID. Must be unique amongst siblings in the same scope
@@ -60,7 +60,7 @@ export class DataLocalFile extends cdktf.TerraformDataSource {
terraformResourceType: 'local_file',
terraformGeneratorMetadata: {
providerName: 'local',
- providerVersion: '2.5.1',
+ providerVersion: '2.5.2',
providerVersionConstraint: '~> 2.1'
},
provider: config.provider,
diff --git a/src/data-local-sensitive-file/README.md b/src/data-local-sensitive-file/README.md
index 9a12b27e..32294a25 100644
--- a/src/data-local-sensitive-file/README.md
+++ b/src/data-local-sensitive-file/README.md
@@ -1,3 +1,3 @@
# `data_local_sensitive_file`
-Refer to the Terraform Registry for docs: [`data_local_sensitive_file`](https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file).
+Refer to the Terraform Registry for docs: [`data_local_sensitive_file`](https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file).
diff --git a/src/data-local-sensitive-file/index.ts b/src/data-local-sensitive-file/index.ts
index 71279931..d13357a0 100644
--- a/src/data-local-sensitive-file/index.ts
+++ b/src/data-local-sensitive-file/index.ts
@@ -3,7 +3,7 @@
* SPDX-License-Identifier: MPL-2.0
*/
-// https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file
+// https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file
// generated from terraform resource schema
import { Construct } from 'constructs';
@@ -15,13 +15,13 @@ export interface DataLocalSensitiveFileConfig extends cdktf.TerraformMetaArgumen
/**
* Path to the file that will be read. The data source will return an error if the file does not exist.
*
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename}
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename}
*/
readonly filename: string;
}
/**
-* Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file local_sensitive_file}
+* Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file local_sensitive_file}
*/
export class DataLocalSensitiveFile extends cdktf.TerraformDataSource {
@@ -37,7 +37,7 @@ export class DataLocalSensitiveFile extends cdktf.TerraformDataSource {
* Generates CDKTF code for importing a DataLocalSensitiveFile resource upon running "cdktf plan "
* @param scope The scope in which to define this construct
* @param importToId The construct id used in the generated config for the DataLocalSensitiveFile to import
- * @param importFromId The id of the existing DataLocalSensitiveFile that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#import import section} in the documentation of this resource for the id to use
+ * @param importFromId The id of the existing DataLocalSensitiveFile that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#import import section} in the documentation of this resource for the id to use
* @param provider? Optional instance of the provider where the DataLocalSensitiveFile to import is found
*/
public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) {
@@ -49,7 +49,7 @@ export class DataLocalSensitiveFile extends cdktf.TerraformDataSource {
// ===========
/**
- * Create a new {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file local_sensitive_file} Data Source
+ * Create a new {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file local_sensitive_file} Data Source
*
* @param scope The scope in which to define this construct
* @param id The scoped construct ID. Must be unique amongst siblings in the same scope
@@ -60,7 +60,7 @@ export class DataLocalSensitiveFile extends cdktf.TerraformDataSource {
terraformResourceType: 'local_sensitive_file',
terraformGeneratorMetadata: {
providerName: 'local',
- providerVersion: '2.5.1',
+ providerVersion: '2.5.2',
providerVersionConstraint: '~> 2.1'
},
provider: config.provider,
diff --git a/src/file/README.md b/src/file/README.md
index cc74cebc..08e9c995 100644
--- a/src/file/README.md
+++ b/src/file/README.md
@@ -1,3 +1,3 @@
# `local_file`
-Refer to the Terraform Registry for docs: [`local_file`](https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file).
+Refer to the Terraform Registry for docs: [`local_file`](https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file).
diff --git a/src/file/index.ts b/src/file/index.ts
index bd9f5b93..5f457a06 100644
--- a/src/file/index.ts
+++ b/src/file/index.ts
@@ -3,7 +3,7 @@
* SPDX-License-Identifier: MPL-2.0
*/
-// https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file
+// https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file
// generated from terraform resource schema
import { Construct } from 'constructs';
@@ -17,7 +17,7 @@ export interface FileConfig extends cdktf.TerraformMetaArguments {
* Conflicts with `sensitive_content`, `content_base64` and `source`.
* Exactly one of these four arguments must be specified.
*
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content File#content}
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content File#content}
*/
readonly content?: string;
/**
@@ -25,7 +25,7 @@ export interface FileConfig extends cdktf.TerraformMetaArguments {
* Conflicts with `content`, `sensitive_content` and `source`.
* Exactly one of these four arguments must be specified.
*
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content_base64 File#content_base64}
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content_base64 File#content_base64}
*/
readonly contentBase64?: string;
/**
@@ -33,7 +33,7 @@ export interface FileConfig extends cdktf.TerraformMetaArguments {
* [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation).
* Default value is `"0777"`.
*
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#directory_permission File#directory_permission}
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#directory_permission File#directory_permission}
*/
readonly directoryPermission?: string;
/**
@@ -41,7 +41,7 @@ export interface FileConfig extends cdktf.TerraformMetaArguments {
* [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation).
* Default value is `"0777"`.
*
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#file_permission File#file_permission}
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#file_permission File#file_permission}
*/
readonly filePermission?: string;
/**
@@ -49,7 +49,7 @@ export interface FileConfig extends cdktf.TerraformMetaArguments {
* Missing parent directories will be created.
* If the file already exists, it will be overridden with the given content.
*
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#filename File#filename}
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#filename File#filename}
*/
readonly filename: string;
/**
@@ -60,7 +60,7 @@ export interface FileConfig extends cdktf.TerraformMetaArguments {
* If in need to use _sensitive_ content, please use the [`local_sensitive_file`](./sensitive_file.html)
* resource instead.
*
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#sensitive_content File#sensitive_content}
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#sensitive_content File#sensitive_content}
*/
readonly sensitiveContent?: string;
/**
@@ -68,13 +68,13 @@ export interface FileConfig extends cdktf.TerraformMetaArguments {
* Conflicts with `content`, `sensitive_content` and `content_base64`.
* Exactly one of these four arguments must be specified.
*
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#source File#source}
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#source File#source}
*/
readonly source?: string;
}
/**
-* Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file local_file}
+* Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file local_file}
*/
export class File extends cdktf.TerraformResource {
@@ -90,7 +90,7 @@ export class File extends cdktf.TerraformResource {
* Generates CDKTF code for importing a File resource upon running "cdktf plan "
* @param scope The scope in which to define this construct
* @param importToId The construct id used in the generated config for the File to import
- * @param importFromId The id of the existing File that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#import import section} in the documentation of this resource for the id to use
+ * @param importFromId The id of the existing File that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#import import section} in the documentation of this resource for the id to use
* @param provider? Optional instance of the provider where the File to import is found
*/
public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) {
@@ -102,7 +102,7 @@ export class File extends cdktf.TerraformResource {
// ===========
/**
- * Create a new {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file local_file} Resource
+ * Create a new {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file local_file} Resource
*
* @param scope The scope in which to define this construct
* @param id The scoped construct ID. Must be unique amongst siblings in the same scope
@@ -113,7 +113,7 @@ export class File extends cdktf.TerraformResource {
terraformResourceType: 'local_file',
terraformGeneratorMetadata: {
providerName: 'local',
- providerVersion: '2.5.1',
+ providerVersion: '2.5.2',
providerVersionConstraint: '~> 2.1'
},
provider: config.provider,
diff --git a/src/provider/README.md b/src/provider/README.md
index a0742ff7..93189593 100644
--- a/src/provider/README.md
+++ b/src/provider/README.md
@@ -1,3 +1,3 @@
# `provider`
-Refer to the Terraform Registry for docs: [`local`](https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs).
+Refer to the Terraform Registry for docs: [`local`](https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs).
diff --git a/src/provider/index.ts b/src/provider/index.ts
index 7a791977..79de32e6 100644
--- a/src/provider/index.ts
+++ b/src/provider/index.ts
@@ -3,7 +3,7 @@
* SPDX-License-Identifier: MPL-2.0
*/
-// https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs
+// https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs
// generated from terraform resource schema
import { Construct } from 'constructs';
@@ -15,13 +15,13 @@ export interface LocalProviderConfig {
/**
* Alias name
*
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#alias LocalProvider#alias}
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#alias LocalProvider#alias}
*/
readonly alias?: string;
}
/**
-* Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs local}
+* Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs local}
*/
export class LocalProvider extends cdktf.TerraformProvider {
@@ -37,7 +37,7 @@ export class LocalProvider extends cdktf.TerraformProvider {
* Generates CDKTF code for importing a LocalProvider resource upon running "cdktf plan "
* @param scope The scope in which to define this construct
* @param importToId The construct id used in the generated config for the LocalProvider to import
- * @param importFromId The id of the existing LocalProvider that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#import import section} in the documentation of this resource for the id to use
+ * @param importFromId The id of the existing LocalProvider that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#import import section} in the documentation of this resource for the id to use
* @param provider? Optional instance of the provider where the LocalProvider to import is found
*/
public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) {
@@ -49,7 +49,7 @@ export class LocalProvider extends cdktf.TerraformProvider {
// ===========
/**
- * Create a new {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs local} Resource
+ * Create a new {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs local} Resource
*
* @param scope The scope in which to define this construct
* @param id The scoped construct ID. Must be unique amongst siblings in the same scope
@@ -60,7 +60,7 @@ export class LocalProvider extends cdktf.TerraformProvider {
terraformResourceType: 'local',
terraformGeneratorMetadata: {
providerName: 'local',
- providerVersion: '2.5.1',
+ providerVersion: '2.5.2',
providerVersionConstraint: '~> 2.1'
},
terraformProviderSource: 'hashicorp/local'
diff --git a/src/sensitive-file/README.md b/src/sensitive-file/README.md
index c2e34e40..93622417 100644
--- a/src/sensitive-file/README.md
+++ b/src/sensitive-file/README.md
@@ -1,3 +1,3 @@
# `local_sensitive_file`
-Refer to the Terraform Registry for docs: [`local_sensitive_file`](https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file).
+Refer to the Terraform Registry for docs: [`local_sensitive_file`](https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file).
diff --git a/src/sensitive-file/index.ts b/src/sensitive-file/index.ts
index 328beaef..a666b736 100644
--- a/src/sensitive-file/index.ts
+++ b/src/sensitive-file/index.ts
@@ -3,7 +3,7 @@
* SPDX-License-Identifier: MPL-2.0
*/
-// https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file
+// https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file
// generated from terraform resource schema
import { Construct } from 'constructs';
@@ -17,7 +17,7 @@ export interface SensitiveFileConfig extends cdktf.TerraformMetaArguments {
* Conflicts with `content_base64` and `source`.
* Exactly one of these three arguments must be specified.
*
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content SensitiveFile#content}
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content SensitiveFile#content}
*/
readonly content?: string;
/**
@@ -25,7 +25,7 @@ export interface SensitiveFileConfig extends cdktf.TerraformMetaArguments {
* Conflicts with `content` and `source`.
* Exactly one of these three arguments must be specified.
*
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64}
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64}
*/
readonly contentBase64?: string;
/**
@@ -33,7 +33,7 @@ export interface SensitiveFileConfig extends cdktf.TerraformMetaArguments {
* [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation).
* Default value is `"0700"`.
*
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission}
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission}
*/
readonly directoryPermission?: string;
/**
@@ -41,7 +41,7 @@ export interface SensitiveFileConfig extends cdktf.TerraformMetaArguments {
* [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation).
* Default value is `"0700"`.
*
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission}
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission}
*/
readonly filePermission?: string;
/**
@@ -49,7 +49,7 @@ export interface SensitiveFileConfig extends cdktf.TerraformMetaArguments {
* Missing parent directories will be created.
* If the file already exists, it will be overridden with the given content.
*
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#filename SensitiveFile#filename}
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#filename SensitiveFile#filename}
*/
readonly filename: string;
/**
@@ -57,13 +57,13 @@ export interface SensitiveFileConfig extends cdktf.TerraformMetaArguments {
* Conflicts with `content` and `content_base64`.
* Exactly one of these three arguments must be specified.
*
- * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#source SensitiveFile#source}
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#source SensitiveFile#source}
*/
readonly source?: string;
}
/**
-* Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file local_sensitive_file}
+* Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file local_sensitive_file}
*/
export class SensitiveFile extends cdktf.TerraformResource {
@@ -79,7 +79,7 @@ export class SensitiveFile extends cdktf.TerraformResource {
* Generates CDKTF code for importing a SensitiveFile resource upon running "cdktf plan "
* @param scope The scope in which to define this construct
* @param importToId The construct id used in the generated config for the SensitiveFile to import
- * @param importFromId The id of the existing SensitiveFile that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#import import section} in the documentation of this resource for the id to use
+ * @param importFromId The id of the existing SensitiveFile that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#import import section} in the documentation of this resource for the id to use
* @param provider? Optional instance of the provider where the SensitiveFile to import is found
*/
public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) {
@@ -91,7 +91,7 @@ export class SensitiveFile extends cdktf.TerraformResource {
// ===========
/**
- * Create a new {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file local_sensitive_file} Resource
+ * Create a new {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file local_sensitive_file} Resource
*
* @param scope The scope in which to define this construct
* @param id The scoped construct ID. Must be unique amongst siblings in the same scope
@@ -102,7 +102,7 @@ export class SensitiveFile extends cdktf.TerraformResource {
terraformResourceType: 'local_sensitive_file',
terraformGeneratorMetadata: {
providerName: 'local',
- providerVersion: '2.5.1',
+ providerVersion: '2.5.2',
providerVersionConstraint: '~> 2.1'
},
provider: config.provider,
diff --git a/src/version.json b/src/version.json
index 9288dd97..a3e327a7 100644
--- a/src/version.json
+++ b/src/version.json
@@ -1,3 +1,3 @@
{
- "registry.terraform.io/hashicorp/local": "2.5.1"
+ "registry.terraform.io/hashicorp/local": "2.5.2"
}