From 584801a221293d604b1623ff5e61430cc92cc8b1 Mon Sep 17 00:00:00 2001 From: team-tf-cdk <84392119+team-tf-cdk@users.noreply.github.com> Date: Thu, 12 Sep 2024 06:05:58 +0200 Subject: [PATCH] fix: upgrade provider from `2.5.1` to version `2.5.2` (#1360) This PR upgrades the underlying Terraform provider to version 2.5.2 --------- Signed-off-by: team-tf-cdk --- README.md | 6 ++--- docs/dataLocalFile.csharp.md | 6 ++--- docs/dataLocalFile.go.md | 6 ++--- docs/dataLocalFile.java.md | 8 +++--- docs/dataLocalFile.python.md | 8 +++--- docs/dataLocalFile.typescript.md | 6 ++--- docs/dataLocalSensitiveFile.csharp.md | 6 ++--- docs/dataLocalSensitiveFile.go.md | 6 ++--- docs/dataLocalSensitiveFile.java.md | 8 +++--- docs/dataLocalSensitiveFile.python.md | 8 +++--- docs/dataLocalSensitiveFile.typescript.md | 6 ++--- docs/file.csharp.md | 18 ++++++------- docs/file.go.md | 18 ++++++------- docs/file.java.md | 32 +++++++++++------------ docs/file.python.md | 32 +++++++++++------------ docs/file.typescript.md | 18 ++++++------- docs/provider.csharp.md | 6 ++--- docs/provider.go.md | 6 ++--- docs/provider.java.md | 8 +++--- docs/provider.python.md | 8 +++--- docs/provider.typescript.md | 6 ++--- docs/sensitiveFile.csharp.md | 16 ++++++------ docs/sensitiveFile.go.md | 16 ++++++------ docs/sensitiveFile.java.md | 28 ++++++++++---------- docs/sensitiveFile.python.md | 28 ++++++++++---------- docs/sensitiveFile.typescript.md | 16 ++++++------ package.json | 2 +- src/data-local-file/README.md | 2 +- src/data-local-file/index.ts | 12 ++++----- src/data-local-sensitive-file/README.md | 2 +- src/data-local-sensitive-file/index.ts | 12 ++++----- src/file/README.md | 2 +- src/file/index.ts | 24 ++++++++--------- src/provider/README.md | 2 +- src/provider/index.ts | 12 ++++----- src/sensitive-file/README.md | 2 +- src/sensitive-file/index.ts | 22 ++++++++-------- src/version.json | 2 +- 38 files changed, 213 insertions(+), 213 deletions(-) diff --git a/README.md b/README.md index bf9f8754..873b5e73 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,7 @@ -# CDKTF prebuilt bindings for hashicorp/local provider version 2.5.1 +# CDKTF prebuilt bindings for hashicorp/local provider version 2.5.2 -This repo builds and publishes the [Terraform local provider](https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs) bindings for [CDK for Terraform](https://cdk.tf). +This repo builds and publishes the [Terraform local provider](https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs) bindings for [CDK for Terraform](https://cdk.tf). ## Available Packages @@ -63,7 +63,7 @@ This project is explicitly not tracking the Terraform local provider version 1:1 These are the upstream dependencies: - [CDK for Terraform](https://cdk.tf) -- [Terraform local provider](https://registry.terraform.io/providers/hashicorp/local/2.5.1) +- [Terraform local provider](https://registry.terraform.io/providers/hashicorp/local/2.5.2) - [Terraform Engine](https://terraform.io) If there are breaking changes (backward incompatible) in any of the above, the major version of this project will be bumped. diff --git a/docs/dataLocalFile.csharp.md b/docs/dataLocalFile.csharp.md index fdb75a13..98a371d2 100644 --- a/docs/dataLocalFile.csharp.md +++ b/docs/dataLocalFile.csharp.md @@ -4,7 +4,7 @@ ### DataLocalFile -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file local_file}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file local_file}. #### Initializers @@ -365,7 +365,7 @@ The construct id used in the generated config for the DataLocalFile to import. The id of the existing DataLocalFile that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#import import section} in the documentation of this resource for the id to use --- @@ -775,7 +775,7 @@ Path to the file that will be read. The data source will return an error if the file does not exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#filename DataLocalFile#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#filename DataLocalFile#filename} --- diff --git a/docs/dataLocalFile.go.md b/docs/dataLocalFile.go.md index 1dea1b63..6c628e2e 100644 --- a/docs/dataLocalFile.go.md +++ b/docs/dataLocalFile.go.md @@ -4,7 +4,7 @@ ### DataLocalFile -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file local_file}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file local_file}. #### Initializers @@ -365,7 +365,7 @@ The construct id used in the generated config for the DataLocalFile to import. The id of the existing DataLocalFile that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#import import section} in the documentation of this resource for the id to use --- @@ -775,7 +775,7 @@ Path to the file that will be read. The data source will return an error if the file does not exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#filename DataLocalFile#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#filename DataLocalFile#filename} --- diff --git a/docs/dataLocalFile.java.md b/docs/dataLocalFile.java.md index 9ed6cf84..3b175ded 100644 --- a/docs/dataLocalFile.java.md +++ b/docs/dataLocalFile.java.md @@ -4,7 +4,7 @@ ### DataLocalFile -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file local_file}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file local_file}. #### Initializers @@ -110,7 +110,7 @@ Path to the file that will be read. The data source will return an error if the file does not exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#filename DataLocalFile#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#filename DataLocalFile#filename} --- @@ -433,7 +433,7 @@ The construct id used in the generated config for the DataLocalFile to import. The id of the existing DataLocalFile that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#import import section} in the documentation of this resource for the id to use --- @@ -847,7 +847,7 @@ Path to the file that will be read. The data source will return an error if the file does not exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#filename DataLocalFile#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#filename DataLocalFile#filename} --- diff --git a/docs/dataLocalFile.python.md b/docs/dataLocalFile.python.md index fa973b74..cfb70466 100644 --- a/docs/dataLocalFile.python.md +++ b/docs/dataLocalFile.python.md @@ -4,7 +4,7 @@ ### DataLocalFile -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file local_file}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file local_file}. #### Initializers @@ -108,7 +108,7 @@ Path to the file that will be read. The data source will return an error if the file does not exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#filename DataLocalFile#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#filename DataLocalFile#filename} --- @@ -467,7 +467,7 @@ The construct id used in the generated config for the DataLocalFile to import. The id of the existing DataLocalFile that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#import import section} in the documentation of this resource for the id to use --- @@ -877,7 +877,7 @@ Path to the file that will be read. The data source will return an error if the file does not exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#filename DataLocalFile#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#filename DataLocalFile#filename} --- diff --git a/docs/dataLocalFile.typescript.md b/docs/dataLocalFile.typescript.md index 88c46b09..bedc1ec0 100644 --- a/docs/dataLocalFile.typescript.md +++ b/docs/dataLocalFile.typescript.md @@ -4,7 +4,7 @@ ### DataLocalFile -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file local_file}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file local_file}. #### Initializers @@ -365,7 +365,7 @@ The construct id used in the generated config for the DataLocalFile to import. The id of the existing DataLocalFile that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#import import section} in the documentation of this resource for the id to use --- @@ -766,7 +766,7 @@ Path to the file that will be read. The data source will return an error if the file does not exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#filename DataLocalFile#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#filename DataLocalFile#filename} --- diff --git a/docs/dataLocalSensitiveFile.csharp.md b/docs/dataLocalSensitiveFile.csharp.md index 9a6a14d7..e972d095 100644 --- a/docs/dataLocalSensitiveFile.csharp.md +++ b/docs/dataLocalSensitiveFile.csharp.md @@ -4,7 +4,7 @@ ### DataLocalSensitiveFile -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file local_sensitive_file}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file local_sensitive_file}. #### Initializers @@ -365,7 +365,7 @@ The construct id used in the generated config for the DataLocalSensitiveFile to The id of the existing DataLocalSensitiveFile that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#import import section} in the documentation of this resource for the id to use --- @@ -775,7 +775,7 @@ Path to the file that will be read. The data source will return an error if the file does not exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename} --- diff --git a/docs/dataLocalSensitiveFile.go.md b/docs/dataLocalSensitiveFile.go.md index f718c974..4307ba32 100644 --- a/docs/dataLocalSensitiveFile.go.md +++ b/docs/dataLocalSensitiveFile.go.md @@ -4,7 +4,7 @@ ### DataLocalSensitiveFile -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file local_sensitive_file}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file local_sensitive_file}. #### Initializers @@ -365,7 +365,7 @@ The construct id used in the generated config for the DataLocalSensitiveFile to The id of the existing DataLocalSensitiveFile that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#import import section} in the documentation of this resource for the id to use --- @@ -775,7 +775,7 @@ Path to the file that will be read. The data source will return an error if the file does not exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename} --- diff --git a/docs/dataLocalSensitiveFile.java.md b/docs/dataLocalSensitiveFile.java.md index 64b0e427..57a5f9cd 100644 --- a/docs/dataLocalSensitiveFile.java.md +++ b/docs/dataLocalSensitiveFile.java.md @@ -4,7 +4,7 @@ ### DataLocalSensitiveFile -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file local_sensitive_file}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file local_sensitive_file}. #### Initializers @@ -110,7 +110,7 @@ Path to the file that will be read. The data source will return an error if the file does not exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename} --- @@ -433,7 +433,7 @@ The construct id used in the generated config for the DataLocalSensitiveFile to The id of the existing DataLocalSensitiveFile that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#import import section} in the documentation of this resource for the id to use --- @@ -847,7 +847,7 @@ Path to the file that will be read. The data source will return an error if the file does not exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename} --- diff --git a/docs/dataLocalSensitiveFile.python.md b/docs/dataLocalSensitiveFile.python.md index efdbc51d..d4f1ea61 100644 --- a/docs/dataLocalSensitiveFile.python.md +++ b/docs/dataLocalSensitiveFile.python.md @@ -4,7 +4,7 @@ ### DataLocalSensitiveFile -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file local_sensitive_file}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file local_sensitive_file}. #### Initializers @@ -108,7 +108,7 @@ Path to the file that will be read. The data source will return an error if the file does not exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename} --- @@ -467,7 +467,7 @@ The construct id used in the generated config for the DataLocalSensitiveFile to The id of the existing DataLocalSensitiveFile that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#import import section} in the documentation of this resource for the id to use --- @@ -877,7 +877,7 @@ Path to the file that will be read. The data source will return an error if the file does not exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename} --- diff --git a/docs/dataLocalSensitiveFile.typescript.md b/docs/dataLocalSensitiveFile.typescript.md index 67591d45..076eefdc 100644 --- a/docs/dataLocalSensitiveFile.typescript.md +++ b/docs/dataLocalSensitiveFile.typescript.md @@ -4,7 +4,7 @@ ### DataLocalSensitiveFile -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file local_sensitive_file}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file local_sensitive_file}. #### Initializers @@ -365,7 +365,7 @@ The construct id used in the generated config for the DataLocalSensitiveFile to The id of the existing DataLocalSensitiveFile that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#import import section} in the documentation of this resource for the id to use --- @@ -766,7 +766,7 @@ Path to the file that will be read. The data source will return an error if the file does not exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename} --- diff --git a/docs/file.csharp.md b/docs/file.csharp.md index 02f7122a..d77aa58b 100644 --- a/docs/file.csharp.md +++ b/docs/file.csharp.md @@ -4,7 +4,7 @@ ### File -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file local_file}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file local_file}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the File to import. The id of the existing File that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#import import section} in the documentation of this resource for the id to use --- @@ -1064,7 +1064,7 @@ The path to the file that will be created. Missing parent directories will be created. If the file already exists, it will be overridden with the given content. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#filename File#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#filename File#filename} --- @@ -1081,7 +1081,7 @@ Content to store in the file, expected to be a UTF-8 encoded string. Conflicts with `sensitive_content`, `content_base64` and `source`. Exactly one of these four arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content File#content} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content File#content} --- @@ -1098,7 +1098,7 @@ Content to store in the file, expected to be binary encoded as base64 string. Conflicts with `content`, `sensitive_content` and `source`. Exactly one of these four arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content_base64 File#content_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content_base64 File#content_base64} --- @@ -1112,7 +1112,7 @@ public string DirectoryPermission { get; set; } Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#directory_permission File#directory_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#directory_permission File#directory_permission} --- @@ -1126,7 +1126,7 @@ public string FilePermission { get; set; } Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#file_permission File#file_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#file_permission File#file_permission} --- @@ -1146,7 +1146,7 @@ Exactly one of these four arguments must be specified. If in need to use *sensitive* content, please use the [`local_sensitive_file`](./sensitive_file.html) resource instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#sensitive_content File#sensitive_content} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#sensitive_content File#sensitive_content} --- @@ -1163,7 +1163,7 @@ Path to file to use as source for the one we are creating. Conflicts with `content`, `sensitive_content` and `content_base64`. Exactly one of these four arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#source File#source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#source File#source} --- diff --git a/docs/file.go.md b/docs/file.go.md index fa745066..5af00cc2 100644 --- a/docs/file.go.md +++ b/docs/file.go.md @@ -4,7 +4,7 @@ ### File -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file local_file}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file local_file}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the File to import. The id of the existing File that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#import import section} in the documentation of this resource for the id to use --- @@ -1064,7 +1064,7 @@ The path to the file that will be created. Missing parent directories will be created. If the file already exists, it will be overridden with the given content. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#filename File#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#filename File#filename} --- @@ -1081,7 +1081,7 @@ Content to store in the file, expected to be a UTF-8 encoded string. Conflicts with `sensitive_content`, `content_base64` and `source`. Exactly one of these four arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content File#content} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content File#content} --- @@ -1098,7 +1098,7 @@ Content to store in the file, expected to be binary encoded as base64 string. Conflicts with `content`, `sensitive_content` and `source`. Exactly one of these four arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content_base64 File#content_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content_base64 File#content_base64} --- @@ -1112,7 +1112,7 @@ DirectoryPermission *string Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#directory_permission File#directory_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#directory_permission File#directory_permission} --- @@ -1126,7 +1126,7 @@ FilePermission *string Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#file_permission File#file_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#file_permission File#file_permission} --- @@ -1146,7 +1146,7 @@ Exactly one of these four arguments must be specified. If in need to use *sensitive* content, please use the [`local_sensitive_file`](./sensitive_file.html) resource instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#sensitive_content File#sensitive_content} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#sensitive_content File#sensitive_content} --- @@ -1163,7 +1163,7 @@ Path to file to use as source for the one we are creating. Conflicts with `content`, `sensitive_content` and `content_base64`. Exactly one of these four arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#source File#source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#source File#source} --- diff --git a/docs/file.java.md b/docs/file.java.md index f44c6767..11b5070c 100644 --- a/docs/file.java.md +++ b/docs/file.java.md @@ -4,7 +4,7 @@ ### File -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file local_file}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file local_file}. #### Initializers @@ -123,7 +123,7 @@ The path to the file that will be created. Missing parent directories will be created. If the file already exists, it will be overridden with the given content. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#filename File#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#filename File#filename} --- @@ -136,7 +136,7 @@ Content to store in the file, expected to be a UTF-8 encoded string. Conflicts with `sensitive_content`, `content_base64` and `source`. Exactly one of these four arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content File#content} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content File#content} --- @@ -149,7 +149,7 @@ Content to store in the file, expected to be binary encoded as base64 string. Conflicts with `content`, `sensitive_content` and `source`. Exactly one of these four arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content_base64 File#content_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content_base64 File#content_base64} --- @@ -159,7 +159,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#directory_permission File#directory_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#directory_permission File#directory_permission} --- @@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#file_permission File#file_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#file_permission File#file_permission} --- @@ -185,7 +185,7 @@ Exactly one of these four arguments must be specified. If in need to use *sensitive* content, please use the [`local_sensitive_file`](./sensitive_file.html) resource instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#sensitive_content File#sensitive_content} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#sensitive_content File#sensitive_content} --- @@ -198,7 +198,7 @@ Path to file to use as source for the one we are creating. Conflicts with `content`, `sensitive_content` and `content_base64`. Exactly one of these four arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#source File#source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#source File#source} --- @@ -667,7 +667,7 @@ The construct id used in the generated config for the File to import. The id of the existing File that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#import import section} in the documentation of this resource for the id to use --- @@ -1226,7 +1226,7 @@ The path to the file that will be created. Missing parent directories will be created. If the file already exists, it will be overridden with the given content. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#filename File#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#filename File#filename} --- @@ -1243,7 +1243,7 @@ Content to store in the file, expected to be a UTF-8 encoded string. Conflicts with `sensitive_content`, `content_base64` and `source`. Exactly one of these four arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content File#content} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content File#content} --- @@ -1260,7 +1260,7 @@ Content to store in the file, expected to be binary encoded as base64 string. Conflicts with `content`, `sensitive_content` and `source`. Exactly one of these four arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content_base64 File#content_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content_base64 File#content_base64} --- @@ -1274,7 +1274,7 @@ public java.lang.String getDirectoryPermission(); Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#directory_permission File#directory_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#directory_permission File#directory_permission} --- @@ -1288,7 +1288,7 @@ public java.lang.String getFilePermission(); Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#file_permission File#file_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#file_permission File#file_permission} --- @@ -1308,7 +1308,7 @@ Exactly one of these four arguments must be specified. If in need to use *sensitive* content, please use the [`local_sensitive_file`](./sensitive_file.html) resource instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#sensitive_content File#sensitive_content} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#sensitive_content File#sensitive_content} --- @@ -1325,7 +1325,7 @@ Path to file to use as source for the one we are creating. Conflicts with `content`, `sensitive_content` and `content_base64`. Exactly one of these four arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#source File#source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#source File#source} --- diff --git a/docs/file.python.md b/docs/file.python.md index 23b9fcf6..d727d879 100644 --- a/docs/file.python.md +++ b/docs/file.python.md @@ -4,7 +4,7 @@ ### File -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file local_file}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file local_file}. #### Initializers @@ -121,7 +121,7 @@ The path to the file that will be created. Missing parent directories will be created. If the file already exists, it will be overridden with the given content. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#filename File#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#filename File#filename} --- @@ -134,7 +134,7 @@ Content to store in the file, expected to be a UTF-8 encoded string. Conflicts with `sensitive_content`, `content_base64` and `source`. Exactly one of these four arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content File#content} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content File#content} --- @@ -147,7 +147,7 @@ Content to store in the file, expected to be binary encoded as base64 string. Conflicts with `content`, `sensitive_content` and `source`. Exactly one of these four arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content_base64 File#content_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content_base64 File#content_base64} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#directory_permission File#directory_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#directory_permission File#directory_permission} --- @@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#file_permission File#file_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#file_permission File#file_permission} --- @@ -183,7 +183,7 @@ Exactly one of these four arguments must be specified. If in need to use *sensitive* content, please use the [`local_sensitive_file`](./sensitive_file.html) resource instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#sensitive_content File#sensitive_content} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#sensitive_content File#sensitive_content} --- @@ -196,7 +196,7 @@ Path to file to use as source for the one we are creating. Conflicts with `content`, `sensitive_content` and `content_base64`. Exactly one of these four arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#source File#source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#source File#source} --- @@ -711,7 +711,7 @@ The construct id used in the generated config for the File to import. The id of the existing File that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#import import section} in the documentation of this resource for the id to use --- @@ -1266,7 +1266,7 @@ The path to the file that will be created. Missing parent directories will be created. If the file already exists, it will be overridden with the given content. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#filename File#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#filename File#filename} --- @@ -1283,7 +1283,7 @@ Content to store in the file, expected to be a UTF-8 encoded string. Conflicts with `sensitive_content`, `content_base64` and `source`. Exactly one of these four arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content File#content} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content File#content} --- @@ -1300,7 +1300,7 @@ Content to store in the file, expected to be binary encoded as base64 string. Conflicts with `content`, `sensitive_content` and `source`. Exactly one of these four arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content_base64 File#content_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content_base64 File#content_base64} --- @@ -1314,7 +1314,7 @@ directory_permission: str Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#directory_permission File#directory_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#directory_permission File#directory_permission} --- @@ -1328,7 +1328,7 @@ file_permission: str Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#file_permission File#file_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#file_permission File#file_permission} --- @@ -1348,7 +1348,7 @@ Exactly one of these four arguments must be specified. If in need to use *sensitive* content, please use the [`local_sensitive_file`](./sensitive_file.html) resource instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#sensitive_content File#sensitive_content} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#sensitive_content File#sensitive_content} --- @@ -1365,7 +1365,7 @@ Path to file to use as source for the one we are creating. Conflicts with `content`, `sensitive_content` and `content_base64`. Exactly one of these four arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#source File#source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#source File#source} --- diff --git a/docs/file.typescript.md b/docs/file.typescript.md index ea7f0a3d..4e5534b5 100644 --- a/docs/file.typescript.md +++ b/docs/file.typescript.md @@ -4,7 +4,7 @@ ### File -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file local_file}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file local_file}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the File to import. The id of the existing File that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#import import section} in the documentation of this resource for the id to use --- @@ -1049,7 +1049,7 @@ The path to the file that will be created. Missing parent directories will be created. If the file already exists, it will be overridden with the given content. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#filename File#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#filename File#filename} --- @@ -1066,7 +1066,7 @@ Content to store in the file, expected to be a UTF-8 encoded string. Conflicts with `sensitive_content`, `content_base64` and `source`. Exactly one of these four arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content File#content} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content File#content} --- @@ -1083,7 +1083,7 @@ Content to store in the file, expected to be binary encoded as base64 string. Conflicts with `content`, `sensitive_content` and `source`. Exactly one of these four arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content_base64 File#content_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content_base64 File#content_base64} --- @@ -1097,7 +1097,7 @@ public readonly directoryPermission: string; Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#directory_permission File#directory_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#directory_permission File#directory_permission} --- @@ -1111,7 +1111,7 @@ public readonly filePermission: string; Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0777"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#file_permission File#file_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#file_permission File#file_permission} --- @@ -1131,7 +1131,7 @@ Will not be displayed in diffs. If in need to use _sensitive_ content, please use the [`local_sensitive_file`](./sensitive_file.html) resource instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#sensitive_content File#sensitive_content} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#sensitive_content File#sensitive_content} --- @@ -1148,7 +1148,7 @@ Path to file to use as source for the one we are creating. Conflicts with `content`, `sensitive_content` and `content_base64`. Exactly one of these four arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#source File#source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#source File#source} --- diff --git a/docs/provider.csharp.md b/docs/provider.csharp.md index bef2a282..d5b81c25 100644 --- a/docs/provider.csharp.md +++ b/docs/provider.csharp.md @@ -4,7 +4,7 @@ ### LocalProvider -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs local}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs local}. #### Initializers @@ -240,7 +240,7 @@ The construct id used in the generated config for the LocalProvider to import. The id of the existing LocalProvider that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#import import section} in the documentation of this resource for the id to use --- @@ -421,7 +421,7 @@ public string Alias { get; set; } Alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#alias LocalProvider#alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#alias LocalProvider#alias} --- diff --git a/docs/provider.go.md b/docs/provider.go.md index aee56c00..711d3e5f 100644 --- a/docs/provider.go.md +++ b/docs/provider.go.md @@ -4,7 +4,7 @@ ### LocalProvider -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs local}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs local}. #### Initializers @@ -240,7 +240,7 @@ The construct id used in the generated config for the LocalProvider to import. The id of the existing LocalProvider that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#import import section} in the documentation of this resource for the id to use --- @@ -421,7 +421,7 @@ Alias *string Alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#alias LocalProvider#alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#alias LocalProvider#alias} --- diff --git a/docs/provider.java.md b/docs/provider.java.md index 428b65dd..604ae1e0 100644 --- a/docs/provider.java.md +++ b/docs/provider.java.md @@ -4,7 +4,7 @@ ### LocalProvider -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs local}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs local}. #### Initializers @@ -48,7 +48,7 @@ Must be unique amongst siblings in the same scope Alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#alias LocalProvider#alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#alias LocalProvider#alias} --- @@ -246,7 +246,7 @@ The construct id used in the generated config for the LocalProvider to import. The id of the existing LocalProvider that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#import import section} in the documentation of this resource for the id to use --- @@ -427,7 +427,7 @@ public java.lang.String getAlias(); Alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#alias LocalProvider#alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#alias LocalProvider#alias} --- diff --git a/docs/provider.python.md b/docs/provider.python.md index efbab1e2..b596c09b 100644 --- a/docs/provider.python.md +++ b/docs/provider.python.md @@ -4,7 +4,7 @@ ### LocalProvider -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs local}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs local}. #### Initializers @@ -50,7 +50,7 @@ Must be unique amongst siblings in the same scope Alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#alias LocalProvider#alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#alias LocalProvider#alias} --- @@ -264,7 +264,7 @@ The construct id used in the generated config for the LocalProvider to import. The id of the existing LocalProvider that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#import import section} in the documentation of this resource for the id to use --- @@ -445,7 +445,7 @@ alias: str Alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#alias LocalProvider#alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#alias LocalProvider#alias} --- diff --git a/docs/provider.typescript.md b/docs/provider.typescript.md index 7d6c95f4..9861a9fd 100644 --- a/docs/provider.typescript.md +++ b/docs/provider.typescript.md @@ -4,7 +4,7 @@ ### LocalProvider -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs local}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs local}. #### Initializers @@ -240,7 +240,7 @@ The construct id used in the generated config for the LocalProvider to import. The id of the existing LocalProvider that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#import import section} in the documentation of this resource for the id to use --- @@ -419,7 +419,7 @@ public readonly alias: string; Alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#alias LocalProvider#alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#alias LocalProvider#alias} --- diff --git a/docs/sensitiveFile.csharp.md b/docs/sensitiveFile.csharp.md index 24087700..8b64f12a 100644 --- a/docs/sensitiveFile.csharp.md +++ b/docs/sensitiveFile.csharp.md @@ -4,7 +4,7 @@ ### SensitiveFile -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file local_sensitive_file}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file local_sensitive_file}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the SensitiveFile to import. The id of the existing SensitiveFile that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#import import section} in the documentation of this resource for the id to use --- @@ -1033,7 +1033,7 @@ The path to the file that will be created. Missing parent directories will be created. If the file already exists, it will be overridden with the given content. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#filename SensitiveFile#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#filename SensitiveFile#filename} --- @@ -1050,7 +1050,7 @@ Sensitive Content to store in the file, expected to be a UTF-8 encoded string. Conflicts with `content_base64` and `source`. Exactly one of these three arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content SensitiveFile#content} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content SensitiveFile#content} --- @@ -1067,7 +1067,7 @@ Sensitive Content to store in the file, expected to be binary encoded as base64 Conflicts with `content` and `source`. Exactly one of these three arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64} --- @@ -1081,7 +1081,7 @@ public string DirectoryPermission { get; set; } Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission} --- @@ -1095,7 +1095,7 @@ public string FilePermission { get; set; } Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission} --- @@ -1112,7 +1112,7 @@ Path to file to use as source for the one we are creating. Conflicts with `content` and `content_base64`. Exactly one of these three arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#source SensitiveFile#source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#source SensitiveFile#source} --- diff --git a/docs/sensitiveFile.go.md b/docs/sensitiveFile.go.md index a033430c..d4954651 100644 --- a/docs/sensitiveFile.go.md +++ b/docs/sensitiveFile.go.md @@ -4,7 +4,7 @@ ### SensitiveFile -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file local_sensitive_file}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file local_sensitive_file}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the SensitiveFile to import. The id of the existing SensitiveFile that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#import import section} in the documentation of this resource for the id to use --- @@ -1033,7 +1033,7 @@ The path to the file that will be created. Missing parent directories will be created. If the file already exists, it will be overridden with the given content. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#filename SensitiveFile#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#filename SensitiveFile#filename} --- @@ -1050,7 +1050,7 @@ Sensitive Content to store in the file, expected to be a UTF-8 encoded string. Conflicts with `content_base64` and `source`. Exactly one of these three arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content SensitiveFile#content} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content SensitiveFile#content} --- @@ -1067,7 +1067,7 @@ Sensitive Content to store in the file, expected to be binary encoded as base64 Conflicts with `content` and `source`. Exactly one of these three arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64} --- @@ -1081,7 +1081,7 @@ DirectoryPermission *string Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission} --- @@ -1095,7 +1095,7 @@ FilePermission *string Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission} --- @@ -1112,7 +1112,7 @@ Path to file to use as source for the one we are creating. Conflicts with `content` and `content_base64`. Exactly one of these three arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#source SensitiveFile#source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#source SensitiveFile#source} --- diff --git a/docs/sensitiveFile.java.md b/docs/sensitiveFile.java.md index 6c589899..395bd8ef 100644 --- a/docs/sensitiveFile.java.md +++ b/docs/sensitiveFile.java.md @@ -4,7 +4,7 @@ ### SensitiveFile -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file local_sensitive_file}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file local_sensitive_file}. #### Initializers @@ -121,7 +121,7 @@ The path to the file that will be created. Missing parent directories will be created. If the file already exists, it will be overridden with the given content. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#filename SensitiveFile#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#filename SensitiveFile#filename} --- @@ -134,7 +134,7 @@ Sensitive Content to store in the file, expected to be a UTF-8 encoded string. Conflicts with `content_base64` and `source`. Exactly one of these three arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content SensitiveFile#content} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content SensitiveFile#content} --- @@ -147,7 +147,7 @@ Sensitive Content to store in the file, expected to be binary encoded as base64 Conflicts with `content` and `source`. Exactly one of these three arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission} --- @@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission} --- @@ -180,7 +180,7 @@ Path to file to use as source for the one we are creating. Conflicts with `content` and `content_base64`. Exactly one of these three arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#source SensitiveFile#source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#source SensitiveFile#source} --- @@ -642,7 +642,7 @@ The construct id used in the generated config for the SensitiveFile to import. The id of the existing SensitiveFile that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#import import section} in the documentation of this resource for the id to use --- @@ -1177,7 +1177,7 @@ The path to the file that will be created. Missing parent directories will be created. If the file already exists, it will be overridden with the given content. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#filename SensitiveFile#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#filename SensitiveFile#filename} --- @@ -1194,7 +1194,7 @@ Sensitive Content to store in the file, expected to be a UTF-8 encoded string. Conflicts with `content_base64` and `source`. Exactly one of these three arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content SensitiveFile#content} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content SensitiveFile#content} --- @@ -1211,7 +1211,7 @@ Sensitive Content to store in the file, expected to be binary encoded as base64 Conflicts with `content` and `source`. Exactly one of these three arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64} --- @@ -1225,7 +1225,7 @@ public java.lang.String getDirectoryPermission(); Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission} --- @@ -1239,7 +1239,7 @@ public java.lang.String getFilePermission(); Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission} --- @@ -1256,7 +1256,7 @@ Path to file to use as source for the one we are creating. Conflicts with `content` and `content_base64`. Exactly one of these three arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#source SensitiveFile#source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#source SensitiveFile#source} --- diff --git a/docs/sensitiveFile.python.md b/docs/sensitiveFile.python.md index ddc93263..e1d6e84e 100644 --- a/docs/sensitiveFile.python.md +++ b/docs/sensitiveFile.python.md @@ -4,7 +4,7 @@ ### SensitiveFile -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file local_sensitive_file}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file local_sensitive_file}. #### Initializers @@ -119,7 +119,7 @@ The path to the file that will be created. Missing parent directories will be created. If the file already exists, it will be overridden with the given content. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#filename SensitiveFile#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#filename SensitiveFile#filename} --- @@ -132,7 +132,7 @@ Sensitive Content to store in the file, expected to be a UTF-8 encoded string. Conflicts with `content_base64` and `source`. Exactly one of these three arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content SensitiveFile#content} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content SensitiveFile#content} --- @@ -145,7 +145,7 @@ Sensitive Content to store in the file, expected to be binary encoded as base64 Conflicts with `content` and `source`. Exactly one of these three arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission} --- @@ -165,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission} --- @@ -178,7 +178,7 @@ Path to file to use as source for the one we are creating. Conflicts with `content` and `content_base64`. Exactly one of these three arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#source SensitiveFile#source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#source SensitiveFile#source} --- @@ -686,7 +686,7 @@ The construct id used in the generated config for the SensitiveFile to import. The id of the existing SensitiveFile that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#import import section} in the documentation of this resource for the id to use --- @@ -1217,7 +1217,7 @@ The path to the file that will be created. Missing parent directories will be created. If the file already exists, it will be overridden with the given content. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#filename SensitiveFile#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#filename SensitiveFile#filename} --- @@ -1234,7 +1234,7 @@ Sensitive Content to store in the file, expected to be a UTF-8 encoded string. Conflicts with `content_base64` and `source`. Exactly one of these three arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content SensitiveFile#content} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content SensitiveFile#content} --- @@ -1251,7 +1251,7 @@ Sensitive Content to store in the file, expected to be binary encoded as base64 Conflicts with `content` and `source`. Exactly one of these three arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64} --- @@ -1265,7 +1265,7 @@ directory_permission: str Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission} --- @@ -1279,7 +1279,7 @@ file_permission: str Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission} --- @@ -1296,7 +1296,7 @@ Path to file to use as source for the one we are creating. Conflicts with `content` and `content_base64`. Exactly one of these three arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#source SensitiveFile#source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#source SensitiveFile#source} --- diff --git a/docs/sensitiveFile.typescript.md b/docs/sensitiveFile.typescript.md index ba96c174..3425517a 100644 --- a/docs/sensitiveFile.typescript.md +++ b/docs/sensitiveFile.typescript.md @@ -4,7 +4,7 @@ ### SensitiveFile -Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file local_sensitive_file}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file local_sensitive_file}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the SensitiveFile to import. The id of the existing SensitiveFile that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#import import section} in the documentation of this resource for the id to use --- @@ -1019,7 +1019,7 @@ The path to the file that will be created. Missing parent directories will be created. If the file already exists, it will be overridden with the given content. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#filename SensitiveFile#filename} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#filename SensitiveFile#filename} --- @@ -1036,7 +1036,7 @@ Sensitive Content to store in the file, expected to be a UTF-8 encoded string. Conflicts with `content_base64` and `source`. Exactly one of these three arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content SensitiveFile#content} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content SensitiveFile#content} --- @@ -1053,7 +1053,7 @@ Sensitive Content to store in the file, expected to be binary encoded as base64 Conflicts with `content` and `source`. Exactly one of these three arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64} --- @@ -1067,7 +1067,7 @@ public readonly directoryPermission: string; Permissions to set for directories created (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission} --- @@ -1081,7 +1081,7 @@ public readonly filePermission: string; Permissions to set for the output file (before umask), expressed as string in [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). Default value is `"0700"`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission} --- @@ -1098,7 +1098,7 @@ Path to file to use as source for the one we are creating. Conflicts with `content` and `content_base64`. Exactly one of these three arguments must be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#source SensitiveFile#source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#source SensitiveFile#source} --- diff --git a/package.json b/package.json index 5eedbad4..53c98348 100644 --- a/package.json +++ b/package.json @@ -157,7 +157,7 @@ "isDeprecated": false, "provider": { "name": "registry.terraform.io/hashicorp/local", - "version": "2.5.1" + "version": "2.5.2" } }, "//": "~~ Generated by projen. To modify, edit .projenrc.js and run \"npx projen\"." diff --git a/src/data-local-file/README.md b/src/data-local-file/README.md index e797443e..87602638 100644 --- a/src/data-local-file/README.md +++ b/src/data-local-file/README.md @@ -1,3 +1,3 @@ # `data_local_file` -Refer to the Terraform Registry for docs: [`data_local_file`](https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file). +Refer to the Terraform Registry for docs: [`data_local_file`](https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file). diff --git a/src/data-local-file/index.ts b/src/data-local-file/index.ts index 3c5bda59..29957613 100644 --- a/src/data-local-file/index.ts +++ b/src/data-local-file/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file +// https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,13 +15,13 @@ export interface DataLocalFileConfig extends cdktf.TerraformMetaArguments { /** * Path to the file that will be read. The data source will return an error if the file does not exist. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#filename DataLocalFile#filename} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#filename DataLocalFile#filename} */ readonly filename: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file local_file} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file local_file} */ export class DataLocalFile extends cdktf.TerraformDataSource { @@ -37,7 +37,7 @@ export class DataLocalFile extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataLocalFile resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataLocalFile to import - * @param importFromId The id of the existing DataLocalFile that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataLocalFile that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataLocalFile to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -49,7 +49,7 @@ export class DataLocalFile extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/file local_file} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/file local_file} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -60,7 +60,7 @@ export class DataLocalFile extends cdktf.TerraformDataSource { terraformResourceType: 'local_file', terraformGeneratorMetadata: { providerName: 'local', - providerVersion: '2.5.1', + providerVersion: '2.5.2', providerVersionConstraint: '~> 2.1' }, provider: config.provider, diff --git a/src/data-local-sensitive-file/README.md b/src/data-local-sensitive-file/README.md index 9a12b27e..32294a25 100644 --- a/src/data-local-sensitive-file/README.md +++ b/src/data-local-sensitive-file/README.md @@ -1,3 +1,3 @@ # `data_local_sensitive_file` -Refer to the Terraform Registry for docs: [`data_local_sensitive_file`](https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file). +Refer to the Terraform Registry for docs: [`data_local_sensitive_file`](https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file). diff --git a/src/data-local-sensitive-file/index.ts b/src/data-local-sensitive-file/index.ts index 71279931..d13357a0 100644 --- a/src/data-local-sensitive-file/index.ts +++ b/src/data-local-sensitive-file/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file +// https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,13 +15,13 @@ export interface DataLocalSensitiveFileConfig extends cdktf.TerraformMetaArgumen /** * Path to the file that will be read. The data source will return an error if the file does not exist. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#filename DataLocalSensitiveFile#filename} */ readonly filename: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file local_sensitive_file} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file local_sensitive_file} */ export class DataLocalSensitiveFile extends cdktf.TerraformDataSource { @@ -37,7 +37,7 @@ export class DataLocalSensitiveFile extends cdktf.TerraformDataSource { * Generates CDKTF code for importing a DataLocalSensitiveFile resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the DataLocalSensitiveFile to import - * @param importFromId The id of the existing DataLocalSensitiveFile that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing DataLocalSensitiveFile that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the DataLocalSensitiveFile to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -49,7 +49,7 @@ export class DataLocalSensitiveFile extends cdktf.TerraformDataSource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/data-sources/sensitive_file local_sensitive_file} Data Source + * Create a new {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/data-sources/sensitive_file local_sensitive_file} Data Source * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -60,7 +60,7 @@ export class DataLocalSensitiveFile extends cdktf.TerraformDataSource { terraformResourceType: 'local_sensitive_file', terraformGeneratorMetadata: { providerName: 'local', - providerVersion: '2.5.1', + providerVersion: '2.5.2', providerVersionConstraint: '~> 2.1' }, provider: config.provider, diff --git a/src/file/README.md b/src/file/README.md index cc74cebc..08e9c995 100644 --- a/src/file/README.md +++ b/src/file/README.md @@ -1,3 +1,3 @@ # `local_file` -Refer to the Terraform Registry for docs: [`local_file`](https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file). +Refer to the Terraform Registry for docs: [`local_file`](https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file). diff --git a/src/file/index.ts b/src/file/index.ts index bd9f5b93..5f457a06 100644 --- a/src/file/index.ts +++ b/src/file/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file +// https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file // generated from terraform resource schema import { Construct } from 'constructs'; @@ -17,7 +17,7 @@ export interface FileConfig extends cdktf.TerraformMetaArguments { * Conflicts with `sensitive_content`, `content_base64` and `source`. * Exactly one of these four arguments must be specified. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content File#content} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content File#content} */ readonly content?: string; /** @@ -25,7 +25,7 @@ export interface FileConfig extends cdktf.TerraformMetaArguments { * Conflicts with `content`, `sensitive_content` and `source`. * Exactly one of these four arguments must be specified. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#content_base64 File#content_base64} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#content_base64 File#content_base64} */ readonly contentBase64?: string; /** @@ -33,7 +33,7 @@ export interface FileConfig extends cdktf.TerraformMetaArguments { * [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). * Default value is `"0777"`. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#directory_permission File#directory_permission} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#directory_permission File#directory_permission} */ readonly directoryPermission?: string; /** @@ -41,7 +41,7 @@ export interface FileConfig extends cdktf.TerraformMetaArguments { * [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). * Default value is `"0777"`. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#file_permission File#file_permission} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#file_permission File#file_permission} */ readonly filePermission?: string; /** @@ -49,7 +49,7 @@ export interface FileConfig extends cdktf.TerraformMetaArguments { * Missing parent directories will be created. * If the file already exists, it will be overridden with the given content. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#filename File#filename} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#filename File#filename} */ readonly filename: string; /** @@ -60,7 +60,7 @@ export interface FileConfig extends cdktf.TerraformMetaArguments { * If in need to use _sensitive_ content, please use the [`local_sensitive_file`](./sensitive_file.html) * resource instead. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#sensitive_content File#sensitive_content} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#sensitive_content File#sensitive_content} */ readonly sensitiveContent?: string; /** @@ -68,13 +68,13 @@ export interface FileConfig extends cdktf.TerraformMetaArguments { * Conflicts with `content`, `sensitive_content` and `content_base64`. * Exactly one of these four arguments must be specified. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#source File#source} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#source File#source} */ readonly source?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file local_file} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file local_file} */ export class File extends cdktf.TerraformResource { @@ -90,7 +90,7 @@ export class File extends cdktf.TerraformResource { * Generates CDKTF code for importing a File resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the File to import - * @param importFromId The id of the existing File that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing File that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the File to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -102,7 +102,7 @@ export class File extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/file local_file} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/file local_file} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -113,7 +113,7 @@ export class File extends cdktf.TerraformResource { terraformResourceType: 'local_file', terraformGeneratorMetadata: { providerName: 'local', - providerVersion: '2.5.1', + providerVersion: '2.5.2', providerVersionConstraint: '~> 2.1' }, provider: config.provider, diff --git a/src/provider/README.md b/src/provider/README.md index a0742ff7..93189593 100644 --- a/src/provider/README.md +++ b/src/provider/README.md @@ -1,3 +1,3 @@ # `provider` -Refer to the Terraform Registry for docs: [`local`](https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs). +Refer to the Terraform Registry for docs: [`local`](https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs). diff --git a/src/provider/index.ts b/src/provider/index.ts index 7a791977..79de32e6 100644 --- a/src/provider/index.ts +++ b/src/provider/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs +// https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs // generated from terraform resource schema import { Construct } from 'constructs'; @@ -15,13 +15,13 @@ export interface LocalProviderConfig { /** * Alias name * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#alias LocalProvider#alias} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#alias LocalProvider#alias} */ readonly alias?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs local} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs local} */ export class LocalProvider extends cdktf.TerraformProvider { @@ -37,7 +37,7 @@ export class LocalProvider extends cdktf.TerraformProvider { * Generates CDKTF code for importing a LocalProvider resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the LocalProvider to import - * @param importFromId The id of the existing LocalProvider that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing LocalProvider that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the LocalProvider to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -49,7 +49,7 @@ export class LocalProvider extends cdktf.TerraformProvider { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs local} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs local} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -60,7 +60,7 @@ export class LocalProvider extends cdktf.TerraformProvider { terraformResourceType: 'local', terraformGeneratorMetadata: { providerName: 'local', - providerVersion: '2.5.1', + providerVersion: '2.5.2', providerVersionConstraint: '~> 2.1' }, terraformProviderSource: 'hashicorp/local' diff --git a/src/sensitive-file/README.md b/src/sensitive-file/README.md index c2e34e40..93622417 100644 --- a/src/sensitive-file/README.md +++ b/src/sensitive-file/README.md @@ -1,3 +1,3 @@ # `local_sensitive_file` -Refer to the Terraform Registry for docs: [`local_sensitive_file`](https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file). +Refer to the Terraform Registry for docs: [`local_sensitive_file`](https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file). diff --git a/src/sensitive-file/index.ts b/src/sensitive-file/index.ts index 328beaef..a666b736 100644 --- a/src/sensitive-file/index.ts +++ b/src/sensitive-file/index.ts @@ -3,7 +3,7 @@ * SPDX-License-Identifier: MPL-2.0 */ -// https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file +// https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file // generated from terraform resource schema import { Construct } from 'constructs'; @@ -17,7 +17,7 @@ export interface SensitiveFileConfig extends cdktf.TerraformMetaArguments { * Conflicts with `content_base64` and `source`. * Exactly one of these three arguments must be specified. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content SensitiveFile#content} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content SensitiveFile#content} */ readonly content?: string; /** @@ -25,7 +25,7 @@ export interface SensitiveFileConfig extends cdktf.TerraformMetaArguments { * Conflicts with `content` and `source`. * Exactly one of these three arguments must be specified. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#content_base64 SensitiveFile#content_base64} */ readonly contentBase64?: string; /** @@ -33,7 +33,7 @@ export interface SensitiveFileConfig extends cdktf.TerraformMetaArguments { * [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). * Default value is `"0700"`. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#directory_permission SensitiveFile#directory_permission} */ readonly directoryPermission?: string; /** @@ -41,7 +41,7 @@ export interface SensitiveFileConfig extends cdktf.TerraformMetaArguments { * [numeric notation](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation). * Default value is `"0700"`. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#file_permission SensitiveFile#file_permission} */ readonly filePermission?: string; /** @@ -49,7 +49,7 @@ export interface SensitiveFileConfig extends cdktf.TerraformMetaArguments { * Missing parent directories will be created. * If the file already exists, it will be overridden with the given content. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#filename SensitiveFile#filename} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#filename SensitiveFile#filename} */ readonly filename: string; /** @@ -57,13 +57,13 @@ export interface SensitiveFileConfig extends cdktf.TerraformMetaArguments { * Conflicts with `content` and `content_base64`. * Exactly one of these three arguments must be specified. * - * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#source SensitiveFile#source} + * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#source SensitiveFile#source} */ readonly source?: string; } /** -* Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file local_sensitive_file} +* Represents a {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file local_sensitive_file} */ export class SensitiveFile extends cdktf.TerraformResource { @@ -79,7 +79,7 @@ export class SensitiveFile extends cdktf.TerraformResource { * Generates CDKTF code for importing a SensitiveFile resource upon running "cdktf plan " * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the SensitiveFile to import - * @param importFromId The id of the existing SensitiveFile that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file#import import section} in the documentation of this resource for the id to use + * @param importFromId The id of the existing SensitiveFile that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the SensitiveFile to import is found */ public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) { @@ -91,7 +91,7 @@ export class SensitiveFile extends cdktf.TerraformResource { // =========== /** - * Create a new {@link https://registry.terraform.io/providers/hashicorp/local/2.5.1/docs/resources/sensitive_file local_sensitive_file} Resource + * Create a new {@link https://registry.terraform.io/providers/hashicorp/local/2.5.2/docs/resources/sensitive_file local_sensitive_file} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope @@ -102,7 +102,7 @@ export class SensitiveFile extends cdktf.TerraformResource { terraformResourceType: 'local_sensitive_file', terraformGeneratorMetadata: { providerName: 'local', - providerVersion: '2.5.1', + providerVersion: '2.5.2', providerVersionConstraint: '~> 2.1' }, provider: config.provider, diff --git a/src/version.json b/src/version.json index 9288dd97..a3e327a7 100644 --- a/src/version.json +++ b/src/version.json @@ -1,3 +1,3 @@ { - "registry.terraform.io/hashicorp/local": "2.5.1" + "registry.terraform.io/hashicorp/local": "2.5.2" }