@cdktn/provider-schema 0.22.0-pre.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,864 @@
1
+ // Jest Snapshot v1, https://goo.gl/fbAQLP
2
+
3
+ exports[`readSchema generates a local json module 1`] = `
4
+ "{
5
+ "format_version": "STUBBED VERSION",
6
+ "local_module": {
7
+ "inputs": [
8
+ {
9
+ "default": "module",
10
+ "description": "Name of the DigitalOcean static site",
11
+ "name": "name",
12
+ "required": false,
13
+ "type": "any"
14
+ },
15
+ {
16
+ "default": "ams",
17
+ "description": "Region to deploy the app to",
18
+ "name": "region",
19
+ "required": false,
20
+ "type": "any"
21
+ }
22
+ ],
23
+ "name": "local_module",
24
+ "outputs": [
25
+ {
26
+ "name": "uri"
27
+ }
28
+ ]
29
+ }
30
+ }"
31
+ `;
32
+
33
+ exports[`readSchema generates a local module 1`] = `
34
+ "{
35
+ "format_version": "STUBBED VERSION",
36
+ "local_module": {
37
+ "inputs": [
38
+ {
39
+ "description": "Name of the s3 bucket. Must be unique.",
40
+ "name": "bucket_name",
41
+ "required": true,
42
+ "type": "string"
43
+ },
44
+ {
45
+ "default": {
46
+ },
47
+ "description": "Tags to set on the bucket.",
48
+ "name": "tags",
49
+ "required": false,
50
+ "type": "map(string)"
51
+ }
52
+ ],
53
+ "name": "local_module",
54
+ "outputs": [
55
+ {
56
+ "description": "ARN of the bucket",
57
+ "name": "arn"
58
+ },
59
+ {
60
+ "description": "Domain name of the bucket",
61
+ "name": "domain"
62
+ },
63
+ {
64
+ "description": "Name (id) of the bucket",
65
+ "name": "name"
66
+ }
67
+ ]
68
+ }
69
+ }"
70
+ `;
71
+
72
+ exports[`readSchema generates a more complex schema 1`] = `
73
+ "{
74
+ "format_version": "STUBBED VERSION",
75
+ "terraform-aws-modules_eks_aws": {
76
+ "inputs": [
77
+ {
78
+ "default": true,
79
+ "description": "Whether to attach the module managed cluster autoscaling iam policy to the default worker IAM role. This requires \`manage_worker_autoscaling_policy = true\`",
80
+ "name": "attach_worker_autoscaling_policy",
81
+ "required": false,
82
+ "type": "bool"
83
+ },
84
+ {
85
+ "default": true,
86
+ "description": "Whether to attach the Amazon managed \`AmazonEKS_CNI_Policy\` IAM policy to the default worker IAM role. WARNING: If set \`false\` the permissions must be assigned to the \`aws-node\` DaemonSet pods via another method or nodes will not be able to join the cluster.",
87
+ "name": "attach_worker_cni_policy",
88
+ "required": false,
89
+ "type": "bool"
90
+ },
91
+ {
92
+ "default": true,
93
+ "description": "Whether to create a security group for the cluster or attach the cluster to \`cluster_security_group_id\`.",
94
+ "name": "cluster_create_security_group",
95
+ "required": false,
96
+ "type": "bool"
97
+ },
98
+ {
99
+ "default": "15m",
100
+ "description": "Timeout value when creating the EKS cluster.",
101
+ "name": "cluster_create_timeout",
102
+ "required": false,
103
+ "type": "string"
104
+ },
105
+ {
106
+ "default": "15m",
107
+ "description": "Timeout value when deleting the EKS cluster.",
108
+ "name": "cluster_delete_timeout",
109
+ "required": false,
110
+ "type": "string"
111
+ },
112
+ {
113
+ "default": [
114
+ ],
115
+ "description": "A list of the desired control plane logging to enable. For more information, see Amazon EKS Control Plane Logging documentation (https://docs.aws.amazon.com/eks/latest/userguide/control-plane-logs.html)",
116
+ "name": "cluster_enabled_log_types",
117
+ "required": false,
118
+ "type": "list(string)"
119
+ },
120
+ {
121
+ "default": false,
122
+ "description": "Indicates whether or not the Amazon EKS private API server endpoint is enabled.",
123
+ "name": "cluster_endpoint_private_access",
124
+ "required": false,
125
+ "type": "bool"
126
+ },
127
+ {
128
+ "default": true,
129
+ "description": "Indicates whether or not the Amazon EKS public API server endpoint is enabled.",
130
+ "name": "cluster_endpoint_public_access",
131
+ "required": false,
132
+ "type": "bool"
133
+ },
134
+ {
135
+ "default": "",
136
+ "description": "IAM role name for the cluster. Only applicable if manage_cluster_iam_resources is set to false.",
137
+ "name": "cluster_iam_role_name",
138
+ "required": false,
139
+ "type": "string"
140
+ },
141
+ {
142
+ "default": "",
143
+ "description": "If a KMS Key ARN is set, this key will be used to encrypt the corresponding log group. Please be sure that the KMS Key has an appropriate key policy (https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/encrypt-log-data-kms.html)",
144
+ "name": "cluster_log_kms_key_id",
145
+ "required": false,
146
+ "type": "string"
147
+ },
148
+ {
149
+ "default": 90,
150
+ "description": "Number of days to retain log events. Default retention - 90 days.",
151
+ "name": "cluster_log_retention_in_days",
152
+ "required": false,
153
+ "type": "number"
154
+ },
155
+ {
156
+ "description": "Name of the EKS cluster. Also used as a prefix in names of related resources.",
157
+ "name": "cluster_name",
158
+ "required": true,
159
+ "type": "string"
160
+ },
161
+ {
162
+ "default": "",
163
+ "description": "If provided, the EKS cluster will be attached to this security group. If not given, a security group will be created with necessary ingress/egress to work with the workers",
164
+ "name": "cluster_security_group_id",
165
+ "required": false,
166
+ "type": "string"
167
+ },
168
+ {
169
+ "default": "1.14",
170
+ "description": "Kubernetes version to use for the EKS cluster.",
171
+ "name": "cluster_version",
172
+ "required": false,
173
+ "type": "string"
174
+ },
175
+ {
176
+ "default": "./",
177
+ "description": "Where to save the Kubectl config file (if \`write_kubeconfig = true\`). Assumed to be a directory if the value ends with a forward slash \`/\`.",
178
+ "name": "config_output_path",
179
+ "required": false,
180
+ "type": "string"
181
+ },
182
+ {
183
+ "default": "/",
184
+ "description": "If provided, all IAM roles will be created on this path.",
185
+ "name": "iam_path",
186
+ "required": false,
187
+ "type": "string"
188
+ },
189
+ {
190
+ "default": [
191
+ ],
192
+ "description": "Any additional arguments to pass to the authenticator such as the role to assume. e.g. [\\"-r\\", \\"MyEksRole\\"].",
193
+ "name": "kubeconfig_aws_authenticator_additional_args",
194
+ "required": false,
195
+ "type": "list(string)"
196
+ },
197
+ {
198
+ "default": "aws-iam-authenticator",
199
+ "description": "Command to use to fetch AWS EKS credentials.",
200
+ "name": "kubeconfig_aws_authenticator_command",
201
+ "required": false,
202
+ "type": "string"
203
+ },
204
+ {
205
+ "default": [
206
+ ],
207
+ "description": "Default arguments passed to the authenticator command. Defaults to [token -i $cluster_name].",
208
+ "name": "kubeconfig_aws_authenticator_command_args",
209
+ "required": false,
210
+ "type": "list(string)"
211
+ },
212
+ {
213
+ "default": {
214
+ },
215
+ "description": "Environment variables that should be used when executing the authenticator. e.g. { AWS_PROFILE = \\"eks\\"}.",
216
+ "name": "kubeconfig_aws_authenticator_env_variables",
217
+ "required": false,
218
+ "type": "map(string)"
219
+ },
220
+ {
221
+ "default": "",
222
+ "description": "Override the default name used for items kubeconfig.",
223
+ "name": "kubeconfig_name",
224
+ "required": false,
225
+ "type": "string"
226
+ },
227
+ {
228
+ "default": [
229
+ "/bin/sh",
230
+ "-c"
231
+ ],
232
+ "description": "Command to run for local-exec resources. Must be a shell-style interpreter. If you are on Windows Git Bash is a good choice.",
233
+ "name": "local_exec_interpreter",
234
+ "required": false,
235
+ "type": "list(string)"
236
+ },
237
+ {
238
+ "default": true,
239
+ "description": "Whether to apply the aws-auth configmap file.",
240
+ "name": "manage_aws_auth",
241
+ "required": false,
242
+ "type": "bool"
243
+ },
244
+ {
245
+ "default": true,
246
+ "description": "Whether to let the module manage cluster IAM resources. If set to false, cluster_iam_role_name must be specified.",
247
+ "name": "manage_cluster_iam_resources",
248
+ "required": false,
249
+ "type": "bool"
250
+ },
251
+ {
252
+ "default": true,
253
+ "description": "Whether to let the module manage the cluster autoscaling iam policy.",
254
+ "name": "manage_worker_autoscaling_policy",
255
+ "required": false,
256
+ "type": "bool"
257
+ },
258
+ {
259
+ "default": true,
260
+ "description": "Whether to let the module manage worker IAM resources. If set to false, iam_instance_profile_name must be specified for workers.",
261
+ "name": "manage_worker_iam_resources",
262
+ "required": false,
263
+ "type": "bool"
264
+ },
265
+ {
266
+ "default": [
267
+ ],
268
+ "description": "Additional AWS account numbers to add to the aws-auth configmap. See examples/basic/variables.tf for example format.",
269
+ "name": "map_accounts",
270
+ "required": false,
271
+ "type": "list(string)"
272
+ },
273
+ {
274
+ "default": [
275
+ ],
276
+ "description": "Additional IAM roles to add to the aws-auth configmap. See examples/basic/variables.tf for example format.",
277
+ "name": "map_roles",
278
+ "required": false,
279
+ "type": "any"
280
+ },
281
+ {
282
+ "default": [
283
+ ],
284
+ "description": "Additional IAM users to add to the aws-auth configmap. See examples/basic/variables.tf for example format.",
285
+ "name": "map_users",
286
+ "required": false,
287
+ "type": "any"
288
+ },
289
+ {
290
+ "default": null,
291
+ "description": "If provided, all IAM roles will be created with this permissions boundary attached.",
292
+ "name": "permissions_boundary",
293
+ "required": false,
294
+ "type": "string"
295
+ },
296
+ {
297
+ "description": "A list of subnets to place the EKS cluster and workers within.",
298
+ "name": "subnets",
299
+ "required": true,
300
+ "type": "list(string)"
301
+ },
302
+ {
303
+ "default": {
304
+ },
305
+ "description": "A map of tags to add to all resources.",
306
+ "name": "tags",
307
+ "required": false,
308
+ "type": "map(string)"
309
+ },
310
+ {
311
+ "description": "VPC where the cluster and workers will be deployed.",
312
+ "name": "vpc_id",
313
+ "required": true,
314
+ "type": "string"
315
+ },
316
+ {
317
+ "default": [
318
+ ],
319
+ "description": "A list of additional security group ids to attach to worker instances",
320
+ "name": "worker_additional_security_group_ids",
321
+ "required": false,
322
+ "type": "list(string)"
323
+ },
324
+ {
325
+ "default": "",
326
+ "description": "Name filter for AWS EKS worker AMI. If not provided, the latest official AMI for the specified 'cluster_version' is used.",
327
+ "name": "worker_ami_name_filter",
328
+ "required": false,
329
+ "type": "string"
330
+ },
331
+ {
332
+ "default": "",
333
+ "description": "Name filter for AWS EKS Windows worker AMI. If not provided, the latest official AMI for the specified 'cluster_version' is used.",
334
+ "name": "worker_ami_name_filter_windows",
335
+ "required": false,
336
+ "type": "string"
337
+ },
338
+ {
339
+ "default": "602401143452",
340
+ "description": "The ID of the owner for the AMI to use for the AWS EKS workers. Valid values are an AWS account ID, 'self' (the current account), or an AWS owner alias (e.g. 'amazon', 'aws-marketplace', 'microsoft').",
341
+ "name": "worker_ami_owner_id",
342
+ "required": false,
343
+ "type": "string"
344
+ },
345
+ {
346
+ "default": "801119661308",
347
+ "description": "The ID of the owner for the AMI to use for the AWS EKS Windows workers. Valid values are an AWS account ID, 'self' (the current account), or an AWS owner alias (e.g. 'amazon', 'aws-marketplace', 'microsoft').",
348
+ "name": "worker_ami_owner_id_windows",
349
+ "required": false,
350
+ "type": "string"
351
+ },
352
+ {
353
+ "default": false,
354
+ "description": "Whether to create initial lifecycle hooks provided in worker groups.",
355
+ "name": "worker_create_initial_lifecycle_hooks",
356
+ "required": false,
357
+ "type": "bool"
358
+ },
359
+ {
360
+ "default": true,
361
+ "description": "Whether to create a security group for the workers or attach the workers to \`worker_security_group_id\`.",
362
+ "name": "worker_create_security_group",
363
+ "required": false,
364
+ "type": "bool"
365
+ },
366
+ {
367
+ "default": [
368
+ ],
369
+ "description": "A list of maps defining worker group configurations to be defined using AWS Launch Configurations. See workers_group_defaults for valid keys.",
370
+ "name": "worker_groups",
371
+ "required": false,
372
+ "type": "any"
373
+ },
374
+ {
375
+ "default": [
376
+ ],
377
+ "description": "A list of maps defining worker group configurations to be defined using AWS Launch Templates. See workers_group_defaults for valid keys.",
378
+ "name": "worker_groups_launch_template",
379
+ "required": false,
380
+ "type": "any"
381
+ },
382
+ {
383
+ "default": "",
384
+ "description": "If provided, all workers will be attached to this security group. If not given, a security group will be created with necessary ingress/egress to work with the EKS cluster.",
385
+ "name": "worker_security_group_id",
386
+ "required": false,
387
+ "type": "string"
388
+ },
389
+ {
390
+ "default": 1025,
391
+ "description": "Minimum port number from which pods will accept communication. Must be changed to a lower value if some pods in your cluster will expose a port lower than 1025 (e.g. 22, 80, or 443).",
392
+ "name": "worker_sg_ingress_from_port",
393
+ "required": false,
394
+ "type": "number"
395
+ },
396
+ {
397
+ "default": [
398
+ ],
399
+ "description": "Additional policies to be added to workers",
400
+ "name": "workers_additional_policies",
401
+ "required": false,
402
+ "type": "list(string)"
403
+ },
404
+ {
405
+ "default": {
406
+ },
407
+ "description": "Override default values for target groups. See workers_group_defaults_defaults in local.tf for valid keys.",
408
+ "name": "workers_group_defaults",
409
+ "required": false,
410
+ "type": "any"
411
+ },
412
+ {
413
+ "default": "",
414
+ "description": "User defined workers role name.",
415
+ "name": "workers_role_name",
416
+ "required": false,
417
+ "type": "string"
418
+ },
419
+ {
420
+ "default": true,
421
+ "description": "Whether to write the aws-auth configmap file.",
422
+ "name": "write_aws_auth_config",
423
+ "required": false,
424
+ "type": "bool"
425
+ },
426
+ {
427
+ "default": true,
428
+ "description": "Whether to write a Kubectl config file containing the cluster configuration. Saved to \`config_output_path\`.",
429
+ "name": "write_kubeconfig",
430
+ "required": false,
431
+ "type": "bool"
432
+ }
433
+ ],
434
+ "name": "terraform-aws-modules_eks_aws",
435
+ "outputs": [
436
+ {
437
+ "description": "Name of cloudwatch log group created",
438
+ "name": "cloudwatch_log_group_name"
439
+ },
440
+ {
441
+ "description": "The Amazon Resource Name (ARN) of the cluster.",
442
+ "name": "cluster_arn"
443
+ },
444
+ {
445
+ "description": "Nested attribute containing certificate-authority-data for your cluster. This is the base64 encoded certificate data required to communicate with your cluster.",
446
+ "name": "cluster_certificate_authority_data"
447
+ },
448
+ {
449
+ "description": "The endpoint for your EKS Kubernetes API.",
450
+ "name": "cluster_endpoint"
451
+ },
452
+ {
453
+ "description": "IAM role ARN of the EKS cluster.",
454
+ "name": "cluster_iam_role_arn"
455
+ },
456
+ {
457
+ "description": "IAM role name of the EKS cluster.",
458
+ "name": "cluster_iam_role_name"
459
+ },
460
+ {
461
+ "description": "The name/id of the EKS cluster.",
462
+ "name": "cluster_id"
463
+ },
464
+ {
465
+ "description": "The URL on the EKS cluster OIDC Issuer",
466
+ "name": "cluster_oidc_issuer_url"
467
+ },
468
+ {
469
+ "description": "Security group ID attached to the EKS cluster.",
470
+ "name": "cluster_security_group_id"
471
+ },
472
+ {
473
+ "description": "The Kubernetes server version for the EKS cluster.",
474
+ "name": "cluster_version"
475
+ },
476
+ {
477
+ "description": "A kubernetes configuration to authenticate to this EKS cluster.",
478
+ "name": "config_map_aws_auth"
479
+ },
480
+ {
481
+ "description": "kubectl config file contents for this EKS cluster.",
482
+ "name": "kubeconfig"
483
+ },
484
+ {
485
+ "description": "The filename of the generated kubectl config.",
486
+ "name": "kubeconfig_filename"
487
+ },
488
+ {
489
+ "description": "ARN of the worker autoscaling IAM policy if \`manage_worker_autoscaling_policy = true\`",
490
+ "name": "worker_autoscaling_policy_arn"
491
+ },
492
+ {
493
+ "description": "Name of the worker autoscaling IAM policy if \`manage_worker_autoscaling_policy = true\`",
494
+ "name": "worker_autoscaling_policy_name"
495
+ },
496
+ {
497
+ "description": "default IAM instance profile ARN for EKS worker groups",
498
+ "name": "worker_iam_instance_profile_arns"
499
+ },
500
+ {
501
+ "description": "default IAM instance profile name for EKS worker groups",
502
+ "name": "worker_iam_instance_profile_names"
503
+ },
504
+ {
505
+ "description": "default IAM role ARN for EKS worker groups",
506
+ "name": "worker_iam_role_arn"
507
+ },
508
+ {
509
+ "description": "default IAM role name for EKS worker groups",
510
+ "name": "worker_iam_role_name"
511
+ },
512
+ {
513
+ "description": "Security group ID attached to the EKS workers.",
514
+ "name": "worker_security_group_id"
515
+ },
516
+ {
517
+ "description": "IDs of the autoscaling groups containing workers.",
518
+ "name": "workers_asg_arns"
519
+ },
520
+ {
521
+ "description": "Names of the autoscaling groups containing workers.",
522
+ "name": "workers_asg_names"
523
+ },
524
+ {
525
+ "description": "ID of the default worker group AMI",
526
+ "name": "workers_default_ami_id"
527
+ },
528
+ {
529
+ "description": "ARNs of the worker launch templates.",
530
+ "name": "workers_launch_template_arns"
531
+ },
532
+ {
533
+ "description": "IDs of the worker launch templates.",
534
+ "name": "workers_launch_template_ids"
535
+ },
536
+ {
537
+ "description": "Latest versions of the worker launch templates.",
538
+ "name": "workers_launch_template_latest_versions"
539
+ },
540
+ {
541
+ "description": "User data of worker groups",
542
+ "name": "workers_user_data"
543
+ }
544
+ ]
545
+ }
546
+ }"
547
+ `;
548
+
549
+ exports[`readSchema generates a single module schema 1`] = `
550
+ "{
551
+ "format_version": "STUBBED VERSION",
552
+ "terraform-aws-modules_iam_aws_modules_iam-account": {
553
+ "inputs": [
554
+ {
555
+ "description": "AWS IAM account alias for this account",
556
+ "name": "account_alias",
557
+ "required": true,
558
+ "type": "string"
559
+ },
560
+ {
561
+ "default": true,
562
+ "description": "Whether to allow users to change their own password",
563
+ "name": "allow_users_to_change_password",
564
+ "required": false,
565
+ "type": "bool"
566
+ },
567
+ {
568
+ "default": true,
569
+ "description": "Whether to create AWS IAM account password policy",
570
+ "name": "create_account_password_policy",
571
+ "required": false,
572
+ "type": "bool"
573
+ },
574
+ {
575
+ "default": true,
576
+ "description": "Whether to get AWS account ID, User ID, and ARN in which Terraform is authorized",
577
+ "name": "get_caller_identity",
578
+ "required": false,
579
+ "type": "bool"
580
+ },
581
+ {
582
+ "default": false,
583
+ "description": "Whether users are prevented from setting a new password after their password has expired (i.e. require administrator reset)",
584
+ "name": "hard_expiry",
585
+ "required": false,
586
+ "type": "bool"
587
+ },
588
+ {
589
+ "default": 0,
590
+ "description": "The number of days that an user password is valid.",
591
+ "name": "max_password_age",
592
+ "required": false,
593
+ "type": "number"
594
+ },
595
+ {
596
+ "default": 8,
597
+ "description": "Minimum length to require for user passwords",
598
+ "name": "minimum_password_length",
599
+ "required": false,
600
+ "type": "number"
601
+ },
602
+ {
603
+ "default": null,
604
+ "description": "The number of previous passwords that users are prevented from reusing",
605
+ "name": "password_reuse_prevention",
606
+ "required": false,
607
+ "type": "number"
608
+ },
609
+ {
610
+ "default": true,
611
+ "description": "Whether to require lowercase characters for user passwords",
612
+ "name": "require_lowercase_characters",
613
+ "required": false,
614
+ "type": "bool"
615
+ },
616
+ {
617
+ "default": true,
618
+ "description": "Whether to require numbers for user passwords",
619
+ "name": "require_numbers",
620
+ "required": false,
621
+ "type": "bool"
622
+ },
623
+ {
624
+ "default": true,
625
+ "description": "Whether to require symbols for user passwords",
626
+ "name": "require_symbols",
627
+ "required": false,
628
+ "type": "bool"
629
+ },
630
+ {
631
+ "default": true,
632
+ "description": "Whether to require uppercase characters for user passwords",
633
+ "name": "require_uppercase_characters",
634
+ "required": false,
635
+ "type": "bool"
636
+ }
637
+ ],
638
+ "name": "terraform-aws-modules_iam_aws_modules_iam-account",
639
+ "outputs": [
640
+ {
641
+ "description": "The AWS Account ID number of the account that owns or contains the calling entity",
642
+ "name": "this_caller_identity_account_id"
643
+ },
644
+ {
645
+ "description": "The AWS ARN associated with the calling entity",
646
+ "name": "this_caller_identity_arn"
647
+ },
648
+ {
649
+ "description": "The unique identifier of the calling entity",
650
+ "name": "this_caller_identity_user_id"
651
+ },
652
+ {
653
+ "description": "Indicates whether passwords in the account expire. Returns true if max_password_age contains a value greater than 0. Returns false if it is 0 or not present.",
654
+ "name": "this_iam_account_password_policy_expire_passwords"
655
+ }
656
+ ]
657
+ }
658
+ }"
659
+ `;
660
+
661
+ exports[`readSchema generates a single provider schema 1`] = `
662
+ "{
663
+ "format_version": "STUBBED VERSION",
664
+ "provider_schemas": {
665
+ "registry.terraform.io/hashicorp/null": {
666
+ "data_source_schemas": {
667
+ "null_data_source": {
668
+ "block": {
669
+ "attributes": {
670
+ "has_computed_default": {
671
+ "computed": true,
672
+ "description": "If set, its literal value will be stored and returned. If not, its value defaults to \`\\"default\\"\`. This argument exists primarily for testing and has little practical use.",
673
+ "description_kind": "markdown",
674
+ "optional": true,
675
+ "type": "string"
676
+ },
677
+ "id": {
678
+ "computed": true,
679
+ "deprecated": true,
680
+ "description": "This attribute is only present for some legacy compatibility issues and should not be used. It will be removed in a future version.",
681
+ "description_kind": "markdown",
682
+ "type": "string"
683
+ },
684
+ "inputs": {
685
+ "description": "A map of arbitrary strings that is copied into the \`outputs\` attribute, and accessible directly for interpolation.",
686
+ "description_kind": "markdown",
687
+ "optional": true,
688
+ "type": [
689
+ "map",
690
+ "string"
691
+ ]
692
+ },
693
+ "outputs": {
694
+ "computed": true,
695
+ "description": "After the data source is \\"read\\", a copy of the \`inputs\` map.",
696
+ "description_kind": "markdown",
697
+ "type": [
698
+ "map",
699
+ "string"
700
+ ]
701
+ },
702
+ "random": {
703
+ "computed": true,
704
+ "description": "A random value. This is primarily for testing and has little practical use; prefer the [hashicorp/random provider](https://registry.terraform.io/providers/hashicorp/random) for more practical random number use-cases.",
705
+ "description_kind": "markdown",
706
+ "type": "string"
707
+ }
708
+ },
709
+ "deprecated": true,
710
+ "description": "The \`null_data_source\` data source implements the standard data source lifecycle but does not\\ninteract with any external APIs.\\n\\nHistorically, the \`null_data_source\` was typically used to construct intermediate values to re-use elsewhere in configuration. The\\nsame can now be achieved using [locals](https://www.terraform.io/docs/language/values/locals.html).\\n",
711
+ "description_kind": "markdown"
712
+ },
713
+ "version": 0
714
+ }
715
+ },
716
+ "provider": {
717
+ "block": {
718
+ "description_kind": "plain"
719
+ },
720
+ "version": 0
721
+ },
722
+ "resource_schemas": {
723
+ "null_resource": {
724
+ "block": {
725
+ "attributes": {
726
+ "id": {
727
+ "computed": true,
728
+ "description": "This is set to a random value at create time.",
729
+ "description_kind": "markdown",
730
+ "type": "string"
731
+ },
732
+ "triggers": {
733
+ "description": "A map of arbitrary strings that, when changed, will force the null resource to be replaced, re-running any associated provisioners.",
734
+ "description_kind": "markdown",
735
+ "optional": true,
736
+ "type": [
737
+ "map",
738
+ "string"
739
+ ]
740
+ }
741
+ },
742
+ "description": "The \`null_resource\` resource implements the standard resource lifecycle but takes no further action.\\n\\nThe \`triggers\` argument allows specifying an arbitrary set of values that, when changed, will cause the resource to be replaced.",
743
+ "description_kind": "markdown"
744
+ },
745
+ "version": 0
746
+ }
747
+ }
748
+ }
749
+ },
750
+ "provider_versions": {
751
+ "registry.terraform.io/hashicorp/null": "3.1.0"
752
+ }
753
+ }"
754
+ `;
755
+
756
+ exports[`sanitizeProviderSchema sanitizes a provider schema 1`] = `
757
+ {
758
+ "format_version": "0.1",
759
+ "provider_schemas": {
760
+ "registry.terraform.io/hashicorp/null": {
761
+ "data_source_schemas": {},
762
+ "provider": {
763
+ "block": {
764
+ "attributes": {
765
+ "correct": {
766
+ "type": [
767
+ "list",
768
+ "string",
769
+ ],
770
+ },
771
+ "incorrect": {
772
+ "type": [
773
+ "list",
774
+ "string",
775
+ ],
776
+ },
777
+ "version": {
778
+ "required": true,
779
+ "type": "string",
780
+ },
781
+ },
782
+ "block_types": {
783
+ "triggers": {
784
+ "block": {
785
+ "attributes": {
786
+ "correct": {
787
+ "type": [
788
+ "list",
789
+ "string",
790
+ ],
791
+ },
792
+ "incorrect": {
793
+ "type": [
794
+ "list",
795
+ "string",
796
+ ],
797
+ },
798
+ },
799
+ "block_types": {},
800
+ },
801
+ "nesting_mode": "single",
802
+ },
803
+ },
804
+ },
805
+ "version": 0,
806
+ },
807
+ "resource_schemas": {
808
+ "null_resource": {
809
+ "block": {
810
+ "attributes": {
811
+ "correct": {
812
+ "type": [
813
+ "list",
814
+ "string",
815
+ ],
816
+ },
817
+ "id": {
818
+ "computed": true,
819
+ "type": "string",
820
+ },
821
+ "incorrect": {
822
+ "type": [
823
+ "list",
824
+ "string",
825
+ ],
826
+ },
827
+ },
828
+ "block_types": {
829
+ "triggers": {
830
+ "block": {
831
+ "attributes": {
832
+ "correct": {
833
+ "type": [
834
+ "list",
835
+ "string",
836
+ ],
837
+ },
838
+ "incorrect": {
839
+ "type": [
840
+ "list",
841
+ "string",
842
+ ],
843
+ },
844
+ "triggers": {
845
+ "optional": true,
846
+ "type": "string",
847
+ },
848
+ },
849
+ "block_types": {},
850
+ },
851
+ "nesting_mode": "single",
852
+ },
853
+ },
854
+ },
855
+ "version": 0,
856
+ },
857
+ },
858
+ },
859
+ },
860
+ "provider_versions": {
861
+ "registry.terraform.io/hashicorp/null": "3.1.0",
862
+ },
863
+ }
864
+ `;