@@ -63,7 +63,7 @@ func dataSourceManagementVpnCommunityMeshed() *schema.Resource {
63
63
Description : "The encryption algorithm to be used." ,
64
64
},
65
65
"ike_p1_rekey_time" : {
66
- Type : schema .TypeInt ,
66
+ Type : schema .TypeString ,
67
67
Computed : true ,
68
68
Description : "Indicates the time interval for IKE phase 1 renegotiation." ,
69
69
},
@@ -87,7 +87,7 @@ func dataSourceManagementVpnCommunityMeshed() *schema.Resource {
87
87
Description : "The encryption algorithm to be used." ,
88
88
},
89
89
"ike_p2_use_pfs" : {
90
- Type : schema .TypeBool ,
90
+ Type : schema .TypeString ,
91
91
Computed : true ,
92
92
Description : "Indicates whether Perfect Forward Secrecy (PFS) is being used for IKE phase 2." ,
93
93
},
@@ -97,7 +97,7 @@ func dataSourceManagementVpnCommunityMeshed() *schema.Resource {
97
97
Description : "The Diffie-Hellman group to be used." ,
98
98
},
99
99
"ike_p2_rekey_time" : {
100
- Type : schema .TypeInt ,
100
+ Type : schema .TypeString ,
101
101
Computed : true ,
102
102
Description : "Indicates the time interval for IKE phase 2 renegotiation." ,
103
103
},
@@ -156,7 +156,7 @@ func dataSourceManagementVpnCommunityMeshed() *schema.Resource {
156
156
Schema : map [string ]* schema.Schema {
157
157
"internal_gateway" : {
158
158
Type : schema .TypeString ,
159
- Computed : true ,
159
+ Computed : true ,
160
160
Description : "Internally managed Check Point gateway identified by name or UID, or 'Any' for all internal-gateways participants in this community." ,
161
161
},
162
162
"external_gateway" : {
@@ -196,7 +196,7 @@ func dataSourceManagementVpnCommunityMeshed() *schema.Resource {
196
196
Description : "The encryption algorithm to be used." ,
197
197
},
198
198
"ike_p1_rekey_time" : {
199
- Type : schema .TypeInt ,
199
+ Type : schema .TypeString ,
200
200
Computed : true ,
201
201
Description : "Indicates the time interval for IKE phase 1 renegotiation." ,
202
202
},
@@ -221,7 +221,7 @@ func dataSourceManagementVpnCommunityMeshed() *schema.Resource {
221
221
Description : "The encryption algorithm to be used." ,
222
222
},
223
223
"ike_p2_use_pfs" : {
224
- Type : schema .TypeBool ,
224
+ Type : schema .TypeString ,
225
225
Computed : true ,
226
226
Description : "Indicates whether Perfect Forward Secrecy (PFS) is being used for IKE phase 2." ,
227
227
},
@@ -231,7 +231,7 @@ func dataSourceManagementVpnCommunityMeshed() *schema.Resource {
231
231
Description : "The Diffie-Hellman group to be used." ,
232
232
},
233
233
"ike_p2_rekey_time" : {
234
- Type : schema .TypeInt ,
234
+ Type : schema .TypeString ,
235
235
Computed : true ,
236
236
Description : "Indicates the time interval for IKE phase 2 renegotiation." ,
237
237
},
@@ -344,7 +344,7 @@ func dataSourceManagementVpnCommunityMeshedRead(d *schema.ResourceData, m interf
344
344
ikePhase1MapToReturn ["encryption_algorithm" ] = v
345
345
}
346
346
if v := ikePhase1Map ["ike-p1-rekey-time" ]; v != nil {
347
- ikePhase1MapToReturn ["ike_p1_rekey_time" ] = v
347
+ ikePhase1MapToReturn ["ike_p1_rekey_time" ] = strconv . Itoa ( int ( v .( float64 )))
348
348
}
349
349
_ , ikePhase1InConf := d .GetOk ("ike_phase_1" )
350
350
defaultIkePhase1 := map [string ]interface {}{"encryption_algorithm" : "aes-256" , "diffie_hellman_group" : "group-2" , "data_integrity" : "sha1" }
@@ -371,13 +371,13 @@ func dataSourceManagementVpnCommunityMeshedRead(d *schema.ResourceData, m interf
371
371
ikePhase2MapToReturn ["encryption_algorithm" ] = v
372
372
}
373
373
if v := ikePhase2Map ["ike-p2-use-pfs" ]; v != nil {
374
- ikePhase2MapToReturn ["ike_p2_use_pfs" ] = v
374
+ ikePhase2MapToReturn ["ike_p2_use_pfs" ] = strconv . FormatBool ( v .( bool ))
375
375
}
376
376
if v := ikePhase2Map ["ike-p2-pfs-dh-grp" ]; v != nil {
377
377
ikePhase2MapToReturn ["ike_p2_pfs_dh_grp" ] = v
378
378
}
379
379
if v := ikePhase2Map ["ike-p2-rekey-time" ]; v != nil {
380
- ikePhase2MapToReturn ["ike_p2_rekey_time" ] = v
380
+ ikePhase2MapToReturn ["ike_p2_rekey_time" ] = strconv . Itoa ( int ( v .( float64 )))
381
381
}
382
382
_ , ikePhase2InConf := d .GetOk ("ike_phase_2" )
383
383
defaultIkePhase2 := map [string ]interface {}{"encryption_algorithm" : "aes-128" , "data_integrity" : "sha1" }
@@ -411,7 +411,7 @@ func dataSourceManagementVpnCommunityMeshedRead(d *schema.ResourceData, m interf
411
411
}
412
412
}
413
413
_ = d .Set ("override_vpn_domains" , overrideVpnDomainsListToReturn )
414
- }else {
414
+ } else {
415
415
_ = d .Set ("override_vpn_domains" , nil )
416
416
}
417
417
@@ -448,7 +448,7 @@ func dataSourceManagementVpnCommunityMeshedRead(d *schema.ResourceData, m interf
448
448
}
449
449
}
450
450
_ = d .Set ("shared_secrets" , sharedSecretsListToReturn )
451
- }else {
451
+ } else {
452
452
_ = d .Set ("shared_secrets" , nil )
453
453
}
454
454
@@ -471,7 +471,7 @@ func dataSourceManagementVpnCommunityMeshedRead(d *schema.ResourceData, m interf
471
471
if obj ["name" ] != nil {
472
472
internalGatewayName = obj ["name" ].(string )
473
473
}
474
- }else if val , ok := v .(string ); ok {
474
+ } else if val , ok := v .(string ); ok {
475
475
internalGatewayName = val
476
476
}
477
477
granularEncryptionState ["internal_gateway" ] = internalGatewayName
@@ -484,7 +484,7 @@ func dataSourceManagementVpnCommunityMeshedRead(d *schema.ResourceData, m interf
484
484
if obj ["name" ] != nil {
485
485
externalGatewayName = obj ["name" ].(string )
486
486
}
487
- }else if val , ok := v .(string ); ok {
487
+ } else if val , ok := v .(string ); ok {
488
488
externalGatewayName = val
489
489
}
490
490
granularEncryptionState ["external_gateway" ] = externalGatewayName
@@ -511,7 +511,7 @@ func dataSourceManagementVpnCommunityMeshedRead(d *schema.ResourceData, m interf
511
511
ikePhase1State ["diffie_hellman_group" ] = v
512
512
}
513
513
if v := ikePhase1Show ["ike-p1-rekey-time" ]; v != nil {
514
- ikePhase1State ["ike_p1_rekey_time" ] = v
514
+ ikePhase1State ["ike_p1_rekey_time" ] = strconv . Itoa ( int ( v .( float64 )))
515
515
}
516
516
granularEncryptionState ["ike_phase_1" ] = ikePhase1State
517
517
}
@@ -526,20 +526,20 @@ func dataSourceManagementVpnCommunityMeshedRead(d *schema.ResourceData, m interf
526
526
ikePhase2State ["data_integrity" ] = v
527
527
}
528
528
if v := ikePhase2Show ["ike-p2-use-pfs" ]; v != nil {
529
- ikePhase2State ["ike_p2_use_pfs" ] = v
529
+ ikePhase2State ["ike_p2_use_pfs" ] = strconv . FormatBool ( v .( bool ))
530
530
}
531
531
if v := ikePhase2Show ["ike-p2-pfs-dh-grp" ]; v != nil {
532
532
ikePhase2State ["ike_p2_pfs_dh_grp" ] = v
533
533
}
534
534
if v := ikePhase2Show ["ike-p2-rekey-time" ]; v != nil {
535
- ikePhase2State ["ike_p2_rekey_time" ] = v
535
+ ikePhase2State ["ike_p2_rekey_time" ] = strconv . Itoa ( int ( v .( float64 )))
536
536
}
537
537
granularEncryptionState ["ike_phase_2" ] = ikePhase2State
538
538
}
539
539
granularEncryptionsState = append (granularEncryptionsState , granularEncryptionState )
540
540
}
541
541
_ = d .Set ("granular_encryptions" , granularEncryptionsState )
542
- }else {
542
+ } else {
543
543
_ = d .Set ("granular_encryptions" , nil )
544
544
}
545
545
}
0 commit comments