diff --git a/assets/terraform/examples/resources/panos_security_policy/resource.tf b/assets/terraform/examples/resources/panos_security_policy/resource.tf index b936e580..33c542c8 100644 --- a/assets/terraform/examples/resources/panos_security_policy/resource.tf +++ b/assets/terraform/examples/resources/panos_security_policy/resource.tf @@ -13,7 +13,7 @@ resource "panos_security_policy" "name" { source_zones = ["any"], source_addresses = ["1.1.1.1"], destination_zones = ["any"], - destination_addresses = ["172.16.0.0/8"], + destination_addresses = ["172.0.0.0/8"], services = ["any"], applications = ["any"], } diff --git a/assets/terraform/examples/resources/panos_security_policy_rules/resource.tf b/assets/terraform/examples/resources/panos_security_policy_rules/resource.tf index 23585af7..75a88c75 100644 --- a/assets/terraform/examples/resources/panos_security_policy_rules/resource.tf +++ b/assets/terraform/examples/resources/panos_security_policy_rules/resource.tf @@ -17,7 +17,7 @@ resource "panos_security_policy_rules" "name" { source_zones = ["any"], source_addresses = ["1.1.1.1"], destination_zones = ["any"], - destination_addresses = ["172.16.0.0/8"], + destination_addresses = ["172.0.0.0/8"], services = ["any"], applications = ["any"], } diff --git a/assets/terraform/test/resource_security_policy_test.go b/assets/terraform/test/resource_security_policy_test.go index 0e0a77b9..a070ffa2 100644 --- a/assets/terraform/test/resource_security_policy_test.go +++ b/assets/terraform/test/resource_security_policy_test.go @@ -156,7 +156,7 @@ resource "panos_security_policy" "policy" { # source_hips = ["hip-profile"] negate_source = false - destination_zone = "any" + destination_zones = ["any"] destination_addresses = ["any"] # destination_hips = ["hip-device"] @@ -262,8 +262,10 @@ func TestAccSecurityPolicyExtended(t *testing.T) { "panos_security_policy.policy", tfjsonpath.New("rules"). AtSliceIndex(0). - AtMapKey("destination_zone"), - knownvalue.StringExact("any"), + AtMapKey("destination_zones"), + knownvalue.ListExact([]knownvalue.Check{ + knownvalue.StringExact("any"), + }), ), statecheck.ExpectKnownValue( "panos_security_policy.policy", @@ -410,7 +412,7 @@ resource "panos_security_policy" "policy" { source_zones = ["any"] source_addresses = ["any"] - destination_zone = "any" + destination_zones = ["any"] destination_addresses = ["any"] services = ["any"] diff --git a/specs/policies/security-policy-rule.yaml b/specs/policies/security-policy-rule.yaml index 79855685..42f39e10 100644 --- a/specs/policies/security-policy-rule.yaml +++ b/specs/policies/security-policy-rule.yaml @@ -752,8 +752,7 @@ spec: required: false codegen_overrides: terraform: - name: destination_zone - type: string + name: destination_zones - name: uuid type: string profiles: