From 117c3d7b8a45794907ef96bee24966ac745645c5 Mon Sep 17 00:00:00 2001 From: Frank Shen Date: Wed, 16 Dec 2020 23:34:27 +0800 Subject: [PATCH] Fix ForceNew/Required Problems(firewall objects(except for policy) should not include ForceNew) --- fortios/resource_antivirus_profile.go | 2 +- fortios/resource_application_custom.go | 3 ++- fortios/resource_application_group.go | 3 ++- fortios/resource_application_list.go | 2 +- fortios/resource_application_name.go | 3 ++- fortios/resource_authentication_rule.go | 3 ++- fortios/resource_authentication_scheme.go | 3 ++- fortios/resource_certificate_ca.go | 2 +- fortios/resource_certificate_crl.go | 2 +- fortios/resource_certificate_local.go | 2 +- fortios/resource_dlp_filepattern.go | 2 +- fortios/resource_dlp_fpdocsource.go | 3 ++- fortios/resource_dlp_sensor.go | 2 +- fortios/resource_dnsfilter_domainfilter.go | 2 +- fortios/resource_dnsfilter_profile.go | 2 +- fortios/resource_endpointcontrol_client.go | 3 ++- fortios/resource_endpointcontrol_forticlientems.go | 3 ++- ...source_endpointcontrol_forticlientregistrationsync.go | 3 ++- fortios/resource_endpointcontrol_profile.go | 3 ++- .../resource_endpointcontrol_registeredforticlient.go | 3 ++- fortios/resource_extendercontroller_extender.go | 2 +- fortios/resource_extendercontroller_extender1.go | 2 +- fortios/resource_firewall_DoSpolicy.go | 3 ++- fortios/resource_firewall_DoSpolicy6.go | 3 ++- fortios/resource_firewall_address.go | 4 ++-- fortios/resource_firewall_address6.go | 4 ++-- fortios/resource_firewall_address6template.go | 1 - fortios/resource_firewall_addrgrp.go | 1 - fortios/resource_firewall_addrgrp6.go | 4 ++-- fortios/resource_firewall_centralsnatmap.go | 3 ++- fortios/resource_firewall_dnstranslation.go | 4 ++-- fortios/resource_firewall_identitybasedroute.go | 1 - fortios/resource_firewall_interfacepolicy.go | 3 ++- fortios/resource_firewall_interfacepolicy6.go | 3 ++- fortios/resource_firewall_internetservice.go | 4 ++-- fortios/resource_firewall_internetservicecustom.go | 4 ++-- fortios/resource_firewall_internetservicecustomgroup.go | 4 ++-- fortios/resource_firewall_internetservicedefinition.go | 4 ++-- fortios/resource_firewall_internetserviceextension.go | 4 ++-- fortios/resource_firewall_internetservicegroup.go | 4 ++-- fortios/resource_firewall_ippool.go | 4 ++-- fortios/resource_firewall_ippool6.go | 4 ++-- fortios/resource_firewall_iptranslation.go | 4 ++-- fortios/resource_firewall_ldbmonitor.go | 4 ++-- fortios/resource_firewall_localinpolicy.go | 3 ++- fortios/resource_firewall_localinpolicy6.go | 3 ++- fortios/resource_firewall_multicastaddress.go | 4 ++-- fortios/resource_firewall_multicastaddress6.go | 4 ++-- fortios/resource_firewall_multicastpolicy.go | 3 ++- fortios/resource_firewall_multicastpolicy6.go | 3 ++- fortios/resource_firewall_policy.go | 9 +++++---- fortios/resource_firewall_policy46.go | 3 ++- fortios/resource_firewall_policy6.go | 3 ++- fortios/resource_firewall_policy64.go | 3 ++- fortios/resource_firewall_profilegroup.go | 1 - fortios/resource_firewall_profileprotocoloptions.go | 1 - fortios/resource_firewall_proxyaddress.go | 4 ++-- fortios/resource_firewall_proxyaddrgrp.go | 4 ++-- fortios/resource_firewall_proxypolicy.go | 3 ++- fortios/resource_firewall_shapingpolicy.go | 3 ++- fortios/resource_firewall_shapingprofile.go | 1 - fortios/resource_firewall_sniffer.go | 4 ++-- fortios/resource_firewall_sslserver.go | 4 ++-- fortios/resource_firewall_sslsshprofile.go | 1 - fortios/resource_firewall_ttlpolicy.go | 2 +- fortios/resource_firewall_vip.go | 4 ++-- fortios/resource_firewall_vip46.go | 4 ++-- fortios/resource_firewall_vip6.go | 4 ++-- fortios/resource_firewall_vip64.go | 4 ++-- fortios/resource_firewall_vipgrp.go | 4 ++-- fortios/resource_firewall_vipgrp46.go | 4 ++-- fortios/resource_firewall_vipgrp6.go | 4 ++-- fortios/resource_firewall_vipgrp64.go | 4 ++-- fortios/resource_firewallconsolidated_policy.go | 3 ++- fortios/resource_firewallipmacbinding_table.go | 4 ++-- fortios/resource_firewallschedule_group.go | 1 - fortios/resource_firewallschedule_onetime.go | 1 - fortios/resource_firewallschedule_recurring.go | 1 - fortios/resource_firewallservice_category.go | 4 ++-- fortios/resource_firewallservice_custom.go | 4 ++-- fortios/resource_firewallservice_group.go | 1 - fortios/resource_firewallshaper_peripshaper.go | 4 ++-- fortios/resource_firewallshaper_trafficshaper.go | 4 ++-- fortios/resource_firewallssh_hostkey.go | 4 ++-- fortios/resource_firewallssh_localca.go | 4 ++-- fortios/resource_firewallssh_localkey.go | 4 ++-- fortios/resource_firewallwildcardfqdn_custom.go | 4 ++-- fortios/resource_firewallwildcardfqdn_group.go | 4 ++-- fortios/resource_icap_profile.go | 3 ++- fortios/resource_icap_server.go | 3 ++- fortios/resource_ips_custom.go | 3 ++- fortios/resource_ips_decoder.go | 3 ++- fortios/resource_ips_rule.go | 3 ++- fortios/resource_ips_sensor.go | 2 +- fortios/resource_log_customfield.go | 3 ++- fortios/resource_report_chart.go | 2 +- fortios/resource_report_dataset.go | 2 +- fortios/resource_report_layout.go | 3 ++- fortios/resource_report_style.go | 3 ++- fortios/resource_report_theme.go | 3 ++- fortios/resource_router_accesslist.go | 2 +- fortios/resource_router_accesslist6.go | 2 +- fortios/resource_router_aspathlist.go | 2 +- fortios/resource_router_authpath.go | 2 +- fortios/resource_router_communitylist.go | 2 +- fortios/resource_router_keychain.go | 2 +- fortios/resource_router_multicastflow.go | 2 +- fortios/resource_router_policy.go | 3 ++- fortios/resource_router_policy6.go | 3 ++- fortios/resource_router_prefixlist.go | 2 +- fortios/resource_router_prefixlist6.go | 2 +- fortios/resource_router_routemap.go | 2 +- fortios/resource_router_static.go | 3 ++- fortios/resource_router_static6.go | 3 ++- fortios/resource_spamfilter_bwl.go | 2 +- fortios/resource_spamfilter_bword.go | 2 +- fortios/resource_spamfilter_dnsbl.go | 2 +- fortios/resource_spamfilter_iptrust.go | 2 +- fortios/resource_spamfilter_mheader.go | 2 +- fortios/resource_spamfilter_profile.go | 2 +- fortios/resource_sshfilter_profile.go | 3 ++- fortios/resource_switchcontroller_customcommand.go | 3 ++- fortios/resource_switchcontroller_lldpprofile.go | 3 ++- fortios/resource_switchcontroller_managedswitch.go | 2 +- fortios/resource_switchcontroller_switchgroup.go | 3 ++- fortios/resource_switchcontroller_switchprofile.go | 3 ++- fortios/resource_switchcontroller_trafficpolicy.go | 2 +- fortios/resource_switchcontroller_virtualportpool.go | 3 ++- fortios/resource_switchcontroller_vlan.go | 3 ++- fortios/resource_switchcontrollerautoconfig_custom.go | 2 +- fortios/resource_switchcontrollerautoconfig_policy.go | 2 +- fortios/resource_switchcontrollerqos_dot1pmap.go | 2 +- fortios/resource_switchcontrollerqos_ipdscpmap.go | 2 +- fortios/resource_switchcontrollerqos_qospolicy.go | 2 +- fortios/resource_switchcontrollerqos_queuepolicy.go | 2 +- fortios/resource_switchcontrollersecuritypolicy_8021X.go | 3 ++- ...ource_switchcontrollersecuritypolicy_captiveportal.go | 3 ++- fortios/resource_system_accprofile.go | 2 +- fortios/resource_system_admin.go | 3 ++- fortios/resource_system_affinityinterrupt.go | 2 +- fortios/resource_system_affinitypacketredistribution.go | 2 +- fortios/resource_system_alias.go | 3 ++- fortios/resource_system_apiuser.go | 3 ++- fortios/resource_system_arptable.go | 2 +- fortios/resource_system_automationaction.go | 3 ++- fortios/resource_system_automationdestination.go | 3 ++- fortios/resource_system_automationstitch.go | 3 ++- fortios/resource_system_automationtrigger.go | 3 ++- fortios/resource_system_autoscript.go | 3 ++- fortios/resource_system_clustersync.go | 3 ++- fortios/resource_system_customlanguage.go | 2 +- fortios/resource_system_ddns.go | 3 ++- fortios/resource_system_dnsdatabase.go | 2 +- fortios/resource_system_dnsserver.go | 3 ++- fortios/resource_system_dscpbasedpriority.go | 3 ++- fortios/resource_system_externalresource.go | 2 +- fortios/resource_system_geneve.go | 3 ++- fortios/resource_system_geoipoverride.go | 2 +- fortios/resource_system_gretunnel.go | 3 ++- fortios/resource_system_interface.go | 3 ++- fortios/resource_system_ipiptunnel.go | 3 ++- fortios/resource_system_ipsecaggregate.go | 3 ++- fortios/resource_system_ipv6neighborcache.go | 2 +- fortios/resource_system_ipv6tunnel.go | 3 ++- fortios/resource_system_linkmonitor.go | 3 ++- fortios/resource_system_macaddresstable.go | 2 +- fortios/resource_system_mobiletunnel.go | 3 ++- fortios/resource_system_objecttagging.go | 3 ++- fortios/resource_system_pppoeinterface.go | 3 ++- fortios/resource_system_proxyarp.go | 2 +- fortios/resource_system_replacemsggroup.go | 3 ++- fortios/resource_system_replacemsgimage.go | 3 ++- fortios/resource_system_sdnconnector.go | 3 ++- fortios/resource_system_sessionhelper.go | 3 ++- fortios/resource_system_sittunnel.go | 3 ++- fortios/resource_system_smsserver.go | 3 ++- fortios/resource_system_ssoadmin.go | 3 ++- fortios/resource_system_storage.go | 3 ++- fortios/resource_system_switchinterface.go | 2 +- fortios/resource_system_tosbasedpriority.go | 3 ++- fortios/resource_system_vdom.go | 3 ++- fortios/resource_system_vdomexception.go | 3 ++- fortios/resource_system_vdomlink.go | 3 ++- fortios/resource_system_vdomproperty.go | 3 ++- fortios/resource_system_vdomradiusserver.go | 3 ++- fortios/resource_system_virtualwirepair.go | 3 ++- fortios/resource_system_vxlan.go | 3 ++- fortios/resource_system_wccp.go | 3 ++- fortios/resource_system_zone.go | 3 ++- fortios/resource_systemdhcp6_server.go | 2 +- fortios/resource_systemdhcp_server.go | 2 +- fortios/resource_systemlldp_networkpolicy.go | 2 +- fortios/resource_systemreplacemsg_admin.go | 2 +- fortios/resource_systemreplacemsg_alertmail.go | 2 +- fortios/resource_systemreplacemsg_auth.go | 2 +- .../resource_systemreplacemsg_devicedetectionportal.go | 2 +- fortios/resource_systemreplacemsg_ec.go | 2 +- fortios/resource_systemreplacemsg_fortiguardwf.go | 2 +- fortios/resource_systemreplacemsg_ftp.go | 2 +- fortios/resource_systemreplacemsg_http.go | 2 +- fortios/resource_systemreplacemsg_icap.go | 2 +- fortios/resource_systemreplacemsg_mail.go | 2 +- fortios/resource_systemreplacemsg_nacquar.go | 2 +- fortios/resource_systemreplacemsg_nntp.go | 2 +- fortios/resource_systemreplacemsg_spam.go | 2 +- fortios/resource_systemreplacemsg_sslvpn.go | 2 +- fortios/resource_systemreplacemsg_trafficquota.go | 2 +- fortios/resource_systemreplacemsg_utm.go | 2 +- fortios/resource_systemreplacemsg_webproxy.go | 2 +- fortios/resource_systemsnmp_community.go | 2 +- fortios/resource_systemsnmp_user.go | 2 +- fortios/resource_user_adgrp.go | 2 +- fortios/resource_user_device.go | 3 ++- fortios/resource_user_deviceaccesslist.go | 2 +- fortios/resource_user_devicecategory.go | 2 +- fortios/resource_user_devicegroup.go | 2 +- fortios/resource_user_domaincontroller.go | 3 ++- fortios/resource_user_fortitoken.go | 3 ++- fortios/resource_user_fsso.go | 2 +- fortios/resource_user_fssopolling.go | 3 ++- fortios/resource_user_group.go | 3 ++- fortios/resource_user_krbkeytab.go | 3 ++- fortios/resource_user_ldap.go | 3 ++- fortios/resource_user_local.go | 3 ++- fortios/resource_user_passwordpolicy.go | 3 ++- fortios/resource_user_peer.go | 3 ++- fortios/resource_user_peergrp.go | 3 ++- fortios/resource_user_pop3.go | 3 ++- fortios/resource_user_radius.go | 3 ++- fortios/resource_user_saml.go | 3 ++- fortios/resource_user_securityexemptlist.go | 3 ++- fortios/resource_user_tacacs.go | 3 ++- fortios/resource_voip_profile.go | 2 +- fortios/resource_vpncertificate_ca.go | 2 +- fortios/resource_vpncertificate_crl.go | 2 +- fortios/resource_vpncertificate_local.go | 2 +- fortios/resource_vpncertificate_ocspserver.go | 3 ++- fortios/resource_vpncertificate_remote.go | 2 +- fortios/resource_vpnipsec_concentrator.go | 3 ++- fortios/resource_vpnipsec_forticlient.go | 3 ++- fortios/resource_vpnipsec_manualkey.go | 3 ++- fortios/resource_vpnipsec_manualkeyinterface.go | 3 ++- fortios/resource_vpnipsec_phase1.go | 3 ++- fortios/resource_vpnipsec_phase1interface.go | 3 ++- fortios/resource_vpnipsec_phase2.go | 3 ++- fortios/resource_vpnipsec_phase2interface.go | 3 ++- fortios/resource_vpnsslweb_hostchecksoftware.go | 3 ++- fortios/resource_vpnsslweb_portal.go | 3 ++- fortios/resource_vpnsslweb_realm.go | 3 ++- fortios/resource_vpnsslweb_userbookmark.go | 3 ++- fortios/resource_vpnsslweb_usergroupbookmark.go | 3 ++- fortios/resource_waf_mainclass.go | 3 ++- fortios/resource_waf_profile.go | 3 ++- fortios/resource_waf_signature.go | 3 ++- fortios/resource_waf_subclass.go | 3 ++- fortios/resource_wanopt_authgroup.go | 3 ++- fortios/resource_wanopt_contentdeliverynetworkrule.go | 3 ++- fortios/resource_wanopt_peer.go | 3 ++- fortios/resource_wanopt_profile.go | 3 ++- fortios/resource_webfilter_content.go | 2 +- fortios/resource_webfilter_contentheader.go | 2 +- fortios/resource_webfilter_ftgdlocalcat.go | 3 ++- fortios/resource_webfilter_ftgdlocalrating.go | 3 ++- fortios/resource_webfilter_override.go | 3 ++- fortios/resource_webfilter_profile.go | 2 +- fortios/resource_webfilter_searchengine.go | 2 +- fortios/resource_webfilter_urlfilter.go | 2 +- fortios/resource_webproxy_debugurl.go | 3 ++- fortios/resource_webproxy_forwardserver.go | 3 ++- fortios/resource_webproxy_forwardservergroup.go | 3 ++- fortios/resource_webproxy_profile.go | 3 ++- fortios/resource_webproxy_urlmatch.go | 3 ++- fortios/resource_webproxy_wisp.go | 2 +- fortios/resource_wirelesscontroller_apstatus.go | 3 ++- fortios/resource_wirelesscontroller_bleprofile.go | 3 ++- fortios/resource_wirelesscontroller_bonjourprofile.go | 3 ++- fortios/resource_wirelesscontroller_qosprofile.go | 3 ++- fortios/resource_wirelesscontroller_region.go | 3 ++- fortios/resource_wirelesscontroller_utmprofile.go | 3 ++- fortios/resource_wirelesscontroller_vap.go | 2 +- fortios/resource_wirelesscontroller_vapgroup.go | 2 +- fortios/resource_wirelesscontroller_widsprofile.go | 3 ++- fortios/resource_wirelesscontroller_wtp.go | 3 ++- fortios/resource_wirelesscontroller_wtpgroup.go | 3 ++- fortios/resource_wirelesscontroller_wtpprofile.go | 3 ++- ...ource_wirelesscontrollerhotspot20_anqp3gppcellular.go | 3 ++- ...urce_wirelesscontrollerhotspot20_anqpipaddresstype.go | 3 ++- .../resource_wirelesscontrollerhotspot20_anqpnairealm.go | 3 ++- ...ce_wirelesscontrollerhotspot20_anqpnetworkauthtype.go | 3 ++- ..._wirelesscontrollerhotspot20_anqproamingconsortium.go | 3 ++- ...resource_wirelesscontrollerhotspot20_anqpvenuename.go | 3 ++- ...rce_wirelesscontrollerhotspot20_h2qpconncapability.go | 3 ++- ...ource_wirelesscontrollerhotspot20_h2qpoperatorname.go | 3 ++- ...source_wirelesscontrollerhotspot20_h2qposuprovider.go | 3 ++- ...resource_wirelesscontrollerhotspot20_h2qpwanmetric.go | 3 ++- .../resource_wirelesscontrollerhotspot20_hsprofile.go | 3 ++- fortios/resource_wirelesscontrollerhotspot20_icon.go | 3 ++- fortios/resource_wirelesscontrollerhotspot20_qosmap.go | 3 ++- website/docs/r/fortios_application_custom.html.markdown | 2 +- website/docs/r/fortios_application_group.html.markdown | 2 +- website/docs/r/fortios_application_name.html.markdown | 2 +- website/docs/r/fortios_authentication_rule.html.markdown | 2 +- .../docs/r/fortios_authentication_scheme.html.markdown | 2 +- website/docs/r/fortios_dlp_fpdocsource.html.markdown | 2 +- .../docs/r/fortios_endpointcontrol_client.html.markdown | 2 +- .../fortios_endpointcontrol_forticlientems.html.markdown | 2 +- ...ointcontrol_forticlientregistrationsync.html.markdown | 2 +- .../docs/r/fortios_endpointcontrol_profile.html.markdown | 2 +- ...s_endpointcontrol_registeredforticlient.html.markdown | 2 +- website/docs/r/fortios_firewall_DoSpolicy.html.markdown | 2 +- website/docs/r/fortios_firewall_DoSpolicy6.html.markdown | 2 +- website/docs/r/fortios_firewall_address.html.markdown | 2 +- website/docs/r/fortios_firewall_address6.html.markdown | 2 +- website/docs/r/fortios_firewall_addrgrp6.html.markdown | 2 +- .../docs/r/fortios_firewall_centralsnatmap.html.markdown | 2 +- .../docs/r/fortios_firewall_dnstranslation.html.markdown | 2 +- .../r/fortios_firewall_interfacepolicy.html.markdown | 2 +- .../r/fortios_firewall_interfacepolicy6.html.markdown | 2 +- .../r/fortios_firewall_internetservice.html.markdown | 2 +- .../fortios_firewall_internetservicecustom.html.markdown | 2 +- ...ios_firewall_internetservicecustomgroup.html.markdown | 2 +- ...tios_firewall_internetservicedefinition.html.markdown | 2 +- ...rtios_firewall_internetserviceextension.html.markdown | 2 +- .../fortios_firewall_internetservicegroup.html.markdown | 2 +- website/docs/r/fortios_firewall_ippool.html.markdown | 2 +- website/docs/r/fortios_firewall_ippool6.html.markdown | 2 +- .../docs/r/fortios_firewall_iptranslation.html.markdown | 2 +- website/docs/r/fortios_firewall_ldbmonitor.html.markdown | 2 +- .../docs/r/fortios_firewall_localinpolicy.html.markdown | 2 +- .../docs/r/fortios_firewall_localinpolicy6.html.markdown | 2 +- .../r/fortios_firewall_multicastaddress.html.markdown | 2 +- .../r/fortios_firewall_multicastaddress6.html.markdown | 2 +- .../r/fortios_firewall_multicastpolicy.html.markdown | 2 +- .../r/fortios_firewall_multicastpolicy6.html.markdown | 2 +- website/docs/r/fortios_firewall_policy.html.markdown | 2 +- website/docs/r/fortios_firewall_policy46.html.markdown | 2 +- website/docs/r/fortios_firewall_policy6.html.markdown | 2 +- website/docs/r/fortios_firewall_policy64.html.markdown | 2 +- .../docs/r/fortios_firewall_proxyaddress.html.markdown | 2 +- .../docs/r/fortios_firewall_proxyaddrgrp.html.markdown | 2 +- .../docs/r/fortios_firewall_proxypolicy.html.markdown | 2 +- .../docs/r/fortios_firewall_shapingpolicy.html.markdown | 2 +- website/docs/r/fortios_firewall_sniffer.html.markdown | 2 +- website/docs/r/fortios_firewall_sslserver.html.markdown | 2 +- website/docs/r/fortios_firewall_vip.html.markdown | 2 +- website/docs/r/fortios_firewall_vip46.html.markdown | 2 +- website/docs/r/fortios_firewall_vip6.html.markdown | 2 +- website/docs/r/fortios_firewall_vip64.html.markdown | 2 +- website/docs/r/fortios_firewall_vipgrp.html.markdown | 2 +- website/docs/r/fortios_firewall_vipgrp46.html.markdown | 2 +- website/docs/r/fortios_firewall_vipgrp6.html.markdown | 2 +- website/docs/r/fortios_firewall_vipgrp64.html.markdown | 2 +- .../r/fortios_firewallconsolidated_policy.html.markdown | 2 +- .../r/fortios_firewallipmacbinding_table.html.markdown | 2 +- .../r/fortios_firewallservice_category.html.markdown | 2 +- .../docs/r/fortios_firewallservice_custom.html.markdown | 2 +- .../r/fortios_firewallshaper_peripshaper.html.markdown | 2 +- .../r/fortios_firewallshaper_trafficshaper.html.markdown | 2 +- website/docs/r/fortios_firewallssh_hostkey.html.markdown | 2 +- website/docs/r/fortios_firewallssh_localca.html.markdown | 2 +- .../docs/r/fortios_firewallssh_localkey.html.markdown | 2 +- .../r/fortios_firewallwildcardfqdn_custom.html.markdown | 2 +- .../r/fortios_firewallwildcardfqdn_group.html.markdown | 2 +- website/docs/r/fortios_icap_profile.html.markdown | 2 +- website/docs/r/fortios_icap_server.html.markdown | 2 +- website/docs/r/fortios_ips_custom.html.markdown | 2 +- website/docs/r/fortios_ips_decoder.html.markdown | 2 +- website/docs/r/fortios_ips_rule.html.markdown | 2 +- website/docs/r/fortios_log_customfield.html.markdown | 2 +- website/docs/r/fortios_report_layout.html.markdown | 2 +- website/docs/r/fortios_report_style.html.markdown | 2 +- website/docs/r/fortios_report_theme.html.markdown | 2 +- website/docs/r/fortios_router_policy.html.markdown | 2 +- website/docs/r/fortios_router_policy6.html.markdown | 2 +- website/docs/r/fortios_router_static.html.markdown | 2 +- website/docs/r/fortios_router_static6.html.markdown | 2 +- website/docs/r/fortios_sshfilter_profile.html.markdown | 2 +- .../fortios_switchcontroller_customcommand.html.markdown | 2 +- .../r/fortios_switchcontroller_lldpprofile.html.markdown | 2 +- .../r/fortios_switchcontroller_switchgroup.html.markdown | 2 +- .../fortios_switchcontroller_switchprofile.html.markdown | 2 +- ...ortios_switchcontroller_virtualportpool.html.markdown | 2 +- .../docs/r/fortios_switchcontroller_vlan.html.markdown | 2 +- ...os_switchcontrollersecuritypolicy_8021X.html.markdown | 2 +- ...hcontrollersecuritypolicy_captiveportal.html.markdown | 2 +- website/docs/r/fortios_system_admin.html.markdown | 2 +- website/docs/r/fortios_system_alias.html.markdown | 2 +- website/docs/r/fortios_system_apiuser.html.markdown | 2 +- .../docs/r/fortios_system_automationaction.html.markdown | 2 +- .../r/fortios_system_automationdestination.html.markdown | 2 +- .../docs/r/fortios_system_automationstitch.html.markdown | 2 +- .../r/fortios_system_automationtrigger.html.markdown | 2 +- website/docs/r/fortios_system_autoscript.html.markdown | 2 +- website/docs/r/fortios_system_clustersync.html.markdown | 2 +- website/docs/r/fortios_system_ddns.html.markdown | 2 +- website/docs/r/fortios_system_dnsserver.html.markdown | 2 +- .../r/fortios_system_dscpbasedpriority.html.markdown | 2 +- website/docs/r/fortios_system_geneve.html.markdown | 2 +- website/docs/r/fortios_system_gretunnel.html.markdown | 2 +- website/docs/r/fortios_system_interface.html.markdown | 2 +- website/docs/r/fortios_system_ipiptunnel.html.markdown | 2 +- .../docs/r/fortios_system_ipsecaggregate.html.markdown | 2 +- website/docs/r/fortios_system_ipv6tunnel.html.markdown | 2 +- website/docs/r/fortios_system_linkmonitor.html.markdown | 2 +- website/docs/r/fortios_system_mobiletunnel.html.markdown | 2 +- .../docs/r/fortios_system_objecttagging.html.markdown | 2 +- .../docs/r/fortios_system_pppoeinterface.html.markdown | 2 +- .../docs/r/fortios_system_replacemsggroup.html.markdown | 2 +- .../docs/r/fortios_system_replacemsgimage.html.markdown | 2 +- website/docs/r/fortios_system_sdnconnector.html.markdown | 2 +- .../docs/r/fortios_system_sessionhelper.html.markdown | 2 +- website/docs/r/fortios_system_sittunnel.html.markdown | 2 +- website/docs/r/fortios_system_smsserver.html.markdown | 2 +- website/docs/r/fortios_system_ssoadmin.html.markdown | 2 +- website/docs/r/fortios_system_storage.html.markdown | 2 +- .../docs/r/fortios_system_tosbasedpriority.html.markdown | 2 +- website/docs/r/fortios_system_vdom.html.markdown | 2 +- .../docs/r/fortios_system_vdomexception.html.markdown | 2 +- website/docs/r/fortios_system_vdomlink.html.markdown | 2 +- website/docs/r/fortios_system_vdomproperty.html.markdown | 2 +- .../docs/r/fortios_system_vdomradiusserver.html.markdown | 2 +- .../docs/r/fortios_system_virtualwirepair.html.markdown | 2 +- website/docs/r/fortios_system_vxlan.html.markdown | 2 +- website/docs/r/fortios_system_wccp.html.markdown | 2 +- website/docs/r/fortios_system_zone.html.markdown | 2 +- website/docs/r/fortios_user_device.html.markdown | 2 +- .../docs/r/fortios_user_domaincontroller.html.markdown | 2 +- website/docs/r/fortios_user_fortitoken.html.markdown | 2 +- website/docs/r/fortios_user_fssopolling.html.markdown | 2 +- website/docs/r/fortios_user_group.html.markdown | 2 +- website/docs/r/fortios_user_krbkeytab.html.markdown | 2 +- website/docs/r/fortios_user_ldap.html.markdown | 2 +- website/docs/r/fortios_user_local.html.markdown | 2 +- website/docs/r/fortios_user_passwordpolicy.html.markdown | 2 +- website/docs/r/fortios_user_peer.html.markdown | 2 +- website/docs/r/fortios_user_peergrp.html.markdown | 2 +- website/docs/r/fortios_user_pop3.html.markdown | 2 +- website/docs/r/fortios_user_radius.html.markdown | 2 +- website/docs/r/fortios_user_saml.html.markdown | 2 +- .../docs/r/fortios_user_securityexemptlist.html.markdown | 2 +- website/docs/r/fortios_user_tacacs.html.markdown | 2 +- .../r/fortios_vpncertificate_ocspserver.html.markdown | 2 +- .../docs/r/fortios_vpnipsec_concentrator.html.markdown | 2 +- .../docs/r/fortios_vpnipsec_forticlient.html.markdown | 2 +- website/docs/r/fortios_vpnipsec_manualkey.html.markdown | 2 +- .../r/fortios_vpnipsec_manualkeyinterface.html.markdown | 2 +- website/docs/r/fortios_vpnipsec_phase1.html.markdown | 2 +- .../r/fortios_vpnipsec_phase1interface.html.markdown | 2 +- website/docs/r/fortios_vpnipsec_phase2.html.markdown | 2 +- .../r/fortios_vpnipsec_phase2interface.html.markdown | 2 +- .../r/fortios_vpnsslweb_hostchecksoftware.html.markdown | 2 +- website/docs/r/fortios_vpnsslweb_portal.html.markdown | 2 +- website/docs/r/fortios_vpnsslweb_realm.html.markdown | 2 +- .../docs/r/fortios_vpnsslweb_userbookmark.html.markdown | 2 +- .../r/fortios_vpnsslweb_usergroupbookmark.html.markdown | 2 +- website/docs/r/fortios_waf_mainclass.html.markdown | 2 +- website/docs/r/fortios_waf_profile.html.markdown | 2 +- website/docs/r/fortios_waf_signature.html.markdown | 2 +- website/docs/r/fortios_waf_subclass.html.markdown | 2 +- website/docs/r/fortios_wanopt_authgroup.html.markdown | 2 +- ...rtios_wanopt_contentdeliverynetworkrule.html.markdown | 2 +- website/docs/r/fortios_wanopt_peer.html.markdown | 2 +- website/docs/r/fortios_wanopt_profile.html.markdown | 2 +- .../docs/r/fortios_webfilter_ftgdlocalcat.html.markdown | 2 +- .../r/fortios_webfilter_ftgdlocalrating.html.markdown | 2 +- website/docs/r/fortios_webfilter_override.html.markdown | 2 +- website/docs/r/fortios_webproxy_debugurl.html.markdown | 2 +- .../docs/r/fortios_webproxy_forwardserver.html.markdown | 2 +- .../r/fortios_webproxy_forwardservergroup.html.markdown | 2 +- website/docs/r/fortios_webproxy_profile.html.markdown | 2 +- website/docs/r/fortios_webproxy_urlmatch.html.markdown | 2 +- .../r/fortios_wirelesscontroller_apstatus.html.markdown | 2 +- .../fortios_wirelesscontroller_bleprofile.html.markdown | 2 +- ...rtios_wirelesscontroller_bonjourprofile.html.markdown | 2 +- .../fortios_wirelesscontroller_qosprofile.html.markdown | 2 +- .../r/fortios_wirelesscontroller_region.html.markdown | 2 +- .../fortios_wirelesscontroller_utmprofile.html.markdown | 2 +- .../fortios_wirelesscontroller_widsprofile.html.markdown | 2 +- .../docs/r/fortios_wirelesscontroller_wtp.html.markdown | 2 +- .../r/fortios_wirelesscontroller_wtpgroup.html.markdown | 2 +- .../fortios_wirelesscontroller_wtpprofile.html.markdown | 2 +- ...esscontrollerhotspot20_anqp3gppcellular.html.markdown | 2 +- ...sscontrollerhotspot20_anqpipaddresstype.html.markdown | 2 +- ...irelesscontrollerhotspot20_anqpnairealm.html.markdown | 2 +- ...controllerhotspot20_anqpnetworkauthtype.html.markdown | 2 +- ...ntrollerhotspot20_anqproamingconsortium.html.markdown | 2 +- ...relesscontrollerhotspot20_anqpvenuename.html.markdown | 2 +- ...scontrollerhotspot20_h2qpconncapability.html.markdown | 2 +- ...esscontrollerhotspot20_h2qpoperatorname.html.markdown | 2 +- ...lesscontrollerhotspot20_h2qposuprovider.html.markdown | 2 +- ...relesscontrollerhotspot20_h2qpwanmetric.html.markdown | 2 +- ...s_wirelesscontrollerhotspot20_hsprofile.html.markdown | 2 +- ...ortios_wirelesscontrollerhotspot20_icon.html.markdown | 2 +- ...tios_wirelesscontrollerhotspot20_qosmap.html.markdown | 2 +- 494 files changed, 682 insertions(+), 535 deletions(-) diff --git a/fortios/resource_antivirus_profile.go b/fortios/resource_antivirus_profile.go index 55e8b063b..3912d2ea9 100644 --- a/fortios/resource_antivirus_profile.go +++ b/fortios/resource_antivirus_profile.go @@ -32,8 +32,8 @@ func resourceAntivirusProfile() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_application_custom.go b/fortios/resource_application_custom.go index e61657941..a72679ff9 100644 --- a/fortios/resource_application_custom.go +++ b/fortios/resource_application_custom.go @@ -32,8 +32,9 @@ func resourceApplicationCustom() *schema.Resource { "tag": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "name": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_application_group.go b/fortios/resource_application_group.go index db98dacca..80c518685 100644 --- a/fortios/resource_application_group.go +++ b/fortios/resource_application_group.go @@ -32,8 +32,9 @@ func resourceApplicationGroup() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_application_list.go b/fortios/resource_application_list.go index c7ab99181..b73464126 100644 --- a/fortios/resource_application_list.go +++ b/fortios/resource_application_list.go @@ -32,8 +32,8 @@ func resourceApplicationList() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_application_name.go b/fortios/resource_application_name.go index dd06f126e..42607b03c 100644 --- a/fortios/resource_application_name.go +++ b/fortios/resource_application_name.go @@ -32,8 +32,9 @@ func resourceApplicationName() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "fosid": &schema.Schema{ Type: schema.TypeInt, diff --git a/fortios/resource_authentication_rule.go b/fortios/resource_authentication_rule.go index ae858deeb..1e1340e8d 100644 --- a/fortios/resource_authentication_rule.go +++ b/fortios/resource_authentication_rule.go @@ -32,8 +32,9 @@ func resourceAuthenticationRule() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_authentication_scheme.go b/fortios/resource_authentication_scheme.go index bf36e199b..e77f3ea4c 100644 --- a/fortios/resource_authentication_scheme.go +++ b/fortios/resource_authentication_scheme.go @@ -32,8 +32,9 @@ func resourceAuthenticationScheme() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "method": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_certificate_ca.go b/fortios/resource_certificate_ca.go index 1145a1154..153fe866c 100644 --- a/fortios/resource_certificate_ca.go +++ b/fortios/resource_certificate_ca.go @@ -32,8 +32,8 @@ func resourceCertificateCa() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 79), - Required: true, ForceNew: true, + Required: true, }, "ca": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_certificate_crl.go b/fortios/resource_certificate_crl.go index be88f5f34..4aaa3925b 100644 --- a/fortios/resource_certificate_crl.go +++ b/fortios/resource_certificate_crl.go @@ -32,8 +32,8 @@ func resourceCertificateCrl() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "crl": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_certificate_local.go b/fortios/resource_certificate_local.go index ba0d489ba..a04b115c0 100644 --- a/fortios/resource_certificate_local.go +++ b/fortios/resource_certificate_local.go @@ -32,8 +32,8 @@ func resourceCertificateLocal() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "password": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_dlp_filepattern.go b/fortios/resource_dlp_filepattern.go index a9971cace..f5f3c9d58 100644 --- a/fortios/resource_dlp_filepattern.go +++ b/fortios/resource_dlp_filepattern.go @@ -31,8 +31,8 @@ func resourceDlpFilepattern() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Required: true, }, "name": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_dlp_fpdocsource.go b/fortios/resource_dlp_fpdocsource.go index cfd7a2195..718827ea6 100644 --- a/fortios/resource_dlp_fpdocsource.go +++ b/fortios/resource_dlp_fpdocsource.go @@ -32,8 +32,9 @@ func resourceDlpFpDocSource() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "server_type": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_dlp_sensor.go b/fortios/resource_dlp_sensor.go index 9d3feb524..9ad219b59 100644 --- a/fortios/resource_dlp_sensor.go +++ b/fortios/resource_dlp_sensor.go @@ -32,8 +32,8 @@ func resourceDlpSensor() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_dnsfilter_domainfilter.go b/fortios/resource_dnsfilter_domainfilter.go index 3cd2eee25..11af7b656 100644 --- a/fortios/resource_dnsfilter_domainfilter.go +++ b/fortios/resource_dnsfilter_domainfilter.go @@ -31,8 +31,8 @@ func resourceDnsfilterDomainFilter() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Required: true, }, "name": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_dnsfilter_profile.go b/fortios/resource_dnsfilter_profile.go index ba2b11e5d..d5addb177 100644 --- a/fortios/resource_dnsfilter_profile.go +++ b/fortios/resource_dnsfilter_profile.go @@ -32,8 +32,8 @@ func resourceDnsfilterProfile() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_endpointcontrol_client.go b/fortios/resource_endpointcontrol_client.go index 476b0b717..f818381ef 100644 --- a/fortios/resource_endpointcontrol_client.go +++ b/fortios/resource_endpointcontrol_client.go @@ -31,8 +31,9 @@ func resourceEndpointControlClient() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "ftcl_uid": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_endpointcontrol_forticlientems.go b/fortios/resource_endpointcontrol_forticlientems.go index 153b7612b..f9ca146d8 100644 --- a/fortios/resource_endpointcontrol_forticlientems.go +++ b/fortios/resource_endpointcontrol_forticlientems.go @@ -32,8 +32,9 @@ func resourceEndpointControlForticlientEms() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "address": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_endpointcontrol_forticlientregistrationsync.go b/fortios/resource_endpointcontrol_forticlientregistrationsync.go index f260fb6ef..88dccd5fa 100644 --- a/fortios/resource_endpointcontrol_forticlientregistrationsync.go +++ b/fortios/resource_endpointcontrol_forticlientregistrationsync.go @@ -32,8 +32,9 @@ func resourceEndpointControlForticlientRegistrationSync() *schema.Resource { "peer_name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "peer_ip": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_endpointcontrol_profile.go b/fortios/resource_endpointcontrol_profile.go index 678e591b9..e860d438c 100644 --- a/fortios/resource_endpointcontrol_profile.go +++ b/fortios/resource_endpointcontrol_profile.go @@ -32,8 +32,9 @@ func resourceEndpointControlProfile() *schema.Resource { "profile_name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "forticlient_winmac_settings": &schema.Schema{ Type: schema.TypeList, diff --git a/fortios/resource_endpointcontrol_registeredforticlient.go b/fortios/resource_endpointcontrol_registeredforticlient.go index c541cc46b..23f7fd7be 100644 --- a/fortios/resource_endpointcontrol_registeredforticlient.go +++ b/fortios/resource_endpointcontrol_registeredforticlient.go @@ -32,8 +32,9 @@ func resourceEndpointControlRegisteredForticlient() *schema.Resource { "uid": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 32), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "vdom": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_extendercontroller_extender.go b/fortios/resource_extendercontroller_extender.go index 9abc54d7b..922685378 100644 --- a/fortios/resource_extendercontroller_extender.go +++ b/fortios/resource_extendercontroller_extender.go @@ -32,8 +32,8 @@ func resourceExtenderControllerExtender() *schema.Resource { "fosid": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 19), - Required: true, ForceNew: true, + Required: true, }, "admin": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_extendercontroller_extender1.go b/fortios/resource_extendercontroller_extender1.go index d24f8483f..51e362b5d 100644 --- a/fortios/resource_extendercontroller_extender1.go +++ b/fortios/resource_extendercontroller_extender1.go @@ -32,8 +32,8 @@ func resourceExtenderControllerExtender1() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 19), - Required: true, ForceNew: true, + Required: true, }, "fosid": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_DoSpolicy.go b/fortios/resource_firewall_DoSpolicy.go index b4bd7f1ba..287776754 100644 --- a/fortios/resource_firewall_DoSpolicy.go +++ b/fortios/resource_firewall_DoSpolicy.go @@ -32,8 +32,9 @@ func resourceFirewallDosPolicy() *schema.Resource { "policyid": &schema.Schema{ Type: schema.TypeInt, ValidateFunc: validation.IntBetween(0, 9999), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_DoSpolicy6.go b/fortios/resource_firewall_DoSpolicy6.go index 616dcae1d..62087a4e8 100644 --- a/fortios/resource_firewall_DoSpolicy6.go +++ b/fortios/resource_firewall_DoSpolicy6.go @@ -32,8 +32,9 @@ func resourceFirewallDosPolicy6() *schema.Resource { "policyid": &schema.Schema{ Type: schema.TypeInt, ValidateFunc: validation.IntBetween(0, 9999), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_address.go b/fortios/resource_firewall_address.go index 96492ae9c..a4cf8f2c1 100644 --- a/fortios/resource_firewall_address.go +++ b/fortios/resource_firewall_address.go @@ -32,8 +32,8 @@ func resourceFirewallAddress() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "uuid": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_address6.go b/fortios/resource_firewall_address6.go index 50349d61b..86686a387 100644 --- a/fortios/resource_firewall_address6.go +++ b/fortios/resource_firewall_address6.go @@ -32,8 +32,8 @@ func resourceFirewallAddress6() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "uuid": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_address6template.go b/fortios/resource_firewall_address6template.go index 4506b43b8..6a7964925 100644 --- a/fortios/resource_firewall_address6template.go +++ b/fortios/resource_firewall_address6template.go @@ -33,7 +33,6 @@ func resourceFirewallAddress6Template() *schema.Resource { Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), Required: true, - ForceNew: true, }, "ip6": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_addrgrp.go b/fortios/resource_firewall_addrgrp.go index 69e2648fe..640c056f7 100644 --- a/fortios/resource_firewall_addrgrp.go +++ b/fortios/resource_firewall_addrgrp.go @@ -33,7 +33,6 @@ func resourceFirewallAddrgrp() *schema.Resource { Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), Required: true, - ForceNew: true, }, "uuid": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_addrgrp6.go b/fortios/resource_firewall_addrgrp6.go index 0de26bbc2..1cd7d212e 100644 --- a/fortios/resource_firewall_addrgrp6.go +++ b/fortios/resource_firewall_addrgrp6.go @@ -32,8 +32,8 @@ func resourceFirewallAddrgrp6() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "uuid": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_centralsnatmap.go b/fortios/resource_firewall_centralsnatmap.go index 574784bdb..0fbf3cb24 100644 --- a/fortios/resource_firewall_centralsnatmap.go +++ b/fortios/resource_firewall_centralsnatmap.go @@ -31,8 +31,9 @@ func resourceFirewallCentralSnatMap() *schema.Resource { Schema: map[string]*schema.Schema{ "policyid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_dnstranslation.go b/fortios/resource_firewall_dnstranslation.go index 608acdf79..e15342fc9 100644 --- a/fortios/resource_firewall_dnstranslation.go +++ b/fortios/resource_firewall_dnstranslation.go @@ -31,8 +31,8 @@ func resourceFirewallDnstranslation() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "src": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_identitybasedroute.go b/fortios/resource_firewall_identitybasedroute.go index ede2ef02a..95e472853 100644 --- a/fortios/resource_firewall_identitybasedroute.go +++ b/fortios/resource_firewall_identitybasedroute.go @@ -33,7 +33,6 @@ func resourceFirewallIdentityBasedRoute() *schema.Resource { Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), Required: true, - ForceNew: true, }, "comments": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_interfacepolicy.go b/fortios/resource_firewall_interfacepolicy.go index 699bfc11c..76c39db1d 100644 --- a/fortios/resource_firewall_interfacepolicy.go +++ b/fortios/resource_firewall_interfacepolicy.go @@ -31,8 +31,9 @@ func resourceFirewallInterfacePolicy() *schema.Resource { Schema: map[string]*schema.Schema{ "policyid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_interfacepolicy6.go b/fortios/resource_firewall_interfacepolicy6.go index 603bc8386..6bc85db6b 100644 --- a/fortios/resource_firewall_interfacepolicy6.go +++ b/fortios/resource_firewall_interfacepolicy6.go @@ -31,8 +31,9 @@ func resourceFirewallInterfacePolicy6() *schema.Resource { Schema: map[string]*schema.Schema{ "policyid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_internetservice.go b/fortios/resource_firewall_internetservice.go index 8676c1e74..247e99d87 100644 --- a/fortios/resource_firewall_internetservice.go +++ b/fortios/resource_firewall_internetservice.go @@ -31,8 +31,8 @@ func resourceFirewallInternetService() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "name": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_internetservicecustom.go b/fortios/resource_firewall_internetservicecustom.go index ebd082280..aa919c871 100644 --- a/fortios/resource_firewall_internetservicecustom.go +++ b/fortios/resource_firewall_internetservicecustom.go @@ -32,8 +32,8 @@ func resourceFirewallInternetServiceCustom() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "reputation": &schema.Schema{ Type: schema.TypeInt, diff --git a/fortios/resource_firewall_internetservicecustomgroup.go b/fortios/resource_firewall_internetservicecustomgroup.go index be2b54067..379128a77 100644 --- a/fortios/resource_firewall_internetservicecustomgroup.go +++ b/fortios/resource_firewall_internetservicecustomgroup.go @@ -32,8 +32,8 @@ func resourceFirewallInternetServiceCustomGroup() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_internetservicedefinition.go b/fortios/resource_firewall_internetservicedefinition.go index ece1da391..c7f9c9500 100644 --- a/fortios/resource_firewall_internetservicedefinition.go +++ b/fortios/resource_firewall_internetservicedefinition.go @@ -31,8 +31,8 @@ func resourceFirewallInternetServiceDefinition() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "entry": &schema.Schema{ Type: schema.TypeList, diff --git a/fortios/resource_firewall_internetserviceextension.go b/fortios/resource_firewall_internetserviceextension.go index 257abc49a..1bb6e1b17 100644 --- a/fortios/resource_firewall_internetserviceextension.go +++ b/fortios/resource_firewall_internetserviceextension.go @@ -31,8 +31,8 @@ func resourceFirewallInternetServiceExtension() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_internetservicegroup.go b/fortios/resource_firewall_internetservicegroup.go index 859ff6ed8..e64743d97 100644 --- a/fortios/resource_firewall_internetservicegroup.go +++ b/fortios/resource_firewall_internetservicegroup.go @@ -32,8 +32,8 @@ func resourceFirewallInternetServiceGroup() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_ippool.go b/fortios/resource_firewall_ippool.go index f104fe204..221143ccd 100644 --- a/fortios/resource_firewall_ippool.go +++ b/fortios/resource_firewall_ippool.go @@ -32,8 +32,8 @@ func resourceFirewallIppool() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "type": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_ippool6.go b/fortios/resource_firewall_ippool6.go index 40dc44650..d048f7c55 100644 --- a/fortios/resource_firewall_ippool6.go +++ b/fortios/resource_firewall_ippool6.go @@ -32,8 +32,8 @@ func resourceFirewallIppool6() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "startip": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_iptranslation.go b/fortios/resource_firewall_iptranslation.go index 389d054e1..03ba4367c 100644 --- a/fortios/resource_firewall_iptranslation.go +++ b/fortios/resource_firewall_iptranslation.go @@ -31,8 +31,8 @@ func resourceFirewallIpTranslation() *schema.Resource { Schema: map[string]*schema.Schema{ "transid": &schema.Schema{ Type: schema.TypeInt, - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "type": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_ldbmonitor.go b/fortios/resource_firewall_ldbmonitor.go index 27c9ad29a..f2b647bdf 100644 --- a/fortios/resource_firewall_ldbmonitor.go +++ b/fortios/resource_firewall_ldbmonitor.go @@ -32,8 +32,8 @@ func resourceFirewallLdbMonitor() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "type": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_localinpolicy.go b/fortios/resource_firewall_localinpolicy.go index 14f67b436..ea8351ba8 100644 --- a/fortios/resource_firewall_localinpolicy.go +++ b/fortios/resource_firewall_localinpolicy.go @@ -31,8 +31,9 @@ func resourceFirewallLocalInPolicy() *schema.Resource { Schema: map[string]*schema.Schema{ "policyid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "ha_mgmt_intf_only": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_localinpolicy6.go b/fortios/resource_firewall_localinpolicy6.go index 2dcd57d3f..b7f43a70e 100644 --- a/fortios/resource_firewall_localinpolicy6.go +++ b/fortios/resource_firewall_localinpolicy6.go @@ -31,8 +31,9 @@ func resourceFirewallLocalInPolicy6() *schema.Resource { Schema: map[string]*schema.Schema{ "policyid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "intf": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_multicastaddress.go b/fortios/resource_firewall_multicastaddress.go index b3148d61b..342e26366 100644 --- a/fortios/resource_firewall_multicastaddress.go +++ b/fortios/resource_firewall_multicastaddress.go @@ -32,8 +32,8 @@ func resourceFirewallMulticastAddress() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "type": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_multicastaddress6.go b/fortios/resource_firewall_multicastaddress6.go index fbb16cf7a..cff2b44a5 100644 --- a/fortios/resource_firewall_multicastaddress6.go +++ b/fortios/resource_firewall_multicastaddress6.go @@ -32,8 +32,8 @@ func resourceFirewallMulticastAddress6() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "ip6": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_multicastpolicy.go b/fortios/resource_firewall_multicastpolicy.go index 1d21fe07f..ecba7eec9 100644 --- a/fortios/resource_firewall_multicastpolicy.go +++ b/fortios/resource_firewall_multicastpolicy.go @@ -31,8 +31,9 @@ func resourceFirewallMulticastPolicy() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_multicastpolicy6.go b/fortios/resource_firewall_multicastpolicy6.go index d9936b770..0570349ff 100644 --- a/fortios/resource_firewall_multicastpolicy6.go +++ b/fortios/resource_firewall_multicastpolicy6.go @@ -31,8 +31,9 @@ func resourceFirewallMulticastPolicy6() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_policy.go b/fortios/resource_firewall_policy.go index e1358df5c..c7583485f 100644 --- a/fortios/resource_firewall_policy.go +++ b/fortios/resource_firewall_policy.go @@ -30,10 +30,11 @@ func resourceFirewallPolicy() *schema.Resource { Schema: map[string]*schema.Schema{ "policyid": &schema.Schema{ - Type: schema.TypeInt, - Optional: true, - Computed: true, - ForceNew: true, + Type: schema.TypeInt, + ValidateFunc: validation.IntBetween(1, 2147482999), + ForceNew: true, + Optional: true, + Computed: true, }, "name": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_policy46.go b/fortios/resource_firewall_policy46.go index cb5802088..d55b2633e 100644 --- a/fortios/resource_firewall_policy46.go +++ b/fortios/resource_firewall_policy46.go @@ -36,8 +36,9 @@ func resourceFirewallPolicy46() *schema.Resource { }, "policyid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "uuid": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_policy6.go b/fortios/resource_firewall_policy6.go index 344c6ca72..f26a9f535 100644 --- a/fortios/resource_firewall_policy6.go +++ b/fortios/resource_firewall_policy6.go @@ -31,8 +31,9 @@ func resourceFirewallPolicy6() *schema.Resource { Schema: map[string]*schema.Schema{ "policyid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "name": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_policy64.go b/fortios/resource_firewall_policy64.go index 0976f2c53..b3d82112d 100644 --- a/fortios/resource_firewall_policy64.go +++ b/fortios/resource_firewall_policy64.go @@ -31,8 +31,9 @@ func resourceFirewallPolicy64() *schema.Resource { Schema: map[string]*schema.Schema{ "policyid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "uuid": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_profilegroup.go b/fortios/resource_firewall_profilegroup.go index 7a565cee5..f01fd877c 100644 --- a/fortios/resource_firewall_profilegroup.go +++ b/fortios/resource_firewall_profilegroup.go @@ -33,7 +33,6 @@ func resourceFirewallProfileGroup() *schema.Resource { Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), Required: true, - ForceNew: true, }, "av_profile": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_profileprotocoloptions.go b/fortios/resource_firewall_profileprotocoloptions.go index 2f19f3a38..0be7a1082 100644 --- a/fortios/resource_firewall_profileprotocoloptions.go +++ b/fortios/resource_firewall_profileprotocoloptions.go @@ -33,7 +33,6 @@ func resourceFirewallProfileProtocolOptions() *schema.Resource { Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), Required: true, - ForceNew: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_proxyaddress.go b/fortios/resource_firewall_proxyaddress.go index d10818988..c3be6df0f 100644 --- a/fortios/resource_firewall_proxyaddress.go +++ b/fortios/resource_firewall_proxyaddress.go @@ -32,8 +32,8 @@ func resourceFirewallProxyAddress() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "uuid": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_proxyaddrgrp.go b/fortios/resource_firewall_proxyaddrgrp.go index e95568f23..d11e44d61 100644 --- a/fortios/resource_firewall_proxyaddrgrp.go +++ b/fortios/resource_firewall_proxyaddrgrp.go @@ -32,8 +32,8 @@ func resourceFirewallProxyAddrgrp() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "type": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_proxypolicy.go b/fortios/resource_firewall_proxypolicy.go index a5c4376d5..6a070b392 100644 --- a/fortios/resource_firewall_proxypolicy.go +++ b/fortios/resource_firewall_proxypolicy.go @@ -36,8 +36,9 @@ func resourceFirewallProxyPolicy() *schema.Resource { }, "policyid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "proxy": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_shapingpolicy.go b/fortios/resource_firewall_shapingpolicy.go index b62bd94af..26097cbe1 100644 --- a/fortios/resource_firewall_shapingpolicy.go +++ b/fortios/resource_firewall_shapingpolicy.go @@ -31,8 +31,9 @@ func resourceFirewallShapingPolicy() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "name": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_shapingprofile.go b/fortios/resource_firewall_shapingprofile.go index e28aeff02..32def6f83 100644 --- a/fortios/resource_firewall_shapingprofile.go +++ b/fortios/resource_firewall_shapingprofile.go @@ -33,7 +33,6 @@ func resourceFirewallShapingProfile() *schema.Resource { Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), Required: true, - ForceNew: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_sniffer.go b/fortios/resource_firewall_sniffer.go index b7b465c6a..8f29c1e69 100644 --- a/fortios/resource_firewall_sniffer.go +++ b/fortios/resource_firewall_sniffer.go @@ -32,8 +32,8 @@ func resourceFirewallSniffer() *schema.Resource { "fosid": &schema.Schema{ Type: schema.TypeInt, ValidateFunc: validation.IntBetween(0, 9999), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_sslserver.go b/fortios/resource_firewall_sslserver.go index 6bdb78c28..131d1ce44 100644 --- a/fortios/resource_firewall_sslserver.go +++ b/fortios/resource_firewall_sslserver.go @@ -32,8 +32,8 @@ func resourceFirewallSslServer() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "ip": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_sslsshprofile.go b/fortios/resource_firewall_sslsshprofile.go index d691e626e..40a30b7dc 100644 --- a/fortios/resource_firewall_sslsshprofile.go +++ b/fortios/resource_firewall_sslsshprofile.go @@ -33,7 +33,6 @@ func resourceFirewallSslSshProfile() *schema.Resource { Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), Required: true, - ForceNew: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_ttlpolicy.go b/fortios/resource_firewall_ttlpolicy.go index 7e6c0d939..7542a1af5 100644 --- a/fortios/resource_firewall_ttlpolicy.go +++ b/fortios/resource_firewall_ttlpolicy.go @@ -31,8 +31,8 @@ func resourceFirewallTtlPolicy() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Required: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_vip.go b/fortios/resource_firewall_vip.go index a6ab6c178..c516ed7c1 100644 --- a/fortios/resource_firewall_vip.go +++ b/fortios/resource_firewall_vip.go @@ -32,8 +32,8 @@ func resourceFirewallVip() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "fosid": &schema.Schema{ Type: schema.TypeInt, diff --git a/fortios/resource_firewall_vip46.go b/fortios/resource_firewall_vip46.go index f8cd70b18..9016811ea 100644 --- a/fortios/resource_firewall_vip46.go +++ b/fortios/resource_firewall_vip46.go @@ -32,8 +32,8 @@ func resourceFirewallVip46() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "fosid": &schema.Schema{ Type: schema.TypeInt, diff --git a/fortios/resource_firewall_vip6.go b/fortios/resource_firewall_vip6.go index c2283055d..c2f3a19cf 100644 --- a/fortios/resource_firewall_vip6.go +++ b/fortios/resource_firewall_vip6.go @@ -32,8 +32,8 @@ func resourceFirewallVip6() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "fosid": &schema.Schema{ Type: schema.TypeInt, diff --git a/fortios/resource_firewall_vip64.go b/fortios/resource_firewall_vip64.go index 8fd153d08..570980038 100644 --- a/fortios/resource_firewall_vip64.go +++ b/fortios/resource_firewall_vip64.go @@ -32,8 +32,8 @@ func resourceFirewallVip64() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "fosid": &schema.Schema{ Type: schema.TypeInt, diff --git a/fortios/resource_firewall_vipgrp.go b/fortios/resource_firewall_vipgrp.go index 1698930fe..921da15a1 100644 --- a/fortios/resource_firewall_vipgrp.go +++ b/fortios/resource_firewall_vipgrp.go @@ -32,8 +32,8 @@ func resourceFirewallVipgrp() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "uuid": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_vipgrp46.go b/fortios/resource_firewall_vipgrp46.go index fd0fc5a8a..3e972f618 100644 --- a/fortios/resource_firewall_vipgrp46.go +++ b/fortios/resource_firewall_vipgrp46.go @@ -32,8 +32,8 @@ func resourceFirewallVipgrp46() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "uuid": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_vipgrp6.go b/fortios/resource_firewall_vipgrp6.go index 6d1fd036e..bc95c5255 100644 --- a/fortios/resource_firewall_vipgrp6.go +++ b/fortios/resource_firewall_vipgrp6.go @@ -32,8 +32,8 @@ func resourceFirewallVipgrp6() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "uuid": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewall_vipgrp64.go b/fortios/resource_firewall_vipgrp64.go index 17cd666dc..8d665635b 100644 --- a/fortios/resource_firewall_vipgrp64.go +++ b/fortios/resource_firewall_vipgrp64.go @@ -32,8 +32,8 @@ func resourceFirewallVipgrp64() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "uuid": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewallconsolidated_policy.go b/fortios/resource_firewallconsolidated_policy.go index 96dce36ed..522ba553a 100644 --- a/fortios/resource_firewallconsolidated_policy.go +++ b/fortios/resource_firewallconsolidated_policy.go @@ -31,8 +31,9 @@ func resourceFirewallConsolidatedPolicy() *schema.Resource { Schema: map[string]*schema.Schema{ "policyid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewallipmacbinding_table.go b/fortios/resource_firewallipmacbinding_table.go index df937de3b..0f06c689d 100644 --- a/fortios/resource_firewallipmacbinding_table.go +++ b/fortios/resource_firewallipmacbinding_table.go @@ -31,8 +31,8 @@ func resourceFirewallIpmacbindingTable() *schema.Resource { Schema: map[string]*schema.Schema{ "seq_num": &schema.Schema{ Type: schema.TypeInt, - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "ip": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewallschedule_group.go b/fortios/resource_firewallschedule_group.go index 37727c8ae..f55883db5 100644 --- a/fortios/resource_firewallschedule_group.go +++ b/fortios/resource_firewallschedule_group.go @@ -33,7 +33,6 @@ func resourceFirewallScheduleGroup() *schema.Resource { Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 31), Required: true, - ForceNew: true, }, "member": &schema.Schema{ Type: schema.TypeList, diff --git a/fortios/resource_firewallschedule_onetime.go b/fortios/resource_firewallschedule_onetime.go index 30da2a861..456af77fe 100644 --- a/fortios/resource_firewallschedule_onetime.go +++ b/fortios/resource_firewallschedule_onetime.go @@ -33,7 +33,6 @@ func resourceFirewallScheduleOnetime() *schema.Resource { Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 31), Required: true, - ForceNew: true, }, "start": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewallschedule_recurring.go b/fortios/resource_firewallschedule_recurring.go index 2921eb609..c52c76d40 100644 --- a/fortios/resource_firewallschedule_recurring.go +++ b/fortios/resource_firewallschedule_recurring.go @@ -33,7 +33,6 @@ func resourceFirewallScheduleRecurring() *schema.Resource { Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 31), Required: true, - ForceNew: true, }, "start": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewallservice_category.go b/fortios/resource_firewallservice_category.go index 7baac5277..e7f5dcb22 100644 --- a/fortios/resource_firewallservice_category.go +++ b/fortios/resource_firewallservice_category.go @@ -32,8 +32,8 @@ func resourceFirewallServiceCategory() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewallservice_custom.go b/fortios/resource_firewallservice_custom.go index 46128d67f..2993e9538 100644 --- a/fortios/resource_firewallservice_custom.go +++ b/fortios/resource_firewallservice_custom.go @@ -32,8 +32,8 @@ func resourceFirewallServiceCustom() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "proxy": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewallservice_group.go b/fortios/resource_firewallservice_group.go index 9e49ce6f0..177dff0e0 100644 --- a/fortios/resource_firewallservice_group.go +++ b/fortios/resource_firewallservice_group.go @@ -33,7 +33,6 @@ func resourceFirewallServiceGroup() *schema.Resource { Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), Required: true, - ForceNew: true, }, "member": &schema.Schema{ Type: schema.TypeList, diff --git a/fortios/resource_firewallshaper_peripshaper.go b/fortios/resource_firewallshaper_peripshaper.go index 2f22a6a85..3d02740b3 100644 --- a/fortios/resource_firewallshaper_peripshaper.go +++ b/fortios/resource_firewallshaper_peripshaper.go @@ -32,8 +32,8 @@ func resourceFirewallShaperPerIpShaper() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "max_bandwidth": &schema.Schema{ Type: schema.TypeInt, diff --git a/fortios/resource_firewallshaper_trafficshaper.go b/fortios/resource_firewallshaper_trafficshaper.go index 8fbbb5710..cac341231 100644 --- a/fortios/resource_firewallshaper_trafficshaper.go +++ b/fortios/resource_firewallshaper_trafficshaper.go @@ -32,8 +32,8 @@ func resourceFirewallShaperTrafficShaper() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "guaranteed_bandwidth": &schema.Schema{ Type: schema.TypeInt, diff --git a/fortios/resource_firewallssh_hostkey.go b/fortios/resource_firewallssh_hostkey.go index 799dbb619..482ceee15 100644 --- a/fortios/resource_firewallssh_hostkey.go +++ b/fortios/resource_firewallssh_hostkey.go @@ -32,8 +32,8 @@ func resourceFirewallSshHostKey() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewallssh_localca.go b/fortios/resource_firewallssh_localca.go index 4417bff8c..425c22d32 100644 --- a/fortios/resource_firewallssh_localca.go +++ b/fortios/resource_firewallssh_localca.go @@ -32,8 +32,8 @@ func resourceFirewallSshLocalCa() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "password": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewallssh_localkey.go b/fortios/resource_firewallssh_localkey.go index 78de93f94..0605c7d84 100644 --- a/fortios/resource_firewallssh_localkey.go +++ b/fortios/resource_firewallssh_localkey.go @@ -32,8 +32,8 @@ func resourceFirewallSshLocalKey() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "password": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewallwildcardfqdn_custom.go b/fortios/resource_firewallwildcardfqdn_custom.go index 1bea7086a..e932aa814 100644 --- a/fortios/resource_firewallwildcardfqdn_custom.go +++ b/fortios/resource_firewallwildcardfqdn_custom.go @@ -32,8 +32,8 @@ func resourceFirewallWildcardFqdnCustom() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "uuid": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_firewallwildcardfqdn_group.go b/fortios/resource_firewallwildcardfqdn_group.go index 3751a38e8..df4d41144 100644 --- a/fortios/resource_firewallwildcardfqdn_group.go +++ b/fortios/resource_firewallwildcardfqdn_group.go @@ -32,8 +32,8 @@ func resourceFirewallWildcardFqdnGroup() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, - ForceNew: true, + Optional: true, + Computed: true, }, "uuid": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_icap_profile.go b/fortios/resource_icap_profile.go index f6a22a878..7bb1a5358 100644 --- a/fortios/resource_icap_profile.go +++ b/fortios/resource_icap_profile.go @@ -38,8 +38,9 @@ func resourceIcapProfile() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "request": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_icap_server.go b/fortios/resource_icap_server.go index 292de3b5d..f54552bca 100644 --- a/fortios/resource_icap_server.go +++ b/fortios/resource_icap_server.go @@ -32,8 +32,9 @@ func resourceIcapServer() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "ip_version": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_ips_custom.go b/fortios/resource_ips_custom.go index efd4194a8..01e1473f4 100644 --- a/fortios/resource_ips_custom.go +++ b/fortios/resource_ips_custom.go @@ -32,8 +32,9 @@ func resourceIpsCustom() *schema.Resource { "tag": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "signature": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_ips_decoder.go b/fortios/resource_ips_decoder.go index af3bdedcc..8587139cc 100644 --- a/fortios/resource_ips_decoder.go +++ b/fortios/resource_ips_decoder.go @@ -32,8 +32,9 @@ func resourceIpsDecoder() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "parameter": &schema.Schema{ Type: schema.TypeList, diff --git a/fortios/resource_ips_rule.go b/fortios/resource_ips_rule.go index a7d26a331..673f9a5b4 100644 --- a/fortios/resource_ips_rule.go +++ b/fortios/resource_ips_rule.go @@ -32,8 +32,9 @@ func resourceIpsRule() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_ips_sensor.go b/fortios/resource_ips_sensor.go index ccfef31c3..b67c74307 100644 --- a/fortios/resource_ips_sensor.go +++ b/fortios/resource_ips_sensor.go @@ -32,8 +32,8 @@ func resourceIpsSensor() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_log_customfield.go b/fortios/resource_log_customfield.go index 4a2f34330..f669a23b2 100644 --- a/fortios/resource_log_customfield.go +++ b/fortios/resource_log_customfield.go @@ -32,8 +32,9 @@ func resourceLogCustomField() *schema.Resource { "fosid": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "name": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_report_chart.go b/fortios/resource_report_chart.go index 49ce5aa75..c2a523d13 100644 --- a/fortios/resource_report_chart.go +++ b/fortios/resource_report_chart.go @@ -32,8 +32,8 @@ func resourceReportChart() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 71), - Required: true, ForceNew: true, + Required: true, }, "policy": &schema.Schema{ Type: schema.TypeInt, diff --git a/fortios/resource_report_dataset.go b/fortios/resource_report_dataset.go index c738c9739..8ae78242a 100644 --- a/fortios/resource_report_dataset.go +++ b/fortios/resource_report_dataset.go @@ -32,8 +32,8 @@ func resourceReportDataset() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 71), - Required: true, ForceNew: true, + Required: true, }, "policy": &schema.Schema{ Type: schema.TypeInt, diff --git a/fortios/resource_report_layout.go b/fortios/resource_report_layout.go index 43c4699b9..a6ad402cd 100644 --- a/fortios/resource_report_layout.go +++ b/fortios/resource_report_layout.go @@ -32,8 +32,9 @@ func resourceReportLayout() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "title": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_report_style.go b/fortios/resource_report_style.go index d3e299af7..709cc9edf 100644 --- a/fortios/resource_report_style.go +++ b/fortios/resource_report_style.go @@ -32,8 +32,9 @@ func resourceReportStyle() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 71), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "options": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_report_theme.go b/fortios/resource_report_theme.go index c3d69be95..c0d715744 100644 --- a/fortios/resource_report_theme.go +++ b/fortios/resource_report_theme.go @@ -32,8 +32,9 @@ func resourceReportTheme() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "page_orient": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_router_accesslist.go b/fortios/resource_router_accesslist.go index 3ce792005..68aae61ba 100644 --- a/fortios/resource_router_accesslist.go +++ b/fortios/resource_router_accesslist.go @@ -32,8 +32,8 @@ func resourceRouterAccessList() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "comments": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_router_accesslist6.go b/fortios/resource_router_accesslist6.go index 3f4dcab49..87c177d9e 100644 --- a/fortios/resource_router_accesslist6.go +++ b/fortios/resource_router_accesslist6.go @@ -32,8 +32,8 @@ func resourceRouterAccessList6() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "comments": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_router_aspathlist.go b/fortios/resource_router_aspathlist.go index d58742373..25ac90404 100644 --- a/fortios/resource_router_aspathlist.go +++ b/fortios/resource_router_aspathlist.go @@ -32,8 +32,8 @@ func resourceRouterAspathList() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "rule": &schema.Schema{ Type: schema.TypeList, diff --git a/fortios/resource_router_authpath.go b/fortios/resource_router_authpath.go index 9964e5ecd..b857e780d 100644 --- a/fortios/resource_router_authpath.go +++ b/fortios/resource_router_authpath.go @@ -32,8 +32,8 @@ func resourceRouterAuthPath() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 15), - Required: true, ForceNew: true, + Required: true, }, "device": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_router_communitylist.go b/fortios/resource_router_communitylist.go index 77a8c3351..0aa3e6fb4 100644 --- a/fortios/resource_router_communitylist.go +++ b/fortios/resource_router_communitylist.go @@ -32,8 +32,8 @@ func resourceRouterCommunityList() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "type": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_router_keychain.go b/fortios/resource_router_keychain.go index 8dda89cf4..97c2c891b 100644 --- a/fortios/resource_router_keychain.go +++ b/fortios/resource_router_keychain.go @@ -32,8 +32,8 @@ func resourceRouterKeyChain() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "key": &schema.Schema{ Type: schema.TypeList, diff --git a/fortios/resource_router_multicastflow.go b/fortios/resource_router_multicastflow.go index d741f8d19..56bff2ed0 100644 --- a/fortios/resource_router_multicastflow.go +++ b/fortios/resource_router_multicastflow.go @@ -32,8 +32,8 @@ func resourceRouterMulticastFlow() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "comments": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_router_policy.go b/fortios/resource_router_policy.go index 4c61ec3a2..1622422d7 100644 --- a/fortios/resource_router_policy.go +++ b/fortios/resource_router_policy.go @@ -32,8 +32,9 @@ func resourceRouterPolicy() *schema.Resource { "seq_num": &schema.Schema{ Type: schema.TypeInt, ValidateFunc: validation.IntBetween(1, 65535), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "input_device": &schema.Schema{ Type: schema.TypeList, diff --git a/fortios/resource_router_policy6.go b/fortios/resource_router_policy6.go index 8192ed9e2..dd21b4b21 100644 --- a/fortios/resource_router_policy6.go +++ b/fortios/resource_router_policy6.go @@ -31,8 +31,9 @@ func resourceRouterPolicy6() *schema.Resource { Schema: map[string]*schema.Schema{ "seq_num": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "input_device": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_router_prefixlist.go b/fortios/resource_router_prefixlist.go index e26321815..fe445065b 100644 --- a/fortios/resource_router_prefixlist.go +++ b/fortios/resource_router_prefixlist.go @@ -32,8 +32,8 @@ func resourceRouterPrefixList() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "comments": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_router_prefixlist6.go b/fortios/resource_router_prefixlist6.go index 4e87ca10a..f4f6bd2ec 100644 --- a/fortios/resource_router_prefixlist6.go +++ b/fortios/resource_router_prefixlist6.go @@ -32,8 +32,8 @@ func resourceRouterPrefixList6() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "comments": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_router_routemap.go b/fortios/resource_router_routemap.go index 7e0c0d3d9..6253fc906 100644 --- a/fortios/resource_router_routemap.go +++ b/fortios/resource_router_routemap.go @@ -32,8 +32,8 @@ func resourceRouterRouteMap() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "comments": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_router_static.go b/fortios/resource_router_static.go index 7fe92ad56..f86c9fe6f 100644 --- a/fortios/resource_router_static.go +++ b/fortios/resource_router_static.go @@ -31,8 +31,9 @@ func resourceRouterStatic() *schema.Resource { Schema: map[string]*schema.Schema{ "seq_num": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_router_static6.go b/fortios/resource_router_static6.go index 89cc63f23..68a4bdc9f 100644 --- a/fortios/resource_router_static6.go +++ b/fortios/resource_router_static6.go @@ -31,8 +31,9 @@ func resourceRouterStatic6() *schema.Resource { Schema: map[string]*schema.Schema{ "seq_num": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_spamfilter_bwl.go b/fortios/resource_spamfilter_bwl.go index 7f703b462..969fd2d08 100644 --- a/fortios/resource_spamfilter_bwl.go +++ b/fortios/resource_spamfilter_bwl.go @@ -31,8 +31,8 @@ func resourceSpamfilterBwl() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Required: true, }, "name": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_spamfilter_bword.go b/fortios/resource_spamfilter_bword.go index 444dabf87..89a386a0a 100644 --- a/fortios/resource_spamfilter_bword.go +++ b/fortios/resource_spamfilter_bword.go @@ -31,8 +31,8 @@ func resourceSpamfilterBword() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Required: true, }, "name": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_spamfilter_dnsbl.go b/fortios/resource_spamfilter_dnsbl.go index 45e6a1f57..53020e476 100644 --- a/fortios/resource_spamfilter_dnsbl.go +++ b/fortios/resource_spamfilter_dnsbl.go @@ -31,8 +31,8 @@ func resourceSpamfilterDnsbl() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Required: true, }, "name": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_spamfilter_iptrust.go b/fortios/resource_spamfilter_iptrust.go index bf11ec145..41d823747 100644 --- a/fortios/resource_spamfilter_iptrust.go +++ b/fortios/resource_spamfilter_iptrust.go @@ -31,8 +31,8 @@ func resourceSpamfilterIptrust() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Required: true, }, "name": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_spamfilter_mheader.go b/fortios/resource_spamfilter_mheader.go index 810cf5c88..9d17e2675 100644 --- a/fortios/resource_spamfilter_mheader.go +++ b/fortios/resource_spamfilter_mheader.go @@ -31,8 +31,8 @@ func resourceSpamfilterMheader() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Required: true, }, "name": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_spamfilter_profile.go b/fortios/resource_spamfilter_profile.go index 81847796f..231eb9cf6 100644 --- a/fortios/resource_spamfilter_profile.go +++ b/fortios/resource_spamfilter_profile.go @@ -32,8 +32,8 @@ func resourceSpamfilterProfile() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_sshfilter_profile.go b/fortios/resource_sshfilter_profile.go index d40fc6027..cd576520b 100644 --- a/fortios/resource_sshfilter_profile.go +++ b/fortios/resource_sshfilter_profile.go @@ -32,8 +32,9 @@ func resourceSshFilterProfile() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "block": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_switchcontroller_customcommand.go b/fortios/resource_switchcontroller_customcommand.go index 960dc4d6d..cb104b5e9 100644 --- a/fortios/resource_switchcontroller_customcommand.go +++ b/fortios/resource_switchcontroller_customcommand.go @@ -32,8 +32,9 @@ func resourceSwitchControllerCustomCommand() *schema.Resource { "command_name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "description": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_switchcontroller_lldpprofile.go b/fortios/resource_switchcontroller_lldpprofile.go index 1327afb3a..43a45d678 100644 --- a/fortios/resource_switchcontroller_lldpprofile.go +++ b/fortios/resource_switchcontroller_lldpprofile.go @@ -32,8 +32,9 @@ func resourceSwitchControllerLldpProfile() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "med_tlvs": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_switchcontroller_managedswitch.go b/fortios/resource_switchcontroller_managedswitch.go index 900311757..b183d403d 100644 --- a/fortios/resource_switchcontroller_managedswitch.go +++ b/fortios/resource_switchcontroller_managedswitch.go @@ -32,8 +32,8 @@ func resourceSwitchControllerManagedSwitch() *schema.Resource { "switch_id": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 16), - Required: true, ForceNew: true, + Required: true, }, "name": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_switchcontroller_switchgroup.go b/fortios/resource_switchcontroller_switchgroup.go index a5575bf75..c7530bca5 100644 --- a/fortios/resource_switchcontroller_switchgroup.go +++ b/fortios/resource_switchcontroller_switchgroup.go @@ -32,8 +32,9 @@ func resourceSwitchControllerSwitchGroup() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "description": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_switchcontroller_switchprofile.go b/fortios/resource_switchcontroller_switchprofile.go index 654fd0779..55a41ba4a 100644 --- a/fortios/resource_switchcontroller_switchprofile.go +++ b/fortios/resource_switchcontroller_switchprofile.go @@ -32,8 +32,9 @@ func resourceSwitchControllerSwitchProfile() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "login_passwd_override": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_switchcontroller_trafficpolicy.go b/fortios/resource_switchcontroller_trafficpolicy.go index 2bd3766b9..31c6e55a1 100644 --- a/fortios/resource_switchcontroller_trafficpolicy.go +++ b/fortios/resource_switchcontroller_trafficpolicy.go @@ -32,8 +32,8 @@ func resourceSwitchControllerTrafficPolicy() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, ForceNew: true, + Required: true, }, "description": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_switchcontroller_virtualportpool.go b/fortios/resource_switchcontroller_virtualportpool.go index 0bbcaa768..fea9a7d93 100644 --- a/fortios/resource_switchcontroller_virtualportpool.go +++ b/fortios/resource_switchcontroller_virtualportpool.go @@ -32,8 +32,9 @@ func resourceSwitchControllerVirtualPortPool() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "description": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_switchcontroller_vlan.go b/fortios/resource_switchcontroller_vlan.go index 94283c863..42e68bcce 100644 --- a/fortios/resource_switchcontroller_vlan.go +++ b/fortios/resource_switchcontroller_vlan.go @@ -32,8 +32,9 @@ func resourceSwitchControllerVlan() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 15), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "vdom": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_switchcontrollerautoconfig_custom.go b/fortios/resource_switchcontrollerautoconfig_custom.go index 2b4ebb330..cbaa41390 100644 --- a/fortios/resource_switchcontrollerautoconfig_custom.go +++ b/fortios/resource_switchcontrollerautoconfig_custom.go @@ -32,8 +32,8 @@ func resourceSwitchControllerAutoConfigCustom() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 15), - Required: true, ForceNew: true, + Required: true, }, "switch_binding": &schema.Schema{ Type: schema.TypeList, diff --git a/fortios/resource_switchcontrollerautoconfig_policy.go b/fortios/resource_switchcontrollerautoconfig_policy.go index bd576b493..0e0ee1779 100644 --- a/fortios/resource_switchcontrollerautoconfig_policy.go +++ b/fortios/resource_switchcontrollerautoconfig_policy.go @@ -32,8 +32,8 @@ func resourceSwitchControllerAutoConfigPolicy() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, ForceNew: true, + Required: true, }, "qos_policy": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_switchcontrollerqos_dot1pmap.go b/fortios/resource_switchcontrollerqos_dot1pmap.go index faab6b56b..a2f9842d5 100644 --- a/fortios/resource_switchcontrollerqos_dot1pmap.go +++ b/fortios/resource_switchcontrollerqos_dot1pmap.go @@ -32,8 +32,8 @@ func resourceSwitchControllerQosDot1PMap() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, ForceNew: true, + Required: true, }, "description": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_switchcontrollerqos_ipdscpmap.go b/fortios/resource_switchcontrollerqos_ipdscpmap.go index a70b670ce..ff4f88f2a 100644 --- a/fortios/resource_switchcontrollerqos_ipdscpmap.go +++ b/fortios/resource_switchcontrollerqos_ipdscpmap.go @@ -32,8 +32,8 @@ func resourceSwitchControllerQosIpDscpMap() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, ForceNew: true, + Required: true, }, "description": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_switchcontrollerqos_qospolicy.go b/fortios/resource_switchcontrollerqos_qospolicy.go index e41d48199..791085d2a 100644 --- a/fortios/resource_switchcontrollerqos_qospolicy.go +++ b/fortios/resource_switchcontrollerqos_qospolicy.go @@ -32,8 +32,8 @@ func resourceSwitchControllerQosQosPolicy() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, ForceNew: true, + Required: true, }, "default_cos": &schema.Schema{ Type: schema.TypeInt, diff --git a/fortios/resource_switchcontrollerqos_queuepolicy.go b/fortios/resource_switchcontrollerqos_queuepolicy.go index cee180548..bfd90eed0 100644 --- a/fortios/resource_switchcontrollerqos_queuepolicy.go +++ b/fortios/resource_switchcontrollerqos_queuepolicy.go @@ -32,8 +32,8 @@ func resourceSwitchControllerQosQueuePolicy() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, ForceNew: true, + Required: true, }, "schedule": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_switchcontrollersecuritypolicy_8021X.go b/fortios/resource_switchcontrollersecuritypolicy_8021X.go index 13adadbf9..d9bc0a94f 100644 --- a/fortios/resource_switchcontrollersecuritypolicy_8021X.go +++ b/fortios/resource_switchcontrollersecuritypolicy_8021X.go @@ -32,8 +32,9 @@ func resourceSwitchControllerSecurityPolicy8021X() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 31), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "security_mode": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_switchcontrollersecuritypolicy_captiveportal.go b/fortios/resource_switchcontrollersecuritypolicy_captiveportal.go index 786091481..18167e5bb 100644 --- a/fortios/resource_switchcontrollersecuritypolicy_captiveportal.go +++ b/fortios/resource_switchcontrollersecuritypolicy_captiveportal.go @@ -32,8 +32,9 @@ func resourceSwitchControllerSecurityPolicyCaptivePortal() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 31), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "vlan": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_accprofile.go b/fortios/resource_system_accprofile.go index fb241a2c5..bd71936bb 100644 --- a/fortios/resource_system_accprofile.go +++ b/fortios/resource_system_accprofile.go @@ -32,8 +32,8 @@ func resourceSystemAccprofile() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "scope": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_admin.go b/fortios/resource_system_admin.go index 6f0fac7bf..7adc9b30e 100644 --- a/fortios/resource_system_admin.go +++ b/fortios/resource_system_admin.go @@ -32,8 +32,9 @@ func resourceSystemAdmin() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "wildcard": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_affinityinterrupt.go b/fortios/resource_system_affinityinterrupt.go index 752dfc7d8..5a244bf09 100644 --- a/fortios/resource_system_affinityinterrupt.go +++ b/fortios/resource_system_affinityinterrupt.go @@ -31,8 +31,8 @@ func resourceSystemAffinityInterrupt() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Required: true, }, "interrupt": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_affinitypacketredistribution.go b/fortios/resource_system_affinitypacketredistribution.go index 29b358697..28b6babd3 100644 --- a/fortios/resource_system_affinitypacketredistribution.go +++ b/fortios/resource_system_affinitypacketredistribution.go @@ -31,8 +31,8 @@ func resourceSystemAffinityPacketRedistribution() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Required: true, }, "interface": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_alias.go b/fortios/resource_system_alias.go index ae51b1a86..c8baa2221 100644 --- a/fortios/resource_system_alias.go +++ b/fortios/resource_system_alias.go @@ -32,8 +32,9 @@ func resourceSystemAlias() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "command": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_apiuser.go b/fortios/resource_system_apiuser.go index c14087c2d..0c30af4cb 100644 --- a/fortios/resource_system_apiuser.go +++ b/fortios/resource_system_apiuser.go @@ -32,8 +32,9 @@ func resourceSystemApiUser() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "comments": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_arptable.go b/fortios/resource_system_arptable.go index 35d064944..a0c17cee3 100644 --- a/fortios/resource_system_arptable.go +++ b/fortios/resource_system_arptable.go @@ -31,8 +31,8 @@ func resourceSystemArpTable() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Required: true, }, "interface": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_automationaction.go b/fortios/resource_system_automationaction.go index f774fbd5f..203927311 100644 --- a/fortios/resource_system_automationaction.go +++ b/fortios/resource_system_automationaction.go @@ -32,8 +32,9 @@ func resourceSystemAutomationAction() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 64), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "action_type": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_automationdestination.go b/fortios/resource_system_automationdestination.go index 74f89f66d..2bb937776 100644 --- a/fortios/resource_system_automationdestination.go +++ b/fortios/resource_system_automationdestination.go @@ -32,8 +32,9 @@ func resourceSystemAutomationDestination() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "type": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_automationstitch.go b/fortios/resource_system_automationstitch.go index 7507ad414..cab25f06c 100644 --- a/fortios/resource_system_automationstitch.go +++ b/fortios/resource_system_automationstitch.go @@ -32,8 +32,9 @@ func resourceSystemAutomationStitch() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_automationtrigger.go b/fortios/resource_system_automationtrigger.go index 8fe9e34c6..2d23da055 100644 --- a/fortios/resource_system_automationtrigger.go +++ b/fortios/resource_system_automationtrigger.go @@ -32,8 +32,9 @@ func resourceSystemAutomationTrigger() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "trigger_type": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_autoscript.go b/fortios/resource_system_autoscript.go index d4d4b352f..3a7e5d08b 100644 --- a/fortios/resource_system_autoscript.go +++ b/fortios/resource_system_autoscript.go @@ -32,8 +32,9 @@ func resourceSystemAutoScript() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "interval": &schema.Schema{ Type: schema.TypeInt, diff --git a/fortios/resource_system_clustersync.go b/fortios/resource_system_clustersync.go index bfceed19b..171097187 100644 --- a/fortios/resource_system_clustersync.go +++ b/fortios/resource_system_clustersync.go @@ -32,8 +32,9 @@ func resourceSystemClusterSync() *schema.Resource { "sync_id": &schema.Schema{ Type: schema.TypeInt, ValidateFunc: validation.IntBetween(0, 255), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "peervd": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_customlanguage.go b/fortios/resource_system_customlanguage.go index 2e2674d81..4814423f2 100644 --- a/fortios/resource_system_customlanguage.go +++ b/fortios/resource_system_customlanguage.go @@ -32,8 +32,8 @@ func resourceSystemCustomLanguage() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "filename": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_ddns.go b/fortios/resource_system_ddns.go index 7e51c7b5a..927c32b97 100644 --- a/fortios/resource_system_ddns.go +++ b/fortios/resource_system_ddns.go @@ -31,8 +31,9 @@ func resourceSystemDdns() *schema.Resource { Schema: map[string]*schema.Schema{ "ddnsid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "ddns_server": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_dnsdatabase.go b/fortios/resource_system_dnsdatabase.go index 49ad7a46b..1a3f4c068 100644 --- a/fortios/resource_system_dnsdatabase.go +++ b/fortios/resource_system_dnsdatabase.go @@ -32,8 +32,8 @@ func resourceSystemDnsDatabase() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_dnsserver.go b/fortios/resource_system_dnsserver.go index a768fc56e..4b2bca21e 100644 --- a/fortios/resource_system_dnsserver.go +++ b/fortios/resource_system_dnsserver.go @@ -32,8 +32,9 @@ func resourceSystemDnsServer() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 15), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "mode": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_dscpbasedpriority.go b/fortios/resource_system_dscpbasedpriority.go index 58349d12b..e36699db3 100644 --- a/fortios/resource_system_dscpbasedpriority.go +++ b/fortios/resource_system_dscpbasedpriority.go @@ -31,8 +31,9 @@ func resourceSystemDscpBasedPriority() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "ds": &schema.Schema{ Type: schema.TypeInt, diff --git a/fortios/resource_system_externalresource.go b/fortios/resource_system_externalresource.go index 7546f8bd7..411861083 100644 --- a/fortios/resource_system_externalresource.go +++ b/fortios/resource_system_externalresource.go @@ -32,8 +32,8 @@ func resourceSystemExternalResource() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_geneve.go b/fortios/resource_system_geneve.go index 29e996431..6b2634830 100644 --- a/fortios/resource_system_geneve.go +++ b/fortios/resource_system_geneve.go @@ -32,8 +32,9 @@ func resourceSystemGeneve() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 15), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "interface": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_geoipoverride.go b/fortios/resource_system_geoipoverride.go index df594893b..ca358d3ab 100644 --- a/fortios/resource_system_geoipoverride.go +++ b/fortios/resource_system_geoipoverride.go @@ -32,8 +32,8 @@ func resourceSystemGeoipOverride() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, ForceNew: true, + Required: true, }, "description": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_gretunnel.go b/fortios/resource_system_gretunnel.go index 0cf6b622d..983ffe3eb 100644 --- a/fortios/resource_system_gretunnel.go +++ b/fortios/resource_system_gretunnel.go @@ -32,8 +32,9 @@ func resourceSystemGreTunnel() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 15), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "interface": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_interface.go b/fortios/resource_system_interface.go index 88acaf9a1..a5240688c 100644 --- a/fortios/resource_system_interface.go +++ b/fortios/resource_system_interface.go @@ -37,8 +37,9 @@ func resourceSystemInterface() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 15), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "vdom": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_ipiptunnel.go b/fortios/resource_system_ipiptunnel.go index 557fd5314..d810dfaf1 100644 --- a/fortios/resource_system_ipiptunnel.go +++ b/fortios/resource_system_ipiptunnel.go @@ -32,8 +32,9 @@ func resourceSystemIpipTunnel() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 15), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "interface": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_ipsecaggregate.go b/fortios/resource_system_ipsecaggregate.go index 25be5e9ea..5b3233d83 100644 --- a/fortios/resource_system_ipsecaggregate.go +++ b/fortios/resource_system_ipsecaggregate.go @@ -32,8 +32,9 @@ func resourceSystemIpsecAggregate() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 15), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "member": &schema.Schema{ Type: schema.TypeList, diff --git a/fortios/resource_system_ipv6neighborcache.go b/fortios/resource_system_ipv6neighborcache.go index 1ee07ab02..bce2c82ba 100644 --- a/fortios/resource_system_ipv6neighborcache.go +++ b/fortios/resource_system_ipv6neighborcache.go @@ -31,8 +31,8 @@ func resourceSystemIpv6NeighborCache() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Required: true, }, "interface": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_ipv6tunnel.go b/fortios/resource_system_ipv6tunnel.go index 8b85a5af5..7268621e2 100644 --- a/fortios/resource_system_ipv6tunnel.go +++ b/fortios/resource_system_ipv6tunnel.go @@ -32,8 +32,9 @@ func resourceSystemIpv6Tunnel() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 15), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "source": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_linkmonitor.go b/fortios/resource_system_linkmonitor.go index 389a7df18..6e16bf208 100644 --- a/fortios/resource_system_linkmonitor.go +++ b/fortios/resource_system_linkmonitor.go @@ -32,8 +32,9 @@ func resourceSystemLinkMonitor() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "addr_mode": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_macaddresstable.go b/fortios/resource_system_macaddresstable.go index d865265e4..01c78ee11 100644 --- a/fortios/resource_system_macaddresstable.go +++ b/fortios/resource_system_macaddresstable.go @@ -31,8 +31,8 @@ func resourceSystemMacAddressTable() *schema.Resource { Schema: map[string]*schema.Schema{ "mac": &schema.Schema{ Type: schema.TypeString, - Required: true, ForceNew: true, + Required: true, }, "interface": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_mobiletunnel.go b/fortios/resource_system_mobiletunnel.go index 2240a32ec..c905ba322 100644 --- a/fortios/resource_system_mobiletunnel.go +++ b/fortios/resource_system_mobiletunnel.go @@ -32,8 +32,9 @@ func resourceSystemMobileTunnel() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 15), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_objecttagging.go b/fortios/resource_system_objecttagging.go index a88619743..8416c4701 100644 --- a/fortios/resource_system_objecttagging.go +++ b/fortios/resource_system_objecttagging.go @@ -32,8 +32,9 @@ func resourceSystemObjectTagging() *schema.Resource { "category": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "address": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_pppoeinterface.go b/fortios/resource_system_pppoeinterface.go index b30d473dc..2f41ee56e 100644 --- a/fortios/resource_system_pppoeinterface.go +++ b/fortios/resource_system_pppoeinterface.go @@ -32,8 +32,9 @@ func resourceSystemPppoeInterface() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 15), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "dial_on_demand": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_proxyarp.go b/fortios/resource_system_proxyarp.go index ad033da11..94a902e0b 100644 --- a/fortios/resource_system_proxyarp.go +++ b/fortios/resource_system_proxyarp.go @@ -31,8 +31,8 @@ func resourceSystemProxyArp() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Required: true, }, "interface": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_replacemsggroup.go b/fortios/resource_system_replacemsggroup.go index 0ed156436..625deaed0 100644 --- a/fortios/resource_system_replacemsggroup.go +++ b/fortios/resource_system_replacemsggroup.go @@ -32,8 +32,9 @@ func resourceSystemReplacemsgGroup() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_replacemsgimage.go b/fortios/resource_system_replacemsgimage.go index bb3f15e69..0503fcf16 100644 --- a/fortios/resource_system_replacemsgimage.go +++ b/fortios/resource_system_replacemsgimage.go @@ -32,8 +32,9 @@ func resourceSystemReplacemsgImage() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 23), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "image_type": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_sdnconnector.go b/fortios/resource_system_sdnconnector.go index 74ee5fcb7..30549a67c 100644 --- a/fortios/resource_system_sdnconnector.go +++ b/fortios/resource_system_sdnconnector.go @@ -32,8 +32,9 @@ func resourceSystemSdnConnector() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_sessionhelper.go b/fortios/resource_system_sessionhelper.go index 388c5e622..941adfb58 100644 --- a/fortios/resource_system_sessionhelper.go +++ b/fortios/resource_system_sessionhelper.go @@ -31,8 +31,9 @@ func resourceSystemSessionHelper() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "name": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_sittunnel.go b/fortios/resource_system_sittunnel.go index a3a703040..2239cdeb9 100644 --- a/fortios/resource_system_sittunnel.go +++ b/fortios/resource_system_sittunnel.go @@ -32,8 +32,9 @@ func resourceSystemSitTunnel() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 15), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "source": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_smsserver.go b/fortios/resource_system_smsserver.go index 5b3f21d9e..200a0c754 100644 --- a/fortios/resource_system_smsserver.go +++ b/fortios/resource_system_smsserver.go @@ -32,8 +32,9 @@ func resourceSystemSmsServer() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "mail_server": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_ssoadmin.go b/fortios/resource_system_ssoadmin.go index d28bcd515..3a8dab90a 100644 --- a/fortios/resource_system_ssoadmin.go +++ b/fortios/resource_system_ssoadmin.go @@ -32,8 +32,9 @@ func resourceSystemSsoAdmin() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 64), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "accprofile": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_storage.go b/fortios/resource_system_storage.go index e74729d19..439a26b86 100644 --- a/fortios/resource_system_storage.go +++ b/fortios/resource_system_storage.go @@ -32,8 +32,9 @@ func resourceSystemStorage() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_switchinterface.go b/fortios/resource_system_switchinterface.go index 9e0c15e80..2267ade27 100644 --- a/fortios/resource_system_switchinterface.go +++ b/fortios/resource_system_switchinterface.go @@ -32,8 +32,8 @@ func resourceSystemSwitchInterface() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 15), - Required: true, ForceNew: true, + Required: true, }, "vdom": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_tosbasedpriority.go b/fortios/resource_system_tosbasedpriority.go index 8f6b2e3c7..10e336b9b 100644 --- a/fortios/resource_system_tosbasedpriority.go +++ b/fortios/resource_system_tosbasedpriority.go @@ -31,8 +31,9 @@ func resourceSystemTosBasedPriority() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "tos": &schema.Schema{ Type: schema.TypeInt, diff --git a/fortios/resource_system_vdom.go b/fortios/resource_system_vdom.go index f3d6f6fc6..9c9098e39 100644 --- a/fortios/resource_system_vdom.go +++ b/fortios/resource_system_vdom.go @@ -32,8 +32,9 @@ func resourceSystemVdom() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 31), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "short_name": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_vdomexception.go b/fortios/resource_system_vdomexception.go index d83386417..8b949c40a 100644 --- a/fortios/resource_system_vdomexception.go +++ b/fortios/resource_system_vdomexception.go @@ -31,8 +31,9 @@ func resourceSystemVdomException() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "object": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_vdomlink.go b/fortios/resource_system_vdomlink.go index 8a6428d73..36e6822e7 100644 --- a/fortios/resource_system_vdomlink.go +++ b/fortios/resource_system_vdomlink.go @@ -32,8 +32,9 @@ func resourceSystemVdomLink() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 11), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "vcluster": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_vdomproperty.go b/fortios/resource_system_vdomproperty.go index e4cde3762..80ee8a45d 100644 --- a/fortios/resource_system_vdomproperty.go +++ b/fortios/resource_system_vdomproperty.go @@ -32,8 +32,9 @@ func resourceSystemVdomProperty() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 31), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "description": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_vdomradiusserver.go b/fortios/resource_system_vdomradiusserver.go index 87abf02aa..fa4fabd45 100644 --- a/fortios/resource_system_vdomradiusserver.go +++ b/fortios/resource_system_vdomradiusserver.go @@ -32,8 +32,9 @@ func resourceSystemVdomRadiusServer() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 31), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_virtualwirepair.go b/fortios/resource_system_virtualwirepair.go index 802b81f49..c712a32dd 100644 --- a/fortios/resource_system_virtualwirepair.go +++ b/fortios/resource_system_virtualwirepair.go @@ -32,8 +32,9 @@ func resourceSystemVirtualWirePair() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 11), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "member": &schema.Schema{ Type: schema.TypeList, diff --git a/fortios/resource_system_vxlan.go b/fortios/resource_system_vxlan.go index 114334043..0956c36f9 100644 --- a/fortios/resource_system_vxlan.go +++ b/fortios/resource_system_vxlan.go @@ -32,8 +32,9 @@ func resourceSystemVxlan() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 15), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "interface": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_wccp.go b/fortios/resource_system_wccp.go index 229723ff4..070ace490 100644 --- a/fortios/resource_system_wccp.go +++ b/fortios/resource_system_wccp.go @@ -32,8 +32,9 @@ func resourceSystemWccp() *schema.Resource { "service_id": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 3), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "router_id": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_system_zone.go b/fortios/resource_system_zone.go index e3e4a146d..e5c2161fe 100644 --- a/fortios/resource_system_zone.go +++ b/fortios/resource_system_zone.go @@ -32,8 +32,9 @@ func resourceSystemZone() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "tagging": &schema.Schema{ Type: schema.TypeList, diff --git a/fortios/resource_systemdhcp6_server.go b/fortios/resource_systemdhcp6_server.go index b452859be..08f886a56 100644 --- a/fortios/resource_systemdhcp6_server.go +++ b/fortios/resource_systemdhcp6_server.go @@ -31,8 +31,8 @@ func resourceSystemDhcp6Server() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Required: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_systemdhcp_server.go b/fortios/resource_systemdhcp_server.go index cfbff642f..88d7e649b 100644 --- a/fortios/resource_systemdhcp_server.go +++ b/fortios/resource_systemdhcp_server.go @@ -31,8 +31,8 @@ func resourceSystemDhcpServer() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Required: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_systemlldp_networkpolicy.go b/fortios/resource_systemlldp_networkpolicy.go index 2530a7168..cfc69606d 100644 --- a/fortios/resource_systemlldp_networkpolicy.go +++ b/fortios/resource_systemlldp_networkpolicy.go @@ -32,8 +32,8 @@ func resourceSystemLldpNetworkPolicy() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_systemreplacemsg_admin.go b/fortios/resource_systemreplacemsg_admin.go index 6fbd7d13f..79f0ba2ac 100644 --- a/fortios/resource_systemreplacemsg_admin.go +++ b/fortios/resource_systemreplacemsg_admin.go @@ -32,8 +32,8 @@ func resourceSystemReplacemsgAdmin() *schema.Resource { "msg_type": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 28), - Required: true, ForceNew: true, + Required: true, }, "buffer": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_systemreplacemsg_alertmail.go b/fortios/resource_systemreplacemsg_alertmail.go index dc9e8c345..9f17d8092 100644 --- a/fortios/resource_systemreplacemsg_alertmail.go +++ b/fortios/resource_systemreplacemsg_alertmail.go @@ -32,8 +32,8 @@ func resourceSystemReplacemsgAlertmail() *schema.Resource { "msg_type": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 28), - Required: true, ForceNew: true, + Required: true, }, "buffer": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_systemreplacemsg_auth.go b/fortios/resource_systemreplacemsg_auth.go index 65df4a71f..34a05b519 100644 --- a/fortios/resource_systemreplacemsg_auth.go +++ b/fortios/resource_systemreplacemsg_auth.go @@ -32,8 +32,8 @@ func resourceSystemReplacemsgAuth() *schema.Resource { "msg_type": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 28), - Required: true, ForceNew: true, + Required: true, }, "buffer": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_systemreplacemsg_devicedetectionportal.go b/fortios/resource_systemreplacemsg_devicedetectionportal.go index 43bd25317..3d81a2cce 100644 --- a/fortios/resource_systemreplacemsg_devicedetectionportal.go +++ b/fortios/resource_systemreplacemsg_devicedetectionportal.go @@ -32,8 +32,8 @@ func resourceSystemReplacemsgDeviceDetectionPortal() *schema.Resource { "msg_type": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 28), - Required: true, ForceNew: true, + Required: true, }, "buffer": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_systemreplacemsg_ec.go b/fortios/resource_systemreplacemsg_ec.go index 0bd9026cf..d6b70f716 100644 --- a/fortios/resource_systemreplacemsg_ec.go +++ b/fortios/resource_systemreplacemsg_ec.go @@ -32,8 +32,8 @@ func resourceSystemReplacemsgEc() *schema.Resource { "msg_type": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 28), - Required: true, ForceNew: true, + Required: true, }, "buffer": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_systemreplacemsg_fortiguardwf.go b/fortios/resource_systemreplacemsg_fortiguardwf.go index 3529400fd..bfb6c2dd2 100644 --- a/fortios/resource_systemreplacemsg_fortiguardwf.go +++ b/fortios/resource_systemreplacemsg_fortiguardwf.go @@ -32,8 +32,8 @@ func resourceSystemReplacemsgFortiguardWf() *schema.Resource { "msg_type": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 28), - Required: true, ForceNew: true, + Required: true, }, "buffer": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_systemreplacemsg_ftp.go b/fortios/resource_systemreplacemsg_ftp.go index 866b59726..d8accf077 100644 --- a/fortios/resource_systemreplacemsg_ftp.go +++ b/fortios/resource_systemreplacemsg_ftp.go @@ -32,8 +32,8 @@ func resourceSystemReplacemsgFtp() *schema.Resource { "msg_type": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 28), - Required: true, ForceNew: true, + Required: true, }, "buffer": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_systemreplacemsg_http.go b/fortios/resource_systemreplacemsg_http.go index c52f1b5b5..210f46b49 100644 --- a/fortios/resource_systemreplacemsg_http.go +++ b/fortios/resource_systemreplacemsg_http.go @@ -32,8 +32,8 @@ func resourceSystemReplacemsgHttp() *schema.Resource { "msg_type": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 28), - Required: true, ForceNew: true, + Required: true, }, "buffer": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_systemreplacemsg_icap.go b/fortios/resource_systemreplacemsg_icap.go index 96e20e984..84443f3c2 100644 --- a/fortios/resource_systemreplacemsg_icap.go +++ b/fortios/resource_systemreplacemsg_icap.go @@ -32,8 +32,8 @@ func resourceSystemReplacemsgIcap() *schema.Resource { "msg_type": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 28), - Required: true, ForceNew: true, + Required: true, }, "buffer": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_systemreplacemsg_mail.go b/fortios/resource_systemreplacemsg_mail.go index f42169a54..8a2f91ac9 100644 --- a/fortios/resource_systemreplacemsg_mail.go +++ b/fortios/resource_systemreplacemsg_mail.go @@ -32,8 +32,8 @@ func resourceSystemReplacemsgMail() *schema.Resource { "msg_type": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 28), - Required: true, ForceNew: true, + Required: true, }, "buffer": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_systemreplacemsg_nacquar.go b/fortios/resource_systemreplacemsg_nacquar.go index 9fcf91663..189819625 100644 --- a/fortios/resource_systemreplacemsg_nacquar.go +++ b/fortios/resource_systemreplacemsg_nacquar.go @@ -32,8 +32,8 @@ func resourceSystemReplacemsgNacQuar() *schema.Resource { "msg_type": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 28), - Required: true, ForceNew: true, + Required: true, }, "buffer": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_systemreplacemsg_nntp.go b/fortios/resource_systemreplacemsg_nntp.go index 6a6c9e533..08101df85 100644 --- a/fortios/resource_systemreplacemsg_nntp.go +++ b/fortios/resource_systemreplacemsg_nntp.go @@ -32,8 +32,8 @@ func resourceSystemReplacemsgNntp() *schema.Resource { "msg_type": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 28), - Required: true, ForceNew: true, + Required: true, }, "buffer": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_systemreplacemsg_spam.go b/fortios/resource_systemreplacemsg_spam.go index 990344356..196feb4b1 100644 --- a/fortios/resource_systemreplacemsg_spam.go +++ b/fortios/resource_systemreplacemsg_spam.go @@ -32,8 +32,8 @@ func resourceSystemReplacemsgSpam() *schema.Resource { "msg_type": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 28), - Required: true, ForceNew: true, + Required: true, }, "buffer": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_systemreplacemsg_sslvpn.go b/fortios/resource_systemreplacemsg_sslvpn.go index e37d9f2c1..e92b49c08 100644 --- a/fortios/resource_systemreplacemsg_sslvpn.go +++ b/fortios/resource_systemreplacemsg_sslvpn.go @@ -32,8 +32,8 @@ func resourceSystemReplacemsgSslvpn() *schema.Resource { "msg_type": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 28), - Required: true, ForceNew: true, + Required: true, }, "buffer": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_systemreplacemsg_trafficquota.go b/fortios/resource_systemreplacemsg_trafficquota.go index c5dc64910..28a12cb47 100644 --- a/fortios/resource_systemreplacemsg_trafficquota.go +++ b/fortios/resource_systemreplacemsg_trafficquota.go @@ -32,8 +32,8 @@ func resourceSystemReplacemsgTrafficQuota() *schema.Resource { "msg_type": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 28), - Required: true, ForceNew: true, + Required: true, }, "buffer": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_systemreplacemsg_utm.go b/fortios/resource_systemreplacemsg_utm.go index 6495a1558..e30a624a2 100644 --- a/fortios/resource_systemreplacemsg_utm.go +++ b/fortios/resource_systemreplacemsg_utm.go @@ -32,8 +32,8 @@ func resourceSystemReplacemsgUtm() *schema.Resource { "msg_type": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 28), - Required: true, ForceNew: true, + Required: true, }, "buffer": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_systemreplacemsg_webproxy.go b/fortios/resource_systemreplacemsg_webproxy.go index e7df1e086..79e331828 100644 --- a/fortios/resource_systemreplacemsg_webproxy.go +++ b/fortios/resource_systemreplacemsg_webproxy.go @@ -32,8 +32,8 @@ func resourceSystemReplacemsgWebproxy() *schema.Resource { "msg_type": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 28), - Required: true, ForceNew: true, + Required: true, }, "buffer": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_systemsnmp_community.go b/fortios/resource_systemsnmp_community.go index b036d6f15..6e1b0f0f5 100644 --- a/fortios/resource_systemsnmp_community.go +++ b/fortios/resource_systemsnmp_community.go @@ -31,8 +31,8 @@ func resourceSystemSnmpCommunity() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Required: true, }, "name": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_systemsnmp_user.go b/fortios/resource_systemsnmp_user.go index 55910d555..6ec1dca9d 100644 --- a/fortios/resource_systemsnmp_user.go +++ b/fortios/resource_systemsnmp_user.go @@ -32,8 +32,8 @@ func resourceSystemSnmpUser() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 32), - Required: true, ForceNew: true, + Required: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_user_adgrp.go b/fortios/resource_user_adgrp.go index 71be4add9..605879130 100644 --- a/fortios/resource_user_adgrp.go +++ b/fortios/resource_user_adgrp.go @@ -32,8 +32,8 @@ func resourceUserAdgrp() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 511), - Required: true, ForceNew: true, + Required: true, }, "server_name": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_user_device.go b/fortios/resource_user_device.go index c54de680d..db90109f5 100644 --- a/fortios/resource_user_device.go +++ b/fortios/resource_user_device.go @@ -32,8 +32,9 @@ func resourceUserDevice() *schema.Resource { "alias": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "mac": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_user_deviceaccesslist.go b/fortios/resource_user_deviceaccesslist.go index 547d568ff..24820f146 100644 --- a/fortios/resource_user_deviceaccesslist.go +++ b/fortios/resource_user_deviceaccesslist.go @@ -32,8 +32,8 @@ func resourceUserDeviceAccessList() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "default_action": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_user_devicecategory.go b/fortios/resource_user_devicecategory.go index 3f98794d2..38bd0d712 100644 --- a/fortios/resource_user_devicecategory.go +++ b/fortios/resource_user_devicecategory.go @@ -32,8 +32,8 @@ func resourceUserDeviceCategory() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "desc": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_user_devicegroup.go b/fortios/resource_user_devicegroup.go index 87298fefd..1c9a0d36a 100644 --- a/fortios/resource_user_devicegroup.go +++ b/fortios/resource_user_devicegroup.go @@ -32,8 +32,8 @@ func resourceUserDeviceGroup() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "member": &schema.Schema{ Type: schema.TypeList, diff --git a/fortios/resource_user_domaincontroller.go b/fortios/resource_user_domaincontroller.go index 3f4ed6b30..05aa4409c 100644 --- a/fortios/resource_user_domaincontroller.go +++ b/fortios/resource_user_domaincontroller.go @@ -32,8 +32,9 @@ func resourceUserDomainController() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "ip_address": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_user_fortitoken.go b/fortios/resource_user_fortitoken.go index 67dadf962..605db5ee5 100644 --- a/fortios/resource_user_fortitoken.go +++ b/fortios/resource_user_fortitoken.go @@ -32,8 +32,9 @@ func resourceUserFortitoken() *schema.Resource { "serial_number": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 16), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_user_fsso.go b/fortios/resource_user_fsso.go index f71f41fa5..2917e1a87 100644 --- a/fortios/resource_user_fsso.go +++ b/fortios/resource_user_fsso.go @@ -32,8 +32,8 @@ func resourceUserFsso() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "server": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_user_fssopolling.go b/fortios/resource_user_fssopolling.go index 33ef26c80..1dabe6419 100644 --- a/fortios/resource_user_fssopolling.go +++ b/fortios/resource_user_fssopolling.go @@ -31,8 +31,9 @@ func resourceUserFssoPolling() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_user_group.go b/fortios/resource_user_group.go index fd12516d3..2e0d68c7c 100644 --- a/fortios/resource_user_group.go +++ b/fortios/resource_user_group.go @@ -32,8 +32,9 @@ func resourceUserGroup() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "fosid": &schema.Schema{ Type: schema.TypeInt, diff --git a/fortios/resource_user_krbkeytab.go b/fortios/resource_user_krbkeytab.go index 52e30b706..7fac19bcb 100644 --- a/fortios/resource_user_krbkeytab.go +++ b/fortios/resource_user_krbkeytab.go @@ -32,8 +32,9 @@ func resourceUserKrbKeytab() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "principal": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_user_ldap.go b/fortios/resource_user_ldap.go index 8bc2983d7..a6888eee3 100644 --- a/fortios/resource_user_ldap.go +++ b/fortios/resource_user_ldap.go @@ -32,8 +32,9 @@ func resourceUserLdap() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "server": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_user_local.go b/fortios/resource_user_local.go index 8d0547b95..9bffd460a 100644 --- a/fortios/resource_user_local.go +++ b/fortios/resource_user_local.go @@ -32,8 +32,9 @@ func resourceUserLocal() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 64), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "fosid": &schema.Schema{ Type: schema.TypeInt, diff --git a/fortios/resource_user_passwordpolicy.go b/fortios/resource_user_passwordpolicy.go index ad21d5539..7f61b18eb 100644 --- a/fortios/resource_user_passwordpolicy.go +++ b/fortios/resource_user_passwordpolicy.go @@ -32,8 +32,9 @@ func resourceUserPasswordPolicy() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "expire_days": &schema.Schema{ Type: schema.TypeInt, diff --git a/fortios/resource_user_peer.go b/fortios/resource_user_peer.go index ea07d963a..8adbc8009 100644 --- a/fortios/resource_user_peer.go +++ b/fortios/resource_user_peer.go @@ -32,8 +32,9 @@ func resourceUserPeer() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "mandatory_ca_verify": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_user_peergrp.go b/fortios/resource_user_peergrp.go index f318af717..2b584d337 100644 --- a/fortios/resource_user_peergrp.go +++ b/fortios/resource_user_peergrp.go @@ -32,8 +32,9 @@ func resourceUserPeergrp() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "member": &schema.Schema{ Type: schema.TypeList, diff --git a/fortios/resource_user_pop3.go b/fortios/resource_user_pop3.go index 4c92390e9..9dc95c191 100644 --- a/fortios/resource_user_pop3.go +++ b/fortios/resource_user_pop3.go @@ -32,8 +32,9 @@ func resourceUserPop3() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "server": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_user_radius.go b/fortios/resource_user_radius.go index 5ff8612ab..feb743e4c 100644 --- a/fortios/resource_user_radius.go +++ b/fortios/resource_user_radius.go @@ -32,8 +32,9 @@ func resourceUserRadius() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "server": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_user_saml.go b/fortios/resource_user_saml.go index 221478191..88afeb911 100644 --- a/fortios/resource_user_saml.go +++ b/fortios/resource_user_saml.go @@ -32,8 +32,9 @@ func resourceUserSaml() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "cert": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_user_securityexemptlist.go b/fortios/resource_user_securityexemptlist.go index d082ff059..ac1e93e6c 100644 --- a/fortios/resource_user_securityexemptlist.go +++ b/fortios/resource_user_securityexemptlist.go @@ -32,8 +32,9 @@ func resourceUserSecurityExemptList() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "description": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_user_tacacs.go b/fortios/resource_user_tacacs.go index 3e4ad2101..77ee65753 100644 --- a/fortios/resource_user_tacacs.go +++ b/fortios/resource_user_tacacs.go @@ -32,8 +32,9 @@ func resourceUserTacacs() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "server": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_voip_profile.go b/fortios/resource_voip_profile.go index b6cfc8015..0f3603b3e 100644 --- a/fortios/resource_voip_profile.go +++ b/fortios/resource_voip_profile.go @@ -32,8 +32,8 @@ func resourceVoipProfile() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_vpncertificate_ca.go b/fortios/resource_vpncertificate_ca.go index 09d21c842..e280f80cb 100644 --- a/fortios/resource_vpncertificate_ca.go +++ b/fortios/resource_vpncertificate_ca.go @@ -32,8 +32,8 @@ func resourceVpnCertificateCa() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 79), - Required: true, ForceNew: true, + Required: true, }, "ca": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_vpncertificate_crl.go b/fortios/resource_vpncertificate_crl.go index 7ab3e1ba3..abaa6daf0 100644 --- a/fortios/resource_vpncertificate_crl.go +++ b/fortios/resource_vpncertificate_crl.go @@ -32,8 +32,8 @@ func resourceVpnCertificateCrl() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "crl": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_vpncertificate_local.go b/fortios/resource_vpncertificate_local.go index 96c016f10..e39ab8e86 100644 --- a/fortios/resource_vpncertificate_local.go +++ b/fortios/resource_vpncertificate_local.go @@ -32,8 +32,8 @@ func resourceVpnCertificateLocal() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "password": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_vpncertificate_ocspserver.go b/fortios/resource_vpncertificate_ocspserver.go index a0c702cfd..fa941c7fd 100644 --- a/fortios/resource_vpncertificate_ocspserver.go +++ b/fortios/resource_vpncertificate_ocspserver.go @@ -32,8 +32,9 @@ func resourceVpnCertificateOcspServer() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "url": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_vpncertificate_remote.go b/fortios/resource_vpncertificate_remote.go index 001897cb6..6d8014ba0 100644 --- a/fortios/resource_vpncertificate_remote.go +++ b/fortios/resource_vpncertificate_remote.go @@ -32,8 +32,8 @@ func resourceVpnCertificateRemote() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "remote": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_vpnipsec_concentrator.go b/fortios/resource_vpnipsec_concentrator.go index 3116c75b2..59ae9b074 100644 --- a/fortios/resource_vpnipsec_concentrator.go +++ b/fortios/resource_vpnipsec_concentrator.go @@ -32,8 +32,9 @@ func resourceVpnIpsecConcentrator() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "src_check": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_vpnipsec_forticlient.go b/fortios/resource_vpnipsec_forticlient.go index 59f2fe632..34f8d6bb4 100644 --- a/fortios/resource_vpnipsec_forticlient.go +++ b/fortios/resource_vpnipsec_forticlient.go @@ -32,8 +32,9 @@ func resourceVpnIpsecForticlient() *schema.Resource { "realm": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "usergroupname": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_vpnipsec_manualkey.go b/fortios/resource_vpnipsec_manualkey.go index ac8024f74..8a3a30c55 100644 --- a/fortios/resource_vpnipsec_manualkey.go +++ b/fortios/resource_vpnipsec_manualkey.go @@ -32,8 +32,9 @@ func resourceVpnIpsecManualkey() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "interface": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_vpnipsec_manualkeyinterface.go b/fortios/resource_vpnipsec_manualkeyinterface.go index bef275897..bbf96302d 100644 --- a/fortios/resource_vpnipsec_manualkeyinterface.go +++ b/fortios/resource_vpnipsec_manualkeyinterface.go @@ -32,8 +32,9 @@ func resourceVpnIpsecManualkeyInterface() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 15), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "interface": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_vpnipsec_phase1.go b/fortios/resource_vpnipsec_phase1.go index becc0730c..fbf0271b3 100644 --- a/fortios/resource_vpnipsec_phase1.go +++ b/fortios/resource_vpnipsec_phase1.go @@ -32,8 +32,9 @@ func resourceVpnIpsecPhase1() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "type": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_vpnipsec_phase1interface.go b/fortios/resource_vpnipsec_phase1interface.go index 3714d0a21..57167dd6f 100644 --- a/fortios/resource_vpnipsec_phase1interface.go +++ b/fortios/resource_vpnipsec_phase1interface.go @@ -32,8 +32,9 @@ func resourceVpnIpsecPhase1Interface() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 15), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "type": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_vpnipsec_phase2.go b/fortios/resource_vpnipsec_phase2.go index 20994c471..97b9e618a 100644 --- a/fortios/resource_vpnipsec_phase2.go +++ b/fortios/resource_vpnipsec_phase2.go @@ -32,8 +32,9 @@ func resourceVpnIpsecPhase2() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "phase1name": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_vpnipsec_phase2interface.go b/fortios/resource_vpnipsec_phase2interface.go index d4c402161..0201d1f62 100644 --- a/fortios/resource_vpnipsec_phase2interface.go +++ b/fortios/resource_vpnipsec_phase2interface.go @@ -32,8 +32,9 @@ func resourceVpnIpsecPhase2Interface() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "phase1name": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_vpnsslweb_hostchecksoftware.go b/fortios/resource_vpnsslweb_hostchecksoftware.go index 98e70c6ce..0f319b781 100644 --- a/fortios/resource_vpnsslweb_hostchecksoftware.go +++ b/fortios/resource_vpnsslweb_hostchecksoftware.go @@ -32,8 +32,9 @@ func resourceVpnSslWebHostCheckSoftware() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "os_type": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_vpnsslweb_portal.go b/fortios/resource_vpnsslweb_portal.go index 072b3bc64..8e9d82cd6 100644 --- a/fortios/resource_vpnsslweb_portal.go +++ b/fortios/resource_vpnsslweb_portal.go @@ -32,8 +32,9 @@ func resourceVpnSslWebPortal() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "tunnel_mode": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_vpnsslweb_realm.go b/fortios/resource_vpnsslweb_realm.go index 6fd495057..c15c496a4 100644 --- a/fortios/resource_vpnsslweb_realm.go +++ b/fortios/resource_vpnsslweb_realm.go @@ -32,8 +32,9 @@ func resourceVpnSslWebRealm() *schema.Resource { "url_path": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "max_concurrent_user": &schema.Schema{ Type: schema.TypeInt, diff --git a/fortios/resource_vpnsslweb_userbookmark.go b/fortios/resource_vpnsslweb_userbookmark.go index 254925017..137eba0c3 100644 --- a/fortios/resource_vpnsslweb_userbookmark.go +++ b/fortios/resource_vpnsslweb_userbookmark.go @@ -32,8 +32,9 @@ func resourceVpnSslWebUserBookmark() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 101), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "custom_lang": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_vpnsslweb_usergroupbookmark.go b/fortios/resource_vpnsslweb_usergroupbookmark.go index f62adad3d..9dac18aac 100644 --- a/fortios/resource_vpnsslweb_usergroupbookmark.go +++ b/fortios/resource_vpnsslweb_usergroupbookmark.go @@ -32,8 +32,9 @@ func resourceVpnSslWebUserGroupBookmark() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 64), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "bookmarks": &schema.Schema{ Type: schema.TypeList, diff --git a/fortios/resource_waf_mainclass.go b/fortios/resource_waf_mainclass.go index 1030d052f..d067c31b6 100644 --- a/fortios/resource_waf_mainclass.go +++ b/fortios/resource_waf_mainclass.go @@ -37,8 +37,9 @@ func resourceWafMainClass() *schema.Resource { }, "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, }, } diff --git a/fortios/resource_waf_profile.go b/fortios/resource_waf_profile.go index faba14694..91cd87d4f 100644 --- a/fortios/resource_waf_profile.go +++ b/fortios/resource_waf_profile.go @@ -32,8 +32,9 @@ func resourceWafProfile() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "external": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_waf_signature.go b/fortios/resource_waf_signature.go index ebfe92dfa..93ac2ae9e 100644 --- a/fortios/resource_waf_signature.go +++ b/fortios/resource_waf_signature.go @@ -37,8 +37,9 @@ func resourceWafSignature() *schema.Resource { }, "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, }, } diff --git a/fortios/resource_waf_subclass.go b/fortios/resource_waf_subclass.go index 7df43cda7..3fbfdc2c8 100644 --- a/fortios/resource_waf_subclass.go +++ b/fortios/resource_waf_subclass.go @@ -37,8 +37,9 @@ func resourceWafSubClass() *schema.Resource { }, "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, }, } diff --git a/fortios/resource_wanopt_authgroup.go b/fortios/resource_wanopt_authgroup.go index ff165dad7..f0bb28b85 100644 --- a/fortios/resource_wanopt_authgroup.go +++ b/fortios/resource_wanopt_authgroup.go @@ -32,8 +32,9 @@ func resourceWanoptAuthGroup() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "auth_method": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_wanopt_contentdeliverynetworkrule.go b/fortios/resource_wanopt_contentdeliverynetworkrule.go index 53c011b58..e73b5c844 100644 --- a/fortios/resource_wanopt_contentdeliverynetworkrule.go +++ b/fortios/resource_wanopt_contentdeliverynetworkrule.go @@ -32,8 +32,9 @@ func resourceWanoptContentDeliveryNetworkRule() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_wanopt_peer.go b/fortios/resource_wanopt_peer.go index f1fbc5f57..cc4985aa5 100644 --- a/fortios/resource_wanopt_peer.go +++ b/fortios/resource_wanopt_peer.go @@ -32,8 +32,9 @@ func resourceWanoptPeer() *schema.Resource { "peer_host_id": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "ip": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_wanopt_profile.go b/fortios/resource_wanopt_profile.go index c75bf6839..0c6caa51b 100644 --- a/fortios/resource_wanopt_profile.go +++ b/fortios/resource_wanopt_profile.go @@ -32,8 +32,9 @@ func resourceWanoptProfile() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "transparent": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_webfilter_content.go b/fortios/resource_webfilter_content.go index 9e386aef0..1c1bebebe 100644 --- a/fortios/resource_webfilter_content.go +++ b/fortios/resource_webfilter_content.go @@ -31,8 +31,8 @@ func resourceWebfilterContent() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Required: true, }, "name": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_webfilter_contentheader.go b/fortios/resource_webfilter_contentheader.go index 9b911e872..acfa54fc5 100644 --- a/fortios/resource_webfilter_contentheader.go +++ b/fortios/resource_webfilter_contentheader.go @@ -31,8 +31,8 @@ func resourceWebfilterContentHeader() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Required: true, }, "name": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_webfilter_ftgdlocalcat.go b/fortios/resource_webfilter_ftgdlocalcat.go index 1ca121916..cf31f23e0 100644 --- a/fortios/resource_webfilter_ftgdlocalcat.go +++ b/fortios/resource_webfilter_ftgdlocalcat.go @@ -43,8 +43,9 @@ func resourceWebfilterFtgdLocalCat() *schema.Resource { "desc": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 79), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, }, } diff --git a/fortios/resource_webfilter_ftgdlocalrating.go b/fortios/resource_webfilter_ftgdlocalrating.go index d7214ecbc..ba58efc49 100644 --- a/fortios/resource_webfilter_ftgdlocalrating.go +++ b/fortios/resource_webfilter_ftgdlocalrating.go @@ -32,8 +32,9 @@ func resourceWebfilterFtgdLocalRating() *schema.Resource { "url": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 511), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_webfilter_override.go b/fortios/resource_webfilter_override.go index b19d2be1a..5c37416ee 100644 --- a/fortios/resource_webfilter_override.go +++ b/fortios/resource_webfilter_override.go @@ -31,8 +31,9 @@ func resourceWebfilterOverride() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_webfilter_profile.go b/fortios/resource_webfilter_profile.go index 123b750ad..7d84a770c 100644 --- a/fortios/resource_webfilter_profile.go +++ b/fortios/resource_webfilter_profile.go @@ -32,8 +32,8 @@ func resourceWebfilterProfile() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_webfilter_searchengine.go b/fortios/resource_webfilter_searchengine.go index eb73e4eb4..da466e522 100644 --- a/fortios/resource_webfilter_searchengine.go +++ b/fortios/resource_webfilter_searchengine.go @@ -32,8 +32,8 @@ func resourceWebfilterSearchEngine() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "hostname": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_webfilter_urlfilter.go b/fortios/resource_webfilter_urlfilter.go index 558550890..093c8996f 100644 --- a/fortios/resource_webfilter_urlfilter.go +++ b/fortios/resource_webfilter_urlfilter.go @@ -31,8 +31,8 @@ func resourceWebfilterUrlfilter() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Required: true, }, "name": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_webproxy_debugurl.go b/fortios/resource_webproxy_debugurl.go index d7a0f87d1..3cec74d66 100644 --- a/fortios/resource_webproxy_debugurl.go +++ b/fortios/resource_webproxy_debugurl.go @@ -32,8 +32,9 @@ func resourceWebProxyDebugUrl() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "url_pattern": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_webproxy_forwardserver.go b/fortios/resource_webproxy_forwardserver.go index d703cab1c..90bcb09da 100644 --- a/fortios/resource_webproxy_forwardserver.go +++ b/fortios/resource_webproxy_forwardserver.go @@ -32,8 +32,9 @@ func resourceWebProxyForwardServer() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "addr_type": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_webproxy_forwardservergroup.go b/fortios/resource_webproxy_forwardservergroup.go index 8cb957735..9caf93bc6 100644 --- a/fortios/resource_webproxy_forwardservergroup.go +++ b/fortios/resource_webproxy_forwardservergroup.go @@ -32,8 +32,9 @@ func resourceWebProxyForwardServerGroup() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "affinity": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_webproxy_profile.go b/fortios/resource_webproxy_profile.go index f9bd06367..8de85ad0b 100644 --- a/fortios/resource_webproxy_profile.go +++ b/fortios/resource_webproxy_profile.go @@ -32,8 +32,9 @@ func resourceWebProxyProfile() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "header_client_ip": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_webproxy_urlmatch.go b/fortios/resource_webproxy_urlmatch.go index c2df8ded3..67b065993 100644 --- a/fortios/resource_webproxy_urlmatch.go +++ b/fortios/resource_webproxy_urlmatch.go @@ -32,8 +32,9 @@ func resourceWebProxyUrlMatch() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 63), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_webproxy_wisp.go b/fortios/resource_webproxy_wisp.go index 4313a9d41..c70be2b4a 100644 --- a/fortios/resource_webproxy_wisp.go +++ b/fortios/resource_webproxy_wisp.go @@ -32,8 +32,8 @@ func resourceWebProxyWisp() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_wirelesscontroller_apstatus.go b/fortios/resource_wirelesscontroller_apstatus.go index dad14c7c0..2f56252ad 100644 --- a/fortios/resource_wirelesscontroller_apstatus.go +++ b/fortios/resource_wirelesscontroller_apstatus.go @@ -31,8 +31,9 @@ func resourceWirelessControllerApStatus() *schema.Resource { Schema: map[string]*schema.Schema{ "fosid": &schema.Schema{ Type: schema.TypeInt, - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "bssid": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_wirelesscontroller_bleprofile.go b/fortios/resource_wirelesscontroller_bleprofile.go index d58211e1e..e42a76466 100644 --- a/fortios/resource_wirelesscontroller_bleprofile.go +++ b/fortios/resource_wirelesscontroller_bleprofile.go @@ -32,8 +32,9 @@ func resourceWirelessControllerBleProfile() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_wirelesscontroller_bonjourprofile.go b/fortios/resource_wirelesscontroller_bonjourprofile.go index dad82a394..64b370ab1 100644 --- a/fortios/resource_wirelesscontroller_bonjourprofile.go +++ b/fortios/resource_wirelesscontroller_bonjourprofile.go @@ -32,8 +32,9 @@ func resourceWirelessControllerBonjourProfile() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_wirelesscontroller_qosprofile.go b/fortios/resource_wirelesscontroller_qosprofile.go index cd7cf2ed5..f6233a186 100644 --- a/fortios/resource_wirelesscontroller_qosprofile.go +++ b/fortios/resource_wirelesscontroller_qosprofile.go @@ -32,8 +32,9 @@ func resourceWirelessControllerQosProfile() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_wirelesscontroller_region.go b/fortios/resource_wirelesscontroller_region.go index 9bb263e6e..e78beca0a 100644 --- a/fortios/resource_wirelesscontroller_region.go +++ b/fortios/resource_wirelesscontroller_region.go @@ -32,8 +32,9 @@ func resourceWirelessControllerRegion() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "image_type": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_wirelesscontroller_utmprofile.go b/fortios/resource_wirelesscontroller_utmprofile.go index 3feb7151c..d6391201e 100644 --- a/fortios/resource_wirelesscontroller_utmprofile.go +++ b/fortios/resource_wirelesscontroller_utmprofile.go @@ -32,8 +32,9 @@ func resourceWirelessControllerUtmProfile() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_wirelesscontroller_vap.go b/fortios/resource_wirelesscontroller_vap.go index 689d00623..6b51d90ab 100644 --- a/fortios/resource_wirelesscontroller_vap.go +++ b/fortios/resource_wirelesscontroller_vap.go @@ -32,8 +32,8 @@ func resourceWirelessControllerVap() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 15), - Required: true, ForceNew: true, + Required: true, }, "fast_roaming": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_wirelesscontroller_vapgroup.go b/fortios/resource_wirelesscontroller_vapgroup.go index 8e59384e1..d6427f315 100644 --- a/fortios/resource_wirelesscontroller_vapgroup.go +++ b/fortios/resource_wirelesscontroller_vapgroup.go @@ -32,8 +32,8 @@ func resourceWirelessControllerVapGroup() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Required: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_wirelesscontroller_widsprofile.go b/fortios/resource_wirelesscontroller_widsprofile.go index 2150fb260..a6d728e8a 100644 --- a/fortios/resource_wirelesscontroller_widsprofile.go +++ b/fortios/resource_wirelesscontroller_widsprofile.go @@ -32,8 +32,9 @@ func resourceWirelessControllerWidsProfile() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_wirelesscontroller_wtp.go b/fortios/resource_wirelesscontroller_wtp.go index dcc3ffdf1..99c42a9c0 100644 --- a/fortios/resource_wirelesscontroller_wtp.go +++ b/fortios/resource_wirelesscontroller_wtp.go @@ -32,8 +32,9 @@ func resourceWirelessControllerWtp() *schema.Resource { "wtp_id": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "index": &schema.Schema{ Type: schema.TypeInt, diff --git a/fortios/resource_wirelesscontroller_wtpgroup.go b/fortios/resource_wirelesscontroller_wtpgroup.go index 7b60560c8..380b52f7c 100644 --- a/fortios/resource_wirelesscontroller_wtpgroup.go +++ b/fortios/resource_wirelesscontroller_wtpgroup.go @@ -32,8 +32,9 @@ func resourceWirelessControllerWtpGroup() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "platform_type": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_wirelesscontroller_wtpprofile.go b/fortios/resource_wirelesscontroller_wtpprofile.go index f7c2f860f..0345f0142 100644 --- a/fortios/resource_wirelesscontroller_wtpprofile.go +++ b/fortios/resource_wirelesscontroller_wtpprofile.go @@ -32,8 +32,9 @@ func resourceWirelessControllerWtpProfile() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "comment": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_wirelesscontrollerhotspot20_anqp3gppcellular.go b/fortios/resource_wirelesscontrollerhotspot20_anqp3gppcellular.go index 6a1bd76f6..9e49ab22c 100644 --- a/fortios/resource_wirelesscontrollerhotspot20_anqp3gppcellular.go +++ b/fortios/resource_wirelesscontrollerhotspot20_anqp3gppcellular.go @@ -32,8 +32,9 @@ func resourceWirelessControllerHotspot20Anqp3GppCellular() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "mcc_mnc_list": &schema.Schema{ Type: schema.TypeList, diff --git a/fortios/resource_wirelesscontrollerhotspot20_anqpipaddresstype.go b/fortios/resource_wirelesscontrollerhotspot20_anqpipaddresstype.go index 2acbbd509..8bfac5d09 100644 --- a/fortios/resource_wirelesscontrollerhotspot20_anqpipaddresstype.go +++ b/fortios/resource_wirelesscontrollerhotspot20_anqpipaddresstype.go @@ -32,8 +32,9 @@ func resourceWirelessControllerHotspot20AnqpIpAddressType() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "ipv6_address_type": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_wirelesscontrollerhotspot20_anqpnairealm.go b/fortios/resource_wirelesscontrollerhotspot20_anqpnairealm.go index 4c90f7fc0..caab1fd16 100644 --- a/fortios/resource_wirelesscontrollerhotspot20_anqpnairealm.go +++ b/fortios/resource_wirelesscontrollerhotspot20_anqpnairealm.go @@ -32,8 +32,9 @@ func resourceWirelessControllerHotspot20AnqpNaiRealm() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "nai_list": &schema.Schema{ Type: schema.TypeList, diff --git a/fortios/resource_wirelesscontrollerhotspot20_anqpnetworkauthtype.go b/fortios/resource_wirelesscontrollerhotspot20_anqpnetworkauthtype.go index ff7c896b3..8464d3cc1 100644 --- a/fortios/resource_wirelesscontrollerhotspot20_anqpnetworkauthtype.go +++ b/fortios/resource_wirelesscontrollerhotspot20_anqpnetworkauthtype.go @@ -32,8 +32,9 @@ func resourceWirelessControllerHotspot20AnqpNetworkAuthType() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "auth_type": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_wirelesscontrollerhotspot20_anqproamingconsortium.go b/fortios/resource_wirelesscontrollerhotspot20_anqproamingconsortium.go index bb38f65d1..2231217fc 100644 --- a/fortios/resource_wirelesscontrollerhotspot20_anqproamingconsortium.go +++ b/fortios/resource_wirelesscontrollerhotspot20_anqproamingconsortium.go @@ -32,8 +32,9 @@ func resourceWirelessControllerHotspot20AnqpRoamingConsortium() *schema.Resource "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "oi_list": &schema.Schema{ Type: schema.TypeList, diff --git a/fortios/resource_wirelesscontrollerhotspot20_anqpvenuename.go b/fortios/resource_wirelesscontrollerhotspot20_anqpvenuename.go index 5ef77d379..fa1a32c40 100644 --- a/fortios/resource_wirelesscontrollerhotspot20_anqpvenuename.go +++ b/fortios/resource_wirelesscontrollerhotspot20_anqpvenuename.go @@ -32,8 +32,9 @@ func resourceWirelessControllerHotspot20AnqpVenueName() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "value_list": &schema.Schema{ Type: schema.TypeList, diff --git a/fortios/resource_wirelesscontrollerhotspot20_h2qpconncapability.go b/fortios/resource_wirelesscontrollerhotspot20_h2qpconncapability.go index 728b785f1..46b349066 100644 --- a/fortios/resource_wirelesscontrollerhotspot20_h2qpconncapability.go +++ b/fortios/resource_wirelesscontrollerhotspot20_h2qpconncapability.go @@ -32,8 +32,9 @@ func resourceWirelessControllerHotspot20H2QpConnCapability() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "icmp_port": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_wirelesscontrollerhotspot20_h2qpoperatorname.go b/fortios/resource_wirelesscontrollerhotspot20_h2qpoperatorname.go index 6128ccd9e..d52dcbb9f 100644 --- a/fortios/resource_wirelesscontrollerhotspot20_h2qpoperatorname.go +++ b/fortios/resource_wirelesscontrollerhotspot20_h2qpoperatorname.go @@ -32,8 +32,9 @@ func resourceWirelessControllerHotspot20H2QpOperatorName() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "value_list": &schema.Schema{ Type: schema.TypeList, diff --git a/fortios/resource_wirelesscontrollerhotspot20_h2qposuprovider.go b/fortios/resource_wirelesscontrollerhotspot20_h2qposuprovider.go index d1a06e9aa..13b948067 100644 --- a/fortios/resource_wirelesscontrollerhotspot20_h2qposuprovider.go +++ b/fortios/resource_wirelesscontrollerhotspot20_h2qposuprovider.go @@ -32,8 +32,9 @@ func resourceWirelessControllerHotspot20H2QpOsuProvider() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "friendly_name": &schema.Schema{ Type: schema.TypeList, diff --git a/fortios/resource_wirelesscontrollerhotspot20_h2qpwanmetric.go b/fortios/resource_wirelesscontrollerhotspot20_h2qpwanmetric.go index 5e60e2f19..f772b0622 100644 --- a/fortios/resource_wirelesscontrollerhotspot20_h2qpwanmetric.go +++ b/fortios/resource_wirelesscontrollerhotspot20_h2qpwanmetric.go @@ -32,8 +32,9 @@ func resourceWirelessControllerHotspot20H2QpWanMetric() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "link_status": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_wirelesscontrollerhotspot20_hsprofile.go b/fortios/resource_wirelesscontrollerhotspot20_hsprofile.go index c2704be10..a2151bfa0 100644 --- a/fortios/resource_wirelesscontrollerhotspot20_hsprofile.go +++ b/fortios/resource_wirelesscontrollerhotspot20_hsprofile.go @@ -32,8 +32,9 @@ func resourceWirelessControllerHotspot20HsProfile() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "access_network_type": &schema.Schema{ Type: schema.TypeString, diff --git a/fortios/resource_wirelesscontrollerhotspot20_icon.go b/fortios/resource_wirelesscontrollerhotspot20_icon.go index 693f47ffe..5b31ff4d2 100644 --- a/fortios/resource_wirelesscontrollerhotspot20_icon.go +++ b/fortios/resource_wirelesscontrollerhotspot20_icon.go @@ -32,8 +32,9 @@ func resourceWirelessControllerHotspot20Icon() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "icon_list": &schema.Schema{ Type: schema.TypeList, diff --git a/fortios/resource_wirelesscontrollerhotspot20_qosmap.go b/fortios/resource_wirelesscontrollerhotspot20_qosmap.go index a26898bcc..95e86884f 100644 --- a/fortios/resource_wirelesscontrollerhotspot20_qosmap.go +++ b/fortios/resource_wirelesscontrollerhotspot20_qosmap.go @@ -32,8 +32,9 @@ func resourceWirelessControllerHotspot20QosMap() *schema.Resource { "name": &schema.Schema{ Type: schema.TypeString, ValidateFunc: validation.StringLenBetween(0, 35), - Required: true, ForceNew: true, + Optional: true, + Computed: true, }, "dscp_except": &schema.Schema{ Type: schema.TypeList, diff --git a/website/docs/r/fortios_application_custom.html.markdown b/website/docs/r/fortios_application_custom.html.markdown index ceee6f8d5..561c2d4b4 100644 --- a/website/docs/r/fortios_application_custom.html.markdown +++ b/website/docs/r/fortios_application_custom.html.markdown @@ -13,7 +13,7 @@ Configure custom application signatures. The following arguments are supported: -* `tag` - (Required) Signature tag. +* `tag` - Signature tag. * `name` - Name of this custom application signature. * `fosid` - Custom application category ID (use ? to view available options). * `comment` - Comment. diff --git a/website/docs/r/fortios_application_group.html.markdown b/website/docs/r/fortios_application_group.html.markdown index c46ae6456..96c597605 100644 --- a/website/docs/r/fortios_application_group.html.markdown +++ b/website/docs/r/fortios_application_group.html.markdown @@ -26,7 +26,7 @@ resource "fortios_application_group" "trname" { The following arguments are supported: -* `name` - (Required) Application group name. +* `name` - Application group name. * `comment` - Comment * `type` - Application group type. * `application` - Application ID list. The structure of `application` block is documented below. diff --git a/website/docs/r/fortios_application_name.html.markdown b/website/docs/r/fortios_application_name.html.markdown index f1d1d19e9..328d4a984 100644 --- a/website/docs/r/fortios_application_name.html.markdown +++ b/website/docs/r/fortios_application_name.html.markdown @@ -13,7 +13,7 @@ Configure application signatures. The following arguments are supported: -* `name` - (Required) Application name. +* `name` - Application name. * `fosid` - Application ID. * `category` - (Required) Application category ID. * `sub_category` - Application sub-category ID. diff --git a/website/docs/r/fortios_authentication_rule.html.markdown b/website/docs/r/fortios_authentication_rule.html.markdown index 9d166a7d9..ab83b508c 100644 --- a/website/docs/r/fortios_authentication_rule.html.markdown +++ b/website/docs/r/fortios_authentication_rule.html.markdown @@ -26,7 +26,7 @@ resource "fortios_authentication_rule" "trname" { The following arguments are supported: -* `name` - (Required) Authentication rule name. +* `name` - Authentication rule name. * `status` - Enable/disable this authentication rule. * `protocol` - Select the protocol to use for authentication (default = http). Users connect to the FortiGate using this protocol and are asked to authenticate. * `srcaddr` - Select an IPv4 source address from available options. Required for web proxy authentication. The structure of `srcaddr` block is documented below. diff --git a/website/docs/r/fortios_authentication_scheme.html.markdown b/website/docs/r/fortios_authentication_scheme.html.markdown index cd2ae3535..95721a8a5 100644 --- a/website/docs/r/fortios_authentication_scheme.html.markdown +++ b/website/docs/r/fortios_authentication_scheme.html.markdown @@ -38,7 +38,7 @@ resource "fortios_authentication_scheme" "trname" { The following arguments are supported: -* `name` - (Required) Authentication scheme name. +* `name` - Authentication scheme name. * `method` - (Required) Authentication methods (default = basic). * `negotiate_ntlm` - Enable/disable negotiate authentication for NTLM (default = disable). * `kerberos_keytab` - Kerberos keytab setting. diff --git a/website/docs/r/fortios_dlp_fpdocsource.html.markdown b/website/docs/r/fortios_dlp_fpdocsource.html.markdown index 81f63821b..c152807e0 100644 --- a/website/docs/r/fortios_dlp_fpdocsource.html.markdown +++ b/website/docs/r/fortios_dlp_fpdocsource.html.markdown @@ -36,7 +36,7 @@ resource "fortios_dlp_fpdocsource" "trname" { The following arguments are supported: -* `name` - (Required) Name of the DLP fingerprint database. +* `name` - Name of the DLP fingerprint database. * `server_type` - (Required) Protocol used to communicate with the file server. Currently only Samba (SMB) servers are supported. * `server` - (Required) IPv4 or IPv6 address of the server. * `period` - Frequency for which the FortiGate checks the server for new or changed files. diff --git a/website/docs/r/fortios_endpointcontrol_client.html.markdown b/website/docs/r/fortios_endpointcontrol_client.html.markdown index eb6a4318a..6182d68fb 100644 --- a/website/docs/r/fortios_endpointcontrol_client.html.markdown +++ b/website/docs/r/fortios_endpointcontrol_client.html.markdown @@ -13,7 +13,7 @@ Configure endpoint control client lists. The following arguments are supported: -* `fosid` - (Required) Endpoint client ID. +* `fosid` - Endpoint client ID. * `ftcl_uid` - Endpoint FortiClient UID. * `src_ip` - Endpoint client IP address. * `src_mac` - Endpoint client MAC address. diff --git a/website/docs/r/fortios_endpointcontrol_forticlientems.html.markdown b/website/docs/r/fortios_endpointcontrol_forticlientems.html.markdown index 5de90aded..d3a9e6336 100644 --- a/website/docs/r/fortios_endpointcontrol_forticlientems.html.markdown +++ b/website/docs/r/fortios_endpointcontrol_forticlientems.html.markdown @@ -13,7 +13,7 @@ Configure FortiClient Enterprise Management Server (EMS) entries. The following arguments are supported: -* `name` - (Required) FortiClient Enterprise Management Server (EMS) name. +* `name` - FortiClient Enterprise Management Server (EMS) name. * `address` - (Required) Firewall address name. * `serial_number` - (Required) FortiClient EMS Serial Number. * `listen_port` - FortiClient EMS telemetry listen port number. (1 - 65535, default: 8013). diff --git a/website/docs/r/fortios_endpointcontrol_forticlientregistrationsync.html.markdown b/website/docs/r/fortios_endpointcontrol_forticlientregistrationsync.html.markdown index 54e8f0c46..76b6ca4e5 100644 --- a/website/docs/r/fortios_endpointcontrol_forticlientregistrationsync.html.markdown +++ b/website/docs/r/fortios_endpointcontrol_forticlientregistrationsync.html.markdown @@ -22,7 +22,7 @@ resource "fortios_endpointcontrol_forticlientregistrationsync" "trname" { The following arguments are supported: -* `peer_name` - (Required) Peer name. +* `peer_name` - Peer name. * `peer_ip` - (Required) IP address of the peer FortiGate for endpoint license synchronization. diff --git a/website/docs/r/fortios_endpointcontrol_profile.html.markdown b/website/docs/r/fortios_endpointcontrol_profile.html.markdown index a200a17d4..103545440 100644 --- a/website/docs/r/fortios_endpointcontrol_profile.html.markdown +++ b/website/docs/r/fortios_endpointcontrol_profile.html.markdown @@ -75,7 +75,7 @@ resource "fortios_endpointcontrol_profile" "trname" { The following arguments are supported: -* `profile_name` - (Required) Profile name. +* `profile_name` - Profile name. * `forticlient_winmac_settings` - FortiClient settings for Windows/Mac platform. The structure of `forticlient_winmac_settings` block is documented below. * `forticlient_android_settings` - FortiClient settings for Android platform. The structure of `forticlient_android_settings` block is documented below. * `forticlient_ios_settings` - FortiClient settings for iOS platform. The structure of `forticlient_ios_settings` block is documented below. diff --git a/website/docs/r/fortios_endpointcontrol_registeredforticlient.html.markdown b/website/docs/r/fortios_endpointcontrol_registeredforticlient.html.markdown index 99786e120..3a3486f10 100644 --- a/website/docs/r/fortios_endpointcontrol_registeredforticlient.html.markdown +++ b/website/docs/r/fortios_endpointcontrol_registeredforticlient.html.markdown @@ -13,7 +13,7 @@ Registered FortiClient list. The following arguments are supported: -* `uid` - (Required) FortiClient UID. +* `uid` - FortiClient UID. * `vdom` - Registering vdom. * `ip` - Endpoint IP address. * `mac` - Endpoint MAC address. diff --git a/website/docs/r/fortios_firewall_DoSpolicy.html.markdown b/website/docs/r/fortios_firewall_DoSpolicy.html.markdown index ba5cf4ae6..cfbfe4f6e 100644 --- a/website/docs/r/fortios_firewall_DoSpolicy.html.markdown +++ b/website/docs/r/fortios_firewall_DoSpolicy.html.markdown @@ -13,7 +13,7 @@ Configure IPv4 DoS policies. The following arguments are supported: -* `policyid` - (Required) Policy ID. +* `policyid` - Policy ID. * `status` - Enable/disable this policy. * `comments` - Comment. * `interface` - (Required) Incoming interface name from available interfaces. diff --git a/website/docs/r/fortios_firewall_DoSpolicy6.html.markdown b/website/docs/r/fortios_firewall_DoSpolicy6.html.markdown index facedfd78..6fbe47fb5 100644 --- a/website/docs/r/fortios_firewall_DoSpolicy6.html.markdown +++ b/website/docs/r/fortios_firewall_DoSpolicy6.html.markdown @@ -13,7 +13,7 @@ Configure IPv6 DoS policies. The following arguments are supported: -* `policyid` - (Required) Policy ID. +* `policyid` - Policy ID. * `status` - Enable/disable this policy. * `comments` - Comment. * `interface` - (Required) Incoming interface name from available interfaces. diff --git a/website/docs/r/fortios_firewall_address.html.markdown b/website/docs/r/fortios_firewall_address.html.markdown index afc7faa87..ebfddfafe 100644 --- a/website/docs/r/fortios_firewall_address.html.markdown +++ b/website/docs/r/fortios_firewall_address.html.markdown @@ -29,7 +29,7 @@ resource "fortios_firewall_address" "trname" { The following arguments are supported: -* `name` - (Required) Address name. +* `name` - Address name. * `uuid` - Universally Unique Identifier (UUID; automatically assigned but can be manually reset). * `subnet` - IP address and subnet mask of address. * `type` - Type of address. diff --git a/website/docs/r/fortios_firewall_address6.html.markdown b/website/docs/r/fortios_firewall_address6.html.markdown index 79145836f..112134f67 100644 --- a/website/docs/r/fortios_firewall_address6.html.markdown +++ b/website/docs/r/fortios_firewall_address6.html.markdown @@ -30,7 +30,7 @@ resource "fortios_firewall_address6" "trname" { The following arguments are supported: -* `name` - (Required) Address name. +* `name` - Address name. * `uuid` - Universally Unique Identifier (UUID; automatically assigned but can be manually reset). * `type` - Type of IPv6 address object (default = ipprefix). * `sdn` - SDN. diff --git a/website/docs/r/fortios_firewall_addrgrp6.html.markdown b/website/docs/r/fortios_firewall_addrgrp6.html.markdown index 1faf08d9d..4c2e687ad 100644 --- a/website/docs/r/fortios_firewall_addrgrp6.html.markdown +++ b/website/docs/r/fortios_firewall_addrgrp6.html.markdown @@ -40,7 +40,7 @@ resource "fortios_firewall_addrgrp6" "trname" { The following arguments are supported: -* `name` - (Required) IPv6 address group name. +* `name` - IPv6 address group name. * `uuid` - Universally Unique Identifier (UUID; automatically assigned but can be manually reset). * `visibility` - Enable/disable address group6 visibility in the GUI. * `color` - Integer value to determine the color of the icon in the GUI (1 - 32, default = 0, which sets the value to 1). diff --git a/website/docs/r/fortios_firewall_centralsnatmap.html.markdown b/website/docs/r/fortios_firewall_centralsnatmap.html.markdown index 164c6cd4b..c2153ab08 100644 --- a/website/docs/r/fortios_firewall_centralsnatmap.html.markdown +++ b/website/docs/r/fortios_firewall_centralsnatmap.html.markdown @@ -42,7 +42,7 @@ resource "fortios_firewall_centralsnatmap" "trname" { The following arguments are supported: -* `policyid` - (Required) Policy ID. +* `policyid` - Policy ID. * `status` - Enable/disable the active status of this policy. * `orig_addr` - (Required) Original address. The structure of `orig_addr` block is documented below. * `srcintf` - (Required) Source interface name from available interfaces. The structure of `srcintf` block is documented below. diff --git a/website/docs/r/fortios_firewall_dnstranslation.html.markdown b/website/docs/r/fortios_firewall_dnstranslation.html.markdown index da4ad70c6..85e97474a 100644 --- a/website/docs/r/fortios_firewall_dnstranslation.html.markdown +++ b/website/docs/r/fortios_firewall_dnstranslation.html.markdown @@ -24,7 +24,7 @@ resource "fortios_firewall_dnstranslation" "trname" { The following arguments are supported: -* `fosid` - (Required) ID. +* `fosid` - ID. * `src` - IPv4 address or subnet on the internal network to compare with the resolved address in DNS query replies. If the resolved address matches, the resolved address is substituted with dst. * `dst` - IPv4 address or subnet on the external network to substitute for the resolved address in DNS query replies. Can be single IP address or subnet on the external network, but number of addresses must equal number of mapped IP addresses in src. * `netmask` - If src and dst are subnets rather than single IP addresses, enter the netmask for both src and dst. diff --git a/website/docs/r/fortios_firewall_interfacepolicy.html.markdown b/website/docs/r/fortios_firewall_interfacepolicy.html.markdown index 6773bee8e..d4c3feea8 100644 --- a/website/docs/r/fortios_firewall_interfacepolicy.html.markdown +++ b/website/docs/r/fortios_firewall_interfacepolicy.html.markdown @@ -45,7 +45,7 @@ resource "fortios_firewall_interfacepolicy" "trname" { The following arguments are supported: -* `policyid` - (Required) Policy ID. +* `policyid` - Policy ID. * `status` - Enable/disable this policy. * `comments` - Comments. * `logtraffic` - Logging type to be used in this policy (Options: all | utm | disable, Default: utm). diff --git a/website/docs/r/fortios_firewall_interfacepolicy6.html.markdown b/website/docs/r/fortios_firewall_interfacepolicy6.html.markdown index 1a516af39..78299d04f 100644 --- a/website/docs/r/fortios_firewall_interfacepolicy6.html.markdown +++ b/website/docs/r/fortios_firewall_interfacepolicy6.html.markdown @@ -45,7 +45,7 @@ resource "fortios_firewall_interfacepolicy6" "trname" { The following arguments are supported: -* `policyid` - (Required) Policy ID. +* `policyid` - Policy ID. * `status` - Enable/disable this policy. * `comments` - Comments. * `logtraffic` - Logging type to be used in this policy (Options: all | utm | disable, Default: utm). diff --git a/website/docs/r/fortios_firewall_internetservice.html.markdown b/website/docs/r/fortios_firewall_internetservice.html.markdown index 84c2e7c45..c3cc1a49c 100644 --- a/website/docs/r/fortios_firewall_internetservice.html.markdown +++ b/website/docs/r/fortios_firewall_internetservice.html.markdown @@ -13,7 +13,7 @@ Show Internet Service application. The following arguments are supported: -* `fosid` - (Required) Internet Service ID. +* `fosid` - Internet Service ID. * `name` - Internet Service name. * `reputation` - Reputation level of the Internet Service. * `icon_id` - Icon ID of Internet Service. diff --git a/website/docs/r/fortios_firewall_internetservicecustom.html.markdown b/website/docs/r/fortios_firewall_internetservicecustom.html.markdown index 997e4a758..8de37b377 100644 --- a/website/docs/r/fortios_firewall_internetservicecustom.html.markdown +++ b/website/docs/r/fortios_firewall_internetservicecustom.html.markdown @@ -13,7 +13,7 @@ Configure custom Internet Services. The following arguments are supported: -* `name` - (Required) Internet Service name. +* `name` - Internet Service name. * `reputation` - Reputation level of the custom Internet Service. * `comment` - Comment. * `entry` - Entries added to the Internet Service database and custom database. The structure of `entry` block is documented below. diff --git a/website/docs/r/fortios_firewall_internetservicecustomgroup.html.markdown b/website/docs/r/fortios_firewall_internetservicecustomgroup.html.markdown index fc3eb0c69..378b2d5bf 100644 --- a/website/docs/r/fortios_firewall_internetservicecustomgroup.html.markdown +++ b/website/docs/r/fortios_firewall_internetservicecustomgroup.html.markdown @@ -13,7 +13,7 @@ Configure custom Internet Service group. The following arguments are supported: -* `name` - (Required) Custom Internet Service group name. +* `name` - Custom Internet Service group name. * `comment` - Comment. * `member` - Custom Internet Service group members. The structure of `member` block is documented below. diff --git a/website/docs/r/fortios_firewall_internetservicedefinition.html.markdown b/website/docs/r/fortios_firewall_internetservicedefinition.html.markdown index b67b2404d..ef95d810b 100644 --- a/website/docs/r/fortios_firewall_internetservicedefinition.html.markdown +++ b/website/docs/r/fortios_firewall_internetservicedefinition.html.markdown @@ -13,7 +13,7 @@ Internet Service definition. The following arguments are supported: -* `fosid` - (Required) Internet Service application list ID. +* `fosid` - Internet Service application list ID. * `entry` - Protocol and port information in an Internet Service entry. The structure of `entry` block is documented below. The `entry` block supports: diff --git a/website/docs/r/fortios_firewall_internetserviceextension.html.markdown b/website/docs/r/fortios_firewall_internetserviceextension.html.markdown index aef5ee52b..f5e5a36d2 100644 --- a/website/docs/r/fortios_firewall_internetserviceextension.html.markdown +++ b/website/docs/r/fortios_firewall_internetserviceextension.html.markdown @@ -22,7 +22,7 @@ resource "fortios_firewall_internetserviceextension" "trname" { The following arguments are supported: -* `fosid` - (Required) Internet Service ID in the Internet Service database. +* `fosid` - Internet Service ID in the Internet Service database. * `comment` - Comment. * `entry` - Entries added to the Internet Service extension database. The structure of `entry` block is documented below. * `disable_entry` - Disable entries in the Internet Service database. The structure of `disable_entry` block is documented below. diff --git a/website/docs/r/fortios_firewall_internetservicegroup.html.markdown b/website/docs/r/fortios_firewall_internetservicegroup.html.markdown index b86d72e22..35fe73390 100644 --- a/website/docs/r/fortios_firewall_internetservicegroup.html.markdown +++ b/website/docs/r/fortios_firewall_internetservicegroup.html.markdown @@ -44,7 +44,7 @@ resource "fortios_firewall_internetservicegroup" "trname" { The following arguments are supported: -* `name` - (Required) Internet Service group name. +* `name` - Internet Service group name. * `comment` - Comment. * `direction` - How this service may be used (source, destination or both). * `member` - Internet Service group member. The structure of `member` block is documented below. diff --git a/website/docs/r/fortios_firewall_ippool.html.markdown b/website/docs/r/fortios_firewall_ippool.html.markdown index 13ef085d1..1f5e312be 100644 --- a/website/docs/r/fortios_firewall_ippool.html.markdown +++ b/website/docs/r/fortios_firewall_ippool.html.markdown @@ -31,7 +31,7 @@ resource "fortios_firewall_ippool" "trname" { The following arguments are supported: -* `name` - (Required) IP pool name. +* `name` - IP pool name. * `type` - IP pool type (overload, one-to-one, fixed port range, or port block allocation). * `startip` - (Required) First IPv4 address (inclusive) in the range for the address pool (format xxx.xxx.xxx.xxx, Default: 0.0.0.0). * `endip` - (Required) Final IPv4 address (inclusive) in the range for the address pool (format xxx.xxx.xxx.xxx, Default: 0.0.0.0). diff --git a/website/docs/r/fortios_firewall_ippool6.html.markdown b/website/docs/r/fortios_firewall_ippool6.html.markdown index f0ace9d62..1149e0597 100644 --- a/website/docs/r/fortios_firewall_ippool6.html.markdown +++ b/website/docs/r/fortios_firewall_ippool6.html.markdown @@ -23,7 +23,7 @@ resource "fortios_firewall_ippool6" "trname" { The following arguments are supported: -* `name` - (Required) IPv6 IP pool name. +* `name` - IPv6 IP pool name. * `startip` - (Required) First IPv6 address (inclusive) in the range for the address pool (format xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx, Default: ::). * `endip` - (Required) Final IPv6 address (inclusive) in the range for the address pool (format xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx, Default: ::). * `comments` - Comment. diff --git a/website/docs/r/fortios_firewall_iptranslation.html.markdown b/website/docs/r/fortios_firewall_iptranslation.html.markdown index 6d045f0ce..9ef9980b5 100644 --- a/website/docs/r/fortios_firewall_iptranslation.html.markdown +++ b/website/docs/r/fortios_firewall_iptranslation.html.markdown @@ -25,7 +25,7 @@ resource "fortios_firewall_iptranslation" "trname" { The following arguments are supported: -* `transid` - (Required) IP translation ID. +* `transid` - IP translation ID. * `type` - IP translation type (option: SCTP). * `startip` - (Required) First IPv4 address (inclusive) in the range of the addresses to be translated (format xxx.xxx.xxx.xxx, default: 0.0.0.0). * `endip` - (Required) Final IPv4 address (inclusive) in the range of the addresses to be translated (format xxx.xxx.xxx.xxx, default: 0.0.0.0). diff --git a/website/docs/r/fortios_firewall_ldbmonitor.html.markdown b/website/docs/r/fortios_firewall_ldbmonitor.html.markdown index 7fe5dfe54..affb916ca 100644 --- a/website/docs/r/fortios_firewall_ldbmonitor.html.markdown +++ b/website/docs/r/fortios_firewall_ldbmonitor.html.markdown @@ -27,7 +27,7 @@ resource "fortios_firewall_ldbmonitor" "trname" { The following arguments are supported: -* `name` - (Required) Monitor name. +* `name` - Monitor name. * `type` - (Required) Select the Monitor type used by the health check monitor to check the health of the server (PING | TCP | HTTP). * `interval` - Time between health checks (5 - 65635 sec, default = 10). * `timeout` - Time to wait to receive response to a health check from a server. Reaching the timeout means the health check failed (1 - 255 sec, default = 2). diff --git a/website/docs/r/fortios_firewall_localinpolicy.html.markdown b/website/docs/r/fortios_firewall_localinpolicy.html.markdown index 7c4be5b73..91917640c 100644 --- a/website/docs/r/fortios_firewall_localinpolicy.html.markdown +++ b/website/docs/r/fortios_firewall_localinpolicy.html.markdown @@ -38,7 +38,7 @@ resource "fortios_firewall_localinpolicy" "trname" { The following arguments are supported: -* `policyid` - (Required) User defined local in policy ID. +* `policyid` - User defined local in policy ID. * `ha_mgmt_intf_only` - Enable/disable dedicating the HA management interface only for local-in policy. * `intf` - Incoming interface name from available options. * `srcaddr` - (Required) Source address object from available options. The structure of `srcaddr` block is documented below. diff --git a/website/docs/r/fortios_firewall_localinpolicy6.html.markdown b/website/docs/r/fortios_firewall_localinpolicy6.html.markdown index 4eb45cbfa..caf4d2502 100644 --- a/website/docs/r/fortios_firewall_localinpolicy6.html.markdown +++ b/website/docs/r/fortios_firewall_localinpolicy6.html.markdown @@ -37,7 +37,7 @@ resource "fortios_firewall_localinpolicy6" "trname" { The following arguments are supported: -* `policyid` - (Required) User defined local in policy ID. +* `policyid` - User defined local in policy ID. * `intf` - (Required) Incoming interface name from available options. * `srcaddr` - (Required) Source address object from available options. The structure of `srcaddr` block is documented below. * `dstaddr` - (Required) Destination address object from available options. The structure of `dstaddr` block is documented below. diff --git a/website/docs/r/fortios_firewall_multicastaddress.html.markdown b/website/docs/r/fortios_firewall_multicastaddress.html.markdown index 35ce3b748..6799115d0 100644 --- a/website/docs/r/fortios_firewall_multicastaddress.html.markdown +++ b/website/docs/r/fortios_firewall_multicastaddress.html.markdown @@ -27,7 +27,7 @@ resource "fortios_firewall_multicastaddress" "trname" { The following arguments are supported: -* `name` - (Required) Multicast address name. +* `name` - Multicast address name. * `type` - Type of address object: multicast IP address range or broadcast IP/mask to be treated as a multicast address. * `subnet` - Broadcast address and subnet. * `start_ip` - (Required) First IPv4 address (inclusive) in the range for the address. diff --git a/website/docs/r/fortios_firewall_multicastaddress6.html.markdown b/website/docs/r/fortios_firewall_multicastaddress6.html.markdown index f59735e99..421c9bf78 100644 --- a/website/docs/r/fortios_firewall_multicastaddress6.html.markdown +++ b/website/docs/r/fortios_firewall_multicastaddress6.html.markdown @@ -24,7 +24,7 @@ resource "fortios_firewall_multicastaddress6" "trname" { The following arguments are supported: -* `name` - (Required) IPv6 multicast address name. +* `name` - IPv6 multicast address name. * `ip6` - (Required) IPv6 address prefix (format: xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx/xxx). * `comment` - Comment. * `visibility` - Enable/disable visibility of the IPv6 multicast address on the GUI. diff --git a/website/docs/r/fortios_firewall_multicastpolicy.html.markdown b/website/docs/r/fortios_firewall_multicastpolicy.html.markdown index 99fd5f89f..d4fd8d991 100644 --- a/website/docs/r/fortios_firewall_multicastpolicy.html.markdown +++ b/website/docs/r/fortios_firewall_multicastpolicy.html.markdown @@ -40,7 +40,7 @@ resource "fortios_firewall_multicastpolicy" "trname" { The following arguments are supported: -* `fosid` - (Required) Policy ID. +* `fosid` - Policy ID. * `status` - Enable/disable this policy. * `logtraffic` - Enable/disable logging traffic accepted by this policy. * `srcintf` - (Required) Source interface name. diff --git a/website/docs/r/fortios_firewall_multicastpolicy6.html.markdown b/website/docs/r/fortios_firewall_multicastpolicy6.html.markdown index 581dddf1d..41a70cc3a 100644 --- a/website/docs/r/fortios_firewall_multicastpolicy6.html.markdown +++ b/website/docs/r/fortios_firewall_multicastpolicy6.html.markdown @@ -37,7 +37,7 @@ resource "fortios_firewall_multicastpolicy6" "trname" { The following arguments are supported: -* `fosid` - (Required) Policy ID. +* `fosid` - Policy ID. * `status` - Enable/disable this policy. * `logtraffic` - Enable/disable logging traffic accepted by this policy. * `srcintf` - (Required) IPv6 source interface name. diff --git a/website/docs/r/fortios_firewall_policy.html.markdown b/website/docs/r/fortios_firewall_policy.html.markdown index 54c776ab5..f408253a1 100644 --- a/website/docs/r/fortios_firewall_policy.html.markdown +++ b/website/docs/r/fortios_firewall_policy.html.markdown @@ -52,7 +52,7 @@ resource "fortios_firewall_policy" "trname" { The following arguments are supported: -* `policyid` - (Required) Policy ID. +* `policyid` - Policy ID. * `name` - Policy name. * `uuid` - Universally Unique Identifier (UUID; automatically assigned but can be manually reset). * `srcintf` - (Required) Incoming (ingress) interface. The structure of `srcintf` block is documented below. diff --git a/website/docs/r/fortios_firewall_policy46.html.markdown b/website/docs/r/fortios_firewall_policy46.html.markdown index 7296014fd..37ea12d5f 100644 --- a/website/docs/r/fortios_firewall_policy46.html.markdown +++ b/website/docs/r/fortios_firewall_policy46.html.markdown @@ -60,7 +60,7 @@ resource "fortios_firewall_policy46" "trname" { The following arguments are supported: * `permit_any_host` - Enable/disable allowing any host. -* `policyid` - (Required) Policy ID. +* `policyid` - Policy ID. * `uuid` - Universally Unique Identifier (UUID; automatically assigned but can be manually reset). * `srcintf` - (Required) Source interface name. * `dstintf` - (Required) Destination interface name. diff --git a/website/docs/r/fortios_firewall_policy6.html.markdown b/website/docs/r/fortios_firewall_policy6.html.markdown index c8322de4a..5d832bec7 100644 --- a/website/docs/r/fortios_firewall_policy6.html.markdown +++ b/website/docs/r/fortios_firewall_policy6.html.markdown @@ -76,7 +76,7 @@ resource "fortios_firewall_policy6" "trname" { The following arguments are supported: -* `policyid` - (Required) Policy ID. +* `policyid` - Policy ID. * `name` - Policy name. * `uuid` - Universally Unique Identifier (UUID; automatically assigned but can be manually reset). * `srcintf` - (Required) Incoming (ingress) interface. The structure of `srcintf` block is documented below. diff --git a/website/docs/r/fortios_firewall_policy64.html.markdown b/website/docs/r/fortios_firewall_policy64.html.markdown index 29153a2ba..672d1aae0 100644 --- a/website/docs/r/fortios_firewall_policy64.html.markdown +++ b/website/docs/r/fortios_firewall_policy64.html.markdown @@ -44,7 +44,7 @@ resource "fortios_firewall_policy64" "trname" { The following arguments are supported: -* `policyid` - (Required) Policy ID. +* `policyid` - Policy ID. * `uuid` - Universally Unique Identifier (UUID; automatically assigned but can be manually reset). * `srcintf` - (Required) Source interface name. * `dstintf` - (Required) Destination interface name. diff --git a/website/docs/r/fortios_firewall_proxyaddress.html.markdown b/website/docs/r/fortios_firewall_proxyaddress.html.markdown index 02077c0ec..a96fc7759 100644 --- a/website/docs/r/fortios_firewall_proxyaddress.html.markdown +++ b/website/docs/r/fortios_firewall_proxyaddress.html.markdown @@ -26,7 +26,7 @@ resource "fortios_firewall_proxyaddress" "trname" { The following arguments are supported: -* `name` - (Required) Address name. +* `name` - Address name. * `uuid` - Universally Unique Identifier (UUID; automatically assigned but can be manually reset). * `type` - Proxy address type. * `host` - Address object for the host. diff --git a/website/docs/r/fortios_firewall_proxyaddrgrp.html.markdown b/website/docs/r/fortios_firewall_proxyaddrgrp.html.markdown index afc390193..88c3d76da 100644 --- a/website/docs/r/fortios_firewall_proxyaddrgrp.html.markdown +++ b/website/docs/r/fortios_firewall_proxyaddrgrp.html.markdown @@ -13,7 +13,7 @@ Web proxy address group configuration. The following arguments are supported: -* `name` - (Required) Address group name. +* `name` - Address group name. * `type` - Source or destination address group type. * `uuid` - Universally Unique Identifier (UUID; automatically assigned but can be manually reset). * `member` - (Required) Members of address group. The structure of `member` block is documented below. diff --git a/website/docs/r/fortios_firewall_proxypolicy.html.markdown b/website/docs/r/fortios_firewall_proxypolicy.html.markdown index d83cf84d2..32b99264a 100644 --- a/website/docs/r/fortios_firewall_proxypolicy.html.markdown +++ b/website/docs/r/fortios_firewall_proxypolicy.html.markdown @@ -62,7 +62,7 @@ resource "fortios_firewall_proxypolicy" "trname" { The following arguments are supported: * `uuid` - Universally Unique Identifier (UUID; automatically assigned but can be manually reset). -* `policyid` - (Required) Policy ID. +* `policyid` - Policy ID. * `proxy` - (Required) Type of explicit proxy. * `srcintf` - Source interface names. The structure of `srcintf` block is documented below. * `dstintf` - (Required) Destination interface names. The structure of `dstintf` block is documented below. diff --git a/website/docs/r/fortios_firewall_shapingpolicy.html.markdown b/website/docs/r/fortios_firewall_shapingpolicy.html.markdown index 933e0a263..2658ef14c 100644 --- a/website/docs/r/fortios_firewall_shapingpolicy.html.markdown +++ b/website/docs/r/fortios_firewall_shapingpolicy.html.markdown @@ -50,7 +50,7 @@ resource "fortios_firewall_shapingpolicy" "trname" { The following arguments are supported: -* `fosid` - (Required) Shaping policy ID. +* `fosid` - Shaping policy ID. * `name` - Shaping policy name. * `comment` - Comments. * `status` - Enable/disable this traffic shaping policy. diff --git a/website/docs/r/fortios_firewall_sniffer.html.markdown b/website/docs/r/fortios_firewall_sniffer.html.markdown index 48111e0e5..ec734d323 100644 --- a/website/docs/r/fortios_firewall_sniffer.html.markdown +++ b/website/docs/r/fortios_firewall_sniffer.html.markdown @@ -36,7 +36,7 @@ resource "fortios_firewall_sniffer" "trname" { The following arguments are supported: -* `fosid` - (Required) Sniffer ID. +* `fosid` - Sniffer ID. * `status` - Enable/disable the active status of the sniffer. * `logtraffic` - Either log all sessions, only sessions that have a security profile applied, or disable all logging for this policy. * `ipv6` - Enable/disable sniffing IPv6 packets. diff --git a/website/docs/r/fortios_firewall_sslserver.html.markdown b/website/docs/r/fortios_firewall_sslserver.html.markdown index 29090a499..9018009f1 100644 --- a/website/docs/r/fortios_firewall_sslserver.html.markdown +++ b/website/docs/r/fortios_firewall_sslserver.html.markdown @@ -34,7 +34,7 @@ resource "fortios_firewall_sslserver" "trname" { The following arguments are supported: -* `name` - (Required) Server name. +* `name` - Server name. * `ip` - (Required) IPv4 address of the SSL server. * `port` - (Required) Server service port (1 - 65535, default = 443). * `ssl_mode` - SSL/TLS mode for encryption and decryption of traffic. diff --git a/website/docs/r/fortios_firewall_vip.html.markdown b/website/docs/r/fortios_firewall_vip.html.markdown index 9bd593ec4..11b50fde7 100644 --- a/website/docs/r/fortios_firewall_vip.html.markdown +++ b/website/docs/r/fortios_firewall_vip.html.markdown @@ -77,7 +77,7 @@ resource "fortios_firewall_vip" "trname" { The following arguments are supported: -* `name` - (Required) Virtual IP name. +* `name` - Virtual IP name. * `fosid` - Custom defined ID. * `uuid` - Universally Unique Identifier (UUID; automatically assigned but can be manually reset). * `comment` - Comment. diff --git a/website/docs/r/fortios_firewall_vip46.html.markdown b/website/docs/r/fortios_firewall_vip46.html.markdown index 83aaf809c..508de824d 100644 --- a/website/docs/r/fortios_firewall_vip46.html.markdown +++ b/website/docs/r/fortios_firewall_vip46.html.markdown @@ -32,7 +32,7 @@ resource "fortios_firewall_vip46" "trname" { The following arguments are supported: -* `name` - (Required) VIP46 name. +* `name` - VIP46 name. * `fosid` - Custom defined id. * `uuid` - Universally Unique Identifier (UUID; automatically assigned but can be manually reset). * `comment` - Comment. diff --git a/website/docs/r/fortios_firewall_vip6.html.markdown b/website/docs/r/fortios_firewall_vip6.html.markdown index 050334018..6f9f0c909 100644 --- a/website/docs/r/fortios_firewall_vip6.html.markdown +++ b/website/docs/r/fortios_firewall_vip6.html.markdown @@ -70,7 +70,7 @@ resource "fortios_firewall_vip6" "trname" { The following arguments are supported: -* `name` - (Required) Virtual ip6 name. +* `name` - Virtual ip6 name. * `fosid` - Custom defined ID. * `uuid` - Universally Unique Identifier (UUID; automatically assigned but can be manually reset). * `comment` - Comment. diff --git a/website/docs/r/fortios_firewall_vip64.html.markdown b/website/docs/r/fortios_firewall_vip64.html.markdown index 015855242..196284805 100644 --- a/website/docs/r/fortios_firewall_vip64.html.markdown +++ b/website/docs/r/fortios_firewall_vip64.html.markdown @@ -32,7 +32,7 @@ resource "fortios_firewall_vip64" "trname" { The following arguments are supported: -* `name` - (Required) VIP64 name. +* `name` - VIP64 name. * `fosid` - Custom defined id. * `uuid` - Universally Unique Identifier (UUID; automatically assigned but can be manually reset). * `comment` - Comment. diff --git a/website/docs/r/fortios_firewall_vipgrp.html.markdown b/website/docs/r/fortios_firewall_vipgrp.html.markdown index 852f94917..26adefa00 100644 --- a/website/docs/r/fortios_firewall_vipgrp.html.markdown +++ b/website/docs/r/fortios_firewall_vipgrp.html.markdown @@ -37,7 +37,7 @@ resource "fortios_firewall_vipgrp" "trname" { The following arguments are supported: -* `name` - (Required) VIP group name. +* `name` - VIP group name. * `uuid` - Universally Unique Identifier (UUID; automatically assigned but can be manually reset). * `interface` - (Required) interface * `color` - Integer value to determine the color of the icon in the GUI (range 1 to 32, default = 0, which sets the value to 1). diff --git a/website/docs/r/fortios_firewall_vipgrp46.html.markdown b/website/docs/r/fortios_firewall_vipgrp46.html.markdown index 5fe45d6df..75490849c 100644 --- a/website/docs/r/fortios_firewall_vipgrp46.html.markdown +++ b/website/docs/r/fortios_firewall_vipgrp46.html.markdown @@ -41,7 +41,7 @@ resource "fortios_firewall_vipgrp46" "trname" { The following arguments are supported: -* `name` - (Required) VIP46 group name. +* `name` - VIP46 group name. * `uuid` - Universally Unique Identifier (UUID; automatically assigned but can be manually reset). * `color` - Integer value to determine the color of the icon in the GUI (range 1 to 32, default = 0, which sets the value to 1). * `comments` - Comment. diff --git a/website/docs/r/fortios_firewall_vipgrp6.html.markdown b/website/docs/r/fortios_firewall_vipgrp6.html.markdown index 80e6d2420..f3641425d 100644 --- a/website/docs/r/fortios_firewall_vipgrp6.html.markdown +++ b/website/docs/r/fortios_firewall_vipgrp6.html.markdown @@ -79,7 +79,7 @@ resource "fortios_firewall_vipgrp6" "trname" { The following arguments are supported: -* `name` - (Required) IPv6 VIP group name. +* `name` - IPv6 VIP group name. * `uuid` - Universally Unique Identifier (UUID; automatically assigned but can be manually reset). * `color` - Integer value to determine the color of the icon in the GUI (range 1 to 32, default = 0, which sets the value to 1). * `comments` - Comment. diff --git a/website/docs/r/fortios_firewall_vipgrp64.html.markdown b/website/docs/r/fortios_firewall_vipgrp64.html.markdown index b6e729282..a2580bbdf 100644 --- a/website/docs/r/fortios_firewall_vipgrp64.html.markdown +++ b/website/docs/r/fortios_firewall_vipgrp64.html.markdown @@ -41,7 +41,7 @@ resource "fortios_firewall_vipgrp64" "trname" { The following arguments are supported: -* `name` - (Required) VIP64 group name. +* `name` - VIP64 group name. * `uuid` - Universally Unique Identifier (UUID; automatically assigned but can be manually reset). * `color` - Integer value to determine the color of the icon in the GUI (range 1 to 32, default = 0, which sets the value to 1). * `comments` - Comment. diff --git a/website/docs/r/fortios_firewallconsolidated_policy.html.markdown b/website/docs/r/fortios_firewallconsolidated_policy.html.markdown index 1778862d4..d0f5ad371 100644 --- a/website/docs/r/fortios_firewallconsolidated_policy.html.markdown +++ b/website/docs/r/fortios_firewallconsolidated_policy.html.markdown @@ -13,7 +13,7 @@ Configure consolidated IPv4/IPv6 policies. The following arguments are supported: -* `policyid` - (Required) Policy ID. +* `policyid` - Policy ID. * `status` - Enable or disable this policy. * `name` - Policy name. * `uuid` - Universally Unique Identifier (UUID; automatically assigned but can be manually reset). diff --git a/website/docs/r/fortios_firewallipmacbinding_table.html.markdown b/website/docs/r/fortios_firewallipmacbinding_table.html.markdown index 8d8d9cfc0..efacbc32d 100644 --- a/website/docs/r/fortios_firewallipmacbinding_table.html.markdown +++ b/website/docs/r/fortios_firewallipmacbinding_table.html.markdown @@ -25,7 +25,7 @@ resource "fortios_firewallipmacbinding_table" "trname" { The following arguments are supported: -* `seq_num` - (Required) Entry number. +* `seq_num` - Entry number. * `ip` - (Required) IPv4 address portion of the pair (format: xxx.xxx.xxx.xxx). * `mac` - MAC address portion of the pair (format: xx:xx:xx:xx:xx:xx in hexidecimal). * `name` - Name of the pair (optional, default = no name). diff --git a/website/docs/r/fortios_firewallservice_category.html.markdown b/website/docs/r/fortios_firewallservice_category.html.markdown index 5c9113a66..cdf661097 100644 --- a/website/docs/r/fortios_firewallservice_category.html.markdown +++ b/website/docs/r/fortios_firewallservice_category.html.markdown @@ -21,7 +21,7 @@ resource "fortios_firewallservice_category" "trname" { The following arguments are supported: -* `name` - (Required) Service category name. +* `name` - Service category name. * `comment` - Comment. diff --git a/website/docs/r/fortios_firewallservice_custom.html.markdown b/website/docs/r/fortios_firewallservice_custom.html.markdown index 56fa89e3b..52f1e6113 100644 --- a/website/docs/r/fortios_firewallservice_custom.html.markdown +++ b/website/docs/r/fortios_firewallservice_custom.html.markdown @@ -36,7 +36,7 @@ resource "fortios_firewallservice_custom" "trname" { The following arguments are supported: -* `name` - (Required) Custom service name. +* `name` - Custom service name. * `proxy` - Enable/disable web proxy service. * `category` - Service category. * `protocol` - Protocol type based on IANA numbers. diff --git a/website/docs/r/fortios_firewallshaper_peripshaper.html.markdown b/website/docs/r/fortios_firewallshaper_peripshaper.html.markdown index bbd8cfa3e..c297e72f4 100644 --- a/website/docs/r/fortios_firewallshaper_peripshaper.html.markdown +++ b/website/docs/r/fortios_firewallshaper_peripshaper.html.markdown @@ -28,7 +28,7 @@ resource "fortios_firewallshaper_peripshaper" "trname" { The following arguments are supported: -* `name` - (Required) Traffic shaper name. +* `name` - Traffic shaper name. * `max_bandwidth` - Upper bandwidth limit enforced by this shaper (0 - 16776000). 0 means no limit. Units depend on the bandwidth-unit setting. * `bandwidth_unit` - Unit of measurement for maximum bandwidth for this shaper (Kbps, Mbps or Gbps). * `max_concurrent_session` - Maximum number of concurrent sessions allowed by this shaper (0 - 2097000). 0 means no limit. diff --git a/website/docs/r/fortios_firewallshaper_trafficshaper.html.markdown b/website/docs/r/fortios_firewallshaper_trafficshaper.html.markdown index faf5bff52..f35bf8319 100644 --- a/website/docs/r/fortios_firewallshaper_trafficshaper.html.markdown +++ b/website/docs/r/fortios_firewallshaper_trafficshaper.html.markdown @@ -28,7 +28,7 @@ resource "fortios_firewallshaper_trafficshaper" "trname" { The following arguments are supported: -* `name` - (Required) Traffic shaper name. +* `name` - Traffic shaper name. * `guaranteed_bandwidth` - Amount of bandwidth guaranteed for this shaper (0 - 16776000). Units depend on the bandwidth-unit setting. * `maximum_bandwidth` - Upper bandwidth limit enforced by this shaper (0 - 16776000). 0 means no limit. Units depend on the bandwidth-unit setting. * `bandwidth_unit` - Unit of measurement for guaranteed and maximum bandwidth for this shaper (Kbps, Mbps or Gbps). diff --git a/website/docs/r/fortios_firewallssh_hostkey.html.markdown b/website/docs/r/fortios_firewallssh_hostkey.html.markdown index d3cc233e9..20eb979b0 100644 --- a/website/docs/r/fortios_firewallssh_hostkey.html.markdown +++ b/website/docs/r/fortios_firewallssh_hostkey.html.markdown @@ -26,7 +26,7 @@ resource "fortios_firewallssh_hostkey" "trname" { The following arguments are supported: -* `name` - (Required) SSH public key name. +* `name` - SSH public key name. * `status` - Set the trust status of the public key. * `type` - Set the type of the public key. * `nid` - Set the nid of the ECDSA key. diff --git a/website/docs/r/fortios_firewallssh_localca.html.markdown b/website/docs/r/fortios_firewallssh_localca.html.markdown index 09c52461d..c56921144 100644 --- a/website/docs/r/fortios_firewallssh_localca.html.markdown +++ b/website/docs/r/fortios_firewallssh_localca.html.markdown @@ -13,7 +13,7 @@ SSH proxy local CA. The following arguments are supported: -* `name` - (Required) SSH proxy local CA name. +* `name` - SSH proxy local CA name. * `password` - Password for SSH private key. * `private_key` - (Required) SSH proxy private key, encrypted with a password. * `public_key` - (Required) SSH proxy public key. diff --git a/website/docs/r/fortios_firewallssh_localkey.html.markdown b/website/docs/r/fortios_firewallssh_localkey.html.markdown index e9f056093..f6c060e97 100644 --- a/website/docs/r/fortios_firewallssh_localkey.html.markdown +++ b/website/docs/r/fortios_firewallssh_localkey.html.markdown @@ -13,7 +13,7 @@ SSH proxy local keys. The following arguments are supported: -* `name` - (Required) SSH proxy local key name. +* `name` - SSH proxy local key name. * `password` - Password for SSH private key. * `private_key` - (Required) SSH proxy private key, encrypted with a password. * `public_key` - (Required) SSH proxy public key. diff --git a/website/docs/r/fortios_firewallwildcardfqdn_custom.html.markdown b/website/docs/r/fortios_firewallwildcardfqdn_custom.html.markdown index 3a950024d..cf80c51e5 100644 --- a/website/docs/r/fortios_firewallwildcardfqdn_custom.html.markdown +++ b/website/docs/r/fortios_firewallwildcardfqdn_custom.html.markdown @@ -24,7 +24,7 @@ resource "fortios_firewallwildcardfqdn_custom" "trname" { The following arguments are supported: -* `name` - (Required) Address name. +* `name` - Address name. * `uuid` - Universally Unique Identifier (UUID; automatically assigned but can be manually reset). * `wildcard_fqdn` - Wildcard FQDN. * `color` - GUI icon color. diff --git a/website/docs/r/fortios_firewallwildcardfqdn_group.html.markdown b/website/docs/r/fortios_firewallwildcardfqdn_group.html.markdown index 8e2efbd24..2ece77d07 100644 --- a/website/docs/r/fortios_firewallwildcardfqdn_group.html.markdown +++ b/website/docs/r/fortios_firewallwildcardfqdn_group.html.markdown @@ -34,7 +34,7 @@ resource "fortios_firewallwildcardfqdn_group" "trname" { The following arguments are supported: -* `name` - (Required) Address group name. +* `name` - Address group name. * `uuid` - Universally Unique Identifier (UUID; automatically assigned but can be manually reset). * `member` - (Required) Address group members. The structure of `member` block is documented below. * `color` - GUI icon color. diff --git a/website/docs/r/fortios_icap_profile.html.markdown b/website/docs/r/fortios_icap_profile.html.markdown index 8cabfe7cb..59477a8df 100644 --- a/website/docs/r/fortios_icap_profile.html.markdown +++ b/website/docs/r/fortios_icap_profile.html.markdown @@ -35,7 +35,7 @@ resource "fortios_icap_profile" "trname" { The following arguments are supported: * `replacemsg_group` - Replacement message group. -* `name` - (Required) ICAP profile name. +* `name` - ICAP profile name. * `request` - Enable/disable whether an HTTP request is passed to an ICAP server. * `response` - Enable/disable whether an HTTP response is passed to an ICAP server. * `streaming_content_bypass` - Enable/disable bypassing of ICAP server for streaming content. diff --git a/website/docs/r/fortios_icap_server.html.markdown b/website/docs/r/fortios_icap_server.html.markdown index 51371dbc3..80a864353 100644 --- a/website/docs/r/fortios_icap_server.html.markdown +++ b/website/docs/r/fortios_icap_server.html.markdown @@ -26,7 +26,7 @@ resource "fortios_icap_server" "trname" { The following arguments are supported: -* `name` - (Required) Server name. +* `name` - Server name. * `ip_version` - IP version. * `ip_address` - IPv4 address of the ICAP server. * `ip6_address` - IPv6 address of the ICAP server. diff --git a/website/docs/r/fortios_ips_custom.html.markdown b/website/docs/r/fortios_ips_custom.html.markdown index 87a04bda5..69f70adab 100644 --- a/website/docs/r/fortios_ips_custom.html.markdown +++ b/website/docs/r/fortios_ips_custom.html.markdown @@ -13,7 +13,7 @@ Configure IPS custom signature. The following arguments are supported: -* `tag` - (Required) Signature tag. +* `tag` - Signature tag. * `signature` - Custom signature enclosed in single quotes. * `sig_name` - Signature name. * `rule_id` - Signature ID. diff --git a/website/docs/r/fortios_ips_decoder.html.markdown b/website/docs/r/fortios_ips_decoder.html.markdown index e1b3deac6..ff9259c22 100644 --- a/website/docs/r/fortios_ips_decoder.html.markdown +++ b/website/docs/r/fortios_ips_decoder.html.markdown @@ -13,7 +13,7 @@ Configure IPS decoder. The following arguments are supported: -* `name` - (Required) Decoder name. +* `name` - Decoder name. * `parameter` - IPS group parameters. The structure of `parameter` block is documented below. The `parameter` block supports: diff --git a/website/docs/r/fortios_ips_rule.html.markdown b/website/docs/r/fortios_ips_rule.html.markdown index 1c21055d3..ce1c0214d 100644 --- a/website/docs/r/fortios_ips_rule.html.markdown +++ b/website/docs/r/fortios_ips_rule.html.markdown @@ -35,7 +35,7 @@ resource "fortios_ips_rule" "trname" { The following arguments are supported: -* `name` - (Required) Rule name. +* `name` - Rule name. * `status` - Enable/disable status. * `log` - Enable/disable logging. * `log_packet` - Enable/disable packet logging. diff --git a/website/docs/r/fortios_log_customfield.html.markdown b/website/docs/r/fortios_log_customfield.html.markdown index f16d24b83..fab0b26fe 100644 --- a/website/docs/r/fortios_log_customfield.html.markdown +++ b/website/docs/r/fortios_log_customfield.html.markdown @@ -23,7 +23,7 @@ resource "fortios_log_customfield" "trname" { The following arguments are supported: -* `fosid` - (Required) field ID . +* `fosid` - field ID . * `name` - (Required) Field name (max: 15 characters). * `value` - (Required) Field value (max: 15 characters). diff --git a/website/docs/r/fortios_report_layout.html.markdown b/website/docs/r/fortios_report_layout.html.markdown index feaeebc34..787f61d9b 100644 --- a/website/docs/r/fortios_report_layout.html.markdown +++ b/website/docs/r/fortios_report_layout.html.markdown @@ -32,7 +32,7 @@ resource "fortios_report_layout" "trname" { The following arguments are supported: -* `name` - (Required) Report layout name. +* `name` - Report layout name. * `title` - Report title. * `subtitle` - Report subtitle. * `description` - Description. diff --git a/website/docs/r/fortios_report_style.html.markdown b/website/docs/r/fortios_report_style.html.markdown index b26cc8b8d..09dddf9d4 100644 --- a/website/docs/r/fortios_report_style.html.markdown +++ b/website/docs/r/fortios_report_style.html.markdown @@ -29,7 +29,7 @@ resource "fortios_report_style" "trname" { The following arguments are supported: -* `name` - (Required) Report style name. +* `name` - Report style name. * `options` - Report style options. * `font_family` - Font family. * `font_style` - Font style. diff --git a/website/docs/r/fortios_report_theme.html.markdown b/website/docs/r/fortios_report_theme.html.markdown index a5b23b9cc..2e192ef3c 100644 --- a/website/docs/r/fortios_report_theme.html.markdown +++ b/website/docs/r/fortios_report_theme.html.markdown @@ -24,7 +24,7 @@ resource "fortios_report_theme" "trname" { The following arguments are supported: -* `name` - (Required) Report theme name. +* `name` - Report theme name. * `page_orient` - Report page orientation. * `column_count` - Report page column count. * `default_html_style` - Default HTML report style. diff --git a/website/docs/r/fortios_router_policy.html.markdown b/website/docs/r/fortios_router_policy.html.markdown index 2c4404b86..77f7c45fc 100644 --- a/website/docs/r/fortios_router_policy.html.markdown +++ b/website/docs/r/fortios_router_policy.html.markdown @@ -38,7 +38,7 @@ resource "fortios_router_policy" "trname" { The following arguments are supported: -* `seq_num` - (Required) Sequence number. +* `seq_num` - Sequence number. * `input_device` - Incoming interface name. The structure of `input_device` block is documented below. * `src` - Source IP and mask (x.x.x.x/x). The structure of `src` block is documented below. * `srcaddr` - Source address name. The structure of `srcaddr` block is documented below. diff --git a/website/docs/r/fortios_router_policy6.html.markdown b/website/docs/r/fortios_router_policy6.html.markdown index 145e6cbdb..0933d17f9 100644 --- a/website/docs/r/fortios_router_policy6.html.markdown +++ b/website/docs/r/fortios_router_policy6.html.markdown @@ -32,7 +32,7 @@ resource "fortios_router_policy6" "trname" { The following arguments are supported: -* `seq_num` - (Required) Sequence number. +* `seq_num` - Sequence number. * `input_device` - (Required) Incoming interface name. * `src` - Source IPv6 prefix. * `dst` - Destination IPv6 prefix. diff --git a/website/docs/r/fortios_router_static.html.markdown b/website/docs/r/fortios_router_static.html.markdown index 287a4d37d..2bf6c5eb2 100644 --- a/website/docs/r/fortios_router_static.html.markdown +++ b/website/docs/r/fortios_router_static.html.markdown @@ -36,7 +36,7 @@ resource "fortios_router_static" "trname" { The following arguments are supported: -* `seq_num` - (Required) Sequence number. +* `seq_num` - Sequence number. * `status` - Enable/disable this static route. * `dst` - (Required) Destination IP and mask for this route. * `src` - Source prefix for this route. diff --git a/website/docs/r/fortios_router_static6.html.markdown b/website/docs/r/fortios_router_static6.html.markdown index 795ad3f86..012ef8427 100644 --- a/website/docs/r/fortios_router_static6.html.markdown +++ b/website/docs/r/fortios_router_static6.html.markdown @@ -31,7 +31,7 @@ resource "fortios_router_static6" "trname" { The following arguments are supported: -* `seq_num` - (Required) Sequence number. +* `seq_num` - Sequence number. * `status` - Enable/disable this static route. * `dst` - (Required) Destination IPv6 prefix. * `gateway` - IPv6 address of the gateway. diff --git a/website/docs/r/fortios_sshfilter_profile.html.markdown b/website/docs/r/fortios_sshfilter_profile.html.markdown index d2abcda83..7893543ed 100644 --- a/website/docs/r/fortios_sshfilter_profile.html.markdown +++ b/website/docs/r/fortios_sshfilter_profile.html.markdown @@ -24,7 +24,7 @@ resource "fortios_sshfilter_profile" "trname" { The following arguments are supported: -* `name` - (Required) SSH filter profile name. +* `name` - SSH filter profile name. * `block` - SSH blocking options. * `log` - SSH logging options. * `default_command_log` - Enable/disable logging unmatched shell commands. diff --git a/website/docs/r/fortios_switchcontroller_customcommand.html.markdown b/website/docs/r/fortios_switchcontroller_customcommand.html.markdown index acdde7522..52fc811e0 100644 --- a/website/docs/r/fortios_switchcontroller_customcommand.html.markdown +++ b/website/docs/r/fortios_switchcontroller_customcommand.html.markdown @@ -22,7 +22,7 @@ resource "fortios_switchcontroller_customcommand" "trname" { The following arguments are supported: -* `command_name` - (Required) Command name called by the FortiGate switch controller in the execute command. +* `command_name` - Command name called by the FortiGate switch controller in the execute command. * `description` - Description. * `command` - (Required) String of commands to send to FortiSwitch devices (For example (%0a = return key): config switch trunk %0a edit myTrunk %0a set members port1 port2 %0a end %0a). diff --git a/website/docs/r/fortios_switchcontroller_lldpprofile.html.markdown b/website/docs/r/fortios_switchcontroller_lldpprofile.html.markdown index 978c87270..10c15e3ff 100644 --- a/website/docs/r/fortios_switchcontroller_lldpprofile.html.markdown +++ b/website/docs/r/fortios_switchcontroller_lldpprofile.html.markdown @@ -26,7 +26,7 @@ resource "fortios_switchcontroller_lldpprofile" "trname" { The following arguments are supported: -* `name` - (Required) Profile name. +* `name` - Profile name. * `med_tlvs` - Transmitted LLDP-MED TLVs (type-length-value descriptions): inventory management TLV and/or network policy TLV. * `n8021_tlvs` - Transmitted IEEE 802.1 TLVs. * `n8023_tlvs` - Transmitted IEEE 802.3 TLVs. diff --git a/website/docs/r/fortios_switchcontroller_switchgroup.html.markdown b/website/docs/r/fortios_switchcontroller_switchgroup.html.markdown index 484f8620e..cf2072767 100644 --- a/website/docs/r/fortios_switchcontroller_switchgroup.html.markdown +++ b/website/docs/r/fortios_switchcontroller_switchgroup.html.markdown @@ -13,7 +13,7 @@ Configure FortiSwitch switch groups. The following arguments are supported: -* `name` - (Required) Switch group name. +* `name` - Switch group name. * `description` - Optional switch group description. * `members` - FortiSwitch members belonging to this switch group. The structure of `members` block is documented below. diff --git a/website/docs/r/fortios_switchcontroller_switchprofile.html.markdown b/website/docs/r/fortios_switchcontroller_switchprofile.html.markdown index 2c8b691f6..7315ff59f 100644 --- a/website/docs/r/fortios_switchcontroller_switchprofile.html.markdown +++ b/website/docs/r/fortios_switchcontroller_switchprofile.html.markdown @@ -22,7 +22,7 @@ resource "fortios_switchcontroller_switchprofile" "trname" { The following arguments are supported: -* `name` - (Required) FortiSwitch Profile name. +* `name` - FortiSwitch Profile name. * `login_passwd_override` - Enable/disable overriding the admin administrator password for a managed FortiSwitch with the FortiGate admin administrator account password. * `login_passwd` - Login password of managed FortiSwitch. diff --git a/website/docs/r/fortios_switchcontroller_virtualportpool.html.markdown b/website/docs/r/fortios_switchcontroller_virtualportpool.html.markdown index 17461e5b6..3a8f8b2e7 100644 --- a/website/docs/r/fortios_switchcontroller_virtualportpool.html.markdown +++ b/website/docs/r/fortios_switchcontroller_virtualportpool.html.markdown @@ -22,7 +22,7 @@ resource "fortios_switchcontroller_virtualportpool" "trname" { The following arguments are supported: -* `name` - (Required) Virtual switch pool name. +* `name` - Virtual switch pool name. * `description` - Virtual switch pool description. diff --git a/website/docs/r/fortios_switchcontroller_vlan.html.markdown b/website/docs/r/fortios_switchcontroller_vlan.html.markdown index e62e9e789..9d88e443f 100644 --- a/website/docs/r/fortios_switchcontroller_vlan.html.markdown +++ b/website/docs/r/fortios_switchcontroller_vlan.html.markdown @@ -13,7 +13,7 @@ Configure VLANs for switch controller. The following arguments are supported: -* `name` - (Required) Switch VLAN name. +* `name` - Switch VLAN name. * `vdom` - Virtual domain, * `vlanid` - VLAN ID. * `comments` - Comment. diff --git a/website/docs/r/fortios_switchcontrollersecuritypolicy_8021X.html.markdown b/website/docs/r/fortios_switchcontrollersecuritypolicy_8021X.html.markdown index 26229e568..723e8e71b 100644 --- a/website/docs/r/fortios_switchcontrollersecuritypolicy_8021X.html.markdown +++ b/website/docs/r/fortios_switchcontrollersecuritypolicy_8021X.html.markdown @@ -36,7 +36,7 @@ resource "fortios_switchcontrollersecuritypolicy_8021X" "trname" { The following arguments are supported: -* `name` - (Required) Policy name. +* `name` - Policy name. * `security_mode` - Port or MAC based 802.1X security mode. * `user_group` - Name of user-group to assign to this MAC Authentication Bypass (MAB) policy. The structure of `user_group` block is documented below. * `mac_auth_bypass` - Enable/disable MAB for this policy. diff --git a/website/docs/r/fortios_switchcontrollersecuritypolicy_captiveportal.html.markdown b/website/docs/r/fortios_switchcontrollersecuritypolicy_captiveportal.html.markdown index 9cc585842..03ae499fd 100644 --- a/website/docs/r/fortios_switchcontrollersecuritypolicy_captiveportal.html.markdown +++ b/website/docs/r/fortios_switchcontrollersecuritypolicy_captiveportal.html.markdown @@ -13,7 +13,7 @@ Names of VLANs that use captive portal authentication. The following arguments are supported: -* `name` - (Required) Policy name. +* `name` - Policy name. * `vlan` - Names of VLANs that use captive portal authentication. * `policy_type` - Policy type. diff --git a/website/docs/r/fortios_system_admin.html.markdown b/website/docs/r/fortios_system_admin.html.markdown index 84aad7ef0..453b26dd3 100644 --- a/website/docs/r/fortios_system_admin.html.markdown +++ b/website/docs/r/fortios_system_admin.html.markdown @@ -37,7 +37,7 @@ resource "fortios_system_admin" "trname" { The following arguments are supported: -* `name` - (Required) User name. +* `name` - User name. * `wildcard` - Enable/disable wildcard RADIUS authentication. * `remote_auth` - Enable/disable authentication using a remote RADIUS, LDAP, or TACACS+ server. * `remote_group` - User group name used for remote auth. diff --git a/website/docs/r/fortios_system_alias.html.markdown b/website/docs/r/fortios_system_alias.html.markdown index b59c0ebc5..df41ae020 100644 --- a/website/docs/r/fortios_system_alias.html.markdown +++ b/website/docs/r/fortios_system_alias.html.markdown @@ -21,7 +21,7 @@ resource "fortios_system_alias" "trname" { The following arguments are supported: -* `name` - (Required) Alias command name. +* `name` - Alias command name. * `command` - Command list to execute. diff --git a/website/docs/r/fortios_system_apiuser.html.markdown b/website/docs/r/fortios_system_apiuser.html.markdown index 54d02bc40..c17166884 100644 --- a/website/docs/r/fortios_system_apiuser.html.markdown +++ b/website/docs/r/fortios_system_apiuser.html.markdown @@ -98,7 +98,7 @@ resource "fortios_system_apiuser" "test2" { The following arguments are supported: -* `name` - (Required) User name. +* `name` - User name. * `comments` - Comment. * `api_key` - Admin user password. * `accprofile` - (Required) Admin user access profile. diff --git a/website/docs/r/fortios_system_automationaction.html.markdown b/website/docs/r/fortios_system_automationaction.html.markdown index 5fc272794..344f4f7c6 100644 --- a/website/docs/r/fortios_system_automationaction.html.markdown +++ b/website/docs/r/fortios_system_automationaction.html.markdown @@ -29,7 +29,7 @@ resource "fortios_system_automationaction" "trname" { The following arguments are supported: -* `name` - (Required) Name. +* `name` - Name. * `action_type` - Action type. * `email_to` - Email addresses. The structure of `email_to` block is documented below. * `email_subject` - Email subject. diff --git a/website/docs/r/fortios_system_automationdestination.html.markdown b/website/docs/r/fortios_system_automationdestination.html.markdown index ce3ae3428..5ddea6b28 100644 --- a/website/docs/r/fortios_system_automationdestination.html.markdown +++ b/website/docs/r/fortios_system_automationdestination.html.markdown @@ -23,7 +23,7 @@ resource "fortios_system_automationdestination" "trname" { The following arguments are supported: -* `name` - (Required) Name. +* `name` - Name. * `type` - Destination type. * `destination` - Destinations. The structure of `destination` block is documented below. * `ha_group_id` - Cluster group ID set for this destination (default = 0). diff --git a/website/docs/r/fortios_system_automationstitch.html.markdown b/website/docs/r/fortios_system_automationstitch.html.markdown index 549fafef8..8cb5d660f 100644 --- a/website/docs/r/fortios_system_automationstitch.html.markdown +++ b/website/docs/r/fortios_system_automationstitch.html.markdown @@ -13,7 +13,7 @@ Automation stitches. The following arguments are supported: -* `name` - (Required) Name. +* `name` - Name. * `status` - (Required) Enable/disable this stitch. * `trigger` - (Required) Trigger name. * `action` - Action names. The structure of `action` block is documented below. diff --git a/website/docs/r/fortios_system_automationtrigger.html.markdown b/website/docs/r/fortios_system_automationtrigger.html.markdown index 28e75ead2..2bec4a0c0 100644 --- a/website/docs/r/fortios_system_automationtrigger.html.markdown +++ b/website/docs/r/fortios_system_automationtrigger.html.markdown @@ -28,7 +28,7 @@ resource "fortios_system_automationtrigger" "trname" { The following arguments are supported: -* `name` - (Required) Name. +* `name` - Name. * `trigger_type` - Trigger type. * `event_type` - Event type. * `license_type` - License type. diff --git a/website/docs/r/fortios_system_autoscript.html.markdown b/website/docs/r/fortios_system_autoscript.html.markdown index 026dfd595..fabd8debd 100644 --- a/website/docs/r/fortios_system_autoscript.html.markdown +++ b/website/docs/r/fortios_system_autoscript.html.markdown @@ -26,7 +26,7 @@ resource "fortios_system_autoscript" "trname" { The following arguments are supported: -* `name` - (Required) Auto script name. +* `name` - Auto script name. * `interval` - Repeat interval in seconds. * `repeat` - Number of times to repeat this script (0 = infinite). * `start` - Script starting mode. diff --git a/website/docs/r/fortios_system_clustersync.html.markdown b/website/docs/r/fortios_system_clustersync.html.markdown index 23270a9a6..26dda3db7 100644 --- a/website/docs/r/fortios_system_clustersync.html.markdown +++ b/website/docs/r/fortios_system_clustersync.html.markdown @@ -26,7 +26,7 @@ resource "fortios_system_clustersync" "trname" { The following arguments are supported: -* `sync_id` - (Required) Sync ID. +* `sync_id` - Sync ID. * `peervd` - VDOM that contains the session synchronization link interface on the peer unit. Usually both peers would have the same peervd. * `peerip` - IP address of the interface on the peer unit that is used for the session synchronization link. * `syncvd` - Sessions from these VDOMs are synchronized using this session synchronization configuration. The structure of `syncvd` block is documented below. diff --git a/website/docs/r/fortios_system_ddns.html.markdown b/website/docs/r/fortios_system_ddns.html.markdown index f22fa9702..339b65f01 100644 --- a/website/docs/r/fortios_system_ddns.html.markdown +++ b/website/docs/r/fortios_system_ddns.html.markdown @@ -36,7 +36,7 @@ resource "fortios_system_ddns" "trname" { The following arguments are supported: -* `ddnsid` - (Required) DDNS ID. +* `ddnsid` - DDNS ID. * `ddns_server` - (Required) Select a DDNS service provider. * `ddns_server_ip` - Generic DDNS server IP. * `ddns_zone` - Zone of your domain name (for example, DDNS.com). diff --git a/website/docs/r/fortios_system_dnsserver.html.markdown b/website/docs/r/fortios_system_dnsserver.html.markdown index 1b3b14d11..f8ff917b8 100644 --- a/website/docs/r/fortios_system_dnsserver.html.markdown +++ b/website/docs/r/fortios_system_dnsserver.html.markdown @@ -23,7 +23,7 @@ resource "fortios_system_dnsserver" "trname" { The following arguments are supported: -* `name` - (Required) DNS server name. +* `name` - DNS server name. * `mode` - DNS server mode. * `dnsfilter_profile` - DNS filter profile. diff --git a/website/docs/r/fortios_system_dscpbasedpriority.html.markdown b/website/docs/r/fortios_system_dscpbasedpriority.html.markdown index 17469e314..2be551203 100644 --- a/website/docs/r/fortios_system_dscpbasedpriority.html.markdown +++ b/website/docs/r/fortios_system_dscpbasedpriority.html.markdown @@ -23,7 +23,7 @@ resource "fortios_system_dscpbasedpriority" "trname" { The following arguments are supported: -* `fosid` - (Required) Item ID. +* `fosid` - Item ID. * `ds` - DSCP(DiffServ) DS value (0 - 63). * `priority` - DSCP based priority level. diff --git a/website/docs/r/fortios_system_geneve.html.markdown b/website/docs/r/fortios_system_geneve.html.markdown index 1f0f8fa93..ad16c81f0 100644 --- a/website/docs/r/fortios_system_geneve.html.markdown +++ b/website/docs/r/fortios_system_geneve.html.markdown @@ -27,7 +27,7 @@ resource "fortios_system_geneve" "trname" { The following arguments are supported: -* `name` - (Required) GENEVE device or interface name. Must be an unique interface name. +* `name` - GENEVE device or interface name. Must be an unique interface name. * `interface` - (Required) Outgoing interface for GENEVE encapsulated traffic. * `vni` - (Required) GENEVE network ID. * `ip_version` - (Required) IP version to use for the GENEVE interface and so for communication over the GENEVE. IPv4 or IPv6 unicast. diff --git a/website/docs/r/fortios_system_gretunnel.html.markdown b/website/docs/r/fortios_system_gretunnel.html.markdown index 58ef20f3b..ee0adf252 100644 --- a/website/docs/r/fortios_system_gretunnel.html.markdown +++ b/website/docs/r/fortios_system_gretunnel.html.markdown @@ -36,7 +36,7 @@ resource "fortios_system_gretunnel" "trname" { The following arguments are supported: -* `name` - (Required) Tunnel name. +* `name` - Tunnel name. * `interface` - Interface name. * `ip_version` - IP version to use for VPN interface. * `remote_gw6` - IPv6 address of the remote gateway. diff --git a/website/docs/r/fortios_system_interface.html.markdown b/website/docs/r/fortios_system_interface.html.markdown index e042df2a2..271b8b65a 100644 --- a/website/docs/r/fortios_system_interface.html.markdown +++ b/website/docs/r/fortios_system_interface.html.markdown @@ -35,7 +35,7 @@ resource "fortios_system_interface" "trname" { The following arguments are supported: -* `name` - (Required) Name. +* `name` - Name. * `vdom` - (Required) Interface is in this virtual domain (VDOM). * `vrf` - Virtual Routing Forwarding ID. * `cli_conn_status` - CLI connection status. diff --git a/website/docs/r/fortios_system_ipiptunnel.html.markdown b/website/docs/r/fortios_system_ipiptunnel.html.markdown index f099e9f61..6a5096968 100644 --- a/website/docs/r/fortios_system_ipiptunnel.html.markdown +++ b/website/docs/r/fortios_system_ipiptunnel.html.markdown @@ -24,7 +24,7 @@ resource "fortios_system_ipiptunnel" "trname" { The following arguments are supported: -* `name` - (Required) IPIP Tunnel name. +* `name` - IPIP Tunnel name. * `interface` - (Required) Interface name that is associated with the incoming traffic from available options. * `remote_gw` - (Required) IPv4 address for the remote gateway. * `local_gw` - (Required) IPv4 address for the local gateway. diff --git a/website/docs/r/fortios_system_ipsecaggregate.html.markdown b/website/docs/r/fortios_system_ipsecaggregate.html.markdown index a281a06c8..b557ffe73 100644 --- a/website/docs/r/fortios_system_ipsecaggregate.html.markdown +++ b/website/docs/r/fortios_system_ipsecaggregate.html.markdown @@ -156,7 +156,7 @@ resource "fortios_system_ipsecaggregate" "trname" { The following arguments are supported: -* `name` - (Required) IPsec aggregate name. +* `name` - IPsec aggregate name. * `member` - (Required) Member tunnels of the aggregate. The structure of `member` block is documented below. * `algorithm` - Frame distribution algorithm. diff --git a/website/docs/r/fortios_system_ipv6tunnel.html.markdown b/website/docs/r/fortios_system_ipv6tunnel.html.markdown index 544021c73..bf3f4969e 100644 --- a/website/docs/r/fortios_system_ipv6tunnel.html.markdown +++ b/website/docs/r/fortios_system_ipv6tunnel.html.markdown @@ -24,7 +24,7 @@ resource "fortios_system_ipv6tunnel" "trname" { The following arguments are supported: -* `name` - (Required) IPv6 tunnel name. +* `name` - IPv6 tunnel name. * `source` - Local IPv6 address of the tunnel. * `destination` - (Required) Remote IPv6 address of the tunnel. * `interface` - Interface name. diff --git a/website/docs/r/fortios_system_linkmonitor.html.markdown b/website/docs/r/fortios_system_linkmonitor.html.markdown index 89384e240..bb30c0d1b 100644 --- a/website/docs/r/fortios_system_linkmonitor.html.markdown +++ b/website/docs/r/fortios_system_linkmonitor.html.markdown @@ -43,7 +43,7 @@ resource "fortios_system_linkmonitor" "trname" { The following arguments are supported: -* `name` - (Required) Link monitor name. +* `name` - Link monitor name. * `addr_mode` - Address mode (IPv4 or IPv6). * `srcintf` - Interface that receives the traffic to be monitored. * `server` - (Required) IP address of the server(s) to be monitored. The structure of `server` block is documented below. diff --git a/website/docs/r/fortios_system_mobiletunnel.html.markdown b/website/docs/r/fortios_system_mobiletunnel.html.markdown index 59ccf2259..58a3a0bf2 100644 --- a/website/docs/r/fortios_system_mobiletunnel.html.markdown +++ b/website/docs/r/fortios_system_mobiletunnel.html.markdown @@ -34,7 +34,7 @@ resource "fortios_system_mobiletunnel" "trname" { The following arguments are supported: -* `name` - (Required) Tunnel name. +* `name` - Tunnel name. * `status` - Enable/disable this mobile tunnel. * `roaming_interface` - (Required) Select the associated interface name from available options. * `home_agent` - (Required) IPv4 address of the NEMO HA (Format: xxx.xxx.xxx.xxx). diff --git a/website/docs/r/fortios_system_objecttagging.html.markdown b/website/docs/r/fortios_system_objecttagging.html.markdown index 618ab27f9..2b43d0f48 100644 --- a/website/docs/r/fortios_system_objecttagging.html.markdown +++ b/website/docs/r/fortios_system_objecttagging.html.markdown @@ -26,7 +26,7 @@ resource "fortios_system_objecttagging" "trname" { The following arguments are supported: -* `category` - (Required) Tag Category. +* `category` - Tag Category. * `address` - Address. * `device` - Device. * `interface` - Interface. diff --git a/website/docs/r/fortios_system_pppoeinterface.html.markdown b/website/docs/r/fortios_system_pppoeinterface.html.markdown index 04bf26519..4faa96374 100644 --- a/website/docs/r/fortios_system_pppoeinterface.html.markdown +++ b/website/docs/r/fortios_system_pppoeinterface.html.markdown @@ -32,7 +32,7 @@ resource "fortios_system_pppoeinterface" "trname" { The following arguments are supported: -* `name` - (Required) Name of the PPPoE interface. +* `name` - Name of the PPPoE interface. * `dial_on_demand` - Enable/disable dial on demand to dial the PPPoE interface when packets are routed to the PPPoE interface. * `ipv6` - Enable/disable IPv6 Control Protocol (IPv6CP). * `device` - (Required) Name for the physical interface. diff --git a/website/docs/r/fortios_system_replacemsggroup.html.markdown b/website/docs/r/fortios_system_replacemsggroup.html.markdown index 8dc5173e9..228b8b61e 100644 --- a/website/docs/r/fortios_system_replacemsggroup.html.markdown +++ b/website/docs/r/fortios_system_replacemsggroup.html.markdown @@ -23,7 +23,7 @@ resource "fortios_system_replacemsggroup" "trname" { The following arguments are supported: -* `name` - (Required) Group name. +* `name` - Group name. * `comment` - Comment. * `group_type` - (Required) Group type. * `mail` - Replacement message table entries. The structure of `mail` block is documented below. diff --git a/website/docs/r/fortios_system_replacemsgimage.html.markdown b/website/docs/r/fortios_system_replacemsgimage.html.markdown index 0186ff22f..0d6328447 100644 --- a/website/docs/r/fortios_system_replacemsgimage.html.markdown +++ b/website/docs/r/fortios_system_replacemsgimage.html.markdown @@ -23,7 +23,7 @@ resource "fortios_system_replacemsgimage" "trname" { The following arguments are supported: -* `name` - (Required) Image name. +* `name` - Image name. * `image_type` - Image type. * `image_base64` - Image data. diff --git a/website/docs/r/fortios_system_sdnconnector.html.markdown b/website/docs/r/fortios_system_sdnconnector.html.markdown index 4682276a1..debd65644 100644 --- a/website/docs/r/fortios_system_sdnconnector.html.markdown +++ b/website/docs/r/fortios_system_sdnconnector.html.markdown @@ -31,7 +31,7 @@ resource "fortios_system_sdnconnector" "trname" { The following arguments are supported: -* `name` - (Required) SDN connector name. +* `name` - SDN connector name. * `status` - (Required) Enable/disable connection to the remote SDN connector. * `type` - (Required) Type of SDN connector. * `ha_status` - Enable/disable use for FortiGate HA service. diff --git a/website/docs/r/fortios_system_sessionhelper.html.markdown b/website/docs/r/fortios_system_sessionhelper.html.markdown index e77c082c8..468444a99 100644 --- a/website/docs/r/fortios_system_sessionhelper.html.markdown +++ b/website/docs/r/fortios_system_sessionhelper.html.markdown @@ -24,7 +24,7 @@ resource "fortios_system_sessionhelper" "trname" { The following arguments are supported: -* `fosid` - (Required) Session helper ID. +* `fosid` - Session helper ID. * `name` - (Required) Helper name. * `protocol` - (Required) Protocol number. * `port` - (Required) Protocol port. diff --git a/website/docs/r/fortios_system_sittunnel.html.markdown b/website/docs/r/fortios_system_sittunnel.html.markdown index 2b3300029..0d692a3d5 100644 --- a/website/docs/r/fortios_system_sittunnel.html.markdown +++ b/website/docs/r/fortios_system_sittunnel.html.markdown @@ -25,7 +25,7 @@ resource "fortios_system_sittunnel" "trname" { The following arguments are supported: -* `name` - (Required) Tunnel name. +* `name` - Tunnel name. * `source` - Source IP address of the tunnel. * `destination` - (Required) Destination IP address of the tunnel. * `ip6` - IPv6 address of the tunnel. diff --git a/website/docs/r/fortios_system_smsserver.html.markdown b/website/docs/r/fortios_system_smsserver.html.markdown index f4346f711..426fa373c 100644 --- a/website/docs/r/fortios_system_smsserver.html.markdown +++ b/website/docs/r/fortios_system_smsserver.html.markdown @@ -22,7 +22,7 @@ resource "fortios_system_smsserver" "trname" { The following arguments are supported: -* `name` - (Required) Name of SMS server. +* `name` - Name of SMS server. * `mail_server` - (Required) Email-to-SMS server domain name. diff --git a/website/docs/r/fortios_system_ssoadmin.html.markdown b/website/docs/r/fortios_system_ssoadmin.html.markdown index 505e2a9cf..0aa038531 100644 --- a/website/docs/r/fortios_system_ssoadmin.html.markdown +++ b/website/docs/r/fortios_system_ssoadmin.html.markdown @@ -26,7 +26,7 @@ resource "fortios_system_ssoadmin" "trname" { The following arguments are supported: -* `name` - (Required) SSO admin name. +* `name` - SSO admin name. * `accprofile` - (Required) SSO admin user access profile. * `vdom` - Virtual domain(s) that the administrator can access. The structure of `vdom` block is documented below. diff --git a/website/docs/r/fortios_system_storage.html.markdown b/website/docs/r/fortios_system_storage.html.markdown index 49bd0d99e..57d9b9145 100644 --- a/website/docs/r/fortios_system_storage.html.markdown +++ b/website/docs/r/fortios_system_storage.html.markdown @@ -13,7 +13,7 @@ Configure logical storage. The following arguments are supported: -* `name` - (Required) Storage name. +* `name` - Storage name. * `status` - Enable/disable storage. * `media_status` - The physical status of current media. * `order` - Set storage order. diff --git a/website/docs/r/fortios_system_tosbasedpriority.html.markdown b/website/docs/r/fortios_system_tosbasedpriority.html.markdown index a44b08c80..984684dd9 100644 --- a/website/docs/r/fortios_system_tosbasedpriority.html.markdown +++ b/website/docs/r/fortios_system_tosbasedpriority.html.markdown @@ -23,7 +23,7 @@ resource "fortios_system_tosbasedpriority" "trname" { The following arguments are supported: -* `fosid` - (Required) Item ID. +* `fosid` - Item ID. * `tos` - Value of the ToS byte in the IP datagram header (0-15, 8: minimize delay, 4: maximize throughput, 2: maximize reliability, 1: minimize monetary cost, and 0: default service). * `priority` - ToS based priority level to low, medium or high (these priorities match firewall traffic shaping priorities) (default = medium). diff --git a/website/docs/r/fortios_system_vdom.html.markdown b/website/docs/r/fortios_system_vdom.html.markdown index cc72b298c..88d674b1a 100644 --- a/website/docs/r/fortios_system_vdom.html.markdown +++ b/website/docs/r/fortios_system_vdom.html.markdown @@ -23,7 +23,7 @@ resource "fortios_system_vdom" "trname" { The following arguments are supported: -* `name` - (Required) VDOM name. +* `name` - VDOM name. * `short_name` - VDOM short name. * `vcluster_id` - Virtual cluster ID (0 - 4294967295). * `temporary` - Temporary. diff --git a/website/docs/r/fortios_system_vdomexception.html.markdown b/website/docs/r/fortios_system_vdomexception.html.markdown index a8f392796..e0edd0314 100644 --- a/website/docs/r/fortios_system_vdomexception.html.markdown +++ b/website/docs/r/fortios_system_vdomexception.html.markdown @@ -24,7 +24,7 @@ resource "fortios_system_vdomexception" "trname" { The following arguments are supported: -* `fosid` - (Required) Index <1-4096>. +* `fosid` - Index <1-4096>. * `object` - (Required) Name of the configuration object that can be configured independently for all VDOMs. * `oid` - Object ID. * `scope` - Determine whether the configuration object can be configured separately for all VDOMs or if some VDOMs share the same configuration. diff --git a/website/docs/r/fortios_system_vdomlink.html.markdown b/website/docs/r/fortios_system_vdomlink.html.markdown index 3bd21cb6a..ea0683842 100644 --- a/website/docs/r/fortios_system_vdomlink.html.markdown +++ b/website/docs/r/fortios_system_vdomlink.html.markdown @@ -13,7 +13,7 @@ Configure VDOM links. The following arguments are supported: -* `name` - (Required) VDOM link name (maximum = 8 characters). +* `name` - VDOM link name (maximum = 8 characters). * `vcluster` - Virtual cluster. * `type` - VDOM link type: PPP or Ethernet. diff --git a/website/docs/r/fortios_system_vdomproperty.html.markdown b/website/docs/r/fortios_system_vdomproperty.html.markdown index 26d52bebb..b056a6a0e 100644 --- a/website/docs/r/fortios_system_vdomproperty.html.markdown +++ b/website/docs/r/fortios_system_vdomproperty.html.markdown @@ -13,7 +13,7 @@ Configure VDOM property. The following arguments are supported: -* `name` - (Required) VDOM name. +* `name` - VDOM name. * `description` - Description. * `snmp_index` - Permanent SNMP Index of the virtual domain (0 - 4294967295). * `session` - Maximum guaranteed number of sessions. diff --git a/website/docs/r/fortios_system_vdomradiusserver.html.markdown b/website/docs/r/fortios_system_vdomradiusserver.html.markdown index f63444d00..b4edbcc92 100644 --- a/website/docs/r/fortios_system_vdomradiusserver.html.markdown +++ b/website/docs/r/fortios_system_vdomradiusserver.html.markdown @@ -13,7 +13,7 @@ Configure a RADIUS server to use as a RADIUS Single Sign On (RSSO) server for th The following arguments are supported: -* `name` - (Required) Name of the VDOM that you are adding the RADIUS server to. +* `name` - Name of the VDOM that you are adding the RADIUS server to. * `status` - Enable/disable the RSSO RADIUS server for this VDOM. * `radius_server_vdom` - (Required) Use this option to select another VDOM containing a VDOM RSSO RADIUS server to use for the current VDOM. diff --git a/website/docs/r/fortios_system_virtualwirepair.html.markdown b/website/docs/r/fortios_system_virtualwirepair.html.markdown index 951e78d99..63afacd3e 100644 --- a/website/docs/r/fortios_system_virtualwirepair.html.markdown +++ b/website/docs/r/fortios_system_virtualwirepair.html.markdown @@ -13,7 +13,7 @@ Configure virtual wire pairs. The following arguments are supported: -* `name` - (Required) Virtual-wire-pair name. Must be a unique interface name. +* `name` - Virtual-wire-pair name. Must be a unique interface name. * `member` - (Required) Interfaces belong to the virtual-wire-pair. The structure of `member` block is documented below. * `wildcard_vlan` - Enable/disable wildcard VLAN. * `vlan_filter` - Set VLAN filters. diff --git a/website/docs/r/fortios_system_vxlan.html.markdown b/website/docs/r/fortios_system_vxlan.html.markdown index c02e9f6fe..4fb4319d5 100644 --- a/website/docs/r/fortios_system_vxlan.html.markdown +++ b/website/docs/r/fortios_system_vxlan.html.markdown @@ -28,7 +28,7 @@ resource "fortios_system_vxlan" "trname" { The following arguments are supported: -* `name` - (Required) VXLAN device or interface name. Must be a unique interface name. +* `name` - VXLAN device or interface name. Must be a unique interface name. * `interface` - (Required) Outgoing interface for VXLAN encapsulated traffic. * `vni` - (Required) VXLAN network ID. * `ip_version` - (Required) IP version to use for the VXLAN interface and so for communication over the VXLAN. IPv4 or IPv6 unicast or multicast. diff --git a/website/docs/r/fortios_system_wccp.html.markdown b/website/docs/r/fortios_system_wccp.html.markdown index 913f8a925..ecf1dab28 100644 --- a/website/docs/r/fortios_system_wccp.html.markdown +++ b/website/docs/r/fortios_system_wccp.html.markdown @@ -39,7 +39,7 @@ resource "fortios_system_wccp" "trname" { The following arguments are supported: -* `service_id` - (Required) Service ID. +* `service_id` - Service ID. * `router_id` - IP address known to all cache engines. If all cache engines connect to the same FortiGate interface, use the default 0.0.0.0. * `cache_id` - IP address known to all routers. If the addresses are the same, use the default 0.0.0.0. * `group_address` - IP multicast address used by the cache routers. For the FortiGate to ignore multicast WCCP traffic, use the default 0.0.0.0. diff --git a/website/docs/r/fortios_system_zone.html.markdown b/website/docs/r/fortios_system_zone.html.markdown index 110a1f3ca..4aa210493 100644 --- a/website/docs/r/fortios_system_zone.html.markdown +++ b/website/docs/r/fortios_system_zone.html.markdown @@ -22,7 +22,7 @@ resource "fortios_system_zone" "trname" { The following arguments are supported: -* `name` - (Required) Zone name. +* `name` - Zone name. * `tagging` - Config object tagging. The structure of `tagging` block is documented below. * `intrazone` - Allow or deny traffic routing between different interfaces in the same zone (default = deny). * `interface` - Add interfaces to this zone. Interfaces must not be assigned to another zone or have firewall policies defined. The structure of `interface` block is documented below. diff --git a/website/docs/r/fortios_user_device.html.markdown b/website/docs/r/fortios_user_device.html.markdown index aae2e12dc..bf325af2f 100644 --- a/website/docs/r/fortios_user_device.html.markdown +++ b/website/docs/r/fortios_user_device.html.markdown @@ -24,7 +24,7 @@ resource "fortios_user_device" "trname" { The following arguments are supported: -* `alias` - (Required) Device alias. +* `alias` - Device alias. * `mac` - Device MAC address. * `user` - User name. * `master_device` - Master device (optional). diff --git a/website/docs/r/fortios_user_domaincontroller.html.markdown b/website/docs/r/fortios_user_domaincontroller.html.markdown index 5c602834e..fcbe34659 100644 --- a/website/docs/r/fortios_user_domaincontroller.html.markdown +++ b/website/docs/r/fortios_user_domaincontroller.html.markdown @@ -45,7 +45,7 @@ resource "fortios_user_domaincontroller" "trname" { The following arguments are supported: -* `name` - (Required) Domain controller entry name. +* `name` - Domain controller entry name. * `ip_address` - (Required) Domain controller IP address. * `port` - Port to be used for communication with the domain controller (default = 445). * `extra_server` - extra servers. The structure of `extra_server` block is documented below. diff --git a/website/docs/r/fortios_user_fortitoken.html.markdown b/website/docs/r/fortios_user_fortitoken.html.markdown index 9f8e048c0..693c4cde1 100644 --- a/website/docs/r/fortios_user_fortitoken.html.markdown +++ b/website/docs/r/fortios_user_fortitoken.html.markdown @@ -13,7 +13,7 @@ Configure FortiToken. The following arguments are supported: -* `serial_number` - (Required) Serial number. +* `serial_number` - Serial number. * `status` - Status * `seed` - Token seed. * `comments` - Comment. diff --git a/website/docs/r/fortios_user_fssopolling.html.markdown b/website/docs/r/fortios_user_fssopolling.html.markdown index 446bb4ae3..f85f0f108 100644 --- a/website/docs/r/fortios_user_fssopolling.html.markdown +++ b/website/docs/r/fortios_user_fssopolling.html.markdown @@ -13,7 +13,7 @@ Configure FSSO active directory servers for polling mode. The following arguments are supported: -* `fosid` - (Required) Active Directory server ID. +* `fosid` - Active Directory server ID. * `status` - Enable/disable polling for the status of this Active Directory server. * `server` - (Required) Host name or IP address of the Active Directory server. * `default_domain` - Default domain managed by this Active Directory server. diff --git a/website/docs/r/fortios_user_group.html.markdown b/website/docs/r/fortios_user_group.html.markdown index 1d57045ce..15196ae7e 100644 --- a/website/docs/r/fortios_user_group.html.markdown +++ b/website/docs/r/fortios_user_group.html.markdown @@ -33,7 +33,7 @@ resource "fortios_user_group" "trname" { The following arguments are supported: -* `name` - (Required) Group name. +* `name` - Group name. * `fosid` - Group ID. * `group_type` - Set the group to be for firewall authentication, FSSO, RSSO, or guest users. * `authtimeout` - Authentication timeout in minutes for this user group. 0 to use the global user setting auth-timeout. diff --git a/website/docs/r/fortios_user_krbkeytab.html.markdown b/website/docs/r/fortios_user_krbkeytab.html.markdown index 637a75d62..652a08b0c 100644 --- a/website/docs/r/fortios_user_krbkeytab.html.markdown +++ b/website/docs/r/fortios_user_krbkeytab.html.markdown @@ -44,7 +44,7 @@ resource "fortios_user_krbkeytab" "trname" { The following arguments are supported: -* `name` - (Required) Kerberos keytab entry name. +* `name` - Kerberos keytab entry name. * `principal` - (Required) Kerberos service principal, e.g. HTTP/fgt.example.com@EXAMPLE.COM. * `ldap_server` - (Required) LDAP server name. * `keytab` - (Required) base64 coded keytab file containing a pre-shared key. diff --git a/website/docs/r/fortios_user_ldap.html.markdown b/website/docs/r/fortios_user_ldap.html.markdown index 21c83bf87..ec36675b9 100644 --- a/website/docs/r/fortios_user_ldap.html.markdown +++ b/website/docs/r/fortios_user_ldap.html.markdown @@ -37,7 +37,7 @@ resource "fortios_user_ldap" "trname" { The following arguments are supported: -* `name` - (Required) LDAP server entry name. +* `name` - LDAP server entry name. * `server` - (Required) LDAP server CN domain name or IP. * `secondary_server` - Secondary LDAP server CN domain name or IP. * `tertiary_server` - Tertiary LDAP server CN domain name or IP. diff --git a/website/docs/r/fortios_user_local.html.markdown b/website/docs/r/fortios_user_local.html.markdown index 68d2ad1fa..e05a95607 100644 --- a/website/docs/r/fortios_user_local.html.markdown +++ b/website/docs/r/fortios_user_local.html.markdown @@ -50,7 +50,7 @@ resource "fortios_user_local" "trname" { The following arguments are supported: -* `name` - (Required) User name. +* `name` - User name. * `fosid` - User ID. * `status` - (Required) Enable/disable allowing the local user to authenticate with the FortiGate unit. * `type` - (Required) Authentication method. diff --git a/website/docs/r/fortios_user_passwordpolicy.html.markdown b/website/docs/r/fortios_user_passwordpolicy.html.markdown index 1f9f35d5c..da385056e 100644 --- a/website/docs/r/fortios_user_passwordpolicy.html.markdown +++ b/website/docs/r/fortios_user_passwordpolicy.html.markdown @@ -23,7 +23,7 @@ resource "fortios_user_passwordpolicy" "trname" { The following arguments are supported: -* `name` - (Required) Password policy name. +* `name` - Password policy name. * `expire_days` - Time in days before the user's password expires. * `warn_days` - Time in days before a password expiration warning message is displayed to the user upon login. diff --git a/website/docs/r/fortios_user_peer.html.markdown b/website/docs/r/fortios_user_peer.html.markdown index 1c602449f..eca6b33e3 100644 --- a/website/docs/r/fortios_user_peer.html.markdown +++ b/website/docs/r/fortios_user_peer.html.markdown @@ -26,7 +26,7 @@ resource "fortios_user_peer" "trname1" { The following arguments are supported: -* `name` - (Required) Peer name. +* `name` - Peer name. * `mandatory_ca_verify` - Determine what happens to the peer if the CA certificate is not installed. Disable to automatically consider the peer certificate as valid. * `ca` - Name of the CA certificate as returned by the execute vpn certificate ca list command. * `subject` - Peer certificate name constraints. diff --git a/website/docs/r/fortios_user_peergrp.html.markdown b/website/docs/r/fortios_user_peergrp.html.markdown index bcc6fa88c..490314303 100644 --- a/website/docs/r/fortios_user_peergrp.html.markdown +++ b/website/docs/r/fortios_user_peergrp.html.markdown @@ -34,7 +34,7 @@ resource "fortios_user_peergrp" "trname" { The following arguments are supported: -* `name` - (Required) Peer group name. +* `name` - Peer group name. * `member` - Peer group members. The structure of `member` block is documented below. The `member` block supports: diff --git a/website/docs/r/fortios_user_pop3.html.markdown b/website/docs/r/fortios_user_pop3.html.markdown index 04c21421e..b83805d21 100644 --- a/website/docs/r/fortios_user_pop3.html.markdown +++ b/website/docs/r/fortios_user_pop3.html.markdown @@ -25,7 +25,7 @@ resource "fortios_user_pop3" "trname" { The following arguments are supported: -* `name` - (Required) POP3 server entry name. +* `name` - POP3 server entry name. * `server` - (Required) {} server domain name or IP. * `port` - POP3 service port number. * `secure` - SSL connection. diff --git a/website/docs/r/fortios_user_radius.html.markdown b/website/docs/r/fortios_user_radius.html.markdown index ef8d54650..614c77196 100644 --- a/website/docs/r/fortios_user_radius.html.markdown +++ b/website/docs/r/fortios_user_radius.html.markdown @@ -47,7 +47,7 @@ resource "fortios_user_radius" "trname" { The following arguments are supported: -* `name` - (Required) RADIUS server entry name. +* `name` - RADIUS server entry name. * `server` - Primary RADIUS server CN domain name or IP address. * `secret` - Pre-shared secret key used to access the primary RADIUS server. * `secondary_server` - {} secondary RADIUS CN domain name or IP. diff --git a/website/docs/r/fortios_user_saml.html.markdown b/website/docs/r/fortios_user_saml.html.markdown index e6c9b5493..88590ad82 100644 --- a/website/docs/r/fortios_user_saml.html.markdown +++ b/website/docs/r/fortios_user_saml.html.markdown @@ -30,7 +30,7 @@ resource "fortios_user_saml" "tr3" { The following arguments are supported: -* `name` - (Required) SAML server entry name. +* `name` - SAML server entry name. * `cert` - Certificate to sign SAML messages. * `entity_id` - (Required) SP entity ID. * `single_sign_on_url` - (Required) SP single sign-on URL. diff --git a/website/docs/r/fortios_user_securityexemptlist.html.markdown b/website/docs/r/fortios_user_securityexemptlist.html.markdown index 6c0b2f6b7..e52f1f62f 100644 --- a/website/docs/r/fortios_user_securityexemptlist.html.markdown +++ b/website/docs/r/fortios_user_securityexemptlist.html.markdown @@ -13,7 +13,7 @@ Configure security exemption list. The following arguments are supported: -* `name` - (Required) Name of the exempt list. +* `name` - Name of the exempt list. * `description` - Description. * `rule` - Configure rules for exempting users from captive portal authentication. The structure of `rule` block is documented below. diff --git a/website/docs/r/fortios_user_tacacs.html.markdown b/website/docs/r/fortios_user_tacacs.html.markdown index e7f5e5725..bbacd0435 100644 --- a/website/docs/r/fortios_user_tacacs.html.markdown +++ b/website/docs/r/fortios_user_tacacs.html.markdown @@ -25,7 +25,7 @@ resource "fortios_user_tacacs" "trname" { The following arguments are supported: -* `name` - (Required) TACACS+ server entry name. +* `name` - TACACS+ server entry name. * `server` - Primary TACACS+ server CN domain name or IP address. * `secondary_server` - Secondary TACACS+ server CN domain name or IP address. * `tertiary_server` - Tertiary TACACS+ server CN domain name or IP address. diff --git a/website/docs/r/fortios_vpncertificate_ocspserver.html.markdown b/website/docs/r/fortios_vpncertificate_ocspserver.html.markdown index 4187f19f7..70fd8f193 100644 --- a/website/docs/r/fortios_vpncertificate_ocspserver.html.markdown +++ b/website/docs/r/fortios_vpncertificate_ocspserver.html.markdown @@ -25,7 +25,7 @@ resource "fortios_vpncertificate_ocspserver" "trname" { The following arguments are supported: -* `name` - (Required) OCSP server entry name. +* `name` - OCSP server entry name. * `url` - OCSP server URL. * `cert` - OCSP server certificate. * `secondary_url` - Secondary OCSP server URL. diff --git a/website/docs/r/fortios_vpnipsec_concentrator.html.markdown b/website/docs/r/fortios_vpnipsec_concentrator.html.markdown index 74457f558..8127ab2ee 100644 --- a/website/docs/r/fortios_vpnipsec_concentrator.html.markdown +++ b/website/docs/r/fortios_vpnipsec_concentrator.html.markdown @@ -22,7 +22,7 @@ resource "fortios_vpnipsec_concentrator" "trname" { The following arguments are supported: -* `name` - (Required) Concentrator name. +* `name` - Concentrator name. * `src_check` - Enable to check source address of phase 2 selector. Disable to check only the destination selector. * `member` - Names of up to 3 VPN tunnels to add to the concentrator. The structure of `member` block is documented below. diff --git a/website/docs/r/fortios_vpnipsec_forticlient.html.markdown b/website/docs/r/fortios_vpnipsec_forticlient.html.markdown index 27d33a547..9e7154e41 100644 --- a/website/docs/r/fortios_vpnipsec_forticlient.html.markdown +++ b/website/docs/r/fortios_vpnipsec_forticlient.html.markdown @@ -168,7 +168,7 @@ resource "fortios_vpnipsec_forticlient" "trname" { The following arguments are supported: -* `realm` - (Required) FortiClient realm name. +* `realm` - FortiClient realm name. * `usergroupname` - (Required) User group name for FortiClient users. * `phase2name` - (Required) Phase 2 tunnel name that you defined in the FortiClient dialup configuration. * `status` - Enable/disable this FortiClient configuration. diff --git a/website/docs/r/fortios_vpnipsec_manualkey.html.markdown b/website/docs/r/fortios_vpnipsec_manualkey.html.markdown index 0b5264be2..9d86f5cba 100644 --- a/website/docs/r/fortios_vpnipsec_manualkey.html.markdown +++ b/website/docs/r/fortios_vpnipsec_manualkey.html.markdown @@ -30,7 +30,7 @@ resource "fortios_vpnipsec_manualkey" "trname" { The following arguments are supported: -* `name` - (Required) IPsec tunnel name. +* `name` - IPsec tunnel name. * `interface` - (Required) Name of the physical, aggregate, or VLAN interface. * `remote_gw` - (Required) Peer gateway. * `local_gw` - Local gateway. diff --git a/website/docs/r/fortios_vpnipsec_manualkeyinterface.html.markdown b/website/docs/r/fortios_vpnipsec_manualkeyinterface.html.markdown index 0f00b625f..9b4c4c4a2 100644 --- a/website/docs/r/fortios_vpnipsec_manualkeyinterface.html.markdown +++ b/website/docs/r/fortios_vpnipsec_manualkeyinterface.html.markdown @@ -34,7 +34,7 @@ resource "fortios_vpnipsec_manualkeyinterface" "trname" { The following arguments are supported: -* `name` - (Required) IPsec tunnel name. +* `name` - IPsec tunnel name. * `interface` - (Required) Name of the physical, aggregate, or VLAN interface. * `ip_version` - IP version to use for VPN interface. * `addr_type` - IP version to use for IP packets. diff --git a/website/docs/r/fortios_vpnipsec_phase1.html.markdown b/website/docs/r/fortios_vpnipsec_phase1.html.markdown index 2ae9fb60d..9973e2853 100644 --- a/website/docs/r/fortios_vpnipsec_phase1.html.markdown +++ b/website/docs/r/fortios_vpnipsec_phase1.html.markdown @@ -92,7 +92,7 @@ resource "fortios_vpnipsec_phase1" "trnamex1" { The following arguments are supported: -* `name` - (Required) IPsec remote gateway name. +* `name` - IPsec remote gateway name. * `type` - Remote gateway type. * `interface` - (Required) Local physical, aggregate, or VLAN outgoing interface. * `ike_version` - IKE protocol version. diff --git a/website/docs/r/fortios_vpnipsec_phase1interface.html.markdown b/website/docs/r/fortios_vpnipsec_phase1interface.html.markdown index bb584998a..4c2fcda78 100644 --- a/website/docs/r/fortios_vpnipsec_phase1interface.html.markdown +++ b/website/docs/r/fortios_vpnipsec_phase1interface.html.markdown @@ -117,7 +117,7 @@ resource "fortios_vpnipsec_phase1interface" "trname2" { The following arguments are supported: -* `name` - (Required) IPsec remote gateway name. +* `name` - IPsec remote gateway name. * `type` - Remote gateway type. * `interface` - (Required) Local physical, aggregate, or VLAN outgoing interface. * `ip_version` - IP version to use for VPN interface. diff --git a/website/docs/r/fortios_vpnipsec_phase2.html.markdown b/website/docs/r/fortios_vpnipsec_phase2.html.markdown index ea7486731..286a64fc5 100644 --- a/website/docs/r/fortios_vpnipsec_phase2.html.markdown +++ b/website/docs/r/fortios_vpnipsec_phase2.html.markdown @@ -133,7 +133,7 @@ resource "fortios_vpnipsec_phase2" "trname" { The following arguments are supported: -* `name` - (Required) IPsec tunnel name. +* `name` - IPsec tunnel name. * `phase1name` - (Required) Phase 1 determines the options required for phase 2. * `dhcp_ipsec` - Enable/disable DHCP-IPsec. * `use_natip` - Enable to use the FortiGate public IP as the source selector when outbound NAT is used. diff --git a/website/docs/r/fortios_vpnipsec_phase2interface.html.markdown b/website/docs/r/fortios_vpnipsec_phase2interface.html.markdown index 92689cd5c..e3d0d03a1 100644 --- a/website/docs/r/fortios_vpnipsec_phase2interface.html.markdown +++ b/website/docs/r/fortios_vpnipsec_phase2interface.html.markdown @@ -148,7 +148,7 @@ resource "fortios_vpnipsec_phase2interface" "trname2" { The following arguments are supported: -* `name` - (Required) IPsec tunnel name. +* `name` - IPsec tunnel name. * `phase1name` - (Required) Phase 1 determines the options required for phase 2. * `dhcp_ipsec` - Enable/disable DHCP-IPsec. * `proposal` - (Required) Phase2 proposal. diff --git a/website/docs/r/fortios_vpnsslweb_hostchecksoftware.html.markdown b/website/docs/r/fortios_vpnsslweb_hostchecksoftware.html.markdown index 5eeb961aa..805070f8c 100644 --- a/website/docs/r/fortios_vpnsslweb_hostchecksoftware.html.markdown +++ b/website/docs/r/fortios_vpnsslweb_hostchecksoftware.html.markdown @@ -23,7 +23,7 @@ resource "fortios_vpnsslweb_hostchecksoftware" "trname" { The following arguments are supported: -* `name` - (Required) Name. +* `name` - Name. * `os_type` - OS type. * `type` - Type. * `version` - Version. diff --git a/website/docs/r/fortios_vpnsslweb_portal.html.markdown b/website/docs/r/fortios_vpnsslweb_portal.html.markdown index f97e90728..591becaff 100644 --- a/website/docs/r/fortios_vpnsslweb_portal.html.markdown +++ b/website/docs/r/fortios_vpnsslweb_portal.html.markdown @@ -72,7 +72,7 @@ resource "fortios_vpnsslweb_portal" "trname" { The following arguments are supported: -* `name` - (Required) Portal name. +* `name` - Portal name. * `tunnel_mode` - Enable/disable IPv4 SSL-VPN tunnel mode. * `ip_mode` - Method by which users of this SSL-VPN tunnel obtain IP addresses. * `auto_connect` - Enable/disable automatic connect by client when system is up. diff --git a/website/docs/r/fortios_vpnsslweb_realm.html.markdown b/website/docs/r/fortios_vpnsslweb_realm.html.markdown index 3bf6fbc85..f46477d3a 100644 --- a/website/docs/r/fortios_vpnsslweb_realm.html.markdown +++ b/website/docs/r/fortios_vpnsslweb_realm.html.markdown @@ -24,7 +24,7 @@ resource "fortios_vpnsslweb_realm" "trname" { The following arguments are supported: -* `url_path` - (Required) URL path to access SSL-VPN login page. +* `url_path` - URL path to access SSL-VPN login page. * `max_concurrent_user` - Maximum concurrent users (0 - 65535, 0 means unlimited). * `login_page` - Replacement HTML for SSL-VPN login page. * `virtual_host` - Virtual host name for realm. diff --git a/website/docs/r/fortios_vpnsslweb_userbookmark.html.markdown b/website/docs/r/fortios_vpnsslweb_userbookmark.html.markdown index 968cc6bc3..e441ddb1d 100644 --- a/website/docs/r/fortios_vpnsslweb_userbookmark.html.markdown +++ b/website/docs/r/fortios_vpnsslweb_userbookmark.html.markdown @@ -22,7 +22,7 @@ resource "fortios_vpnsslweb_userbookmark" "trname" { The following arguments are supported: -* `name` - (Required) User and group name. +* `name` - User and group name. * `custom_lang` - Personal language. * `bookmarks` - Bookmark table. The structure of `bookmarks` block is documented below. diff --git a/website/docs/r/fortios_vpnsslweb_usergroupbookmark.html.markdown b/website/docs/r/fortios_vpnsslweb_usergroupbookmark.html.markdown index 1cbd20a58..2b40b3d15 100644 --- a/website/docs/r/fortios_vpnsslweb_usergroupbookmark.html.markdown +++ b/website/docs/r/fortios_vpnsslweb_usergroupbookmark.html.markdown @@ -36,7 +36,7 @@ resource "fortios_vpnsslweb_usergroupbookmark" "trname" { The following arguments are supported: -* `name` - (Required) Group name. +* `name` - Group name. * `bookmarks` - Bookmark table. The structure of `bookmarks` block is documented below. The `bookmarks` block supports: diff --git a/website/docs/r/fortios_waf_mainclass.html.markdown b/website/docs/r/fortios_waf_mainclass.html.markdown index 4fb958997..d26e94d39 100644 --- a/website/docs/r/fortios_waf_mainclass.html.markdown +++ b/website/docs/r/fortios_waf_mainclass.html.markdown @@ -14,7 +14,7 @@ Hidden table for datasource. The following arguments are supported: * `name` - Main signature class name. -* `fosid` - (Required) Main signature class ID. +* `fosid` - Main signature class ID. ## Attribute Reference diff --git a/website/docs/r/fortios_waf_profile.html.markdown b/website/docs/r/fortios_waf_profile.html.markdown index 3a5547d34..693235409 100644 --- a/website/docs/r/fortios_waf_profile.html.markdown +++ b/website/docs/r/fortios_waf_profile.html.markdown @@ -23,7 +23,7 @@ resource "fortios_waf_profile" "trname" { The following arguments are supported: -* `name` - (Required) WAF Profile name. +* `name` - WAF Profile name. * `external` - Disable/Enable external HTTP Inspection. * `extended_log` - Enable/disable extended logging. * `signature` - WAF signatures. The structure of `signature` block is documented below. diff --git a/website/docs/r/fortios_waf_signature.html.markdown b/website/docs/r/fortios_waf_signature.html.markdown index 9cd007c29..ccb917c9c 100644 --- a/website/docs/r/fortios_waf_signature.html.markdown +++ b/website/docs/r/fortios_waf_signature.html.markdown @@ -14,7 +14,7 @@ Hidden table for datasource. The following arguments are supported: * `desc` - Signature description. -* `fosid` - (Required) Signature ID. +* `fosid` - Signature ID. ## Attribute Reference diff --git a/website/docs/r/fortios_waf_subclass.html.markdown b/website/docs/r/fortios_waf_subclass.html.markdown index 232473218..ef5f62aa9 100644 --- a/website/docs/r/fortios_waf_subclass.html.markdown +++ b/website/docs/r/fortios_waf_subclass.html.markdown @@ -14,7 +14,7 @@ Hidden table for datasource. The following arguments are supported: * `name` - Signature subclass name. -* `fosid` - (Required) Signature subclass ID. +* `fosid` - Signature subclass ID. ## Attribute Reference diff --git a/website/docs/r/fortios_wanopt_authgroup.html.markdown b/website/docs/r/fortios_wanopt_authgroup.html.markdown index bcff306fd..c32d4f93c 100644 --- a/website/docs/r/fortios_wanopt_authgroup.html.markdown +++ b/website/docs/r/fortios_wanopt_authgroup.html.markdown @@ -24,7 +24,7 @@ resource "fortios_wanopt_authgroup" "trname" { The following arguments are supported: -* `name` - (Required) Auth-group name. +* `name` - Auth-group name. * `auth_method` - Select certificate or pre-shared key authentication for this authentication group. * `psk` - Pre-shared key used by the peers in this authentication group. * `cert` - (Required) Name of certificate to identify this peer. diff --git a/website/docs/r/fortios_wanopt_contentdeliverynetworkrule.html.markdown b/website/docs/r/fortios_wanopt_contentdeliverynetworkrule.html.markdown index 90c95bc70..fde720afa 100644 --- a/website/docs/r/fortios_wanopt_contentdeliverynetworkrule.html.markdown +++ b/website/docs/r/fortios_wanopt_contentdeliverynetworkrule.html.markdown @@ -32,7 +32,7 @@ resource "fortios_wanopt_contentdeliverynetworkrule" "trname" { The following arguments are supported: -* `name` - (Required) Name of table. +* `name` - Name of table. * `comment` - Comment about this CDN-rule. * `status` - Enable/disable WAN optimization content delivery network rules. * `host_domain_name_suffix` - Suffix portion of the fully qualified domain name (eg. fortinet.com in "www.fortinet.com"). The structure of `host_domain_name_suffix` block is documented below. diff --git a/website/docs/r/fortios_wanopt_peer.html.markdown b/website/docs/r/fortios_wanopt_peer.html.markdown index a261e4c7c..19a7fe1ec 100644 --- a/website/docs/r/fortios_wanopt_peer.html.markdown +++ b/website/docs/r/fortios_wanopt_peer.html.markdown @@ -22,7 +22,7 @@ resource "fortios_wanopt_peer" "trname" { The following arguments are supported: -* `peer_host_id` - (Required) Peer host ID. +* `peer_host_id` - Peer host ID. * `ip` - Peer IP address. diff --git a/website/docs/r/fortios_wanopt_profile.html.markdown b/website/docs/r/fortios_wanopt_profile.html.markdown index ca73c57c1..2a7f4aaae 100644 --- a/website/docs/r/fortios_wanopt_profile.html.markdown +++ b/website/docs/r/fortios_wanopt_profile.html.markdown @@ -78,7 +78,7 @@ resource "fortios_wanopt_profile" "trname" { The following arguments are supported: -* `name` - (Required) Profile name. +* `name` - Profile name. * `transparent` - Enable/disable transparent mode. * `comments` - Comment. * `auth_group` - Optionally add an authentication group to restrict access to the WAN Optimization tunnel to peers in the authentication group. diff --git a/website/docs/r/fortios_webfilter_ftgdlocalcat.html.markdown b/website/docs/r/fortios_webfilter_ftgdlocalcat.html.markdown index 8f67d0295..b6b8e6c86 100644 --- a/website/docs/r/fortios_webfilter_ftgdlocalcat.html.markdown +++ b/website/docs/r/fortios_webfilter_ftgdlocalcat.html.markdown @@ -25,7 +25,7 @@ The following arguments are supported: * `status` - Enable/disable the local category. * `fosid` - Local category ID. -* `desc` - (Required) Local category description. +* `desc` - Local category description. ## Attribute Reference diff --git a/website/docs/r/fortios_webfilter_ftgdlocalrating.html.markdown b/website/docs/r/fortios_webfilter_ftgdlocalrating.html.markdown index da91f7213..174101d88 100644 --- a/website/docs/r/fortios_webfilter_ftgdlocalrating.html.markdown +++ b/website/docs/r/fortios_webfilter_ftgdlocalrating.html.markdown @@ -23,7 +23,7 @@ resource "fortios_webfilter_ftgdlocalrating" "trname" { The following arguments are supported: -* `url` - (Required) URL to rate locally. +* `url` - URL to rate locally. * `status` - Enable/disable local rating. * `rating` - (Required) Local rating. diff --git a/website/docs/r/fortios_webfilter_override.html.markdown b/website/docs/r/fortios_webfilter_override.html.markdown index bd2c75dab..bdf85c628 100644 --- a/website/docs/r/fortios_webfilter_override.html.markdown +++ b/website/docs/r/fortios_webfilter_override.html.markdown @@ -30,7 +30,7 @@ resource "fortios_webfilter_override" "trname" { The following arguments are supported: -* `fosid` - (Required) Override rule ID. +* `fosid` - Override rule ID. * `status` - Enable/disable override rule. * `scope` - Override either the specific user, user group, IPv4 address, or IPv6 address. * `ip` - IPv4 address which the override applies. diff --git a/website/docs/r/fortios_webproxy_debugurl.html.markdown b/website/docs/r/fortios_webproxy_debugurl.html.markdown index c1195430c..de63cd33a 100644 --- a/website/docs/r/fortios_webproxy_debugurl.html.markdown +++ b/website/docs/r/fortios_webproxy_debugurl.html.markdown @@ -24,7 +24,7 @@ resource "fortios_webproxy_debugurl" "trname" { The following arguments are supported: -* `name` - (Required) Debug URL name. +* `name` - Debug URL name. * `url_pattern` - (Required) URL exemption pattern. * `status` - Enable/disable this URL exemption. * `exact` - Enable/disable matching the exact path. diff --git a/website/docs/r/fortios_webproxy_forwardserver.html.markdown b/website/docs/r/fortios_webproxy_forwardserver.html.markdown index 6b3e9970a..434cc8b59 100644 --- a/website/docs/r/fortios_webproxy_forwardserver.html.markdown +++ b/website/docs/r/fortios_webproxy_forwardserver.html.markdown @@ -27,7 +27,7 @@ resource "fortios_webproxy_forwardserver" "trname" { The following arguments are supported: -* `name` - (Required) Server name. +* `name` - Server name. * `addr_type` - Address type of the forwarding proxy server: IP or FQDN. * `ip` - Forward proxy server IP address. * `fqdn` - Forward server Fully Qualified Domain Name (FQDN). diff --git a/website/docs/r/fortios_webproxy_forwardservergroup.html.markdown b/website/docs/r/fortios_webproxy_forwardservergroup.html.markdown index 6e6341119..ee98da6c3 100644 --- a/website/docs/r/fortios_webproxy_forwardservergroup.html.markdown +++ b/website/docs/r/fortios_webproxy_forwardservergroup.html.markdown @@ -39,7 +39,7 @@ resource "fortios_webproxy_forwardservergroup" "trname1" { The following arguments are supported: -* `name` - (Required) Configure a forward server group consisting one or multiple forward servers. Supports failover and load balancing. +* `name` - Configure a forward server group consisting one or multiple forward servers. Supports failover and load balancing. * `affinity` - Enable/disable affinity, attaching a source-ip's traffic to the assigned forwarding server until the forward-server-affinity-timeout is reached (under web-proxy global). * `ldb_method` - Load balance method: weighted or least-session. * `group_down_option` - Action to take when all of the servers in the forward server group are down: block sessions until at least one server is back up or pass sessions to their destination. diff --git a/website/docs/r/fortios_webproxy_profile.html.markdown b/website/docs/r/fortios_webproxy_profile.html.markdown index 8fe7d1d48..e88be9b99 100644 --- a/website/docs/r/fortios_webproxy_profile.html.markdown +++ b/website/docs/r/fortios_webproxy_profile.html.markdown @@ -30,7 +30,7 @@ resource "fortios_webproxy_profile" "trname" { The following arguments are supported: -* `name` - (Required) Profile name. +* `name` - Profile name. * `header_client_ip` - Action to take on the HTTP client-IP header in forwarded requests: forwards (pass), adds, or removes the HTTP header. * `header_via_request` - Action to take on the HTTP via header in forwarded requests: forwards (pass), adds, or removes the HTTP header. * `header_via_response` - Action to take on the HTTP via header in forwarded responses: forwards (pass), adds, or removes the HTTP header. diff --git a/website/docs/r/fortios_webproxy_urlmatch.html.markdown b/website/docs/r/fortios_webproxy_urlmatch.html.markdown index d236df3c0..d78aee16b 100644 --- a/website/docs/r/fortios_webproxy_urlmatch.html.markdown +++ b/website/docs/r/fortios_webproxy_urlmatch.html.markdown @@ -35,7 +35,7 @@ resource "fortios_webproxy_urlmatch" "trname" { The following arguments are supported: -* `name` - (Required) Configure a name for the URL to be exempted. +* `name` - Configure a name for the URL to be exempted. * `status` - Enable/disable exempting the URLs matching the URL pattern from web proxy forwarding and caching. * `url_pattern` - (Required) URL pattern to be exempted from web proxy forwarding and caching. * `forward_server` - Forward server name. diff --git a/website/docs/r/fortios_wirelesscontroller_apstatus.html.markdown b/website/docs/r/fortios_wirelesscontroller_apstatus.html.markdown index 7c985b508..f1e97ef47 100644 --- a/website/docs/r/fortios_wirelesscontroller_apstatus.html.markdown +++ b/website/docs/r/fortios_wirelesscontroller_apstatus.html.markdown @@ -13,7 +13,7 @@ Configure access point status (rogue | accepted | suppressed). The following arguments are supported: -* `fosid` - (Required) AP ID. +* `fosid` - AP ID. * `bssid` - Access Point's (AP's) BSSID. * `ssid` - Access Point's (AP's) SSID. * `status` - Access Point's (AP's) status: rogue, accepted, or supressed. diff --git a/website/docs/r/fortios_wirelesscontroller_bleprofile.html.markdown b/website/docs/r/fortios_wirelesscontroller_bleprofile.html.markdown index 4abbcc64d..ecacc24e5 100644 --- a/website/docs/r/fortios_wirelesscontroller_bleprofile.html.markdown +++ b/website/docs/r/fortios_wirelesscontroller_bleprofile.html.markdown @@ -13,7 +13,7 @@ Configure Bluetooth Low Energy profile. The following arguments are supported: -* `name` - (Required) Bluetooth Low Energy profile name. +* `name` - Bluetooth Low Energy profile name. * `comment` - Comment. * `advertising` - Advertising type. * `ibeacon_uuid` - Universally Unique Identifier (UUID; automatically assigned but can be manually reset). diff --git a/website/docs/r/fortios_wirelesscontroller_bonjourprofile.html.markdown b/website/docs/r/fortios_wirelesscontroller_bonjourprofile.html.markdown index 85e0857a7..afcf19470 100644 --- a/website/docs/r/fortios_wirelesscontroller_bonjourprofile.html.markdown +++ b/website/docs/r/fortios_wirelesscontroller_bonjourprofile.html.markdown @@ -13,7 +13,7 @@ Configure Bonjour profiles. Bonjour is Apple's zero configuration networking pro The following arguments are supported: -* `name` - (Required) Bonjour profile name. +* `name` - Bonjour profile name. * `comment` - Comment. * `policy_list` - Bonjour policy list. The structure of `policy_list` block is documented below. diff --git a/website/docs/r/fortios_wirelesscontroller_qosprofile.html.markdown b/website/docs/r/fortios_wirelesscontroller_qosprofile.html.markdown index cfb0fb194..bf4269848 100644 --- a/website/docs/r/fortios_wirelesscontroller_qosprofile.html.markdown +++ b/website/docs/r/fortios_wirelesscontroller_qosprofile.html.markdown @@ -13,7 +13,7 @@ Configure WiFi quality of service (QoS) profiles. The following arguments are supported: -* `name` - (Required) WiFi QoS profile name. +* `name` - WiFi QoS profile name. * `comment` - Comment. * `uplink` - Maximum uplink bandwidth for Virtual Access Points (VAPs) (0 - 2097152 Kbps, default = 0, 0 means no limit). * `downlink` - Maximum downlink bandwidth for Virtual Access Points (VAPs) (0 - 2097152 Kbps, default = 0, 0 means no limit). diff --git a/website/docs/r/fortios_wirelesscontroller_region.html.markdown b/website/docs/r/fortios_wirelesscontroller_region.html.markdown index 8f8a13842..df629e626 100644 --- a/website/docs/r/fortios_wirelesscontroller_region.html.markdown +++ b/website/docs/r/fortios_wirelesscontroller_region.html.markdown @@ -13,7 +13,7 @@ Configure FortiAP regions (for floor plans and maps). The following arguments are supported: -* `name` - (Required) FortiAP region name. +* `name` - FortiAP region name. * `image_type` - FortiAP region image type (png|jpeg|gif). * `comments` - Comments. * `grayscale` - Region image grayscale. diff --git a/website/docs/r/fortios_wirelesscontroller_utmprofile.html.markdown b/website/docs/r/fortios_wirelesscontroller_utmprofile.html.markdown index 4f3d583d7..9322d7b79 100644 --- a/website/docs/r/fortios_wirelesscontroller_utmprofile.html.markdown +++ b/website/docs/r/fortios_wirelesscontroller_utmprofile.html.markdown @@ -13,7 +13,7 @@ Configure UTM (Unified Threat Management) profile. The following arguments are supported: -* `name` - (Required) UTM profile name. +* `name` - UTM profile name. * `comment` - Comment. * `utm_log` - Enable/disable UTM logging. * `ips_sensor` - IPS sensor name. diff --git a/website/docs/r/fortios_wirelesscontroller_widsprofile.html.markdown b/website/docs/r/fortios_wirelesscontroller_widsprofile.html.markdown index 21b99380e..04cb6cced 100644 --- a/website/docs/r/fortios_wirelesscontroller_widsprofile.html.markdown +++ b/website/docs/r/fortios_wirelesscontroller_widsprofile.html.markdown @@ -13,7 +13,7 @@ Configure wireless intrusion detection system (WIDS) profiles. The following arguments are supported: -* `name` - (Required) WIDS profile name. +* `name` - WIDS profile name. * `comment` - Comment. * `sensor_mode` - Scan WiFi nearby stations (default = disable). * `ap_scan` - Enable/disable rogue AP detection. diff --git a/website/docs/r/fortios_wirelesscontroller_wtp.html.markdown b/website/docs/r/fortios_wirelesscontroller_wtp.html.markdown index eeb2cdde5..9690da7f9 100644 --- a/website/docs/r/fortios_wirelesscontroller_wtp.html.markdown +++ b/website/docs/r/fortios_wirelesscontroller_wtp.html.markdown @@ -13,7 +13,7 @@ Configure Wireless Termination Points (WTPs), that is, FortiAPs or APs to be man The following arguments are supported: -* `wtp_id` - (Required) WTP ID. +* `wtp_id` - WTP ID. * `index` - Index (0 - 4294967295). * `admin` - Configure how the FortiGate operating as a wireless controller discovers and manages this WTP, AP or FortiAP. * `name` - WTP, AP or FortiAP configuration name. diff --git a/website/docs/r/fortios_wirelesscontroller_wtpgroup.html.markdown b/website/docs/r/fortios_wirelesscontroller_wtpgroup.html.markdown index e4bab151e..14db42ff7 100644 --- a/website/docs/r/fortios_wirelesscontroller_wtpgroup.html.markdown +++ b/website/docs/r/fortios_wirelesscontroller_wtpgroup.html.markdown @@ -13,7 +13,7 @@ Configure WTP groups. The following arguments are supported: -* `name` - (Required) WTP group name. +* `name` - WTP group name. * `platform_type` - FortiAP models to define the WTP group platform type. * `wtps` - WTP list. The structure of `wtps` block is documented below. diff --git a/website/docs/r/fortios_wirelesscontroller_wtpprofile.html.markdown b/website/docs/r/fortios_wirelesscontroller_wtpprofile.html.markdown index e13ca123a..71895f7bd 100644 --- a/website/docs/r/fortios_wirelesscontroller_wtpprofile.html.markdown +++ b/website/docs/r/fortios_wirelesscontroller_wtpprofile.html.markdown @@ -13,7 +13,7 @@ Configure WTP profiles or FortiAP profiles that define radio settings for manage The following arguments are supported: -* `name` - (Required) WTP (or FortiAP or AP) profile name. +* `name` - WTP (or FortiAP or AP) profile name. * `comment` - Comment. * `platform` - WTP, FortiAP, or AP platform. The structure of `platform` block is documented below. * `control_message_offload` - Enable/disable CAPWAP control message data channel offload. diff --git a/website/docs/r/fortios_wirelesscontrollerhotspot20_anqp3gppcellular.html.markdown b/website/docs/r/fortios_wirelesscontrollerhotspot20_anqp3gppcellular.html.markdown index fdc9613ff..a2d679caa 100644 --- a/website/docs/r/fortios_wirelesscontrollerhotspot20_anqp3gppcellular.html.markdown +++ b/website/docs/r/fortios_wirelesscontrollerhotspot20_anqp3gppcellular.html.markdown @@ -21,7 +21,7 @@ resource "fortios_wirelesscontrollerhotspot20_anqp3gppcellular" "trname" { The following arguments are supported: -* `name` - (Required) 3GPP PLMN name. +* `name` - 3GPP PLMN name. * `mcc_mnc_list` - Mobile Country Code and Mobile Network Code configuration. The structure of `mcc_mnc_list` block is documented below. The `mcc_mnc_list` block supports: diff --git a/website/docs/r/fortios_wirelesscontrollerhotspot20_anqpipaddresstype.html.markdown b/website/docs/r/fortios_wirelesscontrollerhotspot20_anqpipaddresstype.html.markdown index f2d128d73..8b6a55748 100644 --- a/website/docs/r/fortios_wirelesscontrollerhotspot20_anqpipaddresstype.html.markdown +++ b/website/docs/r/fortios_wirelesscontrollerhotspot20_anqpipaddresstype.html.markdown @@ -23,7 +23,7 @@ resource "fortios_wirelesscontrollerhotspot20_anqpipaddresstype" "trname" { The following arguments are supported: -* `name` - (Required) IP type name. +* `name` - IP type name. * `ipv6_address_type` - IPv6 address type. * `ipv4_address_type` - IPv4 address type. diff --git a/website/docs/r/fortios_wirelesscontrollerhotspot20_anqpnairealm.html.markdown b/website/docs/r/fortios_wirelesscontrollerhotspot20_anqpnairealm.html.markdown index 13c77d24b..940309682 100644 --- a/website/docs/r/fortios_wirelesscontrollerhotspot20_anqpnairealm.html.markdown +++ b/website/docs/r/fortios_wirelesscontrollerhotspot20_anqpnairealm.html.markdown @@ -13,7 +13,7 @@ Configure network access identifier (NAI) realm. The following arguments are supported: -* `name` - (Required) NAI realm list name. +* `name` - NAI realm list name. * `nai_list` - NAI list. The structure of `nai_list` block is documented below. The `nai_list` block supports: diff --git a/website/docs/r/fortios_wirelesscontrollerhotspot20_anqpnetworkauthtype.html.markdown b/website/docs/r/fortios_wirelesscontrollerhotspot20_anqpnetworkauthtype.html.markdown index f390bf2d1..da5958f27 100644 --- a/website/docs/r/fortios_wirelesscontrollerhotspot20_anqpnetworkauthtype.html.markdown +++ b/website/docs/r/fortios_wirelesscontrollerhotspot20_anqpnetworkauthtype.html.markdown @@ -23,7 +23,7 @@ resource "fortios_wirelesscontrollerhotspot20_anqpnetworkauthtype" "trname" { The following arguments are supported: -* `name` - (Required) Authentication type name. +* `name` - Authentication type name. * `auth_type` - Network authentication type. * `url` - Redirect URL. diff --git a/website/docs/r/fortios_wirelesscontrollerhotspot20_anqproamingconsortium.html.markdown b/website/docs/r/fortios_wirelesscontrollerhotspot20_anqproamingconsortium.html.markdown index b09329811..c98db4c51 100644 --- a/website/docs/r/fortios_wirelesscontrollerhotspot20_anqproamingconsortium.html.markdown +++ b/website/docs/r/fortios_wirelesscontrollerhotspot20_anqproamingconsortium.html.markdown @@ -21,7 +21,7 @@ resource "fortios_wirelesscontrollerhotspot20_anqproamingconsortium" "trname" { The following arguments are supported: -* `name` - (Required) Roaming consortium name. +* `name` - Roaming consortium name. * `oi_list` - Organization identifier list. The structure of `oi_list` block is documented below. The `oi_list` block supports: diff --git a/website/docs/r/fortios_wirelesscontrollerhotspot20_anqpvenuename.html.markdown b/website/docs/r/fortios_wirelesscontrollerhotspot20_anqpvenuename.html.markdown index 658ca6167..e0f2286c9 100644 --- a/website/docs/r/fortios_wirelesscontrollerhotspot20_anqpvenuename.html.markdown +++ b/website/docs/r/fortios_wirelesscontrollerhotspot20_anqpvenuename.html.markdown @@ -26,7 +26,7 @@ resource "fortios_wirelesscontrollerhotspot20_anqpvenuename" "trname" { The following arguments are supported: -* `name` - (Required) Name of venue name duple. +* `name` - Name of venue name duple. * `value_list` - Name list. The structure of `value_list` block is documented below. The `value_list` block supports: diff --git a/website/docs/r/fortios_wirelesscontrollerhotspot20_h2qpconncapability.html.markdown b/website/docs/r/fortios_wirelesscontrollerhotspot20_h2qpconncapability.html.markdown index 4cd5c1f8b..dda434d08 100644 --- a/website/docs/r/fortios_wirelesscontrollerhotspot20_h2qpconncapability.html.markdown +++ b/website/docs/r/fortios_wirelesscontrollerhotspot20_h2qpconncapability.html.markdown @@ -32,7 +32,7 @@ resource "fortios_wirelesscontrollerhotspot20_h2qpconncapability" "trname" { The following arguments are supported: -* `name` - (Required) Connection capability name. +* `name` - Connection capability name. * `icmp_port` - Set ICMP port service status. * `ftp_port` - Set FTP port service status. * `ssh_port` - Set SSH port service status. diff --git a/website/docs/r/fortios_wirelesscontrollerhotspot20_h2qpoperatorname.html.markdown b/website/docs/r/fortios_wirelesscontrollerhotspot20_h2qpoperatorname.html.markdown index f67cf3e16..b0faf4308 100644 --- a/website/docs/r/fortios_wirelesscontrollerhotspot20_h2qpoperatorname.html.markdown +++ b/website/docs/r/fortios_wirelesscontrollerhotspot20_h2qpoperatorname.html.markdown @@ -21,7 +21,7 @@ resource "fortios_wirelesscontrollerhotspot20_h2qpoperatorname" "trname" { The following arguments are supported: -* `name` - (Required) Friendly name ID. +* `name` - Friendly name ID. * `value_list` - Name list. The structure of `value_list` block is documented below. The `value_list` block supports: diff --git a/website/docs/r/fortios_wirelesscontrollerhotspot20_h2qposuprovider.html.markdown b/website/docs/r/fortios_wirelesscontrollerhotspot20_h2qposuprovider.html.markdown index cc34cf919..046e1109f 100644 --- a/website/docs/r/fortios_wirelesscontrollerhotspot20_h2qposuprovider.html.markdown +++ b/website/docs/r/fortios_wirelesscontrollerhotspot20_h2qposuprovider.html.markdown @@ -13,7 +13,7 @@ Configure online sign up (OSU) provider list. The following arguments are supported: -* `name` - (Required) OSU provider ID. +* `name` - OSU provider ID. * `friendly_name` - OSU provider friendly name. The structure of `friendly_name` block is documented below. * `server_uri` - Server URI. * `osu_method` - OSU method list. diff --git a/website/docs/r/fortios_wirelesscontrollerhotspot20_h2qpwanmetric.html.markdown b/website/docs/r/fortios_wirelesscontrollerhotspot20_h2qpwanmetric.html.markdown index 6e6dcad09..ad0f833aa 100644 --- a/website/docs/r/fortios_wirelesscontrollerhotspot20_h2qpwanmetric.html.markdown +++ b/website/docs/r/fortios_wirelesscontrollerhotspot20_h2qpwanmetric.html.markdown @@ -29,7 +29,7 @@ resource "fortios_wirelesscontrollerhotspot20_h2qpwanmetric" "trname" { The following arguments are supported: -* `name` - (Required) WAN metric name. +* `name` - WAN metric name. * `link_status` - Link status. * `symmetric_wan_link` - WAN link symmetry. * `link_at_capacity` - Link at capacity. diff --git a/website/docs/r/fortios_wirelesscontrollerhotspot20_hsprofile.html.markdown b/website/docs/r/fortios_wirelesscontrollerhotspot20_hsprofile.html.markdown index edec4fa64..658d0d875 100644 --- a/website/docs/r/fortios_wirelesscontrollerhotspot20_hsprofile.html.markdown +++ b/website/docs/r/fortios_wirelesscontrollerhotspot20_hsprofile.html.markdown @@ -13,7 +13,7 @@ Configure hotspot profile. The following arguments are supported: -* `name` - (Required) Hotspot profile name. +* `name` - Hotspot profile name. * `access_network_type` - Access network type. * `access_network_internet` - Enable/disable connectivity to the Internet. * `access_network_asra` - Enable/disable additional step required for access (ASRA). diff --git a/website/docs/r/fortios_wirelesscontrollerhotspot20_icon.html.markdown b/website/docs/r/fortios_wirelesscontrollerhotspot20_icon.html.markdown index 827cb3be2..29b91a777 100644 --- a/website/docs/r/fortios_wirelesscontrollerhotspot20_icon.html.markdown +++ b/website/docs/r/fortios_wirelesscontrollerhotspot20_icon.html.markdown @@ -21,7 +21,7 @@ resource "fortios_wirelesscontrollerhotspot20_icon" "trname" { The following arguments are supported: -* `name` - (Required) Icon list ID. +* `name` - Icon list ID. * `icon_list` - Icon list. The structure of `icon_list` block is documented below. The `icon_list` block supports: diff --git a/website/docs/r/fortios_wirelesscontrollerhotspot20_qosmap.html.markdown b/website/docs/r/fortios_wirelesscontrollerhotspot20_qosmap.html.markdown index 775360645..94b1b91bd 100644 --- a/website/docs/r/fortios_wirelesscontrollerhotspot20_qosmap.html.markdown +++ b/website/docs/r/fortios_wirelesscontrollerhotspot20_qosmap.html.markdown @@ -13,7 +13,7 @@ Configure QoS map set. The following arguments are supported: -* `name` - (Required) QOS-MAP name. +* `name` - QOS-MAP name. * `dscp_except` - Differentiated Services Code Point (DSCP) exceptions. The structure of `dscp_except` block is documented below. * `dscp_range` - Differentiated Services Code Point (DSCP) ranges. The structure of `dscp_range` block is documented below.