summaryrefslogtreecommitdiffstats
path: root/ansible_collections/cisco/ise/plugins/action/ipsec.py
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-06-05 16:18:41 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-06-05 16:18:41 +0000
commitb643c52cf29ce5bbab738b43290af3556efa1ca9 (patch)
tree21d5c53d7a9b696627a255777cefdf6f78968824 /ansible_collections/cisco/ise/plugins/action/ipsec.py
parentReleasing progress-linux version 9.5.1+dfsg-1~progress7.99u1. (diff)
downloadansible-b643c52cf29ce5bbab738b43290af3556efa1ca9.tar.xz
ansible-b643c52cf29ce5bbab738b43290af3556efa1ca9.zip
Merging upstream version 10.0.0+dfsg.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'ansible_collections/cisco/ise/plugins/action/ipsec.py')
-rw-r--r--ansible_collections/cisco/ise/plugins/action/ipsec.py257
1 files changed, 257 insertions, 0 deletions
diff --git a/ansible_collections/cisco/ise/plugins/action/ipsec.py b/ansible_collections/cisco/ise/plugins/action/ipsec.py
new file mode 100644
index 000000000..f435fa5ca
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/action/ipsec.py
@@ -0,0 +1,257 @@
+#!/usr/bin/env python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2024, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+from __future__ import absolute_import, division, print_function
+
+__metaclass__ = type
+from ansible.plugins.action import ActionBase
+
+try:
+ from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
+ AnsibleArgSpecValidator,
+ )
+except ImportError:
+ ANSIBLE_UTILS_IS_INSTALLED = False
+else:
+ ANSIBLE_UTILS_IS_INSTALLED = True
+from ansible.errors import AnsibleActionFail
+from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
+ ISESDK,
+ ise_argument_spec,
+ ise_compare_equality,
+ get_dict_result,
+)
+from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import (
+ InconsistentParameters,
+)
+
+# Get common arguments specification
+argument_spec = ise_argument_spec()
+# Add arguments specific for this module
+argument_spec.update(dict(
+ state=dict(type="str", default="present", choices=["present"]),
+ authType=dict(type="str"),
+ certId=dict(type="str"),
+ configureVti=dict(type="bool"),
+ espAhProtocol=dict(type="str"),
+ hostName=dict(type="str"),
+ iface=dict(type="str"),
+ ikeReAuthTime=dict(type="int"),
+ ikeVersion=dict(type="str"),
+ localInternalIp=dict(type="str"),
+ modeOption=dict(type="str"),
+ nadIp=dict(type="str"),
+ phaseOneDHGroup=dict(type="str"),
+ phaseOneEncryptionAlgo=dict(type="str"),
+ phaseOneHashAlgo=dict(type="str"),
+ phaseOneLifeTime=dict(type="int"),
+ phaseTwoDHGroup=dict(type="str"),
+ phaseTwoEncryptionAlgo=dict(type="str"),
+ phaseTwoHashAlgo=dict(type="str"),
+ phaseTwoLifeTime=dict(type="int"),
+ psk=dict(type="str"),
+ remotePeerInternalIp=dict(type="str"),
+))
+
+required_if = [
+ ("state", "present", [], True),
+]
+required_one_of = []
+mutually_exclusive = []
+required_together = []
+
+
+class Ipsec(object):
+ def __init__(self, params, ise):
+ self.ise = ise
+ self.new_object = dict(
+ auth_type=params.get("authType"),
+ cert_id=params.get("certId"),
+ configure_vti=params.get("configureVti"),
+ esp_ah_protocol=params.get("espAhProtocol"),
+ host_name=params.get("hostName"),
+ iface=params.get("iface"),
+ ike_re_auth_time=params.get("ikeReAuthTime"),
+ ike_version=params.get("ikeVersion"),
+ local_internal_ip=params.get("localInternalIp"),
+ mode_option=params.get("modeOption"),
+ nad_ip=params.get("nadIp"),
+ phase_one_dhgroup=params.get("phaseOneDHGroup"),
+ phase_one_encryption_algo=params.get("phaseOneEncryptionAlgo"),
+ phase_one_hash_algo=params.get("phaseOneHashAlgo"),
+ phase_one_life_time=params.get("phaseOneLifeTime"),
+ phase_two_dhgroup=params.get("phaseTwoDHGroup"),
+ phase_two_encryption_algo=params.get("phaseTwoEncryptionAlgo"),
+ phase_two_hash_algo=params.get("phaseTwoHashAlgo"),
+ phase_two_life_time=params.get("phaseTwoLifeTime"),
+ psk=params.get("psk"),
+ remote_peer_internal_ip=params.get("remotePeerInternalIp"),
+ )
+
+ def get_object_by_name(self, name):
+ # NOTICE: Get does not support/work for filter by name with EQ
+ result = None
+ gen_items_responses = self.ise.exec(
+ family="native_ipsec",
+ function="get_ipsec_enabled_nodes_generator"
+ )
+ try:
+ for items_response in gen_items_responses:
+ items = items_response.response.get('response', [])
+ result = get_dict_result(items, 'name', name)
+ if result:
+ return result
+ except (TypeError, AttributeError) as e:
+ self.ise.fail_json(
+ msg=(
+ "An error occured when executing operation."
+ " Check the configuration of your API Settings and API Gateway settings on your ISE server."
+ " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled."
+ " You may want to enable the (ise_debug: True) argument."
+ " The error was: {error}"
+ ).format(error=e)
+ )
+ except Exception:
+ result = None
+ return result
+ return result
+
+ def get_object_by_id(self, id):
+ # NOTICE: Does not have a get by id method or it is in another action
+ result = None
+ return result
+
+ def exists(self):
+ prev_obj = None
+ id_exists = False
+ name_exists = False
+ o_id = self.new_object.get("id")
+ name = self.new_object.get("name")
+ if o_id:
+ prev_obj = self.get_object_by_id(o_id)
+ id_exists = prev_obj is not None and isinstance(prev_obj, dict)
+ if not id_exists and name:
+ prev_obj = self.get_object_by_name(name)
+ name_exists = prev_obj is not None and isinstance(prev_obj, dict)
+ if name_exists:
+ _id = prev_obj.get("id")
+ if id_exists and name_exists and o_id != _id:
+ raise InconsistentParameters("The 'id' and 'name' params don't refer to the same object")
+ it_exists = prev_obj is not None and isinstance(prev_obj, dict)
+ return (it_exists, prev_obj)
+
+ def requires_update(self, current_obj):
+ requested_obj = self.new_object
+
+ obj_params = [
+ ("authType", "auth_type"),
+ ("certId", "cert_id"),
+ ("configureVti", "configure_vti"),
+ ("espAhProtocol", "esp_ah_protocol"),
+ ("hostName", "host_name"),
+ ("iface", "iface"),
+ ("ikeReAuthTime", "ike_re_auth_time"),
+ ("ikeVersion", "ike_version"),
+ ("localInternalIp", "local_internal_ip"),
+ ("modeOption", "mode_option"),
+ ("nadIp", "nad_ip"),
+ ("phaseOneDHGroup", "phase_one_dhgroup"),
+ ("phaseOneEncryptionAlgo", "phase_one_encryption_algo"),
+ ("phaseOneHashAlgo", "phase_one_hash_algo"),
+ ("phaseOneLifeTime", "phase_one_life_time"),
+ ("phaseTwoDHGroup", "phase_two_dhgroup"),
+ ("phaseTwoEncryptionAlgo", "phase_two_encryption_algo"),
+ ("phaseTwoHashAlgo", "phase_two_hash_algo"),
+ ("phaseTwoLifeTime", "phase_two_life_time"),
+ ("psk", "psk"),
+ ("remotePeerInternalIp", "remote_peer_internal_ip"),
+ ]
+ # Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params
+ # If any does not have eq params, it requires update
+ return any(not ise_compare_equality(current_obj.get(ise_param),
+ requested_obj.get(ansible_param))
+ for (ise_param, ansible_param) in obj_params)
+
+ def create(self):
+ result = self.ise.exec(
+ family="native_ipsec",
+ function="create_ipsec_connection",
+ params=self.new_object,
+ ).response
+ return result
+
+ def update(self):
+ id = self.new_object.get("id")
+ name = self.new_object.get("name")
+ result = None
+ result = self.ise.exec(
+ family="native_ipsec",
+ function="update_ipsec_connection_config",
+ params=self.new_object
+ ).response
+ return result
+
+
+class ActionModule(ActionBase):
+ def __init__(self, *args, **kwargs):
+ if not ANSIBLE_UTILS_IS_INSTALLED:
+ raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
+ super(ActionModule, self).__init__(*args, **kwargs)
+ self._supports_async = False
+ self._supports_check_mode = False
+ self._result = None
+
+ # Checks the supplied parameters against the argument spec for this module
+ def _check_argspec(self):
+ aav = AnsibleArgSpecValidator(
+ data=self._task.args,
+ schema=dict(argument_spec=argument_spec),
+ schema_format="argspec",
+ schema_conditionals=dict(
+ required_if=required_if,
+ required_one_of=required_one_of,
+ mutually_exclusive=mutually_exclusive,
+ required_together=required_together,
+ ),
+ name=self._task.action,
+ )
+ valid, errors, self._task.args = aav.validate()
+ if not valid:
+ raise AnsibleActionFail(errors)
+
+ def run(self, tmp=None, task_vars=None):
+ self._task.diff = False
+ self._result = super(ActionModule, self).run(tmp, task_vars)
+ self._result["changed"] = False
+ self._check_argspec()
+
+ ise = ISESDK(params=self._task.args)
+ obj = Ipsec(self._task.args, ise)
+
+ state = self._task.args.get("state")
+
+ response = None
+ if state == "present":
+ (obj_exists, prev_obj) = obj.exists()
+ if obj_exists:
+ if obj.requires_update(prev_obj):
+ ise_update_response = obj.update()
+ self._result.update(dict(ise_update_response=ise_update_response))
+ (obj_exists, updated_obj) = obj.exists()
+ response = updated_obj
+ ise.object_updated()
+ else:
+ response = prev_obj
+ ise.object_already_present()
+ else:
+ ise_create_response = obj.create()
+ (obj_exists, created_obj) = obj.exists()
+ response = created_obj
+ ise.object_created()
+
+ self._result.update(dict(ise_response=response))
+ self._result.update(ise.exit_json())
+ return self._result