summaryrefslogtreecommitdiffstats
path: root/ansible_collections/cisco/ise/plugins
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-18 05:52:22 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-18 05:52:22 +0000
commit38b7c80217c4e72b1d8988eb1e60bb6e77334114 (patch)
tree356e9fd3762877d07cde52d21e77070aeff7e789 /ansible_collections/cisco/ise/plugins
parentAdding upstream version 7.7.0+dfsg. (diff)
downloadansible-38b7c80217c4e72b1d8988eb1e60bb6e77334114.tar.xz
ansible-38b7c80217c4e72b1d8988eb1e60bb6e77334114.zip
Adding upstream version 9.4.0+dfsg.upstream/9.4.0+dfsg
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'ansible_collections/cisco/ise/plugins')
-rw-r--r--ansible_collections/cisco/ise/plugins/.DS_Storebin0 -> 8196 bytes
-rw-r--r--ansible_collections/cisco/ise/plugins/action/active_directory_groups_by_domain_info.py19
-rw-r--r--ansible_collections/cisco/ise/plugins/action/configuration.py (renamed from ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping.py)141
-rw-r--r--ansible_collections/cisco/ise/plugins/action/configuration_info.py90
-rw-r--r--ansible_collections/cisco/ise/plugins/action/connector_config.py (renamed from ansible_collections/cisco/ise/plugins/action/trustsec_vn.py)126
-rw-r--r--ansible_collections/cisco/ise/plugins/action/connector_config_info.py101
-rw-r--r--ansible_collections/cisco/ise/plugins/action/dataconnect_info.py90
-rw-r--r--ansible_collections/cisco/ise/plugins/action/dataconnect_settings_info.py90
-rw-r--r--ansible_collections/cisco/ise/plugins/action/dataconnect_settings_password.py (renamed from ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_create.py)8
-rw-r--r--ansible_collections/cisco/ise/plugins/action/dataconnect_settings_password_expiry.py (renamed from ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_update.py)8
-rw-r--r--ansible_collections/cisco/ise/plugins/action/dataconnect_settings_status.py (renamed from ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_delete.py)8
-rw-r--r--ansible_collections/cisco/ise/plugins/action/device_administration_authentication_rules.py4
-rw-r--r--ansible_collections/cisco/ise/plugins/action/device_administration_authorization_rules.py1
-rw-r--r--ansible_collections/cisco/ise/plugins/action/device_administration_conditions.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/action/device_administration_global_exception_rules.py1
-rw-r--r--ansible_collections/cisco/ise/plugins/action/device_administration_local_exception_rules.py1
-rw-r--r--ansible_collections/cisco/ise/plugins/action/device_administration_network_conditions.py18
-rw-r--r--ansible_collections/cisco/ise/plugins/action/device_administration_time_date_conditions.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/action/dictionary_references_info.py90
-rw-r--r--ansible_collections/cisco/ise/plugins/action/endpoint.py16
-rw-r--r--ansible_collections/cisco/ise/plugins/action/filter_policy.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/action/mnt_session_active_count_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/action/network_access_authentication_rules.py4
-rw-r--r--ansible_collections/cisco/ise/plugins/action/network_access_authorization_rules.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/action/network_access_conditions.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/action/network_access_global_exception_rules.py1
-rw-r--r--ansible_collections/cisco/ise/plugins/action/network_access_local_exception_rules.py1
-rw-r--r--ansible_collections/cisco/ise/plugins/action/network_access_time_date_conditions.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/action/network_device_group.py6
-rw-r--r--ansible_collections/cisco/ise/plugins/action/node_primary_to_standalone.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/action/node_secondary_to_primary.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/action/node_services_profiler_probe_config.py1
-rw-r--r--ansible_collections/cisco/ise/plugins/action/node_standalone_to_primary.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/action/personas_check_standalone.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/action/personas_export_certs.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/action/personas_promote_primary.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/action/personas_register_node.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/action/personas_update_roles_services.py4
-rw-r--r--ansible_collections/cisco/ise/plugins/action/rest_id_store.py5
-rw-r--r--ansible_collections/cisco/ise/plugins/action/subscriber.py (renamed from ansible_collections/cisco/ise/plugins/action/trustsec_nbar_app.py)76
-rw-r--r--ansible_collections/cisco/ise/plugins/action/subscriber_bulk.py (renamed from ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_create.py)12
-rw-r--r--ansible_collections/cisco/ise/plugins/action/subscriber_imsi_info.py98
-rw-r--r--ansible_collections/cisco/ise/plugins/action/subscriber_info.py (renamed from ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_info.py)24
-rw-r--r--ansible_collections/cisco/ise/plugins/action/system_certificate.py16
-rw-r--r--ansible_collections/cisco/ise/plugins/action/test_connector.py98
-rw-r--r--ansible_collections/cisco/ise/plugins/action/trustsec_nbar_app_info.py141
-rw-r--r--ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping.py267
-rw-r--r--ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_delete.py88
-rw-r--r--ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_update.py88
-rw-r--r--ansible_collections/cisco/ise/plugins/action/trustsec_vn_info.py141
-rw-r--r--ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_create.py88
-rw-r--r--ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py88
-rw-r--r--ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_update.py88
-rw-r--r--ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_info.py141
-rw-r--r--ansible_collections/cisco/ise/plugins/doc_fragments/module.py6
-rw-r--r--ansible_collections/cisco/ise/plugins/doc_fragments/module_info.py6
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/aci_bindings_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/aci_settings.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/aci_settings_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/aci_test_connectivity.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/active_directory.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/active_directory_add_groups.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/active_directory_groups_by_domain_info.py4
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/active_directory_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/active_directory_is_user_member_of_group_info.py4
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain_with_all_nodes.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain_with_all_nodes.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/active_directory_trusted_domains_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/active_directory_user_groups_info.py4
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/admin_user_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/allowed_protocols.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/allowed_protocols_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/anc_endpoint_apply.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/anc_endpoint_clear.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/anc_endpoint_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/anc_policy.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/anc_policy_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/authorization_profile.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/authorization_profile_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/backup_cancel.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/backup_config.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/backup_last_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/backup_restore.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/backup_schedule_config.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/backup_schedule_config_update.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/bind_signed_certificate.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/byod_portal.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/byod_portal_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/certificate_profile.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/certificate_profile_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/certificate_template_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/configuration.py71
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/configuration_info.py51
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/connector_config.py305
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/connector_config_info.py111
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/csr_delete.py4
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/csr_export_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/csr_generate.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/csr_generate_intermediate_ca.py4
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/csr_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/dataconnect_info.py54
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_info.py54
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password.py60
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password_expiry.py57
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_status.py (renamed from ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_delete.py)38
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/deployment_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_reset_hitcount.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules.py46
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules_info.py4
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_reset_hitcount.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules.py39
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_command_set_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_conditions.py40
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authentication_rule_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authorization_rule_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_policy_set_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authentication_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authorization_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_policy_set_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules.py39
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_reset_hitcount.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_identity_stores_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules.py39
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_reset_hitcount.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions.py231
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions_info.py43
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set.py39
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_reset_hitcount.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_profiles_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_service_names_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions.py37
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/dictionary_references_info.py49
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/downloadable_acl.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/downloadable_acl_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clear_all.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clone.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_set_all_status.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/endpoint.py4
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/endpoint_certificate.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/endpoint_deregister.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/endpoint_get_rejected_endpoints_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/endpoint_group.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/endpoint_group_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/endpoint_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/endpoint_register.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/endpoint_release_rejected_endpoint.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/external_radius_server.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/external_radius_server_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/filter_policy.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/filter_policy_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_location_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_ssid.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_ssid_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_type.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_type_email.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_type_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_type_sms.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_user.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_user_approve.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_user_change_sponsor_password.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_user_deny.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_user_email.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_user_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_user_reinstate.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_user_reset_password.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_user_sms.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_user_suspend.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/hotpatch_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/hotpatch_install.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/hotpatch_rollback.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/hotspot_portal.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/hotspot_portal_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/id_store_sequence.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/id_store_sequence_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/identity_group.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/identity_group_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/internal_user.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/internal_user_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/ise_root_ca_regenerate.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/licensing_connection_type_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/licensing_eval_license_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/licensing_feature_to_tier_mapping_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/licensing_registration_create.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/licensing_registration_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_create.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_create.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_account_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_athentication_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_authentication_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_failure_reasons_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_session_active_count_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_session_active_list_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_session_auth_list_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_session_by_ip_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_session_by_mac_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_session_by_nas_ip_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_session_by_username_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_session_delete_all.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_session_disconnect_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_session_posture_count_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_session_profiler_count_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_session_reauthentication_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_sessions_by_session_id_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_version_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/my_device_portal.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/my_device_portal_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules.py46
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_info.py4
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_reset_hitcount.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules.py39
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_reset_hitcount.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_conditions.py40
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authentication_rule_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authorization_rule_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_policy_set_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_conditions_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_dictionary.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authentication_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authorization_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_policy_set_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules.py39
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_reset_hitcount.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_identity_stores_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules.py39
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_reset_hitcounts.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_network_condition.py10
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_network_condition_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_policy_set.py39
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_reset_hitcount.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_profiles_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_security_groups_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_service_name_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions.py37
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_device.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_device_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_device_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_device_group.py12
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_device_group_info.py6
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_device_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_deployment.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_deployment_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_deployment_sync.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_group.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_group_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_group_node_create.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_group_node_delete.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_group_node_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_primary_to_standalone.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_promotion.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_replication_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_secondary_to_primary.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_services_interfaces_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_standalone_to_primary.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_sync.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pan_ha.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pan_ha_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pan_ha_update.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/patch_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/patch_install.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/patch_rollback.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/portal_global_setting.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/portal_global_setting_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/portal_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/portal_theme.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/portal_theme_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/profiler_profile_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/px_grid_node_approve.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/px_grid_node_delete.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/px_grid_node_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/px_grid_settings_auto_approve.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_access_secret.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_account_activate.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_account_create.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_authorization.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_bindings_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_matrices_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_policies_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoint_by_mac_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_os_type_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_type_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_failures_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_healths_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_node_approve.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_node_delete.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_node_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_performances_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_profiles_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_security_group_acls_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_security_groups_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_service_lookup.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_service_register.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_service_reregister.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_service_unregister.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_ip_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_mac_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_session_for_recovery_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_sessions_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_settings_auto_approve.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_user_group_by_username_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_user_groups_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/radius_server_sequence.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/radius_server_sequence_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/renew_certificate.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/repository.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/repository_files_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/repository_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/resource_version_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/rest_id_store.py13
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/rest_id_store_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/self_registered_portal.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/self_registered_portal_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/selfsigned_certificate_generate.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/session_service_node_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_acl.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_acl_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_all.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_group.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_all.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sgt.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sgt_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sgt_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sgt_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sms_provider_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sponsor_group.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sponsor_group_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sponsor_group_member_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sponsor_portal.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sponsor_portal_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/subscriber.py150
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/subscriber_bulk.py92
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/subscriber_imsi_info.py69
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/subscriber_info.py (renamed from ansible_collections/cisco/ise/plugins/modules/trustsec_vn_info.py)108
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/support_bundle.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/support_bundle_download.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/support_bundle_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sxp_connections.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sxp_connections_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sxp_vpns.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sxp_vpns_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/system_certificate.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/system_certificate_create.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/system_certificate_export_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/system_certificate_import.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/system_certificate_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/system_config_version_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/tacacs_profile.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/tacacs_profile_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/tasks_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/telemetry_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/test_connector.py87
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/threat_vulnerabilities_clear.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trusted_certificate.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trusted_certificate_export_info.py4
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trusted_certificate_import.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trusted_certificate_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app.py130
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app_info.py151
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping.py130
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_create.py87
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_delete.py59
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_update.py87
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_info.py145
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_vn.py113
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_create.py75
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_update.py75
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping.py139
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_create.py93
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_delete.py59
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_update.py93
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_info.py149
-rw-r--r--ansible_collections/cisco/ise/plugins/plugin_utils/ise.py6
-rw-r--r--ansible_collections/cisco/ise/plugins/plugin_utils/personas_utils.py4
449 files changed, 3029 insertions, 3844 deletions
diff --git a/ansible_collections/cisco/ise/plugins/.DS_Store b/ansible_collections/cisco/ise/plugins/.DS_Store
new file mode 100644
index 000000000..874d3d2c6
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/.DS_Store
Binary files differ
diff --git a/ansible_collections/cisco/ise/plugins/action/active_directory_groups_by_domain_info.py b/ansible_collections/cisco/ise/plugins/action/active_directory_groups_by_domain_info.py
index c303d3b77..76f1adff1 100644
--- a/ansible_collections/cisco/ise/plugins/action/active_directory_groups_by_domain_info.py
+++ b/ansible_collections/cisco/ise/plugins/action/active_directory_groups_by_domain_info.py
@@ -80,15 +80,12 @@ class ActionModule(ActionBase):
self._result.update(dict(ise_response={}))
ise = ISESDK(params=self._task.args)
+ response = ise.exec(
+ family="active_directory",
+ function='get_groups_by_domain',
+ params=self.get_object(self._task.args)
+ ).response['ERSActiveDirectoryGroups']
- id = self._task.args.get("id")
- name = self._task.args.get("name")
- if not name and not id:
- response = ise.exec(
- family="active_directory",
- function='get_groups_by_domain',
- params=self.get_object(self._task.args)
- ).response['ERSActiveDirectoryGroups']
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
+ self._result.update(dict(ise_response=response))
+ self._result.update(ise.exit_json())
+ return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping.py b/ansible_collections/cisco/ise/plugins/action/configuration.py
index b137aa8cc..de3fe1eff 100644
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping.py
+++ b/ansible_collections/cisco/ise/plugins/action/configuration.py
@@ -32,97 +32,46 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import (
argument_spec = ise_argument_spec()
# Add arguments specific for this module
argument_spec.update(dict(
- state=dict(type="str", default="present", choices=["present", "absent"]),
- id=dict(type="str"),
- isData=dict(type="bool"),
- isDefaultVlan=dict(type="bool"),
- lastUpdate=dict(type="str"),
- maxValue=dict(type="int"),
- name=dict(type="str"),
- vnId=dict(type="str"),
- vnName=dict(type="str"),
+ state=dict(type="str", default="present", choices=["present"]),
+ enableEPO=dict(type="bool"),
+ enableRCM=dict(type="bool"),
))
required_if = [
- ("state", "present", ["id", "name"], True),
- ("state", "absent", ["id", "name"], True),
+ ("state", "present", [], True),
]
required_one_of = []
mutually_exclusive = []
required_together = []
-class TrustsecVnVlanMapping(object):
+class Configuration(object):
def __init__(self, params, ise):
self.ise = ise
self.new_object = dict(
- id=params.get("id"),
- is_data=params.get("isData"),
- is_default_vlan=params.get("isDefaultVlan"),
- last_update=params.get("lastUpdate"),
- max_value=params.get("maxValue"),
- name=params.get("name"),
- vn_id=params.get("vnId"),
- vn_name=params.get("vnName"),
+ enable_epo=params.get("enableEPO"),
+ enable_rcm=params.get("enableRCM"),
)
def get_object_by_name(self, name):
- # NOTICE: Get does not support/work for filter by name with EQ
+ # NOTICE: Does not have a get by name method or it is in another action
result = None
- gen_items_responses = self.ise.exec(
- family="vn_vlan_mapping",
- function="get_vn_vlan_mappings_generator",
- params={"filter": "name.EQ.{name}".format(name=name)}
- )
- try:
- for items_response in gen_items_responses:
- items = items_response.response['response']
- result = get_dict_result(items, 'name', name)
- if result:
- return result
- except (TypeError, AttributeError) as e:
- self.ise.fail_json(
- msg=(
- "An error occured when executing operation."
- " Check the configuration of your API Settings and API Gateway settings on your ISE server."
- " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled."
- " You may want to enable the (ise_debug: True) argument."
- " The error was: {error}"
- ).format(error=e)
- )
- except Exception:
- result = None
- return result
+ items = self.ise.exec(
+ family="configuration",
+ function="get_configuration"
+ ).response
+ result = get_dict_result(items, 'name', name)
return result
def get_object_by_id(self, id):
- try:
- result = self.ise.exec(
- family="vn_vlan_mapping",
- function="get_vn_vlan_mapping_by_id",
- handle_func_exception=False,
- params={"id": id}
- ).response['response']
- except (TypeError, AttributeError) as e:
- self.ise.fail_json(
- msg=(
- "An error occured when executing operation."
- " Check the configuration of your API Settings and API Gateway settings on your ISE server."
- " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled."
- " You may want to enable the (ise_debug: True) argument."
- " The error was: {error}"
- ).format(error=e)
- )
- except Exception:
- result = None
- if isinstance(result, list) and len(result) > 0:
- return result[0]
+ # NOTICE: Does not have a get by id method or it is in another action
+ result = None
return result
def exists(self):
+ prev_obj = None
id_exists = False
name_exists = False
- prev_obj = None
o_id = self.new_object.get("id")
name = self.new_object.get("name")
if o_id:
@@ -135,8 +84,6 @@ class TrustsecVnVlanMapping(object):
_id = prev_obj.get("id")
if id_exists and name_exists and o_id != _id:
raise InconsistentParameters("The 'id' and 'name' params don't refer to the same object")
- if _id:
- prev_obj = self.get_object_by_id(_id)
it_exists = prev_obj is not None and isinstance(prev_obj, dict)
return (it_exists, prev_obj)
@@ -144,14 +91,8 @@ class TrustsecVnVlanMapping(object):
requested_obj = self.new_object
obj_params = [
- ("id", "id"),
- ("isData", "is_data"),
- ("isDefaultVlan", "is_default_vlan"),
- ("lastUpdate", "last_update"),
- ("maxValue", "max_value"),
- ("name", "name"),
- ("vnId", "vn_id"),
- ("vnName", "vn_name"),
+ ("enableEPO", "enable_epo"),
+ ("enableRCM", "enable_rcm"),
]
# Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params
# If any does not have eq params, it requires update
@@ -159,38 +100,13 @@ class TrustsecVnVlanMapping(object):
requested_obj.get(ansible_param))
for (ise_param, ansible_param) in obj_params)
- def create(self):
- result = self.ise.exec(
- family="vn_vlan_mapping",
- function="create_vn_vlan_mapping",
- params=self.new_object,
- ).response
- return result
-
def update(self):
id = self.new_object.get("id")
name = self.new_object.get("name")
result = None
- if not id:
- id_ = self.get_object_by_name(name).get("id")
- self.new_object.update(dict(id=id_))
- result = self.ise.exec(
- family="vn_vlan_mapping",
- function="update_vn_vlan_mapping_by_id",
- params=self.new_object
- ).response
- return result
-
- def delete(self):
- id = self.new_object.get("id")
- name = self.new_object.get("name")
- result = None
- if not id:
- id_ = self.get_object_by_name(name).get("id")
- self.new_object.update(dict(id=id_))
result = self.ise.exec(
- family="vn_vlan_mapping",
- function="delete_vn_vlan_mapping_by_id",
+ family="configuration",
+ function="update_configuration",
params=self.new_object
).response
return result
@@ -230,12 +146,11 @@ class ActionModule(ActionBase):
self._check_argspec()
ise = ISESDK(params=self._task.args)
- obj = TrustsecVnVlanMapping(self._task.args, ise)
+ obj = Configuration(self._task.args, ise)
state = self._task.args.get("state")
response = None
-
if state == "present":
(obj_exists, prev_obj) = obj.exists()
if obj_exists:
@@ -249,19 +164,7 @@ class ActionModule(ActionBase):
response = prev_obj
ise.object_already_present()
else:
- ise_create_response = obj.create()
- (obj_exists, created_obj) = obj.exists()
- response = created_obj
- ise.object_created()
-
- elif state == "absent":
- (obj_exists, prev_obj) = obj.exists()
- if obj_exists:
- obj.delete()
- response = prev_obj
- ise.object_deleted()
- else:
- ise.object_already_absent()
+ ise.fail_json("Object does not exists, plugin only has update")
self._result.update(dict(ise_response=response))
self._result.update(ise.exit_json())
diff --git a/ansible_collections/cisco/ise/plugins/action/configuration_info.py b/ansible_collections/cisco/ise/plugins/action/configuration_info.py
new file mode 100644
index 000000000..d3ed0d5fe
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/action/configuration_info.py
@@ -0,0 +1,90 @@
+#!/usr/bin/env python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+from __future__ import absolute_import, division, print_function
+
+__metaclass__ = type
+from ansible.plugins.action import ActionBase
+
+try:
+ from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
+ AnsibleArgSpecValidator,
+ )
+except ImportError:
+ ANSIBLE_UTILS_IS_INSTALLED = False
+else:
+ ANSIBLE_UTILS_IS_INSTALLED = True
+from ansible.errors import AnsibleActionFail
+from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
+ ISESDK,
+ ise_argument_spec,
+)
+
+# Get common arguements specification
+argument_spec = ise_argument_spec()
+# Add arguments specific for this module
+argument_spec.update(dict(
+))
+
+required_if = []
+required_one_of = []
+mutually_exclusive = []
+required_together = []
+
+
+class ActionModule(ActionBase):
+ def __init__(self, *args, **kwargs):
+ if not ANSIBLE_UTILS_IS_INSTALLED:
+ raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
+ super(ActionModule, self).__init__(*args, **kwargs)
+ self._supports_async = False
+ self._supports_check_mode = True
+ self._result = None
+
+ # Checks the supplied parameters against the argument spec for this module
+ def _check_argspec(self):
+ aav = AnsibleArgSpecValidator(
+ data=self._task.args,
+ schema=dict(argument_spec=argument_spec),
+ schema_format="argspec",
+ schema_conditionals=dict(
+ required_if=required_if,
+ required_one_of=required_one_of,
+ mutually_exclusive=mutually_exclusive,
+ required_together=required_together,
+ ),
+ name=self._task.action,
+ )
+ valid, errors, self._task.args = aav.validate()
+ if not valid:
+ raise AnsibleActionFail(errors)
+
+ def get_object(self, params):
+ new_object = dict(
+ )
+ return new_object
+
+ def run(self, tmp=None, task_vars=None):
+ self._task.diff = False
+ self._result = super(ActionModule, self).run(tmp, task_vars)
+ self._result["changed"] = False
+ self._check_argspec()
+
+ self._result.update(dict(ise_response={}))
+
+ ise = ISESDK(params=self._task.args)
+
+ id = self._task.args.get("id")
+ name = self._task.args.get("name")
+ if not name and not id:
+ response = ise.exec(
+ family="configuration",
+ function='get_configuration',
+ params=self.get_object(self._task.args)
+ ).response
+ self._result.update(dict(ise_response=response))
+ self._result.update(ise.exit_json())
+ return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn.py b/ansible_collections/cisco/ise/plugins/action/connector_config.py
index ff1dd8fd7..8e124b7ed 100644
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn.py
+++ b/ansible_collections/cisco/ise/plugins/action/connector_config.py
@@ -1,7 +1,7 @@
#!/usr/bin/env python
# -*- coding: utf-8 -*-
-# Copyright (c) 2021, Cisco Systems
+# Copyright (c) 2023, Cisco Systems
# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import absolute_import, division, print_function
@@ -33,68 +33,54 @@ argument_spec = ise_argument_spec()
# Add arguments specific for this module
argument_spec.update(dict(
state=dict(type="str", default="present", choices=["present", "absent"]),
- additionalAttributes=dict(type="str"),
- id=dict(type="str"),
- lastUpdate=dict(type="str"),
- name=dict(type="str"),
+ additionalProperties=dict(type="dict"),
+ attributes=dict(type="dict"),
+ connectorName=dict(type="str"),
+ connectorType=dict(type="str"),
+ deltasyncSchedule=dict(type="dict"),
+ description=dict(type="str"),
+ enabled=dict(type="bool"),
+ fullsyncSchedule=dict(type="dict"),
+ protocol=dict(type="str"),
+ skipCertificateValidations=dict(type="bool"),
+ url=dict(type="dict"),
))
required_if = [
- ("state", "present", ["id", "name"], True),
- ("state", "absent", ["id", "name"], True),
+ ("state", "present", ["connectorName"], True),
+ ("state", "absent", ["connectorName"], True),
]
required_one_of = []
mutually_exclusive = []
required_together = []
-class TrustsecVn(object):
+class ConnectorConfig(object):
def __init__(self, params, ise):
self.ise = ise
self.new_object = dict(
- additional_attributes=params.get("additionalAttributes"),
- id=params.get("id"),
- last_update=params.get("lastUpdate"),
- name=params.get("name"),
+ additional_properties=params.get("additionalProperties"),
+ attributes=params.get("attributes"),
+ connector_name=params.get("connectorName"),
+ connector_type=params.get("connectorType"),
+ deltasync_schedule=params.get("deltasyncSchedule"),
+ description=params.get("description"),
+ enabled=params.get("enabled"),
+ fullsync_schedule=params.get("fullsyncSchedule"),
+ protocol=params.get("protocol"),
+ skip_certificate_validations=params.get("skipCertificateValidations"),
+ url=params.get("url"),
)
def get_object_by_name(self, name):
- # NOTICE: Get does not support/work for filter by name with EQ
- result = None
- gen_items_responses = self.ise.exec(
- family="virtual_network",
- function="get_virtual_networks_generator",
- params={"filter": "name.EQ.{name}".format(name=name)}
- )
- try:
- for items_response in gen_items_responses:
- items = items_response.response['response']
- result = get_dict_result(items, 'name', name)
- if result:
- return result
- except (TypeError, AttributeError) as e:
- self.ise.fail_json(
- msg=(
- "An error occured when executing operation."
- " Check the configuration of your API Settings and API Gateway settings on your ISE server."
- " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled."
- " You may want to enable the (ise_debug: True) argument."
- " The error was: {error}"
- ).format(error=e)
- )
- except Exception:
- result = None
- return result
- return result
-
- def get_object_by_id(self, id):
try:
result = self.ise.exec(
- family="virtual_network",
- function="get_virtual_network_by_id",
+ family="edda",
+ function="get_connector_config_by_connector_name",
+ params={"connector_name": name},
handle_func_exception=False,
- params={"id": id}
).response['response']
+ result = get_dict_result(result, 'connectorName', name)
except (TypeError, AttributeError) as e:
self.ise.fail_json(
msg=(
@@ -107,8 +93,11 @@ class TrustsecVn(object):
)
except Exception:
result = None
- if isinstance(result, list) and len(result) > 0:
- return result[0]
+ return result
+
+ def get_object_by_id(self, id):
+ # NOTICE: Does not have a get by id method or it is in another action
+ result = None
return result
def exists(self):
@@ -116,7 +105,7 @@ class TrustsecVn(object):
name_exists = False
prev_obj = None
o_id = self.new_object.get("id")
- name = self.new_object.get("name")
+ name = self.new_object.get("connectorName")
if o_id:
prev_obj = self.get_object_by_id(o_id)
id_exists = prev_obj is not None and isinstance(prev_obj, dict)
@@ -127,8 +116,6 @@ class TrustsecVn(object):
_id = prev_obj.get("id")
if id_exists and name_exists and o_id != _id:
raise InconsistentParameters("The 'id' and 'name' params don't refer to the same object")
- if _id:
- prev_obj = self.get_object_by_id(_id)
it_exists = prev_obj is not None and isinstance(prev_obj, dict)
return (it_exists, prev_obj)
@@ -136,10 +123,17 @@ class TrustsecVn(object):
requested_obj = self.new_object
obj_params = [
- ("additionalAttributes", "additional_attributes"),
- ("id", "id"),
- ("lastUpdate", "last_update"),
- ("name", "name"),
+ ("additionalProperties", "additional_properties"),
+ ("attributes", "attributes"),
+ ("connectorName", "connector_name"),
+ ("connectorType", "connector_type"),
+ ("deltasyncSchedule", "deltasync_schedule"),
+ ("description", "description"),
+ ("enabled", "enabled"),
+ ("fullsyncSchedule", "fullsync_schedule"),
+ ("protocol", "protocol"),
+ ("skipCertificateValidations", "skip_certificate_validations"),
+ ("url", "url"),
]
# Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params
# If any does not have eq params, it requires update
@@ -149,8 +143,8 @@ class TrustsecVn(object):
def create(self):
result = self.ise.exec(
- family="virtual_network",
- function="create_virtual_network",
+ family="edda",
+ function="create_connector_config",
params=self.new_object,
).response
return result
@@ -159,12 +153,12 @@ class TrustsecVn(object):
id = self.new_object.get("id")
name = self.new_object.get("name")
result = None
- if not id:
- id_ = self.get_object_by_name(name).get("id")
- self.new_object.update(dict(id=id_))
+ if not name:
+ name_ = self.get_object_by_id(id).get("name")
+ self.new_object.update(dict(name=name_))
result = self.ise.exec(
- family="virtual_network",
- function="update_virtual_network_by_id",
+ family="edda",
+ function="update_connector_config_by_connector_name",
params=self.new_object
).response
return result
@@ -173,12 +167,12 @@ class TrustsecVn(object):
id = self.new_object.get("id")
name = self.new_object.get("name")
result = None
- if not id:
- id_ = self.get_object_by_name(name).get("id")
- self.new_object.update(dict(id=id_))
+ if not name:
+ name_ = self.get_object_by_id(id).get("name")
+ self.new_object.update(dict(name=name_))
result = self.ise.exec(
- family="virtual_network",
- function="delete_virtual_network_by_id",
+ family="edda",
+ function="delete_connector_config_by_connector_name",
params=self.new_object
).response
return result
@@ -218,7 +212,7 @@ class ActionModule(ActionBase):
self._check_argspec()
ise = ISESDK(params=self._task.args)
- obj = TrustsecVn(self._task.args, ise)
+ obj = ConnectorConfig(self._task.args, ise)
state = self._task.args.get("state")
diff --git a/ansible_collections/cisco/ise/plugins/action/connector_config_info.py b/ansible_collections/cisco/ise/plugins/action/connector_config_info.py
new file mode 100644
index 000000000..05bd40cbe
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/action/connector_config_info.py
@@ -0,0 +1,101 @@
+#!/usr/bin/env python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2023, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+from __future__ import absolute_import, division, print_function
+
+__metaclass__ = type
+from ansible.plugins.action import ActionBase
+
+try:
+ from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
+ AnsibleArgSpecValidator,
+ )
+except ImportError:
+ ANSIBLE_UTILS_IS_INSTALLED = False
+else:
+ ANSIBLE_UTILS_IS_INSTALLED = True
+from ansible.errors import AnsibleActionFail
+from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
+ ISESDK,
+ ise_argument_spec,
+)
+
+# Get common arguements specification
+argument_spec = ise_argument_spec()
+# Add arguments specific for this module
+argument_spec.update(dict(
+ connectorName=dict(type="str"),
+))
+
+required_if = []
+required_one_of = []
+mutually_exclusive = []
+required_together = []
+
+
+class ActionModule(ActionBase):
+ def __init__(self, *args, **kwargs):
+ if not ANSIBLE_UTILS_IS_INSTALLED:
+ raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
+ super(ActionModule, self).__init__(*args, **kwargs)
+ self._supports_async = False
+ self._supports_check_mode = True
+ self._result = None
+
+ # Checks the supplied parameters against the argument spec for this module
+ def _check_argspec(self):
+ aav = AnsibleArgSpecValidator(
+ data=self._task.args,
+ schema=dict(argument_spec=argument_spec),
+ schema_format="argspec",
+ schema_conditionals=dict(
+ required_if=required_if,
+ required_one_of=required_one_of,
+ mutually_exclusive=mutually_exclusive,
+ required_together=required_together,
+ ),
+ name=self._task.action,
+ )
+ valid, errors, self._task.args = aav.validate()
+ if not valid:
+ raise AnsibleActionFail(errors)
+
+ def get_object(self, params):
+ new_object = dict(
+ connector_name=params.get("connectorName"),
+ )
+ return new_object
+
+ def run(self, tmp=None, task_vars=None):
+ self._task.diff = False
+ self._result = super(ActionModule, self).run(tmp, task_vars)
+ self._result["changed"] = False
+ self._check_argspec()
+
+ self._result.update(dict(ise_response={}))
+
+ ise = ISESDK(params=self._task.args)
+
+ id = self._task.args.get("id")
+ name = self._task.args.get("connectorName")
+ if name:
+ response = ise.exec(
+ family="edda",
+ function='get_connector_config_by_connector_name',
+ params=self.get_object(self._task.args)
+ ).response['response']
+ self._result.update(dict(ise_response=response))
+ self._result.update(ise.exit_json())
+ return self._result
+ if not name and not id:
+ response = ise.exec(
+ family="edda",
+ function='get_connector_config',
+ params=self.get_object(self._task.args)
+ ).response['response']
+ self._result.update(dict(ise_response=response))
+ self._result.update(ise.exit_json())
+ return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/dataconnect_info.py b/ansible_collections/cisco/ise/plugins/action/dataconnect_info.py
new file mode 100644
index 000000000..ffd19d387
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/action/dataconnect_info.py
@@ -0,0 +1,90 @@
+#!/usr/bin/env python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+from __future__ import absolute_import, division, print_function
+
+__metaclass__ = type
+from ansible.plugins.action import ActionBase
+
+try:
+ from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
+ AnsibleArgSpecValidator,
+ )
+except ImportError:
+ ANSIBLE_UTILS_IS_INSTALLED = False
+else:
+ ANSIBLE_UTILS_IS_INSTALLED = True
+from ansible.errors import AnsibleActionFail
+from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
+ ISESDK,
+ ise_argument_spec,
+)
+
+# Get common arguements specification
+argument_spec = ise_argument_spec()
+# Add arguments specific for this module
+argument_spec.update(dict(
+))
+
+required_if = []
+required_one_of = []
+mutually_exclusive = []
+required_together = []
+
+
+class ActionModule(ActionBase):
+ def __init__(self, *args, **kwargs):
+ if not ANSIBLE_UTILS_IS_INSTALLED:
+ raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
+ super(ActionModule, self).__init__(*args, **kwargs)
+ self._supports_async = False
+ self._supports_check_mode = True
+ self._result = None
+
+ # Checks the supplied parameters against the argument spec for this module
+ def _check_argspec(self):
+ aav = AnsibleArgSpecValidator(
+ data=self._task.args,
+ schema=dict(argument_spec=argument_spec),
+ schema_format="argspec",
+ schema_conditionals=dict(
+ required_if=required_if,
+ required_one_of=required_one_of,
+ mutually_exclusive=mutually_exclusive,
+ required_together=required_together,
+ ),
+ name=self._task.action,
+ )
+ valid, errors, self._task.args = aav.validate()
+ if not valid:
+ raise AnsibleActionFail(errors)
+
+ def get_object(self, params):
+ new_object = dict(
+ )
+ return new_object
+
+ def run(self, tmp=None, task_vars=None):
+ self._task.diff = False
+ self._result = super(ActionModule, self).run(tmp, task_vars)
+ self._result["changed"] = False
+ self._check_argspec()
+
+ self._result.update(dict(ise_response={}))
+
+ ise = ISESDK(params=self._task.args)
+
+ id = self._task.args.get("id")
+ name = self._task.args.get("name")
+ if not name and not id:
+ response = ise.exec(
+ family="dataconnect_services",
+ function='get_odbc_detail',
+ params=self.get_object(self._task.args)
+ ).response['response']
+ self._result.update(dict(ise_response=response))
+ self._result.update(ise.exit_json())
+ return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_info.py b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_info.py
new file mode 100644
index 000000000..5d794c926
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_info.py
@@ -0,0 +1,90 @@
+#!/usr/bin/env python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+from __future__ import absolute_import, division, print_function
+
+__metaclass__ = type
+from ansible.plugins.action import ActionBase
+
+try:
+ from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
+ AnsibleArgSpecValidator,
+ )
+except ImportError:
+ ANSIBLE_UTILS_IS_INSTALLED = False
+else:
+ ANSIBLE_UTILS_IS_INSTALLED = True
+from ansible.errors import AnsibleActionFail
+from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
+ ISESDK,
+ ise_argument_spec,
+)
+
+# Get common arguements specification
+argument_spec = ise_argument_spec()
+# Add arguments specific for this module
+argument_spec.update(dict(
+))
+
+required_if = []
+required_one_of = []
+mutually_exclusive = []
+required_together = []
+
+
+class ActionModule(ActionBase):
+ def __init__(self, *args, **kwargs):
+ if not ANSIBLE_UTILS_IS_INSTALLED:
+ raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
+ super(ActionModule, self).__init__(*args, **kwargs)
+ self._supports_async = False
+ self._supports_check_mode = True
+ self._result = None
+
+ # Checks the supplied parameters against the argument spec for this module
+ def _check_argspec(self):
+ aav = AnsibleArgSpecValidator(
+ data=self._task.args,
+ schema=dict(argument_spec=argument_spec),
+ schema_format="argspec",
+ schema_conditionals=dict(
+ required_if=required_if,
+ required_one_of=required_one_of,
+ mutually_exclusive=mutually_exclusive,
+ required_together=required_together,
+ ),
+ name=self._task.action,
+ )
+ valid, errors, self._task.args = aav.validate()
+ if not valid:
+ raise AnsibleActionFail(errors)
+
+ def get_object(self, params):
+ new_object = dict(
+ )
+ return new_object
+
+ def run(self, tmp=None, task_vars=None):
+ self._task.diff = False
+ self._result = super(ActionModule, self).run(tmp, task_vars)
+ self._result["changed"] = False
+ self._check_argspec()
+
+ self._result.update(dict(ise_response={}))
+
+ ise = ISESDK(params=self._task.args)
+
+ id = self._task.args.get("id")
+ name = self._task.args.get("name")
+ if not name and not id:
+ response = ise.exec(
+ family="dataconnect_services",
+ function='get_dataconnect_service',
+ params=self.get_object(self._task.args)
+ ).response['response']
+ self._result.update(dict(ise_response=response))
+ self._result.update(ise.exit_json())
+ return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_create.py b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_password.py
index 95943d628..0fd96ad3e 100644
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_create.py
+++ b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_password.py
@@ -27,7 +27,7 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
argument_spec = ise_argument_spec()
# Add arguments specific for this module
argument_spec.update(dict(
- payload=dict(type="list"),
+ password=dict(type="str", no_log=True),
))
required_if = []
@@ -65,7 +65,7 @@ class ActionModule(ActionBase):
def get_object(self, params):
new_object = dict(
- payload=params.get("payload"),
+ password=params.get("password"),
)
return new_object
@@ -78,8 +78,8 @@ class ActionModule(ActionBase):
ise = ISESDK(params=self._task.args)
response = ise.exec(
- family="virtual_network",
- function="bulk_create_virtual_networks",
+ family="dataconnect_services",
+ function="update_dataconnect_password",
params=self.get_object(self._task.args),
).response
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_update.py b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_password_expiry.py
index f84f91108..f9db60ec8 100644
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_update.py
+++ b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_password_expiry.py
@@ -27,7 +27,7 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
argument_spec = ise_argument_spec()
# Add arguments specific for this module
argument_spec.update(dict(
- payload=dict(type="list"),
+ passwordExpiresInDays=dict(type="int"),
))
required_if = []
@@ -65,7 +65,7 @@ class ActionModule(ActionBase):
def get_object(self, params):
new_object = dict(
- payload=params.get("payload"),
+ password_expires_in_days=params.get("passwordExpiresInDays"),
)
return new_object
@@ -78,8 +78,8 @@ class ActionModule(ActionBase):
ise = ISESDK(params=self._task.args)
response = ise.exec(
- family="sg_vn_mapping",
- function="bulk_update_sg_vn_mappings",
+ family="dataconnect_services",
+ function="update_dataconnect_password_expiry",
params=self.get_object(self._task.args),
).response
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_delete.py b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_status.py
index ab7effb63..e7232ab0e 100644
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_delete.py
+++ b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_status.py
@@ -27,7 +27,7 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
argument_spec = ise_argument_spec()
# Add arguments specific for this module
argument_spec.update(dict(
- payload=dict(type="list"),
+ isEnabled=dict(type="bool"),
))
required_if = []
@@ -65,7 +65,7 @@ class ActionModule(ActionBase):
def get_object(self, params):
new_object = dict(
- payload=params.get("payload"),
+ is_enabled=params.get("isEnabled"),
)
return new_object
@@ -78,8 +78,8 @@ class ActionModule(ActionBase):
ise = ISESDK(params=self._task.args)
response = ise.exec(
- family="sg_vn_mapping",
- function="bulk_delete_sg_vn_mappings",
+ family="dataconnect_services",
+ function="set_data_connect_service",
params=self.get_object(self._task.args),
).response
diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_authentication_rules.py b/ansible_collections/cisco/ise/plugins/action/device_administration_authentication_rules.py
index 8ef7ec09e..58e3d55d6 100644
--- a/ansible_collections/cisco/ise/plugins/action/device_administration_authentication_rules.py
+++ b/ansible_collections/cisco/ise/plugins/action/device_administration_authentication_rules.py
@@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
ISESDK,
ise_argument_spec,
ise_compare_equality,
- get_dict_result,
)
from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import (
InconsistentParameters,
@@ -33,6 +32,7 @@ argument_spec = ise_argument_spec()
# Add arguments specific for this module
argument_spec.update(dict(
state=dict(type="str", default="present", choices=["present", "absent"]),
+ identitySourceId=dict(type="str"),
identitySourceName=dict(type="str"),
ifAuthFail=dict(type="str"),
ifProcessFail=dict(type="str"),
@@ -58,6 +58,7 @@ class DeviceAdministrationAuthenticationRules(object):
def __init__(self, params, ise):
self.ise = ise
self.new_object = dict(
+ identity_source_id=params.get("identitySourceId"),
identity_source_name=params.get("identitySourceName"),
if_auth_fail=params.get("ifAuthFail"),
if_process_fail=params.get("ifProcessFail"),
@@ -133,6 +134,7 @@ class DeviceAdministrationAuthenticationRules(object):
requested_obj = self.new_object
obj_params = [
+ ("identitySourceId", "identity_source_id"),
("identitySourceName", "identity_source_name"),
("ifAuthFail", "if_auth_fail"),
("ifProcessFail", "if_process_fail"),
diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_authorization_rules.py b/ansible_collections/cisco/ise/plugins/action/device_administration_authorization_rules.py
index c1a42a95c..2645800ce 100644
--- a/ansible_collections/cisco/ise/plugins/action/device_administration_authorization_rules.py
+++ b/ansible_collections/cisco/ise/plugins/action/device_administration_authorization_rules.py
@@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
ISESDK,
ise_argument_spec,
ise_compare_equality,
- get_dict_result,
)
from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import (
InconsistentParameters,
diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_conditions.py b/ansible_collections/cisco/ise/plugins/action/device_administration_conditions.py
index 97df92d65..3f32c7c94 100644
--- a/ansible_collections/cisco/ise/plugins/action/device_administration_conditions.py
+++ b/ansible_collections/cisco/ise/plugins/action/device_administration_conditions.py
@@ -37,6 +37,7 @@ argument_spec.update(dict(
id=dict(type="str"),
name=dict(type="str"),
attributeName=dict(type="str"),
+ attributeId=dict(type="str"),
attributeValue=dict(type="str"),
dictionaryName=dict(type="str"),
dictionaryValue=dict(type="str"),
@@ -70,6 +71,7 @@ class DeviceAdministrationConditions(object):
id=params.get("id"),
name=params.get("name"),
attribute_name=params.get("attributeName"),
+ attribute_id=params.get("attributeId"),
attribute_value=params.get("attributeValue"),
dictionary_name=params.get("dictionaryName"),
dictionary_value=params.get("dictionaryValue"),
@@ -152,6 +154,7 @@ class DeviceAdministrationConditions(object):
("id", "id"),
("name", "name"),
("attributeName", "attribute_name"),
+ ("attributeId", "attribute_id"),
("attributeValue", "attribute_value"),
("dictionaryName", "dictionary_name"),
("dictionaryValue", "dictionary_value"),
diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_global_exception_rules.py b/ansible_collections/cisco/ise/plugins/action/device_administration_global_exception_rules.py
index 895c4c6e2..38718ced2 100644
--- a/ansible_collections/cisco/ise/plugins/action/device_administration_global_exception_rules.py
+++ b/ansible_collections/cisco/ise/plugins/action/device_administration_global_exception_rules.py
@@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
ISESDK,
ise_argument_spec,
ise_compare_equality,
- get_dict_result,
)
from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import (
InconsistentParameters,
diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_local_exception_rules.py b/ansible_collections/cisco/ise/plugins/action/device_administration_local_exception_rules.py
index 570495d89..27f5b3401 100644
--- a/ansible_collections/cisco/ise/plugins/action/device_administration_local_exception_rules.py
+++ b/ansible_collections/cisco/ise/plugins/action/device_administration_local_exception_rules.py
@@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
ISESDK,
ise_argument_spec,
ise_compare_equality,
- get_dict_result,
)
from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import (
InconsistentParameters,
diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_network_conditions.py b/ansible_collections/cisco/ise/plugins/action/device_administration_network_conditions.py
index 502b5b6c3..10bcdc558 100644
--- a/ansible_collections/cisco/ise/plugins/action/device_administration_network_conditions.py
+++ b/ansible_collections/cisco/ise/plugins/action/device_administration_network_conditions.py
@@ -38,7 +38,11 @@ argument_spec.update(dict(
id=dict(type="str"),
link=dict(type="dict"),
name=dict(type="str"),
- conditions=dict(type="list"),
+ deviceList=dict(type="list"),
+ cliDnisList=dict(type="list"),
+ ipAddrList=dict(type="list"),
+ macAddrList=dict(type="list"),
+ deviceGroupList=dict(type="list"),
))
required_if = [
@@ -59,7 +63,11 @@ class DeviceAdministrationNetworkConditions(object):
id=params.get("id"),
link=params.get("link"),
name=params.get("name"),
- conditions=params.get("conditions"),
+ device_list=params.get("deviceList"),
+ cli_dnis_list=params.get("cliDnisList"),
+ ip_addr_list=params.get("ipAddrList"),
+ mac_addr_list=params.get("macAddrList"),
+ device_group_list=params.get("deviceGroupList"),
)
def get_object_by_name(self, name):
@@ -124,7 +132,11 @@ class DeviceAdministrationNetworkConditions(object):
("id", "id"),
("link", "link"),
("name", "name"),
- ("conditions", "conditions"),
+ ("deviceList", "device_list"),
+ ("cliDnisList", "cli_dnis_list"),
+ ("ipAddrList", "ip_addr_list"),
+ ("macAddrList", "mac_addr_list"),
+ ("deviceGroupList", "device_group_list"),
]
# Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params
# If any does not have eq params, it requires update
diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_time_date_conditions.py b/ansible_collections/cisco/ise/plugins/action/device_administration_time_date_conditions.py
index 35431f36e..e0ffd4d73 100644
--- a/ansible_collections/cisco/ise/plugins/action/device_administration_time_date_conditions.py
+++ b/ansible_collections/cisco/ise/plugins/action/device_administration_time_date_conditions.py
@@ -40,6 +40,7 @@ argument_spec.update(dict(
id=dict(type="str"),
name=dict(type="str"),
attributeName=dict(type="str"),
+ attributeId=dict(type="str"),
attributeValue=dict(type="str"),
dictionaryName=dict(type="str"),
dictionaryValue=dict(type="str"),
@@ -73,6 +74,7 @@ class DeviceAdministrationTimeDateConditions(object):
id=params.get("id"),
name=params.get("name"),
attribute_name=params.get("attributeName"),
+ attribute_id=params.get("attributeId"),
attribute_value=params.get("attributeValue"),
dictionary_name=params.get("dictionaryName"),
dictionary_value=params.get("dictionaryValue"),
@@ -150,6 +152,7 @@ class DeviceAdministrationTimeDateConditions(object):
("id", "id"),
("name", "name"),
("attributeName", "attribute_name"),
+ ("attributeId", "attribute_id"),
("attributeValue", "attribute_value"),
("dictionaryName", "dictionary_name"),
("dictionaryValue", "dictionary_value"),
diff --git a/ansible_collections/cisco/ise/plugins/action/dictionary_references_info.py b/ansible_collections/cisco/ise/plugins/action/dictionary_references_info.py
new file mode 100644
index 000000000..4b4d92cbe
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/action/dictionary_references_info.py
@@ -0,0 +1,90 @@
+#!/usr/bin/env python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2023, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+from __future__ import absolute_import, division, print_function
+
+__metaclass__ = type
+from ansible.plugins.action import ActionBase
+
+try:
+ from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
+ AnsibleArgSpecValidator,
+ )
+except ImportError:
+ ANSIBLE_UTILS_IS_INSTALLED = False
+else:
+ ANSIBLE_UTILS_IS_INSTALLED = True
+from ansible.errors import AnsibleActionFail
+from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
+ ISESDK,
+ ise_argument_spec,
+)
+
+# Get common arguements specification
+argument_spec = ise_argument_spec()
+# Add arguments specific for this module
+argument_spec.update(dict(
+))
+
+required_if = []
+required_one_of = []
+mutually_exclusive = []
+required_together = []
+
+
+class ActionModule(ActionBase):
+ def __init__(self, *args, **kwargs):
+ if not ANSIBLE_UTILS_IS_INSTALLED:
+ raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
+ super(ActionModule, self).__init__(*args, **kwargs)
+ self._supports_async = False
+ self._supports_check_mode = True
+ self._result = None
+
+ # Checks the supplied parameters against the argument spec for this module
+ def _check_argspec(self):
+ aav = AnsibleArgSpecValidator(
+ data=self._task.args,
+ schema=dict(argument_spec=argument_spec),
+ schema_format="argspec",
+ schema_conditionals=dict(
+ required_if=required_if,
+ required_one_of=required_one_of,
+ mutually_exclusive=mutually_exclusive,
+ required_together=required_together,
+ ),
+ name=self._task.action,
+ )
+ valid, errors, self._task.args = aav.validate()
+ if not valid:
+ raise AnsibleActionFail(errors)
+
+ def get_object(self, params):
+ new_object = dict(
+ )
+ return new_object
+
+ def run(self, tmp=None, task_vars=None):
+ self._task.diff = False
+ self._result = super(ActionModule, self).run(tmp, task_vars)
+ self._result["changed"] = False
+ self._check_argspec()
+
+ self._result.update(dict(ise_response={}))
+
+ ise = ISESDK(params=self._task.args)
+
+ id = self._task.args.get("id")
+ name = self._task.args.get("name")
+ if not name and not id:
+ response = ise.exec(
+ family="edda",
+ function='get_edda_dictionary_references',
+ params=self.get_object(self._task.args)
+ ).response['response']
+ self._result.update(dict(ise_response=response))
+ self._result.update(ise.exit_json())
+ return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/endpoint.py b/ansible_collections/cisco/ise/plugins/action/endpoint.py
index b8526e704..5de00e6d8 100644
--- a/ansible_collections/cisco/ise/plugins/action/endpoint.py
+++ b/ansible_collections/cisco/ise/plugins/action/endpoint.py
@@ -31,6 +31,7 @@ argument_spec = ise_argument_spec()
# Add arguments specific for this module
argument_spec.update(dict(
state=dict(type="str", default="present", choices=["present", "absent"]),
+ name=dict(type="str"),
description=dict(type="str"),
mac=dict(type="str"),
profileId=dict(type="str"),
@@ -46,8 +47,8 @@ argument_spec.update(dict(
))
required_if = [
- ("state", "present", ["id", "mac"], True),
- ("state", "absent", ["id", "mac"], True),
+ ("state", "present", ["id", "name"], True),
+ ("state", "absent", ["id", "name"], True),
]
required_one_of = []
mutually_exclusive = []
@@ -58,6 +59,7 @@ class Endpoint(object):
def __init__(self, params, ise):
self.ise = ise
self.new_object = dict(
+ name=params.get("name"),
description=params.get("description"),
mac=params.get("mac"),
profile_id=params.get("profileId"),
@@ -123,10 +125,7 @@ class Endpoint(object):
result = False
prev_obj = None
id = self.new_object.get("id")
- name = self.new_object.get("mac")
- if name:
- name = re.sub("[-:.]", "", name).lower()
- self.new_object.update(dict(mac=name))
+ name = self.new_object.get("name")
if id:
prev_obj = self.get_object_by_id(id)
result = prev_obj is not None and isinstance(prev_obj, dict)
@@ -139,6 +138,7 @@ class Endpoint(object):
requested_obj = self.new_object
obj_params = [
+ ("name", "name"),
("description", "description"),
("mac", "mac"),
("profileId", "profile_id"),
@@ -168,7 +168,7 @@ class Endpoint(object):
def update(self):
id = self.new_object.get("id")
- name = self.new_object.get("mac")
+ name = self.new_object.get("name")
result = None
if not id:
id_ = self.get_object_by_name(name).get("id")
@@ -182,7 +182,7 @@ class Endpoint(object):
def delete(self):
id = self.new_object.get("id")
- name = self.new_object.get("mac")
+ name = self.new_object.get("name")
result = None
if not id:
id_ = self.get_object_by_name(name).get("id")
diff --git a/ansible_collections/cisco/ise/plugins/action/filter_policy.py b/ansible_collections/cisco/ise/plugins/action/filter_policy.py
index 3f4732053..d2a3ca73e 100644
--- a/ansible_collections/cisco/ise/plugins/action/filter_policy.py
+++ b/ansible_collections/cisco/ise/plugins/action/filter_policy.py
@@ -31,9 +31,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
ise_compare_equality,
get_dict_result,
)
-from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import (
- InconsistentParameters,
-)
# Get common arguments specification
argument_spec = ise_argument_spec()
diff --git a/ansible_collections/cisco/ise/plugins/action/mnt_session_active_count_info.py b/ansible_collections/cisco/ise/plugins/action/mnt_session_active_count_info.py
index c4c748317..643df1b6d 100644
--- a/ansible_collections/cisco/ise/plugins/action/mnt_session_active_count_info.py
+++ b/ansible_collections/cisco/ise/plugins/action/mnt_session_active_count_info.py
@@ -84,7 +84,7 @@ class ActionModule(ActionBase):
family="misc",
function='get_active_count',
params=self.get_object(self._task.args)
- ).response['count']
+ ).response['sessionCount']['count']
self._result.update(dict(ise_response=response))
self._result.update(ise.exit_json())
return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/network_access_authentication_rules.py b/ansible_collections/cisco/ise/plugins/action/network_access_authentication_rules.py
index 63e8d4bce..b8663b844 100644
--- a/ansible_collections/cisco/ise/plugins/action/network_access_authentication_rules.py
+++ b/ansible_collections/cisco/ise/plugins/action/network_access_authentication_rules.py
@@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
ISESDK,
ise_argument_spec,
ise_compare_equality,
- get_dict_result,
)
from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import (
InconsistentParameters,
@@ -33,6 +32,7 @@ argument_spec = ise_argument_spec()
# Add arguments specific for this module
argument_spec.update(dict(
state=dict(type="str", default="present", choices=["present", "absent"]),
+ identitySourceId=dict(type="str"),
identitySourceName=dict(type="str"),
ifAuthFail=dict(type="str"),
ifProcessFail=dict(type="str"),
@@ -58,6 +58,7 @@ class NetworkAccessAuthenticationRules(object):
def __init__(self, params, ise):
self.ise = ise
self.new_object = dict(
+ identity_source_id=params.get("identitySourceId"),
identity_source_name=params.get("identitySourceName"),
if_auth_fail=params.get("ifAuthFail"),
if_process_fail=params.get("ifProcessFail"),
@@ -133,6 +134,7 @@ class NetworkAccessAuthenticationRules(object):
requested_obj = self.new_object
obj_params = [
+ ("identitySourceId", "identity_source_id"),
("identitySourceName", "identity_source_name"),
("ifAuthFail", "if_auth_fail"),
("ifProcessFail", "if_process_fail"),
diff --git a/ansible_collections/cisco/ise/plugins/action/network_access_authorization_rules.py b/ansible_collections/cisco/ise/plugins/action/network_access_authorization_rules.py
index 889963294..2b6ae8c21 100644
--- a/ansible_collections/cisco/ise/plugins/action/network_access_authorization_rules.py
+++ b/ansible_collections/cisco/ise/plugins/action/network_access_authorization_rules.py
@@ -21,9 +21,7 @@ from ansible.errors import AnsibleActionFail
from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
ISESDK,
ise_argument_spec,
- ise_compare_equality,
ise_compare_equality2,
- get_dict_result,
)
from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import (
InconsistentParameters,
diff --git a/ansible_collections/cisco/ise/plugins/action/network_access_conditions.py b/ansible_collections/cisco/ise/plugins/action/network_access_conditions.py
index a80689189..7ab7a5b7e 100644
--- a/ansible_collections/cisco/ise/plugins/action/network_access_conditions.py
+++ b/ansible_collections/cisco/ise/plugins/action/network_access_conditions.py
@@ -37,6 +37,7 @@ argument_spec.update(dict(
id=dict(type="str"),
name=dict(type="str"),
attributeName=dict(type="str"),
+ attributeId=dict(type="str"),
attributeValue=dict(type="str"),
dictionaryName=dict(type="str"),
dictionaryValue=dict(type="str"),
@@ -70,6 +71,7 @@ class NetworkAccessConditions(object):
id=params.get("id"),
name=params.get("name"),
attribute_name=params.get("attributeName"),
+ attribute_id=params.get("attributeId"),
attribute_value=params.get("attributeValue"),
dictionary_name=params.get("dictionaryName"),
dictionary_value=params.get("dictionaryValue"),
@@ -152,6 +154,7 @@ class NetworkAccessConditions(object):
("id", "id"),
("name", "name"),
("attributeName", "attribute_name"),
+ ("attributeId", "attribute_id"),
("attributeValue", "attribute_value"),
("dictionaryName", "dictionary_name"),
("dictionaryValue", "dictionary_value"),
diff --git a/ansible_collections/cisco/ise/plugins/action/network_access_global_exception_rules.py b/ansible_collections/cisco/ise/plugins/action/network_access_global_exception_rules.py
index b2d3e9bcd..b67519de4 100644
--- a/ansible_collections/cisco/ise/plugins/action/network_access_global_exception_rules.py
+++ b/ansible_collections/cisco/ise/plugins/action/network_access_global_exception_rules.py
@@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
ISESDK,
ise_argument_spec,
ise_compare_equality,
- get_dict_result,
)
from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import (
InconsistentParameters,
diff --git a/ansible_collections/cisco/ise/plugins/action/network_access_local_exception_rules.py b/ansible_collections/cisco/ise/plugins/action/network_access_local_exception_rules.py
index 462fd6081..c5b3c4d86 100644
--- a/ansible_collections/cisco/ise/plugins/action/network_access_local_exception_rules.py
+++ b/ansible_collections/cisco/ise/plugins/action/network_access_local_exception_rules.py
@@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
ISESDK,
ise_argument_spec,
ise_compare_equality,
- get_dict_result,
)
from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import (
InconsistentParameters,
diff --git a/ansible_collections/cisco/ise/plugins/action/network_access_time_date_conditions.py b/ansible_collections/cisco/ise/plugins/action/network_access_time_date_conditions.py
index 65957d072..23b46c263 100644
--- a/ansible_collections/cisco/ise/plugins/action/network_access_time_date_conditions.py
+++ b/ansible_collections/cisco/ise/plugins/action/network_access_time_date_conditions.py
@@ -40,6 +40,7 @@ argument_spec.update(dict(
id=dict(type="str"),
name=dict(type="str"),
attributeName=dict(type="str"),
+ attributeId=dict(type="str"),
attributeValue=dict(type="str"),
dictionaryName=dict(type="str"),
dictionaryValue=dict(type="str"),
@@ -73,6 +74,7 @@ class NetworkAccessTimeDateConditions(object):
id=params.get("id"),
name=params.get("name"),
attribute_name=params.get("attributeName"),
+ attribute_id=params.get("attributeId"),
attribute_value=params.get("attributeValue"),
dictionary_name=params.get("dictionaryName"),
dictionary_value=params.get("dictionaryValue"),
@@ -150,6 +152,7 @@ class NetworkAccessTimeDateConditions(object):
("id", "id"),
("name", "name"),
("attributeName", "attribute_name"),
+ ("attributeId", "attribute_id"),
("attributeValue", "attribute_value"),
("dictionaryName", "dictionary_name"),
("dictionaryValue", "dictionary_value"),
diff --git a/ansible_collections/cisco/ise/plugins/action/network_device_group.py b/ansible_collections/cisco/ise/plugins/action/network_device_group.py
index 8cd682e9c..d45ef371a 100644
--- a/ansible_collections/cisco/ise/plugins/action/network_device_group.py
+++ b/ansible_collections/cisco/ise/plugins/action/network_device_group.py
@@ -32,7 +32,7 @@ argument_spec.update(dict(
state=dict(type="str", default="present", choices=["present", "absent"]),
name=dict(type="str"),
description=dict(type="str"),
- othername=dict(type="str"),
+ ndgtype=dict(type="str"),
id=dict(type="str"),
))
@@ -51,7 +51,7 @@ class NetworkDeviceGroup(object):
self.new_object = dict(
name=params.get("name"),
description=params.get("description"),
- othername=params.get("othername"),
+ ndgtype=params.get("ndgtype"),
id=params.get("id"),
)
@@ -122,7 +122,7 @@ class NetworkDeviceGroup(object):
obj_params = [
("name", "name"),
("description", "description"),
- ("othername", "othername"),
+ ("ndgtype", "ndgtype"),
("id", "id"),
]
# Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params
diff --git a/ansible_collections/cisco/ise/plugins/action/node_primary_to_standalone.py b/ansible_collections/cisco/ise/plugins/action/node_primary_to_standalone.py
index af546b5ef..9d5364d4d 100644
--- a/ansible_collections/cisco/ise/plugins/action/node_primary_to_standalone.py
+++ b/ansible_collections/cisco/ise/plugins/action/node_primary_to_standalone.py
@@ -37,7 +37,7 @@ argument_spec.update(dict(
required_if = []
required_one_of = [
("hostname"),
-],
+]
mutually_exclusive = []
required_together = []
diff --git a/ansible_collections/cisco/ise/plugins/action/node_secondary_to_primary.py b/ansible_collections/cisco/ise/plugins/action/node_secondary_to_primary.py
index 9cbd890b9..386e2aada 100644
--- a/ansible_collections/cisco/ise/plugins/action/node_secondary_to_primary.py
+++ b/ansible_collections/cisco/ise/plugins/action/node_secondary_to_primary.py
@@ -37,7 +37,7 @@ argument_spec.update(dict(
required_if = []
required_one_of = [
("hostname"),
-],
+]
mutually_exclusive = []
required_together = []
diff --git a/ansible_collections/cisco/ise/plugins/action/node_services_profiler_probe_config.py b/ansible_collections/cisco/ise/plugins/action/node_services_profiler_probe_config.py
index 71f25d3d7..53a9a7920 100644
--- a/ansible_collections/cisco/ise/plugins/action/node_services_profiler_probe_config.py
+++ b/ansible_collections/cisco/ise/plugins/action/node_services_profiler_probe_config.py
@@ -21,7 +21,6 @@ from ansible.errors import AnsibleActionFail
from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
ISESDK,
ise_argument_spec,
- ise_compare_equality,
ise_compare_equality2,
get_dict_result,
)
diff --git a/ansible_collections/cisco/ise/plugins/action/node_standalone_to_primary.py b/ansible_collections/cisco/ise/plugins/action/node_standalone_to_primary.py
index def196c60..2a6dcb0b2 100644
--- a/ansible_collections/cisco/ise/plugins/action/node_standalone_to_primary.py
+++ b/ansible_collections/cisco/ise/plugins/action/node_standalone_to_primary.py
@@ -36,7 +36,7 @@ argument_spec.update(dict(
required_if = []
required_one_of = [
("hostname"),
-],
+]
mutually_exclusive = []
required_together = []
diff --git a/ansible_collections/cisco/ise/plugins/action/personas_check_standalone.py b/ansible_collections/cisco/ise/plugins/action/personas_check_standalone.py
index e6e6668b7..7e4007d03 100644
--- a/ansible_collections/cisco/ise/plugins/action/personas_check_standalone.py
+++ b/ansible_collections/cisco/ise/plugins/action/personas_check_standalone.py
@@ -18,8 +18,6 @@ except ImportError:
else:
ANSIBLE_UTILS_IS_INSTALLED = True
from ansible.errors import AnsibleActionFail
-from urllib.parse import quote
-import time
from ansible_collections.cisco.ise.plugins.plugin_utils.personas_utils import Node
argument_spec = dict(
diff --git a/ansible_collections/cisco/ise/plugins/action/personas_export_certs.py b/ansible_collections/cisco/ise/plugins/action/personas_export_certs.py
index a0a3e6d8a..8acba2dd2 100644
--- a/ansible_collections/cisco/ise/plugins/action/personas_export_certs.py
+++ b/ansible_collections/cisco/ise/plugins/action/personas_export_certs.py
@@ -18,8 +18,6 @@ except ImportError:
else:
ANSIBLE_UTILS_IS_INSTALLED = True
from ansible.errors import AnsibleActionFail
-from urllib.parse import quote
-import time
from ansible_collections.cisco.ise.plugins.plugin_utils.personas_utils import Node
argument_spec = dict(
diff --git a/ansible_collections/cisco/ise/plugins/action/personas_promote_primary.py b/ansible_collections/cisco/ise/plugins/action/personas_promote_primary.py
index 9de4ae5ae..8e7a1c2b5 100644
--- a/ansible_collections/cisco/ise/plugins/action/personas_promote_primary.py
+++ b/ansible_collections/cisco/ise/plugins/action/personas_promote_primary.py
@@ -18,8 +18,6 @@ except ImportError:
else:
ANSIBLE_UTILS_IS_INSTALLED = True
from ansible.errors import AnsibleActionFail
-from urllib.parse import quote
-import time
from ansible_collections.cisco.ise.plugins.plugin_utils.personas_utils import Node
argument_spec = dict(
diff --git a/ansible_collections/cisco/ise/plugins/action/personas_register_node.py b/ansible_collections/cisco/ise/plugins/action/personas_register_node.py
index 708551dd2..2a1b008f2 100644
--- a/ansible_collections/cisco/ise/plugins/action/personas_register_node.py
+++ b/ansible_collections/cisco/ise/plugins/action/personas_register_node.py
@@ -18,8 +18,6 @@ except ImportError:
else:
ANSIBLE_UTILS_IS_INSTALLED = True
from ansible.errors import AnsibleActionFail
-from urllib.parse import quote
-import time
from ansible_collections.cisco.ise.plugins.plugin_utils.personas_utils import Node
argument_spec = dict(
diff --git a/ansible_collections/cisco/ise/plugins/action/personas_update_roles_services.py b/ansible_collections/cisco/ise/plugins/action/personas_update_roles_services.py
index bca25ce3d..085271454 100644
--- a/ansible_collections/cisco/ise/plugins/action/personas_update_roles_services.py
+++ b/ansible_collections/cisco/ise/plugins/action/personas_update_roles_services.py
@@ -10,8 +10,6 @@ except ImportError:
else:
ANSIBLE_UTILS_IS_INSTALLED = True
from ansible.errors import AnsibleActionFail
-from urllib.parse import quote
-import time
from ansible_collections.cisco.ise.plugins.plugin_utils.personas_utils import Node
from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
ise_compare_equality,
@@ -97,7 +95,7 @@ class ActionModule(ActionBase):
try:
prev_obj = node.get_roles_services()
except Exception as e:
- AnsibleActionFail(e)
+ raise AnsibleActionFail(e)
if prev_obj:
if obj.requires_update(prev_obj, request_obj):
try:
diff --git a/ansible_collections/cisco/ise/plugins/action/rest_id_store.py b/ansible_collections/cisco/ise/plugins/action/rest_id_store.py
index 1e138018a..298223855 100644
--- a/ansible_collections/cisco/ise/plugins/action/rest_id_store.py
+++ b/ansible_collections/cisco/ise/plugins/action/rest_id_store.py
@@ -33,6 +33,7 @@ argument_spec.update(dict(
name=dict(type="str"),
description=dict(type="str"),
ersRestIDStoreAttributes=dict(type="dict"),
+ ersRestIDStoreUserAttributes=dict(type="dict"),
id=dict(type="str"),
))
@@ -52,6 +53,7 @@ class RestIdStore(object):
name=params.get("name"),
description=params.get("description"),
ers_rest_idstore_attributes=params.get("ersRestIDStoreAttributes"),
+ ers_rest_idstore_user_attributes=params.get("ersRestIDStoreUserAttributes"),
id=params.get("id"),
)
@@ -120,6 +122,7 @@ class RestIdStore(object):
("name", "name"),
("description", "description"),
("ersRestIDStoreAttributes", "ers_rest_idstore_attributes"),
+ ("ersRestIDStoreUserAttributes", "ers_rest_idstore_user_attributes"),
("id", "id"),
]
# Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params
@@ -129,6 +132,7 @@ class RestIdStore(object):
for (ise_param, ansible_param) in obj_params)
def create(self):
+ print(self.new_object)
result = self.ise.exec(
family="restid_store",
function="create_rest_id_store",
@@ -221,6 +225,7 @@ class ActionModule(ActionBase):
self._result.update(dict(ise_update_response=ise_update_response))
(obj_exists, updated_obj) = obj.exists()
response = updated_obj
+ ise.object_updated()
has_changed = None
has_changed = ise_update_response.get("UpdatedFieldsList").get("updatedField")
if (len(has_changed) == 0 or
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_nbar_app.py b/ansible_collections/cisco/ise/plugins/action/subscriber.py
index 3cb7209b8..a3713078a 100644
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_nbar_app.py
+++ b/ansible_collections/cisco/ise/plugins/action/subscriber.py
@@ -1,7 +1,7 @@
#!/usr/bin/env python
# -*- coding: utf-8 -*-
-# Copyright (c) 2021, Cisco Systems
+# Copyright (c) 2023, Cisco Systems
# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import absolute_import, division, print_function
@@ -33,42 +33,46 @@ argument_spec = ise_argument_spec()
# Add arguments specific for this module
argument_spec.update(dict(
state=dict(type="str", default="present", choices=["present", "absent"]),
- description=dict(type="str"),
- id=dict(type="str"),
- name=dict(type="str"),
- networkIdentities=dict(type="list"),
+ enabled=dict(type="bool"),
+ friendlyName=dict(type="str"),
+ identityGroups=dict(type="str"),
+ imeis=dict(type="str"),
+ imsi=dict(type="str"),
+ ki=dict(type="str"),
+ opc=dict(type="str"),
+ subscriberId=dict(type="str"),
))
-required_if = [
- ("state", "present", ["id", "name"], True),
- ("state", "absent", ["id", "name"], True),
-]
+required_if = []
required_one_of = []
mutually_exclusive = []
required_together = []
-class TrustsecNbarApp(object):
+class Subscriber(object):
def __init__(self, params, ise):
self.ise = ise
self.new_object = dict(
- description=params.get("description"),
- id=params.get("id"),
- name=params.get("name"),
- network_identities=params.get("networkIdentities"),
+ enabled=params.get("enabled"),
+ friendly_name=params.get("friendlyName"),
+ identity_groups=params.get("identityGroups"),
+ imeis=params.get("imeis"),
+ imsi=params.get("imsi"),
+ ki=params.get("ki"),
+ opc=params.get("opc"),
+ subscriber_id=params.get("subscriberId"),
)
def get_object_by_name(self, name):
# NOTICE: Get does not support/work for filter by name with EQ
result = None
gen_items_responses = self.ise.exec(
- family="nbar_app",
- function="get_nbar_apps_generator",
- params={"filter": "name.EQ.{name}".format(name=name)}
+ family="subscriber",
+ function="get_all_subscribers_generator"
)
try:
for items_response in gen_items_responses:
- items = items_response.response['response']
+ items = items_response.response.get('response', [])
result = get_dict_result(items, 'name', name)
if result:
return result
@@ -90,10 +94,10 @@ class TrustsecNbarApp(object):
def get_object_by_id(self, id):
try:
result = self.ise.exec(
- family="nbar_app",
- function="get_nbar_app_by_id",
+ family="subscriber",
+ function="get_subscriber_by_id",
handle_func_exception=False,
- params={"id": id}
+ params={"subscriber_id": id}
).response['response']
except (TypeError, AttributeError) as e:
self.ise.fail_json(
@@ -107,15 +111,13 @@ class TrustsecNbarApp(object):
)
except Exception:
result = None
- if isinstance(result, list) and len(result) > 0:
- return result[0]
return result
def exists(self):
id_exists = False
name_exists = False
prev_obj = None
- o_id = self.new_object.get("id")
+ o_id = self.new_object.get("subscriberId")
name = self.new_object.get("name")
if o_id:
prev_obj = self.get_object_by_id(o_id)
@@ -136,10 +138,14 @@ class TrustsecNbarApp(object):
requested_obj = self.new_object
obj_params = [
- ("description", "description"),
- ("id", "id"),
- ("name", "name"),
- ("networkIdentities", "network_identities"),
+ ("enabled", "enabled"),
+ ("friendlyName", "friendly_name"),
+ ("identityGroups", "identity_groups"),
+ ("imeis", "imeis"),
+ ("imsi", "imsi"),
+ ("ki", "ki"),
+ ("opc", "opc"),
+ ("subscriberId", "subscriber_id"),
]
# Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params
# If any does not have eq params, it requires update
@@ -149,8 +155,8 @@ class TrustsecNbarApp(object):
def create(self):
result = self.ise.exec(
- family="nbar_app",
- function="create_nbar_app",
+ family="subscriber",
+ function="create_subscriber",
params=self.new_object,
).response
return result
@@ -163,8 +169,8 @@ class TrustsecNbarApp(object):
id_ = self.get_object_by_name(name).get("id")
self.new_object.update(dict(id=id_))
result = self.ise.exec(
- family="nbar_app",
- function="update_nbar_app_by_id",
+ family="subscriber",
+ function="update_subscriber",
params=self.new_object
).response
return result
@@ -177,8 +183,8 @@ class TrustsecNbarApp(object):
id_ = self.get_object_by_name(name).get("id")
self.new_object.update(dict(id=id_))
result = self.ise.exec(
- family="nbar_app",
- function="delete_nbar_app_by_id",
+ family="subscriber",
+ function="delete_subscriber",
params=self.new_object
).response
return result
@@ -218,7 +224,7 @@ class ActionModule(ActionBase):
self._check_argspec()
ise = ISESDK(params=self._task.args)
- obj = TrustsecNbarApp(self._task.args, ise)
+ obj = Subscriber(self._task.args, ise)
state = self._task.args.get("state")
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_create.py b/ansible_collections/cisco/ise/plugins/action/subscriber_bulk.py
index 349b4bc85..bd392306d 100644
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_create.py
+++ b/ansible_collections/cisco/ise/plugins/action/subscriber_bulk.py
@@ -1,7 +1,7 @@
#!/usr/bin/env python
# -*- coding: utf-8 -*-
-# Copyright (c) 2021, Cisco Systems
+# Copyright (c) 2023, Cisco Systems
# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import absolute_import, division, print_function
@@ -27,7 +27,8 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
argument_spec = ise_argument_spec()
# Add arguments specific for this module
argument_spec.update(dict(
- payload=dict(type="list"),
+ ItemList=dict(type="list"),
+ operation=dict(type="str"),
))
required_if = []
@@ -65,7 +66,8 @@ class ActionModule(ActionBase):
def get_object(self, params):
new_object = dict(
- payload=params.get("payload"),
+ item_list=params.get("ItemList"),
+ operation=params.get("operation"),
)
return new_object
@@ -78,8 +80,8 @@ class ActionModule(ActionBase):
ise = ISESDK(params=self._task.args)
response = ise.exec(
- family="sg_vn_mapping",
- function="bulk_create_sg_vn_mappings",
+ family="subscriber",
+ function="bulk_subscriber_operation",
params=self.get_object(self._task.args),
).response
diff --git a/ansible_collections/cisco/ise/plugins/action/subscriber_imsi_info.py b/ansible_collections/cisco/ise/plugins/action/subscriber_imsi_info.py
new file mode 100644
index 000000000..f82cd0d6d
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/action/subscriber_imsi_info.py
@@ -0,0 +1,98 @@
+#!/usr/bin/env python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2023, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+from __future__ import absolute_import, division, print_function
+
+__metaclass__ = type
+from ansible.plugins.action import ActionBase
+
+try:
+ from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
+ AnsibleArgSpecValidator,
+ )
+except ImportError:
+ ANSIBLE_UTILS_IS_INSTALLED = False
+else:
+ ANSIBLE_UTILS_IS_INSTALLED = True
+from ansible.errors import AnsibleActionFail
+from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
+ ISESDK,
+ ise_argument_spec,
+)
+
+# Get common arguements specification
+argument_spec = ise_argument_spec()
+# Add arguments specific for this module
+argument_spec.update(dict(
+ imsi=dict(type="str"),
+))
+
+required_if = []
+required_one_of = []
+mutually_exclusive = []
+required_together = []
+
+
+class ActionModule(ActionBase):
+ def __init__(self, *args, **kwargs):
+ if not ANSIBLE_UTILS_IS_INSTALLED:
+ raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
+ super(ActionModule, self).__init__(*args, **kwargs)
+ self._supports_async = False
+ self._supports_check_mode = True
+ self._result = None
+
+ # Checks the supplied parameters against the argument spec for this module
+ def _check_argspec(self):
+ aav = AnsibleArgSpecValidator(
+ data=self._task.args,
+ schema=dict(argument_spec=argument_spec),
+ schema_format="argspec",
+ schema_conditionals=dict(
+ required_if=required_if,
+ required_one_of=required_one_of,
+ mutually_exclusive=mutually_exclusive,
+ required_together=required_together,
+ ),
+ name=self._task.action,
+ )
+ valid, errors, self._task.args = aav.validate()
+ if not valid:
+ raise AnsibleActionFail(errors)
+
+ def get_object(self, params):
+ new_object = dict(
+ imsi=params.get("imsi"),
+ )
+ return new_object
+
+ def run(self, tmp=None, task_vars=None):
+ self._task.diff = False
+ self._result = super(ActionModule, self).run(tmp, task_vars)
+ self._result["changed"] = False
+ self._check_argspec()
+
+ self._result.update(dict(ise_response={}))
+
+ ise = ISESDK(params=self._task.args)
+
+ id = self._task.args.get("imsi")
+ name = self._task.args.get("name")
+ if id:
+ response = ise.exec(
+ family="subscriber",
+ function='get_subscriber_by_i_m_s_i',
+ params=self.get_object(self._task.args)
+ ).response['response']
+ self._result.update(dict(ise_response=response))
+ self._result.update(ise.exit_json())
+ return self._result
+ if not name and not id:
+ # NOTICE: Does not have a get all method or it is in another action
+ response = None
+ self._result.update(dict(ise_response=response))
+ self._result.update(ise.exit_json())
+ return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_info.py b/ansible_collections/cisco/ise/plugins/action/subscriber_info.py
index 42820bc30..65d8cc69c 100644
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_info.py
+++ b/ansible_collections/cisco/ise/plugins/action/subscriber_info.py
@@ -1,7 +1,7 @@
#!/usr/bin/env python
# -*- coding: utf-8 -*-
-# Copyright (c) 2021, Cisco Systems
+# Copyright (c) 2023, Cisco Systems
# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import absolute_import, division, print_function
@@ -29,11 +29,11 @@ argument_spec = ise_argument_spec()
argument_spec.update(dict(
page=dict(type="int"),
size=dict(type="int"),
+ filter=dict(type="str"),
+ filterType=dict(type="str"),
sort=dict(type="str"),
sortBy=dict(type="str"),
- filter=dict(type="list"),
- filterType=dict(type="str"),
- id=dict(type="str"),
+ subscriberId=dict(type="str"),
))
required_if = []
@@ -73,11 +73,11 @@ class ActionModule(ActionBase):
new_object = dict(
page=params.get("page"),
size=params.get("size"),
- sort=params.get("sort"),
- sort_by=params.get("sortBy"),
filter=params.get("filter"),
filter_type=params.get("filterType"),
- id=params.get("id"),
+ sort=params.get("sort"),
+ sort_by=params.get("sortBy"),
+ subscriber_id=params.get("subscriberId"),
)
return new_object
@@ -91,12 +91,12 @@ class ActionModule(ActionBase):
ise = ISESDK(params=self._task.args)
- id = self._task.args.get("id")
+ id = self._task.args.get("subscriberId")
name = self._task.args.get("name")
if id:
response = ise.exec(
- family="sg_vn_mapping",
- function='get_sg_vn_mapping_by_id',
+ family="subscriber",
+ function='get_subscriber_by_id',
params=self.get_object(self._task.args)
).response['response']
self._result.update(dict(ise_response=response))
@@ -105,8 +105,8 @@ class ActionModule(ActionBase):
if not name and not id:
responses = []
generator = ise.exec(
- family="sg_vn_mapping",
- function='get_sg_vn_mappings_generator',
+ family="subscriber",
+ function='get_all_subscribers_generator',
params=self.get_object(self._task.args),
)
try:
diff --git a/ansible_collections/cisco/ise/plugins/action/system_certificate.py b/ansible_collections/cisco/ise/plugins/action/system_certificate.py
index 0ca926288..3faae7fec 100644
--- a/ansible_collections/cisco/ise/plugins/action/system_certificate.py
+++ b/ansible_collections/cisco/ise/plugins/action/system_certificate.py
@@ -121,7 +121,7 @@ class SystemCertificate(object):
function="get_system_certificate_by_id",
params={"id": id, "host_name": host_name},
handle_func_exception=False,
- ).response
+ ).response['response']
except Exception as e:
result = None
return result
@@ -143,6 +143,18 @@ class SystemCertificate(object):
def requires_update(self, current_obj):
requested_obj = self.new_object
+ used_by_value = current_obj.get("usedBy")
+ if used_by_value is None or used_by_value.lower() == "not in use":
+ current_obj["eap"] = False
+ current_obj["pxgrid"] = False
+ current_obj["radius"] = False
+ current_obj["ims"] = False
+ else:
+ current_obj["eap"] = "eap" in used_by_value.lower()
+ current_obj["pxgrid"] = "pxgrid" in used_by_value.lower()
+ current_obj["radius"] = "radius" in used_by_value.lower()
+ current_obj["ims"] = "ims" in used_by_value.lower()
+
obj_params = [
("admin", "admin"),
("allowPortalTagTransferForSameSubject", "allow_portal_tag_transfer_for_same_subject"),
@@ -153,7 +165,7 @@ class SystemCertificate(object):
("expirationTTLPeriod", "expiration_ttl_period"),
("expirationTTLUnits", "expiration_ttl_units"),
("ims", "ims"),
- ("name", "name"),
+ ("friendlyName", "name"),
("portal", "portal"),
("portalGroupTag", "portal_group_tag"),
("pxgrid", "pxgrid"),
diff --git a/ansible_collections/cisco/ise/plugins/action/test_connector.py b/ansible_collections/cisco/ise/plugins/action/test_connector.py
new file mode 100644
index 000000000..f3a1b5797
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/action/test_connector.py
@@ -0,0 +1,98 @@
+#!/usr/bin/env python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2023, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+from __future__ import absolute_import, division, print_function
+
+__metaclass__ = type
+from ansible.plugins.action import ActionBase
+
+try:
+ from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
+ AnsibleArgSpecValidator,
+ )
+except ImportError:
+ ANSIBLE_UTILS_IS_INSTALLED = False
+else:
+ ANSIBLE_UTILS_IS_INSTALLED = True
+from ansible.errors import AnsibleActionFail
+from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
+ ISESDK,
+ ise_argument_spec,
+)
+
+# Get common arguements specification
+argument_spec = ise_argument_spec()
+# Add arguments specific for this module
+argument_spec.update(dict(
+ authType=dict(type="str"),
+ authValues=dict(type="dict"),
+ connectorName=dict(type="str"),
+ responseParsing=dict(type="str"),
+ uniqueID=dict(type="str"),
+ url=dict(type="str"),
+))
+
+required_if = []
+required_one_of = []
+mutually_exclusive = []
+required_together = []
+
+
+class ActionModule(ActionBase):
+ def __init__(self, *args, **kwargs):
+ if not ANSIBLE_UTILS_IS_INSTALLED:
+ raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
+ super(ActionModule, self).__init__(*args, **kwargs)
+ self._supports_async = False
+ self._supports_check_mode = False
+ self._result = None
+
+ # Checks the supplied parameters against the argument spec for this module
+ def _check_argspec(self):
+ aav = AnsibleArgSpecValidator(
+ data=self._task.args,
+ schema=dict(argument_spec=argument_spec),
+ schema_format="argspec",
+ schema_conditionals=dict(
+ required_if=required_if,
+ required_one_of=required_one_of,
+ mutually_exclusive=mutually_exclusive,
+ required_together=required_together,
+ ),
+ name=self._task.action,
+ )
+ valid, errors, self._task.args = aav.validate()
+ if not valid:
+ raise AnsibleActionFail(errors)
+
+ def get_object(self, params):
+ new_object = dict(
+ auth_type=params.get("authType"),
+ auth_values=params.get("authValues"),
+ connector_name=params.get("connectorName"),
+ response_parsing=params.get("responseParsing"),
+ unique_id=params.get("uniqueID"),
+ url=params.get("url"),
+ )
+ return new_object
+
+ def run(self, tmp=None, task_vars=None):
+ self._task.diff = False
+ self._result = super(ActionModule, self).run(tmp, task_vars)
+ self._result["changed"] = False
+ self._check_argspec()
+
+ ise = ISESDK(params=self._task.args)
+
+ response = ise.exec(
+ family="edda",
+ function="test_connector",
+ params=self.get_object(self._task.args),
+ ).response
+
+ self._result.update(dict(ise_response=response))
+ self._result.update(ise.exit_json())
+ return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_nbar_app_info.py b/ansible_collections/cisco/ise/plugins/action/trustsec_nbar_app_info.py
deleted file mode 100644
index e0390f20e..000000000
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_nbar_app_info.py
+++ /dev/null
@@ -1,141 +0,0 @@
-#!/usr/bin/env python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-from __future__ import absolute_import, division, print_function
-
-__metaclass__ = type
-from ansible.plugins.action import ActionBase
-
-try:
- from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
- AnsibleArgSpecValidator,
- )
-except ImportError:
- ANSIBLE_UTILS_IS_INSTALLED = False
-else:
- ANSIBLE_UTILS_IS_INSTALLED = True
-from ansible.errors import AnsibleActionFail
-from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
- ISESDK,
- ise_argument_spec,
-)
-
-# Get common arguements specification
-argument_spec = ise_argument_spec()
-# Add arguments specific for this module
-argument_spec.update(dict(
- page=dict(type="int"),
- size=dict(type="int"),
- sort=dict(type="str"),
- sortBy=dict(type="str"),
- filter=dict(type="list"),
- filterType=dict(type="str"),
- id=dict(type="str"),
-))
-
-required_if = []
-required_one_of = []
-mutually_exclusive = []
-required_together = []
-
-
-class ActionModule(ActionBase):
- def __init__(self, *args, **kwargs):
- if not ANSIBLE_UTILS_IS_INSTALLED:
- raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
- super(ActionModule, self).__init__(*args, **kwargs)
- self._supports_async = False
- self._supports_check_mode = True
- self._result = None
-
- # Checks the supplied parameters against the argument spec for this module
- def _check_argspec(self):
- aav = AnsibleArgSpecValidator(
- data=self._task.args,
- schema=dict(argument_spec=argument_spec),
- schema_format="argspec",
- schema_conditionals=dict(
- required_if=required_if,
- required_one_of=required_one_of,
- mutually_exclusive=mutually_exclusive,
- required_together=required_together,
- ),
- name=self._task.action,
- )
- valid, errors, self._task.args = aav.validate()
- if not valid:
- raise AnsibleActionFail(errors)
-
- def get_object(self, params):
- new_object = dict(
- page=params.get("page"),
- size=params.get("size"),
- sort=params.get("sort"),
- sort_by=params.get("sortBy"),
- filter=params.get("filter"),
- filter_type=params.get("filterType"),
- id=params.get("id"),
- )
- return new_object
-
- def run(self, tmp=None, task_vars=None):
- self._task.diff = False
- self._result = super(ActionModule, self).run(tmp, task_vars)
- self._result["changed"] = False
- self._check_argspec()
-
- self._result.update(dict(ise_response=[]))
-
- ise = ISESDK(params=self._task.args)
-
- id = self._task.args.get("id")
- name = self._task.args.get("name")
- if id:
- response = ise.exec(
- family="nbar_app",
- function='get_nbar_app_by_id',
- params=self.get_object(self._task.args)
- ).response['response']
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
- if not name and not id:
- responses = []
- generator = ise.exec(
- family="nbar_app",
- function='get_nbar_apps_generator',
- params=self.get_object(self._task.args),
- )
- try:
- for item in generator:
- tmp_response = item.response['response']
- if isinstance(tmp_response, list):
- responses += tmp_response
- else:
- responses.append(tmp_response)
- response = responses
- except (TypeError, AttributeError) as e:
- ise.fail_json(
- msg=(
- "An error occured when executing operation."
- " Check the configuration of your API Settings and API Gateway settings on your ISE server."
- " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled."
- " You may want to enable the (ise_debug: True) argument."
- " The error was: {error}"
- ).format(error=e)
- )
- except Exception as e:
- ise.fail_json(
- msg=(
- "An error occured when executing operation."
- " The error was: {error}"
- " You may want to enable the (ise_debug: True) argument."
- ).format(error=e)
- )
-
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping.py b/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping.py
deleted file mode 100644
index f522e9296..000000000
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping.py
+++ /dev/null
@@ -1,267 +0,0 @@
-#!/usr/bin/env python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-from __future__ import absolute_import, division, print_function
-
-__metaclass__ = type
-from ansible.plugins.action import ActionBase
-
-try:
- from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
- AnsibleArgSpecValidator,
- )
-except ImportError:
- ANSIBLE_UTILS_IS_INSTALLED = False
-else:
- ANSIBLE_UTILS_IS_INSTALLED = True
-from ansible.errors import AnsibleActionFail
-from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
- ISESDK,
- ise_argument_spec,
- ise_compare_equality,
- get_dict_result,
-)
-from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import (
- InconsistentParameters,
-)
-
-# Get common arguments specification
-argument_spec = ise_argument_spec()
-# Add arguments specific for this module
-argument_spec.update(dict(
- state=dict(type="str", default="present", choices=["present", "absent"]),
- id=dict(type="str"),
- lastUpdate=dict(type="str"),
- sgName=dict(type="str"),
- sgtId=dict(type="str"),
- vnId=dict(type="str"),
- vnName=dict(type="str"),
-))
-
-required_if = [
- ("state", "present", ["id", "sgName", "vnName"], True),
- ("state", "absent", ["id", "sgName", "vnName"], True),
-]
-required_one_of = []
-mutually_exclusive = []
-required_together = []
-
-
-class TrustsecSgVnMapping(object):
- def __init__(self, params, ise):
- self.ise = ise
- self.new_object = dict(
- id=params.get("id"),
- last_update=params.get("lastUpdate"),
- sg_name=params.get("sgName"),
- sgt_id=params.get("sgtId"),
- vn_id=params.get("vnId"),
- vn_name=params.get("vnName"),
- )
-
- def get_object_by_name(self, sg_name, vn_name):
- # NOTICE: Get does not support/work for filter by name with EQ
- result = None
- gen_items_responses = self.ise.exec(
- family="sg_vn_mapping",
- function="get_sg_vn_mappings_generator"
- )
- try:
- for items_response in gen_items_responses:
- items = items_response.response['response']
- for item in items:
- if isinstance(item, dict) and item.get('sgName') == sg_name and item.get('vnName') == vn_name:
- result = item
- break
- if result:
- return result
- except (TypeError, AttributeError) as e:
- self.ise.fail_json(
- msg=(
- "An error occured when executing operation."
- " Check the configuration of your API Settings and API Gateway settings on your ISE server."
- " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled."
- " You may want to enable the (ise_debug: True) argument."
- " The error was: {error}"
- ).format(error=e)
- )
- except Exception:
- result = None
- return result
- return result
-
- def get_object_by_id(self, id):
- try:
- result = self.ise.exec(
- family="sg_vn_mapping",
- function="get_sg_vn_mapping_by_id",
- handle_func_exception=False,
- params={"id": id}
- ).response['response']
- except (TypeError, AttributeError) as e:
- self.ise.fail_json(
- msg=(
- "An error occured when executing operation."
- " Check the configuration of your API Settings and API Gateway settings on your ISE server."
- " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled."
- " You may want to enable the (ise_debug: True) argument."
- " The error was: {error}"
- ).format(error=e)
- )
- except Exception:
- result = None
- if isinstance(result, list) and len(result) > 0:
- return result[0]
- return result
-
- def exists(self):
- id_exists = False
- name_exists = False
- prev_obj = None
- o_id = self.new_object.get("id")
- sg_name = self.new_object.get("sg_name")
- vn_name = self.new_object.get("vn_name")
- if o_id:
- prev_obj = self.get_object_by_id(o_id)
- id_exists = prev_obj is not None and isinstance(prev_obj, dict)
- if not id_exists and sg_name and vn_name:
- prev_obj = self.get_object_by_name(sg_name, vn_name)
- name_exists = prev_obj is not None and isinstance(prev_obj, dict)
- if name_exists:
- _id = prev_obj.get("id")
- if id_exists and name_exists and o_id != _id:
- raise InconsistentParameters("The 'id' and 'name' params don't refer to the same object")
- if _id:
- prev_obj = self.get_object_by_id(_id)
- it_exists = prev_obj is not None and isinstance(prev_obj, dict)
- return (it_exists, prev_obj)
-
- def requires_update(self, current_obj):
- requested_obj = self.new_object
-
- obj_params = [
- ("id", "id"),
- ("lastUpdate", "last_update"),
- ("sgName", "sg_name"),
- ("sgtId", "sgt_id"),
- ("vnId", "vn_id"),
- ("vnName", "vn_name"),
- ]
- # Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params
- # If any does not have eq params, it requires update
- return any(not ise_compare_equality(current_obj.get(ise_param),
- requested_obj.get(ansible_param))
- for (ise_param, ansible_param) in obj_params)
-
- def create(self):
- result = self.ise.exec(
- family="sg_vn_mapping",
- function="create_sg_vn_mapping",
- params=self.new_object,
- ).response
- return result
-
- def update(self):
- id = self.new_object.get("id")
- sg_name = self.new_object.get("sg_name")
- vn_name = self.new_object.get("vn_name")
- result = None
- if not id:
- id_ = self.get_object_by_name(sg_name, vn_name).get("id")
- self.new_object.update(dict(id=id_))
- result = self.ise.exec(
- family="sg_vn_mapping",
- function="update_sg_vn_mapping_by_id",
- params=self.new_object
- ).response
- return result
-
- def delete(self):
- id = self.new_object.get("id")
- sg_name = self.new_object.get("sg_name")
- vn_name = self.new_object.get("vn_name")
- result = None
- if not id:
- id_ = self.get_object_by_name(sg_name, vn_name).get("id")
- self.new_object.update(dict(id=id_))
- result = self.ise.exec(
- family="sg_vn_mapping",
- function="delete_sg_vn_mapping_by_id",
- params=self.new_object
- ).response
- return result
-
-
-class ActionModule(ActionBase):
- def __init__(self, *args, **kwargs):
- if not ANSIBLE_UTILS_IS_INSTALLED:
- raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
- super(ActionModule, self).__init__(*args, **kwargs)
- self._supports_async = False
- self._supports_check_mode = False
- self._result = None
-
- # Checks the supplied parameters against the argument spec for this module
- def _check_argspec(self):
- aav = AnsibleArgSpecValidator(
- data=self._task.args,
- schema=dict(argument_spec=argument_spec),
- schema_format="argspec",
- schema_conditionals=dict(
- required_if=required_if,
- required_one_of=required_one_of,
- mutually_exclusive=mutually_exclusive,
- required_together=required_together,
- ),
- name=self._task.action,
- )
- valid, errors, self._task.args = aav.validate()
- if not valid:
- raise AnsibleActionFail(errors)
-
- def run(self, tmp=None, task_vars=None):
- self._task.diff = False
- self._result = super(ActionModule, self).run(tmp, task_vars)
- self._result["changed"] = False
- self._check_argspec()
-
- ise = ISESDK(params=self._task.args)
- obj = TrustsecSgVnMapping(self._task.args, ise)
-
- state = self._task.args.get("state")
-
- response = None
-
- if state == "present":
- (obj_exists, prev_obj) = obj.exists()
- if obj_exists:
- if obj.requires_update(prev_obj):
- ise_update_response = obj.update()
- self._result.update(dict(ise_update_response=ise_update_response))
- (obj_exists, updated_obj) = obj.exists()
- response = updated_obj
- ise.object_updated()
- else:
- response = prev_obj
- ise.object_already_present()
- else:
- ise_create_response = obj.create()
- (obj_exists, created_obj) = obj.exists()
- response = created_obj
- ise.object_created()
-
- elif state == "absent":
- (obj_exists, prev_obj) = obj.exists()
- if obj_exists:
- obj.delete()
- response = prev_obj
- ise.object_deleted()
- else:
- ise.object_already_absent()
-
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_delete.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_delete.py
deleted file mode 100644
index d6aed5405..000000000
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_delete.py
+++ /dev/null
@@ -1,88 +0,0 @@
-#!/usr/bin/env python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-from __future__ import absolute_import, division, print_function
-
-__metaclass__ = type
-from ansible.plugins.action import ActionBase
-
-try:
- from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
- AnsibleArgSpecValidator,
- )
-except ImportError:
- ANSIBLE_UTILS_IS_INSTALLED = False
-else:
- ANSIBLE_UTILS_IS_INSTALLED = True
-from ansible.errors import AnsibleActionFail
-from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
- ISESDK,
- ise_argument_spec,
-)
-
-# Get common arguements specification
-argument_spec = ise_argument_spec()
-# Add arguments specific for this module
-argument_spec.update(dict(
- payload=dict(type="list"),
-))
-
-required_if = []
-required_one_of = []
-mutually_exclusive = []
-required_together = []
-
-
-class ActionModule(ActionBase):
- def __init__(self, *args, **kwargs):
- if not ANSIBLE_UTILS_IS_INSTALLED:
- raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
- super(ActionModule, self).__init__(*args, **kwargs)
- self._supports_async = False
- self._supports_check_mode = False
- self._result = None
-
- # Checks the supplied parameters against the argument spec for this module
- def _check_argspec(self):
- aav = AnsibleArgSpecValidator(
- data=self._task.args,
- schema=dict(argument_spec=argument_spec),
- schema_format="argspec",
- schema_conditionals=dict(
- required_if=required_if,
- required_one_of=required_one_of,
- mutually_exclusive=mutually_exclusive,
- required_together=required_together,
- ),
- name=self._task.action,
- )
- valid, errors, self._task.args = aav.validate()
- if not valid:
- raise AnsibleActionFail(errors)
-
- def get_object(self, params):
- new_object = dict(
- payload=params.get("payload"),
- )
- return new_object
-
- def run(self, tmp=None, task_vars=None):
- self._task.diff = False
- self._result = super(ActionModule, self).run(tmp, task_vars)
- self._result["changed"] = False
- self._check_argspec()
-
- ise = ISESDK(params=self._task.args)
-
- response = ise.exec(
- family="virtual_network",
- function="bulk_delete_virtual_networks",
- params=self.get_object(self._task.args),
- ).response
-
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_update.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_update.py
deleted file mode 100644
index 4b37b3318..000000000
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_update.py
+++ /dev/null
@@ -1,88 +0,0 @@
-#!/usr/bin/env python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-from __future__ import absolute_import, division, print_function
-
-__metaclass__ = type
-from ansible.plugins.action import ActionBase
-
-try:
- from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
- AnsibleArgSpecValidator,
- )
-except ImportError:
- ANSIBLE_UTILS_IS_INSTALLED = False
-else:
- ANSIBLE_UTILS_IS_INSTALLED = True
-from ansible.errors import AnsibleActionFail
-from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
- ISESDK,
- ise_argument_spec,
-)
-
-# Get common arguements specification
-argument_spec = ise_argument_spec()
-# Add arguments specific for this module
-argument_spec.update(dict(
- payload=dict(type="list"),
-))
-
-required_if = []
-required_one_of = []
-mutually_exclusive = []
-required_together = []
-
-
-class ActionModule(ActionBase):
- def __init__(self, *args, **kwargs):
- if not ANSIBLE_UTILS_IS_INSTALLED:
- raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
- super(ActionModule, self).__init__(*args, **kwargs)
- self._supports_async = False
- self._supports_check_mode = False
- self._result = None
-
- # Checks the supplied parameters against the argument spec for this module
- def _check_argspec(self):
- aav = AnsibleArgSpecValidator(
- data=self._task.args,
- schema=dict(argument_spec=argument_spec),
- schema_format="argspec",
- schema_conditionals=dict(
- required_if=required_if,
- required_one_of=required_one_of,
- mutually_exclusive=mutually_exclusive,
- required_together=required_together,
- ),
- name=self._task.action,
- )
- valid, errors, self._task.args = aav.validate()
- if not valid:
- raise AnsibleActionFail(errors)
-
- def get_object(self, params):
- new_object = dict(
- payload=params.get("payload"),
- )
- return new_object
-
- def run(self, tmp=None, task_vars=None):
- self._task.diff = False
- self._result = super(ActionModule, self).run(tmp, task_vars)
- self._result["changed"] = False
- self._check_argspec()
-
- ise = ISESDK(params=self._task.args)
-
- response = ise.exec(
- family="virtual_network",
- function="bulk_update_virtual_networks",
- params=self.get_object(self._task.args),
- ).response
-
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_info.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_info.py
deleted file mode 100644
index 0029067ea..000000000
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_info.py
+++ /dev/null
@@ -1,141 +0,0 @@
-#!/usr/bin/env python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-from __future__ import absolute_import, division, print_function
-
-__metaclass__ = type
-from ansible.plugins.action import ActionBase
-
-try:
- from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
- AnsibleArgSpecValidator,
- )
-except ImportError:
- ANSIBLE_UTILS_IS_INSTALLED = False
-else:
- ANSIBLE_UTILS_IS_INSTALLED = True
-from ansible.errors import AnsibleActionFail
-from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
- ISESDK,
- ise_argument_spec,
-)
-
-# Get common arguements specification
-argument_spec = ise_argument_spec()
-# Add arguments specific for this module
-argument_spec.update(dict(
- page=dict(type="int"),
- size=dict(type="int"),
- sort=dict(type="str"),
- sortBy=dict(type="str"),
- filter=dict(type="list"),
- filterType=dict(type="str"),
- id=dict(type="str"),
-))
-
-required_if = []
-required_one_of = []
-mutually_exclusive = []
-required_together = []
-
-
-class ActionModule(ActionBase):
- def __init__(self, *args, **kwargs):
- if not ANSIBLE_UTILS_IS_INSTALLED:
- raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
- super(ActionModule, self).__init__(*args, **kwargs)
- self._supports_async = False
- self._supports_check_mode = True
- self._result = None
-
- # Checks the supplied parameters against the argument spec for this module
- def _check_argspec(self):
- aav = AnsibleArgSpecValidator(
- data=self._task.args,
- schema=dict(argument_spec=argument_spec),
- schema_format="argspec",
- schema_conditionals=dict(
- required_if=required_if,
- required_one_of=required_one_of,
- mutually_exclusive=mutually_exclusive,
- required_together=required_together,
- ),
- name=self._task.action,
- )
- valid, errors, self._task.args = aav.validate()
- if not valid:
- raise AnsibleActionFail(errors)
-
- def get_object(self, params):
- new_object = dict(
- page=params.get("page"),
- size=params.get("size"),
- sort=params.get("sort"),
- sort_by=params.get("sortBy"),
- filter=params.get("filter"),
- filter_type=params.get("filterType"),
- id=params.get("id"),
- )
- return new_object
-
- def run(self, tmp=None, task_vars=None):
- self._task.diff = False
- self._result = super(ActionModule, self).run(tmp, task_vars)
- self._result["changed"] = False
- self._check_argspec()
-
- self._result.update(dict(ise_response=[]))
-
- ise = ISESDK(params=self._task.args)
-
- id = self._task.args.get("id")
- name = self._task.args.get("name")
- if id:
- response = ise.exec(
- family="virtual_network",
- function='get_virtual_network_by_id',
- params=self.get_object(self._task.args)
- ).response['response']
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
- if not name and not id:
- responses = []
- generator = ise.exec(
- family="virtual_network",
- function='get_virtual_networks_generator',
- params=self.get_object(self._task.args),
- )
- try:
- for item in generator:
- tmp_response = item.response['response']
- if isinstance(tmp_response, list):
- responses += tmp_response
- else:
- responses.append(tmp_response)
- response = responses
- except (TypeError, AttributeError) as e:
- ise.fail_json(
- msg=(
- "An error occured when executing operation."
- " Check the configuration of your API Settings and API Gateway settings on your ISE server."
- " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled."
- " You may want to enable the (ise_debug: True) argument."
- " The error was: {error}"
- ).format(error=e)
- )
- except Exception as e:
- ise.fail_json(
- msg=(
- "An error occured when executing operation."
- " The error was: {error}"
- " You may want to enable the (ise_debug: True) argument."
- ).format(error=e)
- )
-
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_create.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_create.py
deleted file mode 100644
index 361916f3a..000000000
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_create.py
+++ /dev/null
@@ -1,88 +0,0 @@
-#!/usr/bin/env python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-from __future__ import absolute_import, division, print_function
-
-__metaclass__ = type
-from ansible.plugins.action import ActionBase
-
-try:
- from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
- AnsibleArgSpecValidator,
- )
-except ImportError:
- ANSIBLE_UTILS_IS_INSTALLED = False
-else:
- ANSIBLE_UTILS_IS_INSTALLED = True
-from ansible.errors import AnsibleActionFail
-from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
- ISESDK,
- ise_argument_spec,
-)
-
-# Get common arguements specification
-argument_spec = ise_argument_spec()
-# Add arguments specific for this module
-argument_spec.update(dict(
- payload=dict(type="list"),
-))
-
-required_if = []
-required_one_of = []
-mutually_exclusive = []
-required_together = []
-
-
-class ActionModule(ActionBase):
- def __init__(self, *args, **kwargs):
- if not ANSIBLE_UTILS_IS_INSTALLED:
- raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
- super(ActionModule, self).__init__(*args, **kwargs)
- self._supports_async = False
- self._supports_check_mode = False
- self._result = None
-
- # Checks the supplied parameters against the argument spec for this module
- def _check_argspec(self):
- aav = AnsibleArgSpecValidator(
- data=self._task.args,
- schema=dict(argument_spec=argument_spec),
- schema_format="argspec",
- schema_conditionals=dict(
- required_if=required_if,
- required_one_of=required_one_of,
- mutually_exclusive=mutually_exclusive,
- required_together=required_together,
- ),
- name=self._task.action,
- )
- valid, errors, self._task.args = aav.validate()
- if not valid:
- raise AnsibleActionFail(errors)
-
- def get_object(self, params):
- new_object = dict(
- payload=params.get("payload"),
- )
- return new_object
-
- def run(self, tmp=None, task_vars=None):
- self._task.diff = False
- self._result = super(ActionModule, self).run(tmp, task_vars)
- self._result["changed"] = False
- self._check_argspec()
-
- ise = ISESDK(params=self._task.args)
-
- response = ise.exec(
- family="vn_vlan_mapping",
- function="bulk_create_vn_vlan_mappings",
- params=self.get_object(self._task.args),
- ).response
-
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py
deleted file mode 100644
index 6cb9d9353..000000000
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py
+++ /dev/null
@@ -1,88 +0,0 @@
-#!/usr/bin/env python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-from __future__ import absolute_import, division, print_function
-
-__metaclass__ = type
-from ansible.plugins.action import ActionBase
-
-try:
- from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
- AnsibleArgSpecValidator,
- )
-except ImportError:
- ANSIBLE_UTILS_IS_INSTALLED = False
-else:
- ANSIBLE_UTILS_IS_INSTALLED = True
-from ansible.errors import AnsibleActionFail
-from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
- ISESDK,
- ise_argument_spec,
-)
-
-# Get common arguements specification
-argument_spec = ise_argument_spec()
-# Add arguments specific for this module
-argument_spec.update(dict(
- payload=dict(type="list"),
-))
-
-required_if = []
-required_one_of = []
-mutually_exclusive = []
-required_together = []
-
-
-class ActionModule(ActionBase):
- def __init__(self, *args, **kwargs):
- if not ANSIBLE_UTILS_IS_INSTALLED:
- raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
- super(ActionModule, self).__init__(*args, **kwargs)
- self._supports_async = False
- self._supports_check_mode = False
- self._result = None
-
- # Checks the supplied parameters against the argument spec for this module
- def _check_argspec(self):
- aav = AnsibleArgSpecValidator(
- data=self._task.args,
- schema=dict(argument_spec=argument_spec),
- schema_format="argspec",
- schema_conditionals=dict(
- required_if=required_if,
- required_one_of=required_one_of,
- mutually_exclusive=mutually_exclusive,
- required_together=required_together,
- ),
- name=self._task.action,
- )
- valid, errors, self._task.args = aav.validate()
- if not valid:
- raise AnsibleActionFail(errors)
-
- def get_object(self, params):
- new_object = dict(
- payload=params.get("payload"),
- )
- return new_object
-
- def run(self, tmp=None, task_vars=None):
- self._task.diff = False
- self._result = super(ActionModule, self).run(tmp, task_vars)
- self._result["changed"] = False
- self._check_argspec()
-
- ise = ISESDK(params=self._task.args)
-
- response = ise.exec(
- family="vn_vlan_mapping",
- function="bulk_delete_vn_vlan_mappings",
- params=self.get_object(self._task.args),
- ).response
-
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_update.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_update.py
deleted file mode 100644
index fa6f11edd..000000000
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_update.py
+++ /dev/null
@@ -1,88 +0,0 @@
-#!/usr/bin/env python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-from __future__ import absolute_import, division, print_function
-
-__metaclass__ = type
-from ansible.plugins.action import ActionBase
-
-try:
- from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
- AnsibleArgSpecValidator,
- )
-except ImportError:
- ANSIBLE_UTILS_IS_INSTALLED = False
-else:
- ANSIBLE_UTILS_IS_INSTALLED = True
-from ansible.errors import AnsibleActionFail
-from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
- ISESDK,
- ise_argument_spec,
-)
-
-# Get common arguements specification
-argument_spec = ise_argument_spec()
-# Add arguments specific for this module
-argument_spec.update(dict(
- payload=dict(type="list"),
-))
-
-required_if = []
-required_one_of = []
-mutually_exclusive = []
-required_together = []
-
-
-class ActionModule(ActionBase):
- def __init__(self, *args, **kwargs):
- if not ANSIBLE_UTILS_IS_INSTALLED:
- raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
- super(ActionModule, self).__init__(*args, **kwargs)
- self._supports_async = False
- self._supports_check_mode = False
- self._result = None
-
- # Checks the supplied parameters against the argument spec for this module
- def _check_argspec(self):
- aav = AnsibleArgSpecValidator(
- data=self._task.args,
- schema=dict(argument_spec=argument_spec),
- schema_format="argspec",
- schema_conditionals=dict(
- required_if=required_if,
- required_one_of=required_one_of,
- mutually_exclusive=mutually_exclusive,
- required_together=required_together,
- ),
- name=self._task.action,
- )
- valid, errors, self._task.args = aav.validate()
- if not valid:
- raise AnsibleActionFail(errors)
-
- def get_object(self, params):
- new_object = dict(
- payload=params.get("payload"),
- )
- return new_object
-
- def run(self, tmp=None, task_vars=None):
- self._task.diff = False
- self._result = super(ActionModule, self).run(tmp, task_vars)
- self._result["changed"] = False
- self._check_argspec()
-
- ise = ISESDK(params=self._task.args)
-
- response = ise.exec(
- family="vn_vlan_mapping",
- function="bulk_update_vn_vlan_mappings",
- params=self.get_object(self._task.args),
- ).response
-
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_info.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_info.py
deleted file mode 100644
index f99235f74..000000000
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_info.py
+++ /dev/null
@@ -1,141 +0,0 @@
-#!/usr/bin/env python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-from __future__ import absolute_import, division, print_function
-
-__metaclass__ = type
-from ansible.plugins.action import ActionBase
-
-try:
- from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
- AnsibleArgSpecValidator,
- )
-except ImportError:
- ANSIBLE_UTILS_IS_INSTALLED = False
-else:
- ANSIBLE_UTILS_IS_INSTALLED = True
-from ansible.errors import AnsibleActionFail
-from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
- ISESDK,
- ise_argument_spec,
-)
-
-# Get common arguements specification
-argument_spec = ise_argument_spec()
-# Add arguments specific for this module
-argument_spec.update(dict(
- page=dict(type="int"),
- size=dict(type="int"),
- sort=dict(type="str"),
- sortBy=dict(type="str"),
- filter=dict(type="list"),
- filterType=dict(type="str"),
- id=dict(type="str"),
-))
-
-required_if = []
-required_one_of = []
-mutually_exclusive = []
-required_together = []
-
-
-class ActionModule(ActionBase):
- def __init__(self, *args, **kwargs):
- if not ANSIBLE_UTILS_IS_INSTALLED:
- raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
- super(ActionModule, self).__init__(*args, **kwargs)
- self._supports_async = False
- self._supports_check_mode = True
- self._result = None
-
- # Checks the supplied parameters against the argument spec for this module
- def _check_argspec(self):
- aav = AnsibleArgSpecValidator(
- data=self._task.args,
- schema=dict(argument_spec=argument_spec),
- schema_format="argspec",
- schema_conditionals=dict(
- required_if=required_if,
- required_one_of=required_one_of,
- mutually_exclusive=mutually_exclusive,
- required_together=required_together,
- ),
- name=self._task.action,
- )
- valid, errors, self._task.args = aav.validate()
- if not valid:
- raise AnsibleActionFail(errors)
-
- def get_object(self, params):
- new_object = dict(
- page=params.get("page"),
- size=params.get("size"),
- sort=params.get("sort"),
- sort_by=params.get("sortBy"),
- filter=params.get("filter"),
- filter_type=params.get("filterType"),
- id=params.get("id"),
- )
- return new_object
-
- def run(self, tmp=None, task_vars=None):
- self._task.diff = False
- self._result = super(ActionModule, self).run(tmp, task_vars)
- self._result["changed"] = False
- self._check_argspec()
-
- self._result.update(dict(ise_response=[]))
-
- ise = ISESDK(params=self._task.args)
-
- id = self._task.args.get("id")
- name = self._task.args.get("name")
- if id:
- response = ise.exec(
- family="vn_vlan_mapping",
- function='get_vn_vlan_mapping_by_id',
- params=self.get_object(self._task.args)
- ).response['response']
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
- if not name and not id:
- responses = []
- generator = ise.exec(
- family="vn_vlan_mapping",
- function='get_vn_vlan_mappings_generator',
- params=self.get_object(self._task.args),
- )
- try:
- for item in generator:
- tmp_response = item.response['response']
- if isinstance(tmp_response, list):
- responses += tmp_response
- else:
- responses.append(tmp_response)
- response = responses
- except (TypeError, AttributeError) as e:
- ise.fail_json(
- msg=(
- "An error occured when executing operation."
- " Check the configuration of your API Settings and API Gateway settings on your ISE server."
- " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled."
- " You may want to enable the (ise_debug: True) argument."
- " The error was: {error}"
- ).format(error=e)
- )
- except Exception as e:
- ise.fail_json(
- msg=(
- "An error occured when executing operation."
- " The error was: {error}"
- " You may want to enable the (ise_debug: True) argument."
- ).format(error=e)
- )
-
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
diff --git a/ansible_collections/cisco/ise/plugins/doc_fragments/module.py b/ansible_collections/cisco/ise/plugins/doc_fragments/module.py
index dfb7ad90a..c115588b3 100644
--- a/ansible_collections/cisco/ise/plugins/doc_fragments/module.py
+++ b/ansible_collections/cisco/ise/plugins/doc_fragments/module.py
@@ -65,6 +65,12 @@ options:
type: bool
default: false
version_added: '3.0.0'
+ ise_single_request_timeout:
+ description:
+ - Timeout (in seconds) for RESTful HTTP requests.
+ type: int
+ default: 60
+ version_added: '3.0.0'
notes:
- "Does not support C(check_mode)"
- "The plugin runs on the control node and does not use any ansible connection plugins, but instead the embedded connection manager from Cisco ISE SDK"
diff --git a/ansible_collections/cisco/ise/plugins/doc_fragments/module_info.py b/ansible_collections/cisco/ise/plugins/doc_fragments/module_info.py
index 57e385ca6..baae22540 100644
--- a/ansible_collections/cisco/ise/plugins/doc_fragments/module_info.py
+++ b/ansible_collections/cisco/ise/plugins/doc_fragments/module_info.py
@@ -65,6 +65,12 @@ options:
type: bool
default: false
version_added: '3.0.0'
+ ise_single_request_timeout:
+ description:
+ - Timeout (in seconds) for RESTful HTTP requests.
+ type: int
+ default: 60
+ version_added: '3.0.0'
notes:
- "Supports C(check_mode)"
- "The plugin runs on the control node and does not use any ansible connection plugins, but instead the embedded connection manager from Cisco ISE SDK"
diff --git a/ansible_collections/cisco/ise/plugins/modules/aci_bindings_info.py b/ansible_collections/cisco/ise/plugins/modules/aci_bindings_info.py
index d08c9ebfb..b8d1afa37 100644
--- a/ansible_collections/cisco/ise/plugins/modules/aci_bindings_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/aci_bindings_info.py
@@ -43,7 +43,7 @@ options:
elements: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/aci_settings.py b/ansible_collections/cisco/ise/plugins/modules/aci_settings.py
index 3c6e5f13b..b338f5888 100644
--- a/ansible_collections/cisco/ise/plugins/modules/aci_settings.py
+++ b/ansible_collections/cisco/ise/plugins/modules/aci_settings.py
@@ -87,7 +87,7 @@ options:
description: ACI Settings's untaggedPacketIepgName.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/aci_settings_info.py b/ansible_collections/cisco/ise/plugins/modules/aci_settings_info.py
index 5884b4728..61bad7bbe 100644
--- a/ansible_collections/cisco/ise/plugins/modules/aci_settings_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/aci_settings_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/aci_test_connectivity.py b/ansible_collections/cisco/ise/plugins/modules/aci_test_connectivity.py
index 5608cde0c..61d13bf89 100644
--- a/ansible_collections/cisco/ise/plugins/modules/aci_test_connectivity.py
+++ b/ansible_collections/cisco/ise/plugins/modules/aci_test_connectivity.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory.py b/ansible_collections/cisco/ise/plugins/modules/active_directory.py
index 5fa9d41bf..0cc8e53ec 100644
--- a/ansible_collections/cisco/ise/plugins/modules/active_directory.py
+++ b/ansible_collections/cisco/ise/plugins/modules/active_directory.py
@@ -191,7 +191,7 @@ options:
alphanumeric and .-_/\\ characters.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_add_groups.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_add_groups.py
index 298a05eb7..729454376 100644
--- a/ansible_collections/cisco/ise/plugins/modules/active_directory_add_groups.py
+++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_add_groups.py
@@ -190,7 +190,7 @@ options:
alphanumeric and .-_/\\ characters.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_groups_by_domain_info.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_groups_by_domain_info.py
index 46dd9467c..f0925183c 100644
--- a/ansible_collections/cisco/ise/plugins/modules/active_directory_groups_by_domain_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_groups_by_domain_info.py
@@ -32,7 +32,7 @@ options:
type: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
@@ -74,7 +74,7 @@ ise_response:
{
"groups": [
{
- "groupName": "string",
+ "name": "string",
"sid": "string",
"type": "string"
}
diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_info.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_info.py
index 5291dfc12..d8e4db519 100644
--- a/ansible_collections/cisco/ise/plugins/modules/active_directory_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_is_user_member_of_group_info.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_is_user_member_of_group_info.py
index 2584e6f50..5fbe56eb9 100644
--- a/ansible_collections/cisco/ise/plugins/modules/active_directory_is_user_member_of_group_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_is_user_member_of_group_info.py
@@ -32,7 +32,7 @@ options:
type: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
@@ -70,7 +70,7 @@ ise_response:
{
"groups": [
{
- "groupName": "string",
+ "name": "string",
"sid": "string",
"type": "string"
}
diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain.py
index b07f435ce..6782bb235 100644
--- a/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain.py
+++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain.py
@@ -31,7 +31,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain_with_all_nodes.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain_with_all_nodes.py
index bc2e30553..6dc4da875 100644
--- a/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain_with_all_nodes.py
+++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain_with_all_nodes.py
@@ -31,7 +31,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain.py
index 26d847184..4f1e46c87 100644
--- a/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain.py
+++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain.py
@@ -31,7 +31,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain_with_all_nodes.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain_with_all_nodes.py
index 787103629..7359c6151 100644
--- a/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain_with_all_nodes.py
+++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain_with_all_nodes.py
@@ -31,7 +31,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_trusted_domains_info.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_trusted_domains_info.py
index 748478d72..6974288ac 100644
--- a/ansible_collections/cisco/ise/plugins/modules/active_directory_trusted_domains_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_trusted_domains_info.py
@@ -21,7 +21,7 @@ options:
- Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_user_groups_info.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_user_groups_info.py
index 78692e0fc..2df9027f7 100644
--- a/ansible_collections/cisco/ise/plugins/modules/active_directory_user_groups_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_user_groups_info.py
@@ -32,7 +32,7 @@ options:
type: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
@@ -67,7 +67,7 @@ ise_response:
{
"groups": [
{
- "groupName": "string",
+ "name": "string",
"sid": "string",
"type": "string"
}
diff --git a/ansible_collections/cisco/ise/plugins/modules/admin_user_info.py b/ansible_collections/cisco/ise/plugins/modules/admin_user_info.py
index 23c7bc99b..cf793e354 100644
--- a/ansible_collections/cisco/ise/plugins/modules/admin_user_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/admin_user_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/allowed_protocols.py b/ansible_collections/cisco/ise/plugins/modules/allowed_protocols.py
index 6a9d3868e..88fa594b4 100644
--- a/ansible_collections/cisco/ise/plugins/modules/allowed_protocols.py
+++ b/ansible_collections/cisco/ise/plugins/modules/allowed_protocols.py
@@ -310,7 +310,7 @@ options:
type: bool
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/allowed_protocols_info.py b/ansible_collections/cisco/ise/plugins/modules/allowed_protocols_info.py
index 69241303d..84b86e5e9 100644
--- a/ansible_collections/cisco/ise/plugins/modules/allowed_protocols_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/allowed_protocols_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_apply.py b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_apply.py
index ebb530e2e..f1fde8079 100644
--- a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_apply.py
+++ b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_apply.py
@@ -28,7 +28,7 @@ options:
type: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_monitor_status_info.py
index 64b14136c..2615a8aff 100644
--- a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_request.py
index f2d1971d1..3e9037107 100644
--- a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: ANC Endpoint Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_clear.py b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_clear.py
index 371f16a2b..1117dafa2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_clear.py
+++ b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_clear.py
@@ -28,7 +28,7 @@ options:
type: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_info.py b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_info.py
index 8a198d96c..5a58c8f22 100644
--- a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_policy.py b/ansible_collections/cisco/ise/plugins/modules/anc_policy.py
index 67ae179e9..a49bc949f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/anc_policy.py
+++ b/ansible_collections/cisco/ise/plugins/modules/anc_policy.py
@@ -33,7 +33,7 @@ options:
description: ANC Policy's name.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_monitor_status_info.py
index 1a3f9c081..285529a89 100644
--- a/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_request.py
index 0161c722a..ea2e59efc 100644
--- a/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: ANC Policy Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_policy_info.py b/ansible_collections/cisco/ise/plugins/modules/anc_policy_info.py
index 904267a31..21051ffdf 100644
--- a/ansible_collections/cisco/ise/plugins/modules/anc_policy_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/anc_policy_info.py
@@ -71,7 +71,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/authorization_profile.py b/ansible_collections/cisco/ise/plugins/modules/authorization_profile.py
index b00dd4aa1..75587110f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/authorization_profile.py
+++ b/ansible_collections/cisco/ise/plugins/modules/authorization_profile.py
@@ -174,7 +174,7 @@ options:
type: str
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/authorization_profile_info.py b/ansible_collections/cisco/ise/plugins/modules/authorization_profile_info.py
index c4b89790a..2b0f7bfcb 100644
--- a/ansible_collections/cisco/ise/plugins/modules/authorization_profile_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/authorization_profile_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/backup_cancel.py b/ansible_collections/cisco/ise/plugins/modules/backup_cancel.py
index 421c086d1..11176958d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/backup_cancel.py
+++ b/ansible_collections/cisco/ise/plugins/modules/backup_cancel.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Backup And Restore
diff --git a/ansible_collections/cisco/ise/plugins/modules/backup_config.py b/ansible_collections/cisco/ise/plugins/modules/backup_config.py
index ce5a43eb3..ef5a51df3 100644
--- a/ansible_collections/cisco/ise/plugins/modules/backup_config.py
+++ b/ansible_collections/cisco/ise/plugins/modules/backup_config.py
@@ -31,7 +31,7 @@ options:
get copied.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Backup And Restore
diff --git a/ansible_collections/cisco/ise/plugins/modules/backup_last_status_info.py b/ansible_collections/cisco/ise/plugins/modules/backup_last_status_info.py
index 9b176d705..7d22a9314 100644
--- a/ansible_collections/cisco/ise/plugins/modules/backup_last_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/backup_last_status_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Backup And Restore
diff --git a/ansible_collections/cisco/ise/plugins/modules/backup_restore.py b/ansible_collections/cisco/ise/plugins/modules/backup_restore.py
index 1480f8d65..908059a00 100644
--- a/ansible_collections/cisco/ise/plugins/modules/backup_restore.py
+++ b/ansible_collections/cisco/ise/plugins/modules/backup_restore.py
@@ -30,7 +30,7 @@ options:
true, false.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Backup And Restore
diff --git a/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config.py b/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config.py
index 74ab9ab7b..e994d04d2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config.py
+++ b/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config.py
@@ -57,7 +57,7 @@ options:
description: Backup Schedule Config's weekDay.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Backup And Restore
diff --git a/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config_update.py b/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config_update.py
index 9babddc26..a8ce5bb2a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config_update.py
+++ b/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config_update.py
@@ -57,7 +57,7 @@ options:
description: Backup Schedule Config Update's weekDay.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Backup And Restore
diff --git a/ansible_collections/cisco/ise/plugins/modules/bind_signed_certificate.py b/ansible_collections/cisco/ise/plugins/modules/bind_signed_certificate.py
index 74576e8c5..1dcccb2b8 100644
--- a/ansible_collections/cisco/ise/plugins/modules/bind_signed_certificate.py
+++ b/ansible_collections/cisco/ise/plugins/modules/bind_signed_certificate.py
@@ -68,7 +68,7 @@ options:
description: Validate Certificate Extensions.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/byod_portal.py b/ansible_collections/cisco/ise/plugins/modules/byod_portal.py
index c3b77fada..b6073d0f9 100644
--- a/ansible_collections/cisco/ise/plugins/modules/byod_portal.py
+++ b/ansible_collections/cisco/ise/plugins/modules/byod_portal.py
@@ -259,7 +259,7 @@ options:
type: dict
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/byod_portal_info.py b/ansible_collections/cisco/ise/plugins/modules/byod_portal_info.py
index ed187dfab..530eae753 100644
--- a/ansible_collections/cisco/ise/plugins/modules/byod_portal_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/byod_portal_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/certificate_profile.py b/ansible_collections/cisco/ise/plugins/modules/certificate_profile.py
index dcddcd19b..da2bb18b7 100644
--- a/ansible_collections/cisco/ise/plugins/modules/certificate_profile.py
+++ b/ansible_collections/cisco/ise/plugins/modules/certificate_profile.py
@@ -51,7 +51,7 @@ options:
- an option only in AD).
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/certificate_profile_info.py b/ansible_collections/cisco/ise/plugins/modules/certificate_profile_info.py
index d996fb146..ff5eac756 100644
--- a/ansible_collections/cisco/ise/plugins/modules/certificate_profile_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/certificate_profile_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/certificate_template_info.py b/ansible_collections/cisco/ise/plugins/modules/certificate_template_info.py
index 4d6d0d183..580e85c1a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/certificate_template_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/certificate_template_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/configuration.py b/ansible_collections/cisco/ise/plugins/modules/configuration.py
new file mode 100644
index 000000000..1c551c299
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/configuration.py
@@ -0,0 +1,71 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: configuration
+short_description: Resource module for Configuration
+description:
+- Manage operation update of the resource Configuration.
+- API to enable/disable LSD settings.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module
+author: Rafael Campos (@racampos)
+options:
+ enableEPO:
+ description: To enable/disable LSD ownership settings.
+ type: bool
+ enableRCM:
+ description: To enable/disable random mac(RCM) settings. Please note that this flag
+ will be set to false if enableEPO flag is false.
+ type: bool
+requirements:
+- ciscoisesdk >= 2.1.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ configuration.Configuration.update_configuration,
+
+ - Paths used are
+ put /api/v1/lsd/updateLsdSettings,
+
+"""
+
+EXAMPLES = r"""
+- name: Update all
+ cisco.ise.configuration:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ state: present
+ enableEPO: true
+ enableRCM: true
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "enableEPO": true,
+ "enableRCM": true
+ }
+
+ise_update_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "enableEPO": true,
+ "enableRCM": true
+ }
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/configuration_info.py b/ansible_collections/cisco/ise/plugins/modules/configuration_info.py
new file mode 100644
index 000000000..6a942dedf
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/configuration_info.py
@@ -0,0 +1,51 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: configuration_info
+short_description: Information module for Configuration
+description:
+- Get all Configuration.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module_info
+author: Rafael Campos (@racampos)
+options: {}
+requirements:
+- ciscoisesdk >= 2.1.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ configuration.Configuration.get_configuration,
+
+ - Paths used are
+ get /api/v1/lsd/updateLsdSettings,
+
+"""
+
+EXAMPLES = r"""
+- name: Get all Configuration
+ cisco.ise.configuration_info:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ register: result
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "enableEPO": true,
+ "enableRCM": true
+ }
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/connector_config.py b/ansible_collections/cisco/ise/plugins/modules/connector_config.py
new file mode 100644
index 000000000..b374012b1
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/connector_config.py
@@ -0,0 +1,305 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: connector_config
+short_description: Resource module for Connector Config
+description:
+- Manage operations create, update and delete of the resource Connector Config.
+- EDDA - Configure connectorconfig information.
+- EDDA - Delete Configure connectorConfig information based on ConnectorName.
+- EDDA - update Configure connectorConfig information based on ConnectorName.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module
+author: Rafael Campos (@racampos)
+options:
+ additionalProperties:
+ description: Connector Config's additionalProperties.
+ type: dict
+ attributes:
+ description: ConnectorName.
+ suboptions:
+ attributeMapping:
+ description: <p>List of feature names</p>.
+ elements: dict
+ suboptions:
+ dictionaryAttribute:
+ description: Connector Config's dictionaryAttribute.
+ type: str
+ includeInDictionary:
+ description: IncludeInDictionary flag.
+ type: bool
+ jsonAttribute:
+ description: Connector Config's jsonAttribute.
+ type: str
+ type: list
+ bulkUniqueIdentifier:
+ description: Uniqueness to identify.
+ type: str
+ topLevelObject:
+ description: Root level of json.
+ type: str
+ uniqueIdentifier:
+ description: Uniqueness to identify.
+ type: str
+ versionIdentifier:
+ description: Version uniqueness to identify.
+ type: str
+ type: dict
+ connectorName:
+ description: ConnectorName.
+ type: str
+ connectorType:
+ description: Connector Type list.
+ type: str
+ deltasyncSchedule:
+ description: Connector Config's deltasyncSchedule.
+ suboptions:
+ interval:
+ description: Run at interval (hours).
+ type: int
+ intervalUnit:
+ description: Interval Units.
+ type: str
+ startDate:
+ description: Start date and Time.
+ type: str
+ type: dict
+ description:
+ description: Description.
+ type: str
+ enabled:
+ description: Enabled flag.
+ type: bool
+ fullsyncSchedule:
+ description: Connector Config's fullsyncSchedule.
+ suboptions:
+ interval:
+ description: Run at interval (hours).
+ type: int
+ intervalUnit:
+ description: Interval Units.
+ type: str
+ startDate:
+ description: Start date and Time.
+ type: str
+ type: dict
+ protocol:
+ description: Protocol.
+ type: str
+ skipCertificateValidations:
+ description: SkipCertificateValidations flag.
+ type: bool
+ url:
+ description: Connector Config's url.
+ suboptions:
+ accessKey:
+ description: Accesskey.
+ type: str
+ authenticationType:
+ description: Authentication Type list.
+ type: str
+ bulkUrl:
+ description: BulkUrl.
+ type: str
+ clientId:
+ description: Clientid.
+ type: str
+ clientSecret:
+ description: Clientsecret.
+ type: str
+ incrementalUrl:
+ description: IncrementalUrl.
+ type: str
+ password:
+ description: Password.
+ type: str
+ refreshToken:
+ description: Refreshtoken.
+ type: str
+ tokenHeader:
+ description: TokenHeader.
+ type: str
+ userName:
+ description: UserName.
+ type: str
+ type: dict
+requirements:
+- ciscoisesdk >= 2.0.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ edda.Edda.create_connector_config,
+ edda.Edda.delete_connector_config_by_connector_name,
+ edda.Edda.update_connector_config_by_connector_name,
+
+ - Paths used are
+ post /api/v1/edda/connector-config,
+ delete /api/v1/edda/connector-config/{connectorName},
+ put /api/v1/edda/connector-config/{connectorName},
+
+"""
+
+EXAMPLES = r"""
+- name: Create
+ cisco.ise.connector_config:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ state: present
+ additionalProperties: {}
+ attributes:
+ attributeMapping:
+ - dictionaryAttribute: string
+ includeInDictionary: true
+ jsonAttribute: string
+ bulkUniqueIdentifier: string
+ topLevelObject: string
+ uniqueIdentifier: string
+ versionIdentifier: string
+ connectorName: string
+ connectorType: string
+ deltasyncSchedule:
+ interval: 0
+ intervalUnit: string
+ startDate: string
+ description: string
+ enabled: true
+ fullsyncSchedule:
+ interval: 0
+ intervalUnit: string
+ startDate: string
+ protocol: string
+ skipCertificateValidations: true
+ url:
+ accessKey: string
+ authenticationType: string
+ bulkUrl: string
+ clientId: string
+ clientSecret: string
+ incrementalUrl: string
+ password: string
+ refreshToken: string
+ tokenHeader: string
+ userName: string
+
+- name: Update by name
+ cisco.ise.connector_config:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ state: present
+ additionalProperties: {}
+ attributes:
+ attributeMapping:
+ - dictionaryAttribute: string
+ includeInDictionary: true
+ jsonAttribute: string
+ bulkUniqueIdentifier: string
+ topLevelObject: string
+ uniqueIdentifier: string
+ versionIdentifier: string
+ connectorName: string
+ connectorType: string
+ deltasyncSchedule:
+ interval: 0
+ intervalUnit: string
+ startDate: string
+ description: string
+ enabled: true
+ fullsyncSchedule:
+ interval: 0
+ intervalUnit: string
+ startDate: string
+ protocol: string
+ skipCertificateValidations: true
+ url:
+ accessKey: string
+ authenticationType: string
+ bulkUrl: string
+ clientId: string
+ clientSecret: string
+ incrementalUrl: string
+ password: string
+ refreshToken: string
+ tokenHeader: string
+ userName: string
+
+- name: Delete by name
+ cisco.ise.connector_config:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ state: absent
+ connectorName: string
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "connector": {
+ "additionalProperties": {},
+ "attributes": {
+ "attributeMapping": [
+ {
+ "dictionaryAttribute": "string",
+ "includeInDictionary": true,
+ "jsonAttribute": "string"
+ }
+ ],
+ "bulkUniqueIdentifier": "string",
+ "topLevelObject": "string",
+ "uniqueIdentifier": "string",
+ "versionIdentifier": "string"
+ },
+ "connectorName": "string",
+ "connectorType": "string",
+ "deltasyncSchedule": {
+ "interval": 0,
+ "intervalUnit": "string",
+ "startDate": "string"
+ },
+ "description": "string",
+ "enabled": true,
+ "fullsyncSchedule": {
+ "interval": 0,
+ "intervalUnit": "string",
+ "startDate": "string"
+ },
+ "protocol": "string",
+ "skipCertificateValidations": true,
+ "url": {
+ "accessKey": "string",
+ "authenticationType": "string",
+ "bulkUrl": "string",
+ "clientId": "string",
+ "clientSecret": "string",
+ "incrementalUrl": "string",
+ "password": "string",
+ "refreshToken": "string",
+ "tokenHeader": "string",
+ "userName": "string"
+ }
+ }
+ }
+
+ise_update_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: str
+ sample: >
+ "'string'"
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/connector_config_info.py b/ansible_collections/cisco/ise/plugins/modules/connector_config_info.py
new file mode 100644
index 000000000..698dd2fd7
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/connector_config_info.py
@@ -0,0 +1,111 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: connector_config_info
+short_description: Information module for Connector Config
+description:
+- Get all Connector Config.
+- Get Connector Config by name.
+- EDDA - Get ALL connectorConfig information.
+- EDDA - Get connectorConfig information based on ConnectorName.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module_info
+author: Rafael Campos (@racampos)
+options:
+ connectorName:
+ description:
+ - ConnectorName path parameter. Update or delete or retrieve the connector config.
+ type: str
+requirements:
+- ciscoisesdk >= 2.0.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ edda.Edda.get_connector_config,
+ edda.Edda.get_connector_config_by_connector_name,
+
+ - Paths used are
+ get /api/v1/edda/connector-config,
+ get /api/v1/edda/connector-config/{connectorName},
+
+"""
+
+EXAMPLES = r"""
+- name: Get all Connector Config
+ cisco.ise.connector_config_info:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ register: result
+
+- name: Get Connector Config by name
+ cisco.ise.connector_config_info:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ connectorName: string
+ register: result
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "connector": {
+ "additionalProperties": {},
+ "attributes": {
+ "attributeMapping": [
+ {
+ "dictionaryAttribute": "string",
+ "includeInDictionary": true,
+ "jsonAttribute": "string"
+ }
+ ],
+ "bulkUniqueIdentifier": "string",
+ "topLevelObject": "string",
+ "uniqueIdentifier": "string",
+ "versionIdentifier": "string"
+ },
+ "connectorName": "string",
+ "connectorType": "string",
+ "deltasyncSchedule": {
+ "interval": 0,
+ "intervalUnit": "string",
+ "startDate": "string"
+ },
+ "description": "string",
+ "enabled": true,
+ "fullsyncSchedule": {
+ "interval": 0,
+ "intervalUnit": "string",
+ "startDate": "string"
+ },
+ "protocol": "string",
+ "skipCertificateValidations": true,
+ "url": {
+ "accessKey": "string",
+ "authenticationType": "string",
+ "bulkUrl": "string",
+ "clientId": "string",
+ "clientSecret": "string",
+ "incrementalUrl": "string",
+ "password": "string",
+ "refreshToken": "string",
+ "tokenHeader": "string",
+ "userName": "string"
+ }
+ }
+ }
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/csr_delete.py b/ansible_collections/cisco/ise/plugins/modules/csr_delete.py
index 13d1f134d..0fc26c12b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/csr_delete.py
+++ b/ansible_collections/cisco/ise/plugins/modules/csr_delete.py
@@ -10,7 +10,7 @@ module: csr_delete
short_description: Resource module for CSR Delete
description:
- Manage operation delete of the resource CSR Delete.
-- This API deletes a Certificate Signing Request of a particular node based on given HostName and ID.
+- This API deletes the certificate signing request of a particular node based on a given hostname and ID.
version_added: '1.0.0'
extends_documentation_fragment:
- cisco.ise.module
@@ -24,7 +24,7 @@ options:
description: Id path parameter. ID of the Certificate Signing Request to be deleted.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/csr_export_info.py b/ansible_collections/cisco/ise/plugins/modules/csr_export_info.py
index a1f8b85e1..4cadca891 100644
--- a/ansible_collections/cisco/ise/plugins/modules/csr_export_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/csr_export_info.py
@@ -37,7 +37,7 @@ options:
- The filename used to save the download file.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/csr_generate.py b/ansible_collections/cisco/ise/plugins/modules/csr_generate.py
index 3116b3802..3d769adc0 100644
--- a/ansible_collections/cisco/ise/plugins/modules/csr_generate.py
+++ b/ansible_collections/cisco/ise/plugins/modules/csr_generate.py
@@ -76,7 +76,7 @@ options:
description: CSR Generate's usedFor.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/csr_generate_intermediate_ca.py b/ansible_collections/cisco/ise/plugins/modules/csr_generate_intermediate_ca.py
index f7eaaf20d..b8727a777 100644
--- a/ansible_collections/cisco/ise/plugins/modules/csr_generate_intermediate_ca.py
+++ b/ansible_collections/cisco/ise/plugins/modules/csr_generate_intermediate_ca.py
@@ -10,14 +10,14 @@ module: csr_generate_intermediate_ca
short_description: Resource module for CSR Generate Intermediate CA
description:
- Manage operation create of the resource CSR Generate Intermediate CA.
-- CSR Generation for Intermediate Certificates.
+- CSR generation for Intermediate Certificates.
version_added: '1.0.0'
extends_documentation_fragment:
- cisco.ise.module
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/csr_info.py b/ansible_collections/cisco/ise/plugins/modules/csr_info.py
index 6dee74b16..3ccee98ed 100644
--- a/ansible_collections/cisco/ise/plugins/modules/csr_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/csr_info.py
@@ -69,7 +69,7 @@ options:
- Id path parameter. ID of the Certificate Signing Request returned.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/dataconnect_info.py b/ansible_collections/cisco/ise/plugins/modules/dataconnect_info.py
new file mode 100644
index 000000000..3c213e44c
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/dataconnect_info.py
@@ -0,0 +1,54 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: dataconnect_info
+short_description: Information module for Dataconnect Info
+description:
+- Get all Dataconnect Info.
+- This API retrieves the Dataconnect ODBC details.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module_info
+author: Rafael Campos (@racampos)
+options: {}
+requirements:
+- ciscoisesdk >= 2.1.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ dataconnect_services.DataconnectServices.get_odbc_detail,
+
+ - Paths used are
+ get /api/v1/mnt/data-connect/details,
+
+"""
+
+EXAMPLES = r"""
+- name: Get all Dataconnect Info
+ cisco.ise.dataconnect_info:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ register: result
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "hostname": "string",
+ "port": 0,
+ "servicename": "string",
+ "username": "string"
+ }
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_info.py b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_info.py
new file mode 100644
index 000000000..cbb6aff7e
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_info.py
@@ -0,0 +1,54 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: dataconnect_settings_info
+short_description: Information module for Dataconnect Settings
+description:
+- Get all Dataconnect Settings.
+- This API retrieves the status of the Dataconnect feature.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module_info
+author: Rafael Campos (@racampos)
+options: {}
+requirements:
+- ciscoisesdk >= 2.1.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ dataconnect_services.DataconnectServices.get_dataconnect_service,
+
+ - Paths used are
+ get /api/v1/mnt/data-connect/settings,
+
+"""
+
+EXAMPLES = r"""
+- name: Get all Dataconnect Settings
+ cisco.ise.dataconnect_settings_info:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ register: result
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "isEnabled": true,
+ "isPasswordChanged": true,
+ "passwordExpiresInDays": 0,
+ "passwordExpiresOn": "string"
+ }
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password.py b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password.py
new file mode 100644
index 000000000..4f731bf44
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password.py
@@ -0,0 +1,60 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: dataconnect_settings_password
+short_description: Resource module for Dataconnect Settings Password
+description:
+- Manage operation update of the resource Dataconnect Settings Password.
+- This API updates the Dataconnect user password.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module
+author: Rafael Campos (@racampos)
+options:
+ password:
+ description: 'Password for dataconnect user. Password must satisfy the following
+ criteria - Contains at least one uppercase letter A-Z, Contains at least one lowercase
+ letter a-z, Contains at least one digit 0-9, Contains at least one special character
+ #$%&*+,-. ;=?^_~, Has at least 12 characters, Has not more than 30 characters.'
+ type: str
+requirements:
+- ciscoisesdk >= 2.1.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ dataconnect_services.DataconnectServices.update_dataconnect_password,
+
+ - Paths used are
+ put /api/v1/mnt/data-connect/settings/password,
+
+"""
+
+EXAMPLES = r"""
+- name: Update all
+ cisco.ise.dataconnect_settings_password:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ password: string
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "success": {
+ "message": "string"
+ },
+ "version": "string"
+ }
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password_expiry.py b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password_expiry.py
new file mode 100644
index 000000000..ec4897b57
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password_expiry.py
@@ -0,0 +1,57 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: dataconnect_settings_password_expiry
+short_description: Resource module for Dataconnect Settings Password Expiry
+description:
+- Manage operation update of the resource Dataconnect Settings Password Expiry.
+- This API updates the number of days of Dataconnect password expiry.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module
+author: Rafael Campos (@racampos)
+options:
+ passwordExpiresInDays:
+ description: Dataconnect Settings Password Expiry's passwordExpiresInDays.
+ type: int
+requirements:
+- ciscoisesdk >= 2.1.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ dataconnect_services.DataconnectServices.update_dataconnect_password_expiry,
+
+ - Paths used are
+ put /api/v1/mnt/data-connect/settings/password/expiry,
+
+"""
+
+EXAMPLES = r"""
+- name: Update all
+ cisco.ise.dataconnect_settings_password_expiry:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ passwordExpiresInDays: 0
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "success": {
+ "message": "string"
+ },
+ "version": "string"
+ }
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_delete.py b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_status.py
index 88fa0ce86..f782455ec 100644
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_delete.py
+++ b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_status.py
@@ -6,44 +6,39 @@
DOCUMENTATION = r"""
---
-module: trustsec_vn_bulk_delete
-short_description: Resource module for Trustsec VN Bulk Delete
+module: dataconnect_settings_status
+short_description: Resource module for Dataconnect Settings Status
description:
-- Manage operation create of the resource Trustsec VN Bulk Delete.
-version_added: '2.0.0'
+- Manage operation update of the resource Dataconnect Settings Status.
+- This API updates the DataConnect feature status.
+version_added: '2.8.0'
extends_documentation_fragment:
- cisco.ise.module
author: Rafael Campos (@racampos)
options:
- payload:
- description: Trustsec VN Bulk Delete's payload.
- elements: str
- type: list
+ isEnabled:
+ description: IsEnabled flag.
+ type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for virtualNetwork
- description: Complete reference of the virtualNetwork API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
notes:
- SDK Method used are
- virtual_network.VirtualNetwork.bulk_delete_virtual_networks,
+ dataconnect_services.DataconnectServices.set_data_connect_service,
- Paths used are
- post /api/v1/trustsec/virtualnetwork/bulk/delete,
+ put /api/v1/mnt/data-connect/settings/status,
"""
EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_vn_bulk_delete:
+- name: Update all
+ cisco.ise.dataconnect_settings_status:
ise_hostname: "{{ise_hostname}}"
ise_username: "{{ise_username}}"
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
- payload:
- - string
+ isEnabled: true
"""
@@ -54,6 +49,9 @@ ise_response:
type: dict
sample: >
{
- "id": "string"
+ "success": {
+ "message": "string"
+ },
+ "version": "string"
}
"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/deployment_info.py b/ansible_collections/cisco/ise/plugins/modules/deployment_info.py
index bc2f70749..f09b21d69 100644
--- a/ansible_collections/cisco/ise/plugins/modules/deployment_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/deployment_info.py
@@ -21,7 +21,7 @@ options:
- How long to wait for the server to send data before giving up.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for PullDeploymentInfo
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_reset_hitcount.py
index a238380a1..c65a26ede 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_reset_hitcount.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_reset_hitcount.py
@@ -20,7 +20,7 @@ options:
description: PolicyId path parameter. Policy id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Authentication Rules
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules.py
index 29c2db6d3..e0a283492 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules.py
@@ -21,6 +21,9 @@ options:
id:
description: Id path parameter. Rule id.
type: str
+ identitySourceId:
+ description: Identity source id from the identity stores.
+ type: str
identitySourceName:
description: Identity source name from the identity stores.
type: str
@@ -56,6 +59,9 @@ options:
condition:
description: Device Administration Authentication Rules's condition.
suboptions:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -102,11 +108,12 @@ options:
that additional conditions are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Device Administration Authentication Rules's endDate.
@@ -116,11 +123,12 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Device Administration Authentication Rules's endDate.
@@ -140,8 +148,8 @@ options:
type: str
hoursRange:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Authentication Rules's endTime.
@@ -152,8 +160,8 @@ options:
type: dict
hoursRangeException:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Authentication Rules's endTime.
@@ -221,7 +229,7 @@ options:
type: str
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Authentication Rules
@@ -248,6 +256,7 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ identitySourceId: string
identitySourceName: string
ifAuthFail: string
ifProcessFail: string
@@ -259,6 +268,7 @@ EXAMPLES = r"""
policyId: string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -311,6 +321,7 @@ EXAMPLES = r"""
ise_verify: "{{ise_verify}}"
state: present
id: string
+ identitySourceId: string
identitySourceName: string
ifAuthFail: string
ifProcessFail: string
@@ -322,6 +333,7 @@ EXAMPLES = r"""
policyId: string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -385,6 +397,7 @@ ise_response:
type: dict
sample: >
{
+ "identitySourceId": "string",
"identitySourceName": "string",
"ifAuthFail": "string",
"ifProcessFail": "string",
@@ -407,6 +420,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
@@ -462,6 +476,7 @@ ise_update_response:
sample: >
{
"response": {
+ "identitySourceId": "string",
"identitySourceName": "string",
"ifAuthFail": "string",
"ifProcessFail": "string",
@@ -484,6 +499,7 @@ ise_update_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules_info.py
index 3e0dfce6a..6e02cd5b6 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules_info.py
@@ -27,7 +27,7 @@ options:
- Id path parameter. Rule id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Authentication Rules
@@ -73,6 +73,7 @@ ise_response:
type: dict
sample: >
{
+ "identitySourceId": "string",
"identitySourceName": "string",
"ifAuthFail": "string",
"ifProcessFail": "string",
@@ -95,6 +96,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_reset_hitcount.py
index a34b3aec1..b2d3dbb1f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_reset_hitcount.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_reset_hitcount.py
@@ -20,7 +20,7 @@ options:
description: PolicyId path parameter. Policy id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Authorization Rules
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules.py
index 1e5058c66..a762b3923 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules.py
@@ -52,6 +52,9 @@ options:
condition:
description: Device Administration Authorization Rules's condition.
suboptions:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -98,11 +101,12 @@ options:
that additional conditions are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Device Administration Authorization Rules's endDate.
@@ -112,11 +116,12 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Device Administration Authorization Rules's endDate.
@@ -136,8 +141,8 @@ options:
type: str
hoursRange:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Authorization Rules's endTime.
@@ -148,8 +153,8 @@ options:
type: dict
hoursRangeException:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Authorization Rules's endTime.
@@ -217,7 +222,7 @@ options:
type: str
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Authorization Rules
@@ -254,6 +259,7 @@ EXAMPLES = r"""
profile: string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -316,6 +322,7 @@ EXAMPLES = r"""
profile: string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -401,6 +408,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
@@ -478,6 +486,7 @@ ise_update_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules_info.py
index 8c5f6de1f..8e01d1e0d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules_info.py
@@ -27,7 +27,7 @@ options:
- Id path parameter. Rule id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Authorization Rules
@@ -95,6 +95,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_command_set_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_command_set_info.py
index 23aa5817f..46a9cfcfe 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_command_set_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_command_set_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Command Set
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions.py
index 9db7c229a..e1d2a666f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions.py
@@ -20,6 +20,9 @@ extends_documentation_fragment:
- cisco.ise.module
author: Rafael Campos (@racampos)
options:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -65,11 +68,11 @@ options:
are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used for
- start/end date <br> Default - no specific dates<br> In order to reset the dates
- to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
- = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched or
+ NOT matched if used in exceptionDates prooperty<br> Options are - Date range,
+ for specific date, the same date should be used for start/end date <br> Default
+ - no specific dates<br> In order to reset the dates to have no specific dates
+ Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>.
suboptions:
endDate:
description: Device Administration Conditions's endDate.
@@ -79,11 +82,11 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used for
- start/end date <br> Default - no specific dates<br> In order to reset the dates
- to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
- = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched or
+ NOT matched if used in exceptionDates prooperty<br> Options are - Date range,
+ for specific date, the same date should be used for start/end date <br> Default
+ - no specific dates<br> In order to reset the dates to have no specific dates
+ Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>.
suboptions:
endDate:
description: Device Administration Conditions's endDate.
@@ -102,8 +105,9 @@ options:
description: Dictionary value.
type: str
hoursRange:
- description: <p>Defines for which hours a TimeAndDate condition will be matched<br>
- Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
+ description: <p>Defines for which hours a TimeAndDate condition will be matched
+ or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h
+ = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Conditions's endTime.
@@ -113,8 +117,9 @@ options:
type: str
type: dict
hoursRangeException:
- description: <p>Defines for which hours a TimeAndDate condition will be matched<br>
- Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
+ description: <p>Defines for which hours a TimeAndDate condition will be matched
+ or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h
+ = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Conditions's endTime.
@@ -159,7 +164,7 @@ options:
elements: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Conditions
@@ -190,6 +195,7 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -235,6 +241,7 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -289,6 +296,7 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -356,6 +364,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
@@ -414,6 +423,7 @@ ise_update_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authentication_rule_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authentication_rule_info.py
index 073e3b888..f071af305 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authentication_rule_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authentication_rule_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Conditions
@@ -63,6 +63,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authorization_rule_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authorization_rule_info.py
index e2db57818..1fa414c1a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authorization_rule_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authorization_rule_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Conditions
@@ -63,6 +63,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_policy_set_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_policy_set_info.py
index c5add18be..6264730c2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_policy_set_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_policy_set_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Conditions
@@ -63,6 +63,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_info.py
index 90657433a..5fbeeac28 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_info.py
@@ -29,7 +29,7 @@ options:
- Id path parameter. Condition id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Conditions
@@ -95,6 +95,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authentication_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authentication_info.py
index c603181b9..efcca2198 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authentication_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authentication_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Dictionary Attributes List
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authorization_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authorization_info.py
index f1685f1ae..90c278c57 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authorization_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authorization_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Dictionary Attributes List
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_policy_set_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_policy_set_info.py
index 74afbb5d2..14aaba870 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_policy_set_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_policy_set_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Dictionary Attributes List
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules.py
index 6bdd2efe6..a6fb8c2b8 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules.py
@@ -49,6 +49,9 @@ options:
condition:
description: Device Administration Global Exception Rules's condition.
suboptions:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -95,11 +98,12 @@ options:
that additional conditions are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Device Administration Global Exception Rules's endDate.
@@ -109,11 +113,12 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Device Administration Global Exception Rules's endDate.
@@ -133,8 +138,8 @@ options:
type: str
hoursRange:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Global Exception Rules's endTime.
@@ -145,8 +150,8 @@ options:
type: dict
hoursRangeException:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Global Exception Rules's endTime.
@@ -214,7 +219,7 @@ options:
type: str
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Authorization Global Exception Rules
@@ -250,6 +255,7 @@ EXAMPLES = r"""
profile: string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -311,6 +317,7 @@ EXAMPLES = r"""
profile: string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -395,6 +402,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
@@ -472,6 +480,7 @@ ise_update_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_info.py
index 27f969f61..98b4bf506 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_info.py
@@ -23,7 +23,7 @@ options:
- Id path parameter. Rule id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Authorization Global Exception Rules
@@ -89,6 +89,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_reset_hitcount.py
index 7a7e1a82a..066bbaf1f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_reset_hitcount.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_reset_hitcount.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Authorization Global Exception Rules
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_identity_stores_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_identity_stores_info.py
index a0556f723..b870c7121 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_identity_stores_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_identity_stores_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Identity Stores
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules.py
index 92fe6d8dc..9b86cab32 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules.py
@@ -52,6 +52,9 @@ options:
condition:
description: Device Administration Local Exception Rules's condition.
suboptions:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -98,11 +101,12 @@ options:
that additional conditions are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Device Administration Local Exception Rules's endDate.
@@ -112,11 +116,12 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Device Administration Local Exception Rules's endDate.
@@ -136,8 +141,8 @@ options:
type: str
hoursRange:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Local Exception Rules's endTime.
@@ -148,8 +153,8 @@ options:
type: dict
hoursRangeException:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Local Exception Rules's endTime.
@@ -217,7 +222,7 @@ options:
type: str
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Authorization Exception Rules
@@ -254,6 +259,7 @@ EXAMPLES = r"""
profile: string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -316,6 +322,7 @@ EXAMPLES = r"""
profile: string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -401,6 +408,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
@@ -478,6 +486,7 @@ ise_update_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_info.py
index cb1cd9142..953ab8564 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_info.py
@@ -27,7 +27,7 @@ options:
- Id path parameter. Rule id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Authorization Exception Rules
@@ -95,6 +95,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_reset_hitcount.py
index 8211eb18a..b549075f4 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_reset_hitcount.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_reset_hitcount.py
@@ -20,7 +20,7 @@ options:
description: PolicyId path parameter. Policy id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Authorization Exception Rules
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions.py
index 30ade1ac5..67c802d16 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions.py
@@ -18,75 +18,37 @@ extends_documentation_fragment:
- cisco.ise.module
author: Rafael Campos (@racampos)
options:
+ cliDnisList:
+ description: <p>This field should contain a Caller ID (CLI), comma, and Called ID
+ (DNIS).<br> Line format - Caller ID (CLI), Called ID (DNIS)</p>.
+ elements: str
+ type: list
conditionType:
description: This field determines the content of the conditions field.
type: str
- conditions:
- description: Device Administration Network Conditions's conditions.
- elements: dict
- suboptions:
- cliDnisList:
- description: <p>This field should contain a Caller ID (CLI), comma, and Called
- ID (DNIS).<br> Line format - Caller ID (CLI), Called ID (DNIS)</p>.
- elements: str
- type: list
- conditionType:
- description: This field determines the content of the conditions field.
- type: str
- description:
- description: Device Administration Network Conditions's description.
- type: str
- deviceGroupList:
- description: <p>This field should contain a tuple with NDG Root, comma, and
- an NDG (that it under the root).<br> Line format - NDG Root Name, NDG, Port</p>.
- elements: str
- type: list
- deviceList:
- description: <p>This field should contain Device-Name,port-number. The device
- name must be the same as the name field in a Network Device object.<br> Line
- format - Device Name,Port</p>.
- elements: str
- type: list
- id:
- description: Device Administration Network Conditions's id.
- type: str
- ipAddrList:
- description: <p>This field should contain IP-address-or-subnet,port number<br>
- IP address can be IPV4 format (n.n.n.n) or IPV6 format (n n n n n n n n).<br>
- IP subnet can be IPV4 format (n.n.n.n/m) or IPV6 format (n n n n n n n n/m).<br>
- Line format - IP Address or subnet,Port</p>.
- elements: str
- type: list
- link:
- description: Device Administration Network Conditions's link.
- suboptions:
- href:
- description: Device Administration Network Conditions's href.
- type: str
- rel:
- description: Device Administration Network Conditions's rel.
- type: str
- type:
- description: Device Administration Network Conditions's type.
- type: str
- type: dict
- macAddrList:
- description: <p>This field should contain Endstation MAC address, comma, and
- Destination MAC addresses.<br> Each Max address must include twelve hexadecimal
- digits using formats nn nn nn nn nn nn or nn-nn-nn-nn-nn-nn or nnnn.nnnn.nnnn
- or nnnnnnnnnnnn.<br> Line format - Endstation MAC,Destination MAC </p>.
- elements: str
- type: list
- name:
- description: Network Condition name.
- type: str
- type: list
description:
description: Device Administration Network Conditions's description.
type: str
+ deviceGroupList:
+ description: <p>This field should contain a tuple with NDG Root, comma, and an NDG
+ (that it under the root).<br> Line format - NDG Root Name, NDG, Port</p>.
+ elements: str
+ type: list
+ deviceList:
+ description: <p>This field should contain Device Name. The device name must be the
+ same as the name field in a Network Device object. Line format - Device Name</p>.
+ elements: str
+ type: list
id:
description: Device Administration Network Conditions's id.
type: str
+ ipAddrList:
+ description: <p>This field should contain IP address or subnet.<br> IP address can
+ be IPV4 format (n.n.n.n) or IPV6 format (n n n n n n n n).<br> IP subnet can be
+ IPV4 format (n.n.n.n/m) or IPV6 format (n n n n n n n n/m).<br> Line format -
+ IP Address or subnet</p>.
+ elements: str
+ type: list
link:
description: Device Administration Network Conditions's link.
suboptions:
@@ -100,11 +62,18 @@ options:
description: Device Administration Network Conditions's type.
type: str
type: dict
+ macAddrList:
+ description: <p>This field should contain Endstation MAC address, comma, and Destination
+ MAC addresses.<br> Each Max address must include twelve hexadecimal digits using
+ formats nn nn nn nn nn nn or nn-nn-nn-nn-nn-nn or nnnn.nnnn.nnnn or nnnnnnnnnnnn.<br>
+ Line format - Endstation MAC,Destination MAC </p>.
+ elements: str
+ type: list
name:
description: Network Condition name.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Network Conditions
@@ -131,32 +100,23 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ cliDnisList:
+ - string
conditionType: string
- conditions:
- - cliDnisList:
- - string
- conditionType: string
- description: string
- deviceGroupList:
- - string
- deviceList:
- - string
- id: string
- ipAddrList:
- - string
- link:
- href: string
- rel: string
- type: string
- macAddrList:
- - string
- name: string
description: string
+ deviceGroupList:
+ - string
+ deviceList:
+ - string
id: string
+ ipAddrList:
+ - string
link:
href: string
rel: string
type: string
+ macAddrList:
+ - string
name: string
- name: Update by id
@@ -166,32 +126,23 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ cliDnisList:
+ - string
conditionType: string
- conditions:
- - cliDnisList:
- - string
- conditionType: string
- description: string
- deviceGroupList:
- - string
- deviceList:
- - string
- id: string
- ipAddrList:
- - string
- link:
- href: string
- rel: string
- type: string
- macAddrList:
- - string
- name: string
description: string
+ deviceGroupList:
+ - string
+ deviceList:
+ - string
id: string
+ ipAddrList:
+ - string
link:
href: string
rel: string
type: string
+ macAddrList:
+ - string
name: string
- name: Delete by id
@@ -221,33 +172,20 @@ ise_response:
"type": "string"
},
"name": "string",
- "conditions": [
- {
- "cliDnisList": [
- "string"
- ],
- "conditionType": "string",
- "description": "string",
- "id": "string",
- "ipAddrList": [
- "string"
- ],
- "link": {
- "href": "string",
- "rel": "string",
- "type": "string"
- },
- "macAddrList": [
- "string"
- ],
- "name": "string",
- "deviceGroupList": [
- "string"
- ],
- "deviceList": [
- "string"
- ]
- }
+ "deviceList": [
+ "string"
+ ],
+ "cliDnisList": [
+ "string"
+ ],
+ "ipAddrList": [
+ "string"
+ ],
+ "macAddrList": [
+ "string"
+ ],
+ "deviceGroupList": [
+ "string"
]
}
@@ -268,33 +206,20 @@ ise_update_response:
"type": "string"
},
"name": "string",
- "conditions": [
- {
- "cliDnisList": [
- "string"
- ],
- "conditionType": "string",
- "description": "string",
- "id": "string",
- "ipAddrList": [
- "string"
- ],
- "link": {
- "href": "string",
- "rel": "string",
- "type": "string"
- },
- "macAddrList": [
- "string"
- ],
- "name": "string",
- "deviceGroupList": [
- "string"
- ],
- "deviceList": [
- "string"
- ]
- }
+ "deviceList": [
+ "string"
+ ],
+ "cliDnisList": [
+ "string"
+ ],
+ "ipAddrList": [
+ "string"
+ ],
+ "macAddrList": [
+ "string"
+ ],
+ "deviceGroupList": [
+ "string"
]
},
"version": "string"
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions_info.py
index 318e50bb8..59c2eb239 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions_info.py
@@ -23,7 +23,7 @@ options:
- Id path parameter. Condition id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Network Conditions
@@ -76,33 +76,20 @@ ise_response:
"type": "string"
},
"name": "string",
- "conditions": [
- {
- "cliDnisList": [
- "string"
- ],
- "conditionType": "string",
- "description": "string",
- "id": "string",
- "ipAddrList": [
- "string"
- ],
- "link": {
- "href": "string",
- "rel": "string",
- "type": "string"
- },
- "macAddrList": [
- "string"
- ],
- "name": "string",
- "deviceGroupList": [
- "string"
- ],
- "deviceList": [
- "string"
- ]
- }
+ "deviceList": [
+ "string"
+ ],
+ "cliDnisList": [
+ "string"
+ ],
+ "ipAddrList": [
+ "string"
+ ],
+ "macAddrList": [
+ "string"
+ ],
+ "deviceGroupList": [
+ "string"
]
}
"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set.py
index b6db2058a..fb0f769a1 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set.py
@@ -21,6 +21,9 @@ options:
condition:
description: Device Administration Policy Set's condition.
suboptions:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -66,11 +69,11 @@ options:
additional conditions are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have no
+ specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>.
suboptions:
endDate:
description: Device Administration Policy Set's endDate.
@@ -80,11 +83,11 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have no
+ specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>.
suboptions:
endDate:
description: Device Administration Policy Set's endDate.
@@ -103,8 +106,9 @@ options:
description: Dictionary value.
type: str
hoursRange:
- description: <p>Defines for which hours a TimeAndDate condition will be matched<br>
- Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
+ description: <p>Defines for which hours a TimeAndDate condition will be matched
+ or not matched if used in exceptionHours property<br> Time foramt - hh mm
+ ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Policy Set's endTime.
@@ -114,8 +118,9 @@ options:
type: str
type: dict
hoursRangeException:
- description: <p>Defines for which hours a TimeAndDate condition will be matched<br>
- Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
+ description: <p>Defines for which hours a TimeAndDate condition will be matched
+ or not matched if used in exceptionHours property<br> Time foramt - hh mm
+ ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Policy Set's endTime.
@@ -205,7 +210,7 @@ options:
matched.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Policy Set
@@ -233,6 +238,7 @@ EXAMPLES = r"""
ise_verify: "{{ise_verify}}"
state: present
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -292,6 +298,7 @@ EXAMPLES = r"""
ise_verify: "{{ise_verify}}"
state: present
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -373,6 +380,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
@@ -447,6 +455,7 @@ ise_update_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_info.py
index c6894900b..fb996df50 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_info.py
@@ -23,7 +23,7 @@ options:
- Id path parameter. Policy id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Policy Set
@@ -79,6 +79,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_reset_hitcount.py
index 88893a0d7..609e0b122 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_reset_hitcount.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_reset_hitcount.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Policy Set
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_profiles_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_profiles_info.py
index 2a72e4e98..2aba7c1bd 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_profiles_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_profiles_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Profiles
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_service_names_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_service_names_info.py
index 0cd8de91e..77a27332f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_service_names_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_service_names_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Service Names
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions.py
index 0e115d18a..c5326d8cb 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions.py
@@ -18,6 +18,9 @@ extends_documentation_fragment:
- cisco.ise.module
author: Rafael Campos (@racampos)
options:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -63,11 +66,11 @@ options:
are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used for
- start/end date <br> Default - no specific dates<br> In order to reset the dates
- to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
- = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched or
+ NOT matched if used in exceptionDates prooperty<br> Options are - Date range,
+ for specific date, the same date should be used for start/end date <br> Default
+ - no specific dates<br> In order to reset the dates to have no specific dates
+ Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>.
suboptions:
endDate:
description: Device Administration Time Date Conditions's endDate.
@@ -77,11 +80,11 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used for
- start/end date <br> Default - no specific dates<br> In order to reset the dates
- to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
- = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched or
+ NOT matched if used in exceptionDates prooperty<br> Options are - Date range,
+ for specific date, the same date should be used for start/end date <br> Default
+ - no specific dates<br> In order to reset the dates to have no specific dates
+ Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>.
suboptions:
endDate:
description: Device Administration Time Date Conditions's endDate.
@@ -100,8 +103,9 @@ options:
description: Dictionary value.
type: str
hoursRange:
- description: <p>Defines for which hours a TimeAndDate condition will be matched<br>
- Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
+ description: <p>Defines for which hours a TimeAndDate condition will be matched
+ or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h
+ = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Time Date Conditions's endTime.
@@ -111,8 +115,9 @@ options:
type: str
type: dict
hoursRangeException:
- description: <p>Defines for which hours a TimeAndDate condition will be matched<br>
- Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
+ description: <p>Defines for which hours a TimeAndDate condition will be matched
+ or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h
+ = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Time Date Conditions's endTime.
@@ -157,7 +162,7 @@ options:
elements: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Time/Date Conditions
@@ -184,6 +189,7 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -229,6 +235,7 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ attributeId: string
attributeName: string
attributeValue: string
children:
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions_info.py
index 55a513840..26c796202 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions_info.py
@@ -23,7 +23,7 @@ options:
- Id path parameter. Condition id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Time/Date Conditions
diff --git a/ansible_collections/cisco/ise/plugins/modules/dictionary_references_info.py b/ansible_collections/cisco/ise/plugins/modules/dictionary_references_info.py
new file mode 100644
index 000000000..85bb07b7b
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/dictionary_references_info.py
@@ -0,0 +1,49 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: dictionary_references_info
+short_description: Information module for Dictionary References Info
+description:
+- Get all Dictionary References Info.
+- EDDA - Get a map of references to EDDA dictionaries.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module_info
+author: Rafael Campos (@racampos)
+options: {}
+requirements:
+- ciscoisesdk >= 2.0.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ edda.Edda.get_edda_dictionary_references,
+
+ - Paths used are
+ get /api/v1/edda/dictionary-references,
+
+"""
+
+EXAMPLES = r"""
+- name: Get all Dictionary References Info
+ cisco.ise.dictionary_references_info:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ register: result
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {}
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/downloadable_acl.py b/ansible_collections/cisco/ise/plugins/modules/downloadable_acl.py
index 213fcdbd8..f4cd77e29 100644
--- a/ansible_collections/cisco/ise/plugins/modules/downloadable_acl.py
+++ b/ansible_collections/cisco/ise/plugins/modules/downloadable_acl.py
@@ -35,7 +35,7 @@ options:
characters _.-.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/downloadable_acl_info.py b/ansible_collections/cisco/ise/plugins/modules/downloadable_acl_info.py
index 3931cddac..cb35f5056 100644
--- a/ansible_collections/cisco/ise/plugins/modules/downloadable_acl_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/downloadable_acl_info.py
@@ -31,7 +31,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell.py
index ac0e06b76..15af377c6 100644
--- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell.py
+++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell.py
@@ -44,7 +44,7 @@ options:
description: Egress Matrix Cell's sourceSGtId.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_monitor_status_info.py
index a24a81b0a..716e9dad9 100644
--- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_request.py
index 88df775ee..dd45607d6 100644
--- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: Egress Matrix Cell Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clear_all.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clear_all.py
index 3e3253397..d5edb3ede 100644
--- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clear_all.py
+++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clear_all.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clone.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clone.py
index 7dd4fda31..90483a2ea 100644
--- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clone.py
+++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clone.py
@@ -26,7 +26,7 @@ options:
description: SrcSGtId path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_info.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_info.py
index eeb4655a8..309b8f242 100644
--- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_set_all_status.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_set_all_status.py
index 1f416034c..ca6f394eb 100644
--- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_set_all_status.py
+++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_set_all_status.py
@@ -20,7 +20,7 @@ options:
description: Status path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint.py b/ansible_collections/cisco/ise/plugins/modules/endpoint.py
index 74db5cd17..d6c3db64f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/endpoint.py
+++ b/ansible_collections/cisco/ise/plugins/modules/endpoint.py
@@ -102,7 +102,7 @@ options:
description: StaticProfileAssignment flag.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
@@ -147,6 +147,7 @@ EXAMPLES = r"""
mdmReachable: true
mdmSerial: string
mdmServerName: string
+ name: string
portalUser: string
profileId: string
staticGroupAssignment: true
@@ -189,6 +190,7 @@ EXAMPLES = r"""
mdmReachable: true
mdmSerial: string
mdmServerName: string
+ name: string
portalUser: string
profileId: string
staticGroupAssignment: true
diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_monitor_status_info.py
index 520910f40..920378939 100644
--- a/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_request.py
index dafe2a80c..f74c5d1f6 100644
--- a/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: Endpoint Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_certificate.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_certificate.py
index 8f31278f4..be6995cbb 100644
--- a/ansible_collections/cisco/ise/plugins/modules/endpoint_certificate.py
+++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_certificate.py
@@ -48,7 +48,7 @@ options:
description: Enable or disable automatic file creation of raw response.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for EndpointCertificate
diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_deregister.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_deregister.py
index 2835d630e..53f050168 100644
--- a/ansible_collections/cisco/ise/plugins/modules/endpoint_deregister.py
+++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_deregister.py
@@ -20,7 +20,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_get_rejected_endpoints_info.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_get_rejected_endpoints_info.py
index a99a9c024..7507f3e70 100644
--- a/ansible_collections/cisco/ise/plugins/modules/endpoint_get_rejected_endpoints_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_get_rejected_endpoints_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_group.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_group.py
index 95dd6f659..bf2cf58b8 100644
--- a/ansible_collections/cisco/ise/plugins/modules/endpoint_group.py
+++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_group.py
@@ -31,7 +31,7 @@ options:
description: SystemDefined flag.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for EndpointIdentityGroup
diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_group_info.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_group_info.py
index 89823b7c6..0850f50a4 100644
--- a/ansible_collections/cisco/ise/plugins/modules/endpoint_group_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_group_info.py
@@ -71,7 +71,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for EndpointIdentityGroup
diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_info.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_info.py
index 01587f8b7..88a81827d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/endpoint_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_info.py
@@ -71,7 +71,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_register.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_register.py
index 139631d20..8807a6b11 100644
--- a/ansible_collections/cisco/ise/plugins/modules/endpoint_register.py
+++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_register.py
@@ -100,7 +100,7 @@ options:
description: StaticProfileAssignment flag.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_release_rejected_endpoint.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_release_rejected_endpoint.py
index 82888e4e8..e86e63d9a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/endpoint_release_rejected_endpoint.py
+++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_release_rejected_endpoint.py
@@ -20,7 +20,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/external_radius_server.py b/ansible_collections/cisco/ise/plugins/modules/external_radius_server.py
index 50d1ff071..0c16d8c98 100644
--- a/ansible_collections/cisco/ise/plugins/modules/external_radius_server.py
+++ b/ansible_collections/cisco/ise/plugins/modules/external_radius_server.py
@@ -67,7 +67,7 @@ options:
description: Valid Range 1 to 120.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/external_radius_server_info.py b/ansible_collections/cisco/ise/plugins/modules/external_radius_server_info.py
index 8b597d056..98bb7c155 100644
--- a/ansible_collections/cisco/ise/plugins/modules/external_radius_server_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/external_radius_server_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/filter_policy.py b/ansible_collections/cisco/ise/plugins/modules/filter_policy.py
index 9a23b0c1f..c7b3f5696 100644
--- a/ansible_collections/cisco/ise/plugins/modules/filter_policy.py
+++ b/ansible_collections/cisco/ise/plugins/modules/filter_policy.py
@@ -35,7 +35,7 @@ options:
description: Virtual Network. At least one of subnet or sgt or vn should be defined.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/filter_policy_info.py b/ansible_collections/cisco/ise/plugins/modules/filter_policy_info.py
index 01f9c6e74..486c4c0f4 100644
--- a/ansible_collections/cisco/ise/plugins/modules/filter_policy_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/filter_policy_info.py
@@ -31,7 +31,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_location_info.py b/ansible_collections/cisco/ise/plugins/modules/guest_location_info.py
index 2c82fa379..98f77ab17 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_location_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_location_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings.py b/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings.py
index 10910f02a..1f7fc6f17 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings.py
@@ -54,7 +54,7 @@ options:
description: Username of Secure SMTP server.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings_info.py b/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings_info.py
index 7f815219d..dec4146c7 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_ssid.py b/ansible_collections/cisco/ise/plugins/modules/guest_ssid.py
index 8caf673c0..3dac851e9 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_ssid.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_ssid.py
@@ -26,7 +26,7 @@ options:
characters _.-.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_ssid_info.py b/ansible_collections/cisco/ise/plugins/modules/guest_ssid_info.py
index 087a7e0e4..40cc1eaeb 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_ssid_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_ssid_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_type.py b/ansible_collections/cisco/ise/plugins/modules/guest_type.py
index 2318caaae..4ac0b34d6 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_type.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_type.py
@@ -120,7 +120,7 @@ options:
elements: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_type_email.py b/ansible_collections/cisco/ise/plugins/modules/guest_type_email.py
index 12b593e2f..9f386a62b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_type_email.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_type_email.py
@@ -31,7 +31,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_type_info.py b/ansible_collections/cisco/ise/plugins/modules/guest_type_info.py
index dcf1461ac..9a77176b1 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_type_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_type_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_type_sms.py b/ansible_collections/cisco/ise/plugins/modules/guest_type_sms.py
index d35072caa..08e88c869 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_type_sms.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_type_sms.py
@@ -31,7 +31,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user.py b/ansible_collections/cisco/ise/plugins/modules/guest_user.py
index a19118c76..f65ae8c24 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_user.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_user.py
@@ -115,7 +115,7 @@ options:
description: Guest User's statusReason.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_approve.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_approve.py
index f5c0295f2..a8aa5dd45 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_user_approve.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_approve.py
@@ -20,7 +20,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_monitor_status_info.py
index f26fe7649..0445a7379 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_request.py
index 454b982ae..5542a71ce 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: Guest User Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_change_sponsor_password.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_change_sponsor_password.py
index 64dc01930..701c53136 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_user_change_sponsor_password.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_change_sponsor_password.py
@@ -31,7 +31,7 @@ options:
description: PortalId path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_deny.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_deny.py
index b02f5e41c..b4308026a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_user_deny.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_deny.py
@@ -20,7 +20,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_email.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_email.py
index f0ba73a22..94fb4f6a2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_user_email.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_email.py
@@ -34,7 +34,7 @@ options:
description: PortalId path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_info.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_info.py
index 651777e00..7713cb784 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_user_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_info.py
@@ -71,7 +71,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_reinstate.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_reinstate.py
index 0ead09e64..36a8001e0 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_user_reinstate.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_reinstate.py
@@ -24,7 +24,7 @@ options:
description: Name path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_reset_password.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_reset_password.py
index b55a3147c..a544c1707 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_user_reset_password.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_reset_password.py
@@ -20,7 +20,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_sms.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_sms.py
index d02bd0d38..1c9ffa411 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_user_sms.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_sms.py
@@ -23,7 +23,7 @@ options:
description: PortalId path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_suspend.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_suspend.py
index e53ed5f2d..93c2e0d28 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_user_suspend.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_suspend.py
@@ -35,7 +35,7 @@ options:
description: Name path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/hotpatch_info.py b/ansible_collections/cisco/ise/plugins/modules/hotpatch_info.py
index 90d37d154..ddc28f545 100644
--- a/ansible_collections/cisco/ise/plugins/modules/hotpatch_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/hotpatch_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Patching
diff --git a/ansible_collections/cisco/ise/plugins/modules/hotpatch_install.py b/ansible_collections/cisco/ise/plugins/modules/hotpatch_install.py
index d4cef09b0..143c1acad 100644
--- a/ansible_collections/cisco/ise/plugins/modules/hotpatch_install.py
+++ b/ansible_collections/cisco/ise/plugins/modules/hotpatch_install.py
@@ -25,7 +25,7 @@ options:
description: Hotpatch Install's repositoryName.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Patching
diff --git a/ansible_collections/cisco/ise/plugins/modules/hotpatch_rollback.py b/ansible_collections/cisco/ise/plugins/modules/hotpatch_rollback.py
index d1ce43a88..7db0ae257 100644
--- a/ansible_collections/cisco/ise/plugins/modules/hotpatch_rollback.py
+++ b/ansible_collections/cisco/ise/plugins/modules/hotpatch_rollback.py
@@ -25,7 +25,7 @@ options:
description: Hotpatch Rollback's repositoryName.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Patching
diff --git a/ansible_collections/cisco/ise/plugins/modules/hotspot_portal.py b/ansible_collections/cisco/ise/plugins/modules/hotspot_portal.py
index aa7f55914..f8047fc0c 100644
--- a/ansible_collections/cisco/ise/plugins/modules/hotspot_portal.py
+++ b/ansible_collections/cisco/ise/plugins/modules/hotspot_portal.py
@@ -251,7 +251,7 @@ options:
type: dict
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/hotspot_portal_info.py b/ansible_collections/cisco/ise/plugins/modules/hotspot_portal_info.py
index e2cbb7481..fe316031c 100644
--- a/ansible_collections/cisco/ise/plugins/modules/hotspot_portal_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/hotspot_portal_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/id_store_sequence.py b/ansible_collections/cisco/ise/plugins/modules/id_store_sequence.py
index 259f25ae9..fa0906397 100644
--- a/ansible_collections/cisco/ise/plugins/modules/id_store_sequence.py
+++ b/ansible_collections/cisco/ise/plugins/modules/id_store_sequence.py
@@ -48,7 +48,7 @@ options:
description: Id Store Sequence's parent.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IdentitySequence
diff --git a/ansible_collections/cisco/ise/plugins/modules/id_store_sequence_info.py b/ansible_collections/cisco/ise/plugins/modules/id_store_sequence_info.py
index 16e99cfb3..1903ae417 100644
--- a/ansible_collections/cisco/ise/plugins/modules/id_store_sequence_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/id_store_sequence_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IdentitySequence
diff --git a/ansible_collections/cisco/ise/plugins/modules/identity_group.py b/ansible_collections/cisco/ise/plugins/modules/identity_group.py
index c9e017ada..13dfda39f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/identity_group.py
+++ b/ansible_collections/cisco/ise/plugins/modules/identity_group.py
@@ -30,7 +30,7 @@ options:
description: Identity Group's parent.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IdentityGroups
diff --git a/ansible_collections/cisco/ise/plugins/modules/identity_group_info.py b/ansible_collections/cisco/ise/plugins/modules/identity_group_info.py
index 460a381e5..c2acbc9d3 100644
--- a/ansible_collections/cisco/ise/plugins/modules/identity_group_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/identity_group_info.py
@@ -71,7 +71,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IdentityGroups
diff --git a/ansible_collections/cisco/ise/plugins/modules/internal_user.py b/ansible_collections/cisco/ise/plugins/modules/internal_user.py
index 4769df6bb..238b344b0 100644
--- a/ansible_collections/cisco/ise/plugins/modules/internal_user.py
+++ b/ansible_collections/cisco/ise/plugins/modules/internal_user.py
@@ -69,7 +69,7 @@ options:
description: The id store where the internal user's password is kept.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/internal_user_info.py b/ansible_collections/cisco/ise/plugins/modules/internal_user_info.py
index 7f90f3836..eb6da52de 100644
--- a/ansible_collections/cisco/ise/plugins/modules/internal_user_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/internal_user_info.py
@@ -71,7 +71,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/ise_root_ca_regenerate.py b/ansible_collections/cisco/ise/plugins/modules/ise_root_ca_regenerate.py
index 2eb5f7e01..c61db07fd 100644
--- a/ansible_collections/cisco/ise/plugins/modules/ise_root_ca_regenerate.py
+++ b/ansible_collections/cisco/ise/plugins/modules/ise_root_ca_regenerate.py
@@ -21,7 +21,7 @@ options:
CSR.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_connection_type_info.py b/ansible_collections/cisco/ise/plugins/modules/licensing_connection_type_info.py
index f5cbe33a2..46a7b777d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/licensing_connection_type_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/licensing_connection_type_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Licensing
diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_eval_license_info.py b/ansible_collections/cisco/ise/plugins/modules/licensing_eval_license_info.py
index 5f4f2067e..b594f90db 100644
--- a/ansible_collections/cisco/ise/plugins/modules/licensing_eval_license_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/licensing_eval_license_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Licensing
diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_feature_to_tier_mapping_info.py b/ansible_collections/cisco/ise/plugins/modules/licensing_feature_to_tier_mapping_info.py
index 282279015..0ecf5b696 100644
--- a/ansible_collections/cisco/ise/plugins/modules/licensing_feature_to_tier_mapping_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/licensing_feature_to_tier_mapping_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Licensing
diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_registration_create.py b/ansible_collections/cisco/ise/plugins/modules/licensing_registration_create.py
index 297121891..b224fdcc8 100644
--- a/ansible_collections/cisco/ise/plugins/modules/licensing_registration_create.py
+++ b/ansible_collections/cisco/ise/plugins/modules/licensing_registration_create.py
@@ -34,7 +34,7 @@ options:
description: Token.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Licensing
diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_registration_info.py b/ansible_collections/cisco/ise/plugins/modules/licensing_registration_info.py
index 121e10383..d88e0e987 100644
--- a/ansible_collections/cisco/ise/plugins/modules/licensing_registration_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/licensing_registration_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Licensing
diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_create.py b/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_create.py
index 73c71772a..85dcd4876 100644
--- a/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_create.py
+++ b/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_create.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Licensing
diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_info.py b/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_info.py
index 0267753df..e82937305 100644
--- a/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Licensing
diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_create.py b/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_create.py
index b48863dce..fe66204bd 100644
--- a/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_create.py
+++ b/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_create.py
@@ -28,7 +28,7 @@ options:
type: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Licensing
diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_info.py b/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_info.py
index a85e9ea20..11ef62dae 100644
--- a/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Licensing
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_account_status_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_account_status_info.py
index f17ae2533..8a64d0eb2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_account_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_account_status_info.py
@@ -24,7 +24,7 @@ options:
- Duration path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_athentication_status_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_athentication_status_info.py
index 6a6d498fd..fd9138adf 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_athentication_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_athentication_status_info.py
@@ -28,7 +28,7 @@ options:
- RECORDS path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_authentication_status_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_authentication_status_info.py
index fb1b30fb0..5a033a6c9 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_authentication_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_authentication_status_info.py
@@ -28,7 +28,7 @@ options:
- RECORDS path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_failure_reasons_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_failure_reasons_info.py
index 53e936d10..6ffa6c354 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_failure_reasons_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_failure_reasons_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_count_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_count_info.py
index c2ffbff89..0a0bf0c25 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_count_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_count_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_list_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_list_info.py
index 352e09bf6..e62b3ef9b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_list_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_list_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_auth_list_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_auth_list_info.py
index 716b60cd0..44685ba33 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_auth_list_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_auth_list_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_ip_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_ip_info.py
index f908a7a69..ec45c8782 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_ip_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_ip_info.py
@@ -20,7 +20,7 @@ options:
- Endpoint_ipv4 path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_mac_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_mac_info.py
index 754aebbc8..d9a4bcfb3 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_mac_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_mac_info.py
@@ -20,7 +20,7 @@ options:
- Mac path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_nas_ip_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_nas_ip_info.py
index 09f23798e..d6f0fa959 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_nas_ip_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_nas_ip_info.py
@@ -20,7 +20,7 @@ options:
- Nas_ipv4 path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_username_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_username_info.py
index 81c750499..548da9c6b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_username_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_username_info.py
@@ -20,7 +20,7 @@ options:
- Username path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_delete_all.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_delete_all.py
index a9df0152d..63b7fa1aa 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_delete_all.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_delete_all.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_disconnect_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_disconnect_info.py
index 5f1be8c8f..8de5ed1d5 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_disconnect_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_disconnect_info.py
@@ -36,7 +36,7 @@ options:
- NAS_IPV4 path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_posture_count_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_posture_count_info.py
index 5c8869a93..774d9709a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_posture_count_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_posture_count_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_profiler_count_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_profiler_count_info.py
index 5a8db7deb..05494c7d6 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_profiler_count_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_profiler_count_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_reauthentication_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_reauthentication_info.py
index d0516ee47..9f1e55b73 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_reauthentication_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_reauthentication_info.py
@@ -28,7 +28,7 @@ options:
- REAUTH_TYPE path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_sessions_by_session_id_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_sessions_by_session_id_info.py
index d614bab85..b00af3952 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_sessions_by_session_id_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_sessions_by_session_id_info.py
@@ -20,7 +20,7 @@ options:
- Session_id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_version_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_version_info.py
index 7217600d6..c26efbd54 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_version_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_version_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/my_device_portal.py b/ansible_collections/cisco/ise/plugins/modules/my_device_portal.py
index bdec90ade..5677290f9 100644
--- a/ansible_collections/cisco/ise/plugins/modules/my_device_portal.py
+++ b/ansible_collections/cisco/ise/plugins/modules/my_device_portal.py
@@ -275,7 +275,7 @@ options:
type: dict
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/my_device_portal_info.py b/ansible_collections/cisco/ise/plugins/modules/my_device_portal_info.py
index c0c1cd87a..742308c72 100644
--- a/ansible_collections/cisco/ise/plugins/modules/my_device_portal_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/my_device_portal_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile.py b/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile.py
index e34a702c8..c250782f3 100644
--- a/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile.py
+++ b/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile.py
@@ -48,7 +48,7 @@ options:
type: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for NativeSupplicantProfile
diff --git a/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile_info.py b/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile_info.py
index f086ded1e..5976821cb 100644
--- a/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile_info.py
@@ -31,7 +31,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for NativeSupplicantProfile
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules.py b/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules.py
index 33ea47623..4b3be685e 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules.py
@@ -21,6 +21,9 @@ options:
id:
description: Id path parameter. Rule id.
type: str
+ identitySourceId:
+ description: Identity source id from the identity stores.
+ type: str
identitySourceName:
description: Identity source name from the identity stores.
type: str
@@ -56,6 +59,9 @@ options:
condition:
description: Network Access Authentication Rules's condition.
suboptions:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -102,11 +108,12 @@ options:
that additional conditions are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Network Access Authentication Rules's endDate.
@@ -116,11 +123,12 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Network Access Authentication Rules's endDate.
@@ -140,8 +148,8 @@ options:
type: str
hoursRange:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Authentication Rules's endTime.
@@ -152,8 +160,8 @@ options:
type: dict
hoursRangeException:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Authentication Rules's endTime.
@@ -221,7 +229,7 @@ options:
type: str
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Authentication Rules
@@ -248,6 +256,7 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ identitySourceId: string
identitySourceName: string
ifAuthFail: string
ifProcessFail: string
@@ -259,6 +268,7 @@ EXAMPLES = r"""
policyId: string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -311,6 +321,7 @@ EXAMPLES = r"""
ise_verify: "{{ise_verify}}"
state: present
id: string
+ identitySourceId: string
identitySourceName: string
ifAuthFail: string
ifProcessFail: string
@@ -322,6 +333,7 @@ EXAMPLES = r"""
policyId: string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -385,6 +397,7 @@ ise_response:
type: dict
sample: >
{
+ "identitySourceId": "string",
"identitySourceName": "string",
"ifAuthFail": "string",
"ifProcessFail": "string",
@@ -407,6 +420,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
@@ -462,6 +476,7 @@ ise_update_response:
sample: >
{
"response": {
+ "identitySourceId": "string",
"identitySourceName": "string",
"ifAuthFail": "string",
"ifProcessFail": "string",
@@ -484,6 +499,7 @@ ise_update_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_info.py
index a41243427..f121dc6f2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_info.py
@@ -27,7 +27,7 @@ options:
- Id path parameter. Rule id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Authentication Rules
@@ -73,6 +73,7 @@ ise_response:
type: dict
sample: >
{
+ "identitySourceId": "string",
"identitySourceName": "string",
"ifAuthFail": "string",
"ifProcessFail": "string",
@@ -95,6 +96,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_reset_hitcount.py
index 1d4de88e7..e3e918c5f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_reset_hitcount.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_reset_hitcount.py
@@ -20,7 +20,7 @@ options:
description: PolicyId path parameter. Policy id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Authentication Rules
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules.py b/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules.py
index 03b4c64bc..11cb7caff 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules.py
@@ -47,6 +47,9 @@ options:
condition:
description: Network Access Authorization Rules's condition.
suboptions:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -93,11 +96,12 @@ options:
that additional conditions are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Network Access Authorization Rules's endDate.
@@ -107,11 +111,12 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Network Access Authorization Rules's endDate.
@@ -131,8 +136,8 @@ options:
type: str
hoursRange:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Authorization Rules's endTime.
@@ -143,8 +148,8 @@ options:
type: dict
hoursRangeException:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Authorization Rules's endTime.
@@ -215,7 +220,7 @@ options:
description: Security group used in authorization policies.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Authorization Rules
@@ -251,6 +256,7 @@ EXAMPLES = r"""
- string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -313,6 +319,7 @@ EXAMPLES = r"""
- string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -398,6 +405,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
@@ -475,6 +483,7 @@ ise_update_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_info.py
index ec93647e4..6a5f812d3 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_info.py
@@ -27,7 +27,7 @@ options:
- Id path parameter. Rule id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Authorization Rules
@@ -94,6 +94,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_reset_hitcount.py
index 55dfe008f..fc9311404 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_reset_hitcount.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_reset_hitcount.py
@@ -20,7 +20,7 @@ options:
description: PolicyId path parameter. Policy id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Authorization Rules
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions.py b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions.py
index 6321335dd..b5abc72da 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions.py
@@ -20,6 +20,9 @@ extends_documentation_fragment:
- cisco.ise.module
author: Rafael Campos (@racampos)
options:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -65,11 +68,11 @@ options:
are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used for
- start/end date <br> Default - no specific dates<br> In order to reset the dates
- to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
- = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched or
+ NOT matched if used in exceptionDates prooperty<br> Options are - Date range,
+ for specific date, the same date should be used for start/end date <br> Default
+ - no specific dates<br> In order to reset the dates to have no specific dates
+ Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>.
suboptions:
endDate:
description: Network Access Conditions's endDate.
@@ -79,11 +82,11 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used for
- start/end date <br> Default - no specific dates<br> In order to reset the dates
- to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
- = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched or
+ NOT matched if used in exceptionDates prooperty<br> Options are - Date range,
+ for specific date, the same date should be used for start/end date <br> Default
+ - no specific dates<br> In order to reset the dates to have no specific dates
+ Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>.
suboptions:
endDate:
description: Network Access Conditions's endDate.
@@ -102,8 +105,9 @@ options:
description: Dictionary value.
type: str
hoursRange:
- description: <p>Defines for which hours a TimeAndDate condition will be matched<br>
- Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
+ description: <p>Defines for which hours a TimeAndDate condition will be matched
+ or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h
+ = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Conditions's endTime.
@@ -113,8 +117,9 @@ options:
type: str
type: dict
hoursRangeException:
- description: <p>Defines for which hours a TimeAndDate condition will be matched<br>
- Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
+ description: <p>Defines for which hours a TimeAndDate condition will be matched
+ or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h
+ = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Conditions's endTime.
@@ -159,7 +164,7 @@ options:
elements: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Conditions
@@ -190,6 +195,7 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -235,6 +241,7 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -289,6 +296,7 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -356,6 +364,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
@@ -414,6 +423,7 @@ ise_update_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authentication_rule_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authentication_rule_info.py
index bb37744f0..d1977079d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authentication_rule_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authentication_rule_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Conditions
@@ -63,6 +63,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authorization_rule_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authorization_rule_info.py
index be93e370a..1c33ff340 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authorization_rule_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authorization_rule_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Conditions
@@ -63,6 +63,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_policy_set_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_policy_set_info.py
index a8739b029..eb9d44889 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_policy_set_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_policy_set_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Conditions
@@ -63,6 +63,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_info.py
index 79273501d..04f96b355 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_info.py
@@ -29,7 +29,7 @@ options:
- Id path parameter. Condition id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Conditions
@@ -95,6 +95,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary.py
index 161c04bc2..64b1abb37 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary.py
@@ -47,7 +47,7 @@ options:
description: The dictionary version.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Dictionary
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute.py
index 4a029c5c9..2572d3833 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute.py
@@ -55,7 +55,7 @@ options:
description: The dictionary attribute's name.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Dictionary Attribute
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute_info.py
index 92346b680..117323aac 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute_info.py
@@ -27,7 +27,7 @@ options:
- Name path parameter. The dictionary attribute name.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Dictionary Attribute
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authentication_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authentication_info.py
index fc420dbf0..cf7b71905 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authentication_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authentication_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Dictionary Attributes List
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authorization_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authorization_info.py
index 88a0a1f00..7325147f9 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authorization_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authorization_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Dictionary Attributes List
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_policy_set_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_policy_set_info.py
index 4d82fae8f..07ac1479c 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_policy_set_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_policy_set_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Dictionary Attributes List
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_info.py
index 4334d5172..7ddff701a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_info.py
@@ -23,7 +23,7 @@ options:
- Name path parameter. The dictionary name.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Dictionary
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules.py b/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules.py
index 67f0456d5..cb6eb3e48 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules.py
@@ -44,6 +44,9 @@ options:
condition:
description: Network Access Global Exception Rules's condition.
suboptions:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -90,11 +93,12 @@ options:
that additional conditions are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Network Access Global Exception Rules's endDate.
@@ -104,11 +108,12 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Network Access Global Exception Rules's endDate.
@@ -128,8 +133,8 @@ options:
type: str
hoursRange:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Global Exception Rules's endTime.
@@ -140,8 +145,8 @@ options:
type: dict
hoursRangeException:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Global Exception Rules's endTime.
@@ -212,7 +217,7 @@ options:
description: Security group used in authorization policies.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Authorization Global Exception Rules
@@ -247,6 +252,7 @@ EXAMPLES = r"""
- string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -308,6 +314,7 @@ EXAMPLES = r"""
- string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -392,6 +399,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
@@ -469,6 +477,7 @@ ise_update_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_info.py
index 168ed354f..e98c99cb6 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_info.py
@@ -23,7 +23,7 @@ options:
- Id path parameter. Rule id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Authorization Global Exception Rules
@@ -88,6 +88,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_reset_hitcount.py
index 8047fc1d5..de070305f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_reset_hitcount.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_reset_hitcount.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Authorization Global Exception Rules
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_identity_stores_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_identity_stores_info.py
index 5bdc15cf7..50c59b392 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_identity_stores_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_identity_stores_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Identity Stores
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules.py b/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules.py
index 8f88a5fa3..94bd67b35 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules.py
@@ -47,6 +47,9 @@ options:
condition:
description: Network Access Local Exception Rules's condition.
suboptions:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -93,11 +96,12 @@ options:
that additional conditions are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Network Access Local Exception Rules's endDate.
@@ -107,11 +111,12 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Network Access Local Exception Rules's endDate.
@@ -131,8 +136,8 @@ options:
type: str
hoursRange:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Local Exception Rules's endTime.
@@ -143,8 +148,8 @@ options:
type: dict
hoursRangeException:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Local Exception Rules's endTime.
@@ -215,7 +220,7 @@ options:
description: Security group used in authorization policies.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Authorization Exception Rules
@@ -251,6 +256,7 @@ EXAMPLES = r"""
- string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -313,6 +319,7 @@ EXAMPLES = r"""
- string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -398,6 +405,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
@@ -475,6 +483,7 @@ ise_update_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_info.py
index d93c9bef2..572027db8 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_info.py
@@ -27,7 +27,7 @@ options:
- Id path parameter. Rule id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Authorization Exception Rules
@@ -94,6 +94,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_reset_hitcounts.py b/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_reset_hitcounts.py
index 25751d4b6..a7e32207d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_reset_hitcounts.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_reset_hitcounts.py
@@ -20,7 +20,7 @@ options:
description: PolicyId path parameter. Policy id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Authorization Exception Rules
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition.py b/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition.py
index bbdfb592a..4cf768c5d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition.py
@@ -64,17 +64,17 @@ options:
type: str
type: dict
macAddrList:
- description: <p>This field should contain Endstation MAC address, comma, and
- Destination MAC addresses.<br> Each Max address must include twelve hexadecimal
- digits using formats nn nn nn nn nn nn or nn-nn-nn-nn-nn-nn or nnnn.nnnn.nnnn
- or nnnnnnnnnnnn.<br> Line format - Endstation MAC,Destination MAC </p>.
+ description: <p>This field should contain Endstation MAC address, comma, and Destination
+ MAC addresses.<br> Each Max address must include twelve hexadecimal digits using
+ formats nn nn nn nn nn nn or nn-nn-nn-nn-nn-nn or nnnn.nnnn.nnnn or nnnnnnnnnnnn.<br>
+ Line format - Endstation MAC,Destination MAC </p>.
elements: str
type: list
name:
description: Network Condition name.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Network Conditions
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition_info.py
index 8d4f5aef7..063585c97 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition_info.py
@@ -23,7 +23,7 @@ options:
- Id path parameter. Condition id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Network Conditions
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set.py b/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set.py
index 5d7e27b0c..8e98f1cb8 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set.py
@@ -21,6 +21,9 @@ options:
condition:
description: Network Access Policy Set's condition.
suboptions:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -66,11 +69,11 @@ options:
additional conditions are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have no
+ specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>.
suboptions:
endDate:
description: Network Access Policy Set's endDate.
@@ -80,11 +83,11 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have no
+ specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>.
suboptions:
endDate:
description: Network Access Policy Set's endDate.
@@ -103,8 +106,9 @@ options:
description: Dictionary value.
type: str
hoursRange:
- description: <p>Defines for which hours a TimeAndDate condition will be matched<br>
- Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
+ description: <p>Defines for which hours a TimeAndDate condition will be matched
+ or not matched if used in exceptionHours property<br> Time foramt - hh mm
+ ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Policy Set's endTime.
@@ -114,8 +118,9 @@ options:
type: str
type: dict
hoursRangeException:
- description: <p>Defines for which hours a TimeAndDate condition will be matched<br>
- Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
+ description: <p>Defines for which hours a TimeAndDate condition will be matched
+ or not matched if used in exceptionHours property<br> Time foramt - hh mm
+ ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Policy Set's endTime.
@@ -205,7 +210,7 @@ options:
matched.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Policy Set
@@ -233,6 +238,7 @@ EXAMPLES = r"""
ise_verify: "{{ise_verify}}"
state: present
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -292,6 +298,7 @@ EXAMPLES = r"""
ise_verify: "{{ise_verify}}"
state: present
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -373,6 +380,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
@@ -447,6 +455,7 @@ ise_update_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_info.py
index eb1515840..7c5c9d535 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_info.py
@@ -23,7 +23,7 @@ options:
- Id path parameter. Policy id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Policy Set
@@ -79,6 +79,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_reset_hitcount.py
index 66f6b6ca2..ceda451e8 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_reset_hitcount.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_reset_hitcount.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Policy Set
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_profiles_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_profiles_info.py
index 74a8ea784..5c954e513 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_profiles_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_profiles_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Profiles
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_security_groups_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_security_groups_info.py
index 660fab707..bcb6d16c9 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_security_groups_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_security_groups_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Security Groups
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_service_name_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_service_name_info.py
index 3bcb433ad..1f63e6c1c 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_service_name_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_service_name_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Service Names
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions.py b/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions.py
index 15d981449..efa5d901c 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions.py
@@ -18,6 +18,9 @@ extends_documentation_fragment:
- cisco.ise.module
author: Rafael Campos (@racampos)
options:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -63,11 +66,11 @@ options:
are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used for
- start/end date <br> Default - no specific dates<br> In order to reset the dates
- to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
- = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched or
+ NOT matched if used in exceptionDates prooperty<br> Options are - Date range,
+ for specific date, the same date should be used for start/end date <br> Default
+ - no specific dates<br> In order to reset the dates to have no specific dates
+ Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>.
suboptions:
endDate:
description: Network Access Time Date Conditions's endDate.
@@ -77,11 +80,11 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used for
- start/end date <br> Default - no specific dates<br> In order to reset the dates
- to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
- = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched or
+ NOT matched if used in exceptionDates prooperty<br> Options are - Date range,
+ for specific date, the same date should be used for start/end date <br> Default
+ - no specific dates<br> In order to reset the dates to have no specific dates
+ Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>.
suboptions:
endDate:
description: Network Access Time Date Conditions's endDate.
@@ -100,8 +103,9 @@ options:
description: Dictionary value.
type: str
hoursRange:
- description: <p>Defines for which hours a TimeAndDate condition will be matched<br>
- Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
+ description: <p>Defines for which hours a TimeAndDate condition will be matched
+ or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h
+ = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Time Date Conditions's endTime.
@@ -111,8 +115,9 @@ options:
type: str
type: dict
hoursRangeException:
- description: <p>Defines for which hours a TimeAndDate condition will be matched<br>
- Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
+ description: <p>Defines for which hours a TimeAndDate condition will be matched
+ or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h
+ = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Time Date Conditions's endTime.
@@ -157,7 +162,7 @@ options:
elements: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Time/Date Conditions
@@ -184,6 +189,7 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -229,6 +235,7 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ attributeId: string
attributeName: string
attributeValue: string
children:
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions_info.py
index aa22bfe90..eb6ee1b0b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions_info.py
@@ -23,7 +23,7 @@ options:
- Id path parameter. Condition id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Time/Date Conditions
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_device.py b/ansible_collections/cisco/ise/plugins/modules/network_device.py
index 57a20dade..cde422c7a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_device.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_device.py
@@ -191,7 +191,7 @@ options:
type: dict
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_monitor_status_info.py
index 7f8850311..8a766835d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_request.py
index 0489df3c0..530df579b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: Network Device Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_device_group.py b/ansible_collections/cisco/ise/plugins/modules/network_device_group.py
index 12515718d..d2c17dd56 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_device_group.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_device_group.py
@@ -27,11 +27,11 @@ options:
name:
description: Network Device Group's name.
type: str
- othername:
- description: Network Device Group's othername.
+ ndgtype:
+ description: Network Device Group's ndgtype.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
@@ -57,7 +57,7 @@ EXAMPLES = r"""
description: string
id: string
name: string
- othername: string
+ ndgtype: string
- name: Delete by id
cisco.ise.network_device_group:
@@ -77,7 +77,7 @@ EXAMPLES = r"""
state: present
description: string
name: string
- othername: string
+ ndgtype: string
"""
@@ -96,7 +96,7 @@ ise_response:
"href": "string",
"type": "string"
},
- "othername": "string"
+ "ndgtype": "string"
}
ise_update_response:
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_device_group_info.py b/ansible_collections/cisco/ise/plugins/modules/network_device_group_info.py
index f729d6e40..757237f1d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_device_group_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_device_group_info.py
@@ -73,7 +73,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
@@ -138,7 +138,7 @@ ise_response:
"href": "string",
"type": "string"
},
- "othername": "string"
+ "ndgtype": "string"
}
ise_responses:
@@ -158,7 +158,7 @@ ise_responses:
"href": "string",
"type": "string"
},
- "othername": "string"
+ "ndgtype": "string"
}
]
"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_device_info.py b/ansible_collections/cisco/ise/plugins/modules/network_device_info.py
index 95ef6fce3..36505fec4 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_device_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_device_info.py
@@ -71,7 +71,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_deployment.py b/ansible_collections/cisco/ise/plugins/modules/node_deployment.py
index 4af07b070..237154029 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_deployment.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_deployment.py
@@ -42,7 +42,7 @@ options:
description: Node Deployment's userName.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Deployment
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_deployment_info.py b/ansible_collections/cisco/ise/plugins/modules/node_deployment_info.py
index 76363516c..86af43a84 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_deployment_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_deployment_info.py
@@ -49,7 +49,7 @@ options:
- Hostname path parameter. Hostname of the deployed node.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Deployment
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_deployment_sync.py b/ansible_collections/cisco/ise/plugins/modules/node_deployment_sync.py
index 5d3d60c9d..fd2e3ecca 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_deployment_sync.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_deployment_sync.py
@@ -20,7 +20,7 @@ options:
description: Hostname path parameter. Hostname of the node.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Deployment
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_group.py b/ansible_collections/cisco/ise/plugins/modules/node_group.py
index 8e28165f3..04fcc0f7d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_group.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_group.py
@@ -52,7 +52,7 @@ options:
description: NodeGroupName path parameter. Name of the existing node group.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Group
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_group_info.py b/ansible_collections/cisco/ise/plugins/modules/node_group_info.py
index ee2f50ae4..4fbf7af0f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_group_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_group_info.py
@@ -23,7 +23,7 @@ options:
- NodeGroupName path parameter. Name of the existing node group.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Group
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_group_node_create.py b/ansible_collections/cisco/ise/plugins/modules/node_group_node_create.py
index f57f5233b..6a70be798 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_group_node_create.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_group_node_create.py
@@ -23,7 +23,7 @@ options:
description: NodeGroupName path parameter. Name of the existing node group.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Group
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_group_node_delete.py b/ansible_collections/cisco/ise/plugins/modules/node_group_node_delete.py
index 0097d0c8a..84fc6b947 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_group_node_delete.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_group_node_delete.py
@@ -23,7 +23,7 @@ options:
description: NodeGroupName path parameter. Name of the existing node group.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Group
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_group_node_info.py b/ansible_collections/cisco/ise/plugins/modules/node_group_node_info.py
index 46ed0b9e2..a2fbd4294 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_group_node_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_group_node_info.py
@@ -21,7 +21,7 @@ options:
- NodeGroupName path parameter. Name of the existing node group.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Group
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_info.py b/ansible_collections/cisco/ise/plugins/modules/node_info.py
index e0ca47517..92e80d782 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_info.py
@@ -63,7 +63,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for NodeDetails
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_primary_to_standalone.py b/ansible_collections/cisco/ise/plugins/modules/node_primary_to_standalone.py
index e83c1922a..a9d2c776f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_primary_to_standalone.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_primary_to_standalone.py
@@ -21,7 +21,7 @@ options:
type: str
required: true
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Deployment
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_promotion.py b/ansible_collections/cisco/ise/plugins/modules/node_promotion.py
index c3c0bf922..8c6582275 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_promotion.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_promotion.py
@@ -19,7 +19,7 @@ options:
description: Node Promotion's promotionType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_replication_status_info.py b/ansible_collections/cisco/ise/plugins/modules/node_replication_status_info.py
index 86c442d19..430ddc187 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_replication_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_replication_status_info.py
@@ -20,7 +20,7 @@ options:
- Node path parameter. ID of the existing node.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_secondary_to_primary.py b/ansible_collections/cisco/ise/plugins/modules/node_secondary_to_primary.py
index 236082dc5..f837ebfe1 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_secondary_to_primary.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_secondary_to_primary.py
@@ -21,7 +21,7 @@ options:
type: str
required: true
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Deployment
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_services_interfaces_info.py b/ansible_collections/cisco/ise/plugins/modules/node_services_interfaces_info.py
index 893da855f..15d3d06b2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_services_interfaces_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_services_interfaces_info.py
@@ -21,7 +21,7 @@ options:
- Hostname path parameter. Hostname of the node.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Services
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config.py b/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config.py
index b47eff3a2..1307411ce 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config.py
@@ -140,7 +140,7 @@ options:
type: int
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Services
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config_info.py b/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config_info.py
index 106563972..c65326de2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config_info.py
@@ -21,7 +21,7 @@ options:
- Hostname path parameter. Hostname of the node.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Services
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces.py b/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces.py
index af5961ad1..fc29dc3e5 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces.py
@@ -23,7 +23,7 @@ options:
description: Node Services SXP Interfaces's interface.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Services
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces_info.py b/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces_info.py
index fdd2716d0..3c2f925d9 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces_info.py
@@ -21,7 +21,7 @@ options:
- Hostname path parameter. Hostname of the node.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Services
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_standalone_to_primary.py b/ansible_collections/cisco/ise/plugins/modules/node_standalone_to_primary.py
index c397cb326..67160219b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_standalone_to_primary.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_standalone_to_primary.py
@@ -21,7 +21,7 @@ options:
type: str
required: true
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Deployment
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_sync.py b/ansible_collections/cisco/ise/plugins/modules/node_sync.py
index e45a0ae17..7389635e4 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_sync.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_sync.py
@@ -19,7 +19,7 @@ options:
description: Node Sync's hostname.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pan_ha.py b/ansible_collections/cisco/ise/plugins/modules/pan_ha.py
index 0a33b80f7..3029954f9 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pan_ha.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pan_ha.py
@@ -31,7 +31,7 @@ options:
description: Pan Ha's secondaryHealthCheckNode.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pan_ha_info.py b/ansible_collections/cisco/ise/plugins/modules/pan_ha_info.py
index 6a6ae62b4..3061000ca 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pan_ha_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pan_ha_info.py
@@ -20,7 +20,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for PAN HA
diff --git a/ansible_collections/cisco/ise/plugins/modules/pan_ha_update.py b/ansible_collections/cisco/ise/plugins/modules/pan_ha_update.py
index 6f0526a0f..9a8b048b2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pan_ha_update.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pan_ha_update.py
@@ -42,7 +42,7 @@ options:
type: str
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for PAN HA
diff --git a/ansible_collections/cisco/ise/plugins/modules/patch_info.py b/ansible_collections/cisco/ise/plugins/modules/patch_info.py
index ec427e641..ba13a4851 100644
--- a/ansible_collections/cisco/ise/plugins/modules/patch_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/patch_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Patching
diff --git a/ansible_collections/cisco/ise/plugins/modules/patch_install.py b/ansible_collections/cisco/ise/plugins/modules/patch_install.py
index 94d41ea7e..d2a1bfc92 100644
--- a/ansible_collections/cisco/ise/plugins/modules/patch_install.py
+++ b/ansible_collections/cisco/ise/plugins/modules/patch_install.py
@@ -25,7 +25,7 @@ options:
description: Patch Install's repositoryName.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Patching
diff --git a/ansible_collections/cisco/ise/plugins/modules/patch_rollback.py b/ansible_collections/cisco/ise/plugins/modules/patch_rollback.py
index f82dc23d3..2838048f8 100644
--- a/ansible_collections/cisco/ise/plugins/modules/patch_rollback.py
+++ b/ansible_collections/cisco/ise/plugins/modules/patch_rollback.py
@@ -22,7 +22,7 @@ options:
description: Patch Rollback's patchNumber.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Patching
diff --git a/ansible_collections/cisco/ise/plugins/modules/portal_global_setting.py b/ansible_collections/cisco/ise/plugins/modules/portal_global_setting.py
index 5c3e74e18..af332d5c2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/portal_global_setting.py
+++ b/ansible_collections/cisco/ise/plugins/modules/portal_global_setting.py
@@ -23,7 +23,7 @@ options:
description: Portal Global Setting's id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/portal_global_setting_info.py b/ansible_collections/cisco/ise/plugins/modules/portal_global_setting_info.py
index e0bc9c260..ae481c4a3 100644
--- a/ansible_collections/cisco/ise/plugins/modules/portal_global_setting_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/portal_global_setting_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/portal_info.py b/ansible_collections/cisco/ise/plugins/modules/portal_info.py
index 315df0838..2d9654517 100644
--- a/ansible_collections/cisco/ise/plugins/modules/portal_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/portal_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/portal_theme.py b/ansible_collections/cisco/ise/plugins/modules/portal_theme.py
index f20992749..8554639f4 100644
--- a/ansible_collections/cisco/ise/plugins/modules/portal_theme.py
+++ b/ansible_collections/cisco/ise/plugins/modules/portal_theme.py
@@ -31,7 +31,7 @@ options:
description: Portal Theme for all portals.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/portal_theme_info.py b/ansible_collections/cisco/ise/plugins/modules/portal_theme_info.py
index eaa5a691e..bc1fb3884 100644
--- a/ansible_collections/cisco/ise/plugins/modules/portal_theme_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/portal_theme_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/profiler_profile_info.py b/ansible_collections/cisco/ise/plugins/modules/profiler_profile_info.py
index be32314da..9ddd192b0 100644
--- a/ansible_collections/cisco/ise/plugins/modules/profiler_profile_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/profiler_profile_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings.py b/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings.py
index 92f4ad27d..a4bb5b688 100644
--- a/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings.py
+++ b/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings.py
@@ -35,7 +35,7 @@ options:
description: User name for the proxy connection.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for proxy
diff --git a/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings_info.py b/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings_info.py
index d14440bd3..989e22add 100644
--- a/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for proxy
diff --git a/ansible_collections/cisco/ise/plugins/modules/px_grid_node_approve.py b/ansible_collections/cisco/ise/plugins/modules/px_grid_node_approve.py
index 172dab5fd..8cb0c132b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/px_grid_node_approve.py
+++ b/ansible_collections/cisco/ise/plugins/modules/px_grid_node_approve.py
@@ -20,7 +20,7 @@ options:
description: Name path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/px_grid_node_delete.py b/ansible_collections/cisco/ise/plugins/modules/px_grid_node_delete.py
index a620e17c3..bac63eb41 100644
--- a/ansible_collections/cisco/ise/plugins/modules/px_grid_node_delete.py
+++ b/ansible_collections/cisco/ise/plugins/modules/px_grid_node_delete.py
@@ -20,7 +20,7 @@ options:
description: Name path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/px_grid_node_info.py b/ansible_collections/cisco/ise/plugins/modules/px_grid_node_info.py
index 43f0e9570..7241dcd52 100644
--- a/ansible_collections/cisco/ise/plugins/modules/px_grid_node_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/px_grid_node_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/px_grid_settings_auto_approve.py b/ansible_collections/cisco/ise/plugins/modules/px_grid_settings_auto_approve.py
index 886991e98..e87b41303 100644
--- a/ansible_collections/cisco/ise/plugins/modules/px_grid_settings_auto_approve.py
+++ b/ansible_collections/cisco/ise/plugins/modules/px_grid_settings_auto_approve.py
@@ -23,7 +23,7 @@ options:
description: Auto approve certificate based accounts when true.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_access_secret.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_access_secret.py
index dca5b999a..358d777f0 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_access_secret.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_access_secret.py
@@ -19,7 +19,7 @@ options:
description: pxGrid Access Secret's peerNodeName.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_activate.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_activate.py
index 8e2571b08..bcb84e34a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_activate.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_activate.py
@@ -19,7 +19,7 @@ options:
description: pxGrid Account Activate's description.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_create.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_create.py
index 4de7c8682..83a6b2f8a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_create.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_create.py
@@ -19,7 +19,7 @@ options:
description: pxGrid Account Create's nodeName.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_authorization.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_authorization.py
index 7eaf7442e..13022cd27 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_authorization.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_authorization.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_bindings_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_bindings_info.py
index 9a27324c0..d7d05cf37 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_bindings_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_bindings_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_matrices_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_matrices_info.py
index 33b2e21e8..2e6450f32 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_matrices_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_matrices_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_policies_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_policies_info.py
index 38f89a6a6..b2024371d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_policies_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_policies_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoint_by_mac_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoint_by_mac_info.py
index 49bcc5e50..55e255bc3 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoint_by_mac_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoint_by_mac_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_os_type_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_os_type_info.py
index 15a6ff349..a9c6fa00f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_os_type_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_os_type_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_type_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_type_info.py
index bdedd95d3..ef1ddf642 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_type_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_type_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_info.py
index eec046210..9224eb08e 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_failures_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_failures_info.py
index 475b9224d..dc552be6d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_failures_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_failures_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_healths_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_healths_info.py
index d247161bb..f5963ddf2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_healths_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_healths_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_approve.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_approve.py
index c58e44198..f808e5cc7 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_approve.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_approve.py
@@ -20,7 +20,7 @@ options:
description: Name path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_delete.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_delete.py
index 5248f7a1c..16c42889c 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_delete.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_delete.py
@@ -20,7 +20,7 @@ options:
description: Name path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_info.py
index 19f716365..5da12013d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_performances_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_performances_info.py
index 9f14887ec..f9a4767c1 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_performances_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_performances_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_profiles_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_profiles_info.py
index 94944e789..687581cea 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_profiles_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_profiles_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_group_acls_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_group_acls_info.py
index b003c9148..c41be5560 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_group_acls_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_group_acls_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_groups_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_groups_info.py
index dd6867c42..2abc51e1e 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_groups_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_groups_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_lookup.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_lookup.py
index 5787aecb0..755a1231f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_lookup.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_lookup.py
@@ -19,7 +19,7 @@ options:
description: pxGrid Service Lookup's name.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_register.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_register.py
index c78f2df86..4484573af 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_register.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_register.py
@@ -19,7 +19,7 @@ options:
description: pxGrid Service Register's name.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_reregister.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_reregister.py
index a79a00ddb..b91798631 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_reregister.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_reregister.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_unregister.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_unregister.py
index f0316a4fd..3926a9960 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_unregister.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_unregister.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_ip_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_ip_info.py
index 6260c36ec..df9720cb7 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_ip_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_ip_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_mac_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_mac_info.py
index 6ddea6645..56a5e9204 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_mac_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_mac_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_for_recovery_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_for_recovery_info.py
index c9b3c9751..6e3ca80eb 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_for_recovery_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_for_recovery_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_sessions_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_sessions_info.py
index bf910ac3e..9f0305ab6 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_sessions_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_sessions_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_settings_auto_approve.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_settings_auto_approve.py
index fb1b90ca8..3203ed0b8 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_settings_auto_approve.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_settings_auto_approve.py
@@ -23,7 +23,7 @@ options:
description: Auto approve certificate based accounts when true.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_group_by_username_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_group_by_username_info.py
index a7667adb8..e3b54fa92 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_group_by_username_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_group_by_username_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_groups_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_groups_info.py
index 407c42f89..3add71347 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_groups_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_groups_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence.py b/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence.py
index 6bf112bd0..8031470a4 100644
--- a/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence.py
+++ b/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence.py
@@ -103,7 +103,7 @@ options:
description: UseAttrSetOnRequest flag.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence_info.py b/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence_info.py
index 91097fdd8..1073928ea 100644
--- a/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence_info.py
@@ -31,7 +31,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/renew_certificate.py b/ansible_collections/cisco/ise/plugins/modules/renew_certificate.py
index d91ea35b4..a4561a02b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/renew_certificate.py
+++ b/ansible_collections/cisco/ise/plugins/modules/renew_certificate.py
@@ -20,7 +20,7 @@ options:
description: Renew Certificate's certType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/repository.py b/ansible_collections/cisco/ise/plugins/modules/repository.py
index a9236c8f8..635d1d464 100644
--- a/ansible_collections/cisco/ise/plugins/modules/repository.py
+++ b/ansible_collections/cisco/ise/plugins/modules/repository.py
@@ -45,7 +45,7 @@ options:
description: Username may contain alphanumeric and _-./@\\$ characters.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Repository
diff --git a/ansible_collections/cisco/ise/plugins/modules/repository_files_info.py b/ansible_collections/cisco/ise/plugins/modules/repository_files_info.py
index c70d8b7b6..32f628688 100644
--- a/ansible_collections/cisco/ise/plugins/modules/repository_files_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/repository_files_info.py
@@ -21,7 +21,7 @@ options:
- RepositoryName path parameter. Unique name for a repository.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Repository
diff --git a/ansible_collections/cisco/ise/plugins/modules/repository_info.py b/ansible_collections/cisco/ise/plugins/modules/repository_info.py
index 524e63a96..6631f499b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/repository_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/repository_info.py
@@ -23,7 +23,7 @@ options:
- RepositoryName path parameter. Unique name for a repository.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Repository
diff --git a/ansible_collections/cisco/ise/plugins/modules/resource_version_info.py b/ansible_collections/cisco/ise/plugins/modules/resource_version_info.py
index b8989b7be..826afa9c8 100644
--- a/ansible_collections/cisco/ise/plugins/modules/resource_version_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/resource_version_info.py
@@ -21,7 +21,7 @@ options:
- Resource path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/rest_id_store.py b/ansible_collections/cisco/ise/plugins/modules/rest_id_store.py
index f39aaf8d9..a91c0b4f8 100644
--- a/ansible_collections/cisco/ise/plugins/modules/rest_id_store.py
+++ b/ansible_collections/cisco/ise/plugins/modules/rest_id_store.py
@@ -48,6 +48,14 @@ options:
description: Suffix of the username domain.
type: str
type: dict
+ ersRESTIDStoreUserAttributes:
+ description: REST Id Store's ersRESTIDStoreUserAttributes.
+ suboptions:
+ attributes:
+ description: REST Id Store's attributes.
+ elements: str
+ type: list
+ type: dict
id:
description: REST Id Store's id.
type: str
@@ -55,7 +63,7 @@ options:
description: REST Id Store's name.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.0.1
- python >= 3.5
notes:
- SDK Method used are
@@ -144,6 +152,9 @@ EXAMPLES = r"""
predefined: string
rootUrl: string
usernameSuffix: string
+ ersRestIDStoreUserAttributes:
+ attributes:
+ - string
name: string
"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/rest_id_store_info.py b/ansible_collections/cisco/ise/plugins/modules/rest_id_store_info.py
index f9d5a1cd7..07a3b19e2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/rest_id_store_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/rest_id_store_info.py
@@ -71,7 +71,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/self_registered_portal.py b/ansible_collections/cisco/ise/plugins/modules/self_registered_portal.py
index a7b264ffa..81b396660 100644
--- a/ansible_collections/cisco/ise/plugins/modules/self_registered_portal.py
+++ b/ansible_collections/cisco/ise/plugins/modules/self_registered_portal.py
@@ -682,7 +682,7 @@ options:
type: dict
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SelfRegisteredPortal
diff --git a/ansible_collections/cisco/ise/plugins/modules/self_registered_portal_info.py b/ansible_collections/cisco/ise/plugins/modules/self_registered_portal_info.py
index 42d009798..5d1952ed7 100644
--- a/ansible_collections/cisco/ise/plugins/modules/self_registered_portal_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/self_registered_portal_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SelfRegisteredPortal
diff --git a/ansible_collections/cisco/ise/plugins/modules/selfsigned_certificate_generate.py b/ansible_collections/cisco/ise/plugins/modules/selfsigned_certificate_generate.py
index eecd7b549..84be20739 100644
--- a/ansible_collections/cisco/ise/plugins/modules/selfsigned_certificate_generate.py
+++ b/ansible_collections/cisco/ise/plugins/modules/selfsigned_certificate_generate.py
@@ -119,7 +119,7 @@ options:
description: Certificate state (ST).
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/session_service_node_info.py b/ansible_collections/cisco/ise/plugins/modules/session_service_node_info.py
index 59be20e3d..8d531833a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/session_service_node_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/session_service_node_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for PsnNodeDetailsWithRadiusService
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_acl.py b/ansible_collections/cisco/ise/plugins/modules/sg_acl.py
index ba6fd695f..8f6d53354 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_acl.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_acl.py
@@ -43,7 +43,7 @@ options:
description: SGACL's name.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SecurityGroupsACLs
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_monitor_status_info.py
index d23f90b52..814837559 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SecurityGroupsACLs
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_request.py
index 7ffae3189..79dd73025 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: SGACL Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SecurityGroupsACLs
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_acl_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_acl_info.py
index 3ea64a8bf..b3c4cae7c 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_acl_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_acl_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SecurityGroupsACLs
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping.py
index 8bd08e3aa..9d27da3cb 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping.py
@@ -44,7 +44,7 @@ options:
description: Mandatory unless mappingGroup is set.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMapping
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_monitor_status_info.py
index 6814106ac..c0988da7c 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMapping
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_request.py
index aa8d7f738..c3298c551 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: SG Mapping Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMapping
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy.py
index d40159d18..97b9c2368 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy.py
@@ -20,7 +20,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMapping
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_all.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_all.py
index 20686b4ca..317037a5b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_all.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_all.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMapping
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_status_info.py
index 605873b86..40a7adb84 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_status_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMapping
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group.py
index 2f20a7967..6b6d7fcd0 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group.py
@@ -34,7 +34,7 @@ options:
description: Mandatory unless mappingGroup is set.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMappingGroup
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_monitor_status_info.py
index 856788bf7..cd6af8a56 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMappingGroup
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_request.py
index f8f97da73..18ed1150d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: SG Mapping Group Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMappingGroup
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy.py
index 2b35f9ba2..1012ababc 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy.py
@@ -20,7 +20,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMappingGroup
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_all.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_all.py
index 666c65d77..08b7223e2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_all.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_all.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMappingGroup
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_status_info.py
index 3f3cf6adf..f02d6260a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_status_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMappingGroup
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_info.py
index 725b00d80..c05b582ff 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMappingGroup
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_info.py
index 3ebb64ac7..cc46a2d6a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMapping
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan.py b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan.py
index 4fb8805fc..bba7eeb3a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan.py
@@ -71,7 +71,7 @@ options:
type: list
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SecurityGroupToVirtualNetwork
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_monitor_status_info.py
index b97da0a72..ceebe7245 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SecurityGroupToVirtualNetwork
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_request.py
index 958cf4055..c466ec4a7 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: SG To VN To VLAN Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SecurityGroupToVirtualNetwork
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_info.py
index 18394741f..5759bcbdf 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_info.py
@@ -57,7 +57,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SecurityGroupToVirtualNetwork
diff --git a/ansible_collections/cisco/ise/plugins/modules/sgt.py b/ansible_collections/cisco/ise/plugins/modules/sgt.py
index c7d7e013b..7d65c2e9a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sgt.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sgt.py
@@ -46,7 +46,7 @@ options:
type: int
required: true
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SecurityGroups
diff --git a/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_monitor_status_info.py
index f8776d485..29ffa4038 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SecurityGroups
diff --git a/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_request.py
index c295c10b8..6afae3073 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: SGt Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SecurityGroups
diff --git a/ansible_collections/cisco/ise/plugins/modules/sgt_info.py b/ansible_collections/cisco/ise/plugins/modules/sgt_info.py
index 0e483e947..98190f097 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sgt_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sgt_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SecurityGroups
diff --git a/ansible_collections/cisco/ise/plugins/modules/sms_provider_info.py b/ansible_collections/cisco/ise/plugins/modules/sms_provider_info.py
index 6b6beed7c..38175a56e 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sms_provider_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sms_provider_info.py
@@ -59,7 +59,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsor_group.py b/ansible_collections/cisco/ise/plugins/modules/sponsor_group.py
index e684f9371..be39a7e2c 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sponsor_group.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sponsor_group.py
@@ -120,7 +120,7 @@ options:
type: bool
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsor_group_info.py b/ansible_collections/cisco/ise/plugins/modules/sponsor_group_info.py
index b6892c6fa..88e4f9599 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sponsor_group_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sponsor_group_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsor_group_member_info.py b/ansible_collections/cisco/ise/plugins/modules/sponsor_group_member_info.py
index c49c76f41..4d782aa71 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sponsor_group_member_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sponsor_group_member_info.py
@@ -59,7 +59,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsor_portal.py b/ansible_collections/cisco/ise/plugins/modules/sponsor_portal.py
index 22b53b5fa..6acb22f0f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sponsor_portal.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sponsor_portal.py
@@ -281,7 +281,7 @@ options:
type: dict
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsor_portal_info.py b/ansible_collections/cisco/ise/plugins/modules/sponsor_portal_info.py
index 8fafce1d2..9c51373f0 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sponsor_portal_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sponsor_portal_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal.py b/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal.py
index 85f386446..e8f99c386 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal.py
@@ -385,7 +385,7 @@ options:
type: dict
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal_info.py b/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal_info.py
index d4e2649a6..017236454 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/subscriber.py b/ansible_collections/cisco/ise/plugins/modules/subscriber.py
new file mode 100644
index 000000000..e62fe2c55
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/subscriber.py
@@ -0,0 +1,150 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: subscriber
+short_description: Resource module for Subscriber
+description:
+- Manage operations create, update and delete of the resource Subscriber.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module
+author: Rafael Campos (@racampos)
+options:
+ enabled:
+ description: Subscriber is enabled or not.
+ type: bool
+ friendlyName:
+ description: Friendly name for the subscriber.
+ type: str
+ identityGroups:
+ description: Identity Group(s). With more than one idGroups it needs to be comma
+ seperated.
+ type: str
+ imeis:
+ description: IMEI to be attached to the subscriber.
+ type: str
+ imsi:
+ description: IMSI for Subscriber.
+ type: str
+ ki:
+ description: KI.
+ type: str
+ opc:
+ description: OPC.
+ type: str
+ subscriberId:
+ description: SubscriberId path parameter. Unique id for a subscriber object.
+ type: str
+requirements:
+- ciscoisesdk >= 2.0.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ subscriber.Subscriber.create_subscriber,
+ subscriber.Subscriber.delete_subscriber,
+ subscriber.Subscriber.update_subscriber,
+
+ - Paths used are
+ post /api/v1/fiveg/subscriber,
+ delete /api/v1/fiveg/subscriber/{subscriberId},
+ put /api/v1/fiveg/subscriber/{subscriberId},
+
+"""
+
+EXAMPLES = r"""
+- name: Create
+ cisco.ise.subscriber:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ state: present
+ enabled: true
+ friendlyName: string
+ identityGroups: string
+ imeis: string
+ imsi: string
+ ki: string
+ opc: string
+
+- name: Update by id
+ cisco.ise.subscriber:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ state: present
+ enabled: true
+ friendlyName: string
+ identityGroups: string
+ imeis: string
+ ki: string
+ opc: string
+ subscriberId: string
+
+- name: Delete by id
+ cisco.ise.subscriber:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ state: absent
+ subscriberId: string
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "createTime": "string",
+ "enabled": true,
+ "friendlyName": "string",
+ "id": "string",
+ "identityGroups": "string",
+ "imeis": "string",
+ "imsi": "string",
+ "ki": "string",
+ "link": {
+ "href": "string",
+ "rel": "string",
+ "type": "string"
+ },
+ "opc": "string",
+ "updateTime": "string"
+ }
+
+ise_update_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "response": {
+ "createTime": "string",
+ "enabled": true,
+ "friendlyName": "string",
+ "id": "string",
+ "identityGroups": "string",
+ "imeis": "string",
+ "imsi": "string",
+ "ki": "string",
+ "link": {
+ "href": "string",
+ "rel": "string",
+ "type": "string"
+ },
+ "opc": "string",
+ "updateTime": "string"
+ },
+ "version": "string"
+ }
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/subscriber_bulk.py b/ansible_collections/cisco/ise/plugins/modules/subscriber_bulk.py
new file mode 100644
index 000000000..2b6547097
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/subscriber_bulk.py
@@ -0,0 +1,92 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: subscriber_bulk
+short_description: Resource module for Subscriber Bulk
+description:
+- Manage operation create of the resource Subscriber Bulk.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module
+author: Rafael Campos (@racampos)
+options:
+ ItemList:
+ description: Subscriber Bulk's ItemList.
+ elements: dict
+ suboptions:
+ enabled:
+ description: Subscriber is enabled or not.
+ type: bool
+ friendlyName:
+ description: Friendly name for the subscriber.
+ type: str
+ id:
+ description: Subscriber Bulk's id.
+ type: str
+ identityGroups:
+ description: Identity Group(s). With more than one idGroups it needs to be comma
+ seperated.
+ type: str
+ imeis:
+ description: Comma separated IMEIs to be attached to the subscriber.
+ type: str
+ imsi:
+ description: IMSI for Subscriber.
+ type: str
+ ki:
+ description: KI.
+ type: str
+ opc:
+ description: OPC.
+ type: str
+ type: list
+ operation:
+ description: Subscriber Bulk's operation.
+ type: str
+requirements:
+- ciscoisesdk >= 2.0.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ subscriber.Subscriber.bulk_subscriber_operation,
+
+ - Paths used are
+ post /api/v1/fiveg/subscriber/bulk,
+
+"""
+
+EXAMPLES = r"""
+- name: Create
+ cisco.ise.subscriber_bulk:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ ItemList:
+ - enabled: true
+ friendlyName: string
+ id: string
+ identityGroups: string
+ imeis: string
+ imsi: string
+ ki: string
+ opc: string
+ operation: string
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "id": "string"
+ }
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/subscriber_imsi_info.py b/ansible_collections/cisco/ise/plugins/modules/subscriber_imsi_info.py
new file mode 100644
index 000000000..4da62a78f
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/subscriber_imsi_info.py
@@ -0,0 +1,69 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: subscriber_imsi_info
+short_description: Information module for Subscriber Imsi Info
+description:
+- Get Subscriber Imsi Info by id.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module_info
+author: Rafael Campos (@racampos)
+options:
+ imsi:
+ description:
+ - Imsi path parameter. IMSI parameter.
+ type: str
+requirements:
+- ciscoisesdk >= 2.0.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ subscriber.Subscriber.get_subscriber_by_i_m_s_i,
+
+ - Paths used are
+ get /api/v1/fiveg/subscriber/imsi/{imsi},
+
+"""
+
+EXAMPLES = r"""
+- name: Get Subscriber Imsi Info by id
+ cisco.ise.subscriber_imsi_info:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ imsi: string
+ register: result
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "createTime": "string",
+ "enabled": true,
+ "friendlyName": "string",
+ "id": "string",
+ "identityGroups": "string",
+ "imeis": "string",
+ "imsi": "string",
+ "ki": "string",
+ "link": {
+ "href": "string",
+ "rel": "string",
+ "type": "string"
+ },
+ "opc": "string",
+ "updateTime": "string"
+ }
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_info.py b/ansible_collections/cisco/ise/plugins/modules/subscriber_info.py
index 7c877bc3c..660937786 100644
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/subscriber_info.py
@@ -6,14 +6,12 @@
DOCUMENTATION = r"""
---
-module: trustsec_vn_info
-short_description: Information module for Trustsec VN
+module: subscriber_info
+short_description: Information module for Subscriber
description:
-- Get all Trustsec VN.
-- Get Trustsec VN by id.
-- Get Virtual Network by id.
-- Get all Virtual Networks.
-version_added: '2.0.0'
+- Get all Subscriber.
+- Get Subscriber by id.
+version_added: '2.8.0'
extends_documentation_fragment:
- cisco.ise.module_info
author: Rafael Campos (@racampos)
@@ -26,14 +24,6 @@ options:
description:
- Size query parameter. Number of objects returned per page.
type: int
- sort:
- description:
- - Sort query parameter. Sort type - asc or desc.
- type: str
- sortBy:
- description:
- - SortBy query parameter. Sort column by which objects needs to be sorted.
- type: str
filter:
description:
- >
@@ -52,58 +42,61 @@ options:
- The 'NENDSW' operator describes 'Not Ends With'.
- The 'CONTAINS' operator describes 'Contains'.
- The 'NCONTAINS' operator describes 'Not Contains'.
- elements: str
- type: list
+ type: str
filterType:
description:
- >
FilterType query parameter. The logical operator common to ALL filter criteria will be by default AND, and
can be changed by using the parameter.
type: str
- id:
+ sort:
+ description:
+ - Sort query parameter. Sort type - asc or desc.
+ type: str
+ sortBy:
+ description:
+ - SortBy query parameter. Sort column by which objects needs to be sorted.
+ type: str
+ subscriberId:
description:
- - Id path parameter.
+ - SubscriberId path parameter. Unique id for a subscriber object.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.0.1
- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for virtualNetwork
- description: Complete reference of the virtualNetwork API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
notes:
- SDK Method used are
- virtual_network.VirtualNetwork.get_virtual_network_by_id,
- virtual_network.VirtualNetwork.get_virtual_networks_generator,
+ subscriber.Subscriber.get_all_subscribers_generator,
+ subscriber.Subscriber.get_subscriber_by_id,
- Paths used are
- get /api/v1/trustsec/virtualnetwork,
- get /api/v1/trustsec/virtualnetwork/{id},
+ get /api/v1/fiveg/subscriber,
+ get /api/v1/fiveg/subscriber/{subscriberId},
"""
EXAMPLES = r"""
-- name: Get all Trustsec VN
- cisco.ise.trustsec_vn_info:
+- name: Get all Subscriber
+ cisco.ise.subscriber_info:
ise_hostname: "{{ise_hostname}}"
ise_username: "{{ise_username}}"
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
page: 0
size: 0
+ filter: string
+ filterType: string
sort: string
sortBy: string
- filter: []
- filterType: string
register: result
-- name: Get Trustsec VN by id
- cisco.ise.trustsec_vn_info:
+- name: Get Subscriber by id
+ cisco.ise.subscriber_info:
ise_hostname: "{{ise_hostname}}"
ise_username: "{{ise_username}}"
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
- id: string
+ subscriberId: string
register: result
"""
@@ -112,17 +105,25 @@ RETURN = r"""
ise_response:
description: A dictionary or list with the response returned by the Cisco ISE Python SDK
returned: always
- type: list
- elements: dict
+ type: dict
sample: >
- [
- {
- "additionalAttributes": "string",
- "id": "string",
- "lastUpdate": "string",
- "name": "string"
- }
- ]
+ {
+ "createTime": "string",
+ "enabled": true,
+ "friendlyName": "string",
+ "id": "string",
+ "identityGroups": "string",
+ "imeis": "string",
+ "imsi": "string",
+ "ki": "string",
+ "link": {
+ "href": "string",
+ "rel": "string",
+ "type": "string"
+ },
+ "opc": "string",
+ "updateTime": "string"
+ }
ise_responses:
description: A dictionary or list with the response returned by the Cisco ISE Python SDK
@@ -132,10 +133,21 @@ ise_responses:
sample: >
[
{
- "additionalAttributes": "string",
+ "createTime": "string",
+ "enabled": true,
+ "friendlyName": "string",
"id": "string",
- "lastUpdate": "string",
- "name": "string"
+ "identityGroups": "string",
+ "imeis": "string",
+ "imsi": "string",
+ "ki": "string",
+ "link": {
+ "href": "string",
+ "rel": "string",
+ "type": "string"
+ },
+ "opc": "string",
+ "updateTime": "string"
}
]
"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/support_bundle.py b/ansible_collections/cisco/ise/plugins/modules/support_bundle.py
index 81aaf5bf6..cd29a5b31 100644
--- a/ansible_collections/cisco/ise/plugins/modules/support_bundle.py
+++ b/ansible_collections/cisco/ise/plugins/modules/support_bundle.py
@@ -57,7 +57,7 @@ options:
type: str
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SupportBundleTriggerConfiguration
diff --git a/ansible_collections/cisco/ise/plugins/modules/support_bundle_download.py b/ansible_collections/cisco/ise/plugins/modules/support_bundle_download.py
index c6b8b4635..952d9fcf3 100644
--- a/ansible_collections/cisco/ise/plugins/modules/support_bundle_download.py
+++ b/ansible_collections/cisco/ise/plugins/modules/support_bundle_download.py
@@ -29,7 +29,7 @@ options:
description: Enable or disable automatic file creation of raw response.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/support_bundle_status_info.py b/ansible_collections/cisco/ise/plugins/modules/support_bundle_status_info.py
index 0cdb8aaf9..67fd177d2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/support_bundle_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/support_bundle_status_info.py
@@ -31,7 +31,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_connections.py b/ansible_collections/cisco/ise/plugins/modules/sxp_connections.py
index 544a65b80..53a6ec262 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sxp_connections.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sxp_connections.py
@@ -46,7 +46,7 @@ options:
description: SXP Connections's sxpVpn.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_monitor_status_info.py
index bfa5183c0..dfcbb8eb2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_request.py
index 02ca9ce03..3e62f2782 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: SXP Connections Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_connections_info.py b/ansible_collections/cisco/ise/plugins/modules/sxp_connections_info.py
index 08a50da5f..42e979779 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sxp_connections_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sxp_connections_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings.py b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings.py
index 5eff2ab4e..a403670fd 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings.py
@@ -42,7 +42,7 @@ options:
or vns should be defined.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_monitor_status_info.py
index 3cb621af3..f34f4741c 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_request.py
index 374def105..66b5e0ab1 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: SXP Local Bindings Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_info.py b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_info.py
index 0c422a495..15aeaf5e3 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns.py b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns.py
index 0b7a88dce..abab51624 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns.py
@@ -24,7 +24,7 @@ options:
description: SXP VPNs's sxpVpnName.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_monitor_status_info.py
index 9ec5a6fbc..d749941ab 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_request.py
index 0c8e957c6..0d24fbc94 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: SXP VPNs Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_info.py b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_info.py
index 0b233c134..4fffbfc4a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_info.py
@@ -65,7 +65,7 @@ options:
- Sortdsc query parameter. Sort desc.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/system_certificate.py b/ansible_collections/cisco/ise/plugins/modules/system_certificate.py
index 6022b8d32..f2dd7a73b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/system_certificate.py
+++ b/ansible_collections/cisco/ise/plugins/modules/system_certificate.py
@@ -78,7 +78,7 @@ options:
description: Use certificate for SAML Signing.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/system_certificate_create.py b/ansible_collections/cisco/ise/plugins/modules/system_certificate_create.py
index 758318611..916142bb3 100644
--- a/ansible_collections/cisco/ise/plugins/modules/system_certificate_create.py
+++ b/ansible_collections/cisco/ise/plugins/modules/system_certificate_create.py
@@ -88,7 +88,7 @@ options:
description: NodeId of Cisco ISE application.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/system_certificate_export_info.py b/ansible_collections/cisco/ise/plugins/modules/system_certificate_export_info.py
index 793eaea33..e53c17a3a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/system_certificate_export_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/system_certificate_export_info.py
@@ -35,7 +35,7 @@ options:
description: Enable or disable automatic file creation of raw response.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/system_certificate_import.py b/ansible_collections/cisco/ise/plugins/modules/system_certificate_import.py
index 9cb9d3301..72f69d078 100644
--- a/ansible_collections/cisco/ise/plugins/modules/system_certificate_import.py
+++ b/ansible_collections/cisco/ise/plugins/modules/system_certificate_import.py
@@ -81,7 +81,7 @@ options:
description: Validate certificate extensions.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/system_certificate_info.py b/ansible_collections/cisco/ise/plugins/modules/system_certificate_info.py
index 9c05839cb..7d90d10d4 100644
--- a/ansible_collections/cisco/ise/plugins/modules/system_certificate_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/system_certificate_info.py
@@ -69,7 +69,7 @@ options:
- Id path parameter. ID of the system certificate.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/system_config_version_info.py b/ansible_collections/cisco/ise/plugins/modules/system_config_version_info.py
index cbff1e720..2213574f0 100644
--- a/ansible_collections/cisco/ise/plugins/modules/system_config_version_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/system_config_version_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for VersionAndPatch
diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets.py
index 461d03bda..af3075c13 100644
--- a/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets.py
+++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets.py
@@ -49,7 +49,7 @@ options:
description: PermitUnmatched flag.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets_info.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets_info.py
index 59398596d..4aa4f9be9 100644
--- a/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers.py
index 51d311bf0..2d724e764 100644
--- a/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers.py
+++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers.py
@@ -43,7 +43,7 @@ options:
description: The server timeout.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers_info.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers_info.py
index 5759de015..d097fcf25 100644
--- a/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_profile.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_profile.py
index 8cb53b9be..304caaabd 100644
--- a/ansible_collections/cisco/ise/plugins/modules/tacacs_profile.py
+++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_profile.py
@@ -46,7 +46,7 @@ options:
type: list
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_profile_info.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_profile_info.py
index a64d0f257..59f1495f6 100644
--- a/ansible_collections/cisco/ise/plugins/modules/tacacs_profile_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_profile_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence.py
index 0f9669f0f..e26adf0ae 100644
--- a/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence.py
+++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence.py
@@ -50,7 +50,7 @@ options:
description: Define if a delimiter will be used for suffix strip.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence_info.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence_info.py
index 618b4c59f..69d4424b0 100644
--- a/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/tasks_info.py b/ansible_collections/cisco/ise/plugins/modules/tasks_info.py
index 98dabd3dc..b038c6e9d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/tasks_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/tasks_info.py
@@ -21,7 +21,7 @@ options:
- TaskId path parameter. The id of the task executed before.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for tasks
diff --git a/ansible_collections/cisco/ise/plugins/modules/telemetry_info.py b/ansible_collections/cisco/ise/plugins/modules/telemetry_info.py
index 4393577aa..089d885d1 100644
--- a/ansible_collections/cisco/ise/plugins/modules/telemetry_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/telemetry_info.py
@@ -57,7 +57,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for TelemetryInformation
diff --git a/ansible_collections/cisco/ise/plugins/modules/test_connector.py b/ansible_collections/cisco/ise/plugins/modules/test_connector.py
new file mode 100644
index 000000000..4caaadc4b
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/test_connector.py
@@ -0,0 +1,87 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: test_connector
+short_description: Resource module for Test Connector
+description:
+- Manage operation create of the resource Test Connector.
+- EDDA - test the Connector.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module
+author: Rafael Campos (@racampos)
+options:
+ authType:
+ description: Authentication Type list.
+ type: str
+ authValues:
+ description: Request to test Connector.
+ suboptions:
+ password:
+ description: Password.
+ type: str
+ userName:
+ description: UserName.
+ type: str
+ type: dict
+ connectorName:
+ description: ConnectorName.
+ type: str
+ responseParsing:
+ description: Uniqueness to identify.
+ type: str
+ uniqueID:
+ description: Uniqueness to identify.
+ type: str
+ url:
+ description: BulkUrl.
+ type: str
+requirements:
+- ciscoisesdk >= 2.0.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ edda.Edda.test_connector,
+
+ - Paths used are
+ post /api/v1/edda/test-connector,
+
+"""
+
+EXAMPLES = r"""
+- name: Create
+ cisco.ise.test_connector:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ authType: string
+ authValues:
+ password: string
+ userName: string
+ connectorName: string
+ responseParsing: string
+ uniqueID: string
+ url: string
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "connectorName": "string",
+ "data": "string",
+ "error": "string",
+ "status": "string",
+ "uniqueID": "string"
+ }
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/threat_vulnerabilities_clear.py b/ansible_collections/cisco/ise/plugins/modules/threat_vulnerabilities_clear.py
index 853c23ade..6288b13c6 100644
--- a/ansible_collections/cisco/ise/plugins/modules/threat_vulnerabilities_clear.py
+++ b/ansible_collections/cisco/ise/plugins/modules/threat_vulnerabilities_clear.py
@@ -20,7 +20,7 @@ options:
description: Threat Vulnerabilities Clear's macAddresses.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for ClearThreatsAndVulnerabilities
diff --git a/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings.py b/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings.py
index 1db63b6e8..9b7012f3b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings.py
+++ b/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings.py
@@ -23,7 +23,7 @@ options:
description: URL of transport gateway.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for telemetry
diff --git a/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings_info.py b/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings_info.py
index a5f69c026..404d01827 100644
--- a/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for telemetry
diff --git a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate.py b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate.py
index d93fd1dee..abe3948a5 100644
--- a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate.py
+++ b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate.py
@@ -91,7 +91,7 @@ options:
description: Trust for authentication within Cisco ISE.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_export_info.py b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_export_info.py
index 7912ff872..640dffb3b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_export_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_export_info.py
@@ -10,7 +10,7 @@ module: trusted_certificate_export_info
short_description: Information module for Trusted Certificate Export
description:
- Get Trusted Certificate Export by id.
-- The response of this API carries a trusted certificate file mapped to the.
+- The response of this API carries a trusted certificate file mapped to the requested ID.
version_added: '1.0.0'
extends_documentation_fragment:
- cisco.ise.module_info
@@ -33,7 +33,7 @@ options:
- The filename used to save the download file.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_import.py b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_import.py
index 795ddb27c..a03c7d41d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_import.py
+++ b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_import.py
@@ -50,7 +50,7 @@ options:
description: Validate trust certificate extension.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_info.py b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_info.py
index fceb4f0ca..198e0539b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_info.py
@@ -65,7 +65,7 @@ options:
- Id path parameter. ID of the trust certificate.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app.py
deleted file mode 100644
index d82685f21..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app.py
+++ /dev/null
@@ -1,130 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_nbar_app
-short_description: Resource module for Trustsec NBAR App
-description:
-- Manage operations create, update and delete of the resource Trustsec NBAR App.
-- Create NBAR application.
-- Update NBAR Application.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module
-author: Rafael Campos (@racampos)
-options:
- description:
- description: Trustsec NBAR App's description.
- type: str
- id:
- description: Trustsec NBAR App's id.
- type: str
- name:
- description: Trustsec NBAR App's name.
- type: str
- networkIdentities:
- description: Array of NIs.
- elements: dict
- suboptions:
- ports:
- description: Trustsec NBAR App's ports.
- type: str
- protocol:
- description: Trustsec NBAR App's protocol.
- type: str
- type: list
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for nbarApp
- description: Complete reference of the nbarApp API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- nbar_app.NbarApp.create_nbar_app,
- nbar_app.NbarApp.delete_nbar_app_by_id,
- nbar_app.NbarApp.update_nbar_app_by_id,
-
- - Paths used are
- post /api/v1/trustsec/sgacl/nbarapp,
- delete /api/v1/trustsec/sgacl/nbarapp/{id},
- put /api/v1/trustsec/sgacl/nbarapp/{id},
-
-"""
-
-EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_nbar_app:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- state: present
- description: string
- id: string
- name: string
- networkIdentities:
- - ports: string
- protocol: string
-
-- name: Update by id
- cisco.ise.trustsec_nbar_app:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- state: present
- description: string
- id: string
- name: string
- networkIdentities:
- - ports: string
- protocol: string
-
-- name: Delete by id
- cisco.ise.trustsec_nbar_app:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- state: absent
- id: string
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: list
- elements: dict
- sample: >
- [
- {
- "description": "string",
- "id": "string",
- "name": "string",
- "networkIdentities": [
- {
- "ports": "string",
- "protocol": "string"
- }
- ]
- }
- ]
-
-ise_update_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: dict
- sample: >
- {
- "code": 0,
- "message": "string"
- }
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app_info.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app_info.py
deleted file mode 100644
index 9c2b732b9..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app_info.py
+++ /dev/null
@@ -1,151 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_nbar_app_info
-short_description: Information module for Trustsec NBAR App
-description:
-- Get all Trustsec NBAR App.
-- Get Trustsec NBAR App by id.
-- Get NBAR Application by id.
-- Get all NBAR Applications.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module_info
-author: Rafael Campos (@racampos)
-options:
- page:
- description:
- - Page query parameter. Page number.
- type: int
- size:
- description:
- - Size query parameter. Number of objects returned per page.
- type: int
- sort:
- description:
- - Sort query parameter. Sort type - asc or desc.
- type: str
- sortBy:
- description:
- - SortBy query parameter. Sort column by which objects needs to be sorted.
- type: str
- filter:
- description:
- - >
- Filter query parameter. .. Container **Simple filtering** should be available through the filter query
- string parameter. The structure of a filter is a triplet of field operator and value separated with dots.
- More than one filter can be sent. The logical operator common to ALL filter criteria will be by default AND,
- and can be changed by using the *"filterType=or"* query string parameter.
- - Each resource Data model description should specify if an attribute is a filtered field.
- - The 'EQ' operator describes 'Equals'.
- - The 'NEQ' operator describes 'Not Equals'.
- - The 'GT' operator describes 'Greater Than'.
- - The 'LT' operator describes 'Less Than'.
- - The 'STARTSW' operator describes 'Starts With'.
- - The 'NSTARTSW' operator describes 'Not Starts With'.
- - The 'ENDSW' operator describes 'Ends With'.
- - The 'NENDSW' operator describes 'Not Ends With'.
- - The 'CONTAINS' operator describes 'Contains'.
- - The 'NCONTAINS' operator describes 'Not Contains'.
- elements: str
- type: list
- filterType:
- description:
- - >
- FilterType query parameter. The logical operator common to ALL filter criteria will be by default AND, and
- can be changed by using the parameter.
- type: str
- id:
- description:
- - Id path parameter.
- type: str
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for nbarApp
- description: Complete reference of the nbarApp API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- nbar_app.NbarApp.get_nbar_app_by_id,
- nbar_app.NbarApp.get_nbar_apps_generator,
-
- - Paths used are
- get /api/v1/trustsec/sgacl/nbarapp,
- get /api/v1/trustsec/sgacl/nbarapp/{id},
-
-"""
-
-EXAMPLES = r"""
-- name: Get all Trustsec NBAR App
- cisco.ise.trustsec_nbar_app_info:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- page: 0
- size: 0
- sort: string
- sortBy: string
- filter: []
- filterType: string
- register: result
-
-- name: Get Trustsec NBAR App by id
- cisco.ise.trustsec_nbar_app_info:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- id: string
- register: result
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: list
- elements: dict
- sample: >
- [
- {
- "description": "string",
- "id": "string",
- "name": "string",
- "networkIdentities": [
- {
- "ports": "string",
- "protocol": "string"
- }
- ]
- }
- ]
-
-ise_responses:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: list
- elements: dict
- sample: >
- [
- {
- "description": "string",
- "id": "string",
- "name": "string",
- "networkIdentities": [
- {
- "ports": "string",
- "protocol": "string"
- }
- ]
- }
- ]
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping.py
deleted file mode 100644
index b9c65804b..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping.py
+++ /dev/null
@@ -1,130 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_sg_vn_mapping
-short_description: Resource module for Trustsec SG VN Mapping
-description:
-- Manage operations create, update and delete of the resource Trustsec SG VN Mapping.
-- Create Security Group and Virtual Network mapping.
-- Delete Security Group and Virtual Network mapping.
-- Update Security Group and Virtual Network mapping.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module
-author: Rafael Campos (@racampos)
-options:
- id:
- description: Identifier of the SG-VN mapping.
- type: str
- lastUpdate:
- description: Timestamp for the last update of the SG-VN mapping.
- type: str
- sgName:
- description: Name of the associated Security Group to be used for identity if id
- is not provided.
- type: str
- sgtId:
- description: Identifier of the associated Security Group which is required unless
- its name is provided.
- type: str
- vnId:
- description: Identifier for the associated Virtual Network which is required unless
- its name is provided.
- type: str
- vnName:
- description: Name of the associated Virtual Network to be used for identity if id
- is not provided.
- type: str
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for sgVnMapping
- description: Complete reference of the sgVnMapping API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- sg_vn_mapping.SgVnMapping.create_sg_vn_mapping,
- sg_vn_mapping.SgVnMapping.delete_sg_vn_mapping_by_id,
- sg_vn_mapping.SgVnMapping.update_sg_vn_mapping_by_id,
-
- - Paths used are
- post /api/v1/trustsec/sgvnmapping,
- delete /api/v1/trustsec/sgvnmapping/{id},
- put /api/v1/trustsec/sgvnmapping/{id},
-
-"""
-
-EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_sg_vn_mapping:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- state: present
- id: string
- lastUpdate: string
- sgName: string
- sgtId: string
- vnId: string
- vnName: string
-
-- name: Update by id
- cisco.ise.trustsec_sg_vn_mapping:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- state: present
- id: string
- lastUpdate: string
- sgName: string
- sgtId: string
- vnId: string
- vnName: string
-
-- name: Delete by id
- cisco.ise.trustsec_sg_vn_mapping:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- state: absent
- id: string
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: list
- elements: dict
- sample: >
- [
- {
- "id": "string",
- "lastUpdate": "string",
- "sgName": "string",
- "sgtId": "string",
- "vnId": "string",
- "vnName": "string"
- }
- ]
-
-ise_update_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: dict
- sample: >
- {
- "code": 0,
- "message": "string"
- }
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_create.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_create.py
deleted file mode 100644
index 2adb8f02a..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_create.py
+++ /dev/null
@@ -1,87 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_sg_vn_mapping_bulk_create
-short_description: Resource module for Trustsec SG VN Mapping Bulk Create
-description:
-- Manage operation create of the resource Trustsec SG VN Mapping Bulk Create.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module
-author: Rafael Campos (@racampos)
-options:
- payload:
- description: Trustsec SG VN Mapping Bulk Create's payload.
- elements: dict
- suboptions:
- id:
- description: Identifier of the SG-VN mapping.
- type: str
- lastUpdate:
- description: Timestamp for the last update of the SG-VN mapping.
- type: str
- sgName:
- description: Name of the associated Security Group to be used for identity if
- id is not provided.
- type: str
- sgtId:
- description: Identifier of the associated Security Group which is required unless
- its name is provided.
- type: str
- vnId:
- description: Identifier for the associated Virtual Network which is required
- unless its name is provided.
- type: str
- vnName:
- description: Name of the associated Virtual Network to be used for identity
- if id is not provided.
- type: str
- type: list
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for sgVnMapping
- description: Complete reference of the sgVnMapping API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- sg_vn_mapping.SgVnMapping.bulk_create_sg_vn_mappings,
-
- - Paths used are
- post /api/v1/trustsec/sgvnmapping/bulk/create,
-
-"""
-
-EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_sg_vn_mapping_bulk_create:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- payload:
- - id: string
- lastUpdate: string
- sgName: string
- sgtId: string
- vnId: string
- vnName: string
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: dict
- sample: >
- {
- "id": "string"
- }
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_delete.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_delete.py
deleted file mode 100644
index b5d8b48de..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_delete.py
+++ /dev/null
@@ -1,59 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_sg_vn_mapping_bulk_delete
-short_description: Resource module for Trustsec SG VN Mapping Bulk Delete
-description:
-- Manage operation create of the resource Trustsec SG VN Mapping Bulk Delete.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module
-author: Rafael Campos (@racampos)
-options:
- payload:
- description: Trustsec SG VN Mapping Bulk Delete's payload.
- elements: str
- type: list
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for sgVnMapping
- description: Complete reference of the sgVnMapping API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- sg_vn_mapping.SgVnMapping.bulk_delete_sg_vn_mappings,
-
- - Paths used are
- post /api/v1/trustsec/sgvnmapping/bulk/delete,
-
-"""
-
-EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_sg_vn_mapping_bulk_delete:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- payload:
- - string
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: dict
- sample: >
- {
- "id": "string"
- }
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_update.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_update.py
deleted file mode 100644
index 05b1a97e3..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_update.py
+++ /dev/null
@@ -1,87 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_sg_vn_mapping_bulk_update
-short_description: Resource module for Trustsec SG VN Mapping Bulk Update
-description:
-- Manage operation create of the resource Trustsec SG VN Mapping Bulk Update.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module
-author: Rafael Campos (@racampos)
-options:
- payload:
- description: Trustsec SG VN Mapping Bulk Update's payload.
- elements: dict
- suboptions:
- id:
- description: Identifier of the SG-VN mapping.
- type: str
- lastUpdate:
- description: Timestamp for the last update of the SG-VN mapping.
- type: str
- sgName:
- description: Name of the associated Security Group to be used for identity if
- id is not provided.
- type: str
- sgtId:
- description: Identifier of the associated Security Group which is required unless
- its name is provided.
- type: str
- vnId:
- description: Identifier for the associated Virtual Network which is required
- unless its name is provided.
- type: str
- vnName:
- description: Name of the associated Virtual Network to be used for identity
- if id is not provided.
- type: str
- type: list
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for sgVnMapping
- description: Complete reference of the sgVnMapping API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- sg_vn_mapping.SgVnMapping.bulk_update_sg_vn_mappings,
-
- - Paths used are
- post /api/v1/trustsec/sgvnmapping/bulk/update,
-
-"""
-
-EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_sg_vn_mapping_bulk_update:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- payload:
- - id: string
- lastUpdate: string
- sgName: string
- sgtId: string
- vnId: string
- vnName: string
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: dict
- sample: >
- {
- "id": "string"
- }
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_info.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_info.py
deleted file mode 100644
index 3ac8cb0c9..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_info.py
+++ /dev/null
@@ -1,145 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_sg_vn_mapping_info
-short_description: Information module for Trustsec SG VN Mapping
-description:
-- Get all Trustsec SG VN Mapping.
-- Get Trustsec SG VN Mapping by id.
-- Get Security Group and Virtual Network mapping by id.
-- Get all Security Group and Virtual Network mappings.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module_info
-author: Rafael Campos (@racampos)
-options:
- page:
- description:
- - Page query parameter. Page number.
- type: int
- size:
- description:
- - Size query parameter. Number of objects returned per page.
- type: int
- sort:
- description:
- - Sort query parameter. Sort type - asc or desc.
- type: str
- sortBy:
- description:
- - SortBy query parameter. Sort column by which objects needs to be sorted.
- type: str
- filter:
- description:
- - >
- Filter query parameter. .. Container **Simple filtering** should be available through the filter query
- string parameter. The structure of a filter is a triplet of field operator and value separated with dots.
- More than one filter can be sent. The logical operator common to ALL filter criteria will be by default AND,
- and can be changed by using the *"filterType=or"* query string parameter.
- - Each resource Data model description should specify if an attribute is a filtered field.
- - The 'EQ' operator describes 'Equals'.
- - The 'NEQ' operator describes 'Not Equals'.
- - The 'GT' operator describes 'Greater Than'.
- - The 'LT' operator describes 'Less Than'.
- - The 'STARTSW' operator describes 'Starts With'.
- - The 'NSTARTSW' operator describes 'Not Starts With'.
- - The 'ENDSW' operator describes 'Ends With'.
- - The 'NENDSW' operator describes 'Not Ends With'.
- - The 'CONTAINS' operator describes 'Contains'.
- - The 'NCONTAINS' operator describes 'Not Contains'.
- elements: str
- type: list
- filterType:
- description:
- - >
- FilterType query parameter. The logical operator common to ALL filter criteria will be by default AND, and
- can be changed by using the parameter.
- type: str
- id:
- description:
- - Id path parameter.
- type: str
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for sgVnMapping
- description: Complete reference of the sgVnMapping API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- sg_vn_mapping.SgVnMapping.get_sg_vn_mapping_by_id,
- sg_vn_mapping.SgVnMapping.get_sg_vn_mappings_generator,
-
- - Paths used are
- get /api/v1/trustsec/sgvnmapping,
- get /api/v1/trustsec/sgvnmapping/{id},
-
-"""
-
-EXAMPLES = r"""
-- name: Get all Trustsec SG VN Mapping
- cisco.ise.trustsec_sg_vn_mapping_info:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- page: 0
- size: 0
- sort: string
- sortBy: string
- filter: []
- filterType: string
- register: result
-
-- name: Get Trustsec SG VN Mapping by id
- cisco.ise.trustsec_sg_vn_mapping_info:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- id: string
- register: result
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: list
- elements: dict
- sample: >
- [
- {
- "id": "string",
- "lastUpdate": "string",
- "sgName": "string",
- "sgtId": "string",
- "vnId": "string",
- "vnName": "string"
- }
- ]
-
-ise_responses:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: list
- elements: dict
- sample: >
- [
- {
- "id": "string",
- "lastUpdate": "string",
- "sgName": "string",
- "sgtId": "string",
- "vnId": "string",
- "vnName": "string"
- }
- ]
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn.py
deleted file mode 100644
index 7bd274ee2..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn.py
+++ /dev/null
@@ -1,113 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_vn
-short_description: Resource module for Trustsec VN
-description:
-- Manage operations create, update and delete of the resource Trustsec VN.
-- Create Virtual Network.
-- Update Virtual Network.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module
-author: Rafael Campos (@racampos)
-options:
- additionalAttributes:
- description: JSON String of additional attributes for the Virtual Network.
- type: str
- id:
- description: Identifier of the Virtual Network.
- type: str
- lastUpdate:
- description: Timestamp for the last update of the Virtual Network.
- type: str
- name:
- description: Name of the Virtual Network.
- type: str
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for virtualNetwork
- description: Complete reference of the virtualNetwork API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- virtual_network.VirtualNetwork.create_virtual_network,
- virtual_network.VirtualNetwork.delete_virtual_network_by_id,
- virtual_network.VirtualNetwork.update_virtual_network_by_id,
-
- - Paths used are
- post /api/v1/trustsec/virtualnetwork,
- delete /api/v1/trustsec/virtualnetwork/{id},
- put /api/v1/trustsec/virtualnetwork/{id},
-
-"""
-
-EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_vn:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- state: present
- additionalAttributes: string
- id: string
- lastUpdate: string
- name: string
-
-- name: Update by id
- cisco.ise.trustsec_vn:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- state: present
- additionalAttributes: string
- id: string
- lastUpdate: string
- name: string
-
-- name: Delete by id
- cisco.ise.trustsec_vn:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- state: absent
- id: string
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: list
- elements: dict
- sample: >
- [
- {
- "additionalAttributes": "string",
- "id": "string",
- "lastUpdate": "string",
- "name": "string"
- }
- ]
-
-ise_update_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: dict
- sample: >
- {
- "code": 0,
- "message": "string"
- }
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_create.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_create.py
deleted file mode 100644
index 3893db42a..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_create.py
+++ /dev/null
@@ -1,75 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_vn_bulk_create
-short_description: Resource module for Trustsec VN Bulk Create
-description:
-- Manage operation create of the resource Trustsec VN Bulk Create.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module
-author: Rafael Campos (@racampos)
-options:
- payload:
- description: Trustsec VN Bulk Create's payload.
- elements: dict
- suboptions:
- additionalAttributes:
- description: JSON String of additional attributes for the Virtual Network.
- type: str
- id:
- description: Identifier of the Virtual Network.
- type: str
- lastUpdate:
- description: Timestamp for the last update of the Virtual Network.
- type: str
- name:
- description: Name of the Virtual Network.
- type: str
- type: list
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for virtualNetwork
- description: Complete reference of the virtualNetwork API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- virtual_network.VirtualNetwork.bulk_create_virtual_networks,
-
- - Paths used are
- post /api/v1/trustsec/virtualnetwork/bulk/create,
-
-"""
-
-EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_vn_bulk_create:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- payload:
- - additionalAttributes: string
- id: string
- lastUpdate: string
- name: string
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: dict
- sample: >
- {
- "id": "string"
- }
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_update.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_update.py
deleted file mode 100644
index c823d303c..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_update.py
+++ /dev/null
@@ -1,75 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_vn_bulk_update
-short_description: Resource module for Trustsec VN Bulk Update
-description:
-- Manage operation create of the resource Trustsec VN Bulk Update.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module
-author: Rafael Campos (@racampos)
-options:
- payload:
- description: Trustsec VN Bulk Update's payload.
- elements: dict
- suboptions:
- additionalAttributes:
- description: JSON String of additional attributes for the Virtual Network.
- type: str
- id:
- description: Identifier of the Virtual Network.
- type: str
- lastUpdate:
- description: Timestamp for the last update of the Virtual Network.
- type: str
- name:
- description: Name of the Virtual Network.
- type: str
- type: list
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for virtualNetwork
- description: Complete reference of the virtualNetwork API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- virtual_network.VirtualNetwork.bulk_update_virtual_networks,
-
- - Paths used are
- post /api/v1/trustsec/virtualnetwork/bulk/update,
-
-"""
-
-EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_vn_bulk_update:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- payload:
- - additionalAttributes: string
- id: string
- lastUpdate: string
- name: string
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: dict
- sample: >
- {
- "id": "string"
- }
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping.py
deleted file mode 100644
index 712c562be..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping.py
+++ /dev/null
@@ -1,139 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_vn_vlan_mapping
-short_description: Resource module for Trustsec VN VLAN Mapping
-description:
-- Manage operations create, update and delete of the resource Trustsec VN VLAN Mapping.
-- Create VN-Vlan Mapping.
-- Update VN-Vlan Mapping.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module
-author: Rafael Campos (@racampos)
-options:
- id:
- description: Identifier of the VN-VLAN Mapping.
- type: str
- isData:
- description: Flag which indicates whether the VLAN is data or voice type.
- type: bool
- isDefaultVLAN:
- description: Flag which indicates if the VLAN is default.
- type: bool
- lastUpdate:
- description: Timestamp for the last update of the VN-VLAN Mapping.
- type: str
- maxValue:
- description: Max value.
- type: int
- name:
- description: Name of the VLAN.
- type: str
- vnId:
- description: Identifier for the associated Virtual Network which is required unless
- its name is provided.
- type: str
- vnName:
- description: Name of the associated Virtual Network to be used for identity if id
- is not provided.
- type: str
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for vnVlanMapping
- description: Complete reference of the vnVlanMapping API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- vn_vlan_mapping.VnVlanMapping.create_vn_vlan_mapping,
- vn_vlan_mapping.VnVlanMapping.delete_vn_vlan_mapping_by_id,
- vn_vlan_mapping.VnVlanMapping.update_vn_vlan_mapping_by_id,
-
- - Paths used are
- post /api/v1/trustsec/vnvlanmapping,
- delete /api/v1/trustsec/vnvlanmapping/{id},
- put /api/v1/trustsec/vnvlanmapping/{id},
-
-"""
-
-EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_vn_vlan_mapping:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- state: present
- id: string
- isData: true
- isDefaultVlan: true
- lastUpdate: string
- maxValue: 0
- name: string
- vnId: string
- vnName: string
-
-- name: Update by id
- cisco.ise.trustsec_vn_vlan_mapping:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- state: present
- id: string
- isData: true
- isDefaultVlan: true
- lastUpdate: string
- maxValue: 0
- name: string
- vnId: string
- vnName: string
-
-- name: Delete by id
- cisco.ise.trustsec_vn_vlan_mapping:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- state: absent
- id: string
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: list
- elements: dict
- sample: >
- [
- {
- "id": "string",
- "isData": true,
- "isDefaultVlan": true,
- "lastUpdate": "string",
- "maxValue": 0,
- "name": "string",
- "vnId": "string",
- "vnName": "string"
- }
- ]
-
-ise_update_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: dict
- sample: >
- {
- "code": 0,
- "message": "string"
- }
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_create.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_create.py
deleted file mode 100644
index bbe8e5980..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_create.py
+++ /dev/null
@@ -1,93 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_vn_vlan_mapping_bulk_create
-short_description: Resource module for Trustsec VN VLAN Mapping Bulk Create
-description:
-- Manage operation create of the resource Trustsec VN VLAN Mapping Bulk Create.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module
-author: Rafael Campos (@racampos)
-options:
- payload:
- description: Trustsec VN VLAN Mapping Bulk Create's payload.
- elements: dict
- suboptions:
- id:
- description: Identifier of the VN-VLAN Mapping.
- type: str
- isData:
- description: Flag which indicates whether the VLAN is data or voice type.
- type: bool
- isDefaultVLAN:
- description: Flag which indicates if the VLAN is default.
- type: bool
- lastUpdate:
- description: Timestamp for the last update of the VN-VLAN Mapping.
- type: str
- maxValue:
- description: Max value.
- type: int
- name:
- description: Name of the VLAN.
- type: str
- vnId:
- description: Identifier for the associated Virtual Network which is required
- unless its name is provided.
- type: str
- vnName:
- description: Name of the associated Virtual Network to be used for identity
- if id is not provided.
- type: str
- type: list
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for vnVlanMapping
- description: Complete reference of the vnVlanMapping API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- vn_vlan_mapping.VnVlanMapping.bulk_create_vn_vlan_mappings,
-
- - Paths used are
- post /api/v1/trustsec/vnvlanmapping/bulk/create,
-
-"""
-
-EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_vn_vlan_mapping_bulk_create:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- payload:
- - id: string
- isData: true
- isDefaultVlan: true
- lastUpdate: string
- maxValue: 0
- name: string
- vnId: string
- vnName: string
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: dict
- sample: >
- {
- "id": "string"
- }
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_delete.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_delete.py
deleted file mode 100644
index 88a6c1e34..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_delete.py
+++ /dev/null
@@ -1,59 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_vn_vlan_mapping_bulk_delete
-short_description: Resource module for Trustsec VN VLAN Mapping Bulk Delete
-description:
-- Manage operation create of the resource Trustsec VN VLAN Mapping Bulk Delete.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module
-author: Rafael Campos (@racampos)
-options:
- payload:
- description: Trustsec VN VLAN Mapping Bulk Delete's payload.
- elements: str
- type: list
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for vnVlanMapping
- description: Complete reference of the vnVlanMapping API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- vn_vlan_mapping.VnVlanMapping.bulk_delete_vn_vlan_mappings,
-
- - Paths used are
- post /api/v1/trustsec/vnvlanmapping/bulk/delete,
-
-"""
-
-EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_vn_vlan_mapping_bulk_delete:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- payload:
- - string
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: dict
- sample: >
- {
- "id": "string"
- }
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_update.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_update.py
deleted file mode 100644
index e99b6f6d5..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_update.py
+++ /dev/null
@@ -1,93 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_vn_vlan_mapping_bulk_update
-short_description: Resource module for Trustsec VN VLAN Mapping Bulk Update
-description:
-- Manage operation create of the resource Trustsec VN VLAN Mapping Bulk Update.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module
-author: Rafael Campos (@racampos)
-options:
- payload:
- description: Trustsec VN VLAN Mapping Bulk Update's payload.
- elements: dict
- suboptions:
- id:
- description: Identifier of the VN-VLAN Mapping.
- type: str
- isData:
- description: Flag which indicates whether the VLAN is data or voice type.
- type: bool
- isDefaultVLAN:
- description: Flag which indicates if the VLAN is default.
- type: bool
- lastUpdate:
- description: Timestamp for the last update of the VN-VLAN Mapping.
- type: str
- maxValue:
- description: Max value.
- type: int
- name:
- description: Name of the VLAN.
- type: str
- vnId:
- description: Identifier for the associated Virtual Network which is required
- unless its name is provided.
- type: str
- vnName:
- description: Name of the associated Virtual Network to be used for identity
- if id is not provided.
- type: str
- type: list
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for vnVlanMapping
- description: Complete reference of the vnVlanMapping API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- vn_vlan_mapping.VnVlanMapping.bulk_update_vn_vlan_mappings,
-
- - Paths used are
- post /api/v1/trustsec/vnvlanmapping/bulk/update,
-
-"""
-
-EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_vn_vlan_mapping_bulk_update:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- payload:
- - id: string
- isData: true
- isDefaultVlan: true
- lastUpdate: string
- maxValue: 0
- name: string
- vnId: string
- vnName: string
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: dict
- sample: >
- {
- "id": "string"
- }
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_info.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_info.py
deleted file mode 100644
index c6047e4ee..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_info.py
+++ /dev/null
@@ -1,149 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_vn_vlan_mapping_info
-short_description: Information module for Trustsec VN VLAN Mapping
-description:
-- Get all Trustsec VN VLAN Mapping.
-- Get Trustsec VN VLAN Mapping by id.
-- Get VN-Vlan Mapping by id.
-- Get all VN-Vlan Mappings.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module_info
-author: Rafael Campos (@racampos)
-options:
- page:
- description:
- - Page query parameter. Page number.
- type: int
- size:
- description:
- - Size query parameter. Number of objects returned per page.
- type: int
- sort:
- description:
- - Sort query parameter. Sort type - asc or desc.
- type: str
- sortBy:
- description:
- - SortBy query parameter. Sort column by which objects needs to be sorted.
- type: str
- filter:
- description:
- - >
- Filter query parameter. .. Container **Simple filtering** should be available through the filter query
- string parameter. The structure of a filter is a triplet of field operator and value separated with dots.
- More than one filter can be sent. The logical operator common to ALL filter criteria will be by default AND,
- and can be changed by using the *"filterType=or"* query string parameter.
- - Each resource Data model description should specify if an attribute is a filtered field.
- - The 'EQ' operator describes 'Equals'.
- - The 'NEQ' operator describes 'Not Equals'.
- - The 'GT' operator describes 'Greater Than'.
- - The 'LT' operator describes 'Less Than'.
- - The 'STARTSW' operator describes 'Starts With'.
- - The 'NSTARTSW' operator describes 'Not Starts With'.
- - The 'ENDSW' operator describes 'Ends With'.
- - The 'NENDSW' operator describes 'Not Ends With'.
- - The 'CONTAINS' operator describes 'Contains'.
- - The 'NCONTAINS' operator describes 'Not Contains'.
- elements: str
- type: list
- filterType:
- description:
- - >
- FilterType query parameter. The logical operator common to ALL filter criteria will be by default AND, and
- can be changed by using the parameter.
- type: str
- id:
- description:
- - Id path parameter.
- type: str
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for vnVlanMapping
- description: Complete reference of the vnVlanMapping API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- vn_vlan_mapping.VnVlanMapping.get_vn_vlan_mapping_by_id,
- vn_vlan_mapping.VnVlanMapping.get_vn_vlan_mappings_generator,
-
- - Paths used are
- get /api/v1/trustsec/vnvlanmapping,
- get /api/v1/trustsec/vnvlanmapping/{id},
-
-"""
-
-EXAMPLES = r"""
-- name: Get all Trustsec VN VLAN Mapping
- cisco.ise.trustsec_vn_vlan_mapping_info:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- page: 0
- size: 0
- sort: string
- sortBy: string
- filter: []
- filterType: string
- register: result
-
-- name: Get Trustsec VN VLAN Mapping by id
- cisco.ise.trustsec_vn_vlan_mapping_info:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- id: string
- register: result
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: list
- elements: dict
- sample: >
- [
- {
- "id": "string",
- "isData": true,
- "isDefaultVlan": true,
- "lastUpdate": "string",
- "maxValue": 0,
- "name": "string",
- "vnId": "string",
- "vnName": "string"
- }
- ]
-
-ise_responses:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: list
- elements: dict
- sample: >
- [
- {
- "id": "string",
- "isData": true,
- "isDefaultVlan": true,
- "lastUpdate": "string",
- "maxValue": 0,
- "name": "string",
- "vnId": "string",
- "vnName": "string"
- }
- ]
-"""
diff --git a/ansible_collections/cisco/ise/plugins/plugin_utils/ise.py b/ansible_collections/cisco/ise/plugins/plugin_utils/ise.py
index 2a2dce924..fbb0843c2 100644
--- a/ansible_collections/cisco/ise/plugins/plugin_utils/ise.py
+++ b/ansible_collections/cisco/ise/plugins/plugin_utils/ise.py
@@ -13,7 +13,7 @@ except ImportError:
ISE_SDK_IS_INSTALLED = False
else:
ISE_SDK_IS_INSTALLED = True
-from ansible.module_utils.basic import AnsibleModule, env_fallback
+from ansible.module_utils.basic import env_fallback
try:
from ansible.errors import AnsibleActionFail
@@ -133,11 +133,12 @@ def ise_argument_spec():
ise_username=dict(type="str", fallback=(env_fallback, ['ISE_USERNAME']), required=True),
ise_password=dict(type="str", fallback=(env_fallback, ['ISE_PASSWORD']), required=True, no_log=True),
ise_verify=dict(type="bool", default=True, fallback=(env_fallback, ['ISE_VERIFY'])),
- ise_version=dict(type="str", default="3.1_Patch_1", fallback=(env_fallback, ['ISE_VERSION'])),
+ ise_version=dict(type="str", default="3.2_beta", fallback=(env_fallback, ['ISE_VERSION'])),
ise_wait_on_rate_limit=dict(type="bool", default=True, fallback=(env_fallback, ['ISE_WAIT_ON_RATE_LIMIT'])),
ise_uses_api_gateway=dict(type="bool", default=True, fallback=(env_fallback, ['ISE_USES_API_GATEWAY'])),
ise_uses_csrf_token=dict(type="bool", default=False, fallback=(env_fallback, ['ISE_USES_CSRF_TOKEN'])),
ise_debug=dict(type="bool", default=False, fallback=(env_fallback, ['ISE_DEBUG'])),
+ ise_single_request_timeout=dict(type="int", default=60, fallback=(env_fallback, ['ISE_SINGLE_REQUEST_TIMEOUT'])),
)
return argument_spec
@@ -172,6 +173,7 @@ class ISESDK(object):
ers_base_url=ers_base_url,
mnt_base_url=mnt_base_url,
px_grid_base_url=px_grid_base_url,
+ single_request_timeout=params.get("ise_single_request_timeout"),
verify=params.get("ise_verify"),
version=params.get("ise_version"),
wait_on_rate_limit=params.get("ise_wait_on_rate_limit"),
diff --git a/ansible_collections/cisco/ise/plugins/plugin_utils/personas_utils.py b/ansible_collections/cisco/ise/plugins/plugin_utils/personas_utils.py
index 1f30a10c7..6fb4e2744 100644
--- a/ansible_collections/cisco/ise/plugins/plugin_utils/personas_utils.py
+++ b/ansible_collections/cisco/ise/plugins/plugin_utils/personas_utils.py
@@ -144,7 +144,7 @@ class Node(object):
try:
response = requests.post(url=url, timeout=15, data=data, headers=headers, auth=(self.username, self.password), verify=False)
except Exception as e:
- AnsibleActionFail(e)
+ raise AnsibleActionFail(e)
if not response.status_code == 200:
raise AnsibleActionFail("Received status code {status_code} when exporting certificate.".format(status_code=str(response.status_code)))
@@ -175,7 +175,7 @@ class Node(object):
)
return_message = json.loads(response.text)["response"]["message"]
except Exception as e:
- AnsibleActionFail(e)
+ raise AnsibleActionFail(e)
if not response.status_code == 200:
if not (return_message == 'Trust certificate was added successfully' or